AOS Command Reference Guide
AOS Command Reference Guide
AOS Command Reference Guide
Trademarks
Any brand names and product names included in this manual are trademarks, registered trademarks, service marks, or trade names of their respective holders.
901 Explorer Boulevard P.O. Box 140000 Huntsville, AL 35814-4000 Phone: (256) 963-8000 www.adtran.com 60000CRG0-35B All Rights Reserved. Printed in the U.S.A.
60000CRG0-35B
Conventions
Warnings provide information that could prevent damage to the equipment or endangerment to human life.
Export Statement
An Export License is required if an ADTRAN product is sold to a Government Entity outside of the EU+8 (Austria, Australia, Belgium, Czech Republic, Denmark, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Japan, Luxembourg, Netherlands, New Zealand, Norway, Poland, Portugal, Spain, Sweden, Switzerland and the United Kingdom). This requirement is per DOC/BIS ruling G030477 issued 6/6/03. This product also requires that the Exporter of Record file a semi-annual report with the BXA detailing the information per EAR 740.17(5)(e)(2). DOC - Department of Commerce BIS - Bureau of Industry and Security BXA - Bureau of Export Administration
60000CRG0-35B
Table of Contents
Basic Mode Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Common Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Enable Mode Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Global Configuration Mode Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795 Line (Console) Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1337 Line (SSH) Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1354 Line (Telnet) Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1367 ADSL Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1382 BRI Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1390 Cellular Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1402 DDS Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1420 DSX-1 Interface Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1429 E1 Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1440 Ethernet Interface Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1457 FDL Interface Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1594 FXO Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1600 FXS Interface Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1611 G.703 Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1629 HSSI Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1636 Modem Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1641 PRI Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1647 Serial Interface Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1663 SHDSL Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1673 T1 Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1692 T3 Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1710 ATM Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1722 ATM Subinterface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1727 BVI Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1816 Demand Interface Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1855 EFM Group Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1932 Frame Relay Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1936 Frame Relay Subinterface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1958 HDLC Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2044 Loopback Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2121 Port Channel Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2167 PPP Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2192 Tunnel Interface Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2310 VLAN Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2387 VLAN Database Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2392
60000CRG0-35B
VLAN Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . AP Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Radio Interface Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VAP Interface Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . AS Path List Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . BGP Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . BGP Neighbor Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Community List Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Network Monitor Probe Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Network Monitor Probe Responder Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Network Monitor Track Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Router (OSPF) Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Router (PIM Sparse) Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Router (RIP) Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Desktop Auditing Local Policy Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DHCP Pool Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ethernet OAM CFM Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hardware ACL and Access Map Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IPv4 Access Control List Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IPv4 Access Control Policy Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IPv6 Access Control List Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IPv6 Access Control Policy Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mail Agent Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MEF EVC Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MEF EVC Map Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MEF Policer Policy Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MGCP Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Quality of Service Map Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RADIUS Group Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Route Map Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Security Monitor Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . TACACS+ Group Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Top Traffic Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice Call Pickup Group Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice ISDN Group Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice Operator Ring Group Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice Paging Group Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice Ring Group Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice Trunk Group Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice Analog Trunk Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice ISDN Trunk Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2401 2486 2504 2529 2548 2551 2567 2587 2590 2618 2629 2646 2667 2672 2689 2696 2720 2738 2755 2773 2791 2821 2830 2842 2846 2852 2858 2884 2912 2916 2946 2951 2954 2962 2965 2974 2992 2997 3020 3033 3077
60000CRG0-35B
Voice SIP Trunk Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice T1 Trunk Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice Line Account Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice Loopback Account Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice User Account Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice Auto Attendant Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice Call Queuing Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice Coverage Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice CODEC List Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice CoS Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . FindMe-FollowMe Action Script Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . FindMe-FollowMe Contact Group Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voice Music on Hold Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Proxy User Template Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Voicemail CoS Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VQM Reporter Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CA Profile Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Certificate Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Crypto Map IKE Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Crypto Map Manual Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IKE Client Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IKE Policy Attributes Command Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IKE Policy Command Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3111 3171 3220 3243 3261 3335 3338 3355 3359 3363 3400 3408 3418 3421 3430 3439 3449 3461 3466 3484 3496 3501 3508
60000CRG0-35B
Internal Parts
In order to fully understand product operation and receive the full benefit of the included guides, you should be familiar with the units internal parts, which can be divided into five main categories.
1. ROM - Read Only Memory
Read only memory (ROM) is a permanent form of memory stored in chips within the unit and houses information used by the AOS unit on initial startup. Examples of information stored in ROM are the Power-On Self Test, which initializes upon boot up and checks the units functionality; the Bootstrap Startup Program, which actually starts the unit; and the basic form of the AOS software.
2. Flash Memory
Flash Memory is memory located in a memory chip that is not only erasable, but also reprogrammable, allowing for software upgrades without chip removal. The flash memory in your unit contains the full AOS and can be used to house copies of the configuration files and application images that are used at initial unit startup.
60000CRG0-35B
Internal Parts
RAM is the computer memory that functions as the working memory of your AOS unit. When the unit is on, the RAM provides memory for caching, packet buffering, holding routing tables, and housing the running operating system. When the unit is first powered on, RAM executes the application codes from flash memory and the startup configurations from nonvolatile random access memory (NVRAM), and when the unit is powered off or reset, RAM loses all data.
4. NVRAM - Nonvolatile Random Access Memory
NVRAM is the general name for any RAM that does not lose its information at power down (for example, flash memory). In this case, NVRAM has a separate memory function than the flash memory and is used to house the units startup configurations.
5. Interfaces
Interface is the term used to describe how your unit is connected with its outside environment. There are a variety of interface categories, as well as interface types. Interface categories include line interfaces, physical interfaces, and virtual interfaces. Line interfaces describe the way you are communicating with your unit (for example, by console or Telnet). Physical interfaces describe the way your unit is physically connected to other units or devices (for example, via Ethernet, T3, serial, or asymmetric digital subscriber line (ADSL)). Virtual interfaces describe the way your unit receives information, whether by Frame Relay, Point-to-Point Protocol (PPP), virtual local area network (VLAN), or asynchronous transfer mode (ATM), to name a few.
The user can configure a units interfaces through the interface command sets (refer to Configuration Command Sets on page 14).
60000CRG0-35B
Introduction to Commands
The most important part is understanding that your commands make the AOS unit function. The right commands lead to a fully functioning unit, whereas improperly entered or forgotten commands keep the unit from functioning. To properly use commands, you must understand what function you want the AOS unit to complete and what syntax the unit understands as instructions. Each command has its own role within the operating system, and it is the responsibility of the operator to become familiar with specific commands and command sets.
ADTRAN products, training tools, and manuals follow a specific system for entering and referencing commands. Items that are typed in bold are the required commands and arguments for a certain action. In the following documentation, you will see commands in bold after an example prompt. They look similar to this:
>enable #configure terminal (config)#line telnet 4 (config-telnet4)#
In the example above, the characters >, #, (config)#, and (config-telnet4)# are the prompts after which commands are entered. In this example, the words in bold (enable, configure terminal, and line telnet 4) are the entire commands and constitute what should be typed after the prompt. It is important to pay attention to the prompt you are given when communicating with your unit, as some commands only work in certain modes, which are signified by the prompt. The different prompts and modes are discussed later in this guide. In some commands, you are given a choice of arguments. If this is the case, the manual or guide will place a vertical bar (|) between your choices as seen in this example:
60000CRG0-35B
Types of Commands
Again, remember the # is your prompt, the command word is show, and your choices of arguments are flash and cflash. Other commands require you to enter your own information. Information within a command line that pertains to your personal unit is set off with the greater-than (<) and less-than symbols (>). The description of the information required is contained within the greater-than and less-than symbols and is typed in italics. For example:
#copy <file source location> <config-file> tftp
In this case, # is again your prompt, the command word is copy, the information needed from you is the source location of the file you want to copy (the first set of < >) and the configuration file type (second set of < >), and tftp represents the location in which to copy the file.
Types of Commands
There are three types of commands in the CLI. Each type of command signifies a different function.
Global Commands
Global commands make changes to the functioning of the entire unit. Global commands correspond to the Global Configuration mode of the unit and require a password to access since they affect the entire system.
Major Commands
Major commands allow only parts of the product to be configured. Major commands correspond to the Enable mode of the unit and also require a password since they affect functioning parts of the unit, even though they do not affect the entire system.
Subcommands
Subcommands are the commands that do the actual work of configuring unit parts. Subcommands typically follow major commands, and in essence tell the unit to follow through with the major commands direction.
60000CRG0-35B
10
Once you have connected via VT100 terminal or have found the HyperTerminal program, set the program settings as follows: 9600 baud 8 data bits No parity 1 stop bit No flow control
If you are using a HyperTerminal program, name your new connection and then set up the new connection via the resulting dialogue box. The box allows you to determine the type of connection you are using. Verify COM 1 and select OK. Another dialogue box appears for entering the COM 1 properties. Enter the program settings in this box; select APPLY and then OK. You should then be presented with a terminal window with which to interface with your unit.
60000CRG0-35B
11
After configuring your PC (or VT100 terminal), plug the unit into the wall and turn on the power. The unit begins the boot up process, which includes the following: The Power-On Self Test runs. This test checks the unit hardware for normal operation. The hardware includes the central processing unit (CPU), the memory, and the interfaces. The Bootstrap Startup Program (factory set in the ROM) runs. The Bootstrap Startup Program is read by the unit to discover the proper source for the operating system image. The operating system image is loaded into RAM. The configuration file saved in NVRAM is loaded into RAM, where it is accessed by the unit and then executed one line at a time.
If no configuration file is found in NVRAM (there will not be one found on initial setup), you are presented with the following prompt on your terminal or HyperTerminal screen:
Session Now Available Press RETURN to get started
After pressing return, a prompt appears for communication with your unit.
Interaction with your unit begins at the Basic mode. The commands supported at this command tier are limited, as is interaction with the unit itself. The Basic mode is to keep users without access to the higher tiered commands from changing the preferred configurations of the unit. The following table describes the Basic mode. Mode
Basic
Access By...
Mode Prompt
Accessible Commands
Display system information Perform traceroute and ping functions Open a Telnet session
For more information on the Basic mode, please refer to Basic Mode Command Set on page 36.
60000CRG0-35B
12
Enable mode is the mid-level tier in the command hierarchy, one step up from the Basic mode. ADTRAN suggests that a password be required to access the Enable mode. Refer to the quick configuration guides and quick start guides located on the AOS Documentation CD for more information on configuring a password. From the Enable mode, you can access the configurations of your product, as well as handle how your unit boots and runs, among other things. The following table describes the Enable mode. Mode
Enable
Access By....
Mode Prompt
Accessible Commands
Manage the startup and running configurations Use the debug commands Enter any of the configuration modes
For more information regarding the Enable command set, refer to the Enable Mode Command Set on page 81.
Global Mode
The Global mode is the highest level tier within AOS. The Global mode allows the user to make changes regarding the entire product system. All of your systems configurations are accessed through the Global mode. From this level, you can access not only line configurations, router configurations, and interface configurations, but also any other configurations or parameters on your system. The following table describes the Global mode. Mode
Global
Access By...
Mode Prompt
Accessible Commands
Set the systems Enable-level password(s) Configure the system global IP parameters Configure the SNMP parameters Enter any of the configuration modes
Entering config while at the (config)# Enable mode as follows: >enable # #config
For more information on the Global mode, refer to Global Configuration Mode Command Set on page 795.
60000CRG0-35B
13
Understanding Configurations
Understanding Configurations
Configurations are the means by which you set up your unit and system according to your personal requirements and preferences. You must configure your unit to work within your network, based on your hardware and communication systems. All configurations are accessed through the Global Configuration mode. By typing in config at the Enable mode prompt, you will be ready to specify the configuration you want to access. For each configuration, enter the word or phrase that correlates with the system you are configuring. There are different command sets for each type of configuration. These command sets are detailed in the following section.
The line interface commands deal specifically with the way in which you communicate with your device. The first time you connect with your unit, you must use the CONSOLE port in the rear of the unit, but connections thereafter can be set up via the CONSOLE port, a terminal interface, or by Telnet. The line interface command sets allow you to configure each method of connection to your preferences. The following table gives an example of the line interface command set. For a more detailed description, refer to Command Descriptions on page 23. Command Set Accessed By... Sample Prompt With This Set You Can...
Configure the console or terminal settings (data rate, login password, etc.) Create Telnet logins and specify their parameters (login password, etc.)
Line Interface Specifying a line (console, (config-con0)# Telnet, SSH) at the Global Configuration mode prompt as follows: >enable #config (config)#line console 0
60000CRG0-35B
14
The physical interface commands of your unit deal with the medium over which your data is actually transmitted and the physical hardware associated with your unit. Included in the physical interfaces are Ethernet cables, serial interfaces, T1 cables, etc. These configurations must be set up to work with the type of network you have. The following table describes the physical interface command sets. For a more detailed description of the physical interface command sets, please refer to Command Descriptions on page 23. Command Set
Physical Interface
Accessed By...
(config-adsl0/1)# Specifying an interface at the Global Configuration mode prompt as follows: >enable #config (config)#interface adsl 0/1
The virtual interface is similar to the physical interface in function, except that it deals with your virtual network. In essence, as your physical interfaces deal with your actual physical connections, virtual interfaces deal with how your information is transmitted over those physical connections. Virtual interfaces deal with your networking through protocols, such as ATM, Frame Relay, high level data link control (HDLC), PPP, VLAN, etc. The virtual interface commands allow you to fully integrate your unit into your existing networking setup. The following table gives an example of the virtual interface command set. For more information on virtual interfaces, refer to Command Descriptions on page 23. Command Set
Virtual Interface
Accessed By...
Specifying an interface at the Global Configuration mode prompt as follows: >enable #config (config)#interface frame-relay 1
60000CRG0-35B
15
The wireless interface is similar to both the physical and virtual interfaces in function, except that it deals with your wireless network. Wireless interfaces allow the configuration of wireless access points (APs), access point radios, and virtual access points (VAPs). The following table gives an example of the wireless interface command set. For more information on wireless interfaces, refer to Command Descriptions on page 23. Command Set Accessed By...
Wireless Interface
(config-dot11ap Specifying a wireless 1)# interface at the Global Configuration mode prompt as follows: >enable #config (config)#interface dot11ap 1
The routing command sets for the product serve two functions. Routing commands not only address the manner in which your unit routes and disseminates information, but they also provide an additional level of security for your network. Routing commands include parameters, such as AS path list, community list, and network monitoring, and they determine whether your unit routes via Routing Information Protocol (RIP), open shortest path first (OSPF), or protocol-independent multicast (PIM) sparse. The following table gives an example of the routing command sets. For a complete list of routing commands, refer to the Command Descriptions on page 23. Command Set Accessed By...
Routing
(config-ospf)# Specifying which routing parameter you wish to set at the Global Configuration mode prompt as follows: >enable #config (config)#router ospf
60000CRG0-35B
16
The security and services command sets provide methods for you to configure additional security for your unit, as well as determine the types of services you want your unit to perform. Included in these command sets are quality of service (QoS) maps, Dynamic Host Configuration Protocol (DHCP) pools, and route map configurations. The following table includes an example of the security and services commands. For a more detailed listing of the command sets, refer to Command Descriptions on page 23. Command Set
Security and Services
Accessed By...
Specifying the service you (config-sg-radius)# would like to perform at the Global Configuration mode prompt as follows: >enable #config (config)#aaa group server radius myServer
Voice group command sets deal with the configuration and organization of voice groups within your network. The commands allow you to configure voice features as part of a collective group, and to define how these groups behave. The following table gives a small example of the voice group command sets. For a more detailed description, refer to Command Descriptions on page 23. Command Set Accessed By...
Voice Groups
Specifying the voice group you (config-1234)# would like to configure at the Global Configuration mode prompt as follows: >enable #config (config)#voice ring-group 1234
60000CRG0-35B
17
Voice trunks command sets deal with the configuration of voice trunks within your network. The commands allow you to configure various trunks and specify how these trunks function. The following table gives a small example of the voice trunks command sets. For a more detailed description, refer to Command Descriptions on page 23. Command Set Accessed By...
Voice Trunks
Specifying the voice trunk type (config-t01)# you would like to configure at the Global Configuration mode prompt as follows: >enable #config (config)#voice trunk t01
Voice accounts command sets deal with the configuration and organization of differing accounts within your voice network. The commands allow you to configure such items as user permissions, voice line behaviors, and voice loopback services. The following table gives a small example of the voice accounts command sets. For a more detailed description, refer to Command Descriptions on page 23. Command Set Accessed By...
Voice Accounts
(config-4444)# Specifying the voice account you would like to configure at the Global Configuration mode prompt as follows: >enable #config (config)#voice user 4444
60000CRG0-35B
18
Voice services command sets deal with the configuration and implementation of various voice services within your network. The commands allow you to configure voice features to improve network operation, set voicemail parameters, and monitor your voice network. The following table gives a small example of the voice services command sets. For a more detailed description, refer to Command Descriptions on page 23. Command Set Accessed By...
Voice Services
(config-aa1212)# Specifying the voice service you would like to configure at the Global Configuration mode prompt as follows: >enable #config (config)#voice autoattendant Example 1212
The virtual private network (VPN) parameter command sets deal with the encryption and security on your private network. To allow you the utmost in security, the VPN parameter commands allow you to configure how your unit will behave as it communicates with other devices. VPN command sets allow you to configure Internet key exchange (IKE) parameters, crypto parameters, and certificate parameters. The following table gives an example of the VPN parameter commands. For a more detailed listing of commands, refer to Command Descriptions on page 23. Command Set Accessed By... Sample Prompt With This Set You Can...
Determine how your unit authenticates communication Set the parameters for keeping your unit secure
VPN Parameters Specifying which parameter you (config-certchain)# wish to set at the Global Configuration mode prompt as follows: >enable #config (config)#crypto ca certificate chain MyProfile
60000CRG0-35B
19
Description
To redisplay a previously entered command, use the up arrow key. Continuing to press the up arrow key cycles through all commands entered, starting with the most recent command. Pressing the <Tab> key after entering a partial (but unique) command will complete the command, display it on the command prompt line, and wait for further input. The AOS CLI contains help to guide you through the configuration process. Using the question mark, do any of the following: Display a list of all subcommands in the current mode. For example: (config-t1 1/1)#coding ? ami - Alternate Mark Inversion b8zs - Bipolar Eight Zero Substitution Display a list of available commands beginning with certain letter(s). For example: (config)#ip d? default-gateway dhcp-server domain-lookup domain-name domain-proxy Obtain syntax help for a specific command by entering the command, a space, and then a question mark (?). The AOS CLI displays the range of values and a brief description of the next parameter expected for that particular command. For example: (config-eth 0/1)#mtu ? <64-1500> - MTU (bytes)
<Tab> key ?
<Ctrl + A>
Jump to the beginning of the displayed command line. This shortcut is helpful when using the no form of commands (when available). For example, pressing <Ctrl + A> at the following prompt will place the cursor directly after the #: (config-eth 0/1)#ip address 192.33.55.6 Jump to the end of the displayed command line. For example, pressing <Ctrl + E> at the following prompt will place the cursor directly after the 6: (config-eth 0/1)#ip address 192.33.55.6
<Ctrl + E>
<Ctrl + U>
Clears the current displayed command line. The following provides an example of the <Ctrl + U> feature: (config-eth 0/1)#ip address 192.33.55.6 (Press <Ctrl + U> here) (config-eth 0/1)#
auto finish
You need only enter enough letters to identify a command as unique. For example, entering int t1 1/1 at the Global Configuration mode prompt provides you access to the configuration parameters for the specified T1 interface. Entering interface t1 1/1 would work as well, but is not necessary.
60000CRG0-35B
20
Description
The do command provides a way to execute commands in other command sets without taking the time to exit the current command set. The following example shows the do command used to view the Frame Relay interface configuration while in the T1 interface command set: (config)#interface t1 1/1 (config-t1 1/1)#do show interfaces fr 7
no shutdown
To activate an interface, enter no shutdown followed by the interface. For example: no shutdown t1 1/1
no
To undo an issued command or to disable a feature, enter no before the command. no debug voice
When you are ready to save the changes made to the configuration, enter this command. This copies your changes to the units NVRAM. Once the save is complete, the changes are retained even if the unit is shut down or suffers a power outage. Displays the current configuration. Use the debug command to troubleshoot problems you may be experiencing on your network. These commands provide additional information to help you better interpret possible problems. For information on specific debug commands, refer to the debug section beginning on page 203. To turn off any active debug commands, enter this command.
undebug all
The overhead associated with the debug command takes up a large portion of your AOS products resources, and at times can halt other processes. It is best to use the debug command only during times when the network resources are in low demand (nonpeak hours, weekends, etc.).
60000CRG0-35B
21
Helpful Hints
The command may not be valid in the current command mode, or you may not have entered enough correct characters for the command to be recognized. Try using the ? command to determine your error. Refer to Using CLI Shortcuts on page 20 for more information. The command may not be valid in the current command mode, or you may not have entered all of the pertinent information required to make the command valid. Try using the ? command to determine your error. Refer to Using CLI Shortcuts on page 20 for more information. The error in command entry is located where the caret (^) mark appears. Enter a question mark at the prompt. The system displays a list of applicable commands or gives syntax information for the entry.
60000CRG0-35B
22
Command Descriptions
COMMAND DESCRIPTIONS
This portion of the guide provides a detailed listing of all available commands for the AOS CLI (organized by command set). Each command listing contains pertinent information, including the default value, a description of all subcommand parameters, functional notes for using the command, and a brief technology review. To search for information on a group of commands within a particular command set, use the linked references given below:
Basic Mode Command Set on page 36 Common Commands on page 63 Enable Mode Command Set on page 81 Global Configuration Mode Command Set on page 795
Line Interface Command Sets
Line (Console) Interface Command Set on page 1337 Line (SSH) Interface Command Set on page 1354 Line (Telnet) Interface Command Set on page 1367
Physical Interface Command Sets
ADSL Interface Command Set on page 1382 BRI Interface Command Set on page 1390 Cellular Interface Command Set on page 1402 DDS Interface Command Set on page 1420 DSX-1 Interface Command Set on page 1429 E1 Interface Command Set on page 1440 Ethernet Interface Command Set on page 1457 FDL Interface Command Set on page 1594 FXO Interface Command Set on page 1600 FXS Interface Command Set on page 1611 G.703 Interface Command Set on page 1629 HSSI Interface Command Set on page 1636 Modem Interface Command Set on page 1641 PRI Interface Command Set on page 1647 Serial Interface Command Set on page 1663 SHDSL Interface Command Set on page 1673 T1 Interface Command Set on page 1692 T3 Interface Command Set on page 1710
Virtual Interface Command Sets
ATM Interface Command Set on page 1722 ATM Subinterface Command Set on page 1727
60000CRG0-35B
23
Command Descriptions
BVI Interface Command Set on page 1816 Demand Interface Command Set on page 1855 EFM Group Command Set on page 1932 Frame Relay Interface Command Set on page 1936 Frame Relay Subinterface Command Set on page 1958 HDLC Interface Command Set on page 2044 Loopback Interface Command Set on page 2121 Port Channel Interface Command Set on page 2167 PPP Interface Command Set on page 2192 Tunnel Interface Command Set on page 2310 VLAN Command Set on page 2387 VLAN Database Command Set on page 2392 VLAN Interface Command Set on page 2401
Wireless Interface Command Sets
AP Interface Command Set on page 2486 Radio Interface Command Set on page 2504 VAP Interface Command Set on page 2529
Routing Command Sets
AS Path List Command Set on page 2548 BGP Command Set on page 2551 BGP Neighbor Command Set on page 2567 Community List Command Set on page 2587 Network Monitor Probe Command Set on page 2590 Network Monitor Probe Responder Command Set on page 2618 Network Monitor Track Command Set on page 2629 Router (OSPF) Command Set on page 2646 Router (PIM Sparse) Command Set on page 2667 Router (RIP) Command Set on page 2672
Security and Services Command Sets
Desktop Auditing Local Policy Command Set on page 2689 DHCP Pool Command Set on page 2696 Ethernet OAM CFM Command Set on page 2720 Hardware ACL and Access Map Command Set on page 2738 IPv4 Access Control List Command Set on page 2755 IPv4 Access Control Policy Command Set on page 2773
60000CRG0-35B
24
Command Descriptions
IPv6 Access Control List Command Set on page 2791 IPv6 Access Control Policy Command Set on page 2821 Mail Agent Command Set on page 2830 MEF EVC Command Set on page 2842 MEF EVC Map Command Set on page 2846 MEF Policer Policy Command Set on page 2852 MGCP Command Set on page 2858 Quality of Service Map Command Set on page 2884 RADIUS Group Command Set on page 2912 Route Map Command Set on page 2916 Security Monitor Command Set on page 2946 TACACS+ Group Command Set on page 2951 Top Traffic Command Set on page 2954
Voice Groups Command Sets
Voice Call Pickup Group Command Set on page 2962 Voice ISDN Group Command Set on page 2965 Voice Operator Ring Group Command Set on page 2974 Voice Paging Group Command Set on page 2992 Voice Ring Group Command Set on page 2997 Voice Trunk Group Command Set on page 3020
Voice Trunks Command Sets
Voice Analog Trunk Command Set on page 3033 Voice ISDN Trunk Command Set on page 3077 Voice SIP Trunk Command Set on page 3111 Voice T1 Trunk Command Set on page 3171
Voice Accounts Command Sets
Voice Line Account Command Set on page 3220 Voice Loopback Account Command Set on page 3243 Voice User Account Command Set on page 3261
Voice Services Command Sets
Voice Auto Attendant Command Set on page 3335 Voice Call Queuing Command Set on page 3338 Voice Coverage Command Set on page 3355 Voice CODEC List Command Set on page 3359 Voice CoS Command Set on page 3363
60000CRG0-35B
25
Command Descriptions
FindMe-FollowMe Action Script Command Set on page 3400 FindMe-FollowMe Contact Group Command Set on page 3408 Voice Music on Hold Command Set on page 3418 Proxy User Template Command Set on page 3421 Voicemail CoS Command Set on page 3430 VQM Reporter Command Set on page 3439
VPN Parameter Command Sets
CA Profile Command Set on page 3449 Certificate Command Set on page 3461 Crypto Map IKE Command Set on page 3466 Crypto Map Manual Command Set on page 3484 IKE Client Command Set on page 3496 IKE Policy Attributes Command Set on page 3501 IKE Policy Command Set on page 3508
60000CRG0-35B
26
COMMAND SET ACCESS PATH QUICK REFERENCE GUIDE Physical Interface Command Set Access Paths
Command Set
ADSL BRI Cellular DDS DSX-1 E1 Ethernet Ethernet Subinterface Gigabit Ethernet Gigabit Switchport Switchport Range of Ethernet Interfaces (in this example, eth 0/1 through eth 0/8) FDL FXO FXS G.703 HSSI Modem
(config)#interface fdl 1/1 (config-fdl 1/1)# (config)#interface fxo 0/1 (config-fxo 0/1)# (config)#interface fxs 2/1 (config-fxs 2/1)# (config)#interface e1 1/2 (config-e1 1/2)# (config)#interface hssi 1/1 (config-hssi 1/1)# (config)#interface modem 1/2 (config-modem 1/2)#
page 1594 page 1600 page 1611 page 1629 page 1636 page 1641
60000CRG0-35B
27
Command Set
PRI Serial SHDSL T1 T3
Demand EFM Group Frame Relay Frame Relay Subinterface HDLC Loopback Port Channel PPP Tunnel VLAN Configuration
page 1855 page 1932 page 1936 page 1958 page 2044 page 2121 page 2167 page 2192 page 2310 page 2387
60000CRG0-35B
28
Command Set
VLAN Database VLAN Interface
Community List Network Monitor Probe Network Monitor Probe Responder Network Monitor Track OSPF PIM Sparse RIP
page 2587 page 2590 page 2618 page 2629 page 2646 page 2667 page 2672
60000CRG0-35B
29
IPv6 Access Control Policy MEF EVC MEF EVC Map MEF Policer MGCP Endpoint QoS Map RADIUS Group Route Map Security Monitor TACACS+ Group
page 2821 page 2842 page 2846 page 2852 page 2858 page 2884 page 2912 page 2916 page 2946 page 2951
Top Traffic
page 2954
60000CRG0-35B
30
Voice Analog Trunk Ground Start (GS) Voice Analog Trunk Loop Start (LS) Voice ISDN Trunk Voice SIP Trunk Voice T1 Trunk Feature Group D Voice Trunk T1 Ground Start (GS) Voice T1 Trunk Immediate
page 3033
page 3033
page 3171
page 3171
Voice T1 Trunk
page 3171
60000CRG0-35B
31
Command Set
Voice T1 Trunk Loop Start (LS) Voice T1 Trunk Wink Role
page 3171
page 3408
60000CRG0-35B
32
Command Set
Voicemail CoS Voice Quality Monitoring Reporter
60000CRG0-35B
33
IKE Client
page 3496
page 3501
IKE Policy
page 3508
60000CRG0-35B
34
60000CRG0-35B
35
The following command is common to multiple command sets and is covered in a centralized section of this guide. For more information, refer to the section listed below: exit on page 71 All other commands for this command set are described in this section in alphabetical order. enable on page 37 logout on page 38 ping on page 39 ping ethernet on page 42 ping ipv6 on page 45 ping stack-member <number> on page 48 ping twamp on page 49 show clock on page 52 show snmp on page 53 show version on page 54 telnet <ip address> on page 55 traceroute on page 57 traceroute ethernet on page 58 traceroute ipv6 on page 61
60000CRG0-35B
36
enable
Use the enable command (at the Basic Command mode prompt) to enter the Enable Command mode. Use the disable command to exit the Enable Command mode. Refer to show audit security on page 386 for more information. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Functional Notes
The Enable Command mode provides access to operating and configuration parameters and should be password protected to prevent unauthorized use. Use the enable password command (found in the Global Configuration mode) to specify an Enable Command mode password. If the password is set, access to the Enable Commands (and all other privileged commands) is only granted when the correct password is entered. Refer to enable password <password> on page 878 for more information.
Usage Examples
The following example enters the Enable Command mode and defines an Enable Command mode password: >enable #configure terminal (config)#enable password ADTRAN At the next login, the following sequence must occur: >enable Password: ****** #
60000CRG0-35B
37
logout
Use the logout command to terminate the current session and return to the login screen. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example shows the logout command being executed in the Basic mode: >logout Session now available Press RETURN to get started.
60000CRG0-35B
38
ping
Use the ping command (at the Basic mode prompt) to verify IPv4 network connectivity. For information on how to verify IPv6 network connectivity, refer to ping ipv6 on page 45. Variations of this command include:
ping ping <ip address | hostname> ping <ip address | hostname> data <string> ping <ip address | hostname> repeat <number> ping <ip address | hostname> size <value> ping <ip address | hostname> source <ip address> ping <ip address | hostname> timeout <value> ping <ip address | hostname> verbose ping <ip address | hostname> wait <interval> ping vrf <name> <ip address | hostname> ping vrf <name> <ip address | hostname> data <string> ping vrf <name> <ip address | hostname> repeat <number> ping vrf <name> <ip address | hostname> size <value> ping vrf <name> <ip address | hostname> source <ip address> ping vrf <name> <ip address | hostname> timeout <value> ping vrf <name> <ip address | hostname> verbose ping vrf <name> <ip address | hostname> wait <interval>
After specifying the target IPv4 address to ping, the other parameters can be entered in any order. Use the ? after each specified subcommand for a valid list of arguments and settings. Syntax Description
<ip address | hostname> Optional. Specifies the IPv4 address or host name of the system to ping. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Entering the ping command with no specified Internet Protocol (IP) address prompts the user with parameters for a more detailed ping configuration. Refer to Functional Notes (below) for more information. Optional. Specifies an alphanumerical string to use (the ASCII equivalent) as the data pattern in the ECHO_REQ packets. Optional. Specifies the number of loopback messages to be sent. Range is 1 to 1024. Optional. Specifies the datagram size (in bytes) of the ping packet. Valid range is 1 to 1448 bytes. Optional. Specifies the IPv4 address to use as the source address in the ECHO_REQ (or interface) packets. The source IPv4 address must be a valid address local to the router on the specified VPN routing and forwarding (VRF) instance.
60000CRG0-35B
39
Command Reference Guide timeout <value> verbose vrf <name> wait <interval>
Basic Mode Command Set Optional. Specifies the timeout period after which the ping is considered unsuccessful. Valid range is 1 to 60 seconds. Optional. Enables detailed messaging. Optional. Specifies the VRF where the IPv4 address exists. Optional. Specifies a minimum time to wait between sending test packets. Valid range is 100 to 60000 milliseconds.
Default Values
By default, the data pattern is set to abcd. By default, the repeat is set to 5. By default, the size value is set to 100 bytes. By default, the timeout value is set to 2 seconds. By default, the wait value is set to 100 milliseconds.
Command History
Release 1.1 Release 16.1 Release 17.2 Release 17.4 Release A4.01 Command was introduced. Command was expanded to include the vrf parameter. Command was expanded to include the verbose and wait parameters, also changes were made to the repeat and timeout values. Command was expanded to include the count and interval parameters. The repeat and wait parameters were removed. Command was expanded to return the wait parameter.
Functional Notes
The ping command can be issued from both the Basic and Enable modes. The ping command helps diagnose basic IPv4 network connectivity using the Packet Internet Groper program to repeatedly bounce Internet Control Message Protocol version 4 (ICMPv4) ECHO_REQ packets off a system (using a specified IPv4 address). AOS allows executing a standard ping request to a specified IP address, or provides a set of prompts to configure a more specific ping configuration. The following is a list of output messages from the ping command: ! $ X ? * Success Destination Host Unreachable Invalid Host Address TTL Expired in Transit Unknown Host Request Timed Out
60000CRG0-35B
40
Command Reference Guide The following is a list of available extended ping fields with descriptions: Extended Commands Source Address Data Pattern Sweep Range of Sizes Sweep Min Size Sweep Max Size Sweep Interval Verbose Output
Specifies whether additional commands are desired for more ping configuration parameters. Answer yes (y) or no (n). Specifies the IPv4 address to use as the source address in the ECHO_REQ (or interface) packets. Specifies an alphanumerical string to use (the ASCII equivalent) as the data pattern in the ECHO_REQ packets. Varies the sizes of the ECHO_REQ packets transmitted. Specifies the minimum size of the ECHO_REQ packet. Valid range is 0 to 1488. Specifies the maximum size of the ECHO_REQ packet. Valid range is the sweep minimum size to 1448. Specifies the interval used to determine packet size when performing the sweep. Valid range is 1 to 1448. Specifies an extended results output.
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following is an example of a successful ping command: >ping VRF Name [-default-]: Target IP address:192.168.0.30 Repeat count [5]:5 Datagram Size [100]:100 Timeout in seconds [2]:2 Wait interval in milliseconds [100]:100 Extended Commands? [n]:n Type CTRL+C to abort. Legend: '!' = Success, '?' = Unknown host, '$' = Invalid host address '*' = Request timed out, '-' = Destination host unreachable 'x' = TTL expired in transit, 'e' = Unknown error Sending 5, 100-byte ICMP Echos to 192.168.0.30, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/2 ms
60000CRG0-35B
41
ping ethernet
Use the ping ethernet command to initiate a loopback message from one Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) maintenance endpoint (MEP) to another MEP. These loopback messages are used to test the accessibility of the destination MEP. Variations of this command include:
ping ethernet <target-mac-address | target-mep-id> ping ethernet <target-mac-address | target-mep-id> count <number> ping ethernet <target-mac-address | target-mep-id> data <pattern> ping ethernet <target-mac-address | target-mep-id> domain <domain name> association <association name> ping ethernet <target-mac-address | target-mep-id> domain none association <association name> ping ethernet <target-mac-address | target-mep-id> drop-eligible ping ethernet <target-mac-address | target-mep-idl> interface <interface> ping ethernet <target-mac-address | target-mep-id> mep <mep id> ping ethernet <target-mac-address | target-mep-id> priority <priority> ping ethernet <target-mac-address | target-mep-id> repeat <number> ping ethernet <target-mac-address | target-mep-id> size <bytes> ping ethernet <target-mac-address | target-mep-id> timeout <timeout> ping ethernet <target-mac-address | target-mep-id> validate-data ping ethernet <target-mac-address | target-mep-id> verbose ping ethernet <target-mac-address | target-mep-id> wait <interval>
After specifying the target for the loopback messages, the other parameters can be entered in any order.
Syntax Description
<target-mac-address | target-mep-id> Specifies the destination for the loopback message. Medium access control (MAC) addresses are entered in the format HH:HH:HH:HH:HH:HH. Target MEP IDs are the unique numerical values identifying MEPs. MEP IDs range from 1 to 8191. Optional. Specifies the number of loopback messages to send. Range is 1 to 1000000. Optional. Specifies the pattern to be carried in the data time length value (TLV) of the loopback message. Pattern is up to four hexadecimal digits. Pattern range is 0 to ffff. Optional. Specifies the maintenance domain to which the transmitting MEP belongs. Optional. Specifies no maintenance domain. Optional. Specifies the maintenance association to which the transmitting MEP belongs.
60000CRG0-35B
42
Basic Mode Command Set Optional. Specifies the drop eligible bit value in the virtual local area network (VLAN) tag. Optional. Specifies the interface on which the transmitting MEP is configured. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1. For a list of appropriate interfaces, enter interface ? at the prompt. Specifies the MEP ID of the transmitting MEP. MEP ID range is 1 to 8191. Optional. Specifies the 802.1 priority bits that are sent in the loopback message. Range is 0 to 7. Optional. Specifies the number of loopback messages to be sent. Range is 1 to 1024. Optional. Specifies the size of the loopback message. Size ranges from 1 to 60 bytes. Optional. Specifies the time that the MEP will wait for a response to the loopback message. Range is 0 to 60 seconds. Optional. Specifies whether or not the transmitting MEP validates the contents of the data TLV in the received loopback messages. Optional. Specifies that the results are in detailed, rather than summary, format. Optional. Specifies a minimum time to wait between sending loopback messages. Valid range is 100 to 60000 milliseconds.
mep <mep id> priority <priority> repeat <number> size <bytes> timeout <timeout> validate-data verbose wait <interval>
Default Values
By default, the count value is set to 5. By default, the data pattern is set to abcd. By default, the drop-eligible value is not set. By default, the interval is set to 1000 milliseconds. By default, the priority value is the priority specified in the MEPs configuration. By default, the size value is set to 2 bytes. By default, the timeout value is set to 2 seconds. By default, the validate-data parameter is disabled.
Command History
Release 17.4 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface and the wait and repeat parameters.
60000CRG0-35B
43
Functional Notes
The ping ethernet command can be issued from both the Basic and Enable modes. If the MEP ID is used as the target, the remote MEP must exist in the MEP continuity check message (CCM) database (meaning the remote MEP is transmitting valid CCMs) so that the MEP ID can be translated to the MAC address before the loopback message is transmitted. Both the domain <domain name> and association <association name> parameters are not required if the source MEP ID of the MEP is specified and unique through the AOS device. If the domain and association of the transmitting MEP are specified, and there is only one MEP in that domain or association, or if there is only one MEP configured on the unit, the mep <mep id> parameter is not required. For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
This command will not appear in the command line interface (CLI) unless Ethernet OAM CFM is enabled. To enable Ethernet OAM CFM, refer to the command ethernet cfm on page 879. Usage Examples
The following example initiates the Ethernet ping utility from an MEP in Domain1 association MA1 with a destination to an MEP with an MEP ID of 201: >ping ethernet 201 domain Domain1 association MA1 Type CTRL+C to abort. Legend: ! = Success, * = Request timed out, d = Data Mismatch o = Out of order, . = No reply, e = Unknown error. Sending 5, 100-byte LBRs to MEP 201 from MEP 1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 202/668/1011 ms
60000CRG0-35B
44
ping ipv6
Use the ping ipv6 command (at the Basic mode prompt) to verify IPv6 network connectivity. For information on how to verify IPv4 network connectivity, refer to ping on page 39. Variations of this command include:
ping ipv6 <ipv6 address> ping ipv6 <ipv6 address> <interface> ping ipv6 <ipv6 address> data <string> ping ipv6 <ipv6 address> destination-option ping ipv6 <ipv6 address> hop-by-hop-option ping ipv6 <ipv6 address> repeat <number> ping ipv6 <ipv6 address> size <value> ping ipv6 <ipv6 address> source <ipv6 address> ping ipv6 <ipv6 address> timeout <value> ping ipv6 <ipv6 address> verbose ping ipv6 <ipv6 address> wait <interval> ping ipv6 vrf <name> <ipv6 address> ping ipv6 vrf <name> <ipv6 address> <interface> ping ipv6 vrf <name> <ipv6 address> data <string> ping ipv6 vrf <name> <ipv6 address> destination-option ping ipv6 vrf <name> <ipv6 address> hop-by-hop-option ping ipv6 vrf <name> <ipv6 address> repeat <interval> ping ipv6 vrf <name> <ipv6 address> size <value> ping ipv6 vrf <name> <ipv6 address> source <ipv6 address> ping ipv6 vrf <name> <ipv6 address> timeout <value> ping ipv6 vrf <name> <ipv6 address> verbose ping ipv6 vrf <name> <ipv6 address> wait <interval>
After specifying the target IPv6 address to ping, the other parameters can be entered in any order. Use the ? after each specified subcommand for a valid list of arguments and settings. Syntax Description
<interface> Specifies the egress interface when pinging an IPv6 link-local address (any address that has the prefix FE80::/64). Interfaces are specified in the <interface type> <slot/port | interface id> format. For example, for an Ethernet interface, use eth 0/1. Type ping ipv6 <ipv6 address> ? to display a list of valid interfaces. This variable is mandatory when pinging a link-local address. This variable is ignored when using a non-link-local address. Specifies the IPv6 address of the system to ping. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. Entering the ping ipv6 command using a link-local destination address prompts the user for an egress interface.
<ipv6 address>
60000CRG0-35B
45
Basic Mode Command Set Optional. Specifies an alphanumerical string to use (the ASCII equivalent) as the data pattern in the ICMPv6 ECHO_REQ packets. Optional. Includes the destination option in the ICMPv6 ECHO_REQ packets. Optional. Includes the hop-by-hop option in the ICMPv6 ECHO_REQ packets. This typically causes intermediate routers to process switch the packets, potentially detecting switching issues in these devices. Optional. Specifies the number of loopback messages to be sent. Range is 1 to 1024. Optional. Specifies the datagram size (in bytes) of the ping packet. Valid range is 1 to 1448 bytes. Optional. Specifies the IPv6 address to use as the source address in the ICMPv6 ECHO_REQ (or interface) packets. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. Entering the ping ipv6 command using a link-local destination address prompts the user for an egress interface. The source IPv6 address must be a valid address local to the router on the specified VPN routing and forwarding (VRF) instance. Optional. Specifies the timeout period after which the ping is considered unsuccessful. Valid range is 1 to 60 seconds. Optional. Enables detailed messaging. Optional. Specifies the VRF where the IPv6 address exists. Optional. Specifies a minimum time to wait between sending test packets. Valid range is 100 to 60000 milliseconds.
Default Values
By default, the data pattern is set to abcd. By default, the repeat is set to 5. By default, the size value is set to 100 bytes. By default, the timeout value is set to 2 seconds. By default, the wait value is set to 100 milliseconds.
Command History
Release 18.1 Command was introduced.
Functional Notes
The ping ipv6 command can be issued from both the Basic and Enable modes. The ping ipv6 command helps diagnose basic IPv6 network connectivity using the Packet Internet Groper program to repeatedly bounce Internet Control Message Protocol version 6 (ICMPv6) ECHO_REQ packets off a system (using a specified IPv6 address). AOS allows executing a standard ping ipv6 request to a specified IPv6 address, or provides keywords to configure a more specific ping ipv6 configuration.
60000CRG0-35B
46
Command Reference Guide The following is a list of output messages from the ping ipv6 command: ! $ x ? * e B Success Destination Host Unreachable Invalid Host Address TTL Expired in Transit Unknown Host Request Timed out Unknown Error Packet too Big
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following is example pings 2001:DB8:1A0::3 with 200 byte ICMPv6 ECHO_REQ packets: >ping ipv6 2001:DB8:1A0::3 size 200 Type CTRL+C to abort. Legend: '!' = Success, '?' = Unknown host, '$' = Invalid host address '*' = Request timed out, '-' = Destination host unreachable 'x' = TTL expired in transit, 'e' = Unknown error 'B' = Packet too big Sending 5, 200-byte ICMP Echos to 2001:DB8:1A0::3, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/2 ms
60000CRG0-35B
47
Syntax Description
<number> vrf <name> Specified which member of the stack to ping. Optional. Specifies the VPN routing and forwarding (VRF) where the stack-member exists.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 16.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
The ping stack-member command can be issued from both the Basic and Enable modes. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example pings a member of the stack: >ping stack-member 3 Type CTRL+C to abort. Legend: '!' = Success, '?' = Unknown host, '$' = Invalid host address '*' = Request timed out, '-' = Destination host unreachable 'x' = TTL expired in transit Sending 5, 100-byte ICMP Echos to 169.254.0.3, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 2/2.2/3 ms #
60000CRG0-35B
48
ping twamp
Use the ping twamp command to execute a Two-Way Active Measurement Protocol (TWAMP) type ping to measure the packet loss, delay, and interpacket delay variation (IPDV) and display the results of the test. Use the subcommands in any combination, in any order, when specifying the destination site. Variations of this command include:
ping twamp ping twamp <ip address | hostname> ping twamp <ip address | hostname> control-port <port> ping twamp <ip address | hostname> data pattern ping twamp <ip address | hostname> data pattern ascii <pattern> ping twamp <ip address | hostname> data pattern hex <pattern> ping twamp <ip address | hostname> data random ping twamp <ip address | hostname> data zero ping twamp <ip address | hostname> dscp <value> ping twamp <ip address | hostname> interval <value> ping twamp <ip address | hostname> port <port> ping twamp <ip address | hostname> repeat <value> ping twamp <ip address | hostname> size <value> ping twamp <ip address | hostname> source <ip address> ping twamp <ip address | hostname> source-port <port> ping twamp <ip address | hostname> timeout <value> ping twamp <ip address | hostname> verbose ping twamp <ip address | hostname> wait <value>
The subcommands can be used in a string of any available combination. Use the ? after each specified subcommand for a valid list of arguments and settings.
Syntax Description
<ip address | hostname> Optional. Specifies the IP address or host name of the system to ping. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Entering the ping twamp command with no specified IP address prompts the user with parameters for a more detailed ping twamp configuration. Optional. Specifies the destination TWAMP control port. Port range is 1 to 65535. Optional. Specifies data used to pad packets. The following options are available: Pads the packet with a user-specified pattern. Pads the packet with a user-specified ascii pattern. Pads the packet with a user-specified hex pattern. Pads the packet with random numbers. ascii <pattern> hex <pattern> random
60000CRG0-35B
49
Command Reference Guide zero dscp <value> interval <value> port <port> repeat <value> size <value> source <ip address> source-port <port> timeout <value> verbose wait <value> Pads the packet with all zeros.
Optional. Specifies the differentiated services code point (DSCP) value. Valid range is 0 to 63. Optional. Specifies the interval between consecutive ping TWAMPs (in milliseconds). Valid range is 5 to 5000. Optional. Specifies the destination port for the TWAMP test packets. Valid range is 1 to 65535. Optional. Specifies the number of ping TWAMP packets. Valid range is 1 to 1000. Optional. Specifies the datagram size. Valid range is 0 to 1462. Optional. Specifies the source IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the source port for the TWAMP test packets. Valid range is 1 to 65535. Optional. Specifies the timeout value in milliseconds. Valid range is 100 to 60000. Optional. Displays the detailed two-way ping verbose results for the specified IP address or host name. Optional. Specifies the interval (in milliseconds) between consecutive TWAMP test packets. Range is 5 to 5000.
Default Values
By default, the data is zero, the dscp is 0, the interval value is 20, the port value is 0, the repeat value is 100, the size is 0, and the timeout is 2000 milliseconds.
Command History
Release 17.4 Release 17.6 Release A4.01 Command was introduced to replace the twping command. Command was expanded to include control-port and wait keywords. Command was expanded to include the ascii and hex pattern parameters.
Functional Notes
The ping twamp command can be issued from both the Basic and Enable modes.
Usage Examples
The following example executes a TWAMP ping: >ping twamp 2009.06.03 11:18:24 IP.TWPING CTRL EVNT Attempting to connect 2009.06.03 11:18:24 IP.TWPING CTRL EVNT State changed Init -> Opening (event=Open Connection) 2009.06.03 11:18:24 IP.TWPING CTRL EVNT State changed Opening -> Setup (event=RX Server-Greeting) 2009.06.03 11:18:24 IP.TWPING CTRL EVNT State changed Setup -> Starting (event=TX
60000CRG0-35B
50
Setup-Response) 2009.06.03 11:18:24 IP.TWPING CTRL PKT Sending Setup-Response (len=140) mode=1 keyId=00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 --MORE--
60000CRG0-35B
51
show clock
Use the show clock command to display the system time and date entered using the clock set command. Refer to clock set <time> <day> <month> <year> on page 169 for more information. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example displays the current time and data from the system clock: >show clock 23:35:07 UTC Tue Aug 20 2002
60000CRG0-35B
52
show snmp
Use the show snmp command to display the system Simple Network Management Protocol (SNMP) parameters and current status of SNMP communications. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following is an example output using the show snmp command for a system with SNMP disabled and the default chassis and contact parameters: >show snmp Chassis: Chassis ID Contact: Customer Service 0 Rx SNMP packets 0 Bad community names 0 Bad community uses 0 Bad versions 0 Silent drops 0 Proxy drops 0 ASN parse errors
60000CRG0-35B
53
show version
Use the show version command to display the current AOS version information. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following is a sample show version output: >show version AOS version 06.01.00 Checksum: 1F0D5243 built on Fri Nov 08 13:12:06 2002 Upgrade key: de76efcfeb4c8eeb6901188475dd0917 Boot ROM version 03.00.18 Checksum: 7A3D built on: Fri Nov 08 13:12:25 2002 Copyright (c) 1999-2002 ADTRAN Inc. Serial number C14C6308 UNIT_2 uptime is 0 days 4 hours 59 minutes 43 seconds System returned to ROM by Warm Start Current system image file is "030018adv.biz" Boot system image file is 030018adv.biz
60000CRG0-35B
54
Syntax Description
<ip address | hostname> port <tcp port> vrf <name> Specifies the IP address or host name of the remote system. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the Transmission Control Protocol (TCP) port number to be used when connecting to a host through Telnet. Range is 1 to 65535. Optional. Specifies the VPN routing and forwarding (VRF) where the IP address or host name exists.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 14.1 Release 16.1 Command was introduced. Command was expanded to specify the port number. Command was expanded to include the vrf parameter.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example opens a Telnet session with a remote system (10.200.4.15): >telnet 10.200.4.15 User Access Login: Password:
60000CRG0-35B
55
The following example opens a Telnet session with a remote system (10.200.4.15) on port 8010: >telnet 10.200.4.15 port 8010 User Access Login: Password:
60000CRG0-35B
56
traceroute
Use the traceroute command to display the IPv4 routes a packet takes to reach the specified destination. Variations of this command include:
traceroute traceroute <ip address | hostname> traceroute <ip address | hostname> source <ip address> traceroute vrf <name> <ip address | hostname> traceroute vrf <name> <ip address | hostname> source <ip address>
Syntax Description
<ip address | hostname> source <ip address> Optional. Specifies the IPv4 address or host name of the remote systems route to trace Optional. Specifies the IPv4 address of the interface to use as the source of the trace. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the VPN routing and forwarding (VRF) where the route exists.
vrf <name>
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 16.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
The traceroute command can be issued from both the Basic and Enable modes. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following is a sample traceroute output: >traceroute 192.168.0.1 Type CTRL+C to abort. Tracing route to 192.168.0.1 over a maximum of 30 hops 1 22ms 20ms 20ms 192.168.0.65 2 23ms 20ms 20ms 192.168.0.1 #
60000CRG0-35B
57
traceroute ethernet
Use the traceroute ethernet command to initiate a linktrace message from one Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) maintenance endpoint (MEP) to another MEP. These linktrace messages are used to trace the packet route to a destination MEP. Variations of this command include:
traceroute ethernet <target-mac-address | target-mep-id> traceroute ethernet <target-mac-address | target-mep-id> domain <domain name> association <association name> traceroute ethernet <target-mac-address | target-mep-id> domain none association <association name> traceroute ethernet <target-mac-address | target-mep-id> fdb-only traceroute ethernet <target-mac-address | target-mep-id> interface <interface> traceroute ethernet <target-mac-address | target-mep-id> mep <mep id> traceroute ethernet <target-mac-address | target-mep-id> sorted traceroute ethernet <target-mac-address | target-mep-id> timeout <timeout> traceroute ethernet <target-mac-address | target-mep-id> ttl <value>
After specifying the target for the linktrace messages, the other parameters can be entered in any order.
Syntax Description
<target-mac-address | target-mep-id> Specifies the destination for the linktrace message. Medium access control (MAC) addresses are entered in the format HH:HH:HH:HH:HH:HH. Target MEP IDs are the unique numerical values identifying MEPs. MEP IDs range from 1 to 8191. Optional. Specifies the maintenance domain to which the transmitting MEP belongs. Optional. Specifies no maintenance domain. Optional. Specifies the maintenance association to which the transmitting MEP belongs. Optional. Specifies that the maintenance points on the route only use their forwarding database, and not their continuity check message (CCM) database when deciding if/how to forward linktrace messages. Optional. Specifies the interface on which the transmitting MEP is configured. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1. For a list of appropriate interfaces, enter interface ? at the prompt.
interface <interface>
60000CRG0-35B
58
Basic Mode Command Set Optional. Specifies the MEP ID of the transmitting MEP. MEP ID range is 1 to 8191. Optional. Specifies the traceroute utility waits until all traceroute results have been received and sorted by hop count before displaying them. Optional. Specifies the time that the MEP will wait for a response to the linktrace message. Range is 0 to 60 seconds. Optional. Specifies the time to live (TTL) field of the linktrace message. Range is 0 to 255.
Default Values
By default, the timeout value is set to 5 seconds. By default, the ttl value is set to 5 seconds.
Command History
Release 17.4 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface and the Gigabit Switchport interface.
Functional Notes
The traceroute ethernet command can be issued from both the Basic and Enable modes. If the MEP ID is used as the target, the remote MEP must exist in the MEP CCM database (meaning the remote MEP is transmitting valid CCMs) so that the MEP ID can be translated to the MAC address before the linktrace message is transmitted. Both the domain <domain name> and association <association name> parameters are not required if the source MEP ID of the MEP is specified and unique through the AOS device. If the domain and association of the transmitting MEP are specified, and there is only one MEP in that domain or association, or if there is only one MEP configured on the unit, the mep <mep id> parameter is not required. For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
60000CRG0-35B
59
Usage Examples
The following example initiates the Ethernet traceroute utility from a MEP with the ID 1 to an MEP with an MEP ID of 201: >traceroute ethernet 201 mep 1 Type CTRL+C to abort. TTL 255. LTM Timeout is 5 seconds Tracing route to MEPID 201 (00:10:94:00:00:06) from MEPID 1 in Domain_1/MA_1 MD Level 7, vlan 0 Traceroute sent via interface eth 0/1 -------------------------------------------------------------------------------------------------------------------------------------------Hops Mac Flags Ingress-Action Relay Action PrevHop Egress-Action -------------------------------------------------------------------------------------------------------------------------------------------1 00:10:94:00:00:00 Forwarded InNoTLV RLY_MPDB 00:A0:C8:16:96:0D EgOK 3 00:10:94:00:00:05 Forwarded InNoTLV RLY_MPDB 00:10:94:00:00:04 EgOK 2 00:10:94:00:00:04 Forwarded InNoTLV RLY_MPDB 00:10:94:00:00:00 EgOK 4 00:10:94:00:00:06 (Eg) Terminal InNoTLV RLY_HIT 00:10:94:00:00:05 Destination reached
Remember that linktrace can be a tree-structure, and is not always linear. The PrevHop for Hop 3 in the previous example tells you the MAC of Hop 2. This gives you a way to trace the linktrace message when a tree-structure exists. Refer to Section J.5 of IEEE 802.1ag for more information.
60000CRG0-35B
60
traceroute ipv6
Use the traceroute ipv6 command to display the IPv6 nodes traversed to reach the specified destination. Variations of this command include:
traceroute ipv6 <ipv6 address> traceroute ipv6 <ipv6 address> <interface> traceroute ipv6 <ipv6 address> <interface> source <ipv6 address> traceroute ipv6 <ipv6 address> source <ipv6 address> traceroute ipv6 vrf <name> <ipv6 address> traceroute ipv6 vrf <name> <ipv6 address> <interface> traceroute ipv6 vrf <name> <ipv6 address> <interface> source <ipv6 address> traceroute ipv6 vrf <name> <ipv6 address> source <ipv6 address>
Syntax Description
<interface> Optional. Specifies the egress interface when tracing a route to an IPv6 link-local address (any address that has the prefix FE80::/64). Interfaces are specified in the <interface type> <slot/port | interface id> format. For example, for an Ethernet interface, use eth 0/1. Type traceroute ipv6 <ipv6 address> ? to display a list of valid interfaces. This variable is ignored when using a non-link-local address. Specifies the IPv6 address of the remote systems route to trace. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. Entering the traceroute ipv6 command using a link-local destination address prompts the user for an egress interface. Optional. Specifies the IPv6 address to use as the source address in the probing packets. The source IPv6 address must be a valid address local to the router on the specified VPN routing and forwarding (VRF) instance. Optional. Specifies the VRF where the IPv6 address exists.
<ipv6 address>
vrf <name>
Default Values
No default values are necessary for this command.
Command History
Release 18.1 Command was introduced.
Functional Notes
The traceroute ipv6 command can be issued from both the Basic and Enable modes. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS platforms supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
60000CRG0-35B
61
Usage Examples
The following is a sample traceroute ipv6 output: >traceroute ipv6 2001:DB8:1A0::3 Tracing route to over a maximum of 30 hops Type CTRL+C to abort. Legend: '!' = Success, '?' = Unknown host, '$' = Invalid host address '*' = Request timed out, '-' = Destination host unreachable 'x' = TTL expired in transit, 'e' = Unknown error 'B' = Packet too big 1 2ms 2ms 3ms 2001:DB8:0:F820::5 2 102ms 109ms 102ms 2001:DB8:1A0::3
60000CRG0-35B
62
Common Commands
COMMON COMMANDS
The following section contains descriptions of commands that are common across multiple command sets. These commands are listed in alphabetical order. alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80
60000CRG0-35B
63
Common Commands
alias <text>
Use the alias command to populate the ifAlias object identifier (OID) (Interface Table MIB of RFC 2863) for all physical and virtual interfaces when using Simple Network Management Protocol (SNMP) management stations. Use the no form of this command to remove an alias. Syntax Description
<text> Describes the interface (for SNMP) using an alphanumeric character string enclosed in quotation marks (limited to 64 characters).
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Functional Notes
The ifAlias OID is a member of the ifXEntry object-type (defined in RFC 2863) used to provide a nonvolatile, unique name for various interfaces. This name is preserved through power cycles. Enter a string (using the alias command) which clearly identifies the interface.
Usage Examples
The following example defines a unique character string for the T1 interface: (config)#interface t1 1/1 (config-t1 1/1)#alias CIRCUIT_ID_23-908-8887-401
Technology Review
Please refer to RFC 2863 for more detailed information on the ifAlias display string.
60000CRG0-35B
64
Common Commands
cross-connect
Use the cross-connect command to create a cross-connection between a created time division multiplexing (TDM) group on an interface to a virtual interface, or to create a cross-connection between a Point-to-Point Protocol (PPP) interface and a Frame Relay interface for use with PPP over Frame Relay (PPPoFR). Variations of this command include:
cross-connect <number> <from interface> <to interface> cross-connect <number> <from interface> <group number> <to interface>
Syntax Description
<number> <from interface> Identifies the cross connection using a number descriptor or label (useful in systems that allow multiple cross connections). Valid range is 1 to 1024. Specifies the interface (physical or virtual) on one end of the cross connection. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; and for an ATM subinterface, use atm 1.1. Enter cross-connect 1 ? for a list of valid interfaces. Optional. Specifies which configured TDM group to use for this cross connection. This subcommand only applies to T1 physical interfaces. Specifies the virtual interface on the other end of the cross connection. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; and for an ATM subinterface, use atm 1.1. Use the ? to display a list of valid interfaces.
Default Values
By default, there are no configured cross connections.
Command History
Release 1.1 Release 5.1 Release 17.7 Release A4.01 Command was introduced. Command was expanded to include the E1 interface. Command was expanded to include its use with the PPPoFR feature. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
60000CRG0-35B
65
Common Commands
Functional Notes
Cross connections provide the mechanism for connecting a configured virtual (Layer 2) endpoint with a physical (Layer 1) interface. Supported Layer 2 protocols include Frame Relay and PPP. This command can be used both to connect the Frame Relay interface with a TDM group on a T1 circuit and to connect a PPP interface to a Frame Relay interface for use with PPPoFR encapsulation. When using the cross-connect command to connect a Frame Relay endpoint to a T1 interface, the command is issued from the Frame Relay Interface Configuration mode or from the Global Configuration mode. When using the cross-connect command to link a PPP interface to a Frame Relay interface in PPPoFR, the command is issued from the PPP Interface Configuration mode.
Usage Examples
The following example creates a Frame Relay endpoint and connects it to the T1 1/1 physical interface: 1. Create the Frame Relay virtual endpoint and set the signaling method: (config)#interface frame-relay 1 (config-fr 1)#frame-relay lmi-type cisco 2. Create the subinterface and configure the PVC parameters (including DLCI and IP address): (config-fr 1)#interface fr 1.1 (config-fr 1.1)#frame-relay interface-dlci 17 (config-fr 1.1)#ip address 168.125.33.252 255.255.255.252 3. Create the TDM group of 12 DS0s (64K) on the T1 physical interface: (THIS STEP IS ONLY VALID FOR T1 INTERFACES.) (config)#interface t1 1/1 (config-t1 1/1)#tdm-group 1 timeslots 1-12 speed 64 (config-t1 1/1)#exit 4. Connect the Frame Relay subinterface with port T1 1/1: (config)#cross-connect 1 t1 1/1 1 fr 1 The following example creates a PPP interface and connects it to the Frame Relay interface for use with PPPoFR. The Frame Relay interface in this example is based on the interface configured in the previous example. 1. Create the PPP interface and enter its configuration mode: (config)#interface ppp 1 (config-ppp 1)# 2. Configure the PPP interface (including IP address and PPP authentication information): (config-ppp 1)#ip address 65.162.109.202 255.255.255.252 (config-ppp 1)#ppp authentication chap (config-ppp 1)#ppp chap hostname USERNAME (config-ppp 1)#ppp chap password PASSWORD (config-ppp 1)#no shutdown 3. Connect the PPP interface with the Frame Relay interface: (config-ppp 1)#cross-connect 2 fr 1.1 ppp 1
60000CRG0-35B
66
Common Commands
Technology Review
Creating an endpoint that uses a Layer 2 protocol (such as Frame Relay) is generally a four-step process: Step 1: Create the Frame Relay virtual endpoint (using the interface frame-relay command) and set the signaling method (using the frame-relay lmi-type command). Also included in the Frame Relay virtual endpoint are all the applicable Frame Relay timers logging thresholds, encapsulation types, etc. Generally, most Frame Relay virtual interface parameters should be left at their default state. For example, the following creates a Frame Relay interface labeled 7 and sets the signaling method to ansi. (config)#interface frame-relay 7 (config-fr 7)#frame-relay lmi-type ansi Step 2: Create the subinterface and configure the permanent virtual circuit (PVC) parameters. Using the subinterface, apply access policies to the interface, create bridging interfaces, configure dial-backup, assign an IP address, and set the PVC data link connection identifier (DLCI). For example, the following creates a Frame Relay subinterface labeled 22, sets the DLCI to 30, and assigns an IP address of 193.44.69.253 to the interface. (config-fr 7)#interface fr 7.22 (config-fr 7.22)#frame-relay interface-dlci 30 (config-fr 7.22)#ip address 193.44.69.253 255.255.255.252 Step 3: (VALID ONLY FOR T1 INTERFACES) Specify the group of DS0s used for signaling on the T1 interface by creating a TDM group. Group any number of contiguous DS0s together to create a data pipe for Layer 2 signaling. Also use the tdm-group command to specify the per-DS0 signaling rate on the interface. For example, the following creates a TDM group labeled 9 containing 20 DS0s (each DS0 having a data rate of 56 kbps). (config)#interface t1 1/1 (config-t1 1/1)#tdm-group 9 timeslots 1-20 speed 56 (config-t1 1/1)#exit Step 4: Make the association between the Layer 2 endpoint and the physical interface using the cross-connect command. Supported Layer 2 protocols include Frame Relay and Point-to-Point Protocol (PPP). For example, the following creates a cross-connect (labeled 5) to make an association between the Frame Relay virtual interface (fr 7) and the TDM group configured on interface t1 1/1 (tdm-group 9). (config)#cross-connect 5 t1 1/1 9 fr 7 The cross-connect command is also used by the PPP interface when using PPPoFR. PPPoFR can be used with a single T1 circuit, when using Multilink PPP, or when using Multilink Frame Relay. Configuration considerations vary according to the type of PPPoFR being used. For more information regarding PPPoFR, refer to the PPPoFR Configuration Guide (article number 3114) available online at http://kb.adtran.com.
60000CRG0-35B
67
Common Commands
description <text>
Use the description command to identify the specified interface (for example, circuit ID, contact information, etc.). Use the no form of this command to remove a description. Syntax Description
<text> Identifies the specified interface using up to 80 alphanumeric characters.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example enters comment information using the description command: (config)#interface t1 1/1 (config-t1 1/1)#description This is the Dallas office T1
60000CRG0-35B
68
Common Commands
do
Use the do command to execute any AOS command, regardless of the active configuration mode. It provides a way to execute commands in other modes without taking the time to exit the current mode and enter the desired one. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 2.1 Command was introduced.
Functional Notes
Use the do command to view configurations or interface states after configuration changes are made without exiting to the Enable mode.
Usage Examples
The following example shows the do command used to view the Frame Relay interface configuration while currently in the T1 Interface Configuration mode: (config)#interface t1 1/1 (config-t1 1/1)#do show interfaces fr 7 fr 7 is ACTIVE Signaling type is ANSI signaling role is USER Polling interval is 10 seconds full inquiry interval is 6 polling intervals Output queue: 0/0 (highest/drops) 0 packets input 0 bytes 0 pkts discarded 0 error pkts 0 unknown protocol pkts 0 packets output 0 bytes 0 tx pkts discarded 0 tx error pkts
60000CRG0-35B
69
Common Commands
end
Use the end command to exit the current configuration mode and enter the Enable Security mode. When exiting the Global Configuration mode, remember to perform a copy running-config startup-config to save all configuration changes.
Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example shows the end command being executed in the T1 Interface Configuration mode: (config-t1 1/1)#end # #- Enable Security mode command prompt
60000CRG0-35B
70
Common Commands
exit
Use the exit command to exit the current configuration mode and enter the previous one. For example, using the exit command in an interface configuration mode will activate the Global Configuration mode. When using the exit command in the Basic mode, the current session will be terminated. When exiting the Global Configuration mode, remember to perform a copy running-config startup-config to save all configuration changes.
Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example shows the exit command being executed in the Global Configuration mode: (config)#exit # #- Enable Security mode command prompt
60000CRG0-35B
71
Common Commands
interface
Use the interface command to activate the interface command set for the specified physical or virtual interface on an AOS unit. The following interfaces are considered physical interfaces and are available for configuration based upon the hardware installed (ADSL, basic rate interface (BRI), digital data service (DDS), digital signal level 1 cross connect (DSX-1), E1, Ethernet, facility data link (FDL), foreign exchange office (FXO), foreign exchange station (FXS), G.703, high speed serial interface (HSSI), modem, primary rate interface (PRI), serial, single-pair high-speed digital subscriber line (SHDSL), T1, and T3). The following interfaces are considered virtual interfaces and are available for configuration depending on the type of unit and the features enabled (ATM, BVI, demand, Frame Relay, HDLC, loopback, port channel, PPP, tunnel, and VLAN). This command can be issued from the Global Configuration mode prompt or from any configuration mode to navigate to an interface configuration mode without issuing the exit command. The interface command is also used to create virtual interfaces (this only applies to ATM, demand, Frame Relay, HDLC, loopback, port channel, PPP, tunnel, and VLAN interfaces) prior to entering the configuration command set. Type interface ? for a complete list of valid interface types on the unit. Refer to the command interface range <interface type> <slot/port> - <slot/port> on page 896 for more information. Use the no form of this command to delete a configured interface. Variations of this command include:
interface adsl <slot/port> interface atm <port | port.sublink> interface bri <slot/port> interface bvi <interface id> interface cellular <slot/port> interface dds <slot/port> interface demand <interface id> interface dot11ap <ap | ap/radio | ap/radio.vap> [ap-type <interface type> | radio-type <802.11a | 802.11bg>] interface e1 <slot/port> interface ethernet <slot/port> interface fdl <slot/port> interface frame-relay <port | port.sublink> interface fxo <slot/port> interface fxs <slot/port> interface gigabit-ethernet <slot/port> interface hdlc <interface id> interface hssi <slot/port> interface loopback <interface id> interface mef-ethernet <slot/port | slot/port.subinterface> interface modem <slot/port> interface port-channel <interface id> interface ppp <interface id> interface pri <slot/port> interface serial <slot/port> interface shdsl <slot/port>
60000CRG0-35B
72
Command Reference Guide interface switchport <slot/port> interface t1 <slot/port> interface t3 <slot/port> interface tunnel <interface id> interface vlan <interface id>
Common Commands
Syntax Description
adsl <slot/port> Identifies asymmetric digital subscriber line (ADSL) interfaces. Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface adsl ? for information regarding valid ranges. Specifies the wireless access point (AP) type. Valid interface type is nv150. Identifies and creates asynchronous transfer mode (ATM) virtual interfaces or subinterfaces. Port number range is 1 to 1024. Sublink number range is 1 to 65535. Identifies basic rate interfaces (BRIs). Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface bri ? for information regarding valid ranges. Identifies bridged virtual interfaces (BVIs). This ID must correspond to an existing bridge group. Valid range is 1 to 255. Identifies cellular interfaces. Slot numbers are either 0 or 1. Port numbers begin at 1 with a range dependent on the unit. Identifies digital data service (DDS) interfaces. Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface dds ? for information regarding valid ranges. Identifies and creates demand routing interfaces. Valid range is 1 to 1024.
bri <slot/port>
dot11ap <ap | ap/radio | ap/radio.vap> Identifies wireless access point, radio, and/or virtual access point (VAP) interfaces. The AP number range is 1 to 8. The radio is either 1 or 2. The VAP number range is 1 to 8. e1 <slot/port> Identifies E1 interfaces. Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface e1 ? for information regarding valid ranges. Identifies Ethernet interfaces. Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface ethernet ? for information regarding valid ranges. Identifies facility data link (FDL) interfaces. Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface fdl ? for information regarding valid ranges. Identifies and creates Frame Relay interfaces. Port number range is 1 to 1024. Sublink range is 1 to 1007.
ethernet <slot/port>
fdl <slot/port>
60000CRG0-35B
73
Common Commands Identifies foreign exchange office (FXO) interfaces. Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface fxo ? for information regarding valid ranges. Identifies foreign exchange station (FXS) interfaces. Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface fxs ? for information regarding valid ranges. Identifies gigabit Ethernet interfaces. Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface gigabit-ethernet ? for information regarding valid ranges. Identifies and creates high level data link control (HDLC) interfaces. Valid range is 1 to 1024. Identifies high speed serial interfaces (HSSIs). Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface hssi ? for information regarding valid ranges. Identifies and creates loopback interfaces. Valid range is 1 to 1024. Identifies Metro Ethernet Forum (MEF) Metro Ethernet interfaces. Slot and port number ranges are dependent upon the hardware installed in the unit. Identifies analog modem interfaces. Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface modem ? for information regarding valid ranges. Creates and configures link aggregation interfaces. Valid range is 1 to 6. Identifies and creates Point-to-Point Protocol (PPP) interfaces. Valid range is 1 to 1024. Identifies primary rate interfaces (PRIs). Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface pri ? for information regarding valid ranges. Specifies the radio interface type. Valid interface types are 802.11a and 802.11bg. Identifies serial ports. Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface serial ? for information regarding valid ranges. Identifies single-pair high-speed digital subscriber lline (SHDSL) interfaces. Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface shdsl ? for information regarding valid ranges. Identifies switchport interfaces. Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface switchport ? for information regarding valid ranges.
fxs <slot/port>
gigabit-ethernet <slot/port>
modem <slot/port>
shdsl <slot/port>
switchport <slot/port>
60000CRG0-35B
74
Common Commands Identifies T1 interfaces. Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface t1 ? for information regarding valid ranges. Identifies T3 interfaces. Slot and port number ranges are dependent upon the hardware installed in the unit. Type interface t3 ? for information regarding valid ranges. Identifies and creates generic routing encapsulation (GRE) tunnel interfaces. Valid range is 1 to 1024. Identifies and creates virtual local area network (VLAN) interfaces. Valid range is 1 to 4094.
t3 <slot/port>
Default Values
By default, an interface is inactive. To activate the interface, enter the no shutdown command from within the specific interface command set; for example, (config-ppp 7)#no shutdown. There are no default values for these commands.
Command History
Release 1.1 Release 3.1 Release 8.1 Release 9.1 Release 11.1 Release 15.1 Command was introduced. Command was expanded to include the loopback interface. Command was expanded to include the asynchronous transfer mode (ATM) interface. Command was expanded to include the high level data link control (HDLC) interface. Command was expanded to include demand, foreign exchange office (FXO), and primary rate interface (PRI) interfaces. Command was expanded to allow navigation from one interface to another without exiting the current configuration mode. Also, expanded to include access point (AP), radio, virtual access point (VAP), and bridged virtual interface (BVI) interfaces. Command was expanded to include cellular interface. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface. Command was expanded to include the ap-type and radio-type parameters.
Functional Notes
When identifying a physical interface slot and port, keep the following in mind: Built-in nonremovable interfaces are identified by slot 0. Removable interfaces are identified by the physical labels on the slots. Interfaces are numbered per slot, from left to right, starting with 1.
60000CRG0-35B
75
Common Commands
Usage Examples
The following example uses the interface command to navigate from the T1 Interface Configuration mode to a Frame Relay interface: (config)#interface t1 1/1 (config-t1 1/1)#interface fr 7 (config-fr 7)# The following examples activate the interface configuration mode for the specified interface type: For an ADSL interface: (config)#interface adsl 1/1 (config-adsl 1/1)# For an ATM subinterface: (config)#interface atm 1.1 (config-atm 1.1)# For a BRI interface: (config)#interface bri 1/2 (config-bri 1/2)# For a BVI interface: (config)#bridge irb (config)#interface bvi 1 (config-bvi 1)# For a cellular interface: (config)#interface cellular 1/1 (config-cellular 1/1)# For a DDS interface: (config)#interface dds 1/1 (config-dds 1/1)# For a demand interface: (config)#interface demand 1 (config-demand 1)# For an E1 interface: (config)#interface e1 1 (config-e1 1)#
60000CRG0-35B
76
Command Reference Guide For an Ethernet interface: (config)#interface ethernet 0/1 (config-eth 0/1)# For an Ethernet subinterface: (config)#interface eth 0/1.1 (config-eth 0/1.1)# For an FDL interface: (config)#interface fdl 1/1 (config-fdl 1/1)# For a Frame Relay subinterface: (config)#interface frame-relay 1.16 (config-fr 1.16)# For an FXO interface: (config)#interface fxo 0/1 (config-fxo 0/1)# For an FXS interface: (config)#interface fxs 2/1 (config-fxs 2/1)# For a Gigabit Ethernet interface: (config)#interface gigabit-ethernet 0/3 (config-giga-eth 0/3)# For an HDLC interface: (config)#interface hdlc 1 (config-hdlc 1)# For an HSSI interface: (config)#interface hssi 1/1 (config-hssi 1/1)# For a loopback interface: (config)#interface loopback 8 (config-loop 8)# For an MEF Ethernet interface: (config)#interface mef-ethernet 2/1 (config-mef-ethernet 2/1)#
Common Commands
60000CRG0-35B
77
Command Reference Guide For a modem interface: (config)#interface modem 1/1 (config-modem 1/1)# For a port channel interface: (config)#interface port-channel 6 Creating Port Channel interface 6. (config-p-chan6)# For a PPP interface: (config)#interface ppp 100 (config-ppp 100)# For a PRI interface: (config)#interface pri 2 (config-pri 2)# For a serial interface: (config)#interface serial 1/1 (config-serial 1/1)# For an SHDSL interface: (config)#interface shdsl 1/1 (config-shdsl 1/1)# For a switchport interface: (config)#interface switchport 0/2 (config-swx 0/2)# For a T1 interface: (config)#interface t1 1/1 (config-t1 1/1)# For a T3 interface: (config)#interface t3 1/1 (config-t3 1/1)# For a tunnel interface: (config)#interface tunnel 300 (config-tunnel 300)#
Common Commands
60000CRG0-35B
78
Command Reference Guide For a VLAN interface: (config)#interface vlan 300 (config-vlan 300)# For a wireless access point: (config)#interface dot11ap 1/1.1 (config-dot11ap 1/1.1-bg)#
Common Commands
60000CRG0-35B
79
Common Commands
shutdown
Use the shutdown command to disable the interface (both physical and virtual) so that no data will be passed through. Use the no form of this command to turn on the interface and allow it to pass data. By default, all interfaces are disabled. Syntax Description
No subcommands.
Default Values
By default, all interfaces are disabled.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example administratively disables the modem interface: (config)#interface modem 1/2 (config-modem 1/2)#shutdown
60000CRG0-35B
80
In AOS Release 17.1, output modifiers were introduced for all show commands. These modifiers help specify the information displayed in the show command output. The modifiers are appended to the end of the show command, preceded by the pipe character (|), and followed by the <text> to exclude, include, or with which to begin the display. The following output modifiers are common for all show commands:
| begin <text> | exclude <text> | include <text>
Produces output that begins with lines, including the specified text and every line thereafter. Produces output that excludes any lines containing the specified text. Produces output that only displays lines with the specified text.
In the following example, the show command was modified to begin its display with the lines ip http server and display all lines thereafter:
#show run | begin ip http server no ip http server no ip http secure-server no ip snmp agent no ip ftp server ip ftp server default-filesystem flash no ip scp server no ip sntp server !
In the following example, the exclude modifier was used with the show command to exclude lines of text containing the words no shutdown:
#show run interface ppp 1 | exclude no shutdown ! ! interface ppp 1 ip address 10.2.0.1 255.255.255.0 access-policy UNTRUSTED crypto map SITE2SITE no lldp send-and-receive cross-connect 1 t1 1/1 1 ppp 1 !
60000CRG0-35B
81
In the following example, the include modifier was used with the show command to only display information about interfaces:
#show run | include interface interface switchport 0/1 interface switchport 0/2 interface switchport 0/3 interface switchport 0/4 interface switchport 0/5 interface switchport 0/6 interface switchport 0/7 --MORE--
The following command is common to multiple command sets and is covered in a centralized section of this guide. For more information, refer to the section listed below: exit on page 71 All other commands for this command set are described in this section in alphabetical order. clear commands begin on page 84 clock auto-correct-dst on page 167 clock no-auto-correct-dst on page 168 clock set <time> <day> <month> <year> on page 169 clock timezone <value> on page 170 configure on page 173 copy on page 174 copy cflash on page 176 copy console on page 179 copy dynvoice-config on page 180 copy flash on page 183 copy http on page 186 copy https on page 188 copy ramdisk on page 190 copy running-config on page 193 copy startup-config on page 196 copy tftp on page 199 copy xmodem on page 201 debug commands begin on page 203 dir on page 356 disable on page 358 erase on page 359 events on page 361
60000CRG0-35B
82
exception report generate on page 362 factory-default on page 363 logout on page 364 ping on page 365 ping ethernet on page 368 ping ipv6 on page 371 ping stack-member <number> on page 374 ping twamp on page 375 ramdisk <size> on page 378 reload on page 379 reload dot11 interface dot11ap <ap interface> on page 380 run audit security on page 381 run checkdisk cflash on page 384 run-tcl <filename> track <name> on page 385 show commands begin on page 386 sip check-sync on page 776 telnet on page 777 telnet stack-member <unit id> on page 779 telnet vrf <name> stack-member <number> on page 780 terminal length <number> on page 781 traceroute on page 782 traceroute ethernet on page 783 traceroute ipv6 on page 786 undebug all on page 788 verify-file on page 789 vlan database on page 790 voice dsp capture on page 791 voice loopback-call on page 792 wall <message> on page 793 write on page 794
60000CRG0-35B
83
clear arp-cache
Use the clear arp-cache command to remove all dynamic entries from the Address Resolution Protocol (ARP) cache table. Variations of this command include:
clear arp-cache clear arp-cache vrf <name>
Syntax Description
vrf <name> Optional. Clears the ARP cache entry for a specific VPN routing and forwarding (VRF).
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release A1 Command was introduced. Command was expanded to include the vrf parameter.
Usage Examples
The following example removes all dynamic entries from the ARP cache: >enable #clear arp-cache
60000CRG0-35B
84
Syntax Description
<ip address> vrf <name> Specifies a valid IP address to remove. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Clears the ARP entry for a specific VPN routing and forwarding (VRF).
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release A1 Command was introduced. Command was expanded to include the vrf parameter.
Usage Examples
The following example removes the entry for 10.10.10.1 from the ARP cache: >enable #clear arp-entry 10.10.10.1
60000CRG0-35B
85
Syntax Description
<number> Optional. Specifies a single bridge group. Range is 1 to 255.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example clears all counters for bridge group 17: >enable #clear bridge 17
60000CRG0-35B
86
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example clears the maximum-used buffer statics: >enable #clear buffers max-used
60000CRG0-35B
87
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 9.1 Release A4.01 Command was introduced. Command was expanded to include the high level data link control (HDLC) and tunnel interfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface and the Gigabit Switchport interface.
Usage Examples
The following example clears all counters associated with the Ethernet 0/1 interface: >enable #clear counters ethernet 0/1
60000CRG0-35B
88
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example clears the counters for the EFM group 1: >enable #clear counters efm-group 1
60000CRG0-35B
89
Syntax Description
domain <domain name> domain none Optional. Specifies that only statistics for MEPs in the named domain are cleared. Optional. Specifies that no domain is named and all MEP statistics, regardless of domain, are cleared.
association <association name> Optional. Specifies that only statistics for MEPs in the named association are cleared. interface <interface> Optional. Specifies that only statistics for MEPs configured on the specified interface are cleared. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1. For a list of appropriate interface, enter interface ? at the prompt. Optional. Specifies that only statistics for MEPs within the specified maintenance domain level are cleared. Level range is 0 to 7. Optional. Specifies that only statistics for MEPs with the specified MEP ID are cleared. MEP ID range is 1 to 8191.
Default Values
No default values necessary for this command.
Command History
Release 17.4 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
60000CRG0-35B
90
Usage Examples
The following example clears all statistics associated with Ethernet OAM CFM MEPs: >enable #clear counters ethernet cfm The following example clears all statistics associated with MEPs on maintenance domain level 5: >enable #clear counters ethernet cfm level 5
60000CRG0-35B
91
Syntax Description
channel <value> dtmf Optional. Specifies the ID of a particular media-gateway channel to be reset (for example, 0/1.1). Optional. Specifies that dual tone multi-frequency (DTMF) counters are reset.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release A2 Command was introduced. Command was expanded to include the dtmf parameter.
Usage Examples
The following example resets the counters on media gateway channel 0/1.1: >enable #clear counters media-gateway channel 0/1.1 Counters on media-gateway channel reset by console.
60000CRG0-35B
92
Syntax Description
<name> Specifies a probe object to reset counter.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example resets the counters for all configured probes: >enable #clear counters probe The following example resets the counters only for the probe named probe_A: >enable #clear counters probe probe_A
60000CRG0-35B
93
Default Values
No default values are necessary for this command.
Command History
Release A4.05 Command was introduced.
Usage Examples
The following example clears all bad splice detection test data associated with the SHDSL 1/1 interface: >enable #clear counters shdsl 1/1 splice-detect
60000CRG0-35B
94
Syntax Description
<name> Specifies a track object to reset counter.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example resets the counters for all configured tracks: >enable #clear counters track The following example resets the counters only for the track named track_1: >enable #clear counters track track_1
60000CRG0-35B
95
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example resets the counters on VLAN interface 7: >enable #clear counters vlan 7
60000CRG0-35B
96
Syntax Description
all <trunk id> Clears all voice trunk counters. Specifies clearing a specific voice trunk using the trunk's 2-digit identifier following T (for example, T01).
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example resets the counters for all configured voice trunks: >enable #clear counters voice-trunk all
60000CRG0-35B
97
Syntax Description
peak policy <value> remote-id <remote id> Optional. Clears the peak IKE SA count reached. Optional. Removes all IKE SAs associated with the specified policy priority value. This number is assigned using the command crypto ike on page 861. Optional. Removes all IKE SAs associated with the specified IKE remote ID. A delete payload is sent to the peers prior to deletion of the SA. This command is preferred to the clear crypto ike sa policy <value> command when multiple unique SAs have been created on the same IKE policy, but the user wants to delete only the SA to a unique peer.
Default Values
No default values are necessary for this command.
Command History
Release 4.1 Release 12.1 Release 17.5 Command was introduced. Command was expanded to include the policy and remote-id parameters. Command was expanded to include the peak parameter.
Usage Examples
The following example clears the entire database of IKE SAs (including the active associations): >enable #clear crypto ike sa The following example clears IKE SAs associated with policy 101: >enable #clear crypto ike sa policy 101 The following example clears an IKE SA associated with remote-id netvanta: >enable #clear crypto ike sa remote-id netvanta
60000CRG0-35B
98
Syntax Description
entry <ip address> Optional. Clears only the SAs related to the specified destination IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Clears only a portion of the SAs by specifying the Authentication Header (AH) Protocol and a security parameter index (SPI). You can determine the correct SPI value using the show crypto ipsec sa command. Optional. Clears only a portion of the SAs by specifying the Encapsulating Security Payload (ESP) Protocol and an SPI. You can determine the correct SPI value using the show crypto ipsec sa command. Optional. Clears only the SAs associated with the specified crypto map. Optional. Clears the peak IPsec SA count reached. Optional. Clears only the SAs associated with the specified far-end IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Removes all IPsec SAs associated with the specified IPsec remote ID.
ah <SPI>
esp <SPI>
remote-id <remote-id>
Default Values
No default values are necessary for this command.
Command History
Release 4.1 Release 15.1 Release 17.5 Command was introduced. Command was expanded to include the remote-id parameter. Command was expanded to include the peak parameter.
60000CRG0-35B
99
Usage Examples
The following example clears all IPsec SAs: >enable #clear crypto ipsec sa The following example clears the IPsec SA used for ESP traffic with the SPI of 300 to IP address 63.97.45.57: >enable #clear crypto ipsec sa entry 63.97.45.57 esp 300
60000CRG0-35B
100
clear desktop-auditing
Use the clear desktop-auditing command to remove the collected network access protection (NAP) statistics for clients connected to the network. Statistics can be cleared for a single client or for all clients. Variations of this command include:
clear desktop-auditing clear desktop-auditing host <hostname> clear desktop-auditing interface gigabit-switchport <slot/port> clear desktop-auditing ip <ip address> clear desktop-auditing mac <mac address> clear desktop-auditing vlan <vlan id>
Syntax Description
host <hostname> interface gigabit-switchport <slot/port> ip <ip address> Optional. Clears the statistics for the client with the specified host name. Optional. Clears the statistics for the client using the specified interface. Optional. Clears the statistics for the client with the specified IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Clears the statistics for the client with the specified medium access control (MAC) address. MAC addresses should be expressed in the following format: xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01). Optional. Clears the statistics for the client with the specified virtual local area network (VLAN) identification number. VLAN IDs range from 1 to 4096.
Default Values
No default values are necessary for this command.
Command History
Release 17.8 Command was introduced.
Usage Examples
The following example clears all collected NAP statistics for all clients: >enable #clear desktop-auditing
60000CRG0-35B
101
The following example clears all collected NAP statistics for the client with the MAC address 00:A0:C8:00:00:01: >enable #clear desktop-auditing mac 00:A0:C8:00:00:01
60000CRG0-35B
102
Default Values
No default values are necessary for this command.
Command History
Release15.1 Command was introduced.
Usage Examples
The following example disassociates with a client with the MAC address 00:40:96:AB:38:5E: >enable #clear dot11 client 00:40:96:AB:38:5E This Station has been removed.
60000CRG0-35B
103
clear dump-core
The clear dump-core command clears diagnostic information appended to the output of the show version command. This information results from an unexpected unit reboot. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example clears the entire database of Internet key exchange (IKE) SAs (including the active associations): >enable #clear dump-core
60000CRG0-35B
104
Syntax Description
domain <domain name> domain none Optional. Specifies that only statistics for remote MEPs in the named domain are cleared. Optional. Specifies that no domain is named and all remote MEP statistics, regardless of domain, are cleared.
association <association name> Optional. Specifies that only statistics for remote MEPs in the named association are cleared. mep-id <mep id> remote mep-id <mep id> Optional. Specifies that only statistics for local MEPs with the specified MEP ID are cleared. MEP ID range is 1 to 8191. Optional. Specifies that only statistics for remote MEPs with the specified MEP ID are cleared. MEP ID range is 1 to 8191.
Default Values
No default values are necessary for this command.
Command History
Release 17.4 Command was introduced.
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example clears all CCM entries for all remote MEPs: >enable #clear ethernet cfm mep remote
60000CRG0-35B
105
clear event-history
Use the clear event-history command to clear all messages logged to the local event-history. Messages cleared from the local event-history (using the clear event-history command) are no longer accessible.
Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example clears all local event-history messages: >enable #clear event-history
60000CRG0-35B
106
Syntax Description
all interface <interface> Clears the information for all GVRP interfaces. Clears the information for the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type clear gvrp statistics interface ? for a complete list of applicable interfaces.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example clears counter statistics on the GVRP interfaces: >enable #clear gvrp statistics all
60000CRG0-35B
107
clear host
Use the clear host command to clear a host name when using the domain naming system (DNS) proxy. Variations of this command include:
clear host * clear host <hostname> clear host vrf <name> <hostname>
Syntax Description
* <hostname> vrf <name> Clears all hosts from the host table. Clears a specific host entry from the host-to-address table. Optional. Clears the host table entry for a specific VPN routing and forwarding (VRF).
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 16.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example clears all dynamic host names: >enable #clear host *
60000CRG0-35B
108
clear ip access-list
Use the clear ip access-list command to clear all counters associated with all Internet Protocol version 4 (IPv4) access control lists (ACLs) or a specified IPv4 ACL. Variations of this command include:
clear ip access-list clear ip access-list <ip4 acl name>
Syntax Description
<ipv4 acl name> Optional. Specifies the name (label) of an IPv4 ACL to clear.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 17.9 Command was introduced. Command was changed to require the ip keyword.
Usage Examples
The following example clears all counters for the IPv4 ACL labeled MatchAll: >enable #clear ip access-list MatchAll
60000CRG0-35B
109
clear ip bgp
Use the clear ip bgp command to clear Border Gateway Protocol (BGP) neighbors as specified. Variations of this command include:
clear ip bgp [* | <number> | <ip address>] in clear ip bgp [* | <number> | <ip address>] out clear ip bgp [* | <number> | <ip address>] soft
Syntax Description
* <number> <ip address> in out soft Clears all BGP neighbors. Clears all BGP neighbors with the specified autonomous system (AS) number. Range is 1 to 4294967295. Clears the BGP neighbor with the specified IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Causes a soft reset inbound with a neighbor, reprocessing routes advertised by that neighbor. Causes a soft reset outbound with a neighbor, resending advertised routes to that neighbor. Causes a soft reset both inbound and outbound.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 18.1 Command was introduced. Command was altered to support 4-byte AS number (previously AOS only supported 2-byte numbers).
Functional Notes
The clear ip bgp command must be issued to re-initialize the BGP process between the peers matching the given arguments. Most neighbor changes, including changes to prefix-list filters, do not take effect until the clear command is issued. A hard reset clears the Transmission Control Protocol (TCP) connection with the specified peers, which results in clearing the table. This method of clearing is disruptive and causes peer routers to record a route flap for each route. The out version of this command provides a soft reset out to occur by causing all routes to be re-sent to the specified peer(s). TCP connections are not torn down, so this method is less disruptive. Output filters/policies are re-applied before sending the update. The in version of this command provides a soft reset in to occur by allowing the router to receive an updated table from a peer without tearing down the TCP connection. This method is less disruptive and does not count as a route flap. Currently, all of the peer's routes are stored permanently, even if they are filtered by a prefix list. The command causes the peer's routes to be reprocessed with any new parameters.
60000CRG0-35B
110
Usage Examples
The following example causes a hard reset with peers with an AS number of 101: >enable #clear ip bgp 101
60000CRG0-35B
111
clear ip cache
Use the clear ip cache command to delete cache table entries. Add the counters parameter to reset the counters on the cache table. The command can be limited to a specific VPN routing and forwarding (VRF). Variations of this command include:
clear ip cache clear ip cache counters clear ip cache vrf <name> clear ip cache vrf <name> counters
Syntax Description
counters vrf <name> Optional. Resets counters in the cache table. Optional. Clears all fast-cache entries for a specific VRF.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 14.1 Release 16.1 Command was introduced. Command was expanded to include the counters parameter. Command was expanded to include the vrf parameter.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example removes all entries from the cache table: >enable #clear ip cache The following example resets all fast-cache entries just for the VRF RED: >enable #clear ip cache vrf RED counters
60000CRG0-35B
112
Syntax Description
* vrf <name> <ip address> Clears all automatic DHCP server binding entries. Optional. Clears DHCP server binding entries on the specified VPN routing and forwarding (VRF) instance. Clears a specific DHCP server binding associated with an IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
Default Values
No default values are necessary for this command.
Command History
Release 16.1 Release 17.1 Command was introduced. Command was expanded to include the vrf parameter.
Usage Examples
The following example clears all DHCP server bindings on the default VRF: >enable #clear ip dhcp-server binding * The following example clears all DHCP server bindings from the VRF RED: >enable #clear ip dhcp-server binding vrf RED *
60000CRG0-35B
113
clear ip ffe
Use the clear ip ffe command to remove the RapidRoute Engine entries on all interfaces or on a specific interface. Variations of this command include:
clear ip ffe <interface> clear ip ffe ipsec clear ip ffe ipsec <rapidroute interface ID>
Syntax Description
<interface> Specifies an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1. Type clear ip ffe? for a complete list of valid interfaces. Specifies that all RapidRoute entries to and from an Internet Protocol security (IPsec) security association (SA) are cleared. Specifies that RapidRoute entries to and from an IPsec SA on a specified RapidRoute interface are cleared. RapidRoute interface identifiers range from 1 to 16777215.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Release 17.6 Release A4.01 Command was introduced. Command was expanded to include ipsec parameters. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following example clears all RapidRoute entries for the Ethernet 0/1 interface: >enable #clear ip ffe ethernet 0/1
60000CRG0-35B
114
Default Values
No default values are necessary for this command.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example clears all ITM statistics associated with an observation point: #clear ip flow stats
60000CRG0-35B
115
Default Values
No default values are necessary for this command.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example clears all Top Talker statistics: #clear ip flow top-talkers
60000CRG0-35B
116
Syntax Description
<multicast address> Optional. Clears the IGMP tables of a specific multicast group IP address. The multicast group IP address range is 244.0.0.0 to 239.255.255.255 or 224.0.0.0 /4. Optional. Clears the IGMP tables of all interfaces of the specified type or a specific interface of a particular type. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type clear ip igmp group ? for a list of valid interfaces.
<interface>
Default Values
No default values are necessary for this command.
Command History
Release 7.1 Release 9.1 Release A4.01 Command was introduced. Command was expanded to include the high-bit-rate digital subscriber line (HDSL) and tunnel interfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following example clears all statistics from the IGMP tables for all nonstatic IGMP groups: >enable #clear ip igmp group
60000CRG0-35B
117
clear ip ospf
Use the clear ip ospf command to reset open shortest path first (OSPF) information. Variations of this command include:
clear ip ospf process clear ip ospf redistribution
Syntax Description
process redistribution Restarts the OSPF process. Refreshes routes redistributed over OSPF.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example resets the OSPF process: >enable #clear ip ospf process
60000CRG0-35B
118
clear ip policy-sessions
Use the clear ip policy-sessions command to clear Internet Protocol version 4 (IPv4) access control policy (ACP) firewall sessions. You may clear all the IPv4 sessions or a specific session. Use the show ip policy-sessions command to view a current IPv4 session listing. Variations of this command include:
clear ip policy-sessions clear ip policy-sessions <ipv4 acp name> [ahp | esp | gre | icmp | tcp | udp | <protocol>] <ipv4 source> <source port> <ipv4 destination> <destination port> clear ip policy-sessions <ipv4 acp name> [ahp | esp | gre | icmp | tcp | udp | <protocol>] <ipv4 source> <source port> <ipv4 destination> <destination port> [destination | source] <nat ip> <nat port> clear ip policy-sessions vrf <name> clear ip policy-sessions vrf <name> <ipv4 acp name> [ahp | esp | gre | icmp | tcp | udp | <protocol>] <ipv4 source> <source port> <ipv4 destination> <destination port> clear ip policy-sessions vrf <name> <ipv4 acp name> [ahp | esp | gre | icmp | tcp | udp | <protocol>] <ipv4 source> <source port> <ipv4 destination> <destination port> [destination | source] <nat ip> <nat port>
Syntax Description
<ipv4 acp name> ahp esp gre icmp tcp udp <protocol> <ipv4 source> <source port> <ipv4 destination> <destination port> [destination | source] <nat ip> <nat port> Specifies the IPv4 access control policy (ACP) from which to clear the firewall sessions. Specifies Authentication Header (AH) Protocol. Specifies Encapsulating Security Payload (ESP) Protocol. Specifies Generic Routing Encapsulation (GRE) Protocol. Specifies Internet Control Message Protocol (ICMP). Specifies Transmission Control Protocol (TCP). Specifies User Datagram Protocol (UDP). Specifies a protocol. Valid range is 0 to 255. Specifies the source IPv4 address. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the source port (in hex format AH, ESP, and GRE; decimal for all other protocols). Specifies the destination IPv4 address. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the destination port (in hex format for AH, ESP, and GRE; decimal for all other protocols). For network address translation (NAT) sessions, this specifies whether to select a NAT source or NAT destination session. For NAT sessions, this specifies the NAT IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). For NAT sessions, this specifies the NAT port (in hex format for AH, ESP, and GRE; decimal for all other protocols).
60000CRG0-35B
119
Enable Mode Command Set Optional. Specifies the VPN routing and forwarding (VRF) instance to impact. Executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Default Values
No default values are necessary for this command.
Command History
Release 2.1 Release 17.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
The second half of this command, beginning with the source IPv4 address, may be copied and pasted from a row in the show ip policy-sessions table for easier use. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example clears the Telnet association (TCP port 23) for an IPv4 policy class pclass1 with source IPv4 address 192.22.71.50 and destination 192.22.71.130: >enable #clear ip policy-sessions pclass1 tcp 192.22.71.50 23 192.22.71.130 23 The following example clears all IPv4 policy class sessions for the VRF instance named RED: >enable #clear ip policy-sessions vrf RED
60000CRG0-35B
120
clear ip policy-stats
Use the clear ip policy-stats command to clear statistical counters for Internet Protocol version 4 (IPv4) access control policies (ACPs). Variations of this command include:
clear ip policy-stats clear ip policy-stats <ipv4 acp name> clear ip policy-stats <ipv4 acp name> entry <number>
Syntax Description
<ipv4 acp name> entry <number> Optional. Specifies the IPv4 ACP to clear. If no IPv4 ACP is specified, statistics are cleared for all policies. Optional. Clears the statistics of a specific IPv4 ACP. Number range is 1 to 4294967295.
Default Values
No default values are necessary for this command.
Command History
Release 2.1 Command was introduced.
Usage Examples
The following example clears statistical counters for all IPv4 ACPs: >enable #clear ip policy-stats The following example clears statistical counters for the IPv4 ACP MatchALL: >enable #clear ip policy-stats MatchALL
60000CRG0-35B
121
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example clears the hit count statistics for prefix list test: >enable #clear ip prefix-list test
60000CRG0-35B
122
clear ip route
Use the clear ip route command to remove all learned routes from the IP route table. Static and connected routes are not cleared by this command. The command can be limited to a specific VPN routing and forwarding (VRF). Variations of this command include:
clear ip route * clear ip route <ip address> <subnet mask> clear ip route vrf <name> * clear ip route vrf <name> <ip address> <subnet mask>
Syntax Description
* <ip address> Deletes all destination routes. Specifies the IP address of the destination routes to be deleted. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IP addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Optional. Clears the IP route table for the specified VRF.
<subnet mask>
vrf <name>
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 16.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example removes all learned routes from the route table: >enable #clear ip route *
60000CRG0-35B
123
The following example removes all learned routes from the route table on the VRF RED: >enable #clear ip route vrf RED *
60000CRG0-35B
124
Default Values
No default values are necessary for this command.
Command History
Release 17.5 Command was introduced.
Usage Examples
The following example clears all routes from the hardware forwarding table: >enable #clear ip route-cache express
60000CRG0-35B
125
Syntax Description
call-history interface <interface> Optional. Removes call statistics from the call history only. Optional. Clears all interface VQM statistics for the specified interface. Specifies an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type clear ip rtp quality-monitoring interface ? for a valid list of interfaces.
Default Values
No default values are necessary for this command.
Command History
Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following example clears all VQM statistics from the call history: >enable #clear ip rtp quality-monitoring call-history
60000CRG0-35B
126
Syntax Description
<name> Optional. Clears statistics for only the specified VQM reporter.
Default Values
No default values are necessary for this command.
Command History
Release 17.6 Command was introduced.
Usage Examples
The following example clears only the statistics associated with VQM reporter Reporter1: >enable #clear ip rtp quality-monitoring reporter Reporter1
60000CRG0-35B
127
clear ip security
Use the clear ip security command to clear all statistics associated with the security monitor. Variations of this command include:
clear ip security any-vrf threats clear ip security monitor clear ip security threats clear ip security vrf <name> threats
Syntax Description
any-vrf threats monitor threats vrf <name> threats Clears statistics on any available VRF on the device. Clears all statistics associated with the security monitor. Clears the IP security threats list. Clears statistics on the named VRF.
Default Values
No default values are necessary for this command.
Command History
Release 17.5 Command was introduced.
Functional Notes
The clear ip security command is used to clear all statistics associated with the security monitor including policy-stats and excluding timeline and virtual private network (VPN) statistics. The time of the clear is saved.
Usage Examples
The following example clears threat statistics for the named VRF MyVRF: >enable #clear ip security vrf MyVRF threats
60000CRG0-35B
128
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example clears all counters for URL filter requests and responses: >enable #clear ip urlfilter statistics
60000CRG0-35B
129
Default Values
No default values are necessary for this command.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example clears all statistics for top websites reporting: >enable #clear ip urlfilter top-websites
60000CRG0-35B
130
Syntax Description
<ipv6 acl name> Optional. Specifies the name (label) of an IPv6 ACL to clear.
Default Values
No default values are necessary for this command.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example clears all counters for the IPv6 ACL labeled MatchAll: >enable #clear ipv6 access-list MatchAll
60000CRG0-35B
131
Default Values
No default values are necessary for this command.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example specifies that all IPv6 address prefix information is cleared for the ethernet 0/1 interface: >enable #clear ipv6 interfaces ethernet 0/1 prefix
60000CRG0-35B
132
Syntax Description
<ipv6 address> Optional. Specifies that the neighbor cache entries for a specific IPv6 address are cleared. Specify IPv6 addresses in colon hexadecimal format ( X:X:X:X::X). For example, 2001:DB8:1::1. If no IPv6 address is specified, all entries are cleared. Optional. Specifies that the neighbor cache entries for a specific interface are cleared. Specify interfaces in the <interface> <slot/port | interface id> format. For example, to specify a Point-to-Point Protocol (PPP) interface, enter ppp 1. If no interface is specified, all entries for all interfaces on the VPN routing and forwaring (VRF) instance are cleared. Optional. Specifies that statistics for the neighbor cache and protocol interaction are cleared. Optional. Specifies that neighbor cache entries for a specific VRF instance are cleared. If no VRF is specified, entries on the default unnamed VRF are cleared.
<interface>
Default Values
By default, if no options are specified, entering this command clears all neighbor cache entries on all interfaces assigned to the default VRF.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example clears all entries in the neighbor cache for the default VRF: >enable #clear ipv6 neighbors
60000CRG0-35B
133
Syntax Description
any-vrf <ipv6 acp name> ahp esp gre icmpv6 tcp udp <protocol> <ipv6 source> <source port> <ipv6 destination> Specifies that all sessions in all VPN routing and forwarding (VRF) instances are cleared. Specifies the IPv6 ACP from which to clear the firewall sessions. Specifies Authentication Header (AH) Protocol. Specifies Encapsulating Security Payload (ESP) Protocol. Specifies Generic Routing Encapsulation (GRE) Protocol. Specifies Internet Control Message Protocol (ICMP) version 6 (ICMPv6). Specifies Transmission Control Protocol (TCP). Specifies User Datagram Protocol (UDP). Specifies a protocol. Valid range is 0 to 255. Specifies the source IPv6 address. IPv6 addresses should be expressed in colon hexadecimal notation (X:X:X:X::X). For example, 2001:DB8:1::1. Specifies the source port for TCP and UDP sessions. Range is 0 to 65535. Specifies the destination IPv6 address. IPv6 addresses should be expressed in colon hexadecimal notation (X:X:X:X::X). For example, 2001:DB8:1::1. Specifies the destination port for TCP and UDP sessions. Range is 0 to 65535.
<destination port>
60000CRG0-35B
134
Enable Mode Command Set Specifies the interface when a link-local IPv6 address is entered (addresses beginning with FE80::). Interfaces must be entered when using a link-local address. Specify interfaces in the <interface> <slot/port | interface id> format. For example, to specify a Point-to-Point Protocol (PPP) interface, enter ppp 1. Specifies the ICMPv6 ID. Valid range is 0 to 65535. Specifies the type and code of the ICMPv6 session to be cleared. Type and code ranges are 0 to 255. Optional. Specifies the VRF instance to impact. Executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Default Values
No default values are necessary for this command.
Command History
Release 18.1 Command was introduced.
Functional Notes
The second half of this command, beginning with the source IPv6 address, may be copied and pasted from a row in the show ipv6 policy-sessions table for easier use. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example clears the Telnet association (TCP port 23) for IPv6 ACP pclass1 with source IPv6 address FE80::2AO:C8FF:FE61:3082 and destination IPv6 address 2003::2AO:C8FF:FE61:3084. Because the source IPv6 address is a link-local address (FE80::), the appropriate interface (in this case ethernet 0/1) must be entered after the source IPv6 address. Enter the command as follows: >enable #clear ipv6 policy-sessions pclass1 tcp FE80::2AOC8FF:FE61:3082 ethernet 0/1 2003::2AO:C8FF:FE61:3084 The following example clears all IPv6 policy class sessions for the VRF instance named RED: >enable #clear ipv6 policy-sessions vrf RED
60000CRG0-35B
135
Syntax Description
<ipv6 acp name> entry <number> Optional. Specifies the IPv6 ACP statistics to clear. If no IPv6 ACP is specified, statistics are cleared for all IPv6 ACPs. Optional. Specifies only a specific entry within the IPv6 ACP is cleared. Number range is 1 to 4294967295.
Default Values
No default values are necessary for this command.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example clears statistical counters for all IPv6 ACPs: >enable #clear ipv6 policy-stats The following example clears statistical counters for the IPv6 ACP MatchALL: >enable #clear ipv6 policy-stats MatchALL The following example clears statistical counters for the 6th entry in the IPv6 ACP MatchALL: >enable #clear ipv6 policy-stats MatchALL entry 6
60000CRG0-35B
136
Syntax Description
conflict <interface> Optional. Specifies that learned routers with misconfigurations are cleared from locally reachable routers. Optional. Specifies an interface from which to clear the learned router list. If no interface is specified, learned routers on all interfaces of the VPN routing and forwarding (VRF) are cleared. Specify interfaces in the <interface> <slot/port | interface id> format. For example, to specify a Point-to-Point Protocol (PPP) interface, enter ppp 1. Optional. Specifies a VRF on which to clear learned routers. If no VRF is specified, learned routers for all interfaces on the default VRF are cleared.
vrf <name>
Default Values
By default, all learned routers from all interfaces on the default VRF are cleared when no options are specified.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example specifies that learned routers are cleared from all interfaces on the default VRF: >enable #clear ipv6 routers
60000CRG0-35B
137
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following example resets all LLDP counters: >enable #clear lldp counters interface
60000CRG0-35B
138
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Command was introduced.
Functional Notes
This command generates output indicating the names of any neighbors deleted from the database and the name of the interface on which the neighbor was learned.
Usage Examples
The following example clears LLDP neighbor Switch_1 from the Ethernet interface 0/7: >enable #clear lldp neighbors LLDP: Deleted neighbor Switch_1 on interface eth 0/7 #
60000CRG0-35B
139
Syntax Description
<interface> Removes the MAC address of the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type clear mac address-table dynamic interface ? for a complete list of applicable interfaces. Removes a specific MAC address from the table. MAC addresses should be expressed in the following format xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01).
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example removes the dynamic address A0:B1:C2:D3:E4:A1 from the MAC address table: >enable #clear mac address-table dynamic address A0:B1:C2:D3:E4:A1 The following example removes all dynamic addresses from the MAC address table: >enable #clear mac address-table dynamic
60000CRG0-35B
140
Syntax Description
igmp-snooping user vlan <vlan id> Optional. Clears entries in the multicast ARL table that were added dynamically (via IGMP snooping). Optional. Clears entries in the multicast ARL table that were added statically (by the user). Optional. Clears entries in the multicast ARL table based on virtual local area network (VLAN).
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example removes the entries in the multicast ARL table for VLAN 200: >enable #clear mac address-table multicast vlan 200
60000CRG0-35B
141
Default Values
No default values are necessary for this command.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example clears pending email body text for mail agent myagent: >enable #clear mail-client body myagent
60000CRG0-35B
142
Syntax Description
<agent name> Optional. Specifies that only a specific mail agents counters are cleared.
Default Values
No default values are necessary for this command.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example clears all counters for all configured mail agents: >enable #clear mail-client counters
60000CRG0-35B
143
Syntax Description
hostname <hostname> interface gigabit-switchport <slot/port> ip <ip address> Optional. Clears statistics for the client with the specified host name. Optional. Clears statistics for the client using the specified interface. Optional. Clears the statistics for the client with the specified IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Clears the statistics for the client with the specified medium access control (MAC) address. MAC addresses should be expressed in the following format: xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01). Optional. Clears the statistics for the client with the specified virtual local area network (VLAN) identification number. VLAN IDs range from 1 to 4094.
Default Values
No default values are necessary for this command.
Command History
Release 17.8 Command was introduced.
Usage Examples
The following example clears all collected DHCP statistics for all clients: >enable #clear network-forensics ip dhcp
60000CRG0-35B
144
The following example clears all collected DHCP statistics for the client with the MAC address 00:A0:C8:00:00:01: >enable #clear network-forensics ip dhcp mac 00:A0:C8:00:00:01
60000CRG0-35B
145
clear ntp
Use the clear ntp command to restart the Network Time Protocol (NTP) daemon. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example restarts the NTP daemon: >enable #clear ntp
60000CRG0-35B
146
clear port-security
Use the clear port-security command to clear the dynamic or sticky secure medium access control (MAC) addresses associated with an interface. This can be done on a per-address or per-port basis. Variations of this command include the following:
clear port-security dynamic address <mac address> clear port-security dynamic interface <interface> clear port-security sticky address <mac address> clear port-security sticky interface <interface>
Syntax Description
dynamic sticky address <mac address> Clears the dynamic MAC addresses. Clears the sticky secure MAC addresses. Clears the information for the specified MAC address. MAC addresses should be expressed in the following format xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01). Clears the information for the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type clear port-security sticky interface ? or clear port-security dynamic interface ? for a complete list of applicable interfaces.
interface <interface>
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following command clears all dynamic secure MAC addresses associated with the Ethernet interface 0/1: >enable #clear port-security dynamic interface eth 0/1
60000CRG0-35B
147
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following command clears the violation count associated with the Ethernet interface 0/1: >enable #clear port-security violation-count eth 0/1
60000CRG0-35B
148
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example ends the current PPPoE client session for ppp 1: >enable #clear pppoe 1
60000CRG0-35B
149
Syntax Description
counters icmp-timestamp twamp udp-echo Clears the probe responder counters. Clears the Internet Control Message Protocol (ICMP) timestamp probe responder counters. Clears the Two-Way Active Measurement Protocol (TWAMP) probe responder counters. Clears the User Datagram Protocol (UDP) echo probe responder counters.
Default Values
No default values are necessary for this command.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example removes the TWAMP responder counters: >enable #clear probe responder twamp counters
60000CRG0-35B
150
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example resets the CPU maximum usage statistics: >enable #clear processes cpu max
60000CRG0-35B
151
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example clears the contents of the system processing queues: >enable #clear processes queue
60000CRG0-35B
152
Syntax Description
<name> <number> interface <interface> Optional. Clears the statistics of a defined QoS map. Optional. Clears the statistics for one of the maps specified sequence numbers. Optional. Clears QoS map statistics for the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1.Type clear qos map interface ? for a complete list of applicable interfaces.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following example clears statistics for all defined QoS maps: #clear qos map The following example clears statistics for all entries in the priority QoS map: #clear qos map priority The following example clears statistics in entry 10 of the priority QoS map: #clear qos map priority 10
60000CRG0-35B
153
Command Reference Guide The following example clears QoS statistics for a specified interface: #clear qos map interface frame-relay 1
The clear counters command clears ALL interface statistics (including QoS map interface statistics).
60000CRG0-35B
154
clear relay
Use the clear relay command to reset the door contact relay. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example resets the door contact relay: >enable #clear relay
60000CRG0-35B
155
Syntax Description
<name> Optional. Clears the counters for the specified route map.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example clears all route map counters: >enable #clear route-map counters
60000CRG0-35B
156
Syntax Description
* <username> Clears all SIP location database statistics. Clears the statistics for the specified user name.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example deletes all dynamic location entries: >enable #clear sip location *
60000CRG0-35B
157
Default Values
No default values are necessary for this command.
Command History
Release 17.9 Release A4.01 Command was introduced for AOS data products. Command was included for AOS voice products.
Usage Examples
The following example clears SIP server resource counters: >enable #clear sip resources
60000CRG0-35B
158
Syntax Description
<Txx> <trunk id> Optional. Specifies the trunk to clear using its two-digit identifier. For example: T01. Optional. Clears the registration information for the specified trunk.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example clears SIP registration information for trunk 01: >enable #clear sip trunk-registration T01
60000CRG0-35B
159
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example clears all SIP server registration information: >enable #clear sip user-registration
60000CRG0-35B
160
Syntax Description
interface <interface> Optional. Specifies a single interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type clear spanning-tree counters ? for a complete list of interfaces.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following example clears the spanning tree counters for Ethernet 0/10: >enable #clear spanning-tree counters interface eth 0/10
60000CRG0-35B
161
Syntax Description
interface <interface> Optional. Specifies a valid interface to clear. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type clear spanning-tree detected-protocols interface ? for a complete list of applicable interfaces.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
The switch has the ability to operate using the rapid spanning-tree protocol or the legacy 802.1D version of spanning-tree. When a bridge protocol data unit (BPDU) of the legacy version is detected on an interface, the switch automatically regresses to using the 802.1D spanning-tree protocol for that interface. Issue the clear spanning-tree detected-protocols command to return to rapid spanning-tree operation.
Usage Examples
The following example re-initiates the protocol migration process on Ethernet interface 0/3: >enable #clear spanning-tree detected-protocols interface ethernet 0/3 The following example re-initiates the protocol migration process on all interfaces: >enable #clear spanning-tree detected-protocols
60000CRG0-35B
162
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example clears all TACACS+ protocol statistics: >enable #clear tacacs+ statistics
60000CRG0-35B
163
clear user
Use the clear user command to detach a user from a given line. Variations of this command include:
clear user console <number> clear user ssh <number> clear user telnet <number>
Syntax Description
console <number> ssh <number> telnet <number> Detaches a specific console user. Valid range is 0 to 1. Detaches a specific secure shell (SSH) user. Valid range is 0 to 4. Detaches a specific Telnet user. Valid range is 0 to 5.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example detaches the console 1 user: >enable #clear user console 1
60000CRG0-35B
164
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example resets the statistics on the call call queue on extension 6407: >enable #clear voice queue 6407
60000CRG0-35B
165
Syntax Description
interface <interface> Optional. Clears all VRRP statistics on the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type clear vrrp counters interface ? for a complete list of valid interfaces. Optional. Clears all VRRP statistics for the specified group on the specified interface. Group numbers range from 1 to 255.
group <number>
Default Values
No default values are necessary for this command.
Command History
Release 16.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
Although VRRP group virtual router IDs (VRIDs) can be numbered between 1 and 255, only two VRRP routers per interface are supported.
Usage Examples
The following example clears all VRRP group statistics on all interfaces: >enable #clear vrrp counters
60000CRG0-35B
166
clock auto-correct-dst
The clock auto-correct-dst command allows the automatic one-hour correction for daylight savings time (DST). Use the clock no-auto-correct-dst command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is enabled.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example allows for automatic DST correction: >enable #clock auto-correct-dst
60000CRG0-35B
167
clock no-auto-correct-dst
The clock no-auto-correct-dst command allows you to override the automatic one-hour correction for daylight savings time (DST). Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Command was introduced.
Functional Notes
Many time zones include an automatic one-hour correction for daylight savings time at the appropriate time. You may override it at your location using this command.
Usage Examples
The following example overrides the one-hour offset for DST: >enable #clock no-auto-correct-dst
60000CRG0-35B
168
<year>
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example sets the system software clock for 3:42 p.m., August 22, 2004: >enable #clock set 15:42:00 22 Au 2004
60000CRG0-35B
169
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 11.1 Command was introduced. Command was expanded to include the clock timezone 0.
60000CRG0-35B
170
Functional Notes
The following list shows sample cities and their time zone codes. clock timezone +1-Amsterdam clock timezone +1-Belgrade clock timezone +1-Brussels clock timezone +1-Sarajevo clock timezone +1-West-Africa clock timezone +10-Brisbane clock timezone +10-Canberra clock timezone +10-Guam clock timezone +10-Hobart clock timezone +10-Vladivostok clock timezone +11 clock timezone +12-Auckland clock timezone +12-Fiji clock timezone +13 clock timezone +2-Athens clock timezone +2-Bucharest clock timezone +2-Cairo clock timezone +2-Harare clock timezone +2-Helsinki clock timezone +2-Jerusalem clock timezone +3-Baghdad clock timezone +3-Kuwait clock timezone +3-Moscow clock timezone +3-Nairobi clock timezone +3:30 clock timezone +4-Abu-Dhabi clock timezone +4-Baku clock timezone +4:30 clock timezone +5-Ekaterinburg clock timezone +5-Islamabad clock timezone +5:30 clock timezone +5:45 clock timezone +6-Almaty clock timezone +6-Astana clock timezone +6-Sri-Jay clock timezone +6:30 clock timezone +7-Bangkok clock timezone +7-Kranoyarsk clock timezone +8-Bejing clock timezone +8-Irkutsk clock timezone +8-Kuala-Lumpur clock timezone +8-Perth clock timezone +8-Taipei clock timezone +9-Osaka clock timezone +9-Seoul clock timezone +9-Yakutsk clock timezone +9:30-Adelaide clock timezone +9:30-Darwin clock timezone -1-Azores clock timezone -1-Cape-Verde clock timezone -10 clock timezone -11 clock timezone -12 clock timezone -2 clock timezone -3-Brasilia clock timezone -3-Buenos-Aires clock timezone -3-Greenland clock timezone -3:30 clock timezone -4-Atlantic-Time clock timezone -4-Caracus clock timezone -4-Santiago clock timezone -5 clock timezone -5-Bogota clock timezone -5-Eastern-Time clock timezone -6-Central-America clock timezone -6-Central-Time clock timezone -6-Mexico-City clock timezone -6-Saskatchewan clock timezone -7-Arizona clock timezone -7-Mountain-Time clock timezone -8 clock timezone -9 clock timezone 0-Universal Coordinated Time (UTC) clock timezone GMT-Casablanca clock timezone GMT-Dublin
60000CRG0-35B
171
Usage Examples
The following example sets the time zone for Santiago, Chile. >enable #clock timezone -4-Santiago
60000CRG0-35B
172
configure
Use the configure command to enter the Global Configuration mode or to configure the system from memory. Refer to Global Configuration Mode Command Set on page 795 for more information. Variations of this command include:
configure memory configure network configure overwrite-network configure terminal
Syntax Description
memory network overwrite-network terminal Configures the active system with the commands located in the default configuration file stored in nonvolatile random access memory (NVRAM). Configures the system from a Trivial File Transfer Protocol (TFTP) network host. Overwrites NVRAM memory from a TFTP network host. Enters the Global Configuration mode.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example enters the Global Configuration mode from the Enable mode: >enable #configure terminal (config)#
60000CRG0-35B
173
copy
Use the copy command to copy the specified file from the source (flash memory) to the specified destination. Variations of this command (valid only on AOS units WITHOUT CompactFlash) include:
copy <sourcefile> <new file> copy <sourcefile> boot copy <sourcefile> default-config copy <sourcefile> interface <interface> copy <sourcefile> startup-config
Syntax Description
<sourcefile> <new file> boot default-config interface <interface> Specifies the name of the file to copy. Makes a copy of the specified source file and saves it in flash memory using the specified new name. Copies the specified source file and overwrites the boot read only memory (ROM). Replaces the default configuration with the specified file copied from flash memory. Updates the specified interface using a copy of the specified file. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type copy <sourcefile> interface ? to display a list of valid interfaces. Replaces the startup configuration with the specified file copied from flash memory.
startup-config
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 16.1 Release 17.2 Release A4.01 Release A4.05 Command was introduced. Command was expanded to include the default-config. Command was expanded to include the cellular interface. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface. Command was expanded to include the asymmetric digital subscriber line
(ADSL) interface.
60000CRG0-35B
174
Functional Notes
Updates to the boot ROM are required periodically to enhance and expand the units operation. The bootcode can be updated from within the command line interface (CLI) using the copy <sourcefile> boot command.
Usage Examples
The following example copies the file myfile.biz (located in flash memory) and overwrites the boot ROM: >enable #copy myfile.biz boot Upgrading bootcode is a critical process that cannot be interrupted. If something were to happen and the process was not able to be completed, it would render your unit inoperable. It is for this reason that during a bootcode upgrade, all other system tasks will be halted. This means packets will not be routed, and all console sessions will not respond during the upgrade process. Once the process finishes, the system will function as it did before. This process will take approximately 20 seconds. Do you want to proceed? [yes/no]y WARNING!! A bootcode upgrade has been initiated. Your session will become nonresponsive for the duration of the upgrade (approx. 20 seconds). A message will be sent when the upgrade is completed. Bootcode upgrade process done. Your session should function normally. Success!!!!!
60000CRG0-35B
175
copy cflash
Use the copy cflash command to copy files located on the CompactFlash card to the specified destination. Variations of this command (valid only on AOS units WITH CompactFlash) include:
copy cflash <sourcefile> boot copy cflash <sourcefile> cflash <new file> copy cflash <sourcefile> http <url> port <port> copy cflash <sourcefile> https <url> port <port> copy cflash <sourcefile> flash copy cflash <sourcefile> flash <new file> copy cflash <sourcefile> interface <interface> copy cflash <sourcefile> startup-config copy cflash tftp copy cflash xmodem
Syntax Description
<new file> boot cflash <new file> flash <new file> http <url> Specifies the name of the file (located on the CompactFlash card) to copy. Copies the specified source file and overwrites the boot read only memory (ROM). Copies the specified source file and saves it to the CompactFlash card using the specified new file name. Copies the specified source file and saves it to flash memory using the specified file name. Copies the specified source file and transfers it to a Hypertext Transfer Protocol (HTTP) server using the specified HTTP server uniform resource locator (URL). Use HTTP PUT operation. Copies the specified source file and transfers it to a secure socket Hypertext Transfer Protocol Secure (HTTPS) server using the specified HTTPS server URL. Use HTTPS PUT operation. Updates the specified interface using a copy of the specified file. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type copy cflash <sourcefile> interface ? to display a list of valid interfaces. Optional. Specifies the port used to transfer the specified file to an HTTP or HTTPS server. Range is 0 to 65335. Replaces the startup configuration with the specified file copied from the CompactFlash card. Copies any file on the CompactFlash card to a specified Trivial File Transfer Protocol (TFTP) server.
https <url>
interface <interface>
60000CRG0-35B
176
Enable Mode Command Set After entering copy cflash tftp, AOS prompts for the following information: Address of remote host: Source filename: Destination filename: Specifies the IP address of the TFTP server. Specifies the name of the file to copy to the TFTP server. Specifies the file name to use when storing the copied file on the TFTP server. (The file will be placed in the default directory established by the TFTP server.)
xmodem
Copies any file on the CompactFlash card (using the XMODEM protocol) to the terminal connected to the console port. XMODEM capability is provided in VT100 terminal emulation software, such as HyperTerminal. After entering copy cflash xmodem, AOS prompts for the following information: Source filename: Specifies the name of the file to copy from CompactFlash to the connected terminal.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 16.1 Release 17.2 Release A4.01 Release A4.05 Command was introduced. Command was expanded to include HTTP and HTTPS. Command was expanded to include the cellular interface. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface. Command was expanded to include the asymmetric digital subscriber line (ADSL) interface.
Usage Examples
The following example copies the source file myfile.biz (located on the CompactFlash card) to flash memory (naming the new file newfile.biz): >enable #copy cflash myfile.biz flash newfile.biz The following example creates a copy of the file myfile.biz (located on the CompactFlash card), names the new file newfile.biz, and places the new file on the installed CompactFlash card: >enable #copy cflash myfile.biz cflash newfile.biz The following example replaces the startup configuration file with the file newconfig.txt: >enable
60000CRG0-35B
177
The following example copies the file myfile.biz (located on the CompactFlash card) to the specified TFTP server: >enable #copy cflash tftp Address of remote host?10.200.2.4 Source filename myfile.biz Destination filename myfile.biz Initiating TFTP transfer... Received 45647 bytes. Transfer Complete! The following example copies the file myfile.biz (located on the CompactFlash card) to the connected terminal using XMODEM protocol: >enable #copy cflash xmodem Source filename myfile.biz Begin the Xmodem transfer now... Press CTRL+X twice to cancel CCCCCC AOS is now ready to transmit the file on the CONSOLE port (using the XMODEM protocol). The next step in the process may differ depending on the type of terminal emulation software you are using. For HyperTerminal, you will now select Transfer > Receive File and select the destination. Once the transfer is complete, information similar to the following is displayed: Received 231424 bytes. Transfer complete
60000CRG0-35B
178
copy console
Use the copy console command to copy the consoles input to a text file. To stop copying to the text file, type <Ctrl+D>. The file will be saved in the AOS root directory. Variations of this command (valid only on AOS units WITHOUT CompactFlash capability) include:
copy console <filename>
Variations of this command (valid only on AOS units WITH CompactFlash capability) include:
copy console flash <filename> copy console flash <filename> force-overwrite
Syntax Description
<filename> flash <filename> force-overwrite Copies the console input and saves it to flash memory using the specified file name. Copies the console input and saves it to flash memory using the specified file name. Optional. Specifies a force override to copy the file.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Command was introduced.
Functional Notes
The copy console command works much like a line editor. Prior to pressing <Enter>, changes can be made to the text on the line. Changes can be made using <Delete> and <Backspace> keys. The text can be traversed using the arrow keys, <Ctrl+A> (to go to the beginning of a line), and <Ctrl+E> (to go to the end of a line). To end copying to the text file, type <Ctrl+D>. The file will be saved in the AOS root directory. Use the dir command to see a list of files in the root directory.
Usage Examples
The following example copies the console input into the file config.txt (located in the AOS root directory): >enable #copy console flash config.txt
60000CRG0-35B
179
copy dynvoice-config
Use the copy dynvoice-config command to copy the dynamic voice configuration file to the specified destination. Variations of this command (valid only on AOS units WITH CompactFlash AND voice capability) include:
copy dynvoice-config cflash <filename> copy dynvoice-config flash <filename> copy dynvoice-config http <url> copy dynvoice-config running-config copy dynvoice-config tftp copy dynvoice-config xmodem
Syntax Description
cflash <filename> flash <filename> http <url> Copies the dynamic voice configuration file and saves it to the CompactFlash card using the specified file name. Copies the dynamic voice configuration file and saves it to flash memory using the specified file name. Copies the dynamic voice configuration file and transfers it to a Hypertext Transfer Protocol (HTTP) server using the specified HTTP server uniform resource locator (URL). Use HTTP PUT operation. Replaces the active running configuration with a copy of the dynamic voice configuration file. Copies the dynamic voice configuration file and saves it to the specified Trivial File Transfer Protocol (TFTP) server. After entering copy dynvoice-config tftp, AOS prompts for the following information: Address of remote host: Source filename: Destination filename: Specifies the IP address of the TFTP server. Specifies the name of the file (located on the CompactFlash card) to copy to the TFTP server. Specifies the file name to use when storing the copied file on the TFTP server. (The file will be placed in the default directory established by the TFTP server.)
running-config tftp
xmodem
Copies the dynamic voice configuration file (using the XMODEM protocol) and saves it to the terminal connected to the console port. XMODEM capability is provided in VT100 terminal emulation software, such as HyperTerminal. After entering copy dynvoice-config xmodem, AOS prompts for the following information: Source filename: Specifies the name of the file to copy from CompactFlash to the connected terminal.
60000CRG0-35B
180
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 16.1 Command was introduced. Command was expanded to include HTTP.
Usage Examples
The following example copies the dynamic voice configuration file and saves it to the CompactFlash card using the name myvoice-config: >enable #copy dynvoice-config cflash myvoice-config Percent Complete 100% The following example copies the dynamic voice configuration file and saves it to flash memory using the name myvoice-config: >enable #copy dynvoice-config flash myvoice-config Percent Complete 100% The following example replaces the active running configuration with a copy of the dynamic voice configuration file: >enable #copy dynvoice-config running-config Percent Complete 100% The following example copies the dynamic voice configuration file and saves it to the TFTP server: >enable #copy dynvoice-config tftp Address of remote host?10.200.2.4 Destination filename?myvoice-config Initiating TFTP transfer... Sent 5221 bytes. Transfer complete.
60000CRG0-35B
181
The following example copies the dynamic voice configuration file (using the XMODEM protocol) and saves it to the terminal connected to the console port: >enable #copy dynvoice-config xmodem Begin the Xmodem transfer now... Press CTRL+X twice to cancel CCCCCC AOS is now ready to transmit the file on the CONSOLE port (using the XMODEM protocol). The next step in the process may differ depending on the type of terminal emulation software you are using. For HyperTerminal, you will now select Transfer > Receive File and select the destination. Once the transfer is complete, information similar to the following is displayed: Sent 5221 bytes. Transfer complete
60000CRG0-35B
182
copy flash
Use the copy flash command to copy files located in flash memory to a specified destination. Variations of this command (valid only on AOS units WITH CompactFlash capability) include:
copy flash <source file> boot copy flash <source file> cflash copy flash <source file> cflash <new file> copy flash <source file> flash <new file> copy flash <source file> http <url> port <port> copy flash <source file> https <url> port <port> copy flash <source file> interface <interface> copy flash <source file> startup-config
Variations of this command (valid only on AOS units WITH CompactFlash AND voice capability) include:
copy flash <source file> dynvoice-config
Variations of this command (valid only on AOS units with ramdisk enabled) include:
copy flash <source file> ramdisk copy flash <source file> ramdisk <new file>
Syntax Description
<source file> <new file> boot cflash dynvoice-config flash http <url> Specifies the name of the file (located in flash memory) to copy. Saves the file using the specified file name. Copies the specified source file and overwrites the boot read only memory (ROM). Copies a file and saves it to the CompactFlash card. Replaces the dynamic voice configuration file with the specified file copied from flash memory. Copies the specified file and saves it to flash memory. Copies the specified source file and transfers it to a Hypertext Transfer Protocol (HTTP) server using the specified HTTP server uniform resource locator (URL). Use HTTP PUT operation. Copies the specified source file and transfers it to a secure socket Hypertext Transfer Protocol Secure (HTTPS) server using the specified HTTPS server URL. Use HTTPS PUT operation.
https <url>
60000CRG0-35B
183
Enable Mode Command Set Updates the specified interface using a copy of the specified file. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type copy flash <sourcefile> interface ? to display a list of valid interfaces. Optional. Specifies the port used to transfer the specified file to an HTTP or HTTPS server. Range is 0 to 65335. Copies a file and saves it to the volatile RAM disk. Replaces the startup configuration file with a copy of the specified file. Copies any file located in flash memory to a specified Trivial File Transfer Protocol (TFTP) server. After entering copy flash tftp, AOS prompts for the following information: Address of remote host: Specifies the IP address of the TFTP server. Source filename: Specifies the name of the file (located in flash memory) to copy to the TFTP server. Destination filename: Specifies the file name to use when storing the copied file on the TFTP server. (The file will be placed in the default directory established by the TFTP server.) Copies any file located in flash memory (using the XMODEM protocol) to the terminal connected to the console port. XMODEM capability is provided in VT100 terminal emulation software, such as HyperTerminal. After entering copy flash xmodem, AOS prompts for the following information: Source filename: Specifies the name of the file to copy from system flash memory using XMODEM.
xmodem
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 16.1 Release 17.2 Release 17.7 Release A4.01 Release A4.05 Command was introduced. Command was expanded to include HTTP and HTTPS. Command was expanded to include the cellular interface. Command was expanded to include the ramdisk parameter. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface. Command was expanded to include the asymmetric digital subscriber line (ADSL) interface.
60000CRG0-35B
184
Usage Examples
The following example creates a copy of the file myfile.biz (located in flash memory), names the new file newfile.biz, and places the new file in flash memory: >enable #copy flash myfile.biz flash newfile.biz The following example copies the file myfile.biz (located in flash memory) to CompactFlash memory (naming the new file newfile.biz): >enable #copy flash myfile.biz cflash newfile.biz The following example copies the file new_startup_config (located in flash memory) to the startup configuration: >enable #copy flash new_startup_config startup-config The following example copies the software file myfile.biz (located in flash memory) to a TFTP server: >enable #copy flash tftp Address of remote host? 10.200.2.4 Source filename? myfile.biz Destination filename? myfile.biz Initiating TFTP transfer... Sent 769060 bytes. Transfer Complete! The following example copies the software file myfile.biz (located in flash memory) to the connected terminal using XMODEM protocol: >enable #copy flash xmodem Source filename? myfile.biz Begin the Xmodem transfer now... Press CTRL+X twice to cancel CCCCCC AOS is now ready to transmit the file on the CONSOLE port (using the XMODEM protocol). The next step in the process may differ depending on the type of terminal emulation software you are using. For HyperTerminal, you will now select Transfer > Receive File and select the destination. Once the transfer is complete, information similar to the following is displayed: Sent 231424 bytes. Transfer complete
60000CRG0-35B
185
copy http
Use the copy http command to copy a file located on a network Hypertext Transfer Protocol (HTTP) server to a specified destination. Variations of this command (valid only on AOS units WITH CompactFlash capability) include:
copy http <url> cflash <destination file> copy http <url> cflash <destination file> force-overwrite copy http <url> cflash <destination file> force-overwrite port <port> copy http <url> cflash <destination file> port <port> copy http <url> cflash running-config copy http <url> cflash running-config port <port>
Variations of this command (valid only on AOS units WITH CompactFlash AND voice capability) include:
copy http <url> dynvoice-config
Variations of this command (valid only on AOS units with ramdisk enabled) include:
copy http <url> ramdisk <destination file> copy http <url> ramdisk <destination file> force-overwrite copy http <url> ramdisk <destination file> force-overwrite port <port> copy http <url> ramdisk <destination file> port <port> copy http <url> ramdisk running-config copy http <url> ramdisk running-config port <port>
Syntax Description
cflash <destination file> dynvoice-config flash force-overwrite Copies a file from the HTTP server to the CompactFlash card. Specifies the new name of the file after it is copied. Specifies that the file copied from the HTTP server overwrite the dynamic voice configuration file. Copies a file from the HTTP server to the flash memory. Optional. Specifies a force override to copy the file.
60000CRG0-35B
186
Command Reference Guide port <port> ramdisk running-config startup-config http <url>
Enable Mode Command Set Optional. Specifies the port used to transfer the specified file from an HTTP server. Range is 0 to 65335. Copies a file from the HTTP server to the volatile RAM disk. Replaces the active running configuration with the file copied from the HTTP server. Replaces the startup configuration with the file copied from the HTTP server. Specifies the URL of the HTTP server.
Default Values
By default, the port value is 80.
Command History
Release 16.1 Release 17.7 Command was introduced. Command was expanded to include the ramdisk parameter.
Usage Examples
The following example replaces the current running configuration file with newconfig.txt from the HTTP server (10.200.2.4): #copy http http://10.200.2.4/newconfig.txt running-config Initiating HTTP transfer... Received 4562 bytes. Transfer Complete! # The following example copies the file myfile.biz from the HTTP server (10.200.2.4) and saves it CompactFlash memory (naming the copy newfile.biz): #copy http http://10.200.2.4/SomeDirectory/AnotherDirectory/myfile.biz cflash newfile.biz Initiating HTTP transfer... Received 45647 bytes. Transfer Complete! #
60000CRG0-35B
187
copy https
Use the copy https command to copy a file located on a secure socket Hypertext Transfer Protocol Secure (HTTPS) server to a specified destination using the HTTPS PUT operation. Variations of this command (valid only on AOS units WITH CompactFlash capability) include:
copy https <url> cflash <destination file> copy https <url> cflash <destination file> force-overwrite copy https <url> cflash <destination file> force-overwrite port <port> copy https <url> cflash <destination file> port <port> copy https <url> cflash running-config copy https <url> cflash running-config port <port>
Variations of this command (valid only on AOS units WITH CompactFlash AND voice capability) include:
copy https <url> dynvoice-config
Variations of this command (valid only on AOS units with ramdisk enabled) include:
copy https <url> ramdisk <destination file> copy https <url> ramdisk <destination file> force-overwrite copy https <url> ramdisk <destination file> force-overwrite port <port> copy https <url> ramdisk <destination file> port <port> copy https <url> ramdisk running-config copy https <url> ramdisk running-config port <port>
Syntax Description
cflash <destination file> dynvoice-config flash Copies a file from the HTTP secure server to the CompactFlash card. Specifies the new name of the file after it is copied. Specifies that the file copied from the HTTP secure server overwrite the dynamic voice configuration file. Copies a file from the HTTP secure server to the flash memory.
60000CRG0-35B
188
Command Reference Guide force-overwrite port <port> ramdisk running-config startup-config https <url>
Enable Mode Command Set Optional. Specifies a force override to copy the file. Optional. Specifies the port used to transfer the specified file from an HTTP secure server. Range is 0 to 65335. Copies a file from the HTTP secure server to the volatile RAM disk. Replaces the active running configuration with the file copied from the HTTP secure server. Replaces the startup configuration with the file copied from the HTTP secure server. Specifies the URL of the HTTP secure server.
Default Values
By default, the port value is 443.
Command History
Release 16.1 Release 17.7 Command was introduced. Command was expanded to include the ramdisk parameter.
Usage Examples
The following example replaces the current running configuration file with newconfig.txt from the HTTPS server (MyWebServer): #copy https https://MyWebServer.com/newconfig.txt running-config Initiating HTTPS transfer... Received 4562 bytes. Transfer Complete! # The following example copies the file myfile.biz from the HTTPS server (10.200.2.4) and saves it CompactFlash memory (naming the copy newfile.biz): #copy https https://10.200.2.4/myfile.biz cflash newfile.biz Initiating HTTPS transfer... Received 45647 bytes. Transfer Complete! #
60000CRG0-35B
189
copy ramdisk
Use the copy ramdisk command to copy files located in the volatile RAM disk memory to a specified destination. Variations of this command include:
copy ramdisk <source file> flash copy ramdisk <source file> flash <new file> copy ramdisk <source file> overwrite primary copy ramdisk <source file> overwrite primary verify copy ramdisk <source file> overwrite secondary copy ramdisk <source file> overwrite secondary verify copy ramdisk tftp copy ramdisk xmodem
Not all units are capable of using a RAM disk file system. Use the copy ? command to display a list of valid commands at the enable prompt.
Syntax Description
<source file> flash flash <new file> overwrite primary Specifies the name of the file (located on the RAM disk) to copy. Copies the specified file and saves it to the system flash memory using the same file name. Copies the specified file and saves it to the system flash memory using the specified file name. Replaces the primary boot image file with the file from RAM disk. The file to be overwritten is deleted prior to copying the new file. In order for this command to succeed, the RAM disk must be mounted, the specified file must exist, and the specified file must verify with a valid signature for the unit. Replaces the secondary boot image file with the file from RAM disk. The file to be overwritten is deleted prior to copying the new file. In order for this command to succeed, the RAM disk must be mounted, the specified file must exist, and the specified file must verify with a valid signature for the unit. Copies the specified file from the RAM disk to a specified Trivial File Transfer Protocol (TFTP) server. After entering the command, AOS prompts for the following information: Address of remote host: Specifies the IP address of the TFTP server. Source filename: Specifies the name of the file (located on the RAM disk) to copy to the TFTP server. Destination filename: Specifies the file name to use when storing the copied file on the TFTP server. (The file will be placed in the default directory established by the TFTP server.)
overwrite secondary
tftp
60000CRG0-35B
190
Enable Mode Command Set Copies the specified file from the RAM disk (using the XMODEM protocol) to the terminal connected to the console port. XMODEM capability is provided in VT100 terminal emulation software, such as HyperTerminal. After entering the command, AOS prompts for the following information: Source filename: Specifies the name of the file (located on the RAM disk) to copy using XMODEM. Optional. Specifies that a second verification of the new primary or secondary boot system image is performed after it is copied.
verify
Default Values
No default values are necessary for this command.
Command History
Release 17.7 Command was introduced.
Usage Examples
The following example creates a copy of the file myfile.biz (located on the RAM disk), names the new file newfile.biz, and places the new file in flash memory: >enable #copy ramdisk myfile.biz flash newfile.biz The following example copies the software file myfile.biz (located on the RAM disk) to a TFTP server: >enable #copy ramdisk tftp Address of remote host? 10.200.2.4 Source filename? myfile.biz Destination filename? myfile.biz Initiating TFTP transfer... Sent 769060 bytes. Transfer Complete! The following example copies the software file myfile.biz (located on the RAM disk) to the connected terminal using XMODEM protocol: >enable #copy ramdisk xmodem Source filename? myfile.biz Begin the Xmodem transfer now... Press CTRL+X twice to cancel CCCCCC
60000CRG0-35B
191
AOS is now ready to transmit the file on the CONSOLE port (using the XMODEM protocol). The next step in the process may differ depending on the type of terminal emulation software you are using. For HyperTerminal, you will now select Transfer > Receive File and select the destination. Once the transfer is complete, information similar to the following is displayed: Sent 231424 bytes. Transfer complete
60000CRG0-35B
192
copy running-config
Use the copy running-config command to create a copy of the current running configuration and replace the current startup configuration or save it to a specified location. Variations of this command (valid only on AOS units WITH CompactFlash capability) include:
copy running-config cflash <filename> copy running-config cflash startup-config copy running-config flash <filename> copy running-config flash startup-config
Variations of this command (valid only on AOS units WITH CompactFlash AND voice capability) include:
copy running-config dynvoice-config copy running-config dynvoice-config tftp copy running-config dynvoice-config http <url> copy running-config non-dynvoice-config http <url>
Variations of this command (valid only on AOS units ramdisk enabled) include:
copy running-config ramdisk <filename>
Syntax Description
cflash dynvoice-config <filename> flash http <url> Copies the current running configuration and saves it to the CompactFlash card. Copies the current active voice running configuration and saves it to the dynamic voice configuration file. Specifies the filename to use when saving the configuration file. Copies the current running configuration and saves it to flash memory. Copies the current running configuration file or newly stored dynamic voice configuration file, and transfers it to a Hypertext Transfer Protocol (HTTP) server using the specified HTTP server uniform resource locator (URL). Uses the HTTP PUT operation. Copies the current running configuration file and transfers it to a secure socket Hypertext Transfer Protocol Secure (HTTPS) server using the specified HTTPS server URL. Uses the HTTPS PUT operation.
https <url>
60000CRG0-35B
193
Enable Mode Command Set Copies the current nondynamic portion of the voice running configuration and saves it to the nondynamic voice configuration file. Copies current running configuration to the volatile RAM disk. Replaces the startup configuration (located in either CompactFlash or system flash) with a copy of the current running configuration. Copies the current running configuration or newly stored dynamic voice configuration file to the specified Trivial File Transfer Protocol (TFTP) server. After entering copy running-config tftp or copy running-config dynvoice-config tftp, AOS prompts for the following information: Address of remote host: Destination filename: Specifies the IP address of the TFTP server. Specifies the file name to use when storing the copied file on the TFTP server. (The file will be placed in the default directory established by the TFTP server.)
xmodem
Copies the current running configuration (using the XMODEM protocol) to the terminal connected to the console port. XMODEM capability is provided in VT100 terminal emulation software, such as HyperTerminal.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 16.1 Release 17.7 Command was introduced. Command was expanded to include HTTP and HTTPS. Command was expanded to include the ramdisk parameter.
Usage Examples
The following example copies the current running configuration to the startup configuration located in flash memory: >enable #copy running-config flash startup-config Building configuration... Done. Success! The following example copies the current running configuration to CompactFlash memory and names the file config_01.txt: >enable #copy running-config cflash config_01.txt Percent Compete 100% #
60000CRG0-35B
194
The following example copies the current running configuration to a TFTP server and names the file config_01.txt: >enable #copy running-config tftp Address of remote host? 10.200.2.4 Destination filename? config_01.txt Initiating TFTP transfer... Sent 3099 bytes. Transfer Complete! The following example copies the current running configuration to the connected terminal using XMODEM protocol: >enable #copy running-config xmodem Begin the Xmodem transfer now... Press CTRL+X twice to cancel CCCCCC AOS is now ready to transmit the file on the CONSOLE port (using the XMODEM protocol). The next step in the process may differ depending on the type of terminal emulation software you are using. For HyperTerminal, you will now select Transfer > Receive File and select the destination. Once the transfer is complete, information similar to the following is displayed: Sent 3704 bytes. Transfer complete
60000CRG0-35B
195
copy startup-config
Use the copy startup-config command to create a copy of the current startup configuration file and replace the current running configuration or save it to a specified memory location. Variations of this command (valid only on AOS units with CompactFlash capability) include:
copy startup-config cflash <filename> copy startup-config flash <filename>
Variations of this command (valid only on AOS units with ramdisk enabled) include:
copy startup-config ramdisk <filename>
Syntax Description
cflash <filename> flash <filename> <filename> http <url> Copies the startup configuration and saves it to the CompactFlash card using the specified file name. Copies the startup configuration and saves it to flash memory using the specified file name. Specifies the filename to use when saving the startup configuration file. Copies the startup configuration file and transfers it to a Hypertext Transfer Protocol (HTTP) server using the specified HTTP server uniform resource locator (URL). Uses HTTP PUT operation. Copies the startup configuration file and transfers it to a secure socket Hypertext Transfer Protocol Secure (HTTPS) server using the specified HTTPS server URL. Uses HTTPS PUT operation. Copies current startup configuration to the volatile RAM disk using the specified file name. Merges the current running configuration with the startup configuration. Copies the current startup configuration to a specified Trivial File Transfer Protocol (TFTP) server. After entering copy startup-config tftp, AOS prompts for the following information: Address of remote host: Specifies the IP address of the TFTP server.
https <url>
60000CRG0-35B
196
Enable Mode Command Set Specifies the file name to use when storing the copied file on the TFTP server. (The file will be placed in the default directory established by the TFTP server.)
xmodem
Copies the current startup configuration (using the XMODEM protocol) to the terminal connected to the console port. XMODEM capability is provided in VT100 terminal emulation software, such as HyperTerminal.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 16.1 Release 17.7 Command was introduced. Command was expanded to include HTTP and HTTPS. Command was expanded to include the ramdisk parameter.
Usage Examples
The following example copies the startup configuration file to the current running configuration: >enable #copy startup-config running-config Opening and applying file...
Any changes made to the current running configuration of the AOS unit that have not been saved to the startup configuration file (using the write command) will be lost when the copy startup-config running-config command is entered.
The following example copies the startup configuration (located in flash memory) to CompactFlash and names the file config_01.txt: >enable #copy startup-config cflash config_01.txt Percent Complete 100% # The following example copies the current startup configuration to a TFTP server and names the file startup_01.txt: >enable #copy startup-config tftp Address of remote host? 10.200.2.4 Destination filename? startup_01.txt Initiating TFTP transfer... Sent 3099 bytes. Transfer Complete!
60000CRG0-35B
197
The following example copies the current startup configuration to the connected terminal using XMODEM protocol: >enable #copy startup-config xmodem Begin the Xmodem transfer now... Press CTRL+X twice to cancel CCCCCC AOS is now ready to transmit the file on the CONSOLE port (using the XMODEM protocol). The next step in the process may differ depending on the type of terminal emulation software you are using. For HyperTerminal, you will now select Transfer > Receive File and select the destination. Once the transfer is complete, information similar to the following is displayed: Sent 3704 bytes. Transfer complete
60000CRG0-35B
198
copy tftp
Use the copy tftp command to copy a file located on a network Trivial File Transfer Protocol (TFTP) server to a specified destination. Variations of this command (valid only on AOS units WITH CompactFlash capability) include:
copy tftp cflash
Variations of this command (valid only on AOS units WITH CompactFlash AND voice capability) include:
copy tftp dynvoice-config
Variations of this command (valid only on AOS units with ramdisk enabled) include:
copy tftp ramdisk
Syntax Description
cflash dynvoice-config flash ramdisk running-config startup-config Copies a file from the TFTP server to the CompactFlash card. Specifies that the file copied from the TFTP server overwrite the dynamic voice configuration file. Copies a file from the TFTP server to the flash memory. Copies a file from the TFTP server to the volatile RAM disk. Replaces the active running configuration with the file copied from the TFTP server. Replaces the startup configuration with the file copied from the TFTP server. After entering copy tftp and specifying the destination, AOS prompts for the following information: Address of remote host: Source filename: Destination filename: Specifies the IP address of the TFTP server. Specifies the name of the file to copy from the TFTP server. Specifies the file name to use when storing the copied file. (Valid only for the copy tftp cflash, copy tftp flash, copy tftp ramdisk commands.)
60000CRG0-35B
199
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 17.7 Command was introduced. Command was expanded to include the ramdisk parameter.
Usage Examples
The following example replaces the current running configuration file with newconfig.txt from the TFTP server (10.200.2.4): #copy tftp running-config Address of remote host? 10.200.2.4 Source filename? newconfig.txt Initiating TFTP transfer... Received 4562 bytes. Transfer Complete! # The following example copies the file myfile.biz from the TFTP server (10.200.2.4) and saves it CompactFlash memory (naming the copy newfile.biz): #copy tftp cflash Address of remote host? 10.200.2.4 Source filename? myfile.biz Destination filename? newfile.biz Initiating TFTP transfer... Received 45647 bytes. Transfer Complete! #
60000CRG0-35B
200
copy xmodem
Use the copy xmodem command to copy a file (using the XMODEM protocol) to a specified destination. XMODEM capability is provided in VT100 terminal emulation software, such as HyperTerminal. Variations of this command (valid only on AOS units WITH CompactFlash capability) include:
copy xmodem cflash
Variations of this command (valid only on AOS units WITH CompactFlash AND voice capability) include:
copy xmodem dynvoice-config
Variations of this command (valid only on AOS units with ramdisk enabled) include:
copy xmodem ramdisk
Syntax Description
cflash Copies a file from the terminal connected to the console port and saves it to the CompactFlash card. After entering copy xmodem cflash, AOS prompts for the following information: Destination filename: dynvoice-config flash Specifies the file name to use when storing the copied file to cflash memory.
Specifies that the file copied from the terminal connected to the console port overwrite the dynamic voice configuration file. Copies a file from the terminal connected to the console port and saves it to flash memory. After entering copy xmodem flash, AOS prompts for the following information: Destination filename: Specifies the file name to use when storing the copied file to flash memory.
Copies a file from the terminal connected to the console port and saves it to the volatile RAM disk. Replaces the active running configuration with a file copied from the terminal connected to the console port. Replaces the startup configuration with a file copied from the terminal connected to the console port.
60000CRG0-35B
201
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 17.7 Command was introduced. Command was expanded to include the ramdisk parameter.
Usage Examples
The following example copies a software file (myfile.biz) to flash memory and renames it newfile.biz: #copy xmodem flash Destination filename? newfile.biz Begin the Xmodem transfer now... Press CTRL+X twice to cancel CCCCCC AOS is now ready to accept the file on the CONSOLE port (using the XMODEM protocol). The next step in the process may differ depending on the type of terminal emulation software you are using. For HyperTerminal, you will now select Transfer > Send File and browse to the file you wish to copy myfile.biz. Once the transfer is complete, information similar to the following is displayed: Received 531424 bytes. Transfer complete
60000CRG0-35B
202
debug aaa
Use the debug aaa command to activate debug messages associated with authentication from the authentication, authorization, and accounting (AAA) subsystem. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
The debug aaa events include connection notices, login attempts, and session tracking.
Usage Examples
The following is sample output for this command: >enable #debug aaa AAA: New Session on portal 'TELNET 0 (172.22.12.60:4867)'. AAA: No list mapped to 'TELNET 0'. Using 'default'. AAA: Attempting authentication (username/password). AAA: RADIUS authentication failed. AAA: Authentication failed. AAA: Closing Session on portal 'TELNET 0 (172.22.12.60:4867)'.
60000CRG0-35B
203
Syntax Description
<name> Specifies a configured ACL.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 6.1 Command was introduced.
Functional Notes
The debug access-list command provides debug messages to aid in troubleshooting ACL issues. These debug messages are populated by traffic matches that occur when traffic is filtered through the ACL. The ACL must have the logging feature enabled in order to populate the debug message. To enable ACL match logging, refer to the IPv4 Access Control List Command Set on page 2755.
Usage Examples
The following is sample output of debug messages for the ACL labeled MatchAll: >enable #debug access-list MatchAll 2009.06.09 14:15:03 ACCESS_LIST.MatchAll 2009.06.09 14:15:13 ACCESS_LIST.MatchAll 2009.06.09 14:15:57 ACCESS_LIST.MatchAll
permit host 192.168.0.1 log (1 matches) permit host 192.168.0.1 log (3 matches) permit host 192.168.0.1 log (1 matches)
60000CRG0-35B
204
debug arp
Use the debug arp command to activate debug messages associated with IP Address Resolution Protocol (ARP) transactions. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example activates debug messages associated with ARP transactions: >enable #debug arp
60000CRG0-35B
205
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example activates ATM event messages: >enable #debug atm events
60000CRG0-35B
206
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
<vcd> loopback end-to-end segment <LLID> Optional. Shows OAM packets for a specific VCD. Optional. Configures an OAM loopback. Optional. Configures an end-to-end OAM loopback. Optional. Configures a segment loopback. Optional. Specifies 16 byte OAM loopback location ID (LLID).
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example activates ATM OAM debug messages for VCD 1: >enable #debug atm oam 1
60000CRG0-35B
207
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
interface atm <port id> vc <VPI/VCI> Optional. Activates packet debug messages for a specific ATM port and for all virtual circuits. Optional. Activates packet debug messages for the specified virtual circuit identified by the virtual path identifier and virtual channel identifier (VPI/VCI). Optional. Activates packet debug messages for the specified virtual circuit descriptors (VCDs).
vcd <number>
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example activates debug ATM packet debug messages on ATM port 1: >enable #debug atm packet interface atm 1
60000CRG0-35B
208
debug auto-config
Use the debug auto-config command to activate debug messages associated automatic configuration events. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example activates debug messages associated with automatic configuration events: >enable #debug auto-config
60000CRG0-35B
209
debug auto-link
Use the debug auto-link command to display event messages for the auto-link feature configuration. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.3/A2 Command was introduced.
Usage Examples
The following example activates auto-link debug messages: >enable #debug auto-link
60000CRG0-35B
210
debug bridge
Use the debug bridge command to display messages associated with bridge events. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example activates bridge debug messages: >enable #debug bridge
60000CRG0-35B
211
Syntax Description
<chat interface> Activates debug messages for the specified chat interface identified by the slot/port.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example activates debug messages for the chat interface 0/1: >enable #debug chat-interfaces 0/1
60000CRG0-35B
212
debug color
Use the debug color command to activate color coding of debug messages. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the color coding of debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 16.1 Command was introduced.
Functional Notes
Color coding is based on the debug source and color choices are not configurable.
Usage Examples
The following example enables color coding of debug messages: >enable #debug color
60000CRG0-35B
213
debug crypto
Use the debug crypto command to activate debug messages associated with Internet key exchange (IKE) and Internet Protocol security (IPsec) functions. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages.Variations of this command include:
debug crypto ike debug crypto ike client authentication debug crypto ike client configuration debug crypto ike negotiation debug crypto ipsec debug crypto pki
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
ike ike client authentication ike client configuration Activates all IKE debug messages. Optional. Displays IKE client authentication messages as they occur. Optional. Displays mode-config exchanges as they take place over the IKE SA. It is enabled independently from the debug ike negotiation messaging. Optional. Activates only IKE key management debug messages (e.g., handshaking). Activates all IPsec debug messages. Activates all public key infrastructure (PKI) debug messages.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 4.1 Release 6.1 Command was introduced. Debug pki command was introduced.
Usage Examples
The following example activates the IPsec debug messages: >enable #debug crypto ipsec
60000CRG0-35B
214
debug data-call
Use the debug data-call command to activate debug messages associated with data call errors and events. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example activates debug messages associated with data call errors and events: >enable #debug data-call
60000CRG0-35B
215
debug demand-routing
Use the debug demand-routing command to activate debug messages associated with demand routing errors and events. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example activates demand routing error and event messages: >enable #debug demand-routing
60000CRG0-35B
216
debug desktop-auditing
Use the debug desktop-auditing command to enable debug messages for clients connected to the network. The desktop auditing debug messages include the network access protection (NAP) messages sent between clients and the server. Debug messages can be activated for all clients connected to the network, or only for specific clients. Using the no form of this command disables debug messaging for desktop auditing clients. Variations of this command include:
debug desktop-auditing debug desktop-auditing hostname <hostname> debug desktop-auditing interface gigabit-switchport <slot/port> debug desktop-auditing ip <ip address> debug desktop-auditing mac <mac address>
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
hostname <hostname> interface gigabit-switchport <slot/port> ip <ip address> Optional. Activates debug messages only for the client with the specified host name. Optional. Activates debug messages only for the client using the specified interface. Optional. Activates debug messages only for the client with the specified IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Activates debug messages only for the client with the specified medium access control (MAC) address. MAC addresses should be expressed in the following format: xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01).
Default Values
No default values are necessary for this command.
Command History
Release 17.8 Command was introduced.
60000CRG0-35B
217
Usage Examples
The following is sample output of the debug desktop-auditing command: 2009.08.31 14:30:30 DESKTOP_AUDITING.DHCP.giga-swx 0/5 from 00:E0:29:0E:D5:E3 NAP Capable client 2009.08.31 14:30:31 DESKTOP_AUDITING.DHCP.giga-swx 0/24 from 00:E0:29:0E:D5:E5 to 00:E0:29:0E:D5:E3 NAP Capable Server 2009.08.31 14:30:31 DESKTOP_AUDITING.DHCP.giga-swx 0/5 from 00:E0:29:0E:D5:E3 to 00:E0:29:0E:D5:E5 NAP SoH: Firewall is 3rd-Party, AutoUpdates not downloading or installing 2009.08.31 14:30:31 DESKTOP_AUDITING.DHCP.giga-swx 0/24 from 00:E0:29:0E:D5:E5 to 00:E0:29:0E:D5:E3 NAP SoHR: OK
60000CRG0-35B
218
debug dial-backup
Use the debug dial-backup command to activate debug messages associated with dial-backup operation. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 1.1 Release 2.1 Command was introduced. Additional debug messages were implemented for dial-backup operation to ADTRANs IQ and Express Series products.
Functional Notes
The debug dial-backup command activates debug messages to aid in the troubleshooting of dial-backup links.
Usage Examples
The following example activates debug messages for dial-backup operation: >enable #debug dial-backup
60000CRG0-35B
219
debug dialup-interfaces
Use the debug dialup-interfaces command to generate debug messages used to aid in troubleshooting problems with all dialup interfaces, such as the modem or the basic rate interface (BRI) cards. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 2.1 Command was introduced.
Functional Notes
When enabled, these messages provide status information on incoming calls, dialing and answering progress, etc. These messages also give information on why certain calls are dropped or rejected. It is beneficial to use this command when troubleshooting dial backup (in addition to the debug dial-backup command).
Usage Examples
The following example activates the debug messages for dialup interfaces: >enable #debug dialup-interfaces
60000CRG0-35B
220
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example activates all dot11 debug messages on the AC: >enable #debug dot11 all
60000CRG0-35B
221
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
interface dot11ap <ap interface> Optional. Activates debug messages for the specified AP interface. Range is 1 to 8.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example activates debug messages for clients on AP interface 1: >enable #debug dot11 client interface dot11ap 1 2006.12.23 19:47:04 Dot11 Client: AP(1) Radio(1) VAP(1)Rx associate command from AP for 00:40:96:AB:3B:5E. 2006.12.23 19:48:40 Dot11 Client: AP(1) Radio(1) VAP(1)Rx disassociate command from AP for 00:40:96:AB:3B:5E.
These debug messages were captured as a wireless client associated and then disassociated with the AP.
60000CRG0-35B
222
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
interface <interface> Optional. Activates debug messages for the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type debug dot11 packet-events interface ? for a complete list of valid interfaces.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example activates packet-events debug messages on access point (AP) interface 1: >enable #debug dot11 packet-events interface dot11ap 1 #2006.12.23 18:54:25 Dot11 Packet Events: Rx Echo Req from MAC(00:A0:C8:1D:F8:57) AP(1) 2006.12.23 18:54:25 Dot11 Packet Events: Tx Echo Resp to MAC(00:A0:C8:1D:F8:57) AP(1) 2006.12.23 18:54:29 Dot11 Packet Events: Tx Query Req to MAC(00:A0:C8:1D:F8:57) AP(1) 2006.12.23 18:54:29 Dot11 Packet Events: Rx Query Resp from MAC(00:A0:C8:1D:F8:57) AP(1) 2006.12.23 18:54:36 Dot11 Packet Events: Rx Disc Resp from MAC(00:A0:C8:1D:F8:57) AP(1)
60000CRG0-35B
223
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
interface <interface> Optional. Activates debug messages for the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type debug dot11 session interface ? for a complete list of valid interfaces.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example activates all dot11 session debug messages: >enable #debug dot11 session 2006.12.23 19:56:22 DOT11.Session : AP 1: AP reboot. 2006.12.23 19:56:22 DOT11.Session : AP 1: Control session lost. 2006.12.23 19:56:22 DOT11.Session : AP 1: Control session established.
60000CRG0-35B
224
debug dynamic-dns
Use the debug dynamic-dns command to activate debug messages associated with dynamic domain naming system (DNS). Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug dynamic-dns debug dynamic-dns verbose
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
verbose Optional. Activates detailed debug messages.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example activates dynamic DNS debug messages: >enable #debug dynamic-dns verbose
60000CRG0-35B
225
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release A4.05 Command was introduced.
Usage Examples
The following example enables debug messaging for all EFM components: >enable #debug efm config
60000CRG0-35B
226
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release A4.05 Command was introduced.
Usage Examples
The following example enables debug messaging for all EFM OAM components: >enable #debug efm oam
60000CRG0-35B
227
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.4 Command was introduced.
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example activates system-wide Ethernet OAM CFM debug messages: >enable #debug ethernet cfm 2008.09.22 11:00:08 CFM.MD MD:BenchTest|MA:BenchAssoc|MEP:1|CCR|Rx CCM from MEPID 2 2008.09.22 11:00:09 CFM.MD MD:BenchTest|MA:BenchAssoc|MEP:1|CCM|Sent CCM (ID=195) 2008.09.22 11:00:09 CFM.MD MD:BenchTest|MA:BenchAssoc|MEP:1|CCR|Rx CCM from MEPID 2 2008.09.22 11:00:10 CFM.MD MD:BenchTest|MA:BenchAssoc|MEP:1|CCM|Sent CCM (ID=196) 2008.09.22 11:00:10 CFM.MD MD:BenchTest|MA:BenchAssoc|MEP:1|CCR|Rx CCM from MEPID 2 2008.09.22 11:00:11 CFM.MD MD:BenchTest|MA:BenchAssoc|MEP:1|CCM|Sent CCM (ID=197) 2008.09.22 11:00:11 CFM.MD MD:BenchTest|MA:BenchAssoc|MEP:1|CCR|Rx CCM from MEPID 2 2008.09.22 11:00:12 CFM.MD MD:BenchTest|MA:BenchAssoc|MEP:1|CCM|Sent CCM (ID=198) 2008.09.22 11:00:12 CFM.MD MD:BenchTest|MA:BenchAssoc|MEP:1|CCR|Rx CCM from MEPID 2
60000CRG0-35B
228
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
domain <domain name> Optional. Specifies that debug output is limited to alarm information for maintenance endpoints (MEPs) of a specific domain.
association <association name> Optional. Specifies that debug output is limited to alarm information for MEPs of a specific association. mep <mep id> Optional. Specifies that debug output is limited to alarm information for MEPs that match a specific MEP ID. MEP ID range is 1 to 8191.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.4 Command was introduced.
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
60000CRG0-35B
229
Usage Examples
The following example enables all Ethernet OAM CFM alarm debug messages: >enable #debug ethernet cfm alarm 2008.09.22 11:06:20 CFM.FNG MD:BenchTest|MA:BenchAssoc|MEP:1|FNG|Set state: FNG_DEFECT 2008.09.22 11:06:22 CFM.FNG MD:BenchTest|MA:BenchAssoc|MEP:1|FNG|Set state: FNG_REPORT_DEFECT 2008.09.22 11:06:22 CFM.FNG MD:BenchTest|MA:BenchAssoc|MEP:1|FNG|Set state: FNG_DEFECT_REPORTED 2008.09.22 11:06:22 CFM.MD:BenchTest|MA:BenchAssoc|MEP:1| mep signaled new fault
60000CRG0-35B
230
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
domain <domain name> Optional. Specifies that debug output is limited to CCM receive path information for maintenance endpoints (MEPs) of a specific domain.
association <association name> Optional. Specifies that debug output is limited to CCM receive path information for MEPs of a specific association. mep <mep id> Optional. Specifies that debug output is limited to CCM receive path information for MEPs that match a specific MEP ID. MEP ID range is 1 to 8191.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.4 Command was introduced.
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
60000CRG0-35B
231
Usage Examples
The following example enables Ethernet OAM CFM debug messages for all CCM receive paths: >enable #debug ethernet cfm ccm rcv 2008.09.22 11:02:49 CFM.CCR MD:BenchTest|MA:BenchAssoc|MEP:1|CCR|Rx CCM from MEPID 2 2008.09.22 11:02:50 CFM.CCR MD:BenchTest|MA:BenchAssoc|MEP:1|CCR|Rx CCM from MEPID 2 2008.09.22 11:02:51 CFM.CCR MD:BenchTest|MA:BenchAssoc|MEP:1|CCR|Rx CCM from MEPID 2 2008.09.22 11:02:52 CFM.CCR MD:BenchTest|MA:BenchAssoc|MEP:1|CCR|Rx CCM from MEPID 2 2008.09.22 11:02:53 CFM.CCR MD:BenchTest|MA:BenchAssoc|MEP:1|CCR|Rx CCM from MEPID 2
60000CRG0-35B
232
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
domain <domain name> Optional. Specifies that debug output is limited to CCM transmit path information for maintenance endpoints (MEPs) of a specific domain.
association <association name> Optional. Specifies that debug output is limited to CCM transmit path information for MEPs of a specific association. mep <mep id> Optional. Specifies that debug output is limited to CCM transmit path information for MEPs that match a specific MEP ID. MEP ID range is 1 to 8191.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.4 Command was introduced.
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
60000CRG0-35B
233
Usage Examples
The following example enables Ethernet OAM CFM debug messages for all CCM transmit paths: >enable #debug ethernet cfm ccm xmit 2008.09.22 11:01:43 CFM.CCM MD:BenchTest|MA:BenchAssoc|MEP:1|CCM|Sent CCM (ID=290) 2008.09.22 11:01:44 CFM.CCM MD:BenchTest|MA:BenchAssoc|MEP:1|CCM|Sent CCM (ID=291) 2008.09.22 11:01:45 CFM.CCM MD:BenchTest|MA:BenchAssoc|MEP:1|CCM|Sent CCM (ID=292) 2008.09.22 11:01:46 CFM.CCM MD:BenchTest|MA:BenchAssoc|MEP:1|CCM|Sent CCM (ID=293)
60000CRG0-35B
234
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
request response domain <domain name> Specifies debug messages are enabled for linktrace message request paths. Specifies debug messages are enabled for linktrace message response paths. Optional. Specifies that debug output is limited to linktrace message path information for maintenance endpoints (MEPs) of a specific domain.
association <association name> Optional. Specifies that debug output is limited to linktrace message path information for MEPs of a specific association. mep <mep id> Optional. Specifies that debug output is limited to linktrace message path information for MEPs that match a specific MEP ID. MEP ID range is 1 to 8191.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.4 Command was introduced.
60000CRG0-35B
235
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example enables Ethernet OAM CFM debug messages for all linktrace message request paths: >enable #debug ethernet cfm linktrace request
60000CRG0-35B
236
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
request response domain <domain name> Specifies debug messages are enabled for loopback message request paths. Specifies debug messages are enabled for loopback message response paths. Optional. Specifies that debug output is limited to loopback message path information for maintenance endpoints (MEPs) of a specific domain.
association <association name> Optional. Specifies that debug output is limited to loopback message path information for MEPs of a specific association. mep <mep id> Optional. Specifies that debug output is limited to loopback message path information for MEPs that match a specific MEP ID. MEP ID range is 1 to 8191.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.4 Command was introduced.
60000CRG0-35B
237
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example enables Ethernet OAM CFM debug messages for all loopback message request paths: >enable #debug ethernet cfm loopback request
60000CRG0-35B
238
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
domain <domain name> Optional. Specifies that debug output is limited to information for remote maintenance endpoints (MEPs) of a specific domain.
association <association name> Optional. Specifies that debug output is limited to information for remote MEPs of a specific association. mep <mep id> Optional. Specifies that debug output is limited to information for remote MEPs that match a specific MEP ID. MEP ID range is 1 to 8191.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.4 Command was introduced.
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
60000CRG0-35B
239
Usage Examples
The following example enables Ethernet OAM CFM debug messages for all remote MEPs: >enable #debug ethernet cfm remote-mep 2008.09.22 11:13:50 CFM.RMEP MD:BenchTest|MA:BenchAssoc|MEP:1|RMEP|Set CCMdefect: true 2008.09.22 11:13:53 CFM.MD:BenchTest|MA:BenchAssoc|MEP:1| mep signaled new fault alarm state (3)
60000CRG0-35B
240
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 1.1 Release 17.6 Command was introduced. Command was altered to remove events and llc2 options.
Functional Notes
The debug frame-relay lmi command activates debug messages to aid in the troubleshooting of Frame Relay links.
Usage Examples
The following example activates debug messages associated with Frame Relay LMI operation: >enable #debug frame-relay lmi
60000CRG0-35B
241
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
<interface> Optional. Activates debug messages for the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type debug frame-relay multilink ? for a complete list of applicable interfaces. Optional. Activates the debug messages for Link Integrity Protocol (LIP).
states
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example activates debug messages associated with multilink operation for all Frame Relay interfaces: >enable #debug frame-relay multilink
60000CRG0-35B
242
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 8.1 Command was introduced.
Functional Notes
With GVRP enabled on many ports, this command can produce a lot of output. To display these messages for individual interfaces, refer to the command debug gvrp interface <interface> on page 244.
Usage Examples
The following example displays debug messages showing GVRP configuration messages sent and received on Ethernet interface 0/24: >enable #debug gvrp bpdus 2000.07.31 23:15:51 GVRP BPDUS.eth 0/24: TX = (Len:2 LeaveAll) (Len:4 JoinIn Vlan:1) (End) ... SENT 2000.07.31 23:15:52 GVRP BPDUS.eth 0/24: RX = (Len:4 Empty Vlan:2) (Len:4 JoinIn Vlan:20) (end) 2000.07.31 23:15:52 GVRP BPDUS.eth 0/24: TX = (Len:4 JoinIn Vlan:1) (End) ... SENT 2000.07.31 23:15:52 GVRP BPDUS.eth 0/24: RX = (Len:4 JoinIn Vlan:20) (end) 2000.07.31 23:16:00 GVRP BPDUS.eth 0/24: RX = (Len:2 LeaveAll) (end) #
60000CRG0-35B
243
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
<interface> Activates debug messages for the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type debug gvrp interface ? for a complete list of applicable interfaces. Displays debug messages showing all GVRP configuration messages sent and received on the interface. Displays debug messages showing all GVRP-related VLAN changes occurring on the interface.
bpdus vlans
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example displays debug messages showing GVRP configuration messages sent and received on Ethernet interface 0/24: >enable #debug gvrp interface ethernet 0/24 bpdus 2000.07.31 23:15:51 GVRP BPDUS.eth 0/24: TX = (Len:2 LeaveAll) (Len:4 JoinIn Vlan:1) (End) ... SENT 2000.07.31 23:15:52 GVRP BPDUS.eth 0/24: RX = (Len:4 Empty Vlan:2) (Len:4 JoinIn Vlan:20) (end) 2000.07.31 23:15:52 GVRP BPDUS.eth 0/24: TX = (Len:4 JoinIn Vlan:1) (End) ... SENT --MORE--
60000CRG0-35B
244
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
<vlan id> Optional. Activates debug messages for GVRP-related VLAN changes for the specified VLAN. Range is 1 to 4094.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 8.1 Command was introduced.
Functional Notes
With GVRP enabled on many ports, this command can produce a lot of output. To display these messages for an individual interface, refer to the command debug gvrp interface <interface> on page 244.
Usage Examples
The following example displays debug messages showing GVRP-related VLAN changes for VLAN 1: >enable #debug gvrp vlans 1 # 2000.07.31 22:05:42 GVRP VLANS: Creating dynamic VLAN 20 2000.07.31 22:05:42 GVRP VLANS.eth 0/24: Dynamically adding port to VLAN 20 # 2000.07.31 22:05:56 INTERFACE_STATUS.eth 0/24 changed state to down 2000.07.31 22:06:08 GVRP VLANS.eth 0/24: Dynamically removing port from VLAN 20 2000.07.31 22:06:08 GVRP VLANS: Last port removed from VLAN 20, destroying VLAN
60000CRG0-35B
245
Syntax Description
<name> Specifies the name of the hardware ACL.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.6 Command was introduced.
Functional Notes
The debug hw-access-list <name> command displays data gathered by a configured hardware ACL. The specified hardware ACL must have logging enabled to populate the debug message. For more information on hardware ACLs and event match logging, refer to the Hardware ACL and Access Map Command Set on page 2738.
Only hardware ACL debug messages can be displayed using this command. If you enter a software ACL name in this command, you will receive an error message.
Usage Examples
Enter the command as follows to enable debug messages for the hardware ACL ADTN: >enable #debug hw-access-list ADTN 2009.05.07 11:32:39 ACCESS_LIST.ADTN permit mac 00:a0:c8:00:00:00 00:00:00:ff:ff:ff any log (44864 matches) 2009.05.07 11:32:45 ACCESS_LIST.ADTN permit mac 00:a0:c8:00:00:00 00:00:00:ff:ff:ff any log (106 matches) 2009.05.07 11:32:49 ACCESS_LIST.ADTN permit mac 00:a0:c8:00:00:00 00:00:00:ff:ff:ff any log (90 matches)
60000CRG0-35B
246
Syntax Description
<interface> Activates debug messages for the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type debug interface ? for a complete list of applicable interfaces.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 3.1 Release 6.1 Release 7.1 Release 9.1 Release A4.05 Command was introduced. Command was expanded to include the T1 and foreign exchange station (FXS) interfaces. Command was expanded to include the foreign exchange office (FXO) interface. Command was expanded to include the tunnel interface. Command was expanded to include the assymetric digital subscriber line (ADSL) interface.
Functional Notes
The debug interface command activates debug messages to aid in the troubleshooting of physical interfaces.
Usage Examples
The following example activates all possible debug messages associated with the Ethernet port: >enable #debug interface ethernet
60000CRG0-35B
247
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example activates debug messages for ADSL events: >enable #debug interface adsl events
60000CRG0-35B
248
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
<slot/port> data data-hdlc diag-hdlc diagnostic diagnostic rx diagnostic tx diagnostic both download Optional. Activates debug messages for the specified cellular interface. Optional. Activates debug messages for the handshaking signals on the data channel. Optional. Activates debug messages for high level data link control (HDLC) errors on the data channel. Optional. Activates debug messages for HDLC errors on the diagnostic channel. Optional. Activates debug messages for all packets. Optional. Activates debug messages for packets moving from the cellular interface to the network. Optional. Activates debug messages for packets moving from the network to the cellular interface. Optional. Activates debug messages for both transmitted and received packets. Optional. Activates debug messages for application downloads.
Default Values
By default, all debug messages in AOS are disabled.
60000CRG0-35B
249
Command History
Release 17.2 Release 17.4 Command was introduced. Command was expanded to include the keyword both.
Usage Examples
The following example activates error and event debug messages associated with the cellular interface: >enable #debug interface cellular
60000CRG0-35B
250
debug ip bgp
Use the debug ip bgp command to activate debug messages associated with IP Border Gateway Protocol (BGP). Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug ip bgp debug ip bgp events debug ip bgp in debug ip bgp out debug ip bgp keepalives debug ip bgp updates debug ip bgp updates quiet
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
events in/out keepalives updates updates quiet Optional. Displays significant BGP events, such as a neighbor state change. Optional. Displays the same information as debug ip bgp, but limits messages to the specified direction (in or out). Optional. Displays BGP keepalive packets. Optional. Displays detailed information on BGP updates for all neighbors. Optional. Displays summary information about BGP neighbor updates. (Note: updates quiet displays a one-line summary of what update displays in 104 lines.)
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 8.1 Command was introduced.
Functional Notes
If no arguments are given, the debug ip bgp command displays general BGP events, such as sent/received message summaries, route processing actions, and results. Keepalive packets are not debugged with this command.
60000CRG0-35B
251
Usage Examples
The following example enables debug messages on general outbound BGP messages and events: >enable #debug ip bgp out #07:42:39: BGP OUT 10.15.240.1[2]: Transmitting msg, type=UPDATE (2), len=142
60000CRG0-35B
252
debug ip dhcp-client
Use the debug ip dhcp-client command to activate debug messages associated with Dynamic Host Configuration Protocol (DHCP) client operation in AOS. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug ip dhcp-client debug ip dhcp-client <interface>
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
<interface> Optional. Specifies an interface to which an IP address can be assigned in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type debug ip dhcp-client ? for a list of valid interfaces.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 2.1 Release 16.1 Release A4.01 Command was introduced. Command was expanded to include the interface parameter. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
The debug ip dhcp-client command activates debug messages to provide information on DHCP client activity in AOS. The AOS DHCP client capability allows interfaces to dynamically obtain an IP address from a network DHCP server.
Usage Examples
The following example activates debug messages associated with DHCP client activity: >enable #debug ip dhcp-client
60000CRG0-35B
253
The following example gives sample output from debug ip dhcp-client activation on an Ethernet interface: #debug ip dhcp-client 2007.06.25 13:39:04 DHCP.CLIENT eth 0/1.16 Processing Renew 2007.06.25 13:39:04 DHCP.CLIENT eth 0/1.16 Loading timer 1 with 1 seconds 2007.06.25 13:39:04 DHCP.CLIENT eth 0/1.16 Loading timer 2 with 3 seconds 2007.06.25 13:39:06 DHCP.CLIENT eth 0/1.16 Sending Discover Message: Xid = 42d05c 6d 2007.06.25 13:39:06 DHCP.CLIENT eth 0/1.16 Loading timer 1 with 3 seconds 2007.06.25 13:39:07 DHCP.CLIENT eth 0/1.16 Timer 2 Expired 2007.06.25 13:39:07 DHCP.CLIENT eth 0/1.16 Processing Offer Message: Xid = 42d05c 6d 2007.06.25 13:39:07 DHCP.CLIENT eth 0/1.16 Sending Request Message: Xid = 42d05c 6d 2007.06.25 13:39:07 DHCP.CLIENT eth 0/1.16 Loading timer 1 with 2 seconds 2007.06.25 13:39:07 DHCP.CLIENT eth 0/1.16 Processing Ack Message: Xid = 42d05c 6d 2007.06.25 13:39:07 DHCP.CLIENT eth 0/1.16 Loading timer 1 with 43200 seconds 2007.06.25 13:39:07 DHCP.CLIENT eth 0/1.16 Loading timer 2 with 64800 seconds
60000CRG0-35B
254
debug ip dhcp-server
Use the debug ip dhcp-server command to activate debug messages associated with Dynamic Host Configuration Protocol (DHCP) server operation in AOS. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug ip dhcp-server debug ip dhcp-server vrf <name>
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
vrf <name> Optional. Displays debug information for the specified VPN routing and forwarding (VRF).
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 2.1 Release 17.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
The debug ip dhcp-server command activates debug messages to provide information on DHCP server activity in AOS. The AOS DHCP server capability allows AOS to dynamically assign IP addresses to hosts on the network. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example activates debug messages associated with DHCP server activity only on the default VRF: >enable #debug ip dhcp-server
60000CRG0-35B
255
The following example activates debug messages associated with DHCP server activity on the VRF instance RED: >enable #debug ip dhcp-server vrf RED # #2007.10.15 09:21:26 DHCP.SERVER Processing Discover Message (Xid = 230e4558) on 192.168.20.0/255.255.255.0 from 00:A0:C8:0D:E9:AD vrf=RED 2007.10.15 09:21:27 DHCP.SERVER Offering IP Address 192.168.20.2 to 00:A0:C8:0D:E9:AD vrf=RED 2007.10.15 09:21:27 DHCP.SERVER Server sent an Offer to the client vrf=RED 2007.10.15 09:21:27 DHCP.SERVER Processing Request Message (Xid = 230e4558) on 192.168.20.0/255.255.255.0 from 00:A0:C8:0D:E9:AD vrf=RED 2007.10.15 09:21:27 DHCP.SERVER Server sent an Ack to the client vrf=RED
60000CRG0-35B
256
debug ip dns-client
Use the debug ip dns-client command to activate debug messages associated with domain naming system (DNS) client operation in AOS. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 3.1 Command was introduced.
Functional Notes
The debug ip dns-client command activates debug messages to provide information on DNS client activity in AOS. The IP DNS capability allows for DNS-based host translation (name-to-address).
Usage Examples
The following example activates debug messages associated with DNS client activity: >enable #debug ip dns-client
60000CRG0-35B
257
debug ip dns-proxy
Use the debug ip dns-proxy command to activate debug messages associated with domain naming system (DNS) proxy operation in AOS. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 3.1 Command was introduced.
Functional Notes
The debug ip dns-proxy command activates debug messages to provide information on DNS proxy activity in AOS. The IP DNS capability allows for DNS-based host translation (name-to-address).
Usage Examples
The following example activates debug messages associated with DNS proxy activity: >enable #debug ip dns-proxy
60000CRG0-35B
258
debug ip dns-table
Use the debug ip dns-table command to activate debug messages associated with domain naming system (DNS) table operation in AOS. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 15.1 Command was introduced.
Functional Notes
The debug ip dns-table command activates debug messages to provide information on DNS table activity in AOS. The IP DNS capability allows for DNS-based host translation (name-to-address).
Usage Examples
The following example activates debug messages associated with DNS table activity: >enable #debug ip dns-table
60000CRG0-35B
259
debug ip flow
Use the debug ip flow command to display debug messages associated with integrated traffic monitoring (ITM) operation. Use the no form of this command to disable the debug messages. Variations of this command include:
debug ip flow cache entry debug ip flow cache expiration debug ip flow export
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
cache entry cache expiration export Specifies a debug message will be generated every time traffic flow data is added to the flow cache. Specifies a debug message will be generated every time traffic flow data expires from the flow cache. Specifies a debug message will be generated every time a message is sent to an external data collector.
Default Values
By default, debug messages in AOS are disabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables debug messages for the ip flow export command and gives sample output: #debug ip flow export #show run ip flow export destination 10.22.22.254 3000 ip flow export vrf BLUE destination 172.16.4.5 65774 *Dec 18 22:45:43: IPFLOW: Sent export pkt #32958 to 10.22.22.254:3000 *Dec 18 22:45:43: IPFLOW: Sent export pkt #32958 to 172.16.4.5:65774 (BLUE)
60000CRG0-35B
260
The following is sample output from the debug ip flow cache expiration command: #debug ip flow cache expiration #show run interface shdsl 2/1 16:38:37: FLOW.CACHE: Expired 10.23.197.244:23 > 172.22.77.208: 1188 out eth 0/1 <T=0/P=6> 16:38:37: FLOW.CACHE: ^Idle Time = 60, Active Time = 60 interface adsl 1/1 16:39:20: FLOW.CACHE: Expired 10.23.197.244.23 > 172.22.77.208:1189 out eth 0/1 <T=0/P=6> 16:39:20: FLOW.CACHE: ^Idle Time = 60, Active Time = 90 The following is an output sample from the debug ip flow cache entry command: #debug ip flow cache entry #show run 16:52:20: FLOW.CACHE: Added 172.22.77.208: 1189 > 10.23.197.244: 23 in eth 0/1 <T=0/P=6>
60000CRG0-35B
261
debug ip firewall
Use the debug ip firewall command to activate debug messages associated with the AOS Internet Protocol version 4 (IPv4) firewall operation. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug ip firewall debug ip firewall vrf <name>
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
vrf <name> Optional. Displays debug information for the specified VPN routing and forwarding (VRF) instance.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 2.1 Release 17.1 Release 17.9 Command was introduced. Command was expanded to include the vrf parameter. Command was changed to require the ip keyword.
Functional Notes
The debug ip firewall command activates debug messages to provide real-time information about the IPv4 AOS stateful inspection firewall operation. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example activates the debug messages for the IPv4 AOS stateful inspection firewall: >enable #debug ip firewall
60000CRG0-35B
262
The following example activates the IPv4 firewall debug messages for the VRF instance gray and provides sample output: >enable #debug ip firewall vrf gray 2000.05.11 19:29:04 FIREWALL_VRF.Gray SrcPort: 41801, DstPort: 80 2000.05.11 19:29:04 FIREWALL_VRF.Gray Selector2: Dir=Public, int=vlan 309, Protocol=6, VRF Black cookie-> vlan 306 2000.05.11 19:29:04 FIREWALL_VRF.Gray SrcIp: 192.168.10.140, DstIp: 192.168.9.6 2000.05.11 19:29:04 FIREWALL_VRF.Gray SrcPort: 80, DstPort: 41801 2000.05.11 19:29:04 FIREWALL_VRF.Gray Deleting Association 2000.05.11 19:29:04 FIREWALL_VRF.Gray Assoc Index = 6242787, Count (total, policy-class) = 127, 126 2000.05.11 19:29:04 FIREWALL_VRF.Gray nat source -> 192.168.9.6, flags = 0x2000003F, 0x00000004, timeout = 6
60000CRG0-35B
263
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
packets verbose Optional. Activates firewall application-level gateway (ALG) SIP packet debug messages. Optional. Activates detailed debug messages.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 9.3 Release A1 Release 17.9 Command was introduced. Command was expanded to include the packets parameter. Command was changed to require the ip keyword.
Usage Examples
The following example activates debug messages associated with SIP information with AOS firewall operation: >enable #debug ip firewall alg sip
60000CRG0-35B
264
debug ip ftp-server
Use the debug ip ftp-server command to activate debug messages associated with File Transfer Protocol (FTP) server events in the AOS device. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 13.1 Command was introduced.
Functional Notes
The debug ip ftp-server command activates debug messages to provide information on FTP server activity in AOS. The FTP server capability allows for fast file management and transport for local or remote devices.
Usage Examples
The following example activates debug messages associated with FTP server activity: >enable #debug ip ftp-server
60000CRG0-35B
265
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example activates debug messages associated with HTTP client activity: >enable #debug ip http client
60000CRG0-35B
266
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
verbose Optional. Activates detailed debug messages for HTTP operation.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 6.1 Release 15.1 Command was introduced. Command was updated.
Usage Examples
The following example activates debug messages associated with HTTP server activity: >enable #debug ip http server
60000CRG0-35B
267
debug ip icmp
Use the debug ip icmp command to show all Internet Control Message Protocol (ICMP) version 4 (ICMPv4) messages as they come into the router or are originated by the router. If an optional keyword (send or recv) is not used, all results are displayed. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug ip icmp debug ip icmp send debug ip icmp recv
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
send recv Optional. Displays only ICMPv4 messages sent by the router. Optional. Displays only ICMPv4 messages received by the router.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example activates the debug ip icmp send and receive messages for ICMPv4 in AOS: >enable #debug ip icmp ICMP SEND: From (0.0.0.0) to (172.22.14.229) Type=8 Code=0 Length=72 Details:echo request ICMP RECV: From (172.22.14.229) to (10.100.23.19) Type=0 Code=0 Length=72 Details:echo reply ICMP SEND: From (0.0.0.0) to (172.22.14.229) Type=8 Code=0 Length=72 Details:echo request ICMP RECV: From (172.22.14.229) to (10.100.23.19) Type=0 Code=0 Length=72 Details:echo reply ICMP RECV: From (172.22.255.200) to (10.100.23.19) Type=11 Code=0 Length=36 Details:TTL equals 0 during transit ICMP RECV: From (172.22.14.229) to (10.100.23.19) Type=3 Code=3 Length=36 Details:port unreachable ICMP RECV: From (172.22.14.229) to (10.100.23.19) Type=3 Code=3 Length=36 Details:port unreachable
60000CRG0-35B
268
debug ip igmp
Use the debug ip igmp command to enable debug messages for Internet Group Management Protocol (IGMP) transactions (including helper activity). Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug ip igmp debug ip igmp <ip address>
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
<ip address> Optional. Specifies the IP address of a multicast group. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example enables IGMP debug messages for the specified multicast group: >enable #debug ip igmp 224.1.1.1
60000CRG0-35B
269
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
verbose Optional. Enables detailed debug messages.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example enables IGMP snooping debug messages: >enable #debug ip igmp snooping
60000CRG0-35B
270
debug ip mrouting
Use the debug ip mrouting command to activate debug messages associated with multicast table routing events. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following sample activates ip mrouting debug messages: >enable #debug ip mrouting
60000CRG0-35B
271
debug ip ospf
Use the debug ip ospf command to activate debug messages associated with open shortest path first (OSPF) routing operations. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug ip ospf debug ip ospf adj debug ip ospf database-timer debug ip ospf events debug ip ospf flood debug ip ospf hello debug ip ospf lsa-generation debug ip ospf packet debug ip ospf retransmission debug ip ospf spf debug ip ospf tree
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
adj database-timer events flood hello lsa-generation packet retransmission spf tree Optional. Displays OSPF adjacency events. Optional. Displays OSPF database timer. Optional. Displays OSPF events. Optional. Displays OSPF flooding. Optional. Displays OSPF hello events. Optional. Displays OSPF link state advertisement (LSA) generation. Optional. Displays OSPF packets. Optional. Displays OSPF retransmission events. Optional. Displays OSPF shortest path first (SPF) calculations. Optional. Displays OSPF database tree.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 3.1 Command was introduced.
60000CRG0-35B
272
Usage Examples
The following is an example of debug ip ospf command results: >enable #debug ip ospf flood OSPF: Update LSA: id=c0a8020d rtid=192.168.2.13 area=11.0.0.0 type=1 OSPF: Update LSA: id=0b003202 rtid=11.0.50.2 area=11.0.0.0 type=1 OSPF: Queue delayed ACK lasid=0b003202 lsartid=11.0.50.2 nbr=11.0.50.2 OSPF: Rx ACK lasid=c0a8020d lsartid=192.168.2.13 nbr=11.0.50.2 OSPF: Received LSA ACK LSA_ID=-64.-88.2.13 LSA_RT_ID=-64.-88.2.13 OSPF: Rx ACK lasid=00000000 lsartid=192.168.2.13 nbr=11.0.50.2 OSPF: Received LSA ACK LSA_ID=0.0.0.0 LSA_RT_ID=-64.-88.2.13 OSPF: Sending delayed ACK OSPF: Update LSA: id=c0a8020d rtid=192.168.2.13 area=11.0.0.0 type=1 OSPF: Flooding out last interface OSPF: Update LSA: id=0b003202 rtid=11.0.50.2 area=11.0.0.0 type=1
60000CRG0-35B
273
debug ip packet
Use the debug ip packet command to display debug messages for every IP packet forwarded through the unit. Adding the VRF name to this command displays debug information only for the named VPN routing and forwarding (VRF). Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include the following:
debug ip packet debug ip packet detail debug ip packet dump debug ip packet <acl name> debug ip packet <acl name> detail debug ip packet <acl name> dump debug ip packet any-vrf debug ip packet any-vrf <acl name> debug ip packet any-vrf <acl name> detail debug ip packet any-vrf <acl name> dump debug ip packet any-vrf detail debug ip packet any-vrf dump debug ip packet vrf <name> debug ip packet vrf <name> <acl name> debug ip packet vrf <name> <acl name> detail debug ip packet vrf <name> <acl name> dump debug ip packet vrf <name> detail debug ip packet vrf <name> dump
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
detail dump Optional. Displays IP packet detailed information. Optional. Displays IP packet detailed information, as well as a hex dump of the packets payload. Note: The console stream can be captured to a log file and used as an input file for display with ETHEREAL/Wireshark by using text2pcap.exe, which is a part of the ETHEREAL/Wireshark distribution. Execute as follows: text2pcap -l 101 <input_file> <output_file>
60000CRG0-35B
274
Enable Mode Command Set Next, open the output file with ETHEREAL/Wireshark for display and decode. The typical lower layer information in ETHEREAL/Wireshark may not be present. This converted capture file is treated as a raw IP capture and also has no timestamp data. Remember to take advantage of access control lists (ACLs) to narrow down the amount of data being processed with this facility. This is a CPU-intensive operation, and also disables any fast flow/fast cache routing.
Optional. Displays debug information for a specific ACL. Optional. Displays debug information for all VRFs, including the default. Optional. Displays debug information for the specified VRF.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 12.1 Release 16.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following is sample output for the debug ip packet command, which provides debug information for the default VRF only: >enable #debug ip packet IP: s= 192.168.8.101 (eth 0/1) d=192.168.7.2 (eth 0/2) g= 192.168.7.2, forward IP: s= 192.168.7.2 (eth 0/2) d=192.168.8.101 (eth 0/1) g= 192.168.8.101, forward IP: s= 192.168.8.101 (eth 0/1) d=192.168.7.2 (eth 0/2) g= 192.168.7.2, forward IP: s= 192.168.7.2 (eth 0/2) d=192.168.8.101 (eth 0/1) g= 192.168.8.101, forward Where: s=192.168.8.101 (eth 0/1) indicates source address and interface of received packet. d=192.168.7.2 (eth 0/2) indicates destination address and interface from which the packet is being sent. g=192.168.7.2 indicates the address of the next-hop gateway. forward indicates the router is forwarding this packet.
60000CRG0-35B
275
The following is sample output for the debug ip packet vrf <vrf name> command for the VRF named Red: >enable #debug ip packet vrf RED IP: s=192.168.1.100 (eth 0/1.4) d=192.168.1.255 (Loopback), vrf=RED, rcvd IP: s=192.168.1.101 (eth 0/1.4) d=192.168.1.1 (Loopback), vrf=RED, rcvd IP: s=192.168.1.1 (Loopback) d=192.168.1.101 (eth 0/1.4) g=192.168.1.101, vrf=RED, forward IP: s=192.168.1.100 (eth 0/1.4) d=192.168.1.1 (Loopback), vrf=RED, rcvd IP: s=192.168.1.1 (Loopback) d=192.168.1.100 (eth 0/1.4) g=192.168.1.100, vrf=RED, forward Where: rcvd indicates the router received this packet. The following is sample output for the debug ip packet any-vrf command: >enable #debug ip packet any-vrf IP: s=192.168.1.15 (eth 0/1.1) d=192.168.1.1 (Loopback), rcvd IP: s=192.168.1.1 (Loopback) d=192.168.1.15 (eth 0/1.1) g=192.168.1.15, forward IP: s=192.168.1.101 (eth 0/1.4) d=255.255.255.255 (Loopback), vrf=RED, rcvd IP: s=192.168.1.1 (Loopback) d=192.168.1.101 (eth 0/1.4) g=192.168.1.101, vrf=RED, forward IP: s=192.168.2.33 (eth 0/1.3) d=192.168.2.1 (Loopback), vrf=BLU, rcvd IP: s=192.168.2.1 (Loopback) d=192.168.2.33 (eth 0/1.3) g=192.168.2.33, vrf=BLU, forward IP: s=192.168.1.101 (eth 0/1.4) d=192.168.1.1 (Loopback), vrf=RED, rcvd IP: s=192.168.1.1 (Loopback) d=192.168.1.101 (eth 0/1.4) g=192.168.1.101, vrf=RED, forward Where: if the vrf=<name> statement is not present, the packet was present on the default VRF. vrf=<name> indicates the non-default VRF from which the packet was received. forward indicates the router transmitted this packet. g=x.x.x.x indicates the next-hop IP address to which the packet was forwarded.
60000CRG0-35B
276
debug ip pim-sparse
Use the debug ip pim-sparse command to display all protocol-independent multicast (PIM) sparse mode information. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example activates all PIM sparse mode messages: >enable #debug ip pim-sparse
60000CRG0-35B
277
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
event state <multicast address> Optional. Displays PIM sparse assert events. Optional. Displays PIM sparse assert state changes. Optional. Specifies multicast group IP address to filter. The multicast group IP address range is 244.0.0.0 to 239.255.255.255 or 224.0.0.0 /4.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example activates all PIM sparse assert event messages: >enable #debug ip pim-sparse assert event 14:25:05: PIMSM: Assert - MRoute (*, 239.255.255.250, eth 0/2) processed Received Join in NoInfo state 14:25:29: PIMSM: Assert - MRoute (10.100.13.240, 239.192.19.136, eth 0/2) processed Received Join in NoInfo state 14:25:29: PIMSM: Assert - MRoute (*, 239.192.19.136, eth 0/2) processed Received Join in NoInfo state 14:26:05: PIMSM: Assert - MRoute (*, 239.255.255.250, eth 0/2) processed Received Join in NoInfo state
60000CRG0-35B
278
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example activates PIM sparse mode hello messages: >enable #debug ip pim-sparse hello
60000CRG0-35B
279
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
event state <multicast address> Optional. Displays PIM sparse join and prune events. Optional. Displays PIM sparse join and prune state changes. Optional. Specifies multicast group IP address to filter. The multicast group IP address range is 244.0.0.0 to 239.255.255.255 or 224.0.0.0 /4.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example activates PIM sparse mode messages for all join and prune events and state changes: >enable #debug ip pim-sparse joinprune 14:27:05: PIMSM: Processed JOIN(*, 239.255.255.250) from 10.10.10.2 14:27:29: PIMSM: Processed JOIN(10.100.13.240, 239.192.19.136) from 10.10.10.2 14:27:29: PIMSM: Processed JOIN(*, 239.192.19.136) from 10.10.10.2 14:27:56: PIMSM: Sent JOIN(10.100.13.240, 239.192.19.136) to 10.100.13.240 14:28:05: PIMSM: Processed JOIN(*, 239.255.255.250) from 10.10.10.2
60000CRG0-35B
280
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
in out <interface> Optional. Displays messages for inbound PIM sparse packets. Optional. Displays messages for outbound PIM sparse packets. Optional. Specifies an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type debug ip pim-sparse packets ? for a list of valid interfaces.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following example activates all PIM sparse packet messages (both inbound and outbound): >enable #debug ip pim-sparse packets
60000CRG0-35B
281
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
event state <multicast address> Optional. Displays PIM sparse register events. Optional. Displays PIM sparse register state changes. Optional. Specifies multicast group IP address to filter. The multicast group IP address range is 244.0.0.0 to 239.255.255.255 or 224.0.0.0 /4.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example activates all PIM sparse registration changes: >enable #debug ip pim-sparse register 18:14:22: PIMSM: Registered new source (10.100.13.240, 239.192.19.136) from 10.10.10.1 18:14:22: PIMSM: RegisterStop(10.100.13.240, 239.192.19.136) sent to 10.10.10.1 18:14:53: PIMSM: RegisterStop(10.100.13.240, 239.192.19.136) sent to 10.10.10.1 18:16:17: PIMSM: RegisterStop(10.100.13.240, 239.192.19.136) sent to 10.10.10.1
60000CRG0-35B
282
debug ip policy
Use the debug ip policy command to display policy-based routing events. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include the following:
debug ip policy debug ip policy <acl name>
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
<acl name> Optional. Displays debug information only for the specified access control list (ACL).
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Release 16.1 Command was introduced. Command was expanded to filter based on an ACL.
Usage Examples
The following example creates a standard ACL named PVT, which permits packets sourced from the 10.22.0.0/16 network and displays only these policy-based routing event messages: >enable #ip access-list standard PVT #permit 10.22.0.0 0.0.255.255 #deny any #debug ip policy PVT
60000CRG0-35B
283
debug ip rip
Use the debug ip rip command to activate debug messages associated with Routing Information Protocol (RIP) operation in AOS. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug ip rip debug ip rip events
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
events Optional. Displays only RIP protocol events.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 1.1 Command was introduced.
Functional Notes
The debug ip rip command activates debug messages to provide information on RIP activity in AOS. RIP allows hosts and routers on a network to exchange information about routes.
Usage Examples
The following example activates debug messages associated with RIP activity: >enable #debug ip rip
60000CRG0-35B
284
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.5 Command was introduced.
Usage Examples
The following is sample output for this command: >enable #debug ip route-cache express xRt: Periodic ARP for 10.2.42.254 xRt: Processed 1 ARP events, with 0 remaining xRt: host entry added: IP=192.168.1.10, MAC=00:10:94:00:00:01, Vlan=1 xRt: host entry added: IP=192.168.3.10, MAC=00:10:95:00:00:01, Vlan=3 xRt: host entry not added (no ARL entry): IP=192.168.5.10, MAC=00:10:96:00:00:01, Vlan=5 xRt: host entry added: IP=192.168.7.10, MAC=00:10:97:00:00:01, Vlan=7 xRt: host entry added: IP=192.168.9.10, MAC=00:10:98:00:00:01, Vlan=9 xRt: host entry added: IP=192.168.11.10, MAC=00:10:99:00:00:01, Vlan=11 xRt: host entry added: IP=192.168.13.10, MAC=00:10:9a:00:00:01, Vlan=13 xRt: host entry not added (no ARL entry): IP=192.168.15.10, MAC=00:10:9b:00:00:01, Vlan=15 xRt: host entry added: IP=192.168.17.10, MAC=00:10:9c:00:00:01, Vlan=17 xRt: host entry added: IP=192.168.19.10, MAC=00:10:9d:00:00:01, Vlan=19 xRt: Processed 10 ARP events, with 605 remaining xRt: Processed 10 L2 events, with 393 remaining xRt: host entry added (ARL entry found): IP=192.168.1.20, MAC=00:10:94:00:00:0b, Vlan=1 xRt: host entry added (ARL entry found): IP=192.168.15.10, MAC=00:10:9b:00:00:01, Vlan=15 xRt: host entry added (ARL entry found): IP=192.168.3.18, MAC=00:10:95:00:00:09, Vlan=3 xRt: host entry added (ARL entry found): IP=192.168.3.41, MAC=00:10:95:00:00:20, Vlan=3 xRt: Processed 10 L2 events, with 217 remaining xRt: Processed 10 ARP events, with 228 remaining
60000CRG0-35B
285
xRt: ARP entry for 192.168.3.10 was updated xRt: ARP entry for 192.168.3.11 was updated xRt: ARP entry for 192.168.3.12 was updated xRt: ARP entry for 192.168.3.13 was updated xRt: ARP entry for 192.168.3.14 was updated
60000CRG0-35B
286
debug ip routing
Use the debug ip routing command to activate debug messages associated with Internet Protocol version 4 (IPv4) routing table events. Adding the VRF name to this command displays debug information for the named VPN routing and forwarding (VRF). Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include the following:
debug ip routing debug ip routing vrf <name>
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
vrf <name> Optional. Displays debug information only for the specified VRF. If a VRF is not specified, the default VRF is assumed.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 10.1 Release 16.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example activates debug messages associated with IPv4 routing table events: >enable #debug ip routing
60000CRG0-35B
287
The following example activates the debug messages associated with IPv4 routing table events on the nondefault VRF named RED and provides sample output: >enable #debug ip routing vrf RED ip route vrf RED 1.2.3.0 255.255.255.0 192.168.10.10 15:32:29: ROUTING: Add route for 1.2.3.0/24 nh=192.168.10.10 vrf=RED 15:32:29: ROUTING: Remove route for 1.2.3.0/24 nh=192.168.10.10 vrf=RED 15:32:29: ROUTING: Add route for 1.2.3.0/24 nh=192.168.10.10 vrf=RED 15:32:29: ROUTING: Remove route for 1.2.3.0/24 nh=192.168.10.10 vrf=RED 15:32:29: ROUTING: Add route for 1.2.3.0/24 nh=192.168.10.10 vrf=RED Where: nh=192.168.10.10 indicates the next-hop address. vrf=RED indicates the nondefault VRF where the route is present.
60000CRG0-35B
288
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
packets packets rtcp packets rtp packets round-trip-delay Optional. Displays VQM debug events of voice traffic packets. Optional. Displays VQM debug messages for Realtime Transport Control Protocol (RTCP) packet events. Optional. Displays VQM debug messages for Realtime Transport Protocol (RTP) packet events. Optional. Displays VQM debug messages for round-trip delay mechanism events.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.1 Release A1 Command was introduced. Command was included in the AOS voice products.
Usage Examples
The following example activates RTP packets debug messages for VQM: >enable #debug ip rtp quality-monitoring packets rtp 2007.10.23 17:35:06 VQM.PACKET RTCP Sender SSRC=1244609021 2007.10.23 17:35:06 VQM.PACKET RTCP NTP timestamp (MSW)=3402167683 (0xcac8f583) 2007.10.23 17:35:06 VQM.PACKET RTCP NTP timestamp (LSW)=1116355952 (0x428a3d70) 2007.10.23 17:35:06 VQM.PACKET RTCP RTP timestamp=3990799999 2007.10.23 17:35:06 VQM.PACKET RTCP SSRC=1919245558 2007.10.23 17:35:06 VQM.PACKET RTCP Last SR timestamp=4119950126 (0xf591732e) 2007.10.23 17:35:06 VQM.PACKET RTCP Delay since last SR timestamp=175671
60000CRG0-35B
289
2007.10.23 17:35:06 VQM.PACKET RTCP handle=0x6179810ebu 2007.10.23 17:35:09 VQM.PACKET RTCP Rx RTCP SR pkt from 10.22.41.91 2007.10.23 17:35:09 VQM.PACKET RTCP call-ID=30bbb408417e519a00be27ac15d5776b@1 0.22.41.52 2007.10.23 17:35:09 VQM.PACKET RTCP Sender SSRC=1919245558 2007.10.23 17:35:09 VQM.PACKET RTCP NTP timestamp (MSW)=3402167702 (0xcac8f596) 2007.10.23 17:35:09 VQM.PACKET RTCP NTP timestamp (LSW)=1932399624 (0x732e1408) 2007.10.23 17:35:09 VQM.PACKET RTCP RTP timestamp=2621875150 2007.10.23 17:35:09 VQM.PACKET RTCP SSRC=1244609021 2007.10.23 17:35:09 VQM.PACKET RTCP Last SR timestamp=4119020170 (0xf583428a) 2007.10.23 17:35:09 VQM.PACKET RTCP Delay since last SR timestamp=151436 2007.10.23 17:35:09 VQM.PACKET RTCP handle=0x6524010g all
60000CRG0-35B
290
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
<name> Optional. Specifies that debug messages are enabled only for the named reporter.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.6 Command was introduced.
Usage Examples
The following is sample output of debug messages for VQM reporter Reporter1: >enable #debug ip rtp quality-monitoring reporter Reporter1 08:46:13 VQM.REPORTER Reporter1 1 Enqueuing VQM Report - 2575556352@10.1.3.9 to 6353@10.1.3.9, RTP=10.10.20.2:2234->10.17.138.1:3000 08:46:13 VQM.REPORTER Reporter1 1 Generating VQM Report 08:46:13 VQM.REPORTER Reporter1 1 Sending VQM Report 08:46:13 VQM.REPORTER Reporter1 1 Transaction 0x022ad5f0: state changed -> Client General Request Sent
60000CRG0-35B
291
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.5 Command was introduced.
Functional Notes
The debug ip security monitor events include statistic collection associated with the timeline.
Usage Examples
The following is sample output for this command: >enable #debug ip security monitor SECURITY_MONITOR.EVENTS Regular update: timeline interval scheduled to end at 23:00:16 SECURITY_MONITOR.EVENTS [ curr=269095, sched=272343 ] SECURITY_MONITOR.EVENTS Regular update: timeline interval scheduled to end at 23:00:16 SECURITY_MONITOR.EVENTS [ curr=269154, sched=272343 ] no debug ip security monitor #
60000CRG0-35B
292
debug ip tcp
Use the debug ip tcp command to activate debug messages associated with significant Transmission Control Protocol (TCP) events, such as state changes, retransmissions, session aborts, etc., in AOS. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug ip tcp debug ip tcp events
These debug events are logged for packets that are sent or received from the router. Forwarded TCP packets are not included.
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
events Optional. Displays only TCP protocol events.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 4.1 Command was introduced.
Functional Notes
In the debug ip tcp events information, TCB stands for TCP task control block. The numbers which sometimes appear next to TCB (e.g., TCB5 in the following example) represent the TCP session number. This allows you to differentiate debug messages for multiple TCP sessions.
60000CRG0-35B
293
Usage Examples
The following is sample output for this command: >enable #debug ip tcp events 2003.02.17 07:40:56 IP.TCP EVENTS TCP: Allocating block 5 2003.02.17 07:40:56 IP.TCP EVENTS TCB5: state change: FREE->SYNRCVD 2003.02.17 07:40:56 IP.TCP EVENTS TCB5: new connection from 172.22.75.246:3473 to 10.200.2.201:23 2003.02.17 07:40:56 IP.TCP EVENTS TCB5: state change: SYNRCVD->ESTABLISHED [172.22.75.246:3473] 2003.02.17 07:41:06 IP.TCP EVENTS TCB5: Connection aborted -- error = RESET 2003.02.17 07:41:06 IP.TCP EVENTS TCB5: De-allocating tcb
60000CRG0-35B
294
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 9.1 Command was introduced.
Functional Notes
Debug messages will only be generated for TCP ports that have MD5 authentication enabled.
Usage Examples
The following example activates debug messages associated with incoming TCP packets MD5 authentication: >enable #debug ip tcp md5
60000CRG0-35B
295
debug ip tftp
Use the debug ip tftp command to activate debug messages associated with Trivial File Transfer Protocol (TFTP) packets. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug ip tftp client packets debug ip tftp server events debug ip tftp server packets
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
client packets server events server packets Activates TFTP client packet debug messages. Activates TFTP server event debug messages. Activates TFTP server packet debug messages.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Release 14.1 Command was introduced. Command changed from debug tftp to debug ip tftp.
Usage Examples
The following example activates debug messages associated with TFTP server packets: >enable #debug ip tftp server packets
60000CRG0-35B
296
debug ip udp
Use the debug ip udp command to activate debug messages associated with User Datagram Protocol (UDP) send and receive events in AOS. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. These debug events are logged for packets that are sent or received from the router. Forwarded UDP packets are not included.
The overhead associated with this command takes up a large portion of your routers resources and at times can halt other router processes. It is best to only use the command during times when the network resources are in low demand (nonpeak hours, weekends, etc.).
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 4.1 Command was introduced.
Functional Notes
In the debug ip udp information, the message no listener means that there is no service listening on this UDP port (i.e., the data is discarded).
Usage Examples
The following is sample output for this command: >enable #debug ip udp 2003.02.17 07:38:48 IP.UDP RX: src=10.200.3.236:138, dst=10.200.255.255:138, 229 bytes, no listener 2003.02.17 07:38:48 IP.UDP RX: src=10.200.2.7:138, dst=10.200.255.255:138, 227 bytes, no listener 2003.02.17 07:38:48 IP.UDP RX: src=10.200.201.240:138, dst=10.200.255.255:138, 215 bytes, no listener
60000CRG0-35B
297
debug ip urlfilter
Use the debug ip urlfilter command to display a summary of debug information for all uniform resource locator (URL) filters being used. Debug messages are displayed (real time) to the terminal (or Telnet) screen. The verbose option gives more detailed information. Use the no form of this command to disable the debug messages. Variations of this command include:
debug ip urlfilter debug ip urlfilter verbose
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
verbose Optional. Enables detailed debug messages.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example shows the debug summary for all URL filters being used: >enable #debug ip urlfilter 2005.11.06 05:31:52 Connected to a Websense server 2005.11.06 05:33:26 Allowed http://www.adtran.com/
60000CRG0-35B
298
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example shows the debug summary for top websites reporting: >enable #debug ip urlfilter top-websites P2007.05.08 09:55:00 Merging displayed 15 minute list into hour list 2007.05.08 09:55:00 Merging hour list into twenty-four hour list 2007.05.08 09:55:00 Validating timers; timerAdj=0, update=0, lastThen=462 2007.05.08 09:55:00 Scheduled next run in 900; timerAdj=0, nowUpTime=462, last Period=306
60000CRG0-35B
299
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
vrf <name> Optional. Displays debug information for the specified VPN routing and forwarding (VRF) instance. If no VRF is specified, information for the default VRF is displayed.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 18.1 Command was introduced.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example activates the debug messages for IPv6 firewall processing: >enable #debug ipv6 firewall
60000CRG0-35B
300
The following example activates the IPv6 firewall debug messages for the VRF instance gray and provides sample output: >enable #debug ipv6 firewall vrf gray 2010.08.17 20:39:25 FIREWALL_V6.VRF gray id=firewall time=2010-08-17 20:39:25 fw=NV3430 pri=6 proto=icmpv6 src=2001:DB8:1:1::2 dst=2001:DB8:1:1::1 msg=ICMPv6 type=128 code=0; Bytes processed over policy-session (bytes=256) from PRIVATEV6 policy-class on the interface eth 0/1.1 2010.08.17 20:39:25 FIREWALL_V6.VRF gray Deleted policy-session due to clear all policy-sessions command Policy-session ID = 2; Count (total, policy-class) = 0, 0 Protocol = 58; Flags = 0x1; Timeout = 60 Initiating side: Policy-class = PRIVATEV6 From/To: eth 0/1.1 -> Loopback Source: 2001.DB8:1:1::2 Destination: 2001:DB8:1:1::1 ICMPv6 Type/Code: 128/0; ID: 0 Responding side: Policy-class = self From/To: Loopback -> eth 0/1.1 Source: 2001:DB8:1:1::2 Destination: 2001:DB8:1:1::2 ICMPv6 Type/Code: 129/0; ID: 0
60000CRG0-35B
301
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
send recv Optional. Displays only ICMPv6 messages sent by the IPv6 stack. Optional. Displays only ICMPv6 messages received by the IPv6 stack.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example activates the debug ipv6 icmp send and receive messages for ICMPv6 in AOS: >enable #debug ipv6 icmp ICMPv6 SEND: To [2001:DB8:8967::10] Type=128 Code=0 Length=108 Details:echo request id=0036 seq=0001 ICMPv6 SEND: Source changed to [2001:DB8:8967:1::100] before transmit ICMPv6 RECV: From [1001:DB8:8967::10] to [2001:DB8:8967:1::100] [eth 0/1] Type=129 Code=0 Length=108 Details: echo reply id=0036 seq=0001 --MORE--
60000CRG0-35B
302
debug ipv6 nd
Use the debug ipv6 nd command to activate debug messages for Internet Protocol version 6 (IPv6) Neighbor Discovery (ND) functions on the router. This command details the processing of ND messages and all resulting state changes and errors. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug ipv6 nd ar debug ipv6 nd dad debug ipv6 nd neighbor-state debug ipv6 nd packet neighbor debug ipv6 nd packet router
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
ar dad neighbor-state packet neighbor packet router Optional. Activates debug messaging for address resolution (AR) changes. Optional. Activates debug messaging for duplicate address detection (DAD) events. Optional. Activates debug messaging for state changes in the neighbor cache. Optional. Activates debug messaging for ND packets. Optional. Activates debug messaging for router advertisement (RA) packets.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example activates debug messaging for all ND DAD events: >enable #debug ipv6 nd dad
60000CRG0-35B
303
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
vrf <name> Optional. Displays debug information only for the specified VRF. If a VRF is not specified, thedefault unnamed VRF is assumed.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 18.1 Command was introduced.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example activates debug messages associated with IPv6 routing table events: >enable #debug ipv6 routing
60000CRG0-35B
304
debug isdn
Use the debug isdn command to activate debug messages associated with integrated services digital network (ISDN) events in AOS. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include the following:
debug isdn cc-ie debug isdn cc-ie pri debug isdn cc-ie pri <number> debug isdn cc-messages debug isdn cc-messages pri debug isdn cc-messages pri <number> debug isdn endpoint debug isdn endpoint pri debug isdn endpoint pri <number> debug isdn interface debug isdn interface pri debug isdn interface pri <number> debug isdn l2-formatted debug isdn l2-formatted pri debug isdn l2-formatted pri <number> debug isdn l2-messages debug isdn l2-messages pri debug isdn l2-messages pri <number>
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
cc-ie cc-messages endpoint interface l2-formatted l2-messages pri pri <number> Displays call control information elements. Displays call control messages. Displays endpoint events. Displays ISDN interface events. Displays Layer 2 formatted messages. Displays Layer 2 messages. Optional. Specifies the ISDN interface. Optional. Specifies a specific ISDN interface. Range is 1 to 255.
Default Values
By default, all debug messages in AOS are disabled.
60000CRG0-35B
305
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example activates all Layer 2 formatted messages: >enable #debug isdn l2-formatted The following example activates Layer 2 formatted messages received on ISDN interface primary rate interface (PRI) 1: >enable #debug isdn l2-formatted pri 1
60000CRG0-35B
306
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
<number> Optional. Specifies the ISDN group. Valid range is 1 to 255.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example activates debug messages for all ISDN groups: >enable #debug isdn group
60000CRG0-35B
307
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example activates debug messages associated with the ISDN resource manager: >enable #debug isdn resource-manager
60000CRG0-35B
308
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example activates all debug messages associated with ISDN activity: >enable #debug isdn verbose
60000CRG0-35B
309
debug lldp
Use the debug lldp command to display debug output for all Link Layer Discovery Protocol (LLDP) receive and transmit packets. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug lldp debug lldp rx debug lldp rx verbose debug lldp tx debug lldp tx verbose debug lldp verbose
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
rx tx verbose Optional. Shows information about received packets. Optional. Shows information about transmitted packets. Optional. Shows detailed debugging information.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example activates both transmit and receive messages associated with LLDP operation: >enable #debug lldp
60000CRG0-35B
310
debug mail-client
Use the debug mail-client command to enable mail agent debug messages. Variations of this command include:
debug mail-client debug mail-client <agent name>
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
<agent name> Optional. Specifies debug messages are enabled only for the specified mail agent.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example enables debug messaging for all configured mail agents: >enable #debug mail-client
60000CRG0-35B
311
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
detail Optional. Specifies that detailed debug information is displayed.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release A4.05 Command was introduced.
Usage Examples
The following example enables debug messages for all MEF component configurations: >enable #debug mef config
60000CRG0-35B
312
Syntax Description
messages messages summary verbose Optional. Specifies that MGCP stack messages information is displayed. Optional. Specifies that MGCP message summary information is displayed. Optional. Specifies that detailed MGCP stack information is displayed.
Default Values
No default values are necessary for this command.
Command History
Release A2 Command was introduced.
Usage Examples
The following is sample output from the debug mgcp stack messages summary command: #debug mgcp stack messages summary 19:20:22 MGCP.STACK MSGSUM TX: -> 47.234.101.60:2727 19:20:22 MGCP.STACK MSGSUM TX: ntfy 88 aaln/1@65.162.109.238 MGCP 1.0 19:20:22 MGCP.STACK MSGSUM RX: <- 47.234.101.60:2727 19:20:22 MGCP.STACK MSGSUM RX: 200 88 OK 19:20:22 MGCP.STACK MSGSUM RX: <- 47.234.101.60:2727 19:20:22 MGCP.STACK MSGSUM RX: RQNT 30425 aaln/1@65.162.109.238 MGCP 1.0
60000CRG0-35B
313
Default Values
No default values are necessary for this command.
Command History
Release A2 Command was introduced.
Usage Examples
The following is sample output from the debug mgcp verbose command: #debug mgcp verbose 19:02:35 MGCP.STACK DEBUG adEndpointEvent(int=0:1, pkg=, evt=hd) 19:02:35 MGCP.STACK MSG TX: -> 47.234.101.60:2727 19:02:35 MGCP.STACK MSG TX: ntfy 58 aaln/1@65.162.109.238 MGCP 1.0 K: 57 X: 22410 O: l/hd 19:02:35 MGCP.STACK MSG RX: <- 47.234.101.60:2727 19:02:35 MGCP.STACK MSG RX: 200 58 OK 19:02:35 MGCP.STACK MSG RX: <- 47.234.101.60:2727 19:02:35 MGCP.STACK MSG RX: RQNT 30081 aaln/1@65.162.109.238 MGCP 1.0 X: 22414 S: R: L/hu(N) Q: loop
60000CRG0-35B
314
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
hostname <hostname> interface gigabit-switchport <slot/port> ip <ip address> Optional. Activates debug messages for the client with the specified host name. Optional. Activates debug messages for the client using the specified interface. Optional. Activates debug messages for the client with the specified IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Activates debug messages for the client with the specified medium access control (MAC) address. MAC addresses should be expressed in the following format: xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01).
Default Values
No default values are necessary for this command.
Command History
Release 17.8 Command was introduced.
60000CRG0-35B
315
Usage Examples
The following is sample output of the debug network-forensics ip dhcp command: >enable #debug network-forensics ip dhcp 2009.08.31 14:30:30 NETWORK_FORENSICS.IP.DHCP.giga-swx 0/5 Discover from 00:E0:29:0E:D5:E3 (xpsp3-host) 2009.08.31 14:30:31 NETWORK_FORENSICS.IP.DHCP.giga-swx 0/24 Offer from 00:E0:29:0E:D5:E5/10.23.220.254 to 00:E0:29:0E:D5:E3 of 10.23.220.1/255.255.255.0(xpsp3-host) 2009.08.31 14:30:31 NETWORK_FORENSICS.IP.DHCP.giga-swx 0/5 Request from 00:E0:29:0E:D5:E3 10.23.220.1/255.255.255.0 (xpsp3-host) to 00:E0:29:0E:D5:E5/10.23.220.254 2009.08.31 14:30:31 NETWORK_FORENSICS.IP.DHCP.giga-swx 0/24 Ack from 00:E0:29:0E:D5:E5/10.23.220.254 to 00:E0:29:0E:D5:E3 of 10.23.220.1/255.255.255.0 (xpsp3-host)
60000CRG0-35B
316
debug ntp
Use the debug ntp command to activate debug messages associated with the Network Time Protocol (NTP) daemon information. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example activates debug messages associated with NTP: >enable #debug ntp
60000CRG0-35B
317
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
control events packets test events packets Optional. Activates TWAMP control debug messages. Optional. Displays TWAMP control events and messages. Optional. Displays TWAMP control events and packets. Activates TWAMP Test debug messages. Optional. Displays TWAMP test events and messages. Optional. Displays TWAMP test events and packets.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.6 Command was introduced.
Usage Examples
The following example enables debug messaging for TWAMP control events and messages: >enable #debug ping twamp control Type CTRL+C to abort. Test will complete in approximately 7 seconds. 2009.06.03 11:18:51 IP.TWPING CTRL EVNT Attempting to connect 2009.06.03 11:18:51 IP.TWPING CTRL EVNT State changed Init -> Opening (event=Open Connection) 2009.06.03 11:18:51 IP.TWPING CTRL EVNT State changed Opening -> Setup (event=RX
60000CRG0-35B
318
Server-Greeting) 2009.06.03 11:18:51 IP.TWPING CTRL EVNT State changed Setup -> Starting (event=TX Setup-Response) 2009.06.03 11:18:51 IP.TWPING CTRL PKT Sending Setup-Response (len=140) mode=1 keyId=00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 token=00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2009.06.03 11:18:51 IP.TWPING CTRL EVNT State changed Starting -> Active (event=RX Server-Start) 2009.06.03 11:18:51 IP.TWPING CTRL PKT Received Server-Start (len=48) accept=0 serverIV=3d97e36d000000000178343030386337 startTime=4a26a1ad.2be49403 2009.06.03 11:18:51 IP.TWPING CTRL EVNT State changed Active -> Register-Session (event=TX Request-Session) 2009.06.03 11:18:51 IP.TWPING CTRL PKT Sending Request-Session (len=112) ipVer=4 confSender=0 confReceiver=0 numSchedSlots=0 numPkts=10 senderPort=1090 receiverPort=0 senderIp=10.22.135.18 receiverIp=10.22.130.44 sessId=00000000000000000000000000000000 padLen=0 startTime=0.0 timeout=2.0 dscp=0 2009.06.03 11:18:51 IP.TWPING CTRL EVNT State changed Register-Session -> Active (event=RX Accept-Session) 2009.06.03 11:18:51 IP.TWPING CTRL PKT Received Accept-Session (len=48) accept=0 port=1063 sessId=0000000000000025cf198506ac7bb859 2009.06.03 11:18:51 IP.TWPING CTRL EVNT State changed Active -> Start-Sessions (event=TX Start-Sessions) 2009.06.03 11:18:51 IP.TWPING CTRL PKT Sending Start-Sessions (len=32) 2009.06.03 11:18:51 IP.TWPING CTRL EVNT State changed Start-Sessions -> Active (event=RX Start-Ack) 2009.06.03 11:18:51 IP.TWPING CTRL PKT Received Start-Ack (len=32) accept=0--- statistics from [10.22.135.18]:1090 to [10.22.130.44]:1063 SID: 00000003720725133617212318489 10 sent, 0 lost (0.000%) Delay round-trip min/avg/max = num/sum/sum2 = out min/avg/max = num/sum/sum2 = in min/avg/max = num/sum/sum2 =
0 10 -6 10 7 10
0 9 -6 -62 7 72
0 ms 9 ms -6 ms 388 ms 7 ms 522 ms
60000CRG0-35B
319
Command Reference Guide IPDV-abs round-trip min/avg/max = num/sum/sum2 = out min/avg/max = num/sum/sum2 = in min/avg/max = num/sum/sum2 = IPDV-pos round-trip min/avg/max = num/sum/sum2 = out min/avg/max = num/sum/sum2 = in min/avg/max = num/sum/sum2 = IPDV-neg round-trip min/avg/max = num/sum/sum2 = out min/avg/max = num/sum/sum2 = in min/avg/max = num/sum/sum2 = clock error local = sync, 0.488281 ms remote = sync, 0.488281 ms
0 9 0 9 0 9 0 4 0 2 0 7 0 5 0 7 0 2
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 ms 0 ms 0 ms 0 ms 0 ms 0 ms 0 ms 0 ms 0 ms 0 ms 0 ms 0 ms 0 ms 0 ms 0 ms 0 ms 0 ms 0 ms
2009.06.03 11:18:53 IP.TWPING CTRL EVNT State changed Active -> Stop-Sessions (event=TX Stop-Session) 2009.06.03 11:18:53 IP.TWPING CTRL PKT Sending Stop-Sessions (len=32) accept=0 numSessions=0 2009.06.03 11:18:53 IP.TWPING CTRL EVNT State changed Stop-Sessions -> Active (event=Stopping Tests) 2009.06.03 11:18:53 IP.TWPING CTRL EVNT Closing connection 2009.06.03 11:18:53 IP.TWPING CTRL EVNT State changed Active -> Closed (event=Close Connection)
60000CRG0-35B
320
debug port-auth
Use the debug port-auth command to generate debug messages used to aid in troubleshooting problems during the port authentication process. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include the following:
debug port-auth debug port-auth auth-sm debug port-auth bkend-sm debug port-auth general debug port-auth packet debug port-auth packet [both | tx | rx] debug port-auth reauth-sm debug port-auth supp-sm
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
auth-sm bkend-sm general packet both packet rx packet tx reauth-sm supp-sm Optional. Displays AuthPAE-state machine information. Optional. Displays backend-state machine information. Optional. Displays configuration changes to the port authentication system. Optional. Displays packet exchange information in both receive and transmit directions. Optional. Displays packet exchange information in the receive-only direction. Optional. Displays packet exchange information in the transmit-only direction. Optional. Displays reauthentication-state machine information. Optional. Displays supplicant-state machine information.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 9.1 Release 10.1 Release 13.1 Command was introduced. New options were introduced. New options were introduced.
60000CRG0-35B
321
Usage Examples
The following example activates port authentication debug information on received packets: >enable #debug port-auth packet rx Rcvd EAPOL Start for sess 1 on int eth 0/2
60000CRG0-35B
322
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example activates port security debug messages: >enable #debug port security
60000CRG0-35B
323
debug ppp
Use the debug ppp command to activate debug messages associated with Point-to-Point Protocol (PPP) operation in AOS. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug ppp authentication debug ppp errors debug ppp negotiation debug ppp verbose
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
authentication Activates debug messages pertaining to PPP authentication (Challenge-Handshake Authentication Protocol (CHAP), Password Authentication Protocol (PAP), Extensible Authentication Protocol (EAP), etc.). Activates debug messages that indicate a PPP error was detected (mismatch in negotiation authentication, etc.). Activates debug messages associated with PPP negotiation. Activates detailed debug messages for PPP operation.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 1.1 Command was introduced.
Functional Notes
The debug ppp command activates debug messages to provide information on PPP activity in the system. PPP debug messages can be used to aid in troubleshooting PPP links.
Usage Examples
The following example activates debug messages associated with PPP authentication activity: >enable #debug ppp authentication
60000CRG0-35B
324
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example activates debug messages associated with PPPoE activity: >enable #debug pppoe client
60000CRG0-35B
325
debug probe
Use the debug probe command to activate debug messages associated with activities performed by the named probe object. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug probe debug probe <name> debug probe <name> twamp debug probe <name> twamp control debug probe <name> twamp control events debug probe <name> twamp control packets debug probe <name> twamp test debug probe <name> twamp test events debug probe <name> twamp test packets
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
<name> twamp control events packets test events packets Optional. Specifies the probe object or activates the probe database debug event messages for the specified probe. Optional. Specifies Two-Way Active Measurement Protocol (TWAMP) probe verbose output. Activates TWAMP control probe verbose messages. Optional. Activates TWAMP control probe events. Optional. Activates decode TWAMP control packets messages. Activates TWAMP Test probe verbose output. Optional. Activates TWAMP Test probe events. Optional. Activates decode TWAMP Test packets messages.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 16.1 Release 17.3 Command was introduced. Command was expanded to include the TWAMP probe verbose output.
60000CRG0-35B
326
Usage Examples
The following example activates all debug messages associated with the probes: >enable #debug probe The following example activates debug messages associated with the probe object named probe_A: >enable #debug probe probe_A
60000CRG0-35B
327
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
responder twamp control event <address> packet <address> Optional. Activates probe debug messages for all Two-Way Active Measurement Protocol (TWAMP) responder verbose output. Optional. Activates probe debug messages for TWAMP control responder verbose output. Optional. Activates probe debug messages for TWAMP control responder events. Specify the far-end IP address to activate remote events. Optional. Activates probe debug messages to decode TWAMP control packets. Enter an IP address to decode TWAMP control packets from a specific address. Optional. Activates probe debug messages for TWAMP test responder verbose output. event <address> Optional. Activates probe debug messages for TWAMP test responder events. Enter a far-end IP address to display events from the specified address. Optional. Activates probe debug messages to decode TWAMP test packets. Enter an IP address to decode TWAMP test packets from a specific address.
test
packet <address>
Default Values
By default, all debug messages in AOS are disabled.
60000CRG0-35B
328
Command History
Release 13.1 Release 17.2 Command was introduced. Command was expanded to include the TWAMP responder debug options.
Usage Examples
The following example activates debug messages associated with all probe objects: >enable #debug probe The following example activates debug messages associated with the probe object named probe_A: >enable #debug probe probe_A The following example activates probe responder debug messages: >enable #debug probe responder
60000CRG0-35B
329
debug radius
Use the debug radius command to enable debug messages from the remote authentication dial-in user service (RADIUS) subsystem. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
The debug radius messages show the communication process with the remote RADIUS servers.
Usage Examples
The following is an example output for the debug radius command: >enable #debug radius RADIUS AUTHENTICATION: Sending packet to 172.22.48.1 (1645). RADIUS AUTHENTICATION: Received response from 172.22.48.1.
60000CRG0-35B
330
debug restore
Use the debug restore command to restore the last saved debug filters to the unit. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 17.4 Command was introduced.
Functional Notes
This command is used to restore filters saved using the command debug save on page 332. To view the saved filters without restoring them to the unit, use the show debugging saved-filters command (refer to show debugging on page 418).
Usage Examples
The following example restores previously saved debug filters on the AOS unit: >enable #debug restore Restoring saved debug filters... Filters to restore: debug mail-client agent debug probe test1 Running restoration script...done
60000CRG0-35B
331
debug save
Use the debug save command to perform a persistent save of the debug filters enabled in the current command line interface (CLI) session. The saved filters can be restored at a later time. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 17.4 Command was introduced.
Functional Notes
This command is used to save debug filters across a unit reboot. Filters are restored using the command debug restore on page 331. To view the saved filters without restoring them to the unit, use the show debugging saved-filters command (refer to show debugging on page 418). Only one set of filters can be saved per instance of AOS. If a previous set of filters has been saved, issuing the debug save command overwrites the previously saved filters with the current set of filters. If no filters are currently active, issuing debug save has no effect so that the last saved files are not lost.
Usage Examples
The following example saves the debug filters from the current CLI session: >enable #debug save Saving debug filters enabled in this session... debug mail-client agent debug probe test1 Done.
60000CRG0-35B
332
debug schedule
Use the debug schedule command to activate debug messages associated with a schedule. Variations of this command include:
debug schedule debug schedule <name>
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
<name> Optional. Displays only the debug information for a specific schedule.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 17.5 Command was introduced.
Usage Examples
The following example enables debug information for any configured schedules: >enable #debug schedule 01:00:15: NETMON.SCHEDULE MIDNIGHT: status changed to inactive
60000CRG0-35B
333
debug sip
Use the debug sip command to activate debug messages associated with Session Initiation Protocol (SIP) events. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug sip cldu debug sip location debug sip manager debug sip name-service debug sip syntax debug sip tdu debug sip trunk-registration debug sip trunk-registration <Txx> debug sip trunk-registration <Txx> <trunk id> debug sip user-registration debug sip user-registration <extension>
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
cldu location manager name-service syntax tdu trunk-registration trunk-registration <Txx> Activates SIP CLDU event debug messages. Activates SIP location database event debug messages. Activates SIP stack manager event debug messages. Activates SIP name-service event debug messages. Activates SIP syntax event debug messages. Activates SIP transaction distribution unit (TDU) debug messages. Activates all SIP trunk-registration event debug messages. Optional. Activates SIP trunk-registration event debug messages for a specific trunk. For example: Txx (T01) where xx is the trunks two-digit identifier.
trunk-registration <Txx> <trunk id> Optional. Activates SIP trunk-registration event debug messages for a specific trunk. For example: Txx (T01) where xx is the trunks two-digit identifier and <trunk id> is the specific name associated with the trunk. user-registration user-registration <extension> Activates all SIP user-registration event debug messages. Optional. Activates SIP user-registration event debug messages for a specific trunk.
Default Values
By default, all debug messages in AOS are disabled.
60000CRG0-35B
334
Command History
Release 9.3 Release 11.1 Release 15.1 Release 16.1 Release 17.3 Command was introduced. Command was expanded to include the proxy event messages. Command was expanded to include the name-service messages. Command was expanded to include the TDU messages. Command was expanded to include the syntax messages.
Usage Examples
The following example activates all debug messages associated with SIP CLDU events: >enable #debug sip cldu
60000CRG0-35B
335
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
database dialogs routing transactions verbose Activates SIP proxy database debug event debug messages. Activates SIP proxy DOM event debug messages. Activates SIP proxy message-routing events. Activates SIP proxy event debug messages that shows the interaction between the SIP proxy and the SIP stack. Activates all SIP proxy debug messages.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example activates all debug messages associated with SIP proxy events: >enable #debug sip proxy verbose
60000CRG0-35B
336
Turning on a large amount of debug information can adversely affect the performance of your unit.
The majority of the debug sip stack messages variations are available in any order, at any time within the subcommand. Use the ? at any level after each variation listed within the brackets to view additional arguments and variations for the subcommand(s). Syntax Description
debug errors exceptions info messages ack all bye cancel from <user> info invite message Activates SIP stack debug event debug messages. Activates SIP stack error event debug messages. Activates SIP stack exception event debug messages. Activates SIP stack info event debug messages. Specify which SIP debug messages to activate from the list below. Activates SIP ACK debug messages. Activates all SIP debug messages. Activates SIP ACK debug messages. Activates SIP CANCEL debug messages. Activates SIP debug messages from the specified user. Activates SIP INFO debug messages. Activates SIP INVITE debug messages. Activates SIP MESSAGES debug messages.
60000CRG0-35B
337
Command Reference Guide notify options prack publish refer register request response rx subscribe summary to <user> tx update verbose warnings Activates SIP NOTIFY debug messages. Activates SIP OPTIONS debug messages. Activates SIP PRACK debug messages. Activates SIP PUBLISH debug messages. Activates SIP REFER debug messages. Activates SIP REGISTER debug messages.
Activates the specified SIP request debug messages. Activates the specified SIP response debug messages. Activates received SIP debug messages to or from a specific user. Activates SIP SUBSCRIBE debug messages. Activates SIP debug messages and displays only a summary (first line) of the available messages. Activates SIP debug messages to the specified user. Activates transmitted SIP debug messages to or from a specific user. Activates SIP UPDATE debug messages. Activates all SIP stack event debug messages. Activates SIP stack warning event debug messages.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 9.3 Release A1 Command was introduced. Command was expanded in the AOS voice products.
Usage Examples
The following example activates all debug messages associated with SIP stack events: >enable #debug sip stack all
60000CRG0-35B
338
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 14.1 Command was introduced.
Usage Examples
The following is an example of debug output for snmp packets: >enable #debug snmp packets #SNMP V1 RX: GET-NEXT Request PDU from 10.23.1.157:2922 (community=public) request id=3, error status=0, error index=0 max repetitions=0, non repetitions=0 VarBinds: OID=1.3.6.1.2.1.1.3 value=empty #SNMP V1 TX: GET Response PDU to 10.23.1.157:2922 (community=public) request id=3, error status=0, error index=0 max repetitions=1, non repetitions=0 VarBinds: OID=1.3.6.1.2.1.1.3.0 value=410825
60000CRG0-35B
339
debug sntp
Use the debug sntp command to enable debug messages associated with the Simple Network Time Protocol (SNTP). All SNTP packet exchanges and time decisions are displayed with these debugging events enabled. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include the following:
debug sntp client debug sntp server
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
client server Displays SNTP client information. Displays SNTP server information.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 3.1 Release 13.1 Command was introduced. Command was expanded to include the client and server options.
Functional Notes
The debug sntp command activates debug messages to aid in troubleshooting SNTP issues.
Usage Examples
The following is an example output for the debug sntp client command: >enable #debug sntp client #configure terminal #sntp server ntp.adtran.com 2009.03.16 15:38:06 SNTP.CLIENT sent Version 1 SNTP time request to 172.22.48.13 2009.03.16 15:38:06 SNTP.CLIENT received SNTP reply packet from 172.22.48.13 2009.03.16 15:38:06 SNTP.CLIENT setting time to 03-16-2009 15:37:54 CDT 2009.03.16 15:37:54 SNTP.CLIENT waiting for 86400 seconds for the next poll interval
60000CRG0-35B
340
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
all receive transmit Displays debug messages for BPDU packets that are transmitted and received by the unit. Displays debug messages for BPDU packets received by the unit. Displays debug messages for BPDU packets transmitted by the unit.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example displays debug messages for BPDU packets that are transmitted and received by the unit: >enable #debug spanning-tree bpdu all
60000CRG0-35B
341
debug spanning-tree
Use the debug spanning-tree command to enable the display of spanning-tree debug messages. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug spanning-tree config debug spanning-tree events debug spanning-tree general debug spanning-tree topology
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
config events general topology Enables the display of spanning-tree debug messages when configuration changes occur. Enables the display of debug messages when spanning-tree protocol events occur. Enables the display of general spanning-tree debug messages. Enables the display of debug messages when spanning-tree protocol topology events occur.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 5.1 Release 12.1 Command was introduced. Command was expanded to include topology.
Usage Examples
The following example enables the display of general spanning-tree debug messages: >enable #debug spanning-tree general
60000CRG0-35B
342
debug stack
Use the debug stack command to enable switch-stacking debug messages. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages.Variations of this command include:
debug stack debug stack switch debug stack verbose
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
switch verbose Optional. Enables messages specific to the stack ports (stack switch application program interface (API) information). Optional. Enables detailed messages specific to the stack protocol.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example activates the possible debug stack messages: >enable #debug stack switch #debug stack verbose
60000CRG0-35B
343
debug system
Use the debug system command to enable debug messages associated with system events (i.e., login, logouts, etc.). Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
No subcommands.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example activates debug messages associated with system information: >enable #debug system
60000CRG0-35B
344
debug tacacs+
Use the debug tacacs+ command to activate debug messages associated with terminal access controller access-control system plus (TACACS+) protocol. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug tacacs+ debug tacacs+ events debug tacacs+ packets
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
events packets Optional. Activates TACACS+ event debug messages. Optional. Activates TACACS+ packet debug messages.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example activates debug messages associated with the TACACS+ protocol: >enable #debug tacacs+ packets
60000CRG0-35B
345
debug tcl
Use the debug tcl command to activate debug messages associated with tool command language (Tcl) interpreter operation. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug tcl cli debug tcl cli <filename> debug tcl track <name>
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
cli <filename> track <name> Displays debug messages for the Tcl interpreter to the command line interface (CLI). Optional. Displays debug messages only for the specified Tcl script file. Displays debug messages for the specified track. The track parameter is only available on platforms with Network Monitoring enabled.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example activates debug messages for the Tcl interpreter while running the file test1.tcl: >enable #debug tcl test1.tcl
60000CRG0-35B
346
debug track
Use the debug track command to activate debug messages associated with activities performed by track objects. Debug messages are displayed (real time) to the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include:
debug track debug track <name>
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
<name> Optional. Displays information about the specified track rather than all configured tracks.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example activates debug messages associated with all track objects: >enable #debug track The following example activates debug messages associated with the track object named track_1: >enable #debug track track_1
60000CRG0-35B
347
debug voice
Use the debug voice command to activate debug messages associated with voice functionality. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include the following:
debug voice account-status debug voice autoattendant debug voice conference local debug voice dsp debug voice dsp voip <slot/port> channel verbose debug voice dsp voip <slot/port> channel <number> ecan debug voice dsp voip <slot/port> channel <number> rfc2833 debug voice erltool debug voice erltool info debug voice erltool statemachine debug voice findme-followme debug voice findme-followme <extension> debug voice lineaccount debug voice lineaccount <line> debug voice linemanager debug voice linemanager <line> debug voice loopback debug voice mail debug voice mail <subsource> debug voice moh debug voice moh app debug voice moh player debug voice paging-group debug voice paging-group <extension> debug voice phonemanager debug voice phonemanager <slot:port> debug voice promptstudio debug voice proxydial debug voice queue debug voice replication debug voice ring-group debug voice rtp channel debug voice rtp conference local debug voice rtp manager debug voice rtp provider debug voice rtp verbose debug voice services-interface debug voice smdr debug voice smdr <number> debug voice stationaccount
60000CRG0-35B
348
Command Reference Guide debug voice stationaccount <extension> debug voice statusgroups debug voice summary debug voice switchboard debug voice switchboard <subsource> debug voice switchboard call debug voice switchboard call <subsource> debug voice switchboard ccm debug voice toneservices debug voice toneservices <notifies> debug voice toneservices <interface> debug voice toneservices <interface> <slot/port> debug voice trunkaccount debug voice trunkaccount <trunk id> debug voice trunkaccount <trunk id> <appearance> debug voice trunkmanager debug voice trunkmanager <trunk id> debug voice trunkport debug voice trunkport <slot:port:DS0> debug voice verbose
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
account-status autoattendant conference local dsp <number> ecan rfc2833 verbose erltool info statemachine findme-followme Activates station account status event debug messages. Activates auto attendant event debug messages. Activates local conference session debug messages. Activates digital signal processor (DSP) event debug messages. voip <slot/port> channel Optional. Activates DSP on the specified interface and DSP channel. Optional. Activates DSP on the specified interface and DSP channel. Optional. Activates the echo canceller debug feature. Optional. Activates the RFC 2833 debug feature. Optional. Activates detailed DSP event debug messages for the specified interface and channel. Activates the echo return loss (ERL) debug messages to monitor the progress of the testing. Optional. Activates information events related to the ERL tool testing progress. Optional. Activates ERL tool state machine events. Activates all FindMe-FollowMe event debug messages.
60000CRG0-35B
349
Command Reference Guide <extension> lineaccount <line> linemanager <line> loopback mail <subsource> moh app player paging-group <extension> phonemanager <slot:port> promptstudio proxydial queue replication ring-group rtp channel manager provider verbose services-interface smdr <number> stationaccount <extension> statusgroups summary switchboard
Enable Mode Command Set Optional. Activates FindMe-FollowMe event debug messages for a specific extension. Activates all line account event debug messages. Optional. Activates a specific line account event debug messages. Activates all line manager event debug messages. Optional. Activates a specific line manager event debug messages. Activates all voice loopback account event debug messages. Activates all voicemail event debug messages. Optional. Activates voicemail event debug messages for a specific subsource. Activates all music on hold debug messages. Optional. Activates debug messages for the music on hold application. Optional. Activates debug messages for the music on hold player. Activates all handset paging group event debug messages. Optional. Activates handset paging group event debug messages for a specific paging group extension. Activates all phone manager event debug messages. Optional. Activates phone manager event debug messages for a specific slot and port. Activates prompt-studio event debug messages. Activates proxy dial event debug messages. Activates call queue debug messages. Activates packet replicator event debug messages. Activates ring-group event debug messages. Activates Realtime Transport Protocol (RTP) event debug messages. Activates RTP channel event debug messages. Activates RTP manager event debug messages. Activates RTP provider event debug messages. Activates detailed RTP debug messages. Activates debug messages for services interface events. Activates all station message detail reporting (SMDR) event debug messages. Optional. Activates SMDR event debug messages for a specific to or from number. Activates all station account event debug messages. Optional. Activates station account event debug messages for a specific extension. Activates status group event debug messages. Activates simple voice event debug messages. Activates all switchboard event debug messages.
60000CRG0-35B
350
Command Reference Guide <subsource> call call <subsource> ccm toneservices <notifies>
Enable Mode Command Set Optional. Activates switchboard event debug messages for a specific subsource. Activates switchboard call state machine event debug messages. Optional. Activates switchboard call state machine event debug messages for a specific subsource. Activates switchboard call connection manager event debug messages. Activates all tone service events debug messages. Optional. Activates tone service events debug messages for the specified interface type. For example, for a foreign exchange station (FXS) interface, use fxs. Optional. Activates tone service events debug messages for the specified interface type. Optional. Activates tone service events debug messages for the specified slot and port of the interface type. For example, for an individual FXS port use, fxs 0/1. Activates all trunk account event debug messages. Optional. Activates trunk account event debug messages for a specific trunk. Activates all trunk manager event debug messages. Optional. Activates trunk manager event debug messages for a specific trunk. Activates all trunk port event debug messages. Optional. Activates trunk port event debug messages for a specific slot, port, and digital signal 0 (DS0). Optional. Displays the entire running configuration to the terminal screen (versus only the nondefault values).
<trunk id> <appearance> Optional. Specifies specific trunk appearance. trunkmanager <trunk id> trunkport <slot:port:DS0> verbose
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 9.3 Release 10.1 Release 12.1 Release 13.1 Release 14.1 Release 15.1 Release A1 Release A2 Command was introduced. Command was expanded to include more parameters. Command was expanded to include more parameters. Command was expanded to include more parameters. Command was expanded to include more parameters. Command was expanded to include more parameters. Command was expanded to include the loopback parameter. Command was expanded to include the conference local and dsp parameters.
60000CRG0-35B
351
Enable Mode Command Set Command was expanded to include the erltool, paging-group, and replication parameters. Command was expanded to include the moh, findme-followme, pickup-group, queue, and conference local parameters. Command was altered to exclude the color and pickup-group parameters. The color parameter is covered by the debug color command on page 213 and the pickup-group parameter is covered using the debug voice verbose command. Command was expanded to include the services-interface and ring-group parameters.
Usage Examples
The following example activates all debug messages associated with voice functionality: >enable #debug voice summary The following is sample output from the debug voice paging-group command for paging group 6299: >enable #debug voice paging-group 6299 16:08:50:737 HPG.6299 rcvd: deliver from SB 16:08:50:738 HPG.6299 Undo of previous operation not required (RTP NAT Entry for 10.10.20.2:2228 not found) 16:08:50:739 HPG.6299 Checking for internal Media Gateway IP Address 16:08:50:739 HPG.6299 Given RTP Channel is null, checking for hairpinned RTP Channel 16:08:50:739 HPG.6299 Unable to find hairpinned RTP Channel 16:08:50:739 HPG.6299 RTP Channel is NULL, Media Gateway must not be involved in call 16:08:50:739 HPG.6299 Checking need for firewall traversal 16:08:50:740 HPG.6299 Testing firewall policies 16:08:50:740 HPG.6299 NAT not required, no need for firewall traversal here 16:08:50:740 HPG.6299 sent: deliverResponse to SB 16:08:50:740 HPG.6299 In - State change >> Idle -> Ringing 16:08:50:741 HPG.6299 Out.6002.Idle recvd: callMember 16:08:50:741 HPG.6299 sent: call to SB 16:08:50:741 HPG.6299 Out.6002 - State change >> Idle -> Calling 16:08:50:741 HPG.6299 Out.6004.Idle recvd: callMember 16:08:50:742 HPG.6299 sent: call to SB 16:08:50:742 HPG.6299 Out.6004 - State change >> Idle -> Calling 16:08:50:744 HPG.6299 Out.6002.Calling rcvd: callResponse from SB 16:08:50:748 HPG.6299 Out.6004.Calling rcvd: callResponse from SB 16:08:50:758 HPG.6299 Ignoring deliverResponse 16:08:50:759 HPG.6299 Ignoring deliverResponse 16:08:51:034 HPG.6299 Out.6004.Calling rcvd: connect from SB 16:08:51:035 HPG.6299 Undo of previous operation not required (RTP NAT Entry for 10.10.20.6:3004 not found) 16:08:51:035 HPG.6299 Checking for internal Media Gateway IP Address
60000CRG0-35B
352
16:08:51:037 HPG.6299 Given RTP Channel is null, checking for hairpinned RTP Channel 16:08:51:037 HPG.6299 Unable to find hairpinned RTP Channel 16:08:51:037 HPG.6299 RTP Channel is NULL, Media Gateway must not be involved in call 16:08:51:037 HPG.6299 Checking need for firewall traversal 16:08:51:038 HPG.6299 Testing firewall policies 16:08:51:038 HPG.6299 NAT not required, no need for firewall traversal here 16:08:51:038 HPG.6299 sent: connectResponse to SB 16:08:51:038 HPG.6299 In.Ringing processConnectedMember 16:08:51:038 HPG.6299 Out.6004 - State change >> Calling -> Connected --MORE--
60000CRG0-35B
353
debug vrrp
Use the debug vrrp command to enable Virtual Router Redundancy Protocol (VRRP) debug messages. Debug messages are displayed (real time) on the terminal (or Telnet) screen. Use the no form of this command to disable the debug messages. Variations of this command include the following:
debug vrrp debug vrrp error debug vrrp interface <interface> error debug vrrp interface <interface> group <number> error debug vrrp interface <interface> group <number> packet debug vrrp interface <interface> packet debug vrrp packet
Turning on a large amount of debug information can adversely affect the performance of your unit.
Syntax Description
error interface <interface> Optional. Displays debug messages for all VRRP errors in all groups on all interfaces or on a specified interface. Optional. Displays debug messages for all VRRP groups on the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a virtual local area network (VLAN) interface, use vlan 1. Type debug vrrp interface ? for a complete list of valid interfaces. Optional. Specifies debug messages for a single VRRP group on a specified interface are generated. Group numbers range from 1 to 255. Optional. Displays debug messages for VRRP errors for a single group on a specified interface. Optional. Displays debug messages for VRRP packets for a single group on a specified interface. Optional. Displays debug messages for all VRRP packets in all groups on all interfaces or on a specified interface.
Default Values
By default, all debug messages in AOS are disabled.
Command History
Release 16.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
60000CRG0-35B
354
Functional Notes
Although VRRP group virtual router IDs (VRIDs) can be numbered between 1 and 255, only two VRRP routers per interface are supported.
Usage Examples
The following example gives sample output from the debug vrrp packet command: >enable #debug vrrp packet 2007.05.26 15:48:57 VRRP.PKT eth 0/1 grp 1 Sent Advertisement pri: 125, ipCnt:1 2007.05.26 15:48:57 VRRP.PKT eth 0/1 grp 2 Received Advertisement pri: 125 from 10.23.197.236
60000CRG0-35B
355
dir
Use the dir command to display a directory list of all files on the system or just those matching the specified pattern, located in a specified location. Variations of this command include:
dir dir <pattern> dir cflash dir cflash <pattern> dir flash dir flash <pattern> dir ramdisk dir ramdisk <pattern>
Syntax Description
<pattern> Optional. Displays all files that match the specified pattern. When a wildcard (*) is specified, only files located in the specified location matching the listed pattern are displayed. For example, *.biz displays all files with the .biz extension. When no wildcard is specified, the entire contents of flash memory is displayed. cflash flash ramdisk Optional. Displays files located on the installed CompactFlash card. Optional. Displays files located on the system in flash memory. Optional. Displays files located on the volatile RAM disk.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 12.1 Release 17.7 Command was introduced. Command was expanded to include CompactFlash. Command was expanded to include the ramdisk parameter.
Usage Examples
The following is sample output from the dir flash command: >enable #dir flash 3563529 NV2100A-10-05-00-E.biz 2438 startup-config 2484 startup-config.bak 3694712 bytes used, 3007368 available, 6702080 total
60000CRG0-35B
356
The following is sample output from the dir ramdisk command displaying the contents of the RAM disk, space occupied by each file, the total ramdisk space allocated, available space, and used space: >enable #dir ramdisk 10005125 NV3130A-17-07-00-26-AE.biz 10007923 bytes used, 7429514 available, 17437437 total
60000CRG0-35B
357
disable
Use the disable command to exit the Enable mode and enter the Basic mode. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example exits the Enable mode and enters the Basic Command mode: #disable >
60000CRG0-35B
358
erase
Use the erase command to erase the files from a specified location. Variations of this command (valid on all AOS units) include:
erase <filename> erase startup-config
Variations of this command (valid only on AOS units WITH CompactFlash) include:
erase cflash <filename> erase flash <filename> erase file-system cflash
Variations of this command (valid only on AOS units WITH voice capability) include:
erase dynvoice-config erase file-system flash erase file-system interface mef-ethernet <interface>
Variations of this command (valid only on AOS units with ramdisk enabled) include:
erase ramdisk <filename>
Erasing the file system removes all files and directories located in the units memory, including firmware images. If the primary boot image is located on the erased file system, the unit will be adversely affected after a reboot. The firmware has to be replaced using the procedure explained in the Upgrading AOS Firmware configuration guide, article number 1630, available online at http://kb.adtran.com. Syntax Description
<filename> Specifies the name of the file to erase. The asterisk (*) can be used as a wildcard to specify a pattern for erasing multiple files. When a wildcard is specified, only files matching the listed pattern are erased. Specifies the location of the file to erase as the installed CompactFlash card. Erases the dynamic voice configuration file stored in the flash memory. Erases the system files stored in either the system flash or CompactFlash memory. Specifies the location of the file to erase as the system flash memory. Erases the file system on the specified MEF-ethernet interface. Specifies the location of the file to erase as the volatile RAM disk. Erases the startup configuration file stored in flash memory.
60000CRG0-35B
359
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 12.1 Release 14.1 Release A2.04 Release 17.7 Release A4.01 Command was introduced. Command was expanded to include the dynvoice-config parameter. Command was expanded to include the file-system cflash parameter. Command was expanded to include the file-system flash parameter. Command was expanded to include the ramdisk parameter. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following example erases the startup configuration file stored in flash memory: >enable #erase startup-config If a new startup configuration file is not specified before cycling the power on the unit, AOS will initialize using a blank configuration. The following example erases all files located on the installed CompactFlash card: >enable #erase file-system cflash This will erase ALL files on compact flash. Proceed? [y/n] The following example erases all files located in the system flash memory: >enable #erase file-system flash WARNING! You are about to erase all files on the flash file system. This includes all firmware images and configuration files. This cannot be undone. This will erase ALL files on flash. Proceed? [y/n]
60000CRG0-35B
360
events
Use the events command to enable event reporting to the current command line interface (CLI) session. Use the no form of this command to disable all event reporting to the current CLI session. Syntax Description
No subcommands.
Default Values
By default, this command is enabled.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example enables event reporting: >enable #events
60000CRG0-35B
361
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example immediately generates an exception report: >enable #exception report generate
60000CRG0-35B
362
factory-default
Use the factory-default command to reset the unit to the factory default setting.
Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
After you issue this command, the system responds by first warning you that restoring the factory default settings will erase the current configurations. It then asks if you would like to proceed. Choose n to return to the command prompt (no configuration changes are made). Choose y to erase the startup-configuration, replace it with the factory-default configuration, and reboot the unit. After reboot, the new configuration takes effect.
Usage Examples
The following example resets the unit to the factory default settings: >enable #factory-default WARNING - Restoring the factory default settings will erase the current startup and running configurations and will reboot the unit. Restore factory default settings?[y/n]y Startup configuration written. Rebooting the system. Please wait...
60000CRG0-35B
363
logout
Use the logout command to terminate the current session and return to the login screen. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example shows the logout command being executed in Enable mode: >enable #logout Session now available Press RETURN to get started.
60000CRG0-35B
364
ping
Use the ping command (at the Enable mode prompt) to verify IPv4 network connectivity. For information on how to verify IPv6 network connectivity, refer to ping ipv6 on page 371. Variations of this command include:
ping ping <ipv4 address | hostname> ping <ipv4 address | hostname> data <string> ping <ipv4 address | hostname> repeat <number> ping <ipv4 address | hostname> size <value> ping <ipv4 address | hostname> source <ipv4 address> ping <ipv4 address | hostname> timeout <value> ping <ipv4 address | hostname> verbose ping <ipv4 address | hostname> wait <interval> ping vrf <name> <ipv4 address | hostname> ping vrf <name> <ipv4 address | hostname> data <string> ping vrf <name> <ipv4 address | hostname> repeat <number> ping vrf <name> <ipv4 address | hostname> size <value> ping vrf <name> <ipv4 address | hostname> source <ipv4 address> ping vrf <name> <ipv4 address | hostname> timeout <value> ping vrf <name> <ipv4 address | hostname> verbose ping vrf <name> <ipv4 address | hostname> wait <interval>
After specifying the target IPv4 address to ping, the other parameters can be entered in any order. Use the ? after each specified subcommand for a valid list of arguments and settings. Syntax Description
<ipv4 address | hostname> Optional. Specifies the IPv4 address or host name of the system to ping. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Entering the ping command with no specified Internet Protocol version 4 (IPv4) address prompts the user with parameters for a more detailed ping configuration. Refer to Functional Notes (below) for more information. Optional. Specifies an alphanumerical string to use (the ASCII equivalent) as the data pattern in the ECHO_REQ packets. Optional. Specifies the number of loopback messages to be sent. Range is 1 to 1024. Optional. Specifies the datagram size (in bytes) of the ping packet. Valid range is 1 to 1448 bytes. Optional. Specifies the IPv4 address to use as the source address in the ECHO_REQ (or interface) packets. The source IPv4 address must be a valid address local to the router on the specified VPN routing and forwarding (VRF) instance.
60000CRG0-35B
365
Command Reference Guide timeout <value> verbose vrf <name> wait <interval>
Enable Mode Command Set Optional. Specifies the timeout period after which the ping is considered unsuccessful. Valid range is 1 to 60 seconds. Optional. Enables detailed messaging. Optional. Specifies the VRF where the IPv4 address exists. Optional. Specifies a minimum time to wait between sending test packets. Valid range is 100 to 60000 milliseconds.
Default Values
By default, the data pattern is set to abcd. By default, the repeat is set to 5. By default, the size value is set to 100 bytes. By default, the timeout value is set to 2 seconds. By default, the wait value is set to 100 milliseconds.
Command History
Release 1.1 Release 16.1 Release 17.2 Release 17.4 Release A4.01 Command was introduced. Command was expanded to include the vrf parameter. Command was expanded to include the verbose and wait parameters, also changes were made to the repeat and timeout values. Command was expanded to include the count and interval parameters. The repeat and wait parameters were removed. Command was expanded to return the wait parameter.
Functional Notes
The ping command can be issued from both the Basic and Enable modes. The ping command helps diagnose basic IPv4 network connectivity using the Packet Internet Groper program to repeatedly bounce Internet Control Message Protocol version 4 (ICMPv4) ECHO_REQ packets off a system (using a specified IPv4 address). AOS allows executing a standard ping request to a specified IP address, or provides a set of prompts to configure a more specific ping configuration. The following is a list of output messages from the ping command: ! $ X ? * Success Destination Host Unreachable Invalid Host Address TTL Expired in Transit Unknown Host Request Timed Out
60000CRG0-35B
366
Command Reference Guide The following is a list of available extended ping fields with descriptions: Extended Commands Source Address Data Pattern Sweep Range of Sizes Sweep Min Size Sweep Max Size Sweep Interval Verbose Output
Specifies whether additional commands are desired for more ping configuration parameters. Answer yes (y) or no (n). Specifies the IPv4 address to use as the source address in the ECHO_REQ (or interface) packets. Specifies an alphanumerical string to use (the ASCII equivalent) as the data pattern in the ECHO_REQ packets. Varies the sizes of the ECHO_REQ packets transmitted. Specifies the minimum size of the ECHO_REQ packet. Valid range is 0 to 1488. Specifies the maximum size of the ECHO_REQ packet. Valid range is the sweep minimum size to 1448. Specifies the interval used to determine packet size when performing the sweep. Valid range is 1 to 1448. Specifies an extended results output.
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following is an example of a successful ping command: >enable #ping VRF Name [-default-]: Target IP address:192.168.0.30 Repeat count [5]:5 Datagram Size [100]:100 Timeout in seconds [2]:2 Wait interval in milliseconds [100]:100 Extended Commands? [n]:n Type CTRL+C to abort. Legend: '!' = Success, '?' = Unknown host, '$' = Invalid host address '*' = Request timed out, '-' = Destination host unreachable 'x' = TTL expired in transit, 'e' = Unknown error Sending 5, 100-byte ICMP Echos to 192.168.0.30, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/2 ms
60000CRG0-35B
367
ping ethernet
Use the ping ethernet command to initiate a loopback message from one Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) maintenance endpoint (MEP) to another MEP. These loopback messages are used to test the accessibility of the destination MEP. Variations of this command include:
ping ethernet <target-mac-address | target-mep-id> ping ethernet <target-mac-address | target-mep-id> count <number> ping ethernet <target-mac-address | target-mep-id> data <pattern> ping ethernet <target-mac-address | target-mep-id> domain <domain name> association <association name> ping ethernet <target-mac-address | target-mep-id> domain none association <association name> ping ethernet <target-mac-address | target-mep-id> drop-eligible ping ethernet <target-mac-address | target-mep-idl> interface <interface> ping ethernet <target-mac-address | target-mep-id> mep <mep id> ping ethernet <target-mac-address | target-mep-id> priority <priority> ping ethernet <target-mac-address | target-mep-id> repeat <number> ping ethernet <target-mac-address | target-mep-id> size <bytes> ping ethernet <target-mac-address | target-mep-id> timeout <timeout> ping ethernet <target-mac-address | target-mep-id> validate-data ping ethernet <target-mac-address | target-mep-id> verbose ping ethernet <target-mac-address | target-mep-id> wait <interval>
After specifying the target for the loopback messages, the other parameters can be entered in any order.
Syntax Description
<target-mac-address | target-mep-id> Specifies the destination for the loopback message. Medium access control (MAC) addresses are entered in the format HH:HH:HH:HH:HH:HH. Target MEP IDs are the unique numerical values identifying MEPs. MEP IDs range from 1 to 8191. Optional. Specifies the number of loopback messages to send. Range is 1 to 1000000. Optional. Specifies the pattern to be carried in the data time length value (TLV) of the loopback message. Pattern is up to four hexadecimal digits. Pattern range is 0 to ffff. Optional. Specifies the maintenance domain to which the transmitting MEP belongs. Optional. Specifies no maintenance domain. Optional. Specifies the maintenance association to which the transmitting MEP belongs.
60000CRG0-35B
368
Enable Mode Command Set Optional. Specifies the drop eligible bit value in the virtual local area network (VLAN) tag. Optional. Specifies the interface on which the transmitting MEP is configured. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1. For a list of appropriate interfaces, enter interface ? at the prompt. Specifies the MEP ID of the transmitting MEP. MEP ID range is 1 to 8191. Optional. Specifies the 802.1 priority bits that are sent in the loopback message. Range is 0 to 7. Optional. Specifies the number of loopback messages to be sent. Range is 1 to 1024. Optional. Specifies the size of the loopback message. Size ranges from 1 to 60 bytes. Optional. Specifies the time that the MEP will wait for a response to the loopback message. Range is 0 to 60 seconds. Optional. Specifies whether or not the transmitting MEP validates the contents of the data TLV in the received loopback messages. Optional. Specifies that the results are in detailed, rather than summary, format. Optional. Specifies a minimum time to wait between sending loopback messages. Valid range is 100 to 60000 milliseconds.
mep <mep id> priority <priority> repeat <number> size <bytes> timeout <timeout> validate-data verbose wait <interval>
Default Values
By default, the count value is set to 5. By default, the data pattern is set to abcd. By default, the drop-eligible value is not set. By default, the interval is set to 1000 milliseconds. By default, the priority value is the priority specified in the MEPs configuration. By default, the size value is set to 2 bytes. By default, the timeout value is set to 2 seconds. By default, the validate-data parameter is disabled.
Command History
Release 17.4 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface and the wait and repeat parameters.
60000CRG0-35B
369
Functional Notes
The ping ethernet command can be issued from both the Basic and Enable modes. If the MEP ID is used as the target, the remote MEP must exist in the MEP continuity check message (CCM) database (meaning the remote MEP is transmitting valid CCMs) so that the MEP ID can be translated to the MAC address before the loopback message is transmitted. Both the domain <domain name> and association <association name> parameters are not required if the source MEP ID of the MEP is specified and unique through the AOS device. If the domain and association of the transmitting MEP are specified, and there is only one MEP in that domain or association, or if there is only one MEP configured on the unit, the mep <mep id> parameter is not required. For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
This command will not appear in the command line interface (CLI) unless Ethernet OAM CFM is enabled. To enable Ethernet OAM CFM, refer to the command ethernet cfm on page 879. Usage Examples
The following example initiates the Ethernet ping utility from an MEP in Domain1 association MA1 with a destination to an MEP with an MEP ID of 201: >enable #ping ethernet 201 domain Domain1 association MA1 Type CTRL+C to abort. Legend: ! = Success, * = Request timed out, d = Data Mismatch o = Out of order, . = No reply, e = Unknown error. Sending 5, 100-byte LBRs to MEP 201 from MEP 1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 202/668/1011 ms
60000CRG0-35B
370
ping ipv6
Use the ping ipv6 command (at the Enable mode prompt) to verify IPv6 network connectivity. For information on how to verify IPv4 network connectivity, refer to ping on page 365. Variations of this command include:
ping ipv6 <ipv6 address> ping ipv6 <ipv6 address> <interface> ping ipv6 <ipv6 address> data <string> ping ipv6 <ipv6 address> destination-option ping ipv6 <ipv6 address> hop-by-hop-option ping ipv6 <ipv6 address> repeat <number> ping ipv6 <ipv6 address> size <value> ping ipv6 <ipv6 address> source <ipv6 address> ping ipv6 <ipv6 address> timeout <value> ping ipv6 <ipv6 address> verbose ping ipv6 <ipv6 address> wait <interval> ping ipv6 vrf <name> <ipv6 address> ping ipv6 vrf <name> <ipv6 address> <interface> ping ipv6 vrf <name> <ipv6 address> data <string> ping ipv6 vrf <name> <ipv6 address> destination-option ping ipv6 vrf <name> <ipv6 address> hop-by-hop-option ping ipv6 vrf <name> <ipv6 address> repeat <interval> ping ipv6 vrf <name> <ipv6 address> size <value> ping ipv6 vrf <name> <ipv6 address> source <ipv6 address> ping ipv6 vrf <name> <ipv6 address> timeout <value> ping ipv6 vrf <name> <ipv6 address> verbose ping ipv6 vrf <name> <ipv6 address> wait <interval>
After specifying the target IPv6 address to ping, the other parameters can be entered in any order. Use the ? after each specified subcommand for a valid list of arguments and settings. Syntax Description
<interface> Specifies the egress interface when pinging an IPv6 link-local address (any address that has the prefix FE80::/64). Interfaces are specified in the <interface type> <slot/port | interface id> format. For example, for an Ethernet interface, use eth 0/1. Type ping ipv6 <ipv6 address> ? to display a list of valid interfaces. This variable is mandatory when pinging a link-local address. This variable is ignored when using a non-link-local address. Specifies the IPv6 address of the system to ping. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. Entering the ping ipv6 command using a link-local destination address prompts the user for an egress interface.
<ipv6 address>
60000CRG0-35B
371
Enable Mode Command Set Optional. Specifies an alphanumerical string to use (the ASCII equivalent) as the data pattern in the ICMPv6 ECHO_REQ packets. Optional. Includes the destination option in the ICMPv6 ECHO_REQ packets. Optional. Includes the hop-by-hop option in the ICMPv6 ECHO_REQ packets. This typically causes intermediate routers to process switch the packets, potentially detecting switching issues in these devices. Optional. Specifies the number of loopback messages to be sent. Range is 1 to 1024. Optional. Specifies the datagram size (in bytes) of the ping packet. Valid range is 1 to 1448 bytes. Optional. Specifies the IPv6 address to use as the source address in the ICMPv6 ECHO_REQ (or interface) packets. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. Entering the ping ipv6 command using a link-local destination address prompts the user for an egress interface. The source IPv6 address must be a valid address local to the router on the specified VPN routing and forwarding (VRF) instance. Optional. Specifies the timeout period after which the ping is considered unsuccessful. Valid range is 1 to 60 seconds. Optional. Enables detailed messaging. Optional. Specifies the VRF where the IPv6 address exists. Optional. Specifies a minimum time to wait between sending test packets. Valid range is 100 to 60000 milliseconds.
Default Values
By default, the data pattern is set to abcd. By default, the repeat is set to 5. By default, the size value is set to 100 bytes. By default, the timeout value is set to 2 seconds. By default, the wait value is set to 100 milliseconds.
Command History
Release 18.1 Command was introduced.
Functional Notes
The ping ipv6 command can be issued from both the Basic and Enable modes. The ping ipv6 command helps diagnose basic IPv6 network connectivity using the Packet Internet Groper program to repeatedly bounce Internet Control Message Protocol version 6 (ICMPv6) ECHO_REQ packets off a system (using a specified IPv6 address). AOS allows executing a standard ping ipv6 request to a specified IPv6 address, or provides keywords to configure a more specific ping ipv6 configuration.
60000CRG0-35B
372
Command Reference Guide The following is a list of output messages from the ping ipv6 command: ! $ x ? * e B Success Destination Host Unreachable Invalid Host Address TTL Expired in Transit Unknown Host Request Timed out Unknown Error Packet too Big
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example pings 2001:DB8:1A0::3 with 200 byte ICMPv6 ECHO_REQ packets: >enable #ping ipv6 2001:DB8:1A0::3 size 200 Type CTRL+C to abort. Legend: '!' = Success, '?' = Unknown host, '$' = Invalid host address '*' = Request timed out, '-' = Destination host unreachable 'x' = TTL expired in transit, 'e' = Unknown error 'B' = Packet too big Sending 5, 200-byte ICMP Echos to 2001:DB8:1A0::3, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/2 ms
60000CRG0-35B
373
Syntax Description
<number> vrf <name> Specified which member of the stack to ping. Optional. Specifies the VPN routing and forwarding (VRF) where the stack-member exists.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 16.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
The ping stack-member command can be issued from both the Basic and Enable modes. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example pings a member of the stack: >enable #ping stack-member 3 Type CTRL+C to abort. Legend: '!' = Success, '?' = Unknown host, '$' = Invalid host address '*' = Request timed out, '-' = Destination host unreachable 'x' = TTL expired in transit Sending 5, 100-byte ICMP Echos to 169.254.0.3, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 2/2.2/3 ms #
60000CRG0-35B
374
ping twamp
Use the ping twamp command to execute a Two-Way Active Measurement Protocol (TWAMP) type ping to measure the packet loss, delay, and interpacket delay variation (IPDV) and display the results of the test. Use the subcommands in any combination, in any order, when specifying the destination site. Variations of this command include:
ping twamp ping twamp <ip address | hostname> ping twamp <ip address | hostname> control-port <port> ping twamp <ip address | hostname> data pattern ping twamp <ip address | hostname> data pattern ascii <pattern> ping twamp <ip address | hostname> data pattern hex <pattern> ping twamp <ip address | hostname> data random ping twamp <ip address | hostname> data zero ping twamp <ip address | hostname> dscp <value> ping twamp <ip address | hostname> interval <value> ping twamp <ip address | hostname> port <port> ping twamp <ip address | hostname> repeat <value> ping twamp <ip address | hostname> size <value> ping twamp <ip address | hostname> source <ip address> ping twamp <ip address | hostname> source-port <port> ping twamp <ip address | hostname> timeout <value> ping twamp <ip address | hostname> verbose ping twamp <ip address | hostname> wait <value>
The subcommands can be used in a string of any available combination. Use the ? after each specified subcommand for a valid list of arguments and settings.
Syntax Description
<ip address | hostname> Optional. Specifies the IP address or host name of the system to ping. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Entering the ping twamp command with no specified IP address prompts the user with parameters for a more detailed ping twamp configuration. Optional. Specifies the destination TWAMP control port. Port range is 1 to 65535. Optional. Specifies data used to pad packets. The following options are available: Pads the packet with a user-specified pattern. Pads the packet with a user-specified ascii pattern. Pads the packet with a user-specified hex pattern. Pads the packet with random numbers. ascii <pattern> hex <pattern> random
60000CRG0-35B
375
Command Reference Guide zero dscp <value> interval <value> port <port> repeat <value> size <value> source <ip address> source-port <port> timeout <value> verbose wait <value> Pads the packet with all zeros.
Optional. Specifies the differentiated services code point (DSCP) value. Valid range is 0 to 63. Optional. Specifies the interval between consecutive ping TWAMPs (in milliseconds). Valid range is 5 to 5000. Optional. Specifies the destination port for the TWAMP test packets. Valid range is 1 to 65535. Optional. Specifies the number of ping TWAMP packets. Valid range is 1 to 1000. Optional. Specifies the datagram size. Valid range is 0 to 1462. Optional. Specifies the source IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the source port for the TWAMP test packets. Valid range is 1 to 65535. Optional. Specifies the timeout value in milliseconds. Valid range is 100 to 60000. Optional. Displays the detailed two-way ping verbose results for the specified IP address or host name. Optional. Specifies the interval (in milliseconds) between consecutive TWAMP test packets. Range is 5 to 5000.
Default Values
By default, the data is zero, the dscp is 0, the interval value is 20, the port value is 0, the repeat value is 100, the size is 0, and the timeout is 2000 milliseconds.
Command History
Release 17.4 Release 17.6 Release A4.01 Command was introduced to replace the twping command. Command was expanded to include control-port and wait keywords. Command was expanded to include the ascii and hex pattern parameters.
Functional Notes
The ping twamp command can be issued from both the Basic and Enable modes.
Usage Examples
The following example executes a TWAMP ping: >enable #ping twamp 2009.06.03 11:18:24 IP.TWPING CTRL EVNT Attempting to connect 2009.06.03 11:18:24 IP.TWPING CTRL EVNT State changed Init -> Opening (event=Open Connection) 2009.06.03 11:18:24 IP.TWPING CTRL EVNT State changed Opening -> Setup (event=RX Server-Greeting)
60000CRG0-35B
376
2009.06.03 11:18:24 IP.TWPING CTRL EVNT State changed Setup -> Starting (event=TX Setup-Response) 2009.06.03 11:18:24 IP.TWPING CTRL PKT Sending Setup-Response (len=140) mode=1 keyId=00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 --MORE--
60000CRG0-35B
377
ramdisk <size>
Use the ramdisk command to create a volatile RAM disk file system and allocate memory in bytes to the newly created RAM disk. Use the no form of this command to delete the RAM disk. Not all units are capable of using a RAM disk file system. Use the ? command to display a list of valid commands at the enable prompt.
Syntax Description
<size> Specifies the size of the RAM disk in bytes. Valid range is 65536 to the maximum available heap size on the unit. Input for this value allows the use of the following characters as multipliers: M, m, K, and k.
Default Values
No default values are necessary for this command.
Command History
Release 17.7 Command was introduced.
Usage Examples
The following example creates a volatile RAM disk file system and allocates 128000 bytes of memory: >enable #ramdisk 128000 The following example creates a volatile RAM disk file system and uses the multiplier k to allocate 131072 bytes of memory (where 128k is 128 x 1024 = 131072): >enable #ramdisk 128k
60000CRG0-35B
378
reload
Use the reload command to perform a manual reload of AOS. Variations of this command include:
reload reload cancel reload in <delay>
Syntax Description
cancel in <delay> Optional. Deactivates a pending reload command. Optional. Specifies a delay period in minutes (mm) or hours and minutes (hh:mm) that AOS will wait before reloading.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example reloads the AOS software in 3 hours and 27 minutes: >enable #reload in 03:27 The following example reloads the AOS software in 15 minutes: >enable #reload in 15 The following example terminates a pending reload command: >enable #reload cancel
60000CRG0-35B
379
Syntax Description
<ap interface> factory-default Specifies the AP interface number to reload. Range is 1 to 8. Optional. Specifies reloading the unit with the factory default settings.
Default Values
No default values are necessary for this command.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example performs a cold start for AP interface 1: >enable #reload dot11 interface dot11ap 1 AP 1 reloaded Router# 2006.12.23 19:14:03 DOT11.Session : AP 1: AP reboot. 2006.12.23 19:14:03 DOT11.Session : AP 1: Control session lost. 2006.12.23 19:14:03 DOT11.Session : AP 1: Control session established.
60000CRG0-35B
380
Once the audit is in process, the session will be blocked until the audit is completed or until Ctrl+C is issued.
Syntax Description
cflash log Optional. Specifies saving the log file to CompactFlash memory. Optional. Specifies saving the audit results to a file named securityAudit_<timestamp>. The file name has the timestamp attached in the format yyyymmddhhmmss. If cflash is not specified, the file is saved to flash memory.
Default Values
No default values are necessary for this command.
Command History
Release 17.7 Command was introduced.
Functional Notes
The security audit tool is used to identify possible security violations. The results of the audit can be viewed by using the show audit security command (refer to show audit security on page 386), or by viewing the log file using the commands show flash on page 455 or show cflash on page 403. The show audit security command displays a summary of the security audit results including: the type of defect, severity, and a brief description. The show audit security detail command lists the summary, as well as details of the defect and recommends corrective action. It is up to the customer to determine if the findings are a true risk in their system, and to make the necessary adjustments to their configuration. Some items could be recorded as possible risks that are not actual risks based on the entire network configuration. If two people are logged in simultaneously (for example, one via Telnet and one via the console) and both try to run the audit security tool, the user who begins the audit first will take precedence. An error message will be displayed to the second user that an audit is in progress.
60000CRG0-35B
381
The following table lists the configuration items that are audited for security risks.
Violation Type
Startup-Config
Severity Description
High Indicates that the startup configuration file does not match the running configuration file. This is determined by comparing the MD5 checksum of both files for a match. Identifies nonsecure passwords. If a password has MD5 encryption enabled, the tool tests for common password sequences such as qwerty, 1234, abc, xyz, etc. If MD5 is disabled, an alert is issued if the password: Is less than 7 characters. Does not contain alphabetic and numeric characters. Matches common sequences such as qwerty, 1234, abc, xyz, etc. Matches the default passwords. Matches another password in the system. Service password encryption is not enabled. Indicates the firewall is disabled. Identifies any of the following access control policy (ACP) vulnerabilities: Stateful inspection is disabled. An undefined access control list (ACL) exists in the ACP. An interface with a private IP address (10.x.x.x, 172.16.x.x, 192.168.x.x) has an ACP assigned that does not have NAT configured. An interface is enabled without an ACP assigned. Indicates the SNMP agent is enabled and configured to allow SNMPv1 or SNMPv2. Both of these versions are considered nonsecure. SNMPv3 group and SNMPv3 user are preferred. Identifies any of the following network protocols are enabled and considered a security risk: HTTP, HTTPS SSLv2, FTP, TFTP, and Telnet. SSH is suggested as a replacement for Telnet and HTTPS SSLv3 instead of HTTPS SSLv2. Identifies any of the following wireless vulnerabilities: Security mode is set to anything but WPA2 (including none). Service set identifier (SSID) broadcast is enabled. A weak key. Identifies the console, HTTP, SSH, or Telnet session timeout is set to a value greater than 15 minutes. Long session timeouts can compromise the system. The recommended setting is 15 minutes or less. Indicates the time server (SNTP or NTP) is not configured or is configured but not synchronized. It is important to have a valid timestamp on all logs generated by the system.
Passwords/Keys
High
Firewall Policy-Class
High High
SNMP
High
Network Protocols
High
WIFI
High
Session Timeout
High
Time-Server
High
60000CRG0-35B
382
Violation Type
Logging
Severity Description
Medium Indicates user activity is not being logged. User activity should be logged either by enabling syslog or TACACs+ accounting. (The syslog can be enabled by using the logging forwarding on command.) Indicates ip domain-lookup is enabled but a DNS server has not been configured. This allows DNS requests to be broadcast. Identifies the following interface vulnerabilities: The ip directed-broadcast is enabled which could make an interface vulnerable to denial of service attacks. A static ACL assigned to an interface. A more secure option is to enable the firewall and assign an ACP. Indicates the enable password is not set for MD5 encryption. MD5 encryption is more secure than standard password encryption. Indicates the default executive banner is still set. It is recommended that a custom banner be displayed when a user attempts to login. The banner warns of the legal consequences of unauthorized access to the unit. Indicates TCL scripting is enabled. Scripts could cause damage to configuration of the unit.
Medium Medium
Low Low
TCL Scripts
Low
Usage Examples
The following example initiates the security audit and saves the results to a log file in flash memory: >enable #run audit security log Audit Complete
60000CRG0-35B
383
Default Values
No default values are necessary for this command.
Command History
Release A4.03 Command was introduced.
Usage Examples
The following example checks and fixes file system errors: >enable #run checkdisk cflash
60000CRG0-35B
384
Syntax Description
<filename> <name> on-pass on-fail Specifies a Tcl script file. Specifies the name of the track to be monitored. Specifies the file should be run when the track meets the passing condition. Specifies the file should be run when the track meets the failure condition.
Default Values
No default values are necessary for this command.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example activates a Tcl script to be run when the failure condition is met on track_a: >enable #run tcl test1.tcl track track_a on-fail
60000CRG0-35B
385
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
detail Optional. Displays the details of the security audit and recommends corrective action.
Default Values
No default values are necessary for this command.
Command History
Release 17.7 Command was introduced.
Functional Notes
The security audit tool is used to identify possible security violations and is initiated by using the command run audit security on page 381. The show audit security detail command lists a summary of the results, as well as details of the defect and recommends corrective action. It is up to the customer to determine if the findings are a true risk in their system, and to make the necessary adjustments to their configuration. Some items could be recorded as possible risks that are not actual risks based on the entire network configuration.
Usage Examples
The following is a sample show audit security output: >enable #show audit security Using 2214 bytes **SUMMARY**
60000CRG0-35B
386
------------------------------------------------------------------------------------------------------------------Severity Type Description ------------------------------------------------------------------------------------------------------------------LOW Enable Password MD5 encryption is not enabled HIGH Network Protocol FTP server enabled HIGH Network Protocol TFTP server enabled HIGH Network Protocol HTTP server enabled HIGH Network Protocol Telnet enabled HIGH Policy-Class Private, undefined ACL HIGH Policy-Class Private, stateless HIGH Policy-Class Public, stateless HIGH Policy-Class Public, NAT not enabled HIGH Policy-Class Interfaces using default policy-class HIGH Password Weak Passwords HIGH Password Duplicate Passwords HIGH Session Timeout Console timeout >= 15 minutes HIGH Session Timeout Telnet 0 timeout >= 15 minutes HIGH Session Timeout Telnet 1 timeout >= 15 minutes HIGH Session Timeout Telnet 2 timeout >= 15 minutes HIGH Session Timeout Telnet 3 timeout >= 15 minutes HIGH Session Timeout Telnet 4 timeout >= 15 minutes HIGH Session Timeout SSH 0 timeout >= 15 minutes HIGH Session Timeout SSH 1 timeout >= 15 minutes HIGH Session Timeout SSH 2 timeout >= 15 minutes HIGH Session Timeout SSH 3 timeout >= 15 minutes HIGH SNMP Using SNMPv1/v2, not secure ------------------------------------------------------------------------------------------------------------------The following is a sample show audit security detail output: >enable #show audit security detail Using 4193 bytes **DETAIL** ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ENABLE PASSWORD: ------------------------------------------------------------------------------------------------------------------* The enable password is not set for MD5 encryption. MD5 encryption is more secure than standard password encryption. ------------------------------------------------------------------------------------------------------------------NETWORK PROTOCOLS: ------------------------------------------------------------------------------------------------------------------* The following protocols are enabled and may be a security risk. Disable if not needed. Use SSH instead of Telnet and HTTP SSLv3 instead of
60000CRG0-35B
387
* FTP * TFTP * HTTP * Telnet ------------------------------------------------------------------------------------------------------------------POLICY-CLASS: ------------------------------------------------------------------------------------------------------------------* Potential vulnerabilities were found with the following policies. Note: NAT may not be required on all policies; however, broadcast of IP addresses from the internal network to the Internet should be restricted. This tool did not take into account how the polices are used. Depending upon the configuration of your network, these policies may or may not make your network vulnerable. *********************************************************************************************** Name Line Description *********************************************************************************************** Private 2 Allows undefined ACL Private 3 Allows stateless-inspection Public 4 Allows stateless-inspection Public N/A NAT not enabled for Private interface, eth 0/1 * The following interfaces are enabled but do not have a policy-class assigned. Not having a policy-class assigned will leave the interface open to attack. * vlan 1210 ------------------------------------------------------------------------------------------------------------------PASSWORDS / KEYS: ------------------------------------------------------------------------------------------------------------------* Passwords should be at least 7 characters and have both alphabetic and numeric characters. Some passwords are considered weak if they match default passwords or contain common sequences. For example Qwerty123 is considered a weak password even though it contains both numeric and alphabetic characters. The following weak passwords were found: * 1f1965f156e907907d3a8ed5172557a86736(encrypted) * 2b2d9aa78c8dfb9fca1cf745d72e2e28cc99(encrypted) * 373fbaa34722617409e24b9d9a707cb09fe3(encrypted) * 1610d7b313a09983a2de5bb4f1a77997f346(encrypted) * 24223699587eef35644778c8a901cca82a70(encrypted) * 46400f529e54aeb56fa224fadb14c111f007(encrypted)
60000CRG0-35B
388
Command Reference Guide * Each user should have a unique password. The following passwords are duplicated:
* 2b2d9aa78c8dfb9fca1cf745d72e2e28cc99(encrypted) * 46400f529e54aeb56fa224fadb14c111f007(encrypted) ------------------------------------------------------------------------------------------------------------------SESSION TIMEOUT: ------------------------------------------------------------------------------------------------------------------* The following sessions have timeout values of 15 minutes or greater. Long session timeouts may allow your system to be compromised. To increase security, set the timeout value to less than 15 minutes. * Console * Telnet 0 * Telnet 1 * Telnet 2 * Telnet 3 * Telnet 4 * SSH 0 * SSH 1 * SSH 2 * SSH 3 ------------------------------------------------------------------------------------------------------------------SNMP: ------------------------------------------------------------------------------------------------------------------* The SNMP agent is enabled and is configured to allow SNMPv1 and SNMPv2 which are not secure. If SNMP is needed, remove the community names and add SNMPv3 group and SNMPv3 user. -------------------------------------------------------------------------------------------------------------------
60000CRG0-35B
389
show arp
Use the show arp command to display the Address Resolution Protocol (ARP) table. Variations of this command include:
show arp show arp realtime show arp vrf <name> show arp vrf <name> realtime
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance or your unit.
Syntax Description
realtime vrf <name> Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information. Optional. Displays information only for the specified VPN routing and forwarding (VRF). If a VRF is not specified, the default VRF is assumed.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 10.1 Release 16.1 Release 17.1 Command was introduced. The realtime display parameter was introduced. Command was expanded to include the vrf parameter. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
390
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781). VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following is a sample output of the show arp command: >enable #show arp ADDRESS 10.22.18.3 192.168.20.2 224.0.0.5
TTL(min) 19 16 20
60000CRG0-35B
391
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
interfaces atm <interface> Optional. Displays the ATM PVC information for a specific PVC. Specify an ATM interface (valid range is 1 to 1023) or a subinterface in the format <interface id.subinterface id> (for example, 1.1). Using this command without specifying an interface will display all information for all ATM PVCs.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output from the show atm pvc interfaces command: >enable #show atm pvc interface atm 1.1 Name VPI VCI Encap Type atm 1.1 0 200 SNAP
SC N/A
Peak Kbps 0
Avg/Min Kbps 0
Burst Cells 0
Status Active
60000CRG0-35B
392
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output from the show atm traffic command from ATM interface 1: >enable #show atm traffic interface atm 1 atm 1 is UP, line protocol is UP BW 896 Kbit/s 16 maximum active VCCs, 16 VCCs per VP, 1 current VCCs Queueing strategy: Per VC Queueing 5 minute input rate 32 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 19 packets input, 1357 bytes 0 pkts discarded, 0 error pkts, 0 unknown protocol pkts 45 cells received, 0 OAM cells received 0 packets output, 0 bytes 0 tx pkts discarded, 0 tx error pkts 0 internal tx error pkts 0 cells sent, 0 OAM cells sent
60000CRG0-35B
393
The following is sample output from the show atm traffic command from ATM subinterface 1.1: #show atm traffic interface atm 1.1 27 Input Packets 0 Output Packets 72 Cells received, 0 OAM cells received F5 InEndLoopReq: 0 F5 InEndLoopResp: 0 F5 InAIS: 0 F5 InRDI: 0 0 Cells sent, 0 OAM cells sent F5 OutEndLoopReq: 0 F5 OutEndLoopResp: 0 F5 OutAIS: 0 F5 OutRDI: 0 0 OAM Loopback Successes 0 OAM Loopback Failures
60000CRG0-35B
394
show auto-config
Use the show auto-config command to display auto-configuration status. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is a sample output of the show auto-config command: >enable #show auto-config Auto-Config is enabled, current status: Done. TFTP Server is 10.20.20.1 Config filename is 1524STfile Maximum retry count is 0 (repeat indefinitely), total retries is 0
60000CRG0-35B
395
show auto-link
Use the show auto-link command to display the auto-link feature configuration and current status. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 17.3/A2 Command was introduced.
Usage Examples
The following is sample output of the show auto-link command: >enable #show auto-link Auto-link: Enabled Use Http: Enabled Server URL: 10.14.1.55/aps/DiscoveryProcessor?action=devinfo Server SERVER: 10.14.1.55 Recontact Interval: 3600 seconds Last Contact: Tue, June 17, 2008 10:32:01 AM Next Contact: Tue, June 17, 2008 11:30:23 AM Status: Discovered
60000CRG0-35B
396
show bridge
Use the show bridge command to display a list of all configured bridge groups (including individual members of each group). Enter an interface or a bridge number to display the corresponding list. Variations of this command include:
show bridge show bridge <interface> show bridge <number>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<interface> Optional. Displays all bridge groups associated with the specific interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type the show bridge ? command to display a list of applicable interfaces. Optional. Displays a specific bridge group.
<number>
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 9.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the high level data link control (HDLC) interface. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
60000CRG0-35B
397
Usage Examples
The following is a sample output from the show bridge command: >enable #show bridge Total of 300 station blocks 295 free Address Action Interface 00:04:51:57:4D:5A forward eth 0/1 00:04:5A:57:4F:2A forward eth 0/1 00:10:A4:B3:A2:72 forward eth 0/1 00:A0:C8:00:8F:98 forward eth 0/1 00:E0:81:10:FF:CE forward fr 1.17
Age 0 0 4 0 0
60000CRG0-35B
398
show buffers
Use the show buffers command to display the statistics for the buffer pools on the network server. Variations of this command include:
show buffers show buffers realtime
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
realtime Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
60000CRG0-35B
399
Usage Examples
The following is a sample output from the show buffers command: >enable #show buffers Buffer handles: 119 of 2000 used. Pool Size Total Used 0 1800 1894 119 1 2048 64 0 2 4096 32 0 3 8192 4 0
Available 1775 64 32 4
60000CRG0-35B
400
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
realtime Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
60000CRG0-35B
401
Usage Examples
The following is a sample from the show buffers users command: >enable #show buffers users Number of users: 7 Ran User 1 0x0052f4f8 2 0x0051a4fc 3 0x00528564 4 0x0053c1c8 5 fixedsize 6 0x001d8298 7 0x0010d970 8 0x00000000 9 0x00000000 10 0x00000000 11 0x00000000
Count 59 32 8 7 5 2 1 0 0 0 0
60000CRG0-35B
402
show cflash
Use the show cflash command to display a list of all files currently stored in CompactFlash memory or details about a specific file stored in CompactFlash memory. Variations of this command include:
show cflash show cflash <filename>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<filename> Optional. Displays details for a specified file located in flash memory. Enter a wildcard (such as *.biz) to display the details for all files matching the entered pattern.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is a sample show cflash output: >enable #show cflash (dir) 0 SystemDefaultPrompts (dir) 0 VoiceMail 9377163 NV7100A-12-00-23-E.biz 11110890 sip.ld 8767439 NV7100A-11-03-02-E.biz 8771176 NV7100A-11-03-02d-E.biz 8773148 NV7100A-11-03-03-E.biz 48508928 bytes used, 207319040 available, 255827968 total
60000CRG0-35B
403
show channel-group
Use the show channel-group command to display detailed information regarding port aggregation of a specified channel group (i.e., channel groups and their associated ports). Variations of this command include the following:
show channel-group port-channel load-balance show channel-group summary show channel-group <number> summary
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
port-channel load-balance summary <number> Displays the current load-balance scheme. Summarizes the state of all channel groups or of a specific channel group (if specified by the <number> argument). Optional. Specifies the channel group using the channel group ID (16).
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is a sample from the show channel-group command: >enable #show channel-group summary Channel Group Port channel -----------------------------------1 1 2 2
Associated Ports ----------------------eth 0/2 eth 0/3 eth 0/5 eth 0/6 eth 0/7
60000CRG0-35B
404
show clock
Use the show clock command to display the system time and date entered using the clock set command. Refer to clock set <time> <day> <month> <year> on page 169 for more information. Variations of this command include:
show clock show clock detail
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
detail Optional. Displays more detailed clock information, including the time source.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays the current time and data from the system clock: >show clock 23:35:07 UTC Tue Aug 20 2002
60000CRG0-35B
405
show configuration
Use the show configuration command to display a text printout of the startup configuration file stored in nonvolatile random access memory (NVRAM). The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is a sample output of the show configuration command: >enable #show configuration ! ! no enable password ! ip subnet-zero ip classless ip routing ! event-history on no logging forwarding logging forwarding priority-level info no logging email ! ip policy-timeout tcp all-ports 600 ip policy-timeout udp all-ports 60 ip policy-timeout icmp 60
60000CRG0-35B
406
Command Reference Guide ! ! ! interface eth 0/1 speed auto no ip address shutdown ! interface dds 1/1 shutdown ! interface bri 1/2 shutdown ! ! ip access-list standard Outbound permit host 10.3.50.6 permit 10.200.5.0 0.0.0.255 ! ! ip access-list extended UnTrusted deny icmp 10.5.60.0 0.0.0.255 any source-quench deny tcp any any ! no ip snmp agent ! ! ! line con 0 no login ! line telnet 0 login line telnet 1 login line telnet 2 login line telnet 3 login line telnet 4 login !
60000CRG0-35B
407
show connections
Use the show connections command to display information (including time division multiplexing (TDM) group assignments) for all active connections. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 7.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output from the show connections command: >enable #show connections Displaying all connections.... Conn ID From To _____________________________________________________________ 1 atm 1 adsl 1/1 2 ppp 1 t1 2/1, tdm-group 1 3 ppp 1 t1 2/2, tdm-group 1 4 ppp 3 e1 3/1, tdm-group 1 5 ppp 3 e1 3/2, tdm-group 1 6 ppp 3 e1 3/3, tdm-group 1
60000CRG0-35B
408
show crypto ca
Use the show crypto ca command to display information regarding certificates and profiles. Variations of this command include:
show crypto ca certificates show crypto ca crls show crypto ca profiles
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
certificates crls profiles Displays information on all certificates. Displays a summary of all certificate revocation lists (CRLs) for each certificate authority (CA). Displays information on all configured CA profiles.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 17.1 Command was introduced (enhanced software version only). Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
409
Usage Examples
The following is a sample from the show crypto ca certificates command: >enable #show crypto ca certificates CA Certificate Status: Available Certificate Serial Number: 012d Subject Name: /C=FI/O=SSH Communications Security/OU=Web test/CN=Test CA 1 Issuer: /C=FI/O=SSH Communications Security/OU=Web test/CN=Test CA 1 CRL Dist. Pt: /C=FI/O=SSH Communications Security/OU=Web test/CN=Test CA 1 Start date is Jan 9 16:25:15 2003 GMT End date is Dec 31 23:59:59 2003 GMT Key Usage: Non-Repudiation Key Encipherment Data Encipherment CRL Signature Encipherment Only
60000CRG0-35B
410
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
client configuration pool <name> policy <value> Displays the list of all configured IKE client configuration pools. Optional. Displays detailed information regarding the specified IKE client configuration pool. Displays information on all IKE policies. Indicates if client configuration is enabled for the IKE policies and displays the pool names. Optional. Displays detailed information on the specified IKE policy. This number is assigned using the crypto ike policy command. Refer to crypto ike on page 861 for more information. Displays information on all IKE information regarding the remote-id. The remote-id value is specified using the crypto ike remote-id command. Refer to crypto ike remote-id on page 865 for more information. Displays all Internet Protocol security (IPsec) security associations (SAs). Optional. Displays a brief listing of IPsec SAs.
remote-id <remote-id>
sa sa brief
Default Values
No default values are necessary for this command.
60000CRG0-35B
411
Command History
Release 4.1 Release 15.1 Release 17.1 Command was introduced. Command was expanded to include the brief parameter. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is a sample from the show crypto ike policy command: >enable #show crypto ike policy Crypto IKE Policy 100 Main mode Using System Local ID Address Peers: 63.105.15.129 initiate main respond anymode Attributes: 10 Encryption: 3DES Hash: SHA Authentication: Pre-share Group: 1 Lifetime: 900 seconds The following is a sample from the show crypto ike sa brief command: >enable #show crypto ike sa brief Using 3 SAs out of 2000 IKE Security Associations: (NOTE: The Remote ID may be truncated) Peer IP Address 10.22.19.4 10.22.19.2 10.22.19.6 Lifetime 19800 0 86365 Status UP (SA_MATURE) MM_SA_WAIT UP (SA_MATURE) IKE Policy 100 101 102 Remote ID nv1224r UNKNOWN security2
60000CRG0-35B
412
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
sa sa address <ip address> Displays all IPsec security associations (SAs). Optional. Displays all IPsec SAs associated with the designated peer IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Displays a brief listing of IPsec SAs.
sa brief
sa ffe-id <rapidroute interface ID> Optional. Displays all IPsec SAs associated with a specific RapidRoute interface. RapidRoute interfaces have a numerical identifier that ranges between 1 and 16777215. These identifiers are displayed in the various outputs of the show ip ffe commands beginning with the command show ip ffe on page 512. sa map <name> timeline transform-set <name> Optional. Displays all IPsec SAs associated with the specified crypto map. Optional. Displays a timeline of VPN tunnel creation and peak number of tunnels per hour. Displays all defined transform sets. Optional. Displays information for a specific transform set.
Default Values
No default values are necessary for this command.
60000CRG0-35B
413
Command History
Release 4.1 Release 15.1 Release 17.1 Release 17.6 Release A4.01 Command was introduced. Command was expanded to include the brief parameter. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the ffe-id parameter. Command was expanded to include the timeline parameter.
Usage Examples
The following is sample output from the show crypto ipsec sa command: >enable #show crypto ipsec sa Using 2 SAs out of 4000 Peak concurrent SAs: 2 IPsec Security Associations: Peer IP Address: 3.3.3.1 Remote ID: 3.3.3.2 Crypto Map: VPN 10 Direction: Inbound Encapsulation: ESP SPI: 0xF38B37A1 (4085987233) FFE ID: 1 RX Bytes: 281728 Selectors: Src:10.0.2.0/255.255.255.0 Port:ANY Proto:ALL IP Dst:10.0.1.0/255.255.255.0 Port:ANY Proto:ALL IP Hard Lifetime: 28570 Soft Lifetime: 0 Out-of-Sequence Errors: 0 Peer IP Address: 3.3.3.2 Remote ID: 3.3.3.2 Crypto Map: VPN 10 Direction: Outbound Encapsulation: ESP SPI: 0x923DBAB4 (2453519028) FFE ID: 2 TX Bytes: 281728 Selectors: Src:10.0.1.0/255.255.255.0 Port:ANY Proto:ALL IP Dst:10.0.2.0/255.255.255.0 Port:ANY Proto:ALL IP Hard Lifetime: 28570 Soft Lifetime: 28540
60000CRG0-35B
414
The following is sample output from the show crypto ipsec sa brief command: >enable #show crypto ipsec sa brief Using 4 SAs out 4000 IPsec Security Associations: (NOTE: Crypto Map and Remote ID may be truncated) Peer IP Address 10.22.19.34 10.22.19.34 10.22.19.4 10.22.19.6 # Bytes RX 384 RX0 TX 512 TX 128 Crypto Map VPN 10 VPN 30 VPN 10 VPN 30 Remote ID nv1224r security2 nv1224r security2
60000CRG0-35B
415
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
interface <interface> Optional. Displays the crypto map settings for the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show crypto map interface ? for a complete list of valid interfaces. Optional. Specifies a specific crypto map name. Optional. Specifies a specific crypto map number.
<name> <number>
Default Values
No default values are necessary for this command.
Command History
Release 4.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
60000CRG0-35B
416
Usage Examples
The following is a sample from the show crypto map command: >enable #show crypto map testMap Crypto Map testMap 10 ipsec-ike Extended IP access list NewList Peers: 63.97.45.57 Transform sets: esp-des Security-association lifetimes: 0 kilobytes 86400 seconds No PFS group configured Interfaces using crypto map testMap: eth 0/1
60000CRG0-35B
417
show debugging
Use the show debugging command to display a list of all activated debug message categories. Variations of this command include:
show debugging show debugging saved-filters
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
saved-filters Optional. Displays the last debug filters saved using the command debug save on page 332.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 17.1 Release 17.4 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the saved-filters keyword.
Usage Examples
The following is a sample output from the show debugging command: >enable #show debugging debug access-list MatchAll debug firewall debug ip rip debug frame-relay events debug frame-relay llc2 debug frame-relay lmi
60000CRG0-35B
418
The following is a sample output from the show debugging saved-filters command: >enable #show debugging saved-filters Saved filters: debug mail-client agent debug probe test1
60000CRG0-35B
419
show demand
Use the show demand command to display information regarding demand routing parameters and statistics. Variations of this command include the following:
show demand show demand interface demand <interface> show demand resource pool show demand resource pool <name> show demand sessions
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
interface demand <interface> Optional. Displays information for a specific demand routing interface. Valid range is 1 to 1024. Type show demand interface ? for a list of valid interfaces. resource pool <name> sessions Optional. Displays all resource pool information. Optional. Displays resource pool information for a specific resource pool name. Optional. Displays active demand sessions.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is example output from the show demand interface command: >enable #show demand int 1 Demand 1 is UP (connected) Configuration: Keep-alive is set (10 sec.) Admin MTU = 1500
60000CRG0-35B
420
Command Reference Guide Mode: Either, 1 dial entries, idleTime = 120, fastIdle = 20 Resource pool demand No authentication configured IP address 10.100.0.2 255.255.255.0 Connect Sequence: Successes = 0, Failures = 0 Seq DialString Technology Successes Busys NoAnswers 5 5552222 ISDN 0 0 0 Current values: Local IP address 10.100.0.2, Peer IP address 10.100.0.1 Seconds until disconnect: 63 Queueing method: weighted fair Output queue: 0/1/428/64/0 (size/highest/max total/threshold/drops) Conversations 0/1/256 (active/max active/max total) Available Bandwidth 48 kilobits/sec Bandwidth=64 Kbps Link through bri 1/3, Uptime 0:01:10 IN: Octets 588, Frames 19, Errors 0 OUT: Octets 498, Frames 18, Errors 0 Last callerID 2565552222, last called num 5552222
NoAuths 0
InUse
The following is example output from the show demand interface demand command: >enable #show demand interface demand 1 demand 1 Idle timer (120 secs), Fast idle timer (20 secs) Dialer state is data link layer up Dial reason: answered Interface bound to resource bri 1/3 Time until disconnect 105 secs Current call connected 00:00:27 Connected to 2565552222 Number of active calls = 1 Interesting Traffic = list junk Connect Sequence: Successes = 0, Failures = 0 Seq DialString Technology Successes 5 5552222 ISDN0 0
InUse
60000CRG0-35B
421
The following is example output from the show demand resource pool command: >enable #show demand resource pool Pool demand Resources: bri 1/3, bri 2/3 Demand Interfaces: demand 1 The following is example output from the show demand sessions command: >enable #show demand sessions Session 1 Interface demand 1 Local IP address = 10.100.0.2 Remote IP address = 10.100.0.1 Remote Username = Dial reason: ip (s=, d=) Link 1 Dialed number = 5552222 Resource interface = bri 1/3, Multilink not negotiated Connect time: 0:0:13 Idle Timer: 119
60000CRG0-35B
422
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
antispyware 3rd-party Optional. Displays NAP information only for clients with the specified antispyware status. Displays NAP information only for clients with third-party antispyware.
60000CRG0-35B
423
Command Reference Guide disabled out-of-date snoozed antivirus 3rd-party disabled out-of-date snoozed auto-updates disabled not-checking not-downloading not-installing brief firewall 3rd-party disabled snoozed hostname <hostname> interface gigabit-switchport <slot/port> ip <ip address>
Enable Mode Command Set Displays NAP information only for clients with disabled antispyware. Displays NAP information only for clients with out-of-date antispyware. Displays NAP information only for clients with inactive antispyware. Optional. Displays NAP information only for clients with the specified antivirus status. Displays NAP information only for clients with third-party antivirus software. Displays NAP information only for clients with disabled antivirus software. Displays NAP information only for clients with out-of-date antivirus software. Displays NAP information only for clients with inactive antivirus software. Optional. Displays NAP information only for clients with the specified auto-update status. Displays NAP information only for clients with disabled auto-updates. Displays NAP information only for clients that are not checking for auto-updates. Displays NAP information only for clients that are not downloading auto-updates. Displays NAP information only for clients that are not installing auto-updates. Optional. Displays information for all NAP clients in a table format. Optional. Displays NAP information only for clients with the specified firewall state. Displays NAP information only for clients with third-party firewall software. Displays NAP information only for clients with disabled firewall software. Displays NAP information only for clients with inactive firewall software is displayed. Optional. Displays NAP information only for the client with the specified host name. Optional. Displays NAP information only for the client using the specified interface. Optional. Displays NAP information only for the client at the specified IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
60000CRG0-35B
424
Enable Mode Command Set Optional. Displays NAP information only for clients that violate the local policy. Optional. Displays NAP information only for the client at the specified medium access control (MAC) address. MAC addresses should be expressed in the following format: xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01). Optional. Displays NAP information only for the clients restricted by the server. Optional. Displays NAP information only for the clients that violate the server policy.
server-restricted server-violators
Default Values
No default values are necessary for this command.
Command History
Release 17.8 Command was introduced.
Functional Notes
Output of the show desktop-auditing dhcp command can be limited by specific client or by specific criteria (feature states), but not by both. Local policies are defined by using the command desktop-auditing local-policy on page 874. For more information about configuring local policies, refer to Desktop Auditing Local Policy Command Set on page 2689. For more information about configuring desktop auditing, refer to the Configuring Desktop Auditing in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following is sample output from the show desktop-auditing dhcp command: #show desktop-auditing dhcp Client MAC/IP: 00:E0:29:0E:D5:E3 / 10.23.220.1 / xpsp3-host Collected: DHCP VLAN ID: 100 Source Port: gigabit-switchport 0/2 Date/Time Collected: 2009.08.25 10:33:42 Client NAP: Enabled Server NAP: Enabled Client OS Version: Windows XP Client OS Service Pack: 3 Client Processor Architecture: x86 architecture Client Firewall: Microsoft Disabled but Up-To-Date Client Antivirus: Symantec Antivirus Corporate Edition
60000CRG0-35B
425
Command Reference Guide Enabled & Up-To-Date Client Antispyware: None Installed Client Automatic Security Updates: Enabled, Download, but Dont Install Client Security Updates: From 10.10.10.3 Up-To-Date (2009.08.25 10:33:42) Client Requires Remediation: False Network Connectivity: Not restricted
The preceding output is for one client. This same information will be displayed for all connected clients unless one of the filtering parameters is used in conjunction with the show desktop-auditing dhcp command.
The following is sample output from the show desktop-auditing dhcp brief command. Because of the brief keyword, the results are displayed in table format. #show desktop-auditing dhcp brief Columns: E = Enabled, U = Up-to-date, 3 = 3rd party (not MS), S = Snoozed C = Check for Updates, D = Download Updates, I = Install Updates ! = Error (not installed, other) Indicators: + = True, - = False, ? = Unknown State ! = Attention Server Response R = Client Requires Remediation, N = Client Network Restricted Codes: . = No Server Response Client FireWall E3S! AntiVir EU3S! AntiSpy EU3S! AutoUpd ECDI! SecUpd Severity Server Response
60000CRG0-35B
426
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) dial backup. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example enters the Enable mode and uses the show command to display dial-backup interface information: >enable #show dial-backup interfaces Dial-backup interfaces... fr 1.16 backup interface: Backup state: idle Backup protocol: PPP Call mode: originate Auto-backup: enabled Auto-restore: enabled Priority: 50 Backup delay: 10 seconds Restore delay: 10 seconds Connect timeout: 60 seconds --MORE--
60000CRG0-35B
427
Default Values
No default values are necessary for this command.
Command History
Release 4.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output from the show dialin interfaces command: >enable #show dialin interfaces Dialin interfaces... modem 1/3 dialin interface: Connection Status: Connected Caller ID info: name-John Smith number-5551212 time-14:23:10 2/17/2003
60000CRG0-35B
428
Default Values
By default, DoS protection in AOS is disabled.
Command History
Release 17.7 Command was introduced.
Usage Examples
The following example displays attack statistics for the AOS unit: >enable #show dos counters DOS Fragment Error 0 DOS ICMP Error 0 DOS L3 Header Error 0 DOS L4 Header Error 1269620 DOS Source MAC equal Destination MAC 0 #
60000CRG0-35B
429
show dos-id
Use the show dos-id command to list all denial of service (DoS) attacks the DoS protection feature provides protection against, along with their corresponding threat IDs. Syntax Description
No subcommands.
Default Values
By default, DoS Protection in AOS is disabled.
Command History
Release 17.7 Command was introduced.
Functional Notes
The IDs obtained with the show dos-id command are used in the dos-protection <id> command to add or remove threat protection for specific threats.
Usage Examples
The following is sample output for this command: >enable #show dos-id DOS L4 Header Error TCP pkts w/ control flags and seq# equal to 0 TCP pkts w/ SYN and FIN bits set TCP pkts w/ FIN,URG,PSH bits set with ACK bit & seq# equal to 0 TCP pkts w/ source port equal to destination port UDP pkts w/ source port equal to destination port TCP SYN pkts w/source port 0-1023 for the first fragment DOS L3 Header Error Source IP equal to Destination IP DOS ICMP Error Fragmented ICMP pkts ICMPV4 ping pkts w/payload greater than specified ICMPV6 ping pkts w/payload greater than specified DOS Fragment Error TCP fragments w/ offset value set to 1 First TCP fragments w/ TCP header smaller than specified #
[20]
[60] [61]
60000CRG0-35B
430
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
60000CRG0-35B
431
Using the realtime argument for this command can adversely affect the performance of your unit. Syntax Description
mac-address <mac address> Optional. Displays a particular access point (AP) by medium access control (MAC) address. MAC addresses should be expressed in the following format xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01). managed name <name> status available download init no_session ready recovery running session unmanaged detail realtime Optional. Displays a list of APs managed by this AC. Optional. Displays a particular AP by name. Optional. Displays APs at a certain status. (Refer to the options below.) Optional. Displays APs at available session state. Optional. Displays APs at download state. Optional. Displays APs at init state. Optional. Displays APs at no session state. Optional. Displays APs at ready state. Optional. Displays APs at recovery state. Optional. Displays APs at running state. Optional. Displays APs at session state. Optional. Displays a list of APs not managed by this AC. Optional. Displays a detailed list of all discovered APs. Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 15.1 Release 16.1 Release 17.1 Command was introduced. Command was expanded to include the available session state. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
60000CRG0-35B
432
Usage Examples
The following is sample output from the show dot11 access-point command: >enable #show dot11 access-point Wireless Access Points: Name MAC-Address AP Status -----------------------------------------------------------------------------ADTN1DF857 00:A0:C8:1D:F8:57 Session Cfgd ------Y Control Status ----------------------Ctl_by_This_AC
60000CRG0-35B
433
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
interface dot11ap <ap interface> mac-address <mac address> Displays stations associated with APs by interface. Specifies AP interface number. Range is 1 to 8. Displays stations associated with APs by medium access control (MAC) address. Specifies a valid client 48-bit MAC address. MAC addresses should be expressed in the following format xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01).
Default Values
No default values are necessary for this command.
Command History
Release 15.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following command initiates a request to display a list of clients for AP interface 1. >enable #show dot11 clients interface dot11ap 1 Wireless Access Point Clients: Ap Station MAC-Address -----------------------1 00:40:96:AB:3B:5E
60000CRG0-35B
434
The following command initiates a request to display a list of clients for MAC address 00:40:96:ab:3b:5e: >enable #show dot11 clients mac-address 00:40:96:ab:3b:5e Wireless Access Point Clients: Ap Radio Vap Station MAC-Address ----------- -------------------------------1 1 1 00:40:96:AB:3B:5E
60000CRG0-35B
435
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<ap> </radio> <.vap> Specifies the wireless access point (AP). Range is 1 to 8. Specifies the radio associated with the AP. Range is 1 to 2. Specifies the VAP associated with the radio. Range is 1 to 8.
The radio must be specified in the format <ap/radio>. For example, 2/1 indicates radio 1 on access point 2. The virtual access point must be specified in the format <ap/radio.vap>. For example, 2/1.1 indicates virtual access point 1 on radio 1 on access point 2. Default Values
No default values are necessary for this command.
Command History
Release 15.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
436
Usage Examples
The following is an example output for the radio 1 on AP interface 1 using the show dot11 statistics interface dot11ap command: >enable #show dot11 statistics interface dot11ap 1/1 Authentication Count: 17 Deauthentication Count: 48 Association Count: 18 Disassociation Count: 12 Reassociation Count: 0 Wireless MSDU Rx Packets: 346 Wireless Data Rx Packets: 7221 Wireless Multicast Rx Packets: 308 Wireless Management Rx Packets: 675805 Wireless Control Rx Packets: 0 Wireless MSDU Tx Packets: 237259 Wireless Data Tx Packets: 236856 Wireless Multicast Tx Packets: 236812 Wireless Management Tx Packets: 599 Wireless Control Tx Packets: 0
60000CRG0-35B
437
show dynamic-dns
Use the show dynamic-dns command to show information related to the dynamic domain naming system (DNS) configuration. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output from this command: >enable #show dynamic-dns eth 0/1: Hostname: host Is Updated: no Last Registered IP: 10.15.221.33 Last Update Time: 00:00:00 UTC Thu Jan 01 1970
60000CRG0-35B
438
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<domain name> <association name> detail none Optional. Specifies that output is limited to associations in the specified domain. Optional. Specifies that output is limited to the specified association. Optional. Specifies the output is displayed in detail, rather than summary, format. Optional. Specifies that no domain name is used.
Default Values
No default values are necessary for this command.
Command History
Release 17.4 Command was introduced.
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
60000CRG0-35B
439
Usage Examples
The following is sample output from the show ethernet cfm association command: >enable #show ethernet cfm association -------------------------------------------------------------------------------------------------------------------------------Index Domain/Association CCM MEP-Cnt Component VID Sender-ID -------------------------------------------------------------------------------------------------------------------------------1 Bogus/Test 1sec 0 1 BenchTest/BenchAssoc 1min 3 giga-eth 0/2 0 none The following is sample output from the show ethernet cfm association detail command: >enable #show ethernet cfm association detail Domain Name: Bogus Assoc Name: Test SNMP Index: 1 CCM Interval: 1sec Components: MEP Count: 0 Domain Name: BenchTest Assoc Name: BenchAssoc SNMP Index: 1 CCM Interval: 1min Components: giga-eth 0/2 (VLAN=0, ID=none) MEP Count: 3 1 (remote) 2 (remote) 3 (local)
60000CRG0-35B
440
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<domain name> detail none Optional. Specifies that output is limited to associations in the specified domain. Optional. Specifies the output is displayed in detail, rather than summary, format. Optional. Specifies that no domain name is used.
Default Values
No default values are necessary for this command.
Command History
Release 17.4 Command was introduced.
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
60000CRG0-35B
441
Usage Examples
The following is sample output from the show ethernet cfm domain command: >enable #show ethernet cfm domain ---------------------------------------------------------------------------------------------------Index Domain Lvl Assoc-Count ---------------------------------------------------------------------------------------------------1 Bogus 5 1 2 BenchTest 5 1 The following is sample output from the show ethernet cfm domain detail command: >enable #show ethernet cfm domain detail Domain Name: Bogus SNMP Index: 1 Level: 5 Associations: 1 test Domain Name: BenchTest SNMP Index: 2 Level: 5 Associations: 1 BenchAssoc
60000CRG0-35B
442
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
detail domain <domain name> Optional. Specifies the format is in detail, rather than summary, format. Optional. Specifies that output is limited to MEPs in the specified domain.
association <association name> Optional. Specifies that output is limited to MEPs in the specified association. fault interface <interface> Optional. Specifies that output is limited to only MEP fault information. Optional. Specifies that output is limited to the MEPs configured on the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id. subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1. For a list of appropriate interface, enter interface ? at the prompt. Optional. Specifies that output is limited to MEPs with the specified ID. MEP ID range is 1 to 8191. Optional. Specifies that only MEP statistics are displayed.
Default Values
No default values are necessary for this command.
60000CRG0-35B
443
Command History
Release 17.4 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following is sample output from the show ethernet cfm mep local detail command: >enable #show ethernet cfm mep local detail MEPs configured on this device MEP-ID: 3 Domain/Assoc: BenchTest/Test Mac Address: 00:A0:C9:00:D8:B2 Interface: giga-eth 0/2 Vlan: Level: 5 Direction: down Priority: 7 Admin State: up CCM State: yes Fault Notification Settings ----------------------------------------------Highest Allowed Defect: MacStatus AlarmTime: 2500 ms ResetTime: 10000 ms SNMP Trap: Disabled Current Fault State ----------------------------------Fault State: Defect Last Reported Fault: 08:41 PM, 09/16/2008 Current Highest Defect: None Current Defects (Highest to Lowest defect priority): Xcon CCM: Err'd CCM: Remote CCM: MAC Status: RDI: Message Statistics ----------------------------------CCMs Transmitted: 2787 LBRs Transmitted: 0 LBRs Received: 30
CCMs Received Out of Sequence: 4 Next LBM ID: 36 LBRs Received Out of Order: 0
60000CRG0-35B
444
Command Reference Guide LBRs with bad data: 0 Next LTM ID: 1
Unexpected LTRs:
The following is sample output from the show ethernet cfm mep local fault command: >enable #show ethernet cfm mep local fault MEPs configured on this device MEP-ID: 3 Domain/Assoc: BenchTest/Test Mac Address: 00:A0:C9:00:D8:B2 Interface: giga-eth 0/2 Vlan: 0 Level: 5 Direction: down Priority: 7 Admin State: up CCM State: yes Fault Notification Settings -----------------------------------------------Highest Allowed Defect: MacStatus AlarmTime: 2500 ms ResetTime: 10000 ms SNMP Trap: Disabled Current Fault State ------------------------------------Fault State: Defect Last Reported Fault: 08:41 PM, 09/16/2008 Current Highest Defect: None Current Defects (Highest to Lowest defect priority): Xcon CCM: Err'd CCM: Remote CCM: MAC Status: RDI:
60000CRG0-35B
445
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
domain <domain name> none interface <interface> Optional. Specifies that output is limited to MEPs in the specified domain. Optional. Specifies no domain name is used. Optional. Specifies that output is limited to the MEPs configured on the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id. subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1. For a list of appropriate interface, enter interface ? at the prompt. Optional. Specifies that output is limited to MEPs in the specified maintenance level. Levels range from 0 to 7. Optional. Specifies that output is limited to the remote MEPs for all local MEPs with the specified ID. MEP ID range is 1 to 8191. Optional. Specifies that output is limited to the remote MEPs with the specified ID. MEP ID range is 1 to 8191.
Default Values
By default, all remote MEPs for all local MEPs are displayed. By default, MEPs in all levels are displayed. By default, all remote MEPs are displayed.
60000CRG0-35B
446
Command History
Release 17.4 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following is sample output from the show ethernet cfm mep remote command: >enable #show ethernet cfm mep remote Local MEP 3 Domain/Assoc: BenchTest/BenchAssoc Level: 5 VLAN: 0 Interface: giga-eth 0/2 Remote MEPs: (* = static) ID State Age MAC RDI Port Iface -------------------------------------------------------------------------------------------------------------* 1 Ok 165936 00:A0:C8:1F:CE:B0 - No TLV Up * 2 Ok 165936 00:A0:C8:00:62:F2 - No TLV Up
60000CRG0-35B
447
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
interface <interface> Optional. Specifies that output is limited to the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id. subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1. For a list of appropriate interface, enter interface ? at the prompt. Optional. Specifies that output is limited a specified maintenance level. Levels range from 0 to 7. Optional. Specifies that output is limited to a specific virtual local area network (VLAN). VLAN ID range is 1 to 4095. Optional. Specifies that output is limited to all VLANs.
Default Values
By default, all interfaces are displayed. By default, all maintenance levels are displayed. By default, all VLANs are displayed.
60000CRG0-35B
448
Command History
Release 17.4 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following is sample output from the show ethernet cfm stack command: >enable #show ethernet cfm stack 0------------1--------------2-------------3-------------4-------------5-------------6-----------7-------------8 123456789012345678901234567890123456789012345678901234567890 -----------------------------------------------------------------------------------------------------------------------Interface Vlan Lvl Domain/Assoc MEPID MAC -----------------------------------------------------------------------------------------------------------------------eth 0/1 0 7 Domain_1/MA_1 1 00:A0:C8:16:96:0D eth 0/2 20 5 Domain1/Assoc2 2012 00:0a:c8:00:01:03
60000CRG0-35B
449
show event-history
Use the show event-history command to display all entries in the current local event-history log. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The event history provides useful information regarding the status of the system and individual port states. Use the event history as a troubleshooting tool when identifying system issues. The following is a sample event-history log. >enable #show event-history Using 526 bytes 2002.07.12 15:34:01 T1.t1 1/1 Yellow 2002.07.12 15:34:01 INTERFACE_STATUS.t1 1/1 changed state to down. 2002.07.12 15:34:02 T1.t1 1/1 No Alarms 2002.07.12 15:34:02 INTERFACE_STATUS.t1 1/1 changed state to up. 2002.07.12 15:34:03 INTERFACE_STATUS.eth 0/1 changed state to up. 2002.07.12 15:34:10 OPERATING_SYSTEM Warm Start 2002.07.12 15:34:12 PPP.NEGOTIATION LCP up 2002.07.12 15:34:12 PPP.NEGOTIATION IPCP up
60000CRG0-35B
450
show fan-tach
Use the show fan-tach command to view the units current fan speed. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example shows the current fan speed: >enable #show fan-tach Fan Tach (in rpm) Processor Chassis 1 Chassis 2
60000CRG0-35B
451
show file
Use the show file command to display a specified file to the terminal screen. Variations of this command include:
show file <filename> show file <filename> checksum show file cflash <filename> show file cflash <filename> checksum show file flash <filename> show file flash <filename> checksum show file ramdisk <filename> show file ramdisk <filename> checksum
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
To display files located in the flash memory on products with CompactFlash capability, the flash keyword must be specified whether or not a CompactFlash card is installed.
Not all units are capable of using a RAM disk file system or have a CompactFlash card installed. Use the show file ? command to display a list of valid commands at the enable prompt.
The contents of the file are displayed only if the file is less than 300 Kilobytes. The checksum is displayed only if the file is less than 500 Kilobytes.
60000CRG0-35B
452
Syntax Description
<filename> cflash checksum flash ramdisk Displays information on the specified file. Wildcard entries (such as *.biz) are not valid for the show file command. Specifies a file located in CompactFlash memory. Optional. Displays the message digest 5 (MD5) checksum of the specified file. Specifies a file located in flash memory. Specifies a file located in volatile RAM disk.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 12.1 Release 17.1 Release 17.7 Command was introduced. Command was expanded to include the cflash parameter. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the ramdisk parameter.
Usage Examples
The following is a sample show file cflash output: >enable #show file cflash startup-config Router#show file startup-config Using 2558 bytes ! ! hostname Router enable password password ! clock timezone -6-Central-Time ! ip subnet-zero ip classless ip routing ! no auto-config ! event-history on no logging forwarding no logging email logging email priority-level info
60000CRG0-35B
453
Command Reference Guide ! no service password-encryption ! username admin password password ! --MORE--
The show file ramdisk command issues the following error message if the file is greater than 300 kilobytes: >enable #show file ramdisk NV3130A-17-07-00-26-AE.biz %Cannot show files larger than 300000 bytes. The following is sample show file ramdisk <filename> checksum output: >enable #show file ramdisk default-config.txt checksum AA02EC815B93B0E41C738A71C6AFCBC4
60000CRG0-35B
454
show flash
Use the show flash command to display a list of all files currently stored in flash memory. Variations of this command include:
show flash show flash <filename>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<filename> Optional. Displays details for a specified file located in flash memory. Enter a wildcard (such as *.biz) to display the details for all files matching the entered pattern.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is a sample show flash output: >enable #show flash Files: 245669 010100boot.biz 1141553 new.biz 821 startup-config 1638 startup-config.old 1175679 020016.biz 821 startup-config.bak 2572304 bytes used 4129776 available 6702080 total
60000CRG0-35B
455
show frame-relay
Use the show frame-relay command to display configuration and status parameters for configured virtual Frame Relay interfaces. Variations of this command include the following:
show frame-relay lmi show frame-relay pvc show frame-relay pvc interface frame-relay <interface> show frame-relay pvc interface frame-relay <interface> realtime show frame-relay pvc realtime
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
lmi pvc interface frame-relay <interface> realtime Displays local management interface (LMI) statistics for each virtual Frame Relay interface. Displays permanent virtual circuit (PVC) configuration and statistics for all virtual Frame Relay interfaces (or a specified interface). Optional. Displays Frame Relay PVC statistics for a specific Frame Relay interface (for example, fr 1). Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 10.1 Release 17.1 Command was introduced. Realtime parameter was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
456
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
Usage Examples
The following are sample outputs from various show frame-relay commands: >enable #show frame-relay lmi LMI statistics for interface FR 1 LMI TYPE = ANSI Num Status Enq. Sent 79 Num Status Msgs Rcvd 71 Num Update Status Rcvd 12 Num Status Timeouts 5 >enable #show frame-relay pvc Frame Relay Virtual Circuit Statistics for interface FR 1 Active Inactive Deleted Static local 2 0 0 2 DLCI = 16 DLCI USAGE = LOCAL PVC STATUS = ACTIVE INTERFACE = FR 1.16 MTU: 1500 input pkts: 355 output pkts: 529 in bytes: 23013 out bytes: 115399 dropped pkts: 13 in FECN pkts: 0 in BECN pkts: 0 in DE pkts: 0 out DE pkts: 0 pvc create time: 00:00:00:12 last time pvc status changed: 00:00:13:18 DLCI = 20 DLCI USAGE = LOCAL PVC STATUS = ACTIVE INTERFACE = FR 1.20 MTU: 1500 input pkts: 0 output pkts: 44 in bytes: 0 out bytes: 22384 dropped pkts: 11 in FECN pkts: 0 in BECN pkts: 0 in DE pkts: 0 out DE pkts: 0 pvc create time: 00:00:01:25 last time pvc status changed: 00:00:13:18
60000CRG0-35B
457
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
interface frame-relay <subinterface> Optional. Displays detailed fragmentation statistics for the specified Frame Relay subinterface. Subinterfaces are expressed in the format interface id.subinterface id (for example, fr 1.16).
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following are sample outputs from various show frame-relay fragment commands: >enable #show frame-relay fragment interface dlci frag_size rx_frag fr 1.1 17 100 46 fr 1.2 18 200 42
tx_frag 48 21
dropped_frag 0 0
60000CRG0-35B
458
Command Reference Guide >enable #show frame-relay fragment frame-relay 1.1 DLCI = 17 FRAGMENT SIZE = 100 rx frag. pkts 46 tx frag. pkts 48 rx frag. bytes 4598 tx frag. bytes 4724 rx non-frag. pkts 18 tx non-frag. pkts 28 rx non-frag. bytes 1228 tx non-frag. bytes 1960 rx assembled pkts 23 tx pre-fragment pkts 34 rx assembled bytes 5478 tx pre-fragment bytes 6324 dropped reassembling pkts 0 dropped fragmenting pkts 0 rx out-of-sequence fragments 0 rx unexpected beginning fragment 0
60000CRG0-35B
459
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<interface> Optional. Specifies the display of information for a specific interface. Enter the show frame-relay multilink ? command for a complete list of interfaces. Optional. Displays more detailed information. Optional. Displays detailed fragmentation statistics for the specified Frame Relay subinterface. Subinterfaces are expressed in the format interface id.subinterface id (for example, fr 1.16).
Default Values
No default values are necessary for this command.
Command History
Release 9.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is a sample output from this command: >enable #show frame-relay multilink Bundle: frame-relay 1 is DOWN; class A bundle Near-end BID: MFR1; Far-end BID: unknown
60000CRG0-35B
460
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays the current configured GARP application timer values: >enable #show garp timer Timer Timer Value (milliseconds) --------------------------------Join 200 Leave 600 LeaveAll 10000
60000CRG0-35B
461
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays a GVRP configuration summary for the switch: >enable #show gvrp configuration Global GVRP Configuration: GVRP Feature is currently enabled globally. GVRP Timers (milliseconds) Join 200 Leave 600 LeaveAll 20000 Port based GVRP Configuration: GVRP enabled ports ---------------------------------------------------eth 0/24 #
60000CRG0-35B
462
Default Values
No default values are necessary for this command.
Command History
Release 17.5 Command was introduced.
Usage Examples
The following example displays sample output from this command: >enable #show gvrp members vlan 200 VLAN 200: Total Members 1
60000CRG0-35B
463
Default Values
No default values are necessary for this command.
Command History
Release 17.5 Command was introduced.
Usage Examples
The following example displays the state of VLAN 200 on switchport interface 0/2: >enable #show gvrp state vlan 200 interface switchport 0/2 Port swx 0/2: Registrar: Empty, Forbidden Applicant: Very Anxious, Observer
60000CRG0-35B
464
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
interface <interface> Optional. Shows the information for the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show gvrp statistics interface ? for a complete list of applicable interfaces.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays statistics related to GVRP for Ethernet interface 0/24: >enable #show gvrp statistics interface ethernet 0/24 Name: eth 0/24 Join Empty Received: 0 Join In Received: 272 Empty Received: 30 Leave Empty Received: 0 --MORE--
60000CRG0-35B
465
show hosts
Use the show hosts command to display information, such as the domain name, name lookup service, a list of name server hosts, and the cached list of host names and addresses on the network to which you can connect. Variations of this command include:
show hosts show hosts verbose show hosts vrf <name> show hosts vrf <name> verbose
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
verbose vrf <name> Optional. Enables detailed messaging. Optional. Displays information only for the specified VPN routing and forwarding (VRF).
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 16.1 Release 17.1 Command was introduced. Command was expanded to include the vrf parameter. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
The list below describes the fields contained in the host table: Flags: Indicate whether the entry is permanent (perm) or temporary (temp). Age: Indicates the age of the entry. Type: Shows the protocol type as addresses (A) or service (SRV). Priority: 1 or 2. Address: Displays the IP address for the entry.
60000CRG0-35B
466
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example is sample output from the show hosts command: >enable #show hosts Name/address lookup uses domain naming system DNS Proxy is enabled Default domain is DOMAIN.NET Name servers are 10.100.43.254 Host Flags Age Type Priority net-srv3.adtran.com temp 172798 A srv-dhcp1.adtran.com temp 172798 A srv-dhcp2.adtran.com temp 172798 A www.adtran.com temp 172798 A
60000CRG0-35B
467
show hw-access-list
Use the show hw-access-list command to display hardware access control list (ACL) configuration and statistics. Variations of this command include:
show hw-access-list show hw-access-list <name>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<name> Optional. Specifies a particular hardware ACL to display.
Default Values
No default values are necessary for this command.
Command History
Release 17.6 Command was introduced.
Functional Notes
The show hw-access-list command displays all configured hardware ACLs in the system. All entries in the ACL are displayed, and a counter indicating the number of frames matching the entry is listed.
Usage Examples
The following is a sample output from the show hw-access-list <name> command, using the hardware ACL NET135: >enable #show hw-access-list NET135 Extended IP hardware access list NET135 permit ip 10.22.135.0 0.0.0.255 any log (302 matches) permit ip any 10.22.135.0 0.0.0.255 log (279 matches)
60000CRG0-35B
468
The following is sample output from the show hw-access-list command which displays information for all configured hardware ACLs: >enable #show hw-access-list Extended IP hardware access list NET135 permit ip 10.22.135.0 0.0.0.255 any log (131 matches) permit ip any 10.22.135.0 0.0.0.255 log (110 matches) Extended MAC hardware access list ADTN permit mac 00:a0:c8:00:00:00 00:00:00:ff:ff:ff any log (44055 matches) permit mac any 00:a0:c8:00:00:00 00:00:00:ff:ff:ff log (3011 matches)
60000CRG0-35B
469
show hw-access-map
Use the show hw-access-map command to display hardware access map configuration and statistics. Variations of this command include:
show hw-access-map show hw-access-map <name>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<name> Optional. Displays only the statistics for the named hardware access map.
Default Values
No default values are necessary for this command.
Command History
Release 17.6 Command was introduced.
Usage Examples
The following is sample output from the show hw-access-map <name> command, using the access map HW-FILTER: >enable #show hw-access-map HW-FILTER Hardware Access Map HW-FILTER Forward: mac ADTN and ip NET135 VLANs: 2-3
60000CRG0-35B
470
show hw-filter-resource
Use the show hw-filter-resource command to display the used and available hardware filter resources. This information is valuable when making changes to configured hardware access control lists (ACLs) and hardware access maps. For more information on hardware ACLs and access maps, refer to the Hardware ACL and Access Map Command Set on page 2738. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 17.6 Command was introduced.
Functional Notes
Changing hardware ACL or hardware access map configuration or application causes new information to be reinstalled on the hardware. It is possible to run out of hardware resources depending on how many resources are needed to apply the desired change. If there are not enough hardware resources to install the new criteria, an error message is displayed.
Usage Examples
The following is sample output from the show hw-filter-resource command: >enable #show hw-filter-resource Total Rules: 512 Rules Used: 128
60000CRG0-35B
471
show interfaces
Use the show interfaces command to display configuration parameters and current statistics for all switchport interfaces (or a specified switchport interface). These commands are valid only on switchports. Variations of this command include the following:
show interfaces description show interfaces status show interfaces <interface> switchport show interfaces <interface> switchport vlans show interfaces gigabit-switchport <slot/port>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
description Displays information, such as description, administrative status, line protocol status, and description for all the interfaces.
gigabit-switchport <slot/port> Displays information, such as description, administrative status, line protocol status, Layer 3 switching statistics, and description for a specific Gigabit Ethernet switchport. <interface> Optional. Specifies a switchport interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; and for an ATM subinterface, use atm 1.1. Type show switchport ? for a complete list of valid interfaces. Displays information, such as description, type, status, virtual local area network (VLAN), speed, and duplex for all the Ethernet interfaces only. Displays information, such as description, administrative status, line protocol status, and description for all the switchports. Optional. Displays the VLAN membership information for a specific switchport or series of switchports.
Default Values
No default values are necessary for this command.
60000CRG0-35B
472
Command History
Release 1.1 Release 6.1 Release 10.1 Release 11.1 Release 17.1 Release 17.5 Release A4.01 Command was introduced. Command was expanded to include the switchport parameter. Command was expanded to include the vlans parameter. Description and status parameters were introduced. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the gigabit-switchport parameter. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following is sample output from the show interfaces description command: >enable #show interfaces description Interface Status eth 0/1 Admin Up eth 0/2 Admin Up eth 0/3 Admin Up eth 0/4 Admin Up eth 0/5 Admin Up eth 0/6 Admin Up eth 0/7 Admin Up eth 0/8 Admin Up eth 0/9 Admin Up eth 0/10 Admin Up eth 0/11 Admin Up eth 0/12 Admin Up eth 0/13 Admin Up eth 0/14 Admin Up eth 0/15 Admin Up eth 0/16 Admin Up eth 0/17 Admin Up eth 0/18 Admin Up eth 0/19 Admin Up eth 0/20 Admin Up eth 0/21 Admin Up eth 0/22 Admin Up eth 0/23 Admin Up eth 0/24 Admin Up giga-eth 0/1 Admin Up giga-eth 0/2 Admin Up
Protocol Line Up Line Up Line Up Line Up Line Up Line Up Line Up Line Down Line Up Line Up Line Up Line Up Line Up Line Up Line Up Line Up Line Up Line Up Line Up Line Up Line Up Line Up Line Up Line Up Line Up Line Down
Description Desk 1 Desk 2 Desk 3 Desk 4 Desk 5 Desk 6 Desk 7 Desk 8 Desk 9 Desk 10 Desk 11 Desk 12 Desk 13 Desk 14 Desk 15 Desk 16 Desk 17 Desk 18 Desk 19 Desk 20 Desk 21 Desk 22 Desk 23 Desk 24 Uplink Trunk Unused
60000CRG0-35B
473
The following is sample output from the show interfaces gigabit-switchport command: >enable #show interfaces gigabit-switchport 0/1 giga-swx 0/21 is UP, line protocol is UP Hardware address is 00:A0:C8:00:24:4F RJ-45 Shielded 100Mb/s, negotiated full-duplex, configured full-duplex ARP type: ARPA; ARP timeout is 20 minutes 5 minute input rate 6232 bits/sec, 10 packets/sec 5 minute output rate 344 bits/sec, 0 packets/sec 3432 packets input, 237372 bytes 6 unicasts, 1 broadcasts, 3067 multicasts input 0 unknown protocol, 2781 discards 0 input errors, 0 crc errors 358 packets output, 28552 bytes 7 unicasts, 0 broadcasts, 351 multicasts output 0 output errors, 0 deferred, 0 discards 0 single, 0 multiple, 0 late collisions 0 excessive collisions L3 Switch 25 packets input, 25 packets forwarded 0 header errors, 0 discards The following is sample output from the show interfaces switchport command: >enable #show interfaces switchport Name: eth 0/1 Switchport: enabled Administrative mode: access Negotiation of Trunking: access Access mode VLAN: 1 Trunking Native mode VLAN: 1 Trunking VLAN Enabled: 1-4094 Name: eth 0/2 Switchport: enabled Administrative mode: access Negotiation of Trunking: access Access mode VLAN: 12.....
60000CRG0-35B
474
Not all subcommands apply to all interfaces. Type show interfaces <interface> ? for a list of valid subcommands for the specified interface.
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
<interface> Specifies an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show interfaces ? for a complete list of valid interfaces. Optional. Displays all 96 stored intervals. Optional. Shows a specified interval (x) or range of intervals (x-y). Optional. Displays the current 24-hour totals. Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information. Optional. Displays detailed configuration information on the terminal screen (versus only the nondefault values).
60000CRG0-35B
475
Enable Mode Command Set Optional. Displays current version information (e.g., model and list number, software version, etc.) for the interface.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 6.1 Release 9.1 Release 10.1 Release 11.1 Release 17.1 Command was introduced. Command was updated to include the performance-statistics parameter. Command was expanded to include the high level data link control (HDLC) and tunnel interfaces. The realtime parameter and primary rate interface (PRI) were added. Description, status, and verbose options were introduced. The demand, foreign exchange office (FXO), and serial interfaces were added. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
Usage Examples
The following are samples from various show interfaces commands: >enable #show interfaces t1 1/1 t1 1/1 is UP T1 coding is B8ZS framing is ESF Clock source is line FDL type is ANSI Line build-out is 0dB No remote loopbacks No network loopbacks DS0 Status: 123456789012345678901234 NNNNNNNNNNNNNNNNNNNNNNNN Line Status: -- No Alarms -Current Performance Statistics: 0 Errored Seconds 0 Bursty Errored Seconds 0 Severely Errored Seconds 0 Severely Errored Frame Seconds 0 Unavailable Seconds 0 Path Code Violations 0 Line Code Violations 0 Controlled Slip Seconds 0 Line Errored Seconds 0 Degraded Minutes
60000CRG0-35B
476
Command Reference Guide #show interfaces modem 1/2 modem 1/2 is UP Line status: on-hook Caller ID will be used to route incoming calls 0 packets input 0 bytes 0 no buffer 0 runts 0 giants 0 throttles 0 input errors 0 CRC 0 frame 0 abort 0 ignored 0 overruns 0 packets output 0 bytes 0 underruns 0 input clock glitches 0 output clock glitches 0 carrier lost 0 cts lost #show interfaces eth 0/1 Ip address is 10.200.1.50 Netmask is 255.255.0.0 MTU is 1500 Fastcaching is Enabled RIP Authentication is Disabled RIP Tx uses global version value RIP Rx uses global version value #show interfaces dds 1/1 dds 1/1 is UP line protocol is UP Encapsulation FRAME-RELAY (fr 1) Loop rate is set to 56000 actual rate is 56000 Clock source is line Data scrambling is disabled No Loopbacks 75 packets input 6108 bytes 0 no buffer 0 runts 0 giants 0 throttles 0 input errors 0 CRC 0 frame 0 abort 0 ignored 0 overruns 81 packets output 11496 bytes 0 underruns 0 input clock glitches 0 output clock glitches 0 carrier lost 0 cts lost #show interfaces fr 1 TDM group 10 line protocol is UP Encapsulation FRAME-RELAY (fr 1) 463 packets input 25488 bytes 0 no buffer 0 runts 0 giants 0 throttles 0 input errors 0 CRC 0 frame 0 abort 0 ignored 0 overruns 864 packets output 239993 bytes 0 underruns 0 input clock glitches 0 output clock glitches 0 carrier lost 0 cts lost
60000CRG0-35B
477
Command Reference Guide Line Status: -- No Alarms -Current Performance Statistics: 0 Errored Seconds 0 Bursty Errored Seconds 0 Severely Errored Seconds 0 Severely Errored Frame Seconds 0 Unavailable Seconds 0 Path Code Violations 0 Line Code Violations 0 Controlled Slip Seconds 0 Line Errored Seconds 0 Degraded Minutes #show interfaces fr 1.100 fr 1.100 is Active Ip address is 63.97.45.57, mask is 255.255.255.248 Interface-dlci is 100 MTU is 1500 bytes, BW is 96000 Kbit (limited) Average utilization is 53% #show interfaces shdsl 1/1 shdsl 1/1 is UP, line protocol is DOWN Encapsulation FRAME-RELAY IETF (fr 1) Equipment type is cpe Line rate is 2056kbps No alarms. SHDSL training complete. EOC is up. No local loopbacks, No remote loopbacks SNR margin is 18dB currently, 15dB minimum, 30dB maximum Loop attenuation is 1dB currently, 1dB minimum, 1dB maximum Current 15-minute performance statistics (115 seconds elapsed): 0 code violations, 0 loss of sync word seconds 0 errored seconds, 0 severely errored seconds 0 unavailable seconds Packet Statistics: 0 packets input, 0 bytes, 0 no buffer 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame 0 abort, 0 ignored, 0 overruns 32 packets output, 0 bytes, 0 underruns 0 input clock glitches, 0 output clock glitches
If the user has configured a Bc and Be value on the virtual circuit, the bandwidth (BW) displayed is the sum of those values (Bc + Be). If not, the value for BW is the speed of the interface. The Average utilization displayed is the average utilization of the displayed bandwidth. If the bandwidth number is the Bc + Be value, the (limited) text appears (as shown above).
60000CRG0-35B
478
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<slot/port> information atuc atur bit-allocation performance-statistics <x-y> total-24-hour total-previous-24-hour version Specifies ADSL interface slot and port number. Optional. Displays all ADSL interface information. Optional. Displays only ADSL remote information. Optional. Displays only ADSL local information. Optional. Displays only ADSL DMT bit-allocation table. Optional. Displays all 96 stored intervals. Optional. Displays only a specified interval (x) or range of intervals (x-y). Optional. Displays only the current 24-hour totals. Optional. Displays only the previous 24-hour totals. Optional. Displays current version information (e.g., model and list number, software version, etc.) for the interface.
Default Values
No default values are necessary for this command.
60000CRG0-35B
479
Command History
Release 8.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example shows sample output for this command: >enable #show interfaces adsl 1/1 information adsl 1/1 line information adsl 1/1 Local Line Information Vendor Id: 00000000 Serial Number: 00000000 Firmware Version: ADSL Capabilities G.DMT, G.LITE, ADSL2, ADSL2+ adsl 0/1 Remote Line Information Vendor Id: 00000000 Serial Number: 00000000 Firmware Version: 0 ADSL Capabilities G.DMT, G.LITE, ADSL2, ADSL2+
60000CRG0-35B
480
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
hardware profile realtime version Optional. Specifies cellular hardware information is displayed. Optional. Specifies cellular profile information is displayed. Optional. Specifies display output is shown in real time. Optional. Specifies cellular version information is displayed.
Default Values
No default values are necessary for this command.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example displays cellular hardware information for cellular interface 1/1: >enable #show interfaces cellular 1/1 hardware Electronic Serial Number (ESN) : 0x12345678 Preferred Roaming List (PRL) Version : 12345 Mobile Directory Number (MDN) : 0123456789 Mobile Station ID (MSID) : 0123456789 System ID (SID) : 1234 Network ID (NID) : 12
60000CRG0-35B
481
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<ap> </radio> <.vap> control-protocol dot11 Specifies the AP. Range is 1 to 8. Specifies the radio associated with the AP. Range is 1 to 2. Specifies the VAP associated with the radio. Range is 1 to 8. Optional. Displays properties of the control protocol for the AP. Optional. Displays counters of an 802.11 radios VAPs.
The radio must be specified in the format <ap/radio> (for example, 2/1 indicates radio 1 on access point 2). The virtual access point must be specified in the format <ap/radio.vap> (for example, 2/1.1 indicates virtual access point 1 on radio 1 on access point 2). Default Values
No default values are necessary for this command.
Command History
Release 15.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
482
Usage Examples
The following example shows sample output for the AP interface 1 using the show interfaces dot11ap command: >enable #show interfaces dot11ap 1 Dot11 AP 1 line protocol is UP Controller Status: Local AC in control Ap Version: FW: 1.0 0.4, DRVR: 1.0 0.0, HW: 1.0 0.0 Ap S/N: LBADTN0625XC975 AP MAC address: 00:A0:C8:1D:F8:57 Radio1 - 802.11bg - Enabled, channel 0, address: 00:A0:C8:1D:F8:59 Radio2 - 802.11a - Disabled, channel 0, address: 00:A0:C8:1D:F8:58 Bootup Status: Normal Ap Status: With Session Controlling AC: 00:A0:C8:20:E7:D6 802.1Q Encapsulation - Disabled Auto 100Mbps, Full Duplex Ethernet Statistics: Ethernet Rx Packets: 291476 Ethernet Rx Bytes: 20908434 Ethernet Tx Packets: 67346 Ethernet Tx Bytes: 10606783 The following example shows sample output for the AP interface 1 using the show interfaces dot11ap <ap> control-protocol command: >enable #show interfaces dot11ap 1 control-protocol AP State: Running with session Control State: Controlled by this AC Control Protocol Transmit Bytes: 4080386 Control Protocol Receive Bytes: 9435172 Control Protocol Transmit Packets: 52203 Control Protocol Receive Packets: 65931 Control Protocol Receive Keepalives: 14914 Control Protocol Receive Security Errors: 0 Control Protocol Dropped Packets: 0 Control Protocol Protocol Errors: 0 Control Protocol Protocol No Responses: 0
60000CRG0-35B
483
The following example shows sample output for the radio interface 1 on AP interface 1 using the show interfaces dot11ap <ap/radio> dot11 command: >enable #show interfaces dot11ap 1/1 dot11 Authentication Count: 17 Deauthentication Count: 48 Association Count: 18 Disassociation Count: 12 Reassociation Count: 0 Wireless MSDU Rx Packets: 346 Wireless Data Rx Packets: 7221 Wireless Multicast Rx Packets: 308 Wireless Management Rx Packets: 667521 Wireless Control Rx Packets: 0 Wireless MSDU Tx Packets: 236613 Wireless Data Tx Packets: 236210 Wireless Multicast Tx Packets: 236166 Wireless Management Tx Packets: 599 Wireless Control Tx Packets: 0
60000CRG0-35B
484
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
all <group number> connections interval 15-minute interval 24-hour <value> Displays statistics for all EFM groups. Displays statistics for a single EFM group. Range is 1 to 1024. Optional. Displays the statistics for the connected interfaces. Optional. Displays the statistics for a 15-minute period in the last 24 hours. Optional. Displays the statistics for a 24-hour period in the last 7 days. Specifies which 15-minute period in the last 24 hours or which 24-hour period in the last 7 days is displayed. Range for 15-minute periods is 1 to 4; range for 24-hour periods is 1 to 7.
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
60000CRG0-35B
485
Usage Examples
The following example shows the statistics for the interfaces connected to EFM group 1 in the first 15-minute period of the last 24 hours: >enable #show interfaces efm-group 1 connections interval 15-minute 1 EFM Group 1 Connections (15-Minute Interval 1): 412/900 seconds elapsed in interval interface shdsl 1/1 connected NE in sync, FE in sync, NE in tx, FE in tx No alarms. 109 fragments input, 1111 fragments output 0 errored fragments, 0 discarded fragments 0 fragments too small, 0 fragments too large 0 fcs errors, 0 coding errors interface shdsl 1/2 connected NE in sync, FE in sync, NE in tx, FE in tx No alarms. 109 fragments input, 1111 fragments output 0 errored fragments, 0 discarded fragments 0 fcs errors, 0 coding errors interface shdsl 1/3 connected NE in sync, FE in sync, NE in tx, FE in tx No alarms. 109 fragments input, 1121 fragments output 0 errored fragments, 0 discarded fragments 0 fcs errors, 0 coding errors interface shdsl 1/4 connected NE in sync, FE in sync, NE in tx, FE in tx No alarms. 109 fragments input, 1109 fragments output 0 errored fragments, 0 discarded fragments 0 fcs errors, 0 coding errors
60000CRG0-35B
486
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<slot/port> splice-detect 24-hour <interval> Specifies the slot and port of the interface on which the test was run. Displays the bad splice detection test results for the last 24 hours. Optional. Specifies that results from one or more of the previous 24-hour intervals are displayed. Valid interval range is 1 to 7. You can enter a single interval, or a range of intervals when separated by a dash.
Default Values
No default values are necessary for this command.
Command History
Release A4.05 Command was introduced.
Usage Examples
The following example displays the bad splice detection test results for SHDSL interface 1/1 over the past 24 hours: #show interface shdsl 1/1 splice-detect 24-hour Current Splice Detect Data Summary: No Trouble Found Distance (ft) Count 0 0 200 0 400 0 600 0 800 0 1000 0 1200 0
60000CRG0-35B
487
show ip access-lists
Use the show ip access-lists command to display all configured Internet Protocol version 4 (IPv4) access control lists (ACLs) in the system. Variations of this command include:
show ip access-lists show ip access-lists <ipv4 acl name>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<ipv4 acl name> Optional. Specifies a particular IPv4 ACL to display.
Default Values
No default values are necessary for this command.
Command History
Release 2.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
The show ip access-lists command displays all configured IPv4 ACLs in the system. All entries in the IPv4 ACL are displayed, and a counter indicating the number of packets matching the entry is listed.
Usage Examples
The following is sample output from the show ip access-lists command, and displays information for IPv4 ACLs: >enable #show ip access-lists Standard IP access list MatchAll permit host 10.3.50.6 (0 matches) permit 10.200.5.0 wildcard bits 0.0.0.255 (0 matches) Extended IP access list UnTrusted deny icmp 10.5.60.0 wildcard bits 0.0.0.255 any source-quench (0 matches) deny tcp any any (0 matches)
60000CRG0-35B
488
show ip arp
Use the show ip arp command to display the Address Resolution Protocol (ARP) table. Variations of this command include:
show ip arp show ip arp realtime show ip arp vrf <name> show ip arp vrf <name> realtime
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance or your unit.
Syntax Description
realtime vrf <name> Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information. Optional. Displays information only for the specified VPN routing and forwarding (VRF).
Default Values
No default values are necessary for this command.
Command History
Release 2.1 Release 10.1 Release 16.1 Release 17.1 Command was introduced. The realtime display parameter was introduced. Command was expanded to include the vrf parameter. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
489
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781). VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following is a sample output of the show ip arp command: >enable #show ip arp ADDRESS 10.22.18.3 192.168.20.2 224.0.0.5
TTL(min) 19 16 20
60000CRG0-35B
490
show ip as-path-list
Use the show ip as-path-list command to display any AS path lists that have been configured in the router, along with any permit and deny clauses in each list. Variations of this command include:
show ip as-path-list show ip as-path-list <name>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<name> Optional. Specifies that the command display only the list matching the specified AS path list name. If not specified, all AS path lists are displayed.
Default Values
By default, this command displays all AS path lists.
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
In the following example, all AS path lists defined in the router are displayed. >enable #show ip as-path-list ip as-path-list AsPathList1: permit 100 permit 200 permit 300 deny 6500 ip as-path-list AsPathList2: permit 400 permit 500
60000CRG0-35B
491
In the following example, only the AS Path List with the name AsPathList2 is displayed. >enable #show ip as-path-list AsPathList2 ip as-path-list AsPathList2: permit 400 permit 500
60000CRG0-35B
492
show ip bgp
Use the show ip bgp command to display details about the specified route, including the advertising router IP address, router ID, and the list of neighbors to which this route is being advertised. Variations of this command include:
show ip bgp show ip bgp <ip address> show ip bgp <ip address> <subnet mask> show ip bgp summary
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<ip address> <subnet mask> Optional. Specifies a valid IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the subnet mask that corresponds to a range of IP addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Optional. Displays a summary of the Border Gateway Protocol (BGP) route table.
summary
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
493
Usage Examples
The following example shows detailed output of this command: >enable #show ip bgp BGP local router ID is 172.16.70.1, local AS is 501. Status codes: * valid, > best, i - internal, o - local Origin codes: i - IGP, e - EGP, ? - incomplete Network NextHop Metric LocPrf Path *> 172.16.55.0/30 10.100.13.151 500 i *>o172.16.70.0/30 0.0.0.0 i Total RIB entries = 2
The exact prefixes that are being transmitted and received are shown in this output. The o in front of the 172.16.70.0/30 route indicates it is a received route. For received routes to be exported to the route table, they must be the best valid route indicated with the *> for the received route.
The following sample output of the show ip bgp summary command shows a summarized list of the configured BGP neighbors, as well as their status and statistics. >enable #show ip bgp summary BGP router identifier 192.168.3.1, local AS number 304 8 network entries, 5 paths, and 23 BGP path attribute entries Neighbor V AS MsgRcvd MsgSent InQ 10.22.131.1 4 302 95 104 0 10.22.131.9 4 302 97 105 0 10.22.132.9 4 303 200 179 0 10.22.134.1 4 304 166 178 0 10.22.134.10 4 304 174 179 0 10.22.134.26 4 304 172 174 0 10.22.134.34 4 304 164 174 0
OutQ 0 0 0 0 0 0 0
State/PfxRcd 9 21 21 3 7 10 4
60000CRG0-35B
494
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<number> Optional. Displays routes that contain this value in their community attribute. This is a numeric value that can be an integer from 1 to 4294967295 or string in the form aa:nn, where the value of aa is the autonomous system (AS) number and the value of nn is the desired local preference to be used in the service provider network. Multiple community-number parameters can be present in the command. Optional. Displays routes that contain this value in their community attribute. This represents the well-known reserved community INTERNET. Optional. Displays routes that contain this value in their community attribute. This represents the well-known reserved community string NO_EXPORT_SUBCONFED. Routes containing this attribute should not be advertised to external BGP peers. Optional. Displays routes containing this value in the community attribute. This represents the well-known reserved community string NO_ADVERTISE. Routes containing this attribute should not be advertised to any BGP peer. Optional. Displays routes containing this value in the community attribute. This represents the well-known reserved community string NO_EXPORT. Routes containing this attribute should not be advertised to BGP peers outside a confederation boundary.
internet local-as
no-advertise
no-export
60000CRG0-35B
495
Default Values
By default, this command displays all BGP routes.
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
In the following example, all BGP routes are displayed whose community numbers match those listed in the show ip bgp community command. >enable #show ip bgp community local-as 10:405 BGP local router ID is 10.22.131.241, local AS is 302. Status codes: * valid, > best, i - internal, o - local Origin codes: i - IGP, e - EGP, ? - incomplete Network Next Hop Metric LocPrf 10.22.152.20/30 10.22.131.10 304 10.22.152.24/29 10.22.131.10 304 10.22.152.36/30 10.22.131.10 304 10.22.152.52/30 10.22.131.10 304 11.0.0.0/30 10.22.131.10 304 12.0.0.0/30 10.22.131.10 304 13.0.0.0/30 10.22.131.10 304 14.0.0.0/30 10.22.131.10 304 Total RIB entries = 8
Path 302 300 1 3 4 i 302 300 1 3 4 5 i 302 300 1 3 4 i 302 300 1 3 4 i 302 300 1 3 4 6 i 302 300 1 3 4 6 i 302 300 1 3 4 6 i 302 300 1 3 4 6 i
Information displayed includes: the ID of this router and its autonomous system (AS) number; the destination Network address of the route learned; the Next-Hop address to that network; the Metric; the Local Preference (LocPrf) value (set using the set local-preference command); and the AS Path to the destination network.
60000CRG0-35B
496
The following is a sample output for the show ip bgp community command with an exact match specified: BGP routes with the community numbers specified and only those specified are shown. >enable #show ip bgp community 1001 2001 3001 exact BGP local router ID is 192.168.9.1, local AS is 252. Status codes: * valid, > best, i - internal, o - local Origin codes: i - IGP, e - EGP, ? - incomplete Network NextHop Metric LocPrf * 192.168.11.0/24 10.22.27.251 * 192.168.12.0/24 10.22.27.251 *> 192.168.32.0/24 10.22.27.249 *> 192.168.33.0/24 10.22.27.249 Total RIB entries = 4
60000CRG0-35B
497
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<name> exact Specifies the name of the community list whose routes you wish to display. Optional. Restricts the routes displayed to only those whose community lists exactly match those specified in the named community list. If this parameter is omitted, all routes matching any part of the specified community list will be displayed.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
Information displayed includes the ID of this router and its autonomous system (AS) number, the destination Network address of the route learned, the Next-Hop address to that network, the Metric, the Local Preference (LocPrf) value (set using the set local-preference * command), and the AS Path to the destination network.
60000CRG0-35B
498
Usage Examples
In the following example, all BGP routes are displayed whose community numbers match those defined in the community list named CList1. >enable #show ip bgp community-list CList1 BGP local router ID is 10.22.131.241, local AS is 302. Status codes: * valid, > best, i - internal, o - local Origin codes: i - IGP, e - EGP, ? - incomplete Network Next Hop Metric LocPrf 10.22.152.20/30 10.22.131.10 304 10.22.152.24/29 10.22.131.10 304 10.22.152.36/30 10.22.131.10 304 10.22.152.52/30 10.22.131.10 304 11.0.0.0/30 10.22.131.10 304 12.0.0.0/30 10.22.131.10 304 13.0.0.0/30 10.22.131.10 304 14.0.0.0/30 10.22.131.10 304 20.0.0.0/30 10.22.131.10 304 21.0.0.0/30 10.22.131.10 304 Total RIB entries = 10
Path 302 300 1 3 4 i 302 300 1 3 4 5 i 302 300 1 3 4 i 302 300 1 3 4 i 302 300 1 3 4 6 i 302 300 1 3 4 6 i 302 300 1 3 4 6 i 302 300 1 3 4 6 i 302 300 1 3 4 5 i 302 300 1 3 4 5 i
60000CRG0-35B
499
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<ip address> Optional. Displays information for the specified neighbor. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). If no IP address is entered, information for all neighbors is displayed. advertised-routes Optional. Displays all routes being advertised to the specified neighbor. Command output is the same as for show ip bgp except filtered to only the BGP routes being advertised to the specified neighbor. Optional. Displays all routes (accepted and rejected) advertised by the specified neighbor. Routes may be rejected by inbound filters, such as prefix list filters. Optional. Displays all accepted received routes advertised by the specified neighbor. Routes displayed have passed inbound filtering. This command output is the same as show ip bgp except the output is filtered to those learned from the specified neighbor.
received-routes
routes
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
Entries that are not filtered by prefix lists are marked with an asterisk (*) to show they are valid. Entries that are deemed the best path to advertised route are marked with a caret (>).
60000CRG0-35B
500
Usage Examples
The following are output variations of the show ip bgp neighbors command: >enable #show ip bgp neighbors BGP neighbor is 10.15.43.17, remote AS 100, external link Configured hold time is 180, keepalive interval is 60 seconds Default minimum time between advertisement runs is 30 seconds Connections established 6; dropped 5 Last reset: Interface went down Connection ID: 15 BGP version 4, remote router ID 8.1.1.1 BGP state is Established, for 01:55:05 Negotiated hold time is 180, keepalive interval is 60 seconds Message statistics: InQ depth is 0, OutQ depth is 0 Local host: 10.15.43.18, Local port: 179 Sent Rcvd Opens:1 1 Notifications: 0 0 Updates: 0 8 Keepalives: 116 116 Unknown: 0 0 Total: 117 125 Foreign host: 10.15.43.17, foreign port: 1048 Flags: passive open #show ip bgp neighbors 10.15.43.34 advertised-routes BGP local router ID is 10.0.0.1, local AS is 101. Status codes: * valid, > best, i - internal Origin codes: i - IGP, e - EGP, ? - incomplete Network *> 1.0.0.0/8 *> 2.0.0.0/9 NextHop 10.15.43.17 10.15.43.17 Metric Path 1 100 i 1 100 i
#show ip bgp neighbors 10.15.43.17 received-routes BGP local router ID is 10.0.0.1, local AS is 101. Status codes: * valid, > best, i - internal Origin codes: i - IGP, e - EGP, ? - incomplete Network *> 1.0.0.0/8 *> 2.0.0.0/9 NextHop 10.15.43.17 10.15.43.17 Metric Path 1 100 i 1 100 i
60000CRG0-35B
501
Command Reference Guide #show ip bgp neighbors 10.15.43.17 routes BGP local router ID is 10.0.0.1, local AS is 101. Status codes: * valid, > best, i - internal Origin codes: i - IGP, e - EGP, ? - incomplete Network *> 1.0.0.0/8 *> 2.0.0.0/9 NextHop 10.15.43.17 10.15.43.17 Metric Path 1 100 i 1 100
60000CRG0-35B
502
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
Entries that are not filtered by prefix lists are marked with an asterisk (*) to show they are valid. Entries that are deemed the best path to advertised route are marked with a caret (>).
Usage Examples
The following sample output of the show ip bgp regexp _303_ command shows all of the entries in the BGP database that contain 303 in the AS path. >enable #show ip bgp regexp _303_ BGP local router ID is 192.168.3.1, local AS is 304. Status codes: * valid, > best, i - internal, o - local Origin codes: i - IGP, e - EGP, ? - incomplete Network NextHop Metric LocPrf Path 10.22.130.8/29 10.22.132.9 303 304 302 i * i10.22.130.240/28 0.22.132.1 100 303 300 i * 10.22.130.240/28 10.22.132.9 303 300 i 10.22.131.0/29 10.22.132.9 303 304 302 i 10.22.131.8/29 10.22.132.9 303 304 302 i * i10.22.131.16/29 10.22.132.1 0 100 303 i
60000CRG0-35B
503
Command Reference Guide * 10.22.131.16/29 * i10.22.131.240/28 * 10.22.131.240/28 * 10.22.132.0/29 * 10.22.132.0/29 * i10.22.132.0/29 *> 10.22.132.0/29 * 10.22.132.8/29 * 10.22.132.8/29 * 10.22.132.8/29 * i10.22.132.240/28 *> 10.22.132.240/28 10.22.134.0/29 10.22.134.8/29 10.22.134.16/29 10.22.134.24/29 10.22.134.32/29 10.22.134.40/29 10.22.134.48/29 10.22.134.56/29 10.22.134.64/29 10.22.134.80/29 10.22.135.0/29 10.22.135.8/29 Total RIB entries = 30 10.22.132.9 10.22.132.1 10.22.132.9 10.22.131.1 10.22.131.9 10.22.132.1 10.22.132.9 10.22.131.1 10.22.131.9 10.22.132.9 10.22.132.1 10.22.132.9 10.22.132.9 10.22.132.9 10.22.132.9 10.22.132.9 10.22.132.9 10.22.132.9 10.22.132.9 10.22.132.9 10.22.132.9 10.22.132.9 10.22.132.9 10.22.132.9 0 303 i 100 303 300 i 303 300 i 0 302 303 i 0 302 303 i 0 100 303 i 0 303 i 0 302 303 i 0 302 303 i 0 303 i 0 100 303 i 0 303 i 303 304 i 303 304 i 303 304 i 303 304 i 303 304 i 303 304 i 303 304 i 303 304 i 303 304 i 303 304 i 303 304 305 i 303 304 305 i
60000CRG0-35B
504
show ip cache
Use the show ip cache command to display the fast cache table. Variations of this command include the following:
show ip cache show ip cache vrf <name>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
vrf <name> Optional. Displays information for only the specified VPN routing and forwarding (VRF).
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release 16.1 Release 17.1 Command was introduced. Command was expanded to include the vrf parameter. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
60000CRG0-35B
505
Usage Examples
The following example shows sample output from the show ip cache command for the default VRF (router): >enable #show ip cache DESTINATION INTERFACE 224.0.0.5 Loopback 10.22.18.3 eth 0/1 10.22.18.6 Loopback 192.168.30.2 eth 0/2 10.22.18.255 Loopback 255.255.255.255 Loopback 192.168.20.1 Loopback IP routing cache 7 entries
USE COUNT 0 0 18 0 2 2 25
60000CRG0-35B
506
show ip community-list
Use the show ip community-list command to display any or all defined community lists in the router configuration. Variations of this command include:
show ip community-list show ip community-list <name>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<name> Optional. Specifies the name of the community list you wish to display. If this parameter is omitted, all defined community lists will be displayed.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example shows two community lists, one of which permits all routes containing community number 10:67, and another which permits routes containing community number 10:68 and the Internet community number, but denies routes containing community number 10:45. >enable #show ip community-list ip community-list CommList1: permit 10:67 ip community-list CommList2: permit 10:68 internet deny 10:45
60000CRG0-35B
507
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<interface> Optional. Displays the information for the specified interface type. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show ip dhcp-client lease ? for a complete list of applicable interfaces.
Default Values
No default values are necessary for this command.
Command History
Release 2.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following is a sample output from the show ip dhcp-client lease command: >enable #show ip dhcp-client lease Interface: ethernet 0/1 Temp IP address: 10.100.23.64 Mask: 0.0.0.0 DHCP Lease server: 10.100.23.207 State: Bound (3)
60000CRG0-35B
508
Command Reference Guide Lease: 120 seconds Temp default gateway address: 0.0.0.0 Client-ID: N/A
60000CRG0-35B
509
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<ip address> vrf <name> Optional. Specifies the IP address of the specified client. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Displays information only for the specified VPN routing and forwarding (VRF). If a VRF is not specified, the default VRF is assumed.
Default Values
No default values are necessary for this command.
Command History
Release 2.1 Release 17.1 Command was introduced. Command was expanded to include the vrf parameter and the modifiers begin, exclude, and include.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
60000CRG0-35B
510
Usage Examples
The following is a sample output from the show ip dhcp-server binding command: >enable #show ip dhcp-server binding IP Address Client Id 10.100.23.64 01:00:a0:c8:00:8f:b3
The following example shows sample output from the show ip dhcp-server binding Gray command: >enable #show ip dhcp-server binding vrf Gray IP Address Client Id Lease Expiration 192.168.19.2 01:00:e0:29:91:1e:27 Oct 16 2007 10:58 AM 192.168.19.3 01:00:e0:81:01:53:01 Oct 16 2007 12:42 PM 192.168.19.4 01:00:15:c5:6a:69:ec Oct 16 2007 1:35 PM
60000CRG0-35B
511
show ip ffe
Use the show ip ffe command to display current RapidRoute Engine entries. Variations of this command include:
show ip ffe show ip ffe destination <ip address> show ip ffe destination-port <port> show ip ffe details show ip ffe egress <interface> show ip ffe egress ipsec <rapidroute interface ID> show ip ffe icmp-type <type> show ip ffe ingress <interface> show ip ffe ingress ipsec <rapidroute interface ID> show ip ffe protocol <protocol> show ip ffe source <ip address> show ip ffe source-port <port> show ip ffe type <type>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
destination <ip address> Optional. Filters output by a destination IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Filters output by destination Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port. Ports range from 0 to 65535. Optional. Displays detailed information. Refer to the Functional Notes for more information about using the details keyword. Optional. Displays RapidRoute entries for an egress interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1. Type show ip ffe egress ? for a complete list of valid interfaces.
destination-port <port>
60000CRG0-35B
512
Enable Mode Command Set Optional. Displays RapidRoute entries that come from an Internet Protocol security (IPsec) security association (SA) on a specified RapidRoute interface. RapidRoute interface identifiers range from 1 to 16777215. Optional. Displays RapidRoute entries using a specific Internet Control Message Protocol (ICMP) type. There are three types of ICMP to choose from: echo reply 0 to 255 Displays ICMP echo RapidRoute entries. Displays ICMP reply RapidRoute entries. Displays other ICMP types.
icmp-type <type>
ingress <interface>
Optional. Displays RapidRoute entries for an ingress interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1. Type show ip ffe ingress ? for a complete list of valid interfaces. Optional. Displays RapidRoute entries that go to an IPsec SA on a specified RapidRoute interface. RapidRoute interface identifiers range from 1 to 16777215. Optional. Displays RapidRoute entries that use a specified protocol. Protocols can be specified by selecting one of the following: ah esp gre icmp tcp udp 0 to 255 Displays Authentication Header (AH) Protocol RapidRoute entries. Displays Encapsulating Security Payload (ESP) Protocol RapidRoute entries. Displays Generic Route Encapsulation (GRE) Protocol RapidRoute entries. Displays ICMP RapidRoute entries. Displays TCP RapidRoute entries. Displays UDP RapidRoute entries. Displays other protocol types.
protocol <protocol>
Optional. Displays RapidRoute entries for a specified source IP address. IP addresses should be expressed in decimal dotted notation (for example, 10.10.10.1). Optional. Displays RapidRoute entries for a specified TCP or UDP source port. Ports range from 0 to 65535. Optional. Displays RapidRoute entries of a specific type. Specified types include one of the following: ineligible rejected valid Displays only ineligible RapidRoute entries. Displays only rejected RapidRoute entries. Displays only valid RapidRoute entries.
60000CRG0-35B
513
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Release 17.1 Release 17.6 Release A4.01 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the ipsec and gre parameters. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
The show ip ffe command can be further filtered by adding any combination of the following parameters: destination <ip address> destination-port <port> details egress <interface> egress ipsec <rapidroute interface ID> icmp-type <type> ingress <interface> ingress ipsec <rapidroute interface ID> protocol <protocol> source <ip address> source-port <port> type <type> For example, the destination <ip address> and source <ip address> parameters can be used in conjunction with one another. In this case, the command would look like this: #show ip ffe destination 10.10.10.3 source 10.10.10.1 These parameters can be combined in any order, and as many times as is necessary to get the desired output.
The detail keyword must be the last keyword in the command. For example, show ip ffe destination <ip address> egress <interface> source-port <port> details is acceptable, but show ip ffe destination <ip address> details egress <interface> is not.
60000CRG0-35B
514
Usage Examples
The following is a sample output from the show ip ffe command: >enable #show ip ffe Timeout TCP UDP ICMP AH ESP GRE Other Age: 30m0s 30m0s 30m0s 30m0s 30m0s 30m0s 30m0s Inactive: 15s 15s 15s 15s 15s 15s 15s Type: * valid, ! ineligible, - rejected Flags: F firewall, N NAT, T altered ToS, D don't fragment, I IPsec -------------------------------Ingress: eth 0/1 149 hits, 62553 misses, 0 drops T Proto Source Destination Specific Age Used Drops ! udp 10.200.2.7 10.200.205.255 3959 137 17s 10 ! udp 10.200.201.170 10.200.255.255 138 138 16s 0 ! udp 10.200.7.200 10.200.255.255 138 138 16s 0 ! udp 10.200.201.198 10.200.255.255 138 138 4s 0 ! udp 10.200.201.198 10.200.255.255 137 137 7s 2 ! tcp 172.22.77.208 10.200.1.134 2668 23 6s 36 Number of entries: 6 of 6 (4096 maximum) -------------------------------Total number of entries: 6 of 6 (16384 maximum) The following is sample output from the show ip ffe details command: Timeout TCP UDP ICMP AH ESP GRE Other Age: 30m0s 30m0s 30m0s 30m0s 30m0s 30m0s 30m0s Inactive: 15s 15s 15s 15s 15s 15s 15s Type: * valid, ! ineligible, - rejected Flags: F firewall, N NAT, T altered ToS, D don't fragment, I IPsec -------------------------------Ingress: eth 0/1 706189 hits, 45 misses, 0 drops T Proto Source Destination Specific Age Used Drops Flags * icmp 10.0.1.2 10.0.2.2 echo 13 13s 129 0 I egress: Outbound ESP SA 2 Number of entries: 1 of 1 (4096 maximum) -------------------------------Ingress: Inbound ESP SA 1 129 hits, 1 misses, 0 drops T Proto Source Destination Specific Age Used Drops Flags * icmp 10.0.2.2 10.0.1.2 reply 13 13s 129 0 I egress: eth 0/1 (10.0.1.2) Number of entries: 1 of 1 (4096 maximum)
Flags 0 0 0 0 0 0
60000CRG0-35B
515
Command Reference Guide -------------------------------Ingress: Outbound ESP SA 2 129 hits, 1 misses, 0 drops T Proto Source Destination Specific Age Used Drops Flags * esp 3.3.3.1 3.3.3.2 0x923dbab4 13s 129 0 I egress: hdlc 1 Number of entries: 1 of 1 (256 maximum) -------------------------------Total number of entries: 3 of 3 (16384 maximum)
60000CRG0-35B
516
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is a sample output from the show ip ffe summary command: >enable #show ip ffe summary Ingress MaxEntries Entries eth 0/1 4096 1 global 16384 1
Hits 0 0
Misses 56 56
Drops 0 0
60000CRG0-35B
517
show ip flow
Use the show ip flow command to display information regarding the configuration of integrated traffic monitoring (ITM) on your AOS product. Variations of this command include:
show ip flow cache show ip flow export show ip flow interface
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
cache export interface Displays a summary of the current state of the cache of nonexpired traffic flows. Displays information on export packets sent to a destination. Displays the ITM configuration of each interface on the router.
Default Values
No default values are necessary for this command.
Command History
Release 16.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example is sample output from the show ip flow export command: #show ip flow export Traffic Flow export is ENABLED Version: 9 Export Destinations 10.22.16.132: 9991 vrf BLUE source ppp 1 10.5.22.203: 30000 11 flows exported in 8 udp datagrams 0 flows failed to export
60000CRG0-35B
518
Command Reference Guide The following is sample output from the show ip flow cache command: #show ip flow cache IP Traffic Flow Cache Size: 682/4096 entries 8206 total entries added 95545 aging polls, last aging poll occurred 3 seconds ago
The following is sample output from an AOS product with an Ethernet interface and a point-to-point interface configured for ITM: #show ip flow interface eth 0/1 ip flow ingress ppp 1 ip flow ingress ip flow egress
60000CRG0-35B
519
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines after. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
day hour port detail Optional. Specifies the display of Top Talker data for the current 24-hour period. Optional. Specifies the display of Top Talker data for the current hour. Optional. Specifies the display of Top Talker monitored port traffic for the current interval. Optional. Specifies the display of information for previous and current intervals.
Default Values
No default values are necessary for this command.
Command History
Release 17.1 Command was introduced.
60000CRG0-35B
520
Usage Examples
The following is sample output from the show ip flow top-talkers command: #show ip flow top-talkers Current Interval Top Talkers: 1:00 PM to 1:15 PM Top Traffic Sources: IP Address Packets 10.100.43.254 1451 10.100.43.161 860 10.22.160.253 384 10.100.43.200 292 10.22.165.17 222 Top Traffic Destinations: IP Address Packets 10.22.162.3 735 10.22.166.222 707 10.22.160.7 407 224.0.0.6 393 10.22.130.6 391
60000CRG0-35B
521
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<multicast address> Optional. Displays the IP address of a multicast group. The multicast group IP address range is 244.0.0.0 to 239.255.255.255 or 224.0.0.0 /4.
Default Values
No default values are necessary for this command.
Command History
Release 7.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output from this command: >enable #show ip igmp groups IGMP Connected Group Membership Group Address Interface Uptime 172.0.1.50 Loopback100 00:42:57 172.1.1.1 Ethernet0/1 00:05:26 172.1.1.1 Loopback100 00:42:57
60000CRG0-35B
522
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<interface> Optional. Displays information for a specific interface type. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Enter the show ip igmp interface ? command for a complete list of interfaces.
Default Values
No default values are necessary for this command.
Command History
Release 7.1 Release 9.1 Release 17.1 Command was introduced. Command was expanded to include the high level data link control (HDLC) and tunnel interfaces. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
523
Usage Examples
The following example is sample output from the show ip igmp interface command: >enable #show ip igmp interface eth 0/1 is UP Ip Address is 10.22.120.47, netmask is 255.255.255.0 IGMP is enabled on interface Current IGMP version is 2 IGMP query interval is 60 seconds IGMP querier timeout is 120 seconds IGMP max query response time is 10 seconds Last member query count is 2 Last member query response interval is 1000 ms IGMP activity: 548 joins, 0 leaves IGMP querying router is 0.0.0.0 IGMP helper address is disabled
60000CRG0-35B
524
Global IGMP snooping overrides the virtual local area network (VLAN) IGMP snooping. If global snooping is disabled, you cannot enable VLAN IGMP snooping. If global snooping is enabled, you can enable or disable VLAN IGMP snooping. Refer to ip igmp snooping on page 961 for more information. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
mrouter vlan vlan <vlan id> Optional. Displays the ports associated with multicast routers. Optional. Displays whether IGMP snooping is enabled or disabled for all VLANs. Optional. Displays whether IGMP snooping is enabled or disabled for a particular VLAN.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
525
Usage Examples
The following is sample output from the ip igmp snooping vlan command: >enable #show ip igmp snooping vlan 1 Vlan 1: IGMP snooping is enabled on this VLAN The following is sample output from the ip igmp snooping mrouter vlan command: >enable #show ip igmp snooping mrouter vlan 200 VLAN Ports -----------------+ ---------------------------------200 Gi0/2(static)
60000CRG0-35B
526
show ip interfaces
Use the show ip interfaces command to display the status information for all Internet Protocol version 4 (IPv4) interfaces (or a specific IPv4 interface). Variations of this command include:
show ip interfaces show ip interfaces <interface> show ip interfaces <interface> brief
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<interface> Optional. Displays status information for a specific IPv4 interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show ip interfaces ? for a complete list of applicable interfaces. If no interface is specified, status information for all interfaces is displayed. Optional. Displays an abbreviated version of interface statistics for all IPv4 interfaces.
brief
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 9.1 Release 11.1 Release 17.1 Command was introduced. Command was expanded to include the high level data link control (HDLC) and tunnel interfaces. Demand interface was added. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
527
Usage Examples
The following is sample output of the show ip interfaces command, and displays information for IPv4 interfaces: >enable #show ip interfaces eth 0/1 is UP, line protocol is UP Ip address is 10.10.10.1 Netmask is 255.255.255.0 MTU is 1500 Fastcaching is Enabled RIP Authentication is Disabled RIP Tx uses global version value
60000CRG0-35B
528
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
vrf <name> Optional. Displays information for only the specified VPN routing and forwarding (VRF).
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 16.1 Release 17.1 Command was introduced. Command was expanded to include the vrf parameter. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
60000CRG0-35B
529
Usage Examples
The following is sample output (just for the default VRF) from this command: >enable #show ip local policy Local policy routing is enabled, using route-map SAMPLE_RTEMAP route-map SAMPLE_RTEMAP, permit, sequence 1 Match clauses: ip address (access-lists): SAMPLE_ACL Set clauses: BGP Filtering matches: 0 routes Policy routing matches: 0 packets 0 bytes Redistribution Filtering matches: 0 routes
60000CRG0-35B
530
show ip mroute
Use the show ip mroute command to display IP multicasting routing table information. Variations of this command include:
show ip mroute show ip mroute all show ip mroute <ip address> show ip mroute <interface> show ip mroute summary
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
all <ip address> <interface> Optional. Displays all multicast routes, including those not used to forward multicast traffic. Optional. Displays IP address of a multicast group. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show ip mroute ? for a complete list of interfaces. Optional. Displays a single-line summary for each entry in the IP multicast routing table.
summary
Default Values
No default values are necessary for this command.
60000CRG0-35B
531
Command History
Release 7.1 Release 9.1 Release 11.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the high level data link control (HDLC) and tunnel interfaces. The all parameter was added. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following is sample output from the show ip mroute all command: >enable #show ip mroute all IP Multicast Routing Table Flags: S - Sparse, C - Connected, P - Pruned, J - Join SPT, T - SPT-bit Set, F - Register, R - RP-bit Set Timers: Uptime/Expires (*, 225.1.0.1), 01:17:34/00:03:25, RP 192.168.0.254, Flags: SC Forwarding Entry: Yes Incoming interface: tunnel 2, RPF nbr 172.16.2.10 Outgoing interface list: eth 0/1, Forward, 01:17:34/00:03:25
60000CRG0-35B
532
show ip ospf
Use the show ip ospf command to display general information regarding open shortest path first (OSPF) processes. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is a sample output from the show ip ospf command: >enable #show ip ospf Summary of OSPF Process with ID: 192.2.72.101 Supports only single Type Of Service routes (TOS 0) SPF delay timer: 5 seconds, Hold time between SPFs: 10 seconds LSA interval: 240 seconds Number of external LSAs: 0, Checksum Sum: 0x0 Number of areas: 0, normal: 0, stub: 0, NSSA: 0
60000CRG0-35B
533
60000CRG0-35B
534
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<area id> adv-router <ip address> Optional. Specifies an OSPF area ID. Refer to network <ip address> <wildcard mask> area <area id> on page 2657 for more information. Optional. Displays information about link state advertisements (LSAs) from the specified advertising router IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Displays a simplified list of link state advertisements for the specified area. Optional. Displays information about external link state advertisements from the specified link-state ID. Optional. Displays information about network link state advertisements for the specified area or from the specified link-state ID. Optional. Displays information about router link state advertisements for the specified area or from the specified link-state ID. Optional. Displays information about summary link state advertisements for the specified area or from the specified link-state ID. Optional. Displays information from a specific link state ID. The value defined in this field is tied to the advertisements loop start (LS) type.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
535
Functional Notes
The link state ID differs depending on whether the link state advertisement in question describes a network or a router. If describing a network, this ID is one of the following: The networks IP address. This is true for type 3 summary link advertisements and in autonomous system external link advertisements. An address obtained from the link state ID. If the network link advertisements link state ID is masked with the networks subnet mask, this will yield the networks IP address. If describing a router, this ID is always the routers OSPF router ID.
Usage Examples
The following example shows the database link state summary for all areas: >enable #show ip ospf database
60000CRG0-35B
536
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<interface> Optional. Specifies an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show ip ospf interface ? for a complete list of applicable interfaces.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 9.1 Release 17.1 Command was introduced. Command was expanded to include the high level data link control (HDLC) and tunnel interfaces. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example shows OSPF information for the PPP 1 interface. >enable #show ip ospf interface ppp 1
60000CRG0-35B
537
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
detail <interface> Optional. Displays detailed information on neighbors. Optional. Specifies an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show ip ospf neighbor ? for a complete list of applicable interfaces. Optional. Specifies a specific neighbors router ID.
<neighbor id>
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 9.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the high level data link control (HDLC) and tunnel interfaces. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
60000CRG0-35B
538
Usage Examples
The following example shows detailed information on the OSPF neighbors: >enable #show ip ospf neighbor
60000CRG0-35B
539
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays all summary address redistribution information for the system: >enable #show ip ospf summary-address
60000CRG0-35B
540
show ip pim-sparse
Use the show ip pim-sparse command to display protocol-independent multicast (PIM) configuration information. Sparse mode or PIM-SM is a routing protocol used to establish and maintain the multicast distribution tree. Routers can participate in the shared tree (RPT) rooted at the rendezvous point (RP) router or the shortest path tree (SPT) rooted at a multicast source. PIM-SM also establishes both shared trees and SPTs. Variations of this command include:
show ip pim-sparse show ip pim-sparse interfaces <interface> show ip pim-sparse neighbor show ip pim-sparse rp-map show ip pim-sparse rp-set show ip pim-sparse state show ip pim-sparse traffic
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
interfaces <interface> Optional. Displays PIM-SM configuration and status information for a specific interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show ip pim-sparse interface ? to display a list of applicable interfaces. Optional. Displays neighbor adjacency information. Optional. Displays active group-to-RP mappings. Optional. Displays a list of statically configured RP candidates. The multicast group IP address is 224.0.0.0 /4 when no access group was applied to the rp-address command (refer to rp-address <ip address> on page 2670). Otherwise, it is the name of the access group. Optional. Displays multicast route PIM state information. Optional. Displays active PIM-SM control traffic statistics.
state traffic
Default Values
No default values are necessary for this command.
60000CRG0-35B
541
Command History
Release 11.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following example shows sample output from the show ip pim-sparse command: >enable #show ip pim-sparse Global PIM Sparse Mode Settings Join/Prune interval: 60, SPT threshold: 1 The following example shows sample output from the show ip pim-sparse interfaces command: >enable #show ip pim-sparse interfaces eth 0/1 is UP PIM Sparse DR: itself Local Address: 192.168.1.254 Hello interval (sec): 30, Neighbor timeout (sec): 105 Propagation delay (ms): 500, Override interval (ms): 2500 tunnel 1 is UP PIM Sparse DR: 172.16.1.10 Local Address: 172.16.1.9 Hello interval (sec): 30, Neighbor timeout (sec): 105 Propagation delay (ms): 500, Override interval (ms): 2500 tunnel 2 is UP PIM Sparse DR: 172.16.2.10 Local Address: 172.16.2.9 Hello interval (sec): 30, Neighbor timeout (sec): 105 Propagation delay (ms): 500, Override interval (ms): 2500 The following example shows sample output from the show ip pim-sparse neighbor command: >enable #show ip pim-sparse neighbor Port Neighbor Holdtime(sec) Age(sec) Uptime(sec) ------------------------------------------------------------------------------------------------------
60000CRG0-35B
542
Command Reference Guide tunnel 1 tunnel 2 172.16.1.10 172.16.2.10 105 105 19 23 241908 241913
The following example shows sample output from the show ip pim-sparse rp-map command: >enable #show ip pim-sparse rp-map Number of group-to-RP mappings: 5 Group address RP address --------------------------------------------------------225.1.0.1 192.168.0.254 225.1.0.2 192.168.0.254 225.1.0.3 192.168.0.254 The following example shows sample output from the show ip pim-sparse rp-set command: >enable #show ip pim-sparse rp-set Group address Static-RP-address -------------------------------------------------------------224.0.0.0/4 192.168.0.254 MCAST_ACL_1 192.168.1.254 MCAST_ACL_2 192.168.2.254 MCAST_ACL_3 192.168.3.254 The following example shows sample output from the show ip pim-sparse state command: >enable #show ip pim-sparse state PIM-SM State Table Flags: S - Sparse, C - Connected, P - Pruned, J - Join SPT, T - SPT-bit Set, F - Register, R - RP-bit Set Timers: Uptime/Expires (*, 225.1.0.1), 02:42:03/00:03:04, RP 192.168.0.254, Flags: SC Forwarding Entry: Yes Incoming interface: tunnel 2, RPF nbr 172.16.2.10 Upstream Join/Prune State: Joined Register State: No Info RegStop Timer (sec): stopped Join/Prune Timer (sec): 57 Override Timer (sec): stopped Multicast Border Router: 0.0.0.0 Packets Forwarded: 2 Outgoing interface list: eth 0/1, Forward, 02:42:03/00:03:03 Downstream Join/Prune State: Join
60000CRG0-35B
543
Command Reference Guide Assert Winner State: No Info Assert Timer (sec): stopped Assert Winner: 0.0.0.0 Assert Winner Metric: infinity Local Membership: Yes Forwarding State: Forwarding Inherited output list: eth 0/1
The following example shows sample output from the show ip pim-sparse traffic command: >enable #show ip pim-sparse traffic Rx Tx Port: eth 0/1 Hello: 7 8334 Register: 0 0 Assert: 0 0 Port: tunnel 1 Hello: 8327 8333 Register: 0 0 Assert: 0 0 Port: tunnel 2 Hello: 8323 8334 Register: 0 0 Assert: 0 0 Total Hello: 16657 25001 Register: 0 0 Assert: 0 0
Rx J/P: RegStop: 0 0
Tx 0 0
J/P: RegStop:
0 0
57 0
J/P: RegStop:
0 0
11949 0
J/P: RegStop:
0 0
12006 0
60000CRG0-35B
544
show ip policy
Use the show ip policy command to display the interfaces which have route maps configured. This command is used for troubleshooting policy-based routing. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output from this command: >enable #show ip policy Interface eth 0/1 eth 0/2 Route-map ISP_A ISP_B
60000CRG0-35B
545
show ip policy-class
Use the show ip policy-class command to display the configured session limit and specific host IP addresses of all current sessions. Refer to ip policy-class <ipv4 acp name> on page 985 for information on configuring access policies.Variations of this command include:
show ip policy-class show ip policy-class <name> show ip policy-class host-sessions show ip policy-class <name> host-sessions
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
host-sessions <name> Optional. Displays specific host IP addresses of all current sessions. Optional. Displays policy class information for a specific policy class.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 12.1 Release 17.1 Command was introduced. Command was expanded to include host-sessions. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
546
Usage Examples
The following is a sample output from the show ip policy-class command: >enable #show ip policy-class Maximum policy-sessions: 17400 Policy-class Private: 136 current sessions (5800 max) Entry 1 - allow list self self Entry 2 - nat source list wizard-ics interface ppp 1 overload Policy-class Public: 0 current sessions (5800 max) The following is a sample output from the show ip policy-class host-sessions command: >enable #show ip policy-class host-sessions Policy-class Private: 100 policy-sessions allowed per source address. Src IP Address --------------192.168.1.100 192.168.1.101 192.168.1.121 Sessions -------1 35 100 (maximum allowed)
Policy-class Public: No limit for policy-sessions allowed per host. The following is a sample output from the show ip policy-class <name> host-sessions command for the policy class named Private: >enable #show ip policy-class Private host-sessions Policy-class Private: 100 policy-sessions allowed per source address. Src IP Address --------------192.168.1.100 192.168.1.101 192.168.1.121 Sessions -------1 35 100 (maximum allowed)
60000CRG0-35B
547
show ip policy-sessions
Use the show ip policy-sessions command to display a list of current Internet Protocol version 4 (IPv4) access control policy (ACP) associations. Refer to ip policy-class <ipv4 acp name> on page 985 for information on configuring ACPs. Variations of this command include:
show ip policy-sessions show ip policy-sessions timeline show ip policy-sessions <ipv4 acp name> show ip policy-sessions <ipv4 acp name> include-deleted show ip policy-sessions <ipov4 acp name> timeline show ip policy-sessions any-vrf show ip policy-sessions any-vrf include-deleted show ip policy-sessions any-vrf timeline show ip policy-sessions include-deleted show ip policy-sessions vrf <name> show ip policy-sessions vrf <name> include-deleted show ip policy-sessions vrf <name> timeline
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<ipv4 acp name> include-deleted Optional. Displays policy class associations for the specified IPv4 ACP. Optional. Displays all IPv4 ACP firewall sessions, including active associations (through which the firewall is allowed to pass traffic), and associations flagged for deletion (through which the firewall is forbidden to pass traffic). Associations flagged for deletion will usually be freed within a few seconds of timeout or deletion, depending on packet congestion; servicing of packets is given priority. New traffic matching an association will create a new active association, provided the traffic still matches a ACP allow or network address translation (NAT) entry. (This parameter is only valid on the NetVanta 3200.) Optional. Displays a timeline of IPv4 ACP firewall session creations and peak numbers of policy sessions per hour over the last 24 hours. Optional. Displays information for all VPN routing and forwardings (VRFs), including the default. Optional. Displays information only for the specified VRF. If a VRF is not specified, the default unnamed VRF is assumed.
60000CRG0-35B
548
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 11.1 Release 17.1 Command was introduced. Command was expanded to include the all parameter. Command was expanded to include the parameters vrf and include-deleted (NetVanta 3200 only), as well as the modifiers begin, exclude, and include. Command was expanded to include the timeline parameter.
Release 17.5
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following is sample output from the show ip policy-sessions command, and displays information for IPv4 ACPs: >enable #show ip policy-sessions Protocol (TTL) [in crypto map] -> [out crypto map] Dest VRF, Dest policy-class Src IP Address Src Port Dest IP Address Dst Port NAT IP Address NAT Port ------------------------------------------------------------------------------------------------------------------------------------------Policy class Public: tcp (13) 192.168.1.142 2621 192.168.19.2 1 10.10.10.1 3000 tcp (13) 192.168.1.142 2622 192.168.19.2 2 10.10.10.1 3001 tcp (13) 192.168.1.142 2623 192.168.19.2 3 10.10.10.1 3002 The following is sample output from the show ip policy-sessions include-deleted command: >enable #show ip policy-sessions include-deleted
60000CRG0-35B
549
Command Reference Guide Src Vrf (if not default), Src policy class:
Protocol (TTL) [in crypto map] -> [out crypto map] Dest VRF, Dest policy-class Src IP Address Src Port Dest IP Address Dst Port NAT IP Address NAT Port ------------------------------------------------------------------------------------------------------------------------------------------Policy class "Private": Policy class Private_Aqua: Policy class Private_Black: Policy class Private_Crimson: Policy class Private_Green: Policy class Private_Orange: Policy class Private_Purple: Policy class Private_Yellow: Policy class "Public": Policy class "Public2": Policy class "self": udp (60) -> Public2 10.22.160.134 1027 10.22.160.254 53 Policy class "default": The following is sample output from the show ip policy-sessions any-vrf include-deleted command: >enable #show ip policy-sessions any-vrf include-deleted Src Vrf (if not default), Src policy class: Protocol (TTL) [in crypto map] -> [out crypto map] Dest VRF, Dest policy-class Src IP Address Src Port Dest IP Address Dst Port NAT IP Address NAT Port ------------------------------------------------------------------------------------------------------------------------------------------Policy class "Private": Policy class "Public": Policy class "self": Policy class "default": VRF "Green", Policy class "Private": tcp (418) -> Black, Public 192.168.121.2 35257 192.168.10.19 21 s 192.168.9.2 35257 tcp (593) -> Black, Public 192.168.121.2 35333 192.168.10.19 20 s 192.168.9.2 2759 tcp (600) -> Black, Public 192.168.121.2 65283 192.168.10.207 80 s 192.168.9.2 65283 tcp (4) -> Black, Public 192.168.121.2 1606 192.168.10.209 80 s 192.168.9.2 1606 tcp (600) -> Black, Public 192.168.121.2 3648 192.168.10.210 80 s 192.168.9.2 3648 tcp (502) -> Black, Public 192.168.121.3 52429 192.168.10.19 21 s 192.168.9.2 52429
60000CRG0-35B
550
VRF "Green", Policy class "Public": VRF "Green", Policy class "self": VRF "Green", Policy class "default": VRF "Black", Policy class "Private": VRF "Black", Policy class "Public": VRF "Black", Policy class "self": VRF "Black", Policy class "default": The following is sample output from the show ip policy-sessions timeline command: #show ip policy-sessions timeline Period: Feb 08 12:00 - Feb 09 12:00 Hour New Peak --------- ---------- ------12:00 13115 818 13:00 13810 769 14:00 13177 748 15:00 13373 753 16:00 14451 982 17:00 13555 831 18:00 13825 741 19:00 14130 827 20:00 13005 870 21:00 13640 803 22:00 13081 781 23:00 13893 799 00:00 13003 783 01:00 14077 937 02:00 13240 854 03:00 12448 803 04:00 12518 1018 05:00 12533 843 06:00 12818 752 07:00 16119 934 08:00 22813 996 09:00 20361 1041 10:00 28474 1221 11:00 20361 1454 Current Time: 09 Feb 2009 12:54:46
60000CRG0-35B
551
show ip policy-stats
Use the show ip policy-stats command to display a list of current Internet Protocol version 4 (IPv4) access control policy (ACP) statistics. Refer to ip policy-class <ipv4 acp name> on page 985 for information on configuring IPv4 ACPs. Variations of this command include:
show ip policy-stats show ip policy-stats <ipv4 acp name>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<ipv4 acp name> Optional. Displays policy class statistics for a specific IPv4 ACP.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays a list of current IPv4 ACP statistics: >enable #show ip policy-stats
60000CRG0-35B
552
show ip prefix-list
Use the show ip prefix-list command to display Border Gateway Protocol (BGP) prefix list information. Variations of this command include:
show ip prefix-list <name> show ip prefix-list detail <name> show ip prefix-list summary <name>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<name> detail summary Shows information for a specific prefix list. Optional. Shows a listing of the prefix list rules and their hit counts. Optional. Shows information about the entire prefix list.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
If the show ip prefix-list command is issued with no arguments, a listing of the prefix-list rules, but no hit count statistics, is displayed.
Usage Examples
The following example displays information about the prefix list test. >enable #show ip prefix-list test ip prefix-list test: 4 entries seq 5 permit 0.0.0.0/0 ge 8 le 8 seq 10 deny 0.0.0.0/0 ge 9 le 9 seq 15 permit 0.0.0.0/0 ge 10 le 10 seq 20 deny 0.0.0.0/0 ge 11
60000CRG0-35B
553
show ip protocols
Use the show ip protocols command to display IP routing protocol parameters and statistics. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is a sample output from the show ip protocols command: >enable #show ip protocols Sending updates every 30 seconds, next due in 8 seconds Invalid after 180 seconds, hold down time is 120 seconds Redistributing: rip Default version control: send version 2, receive version 2 Interface Send Ver. Rec Ver. eth 0/1 2 2 ppp 1 2 2 Routing for networks: 1.1.1.0/24
60000CRG0-35B
554
show ip route
Use the show ip route command to display the contents of the Internet Protocol version 4 (IPv4) route table. Variations of this command include:
show ip route show ip route <ipv4 address> show ip route <ipv4 address> <subnet mask> show ip route <ipv4 address> longer-prefixes show ip route <ipv4 address> <subnet mask> longer-prefixes show ip route bgp show ip route bgp verbose show ip route connected show ip route ospf show ip route ospf verbose show ip route rip show ip route rip verbose show ip route static show ip route static verbose show ip route summary show ip route summary realtime show ip route table show ip route vrf <name> show ip route vrf <name> <ipv4 address> show ip route vrf <name> <ipv4 address> <subnet mask> show ip route vrf <name> <ipv4 address> longer-prefixes show ip route vrf <name> <ipv4 address> <subnet mask> longer-prefixes show ip route vrf <name> bgp show ip route vrf <name> connected show ip route vrf <name> ospf show ip route vrf <name> rip show ip route vrf <name> static show ip route vrf <name> summary show ip route vrf <name> table
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
60000CRG0-35B
555
Using the realtime argument for this command can adversely affect the performance of your unit. Syntax Description
<ipv4 address> <subnet mask> Optional. Specifies a valid IPv4 address. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the subnet mask that corresponds to a range of IPv4 addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Optional. Displays only the IPv4 routes associated with Border Gateway Protocol (BGP). Optional. Displays only the IPv4 routes for directly connected networks. Optional. Displays only the IPv4 routes matching the specified network. Optional. Displays only the IPv4 routes associated with open shortest path first (OSPF). Optional. Displays only the IPv4 routes that were dynamically learned through Routing Information Protocol (RIP). Optional. Displays only the IPv4 routes that were statically entered. Optional. Displays a summary of all IPv4 route information. Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information. Optional. Displays a condensed version of the IPv4 route table. Optional. Enables detailed messaging. Optional. Displays only the IPv4 routes for the specified VPN routing and forwarding (VRF).
bgp connected longer-prefixes ospf rip static summary summary realtime table verbose vrf <name>
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 10.1 Release 16.1 Release 17.1 Release A1 Release 17.2 Command was introduced. The realtime display parameter was introduced. Expanded to include the vrf parameter. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the verbose parameter. Command was enhanced to show the best route to the given IP address and the longer-prefixes parameter was added.
60000CRG0-35B
556
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781). VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example shows how to display IPv4 routes learned via BGP. The values in brackets after a BGP route entry represent the entry's administrative distance and metric: >enable #show ip route bgp Codes: C - connected, S - static, R - RIP, O - OSPF, B - BGP IA - OSPF inter area, N1 - OSPF NSSA external type 1 N2 - OSPF NSSA external type 2, E1 - OSPF external type 1 E2 - OSPF external type 2 Gateway of last resort is 10.15.43.17 to network 0.0.0.0 B 1.0.0.0/8 [30/0] via 10.15.43.17, fr 1.17 B 2.0.0.0/9 [30/0] via 10.15.43.17, fr 1.17 B 2.128.0.0/10 [30/0] via 10.15.43.17, fr 1.17 B 2.192.0.0/11 [30/0] via 10.15.43.17, fr 1.17 B 2.224.0.0/12 [30/0] via 10.15.43.17, fr 1.17 B 2.240.0.0/13 [30/0] via 10.15.43.17, fr 1.17 The following example shows output for the show ip route vrf RED summary command. >enable #show ip route vrf RED summary Route Source FIB Local-RIB Connected 16 16 Static 16 16 Other 31 31 Total 63 63
60000CRG0-35B
557
The following example shows how to display IPv4 routes learned in VRF RED. The values in brackets after a route entry represent the entry's administrative distance and metric: >enable #show ip route vrf RED Codes: C - connected, S - static, R - RIP, O - OSPF, B - BGP IA - OSPF inter area, N1 - OSPF NSSA external type 1 N2 - OSPF NSSA external type 2, E1 - OSPF external type 1 E2 - OSPF external type 2 Gateway of last resort is 192.168.1.1 to network 0.0.0.0 S 0.0.0.0/0 [1/0] via 192.168.1.1, eth 0/2.301 C 192.168.1.0/24 is directly connected, eth 0/2.301 C 192.168.50.0/30 is directly connected, fr 1.16 C 192.168.50.1/32 is directly connected, fr 1.16 C 192.168.51.0/30 is directly connected, fr 2.16 C 192.168.54.0/30 is directly connected, ppp 1 C 192.168.55.0/30 is directly connected, hdlc 1 C 192.168.56.0/30 is directly connected, fr 11.16 S 192.168.101.0/24 [1/0] via 192.168.50.1, fr 1.16 S 192.168.102.0/24 [1/0] via 192.168.51.1, fr 2.16 S 192.168.106.0/24 [1/0] via 192.168.55.1, hdlc 1 S 192.168.107.0/24 [1/0] via 192.168.56.1, fr 11.16 S 192.168.109.0/24 [1/0] via 192.168.1.253, eth 0/2.301 The following example shows output for the show ip route command. The values in brackets after a route entry represent the entry's administrative distance and metric: >enable #show ip route Codes: C - connected, S - static, R - RIP, O - OSPF, B - BGP E1 - OSPF external type 1, E2 - OSPF external type 2 IA - OSPF inter area Gateway of last resort is 10.22.18.254 to network 0.0.0.0 S S S C C C C C 0.0.0.0/0 [1/0] via 10.22.18.254, eth 0/1 10.22.16.0/24 [1/0] via 10.22.18.254, eth 0/1 10.22.17.0/24 [1/0] via 10.22.18.254, eth 0/1 10.22.18.0/24 is directly connected, eth 0/1 192.168.25.0/31 is directly connected, loop 1 192.168.26.1/32 is directly connected, loop 2 192.168.27.0/24 is directly connected, loop 3 192.168.249.0/24 is directly connected, eth 0/2
60000CRG0-35B
558
The following example shows output for the show ip route <ipv4 address> command. This data explains the resulting route a packet will be sent through. >enable #show ip route 10.22.16.16 Routing entry for 10.22.16.0/24 Known via static Distance 1, metric 0, candidate default path Routing Next Hop(s): 10.22.18.254, via eth 0/1 Route metric is 0 The following example shows output for the show ip route <ipv4 address> longer-prefixes command. Using the longer-prefixes parameter displays only the matching routes. >enable #show ip route 10.22.16.0 longer-prefixes Codes: C - connected, S - static, R - RIP, O - OSPF, B - BGP E1 - OSPF external type 1, E2 - OSPF external type 2 IA - OSPF inter area Gateway of last resort is 10.22.18.254 to network 0.0.0.0
60000CRG0-35B
559
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
count Optional. Displays only the total number of entries stored in the route cache.
Default Values
No default values are necessary for this command.
Command History
Release 17.5 Command was introduced.
Usage Examples
The following is sample output from the show ip route-cache express command: >enable #show ip route-cache express DESTINATION MASK GATEWAY ---------------------------------------------------------------------------------------199.0.50.2 255.255.255.255 10.100.43.251 199.0.45.2 255.255.255.255 10.100.43.251 198.110.47.2 255.255.255.255 10.100.43.251 198.50.42.2 255.255.255.255 10.100.43.251 198.0.46.2 255.255.255.255 10.100.43.251 198.0.41.2 255.255.255.255 10.100.43.251 The following is sample output from the show ip route-cache express count command: >enable #show ip route-cache express count Total number of express routes: 26
60000CRG0-35B
560
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
count Optional. Specifies the output is limited to the number of entries stored in the Address Resolution Protocol (ARP) table.
Default Values
No default values are necessary for this command.
Command History
Release 17.5 Command was introduced.
Usage Examples
The following is sample output from the show ip route-cache express host-table command: >enable #show ip route-cache express host-table DESTINATION MAC ADDRESS INTERFACE ------------------------------------------------------------------------------------------10.23.131.254 00:A0:C8:00:7E:D3 vlan 1 20.1.1.2 00:DE:AD:00:55:55 vlan 20 21.1.1.2 00:A0:C8:00:78:A8 vlan 21 22.1.1.2 00:A0:C8:24:7E:6A vlan 22
60000CRG0-35B
561
Default Values
No default values are necessary for this command.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example displays a summary of all gathered VQM statistics: #show ip rtp quality-monitoring Voice Quality Monitoring is ENABLED Jitter Buffer: adaptive 10/50/100 ms (min/nominal/max) Quality ---------Excellent Good Fair Poor ----------Totals: Active Streams --------------------60 20 3 1 --------------------84 Call History ---------------50 37 1 7 --------------95 All Streams ---------------13462 3456 45 7 --------------16970 MOS range ---------------4.40 - 4.00 3.99 - 3.60 3.59 - 2.60 2.59 - 0.00 ----------------
(Note: Statistics for All Streams are updated at call completion and do not include currently active streams. Call history statistics are available for up to 100 streams.) History thresholds: MOS (LQ/CQ/PQ): 3.0/3.0/3.0 Loss: 20 pkts
60000CRG0-35B
562
Command Reference Guide Out-of-order packets: 300 pkts Jitter: 300 ms Notification thresholds: Metric Info ----------------------PQ MOS 4.4 LQ MOS 4.4 Loss N/A Out-of-order N/A Jitter N/A Traps: ENABLED at Notice Traps sent: 14
60000CRG0-35B
563
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
call-id <string> degradation detail from-uri <string> sort-by jitter sort-by loss sort-by lq-mos sort-by out-of-order sort-by pq-mos Optional. Displays active call statistics based on a substring of the Call-ID. Optional. Displays possible sources of voice quality degradation for active calls. Optional. Displays details of all available active call statistics. Optional. Displays active call statistics based on a substring of the From URI. Optional. Displays active call statistics with the highest amount of jitter first. Optional. Displays active call statistics with the highest number of lost packets first. Optional. Displays active call statistics with the lowest listening quality (LQ) MOS first. Optional. Displays active call statistics with the highest number of out-of-order packets first. Optional. Displays active call statistics with the lowest perceived quality (PQ) MOS first.
60000CRG0-35B
564
Enable Mode Command Set Optional. Displays active call statistics based on a substring of the URI/extension from which the RTP stream is sourced. Optional. Displays active call statistics based on a substring of the To uniform resource identifier (URI) or extension to which this RTP stream is destined.
Default Values
By default, only the most commonly used statistics are shown.
Functional Notes
These statistics will not be available if VQM is disabled.
Command History
Release 17.1 Command was introduced.
Usage Examples
In the following example, VQM active call statistics are sorted by lost packets: #show ip rtp quality-monitoring active-calls sort-by loss Displaying 30 estimated stream statistics from 15 completed calls RTP stream: 3.3.3.3 : 50000, ppp 1 -> 1.1.1.1 : 3000, vlan 1 To: 5551234@voip.com Call-start (duration): 11 Apr 2010 20:58:39 (93 s) MOS LQ: 3.800 MOS PQ: 3.800 Loss: 413 pkts Out-of-order: 30 pkts Jitter (max): 20 ms CODEC: g711 RTP stream: 1.1.1.1 : 3000, vlan 1 -> 3.3.3.3: 50000, ppp 1 To: 5551234@voip.com From: 5551235@voip.com Call-start (duration): 11 Apr 2010 20:58:39 (93 s) MOS LQ: 3.800 MOS PQ: 3.800 Loss: 0 pkts Out-of-order: 0 pkts Jitter (max): 1 ms CODEC: g711 --MORE--
60000CRG0-35B
565
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
call-id <string> degradation detail from-uri <string> sort-by jitter sort-by loss sort-by lq-mos sort-by out-of-order Optional. Displays past call statistics based on a substring of the Call-ID. Optional. Displays possible sources of voice quality degradation for past calls. Optional. Displays details of all available past call statistics. Optional. Displays past call statistics based on a substring of the From URI. Optional. Displays past call statistics with the highest amount of jitter first. Optional. Displays past call statistics with the highest number of lost packets first. Optional. Displays past call statistics with the lowest listening quality (LQ) MOS first. Optional. Displays past call statistics with the highest number of out-of-order packets first.
60000CRG0-35B
566
Enable Mode Command Set Optional. Displays past call statistics with the lowest perceived quality (PQ) MOS first. Optional. Displays past call statistics based on a substring of the URI/extension from which the RTP stream is sourced. Optional. Displays past call statistics based on a substring of the To uniform resource identifier (URI) or extension to which this RTP stream is destined.
Default Values
By default, only the most commonly used statistics are shown.
Functional Notes
These statistics will still be available even if VQM is disabled.
Command History
Release 17.1 Command was introduced.
Usage Examples
In the following example, VQM past call statistics are sorted by lost packets: #show ip rtp quality-monitoring call-history sort-by loss Displaying 30 estimated stream statistics from 15 completed calls RTP stream: 3.3.3.3 : 50000, ppp 1 -> 1.1.1.1 : 3000, vlan 1 To: 5551234@voip.com Call-start (duration): 11 Apr 2010 20:58:39 (93 s) MOS LQ: 3.800 MOS PQ: 3.800 Loss: 413 pkts Out-of-order: 30 pkts CODEC: g711 RTP stream: 1.1.1.1 : 3000, vlan 1 -> 3.3.3.3: 50000, ppp 1 To: 5551234@voip.com From: 5551235@voip.com Call-start (duration): 11 Apr 2010 20:58:39 (93 s) MOS LQ: 3.800 MOS PQ: 3.800 Loss: 0 pkts Out-of-order: 0 pkts CODEC: g711 --MORE--
60000CRG0-35B
567
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
sort-by jitter sort-by loss sort-by lq-mos sort-by out-of-order sort-by pq-mos summary Optional. Displays voice endpoint statistics with the highest amount of jitter first. Optional. Displays voice endpoint statistics with the highest number of lost packets first. Optional. Displays voice endpoint statistics with the lowest listening quality (LQ) MOS first. Optional. Displays voice endpoint statistics with the highest number of out-of-order packets first. Optional. Displays voice endpoint statistics with the lowest perceived quality (PQ) MOS first. Optional. Displays a summary of all voice endpoint VQM statistics.
Default Values
By default, only the most commonly used statistics are shown.
Functional Notes
These statistics will still be available even if VQM is disabled.
60000CRG0-35B
568
Command History
Release 17.1 Command was introduced.
Usage Examples
In the following example, VQM endpoint statistics are summarized: #show ip rtp quality-monitoring endpoints summary Displaying 2 estimated endpoint statistics from 50 completed calls RTP source: 3.3.3.3, ppp 1 Quality Completed Calls MOS range -------------------------------------------------Excellent 0 4.40 - 4.00 Good 0 3.99 - 3.60 Fair 24 3.59 - 2.60 Poor 3 2.59 - 0.00 -------------------------------------------------Totals: 27 (of the last 100 recorded calls) RTP source: 5.5.5.5, ppp 1
60000CRG0-35B
569
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
detail interface <interface> Optional. Displays details of all available VQM interface statistics. Optional. Displays VQM statistics for a specific interface. Specify the interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; and for an ATM subinterface, use atm 1.1. Optional. Displays VQM interface statistics with the highest amount of jitter first. Optional. Displays VQM interface statistics with the highest number of lost packets first. Optional. Displays VQM interface statistics with the lowest listening quality (LQ) MOS first.
60000CRG0-35B
570
Enable Mode Command Set Optional. Displays VQM interface statistics with the highest number of out-of-order packets first. Optional. Displays VQM interface statistics with the lowest perceived quality (PQ) MOS first. Optional. Displays a summary of VQM interface statistics.
Default Values
By default, only the most commonly used statistics are shown.
Functional Notes
These statistics will still be available even if VQM is disabled.
Command History
Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
In the following example, a summary of all VQM interface statistics is shown: #show ip rtp quality-monitoring interface summary ppp 1 Quality Completed Calls MOS range -------------------------------------------------Excellent 0 4.40 - 4.00 Good 2 3.99 - 3.60 Fair 34 3.59 - 2.60 Poor 3 2.59 - 0.00 -------------------------------------------------Totals: 37 (of the last 100 recorded calls) vlan 1 Quality ----------Excellent Good Fair Poor ----------Totals:
Completed Calls MOS range ---------------------------------------36 4.40 - 4.00 1 3.99 - 3.60 0 3.59 - 2.60 0 2.59 - 0.00 ---------------------------------------37 (of the last 100 recorded calls)
60000CRG0-35B
571
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
<name> realtime Optional. Specifies that only the statistics for the named VQM reporter are displayed. Optional. Specifies that output is displayed in real time.
Default Values
No default values are necessary for this command.
Command History
Release 17.6 Command was introduced.
Functional Notes Output of the show ip rtp quality-monitoring reporter command displays the reporter name (Name), the queue volume or how many reports are waiting to send requests or receive responses (Depth), how many successful responses have been received (Success), how many failure responses have been received (Failed), how many requests have been transmitted (Request), how many challenge responses have been received (Chalnge), how many requests did not receive responses at all (Rollovr), and how many reports were discarded because the retry limit was exceeded (Discard).
60000CRG0-35B
572
Usage Examples
The following is sample output from this command showing VQM reporter statistics for all configured VQM reporters: >enable #show ip rtp quality-monitoring reporter
Name Depth Success Failed Request Chalnge Rollovr Discard ----------------------------------------------------------------------------------------------------------------Test 1 4 0 0 36 0 36 6 Test 2 4 0 0 36 0 36 6 Test 3 0 0 10 10 0 0 0 Test 4 0 0 10 10 0 0 0 Test 5 0 0 0 0 0 0 0
60000CRG0-35B
573
show ip security
Use the show ip security command to display a list of threats with descriptions, corresponding IDs, default weights, and current weights. Variations of this command include:
show ip security any-vrf blocked-traffic timeline show ip security any-vrf threats show ip security any-vrf threats <id> show ip security any-vrf threats <id> realtime show ip security any-vrf threats realtime show ip security any-vrf threats sort-by first-observed show ip security any-vrf threats sort-by first-observed realtime show ip security any-vrf threats sort-by hits show ip security any-vrf threats sort-by hits realtime show ip security any-vrf threats sort-by id show ip security any-vrf threats sort-by id realtime show ip security any-vrf threats sort-by last-observed show ip security any-vrf threats sort-by last-observed realtime show ip security any-vrf threats sort-by weight show ip security any-vrf threats sort-by weight realtime show ip security blocked-traffic timeline show ip security threats show ip security threats <id> show ip security threats <id> realtime show ip security threats realtime show ip security threats sort-by first-observed show ip security threats sort-by first-observed realtime show ip security threats sort-by hits show ip security threats sort-by hits realtime show ip security threats sort-by id show ip security threats sort-by id realtime show ip security threats sort-by last-observed show ip security threats sort-by last-observed realtime show ip security threats sort-by weight show ip security threats sort-by weight realtime show ip security vrf <name> blocked-traffic timeline show ip security vrf <name> threats show ip security vrf <name> threats <id> show ip security vrf <name> threats <id> realtime show ip security vrf <name> threats realtime show ip security vrf <name> threats sort-by first-observed show ip security vrf <name> threats sort-by first-observed realtime show ip security vrf <name> threats sort-by hits show ip security vrf <name> threats sort-by hits realtime show ip security vrf <name> threats sort-by id show ip security vrf <name> threats sort-by id realtime
60000CRG0-35B
574
Command Reference Guide show ip security vrf <name> threats sort-by last-observed show ip security vrf <name> threats sort-by last-observed realtime show ip security vrf <name> threats sort-by weight show ip security vrf <name> threats sort-by weight realtime
Syntax Description
any-vrf blocked-traffic timeline first-observed hits id <id> last-observed <name> realtime sort-by <option> Optional. Displays every available VPN routing and forwarding (VRF) on the device. Optional. Displays an hour-by-hour count of blocked threats and policy discards. Optional. Sorts the threat list by the first-observed threat. Optional. Sorts the threat list by number of hits. Optional. Sorts the threat list by threat ID. Optional. Displays a specific threat as identified by its threat ID. Optional. Sorts the threat list by the last-observed threat. Optional. Displays a specified named VRF. Optional. Lists the threats as they occur in real time rather than historical threat data. Optional. Defines the criteria, by <option>, by which the threat list will be sorted. If sort-by is not indicated, the list will be sorted using the descending order of hits. All options will be sorted in descending order with the exception of threat IDs. Optional. Displays all observed security threats. Optional. Sorts the threat list by threat weight.
threats weight
Default Values
No default values are necessary for this command.
Command History
Release 17.5 Command was introduced.
Functional Notes
The show ip security command displays a list of threats with descriptions, corresponding IDs, default weights, and current weights. For threats that have been observed the number of hits, the time it was first observed, and the time it was most recently observed is displayed. Threat lists are sorted by hits unless another option is chosen by the user. All sorting options are displayed in descending order except for threat IDs. A single ID can be specified to display only that threats information. The unnamed default VRF is implied unless a named VRF or any-vrf is specified. Historical data is displayed unless realtime is specified. Threats that have been blocked on the default unnamed VRF or any-vrf can also be viewed using blocked-traffic timeline.
60000CRG0-35B
575
Usage Examples
The following example displays a list of all threats on the default unnamed VRF sorted by threat weight: >enable #show ip security threats sort-by weight The following example displays an hour-by-hour count of all blocked threats on the named VRF MyVRF: >enable #show ip security vrf MyVRF blocked-traffic timeline
60000CRG0-35B
576
show ip traffic
Use the show ip traffic command to display all Internet Protocol version 4 (IPv4) traffic statistics. Variations of this command include:
show ip traffic show ip traffic netstat show ip traffic realtime
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
netstat realtime Optional. Displays active IPv4 Transmission Control Protocol (TCP) connections. Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 10.1 Release 17.1 Release 17.5 Command was introduced. The realtime display parameter was introduced. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the netstat keyword.
60000CRG0-35B
577
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
Usage Examples
The following example displays all IPv4 traffic statistics: >enable #show ip traffic IP statistics: Routing discards: 0 Rcvd: 15873 total, 7617 delivered 0 header errors, 0 address errors 0 unknown protocol, 0 discards 0 checksum errors, 0 bad hop counts Sent: 8281 generated, 4459 forwarded 0 no routes, 0 discards Frags: 0 reassemble required, 0 reassembled, 0 couldn't reassemble 0 created, 0 fragmented, 0 couldn't fragment UDP statistics: Rcvd: 3822 total, 0 checksum errors, 0 no port Sent: 3822 total TCP statistics: Retrans Timeout Algorithm: 0 Min retrans timeout (ms): 0 Max retrans timeout (ms): 0 Max TCP Connections: 0 0 active opens, 64 passive opens, 0 failed attempts 5 establish resets, 1 establish current 3795 segments received, 4459 segments sent, 26 segments retransmitted
60000CRG0-35B
578
show ip urlfilter
Use the show ip urlfilter command to display configured uniform resource locator (URL) filter and server information. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example shows sample output from the show ip urlfilter command: >enable #show ip urlfilter Configured for Websense URL filtering. Filters ------Name: filter1 Ports: HTTP(80) Interfaces that filter is applied to: eth 0/2 inbound Servers ------IP address: 10.100.23.116 Port: 15868 Timeout: 5 Excluded domains ---------------Permit www.adtran.com Other Settings
60000CRG0-35B
579
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example shows sample output from the show ip urlfilter exclusive-domain command: >enable #show ip urlfilter exclusive-domain Excluded domains ---------------Permit www.adtran.com
60000CRG0-35B
580
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example shows sample output from the show ip urlfilter statistics command: >enable #show ip urlfilter statistics Current outstanding requests to filter server: 0 Current response packets buffered from web server: 2 Max outstanding requests to filter server: 3 Max response packets buffered from web server: 5 Total requests sent to filter server: 400 Total responses received from filter server: 400 Total requests allowed: 398 Total requests blocked: 2
60000CRG0-35B
581
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
all daily hourly <number> Optional. Specifies that top websites statistics for all lists will be displayed. Optional. Specifies that top websites statistics in daily increments will be displayed. Optional. Specifies that top websites statistics in hourly increments will be displayed. Optional. Specifies how many websites to show on the report. Range is 5 to 20 websites.
Default Values
By default, a 15-minute incremented list of the 10 top websites requests is shown.
Command History
Release 16.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
The top websites statistic lists show the previous interval, not the current one. The output shows the period for which the statistics were collected, as well as the current time so it can be determined when the next update will occur.
60000CRG0-35B
582
Usage Examples
The following example displays the top 5 websites visited in the last 15 minutes: #show ip urlfilter top-websites 5 Top Websites Visited Period: Apr 26 08:55:00--Apr 26 09:10:00 Current Time: 09:15:34 Allow mode: enabled The visits listed below are visits which were permitted. These statistics do not include websites explicitly filtered using exclusive domains. Domain Name www.gmail.com www.google.com www.adtran.com www.cisco.com www.partypoker.com Visits 767 540 67 67 15 Last Visitor 10.22.160.7 10.22.160.88 10.22.160.107 10.22.160.5 10.22.160.45 Visit Time Apr 26 08:55:47 Apr 26 09:05:27 Apr 26 08:59:16 Apr 26 09:01:05 Apr 26 09:04:43
60000CRG0-35B
583
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<ipv6 acl name> Optional. Specifies a particular IPv6 ACL to display.
Default Values
No default values are necessary for this command.
Command History
Release 18.1 Command was introduced.
Functional Notes
The show ipv6 access-list command displays all configured IPv6 ACLs in the system. All entries in the IPv6 ACL are displayed, and a counter indicating the number of packets matching the entry is listed.
Usage Examples
The following is sample output from the show ipv6 access-list command, and displays information for the IPv6 ACL Privatev6: >enable #show ipv6 access-list Privatev6 Extended IPv6 access-list Privatev6 deny tcp any eq telnet any (0 matches) deny tcp any any eq telnet (0 matches) permit ipv6 any host 2000:1::1 (0 matches) permit ipv6 host 2000:2::1 any (0 matches) permit icmpv6 any any (0 matches)
60000CRG0-35B
584
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
brief <interface> Optional. Displays an abbreviated version of interface statistics for all IPv6 interfaces. Optional. Displays status information for a specific IPv6 interface. Specify an IPv6 interface in the format <interface> <slot/port | interface id>. For example, Point-to-Point Protocol (PPP) interface, enter ppp 1. If no interface is specified, status information for all IPv6 interfaces is displayed. Optional. Displays the list of prefixes for the specified IPv6 interface.
prefix
Default Values
No default values are necessary for this command.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following is sample output of the show ipv6 interfaces command, and displays information in brief format for the ethernet 0/1 interface: >enable #show ipv6 interfaces brief ethernet 0/1 eth 0/1 [UP/UP] FE80::2AO:C8FF:FE61:3082 2003::2AO:C8FF:FE61:3082
60000CRG0-35B
585
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<interface> Optional. Displays the neighbor cache information for a specified interface. IPv6 interfaces are specified in the <interface> <slot/port | interface id> format. For example, to specify a Point-to-Point Protocol (PPP) interface, enter ppp 1. If no interface is specified, information for all interfaces is displayed. Optional. Displays the neighbor cache information for a specified IPv6 address. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. Optional. Displays neighbor cache statistics and protocol interaction information for the neighbor cache. Optional. Displays the neighbor cache information for a specified VPN routing and forwarding (VRF) instance. If no VRF is specified, information for the unnamed default VRF is displayed.
<ipv6 address>
Default Values
No default values are necessary for this command.
60000CRG0-35B
586
Command History
Release 18.1 Command was introduced.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following is sample output of the show ipv6 neighbors command, which displays all information for the ND cache: >enable #show ipv6 neighbors IPv6 Address Age 2002::1 0 2003::ED9A:D1A3:BB9B:BDFF 0 20FF:11::ED9A:D1A3:BB9B:BDFF 18 FE80::213:CEFF:FE61:65B9 10 FE80::20F:35FF:FE2E:2ABA 1
Interface eth 0/0 eth 0/1 eth 0/1 eth 0/1 eth 0/1
60000CRG0-35B
587
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<ipv6 acp name> any-vrf vrf <name> Optional. Displays IPv6 policy class associations for the specified IPv6 ACP. Optional. Displays information for all VPN routing and forwardings (VRFs) policy sessions. Optional. Specifies the particular firewall instance for which active policy sessions will be displayed. If no VRF is specified, policy sessions are displayed for the default VRF only.
Default Values
No default values are necessary for this command.
Command History
Release 18.1 Command was introduced.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
60000CRG0-35B
588
Usage Examples
The following is sample output from the show ipv6 policy-sessions command and displays information for IPv6 ACPs: >enable #show ipv6 policy-sessions NOTE: The Layer 4 info below for TCP and UDP is source port and dest port. For ICMPv6, it is ID and type/code. For all other protocols, it is unused. Src VRF (if not default), Src policy-class: Protocol (TTL) -> Dest VRF, Dest policy-class Src IPv6 Address Layer 4 Dest IPv6 Address Layer 4 --------------------------------Ipv6 policy-class PRIVATEV6: icmpv6 (59) -> self 2001:DB8:1:1::2 2001:DB8:1:1::1
0 128/0
60000CRG0-35B
589
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<ipv6 acp name> Optional. Displays policy class statistics for a specific IPv6 ACP.
Default Values
No default values are necessary for this command.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example displays a list of current IPv6 ACP statistics: >enable #show ipv6 policy-stats
60000CRG0-35B
590
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit. Syntax Description
<ipv6 address> Optional. Specifies a valid IPv6 address. IPv6 addresses should be expressed in colon hexadecimal notation (X:X:X:X::X). For example, 2001:DB8:1::1. Specifies the IPv6 prefix. IPv6 prefixes should be expressed in colon hexadecimal format (X:X::X/<Z>). For example, 2001:DB8:3F::/64. The prefix length (<Z>) is an integer with a value between 0 and 128.
<ipv6-prefix/prefix-length>
60000CRG0-35B
591
Command Reference Guide connected longer-prefixes static summary summary realtime verbose vrf <name>
Enable Mode Command Set Optional. Displays only the IPv6 routes for directly connected networks. Optional. Displays only the IPv6 routes matching the specified network. Optional. Displays only the IPv6 routes that were statically entered. Optional. Displays a summary of all IPv6 route information. Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information. Optional. Enables detailed messaging. Optional. Displays only the IPv6 routes for the specified VPN routing and forwarding (VRF).
Default Values
No default values are necessary for this command.
Command History
Release 18.1 Command was introduced.
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781). VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example shows how to display IPv6 routes table information for the IPv6 address prefix 2001::/64: >enable #show ipv6 route 2001::/64 Routing entry for 2001::/64 Known via static Distance 1, metric 0 Routing Next Hop(s): 2002::1, via eth 0/1 Route metric is 0
60000CRG0-35B
592
The following example shows output for the show ipv6 route summary command. >enable #show ipv6 route summary Route Source FIB Connected 3 Other 18 Total 21
Local-RIB 3 18 21
60000CRG0-35B
593
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
conflict <interface> Optional. Specifies that only information about routers whose advertisements are in conflict with current configurations are displayed. Optional. Displays information for the specified interface. Specify interfaces in the <interface> <slot/port | interface id> format. For example, to specify a Point-to-Point Protocol (PPP) interface, enter ppp 1. Optional. Displays only the IPv6 routes for the specified VPN routing and forwarding (VRF) instance. If no VRF is specified, information for the default VRF is displayed.
vrf <name>
Default Values
No default values are necessary for this command.
Command History
Release 18.1 Command was introduced.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
60000CRG0-35B
594
Usage Examples
In the following example, RA statistics for all interfaces on the default VRF are displayed: >enable #show ipv6 routers Router FE80::20F:35FF:FE2E:2ABA on Ethernet 0/0, last update 1 min, CONFLICT Hops 64, Lifetime 1800 sec, AddrFlag=0, OtherFlag=0, MTU=1500 Preference=Medium Reachable time 0 (unspecified) ms, Retransmit time 0 (unspecified) ms Prefix 2002::/64 on-link autoconfig Valid lifetime 8002, preferred lifetime 2008
60000CRG0-35B
595
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
realtime Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 18.1 Command was introduced.
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
60000CRG0-35B
596
Usage Examples
The following example displays all IPv6 traffic statistics: >enable #show ipv6 traffic IPv6 statistics: Rcvd: 0 total, 9 local destination 0 header errors, 0 address errors 0 unknown protocol, 0 discards 0 truncated, 0 bad hop counts Sent: 0 locally generated, 59 forwarded 0 no route, 0 discards Frag: 0 reassemble required, 0 reassembled, 0 couldnt reassemble 0 created, 0 fragmented, 0 couldnt fragment
60000CRG0-35B
597
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays information for ISDN group 5: >enable #show isdn-group 5
60000CRG0-35B
598
show isdn-number-template
Use the show isdn-number-template command to display integrated services digital network (ISDN) number templates. Variations of this command include:
show isdn-number-template show isdn-number-template <value>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<value> Optional. Displays information about a specific number template. Valid range is 1 to 255.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays information for ISDN number template 0: >enable #show isdn-number-template 0 Type ID Prefix Pattern Subscriber 0 911 #
60000CRG0-35B
599
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
realtime Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
60000CRG0-35B
600
Usage Examples
The following example displays ISDN resource information: >enable #show isdn resource -------------------------------------------------------------------------------------------------------------------------------------------Interface: Channel Trunk: Appearance Slot/Prt: Call ChannelId State:GID Appearance State B-Channel State -------------------------------------------------------------------------------------------------------------------------------------------pri 1:0 Reserved:1 T01:2 TAS_Connect 1/1:21 OutgoingConnect pri 1:1 Reserved:1 T01:0 TAS_Alerting 1/1:23 IncomingAlertingSent pri 1:2 Available --------pri 1:3 Available --------pri 1:4 Available --------pri 1:5 Available --------pri 1:6 Available --------pri 1:7 Available --------pri 1:8 Available --------pri 1:9 Available --------pri 1:10 Available --------pri 1:11 Available --------pri 1:12 Available --------pri 1:13 Available --------pri 1:14 Available --------pri 1:15 Available --------pri 1:16 Available --------pri 1:17 Available --------pri 1:18 Available --------pri 1:19 Available --------pri 1:20 Available --------pri 1:21 Available --------pri 1:22 Available ---------
60000CRG0-35B
601
show lldp
Use the show lldp command to display the Link Layer Discovery Protocol (LLDP) transmit interval and transmitted time to live (TTL). The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
The TTL is calculated by multiplying the transmit interval by the TTL multiplier. For more information, refer to the command lldp on page 1126.
Usage Examples
The following example shows a sample LLDP timer configuration: >enable #show lldp Global LLDP information: Sending LLDP packets every 30 seconds Sending TTL of 120 seconds
60000CRG0-35B
602
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
If there is more than one neighbor with the same system name, all neighbors with that system name will be displayed.
Usage Examples
The following example shows specific information about a neighbor for the system name Router: >enable #show lldp device Router Chassis ID: 00:A0:C8:02:DD:2A (MAC Address) System Name: Router Device Port: eth 0/1 (Locally Assigned) Holdtime: 30 Platform: NetVanta 3305 Software: Version: 08.00.22.sw1.D, Date: Mon Nov 01 10:28:55 2004 Capabilities: Bridge, Router Enabled Capabilities: Router Local Port: eth 0/3 Management Addresses: Address Type: IP version 4, Address: 10.23.10.10
60000CRG0-35B
603
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<interface> Optional. Displays the information for the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show lldp interface ? for a complete list of applicable interfaces.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following example shows LLDP statistics for the Ethernet 0/1 interface: >enable #show lldp interface ethernet 0/1 eth 0/1 (TX/RX) 0 packets input 0 input errors 0 TLV errors, 0 TLVs Discarded 0 packets discarded
60000CRG0-35B
604
60000CRG0-35B
605
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
detail interface <interface> Optional. Shows detailed neighbor information for all LLDP neighbors or neighbors connected to the specified interface or interface type. Optional. Displays a summary of all neighbors learned about through the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show lldp neighbors interface ? for a complete list of applicable interfaces. Optional. Displays neighbors that are capable of supporting LLDP-Media Endpoint Discovery (LLDP-MED). Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
med realtime
Default Values
No default values are necessary for this command.
60000CRG0-35B
606
Command History
Release 8.1 Release 10.1 Release 17.1 Release 17.2 Release A4.01 Command was introduced. The realtime display parameter was introduced. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the med parameter. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
Usage Examples
The following example shows detailed information about a devices neighbors: >enable #show lldp neighbors interface eth 0/3 detail Chassis ID: 00:A0:C8:02:DD:2A (MAC Address) System Name: Router Device Port: eth 0/1 (Locally Assigned) Holdtime: 38 Platform: NetVanta 3305 Software: Version: 08.00.22.sw1.D, Date: Mon Nov 01 10:28:55 2004 Capabilities: Bridge, Router Enabled Capabilities: Router Local Port: eth 0/3 Management Addresses: Address Type: IP version 4, Address: 10.23.10.10 Interface Type: Interface Index, Interface Id: 2 The following example shows LLDP-MED capable neighbors connected to a device: .>enable #show lldp neighbors med Capability Codes: R - Router, B - Bridge, H - Host, D - DOCSIS Device, W - WLAN Access Point, r - Repeater, T - Telephone System Name ---------------------------------URL 5000@10.22.41 Port ID TTL --------------------------- --------08:00:0F:2C:AB 96 Cap. Platform ----------- -------------------B--T-Local Int ----------------swx 0/2
60000CRG0-35B
607
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
This command shows information about the changes in this devices neighbor table. The information displayed indicates the last time a neighbor was added to or removed from the table, as well as the number of times neighbors were inserted into or deleted from the table. System Last Change Time Inserts Deletes Drops Age Outs Shows the time at which the most recent change occurred in the neighbor table. Shows the number of times neighbors have been added to the table. Shows how many times neighbors have been deleted from the table because an interface was shut down. Shows how many times the insertion of a new neighbor into the table failed because the table was full. Shows how many times neighbors have been removed from the table because no new updates were received from that neighbor before its time to live (TTL) timer expired.
60000CRG0-35B
608
Usage Examples
The following example shows sample output for this command: >enable #show lldp neighbors statistics System Last Change Time Inserts 10-15-2004 14:24:56 55
Deletes 3
Drops 1
Age Outs 1
60000CRG0-35B
609
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output from the show mac address-table command: >enable #show mac address-table Mac Address Table -----------------------------------------Vlan Mac Address 1 aa:bb:ee:d1:c2:33 1 00:00:00:00:00:00 2 00:90:2b:7d:30:00 2 00:a0:c8:00:8e:a6 2 00:a0:c8:00:8f:ba 2 00:a0:c8:00:8f:73 2 00:a0:c8:00:00:00 2 00:a0:c8:01:ff:02 2 00:a0:c8:01:09:d3 2 00:a0:c8:01:13:34 2 00:a0:c8:01:14:4a 2 00:a0:c8:03:95:4b 2 00:a0:c8:05:00:89
Type STATIC STATIC DYNAMIC DYNAMIC DYNAMIC DYNAMIC DYNAMIC DYNAMIC DYNAMIC DYNAMIC DYNAMIC DYNAMIC DYNAMIC
Ports eth 0/18 CPU eth 0/1 eth 0/1 eth 0/1 eth 0/1 eth 0/1 eth 0/1 eth 0/1 eth 0/1 eth 0/1 eth 0/1 eth 0/1
60000CRG0-35B
610
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<mac address> interface <interface> Specifies a valid 48-bit MAC address. MAC addresses should be expressed in the following format: xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01). Optional. Shows information for a specific interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show mac address-table address interface ? for a list of valid interfaces. Optional. Specifies a valid virtual local area network (VLAN) interface ID. Range is 1 to 4094.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
611
Usage Examples
The following sample from the show mac address-table address command displays information regarding a specific MAC address from the MAC address table: >enable #show mac address-table address 00:a0:c8:7d:30:00 Mac Address Table -----------------------------------------Vlan Mac Address Type Ports -------- -------------------------------------2 00:a0:c8:7d:30:00 DYNAMIC eth 0/1 The following sample from the show mac address-table address command displays information regarding a specific MAC address and interface from the MAC address table: >enable #show mac address-table address 00:a0:c8:7d:30:00 ethernet 0/1 Mac Address Table -----------------------------------------Vlan Mac Address Type Ports -------- -------------------------------------2 00:a0:c8:7d:30:00 DYNAMIC eth 0/1 Total Mac Addresses for this criterion: 1 #
60000CRG0-35B
612
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is a sample from the show mac address-table aging-time command for a switch configured with an address-table aging-time: >enable #show mac address-table aging-time Aging Time ---------------300 Seconds
60000CRG0-35B
613
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is a sample from the show mac address-table count command: >enable #show mac address-table count Mac Table Entries: -------------------------Dynamic Address Count: 19 Static Address Count: 3 Total Mac Addresses: 23 Total Mac Address Space Available: 8169
60000CRG0-35B
614
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
address <mac address> Optional. Specifies a valid 48-bit MAC address. MAC addresses should be expressed in the following format xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01). Optional. Shows information for a specific interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show mac address-table dynamic interface ? for a list of valid interfaces. Optional. Specifies a valid virtual local area network (VLAN) interface ID. Range is 1 to 4094.
interface <interface>
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
615
Usage Examples
The following is a sample from the show mac address-table dynamic command: >enable #show mac address-table dynamic Mac Address Table ---------------------------Vlan Mac Address Type ------- --------------------------1 00:a0:c8:7d:30:00 DYNAMIC 1 00:a0:c8:05:89:09 DYNAMIC 1 00:a0:c8:07:d9:d2 DYNAMIC 1 00:a0:c8:07:d9:19 DYNAMIC 1 00:a0:c8:09:95:6b DYNAMIC 1 00:a0:c8:0a:2d:7c DYNAMIC 1 00:a0:c8:f6:e9:a6 DYNAMIC 1 00:a0:c8:01:0a:ef DYNAMIC 1 00:a0:c8:0c:74:80 DYNAMIC 1 00:a0:c8:15:5a:9f DYNAMIC 1 00:a0:c8:6c:71:49 DYNAMIC 1 00:a0:c8:77:78:c1 DYNAMIC 1 00:a0:c8:6b:53:7b DYNAMIC 1 00:a0:c8:72:e6:d6 DYNAMIC 1 00:a0:c8:05:00:e6 DYNAMIC Total Mac Addresses for this criterion: 15
Ports -------eth 0/1 eth 0/2 eth 0/5 eth 0/7 eth 0/7 eth 0/12 eth 0/24 eth 0/23 eth 0/20 eth 0/7 eth 0/2 eth 0/3 eth 0/4 giga-eth 0/2 giga-eth 0/1
60000CRG0-35B
616
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<interface> Shows information for a specific interface type. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show mac address-table interface ? for a list of valid interfaces. Optional. Shows address-table information related to a specific virtual local area network (VLAN). Valid range is 1 to 4094.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
617
Usage Examples
The following is an example of the show mac address-table interface eth 0/1 command displaying MAC address-table entries specifically on Ethernet 0/1: >enable #show mac address-table interface ethernet 0/1 Mac Address Table Vlan Mac Address Type Ports 2 00:90:2b:7d:30:00 DYNAMIC eth 0/1 2 00:a0:c8:05:00:ac DYNAMIC eth 0/1 2 00:a0:c8:05:00:ad DYNAMIC eth 0/1 2 00:a0:c8:05:00:c2 DYNAMIC eth 0/1 2 00:a0:c8:05:01:6e DYNAMIC eth 0/1 2 00:a0:c8:09:95:6b DYNAMIC eth 0/1 2 00:a0:c8:0a:2d:7c DYNAMIC eth 0/1 Total Mac Addresses for this criterion: 7
60000CRG0-35B
618
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
count igmp-snooping user vlan <vlan id> Optional. Displays the multicast address count. Optional. Displays MAC addresses learned via Internet Group Management Protocol (IGMP) snooping. Optional. Displays static MAC addresses entered by the user. Optional. Displays address table information related to a specific virtual local area network (VLAN). Valid range is 1 to 4094.
Default Values
No default values are necessary for this command.
Command History
Release 14.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
619
Usage Examples
The following is sample output from the show mac address-table multicast command: >enable #show mac address-table multicast Multicast Mac Address Table -----------------------------------------Vlan Mac Address Type Ports -------------------------------------1 01:00:5e:00:01:01 igmp swx 0/10 1 01:00:5e:7f:ff:fa igmp swx 0/24 Total Mac Addresses for this criterion: 2
60000CRG0-35B
620
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
address <mac address> Optional. Specifies a valid 48-bit MAC address. MAC addresses should be expressed in the following format xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01). Optional. Shows information for a specific interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show mac address-table static interface ? for a list of valid interfaces. Optional. Shows address-table information related to a specific virtual local area network (VLAN). Valid range is 1 to 4094.
interface <interface>
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
621
Usage Examples
The following is a sample from the show mac address-table static command: >enable #show mac address-table static Mac Address Table Vlan Mac Address Type ------------------------------1 00:a0:c8:00:88:40 STATIC Total Mac Addresses for this criterion: 1
Ports -------CPU
60000CRG0-35B
622
show mail-client
Use the show mail-client command to display statistical summary information for mail agents. Variations of this command include:
show mail-client show mail-client <agent name>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<agent name> Optional. Specifies only statistics for the named mail agent are displayed.
Default Values
No default values are necessary for this command.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example displays statistical information for mail agent myagent: >enable #show mail-client myagent Mail-client myagent is ENABLED Capture output when track mail becomes PASS Send message when track T becomes PASS Send TO: joesmith@company.com 6 output captures triggered 18 commands captured 6 command errors 2 unrecognized commands 4 truncated commands 5 emails sent Last email sent on 2/29/2008 at 16:20:10 PM
60000CRG0-35B
623
Default Values
No default values are necessary for this command.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example displays the email body buffer content for myagent mail agent: >enable #show mail-client body myagent
60000CRG0-35B
624
show media-gateway
Use the show media-gateway command to show cumulative totals for all Realtime Transport Protocol (RTP) channels. Variations of this command include:
show media-gateway show media-gateway channel show media-gateway channel <slot/dsp.channel> show media-gateway info show media-gateway session show media-gateway session <slot/dsp.channel> show media-gateway summary show media-gateway summary active
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<slot/dsp.channel> channel info session summary active Optional. Specifies the ID of the media-gateway channel to be displayed. Optional. Shows cumulative totals for individual RTP channels. Optional. Shows media-gateway information. Optional. Shows current RTP sessions. Optional. Shows summary of last active and current RTP sessions. Optional. Shows summary of currently active RTP sessions.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
625
Usage Examples
The following example shows sample output from the show media-gateway command: >enable #show media-gateway Media-Gateway 1 slots, 1 DSPs, 24 channels 0 total sessions, 0 active sessions, 00:00:00 total session duration 0 total rx packets, 0 total rx bytes 0 total lost packets, 0 total unknown packets 0 total tx packets, 0 total tx bytes 0 highest max depth 0 total discards, 0 total overflows, 0 total underflows 0 total out-of-orders Last clearing of counters: 9:46 PM Thu, Jan 1, 1970 #
60000CRG0-35B
626
show mef
Use the show mef command to display Metro Ethernet Forum (MEF) Ethernet component configuration and state information. Variations of this command include:
show mef show mef connections show mef connections discard show mef connections evc <name> show mef connections evc-map <name> show mef connections men-port efm-group <group id> show mef connections policer <name> show mef connections uni mef-ethernet <name> show mef evc-map show mef evc-map <name> show mef evc show mef evc <name> show mef policer show mef policer <name>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
connections discard evc <name> evc-map <name> Optional. Displays information on all MEF Ethernet connections. Optional. Displays discard connections. Optional. Displays connection information on the specified Ethernet virtual connection (EVC). Optional. Displays connection information on the specified EVC map. men-port efm-group <group id> Optional. Displays connection information for the specified Metro Ethernet network (MEN) Ethernet in the First Mile (EFM) group. policer <name> uni mef-ethernet <name> evc-map Optional. Displays connection information on the specified EVC policer profile. Optional. Displays connection information on the specified user network Metro Ethernet interface. Optional. Displays the MEN priority and MEN queue information for all configured EVC maps.
60000CRG0-35B
627
Command Reference Guide evc-map <name> evc evc <name> policer policer <name>
Enable Mode Command Set Optional. Displays the MEN priority and MEN queue information for the specified EVC map. Optional. Displays status, s-tag, CE VLAN preservation, and connected EVC map information for all configured EVCs. Optional. Displays status, s-tag, CE VLAN preservation, and connected EVC map information for the specified EVC. Optional. Displays configuration information for all EVC policer policies. Optional. Displays configuration information for the specified EVC policer policy.
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example shows sample output from the show mef command: #show mef MEN Configured EVCs for efm-group 1 : 2213 3216 EVC DATA : Admin UP Protocol Connected UP Connected to MEN Port efm-group 1 Connected to EVC Map DATA Tag 3216 Preserve CE VLAN No EVC DEFAULT : Admin UP Protocol Connected UP Connected to MEN Port efm-group 1 Connected to EVC Map DEFAULT Tag 2213 Preserve CE VLAN Yes EVC Map DATA : Admin UP Protocol Connected UP Connected to UNI mef-ethernet 1/1 Connected to EVC DATA MEN Priority Inherit MEN Queue Inherit
60000CRG0-35B
628
Command Reference Guide EVC Map DEFAULT : Admin UP Protocol Connected UP Connected to UNI mef-ethernet 1/1 Connected to EVC DEFAULT MEN Priority Inherit MEN Queue Inherit Connection : EVC Map DATA UNI mef-ethernet 1/1 EVC DATA MEN Port efm-group 1 Connection Status Connected UP Connection : EVC Map DEFAULT UNI mef-ethernet 1/1 EVC DEFAULT MEN Port efm-group 1 Connection Status Connected UP#
60000CRG0-35B
629
show memory
Use the show memory command to display statistics regarding memory, including memory allocation and buffer use statistics. Shows how memory is in use (broken down by memory size) and how much memory is free. Variations of this command include:
show memory heap show memory heap realtime show memory uncached-heap
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
heap realtime uncached-heap Shows how much memory is in use (broken down by memory block size) and how much memory is free. Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information. Shows how much memory has been set aside to be used without memory caching, how much memory is being used, and how much memory is free.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 10.1 Release 17.1 Command was introduced. The realtime display parameter was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
630
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
Usage Examples
The following is sample output from the show memory heap command: >enable #show memory heap Memory Heap: HeapFree: 2935792 HeapSize: 8522736 Block Managers: Mgr Size Used 0 0 58 1 16 1263 2 48 1225 3 112 432 4 240 140 5 496 72 6 1008 76 7 2032 25 8 4080 2 9 8176 31 10 16368 8 11 32752 5 12 65520 3 13 131056 0
Free 0 10 2 2 3 2 1 1 1 1 0 1 0 0
60000CRG0-35B
631
show mgcp-endpoint
Use the show mgcp-endpoint command to display configuration statistics for all configured Media Gateway Control Protocol (MGCP) endpoints. Variations of this command include:
show mgcp-endpoint show mgcp-endpoint verbose
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
verbose Optional. Enables detailed messaging.
Default Values
No default values are necessary for this command.
Command History
Release A2 Command was introduced.
Usage Examples
The following is sample output from the show mgcp-endpoint command: #show mgcp-endpoint Endpoint: 1 Name : aaln/1 FXS : 0/1 State : Connected Endpoint: 2 Name : aaln/2 FXS : 0/2 State : Connected Endpoint: 3 Name : aaln/3 FXS : 0/3 State : Connected Endpoint: 4 Name : aaln/4 FXS : 0/4 State : Connected
60000CRG0-35B
632
show modules
The show modules command displays information on the current system setup. Variations of this command include:
show modules show modules verbose
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
verbose Optional. Enables detailed messaging.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays the modules installed in the unit. >enable #show modules Slot Ports 0 3 1 1 2 3 4 5 6 7 -
Type NetVanta 5305 T3 Module Empty Empty Empty Empty Empty Empty
60000CRG0-35B
633
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<number> all Displays information for a single specific monitor session. Displays all sessions.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is a sample from the show monitor session command: >enable #show monitor session 1 Monitor Session 1 ----------------Source Ports: RX Only: None TX Only: None Both: eth 0/2, eth 0/3 Destination Port: eth 0/6
60000CRG0-35B
634
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
hostname <hostname> interface gigabit-switchport <slot/port> ip <ip address> Optional. Displays DHCP information for the client with the specified host name. Optional. Displays DHCP information for the client using the specified interface. Optional. Displays DHCP information for the client at the specified IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Displays DHCP information for the client at the specified medium access control (MAC) address. MAC addresses should be expressed in the following format: xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01).
Default Values
No default values are necessary for this command.
Command History
Release 17.8 Command was introduced.
60000CRG0-35B
635
Usage Examples
The following is sample output from the show network-forensics ip dhcp command: #show network-forensics ip dhcp Client MAC/IP/Host: 00:E0:29:0E:D5:E3 / 10.23.220.1 / xpsp3-host VLAN ID: 100 Source Port: gigabit-switchport 0/2 Server Mac/IP: 00:E0:29:0E:D5:E5 / 10.23.220.254 Lease from Time Collected: 3 days from 25 Aug 2009 10:33:42 Client Vendor Class: unknown
The preceding output is for one client. This same information will be displayed for all connected clients unless one of the filtering parameters is used in conjunction with the show network-forensics ip dhcp command.
60000CRG0-35B
636
Default Values
No default values are necessary for this command.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example executes show ntp associations: >enable #show ntp associations
60000CRG0-35B
637
Default Values
No default values are necessary for this command.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example executes show ntp status: >enable #show ntp status
60000CRG0-35B
638
show output-chkdsk
Use the show output-chkdsk command to display output from the CFLASH checkdisk that occurs at boot up. File allocation table (FAT) errors detected or repaired are shown from the last boot up using this command. If checkdisk passed without incident, the command displays the output File is empty. This command is only applicable to ADTRAN integrated communications products (ICPs). The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 14.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output from the show output-chkdsk command where checkdisk passed: >enable #show output-chkdsk File is empty. The following example provides output from the show output-chkdsk command where errors were detected and repaired. An explanation of the errors found follows the output: >enable #show output-chkdsk ## 'SystemDefaultPrompts' The '.' entry has a non-zero size (repaired). ## 'SystemDefaultPrompts' The '..' entry points to cluster 2 (should be root directory - repaired). ## Cluster 583 chains to 435, but 583 is already used in another chain. ## Terminated subsequent instance of cross-linked chain starting at 205 at cluster 394. ## 'VoiceMail' The '.' first entry was not found. ## 'VoiceMail' Found 2 checksum mismatches (repaired). ## 'VoiceMail/Messages' Found 3 trailing entries (repaired). ## 'VoiceMail' Found 2 duplicate entries (repaired).
60000CRG0-35B
639
Command Reference Guide The following errors are minor and can be ignored.
## '/SystemDefaultPrompts' The '.' entry has a non-zero size (repaired). ## 'SystemDefaultPrompts' The '..' entry points to cluster 2 (should be root directory - repaired). The following errors are more serious, but have been repaired. They indicate that the FAT has been corrupted. In some instances, major files may be lost (if they were corrupt or were contained within a corrupt directory). ## Found 20 orphaned clusters (not free and not used - repaired). ## Cluster 583 chains to 435, but 583 is already used in another chain. ## Terminated subsequent instance of cross-linked chain starting at 205 at cluster 394. The following error results in the removal of the entire directory: ## 'VoiceMail' The '.' first entry was not found. The following errors are minor. They indicate that some corruption has occurred, specifically with the naming units of the files involved. In most cases, these can be repaired without data loss. ## 'VoiceMail' Found 2 checksum mismatches (repaired). ## 'VoiceMail' Found 15 invalid names (repaired). ## 'VoiceMail/Messages' Found 3 trailing entries (repaired). ## 'VoiceMail' Found 2 duplicate entries (repaired).
60000CRG0-35B
640
show output-errors
Use the show output-errors command to display the startup error log. If no errors are encountered during startup, the command displays the output File is empty. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example shows output from the show output-errors command: >enable #show output-errors File is empty.
60000CRG0-35B
641
show output-startup
Use the show output-startup command to display startup configuration output line by line. This output can be copied into a text file and then used as a configuration editing tool. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output from the show output-startup command: >enable #show output-startup ! #! #hostname "UNIT_2" UNIT_2#no enable password UNIT_2#! UNIT_2#ip subnet-zero UNIT_2#ip classless UNIT_2#ip routing UNIT_2#! UNIT_2#event-history on UNIT_2#no logging forwarding UNIT_2#logging forwarding priority-level info UNIT_2#no logging email --MORE--
60000CRG0-35B
642
show port-auth
Use the show port-auth command to view port authentication information. Variations of this command include:
show port-auth show port-auth detailed show port-auth detailed interface <interface> show port-auth interface <interface> show port-auth statistics show port-auth statistics interface <interface> show port-auth summary show port-auth summary interface <interface> show port-auth supplicant show port-auth supplicant interface <interface> show port-auth supplicant summary
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
detailed statistics summary supplicant interface <interface> Optional. Displays detailed port authentication information. Optional. Displays port authentication statistics. Optional. Displays a summary of port authentication settings. Optional. Displays port authentication supplicant information. Optional. Displays port authentication information for the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show port-auth interface ? for a list of valid interfaces.
Default Values
No default values are necessary for this command.
60000CRG0-35B
643
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include, and the supplicant keyword.
Usage Examples
The following example displays the port authentication information: >enable #show port-auth Global Port-Authentication Parameters: re-authentication enabled: False reauth-period: 3600 quiet-period: 60 tx-period: 30 supp-timeout: 30 server-timeout: 30 reauth-max: 2 Port-Authentication Port Summary: Interface Status Type Mode Authorized --------------------------------------------------------------------------------------eth 0/1 disabled port-based n/a n/a eth 0/2 disabled port-based n/a n/a eth 0/3 disabled port-based n/a n/a eth 0/4 disabled port-based n/a n/a eth 0/5 disabled port-based n/a n/a eth 0/6 disabled port-based n/a n/a eth 0/7 disabled port-based n/a n/a eth 0/8 disabled port-based n/a n/a eth 0/9 disabled port-based n/a n/a eth 0/10 disabled port-based n/a n/a eth 0/11 disabled port-based n/a n/a eth 0/12 disabled port-based n/a n/a eth 0/13 disabled port-based n/a n/a eth 0/14 disabled port-based n/a n/a eth 0/15 disabled port-based n/a n/a eth 0/16 disabled port-based n/a n/a eth 0/17 disabled port-based n/a n/a eth 0/18 disabled port-based n/a n/a eth 0/19 disabled port-based n/a n/a eth 0/20 disabled port-based n/a n/a eth 0/21 disabled port-based n/a n/a Port Authentication Port Details: Port-Authentication is disabled on eth 0/1 Port-Authentication is disabled on eth 0/2
60000CRG0-35B
644
show port-security
Use the show port-security command to display port security information. Variations of this command include:
show port-security show port-security address show port-security interface <interface> show port-security interface <interface> address show port-security port-expiration show port-security port-expiration detailed
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
address interface <interface> Optional. Displays a list of secure medium access control (MAC) addresses for all interfaces currently configured for port security. Optional. Filters the output to include only information for the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show port-security interface ? for a complete list of valid interfaces. Optional. Displays the ports currently participating in port expiration and the amount of time left until the port is shut down. Optional. Displays information for all interfaces, even if not configured for port expiration.
port-expiration detailed
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
645
Usage Examples
The following displays all secure MAC addresses related to the Ethernet 0/1 interface: >enable #show port-security interface eth 0/1 address VLAN Mac Address Type of Entry Interface Remaining Time -------------------------------------------------------------------------------------------------------------1 00:a0:c8:0a:c6:4a Dynamic-Secure eth 0/1 -1 00:a0:c8:0a:c6:4b Dynamic-Secure eth 0/1 --------------------------------------------------------------------------------------------------------------Dynamic Address Count: 2 Static Address Count: 0 Sticky Address Count: 0 Total Address Count: 2
60000CRG0-35B
646
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
<slot/port> realtime Optional. Specifies the slot/port of a PoE interface. If specified, the command only displays information related to that interface. Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 9.1 Release 11.1 Release 17.1 Command was introduced. The realtime display parameter was added. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
647
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
Usage Examples
The following example displays power information for all PoE interfaces: >enable #show power inline Interface Admin eth 0/1 auto eth 0/2 auto --MORE--
60000CRG0-35B
648
show power-supply
The show power-supply command displays the power supply status. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays the power supply status: >enable #show power-supply Power supply 1 is OK. Power supply 2 is not present.
60000CRG0-35B
649
show pppoe
Use the show pppoe command to display all Point-to-Point Protocol over Ethernet (PPPoE) settings and associated parameters. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example enters the Enable mode and uses the show command to display PPPoE information: >enable #show pppoe ppp 1 Outgoing Interface: eth 0/1 Outgoing Interface MAC Address: 00:A0:C8:00:85:20 Access-Concentrator Name Requested: FIRST VALID Access-Concentrator Name Received: 13021109813703-LRVLGAOS90W_IFITL Access-Concentrator MAC Address: 00:10:67:00:1D:B8 Session Id: 64508 Service Name Requested: ANY Service Name Available: PPPoE Client State: Bound (3) Redial retries: unlimited Redial delay: 10 seconds Backup enabled all day on the following days: Sunday Monday Tuesday Wednesday Thursday Friday Saturday
60000CRG0-35B
650
show probe
Use the show probe command to display probe configuration and statistics. Refer to Network Monitor Probe Command Set on page 2590 for information on configuring probe objects. Variations of this command include the following:
show probe show probe <name> show probe <name> realtime show probe responder icmp-timestamp show probe responder icmp-timestamp realtime show probe responder twamp show probe responder twamp realtime show probe responder udp-echo show probe responder udp-echo realtime show probe <name> statistics show probe <name> statistics history show probe statistics show probe statistics history
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
<name> responder icmp-timestamp twamp udp-echo statistics history Optional. Displays configuration and statistics for a specific probe. Displays the specified probe responder statistics. Optional. Displays the Internet Control Message Protocol (ICMP) timestamp probe responder statistics. Optional. Displays the Two-Way Active Measurement Protocol (TWAMP) probe responder statistics. Optional. Clears the User Datagram Protocol (UDP) echo probe responder statistics. Optional. Displays measured probe statistics. Optional. Displays the history of all measured probe statistics.
60000CRG0-35B
651
Enable Mode Command Set Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Release 17.1 Release 17.2 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the probe responder options.
Functional Notes
A probe must be created first using the probe command. Issuing the shutdown command at the probe configuration prompt will disable a probe, causing it to cease traffic generation. While a probe is shutdown, it will not fail. Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
Usage Examples
The following is sample output of the show probe probe_A command: >enable #show probe probe_A Current State: PASS Admin. Status: DOWN Type: ICMP Echo Period: 30 sec Timeout: 500 msec Hostname: www.adtran.com Tracked by: track_1 Tests Run: 121 Failed: 0 Time in current state: 25 days 2 hours, 34 minutes, 32 seconds
The following is sample output of the show probe responder twamp command: >enable #show probe responder twamp 0--------------1----------------2----------------3----------------4---------------5----------------6----------------7---------------8 12345678901234567890123456789012345678901234567890123456789012345678901234567890 TWAMP-Test: 360 rcvd, 360 sent TWAMP-Control: 20 sessions opened, 18 sessions closed, 3 sessions rejected, 2 sessions active
60000CRG0-35B
652
The following is sample output of the show probe responder icmp-timestamp command: >enable #show probe responder icmp-timestamp 0--------------1----------------2----------------3----------------4---------------5----------------6----------------7---------------8 12345678901234567890123456789012345678901234567890123456789012345678901234567890 ICMP Timestamp: 125 rcvd, 125 sent The following is sample output of a TWAMP type probe named Houston: >enable #show probe Houston 0--------------1----------------2----------------3----------------4---------------5----------------6----------------7---------------8 12345678901234567890123456789012345678901234567890123456789012345678901234567890 Probe Houston: Current State: PASS Admin. Status: UP Type: TWAMP Period: 60 Timeout: 1500 Source: 192.168.1.255:17001 Destination: 10.10.20.254:17000 Data Size: 14 Num-packets 100 DSCP: 0 Data pad: Zero Send-schedule: 20 msec Type: periodic Authentication Mode: open Key: not set Tracked by: Nothing Tests Run: 194 Failed: 1 Tolerance: not set Time in current state: 1 days, 2 hours, 50 minutes, 7 seconds Packet Loss fail pass Round Trip 1000 1000
60000CRG0-35B
653
show processes
Use the show processes command to display process statistic information. Variations of this command include:
show processes cpu show processes cpu realtime show processes history show processes queue show processes stack
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
cpu realtime history queue stack Displays information about processes that are currently active. Optional. Displays full-screen CPU output in real time. Refer to the Functional Notes below for more information. Displays the process switch history. Displays process queue utilization. Displays the process stack usage.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 10.1 Release 17.1 Release 17.5 Command was introduced. New option was introduced. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the stack parameter.
60000CRG0-35B
654
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
Usage Examples
The following is sample output from the show processes cpu command: >enable #show processes cpu processes cpu System load: 7.07% Min: 0.00% Max 85.89% Context switch load: 0.21% Task Task Invoked Exec D Name PRI STAT (count) 0 Idle 0W 129689 1 FrontPanel 249 W 9658 3 Stack Usage 11 W 485 4 Q Test 1 10 W 50 5 Q Test 2 11 W 50 --MORE--
60000CRG0-35B
655
show qos
Use the show qos command to display information regarding quality of service (QoS) and 802.1p class of service (CoS) settings. Variations of this command include:
show qos cos-map show qos dscp-cos show qos interface <interface> show qos queuing
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
cos-map dscp-cos interface <interface> Displays the CoS priority-to-queue map. The map outlines which CoS priority is associated with which queue. Displays the differentiated services code point (DSCP) to CoS map settings. Displays the configured values for default CoS and trust settings on a specific interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show qos interface ? for a complete list of valid interfaces. Displays the type of queuing being used. If weighted round robin (WRR) queuing is enabled, the command also displays the weight of each queue.
queuing
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 7.1 Release 17.1 Command was introduced. Command was expanded to include the dscp-cos parameter. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
656
Usage Examples
The following is sample output from the show qos cos-map command: >enable #show qos cos-map CoS Priority: 0 1 2 3 4 5 6 7 Priority Queue: 1 1 2 2 3 3 4 4 The following is sample output from the show qos interface command for Ethernet 0/8 interface: >enable #show qos interface ethernet 0/8 Ethernet 0/8 trust state: trusted default CoS: 0 The following is sample output from the show qos queuing command with WRR queuing enabled: >enable #show qos queuing Queue-type: wrr Expedite queue: disabled wrr weights: qid - weight 1 - 12 2 - 45 3 - 55 4 - 65
60000CRG0-35B
657
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<name> <number> interface <interface> Optional. Specifies the name of a defined QoS map. Optional. Specifies one of the maps defined sequence numbers. Optional. Displays the QoS map information for a specific interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show qos map interface ? command for a complete list of interfaces.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 9.1 Release 11.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the high level data link control (HDLC) interface. Demand interface was added. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
60000CRG0-35B
658
Usage Examples
The following example shows all QoS maps and all entries in those maps: >enable #show qos map qos map priority map entry 10 match IP packets with a precedence value of 6 priority bandwidth: 400 (kilobits/sec) burst: default map entry 20 match ACL icmp map entry 30 match RTP packets on even destination ports between 16000 and 17000 map entry 50 match ACL tcp map entry 60 match IP packets with a dscp value of 2 set dscp value to 6 map entry 70 match NetBEUI frames being bridged by the router priority bandwidth: 150 (kilobits/sec) burst: default qos map tcp_map map entry 10 match ACL tcp priority bandwidth: 10 (kilobits/sec) burst: default set precedence value to 5 map entry 20 match IP packets with a precedence value of 3 priority bandwidth: 50 (kilobits/sec) burst: default The following example shows the QoS map named priority and all entries in that map: >enable #show qos map priority qos map priority map entry 10 match IP packets with a precedence value of 6 priority bandwidth: 400 (kilobits/sec) burst: default map entry 20 match ACL icmp map entry 30 match RTP packets on even destination ports between 16000 and 17000 map entry 50 match ACL tcp map entry 60 match IP packets with a dscp value of 2
60000CRG0-35B
659
Command Reference Guide set dscp value to 6 map entry 70 match NetBEUI frames being bridged by the router priority bandwidth: 150 (kilobits/sec) burst: default
The following example shows only QoS map named priority with the sequence number 10: >enable #show qos map priority 10 qos map priority map entry 10 match IP packets with a precedence value of 6 priority bandwidth: 400 (kilobits/sec) burst: default The following examples show QoS map interface statistics associated with the applied map for the Frame Relay 1 interface: >enable #show qos map interface frame-relay 1 fr 1 qos-policy out: priority map entry 10 match IP packets with a precedence value of 6 budget 145/10000 bytes (current/max) priority bandwidth: 400 (kilobits/sec) packets matched on interface: 27289 packets dropped: 0 map entry 20 match IP packets with a DSCP value of af41 class bandwidth: 40 (% of remaining) conversation: 235 packets matched: 23457 packets dropped: 0
60000CRG0-35B
660
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<interface> Displays the queueing information for the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type the show queue ? command to display a list of valid interfaces. Optional. Displays the subqueue statistics.
child
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 9.1 Release 11.1 Release 17.1 Release 17.4 Release 17.5 Release A4.01 Command was introduced. Command was expanded to include the high level data link control (HDLC) interface. Demand interface was added. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the child keyword. Command was expanded to include the asynchronous transfer mode (ATM) and Frame Relay interfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
60000CRG0-35B
661
Usage Examples
The following is sample output from the show queue command: >enable #show queue ethernet 0/2 Queueing method: weighted fair Output queue: 4/222/540/64/176 (size/highest/max total/threshold/drops) Conversations 0/4/256 (active/max active/max total) Available Bandwidth 15000 kilobits/sec (depth/weight/matches/discards) 4/32768/32456/0 Conversation 178, linktype: ip, length: 936 source: 10.22.13.34, destination: 10.22.2.3, id: 0xddc6, ttl: 127, TOS: 0 prot: 6 (tcp), source port 1086, destination port 20
60000CRG0-35B
662
show queuing
Use the show queuing command to display information associated with configured queuing methods. Variations of this command include:
show queuing show queuing fair
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
fair Optional. Displays only information on the weighted fair queuing configuration.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output from the show queuing command: >enable #show queuing Interface fr 1 fr 2 ppp 1
Discard threshold 64 64 64
60000CRG0-35B
663
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is an example output using the show radius statistics command: >enable #show radius statistics Number of packets sent: Number of invalid responses: Number of timeouts: Average delay: Maximum delay: Auth. 3 0 0 2 ms 3 ms Acct. 0 0 0 0 ms 0 ms
60000CRG0-35B
664
show ramdisk
Use the show ramdisk command to display a list of all files currently stored in volatile RAM disk memory or details about a specific file stored in RAM disk memory. Variations of this command include:
show ramdisk show ramdisk <filename>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Not all units are capable of using a RAM disk file system. Use the show ? command to display a list of valid commands at the enable prompt.
Syntax Description
<filename> Optional. Displays details for a specified file located in RAM disk file system. Enter a wildcard (such as *.biz) to display the details for all files matching the entered pattern.
Default Values
No default values are necessary for this command.
Command History
Release 17.7 Command was introduced for AOS units limited to only 16 Megabytes of flash memory.
Usage Examples
The following is a sample show ramdisk output displaying the contents of the RAM disk, space occupied by each file, the total RAM disk space allocated, available space, and used space: >enable #show ramdisk 10005125 NV3130A-17-07-00-26-AE.biz 10007923 bytes used, 7429514 available, 17437437 total
60000CRG0-35B
665
show route-map
Use the show route-map command to display any route maps that have been configured in the router. This command displays any match and set clauses associated with the route map, as well as the number of incoming routes that have matched each route map. Route maps can be used for Border Gateway Protocol (BGP) and PBR. Variations of this command include:
show route-map show route-map <name>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<name> Optional. Displays only the route map matching the specified name.
Default Values
By default, this command displays all defined route-maps.
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
In the example below, all route-maps in the router are displayed. >enable #show route-map route-map RouteMap1, permit, sequence 10 Match clauses: community (community-list filter): CommList1 Set clauses: local-preference 250 BGP Filtering matches: 75 routes Policy routing matches: 0 packets 0 bytes route-map RouteMap1, permit, sequence 20 Match clauses: community (community-list filter): CommList2 Set clauses:
60000CRG0-35B
666
Command Reference Guide local-preference 350 BGP Filtering matches: 87 routes Policy routing matches: 0 packets 0 bytes route-map RouteMap2, permit, sequence 10 Match clauses: ip address (access-lists): Acl1 Set clauses: metric 100 BGP Filtering matches: 10 routes Policy routing matches: 0 packets 0 bytes route-map RouteMap2, permit, sequence 20 Match clauses: ip address (access-lists): Acl2 Set clauses: metric 200 BGP Filtering matches: 12 routes Policy routing matches: 0 packets 0 bytes route-map RouteMap3, permit, sequence 10 Match clauses: length 150 200 Set clauses: ip next-hop: 10.10.11.254 BGP Filtering matches: 0 routes Policy routing matches: 0 packets 0 bytes route-map RouteMap3, permit, sequence 20 Match clauses: ip address (access-lists): Acl3 Set clauses: ip next-hop: 10.10.11.14 BGP Filtering matches: 0 routes Policy routing matches: 144 packets 15190 bytes In the example below, only RouteMap2 is displayed. >enable #show route-map RouteMap2 route-map RouteMap2, permit, sequence 10 Match clauses: ip address (access-lists): Acl1 Set clauses: metric 100 BGP Filtering matches: 10 routes Policy routing matches: 0 packets 0 bytes route-map RouteMap2, permit, sequence 20 --MORE--
60000CRG0-35B
667
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
debug Optional. Activates the RTP resources event debug messages.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 14.1 Release 17.1 Command was introduced. Command was expanded to include more options. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output for the show rtp resources command: >enable #show rtp resources DSP Channel Type Port Status -----------------------------------------------------------------------0/1 1 RTP N/A Available 0/1 2 RTP N/A Available 0/1 3 RTP N/A Available 0/1 4 RTP N/A Available 0/1 5 RTP N/A Available 0/1 6 RTP N/A Available 0/1 7 RTP N/A Available 0/1 8 RTP N/A Available --MORE--
60000CRG0-35B
668
show running-config
Use the show running-config command to display all the nondefault parameters contained in the current Internet Protocol version 4 (IPv4) running configuration file. Specific portions of the running configuration may be displayed, based on the command entered. Variations of this command include the following:
show running-config show running-config ip access-lists show running-config ip access-lists verbose show running-config checksum show running-config interface <interface> show running-config interface <interface> verbose show running-config ip-crypto show running-config ip-crypto verbose show running-config ip mgcp show running-config ip mgcp verbose show running-config ip nat pool show running-config ip nat pool verbose show running-config ip rtp show running-config ip rtp verbose show running-config ip sdp show running-config ip sdp verbose show running-config ip security monitor show running-config ip security monitor verbose show running-config ip sip show running-config ip sip verbose show running-config ip sip proxy user-template <name> show running-config ip sip proxy user-template <name> verbose show running-config ip urlfilter show running-config ip policy-class show running-config ip policy-class verbose show running-config mef show running-config mef verbose show running-config probe show running-config probe verbose show running-config qos-map show running-config qos-map verbose show running-config quality-monitoring show running-config quality-monitoring verbose show running-config router bgp show running-config router pim-sparse show running-config router pim-sparse verbose show running-config track show running-config track verbose show running-config verbose
60000CRG0-35B
669
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
ip access-lists checksum interface <interface> Optional. Displays the current running configuration for all configured IPv4 access control lists (ACLs). Optional. Displays the encrypted message digest 5 (MD5) version of the running configuration. Optional. Displays the current running configuration for a particular interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show running-config interface ? for a complete list of valid interfaces. Optional. Displays the current running configuration for all IPv4 Internet Protocol security (IPsec) virtual private network (VPN) settings. Optional. Displays the current running configuration for all Media Gateway Control Protocol (MGCP) parameters. Optional. Displays the current running configuration for IPv4 network address translation (NAT) pool parameters. Optional. Displays the current running configuration for all IPv4 Realtime Transport Protocol (RTP) parameters. Optional. Displays the current running configuration for all Session Description Protocol (SDP) parameters. Optional. Displays the current running configuration for all IPv4 security monitor parameters. Optional. Displays the current running configuration for all IPv4 Session Initiation Protocol (SIP) parameters. Optional. Displays the current running configuration for the specified IPv4 SIP proxy user template. Optional. Displays the current running configuration for all IPv4 uniform resource locator (URL) filters. Optional. Displays the current running configuration for all configured IPv4 access control policies (ACPs).
ip-crypto
ip mgcp ip nat pool ip rtp ip sdp ip security monitor ip sip ip sip proxy user-template <name> ip urlfilter ip policy-class
60000CRG0-35B
670
Command Reference Guide mef probe qos-map quality-monitoring router bgp router pim-sparse track verbose
Enable Mode Command Set Optional. Displays the current running configuration for all Metro Ethernet Forum (MEF) components. Optional. Displays the current configuration for all running probes. Optional. Displays the current running configuration for all configured quality of service (QoS) maps. Optional. Displays the current running configuration for voice quality monitoring (VQM). Optional. Displays the current Border Gateway Protocol (BGP) configuration. Optional. Displays the current global protocol-independent multicast-sparse mode (PIM-SM) configuration. Optional. Displays the current running configuration for all tracks. Optional. Displays the entire running configuration to the terminal screen (versus only the nondefault values).
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 9.1 Release 11.1 Command was introduced. Command was expanded to include the high level data link control (HDLC) and tunnel interfaces. Demand, foreign exchange office (FXO), and serial interfaces were added. The ip-crypto and router pim-sparse keywords were added. Command was expanded to include the ip rtp, ip sdp, probe and track subcommands+. Command was expanded to include the modifiers begin, exclude, and include, and the ip urlfilter and quality-monitoring keywords. Command was introduced in the AOS voice products. Command was expanded to include the mgcp parameter. Command was expanded to include the ip nat pool parameter. Command was expanded to include the security monitor parameter. Command was expanded to include the Ethernet in the first mile (EFM) group interface and the ip sip proxy user-template parameter. Command was expanded to include the Metro Ethernet Forum (MEF) parameter and the MEF Ethernet interface.
60000CRG0-35B
671
Enable Mode Command Set Command was changed to require the ip keyword for the access-list and policy-class parameters. Command was expanded to include the asymmetric digital subscriber line (ADSL) interface.
Usage Examples
The following is sample output from the show running-config command: >enable #show running-config Building configuration... ! no enable password ! ip subnet-zero ip classless ip routing ! event-history on no logging forwarding logging forwarding priority-level info no logging email ! !ip policy-timeout tcp all-ports 600 ip policy-timeout udp all-ports 60 ip policy-timeout icmp 60 ! interface eth 0/1 --MORE--
60000CRG0-35B
672
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
access-lists policy-class verbose Displays the current running configuration for all configured IPv6 access control lists (ACLs). Displays the current running configuration for all configured IPv6 access control policies (ACPs). Optional. Displays the entire running configuration to the terminal screen (versus only the nondefault values).
Default Values
No default values are necessary for this command.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example displays the IPv6 ACLs in the units running configuration: >enable #show running-config ipv6 access-lists ipv6 access-list extended Privatev6 deny tcp any eq telnet any deny tcp any any eq telnet permit ipv6 any host 2000:1::1 permit icmp any any
60000CRG0-35B
673
The following example displays the configured IPv6 ACPs in the units running configuration: >enable #show running-config ipv6 policy-class ipv6 policy-class UNTRUSTED allow list localservicev6 discard list Webtraffic
60000CRG0-35B
674
60000CRG0-35B
675
Command Reference Guide show running-config voice operator-group show running-config voice operator-group verbose show running-config voice paging-group show running-config voice paging-group verbose show running-config voice paging-group <extension> show running-config voice paging-group <extension> verbose show running-config voice pickup-group show running-config voice pickup-group <name> show running-config voice queue show running-config voice queue <extension> show running-config voice queue verbose show running-config voice queue <extension> verbose show running-config voice ring-group show running-config voice ring-group verbose show running-config voice ring-group <name> show running-config voice ring-group <name> verbose show running-config voice speed-dial show running-config voice speed-dial verbose show running-config voice spre show running-config voice spre verbose show running-config voice spre-map show running-config voice spre-map verbose show running-config voice status-group show running-config voice status-group verbose show running-config voice status-group <name> show running-config voice status-group <name> verbose show running-config voice trunk show running-config voice trunk verbose show running-config voice trunk <Txx> show running-config voice trunk <Txx> verbose show running-config voice trunk-list show running-config voice trunk-list verbose show running-config voice trunk-list <name> show running-config voice trunk-list <name> verbose show running-config voice user show running-config voice user verbose show running-config voice user <number> show running-config voice user <number> verbose show running-config voice user <name> show running-config voice user <name> verbose show running-config voice user <name> <last name> show running-config voice user <name> <last name> verbose show running-config voice verbose
60000CRG0-35B
676
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
ani ani-list ani-list <name> autoattendant class-of-service class-of-service <name> directory grouped-trunk grouped-trunk <name> line line <number> mail match match ani mgcp-endpoint mgcp-endpoint <index> music-on-hold music-on-hold mode music-on-hold player named-digit-timeouts operator-group paging-group paging-group <extension> pickup-group pickup-group <name> Optional. Displays automatic number identification (ANI) substitution configurations. Optional. Displays all ANI list configurations. Optional. Deploys a specific ANI list configuration. Optional. Displays auto attendant configuration. Optional. Displays all voice class of service (CoS) configurations. Optional. Displays voice CoS configurations for the specified rule set. Optional. Displays voice directory configuration. Optional. Displays all voice trunk group configurations. Optional. Displays voice trunk group configurations for the specified trunk. Optional. Displays the voice line configuration. Optional. Displays the voice line configuration for a specified extension. Optional. Displays voicemail configuration. Optional. Displays all substitution configurations. Optional. Displays ANI substitution configurations. Optional. Displays all Media Gateway Control Protocol (MGCP) endpoint configurations. Optional. Displays a specific MGCP endpoint configuration. Optional. Displays all Music on Hold (MoH) configurations. Optional. Displays all MoH mode configurations. Optional. Displays all MoH player configurations. Optional. Displays all named-digit-timeouts. Optional. Displays operator group configuration. Optional. Displays all handset paging group configurations. Optional. Displays handset paging group configuration for the specified paging group. Optional. Displays all call pickup group configurations. Optional. Displays call pickup group configuration for the specified call pickup group.
music-on-hold player <name> Optional. Displays the MoH player configuration for the specified player. named-digit-timeouts <name> Optional. Displays configuration for the specified named-digit-timeout.
60000CRG0-35B
677
Command Reference Guide queue queue <extension> ring-group ring-group <name> speed-dial spre spre-map status-group status-group <name> trunk trunk <Txx> trunk-list trunk-list <name> user <number> <name> <last name> verbose
Enable Mode Command Set Optional. Displays all call queue configurations. Optional. Displays call queue configuration for the specified call queue. Optional. Displays all configured ring groups. Optional. Displays ring group configurations for the specified ring group. Optional. Displays all entries for speed-dial entries. Optional. Displays entire special prefix (SPRE) related configuration, including mode, overrides, local maps, and network template. Optional. Displays only the SPRE mapping configuration. Optional. Displays all status group information. Optional. Displays information on the specified status group. Optional. Displays all voice trunk configurations. Optional. Displays voice trunk configurations for the specified trunk. Use the trunk's 2-digit identifier following T (for example, T99). Optional. Displays all trunk list configurations. Optional. Displays a specific trunk list configuration. Optional. Displays all configured voice users. Optional. Displays voice user configurations for the specified number. Optional. Displays voice user configurations for the specified name. Enter the first or last name. Optional. Displays voice user configurations for the specified name. Enter the last name only. Optional. Displays detailed information on all or on the specified voice running configurations.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release 11.1 Release 13.1 Release 14.1 Release 15.1 Release 16.1 Release 17.1 Release A2 Release A2.03 Release A2.04 Command was introduced. Command was expanded. Command was expanded. Command was expanded. Command was expanded. Command was expanded. Command was expanded to include the modifiers begin, exclude, and include parameters. Command was expanded to include the ani-list, match, mgcp-endpoint, named-digit-timeouts, trunk-list, and user parameters. Command was expanded to include the spre and spre-map parameters. Command was expanded to include the paging-group parameter.
60000CRG0-35B
678
Enable Mode Command Set Command was expanded to include the pickup-group parameter, voice queue, and music-on-hold.
Usage Examples
The following example shows sample output from the show running-config voice command: >enable #show running-config voice Building configuration... ! voice hold-reminder 15 voice flashhook mode interpreted ! voice dial-plan 1 local 8000 ! voice class-of-service set1 billing-codes ! voice class-of-service set2 ! voice class-of-service set 1" ! voice codec-list trunk default codec g711ulaw codec g729 ! voice codec-list list 1" ! voice codec-list list1 ! voice trunk T99 type t1-rbs supervision wink role network ! voice trunk T01 type sip ! voice trunk T07 type t1-rbs supervision wink role network ! voice trunk T02 type t1-rbs supervision wink role network ! voice trunk T03 type t1-rbs supervision wink role network ! voice trunk T12 type sip ! voice grouped-trunk TEST no description reject 900XXXXXXX
60000CRG0-35B
679
60000CRG0-35B
680
show schedule
Use the show schedule command to display information regarding the schedule configuration. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 15.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is a sample from the show schedule command: >enable #show schedule Schedule entry: DELAY-AFTER-BOOT (active) Schedule entry: DELAY (inactive)
Technology Review
The scheduler provides a method for configuring a feature to operate during a specific time schedule and to receive feedback when the feature should disable or enable. The goal of the scheduler is to eliminate redundant code while providing an understandable, streamlined application program interface (API) for rapid feature development with schedules. The show schedule command displays how many features are scheduled and whether they are active or inactive.
60000CRG0-35B
681
Default Values
No default values are necessary for this command.
Command History
Release 17.6 Command was introduced.
Functional Notes
Fields in the show command output reported as Unspecified are not applicable to the module type. Refer to the Usage Examples for more information.
Usage Examples
The following is sample output from the show sfp-info interface gigabit-switchport <slot/port> command: >enable #show sfp-info interface gigabit-switchport 0/25 SFP Manufacturer: FINISAR CORP. Identifier: SFP Transceiver Connector: LC SONET Compliance Code: Unspecified Gigabit Ethernet Compliance Code: 100BASE-SX Fiber Channel Link Length: Intermediate Distance <I> Fiber Channel Transmitter Technology: Shortwave laser w/o OFC <SN> Fiber Channel Transmitter Media: Multi-Mode, 62.5m <M6> Fiber Channel Speed: 200 MB/sec Encoding: 8B10B
60000CRG0-35B
682
Command Reference Guide Nominal Bit Rate: 2100 Mb/s Supported Single-Mode Link Length <Km units>: Unspecified Supported Single-Mode Link Length <100m units>: Unspecified Supported Multi-Mode <50micron> Link Length <10m units>: 30 Supported Multi-Mode <62.5micron> Link Length <10m units>: 15 Supported Link Length Copper: Unspecified Vendor OUI: 00:90:65 Vendor Part Number: FTRJ8519P1BNL Vendor Revision: A Options: LOS, TX_DISABLE Bitrate, Max: Unspecified Bitrate, Min: Unspecified Vendor Serial Number: PA41HCB Datecode: Jul 31. 2005
60000CRG0-35B
683
show sip
Use the show sip command to display Session Initiation Protocol (SIP) statistical and registration information. Variations of this command include:
show sip resources show sip statistics show sip user-registration
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
resources statistics user-registration Displays SIP server resource information. Displays SIP server statistic information. Displays local SIP server registration information.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release 11.1 Release 15.1 Release 17.1 Release 17.3 Command was introduced. Resources, statistics, and user-registration parameters were added. Name-service name-table parameter was added. Command was expanded to include the modifiers begin, exclude, and include. Command was altered to remove the name-service name-table parameter, which was replaced with the show voip name-service name-table command.
Usage Examples
The following example shows sample output from the show sip statistics command: >enable #show sip statistics Invites transmitted: 36 Invites received: 26 Invite Retransmits transmitted: 11
60000CRG0-35B
684
Command Reference Guide Invite Retransmits received: 0 Non-Invites transmitted: 1869 Non-Invites received: 1911 Non-Invite Retransmits transmitted: 12 Non-Invite Retransmits received: 41 Responses transmitted: 1982 Responses received: 3535
Response Retransmits transmitted: 45 Response Retransmits received: 0 The following example shows sample output from the show sip user-registration command: >enable #show sip user-registration EXT. TYPE --------------------------9001 SIP - Generic 9002 SIP - Generic Total phones registered: 2 IP ADDRESS -------------1.1.1.2 10.10.10.2 PORT -----5060 5060 EXP ----25 3419
60000CRG0-35B
685
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
dynamic static Optional. Displays SIP location database dynamic entries. Optional. Displays SIP location database static entries.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 12.1 Release 17.1 Command was introduced. Command output was updated. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example shows sample output from the show sip location static command: >enable #show sip location static User IP Address Port Expires Source ----------------------------------------------------------------------------9001 1.1.1.2 5060 52 Registrar 9002 10.10.10.2 5060 3336 Registrar
60000CRG0-35B
686
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
resources user extended realtime verbose Displays SIP proxy resource information. Displays SIP proxy user database information. Optional. Displays the extended form of SIP proxy user database. Optional. Displays SIP proxy information in real time. Refer to the Functional Notes below for more information. Optional. Activates detailed debug messages.
Default Values
No default values are necessary for this command.
Command History
Release 16.1 Release 17.1 Release 17.3 Release A2.03 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the extended modifier. Command was expanded to include the verbose modifier.
60000CRG0-35B
687
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
Usage Examples
The following example shows sample output from the show sip proxy resources command: >enable #show sip proxy resources Type Name Allocated Currently in Use Max Used ----------------------------------------------------------------------------------------------------------------------Proxy proxyPoolElements 630 0 0
60000CRG0-35B
688
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
<Txx> <name> realtime Optional. Specifies the trunk identity; where xx is the trunks two-digit identifier (e.g., T01). Optional. Specifies the name associated with the trunk. Optional. Displays local SIP client registration information in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
689
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
Usage Examples
The following example shows sample output from the show sip trunk-registration command: >enable #show sip trunk-registration Ext Register Expire Grant Success Redirect Challenge Failed Timeout --------------------------------------------------------------------------------------------------------------------------4433 NO 0 0 0 0 0 0 #
60000CRG0-35B
690
show snmp
Use the show snmp command to display the system Simple Network Management Protocol (SNMP) current configuration. Variations of this command include the following:
show snmp engineID show snmp group show snmp user
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
engineID group user Displays the hex string that defines the current local engine ID settings. Displays the list of all groups entered. Displays the list of all users entered.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 13.1 Release 17.1 Command was introduced. Command was expanded to include the engineID, group, and user options. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output using the show snmp command for a system with SNMP disabled, and the default chassis and contact parameters: >enable #show snmp Chassis: Chassis ID Contact: Customer Service 0 Rx SNMP packets 0 Bad community names 0 Bad community uses 0 Bad versions
60000CRG0-35B
691
0 Silent drops The following is sample output of the show snmp group command for a situation in which a group called securityV3auth was defined (via the snmp-server group command) using version 3 and authentication, and no access control list: >enable #show snmp group Group: securityV3auth Read View: default Notify View: default
60000CRG0-35B
692
show sntp
Use the show sntp command to display the system Simple Network Time Protocol (SNTP) parameters and current status of SNTP communications. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays the SNTP parameters and current status: >enable #show sntp
60000CRG0-35B
693
show spanning-tree
Use the show spanning-tree command to display the status of the spanning-tree protocol. Variations of this command include:
show spanning-tree show spanning-tree <number> show spanning-tree detail show spanning-tree detail active show spanning-tree realtime show spanning-tree <number> realtime show spanning-tree summary
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command may adversely affect system performance and should be used with discretion.
Syntax Description
<number> detail active realtime summary Optional. Displays spanning tree for a specific bridge group. This command is only applicable to routers configured for bridging. Optional. Displays detailed spanning tree information. Optional. Displays detailed information about all active interfaces. Optional. Displays full-screen spanning tree information in real time. Optional. Displays a summary of all port states.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 10.1 Release 17.1 Release 17.5 Command was introduced. Command was expanded to include the realtime parameter. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the detail, active, and summary keywords.
60000CRG0-35B
694
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
Usage Examples
The following is an example output using the show spanning-tree command: >enable #show spanning-tree Spanning Tree enabled protocol ieee Root ID Priority 32768 Address 00:a0:c8:00:88:41 We are the root of the spanning tree Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority 32768 Address 00:a0:c8:00:88:41 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Aging Time 300 Interface Role Sts Cost Prio. Nbr. Type eth 0/2 Desg FWD 19 128.2 P2p eth 0/3 Desg FWD 19 128.3 P2p eth 0/4 Desg FWD 19 128.4 P2p giga-eth 0/1 Desg FWD 4 128.25 P2p giga-eth 0/2 Desg FWD 4 128.26 P2p
60000CRG0-35B
695
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
detail Optional. Displays the spanning-tree protocol status in detail.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is an example output using the show spanning-tree active command: >enable #show spanning-tree active Spanning Tree enabled protocol ieee Root ID Priority 32768 Address 00:a0:c8:00:88:41 We are the root of the spanning tree Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority 32768 Address 00:a0:c8:00:88:41 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Aging Time 300 eth 0/9 Desg FWD 19 128.9 P2p eth 0/2 Desg FWD 19 128.24 P2p --MORE--
60000CRG0-35B
696
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is an example output using the show spanning-tree blockedports command: >enable #show spanning-tree blockedports Blocked Interfaces List -----------------------------------eth 0/3 giga-eth 0/2 p-chan 1 Number of blocked ports (segments) in the system: 3
60000CRG0-35B
697
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<interface> Specifies an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type show spanning-tree interface ? for a complete list of valid interfaces. Optional. Displays information for an active interface. Optional. Displays detailed spanning-tree protocol information for an active interface. Optional. Displays only spanning-tree protocol path cost information. Optional. Displays information for all interfaces configured as edgeports. Optional. Displays only spanning-tree protocol priority information. Optional. Displays only spanning-tree protocol root path cost information. Optional. Displays only spanning-tree protocol state information.
Default Values
No default values are necessary for this command.
60000CRG0-35B
698
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is an example output using the show spanning-tree interface ethernet command: >enable #show spanning-tree interface ethernet 0/2 Interface Role Sts Cost Prio. Nbr. Type ------------------- ------------------- ------------------ ----------- ------------- --------------eth 0/2 Desg LIS 19 128.2 P2p
60000CRG0-35B
699
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output using the show spanning-tree pathcost method command. In this case, 32-bit values are being used when calculating path costs: >enable #show spanning-tree pathcost method Spanning tree default pathcost method used is long
60000CRG0-35B
700
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
address cost detail forward-time hello-time id max-age port priority priority system-id Optional. Displays the address of the spanning-tree root. Optional. Displays the path cost of the spanning-tree root. Optional. Displays the spanning-tree root information in detail. Optional. Displays the forward-time of the spanning-tree root. Optional. Displays the hello-time of the spanning-tree root. Optional. Displays the ID of the spanning-tree root. Optional. Displays the maximum age of the spanning-tree root. Optional. Displays the port of the spanning-tree root. Optional. Displays the priority of the spanning-tree root. Optional. Displays the priority and system-id of the spanning-tree root.
Default Values
No default values are necessary for this command.
60000CRG0-35B
701
Command History
Release 5.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is an example output using the show spanning-tree root command: >enable #show spanning-tree root Root ID Root Cost Hello Time Max Age Fwd Dly Root Port --------------------------------- ------------- ------------ -------------- ---------------8191 00:a0:c8:b9:bb:82 108 2 20 15 eth 0/1
60000CRG0-35B
702
show stack
Use the show stack command to view the status of all the switches configured for stacking. Displays the mode of the switch as either master or member. If the mode is master, this command also gives the status of the stack members. Variations of this command include:
show stack show stack candidates show stack candidates realtime show stack realtime show stack topology show stack topology realtime
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
candidates topology realtime Optional. Displays all units that have registered with this stack master. This option is only available on a switch configured as a stack master. Optional. Displays the stack topology. This option is only available on a switch configured as a stack master. Optional. Displays full-screen output in real time. Refer to Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 10.1 Release 17.1 Command was introduced. The realtime display parameter was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
703
Functional Notes
The stack candidates are a list of units that could be added to the stack. They are not yet members. Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
Usage Examples
The following example displays the configuration of the switch stack while in stack-master mode: >enable #show stack Stack mode is MASTER Management Vlan is 2386, firmware version is 08.00.18.D Stack network is 169.254.0.0/24 Stack members... Member Mac Address 2 00:A0:C8:02:CF:C0 3 00:A0:C8:00:8C:20 # Member Mac Address Mgmt IP Address Source Interface State
State Up Up
Specifies the stack member's Unit ID. Specifies the stack member's medium access control (MAC) address. Specifies the stack member's IP address. Specifies the interface that the stack member was learned from. Specifies the stack members state: Up (member is up and functioning properly); Down (member was at one time functioning, but contact has been lost); Waiting (waiting for the unit to register; when registered, it will be added to the stack); Denied (the unit could not be added to the stack because the stack protocol versions were not compatible).
The following example displays the configuration of the switch stack while in stack-member mode: >enable #show stack Stack mode is STACK-MEMBER My Unit ID is 3, management Vlan is 2386 Stack management network is 169.254.0.0/24 Stack Master info: Master is Switch, learned via giga-eth 0/1 IP address is 169.254.0.1, MAC address is 00:DE:AD:00:65:83 #
60000CRG0-35B
704
The following example displays all units that have registered with this stack-master: >enable #show stack candidates Displaying all known Stack candidates... MAC Address System Name 00:A0:C8:00:8C:20 LabSwitch1 00:A0:C8:00:F5:6C LabSwitch2 00:A0:C8:02:CF:C0 LabSwitch3 #
60000CRG0-35B
705
show startup-config
Use the show startup-config command to display a text printout of the startup configuration file stored in nonvolatile random access memory (NVRAM). Variations of this command include:
show startup-config show startup-config checksum
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
checksum Optional. Displays the message digest 5 (MD5) checksum of the units startup configuration.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
This command is used in conjunction with the show running-config checksum command to determine whether the configuration has changed since the last time it was saved.
Usage Examples
The following is sample output of the show startup-config command: >enable #show startup-config ! ! no enable password ! ip subnet-zero ip classless ip routing !
60000CRG0-35B
706
Command Reference Guide event-history on no logging forwarding logging forwarding priority-level info no logging email ! ip policy-timeout tcp all-ports 600 ip policy-timeout udp all-ports 60 ip policy-timeout icmp 60 ! ! ! interface eth 0/1 speed auto no ip address shutdown ! interface dds 1/1 shutdown ! interface bri 1/2 shutdown ! ! ip access-list standard MatchAll permit host 10.3.50.6 permit 10.200.5.0 0.0.0.255 ! ! ip access-list extended UnTrusted deny icmp 10.5.60.0 0.0.0.255 any source-quench deny tcp any any ! no ip snmp agent ! ! !
60000CRG0-35B
707
show switchports
Use the show switchports command to display switchport information. Variations of this command include:
show switchports show switchports vlans
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
vlans Optional. Displays the switchport vlan membership.
Default Values
No default values are necessary for this command.
Command History
Release 17.5 Command was introduced.
Usage Examples
The following is sample output from the show switchports command: >enable #show switchports Name: swx 0/1 Switchport: enabled Administrative Mode: access Negotiation of Trunking: access Access Mode VLAN (configured): 1 Trunking Native Mode VLAN: 1 Trunking VLAN Enabled: 1-4094 Trunking VLAN GVRP Fixed: none Port Expiration: disabled Port Security: disabled Protected: false
60000CRG0-35B
708
Command Reference Guide Name: swx 0/2 Switchport: enabled Administrative Mode: access Negotiation of Trunking: access Access Mode VLAN (configured): 1 Trunking Native Mode VLAN: 1 Trunking VLAN Enabled: 1-4094 Trunking VLAN GVRP Fixed: none Port Expiration: disabled Port Security: disabled Protected: false
60000CRG0-35B
709
show system
The show system command shows the system version, timing source, power source, and alarm relay status. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output for the show system command: >enable #show system ADTRAN, Inc. OS version 07.00.20 Checksum: 3B2FCC0F, built on Tue Jun 01 13:36:36 2004 Boot ROM version 07.00.20 Checksum: 604D, built on: Tue Jun 01 13:59:11 2004 Copyright (c) 1999-2004, ADTRAN, Inc. Platform: Total Access 900 Serial number TechPub Flash: 8388608 bytes DRAM: 33554431 bytes ICP uptime is 0 days, 0 hours, 53 minutes, 50 seconds System returned to ROM by External Hard Reset Current system image file is 070020.biz Boot system image file is 070020.biz Power Source: AC Primary System clock source config: t1 0/1 Secondary System clock source config: t1 0/1 Active System clock source: t1 0/1
60000CRG0-35B
710
Default Values
No default values are necessary for this command.
Command History
Release 17.6 Command was introduced.
Usage Examples
The following is sample output for the show system mtu command: >enable #show system mtu MTU size is 9216 bytes
60000CRG0-35B
711
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output for the show tacacs+ statistics command: >enable #show tacacs+ statistics Packets sent: Invalid responses: Timeouts: Average delay: Maximum delay: Socket Opens: Socket Closes: Socket Aborts: Socket Errors: Socket Timeouts: Socket Failed Connections: Socket Packets Sent: Socket Packets Received: Authentication 0 0 0 0ms 0ms 0 0 0 0 0 0 0 0 Authorization 0 0 0 0ms 0ms Accounting 0 0 0 0ms 0ms
60000CRG0-35B
712
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
<control block> realtime Optional. Specifies a particular TCP control block for more detailed information. Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 4.1 Release 10.1 Release 17.1 Command was introduced. The realtime display parameter was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
713
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
Usage Examples
The following is a sample from the show tcp info command: >enable #show tcp info TCP TCB Entries ID STATE LSTATE 0 FREE FREE 1 LISTEN FREE 2 LISTEN FREE 3 LISTEN FREE 4 LISTEN FREE 5 FREE FREE --MORE--
FLAGS 0 0 0 0 0 0
RPORT 0 0 0 0 0 0
LPORT 0 21 80 23 5761 0
SWIN 0 0 0 0 0 0
SRT 0 0 0 0 0 0
60000CRG0-35B
714
show tech
Use the show tech command to save technical information to a file named showtech.txt. Variations of this command include:
show tech show tech terminal
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
terminal Optional. Displays the showtech.txt file output to the terminal screen in real time.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
The show tech command runs a script that creates a showtech.txt file in flash memory that contains the command output from the following show commands:
show version show modules show flash show cflash show running-config verbose show interfaces show atm pvc
60000CRG0-35B
715
Command Reference Guide show dial-backup interfaces show frame-relay lmi show frame-relay pvc show ip bgp neighbors show ip bgp summary show ip ospf neighbor show ip ospf summary-address show ip mroute show ip bridge show spanning-tree show ip interfaces show connections show arp show ip traffic show tcp info show ip protocols show ip route show ip access-lists show event-history show output-startup show processes cpu show buffers show buffers users show memory heap show debugging
Usage Examples
The following example creates a showtech.txt file and displays it to the terminal screen: >enable #show tech Opening and applying file..... Done.
60000CRG0-35B
716
show temperature
Use the show temperature command to display the unit temperature. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 7.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output from the show temperature command: >enable #show temperature Temperature: 33 degrees C
60000CRG0-35B
717
show thresholds
Use the show thresholds command to display thresholds currently crossed for all DS1 interfaces. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output of the show thresholds command. >enable #show thresholds t1 1/1: SEFS 15 min threshold exceeded UAS 15 min threshold exceeded SEFS 24 hr threshold exceeded UAS 24 hr threshold exceeded t1 1/2: No thresholds exceeded
60000CRG0-35B
718
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is sample output for this command: >enable #show toneservices resources DSP Channel Type Port Status ------------------------------------------------------------0/1 1 RTP N/A Available 0/1 2 RTP N/A Available 0/1 3 RTP N/A Available 0/1 4 RTP N/A Available 0/1 5 RTP N/A Available 0/1 6 RTP N/A Available 0/1 7 RTP N/A Available 0/1 8 RTP N/A Available 0/1 9 RTP N/A Available 0/1 10 RTP N/A Available 0/1 11 RTP N/A Available 0/1 12 RTP N/A Available 0/1 13 RTP N/A Available
60000CRG0-35B
719
show track
Use the show track command to display track object configuration and statistics. Refer to Network Monitor Track Command Set on page 2629 for information on configuring track objects. Variations of this command include the following:
show track show track <name> show track <name> realtime
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
<name> realtime Optional. Displays information only for the track object specified. Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
60000CRG0-35B
720
Usage Examples
The following is sample output of the show track command: >enable #show track track_1 Current State: PASS Dampening Interval: 30 seconds Test Value: probe_A (PASS) AND probe_B (FAIL) Track Changes: 3 Time in current state: 25 days 2 hours, 34 minutes, 32 seconds
60000CRG0-35B
721
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
<number> realtime Optional. Specifies ID of session to display. Valid range is 0 to 31. Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release 10.1 Release 17.1 Command was introduced. The realtime display parameter was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
60000CRG0-35B
722
Usage Examples
The following example shows sample output from the show udp info command: >enable #show udp info UDP Session Entries ID Local Port IP Address ----------------- ----------------2 520 0.0.0.0 3 0 0.0.0.0 4 161 0.0.0.0 5 8 127.0.0.1 6 10 0.0.0.0 7 6 127.0.0.1 8 4 127.0.0.1 9 14 127.0.0.1 10 12 127.0.0.1
Socket ----------1 4 5 7 11 16 17 18 19
60000CRG0-35B
723
Default Values
No default values are necessary for this command.
Command History
Release 17.8 Command was introduced.
Usage Examples
The following is sample output from the show usb attached-devices command: >enable #show usb attached-devices USB Device attached VendorID: 1410 ProductID: 6000 DeviceClass: 0x2 (Communications) Manufacturer: Novatel Wireless Inc. Product: Novatel Wireless CDMA Serial Number: 091138075581000 Slot/Port: 1/1 Number of Endpoints: 13
60000CRG0-35B
724
Endpoints: 1 INTERRUPT IN, 2 BULK IN, 2 BULK OUT, 4 BULK IN, 4 BULK OUT, 9 BULK IN, 9 BULK OUT, 10 BULK IN, 10 BULK OUT, 5 BULK IN, 6 BULK OUT, 7 BULK IN, 8 BULK OUT The following is sample output from the show usb attached-devices command if an unknown device is attached to the 3G USB NIM: >enable #show usb attached-devices USB Device attached VendorID: 1457 ProductID: 1544 DeviceClass: 0x7 (Printer) Manufacturer: Unknown Product: Unknown Serial Number: Unknown Slot/Port: 1/1 Number of Endpoints: 0 Endpoints: The following is sample output from the show usb attached-devices command if no USB device is attached to the 3G USB NIM: >enable #show usb attached-devices No USB Device attached
60000CRG0-35B
725
show users
Use the show users command to display the name (if any) and state of users authenticated by the system. Variations of this command include:
show users show users realtime
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
realtime Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 10.1 Release 17.1 Command was introduced. The realtime display parameter was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
60000CRG0-35B
726
Connection location (for remote connections, this includes Transmission Control Protocol (TCP) information) User name of authenticated user Current state of the login (in process or logged in) Current enabled state Time the user has been idle on the connection
Usage Examples
The following is a sample of show users output: >enable #show users - CONSOLE 0 'adtran' logged in and enabled Idle for 00:00:00 - TELNET 0 (172.22.12.60:3998) 'password-only' logged in (not enabled) Idle for 00:00:14 - FTP (172.22.12.60:3999) 'adtran' logged in (not enabled) Idle for 00:00:03
60000CRG0-35B
727
show version
Use the show version command to display the current ADTRAN Operating System (AOS) version information. The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following is a sample show version output: >enable #show version AOS version: 02.01.00 Checksum: 1505165C Built on: Fri Aug 23 10:23:13 2002 Upgrade key: 420987gacs9097gbdsado BootROM version: 02.01.00 Checksum: DB85 Built on: Mon Aug 19 10:33:03 2002 Copyright 1999-2002 ADTRAN Inc. Serial number b104 Router uptime is 0 days 3 hours 9 minutes 54 seconds System returned to ROM by External Hard Reset System image file is 020100.biz
60000CRG0-35B
728
show vlan
Use the show vlan command to display current virtual local area network (VLAN) information. Variations of this command include:
show vlan show vlan brief show vlan brief realtime show vlan id <vlan id> show vlan id <vlan id> realtime show vlan name <name> show vlan name <name> realtime show vlan realtime
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
brief id <vlan id> name <name> realtime Optional. Shows an abbreviated version of the VLAN information (brief description). Optional. Shows information regarding a specific VLAN, specified by a VLAN interface ID (valid range: 1 to 4094). Optional. Shows information regarding a specific VLAN, specified by a VLAN interface name (up to 32 characters). Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
60000CRG0-35B
729
Command History
Release 5.1 Release 10.1 Release 15.1 Release 17.1 Command was introduced. The realtime display parameter was introduced. The realtime display parameter was added to show vlan id and show vlan name. Command was expanded to include the modifiers begin, exclude, and include.
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
Usage Examples
The following is a sample show vlan output: >enable #show vlan VLAN ------------------1
Name -------------------Default
Status Ports -------------- ----------active eth 0/5, eth 0/6, eth 0/8, eth 0/13, eth 0/14, eth 0/15, eth 0/16, eth 0/17, eth 0/18, eth 0/19, eth 0/20, eth 0/21, eth 0/22, eth 0/23, eth 0/24, giga-eth 0/1, giga-eth 0/2 active active MTU -------------1500 1500 eth 0/1, eth 0/2 eth 0/3, eth 0/4, eth 0/7, eth 0/9, eth 0/10, eth 0/11, eth 0/12
2 3 VLAN ------------------1 2 3
60000CRG0-35B
730
The following is an example of the show vlan name command that displays VLAN 2 (accounting VLAN) information: >enable #show vlan name accounting Name VLAN ------------------- ----------------2 accounting VLAN Type ------------------- ----------------2 enet Status ------------active MTU ------------1500 Ports ---------------eth 0/1, eth 0/2
60000CRG0-35B
731
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
global group system user Optional. Displays global aliases. Optional. Displays group aliases. Optional. Displays system aliases. Optional. Displays user aliases.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example shows sample output from the show voice alias command: >enable #show voice alias Alias Translation Type ----------------- --------------- -----------------MyAlias 4433 Global Total Displayed: 1
60000CRG0-35B
732
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays FXS ports that are not associated with a user: >enable #show voice available Interface ------------fxs 0/1 fxs 0/2
60000CRG0-35B
733
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
all session <number> Displays current status of all local conference sessions. Displays current status of the specified local conference session.
Default Values
No default values are necessary for this command.
Command History
Release A2 Command was introduced.
Usage Examples
The following example displays information about all local active conference sessions: >enable #show voice conference local all ID ---1 2 Originator (FXS) ---------------------2001 (0/1) 2004 (0/4) Remote1 -------------------T01 (2565551234) 2002 (FXS 0/2) Remote2 -------------------T02 (2568675309) 3001 (SIP) RtpRsrc ------------0/1.(1,2,3) 0/2.(1,4,5)
The following example only displays information for local conference session 2: >enable #show voice conference local session 2 ID ---2 Originator (FXS) -------------------2004 (0/4) Remote1 -------------------2002 (FXS 0/2) Remote2 -------------------3001 (SIP) RtpRsrc ---------------0/2.(1,4,5)
60000CRG0-35B
734
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<number> Optional. Displays information about a specific number display template.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays information about number display template 1: >enable #show voice dial-plan 1 Type ID Pattern -----------------------------------------------------------------Always Permitted 1 NXXNXXXXXX
60000CRG0-35B
735
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
groups other users Optional. Displays all DID entries for ring groups. Optional. Displays all nonuser and nonring group DID entries. Optional. Displays all DID entries for users.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays DID entries for ring groups: >enable #show voice did groups
60000CRG0-35B
736
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<name> Optional. Specifies the name on the directory to display. Only extensions included in the specified directory will appear.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 14.1 Release 17.1 Command was introduced. Command was expanded. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays all extensions sorted by extension number: >enable #show voice directory Directory Name: SYSTEM User Name External Extension -----------------------------------------------------John Smith 5006 Jane Doe 5005 Directory Name: Engineering User Name External Extension -------------------------------------------------------John Doe Yes 5551212
60000CRG0-35B
737
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example shows sample output from the show voice door-phone command: >enable #show voice door-phone First Last Ext Interface Description ------------------------------------------------------------------------------------Front Door 4430 virtual Front Door of Building
60000CRG0-35B
738
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays all extensions and the status of the extension: >enable #show voice extension AccountID Idle/Ring/Busy Available DND FWD --------------------------------------------------------------------------------------T01 Idle * T06 Idle * T02 Idle * 5200 Idle * 6000 Idle * 6001 Idle * 6002 Idle * 6003 Idle * T03 Idle * 2 Idle * 1234 Idle * -
60000CRG0-35B
739
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays all voice trunk groups: >enable #show voice grouped-trunk Name Resource-Selection Description --------------------------------------------------------------------------SIP linear SIP trunk DSX linear DSX trunk DXS linear DXS trunk
60000CRG0-35B
740
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<station> Optional. Displays a specific voice line station name or extension on the system base on the valid voice line descriptors entered into the system.
Default Values
No default values are necessary for this command.
Command History
Release 15.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example shows sample output from the show voice line command: >enable #show voice line Line: 4444 Trunk: not configured Registered Endpoints: 0 Call State: IDLE Active Endpoints: N/A DSP Resource: N/A Line: Sales Trunk: not configured Registered Endpoints: 0 Call state: IDLE --MORE--
60000CRG0-35B
741
Default Values
No default values are necessary for this command.
Command History
Release A1 Command was introduced.
Usage Examples
The following example displays all voice loopback calls: >enable #show voice loopback calls ID Extension Codec Status Number Duration ------------------------------------------------------------------------------------------------------------------------ (hour:min:sec) 1 1123 <ENDED (invalid number) -> 8837655 :01 2 1123 Calling -> 4001 :05 3 1123 <ENDED (no appearances) <- 4001 :01 4 1123 G729 Connected -> 4001 :07
60000CRG0-35B
742
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<number> notify-schedule <number> Optional. Displays voice mail information for the specified users extension. Optional. Displays the voice mail notification schedule for the specified users extension.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example shows sample output from the show voice mail command: >enable #show voice mail New Num Total Time Total Time Greeting AccountID VM COS Msg Msg Used Free Time -------------------------------------------------------------------------------------------------------------------------------------------1000 00:00:00 00:00:00 00:00 2000 00:00:00 00:00:00 00:00 2001 normal_voicemail 38 38 00:09:54 00:00:06 00:02 2002 normal_voicemail 40 40 00:09:49 00:00:11 00:02 2003 normal_voicemail 39 39 00:09:54 00:00:06 00:02 2004 normal_voicemail 35 35 00:09:55 00:00:05 00:01
60000CRG0-35B
743
Command Reference Guide 2005 2006 2015 2016 2017 2018 2019 2020 0 normal_voicemail normal_voicemail normal_voicemail executive_voi... executive_voi... normal_voicemail normal_voicemail executive_voi... 20 41 42 74 75 34 35 73 20 41 42 74 75 34 35 73 00:09:28 00:09:54 00:09:57 00:18:11 00:11:03 00:09:38 00:09:42 00:20:41 00:00:00 00:00:32 00:00:06 00:00:03 00:11:49 00:18:57 00:00:22 00:00:18 00:09:19 00:00:00
Enable Mode Command Set 00:01 00:02 00:01 00:02 00:01 00:01 00:01 00:01 00:00
The following is sample output for the show voice mail <number> command for extension 2017: >enable #show voice mail 2017 Voicemail information for account:?:5T VM Class of Service: executive_voicemail Standard Greeting: 00:09 Total Voicemail Usage: Alternate Greeting: 00:10 Total Voicemail Free: Recorded Name: 00:01 Message 1 of 75 Time/Date: 00:28:16 CST Sun Feb 07 2106 Calling Party: UNKNOWN (UNKNOWN) Length: 00:00 Status: Old The following is sample output for the show voice mail notify-schedule <number> command for extension 2017: >enable #show voice mail notify-schedule 2017 Start End Email1 Email2 --------------------------------------------------------------------------------------------Sun 12:00 am Mon 7:59 am ------Mon 8:00 am Thu 11:59 pm Yes ---Fri 12:00 am Sat 11:59 pm -------
00:11:04 00:18:56
60000CRG0-35B
744
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
match ani <template> Displays all substitution configurations. Optional. Displays a specific ANI substitution entry.
Default Values
No default values are necessary for this command.
Command History
Release A2 Command was introduced.
Functional Notes
Examples and rules of use. MATCH # 1. 256-963-XXXX 2. NXX-NXX-XXXX 3. $ SUBST # 9-963-XXXX 9-1-NXX-NXX-XXXX 9$
MATCH Number Rules 1. All , characters are ignored. 2. All [ and ] brackets must match and contain numbers only [123]. 3. If using a $ wildcard, it is the only character allowed. 4. X matches [0-9], N matches [2-9].
60000CRG0-35B
745
Usage Examples
The following example displays voice substitution information: >enable #show voice match ani match: 2323 substitute: 5555
60000CRG0-35B
746
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example displays music on hold player statistics: >enable #show voice music-on-hold statistics MOH Player System MOH Player System # Codec PCMU NumRegApps 1 IpAddress 10.17.20.38 Codec PCMU Port 3002 Play Status Playing
60000CRG0-35B
747
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<name> Optional. Displays information about a specific named digit timeout.
Default Values
No default values are necessary for this command.
Command History
Release A2 Command was introduced.
Usage Examples
The following example displays all named digit timeouts and their timeout value: >enable #show voice named-digit-timeouts Name Timeout Value (secs) -------------------------------------------------------------------------------default 4 long 10 longer 12 longest 16 short 6 shorter 5 shortest 2
60000CRG0-35B
748
Default Values
No default values are necessary for this command.
Command History
Release 14.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays all operator groups: >enable #show voice operator-group Operator-group: 0 Call distribution type: all Number of calls allowed: 1 Number of rings before coverage: 4 Extension Firstname Lastname Logged In ------------------------------------------------------------------------------------2001 John Smith * Order # of Rings Call Coverage Action --------------------------------------------------------------------1 0 Auto Attendant 2 2 None 3 2 None 4 2 None 5 2 None
60000CRG0-35B
749
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example shows sample output from the show voice phone-files command: >enable #show voice phone-files 03/02/2006 16:03 PM 216 0004f203f69c.cfg 03/02/2006 16:03 PM 687 5001-0004f203f69c.cfg 03/02/2006 16:03 PM 216 0004f203b0d6.cfg 03/14/2006 16:03 PM 306 polycom.cfg 7 File(s) 132516 bytes 0 Dir(s) 0 bytes 21019575 bytes used, 9720360 available, 30739935 total
60000CRG0-35B
750
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<name> Optional. Specifies a particular call pickup group to display.
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following is sample output from the show voice pickup-group command: (config)#show voice pickup-group Pickup Group: Group1 Description: 4th floor sales Pickup Group Extension: 8508 Members Firstname Lastname ----------------------------------------------0330 Vickie Spinaker 2003 Marc Starkalous 2013 Patrick Wales 2007 Drew Lever 2006 Sarah Williams 1012 Jessica Thomas
60000CRG0-35B
751
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Using the realtime argument for this command can adversely affect the performance of your unit.
Syntax Description
active <ID> realtime Displays all quality statistics for active calls. Specifies an identity number of a call to obtain detailed statistics. Optional. Displays full-screen output in real time. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
60000CRG0-35B
752
Functional Notes
Use the realtime argument for this command to display full-screen output in real time. Information is continuously updated on the console until you either freeze the data (by pressing the F key) or exit realtime mode (by pressing Ctrl-C). If there is not enough room on the screen for all available data, the information will truncate at the bottom of the screen. In order to maximize the amount of data displayed, increase the terminal length (using the terminal length command; refer to terminal length <number> on page 781).
Usage Examples
The following example displays voice quality statistics for all active calls: >enable #show voice quality-stats active Start Lost Discard Delay ID Time From To Duration Codec Pkts Pkts Avg Max -------------------------------------------------------------------------------------------------------------------------------------------4236 3:02 pm 5152222 5157744 6:55 G711 2 0 50 50
60000CRG0-35B
753
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<extension> detail Optional. Specifies the extension of the call queue to display. Optional. Displays detailed call queue information.
<Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example displays status information for the call queue at extension 6407: >enable #show voice queue 6407 Call Queue: 6407 Call distribution type: ring-all Name: TSqueue Description: Tech Support Call Queue Max allowed number of queued calls: 16 Operation: active State: unlocked Current queue stats: Calls: 1
60000CRG0-35B
754
Command Reference Guide Longest Wait: 30 24 Hour Stats: calls queued: 87 calls Abandoned: 1 longest wait time: 30
Members Firstname Lastname Logged In ---------------------------------------------------------------------------------------------------------------------------------2013 Patrick Wales * 2004 John Taylor * 2003 Marc Starkalous *#
60000CRG0-35B
755
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<number> Optional. Displays information about a specific ring group extension.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays all ring groups: >enable #show voice ring-group ring-group 1234 type: linear description: Number of calls allowed: 1 First Last Ext Logged In -----------------------------------------------------------------------Order NumRings Action -----------------------------------------------------------------------1 2 None 2 2 None 3 2 None 4 2 None 5 2 None
60000CRG0-35B
756
Command Reference Guide ring-group 2 type: linear description: Number of calls allowed: 1 First Last Ext Logged In -----------------------------------------------------------------------Order NumRings Action -----------------------------------------------------------------------1 2 None 2 2 None 3 2 None
60000CRG0-35B
757
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<number> Optional. Displays information about a specific speed dial number. Valid range is 1 to 99.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays information on speed dial number 50: >enable #show voice speed-dial 50 speed-dial - ID: 50 Name: Main Office Number: 4000
60000CRG0-35B
758
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
local network Displays all SPRE codes used locally. Displays all SPRE codes passed through to the network.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays all local SPRE codes: >enable #show voice spre local Current SPRE Handling Mode: Local SPRE Code Description ------------------------------------------------------------------------------------------------------------------** Hands Free Auto-Answer *20n System Mode 0=Deflt, 1=Night, 2=Wknd, 3=Lunch, 7=Override *22xxxx Billing Code *35 Call Forward Cancel *36xxxx*pppp* Remote Call Forward Cancel *39x Do Not Disturb Enable/Disable
60000CRG0-35B
759
Command Reference Guide *44 *46xxxx*pppp* *47pppp* *55xxxx* *56xxxx* *57pppp *58pppp *63xxxx*pppp* *69 *70[pw-old]*[pw-new]* *78z *85xxxx *88 *90xxxx *97x
Enable Mode Command Set Permanent Hold Hotel Login Hotel Logout Group Login Group Logout User Station Lock User Station Unlock MACA Login Call Return Set Account Password Call Park Retrieve Set Message Waiting Transfer Class of Service Override (xxxx=Override Passcode) Auto-Answer Do Not Disturb
60000CRG0-35B
760
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
<name> Optional. Displays all users within the specified status group.
Default Values
No default values are necessary for this command.
Command History
Release 14.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays all voice status group extensions: >enable #show voice status-group Status-group: Sales Team Description: Type Member ID Display Name -----------------------------------------------------------user 2001 Martha user 3002 Dan user 3003 Betty user 3004 Chris user 4001 Jami Number of members: 5
60000CRG0-35B
761
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays all voice switchboard extensions: >enable #show voice switchboard Ext ---1234 2 5200 6000 6001 6002 6003
60000CRG0-35B
762
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
[sunday - saturday] Optional. Displays the specified system mode programmed in the unit. Choose from Sunday through Saturday.
Default Values
No default values are valid for this command.
Command History
Release A1 Command was introduced.
Usage Examples
The following example shows sample output from the show voice system-mode monday command: >enable #show voice system-mode monday Current system-mode: default System-mode transition - Day: monday Mode @ time: lunch @ 12:00 Mode @ time: default @ 13:00 Mode @ time: night @ 17:00
60000CRG0-35B
763
The following example shows sample output from the show voice system-mode command: >enable #show voice system-mode Current system-mode: weekend
60000CRG0-35B
764
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
connects <trunk id> Optional. Displays all trunk voice interface connections. Optional. Displays voice trunk information for a specific trunk ID. Use T01, T02, and so on for the trunk ID.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example displays all voice trunks: >enable #show voice trunk Busy Busy Busy Non Busy Busy Non Busy Trunk Resource Admin. Admin. Attempts Attempts Attempts Attempts Name Selection Config. Status Today Today Total Total -------------------------------------------------------------------------------------------------------------------------------------------T01 linear Not Busy Not Busy 0 0 0 7 T06 linear Not Busy No Connects 0 0 0 0 T02 linear Not Busy Not Busy 0 0 0 27 T03 linear Not Busy No Connects 0 0 0 0
60000CRG0-35B
765
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
did extension last location Optional. Displays all users included in the directory. Optional. Displays directory entries sorted by extensions. Optional. Displays directory entries sorted by last name. Optional. Displays the location of users in the directory.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 14.1 Release 17.1 Release A4.03 Command was introduced. Command was expanded. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the location parameter.
Usage Examples
The following example displays all voice users: >enable #show voice users First Last Ext Interface Description -------------------------------------------------------------------------------------------Janet Smith 5200 virtual Bill Jones 6000 virtual
60000CRG0-35B
766
Command Reference Guide Sam Eve Bob Sampson Smith Wilson 6001 6002 6003 virtual virtual virtual
60000CRG0-35B
767
Default Values
No default values are necessary for this command.
Command History
Release 15.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example shows sample output from the show voice users sip command: >enable #show voice users sip First Last Extension Interface MAC Address IP Address ----------------------------------------------------------------------------------------------------------------------Fronia Cobins 4430 Unregistered user - Unable to resolve port Gorge Owens 4440 Unregistered user - Unable to resolve port Heather Virginia 4450 Unregistered user - Unable to resolve port Total number of configured SIP voice users: 3
60000CRG0-35B
768
Default Values
No default values are necessary for this command.
Command History
Release A2.04 Command was introduced.
Functional Notes
The information displayed in the show command output consists of two columns. The left column lists the host name of an entry in the VoIP Name Service Name Table. This corresponds with the entries shown in the output of the command show voip name-service name-table on page 770. The right column shows the corresponding last resolved IP address(es) of the entry. An IP address of all zeros indicates the particular host has not been resolved. In the event all domain naming system (DNS) servers are unreachable and a particular host name cannot be refreshed, the DNS uses the cached address to resolve the particular host.
Usage Examples
The following example displays name service information stored in the cache: >enable #show voip name-service cache Name Last Resolved Address ---------------------------------------------------------------------------------------------------test2.pprice.voice.test.adtran.com 1.2.3.3 bogus3.pprice.voice.test.adtran.com 1.2.3.3 test.pprice.voice.test.adtran.com 0.0.0.0 bogus1.pprice.voice.test.adtran.com 1.2.3.1 bogus2.pprice.voice.test.adtran.com 1.2.3.2
60000CRG0-35B
769
Default Values
No default values are necessary for this command.
Command History
Release A2 Command was introduced.
Functional Notes
The following information is displayed in the show command output: Name - Indicates the name of the service. Proto - Indicates the protocol. Tpt - Indicates the transport method used, either User Datagram Protocol (UDP) or Transmission Control Protocol (TCP). LastSrc - Indicates the last software object that requested this domain naming system (DNS) entry be cached. Valid options are trunk, route, manual, proxy, MGCP, or derived. Interval - Indicates when the entry will expire. Users - Indicates the number of software objects using this entry. Resolved - Indicates whether or not the DNS has been able to resolve this entry.
Usage Examples
The following example displays name service information in the name table: >enable #show voip name-service name-table
60000CRG0-35B
770
Name Proto Tpt LastSrc Interval Users Resolved -------------------------------------------------------------------------------------------------------------------------------------------pq.adtran.com SIP UDP trunk 0h 59m 47s 2 Yes bw2.pq.adtran.com SIP UDP trunk 0h 59m 46s 2 Yes
Technology Review
VoIP name service maintains a list of service names relevant to VoIP transactions while also facilitating access between VoIP-related queries to the external DNS server and the internal DNS client. Service names are automatically entered and deleted from the internal service name table when configured or not configured for VoIP-related subsystems. The VoIP name service begins polling external DNS servers for recently added service names to preemptively resolve service names before they are deleted. Using the show voip name-service name-table command will show the status of added service names.
60000CRG0-35B
771
show vrf
Use the show vrf command to display the configured VPN routing and forwardings (VRFs) and the interfaces associated with each one (or a specific VRF). Variations of this command include:
show vrf show vrf <name> show vrf interfaces show vrf interfaces <name>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81.
Syntax Description
<name> interfaces Optional. Displays information for only the specified VRF. Optional. Displays information about interfaces associated with all configured VRFs.
Default Values
No default values are necessary for this command.
Command History
Release 16.1 Release 17.1 Release 17.8 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include. The keyword ip was removed from this command.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
60000CRG0-35B
772
Usage Examples
The following is a sample output for the show vrf command: >enable #show vrf Name -DefaultEngineering Accounting
The following is a sample output for the show vrf interfaces command: >enable #show vrf interfaces Interface IP Address eth 0/1 10.0.0.1 ppp 1 10.0.1.1 vlan 11 1.1.1.1 vlan 12 1.1.2.1 vlan 21 2.1.1.1
VRF
Protocol DOWN UP UP UP UP
60000CRG0-35B
773
show vrrp
Use the show vrrp command to display configuration and operating data for Virtual Router Redundancy Protocol (VRRP) configurations. Variations of this command include:
show vrrp show vrrp brief show vrrp interface <interface> show vrrp interface <interface> group <number> show vrrp statistics show vrrp statistics interface <interface> show vrrp statistics interface <interface> group <number>
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
brief group <number> interface <interface> Optional. Limits the amount of data shown. Optional. Displays data or statistics for a specified VRRP group on the specified interface. Group numbers range from 1 to 255. Optional. Displays data or statistics for all VRRP groups or a specified group on the specified interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a virtual local area network (VLAN) interface, use vlan 1. Type show vrrp interface ? for a complete list of valid interfaces. Optional. Displays statistics for all VRRP groups on all interfaces.
statistics
Default Values
No default values are necessary for this command.
Command History
Release 16.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface and the Gigabit Switchport interface.
60000CRG0-35B
774
Functional Notes
Although VRRP group virtual router identifiers (VRIDs) can be numbered between 1 and 255, only two VRRP routers per interface are supported.
Usage Examples
The following example gives sample output from the show vrrp statistics command: eth 0/1 Group 1 Became Master: 3 Priority Zero Packets Sent: 1 Priority Zero Packets Received: 0 Advertisements Sent: 105134 Advertisements Received: 241 Advertisements Interval Errors: 0 Advertisements TTL Errors: 0 Advertisements Address List Errors: 0 Advertisements Packet Length Errors: 0 Group 2 Became Master: 1 Priority Zero Packets Sent: 0 Priority Zero Packets Received: 0 Advertisements Sent: 897 Advertisements Received: 1628 Advertisements Interval Errors: 0 Advertisements TTL Errors: 0 Advertisements Address List Errors: 0 Advertisements Packet Length Errors: 0
60000CRG0-35B
775
sip check-sync
Use the sip check-sync command to send a check-sync notification to all IP phones registered to the unit. When an IP phone receives this check-sync notification, the phone will check for possible configuration changes stored on the server. Variations of this command include the following:
sip check-sync sip check-sync firmware-upgrade sip check-sync <user name or ip address>
Syntax Description
firmware-upgrade <user name or ip address> Optional. Specifies a check-sync to be used when upgrading phone firmware. Optional. Specifies the phone to contact with configuration changes.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example notifies all IP phones to check for a change in configuration: >enable #sip check-sync
60000CRG0-35B
776
telnet
Use the telnet command to open a Telnet session (through AOS) to another system on the network. Variations of this command include the following:
telnet <ip address | hostname> telnet <ip address | hostname> port <tcp port> telnet vrf <name> <ip address | hostname> telnet vrf <name> <ip address | hostname> port <tcp port>
Syntax Description
<ip address | hostname> port <tcp port> vrf <name> Specifies the IP address or host name of the remote system. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the Transmission Control Protocol (TCP) port number to be used when connecting to a host through Telnet. Range is 1 to 65535. Optional. Specifies the VPN routing and forwarding (VRF) where the IP address or host name exists.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 14.1 Release 16.1 Command was introduced. Command was expanded to specify the port number. Command was expanded to include the vrf parameter.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example opens a Telnet session with a remote system (10.200.4.15): >enable #telnet 10.200.4.15 User Access Login: Password:
60000CRG0-35B
777
The following example opens a Telnet session with a remote system (10.200.4.15) on port 8010: >enable #telnet 10.200.4.15 port 8010 User Access Login: Password:
60000CRG0-35B
778
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Command was introduced.
Functional Notes
This command is only available when in stack-master mode.
Usage Examples
The following example Telnets to a member of the stack: >enable #telnet stack-member 3 Trying Stack Member 3...Press Ctrl+C to abort
60000CRG0-35B
779
Default Values
No default values are necessary for this command.
Command History
Release 16.1 Command was introduced.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example opens a Telnet session with stack-member 3 of the VRF red: >enable #telnet vrf red stack-member 3 Trying Stack Member 3...Press Ctrl+C to abort
60000CRG0-35B
780
Default Values
The default setting for this command is 24 rows.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example sets the number of rows for a terminal session to 30. >enable #terminal length 30
60000CRG0-35B
781
traceroute
Use the traceroute command to display the IPv4 routes a packet takes to reach the specified destination. Variations of this command include:
traceroute traceroute <ip address | hostname> traceroute <ip address | hostname> source <ip address> traceroute vrf <name> <ip address | hostname> traceroute vrf <name> <ip address | hostname> source <ip address>
Syntax Description
<ip address | hostname> source <ip address> Optional. Specifies the IPv4 address or host name of the remote systems route to trace. Optional. Specifies the IPv4 address of the interface to use as the source of the trace. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the VPN routing and forwarding (VRF) where the route exists.
vrf <name>
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 16.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
The traceroute command can be issued from both the Basic and Enable modes. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following is a sample traceroute output: >enable #traceroute 192.168.0.1 Type CTRL+C to abort. Tracing route to 192.168.0.1 over a maximum of 30 hops 1 22ms 20ms 20ms 192.168.0.65 2 23ms 20ms 20ms 192.168.0.1
60000CRG0-35B
782
traceroute ethernet
Use the traceroute ethernet command to initiate a linktrace message from one Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) maintenance endpoint (MEP) to another MEP. These linktrace messages are used to trace the packet route to a destination MEP. Variations of this command include:
traceroute ethernet <target-mac-address | target-mep-id> traceroute ethernet <target-mac-address | target-mep-id> domain <domain name> association <association name> traceroute ethernet <target-mac-address | target-mep-id> domain none association <association name> traceroute ethernet <target-mac-address | target-mep-id> fdb-only traceroute ethernet <target-mac-address | target-mep-id> interface <interface> traceroute ethernet <target-mac-address | target-mep-id> mep <mep id> traceroute ethernet <target-mac-address | target-mep-id> sorted traceroute ethernet <target-mac-address | target-mep-id> timeout <timeout> traceroute ethernet <target-mac-address | target-mep-id> ttl <value>
After specifying the target for the linktrace messages, the other parameters can be entered in any order.
Syntax Description
<target-mac-address | target-mep-id> Specifies the destination for the linktrace message. Medium access control (MAC) addresses are entered in the format HH:HH:HH:HH:HH:HH. Target MEP IDs are the unique numerical values identifying MEPs. MEP IDs range from 1 to 8191. Optional. Specifies the maintenance domain to which the transmitting MEP belongs. Optional. Specifies no maintenance domain. Optional. Specifies the maintenance association to which the transmitting MEP belongs. Optional. Specifies that the maintenance points on the route only use their forwarding database, and not their continuity check message (CCM) database when deciding if/how to forward linktrace messages. Optional. Specifies the interface on which the transmitting MEP is configured. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1. For a list of appropriate interfaces, enter interface ? at the prompt.
interface <interface>
60000CRG0-35B
783
Enable Mode Command Set Optional. Specifies the MEP ID of the transmitting MEP. MEP ID range is 1 to 8191. Optional. Specifies the traceroute utility waits until all traceroute results have been received and sorted by hop count before displaying them. Optional. Specifies the time that the MEP will wait for a response to the linktrace message. Range is 0 to 60 seconds. Optional. Specifies the time to live (TTL) field of the linktrace message. Range is 0 to 255.
Default Values
By default, the timeout value is set to 5 seconds. By default, the ttl value is set to 5 seconds.
Command History
Release 17.4 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface and the Gigabit Switchport interface.
Functional Notes
The traceroute ethernet command can be issued from both the Basic and Enable modes. If the MEP ID is used as the target, the remote MEP must exist in the MEP CCM database (meaning the remote MEP is transmitting valid CCMs) so that the MEP ID can be translated to the MAC address before the linktrace message is transmitted. Both the domain <domain name> and association <association name> parameters are not required if the source MEP ID of the MEP is specified and unique through the AOS device. If the domain and association of the transmitting MEP are specified, and there is only one MEP in that domain or association, or if there is only one MEP configured on the unit, the mep <mep id> parameter is not required. For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
60000CRG0-35B
784
Usage Examples
The following example initiates the Ethernet traceroute utility from a MEP with the ID 1 to an MEP with an MEP ID of 201: >enable #traceroute ethernet 201 mep 1 Type CTRL+C to abort. TTL 255. LTM Timeout is 5 seconds Tracing route to MEPID 201 (00:10:94:00:00:06) from MEPID 1 in Domain_1/MA_1 MD Level 7, vlan 0 Traceroute sent via interface eth 0/1 -------------------------------------------------------------------------------------------------------------------------------------------Hops Mac Flags Ingress-Action Relay Action PrevHop Egress-Action -------------------------------------------------------------------------------------------------------------------------------------------1 00:10:94:00:00:00 Forwarded InNoTLV RLY_MPDB 00:A0:C8:16:96:0D EgOK 3 00:10:94:00:00:05 Forwarded InNoTLV RLY_MPDB 00:10:94:00:00:04 EgOK 2 00:10:94:00:00:04 Forwarded InNoTLV RLY_MPDB 00:10:94:00:00:00 EgOK 4 00:10:94:00:00:06 (Eg) Terminal InNoTLV RLY_HIT 00:10:94:00:00:05 Destination reached
Remember that linktrace can be a tree-structure, and is not always linear. The PrevHop for Hop 3 in the previous example tells you the MAC of Hop 2. This gives you a way to trace the linktrace message when a tree-structure exists. Refer to Section J.5 of IEEE 802.1ag for more information.
60000CRG0-35B
785
traceroute ipv6
Use the traceroute ipv6 command to display the IPv6 nodes traversed to reach the specified destination. Variations of this command include:
traceroute ipv6 <ipv6 address> traceroute ipv6 <ipv6 address> <interface> traceroute ipv6 <ipv6 address> <interface> source <ipv6 address> traceroute ipv6 <ipv6 address> source <ipv6 address> traceroute ipv6 vrf <name> <ipv6 address> traceroute ipv6 vrf <name> <ipv6 address> <interface> traceroute ipv6 vrf <name> <ipv6 address> <interface> source <ipv6 address> traceroute ipv6 vrf <name> <ipv6 address> source <ipv6 address>
Syntax Description
<interface> Optional. Specifies the egress interface when tracing a route to an IPv6 link-local address (any address that has the prefix FE80::/64). Interfaces are specified in the <interface type> <slot/port | interface id> format. For example, for an Ethernet interface, use eth 0/1. Type traceroute ipv6 <ipv6 address> ? to display a list of valid interfaces. This variable is ignored when using a non-link-local address. Specifies the IPv6 address of the remote systems route to trace. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. Entering the traceroute ipv6 command using a link-local destination address prompts the user for an egress interface. Optional. Specifies the IPv6 address to use as the source address in the probing packets. The source IPv6 address must be a valid address local to the router on the specified VPN routing and forwarding (VRF) instance. Optional. Specifies the VRF where the IPv6 address exists.
<ipv6 address>
vrf <name>
Default Values
No default values are necessary for this command.
Command History
Release 18.1 Command was introduced.
Functional Notes
The traceroute ipv6 command can be issued from both the Basic and Enable modes. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS platforms supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
60000CRG0-35B
786
Usage Examples
The following is a sample traceroute ipv6 output: >enable #traceroute ipv6 2001:DB8:1A0::3 Tracing route to over a maximum of 30 hops Type CTRL+C to abort. Legend: '!' = Success, '?' = Unknown host, '$' = Invalid host address '*' = Request timed out, '-' = Destination host unreachable 'x' = TTL expired in transit, 'e' = Unknown error 'B' = Packet too big 1 2ms 2ms 3ms 2001:DB8:0:F820::5 2 102ms 109ms 102ms 2001:DB8:1A0::3
60000CRG0-35B
787
undebug all
Use the undebug all command to disable all activated debug messages. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 2.1 Command was introduced.
Usage Examples
The following example disables all activated debug messages: >enable #undebug all
60000CRG0-35B
788
verify-file
Use the verify-file command to validate a boot image file located in a specified memory location (CompactFlash, system flash, or RAM disk). AOS initiates the validation process automatically before an image can be set as the primary boot image. This command is used as a precautionary step before erasing the primary boot image. Variations of this command include:
verify-file cflash <filename> verify-file flash <filename> verify-file ramdisk <filename>
Not all units are capable of using a RAM disk file system or have a CompactFlash card. Use the verify-file ? command to display a list of valid commands at the enable prompt.
Syntax Description
<filename> cflash flash ramdisk Specifies the name of the file to validate. Indicates the specified file is located on the CompactFlash card. Indicated the specified file is located in the system flash memory. Indicated the specified file is located in the volatile RAM disk.
Default Values
No default values are necessary for this command.
Command History
Release 17.7 Command was introduced.
Usage Examples
The following example validates the NV3120A-17-05-01-00-E.biz file (located in the volatile RAM disk) as a possible candidate for the boot system file: >enable #verify-file ramdisk NV3120A-17-05-01-00-E.biz Valid file signature
60000CRG0-35B
789
vlan database
Use the vlan database command to enter the Virtual Local Area Network (VLAN) Database Configuration mode. Refer to the section VLAN Database Command Set on page 2392 for more information. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example enters the VLAN Configuration mode: >enable #vlan database
60000CRG0-35B
790
Syntax Description
start <value> stop cancel Starts the command line interface (CLI) wizard that prompts the user for the necessary information to initiate a DSP capture. Optional. Specifies a DSP capture starting on a specific channel on DSP 0/1. The valid channel number range is 1 to 32. Stops the current DSP capture and downloads the captured files to FLASH. Cancels the current DSP capture and discards the captured files.
Default Values
By default, the DSP capture is disabled.
Command History
Release 15.1 Command was introduced.
Functional Notes
The voice DSP captures are used to help diagnose voice issues. The channel numbers for this command correspond to those seen in the show and debug commands (for example, the first channel is 1, not 0). Output is received on all console sessions notifying you of a running DSP capture or download. Closing the CLI session on which the capture was started will cancel the current capture. This method of DSP capture is valid on AOS Release 15.1 or later, replacing the en8 int voip 0/1 method.
Usage Examples
The following example starts a DSP capture: #voice dsp capture start DSP Slot [0]: 0 DSP Port [1]: 1 DSP Channel [1]:1 %Warning! Performance of this unit may be degraded during a DSP capture! Continue and start DSP Capture? [y/n] y DSP UTILITIES. Voice Capture A DSP capture is active on VoIP 0/1 on channel 1dsp capture
60000CRG0-35B
791
voice loopback-call
Use the voice loopback-call command to initiate and terminate voice loopback calls. Variations of this command include:
voice loopback-call start from <number> to <number> voice loopback-call stop account <number> voice loopback-call stop all voice loopback-call stop id <number>
Syntax Description
start from <number> to <number> stop account <number> all id <number> Starts a loopback call from the specified extension number (loopback account). Specifies the extension number to call. Stops active loopback calls. Terminates the call(s) for the specific account. Terminates all loopback calls. Terminates a specific loopback call based on the identity number of the call.
Default Values
By default, no loopback accounts are configured.
Command History
Release A1 Command was introduced.
Usage Examples
The following example starts a voice loopback call: >enable #voice loopback-call start from 5555 to 6100
60000CRG0-35B
792
wall <message>
Use the wall command to send messages to all users currently logged into the AOS unit. Syntax Description
<message> Sends a message to all users logged into the command line interface (CLI).
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example sends the message Reboot in 5 minutes if no objections to the CLI screen of everyone currently connected: >enable #wall Reboot in 5 minutes if no objections
60000CRG0-35B
793
write
Use the write command to save the running configuration to the units nonvolatile random access memory (NVRAM) or a Trivial File Transfer Protocol (TFTP) server. Also, use the write command to clear NVRAM or to display the running configuration on the terminal screen. Entering the write command with no other arguments copies your configuration changes to the units NVRAM. Once the save is complete, the changes are retained even if the unit is shut down or suffers a power outage. Variations of this command include:
write write dynvoice-config write erase write memory write network write terminal
Syntax Description
dynvoice-config erase memory network terminal Optional. Writes dynvoice configuration information to the units NVRAM. Optional. Erases the configuration files saved to the units NVRAM. Optional. Saves the current configuration to NVRAM. Optional. Saves the current configuration to the network TFTP server. Optional. Displays the current configuration on the terminal screen.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example saves the current configuration to the units NVRAM: >enable #write memory
60000CRG0-35B
794
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. aaa accounting commands begin on page 802 aaa authentication commands begin on page 810 aaa authorization commands begin on page 822 aaa group server on page 830 aaa local authentication attempts max-fail <number> on page 832 aaa on on page 833 aaa processes <value> on page 834 arp <ip address> <mac address> arpa on page 835 auto-config on page 836 auto-link on page 838 auto-link recontact-interval <value> on page 839 auto-link server <hostname | ip address> on page 840 banner on page 841 boot config on page 842 boot system on page 843 boot voip on page 845 bridge irb on page 846 bridge <number> protocol ieee on page 848 clock on page 849 clock set <time> <day> <month> <year> on page 850
60000CRG0-35B
795
clock timezone <value> on page 851 crypto commands begin on page 854 data-call on page 871 desktop-auditing dhcp on page 873 desktop-auditing local-policy on page 874 desktop-auditing timeout <days> on page 875 dos-protection on page 876 dot11ap access-point-control on page 877 enable password <password> on page 878 ethernet cfm on page 879 ethernet cfm domain on page 880 ethernet cfm log-changes on page 882 event-history on on page 883 event-history priority on page 884 exception memory minimum <value> on page 886 exception report on page 887 ftp authentication <listname> on page 888 garp timer <value> on page 889 gvrp on page 890 hostname <name> on page 891 hw-access-map <name> on page 892 interface efm-group <group number> on page 894 interface mef-ethernet <slot/port> on page 895 interface range <interface type> <slot/port> - <slot/port> on page 896 ip on page 897 ip access-list commands begin on page 898 ip as-path-list <name> on page 902 ip classless on page 903 ip community-list <name> on page 904 ip crypto on page 905 ip crypto ffe on page 906 ip default-gateway <ip address> on page 907 ip dhcp-server commands begin on page 908 ip domain commands begin on page 914 ip ffe max-entries <value> on page 917 ip ffe timeout on page 918 ip firewall commands begin on page 920 ip flow commands begin on page 941 ip forward-protocol udp <value> on page 948
60000CRG0-35B
796
ip ftp commands begin on page 950 ip host on page 954 ip http on page 955 ip http source-interface <interface> on page 957 ip hw-access-list extended <name> on page 958 ip igmp commands begin on page 960 ip load-sharing on page 966 ip local policy route-map <name> on page 967 ip mcast-stub helper-address <ip address> on page 968 ip mgcp commands begin on page 969 ip multicast-routing on page 982 ip name-server on page 983 ip nat pool <name> on page 984 ip policy-class <ipv4 acp name> on page 985 ip policy-class <name> max-host-sessions <number> on page 987 ip policy-class <ipv4 acp name> max-sessions <number> on page 988 ip policy-class <ipv4 acp name> rpf-check on page 989 ip policy-timeout on page 990 ip prefix-list <name> description <text> on page 993 ip prefix-list <name> seq <number> on page 994 ip radius source-interface <interface> on page 996 ip route on page 997 ip route-cache express on page 999 ip route vrf on page 1000 ip routing on page 1002 ip rtp commands begin on page 1004 ip scp server on page 1025 ip sdp grammar hold on page 1026 ip sdp grammar ptime on page 1027 ip security monitor on page 1028 ip security monitor stats-filter <name> on page 1029 ip sip commands begin on page 1030 ip sip proxy commands begin on page 1050 ip snmp agent on page 1081 ip sntp commands begin on page 1082 ip subnet-zero on page 1086 ip tacacs source-interface <interface> on page 1087 ip tftp server on page 1088 ip tftp source-interface <interface> on page 1089
60000CRG0-35B
797
ip urlfilter commands begin on page 1090 ip vrf <name> route-distinguisher <number> on page 1097 ipv6 commands begin on page 1098 isdn-group <number> on page 1120 isdn-number-template on page 1121 line on page 1124 lldp on page 1126 local <start ip address> <end ip address> global <start ip address> <end ip address> on page 1128 logging commands begin on page 1130 mac access-list standard <name> on page 1145 mac address-table aging-time <value> on page 1146 mac address-table static <mac address> on page 1147 mac hw-access-list extended <name> on page 1148 mail-client <agent name> on page 1150 mef evc <name> on page 1151 mef evc-map <name> on page 1152 mef policer <name> on page 1153 mef qos on page 1154 modem countrycode <value> on page 1156 monitor session <number> on page 1159 network-forensics ip dhcp on page 1161 ntp commands begin on page 1162 policy-class max-sessions <number> on page 1170 portal-list <name> <portal1 portal2 portal3...> on page 1171 port-auth commands begin on page 1172 port-channel load-balance on page 1177 power-supply shutdown automatic on page 1178 probe on page 1179 probe responder on page 1181 qos commands begin on page 1182 radius-server on page 1188 radius-server host on page 1190 resource-utilization on page 1192 route-map on page 1193 router commands begin on page 1195 run tcl <filename> on page 1200 schedule <name> on page 1201 service password-encryption on page 1203
60000CRG0-35B
798
snmp ifmib alias long on page 1204 snmp-server commands begin on page 1205 sntp retry-timeout <value> on page 1225 sntp server on page 1226 sntp wait-time <value> on page 1227 spanning-tree commands begin on page 1228 stack on page 1237 statistics rate-interval <value> on page 1239 system mtu <size> on page 1240 tacacs-server on page 1241 tacacs-server host on page 1242 test template match <string> to <pattern> on page 1246 telnet on page 1244 thresholds on page 1248 timing-source on page 1250 track <name> on page 1251 username <username> password <password> on page 1252 username <username> portal-list <name> password <password> on page 1253 vlan <vlan id> on page 1254 voice commands begin on page 1255 voip name-service host on page 1331 voip name-service verification attempts <number> interval <seconds> on page 1333 vrf forwarding <name> on page 1335
60000CRG0-35B
799
Syntax Description
<level> <listname> default none stop-only group <name> Specifies whether the method list applies to Level 1 (unprivileged) or Level 15 (privileged) commands. Creates and names the accounting commands method list to use rather than the default list. Creates and defines the default accounting commands method list to use rather than a named list. Specifies that no accounting methods are used. Records accounting information only when the connection terminates. Specifies using a subset of terminal access controller access-control system (TACACS+) servers for keeping accounting records. Subsets are named server groups previously created using the command aaa group server on page 830. A server group must be configured to use this method. Specifies using all TACACS+ servers for keeping accounting records. TACACS+ servers must be configured to use this method. Refer to the Functional Notes for more information.
group tacacs+
Default Values
By default, AAA accounting is disabled and no accounting command method lists are defined.
Command History
Release 11.1 Command was introduced.
Functional Notes
AAA accounting is an AAA service that helps track the services and resources that network users are accessing and using. Accounting works by sending records of user activity to a configured server that can be used by network administrators to monitor network management, client billing, and auditing. In AOS, AAA accounting can record the commands users are entering using the aaa accounting commands command to create method lists that monitor specified command levels.
60000CRG0-35B
800
Before AAA accounting method lists can be configured or applied, AAA must be enabled. To enable AAA, use the command aaa on on page 833. Each AAA accounting method list relies on a combination of accounting methods. Each method must be entered into the list in the order that they are to be performed. Although these methods can be entered in any order, each can only be used once. The exception is the group <name> method that can be entered multiple times to accommodate multiple configured server groups. When specifying methods for the AAA accounting commands method list, it is important to remember that no additional parameters are available when using the none option, and that group tacacs+ or group <name> methods are not available until after specifying stop-only. Once you have specified stop-only as a method, you can specify group tacacs+ and group <name> in any order or combination. If the unit fails to make a connection with the first group listed, it will try the next group specified. The two types of method lists created using the aaa accounting commands command are a default list and a named list. A default list is one that is created and automatically applied to all line interfaces at the global level. A named method list is one that does not perform any action until it is manually applied to an interface. Named AAA accounting commands method lists are applied to line interfaces using the accounting commands command from the appropriate line interface configuration mode (Line (Console) Interface Command Set on page 1337, Line (Telnet) Interface Command Set on page 1367, or Line (SSH) Interface Command Set on page 1354). To use TACACS+ servers to record command accounting information (TACACS+ are the only servers available for AOS AAA accounting; RADIUS servers are not supported), the TACACS+ servers must be configured prior to creating the method list. You can configure all TACACS+ servers in the system using the command tacacs-server on page 1241. You can configure individual TACACS+ servers using the command tacacs-server host on page 1242. Once the TACACS+ servers have been configured, you can use all TACACS+ servers for maintaining accounting records by using the group tacacs+ method. If you only want to use some of the available TACACS+ servers for accounting, you can create a named server group and add the TACACS+ servers to the group. Server groups are created using the command aaa group server on page 830 and servers are added to the group as outlined in the TACACS+ Group Command Set on page 2951. For more information about AAA accounting, or AAA configuration in general, refer to the Configuring AAA in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example creates a list called myList and specifies that accounting records are generated for all Level 1 commands when the connection terminates, and that these records are received by all configured TACACS+ servers: (config)#aaa accounting commands 1 myList stop-only group tacacs+
60000CRG0-35B
801
Syntax Description
default <listname> none start-stop stop-only group <name> Creates and defines the default accounting connection method list to use rather than the named list. Creates and names the accounting connection method list to create and use rather than the default list. Specifies that no accounting methods are used. Records accounting information when the connection begins and when the connection terminates. Records accounting information only when the connection terminates. Specifies using a subset of terminal access controller access-control system (TACACS+) servers for keeping accounting records. Subsets are named server groups previously created using the command aaa group server on page 830. A server group must be configured to use this method. Specifies using all TACACS+ servers for keeping accounting records. TACACS+ servers must be configured to use this method. Refer to the Functional Notes for more information.
group tacacs+
Default Values
By default, AAA accounting connection is disabled and no accounting connection method lists are defined.
Command History
Release 13.1 Command was introduced.
60000CRG0-35B
802
Functional Notes
AAA accounting is an AAA service that helps track the services and resources that network users are accessing and using. Accounting works by sending records of user activity to a configured server that can be used by network administrators to monitor network management, client billing, and auditing. In AOS, AAA accounting can record information about outbound connections made from the network access server using the aaa accounting connection command to create method lists that monitor outbound connections. Before AAA accounting method lists can be configured or applied, AAA must be enabled. To enable AAA, use the command aaa on on page 833. Each AAA accounting method list relies on a combination of accounting methods. Each method must be entered into the list in the order that they are to be performed. Although these methods can be entered in any order, each can only be used once. The exception is the group <name> method that can be entered multiple times to accommodate multiple configured server groups. When specifying methods for the AAA accounting connection method list, it is important to remember that no additional parameters are available when using the none option, and that group tacacs+ or group <name> methods are not available until after specifying start-stop or stop-only. Once you have specified start-stop or stop-only as a method, you can specify group tacacs+ and group <name> in any order or combination. If the unit fails to make a connection with the first group listed, it will try the next group specified. The two types of method lists created using the aaa accounting connection command are a default list and a named list. A default list is one that is created and automatically applied to all line interfaces at the global level. A named method list is one that does not perform any action until it is manually applied to an interface. Named AAA accounting connection method lists are applied to line interfaces using the accounting connection command from the appropriate line interface configuration mode (Line (Console) Interface Command Set on page 1337, Line (Telnet) Interface Command Set on page 1367, or Line (SSH) Interface Command Set on page 1354). To use TACACS+ servers to record connection accounting information (TACACS+ are the only servers available for AOS AAA accounting; RADIUS servers are not supported), the TACACS+ servers must be configured prior to creating the method list. You can configure all TACACS+ servers in the system using the command tacacs-server on page 1241. You can configure individual TACACS+ servers using the command tacacs-server host on page 1242. Once the TACACS+ servers have been configured, you can use all TACACS+ servers for maintaining accounting records by using the group tacacs+ method. If you only want to use some of the available TACACS+ servers for accounting, you can create a named server group and add the TACACS+ servers to the group. Server groups are created using the command aaa group server on page 830 and servers are added to the group as outlined in the TACACS+ Group Command Set on page 2951. For more information about AAA accounting, or AAA configuration in general, refer to the Configuring AAA in AOS configuration guide available online at http://kb.adtran.com.
60000CRG0-35B
803
Usage Examples
The following example creates a list called myList and sends the connection information to all TACACS+ servers when the connection terminates: (config)#aaa accounting connection myList stop-only group tacacs+ The following example creates a list called myList and sends the connection information to the TACACS+ servers when the connection is made and when the connection terminates: (config)#aaa accounting connection myList start-stop group tacacs+
60000CRG0-35B
804
Syntax Description
default <listname> none start-stop stop-only group <name> Creates and defines the default accounting exec method list to use rather than the named list. Creates and names the accounting exec method list to use rather than the default list. Specifies that no accounting methods are used. Records accounting information when the connection begins and when the connection terminates. Records accounting information only when the connection terminates. Specifies using a subset of terminal access controller access-control system (TACACS+) servers for keeping accounting records. Subsets are named server groups previously created using the command aaa group server on page 830. A server group must be configured to use this method. Specifies using all TACACS+ servers for keeping accounting records. TACACS+ servers must be configured to use this method. Refer to the Functional Notes for more information.
group tacacs+
Default Values
By default, AAA accounting exec is disabled and no accounting exec method lists are defined.
Command History
Release 13.1 Command was introduced.
60000CRG0-35B
805
Functional Notes
AAA accounting is an AAA service that helps track the services and resources that network users are accessing and using. Accounting works by sending records of user activity to a configured server that can be used by network administrators to monitor network management, client billing, and auditing. In AOS, AAA accounting can record information about inbound connections (made by connecting to the line interfaces and creating a terminal session) using the aaa accounting exec command to create method lists that monitor inbound connections. Before AAA accounting method lists can be configured or applied, AAA must be enabled. To enable AAA, use the command aaa on on page 833. Each AAA accounting method list relies on a combination of accounting methods. Each method must be entered into the list in the order that they are to be performed. Although these methods can be entered in any order, each can only be used once. The exception is the group <name> method that can be entered multiple times to accommodate multiple configured server groups. When specifying methods for the AAA accounting exec method list, it is important to remember that no additional parameters are available when using the none option, and that group tacacs+ or group <name> methods are not available until after specifying start-stop or stop-only. Once you have specified start-stop or stop-only as a method, you can specify group tacacs+ and group <name> in any order or combination. If the unit fails to make a connection with the first group listed, it will try the next group specified. The two types of method lists created using the aaa accounting exec command are a default list and a named list. A default list is one that is created and automatically applied to all line interfaces at the global level. A named method list is one that does not perform any action until it is manually applied to an interface. Named AAA accounting exec method lists are applied to line interfaces using the accounting exec command from the appropriate line interface configuration mode(Line (Console) Interface Command Set on page 1337, Line (Telnet) Interface Command Set on page 1367, or Line (SSH) Interface Command Set on page 1354). To use TACACS+ servers to record exec accounting information (TACACS+ are the only servers available for AOS AAA accounting; RADIUS servers are not supported), the TACACS+ servers must be configured prior to creating the method list. You can configure all TACACS+ servers in the system using the command tacacs-server on page 1241. You can configure individual TACACS+ servers using the command tacacs-server host on page 1242. Once the TACACS+ servers have been configured, you can use all TACACS+ servers for maintaining accounting records by using the group tacacs+ method. If you only want to use some of the available TACACS+ servers for accounting, you can create a named server group and add the TACACS+ servers to the group. Server groups are created using the command aaa group server on page 830 and servers are added to the group as outlined in the TACACS+ Group Command Set on page 2951. For more information about AAA accounting, or AAA configuration in general, refer to the Configuring AAA in AOS configuration guide available online at http://kb.adtran.com.
60000CRG0-35B
806
Usage Examples
The following example creates a list called myList and sends the connection/login records to the TACACS+ servers when the connection is terminated: (config)#aaa accounting exec myList stop-only group tacacs+
60000CRG0-35B
807
Default Values
By default, records of all user accounts, including NULL user names, are sent to the server.
Command History
Release 11.1 Command was introduced.
Functional Notes
Null users are those users whose user name string is NULL. Users might have this user name if they came in on a line whose record type is none (typically, these are users that authenticated with a password-only login or no login).
Usage Examples
The following example specifies that users with the user name NULL are not sent to the server: (config)#aaa accounting suppress null-username
60000CRG0-35B
808
Syntax Description
newinfo periodic <value> Specifies that information is sent to the server only when there is new recorded information. Specifies the time interval (in minutes) between sending accounting records to the server. Interval range is 1 to 2147483647.
Default Values
By default, accounting records are sent to the server every 5 minutes.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example specifies that accounting records are sent to the accounting server every 60 minutes: (config)#aaa accounting update periodic 60
60000CRG0-35B
809
Default Values
By default, the authentication banner is User Access Verification.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example changes the authentication banner to read User Login Authentication: (config)#aaa authentication banner # Enter TEXT message. End with the character '#'. User Login Authentication:# (config)#
60000CRG0-35B
810
Each method parameter after default specifies the authentication method to be attempted in the order in which they are to be tried. Multiple methods can be specified for authentication, but the authentication procedure is dependent upon the entry order of the methods. Syntax Description
none Specifies that no authentication methods are used. If this method is entered, it should come at the end of the list of authentication methods in the command entry. This method should only be used to prevent a lock-out situation. Specifies using the line password (Telnet 0 through 4 or console 0 through 1) for authentication. The line password must be configured to use this method (using the password <password> command from the appropriate line interface configuration mode prompt). Specifies using the Enable mode password for authentication. The Enable mode password must be defined to use this method (using the command enable password <password> on page 878). Specifies that all defined remote authentication dial-in user service (RADIUS) servers are used for authentication. RADIUS servers must be configured to use this method. Refer to the Functional Notes for more information. Specifies that all defined terminal access controller access-control system plus (TACACS+) servers are used for authentication. TACACS+ servers must be configured to use this method. Refer to the Functional Notes for more information. Specifies using a subset of TACACS+ or RADIUS servers for authentication. Subsets are named server groups previously created using the command aaa group server on page 830. A server group must be configured to use this method.
line
enable
group radius
group tacacs+
group <name>
60000CRG0-35B
811
Default Values
If the Enable mode password is used as an authentication method and the authentication request is going to a RADIUS server, the user name $enabl15$is sent by default. If the request is going to a TACACS+ server, the user name used for login authentication is sent by default. If no default methods list is configured, the unit uses the Enable mode password for authentication. If no password is configured, consoles are allowed access (this prevents a lock-out condition).
Command History
Release 5.1 Release 11.1 Command was introduced. The group tacacs+ command was added.
Functional Notes
AAA authentication is an AAA service that helps verify user logins, user access to the Enable mode, and port usage. Authentication works by verifying user credentials with those stored on a server. In AOS, AAA authentication can verify a users permission to access Enable mode by using the aaa authentication enable default command to create the default method list that monitors user permissions. Before AAA authentication method lists can be configured or applied, AAA must be enabled. To enable AAA, use the command aaa on on page 833. Each AAA authentication method list relies on a combination of authentication methods. Each method must be entered into the list in the order that they are to be performed. Although these methods can be entered in any order, each can only be used once. The exception is the group <name> method that can be entered multiple times to accommodate multiple configured server groups. If the unit fails to make a connection with the first group listed, it will try the next group specified.
For security reasons, ADTRAN recommends that the local authentication method be used instead of the none authentication method. Using the local authentication method prevents unauthorized users from gaining access to the device during a period in which the links to all authentication servers are down. The local user database contained within the AOS device will always be available and serves as the last line of defense.
The type of method lists created using the aaa authentication enable default command is a default list. A default list is one that is created and automatically applied to all line interfaces at the global level. To use TACACS+ servers to perform Enable mode authentication, the TACACS+ servers must be configured prior to creating the method list. You can configure all TACACS+ servers in the system using the command tacacs-server on page 1241. You can configure individual TACACS+ servers using the command tacacs-server host on page 1242. Once the TACACS+ servers have been configured, you can use all TACACS+ servers for authentication by using the group tacacs+ method. If you only want to use some of the available TACACS+ servers for authentication, you can create a named server group and add the TACACS+ servers to the group. Server groups are created using the command aaa group server on page 830 and servers are added to the group as outlined in the TACACS+ Group Command Set on page 2951.
60000CRG0-35B
812
To use RADIUS servers to perform Enable mode authentication, the RADIUS servers must be configured prior to creating the method list. You can configure all RADIUS servers in the system using the command radius-server on page 1188. You can configure individual RADIUS servers using the command radius-server host on page 1190. Once the RADIUS servers have been configured, you can use all RADIUS servers for authentication by using the group radius method. If you only want to use some of the available RADIUS servers for authentication, you can create a named server group and add the RADIUS servers to the group. Server groups are created using the command aaa group server on page 830 and servers are added to the group as outlined in the RADIUS Group Command Set on page 2912. For more information about AAA authentication, or AAA configuration in general, refer to the Configuring AAA in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example specifies using the line password as the first method of authentication and using the Enable mode password as the second: (config)#aaa authentication enable default line enable
60000CRG0-35B
813
Default Values
By default, the authentication fail message banner is set to Authentication failed.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example changes the authentication fail message to Failed Authentication. Please try again.: (config)#aaa authentication fail-message # Enter TEXT message. End with the character #. Failed Authentication. Please try again. (config)#
60000CRG0-35B
814
Each method parameter after default or <listname> specifies the authentication method to be attempted in the order in which they are to be tried. Multiple methods can be specified for authentication, but the authentication procedure is dependent upon the entry order of the methods. Syntax Description
default <listname> none Creates and defines the default login authentication method list to use rather than a named list. Creates and names the login authentication method list to use rather than the default list. Specifies that no authentication methods are used. If this method is entered, it should come at the end of the list of authentication methods in the command entry. This method should only be used to prevent a lock-out situation. Specifies using the line password (Telnet 0 through 4 or console 0 through 1) for authentication. The line password must be configured to use this method (using the password <password> command from the appropriate line interface configuration mode prompt). Specifies using the Enable mode password for authentication. The Enable mode password must be defined to use this method (using the command enable password <password> on page 878).
line
enable
60000CRG0-35B
815
Global Configuration Mode Command Set Specifies using the local user name for authentication. User names must be in the local user name database to use this method. User names are set using the command username <username> password <password> on page 1252. Specifies that all defined remote authentication dial-in user service (RADIUS) servers are used for authentication. RADIUS servers must be configured to use this method. Refer to the Functional Notes for more information. Specifies that all defined terminal access controller access-control system plus (TACACS+) servers are used for authentication. TACACS+ servers must be configured to use this method. Refer to the Functional Notes for more information. Specifies using a subset of TACACS+ or RADIUS servers for authentication. Subsets are named server groups previously created using the command aaa group server on page 830. A server group must be configured to use this method.
group radius
group tacacs+
group <name>
Default Values
By default, AAA authentication login method lists are not defined. Once a default list is defined, it is automatically applied to all line interfaces unless a named list is created and applied manually.
Command History
Release 5.1 Release 11.1 Command was introduced. The group tacacs+ command was added.
Functional Notes
AAA authentication is an AAA service that helps verify user logins, user access to the Enable mode, and port usage. Authentication works by verifying user credentials with those stored on a server. In AOS, AAA authentication can verify a users permission to access the unit by using the aaa authentication login command to create a method list that monitors user access permissions. Before AAA authentication method lists can be configured or applied, AAA must be enabled. To enable AAA, use the command aaa on on page 833. Each AAA authentication method list relies on a combination of authentication methods. Each method must be entered into the list in the order that they are to be performed. Although these methods can be entered in any order, each can only be used once. The exception is the group <name> method that can be entered multiple times to accommodate multiple configured server groups. If the unit fails to make a connection with the first group listed, it will try the next group specified.
For security reasons, ADTRAN recommends that the local authentication method be used instead of the none authentication method. Using the local authentication method prevents unauthorized users from gaining access to the device during a period in which the links to all authentication servers are down. The local user database contained within the AOS device will always be available and serves as the last line of defense.
60000CRG0-35B
816
The two types of method lists created using the aaa authentication login command are a default list and a named list. A default list is one that is created and automatically applied to all line interfaces at the global level. A named method list is one that does not perform any action until it is manually applied to an interface. Named AAA login authentication method lists are applied to line interfaces using the login authentication <listname> command from the appropriate line interface configuration mode (Line (Console) Interface Command Set on page 1337, Line (Telnet) Interface Command Set on page 1367, or Line (SSH) Interface Command Set on page 1354). To use TACACS+ servers to perform login authentication, the TACACS+ servers must be configured prior to creating the method list. You can configure all TACACS+ servers in the system using the command tacacs-server on page 1241. You can configure individual TACACS+ servers using the command tacacs-server host on page 1242. Once the TACACS+ servers have been configured, you can use all TACACS+ servers for authentication by using the group tacacs+ method. If you only want to use some of the available TACACS+ servers for authentication, you can create a named server group and add the TACACS+ servers to the group. Server groups are created using the command aaa group server on page 830 and servers are added to the group as outlined in the TACACS+ Group Command Set on page 2951. To use RADIUS servers to perform login authentication, the RADIUS servers must be configured prior to creating the method list. You can configure all RADIUS servers in the system using the command radius-server on page 1188. You can configure individual RADIUS servers using the command radius-server host on page 1190. Once the RADIUS servers have been configured, you can use all RADIUS servers for authentication by using the group radius method. If you only want to use some of the available RADIUS servers for authentication, you can create a named server group and add the RADIUS servers to the group. Server groups are created using the command aaa group server on page 830 and servers are added to the group as outlined in the RADIUS Group Command Set on page 2912. For more information about AAA authentication, or AAA configuration in general, refer to the Configuring AAA in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example creates a login authentication list called myList and specifies using the local database as the first method, myGroup as the second method, and line password as the third method for login authentication: (config)#aaa authentication login myList local group myGroup line The following command sets the default authentication list for logins to use the local database as the first authentication method: (config)#aaa authentication login default local
60000CRG0-35B
817
Default Values
By default, the authentication password prompt is set to Password:.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example specifies the authentication password prompt reads Please Enter Your Password:: (config)#aaa authentication password-prompt Please Enter Your Password:
60000CRG0-35B
818
Each method parameter after default specifies the authentication method to be attempted in the order in which they are to be tried. Multiple methods can be specified for authentication, but the authentication procedure is dependent upon the entry order of the methods. Syntax Description
none Specifies that no authentication methods are used. If this method is entered, it should come at the end of the list of authentication methods in the command entry. This method should only be used to prevent a lock-out situation. Specifies using the local user name for port authentication. User names must be in the local user name database to use this method. User names are set using the command username <username> password <password> on page 1252. Specifies that all defined remote authentication dial-in user service (RADIUS) servers are used for authentication. RADIUS servers must be configured to use this method. Refer to the Functional Notes for more information. Specifies using a subset of RADIUS servers for port authentication. Subsets are named server groups previously created using the command aaa group server on page 830. A server group must be configured to use this method.
local
group radius
group <name>
Default Values
By default, no port authentication method lists are defined.
Command History
Release 10.1 Command was introduced.
Functional Notes
AAA authentication is an AAA service that helps verify user logins, user access to the Enable mode, and port usage. Authentication works by verifying user credentials with those stored on a server. In AOS, AAA authentication can verify port usage by using the aaa authentication port-auth default command to create the default method list that monitors port usage.
60000CRG0-35B
819
Before AAA authentication method lists can be configured or applied, AAA must be enabled. To enable AAA, use the command aaa on on page 833. Each AAA authentication method list relies on a combination of authentication methods. Each method must be entered into the list in the order that they are to be performed. Although these methods can be entered in any order, each can only be used once. The exception is the group <name> method that can be entered multiple times to accommodate multiple configured server groups. If the unit fails to make a connection with the first group listed, it will try the next group specified.
For security reasons, ADTRAN recommends that the local authentication method be used instead of the none authentication method. Using the local authentication method prevents unauthorized users from gaining access to the device during a period in which the links to all authentication servers are down. The local user database contained within the AOS device will always be available and serves as the last line of defense.
The type of method lists created using the aaa authentication port-auth default command is a default list. A default list is one that is created and automatically applied to all line interfaces at the global level. To use RADIUS servers to perform port authentication, the RADIUS servers must be configured prior to creating the method list. You can configure all RADIUS servers in the system using the command radius-server on page 1188. You can configure individual RADIUS servers using the command radius-server host on page 1190. Once the RADIUS servers have been configured, you can use all RADIUS servers for authentication by using the group radius method. If you only want to use some of the available RADIUS servers for authentication, you can create a named server group and add the RADIUS servers to the group. Server groups are created using the command aaa group server on page 830 and servers are added to the group as outlined in the RADIUS Group Command Set on page 2912. For more information about AAA authentication, or AAA configuration in general, refer to the Configuring AAA in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example specifies that the local user database be used for port authentication: (config)#aaa authentication port-auth default local
60000CRG0-35B
820
Default Values
By default, the authentication user name prompt is set to Username:.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example specifies the authentication user name prompt reads Please Enter Your User Name:: (config)#aaa authentication username-prompt Please Enter Your User Name:
60000CRG0-35B
821
Each method parameter after default or <listname> specifies the authorization method to be attempted in the order in which they are to be tried. Multiple methods can be specified for authorization, but the authorization procedure is dependent upon the entry order of the methods. Syntax Description
<level> <listname> default none Specifies whether the method list applies to Level 1 (unprivileged) or Level 15 (privileged) commands. Creates and names the authorization commands method list to use rather than the default list. Creates and defines the default authorization commands method list to use rather than a named list. Specifies that no authorization methods are used for command authorization. If this method is entered, it should come at the end of the list of authorization methods in the command entry. This method should only be used to prevent a lock-out situation. Specifies that authorization is successful if the user has already been authenticated. AAA authentication must be configured to use this method. Refer to the Functional Notes for more information. Specifies using all terminal access controller access-control system plus (TACACS+) servers for authorizing command usage. TACACS+ servers must be configured to use this method. Refer to the Functional Notes for more information. Specifies using a subset of TACACS+ servers for authorizing command usage. Subsets are named server groups previously created using the command aaa group server on page 830. A server group must be configured to use this method.
if-authenticated
group tacacs+
group <name>
60000CRG0-35B
822
Default Values
By default, no AAA authorization method lists are defined or applied.
Command History
Release 11.1 Command was introduced.
Functional Notes
AAA authorization is an AAA service that helps limit the network services available to users. Authorization works by retrieving information from the users profile (stored either on the local database or security server) and uses that information to determine the areas of the network to which the user is allowed access. In AOS, AAA authorization can limit the commands available to a specific user and specify whether or not users can access privileged command line interface (CLI) sessions. Limiting available commands on a per-user basis is achieved by using the aaa authorization commands command to create a default or named method list that specifies which level of commands (Level 1 or Level 15) are authorized.
The user command privilege level (1 or 15) must be defined in addition to specifying all of the commands available on a per-user basis in the configuration of the TACACS+ server. Commands of a particular level are not checked for authorization unless explicitly defined in the configuration with a method list. For example, if a method list is defined for Level 1 commands but not Level 15, then a user is able to enter any Level 15 commands since no authorization takes place due to the lack of a Level 15 commands method list. The same user will only be allowed to enter the Level 1 commands configured for the user in the Level 1 commands method list.
Before AAA authorization method lists can be configured or applied, AAA must be enabled. To enable AAA, use the command aaa on on page 833. Each AAA authorization method list relies on a combination of authorization methods. Each method must be entered into the list in the order that they are to be performed. Although these methods can be entered in any order, each can only be used once. The exception is the group <name> method that can be entered multiple times to accommodate multiple configured server groups. If the unit fails to make a connection with the first group listed, it will try the next group specified.
For security reasons, ADTRAN recommends that the local authentication method be used instead of the none authentication method. Using the local authentication method prevents unauthorized users from gaining access to the device during a period in which the links to all authentication servers are down. The local user database contained within the AOS device will always be available and serves as the last line of defense.
60000CRG0-35B
823
The two types of method lists created using the aaa authorization commands command are a default list and a named list. A default list is one that is created and automatically applied to all line interfaces at the global level. A named method list is one that does not perform any action until it is manually applied to an interface. Named AAA command authorization method lists are applied to line interfaces using the authorization commands <level> <listname> command from the appropriate line interface configuration mode (Line (Console) Interface Command Set on page 1337, Line (Telnet) Interface Command Set on page 1367, or Line (SSH) Interface Command Set on page 1354). To use TACACS+ servers to perform command authorization, the TACACS+ servers must be configured prior to creating the method list. You can configure all TACACS+ servers in the system using the command tacacs-server on page 1241. You can configure individual TACACS+ servers using the command tacacs-server host on page 1242. Once the TACACS+ servers have been configured, you can use all TACACS+ servers for authorization by using the group tacacs+ method. If you only want to use some of the available TACACS+ servers for authorization, you can create a named server group and add the TACACS+ servers to the group. Server groups are created using the command aaa group server on page 830 and servers are added to the group as outlined in the TACACS+ Group Command Set on page 2951. For more information about AAA authorization, or AAA configuration in general, refer to the Configuring AAA in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example creates a command authorization method list called myList, which authorizes unprivileged commands (this succeeds only if the user has been authenticated successfully): (config)#aaa authorization commands 1 myList if-authenticated The following command defines the default command authorization method list to authorize privileged (level 15) commands against all defined TACACS+ servers: (config)#aaa authorization commands 15 default group tacacs+
If command authorization is used in conjunction with a TACACS+ server, the same user name that is used to access AOS must be configured on the server.
60000CRG0-35B
824
Default Values
By default, authorization for configuration commands is enabled.
Command History
Release 11.1 Command was introduced.
Functional Notes
The aaa authorization config-command command is used to ensure that authorization for configuration commands is enabled at the global level before applying any AAA authorization method lists to a line interface (console, Telnet, or secure shell (SSH)). This feature must be enabled before AAA authorization method lists can be applied to the interface. For more information about AAA authorization, or AAA configuration in general, refer to the Configuring AAA in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example enables authorization of configuration mode commands: (config)#aaa authorization config-command
60000CRG0-35B
825
Default Values
By default, authorization is disabled on a console line interface. This measure prevents accidental lockout issues on directly connected lines.
Command History
Release 11.1 Command was introduced.
Functional Notes
AAA authorization method lists cannot be applied to a console interface until the aaa authorization console command has been issued. For more information about AAA authorization, or AAA configuration in general, refer to the Configuring AAA in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example enables AAA authorization use on console interfaces: (config)#aaa authorization console
60000CRG0-35B
826
Each method parameter after default or <listname> specifies the authorization method to be attempted in the order in which they are to be tried. Multiple methods can be specified for authorization, but the authorization procedure is dependent upon the entry order of the methods. Syntax Description
default <listname> none Creates and defines the default authorization method list to use rather than a named method list. Creates and names the authorization method list to use rather than the default list. Specifies that no authorization methods are used for executive authorization. If this method is entered, it should come at the end of the list of authorization methods in the command entry. This method should only be used to prevent a lock-out situation. Specifies that authorization is successful if the user has already been authenticated. AAA authentication must be configured to use this method. Specifies using all terminal access controller access-control system plus (TACACS+) servers for authorizing executive CLI privileges. TACACS+ servers must be configured to use this method. Refer to the Functional Notes for more information. Specifies using a subset of TACACS+ servers for authorizing executive CLI privileges. Subsets are named server groups previously created using the command aaa group server on page 830. A server group must be configured to use this method.
group <name>
Default Values
By default, AAA authorization for executive CLI privileges is disabled and no authorization method lists are defined.
60000CRG0-35B
827
Command History
Release 13.1 Command was introduced.
Functional Notes
AAA authorization is an AAA service that helps limit the network services available to users. Authorization works by retrieving information from the users profile (stored either on the local database or security server) and uses that information to determine the areas of the network to which the user is allowed access. In AOS, AAA authorization can limit the commands available to a specific user and specify whether or not users can access privileged CLI sessions. Limiting access to privileged CLI sessions is achieved by using the aaa authorization exec command to create a default or named method list that restricts access to Enable mode. Before AAA authorization method lists can be configured or applied, AAA must be enabled. To enable AAA, use the command aaa on on page 833. Each AAA authorization method list relies on a combination of authorization methods. Each method must be entered into the list in the order that they are to be performed. Although these methods can be entered in any order, each can only be used once. The exception is the group <name> method that can be entered multiple times to accommodate multiple configured server groups. If the unit fails to make a connection with the first group listed, it will try the next group specified.
For security reasons, ADTRAN recommends that the local authentication method be used instead of the none authentication method. Using the local authentication method prevents unauthorized users from gaining access to the device during a period in which the links to all authentication servers are down. The local user database contained within the AOS device will always be available and serves as the last line of defense.
The two types of method lists created using the aaa authorization exec command are a default list and a named list. A default list is one that is created and automatically applied to all line interfaces at the global level. A named method list is one that does not perform any action until it is manually applied to an interface. Named AAA exec authorization method lists are applied to line interfaces using the authorization exec command from the appropriate line interface configuration mode (Line (Console) Interface Command Set on page 1337, Line (Telnet) Interface Command Set on page 1367, or Line (SSH) Interface Command Set on page 1354). To use TACACS+ servers to perform Enable mode authorization, the TACACS+ servers must be configured prior to creating the method list. You can configure all TACACS+ servers in the system using the command tacacs-server on page 1241. You can configure individual TACACS+ servers using the command tacacs-server host on page 1242. Once the TACACS+ servers have been configured, you can use all TACACS+ servers for authorization by using the group tacacs+ method. If you only want to use some of the available TACACS+ servers for authorization, you can create a named server group and add the TACACS+ servers to the group. Server groups are created using the command aaa group server on page 830 and servers are added to the group as outlined in the TACACS+ Group Command Set on page 2951. For more information about AAA authorization, or AAA configuration in general, refer to the Configuring AAA in AOS configuration guide available online at http://kb.adtran.com.
60000CRG0-35B
828
Usage Examples
The following example creates an executive mode authorization method list (called myList) to authorize user access to Enable mode in the CLI (this succeeds only if the user has been authenticated successfully): (config)#aaa authorization exec myList if-authenticated The following example specifies to use the default executive mode authorization method list to authorize access to Enable mode using all TACACS+ servers: (config)#aaa authorization exec default group tacacs+
If a TACACS+ server is used in conjunction with an executive mode access authorization method list, the user name used to access the AOS device must be configured as a Level 15 user on the TACACS+ server.
60000CRG0-35B
829
Syntax Description
radius <group name> tacacs+ <group name> Creates and names a group of RADIUS servers. Creates and names a group of TACACS+ servers.
Default Values
By default, no named server groups exist.
Command History
Release 5.1 Release 11.1 Command was introduced. Command was expanded to include TACACS+ server support.
Functional Notes
Server groups can be beneficial when used with AAA method lists because they provide a way to verify AAA services without using all of the configured RADIUS or TACACS+ servers. These server groups are a subset of all RADIUS or TACACS+ servers and can save server resources for other network needs. Servers must be configured before they can be added to the server group for use with AAA. To configure RADIUS servers on an individual basis, use the command radius-server host on page 1190. To configure all RADIUS servers alike, use the command radius-server on page 1188. To configure TACACS+ servers on an individual basis, use the command tacacs-server host on page 1242. To configure all TACACS+ servers alike, use the command tacacs-server on page 1241. It is important to remember when configuring servers for the server group that individual server configurations override any global server configurations. Once the servers are configured, the aaa server group command allows you to begin creating a server group. When you enter the command from the Global Configuration mode prompt, you enter the Server Group Configuration mode. At this point, you can begin to add servers to the group using the server command as detailed in the RADIUS Group Command Set on page 2912 and in the TACACS+ Group Command Set on page 2951. For more information on group server configurations and their use with AAA, refer to the Configuring AAA in AOS configuration guide available online at http://kb.adtran.com.
60000CRG0-35B
830
Usage Examples
The following example creates the named list RADauthentication and enters the RADIUS Group Configuration mode for RADIUS servers: (config)#aaa group server radius RADauthentication (config-sg-radius)# The following example creates the named list TACaccount and enters the TACACS+ Group Configuration mode for TACACS+ servers: (config)#aaa group server tacacs+ TACaccount (config-sg-tacacs+)#
60000CRG0-35B
831
Default Values
By default, the session closes after 3 failed attempts.
Command History
Release 14.1 Command was introduced.
Usage Examples
The following example configures the device to allow a maximum of 10 failed authentication attempts before closing the session: (config)#aaa local authentication attempts max-fail 10
60000CRG0-35B
832
aaa on
Use the aaa on command to activate authentication, authorization, and accounting (AAA) services. Use the no form of this command to deactivate AAA. Syntax Description
No subcommands.
Default Values
By default, AAA is not activated.
Command History
Release 5.1 Command was introduced.
Functional Notes
By default, AAA is disabled. AAA must be enabled for additional AAA configuration commands to be available. If AAA is enabled, AAA methods will override other security methods specified in the line interface. For more information about the use and configuration of AAA, refer to the Configuring AAA in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example activates AAA services: (config)#aaa on
60000CRG0-35B
833
Default Values
By default, the number of threads is set to 1.
Command History
Release 5.1 Command was introduced.
Functional Notes
Increasing the number of threads may speed up simultaneous authentication processes, but can do so at the cost of system resources (for example, memory). For more information about AAA, refer to the Configuring AAA in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example specifies five available threads for AAA background processes: (config)#aaa processes 5
60000CRG0-35B
834
Syntax Description
<ip address> <mac address> Specifies a valid IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies a valid 48-bit medium access control (MAC) address. MAC addresses should be expressed in the following format xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01). Optional. Specifies the VRF where the ARP table exists.
vrf <name>
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 16.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example enters the IP address and MAC address into the ARP table that is located in the default VRF: (config)#arp 10.10.10.1 00:A0:C8:00:00:01 arpa
60000CRG0-35B
835
auto-config
Use the auto-config command to enable the automatic self-configuration feature in AOS. For more detailed information, refer to the Auto-Config configuration guide on the AOS Documentation CD. Use the no form of this command to halt the automatic configuration process. Variations of this command include:
auto-config auto-config filename <name> auto-config restart auto-config retry-count <number> auto-config server [<hostname> | <ip address>]
Syntax Description
filename <name> restart retry-count <number> Optional. Specifies the configuration file name to download. Optional. Restarts automatic configuration parameters. Optional. Specifies the maximum number of retries. Range is 0 to 1000.
server [<hostname> | <ip address>] Optional. Specifies the IP address or host name of Trivial File Transfer Protocol (TFTP) server from which to download. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
Default Values
By default, automatic configuration is disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example enables automatic configuration: (config)#auto-config
The following command specifies the name of the file to download: (config)#auto-config filename myConfig
60000CRG0-35B
836
The following command restarts the automatic configuration process: (config)#auto-config restart The following command sets the number of retries when downloading a configuration file to 100: (config)#auto-config retry-count 100 The following command specifies the TFTP server IP address from which to download the configuration file: (config)#auto-config server 192.33.5.99 The following command specifies the TFTP server host name from which to download the configuration file: (config)#auto-config server myHost
60000CRG0-35B
837
auto-link
Use the auto-link command to enable the auto-link feature and to specify the communication method between an AOS device and the n-Command managed service provider (MSP) server. Communication can be either via Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol over Secure Socket Layer (HTTPS). Auto-link allows a client device to connect to an ADTRAN n-Command MSP network management appliance. Use the no form of this command to disable auto-link or to return to the default communication method. Variations of this command include:
auto-link auto-link http auto-link https
Syntax Description
http https Specifies that the client use the HTTP posting method. Specifies that the client use the HTTPS posting method.
Default Values
By default, auto-link is disabled. By default, auto-link uses HTTPS.
Command History
Release 17.3/A1 Command was introduced.
Functional Notes
The n-Command client must first be configured and enabled before the n-Command MSP server can be contacted. The n-Command MSP server is a network management appliance that enables auto-discovery of the AOS unit and provides a central management solution for configuration changes, firmware updates, and basic monitoring. Without enabling auto-link, the client will not be detected by the server. For more information about configuring the auto-link feature, refer to the configuration guide Configuring Auto-Link for AOS and n-Command MSP (article number 3098) available online at http://kb.adtran.com.
Usage Examples
The following example enables auto-link: (config)#auto-link The following example specifies that the client use HTTP to communicate with the server: (config)#auto-link http
60000CRG0-35B
838
Default Values
By default, the recontact interval is set to 3600 seconds.
Command History
Release 17.3/A1 Command was introduced.
Usage Examples
The following example sets the recontact interval to 7200 seconds: (config)#auto-link recontact-interval 7200
60000CRG0-35B
839
Default Values
By default, no server is configured.
Command History
Release 17.3/A1 Command was introduced.
Usage Examples
The following example specifies the AOS client will communicate with the n-Command MSP server at IP address 10.10.10.10: (config)#auto-link server 10.10.10.10
60000CRG0-35B
840
banner
Use the banner command to specify messages to be displayed in certain situations. Use the no form of this command to delete a previously configured banner. Variations of this command include:
banner exec <delimiter> <message> <delimiter> banner login <delimiter> <message> <delimiter> banner motd <delimiter> <message> <delimiter>
Syntax Description
exec login motd <delimiter> Creates a message to be displayed when any executive-level process takes place. Creates a message to be displayed before the user name and password login prompts. Creates a message-of-the-day (MOTD) banner. Specifies the banner text delimiter. Press Enter after the delimiter character to begin input of banner text. After typing the banner message, enter the same delimiter character to end the message. Specifies the text message you wish to display.
<message>
Default Values
By default, no banners are configured.
Command History
Release 2.1 Command was introduced.
Functional Notes
Banners appear in the following order (if configured): MOTD banner appears at initial connection. Login banner follows the MOTD banner. Exec banner appears after successful login.
Usage Examples
The following example configures the system to display a message of the day: (config)#banner motd *The system will be shut down today from 7PM to 11PM*
60000CRG0-35B
841
boot config
Use the boot config command to modify system boot parameters by specifying the location and name of primary and secondary configuration files. Variations of this command include:
boot config cflash <primary filename> boot config cflash <primary filename> cflash <secondary filename> boot config cflash <primary filename> flash <secondary filename> boot config flash <primary filename> boot config flash <primary filename> cflash <secondary filename> boot config flash <primary filename> flash <secondary filename>
The cflash parameter is only valid for units with CompactFlash capabilities.
Syntax Description
cflash flash <primary filename> <secondary filename> Specifies that the configuration file is located in CompactFlash memory. Specifies that the configuration file is located in flash memory. Specifies the name of the primary configuration file (file names are case sensitive). Optional. Specifies the name of the backup configuration file.
Default Values
No default values are necessary for this command.
Command History
Release 14.1 Command was introduced.
Usage Examples
The following example specifies the file myconfig (located in flash memory) as the primary system boot file: (config)#boot config flash myconfig The following example specifies the file myconfig (located in flash memory) as the primary system boot file and the file mybackupconfig (located in CompactFlash memory) as the backup configuration file: (config)#boot config flash myconfig cflash mybackupconfig
60000CRG0-35B
842
boot system
Use the boot system command to specify the system image loaded at startup. Variations of this command include:
boot system cflash <primary filename> boot system cflash <primary filename> verify boot system flash <primary filename> boot system flash <primary filename> verify boot system flash <primary filename> <secondary filename> boot system flash <primary filename> <secondary filename> verify boot system cflash <primary filename> cflash <secondary filename> boot system cflash <primary filename> cflash <secondary filename> verify boot system cflash <primary filename> flash <secondary filename> boot system cflash <primary filename> flash <secondary filename> verify boot system cflash <primary filename> no-backup boot system cflash <primary filename> no-backup verify boot system flash <primary filename> cflash <secondary filename> boot system flash <primary filename> cflash <secondary filename> verify boot system flash <primary filename> flash <secondary filename> boot system flash <primary filename> flash <secondary filename> verify boot system flash <primary filename> no-backup boot system flash <primary filename> no-backup verify
The cflash parameter is only valid for units with CompactFlash capabilities.
For units without CompactFlash capabilities, the secondary media type does not need to be specified. Refer to the last example under Usage Examples.
Syntax Description
cflash flash no-backup <primary filename> <secondary filename> verify Specifies the system image is located in CompactFlash memory. Specifies the system image is located in flash memory. Specifies that there is no backup image present. Specifies the file name of the image (file names are case sensitive). Image files should have a .biz extension. Specifies a name for the backup image. Optional. Verifies the image checksum.
Default Values
No default values are necessary for this command.
60000CRG0-35B
843
Command History
Release 1.1 Release 12.1 Command was introduced. Command was expanded to include CompactFlash.
Functional Notes
Detailed instructions for upgrading AOS and loading files into flash memory are found on the AOS Documentation CD.
Usage Examples
The following example specifies myimage.biz (located in CompactFlash memory) as the primary image file with no backup image: (config)#boot system cflash myimage.biz no-backup The following example specifies myimage.biz (located in flash memory) as the primary image file with no backup image: (config)#boot system flash myimage.biz no-backup The following example specifies myimage.biz (located in flash memory) as the primary image file and myimage_backup.biz (also located in flash memory) as the backup image: (config)#boot system flash myimage.biz myimage_backup.biz
60000CRG0-35B
844
boot voip
Use the boot voip command to specify the VoIP image file loaded at startup. Variations of this command include:
boot voip default boot voip flash <filename>
Syntax Description
default flash <filename> Uses default VoIP image. Specifies the file name (located in flash memory) of the image (file names are case sensitive). Image files should have a .biz extension.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Functional Notes
Detailed instructions for upgrading AOS and loading files into flash memory are found on the AOS Documentation CD shipped with your unit or online at http://kb.adtran.com.
Usage Examples
The following example specifies the file myimage.biz, stored in flash memory, as the VoIP startup image: (config)#boot voip flash myimage.biz
60000CRG0-35B
845
bridge irb
Use the bridge irb command to enable integrated routing and bridging (IRB) and also allow the creation of bridged virtual interfaces (BVIs). Use the no form of this command to disable the IRB. Syntax Description
No subcommands.
Default Values
By default, IRB is disabled.
Command History
Release 15.1 Command was introduced.
Functional Notes
The bridge irb must be enabled to create BVIs. Once the command bridge irb is entered, the IP addresses for any interfaces connected to any bridge will be removed. Also, the command ip address xx.xx.xx.xx.xx.xx.xx.xx will no longer be available on an interface that is connected to the bridge. The BVI must be removed before using the no bridge irb command. For more information on BVI configuration, refer to the BVI Interface Command Set on page 1816.
Usage Examples
The following example enables IRB: (config)#bridge irb
Technology Review
The IRB allows the routing of specified protocols between network interfaces and bridge groups. The difference between IRB and concurrent routing and bridging (CRB) is that in IRB it is possible to route IP between routed interfaces and BVIs, but with CRB the routed interfaces cannot communicate with bridged interfaces. IRBs primary goal is to bridge all protocols and route any IP traffic destined for the medium access control (MAC) address of the BVI. The IRB handles IP packets in the following manner: When an IP packet comes into the router and it is not destined for the MAC address, it is bridged. If the IP packet is destined for the MAC address, it is sent to the routing engine and routed as normal. The IRB allows for PCs in the bridge to get to routed networks and routed networks to get to the bridge. The bridge group will isolate broadcasts from other routed interfaces. A BVI can only be created when IRB is enabled and a bridge group has been defined. The BVI number corresponds directly to the bridge group.
60000CRG0-35B
846
When IRB is enabled and a BVI is configured, IP network configuration is removed for all bridged interfaces. IP traffic destined for the BVI address is delivered to the local IP stack for routing (if routing is enabled) or management. If no BVI is configured, the behavior is the same as if IRB is not enabled. When IRB is not enabled, a BVI cannot be created. Bridged interfaces retain their IP configuration, and IP traffic destined for those interfaces is delivered to the local IP stack.
60000CRG0-35B
847
Default Values
By default, all configured bridge interfaces implement IEEE spanning-tree protocol.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example deletes the bridge protocol setting for bridge group 17: (config)#no bridge 17 protocol ieee
60000CRG0-35B
848
clock
The clock auto-correct-DST command allows the unit to automatically correct for daylight savings time (DST). Use the clock no-auto-correct-DST command to disable this feature. Variations of this command include:
clock auto-correct-DST clock no-auto-correct-DST
Syntax Description
auto-correct-DST no-auto-correct-DST Configures the unit to automatically correct for DST. Disables DST correction.
Default Values
By default, DST correction takes place automatically.
Command History
Release 6.1 Release 11.1 Command was introduced. Command was added to the Global command set.
Functional Notes
Depending on the clock timezone chosen (refer to clock timezone <value> on page 851 for more information), one-hour DST correction may be enabled automatically. You may override this default using this command.
Usage Examples
The following example allows for automatic DST correction: (config)#clock auto-correct-DST The following example overrides the one-hour offset for DST: (config)#clock no-auto-correct-DST
60000CRG0-35B
849
<year>
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 11.1 Command was introduced. Command was added to the Global command set.
Usage Examples
The following example sets the system software clock for 3:42 pm, August 22 2004: (config)#clock set 15:42:00 22 Au 2004
60000CRG0-35B
850
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Command was introduced.
Depending on the clock timezone chosen, one-hour daylight savings time (DST) correction may be enabled automatically. Refer to the command clock on page 849 for more information.
60000CRG0-35B
851
Functional Notes
The following list shows sample cities and their time zone codes. clock timezone +1-Amsterdam clock timezone +1-Belgrade clock timezone +1-Brussels clock timezone +1-Sarajevo clock timezone +1-West-Africa clock timezone +10-Brisbane clock timezone +10-Canberra clock timezone +10-Guam clock timezone +10-Hobart clock timezone +10-Vladivostok clock timezone +11 clock timezone +12-Auckland clock timezone +12-Fiji clock timezone +13 clock timezone +2-Athens clock timezone +2-Bucharest clock timezone +2-Cairo clock timezone +2-Harare clock timezone +2-Helsinki clock timezone +2-Jerusalem clock timezone +3-Baghdad clock timezone +3-Kuwait clock timezone +3-Moscow clock timezone +3-Nairobi clock timezone +3:30 clock timezone +4-Abu-Dhabi clock timezone +4-Baku clock timezone +4:30 clock timezone +5-Ekaterinburg clock timezone +5-Islamabad clock timezone +5:30 clock timezone +5:45 clock timezone +6-Almaty clock timezone +6-Astana clock timezone +6-Sri-Jay clock timezone +6:30 clock timezone +7-Bangkok clock timezone +7-Kranoyarsk clock timezone +8-Bejing clock timezone +8-Irkutsk clock timezone +8-Kuala-Lumpur clock timezone +8-Perth clock timezone +8-Taipei clock timezone +9-Osaka clock timezone +9-Seoul clock timezone +9-Yakutsk clock timezone +9:30-Adelaide clock timezone +9:30-Darwin clock timezone -1-Azores clock timezone -1-Cape-Verde clock timezone -10 clock timezone -11 clock timezone -12 clock timezone -2 clock timezone -3-Brasilia clock timezone -3-Buenos-Aires clock timezone -3-Greenland clock timezone -3:30 clock timezone -4-Atlantic-Time clock timezone -4-Caracus clock timezone -4-Santiago clock timezone -5 clock timezone -5-Bogota clock timezone -5-Eastern-Time clock timezone -6-Central-America clock timezone -6-Central-Time clock timezone -6-Mexico-City clock timezone -6-Saskatchewan clock timezone -7-Arizona clock timezone -7-Mountain-Time clock timezone -8 clock timezone -9 clock timezone -0-Universal Coordinated Time (UTC) clock timezone GMT-Casablanca clock timezone GMT-Dublin
60000CRG0-35B
852
Usage Examples
The following example sets the time zone for Santiago, Chile. >enable (config)#clock timezone -4-Santiago
60000CRG0-35B
853
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
The type of authentication procedure is based on the enrollment command and its settings. Refer to enrollment terminal on page 3453 and enrollment url <url> on page 3454 for more information. When enrollment is set to terminal, the CA authentication process is done manually, as shown in the following Usage Examples.
Usage Examples
The following example initiates the CA authentication process: (config)#crypto ca authenticate testCAprofile Enter the base 64 encoded CA certificate. End with two consecutive carriage returns or the word quit on a line by itself: -----BEGIN X509 CERTIFICATE----MIIDEDCCAs6gAwIBAgICAXIwCwYHKoZIzjgEAwUAMFoxCzAJBgNVBAYTAkZJMSQw IgYDVQQKExtTU0ggQ29tbXVuaWNhdGlvbnMgU2VjdXJpdHkxETAPBgNVBAsTCFdl YiB0ZXN0MRIwEAYDVQQDEwlUZXN0IENBIDQwHhcNMDMwMTA5MTYyNTE1WhcNMDMx MjMxMjM1OTU5WjBaMQswCQYDVQQGEwJGSTEkMCIGA1UEChMbU1NIIENvbW11bmlj YXRpb25zIFNlY3VyaXR5MREwDwYDVQQLEwhXZWIgdGVzdDESMBAGA1UEAxMJVGVz dCBDQSA0MIIBtzCCASsGByqGSM44BAEwggEeAoGBAPTo+NdCWh87hOSnuZ7dUL07 twjZZwY3beLHnDsERhfN8XoOZZcffulKc/lqTrYiu7M5yPJsXQ3u8dbCb6RWFU0A T5Nd7/4cNn/hCmhbeb6xqsNZUsOcTZJxvClq8thkNo+gXg5bw0fiElgxZ/lEbFWL UzeO8KgM4izkq0CrGtaFAhUA2+ja4RgbbgTgJk+qTXAxicG/8JMCgYBZvcPMO2/Y Zc2sXYyrBPtv6k2ZGGYqXAUZ98/txm37JwQGafygePJ/64oeisVeDcLf2FTjveex W5saydjSK00jXjreRZcJFEDmfRhUtWR8K8tm8mEnB3eg9n09lkWibIjihHn7n5MF tBBAdbRHyctsr3DyofnieTt3DY78MDsNbgOBhQACgYEA6EKDS2IxrdMsogHfVvob PkDSv2FjOsP5Tomc/tf9jvvuf6+vj9XTw+uAg1BU9/TyjGzAtnRrCvOUkTYoVxRY vdDOi3GR2RcyNVdGrhYXWY1I5XuB5+NWij8VUQOgfXsJgbEMvPemECeYwQ4ASdhD vw0E8NI2AEkJXsCAvYfXWzujIzAhMAsGA1UdDwQEAwIBhjASBgNVHRMBAf8ECDAG AQH/AgEyMAsGByqGSM44BAMFAAMvADAsAhRa0ao0FbRQeWCc2oC24OZ1YZi8egIU IZhxKAclhXksZHvOj+yIld5x0ec= -----END X509 CERTIFICATE-----
60000CRG0-35B
854
quit Hash: 4e904504dc4e5b95e08129430e2a0b97ceef0ad1394f905b42df2dfb8f751be0244a711bb0 6eddaa2f07dd640c187f14c16fa0bed28e038b28b6741a880539d6ed06a68b7e324bfdde6f3d0b17 83d94e58fd4943f5988a7a0f27f6b6b932dc0410378247160752853858dbe7a1951245cfb14b109e ffc430e177623720de56f4 * Do you accept this certificate? [y]y
60000CRG0-35B
855
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
Typically used only in the running-config and startup-config to restore certificates.
Usage Examples
The following example enters the Certificate Configuration mode for the CA profile MyProfile: (config)#crypto ca certificate chain MyProfile
60000CRG0-35B
856
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
The type of enrollment procedure is based on the enrollment command and its settings. Refer to enrollment terminal on page 3453 and enrollment url <url> on page 3454 for more information. This command initiates a dialog that is used to fill in the parameters that make up an enrollment request to be forwarded to a certificate authority. Note that some of the parameters (such as IP address) may be filled in using the values supplied in the crypto ca profile (in which case, the enrollment dialog will not prompt for those parameters). Once all required parameters are defined using the dialog, this command assembles them into an enrollment request to be sent to a certificate authority (including the generation of public and private keys). Refer to crypto ca profile <name> on page 860 for more information. If enrollment is set to terminal, you may view the request on the terminal screen. If enrollment is set to url, the request is sent automatically to the certificate authority using the uniform resource locator (URL) specified by the enrollment url command.
Usage Examples
The following example shows a typical enrollment dialog: (config)#crypto ca enroll MyProfile **** Press CTRL+C to exit enrollment request dialog. **** * Enter signature algorithm (RSA or DSS) [rsa]:rsa * Enter the modulus length to use [512]:1024 * Enter the subject name as an X.500 (LDAP) DN:CN=Router,C=US,L=Huntsville,S=AL --The subject name in the certificate will be CN=CN=Router,C=US,L=Huntsville,S=AL. * Include an IP address in the subject name [n]:y * Enter IP address or name of interface to use:10.200.1.45 * Include fully qualified domain name [n]:y * Enter the fully qualified domain name to use:FullyQualifiedDomainName * Include an email address [n]:y * Enter the email address to use:myEmail@adtran.commyemail@email.com Generating request (including keys)....
60000CRG0-35B
857
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
Puts command line interface (CLI) in mode where the certificate can be entered manually. Enter quit and a carriage return (or simply enter two consecutive carriage returns) to exit this mode. Abort this mode by pressing Ctrl-C. This command only applies if the enrollment command is set to terminal. Refer to enrollment terminal on page 3453.
Usage Examples
The following example imports a certificate via the console terminal: (config)#crypto ca import MyProfile certificate Enter the PM-encoded certificate. End with two consecutive carriage returns or the word quit on a line by itself: -----BEGIN CERTIFICATE----MIIDWTCCAwOgAwIBAgIKFLCsOgAAAAAAtjANBgkqhkiG9w0BAQUFADBjMQswCQYD VQQGEwJVUzEQMA4GA1UECBMHQUxBQkFNQTETMBEGA1UEBxMKSHVudHN2aWxsZTEa MBgGA1UEChMRQWR0cmFuVGVjaFN1cHBvcnQxETAPBgNVBAMTCHRzcm91dGVyMB4X DTAzMDYyNTE0MTM1NVoXDTAzMTIwNjE0NDkxM1owJDEPMA0GA1UEChMGYWR0cmFu MREwDwYDVQQDEwhNeVJvdXRlcjBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQClUKqs fbTalej5m9gk2DMsbC9df3TilBz+7nRx3ZzGw75AQsqEMYeBY5aWi62W59jmxGSE WX+E8EwBVbZ6JKk5AgMBAAGjggHWMIIB0jAXBgNVHREEEDAOhwQKCgoKggZNeUZx ZG4wHQYDVR0OBBYEFJAvBRIjx1PROnkZ4v0D89yB1eErMIGcBgNVHSMEgZQwgZGA FHGwIRAr11495MgrLNPiLzjvrb4JoWekZTBjMQswCQYDVQQGEwJVUzEQMA4GA1UE CBMHQUxBQkFNQTETMBEGA1UEBxMKSHVudHN2aWxsZTEaMBgGA1UEChMRQWR0cmFu VGVjaFN1cHBvcnQxETAPBgNVBAMTCHRzcm91dGVyghAZql7OwISgsUhfaSeGh0Ot MGkGA1UdHwRiMGAwLaAroCmGJ2h0dHA6Ly90c3JvdXRlci9DZXJ0RW5yb2xsL3Rz cm91dGVyLmNybDAvoC2gK4YpZmlsZTovL1xcdHNyb3V0ZXJcQ2VydEVucm9sbFx0 c3JvdXRlci5jcmwwgY0GCCsGAQUFBwEBBIGAMH4wPAYIKwYBBQUHMAKGMGh0dHA6 Ly90c3JvdXRlci9DZXJ0RW5yb2xsL3Rzcm91dGVyX3Rzcm91dGVyLmNydDA+Bggr BgEFBQcwAoYyZmlsZTovL1xcdHNyb3V0ZXJcQ2VydEVucm9sbFx0c3JvdXRlcl90 -----END CERTIFICATE----Success!
60000CRG0-35B
858
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
Puts command line interface (CLI) in a mode where the CRL can be entered manually. Enter quit and a carriage return (or simply enter two consecutive carriage returns) to exit this mode. This command only applies if the enrollment command is set to terminal. Refer to enrollment terminal on page 3453.
Usage Examples
The following example allows you to manually paste in the CAs CRL: (config)#crypto ca import MyProfile crl
60000CRG0-35B
859
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
Use this to specify the type of enrollment, as well as enrollment request parameters. Refer to the Functional Notes of the command crypto ca enroll <name> on page 857 for more information.
Usage Examples
The following example creates the CA profile called MyProfile and enters the CA Profile Configuration for that certificate authority: (config)#crypto ca profile MyProfile Configuring New CA Profile MyProfile. (ca-profile)#
60000CRG0-35B
860
crypto ike
Use the crypto ike command to define the system-level local ID for Internet key exchange (IKE) negotiations and to enter the IKE Client or IKE Policy command sets. Use the no form of this command to disable these features. Variations of this command include the following:
crypto ike client configuration pool <name> crypto ike local-id address crypto ike policy <value>
Syntax Description
client configuration pool <name> Creates a local pool, assigns it the name of your choice and enters the IKE Client command set. Clients that connect via an IKE policy that specifies this pool name will be assigned values from this pool. Refer to the section IKE Policy Command Set on page 3508 for more information. Sets the local ID during IKE negotiation to be the IP address of the interface from which the traffic exits. This setting can be overridden on a per-policy basis using the local-id command. Refer to local-id on page 3516 for more information. Creates an IKE policy, assigns the sequence number value of your choice, and enters the IKE Policy command set. Refer to section IKE Policy Command Set on page 3508 for more information.
local-id address
policy <value>
Default Values
No default values are necessary for this command.
Command History
Release 4.1 Command was introduced.
Usage Examples
The following example creates an IKE policy with a policy priority setting of 1 and enters the IKE Policy for that policy: (config)#crypto ike policy 1
60000CRG0-35B
861
Technology Review
The following example configures an AOS product for virtual private network (VPN) using IKE aggressive mode with preshared keys (PSKs). The AOS product can be set to initiate IKE negotiation in main mode or aggressive mode. The product can be set to respond to IKE negotiation in main mode, aggressive mode, or any mode. In this example, the device is configured to initiate in aggressive mode and to respond to any mode. This example assumes that the AOS product has been configured with a wide area network (WAN) IP address of 63.97.45.57 on interface ppp 1 and a local area network (LAN) IP address of 10.10.10.254 on interface ethernet 0/1. The peer private IP Subnet is 10.10.20.0. For more detailed information on VPN configuration, refer to the VPN configuration guide located on the AOS Documentation CD provided with your product. Step 1: Enter the Global Configuration mode (i.e., config terminal mode). >enable #configure terminal Step 2: Enable VPN support using the ip crypto command. This command allows crypto maps to be applied to interfaces, and enables the IKE server to listen for IKE negotiation sessions on User Datagram Protocol (UDP) port 500. (config)#ip crypto Step 3: Set the local ID. During IKE negotiation, local IDs are exchanged between the local device and the peer device. In AOS, the default setting for all local IDs are configured by the crypto ike local-id command. The default setting is for all local IDs to be the IPv4 address of the interface over which the IKE negotiation is occurring. In the future, a unique system-wide host name or fully qualified domain name (FQDN) could be used for all IKE negotiation. (config)#crypto ike local-id address Step 4: Create IKE policy. In order to use IKE negotiation, an IKE policy must be created. Within the system, a list of IKE policies is maintained. Each IKE policy is given a priority number in the system. That priority number defines the position of that IKE policy within the system list. When IKE negotiation is needed, the system searches through the list, starting with the policy with priority of 1, looking for a match to the peer IP address. An individual IKE policy can override the system local ID setting by having the local-id command specified in the IKE policy definition. This command in the IKE policy is used to specify the type of local ID and the local ID data. The type can be of IPv4 address, FQDN, or user-specified FQDN.
60000CRG0-35B
862
An IKE policy may specify one or more peer IP addresses that will be allowed to connect to this system. To specify multiple unique peer IP addresses, the peer A.B.C.D command is used multiple times within a single IKE policy. To specify that all possible peers can use a default IKE policy, the peer any command is given instead of the peer A.B.C.D command inside of the IKE policy. The policy with the peer any command specified will match to any peer IP address (and, therefore, should be given the highest numerical priority number). This will make the policy the last one to be compared against during IKE negotiation. (config)#crypto ike policy 10 (config-ike)#no local-id (config-ike)#peer 63.105.15.129 (config-ike)#initiate aggressive (config-ike)#respond anymode (config-ike)#attribute 10 (config-ike-attribute)#encryption 3des (config-ike-attribute)#hash sha (config-ike-attribute)#authentication pre-share (config-ike-attribute)#group 1 (config-ike-attribute)#lifetime 86400 Step 5: Define the remote ID settings. The crypto ike remote-id command is used to define the remote ID for a peer connecting to the system, specify the preshared key associated with the specific remote ID, and (optionally) determine that the peer matching this remote ID should not use mode config (by using the no-mode-config keyword). Refer to crypto ike remote-id on page 865 for more information. (config)#crypto ike remote-id address 63.105.15.129 preshared-key mysecret123 Step 6: Define the transform-set. A transform set defines the encryption and/or authentication algorithms to be used to secure the data transmitted over the VPN tunnel. Multiple transform sets may be defined in a system. Once a transform set is defined, many different crypto maps within the system can reference it. In this example, a transform set named highly_secure has been created. This transform set defines encapsulating security payload (ESP) with authentication implemented using 3DES encryption and SHA1 authentication. (config)#crypto ipsec transform-set highly_secure esp-3des esp-sha-hmac (cfg-crypto-trans)#mode tunnel Step 7: Define an IP access list. An extended access control list (ACL) is used to specify which traffic needs to be sent securely over the VPN tunnel. The entries in the list are defined with respect to the local system. The source IP address will be the source of the traffic to be encrypted. The destination IP address will be the receiver of the data on the other side of the VPN tunnel. (config)#ip access-list extended corporate_traffic (config-ext-nacl)#permit ip 10.10.10.0 0.0.0.255 10.10.20.0 0.0.0.255 log deny ip any any
60000CRG0-35B
863
Step 8: Create crypto map. A crypto map is used to define a set of encryption schemes to be used for a given interface. A crypto map entry has a unique index within the crypto map set. The crypto map entry will specify whether IKE is used to generate encryption keys or if manually specified keys will be used. The crypto map entry will also specify who will be terminating the VPN tunnel, as well as which transform set or sets will be used to encrypt and/or authenticate the traffic on that VPN tunnel. It also specifies the lifetime of all created IPSec security associations (SAs). (config)#crypto map corporate_vpn 1 ipsec-ike (config-crypto-map)#match address corporate_traffic (config-crypto-map)#set peer 63.105.15.129 (config-crypto-map)#set transform-set highly_secure (config-crypto-map)#set security-association lifetime kilobytes 8000 (config-crypto-map)#set security-association lifetime seconds 28800 (config-crypto-map)#no set pfs Step 9: Configure a public interface. This process includes configuring the IP address for the interface and applying the appropriate crypto map to the interface. Crypto maps are applied to the interface on which encrypted traffic will be transmitted. (config)#interface ppp 1 (config-ppp 1)#ip address 63.97.45.57 255.255.255.248 (config-ppp 1)#crypto map corporate_vpn (config-ppp 1)#no shutdown Step 10: Configure a private interface. This process allows all traffic destined for the VPN tunnel to be routed to the appropriate gateway. (config)#interface ethernet 0/1 (config-eth 0/1)#ip address 10.10.10.254 255.255.255.0 (config-eth 0/1)#no shutdown (config-eth 0/1)#exit
60000CRG0-35B
864
The AOS virtual private network (VPN) feature must be enabled (using the ip crypto command) for the VPN tunnel to be activated.
For VPN configuration example scripts, refer to the VPN configuration guide located on the AOS Documentation CD provided with your unit.
Syntax Description
address <ip address> Specifies a valid remote IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Allows any remote ID (type and value). Specifies an abstract syntax notation distinguished name as the remote ID (enter this value in (Lightweight Directory Access Protocol (LDAP) format). Specifies a fully qualified domain name (FQDN) (e.g., adtran.com) as the remote ID. Specifies a user FQDN or email address (e.g., user1@adtran.com) as the remote ID. Specifies an optional parameter corresponding to this remote ID. Optional parameters include the following list: Optional. Specifies the wildcard mask that corresponds to a range of IP addresses (network) or a specific host. Wildcard masks are expressed in dotted decimal notation (for example, 0.0.0.255).
60000CRG0-35B
865
Command Reference Guide crypto map <name> <number> ike policy <value> preshared-key <key> no-mode-config no-xauth
Global Configuration Mode Command Set Optional. Specifies the crypto map name and sequence number this remote ID corresponds to. Optional. Specifies the Internet key exchange (IKE) policy sequence number value this remote ID corresponds to. Optional. Associates a preshared key with this remote ID. Optional. Specifies that the peer matching this remote ID should not use mode config. Optional. Specifies that the peer matching this remote ID should not use Xauth.
nat-t [v1 l v2] [allow l force I disable] Optional. Denotes whether peers matching this remote ID should allow, disable, or force network address translation (NAT) traversal versions 1 or 2.
Default Values
No default values are necessary for this command.
Command History
Release 4.1 Release 5.1 Release 7.1 Command was introduced. Command was expanded to include the any, asn1-dn, and no-xauth subcommands. Command was expanded to include the NAT traversal commands.
Functional Notes
The fqdn and user-fqdn <fqdn> line can include wildcard characters. The wildcard characters are * for a 0 or more character match and ? for a single character match. Currently, the ? cannot be set up using the command line interface (CLI), but it can be transferred to the unit via the startup-config. Example for user-fqdn: john*@domain.com will match: johndoe@domain.com johnjohn@adtran.comjohnjohn@myemail.com john@adtran.comjohn@myemail.com Example for fqdn: *.domain.com will match: www.domain.com ftp.domain.com one.www.domain.com
60000CRG0-35B
866
The address remote ID can be in the form of a single host address or in the form of an IP address wildcard. Example for address type: crypto ike remote id address 10.10.10.0 0.0.0.255 will match: 10.10.10.1 10.10.10.2 and all IP addresses in the form of 10.10.10.X (where X is 0 to 255) The asn1-dn <name> line can include wildcard characters. The wildcard characters are * for a 0 or more character match and ? for a single character match. Currently, the ? cannot be set up using the CLI, but it can be transferred to the unit via the startup-config. Example for typical asn1-dn format with no wildcards: crypto ike remote-id asn1-dn CN=MyRouter, C=US, S=ALCA, L=Huntsville, O=Adtran, OU=TechSupport (matches only remote ID strings with all fields exactly the same) Example for typical asn1-dn format with wildcards used to match a string within a field: crypto ike remote-id asn1-dn CN=*, C=*, S=*, L=*, O=*, OU=* (matches any asn1-dn remote ID string from a peer) Example for typical asn1-dn format with wildcards used to match a portion of the remote ID: crypto ike remote-id asn1-dn CN=*, C=US, S=ALCA, L=Huntsville, O=Adtran, OU=* (matches any remote ID string with the same values for the C, S, L, and O fields, and any values in the CN and OU fields) Example for typical asn1-dn format with wildcards used to match a portion of a field: crypto ike remote-id asn1-dn CN=My*, C=US, S=ALCA, L=Huntsville, O=Adtran, OU=TechSupport (matches remote ID strings with all fields exactly the same, but with any CN field beginning with My)
Usage Examples
The following example assigns a remote ID of 63.97.45.57 and associates the preshared key mysecret with the remote ID: (config)#crypto ike remote-id address 63.97.45.57 preshared-key mysecret
60000CRG0-35B
867
Syntax Description
<name> <parameters> Assigns a name to the transform set you are about to define. Assigns a combination of up to three security algorithms from the following list: ah-md5-hmac, ah-sha-hmac esp-des, esp-3des, esp-aes-128-cbc, esp-aes-192-cbc, esp-aes-256-cbc, esp-null esp-md5-hmac, esp-sha-hmac
Default Values
No default values are necessary for this command.
Command History
Release 4.1 Command was introduced.
Functional Notes
Crypto map entries do not directly contain the transform configuration for securing data. Instead, the crypto map is associated with transform sets that contain specific security algorithms. If no transform set is configured for a crypto map, the entry is incomplete and will have no effect on the system.
Usage Examples
The following example first creates a transform set (Set1) consisting of two security algorithms (up to three may be defined), and then assigns the transform set to a crypto map (Map1): (config)#crypto ipsec transform-set Set1 esp-3des esp-sha-hmac (cfg-crypto-trans)#exit (config)#crypto map Map1 1 ipsec-ike (config-crypto-map)#set transform-set Set1
60000CRG0-35B
868
crypto map
Use the crypto map command to define crypto map names and numbers and to enter the associated mode (either Crypto Map Internet key exchange (IKE) or Crypto Map Manual). Use the no form of this command to disable this feature. Variations of this command include the following:
crypto map <name> <index> ipsec-ike crypto map <name> <index> ipsec-manual
For virtual private network (VPN) configuration example scripts, refer to the VPN configuration guide located on the AOS Documentation CD provided with your unit.
Syntax Description
<name> <index> ipsec-ike ipsec-manual Names the crypto map. You can assign the same name to multiple crypto maps, as long as the map index numbers are unique. Assigns a crypto map sequence number. Specifies the crypto map IKE (refer to Crypto Map IKE Command Set on page 3466). This supports IPSec entries that will use IKE to negotiate keys. Specifies the crypto map manual (refer to Crypto Map Manual Command Set on page 3484). This supports manually configured IPSec entries.
Default Values
No default values are necessary for this command.
Command History
Release 4.1 Command was introduced.
Functional Notes
Crypto map entries do not directly contain the transform configuration for securing data. Instead, the crypto map is associated with transform sets that contain specific security algorithms (refer to crypto ipsec transform-set <name> <parameters> on page 868). Crypto map entries do not directly contain the selectors used to determine which data to secure. Instead, the crypto map entry refers to an access control list (ACL). An ACL is assigned to the crypto map using the match address command (refer to ike-policy <number> on page 3470). If no transform set or access list is configured for a crypto map, the entry is incomplete and will have no effect on the system. When you apply a crypto map to an interface (using the crypto map command within the interfaces mode), you are applying all crypto maps with the given map name. This allows you to apply multiple crypto maps if you have created maps that share the same name, but have different map index numbers.
60000CRG0-35B
869
Usage Examples
The following example creates a new IPSec IKE crypto map called testMap with a map index of 10: (config)#crypto map testMap 10 ipsec-ike (config-crypto-map)#
Technology Review
A crypto map entry is a single policy that describes how certain traffic is to be secured. There are two types of crypto map entries: ipsec-manual and ipsec-ike. Each entry is given an index that is used to sort the ordered list. When a nonsecured packet arrives on an interface, the crypto map set associated with that interface is processed in order. If a crypto map entry matches the nonsecured traffic, the traffic is discarded. When a packet is to be transmitted on an interface, the crypto map set associated with that interface is processed in order. The first crypto map entry that matches the packet will be used to secure the packet. If a suitable security association (SA) exists, it is used for transmission. Otherwise, IKE is used to establish an SA with the peer. If no SA exists, and the crypto map entry is respond only, the packet is discarded. When a secured packet arrives on an interface, its security parameter index (SPI) is used to look up an SA. If an SA does not exist, or if the packet fails any of the security checks (bad authentication, traffic does not match SA selectors, etc.), it is discarded. If all checks pass, the packet is forwarded normally.
60000CRG0-35B
870
data-call
Use the data-call command to set the preauthentication defaults for inbound demand routing calls. Use the no form of this command to return to the default setting. Variations of this command include:
data-call authentication protocol chap data-call authentication protocol pap data-call mtu <number> data-call multilink data-call sent authentication protocol chap data-call sent authentication protocol pap
Syntax Description
authentication protocol Sets the authentication protocol expected for inbound calls. For more detailed information on Challenge-Handshake Authentication Protocol (CHAP) and Password Authentication Protocol (PAP), refer to the Technology Review section of the command ppp authentication on page 2291. Configures CHAP authentication. Configures PAP authentication. Sets the maximum size for the transmit unit. Valid range is 64 to 1520. Refer to the command peer default ip address <ipv4 address> on page 2289 for more detailed syntax descriptions. Enables the negotiation of multilink maximum receive unit (MRU) size for inbound calls. Sets the authentication protocol sent for inbound calls. For more detailed information on CHAP and PAP, refer to the Technology Review section of the command ppp authentication on page 2291.
Default Values
By default, the authentication protocol is not configured, multilink is disabled, and the maximum transmission unit (MTU) size is 1500.
Command History
Release 11.1 Command was introduced.
Functional Notes
There are certain Point-to-Point Protocol (PPP) parameters that must be known before PPP can negotiate an inbound call when using demand routing. To ensure PPP convergence, it is recommended (in most cases) that demand routing interfaces use the same settings as those specified in the data-call commands. The data-call mtu <number> command sets the MTU and controls the negotiated MRU size during incoming calls for Link Control Protocol (LCP) negotiation. If the PPP parameters do not match the authenticated user, the link is renegotiated.
60000CRG0-35B
871
Usage Examples
The following example sets the authentication protocol expected for incoming calls to CHAP. The router will then authenticate the peer using CHAP: (config)#data-call authentication protocol chap The following example specifies an MTU of 1200 on the demand routing interface: (config)#data-call mtu 1200
60000CRG0-35B
872
desktop-auditing dhcp
Use the desktop-auditing dhcp command to enable desktop auditing. Using the no form of this command disables desktop auditing. Syntax Description
No subcommands.
Default Values
By default, desktop auditing is disabled.
Command History
Release 17.8 Command was introduced.
Functional Notes
Desktop auditing is an AOS feature that collects network access protection (NAP) information through NAP messages sent in Dynamic Host Configuration Protocol (DHCP) messages between clients connected to the network and the network server. Desktop auditing is configured by enabling the feature (using the desktop-auditing dhcp command) and by configuring filters to limit the output of the collected NAP information. Information is limited by specifying local desktop auditing policies. The configuration of these policies is outlined in Desktop Auditing Local Policy Command Set on page 2689. For more information about desktop auditing, refer to the Configuring Desktop Auditing in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example enables the desktop auditing feature: (config)#desktop-auditing dhcp
60000CRG0-35B
873
desktop-auditing local-policy
Use the desktop-auditing local-policy command to create a local policy for determining when connected network clients are violators of that policy. This command both creates the policy and enters the local policy configuration mode. Use the no form of this command to remove the local policy. Command Syntax
No subcommands.
Default Values
By default, no local policies are configured and all network access protection (NAP) information for all clients is monitored.
Command History
Release 17.8 Command was introduced.
Functional Notes
Desktop auditing is an AOS feature that collects NAP information through NAP messages sent in Dynamic Host Configuration Protocol (DHCP) messages between clients connected to the network and the network server. Desktop auditing is configured by enabling the feature (using the command desktop-auditing dhcp on page 873) and by configuring filters to limit the output of the collected NAP information. Information is limited by specifying local desktop auditing policies. The local policy determines when a network access protection (NAP) client may be a violator by collecting NAP information for the connected clients and comparing them to the configured policies. You can choose to monitor the clients firewall state, antivirus state, antispyware status, auto-update status, and security update status. Selecting these policies filters the collected client information. The configuration of these policies is outlined in Desktop Auditing Local Policy Command Set on page 2689. For more information about desktop auditing, refer to the Configuring Desktop Auditing in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example creates a desktop auditing local policy and enters the policys configuration mode: (config)#desktop-auditing local-policy (desktop-audit-policy)#
60000CRG0-35B
874
Default Values
By default, desktop auditing is set to timeout in 0 days, meaning the collected NAP information is stored indefinitely.
Command History
Release 17.8 Command was introduced.
Functional Notes
Desktop auditing is an AOS feature that collects NAP information through NAP messages sent in Dynamic Host Configuration Protocol (DHCP) messages between clients connected to the network and the network server. Desktop auditing is configured by enabling the feature (using the desktop-auditing dhcp command) and by configuring filters to limit the output of the collected NAP information. Information is limited by specifying local desktop auditing policies. The configuration of these policies is outlined in Desktop Auditing Local Policy Command Set on page 2689. For more information about desktop auditing, refer to the Configuring Desktop Auditing in AOS configuration guide available online at http://kb.adtran.com. There is a storage limit of 2000 NAP entries on the AOS unit. When this limit is reached, new entries overwrite the old entries.
Usage Examples
The following example specifies that NAP information collected by desktop auditing will expire in 7 days: (config)#desktop-auditing timeout 7
60000CRG0-35B
875
dos-protection
Use the dos-protection command to enable and configure the denial of service (DoS) protection feature. Use the no form of this command to disable the DoS protection feature. Variations of this command include:
dos-protection all dos-protection except <id> dos-protection max-icmpv4-payload <bytes> dos-protection max-icmpv6-payload <bytes> dos-protection min-tcp-header <bytes>
Syntax Description
all except <ids> max-icmpv4-payload <bytes> max-icmpv6-payload <bytes> min-tcp-header <bytes> Enables protection from all DoS attacks available in the feature. Enables protection from all available DoS attacks except those with the listed threat ids. Sets the maximum ICMP payload size in bytes for IPv4 packets. Range is 0 to 16 KB. Default is 512 bytes. Sets the maximum ICMP payload size in bytes for IPv6 packets. Range is 0 to 16 KB. Default is 512 bytes. Sets the minimum TCP header size in bytes. Range is 0 to 255 bytes. Default is 20 bytes.
Default Values
By default, DoS protection in AOS is disabled.
Command History
Release 17.7 Command was introduced.
Functional Notes
The show dos-id command is used to obtain the DoS threat IDs necessary to create exceptions using the dos-protection except <id> version of this command.
Usage Examples
The following example configures the DoS protection feature to protect against all available threats except threat ID 40: (config)#dos-protection except 40
60000CRG0-35B
876
dot11ap access-point-control
Use the dot11ap access-point-control command to globally enable the access point controller logic on the platform. Use the no form of this command to disable the access controller (AC) logic on the platform. Syntax Description
No subcommands.
Default Values
By default, the AC logic is disabled.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example enables the AC logic: (config)#dot11ap access-point-control
60000CRG0-35B
877
To prevent unauthorized users from accessing the configuration functions of your device, immediately define an Enable-level password.
Syntax Description
md5 Optional. Specifies message digest 5 (MD5) as the encryption protocol to use when displaying the Enable password during show commands. If the md5 keyword is not used, encryption is not used when displaying the Enable password during show commands. Specifies the Enable password using a string (up to 30 characters in length).
<password>
Default Values
By default, there is no password configured for the Enable mode.
Command History
Release 1.1 Command was introduced.
Usage Examples
To provide extra security, AOS can encrypt the Enable password when displaying the current configuration. For example, the following is a show configuration printout (password portion) with an unencrypted Enable password (ADTRAN): ! enable password ADTRAN ! Alternately, the following is a show configuration printout (password portion) with an Enable password of ADTRAN using MD5 encryption: ! enable password md5 encrypted 5aa5fbae7d01a90e79fb57705ce74676 !
60000CRG0-35B
878
ethernet cfm
Use the ethernet cfm command to enable Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) on the AOS device. Use the no form of this command to disable Ethernet OAM CFM. Syntax Description
No subcommands.
Default Values
By default, Ethernet OAM CFM is disabled.
Command History
Release 17.4 Command was introduced.
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013). For more information regarding specific Ethernet OAM CFM configuration commands, refer to the Ethernet OAM CFM Command Set on page 2720.
Usage Examples
The following example enables Ethernet OAM CFM on an AOS device: (config)#ethernet cfm
60000CRG0-35B
879
Syntax Description
domain <name> level <level> none Specifies the MDs name. The name can be up to 42 characters in length. Specifies the MDs maintenance level. Range is 0 to 7. Specifies that the MDs name is not used to create the maintenance association ID (MAID).
Default Values
By default, no MDs exist.
Command History
Release 17.4 Command was introduced.
Functional Notes
This command not only creates and enables the MD, it also enters the MD Configuration mode. From the MD Configuration mode, maintenance associations (MAs) and maintenance endpoints (MEPs) can be configured. For more information on configuring MAs and MEPs, refer to the Ethernet OAM CFM Command Set on page 2720. When the no form of this command is used, the MD is deleted, as well as any MAs and MEPs defined with the domain. The domain name serves two purposes. One is to provide a text label used in the device configuration to identify a particular domain, the other is to construct an MAID. The MAID is included in CFM continuity check messages (CCMs), and identifies the MA to which the transmitting MEP belongs. The MAID also allows MEPs receiving CCMs to detect CFM error conditions. Because each MEP supported on an AOS device port or interface must be at a different MD level, each MEP on a particular port or interface will have to be configured on a separate MD. For more information about Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
60000CRG0-35B
880
Usage Examples
The following example creates, enables, and enters the configuration mode of a MD named Domain1, created on level 6: (config)#ethernet cfm domain Domain1 level 6 (config-ecfm-domain)#
60000CRG0-35B
881
Default Values
By default, warning messages are disabled.
Command History
Release 17.4 Command was introduced.
Functional Notes
For more information about Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example enables Ethernet OAM CFM warning messages: (config)#ethernet cfm log-changes
60000CRG0-35B
882
event-history on
Use the event-history on command to enable event logging for the AOS system. Event log messages will not be recorded unless this command has been issued (regardless of the event-history priority configured). The event log may be displayed using the show event-history command. Use the no form of this command to disable the event log. Syntax Description
No subcommands.
Default Values
By default, the AOS event logging capabilities are disabled.
Command History
Release 1.1 Command was introduced.
Functional Notes
The event history provides useful information regarding the status of the system and individual port states. Use the event history as a troubleshooting tool when identifying system issues. The following is a sample event history log. #show event-history Using 526 bytes 2002.07.12 15:34:01 T1.t1 1/1 Yellow 2002.07.12 15:34:01 INTERFACE_STATUS.t1 1/1 changed state to down. 2002.07.12 15:34:02 T1.t1 1/1 No Alarms 2002.07.12 15:34:02 INTERFACE_STATUS.t1 1/1 changed state to up. 2002.07.12 15:34:03 INTERFACE_STATUS.eth 0/1 changed state to up. 2002.07.12 15:34:10 OPERATING_SYSTEM Warm Start 2002.07.12 15:34:12 PPP.NEGOTIATION LCP up 2002.07.12 15:34:12 PPP.NEGOTIATION IPCP up
Usage Examples
The following example enables the AOS event logging feature: (config)#event-history on
60000CRG0-35B
883
event-history priority
Use the event-history priority command to set the threshold for events stored in the event history. All events with the specified priority or higher will be kept for viewing in the local event log. The event log may be displayed using the show event-history command. Use the no form of this command to keep specified priorities from being logged. Variations of this command include:
event-history priority error event-history priority fatal event-history priority info event-history priority notice event-history priority warning
Syntax Description
error fatal info notice warning Logs events with error and fatal priorities. Logs only events with a fatal priority. Logs all events. Logs events with notice, warning, error, and fatal priorities. Logs events with warning, error, and fatal priorities.
Default Values
By default, no event messages are logged to the event history.
Command History
Release 1.1 Command was introduced.
Functional Notes
The event history provides useful information regarding the status of the system and individual port states. Use the event history as a troubleshooting tool when identifying system issues. The following is a sample event history log. Router#show event-history Using 526 bytes 2002.07.12 15:34:01 T1.t1 1/1 Yellow 2002.07.12 15:34:01 INTERFACE_STATUS.t1 1/1 changed state to down. 2002.07.12 15:34:02 T1.t1 1/1 No Alarms 2002.07.12 15:34:02 INTERFACE_STATUS.t1 1/1 changed state to up. 2002.07.12 15:34:03 INTERFACE_STATUS.eth 0/1 changed state to up. 2002.07.12 15:34:10 OPERATING_SYSTEM Warm Start 2002.07.12 15:34:12 PPP.NEGOTIATION LCP up 2002.07.12 15:34:12 PPP.NEGOTIATION IPCP up
60000CRG0-35B
884
Usage Examples
The following example logs all events to the event history: (config)#event-history priority info
60000CRG0-35B
885
Syntax Description
<value> Specifies the minimum amount of memory (in bytes) that must be free before a reboot occurs.
Default Values
By default, exception memory minimum is disabled.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example sets the exception memory minimum to 3 MB: (config)#exception memory minimum 30000000
60000CRG0-35B
886
exception report
Use the exception report command to specify the name of the output file for the exception report. Use the no form of this command to return to the default setting. Variations of this command include:
exception report exception report file-name <filename>
Syntax Description
file-name <filename> Optional. Specifies a file name for the exception report other than the default file name.
Default Values
By default, the exception report file name is exception report-yyyyMMddHHmmss. (The yyyyMMddHHmmss will be automatically replaced with the actual year, month, day, hour, minutes, and seconds.)
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example specifies example as the name of the output file for an exception report: (config)#exception report file-name example (config)#exit #exception report generate Exception report generated. #show flash 1744 startup-config 45676 example-20050708080537 #config t (config)#no exception report file-name (config)#exit Appropriate commands must be issued to preserve configuration. #exception report generate Exception report generated. #show flash 1744 startup-config 45676 example-20050708080537 45900 exception-report-20050708080552
60000CRG0-35B
887
Default Values
By default, no AAA authentication method list is applied to FTP. If AAA is enabled (using the command aaa on on page 833), but no list is assigned to FTP, FTP automatically uses the local user list for authentication.
Command History
Release 5.1 Command was introduced.
Functional Notes
AAA must be enabled for an authentication list to be applied to FTP authentication. For more information on enabling AAA, refer to the command aaa on on page 833. AAA authentication lists for use with FTP can be lists that control user login permissions or lists that control user Enable mode access permissions. These lists are created using the following commands: aaa authentication login on page 815 and aaa authentication enable default on page 811. For more information on AAA configuration, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example attaches the authentication method list MyList to the FTP server: (config)#ftp authentication MyList
60000CRG0-35B
888
Syntax Description
join <value> leave <value> leaveall <value> Specifies the timer value (in milliseconds) between GARP application join messages. Specifies the timer value (in milliseconds) between GARP application leave messages (must be at least three times longer than the join timer). Specifies the timer value (in milliseconds) between GARP application leave all messages (must be greater than the leave timer).
Default Values
By default, the join timer is 200 milliseconds, the leave timer is 600 milliseconds, and the leaveall timer is 10000 milliseconds.
Command History
Release 8.1 Command was introduced.
Functional Notes
All devices communicating using GARP in the network need to have the same values for these timers. Changing these values is not recommended.
Usage Examples
The following example specifies the time (in milliseconds) between GARP application leave all messages: (config)#garp timer leaveall 20000
60000CRG0-35B
889
gvrp
Use the gvrp command to enable GARP VLAN Registration Protocol (GVRP) on the switch globally. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, GVRP is disabled.
Command History
Release 8.1 Command was introduced.
Functional Notes
Disabling GVRP globally will disable GVRP on all interfaces.
Usage Examples
The following example enables GVRP on the switch globally: (config)#gvrp
60000CRG0-35B
890
hostname <name>
Use the hostname command to create a name used to identify the unit. This alphanumeric string should be used as a unique description for the unit. This string will be displayed in all prompts. Use the no form of this command to remove a host name. Syntax Description
<name> Identifies the unit using an alphanumeric string up to 32 characters.
Default Values
By default, the host name is router.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example creates a host name for the AOS device of ATL_RTR to identify the system as the Atlanta router: (config)#hostname ATL_RTR
60000CRG0-35B
891
hw-access-map <name>
Use the hw-access-map command to create and name a hardware access map. This command also enters the maps configuration mode. Using the no form of this command deletes the hardware access map. For a complete list of all hardware access map configuration commands, refer to the Hardware ACL and Access Map Command Set on page 2738.
Syntax Description
<name> Specifies the name of the hardware access map.
Default Values
By default, all AOS security features are disabled, and there are no configured hardware access maps.
Command History
Release 17.6 Command was introduced.
Functional Notes
This command only creates an empty hardware access map, it does not configure it. For additional hardware access map configuration commands and configuration parameters, refer to the Hardware ACL and Access Map Command Set on page 2738 or the Hardware ACLs in AOS configuration guide available online at http://kb.adtran.com (article number 3088).
Usage Examples
The following example creates a hardware access map Map1 and enters the hardware access map configuration mode: (config)#hw-access-map Map1 (config-hw-access-map)#
Technology Review
Hardware access maps can only forward traffic. This action can be performed based on the criteria outlined in a single IP hardware access control list (ACL), a single medium access control (MAC) hardware ACL, or both. Like the hardware ACLs, the hardware access map will match traffic in top-down order. If you configure the access map to reference a nonexistent IP or MAC hardware ACL, the ACL will be created. Note that this newly created ACL will have permit any as the default entry because no other entries are present.
60000CRG0-35B
892
Hardware access maps are not active until they are applied to a VLAN. For instructions on how to apply an access map to a VLAN, refer to vlan <vlan id> on page 1254.
Changing hardware ACL or hardware access map configuration or application causes new information to be reinstalled on the hardware. It is possible to run out of hardware resources depending on how many resources are needed to apply the desired change. If there are not enough hardware resources to install the new criteria in the hardware, an error message is displayed. You can view the amount of hardware resources available using the command show hw-filter-resource on page 471.
60000CRG0-35B
893
Default Values
By default, no EFM groups exist.
Command History
Release A4.01 Command was introduced.
Functional Notes
The EFM group is a logical interface that represents the EFM bonding group. The interfaces that are connected to the EFM group provide physical links to carry the bonded traffic. For more information about configuring the EFM group, refer to EFM Group Command Set on page 1932.
Usage Examples
The following example creates EFM group 1 and enters the groups configuration mode: (config)#interface efm-group 1 (config-efm-group 1)#
60000CRG0-35B
894
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Functional Notes
The MEF Ethernet interface is a virtual interface that provides connection between the Ethernet in the first mile (EFM) network interface module (NIM2) and the AOS unit. If you are using 802.1q encapsulation, you must have a native VLAN MEF Ethernet subinterface configured for the EFM NIM2 to communicate with the AOS unit. For more information about the MEF Ethernet interface, refer to MEF Ethernet Interface on page 1357. For more information about the configuration of EFM NIM2s and the MEF Ethernet interface, refer to the Configuring EFM NIM2s and the MEF Ethernet Interface in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example enters the configuration mode for MEF Ethernet interface in slot 1 port 1: (config)#interface mef-ethernet 1/1
60000CRG0-35B
895
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 11.1 Release 14.1 Command was introduced. Command was expanded to include the foreign exchange office (FXO) range. Command was expanded to include the Gigabit Ethernet interfaces.
Functional Notes
All configuration changes made in this mode will apply to all interfaces in the range specified.
Usage Examples
The following example selects seven consecutive Ethernet ports for configuration: (config)#interface range eth 0/3-0/12 (config-eth 0/3-12)# The following example selects nonconsecutive Ethernet ports for configuration: (config)#interface range eth 0/14, 0/16, 0/18 (config-eth 0/14, 0/16, 0/18)#
60000CRG0-35B
896
ip
Use the ip command to specify alternate Transmission Control Protocol (TCP) ports for secure shell (SSH) and Telnet servers. Use the no form of this command to return to the default setting. Variations of this command include:
ip ssh-server <port> ip telnet-server <port>
Syntax Description
ssh-server <port> telnet-server <port> Configures the SSH server to listen on an alternate TCP port. Configures the Telnet server to listen on an alternate TCP port.
Default Values
By default, the SSH server listens on TCP port 22 and Telnet listens on TCP port 23.
Command History
Release 11.1 Command was introduced.
Functional Notes
SSH is a newer version of Telnet that allows you to run command line and graphical applications (as well as, transfer files) over an encrypted connection.
Usage Examples
The following example configures the Telnet server to listen on TCP port 2323, instead of the default port 23: (config)#ip telnet-server 2323 The following example configures the SSH server to listen on TCP port 2200, instead of the default port 22: (config)#ip ssh-server 2200 To return to the default setting, use the no form of the command. For example: (config)#no ip ssh-server 2200
60000CRG0-35B
897
Syntax Description
<ipv4 acl name> Specifies the name of the IPv4 ACL.
Default Values
By default, all AOS security features are disabled, and there are no configured IPv4 ACLs.
Command History
Release 2.1 Command was introduced.
Functional Notes
This command only creates an empty extended IPv4 ACL, it does not configure it. For additional extended ACL configuration commands and configuration parameters, refer to the IPv4 Access Control List Command Set on page 2755.
Usage Examples
The following example creates an extended IPv4 ACL AllowIKE and enters the Extended ACL Configuration mode: (config)#ip access-list extended AllowIKE (config-ext-nacl)#
Technology Review
IPv4 ACLs are used as packet selectors by different AOS IPv4 features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit ACL is used to match packets (meeting the specified pattern) to enter the router system. A deny ACL advances AOS to the next access policy entry. AOS provides two types of ACLs: standard and extended. Standard ACLs match based on the source of the packet. Extended ACLs match based on the source and destination of the packet. ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
60000CRG0-35B
898
IPv4 ACLs cannot have the same name as IPv6 ACLs. If you are using both IPv4 and IPv6, you must have different ACLs for each IP version. VPN routing and forwarding (VRF) on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF. More information on IPv4 ACL, ACP, and AOS firewall configuration is available in the IP Firewall configuration guide, located online at http://kb.adtran.com (article number 1543).
60000CRG0-35B
899
Syntax Description
<ipv4 acl name> Specifies the name of the IPv4 ACL.
Default Values
By default, all AOS security features are disabled, and there are no configured IPv4 ACLs.
Command History
Release 2.1 Command was introduced.
Functional Notes
This command only creates an empty standard IPv4 ACL, it does not configure it. For additional standard IPv4 ACL configuration commands and configuration parameters, refer to the IPv4 Access Control List Command Set on page 2755.
Usage Examples
The following example creates a standard IPv4 ACL AllowIKE and enters the Standard ACL Configuration mode: (config)#ip access-list standard AllowIKE (config-std-nacl)#
Technology Review
IPv4 ACLs are used as packet selectors by different IPv4 AOS features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit ACL is used to match packets (meeting the specified pattern) to enter the router system. A deny ACL advances AOS to the next access policy entry. AOS provides two types of ACLs: standard and extended. Standard ACLs match based on the source of the packet. Extended ACLs match based on the source and destination of the packet. ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
60000CRG0-35B
900
IPv4 ACLs cannot have the same name as IPv6 ACLs. If you are using both IPv4 and IPv6, you must have different ACLs for each IP version. VPN routing and forwarding (VRF) on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF. More information on ACL, ACP, and AOS firewall configuration is available in the IP Firewall configuration guide, located online at http://kb.adtran.com (article number 1543).
60000CRG0-35B
901
ip as-path-list <name>
Use the ip as-path-list command to create IP autonomous system (AS) path lists for route map use. Use the no form of this command to delete the AS path list. Syntax Description
<name> Specifies the name of the AS path list. Refer to AS Path List Command Set on page 2548 for more information on the available options.
Default Values
By default, no AS path lists are defined.
Command History
Release 9.3 Command was introduced.
Functional Notes
AS path lists are a type of route filter that permits or denies Border Gateway Protocol (BGP) routes based on the AS_PATH attribute. AS path lists define a list of AS specifications that, once created, may then be referenced in a route map. Refer to the Usage Examples section below.
Usage Examples
The following example creates the AS path list list5 and enters the IP as-path-list command mode: (config)#ip as-path-list list5 (config-as-path-list)#
60000CRG0-35B
902
ip classless
Use the ip classless command to forward classless packets to the best supernet route available. A classless packet is a packet addressed for delivery to a subnet of a network with no default network route. Syntax Description
No subcommands.
Default Values
By default, this command is enabled.
Command History
Release 1.1 Command was introduced.
Functional Notes
AOS products only function in classless mode. You cannot disable this feature.
Usage Examples
The following example enables the system to forward classless packets: (config)#ip classless
60000CRG0-35B
903
ip community-list <name>
Use the ip community-list command to create a community list for Border Gateway Protocol (BGP) route map use. Use the no form of this command to delete a community list. Syntax Description
<name> Specifies the name of the community to use in the community list attribute for BGP routes. Refer to Community List Command Set on page 2587 for more information on the available options.
Default Values
By default, this command is disabled.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example creates a community list MyList and enters the Community List Configuration mode: (config)#ip community-list MyList
60000CRG0-35B
904
ip crypto
Use the ip crypto command to enable AOS virtual private network (VPN) functionality and allow crypto maps to be added to the interfaces. Use the no form of this command to disable the VPN functionality. Variations of this command include:
ip crypto ip crypto fast-failover
Disabling the AOS security features (using the no ip crypto command) does not affect VPN configuration settings (with the exception of the removal of all crypto maps from the interfaces). All other configuration parameters will remain intact, and VPN functionality will be disabled.
For VPN configuration example scripts, refer to the VPN configuration guide located on the AOS Documentation CD provided with your unit.
Syntax Description
fast-failover Optional. This setting is used when the same crypto map is applied to two different egress interfaces. It allows the quick deletion of Internet key exchange (IKE) and IPSec SAs when the default route policy class changes.
Default Values
By default, all AOS VPN functionality is disabled.
Command History
Release 4.1 Release 11.2 Command was introduced. Command was expanded to include the fast-failover feature.
Functional Notes
VPN-related settings will not go into effect until you enable VPN functionality using the ip crypto command. AOS allows you to perform all VPN-related configuration prior to enabling ip crypto, with the exception of assigning a crypto map to an interface. The no ip crypto command removes all crypto maps from the interfaces. Enabling ip crypto enables the IKE server on User Datagram Protocol (UDP) Port 500. The no form of this command disables the IKE server on UDP Port 500.
Usage Examples
The following example enables VPN functionality: (config)#ip crypto
60000CRG0-35B
905
ip crypto ffe
Use the ip crypto ffe command to enable the RapidRoute Engine for IP Security Protocol (IPSec) security associations (SAs). Use the no form of this command to disable the RapidRoute functionality for IPSec SAs. Variations of this command include:
ip crypto ffe ip crypto ffe max-entries <entries>
Syntax Description
max-entries <entries> Optional. Specifies the maximum number of entries per inbound (decrypting) IPSec SA. Valid range is from 1 to 8192.
Default Values
By default, RapidRoute is not enabled for IPSec SAs. The default number of max-entries is 4096.
Command History
Release 17.6 Command was introduced
Functional Notes
The RapidRoute Engine can be used to help reduce routing overhead, and thus reduce overall routing times. Routing times are reduced by the creation of a flow table on the ingress interface. The maximum number of entries that can be stored in the flow table at any one time can be specified by using the max-entries parameter.
Usage Examples
The following example enables RapidRoute for IPSec SAs and sets the maximum number of entries in the flow table to 50: (config)#ip crypto ffe max entries 50
60000CRG0-35B
906
Default Values
By default, there is no configured default gateway.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example disables IP routing on a router and configures a default gateway for 10.10.10.1: (config)#no ip routing (config)#ip default-gateway 10.10.10.1 The following example specifies a default gateway for the management interface on a switch: (config)#ip default-gateway 10.10.10.1
60000CRG0-35B
907
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example configures the DHCP database agent with local bindings: (config)#ip dhcp-server database local
60000CRG0-35B
908
ip dhcp-server excluded-address
Use the ip dhcp-server excluded-address command to specify IP addresses that cannot be assigned to Dynamic Host Configuration Protocol (DHCP) clients. Use the no form of this command to remove a configured IP address restriction. Variations of this command include:
ip dhcp-server excluded-address <start ip address> ip dhcp-server excluded-address <start ip address> <end ip address> ip dhcp-server excluded-address vrf <name> <start ip address> ip dhcp-server excluded-address vrf <name> <start ip address> <end ip address>
Syntax Description
<start ip address> <end ip address> Specifies the lowest IP address in the range OR a single IP address to be excluded. Optional. Specifies the highest IP address in the range. This field is not required when specifying a single IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). vrf <name> Optional. Specifies the nondefault VPN routing and forwarding (VRF) to which the IP addresses are associated. If a VRF is not specified, the default VRF is assumed.
Default Values
By default, there are no excluded IP addresses.
Command History
Release 2.1 Release 17.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
The AOS DHCP server (by default) allows all IP addresses for the DHCP pool to be assigned to requesting clients. This command is used to ensure that the specified address or addresses are never assigned by the DHCP server. When static-addressed hosts are present in the network, it is helpful to exclude the IP addresses of the host from the DHCP server IP address pool. This will avoid IP address conflict. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
60000CRG0-35B
909
Usage Examples
The following example excludes an IP address of 172.22.5.100 and the range of IP addresses 172.22.5.200 through 172.22.5.250: (config)#ip dhcp-server excluded-address 172.22.5.100 (config)#ip dhcp-server excluded-address 172.22.5.200 172.22.5.250 The following example excludes an IP address of 172.22.5.100 and the range of IP addresses 172.22.5.200 through 172.22.5.250 for the vrf instance named RED: (config)#ip dhcp-server excluded-address vrf RED 172.22.5.100 (config)#ip dhcp-server excluded-address vrf RED 172.22.5.200 172.22.5.250
60000CRG0-35B
910
Default Values
By default, the number of DHCP server ping packets is set at 2 packets.
Command History
Release 2.1 Command was introduced.
Functional Notes
Before assigning an IP address to a requesting client, the AOS DHCP server transmits a ping packet on the network to verify there are no other network hosts already configured with the specified address. If the DHCP server receives no reply, the IP address is assigned to the requesting client and added to the DHCP database as an assigned address. Configuring the ip dhcp-server ping packets command with a value of 0 prevents the DHCP server from using ping packets as part of the IP address assignment process.
Usage Examples
The following example configures the DHCP server to transmit 4 ping packets before assigning an address: (config)#ip dhcp-server ping packets 4
60000CRG0-35B
911
Default Values
By default, the ip dhcp-server ping timeout is set to 500 milliseconds.
Command History
Release 2.1 Command was introduced.
Functional Notes
Before assigning an IP address to a requesting client, the AOS DHCP server transmits a ping packet on the network to verify there are no other network hosts already configured with the specified address. If the DHCP server receives no reply, the IP address is assigned to the requesting client and added to the DHCP database as an assigned address.
Usage Examples
The following example configures the DHCP server to wait 900 milliseconds for a response to a transmitted DHCP ping packet before considering the ping a failure: (config)#ip dhcp-server ping timeout 900
60000CRG0-35B
912
Default Values
By default, there are no configured DHCP address pools.
Command History
Release 2.1 Command was introduced.
Functional Notes
Use the ip dhcp-server pool to create multiple DHCP server address pools for various segments of the network. Multiple address pools can be created to service different segments of the network with tailored configurations.
Usage Examples
The following example creates a DHCP server address pool (labeled SALES) and enters the DHCP server pool mode: (config)#ip dhcp-server pool SALES (config-dhcp)#
60000CRG0-35B
913
ip domain-lookup
Use the ip domain-lookup command to enable the IP domain naming system (DNS), allowing DNS-based host translation (name-to-address). Use the no form of this command to disable DNS. Syntax Description
No subcommands.
Default Values
By default, this command is enabled.
Command History
Release 3.1 Command was introduced.
Functional Notes
Use the ip domain-lookup command to enable the DNS client in the router. This will allow the user to input Web addresses instead of IP addresses for applications such as ping, Telnet, and traceroute.
Usage Examples
The following example enables DNS: (config)#ip domain-lookup
60000CRG0-35B
914
Syntax Description
<domain name> Specifies the default IP domain name used to resolve unqualified host names. Do not include the initial period that separates the unresolved name from the default domain name. Optional. Specifies a nondefault VPN routing and forwarding (VRF) for the domain name.
vrf <name>
Default Values
By default, this command is disabled.
Command History
Release 3.1 Release 16.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
Use the ip domain-name command to set a default name that will be used to complete any IP host name that is invalid (i.e., any name that is not recognized by the name server). When this command is enabled, any IP host name that is not initially recognized will have the ip domain-name appended to it and the request will be re-sent. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF. Each VRF instance has its own domain name. Specifying a VRF name in the command applies the domain name to the named VRF. Issuing the command without specifying a VRF applies the command to the default unnamed VRF.
Usage Examples
The following example defines adtran as the default domain name: (config)#ip domain-name adtran The following example defines adtran as the default domain name for the VRF RED: (config)#ip domain-name adtran vrf RED adtran
60000CRG0-35B
915
ip domain-proxy
Use the ip domain-proxy command to enable domain naming system (DNS) proxy for the default VPN routing and forwarding (VRF) or for a specified VRF instance. This enables the router to act as a proxy for other units on the network. Use the no form of this command to disable this feature. Variations of this command include:
ip domain-proxy ip domain-proxy source-interface <interface> ip domain-proxy vrf <name>
Syntax Description
source-interface <interface> Optional. Specifies the source interface for DNS packets. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; and for an ATM subinterface, use atm 1.1. Valid interfaces are those that can have an IP address. Type source ? for a complete list of valid interfaces. Optional. Specifies a nondefault VRF on which to enable DNS proxy.
vrf <name>
Default Values
By default, this command is disabled.
Command History
Release 3.1 Release 16.1 Release 17.9 Command was introduced. Command was expanded to include the vrf parameter. Command was expanded to include the source-interface parameter.
Functional Notes
When this command is enabled, incoming DNS requests will be handled by the router. It will first search its host table for the query, and if it is not found there, the request will be forwarded to the servers configured with the ip name-server command. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example enables DNS proxy on the default VRF (router): (config)#ip domain-proxy
60000CRG0-35B
916
Issuing this command will cause all RapidRoute entries in the unit to be cleared.
Syntax Description
<value> Specifies the total number of RapidRoute entries for all interfaces. Valid range is 1 to 32768.
Default Values
By default, the ip ffe max-entries is set to 16384.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example sets the total maximum number of RapidRoute entries to 500: (config)#ip ffe max-entries 500
60000CRG0-35B
917
ip ffe timeout
Use the ip ffe timeout command to set the time to live (TTL) for RapidRoute Engine entries based on their IP protocol. Use the no form of this command to return to the default value. Variations of this command include:
ip ffe timeout ah <max timeout> ip ffe timeout ah <max timeout> <inactive timeout> ip ffe timeout esp <max timeout> ip ffe timeout esp <max timeout> <inactive timeout> ip ffe timeout gre <max timeout> ip ffe timeout gre <max timeout> <inactive timeout> ip ffe timeout icmp <max timeout> ip ffe timeout icmp <max timeout> <inactive timeout> ip ffe timeout other <max timeout> ip ffe timeout other <max timeout> <inactive timeout> ip ffe timeout tcp <max timeout> ip ffe timeout tcp <max timeout> <inactive timeout> ip ffe timeout udp <max timeout> ip ffe timeout udp <max timeout> <inactive timeout>
Syntax Description
ah esp gre icmp other tcp udp <max timeout> Specifies timeout values in seconds for Authentication Header (AH) Protocol. Specifies timeout values in seconds for Encapsulating Security Payload (ESP) Protocol. Specified timeout values in seconds for Generic Route Encapsulation (GRE) Protocol. Specifies timeout values in seconds for Internet Control Message Protocol (ICMP). Specifies timeout values in seconds for all protocols not listed. Specifies timeout values in seconds for Transmission Control Protocol (TCP). Specifies timeout values in seconds for User Datagram Protocol (UDP). Specifies maximum age timeout in seconds. This is the maximum amount of time an entry will be kept in the RapidRoute table regardless of activity. Valid range is 60 to 86400 seconds. Optional. Specifies idle timeout in seconds. This is the amount of time an entry will remain in the RapidRoute table with no additional activity. Valid range is 10 to 86400 seconds.
<inactive timeout>
Default Values
By default, the maximum age timeouts are set to 1800 seconds and the inactive timeouts are set to 15 seconds.
60000CRG0-35B
918
Command History
Release 13.1 Release 17.6 Command was introduced. Command was expanded to include the gre parameter.
Usage Examples
The following example sets the time to live for RapidRoute entries of TCP packets to 1000 seconds. (config)#ip ffe timeout tcp 1000
60000CRG0-35B
919
ip firewall
Use the ip firewall command to enable Internet Protocol version 4 (IPv4) AOS security features, including IPv4 access control policies (ACPs) and lists (ACLs), network address translation (NAT), and the stateful inspection firewall. Use the no form of this command to disable the security functionality. Disabling the AOS IPv4 security features (using the no ip firewall command) does not affect security configuration. All configuration parameters will remain intact, but no security data processing will be attempted. For information regarding the use of open shortest path first (OSPF) with ip firewall enabled, refer to the Functional Notes for router ospf on page 1196. Regarding the use of Internet key exchange (IKE) negotiation for virtual private network (VPN) with ip firewall enabled, there can be up to six channel groups with 2 to 8 interfaces per group. Dynamic protocols are not yet supported (only static). A physical interface can be a member of only one channel group. Syntax Description
No subcommands.
Default Values
By default, all AOS IPv4 security features are disabled.
Command History
Release 2.1 Command was introduced.
Functional Notes
This command enables firewall processing for all interfaces with a configured policy class. Firewall processing consists of the following functions: Attack Protection: Detects and discards traffic that matches profiles of known networking exploits or attacks. Session Initiation Control: Allows only sessions that match traffic patterns permitted by ACPs to be initiated through the router. Ongoing Session Monitoring and Processing: Each session that has been allowed through the router is monitored for any irregularities that match patterns of known attacks or exploits. This traffic will be dropped. Also, if NAT is configured, the firewall modifies all traffic associated with the session according to the translation rules defined in NAT access policies. Finally, if sessions are inactive for a user-specified amount of time, the session will be closed by the firewall. Application-Specific Processing: Certain applications need special handling to work correctly in the presence of a firewall. AOS uses application-level gateways (ALGs) for these applications.
60000CRG0-35B
920
AOS includes several security features to provide controlled access to your network. The following features are available when security is enabled (using the ip firewall command): 1. Stateful Inspection Firewall AOS (and your unit) act as an ALG and employ a stateful inspection firewall that protects an organization's network from common cyber attacks, including Transmission Control Protocol (TCP) syn-flooding, IP spoofing, Internet Control Message Protocol (ICMP) redirect, land attacks, ping-of-death, and IP reassembly problems. In addition, further security is added with use of NAT and port address translation (PAT) capability. 2. IPv4 Access Policies AOS IPv4 ACPs are used to allow, discard, or manipulate (using NAT) data for each physical interface. Each ACP consists of an action (allow, discard, nat) and a selector (access control list (ACL)). In a sense, the ACPs answer the question, What should I do? while the ACLs answer the question, On which packets? When packets are received on an interface with an ACP applied, the ACP is used to determine whether the data is processed or discarded. Both ACLs and ACPs are order dependent. When a packet is evaluated, the matching engine begins with the first entry in the list and progresses through the entries until it finds a match. The first entry that matches is executed. The ACP has an implicit discard at the end of the list. Typically, the most specific entries should be at the top and the most general at the bottom. 3. IPv4 Access Lists IPv4 ACLs are used as packet selectors by ACPs. They must be assigned to an ACP in order to be active. ACLs are composed of an ordered list of entries. Each entry contains two parts: an action (permit or deny) and a packet pattern. A permit action is used to allow packets (meeting the specified pattern) to enter the router system. A deny action is used to disregard packets (that do not match the pattern) and proceed to the next entry on the ACP. The ACL has an implicit deny at the end of the list. The AOS provides two types of ACLs: standard and extended. A standard ACL allows source IP address packet patterns only. An extended ACL may specify patterns using most fields in the IP header and the TCP or User Datagram Protocol (UDP) header.
Usage Examples
The following example enables the AOS IPv4 security features: (config)#ip firewall
Technology Review
Concepts: IPv4 access control using the AOS firewall has two fundamental parts: ACLs and ACPs. ACLs are used as packet selectors by other AOS systems; by themselves they do nothing. ACPs consist of a selector (ACL) and an action (allow, discard, nat). ACPs integrate both allow and discard policies with NAT. ACPs have no effect until they are assigned to a network interface. Both ACLs and ACPs are order dependent. When a packet is evaluated, the matching engine begins with the first entry in the list and progresses through the entries until it finds a match. The first entry that matches is executed.
60000CRG0-35B
921
Route Lookup
Packet Out
Case 1: Packets from interfaces with a configured policy class to any other interface IPv4 ACPs are applied when packets are received on an interface. If an interface has not been assigned a policy class, by default it will allow all received traffic to pass through. If an interface has been assigned a policy class, but the firewall has not been enabled with the ip firewall command, traffic will flow normally from this interface with no firewall processing. Case 2: Packets that travel in and out a single interface with a configured policy class These packets are processed through the IPv4 ACPs as if they are destined for another interface (identical to Case 1). Case 3: Packets from interfaces without a configured policy class to interfaces with one policy class These packets are routed normally and are not processed by the IPv4 firewall. The ip firewall command has no effect on this traffic. Case 4: Packets from interfaces without a configured policy class to other interfaces without a configured policy class This IPv4 traffic is routed normally. The ip firewall command has no effect on this traffic. Attack Protection: When the ip firewall command is enabled, IPv4 firewall attack protection is enabled. AOS blocks traffic (matching patterns of known networking exploits) from traveling through the device. For some of these attacks, the user may manually disable checking/blocking while other attack checks are always on anytime the firewall is enabled.
60000CRG0-35B
922
The table (on the following pages) outlines the types of IPv4 traffic discarded by the firewall attack protection engine. Many attacks use similar invalid traffic patterns; therefore, attacks other than the examples listed below may also be blocked by the firewall. To determine if a specific attack is blocked by the AOS firewall, please contact ADTRAN technical support. Invalid IPv4 Traffic Pattern Larger than allowed packets Fragmented IP packets that produce errors when attempting to reassemble Manually Enabled? No No AOS Firewall Response Any packets that are longer than those defined by standards will be dropped. The firewall intercepts all fragments for an IP packet and attempts to reassemble them before forwarding to destination. If any problems or errors are found during reassembly, the fragments are dropped. The firewall will drop any ping responses that are not part of an active session. The firewall will drop any packets with a source IP address that appears to be spoofed. The IP route table is used to determine if a path to the source address is known (out of the interface from which the packet was received). For example, if a packet with a source IP address of 10.10.10.1 is received on interface fr 1.16 and no route to 10.10.10.1 (through interface fr 1.16) exists in the route table, the packet is dropped. The following types of ICMP packets are allowed through the firewall: echo, echo-reply, TTL expired, dest. Unreachable, and quench. These ICMP messages are only allowed if they appear to be in response to a valid session. All others are discarded. Any TCP packets that have the URG flag set are discarded by the firewall. The firewall verifies that the packets actual length matches the length indicated in the IP header. If it does not, the packet is dropped. All UDP echo packets are discarded by the firewall. Common Attacks Ping of Death SynDrop, TearDrop, OpenTear, Nestea, Targa, Newtear, Bonk, Boink Smurf Attack IP Spoofing
No No
No
Twinge
Yes No
Echo
No
Char Gen
60000CRG0-35B
923
Invalid IPv4 Traffic Pattern Land Attack Broadcast Source IP Invalid TCP Initiation Requests
Manually Enabled? No No No
AOS Firewall Response Any packets with the same source and destination IP addresses are discarded. Packets with a broadcast source IP address are discarded. TCP SYN packets that have ack, urg rst, or fin flags set are discarded. The sequence numbers for every active TCP session are maintained in the firewall session database. If the firewall received a segment with an unexpected (or invalid) sequence number, the packet is dropped. All IP packets containing the IP source route option are dropped.
No
Application-Specific Processing
The following applications and protocols require special processing to operate concurrently with IPv4 NAT/firewall functionality. The AOS IPv4 firewall includes ALGs for handling these applications and protocols: AOL Instant Messenger (AIM) VPN ALGS: ESP and IKE FTP H.323: H.245 Q.931 ASN1 PER decoding and Encoding ICQ IRC Microsoft Games Net2Phone PPTP Quake Real-Time Streaming Protocol SMTP HTTP CUseeme SIP L2TP PcAnywhere SQL Microsoft Gaming Zone To determine if a specific application requires special processing, contact ADTRAN technical support at www.adtran.com.
60000CRG0-35B
924
ip firewall alg
Use the ip firewall alg command to enable the application-level gateway (ALG) for a particular application. Use the no form of this command to disable ALG for the application. Variations of this command applicable for nonvoice capable ADTRAN products include the following:
ip firewall alg ftp ip firewall alg h323 ip firewall alg h323 timeout <number> ip firewall alg msn ip firewall alg mszone ip firewall alg pptp ip firewall alg sip
Variations of this command applicable for voice capable ADTRAN products include the following:
ip firewall alg ftp ip firewall alg h323 ip firewall alg h323 timeout <number> ip firewall alg msn ip firewall alg mszone ip firewall alg pptp
The AOS firewall must be enabled (using the command ip firewall on page 920) for the stateful inspection firewall to be activated.
Syntax Description
ftp h323 Enables the File Transfer Protocol (FTP) ALG. Enables the H.323 ALG. H.323 is a protocol that sets standards for multimedia communications over packet-switched networks, allowing dissimilar communication devices to communicate with each other via a standard communication protocol. Optional. Allows the configuration of the timeout for the policy-session that controls the H.323 call, and specifies the length of time before the H.323 call is terminated after a timeout. Range is 1 to 4294967295 seconds. Enables the Microsoft Service Network (MSN) ALG. Enables the MSZONE ALG. Enables the PPTP ALG. Enables the Session Initiation Protocol (SIP) ALG. This ALG is only used in ADTRAN router and switch products, not voice products.
60000CRG0-35B
925
Default Values
All AOS security features are disabled by default until the ip firewall command is issued at the Global Configuration mode prompt. By default, the ALG for FTP, PPTP, and SIP are enabled. Conversely, the ALG for MSN, MSZONE, and H.323 are disabled by default. There are no SIP ALGs present on voice capable ADTRAN products. By default, the timeout value for H.323 is set for 8 hours.
Command History
Release 8.1 Release 10.1 Release 14.1 Release 15.1 Release 17.4 Command was introduced. Command was expanded to include H.323. Command was expanded to include MSN. Command was expanded to include H.323 timeout feature. Command was expanded to include MSZONE.
Functional Notes
Enabling the ALG for a specific protocol gives the firewall additional information about that complex protocol and causes the firewall to perform additional processing for packets of that protocol. When the ALG is disabled, the firewall treats the complex protocol as any other simple protocol. The firewall needs no special knowledge to work well with simple protocols.
Disabling the IP firewall ALG may cause the firewall to block some of the traffic for the specified protocol.
Microsoft Service Network (MSN) ALG Information In some instances where the firewall is enabled and traffic is source NATed through the unit, some features of MSN's instant messenger program will not work (i.e., file sharing, direct connection, etc.). Enabling the MSN ALG allows the firewall to inspect the MSN messaging protocol to allow some of these features to work through network address translation (NAT). If the traffic is not NATed, then this ALG is not required and should be disabled. Session Initiation Protocol (SIP) ALG Information By default, the AOS SIP ALG is enabled. This ALG allows the firewall to examine the ALL SIP packets it identifies and maintain knowledge of SIP transmissions on the network based on the SIP header.
Usage Examples
The following example disables ALG for FTP: (config)#no ip firewall alg ftp The following example enables ALG for MSN: (config)#ip firewall alg msn
60000CRG0-35B
926
Technology Review
SIP is one protocol in a suite of protocols that was designed to replace H.323 for IP telephony. SIP operates in Layer 7 of the OSI model (application level) to create, modify, and terminate sessions between nodes. SIP not only provides recommendations for IP telephony, but multimedia distribution and conferences as well. SIP version 1.0 was defined in RFC 2453, and was refined to SIP version 2.0 in RFC 3261. SIP operations occur between SIP UAs and SIP servers. Types of SIP servers include proxy, redirect, registrar, and presence. The part of a SIP UA that sends messages is known as the user agent client (UAC). The part of a SIP UA that receives messages is known as a user agent server (UAS). SIP was originally designed for use over User Datagram Protocol (UDP). SIP servers, by default, listen on port 5060. Due to security concerns, SIP is now transitioning to Transmission Control Protocol (TCP) and transport layer security (TLS). SIP servers using TLS-over-TCP listen on port 5061. SIP UAs listen on a range of ports. SIP uses the Session Description Protocol (SDP) to format the SIP message body in order to negotiate a Realtime Transport Protocol (RTP)/Realtime Transport Control Protocol (RTCP) connection between two or more UAs. The ports used for this will always be selected in a pair, with the even port used for RTP and the odd port for RTCP. SIP, because it uses SDP and RTP, causes many problems for standard firewalls. Neither SIP nor RTP are guaranteed to be symmetric, thus causing problems for stateful inspection firewalls that rely on symmetric flows. SIP and SDP carry IP addresses and ports embedded in the packet, and standard NAT implementations only modify the IP and TCP/UDP headers. A true SIP ALG is required to modify the packets as needed for NAT, but also to open holes in the firewall as needed for traffic flow based on the information carried in the SIP header. Enabling the AOS SIP ALG (using the ip firewall alg sip command) configures the firewall to examine the ALL SIP packets it identifies and maintain knowledge of SIP transmissions on the network. Since SIP packet headers include port information for the call setup, the ALG must intelligently read the packets and remember the information.
60000CRG0-35B
927
Syntax Description
<number> Specifies the number of possible attack conditions AOS IPv4 will identify before generating a log message. Valid range is 0 to 4294967295.
Default Values
By default, the ip firewall attack-log threshold is set at 100.
Command History
Release 2.1 Command was introduced.
Usage Examples
The following example specifies a threshold of 25 attacks before generating a log message for the IPv4 firewall: (config)#ip firewall attack-log threshold 25
60000CRG0-35B
928
Syntax Description
No subcommands.
Default Values
All AOS IPv4 security features are disabled by default until the ip firewall command is issued at the Global Configuration mode prompt. In addition, the reflexive traffic check is disabled until the ip firewall check reflexive-traffic command is issued.
Command History
Release 8.1 Command was introduced.
Functional Notes
This command allows the firewall to process IPv4 traffic from a primary subnet to a secondary subnet on the same interface through the firewall. If enabled, this IPv4 traffic will be processed through the access policy on that interface and any actions specified will be executed on the traffic.
Usage Examples
The following example enables the AOS IPv4 reflexive traffic check: (config)#ip firewall check reflexive-traffic
60000CRG0-35B
929
Syntax Description
No subcommands.
Default Values
All AOS security features are disabled by default until the ip firewall command is issued at the Global Configuration mode prompt. In addition, TCP reset sequence number checking is disabled until the ip firewall check rst-seq command is issued.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example enables TCP reset sequence number checking: (config)#ip firewall check rst-seq
60000CRG0-35B
930
Syntax Description
No subcommands.
Default Values
All AOS security features are inactive until the ip firewall command is issued at the Global Configuration mode prompt. In addition, the SYN-flood check is enabled by default but remains inactive until the ip firewall command is issued.
Command History
Release 2.1 Command was introduced.
Functional Notes
SYN flooding is a well-known denial-of-service attack on TCP-based services. TCP requires a three-way handshake before actual communications begin between two hosts. A server must allocate resources to process new connection requests that are received. A potential intruder is capable of transmitting large amounts of service requests (in a very short period of time), causing servers to allocate all resources to process the phony incoming requests. Using the ip firewall check syn-flood command configures the AOS stateful inspection firewall to filter out phony service requests and allow only legitimate requests to pass through.
Usage Examples
The following example disables the AOS SYN-flood check: (config)#no ip firewall check syn-flood
60000CRG0-35B
931
Syntax Description
No subcommands.
Default Values
All AOS security features are inactive until the ip firewall command is issued at the Global Configuration mode prompt. In addition, WinNuke attack checking is disabled until the ip firewall check winnuke command is issued.
Command History
Release 2.1 Command was introduced.
Functional Notes
WinNuke attack is a well-known denial-of-service attack on hosts running Microsoft Windows operating systems. An intruder sends OOB data over an established connection to a Windows user. Windows cannot properly handle the OOB data, and the host reacts unpredictably. Normal shut-down of the hosts will generally return all functionality. Using the ip firewall check winnuke command configures the AOS stateful inspection firewall to filter all OOB data to prevent network problems.
Usage Examples
The following example enables the firewall to filter all OOB data: (config)#ip firewall check winnuke
60000CRG0-35B
932
ip firewall fast-nat-failover
Use the ip firewall fast-nat-failover command when destination-specific rules are configured. Destination-specific rules are most often used in failover and IP load sharing configurations. Refer to the command ip policy-class <ipv4 acp name> on page 985 for more information. Use the no form of this command to disable this feature. The AOS firewall must be enabled (using the command ip firewall on page 920) for the stateful inspection firewall to be activated.
Syntax Description
No subcommands.
Default Values
All AOS security features are disabled by default until the ip firewall command is issued at the Global Configuration mode prompt. In addition, the fast network address translation (NAT) failover is disabled until the ip firewall fast-nat-failover command is issued.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example enables fast-nat-failover: (config)#ip firewall fast-nat-failover
60000CRG0-35B
933
Syntax Description
<value> Specifies the time period in seconds allowed for TCP FIN. Range is 0 to 4294967295 seconds.
Default Values
By default, ip firewall fin-timeout is set to 4 seconds.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example sets the TCP FIN time period to 120 seconds: (config)#ip firewall fin-timeout 120
60000CRG0-35B
934
ip firewall nat-preserve-source-port
Use the ip firewall nat-preserve-source-port command to enable the firewall to preserve the source port of a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) session for traffic going through source network address translation (NAT). By enabling this feature, the router will try to allocate NAT ports that match the original source ports of the traffic. If the source port is already allocated for a different traffic flow, it will choose the next available source port. Use the no form of this command to disable this feature. Variations of this command include the following:
ip firewall nat-preserve-source-port ip firewall nat-preserve-source-port record-source-address
The AOS firewall must be enabled (using the command ip firewall on page 920) for the stateful inspection firewall to be activated.
Syntax Description
record-source-address Optional. Specifies that the original source port be preserved for multiple TCP/UDP traffic flows with the same source address.
Default Values
By default, the nat-preserve-source-port feature is enabled.
Command History
Release 14.1 Command was introduced.
Functional Notes
Specifying record-source-address consumes 250 k of memory per public NAT IP address. Be sure there is adequate memory available before enabling this feature.
Usage Examples
The following example enables nat-preserve-source-port: (config)#ip firewall nat-preserve-source-port
60000CRG0-35B
935
Syntax Description
<value> Specifies the number of IPv4 policy events AOS identifies before creating the log. Valid range is 0 to 4294967295.
Default Values
By default, the ip firewall policy-log threshold is set to 100.
Command History
Release 2.1 Command was introduced.
Usage Examples
The following example specifies that a log is generated when 150 IPv4 ACP events are detected on the default VRF: (config)#ip firewall policy-log threshold 150
60000CRG0-35B
936
Syntax Description
<value> Specifies the time period in seconds allowed for TCP reset. Range is 0 to 4294967295 seconds.
Default Values
By default, ip firewall rst-timeout is set to 20 seconds.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example sets the TCP reset time period to 120 seconds: (config)#ip firewall rst-timeout 120
60000CRG0-35B
937
Syntax Description
No subcommands.
Default Values
By default, the stealth option is disabled.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example enables the stealth option for the IPv4 firewall: (config)#ip firewall stealth
60000CRG0-35B
938
Default Values
By default, the IPv4 firewall is disabled.
Command History
Release 17.1 Command was introduced.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured.
Usage Examples
The following example enables the IPv4 firewall on the VRF named RED: (config)#ip firewall vrf RED
60000CRG0-35B
939
Syntax Description
deterministic random <number> Specifies that traffic flow sampling be done at a fixed rate. Specifies that traffic flow sampling be done at a random rate. Specifies the number of traffic flow packets to be observed before another packet is sampled. Range is 1 to 255 packets.
Default Values
By default, sampling is disabled and every packet is recorded.
Command History
Release 16.1 Release 17.1 Command was introduced. Command was expanded to include the deterministic keyword.
Functional Notes
Sampling provides a snapshot of traffic flow activity. It allows the cache to collect only one out of a specified number of IP packets that the interface is receiving or sending. Often, network traffic arrives in fixed patterns. This pattern can make statistics inaccurate if deterministic sampling is used. Therefore, random sampling is recommended over deterministic sampling to ensure an accurate sampling of traffic flow patterns. By reducing the amount of traffic flow data collected, sampling minimizes memory and CPU usage.
For users of large routers (for example, the NetVanta 5305), a sampling rate of greater than or equal to one out of every 100 packets is recommended.
Usage Examples
The following example configures ITM to sample one packet out of every 100 at a random sample rate: (config)#ip flow cache sample one-out-of 100 random
60000CRG0-35B
940
Syntax Description
active <minutes> Specifies the amount of time a single traffic flow that continues to have packets detected at the observation point is stored before exportation. Range is 1 to 60 minutes. Specifies the amount of time that idle traffic flows (which no longer have packets detected at the observation point) are stored before exportation. Range is 10 to 600 seconds.
inactive <seconds>
Default Values
By default, active flows are set to expire in 30 minutes, and inactive flows are set to expire in 15 seconds.
Command History
Release 16.1 Command was introduced.
Functional Notes
Traffic flow entry expiration can occur in one of three ways: (1) the configured expiration time has passed; (2) the Transmission Control Protocol (TCP) connection between the cache and the flow collector has expired due to FINISH/RESET signaling; or (3) critical configuration changes have been made (for example, changing the sampling rate). The default mode of expiration is based on a configured number of minutes for the traffic flow entry to be stored in the cache.
Usage Examples
The following example configures an expiration time of 15 minutes for active traffic flow entries: (config)#ip flow cache timeout active 15
60000CRG0-35B
941
ip flow export
Use the ip flow export command to configure traffic flow data exportation parameters for integrated traffic monitoring (ITM). Use the no form of this command to disable the export functionality or to remove an associated destination if multiple entries are specified. Variations of this command include:
ip flow export destination <ip address> <port> ip flow export destination <ip address> <port> source <interface> ip flow export vrf <name> destination <ip address> <port> ip flow export vrf <name> destination <ip address> <port> source <interface>
Syntax Description
destination <ip address> <port> Specifies the IP address and User Datagram Protocol (UDP) port through which the destination will receive data export packets. source <interface> Specifies a source interface to send the data export packets. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; and for an ATM subinterface, use atm 1.1. Valid interfaces are those that can have an IP address. Type source ? for a complete list of valid interfaces. Specifies the VPN routing and forwarding (VRF) location to be used in data export.
vrf <name>
Default Values
By default, ip flow export is disabled. By default, if no source is specified, the router interface at the hop closest to the data collector will be sourced.
Command History
Release 16.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
Up to two different destinations can be specified for traffic flow data export. Using the source command specifies an interface from which to send the data export packets. If using a VRF destination, the source must be on the same VRF as the destination or it will be ignored and the routing table will determine the source interface. Most often, a source will only need to be specified for security purposes. For example, if an access control list (ACL) is active on the external data collector, a source interface may need to be specified.
60000CRG0-35B
942
Usage Examples
The following example configures the export destination to be the external data collector at the IP address 208.61.209.5 through the User Datagram Protocol (UDP) port 1010. (config)#ip flow export destination 208.61.209.5 1010
60000CRG0-35B
943
Syntax Description
refresh-rate <packets> timeout-rate <minutes> Specifies the number of packets to be sent before the template information is sent to an external collector. Range is 1 to 600 packets. Specifies the time in minutes that passes between instances of resending the template information. Range is 1 to 3600 minutes.
Default Values
By default, template information is sent every 20 packets, and template information is re-sent every 30 minutes.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example configures the template information to be sent every 50 packets: (config)#ip flow export template refresh-rate 50 In the following example, traffic flow template information is configured to resend every 15 minutes: (config)#ip flow export template timeout-rate 15
Technology Review
When exporting traffic flow data, there are multiple types of information sent to the external data flow collector. There is data information about each traffic flow, system information about each traffic flow, and the traffic flow record itself. The information about the traffic flow record is called a template. Templates are used to describe the types and lengths of individual header fields within a traffic flow data record. Templates also communicate to the external data collector what type of information to expect in the ITM flow record.
60000CRG0-35B
944
The following tables describe the information contained in each template. Table 1. Data Template Information
Source IP Address Destination IP Address Transport Protocol Type Source Port Destination Port Type of Service (ToS) Bits Packets in a Flow Bytes in a Flow Interface (Input or Output) System Up Time of First Packet System Up Time of Last Packet Flow Direction
Templates are sent to the external data collector after a user-specified number of expired traffic flow entries. They are also re-sent periodically at user-defined intervals. The templates must be re-sent periodically because User Datagram Protocol (UDP) is often unreliable, and the collector may discard all traffic flow data lacking valid template information.
60000CRG0-35B
945
ip flow top-talkers
Use the ip flow top-talkers command to enable Top Talker functionality for integrated traffic monitoring (ITM) and enter Top Talker configuration mode. Use the no form of this command to disable the Top Talkers functionality and remove all associated settings. For Top Talkers functionality to be enabled, ITM must be enabled on an interface. Refer to the ip flow egress | ingress command. Refer to ip flow on page 1489 for more information on enabling ITM. Syntax Description
No subcommands.
Default Values
By default, the Top Talkers feature is disabled.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables top talkers: (config)#ip flow top-talkers (config-top-talkers)#
Technology Review
Using the internal Top Talkers data collection feature of ITM, several of the most important flow cache statistics can be viewed at a glance from within the router itself. The Top Talkers feature incorporates the statistics of Top Talkers (top bandwidth users by source IP address), Top Listeners (top bandwidth users by destination IP address), and Port Lists (amounts of traffic observed on specific ports) into easily viewed output, accessed through either the command line interface (CLI) or Web-based graphical user interface (GUI). These statistics are captured by the metering process at the traffic flow observation point, and collected as traffic flow entries expire from the flow cache. These statistics allow the user to see the nature of traffic being processed by the router without having to configure an external server to collect data. The internal Top Talkers data collector can be enabled instead of or in conjunction with an external data collector, or it can operate with no external data collector configured. Because Top Talkers collects and processes expired flow cache entries in a separate function from their exportation, it can function independently of an external collector. With both an external data collector and Top Talkers enabled, expired flow cache entries are sent to both the external data collector and through the Top Talkers collector. The separation of Top Talkers collection from external data collectors provides methods of separate data collector configuration, therefore, allowing the enablement of only Top Talkers collection, Top Talkers collection in addition to external data collection, or external data collection only. For more information on the ITM Top Talkers feature, refer to the Integrated Traffic Monitoring configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 2157).
60000CRG0-35B
946
Alternately, the <value> may be specified using the following syntax: <0-65535>. Specifies the port number used by UDP to pass information to upper layers. All ports below 1024 are considered well-known ports and are controlled by the Internet Assigned Numbers Authority (IANA). All ports above 1024 are dynamically assigned ports that include registered ports for vendor-specific applications.
Default Values
By default, AOS forwards broadcast packets for all protocols and ports.
Command History
Release 2.1 Command was introduced.
60000CRG0-35B
947
Functional Notes
Use this command to configure AOS to forward UDP packets across the wide area network (WAN) link to allow remote devices to connect to a UDP service on the other side of the WAN link.
Usage Examples
The following example forwards all domain naming system (DNS) broadcast traffic to the DNS server with IP address 192.33.5.99: (config)#ip forward-protocol udp domain (config)#interface eth 0/1 (config-eth 0/1)#ip helper-address 192.33.5.99
60000CRG0-35B
948
Default Values
By default, all FTP access is allowed.
Command History
Release 2.1 Command was introduced.
Usage Examples
The following example applies the configured ACP (labeled Inbound_FTP) to inbound FTP traffic: (config)#ip ftp access-class Inbound_FTP in
60000CRG0-35B
949
Default Values
By default, the timeout period is 32 seconds.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sets the NAT session timeout period at 60 seconds: (config)#ip rtp nat-session timeout 60
60000CRG0-35B
950
ip ftp server
Use the ip ftp server command to enable the File Transfer Protocol (FTP) server and optionally specify the default location for the FTP server to store and retrieve files. Use the no form of this command to disable the FTP server. Variations of this command include: ip ftp server ip ftp server default-filesystem cflash ip ftp server default-filesystem flash ip ftp server default-filesystem ramdisk
Syntax Description
default-filesystem cflash flash ramdisk Specifies the default file system for the FTP server to use. Optional. Specifies the FTP server use the CompactFlash card as the default file system. Optional. Specifies that the FTP server use the system flash as the default file system. Optional. Specifies that the FTP server use the volatile RAM disk as the default file system.
Default Values
By default, the ip ftp server default-filesystem is set to flash.
Command History
Release 13.1 Release 17.7 Command was introduced. Command was expanded to include the ramdisk parameter.
Usage Examples
The following example enables the FTP server: (config)#ip ftp server The following example specifies cflash file system as the default: (config)#ip ftp server default-filesystem cflash
60000CRG0-35B
951
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 9.1 Release 14.1 Release 15.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the high level data link control (HDLC) interface. Command was expanded to include the tunnel interface. Command was expanded to include the bridged virtual interface (BVI). Command was expanded to include the asynchronous transfer mode (ATM) interface. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
This command allows you to override the sender field in the IP packet. If you have multiple interfaces in your unit, changing the sender tells the receiver where to send replies. This functionality can also be used to allow packets to get through firewalls that would normally block the flow.
Usage Examples
The following example configures the unit to use the loopback 1 interface as the source IP for FTP traffic: (config)#ip ftp source-interface loopback 1
60000CRG0-35B
952
ip host
Use the ip host command to define an IP host name either for the default VPN routing and forwarding (VRF) or for a specified VRF instance. This allows you to statically map host names and addresses in the host cache. Use the no form of this command to remove defined maps. Variations of this command include:
ip host <hostname> <ip address> ip host vrf <name> <hostname> <ip address>
Syntax Description
<hostname> <ip address> vrf <name> Defines the name of the host. Specifies IP address associated with this IP host. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies a nondefault VRF on which to define the IP host name.
Default Values
By default, the host table is empty.
Command History
Release 3.1 Release 16.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
The host name may be any combination of numbers and letters as long as it is not a valid IP address or does not exceed 256 characters. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example defines two static mappings: (config)#ip host mac 10.2.0.2 (config)#ip host dal 172.38.7.12
60000CRG0-35B
953
ip http
Use the ip http command to enable Web access to the AOS unit using Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS). Use the no form of this command to disable this feature. Variations of this command include:
ip http access-class <name> in ip http authentication <listname> ip http language <language> ip http secure-access-class <name> in ip http secure-server ip http secure-server allow-sslv2 ip http secure-server <TCP port> ip http secure-server <TCP port> allow-sslv2 ip http server ip http server <name> ip http session-limit <number> ip http session-timeout <value>
Syntax Description
access-class <name> authentication <listname> Restricts access to the HTTP server using the specified access control list (ACL). Assigns the specified authentication, authorization, and accounting (AAA) list to use in authentication to the AOS devices HTTP server. AAA must be enabled to apply this list (using the command aaa on on page 833). Optional. Applies to all incoming connections. Specifies the language of the Web-based graphical user interface (GUI). Choose from [english | frenchcanadian | italian | latinamspanish | simplifiedchinese]. Enables the HTTP secure-server and defaults the server to use secure sockets layer version 3.0 (SSLv3). Optional. Allows the server to fall back to secure sockets layer version 2.0 (SSLv2) if unable to connect using SSLv3. Optional. Specifies an alternate port for HTTPS. Optional. Enables the specified HTTP server connection. Optional. Specifies an alternate port for HTTP. Sets the maximum number of sessions allowed. Valid range is 0 to 100 with 100 as the default. Sets the session timeout value. Valid range is 10 to 86400 seconds. The default is 600 seconds.
in language <language>
secure-access-class <name> Restricts access to the HTTPS server using the specified secure ACL. secure-server allow-sslv2 <TCP port> server <TCP port> session-limit <number> session-timeout <value>
Default Values
By default, this command is disabled.
60000CRG0-35B
954
Command History
Release 3.1 Release 13.1 Release 14.1 Release 17.6 Command was introduced. Command was expanded to include Italian. Command was expanded to include French Canadian, Latin American Spanish, and Simplified Chinese languages. Command was expanded to include allow-sslv2.
Usage Examples
The following example enables Web access to the router: (config)#ip http server
60000CRG0-35B
955
This command pertains to the HTTP Client and not the HTTP server.
Syntax Description
<interface> Specifies the source interface for HTTP traffic. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type ip http source-interface ? for a complete list of valid interfaces.
Default Values
By default, no HTTP source interface is defined.
Command History
Release 16.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the asynchronous transfer mode (ATM) interface. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
This command allows you to override the sender field in the IP packet. If you have multiple interfaces in your unit, changing the sender tells the receiver where to send replies. This functionality can also be used to allow packets to get through firewalls that would normally block the flow.
Usage Examples
The following example configures the unit to use the loopback 1 interface as the source IP for HTTP traffic: (config)#ip http source-interface loopback 1
60000CRG0-35B
956
Syntax Description
<name> Specifies the name of the IP hardware ACL.
Default Values
By default, all AOS security features are disabled, and there are no configured hardware ACLs.
Command History
Release 17.6 Command was introduced.
Functional Notes
This command only creates an empty hardware ACL, it does not configure it. For additional IP hardware ACL configuration commands and configuration parameters, refer to the Hardware ACL and Access Map Command Set on page 2738 or the Hardware ACLs in AOS configuration guide available online at http://kb.adtran.com (article number 3088).
Usage Examples
The following example creates an IP hardware ACL Trusted and enters the IP hardware ACL configuration mode: (config)#ip hw-access-list extended Trusted Configuring New IP Hardware Extended ACL Trusted (config-ext-ip-hw-nacl)#
Technology Review
Hardware ACLs are used as traffic selectors by the hardware access maps; by themselves they do nothing. Hardware ACLs are composed of an ordered list of entries with an implicit deny any at the end of each list. A hardware ACL with no entries includes an implicit permit any. An ACL entry contains two parts: an action (permit or deny) and a frame pattern. A permit ACL matches frames (meeting the specified pattern) and allows them to enter the router system. A deny ACL advances AOS to the next access list entry.
60000CRG0-35B
957
ACL criteria are compared to the incoming frame in the order in which they were entered or from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
Changing hardware ACL or hardware access map configuration or application causes new information to be reinstalled on the hardware. It is possible to run out of hardware resources depending on how many resources are needed to apply the desired change. If there are not enough hardware resources to install the new criteria in the hardware, an error message is displayed. You can view the amount of hardware resources available using the command show hw-filter-resource on page 471.
60000CRG0-35B
958
Default Values
No default values are necessary for this command.
Command History
Release 7.1 Command was introduced.
Functional Notes
This command aids in debugging, allowing the routers IP stack to connect to and respond on a multicast group. The local stack operates as an Internet Control Message Protocol (IGMP) host on the attached segment. In multicast stub applications, the global helper address takes care of forwarding IGMP joins/responses on the upstream interface. The router may respond to ICMP echo requests for the joined groups.
Usage Examples
The following example configures the unit to join with the specified multicast group: (config)#ip igmp join 172.0.1.50
60000CRG0-35B
959
ip igmp snooping
Use the ip igmp snooping command to globally enable Internet Group Management Protocol (IGMP) snooping. Use the no form of this command to disable global IGMP snooping. Global IGMP snooping overrides the virtual local area network (VLAN) IGMP snooping. If global snooping is disabled, you cannot enable VLAN IGMP snooping. If global snooping is enabled, you can enable or disable VLAN IGMP snooping. Syntax Description
No subcommands.
Default Values
By default, IGMP snooping is enabled.
Command History
Release 12.1 Command was introduced.
Functional Notes
IGMP snooping is a method of preventing switches from flooding all ports with received multicast streams. By monitoring the conversations between a host and a router, the switch can determine which multicast streams will interest a host and load its own forwarding tables to take advantage of that knowledge. When the host sends a leave message to the router, the switch removes the entries after a timeout period.
Usage Examples
The following example globally enables IGMP snooping: (config)#ip igmp snooping
60000CRG0-35B
960
Default Values
By default, VLAN IGMP snooping is enabled.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example enables IGMP snooping on VLAN 1: (config)#ip igmp snooping vlan 1
60000CRG0-35B
961
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example adds Ethernet interface 0/1 to the list of multicast router interfaces: (config)#ip igmp snooping vlan 1 mrouter interface ethernet 0/1
60000CRG0-35B
962
ip igmp snooping vlan <vlan id> static <mac address> interface <interface>
Use the ip igmp snooping vlan static interface command to statically configure a Layer 2 interface as a member of a multicast group. Use the no form of this command to remove a Layer 2 interface from a multicast group. Global Internet Group Management Protocol (IGMP) snooping overrides the virtual local area network (VLAN) IGMP snooping. If global snooping is disabled, you cannot enable VLAN IGMP snooping. If global snooping is enabled, you can enable or disable VLAN IGMP snooping. Refer to ip igmp snooping on page 961 for more information. Syntax Description
<vlan id> <mac address> Specifies the VLAN ID of the multicast group. Range is 1 to 4094. Specifies the groups 48-bit medium access control (MAC) address. MAC addresses should be expressed in the following format xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01). Specifies an interface identification for the member interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type ip igmp snooping vlan <vlan id> static <mac address> interface ? for a complete list of applicable interfaces.
<interface>
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
60000CRG0-35B
963
Functional Notes
There are two types of multicast addresses: MAC addresses and IP addresses. A multicast IP address is a Class D address (224.0.0.0 to 239.255.255.255). These addresses are also referred to as group destination addresses (GDAs). Each GDA has an associated multicast MAC address. A multicast MAC address is formed by using the prefix 01-00-5e followed by the last 23 bits of the GDA. The <mac address> specified in this command must be a multicast MAC address. The following table shows examples of multicast MAC addresses. Multicast Addresses Multicast IP Address 226.10.10.10 228.20.20.20 230.30.30.30 Multicast MAC Address 01-00-5e-0a-0a-0a 01-00-5e-14-14-14 01-00-5e-1e-1e-1e
This mapping of IP addresses is a many-to-one relationship. For example, 226.10.10.10 maps to the same MAC address as 227.10.10.10. The entire Class D network is not available for multicast. The following table shows the reserved addresses. Reserved Multicast IP Addresses 224.0.0.1 224.0.0.2 224.0.0.5 and 224.0.0.6 224.0.0.1 to 224.0.0.255 All Multicast-capable hosts All Multicast-capable routers Reserved for OSPF Generally reserved for various protocols
Usage Examples
The following example configures the Ethernet interface 0/1 as a member of the multicast group with multicast MAC address 01:00:5E:01:01:01: (config)#ip igmp snooping vlan 1 static 01:00:5E:01:01:01 interface ethernet 0/1
60000CRG0-35B
964
ip load-sharing
Use the ip load-sharing command to configure whether parallel routes in the route table are used to load-share forwarded packets. If this command is disabled, the route table uses a single best route for a given subnet. If this command is enabled, the route table can use multiple best routes and alternate between them. Use the no form of this command to disable this feature. Variations of this command include:
ip load-sharing per-destination ip load-sharing per-packet
Syntax Description
per-destination per-packet Specifies that the route used for forwarding a packet be based on a hash of the source and destination IP address in the packet. Specifies that each forwarding route lookup rotates through all the parallel best routes. (Parallel routes are defined as routes to the same subnet with the same metrics that only differ by their next-hop address.)
Default Values
By default, ip load-sharing is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example turns on load-sharing per destination: (config)#ip load-sharing per-destination The following example disables load-sharing: (config)#no ip load-sharing
60000CRG0-35B
965
Syntax Description
<name> vrf <name> Specify the name of the route map. Optional. Specifies a nondefault VRF on which to define the local policy route map.
Default Values
By default, this command is disabled.
Command History
Release 11.1 Release 16.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
Before a route map can be specified, it must first be defined using the route-map command. Refer to route-map on page 1193 for more information. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF. There is only one local policy for each VRF instance.
Usage Examples
The following example specifies a route map entitled myMap for local policy routing: (config)#ip local policy route-map myMap
60000CRG0-35B
966
Default Values
By default, no helper-address is configured.
Command History
Release 7.1 Command was introduced.
Functional Notes
The helper address is configured globally and applies to all multicast-stub downstream interfaces. The address specified may be the next upstream hop or any upstream address on the distribution tree for the multicast source, up to and including the multicast source. The router selects, from the list of multicast-stub upstream interfaces, the interface on the shortest path to the specified address. The router then proxies, on the selected upstream interface (using an IGMP host function), any host joins/leaves received on the downstream interface(s). The router retransmits these reports with addresses set as if the report originated from the selected upstream interface. For example, if the router receives multiple joins for a group, it will not send any extra joins out the upstream interface. Also, if it receives a leave, it will not send a leave until it is certain that there are no more subscribers on any downstream interface.
Usage Examples
The following example specifies 172.45.6.99 as the helper address: (config)#ip mcast-stub helper-address 172.45.6.99
60000CRG0-35B
967
ip mgcp
Use the ip mgcp command to enable the Media Gateway Control Protocol (MGCP) stack. Use the no form of this command to disable the MGCP stack. Syntax Description
No subcommands.
Default Values
By default, the MGCP stack is disabled.
Command History
Release A2 Command was introduced.
Usage Examples
The following example enables the MGCP stack: (config)#ip mgcp
60000CRG0-35B
968
ip mgcp bracketed-ip
Use the ip mgcp bracketed-ip command to control whether bracketed IP addresses are used in specifying Media Gateway Control Protocol (MGCP) endpoint names. Use the no form of this command to disable the bracket requirement when entering MGCP endpoint IP addresses. Syntax Description
No subcommands.
Default Values
By default, brackets are used when specifying MGCP endpoints.
Command History
Release A2 Command was introduced.
Functional Notes
Some call agents require that brackets be used when an MGCP gateway uses an IP address as its local domain name, and some call agents do not support the bracketed format. Bracketed IP addresses are displayed as endpointname@[xx.xx.xx.xx], whereas nonbracketed endpoint IP addresses are displayed as endpointname@xx.xx.xx.xx. Using this command allows the user to control whether IP addresses will be bracketed or not, rather than entering all IP addresses as bracketed IP addresses.
Usage Examples
The following example disables bracketed IP address control: (config)#no ip mgcp bracketed-ip
60000CRG0-35B
969
Default Values
By default, no primary call agents are configured.
Command History
Release A2 Command was introduced.
Functional Notes
The ip mgcp call-agent primary command identifies the call agent to the media gateway. Both primary and secondary call agents can be established, but at minimum a primary call agent is required. If a connection with the primary call agent fails, call agents will be tried in the order they are entered in the configuration. For more information regarding call agents and MGCP configuration, refer to the MGCP in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 2347).
The no form of this command will only take effect if there are no secondary call agents configured. If secondary call agents are configured, the primary call agent can be modified by issuing this command with the new host name information. The primary call agent host name cannot be removed while any secondary call agents are configured. For more information about secondary call agents, refer to the command ip mgcp call-agent secondary <hostname> on page 972. Usage Examples
The following example configures the primary MGCP call agent, myagent@company.com: (config)#ip mgcp call-agent primary myagent@company.com
60000CRG0-35B
970
Default Values
By default, no secondary call agents are configured.
Command History
Release A2 Command was introduced.
Functional Notes
Multiple secondary call agent host names can be configured. If a connection with the primary call agent fails, call agents are tried in the order they are entered in the configuration. New secondary call agents are added at the end of the list.
If secondary call agents are configured, primary call agents cannot be removed. For more information about primary call agents, refer to the command ip mgcp call-agent primary <hostname> on page 971. Usage Examples
The following example specifies the secondary MGCP call agent as mysecondagent@company.com: (config)#ip mgcp call-agent secondary mysecondagent@company.com
60000CRG0-35B
971
ip mgcp local-domain-name
Use the ip mgcp local-domain-name command to specify the local Media Gateway Control Protocol (MGCP) domain name. Use the no form of this command to remove the associated host name from the AOS product. Variations of this command include:
ip mgcp local-domain-name <hostname> ip mgcp local-domain-name media-gateway
Syntax Description
<hostname> Specifies the gateway host name in either a fully qualified domain name (FQDN) format or as an IP address in dotted decimal notation (XX.XX.XX.XX). Specifies that the local domain name is based on the media gateway setting on the physical interface used for outbound traffic (for example, the Point-to-Point Protocol (PPP) or the Ethernet interfaces).
media-gateway
Default Values
By default, a local domain name is not configured.
Command History
Release A2 Command was introduced.
Usage Examples
The following example specifies that the local domain name for the media gateway is mygateway@company.com: (config)#ip mgcp local-domain-name mygateway@company.com (config)#
60000CRG0-35B
972
Default Values
By default, the max1 value is set to 5.
Command History
Release A2 Command was introduced.
Functional Notes
If the gateway does not receive a response from the call agent, the gateway retransmits MGCP messages max1 times before the gateway either queries the domain naming system (DNS) to detect a possible change in call agent interfaces or directs transmissions to alternate call agent IP addresses. For more information about MGCP configuration, refer to the MGCP in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 2347).
Usage Examples
The following example sets the number of message transmissions between the gateway and the call agent to 20: (config)#ip mgcp max1 20
60000CRG0-35B
973
Default Values
By default, MGCP retransmissions before gateway disconnection is set to 7.
Command History
Release A2 Command was introduced.
Functional Notes
When the gateway has retransmitted MGCP messages max2 times, it indicates that the gateway has already exceeded the max1 value (refer to the command ip mgcp max1 <value> on page 974) and it will contact the domain naming system (DNS) to search for alternate call agent interfaces which to connect. If the gateway does not find any available call agent interfaces for connection, the gateway will disconnect.
The max2 value must always be greater than the max1 value. If the max1 value is specified to be greater than the max2 value, the max2 value is automatically defined as max1 + 1.
For more information about MGCP configuration, refer to the MGCP in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 2347).
Usage Examples
The following example specifies that the MGCP gateway will retransmit MGCP messages 30 times before disconnecting from the call agent: (config)#ip mgcp max2 30
60000CRG0-35B
974
ip mgcp persistent-notify
Use the ip mgcp persistent-notify command to enable persistent event notification to the Media Gateway Control Protocol (MGCP) call agent. Use the no form of this command to disable persistent notification. Variations of this command include:
ip mgcp persistent-notify hd ip mgcp persistent-notify hu ip mgcp persistent-notify hf
Syntax Description
hd hu hf Specifies that notification of endpoint hang down is sent to the call agent. Specifies that notification of endpoint hang up is sent to the call agent. Specifies that notification of endpoint hook flash is sent to the call agent.
Default Values
By default, persistent notification is disabled.
Command History
Release A2 Command was introduced.
Functional Notes
When persistent notification is disabled, the media gateway will not send event notifications of endpoint hang down (hd), hang up (hu), or hook flash (hf). When the feature is enabled, the media gateway will send notification of endpoint events even if it has not received a notification request from the call agent. Some call agents require the use of persistent notification. For example, sometimes hd notification is required for initial dial tone once the link has become active. Refer to the configuration materials provided with your call agent for more information.
Usage Examples
The following example enables persistent notification of endpoint hang down: (config)#ip mgcp persistent-notify hd
60000CRG0-35B
975
Default Values
By default, the DSCP value for MGCP packets is 46.
Command History
Release A2 Command was introduced.
Usage Examples
The following example specifies the DSCP value for MGCP gateways as 10: (config)#ip mgcp qos dscp 10
60000CRG0-35B
976
ip mgcp retransmit-delay
Use the ip mgcp retransmit-delay command to specify the constant time between retransmissions of Media Gateway Control Protocol (MGCP) messages. Use the no form of this command to return to the default setting. Variations of this command include:
ip mgcp retransmit-delay 100ms ip mgcp retransmit-delay 250ms ip mgcp retransmit-delay 500ms ip mgcp retransmit-delay 1sec ip mgcp retransmit-delay 2sec ip mgcp retransmit-delay 4sec
Syntax Description
100ms 250ms 500ms 1sec 2sec 4sec Specifies 100 milliseconds between retransmissions. Specifies 250 milliseconds between retransmissions. Specifies 500 milliseconds between retransmissions. Specifies 1 second between retransmissions. Specifies 2 seconds between retransmissions. Specifies 4 seconds between retransmissions.
Default Values
By default, retransmissions occur with longer and longer delays between retransmissions. These delays are based on RFC 3435, which uses a User Datagram Protocol (UDP) back-off algorithm for MGCP retransmission delay.
Command History
Release A2 Command was introduced.
Usage Examples
The following example specifies that retransmissions will occur at a constant rate of 1sec: (config)#ip mgcp retransmit-delay 1sec
60000CRG0-35B
977
ip mgcp rfc2833-signaling
Use the ip mgcp rfc2833-signaling command to enable the transmission and reception of ABCD signal bits via RFC 2833 packets. Use the no form of this command to disable ABCD signaling. Syntax Description
No subcommands.
Default Values
By default, ABCD signaling is disabled.
Command History
Release A2 Command was introduced.
Usage Examples
The following example enables ABCD signaling: (config)#ip mgcp rfc2833-signaling
60000CRG0-35B
978
ip mgcp standard
Use the ip mgcp standard command to specify the Media Gateway Control Protocol (MGCP) standard the gateway will use. Use the no form of this command to return to the default standard. Variations of this command include:
ip mgcp standard rfc3435 ip mgcp standard ncs
Syntax Description
rfc3435 ncs Specifies that the RFC 3435 MGCP standard is used. Specifies that the MGCP 0.1/NCS 1.0 standard is used.
Default Values
By default, MGCP gateways use the rfc3435 standard.
Command History
Release A2 Command was introduced.
Usage Examples
The following example sets the MGCP standard to ncs: (config)#ip mgcp standard ncs
60000CRG0-35B
979
Default Values
By default, the MGCP gateway listens for UDP on port 2427 as defined by RFC 3435.
Command History
Release A2 Command was introduced.
Usage Examples
The following example specifies that the MGCP gateway will listen for UDP information on port 2727: (config)#ip mgcp udp 2727
60000CRG0-35B
980
ip multicast-routing
Use the ip multicast-routing command to enable the multicast router process. The command does not affect other multicast-related configurations. Use the no form of this command to disable this feature. Disabling this command prevents multicast forwarding, but does not remove other multicast commands and processes. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example enables multicast functionality: (config)#ip multicast-routing
60000CRG0-35B
981
ip name-server
Use the ip name-server command to designate one or more name servers to use for name-to-address resolution. This command can be applied to the default VPN routing and forwarding (VRF) or a specific VRF instance. Use the no form of this command to remove any addresses previously specified. Variations of this command include:
ip name-server <ip address1> ip name-server <ip address1> <ip address2> ip name-server <ip address1> <ip address2> <ip address3> ip name-server <ip address1> <ip address2> <ip address3> <ip address4> ip name-server <ip address1> <ip address2> <ip address3> <ip address4> <ip address5> ip name-server <ip address1> <ip address2> <ip address3> <ip address4> <ip address5> <ip address6> ip name-server vrf <name> <ip address1> ip name-server vrf <name> <ip address1> <ip address2> ip name-server vrf <name> <ip address1> <ip address2> <ip address3> ip name-server vrf <name> <ip address1> <ip address2> <ip address3> <ip address4> ip name-server vrf <name> <ip address1> <ip address2> <ip address3> <ip address4> <ip address5> ip name-server vrf <name> <ip address1> <ip address2> <ip address3> <ip address4> <ip address5> <ip address6>
Syntax Description
<ip address 1-6> vrf <name> Specifies up to six name-server addresses. Optional. Specifies a nondefault VRF where the name-server exists.
Default Values
By default, no name servers are specified.
Command History
Release 3.1 Release 16.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example specifies host 172.34.1.111 as the primary name server and host 172.34.1.2 as the secondary server: (config)#ip name-server 172.34.1.111 172.34.1.2
60000CRG0-35B
982
Syntax Description
<name> <name> static Enters the configuration commands set for an existing NAT pool identified by the <name> variable. Creates NAT pool for 1:1 static NAT and enters its configuration command set. For a given configuration, a local address statically maps to a global address and vice versa.
Default Values
By default, there are no NAT pools configured.
Command History
Release 17.4 Command was introduced to allow static NAT pools only.
Functional Notes
Static 1:1 NAT allows connections initiated from a particular private IP address to always map to a particular public IP address. For every private host that requires a 1:1 NAT mapping, there must be a corresponding NAT address on the public side. In previous versions of AOS, this was accomplished by using an exhaustive list of all address mappings. AOS version 17.4 and later provided support for using NAT pools that lists ranges of local and global IP addresses to create the 1:1 mappings.
Usage Examples
The following example creates a static 1:1 NAT pool named POOL1 and enters the NAT pool configuration command set: (config)#ip nat pool POOL1 static The following example enters the configuration command set for an existing NAT pool named POOL2: (config)#ip nat pool POOL2
60000CRG0-35B
983
Default Values
By default, all AOS IPv4 security features are disabled and there are no configured ACP entries.
Command History
Release 2.1 Command was introduced.
Functional Notes
AOS IPv4 ACPs are used to allow, discard, or manipulate (using network address translation (NAT)) data for each physical interface. Each ACP consists of an action (allow, discard, nat) and a selector access control list (ACL). When IPv4 packets are received on an interface, the configured IPv4 ACPs are applied to determine whether the data will be processed or discarded.
An implicit discard exists at the end of every IPv4 ACP. Specifying a discard list is unnecessary in most applications and should be used with caution. A discard list can adversely affect certain functions of a unit (virtual private network (VPN), routing protocols, etc.). Specifying an empty ACL or a nonexistent ACL in an ACP will result in an implicit permit.
IPv4 ACPs and ACLs cannot have the same name as a configured IPv6 ACP or ACL.
60000CRG0-35B
984
Usage Examples
The following example creates an IPv4 ACP named PRIVATEv4: (config)#ip policy-class PRIVATEv4 (config-policy-class)#
Technology Review
IPv4 ACPs and ACLs regulate traffic through the routed network. Creating IPv4 ACPs and ACLs to regulate traffic through the routed network is a four-step process: Step 1: Enable the IPv4 security features of AOS using the ip firewall command. Refer to the command ip firewall on page 920 for more information. Step 2: Create an IPv4 ACP that uses a configured ACL by issuing the ip policy-class command. AOS IPv4 ACPs are used to allow, discard, or manipulate (using NAT) data for each physical interface. Each ACP consists of an action (allow, discard, nat) and a selector (ACL). When packets are received on an interface, the configured ACPs are applied to determine whether the data will be processed or discarded. Step 3: Create an IPv4 ACL to permit or deny specified traffic by using either the ip access-list extended or ip access-list standard command. Standard IPv4 ACLs match based on the source IP address of the packet. Extended IPv4 ACLs match based on the source and destination of the packet. Refer to the command ip access-list extended <ipv4 acl name> on page 898 or the command ip access-list standard <ipv4 acl name> on page 900 for more information. Sources can be expressed in one of four ways: 1. Using the keyword any to match any IP address. 2. Using host <ip address> to specify a single host address. 3. Using the <ip address> <wildcard> format to match all IPv4 addresses in a range. Wildcard masks work in reverse logic from subnet masks. When broken out into binary form, a 0 indicates which bits of the IPv4 address to consider, a 1 indicates which bits are disregarded. For example, specifying 255 in any octet of the wildcard mask equates to a dont care for that octet in the IP address. Additionally, a 30-bit mask would be represented with the wildcard string 0.0.0.3, a 28-bit mask with 0.0.0.15, a 24-bit mask with 0.0.0.255, and so forth. 4. Using the keyword hostname to match based on a domain naming system (DNS) name. DNS servers must be configured or host names must be locally defined for this function to work. Step 4: Apply the created IPv4 ACP to an interface. To assign an ACP to an interface, enter the interface configuration mode for the desired interface and enter access-policy <acp name>. The following example assigns ACP UNTRUSTED to the Ethernet 0/1 interface: (config)#interface ethernet 0/1 (config-eth 0/1)#access-policy UNTRUSTED
60000CRG0-35B
985
Default Values
By default, all AOS security features are disabled and there are no configured ACP entries.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example allows no more than 100 policy sessions to be sourced from a single host IP address on the ACP named PRIVATE: (config)#ip policy-class PRIVATE max-host-sessions 100
60000CRG0-35B
986
Default Values
By default, all AOS security features are disabled and there are no configured ACP entries.
Command History
Release 2.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170. To set the maximum limit for IPv6 ACP sessions, use the command ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1115.
Usage Examples
The following example allows no more than 100 IPv4 policy sessions on the ACP named PRIVATE: (config)#ip policy-class PRIVATE max-sessions 100 The following example restores the default policy sessions limit on the ACP named PRIVATE: (config)#no ip policy-class PRIVATE max-sessions
60000CRG0-35B
987
rpf-check
Default Values
This command is enabled by default.
Command History
Release 12.1 Command was introduced.
Functional Notes
The rpf-check feature should be disabled if your application allows IPv4 traffic to arrive on an interface sourced from networks contradicting the route table. This feature can be disabled on a per ACP basis by issuing this command in conjunction with the ACP name you do not want to be checked.
Usage Examples
The following example turns off the rpf-check feature for the IPv4 ACP named PRIVATE: (config)#no ip policy-class PRIVATE rpf-check
60000CRG0-35B
988
ip policy-timeout
Use multiple ip policy-timeout command to customize timeout intervals for the following protocols: (Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), Authentication Header (AH) Protocol, generic routing encapsulation (GRE), encapsulating security payload (ESP)) or specific services (by listing the particular port number). Use the no form of this command to return to the default timeout values. Variations of this command include:
ip policy-timeout [ahp | esp | gre | icmp] <timeout> ip policy-timeout [tcp | udp] <port> <timeout> ip policy-timeout [tcp | udp] range <port> <port> <timeout>
Syntax Description
ahp esp gre icmp <timeout> tcp udp range <port> Specifies the data protocol as AHP. Specifies the data protocol as ESP. Specifies the data protocol as GRE. Specifies the data protocol as ICMP. Specifies the wait interval (in seconds) before an active session is closed. Valid range is 0 to 4294967295 seconds. Specifies the data protocol as TCP. If you are using TCP, you can also specify the timeout for a specific port or a range of ports. Specifies the data protocol as UDP. If you are using UDP, you can also specify the timeout for a specific port or a range of ports. Optional. Customizes timeout intervals for a range of TCP or UDP ports. Specifies the service port, or a range of ports, to which to apply the timeout value; valid only for specifying TCP and UDP services. The following is the list of TCP port numbers that may be identified using the text name (in bold): all-ports kshell (Port 544) bgp (Port 179) login (Port 513) chargen (Port 19) lpd (Port 515) cmd (Port 514) nntp (Port 119) daytime (Port 13) pim-auto-rp (Port 496) discard (Port 9) pop2 (Port 109) domain (Port 53) pop3 (Port 110) echo (Port 7) smtp (Port 25) exec (Port 512) ssh (Port 22) finger (Port 79) sunrpc (Port 111) ftp (Port 21) syslog (Port 514) ftp-data (Port 20) tacacs (Port 49)
60000CRG0-35B
989
Command Reference Guide gopher (Port 70) hostname (Port 101) https (Port 443) ident (Port 113) irc (Port 194) klogin (Port 543)
Global Configuration Mode Command Set talk (Port 517) telnet (Port 23) time (Port 37) uucp (Port 540) whois (Port 43) www (Port 80)
The following is the list of UDP port numbers that may be identified using the text name (in bold): all-ports ntp (Port 123) biff (Port 512) pim-auto-rp (Port 496) bootpc (Port 68) rip (Port 520) bootps (Port 67) snmp (Port 161) discard (Port 9) snmptrap (Port 162) dnsix (Port 195) sunrpc (Port 111) domain (Port 53) syslog (Port 514) echo (Port 7) tacacs (Port 49) isakmp (Port 500) talk (Port 517) mobile-ip (Port 434) tftp (Port 69) nameserver (Port 42) time (Port 37) netbios-dgm (Port 138) who (Port 513) netbios-ns (Port 137) xdmcp (Port 177) netbios-ss (Port 139)
Default Values
<timeout> The following default policy timeout intervals values apply: tcp (600 seconds; 10 minutes) udp (60 seconds; 1 minute) icmp (60 seconds; 1 minute) ahp (60 seconds; 1 minute) gre (60 seconds; 1 minute) esp (60 seconds; 1 minute)
Command History
Release 2.1 Release 11.1 Command was introduced. Added AHP, GRE, and ESP policies.
Usage Examples
The following example creates customized policy timeouts for the following: Internet traffic (TCP Port 80) timeout 24 hours (86400 seconds) Telnet (TCP Port 23) timeout 20 minutes (1200 seconds) FTP (TCP Port 21) timeout 5 minutes (300 seconds) All other TCP services timeout 8 minutes (480 seconds)
60000CRG0-35B
990
Command Reference Guide (config)#ip policy-timeout tcp www 86400 (config)#ip policy-timeout tcp telnet 1200 (config)#ip policy-timeout tcp ftp 300 (config)#ip policy-timeout tcp all_ports 480
The following example creates customized policy timeouts for UDP network basic input/output system (NetBIOS) ports 137 to 139 of 200 seconds and UDP ports 6000 to 7000 of 300 seconds: (config)#ip policy-timeout udp range netbios-ns netbios-ss 200 (config)#ip policy-timeout udp range 6000 7000 300 The following example creates a customized policy timeout of 1200 seconds for ESP: (config)#ip policy-timeout esp 1200 The following example creates a customized policy timeout of 1200 seconds for GRE: (config)#ip policy-timeout gre 1200 The following example creates a customized policy timeout of 1200 seconds for AHP: (config)#ip policy-timeout ahp 1200
60000CRG0-35B
991
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Command was introduced.
Functional Notes
This command adds a string of up to 80 characters as a description for a prefix list. It also creates the prefix list if a prefix list of that name does not already exist.
Usage Examples
The following example adds a description to the prefix-list test: (config)#ip prefix-list test description An example prefix list
60000CRG0-35B
992
Syntax Description
<name> <number> Specifies a particular prefix list. Specifies the entry's unique sequence number that determines the processing order. Lower numbered entries are processed first. Range is 1 to 4294967294. Permits access to entries matching the specified network IP address and the corresponding network prefix length (for example, 10.10.10.1 /24). Denies access to entries matching the specified network IP address and the corresponding network prefix length (for example, 10.10.10.1 /24). Specifies the upper end of the range. Range is 0 to 32. Specifies the lower end of the range. Range is 0 to 32.
Default Values
If no ge or le parameters are specified, an exact match is assumed. If only ge is specified, the range is assumed to be from ge-value to 32. If only le is specified, the range is assumed to be from len to le-value.
Command History
Release 8.1 Command was introduced.
Functional Notes
This command specifies a prefix to be matched. If the network address is entered without specifying a range for prefix lengths, the router assumes that the route must be an exact match. For example, if the command ip prefix-list TEST seq 5 permit 10.1.0.0/16 is entered, the BGP interface will only accept routes to the entire 10.1.0.0 /16 subnet. It will not accept routes to a network, such as 10.1.1.0/ 24, which was subdivided from the /16 network. Optionally, this command may specify a range of mask lengths. The following rule must be followed: len < ge-value < le-value. A filter that exactly matches a prefix length can be created by entering the length for both the ge and le values. A prefix list with no entries allows all routes. A route that does not match any entries in a prefix list is dropped. As soon as a route is permitted or denied, there is no further processing of the rule in the prefix list. A route that is denied at the beginning entry of a prefix list will not be allowed, even if it matches a permitting entry further down the list.
60000CRG0-35B
993
Usage Examples
The following example creates a prefix list entry in the prefix list TEST that allows all routes to subnets in the 10.1.0.0 /16 network with a prefix length up to and including 24: (config)#ip prefix-list TEST seq 5 permit 10.1.0.0/16 le 24 The following examle creates a prefix list entry in the prefix list TEST that allows any route to a /24 subnet in the 10.1.0.0 /16 range, but rejects routes destined for the entire 10.1.0.0 /16 network: (config)#ip prefix-list TEST seq 5 permit 10.1.0.0/16 ge 24 le 24
60000CRG0-35B
994
Default Values
By default, no source interface is defined.
Command History
Release 5.1 Release 14.1 Release 15.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the tunnel interface. Command was expanded to include the bridged virtual interface (BVI). Command was expanded to include the asynchronous transfer mode (ATM) interface. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
If this value is not defined, the address of the source network interface is used.
Usage Examples
The following example configures the Ethernet 0/1 port to be the source interface: (config)#ip radius source-interface ethernet 0/1 The following example configures the BVI 1 interface to be the source interface: (config)#ip radius source-interface bvi 1
60000CRG0-35B
995
ip route
Use the ip route command to add an Internet Protocol version 4 (IPv4) static route to the IPv4 route table. Use the no form of this command to remove a configured IPv4 static route. Variations of this command include:
ip route <ip address> <subnet mask> <interface> ip route <ip address> <subnet mask> <interface> <administrative distance> ip route <ip address> <subnet mask> <interface> <administrative distance> tag <number> ip route <ip address> <subnet mask> <interface> <administrative distance> track <name> ip route <ip address> <subnet mask> <interface> <administrative distance> track <name> tag <number> ip route <ip address> <subnet mask> <interface> tag <number> ip route <ip address> <subnet mask> <ip address> ip route <ip address> <subnet mask> <ip address> tag <number> ip route <ip address> <subnet mask> <ip address> track <name> ip route <ip address> <subnet mask> <ip address> tag <number> track <name> ip route <ip address> <subnet mask> <ip address> <administrative distance> ip route <ip address> <subnet mask> <ip address> <administrative distance> tag <number> ip route <ip address> <subnet mask> <ip address> <administrative distance> track <name> ip route <ip address> <subnet mask> <ip address> <administrative distance> track <name> tag <number> ip route <ip address> <subnet mask> null 0 ip route <ip address> <subnet mask> null 0 <administrative distance> ip route <ip address> <subnet mask> null 0 <administrative distance> tag <number> ip route <ip address> <subnet mask> null 0 <administrative distance> track <name> ip route <ip address> <subnet mask> null 0 tag <number> ip route <ip address> <subnet mask> null 0 track <name>
Syntax Description
<ip address> Specifies the IPv4 network address to add to the route table. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IPv4 addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Specifies the far-end IPv4 address or an egress interface in the unit. Use the ip route <ip address> <subnet mask> ? command to display a complete list of egress interfaces. Optional. Specifies that traffic is routed to the null interface. The router drops all packets destined for the null interface. Use the null interface to allow the router to advertise a route, but not forward traffic to the route. Optional. Specifies an administrative distance associated with a particular router used to determine the best route when multiple routes to the same destination exist. The lower the administrative distance, the more preferable the route. Range is 1 to 255.
<subnet mask>
null 0
<administrative distance>
60000CRG0-35B
996
Global Configuration Mode Command Set Optional. Specifies a number to use as a tag for this route. Route tags are used to label and filter routes when dynamically redistributing routes into a routing protocol (such as Routing Information Protocol (RIP)/open shortest path first (OSPF)/Border Gateway Protocol (BGP)). Range is 1 to 65535. Optional. Enables tracking on the indicated route. Once the named track enters a fail state, the route specified by the command is disabled and traffic will no longer be routed using that route. For more information on configuring tracks, refer to track <name> on page 1251.
track <name>
Default Values
By default, there are no configured routes in the route table, and the tag of 0 is applied to the route.
Command History
Release 1.1 Release 9.1 Release 11.1 Release 13.1 Release 15.1 Command was introduced. Tunnel was added as a supported interface. Demand was added as a supported interface. Command was expanded to include the track feature. Command was expanded to include route tagging capability.
Usage Examples
The following example adds an IPv4 static route to the 10.220.0.0 /16 network through the next-hop router 192.22.45.254 and an IPv4 default route to 175.44.2.10: (config)#ip route 10.220.0.0 255.255.0.0 192.22.45.254 (config)#ip route 0.0.0.0 0.0.0.0 175.44.2.10
60000CRG0-35B
997
ip route-cache express
Use the ip route-cache express command to globally enable Layer 3 switching. Use the no form of this command to disable Layer 3 switching. Syntax Description
No subcommands.
Default Values
Layer 3 switching is disabled by default, except on the NetVanta 1544. Layer 3 switching is enabled by default on the NetVanta 1544.
Functional Notes
Layer 3 switching cannot be disabled on the NetVanta 1544. For more information about Layer 3 switching, refer to the Layer 3 Switching in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3070).
Command History
Release 17.5 Command was introduced.
Usage Examples
The following example globally enables Layer 3 switching: (config)#ip route-cache express
60000CRG0-35B
998
ip route vrf
Use the ip route vrf command to create a static route in one of the nondefault VPN routing and forwarding (VRF) instances. Use the no form of this command to remove the static route. Variations of this command include:
ip route vrf <name> <ip address> <subnet mask> [<interface> | <ip address>] ip route vrf <name> <ip address> <subnet mask> [<interface> | <ip address>] <distance> ip route vrf <name> <ip address> <subnet mask> [<interface> | <ip address>] <distance> tag <number> ip route vrf <name> <ip address> <subnet mask> [<interface> | <ip address>] <distance> tag <number> track <name> ip route vrf <name> <ip address> <subnet mask> [<interface> | <ip address>] <distance> track <name> ip route vrf <name> <ip address> <subnet mask> [<interface> | <ip address>] <distance> track <name> tag <number> ip route vrf <name> <ip address> <subnet mask> [<interface> | <ip address>] tag <number> ip route vrf <name> <ip address> <subnet mask> [<interface> | <ip address>] tag <number> track <name> ip route vrf <name> <ip address> <subnet mask> [<interface> | <ip address>] track <name> ip route vrf <name> <ip address> <subnet mask> [<interface> | <ip address>] track <name> tag <number> ip route vrf <name> <ip address> <subnet mask> null 0 ip route vrf <name> <ip address> <subnet mask> null 0 <distance> ip route vrf <name> <ip address> <subnet mask> null 0 <distance> tag <number> ip route vrf <name> <ip address> <subnet mask> null 0 <distance> track <name> ip route vrf <name> <ip address> <subnet mask> null 0 tag <number> ip route vrf <name> <ip address> <subnet mask> null 0 tag <number> track <name> ip route vrf <name> <ip address> <subnet mask> null 0 track <name> ip route vrf <name> <ip address> <subnet mask> null 0 track <name> tag <number>
Syntax Description
<name> <ip address> <subnet mask> Specifies the name of the VRF instance. Specifies the network address to add to the route table. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IP addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Valid prefix lengths are 0 to 32. Specifies the far-end IP address or an egress interface in the unit. Use the ip route <ip address> <subnet mask> ? command to display a complete list of egress interfaces. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Routes traffic destined for the specified network to the null interface. The router drops all packets destined for the null interface. Use the null interface to allow the router to advertise a route, but not forward traffic to the route.
null 0
60000CRG0-35B
999
Global Configuration Mode Command Set Optional. Specifies an administrative distance associated with a particular router used to determine the best route when multiple routes to the same destination exist. The lower the administrative distance, the more preferable the route. Range is 1 to 255. Optional. Enables tracking on the indicated route. Once the named track enters a fail state, the route specified by the command is disabled and traffic will no longer be routed using that route. For more information on configuring tracks, refer to track <name> on page 1251. Optional. Specifies a number to use as a tag for this route. Route tags are used to label and filter routes when dynamically redistributing routes into a routing protocol (such as Routing Information Protocol (RIP)/open shortest path first (OSPF)/Border Gateway Protocol (BGP)). Range is 1 to 65535.
track <name>
tag <number>
Default Values
No default values are necessary for this command.
Command History
Release 16.1 Release 17.5 Command was introduced. Command was expanded to include the loopback interface.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. The VRF must have already been created (using the command ip vrf <name> route-distinguisher <number> on page 1097) before static routes can be configured.
Usage Examples
The following example adds a static route to the routing and forwarding tables used for the VRF RED: (config)#ip route vrf RED 10.220.0.0 255.255.0.0 192.22.45.254 (config)#ip route vrf RED 0.0.0.0 0.0.0.0 175.44.2.10
60000CRG0-35B
1000
ip routing
Use the ip routing command to enable the AOS IP routing functionality. Use the no form of this command to disable IP routing. Syntax Description
No subcommands.
Default Values
By default, IP routing is enabled.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example enables the AOS IP routing functionality: (config)#ip routing
60000CRG0-35B
1001
Default Values
By default, the DTMF relay value is 60.
Command History
Release A2 Command was introduced.
Usage Examples
The following example sets the DTMF relay duration to 50: (config)#ip rtp dtmf-relay min-duration 50
60000CRG0-35B
1002
ip rtp firewall-traversal
Use the ip rtp firewall-traversal command to enable dynamic firewall traversal capability for RTP-based traffic, allowing deep packet inspection of Session Description Protocol (SDP) packets to occur so RTP will correctly traverse network address translation (NAT) in the firewall. This will open the proper ports dynamically for the RTP traffic. Use the no form of this command to return to the default setting. Variations of this command include:
ip rtp firewall-traversal ip rtp firewall-traversal enforce-symmetric-ip ip rtp firewall-traversal policy-timeout <value> ip rtp firewall-traversal reuse-nat-ports
Syntax Description
enforce-symmetric-ip policy-timeout <value> reuse-nat-ports Optional. Specifies that the same IP address must be used for both transmit and receive for the RTP stream. Optional. Specifies timeout period in seconds allowed for inactive RTP sessions to remain in the firewall. Range is 1 to 4294967295 seconds. Optional. Specifies that NAT ports be reused during calls.
Default Values
By default, the RTP dynamic firewall traversal is disabled and the policy timeout period is 45 seconds.
Command History
Release 10.1 Release 14.1 Release A2 Command was introduced. Command was updated to include the reuse-nat-ports option. Command was updated to include the enforce-symmetric-ip option.
Functional Notes
Session Initiation Protocol (SIP) uses the SDP to format the SIP message body in order to negotiate a Realtime Transport Protocol (RTP)/Realtime Transport Control Protocol (RTCP) connection between two or more user agents (UAs). The ports used for this will always be selected in a pair, with the even port used for RTP and the odd port for RTCP. The SIP application-level gateway (ALG) (enabled using the ip firewall alg sip) configures the firewall to examine the ALL SIP packets it identifies and maintain knowledge of SIP transmissions on the network. Since SIP packet headers include port information for the call setup, the ALG must intelligently read the packets and remember the information. For a full SIP implementation, dynamic firewall traversal for RTP traffic must also be enabled using the ip rtp firewall-traversal command. This allows the firewall to open the proper ports for the RTP traffic between UAs. For more details on SIP functionality in AOS, refer to the Functional Notes and Technology Review sections of the command ip firewall alg on page 926.
60000CRG0-35B
1003
Usage Examples
The following example enables dynamic firewall traversal, and sets the policy timeout period at 60 seconds: (config)#ip rtp firewall-traversal policy-timeout 60
60000CRG0-35B
1004
Default Values
By default, the timeout period is 32 seconds.
Command History
Release A2.03 Command was introduced.
Usage Examples
The following example sets the NAT session timeout period at 60 seconds: (config)#ip rtp nat-session timeout 60
60000CRG0-35B
1005
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example sets the DSCP value to 63: (config)#ip rtp qos dscp 63
60000CRG0-35B
1006
ip rtp quality-monitoring
Use the ip rtp quality-monitoring command to globally enable voice quality monitoring (VQM) of the Realtime Transport Protocol (RTP) voice stream packets. Use the no form of this command to disable VQM. Variations of this command include:
ip rtp quality-monitoring ip rtp quality-monitoring scoring-adjustment japan ip rtp quality-monitoring sip ip rtp quality-monitoring udp
Syntax Description
scoring-adjustment japan Optional. Sets the region for scoring adjustment for Japan. In Japan, the mean opinion score (MOS) statistics are calculated differently than in other regions. VQM must be disabled and then enabled again for this setting to take effect. Optional. Specifies that Session Initiation Protocol (SIP) is the signaling type of the RTP stream to monitor. Optional. Specifies that User Datagram Protocol (UDP) is the signaling type of the RTP stream to monitor.
sip udp
Default Values
By default, the VQM is disabled globally.
Functional Notes
Disabling VQM on the global level (for example, to change the scoring adjustment) erases all active calls, new calls, and interface statistics. Call history and endpoint statistics are not affected. If the sip or udp parameters are specified, and VQM has not previously been enabled at the global level, VQM will be enabled globally. Enabling UDP packet inspection forces the AOS unit to inspect every UDP packet to determine if it is an RTP packet, placing a significant load on the AOS unit. UDP packet inspection should only be enabled if IP phones are being used and they do not pass through the SIP ALG, SIP proxy, or SIP B2BUA. For more information about VQM configuration, refer to the configuration guide Configuring VQM in AOS available online at http://kb.adtran.com (article number 2262).
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables RTP quality monitoring at the global level and does not specify a scoring region or RTP signaling type: (config)#ip rtp quality-monitoring
60000CRG0-35B
1007
Syntax Description
user <user> Specifies that only calls from certain users are measured. Users are specified by Session Initiation Protocol (SIP) To or From headers, in the format user@host. Multiple users can be monitored simultaneously. Specifies that only RTP streams that match the previously configured access control list (ACL) are measured. The <name> parameter is the ACL to be used. Only one ACL can be applied to VQM at a time.
access-class <name>
Default Values
By default, VQM is not filtered by user or ACL.
Command History
Release A1 Command was introduced.
Usage Examples
The following example specifies that VQM only monitor RTP streams that match the previously configured ACL, 4thFloorUsers: (config)#ip rtp quality-monitoring filters access-class 4thFloorUsers
60000CRG0-35B
1008
Syntax Description
cq-mos <value> Specifies a threshold for the conversational quality (CQ) mean opinion score (MOS), and stores statistics below this threshold. The range is 0 to 4.4. Specifies a threshold for the jitter. Statistics above this threshold are stored as jitter. The packet-to-packet delay variation is measured in milliseconds (from nAvgPDV). The range is 0 to 30000. Specifies a threshold for loss (in packets). Statistics above this threshold is stored as lost packets. The range is 0 to 30000. Specifies a threshold for the listening quality (LQ) MOS, and stores statistics below this threshold. The range is 0 to 4.4. Specifies a number of previously completed call statistics to store. This is a count of Realtime Transport Protocol (RTP) streams; each call can contain two RTP streams. The range is 0 to 2000. Specifies a threshold for out-of-order packets to be logged. Statistics above this threshold are stored. The range is 0 to 30000. Specifies a threshold for LQ MOS normalized to the PESQ (PQ) scale, and stores statistics below this threshold. The range is 0 to 4.4.
jitter <value>
Default Values
By default, the maximum number of RTP streams allowed in the history is 100.
Setting the size of the call history to a large number can result in the AOS unit running out of memory.
By default, MOS thresholds are set to 4.4, and jitter, loss, and out-of-order packet thresholds are set to 0.
60000CRG0-35B
1009
Command History
Release 17.1 Command was introduced.
Functional Notes
As calls complete, settings configured using this command are examined to determine whether the call should be stored in the call history. The maximum number of streams to store may be configured; newer calls will replace the oldest calls when the call history is full. The MOS, loss, out-of-order packets, and jitter can also be examined when a call completes. By default, all calls are stored in the call history. However, if threshold values are changed from their defaults, only calls with poorer quality than these nondefault thresholds will be stored.
Usage Examples
The following example enables RTP quality monitoring history to store a maximum of 250 RTP streams: (config)#ip rtp quality-monitoring history max-streams 250
60000CRG0-35B
1010
Syntax Description
adaptive min <delay> nominal <value> max <value> fixed nominal <value> Optional. Specifies the minimum acceptable jitter buffer delay to be used by the JBE. The range is 10 to 240 milliseconds. Optional. Specifies the starting delay applied to packets of the emulated jitter buffer. The range is 10 to 240 milliseconds. Optional. Specifies the maximum delay that the adaptive jitter buffer will be allowed to use. The range is 40 to 320 milliseconds. Optional. Specifies the actual fixed delay that would be applied to the packet in a nonemulated jitter buffer. The range is 4 to 250 milliseconds. There is no default setting. Optional. Specifies the number of packets that the emulated jitter buffer can hold. The range is 10 to 500 packets. There is no default setting.
jitter-buffer-size <value>
Default Values
By default, the jitter buffer is set to adaptive min 10 nominal 50 max 200.
Command History
Release 17.1 Release A1 Release A4.01 Command was introduced. Command was introduced in the AOS voice products. Command was modified to allow specifying the nominal value without specifying the max value.
Usage Examples
The following example enables the JBE to hold up to 175 packets in fixed mode: (config)#ip rtp quality-monitoring jitter-buffer fixed nominal 50 jitter-buffer-size 175
60000CRG0-35B
1011
Syntax Description
early <value> late <value> Specifies the time by which packets are deemed to have arrived early. The range is 0 to 1000 ms. Specifies the time by which packets are deemed to have arrived late. The range is 0 to 1000 ms.
Default Values
By default, jitter thresholds are set to early 10, and late 60.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example specifies the late jitter threshold at 45 ms: (config)#ip rtp quality-monitoring jitter-threshold late 45
60000CRG0-35B
1012
Default Values
By default, no VQM reporter exists.
Command History
Release 17.6 Command was introduced.
Functional Notes
The ip rtp quality-monitoring reporter command creates a VQM reporter and also enters the reporters configuration mode. For more information on configuring VQM reporters, refer to the VQM Reporter Command Set on page 3439.
Usage Examples
The following example creates the VQM reporter Reporter1 and enters the reporters configuration mode: (config)#ip rtp quality-monitoring reporter Reporter1 Configuring New Reporter Reporter1 (config-rtp-reporter-Reporter1)#
60000CRG0-35B
1013
Syntax Description
icmp-ping icmp-timestamp Specifies the use of Internet Control Message Protocol (ICMP) requests for calculating round-trip delay. Specifies the use of ICMP timestamp requests for calculating round-trip delay.
Default Values
By default, the calculation type is icmp-ping.
Functional Notes
Round-trip delay settings appear in the VQM statistics; however, if Realtime Transport Protocol (RTP) extended reports (RTCP XR) are also available, the received RTCP XR reports supersede the round-trip delay settings. The endpoints and local units must be synchronized (time and date) for the timestamp method to be accurate. In addition, any firewalls between the voice endpoints must be configured to allow ICMP traffic to pass. For more information about VQM round-trip delay calculations, and VQM configuration, refer to the configuration guide Configuring VQM in AOS available online at http://kb.adtran.com (article number 2262).
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example specifies timestamp requests are used to determine round-trip delay: (config)#ip rtp quality-monitoring round-trip-delay icmp-timestamp
60000CRG0-35B
1014
Default Values
By default, the VQM sampling rate is set to 1, which means that all RTP streams are monitored.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example specifies that VQM monitors 10 percent of all streams (one out of every 10): (config)#ip rtp quality-monitoring sample one-out-of 10
60000CRG0-35B
1015
Syntax Description
priority-level error info notice warning Optional. Specifies the priority level of the SNMP trap created by VQM. Specifies that an SNMP trap is created when VQM detects an error event. Specifies that an SNMP trap is created when VQM detects an info event. Specifies that an SNMP trap is created when VQM detects a notice event. Specifies that an SNMP trap is created when VQM detects a warning.
Default Values
By default, SNMP traps are not enabled for VQM.
Command History
Release 17.6 Command was introduced.
Usage Examples
The following example enables SNMP traps for VQM: (config)#ip rtp quality-monitoring snmp trap
60000CRG0-35B
1016
Syntax Description
error info notice warning <value> Specifies the threshold for jitter error messages to be logged. Specifies the threshold for jitter information messages to be logged. Specifies the threshold for jitter notice messages to be logged. Specifies the threshold for jitter warning messages to be logged. Optional. The range is 0 to 30000.
Default Values
By default, the jitter logging thresholds are info 0, notice 250, warning 350, and error 450.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables VQM jitter warning messages to be logged if jitter occurs above 200 ms: (config)#ip rtp quality-monitoring threshold jitter warning 200
60000CRG0-35B
1017
Syntax Description
error info notice warning <value> Specifies the threshold for lost packets error messages to be logged. Specifies the threshold for lost packets information messages to be logged. Specifies the threshold for lost packets notice messages to be logged. Specifies the threshold for lost packets warning messages to be logged. Optional. The range is 0 to 30000.
Default Values
By default, the lost packets thresholds are info 0, notice 25, warning 50, and error 100.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables VQM lost packet info messages to be logged if loss occurs above 10 packets: (config)#ip rtp quality-monitoring threshold loss info 10
60000CRG0-35B
1018
Syntax Description
error info notice warning <value> Specifies the threshold for LQ MOS error messages to be logged. Specifies the threshold for LQ MOS information messages to be logged. Specifies the threshold for LQ MOS notice messages to be logged. Specifies the threshold for LQ MOS warning messages to be logged. . Optional. The range is 0 to 4.4.
Default Values
By default, the LQ MOS thresholds are info 4.40, notice 4.00, warning 3.60, and error 2.60.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables VQM LQ MOS info messages to be logged if LQ MOS scores fall below 4.25: (config)#ip rtp quality-monitoring threshold lq-mos info 4.25
60000CRG0-35B
1019
Syntax Description
error info notice warning <value> Specifies the threshold for out-of-order packet error messages to be logged. Specifies the threshold for out-of-order packet information messages to be logged. Specifies the threshold for out-of-order packet notice messages to be logged. Specifies the threshold for out-of-order packet warning messages to be logged. Optional. The range is 0 to 30000.
Default Values
By default, the out-of-order packet thresholds are info 0, notice 25, warning 50, and error 100.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables VQM out-of-order packet info messages to be logged if the number of out-of-order packets is greater than 5: (config)#ip rtp quality-monitoring threshold out-of-order info 5
60000CRG0-35B
1020
Syntax Description
error info notice warning <value> Specifies the threshold for listening quality PQ MOS error messages to be logged. Specifies the threshold for listening quality PQ MOS information messages to be logged. Specifies the threshold for listening quality PQ MOS notice messages to be logged. Specifies the threshold for listening quality PQ MOS warning messages to be logged. Optional. The range is 0 to 4.4.
Default Values
By default, the PQ MOS thresholds are info 4.40, notice 4.00, warning 3.60, and error 2.60.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables VQM PQ MOS info messages to be logged if the PQ MOS scores fall below 4.25: (config)#ip rtp quality-monitoring threshold pq-mos info 4.25
60000CRG0-35B
1021
ip rtp symmetric-filter
Use the ip rtp symmetric-filter command to enable filtering of received nonsymmetric Realtime Transport Protocol (RTP) packets. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, the RTP symmetric filter is disabled.
Command History
Release 14.1 Command was introduced.
Usage Examples
The following example enables ip rtp symmetric-filter: (config)#ip rtp symmetric-filter
60000CRG0-35B
1022
Default Values
The default value for this command is 10000.
Command History
Release 10.1 Release 14.1 Command was introduced. Command was updated.
Usage Examples
The following example configures 2000 as the starting value of the UDP port: (config)#ip rtp udp 2000
60000CRG0-35B
1023
ip scp server
Use the ip scp server command to enable the secure copy server functionality in AOS. Enabling the secure copy server allows AOS to support the transfer of files using a secure connection. A secure connection helps provide protection against outside forces gaining access to configuration files. An external secure copy server is required to facilitate the transfers from the terminal. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, the secure copy server is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example enables the secure copy server function: (config)#ip scp server
60000CRG0-35B
1024
Syntax Description
rfc2543 rfc3264 Specifies the use of RFC 2543 for formatting hold messages. Specifies the use of RFC 3264 for formatting hold messages.
Default Values
By default, RFC 2543 is used for formatting hold messages.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example specifies to use RFC 3264 to format hold messages: (config)#ip sdp grammar hold rfc3264
60000CRG0-35B
1025
Syntax Description
explicit implicit Specifies sending all packet times. Specifies sending only packet times of 10 and 30 ms.
Default Values
By default, implicit packet times are sent.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies sending explicit packet times: (config)#ip sdp grammar ptime explicit
60000CRG0-35B
1026
ip security monitor
Use the ip security monitor command to activate the AOS Security Monitor feature and enter the Security Monitor Configuration mode. For more information on configuring the Security Monitor feature, refer to the Security Monitor Command Set on page 2946. Syntax Description
No Subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 17.5 Command was introduced.
Usage Examples
The following example activates the Security Monitor Configuration feature: (config-)#ip security monitor
60000CRG0-35B
1027
Default Values
By default, no security monitor filters exist.
Command History
Release 17.5 Command was introduced.
Usage Examples
The following example applies a filter named F1: (config)#ip security monitor stats-filter F1 Creating new filter F1. (config-secmon-filter)#
60000CRG0-35B
1028
ip sip
Use the ip sip command to enable the AOS Session Initiation Protocol (SIP) stack and to specify the protocol and port used by the SIP stack. When the SIP stack is enabled, memory is allocated for SIP functionality. Use the no form of this command to disable the SIP stack and free the memory allocated to the stack. Variations of this command include:
ip sip ip sip tcp ip sip tcp <port> ip sip udp ip sip udp <port>
Syntax Description
tcp udp <port> Optional. Specifies that the SIP stack operates using Transmission Control Protocol (TCP). Optional. Specifies that the SIP stack operates using User Datagram Protocol (UDP). Optional. Specifies the TCP or UDP port used by the SIP stack. Range is 1 to 65535.
Default Values
By default, the SIP stack is enabled on AOS voice products and disabled on AOS data products. The SIP stack operates using UDP on port 5060 if no protocol or port are specified. If a protocol is specified, but no port is specified, the SIP stack uses port 5060.
Command History
Release 11.1 Release 15.1 Command was introduced. Command was expanded to include the tcp, udp, and <port> parameters.
Functional Notes
By default, the AOS SIP application layer gateway (ALG) is enabled. This ALG allows the firewall to examine all SIP packets it identifies and to maintain information of SIP transmissions on the network based on the SIP header. The SIP ALG requires the use of the SIP stack and the SIP proxy server in order to properly route SIP calls and maintain the SIP information. For more details on the operation of SIP and the SIP ALG, refer to the command ip firewall alg on page 926. For proper SIP operation, the firewall must also be configured to allow for dynamic holes for the Realtime Transfer Protocol (RTP) and the Realtime Transfer Control Protocol (RTCP) traffic associated with SIP calls between user agents. This functionality must be manually enabled. For more details on enabling this functionality, refer to the command ip rtp firewall-traversal on page 1004. The SIP stack is used for many AOS features, including Transparent Proxy and Voice Quality Monitoring (VQM) Reporting. Refer to the configuration guides available online at http://kb.adtran.com for more information about SIP operation with specific features.
60000CRG0-35B
1029
Usage Examples
The following example enables the SIP stack and specifies that the stack operates using TCP: (config)#ip sip tcp
60000CRG0-35B
1030
Default Values
By default, no ACL is configured or applied, and all traffic reaches the SIP stack.
Command History
Release 16.1 Command was introduced.
Functional Notes
The ip sip access-class in command can be entered multiple times to apply multiple ACLs to incoming traffic to the SIP stack. For more information regarding ACL configuration, refer to the IPv4 Access Control List Command Set on page 2755.
Usage Examples
The following example specifies an IP SIP ACL name of HSV: (config)#ip sip access-class HSV in
60000CRG0-35B
1031
ip sip authenticate
Use the ip sip authenticate command to enable the Session Initiation Protocol (SIP) server authentication. Use the no form of this command to disable the feature. Syntax Description
No subcommands.
Default Values
By default, the SIP server authentication is disabled.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example enables the SIP server authentication: (config)#ip sip authenticate
60000CRG0-35B
1032
Default Values
By default, this command is disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example specifies storing the location database on the local router: (config)#ip sip database local
60000CRG0-35B
1033
ip sip default-call-routing
Use the ip sip default-call-routing command to specify the method used to route a call in the internal transaction distribution unit (TDU) when the destination of a call is ambiguous. Use the no form of this command to return to the default setting. Variations of this command include:
ip sip default-call-routing proxy ip sip default-call-routing reject ip sip default-call-routing switchboard
Syntax Description
proxy reject switchboard Specifies that the call is routed to a proxy server. Specifies that the call is rejected. Specifies that the call is routed to an internal switchboard.
Default Values
By default, the call routing method is proxy.
Command History
Release 16.1 Command was introduced.
Functional Notes
The ip sip default-call-routing command is applicable to AOS voice products only. This command is not available on AOS data products.
Usage Examples
The following example specifies that calls are routed to an internal switchboard: (config)#ip sip default-call-routing switchboard
60000CRG0-35B
1034
Default Values
By default, the local loopback address is the host in the Alert-Info header (127.0.0.1).
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example sets the Alert-Info header to use a specific URL as shown in the sample header below: (config)#ip sip grammar alert-info url www.notused.com Sample header: Alert-Info:<http://www.notused.com>;info=alert-internal
60000CRG0-35B
1035
ip sip grammar
Use the ip sip grammar command to populate privacy lists, indicating how caller ID is handled. Use the no form of this command to return to the default setting. Variations of this command include:
ip sip grammar default-privacy critical ip sip grammar default-privacy header ip sip grammar default-privacy none ip sip grammar default-privacy session ip sip grammar default-privacy user ip sip grammar restricted-privacy critical ip sip grammar restricted-privacy header ip sip grammar restricted-privacy none ip sip grammar restricted-privacy session ip sip grammar restricted-privacy user
Syntax Description
default-privacy restricted-privacy critical header none session user Specifies entries into the default-privacy list for unrestricted caller ID calls. Specifies entries into the restricted-privacy list for restricted caller ID calls. Adds critical to the Privacy header format. At least one other entry must be added to the list when using this setting. Adds header to the Privacy header format. Adds none to the Privacy header format. No other entries can be added to the list when using this setting. Adds session to the Privacy header format. Adds user to the Privacy header format.
Default Values
By default, both privacy lists are empty.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example sets all calls to have session privacy: (config)#ip sip grammar default-privacy session
60000CRG0-35B
1036
Syntax Description
host user domain local sip-server domestic international <Txx> Specifies the Host field formatting. Specifies the User field formatting. Specifies the Domain for formatting the header. Specifies the Local IP for formatting the header. Specifies the SIP server for formatting the header. Sends the number as specified by the calling party. Sends the number with E.164 formatting. Optional. Indicates a two-digit trunk identifier (i.e., T01).
Default Values
By default, the host for formatting messages is sip-server. Also, the default for the user format is domestic.
Command History
Release 11.1 Release 13.1 Command was introduced. Command was expanded to include the domestic and international formats for the From User header.
Functional Notes
Omitting the trunk option when issuing the ip sip grammar from user command specifies the User header globally.
Usage Examples
The following example sets the From header format to use a local IP: (config)#ip sip grammar from host local
60000CRG0-35B
1037
The following example sets the From header format to use calling party format on trunk T02: (config)#ip sip grammar from user domestic T02
Technology Review
This technology review provides information about the E.164 recommendation for International numbering plans and telephone number formats. A fully specified telephone number can have a maximum of 15 digits, including country code, area code, and the subscribers number. These numbers usually consist of a + prefix. E.164 numbers exclude dialing prefixes. The most familiar prefixes are international direct dialing (IDD) and national direct dialing (NDD). In countries other than the USA, the IDD and NDD are represented by different numbers. Additionally, E.123 describes the use of + to indicate a fully specified international number. The + is used in SIP headers to provide consistency across national and international phone calls. AOS products provide support for E.164 by being able to specify a country code and an IDD prefix. National format telephone numbers are converted to international format by prefixing them with + and the country code. On outbound international calls, + is substituted for the IDD. On incoming international calls, the + is removed. If the country code matches the configured value, it too is removed.
Setting the From header to international will cause phone numbers to be formatted as indicated by E.164. The country code must be configured, and the number must be of type national for this feature to work successfully.
60000CRG0-35B
1038
Syntax Description
domain local sip-server Specifies the domain host for formatting the header. Specifies the local IP as host for formatting the header. Specifies the SIP server as host for formatting the header.
Default Values
By default, the host for formatting messages is sip-server.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example sets the p-asserted-identity to use a local IP: (config)#ip sip grammar p-asserted-identity host local
60000CRG0-35B
1039
Default Values
By default, this feature is disabled.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example allows a proxy-require header to be added to packets containing a privacy header: (config)#ip sip grammar proxy-require privacy
60000CRG0-35B
1040
Syntax Description
host domain host sip-server host-resolve Specifies the domain for formatting the header. Specifies the SIP server IP for formatting the header. Enables the local unit to resolve the domain before resolving the request URI.
Default Values
By default, the host for formatting messages is the SIP server. Also by default, host-resolve is disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example enables IP SIP messages to resolve the request URI from the host domain: (config)#ip sip grammar request-uri host domain The following example enables IP SIP messages to resolve the request URI from the local unit: (config)#ip sip grammar request-uri host-resolve
60000CRG0-35B
1041
Default Values
By default, ip sip grammar require 100rel is disabled.
Command History
Release 15.1 Command was introduced.
Functional Notes
This command enables or disables the sending of reliable provisional responses to clients that support 100rel. Reliable provisional responses will always be sent to clients that require 100rel even with ip sip grammar require 100rel disabled.
Usage Examples
The following example enables ip sip grammar require 100rel: (config)#ip sip grammar require 100rel
Technology Review
There are two Require headers that may use the 100rel tag, one in the initial request, and one in the provisional response. The user agent client (UAC) is used to initiate SIP requests. When the UAC creates a new request, it can require reliable provisional responses for that request by adding the option tag 100rel to the Require header of that request. The user agent server (UAS) contacts the user when SIP requests are received, and returns responses on behalf of the user, using provisional responses for request progress information. Provisional responses (100 to 199) are transmitted on a best-effort basis. By using reliable provisional responses, responses are sent by the UAS until they are acknowledged as received. This is especially beneficial when sending provisional responses over an unreliable transport, such as User Datagram Protocol (UDP). The UAS must send any non-100 provisional responses reliably if the initial request contained a Require header field with the option tag 100rel. If the UAS is unwilling to do so, it must reject the initial request with a Bad Extension message and include an Unsupported header field containing the option tag 100rel. If the client supports 100rel, the UAS has the option of sending provisional responses with or without the Require 100rel tag as instructed by the ip sip grammar require 100rel command.
60000CRG0-35B
1042
Default Values
By default, ip sip grammar supported 100rel is disabled.
Command History
Release 14.1 Command was introduced.
Usage Examples
The following example enables ip sip grammar supported 100rel: (config)#ip sip grammar supported 100rel
60000CRG0-35B
1043
Syntax Description
domain sip-server Specifies the domain for formatting the header. Specifies the SIP server for formatting the header.
Default Values
By default, the host for formatting messages is the SIP server.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the To header format to use a domain host: (config)#ip sip grammar to host domain
60000CRG0-35B
1044
Syntax Description
<word> default none Specifies a word as a user-defined value to replace the default UA value. Maximum 128 letters. Returns the UA header field value to the default value. Disables the UA header field resulting in no UA header sent in SIP messages.
Default Values
By default, the UA value is set to the default value of the product.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example removes the UA header field from SIP messages: (config)#ip sip grammar user-agent none
60000CRG0-35B
1045
ip sip inbound-trunk-matching
Use the ip sip inbound-trunk-matching command to enable and configure inbound trunk matching. Use the no form of this command to return to the default settings. Variations of this command include:
ip sip inbound-trunk-matching default-trunk <Txx> ip sip inbound-trunk-matching prefer trunk-routing ip sip inbound-trunk-matching require-registration
Syntax Description
default-trunk <Txx> prefer trunk-routing require-registration Specifies a trunk to use when matching fails. The trunk is specified in the format Txx (e.g., T01). Specifies that trunk matches are preferred over users. Indicates that the request uniform resource identifier (URI) user is required to be registered on a trunk.
Default Values
By default, there is no default trunk set and the require-registration option is disabled.
Command History
Release A2.03 Release A4.01 Command was introduced. Command was expanded to include the prefer trunk-routing parameter.
Usage Examples
The following example configures AOS to require registration for inbound trunk matching: (config)#ip sip inbound-trunk-matching require-registration
60000CRG0-35B
1046
ip sip location
Use the ip sip location command to manually add a Session Initiation Protocol (SIP) user agent (UA) to the location database. Use the no form of this command to disable this feature. Variations of this command include:
ip sip location <username> <ip address> ip sip location <username> <ip address> <port> ip sip location <username> <ip address> <port> tcp ip sip location <username> <ip address> <port> tcp <number> ip sip location <username> <ip address> <port> udp ip sip location <username> <ip address> <port> udp <number>
Syntax Description
<username> <ip address> Specifies the user name for the UA being added to the location database. Specifies the IP address for the UA being added to the location database. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the port of the UA to add to the database. If no port is specified, default port is 5060. Optional. Specifies the use of Transmission Control Protocol (TCP) for session communication. Optional. Specifies the use of User Datagram Protocol (UDP) for session communication. Optional. Specifies the time in seconds that a user is stored in the database. Range from 0 to 36000. If no time is specified, default time is zero seconds.
Default Values
By default, this command is disabled.
Command History
Release 11.1 Release 15.1 Command was introduced. Command was expanded to include a choice of transport protocols and expiration time.
Usage Examples
The following example specifies an IP SIP location of 192.33.5.99 for a user named 2001: (config)#ip sip location 2001 192.33.5.99
60000CRG0-35B
1047
ip sip privacy
Use the ip sip privacy command to specify outbound calls to include privacy headers (when configured) and inbound calls to be filtered on privacy settings. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, IP Session Initiation Protocol (SIP) privacy is disabled.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example enables IP SIP privacy: (config)#ip sip privacy
60000CRG0-35B
1048
ip sip proxy
Use the ip sip proxy command to enable Stateful and Outbound modes of Session Initiation Protocol (SIP) proxy operation at the global level. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this feature is disabled.
Command History
Release 16.1 Command was introduced.
Functional Notes
Although the ip sip proxy command enables Stateful and Outbound modes of SIP proxy operation, it is also necessary to use this command in conjunction with the ip sip proxy transparent command for transparent proxy mode. For more information about transparent proxy, refer to the command ip sip proxy transparent on page 1070. For more information about SIP proxy, refer to the Configuring SIP Proxy in AOS configuration guide available online at http://kb.adtran.com (article number 2183).
Usage Examples
The following example allows the SIP proxy server to operate in the Stateful and Outbound modes: (config)#ip sip proxy
60000CRG0-35B
1049
Default Values
By default, SIP traffic to any server is allowed in Transparent and Outbound proxy modes. This means that if no server is specified, traffic to any server is permitted, but if this command is entered, only traffic to the configured servers is allowed.
Command History
Release 16.1 Command was introduced.
Functional Notes
The ip sip proxy allowed-servers command can be entered multiple times to allow traffic to multiple servers.
Usage Examples
The following example adds the server with an IP address of 10.200.1.9 as an allowed SIP proxy server: (config)#ip sip proxy allowed-servers 10.200.1.9
60000CRG0-35B
1050
Syntax Description
request-uri to Specifies the Request-URI user field as the dial-string source. Specifies the To header as the dial-string source.
Default Values
By default, the dial-string source is set to request-uri.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the To header as the dial-string source: (config)#ip sip proxy dial-string source to
60000CRG0-35B
1051
Default Values
By default, ip sip proxy domain is not configured.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example specifies Sample as the SIP proxy domain string: (config)#ip sip proxy domain Sample
60000CRG0-35B
1052
Syntax Description
local proxy accept <template> reject <template> Specifies that all emergency calls are routed directly through the switchboard. Specifies that all emergency calls are routed through the proxy before sending them to the switchboard. Specifies that calls matching the template are accepted as emergency calls. Specifies that calls matching the template are rejected as emergency calls.
Default Values
By default, the SIP proxy is set to send all emergency calls directly through the switchboard (the local parameter). By default, no emergency number templates or patterns are configured in the system; therefore, no calls are classified as emergency calls.
Command History
Release 16.1 Command was introduced.
Functional Notes
Before specifying which calls are defined as emergency calls, you should configure the method used for routing emergency calls (using the ip sip proxy emergency-call-routing local or ip sip proxy emergency-call-routing proxy commands). For the default emergency call routing method (local) to function on AOS data products, a local SIP gateway must be configured using the command ip sip proxy local-gateway <hostname | ip address> on page 1066. On AOS voice products, the local SIP gateway is enabled by default. After the emergency call routing method has been specified, emergency calls must be defined for emergency call routing to perform any action. Emergency call definitions are configured using the ip sip proxy emergency-call routing accept <template> and ip sip proxy emergency-call-routing reject <template> commands.
60000CRG0-35B
1053
Command Reference Guide Valid characters for accept and reject templates are as follows: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: 1) 555-81XX matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) NXX-XXXX matches 7 digit local. 4) 1-NXX-NXX-XXXX matches long distance calls in North America.
Usage Examples
The following example enables SIP proxy emergency call routing on an AOS voice product and specifies the routing method as proxy: (config)#ip sip proxy emergency-call-routing proxy The following example specifies a local SIP gateway and enables SIP proxy emergency call routing on an AOS data product: (config)#ip sip proxy local-gateway 10.19.209.55 (config)#ip sip proxy emergency-call-routing local The following example specifies that 911 calls are accepted as emergency calls on an AOS voice product: (config)#ip sip proxy emergency-call-routing proxy (config)#ip sip proxy emergency-call-routing accept 911 The following example specifies that 911 calls are accepted as emergency calls on an AOS data product: (config)#ip sip proxy local-gateway 10.19.209.55 (config)#ip sip proxy emergency-call-routing local (config)#ip sip proxy emergency-call-routing accept 911
60000CRG0-35B
1054
Default Values
By default, this feature is disabled.
Command History
Release A2.03 Command was introduced.
Usage Examples
The following example enables the server to accept registration during failover conditions: (config)#ip sip proxy failover accept-registrations
60000CRG0-35B
1055
Default Values
By default, no CODEC list is configured or applied.
Command History
Release 16.1 Command was introduced.
Functional Notes
The ip sip proxy failover codec-group command is available on AOS voice products only. This command is not available on AOS data products. For more information regarding CODEC list configuration, refer to the Voice CODEC List Command Set on page 3359. For more information regarding SIP proxy configuration, refer to the Configuring SIP Proxy in AOS configuration guide available online at http://kb.adtran.com (article number 2183).
Usage Examples
The following example enables the CODEC list named List1 during failover: (config)#ip sip proxy failover codec-group List1
60000CRG0-35B
1056
Syntax Description
request-uri to Specifies the Request-URI user field as the dial-string source. Specifies the To header as the dial-string source.
Default Values
By default, the dial-string source is request-uri.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example specifies using the To header for the dial-string source: (config)#ip sip proxy failover dial-string source to
60000CRG0-35B
1057
Default Values
By default, there are not match-alias substitutions defined.
Command History
Release A4.05 Command was introduced.
Functional Notes
SIP proxy failover occurs using an automatically created trunk contained in AOSs basic configuration. This trunk is a hidden SIP trunk with the same default settings as a regular SIP trunk. For more information about configuring SIP proxy failover, refer to the Configuring SIP Proxy in AOS configuration guide available online at http://kb.adtran.com (article number 2183). Both the match-alias <pattern> and the substitute <pattern> parameters can be defined using traditional number matching and regular expression matching methods. Traditional number matching uses numbers and wildcard variables to enter a pattern. Available characters are as follows: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit 0 to 9. N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
1058
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: 1) 555-81XX matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) NXX-XXXX matches 7 digit local. 4) 1-NXX-NXX-XXXX matches long distance calls in North America. In regular expressions number matching, the match strings are encapsulated by paired / (slash) symbols. This indicates that the pattern is to be treated as a regular expression. Using regular expressions allows greater flexibility in matching multiple number templates with fewer expressions.
AOS is compatible with Perl compatible regular expressions (PCREs). More information on understanding and using regular expressions is available at http://www.pcre.org.
The use of quotation marks in a command syntax, when entering a string is not necessary unless the string requires using a space or ?. Using either of these characters outside of quotation marks is interpreted by the CLI as commands and not recognized as part of the string. The use of quotation marks in the following examples are provided to cover all possible user-entered strings. These examples can be entered without the quotation marks and function in the same manner. Usage Examples
The following example uses the traditional number matching method to match a 7-digit number beginning with 555 and replace it with 5551111: (config)#ip sip proxy failover match-alias 555XXXX substitute 5551111 The following example uses the regular expression number matching method to match a 7-digit number beginning with 555 and replace it with 5551111: (config)#ip sip proxy failover match-alias /555\d{4}/ substitute 5551111
60000CRG0-35B
1059
Default Values
By default, the number of match-digits is not specified.
Command History
Release 16.1 Command was introduced.
Functional Notes
The ip sip proxy failover match-digits command can be entered multiple times. Session Initiation Protocol (SIP) proxy failover occurs using an automatically created trunk contained in AOSs basic configuration. This trunk is a hidden SIP trunk with the same default settings as a regular SIP trunk. For more information about configuring SIP proxy failover, refer to the Configuring SIP Proxy in AOS configuration guide available online at http://kb.adtran.com (article number 2183).
Usage Examples
The following example sets the ip sip proxy failover match-digits to 7: (config)#ip sip proxy failover match-digits 7
60000CRG0-35B
1060
Syntax Description
<value> info options Specifies the amount of time in seconds between keep-alive messages sent during a call. The range is 30 to 3600 seconds. Specifies using the INFO keep-alive method on this trunk. Specifies using the OPTIONS keep-alive method on this trunk.
Default Values
By default, this command is not configured.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables the INFO method to be used as the SIP keep-alive method with the timeout between messages set to 3 minutes: (config)#ip sip proxy failover sip-keep-alive info 180
60000CRG0-35B
1061
Syntax Description
p-asserted-identity-required Specifies that P-Asserted-Identity is required for this domain.
Default Values
By default, this command is disabled.
Command History
Release 16.1 Command was introduced.
Functional Notes
The ip sip proxy failover trust-domain command allows the AOS unit to look at any P-Asserted-Identity header the phones might send while the AOS device is in failover mode. The p-asserted-identity-required parameter is only used with nonstandard softswitches and should not be used in normal configurations.
Usage Examples
The following example specifies that P-Asserted-Identity is enabled: (config)#ip sip proxy failover trust-domain
60000CRG0-35B
1062
This command has a very limited application and only applies to very specific network configurations. If you are not familiar with its usage, contact ADTRAN Technical Support for assistance. Syntax Description
exclude-via Indicates excluding the Via header from port translation.
Default Values
By default, this feature is disabled.
Command History
Release 17.9 Release A2.07 Command was introduced for AOS data products. Command was included for AOS voice products.
Functional Notes
Enabling force-port-translation allows the SIP Proxy to create a unique registration in the user database for the same user from multiple phones. This feature retains the key generated by the proxy and inserted into the user portion of the Contact header. It also uses the source port that is generated by the firewall when doing NAT. The source port is inserted at the end of the host portion of any address translated in the SIP header. Enabling the exclude-via parameter on this command, excludes the Via header from the source port translation.
Usage Examples
The following example enables force-port-translation: (config)#ip sip proxy force-port-translation
60000CRG0-35B
1063
Syntax Description
expires param-conversion non-invite domain-undo from request-uri to host domain sip-server Enables conversion of Expires parameters to Expires headers. Enables translation of domain address to proxy address for inbound stateful requests. Configures grammar for the From header. Configures grammar for the Request URI header. Configures grammar for the To header. Configures the host portion of the specified header. Specifies using the configured domain string in the specified header. Specifies using the resolved SIP server address in the specified header.
Default Values
By default, ip sip proxy grammar for all option headers is sip-server.
Command History
Release 16.1 Release 17.3 Release A2 Command was introduced. Command was expanded to include the Expires header option. Command was expanded to include the Non-Invite header option.
Usage Examples
The following example configures the To header using the configured SIP proxy domain string: (config)#ip sip proxy grammar to host domain
60000CRG0-35B
1064
Syntax Description
<hostname | ip address> Specifies the host name or IP address of the local SIP proxy gateway. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Configures the gateway to use Transmission Control Protocol (TCP). Optional. Configures the gateway to use User Datagram Protocol (UDP). Optional. Specifies the TCP or UDP port used by the gateway. Range is 1 to 65535.
Default Values
By default, the ip sip proxy local-gateway is not configured. When configured, the default protocol is udp on port 5060. If a particular protocol is configured and no port is specified, the default port is set to 5060.
Command History
Release 17.3 Command was introduced.
Functional Notes
The ip sip proxy local-gateway command enables the necessary local SIP gateway in AOS data products. This gateway is necessary for routing emergency calls when using SIP proxy. On AOS voice products, the local gateway is enabled by default.
Usage Examples
The following example sets the local gateway: (config)#ip sip proxy local-gateway serviceprovider@network.com
60000CRG0-35B
1065
Default Values
By default, this feature is disabled.
Command History
Release A2.03 Command was introduced.
Usage Examples
The following example modifies the Contact comparison settings to make strict comparisons of Contact headers during routing: (config)#ip sip proxy routing contact-comparison strict
60000CRG0-35B
1066
Syntax Description
<hostname | ip address> Specifies the fully qualified domain name (FQDN) or IP address of the outbound SIP proxy server. IP addresses should be expressed in dotted decimal notation (for example, 208.61.209.1). Optional. Configures the softswitch to use Transmission Control Protocol (TCP). Optional. Configures the softswitch to use User Datagram Protocol (UDP). Optional. Specifies the TCP or UDP port used by the softswitch. Range is 1 to 65535.
Default Values
By default, no softswitches are configured. If a softswitch is configured, the default protocol is UDP on port 5060. If a particular protocol is configured and no port is specified, the default port is set to 5060.
Command History
Release 16.1 Command was introduced.
Functional Notes
The guidelines for configuring the softswitch(es) depend on the mode of operation selected. Softswitch configuration is always needed for Stateful mode. It is only needed for Outbound mode and Transparent mode when the SIP Request does not contain any fields that can be resolved to the softswitchs location. If a host name is used to specify the outbound SIP proxy server, a domain naming system (DNS) server must be configured on the AOS unit using the command ip name-server on page 983 or learned via a dynamic IP interface.
Usage Examples
The following example sets the primary softswitch: (config)#ip sip proxy sip-server primary 208.61.209.1
60000CRG0-35B
1067
Syntax Description
<hostname | ip address> Specifies the fully qualified domain name (FQDN) or IP address of the outbound SIP proxy server. IP addresses should be expressed in dotted decimal notation (for example, 208.61.209.2). Optional. Configures the softswitch to use Transmission Control Protocol (TCP). Optional. Configures the softswitch to use User Datagram Protocol (UDP). Optional. Specifies the TCP or UDP port used by the softswitch. Range is 1 to 65535.
Default Values
By default, no softswitches are configured. If a softswitch is configured, the default protocol is UDP on port 5060. If a particular protocol is configured and no port is specified, the default port is set to 5060.
Command History
Release 16.1 Command was introduced.
Functional Notes
The guidelines for configuring the softswitch(es) depend on the mode of operation selected. Softswitch configuration is always needed for Stateful mode. It is only needed for Outbound mode and Transparent mode when the SIP Request does not contain any fields that can be resolved to the softswitchs location. When disabling softswitches, all secondary softswitches must be removed before the primary softswitch can be removed. If a host name is used to specify the outbound SIP proxy server, a domain naming system (DNS) server must be configured on the AOS unit using the command ip name-server on page 983 or learned via a dynamic IP interface.
Usage Examples
The following example sets the secondary softswitch: (config)#ip sip proxy sip-server secondary 208.61.209.2
60000CRG0-35B
1068
Syntax Description
nat-simulate Optional. Specifies the network address translation (NAT) simulation.
Default Values
By default, this feature is disabled.
Command History
Release 16.1 Release A1 Command was introduced. Command was expanded to include the NAT simulation.
Functional Notes
For an AOS product to use SIP proxy in transparent mode, SIP proxy must be enabled. To enable SIP proxy, enter the ip sip proxy command before entering the ip sip proxy transparent command. For an AOS data product to use SIP proxy in transparent mode, the firewall SIP application layer gateway (ALG) must be disabled. For more information on disabling the firewall SIP ALG, refer to the command ip firewall alg on page 926. For more information on the operation and configuration of SIP proxy in transparent mode, refer to the the Configuring SIP Proxy in AOS configuration guide available online at http://kb.adtran.com (article number 2183).
Usage Examples
The following example enables SIP proxy to operate in transparent mode on an AOS voice product: (config)#ip sip proxy (config)#ip sip proxy transparent The following example enables SIP proxy to operate in transparent mode on an AOS data product: (config)#no ip firewall alg sip (config)#ip sip proxy (config)#ip sip proxy transparent
60000CRG0-35B
1069
Default Values
By default, this feature is disabled.
Command History
Release A4.01 Command was introduced.
Functional Notes
Additional information is available in the following sections of this guide: For more information about SIP proxy, refer to the command ip sip proxy on page 1050. For more information about transparent proxy, refer to the command ip sip proxy transparent on page 1070. For more information about SIP proxy, refer to the configuration guide Configuring SIP Proxy in AOS (article number 2183) available online at http://kb.adtran.com.
Usage Examples
The following example creates a proxy user template named Set1 and enters the proxy user template configuration mode: (config)#ip sip proxy user-template Set1 (config-template-Set1)#
60000CRG0-35B
1070
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example sets the DSCP value to 63: (config)#ip sip qos dscp 63
60000CRG0-35B
1071
ip sip registrar
Use the ip sip registrar command to configure the Session Initiation Protocol (SIP) registrar server used for registering user agents (UAs) into the location database. For more details on SIP operation, refer to the Technology Review section of the command ip firewall alg on page 926. Use the no form of the ip sip registrar command to disable the registrar server. Variations of this command include:
ip sip registrar ip sip registrar authenticate ip sip registrar default-expires <value> ip sip registrar max-expires <value> ip sip registrar min-expires <value> ip sip registrar realm <string>
Syntax Description
authenticate default-expires <value> Specifies that authentication is required for each UA during registration. Specifies the default expiration period for the UA listing in the location database. UAs requesting registration without specifying an expiration period are given this default expiration period. Range is 0 to 2592000 seconds. Specifies the maximum expiration period for the UA listing in the location database. All UAs registering with the SIP proxy server request an expiration period for the listing in the database. UAs requesting an expiration period between the max-expires and min-expires values are honored. Range is 0 to 2592000 seconds. Specifies the minimum expiration period for the UA listing in the location database. All UAs registering with the SIP proxy server request an expiration period for the listing in the database. UAs requesting an expiration period between the max-expires and min-expires values are honored. Range is 0 to 2592000 seconds. Specifies a realm (using an ASCII character string) for the UA listing in the location database.
max-expires <value>
min-expires <value>
realm <string>
Default Values
By default, the registrar server is disabled.
Command History
Release 11.1 Command was introduced.
60000CRG0-35B
1072
Usage Examples
The following example sets the default expiration to 5 seconds: (config)#ip sip registrar default-expires 5 The following example sets the realm string: (config)#ip sip registrar realm voice.adtran.com
60000CRG0-35B
1073
ip sip timer
Use the ip sip timer command to configure the Session Initiation Protocol (SIP) internal T1 and T2 timers (in milliseconds). Use the no form of this command to return to the default value. Variations of this command include:
ip sip timer T1 <value> ip sip timer T2 <value>
Syntax Description
T1 T2 <value> Specifies the T1 timer. Specifies the T2 timer. Specifies time in milliseconds. Range for T1 is 50 to 1000 milliseconds, and for T2 is 1000 to 32000 milliseconds.
Default Values
By default, the T1 timer is set to 500 milliseconds, and the T2 timer is set to 4000 milliseconds.
Command History
Release 13.1 Command was introduced.
Functional Notes
T1 is an estimate of network round trip time (RTT), and is used as the initial invite message retransmit interval. Several SIP internal timers are derived from T1. T2 is the maximum retransmit interval for non-invite requests and invite responses.
Usage Examples
The following example configures the T1 timer to 1000 milliseconds: (config)#ip sip timer T1 1000
60000CRG0-35B
1074
Default Values
By default, the registration-failure-retry timer is set to 60 seconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example allows a retry attempt to begin after 32 seconds: (config)#ip sip timer registration-failure-retry 32
60000CRG0-35B
1075
Default Values
By default, the rollover timer is set to 3 seconds.
Command History
Release 11.1 Command was introduced.
Functional Notes
The ip sip timer rollover command sets the SIP timer B value for Invite transactions originating from a SIP trunk. When originating a call, the SIP trunk attempts to send Invite messages to the primary SIP server and waits for a response. If there is no response, the SIP trunk waits for 0.5 seconds before attempting to send another Invite to the same SIP server. If no response, the SIP trunk waits for 1 second before attempting to send another Invite, then waits 2 seconds, and so on. These increasing intervals are shown in the diagram below.
The rollover timer allows the user to control how long to wait before trying the next server. In the diagram above, the red line indicates the rollover timer expiration. If there is no response after the timer expires, the SIP trunk will attempt to send Invite messages to the highest priority backup SIP server obtained via DNS service (SRV). The SIP trunk starts over at T=0 with the next server and doesn't send any more messages to the timed out server. As long as the SIP trunk does not receive a response, it will continue this cycle until it has attempted to contact all the SIP servers.
60000CRG0-35B
1076
Usage Examples
The following example allows connection attempts to continue for up to 32 seconds before rolling over to another destination: (config)#ip sip timer rollover 32
60000CRG0-35B
1077
Default Values
By default, fast termination of SIP transaction is disabled.
Command History
Release A2 Command was introduced.
Usage Examples
The following example enables fast termination: (config)#ip sip transaction fast-terminate
60000CRG0-35B
1078
ip sip trunk-auth-name-source
Use the ip sip trunk-auth-name-source command to configure the authentication name source for the Session Initiation Protocol (SIP) trunks. Use the no form of this command to return to the default setting. Variations of this command include:
ip sip trunk-auth-name-source account-id ip sip trunk-auth-name-source message
Syntax Description
account-id message Specifies using the corresponding account ID. Specifies using the To or From user when selecting the authentication name and password.
Default Values
By default, the trunk authentication name source is message.
Command History
Release A2.03 Command was introduced.
Usage Examples
The following example configures the trunk authentication name source to use the account ID: (config)#ip sip trunk-auth-name-source account-id
60000CRG0-35B
1079
ip snmp agent
Use the ip snmp agent command to enable the Simple Network Management Protocol (SNMP) agent. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, the SNMP agent is disabled.
Command History
Release 1.1 Command was introduced.
Functional Notes
Allows a MIB browser to access standard MIBs within the product. This also allows the product to send traps to a trap management station.
Usage Examples
The following example enables the IP SNMP agent: (config)#ip snmp agent
60000CRG0-35B
1080
ip sntp server
Use the ip sntp server command to enable the Simple Network Time Protocol (SNTP) server. This allows the unit to accept SNTP requests. Use the no form of this command to disable the server. Syntax Description
No subcommands.
Default Values
By default, the SNTP server is disabled.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example enables the SNTP server: (config)#ip sntp server
60000CRG0-35B
1081
Default Values
By default, this feature is disabled.
Command History
Release 14.1 Command was introduced.
Usage Examples
The following example enables the device to send the system clock time regardless of synchronized status with the sntp server: (config)#ip sntp server send-unsynced
60000CRG0-35B
1082
Default Values
By default, no SNTP server source interface is defined.
Command History
Release 6.1 Release 14.1 Release 16.1 Command was introduced. Command was expanded to include the tunnel interface. Command was expanded to include the bridged virtual interface (BVI), Frame Relay, high level data link control (HDLC), and Point-to-Point Protocol (PPP) interfaces. Command was expanded to include the asynchronous transfer mode (ATM) interface. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
This command allows you to override the sender field in the IP packet. If you have multiple interfaces in your unit, changing the sender tells the receiver where to send replies. This functionality can also be used to allow packets to get through firewalls that would normally block the flow.
Usage Examples
The following example configures the unit to use the loopback 1 interface as the source IP for SNTP traffic: (config)#ip sntp server source-interface loopback 1
60000CRG0-35B
1083
Default Values
By default, no SNTP source interface is defined.
Command History
Release 6.1 Release 14.1 Release 16.1 Command was introduced. Command was expanded to include the tunnel interface. Command was expanded to include the bridged virtual interface (BVI), Frame Relay, high level data link control (HDLC), and Point-to-Point Protocol (PPP) interfaces. Command was expanded to include the asynchronous transfer mode (ATM) interface. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
This command allows you to override the sender field in the IP packet. If you have multiple interfaces in your unit, changing the sender tells the receiver where to send replies. This functionality can also be used to allow packets to get through firewalls that would normally block the flow.
Usage Examples
The following example configures the unit to use the loopback 1 interface as the source IP for SNTP traffic: (config)#ip sntp source-interface loopback 1
60000CRG0-35B
1084
ip subnet-zero
The ip subnet-zero command is the default operation and cannot be disabled. This command signifies the routers ability to route to subnet-zero subnets. Syntax Description
No subcommands.
Default Values
By default, this command is enabled.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example subnet-zero is enabled: (config)#ip subnet-zero
60000CRG0-35B
1085
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 14.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the tunnel interface. Command was expanded to include the asynchronous transfer mode (ATM) interface. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
This command allows you to override the sender field in the IP packet. If you have multiple interfaces in your unit, changing the sender tells the receiver where to send replies. This functionality can also be used to allow packets to get through firewalls that would normally block the flow.
Usage Examples
The following example configures the unit to use the loopback 1 interface as the source IP for TACACS+ traffic: (config)#ip tacacs source-interface loopback 1
60000CRG0-35B
1086
ip tftp server
Use the ip tftp server command to enable the Trivial File Transfer Protocol (TFTP) server. The default-filesystem parameter specifies the default location for the TFTP server to retrieve and store files. Use the no form of this command to disable the TFTP server. Variations of this command include:
ip tftp server ip tftp server access-class <name> in ip tftp server overwrite ip tftp server default-filesystem cflash ip tftp server default-filesystem flash
Syntax Description
access-class <name> in overwrite default-filesystem cflash default-filesystem flash Controls access to the internal TFTP server using the specified access control list (ACL). Enables the TFTP server to overwrite existing files. Optional. Specifies that the TFTP server use CompactFlash as the default file system. Optional. Specifies that the TFTP server use flash as the default file system.
Default Values
By default, this command is disabled.
Command History
Release 9.3 Release 13.1 Release 17.3 Command was introduced. Command was expanded to include the overwrite feature. Command was expanded to include the default-filesystem parameter.
Usage Examples
The following example enables the TFTP server: (config)#ip tftp server The following example allows self-bound TFTP incoming connections. In this example, classname is the name of the access class: (config)#ip tftp server access-class classname in The following example specifies cflash file system as the default: (config)#ip tftp server default-filesystem cflash
60000CRG0-35B
1087
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 14.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the tunnel interface. Command was expanded to include the asynchronous transfer mode (ATM) interface. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
This command allows you to override the sender field in the IP packet. If you have multiple interfaces in your unit, changing the sender tells the receiver where to send replies. This functionality can also be used to allow packets to get through firewalls that would normally block the flow.
Usage Examples
The following example configures the unit to use the loopback 1 interface as the source IP for TFTP traffic: (config)#ip tftp source-interface loopback 1
60000CRG0-35B
1088
Syntax Description
<name> Specifies the URL filter name.
Default Values
By default, no URL filters are configured.
Command History
Release 12.1 Command was introduced.
Functional Notes
The firewall must be enabled using the ip firewall command in order to use URL filters. The URL filter must be applied to the appropriate interface by using the ip urlfilter <name> [in | out] command. Refer to this command in the appropriate interface for more information.
Usage Examples
The following example creates the HTTP URL filter called MyFilter that can be applied to an interface for content filtering: (config)#ip urlfilter MyFilter http
60000CRG0-35B
1089
ip urlfilter allowmode
Use the ip urlfilter allowmode command to allow all uniform resource locator (URL) requests in cases when all URL filter servers are down. Use the no form of this command to block all URL requests when all URL filter servers are down. Syntax Description
No subcommands.
Default Values
By default, all URL requests will be blocked when all URL filter servers are down.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example permits all URL requests even when URL filter servers are down: (config)#ip urlfilter allowmode
60000CRG0-35B
1090
ip urlfilter exclusive-domain
Use the ip urlfilter exclusive-domain command to instruct AOS to always allow or always block a domain without first having to verify with the uniform resource locator (URL) filter server. Use the no form of this command to remove an exclusive domain. Variations of this command include:
ip urlfilter exclusive-domain deny <name> ip urlfilter exclusive-domain permit <name>
Syntax Description
deny <name> permit <name> Specifies that the domain name be blocked without verifying with the URL filter server. Specifies that the domain name be allowed without verifying with the URL filter server.
Default Values
By default, no exclusive domains are configured.
Command History
Release 12.1 Command was introduced.
Functional Notes
Domain matching is based on an exact match between the Hypertext Transfer Protocol (HTTP) header and entries in the ip urlfilter exclusive-domain command. In order to exactly match requests destined for a domain, entries should list all possible variations of the domain that would appear in the Host field of an HTTP header. Refer to the Usage Examples section of this command for more detailed information.
Usage Examples
The following example will always allow access to www.adtran.com and adtran.com without first having to verify the domain with the URL filter server: (config)#ip urlfilter exclusive-domain permit www.adtran.com (config)#ip urlfilter exclusive-domain permit adtran.com The following example will always block access to www.localnews.com without first having to verify the domain with the URL filter server: (config)#ip urlfilter exclusive-domain deny www.localnews.com
60000CRG0-35B
1091
Default Values
By default, the number of outstanding requests is 500.
Command History
Release 12.1 Command was introduced.
Functional Notes
After the maximum number of URL lookup requests is reached, the no ip urlfilter allowmode setting will be used to allow or block all following requests until enough URL lookup responses have been received from the URL filter server.
Usage Examples
The following example sets the maximum number of URL lookup requests to 250: (config)#ip urlfilter max-request 250
60000CRG0-35B
1092
Default Values
By default, the value of buffered responses is 100.
Command History
Release 12.1 Command was introduced.
Functional Notes
When a URL request comes through the unit and URL filtering is enabled, a lookup request is sent to the URL filter server and the Hypertext Transfer Protocol (HTTP) request is forwarded to the HTTP server at the same time. If the HTTP server responds before the URL filter server, the response must be buffered until the URL filter server responds with allow or block. Once the maximum number of buffered HTTP responses is reached, all following HTTP responses are dropped until some of the existing buffered responses are released. Buffered responses are released when the URL filter server sends a response, or when the firewall association times out.
Usage Examples
The following example sets the maximum number of buffered responses to 50: (config)#ip urlfilter max-response 50
60000CRG0-35B
1093
Syntax Description
<ip address> port <number> timeout <value> Specifies the server IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the server Transmission Control Protocol (TCP) port number that will receive requests. Specifies the number of seconds to wait for a response from the URL filtering server before determining that it is out of service. Range is 1 to 300 seconds.
Default Values
By default, there are no URL filtering servers configured. When configuring a URL filtering server, the port default is 15,868, and the timeout default is 5 seconds.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example identifies a URL filtering server at IP address 10.1.1.1 that listens for URL filtering requests on port 15,868 (default) and waits for a response for 10 seconds before determining that the filtering server is down: (config)#ip urlfilter server 10.1.1.1 timeout 10
60000CRG0-35B
1094
ip urlfilter top-website
Use the ip urlfilter top-website command to enable reporting of the websites most frequently requested on the system. Use the no form of this command to disable top websites reporting.
Syntax Description
No subcommands.
Default Values
By default, top websites reporting is disabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables top websites reporting: (config)#ip urlfilter top-website
60000CRG0-35B
1095
Default Values
No default values are necessary for this command.
Command History
Release 16.1 Command was introduced.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Once a nondefault VRF is created, it must be assigned to the appropriate interfaces. Use the voip name-service host on page 1331 to assign interfaces to the VRF. By default, interfaces are assigned to the default VRF. An interface can only be assigned to one VRF, but multiple interfaces can be assigned to the same VRF.
Usage Examples
The following example creates the VRF Red and assigns the route distinguisher 2:2: (config)#ip vrf RED route-distinguisher 2:2
60000CRG0-35B
1096
Syntax Description
<ipv6 acl name> Specifies the name of the IPv6 ACL.
Default Values
By default, all AOS security features are disabled, and there are no configured IPv6 ACLs.
Command History
Release 18.1 Command was introduced.
Functional Notes
This command only creates an empty extended IPv6 ACL, it does not configure it. For additional extended ACL configuration commands and configuration parameters, refer to the IPv4 Access Control List Command Set on page 2755.
Usage Examples
The following example creates an extended IPv6 ACL Allowv6 and enters the Extended ACL Configuration mode: (config)#ip access-list extended Allowv6 (config-ext6-nacl)#
Technology Review
IPv6 ACLs are used as packet selectors by different AOS IPv6 features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit ACL is used to match packets (meeting the specified pattern) to enter the router system. A deny ACL advances AOS to the next access policy entry. AOS provides two types of ACLs: standard and extended. Standard ACLs match based on the source of the packet. Extended ACLs match based on the source and destination of the packet. ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
60000CRG0-35B
1097
IPv6 ACLs cannot have the same name as IPv4 ACLs. If you are using both IPv4 and IPv6, you must have different ACLs for each IP version. VPN routing and forwarding (VRF) on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
60000CRG0-35B
1098
Syntax Description
<ipv6 acl name> Specifies the name of the IPv6 ACL.
Default Values
By default, all AOS security features are disabled, and there are no configured IPv6 ACLs.
Command History
Release 18.1 Command was introduced.
Functional Notes
This command only creates an empty standard IPv6 ACL, it does not configure it. For additional standard IPv6 ACL configuration commands and configuration parameters, refer to the IPv6 Access Control Policy Command Set on page 2821.
Usage Examples
The following example creates a standard IPv6 ACL Allowv6 and enters the Standard ACL Configuration mode: (config)#ipv6 access-list standard Allowv6 (config-std6-nacl)#
Technology Review
IPv6 ACLs are used as packet selectors by different IPv6 AOS features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit ACL is used to match packets (meeting the specified pattern) to enter the router system. A deny ACL advances AOS to the next access policy entry. AOS provides two types of ACLs: standard and extended. Standard ACLs match based on the source of the packet. Extended ACLs match based on the source and destination of the packet. ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
60000CRG0-35B
1099
IPv6 ACLs cannot have the same name as IPv4 ACLs. If you are using both IPv4 and IPv6, you must have different ACLs for each IP version. VPN routing and forwarding (VRF) on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
60000CRG0-35B
1100
ipv6 firewall
Use the ipv6 firewall command to enable AOS Internet Protocol version 6 (IPv6) security features, including IPv6 access control policies (ACPs) and lists (ACLs) and the stateful inspection firewall. Use the no form of this command to disable the IPv6 security functionality. Variations of this command include:
ipv6 firewall ipv6 firewall vrf <name>
Disabling the AOS IPv6 security features (using the no ipv6 firewall command) does not affect security configuration. All configuration parameters will remain intact, but no security data processing will be attempted. Syntax Description
vrf <name> Optional. Enables or disables the IPv6 firewall for a specific VPN routing and forwarding (VRF) instance.
Default Values
By default, all AOS IPv6 security features are disabled.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example enables the AOS IPv6 security features: (config)#ipv6 firewall
60000CRG0-35B
1101
The AOS IPv6 firewall must be enabled (using the command ipv6 firewall on page 1102) for the stateful inspection firewall to be activated.
Syntax Description
<number> vrf <name> Specifies the number of possible attack conditions AOS IPv6 will identify before generating a log message. Valid range is 0 to 4294967295. Optional. Specifies a VPN routing and forwarding (VRF) instance to monitor. If no VRF is specified, the default VRF is monitored.
Default Values
By default, the ipv6 firewall attack-log threshold is set at 100.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example specifies a threshold of 25 attacks before generating a log message for the IPv6 firewall: (config)#ipv6 firewall attack-log threshold 25
60000CRG0-35B
1102
The AOS IPv6 firewall must be enabled (using the command ipv6 firewall on page 1102) for the stateful inspection firewall to be activated.
Syntax Description
vrf <name> Optional. Specifies a VPN routing and forwarding (VRF) instance on which to drop IPv6 packets with duplicate options headers. If no VRF is specified, the packets on the default VRF are dropped.
Default Values
By default, this feature is enabled.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example specifies that IPv6 packets with duplicate options headers are dropped on the default VRF: (config)#ipv6 firewall check duplicate-options
60000CRG0-35B
1103
The AOS IPv6 firewall must be enabled (using the command ipv6 firewall on page 1102) for the stateful inspection firewall to be activated.
Syntax Description
vrf <name> Optional. Specifies a VPN routing and forwarding (VRF) instance to configure. If no VRF is specified, the default VRF is configured.
Default Values
By default, this feature is enabled.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example specifies that IPv6 packets with out-of-order headers are dropped on the default VRF: (config)#ipv6 firewall check header-order
60000CRG0-35B
1104
The AOS IPv6 firewall must be enabled (using the command ipv6 firewall on page 1102) for the stateful inspection firewall to be activated.
Syntax Description
<value> vrf <name> Specifies the packet size in octets. Valid range is 56 to 1280 octets. Optional. Specifies a VPN routing and forwarding (VRF) instance to configure. If no VRF is specified, the default VRF is configured.
Default Values
By default, the IPv6 packet fragment size is set to 640 octets.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example changes the smallest permitted size for IPv6 packet fragments on the default VRF to 800 octets: (config)#ipv6 firewall check min-fragment-size 800
60000CRG0-35B
1105
The AOS IPv6 firewall must be enabled (using the command ipv6 firewall on page 1102) for the stateful inspection firewall to be activated.
Syntax Description
vrf <name> Optional. Specifies a VPN routing and forwarding (VRF) instance on which to drop IPv6 packets with multiple Pad1 options. If no VRF is specified, the packets on the default VRF are dropped.
Default Values
By default, this feature is disabled.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example specifies that packets on the default VRF with more than one Pad1 option are dropped: (config)#ipv6 firewall check multiple-pad1
60000CRG0-35B
1106
The AOS IPv6 firewall must be enabled (using the command ipv6 firewall on page 1102) for the stateful inspection firewall to be activated.
Syntax Description
vrf <name> Optional. Specifies a VPN routing and forwarding (VRF) instance on which to enable reflexive traffic checking. If no VRF is specified, IPv6 traffic is checked on the default VRF.
Default Values
By default, this reflexive traffic is allowed to bypass the firewall and does not create a policy session.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example enables the AOS IPv6 reflexive traffic check for the default VRF: (config)#ipv6 firewall check reflexive-traffic
60000CRG0-35B
1107
The AOS IPv6 firewall must be enabled (using the command ipv6 firewall on page 1102) for the stateful inspection firewall to be activated.
Syntax Descriptions
vrf <name> Optional. Specifies a VPN routing and forwarding (VRF) instance on which to check UDP packets. If no VRF is specified, the default VRF is inspected.
Default Values
By default, this feature is enabled.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example specifies that UDP packets with a value of zero are dropped on the default VRF: (config)#ipv6 firewall check udp-checksum-zero
60000CRG0-35B
1108
The AOS IPv6 firewall must be enabled (using the command ipv6 firewall on page 1102) for the stateful inspection firewall to be activated.
Syntax Description
vrf <name> Optional. Specifies a VPN routing and forwarding (VRF) instance on which to check IPv6 packets. If no VRF is specified, traffic on the default VRF is dropped.
Default Values
By default, this feature is enabled.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example specifies that IPv6 packets with unknown option extension headers are dropped on the default VRF: (config)#ipv6 firewall check unknown-options
60000CRG0-35B
1109
The AOS IPv6 firewall must be enabled (using the command ipv6 firewall on page 1102) for the stateful inspection firewall to be activated.
Syntax Description
<value> vrf <name> Specifies the number of IPv6 policy events AOS identifies before creating the log. Valid range is 1 to 4294967295. Optional. Specifies a VPN routing and forwarding (VRF) instance for AOS to monitor. If no VRF is specified, the default VRF is monitored.
Default Values
By default, a log is generated after 100 policy events have been identified.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example specifies that a log is generated when 150 IPv6 ACP events are detected on the default VRF: (config)#ipv6 firewall policy-log threshold 150
60000CRG0-35B
1110
The AOS IPv6 firewall must be enabled (using the command ipv6 firewall on page 1102) for the stateful inspection firewall to be activated.
Syntax Description
vrf <name> Optional. Specifies a VPN routing and forwarding (VRF) instance to put in stealth mode. If no VRF is specified, the default VRF is placed in stealth mode.
Default Values
By default, stealth mode is disabled.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example enables the stealth option for the default IPv6 VRF: (config)#ipv6 firewall stealth
60000CRG0-35B
1111
<interface>
<mac address>
Default Values
By default, no static neighbor entries exist in the neighbor cache.
Command History
Release 18.1 Command was introduced.
Functional Notes
In IPv6, neighbors are usually managed dynamically using the ND protocol. However, you can manually enter a static entry into the neighbor cache using the ipv6 neighbor command. When you enter a static entry into the neighbor cache, you should be aware of the following: A static entry entirely overrides an existing or new dynamic entry learned through ND. Neighbor unreachability detection (NUD) is not performed on static neighbors, so the neighbors state is limited to either an incomplete modified state (interface is down) or a reachable modified state (interface is up). Using the no form of the ipv6 neighbor command removes static entries and not dynamic entries from the neighbor cache. Using the command clear ipv6 neighbors on page 133 clears the dynamic entries from the neighbor cache, but not the static entries. Disabling IPv6 on an interface does not remove the static neighbor cache entries, although it will change the entry state to incomplete.
Usage Examples
The following example adds a static neighbor with an IPv6 address of 2001:DB8:3F::/48 on the Ethernet 0/1 interface, and has a MAC address of 00:A0:C8:00:00:01 to the neighbor cache: (config)#ipv6 neighbor 2001:DB8:3F::/48 ethernet 0/1 00:A0:C8:00:00:01
60000CRG0-35B
1112
Default Values
By default, there are no configured IPv6 ACPs.
Command History
Release 18.1 Command was introduced.
Functional Notes
AOS IPv6 ACPs are used to allow or discard data for each physical interface. Each IPv6 ACP consists of an action (allow, discard) and a selector IPv6 access control list (ACL). When IPv6 packets are received on an interface, the configured IPv6 ACPs are applied to determine whether the data will be processed or discarded. IPv6 ACPs only work with IPv6 ACLs, and IPv4 ACPs only work with IPv4 ACLs. You cannot have an IPv6 ACP or ACL with the same name as an IPv4 ACP or ACL.
Usage Examples
The following example creates an IPv6 ACP named PRIVATEv6: (config)#ip policy-class PRIVATEv6 (config-policy6-class)#
60000CRG0-35B
1113
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1114
rpf-check
Default Values
This command is enabled by default.
Command History
Release 18.1 Command was introduced.
Functional Notes
When enabled, after an IPv6 packet is received, the IPv6 firewall performs a route lookup on the packets source IPv6 address to determine what interface would be used to forward the packet back to that address. The firewall then checks the IPv6 ACP assigned to that interface. If the IPv6 ACP does not match the IPv6 ACP of the interface on which the packet was received, the packet is dropped. The rpf-check feature should be disabled if your application allows traffic to arrive on an interface sourced from networks contradicting the route table. This feature can be disabled on a per ACP basis by issuing this command in conjunction with the ACP name you do not want to be checked.
Usage Examples
The following example turns off the rpf-check feature for the IPv6 ACP named PRIVATEv6: (config)#no ip policy-class PRIVATEv6 rpf-check
60000CRG0-35B
1115
ipv6 route
Use the ipv6 route command to add an Internet Protocol version 6 (IPv6) static route to the IPv6 route table. Use the no form of this command to remove a configured IPv6 static route. Variations of this command include:
ipv6 route <ipv6 prefix/prefix length> <ipv6 address> ipv6 route <ipv6 prefix/prefix length> <ipv6 address> <administrative distance> ipv6 route <ipv6 prefix/prefix length> <ipv6 address> <administrative distance> tag <value> ipv6 route <ipv6 prefix/prefix length> <ipv6 address> tag <value> ipv6 route <ipv6 prefix/prefix length> <ipv6 address> <interface> ipv6 route <ipv6 prefix/prefix length> <ipv6 address> <interface> <administrative distance> ipv6 route <ipv6 prefix/prefix length> <ipv6 address> <interface> <administrative distance> tag <value> ipv6 route <ipv6 prefix/prefix length> <ipv6 address> <interface> tag <value> ipv6 route <ipv6 prefix/prefix length> <ipv6 address> null 0 ipv6 route <ipv6 prefix/prefix length> <ipv6 address> null 0 <administrative distance> ipv6 route <ipv6 prefix/prefix length> <ipv6 address> null 0 <administrative distance> tag <value> ipv6 route <ipv6 prefix/prefix length> <ipv6 address> null 0 tag <value> ipv6 route vrf <name> <ipv6 prefix/prefix length> <ipv6 address> ipv6 route vrf <name> <ipv6 prefix/prefix length> <ipv6 address> <administrative distance> ipv6 route vrf <name> <ipv6 prefix/prefix length> <ipv6 address> <administrative distance> tag <value> ipv6 route vrf <name> <ipv6 prefix/prefix length> <ipv6 address> tag <value> ipv6 route vrf <name> <ipv6 prefix/prefix length> <ipv6 address> <interface> ipv6 route vrf <name> <ipv6 prefix/prefix length> <ipv6 address> <interface> <administrative distance> ipv6 route vrf <name> <ipv6 prefix/prefix length> <ipv6 address> <interface> <administrative distance> tag <value> ipv6 route vrf <name> <ipv6 prefix/prefix length> <ipv6 address> <interface> tag <value> ipv6 route vrf <name> <ipv6 prefix/prefix length> <ipv6 address> null 0 ipv6 route vrf <name> <ipv6 prefix/prefix length> <ipv6 address> null 0 <administrative distance> ipv6 route vrf <name> <ipv6 prefix/prefix length> <ipv6 address> null 0 <administrative distance> tag <value> ipv6 route vrf <name> <ipv6 prefix/prefix length> <ipv6 address> null 0 tag <value>
Syntax Description
<ipv6 prefix/prefix length> Specifies the network defined by this static route entry. IPv6 prefixes should be expressed in colon hexadecimal format (X:X::X/<Z>). For example, 2001:DB8:3F::/64. The prefix length (<Z>) is an integer with a value between 0 and 128. The IPv6 prefix cannot be a link-local address. Specifies the next-hop IPv6 address defined by the static route. This is not a link-local IPv6 address. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. Optional. Specifies an egress interface on the router which connects to the next-hop IPv6 device on the path toward the specified network. Interfaces are entered in the <interface> <slot/port | interface id> format. You must use the <interface> parameter in conjunction with the next-hop IPv6 address if you are specifying a link-local IPv6 address (FE80::) as the next hop.
<ipv6 address>
<interface>
60000CRG0-35B
1116
Global Configuration Mode Command Set Optional. Specifies that traffic is routed to the null interface. The router drops all packets destined for the null interface. Use the null interface to allow the router to advertise a route, but not forward traffic to the route. Optional. Specifies an administrative distance associated with the static route, and is used to determine the best route when multiple routes to the same destination exist. The route with the lowest administrative distance is the preferred route. Administrative distance range is 1 to 255. Optional. Specifies a number to use as a tag for this route. Valid range is 1 to 65535.
<administrative distance>
tag <value>
Default Values
By default, no static routes are added to the IPv6 route table. If a static route is created, the administrative distance is 1 by default.
Command History
Release 18.1 Command was introduced.
Functional Notes
Each static route is only added to the IPv6 route table when the IPv6 interface is configured and in an UP state. There are three types of static routes that can be used: directly attached, recursive, and fully specified. A directly attached static route is a route in which the next hop for the route is entered as an interface. Packets destined for the specified network are assumed to be directly reachable on the specified interface. If you are using a directly attached static route, and the interface you are using uses Layer 2 addresses (for example, as an Ethernet interface does), then address resolution is performed when a packet is delivered to the network. For Point-to-Point Protocol (PPP) interfaces, the packet is simply forwarded through the interface in the same way that a packet is forwarded when an IPv6 on-link prefix is defined at the interface. A recursive static route is a route in which the next hop for the route is entered as the IPv6 address of the next-hop router. When a recursive static route is used, AOS attempts to determine the interface used to reach the next-hop address. Recursive routes are added to the route table only when the router has determined which interface to use for egress traffic. A fully specified static route is a route in which the next hop is entered as an IPv6 address and an interface for the next-hop router is specified. This type of static route restricts the use of the route to the specified interface. A fully specified static route MUST be used when the next hop is specified by its link-local address, which alone has no context of location.
Usage Examples
The following example creates a static route in the IPv6 routing table that has a local-link next-hop address, egresses from the ethernet 0/1 interface, includes a tag of 3, and has an administrative distance of 2: (config)#ipv6 route 2001:DB8:3F::/48 fe80::202:b3ff:fe1e:8345 ethernet 0/1 tag 3 2
60000CRG0-35B
1117
ipv6 unicast-routing
Use the ipv6 unicast-routing command to enable Internet Protocol version 6 (IPv6) unicast routing and specify the router as an IPv6 neighbor. Use the no form of this command to disable the IPv6 routing subsystem, remove any routing protocol entries from the IPv6 routing table, cease IPv6 routing functions, and disable IPv6 unicast routing. Syntax Description
No subcommands.
Default Values
By default, IPv6 unicast routing is disabled.
Command History
Release 18.1 Command was introduced.
Functional Notes
This ipv6 unicast-routing command functions similarly to the ip routing command for IPv4 services. In order to enable IPv6 unicast routing, you must first configure interfaces to use IPv6 before IPv6 communication takes place. When IPv6 unicast routing is enabled globally, the router flag is set to 1 in neighbor advertisement (NA) messages. Using the no form of this command disables the IPv6 routing subsystem, removes any routing protocol entries from the IPv6 route table, causes IPv6 routing functions to cease, and disables IPv6 unicast routing. In addition, NA messages are sent at each interface indicating the neighbor is no longer a router (router flag is set to 0), and that the router is no longer the default router for any advertised prefixes. When IPv6 unicast routing is disabled, the existing IPv6 configuration is retained, but no IPv6 packets are routed and no routing resources are consumed. If IPv6 unicast routing is not enabled, but an interface has IPv6 enabled, that interface may communicate as an IPv6 host to other devices. If IPv6 packets are received that are not addressed to that interface, the packets are dropped.
Usage Examples
The following example enables IPv6 unicast routing and specifies the router as an IPv6 neighbor: (config)#ipv6 unicast-routing
60000CRG0-35B
1118
isdn-group <number>
Use the isdn-group command to enter the ISDN Group Configuration mode command set. Use the no form of this command to disable this feature. Refer to the section Voice ISDN Group Command Set on page 2965 for more information on the commands available for each group. Syntax Description
<number> Specifies the integrated services digital network (ISDN) group. Range is 1 to 255.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Functional Notes
An ISDN group allows the user to specify the maximum and minimum number of B-channels that can be used for a specific type of call. It is a logical group of B-channels from one or more ISDN interfaces. The interfaces can be of different types (e.g., primary rate interface (PRI) and basic rate interface (BRI)). An ISDN interface can be a member of multiple ISDN groups that makes it possible to share its B-channels between different types of calls.
Usage Examples
The following example uses the isdn-group command to enter the ISDN Group Configuration mode for ISDN group 1: (config)#isdn-group 1 (config-isdn-group 1)#
60000CRG0-35B
1119
isdn-number-template
Use the isdn-number-template command to create an entry in the integrated services digital network (ISDN) number-type template that is used when encoding the called party and calling party information elements (IEs) for inbound and outbound ISDN calls. Use the no form of this command to delete the configured entry. Variations of this command include the following:
isdn-number-template <template id> prefix <number> abbreviated <pattern> isdn-number-template <template id> prefix <number> international <pattern> isdn-number-template <template id> prefix <number> national <pattern> isdn-number-template <template id> prefix <number> network-specific <pattern> isdn-number-template <template id> prefix <number> subscriber <pattern> isdn-number-template <template id> prefix <number> unknown <pattern> isdn-number-template <template id> prefix <number> plan <indicator> type <number> <pattern>
Syntax Description
<template id> prefix <number> Specifies a numeric identifier for the template entry. Valid range is 1 to 255. Specifies the expected prefix for the call type. Prefixes can be left blank (using double quotation marks ), or consist of unlimited length strings of zeros and ones. For example, for international calls made from within the United States, a prefix of 011 is expected. Specifies using abbreviated (bits 110) in the type of number (TON) octet. Abbreviated is used mainly in private ISDN network applications and the implementation is network dependent. Specifies using international (bits 001) in the TON octet. International is used for calls destined outside the national calling area. International calls have the international direct dialing (IDD) prefix removed. For example, consider an international call of 011-N$, where the IDD prefix is 011 and the N$ represents the digits necessary for routing the call at the destination. When the called party IE is created for this call, the prefix is stripped and the N$ digits are placed in the number digits field. Specifies using national (bits 010) in the TON octet. National is used for calls destined for inside the national calling area (i.e., does not cross into an international local access and transport area (LATA)). National calls have the direct dialing prefix removed. For example, consider a national call with a direct dialing prefix of 1 and NXX-NXX-XXXX to represent the ten-digit number necessary for routing the call. When the called party IE is created for this call, the prefix (1) is stripped and the NXX-NXX-XXXX digits are placed in the number digits field.
abbreviated
international
national
60000CRG0-35B
1120
Global Configuration Mode Command Set Specifies using network-specific (bits 011) in the TON octet. Network-Specific is used for calls that require special access to a private network, which requires the use of a prefix that should be stripped once access to the network has been gained. Network-specific calls have the dialing prefix removed. For example, a call to a private network with the 700 consists of 700-N$, where 700 is the dialing prefix and N$ represents the digits necessary for routing the call at the destination. When the Called Party IE is created for this call, the prefix is stripped and the N$ is placed in the Number Digits field. Specifies the numbering plan indicator (NPI) to use in combination with the TON and associate it with a number pattern. Valid range is 0 to 15. Specifies using subscriber (bits 100) in the TON octet. Subscriber is used for local calls (not long distance). Subscriber calls, by default, have the area code removed. For example, a subscriber call to 916-555-1212 would have the prefix 916 stripped and 555-1212 in the number digits field. For areas with mandatory ten-digit dialing, a blank prefix should be entered to ensure that all ten digits are passed to the number digits field. Specifies the TON to use in combination with the NPI and associate it with a number pattern. Valid range is 0 to 7. Specifies using unknown (bits 000) in the TON octet. Unknown is used when the number type is not known. Unknown numbers are assumed to have no prefix, and the entire dialed number is presented in the number digits field. Specifies a pattern for this template. Valid characters: 0-9 X N M [] Match exact digit only. Match any single digit 0 through 9. Match any single digit 2 through 9. Match any single digit 1 through 8. Match any digit in the list. For example: [1,4,6] matches 1, 4, and 6 only. [1-3, 5] matches 1, 2, 3, and 5.
<pattern>
Default Values
By default, the following number template for domestic emergency calls (911) is the only template preconfigured in AOS: isdn-number-template 0 prefix subscriber 911
Command History
A4.05 Command was expanded to include the plan <indicator> type <number> <pattern> parameter.
60000CRG0-35B
1121
Functional Notes
The following is an example number-type template: Prefix 1 011 Pattern NXX-XXXX NXX-NXX-XXXX X$ N11 Type Subscriber National International Subscriber (i.e., 411, 911, etc.)
The command isdn-number-template <template id> prefix <number> plan <indicator> type <number> <pattern> is used to associate any combination of NPIs and TONs with a number pattern. Not all combination values are allowed, and AOS does not check the entry validity. Refer to the International Telecommunication Union (ITU) recommendation Q.931 for the most current information.
Usage Examples
The following example creates a number template (labeled 1) and prefix (labeled 1) for national calls: (config)#isdn-number-template 1 prefix 1 national Nxx-Nxx-xxxx
60000CRG0-35B
1122
line
Use the line command to enter the line configuration for the specified console, Telnet, or secure shell (SSH) session. Refer to the sections Line (Console) Interface Command Set on page 1337, Line (Telnet) Interface Command Set on page 1367, and Line (SSH) Interface Command Set on page 1354 for information on the subcommands. Variations of this command include:
line console <line number> line ssh <line number> line ssh <line number> <ending number> line telnet <line number> line telnet <line number> <ending number>
Syntax Description
console Enters the configuration mode for the DB-9 (female) CONSOLE port located on the rear panel of the unit. Refer to the section Line (Console) Interface Command Set on page 1337 for information on the subcommands found in that command set. Enters the configuration mode for Telnet session(s), allowing you to configure for remote access. Refer to the section Line (Telnet) Interface Command Set on page 1367 for information on the subcommands found in that command set. Enters the configuration mode for SSH. Refer to the section Line (SSH) Interface Command Set on page 1354 for information on the subcommands found in that command set. Specifies the starting session to configure for remote access. Valid range for console is 0. Valid range for Telnet and SSH is 0 to 4. If configuring a single Telnet or SSH session, enter a single line number. <ending number> Optional. Specifies the last Telnet or SSH session to configure for remote access. Valid range is 0 to 4. For example, to configure all available Telnet sessions, enter line telnet 0 4.
telnet
ssh
<line number>
Default Values
By default, there are no configured Telnet or SSH sessions. By default, the AOS line console parameters are configured as follows: Data Rate: 9600 Data bits: 8 Stop bits: 1 Parity Bits: 0 No flow control
Command History
Release 1.1 Command was introduced.
60000CRG0-35B
1123
Global Configuration Mode Command Set Command was expanded to include the SSH.
Usage Examples
The following example begins the configuration for the CONSOLE port located on the rear of the unit: (config)#line console 0 (config-con0)# The following example begins the configuration for all available Telnet sessions: (config)#line telnet 0 4 (config-telnet0-4)# The following example begins the configuration for all available SSH sessions: (config)#line ssh 0 4 (config-ssh0-4)#
60000CRG0-35B
1124
lldp
Use the lldp command to configure global settings that control the way Link Layer Discovery Protocol (LLDP) functions. Use the no form of this command to return to the default setting. Variations of this command include:
lldp med-fast-start-interval <value> lldp minimum-transmit-interval <value> lldp reinitialization-delay <value> lldp transmit-interval <value> lldp ttl-multiplier <value>
Syntax Description
med-fast-start-interval Specifies the fast start transmit interval (in seconds) that LLDP-Media Endpoint Discovery (LLDP-MED) time length values (TLVs) are sent once every second, allowing rapid automatic configuration of LLDP-MED capable endpoints at startup. Range is 1 to 10 seconds. Default value is 4 seconds.
minimum-transmit-interval Defines the minimum amount of time between transmission of LLDP frames in seconds. Range is 1 to 8192 seconds. reinitialization-delay Defines the minimum amount of time to delay after LLDP is enabled on a port before allowing transmission of additional LLDP frames on that port in seconds. Range is 1 to 10 seconds. Defines the delay between LLDP frame transmission attempts during normal operation in seconds. Range is 5 to 32768 seconds. Defines the time to live (TTL) multiplier to be applied to the transmit interval to compute the time to live for data sent in an LLDP frame. Range is 2 to 10. Specifies the interval, delay, or multiplier.
Default Values
By default, med-fast-start-interval is 4 seconds; minimum-transmit-interval is 2 seconds; reinitialization-delay is 2 seconds; transmit-interval is 30 seconds; and ttl-multiplier is 4.
Command History
Release 8.1 Release 17.2 Command was introduced. Command was expanded to include the med-fast-start-interval parameter.
Functional Notes
Once a device receives data from a neighboring device in an LLDP frame, it will retain that data for a limited amount of time. This amount of time is called time to live, and it is part of the data in the LLDP frame. The time to live transmitted in the LLDP frame is equal to the transmit interval multiplied by the TTL multiplier.
60000CRG0-35B
1125
Usage Examples
The following example sets the LLDP minimum transmit interval to 10 seconds: (config)#lldp minimum-transmit-interval 10 The following example sets the LLDP reinitialization delay to 5 seconds: (config)#lldp reinitialization-delay 5 The following example sets the LLDP transmit interval to 15 seconds: (config)#lldp transmit-interval 15 The following example sets the LLDP transmit interval to 15 seconds and the TTL multiplier to 2 for all LLDP frames transmitted from the unit. The resulting TTL is 30 seconds: (config)#lldp transmit-interval 15 (config)#lldp ttl-multiplier 2
60000CRG0-35B
1126
local <start ip address> <end ip address> global <start ip address> <end ip address>
Use the local global command to define local and global network range of addresses for static 1:1 network address translation (NAT) mapping. This command is entered from within the NAT pools configuration command set by using the ip nat pool command. Refer to ip nat pool <name> on page 984 for more information. Syntax Description
<start ip address> <end ip address> Specifies the first IP address in the range. Specifies the last IP address in the range. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
Default Values
No default values are necessary for this command.
Command History
Release 17.4 Command was introduced.
Functional Notes
Static pools define a local network range of addresses whose size must be equal to the global range. Source NAT will translate from the local range to the global range. Destination NAT will translate from the global range to the local range. The addresses do not have to start at the same offset. If this command is entered and the two ranges are not of the same size, an error message is displayed. The command will fail and the pool will remain in its original state. If the pool was configured with an existing address range prior to issuing the failed command, that range will remain unchanged. If no address range was present, the pool will remain incomplete. In some situations, an address needs to be excluded that falls within a range. For example, suppose you are excluding 10.1.1.10 because it is the address used for many-to-one source NAT for other nonstatic NAT hosts. This can be accomplished by creating multiple pools. This configuration requires multiple policy class entries, but each can use the same access control list (ACL).
Usage Examples
The following example creates a static NAT pool named POOL1 and defines the local range from 10.1.1.1 to 10.1.1.12 and the global range as 192.168.1.1 to 192.168.1.12: (config)#ip nat pool POOL1 static (config-natpool)#local 10.1.1.1 10.1.1.12 global 192.168.1.1 192.168.1.12
60000CRG0-35B
1127
The following example creates two static NAT pools named POOL1 and POOL2. This example defines the local range from 10.1.1.1 to 10.1.1.254 and the global range as 192.168.1.1 to 192.168.1.254 while excluding the address 10.1.1.10: (config)#ip nat pool POOL1 static (config-natpool)#local 10.1.1.1 10.1.1.9 global 192.168.1.1 192.168.1.9 (config)#ip nat pool POOL2 static (config-natpool)#local 10.1.1.11 10.1.1.254 global 192.168.1.11 192.168.1.254
60000CRG0-35B
1128
logging console
Use the logging console command to enable AOS to log events to all consoles. Use the no form of this command to disable console event logging. Syntax Description
No subcommands.
Default Values
By default, logging console is disabled.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example enables AOS to log events to all consoles: (config)#logging console
60000CRG0-35B
1129
Default Values
By default, there are no configured logging email addresses.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example specifies three email addresses to use when sending logged messages: (config)#logging email address-list admin@adtranemail.com;ntwk@adtranemail.com;support@adtranemail.com
60000CRG0-35B
1130
Default Values
By default, there are no configured logging email addresses.
Command History
Release 11.1 Command was introduced.
Functional Notes
When AOS experiences an exception, it will generate a file with detailed information that ADTRANs Technical Support can use to diagnose the problem. This command allows the unit to email the exception report to a list of addresses upon rebooting after the exception. This command should be used in conjunction with the other logging email commands. Refer to logging email address-list <email address> ; <email address> on page 1131, logging email on on page 1134, logging email priority-level on page 1135, logging email sender on page 1137, and logging email source-interface <interface> on page 1138 for more information.
Usage Examples
The following example will enable exception report forwarding to john.doe@company.com using the 1.1.1.1 SMTP email server: (config)#logging email on (config)#logging email receiver-ip 1.1.1.1 (config)#logging email exception-report address-list john.doe@company.com
60000CRG0-35B
1131
Syntax Description
address-list send-time <email addresses> Specifies the configuration of a list of email addresses to receive top websites reports. Specifies the configuration of when email reports for top websites will be sent. Specifies the complete email address to use when sending top websites reports. (This field allows up to 256 characters.) Enter as many email addresses as desired, placing a semi-colon (;) between addresses. <HH:MM:SS> Specifies the hours, minutes, and seconds in a 24-hour format for sending top websites reports by email.
Default Values
By default, there are no configured logging email addresses or times for top websites reporting. Once an address list is specified and top websites email reports are enabled, the default send-time for the reports is 12:00 a.m.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example configures top websites reports to be emailed to sys.admin@adtran.com at 5:30 a.m.: (config)#logging email ip urlfilter top-websites address-list sys.admin@adtran.com (config)#logging email ip urlfilter top-websites send-time 05:30:00
60000CRG0-35B
1132
logging email on
Use the logging email on command to enable the AOS email event notification feature. Use the logging email address-list command to specify email address(es) that will receive notification when an event matching the criteria configured using the logging email priority-level command is logged by AOS. Refer to logging email priority-level on page 1135 for more information. Use the no form of this command to disable the email notification feature. Syntax Description
No subcommands.
Default Values
By default, email event notification is disabled.
Command History
Release 1.1 Command was introduced.
Functional Notes
The domain name is appended to the sender name when sending event notifications. Refer to the command ip domain-name <domain name> on page 915 for related information.
Usage Examples
The following example enables the AOS email event notification feature: (config)#logging email on
60000CRG0-35B
1133
Syntax Description
Sets the minimum priority threshold for sending messages to email addresses specified using the logging email address-list command. The following priorities are available (ranking from lowest to highest): error fatal info notice warning Logs events with error and fatal priorities. Logs only events with a fatal priority. Logs all events. Logs events with notice, warning, error, and fatal priorities. Logs events with warning, error, and fatal priorities.
Default Values
By default, the logging email priority-level is set to warning.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example sends all messages with warning level or greater to the email addresses listed using the logging email address-list command: (config)#logging email priority-level warning
60000CRG0-35B
1134
Syntax Description
<ip address | hostname> Specifies the IP address or host name of the email server to use when sending logged messages. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
auth-username <username> Optional. Specifies the user name to use if your email server requires authentication. auth-password <password> Optional. Specifies the password to use if your email server requires authentication. port <number> Optional. Specifies the port number of the remote email server. Range is 1 to 65535.
Default Values
By default, there are no configured email server addresses.
Command History
Release 1.1 Release 15.1 Release 16.1 Command was introduced. Command was expanded to include the auth-username and auth-password options. Command was expanded to include the port number specification option.
Usage Examples
The following example specifies an email server (with IP address 172.5.67.99) to use when sending logged messages: (config)#logging email receiver-ip 172.5.67.99
60000CRG0-35B
1135
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example sets a sender for outgoing messages: (config)#logging email sender myUnit@myNetwork.com
60000CRG0-35B
1136
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 14.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the tunnel interface. Command was expanded to include the asynchronous transfer mode (ATM) interface. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
This command allows you to override the sender field in the IP packet. If you have multiple interfaces in your unit, changing the sender tells the receiver where to send replies. This functionality can also be used to allow packets to get through firewalls that would normally block the flow.
Usage Examples
The following example configures the unit to use the loopback 1 interface as the source IP for email messages: (config)#logging email source-interface loopback 1
60000CRG0-35B
1137
Default Values
The default value is local7.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example configures the syslog facility to the cron facility type: (config)#logging facility cron
60000CRG0-35B
1138
Default Values
By default, no secondary syslog servers are configured.
Command History
Release 17.7 Release A4.05 Command was introduced. Command was introduced in AOS voice products.
Functional Notes
Configuring a secondary syslog server allows the redundant transmission of messages to two different servers. This server configuration is optional, and does not function as a failover address; therefore, the primary server should always be configured using the command logging forwarding receiver-ip <ip address> on page 1143. Syslog transmits to this auxiliary address independently of normal server addresses.
Usage Examples
The following example specifies that messages are logged to both a primary syslog server (172.5.67.99) and an auxiliary syslog server (172.5.69.100): (config)#logging forwarding receiver-ip 172.5.67.99 (config)#logging forwarding auxiliary-receiver-ip 172.5.69.100
60000CRG0-35B
1139
logging forwarding on
Use the logging forwarding on command to enable the AOS syslog event feature. Use the logging forwarding priority-level command to specify the event matching the criteria used by AOS to determine whether a message should be forwarded to the syslog server. Refer to logging forwarding priority-level on page 1142 for related information. Use the no form of this command to disable the syslog event feature. Syntax Description
No subcommands.
Default Values
By default, syslog event notification is disabled.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example enables the AOS syslog event feature: (config)#logging forwarding on
60000CRG0-35B
1140
Syntax Description
Sets the minimum priority threshold for sending messages to the syslog server specified using the logging forwarding receiver-ip command. The following priorities are available (ranking from lowest to highest): error fatal info notice smdr warning Logs events with error and fatal priorities. Logs only events with a fatal priority. Logs all events. Logs events with notice, warning, error, and fatal priorities. Logs events with smdr priorities. Logs events with warning, error, and fatal priorities.
Default Values
By default, the logging forwarding priority-level is set to warning.
Command History
Release 1.1 Release 12.1 Command was introduced. Command was expanded to include the smdr parameter.
Usage Examples
The following example sends all messages with warning level or greater to the syslog server listed using the logging forwarding receiver-ip command: (config)#logging forwarding priority-level warning
60000CRG0-35B
1141
Default Values
By default, there are no configured syslog server addresses.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example specifies a syslog server (with address 172.5.67.99) to use when logging messages: (config)#logging forwarding receiver-ip 172.5.67.99
60000CRG0-35B
1142
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 14.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the tunnel interface. Command was expanded to include the asynchronous transfer mode (ATM) interface. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
This command allows you to override the sender field in the IP packet. If you have multiple interfaces in your unit, changing the sender tells the receiver where to send replies. This functionality can also be used to allow packets to get through firewalls that would normally block the flow.
Usage Examples
Configures the unit to use the loopback 1 interface as the source IP for event log traffic: (config)#logging forwarding source-interface loopback 1
60000CRG0-35B
1143
Syntax Description
<name> <action> <source> Identifies the configured MAC ACL using an alphanumeric descriptor. All MAC ACL descriptors are case sensitive. permit Permits entry to the access point for specified wireless station MACs. Specifies the source used for packet matching. Sources are expressed by using host <mac address> to specify a single host address. MAC addresses should be expressed in the following format: xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01).
Default Values
By default, all AOS security features are disabled and there are no configured MAC ACLs.
Command History
Release 15.1 Command was introduced.
Functional Notes
MAC ACLs are used as packet selectors by the wireless features; by themselves, the MAC ACLs do nothing. A MAC ACL entry contains two parts: an action (permit) and a MAC address. A permit ACL is used to match packets (meeting the specified pattern) to enter the AP. AOS provides only standard MAC ACLs. Standard ACLs match based on the source of the packet.
Usage Examples
The following example creates a MAC ACL named Trusted to permit all packets entry to the AP with MAC address 00:A0:C8:00:00:01. (config)#mac access-list standard Trusted (config-std-mac-acl)#permit 00:A0:C8:00:00:01 For more information about configuring MAC ACLs, refer to the MAC ACL quick configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3086).
60000CRG0-35B
1144
Default Values
By default, the aging time is 300 seconds.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example sets the aging time to 10 minutes: (config)#mac address-table aging-time 600
60000CRG0-35B
1145
Syntax Description
<mac address> bridge <bridge id> vlan <vlan id> interface <interface> Specifies a valid 48-bit MAC address. MAC addresses should be expressed in the following format xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01). Specifies a bridge interface ID. Valid range is 1 to 255. Specifies a virtual local area network (VLAN) interface ID. Valid range is 1 to 4094. Specifies an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type mac address-table static bridge interface ? or mac address-table static <mac address> vlan <vlan id> interface ? for a complete list of valid interfaces.
Default Values
By default, there are no static entries configured.
Command History
Release 5.1 Release 10.1 Release A4.01 Command was introduced Command was expanded to include the bridge interface. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following example adds a static MAC address to Point-to-Point Protocol (PPP) 1 on bridge 4: (config)#mac address-table static 00:A0:C8:00:00:01 bridge 4 interface ppp 1 The following example adds a static MAC address to Ethernet 0/1 on VLAN 4: (config)#mac address-table static 00:A0:C8:00:00:01 00:12:79:00:00:01 vlan 4 interface ethernet 0/1
60000CRG0-35B
1146
Syntax Description
<name> Specifies the name of the MAC hardware ACL.
Default Values
By default, all AOS security features are disabled, and there are no configured hardware ACLs.
Command History
Release 17.6 Command was introduced.
Functional Notes
This command only creates an empty hardware ACL, it does not configure it. For additional MAC hardware ACL configuration commands and configuration parameters, refer to the Hardware ACL and Access Map Command Set on page 2738 or the Hardware ACLs in AOS configuration guide available online at http://kb.adtran.com (article number 3088).
Usage Examples
The following example creates a MAC hardware ACL Trusted and enters the MAC hardware ACL configuration mode: (config)#mac hw-access-list extended Trusted Configuring New MAC Hardware Extended ACL Trusted (config-ext-mac-hw-nacl)#
Technology Review
Hardware ACLs are used as frame selectors by the hardware access maps; by themselves they do nothing. Hardware ACLs are composed of an ordered list of entries with an implicit deny any at the end of each list. A hardware ACL with no entries includes an implicit permit any. An ACL entry contains two parts: an action (permit or deny) and a frame pattern. A permit ACL matches frames (meeting the specified pattern) and allows them to enter the router system. A deny ACL advances AOS to the next access list entry.
60000CRG0-35B
1147
ACL criteria are compared to the incoming frame in the order in which they were entered or from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
Changing hardware ACL or hardware access map configuration or application causes new information to be reinstalled on the hardware. It is possible to run out of hardware resources depending on how many resources are needed to apply the desired change. If there are not enough hardware resources to install the new criteria in the hardware, an error message is displayed. You can view the amount of hardware resources available using the command show hw-filter-resource on page 471.
60000CRG0-35B
1148
Default Values
By default, no mail agents exist.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example creates a mail agent called myagent and enters the Mail Agent Configuration mode: (config)#mail-client myagent (config-mail-client-myagent)#
60000CRG0-35B
1149
Default Values
By default, no EVCs are configured.
Command History
Release A4.01 Command was introduced.
Functional Notes
The EVC connects two endpoints (for example, an Ethernet in the first mile (EFM) group and the Metro Ethernet Forum (MEF) Ethernet interface) and passes Ethernet service frames though the endpoints. The EVCs prevent data transfer between subscriber sites that are not part of the same EVC, thus providing data privacy and security similar to a Frame Relay or an asynchronous transfer mode (ATM) permanent virtual circuit (PVC). EVCs are configured to be part of a bonding group (EFM group). More information about the configuration of EVCs can be found in the MEF EVC Command Set on page 2842 or in the Configuring EFM NIM2s and the MEF Ethernet Interface in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example creates an EVC named DATA and enters the EVC configuration mode: (config)#mef evc DATA (config-evc-DATA)#
60000CRG0-35B
1150
Default Values
By default, no EVC maps are configured.
Command History
Release A4.01 Command was introduced.
Functional Notes
Once an EVC map is created, it must be configured and applied to both an EVC and a user network interface (UNI). For more information about the configuration of EVC maps, refer to MEF EVC Map Command Set on page 2846 or the Configuring EFM NIM2s and the MEF Ethernet Interface in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example creates the EVC map Map1 and enters the EVC Map Configuration mode: (config)#mef evc-map Map1 (config-evc-map-Map1)#
60000CRG0-35B
1151
Default Values
By default, no MEF policer policies are configured.
Command History
Release A4.01 Command was introduced.
Functional Notes
The EVC policer policy can limit traffic on Ethernet virtual connections (EVCs), user network interfaces (UNIs), or EVC maps based on traffic committed burst size (CBS), committed information rate (CIR), excess burst size (EBS), and excess information rate (EIR). These thresholds are used to determine when the EVC bandwidth usage is too great, and the traffic is either queued or dropped based on the configured thresholds. For more information about the configuration and use of EVC policer policies, refer to MEF Policer Policy Command Set on page 2852 or the Configuring EFM NIM2s and the MEF Ethernet Interface in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example creates the MEF policer policy Policy1 and enters the MEF Policer Policy Configuration mode: (config)#mef policer Policy1 (config-policer-Policy1)#
60000CRG0-35B
1152
mef qos
Use the mef qos command to configure the Metro Ethernet Forum (MEF) Ethernet quality of service (QoS) parameters. These parameters specify the hardware queues used by the Ethernet virtual connection (EVC) when traffic matching an EVC map is discovered, as well as the Metro Ethernet network (MEN) priority given to untagged traffic. Using the no form of this command returns the MEF QoS settings to the default values. Variations of this command include:
mef qos cos-map <number> <value> mef qos untagged <value>
Syntax Description
cos-map <number> <value> Specifies default mapping of queues to class of service (CoS) markings for EVC traffic. The <number> parameter is the queue to which a CoS value is mapped. Valid range is 1 to 8. The <value> parameter is the CoS value assigned to the queue. Valid value range is 0 to 7. untagged <value> Specifies the MEN priority for untagged traffic on the EVC. Valid range is 0 to 7.
Default Values
By default, a MEN priority of 0 is assigned to untagged traffic. The default MEF QoS queue assignments are outlined below. One CoS Value Is Assigned to Each Queue by Default CoS value 1 is assigned to queue 1 by default. CoS value 0 is assigned to queue 2 by default. CoS value 2 is assigned to queue 3 by default. CoS value 3 is assigned to queue 4 by default. CoS value 4 is assigned to queue 5 by default. CoS value 5 is assigned to queue 6 by default. CoS value 6 is assigned to queue 7 by default. CoS value 7 is assigned to queue 8 by default.
Queue and Assigned CoS Values (config)#mef qos cos-map 1 1 (config)#mef qos cos-map 2 0 (config)#mef qos cos-map 3 2 (config)#mef qos cos-map 4 3 (config)#mef qos cos-map 5 4 (config)#mef qos cos-map 6 5 (config)#mef qos cos-map 7 6 (config)#mef qos cos-map 8 7
Command History
Release A4.01 Command was introduced.
60000CRG0-35B
1153
Functional Notes
The MEF QoS CoS map values are used by the EVC map when the MEN queue setting is specified as inherit. For more information about the relationships between and configuration of MEF components, refer to the Configuring EFM NIM2s and the MEF Ethernet Interface in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example specifies that traffic with CoS values 3 and 4 are mapped to queue 1: (config)#mef qos cos-map 1 3 4 The following example specifies the MEN priority for untagged traffic is 5: (config)#mef qos untagged 5
60000CRG0-35B
1154
Default Values
By default, modem countrycode is set to USA/Canada.
Command History
Release 10.1 Command was introduced.
Functional Notes
The following country codes are available for modem configuration: Algeria Argentina Australia Austria Bahrain Belgium Bolivia Brazil Chile China Colombia Costa_Rica Cyprus Czechoslovakia Denmark Ecuador Egypt Finland France Germany Greece Guatemala Hong_Kong Hungary India Indonesia Ireland Israel - Algeria Modem configuration - Argentina Modem configuration - Australia Modem configuration - Austria Modem configuration - Bahrain Modem configuration - Belgium Modem configuration - Bolivia Modem configuration - Brazil Modem configuration - Chile Modem configuration - China Modem configuration - Colombia Modem configuration - Costa_Rica Modem configuration - Cyprus Modem configuration - Czechoslovakia Modem configuration - Denmark Modem configuration - Ecuador Modem configuration - Egypt Modem configuration - Finland Modem configuration - France Modem configuration - Germany Modem configuration - Greece Modem configuration - Guatemala Modem configuration - Hong_Kong Modem configuration - Hungary Modem configuration - India Modem configuration - Indonesia Modem configuration - Ireland Modem configuration - Israel Modem configuration
60000CRG0-35B
1155
Command Reference Guide Italy Japan Jordan Korea Kuwait Lebanon Malaysia Mexico Morocco Netherlands New_Zealand Norway Oman Panama Peru Philippines Poland Portugal Puerto_Rico Qatar Russia Saudi_Arabia Singapore Slovakia Slovenia South_Africa Spain Sweden Switzerland Syria Taiwan Thailand Trinidad Tunisia Turkey UAE UK USA/Canada Uruguay Venezuela Yemen
Global Configuration Mode Command Set - Italy Modem configuration - Japan Modem configuration - Jordan Modem configuration - Korea Modem configuration - Kuwait Modem configuration - Lebanon Modem configuration - Malaysia Modem configuration - Mexico Modem configuration - Morocco Modem configuration - Netherlands Modem configuration - New_Zealand Modem configuration - Norway Modem configuration - Oman Modem configuration - Panama Modem configuration - Peru Modem configuration - Philippines Modem configuration - Poland Modem configuration - Portugal Modem configuration - Puerto_Rico Modem configuration - Qatar Modem configuration - Russia Modem configuration - Saudi_Arabia Modem configuration - Singapore Modem configuration - Slovakia Modem configuration - Slovenia Modem configuration - South_Africa Modem configuration - Spain Modem configuration - Sweden Modem configuration - Switzerland Modem configuration - Syria Modem configuration - Taiwan Modem configuration - Thailand Modem configuration - Trinidad Modem configuration - Tunisia Modem configuration - Turkey Modem configuration - UAE Modem configuration - UK Modem configuration - USA/Canada Modem configuration - Uruguay Modem configuration - Venezuela Modem configuration - Yemen Modem configuration
60000CRG0-35B
1156
Usage Examples
The following example specifies to use the USA/Canada modem configuration. (config)#modem countrycode USA/Canada
60000CRG0-35B
1157
Syntax Description
<number> destination source interface <interface> Selects the monitor session number (only one is allowed). Selects the destination interface. Selects the source interface(s). A range of interfaces is allowed. Specifies an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type monitor session <number> [destination | source] interface ? for a complete list of valid interfaces. Optional. Monitors both transmitted and received traffic. Optional. Monitors received traffic only. Optional. Monitors transmitted traffic only. Removes the virtual local area network (VLAN) tag that is normally appended to mirrored traffic. Allows native traffic to continue to pass on the port set as the mirroring session destination.
Default Values
By default, traffic is monitored in both directions. Also by default, the destination port is isolated from passing native traffic.
Command History
Release 5.1 Release 13.1 Command was introduced. Command was expanded to include the no-isolate parameter.
60000CRG0-35B
1158
Usage Examples
The following example sets Ethernet 0/1 as the destination interface and adds Ethernet 0/2, Ethernet 0/3, and Ethernet 0/5 as source ports: (config)#monitor session 1 destination interface eth 0/1 (config)#monitor session 1 source interface eth 0/2-3, eth 0/5 The following example sets Gigabit-Switchport 0/1 as the destination interface and removes the VLAN tag: (config)#monitor session 1 destination interface gigabit-switchport 0/1 no-tag The following example sets Switchport 0/1 as the source interface and monitors both transmitted and received traffic: (config)#monitor session 1 source interface switchport 0/1 both The following example sets Gigabit-Switchport 0/1, and Switchport 0/2 through Switchport 0/12 as source interfaces and monitors only received traffic: (config)#monitor session 1 source interface gigabit 0/1, eth 0/2-12 rx
60000CRG0-35B
1159
network-forensics ip dhcp
Use the network-forensics ip dhcp command to enable passive monitoring of Dynamic Host Configuration Protocol (DHCP) message exchanges between the server and the client. Using the no form of this command disables network forensics. Syntax Description
No subcommands.
Default Values
By default, this feature is disabled.
Command History
Release 17.8 Command was introduced.
Functional Notes
Network forensics is an AOS feature that collects client information through DHCP messages sent between clients connected to the network and the network server. Once network forensics is enabled, the AOS unit begins collecting DHCP information. The collected data can be viewed either by using the command show network-forensics ip dhcp on page 635 or debug network-forensics ip dhcp on page 315 to view the information in realtime. For more information about network forensics, refer to the Network Forensics in AOS troubleshooting guide available online at http://kb.adtran.com.
Usage Examples
The following example enables the network forensics feature: (config)#network-forensics ip dhcp
60000CRG0-35B
1160
ntp master
Use the ntp master command to globally set the system as an authoritative Network Time Protocol (NTP) server. Variations of this command include:
ntp master ntp master <value>
Syntax Description
<value> Optional. Specify the stratum number. The valid range is 1 to 15. We recommend not setting the stratum higher than 2.
Default Values
By default, the NTP server is not enabled.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example enables the master NTP server: (config)#ntp master
60000CRG0-35B
1161
Default Values
By default, the maximum associations is 100.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example specifies the maximum associations of 250: (config)#ntp max-associations 250
60000CRG0-35B
1162
Syntax Description
<name> maxpoll <value> Specify the host name or IP address of the NTP server. Optional. Specifies the maximum polling interval for NTP packets, in seconds as a power of two. The allowable range is 4 to 17. For example, setting the maxpoll to 10 would indicate a maximum polling interval of 1024 seconds. Refer to Functional Notes on page 1165 for more information. Optional. Specifies the minimum polling interval for NTP packets, in seconds as a power of two. The allowable range is 4 to 17. For example, setting the minpoll to 6 would indicate a minimum polling interval of 64 seconds. Refer to Functional Notes on page 1165 for more information. Optional. Disables the rapid synchronization feature. Optional. Specifies the preference of using the specified server above all other configured NTP servers. Optional. Specifies the source interface (physical or virtual) to use for the peer. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; and for an ATM subinterface, use atm 1.1. Enter ntp peer <name> source ? for a list of valid interfaces. Specifies the version number for outgoing NTP packets. Valid range is 2 to 4.
minpoll <value>
version
Default Values
By default, the ntp peer is not set. Once enabled, the default version is 4, the default minpoll interval is 6 (64 seconds) and the default maxpoll interval is 10 (1024 seconds).
60000CRG0-35B
1163
Command History
Release 17.2 Release 17.6 Release A4.01 Command was introduced. Command was expanded to include maxpoll and minpoll parameters. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
The ntp peer command can be executed with any combination of the following parameters: maxpoll <value> minpoll <value> normal-sync prefer source <interface> version For example, the normal-sync and source <interface> parameters can be used in conjunction with one another. In this case, the command would look like this: #ntp peer 10.10.10.1 normal-sync source ppp 1 These parameters can be combined in any order to get the desired configuration. In order to determine the appropriate value to enter for maxpoll or minpoll, use the following formula: 2n where n = <value>. For example, to set the minimum polling interval to 64 seconds, you would enter 6 as the minpoll value. This corresponds to 26 in the formula, or 2x2x2x2x2x2, which equals 64 seconds.
Usage Examples
The following example defines 10.10.10.1 as the NTP peer server: (config)#ntp peer 10.10.10.1 The following example creates a peer association with 10.10.10.1 and sets the maximum polling interval of 64 seconds: (config)#ntp peer 10.10.10.1 maxpoll 6
60000CRG0-35B
1164
Syntax Description
<name> maxpoll <value> Specify the host name or IP address of the NTP server. Optional. Specifies the maximum polling interval for NTP packets, in seconds as a power of two. The allowable range is 4 to 17. For example, setting the maxpoll to 10 would indicate a maximum polling interval of 1024 seconds. Refer to Functional Notes on page 1167 for more information. Optional. Specifies the minimum polling interval for NTP packets, in seconds as a power of two. The allowable range is 4 to 17. For example, setting the minpoll to 6 would indicate a minimum polling interval of 64 seconds. Refer to Functional Notes on page 1167 for more information. Optional. Specifies the preference of using the specified server above all other configured NTP servers. Optional. Specifies the source interface (physical or virtual) to use for the server. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; and for an ATM subinterface, use atm 1.1. Enter ntp server <name> source ? for a list of valid interfaces. Specifies the version number for outgoing NTP packets. Valid range is 2 to 4.
minpoll <value>
version <number>
Default Values
By default, the ntp server is not set. Once enabled, the default version is 3, the default minpoll interval is 6 (64 seconds) and the default maxpoll interval is 10 (1024 seconds).
60000CRG0-35B
1165
Command History
Release 17.2 Release 17.6 Release A4.01 Command was introduced. Command was expanded to include maxpoll and minpoll parameters. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Functional Notes
The ntp server command can be executed with any combination of the following parameters: maxpoll <value> minpoll <value> prefer source <interface> version For example, the prefer and source <interface> parameters can be used in conjunction with one another. In this case, the command would look like this: #ntp server 10.10.10.1 prefer source ppp 1 These parameters can be combined in any order to get the desired configuration. In order to determine the appropriate value to enter for maxpoll or minpoll, use the following formula: 2n where n = <value>. For example, to set the minimum polling interval to 64 seconds, you would enter 6 as the minpoll value. This corresponds to 26 in the formula, or 2x2x2x2x2x2, which equals 64 seconds.
Usage Examples
The following example defines 10.10.10.1 as the preferred NTP server: (config)#ntp server 10.10.10.1 prefer The following example associates the NTP server 10.10.10.1 and sets the minimum polling interval of 256 seconds: (config)#ntp server 10.10.10.1 maxpoll 8
60000CRG0-35B
1166
Default Values
By default, the NTP source interface is not set.
Command History
Release 17.2 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following example defines NTP source interface as ppp 1: (config)#ntp source ppp 1
60000CRG0-35B
1167
ntp update-rtc
Use the ntp update-rtc command to specify periodically updating the clock in real time. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, the Network Time Protocol (NTP) is disabled.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example sets the clock to periodically update the timing: (config)#ntp update-rtc
60000CRG0-35B
1168
Default Values
By default, the maximum IPv4 and IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example sets the maximum number of ACP sessions allowed in the AOS unit (for both IPv4 and IPv6 ACP sessions) to 250000: (config)#policy-class max-sessions 250000
60000CRG0-35B
1169
Syntax Description
<name> <portal> console ftp http-admin ssh telnet Specifies the name of the portal list (maximum of 80 characters). Specifies the portals assigned to this portal list. The list can contain any combination of the portals listed below: Allows the list holder to access the unit via the console. Allows the list holder to access the unit via File Transfer Protocol (FTP). Allows the list holder to view the configuration and statistics via Hypertext Transfer Protocol (HTTP). Allows the list holder to access the unit via secure shell (SSH). Allows the list holder to access the unit via Telnet.
Default Values
By default, no portal lists are defined.
Command History
Release 17.1 Command was introduced.
Functional Notes
The same portal list can be assigned to multiple user names. Once the list is assigned to the user name, that user name can only authenticate the portals in the list. If a list is not assigned to a user name, that user name can be used with any portal that is set for local login.
Usage Examples
The following example assigns the console, telnet, and ssh portals the portal list engineers: (config)#portal-list engineers console telnet ssh
60000CRG0-35B
1170
port-auth default
Use the port-auth default command to set all global port-authentication settings to their default states. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example sets all global port-authentication settings to their default states: (config)#port-auth default
60000CRG0-35B
1171
Default Values
By default, the maximum number of authentication requests is set at 2.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example sets the maximum number of authentication requests at 4: (config)#port-auth max-req 4
60000CRG0-35B
1172
port-auth re-authentication
Use the port-auth re-authentication command to enable re-authentication. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, re-authentication is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example enables re-authentication: (config)#port-auth re-authentication
60000CRG0-35B
1173
port-auth supplicant
Use the port-auth supplicant command to enable the port-authentication supplicant mode feature and to enter the Port-Authentication Supplicant Configuration mode. Use the no form of this command to remove the supplicant mode parameters. Variations of this command include:
port-auth supplicant port-auth supplicant username <username> password <password>
Syntax Description
supplicant username <username> password <password> Specifies that port authentication is in supplicant mode. Specifies the user name used for supplicant authentication. Specifies the password used for supplicant authentication.
Default Values
By default, port authentication and port authentication supplicant mode is disabled.
Command History
Release 10.1 Command was introduced.
Functional Notes
The supplicant user name and password can be stored in the port and set in the session if it exists. This allows for the user name and password to be set before the supplicant functionality is enabled.
Usage Examples
The following example sets the user name of admin and the password of password for supplicant mode authentication on the eth 0/1 interface: (config)#interface eth 0/1 (config-eth-0/1)#port-auth supplicant username admin password password
60000CRG0-35B
1174
port-auth timeout
Use the port-auth timeout command to configure various port authentication timers. Use the no form of this command to return to the default setting. Variations of this command include:
port-auth timeout quiet-period <value> port-auth timeout re-authperiod <value> port-auth timeout tx-period <value>
Syntax Description
quiet-period <value> re-authperiod <value> tx-period <value> Specifies the amount of time the system will wait before attempting another authentication once a failure has occurred. Range is 1 to 65535 seconds. Specifies the amount of time between scheduled re-authentication attempts. Range is 1 to 4294967295 seconds. Specifies the amount of time the authenticator will wait between identity requests. Range is 1 to 65535 seconds.
Default Values
By default, quiet-period is set to 60 seconds, re-authperiod is set to 3600 seconds (1 hour), and tx-period is set to 30 seconds.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example sets the quiet-period to 10 seconds: (config)#port-auth timeout quiet-period 10
60000CRG0-35B
1175
port-channel load-balance
Use the port-channel load-balance command to configure port aggregation load distribution. Use the no form of this command to reset distribution to its default setting. Variations of this command include:
port-channel load-balance dst-mac port-channel load-balance src-mac
Syntax Description
dst-mac src-mac Specifies the destination medium access control (MAC) address. Specifies the source MAC address.
Default Values
By default, load balance is set to src-mac.
Command History
Release 5.1 Command was introduced.
Functional Notes
During port aggregation, the port channel interface must determine on which physical port to transmit packets. With the source-address configuration, the source MAC address of the received packets is used to determine this allocation. Packets coming from a specific host always use the same physical port. Likewise, when the destination address configuration is used, packets are forwarded based on the MAC address of the destination. Packets destined for a specific host always use the same physical port.
Usage Examples
The following example sets the load distribution to use the destination MAC address: (config)#port-channel load-balance dst-mac
60000CRG0-35B
1176
Default Values
By default, this command is enabled.
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example enables the power supplies to shut down automatically if the temperature gets too high: (config)#power-supply shutdown automatic
60000CRG0-35B
1177
probe
Use the probe command to create a probe as part of network monitoring. This command is also used to enter into the Network Monitoring Probe command set once a probe is created. A probe can be one of five types: http-request, icmp-echo, icmp-timestamp, tcp-connect, or twamp. Each probe type has a set of commands used for configuration. These additional commands are covered in Network Monitor Probe Command Set on page 2590. Use the no form of this command to delete the probe. Variations of this command include:
probe <name> http-request probe <name> icmp-echo probe <name> icmp-timestamp probe <name> tcp-connect probe <name> twamp
The probe is not operational until tolerance is defined. Refer to Network Monitor Probe Command Set on page 2590 for more information.
Syntax Description
<name> http-request icmp-echo icmp-timestamp tcp-connect twamp Specifies the name of the probe being created, or indicates the probe affected by the commands that follow. Specifies the probe type being created as an Hypertext Transfer Protocol (HTTP) request. Specifies the probe type being created as an Internet Control Message Protocol (ICMP) echo. Specifies the probe type being created as an ICMP timestamp. Specifies the probe type being created as a Transmission Control Protocol (TCP) connect. Specifies the probe type being created as a Two-Way Active Measurement Protocol (TWAMP).
Default Values
By default, there are no probes configured.
60000CRG0-35B
1178
Command History
Release 13.1 Release 17.2 Command was introduced. Command was expanded to include the ICMP timestamp and TWAMP probe types.
Usage Examples
The following example creates an ICMP echo probe called probe1: >enable #configure terminal (config)#probe probe1 icmp-echo (config-probe-probe1)#
Technology Review
Probes are standalone objects that help determine the status of a route based on the success or failure of probe traffic across the path. The probes can be configured to trigger at particular intervals. There are three types of probes supported by AOS: icmp-echo, tcp-connect, and http-request. Commands common to all the probe types are identified in the following section, as well as isolated commands that only apply to the specific probe types. Additional configuration commands are available for associating tracks with each probe. These are explained in the Network Monitor Track Command Set on page 2629.
60000CRG0-35B
1179
probe responder
Use the probe responder command to enable a probe responder to respond to specific probe packets. Additional commands for each responder type are covered in Network Monitor Probe Responder Command Set on page 2618. Use the no form of this command to stop the probe responder from responding to the specific probe packets. Variations of this command include:
probe responder icmp-timestamp probe responder twamp probe responder udp-echo
Issue the no shutdown command to activate the probe responder once it is configured.
Syntax Description
icmp-timestamp twamp udp-echo Specifies the probe responder type as Internet Control Message Protocol (ICMP) timestamp. Specifies the probe responder type as Two-Way Active Measurement Protocol (TWAMP). Specifies the probe responder type as a User Datagram Protocol (UDP) echo.
Default Values
By default, there are no probe responders enabled.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example enables the UDP echo probe responder: >enable #configure terminal (config)#probe responder udp-echo (config-probe-probe1)#
60000CRG0-35B
1180
Default Values
By default, CoS 0 and 1 are mapped to queue 1; CoS 2 and 3 are mapped to queue 2; CoS 4 and 5 are mapped to queue 3; CoS 6 and 7 are mapped to queue 4.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example maps CoS values 4 and 5 to queue 1: (config)#qos cos-map 1 4 5
60000CRG0-35B
1181
qos dscp-cos
Use the qos dscp-cos command to set the differentiated services code point (DSCP) to class of service (CoS) map and enable the mapping process. Use the no form of this command to disable mapping. Variations of this command include:
qos dscp-cos <dscp value> to <cos value> qos dscp-cos default
Syntax Description
<dscp value> <cos value> default Specifies DSCP values (separating multiple values with a space). Valid range is 0 to 63. Specifies CoS values (separating multiple values with a space). Valid range is 0 to 7. Sets the map to the following default values: DSCP CoS 0 0 | | 8 1 | | 16 | 2 | 24 | 3 | 32 | 4 | 40 | 5 | 48 | 6 | 56 7
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Functional Notes
When one of the specified DSCP values is detected in an incoming packet, the CoS priority is altered based on the corresponding map value. By configuring the list, the mapping functionality is enabled.
Usage Examples
The following example enables the mapping of DSCP values 24 and 48 to CoS values 1 and 2: (config)#qos dscp-cos 24 48 to 1 2 The following example disables DSCP-to-CoS mapping: (config)#no qos dscp-cos
60000CRG0-35B
1182
Syntax Description
<name> <number> match-all match-any Specifies the QoS map name. Assigns a sequence number to differentiate this QoS map and provide a match order. Valid range is 0 to 65535. Optional. Indicates the traffic must match all conditions before the set action is issued. Optional. Indicates the traffic can match any of the conditions to be processed, which is the default behavior.
Default Values
By default, there are no QoS maps defined. Once created, the default behavior is to match any of the conditions set for the QoS map.
Command History
Release 6.1 Release 17.2 Command was introduced. Command was expanded to include the match-all and match-any parameters.
Functional Notes
AOS uses QoS maps to classify packets into groups for matching. A QoS map contains multiple class entries, each of which has packet match cases, and a set of actions for the particular group (actions are defined by bandwidth, priority, set, and shape commands). Multiple map entries for the same QoS map are differentiated by a sequence number. The sequence number is used to assign the order in which the conditions are matched. Once created, a QoS map must be applied to an interface (using the qos-policy out command) in order to actively process traffic. Refer to qos-policy on page 1554 for more information on assigning the map to an interface. Any traffic for the interface that is not sent to the priority queue is sent using the default queuing method for the interface (such as weighted fair queuing (WFQ)).
60000CRG0-35B
1183
Usage Examples
The following example demonstrates basic settings for a QoS map and assigns a map to the Frame Relay interface: >enable #config terminal (config)#qos map VOICEMAP 10 (config-qos-map)#match precedence 5 (config-qos-map)#priority 512 (config-qos-map)#exit (config)#interface fr 1 (config-fr 1)#qos-policy out VOICEMAP
60000CRG0-35B
1184
Default Values
By default, the queue type is weighted round robin (WRR).
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example enables strict-priority queuing: (config)#qos queue-type strict-priority
60000CRG0-35B
1185
Syntax Description
<weight1-4> Sets the weight of each queue (up to four). All queue weights must be greater than zero, except for the weight for the last queue (queue 4). The range for queues 1 to 3 is 1 to 255. The range for queue 4 is 0 to 255. The queue 4 entry can be replaced by the expedite command. If set to expedite, then it becomes a high-priority queue. All outbound traffic is transmitted on an expedite queue prior to any other traffic in other queues.
expedite
Default Values
By default, all four weights are set to 25.
Command History
Release 5.1 Command was introduced.
Functional Notes
The actual weight is a calculated value based on the sum of all entered weights. It is the ratio of the individual weight over the sum of all weights. For example: If the user enters 10, 20, 30, and 40 as the weight values, the first queue will have a ratio of 1/10. This is derived from the formula 10/(10+20+30+40). Therefore, this queue will transmit 1 packet out of every 10 opportunities.
Usage Examples
The following example configures weights for all four queues: (config)#qos queue-type wrr 10 20 30 40
60000CRG0-35B
1186
radius-server
Use the radius-server command to configure several remote authentication dial-in user service (RADIUS) parameters for all RADIUS servers on the network. Most of these global settings can be overridden on a per-server basis (using the command radius-server host on page 1190). Use the no form of this command to return to the default setting. Variations of this command include the following:
radius-server challenge-noecho radius-server deadtime <value> radius-server enable-username <name> radius-server key <key> radius-server retry <number> radius-server timeout <value>
Syntax Description
challenge-noecho deadtime <value> Specifies that when users enter text in response to challenge questions the entered text does not appear on the screen. Specifies the time to wait (in minutes) before attempting to reconnect to a RADIUS server that has timed out. Range is 0 to 1440 minutes. Changing this parameter changes the time to wait for all configured RADIUS servers. Specifies a user name to be used for authentication to enter the Enable mode. This user name is the name sent for AAA Enable mode access requests. Changing this parameter changes the user name for all configured RADIUS servers. Specifies the encryption key shared by all RADIUS servers. This is a global setting; however, it can be overridden on a per-server basis. Specifies the number of connection attempts to a RADIUS server. Attempt range is 0 to 10. This is a global setting; however, it can be overridden on a per-server basis. Specifies the amount of time (in seconds) that RADIUS servers have to respond to a request. Time range is 1 to 1000 seconds. This is a global setting; however, it can be overridden on a per-server basis.
enable-username <name>
timeout <value>
Default Values
challenge-noecho deadtime enable-username key retry timeout Echo is disabled and users do not see on-screen what they enter. 0 minutes $enab15$ No default 0 attempts 5 seconds
60000CRG0-35B
1187
Command History
Release 5.1 Release 7.1 Command was introduced. Added the enable-username selection.
Functional Notes
It is recommended that you use a user name that is a unique name for your network and one that only the network administrators know. If the default user name is used, it is possible for unauthorized users to gain access to the network. By default, there is a 0 minute wait time before attempting to reconnect to a timed out server. Leaving the wait time at 0 minutes means that the server will never be declared dead. The time period value is 0 to 1440 minutes, although you should enter a value of at least 1 minute or greater.
Usage Examples
The following example shows a typical configuration of these parameters: (config)#radius-server deadtime 10 (config)#radius-server enable-username fantastico (config)#radius-server key mysecretkey (config)#radius-server retry 4 (config)#radius-server timeout 2
60000CRG0-35B
1188
radius-server host
Use the radius-server host command to specify the parameters for a remote authentication dial-in user service (RADIUS) server. Use the no form of this command to return to the default setting. Variations of this command include:
radius-server host <hostname | ip address> radius-server host <hostname | ip address> acct-port <port> radius-server host <hostname | ip address> auth-port <port> radius-server host <hostname | ip address> key <key> radius-server host <hostname | ip address> retransmit <number> radius-server host <hostname | ip address> timeout <value>
Each parameter after <hostname | ip address> specifies the characteristics of the individual RADIUS server. Parameters can be entered in a single command line, in any order, but each may only be used once. Syntax Description
<hostname | ip address> Specifies the server to configure. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). If a host name is used, a domain naming system (DNS) server should be learned by the AOS device using Dynamic Host Configuration Protocol (DHCP), Point-to-Point Protocol (PPP), or specified in the Global Configuration mode with the command ip name-server on page 983. Specifies the User Datagram Protocol (UDP) port used by the AAA accounting server. Port range is 0 to 65535. This command is reserved for future use as currently AOS does not allow RADIUS servers for use with AAA accounting. Specifies the UDP port used by the AAA authentication server. The port range is 0 to 65535. Specifies the encryption key used by the RADIUS server. This command overrides the global RADIUS key setting (set with the command radius-server on page 1188). This command must be entered last in the command line because everything after the key parameter is read as the new key. Specifies the number of connection attempts made to the server. Attempt range is 1 to 100. Specifies the time to wait (in seconds) for this server to reply to requests. Range is 1 to 1000 seconds.
acct-port <port>
Default Values
By default, acct-port is set to 1813 and auth-port is set to 1812. By default, the key, retransmit and timeout values are the values set by the command radius-server on page 1188.
60000CRG0-35B
1189
Command History
Release 5.1 Command was introduced.
Functional Notes
At a minimum, the address (IP or host name) of the server must be given. The other parameters can be entered in any order (except the key parameter) and, if the parameters are not specified, they will take default values or fall back on the global RADIUS servers default settings (set using the command radius-server on page 1188).
Usage Examples
The following example specifies that the RADIUS server at IP address 10.10.10.2 uses the global key setting (left unspecified), a timeout value of 10 seconds, the default authorization port (left unspecified), and a retransmit number of 5: (config)#radius-server host 10.10.10.2 retransmit 5 timeout 10
60000CRG0-35B
1190
resource-utilization
Use the resource-utilization command to set a threshold limit for CPU or heap utilization notifications. When the utilization threshold is surpassed, a resource trap is sent. Use the no form of this command to remove the threshold setting. Variations of this command include:
resource-utilization cpu threshold <percentage> time-interval <value> resource-utilization heap threshold <percentage>
Syntax Description
cpu heap threshold <percentage> time-interval <value> Sets the threshold for CPU utilization notification. Sets the threshold for heap utilization notification. Specifies the threshold limit as a percentage of resource utilization. Valid range is 1 to 100 percent. Specifies the time interval for the actual utilization to exceed the threshold before a notification is sent. Valid range is 1 to 86400 seconds.
Default Values
By default, there are no thresholds configured.
Command History
Release A2.04 Command was introduced.
Functional Notes
Simple Network Management Protocol (SNMP) resource traps must be enabled before exceeded threshold notifications are sent. Refer to snmp-server enable traps on page 1208.
Usage Examples
The following example configures the CPU resource notification to be sent when the CPU usage maintains at least 75 percent utilization for 40 seconds: (config)#resource-utilization cpu threshold 75 time-interval 40
60000CRG0-35B
1191
route-map
Use the route-map command to create a route map and enter the Route Map Configuration command set. A route map is a type of filter that matches various attributes and then performs actions on the way the route is redistributed. Use the no form of this command to delete a route map. Variations of this command include:
route-map <name> <number> route-map <name> deny <number> route-map <name> permit <number>
Syntax Description
<name> deny permit <number> Specifies a name for the route map. Specifies not to redistribute routes matching the route map attributes. Redistributes routes matching the route map attributes. Specifies a sequence number of this route entry. Range is 1 to 4294967295.
Default Values
By default, no route maps are defined.
Command History
Release 9.3 Command was introduced.
Functional Notes
Route maps can be used to filter inbound and outbound routes and to apply attributes to the routes being filtered. A route map applied to outbound data determines how the router advertises routes to a neighbor. The outbound route map can be configured to perform such tasks as: Define the routes that the router can advertise according to specified attributes or prefixes. Prepend private AS numbers to specific routes to help balance inbound traffic. Set an MED on specific routes to help balance inbound traffic. Request that the neighbor advertise the route to certain communities only. When a route map is applied to inbound data, it determines which of the service provider advertised routes the local router accepts.
The inbound route map can be configured to perform such tasks as: Filter external routes according to specified attributes or prefixes Apply attributes to filtered routes, including:
60000CRG0-35B
1192
The route map itself is created first. Matching criteria and attributes are defined within the route map configuration menu. Once a route map has been established, it can be assigned to a BGP neighbor. Match and set commands used for filtering and defining attributes are found in the Route Map Command Set on page 2916. Route maps can be assigned to a neighbor using the command route-map <name> on page 2583.
Usage Examples
The following example creates the route map, specifies that routes matching its criteria will be denied, and assigns a sequence number of 100: (config)#route-map MyMap deny 100 (config-route-map)# You can then define the attributes of the route map from the Route Map Configuration command set. Enter a ? at the (config-route-map)# prompt to explore the available options.
60000CRG0-35B
1193
Specifies the AS number of the local system of which this BGP router is a member. Range is 1 to 4294967295.
Default Values
By default, BGP is disabled.
Command History
Release 10.1 Release 18.1 Command was introduced. Command was altered to support 4-byte AS numbers (previously AOS only supported 2-byte numbers).
Functional Notes
The AS number of the local system of which this BGP router is a member must always be entered with this command, even when re-entering BGP Configuration mode after BGP has already been activated on the router.
Usage Examples
The following example uses the router bgp command to enable BGP and enter the BGP Configuration mode: (config)#router bgp 100 (config-bgp)#
60000CRG0-35B
1194
router ospf
Use the router ospf command to activate open shortest path first (OSPF) in the router and to enter the OSPF Configuration mode. Refer to the Router (OSPF) Command Set on page 2646 for more information. Use the no form of this command to disable OSPF routing. Syntax Description
No subcommands.
Default Values
By default, OSPF is disabled.
Command History
Release 3.1 Command was introduced.
Functional Notes
AOS can be configured to use OSPF with the firewall enabled (using the ip firewall command). To do this, configure the OSPF networks as usual, specifying which networks the system will listen for and broadcast OSPF packets to. Refer to ip firewall on page 920 for more information. To apply stateful inspection to packets coming into the system, create a policy class that describes the type of action desired and then associate that policy class to the particular interface (refer to ip policy-class <ipv4 acp name> on page 985). The firewall is intelligent and will only allow OSPF packets that were received on an OSPF configured interface. No modification to the policy class is required to allow OSPF packets into the system.
Usage Examples
The following example uses the router ospf command to enter the OSPF Configuration mode: (config)#router ospf
60000CRG0-35B
1195
router pim-sparse
Use the router pim-sparse command to globally enable protocol-independent multicast (PIM) on the unit and to enter the PIM Sparse Configuration mode. Use the no form of this command to disable PIM Sparse routing. Refer to the Router (PIM Sparse) Command Set on page 2667 for more information on the subcommands for PIM Sparse Configuration mode. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Functional Notes
Additional commands for PIM are found in the related interface configuration modes. Refer to the ip pim-sparse commands in sections such as Ethernet Interface Command Set on page 1457, Frame Relay Subinterface Command Set on page 1958, HDLC Interface Command Set on page 2044, Loopback Interface Command Set on page 2121, PPP Interface Command Set on page 2192, Tunnel Interface Command Set on page 2310, and VLAN Interface Command Set on page 2401 for more information.
Usage Examples
The following example uses the router pim-sparse command to enter the PIM Sparse Configuration mode: (config)#router pim-sparse (config-pim-sparse)#
60000CRG0-35B
1196
router rip
Use the router rip command to enter the RIP Configuration mode. Use the no form of this command to disable Routing Information Protocol (RIP) routing. Refer to the Router (RIP) Command Set on page 2672 for more information. Syntax Description
No subcommands.
Default Values
By default, RIP is disabled.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example uses the router rip command to enter the RIP Configuration mode: (config)#router rip (config-rip)#
Technology Review
The RIP protocol is based on the Bellham-Ford (distance-vector) algorithm. This algorithm provides that a network will converge to the correct set of shortest routes in a finite amount of time, provided that: Gateways continuously update their estimates of routes. Updates are not overly delayed and are made on a regular basis. The radius of the network is not excessive. No further topology changes take place. RIP is described in RFC 1058 (Version 1) and updated in RFCs 1721, 1722, and 1723 for Version 2. Version 2 includes components that ease compatibility in networks operating with RIP V1. All advertisements occur on regular intervals (every 30 seconds). Normally, a route that is not updated for 180 seconds is considered dead. If no other update occurs in the next 60 seconds for a new and better route, the route is flushed after 240 seconds. Consider a connected route (one on a local interface). If the interface fails, an update is immediately triggered for that route only (advertised with a metric of 16). Now consider a route that was learned and does not receive an update for 180 seconds. The route is marked for deletion, and even if it was learned on an interface, a poisoned (metric equals 16) route should be sent by itself immediately and during the next two update cycles with the remaining normal split horizon update routes. Following actual deletion, the poison reverse update ceases. If an update for a learned route is not received for 180 seconds, the route is marked for deletion. At that point, a 120-second garbage collection (GC) timer is started. During the GC timer period, expiration updates are sent with the metric for the timed-out route set to 16.
60000CRG0-35B
1197
If an attached interface goes down, the associated route is immediately (within the same random five-second interval) triggered. The next regular update excludes the failed interface. This is the so-called first hand knowledge rule. If a gateway has first hand knowledge of a route failure (connected interfaces) or reestablishment, the same action is taken. A triggered update occurs, advertising the route as failed (metric equals 16) or up (normal metric) followed by the normal scheduled update. The assumption here is that if a gateway missed the triggered update, it will eventually learn from another gateway in the standard convergence process. This conserves bandwidth. RIP-Related Definitions: Route Gateway Hop Advertisement Update A description of the path and its cost to a network. A device that implements all or part of RIP (a router). A metric that provides the integer distance (number of intervening gateways) to a destination network gateway. A broadcast or multicast packet to port 520 that indicates the route for a given destination network. An advertisement sent on a regular 30-second interval, including all routes exclusive of those learned on an interface.
60000CRG0-35B
1198
Default Values
No default values are necessary for this command.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example initiates the test1.tcl Tcl script file: #run tcl test1.tcl Script execution complete #
60000CRG0-35B
1199
schedule <name>
Use the schedule command to create a general-purpose schedule. Use the no form of this command to delete a schedule. Variations of this command include:
schedule <name>
Additional subcommands are available once you have entered the Schedule Configuration mode:
absolute start <schedule> end <schedule> periodic <day> [<time> to <time>] periodic <day> <time> to <day> <time> periodic <day> [<time> for <duration>] periodic <day> <time> for <duration> periodic <time> for <duration> <day> periodic daily <time> to <time> periodic daily <time> for <duration> periodic weekday <time> to <time> periodic weekday <time> for <duration> periodic weekend <time> to <time> periodic weekend <time> for <duration> relative start-after <delay>
Syntax Description
<name> absolute start end <schedule> Specifies the name of the schedule. Indicates the schedules start and end time and date values. Specifies the start and end schedules. Schedules are expressed in the format <time> <day> <month> <year> (for example, 08:15 2 February 2007). Time is expressed in the 24-hour format hours:minutes (hh:mm) (for example, 08:15). The day of the month is expressed with a number. Range is 1 to 31. The name of the month can be spelled out or abbreviated. The year is expressed in the format yyyy (for example, 2007). Specifies the weekly behavior of the schedule by configuring start/end days, times, and duration. Specifies the schedules start/end day and time. Specifies the schedules duration. Duration is expressed in the 24-hour format hours:minutes (hh:mm). Optional. Specifies recurring period to be every day of the week. Optional. Specifies recurring period to be Monday through Friday. Optional. Specifies recurring period to be Saturday and Sunday. Time is expressed in the 24-hour format hours:minutes (hh:mm) (for example, 08:15).
<time> <day> <month> <year> periodic to for <duration> daily weekday weekend <time>
60000CRG0-35B
1200
Global Configuration Mode Command Set The day of the week can be spelled out or abbreviated. Specifies the time delay before the schedule becomes active. Valid range is 1 to 65535 seconds.
Default Values
By default, no schedules exist.
Functional Notes
Periodic schedules can be expressed in the format <day> <time> to <day> <time> (for example, periodic monday 08:15 to wednesday 17:15), or up to 7 days can be entered (for example, periodic tuesday wednesday thursday 08:15 to 17:15).
Command History
Release 14.1 Release 15.1 Release 16.1 Command was introduced. Command was expanded. Command was expanded to include the for parameter.
Usage Examples
The following example creates a schedule Closed and enters the Schedule Configuration mode: (config)#schedule Closed (config-schedule-Closed)# The following example sets the start time in the schedule named Closed to 8:15 a.m. on February 2, 2007, and sets the end time to 10:15 a.m. on April 2, 2007: (config-schedule-Closed)#absolute start 08:15 2 february 2007 end 10:15 2 april 2007 The following example sets the recurring start and end day and time in the schedule named Closed to Saturday from 8:15 a.m. to 5:15 p.m.: (config-schedule-Closed)#periodic saturday 08:15 to 17:15 The following example sets the execution delay for the schedule named Closed to 30 seconds: (config-schedule-Closed)#relative start-after 30 The following example sets the duration for the schedule named Closed to 30 minutes at 1:00 p.m. every day of the week: (config-schedule-Closed)#periodic daily 13:00 for 00:30
60000CRG0-35B
1201
service password-encryption
Use the service password-encryption command to turn on global password protection. Use the no form of this command to return to the default setting. If you need to go back to a previous revision of the code (e.g., AOS Revision 10), this command must be disabled first. Once the service is disabled, all necessary passwords must be re-entered so that they are in the clear text form. If this is not done properly, you will not be able to log back in to the unit after you revert to a previous revision that does not support password encryption. Syntax Description
No subcommands.
Default Values
By default, global password protection is disabled.
Command History
Release 11.1 Command was introduced.
Functional Notes
When enabled, all currently configured passwords are encrypted. Also, any new passwords are encrypted after they are entered. Password encryption is applied to all passwords, including passwords for user name, Enable mode, Telnet/console, Point-to-Point Protocol (PPP), Border Gateway Protocol (BGP), and authentication keys. When passwords are encrypted, unauthorized persons cannot view them in configuration files since the encrypted form of the password is displayed in the running-config. While this provides some level of security, the encryption method used with password encryption is not a strong form of encryption so you should take additional network security measures.
You cannot recover a lost encrypted password. You must erase the startup-config and set a new password.
Usage Examples
The following example enables password encryption for all passwords on the unit: (config)#service password-encryption
60000CRG0-35B
1202
Default Values
By default, the maximum length of the SNMP IF.MIB alias is 64 characters.
Command History
Release 17.4 Command was introduced.
Usage Examples
The following example enables a longer SNMP IF.MIB alias length: (config)#snmp ifmib alias long
60000CRG0-35B
1203
Default Values
By default, the snmp-server chassis-id is set to Chassis ID.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example configures a chassis ID of A432692: (config)#snmp-server chassis-id A432692
60000CRG0-35B
1204
snmp-server community
Use the snmp-server community command to specify a community string to control access to the Simple Network Management Protocol (SNMP) information. Use the no form of this command to remove a specified community. Variations of this command include:
snmp-server community <community> snmp-server community <community> <listname> snmp-server community <community> ro snmp-server community <community> ro <listname> snmp-server community <community> rw snmp-server community <community> rw <listname> snmp-server community <community> view <viewname> snmp-server community <community> view <viewname> <listname> snmp-server community <community> view <viewname> ro snmp-server community <community> view <viewname> ro <listname> snmp-server community <community> view <viewname> rw snmp-server community <community> view <viewname> rw <listname>
Syntax Description
<community> <listname> Specifies the community string (a password to grant SNMP access). Optional. Specifies an access control list (ACL) name used to limit access. Refer to ip access-list extended <ipv4 acl name> on page 898 and ip access-list standard <ipv4 acl name> on page 900 for more information on creating ACLs. Optional. Grants read-only access, allowing retrieval of MIB objects. Optional. Grants read-write access, allowing retrieval and modification of MIB objects. Optional. Specifies a previously defined view. Views defined objects available to the community. For information on creating a new view, refer to snmp-server view <name> <value> on page 1224.
ro rw view <viewname>
Default Values
By default, there are no configured SNMP communities.
Command History
Release 1.1 Release 9.1 Command was introduced. Command was expanded to include the view parameter.
Usage Examples
The following example specifies a community named MyCommunity, specifies a previously defined view named blockinterfaces, and assigns read-write access: (config)#snmp-server community MyCommunity view blockinterfaces rw
60000CRG0-35B
1205
snmp-server contact
Use the snmp-server contact command to specify Simple Network Management Protocol (SNMP) server contact information. Use the no form of this command to remove a configured contact. Variations of this command include:
snmp-server contact email <address> snmp-server contact pager <number> snmp-server contact phone <number> snmp-server contact <string>
Syntax Description
email <address> pager <number> phone <number> <string> Specifies email address for the SNMP server contact. Specifies pager number for the SNMP server contact. Specifies phone number for the SNMP server contact. Populates the sysContact string using an alphanumeric string enclosed in quotation marks (up to 32 characters in length).
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example specifies 6536999 for the pager number: (config)#snmp-server contact pager 6536999
60000CRG0-35B
1206
Syntax Description
bgp frame-relay resource snmp Optional. Enables the Border Gateway Protocol (BGP) traps. Optional. Enables the Frame Relay notification traps. Optional. Enables the resource utilization notification traps. This option is only available on AOS voice products. Optional. Enables the SNMP notification traps. The following traps are supported: coldStart warmStart linkUp linkDown authenticationFailure track voice Optional. Enables the network monitor track traps. Optional. Enables voice notification traps.
Default Values
By default, there are no traps enabled.
Command History
Release 1.1 Release 17.3 Release 17.6 Release A2.04 Release 18.1 Command was introduced. Command was expanded to include the Frame Relay. Command was expanded to include voice traps. Command was expanded to include resource traps. Command was expanded to include bgp and track traps.
Functional Notes
Resource utilization traps are configured by using the command resource-utilization on page 1192.
60000CRG0-35B
1207
Usage Examples
The following example enables SNMP traps: (config)#snmp-server enable traps snmp
60000CRG0-35B
1208
SNMP v3 requires unique engine IDs for all systems in the management domain. Use the default engine ID when possible to ensure the uniqueness of the numbers. Problems can occur on a management network that contains duplicate engine IDs. Default Values
By default, the local SNMP-server engine ID is 8000029803xxxxxxxxxxxx (where the string of Xs represents the system medium access control (MAC) address).
Command History
Release 14.1 Command was introduced.
Usage Examples
The following example changes the default engine ID for the local system to 80 00 02 98 00 00 00 00 00 00 01 (where 80 00 02 98 represents the Internet Assigned Numbers Authority (IANA) ID for ADTRAN and 00 00 00 00 00 00 01 arbitrarily represents the first system on the management domain): (config)#snmp-server engineID local 8000029800000000000001
Technology Review
The SNMP v3 engine ID is a unique identifier for a system on a management domain. The default engine ID contains 11 octets (in hexadecimal notation) that represent certain information about the system. The default engine ID format is as follows: Octets 1 to 4 IANA ID for the product manufacturer Octet 5 Octets 6 to 11 System MAC address
03
Identifies that octets 6 through 11 contain a MAC address
60000CRG0-35B
1209
The first 4 octets of the default engine ID for ADTRAN products is 80000298. Octets 1 through 4 represent the SNMP private enterprise number (assigned by the IANA) for the product manufacturer. The leading bit of octet 1 (the most significant bit) will always be a 1 for a default engine ID (making the leading character in the hex string an 8). ADTRAN products use the IANA ID of 664 (which is 02 98 in hexadecimal notation). Octet 5 is set to 03 to indicate that the engine ID uses a MAC address as the unique identifier. The last six octets of the default engine ID for ADTRAN routers contain the MAC address for the Ethernet 0/1 interface (for example, 00127905257c). The snmp-server engineID local command overrides the default engine ID and replaces it with the first 24 characters of the user-entered string. Because the string is in hexadecimal notation, only numbers 0 through 9 and characters a through f are valid. If fewer than 24 characters are entered in the string, pad the end of the entered string with zeros (least significant bits) until the 24-character string is complete. For example, a user input of 8000029805 results in an engine ID of 800002980500000000000000.
60000CRG0-35B
1210
Default Values
By default, there are no remote engine IDs identified.
Command History
Release 14.1 Command was introduced.
Usage Examples
The following example identifies a remote SNMP device with an IP address of 10.10.12.2 and an engine ID of 80000298000000A0C8000001: (config)#snmp-server engineID remote 10.10.12.2 80000298000000A0C8000001
60000CRG0-35B
1211
snmp-server group
Use the snmp-server group command to specify a new Simple Network Management Protocol (SNMP) group to control access to SNMP information. Use the no form of this command to remove a specified group. Variations of this command include:
snmp-server group <groupname> v1 [access <acl> | notify <name> | read <name> | write <name>] snmp-server group <groupname> v2c [access <acl> | notify <name> | read <name> | write <name>] snmp-server group <groupname> v3 auth [access <acl> | notify <name> | read <name> | write <name>] snmp-server group <groupname> v3 noauth [access <acl> | notify <name> | read <name> | write <name>] snmp-server group <groupname> v3 priv [access <acl> | notify <name> | read <name> | write <name>]
Syntax Description
<groupname> v1 v2c v3 auth noauth priv access <acl> notify <name> read <name> write <name> Specifies the name of the SNMP group (32 characters maximum). Uses SNMP version 1 security model. Uses SNMP version 2c security model. Uses SNMP version 3 user-based security model (USM). In version 3, indicates that authentication is used. In version 3, indicates that no authentication is used. In version 3, indicates that privacy authentication is used. Specifies an access control list (ACL) entry. Specifies a notify-view entry (32 characters maximum). Specifies a read-view entry (32 characters maximum). Specifies a write-view entry (32 characters maximum).
Default Values
If no views are specified, the system automatically assigns default read- and notify-views that have no restrictions.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example defines a group called securityV3auth using version 3 security model, authentication, and no ACL to verify: (config)#snmp-server group securityV3auth v3 auth
60000CRG0-35B
1212
snmp-server host
Use the snmp-server host command to configure the host to receive Simple Network Management Protocol (SNMP) notifications. Use the no form of this command to remove a specified host. Variations of this command include the following:
snmp-server host <ip address> informs version 1 <community> snmp-server host <ip address> informs version 1 <community> snmp snmp-server host <ip address> informs version 2c <community> snmp-server host <ip address> informs version 2c <community> snmp snmp-server host <ip address> informs version 3 auth <community> snmp-server host <ip address> informs version 3 auth <community> snmp snmp-server host <ip address> informs version 3 noauth <community> snmp-server host <ip address> informs version 3 noauth <community> snmp snmp-server host <ip address> informs version 3 priv <community> snmp-server host <ip address> informs version 3 priv <community> snmp snmp-server host <ip address> traps <community> snmp-server host <ip address> traps version 1 <community> snmp-server host <ip address> traps version 1 <community> [bgp | frame-relay | snmp | track | voice] snmp-server host <ip address> traps version 2c <community> snmp-server host <ip address> traps version 2c <community> [bgp | frame-relay | snmp | track | voice] snmp-server host <ip address> traps version 3 auth <community> snmp-server host <ip address> traps version 3 auth <community> [bgp | frame-relay | snmp | track | voice] snmp-server host <ip address> traps version 3 noauth <community> snmp-server host <ip address> traps version 3 noauth <community> [bgp | frame-relay | snmp | track | voice] snmp-server host <ip address> traps version 3 priv <community> [bgp | frame-relay | snmp | track | voice] snmp-server host <ip address> traps version 3 priv [bgp | frame-relay | snmp | track | voice]
Syntax Description
<ip address> Specifies the IP address of the SNMP host that receives the SNMP information. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Enables INFORM messages to this host. The following traps are supported: coldStart warmStart linkUp linkDown authenticationFailure traps Enables traps to this host. If the version is not specified, version 1 is used.
informs
60000CRG0-35B
1213
Command Reference Guide version 1 version 2c version 3 auth noauth priv <community> bgp frame-relay snmp track voice
Global Configuration Mode Command Set Uses SNMP version 1 security model. Uses SNMP version 2c security model. Uses SNMP version 3 user-based security model (USM). In version 3, indicates that authentication is used. In version 3, indicates that no authentication is used. In version 3, indicates that privacy authentication is used. Specifies the community string (used as a password) (16 characters maximum) for authorized agents to obtain access to SNMP information. Optional. Enables Border Gateway Protocol (BGP) traps only. Optional. Enables Frame Relay traps only. Optional. Enables SNMP traps only. Optional. Enables the network monitor track traps. Optional. Enables voice traps only.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 13.1 Release 17.6 Release 17.9 Command was introduced. Command was expanded to include the informs options. Command was expanded to include the frame-relay parameter. Command was expanded to include more frame-relay options, more snmp options, and the voice parameter. In addition, the snmp-server host <ip address> traps version 3 priv <community> version of the command was removed. Command was expanded to include the bgp and track parameter.
Release 18.1
Usage Examples
The following example sends all SNMP traps to the host at address 190.3.44.69 and community string MyCommunity using SNMP version 2c: (config)#snmp-server host 190.3.44.69 traps version 2c MyCommunity snmp
60000CRG0-35B
1214
snmp-server inform
Use the snmp-server inform command to set the number of retry attempts for a response and set the amount of time to wait for a response before allowing a new request. Use the no form of this command to return to the default setting. Variations of this command include the following:
snmp-server inform retries <number> snmp-server inform timeout <value>
Syntax Description
retries <number> timeout <value> Specifies number of retries for a response. The range is from 1 to 100. Specifies time (in seconds) to wait for a response. The range is from 1 to 1000 seconds.
Default Values
By default, the retry count is set to 3 and the timeout is set to 5 seconds.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example sets the retry count to 10: (config)#snmp-server inform retries 10
60000CRG0-35B
1215
Default Values
By default, the snmp-server location is set to ADTRAN.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example specifies a location of 5th Floor Network Room: (config)#snmp-server location 5th Floor Network Room
60000CRG0-35B
1216
Default Values
By default, no URL is defined.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example specifies the URL http://www.mywatch.com as the devices management software: (config)#snmp-server management-url http://www.mywatch.com
60000CRG0-35B
1217
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example specifies the label watch for the management software: (config)#snmp-server management-url-label watch
60000CRG0-35B
1218
Default Values
By default, there is no source-interface defined.
Command History
Release 7.1 Release 14.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the tunnel interface. Command was expanded to include the asynchronous transfer mode (ATM) interface. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet interface.
Usage Examples
The following example specifies that the ethernet 0/1 should be the source for all SNMP traps and get/set requests: (config)#snmp-server source-interface ethernet 0/1
60000CRG0-35B
1219
snmp-server user
Use the snmp-server user command to configure Simple Network Management Protocol (SNMP) users to control access to SNMP information. Use the no form of this command to remove a user from the specified SNMP group. Variations of this command include:
snmp-server user <username> <groupname> v1 snmp-server user <username> <groupname> v1 access <acl> snmp-server user <username> <groupname> v2c snmp-server user <username> <groupname> v2c access <acl> snmp-server user <username> <groupname> v3 snmp-server user <username> <groupname> v3 access <acl> snmp-server user <username> <groupname> v3 [auth md5 <auth password> | priv des <priv password> | access <acl>] snmp-server user <username> <groupname> v3 [auth sha <auth password> | priv des <priv password> | access <acl>] snmp-server user <username> <groupname> remote <host> v3 snmp-server user <username> <groupname> remote <host> v3 access <acl> snmp-server user <username> <groupname> remote <host> v3 auth md5 <auth password> snmp-server user <username> <groupname> remote <host> v3 [auth md5 <auth password> | priv des <priv password> | access <acl>] snmp-server user <username> <groupname> remote <host> v3 [auth sha <auth password> | priv des <priv password> | access <acl>]
If service password-encryption is enabled, the running configuration changes to include the keyword encrypted before each password entry, which is masked. Refer to service password-encryption on page 1203. Syntax Description
<username> <groupname> v1 v2c v3 priv des auth md5 auth sha <auth password> <priv password> remote <host> Specifies the name of the user. Specifies the name of the group the user belongs to. Uses SNMP version 1 security model. Uses SNMP version 2c security model. Uses SNMP version 3 (user-based security model). Uses the CBC-DES privacy authentication algorithm. Uses the HMAC-MD5-96 authentication level. Uses the HMAC-SHA-96 authentication level. A password string used to build the key for the authentication level. A password string used for data encryption between the host and agent. Optional. Identifies the host name or IP address of a remote SNMP entity to which the user belongs. The remote host is necessary for acknowledgement of SNMP version 3 notifications. Specifies an access control list (ACL) entry.
access <acl>
60000CRG0-35B
1220
Global Configuration Mode Command Set Indicates service password encryption is enabled. Precedes the encrypted password. (Refer to the note on the previous page.)
It is necessary to configure the SNMP engine ID before configuration of the remote users for a particular agent can be completed. Refer to the command snmp-server engineID remote <ip address> <string> on page 1212 for instructions in setting the engine ID with the remote option. Default Values
No default values are necessary for this command.
Command History
Release 13.1 Release 14.1 Command was introduced. Command was expanded to include the remote <host> parameter.
Usage Examples
The following example enters a new user named BobbyW and assigns the user to a group called securityV3auth using version 3 security model and authentication method message digest 5 (MD5) with a password of passWORD6243 and no ACL to verify: (config)#snmp-server user BobbyW securityV3auth v3 auth md5 passWORD6243
Technology Review
SNMP server users are configured and attached to a specified group with an SNMP version. The SNMP version defines the security model of the group, with SNMP version 1 (SNMP v1) being the least secure and SNMP version 3 (SNMP v3) the most secure. Groups also define the read, write, notify, and view access for each user that resides in the group. Trap notifications in SNMP v1 and SNMP version 2 (SNMP v2) are sent once and do not require an acknowledgement upon receipt. With SNMP v3, a new form of notification type was introduced, called an inform. Unlike a trap sent with SNMP v1/v2, an inform requires a response be sent to the originating entity. If the originator of the inform notification does not receive the response before a specified timeout, the originator can resend until an acknowledgement response is received or a specified retry is reached. Sending informs require that the originator of the inform know the user, engine ID, security parameters, and belong to a group that grants access to the information. SNMP v3 uses services, such as authentication, privacy, and access control to provide a higher level of security not present with v1 or v2. Of these new services, identifying an SNMP server user on a remote entity is necessary to receive and originate notifications, and also to generate and respond to commands.
60000CRG0-35B
1221
Remote users are specified with an IP address or port number for the remote SNMP entity where the user resides. Configuration of the SNMP remote engine ID is necessary before SNMP v3 inform notifications can be acknowledged. This is accomplished through use of the snmp-server engineID remote command. The remote entitys SNMP engine ID is used for password authentication and privacy digests. The configuration acknowledgments of informs will fail if the remote engine ID is not configured first. A management device must know about the user, the engine ID of the device, and security parameters, such as authentication, passwords, and security level in order for the command to be processed by the receiving agent.
60000CRG0-35B
1222
Syntax Description
<name> <value> Specifies a label for the view record being created. The name is a record reference. Specifies the object identifier (OID) to include or exclude from the view. To identify the subtree, specify a string using numbers, such as 1.4.2.6.8. Replace a single subidentifier with the asterisk (*) to specify a subtree family. Specifies a view to be excluded. Specifies a view to be included.
excluded included
Default Values
No default values are necessary for this command.
Command History
Release 9.1 Command was introduced.
Usage Examples
The snmp-server view command can include or exclude a group of OIDs. The following example shows how to create a view (named blockInterfaces) to exclude the OID subtree family 1.3.3.1.2.1.2: (config)#snmp-server view blockInterfaces 1.3.3.1.2.1.2.* excluded The following example shows how to create a view (named block) to include a specific OID: (config)#snmp-server view block 1.3.3.1.2.1.2. included
60000CRG0-35B
1223
Default Values
By default, the retry timeout is set to 5 seconds.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example sets the Simple Network Time Protocol (SNTP) retry timeout to 10 seconds: (config)#sntp retry-timeout 10
60000CRG0-35B
1224
sntp server
Use the sntp server command to set the host name of the Simple Network Time Protocol (SNTP) server, as well as the version of SNTP to use. SNTP is an abbreviated version of the Network Time Protocol (NTP). SNTP is used to set the time of the AOS product over a network. The SNTP server usually serves the time to many devices within a network. Use the no form of this command to return to the default setting. Variations of this command include:
sntp server [<hostname> | <ip address>] sntp server [<hostname> | <ip address>] version <number>
Syntax Description
<hostname> <ip address> version <number> Specifies the host name of the SNTP server. Specifies the IP address of the SNTP server. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies which NTP version is used. Valid range is 1 to 3.
Default Values
By default, NTP version is set to 1.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example sets the SNTP server to time.nist.gov using SNTP version 1 (the default version): (config)#sntp server time.nist.gov The following example sets the SNTP server as time.nist.gov. All requests for time use version 2 of the SNTP: (config)#sntp server time.nist.gov version 2
60000CRG0-35B
1225
Default Values
By default, the wait time is set to 86400 seconds (1 day).
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example sets the Simple Network Time Protocol (SNTP) wait time to two days: (config)#sntp wait-time 172800
60000CRG0-35B
1226
Default Values
By default, spanning-tree edgeport bpdufilter default is disabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
The BPDU filter blocks any BPDUs from being transmitted and received on an interface. This can be overridden on an individual port.
Usage Examples
The following example enables the bpdufilter on all ports by default: (config)#spanning-tree edgeport bpdufilter default To disable the BPDU filter on a specific interface, issue the appropriate commands for the given interface using the following commands as an example: (config)#interface ethernet 0/1 (config-eth 0/1)#spanning-tree edgeport bpdufilter disable
60000CRG0-35B
1227
Default Values
Disabled by default.
Command History
Release 5.1 Command was introduced.
Functional Notes
The bpduguard blocks any BPDUs from being received on an interface. This can be overridden on an individual port.
Usage Examples
The following example enables the BPDU guard on all ports by default. (config)#spanning-tree edgeport bpduguard default To disable the BPDU guard on a specific interface, issue the appropriate commands for the given interface using the following commands as an example: (config)#interface ethernet 0/1 (config-eth 0/1)#spanning-tree edgeport bpduguard disable
60000CRG0-35B
1228
Default Values
Disabled by default.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example configures all interfaces running spanning tree to be edgeports by default: (config)#spanning-tree edgeport default An individual interface can be configured to not be considered an edgeport. For example: (config)#interface ethernet 0/1 (config-eth 0/1)#spanning-tree edgeport disable or (config)#interface ethernet 0/1 (config-eth 0/1)#no spanning-tree edgeport
60000CRG0-35B
1229
Default Values
By default, the forwarding delay is set to 15 seconds.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example sets the forwarding time to 18 seconds: (config)#spanning-tree forward-time 18
60000CRG0-35B
1230
Default Values
By default, the delay is set to 2 seconds.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example configures a spanning-tree hello-time interval of 10000 seconds: (config)#spanning-tree hello-time 10000
60000CRG0-35B
1231
Default Values
By default, the wait interval is set at 20 seconds.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example configures a wait interval of 35 seconds: (config)#spanning-tree max-age 35
60000CRG0-35B
1232
spanning-tree mode
Use the spanning-tree mode command to choose a spanning tree mode of operation. Use the no form of this command to return to the default setting. Variations of this command include:
spanning-tree mode rstp spanning-tree mode stp
Syntax Description
rstp stp Enables Rapid Spanning Tree Protocol (RSTP). Enables spanning-tree protocol.
Default Values
By default, spanning-tree mode is set to rstp.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example sets the spanning-tree mode to rstp: (config)#spanning-tree mode rstp
60000CRG0-35B
1233
Syntax Description
long short Specifies a long pathcost method. Specifies a short pathcost method.
Default Values
By default, spanning-tree pathcost is set to short.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example specifies that the spanning-tree protocol use a long pathcost method: (config)#spanning-tree pathcost method long
60000CRG0-35B
1234
Default Values
By default, the priority level is set to 32768.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example sets spanning-tree priority to the maximum level: (config)#spanning-tree priority 0
60000CRG0-35B
1235
stack
Use the stack command to configure switch-stacking options. Use the no form of this command to disable this feature. Variations of this command include:
stack master stack master <vlan id> stack master <vlan id> <ip address> <subnet mask> stack member <mac address> stack member <mac address> <unit id> stack vlan <vlan id>
Syntax Description
master <vlan id> <ip address> <subnet mask> Specifies that the unit will be the master of the stack. Specifies the virtual local area network (VLAN) ID the stack will use for communication. Configures the network mask of the private IP network. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IP addresses (network). Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Adds a switch to the stack. Specifies a valid 48-bit medium access control (MAC) address of the unit being added. MAC addresses should be expressed in the following format xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01). Specifies the unit ID of the switch being added. Specifies the VLAN ID of the stack of which you are a member.
Default Values
By default, stack VLAN is 2386, and the stack IP network is 169.254.0.0 /24.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example configures the unit to be the stack master and use the default stack VLAN and IP network. (config)#stack master 2000 The following example configures the unit to be the stack master and use VLAN 2000 as the management VLAN and 192.168.1.0 /24 as the management network. (config)#stack master 2000 192.168.1.0 /24
60000CRG0-35B
1236
The following example adds the switch with the CPU MAC address 00:A0:C8:00:8C:20 to the stack; also assigns the number 2 as the new stack member's unit ID. (config)#stack member 00:A0:C8:00:8C:20 2 The following example specifies that this unit is in the stack using VLAN 2000 as its management VLAN; also specifies that this unit is in stack member mode (not a stack-master). (config)#stack vlan 2000
60000CRG0-35B
1237
Default Values
By default, the wait interval is set at 300 seconds.
Command History
Release 17.4 Command was introduced.
Usage Examples
The following example configures a wait interval of 90 seconds: (config)#statistics rate-interval 90
60000CRG0-35B
1238
The MTU size specified does not include an 802.1Q virtual local area network (VLAN) tag. For example, if the MTU size is set to allow 1518 bytes, an 802.1Q tagged packet of 1522 bytes would still be accepted. Default Values
By default, the MTU size is 1518.
Changing the default value (1518) in a switch already installed in a network could cause traffic disruption. Command History
Release 17.6 Command was introduced.
Usage Examples
The following example sets the maximum transmission unit size for all ports on the device to 9216 bytes: (config)#system mtu 9216
60000CRG0-35B
1239
tacacs-server
Use the tacacs-server command to configure several terminal access controller access-control system plus (TACACS+) parameters for all TACACS+ servers on the network. Most of these global settings can be overridden on a per-server basis (using the command tacacs-server host on page 1242). Use the no form of this command to return to the default setting. Variations of this command include the following:
tacacs-server key <key> tacacs-server packet maxsize <value> tacacs-server timeout <value>
Syntax Description
key <key> packet maxsize <value> timeout <value> Specifies the encryption key used by all TACACS+ servers. This is a global setting; however, it can be overridden on a per-server basis. Specifies the maximum packet size that can be sent to any TACACS+ server. Packet maxsize range is 10240 to 65535 kilobytes. Specifies the time (in seconds) that the AOS unit will wait for the servers reply before declaring an error. The time range is 1 to 1000 seconds. This is a global setting; however, it can be overridden on a per-server basis.
Default Values
By default, there is no key specified for TACACS+ servers, the packet maxsize is set to 10240 kb, and the TACACS+ server timeout is set to 5 seconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets a timeout limit of 60 seconds for all TACACS+ servers: (config)#tacacs-server timeout 60
60000CRG0-35B
1240
tacacs-server host
Use the tacacs-server host command to specify the parameters for a terminal access controller access-control system plus (TACACS+) server. Use the no form of this command to return to the default setting. Variations of this command include the following:
tacacs-server host <hostname> | <ip address> tacacs-server host <hostname> | <ip address> key <key> tacacs-server host <hostname> | <ip address> port <port> tacacs-server host <hostname> | <ip address> timeout <value>
Each parameter after <hostname | ip address> specifies the characteristics of the individual TACACS+ server. Parameters can be entered in a single command line, in any order, but each may only be used once. Syntax Description
<hostname> | <ip address> Specifies the server to configure. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). If a host name is used, a domain naming system (DNS) server should be learned by the AOS device using Dynamic Host Configuration Protocol (DHCP), Point-to-Point Protocol (PPP), or specified in the Global Configuration mode with the command ip name-server on page 983. Specifies the encryption key used by the TACACS+ server. This command overrides the global TACACS+ key setting (set with the command tacacs-server on page 1241). This command must be entered last in the command line because everything after the key parameter is read as the new key. Specifies the Transmission Control Protocol (TCP) port used by the TACACS+ server. Range is 1 to 65535. Specifies the time to wait (in seconds) for the server to reply to requests. Range is 1 to 1000 seconds.
key <key>
Default Values
By default, the TACACS+ server uses TCP port 49. By default, the key and timeout values are the values set by the command tacacs-server on page 1241.
Command History
Release 11.1 Command was introduced.
Functional Notes
At a minimum, the address (IP or host name) of the server must be given. The other parameters can be entered in any order (except the key parameter) and, if the parameters are not specified, they will take default values or fall back on the global TACACS+ servers default settings (set using the command tacacs-server on page 1241).
60000CRG0-35B
1241
Usage Examples
The following example specifies that the TACACS+ server at IP address 10.10.10.4 uses the global key setting (left unspecified), a timeout value of 10 seconds, and the default TCP port (left unspecified): (config)#tacacs-server host 10.10.10.4 timeout 10
60000CRG0-35B
1242
telnet
Use the telnet command to open a Telnet session (through AOS) to another system on the network. Variations of this command include the following:
telnet <ip address | hostname> telnet <ip address | hostname> port <tcp port> telnet vrf <name> <ip address | hostname> telnet vrf <name> <ip address | hostname> port <tcp port>
Syntax Description
<ip address | hostname> port <tcp port> vrf <name> Specifies the IP address or host name of the remote system. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the Transmission Control Protocol (TCP) port number to be used when connecting to a host through Telnet. Range is 1 to 65535. Optional. Specifies the VPN routing and forwarding (VRF) where the IP address or host name exists.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Release 14.1 Release 16.1 Command was introduced. Command was expanded to specify the port number. Command was expanded to include the vrf parameter.
Functional Notes
VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example opens a Telnet session with a remote system (10.200.4.15): >enable #telnet 10.200.4.15 User Access Login: Password:
60000CRG0-35B
1243
The following example opens a Telnet session with a remote system (10.200.4.15) on port 8010: >enable #telnet 10.200.4.15 port 8010 User Access Login: Password:
60000CRG0-35B
1244
Syntax Description
<string> <pattern> Specifies a specific dial string to match. Valid entries can include a combination of characters * and 0 through 9. Specifies a pattern using either traditional number matching or regular expression matching methods. Refer to the Functional Notes below for more information. Optional. Displays the resulting substitution.
substitute-using
Default Values
No default values are necessary for this command.
Command History
Release A4.05 Command was introduced.
Functional Notes
The <pattern> parameter can be defined using traditional number matching or regular expression matching methods. Traditional number matching uses numbers and wildcard variables to enter a pattern. Available characters are as follows: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit 0 to 9. N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: 1) 555-81XX matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) NXX-XXXX matches 7 digit local. 4) 1-NXX-NXX-XXXX matches long distance calls in North America.
60000CRG0-35B
1245
In regular expressions number matching, the match strings are encapsulated by paired / (slash) symbols. This indicates that the pattern is to be treated as a regular expression. Using regular expressions allows greater flexibility in matching multiple number templates with fewer expressions.
AOS is compatible with Perl compatible regular expressions (PCREs). More information on understanding and using regular expressions is available at http://www.pcre.org.
v
The use of quotation marks in a command syntax, when entering a string is not necessary unless the string requires using a space or ?. Using either of these characters outside of quotation marks is interpreted by the command line interface (CLI) as a command and is not recognized as part of the string. The use of quotation marks in the following examples are provided to cover all possible user-entered strings. These examples can be entered without the quotation marks and function in the same manner.
Usage Examples
The following is a sample response using the test template match command with traditional number matching: (config)#test template match 5551234 to 555XXXX Match Result -> Match The following is a sample response using the test template match command with regular expression matching: (config)#test template match 5551234 to /555\d{4}/ Match Result -> Match The following is a sample response using the test template match <string> to <pattern> substitute-using <pattern> command with traditional number matching: (config)#test template match 5551234 to 555XXXX substitute-using 1359555XXXX Substitute Result -> 13595551234 The following is a sample response using the test template match <string> to <pattern> substitute-using <pattern> command with regular expression matching: (config)#test template match 5552121DE to /(\d+).*/ substitute-using /\1/ Substitute Result -> 5552121
60000CRG0-35B
1246
thresholds
Use the thresholds command to specify DS1 performance counter thresholds. Use the no form of this command to return to the default setting. Variations of this command include:
thresholds BES [15Min | 24Hr] <number> thresholds CSS [15Min | 24Hr] <number> thresholds DM [15Min | 24Hr] <number> thresholds ES [15Min | 24Hr] <number> thresholds LCV [15Min | 24Hr] <number> thresholds LES [15Min | 24Hr] <number> thresholds PCV [15Min | 24Hr] <number> thresholds SEFS [15Min | 24Hr] <number> thresholds SES [15Min | 24Hr] <number> thresholds UAS [15Min | 24Hr] <number>
Syntax Description
BES CSS DM ES LCV LES PCV SEFS SES UAS 15Min 24Hr <number> Specifies the bursty errored seconds threshold. Specifies the controlled slip seconds threshold. Specifies the degraded minutes threshold. Specifies the errored seconds threshold. Specifies the line code violations threshold. Specifies the line errored seconds threshold. Specifies the path coding violations threshold. Specifies the severely errored framing seconds threshold. Specifies the severely errored seconds threshold. Specifies the unavailable seconds threshold. Specifies that the threshold you are setting is for the counters 15-minute statistics. Specifies that the threshold you are setting is for the counters 24-hour statistics. Specifies the maximum occurrences allowed for this error type. Once a threshold is exceeded, an event is sent to the console specifying the appropriate counter. Additionally, if Simple Network Management Protocol (SNMP) traps are enabled, the unit will send a trap with the same information as the console event.
60000CRG0-35B
1247
Default Values
The default values for this command are as follows: thresholds BES 15Min 10 thresholds BES 24Hr 100 thresholds CSS 15Min 1 thresholds CSS 24Hr 4 thresholds DM 15Min 1 thresholds DM 24Hr 4 thresholds ES 15Min 65 thresholds ES 24Hr 648 thresholds LCV 15Min 13340 thresholds LCV 24Hr 133400 thresholds LES 15Min 65 thresholds LES 24Hr 648 thresholds PCV 15Min 72 thresholds PCV 24Hr 691 thresholds SEFS 15Min 2 thresholds SEFS 24Hr 17 thresholds SES 15Min 10 thresholds SES 24Hr 100 thresholds UAS 15Min 10 thresholds UAS 24Hr 10
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the threshold for the 15-minute and 24-hour bursty errored seconds counter to 25 and 200, respectively: (config)#thresholds BES 15Min 25 (config)#thresholds BES 24Hr 200
60000CRG0-35B
1248
timing-source
Use the timing-source command to configure the timing source used for reference timing. Use the no form of this command to return to the default setting. Variations of this command include the following:
timing-source internal timing-source internal secondary timing-source t1 <interface id> timing-source t1 <interface id> secondary
Syntax Description
internal t1 <interface id> secondary Configures the unit to provide timing using the internal 1.544 MHz clock generator. Configures the unit to recover clocking from the specified T1 or DSX-1 interface. Optional. Signifies that the clock source specified in the command is to be the secondary clock source.
Default Values
By default, the primary clock source is set to internal.
Command History
Release 11.1 Command was introduced.
Functional Notes
If both the primary and secondary clock sources fail, the unit automatically switches to internal timing.
Usage Examples
The following example configures the unit to use an internal timing source: (config)#timing-source internal The following examples set the t1 0/1 interface as the primary timing source and the t1 0/2 interface as the secondary timing source: (config)#timing-source t1 0/1 (config)#timing-source t1 0/2 secondary
60000CRG0-35B
1249
track <name>
Use the track command to create a track as part of network monitoring. This command is also used to enter into the Network Monitoring Track command set once a track is created. These additional commands are covered in Network Monitor Track Command Set on page 2629. Use the no form of this command to delete the track. Syntax Description
<name> Specifies the name of the track being created.
Default Values
By default, there are no tracks configured.
Command History
Release 13.1 Command was introduced.
Functional Notes
Track objects can be associated with probes to monitor their states. Upon a change in the probe state, the probe sends an event to any track registered with the probe. In response, the track performs the action indicated. Track objects are associated with probes by using the commands test if on page 2635 and test list on page 2639.
Usage Examples
The following example creates an track called track_a: >enable #configure terminal (config)#track track_a (config-track-track_a)#
Technology Review
Tracks are objects created to monitor other objects for a change in their state. The tracks can be configured to perform a specific action based upon the second object state detected. Association between a track and another object (for example, a probe, schedule, or interface) occurs through referencing the second object in the tracks configuration. Once the track is registered with the second object, whenever a change occurs with that objects state, an event is sent to the track. Additional configuration commands are available for creating probes. These are explained in the Network Monitor Probe Command Set on page 2590.
60000CRG0-35B
1250
Default Values
By default, there is no established user name and password.
Command History
Release 1.1 Command was introduced.
Functional Notes
All users defined using the username/password command are valid for access to the unit using the login local-userlist command.
Usage Examples
The following example creates a user name of ADTRAN with password ADTRAN: (config)#username ADTRAN password ADTRAN
60000CRG0-35B
1251
Default Values
By default, no portal lists are assigned to user names.
Command History
Release 17.1 Release A1 Command was introduced. Command was expanded to include the password parameter.
Usage Examples
The following example associates the portal list engineers with the user name ADTRAN and the password word: (config)#username ADTRAN portal-list engineers password word
60000CRG0-35B
1252
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example enters the VLAN Configuration mode for VLAN 1: (config)#vlan 1 (config-vlan 1)#
60000CRG0-35B
1253
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example activates the Lobby voice alias at extension 4100: (config)#voice alias Lobby equals 4100
60000CRG0-35B
1254
Syntax Description
<name> ani <template> Specifies the name of the ANI list. Specifies the ANI digits of the calling party to add to the ANI list. Digits include a combination of wildcards and numerical digits. Refer to the Functional Notes of this command for more information on using wildcards.
Default Values
By default, no ANI lists are configured.
Command History
Release A2 Command was introduced.
Functional Notes
ANI lists are used to permit or deny specific calling parties from accessing trunk groups to which the ANI list is applied. The available wildcards for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
The special characters ( ), -, + are always ignored. Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digit local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America.
60000CRG0-35B
1255
Usage Examples
The following example creates an ANI list called TEST1 and specifies which numbers are included in the ANI list: (config)#voice ani-list TEST1 (config-ani-list-TEST1)#ani 555-81xx
60000CRG0-35B
1256
voice autoattendant
Use the voice autoattendant command to configure the auto attendant options for the system. Use the no form of the commands to disable the setting. For more voice auto attendant options, refer to voice call-appearance-mode on page 1259. Variations of this command include the following:
voice autoattendant <name> voice autoattendant <name> extension <number> voice autoattendant alias <name> voice autoattendant did <number> voice autoattendant extension <number>
Syntax Description
<name> alias <name> did <number> extension <number> Specifies a name for this auto attendant. Specifies an alias name to use as an alternate when accessing the auto attendant. Configures the direct inward dialing (DID) number to assign to the auto attendant. Specifies the extension for auto attendant system login access.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example configures the aOperator as an alias for the auto attendant: (config)#voice autoattendant alias aOperator
60000CRG0-35B
1257
voice call-appearance-mode
Use the voice call-appearance-mode command to configure the unit to allow single or multiple call appearances to user account phones. Use the no form of this command to return to the default setting. Variations of this command include:
voice call-appearance-mode multiple voice call-appearance-mode single
Syntax Description
multiple Allows multiple call appearances. For analog phones, this will be limited to two; for Session Initiation Protocol (SIP) phones, the number allowed depends on the model of the phone. Allows only a single call appearance.
single
Default Values
By default, this is set to single.
Command History
Release 11.1 Command was introduced.
Functional Notes
Each incoming call is classified as a call appearance. For example, call waiting supports two call appearances simultaneously. Without call waiting, only one call appearance is supported at a time.
Usage Examples
The following example sets the unit to allow multiple call appearances: (config)#voice call-appearance-mode multiple
60000CRG0-35B
1258
Default Values
By default, the caller ID type is set to US_Bellcore.
Command History
Release 15.1 Release A2 Release A4.05 Command was introduced. Command was expanded to include Australia_FSK. Command was expanded to include Mexico_FSK.
Usage Examples
The following example specifies using the Italian method for the caller ID type: (config)#voice callerid-type Italy_FSK
60000CRG0-35B
1259
voice cause-code-map
Use the voice cause-code-map command to configure the cause code and Session Initiation Protocol (SIP) message numbers for the primary rate interface (PRI). Cause codes and SIP message numbers are associated with a particular connection failure, and notifies the system when problems occur. Use the no form of this command to return to the default setting. Variations of this command include:
voice cause-code-map from-pri <value> <value> voice cause-code-map to-pri <value> <value>
Syntax Description
from-pri <value> <value> Enter the cause code number to map to the SIP message. The valid range is 1 to 127. Next, enter the SIP message number to be used. The valid range is 400 to 606. Enter the SIP message number to map to the PRI cause code map. The valid range is 400 to 606. The second <value> is the PRI cause code number. The valid range is 1 to 127.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example sets the cause code number to 28 to associate with SIP messages: (config)#voice cause-code-map from-pri 28
60000CRG0-35B
1260
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example creates a new CoS rule set called set1: (config)#voice class-of-service set1 Configuring New Level set1. (config-cos-set1)#
60000CRG0-35B
1261
Default Values
By default, the CODEC country setting is United_States.
Command History
Release 15.1 Release A2 Release A2.04 Release A4.05 Command was introduced. Command was expanded to include Australia. Command was expanded to include Belgium, France, Germany, Ireland, Italy, Luxembourg, Spain, Switzerland, and United_Kingdom. Command was expanded to include China_Hong_Kong, Denmark, Etsi, Finland, Mexico, Netherlands, Norway, Sweden, and United_Arab_Emirates.
Usage Examples
The following example assigns Canada as the CODEC country: (config)#voice codec-country Canada
60000CRG0-35B
1262
Default Values
By default, there are no configured voice CODEC lists.
Command History
Release 9.3 Command was introduced.
Functional Notes
CODEC lists are list of CODECs arranged in preferred order with the first listed CODEC being the most preferred for call negotiation. Using the voice codec-list command enters the configuration mode for the CODEC list, where you can enter the types of CODECs to be used, and their order of preference. CODEC lists are then applied to interfaces, voice trunks, or voice accounts to be used for call negotiation. For more information on configuring and applying CODEC lists, refer to Voice CODEC List Command Set on page 3359.
Usage Examples
The following example creates a new CODEC list named List1: (config)#voice codec-list List1 Configuring New Codec List List1. (config-codec)#
60000CRG0-35B
1263
voice codec-priority
Use the voice codec-priority command to specify which coder-decoder (CODEC) list is set as the priority. Use the no form of this command to disable the setting. Variations of this command include:
voice codec-priority trunk voice codec-priority user voice codec-priority offer-sdp
Syntax Description
trunk user offer-sdp Specifies using the trunks CODEC list as the priority CODEC list. Specifies using the users CODEC list as the priority CODEC list. Specifies using Session Description Protocol (SDP) offer/answer exchanges to set CODEC priority.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release A2 Command was introduced. Command was expanded to include the offer-sdp parameter.
Functional Notes
The voice codec-priority command specifies the CODEC selection method at the units global level. Selections are made from preconfigured CODEC lists. For more information about configuring and applying CODEC lists, refer to the Voice CODEC List Command Set on page 3359.
Usage Examples
The following example specifies using the trunks CODEC list as the priority CODEC list: (config)#voice codec-priority trunk
60000CRG0-35B
1264
voice compand-type
Use the voice compand-type command to set the companding type to match your telecommunications provider. Use the no form of this command to return to the default setting. Variations of this command include:
voice compand-type a-law voice compand-type u-law
Syntax Description
a-law Specifies the a-law compand type. This compand type is mainly used in European telephone networks for the conversion between analog and digital signals in pulse-code modulation (PCM) applications, and is similar to the North American mu-law standard. Specifies the u-law compand type.This compand type is also known as mu-law, and is the PCM quasi-logarithmic curve. It is the 64 kbps standard North America voice amplitude sample used for encoding and decoding.
u-law
Default Values
By default, the companding type is set to u-law.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example configures the companding type to a-law: (config)#voice compand-type a-law
60000CRG0-35B
1265
Syntax Description
max-sessions <number> Specifies the maximum number of simultaneous 3-way conference sessions. If set to 0, the maximum number of sessions is defined by the capability of the hardware platform. Specifies the behavior of actions performed by the conference originator once the conference has been established. Indicates that when a flashhook is issued, the last party added to the 3-way conference will be dropped and the call will continue between the two remaining parties. Indicates that when a flashhook is issued, it will be ignored. The 3-way conference will continue without interruption. Indicates that when a flashhook is issued, the 3-way conference will be split into two calls, one between the originator and the first party and one between the originator and the second party. When a flashhook is issued after the split, it will toggle the originator between the two calls. Indicates that when the originator goes on-hook, the two parties in the conference are connected together. Indicates that when the originator goes on-hook, the remaining parties are disconnected. Specifies the conference behavior after a member disconnects. Indicates the conference is maintained with the remaining parties. Indicates the conference is dropped and a direct connection between the remaining parties is re-established.
Default Values
By default, the max-sessions is set to 3, originator onhook is set to persist, originator flashhook is set to drop, and party-disconnect is set to continue.
60000CRG0-35B
1266
Command History
Release A2 Command was introduced.
Functional Notes
The voice conference local settings are only valid when the voice conferencing-mode is set to local. Refer to voice conferencing-mode on page 1269 for more information.
Usage Examples
The following example sets the unit to a maximum of 5 local conference sessions: (config)#voice conference local max-sessions 5 The following example sets the behavior of the conference session to ignore a flash-hook issued by the conference originator: (config)#voice conference local originator flashhook ignore
60000CRG0-35B
1267
voice conferencing-mode
Use the voice conferencing-mode command to determine if voice conferencing bridging will be handled within the unit or from a far-end conferencing server. Use the no form of this command to return to the default setting. Variations of this command include:
voice conferencing-mode local voice conferencing-mode network
Syntax Description
local network Specifies voice conferencing will be handled within the unit. Specifies voice conferencing will be handled by a far-end conferencing server.
Default Values
By default, the voice conferencing mode is set to network.
Command History
Release A1 Command was introduced.
Functional Notes
The voice conferencing mode is only valid when the flashhook mode is set to interpreted. Refer to the command voice flashhook mode on page 1282 for more information.
Usage Examples
The following example sets the conferencing mode to handle conference bridging within the local unit: (config)#voice conferencing-mode local
60000CRG0-35B
1268
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example specifies a voice country-code of 203: (config)#voice country-code 203
60000CRG0-35B
1269
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Functional Notes
The voice coverage command creates a global call coverage list for the AOS product and enters the lists configuration mode. The configurable options for this list are detailed in Voice Coverage Command Set on page 3355. The global call coverage list can be overridden on a per-user or per-group basis using the coverage command from the appropriate configuration mode.
Usage Examples
The following example specifies that the call coverage list named Absent be used for global call coverage: (config)#voice coverage Absent Configuring New Global Call Handling List Absent (config-gch)#
60000CRG0-35B
1270
voice current-mode
Use the voice current-mode command to activate a particular system mode on the unit. Variations of this command include:
voice current-mode custom1 voice current-mode custom2 voice current-mode custom3 voice current-mode default voice current-mode lunch voice current-mode night voice current-mode override voice current-mode weekend
Syntax Description
[custom1-custom3] default lunch night override weekend Specifies the custom system mode to use. Specifies using the default system mode. Specifies using the lunch time system mode. Specifies using the night time system mode. Specifies using the override system mode. Specifies using the weekend system mode.
Default Values
By default, the system mode is set to default.
Command History
Release A1 Command was introduced.
Functional Notes
This command is used to put the unit into a specific system mode. The unit remains in the activated system mode until it is changed manually or a schedule change occurs triggering a transition to another system mode. Schedules are configured using the command voice system-mode on page 1320. If the system is in override, the unit will ignore any schedule that exists. The unit will stay in override until manually changed. This command is saved into the dynvoice-config file to preserve the state of the unit in case of power failure.
Usage Examples
The following example sets the current system mode to lunch: (config)#voice current-mode lunch
60000CRG0-35B
1271
voice dial-plan
Use the voice dial-plan command to add a global number complete pattern. Use the no form of this command to delete configured dial plans. Variations of this command include:
voice dial-plan <pattern id> 900-number <pattern> voice dial-plan <pattern id> 900-number <pattern> [<ndt name> | default | none] voice dial-plan <pattern id> always-permitted <pattern> voice dial-plan <pattern id> always-permitted <pattern> [<ndt name> | default | none] voice dial-plan <pattern id> extensions <pattern> voice dial-plan <pattern id> extensions <pattern> [<ndt name> | default | none] voice dial-plan <pattern id> internal-operator <pattern> voice dial-plan <pattern id> internal-operator <pattern> [<ndt name> | default | none] voice dial-plan <pattern id> international <pattern> voice dial-plan <pattern id> international <pattern> [<ndt name> | default | none] voice dial-plan <pattern id> local <pattern> voice dial-plan <pattern id> local <pattern> [<ndt name> | default | none] voice dial-plan <pattern id> long-distance <pattern> voice dial-plan <pattern id> long-distance <pattern> [<ndt name> | default | none] voice dial-plan <pattern id> operator-assisted <pattern> voice dial-plan <pattern id> operator-assisted <pattern> [<ndt name> | default | none] voice dial-plan <pattern id> specify-carrier <pattern> voice dial-plan <pattern id> specify-carrier <pattern> [<ndt name> | default | none] voice dial-plan <pattern id> toll-free <pattern> voice dial-plan <pattern id> toll-free <pattern> [<ndt name> | default | none] voice dial-plan <pattern id> [user1 | user2 | user3] <pattern> voice dial-plan <pattern id> [user1 | user2 | user3] <pattern> [<ndt name> | default | none]
Syntax Description
<pattern id> 900-number always-permitted extensions internal-operator international local long-distance operator-assisted specify-carrier toll-free user1 user2 user3 Specifies dial pattern identification. Valid range is 1 to 255. Adds a pattern to the 900 number group. Adds a pattern to the always permitted group. Adds a pattern to the internal group. Adds a pattern to the internal operator group. Adds a pattern to the international group. Adds a pattern to the local group. Adds a pattern to the long distance group. Adds a pattern to the operator assisted group. Adds a pattern to the specify carrier group. Adds a pattern to the toll free group. Adds a pattern to the user 1 group. Adds a pattern to the user 2 group. Adds a pattern to the user 3 group.
60000CRG0-35B
1272
Global Configuration Mode Command Set Specifies a dialing pattern. You can enter a complete phone number, or wildcards can be used to define the dialing pattern. Refer to Functional Notes of this command for more information on using wildcards. Optional. Specifies the named-digit-timeout to associate with this dial plan entry. The named-digit-timeout is assigned a timeout value with the voice timeouts named-digit-timeout command (refer to voice timeouts on page 1321). Optional. Sets the named-digit-timeout to the default value. The default value is set with the voice timeouts interdigit command (refer to voice timeouts on page 1321). Optional. Indicates that no named-digit-timeout is associated with this dial plan entry.
<ndt name>
default
none
Default Values
By default, no dial plans are configured.
Command History
Release 9.3 Release A2 Command was introduced. Command was expanded to include the named-digit-timeouts.
Functional Notes
The available wildcards for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
The special characters ( ), -, + are always ignored. Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digit local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America.
60000CRG0-35B
1273
Usage Examples
The following example adds the pattern 8000 to the local group: (config)#voice dial-plan 1 local 8000 The following example adds the pattern NXX-XXXX to the local group and associates it with the short1 named-digit-timeout: (config)#voice dial-plan 2 local NXX-XXXX short1
60000CRG0-35B
1274
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example directs DID number 5558123 to extension 8123: (config)#voice did 5558123 extension 8123
60000CRG0-35B
1275
The following additional subcommands are available once you have entered the Voice Directory Configuration mode:
directory-include <number> first-name <name> directory-include <number> first-name <name> last-name <name>
Syntax Description
<name> Specifies the name of the directory to create or modify. directory-include <number> Specifies the extension of the user to be added to the dial-by-name directory. Adding users to the directory allows them to call parties using a name stored in the system. Use the no form of this command to remove a user from the directory. first-name <name> last-name <name> Specifies the users first name. Optional. Specifies the users last name.
Default Values
By default, no voice directories are configured.
Command History
Release 14.1 Command was introduced.
Functional Notes
Adding a voice directory is useful when taking advantage of the dial-by-name feature. By default, a system directory is always available. All voice users are automatically added as members of the system directory.
Usage Examples
The following example creates a new voice directory with name Engineering: (config)#voice directory Engineering The following example adds Jan Doe to the Engineering dial-by-name directory: (config)#voice directory Engineering (config-dir)#directory-include 5555 first-name Jan last-name Doe
60000CRG0-35B
1276
voice disconnect-mode
Use the voice disconnect-mode command to control the disconnect mode of the unit. Use the no form of this command to return to the default setting. Variations of this command include:
voice disconnect-mode dialtone voice disconnect-mode fast-busy
Syntax Description
dialtone fast-busy Specifies issuing dial tone after disconnect on the unit. Specifies issuing fast-busy tone after disconnect on the unit.
Default Values
By default, this command is set to dialtone.
Command History
Release A2.03 Command was introduced.
Usage Examples
The following example configures the unit to disconnect issuing a fast-busy tone: (config)#voice disconnect-mode fast-busy
60000CRG0-35B
1277
voice fax-tone
Use the voice fax-tone command to choose which tones initiate modem passthrough mode or T.38 mode. Use the no form of this command to inhibit a specified tone from initiating T.38 or modem passthrough call handling. Variations of this command include:
voice fax-tone default voice fax-tone modem-passthrough default voice fax-tone modem-passthrough t30-cng voice fax-tone modem-passthrough v21-preamble voice fax-tone modem-passthrough v25-ans voice fax-tone modem-passthrough v25-ans-pr voice fax-tone modem-passthrough v8-ansam voice fax-tone modem-passthrough v8-ansam-pr voice fax-tone t38 default voice fax-tone t38 t30-cng voice fax-tone t38 v21-preamble voice fax-tone t38 v25-ans voice fax-tone t38 v25-ans-pr voice fax-tone t38 v8-ansam voice fax-tone t38 v8-ansam-pr
Syntax Description
default Restores the default tones for initiating modem passthrough mode or T.38 mode, depending on where it is used in the command syntax. For example, issuing voice fax-tone default restores defaults for both modes, while issuing voice fax-tone t38 default only restores defaults for T.38 mode. Specifies modem passthrough mode. Specifies T.38 mode. Specifies the T.30 calling tones. Specifies the V.21 preamble flag tones. Specifies the V.25 answer tones. Specifies the V.25 answer tones with phase reversals. Specifies the V.8 answer tones with amplitude modulation. Specifies the V.8 answer tones with amplitude modulation and phase reversals.
Default Values
By default, all tones are enabled for both tone lists, allowing all tones to initiate either modem passthrough or T.38 mode.
Command History
Release A2.04 Command was introduced.
60000CRG0-35B
1278
Functional Notes
When a fax tone is enabled, the tone is eligible to initiate either modem-passthrough or T.38 handling, depending on the command entered. T.38 fax tone commands take priority over modem passthrough fax tone commands. For example, in the default configuration with all commands enabled, any detected tone on a call would cause a re-INVITE to T.38, as long as T.38 is enabled on the user (or primary rate interface (PRI/CAS trunk). If T.38 is not enabled, the call would be re-INVITED to G.711 in modem passthrough mode.
Usage Examples
The following example disables t30-cng fax tone for modem passthrough mode: (config)#no voice fax-tone modem-passthrough t30-cng
60000CRG0-35B
1279
voice feature-mode
Use the voice feature-mode command to configure control of the voice features. Use the no form of this command to return to the default setting. Variations of this command include:
voice feature-mode local voice feature-mode network
Syntax Description
local network Allows voice features to be handled by the local unit. Allows voice features to be handled by the network.
Default Values
By default, the voice feature mode is set to network.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example sets the control of the voice features to the local unit: (config)#voice feature-mode local
60000CRG0-35B
1280
Syntax Description
interpreted transparent Allows the local unit to interpret flashhook events. Specifies flashhook events to be transparent to the provider.
Default Values
By default, the voice flashhook mode is set to interpreted.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example sets the flashhook mode to allow the local unit to interpret flashhook events: (config)#voice flashhook mode interpreted
60000CRG0-35B
1281
Default Values
By default, the flashhook threshold times are 300 milliseconds (minimum) and 1000 milliseconds (maximum).
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example configures the flashhook thresholds at a minimum of 400 to a maximum of 900: (config)#voice flashhook threshold 400 900
60000CRG0-35B
1282
voice forward-mode
Use the voice forward-mode command to control the forwarding mode of the unit. Use the no form of this command to return to the default setting. Variations of this command include:
voice forward-mode local voice forward-mode network
Syntax Description
local network Allows forwards to be handled locally by the unit. Allows forwards to be handled by the network.
Default Values
By default, this command is set to network.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example configures the unit to handle forwards locally: (config)#voice forward-mode local
60000CRG0-35B
1283
Default Values
By default, there are no configured grouped trunks.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example creates the trunk group trunk3: (config)#voice grouped-trunk trunk3 (config-TRUNK3)#
60000CRG0-35B
1284
voice hold-reminder
Use the voice hold-reminder command to specify how long a call can be on hold before the hold reminder rings the phone again. Use the no form of this command to return to the default setting. Variations of this command include:
voice hold-reminder <value> voice hold-reminder <value> <interval>
Syntax Description
<value> <interval> Specifies how long a call can be on hold before the hold reminder rings the phone again. Range is 5 to 30 seconds. Optional. Specifies the interval at which all subsequent reminder rings will occur. Range is 10 to 120 seconds.
Default Values
The defaults for this command are a 10-second hold time before the first reminder ring with 30-second intervals between subsequent rings.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the first reminder ring to occur after the call has been on hold for 20 seconds (with subsequent reminder rings occurring every 15 seconds until the call is picked up): (config)#voice hold-reminder 20 15
60000CRG0-35B
1285
voice international-prefix
Use the voice international-prefix command to configure the international prefix for this unit. Use the no form of this command to delete a configured prefix. Variations of this command include:
voice international-prefix <prefix> voice international-prefix abbreviated
Syntax Description
abbreviated <prefix> Specifies the international prefix be replaced with a plus symbol (+) in the Session Initiation Protocol (SIP) header. Specifies the up to four digits for the prefix.
Default Values
By default, there is no configured international prefix.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example configures 011 as the international prefix: (config)#voice international-prefix 011
60000CRG0-35B
1286
Default Values
By default, there are no configured voice lines.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example creates the voice line Public, and enters its voice line configuration mode: (config)#voice line Public Configuring New Line Public. (config-Public)#
60000CRG0-35B
1287
Default Values
No default values are necessary for this command.
Command History
Release A1 Command was introduced.
Usage Examples
The following example creates a loopback with extension (account) number 5555: (config)#voice loopback 5555
60000CRG0-35B
1288
voice mail
Use the voice mail command to configure voicemail options for the unit. Use the no form of this command to disable the setting. Refer to voice mail check on page 1291 for additional arguments. Variations of this command include the following:
voice mail alias <name> voice mail asterisk voice mail class-of-service <name> voice mail did <number> voice mail extension <extension> voice mail internal voice mail leave-extension <extension> voice mail max-login-attempts <number>
Syntax Description
alias <name> asterisk class-of-service <name> did <number> internal extension <extension> leave-extension <extension> Specifies an alias name to use as an alternate when accessing voicemail. Enables voicemail on an external Asterisk server. Configures the voicemail class of services. Configures the direct inward dialing (DID) number to assign to voicemail. Enables internal voicemail on the CompactFlash. Specifies the extension users will dial to retrieve their voicemail. Specifies the extension users will dial to leave a voicemail without ringing an extension. If a user forwards their phone to this extension, their calls will automatically forward to their voice mailbox. Specifies the maximum number login attempts to voicemail accounts. Range is 0 to 9 attempts.
max-login-attempts <number>
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 12.1 Command was introduced. Command was expanded.
Usage Examples
The following example specifies extension 7500 for voicemail retrieval: (config)#voice mail extension 7500
60000CRG0-35B
1289
Syntax Description
alias <name> sip-identity <station> <Txx> Specifies an alias name to use as an alternate when accessing the check extension. Specifies the station to be used for Session Initiation Protocol (SIP) trunk (e.g., station extension). Also, specifies the SIP trunk through which to register the server. The trunk is specified in the format Txx (e.g., T01). Registers the user to the server. Sets the user name that will be required as authentication for registration to the SIP server. Sets the password that will be required as authentication for registration to the SIP server.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example configures the voice mail check sip-identity to use extension 6000 as its identity on trunk T04: (config)#voice mail check sip-identity 6000 T04
60000CRG0-35B
1290
Syntax Description
alias <name> sip-identity <station> <Txx> Specifies an alias name to use as an alternate when accessing the check extension. Specifies the station to be used for Session Initiation Protocol (SIP) trunk (e.g., station extension). Also, specifies the SIP trunk through which to register the server. The trunk is specified in the format Txx (e.g., T01). Registers the user to the server. Sets the user name that will be required as authentication for registration to the SIP server. Sets the password that will be required as authentication for registration to the SIP server.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example configures the voice mail leave sip-identity to use extension 8000 as its identity on trunk T06: (config)#voice mail leave sip-identity 8000 T06
60000CRG0-35B
1291
Syntax Description
<sip ID> <sip trunk> Specifies a number to be used as the SIP ID (e.g., station extension) and the SIP trunk through which you will register to the server. Registers the user to the server. Sets the user name that will be required as AUTHENTICATION for registration to the SIP server. Sets the password that will be required as authentication for registration to the SIP server.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 12.1 Command was introduced. Command was expanded.
Usage Examples
The following example specifies trunk T02 and extension 5800 for voice mail sip-identity: (config)#voice mail sip-identity 5800 T02
60000CRG0-35B
1292
Syntax Description
ani <template> Specifies the ANI information to be substituted. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the ANI information that is substituted for the original ANI information. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry.
substitute <template>
Default Values
By default, no ANI substitution is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for ANI templates is very similar to dial plan entries. The available wildcards for this command are: 0-9 = Match exact digit only. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digit local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America.
60000CRG0-35B
1293
Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match ani command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match ani ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the ANI information from numbers 555-8111 to 555-8115 on all inbound trunks will be substituted by 555-8110: (config)#voice match ani 555-811[125] substitute 555-8110
Technology Review
The traditional ANI substitution feature operates at a global level on inbound trunks. The feature allows the substitution of calling party information with information determined by the user. This version of ANI substitution is applied only to internal caller ID at the inbound trunk, and only affects the number, not the name, of the calling party. In this version of ANI substitution, DNIS substitution is also available. DNIS substitution is configured on a per-trunk basis for outbound trunks. DNIS substitution in this version only affects the number, not the name, of the called party.
60000CRG0-35B
1294
Default Values
By default, no endpoints are configured.
Command History
Release A2 Command was introduced.
Functional Notes
By default, when endpoints are created and given an index number, they are named in the following format: aaln/x, where x is the index number. For example, an endpoint with an index of 4 will by default have the name aaln/4. Assigning an index is essential for creating an endpoint; however, endpoints can be renamed using the name endpoint command. Refer to name <text> on page 2868 for more information.
Usage Examples
The following example creates an endpoint with an index of 1, and enters the endpoints configuration mode: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#
60000CRG0-35B
1295
Default Values
By default, automatic disabling of call waiting for fax/modem calls is disabled.
Command History
Release A2.04 Command was introduced.
Usage Examples
The following example disables call waiting on a fax call: (config)#voice modem-passthrough-mode auto-disable-call-wait
60000CRG0-35B
1296
Default Values
The default for this command is 0 (unlimited rings).
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets a limit on the number of times a station can ring: (config)#voice num-rings 8
60000CRG0-35B
1297
voice operator-group
Use the voice operator-group command to access the Voice Operator Group command mode. Refer to Voice Operator Ring Group Command Set on page 2974 for more information. Use the no form of this command to disable the setting. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example enters the Operator Group configuration mode: (config)#voice operator-group Configuring Operator Group. (config-operator-group)#
60000CRG0-35B
1298
Syntax Description
<value> Specifies the timeout value in seconds. Set to 0 to disable the timeout.
Default Values
The default setting is 120 seconds.
Command History
Release A2.04 Command was introduced.
Usage Examples
The following example configures a connected timeout of 30 seconds for overhead paging: (config)#voice overhead-paging connected-timeout 30
60000CRG0-35B
1299
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example configures extension 3000 to be used for overhead paging: (config)#voice overhead-paging extension 3000
60000CRG0-35B
1300
Default Values
By default, no paging groups exist.
Command History
Release A2.04 Command was introduced.
Functional Notes
The voice paging-group command enters the configuration for a handset paging group. For more information about handset paging, refer to the Handset Paging for the NetVanta 7000 Series quick configuration guide available online at http://kb.adtran.com (article number 3102). For more information about the commands used to configure handset paging, refer to the Voice Paging Group Command Set on page 2992.
Usage Examples
The following example creates a paging group using extension 8956 and enters the groups configuration mode: (config)#voice paging-group 8956 Configuring new paging group 8956. (config-8956)#
60000CRG0-35B
1301
Default Values
By default, the voice park-return time is set to 60 seconds.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example sets the time a call returns from park to 30 seconds: (config)#voice park-return 30
60000CRG0-35B
1302
Default Values
By default, no call pickup groups exist.
Command History
Release A4.01 Command was introduced.
Functional Notes
There is a limit of 10 call pickup groups on an AOS unit. For more information about call pickup group configuration commands, refer to the Voice Call Pickup Group Command Set on page 2962. For more information about configuring the call pickup feature, refer to the Configuring the Call Pickup Feature on AOS Voice Products quick configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example creates the call pickup group Sales and enters the groups configuration mode: (config)#voice pickup-group Sales Configuring New Pickup Group Sales (config-Sales)#
60000CRG0-35B
1303
Default Values
The default value for this command is English.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example specifies the voice prompt language as Italian: (config)#voice prompt-language Italian
60000CRG0-35B
1304
Default Values
By default, no ring groups are configured.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example creates a new ring group with extension 5678: (config)#voice ring-group 5678 Configuring New Group 5678. (config-5678)#
60000CRG0-35B
1305
voice service-mode
Use the voice service-mode command to add a service mode transition. Variations of this command include:
voice service-mode day <day> <time> voice service-mode lunch <day> <time> voice service-mode night <day> <time> voice service-mode weekend <day> <time>
Syntax Description
day lunch night weekend <day> <time> Specifies a transition to day mode. Specifies a transition to lunch mode. Specifies a transition to night mode. Specifies a transition to weekend mode. Specifies the day of week the transition occurs. Specifies the time for transition to occur (24-hour format - hours:minutes (HH:MM)).
Default Values
By default, the voice service-mode is set to day.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example sets the voice service mode to day with a transition day of Monday and a transition time of 8:00 AM: (config)#voice service-mode day monday 08:00
60000CRG0-35B
1306
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets a speed-dial number of 8 for extension 9654: (config)#voice speed-dial 8 9654 3rdFloorLab
60000CRG0-35B
1307
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Functional Notes
This command allows users to enter a SPRE code pattern. Patterns begin with * or #. If the pattern is followed by an &, then the dial plan number-complete templates are used to determine when the unit has enough digits to dial the number (for example, 67&). However, if a dial plan does not exist for a particular code that is needed, then a SPRE code may be entered followed by an independent dial plan number-complete template (for example, *67NXX-XXXX). The available wildcards for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
The special characters ( ), -, + are always ignored. Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digit local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America.
Usage Examples
The following sets the complete pattern for SPRE 1: (config)#voice spre 1 *67NXX-XXXX
60000CRG0-35B
1308
voice spre-mode
Use the voice spre-mode command to control whether special prefix (SPRE) codes will be interpreted by the unit locally or forwarded to the network for interpretation. The override parameter indicates that the specified SPRE code is to be overridden. Use the no form of this command to return to the default setting. Variations of this command include:
voice spre-mode local voice spre-mode network voice spre-mode override *<nx>
Syntax Description
local network override *<nx> Specifies that SPRE codes are interpreted locally by the unit. Specifies the forwarding of SPRE codes to the network for handling. Indicates the configured SPRE processing mode is overridden for the specified SPRE code. Valid range for n is 2 to 9. Valid range for x is 0 to 9.
Default Values
By default, this command is set to forward SPRE codes to the network and no overrides are configured.
Command History
Release 11.1 Release A2.03 Command was introduced. Command was expanded to include the override option.
Functional Note
SPRE codes are used to map a sequence of digits to a particular functionality. For example, in a typical network, *67 is used to block caller ID. When the AOS unit is configured to operate in network mode, the digits are collected and sent to the network for appropriate handling. Using the override parameter allows the unit to be configured so that certain SPRE codes are collected locally and the corresponding function is initiated.
Usage Examples
The following example configures the unit to interpret SPRE codes: (config)#voice spre-mode local The following example configures the unit, which is configured to use the network mode, to instead interpret the SPRE code *67 locally: (config)#voice spre-mode network (config)#voice spre-mode override *67
60000CRG0-35B
1309
voice spre-map
Use the voice spre-map command to change the default mapping of special prefix (SPRE) codes on the AOS voice product. Functions and SPRE codes can be disabled by using the none keyword. Use the no form of this command to return to the default setting. Variations of this command include:
voice spre-map all none voice spre-map auto-answer-dnd *<nx> voice spre-map auto-answer-dnd none voice spre-map billing-code *<nx> voice spre-map billing-code none voice spre-map block-callid-delivery *<nx> voice spre-map block-callid-delivery none voice spre-map call-forward-cancel *<nx> voice spre-map call-forward-cancel none voice spre-map call-forward-extension *<nx> voice spre-map call-forward-extension none voice spre-map call-forward-remote *<nx> voice spre-map call-forward-remote none voice spre-map call-park-retrieve *<nx> voice spre-map call-park-retrieve none voice spre-map call-park-zone *<nx> voice spre-map call-park-zone none voice spre-map call-return *<nx> voice spre-map call-return none voice spre-map call-user-speed-dial *<nx> voice spre-map call-user-speed-dial none voice spre-map camp-on *<nx> voice spre-map camp-on none voice spre-map cancel-camp-on *<nx> voice spre-map cancel-camp-on none voice spre-map clear-message-waiting *<nx> voice spre-map clear-message-waiting none voice spre-map conference *<nx> voice spre-map conference none voice spre-map cos-override *<nx> voice spre-map cos-override none voice spre-map disable-call-waiting *<nx> voice spre-map disable-call-waiting none voice spre-map dnd-enable-disable *<nx> voice spre-map dnd-enable-disable none voice spre-map door-phone *<nx> voice spre-map door-phone none voice spre-map door-unlock *<nx> voice spre-map door-unlock none voice spre-map fwd-notificatn-cancel *<nx>
60000CRG0-35B
1310
Command Reference Guide voice spre-map fwd-notificatn-cancel none voice spre-map group-login *<nx> voice spre-map group-login none voice spre-map group-logout *<nx> voice spre-map group-logout none voice spre-map hotel-login *<nx> voice spre-map hotel-login none voice spre-map hotel-logout *<nx> voice spre-map hotel-logout none voice spre-map maca-login *<nx> voice spre-map maca-login none voice spre-map maca-logout *<nx> voice spre-map maca-logout none voice spre-map page-overhead *<nx> voice spre-map page-overhead none voice spre-map permanent-hold *<nx> voice spre-map permanent-hold none voice spre-map program-speed-dial *<nx> voice spre-map program-speed-dial none voice spre-map redial *<nx> voice spre-map redial none voice spre-map remote-call-fwd-cancel *<nx> voice spre-map remote-call-fwd-cancel none voice spre-map set-account-password *<nx> voice spre-map set-account-password none voice spre-map set-message-waiting *<nx> voice spre-map set-message-waiting none voice spre-map system-mode *<nx> voice spre-map system-mode none voice spre-map system-speed-dial *<nx> voice spre-map system-speed-dial none voice spre-map transfer *<nx> voice spre-map transfer none voice spre-map user-station-lock *<nx> voice spre-map user-station-lock none voice spre-map user-station-unlock *<nx> voice spre-map user-station-unlock none
Not all SPRE codes are supported by all AOS products. Type voice spre-map ? to view a list of supported SPRE codes.
60000CRG0-35B
1311
Syntax Description
all none *<nx> auto-answer-dnd billing-code block-callid-delivery call-forward-cancel call-forward-extension call-forward-remote call-park-retrieve call-park-zone call-return call-user-speed-dial camp-on cancel-camp-on clear-message-waiting conference cos-override disable-call-waiting dnd-enable-disable door-phone door-unlock fwd-notificatn-cancel group-login group-logout hotel-login hotel-logout maca-login maca-logout page-overhead permanent-hold program-speed-dial redial remote-call-fwd-cancel set-account-password set-message-waiting Makes the SPRE code assignment for all functions. Removes the SPRE code for the specified function. Specifies the SPRE code to assign to this function. Valid range for n is 2 to 9. Valid range for x is 0 to 9. Specifies the automatic answer do-not-disturb (DND) function. Specifies the billing code function. Specifies the block caller-ID delivery function. Specifies the call forward cancel function. Specifies the call forward + extension function. Specifies the call forward remote function. Specifies the call park retrieve function. Specifies the call park + zone function. Specifies the call return function. Specifies the call user speed dial function. Specifies the camp-on function. Specifies the cancel camp-on function. Specifies the clear message waiting function. Specifies the 3-way conferencing function. Specifies the class of service (CoS) override function. Specifies the disable call waiting on a per-call basis function. Specifies the DND enable/disable function. Specifies the door phone function. Specifies the door unlock function. Specifies the forward notification cancel function. Specifies the group login function. Specifies the group logout function. Specifies the hotel login function. Specifies the hotel logout function. Specifies the multiple access with collision avoidance (MACA) login function. Specifies the MACA logout function. Specifies the overhead paging function. Specifies the permanent hold function. Specifies the program user speed dial function. Specifies the call last dialed number function. Specifies the remote call forward cancel function. Specifies the set account password function. Specifies the set message waiting function.
60000CRG0-35B
1312
Global Configuration Mode Command Set Specifies the system mode function. Specifies the system speed dial function. Specifies the transfer function. Specifies the user station lock function. Specifies the user station unlock function.
Default Values
Default mappings between functions and SPRE codes are as indicated in the following table:
SPRE Code
*21 *67 *97 *35 *33 *34 *78 *77 *69 *62 *66 *65 *86 *22 *90 *70 *39 *37 *38
Function
Billing Code Block Caller-ID Delivery Auto-Answer Do-Not-Disturb Call Forward Cancel Call Forward + Extension Call Forward Remote Call Park Retrieve Call Park + Zone Call Return Call User Speed Dial Camp-on Cancel Camp-on Clear Message Waiting Conference 3-way Class of Service Override Disable Call Waiting Per Call Basis Do Not Disturb Enable/Disable Door Phone Door Unlock
SPRE Code
*32 *55 *56 *46 *47 *63 *64 *30 *44 *61 *72 *36 *79 *85 *20 *25 *88 *57 *58
Function
Forward Notification Cancel Group Login Group Logout Hotel Login Hotel Logout MACA Login MACA Logout Page Overhead Permanent Hold Program User Speed Dial Redial Remote Call Forward Cancel Set Account Password Set Message Waiting System Mode System Speed Dial Transfer User Station Lock User Station Unlock
Command History
Release A2.03 Command was introduced.
60000CRG0-35B
1313
Functional Notes
SPRE codes are used to map a sequence of digits to a particular functionality. For example, in a typical network, *67 is used to block caller ID. The codes and their functions are listed in the Default Values. Functions and SPRE codes can be disabled by using the none keyword.
Usage Examples
The following example sets the SPRE code for call return to *79: (config)#voice spre-map call-return *79
60000CRG0-35B
1314
Syntax Description
default-expires <value> max-expires <value> min-expires <value> Specifies a default subscription time. The valid range is 120 to 86400 seconds. Specifies a maximum subscription time. The valid range is 120 to 86400 seconds. Specifies a minimum subscription time. The valid range is 120 to 86400 seconds.
Default Values
By default, the voice status group default-expires value is set to 120 seconds, max-expires value is set to 3600, and the min-expires is set to 86400.
Command History
Release 14.1 Command was introduced.
Usage Examples
The following example sets the voice status group maximum subscription time to 2 hours: (config)#voice status-group max-expires 7200
60000CRG0-35B
1315
voice status-group
Use the voice status-group command to create or modify a voice status group and enter the Voice Status Group Configuration mode. Use the no form of this command to delete a voice status group. Variations of this command include:
voice status-group <name>
The following additional subcommands are available once you have entered the Voice Status Group Configuration mode:
park-zone <value> user <number> user <number> display-name <name> user <number> dial-string <string> user <number> display-name <name> dial-string <string>
Syntax Description
<name> park-zone <value> user <number> display-name <name> Specifies the name of the voice status group to create, modify, or delete. Specifies a new park zone number to add to this voice status group. The valid range is 0 to 9. Specifies the extension of a user to add to this voice status group. Optional. Specifies an override name to appear as the users name when displayed on the device (BLF). If the name includes spaces, it must be surrounded by quotation marks as shown in the Usage Examples. Optional. Specifies a specific number to dial. Valid entries can include a combination of characters * and 0 through 9.
dial-string <string>
Default Values
By default, there are no voice status groups configured. Unless the user explicitly enters a display-name or dial-string, these values will default to the users extension number. The dial-string and display-name cannot be added or changed after a user is added to a status group. The user must first be removed from the status group with the no user <number> command, then re-added as a member with the appropriate display-name and/or dial-string. Refer to the Usage Examples section for further details.
Command History
Release 14.1 Release A2 Command was introduced. Command was expanded to include the dial string entries.
Usage Examples
The following example creates a new voice status group with the name Engineering: (config)#voice status-group Engineering
60000CRG0-35B
1316
The following example adds park zone 4 to the Engineering status group directory: (config)#voice status-group Engineering (config-status-Engineering)#park-zone 4 The following example adds user 5555 to the Engineering status group directory, displaying the default name 5555 with the default dial string of 5555: (config)#voice status-group Engineering (config-status-Engineering)#user 5555 The following example adds user 5555 to the Engineering status group directory, displaying the name Test Lab with the default dial string of 5555: (config)#voice status-group Engineering (config-status-Engineering)#user 5555 display-name Test Lab The following example adds user 5555 to the Engineering status group directory, displaying the default name 5555 with a handsfree dial string of **5555: (config)#voice status-group Engineering (config-status-Engineering)#user 5555 dial-string **5555 The following example adds user 5555 to the Engineering status group directory, displaying the name Test Lab with a handsfree dial string of **5555: (config)#voice status-group Engineering (config-status-Engineering)#user 5555 display-name Test Lab dial-string **5555
60000CRG0-35B
1317
Default Values
The default system country code is United_States.
Command History
Release A2.04 Release A4.05 Command was introduced. Command was modified to accept the country name instead of numbers.
Functional Notes The system country determines the default parameters for other items, such as Web-based graphical user interface (GUI) language, voice prompt language (if applicable), plain old telephone service (POTS) coder-decoder (CODEC) country, subcountry ID, companding, and caller ID type. Values for these parameters may be viewed using show system on page 710. Usage Examples
The following example sets the system country to Canada: (config)#voice system-country Canada
60000CRG0-35B
1318
voice system-mode
Use the voice system-mode command to configure the system mode schedules. When triggered by the system-clock, AOS units transition into a system mode based on the schedule. Use the no form of this command to disable the setting. Variations of this command include the following:
voice system-mode custom1 <day> <time> voice system-mode custom2 <day> <time> voice system-mode custom3 <day> <time> voice system-mode default <day> <time> voice system-mode lunch <day> <time> voice system-mode night <day> <time> voice system-mode weekend <day> <time>
Syntax Description
<day> <time> custom1 - custom3 default lunch night weekend Specifies the day of the week. Choose from Sunday through Saturday. Specifies the time of the day in a 24-hour format hours:minutes (HH:MM). Indicates the custom mode (1 through 3) to configure. Indicates the default-time system mode to configure. Indicates the lunch-time system mode to configure. Indicates the night-time system mode to configure. Indicates the weekend system mode to configure.
Default Values
By default, no system mode commands are configured, the unit will operate in the default mode.
Command History
Release A1 Command was introduced.
Usage Examples
The following example configures a typical 5-day business week: (config)#voice system-mode default Monday 8:00 (config)#voice system-mode night Monday 17:00 (config)#voice system-mode default Tuesday 8:00 (config)#voice system-mode night Tuesday 17:00 (config)#voice system-mode default Wednesday 8:00 (config)#voice system-mode night Wednesday 17:00 (config)#voice system-mode default Thursday 8:00 (config)#voice system-mode night Thursday 17:00 (config)#voice system-mode default Friday 8:00 (config)#voice system-mode weekend Friday 17:00
60000CRG0-35B
1319
voice timeouts
Use the voice timeouts command to configure the time limits for phases. Use the no form of this command to return to the default setting or remove the named digit timeout (NDT) and its value. When removing an NDT and its value, if the NDT is assigned to a dial plan entry, then the deletion is not allowed. The dial plan must be removed first and added back into the system without the NDT association. Variations of this command include:
voice timeouts alerting <value> voice timeouts connected <value> voice timeouts interdigit <value> voice timeouts named-digit-timeout <ndt name> voice timeouts named-digit-timeout <ndt name> <value>
Syntax Description
alerting <value> Specifies the maximum time a call is allowed to remain in the alerting state. The shorter of this timeout or the configured maximum number of rings will determine how long a call is allowed to ring. The valid range is 0 (unlimited) to 60 minutes. Specifies the maximum time a call is allowed to remain in the connected state. The valid range is 0 (unlimited) to 1000 hours. Specifies the maximum time allowed between dialed digits. The valid range is 1 to 16 seconds. Creates a timeout with a name and a value to associate with a dial plan template. Specifies the name of the named-digit-timeout to be created. Optional. Indicates the timeout value in seconds to allow after the last digit is dialed before routing the call. The valid range is 1 to 16 seconds.
connected <value> interdigit <value> named-digit-timeout <ndt name> <ndt name> <value>
Default Values
By default, the alerting timeout is 5 minutes, the connected timeout is 12 hours, and the interdigit timeout is 4 seconds. If no value is indicated for the NDT, 0 seconds is applied.
Command History
Release 14.1 Release A2 Command was introduced. Command was expanded to include the named-digit-timeouts.
60000CRG0-35B
1320
Functional Notes
The named-digit-timeout feature allows for multiple interdigit timeouts within the system. It provides a means for associating a specific amount of time to wait after a template match is made before routing a call. This added functionality allows short numbers and long numbers to coexist in the same system (i.e., seven- and ten-digit patterns) without specifying additional characters (such as 1 or 9). This enhancement was added in AOS release A2.
Usage Examples
The following example sets the alerting timeout to 30 seconds: (config)#voice timeouts alerting 30 The following example creates a named-digit-timeout named short1 and sets the timeout value to 2 seconds: (config)#voice timeouts named-digit-timeout short1 2
60000CRG0-35B
1321
voice transfer
Use the voice transfer command to set the unattended transfer for the system only. Use the no form of this command to return to the default setting. Variations of this command include:
voice transfer blind voice transfer unattended
Syntax Description
blind unattended Converts unattended transfer attempts to RFC 3891-compliant blind transfers. Unattended transfer attempts are not modified.
Default Values
The default setting is unattended.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example configures the voice transfer type to blind: (config)#voice transfer blind
60000CRG0-35B
1322
voice transfer-mode
Use the voice transfer-mode command to specify whether transferred calls will be controlled by the unit locally, or if the network will control them. Use the no form of this command to return to the default setting. Variations of this command include:
voice transfer-mode local voice transfer-mode network
Syntax Description
local network Specifies that call transferring is controlled locally by the unit. Specifies that call transferring is controlled by the network.
Default Values
By default, the network controls call transfers.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures the unit to handle call transfers: (config)#voice transfer-mode local
60000CRG0-35B
1323
voice transfer-on-hangup
Use the voice transfer-on-hangup command to enable this feature. When transferring a call, hanging up initiates the transfer to the destination party. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this feature is enabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example enables this feature: (config)#voice transfer-on-hangup
60000CRG0-35B
1324
Syntax Description
<name> trunk <Txx> Specifies the name of the trunk list. Specifies the trunk to add to the trunk list. Trunks are specified by their 2-digit identifier. For example, T01.
Default Values
By default, no trunk lists are configured.
Command History
Release A2 Command was introduced.
Functional Notes
The trunk lists are permit/deny lists that operate in the same manner as automatic number identification (ANI) lists, and are used to specify trunks that will be permitted or denied access on specified voice trunk groups. There is no limit on the number of trunks that can be added to the trunk list, and there is no limit on the number of trunk lists that can be applied to a voice trunk group. The trunk lists are applied to the trunk group in the order they are listed.
Although there is no limit on the number of trunks allowed in a trunk list, or the number of trunk lists applied to voice trunk groups, it is important to remember that the more lists that are applied to a trunk group, the more the runtime performance of call routing will be affected. Usage Examples
The following example creates a trunk list called TEST2 and specifies the trunks to be included in the list: (config)#voice trunk-list TEST2 (config-trunk-list-TEST2)#trunk T01 (config-trunk-list-TEST2)#trunk T03
60000CRG0-35B
1325
Refer to the SIP Trunk configuration guide and the Total Access 900 Series ISDN PRI quick configuration guide for more information on voice trunks. These documents are located on the AOS Documentation CD provided with your unit. Syntax Description
<trunk id> isdn sip Specifies the trunk's two-digit identifier in the format Txx (for example, T12). Configures the trunk for use with ISDN service. Configures this trunk for use with SIP.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release 11.1 Command was introduced. Command was expanded to include the analog and ISDN support.
Usage Examples
The following example creates the new trunk T12 for use with SIP and enters the Voice Trunk Configuration mode: (config)#voice trunk t12 type sip (config-T12)#
60000CRG0-35B
1326
Syntax Description
<trunk id> dpt ground-start loop-start Specifies the trunks two-digit identifier in the format Txx (for example, T01). Specifies dial pulse terminate (DPT) with an assumed user role. Specifies ground start (GS) with an assumed user role. Specifies loop start (LS) with an assumed user role.
Default Values
No default values are necessary for this command.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example creates the new trunk T15 for use with an analog interface and enters the Voice Trunk Analog DPT Configuration mode: (config)#voice trunk t15 type analog supervision dpt (config-T15)#
60000CRG0-35B
1327
Syntax Description
<trunk id> fgd ground-start immediate loop-start tie-fgd wink role network role user Specifies the trunk's two-digit identifier in the format Txx (for example, T01). Specifies feature group D (FGD) with an assumed user role. Specifies ground start (GS) with an assumed user role. Specifies E&M immediate with an assumed network or user role. Specifies loop start (LS) with an assumed user role. Specifies tie trunk with FGD. Specifies wink with an assumed network or user role. Specifies the network role for this trunk. Specifies the user role for this trunk.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 12.1 Command was introduced. Command was expanded.
Usage Examples
The following example creates the new trunk T15 for use with a T1 interface and enters the Voice Trunk T1 Wink Configuration mode: (config)#voice trunk t15 type t1-rbs supervision wink role network (config-T15)#
60000CRG0-35B
1328
Default Values
By default, there are no configured voice users.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example creates a new user with extension 9876: (config)#voice user 9876 Configuring New User 9876. (config-9876)#
60000CRG0-35B
1329
Syntax Description
<hostname> mgcp sip tcp udp Specifies the fully qualified domain name (FQDN) of the added host. Specifies that Media Gateway Control Protocol (MGCP) is the service type for the VNS service request. Specifies that Session Initiation Protocol (SIP) is the service type for the VNS service request. Optional. Specifies that Transmission Control Protocol (TCP) is the protocol used for the service request. Optional. Specifies that User Datagram Protocol (UDP) is the protocol used for the service request.
Default Values
By default, both MGCP and SIP VNS requests use UDP.
Functional Notes
Voice and media signaling protocols (such as SIP) often rely on domain naming system (DNS) in order to ease configuration and administration of endpoints and also to implement redundancy mechanisms provided by DNS service records. Because voice and media signaling protocols are often directly coupled to a user experience, applications are often very sensitive to latency introduced by the DNS mechanism. AOS voice products rely on the ability to resolve names to one or more service or address records quickly in order to place a call or register to an external voice server. The DNS server is often not local to the AOS unit, and it is not guaranteed to be accessible, even when other mechanisms necessary for successful call completion may be available. A DNS request for a particular host name results in local caching by the AOS unit, after which the DNS information is quickly available without requiring additional requests. The cache remains populated until the cached record expires.
60000CRG0-35B
1330
The VNS system in the AOS product implements preemptive and persistent caching of DNS records for voice signaling protocols. The VNS system maintains a table of DNS records in a cache for voice signaling protocols like SIP and MGCP. For example, if a request is generated from a SIP client (such as a SIP trunk or SIP proxy), for which there is a configured SIP server entity (sucha as a proxy address or SIP server address), the request is always serviced from the local DNS cache (rather than from an external DNS server). This ensures that SIP access to DNS is always available immediately, even during transient DNS outages. The VNS system in AOS can be configured manually by adding a host to the cache (using the command voip name-service host on page 1331) and by specifying the number of attempts used by VNS to verify the DNS cache changes (using the command voip name-service verification attempts <number> interval <seconds> on page 1333). You can view the VNS cache by using the commands show voip name-service cache on page 769 and show voip name-service name-table on page 770. Configuring an FQDN using the voip name-service host command forces the FQDN resolution (using DNS) to never timeout from the DNS name table. Each DNS record has a time to live (TTL) value that specifies the amount of time to cache the record. After this time, the DNS table (by default) removes the record from the cache. VNS issues DNS queries in an attempt to keep voice-related records cached in the DNS name table, but if the DNS name servers are not available, the records can expire from the DNS name table. The records associated with configured VNS host FQDNs are not flushed from the cache regardless of the TTL or age of the record, but rather are permanently cached dynamic resolutions.
Command History
Release A4.03 Command was introduced.
Usage Examples
The following example adds the SIP host example.user.net to the VNS/DNS cache, using TCP requests: (config)#voip name-service host example.user.net sip tcp
60000CRG0-35B
1331
Default Values
By default, the VNS system does not verify DNS changes.
Functional Notes
Voice and media signaling protocols (such as SIP) often rely on DNS in order to ease configuration and administration of endpoints and also to implement redundancy mechanisms provided by DNS service records. Because voice and media signaling protocols are often directly coupled to a user experience, applications are often very sensitive to latency introduced by the DNS mechanism. AOS voice products rely on the ability to resolve names to one or more service or address records quickly in order to place a call or register to an external voice server. The DNS server is often not local to the AOS unit, and it is not guaranteed to be accessible, even when other mechanisms necessary for successful call completion may be available. A DNS request for a particular host name results in local caching by the AOS unit, after which the DNS information is quickly available without requiring additional requests. The cache remains populated until the cached record expires. The VNS system in the AOS product implements preemptive and persistent caching of DNS records for voice signaling protocols. The VNS system maintains a table of DNS records in a cache for voice signaling protocols like Session Initiation Protocol (SIP) and Media Gateway Control Protocol (MGCP). For example, if a request is generated from a SIP client (such as a SIP trunk or SIP proxy), for which there is a configured SIP server entity (such as a proxy address or SIP server address), the request is always serviced from the local DNS cache (rather than from an external DNS server). This ensures that SIP access to DNS is always available immediately, even during transient DNS outages. The VNS system in AOS can be configured manually by adding a host to the cache (using the command voip name-service host on page 1331) and by specifying the number of attempts used by VNS to verify the DNS cache changes (using the command voip name-service verification attempts <number> interval <seconds> on page 1333). You can view the VNS cache by using the commands show voip name-service cache on page 769 and show voip name-service name-table on page 770.
Command History
Release A4.03 Command was introduced.
60000CRG0-35B
1332
Usage Examples
In the following example, the VNS system is configured to use 3 attempts to validate a DNS change, with 30 seconds between each attempt: (config)#voip name-service verification attempts 3 interval 30
60000CRG0-35B
1333
Keep in mind that changing an interfaces VRF association will clear all IP-related settings on that interface. Syntax Description
<name> Specifies the name of the VRF to which to assign the interface.
Default Values
By default, interfaces are associated with the default VRF that is unnumbered.
Command History
Release 16.1 Release 17.8 Command was introduced. The keyword ip was removed from this command.
Functional Notes
VRF instances must be created first before an interface can be assigned. An interface can only be assigned to one VRF, but multiple interfaces can be assigned to the same VRF. An interface will only forward IP traffic that matches its associated VRF. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured.
Usage Examples
The following example assigns the frame-relay 1.16 interface to the VRF instance named RED: (config)#interface frame-relay 1.16 (config-fr 1.16)#vrf forwarding RED
60000CRG0-35B
1334
60000CRG0-35B
1335
60000CRG0-35B
1336
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. accounting commands begin on page 1338 authorization commands begin on page 1341 databits <value> on page 1343 flowcontrol on page 1344 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1345 line-timeout <value> on page 1346 login on page 1347 login authentication <listname> on page 1348 login local-userlist on page 1349 parity on page 1350 password <password> on page 1351 speed <rate> on page 1352 stopbits <value> on page 1353
60000CRG0-35B
1337
Syntax Description
<level> default <listname> Specifies whether the list applies to Level 1 (unprivileged) or Level 15 (privileged) commands. Applies the default AAA command accounting method list to the interface. Applies the specified AAA command accounting method list to the interface.
Default Values
By default, no AAA command accounting method list is applied to the line interface.
Command History
Release 11.1 Command was introduced.
Functional Notes
AAA command accounting method lists are used to specify the types of information recorded when users access specified command levels. For more information about configuring command accounting lists, refer to the command aaa accounting connection on page 802. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that AAA command accounting list Accounting1 is applied to all Level 15 commands on all console lines: (config)#line console 0 (config-con 0)#accounting commands 15 Accounting1
60000CRG0-35B
1338
Syntax Description
default <listname> Applies the default AAA connection accounting method list to the interface. Applies the specified AAA connection accounting method list to the interface.
Default Values
By default, no AAA command accounting method list is applied to the line interface.
Command History
Release 13.1 Command was introduced.
Functional Notes
AAA connection accounting method lists are used to specify the types of information recorded about outbound connections made from the AOS unit. For more information about configuring connection accounting lists, refer to the command aaa accounting connection on page 802. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that AAA connection accounting list AcctConn1 is applied to all console lines: (config)#line console 0 (config-con 0)#accounting connection AcctConn1
60000CRG0-35B
1339
Syntax Description
default <listname> Applies the default AAA connection accounting method list to the interface. Applies the specified AAA connection accounting method list to the interface.
Default Values
By default, no AAA command accounting method list is applied to the line interface.
Command History
Release 13.1 Command was introduced.
Functional Notes
AAA executive accounting method lists are used to specify the types of information recorded about inbound connections made by connecting to the line interfaces and creating a terminal session. For more information about configuring executive accounting lists, refer to the command aaa accounting exec on page 805. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that AAA executive accounting list Inboundacct1 is applied to the console line: (config)#line console 0 (config-con 0)#accounting exec Inboundacct1
60000CRG0-35B
1340
Syntax Description
<level> default <listname> Specifies whether the list applies to Level 1 (unprivileged) or Level 15 (privileged) commands. Applies the default AAA command authorization method list to the interface. Applies the specified AAA command authorization method list to the interface.
Default Values
By default, no AAA command authorization method list is applied to the line interface.
Command History
Release 11.1 Command was introduced.
Functional Notes
AAA command authorization method lists are used to allow or restrict the use of certain commands on a per-user basis. For more information about configuring command authorization lists, refer to the command aaa authorization commands <level> on page 822. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that AAA command authorization list Authorization1 is applied to the Level 15 commands on all console line: (config)#line console 0 (config-con 0)#authorization commands 15 Authorization1
60000CRG0-35B
1341
Syntax Description
default <listname> Applies the default AAA Enable mode authorization method list to the interface. Applies the specified AAA Enable mode authorization method list to the interface.
Default Values
By default, no AAA Enable mode authorization method list is applied to the line interface.
Command History
Release 13.1 Command was introduced.
Functional Notes
AAA Enable mode authorization method lists are used to allow or restrict user access to the privileged command line interface (CLI) mode (Enable mode). For more information about configuring Enable mode authorization lists, refer to the command aaa authorization exec on page 827. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that AAA Enable mode authorization list ExecList1 is applied to the console line: (config)#line console 0 (config-con 0)#authorization exec ExecList1
60000CRG0-35B
1342
databits <value>
Use the databits command to set the number of databits per character for a terminal session. This value must match the configuration of your VT100 terminal or terminal emulator software. Use the no form of this command to return to the default value. Syntax Description
<value> Specifies the data bits per character. Select from 7 or 8 databits per character.
Default Values
By default, the databits are set to 8.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example configures 7 databits per character for the console terminal session: (config)#line console 0 (config-con 0)#databits 7
60000CRG0-35B
1343
flowcontrol
Use the flowcontrol command to set flow control for the line console. Use the no form of this command to return to the default setting. Variations of this command include:
flowcontrol none flowcontrol software in
Syntax Description
none software in Specifies no flow control. Configures AOS to derive flow control from the attached device.
Default Values
By default, flow control is set to none.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example configures no flow control for the line console: (config)#line console 0 (config-con 0)#flowcontrol none
60000CRG0-35B
1344
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#line console 0 (config-con 0)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1345
line-timeout <value>
Use the line-timeout command to specify the number of minutes a line session may remain inactive before AOS terminates the session. Use the no form of this command to return to the default value. Syntax Description
<value> Specifies the number of minutes a line session may remain inactive before AOS terminates the session. Range is 0 to 35791 minutes. Entering a line-timeout value of 0 disables the feature.
Default Values
By default, the line-timeout is set to 15 minutes (Console and Telnet).
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example specifies a timeout of 2 minutes: (config)#line console 0 (config-con 0)#line-timeout 2
60000CRG0-35B
1346
login
Use the login command to enable security login on the line session. Additionally, it is necessary to configure the password using the command password <password> on page 1351. Use the no form of this command to disable the login feature. Syntax Description
No subcommands.
Default Values
By default, secure login is disabled.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example enables the security login feature and specifies a password (mypassword) on the available console session: (config)#line console 0 (config-console 0)#login (config-con 0)#password mypassword
60000CRG0-35B
1347
Default Values
By default, no AAA login authentication method list is specified. If AAA is enabled (using the command aaa on on page 833), but no login authentication method list is specified, the default login authentication method list is used. If the default list is used, but the default list has not been configured, console interfaces will automatically grant access (to prevent a lockout situation).
Command History
Release 5.1 Command was introduced.
Functional Notes
AAA login authentication method lists are used to verify user logins on the line interface. For more information about configuring login authentication method lists, refer to the command aaa authentication login on page 815. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that the AAA login authentication method list AuthList1 is applied to the console line: (config)#line console 0 (config-con 0)#login authentication AuthList1
60000CRG0-35B
1348
login local-userlist
Use the login local-userlist command to enable security login for the terminal session. It is required to configure user names and passwords using the username/password command from the Global Configuration mode (refer to username <username> password <password> on page 1252). Use the no form of this command to disable the login local-userlist feature. All user properties assigned using the username/password command are valid when using the login local-userlist command.
Syntax Description
No subcommands.
Default Values
By default, there is no login password set to access the unit.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example displays creating a local userlist and enabling the security login feature on the CONSOLE port: (config)#username my_user password my_password (config)#line console 0 (config-con 0)#login local-userlist When connecting to the unit, the following prompts are displayed: User Access Login Username: ADTRAN Password: Router#
60000CRG0-35B
1349
parity
Use the parity command to specify the type of parity used as error correction. This value must match the configuration of your VT100 terminal or terminal emulator software. Use the no form of this command to return to the default value. Variations of this command include:
parity even parity mark parity none parity odd parity space
Syntax Description
even mark none odd space Sets the parity bit to 0 if the number of 1 bits in the data sequence is odd, or set to 1 if the number of 1 bits is even. Always sets the parity bit to 1. No parity bit used. Sets the parity bit to 1 if the number of 1 bits in the data sequence is even, or set to 1 if the number is odd. Always sets the parity bit to 0.
Default Values
By default, the parity option is set to none.
Command History
Release 1.1 Command was introduced.
Functional Notes
Parity is the process used to detect whether characters have been altered during the data transmission process. Parity bits are appended to data frames to ensure that parity (whether it be odd or even) is maintained.
Usage Examples
The following example specifies mark parity for the console terminal session: (config)#line console 0 (config-con 0)#parity mark
60000CRG0-35B
1350
password <password>
Use the password command to configure the password (with optional encryption) required on the line session when security login is enabled (using the command login on page 1347). Use the no form of this command to remove a configured password. Variations of this command include:
password <password> password md5 <password>
Syntax Description
<password> md5 Specifies the password for the line session using an alphanumeric character string (up to 16 characters). Specifies message digest 5 (MD5) as the encryption protocol to use when displaying the enable password during show commands. If the MD5 keyword is not used, encryption is not used when displaying the enable password during show commands.
Default Values
By default, there is no login password set for access to the unit.
Command History
Release 1.1 Release 6.1 Command was introduced. Encryption was added.
Usage Examples
The following example enables the security login feature and specifies a password on the CONSOLE port: (config)#line console 0 (config-con 0)#login (config-con 0)#password mypassword To provide extra security, AOS can encrypt the enable password when displaying the current configuration. For example, the following is a show configuration printout (password portion) with an unencrypted enable password (ADTRAN): ! enable password ADTRAN ! Alternately, the following is a show configuration printout (password portion) with an enable password of ADTRAN using md5 encryption: ! enable password md5 encrypted 5aa5fbae7d01a90e79fb57705ce74676 !
60000CRG0-35B
1351
speed <rate>
Use the speed command to specify the data rate for the CONSOLE port. This setting must match your VT100 terminal emulator or emulator software. Use the no form of this command to restore the default value. Syntax Description
<rate> Specifies rate of data transfer on the interface (2400; 4800; 9600; 19200; 38400; 57600; or 115200 bps).
Default Values
By default, the speed is set to 9600 bps.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example configures the CONSOLE port for 19200 bps: (config)#line console 0 (config-con 0)#speed 19200
60000CRG0-35B
1352
stopbits <value>
Use the stopbits command to set the number of stopbits per character for a terminal session. This value must match the configuration of your VT100 terminal or terminal emulator software. The default is 1 stopbit per character. Use the no form of this command to return to the default value. Syntax Description
<value> Specifies the stopbits per character. Select from 1 or 2 stopbits per character.
Default Values
By default, the stopbits are set to 1.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example configures 2 stopbits per character for the console terminal session: (config)#line console 0 (config-con 0)#stopbits 2
60000CRG0-35B
1353
You can select a single line by entering the line ssh command followed by the line number (0-4). For example:
>enable #configure terminal (config)#line ssh 2 (config-ssh2)#
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. access-class <name> in on page 1355 accounting commands begin on page 1357 authorization commands begin on page 1360 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1362 line-timeout <value> on page 1363 login on page 1364 login authentication <listname> on page 1365 login local-userlist on page 1366
60000CRG0-35B
1354
access-class <name> in
Use the access-class in command to restrict secure shell (SSH) access using a configured access control list (ACL). Received packets passed by the ACL will be allowed. Use the ACL configuration to deny hosts or entire networks or to permit specified IP addresses. Use the no form of this command to disable this feature. Refer to ip access-list standard <ipv4 acl name> on page 900 and ip access-list extended <ipv4 acl name> on page 898 for more information about configuring ACLs. Variations of this command include:
access-class <name> in access-class <name> in any-vrf
Syntax Description
<name> any-vrf Identifies the configured ACL using an alphanumeric descriptor (all ACL descriptors are case sensitive). Optional. Allows incoming connections from any VPN routing and forwarding (VRF) instance based on the parameters set in the access class list. Without this keyword, the ACL only applies to the default VRF and all Telnet/SSH connections on nondefault VRFs will be ignored.
Default Values
By default, there are no configured ACLs associated with SSH sessions.
Command History
Release 11.1 Release 16.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
When using the access-class in command to associate an ACL with an SSH session, remember to duplicate the access-class in command for all configured SSH sessions 0 through 4. SSH access to the unit using a specific SSH session is not possible. Users will be assigned the first available SSH session. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured.
60000CRG0-35B
1355
Usage Examples
The following example associates the ACL Trusted (to allow SSH sessions from the 192.22.56.0 /24 network) with all SSH sessions (0 through 4) on all VRF instances: Create the ACL: (config)#ip access-list standard Trusted (config)#permit 192.22.56.0 0.0.0.255 Enter the line (SSH): (config)#line ssh 0 4 Associate the ACL with the SSH session: (config-ssh0-4)#access-class Trusted in any-vrf
60000CRG0-35B
1356
Syntax Description
<level> default <listname> Specifies whether the list applies to Level 1 (unprivileged) or Level 15 (privileged) commands. Applies the default AAA command accounting method list to the interface. Applies the specified AAA command accounting method list to the interface.
Default Values
By default, no AAA command accounting method list is applied to the line interface.
Command History
Release 11.1 Command was introduced.
Functional Notes
AAA command accounting method lists are used to specify the types of information recorded when users access specified command levels. For more information about configuring command accounting lists, refer to the command aaa accounting connection on page 802. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that AAA command accounting list Accounting1 is applied to all Level 15 commands on all secure shell (SSH) lines: (config)#line ssh 0 4 (config-ssh0-4)#accounting commands 15 Accounting1
60000CRG0-35B
1357
Syntax Description
default <listname> Applies the default AAA connection accounting method list to the interface. Applies the specified AAA connection accounting method list to the interface.
Default Values
By default, no AAA command accounting method list is applied to the line interface.
Command History
Release 13.1 Command was introduced.
Functional Notes
AAA connection accounting method lists are used to specify the types of information recorded about outbound connections made from the AOS unit. For more information about configuring connection accounting lists, refer to the command aaa accounting connection on page 802. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that AAA connection accounting list AcctConn1 is applied to all secure shell (SSH) lines: (config)#line ssh 0 4 (config-ssh0-4)#accounting connection AcctConn1
60000CRG0-35B
1358
Syntax Description
default <listname> Applies the default AAA connection accounting method list to the interface. Applies the specified AAA connection accounting method list to the interface.
Default Values
By default, no AAA command accounting method list is applied to the line interface.
Command History
Release 13.1 Command was introduced.
Functional Notes
AAA executive accounting method lists are used to specify the types of information recorded about inbound connections made by connecting to the line interfaces and creating a terminal session. For more information about configuring executive accounting lists, refer to the command aaa accounting exec on page 805. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that AAA executive accounting list Inboundacct1 is applied to all secure shell (SSH) lines: (config)#line ssh 0 4 (config-ssh0-4)#accounting exec Inboundacct1
60000CRG0-35B
1359
Syntax Description
<level> default <listname> Specifies whether the list applies to Level 1 (unprivileged) or Level 15 (privileged) commands. Applies the default AAA command authorization method list to the interface. Applies the specified AAA command authorization method list to the interface.
Default Values
By default, no AAA command authorization method list is applied to the line interface.
Command History
Release 11.1 Command was introduced.
Functional Notes
AAA command authorization method lists are used to allow or restrict the use of certain commands on a per-user basis. For more information about configuring command authorization lists, refer to the command aaa authorization commands <level> on page 822. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that AAA command authorization list Authorization1 is applied to all Level 15 commands on all secure shell (SSH) lines: (config)#line ssh 0 4 (config-ssh0-4)#authorization commands 15 Authorization1
60000CRG0-35B
1360
Syntax Description
default <listname> Applies the default AAA Enable mode authorization method list to the interface. Applies the specified AAA Enable mode authorization method list to the interface.
Default Values
By default, no AAA Enable mode authorization method list is applied to the line interface.
Command History
Release 13.1 Command was introduced.
Functional Notes
AAA Enable mode authorization method lists are used to allow or restrict user access to the privileged command line interface (CLI) mode (Enable mode). For more information about configuring Enable mode authorization lists, refer to the command aaa authorization exec on page 827. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that AAA Enable mode authorization list ExecList1 is applied to all secure shell (SSH) lines: (config)#line ssh 0 4 (config-ssh0-4)#authorization exec ExecList1
60000CRG0-35B
1361
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#line ssh 0 4 (config-ssh0-4)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1362
line-timeout <value>
Use the line-timeout command to specify the number of minutes a line session may remain inactive before AOS terminates the session. Use the no form of this command to return to the default value. Syntax Description
<value> Specifies the number of minutes a line session may remain inactive before AOS terminates the session. Valid range: 0 to 35791. Entering a line-timeout value of 0 disables the feature.
Default Values
By default, the line-timeout is set to 15 minutes.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example specifies a timeout of 2 minutes for all secure shell (SSH) sessions: (config)#line ssh 0 4 (config-ssh0-4)#line-timeout 2
60000CRG0-35B
1363
login
Use the login command to enable security login on the line session requiring the password configured using the password command. Use the no form of this command to disable the login feature. Syntax Description
No subcommands.
Default Values
By default, secure login is disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example enables the security login feature and specifies a password (mypassword) on all the available secure shell (SSH) sessions (0 through 4): (config)#line ssh 0 4 (config-ssh0-4)#login (config-ssh0-4)#password mypassword
60000CRG0-35B
1364
Default Values
By default, no AAA login authentication method list is specified. If AAA is enabled (using the command aaa on on page 833), but no login authentication method list is specified, the default login authentication method list is used. If the default list is used, but the default list has not been configured, secure shell (SSH) interfaces use the local user database for authentication.
Command History
Release 5.1 Command was introduced.
Functional Notes
AAA login authentication method lists are used to verify user logins on the line interface. For more information about configuring login authentication method lists, refer to the command aaa authentication login on page 815. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that the AAA login authentication method list AuthList1 is applied to all SSH lines: (config)#line ssh 0 4 (config-ssh0-4)#login authentication AuthList1
60000CRG0-35B
1365
login local-userlist
Use the login local-userlist command to check the local list of user names and passwords configured using the username/password Global Configuration command (refer to username <username> password <password> on page 1252). All user properties assigned using the username/password command are valid when using the login local-userlist command.
Syntax Description
No subcommands.
Default Values
By default, there is no login password set for access to the unit.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example creates a local userlist and enables the security login feature: (config)#username my_user password my_password (config)#line ssh 0 (config-ssh0)#login local-userlist When connecting to the unit, the following prompts are displayed: User Access Login Username: my_user Password: #
60000CRG0-35B
1366
You can select a single line by entering the line telnet command followed by the line number (0-4). For example:
>enable #configure terminal (config)#line telnet 2 (config-telnet2)#
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. access-class <name> in on page 1368 accounting commands begin on page 1370 authorization commands begin on page 1373 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1375 line-timeout <value> on page 1376 login on page 1377 login authentication <listname> on page 1378 login local-userlist on page 1379 password <password> on page 1380
60000CRG0-35B
1367
access-class <name> in
Use the access-class in command to restrict secure shell (SSH) access using a configured access control list (ACL). Received packets passed by the ACL will be allowed. Use the ACL configuration to deny hosts or entire networks or to permit specified IP addresses. Use the no form of this command to disable this feature. Refer to ip access-list standard <ipv4 acl name> on page 900 and ip access-list extended <ipv4 acl name> on page 898 for more information about configuring ACLs. Variations of this command include:
access-class <name> in access-class <name> in any-vrf
Syntax Description
<name> any-vrf Identifies the configured ACL using an alphanumeric descriptor (all ACL descriptors are case sensitive). Optional. Allows incoming connections from any VPN routing and forwarding (VRF) instance based on the parameters set in the access class list. Without this keyword, the ACL only applies to the default VRF and all Telnet/SSH connections on nondefault VRFs will be ignored.
Default Values
By default, there are no configured ACLs associated with SSH sessions.
Command History
Release 11.1 Release 16.1 Command was introduced. Command was expanded to include the vrf parameter.
Functional Notes
When using the access-class in command to associate an ACL with an SSH session, remember to duplicate the access-class in command for all configured SSH sessions 0 through 4. SSH access to the unit using a specific SSH session is not possible. Users will be assigned the first available SSH session. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured.
60000CRG0-35B
1368
Usage Examples
The following example associates the ACL Trusted (to allow Telnet sessions from the 192.22.56.0 /24 network) with all Telnet sessions (0 through 4) on all VRF instances: Create the ACL: (config)#ip access-list standard Trusted (config)#permit 192.22.56.0 0.0.0.255 Enter the line (Telnet): (config)#line ssh 0 4 Associate the ACL with the Telnet session: (config-telnet0-4)#access-class Trusted in any-vrf
60000CRG0-35B
1369
Syntax Description
<level> default <listname> Specifies whether the list applies to Level 1 (unprivileged) or Level 15 (privileged) commands. Applies the default AAA command accounting method list to the interface. Applies the specified AAA command accounting method list to the interface.
Default Values
By default, no AAA command accounting method list is applied to the line interface.
Command History
Release 11.1 Command was introduced.
Functional Notes
AAA command accounting method lists are used to specify the types of information recorded when users access specified command levels. For more information about configuring command accounting lists, refer to the command aaa accounting connection on page 802. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that AAA command accounting list Accounting1 is applied to all Level 15 commands on all Telnet lines: (config)#line telnet 0 4 (config-telnet0-4)#accounting commands 15 Accounting1
60000CRG0-35B
1370
Syntax Description
default <listname> Applies the default AAA connection accounting method list to the interface. Applies the specified AAA connection accounting method list to the interface.
Default Values
By default, no AAA command accounting method list is applied to the line interface.
Command History
Release 13.1 Command was introduced.
Functional Notes
AAA connection accounting method lists are used to specify the types of information recorded about outbound connections made from the AOS unit. For more information about configuring connection accounting lists, refer to the command aaa accounting connection on page 802. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that AAA connection accounting list AcctConn1 is applied to all Telnet lines: (config)#line telnet 0 4 (config-telnet0-4)#accounting connection AcctConn1
60000CRG0-35B
1371
Syntax Description
default <listname> Applies the default AAA connection accounting method list to the interface. Applies the specified AAA connection accounting method list to the interface.
Default Values
By default, no AAA command accounting method list is applied to the line interface.
Command History
Release 13.1 Command was introduced.
Functional Notes
AAA executive accounting method lists are used to specify the types of information recorded about inbound connections made by connecting to the line interfaces and creating a terminal session. For more information about configuring executive accounting lists, refer to the command aaa accounting exec on page 805. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that AAA executive accounting list Inboundacct1 is applied to all Telnet lines: (config)#line telnet 0 4 (config-telnet0-4)#accounting exec Inboundacct1
60000CRG0-35B
1372
Syntax Description
<level> default <listname> Specifies whether the list applies to Level 1 (unprivileged) or Level 15 (privileged) commands. Applies the default AAA command authorization method list to the interface. Applies the specified AAA command authorization method list to the interface.
Default Values
By default, no AAA command authorization method list is applied to the line interface.
Command History
Release 11.1 Command was introduced.
Functional Notes
AAA command authorization method lists are used to allow or restrict the use of certain commands on a per-user basis. For more information about configuring command authorization lists, refer to the command aaa authorization commands <level> on page 822. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that AAA command authorization list Authorization1 is applied to all Level 15 commands on all Telnet lines: (config)#line telnet 0 4 (config-telnet0-4)#authorization commands 15 Authorization1
60000CRG0-35B
1373
Syntax Description
default <listname> Applies the default AAA Enable mode authorization method list to the interface. Applies the specified AAA Enable mode authorization method list to the interface.
Default Values
By default, no AAA Enable mode authorization method list is applied to the line interface.
Command History
Release 13.1 Command was introduced.
Functional Notes
AAA Enable mode authorization method lists are used to allow or restrict user access to the privileged command line interface (CLI) mode (Enable mode). For more information about configuring Enable mode authorization lists, refer to the command aaa authorization exec on page 827. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that AAA Enable mode authorization list ExecList1 is applied to all Telnet lines: (config)#line telnet 0 4 (config-telnet0-4)#authorization exec ExecList1
60000CRG0-35B
1374
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#line telnet 0 (config-telnet0)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1375
line-timeout <value>
Use the line-timeout command to specify the number of minutes a line session may remain inactive before AOS terminates the session. Use the no form of this command to return to the default value. Syntax Description
<value> Specifies the number of minutes a line session may remain inactive before AOS terminates the session. Range is 0 to 35791 minutes. Entering a line-timeout value of 0 disables the feature.
Default Values
By default, the line-timeout is set to 15 minutes (Console and Telnet).
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example specifies a timeout of 2 minutes: (config)#line telnet 0 (config-telnet0)#line-timeout 2
60000CRG0-35B
1376
login
Use the login command to enable security login on the line session requiring the password configured using the password command. Use the no form of this command to disable the login feature. Syntax Description
No subcommands.
Default Values
By default, secure login is disabled.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example enables the security login feature and specifies a password on all the available Telnet sessions (0 through 4): (config)#line telnet 0 4 (config-telnet0-4)#login (config-telnet0-4)#password mypassword
60000CRG0-35B
1377
Default Values
By default, no AAA login authentication method list is specified. If AAA is enabled (using the command aaa on on page 833), but no login authentication method list is specified, the default login authentication method list is used. If the default list is used, but the default list has not been configured, Telnet interfaces use the local user database for authentication.
Command History
Release 5.1 Command was introduced.
Functional Notes
AAA login authentication method lists are used to verify user logins on the line interface. For more information about configuring login authentication method lists, refer to the command aaa authentication login on page 815. For more information about configuring AAA on your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that the AAA login authentication method list AuthList1 is applied to all Telnet lines: (config)#line telnet 0 4 (config-telnet0-4)#login authentication AuthList1
60000CRG0-35B
1378
login local-userlist
Use the login local-userlist command to enable security login for the terminal session requiring the user names and passwords configured using the username/password Global Configuration command. Use the no form of this command to disable the login local-userlist feature. All user properties assigned using the username/password command are valid when using the login local-userlist command.
Syntax Description
No subcommands.
Default Values
By default, there is no login password set for access to the unit.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example displays creating a local userlist and enabling the security login feature: (config)#username my_user password my_password (config)#line telnet 0 (config-telnet0)#login local-userlist When connecting to the unit, the following prompts are displayed: User Access Login Username: my_user Password: Router#
60000CRG0-35B
1379
password <password>
Use the password command to configure the password (with optional encryption) required on the line session when security login is enabled (using the login command). Use the no form of this command to remove a configured password. Variations of this command include:
password <password> password md5 <password>
Syntax Description
<password> md5 Specifies the password for the line session using an alphanumeric character string (up to 16 characters). Optional. Specifies message digest 5 (MD5) as the encryption protocol to use when displaying the enable password during show commands. If the MD5 keyword is not used, encryption is not used when displaying the enable password during show commands.
Default Values
By default, there is no login password set for access to the unit.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example enables the security login feature and specifies a password for the Telnet session 0: (config)#line telnet 0 (config-telnet0)#login (config-telnet0)#password mypassword To provide extra security, AOS can encrypt the enable password when displaying the current configuration. For example, the following is a show configuration printout (password portion) with an unencrypted enable password (ADTRAN): ! enable password ADTRAN ! Alternately, the following is a show configuration printout (password portion) with an enable password of ADTRAN using md5 encryption: ! enable password md5 encrypted 5aa5fbae7d01a90e79fb57705ce74676 !
60000CRG0-35B
1380
60000CRG0-35B
1381
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. interop-flag on page 1383 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1384 phy-flag on page 1385 retrain on page 1386 snr-margin on page 1387 training-mode on page 1388
60000CRG0-35B
1382
interop-flag
This command is for future configuration and should not be modified. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release A4.05 Command was introduced.
60000CRG0-35B
1383
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface adsl 0/1 (config-adsl 0/1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1384
phy-flag
This command is for future configuration and should not be modified. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release A4.05 Command was introduced.
60000CRG0-35B
1385
retrain
Use the retrain command to force the modem to retrain. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example forces a modem retrain: (config)#interface adsl 0/1 (config-adsl 0/1)#retrain
60000CRG0-35B
1386
snr-margin
Use the snr-margin command to enable monitoring and set the minimum signal-to-noise ratio (SNR) during training and showtime. Use the no form of this command to disable monitoring. Variations of this command include:
snr-margin <margin> snr-margin showtime monitor snr-margin training monitor
Syntax Description
<margin> showtime monitor Sets the minimum SNR margin value in dB. The range is from 1 to 15 dB. Enables margin monitoring to retrain the asymmetric digital subscriber line (ADSL) interface if the specified minimum margin is violated during showtime. Enables margin monitoring to retrain the ADSL interface if the specified minimum margin is violated during training.
training monitor
Default Values
By default, SNR margin monitoring is disabled.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example enables SNR margin monitoring during showtime with a minimum level of 7 dB: (config)#interface adsl 0/1 (config-adsl 0/1)#snr-margin showtime monitor 7
60000CRG0-35B
1387
training-mode
Use the training-mode command to configure the asymmetric digital subscriber line (ADSL) training mode. Use the no form of this command to disable a specific training mode. Variations of this command include:
training-mode ADSL2 training-mode ADSL2+ training-mode ADSL2+ANNEX-M training-mode G.DMT training-mode G.LITE training-mode Multi-Mode training-mode Multi-Mode-no-T1413 training-mode READSL2 training-mode T1.413
Syntax Description
ADSL2 ADSL2+ ADSL2+ANNEX-M G.DMT G.LITE Multi-Mode Specifies International Telecommunication Union (ITU) G.992.3 mode. Specifies ITU G.992.5 mode. Specifies ITU G.992.5 Annex M mode. Specifies ANSI full-rate mode. Specifies ANSI splitterless mode. Specifies auto detect mode. When set to multi-mode, the ADSL interface attempts to train to the DSLAM using each of the supported training modes until a match is found. Specifies auto detect mode without ANSI T1.413 capability. Specifies ITU G.992.3 Annex L mode. Specifies ANSI T1.413 mode.
Default Values
By default, the training mode is set to Multi-Mode.
Command History
Release 8.1 Release 13.1 Release A4.05 Command was introduced. Command was expanded to include the ITU G.992.5 Annex M mode. Command was expanded to include the Multi-Mode-no-T1413 parameter.
Functional Notes
Some of the listed training modes (G.LITE, T1.413, ADSL2, ADSL2+, READSL2) are currently supported for ADSL over plain old telephone service (POTS) (Annex A) and are not valid for ADSL over integrated services digital network (ISDN) (Annex B) modules.
60000CRG0-35B
1388
Usage Examples
The following example sets the training mode to T1.413: (config)#interface adsl 0/1 (config-adsl 0/1)#training-mode T1.413
60000CRG0-35B
1389
The BRI number in the example above is shown as bri 1/2. This number is based on the interfaces location (slot/port) and could vary depending on the units configuration. Use the do show interfaces command to determine the appropriate interface number. The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. caller-id-override on page 1391 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1392 isdn ldn on page 1393 isdn spid on page 1394 isdn switch-type on page 1396 loopback local on page 1397 loopback network on page 1398 maintenance on page 1399 resource pool-member <name> on page 1400 test-call on page 1401
60000CRG0-35B
1390
caller-id-override
Use the caller-id-override command to configure the unit to replace caller ID information with a user-specified number. Use the no form of this command to disable any caller ID overrides. Variations of this command include:
caller-id-override always <number> caller-id-override if-no-cid <number>
Syntax Description
always <number> if-no-cid <number> Always forces replacement of the incoming caller ID number with the number given. Replaces the incoming caller ID number with the number given only if there is no caller ID information available for the incoming call.
Default Values
By default, this command is disabled.
Command History
Release 6.1 Command was introduced.
Functional Notes
This command forces a replacement of the incoming caller ID number with the number given. The received caller ID, if any, is discarded, and the given override number is used to connect the incoming call to a circuit of the same number.
Usage Examples
The following example configures the unit to always provide the given number as the caller ID number: (config)#interface bri 1/2 (config-bri 1/2)#caller-id-override always 5551000
60000CRG0-35B
1391
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface bri 1/2 (config-bri 1/2)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1392
isdn ldn
Use the isdn ldn command to specify the local directory numbers (LDNs) for the basic rate interface (BRI). This information should be supplied by your service provider. Use the no form of this command to remove a configured LDN. Variations of this command include:
isdn ldn1 <ldn number> isdn ldn2 <ldn number>
The BRI module requires all incoming calls to be directed to the LDN associated with the service profile identifier (SPID ) programmed using the isdn spid1 command. All calls to the LDN associated with SPID 2 will be rejected (unless part of a bonding call). Syntax Description
ldn1 ldn2 <ldn number> Specifies the LDN associated with the SPID entered as spid1. Specifies the LDN associated with the SPID entered as spid2. Specifies the LDN assigned to the circuit by the service provider. The LDN is the number used by remote callers to dial into the integrated services digital network (ISDN) circuit.
Default Values
By default, there are no configured LDNs.
Command History
Release 12.1 Command was introduced.
Functional Notes
Inbound calls are not accepted on interfaces without programmed LDNs. LDNs can also be entered using the isdn spid command. The isdn spid and isdn ldn commands overwrite the existing programmed LDN; therefore, the latest LDN programmed takes precedence.
Usage Examples
The following example defines an LDN of 555-1111: (config)#interface bri 1/2 (config-bri 1/2)#isdn ldn1 5551111
60000CRG0-35B
1393
isdn spid
Use the isdn spid command to specify the service profile identifiers (SPIDs) and the local directory numbers (LDNs) for the basic rate interface (BRI). This information should be supplied by your service provider. Use the no form of this command to remove a configured SPID. Variations of this command include:
isdn spid1 <spid number> <ldn number> isdn spid2 <spid number> <ldn number>
The BRI module requires all incoming calls to be directed to the LDN associated with the SPID programmed using the isdn spid1 command. All calls to the LDN associated with SPID 2 will be rejected (unless part of a bonding call). Syntax Description
spid1 spid2 <spid number> Specifies the primary SPID. Specifies the secondary SPID. Specifies the 8- to 14-digit number identifying your BRI line in the central office switch. A SPID is generally created using the area code and phone number associated with the line and a four-digit suffix. For example, the following SPIDs may be provided on a BRI line with phone numbers 555-1111 and 555-1112: SPID 1: 701 555 1111 0101 SPID 2: 701 555 1112 0101 <ldn number> Optional. Specifies the LDN assigned to the circuit by the service provider. An LDN programmed using the isdn spid1 command is automatically associated with SPID 1. An LDN programmed using the isdn spid2 command is automatically associated with SPID 2. The LDN is the number used by remote callers to dial into the integrated services digital network (ISDN) circuit. Inbound calls are not accepted on interfaces without programmed LDNs. LDNs can also be entered using the isdn ldn command. The isdn spid and isdn ldn commands overwrite the existing programmed LDN; therefore, the latest LDN programmed takes precedence.
Default Values
By default, there are no configured SPIDs or LDNs.
Command History
Release 1.1 Command was introduced.
60000CRG0-35B
1394
Functional Notes
AOS does not support SPID-less 5ESS signaling. SPIDs are required for all configured BRI endpoints using 5ESS signaling. For European applications, a SPID is not necessary. Use the isdn ldn command to configure the LDN for European applications.
Usage Examples
The following example defines a SPID of 704 555 1111 0101 with an LDN of 555 1111: (config)#interface bri 1/2 (config-bri 1/2)#isdn spid1 70455511110101 5551111
60000CRG0-35B
1395
isdn switch-type
Use the isdn switch-type command to specify the integrated services digital network (ISDN) signaling type configured on the basic rate interface (BRI). The type of ISDN signaling implemented on the BRI does not always match the manufacturer of the central office switch. Use the no form of this command to return to the default value. Variations of this command include:
isdn switch-type basic-5ess isdn switch-type basic-dms isdn switch-type basic-net3 isdn switch-type basic-ni
Syntax Description
basic-5ess basic-dms basic-net3 basic-ni Specifies Lucent/AT&T 5ESS signaling. Specifies Nortel DMS-100 custom signaling.The basic-dms signaling type is not compatible with proprietary SL-1 DMS signaling. Specifies Net3 Euro-ISDN signaling. Specifies National ISDN-1 signaling.
Default Values
By default, the ISDN signaling is set to National ISDN-1 (basic-ni).
Command History
Release 1.1 Command was introduced.
Functional Notes
The isdn switch-type command specifies the type of ISDN signaling implemented on the BRI, not the manufacturer of the central office switch. It is quite possible to have a Lucent Central Office switch providing National ISDN signaling on the BRI.
Usage Examples
The following example configures a BRI for a circuit with Lucent 5ESS (custom) signaling: (config)#interface bri 1/2 (config-bri 1/2)#isdn switch-type basic-5ess
60000CRG0-35B
1396
loopback local
Use the loopback local command to enable a local loopback of the interface (towards the router). Use the no form of this command to disable the loopback. Variations of this command include:
loopback local all loopback local b1 loopback local b2 loopback local both
Syntax Description
all Loops the entire interface back towards the router (including the D-channel). With an active loopback active all, the established D-channel between the integrated services digital network (ISDN) module and the central office switch drops. Loops the data on B1 back towards the router. A B1 loopback does not disrupt D-channel signaling. Loops the data on B2 back towards the router. A B2 loopback does not disrupt D-channel signaling. Loops the data on B1 and B2 back towards the router, but does not disrupt D-channel signaling.
b1 b2 both
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example enables a B2 loopback of the basic rate interface (BRI) 1/2 interface: (config)#interface bri 1/2 (config-bri 1/2)#loopback local b2
60000CRG0-35B
1397
loopback network
Use the loopback network command to enable a loopback of the interface (towards the network). Use the no form of this command to disable the loopback. Variations of this command include:
loopback network b1 loopback network b2 loopback network both
Syntax Description
b1 b2 both Loops the data on B1 back towards the network. A B1 loopback does not disrupt D-channel signaling. Loops the data on B2 back towards the network. A B2 loopback does not disrupt D-channel signaling. Loops the data on B1 and B2 back towards the network, but does not disrupt D-channel signaling.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example enables a B2 loopback of the basic rate interface (BRI) 1/2 interface: (config)#interface bri 1/2 (config-bri 1/2)#loopback network b2
60000CRG0-35B
1398
maintenance
Use the maintenance command to force a reset of the interface (initiating the SABME/UA process) or to reset the D-channel (by sending a RESTART message). Variations of this command include:
maintenance reset maintenance restart-d
The maintenance command disrupts data flow on the integrated services digital network (ISDN) interface. All active calls will drop when the reset or restart process begins.
Syntax Description
reset restart-d Forces a complete reset of the interface by initiating the SABME/UA process. Resets the D-channel by sending a Q.931 RESTART message to the central office switch.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example resets the basic rate interface (BRI) 1/2 interface: (config)#interface bri 1/2 (config-bri 1/2)#maintenance reset
60000CRG0-35B
1399
Syntax Description
<name> <priority> Specifies the name of the resource pool to which this interface is assigned. Optional. Specifies the priority value of using this interface versus other interfaces contained in the specified resource pool using a number 1 to 255. Lower numbers indicate higher priority. Interfaces with the same priority are selected in alphabetical order by interface name.
Default Values
By default, the interface is not assigned to any resource pool.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures a basic rate interface (BRI) as a member of resource pool MyPool: (config)#interface bri 1/2 (config-bri 1/2)#resource pool-member MyPool
60000CRG0-35B
1400
test-call
Use the test-call command to initiate a test call on the basic rate interface (BRI) to test integrated services digital network (ISDN) connectivity without disrupting the primary interface for which the BRI interface is a backup. Use the no form of this command to disable this feature. Variations of this command include:
test-call answer test-call dial <number> test-call dial <number> speed [56 | 64] test-call hangup test-call hangup channels <number>
Syntax Description
answer dial <number> Places the unit in answer mode for test calls. Specifies a test number to dial. No special characters are allowed. For example, 12125551212 is accepted, but 1-212-555-1212 and 1 (212) 555-1212 are not accepted. Optional. Specifies the channel speed (in kilobytes per second) of the call. Valid speeds are 56 and 64. Terminates all test calls on all channels. Optional. Specifies a single channel on which to terminate a test call. For a list of available channels, enter test-call hangup channels ? at the prompt.
Default Values
No default values are necessary for this command.
Command History
Release 18.1 Command was introduced.
Functional Notes
To successfully place a test call, a remote unit must be configured to answer the test call using the test-call answer command, and a separate local unit must be used to dial the test call number using the test-call dial <number> command.
Usage Examples
The following example places a test call over bri 1/1 to 5555300: (config-bri 1/1)#test-call dial 5555300 2011.02.11 14:58:10 ISDN.INTERFACE BRI 1/1 Entering test-call mode. 2011.02.11 14:58:10 ISDN.INTERFACE BRI 1/1 Placing test-call to 5555300
60000CRG0-35B
1401
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order: cdma activate oma-dm on page 1403 cdma activate otasp on page 1404 cdma msl <number> on page 1405 custom-profile ha-shared-secret on page 1406 custom-profile home-address <ip address> on page 1407 custom-profile primary-ha-address <ip address> on page 1408 custom-profile secondary-ha-address <ip address> on page 1409 custom-profile username <username> on page 1410 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1411 match ani <template> substitute <template> on page 1412 reset on page 1414 resource pool-member <name> on page 1415 retry-throttling on page 1416 snmp trap cellular on page 1417 snmp trap threshold-ecio <value> on page 1418 snmp trap threshold-rssi <value> on page 1419
60000CRG0-35B
1402
Default Values
By default, the cellular interface is deactivated.
Command History
Release 17.4 Command was introduced.
Usage Examples
The following example activates cellular interface 1/1: (config)#interface cellular 1/1 (config-cellular-1/1)#cdma activate oma-dm
60000CRG0-35B
1403
Default Values
By default, the cellular interface is disabled.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example activates cellular interface 1/1: (config)#interface cellular 1/1 (config-cellular 1/1)#cdma activate otasp
60000CRG0-35B
1404
Default Values
By default, no MSL code is activated.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example enters MSL code 526510 on cellular interface 1/1: (config)#interface cellular 1/1 (config-cellular-1/1)#cdma msl 526510
60000CRG0-35B
1405
custom-profile ha-shared-secret
Use the custom-profile ha-shared-secret command to specify the home agent shared secret for the cellular custom profile. Use the no form of this command to remove the shared secret from the custom profile configuration. Variations of this command include:
custom-profile ha-shared-secret ascii <shared secret> custom-profile ha-shared-secret hexadecimal <shared secret>
Syntax Description
ascii <shared secret> Specifies a plain text secret. Secret can be up to 16 characters in length. hexadecimal <shared secret> Specifies a hexadecimal secret. Secret can be up to 32 characters in length.
Default Values
By default, no custom profile is configured.
Command History
Release 17.5 Command was introduced.
Functional Notes
Cellular custom profile settings are useful for services that require manual activation or for services that allow remote access to private networks over the 3G network. For more information about custom profile settings, refer to the 3G CDMA NIM and the Cellular Interface configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 2331).
Usage Examples
The following example creates a plain text home agent shared secret (sharedsecret) for the custom profile: (config)#interface cellular 1/1 (config-cellular 1/1)#custom-profile ha-shared-secret ascii sharedsecret
60000CRG0-35B
1406
Default Values
By default, no custom profile is configured.
Command History
Release 17.5 Command was introduced.
Functional Notes
Cellular custom profile settings are useful for services that require manual activation or for services that allow remote access to private networks over the 3G network. For more information about custom profile settings, refer to the 3G CDMA NIM and the Cellular Interface configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 2331).
Usage Examples
The following example creates the home address for the custom profile: (config)#interface cellular 1/1 (config-cellular 1/1)#custom-profile home-address 192.168.1.1
60000CRG0-35B
1407
Default Values
By default, no custom profile is configured.
Command History
Release 17.5 Command was introduced.
Functional Notes
Cellular custom profile settings are useful for services that require manual activation or for services that allow remote access to private networks over the 3G network. For more information about custom profile settings, refer to the 3G CDMA NIM and the Cellular Interface configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 2331).
Usage Examples
The following example specifies the primary home agent IP address for the custom profile: (config)#interface cellular 1/1 (config-cellular 1/1)#custom-profile primary-ha-address 192.168.1.5
60000CRG0-35B
1408
Default Values
By default, no custom profile is configured.
Command History
Release 17.5 Command was introduced.
Functional Notes
Cellular custom profile settings are useful for services that require manual activation or for services that allow remote access to private networks over the 3G network. For more information about custom profile settings, refer to the 3G CDMA NIM and the Cellular Interface configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 2331).
Usage Examples
The following example specifies the secondary home agent IP address for the custom profile: (config)#interface cellular 1/1 (config-cellular 1/1)#custom-profile secondary-ha-address 192.168.1.6
60000CRG0-35B
1409
Syntax Description
username <username> Specifies the user name for the custom profile. The user name is equivalent to network address identifier (NAI) user identification. User names can be up to 72 characters in length. Specifies the plain text password. Passwords are equivalent to authentication, authorization, and accounting (AAA) shared secrets. Passwords can be up to 16 characters in length. Specifies the hexadecimal password. Passwords are equivalent to AAA shared secrets. Passwords can be up to 32 characters in length.
Default Values
By default, no custom profile is configured.
Command History
Release 17.5 Command was introduced.
Functional Notes
Cellular custom profile settings are useful for services that require manual activation or for services that allow remote access to private networks over the 3G network. For more information about custom profile settings, refer to the 3G CDMA NIM and the Cellular Interface configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 2331).
Usage Examples
The following example specifies the user name and plain text password for the custom profile: (config)#interface cellular 1/1 (config-cellular 1/1)#custom-profile username USERNAME password ascii PASSWORD
60000CRG0-35B
1410
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface cellular 1/1 (config-cellular 1/1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1411
Syntax Description
ani <template> Specifies the ANI information to be substituted. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the ANI information that is substituted for the original ANI information. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Optional. Specifies the name associated with the ANI information. This option is only available on trunks that support ANI name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
substitute <template>
name <name>
Default Values
By default, no ANI substitution is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for ANI templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
1412
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match ani command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match ani ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the ANI information from numbers 555-8111 to 555-8115 will be substituted by 555-8110 for outbound calls on interface 1/1: (config)#interface cellular 1/1 (config-cellular 1/1)#match ani 555-811[125] substitute 555-8110
60000CRG0-35B
1413
reset
Use the reset command to reboot the cellular network interface module (NIM). Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example reboots the NIM associated with cellular interface 1/1: (config)#interface cellular 1/1 (config-cellular 1/1)#reset
60000CRG0-35B
1414
Syntax Description
<name> <priority> Specifies the resource pool to which the cellular interface is assigned. Optional. Specifies the priority this interface is given over other interfaces in the same pool. Range is 1 to 255.
Default Values
By default, the cellular interface is not associated with any resource pools.
Command History
Release 17.2 Command was introduced.
Functional Notes
Lower priority values indicate a higher priority. Interfaces within the same resource pool with the same priority are selected as resources in alphabetical order by interface name.
Usage Examples
The following example configures interface cellular 1/1 as a member of the cellular resource pool: (config)#interface cellular 1/1 (config-cellular 1/1)#resource pool-member cellular
60000CRG0-35B
1415
retry-throttling
Use the retry-throttling command to enable retry throttling. Use the no form of this command to disable retry throttling. Syntax Description
No subcommands.
Default Values
In the Verizon cellular network, the retry throttle is enabled and cannot be disabled. In the Sprint cellular network, the retry throttle is disabled by default but can be enabled by using this command.
Command History
Release 17.5 Command was introduced.
Functional Notes
When the retry throttle is enabled, it will disable the cellular interface for 15 minutes if a data call fails.
Usage Examples
The following example enables retry throttling: (config)#interface cellular 1/1 (config-cellular 1/1)#retry-throttling
60000CRG0-35B
1416
Default Values
By default, all interfaces (except virtual Frame Relay interfaces and subinterfaces) have SNMP traps enabled.
Command History
Release 4.01 Command was introduced.
Usage Examples
The following example enables all cellular SNMP traps on interface cellular 1/1: (config)#interface cellular 1/1 (config-cellular 1/1)#snmp trap cellular
60000CRG0-35B
1417
Default Values
By default, the Ec/Io trap threshold is -200.
Command History
Release 4.01 Command was introduced.
Usage Examples
The following example configures an Ec/Io threshold of -100 on interface cellular 1/1: (config)#interface cellular 1/1 (config-cellular 1/1)#snmp trap threshold-ecio -100
60000CRG0-35B
1418
Default Values
By default, the RSSI trap threshold is -200.
Command History
Release 4.01 Command was introduced.
Usage Examples
The following example configures an RSSI threshold of -100 on interface cellular 1/1: (config)#interface cellular 1/1 (config-cellular 1/1)#snmp trap threshold-rssi -100
60000CRG0-35B
1419
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. clock rate on page 1421 clock source on page 1422 data-coding scrambled on page 1423 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1424 loopback on page 1425 remote-loopback on page 1426 snmp trap on page 1427 snmp trap link-status on page 1428
60000CRG0-35B
1420
clock rate
Use the clock rate command to configure the data rate used as the operating speed for the interface. This rate should match the rate required by the digital data service (DDS) service provider. Use the no form of this command to return to the default value. Variations of this command include:
clock rate auto clock rate bps56k clock rate bps64k
Syntax Description
auto bps56k bps64k Automatically detects the clock rate and sets to match. Sets the clock rate to 56 kbps. Sets the clock rate to 64 kbps.
Default Values
By default, the rate is set to auto.
Command History
Release 1.1 Command was introduced.
Functional Notes
When operating at 64 kbps (clear channel operation), the data terminal equipment (DTE) data sequences may mimic network loop maintenance functions and erroneously cause other network elements to activate loopbacks. Use the data-coding scrambled command to prevent such occurrences. Refer to data-coding scrambled on page 1423 for related information.
Usage Examples
The following example configures the clock rate for 56 kbps operation: (config)#interface dds 1/1 (config-dds 1/1)#clock rate bps56k
60000CRG0-35B
1421
clock source
Use the clock source command to configure the source timing used for the interface. The clock specified using the clock source command is also the system master clock. Use the no form of this command to return to the default value. Variations of this command include:
clock source internal clock source line
Syntax Description
internal line Configures the unit to provide clocking using the internal oscillator. Configures the unit to recover clocking from the digital data service (DDS) circuit.
Default Values
By default, the clock source is set to line.
Command History
Release 1.1 Command was introduced.
Functional Notes
When operating on a DDS network, the clock source should be line. On a point-to-point private network, one unit must be line and the other internal.
Usage Examples
The following example configures the unit to recover clocking from the circuit: (config)#interface dds 1/1 (config-dds 1/1)#clock source line
60000CRG0-35B
1422
data-coding scrambled
Use the data-coding scrambled command to enable the digital data service (DDS) OS scrambler to combine user data with pattern data to ensure user data does not mirror standard DDS loop codes. The scrambler may only be used on 64 kbps circuits without Frame Relay signaling (clear channel). Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, the scrambler is disabled.
Command History
Release 1.1 Command was introduced.
Functional Notes
When operating at 64 kbps (clear channel operation), there is a possibility the data terminal equipment (DTE) data sequences may mimic network loop maintenance functions and erroneously cause other network elements to activate loopbacks. Use the data-coding scrambled command to prevent such occurrences. Do not use this command if using Frame Relay or if using Point-to-Point Protocol (PPP) to another device other than an AOS product also running scrambled.
Usage Examples
The following example enables the DDS OS scrambler: (config)#interface dds 1/1 (config-dds 1/1)#data-coding scrambled
60000CRG0-35B
1423
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface dds 1/1 (config-dds 1/1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1424
loopback
Use the loopback command to initiate a specified loopback on the interface. Use the no form of this command to deactivate the loop. Variations of this command include:
loopback dte loopback line loopback remote
Syntax Description
dte line remote Initiates a loop to connect the transmit and receive path through the unit. Initiates a loop of the digital data service (DDS) circuit toward the network by connecting the transmit path to the receive path. Transmits a DDS loop code over the circuit to the remote unit. In response, the remote unit should initiate a line loopback.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example activates a line loopback on the DDS interface: (config)#interface dds 1/1 (config-dds 1/1)#loopback line
60000CRG0-35B
1425
remote-loopback
Use the remote-loopback command to configure the interface to respond to loopbacks initiated by a remote unit (or the service provider). Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, all interfaces respond to remote loopbacks.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example enables remote loopbacks on the digital data service (DDS) interface: (config)#interface dds 1/1 (config-dds 1/1)#remote-loopback
60000CRG0-35B
1426
snmp trap
Use the snmp trap command to enable all supported Simple Network Management Protocol (SNMP) traps on the interface. Use the no form of this command to disable this trap. Syntax Description
No subcommands.
Default Values
By default, all interfaces (except virtual Frame Relay interfaces and subinterfaces) have SNMP traps enabled.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 8.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the port channel and virtual local area network (VLAN) interfaces. Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the tunnel interface.
Usage Examples
The following example enables SNMP capability on the digital data service (DDS) interface: (config)#interface dds 1/1 (config-dds 1/1)#snmp trap
60000CRG0-35B
1427
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all supported interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the digital data service (DDS) interface: (config)#interface dds 1/1 (config-dds 1/1)#no snmp trap link-status
60000CRG0-35B
1428
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. coding on page 1430 framing on page 1431 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1432 line-length <value> on page 1433 loopback network on page 1434 loopback remote line inband on page 1435 remote-loopback on page 1436 signaling-mode on page 1437 snmp trap link-status on page 1438 test-pattern on page 1439
60000CRG0-35B
1429
coding
Use the coding command to configure the line coding for a DSX-1 physical interface. This setting must match the line coding supplied on the circuit by the PBX. Use the no form of this command to return to the default setting. Variations of this command include:
coding ami coding b8zs
Syntax Description
ami b8zs Configures the line coding for alternate mark inversion (AMI). Configures the line coding for bipolar eight zero substitution (B8ZS).
Default Values
By default, all DSX-1 interfaces are configured with b8zs line coding.
Command History
Release 1.1 Command was introduced.
Functional Notes
The line coding configured in the unit must match the line coding of the DSX-1 circuit. A mismatch will result in line errors (e.g., bipolar violations (BPVs)).
Usage Examples
The following example configures the DSX-1 interface for ami line coding: (config)#interface t1 1/2 (config-t1 1/2)#coding ami
60000CRG0-35B
1430
framing
Use the framing command to configure the framing format for the DSX-1 interface. This parameter should match the framing format set on the external device. Use the no form of this command to return to the default value. Variations of this command include:
framing d4 framing esf
Syntax Description
d4 esf Specifies D4 superframe (SF) format. Specifies extended superframe (ESF) format.
Default Values
By default, the framing format is set to esf.
Command History
Release 1.1 Command was introduced.
Functional Notes
A frame is comprised of a single byte from each of the T1s timeslots; there are 24 timeslots on a single T1 circuit. Framing bits are used to separate the frames and indicate the order of information arriving at the receiving equipment. D4 and ESF are two methods of collecting and organizing frames over the circuit.
Usage Examples
The following example configures the DSX-1 interface for d4 framing: (config)#interface t1 1/2 (config-t1 1/2)#framing d4
60000CRG0-35B
1431
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface t1 1/2 (config-t1 1/2)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1432
line-length <value>
Use the line-length command to set the line build out (LBO) (in feet or dB) for the DSX-1 interface. Use the no form of this command to return to the default value. Syntax Description
<value> Configures the LBO for the DSX-1 interface. Valid options include: -7.5 dB or 0 to 655 feet. Use the -7.5 dB option for maximum attenuation.
Default Values
By default, the LBO is set to 0 feet.
Command History
Release 1.1 Command was introduced.
Functional Notes
The line-length value represents the physical distance between DSX equipment (measured in cable length). Based on this setting, the AOS device increases signal strength to compensate for the distance the signal must travel. Valid distance ranges are listed below: 0 to 133 feet 134 to 265 feet 266 to 399 feet 400 to 533 feet 534 to 655 feet
Usage Examples
The following example configures the DSX-1 interface line-length for 300 feet: (config)#interface t1 1/2 (config-t1 1/2)#line-length 300
60000CRG0-35B
1433
loopback network
Use the loopback network command to initiate a loopback on the interface toward the network. Use the no form of this command to deactivate the loopback. Variations of this command include:
loopback network line loopback network payload
Syntax Description
line payload Initiates a metallic loopback of the physical DSX-1 network interface. Initiates a loopback of the T1 framer (CSU portion) of the DSX-1 network interface.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Functional Notes
The following diagram depicts the difference between a line and payload loopback.
T1 Network Interface
NI CSU DS1 Payload Loopback Line Loopback
Usage Examples
The following example initiates a payload loopback of the DSX-1 interface: (config)#interface t1 1/2 (config-t1 1/2)#loopback network payload
60000CRG0-35B
1434
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Functional Notes
A remote loopback can only be issued if a cross connect does not exist on the interface and if the signaling mode is set to none. The following diagram depicts the difference between a line and payload loopback.
T1 Network Interface
NI CSU DS1
Line Loopback
Usage Examples
The following example initiates a remote line loopback using the inband channel: (config)#interface t1 1/2 (config-t1 1/2)#loopback remote line inband
60000CRG0-35B
1435
remote-loopback
Use the remote-loopback command to configure the interface to respond to loopbacks initiated by a remote unit (or the service provider). Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, all interfaces respond to remote loopbacks.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example enables remote loopbacks on the DSX-1 interface: (config)#interface t1 1/2 (config-t1 1/2)#remote-loopback
60000CRG0-35B
1436
signaling-mode
Use the signaling-mode command to configure the signaling type (robbed-bit for voice or clear channel for data) for the level zero digital signals (DS0s) mapped to the DSX-1 port. Use the no form of this command to return to the default setting. Variations of this command include:
signaling-mode message-oriented signaling-mode none signaling-mode robbed-bit
Syntax Description
message-oriented none robbed-bit Specifies clear channel signaling on Channel 24 only. Use this signaling type with QSIG installations. Specifies clear channel signaling on all 24 DS0s. Use this signaling type with data-only or primary rate interface (PRI) DSX-1 installations. Specifies robbed bit signaling on all DS0s. Use this signaling type for voice-only DSX-1 applications.
Default Values
By default, the signaling mode is set to robbed-bit.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example configures the DSX-1 port for PRI compatibility: (config)#interface t1 1/2 (config-t1 1/2)#signaling-mode none
60000CRG0-35B
1437
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the DSX-1 interface: (config)#interface t1 1/2 (config-t1 1/2)#no snmp trap link-status
60000CRG0-35B
1438
test-pattern
Use the test-pattern command to activate the built-in pattern generator and begin sending the specified test pattern. This pattern generation can be used to verify a data path when used in conjunction with an active loopback. Use the no form of this command to cease pattern generation. Variations of this command include:
test-pattern ones test-pattern zeros
Syntax Description
ones zeros Generates a test pattern of continuous ones. Generates a test pattern of continuous zeros.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example activates the pattern generator for a stream of continuous ones: (config)#interface t1 1/2 (config-t1 1/2)#test-pattern ones
60000CRG0-35B
1439
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. clock source on page 1441 coding on page 1442 framing crc4 on page 1443 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1444 loop-alarm-detect on page 1445 loopback network on page 1446 loopback remote v54 on page 1447 remote-loopback on page 1448 sa4tx-bit <value> on page 1449 snmp trap line-status on page 1450 snmp trap link-status on page 1451 snmp trap threshold-reached on page 1452 system-timing on page 1453 tdm-group <number> on page 1454 test-pattern on page 1455 ts16 on page 1456
60000CRG0-35B
1440
clock source
Use the clock source command to configure the source timing used for the interface. Use the no form of this command to return to the default value. Variations of this command include:
clock source internal clock source line clock source system clock source through
Syntax Description
internal line system through Configures the unit to provide clocking using the internal oscillator. Configures the unit to recover clocking from the E1 circuit. Configures the unit to provide clocking from the chassis selection. Configures the unit to recover clocking from the circuit connected to the G.703 interface.
Default Values
By default, the unit is configured to recover clocking from the primary circuit.
Command History
Release 5.1 Release A2 Command was introduced. Command was expanded to include the system parameter.
Functional Notes
When operating on a circuit that is providing timing, setting the clock source to line can avoid errors, such as clock slip seconds (CSS).
Usage Examples
The following example configures the unit to recover clocking from the primary circuit: (config)#interface e1 1/1 (config-e1 1/1)#clock source line
60000CRG0-35B
1441
coding
Use the coding command to configure the line coding for the E1 physical interface. This setting must match the line coding supplied on the circuit by the service provider. Use the no form of this command to return to the default setting. Variations of this command include:
coding ami coding hdb3
Syntax Description
ami hdb3 Configures the line coding for alternate mark inversion (AMI). Configures the line coding for high-density bipolar 3 (HDB3).
Default Values
By default, all E1 interfaces are configured with hdb3 line coding.
Command History
Release 5.1 Command was introduced.
Functional Notes
The line coding configured in the unit must match the line coding of the E1 circuit. A mismatch will result in line errors (e.g., bipolar violations (BPVs)).
Usage Examples
The following example configures the E1 interface for ami line coding: (config)#interface e1 1/1 (config-e1 1/1)#coding ami
60000CRG0-35B
1442
framing crc4
Use the framing crc4 command to configure the framing format for the E1 interface. This parameter should match the framing format provided by the service provider or external device. Use the no form of this command to return to the default value. Syntax Description
crc4 Enables CRC4 bits to be transmitted in the outgoing data stream. Also, the received signal is checked for CRC4 errors.
Default Values
By default, CRC4 is disabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
The framing value must match the configuration of the E1 circuit. A mismatch will result in a loss of frame alarm.
Usage Examples
The following example configures the E1 interface for CRC4 framing: (config)#interface e1 1/1 (config-e1 1/1)#framing crc4
60000CRG0-35B
1443
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface e1 1/1 (config-e1 1/1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1444
loop-alarm-detect
The loop-alarm-detect command enables detection of a loop alarm on the E1 interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is enabled.
Command History
Release 6.1 Command was introduced.
Functional Notes
This command enables the detection of a loopback alarm. This alarm works in conjunction with the sa4tx-bit command setting. The loopback condition is detected by comparing the transmitted sa4tx-bit value to the received Sa4 bit value. If the bits match, a loopback is assumed. This detection method only works with a network in which the far end is transmitting the opposite value for Sa4.
Usage Examples
The following example enables detection of a loop alarm on the E1 interface: (config)#interface e1 1/1 (config-e1 1/1)#loop-alarm-detect
60000CRG0-35B
1445
loopback network
Use the loopback network command to initiate a loopback on the interface toward the network. Use the no form of this command to deactivate the loopback. Variations of this command include:
loopback network line loopback network payload
Syntax Description
line payload Initiates a metallic loopback of the physical E1 network interface. Initiates a loopback of the E1 framer (CSU) portion of the E1 network interface.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
The following diagram depicts a line loopback.
E1 Network Interface
NI CSU NTWK E1
Line Loopback
Usage Examples
The following example initiates a line loopback of the E1 interface: (config)#interface e1 1/1 (config-e1 1/1)#loopback network line
60000CRG0-35B
1446
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Command was introduced.
Functional Notes
This command causes a V.54 inband loop code to be sent in the payload towards the far end.
Usage Examples
The following example sends a V.54 inband loop code to the far end: (config)#interface e1 1/1 (config-e1 1/1)#loopback remote v54
60000CRG0-35B
1447
remote-loopback
Use the remote-loopback command to configure the interface to respond to loopbacks initiated by a remote unit (or the service provider). Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, all interfaces respond to remote loopbacks.
Command History
Release 1.1 Command was introduced.
Functional Notes
This controls the acceptance of any remote loopback requests. When enabled, remote loopbacks are detected and cause a loopback to be applied. When disabled, remote loopbacks are ignored.
Usage Examples
The following example enables remote loopbacks on the E1 interface: (config)#interface e1 1/1 (config-e1 1/1)#remote-loopback
60000CRG0-35B
1448
sa4tx-bit <value>
The sa4tx-bit command selects the Tx value of Sa4 in this E1 interface. Use the no form of this command to return to the default value. Syntax Description
<value> Specifies a 0 or a 1 for the transmit value of the SA4 bit on the E1.
Default Values
The default value for this command is 1.
Command History
Release 6.1 Command was introduced.
Functional Notes
This command assigns a value to the Tx spare bit in position 4. The odd-numbered frames of TS0 are not used for frame alignment. Bits in position 4 through 8 are called spare bits. Values of 0 or 1 are accepted. TS0 odd frame Bit position Bit use 1 0 2 1 3 RAI = 1 4 S 5 S 6 S 7 S 8 S
Usage Examples
The following example sets the Tx value of Sa4 to 0: (config)#interface e1 1/1 (config-e1 1/1)#sa4tx-bit 0
60000CRG0-35B
1449
Default Values
By default, the dsx1LineStatusChangeTrapEnable object identifier (OID) is set to enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 11.1 Command was introduced.
Functional Notes
The snmp trap line-status command is used to control the RFC 2495 dsx1LineStatusChangeTrapEnable OID (OID number 1.3.6.1.2.1.10.18.6.1.17.0).
Usage Examples
The following example disables the line-status trap on the T1 interface: (config)#interface e1 1/1 (config-t1 1/1)#no snmp trap line-status
60000CRG0-35B
1450
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the E1 interface: (config)#interface e1 1/1 (config-e1 1/1)#no snmp trap link-status
60000CRG0-35B
1451
Default Values
By default, the adGenAOSDs1ThresholdReached object identifier (OID) is disabled for all interfaces.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example disables SNMP threshold reached trap on the E1 interface: (config)#interface e1 1/1 (config-e1 1/1)#no snmp trap threshold-reached
60000CRG0-35B
1452
system-timing
Use the system-timing command to configure the system timing to use the E1 interface as the system clock source. Use the no form of this command to return to the default value. Variations of this command include:
system-timing primary system-timing secondary
Syntax Description
primary secondary Configures the unit to use the E1 interface as the source of the primary system clock. Configures the unit to use the E1 interface as the source of the secondary system clock.
Default Values
By default, the unit is configured to recover clocking from the primary circuit.
Command History
Release A2 Command was introduced.
Usage Examples
The following example configures the unit to use the E1 interface as the primary system timing source: (config)#interface e1 1/1 (config-e1 1/1)#system-timing primary
60000CRG0-35B
1453
tdm-group <number>
Use the tdm-group command to create a group of contiguous channels on this interface to be used during the cross-connect process. Use the no form of this command to remove configured time division multiplexing (TDM) groups. Refer to cross-connect on page 65 for related information. Variations of this command include:
tdm-group <number> timeslots <value> tdm-group <number> timeslots <value> speed [56 | 64]
Syntax Description
<number> timeslots <value> Identifies the created TDM group. Valid range is 1 to 255. Specifies the channels to be used in the TDM group. Valid range is 1 to 31. The timeslot value can be entered as a single number representing one of the 31 E1 channel timeslots or as a contiguous group of channels. (For example, 1-10 specifies the first 10 channels of the E1.) Optional. Specifies the individual channel rate on the E1 interface to be 56 or 64 kbps. The default speed is 64 kbps. 56 kbps operation is not available on all E1 interfaces. Refer to the quick start guide provided with your E1 module to determine whether 56 kbps is valid.
Default Values
By default, there are no configured TDM groups.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example creates a TDM group (labeled 5) of 10 channels at 64 kbps each: (config)#interface e1 1/1 (config-e1 1/1)#tdm-group 5 timeslots 1-10 speed 64
60000CRG0-35B
1454
test-pattern
Use the test-pattern command to activate the built-in pattern generator and begin sending the specified test pattern. This pattern generation can be used to verify a data path when used in conjunction with an active loopback. Use the no form of this command to cease pattern generation. Variations of this command include:
test-pattern clear test-pattern errors test-pattern insert test-pattern ones test-pattern p215 test-pattern p220 test-pattern p511 test-pattern qrss test-pattern zeros
Syntax Description
clear errors insert ones p215 p220 p511 qrss zeros Clears the test pattern error count. Displays the test pattern error count. Inserts an error into the currently active test pattern. Generates test pattern of continuous ones. Generates a pseudorandom test pattern sequence based on a 15-bit shift register. Generates a pseudorandom test pattern sequence based on a 20-bit shift register. Generates a test pattern of repeating ones and zeros. Generates a test pattern of random ones and zeros. Generates test pattern of continuous zeros.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example activates the pattern generator for a stream of continuous ones: (config)#interface e1 1/1 (config-e1 1/1)#test-pattern ones
60000CRG0-35B
1455
ts16
Use the ts16 command to enable timeslot 16 multiframe to be checked on the receive signal. Use the no form of this command to disable timeslot 16. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
If timeslot 16 is used on the incoming E1, do not map timeslot 16 using the tdm-group command. By default, all timeslots not physically mapped using the tdm-group command are passed through to the G.703 interface. Leaving timeslot 16 unmapped makes it available for multiframe signaling by the connected E1 device.
Usage Examples
The following example enables timeslot 16 multiframing: (config)#interface e1 1/1 (config-e1 1/1)#ts16
60000CRG0-35B
1456
Not all platforms have Ethernet subinterfaces, Gigabit Ethernet, switchport, or gigabit switchport interfaces available. To see if your unit has this capability, type show interfaces at the enable prompt. To activate the basic Ethernet Interface Configuration mode, enter the interface ethernet command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#interface ethernet 0/1 (config-eth 0/1)#
To activate the Gigabit Ethernet Interface Configuration mode, enter the interface gigabit-ethernet command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#interface gigabit-ethernet 0/3 (config-giga-eth 0/3)#
60000CRG0-35B
1457
To activate the Ethernet Subinterface Configuration mode, enter the interface ethernet command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#interface ethernet 0/1.1 (config-eth 0/1.1)#
To activate the Gigabit Switchport Interface Configuration mode, enter the interface gigabit-switchport command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#interface gigabit-switchport 0/3 (config-giga-swx 0/3)#
To activate the Switchport Interface Configuration mode, enter the interface switchport command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#interface switchport 0/1 (config-swx 0/1)#
To activate the Ethernet Configuration mode for a range of Ethernet interfaces, enter the interface range command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#interface range ethernet 0/1, 0/8 (config-eth 0/1, 0/8)#
60000CRG0-35B
1458
Not all Ethernet commands apply to all Ethernet types. Use the ? command to display a list of valid commands. For example: >enable Password:xxxxx #config term (config)#interface ethernet 0/1 (config-eth 0/1)#? access-policy - Assign access control policy for this interface alias - A text name assigned by an SNMP NMS arp - Set ARP commands bandwidth - Set bandwidth informational parameter bridge-group - Assign the current interface to a bridge group etc. The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. arp arpa on page 1461 awcp on page 1462 bandwidth <value> on page 1463 bridge-group <number> on page 1464 bridge-group <number> vlan-transparent on page 1465 channel-group <number> mode on on page 1466 crypto map <name> on page 1467 dynamic-dns on page 1469 encapsulation 802.1q on page 1471 ethernet-cfm down on page 1472 ethernet-cfm mep on page 1473 full-duplex on page 1474
60000CRG0-35B
1459
half-duplex on page 1475 ip commands begin on page 1476 ipv6 commands begin on page 1518 lldp receive on page 1541 lldp send on page 1542 mac-address <mac address> on page 1544 max-reserved-bandwidth <value> on page 1545 media-gateway ip on page 1546 no shutdown track <name> on page 1547 port-auth auth-mode on page 1548 port-auth control-direction on page 1549 port-auth multiple-hosts on page 1550 port-auth port-control on page 1551 power inline on page 1552 qos on page 1553 qos-policy on page 1554 rtp quality-monitoring on page 1556 snmp trap on page 1557 snmp trap link-status on page 1558 spanning-tree commands begin on page 1559 speed on page 1566 storm-control on page 1567 storm-control action shutdown on page 1569 switchport commands begin on page 1570 traffic-shape rate <value> on page 1588 vlan-id <vlan id> on page 1589 vrf forwarding <name> on page 1590 vrrp <number> on page 1591
60000CRG0-35B
1460
arp arpa
Use the arp arpa command to set ARPA as the standard Address Resolution Protocol (ARP) on this interface. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
The default for this command is arpa.
Command History
Release 3.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Usage Examples
The following example enables standard ARP for the Ethernet interface: (config)#interface ethernet 0/1 (config-eth 0/1)#arp arpa
60000CRG0-35B
1461
awcp
Use the awcp command to enable ADTRAN Wireless Control Protocol (AWCP) on this interface. The AWCP is an ADTRAN proprietary protocol used by an access controller (AC) to communicate with an access point (AP). Use the no form of this command to disable AWCP for this interface. Syntax Description
No subcommands.
Default Values
By default, AWCP is enabled on the interface.
Command History
Release 15.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
When the global-level command dot11ap access-point-controller (refer to dot11ap access-point-control on page 877 for more information) is enabled, the AWCP function can be disabled on a specific interface by using the no form of this command from the desired interface. When the global-level command dot11ap access-point-controller is disabled, it overrides the awcp command setting for the interface.
Usage Examples
The following example disables AWCP on Ethernet interface 0/1: (config)#interface ethernet 0/1 (config-eth 0/1)#no awcp
60000CRG0-35B
1462
bandwidth <value>
Use the bandwidth command to provide the bandwidth value of an interface to the higher level protocols. This value is used in cost calculations. Use the no form of this command to restore the default value. Syntax Description
<value> Specifies bandwidth in kbps. Range is 1 to 4294967295 kbps.
Default Values
To view default value, use the show interfaces command.
Command History
Release 3.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
The bandwidth command is an informational value that is communicated to the higher level protocols to be used in cost calculations. This is a routing parameter only and does not affect the physical interface.
Usage Examples
The following example sets bandwidth of the Ethernet 0/1 interface to 10 Mbps: (config)#interface ethernet 0/1 (config-eth 0/1)#bandwidth 10000
60000CRG0-35B
1463
bridge-group <number>
Use the bridge-group command to assign an interface to the specified bridge group. Use the no form of this command to remove the interface from the bridge group. Syntax Description
<number> Specifies the bridge group (by number) to which to assign this interface. Range is 1 to 255.
Default Values
By default, there are no configured bridge groups.
Command History
Release 1.1 Command was introduced.
Functional Notes
A bridged network can provide excellent traffic management to reduce collisions and limit the amount of bandwidth wasted with unnecessary transmissions when routing is not necessary. Any two interfaces can be bridged (e.g., Ethernet to T1 bridge, Ethernet to Frame Relay subinterface).
Usage Examples
The following example assigns the Ethernet interface to bridge-group 17: (config)#interface ethernet 0/1 (config-eth 0/1)#bridge-group 17
60000CRG0-35B
1464
Syntax Description
<number> Specifies the bridge group number. Valid range is 1 to 255.
Default Values
By default, VLAN tags are removed from the data.
Command History
Release 12.1 Release 14.1 Command was introduced. Command was expanded to include the high level data link control (HDLC) interface and Frame Relay subinterface.
Usage Examples
The following example removes the VLAN tags from the packets on the Ethernet interface 0/1: (config)#interface ethernet 0/1 (config-eth 0/1)#bridge-group 1 vlan-transparent
60000CRG0-35B
1465
Default Values
By default, the interface is not part of a channel group.
Command History
Release 5.1 Command was introduced.
Functional Notes
There can be up to six channel groups with 2 to 8 interfaces per group. Dynamic protocols are not yet supported (only static). A physical interface can be a member of only one channel group.
Usage Examples
The following example adds the Ethernet 0/1 interface to channel group 1: (config)#interface ethernet 0/1 (config-eth 0/1)#channel-group 1 mode on (config-eth 0/1)#
60000CRG0-35B
1466
For virtual private network (VPN) configuration example scripts, refer to the VPN configuration guide available on the AOS Documentation CD shipped with your product.
Syntax Description
<name> Specifies the crypto map name that you wish to assign to the interface.
Default Values
By default, no crypto maps are assigned to an interface.
Command History
Release 4.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
When configuring a system to use both the stateful inspection firewall and Internet key exchange (IKE) negotiation for VPN, keep the following notes in mind. When defining the policy class and associated access control lists (ACLs) that describe the behavior of the firewall, do not forget to include the traffic coming into the system over a VPN tunnel terminated by the system. The firewall should be set up with respect to the unencrypted traffic that is destined to be sent or received over the VPN tunnel. The following diagram represents typical AOS data-flow logic.
60000CRG0-35B
1467
IPSec Decrypt/Discard
IPSec Encrypt
NAT/ACP/ Firewall
Router
As shown in the diagram above, data coming into the product is first processed by the static filter associated with the interface on which the data is received. This access group is a true static filter and is available for use regardless of whether the firewall is enabled or disabled. Next (if the data is encrypted), it is sent to the IPSec engine for decryption. The decrypted data is then processed by the stateful inspection firewall. Therefore, given a terminating VPN tunnel, only unencrypted data is processed by the firewall. The ACLs for a crypto map on an interface work in reverse logic to the ACLs for a policy class on an interface. When specifying the ACLs for a crypto map, the source information is the private local side, unencrypted source of the data. The destination information will be the far-end, unencrypted destination of the data. However, ACLs for a policy class work in reverse. The source information for the ACL in a policy class is the far end. The destination information is the local side.
Usage Examples
The following example applies all crypto maps with the name MyMap to the Ethernet interface: (config)#interface ethernet 0/1 (config-eth 0/1)#crypto map MyMap
60000CRG0-35B
1468
dynamic-dns
Use the dynamic-dns command to configure Dynamic DNS service provided by Dynamic Network Services, Inc. (www.dyndns.org). Use the no form of this command to disable this feature. Variations of this command include:
dynamic-dns custom <hostname> <minutes> dynamic-dns dyndns <hostname> <username> <password> dynamic-dns dyndns-custom <hostname> <username> <password> dynamic-dns dyndns-static <hostname> <username> <password>
Syntax Description
<hostname> <minutes> Specifies the host name for the server that updates the dynamic domain naming system (DNS). Specifies the intervals in minutes to update the server with information (updates also occur when the interfaces IP address changes regardless of the update intervals). Specifies the user name. Specifies the password. Refer to Functional Notes below for additional argument descriptions.
<username> <password>
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 12.1 Release A4.01 Command was introduced. Command was expanded. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
custom - Constanttime.coms Custom Dynamic DNSSM service allows you complete access and management control over your domain name regardless of where you purchased/registered it. This allows you to manage IP address mappings (A records), domain aliases (CNAME records), and mail servers (mail exchange (MX) records). dyndns - The Dynamic DNSSM offered by Dynamic Network Services, Inc. (DynDNS.org) allows you to alias a dynamic IP address to a static host name in various domains. This allows your unit to be more easily accessed from various locations on the Internet. This service is provided for up to five host names. dyndns-custom - DynDNS.org's Custom DNSSM service provides a full DNS solution, giving you complete control over an entire domain name. A Web-based interface provides two levels of control over your domain, catering to average or advanced users. Five globally redundant DNS servers ensure that your domain will always resolve.
60000CRG0-35B
1469
A choice of two interfaces is available. The basic interface is designed for most users. It comes preconfigured for most common configurations and allows for easy creation of most common record types. The advanced interface is designed for system administrators with a solid DNS background, and provides layout and functionality similar to a BIND zone file allowing for the creation of nearly any record type. Custom DNSSM can be used with both static and dynamic IPs, and has the same automatic update capability through Custom DNS-aware clients as Dynamic DNS. dyndns-static - The Static DNS service is similar to DynDNS.orgs Dynamic DNSSM service in that it allows a host name, such as yourname.dyndns.org, to point to your IP address. Unlike a Dynamic DNS host, a Static DNS host does not expire after 35 days without updates, but updates take longer to propagate through the DNS system. This service is provided for up to five host names. If your IP address does not change often or at all, but you still want an easy name to remember it by (without having to purchase your own domain name), Static DNS service is ideal for you. If you would like to use your own domain name (such as yourname.com), you need Custom DNS service that also provides full dynamic and static IP address support.
Usage Examples
The following example sets the Dynamic DNS to dyndns-custom with host name host, users name user, and password pass: (config)#interface ethernet 0/1 (config-eth 0/1)#dynamic-dns dyndns-custom host user pass
60000CRG0-35B
1470
encapsulation 802.1q
Use the encapsulation 802.1q command to put the interface into 802.1q virtual local area network (VLAN) mode. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Usage Examples
The following example puts Ethernet interface 0/1 in 802.1q mode and configures a subinterface for VLAN usage: (config)#interface ethernet 0/1 (config-eth 0/1)#encapsulation 802.1q (config-eth 0/1)#interface ethernet 0/1.1 (config-eth 0/1.1)#vlan-id 3
60000CRG0-35B
1471
ethernet-cfm down
Use the ethernet-cfm down command to enable Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) on the Ethernet interface. Use the no form of this command to disable Ethernet OAM CFM on this interface. Syntax Description
No subcommands.
Default Values
By default, Ethernet OAM CFM is disabled.
Command History
Release 17.4 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
For more information about Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013). For more information regarding specific Ethernet OAM CFM configuration commands on the Ethernet interface, refer to the Ethernet OAM CFM Command Set on page 2720.
Usage Examples
The following example enables Ethernet OAM CFM on Ethernet interface 0/1: (config)#interface eth 0/1 (config-eth 0/1)#ethernet-cfm down
60000CRG0-35B
1472
ethernet-cfm mep
Use the ethernet-cfm mep command to create an Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) maintenance endpoint (MEP) on the Ethernet interface. Use the no form of this command to remove the MEP from the interface. Variations of this command include:
ethernet-cfm mep <name> <name> <mep id> down ethernet-cfm mep none <name> <mep id> down
Syntax Description
<name> <name> <mep id> none down Specifies the MEPs maintenance domain. Specifies the MEPs maintenance association. Specifies the unique numerical ID for this MEP. Range is 1 to 8191. Optional. Specifies no domain name is used. Specifies the direction of the MEP.
Default Values
By default, no MEPs exist on the interface.
Command History
Release 17.4 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
For more information about Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013). For more information about specific MEP configuration commands, refer to the Ethernet OAM CFM Command Set on page 2720.
Usage Examples
The following example creates an MEP, with the MEP ID 100, on Ethernet interface eth 0/1. The MEP is associated with maintenance domain Domain1 and association association1: (config)#interface eth 0/1 (config-eth 0/1)#ethernet-cfm mep Domain1 association1 100 down (config-eth 0/1-mep)
60000CRG0-35B
1473
full-duplex
Use the full-duplex command to configure the Ethernet interface for full-duplex operation. This allows the interface to send and receive simultaneously. Use the no form of this command to return to the default half-duplex operation. Syntax Description
No subcommands.
Default Values
By default, all Ethernet interfaces are configured for half-duplex operation.
Command History
Release 1.1 Command was introduced.
Functional Notes
Full-duplex Ethernet is a variety of Ethernet technology currently being standardized by the IEEE. Because there is no official standard, vendors are free to implement their independent versions of full-duplex operation. Therefore, it is not safe to assume that one vendors equipment will work with another. Devices at each end of a full-duplex link have the ability to send and receive data simultaneously over the link. Theoretically, this simultaneous action can provide twice the bandwidth of normal (half-duplex) Ethernet. To deploy full-duplex Ethernet, each end of the link must only connect to a single device (a workstation or a switched hub port). With only two devices on a full-duplex link, there is no need to use the medium access control mechanism (to share the signal channel with multiple stations) and listen for other transmissions or collisions before sending data.
Some Ethernet equipment (though rare) is unable to negotiate duplex if speed is manually determined. To avoid incompatibilities, manually set the duplex if the speed is manually set. Refer to speed on page 1566 for more information.
The 10Base-T, 100Base-TX, and 100Base-FX signaling systems support full-duplex operation (because they have transmit and receive signal paths that can be simultaneously active).
Usage Examples
The following example configures the Ethernet interface for full-duplex operation: (config)#interface ethernet 0/1 (config-eth 0/1)#full-duplex
60000CRG0-35B
1474
half-duplex
Use the half-duplex command to configure the Ethernet interface for half-duplex operation. This setting allows the Ethernet interface to either send or receive at any given moment, but not simultaneously. Use the no form of this command to disable half-duplex operation. Syntax Description
No subcommands.
Default Values
By default, all Ethernet interfaces are configured for half-duplex operation.
Command History
Release 1.1 Command was introduced.
Functional Notes
Half-duplex Ethernet is the traditional form of Ethernet that employs the carrier sense multiple access/collision detect (CSMA/CD) protocol to allow two or more hosts to share a common transmission medium while providing mechanisms to avoid collisions. A host on a half-duplex link must listen on the link and only transmit when there is an idle period. Packets transmitted on the link are broadcast (so it will be heard by all hosts on the network). In the event of a collision (two hosts transmitting at once), a message is sent to inform all hosts of the collision and a backoff algorithm is implemented. The backoff algorithm requires the station to remain silent for a random period of time before attempting another transmission. This sequence is repeated until a successful data transmission occurs.
Some Ethernet equipment (though rare) is unable to negotiate duplex if speed is manually determined. To avoid incompatibilities, manually set the duplex if the speed is manually set. Refer to speed on page 1566 for more information. Usage Examples
The following example configures the Ethernet interface for half-duplex operation: (config)#interface ethernet 0/1 (config-eth 0/1)#half-duplex
60000CRG0-35B
1475
Syntax Description
<ipv4 acl name> in out Applies the named IPv4 ACL to the interface. Enables access control on IPv4 packets received on the specified interface. Enables access control on IPv4 packets transmitted on the specified interface.
Default Values
By default, these commands are disabled.
Command History
Release 3.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
When this command is enabled, the IPv4 destination address of each packet must be validated before being passed through. If the packet is not acceptable per these settings, it is dropped.
Usage Examples
The following example configures the router to only allow IPv4 Telnet traffic (as defined in the user-configured TelnetOnly ACL) into the Ethernet interface: (config)#ip access-list extended TelnetOnly (config-ext-nacl)#permit tcp any any eq telnet (config-ext-nacl)#interface ethernet 0/1 (config-eth 0/1)#ip access-group TelnetOnly in
60000CRG0-35B
1476
Default Values
By default, there are no configured IPv4 ACPs associated with an interface.
Command History
Release 2.1 Release 5.1 Release 6.1 Release 15.1 Release 17.9 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the virtual local area network (VLAN) interfaces. Command was expanded to include the bridged virtual interfaces (BVIs). Command was changed to require the ip keyword.
Functional Notes
To assign an IPv4 ACP to an interface, enter the interface configuration mode for the desired interface and enter ip access-policy <ipv4 acp name>.
Usage Examples
The following example associates the IPv4 ACP PRIVATE (to allow inbound IPv4 traffic to the Web server) to the Ethernet interface 0/1: Enable the AOS security features: (config)#ip firewall Associate the ACP with the Ethernet interface 0/1: (config)#interface eth 0/1 (config-eth 0/1)#ip access-policy PRIVATE
60000CRG0-35B
1477
ip address dhcp
Use the ip address dhcp command to use Dynamic Host Configuration Protocol (DHCP) to obtain an address on the interface. Use the no form of this command to remove a configured IP address (using DHCP) and disable DHCP operation on the interface. Variables that may be used with this command to further define the DHCP configuration include:
ip address dhcp client-id [<interface> | <identifier>] [hostname <string>] [track <name>] [<administrative distance>] ip address dhcp hostname <string> [no-default-route | no-domain-name | no-nameservers] [track <name>] [<administrative distance>] ip address dhcp [no-default-route | no-domain-name | no-nameservers] [track <name>] [<administrative distance>] ip address dhcp track <name> [<administrative distance>]
Syntax Description
<administrative distance> Optional. Specifies the administrative distance to use when adding the DHCP gateway into the route table. It is used to determine the best route when multiple routes to the same destination exist. The lower the administrative distance, the more reliable the route. Range is 1 to 255. Optional. Specifies the client identifier used when obtaining an IP address from a DHCP server. Specifies an interface, thus defining the client identifier as the hexadecimal medium access control (MAC) address of the specified interface (including a hexadecimal number added to the front of the MAC address to identify the media type). For example, specifying the client-id ethernet 0/1 (where the Ethernet interface has a MAC address of d217.0491.1150) defines the client identifier as 01:d2:17:04:91:11:50 (where 01 defines the media type as Ethernet). Refer to hardware-address on page 2704 for a detailed listing of media types. <identifier> Specifies a custom client-identifier using a text string (that is converted to a hexadecimal equivalent) or 7 to 28 hexadecimal numbers (with colon delimiters). For example, a custom client identifier of 0f:ff:ff:ff:ff:51:04:99:a1 may be entered using the <identifier> option. hostname <string> Optional. Specifies a text string (to override the global router name) to use as the name in the DHCP option 12 field. The string is enclosed in quotation marks and can consist of up to 35 characters. Optional. Specifies that no default route is obtained via DHCP. Optional. Specifies that no domain name is obtained via DHCP. Optional. Specifies that no domain naming system (DNS) servers are obtained via DHCP.
client-id <interface>
60000CRG0-35B
1478
Ethernet Interface Command Set Optional. Attaches a network monitoring track to the DHCP client. The DHCP gateway route for this client will only reside in the route table while the track is in the pass state. For more information on configuring track objects, refer to track <name> on page 1251.
Default Values
<administrative distance> client-id By default, the administrative distance value is 1. Optional. By default, the client identifier is populated using the following formula: TYPE: INTERFACE SPECIFIC INFO : MAC ADDRESS Where TYPE specifies the media type in the form of one hexadecimal byte (refer to hardware-address on page 2704 for a detailed listing of media types), and the MAC ADDRESS is the medium access control (MAC) address assigned to the first Ethernet interface in the unit in the form of six hexadecimal bytes. (For units with a single Ethernet interface, the MAC ADDRESS assigned to Ethernet 0/1 is used in this field.) INTERFACE SPECIFIC INFO is only used for Frame Relay interfaces and can be determined using the following: FR_PORT#: Q.922 ADDRESS Where the FR_PORT# specifies the label assigned to the virtual Frame Relay interface using four hexadecimal bytes. For example, a virtual Frame Relay interface labeled 1 would have a FR_PORT# of 00:00:00:01. The Q.922 ADDRESS field is populated using the following:
C/R EA DE EA
Where the FECN, BECN, C/R, DE, and high order extended address (EA) bits are assumed to be 0 and the lower order EA bit is set to 1. The following list provides a few example DLCIs and associated Q.922 address: DLCI (decimal) / Q.922 address (hex) 16 / 0x0401 50 / 0x0C21 60 / 0x0CC1 70 / 0x1061 80 / 0x1401 hostname <string> By default, the host name is the name configured using the Global Configuration hostname command.
60000CRG0-35B
1479
Command History
Release 2.1 Release 8.1 Release 13.1 Release A4.01 Command was introduced. Command was expanded to include the asynchronous transfer mode (ATM) subinterface. Command was expanded to include the track and administrative distance. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
DHCP allows interfaces to acquire a dynamically assigned IP address from a configured DHCP server on the network. Many Internet service providers (ISPs) require the use of DHCP when connecting to their services. Using DHCP reduces the number of dedicated IP addresses the ISP must obtain. Consult your ISP to determine the proper values for the client-id and hostname fields.
Usage Examples
The following example enables DHCP operation on the Ethernet interface 0/1: (config)#interface ethernet 0/1 (config-eth 0/1)#ip address dhcp The following example enables DHCP operation on the Ethernet interface 0/1 utilizing host name adtran and does not allow obtaining a default route, domain name, or name servers. It also sets the administrative distance as 5: (config)#interface ethernet 0/1 (config-eth 0/1)#ip address dhcp hostname adtran no-default-route no-domain-name no-nameservers 5
60000CRG0-35B
1480
Syntax Description
<ipv4 address> <subnet mask> Specifies a valid IPv4 address. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IPv4 addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Optional. Configures a secondary IPv4 address for the specified interface.
secondary
Default Values
By default, there are no assigned IPv4 addresses.
Command History
Release 1.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
Use secondary IPv4 addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IPv4 addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IPv4 addresses on the secondary subnet.
Usage Examples
The following example configures a secondary IPv4 address of 192.22.72.101 /30: (config)#interface ethernet 0/1 (config-eth 0/1)#ip address 192.22.72.101 /30 secondary
60000CRG0-35B
1481
Default Values
By default, no IP address range is defined.
Command History
Release 17.4 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a range of secondary IP address from 192.22.72.1 to 192.22.72.10 on subnet 255.255.255.252: (config)#interface ethernet 0/1 (config-eth 0/1)#ip address range 192.22.72.1 192.22.72.10 255.255.255.252 secondary
60000CRG0-35B
1482
ip dhcp release
Use the ip dhcp release command to transmit a message to the DHCP server requesting termination of the IP address lease on that interface. If you are currently connected to the unit using a Telnet session through the Ethernet interface, using the ip dhcp release command will terminate your Telnet session and render your Telnet capability inoperable until a new IP address is assigned by the DHCP server. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 2.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
Dynamic Host Configuration Protocol (DHCP) allows interfaces to acquire a dynamically assigned IP address from a configured DHCP server on the network. Many Internet service providers (ISPs) require the use of DHCP when connecting to their services. Using DHCP reduces the number of dedicated IP addresses the ISP must obtain.
Usage Examples
The following example releases the IP address assigned (by DHCP) on the Ethernet interface 0/1: (config)#interface ethernet 0/1 (config-eth 0/1)#ip dhcp release
60000CRG0-35B
1483
ip dhcp renew
Use the ip dhcp renew command to transmit a message to the DHCP server requesting renewal of the IP address lease on that interface. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 2.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
Dynamic Host Configuration Protocol (DHCP) allows interfaces to acquire a dynamically assigned IP address from a configured DHCP server on the network. Many Internet service providers (ISPs) require the use of DHCP when connecting to their services. Using DHCP reduces the number of dedicated IP addresses the ISP must obtain.
Usage Examples
The following example renews the IP address assigned (by DHCP) on the Ethernet interface 0/1: (config)#interface ethernet 0/1 (config-eth 0/1)#ip dhcp renew
60000CRG0-35B
1484
ip directed-broadcast
Use the ip directed-broadcast command to allow reception/forwarding of directed broadcasts. Use the no form of this command to disable this feature. Variations of this command include:
ip directed-broadcast ip directed-broadcast <name>
Syntax Description
<name> Optional. Specifies an IP access control list (ACL) to filter traffic.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
A directed broadcast is a packet intended for all nodes on a nonlocal network. For example, the broadcast address 255.255.255.255 reaches all nodes on a network; the directed broadcast address 128.1.255.255 is intended for all nodes whose network address is 128.1.0.0. A router not directly attached to 128.1.0.0 simply forwards the directed broadcast packet to the next hop. A router on network 128.1.0.0 that has ip directed-broadcast enabled, accepts and forwards the packet to all nodes whose network address is 128.1.0.0. Routers connecting subnets of 128.1.0.0 also accept and forward the packet to the nodes on their respective subnets. When a directed broadcast packet reaches a router that is directly connected to its destination subnet, that packet is distributed as a broadcast on the destination subnet. The packet is then sent as a link-layer broadcast. The ip directed-broadcast command controls the distribution of directed broadcasts when they reach their target subnets. Only the final transmission of the directed broadcast on its ultimate destination subnet is affected. It does not affect the transit unicast routing of IP directed broadcasts. If ip directed-broadcast is enabled for this interface, incoming IP packets whose addresses identify them as directed broadcasts intended for the subnet to which this interface is attached will be forwarded as broadcasts on that subnet. Forwarding of the packets can be limited by specifying an ACL with this command. In this case, only directed broadcasts that are permitted by the specified ACL will be forwarded, and all other directed broadcasts directed to this interface subnet will be dropped. Disabling the ip directed-broadcast command will cause directed broadcasts destined for the subnet to which this interface is attached to be dropped. This option is a requirement for routers as described in RFC 1812, section 4.2.2.11. Furthermore, it is disabled by default (RFC 2644), with the intended goal of reducing the efficacy of certain types of denial of service (DoS) attacks.
60000CRG0-35B
1485
Usage Examples
The following example enables forwarding of directed broadcasts on the interface ethernet 0/1: (config)#interface ethernet 0/1 (config-eth 0/1)#ip directed-broadcast
60000CRG0-35B
1486
ip ffe
Use the ip ffe command to enable the RapidRoute Engine on this interface with the default number of entries. Use the no form of this command to disable this feature. Variations of this command include:
ip ffe ip ffe max-entries <value>
Issuing this command will cause all RapidRoute entries on this interface to be cleared.
Syntax Description
max-entries <value> Optional. Specifies the maximum number of entries stored in the flow table. Valid range is from 1 to 8192.
Default Values
By default, the RapidRoute Engine is disabled. The default number of max-entries is 4096.
Command History
Release 13.1 Release 17.6 Release A4.01 Command was introduced. Command was expanded to include the high level data link control (HDLC) and tunnel interfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
RapidRoute can be used to help reduce routing overhead, and thus reduce overall routing times. Routing times are reduced by the creation of a flow table on the ingress interface. The maximum number of entries that can be stored in the flow table at any one time may be specified by using the max-entries parameters.
Usage Examples
The following example enables RapidRoute and sets the maximum number of entries in the flow table to 50: (config)#interface ethernet 0/1 (config-eth 0/1)#ip ffe max-entries 50
60000CRG0-35B
1487
Technology Review
The RapidRoute system goal is to increase IP packet throughput by moving as much of the packet processing into the engine as possible. Packets are classified into flows based upon the IP protocol (Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), etc.), the source and destination IP addresses, IP type of service (ToS), and the protocol-specific information, such as the source and destination port numbers. Flows are defined as the unidirectional representation of a conversation between two IP hosts. Each ingress interface keeps its own flow table, a collection of flow entries. The first packet in a flow that is forwarded through the unit will build a flow entry. When a flow entry is looked up but no entry is found, a RapidRouteBuilder object is allocated and attached to the packet. As the packet passes through the various processing layers, each subsystem will add processing to the RapidRouteBuilder. When packet is about to be forwarded out of the egress interface, the RapidRouteBuilder will be finalized. That is, the flow entry being built will be checked for completeness and committed to the flow table on the ingress interface. Subsequent flow matches can then bypass the normal processing layers.
60000CRG0-35B
1488
ip flow
Use the ip flow command to enable integrated traffic monitoring (ITM) for all traffic received or forwarded on an interface. Use the no form of this command to disable traffic monitoring. Variations of this command include:
ip flow egress ip flow egress <name> ip flow ingress ip flow ingress <name>
Syntax Description
egress ingress <name> Specifies that all outgoing traffic be monitored. Specifies that all incoming traffic be monitored. Optional. Specifies the name of an access control list (ACL) to use for filtering traffic.
Default Values
By default, no traffic monitoring is enabled.
Command History
Release 16.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Usage Examples
The following example enables traffic monitoring on an Ethernet interface to monitor incoming traffic through an ACL called myacl: (config)#interface ethernet 0/1 (config-eth 0/1)#ip flow ingress myacl
60000CRG0-35B
1489
Syntax Description
<ip address> Specifies the destination IP address for the forwarded UDP packets. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
Default Values
By default, broadcast UDP packets are not forwarded.
Command History
Release 1.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
When used in conjunction with the ip forward-protocol command, the ip helper-address feature allows you to customize which broadcast packets are forwarded. To implement the helper address feature, assign helper address(es) (specifying the device that needs to receive the broadcast traffic) to the interface closest to the host that transmits the broadcast packets. When broadcast packets (of the specified type forwarded using the ip forward-protocol command) are received on the interface, they will be forwarded to the device that needs the information. Only packets meeting the following criteria are considered eligible by the ip helper-address feature: 1. The packet IP protocol is UDP. 2. Any UDP port specified using the ip forward-protocol command. 3. The medium access control (MAC) address of the frame is an all-ones broadcast address (ffff.ffff.ffff). 4. The destination IP address is broadcast defined by all ones (255.255.255.255) or a subnet broadcast (for example, 192.33.4.251 for the 192.33.4.248 /30 subnet).
60000CRG0-35B
1490
Usage Examples
The following example forwards all domain naming system (DNS) broadcast traffic to the DNS server with IP address 192.33.5.99: (config)#ip forward-protocol udp domain (config)#interface ethernet 0/1 (config-eth 0/1)#ip helper-address 192.33.5.99
60000CRG0-35B
1491
ip igmp
Use the ip igmp command to configure multicasting related functions for the interface. Variations of this command include:
ip igmp immediate-leave ip igmp last-member-query-interval <milliseconds> ip igmp querier-timeout <seconds> ip igmp query-interval <seconds> ip igmp query-max-response-time <seconds> ip igmp static-group <address> ip igmp version [1 | 2]
Syntax Description
immediate-leave Specifies that if only one host (or Internet Group Management Protocol (IGMP) snooping switch) is connected to the interface, when a leave is received, multicast of that group is immediately terminated as opposed to sending a group query and timing out the group if no device responds. Works in conjunction with ip igmp last-member-query-interval. Applies to all groups when configured. Use the no form of this command to disable the immediate-leave feature. Controls the timeout (in milliseconds) used to detect whether any group receivers remain on an interface after a receiver leaves a group. If a receiver sends a leave-group message (IGMP Version 2), the router sends a group-specific query on that interface. After twice the time specified by this command plus as much as one second longer, if no receiver responds, the router removes that interface from the group and stops sending that group's multicast packets to the interface. Range is 100 to 65535 ms. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) that the router waits after the current queriers last query before it takes over as querier (IGMP V2). Range is 60 to 300 seconds. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) at which IGMP queries are sent on an interface. Host query messages are addressed to the all-hosts multicast group with an IP time to live (TTL) of 1. The router uses queries to detect whether multicast group members are on the interface and to select an IGMP designated router (DR) for the attached segment (if more than one multicast router exists). Only the DR for the segment sends queries. For IGMP V2, the DR is the router with the lowest IP address on the segment. Range is 0 to 65535 seconds. Use the no form of this command to return to the default setting. Specifies the maximum response time (in seconds) advertised by this interface in queries when using IGMP V2. Hosts are allowed a random time within this period to respond, reducing response bursts. Use the no form of this command to return to the default setting.
last-member-query-interval <milliseconds>
querier-timeout <seconds>
query-interval <seconds>
query-max-response-time <seconds>
60000CRG0-35B
1492
Syntax Description
static-group <address> Configures the router's interface to be a statically connected member of the specified group. Packets received on the correct reverse path forwarding (RPF) interface are forwarded to this interface regardless of whether any receivers have joined the specified group using IGMP. Use the no form of this command to remove a configured static group. Sets the interfaces IGMP version. Use the no form of this command to return to the default setting.
version [1 | 2]
Default Values
The defaults for this command are: last-member-query-interval 1000 milliseconds querier-timeout query-interval query-max-response-time version 2x the query-interval value 60 seconds 10 seconds Version 1
Command History
Release 7.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Usage Examples
The following example sets the query message interval on the interface to 200 milliseconds: (config)#interface ethernet 0/1 (config-eth 0/1)#ip igmp last-member-query-interval 200
60000CRG0-35B
1493
ip mcast-stub downstream
Use the ip mcast-stub downstream command to enable multicast forwarding and Internet Group Management Protocol (IGMP) (router mode) on an interface, and to place it in multicast stub downstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub upstream commands. Downstream interfaces connect to segments with multicast hosts. Multiple interfaces may be configured in downstream mode; however, interfaces connecting to the multicast network (upstream) should not be configured in downstream mode. Interfaces configured as downstream should have the lowest IP address of all IGMP-capable routers on the connected segment in order to be selected as the designated router (DR) and ensure proper forwarding. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub upstream on page 1497 for more information.
Usage Examples
The following example enables multicast forwarding and IGMP on the interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ip mcast-stub downstream
60000CRG0-35B
1494
ip mcast-stub fixed
Use the ip mcast-stub fixed command to allow forwarding of multicast traffic on a selected interface after enabling multicast routing. Use the no form of this command to disable this mode. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 12.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
Multicast routing must be enabled prior to setting ip mcast-stub fixed on the selected interface. Also, use the ip igmp static-group <ip address> command to receive multicast traffic without host-initiated Internet Group Management Protocol (IGMP) activity on the selected interface. Otherwise, all host-initiated IGMP transactions will enter multicast routes on the routers interface involved with IGMP activities.
Usage Examples
The following example enables multicast traffic forwarding and IGMP on the interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ip mcast-stub fixed
60000CRG0-35B
1495
ip mcast-stub helper-enable
Use the ip mcast-stub helper-enable command to assign the ip mcast-stub helper-address as the Internet Group Management Protocol (IGMP) proxy. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 8.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address, ip mcast-stub upstream, and ip mcast-stub downstream commands. When enabled, the interface becomes a helper forwarding interface. The IGMP host function is dynamically enabled and the interface becomes the active upstream interface, enabling the unit to perform as an IGMP proxy. Refer to ip mcast-stub helper-address <ip address> on page 968, ip mcast-stub downstream on page 1494, and ip mcast-stub upstream on page 1497 for more information.
Usage Examples
The following example sets the helper address as the IGMP proxy: (config)#interface ethernet 0/1 (config-eth 0/1)#ip mcast-stub helper-enable
60000CRG0-35B
1496
ip mcast-stub upstream
Use the ip mcast-stub upstream command to enable multicast forwarding on an interface and place it in multicast stub upstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub downstream commands. When enabled, the interface becomes a candidate to be a helper forwarding interface. If chosen as the best path toward the helper address by the router's unicast route table, the Internet Group Management Protocol (IGMP) host function is dynamically enabled and the interface becomes the active upstream interface, enabling the router to perform as an IGMP proxy. Though multiple interfaces may be candidates, no more than one interface will actively serve as the helper forwarding interface. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub downstream on page 1494 for more information.
Usage Examples
The following example enables multicast forwarding on the interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ip mcast-stub upstream
60000CRG0-35B
1497
ip mtu <size>
Use the ip mtu command to configure the Internet Protocol version 4 (IPv4) maximum transmission unit (MTU) size for the active interface. Use the no form of this command to return to the default value. Syntax Description
<size> Configures the window size for transmitted IPv4 packets. The valid ranges for the various interfaces are listed below: ATM subinterfaces 64 to 1520 BVIs 64 to 2100 Demand interfaces 64 to 1520 Ethernet interfaces (all types) 64 to 1500 FDL interfaces 64 to 256 Frame Relay subinterfaces 64 to 1520 HDLC interfaces (NetVanta 5305) 64 to 4600 HDLC interfaces (all other NetVanta products) 64 to 2100 Loopback interfaces 64 to 1500 PPP interfaces (NetVanta 5305) 64 to 4600 PPP interfaces (all other NetVanta products) 64 to 2100 Tunnel interfaces 64 to 18190
Default Values
<size> The default values for the various interfaces are listed below: ATM subinterfaces 1500 BVIs 1500 Demand interfaces 1500 Ethernet interfaces (all types) 1500 FDL interfaces 256 Frame Relay subinterfaces 1500 HDLC interfaces 1500 Loopback interfaces 1500 PPP interfaces 1500 Tunnel interfaces 1476
Command History
Release 1.1 Release 11.1 Release 17.9 Command was introduced. Command was expanded to include the demand interface. Command was changed to require the ip keyword.
Functional Notes
Open shortest path first (OSPF) will not become adjacent on links where the MTU sizes do not match. If router A and router B are exchanging hello packets but their MTU sizes do not match, they will never reach adjacency. This is by design and required by the RFC.
60000CRG0-35B
1498
Usage Examples
The following example specifies an IPv4 MTU of 1200 on the Ethernet interface 0/1: (config)#interface eth 0/1 (config-eth 0/1)#ip mtu 1200
60000CRG0-35B
1499
ip ospf
Use the ip ospf command to customize open shortest path first (OSPF) settings (if needed). Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication-key <password> ip ospf cost <value> ip ospf dead-interval <seconds> ip ospf hello-interval <seconds> ip ospf message-digest-key [1 | 2] md5 <key> ip ospf priority <value> ip ospf retransmit-interval <seconds> ip ospf transmit-delay <seconds>
Syntax Description
authentication-key <password> cost <value> Assigns a simple-text authentication password to be used by other routers using the OSPF simple password authentication. Specifies the OSPF cost of sending a packet on the interface. This value overrides any computed cost value. Range is 1 to 65535. Sets the maximum interval (in seconds) allowed between hello packets. If the maximum is exceeded, neighboring devices will determine that the device is down. Range is 0 to 32767 seconds. Specifies the interval (in seconds) between hello packets sent on the interface. Range is 0 to 32767 seconds. Configures OSPF message digest 5 (MD5) authentication (16 byte maximum) keys. Sets the OSPF priority. The value set in this field helps determine the designated router (DR) for this network. Range is 0 to 255. Specifies the interval (in seconds) between link state advertisements (LSAs). Range is 0 to 32767 seconds. Sets the estimated time (in seconds) required to send a link state advertisement (LSA) on the interface. Range is 0 to 32767 seconds.
dead-interval <seconds>
Default Values
The defaults for this command are: dead-interval <seconds> hello-interval <seconds> priority <value retransmit-interval <seconds> transmit-delay <seconds> 40 seconds 10 seconds: Ethernet, Frame Relay, and Point-to-Point Protocol (PPP) 1 5 seconds 1 second
60000CRG0-35B
1500
Command History
Release 3.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Usage Examples
The following example specifies an OSPF priority of 120 on the Ethernet interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ip ospf priority 120
60000CRG0-35B
1501
ip ospf authentication
Use the ip ospf authentication command to authenticate an interface that is performing open shortest path first (OSPF) authentication. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication ip ospf authentication message-digest ip ospf authentication null
Syntax Description
message-digest null Optional. Selects message-digest authentication type. Optional. Specifies that no authentication is used.
Default Values
By default, this is set to null (meaning no authentication is used).
Command History
Release 3.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Usage Examples
The following example specifies that no authentication will be used on the Ethernet interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ip ospf authentication null
60000CRG0-35B
1502
ip ospf network
Use the ip ospf network command to specify the type of network on this interface. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf network broadcast ip ospf network point-to-point
Syntax Description
broadcast point-to-point Sets the network type for broadcast. Sets the network type for point-to-point.
Default Values
By default, Ethernet defaults to broadcast. Point-to-Point Protocol (PPP) and Frame Relay default to point-to-point.
Command History
Release 3.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
A point-to-point network will not elect designated routers.
Usage Examples
The following example designates a broadcast network type: (config)#interface ethernet 0/1 (config-eth 0/1)#ip ospf network broadcast
60000CRG0-35B
1503
ip pim sparse-mode
Use the ip pim sparse-mode command to enable protocol-independent multicast (PIM) sparse mode for this interface. Use the no form of this command to disable PIM sparse mode. Syntax Description
No subcommands.
Default Values
By default, PIM sparse mode for this interface is disabled.
Command History
Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
PIM sparse mode is a multicast routing protocol that makes use of the unicast forwarding table. It builds unidirectional shared trees rooted at a rendezvous point (RP) for a multicast group or a shortest path tree rooted at a specific source for a multicast group.
Usage Examples
The following example enables PIM sparse mode on the interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ip pim sparse-mode
60000CRG0-35B
1504
Default Values
By default, the priority of all protocol-independent multicast (PIM) interfaces is 1.
Command History
Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
Interfaces advertise their configured priority values in the hello messages transmitted on the interface. Routers use the priority values to determine the appropriate DR. The router on the network segment with the highest priority is selected as the DR. If a hello message is received on the interface from a router on the network segment and it does not contain a priority, the entire network segment defaults to DR selection based on IP addresses instead of priority. In this instance, the DR is selected as the router on the network segment that has the highest IP address. AOS will always include a priority in all transmitted hello messages. If no priority is specifically designated by the user, the priority is set as the default of 1.
Usage Examples
The following example specifies a priority of 100 on the Ethernet 0/1 interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ip pim-sparse dr-priority 100
60000CRG0-35B
1505
Default Values
By default, the hellos are transmitted on PIM interfaces every 60 seconds.
Command History
Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
Hello messages are used to inform neighbors of a routers presence. Hello messages normally generate a small amount of traffic on an interface. Setting the hello-timer to a small interval increases the number of hellos sent (thus increasing the amount of traffic). Set the hello-timer to a reasonable value, taking into consideration the bandwidth available on the interface.
Usage Examples
The following example specifies hellos be sent on the Ethernet 0/1 interface every 3600 seconds: (config)#interface ethernet 0/1 (config-eth 0/1)#ip pim-sparse hello-timer 3600
60000CRG0-35B
1506
Default Values
By default, the nbr-timeout is set to 105 seconds.
Command History
Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Usage Examples
The following example sets the neighbor timeout to 300 seconds: (config)#interface ethernet 0/1 (config-eth 0/1)#ip pim-sparse nbr-timeout 300
60000CRG0-35B
1507
Default Values
By default, the override interval is set to 2500 milliseconds.
Command History
Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Usage Examples
The following example sets the override interval to 3000 milliseconds: (config)#interface ethernet 0/1 (config-eth 0/1)#ip pim-sparse override-interval 3000
60000CRG0-35B
1508
Default Values
By default, the propagation delay is set to 500 milliseconds.
Command History
Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Usage Examples
The following example sets the propagation delay to 300 milliseconds: (config)#interface ethernet 0/1 (config-eth 0/1)#ip pim-sparse propagation-delay 300
60000CRG0-35B
1509
Default Values
By default, no policy route map is assigned to this interface.
Command History
Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Usage Examples
The following example assigns the policy route map policy1 to the interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ip policy route-map policy1
60000CRG0-35B
1510
ip proxy-arp
Use the ip proxy-arp command to enable proxy Address Resolution Protocol (ARP) on the interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, proxy ARP is enabled.
Command History
Release 1.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
In general, the principle of proxy ARP allows a router to insert its IP address in the source IP address field of a packet (if the packet is from a host on one of its subnetworks). This allows hosts to reach devices on other subnetworks without implementing routing or specifying a default gateway. If proxy ARP is enabled, AOS will respond to all ARP requests with its specified medium access control (MAC) address and forward packets accordingly. Enabling proxy ARP on an interface may introduce unnecessary ARP traffic on the network.
Usage Examples
The following example enables proxy ARP on the Ethernet interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ip proxy-arp
60000CRG0-35B
1511
Syntax Description
1 2 Accepts only RIP version 1 packets received on the interface. Accepts only RIP version 2 packets received on the interface.
Default Values
By default, all interfaces implement RIP version 1 (the default value for the version command).
Command History
Release 1.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
Use the ip rip receive version command to specify a RIP version that overrides the version (in the Router RIP) configuration. Refer to version on page 2687 for more information. AOS only accepts one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the Ethernet interface to accept only RIP version 2 packets: (config)#interface ethernet 0/1 (config-eth 0/1)#ip rip receive version 2
60000CRG0-35B
1512
Syntax Description
1 2 Transmits only RIP version 1 packets on the interface. Transmits only RIP version 2 packets on the interface.
Default Values
By default, all interfaces transmit RIP version 1 (the default value for the version command).
Command History
Release 1.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
Use the ip rip send version command to specify a RIP version that overrides the version (in the Router RIP) configuration. Refer to version on page 2687 for more information. AOS only transmits one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the Ethernet interface to transmit only RIP version 2 packets: (config)#interface ethernet 0/1 (config-eth 0/1)#ip rip send version 2
60000CRG0-35B
1513
Default Values
By default, no manual summarization is applied by RIP.
Command History
Release 12.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
Unlike the automatic summarization on classful network boundaries, only specific network advertisements are made by RIP using the ip rip summary-address command. This command is only effective if RIP version 2 is configured.
Usage Examples
The following example enables manual summarization on the specified IP address: (config)#interface eth 0/1 (config-eth 0/1)#ip rip summary-address 10.10.123.0 255.255.255.0
60000CRG0-35B
1514
ip route-cache
Use the ip route-cache command to enable fast-cache switching on the interface. Use the no form of this command to disable fast-cache switching and return to process switching mode. Using network address translation (NAT) or the AOS firewall capabilities on an interface requires process switching mode (using the no ip route-cache command).
Syntax Description
No subcommands.
Default Values
By default, fast-cache switching is enabled on all Ethernet and virtual Frame Relay subinterfaces. IP route cache is enabled for all virtual Point-to-Point Protocol (PPP) interfaces.
Command History
Release 2.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
Fast switching allows an IP interface to provide optimum performance when processing IP traffic.
Usage Examples
The following example enables fast switching on the Ethernet interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ip route-cache
60000CRG0-35B
1515
ip unnumbered <interface>
Use the ip unnumbered command to use the IP address assigned to the specified interface for all IP processing on the active interface. Use the no form of this command to remove the unnumbered configuration. Syntax Description
<interface> Specifies the interface that contains the IP address to use as the source address for all packets transmitted on this interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type ip unnumbered ? for a list of valid interfaces.
Default Values
By default, all interfaces are configured to use a specified IP address (using the ip address command).
Command History
Release 1.1 Release 5.1 Release 6.1 Release 11.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the virtual local area network (VLAN) interfaces. Command was expanded to include the demand interfaces.
Functional Notes
If ip unnumbered is enabled on an interface, all IP traffic from the interface will use a source IP address taken from the specified interface. For example, specifying ip unnumbered ppp 1 while in the Ethernet Interface Configuration mode configures the Ethernet interface to use the IP address assigned to the Point-to-Point Protocol (PPP) interface for all IP processing. In addition, AOS uses the specified interface information when sending route updates over the unnumbered interface.
Usage Examples
The following example configures the Ethernet interface 0/1 to use the IP address assigned to the PPP interface (ppp 1): (config)#interface ethernet 0/1 (config-eth 0/1)#ip unnumbered ppp 1
60000CRG0-35B
1516
ip urlfilter <name>
Use the ip urlfilter command to apply a universal resource locator (URL) filter to the interface for all inbound or outbound traffic. Use the no form of this command to remove the URL filter from an interface. Variations of this command include:
ip urlfilter <name> in ip urlfilter <name> out
Syntax Description
<name> in out Specifies the URL filter name to use on the interface. Applies the filter to the inbound traffic. Applies the filter to the outbound traffic.
Default Values
By default, there are no URL filters applied to any interfaces.
Command History
Release 12.1 Release 14.1 Release A4.01 Command was introduced. Command was expanded to include the virtual local area network (VLAN) interfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
The firewall must be enabled using the ip firewall command in order to use URL filters. The URL filter must be created by using the ip urlfilter <filtername> http command before applying it to the interface. Refer to ip urlfilter <name> http on page 1090 for more information on using this command.
Usage Examples
The following example performs URL filtering on all traffic entering through the Ethernet interface and matches the URL filter named MyFilter: (config)#interface ethernet 0/1 (config-eth 0/1)#ip urlfilter MyFilter in
60000CRG0-35B
1517
ipv6
Use the ipv6 command to enable Internet Protocol version 6 (IPv6) processing and create a link-local address on an interface. Use the no form of this command to disable IPv6 processing and remove all IPv6 configuration on the interface. Syntax Description
No subcommands.
Default Values
By default, IPv6 is not enabled on the interface.
Command History
Release 18.1 Command was introduced.
Functional Notes
Because AOS uses the dual-stack for IPv6 implementation, IPv6 features must be enabled for the supported IPv6 features to be used. Enabling IPv6 in AOS is completed by using an IPv6 address or using the ipv6 keyword with specific commands. For example, to enable IPv6 on an interface and cause the interface to join the link scoped all-nodes and all-routers multicast group, enter an IPv6 address on the interface. Use the ipv6 command to enable IPv6 processing and create a link-local address on an interface when other unicast IPv6 addresses are not needed on the interface. This command is not necessary nor effectual when any other form of an IPv6 address command is also present on the interface.
Usage Examples
The following example enables IPv6 and creates a link-local IPv6 address on the interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6
60000CRG0-35B
1518
Syntax Description
<ipv6 acl name> in out Applies the named IPv6 ACL to the interface. Enables access control on IPv6 packets received on the specified interface. Enables access control on IPv6 packets transmitted on the specified interface.
Default Values
By default, these commands are disabled.
Command History
Release 18.1 Command was introduced.
Functional Notes
Only one IPv6 ACL can be applied in each traffic direction. Unlike in IPv4, IPv6 traffic filters include an implicit permit for neighbor solicitation and advertisement packets in an ACL before the traditional implicit deny at the end of the ACL. This prevents blocking of address resolution and unreachability detection, although this can be overridden by entering explicit deny commands in the IPv6 ACL.
Usage Examples
The following example applies the IPv6 ACL Privatev6 to incoming IPv6 traffic on the interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 access-group Private6 in
60000CRG0-35B
1519
Default Values
By default, there are no configured IPv6 ACPs associated with an interface.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example applies the IPv6 ACP PRIVATEv6 to the interface: Enable the AOS security features: (config)#ipv6 firewall Associate the ACP with the Ethernet interface 0/1: (config)#interface eth 0/1 (config-eth 0/1)#ipv6 access-policy PRIVATEv6
60000CRG0-35B
1520
Default Values
By default, no IPv6 address is configured on the interface and IPv6 processing is not enabled on the interface.
Command History
Release 18.1 Command was introduced.
Functional Notes
The IPv6 unicast address can be a global unicast address or a unique local address, but it cannot be a link-local IPv6 address (FE80::). Link-local addresses are created on the interface using the command ipv6 address <ipv6 link-local address> link-local on page 1523. The address created by this command is a manually configured IPv6 address, which must have all parts (prefix and host bits) specified. Using the no form of this command with a specified IPv6 address removes only that IPv6 address from the interface. Using the no form of this command without a specified IPv6 address removes all manually configured IPv6 addresses from the interface.
Usage Examples
The following example adds a unicast IPv6 address to the interface and enables IPv6 processing on the interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 address 2001:DB8::/32
60000CRG0-35B
1521
eui-64
Default Values
By default, no IPv6 address is configured on the interface and IPv6 processing is not enabled on the interface.
Command History
Release 18.1 Command was introduced.
Functional Notes
The IPv6 unicast address can be a global unicast address or a unique local address, but it cannot be a link-local IPv6 address (FE80::). Link-local addresses are created on the interface using the command ipv6 address <ipv6 link-local address> link-local on page 1523. The address created by this command is an EUI-64 unicast address. For this type of address, the EUI-64 interface ID is automatically placed in the IPv6 address. Any manually configured bits beyond the addresss prefix length are set to 0; however, any manually configured bits within the prefix length that extend into the lower 64 bits take precedence over the Interface ID bits. Using the no form of this command with a specified IPv6 address removes only that IPv6 address from the interface. Using the no form of this command without a specified IPv6 address removes all manually configured IPv6 addresses from the interface.
Usage Examples
The following example adds a unicast IPv6 address with an EUI-64 Interface ID to the interface and enables IPv6 processing on the interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 address 2001:DB8:3F::/48 eui-64
60000CRG0-35B
1522
link-local
Default Values
By default, no IPv6 address is configured for the interface and IPv6 processing is not enabled.
Command History
Release 18.1 Command was introduced.
Functional Notes
A single link-local address can be manually configured on an interface. The lower 64 bits of the specified address become the Interface ID for the interface, overriding the default interface ID. Any other address that uses the EUI-64 parameter to automatically place the interface ID in the lower 64 bits of the IPv6 address use the new value for the interface ID. The <ipv6 address> for a link-local IPv6 address is specified in the format FE80::<bits>. The <bits> are the lower 64 bits of the link-local IPv6 address, and since this form of address has no prefix, the bits entered form the entire IPv6 address. These bits also become the new interface ID for the interface and can be derived from the interfaces medium access control (MAC) address. The link-local parameter specifies this is a manually configured link-local address. Any manually configured link-local address will replace an automatically configured link-local address for the interface. Using the no form of this command with a specified IPv6 address removes that IPv6 address from the interface. Using the no form of this command without a specified IPv6 address removes all manually configured IPv6 addresses from the interface.
Usage Examples
The following example manually creates a link-local IPv6 address on the interface and enables IPv6 processing: (config)#interface eth 0/1 (config-eth 0/1)#ipv6 address FE80::220:8FF:FE54:F9D8 link-local
60000CRG0-35B
1523
Syntax Description
default metric <value> Optional. Specifies that the interface maintain a list of advertising routers that are willing to be IPv6 default routers. Optional. Specifies the administrative distance for a default router maintained in the default router list. Range is 1 to 255. Routes with lower administrative distance are favored.
Default Values
By default, no IPv6 addresses are configured for the interface and IPv6 processing is not enabled. When an IPv6 address is configured automatically, the administrative distance for default routers is 2 by default.
Command History
Release 18.1 Command was introduced.
Functional Notes
When autoconfiguration is enabled, the interface listens for RA messages that tell the interface how it should be configured. The interface then creates addresses for advertised 64-bit prefixes with the A flag in the IPv6 address set using stateless address autoconfiguration (SLAAC). The addresses use the EUI-64 interface ID in the lower 64 bits of the address. A route type of Connected is added to the route table if the L flag on the prefix advertisement (on-link flag) is also set.
Usage Examples
The following example enables IPv6 processing on the interface, creates a link-local IPv6 address for the interface, and allows the interface to automatically configure itself for IPv6: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 address autoconfig
60000CRG0-35B
1524
Default Values
By default, the MTU of the interface is set to 1280 bytes.
Command History
Release 18.1 Command was introduced.
Functional Notes
In IPv6, the minimum MTU is 1280 octets. Any link that has an MTU less than 1280 octets must use link fragmentation and reassembly that is transparent to IPv6 (for example, the Fragmentation Header). Sources in the IPv6 network are expected to perform path maximum transmission unit (PMTU) discovery to send packets larger than 1280 octets. PMTU works in the following manner: First, the sending node assumes the link MTU of the interface from which the traffic is being forwarded and then sends the IPv6 packet at the link MTU size. If a router on the path is unable to forward the packet, it sends an ICMP Packet Too Big message back to the sending node containing the link MTU of the link on which the packet forwarding failed. The sending node then rests the PMTU to the value of the MTU field in the Internet Control Message Protocol version 6 (ICMPv6) Packet Too Big message, and the packet is resent. The MTU for IPv6 packets can be set on a per-interface basis. There are two methods for setting MTUs for interfaces if required: one for Layer 3 interfaces, and one for the underlying Layer 1 and Layer 2 interfaces. For all interface types, use the ipv6 mtu <size> command to specify the IPv6 MTU in bytes from the interfaces configuration mode. The minimum MTU setting for IPv6 is 1280 bytes, and the maximum is 1500 bytes. The IPv6 MTU value is independent of the IPv4 MTU setting (set with the command ip mtu <size> on page 1498). When the interface is forwarding the IPv6 packet as a router, if the packet size exceeds the IPv6 MTU of the egress interface, the packet is dropped and ICMPv6 Packet Too Big message is sent to the source. When originating an IPv6 packet from the local IPv6 stack, and the packet is larger than the IPv6 MTU of the egress interface, the packet is fragmented and sent.
Usage Examples
The following example specifies the IPv6 MTU value for the interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 mtu 1350
60000CRG0-35B
1525
ipv6 nd advertisement-interval
Use the ipv6 nd advertisement-interval command to specify that the Advertisement Interval Option is sent in Internet Protocol version 6 (IPv6) router advertisement (RA) messages from the router. This command is effectual only when the interface is in router mode. Use the no form of this command to return to the default interval. Syntax Description
No subcommands.
Default Values
By default, Advertisement Interval Options are not sent in RA messages.
Command History
Release 18.1 Command was introduced.
Functional Notes
Sending the Advertisement Interval Option should be enabled when the router is functioning in a mobile IP environment to aid movement detection by mobile nodes. This option contains the current value of the maximum router advertisement interval configured using the command ipv6 nd ra interval on page 1535.
Usage Examples
The following example specifies that the interface include Advertisement Interval Options in RA messages sent from the router: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 nd advertisement-interval
60000CRG0-35B
1526
Default Values
By default, the interface sends 1 NS message.
Command History
Release 18.1 Command was introduced.
Functional Notes
DAD is used by devices to determine if IPv6 addresses are unique before they are applied to interfaces. DAD is used in NS messages to detect duplicate unicast addresses. The Target Address fields in the NS messages are set to the IPv6 address for which duplication is being detected. Destination IPv6 addresses for DAD in NS messages are the solicited-node multicast version of the address being tested. Source IPv6 addresses for DAD are set to the IPv6 unspecified address (::). Once the IPv6 address is determined by DAD to be unique, it can be applied to the IPv6 interface on the node. DAD in AOS is performed when an interface transitions state from DOWN to UP or when manually configuring an address. When performing DAD because of an interface transition, DAD will happen immediately after the interface transition and again 40 seconds later to cooperate with the port being connected to an Ethernet switch.
Usage Examples
The following example specifies that 3 NS messages are sent by the interface when performing DAD: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 nd dad attempts 3
60000CRG0-35B
1527
ipv6 nd managed-config-flag
Use the ipv6 nd managed-config-flag command to specify the M flag in Internet Protocol version 6 (IPv6) router advertisement (RA) messages. The M flag instructs hosts receiving the RA that they can use stateful Dynamic Host Configuration Protocol version 6 (DHCPv6) to configure addresses and nonaddress information. Use the no form of this command to disable the setting of the M flag. Syntax Description
No subcommands.
Default Values
By default, the M flag is not set in RAs.
Command History
Release 18.1 Command was introduced.
Functional Notes
If you specify that the M flag is set in RA messages, you do not need to set the 0 flag (it becomes redundant).
Usage Examples
The following example sets the M flag for RA messages sent by the interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 nd managed-config-flag
60000CRG0-35B
1528
Default Values
By default, the interval is set to 1000 ms for internal use by the router and 0 (unspecified) is sent in RA messages.
Command History
Release 18.1 Command was introduced.
Functional Notes
This command controls the spacing of NS messages for functions such as address resolution, reachability detection, and DAD. For DAD it also serves as the amount of time after the last transmission before the detection phase of autoconfiguration terminates. In addition, the command controls the interval between unsolicited NA messages.
Usage Examples
The following example changes the interval between RA messages sent from the interface to 2000 ms: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 nd ns-interval 2000
60000CRG0-35B
1529
ipv6 nd other-config-flag
Use the ipv6 nd other-config-flag command to specify the O flag in Internet Protocol version 6 (IPv6) router advertisement (RA) messages. This command is only effectual when the interface is in router mode. When the O flag is set, hosts receiving the RA messages are instructed that they may use stateless Dynamic Host Configuration Protocol version 6 (DHCPv6) to receive information that is not IPv6 addressing information, and to use some other method (whether through manual configuration, stateless address autoconfiguration (SLAAC), etc.) for addressing information. Use the no form of this command to disable the O flag setting. Syntax Description
No subcommands.
Default Values
By default, the O flag is not set in RA messages.
Command History
Release 18.1 Command was introduced.
Functional Notes
If the M flag is set for RA messages, you do not need to set the O flag.
Usage Examples
The following example sets the O flag in RA messages from the interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 nd other-config-flag
60000CRG0-35B
1530
ipv6 nd prefix
Use the ipv6 nd prefix command to specify the Internet Protocol version 6 (IPv6) address prefixes used in router advertisement (RA) messages sent from the interface. Use the no form of this command to remove the specified prefix configuration from the interface. Variations of this command include:
ipv6 nd prefix <ipv6 prefix/prefix-length | default> ipv6 nd prefix <ipv6 prefix/prefix-length | default> no-advertise ipv6 nd prefix <ipv6 prefix/prefix-length | default> <valid lifetime | infinite> <preferred lifetime | infinite> ipv6 nd prefix <ipv6 prefix/prefix-length | default> no-advertise <valid lifetime | infinite> <preferred lifetime | infinite> ipv6 nd prefix <ipv6 prefix/prefix-length | default> <valid lifetime | infinite> <preferred lifetime | infinite> [no-advertise] [no-autoconfig] [no-rtr-address] [no-onlink] [off-link] ipv6 nd prefix <ipv6 prefix/prefix-length | default> no-advertise <valid lifetime | infinite> <preferred lifetime | infinite> [no-autoconfig] [no-rtr-address] [no-onlink] [off-link]
Syntax Description
<ipv6 prefix/prefix-length> Specifies the IPv6 prefix and length to be advertised. Pv6 prefixes should be expressed in colon hexadecimal format (X:X::X/<Z>). For example, 2001:DB8:3F::/64. The prefix length (<Z>) is an integer with a value between 0 and 128. Specifies the default values for the IPv6 prefix parameters. Refer to the Functional Notes below for more information. Optional. Specifies the valid lifetime to advertise for this route in each RA message. Range is 0 to 4294967295 seconds. Optional. Specifies the preferred lifetime to advertise for this route in each RA message. Range is 0 to 4294967295 seconds. Optional. Specifies that the the valid and preferred lifetimes of the prefix do not expire. Optional. Specifies that the prefix is excluded from the RA message. Optional. Sets the A flag in the RA message to 0, indicating that hosts may not create an address for this prefix using stateless address autoconfiguration (SLAAC). This parameter only affects hosts receiving the RA message, it does not affect the operation of the local router. Optional. Sets the R flag in the RA message to 0 and specifies the full router IPv6 address is not included in the RA message. Optional. Specifies that the IPv6 prefix in the RA message is not to be used for on-link determination. Optional. Sets the L flag value to 0 in RA messages, which indicates the RA makes no statement about the on-link or off-link properties of the IPv6 prefix.
60000CRG0-35B
1531
Default Values
By default, all prefixes derived from the interfaces configured IPv6 addresses are advertised using the system default values. By default, the valid lifetime advertised for a prefix is 2592000 seconds and the preferred lifetime advertised is 604800 seconds. By default, the L flag is set to 1, the R flag is set to 1, and the A flag is set to 1.
Command History
Release 18.1 Command was introduced.
Functional Notes
This command works for both routers and hosts, but in host implementations it is used to manually add on-link prefixes that do not have an IPv6 address or to make off-link a prefix generated by an IPv6 address command. Hosts do not send RA messages, so the command only adds prefixes to RA messages when the interface is in router mode. This command can also be used to change the defaults used on configured prefixes when all options are not specified.
Changing the prefix defaults will affect prefixes derived from configured IPv6 addresses, as well as prefixes configured using the ipv6 nd prefix command.
Prefixes advertised can be a subset or a superset of the prefixes derived from the IPv6 addresses configured on the interface. Prefixes for IPv6 addresses configured on a router interface are automatically eligible to be advertised on that interface using system or configured default values without having to enter a prefix command. To impose additional controls on those prefixes, an entry must be made using this command with the desired settings. The default parameter is used to change the default settings for the IPv6 prefix parameters. Changing these settings can be useful when multiple prefixes are implemented that will use the same set of parameters. When configuring IPv6 prefixes, the prefix default values are only used if no other parameters are specified after specifying the IPv6 prefix and length (for example, ipv6 nd prefix 2001:DB8::/64). If additional parameters are specified, any unspecified parameters use the system default values rather than the configured default values. When the default values are changed, any prefix that uses them will also change. Using this command to change prefix default values also affects prefixes derived from configured IPv6 addresses on the interface. The optional <valid lifetime> parameter specifies the valid lifetime to advertise for this route in each advertisement. Hosts will reset the lifetime to this value each time the route is advertised, and they will keep this prefix until the valid lifetime expires. The optional <preferred lifetime> parameter specifies the preferred lifetime to advertise for this route in each advertisement. Hosts will reset the lifetime to this value each time the route is advertised, and they will keep the prefix in the preferred state during this time period. After the preferred time period expires, the prefix transitions to the deprecated state where it remains until the valid lifetime expires and the route is removed. The <preferred lifetime> value must be set to be shorter than the <valid lifetime> value.
60000CRG0-35B
1532
The optional off-link parameter sets the L flag (on-link flag) value to 0 in RA messages. When the L flag is set to 0, the advertisement makes no statement about on-link or off-link properties of the prefix. When the L flag is set, the prefix is considered on-link and locally reachable by hosts on the link (meaning a router is not needed). Hosts attached to the link will add on-link prefixes to their prefix list or route table. When off-link is not specified, a connected route is added to the route table of this router for this prefix. When off-link is specified, no route is added to the route table. By default, prefixes are advertised as on-link with the L flag set to 1. The optional no-rtr-address parameter sets the R flag (router flag) of the RA to 0 and does not include the full router address in the advertisement. The router address is typically included in the RA to assist in Mobile IP environments. By default, the R flag is set to 1 and the router address is sent in RA messages. The optional no-autoconfig parameter sets the A flag of the RA to 0, indicating that hosts may not create an address for this prefix using SLAAC. If the A flag is set to 1 (the default setting), hosts perform SLAAC to generate an address based on the prefix. This parameter only affects hosts receiving the RA, it does not effect the operation of the local router. The optional no-advertise parameter specifies that the prefix is excluded from RA messages. By default, the prefix is included in RA messages. The no-onlink parameter informs the router that the prefix is not to be used for on-link determination. By default, all prefixes derived from the interfaces configured IPv6 addresses are advertised using the system default values.
Usage Examples
The following example specifies that the IPv6 prefix 2001:DB8:3F::/48 has an infinite valid and preferred lifetime advertised in RA messages sent from the interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 nd prefix 2001:DB8:3F::/48 infinite infinite The following example changes the default values and behaviors of prefixes included in RA messages to infinite valid and preferred lifetimes, and specifies that the on- or off-link state of the prefix is not included in the RA and that hosts receiving the RA may not use the prefix for creating an IPv6 address: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 nd prefix default infinite infinite off-link no-autoconfig
60000CRG0-35B
1533
Default Values
By default, idle (STALE) neighbor cache entries are cleared after 1440 minutes (24 hours).
Command History
Release 18.1 Command was introduced.
Functional Notes
This command applies to interfaces in either router or host mode. A neighbor entry is typically purged when neighbor unreachability detection (NUD) is invoked and the neighbor is determined to no longer be reachable. However, NUD is not performed on idle (STALE) neighbor entries, so this command provides a method for purging unused entries after a specified amount of time.
Usage Examples
The following example specifies that idle neighbor entries in the neighbor cache are removed after 800 minutes: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 nd purge-timer 800
60000CRG0-35B
1534
ipv6 nd ra interval
Use the ipv6 nd ra interval command to specify the interval between transmission of Internet Protocol version 6 (IPv6) router advertisement (RA) messages. This command is only effectual when the interface is in router mode. Use the no form of this command to return to the default value. Variations of this command include:
ipv6 nd ra interval <max time> ipv6 nd ra interval <max time> <min time> ipv6 nd ra interval msec <max time> ipv6 nd ra interval msec <max time> <min time>
Syntax Description
<max time> Specifies the maximum interval between RA message transmission. Time can be specified in seconds or milliseconds. Range is 4 to 1800 seconds and 70 to 1800000 ms. Optional. Specifies the minimum interval between RA message transmission. Time can be specified in seconds or milliseconds. Range is 3 seconds to 75 percent of the configured maximum time value in seconds, or 30 ms to 75 percent of the configured maximum time value in ms. Optional. Specifies that the time values are in milliseconds.
<min time>
msec
Default Values
By default, the interval is set in seconds and has a maximum interval time of 200 seconds and a minimum interval time of 75 percent of the maximum seconds value, but not less than 3 seconds.
Command History
Release 18.1 Command was introduced.
Functional Notes
If this router is used as a default router, the interval between RA messages should not be set to a larger value than the RA lifetime set by the command ipv6 nd ra lifetime <value> on page 1536, which has a default value of 1800 seconds.
Usage Examples
The following example specifies that the maximum interval in seconds between RA message transmissions is 300: (config)#interface eth 0/1 (config-eth 0/1)#ipv6 nd ra interval 300
60000CRG0-35B
1535
Default Values
By default, the router lifetime is set to 1800 seconds.
Command History
Release 18.1 Command was introduced.
Functional Notes
A value other than 0 for a router lifetime should be larger than the router advertisement interval specified in the command ipv6 nd ra interval on page 1535.
Usage Examples
In the following example, the router lifetime advertised in RA messages is 3000 seconds: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 nd ra lifetime 3000
60000CRG0-35B
1536
Default Values
By default, the router advertises a reachability time of 0 ms and uses an internal value of 30000 ms.
Command History
Release 18.1 Command was introduced.
Functional Notes
This command is effectual for interfaces in either router or host mode. For hosts, this value sets the internal reachable time used by the host if no RAs are received specifying a different value. For routers, the value indicates the amount of time a device is considered reachable after having received a reachability confirmation in neighbor unreachabililty detection (NUD).
Usage Examples
The following example specifies that a reachability time of 50000 ms is advertised in RA messages: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 nd ra reachable-time 50000
60000CRG0-35B
1537
ipv6 nd ra suppress
Use the ipv6 nd ra suppress command to specify whether Internet Protocol version 6 (IPv6) router advertisement (RA) messages will be suppressed. This command only applies to interfaces in router mode. Use the no form of this command to begin sending RA messages. Syntax Description
No subcommands.
Default Values
By default, RA messages are not suppressed. When IPv6 routing is not enabled on the router, or when implemented in a host-only mode, the default setting is to suppress advertisements on all interface types.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example suppresses RA messages on the interface: (config)#interface eth 0/1 (config-eth 0/1)#ipv6 nd ra suppress
60000CRG0-35B
1538
ipv6 nd router-preference
Use the ipv6 nd router-preference command to specify the default router preference value set in Internet Protocol version 6 (IPv6) router advertisement (RA) messages. Setting this preference helps the receivers of RA messages to determine the preference of one router over another as a default router in environments with multiple routers. Use the no form of this command to return the preference to the default setting. Variations of this command include:
ipv6 nd router-preference high ipv6 nd router-preference low ipv6 nd router-preference medium
Syntax Description
high low medium Specifies the preference value is high. Specifies the preference value is low. Specifies the preference value is medium.
Default Values
By default, the router preference is set to medium.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example specifies that the advertised default router preference is high: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 nd router-preference high
60000CRG0-35B
1539
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1540
lldp receive
Use the lldp receive command to allow Link Layer Discovery Protocol (LLDP) packets to be received on this interface. Use the no form of this command to prevent LLDP packets from being received on the interface. Syntax Description
No subcommands.
Default Values
By default, all interfaces are configured to send and receive LLDP packets.
Command History
Release 8.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Usage Examples
The following example configures Ethernet interface 0/1 to receive LLDP packets: (config)#interface ethernet 0/1 (config-eth 0/1)#lldp receive
60000CRG0-35B
1541
lldp send
Use the lldp send command to configure this interface to transmit Link Layer Discovery Protocol (LLDP) packets or to control the types of information contained in the LLDP packets transmitted by this interface. Use the no form of this command to prevent certain information from being transmitted by the interface. Variations of this command include:
lldp send 802.3-info mac-phy-config lldp send management-address lldp send med-info network-policy lldp send port-description lldp send system-capabilities lldp send system-description lldp send system-name lldp send-and-receive
Syntax Description
802.3-info mac-phy-config management-address med-info network-policy port-description system-capabilities system-description system-name and-receive Enables transmission of the capability and settings of the duplex and speed on this interface. Enables transmission of management address information on this interface. Enables transmission of LLDP-Media Endpoint Discovery (LLDP-MED) network policy information on the interface. Enables transmission of port description information on this interface. Enables transmission of this devices system capabilities on this interface. Enables transmission of this devices system description on this interface. Enables transmission of this devices system name on this interface. Configures this interface to both transmit and receive LLDP packets. This is the default setting.
Default Values
By default, all interfaces that support LLDP except routed Ethernet are configured to transmit and receive LLDP packets. LLDP is disabled by default on routed Ethernet interfaces.
The 802.3 MAC/PHY status configuration and LLDP-MED network policy time length values (TLVs) are only supported on switchport interfaces and NetVanta 1524ST Gigabit Ethernet interfaces. Command History
Release 8.1 Release 17.2 Release A4.01 Command was introduced. Command was expanded to include the 802.3 and LLDP-MED information. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
60000CRG0-35B
1542
Functional Notes
Individual LLDP information can be enabled or disabled using the various forms of the lldp send command. For example, use the lldp send-and-receive command to enable transmit and receive of all LLDP information. Then use the no lldp send port-description command to prevent LLDP from transmitting port description information.
Usage Examples
The following example configures Ethernet interface 0/1 to transmit LLDP packets containing all enabled information types: (config)#interface ethernet 0/1 (config-eth 0/1)#lldp send The following example configures Ethernet interface 0/1 to transmit and receive LLDP packets containing all enabled information types: (config)#interface ethernet 0/1 (config-eth 0/1)#lldp send-and-receive
60000CRG0-35B
1543
Default Values
A unique default MAC address is programmed in each unit shipped by ADTRAN.
Command History
Release 1.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Gigabit Ethernet interfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Usage Examples
The following example configures a MAC address of 00:0A:C8:5F:00:D2: (config)#interface ethernet 0/1 (config-eth 0/1)#mac-address 00:0A:C8:5F:00:D2
60000CRG0-35B
1544
max-reserved-bandwidth <value>
Use the max-reserved-bandwidth command to specify the percentage of interface bandwidth reserved for use in user-defined (priority or class-based) queues. The remainder of the interface bandwidth is reserved for system-critical traffic and is not available to user-defined queues. Use the no form of this command to restore the default value. Reserving a portion of the interface bandwidth for system-critical traffic is necessary for proper operation. Specifying the entire interface bandwidth for use in user-defined queues can cause undesirable operation. Syntax Description
<value> Specifies the maximum percentage of bandwidth to reserve for quality of service (QoS). This setting is configured as a percentage of the total interface speed. Range is 1 to 100 percent.
Default Values
By default, max-reserved-bandwidth is set to 75 percent, which reserves 25 percent of the interface bandwidth for system-critical traffic.
Command History
Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet subinterface.
Usage Examples
The following example specifies 85 percent of the bandwidth on the Ethernet interface 0/1 be available for use in user-defined queues: (config)#interface ethernet 0/1 (config-eth 0/1)#max-reserved-bandwidth 85
60000CRG0-35B
1545
media-gateway ip
Use the media-gateway ip command to associate an IP address source to use for Realtime Transport Protocol (RTP) traffic. When configuring Voice over Internet Protocol (VoIP), RTP traffic must have an IP address associated with it. However, some interfaces allow dynamic configuration of IP addresses, causing this value to change periodically. Use the no form of this command to disable this function. Variations of this command include:
media-gateway ip loopback <interface id> media-gateway ip primary media-gateway ip secondary <ip address>
Syntax Description
loopback <interface id> Specifies an IP address statically defined to a loopback interface for RTP traffic. This is helpful when using a single IP address across multiple wide area network (WAN) interfaces for RTP traffic. The valid range for loopback interface identifiers is 1 to 1024. The interface ID is used to uniquely identify a loopback interface. The entered value cannot be in use by another loopback interface. Specifies using this interfaces configured primary IP address for RTP traffic. Applies to static, Dynamic Host Configuration Protocol (DHCP), or negotiated addresses. Specifies using this interfaces statically defined secondary IP address for RTP traffic. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
primary
Default Values
By default, media-gateway ip is disabled.
Command History
Release 10.1 Release 17.3 Release A4.01 Command was introduced. Command was updated with the loopback interface identification option. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Usage Examples
The following example configures the unit to use the primary IP address for RTP traffic: (config)#interface ethernet 0/1 (config-eth 0/1)#media-gateway ip primary
60000CRG0-35B
1546
Default Values
By default, this command is not configured.
Command History
Release 17.5 Command was introduced.
Usage Examples
The following example enables the interface based on the specified track: (config)#interface gigabit-switchport 0/1 (config-giga-swx 0/1)#no shutdown track work-hours
60000CRG0-35B
1547
port-auth auth-mode
Use the port-auth auth-mode command to configure the authentication mode. Use the no form of this command to return to the default setting. Variations of this command include:
port-auth auth-mode mac-based port-auth auth-mode port-based
Syntax Description
mac-based port-based Specifies a medium access control (MAC)-based authentication mode. Each host must authenticate separately. Specifies a port-based authentication mode. Only a single host can participate in the authentication process.
Default Values
By default, the authentication mode is port based.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example configures the unit for MAC-based authentication mode: (config)#interface ethernet 0/1 (config-eth 0/1)#port-auth auth-mode mac-based
60000CRG0-35B
1548
port-auth control-direction
Use the port-auth control-direction command to configure the direction in which traffic is blocked. This command is only applicable when authentication is port based. Use the no form of this command to return to the default setting. Variations of this command include:
port-auth control-direction both port-auth control-direction in
Syntax Description
both in Blocks traffic in both directions when the port becomes unauthorized. Blocks only incoming traffic when the port becomes unauthorized.
Default Values
By default, traffic is blocked in both directions.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example causes traffic to be blocked in both directions when the port becomes unauthorized: (config)#interface ethernet 0/1 (config-eth 0/1)#port-auth control-direction both
60000CRG0-35B
1549
port-auth multiple-hosts
Use the port-auth multiple-hosts command to allow multiple hosts to access an authorized port without going through the authentication process. This command is only applicable when authentication is port based. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example enables multiple hosts to access an authorized port: (config)#interface ethernet 0/1 (config-eth 0/1)#port-auth multiple-hosts
60000CRG0-35B
1550
port-auth port-control
Use the port-auth port-control command to configure the port-authorization state. Use the no form of this command to return to the default setting. Variations of this command include:
port-auth port-control auto port-auth port-control force-authorized port-auth port-control force-unauthorized
Syntax Description
auto force-authorized force-unauthorized Enables the port-authentication process. Forces the port into an authorized state. Forces the port into an unauthorized state.
Default Values
By default, all ports are forced to an authorized state.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example forces Ethernet port 0/1 into an unauthorized state: (config)#interface ethernet 0/1 (config-eth 0/1)#port-auth port-control force-unauthorized
60000CRG0-35B
1551
power inline
Use the power inline command to detect attached powered devices (PDs) and deliver 48 VDC, compliant with the IEEE 802.3af Power over Ethernet (PoE) standard, to the PD via existing CAT 5 cabling. To disable power detection and supply, use the power inline never command. Variations of this command include:
power inline auto power inline legacy power inline never power inline 2-point
Syntax Description
auto legacy never 2-point Enables power detection and supply to PDs. Enables power detection and supply of legacy non-IEEE 802.3af-compliant PDs. Disables power detection and supply to PDs. Enables power detection and supply using the 2-point detection method necessary for some PDs.
Default Values
By default, PWR switches discover and provide power to IEEE-compliant PDs.
Command History
Release 9.1 Release A4.01 Command was introduced. Command was expanded to include the 2-point parameter.
Usage Examples
The following example configures the Ethernet interface to detect and supply power to PDs: (config)#interface ethernet 0/3 (config-eth 0/3)#power inline auto
60000CRG0-35B
1552
qos
Use the qos (quality of service) command to set the interface to the trusted state and to set the default cost of service (CoS) value. To return to defaults, use the no form of this command. Variations of this command include:
qos default-cos <value> qos trust cos
Syntax Description
default-cos <value> trust cos Sets the default CoS value for untrusted ports and all untagged packets. Range is 0 through 7. Sets the interface to the trusted state.
Default Values
By default, the interface is untrusted with a default CoS of 0.
Command History
Release 5.1 Command was introduced.
Functional Notes
Set the interface to trust cos if received 802.1P. CoS values are considered valid (i.e., no need to reclassify) and do not need to be tagged with the default value. When set to untrusted, the default-cos value for the interface is used.
Usage Examples
The following example sets Ethernet interface 0/1 as a trusted interface and assigns untagged packets a CoS value of 1: (config)#interface ethernet 0/1 (config-eth 0/1)#qos trust cos (config-eth 0/1)#qos default-cos 1
60000CRG0-35B
1553
qos-policy
Use the qos-policy command to apply a previously configured quality of service (QoS) map to incoming or outgoing packets on an interface. Use the no form of this command to remove the map from the interface. Variations of this command include:
qos-policy in <name> qos-policy out <name>
Syntax Description
<name> in out Specifies the name of a previously created QoS map (refer to qos map <name> <number> on page 1184 for more information). Assigns a QoS map to this interface's input. Assigns a QoS map to this interface's output.
Default Values
No default values are necessary for this command.
Command History
Release 9.1 Release 15.1 Release A4.01 Command was introduced. Command was expanded to include the in parameter. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
When a QoS policy is applied to an interface, it may be disabled if the interface bandwidth is not adequate to support the requested bandwidth on the map set. Once the bandwidth problem is resolved, the map will work again. The bandwidth will be rechecked on any of the following changes: 1. A priority or class-based entry is added to, deleted from, or changed in a QoS map set. 2. The interface bandwidth is changed by the bandwidth command on the interface. 3. A QoS policy is applied to an interface. 4. A cross connect is created that includes an interface with a QoS policy. 5. The interface queuing method is changed to fair queue to use weighted fair queuing. 6. The interface operational status changes. 7. The interface bandwidth changes for other reasons (e.g., when asymmetric digital subscriber line (ADSL) finishes training).
60000CRG0-35B
1554
In order to prevent the map from being disabled in cases of temporary inadequate bandwidth (e.g., a single link goes down in a dual T1 multilink configuration where the map requests more than one T1's worth of bandwidth), the QoS map uses the maximum theoretical bandwidth on an interface, not the actual bandwidth at that time. This actually helps QoS keep higher priority class-based traffic working better than best-effort traffic when the bandwidth drops.
Usage Examples
The following example applies the QoS map VOICEMAP to the Ethernet interface: (config)#interface ethernet 0/1 (config-eth 0/1)#qos-policy out VOICEMAP
60000CRG0-35B
1555
rtp quality-monitoring
Use the rtp quality-monitoring command to enable voice quality monitoring (VQM) of the Realtime Transport Protocol (RTP) voice stream packets on this interface. If the global command (ip rtp quality-monitoring) is disabled when this command is issued, the system will return the following warning: Applied but not used, you must globally enable ip rtp quality-monitoring to use VQM. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, VQM is enabled on all wide area network (WAN) and local area network (LAN) interfaces.
Command History
Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Usage Examples
The following example enables RTP quality monitoring on the Ethernet 0/2 interface: (config)#interface eth 0/2 (config-eth 0/2)#rtp quality-monitoring
60000CRG0-35B
1556
snmp trap
Use the snmp trap command to enable all supported Simple Network Management Protocol (SNMP) traps on the interface. Us the no form of this command to disable this trap. Syntax Description
No subcommands.
Default Values
By default, all interfaces (except virtual Frame Relay interfaces and subinterfaces) have SNMP traps enabled.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 8.1 Release 16.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the port channel and virtual local area network (VLAN) interfaces. Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the tunnel interface. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Usage Examples
The following example enables SNMP capability on the Ethernet interface: (config)#interface ethernet 0/1 (config-eth 0/1)#snmp trap
60000CRG0-35B
1557
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the interface: (config)#interface ethernet 0/1 (config-eth 0/1)#no snmp trap link-status
60000CRG0-35B
1558
spanning-tree bpdufilter
Use the spanning-tree bpdufilter command to enable or disable the bridge protocol data unit (BPDU) filter on a specific interface. This setting overrides the related global setting (refer to spanning-tree edgeport bpdufilter default on page 1228). Use the no form of this command to return to the default setting. Variations of this command include:
spanning-tree bpdufilter disable spanning-tree bpdufilter enable
Syntax Description
disable enable Disables BPDU filter for this interface. Enables BPDU filter for this interface.
Default Values
By default, this setting is disabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
The bpdufilter blocks any BPDUs from being transmitted and received on an interface.
Usage Examples
The following example enables the BPDU filter on the Ethernet interface 0/3: (config)#interface ethernet 0/3 (config-eth 0/3)#spanning-tree bpdufilter enable The BPDU filter can be disabled on the Ethernet interface 0/3 by issuing the following commands: (config)#interface ethernet 0/3 (config-eth 0/3)#spanning-tree bpdufilter disable
60000CRG0-35B
1559
spanning-tree bpduguard
Use the spanning-tree bpduguard command to enable or disable the bridge protocol data unit (BPDU) guard on a specific interface. This setting overrides the related global setting (refer to spanning-tree forward-time <value> on page 1231). Use the no form of this command to return to the default setting. Variations of this command include:
spanning-tree bpduguard disable spanning-tree bpduguard enable
Syntax Description
disable enable Disables BPDU guard for this interface. Enables BPDU guard for this interface.
Default Values
By default, this setting is disabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
The bpduguard blocks any BPDUs from being received on an interface.
Usage Examples
The following example enables the BPDU guard on the interface Ethernet interface 0/3: (config)#interface ethernet 0/3 (config-eth 0/3)#spanning-tree bpduguard enable The BPDU guard can be disabled on the Ethernet interface 0/3 by issuing the following commands: (config)#interface ethernet 0/3 (config-eth 0/3)#spanning-tree bpduguard disable
60000CRG0-35B
1560
Default Values
By default, the cost value is set to 1000 Mbps.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example sets the interface to a path cost of 1200: (config)#interface ethernet 0/3 (config-eth 0/3)#spanning-tree cost 1200
60000CRG0-35B
1561
spanning-tree edgeport
Use the spanning-tree edgeport command to configure the interface to be an edgeport. This command overrides the related global setting (refer to spanning-tree edgeport default on page 1230). Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, this setting is disabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
Enabling this command configures the interface to go to a forwarding state when the link becomes active. When not enabled, an interface must go through the listening and learning states before going to the forwarding state.
Usage Examples
The following example configures the interface to be an edgeport: (config)#interface ethernet 0/1 (config-eth 0/1)#spanning-tree edgeport An individual interface can be configured to not be considered an edgeport. For example: (config)#interface ethernet 0/1 (config-eth 0/1)#no spanning-tree edgeport
60000CRG0-35B
1562
spanning-tree link-type
Use the spanning-tree link-type command to configure the spanning tree protocol link type for each interface. Use the no form of this command to return to the default setting. Variations of this command include:
spanning-tree link-type auto spanning-tree link-type point-to-point spanning-tree link-type shared
Syntax Description
auto point-to-point shared Determines link type by the ports duplex settings. Manually sets link type to point-to-point regardless of duplex settings. Manually sets link type to shared regardless of duplex settings.
Default Values
By default, the interface is set to auto.
Command History
Release 5.1 Command was introduced.
Functional Notes
This command overrides the default link type setting determined by the duplex of the individual port. By default, a port configured for half-duplex is set to shared link type, and a port configured for full-duplex is set to point-to-point link type. Setting the link type manually overrides the default and forces the port to use the specified link type. Use the link-type auto command to restore the convention of determining link type based on duplex settings.
Usage Examples
The following example forces the link type to point-to-point, even if the port is configured to be half-duplex: (config)#interface ethernet 0/3 (config-eth 0/3)#spanning-tree link-type point-to-point
Technology Review
Rapid transitions are possible in Rapid Spanning Tree Protocol (RSTP) by taking advantage of point-to-point links (a port is connected to exactly one other bridge) and edge-port connections (a port is not connected to any additional bridges). Setting the link type to auto allows the spanning tree to automatically configure the link type based on the duplex of the link. Setting the link type to point-to-point allows a half-duplex link to act as if it were a point-to-point link.
60000CRG0-35B
1563
Syntax Description
long short Specifies 32-bit values when calculating pathcosts. Specifies 16-bit values when calculating pathcosts.
Default Values
By default, spanning-tree pathcost method is set to short.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example specifies that the spanning tree protocol use a long pathcost method: (config)#interface ethernet 0/3 (config-eth 0/3)#spanning-tree pathcost method long
60000CRG0-35B
1564
Default Values
By default, this set to 128.
Command History
Release 5.1 Command was introduced.
Functional Notes
The only time that this priority level is used is when two interfaces with a path to the root have equal cost. At that point, the level set in this command will determine which port the spanning tree will use. Set the priority value lower to increase the chance the interface will be used.
Usage Examples
The following example sets the interface to a priority of 100: (config)#interface ethernet 0/3 (config-eth 0/3)#spanning-tree port-priority 100
60000CRG0-35B
1565
speed
Use the speed command to configure the speed of an Ethernet interface. Use the no form of this command to return to the default value. Variations of this command include:
speed 10 speed 100 speed 1000 speed 1000 nonegotiate speed 2500 speed auto
Syntax Description
10 100 1000 2500 nonegotiate auto Specifies 10 Mbps Ethernet. Specifies 100 Mbps Ethernet. Specifies 1 Gbps Ethernet. This only applies to Gigabit Ethernet interfaces. Specifies 2.5 Gbps Ethernet. This only applies to Gigabit Ethernet interfaces. Optional. Specifies that auto-negotiation is disabled on Gigabit Ethernet interfaces that use a fiber medium. Automatically detects 10 or 100 Mbps Ethernet and negotiates the duplex setting.
Some Ethernet equipment (though rare) is unable to negotiate duplex if speed is manually determined. To avoid incompatibilities, manually set the duplex if the speed is manually set. Refer to ethernet-cfm mep on page 1473 and half-duplex on page 1475.
Default Values
By default, speed is set to auto.
Command History
Release 1.1 Release 17.5 Command was introduced. Command was expanded to include the 2500 Mbps parameter.
Usage Examples
The following example configures the Ethernet port for 100 Mbps operation: (config)#interface ethernet 0/1 (config-eth 0/1)#speed 100
60000CRG0-35B
1566
storm-control
Use the storm-control command to configure limits on the rates of broadcast, multicast, and unicast traffic on a port. Use the no form of this command to disable this feature. Variations of this command include:
storm-control broadcast level <rising level> storm-control broadcast level <rising level> <falling level> storm-control multicast level <rising level> storm-control multicast level <rising level> <falling level> storm-control unicast level <rising level> storm-control unicast level <rising level> <falling level>
Syntax Description
broadcast level multicast level unicast level <rising level> Sets levels for broadcast traffic. Sets levels for multicast traffic. Sets levels for unicast traffic. Specifies a rising level, which determines the percentage of total bandwidth the port accepts before it begins blocking packets. Range is 1 to 100 percent. Optional. Specifies a falling level, which determines when the storm is considered over, causing AOS to no longer block packets. This level must be less than the rising level. Range is 1 to 100 percent.
<falling level>
Default Values
By default, storm-control is disabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
This setting configures the rising and falling suppression values. When the selected rising level (which is a percentage of total bandwidth) is reached, the port begins blocking packets of the specified type (i.e., broadcast, multicast, or unicast). AOS uses the rising level as its falling level if no falling level is specified.
Usage Examples
The following example sets the rising suppression level to 85 percent for multicast packets: (config)#interface ethernet 0/1 (config-eth 0/1)#storm-control multicast level 85
60000CRG0-35B
1567
The following example sets the rising suppression level to 80 percent for broadcast packets, with a falling level of 50 percent: (config)#interface ethernet 0/1 (config-eth 0/1)#storm-control broadcast level 80 50
60000CRG0-35B
1568
Default Values
By default, this command is disabled; the interface will only filter traffic.
Command History
Release 5.1 Command was introduced.
Functional Notes
Enabling this option shuts down the interface if a multicast, unicast, or broadcast storm occurs.
Usage Examples
The following example shuts down Ethernet interface 0/1 if a storm is detected: (config)#interface ethernet 0/1 (config-eth 0/1)#storm-control action shutdown
60000CRG0-35B
1569
Default Values
By default, this is set to VLAN 1 (the default VLAN).
Command History
Release 5.1 Command was introduced.
Functional Notes
If the port is in the trunk mode, this command will not alter the switchport mode to access. Instead it will save the value to be applied when the port does switch to access mode. Refer to switchport mode on page 1572 for more information.
Usage Examples
The following example sets the switchport mode to static access and makes the Ethernet interface 0/1 port a member of VLAN 2: (config)#interface ethernet 0/1 (config-eth 0/1)#switchport mode access (config-eth 0/1)#switchport access vlan 2
60000CRG0-35B
1570
switchport gvrp
Use the switchport gvrp command to enable or disable GARP VLAN Registration Protocol (GVRP) on an interface. Use the no form of this command to return to the default value. Syntax Description
No subcommands.
Default Values
By default, GVRP is disabled on all ports.
Command History
Release 8.1 Command was introduced.
Functional Notes
Enabling GVRP on any interface enables GVRP globally.
Usage Examples
The following example enables GVRP on Ethernet interface 0/24: (config)#interface ethernet 0/24 (config-eth 0/24)#switchport gvrp
60000CRG0-35B
1571
switchport mode
Use the switchport mode command to configure the virtual local area network (VLAN) membership mode. To reset membership mode to the default value, use the no form of this command. The stack selection does not apply to the NetVanta 300 Series units. Variations of this command include:
switchport mode access switchport mode stack switchport mode trunk
Syntax Description
access stack trunk Sets port to be a single (nontrunked) port that transmits and receives no tagged packets. Sets the port to allow it to communicate with a switch stack. (Does not apply to the NetVanta 300 Series units.) Sets port to transmit and receive packets on all VLANs included within its VLAN allowed list.
Default Values
By default, switchport mode is set to access.
Command History
Release 5.1 Command was introduced.
Functional Notes
Configuring the interface for stack mode (using the switchport mode stack command) enables the switch to communicate with other switches that it is stacking capable. f the switch is configured as the stack master (using the (config)#stack master command), it will begin advertising itself as a stack master. f the switch is configured as the stack member (using the (config)#stack member command), it will begin advertising other stack masters that it knows about.
Stack mode also allows the port to transmit and receive packets on all VLANs that are included in the VLAN allowed list.
Usage Examples
The following example sets the port to be a trunk port: (config)#interface ethernet 0/1 (config-eth 0/1)#switchport mode trunk
60000CRG0-35B
1572
switchport port-security
Use the switchport port-security command to enable port security functionality on the interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
This command is disabled by default.
Command History
Release 8.1 Command was introduced.
Functional Notes
You cannot enable port security on a port that is already configured as the following: Monitor session destination Member of a port channel interface Dynamic or trunk port (i.e., the port must be configured as static access)
Usage Examples
The following example enables port security on the Ethernet interface 0/1 interface: (config)#interface ethernet 0/1 (config-eth 0/1)#switchport port-security
60000CRG0-35B
1573
Syntax Description
static time <value> Configures the interface to age static, as well as dynamic entries in the secure MAC address table. Enables port security aging for dynamic entries in the secure MAC address table by configuring a time (in minutes). Disable aging by setting the time to 0. Configures the address to be removed after the specified time regardless of activity.
type absolute
Default Values
By default, dynamic and static aging are disabled.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example sets the aging time of secure MAC addresses to 10 minutes: (config)#interface ethernet 0/1 (config-eth 0/1)#switchport port-security aging time 10
60000CRG0-35B
1574
Syntax Description
time <value> type absolute Enables port expiration by configuring a time (in minutes). Disable by setting time to 0. Configures the interface to shut down after the specified time regardless of activity.
Default Values
By default, this command is disabled and set to type absolute.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example disables Ethernet interface 0/1 after 10 minutes: (config)#interface ethernet 0/1 (config-eth 0/1)#switchport port-security expire time 10
60000CRG0-35B
1575
Syntax Description
sticky sticky-volatile Optional. Enables sticky address learning if no MAC address is specified. The learned addresses persist across a reboot. Optional. Enables sticky address learning for the immediate session only. The learned addresses do not appear in the configuration and do not persist across a reboot. Optional. Adds a MAC address associated with this interface. MAC addresses should be expressed in the following format xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01). Optional. Associates the MAC address with the specified VLAN. VLAN ID range is 1 to 4094.
<mac address>
Default Values
By default, sticky learning is disabled and there are no configured MAC addresses.
Command History
Release 8.1 Release 17.4 Release 17.9 Command was introduced. Command was expanded to include the sticky-volatile parameter. Command was expanded to include the vlan parameter.
Functional Notes
For more information about port security configuration, refer to the configuration guide Configuring Port Access Control in AOS, available online at http://kb.adtran.com.
60000CRG0-35B
1576
Usage Examples
The following example adds a single static address and enables sticky address learning on interface Ethernet interface 0/1: (config)#interface ethernet 0/1 (config-eth 0/1)#switchport port-security mac-address 00:A0:C8:02:D0:30 (config-eth 0/1)#switchport port-security mac-address sticky
60000CRG0-35B
1577
Default Values
The default value for this command is 1.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example sets the maximum supported MAC addresses for Ethernet interface 0/1 to 2: (config)#interface ethernet 0/1 (config-eth 0/1)#switchport port-security maximum 2
60000CRG0-35B
1578
Syntax Description
protect Determines that the unit will not learn any new secure addresses (nor allow these new sources to pass traffic) until the number of currently active secure addresses drops below the maximum setting. Determines that the security violation counter increments and an Simple Network Management Protocol (SNMP) trap is sent once a violation is detected. The new address is not learned and data from that address is not allowed to pass. Determines that the interface is disabled once a violation is detected. A no shutdown command is required to re-enable the interface.
restrict
shutdown
Default Values
The default for this command is shutdown.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example configures the interface to react to security violations by not learning the addresses and not accepting data from the violation source: (config)#interface ethernet 0/1 (config-eth 0/1)#switchport port-security violation restrict
60000CRG0-35B
1579
switchport protected
Use the switchport protected command to prevent the port from transmitting traffic to all other protected ports. A protected port can only send traffic to unprotected ports. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
This command is disabled by default.
Command History
Release 10.1 Command was introduced.
Usage Examples
In the example below, all three of the ports are on virtual local area network (VLAN) 3, and Ethernet 0/1 and Ethernet 0/2 are designated as protected ports. Ethernet 0/3 is unprotected. Ethernet 0/1 and Ethernet 0/2 will be allowed to send traffic to Ethernet 0/3, but traffic traveling between Ethernet 0/1 and Ethernet 0/2 will be blocked. (config)#interface ethernet 0/1 (config-eth 0/1)#switchport access vlan 3 (config-eth 0/1)#switchport protected (config-eth 0/1)#exit (config)#interface ethernet 0/2 (config-eth 0/2)#switchport access vlan 3 (config-eth 0/2)#switchport protected (config-eth 0/2)#exit (config)#interface ethernet 0/3 (config-eth 0/3)#switchport access vlan 3
60000CRG0-35B
1580
Syntax Description
<list> add all except none remove Specifies a list of valid VLAN interface IDs. Refer to Functional Notes below. Adds the specified VLAN IDs to the VLAN trunking allowed list. Adds all configured VLAN IDs to the VLAN trunking allowed list. Adds all configured VLAN IDs to the VLAN trunking allowed list except those specified in the <vlan id list>. Adds no VLAN IDs to the VLAN trunking allowed list. Removes VLAN IDs from the VLAN trunking allowed list.
Default Values
By default, all valid VLANs are allowed.
Command History
Release 5.1 Command was introduced.
Functional Notes
A VLAN list is a set of VLAN IDs delimited by commas. A valid VLAN ID value must be from 1 through 4094. A range of IDs may be expressed as a single element by using a hyphen between endpoints. For example, the VLAN ID range 1,2,3,4,6,7,8,9,500 may be more easily expressed as 1-4,6-9,500. No spaces are allowed in a valid ID range.
Usage Examples
The following example adds VLANs to the previously existing list of VLANs allowed to transmit and receive on this port: (config)#interface ethernet 0/1 (config-eth 0/1)#switchport trunk allowed vlan add 1-4,6-9,500
60000CRG0-35B
1581
Syntax Description
<list> add all except none remove Specifies a list of valid VLAN interface IDs. Refer to Functional Notes below. Adds VLANs to the VLAN GVRP trunking fixed list. Adds all VLANs to the VLAN GVRP trunking fixed list. Adds all VLAN IDs to the VLAN trunking fixed list except those in the command line VLAN ID list. Removes all VLANs from the VLAN GVRP trunking fixed list. Removes VLAN from the VLAN trunking fixed list.
Default Values
By default, no VLANs are in the VLAN GVRP trunking fixed list (switchport trunk fixed vlan none). A VLAN list is a set of VLAN IDs delimited by commas. A valid VLAN ID value must be from 1 through 4094. A range of IDs may be expressed as a single element by using a hyphen between endpoints. For example, the VLAN ID range 1,2,3,4,6,7,8,9,500 may be more easily expressed as 1-4,6-9,500. No spaces are allowed in a valid ID range.
Command History
Release 8.1 Command was introduced.
Functional Notes
This command has no effect on VLAN membership configuration unless GVRP is enabled on the interface.
Usage Examples
The following example changes the configured list of fixed VLANs by adding VLAN 50 to the list. (config-eth 0/20)#switchport trunk fixed vlan add 1-15,25-30,40 (config-eth 0/20)#switchport trunk fixed vlan add 50
60000CRG0-35B
1582
The following example changes the configured list of fixed VLANs by removing VLANs 10 to 100 from the list: (config-eth 0/20)#switchport trunk fixed vlan remove 10-100 The following example changes the configured list of fixed VLANs to include only VLANs 1 to 1000: (config-eth 0/20)#switchport trunk fixed vlan 1-1000 The following example changes the configured list of fixed VLANs to include no VLANs (except those VLANs that are native): (config-eth 0/20)#switchport trunk fixed vlan none
60000CRG0-35B
1583
Default Values
By default, this is set to VLAN 1.
Command History
Release 5.1 Command was introduced.
Functional Notes
Configure which VLAN the interface uses as its native VLAN during trunking. Packets from this VLAN leaving the interface will not be tagged with the VLAN number. Any untagged packets received by the interface are considered a part of the native VLAN ID.
Usage Examples
The following example sets the native VLAN on Ethernet interface 0/1 to VLAN 2: (config)#interface ethernet 0/1 (config-eth 0/1)#switchport trunk native vlan 2
60000CRG0-35B
1584
switchport vlan
Use the switchport vlan command to create a Link Layer Discovery Protocol-Media Endpoint Discovery (LLDP-MED) network policy that specifies a virtual local area network (VLAN) for voice, guest-voice, softphone, or voice-signalling applications. Use the optional cos and dscp keywords to define class of service (CoS) and differentiated services code point (DSCP) values associated with the application. Use the no form of this command to remove an existing network policy. Variations of this command include:
switchport guest-voice vlan <vlan id> switchport guest-voice vlan <vlan id> [cos <value> | dscp <value> | cos <value> dscp <value>] switchport softphone vlan <vlan id> switchport softphone vlan <vlan id> [cos <value> | dscp <value> | cos <value> dscp <value>] switchport voice vlan <vlan id> switchport voice vlan <vlan id> [cos <value> | dscp <value> | cos <value> dscp <value>] switchport voice-signalling vlan <vlan id> switchport voice-signalling vlan <vlan id> [cos <value> | dscp <value> | cos <value> dscp <value>]
Syntax Description
guest-voice softphone Specifies a guest voice application, which is used to define a policy for guest users with a limited feature set voice service. Specifies a softphone application, which is used to define a policy for softphone applications that operate on devices, such as PCs or laptop computers. Specifies a voice application, which is used to define a policy for dedicated IP phone handsets and other similar devices supporting interactive voice services. Specifies a voice signaling application, which is used to define a policy for the command and control signaling that supports voice and guest voice applications. Specifies the voice VLAN ID. Range is 1 to 4094. Optional. Specifies the CoS value assigned to the application. Range is 0 to 7. Optional. Specifies the DSCP value assigned to the application. Range is 0 to 63.
voice
voice-signalling
Default Values
By default, no LLDP-MED network policies are configured. If an application and VLAN are specified without the optional CoS or DSCP parameters, then default CoS and DSCP values are assigned. Default CoS values are: voice (5); voice-signalling (3); guest-voice (0); softphone (0). Default DSCP values are: voice (46); voice-signalling (26); guest-voice (0); softphone (0).
60000CRG0-35B
1585
Command History
Release 16.1 Release 17.2 The command switchport voice vlan <vlan id> was introduced. Command was expanded to include the additional applications: guest-voice, softphone, and voice-signalling. The optional cos and dscp parameters were added.
Functional Notes
The switchport command allows a configured interface to function as an access point (AP) for a VLAN while adding the specified VLAN to the ports allowed VLAN list. This command automatically sets the port to spanning tree edgeport mode, but this mode is not automatically reset when the voice, guest voice, softphone, or signaling VLAN is removed.
If the VLAN specified in this command does not yet exist, it will be created in ADTRAN Operating System (AOS) when the command is issued.
A network policy is typically configured on switchport interfaces in AOS devices that support LLDP-MED. An exception is the NetVanta 1524ST, where network policies are configured on Gigabit Ethernet interfaces. At least one network policy should be configured on a switchport interface that is connected to an LLDP-MED capable endpoint. Depending on the type and use of Voice over Internet Protocol (VoIP) equipment attached to the switchport interface, multiple network policies may need to be configured on the same interface. Some endpoints prefer to use untagged VLANs for their application. To achieve this in AOS, configure the application to be on the same VLAN of which the port is a member. By default, this is VLAN 1.
For more information about allowed VLAN lists, refer to switchport trunk allowed vlan on page 1581. For more information about spanning-tree edgeport mode, refer to spanning-tree edgeport on page 1562. For more information about switchport mode, refer to switchport mode on page 1572. Usage Examples
The following example establishes a voice network policy that uses VLAN 200. (config)#interface switchport 0/1 (config-swx 0/1)#switchport voice vlan 200
Since CoS and DSCP values are not specified in the above network policy, the default values for voice applications will be used: CoS (5); DSCP (46).
60000CRG0-35B
1586
The following example establishes a voice network policy that uses VLAN 200 with CoS priority set to 4 and DSCP priority set to 36. (config)#interface switchport 0/1 (config-swx 0/1)#switchport voice vlan 200 cos 4 dscp 36
60000CRG0-35B
1587
Syntax Description
<value> <burst> Specifies the rate (in bits per second) at which the interface should be shaped. Optional. Specifies the allowed burst in bytes. By default, the burst is specified as the rate divided by 5 and represents the number of bytes that would flow within 200 ms.
Default Values
By default, traffic-shaping rate is disabled.
Command History
Release 10.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
Traffic shaping can be used to limit an Ethernet segment to a particular rate or to specify use of quality of service (QoS) on Ethernet or VLAN interfaces.
Usage Examples
The following example sets the outbound rate of Ethernet interface 0/1 to 128 kbps and applies a QoS policy that gives all Realtime Transport Protocol (RTP) traffic priority over all other traffic: (config)#qos map voip 1 (config-qos-map)#match ip rtp 10000 10500 all (config-qos-map)#priority unlimited (config-qos-map)#interface ethernet 0/1 (config-eth 0/1)#traffic-shape rate 128000 (config-eth 0/1)#qos-policy out voip
60000CRG0-35B
1588
Syntax Description
<vlan id> native Specifies a valid VLAN interface ID number. Range is 1 to 4095. Optional. Specifies that data for that VLAN ID goes out untagged. If native is not specified, data for that VLAN ID goes out tagged.
Default Values
By default, no VLAN ID is set.
Command History
Release 6.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet subinterface.
Usage Examples
The following example configures a native VLAN of 5 for the Ethernet interface 0/1: (config)#interface ethernet 0/1 (config-eth 0/1)#vlan-id 5 native
60000CRG0-35B
1589
Keep in mind that changing an interfaces VRF association will clear all IP-related settings on that interface. Syntax Description
<name> Specifies the name of the VRF to which to assign the interface.
Default Values
By default, interfaces are associated with the default VRF that is unnumbered.
Command History
Release 16.1 Release 17.8 Command was introduced. The keyword ip was removed from this command.
Functional Notes
VRF instances must be created first before an interface can be assigned. An interface can only be assigned to one VRF, but multiple interfaces can be assigned to the same VRF. An interface will only forward IP traffic that matches its associated VRF. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured.
Usage Examples
The following example assigns the Ethernet interface 0/1 to the VRF instance named RED: (config)#interface ethernet 0/1 (config-eth 0/1)#vrf forwarding RED
60000CRG0-35B
1590
vrrp <number>
Use the vrrp command to configure Virtual Router Redundancy Protocol (VRRP) routers within a router group. Use the no form of this command to remove the VRRP routers configurations. Variations of this command include:
vrrp <number> description <text> vrrp <number> ip <address> vrrp <number> ip <address> secondary vrrp <number> preempt vrrp <number> preempt delay minimum <time> vrrp <number> priority <level> vrrp <number> shutdown vrrp <number> startup-delay <delay> vrrp <number> timers advertise <interval> vrrp <number> timers learn vrrp <number> track <name> vrrp <number> track <name> decrement <value>
Syntax Description
<number> description <text> ip <address> secondary preempt delay minimum <time> priority <level> shutdown startup-delay <delay> timers advertise <interval> learn track <name> Specifies the VRRP router groups virtual router ID (VRID) number. Range is 1 to 255. Specifies the textual description of the VRRP router within the group. Specifies the IP address to be used by the VRRP router. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the entry of an additional VRRP router supported IP address. Allows a VRRP router to preempt the current master router if its priority level is higher than the current masters. Optional. Specifies a delay (in seconds) before the specified router will attempt to preempt the current master router. Range is 0 to 255 seconds. Specifies the configured priority level of the VRRP router. Level range is 1 to 254. Disables the VRRP router. Specifies a time delay (in seconds) before a VRRP router becomes active. Range is 0 to 255 seconds. Specifies the configuration of the VRRP timers. Specifies the time (in seconds) between advertisements sent by the master router. Range is 1 to 255 seconds. Specifies that the backup VRRP router learns the advertisement interval of the master router. Specifies a change in priority level of the VRRP router based upon the specified track.
60000CRG0-35B
1591
Ethernet Interface Command Set Optional. Specifies the numerical amount to decrement the VRRPs priority level if the track transitions to a FAIL state. Decrement value range is 1 to 254.
Default Values
By default, VRRP is enabled. By default, a VRRP router will preempt with no additional delay. The default configured priority for a VRRP router that is either a backup router or not the IP address owner is 100. The default actual priority of a VRRP router that is the IP address owner is 255. By default, startup-delay is enabled with a default value of 35 seconds. By default, the advertisement interval is 1 second. By default, the default decrement value is 10.
Command History
Release 16.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet subinterface.
Functional Notes
A VRRP router may be part of more than one virtual router group. Although VRRP group VRIDs can be numbered between 1 and 255, only two VRRP routers per interface are supported. It is recommended that the timers advertise setting is kept at the default value. If it is necessary to change this setting, ensure that all VRRP routers are configured with the new value, as all VRRP routers in the virtual group must have the same advertisement interval value. It is also recommended that if the timers learn function is enabled on one router in a virtual router group, then the timers learn function should be enabled on all routers in the group. When the virtual routers specified IP address is independent of the IP addresses assigned to real interfaces on the VRRP routers, there is no IP address owner. This addressing method is preferred if object tracking will be used to monitor the network connection. The IP address used for the virtual router must be on the same subnet as either the primary or secondary IP addresses assigned to the VRRP routers real interface. A track must be created before the vrrp track command can be issued. Refer to the Network Monitor Track Command Set on page 2629 for more information on creating tracks. If a VRRP router owns the virtual router IP address, then the VRRP routers priority level cannot be decremented as a result of the track command. If object tracking will be used, it is important that no VRRP router own the virtual router IP address.
Usage Examples
The following example describes a VRRP router within virtual router group 1 as the Default Master Router:
60000CRG0-35B
1592
(config)#interface eth 0/1 (config-eth 0/1)#vrrp 1 description Default Master Router The following example specifies an IP address of 10.0.0.1 for a VRRP router within virtual router group 1: (config)#interface eth 0/1 (config-eth 0/1)#vrrp 1 ip 10.0.0.1 The following example specifies that the VRRP router within virtual router group 1 preempts the current master router after a 30 second delay: (config)#interface eth 0/1 (config-eth 0/1)#vrrp 1 preempt delay minimum 30 The following example specifies the configured priority for the VRRP router within virtual router group 1 is 254: (config)#interface eth 0/1 (config-eth 0/1)#vrrp 1 priority 254 The following example disables the VRRP router within virtual router group 1: (config)#interface eth 0/1 (config-eth 0/1)#vrrp 1 shutdown The following example configures a VRRP router on group 1 to delay 45 seconds before becoming active: (config)#interface eth 0/1 (config-eth 0/1)#vrrp 1 startup-delay 45
60000CRG0-35B
1593
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. ip address <ip address> <subnet mask> on page 1595 ip learn-address on page 1596 ip mtu <size> on page 1597 peer default ip address <ip address> on page 1599
60000CRG0-35B
1594
Default Values
By default, there are no assigned IP addresses.
Command History
Release 7.1 Command was introduced for the facility data link (FDL) interface.
Usage Examples
The following example configures an IP address of 192.22.72.101 /30: (config)#interface fdl 1/1 (config-fdl 1/1)#ip address 192.22.72.101 /30
60000CRG0-35B
1595
ip learn-address
Use the ip learn-address command to automatically learn the IP address of the remote unit. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example enables the facility data link (FDL) to automatically learn the remote units IP address: (config)#interface fdl 1/1 (config-fdl 1/1)#ip learn-address
60000CRG0-35B
1596
ip mtu <size>
Use the ip mtu command to configure the maximum transmission unit (MTU) size for the active interface. Use the no form of this command to return to the default value. Syntax Description
<size> Configures the window size for transmitted packets. The valid ranges for the various interfaces are listed below: ATM subinterfaces 64 to 1520 BVIs 64 to 2100 Demand interfaces 64 to 1520 Ethernet interfaces 64 to 1500 FDL interfaces 64 to 256 Frame Relay subinterfaces 64 to 1520 HDLC interfaces (NetVanta 5305) 64 to 4600 HDLC interfaces (all other NetVanta products)64 to 2100 Loopback interfaces 64 to 1500 PPP interfaces (NetVanta 5305) 64 to 4600 PPP interfaces (all other NetVanta products) 64 to 2100 Tunnel interfaces 64 to 18190
Default Values
<size> The default values for the various interfaces are listed below: ATM subinterfaces 1500 BVIs 1500 Demand interfaces 1500 Ethernet interfaces 1500 FDL interfaces 256 Frame Relay subinterfaces 1500 HDLC interfaces 1500 Loopback interfaces 1500 PPP interfaces 1500 Tunnel interfaces 1476
Command History
Release 1.1 Release 11.1 Release 17.9 Release A4.01 Command was introduced. Command was expanded to include the demand interface. Command was changed to require the ip keyword. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet Interface.
Functional Notes
Open shortest path first (OSPF) will not become adjacent on links where the MTU sizes do not match. If router A and router B are exchanging hello packets but their MTU sizes do not match, they will never reach adjacency. This is by design and required by the RFC.
60000CRG0-35B
1597
Usage Examples
The following example specifies an MTU of 1200 on the Ethernet interface 0/1: (config)#interface fdl 1/1 (config-fdl 1/1)#ip mtu 1200
60000CRG0-35B
1598
Default Values
By default, there is no assigned peer default IP address.
Command History
Release 3.1 Release 7.1 Command was introduced. Command was expanded to include the facility data link (FDL).
Functional Notes
This command is useful if the peers FDL interface is on a different subnet than the local units FDL interface IP address. This is common if the FDL interface is unnumbered to another interfaces IP address.
Usage Examples
The following example sets the default peer IP address to 192.22.71.50: (config)#interface fdl 1/1 (config-fdl 1/1)#peer default ip address 192.22.71.50
60000CRG0-35B
1599
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. impedance on page 1601 loopback on page 1602 rx-gain <value> on page 1603 test erl on page 1604 test loop on page 1606 test ring-ground on page 1607 test tip-ground on page 1608 test tone on page 1609 tx-gain <value> on page 1610
60000CRG0-35B
1600
impedance
Use the impedance command to configure the alternating current (AC) impedance of the 2-wire interface. Use the no form of this command to return to the default value. Variations of this command include:
impedance [600c | 900r] impedance [900c | 600r] impedance [z1| z2 | z3 | z4 | z5 | z6 | z7]
Syntax Description
600c 600r 900c 900r z1 z2 z3 z4 z5 z6 z7 Specifies an impedance of 600 + 2.16 F. Specifies an impedance of 600 real. Specifies an impedance of 900 + 2.16 F. Specifies an impedance of 900 real. Specifies an impedance of Rs 220 W, Rp 820 W, Cp 115 nF. Specifies an impedance of Rs 270 W, Rp 750 W, Cp 150 nF. Specifies an impedance of Rs 270 W, Rp 750 W, Cp 150 nF, Zin 600r. Specifies an impedance of Rs 320 W, Rp 1050 W, Cp 230 nF. Specifies an impedance of Rs 350 W, Rp 1000 W, Cp 210 nF, Zin 600r. Specifies an impedance of Rs 370 W, Rp 620 W, Cp 310 nF. Specifies an impedance of Rp 800 W, Rs 100 W, Cs 50 nF.
Default Values
By default, the impedance is set to 600c.
Command History
Release 7.1 Release A1 Command was introduced. Command was expanded to include the settings z1 through z7.
Usage Examples
The following example sets the impedance to 600 + 2.16 F: (config)#interface fxo 0/1 (config-fxo 0/1)#impedance 600c
60000CRG0-35B
1601
loopback
Use the loopback command to activate a loopback on the foreign exchange office (FXO) module. Use the no form of this command to deactivate the loopback. Variations of this command include:
loopback analog loopback digital
Syntax Description
analog digital Initiates a loopback toward the T1 network side of the connection after passing through analog filters in the voice CODEC. Initiates the same loopback before passing through analog filters in the voice coder-decoder (CODEC).
Default Values
No default values are necessary for this command.
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example activates a loopback toward the T1 network side of the connection after passing through analog filters in the voice CODEC: (config)#interface fxo 0/1 (config-fxo 0/1)#loopback analog
60000CRG0-35B
1602
rx-gain <value>
Use the rx-gain command to define the receive gain characteristics on the foreign exchange office (FXO) interface. Receive gain determines the amplification of the received signal before transmitting it out the FXO interface. Use the no form of this command to return to the default value. Syntax Description
<value> Defines the receive gain characteristics for the interface in 0.1 decibel increments. Range is -6.0 to 10.0 dB.
Default Values
By default, this command is set to 0 dB.
Command History
Release 7.1 Command was introduced.
Functional Notes
When increasing this value, the signal being received on this port sounds louder. When decreasing this value, the signal being received on this port sounds softer.
Usage Examples
The following example defines the receive gain as -5.4 dB: (config)#interface fxo 0/1 (config-fxo 0/1)#rx-gain -5.4
60000CRG0-35B
1603
test erl
Use the test erl command to automatically determine the correct impedance value for analog lines connected to the foreign exchange office (FXO) port. This is helpful when troubleshooting problems with FXO equipment and assists in adjusting the correct audio levels. Use the no form of the test erl all and test erl current command to disable these features. Variations of this command include:
test erl all test erl all auto-set test erl clear-results test erl current test erl display-results
This feature is available only on units with digital signal processor (DSP) hardware version Freescale MSC7119, and AOS version A2.02 or above. To determine the DSP hardware version, issue the show version command and look for the DSP hardware version. Syntax Description
all auto-set clear-results current display-results Specifies running the test repeatedly, testing all available impedance settings for the interface. Optional. Sets automatically the best measured impedance for the interface. Clears the results from the echo return loss (erl) test. Specifies running the test once, using the current impedance setting. Displays a snapshot of the current test status.
Default Values
By default, this command is disabled.
Command History
Release A2.04 Command was introduced.
Functional Notes
Before using this feature, an analog line from the service provider must be connected to the FXO interface and the line must be idle (no call in progress). The FXO interface must be connected to a voice trunk in order to make the tool available for use. During the test, the tool sets the FXO transmit gain and receive gain levels to 0 dB to make the proper measurements. These settings are returned to the configured values when the test is complete. The rx-gain value adjusts the level being transmitted from the FXO to the line. The tx-gain value adjusts the level being transmitted from the FXO to the dsp.
60000CRG0-35B
1604
Common low ERL values are between 5 and 8 dB. Acceptable ERL values begin around 12 dB. The higher the ERL value, the more gain adjustment can be made without introducing echo. The commonly recommended configuration is a receive gain of 0 dB and a ttransmit gain of +6 dB. The following is an error that could result by attempting to measure ERL when a measurement sequence is already active: % could not run erl test During test execution, a warning is issued when a test sequence terminates abnormally. Reasons for early termination include: Was not able to seize the line Line disconnected during test DSP timeout (i.e., when the DSP hardware version does not support this feature) Test runs for more than 20 seconds per impedance value (for example, 80 seconds with a 4 impedance setting)
Usage Examples
The following example tests the FXO interface 0/1 to automatically find the best measured impedance settings: (config)#interface fxo 0/1 (config-fxo 0/1)#test erl all auto-set The following example displays the ERL test status (the output is shown after the command): (config)#interface fxo 0/1 (config-fxo 0/1)#test erl display-results Port Impedance Status Measured ERL -------------------------------------------------------------------------------------------------------fxo 0/1 600 c 10 dB fxo 0/1 900 r 8 dB fxo 0/1 900 c 9 dB fxo 0/1 z1 13 dB fxo 0/1 z2 11 dB fxo 0/1 z3 14 dB fxo 0/1 z4 12 dB fxo 0/1 z5 test calling
60000CRG0-35B
1605
test loop
Use the test loop command to manually control the foreign exchange office (FXO) interfaces hook switch. This is helpful when troubleshooting problems with the FXO equipment. Use the no form of this command to disable this feature. Variations of this command include:
test loop closed test loop open
Syntax Description
closed open Closes the hook switch, allowing DC current to flow through the interface. Opens the hook switch, preventing DC current from flowing through the interface.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example opens the interfaces hook switch: (config)#interface fxo 02/1 (config-fxo 0/1)#test loop open
60000CRG0-35B
1606
test ring-ground
Use the test ring-ground command to force the ring conductor to ground potential and provides battery on tip for detection of tip ground. This is helpful when troubleshooting problems with ground start (GS) circuits. Use the no form of this command to return to the default value. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example forces a ring-ground test of the foreign exchange office (FXO) interface: (config)#interface fxo 0/1 (config-fxo 0/1)#test ring-ground
60000CRG0-35B
1607
test tip-ground
Use the test tip-ground command to detect the removal of the ring ground and check for the loop condition on an active foreign exchange office (FXO) interface. This is helpful when troubleshooting problems with ground start (GS) circuits. Use the no form of this command to return to the default value. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example forces a tip-ground test of the FXO interface: (config)#interface fxo 0/1 (config-fxo 0/1)#test tip-ground
60000CRG0-35B
1608
test tone
Use the test tone command to activate the 1 kHz test tone. Use the no form of this command to deactivate the test tone. Variations of this command include:
test tone far test tone near
Syntax Description
far near Sends the test tone out the T1 network interface to the remote end. Sends the test tone toward the foreign exchange office (FXO) interface.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example sends the test tone toward the FXO interface: (config)#interface fxo 0/1 (config-fxo 0/1)#test tone near
60000CRG0-35B
1609
tx-gain <value>
Use the tx-gain command to define the transmit gain characteristics on the foreign exchange office (FXO) interface. Transmit gain determines the amplification of the transmitted signal before transmitting from the FXO interface toward the network. Use the no form of this command to return to the default value. Syntax Description
<value> Defines the transmit gain characteristics in 0.1 decibel increments. Range is -6.0 to 10.0 dB.
Default Values
By default, transmit gain is set to 0 dB.
Command History
Release 7.1 Command was introduced.
Functional Notes
When increasing this value, the signal being transmitted to the far end sounds louder. When decreasing this value, the signal being transmitted to the far end sounds softer.
Usage Examples
The following example defines the transmit gain as -5.4 dB on the FXO interface: (config)#interface fxo 0/1 (config-fxo 0/1)#tx-gain -5.4
60000CRG0-35B
1610
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. battery-mode on page 1612 caller-id on page 1613 holdover <value> on page 1614 impedance on page 1615 loopback on page 1617 onhook-transmission on page 1618 ring-voltage <value> on page 1619 rx-gain <value> on page 1620 signal on page 1621 test commands begin on page 1622 tx-gain <value> on page 1628
60000CRG0-35B
1611
battery-mode
Use the battery-mode command to configure the battery that feeds the foreign exchange station (FXS) loop. Use the no form of this command to return to the default setting. Variations of this command include:
battery-mode auto battery-mode high battery-mode low
Syntax Description
auto high low Configures the interface to automatically switch between high and low battery. Configures the interface to only use the high battery. Configures the interface to only use the low battery.
Default Values
By default, the battery mode is set to auto.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example configures the battery mode for high: (config)#interface fxs 2/1 (config-fxs 2/1)#battery-mode high
60000CRG0-35B
1612
caller-id
Use the caller-id command to configure caller identification (ID). Use the no form of this command to cancel the setting. Variations of this command include:
caller-id delay <value> caller-id format mdmf caller-id format sdmf
Syntax Description
delay <value> Specifies the delay between ring-off and caller ID frequency-shift keying
(FSK). Valid range is 500 to 2000 ms. Common values are 500, 750, and
1000. format mdmf sdmf Specifies the format for caller ID as mdmf or sdmf. Indicates the caller ID format as multiple data message format (mdmf). Indicates the caller ID format as single data message format (sdmf).
Default Values
By default, caller ID is disabled.
Command History
Release A2 Command was introduced.
Usage Examples
The following example configures the caller ID delay to 500 ms: (config)#interface fxs 2/1 (config-fxs 2/1)#caller-id delay 500
60000CRG0-35B
1613
holdover <value>
Use the holdover command to configure the amount of time (in seconds) to sustain battery power at the foreign exchange station (FXS) port even if a call could not be connected. Once the holdover period has expired, the power is removed from the FXS port. A value of 0 will result in the battery being maintained at the FXS indefinitely. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the time (in seconds) to apply power from the battery to the FXS port. Valid range is 0 to 65535 seconds.
Default Values
The default value for this command is 60 seconds.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example configures the holdover to 25 seconds: (config)#interface fxs 2/1 (config-fxs 2/1)#holdover 25
60000CRG0-35B
1614
impedance
Use the impedance command to configure the alternating current (AC) impedance of the 2-wire interface. Use the no form of this command to return to the default value. Variations of this command include:
impedance 600c impedance 600r impedance 900b impedance 900c impedance 900r impedance z1 impedance z2 impedance z3 impedance z4 impedance z5 impedance z6 impedance z7
Syntax Description
600c 600r 900b 900c 900r z1 z2 z3 z4 z5 z6 z7 Specifies an impedance of 600 + 2.16 F. Specifies an impedance of 600 real. Use only when directed by ADTRAN and only with part number 1203602L1. Specifies an impedance of 900 + 2.16 F. Specifies an impedance of 900 real. Specifies an impedance of Rs 220 W, Rp 820 W, Cp 115 nF. Specifies an impedance of Rs 270 W, Rp 750 W, Cp 150 nF. Specifies an impedance of Rs 270 W, Rp 750 W, Cp 150 nF, Zin 600r. Specifies an impedance of Rs 320 W, Rp 1050 W, Cp 230 nF. Specifies an impedance of Rs 350 W, Rp 1000 W, Cp 210 nF, Zin 600r. Specifies an impedance of Rs 370 W, Rp 620 W, Cp 310 nF. Specifies an impedance of Rp 800 W, Rs 100 W, Cs 50 nF.
Default Values
The default value for this command is 600r.
Command History
Release 6.1 Release A1 Release A2 Release A4.03 Command was introduced. Command was expanded to include the 900b impedance setting. Command was expanded to include the z1 impedance setting. Command was expanded to include the z2, z3, z4, z5, z6, and z7 impedance settings.
60000CRG0-35B
1615
Usage Examples
The following example sets the impedance to 600 + 2.16 F: (config)#interface fxs 2/1 (config-fxs 2/1)#impedance 600c
60000CRG0-35B
1616
loopback
Use the loopback command to activate a loopback toward the T1 network side on the foreign exchange station (FXS) module. Use the no form of this command to deactivate the loopback. Variations of this command include:
loopback analog loopback digital
Syntax Description
analog digital Initiates a loopback toward the T1 network side of the connection after passing through analog filters in the voice coder-decoder (CODEC). Initiates the same loopback before passing through analog filters in the voice CODEC.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example activates a loopback toward the T1 network side of the connection after passing through analog filters in the voice CODEC: (config)#interface fxs 2/1 (config-fxs 2/1)#loopback analog
60000CRG0-35B
1617
onhook-transmission
Use the onhook-transmission command to configure the on-hook transmission of voice band audio on the foreign exchange station (FXS) interface. Use the no form of this command to return to the default value. Variations of this command include:
onhook-transmission always onhook-transmission auto
Syntax Description
always auto Enables on-hook transmission of voice band audio. Enables on-hook transmission of voice band audio when it is possible. This option lowers the power consumption of the unit; however, it should not be used if voice message waiting indication is enabled on the port.
Default Values
By default, on-hook transmission is set to always.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sets the on-hook transmission to auto: (config)#interface fxs 2/1 (config-fxs 2/1)#onhook-transmission auto
60000CRG0-35B
1618
ring-voltage <value>
The ring-voltage command sets the ring voltage for the foreign exchange station (FXS) interface. Increasing the ring voltage, sends a stronger ring signal to the phones connected to this interface. Use the no form of this command to return to the default value. Syntax Description
<value> Specifies a ring voltage. Select from 50, 60 or 70 Vrms.
Default Values
By default, ring voltage is set to 50 Vrms.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example sets the ring voltage to 60 Vrms: (config)#interface fxs 2/1 (config-fxs 2/1)#ring-voltage 60
60000CRG0-35B
1619
rx-gain <value>
Use the rx-gain command to define the receive gain characteristics on the foreign exchange station (FXS) interface. Receive gain determines the amplification of the received signal before transmitting out the FXS interface. Use the no form of this command to return to the default value. Syntax Description
<value> Defines the receive gain characteristics for the interface in 0.1 decibel increments. Range is -12.0 to 6.0 dB.
Default Values
By default, this command is set to -3.0 dB.
Command History
Release 6.1 Command was introduced.
Functional Notes
When increasing this value, the signal being received on this port sounds louder. When decreasing this value, the signal being received on this port sounds softer.
Usage Examples
The following example defines the receive gain as -6.4 dB: (config)#interface fxs 2/1 (config-fxs 2/1)#rx-gain -6.4
60000CRG0-35B
1620
signal
The signal command configures the signaling mode for the foreign exchange station (FXS) interface. Use the no form of this command to return to the default value. Variations of this command include:
signal ground-start signal loop-start
Syntax Description
ground-start loop-start Applies resistance to the tip conductor of the circuit to indicate an off-hook condition. Bridges the tip and ring to indicate an off-hook (seizing the line) condition.
Default Values
By default, this command is set to loop-start.
Command History
Release 6.1 Command was introduced.
Functional Notes
This signaling mode must match the configuration of the network.
Usage Examples
The following example sets the signaling mode to loop-start: (config)#interface fxs 2/1 (config-fxs 2/1)#signal loop-start
60000CRG0-35B
1621
test battery
Use the test battery command to provide battery on the 2-wire foreign exchange station (FXS) interface. This is helpful when troubleshooting wiring problems with the FXS equipment. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example provides battery on the 2-wire FXS interface: (config)#interface fxs 2/1 (config-fxs 2/1)#test battery
60000CRG0-35B
1622
test line
The test line command performs GR-909 line tests including the Hazardous Potential Test, the Foreign ElectroMotive Force Test, the Resistive Faults Test, the Receiver-Off-Hook Test, and the Ringers Test on the foreign exchange station (FXS) interface. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example runs GR-909 line tests on the FXS interface: (config)#interface fxs 2/1 (config-fxs 2/1)#test line
60000CRG0-35B
1623
test reverse-battery
Use the test reverse-battery command to provide reverse battery polarity on the foreign exchange station (FXS) interface. This is helpful when troubleshooting wiring problems with the FXS equipment. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example provides reverse battery polarity on the FXS interface: (config)#interface fxs 2/1 (config-fxs 2/1)#test reverse-battery
60000CRG0-35B
1624
test ringing
Use the test ringing command to activate ringing voltage on the 2-wire foreign exchange station (FXS) interface (using a 2-seconds-on/4-seconds-off cadence). The no form of this command removes the ringing voltage from the interface. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example activates ringing voltage on the 2-wire FXS interface: (config)#interface fxs 2/1 (config-fxs 2/1)#test ringing
60000CRG0-35B
1625
test tip-open
Use the test tip-open command to provide battery on ring and a high impedance on tip. This is helpful when troubleshooting problems with ground start (GS) interfaces. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example provides battery on ring and a high impedance on tip on the foreign exchange station (FXS) interface: (config)#interface fxs 2/1 (config-fxs 2/1)#test tip-open
60000CRG0-35B
1626
test tone
Use the test tone command to activate the 1 kHz test tone. Use the no form of this command to deactivate the test tone. Variations of this command include:
test tone near test tone far
Syntax Description
near far Sends the test tone toward the foreign exchange station (FXS) interface. Sends the test tone out the T1 network interface to the remote end.
Default Values
By default, this command is disabled.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example sends the test tone toward the FXS interface: (config)#interface fxs 2/1 (config-fxs 2/1)#test tone near
60000CRG0-35B
1627
tx-gain <value>
Use the tx-gain command to define the transmit gain characteristics (configured in 0.1 dB increments) on the foreign exchange station (FXS) interface. Transmit gain determines the amplification of the received signal before transmitting from the FXS interface toward the network. Use the no form of this command to return to the default value. Syntax Description
<value> Defines the transmit gain characteristics for the interface in 0.1 decibel increments. Range is -12.0 to 6.0 dB.
Default Values
By default, this command is set to -6.0 dB.
Command History
Release 6.1 Command was introduced.
Functional Notes
When increasing this value, the signal being transmitted to the far end will sound louder. When decreasing this value, the signal being transmitted to the far end sounds softer.
Usage Examples
The following example defines the transmit gain as -6.4 dB on the FXS interface: (config)#interface fxs 2/1 (config-fxs 2/1)#tx-gain -6.4
60000CRG0-35B
1628
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. coding on page 1630 framing crc4 on page 1631 loopback network on page 1632 snmp trap link-status on page 1633 test-pattern on page 1634 ts16 on page 1635
60000CRG0-35B
1629
coding
Use the coding command to configure the line coding for the G.703 physical interface. This setting must match the line coding supplied on the circuit by the private branch exchange (PBX). Use the no form of this command to return to the default setting. Variations of this command include:
coding ami coding hdb3
Syntax Description
ami hdb3 Configures the line coding for alternate mark inversion (AMI). Configures the line coding for high-density bipolar 3 (HDB3).
Default Values
By default, all E1 interfaces are configured with HDB3 line coding.
Command History
Release 5.1 Command was introduced.
Functional Notes
The line coding configured in the unit must match the line coding of the E1 circuit. A mismatch will result in line errors (e.g., bipolar violations (BPVs)).
Usage Examples
The following example configures the G.703 interface for AMI line coding: (config)#interface e1 1/2 (config-e1 1/2)#coding ami
60000CRG0-35B
1630
framing crc4
Use the framing crc4 command to configure the framing format for the G.703 interface. This parameter should match the framing format set on the external device. Use the no form of this command to return to the default value. Syntax Description
crc4 Enables CRC4 bits to be transmitted in the outgoing data stream. Also, the received signal is checked for CRC4 errors.
Default Values
By default, CRC4 is enabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
The framing value must match the configuration of the E1 circuit. A mismatch will result in a loss of frame alarm.
Usage Examples
The following example configures the G.703 interface for CRC4 framing: (config)#interface e1 1/2 (config-e1 1/2)#framing crc4
60000CRG0-35B
1631
loopback network
Use the loopback network command to initiate a loopback on the interface toward the network. Use the no form of this command to deactivate the loopback. Variations of this command include:
loopback network line loopback network payload
Syntax Description
line payload Initiates a metallic loopback of the physical E1 network interface. Initiates a loopback of the E1 framer (CSU portion) of the E1 network interface.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
The following diagram depicts a line loopback.
E1 Network Interface
NI CSU NTWK E1
Line Loopback
Usage Examples
The following example initiates a line loopback of the G.703 interface: (config)#interface e1 1/2 (config-e1 1/2)#loopback network line
60000CRG0-35B
1632
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the G.703 interface: (config)#interface e1 1/2 (config-e1 1/2)#no snmp trap link-status
60000CRG0-35B
1633
test-pattern
Use the test-pattern command to activate the built-in pattern generator and begin sending the specified test pattern. This pattern generation can be used to verify a data path when used in conjunction with an active loopback. Use the no form of this command to cease pattern generation. Variations of this command include:
test-pattern ones test-pattern zeros
Syntax Description
ones zeros Generates a test pattern of continuous ones. Generates a test pattern of continuous zeros.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Release 6.1 Command was introduced. Command was expanded to include the E1 and G.703 interfaces.
Usage Examples
The following example activates the pattern generator for a stream of continuous ones: (config)#interface e1 1/2 (config-e1 1/2)#test-pattern ones
60000CRG0-35B
1634
ts16
Use the ts16 command to enable timeslot 16 multiframe to be checked on the receive signal. Use the no form of this command to disable timeslot 16. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example enables timeslot 16 multiframing: (config)#interface e1 1/2 (config-e1 1/2)#ts16
60000CRG0-35B
1635
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. external-loopback-request on page 1637 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1638 loopback on page 1639 snmp trap link-status on page 1640
60000CRG0-35B
1636
external-loopback-request
Use the external-loopback-request command to enable LC (loopback circuit C) input to control loopbacks toward the network. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example enables the unit to accept external loopback requests: (config)#interface hssi 1/1 (config-hssi 1/1)#external-loopback-request
60000CRG0-35B
1637
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface hssi 1/1 (config-hssi 1/1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1638
loopback
Use the loopback command to initiate or remove a loopback. Use the no loopback command to disable all loopbacks. Variations of this command include:
loopback dce loopback dte loopback line loopback remote loopback none
Syntax Description
dce dte line remote none Initiates a loopback on the data communication equipment (DCE). Initiates a loopback on the data terminal equipment (DTE). Initiates a local line loopback. Initiates a remote line loopback. Removes an active loopback.
Default Values
By default, no loopbacks are active.
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example initiates a local line loopback on the high speed serial interface (HSSI): (config)#interface hssi 1/1 (config-hssi 1/1)#loopback line
60000CRG0-35B
1639
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the interface: (config)#interface hssi 1/1 (config-hssi 1/1)#no snmp trap link-status
60000CRG0-35B
1640
The modem interface number in the example above is shown as modem 1/2. This number is based on the interfaces location (slot/port) and could vary depending on the units configuration. Use the do show interfaces command to determine the appropriate interface number. The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. caller-id-override on page 1642 dialin on page 1643 init-string <string> on page 1644 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1645 resource pool-member on page 1646
60000CRG0-35B
1641
caller-id-override
Use the caller-id-override command to configure the unit to replace caller ID information with a user-specified number. Use the no form of this command to disable any caller ID overrides. Variations of this command include:
caller-id-override always <number> caller-id-override if-no-cid <number>
Syntax Description
always <number> if-no-cid <number> Always forces replacement of the incoming caller ID number with the number given. Replaces the incoming caller ID number with the number given only if there is no caller ID information available for the incoming call.
Default Values
By default, this command is disabled.
Command History
Release 6.1 Command was introduced.
Functional Notes
This command forces a replacement of the incoming caller ID number with the number given. The received caller ID, if any, is discarded, and the given override number is used to connect the incoming call to a circuit of the same number.
Usage Examples
The following example configures the unit to always provide the given number as the caller ID number: (config)#interface modem 1/2 (config-modem 1/2)#caller-id-override always 5555555
60000CRG0-35B
1642
dialin
Use the dialin command to enable the modem for remote console dial in, disabling the use of the modem for dial backup. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, dialin is disabled.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example enables remote console dial in: (config)#interface modem 1/2 (config-modem 1/2)#dialin
60000CRG0-35B
1643
init-string <string>
Use the init-string command to specify an initialization string for the modem using standard AT commands. Use the no form of this command to return to the default initialization string. Syntax Description
<string> Specifies an initialization string using standard AT commands. This string must start with AT and cannot contain spaces.
Default Values
<string> ate0q0v1x4\n0 at e0 q0 v1 x4 \n0 All initialization strings must begin with AT. Disables command echo. Response messages on. Formats result codes in long word form. Specifies extended response set, dial tone, and busy signal detection for result codes following modem operations. Selects standard buffered connection only.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example configures the modem to perform a hang-up at each initialization (to verify that the line is free) and maintains the default initialization: (config)#interface modem 1/2 (config-modem 1/2)#init-string ate0q0v1x4\n0
60000CRG0-35B
1644
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface modem 1/2 (config-modem 1/2)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1645
resource pool-member
Use the resource pool-member command to assign the interface to a resource pool, making it a demand routing resource. Use the no form of this command to return to the default value. Variations of this command include:
resource pool-member <name> resource pool-member <name> <cost>
Syntax Description
<name> <cost> Specifies the name of the resource pool to which this interface is assigned. Optional. Specifies the cost of using this resource interface within the specified pool. In the event of a tie, a resource with a lower cost will be selected first. Interfaces with the same cost will be selected in alphabetical order by interface name.
Default Values
By default, the interface is not assigned to any resource pool.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures a basic rate interface (BRI) as a member of resource pool MyPool: (config)#interface modem 1/2 (config-modem 1/2)#resource pool-member MyPool
60000CRG0-35B
1646
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 description <text> on page 68 do on page 69 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. calling-party on page 1648 calling-party name-facility-timeout <value> on page 1649 connect e1<slot/port> tdm-group <number> on page 1650 connect t1 <slot/port> tdm-group <number> on page 1651 digits-transferred <value> on page 1652 isdn alert disable pi-8 on page 1653 isdn connect enable pi-2 on page 1654 isdn name-delivery on page 1655 isdn pi-location on page 1656 isdn setup enable on page 1657 isdn supplementary-service on page 1658 isdn switch-type on page 1660 redirecting-number on page 1661 role on page 1662
60000CRG0-35B
1647
calling-party
Use the calling-party command to configure and control the primary rate interface (PRI) outgoing caller ID information. Use the no form of this command to disable this feature. Variations of this command include:
calling-party name <name> calling-party number <number> calling-party override always calling-party override if-no-CID calling-party presentation allowed calling-party presentation not-available calling-party presentation restricted
Syntax Description
name <name> number <number> override always override if-no-CID presentation allowed presentation not-available presentation restricted Configure the calling party name for the PRI. Configure the calling party number for the PRI. Enables the calling party to be replaced with the override number. Enables the calling party to be replaced if caller ID no number is received. Enables the presentation of caller ID to always be allowed. Sets the calling party number to not available. Restricts the delivery on the caller ID information.
Default Values
By default, the command is disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures calling party outgoing information: (config)#interface pri 2 (config-pri 2)#calling-party override always (config-pri 2)#calling-party presentation 555-8000 (config-pri 2)#calling-party name Company, Inc.
60000CRG0-35B
1648
Default Values
By default, the timeout is 2 seconds.
Command History
Release A2.03 Command was introduced.
Usage Examples
The following example sets the calling-party name-facility-timeout to 5 seconds: (config)#interface pri 2 (config-pri 2)#calling-party name-facility-timeout 5
60000CRG0-35B
1649
Default Values
By default, the command is disabled.
Command History
Release A2 Command was introduced.
Usage Examples
The following example configures the unit to connect tdm-group 1 of the E1 to the PRI interface 2: (config)#interface pri 2 (config-pri 2)#connect e1 0/1 tdm-group 1
60000CRG0-35B
1650
Default Values
By default, the command is disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures the unit to connect tdm-group 1 of the T1 to the PRI: (config)#interface pri 2 (config-pri 2)#connect t1 1/1 tdm-group 1
60000CRG0-35B
1651
digits-transferred <value>
Use the digits-transferred command to define how many of the received digits should be sent to the internal switchboard from an incoming call on a trunk. The number of digits transferred are the least digits received. Direct inward dialing (DID) should be used if a Telco provider is providing digits to the unit on inbound calls or if the unit needs to provide DID information to a piece of customer premises equipment (CPE). Use the no form of this command to disable this feature. Variations of this command include:
digits-transferred <value> digits-transferred <value> no-prefix digits-transferred <value> prefix <number>
Syntax Description
<value> no-prefix prefix <number> Specifies the number of digits to be transferred. The valid number of digits are 0, 3, 4, 7 or all. Optional. Specifies transferring the DID digits without appending a prefix. Optional. Specifies a sequence of digits to be appended to the digits that will be transmitted. For example, if seven digits will be transferred via DID, then prefix the seven digits with 256. Thus, 555-8000 would be prefixed with 256, and 256-555-8000 would not.
Default Values
No default values are necessary for this command.
Command History
Release 14.1 Command was introduced.
Usage Examples
The following example transfers the digits 555-8000 and adds the prefix 256: (config)#interface pri 2 (config-pri 2)#digits-transferred 5558000 prefix 256
60000CRG0-35B
1652
Default Values
By default, progress indicator 8 is enabled.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example disables progress indicator 8 in the alert message: (config)#interface pri 2 (config-pri 2)#isdn alert disable pi-8
60000CRG0-35B
1653
Default Values
By default, progress indicator 2 is disabled.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example enables progress indicator 2 in the connect message: (config)#interface pri 2 (config-pri 2)#isdn connect enable pi-2
60000CRG0-35B
1654
isdn name-delivery
Use the isdn name-delivery command to control the delivery of the name associated with the primary rate interface (PRI). This command can be used to block the caller ID name on the PRI. Use the no form of this command to return to the default setting. Variations of this command include:
isdn name-delivery display isdn name-delivery proceeding isdn name-delivery setup
Syntax Description
display proceeding setup Delivers the calling partys name in a display information element (IE) in the SETUP message. Delivers the calling partys name in a facility IE after the PROCEEDING message. Delivers the calling partys name in a facility IE in the SETUP message.
Default Values
By default, isdn name-delivery is disabled.
Command History
Release 11.1 Release 14.1 Command was introduced. Command was updated.
Usage Examples
The following example configures the calling party information to be delivered in the setup message: (config)#interface pri 2 (config-pri 2)#isdn name-delivery setup
60000CRG0-35B
1655
isdn pi-location
Use the isdn pi-location command to configure the location of the progress indicator in integrated services digital network (ISDN) messages on the primary rate interface (PRI). The location is a progress indicator information element that indicates from where the message comes. Use the no form of this command to return to the default setting. Variations of this command include:
isdn pi-location private isdn pi-location public
Syntax Description
private public Sets the location of the progress indicator to private network serving the local user. Sets the location of the progress indicator to public network serving the local user.
Default Values
By default, the progress indicator location is public.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example set the progress indicator location to private: (config)#interface pri 2 (config-pri 2)#isdn pi-location private
60000CRG0-35B
1656
Syntax Description
pi-1 Enables progress indicator 1 for ISDN setup messages. Progress indicator 1 indicates that the call is not end-to-end ISDN and further call progress information may be available in-band. Enables progress indicator 3 for ISDN setup messages. Progress indicator 3 indicates that the origination address is non-ISDN. Enables redirecting numbers for ISDN calls.
pi-3 redirecting-number
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Release A4.03 Command was introduced. Command was expanded to include the redirecting-number parameter.
Usage Examples
The following example enables redirecting numbers for ISDN calls: (config)#interface pri 2 (config-pri 2)#isdn setup enable redirecting-number
60000CRG0-35B
1657
isdn supplementary-service
Use the isdn supplementary-service command to enable integrated services digital network (ISDN) supplementary services on a primary rate interface (PRI). Use the no form of this command to disable this feature. Variations of this command include:
isdn supplementary-service ect isdn supplementary-service rlt isdn supplementary-service tbct isdn supplementary-service tbct active-transfers <value> isdn supplementary-service tbct d-channel-id <id number> isdn supplementary-service tbct d-channel-id auto isdn supplementary-service tbct notify-controller isdn supplementary-service tbct transfer-counters isdn supplementary-service tbct transfer-rate <value>
Syntax Description
ect rlt tbct active-transfers <value> d-channel-id <id number> d-channel-id auto notify-controller transfer-counters transfer-rate <value> Enables European Telecommunications Standards Institute (ETSI) explicit call transfer (ECT). Enables Digital Multiplex System (DMS) release link trunk (RLT). Enables National ISDN II two B-channel transfer (TBCT). Optional. Sets the number of simultaneous TBCT transfers. Valid range is 0 to 60000. Optional. Sets the D-channel ID for TBCT on the interface. Optional. Sets the D-channel ID for TBCT to be automatically configured. Optional. Enables TBCT notification to the controller. Optional. Enables transfer counters during TBCT. Optional. Sets the number of transfers allowed within a 10-second interval. Valid range is 0 to 500.
Default Values
By default, ECT, RLT, and TBCT are disabled. By default, the tbct active-transfers value is set to 100, the tbct d-channel-id is set to auto, the tbct notify-controller is disabled, the tbct transfer-counters are enabled, and the tbct transfer-rate is set to 10.
Command History
Release A4.01 Command was introduced.
60000CRG0-35B
1658
Usage Examples
The following example enables TBCT on PRI interface 2 and sets the number of simultaneous TBCT transfers to 5000: (config)#interface pri 2 (config-pri 2)#isdn supplementary-service tbct (config-pri 2)#isdn supplementary-service tbct active-transfers 5000
60000CRG0-35B
1659
isdn switch-type
Use the isdn switch-type command to configure the switch type assigned on the primary rate integrated services digital network (ISDN) primary rate interface (PRI) circuit. Telephone companies use various types of ISDN switches and this setting must match the switch type used by your provider. Use the no form of this command to return to the default setting. Variations of this command include:
isdn switch-type 4ess isdn switch-type 5ess isdn switch-type dms100 isdn switch-type etsi isdn switch-type etsi legacy isdn switch-type ni2
Syntax Description
4ess 5ess dms100 etsi etsi legacy ni2 Sets the ISDN switch type to ATT 4ESS. Sets the ISDN switch type to Lucent 5ESS. Sets the ISDN switch type to Northern ISDN II. Sets the ISDN switch type to European Telecommunications Standards Institute (ETSI) (ETS 300 403). Sets the ISDN switch type to legacy ETSI (ETS 300 102). Sets the ISDN switch type to National ISDN II.
Default Values
By default, the command is set to ni2.
Command History
Release 11.1 Release A2 Command was introduced. Command was expanded to include the ETSI switch types.
Usage Examples
The following example configures the PRI switch type National ISDN II: (config)#interface pri 2 (config-pri 2)#isdn switch-type ni2
60000CRG0-35B
1660
redirecting-number
Use the redirecting-number command to configure the format in which redirecting numbers are sent on the primary rate interface (PRI). Use the no form of this command to return to the default setting. Variations of this command include:
redirecting-number as-received redirecting-number prefer-national
Syntax Description
as-received prefer-national Configures the redirecting number to be sent exactly as it is received. Configures the redirecting number to be sent in E.164 format, if possible.
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example configures the redirecting number to be sent in E.164 format: (config)#interface pri 2 (config-pri 2)#redirecting-number prefer-national
60000CRG0-35B
1661
role
Use the role command to configure the interface protocol to use on the primary rate interface (PRI). This setting controls the functional mode of the interface. Use the no form of this command to return to the default setting. Variations of this command include:
role network role network b-channel-restarts disable role network b-channel-restarts enable role user
Syntax Description
network b-channel-restarts disable b-channel-restarts enable user Sets the port to operate in network termination (NT) mode. Optional. Disables B-channel restarts. Optional. Enables B-channel restarts. Sets the port to operate in terminal equipment (TE) mode.
Default Values
By default, the role is set to network b-channel-restarts disable.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures the interface protocol as user on the PRI: (config)#interface pri 2 (config-pri 2)#role user
60000CRG0-35B
1662
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. et-clock-source on page 1664 ignore dcd on page 1665 invert etclock on page 1666 invert rxclock on page 1667 invert txclock on page 1668 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1669 serial-mode on page 1670 snmp trap on page 1671 snmp trap link-status on page 1672
60000CRG0-35B
1663
et-clock-source
Use the et-clock-source command to configure the clock source used when creating the external transmit reference clock (et-clock). Use the no form of this command to return to the default value. Variations of this command include:
et-clock-source rxclock et-clock-source txclock
Syntax Description
rxclock txclock Uses the clock recovered from the receive signal to generate et-clock. Uses the clock recovered from the transmit signal to generate et-clock.
Default Values
By default, the clock recovered from the transmit signal is used to generate the et-clock.
Command History
Release 1.1 Command was introduced.
Functional Notes
The external transmit clock (et-clock) is an interface timing signal (provided by the data terminal equipment (DTE) device) used to synchronize the transfer of transmit data.
Usage Examples
The following example configures the serial interface to recover the clock signal from the received signal and use it to generate et-clock: (config)#interface serial 1/1 (config-ser 1/1)#et-clock-source rxclock
60000CRG0-35B
1664
ignore dcd
Use the ignore dcd command to specify the behavior of the serial interface when the data carrier detect (DCD) signal is lost. Use the no form of this command to return to the default value. Syntax Description
No subcommands.
Default Values
By default, the serial interface does not ignore a change in status of the DCD signal.
Command History
Release 1.1 Command was introduced.
Functional Notes
When configured to follow DCD (default condition), the serial interface will not attempt to establish a connection when DCD is not present. When configured to ignore DCD, the serial interface will continue to attempt to establish a connection even when DCD is not present.
Usage Examples
The following example configures the serial interface to ignore a loss of the DCD signal: (config)#interface serial 1/1 (config-ser 1/1)#ignore dcd
60000CRG0-35B
1665
invert etclock
Use the invert etclock command to configure the serial interface to invert the external transmit reference clock (et-clock) in the data stream before transmitting. Use the no form of this command to return to the default value. Syntax Description
No subcommands.
Default Values
By default, the serial interface does not invert et-clock.
Command History
Release 1.1 Command was introduced.
Functional Notes
If the serial interface cable is long, causing a phase shift in the data, the et-clock can be inverted using the invert etclock command. This switches the phase of the clock, which compensates for a long cable.
Usage Examples
The following example configures the serial interface to invert et-clock: (config)#interface serial 1/1 (config-ser 1/1)#invert etclock
60000CRG0-35B
1666
invert rxclock
Use the invert rxclock command to configure the serial interface to expect an inverted receive clock (found in the received data stream). Use the no form of this command to return to the default value. Syntax Description
No subcommands.
Default Values
By default, the serial interface does not expect an inverted receive clock (rxclock).
Command History
Release 1.1 Command was introduced.
Functional Notes
If the serial interface cable is long, causing a phase shift in the data, the transmit clock can be inverted using the invert txclock command (refer to invert txclock on page 1668). This switches the phase of the clock, which compensates for a long cable. If the transmit clock of the connected device is inverted, use the invert rxclock command to configure the receiving interface appropriately.
Usage Examples
The following example configures the serial interface to invert receive clock: (config)#interface serial 1/1 (config-ser 1/1)#invert rxclock
60000CRG0-35B
1667
invert txclock
Use the invert txclock command to configure the serial interface to invert the transmit clock (found in the transmitted data stream) before sending the signal. Use the no form of this command to return to the default value. Syntax Description
No subcommands.
Default Values
By default, the serial interface does not invert transmit clock (txclock).
Command History
Release 1.1 Command was introduced.
Functional Notes
If the serial interface cable is long, causing a phase shift in the data, the transmit clock can be inverted (using the invert txclock command). This switches the phase of the clock, which compensates for a long cable. If the transmit clock of the connected device is inverted, use the invert rxclock command to configure the receiving interface appropriately.
Usage Examples
The following example configures the serial interface to invert the transmit clock: (config)#interface serial 1/1 (config-ser 1/1)#invert txclock
60000CRG0-35B
1668
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface serial 1/1 (config-ser 1/1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1669
serial-mode
Use the serial-mode command to specify the electrical mode for the interface. Use the no form of this command to return to the default value. Variations of this command include:
serial-mode eia530 serial-mode v35 serial-mode x21
Syntax Description
eia530 v35 x21 Configures the interface for use with the EIA 530 adapter cable (P/N 1200883L1). Configures the interface for use with the V.35 adapter cable (P/N 1200873L1). Configures the interface for use with the X.21 adapter cable (P/N 1200874L1).
Default Values
By default, the serial interface is configured for a V.35 adapter cable.
Command History
Release 1.1 Command was introduced.
Functional Notes
The pinouts for each of the available interfaces can be found in the Hardware configuration guide located on the AOS Documentation CD (provided in shipment).
Usage Examples
The following example configures the serial interface to work with the X.21 adapter cable: (config)#interface serial 1/1 (config-ser 1/1)#serial-mode x21
60000CRG0-35B
1670
snmp trap
Use the snmp trap command to enable all supported Simple Network Management Protocol (SNMP) traps on the interface. Use the no form of this command to disable this trap. Syntax Description
No subcommands.
Default Values
By default, all interfaces (except virtual Frame Relay interfaces and subinterfaces) have SNMP traps enabled.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 8.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the port channel and virtual local area network (VLAN) interfaces. Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the tunnel interface.
Usage Examples
The following example enables SNMP on the serial interface: (config)#interface serial 1/1 (config-ser 1/1)#snmp trap
60000CRG0-35B
1671
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the serial interface: (config)#interface serial 1/1 (config-ser 1/1)#no snmp trap link-status
60000CRG0-35B
1672
Not all SHDSL commands apply to all SHDSL interfaces. Type interface shdsl <slot/port> to display a list of valid commands.
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. alarm-threshold on page 1675 annex on page 1676 boot alternate-image on page 1677 equipment-type on page 1678 ignore-error-duration <time> on page 1679 inband-detection on page 1680 inband-protocol on page 1681 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1682 line-mode on page 1683 linerate <value> on page 1684 loopback on page 1685 loopback remote inband on page 1686 outage-retrain on page 1687 test-pattern on page 1688
60000CRG0-35B
1673
60000CRG0-35B
1674
alarm-threshold
Use the alarm-threshold command to set thresholds for specific alarm conditions. Use the no form of this command to disable threshold settings. Variations of this command include:
alarm-threshold loop-attenuation <value> alarm-threshold snr-margin <value>
Syntax Description
loop-attenuation <value> Specifies a loop-attenuation threshold value from 1 to 127 dB. If signal energy loss on the loop exceeds the configured value, the router issues an alarm. Specifies a value for signal-to-noise ratio (SNR) margin from 1 to 15 dB. If the difference in amplitude between the baseband signal and the noise exceeds the configured value, the router issues an alarm.
snr-margin <value>
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example sets the loop attenuation threshold at 45 dB: (config)#interface shdsl 1/1 (config-shdsl 1/1)#alarm-threshold loop-attenuation 45
60000CRG0-35B
1675
annex
Use the annex command to select the single-pair high-speed digital subscriber line (SHDSL) operating mode supported on this interface. Use the no form of this command to return to the default setting. Variations of this command include:
annex a annex a-or-b annex b
Syntax Description
a a-or-b b Specifies Annex A (North America operating parameters). Specifies Annex A or B. This feature allows for the detection and then selection of the annex type during training. Specifies Annex B (Europe operating parameters).
Default Values
By default, the SHDSL operating mode is set to a-or-b.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example sets the operating mode to annex a: (config)#interface shdsl 1/1 (config-shdsl 1/1)#annex a
60000CRG0-35B
1676
boot alternate-image
Use the boot alternate-image command to execute new code after a firmware upgrade. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Command was introduced.
Functional Notes
The current single-pair high-speed digital subscriber line (SHDSL) network interface module (NIM) card (P/N 1200867L1) supports two code images commonly referred to as the active image and the inactive image. When a firmware upgrade is performed on the card (through the copy <filename> interface shdsl x/y Enable mode command), the new firmware is placed in the inactive image space. This new code will not be executed until the boot alternate-image command is issued. When the user does this, the NIM will reboot (taking the current line down) with the new code. At this point, the old code becomes the inactive image and the new recently updated code becomes the active image.
Usage Examples
The following example causes the firmware upgrade to take effect: (config)#interface shdsl 1/1 (config-shdsl 1/1)#boot alternate-image
60000CRG0-35B
1677
equipment-type
Use the equipment-type command to determine the operating mode for the single-pair high-speed digital subscriber line (SHDSL) interface. Use the no form of this command to return to the default setting. Variations of this command include:
equipment-type co equipment-type cpe
Syntax Description
co Use this option only in a campus environment when operating two SHDSL network interface modules (NIMs) back-to-back. In this setup, configure the master NIM to CO and the slave NIM to customer premises equipment (CPE). Use this option when interfacing directly with your service provider or when acting as the slave NIM in a campus environment.
cpe
Default Values
The default for this command is cpe.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example changes the operating mode of the SHDSL interface to CO: (config)#interface shdsl 1/1 (config-shdsl 1/1)#equipment-type co
60000CRG0-35B
1678
ignore-error-duration <time>
Use the ignore-error-duration command to specify the amount of time that errors are ignored during line training. Use the no form of this command to return to the default setting. Syntax Description
<time> Specifies time in seconds. Valid range is 15 to 30 seconds.
Default Values
By default, ignore-error-duration is set to 15 seconds.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example sets the amount of time errors are ignored during line training to 25 seconds: (config)#interface shdsl 1/1 (config-shdsl 1/1)#ignore-error-duration 25
60000CRG0-35B
1679
inband-detection
Use the inband-detection command to enable inband loopback pattern detection on the single-pair high-speed digital subscriber line (SHDSL) interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is enabled.
Command History
Release 4.1 Command was introduced.
Usage Examples
The following example disables inband loopback pattern detection: (config)#interface shdsl 1/1 (config-shdsl 1/1)#no inband-detection
60000CRG0-35B
1680
inband-protocol
Use the inband-protocol command to designate the inband loopback pattern to send/detect on the single-pair high-speed digital subscriber line (SHDSL) interface. Use the no form of this command to return to the default setting. Variations of this command include:
inband-protocol pn127 inband-protocol v54
Syntax Description
pn127 v54 Selects PN127 as the inband loopback pattern to send/detect. Selects V.54 as the inband loopback pattern to send/detect.
Default Values
By default, the inband loopback pattern is set to v54.
Command History
Release 4.1 Command was introduced.
Functional Notes
Inband loopbacks are specific patterns that are sent in place of user data to trigger a loopback. Both PN127 and V.54 are industry standard loopback patterns used to allow remote loopbacks.
Usage Examples
The following example sets the inband loopback pattern for pn127: (config)#interface shdsl 1/1 (config-shdsl 1/1)#inband-protocol pn127
60000CRG0-35B
1681
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface shdsl 1/1 (config-shdsl 1/1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1682
line-mode
Use the line-mode command to select the controller line mode. Use the no form of this command to return to the default setting. Variations of this command include:
line-mode 2-wire line-mode 4-wire
Syntax Description
2-wire 4-wire Specifies two-wire mode. Specifies four-wire mode for extended operation.
Default Values
By default, the digital subscriber line (DSL) operating mode is set to 2-wire.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example sets the line mode to 4-wire: (config)#interface shdsl 1/1 (config-shdsl 1/1)#line-mode 4-wire
60000CRG0-35B
1683
linerate <value>
Use the linerate command to define the line rate for the single-pair high-speed digital subscriber line (SHDSL) interface (the value includes 8 kbps of framing overhead). This command is functional only in CO operating mode (refer to equipment-type on page 1678). The first two selections listed in the command line interface (CLI) (72 and 136 kbps) are not supported by the SHDSL network interface module (NIM) (P/N 1200867L1). Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the line rate in kbps. Range is 200 to 2312 kbps in 64k increments.
Default Values
By default, the line rate is set to 2056 kbps.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example changes the line rate of the SHDSL interface to 264 kbps: (config)#interface shdsl 1/1 (config-shdsl 1/1)#linerate 264
60000CRG0-35B
1684
loopback
Use the loopback command to initiate a loopback test on the single-pair high-speed digital subscriber line (SHDSL) interface. Use the no form of this command to deactivate the loopback. Variations of this command include:
loopback analog loopback digital loopback network loopback remote
Syntax Description
analog digital network remote Loops the circuit at the analog hybrid. Loops the circuit at the framer. Loops data back towards the network. Transmits a network loopback request. This command is functional only in CO operating mode (refer to equipment-type on page 1678).
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 15.1 Command was introduced. Command was expanded to include the analog and digital loopbacks.
Usage Examples
The following example initiates a loopback test on the SHDSL interface that will loop the data back toward the network: (config)#interface shdsl 1/1 (config-shdsl 1/1)#loopback network
60000CRG0-35B
1685
Default Values
By default, this command is enabled.
Command History
Release 4.1 Command was introduced.
Usage Examples
The following example injects a loop-down pattern into the data stream, causing existing loopbacks at the far end to stop: (config)#interface shdsl 1/1 (config-shdsl 1/1)#no loopback remote inband
60000CRG0-35B
1686
outage-retrain
Use the outage-retrain command to cause the single-pair high-speed digital subscriber line (SHDSL) interface to force the SHDSL retrain sequence (which takes the line down temporarily) if the interface detects more than ten consecutive errored seconds. A retrain is forced in hopes that the newly retrained line will achieve better performance than the previous training state. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this feature is disabled.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example forces a retrain sequence on the SHDSL interface: (config)#interface shdsl 1/1 (config-shdsl 1/1)#outage-retrain
60000CRG0-35B
1687
test-pattern
Use the test-pattern command to activate the built-in pattern generator and begin sending the selected test pattern toward the network. This pattern generation can be used to verify a data path when used in conjunction with an active loopback. Use the no form of this command to cease pattern generation. Variations of this command include:
test-pattern clear test-pattern errors test-pattern insert test-pattern p215
Syntax Description
clear errors insert p215 Clears the test pattern error count. Displays the test pattern error count. Inserts an error into the currently active test pattern. Generates a pseudorandom test pattern sequence based on a 15-bit shift register.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example sends a p215 test pattern: (config)#interface shdsl 1/1 (config-shdsl 1/1)#test-pattern p215
60000CRG0-35B
1688
Syntax Description
feet meters Specifies the distance to the detected bad splice is measured in feet. Specifies the distance to the detected bad splice is measured in meters.
Default Values
By default, distances in the bad splice detection test are measured in feet.
Command History
Release A4.05 Command was introduced.
Functional Notes
The bad splice detection test is a line testing feature that allows users to locate intermittent faults in lines by estimating the distance to the fault. Splice detection is always enabled on the SHDSL EFM NIM2 module and it continually monitors the signal-to-noise ratio (SNR) of the connection. When a negative change in the SNR is detected, a measurement is taken to determine the distance to where the issue is possibly occurring on the line. Bad splice detection test results can be viewed using the command show interface shdsl <slot/port> splice-detect on page 487.
Usage Examples
In the following example, the unit of measurement used by the bad splice detection test is changed from feet to meters: (config)#interface shdsl 1/1 (config-shdsl 1/1)#test splice-detect distance-type meters
60000CRG0-35B
1689
test tscan
Use the test tscan command to initiate a Tscan test, as well as configure and display Tscan test parameters for the interface. Variations of this command include:
test tscan test tscan clear-results test tscan display-results
Syntax Description
clear-results display-results Clears the Tscan test results from previously completed Tscan tests. Displays the results of the most recently completed Tscan test.
Default Values
By default, Tscan tests are not run on the interface.
Command History
Release A4.05 Command was introduced.
Functional Notes
The Tscan line test is a testing feature that allows users to isolate faults in lines by estimating the distance to the fault and determining the type of fault, whether a short or an open connection. Tscan is an intrusive test, which causes trained SHDSL loops to go down, but it is useful as a method for finding faults in loops that will not train, rather than as a performance metric for operational loops. Tscan tests can be started on any port that is enabled. Tscan tests typically take from 20 seconds to one minute to complete, and timeout after 90 seconds to restore control to the command line interface (CLI). When the test is complete, results are displayed in the CLI or can be viewed at a later time using the command test tscan display-results. Displayed results include the date and time of the test, the status of the test, the line rate used while Tscan operates (typically 16 or 32 DSOs), the distance to the fault if one is detected (displayed in feet), and the fault type that is found. The minimum distance for the Tscan test is 0 feet and the maximum Tscan test distance is 1200 feet.
Usage Examples
The following example initiates a Tscan test on SHDSL interface 1/1: (config)#interface shdsl 1/1 (config-shdsl 1/1)#test tscan
60000CRG0-35B
1690
The following example displays results from a recently completed Tscan test: (config)#interface shdsl 1/1 (config-shdsl 1/1)#test tscan display-results shdsl 1/1 TSCAN Results Date/Time: Thu, October 28, 2010 04:30:59 PM, CDT Status: Done Rate: 32 DSOs Distance: 1100 ft Fault: Open
60000CRG0-35B
1691
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. clock source on page 1693 coding on page 1694 fdl on page 1695 framing on page 1696 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1697 lbo on page 1698 loopback commands begin on page 1699 remote-alarm rai on page 1702 remote-loopback on page 1703 snmp trap line-status on page 1704 snmp trap link-status on page 1705 snmp trap threshold-reached on page 1706 tdm-group <number> on page 1708 test-pattern on page 1709
60000CRG0-35B
1692
clock source
Use the clock source command to configure the source timing used for the interface. Use the no form of this command to return to the default value. Variations of this command include:
clock source internal clock source line clock source system clock source through clock source through t1 <interface id>
Syntax Description
internal line system through through t1 <interface id> Configures the unit to provide clocking using the internal oscillator. Configures the unit to recover clocking from the T1 circuit. Configures the unit to provide clocking using the system clock. Configures the unit to recover clocking from the circuit connected to the DSX-1 interface. Configures the unit to recover clocking from the alternate interface. Only valid on T1 systems with multiple T1 interfaces and a single clock source.
Default Values
By default, the clock source is set to line.
Command History
Release 1.1 Release 13.1 Command was introduced. Command was expanded to include the system as a clocking source.
Functional Notes
When operating on a circuit that is providing timing, setting the clock source to line can avoid errors, such as clock slip seconds (CSS).
Usage Examples
The following example configures the unit to recover clocking from the primary circuit: (config)#interface t1 1/1 (config-t1 1/1)#clock source line
60000CRG0-35B
1693
coding
Use the coding command to configure the line coding for a T1 physical interface. This setting must match the line coding supplied on the circuit by the service provider. Use the no form of this command to return to the default setting. Variations of this command include:
coding ami coding b8zs
Syntax Description
ami b8zs Configures the line coding for alternate mark inversion (AMI). Configures the line coding for bipolar eight zero substitution (B8ZS).
Default Values
By default, all T1 interfaces are configured with b8zs line coding.
Command History
Release 1.1 Command was introduced.
Functional Notes
The line coding configured in the unit must match the line coding of the T1 circuit. A mismatch will result in line errors (e.g., bipolar violations (BPVs)).
Usage Examples
The following example configures the T1 interface for ami line coding: (config)#interface t1 1/1 (config-t1 1/1)#coding ami
60000CRG0-35B
1694
fdl
Use the fdl command to configure the format for the facility data link (FDL) channel on the T1 circuit. FDL channels are only available on point-to-point circuits. Use the no form of this command to return to the default value. Variations of this command include:
fdl ansi fdl att fdl none
Syntax Description
ansi att none Configures the FDL for ANSI T1.403 standard. Configures the FDL for AT&T TR 54016 standard. Disables FDL on this circuit.
Default Values
By default, the FDL is configured for ansi.
Command History
Release 1.1 Command was introduced.
Functional Notes
T1 circuits using extended superframe (ESF) framing format (specified using the framing command) reserve 12 bits as a data link communication channel, referred to as the FDL, between the equipment on either end of the circuit. The FDL allows the transmission of trouble flags, such as the Yellow Alarm signal. Refer to framing on page 1696 for related information.
Usage Examples
The following example disables the FDL channel for the T1 circuit: (config)#interface t1 1/1 (config-t1 1/1)#fdl none
60000CRG0-35B
1695
framing
Use the framing command to configure the framing format for the T1 interface. This parameter should match the framing format supplied by your network provider. Use the no form of this command to return to the default value. Variations of this command include:
framing d4 framing esf
Syntax Description
d4 esf Specifies D4 superframe (SF) format. Specifies extended superframe (ESF) format.
Default Values
By default, the framing format is set to esf.
Command History
Release 1.1 Command was introduced.
Functional Notes
A frame is comprised of a single byte from each of the T1s timeslots; there are 24 timeslots on a single T1 circuit. Framing bits are used to separate the frames and indicate the order of information arriving at the receiving equipment. D4 and ESF are two methods of collecting and organizing frames over the circuit.
Usage Examples
The following example configures the T1 interface for D4 framing: (config)#interface t1 1/1 (config-t1 1/1)#framing d4
60000CRG0-35B
1696
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface t1 1/1 (config-t1 1/1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1697
lbo
Use the lbo command to configure the line build out (LBO) for the T1 interface. Use the no form of this command to return to the default value. Variations of this command include:
lbo short <value> lbo long <value>
Syntax Description
long <value> short <value> Configures the LBO (in dB) for T1 interfaces with cable lengths greater than 655 feet. Choose from -22.5, -15, -7.5, and 0 dB. Configures the LBO (in feet) for T1 interfaces with cable lengths less than 655 feet. Range is 0 to 655 feet.
Default Values
By default, the build out is set to 0 dB.
Command History
Release 1.1 Command was introduced.
Functional Notes
LBO is artificial attenuation of a T1 output signal to simulate a degraded signal. This is useful to avoid overdriving a receivers circuits. The shorter the distance between T1 equipment (measured in cable length), the greater the attenuation value. For example, two units in close proximity should be configured for the maximum attenuation (-22.5 dB).
Usage Examples
The following example configures the T1 interface LBO for -22.5 dB: (config)#interface t1 1/1 (config-t1 1/1)#lbo -22.5
60000CRG0-35B
1698
loopback network
Use the loopback network command to initiate a loopback on the interface toward the network. Use the no form of this command to deactivate the loopback. Variations of this command include:
loopback network line loopback network payload
Syntax Description
line payload Initiates a metallic loopback of the physical T1 network interface. Initiates a loopback of the T1 framer (CSU portion) of the T1 network interface.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Functional Notes
The following diagram depicts the difference between a line and payload loopback.
T1 Network Interface
NI CSU DS1 Payload Loopback Line Loopback
Usage Examples
The following example initiates a payload loopback of the T1 interface: (config)#interface t1 1/1 (config-t1 1/1)#loopback network payload
60000CRG0-35B
1699
Syntax Description
fdl Uses the facility data link (FDL) to initiate a full 1.544 Mbps physical (metallic) loopback of the signal received by the remote unit from the network. Uses the inband channel to initiate a full 1.544 Mbps physical (metallic) loopback of the signal received by the remote unit from the network.
inband
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Functional Notes
The following diagram depicts the difference between a line and payload loopback.
T1 Network Interface
NI CSU DS1 Payload Loopback Line Loopback
Usage Examples
The following example initiates a remote line loopback using the FDL: (config)#interface t1 1/1 (config-t1 1/1)#loopback remote line fdl
60000CRG0-35B
1700
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Functional Notes
The following diagram depicts the difference between a line and payload loopback.
T1 Network Interface
NI CSU DS1 Payload Loopback Line Loopback
Usage Examples
The following example initiates a remote payload loopback: (config)#interface t1 1/1 (config-t1 1/1)#loopback remote payload
60000CRG0-35B
1701
remote-alarm rai
The remote-alarm rai command selects the alarm signaling type to be sent when a loss of frame is detected on the T1 receive signal. Use the no form of this command to disable all transmitted alarms. Syntax Description
rai Specifies sending a remote alarm indication (RAI) in response to a loss of frame. Also, prevents a received RAI from causing a change in interface operational status.
Default Values
The default for this command is rai.
Command History
Release 7.1 Command was expanded to include the T1 interface.
Usage Examples
The following example enables transmission of RAI in response to a loss of frame: (config)#interface t1 1/1 (config-t1 1/1)#remote-alarm rai
60000CRG0-35B
1702
remote-loopback
Use the remote-loopback command to configure the interface to respond to loopbacks initiated by a remote unit (or the service provider). Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, all interfaces respond to remote loopbacks.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example enables remote loopbacks on the T1 interface: (config)#interface t1 1/1 (config-t1 1/1)#remote-loopback
60000CRG0-35B
1703
Default Values
By default, the dsx1LineStatusChangeTrapEnable object identifier (OID) is set to enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 11.1 Command was introduced.
Functional Notes
The snmp trap line-status command is used to control the RFC 2495 dsx1LineStatusChangeTrapEnable OID (OID number 1.3.6.1.2.1.10.18.6.1.17.0).
Usage Examples
The following example disables the line-status trap on the T1 interface: (config)#interface t1 1/1 (config-t1 1/1)#no snmp trap line-status
60000CRG0-35B
1704
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the T1 interface: (config)#interface t1 1/1 (config-t1 1/1)#no snmp trap link-status
60000CRG0-35B
1705
Default Values
By default, the adGenAOSDs1ThresholdReached object identifier (OID) is disabled for all interfaces.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example disables SNMP threshold reached trap on the T1 interface: (config)#interface t1 1/1 (config-t1 1/1)#no snmp trap threshold-reached
60000CRG0-35B
1706
system-timing
Use the system-timing command to configure the Rx clock as the primary or secondary timing source for the system. Use the no form of this command to disable this feature.Variations of this command include:
system-timing primary system-timing secondary
Syntax Description
primary secondary Specifies the Rx clock as the primary timing source. Specifies the Rx clock as the secondary timing source.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example configures the T1 interface to provide its Rx clock as the primary timing source for the system: (config)#interface t1 1/1 (config-t1 1/1)#system timing primary
60000CRG0-35B
1707
tdm-group <number>
Use the tdm-group command to create a group of contiguous level zero digital signals (DS0s) on this interface to be used during the cross-connect process. Refer to cross-connect on page 65 for related information. Use the no form of this command to remove configured time division multiplexing (TDM) groups. Variations of this command include:
tdm-group <number> timeslots <value> tdm-group <number> timeslots <value> speed [56 | 64]
Syntax Description
<number> timeslots <value> Identifies the created TDM group. Valid range is 1 to 255. Specifies the channels to be used in the TDM group. Valid range is 1 to 31. The timeslot value can be entered as a single number representing one of the 31 E1 channel timeslots or as a contiguous group of channels. (For example, 1-10 specifies the first 10 channels of the E1.) Optional. Specifies the individual DS0 rate on the T1 interface to be 64 kbps. Only the T1 + DSX-1 network interface module (NIM) supports the 56 kbps DS0 rate. The default speed is 64 kbps.
Default Values
By default, there are no configured TDM groups.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example creates a TDM group (labeled 5) of 10 DS0s at 64 kbps each: (config)#interface t1 1/1 (config-t1 1/1)#tdm-group 5 timeslots 1-10 speed 64
60000CRG0-35B
1708
test-pattern
Use the test-pattern command to activate the built-in pattern generator and begin sending the specified test pattern. This pattern generation can be used to verify a data path when used in conjunction with an active loopback. Use the no form of this command to cease pattern generation. Variations of this command include:
test-pattern clear test-pattern errors test-pattern insert test-pattern ones test-pattern p215 test-pattern p220 test-pattern p511 test-pattern qrss test-pattern zeros
Syntax Description
clear errors insert ones p215 p220 p511 qrss zeros Clears the test pattern error count. Displays the test pattern errored seconds. Inserts an error into the currently active test pattern. Generates a test pattern of continuous ones. Generates a pseudorandom test pattern sequence based on a 15-bit shift register. Generates a pseudorandom test pattern sequence based on a 20-bit shift register. Generates a test pattern of repeating ones and zeros. Generates a test pattern of random ones and zeros. Generates a test pattern of continuous zeros.
Default Values
No default values are necessary for this command.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example activates the pattern generator for a stream of continuous ones: (config)#interface t1 1/1 (config-t1 1/1)#test-pattern ones
60000CRG0-35B
1709
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. clock source on page 1711 coding b3zs on page 1712 framing on page 1713 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1714 line-length on page 1715 loopback network on page 1716 loopback remote on page 1717 remote-loopback on page 1718 snmp trap link-status on page 1719 test-pattern on page 1720
60000CRG0-35B
1710
clock source
Use the clock source command to configure the source timing used for the interface. The clock specified using the clock source command is also the system master clock. Use the no form of this command to return to the default value. Variations of this command include:
clock source local clock source loop
Syntax Description
local loop Configures the unit to provide clocking using the internal oscillator. Configures the unit to recover clocking from the T3 circuit.
Default Values
By default, all T3 interfaces are configured with loop as the clock source.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example configures the unit to recover clocking from the circuit: (config)#interface t3 1/1 (config-t3 1/1)#clock source loop
60000CRG0-35B
1711
coding b3zs
Use the coding b3zs command to configure the line coding for a T3 physical interface. This setting must match the line coding supplied on the circuit by the service provider. Syntax Description
b3zs Configures the line coding for bipolar three zero substitution (B3ZS).
Default Values
By default, all T3 interfaces are configured with b3zs line coding.
Command History
Release 6.1 Command was introduced.
Functional Notes
The line coding configured in the unit must match the line coding of the T3 circuit. A mismatch will result in line errors (e.g., bipolar violations (BPVs)).
Usage Examples
The following example configures the T1 interface for b3zs line coding: (config)#interface t3 1/1 (config-t3 1/1)#coding b3zs
60000CRG0-35B
1712
framing
Use the framing command to configure the network framing format for a T3 physical interface. Use the no form of this command to return to the default value. Variations of this command include:
framing cbit framing m13
Syntax Description
cbit m13 Configures the interface for C-bit parity framing. Configures the interface for M13 framing.
Default Values
By default, all T3 interfaces are configured for cbit parity framing.
Command History
Release 6.1 Command was introduced.
Functional Notes
M13 is an asynchronous framing format that uses all 21 DS3 M-Frame C-bits for bit stuffing indicators. End-to-end path parity and datalink capabilities are not provided by the standard M13 format. C-bit parity framing differs from M13 by allowing monitoring of the data path (end-to-end) and supporting out-of-band (OOB) data links.
Usage Examples
The following example configures the T3 interface for m13 framing: (config)#interface t3 1/1 (config-t3 1/1)#framing m13
60000CRG0-35B
1713
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface t3 1/1 (config-t3 1/1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1714
line-length
Use the line-length command to configure the line length for a T3 physical interface. Use the no form of this command to return to the default value. Variations of this command include:
line-length long line-length short
Syntax Description
long short Configures the line length for a distance of 225 to 450 feet of cable. Configures the line length for a distance of 0 to 225 feet of cable.
Default Values
By default, all T3 interfaces are configured for a short line length.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example configures the T3 interface for long line length: (config)#interface t3 1/1 (config-t3 1/1)#line-length long
60000CRG0-35B
1715
loopback network
Use the loopback network command to initiate a local T3 loopback on the interface toward the network. Use the no form of this command to deactivate the loopback. Variations of this command include:
loopback network line loopback network payload
Syntax Description
line payload Initiates a loopback of the physical T3 network interface; that is, data received on the T3 is transmitted back out on the T3. Initiates a loopback of the T3 framer (TSU portion) of the T3 network interface.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example initiates a payload loopback of the T3 interface: (config)#interface t3 1/1 (config-t3 1/1)#loopback network payload
60000CRG0-35B
1716
loopback remote
Use the loopback remote command to initiate a loopback test on the T3 interface that sends a remote loopback code out the T3 circuit to loop up the far end. This command only applies when C-bit framing is used on the circuit. Use the no form of this command to deactivate the loopback. Variations of this command include:
loopback remote line loopback remote payload
Syntax Description
line payload Initiates a line loopback. Initiates a payload loopback.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Command was introduced.
Usage Examples
This example initiates a remote loopback on the T3 interface: (config)#interface t3 1/1 (config-t3 1/1)#loopback remote
60000CRG0-35B
1717
remote-loopback
Use the remote-loopback command to configure the T3 interface to be looped from the far end (remote device, Telco, etc.). Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, all interfaces respond to remote loopbacks.
Command History
Release 6.1 Command was introduced.
Usage Examples
This example enables remote loopbacks on the T3 interface: (config)#interface t3 1/1 (config-t3 1/1)#remote-loopback
60000CRG0-35B
1718
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high link data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface.
Usage Examples
The following example disables the link-status trap on the T3 interface: (config)#interface t3 1/1 (config-t3 1/1)#no snmp trap link-status
60000CRG0-35B
1719
test-pattern
Use the test-pattern command to activate the built-in pattern generator and begin sending the selected test pattern toward the network. This pattern generation can verify a data path when used in conjunction with an active loopback. Use the no form of this command to cease pattern generation. Variations of this command include:
test-pattern clear test-pattern errors test-pattern insert test-pattern ones test-pattern p215 test-pattern p223 test-pattern zeros
Syntax Description
clear errors insert ones p215 p223 zeros Clears the test pattern error count. Displays the test pattern error count. Inserts an error into the currently active test pattern. Generates a test pattern of continuous ones. Generates a pseudorandom test pattern sequence based on a 15-bit shift register. Generates a pseudorandom test pattern sequence based on a 23-bit shift register. Generates a test pattern of continuous zeros.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example enables a p215 test pattern: (config)#interface t3 1/1 (config-t3 1/1)#test-pattern p215
60000CRG0-35B
1720
60000CRG0-35B
1721
By default, ATM interfaces are created as point-to-point links. This default setting cannot be altered. The following command creates the exact same interface as that mentioned above:
>enable #configure terminal (config)#interface atm 1 point-to-point (config-atm 1)#
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1723 rtp quality-monitoring on page 1724 snmp trap on page 1725 snmp trap link-status on page 1726
60000CRG0-35B
1722
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface atm 1 (config-atm 1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1723
rtp quality-monitoring
Use the rtp quality-monitoring command to enable voice quality monitoring (VQM) of the Realtime Transport Protocol (RTP) voice stream packets on this interface. If the global command (ip rtp quality-monitoring) is disabled when this command is issued, the system will return the following warning: Applied but not used, you must globally enable ip rtp quality-monitoring to use VQM. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, VQM is enabled on all wide area network (WAN) and local area network (LAN) interfaces.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables RTP quality monitoring on the asynchronous transfer mode (ATM) interface: (config)#interface atm 1 (config-atm 1)#rtp quality-monitoring
60000CRG0-35B
1724
snmp trap
Use the snmp trap command to enable all supported Simple Network Management Protocol (SNMP) traps on the interface. Use the no form of this command to disable this trap. Syntax Description
No subcommands.
Default Values
By default, all interfaces (except virtual Frame Relay interfaces and subinterfaces) have SNMP traps enabled.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 8.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the port channel and virtual local area network (VLAN) interfaces. Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the tunnel interface.
Usage Examples
The following example enables SNMP on the ATM interface: (config)#interface atm 1 (config-atm 1)#snmp trap
60000CRG0-35B
1725
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the ATM interface: (config)#interface atm 1 (config-atm 1)#no snmp trap link-status
60000CRG0-35B
1726
By default, ATM subinterfaces are created as point-to-point links. This default setting cannot be altered. The following command creates the exact same interface as that mentioned above:
>enable #configure terminal (config)#interface atm 1.1 point-to-point (config-atm 1.1)#
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. atm routed-bridged ip on page 1729 bandwidth <value> on page 1730 bridge-group <value> on page 1731 cos on page 1732 crypto map <name> on page 1734 dial-backup commands begin on page 1736 dynamic-dns on page 1753 encapsulation on page 1755 fair-queue on page 1756 hold-queue <value> out on page 1757 ip commands begin on page 1758
60000CRG0-35B
1727
ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1799 max-reserved-bandwidth <value> on page 1800 media-gateway ip on page 1801 oam retry on page 1802 oam-pvc managed on page 1803 pvc <VPI/VCI> on page 1804 qos-policy on page 1805 snmp trap on page 1807 snmp trap link-status on page 1808 spanning-tree commands begin on page 1809 vrf forwarding <name> on page 1815
60000CRG0-35B
1728
atm routed-bridged ip
Use the atm routed-bridged ip command to enable IP routed bridge encapsulation (RBE) on an interface. Use the no form of this command to disable RBE operation. Syntax Description
No subcommands.
Default Values
By default, RBE is disabled.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example enables RBE: (config)#interface atm 1.1 (config-atm 1.1)#atm routed-bridged ip
60000CRG0-35B
1729
bandwidth <value>
Use the bandwidth command to provide the bandwidth value of an interface to the higher level protocols. This value is used in cost calculations. Use the no form of this command to restore the default value. Syntax Description
<value> Specifies bandwidth in kbps. Range is 1 to 4294967295 kbps.
Default Values
To view the default values, use the show interfaces command.
Command History
Release 3.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
The bandwidth command is an informational value that is communicated to the higher level protocols to be used in cost calculations. This is a routing parameter only and does not affect the physical interface.
Usage Examples
The following example sets bandwidth of the ATM subinterface to 10 Mbps: (config)#interface atm 1.1 (config-atm 1.1)#bandwidth 10000
60000CRG0-35B
1730
bridge-group <value>
Use the bridge-group command to assign an interface to the specified bridge group. Use the no form of this command to remove the interface from the bridge group. Syntax Description
<value> Specifies the bridge group (by number) to which to assign this interface. Range is 1 to 255.
Default Values
By default, there are no configured bridge groups.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
A bridged network can provide excellent traffic management to reduce collisions and limit the amount of bandwidth wasted with unnecessary transmissions when routing is not necessary. Any two interfaces can be bridged (Ethernet to T1, Ethernet to Frame Relay subinterface).
Usage Examples
The following example assigns the ATM subinterface labeled 1.1 to bridge group 1: (config)#interface atm 1.1 (config-atm 1.1)#bridge-group 1
60000CRG0-35B
1731
cos
Use the cos command to define class of service (CoS) settings on an asynchronous transfer mode (ATM) subinterface. Use the no form of this command to remove the parameters. Variations of this command include:
cos ubr cos vbr-nrt <pcr> <scr> <mbs> cos vbr-rt <pcr> <scr> <mbs>
Syntax Description
ubr vbr-nrt vbr-rt <pcr> <scr> Indicates unspecified bit rate (UBR) for the CoS. Specifies the variable bit rate (VBR) nonreal time (NRT) peak cell rate (PCR), sustained cell rate (SCR), and maximum burst size (MBS). Specifies the variable bit rate real time (RT) peak cell rate, sustained cell rate, and maximum burst size. Indicates the peak cell rate or maximum number of cells per second the connection can transfer into the network. Valid range is 32 to 50000 kbps. Indicates the sustained cell rate or average number of cells per second that the connection can transfer into the network. Valid range is 32 to 50000 kbps. Indicates the maximum burst size of cells allowed on the connection. Valid range is 3 to 65535.
<mbs>
Default Values
The default setting for this feature is cos ubr.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example defines variable bit rate real time on the ATM subinterface 1.2: (config)#interface atm 1.2 point-to-point (config-atm 1.2)#no shutdown (config-atm 1.2)#pvc 1/101 (config-atm 1.2)#ip address 10.23.107.35 255.255.255.240 (config-atm 1.2)#COS VBR-rt 2304 1024 3 (config-atm 1.2)#bandwidth 2304
60000CRG0-35B
1732
The following example defines unspecified bit rate on the ATM subinterface 1.3: (config)#interface atm 1.3 point-to-point (config-atm 1.3)#no shutdown (config-atm 1.3)#pvc 1/102 (config-atm 1.3)#ip address 10.23.107.51 255.255.255.240 (config-atm 1.3)#COS UBR (config-atm 1.3)#bandwidth 1024
60000CRG0-35B
1733
For virtual private network (VPN) configuration example scripts, refer to the VPN configuration guide available on the AOS Documentation CD shipped with your product.
Syntax Description
<name> Specifies the crypto map name that you wish to assign to the interface.
Default Values
By default, no crypto maps are assigned to an interface.
Command History
Release 4.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
When configuring a system to use both the stateful inspection firewall and Internet key exchange (IKE) negotiation for VPN, keep the following notes in mind. When defining the policy class and associated access control lists (ACLs) that describe the behavior of the firewall, do not forget to include the traffic coming into the system over a VPN tunnel terminated by the system. The firewall should be set up with respect to the unencrypted traffic that is destined to be sent or received over the VPN tunnel. The following diagram represents typical AOS data-flow logic.
60000CRG0-35B
1734
IPSec Decrypt/Discard
IPSec Encrypt
NAT/ACP/ Firewall
Router
As shown in the diagram above, data coming into the product is first processed by the static filter associated with the interface on which the data is received. This access group is a true static filter and is available for use regardless of whether the firewall is enabled or disabled. Next (if the data is encrypted), it is sent to the IPSec engine for decryption. The decrypted data is then processed by the stateful inspection firewall. Therefore, given a terminating VPN tunnel, only unencrypted data is processed by the firewall. The ACLs for a crypto map on an interface work in reverse logic to the ACLs for a policy class on an interface. When specifying the ACLs for a crypto map, the source information is the private local side, unencrypted source of the data. The destination information will be the far-end, unencrypted destination of the data. However, ACLs for a policy class work in reverse. The source information for the ACL in a policy class is the far end. The destination information is the local side.
Usage Examples
The following example applies all crypto maps with the name MyMap to the ATM subinterface: (config)#interface atm 1.1 (config-atm 1.1)#crypto map MyMap
60000CRG0-35B
1735
dial-backup auto-backup
Use the dial-backup auto-backup command to configure the subinterface to automatically attempt a dial backup upon failure. Use the no form of this command to disable this feature. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 1739. Syntax Description
No subcommands.
Default Values
By default, all backup endpoints will automatically attempt dial backup upon a failure.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example enables automatic dial backup on the endpoint: (config)#interface atm 1.1 (config-atm 1.1)#dial-backup auto-backup
60000CRG0-35B
1736
dial-backup auto-restore
Use the dial-backup auto-restore command to configure the subinterface to automatically discontinue dial backup when all network conditions are operational. Use the no form of this command to disable the auto-restore feature. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 1739. Syntax Description
No subcommands.
Default Values
By default, all backup endpoints will automatically restore the primary connection when the failure condition clears.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example configures AOS to automatically restore the primary connection when the failure condition clears: (config)#interface atm 1.1 (config-atm 1.1)#dial-backup auto-restore
60000CRG0-35B
1737
Default Values
By default, the dial-backup backup-delay period is set to 10 seconds.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example configures AOS to wait 60 seconds (on an endpoint with an active alarm condition) before attempting dial-backup operation: (config)#interface atm 1.1 (config-atm 1.1)#dial-backup backup-delay 60
60000CRG0-35B
1738
dial-backup call-mode
Use the dial-backup call-mode command to specify whether the configured backup interface answers or originates (or a combination of both) backup calls. Use the no form of this command to return to the default value. Variations of this command include:
dial-backup call-mode answer dial-backup call-mode answer-always dial-backup call-mode originate dial-backup call-mode originate-answer dial-backup call-mode originate-answer-always
Syntax Description
answer answer-always originate originate-answer originate-answer-always Answers and backs up primary link on failure. Answers and backs up regardless of primary link state. Originates backup call on primary link failure. Originates or answers call on primary link failure. Originates on failure; answers and backs up always.
Default Values
By default, the dial-backup call-mode is set to originate-answer.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
The majority of the configuration for AOS dial-backup implementation is configured via the dial-backup Point-to-Point Protocol (PPP) interface configuration commands. However, the numbers dialed are configured in the primary interface. Full sample configurations follow: Sample configuration for remote router (dialing out) hostname Remote3200 enable password adtran ! interface eth 0/1 ip address 192.168.1.254 255.255.255.0 no shutdown ! interface modem 1/3 no shutdown ! interface t1 1/1
60000CRG0-35B
1739
Command Reference Guide coding b8zs framing esf clock source line tdm-group 1 timeslots 1-24 no shutdown ! interface fr 1 point-to-point frame-relay lmi-type ansi no shutdown cross-connect 1 t1 1/1 1 fr 1 ! interface fr 1.16 point-to-point frame-relay interface-dlci 16 ip address 10.1.1.2 255.255.255.252 dial-backup call-mode originate dial-backup number 5551111 analog ppp1 dial-backup number 5552222 analog ppp1 no shutdown ! interface ppp 1 ip address 172.22.56.1 255.255.255.252 ppp authentication chap username remoter outer password remoteness ppp chap hostname local router ppp chap password adtran no shutdown ! ip route 192.168.2.0 255.255.255.0 172.22.56.2 255.255.255.252 ! line telnet 0 4 password password Sample configuration for central router (dialing in) hostname Central3200 enable password adtran ! interface eth 0/1 ip address 192.168.100.254 255.255.255.0 no shutdown ! interface modem 1/3 no shutdown ! interface t1 1/1 coding b8zs framing esf clock source line
60000CRG0-35B
1740
Command Reference Guide tdm-group 1 timeslots 1-24 no shutdown ! interface fr 1 point-to-point frame-relay lmi-type ansi no shutdown cross-connect 1 t1 1/1 1 fr 1 ! interface fr 1.100 point-to-point frame-relay interface-dlci 100 ip address 10.1.1.1 255.255.255.252 dial-backup call-mode answer dial-backup number 555-8888 analog ppp 1 ! interface ppp 1 ip address 172.22.56.2 255.255.255.252 ppp authentication chap username local router password adtran ppp chap hostname remote router ppp chap password remoteness no shutdown ! ip route 192.168.1.0 255.255.255.0 172.22.56.1 255.255.255.252 line telnet 0 4 password password
Usage Examples
The following example configures AOS to generate backup calls for this endpoint using an analog modem interface (to phone number 555 1111), but never answer calls and specifies ppp 2 as the backup interface: (config)#interface atm 1.1 (config-atm 1.1)#dial-backup call-mode originate (config-atm 1.1)#dial-backup number 555 1111 analog ppp 2
60000CRG0-35B
1741
Technology Review
This technology review provides information regarding specific dial-backup router behavior (i.e., when the router will perform dial backup, where in the configuration AOS accesses specific routing information, etc.): Dialing Out 1. AOS determines to place an outbound call when either the Layer 1 or Layer 2 has a failure. 2. When placing outbound calls, AOS matches the number dialed to a PPP interface. This is accomplished with an addition to the dial-backup number command (refer to dial-backup number on page 1746). 3. When placing the call, AOS uses the configuration of the related PPP interface for authentication and IP negotiation. 4. If the call fails to connect on the first number dialed, AOS places a call to the second number (if a second number is configured). The second number to be dialed references a separate PPP interface. Dialing In 1. AOS receives an inbound call on a physical interface. 2. Caller ID is used to match the dial-backup number command to the configured PPP interface. 3. If a match is found, the call connects and AOS pulls down the primary connection if it is not already in a down state. 4. If no match is found from caller ID, the call is terminated.
60000CRG0-35B
1742
Default Values
By default, the dial-backup connect-timeout period is set to 60 seconds.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example configures AOS to wait 120 seconds before retrying a failed dial-backup call: (config)#interface atm 1.1 (config-atm 1.1)#dial-backup connect-timeout 120
60000CRG0-35B
1743
dial-backup force
Use the dial-backup force command to manually override the automatic dial-backup feature. This can be used to force a link into backup to allow maintenance to be performed on the primary link without disrupting data. Use the no form of this command to return to the normal dial-backup operation state. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 1739. Variations of this command include:
dial-backup force backup dial-backup force primary
Syntax Description
backup primary Forces backup regardless of primary link state. Forces primary link regardless of its state.
Default Values
By default, this feature is disabled.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example configures AOS to force this endpoint into dial backup: (config)#interface atm 1.1 (config-atm 1.1)#dial-backup force backup
60000CRG0-35B
1744
Default Values
By default, the dial-backup maximum-retry period is set to 0 attempts.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example configures AOS to retry a dial-backup call 4 times before considering backup operation not available: (config)#interface atm 1.1 (config-atm 1.1)#dial-backup maximum-retry 4
60000CRG0-35B
1745
dial-backup number
Use the dial-backup number command to configure the phone number and the call type the router will dial upon network failure. Multiple entries can be made for an interface to allow alternate sites to be dialed. Use the no form of this command to disable this feature. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 1739. Variations of this command include:
dial-backup number <number> analog ppp <interface> dial-backup number <number> digital-56k <isdn min chan> <isdn max chan> ppp <interface> dial-backup number <number> digital-64k <isdn min chan> <isdn max chan> ppp <interface>
Syntax Description
<number> analog digital-56k digital-64k <isdn min chan> <isdn max chan> ppp <interface> Specifies the phone numbers to call when the backup is initiated. Indicates the number connects to an analog modem. Indicates the number belongs to a digital 56 kbps per DS0 connection. Indicates the number belongs to a digital 64 kbps per DS0 connection. Specifies the minimum number of DS0s required for a digital 56 or 64 kbps connection. Range is 1 to 24 DS0s. Specifies the maximum number of DS0s desired for a digital 56 or 64 kbps connection. Range is 1 to 24 DS0s. Specifies the Point-to-Point Protocol (PPP) interface to use as the backup for this interface (for example, ppp 1).
Default Values
By default, there are no configured dial-backup numbers.
Command History
Release 1.1 Release 8.1 Release 17.2 Release 17.3 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added. Command was expanded to include the cellular connections. Cellular connections were removed from this command.
Usage Examples
The following example configures AOS to dial 704-555-1212 (digital 64 kbps connection) to initiate dial-backup operation for this endpoint using the configured ppp 1 backup interface: (config)#interface atm 1.1 (config-atm 1.1)#dial-backup number 7045551212 digital-64k 1 1 ppp 1
60000CRG0-35B
1746
Default Values
By default, the dial-backup priority is set to 50.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example assigns the highest priority to this endpoint: (config)#interface atm 1.1 (config-atm 1.1)#dial-backup priority 100
60000CRG0-35B
1747
dial-backup randomize-timers
Use the dial-backup randomize-timers command to randomize the call timers to minimize potential contention for resources. Use the no form of this command to return to the default value. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 1739. Syntax Description
No subcommands.
Default Values
By default, AOS does not randomize the dial-backup call timers.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example configures AOS to randomize the dial-backup timers associated with this endpoint: (config)#interface atm 1.1 (config-atm 1.1)#dial-backup randomize-timers
60000CRG0-35B
1748
Default Values
By default, the dial-backup redial-delay period is set to 10 seconds.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example configures a redial delay of 25 seconds on this endpoint: (config)#interface atm 1.1 (config-atm 1.1)#dial-backup redial-delay 25
60000CRG0-35B
1749
Default Values
By default, the dial-backup restore-delay period is set to 10 seconds.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example configures AOS to wait 30 seconds before disconnecting dial-backup operation and restoring the primary connection for this endpoint: (config)#interface atm 1.1 (config-atm 1.1)#dial-backup restore-delay 30
60000CRG0-35B
1750
dial-backup schedule
Use the dial-backup schedule command to set the time of day that backup will be enabled. Use this command if backup is desired only during normal business hours and on specific days of the week. Use the no form of this command to disable dial backup (as specified). For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 1739. Variations of this command include:
dial-backup schedule day <name> dial-backup schedule enable-time <value> dial-backup schedule disable-time <value>
Syntax Description
day <name> enable-time <value> disable-time <value> Sets the days to allow backup. Valid range is Monday through Sunday. Sets the time of day to enable backup. Time is entered in a 24-hour format (00:00). Sets the time of day to disable backup. Time is entered in a 24-hour format (00:00).
Default Values
By default, dial backup is enabled for all days and times if the dial-backup auto-backup command has been issued and the dial-backup schedule has not been entered.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example enables dial backup Monday through Friday 8:00 a.m. to 7:00 p.m.: (config)#interface atm 1.1 (config-atm 1.1)#dial-backup schedule enable-time 08:00 (config-atm 1.1)#dial-backup schedule disable-time 19:00 (config-atm 1.1)#no dial-backup schedule day Saturday (config-atm 1.1)#no dial-backup schedule day Sunday
60000CRG0-35B
1751
dial-backup shutdown
Use the dial-backup shutdown command to deactivate all dial-backup functionality in the unit. Dial-backup configuration parameters are kept intact, but the unit will not initiate (or respond) to dial-backup sequences in the event of a network outage. Use the no form of this command to reactivate the dial-backup interface. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 1739. Syntax Description
No subcommands.
Default Values
By default, all AOS interfaces are disabled.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example deactivates the configured dial-backup interface: (config)#interface atm 1.1 (config-atm 1.1)#dial-backup shutdown
60000CRG0-35B
1752
dynamic-dns
Use the dynamic-dns command to configure Dynamic DNS service provided by Dynamic Network Services, Inc. (www.dyndns.org). Use the no form of this command to disable this feature. Variations of this command include:
dynamic-dns custom <hostname> <minutes> dynamic-dns dyndns <hostname> <username> <password> dynamic-dns dyndns-custom <hostname> <username> <password> dynamic-dns dyndns-static <hostname> <username> <password>
Syntax Description
<hostname> <minutes> Specifies the host name for the server that updates the dynamic domain naming system (DNS). Specifies the intervals in minutes to update the server with information (updates also occur when the interfaces IP address changes regardless of the update intervals). Specifies the user name. Specifies the password. Refer to Functional Notes below for additional argument descriptions.
<username> <password>
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 12.1 Command was introduced. Command was expanded.
Functional Notes
custom - Constanttime.coms Custom Dynamic DNSSM service allows you complete access and management control over your domain name regardless of where you purchased/registered it. This allows you to manage IP address mappings (A records), domain aliases (CNAME records), and mail servers (mail exchange (MX) records). dyndns - The Dynamic DNSSM offered by Dynamic Network Services, Inc. (DynDNS.org) allows you to alias a dynamic IP address to a static host name in various domains. This allows your unit to be more easily accessed from various locations on the Internet. This service is provided for up to five host names. dyndns-custom - DynDNS.org's Custom DNSSM service provides a full DNS solution, giving you complete control over an entire domain name. A Web-based interface provides two levels of control over your domain, catering to average or advanced users. Five globally redundant DNS servers ensure that your domain will always resolve.
60000CRG0-35B
1753
A choice of two interfaces is available. The basic interface is designed for most users. It comes preconfigured for most common configurations and allows for easy creation of most common record types. The advanced interface is designed for system administrators with a solid DNS background, and provides layout and functionality similar to a BIND zone file allowing for the creation of nearly any record type. Custom DNSSM can be used with both static and dynamic IPs, and has the same automatic update capability through Custom DNS-aware clients as Dynamic DNS. dyndns-static - The Static DNS service is similar to DynDNS.orgs Dynamic DNSSM service in that it allows a host name, such as yourname.dyndns.org, to point to your IP address. Unlike a Dynamic DNS host, a Static DNS host does not expire after 35 days without updates, but updates take longer to propagate through the DNS system. This service is provided for up to five host names. If your IP address does not change often or at all, but you still want an easy name to remember it by (without having to purchase your own domain name), Static DNS service is ideal for you. If you would like to use your own domain name (such as yourname.com), you need Custom DNS service that also provides full dynamic and static IP address support.
Usage Examples
The following example sets the Dynamic DNS to dyndns-custom with host name host, user name user, and password pass: (config)#interface atm 1.1 (config-atm 1.1)#dynamic-dns dyndns-custom host user pass
60000CRG0-35B
1754
encapsulation
Use the encapsulation command to configure the encapsulation type for the ATM Adaptation Layer (AAL) of the Asynchronous Transfer Mode (ATM) Protocol Reference Model. Use the no form of this command to return to the default setting. Variations of this command include:
encapsulation aal5mux ip encapsulation aal5mux ppp encapsulation aal5snap
Syntax Description
aal5mux ip aal5mux ppp aal5snap Specifies encapsulation type for multiplexed virtual circuits using the IP protocol. Specifies encapsulation type for multiplexed virtual circuits using the Point-to-Point Protocol (PPP). Specifies encapsulation type that supports LLC/SNAP protocols.
Default Values
By default, the encapsulation type is aal5snap.
Command History
Release 8.1 Command was introduced.
Functional Notes
For PPP and Point-to-Point Protocol over Ethernet (PPoE), the encapsulation type can be aal5snap or aal5mux ppp. For IP with no bridging, the encapsulation type can be aal5snap or aal5mux ip. For IP with bridging, the encapsulation type can only be aal5snap. For bridging, the encapsulation type can only be aal5snap.
Usage Examples
The following example sets the encapsulation type to aal5snap: (config)#interface atm 1.1 (config-atm 1.1)#encapsulation aal5snap
60000CRG0-35B
1755
fair-queue
Use the fair-queue command to enable weighted fair queuing (WFQ) on an interface. Use the no form of this command to disable WFQ and enable first in, first out (FIFO) queueing for an interface. Variations of this command include:
fair-queue fair-queue <value>
WFQ must be enabled on an interface to use priority queuing. By default, WFQ is enabled for all interfaces with maximum bandwidth speeds equivalent to T1/E1 and below.
Syntax Description
<value> Optional. Value that specifies the maximum number of packets that can be present in each conversation subqueue. Packets received for a conversation after this limit is reached are discarded. Range is 16 to 512 packets.
Default Values
By default, fair-queue is enabled with a threshold of 64 packets.
Command History
Release 5.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example enables WFQ on the interface with a threshold set at 100 packets: (config)#interface atm 1.1 (config-atm 1.1)#fair-queue 100
60000CRG0-35B
1756
Default Values
The default queue size for weighted fair queuing (WFQ) is 400. The default queue size for Point-to-Point Protocol (PPP) first in, first out (FIFO) and Frame Relay round-robin is 200.
Command History
Release 5.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example sets the overall output queue size to 700: (config)#interface atm 1.1 (config-atm 1.1)#hold-queue 700 out
60000CRG0-35B
1757
ip access-group <name>
Use the ip access-group command to create an access control list (ACL) to be used for packets transmitted on or received from the specified interface. Use the no form of this command to disable this type of control. Variations of this command include:
ip access-group <name> in ip access-group <name> out
Syntax Description
<name> in out Specifies the assigned IP ACL name. Enables access control on packets received on the specified interface. Enables access control on packets transmitted on the specified interface.
Default Values
By default, these commands are disabled.
Command History
Release 3.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
When this command is enabled, the IP destination address of each packet must be validated before being passed through. If the packet is not acceptable per these settings, it is dropped.
Usage Examples
The following example sets up the router to only allow Telnet traffic into the ATM subinterface: (config)#ip access-list extended TelnetOnly (config-ext-nacl)#permit tcp any any eq telnet (config-ext-nacl)#interface atm 1.1 (config-atm 1.1)#ip access-group TelnetOnly in
60000CRG0-35B
1758
ip access-policy <name>
Use the ip access-policy command to assign a specified access control policy (ACP) to an interface. ACPs are applied to traffic entering an interface. Use the no form of this command to remove an ACP association. For more information on using ACPs, refer to ip policy-class <ipv4 acp name> on page 985. Configured ACPs will only be active if the ip firewall command has been entered at the Global Configuration mode prompt to enable the AOS security features. All configuration parameters are valid, but no security data processing will be attempted unless the security features are enabled. Syntax Description
<name> Identifies the configured ACP by alphanumeric descriptor (all ACP descriptors are case sensitive).
Default Values
By default, there are no configured ACPs associated with an interface.
Command History
Release 2.1 Release 5.1 Release 6.1 Release 15.1 Release 17.9 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the virtual local area network (VLAN) interfaces. Command was expanded to include the bridged virtual interfaces (BVIs). Command was changed to require the ip keyword.
Functional Notes
To assign an ACP to an interface, enter the interface configuration mode for the desired interface and enter ip access-policy <name>.
Usage Examples
The following example associates the ACP PRIVATE (to allow inbound traffic to the Web server) to the ATM subinterface 1.1: Enable the AOS security features: (config)#ip firewall Associate the access policy with the ATM subinterface 1.1: (config)#interface atm 1.1 (config-atm 1)#ip access-policy PRIVATE
60000CRG0-35B
1759
ip address dhcp
Use the ip address dhcp command to use Dynamic Host Configuration Protocol (DHCP) to obtain an address on the interface. Use the no form of this command to remove a configured IP address (using DHCP) and disable DHCP operation on the interface. Variables that may be used with this command to further define the DHCP configuration include:
ip address dhcp client-id [<interface> | <identifier>] [hostname <string>] [track <name>] [<administrative distance>] ip address dhcp hostname <string> [no-default-route | no-domain-name | no-nameservers] [track <name>] [<administrative distance>] ip address dhcp [no-default-route | no-domain-name | no-nameservers] [track <name>] [<administrative distance>] ip address dhcp track <name> [<administrative distance>]
Syntax Description
<administrative distance> Optional. Specifies the administrative distance to use when adding the DHCP gateway into the route table. It is used to determine the best route when multiple routes to the same destination exist. The lower the administrative distance, the more reliable the route. Range is 1 to 255. Optional. Specifies the client identifier used when obtaining an IP address from a DHCP server. Specifies an interface, thus defining the client identifier as the hexadecimal medium access control (MAC) address of the specified interface (including a hexadecimal number added to the front of the MAC address to identify the media type). For example, specifying the client-id ethernet 0/1 (where the Ethernet interface has a MAC address of d217.0491.1150) defines the client identifier as 01:d2:17:04:91:11:50 (where 01 defines the media type as Ethernet). Refer to hardware-address on page 2704 for a detailed listing of media types. <identifier> Specifies a custom client-identifier using a text string (that is converted to a hexadecimal equivalent) or 7 to 28 hexadecimal numbers (with colon delimiters). For example, a custom client identifier of 0f:ff:ff:ff:ff:51:04:99:a1 may be entered using the <identifier> option. hostname <string> Optional. Specifies a text string (to override the global router name) to use as the name in the DHCP option 12 field. The string is enclosed in quotation marks and can consist of up to 35 characters. Optional. Specifies that no default route is obtained via DHCP. Optional. Specifies that no domain name is obtained via DHCP. Optional. Specifies that no domain naming system (DNS) servers are obtained via DHCP.
client-id <interface>
60000CRG0-35B
1760
ATM Subinterface Command Set Optional. Attaches a network monitoring track to the DHCP client. The DHCP gateway route for this client will only reside in the route table while the track is in the pass state. For more information on configuring track objects, refer to track <name> on page 1251.
Default Values
<administrative distance> client-id By default, the administrative distance value is 1. Optional. By default, the client identifier is populated using the following formula: TYPE: INTERFACE SPECIFIC INFO : MAC ADDRESS Where TYPE specifies the media type in the form of one hexadecimal byte (refer to hardware-address on page 2704 for a detailed listing of media types), and the MAC ADDRESS is the medium access control (MAC) address assigned to the first Ethernet interface in the unit in the form of six hexadecimal bytes. (For units with a single Ethernet interface, the MAC ADDRESS assigned to Ethernet 0/1 is used in this field.) INTERFACE SPECIFIC INFO is only used for Frame Relay interfaces and can be determined using the following: FR_PORT#: Q.922 ADDRESS Where the FR_PORT# specifies the label assigned to the virtual Frame Relay interface using four hexadecimal bytes. For example, a virtual Frame Relay interface labeled 1 would have a FR_PORT# of 00:00:00:01. The Q.922 ADDRESS field is populated using the following:
C/R EA DE EA
Where the FECN, BECN, C/R, DE, and high order extended address (EA) bits are assumed to be 0 and the lower order EA bit is set to 1. The following list provides a few example DLCIs and associated Q.922 address: DLCI (decimal) / Q.922 address (hex) 16 / 0x0401 50 / 0x0C21 60 / 0x0CC1 70 / 0x1061 80 / 0x1401 hostname <string> By default, the host name is the name configured using the Global Configuration hostname command.
60000CRG0-35B
1761
Command History
Release 2.1 Release 8.1 Release 13.1 Release A4.01 Command was introduced. Command was expanded to include the asynchronous transfer mode (ATM) subinterface. Command was expanded to include the track and administrative distance. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
Functional Notes
DHCP allows interfaces to acquire a dynamically assigned IP address from a configured DHCP server on the network. Many Internet service providers (ISPs) require the use of DHCP when connecting to their services. Using DHCP reduces the number of dedicated IP addresses the ISP must obtain. Consult your ISP to determine the proper values for the client-id and hostname fields.
Usage Examples
The following example enables DHCP operation on the ATM subinterface 1.1: (config)#interface atm 1.1 (config-atm 1.1)#ip address dhcp The following example enables DHCP operation on the ATM subinterface 1.1 utilizing host name adtran and does not allow obtaining a default route, domain name, or name servers. It also sets the administrative distance as 5: (config)#interface atm 1.1 (config-atm 1.1)#ip address dhcp hostname adtran no-default-route no-domain-name no-nameservers 5
60000CRG0-35B
1762
Syntax Description
<ip address> <subnet mask> Specifies a valid IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IP addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Optional. Configures a secondary IP address for the specified interface.
secondary
Default Values
By default, there are no assigned IP addresses.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a secondary IP address of 192.22.72.101 255.255.255.252: (config)#interface atm 1.1 (config-atm 1.1)#ip address 192.22.72.101 255.255.255.252 secondary
60000CRG0-35B
1763
Default Values
By default, no IP address range is defined.
Command History
Release 17.4 Command was introduced.
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a range of secondary IP address from 192.22.72.1 to 192.22.72.10 on subnet 255.255.255.252: (config)#interface atm 1.1 (config-atm 1.1)#ip address range 192.22.72.1 192.22.72.10 255.255.255.252 secondary
60000CRG0-35B
1764
ip dhcp
Use the ip dhcp command to release or renew the Dynamic Host Configuration Protocol (DHCP) IP address. This command is only applicable when using DHCP for IP address assignment. Variations of this command include:
ip dhcp release ip dhcp renew
Syntax Description
release renew Releases DHCP IP address. Renews DHCP IP address.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example releases the IP DHCP address for the ATM subinterface 1.1: (config)#interface atm 1.1 (config-atm 1.1)#ip dhcp release
60000CRG0-35B
1765
ip directed-broadcast
Use the ip directed-broadcast command to allow reception/forwarding of directed broadcasts. Use the no form of this command to disable this feature. Variations of this command include:
ip directed-broadcast ip directed-broadcast <name>
Syntax Description
<name> Specifies IP access control list (ACL) name.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Command was introduced.
Functional Notes
A directed broadcast is a packet intended for all nodes on a nonlocal network. For example, the broadcast address 255.255.255.255 reaches all nodes on a network; the directed broadcast address 128.1.255.255 is intended for all nodes whose network address is 128.1.0.0. A router not directly attached to 128.1.0.0 simply forwards the directed broadcast packet to the next hop. A router on network 128.1.0.0 that has ip directed-broadcast enabled, accepts and forwards the packet to all nodes whose network address is 128.1.0.0. Routers connecting subnets of 128.1.0.0 also accept and forward the packet to the nodes on their respective subnets. When a directed broadcast packet reaches a router that is directly connected to its destination subnet, that packet is distributed as a broadcast on the destination subnet. The packet is then sent as a link-layer broadcast. The ip directed-broadcast command controls the distribution of directed broadcasts when they reach their target subnets. Only the final transmission of the directed broadcast on its ultimate destination subnet is affected. It does not affect the transit unicast routing of IP directed broadcasts. If ip directed-broadcast is enabled for this interface, incoming IP packets whose addresses identify them as directed broadcasts intended for the subnet to which this interface is attached will be forwarded as broadcasts on that subnet. Forwarding of the packets can be limited by specifying an ACL with this command. In this case, only directed broadcasts that are permitted by the specified ACL will be forwarded, and all other directed broadcasts directed to this interface subnet will be dropped. Disabling the ip directed-broadcast command will cause directed broadcasts destined for the subnet to which this interface is attached to be dropped. This option is a requirement for routers as described in RFC 1812, section 4.2.2.11. Furthermore, it is disabled by default (RFC 2644), with the intended goal of reducing the efficacy of certain types of denial of service (DoS) attacks.
60000CRG0-35B
1766
Usage Examples
The following example enables forwarding of directed broadcasts on the interface atm 1.1: (config)#interface atm 1.1 (config-atm 1.1)#ip directed-broadcast
60000CRG0-35B
1767
ip ffe
Use the ip ffe command to enable the RapidRoute Engine on this interface with the default number of entries. Use the no form of this command to disable this feature. Variations of this command include:
ip ffe ip ffe max-entries <value>
Issuing this command will cause all RapidRoute entries on this interface to be cleared.
Syntax Description
max-entries <value> Optional. Specifies the maximum number of entries stored in the flow table. Valid range is from 1 to 8192.
Default Values
By default, the RapidRoute Engine is disabled. The default number of max-entries is 4096.
Command History
Release 13.1 Release 17.6 Command was introduced. Command was expanded to include the high level data link control (HDLC) and tunnel interfaces.
Functional Notes
RapidRoute can be used to help reduce routing overhead, and thus reduce overall routing times. Routing times are reduced by the creation of a flow table on the ingress interface. The maximum number of entries that can be stored in the flow table at any one time may be specified by using the max-entries parameters.
Usage Examples
The following example enables RapidRoute and sets the maximum number of entries in the flow table to 50: (config)#interface atm 1.1 (config-atm 1.1)#ip ffe max-entries 50
60000CRG0-35B
1768
Technology Review
The RapidRoute system goal is to increase IP packet throughput by moving as much of the packet processing into the engine as possible. Packets are classified into flows based upon the IP protocol (Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), etc.), the source and destination IP addresses, IP type of service (ToS), and the protocol-specific information, such as the source and destination port numbers. Flows are defined as the unidirectional representation of a conversation between two IP hosts. Each ingress interface keeps its own flow table, a collection of flow entries. The first packet in a flow that is forwarded through the unit will build a flow entry. When a flow entry is looked up but no entry is found, a RapidRouteBuilder object is allocated and attached to the packet. As the packet passes through the various processing layers, each subsystem will add processing to the RapidRouteBuilder. When packet is about to be forwarded out of the egress interface, the RapidRouteBuilder will be finalized. That is, the flow entry being built will be checked for completeness and committed to the flow table on the ingress interface. Subsequent flow matches can then bypass the normal processing layers.
60000CRG0-35B
1769
ip flow
Use the ip flow command to enable integrated traffic monitoring (ITM) for all traffic received or forwarded on an interface. Use the no form of this command to disable traffic monitoring. Variations of this command include:
ip flow egress ip flow egress <name> ip flow ingress ip flow ingress <name>
Syntax Description
egress ingress <name> Specifies that all outgoing traffic be monitored. Specifies that all incoming traffic be monitored. Optional. Specifies the name of an access control list (ACL) to use for filtering traffic.
Default Values
By default, no traffic monitoring is enabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables traffic monitoring on an atm subinterface to monitor incoming traffic through an ACL called myacl: (config)#interface atm 1.1 (config-atm 1.1)#ip flow ingress myacl
60000CRG0-35B
1770
Default Values
By default, broadcast UDP packets are not forwarded.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
When used in conjunction with the ip forward-protocol command, the ip helper-address feature allows you to customize which broadcast packets are forwarded. To implement the helper address feature, assign an address(es) (specifying the device that needs to receive the broadcast traffic) to the interface closest to the host that transmits the broadcast packets. When broadcast packets (of the specified type forwarded using the ip forward-protocol command) are received on the interface, they will be forwarded to the device that needs the information. Only packets meeting the following criteria are considered eligible by the ip helper-address feature: 1. The packet IP protocol is UDP. 2. Any UDP port specified using the ip forward-protocol command. 3. The medium access control (MAC) address of the frame is an all-ones broadcast address (ffff.ffff.ffff). 4. The destination IP address is broadcast defined by all ones (255.255.255.255) or a subnet broadcast (for example, 192.33.4.251 for the 192.33.4.248 /30 subnet).
60000CRG0-35B
1771
Usage Examples
The following example forwards all domain naming system (DNS) broadcast traffic to the DNS server with IP address 192.33.5.99: (config)#ip forward-protocol udp domain (config)#interface atm 1.1 (config-atm 1.1)#ip helper-address 192.33.5.99
60000CRG0-35B
1772
ip igmp
Use the ip igmp command to configure multicasting related functions for the interface. Variations of this command include:
ip igmp immediate-leave ip igmp last-member-query-interval <milliseconds> ip igmp querier-timeout <seconds> ip igmp query-interval <seconds> ip igmp query-max-response-time <seconds> ip igmp static-group <address> ip igmp version [1 | 2]
Syntax Description
immediate-leave Specifies that if only one host (or Internet Group Management Protocol (IGMP) snooping switch) is connected to the interface, when a leave is received, multicast of that group is immediately terminated as opposed to sending a group query and timing out the group if no device responds. Works in conjunction with ip igmp last-member-query-interval. Applies to all groups when configured. Use the no form of this command to disable the immediate-leave feature. Controls the timeout (in milliseconds) used to detect whether any group receivers remain on an interface after a receiver leaves a group. If a receiver sends a leave-group message (IGMP Version 2), the router sends a group-specific query on that interface. After twice the time specified by this command plus as much as one second longer, if no receiver responds, the router removes that interface from the group and stops sending that group's multicast packets to the interface. Range is 100 to 65535 ms. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) that the router waits after the current queriers last query before it takes over as querier (IGMP Version 2). Range is 60 to 300 seconds. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) at which IGMP queries are sent on an interface. Host query messages are addressed to the all-hosts multicast group with an IP time to live (TTL) of 1. The router uses queries to detect whether multicast group members are on the interface and to select an IGMP designated router (DR) for the attached segment (if more than one multicast router exists). Only the DR for the segment sends queries. For IGMP Version 2, the DR is the router with the lowest IP address on the segment. Range is 0 to 65535 seconds. Use the no form of this command to return to the default setting. Specifies the maximum response time (in seconds) advertised by this interface in queries when using IGMP Version 2. Hosts are allowed a random time within this period to respond, reducing response bursts. Use the no form of this command to return to the default setting.
last-member-query-interval <milliseconds>
querier-timeout <seconds>
query-interval <seconds>
query-max-response-time <seconds>
60000CRG0-35B
1773
Syntax Description
static-group <address> Configures the router's interface to be a statically connected member of the specified group. Packets received on the correct reverse path forwarding (RPF) interface are forwarded to this interface regardless of whether any receivers have joined the specified group using IGMP. Use the no form of this command to remove a configured static group. Sets the interfaces IGMP version. Use the no form of this command to return to the default setting.
version [1 | 2]
Default Values
ip igmp immediate-leave ip igmp last-member-query-interval ip igmp querier-timeout ip igmp query-interval ip igmp query-max-response-time ip igmp static-group ip igmp version No default 1000 milliseconds 2x the query-interval value 60 seconds 10 seconds No default Version 1
Command History
Release 7.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example sets the query message interval on the interface to 200 milliseconds: (config)#interface atm 1.1 (config-atm 1.1)#ip igmp last-member-query-interval 200
60000CRG0-35B
1774
ip mcast-stub downstream
Use the ip mcast-stub downstream command to enable multicast forwarding and Internet Group Management Protocol (IGMP) (router mode) on an interface and place it in multicast stub downstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub upstream commands. Downstream interfaces connect to segments with multicast hosts. Multiple interfaces may be configured in downstream mode; however, interfaces connecting to the multicast network (upstream) should not be configured in downstream mode. Interfaces configured as downstream should have the lowest IP address of all IGMP-capable routers on the connected segment in order to be selected as the designated router (DR) and ensure proper forwarding. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub upstream on page 1778 for more information.
Usage Examples
The following example enables multicast forwarding and IGMP on the interface: (config)#interface atm 1.1 (config-atm 1.1)#ip mcast-stub downstream
60000CRG0-35B
1775
ip mcast-stub fixed
Use the ip mcast-stub fixed command to allow forwarding of multicast traffic on a selected interface after enabling multicast routing. Use the no form of this command to disable this mode. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 12.1 Command was introduced.
Functional Notes
Multicast routing must be enabled prior to setting ip mcast-stub fixed on the selected interface. Also, use the ip igmp static-group <address> command to receive multicast traffic without host-initiated Internet Group Management Protocol (IGMP) activity on the selected interface. Otherwise, all host-initiated IGMP transactions will enter multicast routes on the routers interface involved with IGMP activities.
Usage Examples
The following example enables multicast traffic forwarding and IGMP on the interface: (config)#interface atm1.1 (config-atm 1.1)#ip mcast-stub fixed
60000CRG0-35B
1776
ip mcast-stub helper-enable
Use the ip mcast-stub helper-enable command to assign the ip mcast-stub helper-address as the Internet Group Management Protocol (IGMP) proxy. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 8.1 Command was introduced.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address, ip mcast-stub upstream, and ip mcast-stub downstream commands. When enabled, the interface becomes a helper forwarding interface. The IGMP host function is dynamically enabled and the interface becomes the active upstream interface, enabling the router to perform as an IGMP proxy. Refer to ip mcast-stub helper-address <ip address> on page 968, ip mcast-stub downstream on page 1775, and ip mcast-stub upstream on page 1778 for more information.
Usage Examples
The following example sets the helper address as the IGMP proxy: (config)#interface atm 1.1 (config-atm 1.1)#ip mcast-stub helper-enable
60000CRG0-35B
1777
ip mcast-stub upstream
Use the ip mcast-stub upstream command to enable multicast forwarding on an interface and place it in multicast stub upstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub downstream commands. When enabled, the interface becomes a candidate to be a helper forwarding interface. If chosen as the best path toward the helper address by the router's unicast route table, the Internet Group Management Protocol (IGMP) host function is dynamically enabled and the interface becomes the active upstream interface, enabling the router to perform as an IGMP proxy. Though multiple interfaces may be candidates, no more than one interface will actively serve as the helper forwarding interface. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub downstream on page 1775 for more information.
Usage Examples
The following example enables multicast forwarding on the interface: (config)#interface atm 1.1 (config-atm 1.1)#ip mcast-stub upstream
60000CRG0-35B
1778
ip mtu <size>
Use the ip mtu command to configure the maximum transmission unit (MTU) size for the active interface. Use the no form of this command to return to the default value. Syntax Description
<size> Configures the window size for transmitted packets. The valid ranges for the various interfaces are listed below: ATM subinterfaces 64 to 1520 BVIs 64 to 2100 Demand interfaces 64 to 1520 Ethernet interfaces 64 to 1500 FDL interfaces 64 to 256 Frame Relay subinterfaces 64 to 1520 HDLC interfaces (NetVanta 5305) 64 to 4600 HDLC interfaces (all other NetVanta products)64 to 2100 Loopback interfaces 64 to 1500 PPP interfaces (NetVanta 5305) 64 to 4600 PPP interfaces (all other NetVanta products) 64 to 2100 Tunnel interfaces 64 to 18190
Default Values
<size> The default values for the various interfaces are listed below: ATM subinterfaces 1500 BVIs 1500 Demand interfaces 1500 Ethernet interfaces 1500 FDL interfaces 256 Frame Relay subinterfaces 1500 HDLC interfaces 1500 Loopback interfaces 1500 PPP interfaces 1500 Tunnel interfaces 1476
Command History
Release 1.1 Release 11.1 Release 17.9 Command was introduced. Command was expanded to include the demand interface. Command was changed to require the ip keyword.
Functional Notes
Open shortest path first (OSPF) will not become adjacent on links where the MTU sizes do not match. If router A and router B are exchanging hello packets but their MTU sizes do not match, they will never reach adjacency. This is by design and required by the RFC.
60000CRG0-35B
1779
Usage Examples
The following example specifies an MTU of 1200 on the ATM subinterface: (config)#interface atm 1.1 (config-atm 1)#ip mtu 1200
60000CRG0-35B
1780
ip ospf
Use the ip ospf command to customize open shortest path first (OSPF) settings (if needed). Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication-key <password> ip ospf cost <value> ip ospf dead-interval <seconds> ip ospf hello-interval <seconds> ip ospf message-digest-key [1 | 2] md5 <key> ip ospf priority <value> ip ospf retransmit-interval <seconds> ip ospf transmit-delay <seconds>
Syntax Description
authentication-key <password> cost <value> Assigns a simple-text authentication password to be used by other routers using the OSPF simple password authentication. Specifies the OSPF cost of sending a packet on the interface. This value overrides any computed cost value. Range is 1 to 65535. Sets the maximum interval (in seconds) allowed between hello packets. If the maximum is exceeded, neighboring devices will determine that the device is down. Range is 0 to 32767 seconds. Specifies the interval (in seconds) between hello packets sent on the interface. Range is 0 to 32767 seconds. Configures OSPF message digest 5 (MD5) authentication (16 byte maximum) keys. Sets the OSPF priority. The value set in this field helps determine the designated router (DR) for this network. Range is 0 to 255. Specifies the interval (in seconds) between link state advertisements (LSAs). Range is 0 to 32767 seconds. Sets the estimated time (in seconds) required to send a link state advertisement (LSA) on the interface. Range is 0 to 32767 seconds.
dead-interval <seconds>
Default Values
retransmit-interval <seconds> transmit-delay <seconds> hello-interval <seconds> dead-interval <seconds> 5 seconds 1 second 10 seconds: Ethernet, Frame Relay, and Point-to-Point Protocol (PPP) 40 seconds
60000CRG0-35B
1781
Command History
Release 3.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example sets the maximum number of seconds allowed between hello packets to 25000: (config)#interface atm 1.1 (config-atm 1.1)#ip ospf dead-interval 25000
60000CRG0-35B
1782
ip ospf authentication
Use the ip ospf authentication command to authenticate an interface that is performing open shortest path first (OSPF) authentication. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication message-digest ip ospf authentication null
Syntax Description
message-digest null Optional. Specifies message-digest authentication type. Optional. Specifies that no authentication be used.
Default Values
By default, this is set to null (meaning no authentication is used).
Command History
Release 3.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example specifies that no authentication will be used on the ATM subinterface 1.1: (config)#interface atm 1.1 (config-atm 1.1)#ip ospf authentication null
60000CRG0-35B
1783
ip ospf network
Use the ip ospf network command to specify the type of network on this interface. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf network broadcast ip ospf network point-to-point
Syntax Description
broadcast point-to-point Sets the network type for broadcast. Sets the network type for point-to-point.
Default Values
By default, Ethernet defaults to broadcast. Point-to-Point Protocol (PPP) and Frame Relay default to point-to-point.
Command History
Release 3.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
A point-to-point network will not elect designated routers.
Usage Examples
The following example designates a broadcast network type: (config)#interface atm 1.1 (config-atm 1.1)#ip ospf network broadcast
60000CRG0-35B
1784
ip pim sparse-mode
Use the ip pim sparse-mode command to enable protocol-independent multicast (PIM) sparse mode for this interface. Use the no form of this command to disable PIM sparse mode. Syntax Description
No subcommands.
Default Values
By default, PIM sparse mode for this interface is disabled.
Command History
Release 11.1 Command was introduced.
Functional Notes
PIM sparse mode is a multicast routing protocol that makes use of the unicast forwarding table. It builds unidirectional shared trees rooted at a rendezvous point (RP) for a multicast group or a shortest-path tree rooted at a specific source for a multicast group.
Usage Examples
The following example enables PIM sparse mode on the interface: (config)#interface atm 1.1 (config-atm 1.1)#ip pim sparse-mode
60000CRG0-35B
1785
Default Values
By default, the priority of all protocol-independent multicast (PIM) interfaces is 1.
Command History
Release 11.1 Command was introduced.
Functional Notes
Interfaces advertise their configured priority values in the hello messages transmitted on the interface. Routers use the priority values to determine the appropriate DR. The router on the network segment with the highest priority is selected as the DR. If a hello message is received on the interface from a router on the network segment and it does not contain a priority, the entire network segment defaults to DR selection based on IP addresses instead of priority. In this instance, the DR is selected as the router on the network segment that has the highest IP address. AOS will always include a priority in all transmitted hello messages. If no priority is specifically designated by the user, the priority is set as the default of 1.
Usage Examples
The following example specifies a priority of 100 on the asynchronous transfer mode (ATM) subinterface 1.1: (config)#interface atm 1.1 (config-atm 1.1)#ip pim-sparse dr-priority 100
60000CRG0-35B
1786
Default Values
By default, the hellos are transmitted on PIM interfaces every 60 seconds.
Command History
Release 11.1 Command was introduced.
Functional Notes
Hello messages are used to inform neighbors of a routers presence. Hello messages normally generate a small amount of traffic on an interface. Setting the hello-timer to a small interval increases the number of hellos sent (thus increasing the amount of traffic). Set the hello-timer to a reasonable value, taking into consideration the bandwidth available on the interface.
Usage Examples
The following example specifies hellos be sent on the asynchronous transfer mode (ATM) subinterface 1.1 every 3600 seconds: (config)#interface atm 1.1 (config-atm 1.1)#ip pim-sparse hello-timer 3600
60000CRG0-35B
1787
Default Values
By default, the nbr-timeout is set to 105 seconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the nbr-timeout to 300 seconds: (config)#interface atm 1.1 (config-atm 1.1)#ip pim-sparse nbr-timeout 300
60000CRG0-35B
1788
Default Values
By default, the override interval is set to 2500 milliseconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the override interval to 3000 milliseconds: (config)#interface atm 1.1 (config-atm 1.1)#ip pim-sparse override-interval 3000
60000CRG0-35B
1789
Default Values
By default, the propagation delay is set to 500 milliseconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the propagation delay to 300 milliseconds: (config)#interface atm 1.1 (config-atm 1.1)#ip pim-sparse propagation-delay 300
60000CRG0-35B
1790
Default Values
By default, no policy route map is assigned to this interface.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example assigns the policy route map policy1 to the asynchronous transfer mode (ATM) subinterface 1.1: (config)#interface atm 1.1 (config-atm 1.1)#ip policy route-map policy1
60000CRG0-35B
1791
ip proxy-arp
Use the ip proxy-arp command to enable proxy Address Resolution Protocol (ARP) on the interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, proxy ARP is enabled.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
In general, the principle of proxy ARP allows a router to insert its IP address in the source IP address field of a packet (if the packet is from a host on one of its subnetworks). This allows hosts to reach devices on other subnetworks without implementing routing or specifying a default gateway. If proxy ARP is enabled, AOS will respond to all proxy ARP requests with its specified medium access control (MAC) address and forward packets accordingly. Enabling proxy ARP on an interface may introduce unnecessary ARP traffic on the network.
Usage Examples
The following example enables proxy ARP on the ATM subinterface 1.1: (config)#interface atm 1.1 (config-atm 1.1)#ip proxy-arp
60000CRG0-35B
1792
Syntax Description
1 2 Accepts only received RIP version 1 packets on the interface. Accepts only received RIP version 2 packets on the interface.
Default Values
By default, all interfaces implement RIP version 1 (the default value for the version command).
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
Use the ip rip receive version to specify a RIP version that will override the version (in the Router RIP) configuration. AOS only accepts one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the ATM subinterface 1.1 to accept only RIP version 2 packets: (config)#interface atm 1.1 (config-atm 1.1)#ip rip receive version 2
60000CRG0-35B
1793
Syntax Description
1 2 Transmits only RIP version 1 packets on the interface. Transmits only RIP version 2 packets on the interface.
Default Values
By default, all interfaces transmit RIP version 1 (the default value for the version command).
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
Use the ip rip send version to specify a RIP version that will override the version (in the Router RIP) configuration. AOS only transmits one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the ATM subinterface 1.1 to transmit only RIP version 2 packets: (config)#interface atm 1.1 (config-atm 1.1)#ip rip send version 2
60000CRG0-35B
1794
Default Values
By default, no manual summarization is applied by RIP.
Command History
Release 12.1 Command was introduced.
Functional Notes
Unlike the automatic summarization on classful network boundaries, only specific network advertisements are made by RIP using the ip rip summary-address command. This command is only effective if RIP version 2 is configured.
Usage Examples
The following example enables manual summarization on the specified IP address: (config)#interface atm 1.1 (config-atm 1.1)#ip rip summary-address 10.10.123.0 255.255.255.0
60000CRG0-35B
1795
ip route-cache
Use the ip route-cache command to enable fast-cache switching on the interface. Use the no form of this command to disable fast-cache switching and return to process switching mode. Using network address translation (NAT) or the AOS firewall capabilities on an interface requires process switching mode (using the no ip route-cache command).
Syntax Description
No subcommands.
Default Values
By default, fast-cache switching is enabled on all Ethernet and virtual Frame Relay subinterfaces. IP route cache is enabled for all virtual Point-to-Point Protocol (PPP) interfaces.
Command History
Release 2.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
Fast switching allows an IP interface to provide optimum performance when processing IP traffic.
Usage Examples
The following example enables fast switching on the ATM subinterface 1.1: (config)#interface atm 1.1 (config-atm 1.1)#ip route-cache
60000CRG0-35B
1796
ip unnumbered <interface>
Use the ip unnumbered command to use the IP address assigned to the specified interface for all IP processing on the active interface. Use the no form of this command to remove the unnumbered configuration. Syntax Description <interface>
Specifies the interface that contains the IP address to use as the source address for all packets transmitted on this interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type ip unnumbered ? for a list of valid interfaces.
Default Values
By default, all interfaces are configured to use a specified IP address (using the command ip address <ip address> <subnet mask> on page 1763).
Command History
Release 1.1 Release 8.1 Release A4.01 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
Functional Notes
If ip unnumbered is enabled on an interface, all IP traffic from the interface will use a source IP address taken from the specified interface. For example, specifying ip unnumbered eth 0/1 while in the Frame Relay Subinterface Configuration mode configures the Frame Relay subinterface to use the IP address assigned to the Ethernet interface for all IP processing. In addition, AOS uses the specified interface information when sending route updates over the unnumbered interface.
Usage Examples
The following example configures the ATM subinterface 1.1 to use the IP address assigned to the Ethernet interface (eth 0/1): (config)#interface atm 1.1 (config-atm 1.1)#ip unnumbered eth 0/1
60000CRG0-35B
1797
ip urlfilter <name>
Use the ip urlfilter command to apply a universal resource locator (URL) filter to the interface for all inbound or outbound traffic. Use the no form of this command to remove the URL filter from an interface. Variations of this command include:
ip urlfilter <name> in ip urlfilter <name> out
Syntax Description
<name> in out Specifies the URL filter name to use on the interface. Applies the filter to the inbound traffic. Applies the filter to the outbound traffic.
Default Values
By default, there are no URL filters applied to any interfaces.
Command History
Release 12.1 Release 14.1 Command was introduced. Command was expanded to include the virtual local area network (VLAN) interfaces.
Functional Notes
The firewall must be enabled using the ip firewall command in order to use URL filters. The URL filter must be created by using the ip urlfilter <name> http command before applying it to the interface. Refer to ip urlfilter <name> http on page 1090 for more information on using this command.
Usage Examples
The following example performs URL filtering on all traffic entering through the asynchronous transfer mode (ATM) subinterface 1.1 and matches the URL filter named MyFilter: (config)#interface atm 1.1 (config-atm 1.1)#ip urlfilter MyFilter in
60000CRG0-35B
1798
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface atm 1.1 (config-atm 1.1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1799
max-reserved-bandwidth <value>
Use the max-reserved-bandwidth command to specify the percentage of interface bandwidth reserved for use in user-defined (priority or class-based) queues. The remainder of the interface bandwidth is reserved for system-critical traffic and is not available to user-defined queues. Use the no form of this command to restore the default value. Reserving a portion of the interface bandwidth for system-critical traffic is necessary for proper operation. Specifying the entire interface bandwidth for use in user-defined queues can cause undesirable operation. Syntax Description
<value> Specifies the maximum percentage of bandwidth to reserve for quality of service (QoS). This setting is configured as a percentage of the total interface speed. Range is 1 to 100 percent.
Default Values
By default, max-reserved-bandwidth is set to 75 percent, which reserves 25 percent of the interface bandwidth for system-critical traffic.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example specifies 85 percent bandwidth on the asynchronous transfer mode (ATM) subinterface to be available for use in user-defined queues: (config)#interface atm 1.1 (config-atm 1.1)#max-reserved-bandwidth 85
60000CRG0-35B
1800
media-gateway ip
Use the media-gateway ip command to associate an IP address source to use for Realtime Transport Protocol (RTP) traffic. When configuring Voice over Internet Protocol (VoIP), RTP traffic must have an IP address associated with it. However, some interfaces allow dynamic configuration of IP addresses, causing this value to change periodically. Use the no form of this command to disable this function. Variations of this command include:
media-gateway ip loopback <interface id> media-gateway ip primary media-gateway ip secondary <ip address>
Syntax Description
loopback <interface id> Specifies an IP address statically defined to a loopback interface for RTP traffic. This is helpful when using a single IP address across multiple wide area network (WAN) interfaces for RTP traffic. The valid range for loopback interface identifiers is 1 to 1024. The interface ID is used to uniquely identify a loopback interface. The entered value cannot be in use by another loopback interface. Specifies using this interfaces configured primary IP address for RTP traffic. Applies to static, Dynamic Host Configuration Protocol (DHCP), or negotiated addresses. Specifies using this interfaces statically defined secondary IP address for RTP traffic. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
primary
Default Values
By default, media-gateway ip is disabled.
Command History
Release 10.1 Release 17.3 Command was introduced. Command was updated with the loopback interface identification option.
Usage Examples
The following example configures the unit to use the primary IP address for RTP traffic: (config)#interface atm 1.1 (config-atm 1.1)#media-gateway ip primary
60000CRG0-35B
1801
oam retry
Use the oam retry command to configure parameters related to operations, administration, and maintenance (OAM) management for an asynchronous transfer mode (ATM) interface. Use the no form of this command to disable OAM management parameters. Variations of this command include:
oam retry oam retry <up value> oam retry <up value> <down value> oam retry <up value> <down value> <value>
Syntax Description
<up value> Optional. Specifies the number of consecutive end-to-end F5 OAM loopback cell responses that must be received in order to change a permanent virtual circuit (PVC) connection state to up. Range is 1 to 255. Optional. Specifies the number of consecutive end-to-end F5 OAM loopback cell responses that are not received in order to change a PVC state to down. Range is 1 to 255. Optional. Specifies the frequency (in seconds) that end-to-end F5 OAM loopback cells are transmitted when a change in the up/down state of a PVC is being verified. Range is 1 to 600 seconds.
<down value>
<value>
Default Values
By default, the up-count is set to 3, the down-count is set to 5, and the retry frequency is 1.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example configures the OAM parameters with an up-count of 2, down-count of 2, and retry frequency of 10: (config)#interface atm 1.1 (config-atm 1.1)#oam retry 2 2 10
60000CRG0-35B
1802
oam-pvc managed
Use the oam-pvc managed command to enable end-to-end F5 operations, administration, and maintenance (OAM) loopback cell generation and OAM management for an asynchronous transfer mode (ATM) interface. Use the no form of this command to disable generation of OAM loopback cells. Variations of this command include:
oam-pvc managed oam-pvc managed <value>
Syntax Description
<value> Optional. Specifies the time delay between transmitting OAM loopback cells. Range is 0 to 600 seconds.
Default Values
By default, the frequency is 1 second.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example enables OAM loopback cell generation with a frequency of 5 seconds: (config)#interface atm 1.1 (config-atm 1.1)#oam-pvc managed 5
60000CRG0-35B
1803
pvc <VPI/VCI>
Use the pvc command to select the asynchronous transfer mode (ATM) virtual link for this subinterface. Use the no form of this command to remove the link. Syntax Description
<VPI/VCI> Specifies the ATM network virtual path identifier (VPI) for this permanent virtual circuit (PVC). The VPI value range is 0 to 255, and the virtual channel identifier (VCI) value range is 32 to 65535.
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Command was introduced.
Usage Examples
The following example sets the VPI to 8 and the VCI to 35: (config)#interface atm 1.1 (config-atm 1.1)#pvc 8/35
60000CRG0-35B
1804
qos-policy
Use the qos-policy command to apply a previously configured quality of service (QoS) map to incoming or outgoing packets on an interface. Use the no form of this command to remove the map from the interface. Variations of this command include:
qos-policy in <name> qos-policy out <name>
Syntax Description
<name> in out Specifies the name of a previously created QoS map (refer to qos map <name> <number> on page 1184 for more information). Assigns a QoS map to this interface's input. Assigns a QoS map to this interface's output.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 8.1 Release 15.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added. Command was expanded to include the in parameter.
Functional Notes
When a QoS policy is applied to an interface, it may be disabled if the interface bandwidth is not adequate to support the requested bandwidth on the map set. Once the bandwidth problem is resolved, the map will work again. The bandwidth will be rechecked on any of the following changes: 1. A priority or class-based entry is added to, deleted from, or changed in a QoS map set. 2. The interface bandwidth is changed by the bandwidth command on the interface. 3. A QoS policy is applied to an interface. 4. A cross connect is created that includes an interface with a QoS policy. 5. The interface queuing method is changed to fair-queue to use weighted fair queuing (WFQ). 6. The interface operational status changes. 7. The interface bandwidth changes for other reasons (e.g., when asymmetric digital subscriber line (ADSL) finishes training). In order to prevent the map from being disabled in cases of temporary inadequate bandwidth (e.g., a single link goes down in a dual T1 multilink configuration where the map requests more than one T1's worth of bandwidth), the QoS map uses the maximum theoretical bandwidth on an interface, not the actual bandwidth at that time. This actually helps QoS keep higher priority class-based traffic working better than best-effort traffic when the bandwidth drops.
60000CRG0-35B
1805
Usage Examples
The following example applies the QoS map VOICEMAP to the ATM subinterface 1.1: (config)#interface atm 1.1 (config-atm 1.1)#qos-policy out VOICEMAP
60000CRG0-35B
1806
snmp trap
Use the snmp trap command to enable all supported Simple Network Management Protocol (SNMP) traps on the interface. Use the no form of this command to disable this trap. Syntax Description
No subcommands.
Default Values
By default, all interfaces (except virtual Frame Relay interfaces and subinterfaces) have SNMP traps enabled.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 8.1 Release 16.1 Release 17.9 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the port channel and virtual local area network (VLAN) interfaces. Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the tunnel interface. Command was expanded to the Frame Relay and the ATM subinterfaces.
Usage Examples
The following example enables SNMP on the virtual ATM subinterface: (config)#interface atm 1.1 (config-atm 1.1)#snmp trap
60000CRG0-35B
1807
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Release 17.9 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface. Command was explanded to the Frame Relay and the ATM subinterfaces.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on th ATM subinterface: (config)#interface atm 1.1 (confi-atm 1.1)#no snmp trap link-status
60000CRG0-35B
1808
spanning-tree bpdufilter
Use the spanning-tree bpdufilter command to block bridge protocol data units (BPDUs) from being transmitted and received on this interface. To return to the default value, use the no form of this command. Variations of this command include:
spanning-tree bpdufilter disable spanning-tree bpdufilter enable
Syntax Description
disable enable Disables the BPDU filter. Enables the BPDU filter.
Default Values
By default, this command is set to disable.
Command History
Release 5.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
The purpose of this command is to remove a port from participation in the spanning tree. This might be beneficial while debugging a network setup. It normally should not be used in a live network.
Usage Examples
The following example enables the BPDU filter on the interface: (config)#interface atm 1.1 (config-atm 1.1)#spanning-tree bpdufilter enable
60000CRG0-35B
1809
spanning-tree bpduguard
Use the spanning-tree bpduguard command to block bridge protocol data units (BPDUs) from being received on this interface. To return to the default value, use the no form of this command. Variations of this command include:
spanning-tree bpduguard disable spanning-tree bpduguard enable
Syntax Description
disable enable Disables the BPDU block. Enables the BPDU block.
Default Values
By default, this command is set to disable.
Command History
Release 5.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example enables the bpduguard on the interface: (config)#interface atm 1.1 (config-atm 1.1)#spanning-tree bpduguard enable
60000CRG0-35B
1810
spanning-tree edgeport
Use the spanning-tree edgeport command to set this interface to be an edgeport. This command overrides the global setting (refer to spanning-tree edgeport default on page 1230). Use the no form of this command to return to the default value. Syntax Description
No subcommands.
Default Values
By default, this command is set to disable.
Command History
Release 5.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Usage Examples
The following example configures the interface to be an edgeport: (config)#interface atm 1.1 (config-atm 1.1)#spanning-tree edgeport An individual interface can be configured to not be considered an edgeport. For example: (config)#interface atm 1.1 (config-atm 1.1)#spanning-tree edgeport disable or (config)#interface atm 1.1 (config-atm 1.1)#no spanning-tree edgeport
60000CRG0-35B
1811
spanning-tree link-type
Use the spanning-tree link-type command to configure the spanning-tree protocol link type for an interface. To return to the default value, use the no form of this command. Variations of this command include:
spanning-tree link-type auto spanning-tree link-type point-to-point spanning-tree link-type shared
Syntax Description
auto point-to-point shared Determines link type by the ports duplex settings. Sets link type manually to point-to-point regardless of duplex settings. Sets link type manually to shared regardless of duplex settings.
Default Values
By default, a port is set to auto.
Command History
Release 5.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
This command overrides the default link-type setting determined by the duplex of the individual port. By default, a port configured for half-duplex is set to shared link type, and a port configured for full-duplex is set to point-to-point link type. Setting the link type manually overrides the default and forces the port to use the specified link type. Using the link-type auto command, restores the convention of determining link type based on duplex settings.
Usage Examples
The following example forces the link type to point-to-point, even if the port is configured to be half-duplex: (config)#bridge 1 protocol ieee (config)#interface atm 1.1 (config-atm 1.1)#spanning-tree link-type point-to-point
Technology Review
Rapid transitions are possible in Rapid Spanning Tree Protocol (RSTP) by taking advantage of point-to-point links (a port is connected to exactly one other bridge) and edge-port connections (a port is not connected to any additional bridges). Setting the link type to auto allows the spanning tree to automatically configure the link type based on the duplex of the link. Setting the link type to point-to-point allows a half-duplex link to act as if it were a point-to-point link.
60000CRG0-35B
1812
Default Values
By default, the path-cost value is set to 19.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
The specified value is inversely proportional to the likelihood the bridge interface will be chosen as the root path. Set the path-cost value lower to increase the chance the interface will be the root. To obtain the most accurate spanning-tree calculations, develop a system for determining path costs for links and apply it to all bridged interfaces.
Usage Examples
The following example assigns a path cost of 100 for bridge group 17 on an ATM subinterface: (config)#interface atm 1.1 (config-atm 1.1)#spanning-tree path-cost 100
Technology Review
Spanning-tree protocol provides a way to prevent loopback or parallel paths in bridged networks. Using the priority values and path costs assigned to each bridging interface, the spanning-tree protocol determines the root path and identifies whether to block or allow other paths.
60000CRG0-35B
1813
Default Values
By default, the bridge-group priority value is set to 128.
Command History
Release 1.1 Release 8.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added.
Functional Notes
The only time that this priority level is used is when two interfaces with a path to the root have equal cost. At that point, the level set in this command will determine which port the bridge will use. Set the priority value lower to increase the chance the interface will be used.
Usage Examples
The following example sets the maximum priority on the ATM subinterface labeled 1.1 in bridge group 17: (config)#interface atm 1.1 (config-atm 1.1)#spanning-tree port-priority 0
60000CRG0-35B
1814
Keep in mind that changing an interfaces VRF association will clear all IP-related settings on that interface. Syntax Description
<name> Specifies the name of the VRF to which to assign the interface.
Default Values
By default, interfaces are associated with the default VRF that is unnumbered.
Command History
Release 16.1 Release 17.8 Command was introduced. The keyword ip was removed from this command.
Functional Notes
VRF instances must be created first before an interface can be assigned. An interface can only be assigned to one VRF, but multiple interfaces can be assigned to the same VRF. An interface will only forward IP traffic that matches its associated VRF. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured.
Usage Examples
The following example assigns the ATM subinterface labeled 1.1 to the VRF instance named RED: (config)#interface atm 1.1 (config-fr 1.16)#vrf forwarding RED
60000CRG0-35B
1815
Next, enter the interface bvi command and a specific interface number that corresponds to an existing bridge group at the Global Configuration mode prompt. For example:
(config)#bridge irb (config)#interface bvi 1 (config-bvi 1)#
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. bandwidth <value> on page 1817 crypto map <name> on page 1818 dynamic-dns on page 1820 ip commands begin on page 1822 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1848 mac-address <mac address> on page 1849 max-reserved-bandwidth <value> on page 1850 qos-policy out <name> on page 1851 rtp quality-monitoring on page 1852 traffic-shape rate <value> on page 1853 vrf forwarding <name> on page 1854
60000CRG0-35B
1816
bandwidth <value>
Use the bandwidth command to provide the bandwidth value of an interface to the higher level protocols. This value is used in cost calculations. Use the no form of this command to restore the default value. Syntax Description
<value> Specifies bandwidth in kbps. Range is 1 to 4294967295 kbps.
Default Values
To view default values, use the show interfaces command.
Command History
Release 3.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
The bandwidth command is an informational value that is communicated to the higher level protocols to be used in cost calculations. This is a routing parameter only and does not affect the physical interface.
Usage Examples
The following example sets bandwidth of BVI 1 to 10 Mbps: (config)#interface bvi 1 (config-bvi 1)#bandwidth 10000
60000CRG0-35B
1817
For virtual private network (VPN) configuration example scripts, refer to the VPN configuration guide available on the AOS Documentation CD shipped with your product.
Syntax Description
<name> Specifies the crypto map name that you wish to assign to the interface.
Default Values
By default, no crypto maps are assigned to an interface.
Command History
Release 4.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
When configuring a system to use both the stateful inspection firewall and Internet key exchange (IKE) negotiation for VPN, keep the following notes in mind. When defining the policy class and associated access control lists (ACLs) that describe the behavior of the firewall, do not forget to include the traffic coming into the system over a VPN tunnel terminated by the system. The firewall should be set up with respect to the unencrypted traffic that is destined to be sent or received over the VPN tunnel. The following diagram represents typical AOS data-flow logic.
60000CRG0-35B
1818
IPSec Decrypt/Discard
IPSec Encrypt
NAT/ACP/ Firewall
Router
As shown in the diagram above, data coming into the product is first processed by the static filter associated with the interface on which the data is received. This access group is a true static filter and is available for use regardless of whether the firewall is enabled or disabled. Next (if the data is encrypted), it is sent to the IPSec engine for decryption. The decrypted data is then processed by the stateful inspection firewall. Therefore, given a terminating VPN tunnel, only unencrypted data is processed by the firewall. The ACLs for a crypto map on an interface work in reverse logic to the ACLs for a policy class on an interface. When specifying the ACLs for a crypto map, the source information is the private local side, unencrypted source of the data. The destination information will be the far-end, unencrypted destination of the data. However, ACLs for a policy class work in reverse. The source information for the ACL in a policy class is the far end. The destination information is the local side.
Usage Examples
The following example applies all crypto maps with the name MyMap to BVI 1: (config)#interface bvi 1 (config-bvi 1)#crypto map MyMap
60000CRG0-35B
1819
dynamic-dns
Use the dynamic-dns command to configure Dynamic DNS service provided by Dynamic Network Services, Inc. (www.dyndns.org). Use the no form of this command to disable this feature. Variations of this command include:
dynamic-dns custom <hostname> <minutes> dynamic-dns dyndns <hostname> <username> <password> dynamic-dns dyndns-custom <hostname> <username> <password> dynamic-dns dyndns-static <hostname> <username> <password>
Syntax Description
<hostname> <minutes> Specifies the host name for the server that updates the dynamic domain naming system (DNS). Specifies the intervals in minutes to update the server with information (updates also occur when the interfaces IP address changes regardless of the update intervals). Specifies a user name using an alphanumerical string up to 30 characters in length (the user name is case sensitive). Specifies a password using an alphanumerical string up to 30 characters in length (the password is case sensitive). Refer to Functional Notes below for additional argument descriptions.
<username> <password>
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 12.1 Release 15.1 Command was introduced. Command was expanded. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
custom - Constanttime.coms Custom Dynamic DNSSM service allows you complete access and management control over your domain name regardless of where you purchased/registered it. This allows you to manage IP address mappings (A records), domain aliases (CNAME records), and mail servers (mail exchange (MX) records). dyndns - The Dynamic DNSSM offered by Dynamic Network Services, Inc. (DynDNS.org) allows you to alias a dynamic IP address to a static host name in various domains. This allows your unit to be more easily accessed from various locations on the Internet. This service is provided for up to five host names.
60000CRG0-35B
1820
dyndns-custom - DynDNS.org's Custom DNSSM service provides a full DNS solution, giving you complete control over an entire domain name. A Web-based interface provides two levels of control over your domain, catering to average or advanced users. Five globally redundant DNS servers ensure that your domain will always resolve. A choice of two interfaces is available. The basic interface is designed for most users. It comes preconfigured for most common configurations and allows for easy creation of most common record types. The advanced interface is designed for system administrators with a solid DNS background, and provides layout and functionality similar to a BIND zone file allowing for the creation of nearly any record type. Custom DNSSM can be used with both static and dynamic IPs, and has the same automatic update capability through Custom DNS-aware clients as Dynamic DNS. dyndns-static - The Static DNS service is similar to DynDNS.orgs Dynamic DNSSM service in that it allows a host name, such as yourname.dyndns.org, to point to your IP address. Unlike a Dynamic DNS host, a Static DNS host does not expire after 35 days without updates, but updates take longer to propagate through the DNS system. This service is provided for up to five host names. If your IP address does not change often or at all, but you still want an easy name to remember it by (without having to purchase your own domain name), Static DNS service is ideal for you. If you would like to use your own domain name (such as yourname.com), you need Custom DNS service that also provides full dynamic and static IP address support.
Usage Examples
The following example sets the Dynamic DNS to dyndns-custom with host name host, user name user, and password pass: (config)#interface bvi 1 (config-bvi 1)#dynamic-dns dyndns-custom host user pass
60000CRG0-35B
1821
ip access-group <name>
Use the ip access-group command to create an access control list (ACL) to be used for packets transmitted on or received from the specified interface. Use the no form of this command to disable this type of control. Variations of this command include:
ip access-group <name> in ip access-group <name> out
Syntax Description
<name> in out Specifies the IP ACL name. Enables access control on packets received on the specified interface. Enables access control on packets transmitted on the specified interface.
Default Values
By default, these commands are disabled.
Command History
Release 3.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
When this command is enabled, the IP destination address of each packet must be validated before being passed through. If the packet is not acceptable per these settings, it is dropped.
Usage Examples
The following example sets up the router to only allow Telnet traffic into BVI 1: (config)#interface bvi 1 (config)#ip access-list extended TelnetOnly (config-ext-nacl)#permit tcp any any eq telnet (config)#interface bvi 1 (config-bvi 1)#ip access-group TelnetOnly in
60000CRG0-35B
1822
ip access-policy <name>
Use the ip access-policy command to assign a specified access control policy (ACP) to an interface. ACPs are applied to traffic entering an interface. Use the no form of this command to remove an ACP association. For more information on using ACPs, refer to ip policy-class <ipv4 acp name> on page 985. Configured ACPs will only be active if the ip firewall command has been entered at the Global Configuration mode prompt to enable the AOS security features. All configuration parameters are valid, but no security data processing will be attempted unless the security features are enabled. Syntax Description
<name> Identifies the configured ACP by alphanumeric descriptor (all ACP descriptors are case sensitive).
Default Values
By default, there are no configured ACPs associated with an interface.
Command History
Release 2.1 Release 5.1 Release 6.1 Release 15.1 Release 17.9 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the virtual local area network (VLAN) interfaces. Command was expanded to include the bridged virtual interfaces (BVIs). Command was changed to require the ip keyword.
Functional Notes
To assign an ACP to an interface, enter the interface configuration mode for the desired interface and enter ip access-policy <name>.
Usage Examples
The following example associates the ACP PRIVATE (to allow inbound traffic to the Web server) to the BVI interface 1: Enable the AOS security features: (config)#ip firewall Associate the access policy with the BVI interface 1: (config)#interface bvi 1 (config-bvi 1)#ip access-policy PRIVATE
60000CRG0-35B
1823
ip address dhcp
Use the ip address dhcp command to use Dynamic Host Configuration Protocol (DHCP) to obtain an address on the interface. Use the no form of this command to remove a configured IP address (using DHCP) and disable DHCP operation on the interface. Variables that may be used with this command to further define the DHCP configuration include:
ip address dhcp client-id [<interface> | <identifier>] [hostname <string>] [track <name>] [<administrative distance>] ip address dhcp hostname <string> [no-default-route | no-domain-name | no-nameservers] [track <name>] [<administrative distance>] ip address dhcp [no-default-route | no-domain-name | no-nameservers] [track <name>] [<administrative distance>] ip address dhcp track <name> [<administrative distance>]
Syntax Description
<administrative distance> Optional. Specifies the administrative distance to use when adding the DHCP gateway into the route table. It is used to determine the best route when multiple routes to the same destination exist. The lower the administrative distance, the more reliable the route. Range is 1 to 255. Optional. Specifies the client identifier used when obtaining an IP address from a DHCP server. Specifies an interface, thus defining the client identifier as the hexadecimal medium access control (MAC) address of the specified interface (including a hexadecimal number added to the front of the MAC address to identify the media type). For example, specifying the client-id ethernet 0/1 (where the Ethernet interface has a MAC address of d217.0491.1150) defines the client identifier as 01:d2:17:04:91:11:50 (where 01 defines the media type as Ethernet). Refer to hardware-address on page 2704 for a detailed listing of media types. <identifier> Specifies a custom client-identifier using a text string (that is converted to a hexadecimal equivalent) or 7 to 28 hexadecimal numbers (with colon delimiters). For example, a custom client identifier of 0f:ff:ff:ff:ff:51:04:99:a1 may be entered using the <identifier> option. hostname <string> Optional. Specifies a text string (to override the global router name) to use as the name in the DHCP option 12 field. The string is enclosed in quotation marks and can consist of up to 35 characters. Optional. Specifies that no default route is obtained via DHCP. Optional. Specifies that no domain name is obtained via DHCP. Optional. Specifies that no domain naming system (DNS) servers are obtained via DHCP.
client-id <interface>
60000CRG0-35B
1824
BVI Interface Command Set Optional. Attaches a network monitoring track to the DHCP client. The DHCP gateway route for this client will only reside in the route table while the track is in the pass state. For more information on configuring track objects, refer to track <name> on page 1251.
Default Values
<administrative distance> client-id By default, the administrative distance value is 1. Optional. By default, the client identifier is populated using the following formula: TYPE: INTERFACE SPECIFIC INFO : MAC ADDRESS Where TYPE specifies the media type in the form of one hexadecimal byte (refer to hardware-address on page 2704 for a detailed listing of media types), and the MAC ADDRESS is the medium access control (MAC) address assigned to the first Ethernet interface in the unit in the form of six hexadecimal bytes. (For units with a single Ethernet interface, the MAC ADDRESS assigned to Ethernet 0/1 is used in this field.) hostname <string> By default, the host name is the name configured using the Global Configuration hostname command.
Command History
Release 2.1 Release 8.1 Release 13.1 Release 15.1 Release A4.01 Command was introduced. Command was expanded to include the asynchronous transfer mode (ATM) subinterface. Command was expanded to include the track and administrative distance. Command was expanded to include the bridged virtual interfaces (BVIs). Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
Functional Notes
DHCP allows interfaces to acquire a dynamically assigned IP address from a configured DHCP server on the network. Many Internet service providers (ISPs) require the use of DHCP when connecting to their services. Using DHCP reduces the number of dedicated IP addresses the ISP must obtain. Consult your ISP to determine the proper values for the client-id and hostname fields.
Usage Examples
The following example enables DHCP operation on virtual BVI 1: (config)#interface bvi 1 (config-bvi 1)#ip address dhcp
60000CRG0-35B
1825
The following example enables DHCP operation on virtual BVI 1 utilizing host name adtran and does not allow obtaining a default route, domain name, or name servers. It also sets the administrative distance as 5: (config)#interface bvi 1 (config-bvi 1)#ip address dhcp hostname adtran no-default-route no-domain-name no-nameservers 5
60000CRG0-35B
1826
Syntax Description
<ip address> <subnet mask> Specifies a valid IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IP addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Optional. Configures a secondary IP address for the specified interface.
secondary
Default Values
By default, there are no assigned IP addresses.
Command History
Release 1.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a secondary IP address of 192.22.72.101 255.255.255.252: (config)#interface bvi 1 (config-bvi 1)#ip address 192.22.72.101 255.255.255.252 secondary
60000CRG0-35B
1827
Default Values
By default, no IP address range is defined.
Command History
Release 17.4 Command was introduced.
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a range of secondary IP address from 192.22.72.1 to 192.22.72.10 on subnet 255.255.255.252: (config)#interface bvi 1 (config-bvi 1)#ip address range 192.22.72.1 192.22.72.10 255.255.255.252 secondary
60000CRG0-35B
1828
ip directed-broadcast
Use the ip directed-broadcast command to allow reception/forwarding of directed broadcasts. Use the no form of this command to disable this feature. Variations of this command include:
ip directed-broadcast ip directed-broadcast <name>
Syntax Description
<name> Specifies IP access control list (ACL) name.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
A directed broadcast is a packet intended for all nodes on a nonlocal network. For example, the broadcast address 255.255.255.255 reaches all nodes on a network; the directed broadcast address 128.1.255.255 is intended for all nodes whose network address is 128.1.0.0. A router not directly attached to 128.1.0.0 simply forwards the directed broadcast packet to the next hop. A router on network 128.1.0.0 that has ip directed-broadcast enabled, accepts and forwards the packet to all nodes whose network address is 128.1.0.0. Routers connecting subnets of 128.1.0.0 also accept and forward the packet to the nodes on their respective subnets. When a directed broadcast packet reaches a router that is directly connected to its destination subnet, that packet is distributed as a broadcast on the destination subnet. The packet is then sent as a link-layer broadcast. The ip directed-broadcast command controls the distribution of directed broadcasts when they reach their target subnets. Only the final transmission of the directed broadcast on its ultimate destination subnet is affected. It does not affect the transit unicast routing of IP directed broadcasts. If ip directed-broadcast is enabled for this interface, incoming IP packets whose addresses identify them as directed broadcasts intended for the subnet to which this interface is attached will be forwarded as broadcasts on that subnet. Forwarding of the packets can be limited by specifying an ACL with this command. In this case, only directed broadcasts that are permitted by the specified ACL will be forwarded, and all other directed broadcasts directed to this interface subnet will be dropped. Disabling the ip directed-broadcast command will cause directed broadcasts destined for the subnet to which this interface is attached to be dropped. This option is a requirement for routers as described in RFC 1812, section 4.2.2.11. Furthermore, it is disabled by default (RFC 2644), with the intended goal of reducing the efficacy of certain types of denial of service (DoS) attacks.
60000CRG0-35B
1829
Usage Examples
The following example enables forwarding of directed broadcasts on BVI 1: (config)#interface bvi 1 (config-bvi 1)#ip directed-broadcast
60000CRG0-35B
1830
ip flow
Use the ip flow command to enable integrated traffic monitoring (ITM) for all traffic received or forwarded on an interface. Use the no form of this command to disable traffic monitoring. Variations of this command include:
ip flow egress ip flow egress <name> ip flow ingress ip flow ingress <name>
Syntax Description
egress ingress <name> Specifies that all outgoing traffic be monitored. Specifies that all incoming traffic be monitored. Optional. Specifies the name of an access control list (ACL) to use for filtering traffic.
Default Values
By default, no traffic monitoring is enabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables traffic monitoring on a bridged virtual interface (BVI) to monitor incoming traffic through an ACL called myacl: (config)#interface bvi 1 (config-bvi 1)#ip flow ingress myacl
60000CRG0-35B
1831
Default Values
By default, broadcast UDP packets are not forwarded.
Command History
Release 1.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
When used in conjunction with the ip forward-protocol command, the ip helper-address feature allows you to customize which broadcast packets are forwarded. To implement the helper address feature, assign a helper-address(es) (specifying the device that needs to receive the broadcast traffic) to the interface closest to the host that transmits the broadcast packets. When broadcast packets (of the specified type forwarded using the ip forward-protocol command) are received on the interface, they will be forwarded to the device that needs the information. Only packets meeting the following criteria are considered eligible by the ip helper-address feature: 1. The packet IP protocol is UDP. 2. Any UDP port specified using the ip forward-protocol command. 3. The medium access control (MAC) address of the frame is an all-ones broadcast address (ffff.ffff.ffff). 4. The destination IP address is broadcast defined by all ones (255.255.255.255) or a subnet broadcast (for example, 192.33.4.251 for the 192.33.4.248 /30 subnet).
60000CRG0-35B
1832
Usage Examples
The following example forwards all DNS broadcast traffic to the DNS server with IP address 192.33.5.99: (config)#ip forward-protocol udp domain (config)#interface bvi 1 (config-bvi 1)#ip helper-address 192.33.5.99
60000CRG0-35B
1833
ip mtu <size>
Use the ip mtu command to configure the maximum transmission unit (MTU) size for the active interface. Use the no form of this command to return to the default value. Syntax Description
<size> Configures the window size for transmitted packets. The valid ranges for the various interfaces are listed below: ATM subinterfaces 64 to 1520 BVIs 64 to 2100 Demand interfaces 64 to 1520 Ethernet interfaces 64 to 1500 FDL interfaces 64 to 256 Frame Relay subinterfaces 64 to 1520 HDLC interfaces (NetVanta 5305) 64 to 4600 HDLC interfaces (all other NetVanta products)64 to 2100 Loopback interfaces 64 to 1500 PPP interfaces (NetVanta 5305) 64 to 4600 PPP interfaces (all other NetVanta products) 64 to 2100 Tunnel interfaces 64 to 18190
Default Values
<size> The default values for the various interfaces are listed below: ATM subinterfaces 1500 BVIs 1500 Demand interfaces 1500 Ethernet interfaces 1500 FDL interfaces 256 Frame Relay subinterfaces 1500 HDLC interfaces 1500 Loopback interfaces 1500 PPP interfaces 1500 Tunnel interfaces 1476
Command History
Release 1.1 Release 11.1 Release 17.9 Command was introduced. Command was expanded to include the demand interface. Command was changed to require the ip keyword.
Functional Notes
Open shortest path first (OSPF) will not become adjacent on links where the MTU sizes do not match. If router A and router B are exchanging hello packets but their MTU sizes do not match, they will never reach adjacency. This is by design and required by the RFC.
60000CRG0-35B
1834
Usage Examples
The following example specifies an MTU of 1200 on the BVI interface: (config)#interface bvi 1 (config-bvi 1)#ip mtu 1200
60000CRG0-35B
1835
ip ospf
Use the ip ospf command to customize open shortest path first (OSPF) settings (if needed). Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication-key <password> ip ospf cost <value> ip ospf dead-interval <seconds> ip ospf hello-interval <seconds> ip ospf message-digest-key [1 | 2] md5 <key> ip ospf priority <value> ip ospf retransmit-interval <seconds> ip ospf transmit-delay <seconds>
Syntax Description
authentication-key <password> cost <value> Assigns a simple-text authentication password to be used by other routers using the OSPF simple password authentication. Specifies the OSPF cost of sending a packet on the interface. This value overrides any computed cost value. Range is 1 to 65535. Sets the maximum interval (in seconds) allowed between hello packets. If the maximum is exceeded, neighboring devices will determine that the device is down. Range is 0 to 65535 seconds. Specifies the interval (in seconds) between hello packets sent on the interface. Range is 0 to 65535 seconds. Configures OSPF message digest 5 (MD5) authentication (16 byte maximum) keys. Sets the OSPF priority. The value set in this field helps determine the designated router (DR) for this network. Range is 0 to 255. Specifies the interval (in seconds) between link state advertisements (LSAs). Range is 0 to 65535 seconds. Sets the estimated time (in seconds) required to send a link state advertisement (LSA) on the interface. Range is 0 to 65535 seconds.
dead-interval <seconds>
Default Values
dead-interval <seconds> hello-interval <seconds> retransmit-interval <seconds> transmit-delay <seconds> 40 seconds 10 seconds: Ethernet, bridged virtual interface (BVI), Tunnel, and Point-to-Point Protocol (PPP) 5 seconds 1 second
60000CRG0-35B
1836
Command History
Release 3.1 Release 15.1 Command was introduced. Command was expanded to include the BVIs.
Usage Examples
The following example sets the maximum number of seconds allowed between hello packets to 25000: (config)#interface bvi 1 (config-bvi 1)#ip ospf dead-interval 25000
60000CRG0-35B
1837
ip ospf authentication
Use the ip ospf authentication command to authenticate an interface that is performing open shortest path first (OSPF) authentication. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication ip ospf authentication message-digest ip ospf authentication null
Syntax Description
message-digest null Optional. Selects message-digest authentication type. Optional. Specifies that no authentication be used.
Default Values
By default, this is set to null (meaning no authentication is used).
Command History
Release 3.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Usage Examples
The following example specifies that no authentication will be used on BVI 1: (config)#interface bvi 1 (config-bvi 1)#ip ospf authentication null
60000CRG0-35B
1838
ip ospf network
Use the ip ospf network command to specify the type of network on this interface. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf network broadcast ip ospf network point-to-point
Syntax Description
broadcast point-to-point Sets the network type for broadcast. Sets the network type for point-to-point.
Default Values
By default, Ethernet defaults to broadcast. Point-to-Point Protocol (PPP) and bridged virtual interface (BVI) default to point-to-point.
Command History
Release 3.1 Release 15.1 Command was introduced. Command was expanded to include the BVIs.
Functional Notes
A point-to-point network will not elect designated routers.
Usage Examples
The following example designates a broadcast network type: (config)#interface bvi 1 (config-bvi 1)#ip ospf network broadcast
60000CRG0-35B
1839
Default Values
By default, no policy route map is assigned to this interface.
Command History
Release 11.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Usage Examples
The following example assigns the policy route map policy1 to the interface: (config)#interface bvi 1 (config-bvi 1)#ip policy route-map policy1
60000CRG0-35B
1840
ip proxy-arp
Use the ip proxy-arp command to enable proxy Address Resolution Protocol (ARP) on the interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, proxy ARP is enabled.
Command History
Release 1.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
In general, the principle of proxy ARP allows a router to insert its IP address in the source IP address field of a packet (if the packet is from a host on one of its subnetworks). This allows hosts to reach devices on other subnetworks without implementing routing or specifying a default gateway. If proxy ARP is enabled, AOS will respond to all proxy ARP requests with its specified medium access control (MAC) address and forward packets accordingly. Enabling proxy ARP on an interface may introduce unnecessary ARP traffic on the network.
Usage Examples
The following example enables proxy ARP on BVI 1: (config)#interface bvi 1 (config-bvi 1)#ip proxy-arp
60000CRG0-35B
1841
Syntax Description
1 2 Accepts only received RIP version 1 packets on the interface. Accepts only received RIP version 2 packets on the interface.
Default Values
By default, all interfaces implement RIP version 1 (the default value for the version command).
Command History
Release 1.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
Use the ip rip receive version command to specify a RIP version that will override the version (in the Router RIP) configuration. AOS only accepts one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures a BVI to accept only RIP version 2 packets: (config)#interface bvi 1 (config-bvi 1)#ip rip receive version 2
60000CRG0-35B
1842
Syntax Description
1 2 Transmits only RIP version 1 packets on the interface. Transmits only RIP version 2 packets on the interface.
Default Values
By default, all interfaces transmit RIP version 1 (the default value for the version command).
Command History
Release 1.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
Use the ip rip send version to specify a RIP version that will override the version (in the Router RIP) configuration. AOS only transmits one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures a BVI to transmit only RIP version 2 packets: (config)#interface bvi 1 (config-bvi 1)#ip rip send version 2
60000CRG0-35B
1843
Default Values
By default, no manual summarization is applied by RIP.
Command History
Release 12.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
Unlike the automatic summarization on classful network boundaries, only specific network advertisements are made by RIP using the ip rip summary-address command. This command is only effective if RIP version 2 is configured.
Usage Examples
The following example enables manual summarization on the specified IP address: (config)#interface bvi 1 (config-bvi 1)#ip rip summary-address 10.10.123.0 255.255.255.0
60000CRG0-35B
1844
ip route-cache
Use the ip route-cache command to enable fast-cache switching on the interface. Use the no form of this command to disable fast-cache switching and return to process switching mode. Using network address translation (NAT) or the AOS firewall capabilities on an interface requires process switching mode (using the no ip route-cache command).
Syntax Description
No subcommands.
Default Values
By default, fast-cache switching is enabled on all Ethernet and virtual bridged virtual interfaces (BVIs). IP route cache is enabled for all virtual Point-to-Point Protocol (PPP) interfaces.
Command History
Release 2.1 Release 15.1 Command was introduced. Command was expanded to include the BVIs.
Functional Notes
Fast switching allows an IP interface to provide optimum performance when processing IP traffic.
Usage Examples
The following example enables fast-cache switching on a BVI: (config)#interface bvi 1 (config-bvi 1)#ip route-cache
60000CRG0-35B
1845
ip unnumbered <interface>
Use the ip unnumbered command to use the IP address assigned to the specified interface for all IP processing on the active interface. Use the no form of this command to remove the unnumbered configuration. Syntax Description <interface>
Specifies the interface that contains the IP address to use as the source address for all packets transmitted on this interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; and for an ATM subinterface, use atm 1.1. Type ip unnumbered ? for a list of valid interfaces.
Default Values
By default, all interfaces are configured to use a specified IP address (using the ip address command).
Command History
Release 1.1 Release 11.1 Release 15.1 Command was introduced. Command was expanded to include the demand interfaces. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
If ip unnumbered is enabled on an interface, all IP traffic from the interface will use a source IP address taken from the specified interface. For example, specifying ip unnumbered eth 0/1 while in the BVI Configuration mode configures the BVI to use the IP address assigned to the Ethernet interface for all IP processing. In addition, AOS uses the specified interface information when sending route updates over the unnumbered interface.
Usage Examples
The following example configures BVI 1 to use the IP address assigned to the Ethernet interface (eth 0/1): (config)#interface bvi 1 (config-bvi 1)#ip unnumbered eth 0/1
60000CRG0-35B
1846
ip urlfilter <name>
Use the ip urlfilter command to apply a universal resource locator (URL) filter to the interface for all inbound or outbound traffic. Use the no form of this command to remove the URL filter from an interface. Variations of this command include:
ip urlfilter <name> in ip urlfilter <name> out
Syntax Description
<name> in out Specifies the URL filter name to use on the interface. Applies the filter to the inbound traffic. Applies the filter to the outbound traffic.
Default Values
By default, there are no URL filters applied to any interfaces.
Command History
Release 12.1 Release 14.1 Release 15.1 Command was introduced. Command was expanded to include the virtual local area network (VLAN) interfaces. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
The firewall must be enabled using the ip firewall command in order to use URL filters. The URL filter must be created by using the ip urlfilter <name> http command before applying it to the interface. Refer to ip urlfilter <name> http on page 1090 for more information on using this command.
Usage Examples
The following example performs URL filtering on all traffic entering through BVI 1 and matches the URL filter named MyFilter: (config)#interface bvi 1 (config-bvi 1)#ip urlfilter MyFilter in
60000CRG0-35B
1847
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface bvi 1 (config-bvi 1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1848
Default Values
A unique default MAC address is programmed in each unit shipped by ADTRAN.
Command History
Release 5.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Usage Examples
The following example configures a MAC address of 00:0A:C8:5F:00:D2 for BVI 1: (config)#interface bvi 1 (config-bvi 1)#mac-address 00:0A:C8:5F:00:D2
60000CRG0-35B
1849
max-reserved-bandwidth <value>
Use the max-reserved-bandwidth command to specify the percentage of interface bandwidth reserved for use in user-defined (priority or class-based) queues. The remainder of the interface bandwidth is reserved for system-critical traffic and is not available to user-defined queues. Use the no form of this command to restore the default value. Reserving a portion of the interface bandwidth for system-critical traffic is necessary for proper operation. Specifying the entire interface bandwidth for use in user-defined queues can cause undesirable operation. Syntax Description
<value> Specifies the maximum percentage of bandwidth to reserve for quality of service (QoS). This setting is configured as a percentage of the total interface speed. Range is 1 to 100 percent.
Default Values
By default, max-reserved-bandwidth is set to 75 percent, which reserves 25 percent of the interface bandwidth for system-critical traffic.
Command History
Release 11.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Usage Examples
The following example specifies 85 percent of the bandwidth on BVI 1 be available for use in user-defined queues: (config)#interface bvi 1 (config-bvi 1)#max-reserved-bandwidth 85
60000CRG0-35B
1850
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
When a QoS policy is applied to an interface, it may be disabled if the interface bandwidth is not adequate to support the requested bandwidth on the map set. Once the bandwidth problem is resolved, the map will work again. The bandwidth will be rechecked on any of the following changes: 1. A priority or class-based entry is added to, deleted from, or changed in a QoS map set. 2. The interface bandwidth is changed by the bandwidth command on the interface. 3. A QoS policy is applied to an interface. 4. A cross connect is created that includes an interface with a QoS policy. 5. The interface queuing method is changed to fair-queue to use weighted fair queuing (WFQ). 6. The interface operational status changes. 7. The interface bandwidth changes for other reasons (e.g., when asymmetric digital subscriber line (ADSL) finishes training). In order to prevent the map from being disabled in cases of temporary inadequate bandwidth (e.g., a single link goes down in a dual T1 multilink configuration where the map requests more than one T1's worth of bandwidth), the QoS map uses the maximum theoretical bandwidth on an interface, not the actual bandwidth at that time. This actually helps QoS keep higher priority class-based traffic working better than best-effort traffic when the bandwidth drops.
Usage Examples
The following example applies the QoS map VOICEMAP to BVI 1: (config)#interface bvi 1 (config-bvi 1)#qos-policy out VOICEMAP
60000CRG0-35B
1851
rtp quality-monitoring
Use the rtp quality-monitoring command to enable voice quality monitoring (VQM) of the Realtime Transport Protocol (RTP) voice stream packets on this interface. If the global command (ip rtp quality-monitoring) is disabled when this command is issued, the system will return the following warning: Applied but not used, you must globally enable ip rtp quality-monitoring to use VQM. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, VQM is enabled on all wide area network (WAN) and local area network (LAN) interfaces.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables RTP quality monitoring on the bridged virtual interface (BVI) 1: (config)#interface bvi 1 (config-bvi 1)#rtp quality-monitoring
60000CRG0-35B
1852
Syntax Description
<value> <burst> Specifies the rate (in bits per second) at which the interface should be shaped. Optional. Specifies the allowed burst in bytes. By default, the burst is specified as the rate divided by 5 and represents the number of bytes that would flow within 200 ms.
Default Values
By default, traffic-shape rate is disabled.
Command History
Release 10.1 Release 15.1 Command was introduced. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
Traffic shaping can be used to limit the virtual local area network (VLAN) interface to a particular rate or to specify use of quality of service (QoS).
Usage Examples
The following example sets the outbound rate of BVI 1 to 128 kbps and applies a QoS policy that gives all Realtime Transport Protocol (RTP) traffic priority over all other traffic: (config)#qos map voip 1 (config-qos-map)#match ip rtp 10000 10500 all (config-qos-map)#priority unlimited (config-qos-map)#interface bvi 1 (config-bvi 1)#traffic-shape rate 128000 (config-bvi 1)#qos-policy out voip
60000CRG0-35B
1853
Keep in mind that changing an interfaces VRF association will clear all IP-related settings on that interface. Syntax Description
<name> Specifies the name of the VRF to which to assign the interface.
Default Values
By default, interfaces are associated with the default VRF that is unnumbered.
Command History
Release 16.1 Release 17.8 Command was introduced. The keyword ip was removed from this command.
Functional Notes
VRF instances must be created first before an interface can be assigned. An interface can only be assigned to one VRF, but multiple interfaces can be assigned to the same VRF. An interface will only forward IP traffic that matches its associated VRF. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured.
Usage Examples
The following example assigns the bvi 1 interface to the VRF instance named RED: (config)#interface bvi 1 (config-bvi 1)#vrf forwarding RED
60000CRG0-35B
1854
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. bandwidth <value> on page 1858 called-number <number> on page 1859 caller-number <number> on page 1860 connect-mode on page 1861 connect-order on page 1862 connect-sequence on page 1863 connect-sequence attempts <value> on page 1865 connect-sequence interface-recovery on page 1866 crypto map <name> on page 1867 demand-hold-queue <number> timeout <value> on page 1869 dynamic-dns on page 1870 fair-queue on page 1872 fast-idle <value> on page 1873 hold-queue <value> out on page 1874 idle-timeout <value> on page 1875 ip commands begin on page 1876 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1906 keepalive <value> on page 1907
60000CRG0-35B
1855
lldp receive on page 1908 lldp send on page 1909 match-interesting ip on page 1911 max-reserved-bandwidth <value> on page 1912 peer default ip address <ip address> on page 1913 ppp commands begin on page 1914 qos-policy on page 1926 resource pool <name> on page 1927 rtp quality-monitoring on page 1928 snmp trap link-status on page 1929 username <username> password <password> on page 1930 vrf forwarding <name> on page 1931
60000CRG0-35B
1856
ip access-policy <name>
Use the ip access-policy command to assign a specified access control policy (ACP) to an interface. ACPs are applied to traffic entering an interface. Use the no form of this command to remove an ACP association. For more information on using ACPs, refer to ip policy-class <ipv4 acp name> on page 985. Configured ACPs will only be active if the ip firewall command has been entered at the Global Configuration mode prompt to enable the AOS security features. All configuration parameters are valid, but no security data processing will be attempted unless the security features are enabled. Syntax Description
<name> Identifies the configured ACP by alphanumeric descriptor (all ACP descriptors are case sensitive).
Default Values
By default, there are no configured ACPs associated with an interface.
Command History
Release 2.1 Release 5.1 Release 6.1 Release 15.1 Release 17.9 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the virtual local area network (VLAN) interfaces. Command was expanded to include the bridged virtual interfaces (BVIs). Command was changed to require the ip keyword.
Functional Notes
To assign an ACP to an interface, enter the interface configuration mode for the desired interface and enter ip access-policy <name>.
Usage Examples
The following example associates the ACP PRIVATE (to allow inbound traffic to the Web server) to the demand interface 1: Enable the AOS security features: (config)#ip firewall Associate the access policy with the demand interface 1: (config)#interface demand 1 (config-demand 1)#ip access-policy PRIVATE
60000CRG0-35B
1857
bandwidth <value>
Use the bandwidth command to provide the bandwidth value of an interface to the higher level protocols. This value is used in cost calculations. Use the no form of this command to restore the default value. Syntax Description
<value> Specifies the bandwidth value in kbps.
Default Values
To view default values, use the show interfaces command.
Command History
Release 3.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
The bandwidth command is an informational value that is communicated to the higher level protocols to be used in cost calculations. This is a routing parameter only and does not affect the physical interface.
Usage Examples
The following example sets the bandwidth of the demand interface to 10 Mbps: (config)#interface demand 1 (config-demand 1)#bandwidth 10000
60000CRG0-35B
1858
called-number <number>
Use the called-number command to link calls to specific interfaces based on their dialed number identification service (DNIS) numbers. Multiple called numbers may be specified for an interface. Use the no form of this command to restore the default value. Syntax Description
<number> Identifies the called number to be linked to an interface. The DNIS number is limited to 20 digits.
Default Values
By default, no called numbers are defined.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example links calls with a DNIS number of 2565558409 to the demand interface 1: (config)#interface demand 1 (config-demand 1)#called-number 2565558409
60000CRG0-35B
1859
caller-number <number>
Use the caller-number command to link calls to specific interfaces based on its caller ID (CLID) number. Multiple caller ID numbers may be specified, allowing the interface to accept calls from different remote resources. Use the no form of this command to restore the default value. Syntax Description
<number> Identifies the callers number to be linked to an interface. The CLID number is limited to 20 digits.
Default Values
By default, no caller numbers are defined.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example links calls with a CLID number of 2565559911 to the demand interface 1: (config)#interface demand 1 (config-demand 1)#caller-number 2565559911
60000CRG0-35B
1860
connect-mode
Use the connect-mode command to configure the interface to only answer calls, only originate calls, or to both answer and originate calls. Use the no form of this command to restore the default value. Variations of this command include:
connect-mode answer connect-mode either connect-mode originate
Syntax Description
answer either originate Specifies the interface may be used to answer calls, but not originate calls. Specifies the interface may be used to answer and originate calls. Specifies the interface may be used to originate calls, but not answer calls.
Default Values
By default, the connect mode is set to both answer and originate calls.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures demand interface 1 to only answer calls: (config)#interface demand 1 (config-demand 1)#connect-mode answer
60000CRG0-35B
1861
connect-order
Use the connect-order command to specify the starting point in the connection sequence for each sequence activation. The connection sequence is a circular list. Use the no form of this command to restore the default value. Variations of this command include:
connect-order last-successful connect-order round-robin connect-order sequential
Syntax Description
last-successful round-robin Specifies the connect sequence be processed beginning with the last successful entry or the first entry if there are no previous connections. Specifies the connect sequence be processed beginning with the entry that follows the last successful entry or the first entry if there are no previous connections. Specifies the connect sequence be processed from the beginning of the list.
sequential
Default Values
By default, connect sequences are processed sequentially.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures the connection sequence to begin with the last successful entry: (config)#interface demand 1 (config-demand 1)#connect-order last-successful
60000CRG0-35B
1862
connect-sequence
Use the connect-sequence command to provide instructions to the interface on how to use the resource pool and telephone numbers to connect to demand destinations. Use the no form of this command to restore the default value.Variations of this command include the following:
connect-sequence <value> dial-string <string> forced-analog connect-sequence <value> dial-string <string> forced-analog busyout-threshold <value> connect-sequence <value> dial-string <string> forced-cellular connect-sequence <value> dial-string <string> forced-cellular busyout-threshold <value> connect-sequence <value> dial-string <string> forced-isdn-56k connect-sequence <value> dial-string <string> forced-isdn-56k busyout-threshold <value> connect-sequence <value> dial-string <string> forced-isdn-64k connect-sequence <value> dial-string <string> forced-isdn-64k busyout-threshold <value> connect-sequence <value> dial-string <string> isdn-56k connect-sequence <value> dial-string <string> isdn-56k busyout-threshold <value> connect-sequence <value> dial-string <string> isdn-64k connect-sequence <value> dial-string <string> isdn-64k busyout-threshold <value>
Syntax Description
<value> dial-string <string> forced-analog forced-cellular forced-isdn-56k forced-isdn-64k isdn-56k isdn-64k Specifies the sequence number for this connection specification entry. Range is 1 to 65535. Specifies the telephone number to dial when using this connection. The dial string is limited to 20 digits. Specifies that only analog resources may be used. Specifies that only cellular resources may be used. Specifies that only integrated services digital network (ISDN) resources may be used. Call is placed using ISDN 56k. Specifies that only ISDN resources may be used. Call is placed using ISDN 64k. Specifies any dial resource may be used if ISDN 56k call type is used. Specifies any dial resource may be used if ISDN 64k call type is used.
busyout-threshold <value> Optional. Specifies the maximum number of connect sequence cycles during an activation attempt that must fail before it is skipped until the next activation attempt.
Default Values
By default, any dial resource may be used. By default, the dial string for cellular connections is #777.
Command History
Release 11.1 Release 17.2 Command was introduced. Command was expanded to include the cellular connections.
60000CRG0-35B
1863
Usage Examples
The following example instructs demand interface 1 to place the call using ISDN 64k: (config)#interface demand 1 (config-demand 1)#connect-sequence 65 dial-string 2565559911 forced-isdn-64k The following example instructs demand interface 1 to place the call using a cellular connection: (config)#interface demand 1 (config-demand 1)#connect-sequence 1 dial-string #777 forced-cellular
60000CRG0-35B
1864
Default Values
By default, the connect-sequence attempts are unlimited.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example instructs demand interface 1 to attempt its connection sequence 500 times: (config)#interface demand 1 (config-demand 1)#connect-sequence attempts 500
60000CRG0-35B
1865
connect-sequence interface-recovery
Use the connect-sequence interface-recovery command to allow the interface to go down in the event that the connect-sequence attempts value is exhausted. Refer to connect-sequence attempts <value> on page 1865 for more information. Use the no form of this command to restore the default value. Variations of this command include:
connect-sequence interface-recovery connect-sequence interface-recovery retry-interval <value> connect-sequence interface-recovery retry-interval <value> max-retries <number>
Syntax Description
retry-interval <value> max-retries <number> Optional. Specifies the number of seconds the interface will wait between connect sequence cycles during recovery attempts. Optional. Specifies the maximum number of times the connect sequence will cycle in an attempt to bring the interface back up. When in interface recovery mode, this value overrides the connect-sequence attempts value.
Default Values
By default, the connect-sequence interface-recovery retry-interval is set to 120 seconds and max-retries are unlimited.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures demand interface 1 to wait 60 seconds between retry attempts with a maximum number of 500 retries: (config)#interface demand 1 (config-demand 1)#connect-sequence interface-recovery retry-interval 60 max-retries 500
60000CRG0-35B
1866
For virtual private network (VPN) configuration example scripts, refer to the VPN configuration guide available on the AOS Documentation CD shipped with your product.
Syntax Description
<name> Assigns a crypto map name to the interface.
Default Values
By default, no crypto maps are assigned to an interface.
Command History
Release 4.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
When configuring a system to use both the stateful inspection firewall and Internet key exchange (IKE) negotiation for VPN, keep the following notes in mind. When defining the policy class and associated access control lists (ACLs) that describe the behavior of the firewall, do not forget to include the traffic coming into the system over a VPN tunnel terminated by the system. The firewall should be set up with respect to the unencrypted traffic that is destined to be sent or received over the VPN tunnel. The following diagram represents typical AOS data-flow logic.
60000CRG0-35B
1867
IPSec Decrypt/Discard
IPSec Encrypt
NAT/ACP/ Firewall
Router
As shown in the diagram above, data coming into the product is first processed by the static filter associated with the interface on which the data is received. This access group is a true static filter and is available for use regardless of whether the firewall is enabled or disabled. Next (if the data is encrypted), it is sent to the IPSec engine for decryption. The decrypted data is then processed by the stateful inspection firewall. Therefore, given a terminating VPN tunnel, only unencrypted data is processed by the firewall. The ACLs for a crypto map on an interface work in reverse logic to the ACLs for a policy class on an interface. When specifying the ACLs for a crypto map, the source information is the private local side, unencrypted source of the data. The destination information will be the far-end, unencrypted destination of the data. However, ACLs for a policy class work in reverse. The source information for the ACL in a policy class is the far end. The destination information is the local side.
Usage Examples
The following example applies all crypto maps with the name MyMap to the demand interface: (config)#interface demand 1 (config-demand 1)#crypto map MyMap
60000CRG0-35B
1868
Default Values
By default, the hold queue is disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures demand interface 1 to hold 50 packets in the queue for up to 120 seconds: (config)#interface demand 1 (config-demand 1)#demand-hold-queue 50 timeout 120
60000CRG0-35B
1869
dynamic-dns
Use the dynamic-dns command to configure Dynamic DNS service provided by Dynamic Network Services, Inc. (www.dyndns.org). Use the no form of this command to disable this feature. Variations of this command include:
dynamic-dns custom <hostname> <minutes> dynamic-dns dyndns <hostname> <username> <password> dynamic-dns dyndns-custom <hostname> <username> <password> dynamic-dns dyndns-static <hostname> <username> <password>
Syntax Description
<hostname> <minutes> Specifies the host name for the server that updates the dynamic domain naming system (DNS). Specifies the intervals in minutes to update the server with information (updates also occur when the interfaces IP address changes regardless of the update intervals). Specifies a user name using an alphanumerical string up to 30 characters in length (the user name is case sensitive). Specifies a password using an alphanumerical string up to 30 characters in length (the password is case sensitive). Refer to Functional Notes below for additional argument descriptions.
<username> <password>
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 12.1 Release 15.1 Command was introduced. Command was expanded. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
custom - Constanttime.coms Custom Dynamic DNSSM service allows you complete access and management control over your domain name regardless of where you purchased/registered it. This allows you to manage IP address mappings (A records), domain aliases (CNAME records), and mail servers (mail exchange (MX) records). dyndns - The Dynamic DNSSM offered by Dynamic Network Services, Inc. (DynDNS.org) allows you to alias a dynamic IP address to a static host name in various domains. This allows your unit to be more easily accessed from various locations on the Internet. This service is provided for up to five host names.
60000CRG0-35B
1870
dyndns-custom - DynDNS.org's Custom DNSSM service provides a full DNS solution, giving you complete control over an entire domain name. A Web-based interface provides two levels of control over your domain, catering to average or advanced users. Five globally redundant DNS servers ensure that your domain will always resolve. A choice of two interfaces is available. The basic interface is designed for most users. It comes preconfigured for most common configurations and allows for easy creation of most common record types. The advanced interface is designed for system administrators with a solid DNS background, and provides layout and functionality similar to a BIND zone file allowing for the creation of nearly any record type. Custom DNSSM can be used with both static and dynamic IPs, and has the same automatic update capability through Custom DNS-aware clients as Dynamic DNS. dyndns-static - The Static DNS service is similar to DynDNS.orgs Dynamic DNSSM service in that it allows a host name, such as yourname.dyndns.org, to point to your IP address. Unlike a Dynamic DNS host, a Static DNS host does not expire after 35 days without updates, but updates take longer to propagate through the DNS system. This service is provided for up to five host names. If your IP address does not change often or at all, but you still want an easy name to remember it by (without having to purchase your own domain name), Static DNS service is ideal for you. If you would like to use your own domain name (such as yourname.com), you need Custom DNS service that also provides full dynamic and static IP address support.
Usage Examples
The following example sets the Dynamic DNS to dyndns-custom with host name host, user name user, and password pass: (config)#interface demand 1 (config-demand 1)#dynamic-dns dyndns-custom host user pass
60000CRG0-35B
1871
fair-queue
Use the fair-queue command to enable weighted fair queuing (WFQ) on an interface. Use the no form of this command to disable WFQ and enable first in, first out (FIFO) queueing for an interface. Variations of this command include:
fair-queue fair-queue <threshold>
WFQ must be enabled on an interface to use priority queuing. By default, WFQ is enabled for all interfaces with maximum bandwidth speeds equivalent to T1/E1 and below.
Syntax Description
<threshold> Optional. Specifies the maximum number of packets that can be present in each conversation subqueue. Packets received for a conversation after this limit is reached are discarded. Range: 16 to 512 packets.
Default Values
By default, WFQ is enabled with a threshold of 64 packets.
Command History
Release 5.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Usage Examples
The following example enables WFQ on the interface with a threshold set at 100 packets: (config)#interface demand 1 (config-demand 1)#fair-queue 100
60000CRG0-35B
1872
fast-idle <value>
Use the fast-idle command to set the amount of time the demand interface connection will remain active in the absence of interesting traffic when there is contention for the demand resources being used by this interface. Use the no form of this command to restore the default value. Syntax Description
<value> Specifies the number of seconds the interface will remain up in the absence of interesting traffic. Range is 1 to 2147483 seconds.
Default Values
By default, fast-idle is set to 120 seconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets fast idle to 1073752 seconds: (config)#interface demand 1 (config-demand 1)#fast-idle 1073752
60000CRG0-35B
1873
Default Values
The default queue size for weighted fair queuing (WFQ) is 400. The default queue size for Point-to-Point Protocol (PPP) first in, first out (FIFO) and Frame Relay round-robin is 200.
Command History
Release 5.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Usage Examples
The following example sets the overall output queue size to 700: (config)#interface demand 1 (config-demand 1)#hold-queue 700 out
60000CRG0-35B
1874
idle-timeout <value>
Use the idle-timeout command to set the amount of time the interface link/bundle will remain up in the absence of interesting traffic. Interesting traffic and direction logic are set using the match-interesting commands. Refer to match-interesting ip on page 1911 for more information. Use the no form of this command to restore the default value. Syntax Description
<value> Specifies the number of seconds the interface will remain up in the absence of interesting traffic. Range is 1 to 2147483 seconds.
Default Values
By default, idle-timeout is set to 120 seconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures demand interface 1 to time out after 360 seconds: (config)#interface demand 1 (config-demand 1)#idle-timeout 360
60000CRG0-35B
1875
ip access-group <name>
Use the ip access-group command to create an access control list (ACL) to be used for packets transmitted on or received from the specified interface. Use the no form of this command to disable this type of control. Variations of this command include:
ip access-group <name> in ip access-group <name> out
Syntax Description
<name> in out Indicates the assigned IP ACL name. Enables access control on packets received on the specified interface. Enables access control on packets transmitted on the specified interface.
Default Values
By default, these commands are disabled.
Command History
Release 3.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
When this command is enabled, the IP destination address of each packet must be validated before being passed through. If the packet is not acceptable per these settings, it is dropped.
Usage Examples
The following example sets up the router to only allow Telnet traffic into the demand interface: (config)#ip access-list extended TelnetOnly (config-ext-nacl)#permit tcp any any eq telnet (config-ext-nacl)#interface demand 1 (config-demand 1)#ip access-group TelnetOnly in
60000CRG0-35B
1876
ip access-policy <name>
Use the ip access-policy command to assign a specified access control policy (ACP) to an interface. ACPs are applied to traffic entering an interface. Use the no form of this command to remove an ACP association. For more information on using ACPs, refer to ip policy-class <ipv4 acp name> on page 985. Configured ACPs will only be active if the ip firewall command has been entered at the Global Configuration mode prompt to enable the AOS security features. All configuration parameters are valid, but no security data processing will be attempted unless the security features are enabled. Syntax Description
<name> Identifies the configured ACP by alphanumeric descriptor (all ACP descriptors are case sensitive).
Default Values
By default, there are no configured ACPs associated with an interface.
Command History
Release 2.1 Release 5.1 Release 6.1 Release 15.1 Release 17.9 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the virtual local area network (VLAN) interfaces. Command was expanded to include the bridged virtual interfaces (BVIs). Command was changed to require the ip keyword.
Functional Notes
To assign an ACP to an interface, enter the interface configuration mode for the desired interface and enter ip access-policy <name>.
Usage Examples
The following example associates the ACP PRIVATE (to allow inbound traffic to the Web server) to the demand interface 1: Enable the AOS security features: (config)#ip firewall Associate the access policy with the demand interface 1: (config)#interface demand 1 (config-demand 1)#ip access-policy PRIVATE
60000CRG0-35B
1877
ip address negotiated
Use the ip address negotiated command to allow the interface to negotiate (i.e., be assigned) an IP address from the far-end Point-to-Point Protocol (PPP) connection. Use the no form of this command to disable the negotiation for an IP address. Variations of this command include:
ip address negotiated ip address negotiated dns-sync ip address negotiated dns-sync no-default ip address negotiated no-default ip address negotiated no-default dns-sync
Syntax Description
dns-sync no-default Optional. Specifies that when the IP address is negotiated, domain naming system (DNS) information is also received. Optional. Prevents the insertion of a default route. Some systems already have a default route configured and need a static route to the PPP interface to function correctly.
Default Values
By default, the interface is assigned an address with the ip address <ip address> <subnet mask> command.
Command History
Release 5.1 Release 11.1 Release 17.9 Command was introduced. Command was expanded to include the demand interface. Command was expanded to include the dns-sync parameter.
Usage Examples
The following example enables the demand interface to negotiate an IP address from the far-end connection: (config)#interface demand 1 (config-demand 1)#ip address negotiated The following example enables the demand interface to negotiate an IP address from the far-end connection without inserting a default route: (config)#interface demand 1 (config-demand 1)#ip address negotiated no-default
60000CRG0-35B
1878
Syntax Description
<ip address> <subnet mask> Specifies a valid IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IP addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Optional. Configures a secondary IP address for the specified interface.
secondary
Default Values
By default, there are no assigned IP addresses.
Command History
Release 1.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a secondary IP address of 192.22.72.101 255.255.255.252: (config)#interface demand 1 (config-demand 1)#ip address 192.22.72.101 255.255.255.252 secondary
60000CRG0-35B
1879
Default Values
By default, no IP address range is defined.
Command History
Release 17.4 Command was introduced.
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a range of secondary IP address from 192.22.72.1 to 192.22.72.10 on subnet 255.255.255.252: (config)#interface demand 1 (config-demand 1)#ip address range 192.22.72.1 192.22.72.10 255.255.255.252 secondary
60000CRG0-35B
1880
ip directed-broadcast
Use the ip directed-broadcast command to allow reception/forwarding of directed broadcasts. Use the no form of this command to disable this feature. Variations of this command include:
ip directed-broadcast ip directed-broadcast <name>
Syntax Description
<name> Specifies IP access control list (ACL) name.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Command was introduced.
Functional Notes
A directed broadcast is a packet intended for all nodes on a nonlocal network. For example, the broadcast address 255.255.255.255 reaches all nodes on a network; the directed broadcast address 128.1.255.255 is intended for all nodes whose network address is 128.1.0.0. A router not directly attached to 128.1.0.0 simply forwards the directed broadcast packet to the next hop. A router on network 128.1.0.0 that has ip directed-broadcast enabled, accepts and forwards the packet to all nodes whose network address is 128.1.0.0. Routers connecting subnets of 128.1.0.0 also accept and forward the packet to the nodes on their respective subnets. When a directed broadcast packet reaches a router that is directly connected to its destination subnet, that packet is distributed as a broadcast on the destination subnet. The packet is then sent as a link-layer broadcast. The ip directed-broadcast command controls the distribution of directed broadcasts when they reach their target subnets. Only the final transmission of the directed broadcast on its ultimate destination subnet is affected. It does not affect the transit unicast routing of IP directed broadcasts. If ip directed-broadcast is enabled for this interface, incoming IP packets whose addresses identify them as directed broadcasts intended for the subnet to which this interface is attached will be forwarded as broadcasts on that subnet. Forwarding of the packets can be limited by specifying an ACL with this command. In this case, only directed broadcasts that are permitted by the specified ACL will be forwarded, and all other directed broadcasts directed to this interface subnet will be dropped. Disabling the ip directed-broadcast command will cause directed broadcasts destined for the subnet to which this interface is attached to be dropped. This option is a requirement for routers as described in RFC 1812, section 4.2.2.11. Furthermore, it is disabled by default (RFC 2644), with the intended goal of reducing the efficacy of certain types of denial of service (DoS) attacks.
60000CRG0-35B
1881
Usage Examples
The following example enables forwarding of directed broadcasts on the interface demand 1: (config)#interface demand 1 (config-demand 1)#ip directed-broadcast
60000CRG0-35B
1882
ip flow
Use the ip flow command to enable integrated traffic monitoring (ITM) for all traffic received or forwarded on an interface. Use the no form of this command to disable traffic monitoring. Variations of this command include:
ip flow egress ip flow egress <name> ip flow ingress ip flow ingress <name>
Syntax Description
egress ingress <name> Specifies that all outgoing traffic be monitored. Specifies that all incoming traffic be monitored. Optional. Specifies the name of an access control list (ACL) to use for filtering traffic.
Default Values
By default, no traffic monitoring is enabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables traffic monitoring on a demand interface to monitor incoming traffic through an ACL called myacl: (config)#interface demand 1 (config-demand 1)#ip flow ingress myacl
60000CRG0-35B
1883
Default Values
By default, broadcast UDP packets are not forwarded.
Command History
Release 1.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
When used in conjunction with the ip forward-protocol command, the ip helper-address feature allows you to customize which broadcast packets are forwarded. To implement the helper address feature, assign a helper address(es) (specifying the device that needs to receive the broadcast traffic) to the interface closest to the host that transmits the broadcast packets. When broadcast packets (of the specified type forwarded using the ip forward-protocol command) are received on the interface, they will be forwarded to the device that needs the information. Only packets meeting the following criteria are considered eligible by the ip helper-address feature: 1. The packet IP protocol is UDP. 2. Any UDP port specified using the ip forward-protocol command. 3. The medium access control (MAC) address of the frame is an all-ones broadcast address (ffff.ffff.ffff). 4. The destination IP address is broadcast defined by all ones (255.255.255.255) or a subnet broadcast (for example, 192.33.4.251 for the 192.33.4.248 /30 subnet).
60000CRG0-35B
1884
Usage Examples
The following example forwards all domain naming system (DNS) broadcast traffic to the DNS server with IP address 192.33.5.99: (config)#ip forward-protocol udp domain (config)#interface demand 1 (config-demand 1)#ip helper-address 192.33.5.99
60000CRG0-35B
1885
ip igmp
Use the ip igmp command to configure multicasting related functions for the interface. Variations of this command include:
ip igmp immediate-leave ip igmp last-member-query-interval <milliseconds> ip igmp querier-timeout <seconds> ip igmp query-interval <seconds> ip igmp query-max-response-time <seconds> ip igmp static-group <address> ip igmp version [1 | 2]
Syntax Description
immediate-leave Specifies that if only one host (or Internet Group Management Protocol (IGMP) snooping switch) is connected to the interface, when a leave is received, multicast of that group is immediately terminated as opposed to sending a group query and timing out the group if no device responds. Works in conjunction with ip igmp last-member-query-interval. Applies to all groups when configured. Use the no form of this command to disable the immediate-leave feature. Controls the timeout (in milliseconds) used to detect whether any group receivers remain on an interface after a receiver leaves a group. If a receiver sends a leave-group message (IGMP Version 2), the router sends a group-specific query on that interface. After twice the time specified by this command plus as much as one second longer, if no receiver responds, the router removes that interface from the group and stops sending that group's multicast packets to the interface. Range is 100 to 65535 ms. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) that the router waits after the current queriers last query before it takes over as querier (IGMP V2). Range is 60 to 300 seconds. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) at which IGMP queries are sent on an interface. Host query messages are addressed to the all-hosts multicast group with an IP time to live (TTL) of 1. The router uses queries to detect whether multicast group members are on the interface and to select an IGMP designated router (DR) for the attached segment (if more than one multicast router exists). Only the DR for the segment sends queries. For IGMP V2, the DR is the router with the lowest IP address on the segment. Range is 0 to 65535 seconds. Use the no form of this command to return to the default setting. Specifies the maximum response time (in seconds) advertised by this interface in queries when using IGMP V2. Hosts are allowed a random time within this period to respond, reducing response bursts. Use the no form of this command to return to the default setting.
last-member-query-interval <milliseconds>
querier-timeout <seconds>
query-interval <seconds>
query-max-response-time <seconds>
60000CRG0-35B
1886
version [1 | 2]
Default Values
ip igmp immediate-leave ip igmp last-member-query-interval ip igmp querier-timeout ip igmp query-interval ip igmp query-max-response-time ip igmp static-group ip igmp version No default 1000 milliseconds 2x the query-interval value 60 seconds 10 seconds No default Version 1
Command History
Release 7.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Usage Examples
The following example sets the query message interval on the interface to 200 milliseconds: (config)#interface demand 1 (config-demand 1)#ip igmp last-member-query-interval 200
60000CRG0-35B
1887
ip mcast-stub downstream
Use the ip mcast-stub downstream command to enable multicast forwarding and Internet Group Management Protocol (IGMP) (router mode) on an interface and place it in multicast stub downstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub upstream commands. Downstream interfaces connect to segments with multicast hosts. Multiple interfaces may be configured in downstream mode; however, interfaces connecting to the multicast network (upstream) should not be configured in downstream mode. Interfaces configured as downstream should have the lowest IP address of all IGMP-capable routers on the connected segment in order to be selected as the designated router (DR) and ensure proper forwarding. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub upstream on page 1891 for more information.
Usage Examples
The following example enables multicast forwarding and IGMP on the interface: (config)#interface demand 1 (config-demand 1)#ip mcast-stub downstream
60000CRG0-35B
1888
ip mcast-stub fixed
Use the ip mcast-stub fixed command to allow forwarding of multicast traffic on a selected interface after enabling multicast routing. Use the no form of this command to disable this mode. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 12.1 Command was introduced.
Functional Notes
Multicast routing must be enabled prior to setting ip mcast-stub fixed on the selected interface. Also, use the command ip igmp on page 1886 to receive multicast traffic without host-initiated Internet Group Management Protocol (IGMP) activity on the selected interface. Otherwise, all host-initiated IGMP transactions will enter multicast routes on the routers interface involved with IGMP activities.
Usage Examples
The following example enables multicast traffic forwarding and IGMP on the interface: (config)#interface demand 1 (config-demand 1)#ip mcast-stub fixed
60000CRG0-35B
1889
ip mcast-stub helper-enable
Use the ip mcast-stub helper-enable command to assign the ip mcast-stub helper-address as the Internet Group Management Protocol (IGMP) proxy. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 8.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address, ip mcast-stub upstream, and ip mcast-stub downstream commands. When enabled, the interface becomes a helper forwarding interface. The IGMP host function is dynamically enabled and the interface becomes the active upstream interface, enabling the unit to perform as an IGMP proxy. Refer to ip mcast-stub helper-address <ip address> on page 968, ip mcast-stub downstream on page 1888, and ip mcast-stub upstream on page 1891 for more information.
Usage Examples
The following example sets the helper address as the IGMP proxy: (config)#interface demand 1 (config-demand 1)#ip mcast-stub helper-enable
60000CRG0-35B
1890
ip mcast-stub upstream
Use the ip mcast-stub upstream command to enable multicast forwarding on an interface and place it in multicast stub upstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub downstream commands. When enabled, the interface becomes a candidate to be a helper forwarding interface. If chosen as the best path toward the helper address by the router's unicast route table, the IGMP host function is dynamically enabled and the interface becomes the active upstream interface, enabling the router to perform as an IGMP proxy. Though multiple interfaces may be candidates, no more than one interface will actively serve as the helper forwarding interface. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub downstream on page 1888 for more information.
Usage Examples
The following example enables multicast forwarding on the interface: (config)#interface demand 1 (config-demand 1)#ip mcast-stub upstream
60000CRG0-35B
1891
ip mtu <size>
Use the ip mtu command to configure the maximum transmission unit (MTU) size for the active interface. Use the no form of this command to return to the default value. Syntax Description
<size> Configures the window size for transmitted packets. The valid ranges for the various interfaces are listed below: ATM subinterfaces 64 to 1520 BVIs 64 to 2100 Demand interfaces 64 to 1520 Ethernet interfaces 64 to 1500 FDL interfaces 64 to 256 Frame Relay subinterfaces 64 to 1520 HDLC interfaces (NetVanta 5305) 64 to 4600 HDLC interfaces (all other NetVanta products)64 to 2100 Loopback interfaces 64 to 1500 PPP interfaces (NetVanta 5305) 64 to 4600 PPP interfaces (all other NetVanta products) 64 to 2100 Tunnel interfaces 64 to 18190
Default Values
<size> The default values for the various interfaces are listed below: ATM subinterfaces 1500 BVIs 1500 Demand interfaces 1500 Ethernet interfaces 1500 FDL interfaces 256 Frame Relay subinterfaces 1500 HDLC interfaces 1500 Loopback interfaces 1500 PPP interfaces 1500 Tunnel interfaces 1476
Command History
Release 1.1 Release 11.1 Release 17.9 Command was introduced. Command was expanded to include the demand interface. Command was changed to require the ip keyword.
Functional Notes
Open shortest path first (OSPF) will not become adjacent on links where the MTU sizes do not match. If router A and router B are exchanging hello packets but their MTU sizes do not match, they will never reach adjacency. This is by design and required by the RFC.
60000CRG0-35B
1892
Usage Examples
The following example specifies an MTU of 1200 on the virtual demand interface: (config)#interface demand 1 (config-demand 1)#ip mtu 1200
60000CRG0-35B
1893
ip ospf
Use the ip ospf command to customize open shortest path first (OSPF) settings (if needed). Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication-key <password> ip ospf cost <value> ip ospf dead-interval <seconds> ip ospf hello-interval <seconds> ip ospf message-digest-key [1 | 2] md5 <key> ip ospf priority <value> ip ospf retransmit-interval <seconds> ip ospf transmit-delay <seconds>
Syntax Description
authentication-key <password> cost <value> Assigns a simple-text authentication password to be used by other routers using the OSPF simple password authentication. Specifies the OSPF cost of sending a packet on the interface. This value overrides any computed cost value. Range is 1 to 65535. Sets the maximum interval (in seconds) allowed between hello packets. If the maximum is exceeded, neighboring devices will determine that the device is down. Range is 0 to 32767 seconds. Specifies the interval (in seconds) between hello packets sent on the interface. Range is 0 to 32767 seconds. Configures OSPF message digest 5 (MD5) authentication (16 byte maximum) keys. Sets the OSPF priority. The value set in this field helps determine the designated router (DR) for this network. Range is 0 to 255. Specifies the interval (in seconds) between link state advertisements (LSAs). Range is 0 to 32767 seconds. Sets the estimated time (in seconds) required to send an LSA on the interface. Range is 0 to 32767 seconds.
dead-interval <seconds>
Default Values
dead-interval <seconds> hello-interval <seconds> retransmit-interval <seconds> transmit-delay <seconds> 40 seconds 10 seconds: Ethernet, Frame Relay, and Point-to-Point Protocol (PPP) 5 seconds 1 second
60000CRG0-35B
1894
Command History
Release 3.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Usage Examples
The following example sets the maximum number of seconds allowed between hello packets to 25000: (config)#interface demand 1 (config-demand 1)#ip ospf dead-interval 25000
60000CRG0-35B
1895
ip ospf authentication
Use the ip ospf authentication command to authenticate an interface that is performing open shortest path first (OSPF) authentication. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication ip ospf authentication message-digest ip ospf authentication null
Syntax Description
message-digest null Optional. Selects message-digest authentication type. Optional. Specifies that no authentication be used.
Default Values
By default, ip ospf authentication is set to null (meaning no authentication is used).
Command History
Release 3.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Usage Examples
The following example specifies that no authentication will be used on the demand interface: (config)#interface demand 1 (config-demand 1)#ip ospf authentication null
60000CRG0-35B
1896
ip ospf network
Use the ip ospf network command to specify the type of network on this interface. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf network broadcast ip ospf network point-to-point
Syntax Description
broadcast point-to-point Sets the network type for broadcast. Sets the network type for point-to-point.
Default Values
By default, Ethernet defaults to broadcast. Point-to-Point Protocol (PPP) and Frame Relay default to point-to-point.
Command History
Release 3.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
A point-to-point network will not elect designated routers.
Usage Examples
The following example designates a broadcast network type: (config)#interface demand 1 (config-demand 1)#ip ospf network broadcast
60000CRG0-35B
1897
Default Values
By default, policy-based routing is disabled for all interfaces.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example associates the route map named MyMap with demand interface 1: (config)#interface demand 1 (config-demand 1)#ip policy route-map MyMap
60000CRG0-35B
1898
ip proxy-arp
Use the ip proxy-arp command to enable proxy Address Resolution Protocol (ARP) on the interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, proxy ARP is enabled.
Command History
Release 1.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
In general, the principle of proxy ARP allows a router to insert its IP address in the source IP address field of a packet (if the packet is from a host on one of its subnetworks). This allows hosts to reach devices on other subnetworks without implementing routing or specifying a default gateway. If proxy ARP is enabled, AOS will respond to all proxy ARP requests with its specified medium access control (MAC) address and forward packets accordingly. Enabling proxy ARP on an interface may introduce unnecessary ARP traffic on the network.
Usage Examples
The following example enables proxy ARP on the virtual demand interface: (config)#interface demand 1 (config-demand 1)#ip proxy-arp
60000CRG0-35B
1899
Syntax Description
1 2 Accepts only received RIP version 1 packets on the interface. Accepts only received RIP version 2 packets on the interface.
Default Values
By default, all interfaces implement RIP version 1 (the default value for the version command).
Command History
Release 1.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
Use the ip rip receive version to specify a RIP version that overrides the version (in the Router RIP) configuration. AOS only accepts one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the virtual demand interface to accept only RIP version 2 packets: (config)#interface demand 1 (config-demand 1)#ip rip receive version 2
60000CRG0-35B
1900
Syntax Description
1 2 Transmits only RIP version 1 packets on the interface. Transmits only RIP version 2 packets on the interface.
Default Values
By default, all interfaces transmit RIP version 1 (the default value for the version command).
Command History
Release 1.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
Use the ip rip send version to specify a RIP version that overrides the version (in the Router RIP) configuration. AOS only transmits one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the virtual demand interface to transmit only RIP version 2 packets: (config)#interface demand 1 (config-demand 1)#ip rip send version 2
60000CRG0-35B
1901
Default Values
By default, no manual summarization is applied by RIP.
Command History
Release 12.1 Command was introduced.
Functional Notes
Unlike the automatic summarization on classful network boundaries, only specific network advertisements are made by RIP using the ip rip summary-address command. This command is only effective if RIP version 2 is configured.
Usage Examples
The following example enables manual summarization on the specified IP address: (config)#interface demand 1 (config-demand 1)#ip rip summary-address 10.10.123.0 255.255.255.0
60000CRG0-35B
1902
ip route-cache
Use the ip route-cache command to enable fast-cache switching on the interface. Use the no form of this command to disable fast-cache switching and return to process switching mode. Using network address translation (NAT) or the AOS firewall capabilities on an interface requires process switching mode (using the no ip route-cache command).
Syntax Description
No subcommands.
Default Values
By default, fast-cache switching is enabled on all Ethernet and virtual Frame Relay subinterfaces. IP route cache is enabled for all virtual demand interfaces.
Command History
Release 2.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
Fast-cache switching allows an IP interface to provide optimum performance when processing IP traffic.
Usage Examples
The following example enables fast-cache switching on the virtual demand interface: (config)#interface demand 1 (config-demand 1)#ip route-cache
60000CRG0-35B
1903
ip unnumbered <interface>
Use the ip unnumbered command to use the IP address assigned to the specified interface for all IP processing on the active interface. Use the no form of this command to remove the unnumbered configuration. Syntax Description
<interface> Specifies the interface that contains the IP address to use as the source address for all packets transmitted on this interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type ip unnumbered ? for a list of valid interfaces.
Default Values
By default, all interfaces are configured to use a specified IP address (using the ip address command).
Command History
Release 1.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
If ip unnumbered is enabled on an interface, all IP traffic from the interface will use a source IP address taken from the specified interface. For example, specifying ip unnumbered eth 0/1 while in the Demand Interface Configuration mode configures the demand interface to use the IP address assigned to the Ethernet interface for all IP processing. In addition, AOS uses the specified interface information when sending route updates over the unnumbered interface. Static routes may either use the interface name (ppp 1) or the far-end address (if it will be discovered).
Usage Examples
The following example configures the demand interface (labeled demand 1) to use the IP address assigned to the Ethernet interface (eth 0/1): (config)#interface demand 1 (config-demand 1)#ip unnumbered eth 0/1
60000CRG0-35B
1904
ip urlfilter <name>
Use the ip urlfilter command to apply a universal resource locator (URL) filter to the interface for all inbound or outbound traffic. Use the no form of this command to remove the URL filter from an interface. Variations of this command include:
ip urlfilter <name> in ip urlfilter <name> out
Syntax Description
<name> in out Specifies the URL filter name to use on the interface. Applies the filter to the inbound traffic. Applies the filter to the outbound traffic.
Default Values
By default, there are no URL filters applied to any interfaces.
Command History
Release 12.1 Release 14.1 Command was introduced. Command was expanded to include the virtual local area network (VLAN) interfaces.
Functional Notes
The firewall must be enabled using the ip firewall command in order to use URL filters. The URL filter must be created by using the ip urlfilter <name> http command before applying it to the interface. Refer to ip urlfilter <name> http on page 1090 for more information on using this command.
Usage Examples
The following example performs URL filtering on all traffic entering through the demand interface (labeled demand 1) and matches the URL filter named MyFilter: (config)#interface demand 1 (config-demand 1)#ip urlfilter MyFilter in
60000CRG0-35B
1905
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface demand 1 (config-demand 1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1906
keepalive <value>
Use the keepalive command to enable the transmission of keepalive packets on the interface and specify the time interval in seconds between transmitted packets. Use the no form of this command to return to the default setting. Syntax Description
<value> Defines the time interval (in seconds) between transmitted keepalive packets. Range is 0 to 32767 seconds.
Default Values
By default, the time interval between transmitted keepalive packets is 10 seconds.
Command History
Release 1.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
If three keepalive packets are sent to an interface with no response, the interface is considered down. To detect interface failures quickly, specify a smaller keepalive time.
Usage Examples
The following example specifies a keepalive time of 5 seconds on the virtual demand interface: (config)#interface demand 1 (config-demand 1)#keepalive 5
60000CRG0-35B
1907
lldp receive
Use the lldp receive command to allow Link Layer Discovery Protocol (LLDP) packets to be received on this interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, all interfaces are configured to send and receive LLDP packets.
Command History
Release 9.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Usage Examples
The following example configures the demand interface to receive LLDP packets: (config)#interface demand 1 (config-demand 1)#lldp receive
60000CRG0-35B
1908
lldp send
Use the lldp send command to configure this interface to transmit Link Layer Discovery Protocol (LLDP) packets or to control the types of information contained in the LLDP packets transmitted by this interface. Use the no form of this command to disable this feature. Variations of this command include:
lldp send lldp send management-address lldp send port-description lldp send system-capabilities lldp send system-description lldp send system-name lldp send-and-receive
Syntax Description
management-address port-description system-capabilities system-description system-name and-receive Enables transmission of management address information on this interface. Enables transmission of port description information on this interface. Enables transmission of this devices system capabilities on this interface. Enables transmission of this devices system description on this interface. Enables transmission of this devices system name on this interface. Configures this interface to both transmit and receive LLDP packets.
Default Values
By default, all interfaces are configured to transmit and receive LLDP packets of all types.
Command History
Release 9.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
Individual LLDP information can be enabled or disabled using the various forms of the lldp send command. For example, use the lldp send-and-receive command to enable transmit and receive of all LLDP information. Then use the no lldp send port-description command to prevent LLDP from transmitting port description information.
Usage Examples
The following example configures the demand interface to transmit LLDP packets containing all enabled information types: (config)#interface demand 1 (config-demand 1)#lldp send
60000CRG0-35B
1909
The following example configures the demand interface to transmit and receive LLDP packets containing all information types: (config)#interface demand 1 (config-demand 1)#lldp send-and-receive
60000CRG0-35B
1910
match-interesting ip
Use the match-interesting ip command to allow an access control list (ACL) to specify which traffic attempting to cross this interface will be considered interesting. Use the no form of this command to restore the default value. Variations of this command include:
match-interesting ip list <name> match-interesting ip list <name> in match-interesting ip list <name> out match-interesting ip reverse list <name> match-interesting ip reverse list <name> in match-interesting ip reverse list <name> out
Syntax Description
list <name> reverse list <name> in out Specifies using an ACL with normal (source, destination) ACL matching logic. Specifies using an ACL with reverse (destination, source) ACL matching logic. Optional. Specifies that only incoming traffic is interesting. Optional. Specifies that only outgoing traffic is interesting.
Default Values
By default, no interesting traffic is defined.
Command History
Release 11.1 Release 17.9 Command was introduced. Command was changed to require the ip keyword.
Usage Examples
The following example instructs demand interface 1 to use the access control list MyACL when checking for interesting traffic: (config)#interface demand 1 (config-demand 1)#match-interesting ip list MyACL in
60000CRG0-35B
1911
max-reserved-bandwidth <value>
Use the max-reserved-bandwidth command to specify the percentage of interface bandwidth reserved for use in user-defined (priority or class-based) queues. The remainder of the interface bandwidth is reserved for system-critical traffic and is not available to user-defined queues. Use the no form of this command to restore the default value. Reserving a portion of the interface bandwidth for system-critical traffic is necessary for proper operation. Specifying the entire interface bandwidth for use in user-defined queues can cause undesirable operation. Syntax Description
<value> Specifies the maximum percentage of bandwidth to reserve for quality of service (QoS). This setting is configured as a percentage of the total interface speed. Range is 1 to 100 percent.
Default Values
By default, max-reserved-bandwidth is set to 75 percent, which reserves 25 percent of the interface bandwidth for system-critical traffic.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example specifies 85 percent of the bandwidth on the demand interface 1 be available for use in user-defined queues: (config)#interface demand 1 (config-demand 1)#max-reserved-bandwidth 85
60000CRG0-35B
1912
Default Values
By default, there is no assigned peer default IP address.
Command History
Release 3.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
This command is useful if the peer does not send the IP address option during Point-to-Point Protocol (PPP) negotiations.
Usage Examples
The following example sets the default peer IP address to 192.22.71.50: (config)#interface demand 1 (config-demand 1)#peer default ip address 192.22.71.50
60000CRG0-35B
1913
ppp authentication
Use the ppp authentication command to specify the authentication protocol on the Point-to-Point Protocol (PPP) virtual interface that the peer should use to authenticate itself. Use the no form of this command to remove configured PPP authentication. Variations of this command include:
ppp authentication chap ppp authentication pap
Syntax Description
chap pap Configures Challenge-Handshake Authentication Protocol (CHAP) authentication on the interface. Configures Password Authentication Protocol (PAP) authentication on the interface.
Default Values
By default, PPP endpoints have no authentication configured.
Command History
Release 1.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Technology Review
CHAP and PAP are two authentication methods that enjoy widespread support. Both methods are included in AOS and are easily configured.
The authentication method set up on the local router can be different from that on the peer. Also, just because one router requires authentication from its peer does not mean it also has to authenticate itself to the peer.
Defining PAP The PAP is used to verify that the PPP peer is a permitted device by checking a user name and password configured on the peer. The user name and password are both sent unencrypted across the connecting private circuit. PAP requires a two-way message passing. First, the router that is required to be authenticated (for example, the peer) sends an authentication request with its user name and password to the router requiring authentication (for example, the local router). The local router then looks up the user name and password in the user name database within the PPP interface and, if they match, sends an authentication acknowledge back to the peer.
60000CRG0-35B
1914
The PPP user name and password database is separate and distinct from the global user name password database. For PAP and CHAP, use the database under the PPP interface configuration.
Several example scenarios are given below for clarity. Configuring PAP Example 1: Only the local router requires the peer to authenticate itself. On the local router (host name Local): Local(config-demand 1)#ppp authentication pap Local(config-demand 1)#username farend password same On the peer (host name Peer): Peer(config-demand 1)#ppp pap sent-username farend password same The first line of the configuration sets the authentication mode as PAP. This means the peer is required to authenticate itself to the local router via PAP. The second line is the user name and password expected to be sent from the peer. On the peer, the ppp pap sent-username command is used to specify the appropriate matching user name and password. Configuring PAP Example 2: Both routers require the peer to authenticate itself. On the local router (host name Local): Local(config-demand 1)#ppp authentication pap Local(config-demand 1)#username farend password far Local(config-demand 1)#ppp pap sent-username nearend password near On the peer (host name Peer): Peer(config-demand 1)#ppp authentication pap Peer(config-demand 1)#username nearend password near Peer(config-demand 1)#ppp pap sent-username farend password far Now both routers send the authentication request, verify that the user name and password sent match what is expected in the database, and send an authentication acknowledge. Defining CHAP The CHAP is a three-way authentication protocol composed of a challenge response and success or failure. The message digest 5 (MD5) protocol is used to protect user names and passwords in the response.
60000CRG0-35B
1915
First, the local router (requiring its peer to be authenticated) sends a challenge containing only its own unencrypted user name to the peer. The peer then looks up the user name in the user name database within the PPP interface and, if found, takes the corresponding password and its own host name and sends a response back to the local router. This data is encrypted. The local router verifies that the user name and password are in its own user name database within the PPP interface and, if so, sends a success back to the peer.
The PPP user name and password database is separate and distinct from the global user name password database. For PAP and CHAP, use the database under the PPP interface configuration.
Several example scenarios are given below for clarity. Configuring CHAP Example 1: Only the local router requires the peer to authenticate itself. On the local router (host name Local): Local(config-demand 1)#ppp authentication chap Local(config-demand 1)#username Peer password same On the peer (host name Peer): Peer(config-demand 1)#ppp chap password same The first line of this configuration sets the authentication mode to CHAP. This means the peer is required to authenticate itself to the local router via CHAP. The second line is the user name and password expected to be sent from the peer. The peer uses its hostname and ppp chap password commands to send the proper authentication information.
Configuring CHAP Example 2: Using the ppp chap hostname command as an alternate solution. On the local router (host name Local): Local(config-demand 1)#ppp authentication chap Local(config-demand 1)#username farend password same On the peer (host name Peer): Peer(config-demand 1)#ppp chap hostname farend Peer(config-demand 1)#ppp chap password same
60000CRG0-35B
1916
Notice the local router is expecting user name farend even though the peer router's host name is Peer. Therefore, the peer router can use the ppp chap hostname command to send the correct name in the challenge.
Configuring CHAP Example 3: Both routers require each other to authenticate themselves using the same shared password. On the local router (host name Local): Local(config-demand 1)#ppp authentication chap Local(config-demand 1)#username Peer password same On the peer (host name Peer): Peer(config-demand 1)#ppp authentication chap Peer(config-demand 1)#username Local password same This is basically identical to Example 1 except that both routers will now challenge each other and respond.
Configuring CHAP Example 4: Both routers require each other to authenticate themselves using two separate shared passwords. On the local router (host name Local): Local(config-demand 1)#ppp authentication chap Local(config-demand 1)#username Peer password far Local(config-demand 1)#ppp chap password near On the peer (host name Peer): Peer(config-demand 1)#ppp authentication chap Peer(config-demand 1)#username Local password near Peer(config-demand 1)#ppp chap password far
60000CRG0-35B
1917
This is basically identical to Example 3, except that there are two separate shared passwords.
Notice this example has both ends using different sets of passwords.
Configuring CHAP Example 5: Using the ppp chap hostname command as an alternate solution. On the local router (host name Local): Local(config-demand 1)#ppp authentication chap Local(config-demand 1)#username farend password far Local(config-demand 1)#ppp chap hostname nearend Local(config-demand 1)#ppp chap password near On the peer (host name Peer): Peer(config-demand 1)#ppp authentication chap Peer(config-demand 1)#username nearend password near Peer(config-demand 1)#ppp chap hostname farend Peer(config-demand 1)#ppp chap password far Notice the local router is expecting user name farend even though the peer router's host name is Peer. Therefore, the peer router can use the ppp chap hostname command to send the correct name on the challenge.
Notice this example has both ends using different sets of passwords.
60000CRG0-35B
1918
Default Values
By default, this feature is disabled.
Command History
Release 14.1 Command was introduced.
Usage Examples
The following example configures the interface to negotiate tagged frames over bcp: (config)#interface demand 1 (config-demand 1)#ppp bcp tagged-frame
60000CRG0-35B
1919
Default Values
By default, there are no configured PPP CHAP host names.
Command History
Release 1.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Usage Examples
The following example specifies a PPP CHAP host name of my_host: (config)#interface demand 1 (config-demand 1)#ppp chap hostname my_host
60000CRG0-35B
1920
Default Values
By default, there is no defined PPP CHAP password.
Command History
Release 1.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Usage Examples
The following example specifies a PPP CHAP password of my_password: (config)#interface demand 1 (config-demand 1)#ppp chap password my_password
60000CRG0-35B
1921
ppp multilink
Use the ppp multilink command to enable Multilink Point-to-Point Protocol (MLPPP) operation on an existing Point-to-Point Protocol (PPP) interface. Use the no form of this command to disable this feature. Variations of this command include:
ppp multilink ppp multilink fragmentation ppp multilink interleave ppp multilink maximum <number>
Syntax Description
fragmentation interleave maximum <number> Enables multilink fragmentation operation. Enables multilink interleave operation. Specifies the maximum number of links allowed in a PPP multilink bundle.
Default Values
By default, MLPPP is disabled.
Command History
Release 7.1 Release 7.2 Release 11.1 Command was introduced. Fragmentation and interleave operation were added. Command was expanded to include the demand interface.
Functional Notes
When enabled, this interface is capable of the following: Combining multiple physical links into one logical link. Receiving upper layer protocol data units (PDUs), fragmenting and transmitting over the physical links. Receiving fragments over the physical links and reassembling them into PDUs.
The fragmentation and interleave options can be used to enhance the multilink operation. Fragmentation is used to reduce serialization delays of large packets. The fragmentation process evenly divides the data among all links in the bundle with a minimum packet size of 96 bytes. The interleave operation is used with streaming protocols to reduce delay by giving priority to packets identified as being high priority. Delivery in order is guaranteed with multilink fragmentation, but is not guaranteed with multilink interleave operation. The multilink bundle will remain active with a minimum of one physical link. Physical links may be dynamically added or removed from the multilink bundle with minor interruption to traffic flow.
60000CRG0-35B
1922
Usage Examples
The following example enables MLPPP: (config)#interface demand 1 (config-demand 1)#ppp multilink
60000CRG0-35B
1923
Default Values
By default, the PPP MTU on an interface is set to 1500 bytes.
Command History
Release 17.9 Command was introduced.
Usage Examples
The following example specifies a PPP MTU of 1200 on the virtual demand interface: (config)#interface demand 1 (config-demand 1)#ppp mtu 1200
60000CRG0-35B
1924
Default Values
By default, there is no defined ppp pap sent-username and password.
Command History
Release 1.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Usage Examples
The following example specifies a PPP PAP sent-user name of local and a password of my_password: (config)#interface demand 1 (config-demand 1)#ppp pap sent-username local password my_password
60000CRG0-35B
1925
qos-policy
Use the qos-policy command to apply a previously configured quality of service (QoS) map to incoming or outgoing packets on an interface. Use the no form of this command to remove the map from the interface. Variations of this command include:
qos-policy in <name> qos-policy out <name>
Syntax Description
<name> in out Specifies the name of a previously created QoS map (refer to qos map <name> <number> on page 1184 for more information). Assigns a QoS map to this interface's input. Assigns a QoS map to this interface's output.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 11.1 Release 15.1 Command was introduced. Command was expanded to include the demand interface. Command was expanded to include the in parameter.
Usage Examples
The following example applies the QoS map VOICEMAP to the demand 1 interface: (config)#interface demand 1 (config-demand 1)#qos-policy out VOICEMAP
60000CRG0-35B
1926
Default Values
By default, no resource pool is associated with this interface.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example associates the resource pool named Pool1 with demand interface 1: (config)#interface demand 1 (config-demand 1)#resource pool Pool1
60000CRG0-35B
1927
rtp quality-monitoring
Use the rtp quality-monitoring command to enable voice quality monitoring (VQM) of the Realtime Transport Protocol (RTP) voice stream packets on this interface. If the global command (ip rtp quality-monitoring) is disabled when this command is issued, the system will return the following warning: Applied but not used, you must globally enable ip rtp quality-monitoring to use VQM. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, VQM is enabled on all wide area network (WAN) and local area network (LAN) interfaces.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables RTP quality monitoring on the virtual demand interface: (config)#interface demand 1 (config-demand 1)#rtp quality-monitoring
60000CRG0-35B
1928
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Release 17.2 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface. Command was expanded to the cellular interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the virtual demand interface: (config)#interface demand 1 (config-demand 1)#no snmp trap link-status
60000CRG0-35B
1929
Default Values
By default, there is no established user name and password.
Command History
Release 1.1 Release 11.1 Command was introduced. Command was expanded to include the demand interface.
Functional Notes
Password Authentication Protocol (PAP) uses this entry to check received information from the peer. Challenge-Handshake Authentication Protocol (CHAP) uses this entry to check the received peer host name and a common password.
Usage Examples
The following example creates a user name of ADTRAN with password ADTRAN for the demand link labeled 5: (config)#interface demand 5 (config-demand 5)#username ADTRAN password ADTRAN
60000CRG0-35B
1930
Keep in mind that changing an interfaces VRF association will clear all IP-related settings on that interface. Syntax Description
<name> Specifies the name of the VRF to which to assign the interface.
Default Values
By default, interfaces are associated with the default VRF that is unnumbered.
Command History
Release 16.1 Release 17.8 Command was introduced. The keyword ip was removed from this command.
Functional Notes
VRF instances must be created first before an interface can be assigned. An interface can only be assigned to one VRF, but multiple interfaces can be assigned to the same VRF. An interface will only forward IP traffic that matches its associated VRF. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured.
Usage Examples
The following example assigns the virtual demand interface to the VRF instance named RED: (config)#interface demand 1 (config-demand 1)#vrf forwarding RED
60000CRG0-35B
1931
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. connect on page 1933 thresholds xcv on page 1934 xcv-link-removal on page 1935
60000CRG0-35B
1932
connect
Use the connect command to specify a physical interface to connect to the Ethernet in the first mile (EFM) group. Use the no form of this command to remove the connected interface from the group. Variations of this command include:
connect e1 <slot/port> connect shdsl <slot/port> connect t1 <slot/port>
Syntax Description
e1 <slot/port> shdsl <slot/port> t1 <slot/port> Specifies that an E1 interface is connected to the group. Specifies that a single-pair high-speed digital subscriber line (SHDSL) interface is connected to the group. Specifies that a T1 interface is connected to the group.
Default Values
By default, no interfaces are connected to the EFM group.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example connects the SHDSL interface shdsl 1/1 to EFM group 1: (config)#interface efm-group 1 (config-efm-group 1)#connect shdsl 1/1
60000CRG0-35B
1933
thresholds xcv
Use the thresholds xcv command to configure the excessive code violation threshold for the interfaces link in the Ethernet in the first mile (EFM) group. When this threshold is crossed, the link is removed from the group. Use the no form of this command to return the threshold to the default value. Variations of this command include:
thresholds xcv 1e-5 thresholds xcv 1e-6 thresholds xcv 1e-7
Syntax Description
1e-5 1e-6 1e-7 Specifies that the threshold is set at a 1e-5 bit error rate. Specifies that the threshold is set at a 1e-6 bit error rate. Specifies that the threshold is set at a 1e-7 bit error rate.
Default Values
By default, thresholds are set to 1e-7.
Command History
Release A4.01 Command was introduced.
Functional Notes
Once the threshold is set, the command xcv-link-removal on page 1935 must be entered in the groups configuration so that the interfaces link is removed when the threshold is crossed.
Usage Examples
The following example specifies that the excessive code violation threshold for interfaces connected to EFM group 1 is 1e-6: (config)#interface efm-group 1 (config-efm-group 1)#thresholds xcv 1e-6
60000CRG0-35B
1934
xcv-link-removal
Use the xcv-link-removal command to remove an interfaces link from the Ethernet in the first mile (EFM) group if the excessive code violation threshold is exceeded. This threshold is set using the command thresholds xcv on page 1934. Using the no form of this command disables the link removal. Syntax Description
No subcommands.
Default Values
By default, link removal is enabled for the EFM group.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies that an interface whose excessive code violations exceed the threshold is no longer linked to EFM group 1: (config)#interface efm-group 1 (config-efm-group 1)#xcv-link-removal
60000CRG0-35B
1935
By default, Frame Relay interfaces are created as point-to-point links. This default setting cannot be altered. The following command creates the exact same interface as that mentioned above:
>enable #configure terminal (config)#interface frame-relay 1 point-to-point (config-fr 1)#
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. bandwidth <value> on page 1937 encapsulation frame-relay ietf on page 1938 fair-queue on page 1939 frame-relay commands begin on page 1940 hold-queue <value> out on page 1951 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 1952 max-reserved-bandwidth <value> on page 1953 qos-policy on page 1954 snmp trap on page 1956 snmp trap link-status on page 1957
60000CRG0-35B
1936
bandwidth <value>
Use the bandwidth command to provide the bandwidth value of an interface to the higher level protocols. This value is used in cost calculations. Use the no form of this command to restore the default value. Syntax Description
<value> Specifies bandwidth in kbps. Range is 1 to 4294967295 kbps.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Command was introduced.
Functional Notes
The bandwidth command is an informational value that is communicated to the higher level protocols to be used in cost calculations. This is a routing parameter only and does not affect the physical interface.
Usage Examples
The following example sets bandwidth of the Frame Relay interface to 10 Mbps: (config)#interface frame-relay 1 (config-fr 1)#bandwidth 10000
60000CRG0-35B
1937
Default Values
By default, all Frame Relay interfaces use IETF encapsulation.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example configures the endpoint for IETF encapsulation: (config)#interface frame-relay 1 (config-fr 1)#encapsulation frame-relay ietf
60000CRG0-35B
1938
fair-queue
Use the fair-queue command to enable weighted fair queuing (WFQ) on an interface. Use the no form of this command to disable WFQ and enable first in, first out (FIFO) queueing for an interface. Variations of this command include:
fair-queue fair-queue <value>
WFQ must be enabled on an interface to use priority queuing. By default, WFQ is enabled for all interfaces with maximum bandwidth speeds equivalent to T1/E1 and below.
Syntax Description
<value> Optional. Specifies the maximum number of packets that can be present in each conversation subqueue. Packets received for a conversation after this limit is reached are discarded. Range is 16 to 512 packets.
Default Values
By default, fair-queue is enabled with a threshold of 64 packets.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example enables WFQ on the interface with a threshold set at 100 packets: (config)#interface frame-relay 1 (config-fr 1)#fair-queue 100
60000CRG0-35B
1939
frame-relay intf-type
Use the frame-relay intf-type command to define the Frame Relay signaling role needed for the endpoint. Use the no form of this command to return to the default value. Variations of this command include:
frame-relay intf-type dce frame-relay intf-type dte frame-relay intf-type nni
Syntax Description
dce dte Specifies data communication equipment (DCE) or network-signaling role. Use this interface type when you need the unit to emulate the frame switch. Specifies data terminal equipment (DTE) or user-signaling role. Use this interface type when connecting to a Frame Relay switch (or piece of equipment emulating a frame switch). Configures the interface to support both network and user signaling (DTE or DCE) when necessary.
nni
Default Values
By default, frame-relay intf-type is set to dte.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example configures the Frame Relay endpoint for DCE signaling: (config)#interface frame-relay 1 (config-fr 1)#frame-relay intf-type dce
60000CRG0-35B
1940
Default Values
By default, the polling counter for the DTE endpoint is set to six polls.
Command History
Release 1.1 Command was introduced.
Functional Notes
The N391 counter determines how many link integrity polls occur in between full status polls. The number of link integrity polls between full status polls is n - 1, where n represents the full status poll. n can be set to any number between 1 and 255, but the default is used for most applications.
Usage Examples
The following example sets the N391 counter for three polls: (config)#interface frame-relay 1 (config-fr 1)#frame-relay lmi-n391dte 3
60000CRG0-35B
1941
Default Values
By default, the error threshold for the DCE endpoint is set to three errors.
Command History
Release 1.1 Command was introduced.
Functional Notes
If the error threshold is met, the signaling state status is changed to down, indicating a service-affecting condition. This condition is cleared once N393 consecutive error-free events are received. N392 defines the number of errors required in a given event window, while N393 defines the number of polling events in each window. For example: If N392 = 3 and N393 = 4, then if three errors occur within any four events, the interface is determined inactive.
Usage Examples
The following example sets the N392 threshold for 5 seconds: (config)#interface frame-relay 1 (config-fr 1)#frame-relay lmi-n392dce 5
60000CRG0-35B
1942
Default Values
By default, the error threshold for the DTE endpoint is set to three errors.
Command History
Release 1.1 Command was introduced.
Functional Notes
If the error threshold is met, the signaling state status is changed to down, indicating a service-affecting condition. This condition is cleared once N393 consecutive error-free events are received. N392 defines the number of errors required in a given event window, while N393 defines the number of polling events in each window. For example: If N392 = 3 and N393 = 4, then if three errors occur within any four events, the interface is determined inactive.
Usage Examples
The following example sets the N392 threshold for five errors: (config)#interface frame-relay 1 (config-fr 1)#frame-relay lmi-n392dte 5
60000CRG0-35B
1943
Default Values
By default, the LMI monitored event counter for the DCE endpoint is set to four events.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example sets the N393 threshold for five events: (config)#interface frame-relay 1 (config-fr 1)#frame-relay lmi-n393dce 5
60000CRG0-35B
1944
Default Values
By default, the LMI monitored event counter for the DTE endpoint is set to four events.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example sets the N393 threshold for five events: (config)#interface frame-relay 1 (config-fr 1)#frame-relay lmi-n393dte 5
60000CRG0-35B
1945
Default Values
By default, the signal polling timer for the DTE endpoint is set to 10 seconds.
Command History
Release 1.1 Command was introduced.
Functional Notes
The T391 timer sets the time (in seconds) between polls to the Frame Relay network.
Usage Examples
The following example sets the T391 timer for 15 seconds: (config)#interface frame-relay 1 (config-fr 1)#frame-relay lmi-t391dte 15
60000CRG0-35B
1946
Default Values
By default, the polling verification timer for the DCE endpoint is set to 10 seconds.
Command History
Release 1.1 Command was introduced.
Functional Notes
The T392 sets the timeout (in seconds) between polling intervals. This parameter needs to be a few seconds longer than the T391 setting of the attached Frame Relay device.
Usage Examples
The following example sets the T392 timer for 15 seconds: (config)#interface frame-relay 1 (config-fr 1)#frame-relay lmi-t392dce 15
60000CRG0-35B
1947
frame-relay lmi-type
Use the frame-relay lmi-type command to define the Frame Relay signaling (local management interface (LMI)) type. Use the no form of this command to return to the default value. Variations of this command include:
frame-relay lmi-type ansi frame-relay lmi-type auto frame-relay lmi-type cisco frame-relay lmi-type none frame-relay lmi-type q933a
Syntax Description
ansi auto cisco none q933a Specifies Annex D signaling method. Automatically determines signaling type by messages received on the frame circuit. Specifies Group of 4 signaling method. Turns off signaling on the endpoint. This is used for dial-backup connections to ADTRAN IQ and Express Series products. Specifies Annex A signaling method.
Default Values
By default, the Frame Relay signaling type is set to ansi.
Command History
Release 1.1 Release 2.1 Command was introduced. Added signaling type none to provide support for dial-backup to ADTRAN IQ and Express Series products.
Usage Examples
The following example sets the signaling method for the endpoint to cisco: (config)#interface frame-relay 1 (config-fr 1)#frame-relay lmi-type cisco
60000CRG0-35B
1948
frame-relay multilink
Use the frame-relay multilink command to enable the Frame Relay multilink interface. When the no form of this command is issued, all configuration options associated with this command and cross connects made to this interface are removed. Variations of this command include:
frame-relay multilink frame-relay multilink ack <value> frame-relay multilink bandwidth-class [A | B] frame-relay multilink bandwidth-class C <threshold> frame-relay multilink bid <string> frame-relay multilink hello <value> frame-relay multilink retry <number>
Syntax Description
ack <value> bandwidth-class [A | B] Optional. Specifies a wait for acknowledgement time (in seconds) for every bundle link in the bundle. Range is 1 to 180 seconds. Optional. Specifies the class of operation, placing a minimum limit on the acceptable amount of bandwidth required for a bundle to be up. Optional. Specifies the class of operation. Class A Class B C <threshold> A single active link is sufficient for the bundle to be up. All defined bundle links must be active for the bundle to be up.
Optional. Specifies the minimum number of active bundle links required for a Class C bundle to be in the up state. This option will not be available unless Class C is specified. Range is 1 to 65535 links. Optional. Specifies a bundle ID (up to 48 characters) for the multilink bundle. All hello messages sent on links belonging to the multilink bundle contain the bundle ID. By default, AOS creates a generic bundle ID for each configured multilink bundle using the following: MFR <interface number> where the interface number corresponds to the interface number of the Frame Relay interface. For example, if multilink is enabled on Frame Relay interface 1, by default the bundle ID is MFR1. Changing the bundle ID causes the multilink connection to go down for renegotiation. Optional. Specifies the time (in seconds) between hello messages for every bundle link in the bundle. Range is 1 to 180 seconds. Optional. Specifies the number of times a bundle link will retransmit a message while waiting for acknowledgement. Range is 1 to 5 times.
bid <string>
Default Values
The default ack value is 4 seconds. The default hello value is 10 seconds. The default <class> value is A. The default retry value is 2.
Command History
Release 9.1 Command was introduced.
60000CRG0-35B
1949
Functional Notes
This command is different from ppp multilink. In ppp multilink, if multiple cross connects are configured for the Point-to-Point Protocol (PPP) interface without multilink PPP being enabled, the first link to bring up Link Control Protocol (LCP) will be the only link actually cross connected. In Frame Relay multilink, since there is no protocol corresponding to LCP, all cross connects will be removed and the user will be free to re-issue any cross connect.
Usage Examples
The following example enables the Frame Relay multilink interface and sets the time between hello messages to 45 seconds: (config)#interface frame-relay 1 (config-fr 1)#frame-relay multilink hello 45 The following example specifies Class B operation: (config)#interface frame-relay 1 (config-fr 1)#frame-relay multilink bandwidth-class B The following example specifies Class C operation with a threshold of 5: (config)#interface frame-relay 1 (config-fr 1)#frame-relay multilink bandwidth-class C 5
60000CRG0-35B
1950
Default Values
The default queue size for weighted fair queuing (WFQ) is 400. The default queue size for Point-to-Point Protocol (PPP) first in, first out (FIFO) and Frame Relay round robin is 200.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example sets the overall output queue size to 700: (config)#interface frame-relay 1 (config-fr 1)#hold-queue 700 out
60000CRG0-35B
1951
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#iinterface frame-relay 1 (config-fr 1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
1952
max-reserved-bandwidth <value>
Use the max-reserved-bandwidth command to specify the percentage of interface bandwidth reserved for use in user-defined (priority or class-based) queues. The remainder of the interface bandwidth is reserved for system-critical traffic and is not available to user-defined queues. Use the no form of this command to restore the default value. Reserving a portion of the interface bandwidth for system-critical traffic is necessary for proper operation. Specifying the entire interface bandwidth for use in user-defined queues can cause undesirable operation. Syntax Description
<value> Specifies the maximum percentage of bandwidth to reserve for quality of service (QoS). This setting is configured as a percentage of the total interface speed. Range is 1 to 100 percent.
Default Values
By default, max-reserved-bandwidth is set to 75 percent, which reserves 25 percent of the interface bandwidth for system-critical traffic.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example specifies 85 percent of the bandwidth on the Frame Relay 1 interface to be available for use in user-defined queues: (config)#interface frame-relay 1 (config-fr 1)#max-reserved-bandwidth 85
60000CRG0-35B
1953
qos-policy
Use the qos-policy command to apply a previously configured quality of service (QoS) map to incoming or outgoing packets on an interface. Use the no form of this command to remove the map from the interface. Variations of this command include:
qos-policy in <name> qos-policy out <name>
Syntax Description
<name> in out Specifies the name of a previously created QoS map (refer to qos map <name> <number> on page 1184 for more information). Assigns a QoS map to this interface's input. Assigns a QoS map to this interface's output.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 15.1 Command was introduced. Command was expanded to include the in parameter.
Functional Notes
When a QoS policy is applied to an interface, it may be disabled if the interface bandwidth is not adequate to support the requested bandwidth on the map set. Once the bandwidth problem is resolved, the map will work again. The bandwidth will be rechecked on any of the following changes: 1. A priority or class-based entry is added to, deleted from, or changed in a QoS map set. 2. The interface bandwidth is changed by the bandwidth command on the interface. 3. A QoS policy is applied to an interface. 4. A cross connect is created that includes an interface with a QoS policy. 5. The interface queuing method is changed to fair-queue to use weighted fair queuing (WFQ). 6. The interface operational status changes. 7. The interface bandwidth changes for other reasons (e.g., when asymmetric digital subscriber line (ADSL) finishes training). In order to prevent the map from being disabled in cases of temporary inadequate bandwidth (e.g., a single link goes down in a dual T1 multilink configuration where the map requests more than one T1's worth of bandwidth), the QoS map uses the maximum theoretical bandwidth on an interface, not the actual bandwidth at that time. This actually helps QoS keep higher priority class-based traffic working better than best-effort traffic when the bandwidth drops.
60000CRG0-35B
1954
Usage Examples
The following example applies the QoS map VOICEMAP to the Frame Relay interface: (config)#interface frame-relay 1 (config-fr 1)#qos-policy out VOICEMAP
60000CRG0-35B
1955
snmp trap
Use the snmp trap command to enable all supported Simple Network Management Protocol (SNMP) traps on the interface. Use the no form of this command to disable this trap. Syntax Description
No subcommands.
Default Values
By default, all interfaces (except virtual Frame Relay interfaces and subinterfaces) have SNMP traps enabled.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 8.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the port channel and virtual local area network (VLAN) interfaces. Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the tunnel interface.
Usage Examples
The following example enables SNMP on the virtual Frame Relay interface: (config)#interface frame-relay 1 (config-fr 1)#snmp trap
60000CRG0-35B
1956
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the Frame Relay interface: (config)#interface frame-relay 1 (config-fr 1)#no snmp trap link-status
60000CRG0-35B
1957
By default, Frame Relay subinterfaces are created as point-to-point links. This default setting cannot be altered. The following command creates the exact same interface as that mentioned above:
>enable #configure terminal (config)#interface frame-relay 1.16 point-to-point (config-fr 1.16)#
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. bandwidth <value> on page 1960 bridge-group <number> on page 1961 bridge-group <number> vlan-transparent on page 1962 crypto map <name> on page 1963 dial-backup commands begin on page 1965 dynamic-dns on page 1982 frame-relay commands begin on page 1984 ip commands begin on page 1988 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2029 lldp receive on page 2030 lldp send on page 2031
60000CRG0-35B
1958
media-gateway ip on page 2033 rtp quality-monitoring on page 2034 snmp trap on page 2035 snmp trap link-status on page 2036 spanning-tree commands begin on page 2037 vrf forwarding <name> on page 2043
60000CRG0-35B
1959
bandwidth <value>
Use the bandwidth command to provide the bandwidth value of an interface to the higher level protocols. This value is used in cost calculations. Use the no form of this command to restore the default value. Syntax Description
<value> Specifies bandwidth in kbps. Range is 1 to 4294967295 kbps.
Default Values
To view the default values, use the show interfaces command.
Command History
Release 3.1 Command was introduced.
Functional Notes
The bandwidth command is an informational value that is communicated to the higher level protocols to be used in cost calculations. This is a routing parameter only and does not affect the physical interface.
Usage Examples
The following example sets bandwidth of the Frame Relay interface to 10 Mbps: (config)#interface frame-relay 1.16 (config-fr 1.16)#bandwidth 10000
60000CRG0-35B
1960
bridge-group <number>
Use the bridge-group command to assign an interface to the specified bridge group. This command is supported on all Ethernet interfaces, Point-to-Point Protocol (PPP) virtual interfaces, and Frame Relay virtual subinterfaces. Use the no form of this command to remove the interface from the bridge group. Syntax Description
<number> Specifies the bridge group number. Range is 1 to 255.
Default Values
By default, there are no configured bridge groups.
Command History
Release 1.1 Command was introduced.
Functional Notes
A bridged network can provide excellent traffic management to reduce collisions and limit the amount of bandwidth wasted with unnecessary transmissions when routing is not necessary. Any two interfaces can be bridged (Ethernet to T1 bridge, Ethernet to Frame Relay subinterface).
Usage Examples
The following example assigns the Frame Relay subinterface labeled 1.16 to bridge group 1: (config)#interface frame-relay 1.16 (config-fr 1.16)#bridge-group 1
60000CRG0-35B
1961
Syntax Description
<number> Specifies the bridge group number. Valid range is 1 to 255.
Default Values
By default, VLAN tags are removed from the data.
Command History
Release 12.1 Release 14.1 Command was introduced. Command was expanded to include the high level data link control (HDLC) interface and Frame Relay subinterface.
Usage Examples
The following example removes the VLAN tags from the packets on the Frame Relay subinterface labeled 1.16: (config)#interface frame-relay 1.16 (config-fr 1.16)#bridge-group 1 vlan-transparent
60000CRG0-35B
1962
For virutal private network (VPN) configuration example scripts, refer to the VPN configuration guide available on the AOS Documentation CD shipped with your product.
Syntax Description
<name> Specifies the crypto map name that you wish to assign to the interface.
Default Values
By default, no crypto maps are assigned to an interface.
Command History
Release 4.1 Command was introduced.
Functional Notes
When configuring a system to use both the stateful inspection firewall and Internet key exchange (IKE) negotiation for VPN, keep the following notes in mind. When defining the policy class and associated access control lists (ACLs) that describe the behavior of the firewall, do not forget to include the traffic coming into the system over a VPN tunnel terminated by the system. The firewall should be set up with respect to the unencrypted traffic that is destined to be sent or received over the VPN tunnel. The following diagram represents typical AOS data-flow logic.
60000CRG0-35B
1963
IPSec Decrypt/Discard
IPSec Encrypt
NAT/ACP/ Firewall
Router
As shown in the diagram above, data coming into the product is first processed by the static filter associated with the interface on which the data is received. This access group is a true static filter and is available for use regardless of whether the firewall is enabled or disabled. Next (if the data is encrypted), it is sent to the IPSec engine for decryption. The decrypted data is then processed by the stateful inspection firewall. Therefore, given a terminating VPN tunnel, only unencrypted data is processed by the firewall. The ACLs for a crypto map on an interface work in reverse logic to the ACLs for a policy class on an interface. When specifying the ACLs for a crypto map, the source information is the private local side, unencrypted source of the data. The destination information will be the far-end, unencrypted destination of the data. However, ACLs for a policy class work in reverse. The source information for the ACL in a policy class is the far end. The destination information is the local side.
Usage Examples
The following example applies all crypto maps with the name MyMap to the Frame Relay interface: (config)#interface frame-relay 1.16 (config-fr 1.16)#crypto map MyMap
60000CRG0-35B
1964
dial-backup auto-backup
Use the dial-backup auto-backup command to configure the interface to automatically attempt a dial backup upon failure. Use the no form of this command to disable this feature. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of dial-backup call-mode on page 1968. Syntax Description
No subcommands.
Default Values
By default, all backup endpoints will automatically attempt dial backup upon a failure.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example enables automatic dial backup on the endpoint: (config)#interface frame-relay 1.16 (config-fr 1.16)#dial-backup auto-backup
60000CRG0-35B
1965
dial-backup auto-restore
Use the dial-backup auto-restore command to configure the interface to automatically discontinue dial-backup when all network conditions are operational. Use the no form of this command to disable the auto-restore feature. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of dial-backup call-mode on page 1968. Syntax Description
No subcommands.
Default Values
By default, all backup endpoints will automatically restore the primary connection when the failure condition clears.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example configures AOS to automatically restore the primary connection when the failure condition clears: (config)#interface frame-relay 1.16 (config-fr 1.16)#dial-backup auto-restore
60000CRG0-35B
1966
Default Values
By default, the dial-backup backup-delay period is set to 10 seconds.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example configures AOS to wait 60 seconds (on an endpoint with an active alarm condition) before attempting dial-backup operation: (config)#interface frame-relay 1.16 (config-fr 1.16)#dial-backup backup-delay 60
60000CRG0-35B
1967
dial-backup call-mode
Use the dial-backup call-mode command to specify whether the configured backup interface answers or originates (or a combination of both) backup calls. Use the no form of this command to return to the default value. Variations of this command include:
dial-backup call-mode answer dial-backup call-mode answer-always dial-backup call-mode originate dial-backup call-mode originate-answer dial-backup call-mode originate-answer-always
Syntax Description
answer answer-always originate originate-answer originate-answer-always Answers and backs up primary link on failure. Answers and backs up regardless of primary link state. Originates backup call on primary link failure. Originates or answers call on primary link failure. Originates on failure; answers and backs up always.
Default Values
By default, the dial-backup call-mode is set to originate-answer.
Command History
Release 1.1 Command was introduced.
Functional Notes
The majority of the configuration for AOS dial-backup implementation is configured via the dial-backup Point-to-Point Protocol (PPP) interface configuration commands. However, the numbers dialed are configured in the primary interface. Full sample configurations follow: Sample configuration for remote router (dialing out) hostname Remote3200 enable password adtran ! interface eth 0/1 ip address 192.168.1.254 255.255.255.0 no shutdown ! interface modem 1/3 no shutdown ! interface t1 1/1 coding b8zs framing esf
60000CRG0-35B
1968
clock source line tdm-group 1 timeslots 1-24 no shutdown ! interface fr 1 point-to-point frame-relay lmi-type ansi no shutdown cross-connect 1 t1 1/1 1 fr 1 ! interface fr 1.16 point-to-point frame-relay interface-dlci 16 ip address 10.1.1.2 255.255.255.252 dial-backup call-mode originate dial-backup number 5551111 analog ppp1 dial-backup number 5552222 analog ppp1 no shutdown ! interface ppp 1 ip address 172.22.56.1 255.255.255.252 ppp authentication chap username remoterouter password remotepass ppp chap hostname localrouter ppp chap password adtran no shutdown ! ip route 192.168.2.0 255.255.255.0 172.22.56.2 255.255.255.252 ! line telnet 0 4 password password Sample configuration for central router (dialing in) hostname Central3200 enable password adtran ! interface eth 0/1 ip address 192.168.100.254 255.255.255.0 no shutdown ! interface modem 1/3 no shutdown ! interface t1 1/1 coding b8zs framing esf clock source line tdm-group 1 timeslots 1-24 no shutdown
60000CRG0-35B
1969
! interface fr 1 point-to-point frame-relay lmi-type ansi no shutdown cross-connect 1 t1 1/1 1 fr 1 ! interface fr 1.100 point-to-point frame-relay interface-dlci 100 ip address 10.1.1.1 255.255.255.252 dial-backup call-mode answer dial-backup number 555-8888 analog ppp 1 ! interface ppp 1 ip address 172.22.56.2 255.255.255.252 ppp authentication chap username localrouter password adtran ppp chap hostname remoterouter ppp chap password remotepass no shutdown ! ip route 192.168.1.0 255.255.255.0 172.22.56.1 255.255.255.252 line telnet 0 4 password password
Usage Examples
The following example configures AOS to generate backup calls for this endpoint using an analog modem interface (to phone number 555 1111), but never answer calls and specifies ppp 1 as the backup interface: (config)#interface frame-relay 1.16 (config-fr 1.16)#dial-backup call-mode originate (config-fr 1.16)#dial-backup number 555 1111 analog ppp 1
60000CRG0-35B
1970
Technology Review
This technology review provides information regarding specific dial-backup router behavior (i.e., when the router will perform dial backup, where in the configuration AOS accesses specific routing information, etc.): Dialing Out 1. AOS determines to place an outbound call when either the Layer 1 or Layer 2 has a failure. 2. When placing outbound calls, AOS matches the number dialed to a PPP interface. This is accomplished with an addition to the dial-backup number command (refer to dial-backup number <number> on page 1975). 3. When placing the call, AOS uses the configuration of the related PPP interface for authentication and IP negotiation. 4. If the call fails to connect on the first number dialed, AOS places a call to the second number (if a second number is configured). The second number to be dialed references a separate PPP interface. Dialing In 1. AOS receives an inbound call on a physical interface. 2. Caller ID is used to match the dial-backup number command to the configured PPP interface. 3. If a match is found, the call connects and AOS pulls down the primary connection if it is not already in a down state. 4. If no match is found from caller ID, the call is terminated.
60000CRG0-35B
1971
Default Values
By default, the dial-backup connect-timeout period is set to 60 seconds.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example configures AOS to wait 120 seconds before retrying a failed dial-backup call: (config)#interface frame-relay 1.16 (config-fr 1.16)#dial-backup connect-timeout 120
60000CRG0-35B
1972
dial-backup force
Use the dial-backup force command to manually override the automatic dial-backup feature. This can be used to force a link into backup to allow maintenance to be performed on the primary link without disrupting data. Use the no form of this command to return to the normal dial-backup operation state. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of dial-backup call-mode on page 1968. Variations of this command include:
dial-backup force backup dial-backup force primary
Syntax Description
backup primary Force backup regardless of primary link state. Force primary link regardless of its state.
Default Values
By default, this feature is disabled.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example configures AOS to force this interface into dial backup: (config)#interface frame-relay 1.16 (config-fr 1.16)#dial-backup force backup
60000CRG0-35B
1973
Default Values
By default, dial-backup maximum-retry is set to 0 attempts.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example configures AOS to retry a dial-backup call four times before considering backup operation not available: (config)#interface frame-relay 1.16 (config-fr 1.16)#dial-backup maximum-retry 4
60000CRG0-35B
1974
Syntax Description
<number> analog digital-56k digital-64k <isdn min chan> <isdn max chan> ppp <interface> Specifies the phone numbers to call when the backup is initiated. Indicates the number connects to an analog modem. Indicates the number belongs to a digital 56 kbps per DS0 connection. Indicates the number belongs to a digital 64 kbps per DS0 connection. Specifies the minimum number of DS0s required for a digital 56 or 64 kbps connection. Range is 1 to 24 DS0s. Specifies the maximum number of DS0s desired for a digital 56 or 64 kbps connection. Range is 1 to 24 DS0s. Specifies the Point-to-Point Protocol (PPP) interface to use as the backup for this interface (for example, ppp 1).
Default Values
By default, there are no configured dial-backup numbers.
Command History
Release 1.1 Release 17.2 Release 17.3 Command was introduced. Command was expanded to include the cellular connections. Cellular connections were removed from this command.
Usage Examples
The following example configures AOS to dial 704-555-1212 (digital 64 kbps connection) to initiate dial-backup operation for this endpoint using the configured ppp 1 backup interface: (config)#interface frame-relay 1.16 (config-fr 1.16)#dial-backup number 7045551212 digital-64k 1 1 ppp 1
60000CRG0-35B
1975
Default Values
By default, dial-backup priority is set to 50.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example assigns the highest priority to this endpoint: (config)#interface frame-relay 1.16 (config-fr 1.16)#dial-backup priority 100
60000CRG0-35B
1976
dial-backup randomize-timers
Use the dial-backup randomize-timers command to randomize the call timers to minimize potential contention for resources. Use the no form of this command to return to the default value. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of dial-backup call-mode on page 1968. Syntax Description
No subcommands.
Default Values
By default, AOS does not randomize the dial-backup call timers.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example configures AOS to randomize the dial-backup timers associated with this endpoint: (config)#interface frame-relay 1.16 (config-fr 1.16)#dial-backup randomize-timers
60000CRG0-35B
1977
Default Values
By default, dial-backup redial-delay is set to 10 seconds.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example configures a redial delay of 25 seconds on this endpoint: (config)#interface frame-relay 1.16 (config-fr 1.16)#dial-backup redial-delay 25
60000CRG0-35B
1978
Default Values
By default, dial-backup restore-delay is set to 10 seconds.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example configures AOS to wait 30 seconds before disconnecting dial-backup operation and restoring the primary connection for this endpoint: (config)#interface frame-relay 1.16 (config-fr 1.16)#dial-backup restore-delay 30
60000CRG0-35B
1979
dial-backup schedule
Use the dial-backup schedule command to set the time of day that backup will be enabled. Use this command if backup is desired only during normal business hours and on specific days of the week. Use the no form of this command to disable dial backup (as specified). For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of dial-backup call-mode on page 1968. Variations of this command include:
dial-backup schedule day <name> dial-backup schedule enable-time <value> dial-backup schedule disable-time <value>
Syntax Description
day <name> enable-time <value> disable-time <value> Sets the days to allow backup. Valid range is Monday through Sunday. Sets the time of day to enable backup. Time is entered in a 24-hour format (00:00). Sets the time of day to disable backup. Time is entered in a 24-hour format (00:00).
Default Values
By default, dial backup is enabled for all days and times if the dial-backup auto-backup command has been issued and the dial-backup schedule has not been entered.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example enables dial backup Monday through Friday 8:00 a.m. to 7:00 p.m.: (config)#interface frame-relay 1.16 (config-fr 1.16)#dial-backup schedule enable-time 08:00 (config-fr 1.16)#dial-backup schedule disable-time 19:00 (config-fr 1.16)#no dial-backup schedule day Saturday (config-fr 1.16)#no dial-backup schedule day Sunday
60000CRG0-35B
1980
dial-backup shutdown
Use the dial-backup shutdown command to deactivate all dial-backup functionality in the unit. Dial-backup configuration parameters are kept intact, but the unit will not initiate (or respond) to dial-backup sequences in the event of a network outage. Use the no form of this command to reactivate the dial-backup interface. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of dial-backup call-mode on page 1968. Syntax Description
No subcommands.
Default Values
By default, all AOS interfaces are disabled.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example deactivates the configured dial-backup interface: (config)#interface frame-relay 1.16 (config-fr 1.16)#dial-backup shutdown
60000CRG0-35B
1981
dynamic-dns
Use the dynamic-dns command to configure Dynamic DNS service provided by Dynamic Network Services, Inc. (www.dyndns.org). Use the no form of this command to disable this feature. Variations of this command include:
dynamic-dns custom <hostname> <minutes> dynamic-dns dyndns <hostname> <username> <password> dynamic-dns dyndns-custom <hostname> <username> <password> dynamic-dns dyndns-static <hostname> <username> <password>
Syntax Description
<hostname> <minutes> Specifies the host name for the server that updates the dynamic domain naming system (DNS). Specifies the intervals in minutes to update the server with information (updates also occur when the interfaces IP address changes regardless of the update intervals). Specifies a user name using an alphanumerical string up to 30 characters in length (the user name is case sensitive). Specifies a password using an alphanumerical string up to 30 characters in length (the password is case sensitive). Refer to Functional Notes below for additional argument descriptions.
<username> <password>
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 12.1 Release 15.1 Command was introduced. Command was expanded. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
custom - Constanttime.coms Custom Dynamic DNSSM service allows you complete access and management control over your domain name regardless of where you purchased/registered it. This allows you to manage IP address mappings (A records), domain aliases (CNAME records), and mail servers (mail exchange (MX) records). dyndns - The Dynamic DNSSM offered by Dynamic Network Services, Inc. (DynDNS.org) allows you to alias a dynamic IP address to a static host name in various domains. This allows your unit to be more easily accessed from various locations on the Internet. This service is provided for up to five host names.
60000CRG0-35B
1982
dyndns-custom - DynDNS.org's Custom DNSSM service provides a full DNS solution, giving you complete control over an entire domain name. A Web-based interface provides two levels of control over your domain, catering to average or advanced users. Five globally redundant DNS servers ensure that your domain will always resolve. A choice of two interfaces is available. The basic interface is designed for most users. It comes preconfigured for most common configurations and allows for easy creation of most common record types. The advanced interface is designed for system administrators with a solid DNS background, and provides layout and functionality similar to a BIND zone file allowing for the creation of nearly any record type. Custom DNSSM can be used with both static and dynamic IPs, and has the same automatic update capability through Custom DNS-aware clients as Dynamic DNS. dyndns-static - The Static DNS service is similar to DynDNS.orgs Dynamic DNSSM service in that it allows a host name, such as yourname.dyndns.org, to point to your IP address. Unlike a Dynamic DNS host, a Static DNS host does not expire after 35 days without updates, but updates take longer to propagate through the DNS system. This service is provided for up to five host names. If your IP address does not change often or at all, but you still want an easy name to remember it by (without having to purchase your own domain name), Static DNS service is ideal for you. If you would like to use your own domain name (such as yourname.com), you need Custom DNS service that also provides full dynamic and static IP address support.
Usage Examples
The following example sets the Dynamic DNS to dyndns-custom with host name host, user name user, and password pass: (config)#interface frame-relay 1.16 (config-fr 1.16)#dynamic-dns dyndns-custom host user pass
60000CRG0-35B
1983
frame-relay bc <value>
Use the frame-relay bc command to set the bc (committed burst) value for a Frame Relay sublink. The value is in bits. Use the no form of this command to return to the default value. Syntax Description
<value> Specifies the committed burst value (in bits) for the sublink.
Default Values
By default, the committed burst value is set to 0 (no limit).
Command History
Release 4.1 Command was introduced.
Functional Notes
The time interval is always one second, so this can also be considered bits per second. Shaping is performed on a sliding one-second window to make maximum use of configured bandwidth. Note that when both bc and be are nonzero, shaping is performed on the virtual circuit. The circuit is limited to the sum of bc and be , and it is recommended that the sum always be greater than 8000.
Usage Examples
The following example configures the Frame Relay sublink with a committed burst value of 128,000 bits: (config)#interface frame-relay 1.16 (config-fr 1.16)#frame-relay bc 128000
60000CRG0-35B
1984
frame-relay be <value>
Use the frame-relay be command to set the be (excessive burst) value for a Frame Relay sublink. The value is in bits. Use the no form of this command to return to the default value. Syntax Description
<value> Specifies the excessive burst value (in bits) for the sublink.
Default Values
By default, the excessive burst value is set to 0 (no limit).
Command History
Release 4.1 Command was introduced.
Functional Notes
The time interval is always one second, so this can also be considered bits per second. Shaping is performed on a sliding one-second window to make maximum use of configured bandwidth. Note that when both bc and be are nonzero, shaping is performed on the virtual circuit. The circuit is limited to the sum of bc and be, and it is recommended that the sum always be greater than 8000.
Usage Examples
The following example configures the Frame Relay sublink with an excessive burst value of 64,000 bits: (config)#interface frame-relay 1.16 (config-fr 1.16)#frame-relay be 64000
60000CRG0-35B
1985
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Command was introduced.
Functional Notes
For Frame Relay fragmentation to take effect, rate-limiting must be enabled by setting the committed burst rate and excessive burst rate. Refer to frame-relay bc <value> on page 1984 and frame-relay be <value> on page 1985 for more information.
Usage Examples
The following example enables FRF.12 fragmentation on a sublink: (config)#interface frame-relay 1.16 (config-fr 1.16)#frame-relay bc 64000 (config-fr 1.16)#frame-relay be 16 (config-fr 1.16)#frame-relay fragment 100 The following example disables FRF.12 fragmentation on a sublink: (config)#interface frame-relay 1.16 (config-fr 1.16)#no frame-relay fragment
60000CRG0-35B
1986
Default Values
By default, the DLCI is populated with the subinterface identifier. For example, if configuring the virtual Frame Relay subinterface labeled fr 1.20, the default DLCI is 20.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example configures a DLCI of 72 for this Frame Relay endpoint: (config)#interface frame-relay 1.16 (config-fr 1.16)#frame-relay interface-dlci 72
60000CRG0-35B
1987
ip access-group <name>
Use the ip access-group command to create an access control list (ACL) to be used for packets transmitted on or received from the specified interface. Use the no form of this command to disable this type of control. Variations of this command include:
ip access-group <name> in ip access-group <name> out
Syntax Description
<name> in out Specifies the IP ACL name. Enables access control on packets received on the specified interface. Enables access control on packets transmitted on the specified interface.
Default Values
By default, these commands are disabled.
Command History
Release 3.1 Command was introduced.
Functional Notes
When this command is enabled, the IP destination address of each packet must be validated before being passed through. If the packet is not acceptable per these settings, it is dropped.
Usage Examples
The following example sets up the router to only allow Telnet traffic into the Frame Relay subinterface: (config)#interface frame-relay 1.16 (config)#ip access-list extended TelnetOnly (config-ext-nacl)#permit tcp any any eq telnet (config-ext-nacl)#int frame-relay 1.16 (config-fr 1.16)#ip access-group TelnetOnly in
60000CRG0-35B
1988
ip access-policy <name>
Use the ip access-policy command to assign a specified access control policy (ACP) to an interface. ACPs are applied to traffic entering an interface. Use the no form of this command to remove an ACP association. For more information on using ACPs, refer to ip policy-class <ipv4 acp name> on page 985. Configured ACPs will only be active if the ip firewall command has been entered at the Global Configuration mode prompt to enable the AOS security features. All configuration parameters are valid, but no security data processing will be attempted unless the security features are enabled. Syntax Description
<name> Identifies the configured ACP by alphanumeric descriptor (all ACP descriptors are case sensitive).
Default Values
By default, there are no configured ACPs associated with an interface.
Command History
Release 2.1 Release 5.1 Release 6.1 Release 15.1 Release 17.9 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the virtual local area network (VLAN) interfaces. Command was expanded to include the bridged virtual interfaces (BVIs). Command was changed to require the ip keyword.
Functional Notes
To assign an ACP to an interface, enter the interface configuration mode for the desired interface and enter ip access-policy <name>.
Usage Examples
The following example associates the ACP PRIVATE (to allow inbound traffic to the Web server) to the Frame Relay subinterface 1.16: Enable the AOS security features: (config)#ip firewall Associate the access policy with the Frame Relay subinterface 1.16: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip access-policy PRIVATE
60000CRG0-35B
1989
ip address dhcp
Use the ip address dhcp command to use Dynamic Host Configuration Protocol (DHCP) to obtain an address on the interface. Use the no form of this command to remove a configured IP address (using DHCP) and disable DHCP operation on the interface. Variables that may be used with this command to further define the DHCP configuration include:
ip address dhcp client-id [<interface> | <identifier>] [hostname <string>] [track <name>] [<administrative distance>] ip address dhcp hostname <string> [no-default-route | no-domain-name | no-nameservers] [track <name>] [<administrative distance>] ip address dhcp [no-default-route | no-domain-name | no-nameservers] [track <name>] [<administrative distance>] ip address dhcp track <name> [<administrative distance>]
Syntax Description
<administrative distance> Optional. Specifies the administrative distance to use when adding the DHCP gateway into the route table. It is used to determine the best route when multiple routes to the same destination exist. The lower the administrative distance, the more reliable the route. Range is 1 to 255. Optional. Specifies the client identifier used when obtaining an IP address from a DHCP server. Specifies an interface, thus defining the client identifier as the hexadecimal medium access control (MAC) address of the specified interface (including a hexadecimal number added to the front of the MAC address to identify the media type). For example, specifying the client-id ethernet 0/1 (where the Ethernet interface has a MAC address of d217.0491.1150) defines the client identifier as 01:d2:17:04:91:11:50 (where 01 defines the media type as Ethernet). Refer to hardware-address on page 2704 for a detailed listing of media types. <identifier> Specifies a custom client-identifier using a text string (that is converted to a hexadecimal equivalent) or 7 to 28 hexadecimal numbers (with colon delimiters). For example, a custom client identifier of 0f:ff:ff:ff:ff:51:04:99:a1 may be entered using the <identifier> option. hostname <string> Optional. Specifies a text string (to override the global router name) to use as the name in the DHCP option 12 field. The string is enclosed in quotation marks and can consist of up to 35 characters. Optional. Specifies that no default route is obtained via DHCP. Optional. Specifies that no domain name is obtained via DHCP. Optional. Specifies that no domain naming system (DNS) servers are obtained via DHCP.
client-id <interface>
60000CRG0-35B
1990
Frame Relay Subinterface Command Set Optional. Attaches a network monitoring track to the DHCP client. The DHCP gateway route for this client will only reside in the route table while the track is in the pass state. For more information on configuring track objects, refer to track <name> on page 1251.
Default Values
<administrative distance> client-id By default, the administrative distance value is 1. Optional. By default, the client identifier is populated using the following formula: TYPE: INTERFACE SPECIFIC INFO : MAC ADDRESS Where TYPE specifies the media type in the form of one hexadecimal byte (refer to hardware-address on page 2704 for a detailed listing of media types), and the MAC ADDRESS is the medium access control (MAC) address assigned to the first Ethernet interface in the unit in the form of six hexadecimal bytes. (For units with a single Ethernet interface, the MAC ADDRESS assigned to Ethernet 0/1 is used in this field.) INTERFACE SPECIFIC INFO is only used for Frame Relay interfaces and can be determined using the following: FR_PORT#: Q.922 ADDRESS Where the FR_PORT# specifies the label assigned to the virtual Frame Relay interface using four hexadecimal bytes. For example, a virtual Frame Relay interface labeled 1 would have a FR_PORT# of 00:00:00:01. The Q.922 ADDRESS field is populated using the following:
C/R EA DE EA
Where the FECN, BECN, C/R, DE, and high order extended address (EA) bits are assumed to be 0 and the lower order EA bit is set to 1. The following list provides a few example DLCIs and associated Q.922 address: DLCI (decimal) / Q.922 address (hex) 16 / 0x0401 50 / 0x0C21 60 / 0x0CC1 70 / 0x1061 80 / 0x1401 hostname <string> By default, the host name is the name configured using the Global Configuration hostname command.
60000CRG0-35B
1991
Command History
Release 2.1 Release 8.1 Release 13.1 Release A4.01 Command was introduced. Command was expanded to include the asynchronous transfer mode (ATM) subinterface. Command was expanded to include the track and administrative distance. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
Functional Notes
DHCP allows interfaces to acquire a dynamically assigned IP address from a configured DHCP server on the network. Many Internet service providers (ISPs) require the use of DHCP when connecting to their services. Using DHCP reduces the number of dedicated IP addresses the ISP must obtain. Consult your ISP to determine the proper values for the client-id and hostname fields.
Usage Examples
The following example enables DHCP operation on the virtual Frame Relay interface (labeled 1.16): (config)#interface frame-relay 1.16 (config-fr 1.16)#ip address dhcp The following example enables DHCP operation on the virtual Frame Relay interface (labeled 1.16) utilizing host name adtran and does not allow obtaining a default route, domain name, or name servers. It also sets the administrative distance as 5: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip address dhcp hostname adtran no-default-route no-domain-name no-nameservers 5
60000CRG0-35B
1992
Syntax Description
<ip address> <subnet mask> Specifies a valid IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IP addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Optional. Configures a secondary IP address for the specified interface.
secondary
Default Values
By default, there are no assigned IP addresses.
Command History
Release 1.1 Command was introduced.
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a secondary IP address of 192.22.72.101 255.255.255.252: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip address 192.22.72.101 255.255.255.252 secondary
60000CRG0-35B
1993
Default Values
By default, no IP address range is defined.
Command History
Release 17.4 Command was introduced.
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a range of secondary IP address from 192.22.72.1 to 192.22.72.10 on subnet 255.255.255.252: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip address range 192.22.72.1 192.22.72.10 255.255.255.252 secondary
60000CRG0-35B
1994
ip dhcp
Use the ip dhcp command to release or renew the Dynamic Host Configuration Protocol (DHCP) IP address. This command is only applicable when using DHCP for IP address assignment. Variations of this command include:
ip dhcp release ip dhcp renew
Syntax Description
release renew Releases DHCP IP address. Renews DHCP IP address.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example releases the IP DHCP address for the virtual interface: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip dhcp release
60000CRG0-35B
1995
ip directed-broadcast
Use the ip directed-broadcast command to allow reception/forwarding of directed broadcasts. Use the no form of this command to disable this feature. Variations of this command include:
ip directed-broadcast ip directed-broadcast <name>
Syntax Description
<name> Specifies IP access control list (ACL) name.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Command was introduced.
Functional Notes
A directed broadcast is a packet intended for all nodes on a nonlocal network. For example, the broadcast address 255.255.255.255 reaches all nodes on a network; the directed broadcast address 128.1.255.255 is intended for all nodes whose network address is 128.1.0.0. A router not directly attached to 128.1.0.0 simply forwards the directed broadcast packet to the next hop. A router on network 128.1.0.0 that has ip directed-broadcast enabled, accepts and forwards the packet to all nodes whose network address is 128.1.0.0. Routers connecting subnets of 128.1.0.0 also accept and forward the packet to the nodes on their respective subnets. When a directed broadcast packet reaches a router that is directly connected to its destination subnet, that packet is distributed as a broadcast on the destination subnet. The packet is then sent as a link-layer broadcast. The ip directed-broadcast command controls the distribution of directed broadcasts when they reach their target subnets. Only the final transmission of the directed broadcast on its ultimate destination subnet is affected. It does not affect the transit unicast routing of IP directed broadcasts. If ip directed-broadcast is enabled for this interface, incoming IP packets whose addresses identify them as directed broadcasts intended for the subnet to which this interface is attached will be forwarded as broadcasts on that subnet. Forwarding of the packets can be limited by specifying an ACL with this command. In this case, only directed broadcasts that are permitted by the specified ACL will be forwarded, and all other directed broadcasts directed to this interface subnet will be dropped. Disabling the ip directed-broadcast command will cause directed broadcasts destined for the subnet to which this interface is attached to be dropped. This option is a requirement for routers as described in RFC 1812, section 4.2.2.11. Furthermore, it is disabled by default (RFC 2644), with the intended goal of reducing the efficacy of certain types of denial of service (DoS) attacks.
60000CRG0-35B
1996
Usage Examples
The following example enables forwarding of directed broadcasts on the interface frame-relay 1.16: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip directed-broadcast
60000CRG0-35B
1997
ip ffe
Use the ip ffe command to enable the RapidRoute Engine on this interface with the default number of entries. Use the no form of this command to disable this feature. Variations of this command include:
ip ffe ip ffe max-entries <value>
Issuing this command will cause all RapidRoute entries on this interface to be cleared.
Syntax Description
max-entries <value> Optional. Specifies the maximum number of entries stored in the flow table. Valid range is from 1 to 8192.
Default Values
By default, the RapidRoute Engine is disabled. The default number of max-entries is 4096.
Command History
Release 13.1 Release 17.6 Command was introduced. Command was expanded to include the high level data link control (HDLC) and tunnel interfaces.
Functional Notes
RapidRoute can be used to help reduce routing overhead, and thus reduce overall routing times. Routing times are reduced by the creation of a flow table on the ingress interface. The maximum number of entries that can be stored in the flow table at any one time may be specified by using the max-entries parameters.
Usage Examples
The following example enables RapidRoute and sets the maximum number of entries in the flow table to 50: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip ffe max-entries 50
60000CRG0-35B
1998
Technology Review
The RapidRoute system goal is to increase IP packet throughput by moving as much of the packet processing into the engine as possible. Packets are classified into flows based upon the IP protocol (Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), etc.), the source and destination IP addresses, IP type of service (ToS), and the protocol-specific information, such as the source and destination port numbers. Flows are defined as the unidirectional representation of a conversation between two IP hosts. Each ingress interface keeps its own flow table, a collection of flow entries. The first packet in a flow that is forwarded through the unit will build a flow entry. When a flow entry is looked up but no entry is found, a RapidRouteBuilder object is allocated and attached to the packet. As the packet passes through the various processing layers, each subsystem will add processing to the RapidRouteBuilder. When packet is about to be forwarded out of the egress interface, the RapidRouteBuilder will be finalized. That is, the flow entry being built will be checked for completeness and committed to the flow table on the ingress interface. Subsequent flow matches can then bypass the normal processing layers.
60000CRG0-35B
1999
ip flow
Use the ip flow command to enable integrated traffic monitoring (ITM) for all traffic received or forwarded on an interface. Use the no form of this command to disable traffic monitoring. Variations of this command include:
ip flow egress ip flow egress <name> ip flow ingress ip flow ingress <name>
Syntax Description
egress ingress <name> Specifies that all outgoing traffic be monitored. Specifies that all incoming traffic be monitored. Optional. Specifies the name of an access control list (ACL) to use for filtering traffic.
Default Values
By default, no traffic monitoring is enabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables traffic monitoring on a Frame Relay interface to monitor incoming traffic through an ACL called myacl: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip flow ingress myacl
60000CRG0-35B
2000
Default Values
By default, broadcast UDP packets are not forwarded.
Command History
Release 1.1 Command was introduced.
Functional Notes
When used in conjunction with the ip forward-protocol command, the ip helper-address feature allows you to customize which broadcast packets are forwarded. To implement the helper address feature, assign a helper-address(es) (specifying the device that needs to receive the broadcast traffic) to the interface closest to the host that transmits the broadcast packets. When broadcast packets (of the specified type forwarded using the ip forward-protocol command) are received on the interface, they will be forwarded to the device that needs the information. Only packets meeting the following criteria are considered eligible by the ip helper-address feature: 1. The packet IP protocol is UDP. 2. Any UDP port specified using the ip forward-protocol command. 3. The medium access control (MAC) address of the frame is an all-ones broadcast address (ffff.ffff.ffff). 4. The destination IP address is broadcast defined by all ones (255.255.255.255) or a subnet broadcast (for example, 192.33.4.251 for the 192.33.4.248 /30 subnet).
60000CRG0-35B
2001
Usage Examples
The following example forwards all DNS broadcast traffic to the DNS server with IP address 192.33.5.99: (config)#interface frame-relay 1.16 (config)#ip forward-protocol udp domain (config)#interface frame-relay 1.16 (config-fr 1.16)#ip helper-address 192.33.5.99
60000CRG0-35B
2002
ip igmp
Use the ip igmp command to configure multicasting related functions for the interface. Variations of this command include:
ip igmp immediate-leave ip igmp last-member-query-interval <milliseconds> ip igmp querier-timeout <seconds> ip igmp query-interval <seconds> ip igmp query-max-response-time <seconds> ip igmp static-group <address> ip igmp version [1 | 2]
Syntax Description
immediate-leave Specifies that if only one host (or Internet Group Management Protocol (IGMP) snooping switch) is connected to the interface, when a leave is received, multicast of that group is immediately terminated as opposed to sending a group query and timing out the group if no device responds. Works in conjunction with ip igmp last-member-query-interval. Applies to all groups when configured. Use the no form of this command to disable the immediate-leave feature. Controls the timeout (in milliseconds) used to detect whether any group receivers remain on an interface after a receiver leaves a group. If a receiver sends a leave-group message (IGMP Version 2), the router sends a group-specific query on that interface. After twice the time specified by this command plus as much as one second longer, if no receiver responds, the router removes that interface from the group and stops sending that group's multicast packets to the interface. Range is 100 to 65535 ms. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) that the router waits after the current queriers last query before it takes over as querier (IGMP V2). Range is 60 to 300 seconds. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) at which IGMP queries are sent on an interface. Host query messages are addressed to the all-hosts multicast group with an IP time to live (TTL) of 1. The router uses queries to detect whether multicast group members are on the interface and to select an IGMP designated router (DR) for the attached segment (if more than one multicast router exists). Only the DR for the segment sends queries. For IGMP V2, the DR is the router with the lowest IP address on the segment. Range is 0 to 65535 seconds. Use the no form of this command to return to the default setting. Specifies the maximum response time (in seconds) advertised by this interface in queries when using IGMP V2. Hosts are allowed a random time within this period to respond, reducing response bursts. Use the no form of this command to return to the default setting.
last-member-query-interval <milliseconds>
querier-timeout <seconds>
query-interval <seconds>
query-max-response-time <seconds>
60000CRG0-35B
2003
Syntax Description
static-group <address> Configures the router's interface to be a statically connected member of the specified group. Packets received on the correct reverse path forwarding (RPF) interface are forwarded to this interface regardless of whether any receivers have joined the specified group using IGMP. Use the no form of this command to remove a configured static group. Sets the interfaces IGMP version. Use the no form of this command to return to the default setting.
version [1 | 2]
Default Values
ip igmp immediate-leave ip igmp last-member-query-interval ip igmp querier-timeout ip igmp query-interval ip igmp query-max-response-time ip igmp static-group ip igmp version No default 1000 milliseconds 2x the query-interval value 60 seconds 10 seconds No default Version 1
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example sets the query message interval on the interface to 200 milliseconds: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip igmp last-member-query-interval 200
60000CRG0-35B
2004
ip mcast-stub downstream
Use the ip mcast-stub downstream command to enable multicast forwarding and Internet Group Management Protocol (IGMP) (router mode) on an interface and place it in multicast stub downstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub upstream commands. Downstream interfaces connect to segments with multicast hosts. Multiple interfaces may be configured in downstream mode; however, interfaces connecting to the multicast network (upstream) should not be configured in downstream mode. Interfaces configured as downstream should have the lowest IP address of all IGMP-capable routers on the connected segment in order to be selected as the designated router (DR) and ensure proper forwarding. Refer to ip mcast-stub helper-address <ip address> on page 968 for more information.
Usage Examples
The following example enables multicast forwarding and IGMP on the interface: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip mcast-stub downstream
60000CRG0-35B
2005
ip mcast-stub fixed
Use the ip mcast-stub fixed command to allow forwarding of multicast traffic on a selected interface after enabling multicast routing. Use the no form of this command to disable this mode. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 12.1 Command was introduced.
Functional Notes
Multicast routing must be enabled prior to setting ip mcast-stub fixed on the selected interface. Also, use the ip igmp static-group <address> command (refer to ip igmp on page 2003) to receive multicast traffic without host-initiated Internet Group Management Protocol (IGMP) activity on the selected interface. Otherwise, all host-initiated IGMP transactions will enter multicast routes on the routers interface involved with IGMP activities.
Usage Examples
The following example enables multicast traffic forwarding and IGMP on the interface: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip mcast-stub fixed
60000CRG0-35B
2006
ip mcast-stub helper-enable
Use the ip mcast-stub helper-enable command to assign the ip mcast-stub helper-address as the Internet Group Management Protocol (IGMP) proxy. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 8.1 Release 10.1 Command was introduced. Command was expanded to include the Frame Relay subinterfaces.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address, ip mcast-stub upstream, and ip mcast-stub downstream commands. When enabled, the interface becomes a helper forwarding interface. The IGMP host function is dynamically enabled and the interface becomes the active upstream interface, enabling the unit to perform as an IGMP proxy. Refer to ip mcast-stub helper-address <ip address> on page 968, ip mcast-stub downstream on page 2005, and ip mcast-stub upstream on page 2008 for more information.
Usage Examples
The following example sets the helper address as the IGMP proxy: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip mcast-stub helper-enable
60000CRG0-35B
2007
ip mcast-stub upstream
Use the ip mcast-stub upstream command to enable multicast forwarding on an interface and place it in multicast stub upstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub downstream commands. When enabled, the interface becomes a candidate to be a helper forwarding interface. If chosen as the best path toward the helper address by the router's unicast route table, the Internet Group Management Protocol (IGMP) host function is dynamically enabled and the interface becomes the active upstream interface, enabling the router to perform as an IGMP proxy. Though multiple interfaces may be candidates, no more than one interface will actively serve as the helper forwarding interface. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub downstream on page 2005 for more information.
Usage Examples
The following example enables multicast forwarding on the interface: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip mcast-stub upstream
60000CRG0-35B
2008
ip mtu <size>
Use the ip mtu command to configure the maximum transmission unit (MTU) size for the active interface. Use the no form of this command to return to the default value. Syntax Description
<size> Configures the window size for transmitted packets. The valid ranges for the various interfaces are listed below: ATM subinterfaces 64 to 1520 BVIs 64 to 2100 Demand interfaces 64 to 1520 Ethernet interfaces 64 to 1500 FDL interfaces 64 to 256 Frame Relay subinterfaces 64 to 1520 HDLC interfaces (NetVanta 5305) 64 to 4600 HDLC interfaces (all other NetVanta products)64 to 2100 Loopback interfaces 64 to 1500 PPP interfaces (NetVanta 5305) 64 to 4600 PPP interfaces (all other NetVanta products) 64 to 2100 Tunnel interfaces 64 to 18190
Default Values
<size> The default values for the various interfaces are listed below: ATM subinterfaces 1500 BVIs 1500 Demand interfaces 1500 Ethernet interfaces 1500 FDL interfaces 256 Frame Relay subinterfaces 1500 HDLC interfaces 1500 Loopback interfaces 1500 PPP interfaces 1500 Tunnel interfaces 1476
Command History
Release 1.1 Release 11.1 Release 17.9 Command was introduced. Command was expanded to include the demand interface. Command was changed to require the ip keyword.
Functional Notes
Open shortest path first (OSPF) will not become adjacent on links where the MTU sizes do not match. If router A and router B are exchanging hello packets but their MTU sizes do not match, they will never reach adjacency. This is by design and required by the RFC.
60000CRG0-35B
2009
Usage Examples
The following example specifies an MTU of 1200 on the Frame Relay subinterface: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip mtu 1200
60000CRG0-35B
2010
ip ospf
Use the ip ospf command to customize open shortest path first (OSPF) settings (if needed). Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication-key <password> ip ospf cost <value> ip ospf dead-interval <seconds> ip ospf hello-interval <seconds> ip ospf message-digest-key [1 | 2] md5 <key> ip ospf priority <value> ip ospf retransmit-interval <seconds> ip ospf transmit-delay <seconds>
Syntax Description
authentication-key <password> cost <value> Assigns a simple-text authentication password to be used by other routers using the OSPF simple password authentication. Specifies the OSPF cost of sending a packet on the interface. This value overrides any computed cost value. Range is 1 to 65535. Sets the maximum interval (in seconds) allowed between hello packets. If the maximum is exceeded, neighboring devices will determine that the device is down. Range is 0 to 32767 seconds. Specifies the interval (in seconds) between hello packets sent on the interface. Range is 0 to 32767 seconds. Configures OSPF message digest 5 (MD5) authentication (16 byte maximum) keys. Sets the OSPF priority. The value set in this field helps determine the designated router (DR) for this network. Range is 0 to 255. Specifies the interval (in seconds) between link state advertisements (LSAs). Range is 0 to 32767 seconds. Sets the estimated time (in seconds) required to send a link state advertisement (LSA) on the interface. Range is 0 to 32767 seconds.
dead-interval <seconds>
Default Values
dead-interval <seconds> hello-interval <seconds> retransmit-interval <seconds> transmit-delay <seconds> 40 seconds 10 seconds: Ethernet, Frame Relay, Tunnel, and Point-to-Point Protocol (PPP) 5 seconds 1 second
60000CRG0-35B
2011
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example sets the maximum number of seconds allowed between hello packets to 25000: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip ospf dead-interval 25000
60000CRG0-35B
2012
ip ospf authentication
Use the ip ospf authentication command to authenticate an interface that is performing open shortest path first (OSPF) authentication. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication ip ospf authentication message-digest ip ospf authentication null
Syntax Description
message-digest null Optional. Selects message-digest authentication type. Optional. Specifies that no authentication be used.
Default Values
By default, this is set to null (meaning no authentication is used).
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example specifies that no authentication will be used on the Frame Relay interface: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip ospf authentication null
60000CRG0-35B
2013
ip ospf network
Use the ip ospf network command to specify the type of network on this interface. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf network broadcast ip ospf network point-to-point
Syntax Description
broadcast point-to-point Sets the network type for broadcast. Sets the network type for point-to-point.
Default Values
By default, Ethernet defaults to broadcast. Point-to-Point Protocol (PPP) and Frame Relay default to point-to-point.
Command History
Release 3.1 Command was introduced.
Functional Notes
A point-to-point network will not elect designated routers.
Usage Examples
The following example designates a broadcast network type: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip ospf network broadcast
60000CRG0-35B
2014
ip pim sparse-mode
Use the ip pim sparse-mode command to enable protocol-independent multicast (PIM) sparse mode for this interface. Use the no form of this command to disable PIM sparse mode. Syntax Description
No subcommands.
Default Values
By default, PIM sparse mode for this interface is disabled.
Command History
Release 11.1 Command was introduced.
Functional Notes
PIM sparse mode is a multicast routing protocol that makes use of the unicast forwarding table. It builds unidirectional shared trees rooted at a rendezvous point (RP) for a multicast group or a shortest-path tree rooted at a specific source for a multicast group.
Usage Examples
The following example enables PIM sparse mode on the interface: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip pim sparse-mode
60000CRG0-35B
2015
Default Values
By default, the priority of all protocol-independent multicast (PIM) interfaces is 1.
Command History
Release 11.1 Command was introduced.
Functional Notes
Interfaces advertise their configured priority values in the hello messages transmitted on the interface. Routers use the priority values to determine the appropriate DR. The router on the network segment with the highest priority is selected as the DR. If a hello message is received on the interface from a router on the network segment and it does not contain a priority, the entire network segment defaults to DR selection based on IP addresses instead of priority. In this instance, the DR is selected as the router on the network segment that has the highest IP address. AOS will always include a priority in all transmitted hello messages. If no priority is specifically designated by the user, the priority is set as the default of 1.
Usage Examples
The following example specifies a priority of 100 on the Frame Relay subinterface: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip pim-sparse dr-priority 100
60000CRG0-35B
2016
Default Values
By default, the hellos are transmitted on PIM interfaces every 60 seconds.
Command History
Release 11.1 Command was introduced.
Functional Notes
Hello messages are used to inform neighbors of a routers presence. Hello messages normally generate a small amount of traffic on an interface. Setting the hello-timer to a small interval increases the number of hellos sent (thus increasing the amount of traffic). Set the hello-timer to a reasonable value, taking into consideration the bandwidth available on the interface.
Usage Examples
The following example specifies hellos be sent on the Frame Relay subinterface every 3600 seconds: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip pim-sparse hello-timer 3600
60000CRG0-35B
2017
Default Values
By default, the nbr-timeout is set to 105 seconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the nbr-timeout to 300 seconds: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip pim-sparse nbr-timeout 300
60000CRG0-35B
2018
Default Values
By default, the override interval is set to 2500 milliseconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the override interval to 3000 milliseconds: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip pim-sparse override-interval 3000
60000CRG0-35B
2019
Default Values
By default, the propagation delay is set to 500 milliseconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the propagation delay to 300 milliseconds on the Frame Relay subinterface: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip pim-sparse propagation-delay 300
60000CRG0-35B
2020
Default Values
By default, no policy route map is assigned to this interface.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example assigns the policy route map policy1 to the interface: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip policy route-map policy1
60000CRG0-35B
2021
ip proxy-arp
Use the ip proxy-arp command to enable proxy Address Resolution Protocol (ARP) on the interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, proxy ARP is enabled.
Command History
Release 1.1 Command was introduced.
Functional Notes
In general, the principle of proxy ARP allows a router to insert its IP address in the source IP address field of a packet (if the packet is from a host on one of its subnetworks). This allows hosts to reach devices on other subnetworks without implementing routing or specifying a default gateway. If proxy ARP is enabled, AOS will respond to all proxy ARP requests with its specified medium access control (MAC) address and forward packets accordingly. Enabling proxy ARP on an interface may introduce unnecessary ARP traffic on the network.
Usage Examples
The following example enables proxy ARP on the Frame Relay subinterface: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip proxy-arp
60000CRG0-35B
2022
Syntax Description
1 2 Accepts only received RIP version 1 packets on the interface. Accepts only received RIP version 2 packets on the interface.
Default Values
By default, all interfaces implement RIP version 1 (the default value for the version command).
Command History
Release 1.1 Command was introduced.
Functional Notes
Use the ip rip receive version command to specify a RIP version that will override the version (in the Router RIP) configuration. AOS only accepts one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures a Frame Relay subinterface to accept only RIP version 2 packets: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip rip receive version 2
60000CRG0-35B
2023
Syntax Description
1 2 Transmits only RIP version 1 packets on the interface. Transmits only RIP version 2 packets on the interface.
Default Values
By default, all interfaces transmit RIP version 1 (the default value for the version command).
Command History
Release 1.1 Command was introduced.
Functional Notes
Use the ip rip send version to specify a RIP version that will override the version (in the Router RIP) configuration. AOS only transmits one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures a Frame Relay subinterface to transmit only RIP version 2 packets: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip rip send version 2
60000CRG0-35B
2024
Default Values
By default, no manual summarization is applied by RIP.
Command History
Release 12.1 Command was introduced.
Functional Notes
Unlike the automatic summarization on classful network boundaries, only specific network advertisements are made by RIP using the ip rip summary-address command. This command is only effective if RIP version 2 is configured.
Usage Examples
The following example enables manual summarization on the specified IP address: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip rip summary-address 10.10.123.0 255.255.255.0
60000CRG0-35B
2025
ip route-cache
Use the ip route-cache command to enable fast-cache switching on the interface. Use the no form of this command to disable fast-cache switching and return to process switching mode. Using network address translation (NAT) or the AOS firewall capabilities on an interface requires process switching mode (using the no ip route-cache command).
Syntax Description
No subcommands.
Default Values
By default, fast-cache switching is enabled on all Ethernet and virtual Frame Relay subinterfaces. IP route cache is enabled for all virtual Point-to-Point Protocol (PPP) interfaces.
Command History
Release 2.1 Command was introduced.
Functional Notes
Fast switching allows an IP interface to provide optimum performance when processing IP traffic.
Usage Examples
The following example enables fast-cache switching on a Frame Relay subinterface: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip route-cache
60000CRG0-35B
2026
ip unnumbered <interface>
Use the ip unnumbered command to use the IP address assigned to the specified interface for all IP processing on the active interface. Use the no form of this command to remove the unnumbered configuration. Syntax Description <interface>
Specifies the interface that contains the IP address to use as the source address for all packets transmitted on this interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type ip unnumbered ? for a list of valid interfaces.
Default Values
By default, all interfaces are configured to use a specified IP address (using the ip address command).
Command History
Release 1.1 Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the demand interfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
Functional Notes
If ip unnumbered is enabled on an interface, all IP traffic from the interface will use a source IP address taken from the specified interface. For example, specifying ip unnumbered eth 0/1 while in the Frame Relay Subinterface Configuration mode configures the Frame Relay subinterface to use the IP address assigned to the Ethernet interface for all IP processing. In addition, AOS uses the specified interface information when sending route updates over the unnumbered interface.
Usage Examples
The following example configures the Frame Relay interface (labeled frame-relay 1.16) to use the IP address assigned to the Ethernet interface (eth 0/1): (config)#interface frame-relay 1.16 (config-fr 1.16)#ip unnumbered eth 0/1
60000CRG0-35B
2027
ip urlfilter <name>
Use the ip urlfilter command to apply a universal resource locator (URL) filter to the interface for all inbound or outbound traffic. Use the no form of this command to remove the URL filter from an interface. Variations of this command include:
ip urlfilter <name> in ip urlfilter <name> out
Syntax Description
<name> in out Specifies the URL filter name to use on the interface. Applies the filter to the inbound traffic. Applies the filter to the outbound traffic.
Default Values
By default, there are no URL filters applied to any interfaces.
Command History
Release 12.1 Release 14.1 Command was introduced. Command was expanded to include the virtual local area network (VLAN) interfaces.
Functional Notes
The firewall must be enabled using the ip firewall command in order to use URL filters. The URL filter must be created by using the ip urlfilter <name> http command before applying it to the interface. Refer to ip urlfilter <name> http on page 1090 for more information on using this command.
Usage Examples
The following example performs URL filtering on all traffic entering through a Frame Relay subinterface and matches the URL filter named MyFilter: (config)#interface frame-relay 1.16 (config-fr 1.16)#ip urlfilter MyFilter in
60000CRG0-35B
2028
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface frame-relay 1.16 (config-fr 1.16)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2029
lldp receive
Use the lldp receive command to allow Link Layer Discovery Protocol (LLDP) packets to be received on this interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, all interfaces are configured to send and receive LLDP packets.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example configures the Frame Relay subinterface to receive LLDP packets: (config)#interface frame-relay 1.16 (config-fr 1.16)#lldp receive
60000CRG0-35B
2030
lldp send
Use the lldp send command to configure this interface to transmit Link Layer Discovery Protocol (LLDP) packets or to control the types of information contained in the LLDP packets transmitted by this interface. Use the no form of this command to disable this feature. Variations of this command include:
lldp send lldp send management-address lldp send port-description lldp send system-capabilities lldp send system-description lldp send system-name lldp send-and-receive
Syntax Description
management-address port-description system-capabilities system-description system-name and-receive Enables transmission of management address information on this interface. Enables transmission of port description information on this interface. Enables transmission of this devices system capabilities on this interface. Enables transmission of this devices system description on this interface. Enables transmission of this devices system name on this interface. Configures this interface to both transmit and receive LLDP packets.
Default Values
By default, all interfaces are configured to transmit and receive LLDP packets of all types.
Command History
Release 9.1 Command was introduced.
Functional Notes
Individual LLDP information can be enabled or disabled using the various forms of the lldp send command. For example, use the lldp send-and-receive command to enable transmit and receive of all LLDP information. Then use the no lldp send port-description command to prevent LLDP from transmitting port description information.
60000CRG0-35B
2031
Usage Examples
The following example configures the Frame Relay subinterface to transmit LLDP packets containing all enabled information types: (config)#interface frame-relay 1.16 (config-fr 1.16)#lldp send The following example configures the Frame Relay subinterface to transmit and receive LLDP packets containing all information types: (config)#interface frame-relay 1.16 (config-fr 1.16)#lldp send-and-receive
60000CRG0-35B
2032
media-gateway ip
Use the media-gateway ip command to associate an IP address source to use for Realtime Transport Protocol (RTP) traffic. When configuring Voice over Internet Protocol (VoIP), RTP traffic must have an IP address associated with it. However, some interfaces allow dynamic configuration of IP addresses, causing this value to change periodically. Use the no form of this command to disable this function. Variations of this command include:
media-gateway ip loopback <interface id> media-gateway ip primary media-gateway ip secondary <ip address>
Syntax Description
loopback <interface id> Specifies an IP address statically defined to a loopback interface for RTP traffic. This is helpful when using a single IP address across multiple wide area network (WAN) interfaces for RTP traffic. The valid range for loopback interface identifiers is 1 to 1024. The interface ID is used to uniquely identify a loopback interface. The entered value cannot be in use by another loopback interface. Specifies using this interfaces configured primary IP address for RTP traffic. Applies to static, Dynamic Host Configuration Protocol (DHCP), or negotiated addresses. Specifies using this interfaces statically defined secondary IP address for RTP traffic. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
primary
Default Values
By default, media-gateway ip is disabled.
Command History
Release 10.1 Release 17.3 Command was introduced. Command was updated with the loopback interface indentification option.
Usage Examples
The following example configures the unit to use the primary IP address for RTP traffic: (config)#interface frame-relay 1.16 (config-fr 1.16)#media-gateway ip primary
60000CRG0-35B
2033
rtp quality-monitoring
Use the rtp quality-monitoring command to enable voice quality monitoring (VQM) of the Realtime Transport Protocol (RTP) voice stream packets on this interface. If the global command (ip rtp quality-monitoring) is disabled when this command is issued, the system will return the following warning: Applied but not used, you must globally enable ip rtp quality-monitoring to use VQM. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, VQM is enabled on all wide area network (WAN) and local area network (LAN) interfaces.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables RTP quality monitoring on the Frame Relay interface: (config)#interface frame-relay 1.16 (config-fr 1.16)#rtp quality-monitoring
60000CRG0-35B
2034
snmp trap
Use the snmp trap command to enable all supported Simple Network Management Protocol (SNMP) traps on the interface. Use the no form of this command to disable this trap. Syntax Description
No subcommands.
Default Values
By default, all interfaces (except virtual Frame Relay interfaces and subinterfaces) have SNMP traps enabled.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 8.1 Release 16.1 Release 17.9 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the port channel and virtual local area network (VLAN) interfaces. Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the tunnel interface. Command was expanded to the Frame Relay and the ATM subinterfaces.
Usage Examples
The following example enables SNMP on the virtual Frame Relay subinterface: (config)#interface frame-relay 1.16 (config-fr 1.16)#snmp trap
60000CRG0-35B
2035
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Release 17.9 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface. Command was explanded to the Frame Relay and the ATM subinterfaces.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the Frame Relay subinterface: (config)#interface frame-relay 1.16 (config-fr 1.16)#no snmp trap link-status
60000CRG0-35B
2036
spanning-tree bpdufilter
Use the spanning-tree bpdufilter command to block bridge protocol data units (BPDUs) from being transmitted and received on this interface. To return to the default value, use the no form of this command. Variations of this command include:
spanning-tree bpdufilter disable spanning-tree bpdufilter enable
Syntax Description
disable enable Disables the BPDU filter. Enables the BPDU filter.
Default Values
By default, this command is set to disable.
Command History
Release 5.1 Command was introduced.
Functional Notes
The purpose of this command is to remove a port from participation in the spanning tree. This might be beneficial while debugging a network setup. It normally should not be used in a live network.
Usage Examples
The following example enables the BPDU filter on the interface: (config)#interface frame-relay 1.16 (config-fr 1.16)#spanning-tree bpdufilter enable
60000CRG0-35B
2037
spanning-tree bpduguard
Use the spanning-tree bpduguard command to block bridge protocol data units (BPDUs) from being received on this interface. To return to the default value, use the no form of this command. Variations of this command include:
spanning-tree bpduguard disable spanning-tree bpduguard enable
Syntax Description
disable enable Disables the BPDU block. Enables the BPDU block.
Default Values
By default, this command is set to disable.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example enables the BPDU guard on the interface: (config)#interface frame-relay 1.16 (config-fr 1.16)#spanning-tree bpduguard enable
60000CRG0-35B
2038
spanning-tree edgeport
Use the spanning-tree edgeport command to set this interface to be an edgeport. This command overrides the global setting (refer to spanning-tree edgeport default on page 1230). Use the no form of this command to return to the default value. Syntax Description
No subcommands.
Default Values
By default, this command is set to disable.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example configures the interface to be an edgeport: (config)#interface frame-relay 1.16 (config-fr 1.16)#spanning-tree edgeport An individual interface can be configured to not be considered an edgeport. For example: (config)#interface frame-relay 1.16 (config-fr 1.16)#spanning-tree edgeport disable or (config)#interface frame-relay 1.16 (config-fr 1.16)#no spanning-tree edgeport
60000CRG0-35B
2039
spanning-tree link-type
Use the spanning-tree link-type command to configure the spanning-tree protocol link type for an interface. To return to the default value, use the no form of this command. Variations of this command include:
spanning-tree link-type auto spanning-tree link-type point-to-point spanning-tree link-type shared
Syntax Description
auto point-to-point shared Determines link type by the ports duplex settings. Manually sets link type to point-to-point regardless of duplex settings. Manually sets link type to shared regardless of duplex settings.
Default Values
By default, a port is set to auto.
Command History
Release 5.1 Command was introduced.
Functional Notes
This command overrides the default link-type setting determined by the duplex of the individual port. By default, a port configured for half-duplex is set to shared link type, and a port configured for full-duplex is set to point-to-point link type. Setting the link type manually overrides the default and forces the port to use the specified link type. Using the link-type auto command, restores the convention of determining link type based on duplex settings.
Usage Examples
The following example forces the link type to point-to-point, even if the port is configured to be half-duplex: (config)#bridge 1 protocol ieee (config)#interface frame-relay 1.16 (config-fr 1.16)#spanning-tree link-type point-to-point
Technology Review
Rapid transitions are possible in Rapid Spanning Tree Protocol (RSTP) by taking advantage of point-to-point links (a port is connected to exactly one other bridge) and edge-port connections (a port is not connected to any additional bridges). Setting the link type to auto allows the spanning tree to automatically configure the link type based on the duplex of the link. Setting the link type to point-to-point allows a half-duplex link to act as if it were a point-to-point link.
60000CRG0-35B
2040
Default Values
By default, the path-cost value is set at 19.
Command History
Release 1.1 Command was introduced.
Functional Notes
The specified value is inversely proportional to the likelihood the bridge interface will be chosen as the root path. Set the path-cost value lower to increase the chance the interface will be the root. To obtain the most accurate spanning-tree calculations, develop a system for determining path costs for links and apply it to all bridged interfaces.
Usage Examples
The following example assigns a path cost of 100 on a Frame Relay subinterface: (config)#interface frame-relay 1.16 (config-fr 1.16)#spanning-tree path-cost 100
Technology Review
Spanning-tree protocol provides a way to prevent loopback or parallel paths in bridged networks. Using the priority values and path costs assigned to each bridging interface, the spanning-tree protocol determines the root path and identifies whether to block or allow other paths.
60000CRG0-35B
2041
Default Values
By default, the bridge-group priority value is set at 28.
Command History
Release 1.1 Command was introduced.
Functional Notes
The only time that this priority level is used is when two interfaces with a path to the root have equal cost. At that point, the level set in this command will determine which port the bridge will use. Set the priority value lower to increase the chance the interface will be used.
Usage Examples
The following example sets the maximum priority on the Frame Relay subinterface labeled 1.16: (config)#interface frame-relay 1.16 (config-fr 1.16)#spanning-tree port-priority 0
60000CRG0-35B
2042
Keep in mind that changing an interfaces VRF association will clear all IP-related settings on that interface. Syntax Description
<name> Specifies the name of the VRF to which to assign the interface.
Default Values
By default, interfaces are associated with the default VRF that is unnumbered.
Command History
Release 16.1 Release 17.8 Command was introduced. The keyword ip was removed from this command.
Functional Notes
VRF instances must be created first before an interface can be assigned. An interface can only be assigned to one VRF, but multiple interfaces can be assigned to the same VRF. An interface will only forward IP traffic that matches its associated VRF. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured.
Usage Examples
The following example assigns the frame-relay 1.16 interface to the VRF instance named RED: (config)#interface frame-relay 1.16 (config-fr 1.16)#vrf forwarding RED
60000CRG0-35B
2043
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. alias link <text> on page 2046 bandwidth <value> on page 2047 bridge-group <value> on page 2048 bridge-group <number> vlan-transparent on page 2049 crypto map <name> on page 2050 dial-backup commands begin on page 2052 dynamic-dns on page 2069 fair-queue on page 2071 hold-queue <value> out on page 2072 ip commands begin on page 2073 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2109 keepalive <value> on page 2110 lldp receive on page 2111 lldp send on page 2112 max-reserved-bandwidth <value> on page 2114 media-gateway ip on page 2115 qos-policy on page 2116 rtp quality-monitoring on page 2118
60000CRG0-35B
2044
snmp trap link-status on page 2119 vrf forwarding <name> on page 2120
60000CRG0-35B
2045
Default Values
By default, the HDLC identification string appears as empty quotation marks ( ).
Command History
Release 10.1 Command was introduced.
Functional Notes
The alias link string should be used to uniquely identify an HDLC link. Enter a string that clearly identifies the link.
Usage Examples
The following example defines a unique character string for the virtual HDLC interface (1): (config)#interface hdlc 1 (config-hdlc 1)#alias link HDLC_link_1
Technology Review
Please refer to RFC 1990 for a more detailed discussion on HDLC links and bundles.
60000CRG0-35B
2046
bandwidth <value>
Use the bandwidth command to provide the bandwidth value of an interface to the higher level protocols. This value is used in cost calculations. Use the no form of this command to restore the default value. Syntax Description
<value> Specifies the bandwidth in kbps. Range is 1 to 4294967295 kbps.
Default Values
To view the default values, use the command show interfaces on page 472.
Command History
Release 9.1 Command was introduced.
Functional Notes
The bandwidth command is an informational value that is communicated to the higher level protocols to be used in cost calculations. This is a routing parameter only and does not affect the physical interface.
Usage Examples
The following example sets bandwidth of the high level data link control (HDLC) interface to 10 Mbps: (config)#interface hdlc 1 (config-hdlc 1)#bandwidth 10000
60000CRG0-35B
2047
bridge-group <value>
Use the bridge-group command to assign an interface to the specified bridge group. Use the no form of this command to remove the interface from the bridge group. Syntax Description
<value> Specifies the bridge group (by number) to which to assign this interface. Range is 1 to 255.
Default Values
By default, there are no configured bridge groups.
Command History
Release 9.1 Command was introduced.
Functional Notes
A bridged network can provide excellent traffic management to reduce collisions and limit the amount of bandwidth wasted with unnecessary transmissions when routing is not necessary. Any two interfaces can be bridged (Ethernet to T1 bridge, Ethernet to Frame Relay subinterface, etc.).
Usage Examples
The following example assigns the high level data link control (HDLC) interface labeled 1 to bridge group 1: (config)#interface hdlc 1 (config-hdlc 1)#bridge-group 1
60000CRG0-35B
2048
Syntax Description
<number> Specifies the bridge group number. Valid range is 1 to 255.
Default Values
By default, VLAN tags are removed from the data.
Command History
Release 12.1 Release 14.1 Command was introduced. Command was expanded to include the high level data link control (HDLC) interface and Frame Relay subinterface.
Usage Examples
The following example removes the VLAN tags from the packets on the HDLC 1 interface: (config)#interface hdlc 1 (config-hdlc 1)#bridge-group 1 vlan-transparent
60000CRG0-35B
2049
For virtual private network (VPN) configuration example scripts, refer to the VPN configuration guide available on the AOS Documentation CD shipped with your product.
Syntax Description
<name> Enter the crypto map name that you wish to assign to the interface.
Default Values
By default, no crypto maps are assigned to an interface.
Command History
Release 9.1 Command was introduced.
Functional Notes
When configuring a system to use both the stateful inspection firewall and Internet key exchange (IKE) negotiation for a VPN, keep the following notes in mind. When defining the policy class and associated access control lists (ACLs) that describe the behavior of the firewall, do not forget to include the traffic coming into the system over a VPN tunnel terminated by the system. The firewall should be set up with respect to the unencrypted traffic that is destined to be sent or received over the VPN tunnel. The following diagram represents typical AOS data-flow logic.
60000CRG0-35B
2050
IPSec Decrypt/Discard
IPSec Encrypt
NAT/ACP/ Firewall
Router
As shown in the diagram above, data coming into the product is first processed by the static filter associated with the interface on which the data is received. This access group is a true static filter and is available for use regardless of whether the firewall is enabled or disabled. Next (if the data is encrypted), it is sent to the IPSec engine for decryption. The decrypted data is then processed by the stateful inspection firewall. Therefore, given a terminating VPN tunnel, only unencrypted data is processed by the firewall. The ACLs for a crypto map on an interface work in reverse logic to the ACLs for a policy class on an interface. When specifying the ACLs for a crypto map, the source information is the private local side, unencrypted source of the data. The destination information will be the far-end, unencrypted destination of the data. However, ACLs for a policy class work in reverse. The source information for the ACL in a policy class is the far end. The destination information is the local side.
Usage Examples
The following example applies all crypto maps with the name MyMap to the high level data link control (HDLC) 1 interface: (config)#interface hdlc 1 (config-hdlc 1)#crypto map MyMap
60000CRG0-35B
2051
dial-backup auto-backup
Use the dial-backup auto-backup command to configure the interface to automatically attempt a dial backup upon failure. Use the no form of this command to disable this feature. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of dial-backup call-mode on page 2055. Syntax Description
No subcommands.
Default Values
By default, all backup endpoints will automatically attempt dial backup upon a failure.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example enables automatic dial backup on the endpoint: (config)#interface hdlc 1 (config-hdlc 1)#dial-backup auto-backup
60000CRG0-35B
2052
dial-backup auto-restore
Use the dial-backup auto-restore command to configure the interface to automatically discontinue dial backup when all network conditions are operational. Use the no form of this command to disable the auto-restore feature. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of dial-backup call-mode on page 2055. Syntax Description
No subcommands.
Default Values
By default, all backup endpoints will automatically restore the primary connection when the failure condition clears.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to automatically restore the primary connection when the failure condition clears: (config)#interface hdlc 1 (config-hdlc 1)#dial-backup auto-restore
60000CRG0-35B
2053
Default Values
By default, the dial-backup backup-delay period is set to 10 seconds.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to wait 60 seconds (on an endpoint with an active alarm condition) before attempting dial-backup operation: (config)#interface hdlc 1 (config-hdlc 1)#dial-backup backup-delay 60
60000CRG0-35B
2054
dial-backup call-mode
Use the dial-backup call-mode command to specify whether the configured backup interface answers or originates (or a combination of both) backup calls. Use the no form of this command to return to the default value. Variations of this command include:
dial-backup call-mode answer dial-backup call-mode answer-always dial-backup call-mode originate dial-backup call-mode originate-answer dial-backup call-mode originate-answer-always
Syntax Description
answer answer-always originate originate-answer originate-answer-always Answers and backs up primary link on failure. Answers and backs up regardless of primary link state. Originates backup call on primary link failure. Originates or answers call on primary link failure. Originates on failure; answers and backs up always.
Default Values
By default, the dial-backup call-mode is set to originate-answer.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Functional Notes
The majority of the configuration for AOS dial-backup implementation is configured via the dial-backup PPP interface configuration commands. However, the numbers dialed are configured in the primary interface. Full sample configurations follow: Sample configuration for remote router (dialing out) hostname Remote3200 enable password adtran ! interface eth 0/1 ip address 192.168.1.254 255.255.255.0 no shutdown ! interface modem 1/3 no shutdown ! interface t1 1/1
60000CRG0-35B
2055
Command Reference Guide coding b8zs framing esf clock source line tdm-group 1 timeslots 1-24 no shutdown ! interface fr 1 point-to-point frame-relay lmi-type ansi no shutdown cross-connect 1 t1 1/1 1 fr 1 ! interface fr 1.16 point-to-point frame-relay interface-dlci 16 ip address 10.1.1.2 255.255.255.252 dial-backup call-mode originate dial-backup number 5551111 analog ppp1 dial-backup number 5552222 analog ppp1 no shutdown ! interface ppp 1 ip address 172.22.56.1 255.255.255.252 ppp authentication chap username remoterouter password remotepass ppp chap hostname localrouter ppp chap password adtran no shutdown ! ip route 192.168.2.0 255.255.255.0 172.22.56.2 255.255.255.252 ! line telnet 0 4 password password Sample configuration for central router (dialing in) hostname Central3200 enable password adtran ! interface eth 0/1 ip address 192.168.100.254 255.255.255.0 no shutdown ! interface modem 1/3 no shutdown ! interface t1 1/1 coding b8zs framing esf clock source line
60000CRG0-35B
2056
Command Reference Guide tdm-group 1 timeslots 1-24 no shutdown ! interface fr 1 point-to-point frame-relay lmi-type ansi no shutdown cross-connect 1 t1 1/1 1 fr 1 ! interface fr 1.100 point-to-point frame-relay interface-dlci 100 ip address 10.1.1.1 255.255.255.252 dial-backup call-mode answer dial-backup number 555-8888 analog ppp 1 ! interface ppp 1 ip address 172.22.56.2 255.255.255.252 ppp authentication chap username localrouter password adtran ppp chap hostname remoterouter ppp chap password remotepass no shutdown ! ip route 192.168.1.0 255.255.255.0 172.22.56.1 255.255.255.252 line telnet 0 4 password password
Usage Examples
The following example configures AOS to generate backup calls for this endpoint using an analog modem interface (to phone number 555 1111), but never answer calls and specifies ppp 1 as the backup interface: (config)#interface hdlc 1 (config-hdlc 1)#dial-backup call-mode originate (config-hdlc 1)#dial-backup number 555 1111 analog ppp 1
60000CRG0-35B
2057
Technology Review
This technology review provides information regarding specific dial-backup router behavior (i.e., when the router will perform dial backup, where in the configuration AOS accesses specific routing information, etc.): Dialing Out 1. AOS determines to place an outbound call when either the Layer 1 or Layer 2 has a failure. 2. When placing outbound calls, AOS matches the number dialed to a PPP interface. This is accomplished with an addition to the dial-backup number command (refer to dial-backup number <number> on page 2062). 3. When placing the call, AOS uses the configuration of the related PPP interface for authentication and IP negotiation. 4. If the call fails to connect on the first number dialed, AOS places a call to the second number (if a second number is configured). The second number to be dialed references a separate PPP interface. Dialing In 1. AOS receives an inbound call on a physical interface. 2. Caller ID is used to match the dial-backup number command to the configured PPP interface. 3. If a match is found, the call connects and AOS pulls down the primary connection if it is not already in a down state. 4. If no match is found from caller ID, the call is terminated.
60000CRG0-35B
2058
Default Values
By default, the dial-backup connect-timeout period is set to 60 seconds.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to wait 120 seconds before retrying a failed dial-backup call: (config)#interface hdlc 1 (config-hdlc 1)#dial-backup connect-timeout 120
60000CRG0-35B
2059
dial-backup force
Use the dial-backup force command to manually override the automatic dial-backup feature. This can be used to force a link into backup to allow maintenance to be performed on the primary link without disrupting data. Use the no form of this command to return to the normal dial-backup operation state. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 2055. Variations of this command include:
dial-backup force backup dial-backup force primary
Syntax Description
backup primary Forces backup regardless of primary link state. Forces primary link regardless of its state.
Default Values
By default, this feature is disabled.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to force this interface into dial backup: (config)#interface hdlc 1 (config-hdlc 1)#dial-backup force backup
60000CRG0-35B
2060
Default Values
By default, dial-backup maximum-retry is set to 0 attempts.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to retry a dial-backup call four times before considering backup operation not available: (config)#interface hdlc 1 (config-hdlc 1)#dial-backup maximum-retry 4
60000CRG0-35B
2061
Syntax Description
<number> analog digital-56k digital-64k <isdn min chan> <isdn max chan> ppp <interface> Specifies the phone numbers to call when the backup is initiated. Indicates the number connects to an analog modem. Indicates the number belongs to a digital 56 kbps per DS0 connection. Indicates the number belongs to a digital 64 kbps per DS0 connection. Specifies the minimum number of DS0s required for a digital 56 or 64 kbps connection. Range is 1 to 24 DS0s. Specifies the maximum number of DS0s desired for a digital 56 or 64 kbps connection. Range is 1 to 24 DS0s. Specifies the Point-to-Point Protocol (PPP) interface to use as the backup for this interface (for example, ppp 1).
Default Values
By default, there are no configured dial-backup numbers.
Command History
Release 1.1 Release 5.1 Release 17.2 Release 17.3 Command was introduced. Command was expanded to include the PPP interface. Command was expanded to include the cellular connections. Cellular connections were removed from this command.
Usage Examples
The following example configures AOS to dial 704-555-1212 (digital 64 kbps connection) to initiate dial-backup operation for this endpoint using the configured ppp 1 backup interface: (config)#interface hdlc 1 (config-hdlc 1)#dial-backup number 7045551212 digital-64k 1 1 ppp 1
60000CRG0-35B
2062
Default Values
By default, dial-backup priority is set to 50.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example assigns the highest priority to this endpoint: (config)#interface hdlc 1 (config-hdlc 1)#dial-backup priority 100
60000CRG0-35B
2063
dial-backup randomize-timers
Use the dial-backup randomize-timers command to randomize the call timers to minimize potential contention for resources. Use the no form of this command to return to the default value. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 2055. Syntax Description
No subcommands.
Default Values
By default, AOS does not randomize the dial-backup call timers.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to randomize the dial-backup timers associated with this endpoint: (config)#interface hdlc 1 (config-hdlc 1)#dial-backup randomize-timers
60000CRG0-35B
2064
Default Values
By default, dial-backup redial-delay is set to 10 seconds.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures a redial delay of 25 seconds on this endpoint: (config)#interface hdlc 1 (config-hdlc 1)#dial-backup redial-delay 25
60000CRG0-35B
2065
Default Values
By default, dial-backup restore-delay is set to 10 seconds.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to wait 30 seconds before disconnecting dial-backup operation and restoring the primary connection for this endpoint: (config)#interface hdlc 1 (config-hdlc 1)#dial-backup restore-delay 30
60000CRG0-35B
2066
dial-backup schedule
Use the dial-backup schedule command to set the time of day that backup will be enabled. Use this command if backup is desired only during normal business hours and on specific days of the week. Use the no form of this command to disable dial backup (as specified). For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 2055. Variations of this command include:
dial-backup schedule day <name> dial-backup schedule enable-time <value> dial-backup schedule disable-time <value>
Syntax Description
day <name> enable-time <value> disable-time <value> Sets the days to allow backup. Valid range is Monday through Sunday. Sets the time of day to enable backup. Time is entered in a 24-hour format (00:00). Sets the time of day to disable backup. Time is entered in a 24-hour format (00:00).
Default Values
By default, dial backup is enabled for all days and times if the dial-backup auto-backup command has been issued and the dial-backup schedule has not been entered.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example enables dial backup Monday through Friday 8:00 a.m. to 7:00 p.m.: (config)#interface hdlc 1 (config-hdlc 1)#dial-backup schedule enable-time 08:00 (config-hdlc 1)#dial-backup schedule disable-time 19:00 (config-hdlc 1)#no dial-backup schedule day Saturday (config-hdlc 1)#no dial-backup schedule day Sunday
60000CRG0-35B
2067
dial-backup shutdown
Use the dial-backup shutdown command to deactivate all dial-backup functionality in the unit. Dial-backup configuration parameters are kept intact, but the unit will not initiate (or respond) to dial-backup sequences in the event of a network outage. Use the no form of this command to reactivate the dial-backup interface. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 2055. Syntax Description
No subcommands.
Default Values
By default, all AOS interfaces are disabled.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example deactivates the configured dial-backup interface: (config)#interface hdlc 1 (config-hdlc 1)#dial-backup shutdown
60000CRG0-35B
2068
dynamic-dns
Use the dynamic-dns command to configure Dynamic DNS service provided by Dynamic Network Services, Inc. (www.dyndns.org). Use the no form of this command to disable this feature. Variations of this command include:
dynamic-dns custom <hostname> <minutes> dynamic-dns dyndns <hostname> <username> <password> dynamic-dns dyndns-custom <hostname> <username> <password> dynamic-dns dyndns-static <hostname> <username> <password>
Syntax Description
<hostname> <minutes> Specifies the host name for the server that updates the dynamic domain naming system (DNS). Specifies the intervals in minutes to update the server with information (updates also occur when the interfaces IP address changes regardless of the update intervals). Specifies a user name using an alphanumerical string up to 30 characters in length (the user name is case sensitive). Specifies a password using an alphanumerical string up to 30 characters in length (the password is case sensitive). Refer to Functional Notes below for additional argument descriptions.
<username> <password>
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 12.1 Release 15.1 Command was introduced. Command was expanded. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
custom - Constanttime.coms Custom Dynamic DNSSM service allows you complete access and management control over your domain name regardless of where you purchased/registered it. This allows you to manage IP address mappings (A records), domain aliases (CNAME records), and mail servers (mail exchange (MX) records). dyndns - The Dynamic DNSSM offered by Dynamic Network Services, Inc. (DynDNS.org) allows you to alias a dynamic IP address to a static host name in various domains. This allows your unit to be more easily accessed from various locations on the Internet. This service is provided for up to five host names.
60000CRG0-35B
2069
dyndns-custom - DynDNS.org's Custom DNSSM service provides a full DNS solution, giving you complete control over an entire domain name. A Web-based interface provides two levels of control over your domain, catering to average or advanced users. Five globally redundant DNS servers ensure that your domain will always resolve. A choice of two interfaces is available. The basic interface is designed for most users. It comes preconfigured for most common configurations and allows for easy creation of most common record types. The advanced interface is designed for system administrators with a solid DNS background, and provides layout and functionality similar to a BIND zone file allowing for the creation of nearly any record type. Custom DNSSM can be used with both static and dynamic IPs, and has the same automatic update capability through Custom DNS-aware clients as Dynamic DNS. dyndns-static - The Static DNS service is similar to DynDNS.orgs Dynamic DNSSM service in that it allows a host name, such as yourname.dyndns.org, to point to your IP address. Unlike a Dynamic DNS host, a Static DNS host does not expire after 35 days without updates, but updates take longer to propagate through the DNS system. This service is provided for up to five host names. If your IP address does not change often or at all, but you still want an easy name to remember it by (without having to purchase your own domain name), Static DNS service is ideal for you. If you would like to use your own domain name (such as yourname.com), you need Custom DNS service that also provides full dynamic and static IP address support.
Usage Examples
The following example sets the Dynamic DNS to dyndns-custom with host name host, user name user, and password pass: (config)#interface hdlc 1 (config-hdlc 1)#dynamic-dns dyndns-custom host user pass
60000CRG0-35B
2070
fair-queue
Use the fair-queue command to enable weighted fair queuing (WFQ) on an interface. Use the no form of this command to disable WFQ and enable first in, first out (FIFO) queueing for an interface. Variations of this command include:
fair-queue fair-queue <value>
WFQ must be enabled on an interface to use priority queuing. By default, WFQ is enabled for all interfaces with maximum bandwidth speeds equivalent to T1/E1 and below.
Syntax Description
<value> Optional. Value that specifies the maximum number of packets that can be present in each conversation subqueue. Packets received for a conversation after this limit is reached are discarded. Range is 16 to 512 packets.
Default Values
By default, fair queue is enabled with a threshold of 64 packets.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example enables WFQ on the interface with a threshold set at 100 packets: (config)#interface hdlc 1 (config-hdlc 1)#fair-queue 100
60000CRG0-35B
2071
Default Values
The default queue size for weighted fair queuing (WFQ) is 400. The default queue size for Point-to-Point Protocol (PPP) first in, first out (FIFO) and Frame Relay round-robin is 200.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example sets the overall output queue size to 700: (config)#interface hdlc 1 (config-hdlc 1)#hold-queue 700 out
60000CRG0-35B
2072
ip access-group <name>
Use the ip access-group command to create an access control list (ACL) to be used for packets transmitted on or received from the specified interface. Use the no form of this command to disable this type of control. Variations of this command include:
ip access-group <name> in ip access-group <name> out
Syntax Description
<name> in out Assigned IP ACL name. Enables access control on packets received on the specified interface. Enables access control on packets transmitted on the specified interface.
Default Values
By default, these commands are disabled.
Command History
Release 9.1 Command was introduced.
Functional Notes
When this command is enabled, the IP destination address of each packet must be validated before being passed through. If the packet is not acceptable per these settings, it is dropped.
Usage Examples
The following example sets up the unit to only allow Telnet traffic (as defined in the user-configured TelnetOnly IP ACL) into the high level data link control (HDLC) interface: (config)#ip access-list extended TelnetOnly (config-ext-nacl)#permit tcp any any eq telnet (config-ext-nacl)#int hdlc 1 (config-hdlc 1)#ip access-group TelnetOnly in
60000CRG0-35B
2073
ip access-policy <name>
Use the ip access-policy command to assign a specified access control policy (ACP) to an interface. ACPs are applied to traffic entering an interface. Use the no form of this command to remove an ACP association. For more information on using ACPs, refer to ip policy-class <ipv4 acp name> on page 985. Configured ACPs will only be active if the ip firewall command has been entered at the Global Configuration mode prompt to enable the AOS security features. All configuration parameters are valid, but no security data processing will be attempted unless the security features are enabled. Syntax Description
<name> Identifies the configured ACP by alphanumeric descriptor (all ACP descriptors are case sensitive).
Default Values
By default, there are no configured ACPs associated with an interface.
Command History
Release 2.1 Release 5.1 Release 6.1 Release 15.1 Release 17.9 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the virtual local area network (VLAN) interfaces. Command was expanded to include the bridged virtual interfaces (BVIs). Command was changed to require the ip keyword.
Functional Notes
To assign an ACP to an interface, enter the interface configuration mode for the desired interface and enter ip access-policy <name>.
Usage Examples
The following example associates the ACP PRIVATE (to allow inbound traffic to the Web server) to the HDLC interface 1: Enable the AOS security features: (config)#ip firewall Associate the access policy with the HDLC interface 1: (config)#interface hdlc 1 (config-hdlc 1)#ip access-policy PRIVATE
60000CRG0-35B
2074
Syntax Description
<ip address> <subnet mask> Specifies a valid IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IP addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Optional. Configures a secondary IP address for the specified interface.
secondary
Default Values
By default, there are no assigned IP addresses.
Command History
Release 9.1 Command was introduced
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a secondary IP address of 192.22.72.101 /30: (config)#interface hdlc 1 (config-hdlc 1)#ip address 192.22.72.101 255.255.255.252 secondary
60000CRG0-35B
2075
Default Values
By default, no IP address range is defined.
Command History
Release 17.4 Command was introduced.
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a range of secondary IP address from 192.22.72.1 to 192.22.72.10 on subnet 255.255.255.252: (config)#interface hdlc 1 (config-hdlc 1)#ip address range 192.22.72.1 192.22.72.10 255.255.255.252 secondary
60000CRG0-35B
2076
ip directed-broadcast
Use the ip directed-broadcast command to allow reception/forwarding of directed broadcasts. Use the no form of this command to disable this feature. Variations of this command include:
ip directed-broadcast ip directed-broadcast <name>
Syntax Description
<name> Specifies IP access control list (ACL) name.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Command was introduced.
Functional Notes
A directed broadcast is a packet intended for all nodes on a nonlocal network. For example, the broadcast address 255.255.255.255 reaches all nodes on a network; the directed broadcast address 128.1.255.255 is intended for all nodes whose network address is 128.1.0.0. A router not directly attached to 128.1.0.0 simply forwards the directed broadcast packet to the next hop. A router on network 128.1.0.0 that has ip directed-broadcast enabled, accepts and forwards the packet to all nodes whose network address is 128.1.0.0. Routers connecting subnets of 128.1.0.0 also accept and forward the packet to the nodes on their respective subnets. When a directed broadcast packet reaches a router that is directly connected to its destination subnet, that packet is distributed as a broadcast on the destination subnet. The packet is then sent as a link-layer broadcast. The ip directed-broadcast command controls the distribution of directed broadcasts when they reach their target subnets. Only the final transmission of the directed broadcast on its ultimate destination subnet is affected. It does not affect the transit unicast routing of IP directed broadcasts. If ip directed-broadcast is enabled for this interface, incoming IP packets whose addresses identify them as directed broadcasts intended for the subnet to which this interface is attached will be forwarded as broadcasts on that subnet. Forwarding of the packets can be limited by specifying an ACL with this command. In this case, only directed broadcasts that are permitted by the specified ACL will be forwarded, and all other directed broadcasts directed to this interface subnet will be dropped. Disabling the ip directed-broadcast command will cause directed broadcasts destined for the subnet to which this interface is attached to be dropped. This option is a requirement for routers as described in RFC 1812, section 4.2.2.11. Furthermore, it is disabled by default (RFC 2644), with the intended goal of reducing the efficacy of certain types of denial of service (DoS) attacks.
60000CRG0-35B
2077
Usage Examples
The following example enables forwarding of directed broadcasts on the interface hdlc 1: (config)#interface hdlc 1 (config-hdlc 1)#ip directed-broadcast
60000CRG0-35B
2078
ip ffe
Use the ip ffe command to enable the RapidRoute Engine on this interface with the default number of entries. Use the no form of this command to disable this feature. Variations of this command include:
ip ffe ip ffe max-entries <value>
Issuing this command will cause all RapidRoute entries on this interface to be cleared.
Syntax Description
max-entries <value> Optional. Specifies the maximum number of entries stored in the flow table. Valid range is from 1 to 8192.
Default Values
By default, the RapidRoute Engine is disabled. The default number of max-entries is 4096.
Command History
Release 13.1 Release 17.6 Command was introduced. Command was expanded to include the tunnel and high level data link control (HDLC) interface.
Functional Notes
RapidRoute can be used to help reduce routing overhead, and thus reduce overall routing times. Routing times are reduced by the creation of a flow table on the ingress interface. The maximum number of entries that can be stored in the flow table at any one time may be specified by using the max-entries parameters.
Usage Examples
The following example enables RapidRoute and sets the maximum number of entries in the flow table to 50: (config)#interface hdlc 1 (config-hdlc 1)#ip ffe max-entries 50
60000CRG0-35B
2079
Technology Review
The RapidRoute system goal is to increase IP packet throughput by moving as much of the packet processing into the engine as possible. Packets are classified into flows based upon the IP protocol (Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), etc.), the source and destination IP addresses, IP type of service (ToS), and the protocol-specific information, such as the source and destination port numbers. Flows are defined as the unidirectional representation of a conversation between two IP hosts. Each ingress interface keeps its own flow table, a collection of flow entries. The first packet in a flow that is forwarded through the unit will build a flow entry. When a flow entry is looked up but no entry is found, a RapidRouteBuilder object is allocated and attached to the packet. As the packet passes through the various processing layers, each subsystem will add processing to the RapidRouteBuilder. When packet is about to be forwarded out of the egress interface, the RapidRouteBuilder will be finalized. That is, the flow entry being built will be checked for completeness and committed to the flow table on the ingress interface. Subsequent flow matches can then bypass the normal processing layers.
60000CRG0-35B
2080
ip flow
Use the ip flow command to enable integrated traffic monitoring (ITM) for all traffic received or forwarded on an interface. Use the no form of this command to disable traffic monitoring. Variations of this command include:
ip flow egress ip flow egress <name> ip flow ingress ip flow ingress <name>
Syntax Description
egress ingress <name> Specifies that all outgoing traffic be monitored. Specifies that all incoming traffic be monitored. Optional. Specifies the name of an access control list (ACL) to use for filtering traffic.
Default Values
By default, no traffic monitoring is enabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables traffic monitoring on an high level data link control (HDLC) interface to monitor incoming traffic through an ACL called myacl: (config)#interface hdlc 1 (config-hdlc 1)#ip flow ingress myacl
60000CRG0-35B
2081
Default Values
By default, broadcast UDP packets are not forwarded.
Command History
Release 9.1 Command was introduced.
Functional Notes
When used in conjunction with the ip forward-protocol command, the ip helper-address feature allows you to customize which broadcast packets are forwarded. To implement the helper address feature, assign a helper address(es) (specifying the device that needs to receive the broadcast traffic) to the interface closest to the host that transmits the broadcast packets. When broadcast packets (of the specified type forwarded using the ip forward-protocol command) are received on the interface, they will be forwarded to the device that needs the information. Only packets meeting the following criteria are considered eligible by the ip helper-address feature: 1. The packet IP protocol is UDP. 2. Any UDP port specified using the ip forward-protocol command. 3. The medium access control (MAC) address of the frame is an all-ones broadcast address (ffff.ffff.ffff). 4. The destination IP address is broadcast defined by all ones (255.255.255.255) or a subnet broadcast (for example, 192.33.4.251 for the 192.33.4.248 /30 subnet).
Usage Examples
The following example forwards all domain naming system (DNS) broadcast traffic to the DNS server with IP address 192.33.5.99: (config)#ip forward-protocol udp domain (config)#interface hdlc 1 (config-hdlc 1)#ip helper-address 192.33.5.99
60000CRG0-35B
2082
ip igmp
Use the ip igmp command to configure multicasting related functions for the interface. Variations of this command include:
ip igmp immediate-leave ip igmp last-member-query-interval <milliseconds> ip igmp querier-timeout <seconds> ip igmp query-interval <seconds> ip igmp query-max-response-time <seconds> ip igmp static-group <address> ip igmp version [1 | 2]
Syntax Description
immediate-leave Specifies that if only one host (or Internet Group Management Protocol (IGMP) snooping switch) is connected to the interface, when a leave is received, multicast of that group is immediately terminated as opposed to sending a group query and timing out the group if no device responds. Works in conjunction with ip igmp last-member-query-interval. Applies to all groups when configured. Use the no form of this command to disable the immediate-leave feature. Controls the timeout (in milliseconds) used to detect whether any group receivers remain on an interface after a receiver leaves a group. If a receiver sends a leave-group message (IGMP Version 2), the router sends a group-specific query on that interface. After twice the time specified by this command plus as much as one second longer, if no receiver responds, the router removes that interface from the group and stops sending that group's multicast packets to the interface. Range is 100 to 65535 ms. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) that the router waits after the current queriers last query before it takes over as querier (IGMP V2). Range is 60 to 300 seconds. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) at which IGMP queries are sent on an interface. Host query messages are addressed to the all-hosts multicast group with an IP time to live (TTL) of 1. The router uses queries to detect whether multicast group members are on the interface and to select an IGMP designated router (DR) for the attached segment (if more than one multicast router exists). Only the DR for the segment sends queries. For IGMP V2, the DR is the router with the lowest IP address on the segment. Range is 0 to 65535 seconds. Use the no form of this command to return to the default setting. Specifies the maximum response time (in seconds) advertised by this interface in queries when using IGMP V2. Hosts are allowed a random time within this period to respond, reducing response bursts. Use the no form of this command to return to the default setting.
last-member-query-interval <milliseconds>
querier-timeout <seconds>
query-interval <seconds>
query-max-response-time <seconds>
60000CRG0-35B
2083
Syntax Description
static-group <address> Configures the router's interface to be a statically connected member of the specified group. Packets received on the correct reverse path forwarding (RPF) interface are forwarded to this interface regardless of whether any receivers have joined the specified group using IGMP. Use the no form of this command to remove a configured static group. Sets the interfaces IGMP version. Use the no form of this command to return to the default setting.
version [1 | 2]
Default Values
ip igmp immediate-leave ip igmp last-member-query-interval ip igmp querier-timeout ip igmp query-interval ip igmp query-max-response-time ip igmp static-group ip igmp version No default 1000 milliseconds 2x the query-interval value 60 seconds 10 seconds No default Version 1
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example sets the query message interval on the interface to 200 milliseconds: (config)#interface hdlc 1 (config-hdlc 1)#ip igmp last-member-query-interval 200
60000CRG0-35B
2084
ip mcast-stub downstream
Use the ip mcast-stub downstream command to enable multicast forwarding and Internet Group Management Protocol (IGMP) (router mode) on an interface and place it in multicast stub downstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 9.1 Command was introduced.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub upstream commands. Downstream interfaces connect to segments with multicast hosts. Multiple interfaces may be configured in downstream mode; however, interfaces connecting to the multicast network (upstream) should not be configured in downstream mode. Interfaces configured as downstream should have the lowest IP address of all IGMP-capable routers on the connected segment in order to be selected as the designated router (DR) and ensure proper forwarding. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub upstream on page 2088 for more information.
Usage Examples
The following example enables multicast forwarding and IGMP on the high level data link control (HDLC) interface: (config)#interface hdlc 1 (config-hdlc 1)#ip mcast-stub downstream
60000CRG0-35B
2085
ip mcast-stub fixed
Use the ip mcast-stub fixed command to allow forwarding of multicast traffic on a selected interface after enabling multicast routing. Use the no form of this command to disable this mode. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 12.1 Command was introduced.
Functional Notes
Multicast routing must be enabled prior to setting ip mcast-stub fixed on the selected interface. Also, use the ip igmp static-group <address> command (refer to ip igmp on page 2083) to receive multicast traffic without host-initiated Internet Group Management Protocol (IGMP) activity on the selected interface. Otherwise, all host-initiated IGMP transactions will enter multicast routes on the routers interface involved with IGMP activities.
Usage Examples
The following example enables multicast traffic forwarding and IGMP on the interface: (config)#interface hdlc 1 (config-hdlc 1)#ip mcast-stub fixed
60000CRG0-35B
2086
ip mcast-stub helper-enable
Use the ip mcast-stub helper-enable command to assign the ip mcast-stub helper-address as the Internet Group Management Protocol (IGMP) proxy. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Release 10.1 Command was introduced. Command was expanded to include high level data link control (HDLC) interfaces.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address, ip mcast-stub upstream, and ip mcast-stub downstream commands. When enabled, the interface becomes a helper forwarding interface. The IGMP host function is dynamically enabled and the interface becomes the active upstream interface, enabling the unit to perform as an IGMP proxy. Refer to ip mcast-stub helper-address <ip address> on page 968, ip mcast-stub downstream on page 2085, and ip mcast-stub upstream on page 2088 for more information.
Usage Examples
The following example sets the helper address as the IGMP proxy: (config)#interface hdlc 1 (config-hdlc 1)#ip mcast-stub helper-enable
60000CRG0-35B
2087
ip mcast-stub upstream
Use the ip mcast-stub upstream command to enable multicast forwarding on an interface and place it in multicast stub upstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 9.1 Command was introduced.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub downstream commands. When enabled, the interface becomes a candidate to be a helper forwarding interface. If chosen as the best path toward the helper address by the router's unicast route table, the Internet Group Management Protocol (IGMP) host function is dynamically enabled and the interface becomes the active upstream interface, enabling the router to perform as an IGMP proxy. Though multiple interfaces may be candidates, no more than one interface will actively serve as the helper forwarding interface. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub downstream on page 2085 for more information.
Usage Examples
The following example enables multicast forwarding on the high level data link control (HDLC) interface: (config)#interface hdlc 1 (config-hdlc 1)#ip mcast-stub upstream
60000CRG0-35B
2088
ip mtu <size>
Use the ip mtu command to configure the maximum transmission unit (MTU) size for the active interface. Use the no form of this command to return to the default value. Syntax Description
<size> Configures the window size for transmitted packets. The valid ranges for the various interfaces are listed below: ATM subinterfaces 64 to 1520 BVIs 64 to 2100 Demand interfaces 64 to 1520 Ethernet interfaces 64 to 1500 FDL interfaces 64 to 256 Frame Relay subinterfaces 64 to 1520 HDLC interfaces (NetVanta 5305) 64 to 4600 HDLC interfaces (all other NetVanta products)64 to 2100 Loopback interfaces 64 to 1500 PPP interfaces (NetVanta 5305) 64 to 4600 PPP interfaces (all other NetVanta products) 64 to 2100 Tunnel interfaces 64 to 18190
Default Values
<size> The default values for the various interfaces are listed below: ATM subinterfaces 1500 BVIs 1500 Demand interfaces 1500 Ethernet interfaces 1500 FDL interfaces 256 Frame Relay subinterfaces 1500 HDLC interfaces 1500 Loopback interfaces 1500 PPP interfaces 1500 Tunnel interfaces 1476
Command History
Release 1.1 Release 11.1 Release 17.9 Command was introduced. Command was expanded to include the demand interface. Command was changed to require the ip keyword.
Functional Notes
Open shortest path first (OSPF) will not become adjacent on links where the MTU sizes do not match. If router A and router B are exchanging hello packets but their MTU sizes do not match, they will never reach adjacency. This is by design and required by the RFC.
60000CRG0-35B
2089
Usage Examples
The following example specifies an MTU of 1200 on the HDLC interface: (config)#interface hdlc 1 (config-hdlc 1)#ip mtu 1200
60000CRG0-35B
2090
ip ospf
Use the ip ospf command to customize open shortest path first (OSPF) settings (if needed). Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication-key <password> ip ospf cost <value> ip ospf dead-interval <seconds> ip ospf hello-interval <seconds> ip ospf message-digest-key [1 | 2] md5 <key> ip ospf priority <value> ip ospf retransmit-interval <seconds> ip ospf transmit-delay <seconds>
Syntax Description
authentication-key <password> cost <value> Assigns a simple-text authentication password to be used by other routers using the OSPF simple password authentication. Specifies the OSPF cost of sending a packet on the interface. This value overrides any computed cost value. Range is 1 to 65535. Sets the maximum interval (in seconds) allowed between hello packets. If the maximum is exceeded, neighboring devices will determine that the device is down. Range is 0 to 32767 seconds. Specifies the interval (in seconds) between hello packets sent on the interface. Range is 0 to 32767 seconds. Configures OSPF message digest 5 (MD5) authentication (16 byte maximum) keys. Sets the OSPF priority. The value set in this field helps determine the designated router (DR) for this network. Range is 0 to 255. Specifies the interval (in seconds) between link state advertisements (LSAs). Range is 0 to 32767 seconds. Sets the estimated time (in seconds) required to send a link state advertisement (LSA) on the interface. Range is 0 to 32767 seconds.
dead-interval <seconds>
Default Values
dead-interval <seconds> hello-interval <seconds> retransmit-interval <seconds> transmit-delay <seconds> 40 seconds 10 seconds: Ethernet, Frame Relay, Tunnel, and Point-to-Point Protocol (PPP) 5 seconds 1 second
60000CRG0-35B
2091
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example sets the maximum number of seconds allowed between hello packets to 25000: (config)#interface hdlc 1 (config-hdlc 1)#ip ospf dead-interval 25000
60000CRG0-35B
2092
ip ospf authentication
Use the ip ospf authentication command to authenticate an interface that is performing open shortest path first (OSPF) authentication. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication ip ospf authentication message-digest ip ospf authentication null
Syntax Description
message-digest null Optional. Select message-digest authentication type. Optional. Specifies that no authentication be used.
Default Values
By default, this is set to null (meaning no authentication is used).
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example specifies that no authentication will be used on the high level data link control (HDLC) interface: (config)#interface hdlc 1 (config-hdlc 1)#ip ospf authentication null
60000CRG0-35B
2093
ip ospf network
Use the ip ospf network command to specify the type of network on this interface. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf network broadcast ip ospf network point-to-point
Syntax Description
broadcast point-to-point Set the network type for broadcast. Set the network type for point-to-point.
Default Values
By default, Ethernet defaults to broadcast. All other interfaces default to point-to-point.
Command History
Release 9.1 Command was introduced.
Functional Notes
A point-to-point network will not elect designated routers.
Usage Examples
The following example designates a broadcast network type: (config)#interface hdlc 1 (config-hdlc 1)#ip ospf network broadcast
60000CRG0-35B
2094
ip pim sparse-mode
Use the ip pim sparse-mode command to enable protocol-independent multicast (PIM) sparse mode for this interface. Use the no form of this command to disable PIM sparse mode. Syntax Description
No subcommands.
Default Values
By default, PIM sparse mode for this interface is disabled.
Command History
Release 11.1 Command was introduced.
Functional Notes
PIM sparse mode is a multicast routing protocol that makes use of the unicast forwarding table. It builds unidirectional shared trees rooted at a rendezvous point (RP) for a multicast group or a shortest-path tree rooted at a specific source for a multicast group.
Usage Examples
The following example enables PIM sparse mode on the high level data link control (HDLC) 1 interface: (config)#interface hdlc 1 (config-hdlc 1)#ip pim sparse-mode
60000CRG0-35B
2095
Default Values
By default, the priority of all protocol-independent multicast (PIM) interfaces is 1.
Command History
Release 11.1 Command was introduced.
Functional Notes
Interfaces advertise their configured priority values in the hello messages transmitted on the interface. Routers use the priority values to determine the appropriate DR. The router on the network segment with the highest priority is selected as the DR. If a hello message is received on the interface from a router on the network segment and it does not contain a priority, the entire network segment defaults to DR selection based on IP addresses instead of priority. In this instance, the DR is selected as the router on the network segment that has the highest IP address. AOS will always include a priority in all transmitted hello messages. If no priority is specifically designated by the user, the priority is set as the default of 1.
Usage Examples
The following example specifies a priority of 100 on the high level data link control (HDLC) 1 interface: (config)#interface hdlc 1 (config-hdlc 1)#ip pim-sparse dr-priority 5
60000CRG0-35B
2096
Default Values
By default, the hellos are transmitted on PIM interfaces every 60 seconds.
Command History
Release 11.1 Command was introduced.
Functional Notes
Hello messages are used to inform neighbors of a routers presence. Hello messages normally generate a small amount of traffic on an interface. Setting the hello-timer to a small interval increases the number of hellos sent (thus increasing the amount of traffic). Set the hello-timer to a reasonable value, taking into consideration the bandwidth available on the interface.
Usage Examples
The following example specifies hellos be sent on the high level data link control (HDLC) 1 interface every 3600 seconds: (config)#interface hdlc 1 (config-hdlc 1)#ip pim-sparse hello-timer 3600
60000CRG0-35B
2097
Default Values
By default, the nbr-timeout is set to 105 seconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the nbr-timeout to 300 seconds: (config)#interface hdlc 1 (config-hdlc 1)#ip pim-sparse nbr-timeout 300
60000CRG0-35B
2098
Default Values
By default, the override interval is set to 2500 milliseconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the override interval to 3000 milliseconds: (config)#interface hdlc 1 (config-hdlc 1)#ip pim-sparse override-interval 3000
60000CRG0-35B
2099
Default Values
By default, the propagation delay is set to 500 milliseconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the expected propagation delay to 300 milliseconds on the high level data link control (HDLC) 1 interface: (config)#interface hdlc 1 (config-hdlc 1)#ip pim-sparse propagation-delay 300
60000CRG0-35B
2100
Default Values
By default, no policy route map is assigned to this interface.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example assigns the policy route map policy1 to the high level data link control (HDLC) 1 interface: (config)#interface hdlc 1 (config-hdlc 1)#ip policy route-map policy1
60000CRG0-35B
2101
ip proxy-arp
Use the ip proxy-arp command to enable proxy Address Resolution Protocol (ARP) on the interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, proxy ARP is enabled.
Command History
Release 9.1 Command was introduced.
Functional Notes
In general, the principle of proxy ARP allows a router to insert its IP address in the source IP address field of a packet (if the packet is from a host on one of its subnetworks). This allows hosts to reach devices on other subnetworks without implementing routing or specifying a default gateway. If proxy ARP is enabled, AOS will respond to all proxy ARP requests with its specified medium access control (MAC) address and forward packets accordingly. Enabling proxy ARP on an interface may introduce unnecessary ARP traffic on the network.
Usage Examples
The following example enables proxy ARP on the high level data link control (HDLC) interface: (config)#interface hdlc 1 (config-hdlc 1)#ip proxy-arp
60000CRG0-35B
2102
Syntax Description
1 2 Accepts only received RIP version 1 packets on the interface. Accepts only received RIP version 2 packets on the interface.
Default Values
By default, all interfaces implement RIP version 1 (the default value for the version command).
Command History
Release 9.1 Command was introduced.
Functional Notes
Use the ip rip receive version command to specify a RIP version that overrides the version (in the Router RIP) configuration. Refer to version on page 2687 for more information. AOS only accepts one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the high level data link control (HDLC) interface to accept only RIP version 2 packets: (config)#interface hdlc 1 (config-hdlc 1)#ip rip receive version 2
60000CRG0-35B
2103
Syntax Description
1 2 Transmits only RIP version 1 packets on the interface. Transmits only RIP version 2 packets on the interface.
Default Values
By default, all interfaces transmit RIP version 1 (the default value for the version command).
Command History
Release 9.1 Command was introduced.
Functional Notes
Use the ip rip send version command to specify a RIP version that overrides the version (in the Router RIP) configuration. Refer to version on page 2687 for more information. AOS only transmits one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the high level data link control (HDLC) interface to transmit only RIP version 2 packets: (config)#interface hdlc 1 (config-hdlc 1)#ip rip send version 2
60000CRG0-35B
2104
Default Values
By default, no manual summarization is applied by RIP.
Command History
Release 12.1 Command was introduced.
Functional Notes
Unlike the automatic summarization on classful network boundaries, only specific network advertisements are made by RIP using the ip rip summary-address command. This command is only effective if RIP version 2 is configured.
Usage Examples
The following example enables manual summarization on the specified IP address: (config)#interface hdlc 1 (config-hdlc 1)#ip rip summary-address 10.10.123.0 255.255.255.0
60000CRG0-35B
2105
ip route-cache
Use the ip route-cache command to enable fast-cache switching on the interface. Use the no form of this command to disable fast-cache switching and return to process switching mode. Using network address translation (NAT) or the AOS firewall capabilities on an interface requires process switching mode (using the no ip route-cache command).
Syntax Description
No subcommands.
Default Values
By default, fast caching is enabled on all interfaces.
Command History
Release 9.1 Command was introduced.
Functional Notes
Fast switching allows an IP interface to provide optimum performance when processing IP traffic.
Usage Examples
The following example enables fast switching on the high level data link control (HDLC) interface: (config)#interface hdlc 1 (config-hdlc 1)#ip route-cache
60000CRG0-35B
2106
ip unnumbered <interface>
Use the ip unnumbered command to use the IP address assigned to the specified interface for all IP processing on the active interface. Use the no form of this command to remove the unnumbered configuration. Syntax Description <interface>
Specifies the interface that contains the IP address to use as the source address for all packets transmitted on this interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type ip unnumbered ? for a list of valid interfaces.
Default Values
By default, all interfaces are configured to use a specified IP address (using the ip address command).
Command History
Release 9.1 Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the demand interface. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
Functional Notes
If ip unnumbered is enabled on an interface, all IP traffic from the interface will use a source IP address taken from the specified interface. For example, specifying ip unnumbered eth 0/1 while in the Frame Relay Subinterface Configuration mode configures the Frame Relay subinterface to use the IP address assigned to the Ethernet interface for all IP processing. In addition, AOS uses the specified interface information when sending route updates over the unnumbered interface.
Usage Examples
The following example configures the high level data link control (HDLC) interface to use the IP address assigned to the Ethernet interface 0/1: (config)#interface hdlc 1 (config-hdlc 1)#ip unnumbered eth 0/1
60000CRG0-35B
2107
ip urlfilter <name>
Use the ip urlfilter command to apply a universal resource locator (URL) filter to the interface for all inbound or outbound traffic. Use the no form of this command to remove the URL filter from an interface. Variations of this command include:
ip urlfilter <name> in ip urlfilter <name> out
Syntax Description
<name> in out Specifies the URL filter name to use on the interface. Applies the filter to the inbound traffic. Applies the filter to the outbound traffic.
Default Values
By default, there are no URL filters applied to any interfaces.
Command History
Release 12.1 Release 14.1 Command was introduced. Command was expanded to include the virtual local area network (VLAN) interfaces.
Functional Notes
The firewall must be enabled using the ip firewall command in order to use URL filters. The URL filter must be created by using the ip urlfilter <name> http command before applying it to the interface. Refer to ip urlfilter <name> http on page 1090 for more information on using this command.
Usage Examples
The following example performs URL filtering on all traffic entering through the high level data link control (HDLC) interface and matches the URL filter named MyFilter: (config)#interface hdlc 1 (config-hdlc 1)#ip urlfilter MyFilter in
60000CRG0-35B
2108
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface hdlc 1 (config-hdlc 1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2109
keepalive <value>
Use the keepalive command to enable the transmission of keepalive packets on the interface and specify the time interval in seconds between transmitted packets. Use the no form of this command to return to the default setting. Syntax Description
<value> Defines the time interval (in seconds) between transmitted keepalive packets. Valid range is 0 to 32767 seconds.
Default Values
By default, the time interval between transmitted keepalive packets is 10 seconds.
Command History
Release 9.1 Command was introduced.
Functional Notes
If three keepalive packets are sent to an interface with no response, the interface is considered down. To detect interface failures quickly, specify a smaller keepalive time.
Usage Examples
The following example specifies a keepalive time of 5 seconds on the high level data link control (HDLC) interface: (config)#interface hdlc 1 (config-hdlc 1)#keepalive 5
60000CRG0-35B
2110
lldp receive
Use the lldp receive command to allow Link Layer Discovery Protocol (LLDP) packets to be received on this interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, all interfaces are configured to send and receive LLDP packets.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example configures the high level data link control (HDLC) interface to receive LLDP packets: (config)#interface hdlc 1 (config-hdlc 1)#lldp receive
60000CRG0-35B
2111
lldp send
Use the lldp send command to configure this interface to transmit Link Layer Discovery Protocol (LLDP) packets or to control the types of information contained in the LLDP packets transmitted by this interface. Use the no form of this command to disable this feature. Variations of this command include:
lldp send lldp send management-address lldp send port-description lldp send system-capabilities lldp send system-description lldp send system-name lldp send-and-receive
Syntax Description
management-address port-description system-capabilities system-description system-name and-receive Enables transmission of management address information on this interface. Enables transmission of port description information on this interface. Enables transmission of this devices system capabilities on this interface. Enables transmission of this devices system description on this interface. Enables transmission of this devices system name on this interface. Configures this interface to both transmit and receive LLDP packets.
Default Values
By default, all interfaces are configured to transmit and receive LLDP packets of all types.
Command History
Release 9.1 Command was introduced.
Functional Notes
Individual LLDP information can be enabled or disabled using the various forms of the lldp send command. For example, use the lldp send-and-receive command to enable transmit and receive of all LLDP information. Then use the no lldp send port-description command to prevent LLDP from transmitting port description information.
60000CRG0-35B
2112
Usage Examples
The following example configures the high level data link control (HDLC) interface to transmit LLDP packets containing all enabled information types: (config)#interface hdlc 1 (config-hdlc 1)#lldp send The following example configures the HDLC to transmit and receive LLDP packets containing all information types: (config)#interface hdlc 1 (config-hdlc 1)#lldp send-and-receive
60000CRG0-35B
2113
max-reserved-bandwidth <value>
Use the max-reserved-bandwidth command to specify the percentage of interface bandwidth reserved for use in user-defined (priority or class-based) queues. The remainder of the interface bandwidth is reserved for system-critical traffic and is not available to user-defined queues. Use the no form of this command to restore the default value. Reserving a portion of the interface bandwidth for system-critical traffic is necessary for proper operation. Specifying the entire interface bandwidth for use in user-defined queues can cause undesirable operation. Syntax Description
<value> Specifies the maximum percentage of bandwidth to reserve for quality of service (QoS). This setting is configured as a percentage of the total interface speed. Range is 1 to 100 percent.
Default Values
By default, max-reserved-bandwidth is set to 75 percent, which reserves 25 percent of the interface bandwidth for system-critical traffic.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example specifies 85 percent of the bandwidth on the high level data link control (HDLC) 1 be available for use in user-defined queues: (config)#interface hdlc 1 (config-hdlc 1)#max-reserved-bandwidth 85
60000CRG0-35B
2114
media-gateway ip
Use the media-gateway ip command to associate an IP address source to use for Realtime Transport Protocol (RTP) traffic. When configuring Voice over Internet Protocol (VoIP), RTP traffic must have an IP address associated with it. However, some interfaces allow dynamic configuration of IP addresses, causing this value to change periodically. Use the no form of this command to disable this function. Variations of this command include:
media-gateway ip loopback <interface id> media-gateway ip primary media-gateway ip secondary <ip address>
Syntax Description
loopback <interface id> Specifies an IP address statically defined to a loopback interface for RTP traffic. This is helpful when using a single IP address across multiple wide area network (WAN) interfaces for RTP traffic. The valid range for loopback interface identifiers is 1 to 1024. The interface ID is used to uniquely identify a loopback interface. The entered value cannot be in use by another loopback interface. Specifies using this interfaces configured primary IP address for RTP traffic. Applies to static, Dynamic Host Configuration Protocol (DHCP), or negotiated addresses. Specifies using this interfaces statically defined secondary IP address for RTP traffic. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
primary
Default Values
By default, media-gateway ip is disabled.
Command History
Release 10.1 Release 17.3 Command was introduced. Command was updated with the loopback interface identification option.
Usage Examples
The following example configures the unit to use the primary IP address for RTP traffic: (config)#interface hdlc 1 (config-hdlc 1)#media-gateway ip primary
60000CRG0-35B
2115
qos-policy
Use the qos-policy command to apply a previously configured quality of service (QoS) map to incoming or outgoing packets on an interface. Use the no form of this command to remove the map from the interface. Variations of this command include:
qos-policy in <name> qos-policy out <name>
Syntax Description
<name> in out Specifies the name of a previously created QoS map (refer to qos map <name> <number> on page 1184 for more information). Assigns a QoS map to this interface's input. Assigns a QoS map to this interface's output.
Default Values
No default values are necessary for this command.
Command History
Release 9.1 Release 15.1 Command was introduced. Command was expanded to include the in parameter.
Functional Notes
When a QoS policy is applied to an interface, it may be disabled if the interface bandwidth is not adequate to support the requested bandwidth on the map set. Once the bandwidth problem is resolved, the map will work again. The bandwidth will be rechecked on any of the following changes: 1. A priority or class-based entry is added to, deleted from, or changed in a QoS map set. 2. The interface bandwidth is changed by the bandwidth command on the interface. 3. A QoS policy is applied to an interface. 4. A cross connect is created that includes an interface with a QoS policy. 5. The interface queuing method is changed to fair-queue to use weighted fair queuing (WFQ). 6. The interface operational status changes. 7. The interface bandwidth changes for other reasons (e.g., when asymmetric digital subscriber line (ADSL) finishes training). In order to prevent the map from being disabled in cases of temporary inadequate bandwidth (e.g., a single link goes down in a dual T1 multilink configuration where the map requests more than one T1's worth of bandwidth), the QoS map uses the maximum theoretical bandwidth on an interface, not the actual bandwidth at that time. This actually helps QoS keep higher priority class-based traffic working better than best-effort traffic when the bandwidth drops.
60000CRG0-35B
2116
Usage Examples
The following example applies the QoS map VOICEMAP to the high level data link control (HDLC) interface: (config)#interface hdlc 1 (config-hdlc 1)#qos-policy out VOICEMAP
60000CRG0-35B
2117
rtp quality-monitoring
Use the rtp quality-monitoring command to enable voice quality monitoring (VQM) of the Realtime Transport Protocol (RTP) voice stream packets on this interface. If the global command (ip rtp quality-monitoring) is disabled when this command is issued, the system will return the following warning: Applied but not used, you must globally enable ip rtp quality-monitoring to use VQM. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, VQM is enabled on all wide area network (WAN) and local area network (LAN) interfaces.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables RTP quality monitoring on the high level data link control (HDLC) interface: (config)#interface hdlc 1 (config-hdlc 1)#rtp quality-monitoring
60000CRG0-35B
2118
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface.
Usage Examples
The following example disables the link-status trap on the HDLC interface: (config)#interface hdlc 1 (config-hdlc 1)#no snmp trap link-status
60000CRG0-35B
2119
Keep in mind that changing an interfaces VRF association will clear all IP-related settings on that interface. Syntax Description
<name> Specifies the name of the VRF to which to assign the interface.
Default Values
By default, interfaces are associated with the default VRF that is unnumbered.
Command History
Release 16.1 Release 17.8 Command was introduced. The keyword ip was removed from this command.
Functional Notes
VRF instances must be created first before an interface can be assigned. An interface can only be assigned to one VRF, but multiple interfaces can be assigned to the same VRF. An interface will only forward IP traffic that matches its associated VRF. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured.
Usage Examples
The following example assigns the HDLC interface to the VRF instance named RED: (config)#interface hdlc 1 (config-hdlc 1)#vrf forwarding RED
60000CRG0-35B
2120
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. bandwidth <value> on page 2122 crypto map <name> on page 2123 dynamic-dns on page 2125 ip commands begin on page 2127 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2162 rtp quality-monitoring on page 2163 snmp trap on page 2164 snmp trap link-status on page 2165 vrf forwarding <name> on page 2166
60000CRG0-35B
2121
bandwidth <value>
Use the bandwidth command to provide the bandwidth value of an interface to the higher level protocols. This value is used in cost calculations. Use the no form of this command to restore the default value. Syntax Description
<value> Specifies bandwidth in kbps. Range is 1 to 4294967295 kbps.
Default Values
To view the default values, use the show interfaces command.
Command History
Release 3.1 Command was introduced.
Functional Notes
The bandwidth command is an informational value that is communicated to the higher level protocols to be used in cost calculations. This is a routing parameter only and does not affect the physical interface.
Usage Examples
The following example sets bandwidth of the loopback interface to 10 Mbps: (config)#interface loopback 1 (config-loop 1)#bandwidth 10000
60000CRG0-35B
2122
For virtual private network (VPN) configuration example scripts, refer to the VPN configuration guide available on the AOS Documentation CD shipped with your product.
Syntax Description
<name> Specifies the crypto map name that you wish to assign to the interface.
Default Values
By default, no crypto maps are assigned to an interface.
Command History
Release 4.1 Command was introduced.
Functional Notes
When configuring a system to use both the stateful inspection firewall and Internet key exchange (IKE) negotiation for VPN, keep the following information in mind: When defining the policy class and associated access control lists (ACLs) that describe the behavior of the firewall, do not forget to include the traffic coming into the system over a VPN tunnel terminated by the system. The firewall should be set up with respect to the unencrypted traffic that is destined to be sent or received over the VPN tunnel. The following diagram represents typical AOS data-flow logic.
60000CRG0-35B
2123
IPSec Decrypt/Discard
IPSec Encrypt
NAT/ACP/ Firewall
Router
As shown in the diagram above, data coming into the product is first processed by the static filter associated with the interface on which the data is received. This access group is a true static filter and is available for use regardless of whether the firewall is enabled or disabled. Next (if the data is encrypted), it is sent to the IPSec engine for decryption. The decrypted data is then processed by the stateful inspection firewall. Therefore, given a terminating VPN tunnel, only unencrypted data is processed by the firewall. The ACLs for a crypto map on an interface work in reverse logic to the ACLs for a policy class on an interface. When specifying the ACLs for a crypto map, the source information is the private local side, unencrypted source of the data. The destination information will be the far-end, unencrypted destination of the data. However, ACLs for a policy class work in reverse. The source information for the ACL in a policy class is the far end. The destination information is the local side.
Usage Examples
The following example applies all crypto maps with the name MyMap to the loopback interface: (config)#interface loopback 1 (config-loop 1)#crypto map MyMap
60000CRG0-35B
2124
dynamic-dns
Use the dynamic-dns command to configure Dynamic DNS service provided by Dynamic Network Services, Inc. (www.dyndns.org). Use the no form of this command to disable this feature. Variations of this command include:
dynamic-dns custom <hostname> <minutes> dynamic-dns dyndns <hostname> <username> <password> dynamic-dns dyndns-custom <hostname> <username> <password> dynamic-dns dyndns-static <hostname> <username> <password>
Syntax Description
<hostname> <minutes> Specifies the host name for the server that updates the dynamic domain naming system (DNS). Specifies the intervals in minutes to update the server with information (updates also occur when the interfaces IP address changes regardless of the update intervals). Specifies a user name using an alphanumerical string up to 30 characters in length (the user name is case sensitive). Specifies a password using an alphanumerical string up to 30 characters in length (the password is case sensitive). Refer to Functional Notes below for additional argument descriptions.
<username> <password>
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 12.1 Command was introduced. Command was expanded.
Functional Notes
custom - Constanttime.coms Custom Dynamic DNSSM service allows you complete access and management control over your domain name regardless of where you purchased/registered it. This allows you to manage IP address mappings (A records), domain aliases (CNAME records), and mail servers (mail exchange (MX) records). dyndns - The Dynamic DNSSM offered by Dynamic Network Services, Inc. (DynDNS.org) allows you to alias a dynamic IP address to a static host name in various domains. This allows your unit to be more easily accessed from various locations on the Internet. This service is provided for up to five host names. dyndns-custom - DynDNS.org's Custom DNSSM service provides a full DNS solution, giving you complete control over an entire domain name. A Web-based interface provides two levels of control over your domain, catering to average or advanced users. Five globally redundant DNS servers ensure that your domain will always resolve.
60000CRG0-35B
2125
A choice of two interfaces is available. The basic interface is designed for most users. It comes preconfigured for most common configurations and allows for easy creation of most common record types. The advanced interface is designed for system administrators with a solid DNS background, and provides layout and functionality similar to a BIND zone file allowing for the creation of nearly any record type. Custom DNSSM can be used with both static and dynamic IPs, and has the same automatic update capability through Custom DNS-aware clients as Dynamic DNS. dyndns-static - The Static DNS service is similar to DynDNS.orgs Dynamic DNSSM service in that it allows a host name, such as yourname.dyndns.org, to point to your IP address. Unlike a Dynamic DNS host, a Static DNS host does not expire after 35 days without updates, but updates take longer to propagate through the DNS system. This service is provided for up to five host names. If your IP address does not change often or at all, but you still want an easy name to remember it by (without having to purchase your own domain name), Static DNS service is ideal for you. If you would like to use your own domain name (such as yourname.com), you need Custom DNS service that also provides full dynamic and static IP address support.
Usage Examples
The following example sets the Dynamic DNS to dyndns-custom with host name host, user name user, and password pass: (config)#interface loopback 1 (config-loop 1)#dynamic-dns dyndns-custom host user pass
60000CRG0-35B
2126
ip access-group <name>
Use the ip access-group command to create an access control list (ACL) to be used for packets transmitted on or received from the specified interface. Use the no form of this command to disable this type of control. Variations of this command include:
ip access-group <name> in ip access-group <name> out
Syntax Description
<name> in out Specifies IP ACL name. Enables access control on packets received on the specified interface. Enables access control on packets transmitted on the specified interface.
Default Values
By default, these commands are disabled.
Command History
Release 3.1 Command was introduced.
Functional Notes
When this command is enabled, the IP destination address of each packet must be validated before being passed through. If the packet is not acceptable per these settings, it is dropped.
Usage Examples
The following example sets up the router to allow only Telnet traffic into the loopback interface: (config)#ip access-list extended TelnetOnly (config-ext-nacl)#permit tcp any any eq telnet (config-ext-nacl)#interface loopback 1 (config-loop 1)#ip access-group TelnetOnly in
60000CRG0-35B
2127
ip access-policy <name>
Use the ip access-policy command to assign a specified access control policy (ACP) to an interface. ACPs are applied to traffic entering an interface. Use the no form of this command to remove an ACP association. For more information on using ACPs, refer to ip policy-class <ipv4 acp name> on page 985. Configured ACPs will only be active if the ip firewall command has been entered at the Global Configuration mode prompt to enable the AOS security features. All configuration parameters are valid, but no security data processing will be attempted unless the security features are enabled. Syntax Description
<name> Identifies the configured ACP by alphanumeric descriptor (all ACP descriptors are case sensitive).
Default Values
By default, there are no configured ACPs associated with an interface.
Command History
Release 2.1 Release 5.1 Release 6.1 Release 15.1 Release 17.9 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the virtual local area network (VLAN) interfaces. Command was expanded to include the bridged virtual interfaces (BVIs). Command was changed to require the ip keyword.
Functional Notes
To assign an ACP to an interface, enter the interface configuration mode for the desired interface and enter ip access-policy <name>.
Usage Examples
The following example associates the ACP PRIVATE (to allow inbound traffic to the Web server) to the loopback interface 1: Enable the AOS security features: (config)#ip firewall Associate the access policy with the loopback interface 1: (config)#interface loopback 1 (config-loop 1)#ip access-policy PRIVATE
60000CRG0-35B
2128
Syntax Description
<ip address> <subnet mask> Specifies a valid IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IP addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Optional. Configures a secondary IP address for the specified interface.
secondary
Default Values
By default, there are no assigned IP addresses.
Command History
Release 1.1 Release 2.1 Command was introduced. Added ip address dhcp for Dynamic Host Configuration Protocol (DHCP) client support.
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a secondary IP address of 192.22.72.101 255.255.255.252: (config)#interface loopback 1 (config-loop 1)#ip address 192.22.72.101 255.255.255.252 secondary
60000CRG0-35B
2129
Default Values
By default, no IP address range is defined.
Command History
Release 17.4 Command was introduced.
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a range of secondary IP address from 192.22.72.1 to 192.22.72.10 on subnet 255.255.255.252: (config)#interface loopback 1 (config-loop 1)#ip address range 192.22.72.1 192.22.72.10 255.255.255.252 secondary
60000CRG0-35B
2130
ip directed-broadcast
Use the ip directed-broadcast command to allow reception/forwarding of directed broadcasts. Use the no form of this command to disable this feature. Variations of this command include:
ip directed-broadcast ip directed-broadcast <name>
Syntax Description
<name> Specifies IP access control list (ACL) name.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Command was introduced.
Functional Notes
A directed broadcast is a packet intended for all nodes on a nonlocal network. For example, the broadcast address 255.255.255.255 reaches all nodes on a network; the directed broadcast address 128.1.255.255 is intended for all nodes whose network address is 128.1.0.0. A router not directly attached to 128.1.0.0 simply forwards the directed broadcast packet to the next hop. A router on network 128.1.0.0 that has ip directed-broadcast enabled, accepts and forwards the packet to all nodes whose network address is 128.1.0.0. Routers connecting subnets of 128.1.0.0 also accept and forward the packet to the nodes on their respective subnets. When a directed broadcast packet reaches a router that is directly connected to its destination subnet, that packet is distributed as a broadcast on the destination subnet. The packet is then sent as a link-layer broadcast. The ip directed-broadcast command controls the distribution of directed broadcasts when they reach their target subnets. Only the final transmission of the directed broadcast on its ultimate destination subnet is affected. It does not affect the transit unicast routing of IP directed broadcasts. If ip directed-broadcast is enabled for this interface, incoming IP packets whose addresses identify them as directed broadcasts intended for the subnet to which this interface is attached will be forwarded as broadcasts on that subnet. Forwarding of the packets can be limited by specifying an ACL with this command. In this case, only directed broadcasts that are permitted by the specified ACL will be forwarded, and all other directed broadcasts directed to this interface subnet will be dropped. Disabling the ip directed-broadcast command will cause directed broadcasts destined for the subnet to which this interface is attached to be dropped. This option is a requirement for routers as described in RFC 1812, section 4.2.2.11. Furthermore, it is disabled by default (RFC 2644), with the intended goal of reducing the efficacy of certain types of denial of service (DoS) attacks.
60000CRG0-35B
2131
Usage Examples
The following example enables forwarding of directed broadcasts on the interface loopback 1: (config)#interface loopback 1 (config-loop 1)#ip directed-broadcast
60000CRG0-35B
2132
ip flow
Use the ip flow command to enable integrated traffic monitoring (ITM) for all traffic received or forwarded on an interface. Use the no form of this command to disable traffic monitoring. Variations of this command include:
ip flow egress ip flow egress <name> ip flow ingress ip flow ingress <name>
Syntax Description
egress ingress <name> Specifies that all outgoing traffic be monitored. Specifies that all incoming traffic be monitored. Optional. Specifies the name of an access control list (ACL) to use for filtering traffic.
Default Values
By default, no traffic monitoring is enabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables traffic monitoring on a loopback interface to monitor incoming traffic through an ACL called myacl: (config)#interface loopback 1 (config-loop 1)#ip flow ingress myacl
60000CRG0-35B
2133
Default Values
By default, broadcast UDP packets are not forwarded.
Command History
Release 1.1 Command was introduced.
Functional Notes
When used in conjunction with the ip forward-protocol command, the ip helper-address feature allows you to customize which broadcast packets are forwarded. To implement the helper address feature, assign a helper-address(es) (specifying the device that needs to receive the broadcast traffic) to the interface closest to the host that transmits the broadcast packets. When broadcast packets (of the specified type forwarded using the ip forward-protocol command) are received on the interface, they will be forwarded to the device that needs the information. Only packets meeting the following criteria are considered eligible by the ip helper-address feature: 1. The packet IP protocol is UDP. 2. Any UDP port specified using the ip forward-protocol command. 3. The medium access control (MAC) address of the frame is an all-ones broadcast address (ffff.ffff.ffff). 4. The destination IP address is broadcast defined by all ones (255.255.255.255) or a subnet broadcast (for example, 192.33.4.251 for the 192.33.4.248 /30 subnet).
60000CRG0-35B
2134
Usage Examples
The following example forwards all DNS broadcast traffic to the DNS server with IP address 192.33.5.99: (config)#ip forward-protocol udp domain (config)#interface loopback 1 (config-loop 1)#ip helper-address 192.33.5.99
60000CRG0-35B
2135
ip igmp
Use the ip igmp command to configure multicasting related functions for the interface. Variations of this command include:
ip igmp immediate-leave ip igmp last-member-query-interval <milliseconds> ip igmp querier-timeout <seconds> ip igmp query-interval <seconds> ip igmp query-max-response-time <seconds> ip igmp static-group <address> ip igmp version [1 | 2]
Syntax Description
immediate-leave Specifies that if only one host (or Internet Group Management Protocol (IGMP) snooping switch) is connected to the interface, when a leave is received, multicast of that group is immediately terminated as opposed to sending a group query and timing out the group if no device responds. Works in conjunction with ip igmp last-member-query-interval. Applies to all groups when configured. Use the no form of this command to disable the immediate-leave feature. Controls the timeout (in milliseconds) used to detect whether any group receivers remain on an interface after a receiver leaves a group. If a receiver sends a leave-group message (IGMP Version 2), the router sends a group-specific query on that interface. After twice the time specified by this command plus as much as one second longer, if no receiver responds, the router removes that interface from the group and stops sending that group's multicast packets to the interface. Range is 100 to 65535 ms. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) that the router waits after the current queriers last query before it takes over as querier (IGMP V2). Range is 60 to 300 seconds. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) at which IGMP queries are sent on an interface. Host query messages are addressed to the all-hosts multicast group with an IP time to live (TTL) of 1. The router uses queries to detect whether multicast group members are on the interface and to select an IGMP designated router (DR) for the attached segment (if more than one multicast router exists). Only the DR for the segment sends queries. For IGMP V2, the DR is the router with the lowest IP address on the segment. Range is 0 to 65535 seconds. Use the no form of this command to return to the default setting. Specifies the maximum response time (in seconds) advertised by this interface in queries when using IGMP V2. Hosts are allowed a random time within this period to respond, reducing response bursts. Use the no form of this command to return to the default setting.
last-member-query-interval <milliseconds>
querier-timeout <seconds>
query-interval <seconds>
query-max-response-time <seconds>
60000CRG0-35B
2136
Syntax Description
static-group <address> Configures the router's interface to be a statically connected member of the specified group. Packets received on the correct reverse path forwarding (RPF) interface are forwarded to this interface regardless of whether any receivers have joined the specified group using IGMP. Use the no form of this command to remove a configured static group. Sets the interfaces IGMP version. Use the no form of this command to return to the default setting.
version [1 | 2]
Default Values
ip igmp immediate-leave ip igmp last-member-query-interval ip igmp querier-timeout ip igmp query-interval ip igmp query-max-response-time ip igmp static-group ip igmp version No default 1000 milliseconds 2x the query-interval value 60 seconds 10 seconds No default Version 1
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example sets the query message interval on the interface to 200 milliseconds: (config)#interface loopback 1 (config-loop 1)#ip igmp last-member-query-interval 200
60000CRG0-35B
2137
ip mcast-stub downstream
Use the ip mcast-stub downstream command to enable multicast forwarding and Internet Group Management Protocol (IGMP) (router mode) on an interface and place it in multicast stub downstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub upstream commands. Downstream interfaces connect to segments with multicast hosts. Multiple interfaces may be configured in downstream mode; however, interfaces connecting to the multicast network (upstream) should not be configured in downstream mode. Interfaces configured as downstream should have the lowest IP address of all IGMP-capable routers on the connected segment in order to be selected as the designated router (DR) and ensure proper forwarding. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub upstream on page 2141 for more information.
Usage Examples
The following example enables multicast forwarding and IGMP on the interface: (config)#interface loopback 1 (config-loop 1)#ip mcast-stub downstream
60000CRG0-35B
2138
ip mcast-stub fixed
Use the ip mcast-stub fixed command to allow forwarding of multicast traffic on a selected interface after enabling multicast routing. Use the no form of this command to disable this mode. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 12.1 Command was introduced.
Functional Notes
Multicast routing must be enabled prior to setting ip mcast-stub fixed on the selected interface. Also, use the ip igmp static-group <ip address> command to receive multicast traffic without host-initiated Internet Group Management Protocol (IGMP) activity on the selected interface. Otherwise, all host-initiated IGMP transactions will enter multicast routes on the routers interface involved with IGMP activities.
Usage Examples
The following example enables multicast traffic forwarding and IGMP on the interface: (config)#interface loopback 1 (config-loop 1)#ip mcast-stub fixed
60000CRG0-35B
2139
ip mcast-stub helper-enable
Use the ip mcast-stub helper-enable command to assign the ip mcast-stub helper-address as the Internet Group Management Protocol (IGMP) proxy. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 8.1 Release 10.1 Command was introduced. Command was expanded to include the loopback interfaces.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address, ip mcast-stub upstream, and ip mcast-stub downstream commands. When enabled, the interface becomes a helper forwarding interface. The IGMP host function is dynamically enabled and the interface becomes the active upstream interface, enabling the unit to perform as an IGMP proxy. Refer to ip mcast-stub helper-address <ip address> on page 968, ip mcast-stub downstream on page 2138, and ip mcast-stub upstream on page 2141 for more information.
Usage Examples
The following example sets the helper address as the IGMP proxy: (config)#interface loopback 1 (config-loop 1)#ip mcast-stub helper-enable
60000CRG0-35B
2140
ip mcast-stub upstream
Use the ip mcast-stub upstream command to enable multicast forwarding on an interface and place it in multicast stub upstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub downstream commands. When enabled, the interface becomes a candidate to be a helper forwarding interface. If chosen as the best path toward the helper address by the router's unicast route table, the Internet Group Management Protocol (IGMP) host function is dynamically enabled and the interface becomes the active upstream interface, enabling the router to perform as an IGMP proxy. Though multiple interfaces may be candidates, no more than one interface will actively serve as the helper forwarding interface. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub downstream on page 2138 for more information.
Usage Examples
The following example enables multicast forwarding on the interface: (config)#interface loopback 1 (config-loop 1)#ip mcast-stub upstream
60000CRG0-35B
2141
ip mtu <size>
Use the ip mtu command to configure the maximum transmission unit (MTU) size for the active interface. Use the no form of this command to return to the default value. Syntax Description
<size> Configures the window size for transmitted packets. The valid ranges for the various interfaces are listed below: ATM subinterfaces 64 to 1520 BVIs 64 to 2100 Demand interfaces 64 to 1520 Ethernet interfaces 64 to 1500 FDL interfaces 64 to 256 Frame Relay subinterfaces 64 to 1520 HDLC interfaces (NetVanta 5305) 64 to 4600 HDLC interfaces (all other NetVanta products)64 to 2100 Loopback interfaces 64 to 1500 PPP interfaces (NetVanta 5305) 64 to 4600 PPP interfaces (all other NetVanta products) 64 to 2100 Tunnel interfaces 64 to 18190
Default Values
<size> The default values for the various interfaces are listed below: ATM subinterfaces 1500 BVIs 1500 Demand interfaces 1500 Ethernet interfaces 1500 FDL interfaces 256 Frame Relay subinterfaces 1500 HDLC interfaces 1500 Loopback interfaces 1500 PPP interfaces 1500 Tunnel interfaces 1476
Command History
Release 1.1 Release 11.1 Release 17.9 Command was introduced. Command was expanded to include the demand interface. Command was changed to require the ip keyword.
Functional Notes
Open shortest path first (OSPF) will not become adjacent on links where the MTU sizes do not match. If router A and router B are exchanging hello packets but their MTU sizes do not match, they will never reach adjacency. This is by design and required by the RFC.
60000CRG0-35B
2142
Usage Examples
The following example specifies an MTU of 1200 on the loopback interface: (config)#interface loopback 1 (config-loop 1)#ip mtu 1200
60000CRG0-35B
2143
ip ospf
Use the ip ospf command to customize open shortest path first (OSPF) settings (if needed). Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication-key <password> ip ospf cost <value> ip ospf dead-interval <seconds> ip ospf hello-interval <seconds> ip ospf message-digest-key [1 | 2] md5 <key> ip ospf priority <value> ip ospf retransmit-interval <seconds> ip ospf transmit-delay <seconds>
Syntax Description
authentication-key <password> cost <value> Assigns a simple-text authentication password to be used by other routers using the OSPF simple password authentication. Specifies the OSPF cost of sending a packet on the interface. This value overrides any computed cost value. Range is 1 to 65535. Sets the maximum interval (in seconds) allowed between hello packets. If the maximum is exceeded, neighboring devices will determine that the device is down. Range is 0 to 32767 seconds. Specifies the interval (in seconds) between hello packets sent on the interface. Range is 0 to 32767 seconds. Configures OSPF message digest 5 (MD5) authentication (16 byte maximum) keys. Sets the OSPF priority. The value set in this field helps determine the designated router (DR) for this network. Range is 0 to 255. Specifies the interval (in seconds) between link state advertisements (LSAs). Range is 0 to 32767 seconds. Sets the estimated time (in seconds) required to send a link state advertisement (LSA) on the interface. Range is 0 to 32767 seconds.
dead-interval <seconds>
Default Values
retransmit-interval <seconds> transmit-delay <seconds> hello-interval <seconds> dead-interval <seconds> 5 seconds 1 second 10 seconds: Ethernet, Frame Relay, and Point-to-Point Protocol (PPP) 40 seconds
60000CRG0-35B
2144
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example sets the maximum number of seconds allowed between hello packets to 25000: (config)#interface loopback 1 (config-loop 1)#ip ospf dead-interval 25000
60000CRG0-35B
2145
ip ospf authentication
Use the ip ospf authentication command to authenticate an interface that is performing open shortest path first (OSPF) authentication. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication message-digest ip ospf authentication null
Syntax Description
message-digest null Optional. Specifies the message-digest authentication type. Optional. Specifies for no authentication to be used.
Default Values
By default, this is set to null (meaning no authentication is used).
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example specifies that no authentication will be used on the loopback interface: (config)#interface loopback 1 (config-loop 1)#ip ospf authentication null
60000CRG0-35B
2146
ip ospf network
Use the ip ospf network command to specify the type of network on this interface. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf network broadcast ip ospf network point-to-point
Syntax Description
broadcast point-to-point Sets the network type for broadcast. Sets the network type for point-to-point.
Default Values
By default, Ethernet defaults to broadcast. Point-to-Point Protocol (PPP) and Frame Relay default to point-to-point.
Command History
Release 3.1 Command was introduced.
Functional Notes
A point-to-point network will not elect designated routers.
Usage Examples
The following example designates a broadcast network type: (config)#interface loopback 1 (config-loop 1)#ip ospf network broadcast
60000CRG0-35B
2147
ip pim sparse-mode
Use the ip pim sparse-mode command to enable protocol-independent multicast (PIM) sparse mode for this interface. Use the no form of this command to disable PIM sparse mode. Syntax Description
No subcommands.
Default Values
By default, PIM sparse mode for this interface is disabled.
Command History
Release 11.1 Command was introduced.
Functional Notes
PIM sparse mode is a multicast routing protocol that makes use of the unicast forwarding table. It builds unidirectional shared trees rooted at a rendezvous point (RP) for a multicast group or a shortest-path tree rooted at a specific source for a multicast group.
Usage Examples
The following example enables PIM sparse mode on the interface: (config)#interface loopback 1 (config-loop 1)#ip pim sparse-mode
60000CRG0-35B
2148
Default Values
By default, the priority of all protocol-independent multicast (PIM) interfaces is 1.
Command History
Release 11.1 Command was introduced.
Functional Notes
Interfaces advertise their configured priority values in the hello messages transmitted on the interface. Routers use the priority values to determine the appropriate DR. The router on the network segment with the highest priority is selected as the DR. If a hello message is received on the interface from a router on the network segment and it does not contain a priority, the entire network segment defaults to DR selection based on IP addresses instead of priority. In this instance, the DR is selected as the router on the network segment that has the highest IP address. AOS will always include a priority in all transmitted hello messages. If no priority is specifically designated by the user, the priority is set as the default of 1.
Usage Examples
The following example specifies a priority of 100 on the loopback 1 interface: (config)#interface loopback 1 (config-loop 1)#ip pim-sparse dr-priority 100
60000CRG0-35B
2149
Default Values
By default, the hellos are transmitted on PIM interfaces every 60 seconds.
Command History
Release 11.1 Command was introduced.
Functional Notes
Hello messages are used to inform neighbors of a routers presence. Hello messages normally generate a small amount of traffic on an interface. Setting the hello-timer to a small interval increases the number of hellos sent (thus increasing the amount of traffic). Set the hello-timer to a reasonable value, taking into consideration the bandwidth available on the interface.
Usage Examples
The following example specifies hellos be sent on the loopback 1 interface every 3600 seconds: (config)#interface loopback 1 (config-loop 1)#ip pim-sparse hello-timer 3600
60000CRG0-35B
2150
Default Values
By default, the PIM sparse neighbor timeout is set to 105 seconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the nbr-timeout to 300 seconds: (config)#interface loopback 1 (config-loop 1)#ip pim-sparse nbr-timeout 300
60000CRG0-35B
2151
Default Values
By default, the override interval is set to 2500 milliseconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the override interval to 3000 milliseconds: (config)#interface loopback 1 (config-loop 1)#ip pim-sparse override-interval 3000
60000CRG0-35B
2152
Default Values
By default, the propagation delay is set to 500 milliseconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the propagation delay to 300 milliseconds: (config)#interface loopback 1 (config-loop 1)#ip pim-sparse propagation-delay 300
60000CRG0-35B
2153
Default Values
By default, no policy route map is assigned to this interface.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example assigns the policy route map policy1 to the interface: (config)#interface loopback 1 (config-loop 1)#ip policy route-map policy1
60000CRG0-35B
2154
ip proxy-arp
Use the ip proxy-arp command to enable proxy Address Resolution Protocol (ARP) on the interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, proxy ARP is enabled.
Command History
Release 1.1 Command was introduced.
Functional Notes
In general, the principle of proxy ARP allows a router to insert its IP address in the source IP address field of a packet (if the packet is from a host on one of its subnetworks). This allows hosts to reach devices on other subnetworks without implementing routing or specifying a default gateway. If proxy-arp is enabled, AOS will respond to all proxy-arp requests with its specified medium access control (MAC) address and forward packets accordingly. Enabling proxy-arp on an interface may introduce unnecessary ARP traffic on the network.
Usage Examples
The following example enables proxy ARP on the loopback interface: (config)#interface loopback 1 (config-loop 1)#ip proxy-arp
60000CRG0-35B
2155
Syntax Description
1 2 Accepts only received RIP version 1 packets on the interface. Accepts only received RIP version 2 packets on the interface.
Default Values
By default, all interfaces implement RIP version 1 (the default value for the version command).
Command History
Release 1.1 Command was introduced.
Functional Notes
Use the ip rip receive version to specify a RIP version that overrides the version (in the Router RIP) configuration. AOS only accepts one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the loopback interface to accept only RIP version 2 packets: (config)#interface loopback 1 (config-loop 1)#ip rip receive version 2
60000CRG0-35B
2156
Syntax Description
1 2 Transmits only RIP version 1 packets on the interface. Transmits only RIP version 2 packets on the interface.
Default Values
By default, all interfaces transmit RIP version 1 (the default value for the version command).
Command History
Release 1.1 Command was introduced.
Functional Notes
Use the ip rip send version to specify a RIP version that overrides the version (in the Router RIP) configuration. AOS only transmits one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the loopback interface to transmit only RIP version 2 packets: (config)#interface loopback 1 (config-loop 1)#ip rip send version 2
60000CRG0-35B
2157
Default Values
By default, no manual summarization is applied by RIP.
Command History
Release 12.1 Command was introduced.
Functional Notes
Unlike the automatic summarization on classful network boundaries, only specific network advertisements are made by RIP using the ip rip summary-address command. This command is only effective if RIP version 2 is configured.
Usage Examples
The following example enables manual summarization on the specified IP address: (config)#interface loopback 1 (config-loop 1)#ip rip summary-address 10.10.123.0 255.255.255.0
60000CRG0-35B
2158
ip route-cache
Use the ip route-cache command to enable fast-cache switching on the interface. Use the no form of this command to disable fast-cache switching and return to process switching mode. Using network address translation (NAT) or the AOS firewall capabilities on an interface requires process switching mode (using the no ip route-cache command).
Syntax Description
No subcommands.
Default Values
By default, fast-cache switching is enabled on all Ethernet and virtual Frame Relay subinterfaces. IP route-cache is enabled for all virtual Point-to-Point Protocol (PPP) interfaces.
Command History
Release 2.1 Command was introduced.
Functional Notes
Fast switching allows an IP interface to provide optimum performance when processing IP traffic.
Usage Examples
The following example enables fast switching on the loopback interface: (config)#interface loopback 1 (config-loop 1)#ip route-cache
60000CRG0-35B
2159
ip unnumbered <interface>
Use the ip unnumbered command to use the IP address assigned to the specified interface for all IP processing on the active interface. Use the no form of this command to remove the unnumbered configuration. Syntax Description
<interface> Specifies an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type ip unnumbered ? for a complete list of valid interfaces.
Default Values
By default, all interfaces are configured to use a specified IP address (using the ip address command).
Command History
Release 1.1 Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the demand interfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
Functional Notes
If ip unnumbered is enabled on an interface, all IP traffic from the interface will use a source IP address taken from the specified interface. For example, specifying ip unnumbered ppp 1 while in the Ethernet Interface Configuration mode configures the Ethernet interface to use the IP address assigned to the Point-to-Point Protocol (PPP) interface for all IP processing. In addition, AOS uses the specified interface information when sending route updates over the unnumbered interface.
Usage Examples
The following example configures the loopback interface (labeled loop 1) to use the IP address assigned to the PPP interface (ppp 1): (config)#interface loopback 1 (config-loop 1)#ip unnumbered ppp 1
60000CRG0-35B
2160
ip urlfilter <name>
Use the ip urlfilter command to apply a universal resource locator (URL) filter to the interface for all inbound or outbound traffic. Use the no form of this command to remove the URL filter from an interface. Variations of this command include:
ip urlfilter <name> in ip urlfilter <name> out
Syntax Description
<name> in out Specifies the URL filter name to use on the interface. Applies the filter to the inbound traffic. Applies the filter to the outbound traffic.
Default Values
By default, there are no URL filters applied to any interfaces.
Command History
Release 12.1 Release 14.1 Command was introduced. Command was expanded to include the virtual local area network (VLAN) interfaces.
Functional Notes
The firewall must be enabled using the ip firewall command in order to use URL filters. The URL filter must be created by using the ip urlfilter <name> http command before applying it to the interface. Refer to ip urlfilter <name> http on page 1090 for more information on using this command.
Usage Examples
The following example performs URL filtering on all traffic entering through the loopback interface (labeled loop 1) and matches the URL filter named MyFilter: (config)#interface loopback 1 (config-loop 1)#ip urlfilter MyFilter in
60000CRG0-35B
2161
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface loopback 1 (config-loop 1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2162
rtp quality-monitoring
Use the rtp quality-monitoring command to enable voice quality monitoring (VQM) of the Realtime Transport Protocol (RTP) voice stream packets on this interface. If the global command (ip rtp quality-monitoring) is disabled when this command is issued, the system will return the following warning: Applied but not used, you must globally enable ip rtp quality-monitoring to use VQM. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, VQM is enabled on all wide area network (WAN) and local area network (LAN) interfaces.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables RTP quality monitoring on the loopback interface: (config)#interface loopback 1 (config-loop 1)#rtp quality-monitoring
60000CRG0-35B
2163
snmp trap
Use the snmp trap command to enable all supported Simple Network Management Protocol (SNMP) traps on the interface. Use the no form of this command to disable this trap. Syntax Description
No subcommands.
Default Values
By default, all interfaces (except virtual Frame Relay interfaces and subinterfaces) have SNMP traps enabled.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 8.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the port channel and virtual local area network (VLAN) interfaces. Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the tunnel interface.
Usage Examples
The following example enables SNMP capability on the loopback interface: (config)#interface loopback 1 (config-loop 1)#snmp trap
60000CRG0-35B
2164
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Release 17.2 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI) Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface. Command was expanded to the cellular interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the loopback interface: (config)#interface loopback 1 (config-loop 1)#no snmp trap link-status
60000CRG0-35B
2165
Keep in mind that changing an interfaces VRF association will clear all IP-related settings on that interface. Syntax Description
<name> Specifies the name of the VRF to which to assign the interface.
Default Values
By default, interfaces are associated with the default VRF that is unnumbered.
Command History
Release 16.1 Release 17.8 Command was introduced. The keyword ip was removed from this command.
Functional Notes
VRF instances must be created first before an interface can be assigned. An interface can only be assigned to one VRF, but multiple interfaces can be assigned to the same VRF. An interface will only forward IP traffic that matches its associated VRF. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured.
Usage Examples
The following example assigns the loopback interface to the VRF instance named RED: (config)#interface loopback 1 (config-loop 1)#vrf forwarding RED
60000CRG0-35B
2166
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. arp arpa on page 2168 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2169 lldp receive on page 2170 lldp send on page 2171 qos on page 2173 snmp trap on page 2174 snmp trap link-status on page 2175 spanning tree commands begin on page 2176 storm-control action shutdown on page 2182 storm-control on page 2183 switchport commands begin on page 2185
60000CRG0-35B
2167
arp arpa
Use the arp arpa command to set ARPA as the standard Address Resolution Protocol (ARP) on this interface. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
The default for this command is arpa.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example enables standard ARP for the port channel interface: (config)#interface port-channel 1 (config-p-chan1)#arp arpa
60000CRG0-35B
2168
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface port-channel 1 (config-p-chan1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2169
lldp receive
Use the lldp receive command to allow Link Layer Discovery Protocol (LLDP) packets to be received on this interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, all interfaces are configured to send and receive LLDP packets.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example configures the port channel interface to receive LLDP packets: (config)#interface port-channel 1 (config-p-chan1)#lldp receive
60000CRG0-35B
2170
lldp send
Use the lldp send command to configure this interface to transmit Link Layer Discovery Protocol (LLDP) packets or to control the types of information contained in the LLDP packets transmitted by this interface. Use the no form of this command to disable this feature. Variations of this command include:
lldp send management-address lldp send port-description lldp send system-capabilities lldp send system-description lldp send system-name lldp send-and-receive
Syntax Description
management-address port-description system-capabilities system-description system-name and-receive Enables transmission of management address information on this interface. Enables transmission of port description information on this interface. Enables transmission of this devices system capabilities on this interface. Enables transmission of this devices system description on this interface. Enables transmission of this devices system name on this interface. Configures this interface to both transmit and receive LLDP packets.
Default Values
By default, all interfaces are configured to transmit and receive LLDP packets of all types.
Command History
Release 9.1 Command was introduced.
Functional Notes
Individual LLDP information can be enabled or disabled using the various forms of the lldp send command. For example, use the lldp send-and-receive command to enable transmit and receive of all LLDP information. Then use the no lldp send port-description command to prevent LLDP from transmitting port description information.
60000CRG0-35B
2171
Usage Examples
The following example configures the port channel interface to transmit LLDP packets containing all enabled information types: (config)#interface port-channel 1 (config-p-chan1)#lldp send The following example configures the port channel interface to transmit and receive LLDP packets containing all information types: (config)#interface port-channel 1 (config-p-chan1)#lldp send-and-receive
60000CRG0-35B
2172
qos
Use the qos command to set the interface to the trusted state and to set the default class of service (CoS) value. Use the no form of this command to return to the default setting. Variations of this command include:
qos default-cos <value> qos trust cos
Syntax Description
default-cos <value> trust cos Sets the default CoS value for untrusted ports and all untagged packets. Range is 0 to 7. Sets the interface to the trusted state.
Default Values
By default, the interface is untrusted with a default CoS of 0.
Command History
Release 5.1 Command was introduced.
Functional Notes
Set the interface to trust cos if received 802.1P. CoS values are considered valid (i.e., no need to reclassify) and do not need to be tagged with the default value. When set to untrusted, the default-cos value for the interface is used.
Usage Examples
The following example sets port channel 1 as a trusted interface and assigns untagged packets a CoS value of 1: (config)#interface port-channel 1 (config-p-chan1)#qos trust cos (config-p-chan1)#qos default-cos 1
60000CRG0-35B
2173
snmp trap
Use the snmp trap command to enable all supported Simple Network Management Protocol (SNMP) traps on the interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, all interfaces (except virtual Frame Relay interfaces and subinterfaces) have SNMP traps enabled.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 8.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the port channel and virtual local area network (VLAN) interfaces. Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the tunnel interface.
Usage Examples
The following example enables SNMP capability on the port channel interface: (config)#interface port-channel 1 (config-p-chan1)#snmp trap
60000CRG0-35B
2174
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Release 17.2 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface. Command was expanded to the cellular interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the port channel interface: (config)#interface port-channel 1 (config-p-chan1)#no snmp trap link-status
60000CRG0-35B
2175
spanning-tree bpdufilter
Use the spanning-tree bpdufilter command to enable or disable the bridge protocol data unit (BPDU) filter on a specific interface. This setting overrides the related global setting (refer to spanning-tree edgeport default on page 1230). Use the no form of this command to return to the default setting. Variations of this command include:
spanning-tree bpdufilter disable spanning-tree bpdufilter enable
Syntax Description
disable enable Disables BPDU filter for this interface. Enables BPDU filter for this interface.
Default Values
By default, this setting is disabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
The bpdufilter blocks any BPDUs from being transmitted and received on an interface.
Usage Examples
The following example enables the BPDU filter on the port channel interface: (config)#interface port-channel 3 (config-p-chan3)#spanning-tree bpdufilter enable The BPDU filter can be disabled on port channel 3 by issuing the following commands: (config)#interface port-channel 3 (config-p-chan3)#spanning-tree bpdufilter disable
60000CRG0-35B
2176
spanning-tree bpduguard
Use the spanning-tree bpduguard command to enable or disable the bridge protocol data unit (BPDU) guard on a specific interface. This setting overrides the related global setting (refer to spanning-tree edgeport default on page 1230). Use the no form of this command to return to the default setting. Variations of this command include:
spanning-tree bpduguard disable spanning-tree bpduguard enable
Syntax Description
disable enable Disables BPDU guard for this interface. Enables BPDU guard for this interface.
Default Values
By default, this setting is disabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
The bpduguard blocks any BPDUs from being received on an interface.
Usage Examples
The following example enables the BPDU guard on the port channel interface: (config)#interface port-channel 3 (config-p-chan3)#spanning-tree bpduguard enable The BPDU guard can be disabled on port channel 3 by issuing the following commands: (config)#interface port-channel 3 (config-p-chan3)#spanning-tree bpduguard disable
60000CRG0-35B
2177
Default Values
By default, the cost value is set to 1000/(link speed in Mbps).
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example sets the interface to a path cost of 1200: (config)#interface port-channel 3 (config-p-chan3)#spanning-tree cost 1200
60000CRG0-35B
2178
spanning-tree edgeport
Use the spanning-tree edgeport command to configure the interface to be an edgeport. This command overrides the global setting (refer to spanning-tree edgeport default on page 1230). Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, this setting is disabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
Enabling this command configures the interface to go to a forwarding state when the link goes up.
Usage Examples
The following example configures the interface to be an edgeport: (config)#interface port-channel 1 (config-p-chan1)#spanning-tree edgeport An individual interface can be configured to not be considered an edgeport. For example: (config)#interface port-channel 1 (config-p-chan1)#spanning-tree edgeport disable or (config)#interface port-channel 1 (config-p-chan1)#no spanning-tree edgeport
60000CRG0-35B
2179
spanning-tree link-type
Use the spanning-tree link-type command to configure the spanning tree protocol link type for each interface. Use the no form of this command to return to the default setting. Variations of this command include:
spanning-tree link-type auto spanning-tree link-type point-to-point spanning-tree link-type shared
Syntax Description
auto point-to-point shared Determines link type by the ports duplex settings. Manually sets link type to point-to-point regardless of duplex settings. Manually sets link type to shared regardless of duplex settings.
Default Values
By default, the interface is set to auto.
Command History
Release 5.1 Command was introduced.
Functional Notes
This command overrides the default link type setting determined by the duplex of the individual port. By default, a port configured for half-duplex is set to shared link type, and a port configured for full-duplex is set to point-to-point link type. Setting the link type manually overrides the default and forces the port to use the specified link type. Use the link-type auto command to restore the convention of determining link type based on duplex settings.
Usage Examples
The following example forces the link type to point-to-point, even if the port is configured to be half-duplex: (config)#interface port-channel 1 (config-p-chan1)#spanning-tree link-type point-to-point
Technology Review
Rapid transitions are possible in Rapid Spanning Tree Protocol (RSTP) by taking advantage of point-to-point links (a port is connected to exactly one other bridge) and edge-port connections (a port is not connected to any additional bridges). Setting the link type to point-to-point allows a half-duplex link to act as if it were a point-to-point link.
60000CRG0-35B
2180
Default Values
By default, the spanning-tree port-priority is set to 128.
Command History
Release 5.1 Command was introduced.
Functional Notes
The only time that this priority level is used is when two interfaces with a path to the root have equal cost. At that point, the level set in this command will determine which port the spanning tree will use. Set the priority value lower to increase the chance the interface will be used.
Usage Examples
The following example sets the interface to a priority of 96: (config)#interface port-channel 4 (config-p-chan4)#spanning-tree port-priority 96
60000CRG0-35B
2181
Default Values
By default, this command is disabled; the interface will only filter traffic.
Command History
Release 5.1 Command was introduced.
Functional Notes
Enabling this option shuts down the interface if a multicast, unicast, or broadcast storm occurs.
Usage Examples
The following example shuts down the port channel interface if a storm is detected: (config)#interface port-channel 1 (config-p-chan1)#storm-control action shutdown
60000CRG0-35B
2182
storm-control
Use the storm-control command to configure limits on the rates of broadcast, multicast, and unicast traffic on a port. Use the no form of this command to disable this feature. Variations of this command include:
storm-control broadcast level <rising level> storm-control broadcast level <rising level> <falling level> storm-control multicast level <rising level> storm-control multicast level <rising level> <falling level> storm-control unicast level <rising level> storm-control unicast level <rising level> <falling level>
Syntax Description
broadcast level multicast level unicast level <rising level> Sets levels for broadcast traffic. Sets levels for multicast traffic. Sets levels for unicast traffic. Specifies a rising level which determines the percentage of total bandwidth the port accepts before it begins blocking packets. Range is 1 to 100 percent. Optional. Specifies a falling level which determines when the storm is considered over, causing AOS to no longer block packets. This level must be less than the rising level. Range is 1 to 100 percent.
<falling level>
Default Values
By default, storm-control is disabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
This setting configures the rising and falling suppression values. When the selected rising level (which is a percentage of total bandwidth) is reached, the port begins blocking packets of the specified type (i.e., broadcast, multicast, or unicast). AOS uses the rising level as its falling level if no falling level is specified.
60000CRG0-35B
2183
Usage Examples
The following example sets the rising suppression level to 85 percent for multicast packets: (config)#interface port-channel 1 (config-p-chan1)#storm-control multicast level 85 The following example sets the rising suppression level to 80 percent for broadcast packets, with a falling level of 50 percent: (config)#interface port-channel 1 (config-p-chan1)#storm-control broadcast level 80 50
60000CRG0-35B
2184
Default Values
By default, this is set to VLAN 1 (the default VLAN).
Command History
Release 5.1 Command was introduced.
Functional Notes
If the port is in the trunk mode, this command will not alter the switchport mode to access. Instead, it will save the value to be applied when the port does switch to access mode. Refer to switchport mode on page 2187 for more information.
Usage Examples
The following example sets the switchport mode to static access, and makes the port channel 1 a member of VLAN 2: (config)#interface port-channel 1 (config-p-chan1)#switchport mode access (config-p-chan1)#switchport access vlan 2
60000CRG0-35B
2185
switchport gvrp
Use the switchport gvrp command to enable GARP VLAN Registration Protocol (GVRP) on an interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, GVRP is disabled on all ports.
Command History
Release 8.1 Command was introduced.
Functional Notes
Enabling GVRP on any interface enables GVRP globally.
Usage Examples
The following example enables GVRP on port channel 3: (config)#interface port-channel 3 (config-p-chan3)#switchport gvrp
60000CRG0-35B
2186
switchport mode
Use the switchport mode command to configure the virtual local area network (VLAN) membership mode. To reset membership mode to the default value, use the no form of this command. Variations of this command include:
switchport mode access switchport mode trunk
Syntax Description
access trunk Sets port to be a single (nontrunked) port that transmits and receives no tagged packets. Sets port to transmit and receive packets on all VLANs included within its VLAN allowed list.
Default Values
By default, this is set to access.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example sets the port to be a trunk port: (config)#interface port-channel 1 (config-p-chan1)#switchport mode trunk
60000CRG0-35B
2187
Syntax Description
add all except remove <list> Adds the specified VLAN IDs to the VLAN trunking allowed list. Adds all configured VLAN IDs to the VLAN trunking allowed list. Adds all configured VLAN IDs to the VLAN trunking allowed list except those specified in the VLAN ID list. Removes VLAN IDs from the VLAN trunking allowed list. Specifies a list of valid VLAN interface IDs. Refer to Functional Notes below for additional syntax considerations.
Default Values
By default, all valid VLANs are allowed.
Command History
Release 5.1 Command was introduced.
Functional Notes
A VLAN list is a set of VLAN IDs. A valid VLAN ID value must be from 1 to 4094 (inclusive). Each VLAN ID in a list is delimited by commas, yet a range of IDs may be expressed as a single element by using a hyphen between endpoints. For example, the VLAN ID range 1,2,3,4,6,7,8,9,500 may be more easily expressed as 1-4,6-9,500. No spaces are allowed in a valid ID range.
Usage Examples
The following example adds VLANs to the previously existing list of VLANs allowed to transmit and receive on this port: (config)#interface port-channel 1 (config-p-chan1)#switchport trunk allowed vlan add 1-4,6-9,500
60000CRG0-35B
2188
Syntax Description
add all except none remove <list> Adds VLANs to the VLAN GVRP trunking fixed list. Adds all VLANs to the VLAN GVRP trunking fixed list. Adds all VLAN IDs to the VLAN trunking fixed list except those in the command line VLAN ID list. Removes all VLANs from the VLAN GVRP trunking fixed list. Removes VLAN from the VLAN trunking fixed list. Specifies a list of valid VLAN interface IDs. Refer to Functional Notes below for additional syntax considerations.
Default Values
By default, no VLANs are in the VLAN GVRP trunking fixed list (switchport trunk fixed vlan none).
Command History
Release 8.1 Command was introduced.
Functional Notes
This command has no effect on VLAN membership configuration unless GVRP is enabled on the interface. Refer to gvrp on page 890 for information on enabling GVRP. A VLAN list is a set of VLAN IDs. A valid VLAN ID value must be from 1 to 4094 (inclusive). Each VLAN ID in a list is delimited by commas, yet a range of IDs may be expressed as a single element by using a hyphen between endpoints. For example, the VLAN ID range 1,2,3,4,6,7,8,9,500 may be more easily expressed as 1-4,6-9,500. No spaces are allowed in a valid ID range.
60000CRG0-35B
2189
Usage Examples
The following example changes the configured list of fixed VLANs by adding VLAN 50 to the list: (config-p-chan1)#switchport trunk fixed vlan add 1-15,25-30,40 (config-p-chan1)# (config-p-chan1)#switchport trunk fixed vlan add 50 (config-p-chan1)#
60000CRG0-35B
2190
Default Values
By default, switchport trunk native vlan is set to VLAN 1.
Command History
Release 5.1 Command was introduced.
Functional Notes
Configure which VLAN the interface uses as its native VLAN during trunking. Packets from this VLAN leaving the interface will not be tagged with the VLAN number. Any untagged packets received by the interface are considered a part of the native VLAN ID.
Usage Examples
The following example sets the native VLAN on port channel 1 to VLAN 2: (config)#interface port-channel 1 (config-p-chan1)#switchport trunk native vlan 2
60000CRG0-35B
2191
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. acfc accept-compressed on page 2194 alias link <text> on page 2195 bandwidth <value> on page 2196 bridge-group commands begin on page 2197 crypto map <name> on page 2199 dial-backup commands begin on page 2201 dynamic-dns on page 2217 fair-queue on page 2219 hold-queue <value> out on page 2220 ip commands begin on page 2221 ipv6 commands begin on page 2260 keepalive <value> on page 2283 lldp receive on page 2284 lldp send on page 2285 max-reserved-bandwidth <value> on page 2287 media-gateway ip on page 2288 peer default ip address <ipv4 address> on page 2289 peer default ipv6 interface-id <interface id> on page 2290 ppp commands begin on page 2291
60000CRG0-35B
2192
pppoe ac-name <name> on page 2302 pppoe service-name <name> on page 2303 qos-policy on page 2304 rtp quality-monitoring on page 2306 snmp trap link-status on page 2307 username <username> password <password> on page 2308 vrf forwarding <name> on page 2309
60000CRG0-35B
2193
acfc accept-compressed
Use the acfc accept-compressed command to enable accepting header compressed frames even if compression is not negotiated. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this feature is disabled.
Command History
Release 14.1 Command was introduced.
Usage Examples
The following example enables accepting compressed frames: (config)#interface ppp 1 (config-ppp 1)#acfc accept-compressed
60000CRG0-35B
2194
Default Values
By default, the PPP identification string appears as empty quotation marks ( ).
Command History
Release 1.1 Command was introduced.
Functional Notes
The alias link string should be used to uniquely identify a PPP link. Enter a string that clearly identifies the link.
Usage Examples
The following example defines a unique character string for the virtual PPP interface (1): (config)#interface ppp 1 (config-ppp 1)#alias link PPP_link_1
Technology Review
Please refer to RFC 1990 for a more detailed discussion on PPP links and bundles.
60000CRG0-35B
2195
bandwidth <value>
Use the bandwidth command to provide the bandwidth value of an interface to the higher level protocols. This value is used in cost calculations. Use the no form of this command to restore the default value. Syntax Description
<value> Specifies the bandwidth value in kbps. Range is 1 to 4294967295 kbps.
Default Values
To view the default values, use the show interfaces command.
Command History
Release 3.1 Command was introduced.
Functional Notes
The bandwidth command is an informational value that is communicated to the higher level protocols to be used in cost calculations. This is a routing parameter only and does not affect the physical interface.
Usage Examples
The following example sets bandwidth of the Point-to-Point Protocol (PPP) interface to 10 Mbps: (config)#interface ppp 1 (config-ppp 1)#bandwidth 10000
60000CRG0-35B
2196
bridge-group <number>
Use the bridge-group command to assign an interface to the specified bridge group. This command is supported on all Ethernet interfaces, Point-to-Point Protocol (PPP) virtual interfaces, and Frame Relay virtual subinterfaces. Use the no form of this command to remove an interface. Syntax Description
<number> Specifies the bridge group (by number) to which to assign this interface. Range is 1 to 255.
Default Values
By default, there are no configured bridge groups.
Command History
Release 1.1 Command was introduced.
Functional Notes
A bridged network can provide excellent traffic management to reduce collisions and limit the amount of bandwidth wasted with unnecessary transmissions when routing is not necessary. Any two interfaces can be bridged (Ethernet to T1 bridge, Ethernet to Frame Relay subinterface, etc.).
Usage Examples
The following example assigns the PPP interface to bridge-group 1: (config)#interface ppp 1 (config-ppp 1)#bridge-group 1
60000CRG0-35B
2197
Syntax Description
<number> Specifies the bridge group number. Valid range is 1 to 255.
Default Values
By default, VLAN tags are removed from the data.
Command History
Release 12.1 Release 14.1 Command was introduced. Command was expanded to include the high level data link control (HDLC) interface and Frame Relay subinterface.
Usage Examples
The following example prevents the removal of VLAN tags from the packets on the Point-to-Point Protocol (PPP) interface labeled 1: (config)#interface ppp 1 (config-ppp 1)#bridge-group 1 vlan-transparent
60000CRG0-35B
2198
For virtual private network (VPN) configuration example scripts, refer to the VPN configuration guide available on the AOS Documentation CD shipped with your product.
Syntax Description
<name> Assigns a crypto map name to the interface.
Default Values
By default, no crypto maps are assigned to an interface.
Command History
Release 4.1 Command was introduced.
Functional Notes
When configuring a system to use both the stateful inspection firewall and Internet key exchange (IKE) negotiation for VPN, keep the following notes in mind. When defining the policy class and associated access control lists (ACLs) that describe the behavior of the firewall, do not forget to include the traffic coming into the system over a VPN tunnel terminated by the system. The firewall should be set up with respect to the unencrypted traffic that is destined to be sent or received over the VPN tunnel. The following diagram represents typical AOS data-flow logic.
60000CRG0-35B
2199
IPSec Decrypt/Discard
IPSec Encrypt
NAT/ACP/ Firewall
Router
As shown in the diagram above, data coming into the product is first processed by the static filter associated with the interface on which the data is received. This access group is a true static filter and is available for use regardless of whether the firewall is enabled or disabled. Next (if the data is encrypted), it is sent to the IPSec engine for decryption. The decrypted data is then processed by the stateful inspection firewall. Therefore, given a terminating VPN tunnel, only unencrypted data is processed by the firewall. The ACLs for a crypto map on an interface work in reverse logic to the ACLs for a policy class on an interface. When specifying the ACLs for a crypto map, the source information is the private local side, unencrypted source of the data. The destination information will be the far-end, unencrypted destination of the data. However, ACLs for a policy class work in reverse. The source information for the ACL in a policy class is the far end. The destination information is the local side.
Usage Examples
The following example applies all crypto maps with the name MyMap to the Point-to-Point Protocol (PPP) interface: (config)#interface ppp 1 (config-ppp 1)#crypto map MyMap
60000CRG0-35B
2200
dial-backup auto-backup
Use the dial-backup auto-backup command to configure the interface to automatically attempt a dial backup upon failure. Use the no form of this command to disable this feature. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of dial-backup call-mode on page 2204. Syntax Description
No subcommands.
Default Values
By default, all backup endpoints will automatically attempt dial backup upon a failure.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example enables automatic dial backup on the endpoint: (config)#interface ppp 1 (config-ppp 1)#dial-backup auto-backup
60000CRG0-35B
2201
dial-backup auto-restore
Use the dial-backup auto-restore command to configure the interface to automatically discontinue dial backup when all network conditions are operational. Use the no form of this command to disable the auto-restore feature. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of dial-backup call-mode on page 2204. Syntax Description
No subcommands.
Default Values
By default, all backup endpoints will automatically restore the primary connection when the failure condition clears.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to automatically restore the primary connection when the failure condition clears: (config)#interface ppp 1 (config-ppp 1)#dial-backup auto-restore
60000CRG0-35B
2202
Default Values
By default, the dial-backup backup-delay period is set to 10 seconds.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to wait 60 seconds (on an endpoint with an active alarm condition) before attempting dial-backup operation: (config)#interface ppp 1 (config-ppp 1)#dial-backup backup-delay 60
60000CRG0-35B
2203
dial-backup call-mode
Use the dial-backup call-mode command to specify whether the configured backup interface answers or originates (or a combination of both) backup calls. Use the no form of this command to return to the default value. Variations of this command include:
dial-backup call-mode answer dial-backup call-mode answer-always dial-backup call-mode originate dial-backup call-mode originate-answer dial-backup call-mode originate-answer-always
Syntax Description
answer answer-always originate originate-answer originate-answer-always Answers and backs up primary link on failure. Answers and backs up regardless of primary link state. Originates backup call on primary link failure. Originates or answers call on primary link failure. Originates on failure; answers and backs up always.
Default Values
By default, the dial-backup call-mode is set to originate-answer.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Functional Notes
The majority of the configuration for AOS dial-backup implementation is configured via the dial-backup PPP interface configuration commands. However, the numbers dialed are configured in the primary interface. Full sample configurations follow: Sample configuration for remote router (dialing out) hostname Remote3200 enable password adtran ! interface eth 0/1 ip address 192.168.1.254 255.255.255.0 no shutdown ! interface modem 1/3 no shutdown ! interface t1 1/1
60000CRG0-35B
2204
Command Reference Guide coding b8zs framing esf clock source line tdm-group 1 timeslots 1-24 no shutdown ! interface fr 1 point-to-point frame-relay lmi-type ansi no shutdown cross-connect 1 t1 1/1 1 fr 1 ! interface fr 1.16 point-to-point frame-relay interface-dlci 16 ip address 10.1.1.2 255.255.255.252 dial-backup call-mode originate dial-backup number 5551111 analog ppp1 dial-backup number 5552222 analog ppp1 no shutdown ! interface ppp 1 ip address 172.22.56.1 255.255.255.252 ppp authentication chap username remoter outer password remotepass ppp chap hostname localrouter ppp chap password adtran no shutdown ! ip route 192.168.2.0 255.255.255.0 172.22.56.2 255.255.255.252 ! line telnet 0 4 password password Sample configuration for central router (dialing in) hostname Central3200 enable password adtran ! interface eth 0/1 ip address 192.168.100.254 255.255.255.0 no shutdown ! interface modem 1/3 no shutdown ! interface t1 1/1 coding b8zs framing esf clock source line
60000CRG0-35B
2205
Command Reference Guide tdm-group 1 timeslots 1-24 no shutdown ! interface fr 1 point-to-point frame-relay lmi-type ansi no shutdown cross-connect 1 t1 1/1 1 fr 1 ! interface fr 1.100 point-to-point frame-relay interface-dlci 100 ip address 10.1.1.1 255.255.255.252 dial-backup call-mode answer dial-backup number 555-8888 analog ppp 1 ! interface ppp 1 ip address 172.22.56.2 255.255.255.252 ppp authentication chap username localrouter password adtran ppp chap hostname remoterouter ppp chap password remotepass no shutdown ! ip route 192.168.1.0 255.255.255.0 172.22.56.1 255.255.255.252 line telnet 0 4 password password
Usage Examples
The following example configures AOS to generate backup calls for this endpoint using an analog modem interface (to phone number 555 1111), but never answer calls and specifies ppp 2 as the backup interface: (config)#interface ppp 1 (config-ppp 1)#dial-backup call-mode originate (config-ppp 1)#dial-backup number 555 1111 analog ppp 2
60000CRG0-35B
2206
Technology Review
This technology review provides information regarding specific dial-backup router behavior (i.e., when the router will perform dial backup, where in the configuration AOS accesses specific routing information, etc.): Dialing Out 1. AOS determines to place an outbound call when either the Layer 1 or Layer 2 has a failure. 2. When placing outbound calls, AOS matches the number dialed to a PPP interface. This is accomplished with an addition to the dial-backup number command (refer to dial-backup number <number> on page 2211). 3. When placing the call, AOS uses the configuration of the related PPP interface for authentication and IP negotiation. 4. If the call fails to connect on the first number dialed, AOS places a call to the second number (if a second number is configured). The second number to be dialed references a separate PPP interface. Dialing In 1. AOS receives an inbound call on a physical interface. 2. Caller ID is used to match the dial-backup number command to the configured PPP interface. 3. If a match is found, the call connects and AOS pulls down the primary connection if it is not already in a down state. 4. If no match is found from caller ID, the call is terminated.
60000CRG0-35B
2207
Default Values
By default, the dial-backup connect-timeout period is set to 60 seconds.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to wait 120 seconds before retrying a failed dial-backup call: (config)#interface ppp 1 (config-ppp 1)#dial-backup connect-timeout 120
60000CRG0-35B
2208
dial-backup force
Use the dial-backup force command to manually override the automatic dial-backup feature. This can be used to force a link into backup to allow maintenance to be performed on the primary link without disrupting data. Use the no form of this command to return to the normal dial-backup operation state. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 2204. Variations of this command include:
dial-backup force backup dial-backup force primary
Syntax Description
backup primary Forces backup regardless of primary link state. Forces primary link regardless of its state.
Default Values
By default, this feature is disabled.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to force this interface into dial backup: (config)#interface ppp 1 (config-ppp 1)#dial-backup force backup
60000CRG0-35B
2209
Default Values
By default, dial-backup maximum-retry is set to 0 attempts.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to retry a dial-backup call four times before considering backup operation not available: (config)#interface ppp 1 (config-ppp 1)#dial-backup maximum-retry 4
60000CRG0-35B
2210
Syntax Description
<number> analog digital-56k digital-64k <isdn min chan> <isdn max chan> ppp <interface> Specifies the phone numbers to call when the backup is initiated. Indicates the number connects to an analog modem. Indicates the number belongs to a digital 56 kbps per DS0 connection. Indicates the number belongs to a digital 64 kbps per DS0 connection. Specifies the minimum number of DS0s required for a digital 56 or 64 kbps connection. Range is 1 to 24 DS0s. Specifies the maximum number of DS0s desired for a digital 56 or 64 kbps connection. Range is 1 to 24 DS0s. Specifies the Point-to-Point Protocol (PPP) interface to use as the backup for this interface (for example, ppp 1).
Default Values
By default, there are no configured dial-backup numbers.
Command History
Release 1.1 Release 5.1 Release 17.2 Release 17.3 Command was introduced. Command was expanded to include the PPP interface. Command was expanded to include the cellular connections. Cellular connections were removed from this command.
Usage Examples
The following example configures AOS to dial 704-555-1212 (digital 64 kbps connection) to initiate dial-backup operation for this endpoint using interface ppp 3 backup interface: (config)#interface ppp 1 (config-ppp 1)#dial-backup number 7045551212 digital-64k 1 1 ppp 3
60000CRG0-35B
2211
Default Values
By default, dial-backup priority is set to 50.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example assigns the highest priority to this endpoint: (config)#interface ppp 1 (config-ppp 1)#dial-backup priority 100
60000CRG0-35B
2212
dial-backup randomize-timers
Use the dial-backup randomize-timers command to randomize the call timers to minimize potential contention for resources. Use the no form of this command to return to the default value. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 2204. Syntax Description
No subcommands.
Default Values
By default, AOS does not randomize the dial-backup call timers.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to randomize the dial-backup timers associated with this endpoint: (config)#interface ppp 1 (config-ppp 1)#dial-backup randomize-timers
60000CRG0-35B
2213
Default Values
By default, dial-backup redial-delay is set to 10 seconds.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures a redial delay of 25 seconds on this endpoint: (config)#interface ppp 1 (config-ppp 1)#dial-backup redial-delay 25
60000CRG0-35B
2214
Default Values
By default, dial-backup restore-delay is set to 10 seconds.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to wait 30 seconds before disconnecting dial-backup operation and restoring the primary connection for this endpoint: (config)#interface ppp 1 (config-ppp 1)#dial-backup restore-delay 30
60000CRG0-35B
2215
dial-backup schedule
Use the dial-backup schedule command to set the time of day that backup will be enabled. Use this command if backup is desired only during normal business hours and on specific days of the week. Use the no form of this command to disable dial backup (as specified). For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 2204. Variations of this command include:
dial-backup schedule day <name> dial-backup schedule disable-time <value> dial-backup schedule enable-time <value>
Syntax Description
day <name> disable-time <value> enable-time <value> Sets the days to allow backup. Valid range is Monday through Sunday. Sets the time of day to disable backup. Time is entered in a 24-hour format (00:00). Sets the time of day to enable backup. Time is entered in a 24-hour format (00:00).
Default Values
By default, dial backup is enabled for all days and times if the dial-backup auto-backup command has been issued and the dial-backup schedule has not been entered.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example enables dial backup Monday through Friday 8:00 a.m. to 7:00 p.m.: (config)#interface ppp 1 (config-ppp 1)#dial-backup schedule enable-time 08:00 (config-ppp 1)#dial-backup schedule disable-time 19:00 (config-ppp 1)#no dial-backup schedule day Saturday (config-ppp 1)#no dial-backup schedule day Sunday
60000CRG0-35B
2216
dynamic-dns
Use the dynamic-dns command to configure Dynamic DNS service provided by Dynamic Network Services, Inc. (www.dyndns.org). Use the no form of this command to disable this feature. Variations of this command include:
dynamic-dns custom <hostname> <minutes> dynamic-dns dyndns <hostname> <username> <password> dynamic-dns dyndns-custom <hostname> <username> <password> dynamic-dns dyndns-static <hostname> <username> <password>
Syntax Description
<hostname> <minutes> Specifies the host name for the server that updates the dynamic domain naming system (DNS). Specifies the intervals in minutes to update the server with information (updates also occur when the interfaces IP address changes regardless of the update intervals). Specifies a user name using an alphanumerical string up to 30 characters in length (the user name is case sensitive). Specifies a password using an alphanumerical string up to 30 characters in length (the password is case sensitive). Refer to Functional Notes below for additional argument descriptions.
<username> <password>
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 12.1 Release 15.1 Command was introduced. Command was expanded. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
custom - Constanttime.coms Custom Dynamic DNSSM service allows you complete access and management control over your domain name regardless of where you purchased/registered it. This allows you to manage IP address mappings (A records), domain aliases (CNAME records), and mail servers (mail exchange (MX) records). dyndns - The Dynamic DNSSM offered by Dynamic Network Services, Inc. (DynDNS.org) allows you to alias a dynamic IP address to a static host name in various domains. This allows your unit to be more easily accessed from various locations on the Internet. This service is provided for up to five host names.
60000CRG0-35B
2217
dyndns-custom - DynDNS.org's Custom DNSSM service provides a full DNS solution, giving you complete control over an entire domain name. A Web-based interface provides two levels of control over your domain, catering to average or advanced users. Five globally redundant DNS servers ensure that your domain will always resolve. A choice of two interfaces is available. The basic interface is designed for most users. It comes preconfigured for most common configurations and allows for easy creation of most common record types. The advanced interface is designed for system administrators with a solid DNS background, and provides layout and functionality similar to a BIND zone file allowing for the creation of nearly any record type. Custom DNSSM can be used with both static and dynamic IPs, and has the same automatic update capability through Custom DNS-aware clients as Dynamic DNS. dyndns-static - The Static DNS service is similar to DynDNS.orgs Dynamic DNSSM service in that it allows a host name, such as yourname.dyndns.org, to point to your IP address. Unlike a Dynamic DNS host, a Static DNS host does not expire after 35 days without updates, but updates take longer to propagate through the DNS system. This service is provided for up to five host names. If your IP address does not change often or at all, but you still want an easy name to remember it by (without having to purchase your own domain name), Static DNS service is ideal for you. If you would like to use your own domain name (such as yourname.com), you need Custom DNS service that also provides full dynamic and static IP address support.
Usage Examples
The following example sets the Dynamic DNS to dyndns-custom with host name host, user name user, and password pass: (config)#interface ppp 1 (config-ppp 1)#dynamic-dns dyndns-custom host user pass
60000CRG0-35B
2218
fair-queue
Use the fair-queue command to enable weighted fair queuing (WFQ) on an interface. Use the no form of this command to disable WFQ and enable first in, first out (FIFO) queueing for an interface. Variations of this command include:
fair-queue fair-queue <threshold>
WFQ must be enabled on an interface to use priority queuing. By default, WFQ is enabled for all interfaces with maximum bandwidth speeds equivalent to T1/E1 and below.
Syntax Description
<threshold> Optional. Specifies the maximum number of packets that can be present in each conversation subqueue. Packets received for a conversation after this limit is reached are discarded. Range is 16 to 512 packets.
Default Values
By default, fair-queue is enabled with a threshold of 64 packets.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example enables WFQ on the interface with a threshold set at 100 packets: (config)#interface ppp 1 (config-ppp 1)#fair-queue 100
60000CRG0-35B
2219
Default Values
The default queue size for weighted fair queuing (WFQ) is 400. The default queue size for Point-to-Point Protocol (PPP) first in, first out (FIFO) and Frame Relay round-robin is 200.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example sets the overall output queue size to 700: (config)#interface ppp 1 (config-ppp 1)#hold-queue 700 out
60000CRG0-35B
2220
Syntax Description
<ipv4 acl name> in out Applies the named IPv4 ACL to the interface. Enables access control on IPv4 packets received on the specified interface. Enables access control on IPv4 packets transmitted on the specified interface.
Default Values
By default, these commands are disabled.
Command History
Release 3.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
When this command is enabled, the IPv4 destination address of each packet must be validated before being passed through. If the packet is not acceptable per these settings, it is dropped.
Usage Examples
The following example configures the router to only allow IPv4 Telnet traffic (as defined in the user-configured TelnetOnly ACL) into the PPP interface: (config)#ip access-list extended TelnetOnly (config-ext-nacl)#permit tcp any any eq telnet (config-ext-nacl)#interface ppp 1 (config-ppp 1)#ip access-group TelnetOnly in
60000CRG0-35B
2221
Default Values
By default, there are no configured IPv4 ACPs associated with an interface.
Command History
Release 2.1 Release 5.1 Release 6.1 Release 15.1 Release 17.9 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the virtual local area network (VLAN) interfaces. Command was expanded to include the bridged virtual interfaces (BVIs). Command was changed to require the ip keyword.
Functional Notes
To assign an IPv4 ACP to an interface, enter the interface configuration mode for the desired interface and enter ip access-policy <ipv4 acp name>.
Usage Examples
The following example associates the IPv4 ACP PRIVATE (to allow inbound IPv4 traffic to the Web server) to the PPP interface: Enable the AOS security features: (config)#ip firewall Associate the ACP with the PPP interface: (config)#interface ppp 1 (config-ppp 1)#ip access-policy PRIVATE
60000CRG0-35B
2222
ip address dhcp
Use the ip address dhcp command to use Dynamic Host Configuration Protocol (DHCP) to obtain an address on the interface. Use the no form of this command to remove a configured IP address (using DHCP) and disable DHCP operation on the interface. Variations of this command include:
ip address dhcp ip address dhcp <administrative distance> ip address dhcp track <name> ip address dhcp track <name> <administrative distance>
Syntax Description
<administrative distance> Optional. Specifies the administrative distance to use when adding the DHCP gateway into the route table. It is used to determine the best route when multiple routes to the same destination exist. The lower the administrative distance, the more reliable the route. Range is 1 to 255. Optional. Attaches a network monitoring track to the DHCP client. The DHCP gateway route for this client will only reside in the route table while the track is in the pass state. For more information on configuring track objects, refer to track <name> on page 1251.
track <name>
Default Values
By default, the administrative distance value is 1.
Command History
Release 2.1 Release 8.1 Release 13.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface. Command was expanded to include the track and administrative distance.
Usage Examples
The following example enables DHCP operation on the PPP interface 1: (config)#interface ppp 1 (config-ppp 1)#ip address dhcp The following example enables DHCP operation on the PPP interface 1 and sets the administrative distance as 5: (config)#interface ppp 1 (config-ppp 1)#ip address dhcp 5
60000CRG0-35B
2223
ip address negotiated
Use the ip address negotiated command to allow the interface to negotiate (i.e., be assigned) an IP address from the far-end Point-to-Point Protocol (PPP) connection. Use the no form of this command to disable the negotiation for an IP address. Variations of this command include:
ip address negotiated ip address negotiated <administrative distance> ip address negotiated <ip address> ip address negotiated <ip address> no-default ip address negotiated track <name> ip address negotiated track <name> <administrative distance>
Syntax Description
<administrative distance> Optional. Specifies the administrative distance to use when adding the PPP route to the route table. It is used to determine the best route when multiple routes to the same destination exist. The lower the administrative distance, the more reliable the route. Range is 1 to 255. Optional. Specifies a valid IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Prevents the insertion of a default route. Some systems already have a default route configured and need a static route to the PPP interface to function correctly. Optional. Attaches a network monitoring track to the PPP interface. The negotiated default route for this client will only reside in the route table while the track is in the pass state. For more information on configuring track objects, refer to track <name> on page 1251.
track <name>
Default Values
By default, the interface is not assigned an address. Also by default, the administrative distance value is 1.
Command History
Release 5.1 Release 13.1 Command was introduced. Command was expanded to include the track and administrative distance.
60000CRG0-35B
2224
Usage Examples
The following example enables the PPP interface to negotiate an IP address from the far-end connection: (config)#interface ppp 1 (config-ppp 1)#ip address negotiated The following example enables the PPP interface to negotiate an IP address from the far-end connection without inserting a default route: (config)#interface ppp 1 (config-ppp 1)#ip address negotiated no-default
60000CRG0-35B
2225
Syntax Description
<ipv4 address> <subnet mask> Specifies a valid IPv4 address. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IPv4 addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Optional. Configures a secondary IPv4 address for the specified interface.
secondary
Default Values
By default, there are no assigned IPv4 addresses.
Command History
Release 1.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
Use secondary IPv4 addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IPv4 addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IPv4 addresses on the secondary subnet.
Usage Examples
The following example configures a secondary IPv4 address of 192.22.72.101 /30: (config)#interface ppp 1 (config-ppp 1)#ip address 192.22.72.101 /30 secondary
60000CRG0-35B
2226
Default Values
By default, no IP address range is defined.
Command History
Release 17.4 Command was introduced.
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a range of secondary IP address from 192.22.72.1 to 192.22.72.10 on subnet 255.255.255.252: (config)#interface ppp 1 (config-ppp 1)#ip address range 192.22.72.1 192.22.72.10 255.255.255.252 secondary
60000CRG0-35B
2227
ip directed-broadcast
Use the ip directed-broadcast command to allow reception/forwarding of directed broadcasts. Use the no form of this command to disable this feature. Variations of this command include:
ip directed-broadcast ip directed-broadcast <name>
Syntax Description
<name> Specifies IP access control list (ACL) name.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Command was introduced.
Functional Notes
A directed broadcast is a packet intended for all nodes on a nonlocal network. For example, the broadcast address 255.255.255.255 reaches all nodes on a network; the directed broadcast address 128.1.255.255 is intended for all nodes whose network address is 128.1.0.0. A router not directly attached to 128.1.0.0 simply forwards the directed broadcast packet to the next hop. A router on network 128.1.0.0 that has ip directed-broadcast enabled, accepts and forwards the packet to all nodes whose network address is 128.1.0.0. Routers connecting subnets of 128.1.0.0 also accept and forward the packet to the nodes on their respective subnets. When a directed broadcast packet reaches a router that is directly connected to its destination subnet, that packet is distributed as a broadcast on the destination subnet. The packet is then sent as a link-layer broadcast. The ip directed-broadcast command controls the distribution of directed broadcasts when they reach their target subnets. Only the final transmission of the directed broadcast on its ultimate destination subnet is affected. It does not affect the transit unicast routing of IP directed broadcasts. If ip directed-broadcast is enabled for this interface, incoming IP packets whose addresses identify them as directed broadcasts intended for the subnet to which this interface is attached will be forwarded as broadcasts on that subnet. Forwarding of the packets can be limited by specifying an ACL with this command. In this case, only directed broadcasts that are permitted by the specified ACL will be forwarded, and all other directed broadcasts directed to this interface subnet will be dropped. Disabling the ip directed-broadcast command will cause directed broadcasts destined for the subnet to which this interface is attached to be dropped. This option is a requirement for routers as described in RFC 1812, section 4.2.2.11. Furthermore, it is disabled by default (RFC 2644), with the intended goal of reducing the efficacy of certain types of denial of service (DoS) attacks.
60000CRG0-35B
2228
Usage Examples
The following example enables forwarding of directed broadcasts on the interface ppp 1: (config)#interface ppp 1 (config-ppp 1)#ip directed-broadcast
60000CRG0-35B
2229
ip ffe
Use the ip ffe command to enable the RapidRoute Engine on this interface with the default number of entries. Use the no form of this command to disable this feature. Variations of this command include:
ip ffe ip ffe max-entries <value>
Issuing this command will cause all RapidRoute entries on this interface to be cleared.
Syntax Description
max-entries <value> Optional. Specifies the maximum number of entries stored in the flow table. Valid range is from 1 to 8192.
Default Values
By default, the RapidRoute Engine is disabled. The default number of max-entries is 4096.
Command History
Release 13.1 Release 17.6 Command was introduced. Command was expanded to include the high level data link control (HDLC) and tunnel interfaces.
Functional Notes
RapidRoute can be used to help reduce routing overhead, and thus reduce overall routing times. Routing times are reduced by the creation of a flow table on the ingress interface. The maximum number of entries that can be stored in the flow table at any one time may be specified by using the max-entries parameters.
Usage Examples
The following example enables RapidRoute and sets the maximum number of entries in the flow table to 50: (config)#interface ppp 1 (config-ppp 1)#ip ffe max-entries 50
60000CRG0-35B
2230
Technology Review
The RapidRoute system goal is to increase IP packet throughput by moving as much of the packet processing into the engine as possible. Packets are classified into flows based upon the IP protocol (Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), etc.), the source and destination IP addresses, IP type of service (ToS), and the protocol-specific information, such as the source and destination port numbers. Flows are defined as the unidirectional representation of a conversation between two IP hosts. Each ingress interface keeps its own flow table, a collection of flow entries. The first packet in a flow that is forwarded through the unit will build a flow entry. When a flow entry is looked up but no entry is found, a RapidRouteBuilder object is allocated and attached to the packet. As the packet passes through the various processing layers, each subsystem will add processing to the RapidRouteBuilder. When packet is about to be forwarded out of the egress interface, the RapidRouteBuilder will be finalized. That is, the flow entry being built will be checked for completeness and committed to the flow table on the ingress interface. Subsequent flow matches can then bypass the normal processing layers.
60000CRG0-35B
2231
ip flow
Use the ip flow command to enable integrated traffic monitoring (ITM) for all traffic received or forwarded on an interface. Use the no form of this command to disable traffic monitoring. Variations of this command include:
ip flow egress ip flow egress <name> ip flow ingress ip flow ingress <name>
Syntax Description
egress ingress <name> Specifies that all outgoing traffic be monitored. Specifies that all incoming traffic be monitored. Optional. Specifies the name of an access control list (ACL) to use for filtering traffic.
Default Values
By default, no traffic monitoring is enabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables traffic monitoring on a Point-to-Point Protocol (PPP) interface to monitor incoming traffic through an ACL called myacl: (config)#interface ppp 1 (config-ppp 1)#ip flow ingress myacl
60000CRG0-35B
2232
Default Values
By default, broadcast UDP packets are not forwarded.
Command History
Release 1.1 Command was introduced.
Functional Notes
When used in conjunction with the ip forward-protocol command, the ip helper-address feature allows you to customize which broadcast packets are forwarded. To implement the helper address feature, assign a helper address(es) (specifying the device that needs to receive the broadcast traffic) to the interface closest to the host that transmits the broadcast packets. When broadcast packets (of the specified type forwarded using the ip forward-protocol command) are received on the interface, they will be forwarded to the device that needs the information. Only packets meeting the following criteria are considered eligible by the ip helper-address feature: 1. The packet IP protocol is UDP. 2. Any UDP port specified using the ip forward-protocol command. 3. The medium access control (MAC) address of the frame is an all-ones broadcast address (ffff.ffff.ffff). 4. The destination IP address is broadcast defined by all ones (255.255.255.255) or a subnet broadcast (for example, 192.33.4.251 for the 192.33.4.248 /30 subnet).
Usage Examples
The following example forwards all domain naming system (DNS) broadcast traffic to the DNS server with IP address 192.33.5.99: (config)#ip forward-protocol udp domain (config)#interface ppp 1 (config-ppp 1)#ip helper-address 192.33.5.99
60000CRG0-35B
2233
ip igmp
Use the ip igmp command to configure multicasting related functions for the interface. Variations of this command include:
ip igmp immediate-leave ip igmp last-member-query-interval <milliseconds> ip igmp querier-timeout <seconds> ip igmp query-interval <seconds> ip igmp query-max-response-time <seconds> ip igmp static-group <address> ip igmp version [1 | 2]
Syntax Description
immediate-leave Specifies that if only one host (or Internet Group Management Protocol (IGMP) snooping switch) is connected to the interface, when a leave is received, multicast of that group is immediately terminated as opposed to sending a group query and timing out the group if no device responds. Works in conjunction with ip igmp last-member-query-interval. Applies to all groups when configured. Use the no form of this command to disable the immediate-leave feature. Controls the timeout (in milliseconds) used to detect whether any group receivers remain on an interface after a receiver leaves a group. If a receiver sends a leave-group message (IGMP Version 2), the router sends a group-specific query on that interface. After twice the time specified by this command plus as much as one second longer, if no receiver responds, the router removes that interface from the group and stops sending that group's multicast packets to the interface. Range is 100 to 65535 ms. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) that the router waits after the current queriers last query before it takes over as querier (IGMP V2). Range is 60 to 300 seconds. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) at which IGMP queries are sent on an interface. Host query messages are addressed to the all-hosts multicast group with an IP time to live (TTL) of 1. The router uses queries to detect whether multicast group members are on the interface and to select an IGMP designated router (DR) for the attached segment (if more than one multicast router exists). Only the DR for the segment sends queries. For IGMP V2, the DR is the router with the lowest IP address on the segment. Range is 0 to 65535 seconds. Use the no form of this command to return to the default setting. Specifies the maximum response time (in seconds) advertised by this interface in queries when using IGMP V2. Hosts are allowed a random time within this period to respond, reducing response bursts. Use the no form of this command to return to the default setting.
last-member-query-interval <milliseconds>
querier-timeout <seconds>
query-interval <seconds>
query-max-response-time <seconds>
60000CRG0-35B
2234
Syntax Description
static-group <address> Configures the router's interface to be a statically connected member of the specified group. Packets received on the correct reverse path forwarding (RPF) interface are forwarded to this interface regardless of whether any receivers have joined the specified group using IGMP. Use the no form of this command to remove a configured static group. Sets the interfaces IGMP version. Use the no form of this command to return to the default setting.
version [1 | 2]
Default Values
ip igmp immediate-leave ip igmp last-member-query-interval ip igmp querier-timeout ip igmp query-interval ip igmp query-max-response-time ip igmp static-group ip igmp version No default 1000 milliseconds 2x the query-interval value 60 seconds 10 seconds No default Version 1
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example sets the query message interval on the interface to 200 milliseconds: (config)#interface ppp 1 (config-ppp 1)#ip igmp last-member-query-interval 200
60000CRG0-35B
2235
ip mcast-stub downstream
Use the ip mcast-stub downstream command to enable multicast forwarding and Internet Group Management Protocol (IGMP) (router mode) on an interface and place it in multicast stub downstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub upstream commands. Downstream interfaces connect to segments with multicast hosts. Multiple interfaces may be configured in downstream mode; however, interfaces connecting to the multicast network (upstream) should not be configured in downstream mode. Interfaces configured as downstream should have the lowest IP address of all IGMP-capable routers on the connected segment in order to be selected as the designated router (DR) and ensure proper forwarding. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub upstream on page 2239 for more information.
Usage Examples
The following example enables multicast forwarding and IGMP on the interface: (config)#interface ppp 1 (config-ppp 1)#ip mcast-stub downstream
60000CRG0-35B
2236
ip mcast-stub fixed
Use the ip mcast-stub fixed command to allow forwarding of multicast traffic on a selected interface after enabling multicast routing. Use the no form of this command to disable this mode. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 12.1 Command was introduced.
Functional Notes
Multicast routing must be enabled prior to setting ip mcast-stub fixed on the selected interface. Also, use the ip igmp static-group <address> command (refer to ip igmp on page 2234) to receive multicast traffic without host-initiated Internet Group Management Protocol (IGMP) activity on the selected interface. Otherwise, all host-initiated IGMP transactions will enter multicast routes on the routers interface involved with IGMP activities.
Usage Examples
The following example enables multicast traffic forwarding and IGMP on the interface: (config)#interface ppp 1 (config-ppp 1)#ip mcast-stub fixed
60000CRG0-35B
2237
ip mcast-stub helper-enable
Use the ip mcast-stub helper-enable command to assign the ip mcast-stub helper-address as the Internet Group Management Protocol (IGMP) proxy. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 8.1 Release 10.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interfaces.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address, ip mcast-stub upstream, and ip mcast-stub downstream commands. When enabled, the interface becomes a helper forwarding interface. The IGMP host function is dynamically enabled and the interface becomes the active upstream interface, enabling the unit to perform as an IGMP proxy. Refer to ip mcast-stub helper-address <ip address> on page 968, ip mcast-stub downstream on page 2236, and ip mcast-stub upstream on page 2239 for more information.
Usage Examples
The following example sets the helper address as the IGMP proxy: (config)#interface ppp 1 (config-ppp 1)#ip mcast-stub helper-enable
60000CRG0-35B
2238
ip mcast-stub upstream
Use the ip mcast-stub upstream command to enable multicast forwarding on an interface and place it in multicast stub upstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub downstream commands. When enabled, the interface becomes a candidate to be a helper forwarding interface. If chosen as the best path toward the helper address by the router's unicast route table, the Internet Group Management Protocol (IGMP) host function is dynamically enabled and the interface becomes the active upstream interface, enabling the router to perform as an Internet Group Management Protocol (IGMP) proxy. Though multiple interfaces may be candidates, no more than one interface will actively serve as the helper forwarding interface. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub downstream on page 2236 for more information.
Usage Examples
The following example enables multicast forwarding on the interface: (config)#interface ppp 1 (config-ppp 1)#ip mcast-stub upstream
60000CRG0-35B
2239
ip mtu <size>
Use the ip mtu command to configure the Internet Protocol version 4 (IPv4) maximum transmission unit (MTU) size for the active interface. Use the no form of this command to return to the default value. Syntax Description
<size> Configures the window size for transmitted IPv4 packets. The valid ranges for the various interfaces are listed below: ATM subinterfaces 64 to 1520 BVIs 64 to 2100 Demand interfaces 64 to 1520 Ethernet interfaces (all types) 64 to 1500 FDL interfaces 64 to 256 Frame Relay subinterfaces 64 to 1520 HDLC interfaces (NetVanta 5305) 64 to 4600 HDLC interfaces (all other NetVanta products) 64 to 2100 Loopback interfaces 64 to 1500 PPP interfaces (NetVanta 5305) 64 to 4600 PPP interfaces (all other NetVanta products) 64 to 2100 Tunnel interfaces 64 to 18190
Default Values
<size> The default values for the various interfaces are listed below: ATM subinterfaces 1500 BVIs 1500 Demand interfaces 1500 Ethernet interfaces (all types) 1500 FDL interfaces 256 Frame Relay subinterfaces 1500 HDLC interfaces 1500 Loopback interfaces 1500 PPP interfaces 1500 Tunnel interfaces 1476
Command History
Release 1.1 Release 11.1 Release 17.9 Command was introduced. Command was expanded to include the demand interface. Command was changed to require the ip keyword.
Functional Notes
Open shortest path first (OSPF) will not become adjacent on links where the MTU sizes do not match. If router A and router B are exchanging hello packets but their MTU sizes do not match, they will never reach adjacency. This is by design and required by the RFC.
60000CRG0-35B
2240
Usage Examples
The following example specifies an IPv4 MTU of 1200 on the PPP interface: (config)#interface ppp 1 (config-ppp 1)#ip mtu 1200
60000CRG0-35B
2241
ip ospf
Use the ip ospf command to customize open shortest path first (OSPF) settings (if needed). Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication-key <password> ip ospf cost <value> ip ospf dead-interval <seconds> ip ospf hello-interval <seconds> ip ospf message-digest-key [1 | 2] md5 <key> ip ospf priority <value> ip ospf retransmit-interval <seconds> ip ospf transmit-delay <seconds>
Syntax Description
authentication-key <password> cost <value> Assigns a simple-text authentication password to be used by other routers using the OSPF simple password authentication. Specifies the OSPF cost of sending a packet on the interface. This value overrides any computed cost value. Range is 1 to 65535. Sets the maximum interval (in seconds) allowed between hello packets. If the maximum is exceeded, neighboring devices will determine that the device is down. Range is 0 to 32767 seconds. Specifies the interval (in seconds) between hello packets sent on the interface. Range is 0 to 32767 seconds. Configures OSPF message digest 5 (MD5) authentication (16 byte maximum) keys. Sets the OSPF priority. The value set in this field helps determine the designated router (DR) for this network. Range is 0 to 255. Specifies the interval (in seconds) between link state advertisements (LSAs). Range is 0 to 32767 seconds. Sets the estimated time (in seconds) required to send a link state advertisement (LSA) on the interface. Range is 0 to 32767 seconds.
dead-interval <seconds>
Default Values
dead-interval <seconds> hello-interval <seconds> retransmit-interval <seconds> transmit-delay <seconds> 40 seconds 10 seconds: Ethernet, Frame Relay, and Point-to-Point Protocol (PPP) 5 seconds 1 second
60000CRG0-35B
2242
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example sets the maximum number of seconds allowed between hello packets to 25000: (config)#interface ppp 1 (config-ppp 1)#ip ospf dead-interval 25000
60000CRG0-35B
2243
ip ospf authentication
Use the ip ospf authentication command to authenticate an interface that is performing open shortest path first (OSPF) authentication. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication ip ospf authentication message-digest ip ospf authentication null
Syntax Description
message-digest null Optional. Selects message-digest authentication type. Optional. Specifies that no authentication be used.
Default Values
By default, ip ospf authentication is set to null (meaning no authentication is used).
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example specifies that no authentication will be used on the Point-to-Point Protocol (PPP) interface: (config)#interface ppp 1 (config-ppp 1)#ip ospf authentication null
60000CRG0-35B
2244
ip ospf network
Use the ip ospf network command to specify the type of network on this interface. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf network broadcast ip ospf network point-to-point
Syntax Description
broadcast point-to-point Sets the network type for broadcast. Sets the network type for point-to-point.
Default Values
By default, Ethernet defaults to broadcast. Point-to-Point Protocol (PPP) and Frame Relay default to point-to-point.
Command History
Release 3.1 Command was introduced.
Functional Notes
A point-to-point network will not elect designated routers.
Usage Examples
The following example designates a broadcast network type: (config)#interface ppp 1 (config-ppp 1)#ip ospf network broadcast
60000CRG0-35B
2245
ip pim sparse-mode
Use the ip pim sparse-mode command to enable protocol-independent multicast (PIM) sparse mode for this interface. Use the no form of this command to disable PIM sparse mode. Syntax Description
No subcommands.
Default Values
By default, PIM sparse mode for this interface is disabled.
Command History
Release 11.1 Command was introduced.
Functional Notes
PIM sparse mode is a multicast routing protocol that makes use of the unicast forwarding table. It builds unidirectional shared trees rooted at a rendezvous point (RP) for a multicast group or a shortest-path tree rooted at a specific source for a multicast group.
Usage Examples
The following example enables PIM sparse mode on the interface: (config)#interface ppp 1 (config-ppp 1)#ip pim sparse-mode
60000CRG0-35B
2246
Default Values
By default, the priority of all protocol-independent multicast (PIM) interfaces is 1.
Command History
Release 11.1 Command was introduced.
Functional Notes
Interfaces advertise their configured priority values in the hello messages transmitted on the interface. Routers use the priority values to determine the appropriate DR. The router on the network segment with the highest priority is selected as the DR. If a hello message is received on the interface from a router on the network segment and it does not contain a priority, the entire network segment defaults to DR selection based on IP addresses instead of priority. In this instance, the DR is selected as the router on the network segment that has the highest IP address. AOS will always include a priority in all transmitted hello messages. If no priority is specifically designated by the user, the priority is set as the default of 1.
Usage Examples
The following example specifies a priority of 100 on the Point-to-Point Protocol (PPP) 1 interface: (config)#interface ppp 1 (config-ppp 1)#ip pim-sparse dr-priority 100
60000CRG0-35B
2247
Default Values
By default, the hellos are transmitted on PIM interfaces every 60 seconds.
Command History
Release 11.1 Command was introduced.
Functional Notes
Hello messages are used to inform neighbors of a routers presence. Hello messages normally generate a small amount of traffic on an interface. Setting the hello-timer to a small interval increases the number of hellos sent (thus increasing the amount of traffic). Set the hello-timer to a reasonable value, taking into consideration the bandwidth available on the interface.
Usage Examples
The following example specifies hellos be sent on the Point-to-Point Protocol (PPP) 1 interface every 3600 seconds: (config)#interface ppp 1 (config-ppp 1)#ip pim-sparse hello-timer 3600
60000CRG0-35B
2248
Default Values
By default, the nbr-timeout is set to 105 seconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the nbr-timeout to 300 seconds: (config)#interface ppp 1 (config-ppp 1)#ip pim-sparse nbr-timeout 300
60000CRG0-35B
2249
Default Values
By default, the override interval is set to 2500 milliseconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the override interval to 3000 milliseconds: (config)#interface ppp 1 (config-ppp 1)#ip pim-sparse override-interval 3000
60000CRG0-35B
2250
Default Values
By default, the propagation delay is set to 500 milliseconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the propagation delay to 300 milliseconds: (config)#interface ppp 1 (config-ppp 1)#ip pim-sparse propagation-delay 300
60000CRG0-35B
2251
Default Values
By default, no policy route map is assigned to this interface.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example assigns the policy route map policy1 to the interface: (config)#interface ppp 1 (config-ppp 1)#ip policy route-map policy1
60000CRG0-35B
2252
ip proxy-arp
Use the ip proxy-arp command to enable proxy Address Resolution Protocol (ARP) on the interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, proxy ARP is enabled.
Command History
Release 1.1 Command was introduced.
Functional Notes
In general, the principle of proxy ARP allows a router to insert its IP address in the source IP address field of a packet (if the packet is from a host on one of its subnetworks). This allows hosts to reach devices on other subnetworks without implementing routing or specifying a default gateway. If proxy ARP is enabled, AOS will respond to all proxy ARP requests with its specified medium access control (MAC) address and forward packets accordingly. Enabling proxy ARP on an interface may introduce unnecessary ARP traffic on the network.
Usage Examples
The following example enables proxy ARP on the virtual Point-to-Point Protocol (PPP) interface: (config)#interface ppp 1 (config-ppp 1)#ip proxy-arp
60000CRG0-35B
2253
Syntax Description
1 2 Accepts only received RIP version 1 packets on the interface. Accepts only received RIP version 2 packets on the interface.
Default Values
By default, all interfaces implement RIP version 1 (the default value for the version command).
Command History
Release 1.1 Command was introduced.
Functional Notes
Use the ip rip receive version to specify a RIP version that overrides the version (in the Router RIP) configuration. AOS only accepts one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the virtual Point-to-Point Protocol (PPP) interface to accept only RIP version 2 packets: (config)#interface ppp 1 (config-ppp 1)#ip rip receive version 2
60000CRG0-35B
2254
Syntax Description
1 2 Transmits only RIP version 1 packets on the interface. Transmits only RIP version 2 packets on the interface.
Default Values
By default, all interfaces transmit RIP version 1 (the default value for the version command).
Command History
Release 1.1 Command was introduced.
Functional Notes
Use the ip rip send version to specify a RIP version that overrides the version (in the Router RIP) configuration. AOS only transmits one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the virtual Point-to-Point Protocol (PPP) interface to transmit only RIP version 2 packets: (config)#interface ppp 1 (config-ppp 1)#ip rip send version 2
60000CRG0-35B
2255
Default Values
By default, no manual summarization is applied by RIP.
Command History
Release 12.1 Command was introduced.
Functional Notes
Unlike the automatic summarization on classful network boundaries, only specific network advertisements are made by RIP using the ip rip summary-address command. This command is only effective if RIP version 2 is configured.
Usage Examples
The following example enables manual summarization on the specified IP address: (config)#interface ppp 1 (config-ppp 1)#ip rip summary-address 10.10.123.0 255.255.255.0
60000CRG0-35B
2256
ip route-cache
Use the ip route-cache command to enable fast-cache switching on the interface. Use the no form of this command to disable fast-cache switching and return to process switching mode. Using network address translation (NAT) or the AOS firewall capabilities on an interface requires process switching mode (using the no ip route-cache command).
Syntax Description
No subcommands.
Default Values
By default, fast-cache switching is enabled on all Ethernet and virtual Frame Relay subinterfaces. IP route cache is enabled for all virtual Point-to-Point Protocol (PPP) interfaces.
Command History
Release 2.1 Command was introduced.
Functional Notes
Fast-cache switching allows an IP interface to provide optimum performance when processing IP traffic.
Usage Examples
The following example enables fast-cache switching on the virtual PPP interface: (config)#interface ppp 1 (config-ppp 1)#ip route-cache
60000CRG0-35B
2257
ip unnumbered <interface>
Use the ip unnumbered command to use the IP address assigned to the specified interface for all IP processing on the active interface. Use the no form of this command to remove the unnumbered configuration. Syntax Description
<interface> Specifies the interface that contains the IP address to use as the source address for all packets transmitted on this interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type ip unnumbered ? for a list of valid interfaces.
Default Values
By default, all interfaces are configured to use a specified IP address (using the ip address command).
Command History
Release 1.1 Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the demand interfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
Functional Notes
If ip unnumbered is enabled on an interface, all IP traffic from the interface will use a source IP address taken from the specified interface. For example, specifying ip unnumbered eth 0/1 while in the Point-to-Point Protocol (PPP) Interface Configuration mode configures the PPP interface to use the IP address assigned to the Ethernet interface for all IP processing. In addition, AOS uses the specified interface information when sending route updates over the unnumbered interface. Static routes may either use the interface name (ppp 1) or the far-end address (if it will be discovered).
Usage Examples
The following example configures the PPP interface (labeled ppp 1) to use the IP address assigned to the Ethernet interface (eth 0/1): (config)#interface ppp 1 (config-ppp 1)#ip unnumbered eth 0/1
60000CRG0-35B
2258
ip urlfilter <name>
Use the ip urlfilter command to apply a universal resource locator (URL) filter to the interface for all inbound or outbound traffic. Use the no form of this command to remove the URL filter from an interface. Variations of this command include:
ip urlfilter <name> in ip urlfilter <name> out
Syntax Description
<name> in out Specifies the URL filter name to use on the interface. Applies the filter to the inbound traffic. Applies the filter to the outbound traffic.
Default Values
By default, there are no URL filters applied to any interfaces.
Command History
Release 12.1 Release 14.1 Command was introduced. Command was expanded to include the virtual local area network (VLAN) interfaces.
Functional Notes
The firewall must be enabled using the ip firewall command in order to use URL filters. The URL filter must be created by using the ip urlfilter <name> http command before applying it to the interface. Refer to ip urlfilter <name> http on page 1090 for more information on using this command.
Usage Examples
The following example performs URL filtering on all traffic entering through the Point-to-Point Protocol (PPP) interface (labeled ppp 1) and matches the URL filter named MyFilter: (config)#interface ppp 1 (config-ppp 1)#ip urlfilter MyFilter in
60000CRG0-35B
2259
ipv6
Use the ipv6 command to enable Internet Protocol version 6 (IPv6) processing and create a link-local address on an interface. Use the no form of this command to disable IPv6 processing and remove all IPv6 configuration on the interface. Syntax Description
No subcommands.
Default Values
By default, IPv6 is not enabled on the interface.
Command History
Release 18.1 Command was introduced.
Functional Notes
Because AOS uses the dual-stack for IPv6 implementation, IPv6 features must be enabled for the supported IPv6 features to be used. Enabling IPv6 in AOS is completed by using an IPv6 address or using the ipv6 keyword with specific commands. For example, to enable IPv6 on an interface and cause the interface to join the link scoped all-nodes and all-routers multicast group, enter an IPv6 address on the interface. Use the ipv6 command to enable IPv6 processing and create a link-local address on an interface when other unicast IPv6 addresses are not needed on the interface. This command is not necessary nor effectual when any other form of an IPv6 address command is also present on the interface.
Usage Examples
The following example enables IPv6 and creates a link-local IPv6 address on the interface: (config)#interface ppp 1 (config-ppp 1)#ipv6
60000CRG0-35B
2260
Syntax Description
<ipv6 acl name> in out Applies the named IPv6 ACL to the interface. Enables access control on IPv6 packets received on the specified interface. Enables access control on IPv6 packets transmitted on the specified interface.
Default Values
By default, these commands are disabled.
Command History
Release 18.1 Command was introduced.
Functional Notes
Only one IPv6 ACL can be applied in each traffic direction. Unlike in IPv4, IPv6 traffic filters include an implicit permit for neighbor solicitation and advertisement packets in an ACL before the traditional implicit deny at the end of the ACL. This prevents blocking of address resolution and unreachability detection, although this can be overridden by entering explicit deny commands in the IPv6 ACL.
Usage Examples
The following example applies the IPv6 ACL Privatev6 to incoming IPv6 traffic on the interface: (config)#interface ppp 1 (config-ppp 1)#ipv6 access-group Private6 in
60000CRG0-35B
2261
Default Values
By default, there are no configured IPv6 ACPs associated with an interface.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example applies the IPv6 ACP PRIVATEv6 to the interface: Enable the AOS security features: (config)#ipv6 firewall Associate the ACP with the PPP interface: (config)#interface ppp 1 (config-ppp 1)#ipv6 access-policy PRIVATEv6
60000CRG0-35B
2262
Default Values
By default, no IPv6 address is configured on the interface and IPv6 processing is not enabled on the interface.
Command History
Release 18.1 Command was introduced.
Functional Notes
The IPv6 unicast address can be a global unicast address or a unique local address, but it cannot be a link-local IPv6 address (FE80::). Link-local addresses are created on the interface using the command ipv6 address <ipv6 link-local address> link-local on page 2265. The address created by this command is a manually configured IPv6 address, which must have all parts (prefix and host bits) specified. Using the no form of this command with a specified IPv6 address removes only that IPv6 address from the interface. Using the no form of this command without a specified IPv6 address removes all manually configured IPv6 addresses from the interface.
Usage Examples
The following example adds a unicast IPv6 address to the interface and enables IPv6 processing on the interface: (config)#interface ppp 1 (config-ppp 1)#ipv6 address 2001:DB8::/32
60000CRG0-35B
2263
eui-64
Default Values
By default, no IPv6 address is configured on the interface and IPv6 processing is not enabled on the interface.
Command History
Release 18.1 Command was introduced.
Functional Notes
The IPv6 unicast address can be a global unicast address or a unique local address, but it cannot be a link-local IPv6 address (FE80::). Link-local addresses are created on the interface using the command ipv6 address <ipv6 link-local address> link-local on page 2265. The address created by this command is an EUI-64 unicast address. For this type of address, the EUI-64 interface ID is automatically placed in the IPv6 address. Any manually configured bits beyond the addresss prefix length are set to 0; however, any manually configured bits within the prefix length that extend into the lower 64 bits take precedence over the Interface ID bits. Using the no form of this command with a specified IPv6 address removes only that IPv6 address from the interface. Using the no form of this command without a specified IPv6 address removes all manually configured IPv6 addresses from the interface.
Usage Examples
The following example adds a unicast IPv6 address with an EUI-64 Interface ID to the interface and enables IPv6 processing on the interface: (config)#interface ppp 1 (config-ppp 1)#ipv6 address 2001:DB8:3F::/48 eui-64
60000CRG0-35B
2264
link-local
Default Values
By default, no IPv6 address is configured for the interface and IPv6 processing is not enabled.
Command History
Release 18.1 Command was introduced.
Functional Notes
A single link-local address can be manually configured on an interface. The lower 64 bits of the specified address become the Interface ID for the interface, overriding the default interface ID. Any other address that uses the EUI-64 parameter to automatically place the interface ID in the lower 64 bits of the IPv6 address use the new value for the interface ID. The <ipv6 address> for a link-local IPv6 address is specified in the format FE80::<bits>. The <bits> are the lower 64 bits of the link-local IPv6 address, and since this form of address has no prefix, the bits entered form the entire IPv6 address. These bits also become the new interface ID for the interface and can be derived from the interfaces medium access control (MAC) address. The link-local parameter specifies this is a manually configured link-local address. Any manually configured link-local address will replace an automatically configured link-local address for the interface. Using the no form of this command with a specified IPv6 address removes that IPv6 address from the interface. Using the no form of this command without a specified IPv6 address removes all manually configured IPv6 addresses from the interface.
Usage Examples
The following example manually creates a link-local IPv6 address on the interface and enables IPv6 processing: (config)#interface ppp 1 (config-ppp 1)#ipv6 address FE80::220:8FF:FE54:F9D8 link-local
60000CRG0-35B
2265
Syntax Description
default metric <value> Optional. Specifies that the interface maintain a list of advertising routers that are willing to be IPv6 default routers. Optional. Specifies the administrative distance for a default router maintained in the default router list. Range is 1 to 255. Routes with lower administrative distance are favored.
Default Values
By default, no IPv6 addresses are configured for the interface and IPv6 processing is not enabled. When an IPv6 address is configured automatically, the administrative distance for default routers is 2 by default.
Command History
Release 18.1 Command was introduced.
Functional Notes
When autoconfiguration is enabled, the interface listens for RA messages that tell the interface how it should be configured. The interface then creates addresses for advertised 64-bit prefixes with the A flag in the IPv6 address set using stateless address autoconfiguration (SLAAC). The addresses use the EUI-64 interface ID in the lower 64 bits of the address. A route type of Connected is added to the route table if the L flag on the prefix advertisement (on-link flag) is also set.
Usage Examples
The following example enables IPv6 processing on the interface, creates a link-local IPv6 address for the interface, and allows the interface to automatically configure itself for IPv6: (config)#interface ppp 1 (config-ppp 1)#ipv6 address autoconfig
60000CRG0-35B
2266
Default Values
By default, the MTU of the interface is set to 1280 bytes.
Command History
Release 18.1 Command was introduced.
Functional Notes
In IPv6, the minimum MTU is 1280 octets. Any link that has an MTU less than 1280 octets must use link fragmentation and reassembly that is transparent to IPv6 (for example, the Fragmentation Header). Sources in the IPv6 network are expected to perform path maximum transmission unit (PMTU) discovery to send packets larger than 1280 octets. PMTU works in the following manner: First, the sending node assumes the link MTU of the interface from which the traffic is being forwarded and then sends the IPv6 packet at the link MTU size. If a router on the path is unable to forward the packet, it sends an ICMP Packet Too Big message back to the sending node containing the link MTU of the link on which the packet forwarding failed. The sending node then rests the PMTU to the value of the MTU field in the Internet Control Message Protocol version 6 (ICMPv6) Packet Too Big message, and the packet is resent. The MTU for IPv6 packets can be set on a per-interface basis. There are two methods for setting MTUs for interfaces if required: one for Layer 3 interfaces, and one for the underlying Layer 1 and Layer 2 interfaces. For all interface types, use the ipv6 mtu <size> command to specify the IPv6 MTU in bytes from the interfaces configuration mode. The minimum MTU setting for IPv6 is 1280 bytes, and the maximum is 1500 bytes. The IPv6 MTU value is independent of the IPv4 MTU setting (set with the command ip mtu <size> on page 2240). When the interface is forwarding the IPv6 packet as a router, if the packet size exceeds the IPv6 MTU of the egress interface, the packet is dropped and ICMPv6 Packet Too Big message is sent to the source. When originating an IPv6 packet from the local IPv6 stack, and the packet is larger than the IPv6 MTU of the egress interface, the packet is fragmented and sent.
Usage Examples
The following example specifies the IPv6 MTU value for the interface: (config)#interface ppp 1 (config-ppp 1)#ipv6 mtu 1350
60000CRG0-35B
2267
ipv6 nd advertisement-interval
Use the ipv6 nd advertisement-interval command to specify that the Advertisement Interval Option is sent in Internet Protocol version 6 (IPv6) router advertisement (RA) messages from the router. This command is effectual only when the interface is in router mode. Use the no form of this command to return to the default interval. Syntax Description
No subcommands.
Default Values
By default, Advertisement Interval Options are not sent in RA messages.
Command History
Release 18.1 Command was introduced.
Functional Notes
Sending the Advertisement Interval Option should be enabled when the router is functioning in a mobile IP environment to aid movement detection by mobile nodes. This option contains the current value of the maximum router advertisement interval configured using the command ipv6 nd ra interval on page 2277.
Usage Examples
The following example specifies that the interface include Advertisement Interval Options in RA messages sent from the router: (config)#interface ppp 1 (config-ppp 1)#ipv6 nd advertisement-interval
60000CRG0-35B
2268
Default Values
By default, the interface sends 1 NS message.
Command History
Release 18.1 Command was introduced.
Functional Notes
DAD is used by devices to determine if IPv6 addresses are unique before they are applied to interfaces. DAD is used in NS messages to detect duplicate unicast addresses. The Target Address fields in the NS messages are set to the IPv6 address for which duplication is being detected. Destination IPv6 addresses for DAD in NS messages are the solicited-node multicast version of the address being tested. Source IPv6 addresses for DAD are set to the IPv6 unspecified address (::). Once the IPv6 address is determined by DAD to be unique, it can be applied to the IPv6 interface on the node. DAD in AOS is performed when an interface transitions state from DOWN to UP or when manually configuring an address. When performing DAD because of an interface transition, DAD will happen immediately after the interface transition and again 40 seconds later to cooperate with the port being connected to an Ethernet switch.
Usage Examples
The following example specifies that 3 NS messages are sent by the interface when performing DAD: (config)#interface ppp 1 (config-ppp 1)#ipv6 nd dad attempts 3
60000CRG0-35B
2269
ipv6 nd managed-config-flag
Use the ipv6 nd managed-config-flag command to specify the M flag in Internet Protocol version 6 (IPv6) router advertisement (RA) messages. The M flag instructs hosts receiving the RA that they can use stateful Dynamic Host Configuration Protocol version 6 (DHCPv6) to configure addresses and nonaddress information. Use the no form of this command to disable the setting of the M flag. Syntax Description
No subcommands.
Default Values
By default, the M flag is not set in RAs.
Command History
Release 18.1 Command was introduced.
Functional Notes
If you specify that the M flag is set in RA messages, you do not need to set the 0 flag (it becomes redundant).
Usage Examples
The following example sets the M flag for RA messages sent by the interface: (config)#interface ppp 1 (config-ppp 1)#ipv6 nd managed-config-flag
60000CRG0-35B
2270
Default Values
By default, the interval is set to 1000 ms for internal use by the router and 0 (unspecified) is sent in RA messages.
Command History
Release 18.1 Command was introduced.
Functional Notes
This command controls the spacing of NS messages for functions such as address resolution, reachability detection, and DAD. For DAD it also serves as the amount of time after the last transmission before the detection phase of autoconfiguration terminates. In addition, the command controls the interval between unsolicited NA messages.
Usage Examples
The following example changes the interval between RA messages sent from the interface to 2000 ms: (config)#interface ppp 1 (config-ppp 1)#ipv6 nd ns-interval 2000
60000CRG0-35B
2271
ipv6 nd other-config-flag
Use the ipv6 nd other-config-flag command to specify the O flag in Internet Protocol version 6 (IPv6) router advertisement (RA) messages. This command is only effectual when the interface is in router mode. When the O flag is set, hosts receiving the RA messages are instructed that they may use stateless Dynamic Host Configuration Protocol version 6 (DHCPv6) to receive information that is not IPv6 addressing information, and to use some other method (whether through manual configuration, stateless address autoconfiguration (SLAAC), etc.) for addressing information. Use the no form of this command to disable the O flag setting. Syntax Description
No subcommands.
Default Values
By default, the O flag is not set in RA messages.
Command History
Release 18.1 Command was introduced.
Functional Notes
If the M flag is set for RA messages, you do not need to set the O flag.
Usage Examples
The following example sets the O flag in RA messages from the interface: (config)#interface ppp 1 (config-ppp 1)#ipv6 nd other-config-flag
60000CRG0-35B
2272
ipv6 nd prefix
Use the ipv6 nd prefix command to specify the Internet Protocol version 6 (IPv6) address prefixes used in router advertisement (RA) messages sent from the interface. Use the no form of this command to remove the specified prefix configuration from the interface. Variations of this command include:
ipv6 nd prefix <ipv6 prefix/prefix-length | default> ipv6 nd prefix <ipv6 prefix/prefix-length | default> no-advertise ipv6 nd prefix <ipv6 prefix/prefix-length | default> <valid lifetime | infinite> <preferred lifetime | infinite> ipv6 nd prefix <ipv6 prefix/prefix-length | default> no-advertise <valid lifetime | infinite> <preferred lifetime | infinite> ipv6 nd prefix <ipv6 prefix/prefix-length | default> <valid lifetime | infinite> <preferred lifetime | infinite> [no-advertise] [no-autoconfig] [no-rtr-address] [no-onlink] [off-link] ipv6 nd prefix <ipv6 prefix/prefix-length | default> no-advertise <valid lifetime | infinite> <preferred lifetime | infinite> [no-autoconfig] [no-rtr-address] [no-onlink] [off-link]
Syntax Description
<ipv6 prefix/prefix-length> Specifies the IPv6 prefix and length to be advertised. Pv6 prefixes should be expressed in colon hexadecimal format (X:X::X/<Z>). For example, 2001:DB8:3F::/64. The prefix length (<Z>) is an integer with a value between 0 and 128. Specifies the default values for the IPv6 prefix parameters. Refer to the Functional Notes below for more information. Optional. Specifies the valid lifetime to advertise for this route in each RA message. Range is 0 to 4294967295 seconds. Optional. Specifies the preferred lifetime to advertise for this route in each RA message. Range is 0 to 4294967295 seconds. Optional. Specifies that the the valid and preferred lifetimes of the prefix do not expire. Optional. Specifies that the prefix is excluded from the RA message. Optional. Sets the A flag in the RA message to 0, indicating that hosts may not create an address for this prefix using stateless address autoconfiguration (SLAAC). This parameter only affects hosts receiving the RA message, it does not affect the operation of the local router. Optional. Sets the R flag in the RA message to 0 and specifies the full router IPv6 address is not included in the RA message. Optional. Specifies that the IPv6 prefix in the RA message is not to be used for on-link determination. Optional. Sets the L flag value to 0 in RA messages, which indicates the RA makes no statement about the on-link or off-link properties of the IPv6 prefix.
60000CRG0-35B
2273
Default Values
By default, all prefixes derived from the interfaces configured IPv6 addresses are advertised using the system default values. By default, the valid lifetime advertised for a prefix is 2592000 seconds and the preferred lifetime advertised is 604800 seconds. By default, the L flag is set to 1, the R flag is set to 1, and the A flag is set to 1.
Command History
Release 18.1 Command was introduced.
Functional Notes
This command works for both routers and hosts, but in host implementations it is used to manually add on-link prefixes that do not have an IPv6 address or to make off-link a prefix generated by an IPv6 address command. Hosts do not send RA messages, so the command only adds prefixes to RA messages when the interface is in router mode. This command can also be used to change the defaults used on configured prefixes when all options are not specified.
Changing the prefix defaults will affect prefixes derived from configured IPv6 addresses, as well as prefixes configured using the ipv6 nd prefix command.
Prefixes advertised can be a subset or a superset of the prefixes derived from the IPv6 addresses configured on the interface. Prefixes for IPv6 addresses configured on a router interface are automatically eligible to be advertised on that interface using system or configured default values without having to enter a prefix command. To impose additional controls on those prefixes, an entry must be made using this command with the desired settings. The default parameter is used to change the default settings for the IPv6 prefix parameters. Changing these settings can be useful when multiple prefixes are implemented that will use the same set of parameters. When configuring IPv6 prefixes, the prefix default values are only used if no other parameters are specified after specifying the IPv6 prefix and length (for example, ipv6 nd prefix 2001:DB8::/64). If additional parameters are specified, any unspecified parameters use the system default values rather than the configured default values. When the default values are changed, any prefix that uses them will also change. Using this command to change prefix default values also affects prefixes derived from configured IPv6 addresses on the interface. The optional <valid lifetime> parameter specifies the valid lifetime to advertise for this route in each advertisement. Hosts will reset the lifetime to this value each time the route is advertised, and they will keep this prefix until the valid lifetime expires. The optional <preferred lifetime> parameter specifies the preferred lifetime to advertise for this route in each advertisement. Hosts will reset the lifetime to this value each time the route is advertised, and they will keep the prefix in the preferred state during this time period. After the preferred time period expires, the prefix transitions to the deprecated state where it remains until the valid lifetime expires and the route is removed. The <preferred lifetime> value must be set to be shorter than the <valid lifetime> value.
60000CRG0-35B
2274
The optional off-link parameter sets the L flag (on-link flag) value to 0 in RA messages. When the L flag is set to 0, the advertisement makes no statement about on-link or off-link properties of the prefix. When the L flag is set, the prefix is considered on-link and locally reachable by hosts on the link (meaning a router is not needed). Hosts attached to the link will add on-link prefixes to their prefix list or route table. When off-link is not specified, a connected route is added to the route table of this router for this prefix. When off-link is specified, no route is added to the route table. By default, prefixes are advertised as on-link with the L flag set to 1. The optional no-rtr-address parameter sets the R flag (router flag) of the RA to 0 and does not include the full router address in the advertisement. The router address is typically included in the RA to assist in Mobile IP environments. By default, the R flag is set to 1 and the router address is sent in RA messages. The optional no-autoconfig parameter sets the A flag of the RA to 0, indicating that hosts may not create an address for this prefix using SLAAC. If the A flag is set to 1 (the default setting), hosts perform SLAAC to generate an address based on the prefix. This parameter only affects hosts receiving the RA, it does not effect the operation of the local router. The optional no-advertise parameter specifies that the prefix is excluded from RA messages. By default, the prefix is included in RA messages. The no-onlink parameter informs the router that the prefix is not to be used for on-link determination. By default, all prefixes derived from the interfaces configured IPv6 addresses are advertised using the system default values.
Usage Examples
The following example specifies that the IPv6 prefix 2001:DB8:3F::/48 has an infinite valid and preferred lifetime advertised in RA messages sent from the interface: (config)#interface ppp 1 (config-ppp 1)#ipv6 nd prefix 2001:DB8:3F::/48 infinite infinite The following example changes the default values and behaviors of prefixes included in RA messages to infinite valid and preferred lifetimes, and specifies that the on- or off-link state of the prefix is not included in the RA and that hosts receiving the RA may not use the prefix for creating an IPv6 address: (config)#interface ppp 1 (config-ppp 1)#ipv6 nd prefix default infinite infinite off-link no-autoconfig
60000CRG0-35B
2275
Default Values
By default, idle (STALE) neighbor cache entries are cleared after 1440 minutes (24 hours).
Command History
Release 18.1 Command was introduced.
Functional Notes
This command applies to interfaces in either router or host mode. A neighbor entry is typically purged when neighbor unreachability detection (NUD) is invoked and the neighbor is determined to no longer be reachable. However, NUD is not performed on idle (STALE) neighbor entries, so this command provides a method for purging unused entries after a specified amount of time.
Usage Examples
The following example specifies that idle neighbor entries in the neighbor cache are removed after 800 minutes: (config)#interface ppp 1 (config-ppp 1)#ipv6 nd purge-timer 800
60000CRG0-35B
2276
ipv6 nd ra interval
Use the ipv6 nd ra interval command to specify the interval between transmission of Internet Protocol version 6 (IPv6) router advertisement (RA) messages. This command is only effectual when the interface is in router mode. Use the no form of this command to return to the default value. Variations of this command include:
ipv6 nd ra interval <max time> ipv6 nd ra interval <max time> <min time> ipv6 nd ra interval msec <max time> ipv6 nd ra interval msec <max time> <min time>
Syntax Description
<max time> Specifies the maximum interval between RA message transmission. Time can be specified in seconds or milliseconds. Range is 4 to 1800 seconds and 70 to 1800000 ms. Optional. Specifies the minimum interval between RA message transmission. Time can be specified in seconds or milliseconds. Range is 3 seconds to 75 percent of the configured maximum time value in seconds, or 30 ms to 75 percent of the configured maximum time value in ms. Optional. Specifies that the time values are in milliseconds.
<min time>
msec
Default Values
By default, the interval is set in seconds and has a maximum interval time of 200 seconds and a minimum interval time of 75 percent of the maximum seconds value, but not less than 3 seconds.
Command History
Release 18.1 Command was introduced.
Functional Notes
If this router is used as a default router, the interval between RA messages should not be set to a larger value than the RA lifetime set by the command ipv6 nd ra lifetime <value> on page 2278, which has a default value of 1800 seconds.
Usage Examples
The following example specifies that the maximum interval in seconds between RA message transmissions is 300: (config)#interface ppp 1 (config-ppp 1)#ipv6 nd ra interval 300
60000CRG0-35B
2277
Default Values
By default, the router lifetime is set to 1800 seconds.
Command History
Release 18.1 Command was introduced.
Functional Notes
A value other than 0 for a router lifetime should be larger than the router advertisement interval specified in the command ipv6 nd ra interval on page 2277.
Usage Examples
In the following example, the router lifetime advertised in RA messages is 3000 seconds: (config)#interface ppp 1 (config-ppp 1)#ipv6 nd ra lifetime 3000
60000CRG0-35B
2278
Default Values
By default, the router advertises a reachability time of 0 ms and uses an internal value of 30000 ms.
Command History
Release 18.1 Command was introduced.
Functional Notes
This command is effectual for interfaces in either router or host mode. For hosts, this value sets the internal reachable time used by the host if no RAs are received specifying a different value. For routers, the value indicates the amount of time a device is considered reachable after having received a reachability confirmation in neighbor unreachabililty detection (NUD).
Usage Examples
The following example specifies that a reachability time of 50000 ms is advertised in RA messages: (config)#interface ppp 1 (config-ppp 1)#ipv6 nd ra reachable-time 50000
60000CRG0-35B
2279
ipv6 nd ra suppress
Use the ipv6 nd ra suppress command to specify whether Internet Protocol version 6 (IPv6) router advertisement (RA) messages will be suppressed. This command only applies to interfaces in router mode. Use the no form of this command to begin sending RA messages. Syntax Description
No subcommands.
Default Values
By default, RA messages are not suppressed. When IPv6 routing is not enabled on the router, or when implemented in a host-only mode, the default setting is to suppress advertisements on all interface types.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example suppresses RA messages on the interface: (config)#interface ppp 1 (config-ppp 1)#ipv6 nd ra suppress
60000CRG0-35B
2280
ipv6 nd router-preference
Use the ipv6 nd router-preference command to specify the default router preference value set in Internet Protocol version 6 (IPv6) router advertisement (RA) messages. Setting this preference helps the receivers of RA messages to determine the preference of one router over another as a default router in environments with multiple routers. Use the no form of this command to return the preference to the default setting. Variations of this command include:
ipv6 nd router-preference high ipv6 nd router-preference low ipv6 nd router-preference medium
Syntax Description
high low medium Specifies the preference value is high. Specifies the preference value is low. Specifies the preference value is medium.
Default Values
By default, the router preference is set to medium.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example specifies that the advertised default router preference is high: (config)#interface ppp 1 (config-ppp 1)#ipv6 nd router-preference high
60000CRG0-35B
2281
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface ppp 1 (config-ppp 1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2282
keepalive <value>
Use the keepalive command to enable the transmission of keepalive packets on the interface and specify the time interval in seconds between transmitted packets. Use the no form of this command to return to the default setting. Syntax Description
<value> Defines the time interval (in seconds) between transmitted keepalive packets. Valid range is 0 to 32767 seconds.
Default Values
By default, the time interval between transmitted keepalive packets is 10 seconds.
Command History
Release 1.1 Command was introduced.
Functional Notes
If three keepalive packets are sent to an interface with no response, the interface is considered down. To detect interface failures quickly, specify a smaller keepalive time.
Usage Examples
The following example specifies a keepalive time of 5 seconds on the virtual Point-to-Point Protocol (PPP) interface: (config)#interface ppp 1 (config-ppp 1)#keepalive 5
60000CRG0-35B
2283
lldp receive
Use the lldp receive command to allow Link Layer Discovery Protocol (LLDP) packets to be received on this interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, all interfaces are configured to send and receive LLDP packets.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example configures the Point-to-Point Protocol (PPP) interface to receive LLDP packets: (config)#interface ppp 1 (config-ppp 1)#lldp receive
60000CRG0-35B
2284
lldp send
Use the lldp send command to configure this interface to transmit Link Layer Discovery Protocol (LLDP) packets or to control the types of information contained in the LLDP packets transmitted by this interface. Use the no form of this command to disable this feature. Variations of this command include:
lldp send management-address lldp send port-description lldp send system-capabilities lldp send system-description lldp send system-name lldp send-and-receive
Syntax Description
management-address port-description system-capabilities system-description system-name and-receive Enables transmission of management address information on this interface. Enables transmission of port description information on this interface. Enables transmission of this devices system capabilities on this interface. Enables transmission of this devices system description on this interface. Enables transmission of this devices system name on this interface. Configures this interface to both transmit and receive LLDP packets.
Default Values
By default, all interfaces are configured to transmit and receive LLDP packets of all types.
Command History
Release 9.1 Command was introduced.
Functional Notes
Individual LLDP information can be enabled or disabled using the various forms of the lldp send command. For example, use the lldp send-and-receive command to enable transmit and receive of all LLDP information. Then use the no lldp send port-description command to prevent LLDP from transmitting port description information.
60000CRG0-35B
2285
Usage Examples
The following example configures the Point-to-Point Protocol (PPP) interface to transmit LLDP packets containing all enabled information types: (config)#interface ppp 1 (config-ppp 1)#lldp send The following example configures the PPP interface to transmit and receive LLDP packets containing all information types: (config)#interface ppp 1 (config-ppp 1)#lldp send-and-receive
60000CRG0-35B
2286
max-reserved-bandwidth <value>
Use the max-reserved-bandwidth command to specify the percentage of interface bandwidth reserved for use in user-defined (priority or class-based) queues. The remainder of the interface bandwidth is reserved for system-critical traffic and is not available to user-defined queues. Use the no form of this command to restore the default value. Reserving a portion of the interface bandwidth for system-critical traffic is necessary for proper operation. Specifying the entire interface bandwidth for use in user-defined queues can cause undesirable operation. Syntax Description
<value> Specifies the maximum percentage of bandwidth to reserve for quality of service (QoS). This setting is configured as a percentage of the total interface speed. Range: 1 to 100 percent.
Default Values
By default, max-reserved-bandwidth is set to 75 percent, which reserves 25 percent of the interface bandwidth for system-critical traffic.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example specifies 85 percent of the bandwidth on the Point-to-Point Protocol (PPP) 1 be available for use in user-defined queues: (config)#interface ppp 1 (config-ppp 1)#max-reserved-bandwidth 85
60000CRG0-35B
2287
media-gateway ip
Use the media-gateway ip command to associate an IP address source to use for Realtime Transport Protocol (RTP) traffic. When configuring Voice over Internet Protocol (VoIP), RTP traffic must have an IP address associated with it. However, some interfaces allow dynamic configuration of IP addresses, causing this value to change periodically. Use the no form of this command to disable this function. Variations of this command include:
media-gateway ip loopback <interface id> media-gateway ip primary media-gateway ip secondary <ip address>
Syntax Description
loopback <interface id> Specifies an IP address statically defined to a loopback interface for RTP traffic. This is helpful when using a single IP address across multiple wide area network (WAN) interfaces for RTP traffic. The valid range for loopback interface identifiers is 1 to 1024. The interface ID is used to uniquely identify a loopback interface. The entered value cannot be in use by another loopback interface. Specifies using this interfaces configured primary IP address for RTP traffic. Applies to static, Dynamic Host Configuration Protocol (DHCP), or negotiated addresses. Specifies using this interfaces statically defined secondary IP address for RTP traffic. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
primary
Default Values
By default, media-gateway ip is disabled.
Command History
Release 10.1 Release 17.3 Command was introduced. Command was updated with the loopback interface indentification option.
Usage Examples
The following example configures the unit to use the primary IP address for RTP traffic: (config)#interface ppp 1 (config-ppp 1)#media-gateway ip primary
60000CRG0-35B
2288
Default Values
By default, there is no assigned default peer IPv4 address.
Command History
Release 3.1 Command was introduced.
Functional Notes
This command is useful if the peer does not send the IPv4 address option during Point-to-Point Protocol (PPP) negotiations.
Usage Examples
The following example sets the default peer IPv4 address to 192.22.71.50: (config)#interface ppp 1 (config-ppp 1)#peer default ip address 192.22.71.50
60000CRG0-35B
2289
Default Values
By default, there is no assigned default peer IPv6 interface ID.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example sets the default peer IPv6 interface ID to 2AA:FF:FE3F:2A1C: (config)#interface ppp 1 (config-ppp 1)#peer default ipv6 interface-id 2AA:FF:FE3F:2A1C
60000CRG0-35B
2290
ppp authentication
Use the ppp authentication command to specify the authentication protocol on the Point-to-Point Protocol (PPP) virtual interface that the peer should use to authenticate itself. Use the no form of this command to disable this feature. Variations of this command include:
ppp authentication chap ppp authentication pap
Syntax Description
chap pap Configures Challenge-Handshake Authentication Protocol (CHAP) on the interface. Configures Password Authentication Protocol (PAP) on the interface.
Default Values
By default, PPP endpoints have no authentication configured.
Command History
Release 1.1 Command was introduced.
Technology Review
CHAP and PAP are two authentication methods that enjoy widespread support. Both methods are included in AOS and are easily configured.
The authentication method set up on the local router can be different from that on the peer. Also, just because one router requires authentication from its peer does not mean it also has to authenticate itself to the peer.
Defining PAP PAP is used to verify that the PPP peer is a permitted device by checking a user name and password configured on the peer. The user name and password are both sent unencrypted across the connecting private circuit. PAP requires two-way message passing. First, the router that is required to be authenticated (for example, the peer) sends an authentication request with its user name and password to the router requiring authentication (for example, the local router). The local router then looks up the user name and password in the user name database within the PPP interface, and if they match sends an authentication acknowledge back to the peer.
The PPP user name and password database is separate and distinct from the global user name password database. For PAP and CHAP, use the database under the PPP interface configuration.
60000CRG0-35B
2291
Command Reference Guide Several example scenarios are given below for clarity.
Configuring PAP Example 1: Only the local router requires the peer to authenticate itself. On the local router (host name Local): Local(config-ppp 1)#ppp authentication pap Local(config-ppp 1)#username farend password far On the peer (host name Peer): Peer(config-ppp 1)#ppp pap sent-username farend password far The first line of the configuration sets the authentication mode as PAP. This means the peer is required to authenticate itself to the local router via PAP. The second line is the user name and password expected to be sent from the peer. On the peer, the ppp pap sent-username command is used to specify the appropriate matching user name and password. Configuring PAP Example 2: Both routers require the peer to authenticate itself. On the local router (host name Local): Local(config-ppp 1)#ppp authentication pap Local(config-ppp 1)#username farend password far Local(config-ppp 1)#ppp pap sent-username nearend password near On the peer (host name Peer): Peer(config-ppp 1)#ppp authentication pap Peer(config-ppp 1)#username nearend password near Peer(config-ppp 1)#ppp pap sent-username farend password far Now both routers send the authentication request, verify that the user name and password sent match what is expected in the database, and send an authentication acknowledge. Defining CHAP CHAP is a three-way authentication protocol composed of a challenge response and success or failure. The message digest 5 (MD5) protocol is used to protect user names and passwords in the response. First, the local router (requiring its peer to be authenticated) sends a challenge containing the unencrypted user name of the peer and a random number. The user name of the peer is found in the user name database within the PPP interface of the local router. The peer then looks up the user name in the user name database within the PPP interface, and if found takes the corresponding password and its own host name and sends a response back to the local router. This data is encrypted. The local router verifies that the user name and password are in its own user name database within the PPP interface, and if so sends a success back to the peer.
The PPP user name and password database is separate and distinct from the global user name password database. For PAP and CHAP, use the database under the PPP interface configuration.
60000CRG0-35B
2292
Command Reference Guide Several example scenarios are given below for clarity.
Configuring CHAP Example 1: Only the local router requires the peer to authenticate itself. On the local router (host name Local): Local(config-ppp 1)#ppp authentication chap Local(config-ppp 1)#username Peer password same On the peer (host name Peer): Peer(config-ppp 1)#ppp chap password same The first line of this configuration sets the authentication mode to CHAP. This means the peer is required to authenticate itself to the local router via CHAP. The second line is the user name and password expected to be sent from the peer. The peer uses its hostname and ppp chap password commands to send the proper authentication information.
Configuring CHAP Example 2: Using the ppp chap hostname command as an alternate solution. On the local router (host name Local): Local(config-ppp 1)#ppp authentication chap Local(config-ppp 1)#username farend password same On the peer (host name Peer): Peer(config-ppp 1)#ppp chap hostname farend Peer(config-ppp 1)#ppp chap password same Notice the local router is expecting user name farend even though the peer router's host name is Peer. Therefore, the peer router can use the ppp chap hostname command to send the correct name in the challenge.
Configuring CHAP Example 3: Both routers require each other to authenticate themselves using the same shared password. On the local router (host name Local): Local(config-ppp 1)#ppp authentication chap Local(config-ppp 1)#username Peer password same
60000CRG0-35B
2293
Command Reference Guide On the peer (host name Peer): Peer(config-ppp 1)#ppp authentication chap Peer(config-ppp 1)#username Local password same
This is basically identical to Example 1 except that both routers will now challenge each other and respond.
Configuring CHAP Example 4: Both routers require each other to authenticate themselves using two separate shared passwords. On the local router (host name Local): Local(config-ppp 1)#ppp authentication chap Local(config-ppp 1)#username Peer password far Local(config-ppp 1)#ppp chap password near On the peer (host name Peer): Peer(config-ppp 1)#ppp authentication chap Peer(config-ppp 1)#username Local password near Peer(config-ppp 1)#ppp chap password far This is basically identical to Example 3, except that there are two separate shared passwords.
Notice this example has both ends using different sets of passwords.
Configuring CHAP Example 5: Using the ppp chap hostname command as an alternate solution. On the local router (host name Local): Local(config-ppp 1)#ppp authentication chap Local(config-ppp 1)#username farend password far Local(config-ppp 1)#ppp chap hostname nearend Local(config-ppp 1)#ppp chap password near On the peer (host name Peer): Peer(config-ppp 1)#ppp authentication chap Peer(config-ppp 1)#username nearend password near Peer(config-ppp 1)#ppp chap hostname farend Peer(config-ppp 1)#ppp chap password far
60000CRG0-35B
2294
Notice the local router is expecting user name farend even though the peer router's host name is Peer. Therefore, the peer router can use the ppp chap hostname command to send the correct name on the challenge.
Notice this example has both ends using different sets of passwords.
60000CRG0-35B
2295
Default Values
By default, this feature is disabled.
Command History
Release 14.1 Command was introduced.
Usage Examples
The following example configures Point-to-Point Protocol (PPP) interface 1 to negotiate tagged frames over BCP: (config)#interface ppp 1 (config-ppp 1)#ppp bcp tagged-frame
60000CRG0-35B
2296
Default Values
By default, there are no configured PPP CHAP host names.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example specifies a PPP CHAP host name of my_host: (config)#interface ppp 1 (config-ppp 1)#ppp chap hostname my_host
60000CRG0-35B
2297
Default Values
By default, there is no defined PPP CHAP password.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example specifies a PPP CHAP password of my_password: (config)#interface ppp 1 (config-ppp 1)#ppp chap password my_password
60000CRG0-35B
2298
Default Values
By default, the PPP MTU on an interface is set to 1500 bytes.
Command History
Release 17.9 Command was introduced.
Usage Examples
The following example specifies a PPP MTU of 1200 on the PPP interface: (config)#interface ppp 1 (config-ppp 1)#ppp mtu 1200
60000CRG0-35B
2299
ppp multilink
Use the ppp multilink command to enable Multilink Point-to-Point Protocol (MLPPP) operation on an existing Point-to-Point Protocol (PPP) interface. Use the no form of this command to disable this feature. Variations of this command include:
ppp multilink fragmentation ppp multilink interleave ppp multilink maximum <number>
Syntax Description
fragmentation interleave maximum <number> Enables multilink fragmentation operation. Enables multilink interleave operation. Specifies the maximum number of links allowed in a PPP multilink bundle.
Default Values
By default, MLPPP is disabled.
Command History
Release 7.1 Release 7.2 Release 11.1 Command was introduced. Fragmentation and interleave operation were added. Command was expanded to include the demand interface.
Functional Notes
When enabled, this interface is capable of the following: Combining multiple physical links into one logical link. Receiving upper layer protocol data units (PDUs), fragmenting and transmitting over the physical links. Receiving fragments over the physical links and reassembling them into PDUs.
The fragmentation and interleave options can be used to enhance the multilink operation. Fragmentation is used to reduce serialization delays of large packets. The fragmentation process evenly divides the data among all links in the bundle with a minimum packet size of 96 bytes. The interleave operation is used with streaming protocols to reduce delay by giving priority to packets identified as high priority. In order delivery is guaranteed with multilink fragmentation, but is not guaranteed with multilink interleave operation. The multilink bundle will remain active with a minimum of one physical link. Physical links may be dynamically added or removed from the multilink bundle with minor interruption to traffic flow.
Usage Examples
The following example enables MLPPP: (config)#interface ppp 1 (config-ppp 1)#ppp multilink
60000CRG0-35B
2300
Default Values
By default, there is no defined ppp pap sent-username and password.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example specifies a PPP PAP sent user name of local and a password of my_password: (config)#interface ppp 1 (config-ppp 1)#ppp pap sent-username local password my_password
60000CRG0-35B
2301
Default Values
By default, no AC is specified.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example identifies the AC with which AOS expects to establish a PPPoE session: (config)#interface ppp 1 (config-ppp 1)#pppoe ac-name Access_Controller_Name
60000CRG0-35B
2302
Default Values
By default, no names are specified.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example defines a service type that is not to be accepted by AOS: (config)#interface ppp 1 (config-ppp 1)#pppoe service-name Service_Name
60000CRG0-35B
2303
qos-policy
Use the qos-policy command to apply a previously configured quality of service (QoS) map to incoming or outgoing packets on an interface. Use the no form of this command to remove the map from the interface. Variations of this command include:
qos-policy in <name> qos-policy out <name>
Syntax Description
<name> in out Specifies the name of a previously created QoS map (refer to qos map <name> <number> on page 1184 for more information). Assigns a QoS map to this interface's input. Assigns a QoS map to this interface's output.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 15.1 Command was introduced. Command was expanded to include the in parameter.
Functional Notes
When a QoS policy is applied to an interface, it may be disabled if the interface bandwidth is not adequate to support the requested bandwidth on the map set. Once the bandwidth problem is resolved, the map will work again. The bandwidth will be rechecked on any of the following changes: 1. A priority or class-based entry is added to, deleted from, or changed in a QoS map set. 2. The interface bandwidth is changed by the bandwidth command on the interface. 3. A QoS policy is applied to an interface. 4. A cross connect is created that includes an interface with a QoS policy. 5. The interface queuing method is changed to fair-queue to use weighted fair queuing (WFQ). 6. The interface operational status changes. 7. The interface bandwidth changes for other reasons (e.g., when asymmetric digital subscriber line (ADSL) finishes training). In order to prevent the map from being disabled in cases of temporary inadequate bandwidth (e.g., a single link goes down in a dual T1 multilink configuration where the map requests more than one T1's worth of bandwidth), the QoS map uses the maximum theoretical bandwidth on an interface, not the actual bandwidth at that time. This actually helps QoS keep higher priority class-based traffic working better than best-effort traffic when the bandwidth drops.
60000CRG0-35B
2304
Usage Examples
The following example applies the QoS map VOICEMAP to the Point-to-Point Protocol (PPP) 1 interface: (config)#interface ppp 1 (config-ppp 1)#qos-policy out VOICEMAP
60000CRG0-35B
2305
rtp quality-monitoring
Use the rtp quality-monitoring command to enable voice quality monitoring (VQM) of the Realtime Transport Protocol (RTP) voice stream packets on this interface. If the global command (ip rtp quality-monitoring) is disabled when this command is issued, the system will return the following warning: Applied but not used, you must globally enable ip rtp quality-monitoring to use VQM. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, VQM is enabled on all wide area network (WAN) and local area network (LAN) interfaces.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables RTP quality monitoring on the virtual Point-to-Point Protocol (PPP) interface: (config)#interface ppp 1 (config-ppp 1)#rtp quality-monitoring
60000CRG0-35B
2306
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Release 17.2 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface. Command was expanded to the cellular interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the virtual Point-to-Point Protocol (PPP) interface: (config)#interface ppp 1 (config-ppp 1)#no snmp trap link-status
60000CRG0-35B
2307
Default Values
By default, there is no established user name and password.
Command History
Release 1.1 Command was introduced.
Functional Notes
Password Authentication Protocol (PAP) uses this entry to check received information from the peer. Challenge-Handshake Authentication Protocol (CHAP) uses this entry to check the received peer host name and a common password.
Usage Examples
The following example creates a user name of ADTRAN with password ADTRAN for the PPP link labeled 5: (config)#interface ppp 5 (config-ppp 5)#username ADTRAN password ADTRAN
60000CRG0-35B
2308
Keep in mind that changing an interfaces VRF association will clear all IP-related settings on that interface. Syntax Description
<name> Specifies the name of the VRF to which to assign the interface.
Default Values
By default, interfaces are associated with the default VRF that is unnumbered.
Command History
Release 16.1 Release 17.8 Command was introduced. The keyword ip was removed from this command.
Functional Notes
VRF instances must be created first before an interface can be assigned. An interface can only be assigned to one VRF, but multiple interfaces can be assigned to the same VRF. An interface will only forward IP traffic that matches its associated VRF. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured.
Usage Examples
The following example assigns the Point-to-Point Protocol (PPP) 1 interface to the VRF instance named RED: (config)#interface ppp 1 (config-ppp 1)#vrf forwarding RED
60000CRG0-35B
2309
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. bandwidth <value> on page 2312 crypto map <name> on page 2313 dial-backup commands begin on page 2315 dynamic-dns on page 2332 ip commands begin on page 2335 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2370 keepalive on page 2371 lldp receive on page 2372 lldp send on page 2373 media-gateway ip on page 2375 snmp trap on page 2376 snmp trap link-status on page 2377 tunnel checksum on page 2378 tunnel destination <ip address> on page 2379 tunnel key <value> on page 2380 tunnel mode gre on page 2381 tunnel sequence-datagrams on page 2382 tunnel source on page 2383
60000CRG0-35B
2310
tunnel vrf <name> on page 2385 vrf forwarding <name> on page 2386
60000CRG0-35B
2311
bandwidth <value>
Use the bandwidth command to provide the bandwidth value of an interface to the higher level protocols. This value is used in cost calculations. Use the no form of this command to restore the default value. Syntax Description
<value> Specifies bandwidth in kbps. Range is 1 to 4294967295 kbps.
Default Values
To view the default values, use the show interfaces command.
Command History
Release 3.1 Release 5.1 Release 6.1 Release 9.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the virtual local area network (VLAN) interfaces. Command was expanded to include the tunnel interfaces.
Functional Notes
The bandwidth command is an informational value that is communicated to the higher level protocols to be used in cost calculations. This is a routing parameter only and does not affect the physical interface.
Usage Examples
The following example sets bandwidth of the tunnel 1 interface to 10 Mbps: (config)#interface tunnel 1 (config-tunnel 1)#bandwidth 10000
60000CRG0-35B
2312
For virtual private network (VPN) configuration example scripts, refer to the VPN configuration guide available on the AOS Documentation CD shipped with your product.
Syntax Description
<name> Assigns a crypto map name to the interface.
Default Values
By default, no crypto maps are assigned to an interface.
Command History
Release 4.1 Command was introduced.
Functional Notes
When configuring a system to use both the stateful inspection firewall and Internet key exchange (IKE) negotiation for VPN, keep the following notes in mind. When defining the policy class and associated access control lists (ACLs) that describe the behavior of the firewall, do not forget to include the traffic coming into the system over a VPN tunnel terminated by the system. The firewall should be set up with respect to the unencrypted traffic that is destined to be sent or received over the VPN tunnel. The following diagram represents typical AOS data-flow logic.
60000CRG0-35B
2313
IPSec Decrypt/Discard
IPSec Encrypt
NAT/ACP/ Firewall
Router
As shown in the diagram above, data coming into the product is first processed by the static filter associated with the interface on which the data is received. This access group is a true static filter and is available for use regardless of whether the firewall is enabled or disabled. Next (if the data is encrypted), it is sent to the IPSec engine for decryption. The decrypted data is then processed by the stateful inspection firewall. Therefore, given a terminating VPN tunnel, only unencrypted data is processed by the firewall. The ACLs for a crypto map on an interface work in reverse logic to the ACLs for a policy class on an interface. When specifying the ACLs for a crypto map, the source information is the private local side, unencrypted source of the data. The destination information will be the far-end, unencrypted destination of the data. However, ACLs for a policy class work in reverse. The source information for the ACL in a policy class is the far end. The destination information is the local side.
Usage Examples
The following example applies all crypto maps with the name MyMap to the tunnel interface: (config)#interface tunnel 1 (config-tunnel 1)#crypto map MyMap
60000CRG0-35B
2314
dial-backup auto-backup
Use the dial-backup auto-backup command to configure the interface to automatically attempt a dial backup upon failure. Use the no form of this command to disable this feature. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of dial-backup call-mode on page 2318. Syntax Description
No subcommands.
Default Values
By default, all backup endpoints will automatically attempt dial backup upon a failure.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example enables automatic dial backup on the endpoint: (config)#interface tunnel 1 (config-tunnel 1)#dial-backup auto-backup
60000CRG0-35B
2315
dial-backup auto-restore
Use the dial-backup auto-restore command to configure the interface to automatically discontinue dial backup when all network conditions are operational. Use the no form of this command to disable the auto-restore feature. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of dial-backup call-mode on page 2318. Syntax Description
No subcommands.
Default Values
By default, all backup endpoints will automatically restore the primary connection when the failure condition clears.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to automatically restore the primary connection when the failure condition clears: (config)#interface tunnel 1 (config-tunnel 1)#dial-backup auto-restore
60000CRG0-35B
2316
Default Values
By default, the dial-backup backup-delay period is set to 10 seconds.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to wait 60 seconds (on an endpoint with an active alarm condition) before attempting dial-backup operation: (config)#interface tunnel 1 (config-tunnel 1)#dial-backup backup-delay 60
60000CRG0-35B
2317
dial-backup call-mode
Use the dial-backup call-mode command to specify whether the configured backup interface answers or originates (or a combination of both) backup calls. Use the no form of this command to return to the default value. Variations of this command include:
dial-backup call-mode answer dial-backup call-mode answer-always dial-backup call-mode originate dial-backup call-mode originate-answer dial-backup call-mode originate-answer-always
Syntax Description
answer answer-always originate originate-answer originate-answer-always Answers and backs up primary link on failure. Answers and backs up regardless of primary link state. Originates backup call on primary link failure. Originates or answers call on primary link failure. Originates on failure; answers and backs up always.
Default Values
By default, the dial-backup call-mode is set to originate-answer.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Functional Notes
The majority of the configuration for AOS dial-backup implementation is configured via the dial-backup PPP interface configuration commands. However, the numbers dialed are configured in the primary interface. Full sample configurations follow: Sample configuration for remote router (dialing out) hostname Remote3200 enable password adtran ! interface eth 0/1 ip address 192.168.1.254 255.255.255.0 no shutdown ! interface modem 1/3 no shutdown ! interface t1 1/1
60000CRG0-35B
2318
Command Reference Guide coding b8zs framing esf clock source line tdm-group 1 timeslots 1-24 no shutdown ! interface fr 1 point-to-point frame-relay lmi-type ansi no shutdown cross-connect 1 t1 1/1 1 fr 1 ! interface fr 1.16 point-to-point frame-relay interface-dlci 16 ip address 10.1.1.2 255.255.255.252 dial-backup call-mode originate dial-backup number 5551111 analog ppp1 dial-backup number 5552222 analog ppp1 no shutdown ! interface ppp 1 ip address 172.22.56.1 255.255.255.252 ppp authentication chap username remoterouter password remotepass ppp chap hostname localrouter ppp chap password adtran no shutdown ! ip route 192.168.2.0 255.255.255.0 172.22.56.2 255.255.255.252 ! line telnet 0 4 password password Sample configuration for central router (dialing in) hostname Central3200 enable password adtran ! interface eth 0/1 ip address 192.168.100.254 255.255.255.0 no shutdown ! interface modem 1/3 no shutdown ! interface t1 1/1 coding b8zs framing esf clock source line
60000CRG0-35B
2319
Command Reference Guide tdm-group 1 timeslots 1-24 no shutdown ! interface fr 1 point-to-point frame-relay lmi-type ansi no shutdown cross-connect 1 t1 1/1 1 fr 1 ! interface fr 1.100 point-to-point frame-relay interface-dlci 100 ip address 10.1.1.1 255.255.255.252 dial-backup call-mode answer dial-backup number 555-8888 analog ppp 1 ! interface ppp 1 ip address 172.22.56.2 255.255.255.252 ppp authentication chap username localrouter password adtran ppp chap hostname remoterouter ppp chap password remotepass no shutdown ! ip route 192.168.1.0 255.255.255.0 172.22.56.1 255.255.255.252 line telnet 0 4 password password
Usage Examples
The following example configures AOS to generate backup calls for this endpoint using an analog modem interface (to phone number 555 1111), but never answer calls and specifies ppp 2 as the backup interface: (config)#interface tunnel 1 (config-tunnel 1)#dial-backup call-mode originate (config-tunnel 1)#dial-backup number 555 1111 analog ppp 2
60000CRG0-35B
2320
Technology Review
This technology review provides information regarding specific dial-backup router behavior (i.e., when the router will perform dial backup, where in the configuration AOS accesses specific routing information, etc.): Dialing Out 1. AOS determines to place an outbound call when either the Layer 1 or Layer 2 has a failure. 2. When placing outbound calls, AOS matches the number dialed to a PPP interface. This is accomplished with an addition to the dial-backup number command (refer to dial-backup number on page 2325). 3. When placing the call, AOS uses the configuration of the related PPP interface for authentication and IP negotiation. 4. If the call fails to connect on the first number dialed, AOS places a call to the second number (if a second number is configured). The second number to be dialed references a separate PPP interface. Dialing In 1. AOS receives an inbound call on a physical interface. 2. Caller ID is used to match the dial-backup number command to the configured PPP interface. 3. If a match is found, the call connects and AOS pulls down the primary connection if it is not already in a down state. 4. If no match is found from caller ID, the call is terminated.
60000CRG0-35B
2321
Default Values
By default, the dial-backup connect-timeout period is set to 60 seconds.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to wait 120 seconds before retrying a failed dial-backup call: (config)#interface tunnel 1 (config-tunnel 1)#dial-backup connect-timeout 120
60000CRG0-35B
2322
dial-backup force
Use the dial-backup force command to manually override the automatic dial-backup feature. This can be used to force a link into backup to allow maintenance to be performed on the primary link without disrupting data. Use the no form of this command to return to the normal dial-backup operation state. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of dial-backup call-mode on page 2318. Variations of this command include:
dial-backup force backup dial-backup force primary
Syntax Description
backup primary Force backup regardless of primary link state. Force primary link regardless of its state.
Default Values
By default, this feature is disabled.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to force this interface into dial backup: (config)#interface tunnel 1 (config-tunnel 1)#dial-backup force backup
60000CRG0-35B
2323
Default Values
By default, dial-backup maximum-retry is set to 0 attempts.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to retry a dial-backup call four times before considering backup operation not available: (config)#interface tunnel 1 (config-tunnel 1)#dial-backup maximum-retry 4
60000CRG0-35B
2324
dial-backup number
Use the dial-backup number command to configure the phone number and the call type the router will dial upon network failure. Multiple entries can be made for an interface to allow alternate sites to be dialed. Use the no form of this command to return to the default setting. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 2318. Variations of this command include:
dial-backup number <number> analog ppp <interface> dial-backup number <number> digital-56k <isdn min chan> <isdn max chan> ppp <interface> dial-backup number <number> digital-64k <isdn min chan> <isdn max chan> ppp <interface>
Syntax Description
<number> analog digital-56k digital-64k <isdn min chan> <isdn max chan> ppp <interface> Specifies the phone numbers to call when the backup is initiated. Indicates the number connects to an analog modem. Indicates the number belongs to a digital 56 kbps per DS0 connection. Indicates the number belongs to a digital 64 kbps per DS0 connection. Specifies the minimum number of DS0s required for a digital 56 or 64 kbps connection. Range is 1 to 24. Specifies the maximum number of DS0s desired for a digital 56 or 64 kbps connection. Range is 1 to 24. Specifies the Point-to-Point Protocol (PPP) interface to use as the backup for this interface.
Default Values
By default, there are no configured dial-backup numbers.
Command History
Release 1.1 Release 5.1 Release 17.2 Release 17.3 Command was introduced. Command was expanded to include the PPP interface. Command was expanded to include the cellular connections. Cellular connections were removed from this command.
Usage Examples
The following example configures AOS to dial 704-555-1212 (digital 64 kbps connection) to initiate dial-backup operation on this endpoint using interface ppp 1 backup interface: (config)#interface tunnel 1 (config-tunnel 1)#dial-backup number 7045551212 digital-64k 1 1 ppp 1
60000CRG0-35B
2325
Default Values
By default, dial-backup priority is set to 50.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example assigns the highest priority to this endpoint: (config)#interface tunnel 1 (config-tunnel 1)#dial-backup priority 100
60000CRG0-35B
2326
dial-backup randomize-timers
Use the dial-backup randomize-timers command to randomize the call timers to minimize potential contention for resources. Use the no form of this command to return to the default value. For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 2318. Syntax Description
No subcommands.
Default Values
By default, AOS does not randomize the dial-backup call timers.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to randomize the dial-backup timers associated with this endpoint: (config)#interface tunnel 1 (config-tunnel 1)#dial-backup randomize-timers
60000CRG0-35B
2327
Default Values
By default, dial-backup redial-delay is set to 10 seconds.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures a redial delay of 25 seconds on this endpoint: (config)#interface tunnel 1 (config-tunnel 1)#dial-backup redial-delay 25
60000CRG0-35B
2328
Default Values
By default, dial-backup restore-delay is set to 10 seconds.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example configures AOS to wait 30 seconds before disconnecting dial-backup operation and restoring the primary connection for this endpoint: (config)#interface tunnel 1 (config-tunnel 1)#dial-backup restore-delay 30
60000CRG0-35B
2329
dial-backup schedule
Use the dial-backup schedule command to set the time of day that backup will be enabled. Use this command if backup is desired only during normal business hours and on specific days of the week. Use the no form of this command to disable dial backup (as specified). For more detailed information on dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 2318. Variations of this command include:
dial-backup schedule day <name> dial-backup schedule enable-time <value> dial-backup schedule disable-time <value>
Syntax Description
day <name> enable-time <value> disable-time <value> Sets the days to allow backup. Valid range is Monday through Sunday. Sets the time of day to enable backup. Time is entered in a 24-hour format (00:00). Sets the time of day to disable backup. Time is entered in a 24-hour format (00:00).
Default Values
By default, dial backup is enabled for all days and times if the dial-backup auto-backup command has been issued and the dial-backup schedule has not been entered.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the Point-to-Point Protocol (PPP) interface.
Usage Examples
The following example enables dial backup Monday through Friday 8:00 a.m. to 7:00 p.m.: (config)#interface tunnel 1 (config-tunnel 1)#dial-backup schedule enable-time 08:00 (config-tunnel 1)#dial-backup schedule disable-time 19:00 (config-tunnel 1)#no dial-backup schedule day Saturday (config-tunnel 1)#no dial-backup schedule day Sunday
60000CRG0-35B
2330
dial-backup shutdown
Use the dial-backup shutdown command to deactivate all dial-backup functionality in the unit. Dial-backup configuration parameters are kept intact, but the unit will not initiate (or respond) to dial-backup sequences in the event of a network outage. Use the no form of this command to reactivate the dial-backup interface. For more detailed information on Point-to-Point Protocol (PPP) dial-backup functionality, refer to the Functional Notes and Technology Review sections of the command dial-backup call-mode on page 2318. Syntax Description
No subcommands.
Default Values
By default, all AOS interfaces are disabled.
Command History
Release 1.1 Release 5.1 Command was introduced. Command was expanded to include the PPP interface.
Usage Examples
The following example deactivates the configured dial-backup interface: (config)#interface tunnel 1 (config-tunnel 1)#dial-backup shutdown
60000CRG0-35B
2331
dynamic-dns
Use the dynamic-dns command to configure Dynamic DNS service provided by Dynamic Network Services, Inc. (www.dyndns.org). Use the no form of this command to disable this feature. Variations of this command include:
dynamic-dns custom <hostname> <minutes> dynamic-dns dyndns <hostname> <username> <password> dynamic-dns dyndns-custom <hostname> <username> <password> dynamic-dns dyndns-static <hostname> <username> <password>
Syntax Description
<hostname> <minutes> Specifies the host name for the server that updates the dynamic domain naming system (DNS). Specifies the intervals in minutes to update the server with information (updates also occur when the interfaces IP address changes regardless of the update intervals). Specifies a user name using an alphanumerical string up to 30 characters in length (the user name is case sensitive). Specifies a password using an alphanumerical string up to 30 characters in length (the password is case sensitive). Refer to Functional Notes below for additional argument descriptions.
<username> <password>
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 12.1 Release 15.1 Command was introduced. Command was expanded. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
custom - Constanttime.coms Custom Dynamic DNSSM service allows you complete access and management control over your domain name regardless of where you purchased/registered it. This allows you to manage IP address mappings (A records), domain aliases (CNAME records), and mail servers (mail exchange (MX) records). dyndns - The Dynamic DNSSM offered by Dynamic Network Services, Inc. (DynDNS.org) allows you to alias a dynamic IP address to a static host name in various domains. This allows your unit to be more easily accessed from various locations on the Internet. This service is provided for up to five host names.
60000CRG0-35B
2332
dyndns-custom - DynDNS.org's Custom DNSSM service provides a full DNS solution, giving you complete control over an entire domain name. A Web-based interface provides two levels of control over your domain, catering to average or advanced users. Five globally redundant DNS servers ensure that your domain will always resolve. A choice of two interfaces is available. The basic interface is designed for most users. It comes preconfigured for most common configurations and allows for easy creation of most common record types. The advanced interface is designed for system administrators with a solid DNS background and provides layout and functionality similar to a BIND zone file, allowing for the creation of nearly any record type. Custom DNSSM can be used with both static and dynamic IPs, and has the same automatic update capability through Custom DNS-aware clients as Dynamic DNS. dyndns-static - The Static DNS service is similar to DynDNS.orgs Dynamic DNSSM service in that it allows a host name, such as yourname.dyndns.org, to point to your IP address. Unlike a Dynamic DNS host, a Static DNS host does not expire after 35 days without updates; however, updates take longer to propagate through the DNS system. This service is provided for up to five host names. If your IP address does not change often or at all, but you still want an easy name to remember it by (without having to purchase your own domain name), Static DNS service is ideal for you. If you would like to use your own domain name (such as yourname.com), you need Custom DNS service that also provides full dynamic and static IP address support.
Usage Examples
The following example sets the Dynamic DNS to dyndns-custom with host name host, user name user, and password pass: (config)#interface tunnel 1 (config-tunnel 1)#dynamic-dns dyndns-custom host user pass
60000CRG0-35B
2333
ip access-policy <name>
Use the ip access-policy command to assign a specified access control policy (ACP) to an interface. ACPs are applied to traffic entering an interface. Use the no form of this command to remove an ACP association. For more information on using ACPs, refer to ip policy-class <ipv4 acp name> on page 985. Configured ACPs will only be active if the ip firewall command has been entered at the Global Configuration mode prompt to enable the AOS security features. All configuration parameters are valid, but no security data processing will be attempted unless the security features are enabled. Syntax Description
<name> Identifies the configured ACP by alphanumeric descriptor (all ACP descriptors are case sensitive).
Default Values
By default, there are no configured ACPs associated with an interface.
Command History
Release 2.1 Release 5.1 Release 6.1 Release 15.1 Release 17.9 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the virtual local area network (VLAN) interfaces. Command was expanded to include the bridged virtual interfaces (BVIs). Command was changed to require the ip keyword.
Functional Notes
To assign an ACP to an interface, enter the interface configuration mode for the desired interface and enter ip access-policy <name>.
Usage Examples
The following example associates the ACP PRIVATE (to allow inbound traffic to the Web server) to the tunnel interface 1: Enable the AOS security features: (config)#ip firewall Associate the access policy with the tunnel interface 1: (config)#interface tunnel 1 (config-tunnel 1)#ip access-policy PRIVATE
60000CRG0-35B
2334
ip access-group <name>
Use the ip access-group command to create an access control list (ACL) to be used for packets transmitted on or received from the specified interface. Use the no form of this command to disable this type of control. Variations of this command include:
ip access-group <name> in ip access-group <name> out
Syntax Description
<name> in out Assigns an IP ACL name. Enables access control on packets received on the specified interface. Enables access control on packets transmitted on the specified interface.
Default Values
By default, these commands are disabled.
Command History
Release 3.1 Release 9.1 Command was introduced. Command was expanded to include the tunnel interfaces.
Functional Notes
When this command is enabled, the IP destination address of each packet must be validated before being passed through. If the packet is not acceptable per these settings, it is dropped.
Usage Examples
The following example sets up the unit to only allow Telnet traffic (as defined in the user-configured TelnetOnly IP ACL) into the tunnel interface: (config)#ip access-list extended TelnetOnly (config-ext-nacl)#permit tcp any any eq telnet (config-ext-nacl)#interface tunnel 1 (config-tunnel 1)#ip access-group TelnetOnly in
60000CRG0-35B
2335
Syntax Description
<ip address> <subnet mask> Specifies a valid IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IP addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Optional. Configures a secondary IP address for the specified interface.
secondary
Default Values
By default, there are no assigned IP addresses.
Command History
Release 5.1 Release 9.1 Command was introduced. Command was expanded to include the tunnel interfaces.
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures an IP address of 192.22.72.101 255.255.255.252: (config)#interface tunnel 1 (config-tunnel 1)#ip address 192.22.72.101 255.255.255.252
60000CRG0-35B
2336
Default Values
By default, no IP address range is defined.
Command History
Release 17.4 Command was introduced.
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a range of secondary IP address from 192.22.72.1 to 192.22.72.10 on subnet 255.255.255.252: (config)#interface tunnel 1 (config-tunnel 1)#ip address range 192.22.72.1 192.22.72.10 255.255.255.252 secondary
60000CRG0-35B
2337
ip directed-broadcast
Use the ip directed-broadcast command to allow reception/forwarding of directed broadcasts. Use the no form of this command to disable this feature. Variations of this command include:
ip directed-broadcast ip directed-broadcast <name>
Syntax Description
<name> Specifies IP access control list (ACL) name.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Command was introduced.
Functional Notes
A directed broadcast is a packet intended for all nodes on a nonlocal network. For example, the broadcast address 255.255.255.255 reaches all nodes on a network; the directed broadcast address 128.1.255.255 is intended for all nodes whose network address is 128.1.0.0. A router not directly attached to 128.1.0.0 simply forwards the directed broadcast packet to the next hop. A router on network 128.1.0.0 that has ip directed-broadcast enabled, accepts and forwards the packet to all nodes whose network address is 128.1.0.0. Routers connecting subnets of 128.1.0.0 also accept and forward the packet to the nodes on their respective subnets. When a directed broadcast packet reaches a router that is directly connected to its destination subnet, that packet is distributed as a broadcast on the destination subnet. The packet is then sent as a link-layer broadcast. The ip directed-broadcast command controls the distribution of directed broadcasts when they reach their target subnets. Only the final transmission of the directed broadcast on its ultimate destination subnet is affected. It does not affect the transit unicast routing of IP directed broadcasts. If ip directed-broadcast is enabled for this interface, incoming IP packets whose addresses identify them as directed broadcasts intended for the subnet to which this interface is attached will be forwarded as broadcasts on that subnet. Forwarding of the packets can be limited by specifying an ACL with this command. In this case, only directed broadcasts that are permitted by the specified ACL will be forwarded, and all other directed broadcasts directed to this interface subnet will be dropped. Disabling the ip directed-broadcast command will cause directed broadcasts destined for the subnet to which this interface is attached to be dropped. This option is a requirement for routers as described in RFC 1812, section 4.2.2.11. Furthermore, it is disabled by default (RFC 2644) with the intended goal of reducing the efficacy of certain types of denial of service (DoS) attacks.
60000CRG0-35B
2338
Usage Examples
The following example enables forwarding of directed broadcasts on the interface tunnel 1: (config)#interface tunnel 1 (config-tunnel 1)#ip directed-broadcast
60000CRG0-35B
2339
ip ffe
Use the ip ffe command to enable the RapidRoute Engine on this interface with the default number of entries. Use the no form of this command to disable this feature. Variations of this command include:
ip ffe ip ffe max-entries <value>
Issuing this command will cause all RapidRoute entries on this interface to be cleared.
Syntax Description
max-entries <value> Optional. Specifies the maximum number of entries stored in the flow table. Valid range is from 1 to 8192.
Default Values
By default, the RapidRoute Engine is disabled. The default number of max-entries is 4096.
Command History
Release 13.1 Release 17.6 Command was introduced. Command was expanded to include the high level data link control (HDLC) and tunnel interfaces.
Functional Notes
RapidRoute can be used to help reduce routing overhead, reducing overall routing times. Routing times are reduced by the creation of a flow table on the ingress interface. The maximum number of entries that can be stored in the flow table at any one time may be specified by using the max-entries parameters.
Usage Examples
The following example enables RapidRoute and sets the maximum number of entries in the flow table to 50: (config)#interface tunnel 1 (config-tunnel 1)#ip ffe max-entries 50
60000CRG0-35B
2340
Technology Review
The RapidRoute system goal is to increase IP packet throughput by moving as much of the packet processing into the engine as possible. Packets are classified into flows based upon the IP protocol (Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), etc.), the source and destination IP addresses, IP type of service (ToS), and the protocol-specific information, such as the source and destination port numbers. Flows are defined as the unidirectional representation of a conversation between two IP hosts. Each ingress interface keeps its own flow table, a collection of flow entries. The first packet in a flow that is forwarded through the unit will build a flow entry. When a flow entry is looked up but no entry is found, a RapidRouteBuilder object is allocated and attached to the packet. As the packet passes through the various processing layers, each subsystem will add processing to the RapidRouteBuilder. When the packet is about to be forwarded out of the egress interface, the RapidRouteBuilder will be finalized. That is, the flow entry being built will be checked for completeness and committed to the flow table on the ingress interface. Subsequent flow matches can then bypass the normal processing layers.
60000CRG0-35B
2341
ip flow
Use the ip flow command to enable integrated traffic monitoring (ITM) for all traffic received or forwarded on an interface. Use the no form of this command to disable traffic monitoring. Variations of this command include:
ip flow egress ip flow egress <name> ip flow ingress ip flow ingress <name>
Syntax Description
egress ingress <name> Specifies that all outgoing traffic be monitored. Specifies that all incoming traffic be monitored. Optional. Specifies the name of an access control list (ACL) to use for filtering traffic.
Default Values
By default, no traffic monitoring is enabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables traffic monitoring on a tunnel interface to monitor incoming traffic through an ACL called myacl: (config)#interface tunnel 1 (config-tunnel 1)#ip flow ingress myacl
60000CRG0-35B
2342
Default Values
By default, broadcast UDP packets are not forwarded.
Command History
Release 1.1 Release 9.1 Command was introduced. Command was expanded to include the tunnel interfaces.
Functional Notes
When used in conjunction with the ip forward-protocol command, the ip helper-address feature allows you to customize which broadcast packets are forwarded. To implement the helper address feature, assign helper address(es) (specifying the device that needs to receive the broadcast traffic) to the interface closest to the host that transmits the broadcast packets. When broadcast packets (of the specified type forwarded using the ip forward-protocol command) are received on the interface, they will be forwarded to the device that needs the information. Only packets meeting the following criteria are considered eligible by the ip helper-address feature: 1. The packet IP protocol is UDP. 2. Any UDP port specified using the ip forward-protocol command. 3. The medium access control (MAC) address of the frame is an all-ones broadcast address (ffff.ffff.ffff). 4. The destination IP address is broadcast defined by all ones (255.255.255.255) or a subnet broadcast (for example, 192.33.4.251 for the 192.33.4.248 /30 subnet).
60000CRG0-35B
2343
Usage Examples
The following example forwards all DNS broadcast traffic to the DNS server with IP address 192.33.5.99: (config)#ip forward-protocol udp domain (config)#interface tunnel 1 (config-tunnel 1)#ip helper-address 192.33.5.99
60000CRG0-35B
2344
ip igmp
Use the ip igmp command to configure multicasting related functions for the interface. Variations of this command include:
ip igmp immediate-leave ip igmp last-member-query-interval <milliseconds> ip igmp querier-timeout <seconds> ip igmp query-interval <seconds> ip igmp query-max-response-time <seconds> ip igmp static-group <address> ip igmp version [1 | 2]
Syntax Description
immediate-leave Specifies that if only one host (or Internet Group Management Protocol (IGMP) snooping switch) is connected to the interface, when a leave is received, multicast of that group is immediately terminated as opposed to sending a group query and timing out the group if no device responds. Works in conjunction with ip igmp last-member-query-interval. Applies to all groups when configured. Use the no form of this command to disable the immediate-leave feature. Controls the timeout (in milliseconds) used to detect whether any group receivers remain on an interface after a receiver leaves a group. If a receiver sends a leave-group message (IGMP Version 2), the router sends a group-specific query on that interface. After twice the time specified by this command plus as much as one second longer, if no receiver responds, the router removes that interface from the group and stops sending that group's multicast packets to the interface. Range is 100 to 65535 ms. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) that the router waits after the current queriers last query before it takes over as querier (IGMP V2). Range is 60 to 300 seconds. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) at which IGMP queries are sent on an interface. Host query messages are addressed to the all-hosts multicast group with an IP time to live (TTL) of 1. The router uses queries to detect whether multicast group members are on the interface and to select an IGMP designated router (DR) for the attached segment (if more than one multicast router exists). Only the DR for the segment sends queries. For IGMP V2, the DR is the router with the lowest IP address on the segment. Range is 0 to 65535 seconds. Use the no form of this command to return to the default setting. Specifies the maximum response time (in seconds) advertised by this interface in queries when using IGMP V2. Hosts are allowed a random time within this period to respond, reducing response bursts. Use the no form of this command to return to the default setting.
last-member-query-interval <milliseconds>
querier-timeout <seconds>
query-interval <seconds>
query-max-response-time <seconds>
60000CRG0-35B
2345
Syntax Description
static-group <address> Configures the router's interface to be a statically connected member of the specified group. Packets received on the correct reverse path forwarding (RPF) interface are forwarded to this interface regardless of whether any receivers have joined the specified group using IGMP. Use the no form of this command to remove a configured static group. Sets the interfaces IGMP version. Use the no form of this command to return to the default setting.
version [1 | 2]
Default Values
ip igmp immediate-leave ip igmp last-member-query-interval ip igmp querier-timeout ip igmp query-interval ip igmp query-max-response-time ip igmp static-group ip igmp version No default 1000 milliseconds 2x the query-interval value 60 seconds 10 seconds No default Version 1
Command History
Release 7.1 Release 8.1 Release 9.1 Command was introduced. Asynchronous transfer mode (ATM) subinterface was added. Tunnel subinterface was added.
Usage Examples
The following example sets the query message interval on the interface to 200 milliseconds: (config)#interface tunnel 1 (config-tunnel 1)#ip igmp last-member-query-interval 200
60000CRG0-35B
2346
ip mcast-stub downstream
Use the ip mcast-stub downstream command to enable multicast forwarding and Internet Group Management Protocol (IGMP) (router mode) on an interface and to place it in multicast stub downstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Release 9.1 Command was introduced. Command was expanded to include the tunnel interfaces.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub upstream commands. Downstream interfaces connect to segments with multicast hosts. Multiple interfaces may be configured in downstream mode; however, interfaces connecting to the multicast network (upstream) should not be configured in downstream mode. Interfaces configured as downstream should have the lowest IP address of all IGMP-capable routers on the connected segment in order to be selected as the designated router (DR) and ensure proper forwarding. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub upstream on page 2350 for more information.
Usage Examples
The following example enables multicast forwarding and IGMP on the interface: (config)#interface tunnel 1 (config-tunnel 1)#ip mcast-stub downstream
60000CRG0-35B
2347
ip mcast-stub fixed
Use the ip mcast-stub fixed command to allow forwarding of multicast traffic on a selected interface after enabling multicast routing. Use the no form of this command to disable this mode. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 12.1 Command was introduced.
Functional Notes
Multicast routing must be enabled prior to setting ip mcast-stub fixed on the selected interface. Also, use the command ip igmp static-group <address> (refer to ip igmp on page 2345) to receive multicast traffic without host-initiated Internet Group Management Protocol (IGMP) activity on the selected interface. Otherwise, all host-initiated IGMP transactions will enter multicast routes on the routers interface involved with IGMP activities.
Usage Examples
The following example enables multicast traffic forwarding and IGMP on the interface: (config)#interface tunnel 1 (config-tunnel 1)#ip mcast-stub fixed
60000CRG0-35B
2348
ip mcast-stub helper-enable
Use the ip mcast-stub helper-enable command to assign the ip mcast-stub helper-address as the Internet Group Management Protocol (IGMP) proxy. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 8.1 Release 9.1 Command was introduced. Command was expanded to include the tunnel interfaces.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address, ip mcast-stub upstream, and ip mcast-stub downstream commands. When enabled, the interface becomes a helper forwarding interface. The IGMP host function is dynamically enabled, and the interface becomes the active upstream interface, enabling the unit to perform as an IGMP proxy. Refer to ip mcast-stub helper-address <ip address> on page 968, ip mcast-stub downstream on page 2347, and ip mcast-stub upstream on page 2350 for more information.
Usage Examples
The following example sets the helper address as the IGMP proxy: (config)#interface tunnel 1 (config-tunnel 1)#ip mcast-stub helper-enable
60000CRG0-35B
2349
ip mcast-stub upstream
Use the ip mcast-stub upstream command to enable multicast forwarding on an interface and place it in multicast stub upstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Release 9.1 Command was introduced. Command was expanded to include the tunnel interfaces.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub downstream commands. When enabled, the interface becomes a candidate to be a helper forwarding interface. If chosen as the best path toward the helper address by the router's unicast route table, the Internet Group Management Protocol (IGMP) host function is dynamically enabled, and the interface becomes the active upstream interface, enabling the router to perform as an IGMP proxy. Though multiple interfaces may be candidates, no more than one interface will actively serve as the helper forwarding interface. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub downstream on page 2347 for more information.
Usage Examples
The following example enables multicast forwarding on the interface: (config)#interface tunnel 1 (config-tunnel 1)#ip mcast-stub upstream
60000CRG0-35B
2350
ip mtu <size>
Use the ip mtu command to configure the maximum transmission unit (MTU) size for the active interface. Use the no form of this command to return to the default value. Syntax Description
<size> Configures the window size for transmitted packets. The valid ranges for the various interfaces are listed below: ATM subinterfaces 64 to 1520 BVIs 64 to 2100 Demand interfaces 64 to 1520 Ethernet interfaces 64 to 1500 FDL interfaces 64 to 256 Frame Relay subinterfaces 64 to 1520 HDLC interfaces (NetVanta 5305) 64 to 4600 HDLC interfaces (all other NetVanta products) 64 to 2100 Loopback interfaces 64 to 1500 PPP interfaces (NetVanta 5305) 64 to 4600 PPP interfaces (all other NetVanta products) 64 to 2100 Tunnel interfaces 64 to 18190
Default Values
<size> The default values for the various interfaces are listed below: ATM subinterfaces 1500 BVIs 1500 Demand interfaces 1500 Ethernet interfaces 1500 FDL interfaces 256 Frame Relay subinterfaces 1500 HDLC interfaces 1500 Loopback interfaces 1500 PPP interfaces 1500 Tunnel interfaces 1476
Command History
Release 1.1 Release 11.1 Release 17.9 Command was introduced. Command was expanded to include the demand interface. Command was changed to require the ip keyword.
Functional Notes
Open shortest path first (OSPF) will not become adjacent on links where the MTU sizes do not match. If router A and router B are exchanging hello packets but their MTU sizes do not match, they will never reach adjacency. This is by design and required by the RFC.
60000CRG0-35B
2351
Usage Examples
The following example specifies an MTU of 1200 on the tunnel interface: (config)#interface tunnel 1 (config-tunnel 1)#ip mtu 1200
60000CRG0-35B
2352
ip ospf
Use the ip ospf command to customize open shortest path first (OSPF) settings (if needed). Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication-key <password> ip ospf cost <value> ip ospf dead-interval <seconds> ip ospf hello-interval <seconds> ip ospf message-digest-key [1 | 2] md5 <key> ip ospf priority <value> ip ospf retransmit-interval <seconds> ip ospf transmit-delay <seconds>
Syntax Description
authentication-key <password> cost <value> Assigns a simple-text authentication password to be used by other routers using the OSPF simple password authentication. Specifies the OSPF cost of sending a packet on the interface. This value overrides any computed cost value. Range is 1 to 65535. Sets the maximum interval (in seconds) allowed between hello packets. If the maximum is exceeded, neighboring devices will determine that the device is down. Range is 0 to 32767 seconds. Specifies the interval (in seconds) between hello packets sent on the interface. Range is 0 to 32767 seconds. Configures OSPF message digest 5 (MD5) authentication (16 byte maximum) keys. Sets the OSPF priority. The value set in this field helps determine the designated router (DR) for this network. Range is 0 to 255. Specifies the interval (in seconds) between link state advertisements (LSAs). Range is 0 to 32767 seconds. Sets the estimated time (in seconds) required to send a link state advertisement (LSA) on the interface. Range is 0 to 32767 seconds.
dead-interval <seconds>
Default Values
dead-interval <seconds> hello-interval <seconds> retransmit-interval <seconds> transmit-delay <seconds> 40 seconds 10 seconds: Ethernet, Frame Relay, Tunnel, and Point-to-Point Protocol (PPP) 5 seconds 1 second
60000CRG0-35B
2353
Command History
Release 3.1 Release 9.1 Command was introduced. Command was expanded to include the tunnel interfaces.
Usage Examples
The following example sets the maximum number of seconds allowed between hello packets to 25000: (config)#interface tunnel 1 (config-tunnel 1)#ip ospf dead-interval 25000
60000CRG0-35B
2354
ip ospf authentication
Use the ip ospf authentication command to authenticate an interface that is performing open shortest path first (OSPF) authentication. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication ip ospf authentication message-digest ip ospf authentication null
Syntax Description
message-digest null Optional. Selects message-digest authentication type. Optional. Specifies that no authentication is used.
Default Values
By default, this is set to null (meaning no authentication is used).
Command History
Release 3.1 Release 9.1 Command was introduced. Command was expanded to include the tunnel interfaces.
Usage Examples
The following example specifies that no authentication will be used on the tunnel interface: (config)#interface tunnel 1 (config-tunnel 1)#ip ospf authentication null
60000CRG0-35B
2355
ip ospf network
Use the ip ospf network command to specify the type of network on this interface. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf network broadcast ip ospf network point-to-point
Syntax Description
broadcast point-to-point Sets the network type for broadcast. Sets the network type for point-to-point.
Default Values
By default, Ethernet defaults to broadcast. Point-to-Point Protocol (PPP), Frame Relay, and tunnel default to point-to-point.
Command History
Release 3.1 Release 9.1 Command was introduced. Command was expanded to include the tunnel interfaces.
Functional Notes
A point-to-point network will not elect designated routers.
Usage Examples
The following example designates a broadcast network type: (config)#interface tunnel 1 (config-tunnel 1)#ip ospf network broadcast
60000CRG0-35B
2356
ip pim sparse-mode
Use the ip pim sparse-mode command to enable protocol-independent multicast (PIM) sparse mode for this interface. Use the no form of this command to disable PIM sparse mode. Syntax Description
No subcommands.
Default Values
By default, PIM sparse mode for this interface is disabled.
Command History
Release 11.1 Command was introduced.
Functional Notes
PIM sparse mode is a multicast routing protocol that makes use of the unicast forwarding table. It builds unidirectional shared trees rooted at a rendezvous point (RP) for a multicast group or a shortest-path tree rooted at a specific source for a multicast group.
Usage Examples
The following example enables PIM sparse mode on the interface: (config)#interface tunnel 1 (config-tunnel 1)#ip pim sparse-mode
60000CRG0-35B
2357
Default Values
By default, the priority of all protocol-independent multicast (PIM) interfaces is 1.
Command History
Release 11.1 Command was introduced.
Functional Notes
Interfaces advertise their configured priority values in the hello messages transmitted on the interface. Routers use the priority values to determine the appropriate DR. The router on the network segment with the highest priority is selected as the DR. If a hello message is received on the interface from a router on the network segment and it does not contain a priority, the entire network segment defaults to DR selection based on IP addresses instead of priority. In this instance, the DR is selected as the router on the network segment that has the highest IP address. AOS will always include a priority in all transmitted hello messages. If no priority is specifically designated by the user, the priority is set as the default of 1.
Usage Examples
The following example specifies a priority of 100 on the tunnel 1 interface: (config)#interface tunnel 1 (config-tunnel 1)#ip pim-sparse dr-priority 100
60000CRG0-35B
2358
Default Values
By default, the hellos are transmitted on PIM interfaces every 60 seconds.
Command History
Release 11.1 Command was introduced.
Functional Notes
Hello messages are used to inform neighbors of a routers presence. Hello messages normally generate a small amount of traffic on an interface. Setting the hello-timer to a small interval increases the number of hellos sent (thus increasing the amount of traffic). Set the hello-timer to a reasonable value, taking into consideration the bandwidth available on the interface.
Usage Examples
The following example specifies hellos be sent on the tunnel 1 interface every 3600 seconds: (config)#interface tunnel 1 (config-tunnel 1)#ip pim-sparse hello-timer 3600
60000CRG0-35B
2359
Default Values
By default, the nbr-timeout is set to 105 seconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the neighbor timeout to 300 seconds: (config)#interface tunnel 1 (config-tunnel 1)#ip pim-sparse nbr-timeout 300
60000CRG0-35B
2360
Default Values
By default, the override interval is set to 2500 milliseconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the override interval to 3000 milliseconds: (config)#interface tunnel 1 (config-tunnel 1)#ip pim-sparse override-interval 3000
60000CRG0-35B
2361
Default Values
By default, the propagation delay is set to 500 milliseconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the propagation delay to 300 milliseconds: (config)#interface tunnel 1 (config-tunnel 1)#ip pim-sparse propagation-delay 300
60000CRG0-35B
2362
Default Values
By default, no policy route map is assigned to this interface.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example assigns the policy route map policy1 to the interface: (config)#interface tunnel 1 (config-tunnel 1)#ip policy route-map policy1
60000CRG0-35B
2363
ip proxy-arp
Use the ip proxy-arp command to enable proxy Address Resolution Protocol (ARP) on the interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, proxy ARP is enabled.
Command History
Release 9.1 Command was introduced.
Functional Notes
In general, the principle of proxy ARP allows a router to insert its IP address in the source IP address field of a packet (if the packet is from a host on one of its subnetworks). This allows hosts to reach devices on other subnetworks without implementing routing or specifying a default gateway. If proxy ARP is enabled, AOS will respond to all proxy ARP requests with its specified medium access control (MAC) address and forward packets accordingly. Enabling proxy ARP on an interface may introduce unnecessary ARP traffic on the network.
Usage Examples
The following example enables proxy ARP on the tunnel interface: (config)#interface tunnel 1 (config-tunnel 1)#ip proxy-arp
60000CRG0-35B
2364
Syntax Description
1 2 Accepts only received RIP version 1 packets on the interface. Accepts only received RIP version 2 packets on the interface.
Default Values
By default, all interfaces implement RIP version 1 (the default value for the version command).
Command History
Release 9.1 Command was introduced.
Functional Notes
Use the ip rip receive version command to specify a RIP version that overrides the version (in the Router RIP) configuration. Refer to version on page 2687 for more information. AOS only accepts one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the tunnel interface to accept only RIP version 2 packets: (config)#interface tunnel 1 (config-tunnel 1)#ip rip receive version 2
60000CRG0-35B
2365
Syntax Description
1 2 Transmits only RIP version 1 packets on the interface. Transmits only RIP version 2 packets on the interface.
Default Values
By default, all interfaces transmit RIP version 1 (the default value for the version command).
Command History
Release 9.1 Command was introduced.
Functional Notes
Use the ip rip send version command to specify a RIP version that overrides the version (in the Router RIP) configuration. Refer to version on page 2687 for more information. AOS only transmits one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the tunnel interface to transmit only RIP version 2 packets: (config)#interface tunnel 1 (config-tunnel 1)#ip rip send version 2
60000CRG0-35B
2366
Default Values
By default, no manual summarization is applied by RIP.
Command History
Release 12.1 Command was introduced.
Functional Notes
Unlike the automatic summarization on classful network boundaries, only specific network advertisements are made by RIP using the ip rip summary-address command. This command is only effective if RIP version 2 is configured.
Usage Examples
The following example enables manual summarization on the specified IP address: (config)#interface tunnel 1 (config-tunnel 1)#ip rip summary-address 10.10.123.0 255.255.255.0
60000CRG0-35B
2367
ip route-cache
Use the ip route-cache command to enable fast-cache switching on the interface. Use the no form of this command to disable fast-cache switching and return to process switching mode. Using network address translation (NAT) or the AOS firewall capabilities on an interface requires process switching mode (using the no ip route-cache command).
Syntax Description
No subcommands.
Default Values
By default, fast-cache switching is enabled on all Ethernet and virtual Frame Relay subinterfaces. IP route cache is enabled for all virtual Point-to-Point Protocol (PPP) interfaces.
Command History
Release 9.1 Command was introduced.
Functional Notes
Fast switching allows an IP interface to provide optimum performance when processing IP traffic.
Usage Examples
The following example enables fast switching on the tunnel interface: (config)#interface tunnel 1 (config-tunnel 1)#ip route-cache
60000CRG0-35B
2368
ip urlfilter <name>
Use the ip urlfilter command to apply a universal resource locator (URL) filter to the interface for all inbound or outbound traffic. Use the no form of this command to remove the URL filter from an interface. Variations of this command include:
ip urlfilter <name> in ip urlfilter <name> out
Syntax Description
<name> in out Specifies the URL filter name to use on the interface. Applies the filter to the inbound traffic. Applies the filter to the outbound traffic.
Default Values
By default, there are no URL filters applied to any interfaces.
Command History
Release 12.1 Release 14.1 Command was introduced. Command was expanded to include the virtual local area network (VLAN) interfaces.
Functional Notes
The firewall must be enabled using the ip firewall command in order to use URL filters. The URL filter must be created by using the ip urlfilter <name> http command before applying it to the interface. Refer to ip urlfilter <name> http on page 1090 for more information on using this command.
Usage Examples
The following example performs URL filtering on all traffic entering through the tunnel interface and matches the URL filter named MyFilter: (config)#interface tunnel 1 (config-tunnel 1)#ip urlfilter MyFilter in
60000CRG0-35B
2369
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface tunnel 1 (config-tunnel 1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2370
keepalive
Use the keepalive command to periodically send keepalive packets to verify the integrity of the tunnel from end to end. Use the no form of this command to disable keepalives. Variations of this command include:
keepalive keepalive <value> keepalive <value> <number>
Syntax Description
<value> <number> Defines the time interval (in seconds) between transmitted keepalive packets. Valid range is 1 to 32767 seconds. Defines the number of times to retry after failed keepalives before determining that the tunnel endpoint is down. Valid range is 1 to 255 times.
Default Values
By default, keepalives are disabled. When enabled, the keepalive period defaults to 10 seconds and the retry count defaults to 3 times.
Command History
Release 9.1 Command was introduced.
Functional Notes
Keepalives do not have to be configured on both ends of the tunnel in order to work. A tunnel is not aware of incoming keepalive packets.
Usage Examples
The following example enables keepalive with a period of 30 seconds and a retry count of 5 times: (config)#interface tunnel 1 (config-tunnel 1)#keepalive 30 5
60000CRG0-35B
2371
lldp receive
Use the lldp receive command to allow Link Layer Discovery Protocol (LLDP) packets to be received on this interface. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, all interfaces are configured to send and receive LLDP packets.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example configures the tunnel interface to receive LLDP packets: (config)#interface tunnel 1 (config-tunnel 1)#lldp receive
60000CRG0-35B
2372
lldp send
Use the lldp send command to configure this interface to transmit Link Layer Discovery Protocol (LLDP) packets or to control the types of information contained in the LLDP packets transmitted by this interface. Use the no form of this command to disable this feature. Variations of this command include:
lldp send lldp send management-address lldp send port-description lldp send system-capabilities lldp send system-description lldp send system-name lldp send-and-receive
Syntax Description
management-address port-description system-capabilities system-description system-name and-receive Enables transmission of management address information on this interface. Enables transmission of port description information on this interface. Enables transmission of this devices system capabilities on this interface. Enables transmission of this devices system description on this interface. Enables transmission of this devices system name on this interface. Configures this interface to both transmit and receive LLDP packets.
Default Values
By default, all interfaces are configured to transmit and receive LLDP packets of all types.
Command History
Release 9.1 Command was introduced.
Functional Notes
Individual LLDP information can be enabled or disabled using the various forms of the lldp send command. For example, use the lldp send-and-receive command to enable transmit and receive of all LLDP information. Then use the no lldp send port-description command to prevent LLDP from transmitting port description information.
60000CRG0-35B
2373
Usage Examples
The following example configures the tunnel interface to transmit LLDP packets containing all enabled information types: (config)#interface tunnel 1 (config-tunnel 1)#lldp send The following example configures the tunnel interface to transmit and receive LLDP packets containing all information types: (config)#interface tunnel 1 (config-tunnel 1)#lldp send-and-receive
60000CRG0-35B
2374
media-gateway ip
Use the media-gateway ip command to associate an IP address source to use for Realtime Transport Protocol (RTP) traffic. When configuring Voice over Internet Protocol (VoIP), RTP traffic must have an IP address associated with it. However, some interfaces allow dynamic configuration of IP addresses, causing this value to change periodically. Use the no form of this command to disable this function. Variations of this command include:
media-gateway ip loopback <interface id> media-gateway ip primary media-gateway ip secondary <ip address>
Syntax Description
loopback <interface id> Specifies an IP address statically defined to a loopback interface for RTP traffic. This is helpful when using a single IP address across multiple wide area network (WAN) interfaces for RTP traffic. The valid range for loopback interface identifiers is 1 to 1024. The interface ID is used to uniquely identify a loopback interface. The entered value cannot be in use by another loopback interface. Specifies using this interfaces configured primary IP address for RTP traffic. Applies to static, Dynamic Host Configuration Protocol (DHCP), or negotiated addresses. Specifies using this interfaces statically defined secondary IP address for RTP traffic. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
primary
Default Values
By default, media-gateway ip is disabled.
Command History
Release 10.1 Release 17.3 Command was introduced. Command was updated with the loopback interface identification option.
Usage Examples
The following example configures the unit to use the primary IP address for RTP traffic: (config)#interface tunnel 1 (config-tunnel 1)#media-gateway ip primary
60000CRG0-35B
2375
snmp trap
Use the snmp trap command to enable all supported Simple Network Management Protocol (SNMP) traps on the interface. Use the no form of this command to disable this trap. Syntax Description
No subcommands.
Default Values
By default, all interfaces (except virtual Frame Relay interfaces and subinterfaces) have SNMP traps enabled.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 8.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the port channel and virtual local area network (VLAN) interfaces. Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the tunnel interface.
Usage Examples
The following example enables SNMP on the tunnel interface: (config)#interface tunnel 1 (config-tunnel 1)#snmp trap
60000CRG0-35B
2376
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Release 17.2 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface. Command was expanded to the cellular interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the tunnel interface: (config)#interface tunnel 1 (config-tunnel 1)#no snmp trap link-status
60000CRG0-35B
2377
tunnel checksum
Use the tunnel checksum command to verify the checksum of incoming generic routing encapsulation (GRE) packets and to include a checksum on outgoing packets. Use the no form of this command to disable checksum. Syntax Description
No subcommands.
Default Values
By default, tunnel checksum is disabled.
Command History
Release 9.1 Command was introduced.
Functional Notes
Both ends of the tunnel must have tunnel checksum enabled in order for a meaningful configuration. When both endpoints have tunnel checksum enabled, a packet with an incorrect checksum will be dropped. If the endpoints differ in their checksum configuration, all packets will still flow without any checksum verification.
Usage Examples
The following example enables checksum on the tunnel 1 interface: (config)#interface tunnel 1 (config-tunnel 1)#tunnel checksum
Technology Review
When enabled, the tunnel checksum will be calculated for each outgoing GRE packet with the result stored in the GRE header. The checksum present bit will also be set in the header.
60000CRG0-35B
2378
Default Values
By default, no tunnel destinations are defined.
Command History
Release 9.1 Command was introduced.
Functional Notes
Until a tunnel interface has a destination IP address defined, it is not operational. The tunnel destination IP address will be the value put into the destination field of the outer IP header after generic routing encapsulation (GRE) of the original packet. A route must be defined for the destination address. Be certain there are no recursive routes by ensuring that a tunnels destination address will be routed out a physical interface. There is a possibility of creating a routing loop when tunnel interface traffic gets routed back to the same tunnel interface or to another tunnel interface, which in turn, does not have a route out of a physical interface. In either case, the tunnel will go down for a period of one minute, after which it will come back up to determine if the recursive routes have been resolved. This allows time for routing protocols to converge on a valid route. If a static route has caused the recursive routing loop, the tunnel status may oscillate until the route is changed.
Usage Examples
The following example sets the tunnel destination IP address to 192.22.73.101: (config)#interface tunnel 1 (config-tunnel 1)#tunnel destination 192.22.73.101
60000CRG0-35B
2379
Default Values
By default, a key is not configured.
Command History
Release 9.1 Command was introduced.
Functional Notes
When enabled, the key will be stored in the generic routing encapsulation (GRE) header and the key present bit will be set. If tunnel keys are used, a matching key value must be defined on both endpoints of the tunnel or packets will be discarded.
Usage Examples
The following example sets the key on a tunnel interface to a value of 1234: (config)#interface tunnel 1 (config-tunnel 1)#tunnel key 1234
60000CRG0-35B
2380
Default Values
By default, the tunnel interface will be configured for GRE mode.
Command History
Release 9.1 Command was introduced.
Functional Notes
GRE is currently the only allowed mode for tunnel interface operation.
Usage Examples
The following example configures the tunnel interface for GRE mode: (config)#interface tunnel 1 (config-tunnel 1)#tunnel mode gre
60000CRG0-35B
2381
tunnel sequence-datagrams
Use the tunnel sequence-datagrams command to enable sequence number checking on incoming generic routing encapsulation (GRE) packets, to drop packets arriving out of order, and to include a sequence number in outgoing packets. Use the no form of this command to disable sequence number checking. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 9.1 Command was introduced.
Functional Notes
Both ends of the tunnel must have sequence numbering enabled. When both endpoints have sequence numbering enabled, a packet arriving with a sequence number less than the current expected value will be dropped. If the endpoints differ in their sequence numbering configuration, all packets will still flow without any sequence number verification. Be careful enabling sequence number verification on a tunnel. The tunnel can easily become out of sequence due to network conditions outside of the tunnel endpoints. It may be difficult to establish a successful traffic flow after an out of sequence condition occurs.
Usage Examples
The following example enables sequence number processing on the tunnel interface: (config)#interface tunnel 1 (config-tunnel 1)#tunnel sequence-datagrams
Technology Review
When enabled, the next valid sequence number will be placed in the GRE header of each outgoing packet, and the sequence number present bit will be set.
60000CRG0-35B
2382
tunnel source
Use the tunnel source command to specify the IP address or name of a physical interface to use as the source address for all packets transmitted on this interface. Use the no form of this command to clear the tunnel source address. Variations of this command include:
tunnel source <ip address> tunnel source <ip address> <interface>
Syntax Description
<ip address> Specifies the IP address in dotted decimal notation to use as the source address for all packets transmitted on this interface. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the interface that contains the IP address to use as the source address for all packets transmitted on this interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type tunnel source ? for a complete list of valid interfaces.
<interface>
Default Values
By default, a tunnel source is not defined.
Command History
Release 9.1 Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the demand interfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
Functional Notes
Until a tunnel interface has a source IP address defined and the physical interface used as the source is operational, the tunnel is not operational. The tunnel source IP address will be the value put into the source field of the outer IP header after generic routing encapsulation (GRE) of the original packet.
60000CRG0-35B
2383
Usage Examples
The following example sets the tunnel source IP address to 192.22.73.101: (config)#interface tunnel 1 (config-tunnel 1)#tunnel source 192.22.73.101 The following example sets the tunnel source IP address to the address of the Ethernet interface labeled 0/1: (config)#interface tunnel 1 (config-tunnel 1)#tunnel source eth 0/1
60000CRG0-35B
2384
Default Values
By default, the default VRF is used.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the VRF instance to use to reach the tunnel source as VRF RED: (config)#interface tunnel 1 (config-tunnel 1)#tunnel vrf RED (config-tunnel 1)#tunnel source 10.10.10.254 (config-tunnel 1)#tunnel destination 10.10.10.1
60000CRG0-35B
2385
Keep in mind that changing an interfaces VRF association will clear all IP-related settings on that interface. Syntax Description
<name> Specifies the name of the VRF to which to assign the interface.
Default Values
By default, interfaces are associated with the default VRF that is unnumbered.
Command History
Release 16.1 Release 17.8 Command was introduced. The keyword ip was removed from this command.
Functional Notes
VRF instances must be created first before an interface can be assigned. An interface can only be assigned to one VRF, but multiple interfaces can be assigned to the same VRF. An interface will only forward IP traffic that matches its associated VRF. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured.
Usage Examples
The following example assigns the tunnel interface to the VRF instance named RED: (config)#interface tunnel 1 (config-tunnel 1)#vrf forwarding RED
60000CRG0-35B
2386
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. ip flow on page 2388 media ethernet on page 2389 name <name> on page 2390 state on page 2391
60000CRG0-35B
2387
ip flow
Use the ip flow command to enable integrated traffic monitoring (ITM) for all traffic received or forwarded on an interface. Use the no form of this command to disable traffic monitoring. Variations of this command include:
ip flow egress ip flow egress <name> ip flow ingress ip flow ingress <name>
Syntax Description
egress ingress <name> Specifies that all outgoing traffic be monitored. Specifies that all incoming traffic be monitored. Optional. Specifies the name of an access control list (ACL) to use for filtering traffic.
Default Values
By default, no traffic monitoring is enabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables traffic monitoring on a virtual local arean network (VLAN) interface to monitor incoming traffic through an ACL called myacl: (config)#interface vlan 2 (config-vlan 2)#ip flow ingress myacl
60000CRG0-35B
2388
media ethernet
Use the media ethernet command to set the virtual local area network (VLAN) media type to Ethernet. The only media type currently supported is Ethernet. Use the no form of this command to reset to the default setting. Syntax Description
No subcommands.
Default Values
By default, media is set to Ethernet.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example sets the media type to Ethernet for VLAN 2: (config)#vlan 2 (config-vlan 2)#media ethernet
60000CRG0-35B
2389
name <name>
Use the name command to assign a name to the virtual local area network (VLAN). Use the no form of this command to remove a name given to a VLAN. Syntax Description
<name> Assigns a name to the VLAN using 1 to 32 characters.
Default Values
By default, the name is set to VLANxxxx, where xxxx represents four numeric digits (including leading zeroes) equal to the VLAN ID number.
Command History
Release 5.1 Command was introduced.
Functional Notes
The name is limited to 32 characters and must be unique throughout.
Usage Examples
The following example sets the name of VLAN 2 to Accounting: (config)#vlan 2 (config-vlan 2)#name Accounting
60000CRG0-35B
2390
state
Use the state command to change the state of the virtual local area network (VLAN). Variations of this command include:
state active state suspend
Syntax Description
active suspend Changes the VLAN state to active. Changes the VLAN state to suspended.
Default Values
The default setting is active (once the VLAN has been created).
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example sets the VLAN state to suspended: (config)#vlan 2 (config-vlan 2)#state suspend
60000CRG0-35B
2391
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: do on page 69 end on page 70 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. abort on page 2393 apply on page 2394 reset on page 2395 show on page 2396 vlan <vlan id> on page 2397 vlan <vlan id> media ethernet on page 2398 vlan <vlan id> name <name> on page 2399 vlan <vlan id> state on page 2400
60000CRG0-35B
2392
abort
Use the abort command to exit the virtual local area network (VLAN) database without saving any changes made. Syntax Description
No subcommands.
Default Values
No default values are necessary for this setting.
Command History
Release 5.1 Command was introduced.
Functional Notes
The abort command discards all configuration changes made since you entered the VLAN Database Configuration mode (or since the last time you issued the apply command). The system then exits out of this mode, returning to the enable (#) command prompt. Refer to the command apply on page 2394 for more information.
Usage Examples
The following example exits the VLAN database without saving the changes made: (config)#vlan database (vlan)#abort Discarding all changes and exiting. #
60000CRG0-35B
2393
apply
Use the apply command to apply changes without exiting the virtual local area network (VLAN) database. Syntax Description
No subcommands.
Default Values
No default values are necessary for this setting.
Command History
Release 5.1 Command was introduced.
Functional Notes
Applies changes to the VLAN database configuration in the running configuration.
Usage Examples
The following example applies changes made, remaining in the VLAN database: (config)#vlan database (vlan)#apply Changes applied. (vlan)#
60000CRG0-35B
2394
reset
Use the reset command to discard all changes made and revert to the previous configuration. The prompt remains in the virtual local area network (VLAN) database. Syntax Description
No subcommands.
Default Values
No default values are necessary for this setting.
Command History
Release 5.1 Command was introduced.
Functional Notes
The reset command discards all changes to the VLAN configuration. The configuration remains the same as it was prior to entering the VLAN Database Configuration mode (or since the last time you issued the apply command). The VLAN database reverts to the same state it had upon entry. Refer to the command apply on page 2394 for more information.
Usage Examples
The following example resets the unit to the previous configuration (i.e., the last configuration saved using the apply or the exit command): (config)#vlan database (vlan)#reset VLAN configuration has been reset. (vlan)#
60000CRG0-35B
2395
show
Use the show command to display different aspects of the virtual local area network (VLAN) configuration. Variations of this command include:
show changes show changes <vlan id> show current show current <vlan id> show proposed show proposed <vlan id>
Syntax Description
<vlan id> changes current proposed Specifies a VLAN ID to display only information for a specific VLAN. Valid VLAN interface ID range is from 1 to 4094. Displays the proposed changes to the VLAN configuration. Displays the current VLAN configuration. Displays the proposed VLAN database. The proposed version is not part of the running configuration until it is applied (using the apply command or the exit command).
Default Values
No default values are necessary for this setting.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example shows the proposed VLAN database configuration that will take effect if an apply or exit command is issued: (config)#vlan database (vlan)#show proposed
60000CRG0-35B
2396
Default Values
No default values are necessary for this setting.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example creates VLAN 2 only within the VLAN database. This VLAN is not added to the running configuration until an exit or apply command is issued: (vlan)#vlan 2 VLAN 2 created. Name = VLAN0002 (vlan)# The following example removes VLAN 2 from the VLAN database. This VLAN is not removed from the running configuration until an exit or apply command is issued: (config)#vlan database (vlan)#no vlan 2
60000CRG0-35B
2397
Default Values
By default, vlan media is set to Ethernet.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example sets the media type of VLAN 2 to Ethernet: (config)#vlan database (vlan)#vlan 2 media ethernet
60000CRG0-35B
2398
Default Values
By default, the assigned name is VLANxxxx; where xxxx represents four numeric digits (including leading zeroes) equal to the VLAN ID number.
Command History
Release 5.1 Command was introduced.
Functional Notes
The name is limited to 32 characters and must be unique throughout the network.
Usage Examples
The following example sets the name of VLAN 2 to Accounting: (config)#vlan database (vlan)#vlan 2 name Accounting
60000CRG0-35B
2399
Syntax Description
<vlan id> active suspend Specifies a valid VLAN interface ID. Valid VLAN ID range is 1 to 4094. Changes the VLAN state to active. Changes the VLAN state to suspended.
Default Values
The default setting is active (once the VLAN has been created).
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example sets the VLAN state to suspended: (config)#vlan database (vlan)#vlan 2 state suspend
60000CRG0-35B
2400
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. arp arpa on page 2402 awcp on page 2403 bandwidth <value> on page 2404 bridge-group <number> on page 2405 crypto map <name> on page 2406 dynamic-dns on page 2408 ip commands begin on page 2410 ipv6 commands begin on page 2449 mac-address <mac address> on page 2472 max-reserved-bandwidth <value> on page 2473 media-gateway ip on page 2474 qos-policy on page 2475 rtp quality-monitoring on page 2477 snmp trap on page 2478 snmp trap link-status on page 2479 traffic-shape rate <value> on page 2480 vrf forwarding <name> on page 2481 vrrp <number> on page 2482
60000CRG0-35B
2401
arp arpa
Use the arp arpa command to set ARPA as the standard Address Resolution Protocol (ARP) on this interface. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, the ARP is set to ARPA.
Command History
Release 5.1 Release 6.1 Command was introduced. Command was extended to include the NetVanta 2000 Series units.
Usage Examples
The following example enables standard ARP for the virtual local area network (VLAN) interface: (config)#interface vlan 1 (config-interface-vlan 1)#arp arpa
60000CRG0-35B
2402
awcp
Use the awcp command to enable ADTRAN Wireless Control Protocol (AWCP) on this interface. The AWCP is an ADTRAN proprietary protocol used by an access controller (AC) to communicate with an access point (AP). Use the no form of this command to disable AWCP for this interface. Syntax Description
No subcommands.
Default Values
By default, AWCP is enabled on the interface.
Command History
Release 15.1 Command was introduced.
Functional Notes
When the global-level command dot11ap access-point-controller (refer to dot11ap access-point-control on page 877 for more information) is enabled, the AWCP function can be disabled on a specific interface by using the no form of this command from the desired interface. When the global-level command dot11ap access-point-controller is disabled, it overrides the awcp command setting for the interface.
Usage Examples
The following example disables AWCP on virtual local area network (VLAN) 1: (config)#interface vlan 1 (config-interface-vlan 1)#no awcp
60000CRG0-35B
2403
bandwidth <value>
Use the bandwidth command to provide the bandwidth value of an interface to the higher level protocols. This value is used in cost calculations. Use the no form of this command to restore the default value. Syntax Description
<value> Specifies bandwidth in kbps. Range is 1 to 4294967295 kbps.
Default Values
To view the default values, use the show interfaces command.
Command History
Release 3.1 Release 5.1 Release 6.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the virtual local area network (VLAN) interfaces.
Functional Notes
The bandwidth command is an informational value that is communicated to the higher level protocols to be used in cost calculations. This is a routing parameter only and does not affect the physical interface.
Usage Examples
The following example sets bandwidth of the VLAN 1 interface to 10 Mbps: (config)#interface vlan 1 (config-interface-vlan 1)#bandwidth 10000
60000CRG0-35B
2404
bridge-group <number>
Use the bridge-group command to assign an interface to the specified bridge group. Use the no form of this command to remove the interface from the bridge group. Syntax Description
<number> Specifies a bridge group number. Range is 1 to 255.
Default Values
By default, there are no configured bridge groups.
Command History
Release 1.1 Command was introduced.
Functional Notes
A bridged network can provide excellent traffic management to reduce collisions and limit the amount of bandwidth wasted with unnecessary transmissions when routing is not necessary. Any two interfaces can be bridged (e.g., Ethernet to T1 bridge, Ethernet to Frame Relay subinterface).
Usage Examples
The following example assigns the virtual local area network (VLAN) interface to bridge group 17: (config)#interface vlan 1 (config-interface-vlan 1)#bridge-group 17
60000CRG0-35B
2405
For virtual private network (VPN) configuration example scripts, refer to the VPN configuration guide available on the AOS Documentation CD shipped with your product.
Syntax Description
<name> Specifies the crypto map name that you wish to assign to the interface.
Default Values
By default, no crypto maps are assigned to an interface.
Command History
Release 4.1 Command was introduced.
Functional Notes
When configuring a system to use both the stateful inspection firewall and Internet key exchange (IKE) negotiation for VPN, keep the following notes in mind. When defining the policy class and associated access control lists (ACLs) that describe the behavior of the firewall, do not forget to include the traffic coming into the system over a VPN tunnel terminated by the system. The firewall should be set up with respect to the unencrypted traffic that is destined to be sent or received over the VPN tunnel. The following diagram represents typical AOS data-flow logic.
60000CRG0-35B
2406
IPSec Decrypt/Discard
IPSec Encrypt
NAT/ACP/ Firewall
Router
As shown in the diagram above, data coming into the product is first processed by the static filter associated with the interface on which the data is received. This access group is a true static filter and is available for use regardless of whether the firewall is enabled or disabled. Next (if the data is encrypted), it is sent to the IPSec engine for decryption. The decrypted data is then processed by the stateful inspection firewall. Therefore, given a terminating VPN tunnel, only unencrypted data is processed by the firewall. The ACLs for a crypto map on an interface work in reverse logic to the ACLs for a policy class on an interface. When specifying the ACLs for a crypto map, the source information is the private local side, unencrypted source of the data. The destination information will be the far-end, unencrypted destination of the data. However, ACLs for a policy class work in reverse. The source information for the ACL in a policy class is the far end. The destination information is the local side.
Usage Examples
The following example applies all crypto maps with the name MyMap to the virtual local area network (VLAN) interface: (config)#interface vlan 1 (config-interface-vlan 1)#crypto map MyMap
60000CRG0-35B
2407
dynamic-dns
Use the dynamic-dns command to configure Dynamic DNS service provided by Dynamic Network Services, Inc. (www.dyndns.org). Use the no form of this command to disable this feature. Variations of this command include:
dynamic-dns custom <hostname> <minutes> dynamic-dns dyndns <hostname> <username> <password> dynamic-dns dyndns-custom <hostname> <username> <password> dynamic-dns dyndns-static <hostname> <username> <password>
Syntax Description
<hostname> <minutes> Specifies the host name for the server that updates the dynamic domain naming system (DNS). Specifies the intervals in minutes to update the server with information (updates also occur when the interfaces IP address changes regardless of the update intervals). Specifies a user name using an alphanumerical string up to 30 characters in length (the user name is case sensitive). Specifies a password using an alphanumerical string up to 30 characters in length (the password is case sensitive). Refer to Functional Notes below for additional argument descriptions.
<username> <password>
Default Values
No default values are necessary for this command.
Command History
Release 8.1 Release 12.1 Release 15.1 Command was introduced. Command was expanded. Command was expanded to include the bridged virtual interfaces (BVIs).
Functional Notes
custom - Constanttime.coms Custom Dynamic DNSSM service allows you complete access and management control over your domain name regardless of where you purchased/registered it. This allows you to manage IP address mappings (A records), domain aliases (CNAME records), and mail servers (mail exchange (MX) records). dyndns - The Dynamic DNSSM offered by Dynamic Network Services Inc., (DynDNS.org) allows you to alias a dynamic IP address to a static host name in various domains. This allows your unit to be more easily accessed from various locations on the Internet. This service is provided for up to five host names.
60000CRG0-35B
2408
dyndns-custom - DynDNS.org's Custom DNSSM service provides a full DNS solution, giving you complete control over an entire domain name. A Web-based interface provides two levels of control over your domain, catering to average or advanced users. Five globally redundant DNS servers ensure that your domain will always resolve. A choice of two interfaces is available. The basic interface is designed for most users. It comes preconfigured for most common configurations and allows for easy creation of most common record types. The advanced interface is designed for system administrators with a solid DNS background, and provides layout and functionality similar to a BIND zone file allowing for the creation of nearly any record type. Custom DNSSM can be used with both static and dynamic IPs, and has the same automatic update capability through Custom DNS-aware clients as Dynamic DNS. dyndns-static - The Static DNS service is similar to DynDNS.orgs Dynamic DNSSM service in that it allows a host name, such as yourname.dyndns.org, to point to your IP address. Unlike a Dynamic DNS host, a Static DNS host does not expire after 35 days without updates, but updates take longer to propagate through the DNS system. This service is provided for up to five host names. If your IP address does not change often or at all, but you still want an easy name to remember it by (without having to purchase your own domain name), Static DNS service is ideal for you. If you would like to use your own domain name (such as yourname.com), you need Custom DNS service that also provides full dynamic and static IP address support.
Usage Examples
The following example sets the Dynamic DNS to dyndns-custom with host name host, user name user, and password pass: (config)#interface vlan 1 (config-interface-vlan 1)#dynamic-dns dyndns-custom host user pass
60000CRG0-35B
2409
Syntax Description
<ipv4 acl name> in out Applies the named IPv4 ACL to the interface. Enables access control on IPv4 packets received on the specified interface. Enables access control on IPv4 packets transmitted on the specified interface.
Default Values
By default, these commands are disabled.
Command History
Release 3.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
When this command is enabled, the IPv4 destination address of each packet must be validated before being passed through. If the packet is not acceptable per these settings, it is dropped.
Usage Examples
The following example configures the router to only allow IPv4 Telnet traffic (as defined in the user-configured TelnetOnly ACL) into the VLAN interface: (config)#ip access-list extended TelnetOnly (config-ext-nacl)#permit tcp any any eq telnet (config-ext-nacl)#interface vlan 1 (config-vlan 1)#ip access-group TelnetOnly in
60000CRG0-35B
2410
Default Values
By default, there are no configured IPv4 ACPs associated with an interface.
Command History
Release 2.1 Release 5.1 Release 6.1 Release 15.1 Release 17.9 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the virtual local area network (VLAN) interfaces. Command was expanded to include the bridged virtual interfaces (BVIs). Command was changed to require the ip keyword.
Functional Notes
To assign an IPv4 ACP to an interface, enter the interface configuration mode for the desired interface and enter ip access-policy <ipv4 acp name>.
Usage Examples
The following example associates the IPv4 ACP PRIVATE (to allow inbound IPv4 traffic to the Web server) to the VLAN interface: Enable the AOS security features: (config)#ip firewall Associate the ACP with the VLAN interface: (config)#interface vlan 1 (config-vlan 1)#ip access-policy PRIVATE
60000CRG0-35B
2411
Syntax Description
<ipv4 address> <subnet mask> Specifies a valid IPv4 address. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IPv4 addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Optional. Configures a secondary IPv4 address for the specified interface.
secondary
Default Values
By default, there are no assigned IPv4 addresses.
Command History
Release 1.1 Release 5.1 Release A4.01 Command was introduced. Command was expanded to include the Ethernet subinterfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Ethernet Interface.
Functional Notes
Use secondary IPv4 addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IPv4 addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IPv4 addresses on the secondary subnet.
Usage Examples
The following example configures a secondary IPv4 address of 192.22.72.101 /30: (config)#interface vlan 1 (config-vlan 1)#ip address 192.22.72.101 /30 secondary
60000CRG0-35B
2412
Default Values
By default, no IP address range is defined.
Command History
Release 17.4 Command was introduced.
Functional Notes
Use secondary IP addresses to allow dual subnets on a single interface (when you need more IP addresses than the primary subnet can provide). When using secondary IP addresses, avoid routing loops by verifying that all devices on the network segment are configured with secondary IP addresses on the secondary subnet.
Usage Examples
The following example configures a range of secondary IP address from 192.22.72.1 to 192.22.72.10 on subnet 255.255.255.252: (config)#interface vlan 1 (config-interface-vlan 1)#ip address range 192.22.72.1 192.22.72.10 255.255.255.252 secondary
60000CRG0-35B
2413
ip address dhcp
Use the ip address dhcp command to use Dynamic Host Configuration Protocol (DHCP) to obtain an address on the interface. Use the no form of this command to remove a configured IP address (using DHCP) and disable DHCP operation on the interface. Variables that may be used with this command to further define the DHCP configuration include:
ip address dhcp client-id [<interface> | <identifier>] [hostname <string> ] [track <name>] [<administrative distance>] ip address dhcp hostname <string> [no-default-route | no-domain-name | no-nameservers] [track <name>] [<administrative distance>] ip address dhcp [no-default-route | no-domain-name | no-nameservers] [track <name>] [<administrative distance>] ip address dhcp track <name> [<administrative distance>]
Syntax Description
<administrative distance> Optional. Specifies the administrative distance to use when adding the DHCP gateway into the route table. It is used to determine the best route when multiple routes to the same destination exist. The lower the administrative distance, the more reliable the route. Range is 1 to 255. Optional. Specifies the client identifier used when obtaining an IP address from a DHCP server. Specifies an interface, thus defining the client identifier as the hexadecimal medium access control (MAC) address of the specified interface (including a hexadecimal number added to the front of the MAC address to identify the media type). For example, specifying the client-id ethernet 0/1 (where the Ethernet interface has a MAC address of d217.0491.1150) defines the client identifier as 01:d2:17:04:91:11:50 (where 01 defines the media type as Ethernet). Refer to hardware-address on page 2704 for a detailed listing of media types. <identifier> Specifies a custom client identifier using a text string (that is converted to a hexadecimal equivalent) or 7 to 28 hexadecimal numbers (with colon delimiters). For example, a custom client identifier of 0f:ff:ff:ff:ff:51:04:99:a1 may be entered using the <identifier> option. hostname <string> Optional. Specifies a text string (to override the global router name) to use as the name in the DHCP option 12 field. The string is enclosed in quotation marks and can consist of up to 35 characters. Optional. Specifies that no default route is obtained via DHCP. Optional. Specifies that no domain name is obtained via DHCP. Optional. Specifies that no domain naming system (DNS) servers are obtained via DHCP.
client-id <interface>
60000CRG0-35B
2414
VLAN Interface Command Set Optional. Attaches a network monitoring track to the DHCP client. The DHCP gateway route for this client will only reside in the route table while the track is in the pass state. For more information on configuring track objects, refer to track <name> on page 1251.
Default Values
<administrative distance> client-id By default, the administrative distance value is 1. Optional. By default, the client identifier is populated using the following formula: TYPE: INTERFACE SPECIFIC INFO : MAC ADDRESS Where TYPE specifies the media type in the form of one hexadecimal byte (refer to hardware-address on page 2704 for a detailed listing of media types), and the MAC ADDRESS is the medium access control (MAC) address assigned to the first Ethernet interface in the unit in the form of six hexadecimal bytes. (For units with a single Ethernet interface, the MAC ADDRESS assigned to Ethernet 0/1 is used in this field.) INTERFACE SPECIFIC INFO is only used for Frame Relay interfaces and can be determined using the following: FR_PORT#: Q.922 ADDRESS Where the FR_PORT# specifies the label assigned to the virtual Frame Relay interface using four hexadecimal bytes. For example, a virtual Frame Relay interface labeled 1 would have a FR_PORT# of 00:00:00:01. The Q.922 ADDRESS field is populated using the following:
C/R EA DE EA
Where the FECN, BECN, C/R, DE, and high order extended address (EA) bits are assumed to be 0 and the lower order EA bit is set to 1. The following list provides a few example DLCIs and associated Q.922 address: DLCI (decimal) / Q.922 address (hex) 16 / 0x0401 50 / 0x0C21 60 / 0x0CC1 70 / 0x1061 80 / 0x1401 hostname <string> By default, the host name is the name configured using the Global Configuration hostname command.
60000CRG0-35B
2415
Command History
Release 2.1 Release 8.1 Release 13.1 Release 17.5 Command was introduced. Command was expanded to include the asynchronous transfer mode (ATM) subinterface. Command was expanded to include the administrative distance. Command was expanded to include the track parameter.
Functional Notes
DHCP allows interfaces to acquire a dynamically assigned IP address from a configured DHCP server on the network. Many Internet service providers (ISPs) require the use of DHCP when connecting to their services. Using DHCP reduces the number of dedicated IP addresses the ISP must obtain. Consult your ISP to determine the proper values for the client-id and hostname fields.
Usage Examples
The following example enables DHCP operation on the virtual local area network (VLAN) interface 2: (config)#interface vlan 2 (config-intf-vlan 2)#ip address dhcp The following example enables DHCP operation on the VLAN interface 2 utilizing host name adtran and does not allow obtaining a default route, domain name, or name servers. It also sets the administrative distance as 5: (config)#interface vlan 2 (config-intf-vlan 2)#ip address dhcp hostname adtran no-default-route no-domain-name no-nameservers 5
60000CRG0-35B
2416
ip dhcp
Use the ip dhcp command to release or renew the Dynamic Host Configuration Protocol (DHCP) IP address. This command is only applicable when using DHCP for IP address assignment. Variations of this command include:
ip dhcp release ip dhcp renew
Syntax Description
release renew Releases DHCP IP address. Renews DHCP IP address.
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example releases the IP DHCP address for the virtual local area network (VLAN) interface: (config)#interface vlan 1 (config-interface-vlan 1)#ip dhcp release
60000CRG0-35B
2417
ip directed-broadcast
Use the ip directed-broadcast command to allow reception/forwarding of directed broadcasts. Use the no form of this command to disable this feature. Variations of this command include:
ip directed-broadcast ip directed-broadcast <name>
Syntax Description
<name> Specifies IP access control list (ACL) name.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Command was introduced.
Functional Notes
A directed broadcast is a packet intended for all nodes on a nonlocal network. For example, the broadcast address 255.255.255.255 reaches all nodes on a network; the directed broadcast address 128.1.255.255 is intended for all nodes whose network address is 128.1.0.0. A router not directly attached to 128.1.0.0 simply forwards the directed broadcast packet to the next hop. A router on network 128.1.0.0 that has ip directed-broadcast enabled, accepts and forwards the packet to all nodes whose network address is 128.1.0.0. Routers connecting subnets of 128.1.0.0 also accept and forward the packet to the nodes on their respective subnets. When a directed broadcast packet reaches a router that is directly connected to its destination subnet, that packet is distributed as a broadcast on the destination subnet. The packet is then sent as a link-layer broadcast. The ip directed-broadcast command controls the distribution of directed broadcasts when they reach their target subnets. Only the final transmission of the directed broadcast on its ultimate destination subnet is affected. It does not affect the transit unicast routing of IP directed broadcasts. If ip directed-broadcast is enabled for this interface, incoming IP packets whose addresses identify them as directed broadcasts intended for the subnet to which this interface is attached will be forwarded as broadcasts on that subnet. Forwarding of the packets can be limited by specifying an ACL with this command. In this case, only directed broadcasts that are permitted by the specified ACL will be forwarded, and all other directed broadcasts directed to this interface subnet will be dropped. Disabling the ip directed-broadcast command will cause directed broadcasts destined for the subnet to which this interface is attached to be dropped. This option is a requirement for routers as described in RFC 1812, section 4.2.2.11. Furthermore, it is disabled by default (RFC 2644), with the intended goal of reducing the efficacy of certain types of denial of service (DoS) attacks.
60000CRG0-35B
2418
Usage Examples
The following example enables forwarding of directed broadcasts on the interface vlan 1: (config)#interface vlan 1 (config-interface-vlan 1)#ip directed-broadcast
60000CRG0-35B
2419
ip ffe
Use the ip ffe command to enable the RapidRoute Engine on this interface with the default number of entries. Use the no form of this command to disable this feature. Variations of this command include:
ip ffe ip ffe max-entries <value>
Issuing this command will cause all RapidRoute entries on this interface to be cleared.
Syntax Description
max-entries <value> Optional. Specifies the maximum number of entries stored in the flow table. Valid range is from 1 to 8192.
Default Values
By default, the RapidRoute Engine is disabled. The default number of max-entries is 4096.
Command History
Release 13.1 Release 17.6 Command was introduced. Command was expanded to include the high level data link control (HDLC) and tunnel interfaces.
Functional Notes
RapidRoute can be used to help reduce routing overhead, and thus reduce overall routing times. Routing times are reduced by the creation of a flow table on the ingress interface. The maximum number of entries that can be stored in the flow table at any one time may be specified by using the max-entries parameters.
Usage Examples
The following example enables RapidRoute and sets the maximum number of entries in the flow table to 50: (config)#interface vlan 1 (config-vlan 1)#ip ffe max-entries 50
60000CRG0-35B
2420
Technology Review
The RapidRoute system goal is to increase IP packet throughput by moving as much of the packet processing into the engine as possible. Packets are classified into flows based upon the IP protocol (Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), etc.), the source and destination IP addresses, IP type of service (ToS), and the protocol-specific information, such as the source and destination port numbers. Flows are defined as the unidirectional representation of a conversation between two IP hosts. Each ingress interface keeps its own flow table, a collection of flow entries. The first packet in a flow that is forwarded through the unit will build a flow entry. When a flow entry is looked up but no entry is found, a RapidRouteBuilder object is allocated and attached to the packet. As the packet passes through the various processing layers, each subsystem will add processing to the RapidRouteBuilder. When packet is about to be forwarded out of the egress interface, the RapidRouteBuilder will be finalized. That is, the flow entry being built will be checked for completeness and committed to the flow table on the ingress interface. Subsequent flow matches can then bypass the normal processing layers.
60000CRG0-35B
2421
Default Values
By default, broadcast UDP packets are not forwarded.
Command History
Release 1.1 Command was introduced.
Functional Notes
When used in conjunction with the ip forward-protocol command, the ip helper-address feature allows you to customize which broadcast packets are forwarded. To implement the helper address feature, assign helper address(es) (specifying the device that needs to receive the broadcast traffic) to the interface closest to the host that transmits the broadcast packets. When broadcast packets (of the specified type forwarded using the ip forward-protocol command) are received on the interface, they will be forwarded to the device that needs the information. Only packets meeting the following criteria are considered eligible by the ip helper-address feature: 1. The packet IP protocol is UDP. 2. Any UDP port specified using the ip forward-protocol command. 3. The medium access control (MAC) address of the frame is an all-ones broadcast address (ffff.ffff.ffff). 4. The destination IP address is broadcast defined by all ones (255.255.255.255) or a subnet broadcast (for example, 192.33.4.251 for the 192.33.4.248 /30 subnet).
Usage Examples
The following example forwards all DNS broadcast traffic to the DNS server with IP address 192.33.5.99: (config)#ip forward-protocol udp domain (config)#interface vlan 1 (config-interface-vlan 1)#ip helper-address 192.33.5.99
60000CRG0-35B
2422
ip igmp
Use the ip igmp command to configure multicasting related functions for the interface. Variations of this command include:
ip igmp immediate-leave ip igmp last-member-query-interval <milliseconds> ip igmp querier-timeout <seconds> ip igmp query-interval <seconds> ip igmp query-max-response-time <seconds> ip igmp static-group <address> ip igmp version [1 | 2]
Syntax Description
immediate-leave Specifies that if only one host (or Internet Group Management Protocol (IGMP) snooping switch) is connected to the interface, when a leave is received, multicast of that group is immediately terminated as opposed to sending a group query and timing out the group if no device responds. Works in conjunction with ip igmp last-member-query-interval. Applies to all groups when configured. Use the no form of this command to disable the immediate-leave feature. Controls the timeout (in milliseconds) used to detect whether any group receivers remain on an interface after a receiver leaves a group. If a receiver sends a leave-group message (IGMP Version 2), the router sends a group-specific query on that interface. After twice the time specified by this command plus as much as one second longer, if no receiver responds, the router removes that interface from the group and stops sending that group's multicast packets to the interface. Range is 100 to 65535 ms. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) that the router waits after the current queriers last query before it takes over as querier (IGMP V2). Range is 60 to 300 seconds. Use the no form of this command to return to the default setting. Specifies the interval (in seconds) at which IGMP queries are sent on an interface. Host query messages are addressed to the all-hosts multicast group with an IP time to live (TTL) of 1. The router uses queries to detect whether multicast group members are on the interface and to select an IGMP designated router (DR) for the attached segment (if more than one multicast router exists). Only the DR for the segment sends queries. For IGMP V2, the DR is the router with the lowest IP address on the segment. Range is 0 to 65535 seconds. Use the no form of this command to return to the default setting. Specifies the maximum response time (in seconds) advertised by this interface in queries when using IGMP V2. Hosts are allowed a random time within this period to respond, reducing response bursts. Use the no form of this command to return to the default setting.
last-member-query-interval <milliseconds>
querier-timeout <seconds>
query-interval <seconds>
query-max-response-time <seconds>
60000CRG0-35B
2423
Syntax Description
static-group <address> Configures the router's interface to be a statically connected member of the specified group. Packets received on the correct reverse path forwarding (RPF) interface are forwarded to this interface regardless of whether any receivers have joined the specified group using IGMP. Use the no form of this command to remove a configured static group. Sets the interfaces IGMP version. Use the no form of this command to return to the default setting.
version [1 | 2]
Default Values
ip igmp immediate-leave ip igmp last-member-query-interval ip igmp querier-timeout ip igmp query-interval ip igmp query-max-response-time ip igmp static-group ip igmp version No default 1000 milliseconds 2x the query-interval value 60 seconds 10 seconds No default Version 1
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example sets the query message interval on the interface to 200 milliseconds: (config)#interface vlan 1 (config-interface-vlan 1)#ip igmp last-member-query-interval 200
60000CRG0-35B
2424
ip mcast-stub downstream
Use the ip mcast-stub downstream command to enable multicast forwarding and Internet Group Management Protocol (IGMP) (router mode) on an interface, and to place it in multicast stub downstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub upstream commands. Downstream interfaces connect to segments with multicast hosts. Multiple interfaces may be configured in downstream mode; however, interfaces connecting to the multicast network (upstream) should not be configured in downstream mode. Interfaces configured as downstream should have the lowest IP address of all IGMP-capable routers on the connected segment in order to be selected as the designated router (DR) and ensure proper forwarding. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub upstream on page 2428 for more information.
Usage Examples
The following example enables multicast forwarding and IGMP on the interface: (config)#interface vlan 1 (config-interface-vlan 1)#ip mcast-stub downstream
60000CRG0-35B
2425
ip mcast-stub fixed
Use the ip mcast-stub fixed command to allow forwarding of multicast traffic on a selected interface after enabling multicast routing. Use the no form of this command to disable this mode. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 12.1 Command was introduced.
Functional Notes
Multicast routing must be enabled prior to setting ip mcast-stub fixed on the selected interface. Also, use the ip igmp static-group <ip address> command to receive multicast traffic without host-initiated Internet Group Management Protocol (IGMP) activity on the selected interface. Otherwise, all host-initiated IGMP transactions will enter multicast routes on the routers interface involved with IGMP activities.
Usage Examples
The following example enables multicast traffic forwarding and IGMP on the interface: (config)#interface vlan 1 (config-interface-vlan 1)#ip mcast-stub fixed
60000CRG0-35B
2426
ip mcast-stub helper-enable
Use the ip mcast-stub helper-enable command to assign the ip mcast-stub helper-address as the Internet Group Management Protocol (IGMP) proxy. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 8.1 Release 10.1 Command was introduced. Command was expanded to include the virtual local area network (VLAN) interfaces.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address, ip mcast-stub upstream, and ip mcast-stub downstream commands. When enabled, the interface becomes a helper forwarding interface. The IGMP host function is dynamically enabled and the interface becomes the active upstream interface, enabling the unit to perform as an IGMP proxy. Refer to ip mcast-stub helper-address <ip address> on page 968, ip mcast-stub downstream on page 2425, and ip mcast-stub upstream on page 2428 for more information.
Usage Examples
The following example sets the helper address as the IGMP proxy: (config)#interface vlan 1 (config-interface-vlan 1)#ip mcast-stub helper-enable
60000CRG0-35B
2427
ip mcast-stub upstream
Use the ip mcast-stub upstream command to enable multicast forwarding on an interface and place it in multicast stub upstream mode. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 7.1 Command was introduced.
Functional Notes
This command is used in IP multicast stub applications in conjunction with the ip mcast-stub helper-address and ip mcast-stub downstream commands. When enabled, the interface becomes a candidate to be a helper forwarding interface. If chosen as the best path toward the helper address by the router's unicast route table, the Internet Group Management Protocol (IGMP) host function is dynamically enabled and the interface becomes the active upstream interface, enabling the router to perform as an IGMP proxy. Though multiple interfaces may be candidates, no more than one interface will actively serve as the helper forwarding interface. Refer to ip mcast-stub helper-address <ip address> on page 968 and ip mcast-stub downstream on page 2425 for more information.
Usage Examples
The following example enables multicast forwarding on the interface: (config)#interface vlan 1 (config-interface-vlan 1)#ip mcast-stub upstream
60000CRG0-35B
2428
ip mtu <size>
Use the ip mtu command to configure the Internet Protocol version 4 (IPv4) maximum transmission unit (MTU) size for the active interface. Use the no form of this command to return to the default value. Syntax Description
<size> Configures the window size for transmitted IPv4 packets. The valid ranges for the various interfaces are listed below: ATM subinterfaces 64 to 1520 BVIs 64 to 2100 Demand interfaces 64 to 1520 Ethernet interfaces (all types) 64 to 1500 FDL interfaces 64 to 256 Frame Relay subinterfaces 64 to 1520 HDLC interfaces (NetVanta 5305) 64 to 4600 HDLC interfaces (all other NetVanta products) 64 to 2100 Loopback interfaces 64 to 1500 PPP interfaces (NetVanta 5305) 64 to 4600 PPP interfaces (all other NetVanta products) 64 to 2100 Tunnel interfaces 64 to 18190
Default Values
<size> The default values for the various interfaces are listed below: ATM subinterfaces 1500 BVIs 1500 Demand interfaces 1500 Ethernet interfaces (all types) 1500 FDL interfaces 256 Frame Relay subinterfaces 1500 HDLC interfaces 1500 Loopback interfaces 1500 1500 1476
s Tunnel interfaces
Command History
Release 1.1 Release 11.1 Release 17.9 Command was introduced. Command was expanded to include the demand interface. Command was changed to require the ip keyword.
Functional Notes
Open shortest path first (OSPF) will not become adjacent on links where the MTU sizes do not match. If router A and router B are exchanging hello packets but their MTU sizes do not match, they will never reach adjacency. This is by design and required by the RFC.
60000CRG0-35B
2429
Usage Examples
The following example specifies an IPv4 MTU of 1200 on the VLAN interface: (config)#interface vlan 1 (config-vlan 1)#ip mtu 1200
60000CRG0-35B
2430
ip ospf
Use the ip ospf command to customize open shortest path first (OSPF) settings (if needed). Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication-key <password> ip ospf cost <value> ip ospf dead-interval <seconds> ip ospf hello-interval <seconds> ip ospf message-digest-key [1 | 2] md5 <key> ip ospf priority <value> ip ospf retransmit-interval <seconds> ip ospf transmit-delay <seconds>
Syntax Description
authentication-key <password> cost <value> Assigns a simple-text authentication password to be used by other routers using the OSPF simple password authentication. Specifies the OSPF cost of sending a packet on the interface. This value overrides any computed cost value. Range is 1 to 65535. Sets the maximum interval (in seconds) allowed between hello packets. If the maximum is exceeded, neighboring devices will determine that the device is down. Range is 0 to 32767 seconds. Specifies the interval (in seconds) between hello packets sent on the interface. Range is 0 to 32767 seconds. Configures OSPF message digest 5 (MD5) authentication (16 byte maximum) keys. Sets the OSPF priority. The value set in this field helps determine the designated router (DR) for this network. Range is 0 to 255. Specifies the interval (in seconds) between link state advertisements (LSAs). Range is 0 to 32767 seconds. Sets the estimated time (in seconds) required to send a link state advertisement (LSA) on the interface. Range is 0 to 32767 seconds.
dead-interval <seconds>
Default Values
dead-interval <seconds> hello-interval <seconds> retransmit-interval <seconds> transmit-delay <seconds> 40 seconds 10 seconds: Ethernet, Frame Relay, and Point-to-Point Protocol (PPP) 5 seconds 1 second
60000CRG0-35B
2431
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example sets the maximum number of seconds allowed between hello packets to 25000: (config)#interface vlan 1 (config-interface-vlan 1)#ip ospf dead-interval 25000
60000CRG0-35B
2432
ip ospf authentication
Use the ip ospf authentication command to authenticate an interface that is performing open shortest path first (OSPF) authentication. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf authentication ip ospf authentication message-digest ip ospf authentication null
Syntax Description
message-digest null Optional. Selects message-digest authentication type. Optional. Specifies that no authentication is used.
Default Values
By default, this is set to null (meaning no authentication is used).
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example specifies that no authentication will be used on the virtual local area network (VLAN) interface: (config)#interface vlan 1 (config-interface-vlan 1)#ip ospf authentication null
60000CRG0-35B
2433
ip ospf network
Use the ip ospf network command to specify the type of network on this interface. Use the no form of this command to return to the default setting. Variations of this command include:
ip ospf network broadcast ip ospf network point-to-point
Syntax Description
broadcast point-to-point Sets the network type for broadcast. Sets the network type for point-to-point.
Default Values
By default, Ethernet defaults to broadcast. Point-to-Point Protocol (PPP) and Frame Relay default to point-to-point.
Command History
Release 3.1 Command was introduced.
Functional Notes
A point-to-point network will not elect designated routers.
Usage Examples
The following example designates a broadcast network type: (config)#interface vlan 1 (config-interface-vlan 1)#ip ospf network broadcast
60000CRG0-35B
2434
ip pim sparse-mode
Use the ip pim sparse-mode command to enable protocol-independent multicast (PIM) sparse mode for this interface. Use the no form of this command to disable PIM sparse mode. Syntax Description
No subcommands.
Default Values
By default, PIM sparse mode for this interface is disabled.
Command History
Release 11.1 Command was introduced.
Functional Notes
PIM sparse mode is a multicast routing protocol that makes use of the unicast forwarding table. It builds unidirectional shared trees rooted at a rendezvous point (RP) for a multicast group or a shortest-path tree rooted at a specific source for a multicast group.
Usage Examples
The following example enables PIM sparse mode on the interface: (config)#interface vlan 1 (config-interface-vlan 1)#ip pim sparse-mode
60000CRG0-35B
2435
Default Values
By default, the priority of all protocol-independent multicast (PIM) interfaces is 1.
Command History
Release 11.1 Command was introduced.
Functional Notes
Interfaces advertise their configured priority values in the hello messages transmitted on the interface. Routers use the priority values to determine the appropriate DR. The router on the network segment with the highest priority is selected as the DR. If a hello message is received on the interface from a router on the network segment and it does not contain a priority, the entire network segment defaults to DR selection based on IP addresses instead of priority. In this instance, the DR is selected as the router on the network segment that has the highest IP address. AOS will always include a priority in all transmitted hello messages. If no priority is specifically designated by the user, the priority is set as the default of 1.
Usage Examples
The following example specifies a priority of 100 on the virtual local area network (VLAN) 1 interface: (config)#interface vlan 1 (config-interface-vlan 1)#ip pim-sparse dr-priority 100
60000CRG0-35B
2436
Default Values
By default, the hellos are transmitted on PIM interfaces every 60 seconds.
Command History
Release 11.1 Command was introduced.
Functional Notes
Hello messages are used to inform neighbors of a routers presence. Hello messages normally generate a small amount of traffic on an interface. Setting the hello-timer to a small interval increases the number of hellos sent (thus increasing the amount of traffic). Set the hello-timer to a reasonable value, taking into consideration the bandwidth available on the interface.
Usage Examples
The following example specifies hellos be sent on the virtual local area network (VLAN) 1 interface every 3600 seconds: (config)#interface vlan 1 (config-interface-vlan 1)#ip pim-sparse hello-timer 3600
60000CRG0-35B
2437
Default Values
By default, the nbr-timeout is set to 105 seconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the nbr-timeout to 300 seconds: (config)#interface vlan 1 (config-interface-vlan 1)#ip pim-sparse nbr-timeout 300
60000CRG0-35B
2438
Default Values
By default, the override interval is set to 2500 milliseconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the override interval to 3000 milliseconds: (config)#interface vlan 1 (config-interface-vlan 1)#ip pim-sparse override-interval 3000
60000CRG0-35B
2439
Default Values
By default, the propagation delay is set to 500 milliseconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the propagation delay to 300 milliseconds: (config)#interface vlan 1 (config-interface-vlan 1)#ip pim-sparse propagation-delay 300
60000CRG0-35B
2440
ip proxy-arp
Use the ip proxy-arp command to enable proxy Address Resolution Protocol (ARP) on the interface. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, proxy ARP is enabled.
Command History
Release 1.1 Command was introduced.
Functional Notes
In general, the principle of proxy ARP allows a router to insert its IP address in the source IP address field of a packet (if the packet is from a host on one of its subnetworks). This allows hosts to reach devices on other subnetworks without implementing routing or specifying a default gateway. If proxy ARP is enabled, AOS will respond to all proxy ARP requests with its specified medium access control (MAC) address and forward packets accordingly. Enabling proxy ARP on an interface may introduce unnecessary ARP traffic on the network.
Usage Examples
The following example enables proxy ARP on the virtual local area network (VLAN) interface: (config)#interface vlan 1 (config-interface-vlan 1)#ip proxy-arp
60000CRG0-35B
2441
Syntax Description
1 2 Accepts only RIP version 1 packets received on the interface. Accepts only RIP version 2 packets received on the interface.
Default Values
By default, all interfaces implement RIP version 1 (the default value for the version command).
Command History
Release 1.1 Command was introduced.
Functional Notes
Use the ip rip receive version command to specify a RIP version that overrides the version (in the Router RIP) configuration. Refer to version on page 2687 for more information. AOS only accepts one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the virtual local area network (VLAN) interface to accept only RIP version 2 packets: (config)#interface vlan 1 (config-interface-vlan 1)#ip rip receive version 2
60000CRG0-35B
2442
Syntax Description
1 2 Transmits only RIP version 1 packets on the interface. Transmits only RIP version 2 packets on the interface.
Default Values
By default, all interfaces transmit RIP version 1 (the default value for the version command).
Command History
Release 1.1 Command was introduced.
Functional Notes
Use the ip rip send version command to specify a RIP version that overrides the version (in the Router RIP) configuration. Refer to version on page 2687 for more information. AOS only transmits one version (either 1 or 2) on a given interface.
Usage Examples
The following example configures the virtual local area network (VLAN) interface to transmit only RIP version 2 packets: (config)#interface vlan 1 (config-interface-vlan 1)#ip rip send version 2
60000CRG0-35B
2443
Default Values
By default, no manual summarization is applied by RIP.
Command History
Release 12.1 Command was introduced.
Functional Notes
Unlike the automatic summarization on classful network boundaries, only specific network advertisements are made by RIP using the ip rip summary-address command. This command is only effective if RIP version 2 is configured.
Usage Examples
The following example enables manual summarization on the specified IP address: (config)#interface vlan 1 (config-interface-vlan 1)#ip rip summary-address 10.10.123.0 255.255.255.0
60000CRG0-35B
2444
ip route-cache
Use the ip route-cache command to enable fast-cache switching on the interface. Use the no form of this command to disable fast-cache switching and return to process switching mode. Using network address translation (NAT) or the AOS firewall capabilities on an interface requires process switching mode (using the no ip route-cache command).
Syntax Description
No subcommands.
Default Values
By default, fast-cache switching is enabled on all Ethernet and virtual Frame Relay subinterfaces. IP route cache is enabled for all virtual Point-to-Point Protocol (PPP) interfaces.
Command History
Release 2.1 Command was introduced.
Functional Notes
Fast switching allows an IP interface to provide optimum performance when processing IP traffic.
Usage Examples
The following example enables fast switching on the virtual local area network (VLAN) interface: (config)#interface vlan 1 (config-interface-vlan 1)#ip route-cache
60000CRG0-35B
2445
ip route-cache express
Use the ip route-cache express command to enable Layer 3 switching on the virtual local area network (VLAN) interface. Use the no form of this command to disable Layer 3 switching on the interface. Syntax Description
No subcommands.
Default Values
Layer 3 switching is disabled by default, except on the NetVanta 1544. Layer 3 switching is enabled by default on the NetVanta 1544.
Functional Notes
Layer 3 switching cannot be disabled on the NetVanta 1544. Enabling or disabling Layer 3 switching on the VLAN interfaces overrides the global Layer 3 switching configuration. For more information about Layer 3 switching, refer to the Layer 3 Switching in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3070).
Command History
Release 17.5 Command was introduced.
Usage Examples
The following example enables Layer 3 switching on VLAN 200: (config)#interface vlan 200 (config-intf-vlan 200)#ip route-cache express
60000CRG0-35B
2446
ip unnumbered <interface>
Use the ip unnumbered command to use the IP address assigned to the specified interface for all IP processing on the active interface. Use the no form of this command to remove the unnumbered configuration. Syntax Description
<interface> Specifies the interface that contains the IP address to use as the source address for all packets transmitted on this interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type ip unnumbered ? for a list of valid interfaces.
Default Values
By default, all interfaces are configured to use a specified IP address (using the ip address command).
Command History
Release 1.1 Release 11.1 Command was introduced. Command was expanded to include the demand interfaces.
Functional Notes
If ip unnumbered is enabled on an interface, all IP traffic from the interface will use a source IP address taken from the specified interface. For example, specifying ip unnumbered eth 0/1 while in the Frame Relay Subinterface Configuration mode configures the Frame Relay subinterface to use the IP address assigned to the Ethernet interface for all IP processing. In addition, AOS uses the specified interface information when sending route updates over the unnumbered interface.
Usage Examples
The following example configures the virtual local area network (VLAN) interface (labeled vlan 1) to use the IP address assigned to the Ethernet interface (eth 0/1): (config)#interface vlan 1 (config-interface-vlan 1)#ip unnumbered eth 0/1
60000CRG0-35B
2447
ip urlfilter <name>
Use the ip urlfilter command to apply a universal resource locator (URL) filter to the interface for all inbound or outbound traffic. Use the no form of this command to remove the URL filter from an interface. Variations of this command include:
ip urlfilter <name> in ip urlfilter <name> out
Syntax Description
<name> in out Specifies the URL filter name to use on the interface. Applies the filter to the inbound traffic. Applies the filter to the outbound traffic.
Default Values
By default, there are no URL filters applied to any interfaces.
Command History
Release 12.1 Release 14.1 Command was introduced. Command was expanded to include the virtual local area network (VLAN) interfaces.
Functional Notes
The firewall must be enabled using the ip firewall command in order to use URL filters. The URL filter must be created by using the ip urlfilter <name> http command before applying it to the interface. Refer to ip urlfilter <name> http on page 1090 for more information on using this command.
Usage Examples
The following example performs URL filtering on all traffic entering through the VLAN interface and matches the URL filter named MyFilter: (config)#interface vlan 1 (config-interface-vlan 1)#ip urlfilter MyFilter in
60000CRG0-35B
2448
ipv6
Use the ipv6 command to enable Internet Protocol version 6 (IPv6) processing and create a link-local address on an interface. Use the no form of this command to disable IPv6 processing and remove all IPv6 configuration on the interface. Syntax Description
No subcommands.
Default Values
By default, IPv6 is not enabled on the interface.
Command History
Release 18.1 Command was introduced.
Functional Notes
Because AOS uses the dual-stack for IPv6 implementation, IPv6 features must be enabled for the supported IPv6 features to be used. Enabling IPv6 in AOS is completed by using an IPv6 address or using the ipv6 keyword with specific commands. For example, to enable IPv6 on an interface and cause the interface to join the link scoped all-nodes and all-routers multicast group, enter an IPv6 address on the interface. Use the ipv6 command to enable IPv6 processing and create a link-local address on an interface when other unicast IPv6 addresses are not needed on the interface. This command is not necessary nor effectual when any other form of an IPv6 address command is also present on the interface.
Usage Examples
The following example enables IPv6 and creates a link-local IPv6 address on the interface: (config)#interface vlan 1 (config-vlan 1)#ipv6
60000CRG0-35B
2449
Syntax Description
<ipv6 acl name> in out Applies the named IPv6 ACL to the interface. Enables access control on IPv6 packets received on the specified interface. Enables access control on IPv6 packets transmitted on the specified interface.
Default Values
By default, these commands are disabled.
Command History
Release 18.1 Command was introduced.
Functional Notes
Only one IPv6 ACL can be applied in each traffic direction. Unlike in IPv4, IPv6 traffic filters include an implicit permit for neighbor solicitation and advertisement packets in an ACL before the traditional implicit deny at the end of the ACL. This prevents blocking of address resolution and unreachability detection, although this can be overridden by entering explicit deny commands in the IPv6 ACL.
Usage Examples
The following example applies the IPv6 ACL Privatev6 to incoming IPv6 traffic on the interface: (config)#interface vlan 1 (config-vlan 1)#ipv6 access-group Private6 in
60000CRG0-35B
2450
Default Values
By default, there are no configured IPv6 ACPs associated with an interface.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example applies the IPv6 ACP PRIVATEv6 to the interface: Enable the AOS security features: (config)#ipv6 firewall Associate the ACP with the VLAN interface: (config)#interface vlan 1 (config-vlan 1)#ipv6 access-policy PRIVATEv6
60000CRG0-35B
2451
Default Values
By default, no IPv6 address is configured on the interface and IPv6 processing is not enabled on the interface.
Command History
Release 18.1 Command was introduced.
Functional Notes
The IPv6 unicast address can be a global unicast address or a unique local address, but it cannot be a link-local IPv6 address (FE80::). Link-local addresses are created on the interface using the command ipv6 address <ipv6 link-local address> link-local on page 2454. The address created by this command is a manually configured IPv6 address, which must have all parts (prefix and host bits) specified. Using the no form of this command with a specified IPv6 address removes only that IPv6 address from the interface. Using the no form of this command without a specified IPv6 address removes all manually configured IPv6 addresses from the interface.
Usage Examples
The following example adds a unicast IPv6 address to the interface and enables IPv6 processing on the interface: (config)#interface vlan 1 (config-vlan 1)#ipv6 address 2001:DB8::/32
60000CRG0-35B
2452
eui-64
Default Values
By default, no IPv6 address is configured on the interface and IPv6 processing is not enabled on the interface.
Command History
Release 18.1 Command was introduced.
Functional Notes
The IPv6 unicast address can be a global unicast address or a unique local address, but it cannot be a link-local IPv6 address (FE80::). Link-local addresses are created on the interface using the command ipv6 address <ipv6 link-local address> link-local on page 2454. The address created by this command is an EUI-64 unicast address. For this type of address, the EUI-64 interface ID is automatically placed in the IPv6 address. Any manually configured bits beyond the addresss prefix length are set to 0; however, any manually configured bits within the prefix length that extend into the lower 64 bits take precedence over the Interface ID bits. Using the no form of this command with a specified IPv6 address removes only that IPv6 address from the interface. Using the no form of this command without a specified IPv6 address removes all manually configured IPv6 addresses from the interface.
Usage Examples
The following example adds a unicast IPv6 address with an EUI-64 Interface ID to the interface and enables IPv6 processing on the interface: (config)#interface vlan 1 (config-vlan 1)#ipv6 address 2001:DB8:3F::/48 eui-64
60000CRG0-35B
2453
link-local
Default Values
By default, no IPv6 address is configured for the interface and IPv6 processing is not enabled.
Command History
Release 18.1 Command was introduced.
Functional Notes
A single link-local address can be manually configured on an interface. The lower 64 bits of the specified address become the Interface ID for the interface, overriding the default interface ID. Any other address that uses the EUI-64 parameter to automatically place the interface ID in the lower 64 bits of the IPv6 address use the new value for the interface ID. The <ipv6 address> for a link-local IPv6 address is specified in the format FE80::<bits>. The <bits> are the lower 64 bits of the link-local IPv6 address, and since this form of address has no prefix, the bits entered form the entire IPv6 address. These bits also become the new interface ID for the interface and can be derived from the interfaces medium access control (MAC) address. The link-local parameter specifies this is a manually configured link-local address. Any manually configured link-local address will replace an automatically configured link-local address for the interface. Using the no form of this command with a specified IPv6 address removes that IPv6 address from the interface. Using the no form of this command without a specified IPv6 address removes all manually configured IPv6 addresses from the interface.
Usage Examples
The following example manually creates a link-local IPv6 address on the interface and enables IPv6 processing: (config)#interface vlan 1 (config-vlan 1)#ipv6 address FE80::220:8FF:FE54:F9D8 link-local
60000CRG0-35B
2454
Syntax Description
default metric <value> Optional. Specifies that the interface maintain a list of advertising routers that are willing to be IPv6 default routers. Optional. Specifies the administrative distance for a default router maintained in the default router list. Range is 1 to 255. Routes with lower administrative distance are favored.
Default Values
By default, no IPv6 addresses are configured for the interface and IPv6 processing is not enabled. When an IPv6 address is configured automatically, the administrative distance for default routers is 2 by default.
Command History
Release 18.1 Command was introduced.
Functional Notes
When autoconfiguration is enabled, the interface listens for RA messages that tell the interface how it should be configured. The interface then creates addresses for advertised 64-bit prefixes with the A flag in the IPv6 address set using stateless address autoconfiguration (SLAAC). The addresses use the EUI-64 interface ID in the lower 64 bits of the address. A route type of Connected is added to the route table if the L flag on the prefix advertisement (on-link flag) is also set.
Usage Examples
The following example enables IPv6 processing on the interface, creates a link-local IPv6 address for the interface, and allows the interface to automatically configure itself for IPv6: (config)#interface vlan 1 (config-vlan 1)#ipv6 address autoconfig
60000CRG0-35B
2455
Default Values
By default, the MTU of the interface is set to 1280 bytes.
Command History
Release 18.1 Command was introduced.
Functional Notes
In IPv6, the minimum MTU is 1280 octets. Any link that has an MTU less than 1280 octets must use link fragmentation and reassembly that is transparent to IPv6 (for example, the Fragmentation Header). Sources in the IPv6 network are expected to perform path maximum transmission unit (PMTU) discovery to send packets larger than 1280 octets. PMTU works in the following manner: First, the sending node assumes the link MTU of the interface from which the traffic is being forwarded and then sends the IPv6 packet at the link MTU size. If a router on the path is unable to forward the packet, it sends an ICMP Packet Too Big message back to the sending node containing the link MTU of the link on which the packet forwarding failed. The sending node then rests the PMTU to the value of the MTU field in the Internet Control Message Protocol version 6 (ICMPv6) Packet Too Big message, and the packet is resent. The MTU for IPv6 packets can be set on a per-interface basis. There are two methods for setting MTUs for interfaces if required: one for Layer 3 interfaces, and one for the underlying Layer 1 and Layer 2 interfaces. For all interface types, use the ipv6 mtu <size> command to specify the IPv6 MTU in bytes from the interfaces configuration mode. The minimum MTU setting for IPv6 is 1280 bytes, and the maximum is 1500 bytes. The IPv6 MTU value is independent of the IPv4 MTU setting (set with the command ip mtu <size> on page 2429). When the interface is forwarding the IPv6 packet as a router, if the packet size exceeds the IPv6 MTU of the egress interface, the packet is dropped and ICMPv6 Packet Too Big message is sent to the source. When originating an IPv6 packet from the local IPv6 stack, and the packet is larger than the IPv6 MTU of the egress interface, the packet is fragmented and sent.
Usage Examples
The following example specifies the IPv6 MTU value for the interface: (config)#interface vlan 1 (config-vlan 1)#ipv6 mtu 1350
60000CRG0-35B
2456
ipv6 nd advertisement-interval
Use the ipv6 nd advertisement-interval command to specify that the Advertisement Interval Option is sent in Internet Protocol version 6 (IPv6) router advertisement (RA) messages from the router. This command is effectual only when the interface is in router mode. Use the no form of this command to return to the default interval. Syntax Description
No subcommands.
Default Values
By default, Advertisement Interval Options are not sent in RA messages.
Command History
Release 18.1 Command was introduced.
Functional Notes
Sending the Advertisement Interval Option should be enabled when the router is functioning in a mobile IP environment to aid movement detection by mobile nodes. This option contains the current value of the maximum router advertisement interval configured using the command ipv6 nd ra interval on page 2466.
Usage Examples
The following example specifies that the interface include Advertisement Interval Options in RA messages sent from the router: (config)#interface vlan 1 (config-vlan 1)#ipv6 nd advertisement-interval
60000CRG0-35B
2457
Default Values
By default, the interface sends 1 NS message.
Command History
Release 18.1 Command was introduced.
Functional Notes
DAD is used by devices to determine if IPv6 addresses are unique before they are applied to interfaces. DAD is used in NS messages to detect duplicate unicast addresses. The Target Address fields in the NS messages are set to the IPv6 address for which duplication is being detected. Destination IPv6 addresses for DAD in NS messages are the solicited-node multicast version of the address being tested. Source IPv6 addresses for DAD are set to the IPv6 unspecified address (::). Once the IPv6 address is determined by DAD to be unique, it can be applied to the IPv6 interface on the node. DAD in AOS is performed when an interface transitions state from DOWN to UP or when manually configuring an address. When performing DAD because of an interface transition, DAD will happen immediately after the interface transition and again 40 seconds later to cooperate with the port being connected to an Ethernet switch.
Usage Examples
The following example specifies that 3 NS messages are sent by the interface when performing DAD: (config)#interface vlan 1 (config-vlan 1)#ipv6 nd dad attempts 3
60000CRG0-35B
2458
ipv6 nd managed-config-flag
Use the ipv6 nd managed-config-flag command to specify the M flag in Internet Protocol version 6 (IPv6) router advertisement (RA) messages. The M flag instructs hosts receiving the RA that they can use stateful Dynamic Host Configuration Protocol version 6 (DHCPv6) to configure addresses and nonaddress information. Use the no form of this command to disable the setting of the M flag. Syntax Description
No subcommands.
Default Values
By default, the M flag is not set in RAs.
Command History
Release 18.1 Command was introduced.
Functional Notes
If you specify that the M flag is set in RA messages, you do not need to set the 0 flag (it becomes redundant).
Usage Examples
The following example sets the M flag for RA messages sent by the interface: (config)#interface vlan 1 (config-vlan 1)#ipv6 nd managed-config-flag
60000CRG0-35B
2459
Default Values
By default, the interval is set to 1000 ms for internal use by the router and 0 (unspecified) is sent in RA messages.
Command History
Release 18.1 Command was introduced.
Functional Notes
This command controls the spacing of NS messages for functions such as address resolution, reachability detection, and DAD. For DAD it also serves as the amount of time after the last transmission before the detection phase of autoconfiguration terminates. In addition, the command controls the interval between unsolicited NA messages.
Usage Examples
The following example changes the interval between RA messages sent from the interface to 2000 ms: (config)#interface vlan 1 (config-vlan 1)#ipv6 nd ns-interval 2000
60000CRG0-35B
2460
ipv6 nd other-config-flag
Use the ipv6 nd other-config-flag command to specify the O flag in Internet Protocol version 6 (IPv6) router advertisement (RA) messages. This command is only effectual when the interface is in router mode. When the O flag is set, hosts receiving the RA messages are instructed that they may use stateless Dynamic Host Configuration Protocol version 6 (DHCPv6) to receive information that is not IPv6 addressing information, and to use some other method (whether through manual configuration, stateless address autoconfiguration (SLAAC), etc.) for addressing information. Use the no form of this command to disable the O flag setting. Syntax Description
No subcommands.
Default Values
By default, the O flag is not set in RA messages.
Command History
Release 18.1 Command was introduced.
Functional Notes
If the M flag is set for RA messages, you do not need to set the O flag.
Usage Examples
The following example sets the O flag in RA messages from the interface: (config)#interface vlan 1 (config-vlan 1)#ipv6 nd other-config-flag
60000CRG0-35B
2461
ipv6 nd prefix
Use the ipv6 nd prefix command to specify the Internet Protocol version 6 (IPv6) address prefixes used in router advertisement (RA) messages sent from the interface. Use the no form of this command to remove the specified prefix configuration from the interface. Variations of this command include:
ipv6 nd prefix <ipv6 prefix/prefix-length | default> ipv6 nd prefix <ipv6 prefix/prefix-length | default> no-advertise ipv6 nd prefix <ipv6 prefix/prefix-length | default> <valid lifetime | infinite> <preferred lifetime | infinite> ipv6 nd prefix <ipv6 prefix/prefix-length | default> no-advertise <valid lifetime | infinite> <preferred lifetime | infinite> ipv6 nd prefix <ipv6 prefix/prefix-length | default> <valid lifetime | infinite> <preferred lifetime | infinite> [no-advertise] [no-autoconfig] [no-rtr-address] [no-onlink] [off-link] ipv6 nd prefix <ipv6 prefix/prefix-length | default> no-advertise <valid lifetime | infinite> <preferred lifetime | infinite> [no-autoconfig] [no-rtr-address] [no-onlink] [off-link]
Syntax Description
<ipv6 prefix/prefix-length> Specifies the IPv6 prefix and length to be advertised. Pv6 prefixes should be expressed in colon hexadecimal format (X:X::X/<Z>). For example, 2001:DB8:3F::/64. The prefix length (<Z>) is an integer with a value between 0 and 128. Specifies the default values for the IPv6 prefix parameters. Refer to the Functional Notes below for more information. Optional. Specifies the valid lifetime to advertise for this route in each RA message. Range is 0 to 4294967295 seconds. Optional. Specifies the preferred lifetime to advertise for this route in each RA message. Range is 0 to 4294967295 seconds. Optional. Specifies that the the valid and preferred lifetimes of the prefix do not expire. Optional. Specifies that the prefix is excluded from the RA message. Optional. Sets the A flag in the RA message to 0, indicating that hosts may not create an address for this prefix using stateless address autoconfiguration (SLAAC). This parameter only affects hosts receiving the RA message, it does not affect the operation of the local router. Optional. Sets the R flag in the RA message to 0 and specifies the full router IPv6 address is not included in the RA message. Optional. Specifies that the IPv6 prefix in the RA message is not to be used for on-link determination. Optional. Sets the L flag value to 0 in RA messages, which indicates the RA makes no statement about the on-link or off-link properties of the IPv6 prefix.
60000CRG0-35B
2462
Default Values
By default, all prefixes derived from the interfaces configured IPv6 addresses are advertised using the system default values. By default, the valid lifetime advertised for a prefix is 2592000 seconds and the preferred lifetime advertised is 604800 seconds. By default, the L flag is set to 1, the R flag is set to 1, and the A flag is set to 1.
Command History
Release 18.1 Command was introduced.
Functional Notes
This command works for both routers and hosts, but in host implementations it is used to manually add on-link prefixes that do not have an IPv6 address or to make off-link a prefix generated by an IPv6 address command. Hosts do not send RA messages, so the command only adds prefixes to RA messages when the interface is in router mode. This command can also be used to change the defaults used on configured prefixes when all options are not specified.
Changing the prefix defaults will affect prefixes derived from configured IPv6 addresses, as well as prefixes configured using the ipv6 nd prefix command.
Prefixes advertised can be a subset or a superset of the prefixes derived from the IPv6 addresses configured on the interface. Prefixes for IPv6 addresses configured on a router interface are automatically eligible to be advertised on that interface using system or configured default values without having to enter a prefix command. To impose additional controls on those prefixes, an entry must be made using this command with the desired settings. The default parameter is used to change the default settings for the IPv6 prefix parameters. Changing these settings can be useful when multiple prefixes are implemented that will use the same set of parameters. When configuring IPv6 prefixes, the prefix default values are only used if no other parameters are specified after specifying the IPv6 prefix and length (for example, ipv6 nd prefix 2001:DB8::/64). If additional parameters are specified, any unspecified parameters use the system default values rather than the configured default values. When the default values are changed, any prefix that uses them will also change. Using this command to change prefix default values also affects prefixes derived from configured IPv6 addresses on the interface. The optional <valid lifetime> parameter specifies the valid lifetime to advertise for this route in each advertisement. Hosts will reset the lifetime to this value each time the route is advertised, and they will keep this prefix until the valid lifetime expires. The optional <preferred lifetime> parameter specifies the preferred lifetime to advertise for this route in each advertisement. Hosts will reset the lifetime to this value each time the route is advertised, and they will keep the prefix in the preferred state during this time period. After the preferred time period expires, the prefix transitions to the deprecated state where it remains until the valid lifetime expires and the route is removed. The <preferred lifetime> value must be set to be shorter than the <valid lifetime> value.
60000CRG0-35B
2463
The optional off-link parameter sets the L flag (on-link flag) value to 0 in RA messages. When the L flag is set to 0, the advertisement makes no statement about on-link or off-link properties of the prefix. When the L flag is set, the prefix is considered on-link and locally reachable by hosts on the link (meaning a router is not needed). Hosts attached to the link will add on-link prefixes to their prefix list or route table. When off-link is not specified, a connected route is added to the route table of this router for this prefix. When off-link is specified, no route is added to the route table. By default, prefixes are advertised as on-link with the L flag set to 1. The optional no-rtr-address parameter sets the R flag (router flag) of the RA to 0 and does not include the full router address in the advertisement. The router address is typically included in the RA to assist in Mobile IP environments. By default, the R flag is set to 1 and the router address is sent in RA messages. The optional no-autoconfig parameter sets the A flag of the RA to 0, indicating that hosts may not create an address for this prefix using SLAAC. If the A flag is set to 1 (the default setting), hosts perform SLAAC to generate an address based on the prefix. This parameter only affects hosts receiving the RA, it does not effect the operation of the local router. The optional no-advertise parameter specifies that the prefix is excluded from RA messages. By default, the prefix is included in RA messages. The no-onlink parameter informs the router that the prefix is not to be used for on-link determination. By default, all prefixes derived from the interfaces configured IPv6 addresses are advertised using the system default values.
Usage Examples
The following example specifies that the IPv6 prefix 2001:DB8:3F::/48 has an infinite valid and preferred lifetime advertised in RA messages sent from the interface: (config)#interface vlan 1 (config-vlan 1)#ipv6 nd prefix 2001:DB8:3F::/48 infinite infinite The following example changes the default values and behaviors of prefixes included in RA messages to infinite valid and preferred lifetimes, and specifies that the on- or off-link state of the prefix is not included in the RA and that hosts receiving the RA may not use the prefix for creating an IPv6 address: (config)#interface vlan 1 (config-vlan 1)#ipv6 nd prefix default infinite infinite off-link no-autoconfig
60000CRG0-35B
2464
Default Values
By default, idle (STALE) neighbor cache entries are cleared after 1440 minutes (24 hours).
Command History
Release 18.1 Command was introduced.
Functional Notes
This command applies to interfaces in either router or host mode. A neighbor entry is typically purged when neighbor unreachability detection (NUD) is invoked and the neighbor is determined to no longer be reachable. However, NUD is not performed on idle (STALE) neighbor entries, so this command provides a method for purging unused entries after a specified amount of time.
Usage Examples
The following example specifies that idle neighbor entries in the neighbor cache are removed after 800 minutes: (config)#interface vlan 1 (config-vlan 1)#ipv6 nd purge-timer 800
60000CRG0-35B
2465
ipv6 nd ra interval
Use the ipv6 nd ra interval command to specify the interval between transmission of Internet Protocol version 6 (IPv6) router advertisement (RA) messages. This command is only effectual when the interface is in router mode. Use the no form of this command to return to the default value. Variations of this command include:
ipv6 nd ra interval <max time> ipv6 nd ra interval <max time> <min time> ipv6 nd ra interval msec <max time> ipv6 nd ra interval msec <max time> <min time>
Syntax Description
<max time> Specifies the maximum interval between RA message transmission. Time can be specified in seconds or milliseconds. Range is 4 to 1800 seconds and 70 to 1800000 ms. Optional. Specifies the minimum interval between RA message transmission. Time can be specified in seconds or milliseconds. Range is 3 seconds to 75 percent of the configured maximum time value in seconds, or 30 ms to 75 percent of the configured maximum time value in ms. Optional. Specifies that the time values are in milliseconds.
<min time>
msec
Default Values
By default, the interval is set in seconds and has a maximum interval time of 200 seconds and a minimum interval time of 75 percent of the maximum seconds value, but not less than 3 seconds.
Command History
Release 18.1 Command was introduced.
Functional Notes
If this router is used as a default router, the interval between RA messages should not be set to a larger value than the RA lifetime set by the command ipv6 nd ra lifetime <value> on page 2467, which has a default value of 1800 seconds.
Usage Examples
The following example specifies that the maximum interval in seconds between RA message transmissions is 300: (config)#interface vlan 1 (config-vlan 1)#ipv6 nd ra interval 300
60000CRG0-35B
2466
Default Values
By default, the router lifetime is set to 1800 seconds.
Command History
Release 18.1 Command was introduced.
Functional Notes
A value other than 0 for a router lifetime should be larger than the router advertisement interval specified in the command ipv6 nd ra interval on page 2466.
Usage Examples
In the following example, the router lifetime advertised in RA messages is 3000 seconds: (config)#interface vlan 1 (config-vlan 1)#ipv6 nd ra lifetime 3000
60000CRG0-35B
2467
Default Values
By default, the router advertises a reachability time of 0 ms and uses an internal value of 30000 ms.
Command History
Release 18.1 Command was introduced.
Functional Notes
This command is effectual for interfaces in either router or host mode. For hosts, this value sets the internal reachable time used by the host if no RAs are received specifying a different value. For routers, the value indicates the amount of time a device is considered reachable after having received a reachability confirmation in neighbor unreachabililty detection (NUD).
Usage Examples
The following example specifies that a reachability time of 50000 ms is advertised in RA messages: (config)#interface vlan 1 (config-vlan 1)#ipv6 nd ra reachable-time 50000
60000CRG0-35B
2468
ipv6 nd ra suppress
Use the ipv6 nd ra suppress command to specify whether Internet Protocol version 6 (IPv6) router advertisement (RA) messages will be suppressed. This command only applies to interfaces in router mode. Use the no form of this command to begin sending RA messages. Syntax Description
No subcommands.
Default Values
By default, RA messages are not suppressed. When IPv6 routing is not enabled on the router, or when implemented in a host-only mode, the default setting is to suppress advertisements on all interface types.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example suppresses RA messages on the interface: (config)#interface vlan 1 (config-vlan 1)#ipv6 nd ra suppress
60000CRG0-35B
2469
ipv6 nd router-preference
Use the ipv6 nd router-preference command to specify the default router preference value set in Internet Protocol version 6 (IPv6) router advertisement (RA) messages. Setting this preference helps the receivers of RA messages to determine the preference of one router over another as a default router in environments with multiple routers. Use the no form of this command to return the preference to the default setting. Variations of this command include:
ipv6 nd router-preference high ipv6 nd router-preference low ipv6 nd router-preference medium
Syntax Description
high low medium Specifies the preference value is high. Specifies the preference value is low. Specifies the preference value is medium.
Default Values
By default, the router preference is set to medium.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example specifies that the advertised default router preference is high: (config)#interface vlan 1 (config-vlan 1)#ipv6 nd router-preference high
60000CRG0-35B
2470
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface vlan 1 (config-vlan 1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2471
Default Values
A unique default MAC address is programmed in each unit shipped by ADTRAN.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example configures a MAC address of 00:0A:C8:5F:00:D2: (config)#interface vlan 1 (config-interface-vlan 1)#mac-address 00:0A:C8:5F:00:D2
60000CRG0-35B
2472
max-reserved-bandwidth <value>
Use the max-reserved-bandwidth command to specify the percentage of interface bandwidth reserved for use in user-defined (priority or class-based) queues. The remainder of the interface bandwidth is reserved for system-critical traffic and is not available to user-defined queues. Use the no form of this command to restore the default value. Reserving a portion of the interface bandwidth for system-critical traffic is necessary for proper operation. Specifying the entire interface bandwidth for use in user-defined queues can cause undesirable operation. Syntax Description
<value> Specifies the maximum percentage of bandwidth to reserve for quality of service (QoS). This setting is configured as a percentage of the total interface speed. Range is 1 to 100 percent.
Default Values
By default, max-reserved-bandwidth is set to 75 percent, which reserves 25 percent of the interface bandwidth for system-critical traffic.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example specifies 85 percent of the bandwidth on the virtual local area network (VLAN) 1 interface be available for use in user-defined queues: (config)#interface vlan 1 (config-interface-vlan 1)#max-reserved-bandwidth 85
60000CRG0-35B
2473
media-gateway ip
Use the media-gateway ip command to associate an IP address source to use for Realtime Transport Protocol (RTP) traffic. When configuring Voice over Internet Protocol (VoIP), RTP traffic must have an IP address associated with it. However, some interfaces allow dynamic configuration of IP addresses, causing this value to change periodically. Use the no form of this command to disable this function. Variations of this command include:
media-gateway ip loopback <interface id> media-gateway ip primary media-gateway ip secondary <ip address>
Syntax Description
loopback <interface id> Specifies an IP address statically defined to a loopback interface for RTP traffic. This is helpful when using a single IP address across multiple wide area network (WAN) interfaces for RTP traffic. The valid range for loopback interface identifiers is 1 to 1024. The interface ID is used to uniquely identify a loopback interface. The entered value cannot be in use by another loopback interface. Specifies using this interfaces configured primary IP address for RTP traffic. Applies to static, Dynamic Host Configuration Protocol (DHCP), or negotiated addresses. Specifies using this interfaces statically defined secondary IP address for RTP traffic. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
primary
Default Values
By default, media-gateway ip is disabled.
Command History
Release 10.1 Release 17.3 Command was introduced. Command was updated with the loopback interface identification option.
Usage Examples
The following example configures the unit to use the primary IP address for RTP traffic: (config)#interface vlan 1 (config-interface-vlan 1)#media-gateway ip primary
60000CRG0-35B
2474
qos-policy
Use the qos-policy command to apply a previously configured quality of service (QoS) map to incoming or outgoing packets on an interface. Use the no form of this command to remove the map from the interface. Variations of this command include:
qos-policy in <name> qos-policy out <name>
Syntax Description
<name> in out Specifies the name of a previously created QoS map (refer to qos map <name> <number> on page 1184 for more information). Assigns a QoS map to this interface's input. Assigns a QoS map to this interface's output.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 15.1 Command was introduced. Command was expanded to include the in parameter.
Functional Notes
When a QoS policy is applied to an interface, it may be disabled if the interface bandwidth is not adequate to support the requested bandwidth on the map set. Once the bandwidth problem is resolved, the map will work again. The bandwidth will be rechecked on any of the following changes: 1. A priority or class-based entry is added to, deleted from, or changed in a QoS map set. 2. The interface bandwidth is changed by the bandwidth command on the interface. 3. A QoS policy is applied to an interface. 4. A cross connect is created that includes an interface with a QoS policy. 5. The interface queuing method is changed to fair-queue to use weighted fair queuing (WFQ). 6. The interface operational status changes. 7. The interface bandwidth changes for other reasons (e.g., when asymmetric digital subscriber line (ADSL) finishes training). In order to prevent the map from being disabled in cases of temporary inadequate bandwidth (e.g., a single link goes down in a dual T1 multilink configuration where the map requests more than one T1's worth of bandwidth), the QoS map uses the maximum theoretical bandwidth on an interface, not the actual bandwidth at that time. This actually helps QoS keep higher priority class-based traffic working better than best-effort traffic when the bandwidth drops.
60000CRG0-35B
2475
Usage Examples
The following example applies the QoS map VOICEMAP to the virtual local area network (VLAN) interface: (config)#interface vlan 1 (config-interface-vlan 1)#qos-policy out VOICEMAP
60000CRG0-35B
2476
rtp quality-monitoring
Use the rtp quality-monitoring command to enable voice quality monitoring (VQM) of the Realtime Transport Protocol (RTP) voice stream packets on this interface. If the global command (ip rtp quality-monitoring) is disabled when this command is issued, the system will return the following warning: Applied but not used, you must globally enable ip rtp quality-monitoring to use VQM. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, VQM is enabled on all wide area network (WAN) and local area network (LAN) interfaces.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables RTP quality monitoring on the virtual local area network (VLAN) interface: (config)#interface vlan 1 (config-interface-vlan 1)#rtp quality-monitoring
60000CRG0-35B
2477
snmp trap
Use the snmp trap command to enable all supported Simple Network Management Protocol (SNMP) traps on the interface. Use the no form of this command to disable this trap. Syntax Description
No subcommands.
Default Values
By default, all interfaces (except virtual Frame Relay interfaces and subinterfaces) have SNMP traps enabled.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 8.1 Release 16.1 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the port channel and virtual local area network (VLAN) interfaces. Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the tunnel interface.
Usage Examples
The following example enables SNMP capability on the VLAN interface: (config)#interface vlan 1 (config-interface-vlan 1)#snmp trap
60000CRG0-35B
2478
Default Values
By default, the ifLinkUpDownTrapEnable object identifier (OID) is set to enabled for all interfaces except virtual Frame Relay interfaces.
Command History
Release 1.1 Release 5.1 Release 6.1 Release 7.1 Release 8.1 Release 9.1 Release 11.1 Release 16.1 Release 17.2 Command was introduced. Command was expanded to include the Ethernet subinterfaces and Gigabit Ethernet interfaces. Command was expanded to include the E1, port channel, T3, and virtual local area network (VLAN) interfaces. Command was expanded to the high speed serial interface (HSSI). Command was expanded to the asynchronous transfer mode (ATM) interface. Command was expanded to the high level data link control (HDLC) interface. Command was expanded to the demand interface. Command was expanded to the tunnel interface. Command was expanded to the cellular interface.
Functional Notes
The snmp trap link-status command is used to control the RFC 2863 ifLinkUpDownTrapEnable OID (OID number 1.3.6.1.2.1.31.1.1.1.14.0).
Usage Examples
The following example disables the link-status trap on the VLAN interface: (config)#interface vlan 1 (config-interface-vlan 1)#no snmp trap link-status
60000CRG0-35B
2479
Syntax Description
<value> <burst> Specifies the rate (in bits per second) at which the interface should be shaped. Optional. Specifies the allowed burst in bytes. By default, the burst is specified as the rate divided by 5 and represents the number of bytes that would flow within 200 ms.
Default Values
By default, traffic-shape rate is disabled.
Command History
Release 10.1 Command was introduced.
Functional Notes
Traffic shaping can be used to limit the VLAN interface to a particular rate or to specify use of quality of service (QoS).
Usage Examples
The following example sets the outbound rate of vlan 1 to 128 kbps and applies a QoS policy that gives all Realtime Transport Protocol (RTP) traffic priority over all other traffic: (config)#qos map voip 1 (config-qos-map)#match ip rtp 10000 10500 all (config-qos-map)#priority unlimited (config-qos-map)#interface vlan 1 (config-interface-vlan 1)#traffic-shape rate 128000 (config-interface-vlan 1)#qos-policy out voip
60000CRG0-35B
2480
Keep in mind that changing an interfaces VRF association will clear all IP-related settings on that interface. Syntax Description
<name> Specifies the name of the VRF to which to assign the interface.
Default Values
By default, interfaces are associated with the default VRF that is unnumbered.
Command History
Release 16.1 Release 17.8 Command was introduced. The keyword ip was removed from this command.
Functional Notes
VRF instances must be created first before an interface can be assigned. An interface can only be assigned to one VRF, but multiple interfaces can be assigned to the same VRF. An interface will only forward IP traffic that matches its associated VRF. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured.
Usage Examples
The following example assigns the VLAN interface to the VRF instance named RED: (config)#interface vlan 1 (config-vlan1)#vrf forwarding RED
60000CRG0-35B
2481
vrrp <number>
Use the vrrp command to configure Virtual Router Redundancy Protocol (VRRP) routers within a router group. Use the no form of this command to remove the VRRP routers configurations. Variations of this command include:
vrrp <number> description <text> vrrp <number> ip <address> vrrp <number> ip <address> secondary vrrp <number> preempt vrrp <number> preempt delay minimum <time> vrrp <number> priority <level> vrrp <number> shutdown vrrp <number> startup-delay <delay> vrrp <number> timers advertise <interval> vrrp <number> timers learn vrrp <number> track <name> vrrp <number> track <name> decrement <value>
Syntax Description
<number> description <text> ip <address> secondary preempt delay minimum <time> priority <level> shutdown startup-delay <delay> timers advertise <interval> learn track <name> Specifies the VRRP router groups virtual router ID (VRID) number. Range is 1 to 255. Specifies the textual description of the VRRP router within the group. Specifies the IP address to be used by the VRRP router. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the entry of an additional VRRP router supported IP address. Allows a VRRP router to preempt the current master router if its priority level is higher than the current masters. Optional. Specifies a delay (in seconds) before the specified router will attempt to preempt the current master router. Range is 0 to 255 seconds. Specifies the configured priority level of the VRRP router. Level range is 1 to 254. Disables the VRRP router. Specifies a time delay (in seconds) before a VRRP router becomes active. Range is 0 to 255 seconds. Specifies the configuration of the VRRP timers. Specifies the time (in seconds) between advertisements sent by the master router. Range is 1 to 255 seconds. Specifies that the backup VRRP router learns the advertisement interval of the master router. Specifies a change in priority level of the VRRP router based upon the specified track.
60000CRG0-35B
2482
VLAN Interface Command Set Optional. Specifies the numerical amount to decrement the VRRPs priority level if the track transitions to a FAIL state. Decrement value range is 1 to 254.
Default Values
By default, VRRP is enabled. By default, a VRRP router will preempt with no additional delay. The default configured priority for a VRRP router that is either a backup router or not the IP address owner is 100. The default actual priority of a VRRP router that is the IP address owner is 255. By default, startup-delay is enabled with a default value of 35 seconds. By default, the advertisement interval is 1 second. By default, the default decrement value is 10.
Command History
Release 16.1 Command was introduced.
Functional Notes
A VRRP router may be part of more than one virtual router group. Although VRRP group VRIDs can be numbered between 1 and 255, only two VRRP routers per interface are supported. It is recommended that the timers advertise setting is kept at the default value. If it is necessary to change this setting, ensure that all VRRP routers are configured with the new value, as all VRRP routers in the virtual group must have the same advertisement interval value. It is also recommended that if the timers learn function is enabled on one router in a virtual router group, then the timers learn function should be enabled on all routers in the group. When the virtual routers specified IP address is independent of the IP addresses assigned to real interfaces on the VRRP routers, there is no IP address owner. This addressing method is preferred if object tracking will be used to monitor the network connection. The IP address used for the virtual router must be on the same subnet as either the primary or secondary IP addresses assigned to the VRRP routers real interface. A track must be created before the vrrp track command can be issued. Refer to the Network Monitor Track Command Set on page 2629 for more information on creating tracks. If a VRRP router owns the virtual router IP address, then the VRRP routers priority level cannot be decremented as a result of the track command. If object tracking will be used, it is important that no VRRP router own the virtual router IP address.
Usage Examples
The following example describes a VRRP router within virtual router group 1 as the Default Master Router: (config)#interface vlan 1 (config-interface-vlan 1)#vrrp 1 description Default Master Router
60000CRG0-35B
2483
The following example specifies an IP address of 10.0.0.1 for a VRRP router within virtual router group 1: (config)#interface vlan 1 (config-interface-vlan 1)#vrrp 1 ip 10.0.0.1 The following example specifies that the VRRP router within virtual router group 1 preempts the current master router after a 30 second delay: (config)#interface vlan 1 (config-interface-vlan 1)#vrrp 1 preempt delay minimum 30 The following example specifies the configured priority for the VRRP router within virtual router group 1 is 254: (config)#interface vlan 1 (config-interface-vlan 1)#vrrp 1 priority 254 The following example disables the VRRP router within virtual router group 1: (config)#interface vlan 1 (config-interface-vlan 1)#vrrp 1 shutdown The following example configures a VRRP router on group 1 to delay 45 seconds before becoming active: (config)#interface vlan 1 (config-interface-vlan 1)#vrrp 1 startup-delay 45
60000CRG0-35B
2484
60000CRG0-35B
2485
Additional steps must be performed before the AP is ready for connectivity. The radio-level settings are configured using the Radio Interface Command Set on page 2504. The virtual access point (VAP) settings are configured using the VAP Interface Command Set on page 2529. The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. access-point controller-standby on page 2488 access-point mac-address <mac address> on page 2489 association access-list <name> on page 2490 country-region on page 2491 encapsulation 802.1q on page 2493 ethernet-speed on page 2495 event-history on page 2496 full-duplex on page 2497 half-duplex on page 2498 ip address <ip address> <subnet mask> on page 2499 ip default-gateway <ip address> on page 2500 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2501 location <name> on page 2502
60000CRG0-35B
2486
60000CRG0-35B
2487
access-point controller-standby
Use the access-point controller-standby command to release wireless access controller (AC) control of the wireless access point (AP). This command will cause the AC to stop responding to echo requests from the AP, releasing control of the AP. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, controller-standby mode is disabled.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example enables controller-standby mode for this AP interface: (config)#interface dot11ap 1 (config-dot11ap 1)#access-point controller-standby
60000CRG0-35B
2488
Default Values
No default values are necessary for this command.
Command History
Release 15.1 Command was introduced.
Functional Notes
This command binds the wireless access controller (AC) to the AP. Without specifying the MAC address, the AC cannot control the AP.
Usage Examples
The following example configures an AP MAC address of 00:0A:C8:5F:00:D2: (config)#interface dot11ap 1 (config-dot11ap 1)#access-point mac-address 00:0A:C8:5F:00:D2
60000CRG0-35B
2489
Default Values
By default, no MAC ACLs are associated with an AP.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example configures the AP to use the MAC ACL named allowlist as a filter for allowing access: (config)#interface dot11ap 1 (config-dot11ap 1)#association access-list allowlist
60000CRG0-35B
2490
country-region
Use the country-region command to specify the country region or domain where the wireless access point (AP) is being used so that the radio can modify its settings to conform to that countrys regulations. Use the no form of this command to return to the default value. Variations of this command include:
country-region Asia country-region Australia country-region Canada country-region Denmark country-region Europe country-region Finland country-region France country-region Germany country-region Ireland country-region Italy country-region Japan country-region Mexico country-region Netherlands country-region New_Zealand country-region Norway country-region Puerto_Rico country-region South_America country-region Spain country-region Sweden country-region Switzerland country-region UK country-region USA
Syntax Description
Asia Australia Canada Denmark Europe Finland France Germany Ireland Italy Japan Mexico Netherlands New_Zealand Specifies Asia configuration. Specifies Australia configuration. Specifies Canada configuration. Specifies Denmark configuration. Specifies Europe configuration. Specifies Finland configuration. Specifies France configuration. Specifies Germany configuration. Specifies Ireland configuration. Specifies Italy configuration. Specifies Japan configuration. Specifies Mexico configuration. Specifies Netherlands configuration. Specifies New Zealand configuration.
60000CRG0-35B
2491
Command Reference Guide Norway Puerto_Rico South_America Spain Sweden Switzerland UK USA Specifies Norway configuration. Specifies Puerto Rico configuration. Specifies South America configuration. Specifies Spain configuration. Specifies Sweden configuration. Specifies Switzerland configuration. Specifies UK configuration. Specifies USA configuration.
Default Values
By default, the country-region is set to USA.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example sets the country of operation to Norway: (config)#interface dot11ap 1 (config-dot11ap 1)#country-region Norway
60000CRG0-35B
2492
encapsulation 802.1q
Use the encapsulation 802.1q command to set the wireless access point (AP) for virtual local area network (VLAN) encapsulation 802.1q mode. This will apply VLAN tags to the user traffic. Use the no form of this command to disable VLAN encapsulation. Variations of this command include:
encapsulation 802.1q encapsulation 802.1q awcp-vlan <vlan id> native encapsulation 802.1q awcp-vlan <vlan id> native priority <level>
Syntax Description
awcp-vlan <vlan id> Optional. Specifies an existing VLAN to be used for ADTRAN Wireless Control Protocol (AWCP) connection. Valid range is 1 to 4096. For more information on creating a VLAN, refer to VLAN Interface Command Set on page 2401. Enables native mode for the specified VLAN. Packets from this VLAN leaving the interface will not be tagged with the VLAN number. Any untagged packets received by the interface are considered a part of the native VLAN ID. Only one VLAN may be set to native. To change where the native VLAN resides, the current native must be disabled using the no form of this command before a new one is set. Optional. Specifies the 802.1q priority level for AWCP packets generated by this AP when VLAN tags are applied. Valid range is 1 to 7, with 1 being the highest priority.
native
priority <level>
Default Values
By default, encapsulation 802.1q is disabled on the AP.
Command History
Release 6.1 Release 15.1 Command was introduced. Command was expanded to include the access point (AP) interface.
Functional Notes
Settings (including encapsulation, VLAN, and native VLAN) for the AP's Ethernet interface must be coordinated with the physical interface to which the AP is connected. Since all functions on an AP use the same Ethernet interface, there should be only one VLAN ID set to native on the entire AP. It is possible that a VLAN can be used on a virtual access point (VAP) and for the AWCP protocol on the APs Ethernet, but this is not typical. Typically, the control protocol will use the native VLAN and the VAPs data will all be tagged on the Ethernet. This means that one VLAN on one radio's VAP may be set to native or the control protocol (AWCP) VLAN may be set to native, but not both unless they both use the same VLAN ID. Typically, the control protocol will use the native VLAN.
60000CRG0-35B
2493
If the control protocol and a VAP share the same VLAN ID, control protocol packets will be intercepted by the AP while noncontrol protocol packets will be forwarded to the VAP. If the AP is to be in trunk mode and the AWCP VLAN is not the native VLAN for the trunk, care must be exercised in transitioning the AP and switchport from access port (nontrunk) mode. The AP should be configured first, then the switchport set to match. When transitioning the AP, set its AWCP VLAN first, then enable trunking mode (encapsulation 802.1q). If the AWCP VLAN is the native VLAN on the AP and switch, AWCP communication will not be lost no matter what combination of trunk mode settings is applied.
Usage Examples
The following example enables encapsulation 802.1q on this AP and makes VLAN 1 the native VLAN: (config)#interface dot11ap 1 (config-dot11ap 1)#encapsulation 802.1q awcp-vlan 1 native
60000CRG0-35B
2494
ethernet-speed
Use the ethernet-speed command to configure the speed of the wireless access points (AP) Ethernet interface. Use the no form of this command to return to the default value. Variations of this command include:
ethernet-speed 10 ethernet-speed 100 ethernet-speed auto
This command is not available for the embedded access point module (EAPM). For the EAPM, the Ethernet speed is fixed at 100 Mbps.
Syntax Description
10 100 auto Configures the AP's Ethernet speed for 10 Mbps. Configures the AP's Ethernet speed for 100 Mbps. Configures the AP's Ethernet speed for auto negotiation.
Default Values
By default, the ethernet-speed is set to auto.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example sets the APs Ethernet speed to 10 Mbps: (config)#interface dot11ap 1 (config-dot11ap 1)#ethernet-speed 10
60000CRG0-35B
2495
event-history
Use the event-history command to configure the wireless access point (AP) to transmit log messages to the wireless access controller (AC) via the control protocol. The AC will then integrate these messages into the ACs event subsystem for local display, history, or syslog forwarding. Use the no form of this command to terminate log messages. Variations of this command include:
event-history on event-history priority <level>
Syntax Description
on priority <level> Enables the AP to send log messages to the AC. Sets the minimum priority level of messages sent to the AC. This setting is provided on a per-AP basis so that the user can control the level of logging traffic that will occur on their network. The levels are: 1 (Alert), 2 (Critical), 3 (Error), 4 (Warning), 5 (Notice), 6 (Informational).
Default Values
By default, event history transmission is disabled and the priority level is 3. This means that messages with levels 1 through 3 will be sent, and messages with level 4 through 6 will not be sent.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example changes the minimum priority level of the log messages sent to the AC to 6. This will send all log messages to the AC: (config)#interface dot11ap 1 (config-dot11ap 1)#event-history priority 6
60000CRG0-35B
2496
full-duplex
Use the full-duplex command to configure the wireless access point (AP) Ethernet interface for full-duplex operation. This allows the interface to send and receive simultaneously. Use the no form of this command to return to the default half-duplex operation. This command is not available for the embedded access point module (EAPM). The EAPM is fixed at full-duplex operation.
Syntax Description
No subcommands.
Default Values
By default, all AP Ethernet interfaces are configured for half-duplex operation.
Command History
Release 15.1 Command was introduced for the AP interface.
Functional Notes
Full-duplex Ethernet is a variety of Ethernet technology currently being standardized by the IEEE. Because there is no official standard, vendors are free to implement their independent versions of full-duplex operation. Therefore, it is not safe to assume that one vendors equipment will work with another. Devices at each end of a full-duplex link have the ability to send and receive data simultaneously over the link. Theoretically, this simultaneous action can provide twice the bandwidth of normal (half-duplex) Ethernet. To deploy full-duplex Ethernet, each end of the link must only connect to a single device. With only two devices on a full-duplex link, there is no need to use the medium access control mechanism (to share the signal channel with multiple stations) and listen for other transmissions or collisions before sending data.
Usage Examples
The following example configures the APs Ethernet interface for full-duplex operation: (config)#interface dot11ap 1 (config-dot11ap 1)#full-duplex
60000CRG0-35B
2497
half-duplex
Use the half-duplex command to configure the wireless access points (AP) Ethernet interface for half-duplex operation. This setting allows the Ethernet interface to either send or receive at any given moment, but not simultaneously. Use the no form of this command to disable half-duplex operation.
This command is not available for the embedded access point module (EAPM).
Syntax Description
No subcommands.
Default Values
By default, all Ethernet interfaces are configured for half-duplex operation.
Command History
Release 15.1 Command was introduced for the AP interface.
Functional Notes
Half-duplex Ethernet is the traditional form of Ethernet that employs the carrier sense multiple access/collision detect (CSMA/CD) protocol to allow two or more hosts to share a common transmission medium while providing mechanisms to avoid collisions. A host on a half-duplex link must listen on the link, and only transmit when there is an idle period. Packets transmitted on the link are broadcast (so it will be heard by all hosts on the network). In the event of a collision (two hosts transmitting at once), a message is sent to inform all hosts of the collision and a backoff algorithm is implemented. The backoff algorithm requires the station to remain silent for a random period of time before attempting another transmission. This sequence is repeated until a successful data transmission occurs.
Usage Examples
The following example configures the AP Ethernet interface for half-duplex operation: (config)#interface dot11ap 1 (config-dot11ap 1)#half-duplex
60000CRG0-35B
2498
Default Values
By default, there are no assigned IP addresses.
Command History
Release 15.1 Command was introduced for the AP interface.
Functional Notes
The IP address and subnet mask are only needed on the AP interface if the user wants to use remote authentication dial-in user service (RADIUS) authentication with the wireless clients. A default gateway may also need to be specified.
Usage Examples
The following example configures an IP address of 192.22.72.101 and a subnet mask of 255.255.255.252: (config)#interface dot11ap 1 (config-dot11ap 1)#ip address 192.22.72.101 255.255.255.252
60000CRG0-35B
2499
Default Values
By default, there is no configured default gateway.
Command History
Release 15.1 Command was introduced for the AP interface.
Usage Examples
The following example assigns the AP a default gateway for 10.10.10.1: (config)#interface dot11ap 1 (config-dot11ap 1)#ip default-gateway 10.10.10.1
60000CRG0-35B
2500
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface dot11ap 1 (config-dot11ap 1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2501
location <name>
Use the location command to specify the location of the wireless access point (AP). Use the no form of this command to remove the specified location. Syntax Description
<name> Specifies the name of the location of the AP. The location name may be up to 32 characters.
Default Values
No default values are necessary for this command.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example assigns the name floor5 as the location of AP 1: (config)#interface dot11ap 1 (config-dot11ap 1)#location floor5
60000CRG0-35B
2502
name <name>
Use the name command to specify a name for this wireless access point (AP). Use the no form of this command to remove the assigned name. Syntax Description
<name> Specifies the name of the AP. The name may be up to 32 characters in length.
Default Values
By default, the name of the AP will be ADTN plus the last three bytes of the AP medium access control (MAC) address (all uppercase).
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example assigns the name accounting1 to AP 1: (config)#interface dot11ap 1 (config-dot11ap 1)#name accounting1
60000CRG0-35B
2503
To activate Radio Interface Configuration mode for an 802.11a radio, enter the commands at the Global Configuration mode prompt as shown below:
>enable #configure terminal (config)#interface dot11ap 1/2 (config-dot11ap 1/2-a)#
By default, interface dot11ap <ap/1> is radio type 802.11bg and interface dot11ap <ap/2> is radio type 802.11a.
60000CRG0-35B
2504
Not all radio interface commands apply to both radio types.Use the ? command to display a list of valid commands. The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. antenna on page 2506 beacon period <time> on page 2507 channel <number> on page 2508 fragment-threshold <length> on page 2510 inactivity-timeout max <value> on page 2511 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2512 power local on page 2513 preamble-short on page 2514 protection-mode on page 2515 qos-mode wmm on page 2517 radio-mode on page 2519 rtp quality-monitoring on page 2521 rts threshold <length> on page 2522 short-slot-time on page 2523 speed on page 2524 speed default basic-set on page 2525 station-role access-point on page 2526 vap-isolation on page 2527 world-mode dot11d on page 2528
60000CRG0-35B
2505
antenna
Use the antenna command to select the desired antenna mode. Use the no form of this command to return to the default value. Variations of this command include the following:
antenna 1 antenna 2 antenna diversity
Syntax Description
1 2 diversity Sets the antenna mode to transmit or receive on antenna 1. Sets the antenna mode to transmit or receive on antenna 2. Sets the mode to transmit or receive on antenna with best signal.
Default Values
By default, the antenna is set to diversity.
Command History
Release 15.1 Command was introduced.
Functional Notes
Diversity antennas are two separate antennas that are attached to a single wireless radio. These antennas are designed to reduce the effects of multi-path radio distortion. Each antenna samples the radio signal around the access point (AP). The antenna receiving the best signal is chosen to transmit and receive information. Only one diversity antenna is in use at any given time.
Usage Examples
The following example sets the antenna mode to transmit or receive on antenna 1 on an 802.11bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#antenna 1
60000CRG0-35B
2506
Default Values
By default, the beacon period is 100 TU.
Command History
Release 15.1 Command was introduced.
Functional Notes
A beacon is a type of management frame used in 802.11 wireless networks. Beacon frames carry important information, such as the basic service set, parameter sets, and capability. The beacon frame is sent to the broadcast medium access control (MAC) address, which means that all clients must be able to receive and process beacons. Beacon frames are associated with some overhead, which decreases the throughput of the wireless network. The higher the beacon period, the fewer number of beacons sent, thus reducing overhead and increasing throughput on the network. However, fewer beacons can cause a delay in the association process because stations scanning for available access points (APs) may miss the beacons.
Usage Examples
The following example sets the beacon period to 500 TU on an 802.11 bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#beacon period 500
60000CRG0-35B
2507
channel <number>
Use the channel command to manually select a channel for the wireless radio or to scan for the best channel available. Use the no form of this command to return to the default value. Variations of this command include the following:
channel <number> channel least-congested
Syntax Description
<number> Specifies the Institute of Electrical and Electronics Engineers, Inc. (IEEE) channel number. The range of channels is dependent on the radio type and country setting (refer to the table in Functional Notes for a complete list of supported channels by country). Sets the radio to scan for the best channel available.
least-congested
Default Values
By default, the radio scans for the least-congested channel available.
Command History
Release 15.1 Command was introduced.
Functional Notes
The following table lists the supported channels by country.
Country Asia Australia Canada Denmark Europe Finland France Germany Ireland Italy Japan Mexico Netherlands New Zealand 149, 153, 157, 161 36, 40, 44, 48, 52, 56, 60, 64, 149, 153, 157, 161, 165 36, 40, 44, 48, 52, 56, 60, 64, 149, 153, 157, 161, 165 802.11a (5 GHz) Wireless Radios Channels 802.11bg (2.4 GHz) Wireless Radios Channels 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11
36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 132, 136, 140 34, 38, 42, 46 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 132, 136, 140 34, 38, 42, 46 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 132, 136, 140 36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 132, 136, 140 36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 132, 136, 140 34, 38, 42, 46 36, 40, 44, 48, 149, 153, 157, 161, 165 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11
36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 132, 136, 140 36, 40, 44, 48, 52, 56, 60, 64, 149, 153, 157, 161, 165 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13
60000CRG0-35B
2508
36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 132, 136, 140 36, 40, 44, 48, 149, 153, 157, 161, 165 802.11a not supported 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13
36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 132, 136, 140 36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 132, 136, 140 34, 38, 42, 46 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13
36, 40, 44, 48, 52, 56, 60, 64, 100, 104, 108, 112, 116, 120, 124, 128, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 United Kingdom 132, 136, 140 United States 36, 40, 44, 48, 149, 153, 157, 161, 165 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11
Usage Examples
Type channel ? to display a list of valid channels from which to choose. The list of channels displayed is based on the selected radio type (refer to the command radio-mode on page 2519) and country setting (refer to the command country-region on page 2491).
The following example manually sets an 802.11bg wireless radio to channel 6 in the United States: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#channel 6 The following example manually sets an 802.11a wireless radio to channel 149 in the United States: (config)#interface dot11ap 1/2 radio-type 802.11a (config-dot11ap 1/1-a)#channel 149
60000CRG0-35B
2509
fragment-threshold <length>
Use the fragment-threshold command to set the packet length threshold. Packets larger than the value set in this command will be fragmented when transmitted on the wireless link. Use the no form of this command to return to the default value. Syntax Description
<length> Specifies the maximum packet length allowed before fragmentation will occur. Range is 256 to 2346 bytes.
Default Values
By default, the fragment threshold is set at 2346 bytes.
Command History
Release 15.1 Command was introduced.
Functional Notes
Fragment threshold can be set to a lower number to prevent retransmission of large packets, but the overhead is increased. If the threshold is large, the overhead is relatively small but large packets will be retransmitted, lowering efficiency.
Usage Examples
The following example sets the fragment threshold at 572 bytes on an 802.11bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#fragment-threshold 572
60000CRG0-35B
2510
Default Values
By default, the maximum inactivity timeout is 5 minutes.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example sets the maximum inactivity timeout to 2 minutes on an 802.11bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#inactivity-timeout max 2
60000CRG0-35B
2511
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2512
power local
Use the power local command to select the radio's transmit power level. The range of the power level is relative to the country region currently specified for the radio. Use the no form of this command to return to the default value. Variations of this command include:
power local maximum power local half power local quarter power local eighth power local minimum
Syntax Description
maximum half quarter eighth minimum Sets the power local level to the maximum output power setting. Sets the power local level to one-half of the maximum output power setting. Sets the power local level to one-fourth of the maximum output power setting. Sets the power local level to one-eighth of the maximum output power setting. Sets the power local level to the minimum output power setting.
Default Values
By default, the power local setting is maximum.
Command History
Release 15.1 Command was introduced.
Functional Notes
Radio cell size and interference between cells can be reduced by lowering the radio's transmit power level.
Usage Examples
The following example sets the radio's transmit power to one-half maximum power on an 802.11bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#power local half
60000CRG0-35B
2513
preamble-short
Use the preamble-short command to enable short preamble mode on an 802.11bg radio. The preamble is information at the beginning of a packet that is used by the access point (AP), as well as its clients. Use the no form of this command to return to the default value. Syntax Description
No subcommands.
Default Values
By default, short preamble mode is enabled.
Command History
Release 15.1 Command was introduced.
Functional Notes
When short preamble mode is enabled, clients may request short or long preambles according to need. Disabling short preamble mode means that clients must request long preambles only.
Usage Examples
The following example enables short preamble mode on an 802.11bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#preamble-short
60000CRG0-35B
2514
protection-mode
Use the protection-mode command to configure the protection mode, type, and rate for an 802.11bg radio. Use the no form of this command to return to the default value. Variations of this command include the following:
protection-mode always protection-mode always type cts-only protection-mode always type cts-only rate 1 protection-mode always type cts-only rate 2 protection-mode always type cts-only rate 5.5 protection-mode always type cts-only rate 11 protection-mode always type rts-cts protection-mode always type rts-cts rate 1 protection-mode always type rts-cts rate 2 protection-mode always type rts-cts rate 5.5 protection-mode always type rts-cts rate 11 protection-mode auto protection-mode auto type cts-only protection-mode auto type cts-only rate 1 protection-mode auto type cts-only rate 2 protection-mode auto type cts-only rate 5.5 protection-mode auto type cts-only rate 11 protection-mode auto type rts-cts protection-mode auto type rts-cts rate 1 protection-mode auto type rts-cts rate 2 protection-mode auto type rts-cts rate 5.5 protection-mode auto type rts-cts rate 11
Syntax Description
always auto type cts-only rts-cts rate 1 2 Sets the packet rate to 1 Mbps. Sets the packet rate to 2 Mbps. Specifies clear to send-only (CTS-only) protection mode. Specifies request to send-clear to send (RTS-CTS) protection mode. Protection mode is always on regardless of the presence of 802.11b clients. Protection mode is automatically activated when an 802.11b client associates with an 802.11g access point (AP).
60000CRG0-35B
2515
Command Reference Guide 5.5 11 Sets the packet rate to 5.5 Mbps. Sets the packet rate to 11 Mbps.
Default Values
By default, protection-mode is set to auto, type is set to cts-only, and the rate is set to 11.
Command History
Release 15.1 Command was introduced
Functional Notes
Protection mode is used when 802.11b and 802.11g radios exist together on the same wireless local area network (WLAN) network. 802.11g devices are required to be backwards-compatible with legacy 802.11b devices. Both radios operate in the 2.4 GHz frequency range; however, each uses a different transmission type. 802.11b radios use direct sequence spread spectrum (DSSS) for transmitting data, and 802.11g radios use orthogonal frequency division multiplexing (OFDM) for transmitting data. Contention for media access on 802.11 networks is managed via carrier sense multiple access with collision avoidance (CSMA/CA), but the use of two different transmission types prevents 802.11b devices from hearing transmission attempts on the shared radio frequency (RF) medium. Protection mode addresses this problem and allows for coexistence of 802.11b and 802.11g devices on a network. There are two protection mode types: CTS-only, also known as CTS-to-self, and RTS-CTS. Both types are used when an 802.11g AP associates with an 802.11b client. Compared to a network that contains solely 802.11g clients, use of a protection mode reduces throughput. Compared to each other, CTS-only mode requires slightly less protocol overhead than RTS-CTS mode. Protection frames must be transmitted at 802.11b rates (1 Mbps, 2 Mbps, 5.5 Mbps, or 11 Mbps) to ensure these frames are received and processed by all clients on the network. During CTS-only mode, clients that have a frame for transmission on the RF medium will first transmit a CTS frame. The destination address specified in this CTS frame is the transmitting client's own medium access control (MAC) address. All clients connected to the RF medium are required to listen to CTS frames. A CTS frame is interpreted as a do not send command by all clients except by the one whose MAC address is specified in the destination field. When RTS-CTS is employed, clients must request access to the RF medium by sending an RTS to the AP. The client refrains from accessing the medium and transmitting data until it receives a CTS from the AP. A CTS command is interpreted as a do not send command when it is received by a client that did not initiate the RTS. RTS-CTS requires more protocol overhead than CTS-only.
Usage Examples
The following example enables protection mode to automatically activate upon association of an 802.11b client with an 802.11g AP. RTS-CTS is specified, but the rate is not. This means that the default rate of 11 Mbps will be used. (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#protection-mode auto type rts-cts
60000CRG0-35B
2516
qos-mode wmm
Use the qos-mode wmm command to enable WiFi multimedia (WMM) quality of service (QoS) mode. Use the no form of this command to disable WMM mode. Variations of this command include the following:
qos-mode wmm qos-mode wmm no-ack
Syntax Description
no-ack Optional. Specifies the no acknowledgements be sent.
Default Values
By default, WMM QoS mode is disabled.
Command History
Release 15.1 Command was introduced.
Functional Notes
AOS supports WMM, which adds QoS functionality to the wireless network. QoS helps control the allocation of bandwidth on the wireless local area network (WLAN). The benefits of QoS may not be noticed if the traffic load on the wireless network is light. However, QoS benefits will become more apparent as the traffic load on the WLAN increases. WMM in AOS is based on the enhanced distributed channel access (EDCA) method. This method ensures that higher priority traffic has a better chance of being transmitted on the WLAN than lower priority traffic. There are four priority classes defined in WMM to manage traffic from different applications: voice, video, best-effort, and background. According to algorithms defined in EDCA, a client with traffic in a higher priority class, such as voice, will typically back off of the radio frequency (RF) medium for a shorter period of time than a client with traffic in a lower priority class, such as email. In addition, each priority class is assigned a transmit opportunity (TXOP), which is a set amount of time during which a client can send as many frames as possible. Higher priority classes are given a longer TXOP interval than lower priority classes. WMM must be enabled on both the access points (APs) and the clients running applications that require QoS. These applications must be able to support WMM for the QoS functionality to be used. In addition, the applications must be capable of assigning the appropriate priority class to their generated streams of traffic. When acknowledgements are enabled, transmission is more reliable because an acknowledge frame is returned for every frame received. However, acknowledgement frames increase the amount of traffic on the WLAN, which results in decreased performance. Disabling acknowledgements means that transmission will not be as reliable, but performance will be better. For example, having no acknowledgements would be useful for voice traffic because the speed of transmission is most important and packet loss to a certain degree is tolerable.
60000CRG0-35B
2517
Usage Examples
The following example enables WMM QoS mode without acknowledgements on an 802.11bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#qos-mode wmm no-ack
60000CRG0-35B
2518
radio-mode
Use the radio-mode command to set a specific radio type. Use the no form of this command to return to the default value. Variations of this command include the following:
radio-mode a radio-mode b radio-mode bg radio-mode g
Syntax Description
a b bg g Specifies radio type a. Specifies radio type b. Specifies radio type g in backwards-compatible mode to radio type b. Specifies radio type g.
Default Values
By default, the 802.11bg radio is set to radio-mode bg and the 802.11a radio is set to radio-mode a.
Command History
Release 15.1 Command was introduced.
Functional Notes
ADTRAN currently supports three of the IEEE 802.11 wireless local area network (WLAN) standards: 802.11a, 802.11b, and 802.11g. Each access point (AP) contains two integrated radios: one that supports 802.11a and one that supports 802.11b and/or 802.11g. 802.11b is a legacy protocol operating at 2.4 GHz with a maximum throughput of 11 Mbps. This throughput value is derived from the use of direct sequence spread spectrum (DSSS) technology for transmission. The North American channel set contains 11 channels, each 22 MHz wide. Out of these 11 channels, there are only three nonoverlapping or noninterfering channels. The use of three discreet access points (APs) in the same area, each set to one of the three nonoverlapping channels, will result in an aggregate bandwidth of 33 Mbps. The theoretical maximum distance for 802.11b is 100 meters. However, the actual distance is approximately 60 meters in a typical office environment. 802.11g operates at 2.4 GHz with a maximum throughput of 54 Mbps. The obvious benefit to using 802.11g over 802.11b is faster data transmission. The higher maximum throughput is achieved by using orthogonal frequency division multiplexing (OFDM) in addition to DSSS for transmission. 802.11g is backwards-compatible to 802.11b, helping to ease migration from an existing 802.11b network to an 802.11g network. However, the maximum throughput for an 802.11g network is reduced when operating in backwards-compatibility mode with 802.11b. The North American channel set for 802.11g contains 11 channels, each 22 MHz wide. Out of these 11 channels, there are only three nonoverlapping or noninterfering channels. The use of three discreet APs in the same area, each set to one of the three nonoverlapping channels, will result in an aggregate bandwidth of 162 Mbps. The theoretical maximum distance for 802.11g is 100 meters. However, the actual distance is approximately 75 meters in a typical office environment.
60000CRG0-35B
2519
802.11a operates at 5.8 GHz with a maximum throughput of 54 Mbps. OFDM is used for transmission. The North American channel set for 802.11 is derived from the lower channels, UNII-1 and UNII-2, in the 5.8 GHz frequency range. There are eight nonoverlapping or noninterfering channels, each 33 MHz wide. The use of eight discreet APs in the same area, each set to one of the eight nonoverlapping channels, will result in an aggregate bandwidth of 432 Mbps. The theoretical maximum distance for 802.11a is 50 meters. However, the actual distance is approximately 25 meters in a typical office environment. 802.11a is not compatible with 802.11b or g.
The data rate associated with any of the radios will continue to drop as a user moves farther away from the AP. The highest data rates will be achieved in areas closest to the AP. Usage Examples
The following example sets the radio mode to radio type g only on an 802.11bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#radio-mode g
60000CRG0-35B
2520
rtp quality-monitoring
Use the rtp quality-monitoring command to enable voice quality monitoring (VQM) of the Realtime Transport Protocol (RTP) voice stream packets on this interface. If the global command (ip rtp quality-monitoring) is disabled when this command is issued, the system will return the following warning: Applied but not used, you must globally enable ip rtp quality-monitoring to use VQM. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, VQM is enabled on all wide area network (WAN) and local area network (LAN) interfaces.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example enables RTP quality monitoring on an 802.11bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#rtp quality-monitoring
60000CRG0-35B
2521
Default Values
By default, the RTS threshold is 2346 bytes.
Command History
Release 15.1 Command was introduced.
Functional Notes
Generally, it is best to set the RTS threshold as high as possible. However, the threshold may need to be set lower if network throughput is sluggish or there are high numbers of frame retransmissions.
Usage Examples
The following example sets the RTS threshold to 1024 bytes on an 802.11bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#rts threshold 1024
60000CRG0-35B
2522
short-slot-time
Use the short-slot-time command to enable short slot time (9 microseconds) for an 802.11bg radio. Use the no form of this command to return to the long slot time (20 microseconds).
Syntax Description
No subcommands.
Default Values
By default, short-slot-time is enabled.
Short slot time is used only when the wireless network contains strictly 2.4 GHz, 802.11g devices and all of those devices support short slot time. If not all 802.11g devices support short slot time or the wireless network contains both 802.11b and g radios and/or clients, the radio automatically reverts to standard slot time. Command History
Release 15.1 Command was introduced.
Functional Notes
Slot time is the amount of time a wireless device waits after a collision before retransmitting a packet. The standard slot time of 20 microseconds is used in 2.4 GHz, 802.11b and 802.11bg networks. If a wireless network is strictly 802.11g and all devices are capable of supporting the feature, short slot time (9 microseconds) can be enabled. Short slot time increases throughput by decreasing the backoff time calculated by the transmitting device when a collision occurs.
Usage Examples
The following example specifies use of long slot time for 802.11g exclusive networks on an 802.11bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#no short-slot-time
60000CRG0-35B
2523
speed
Use the speed command to set the active rate for the radio. Frames cannot be transmitted at a speed that is higher than the specified active rates. Use the no form of this command to return to the default value. Variations of this command include the following:
speed best speed <speed>
Syntax Description
best <speed> Sets the transmit speed of the radio to the best available. Sets the transmit speed of the radio. Available speeds vary based on the setting in the radio-mode command. For 802.11a radios, choose from 6, 9, 12, 18, 24, 36, 48, or 54 Mbps. For 802.11b radios, choose from 1, 2, 5.5, or 11 Mbps. For 802.11bg radios, choose 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, or 54 Mbps. For 802.11g radios, choose 6, 9, 12, 18, 24, 36, 48, or 54 Mbps.
Default Values
By default, the active rate is set to best.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example sets the active rate to best on an 802.11bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#speed best
60000CRG0-35B
2524
Syntax Description
802.11 802.11b 802.11g ofdm Speed for 802.11 (1, 2 Mbps). Speed for 802.11b (1, 2, 5.5, 11 Mbps). Speed for 802.11bg (protection mode) (1, 2, 5.5, 6, 11, 12, 24 Mbps). Speed for orthogonal frequency division multiplexing (OFDM) (6, 12, 24 Mbps).
The OFDM basic rate set on an 802.11bg radio should be specified for a network that only contains 802.11g access points (APs) and clients. This setting maximizes throughput for 802.11g networks, but will not allow 802.11b clients to associate with the access point (AP). Default Values
By default, the 802.11bg radio is set to 802.11b and the 802.11a radio is set to ofdm.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example sets the basic rate set for 802.11bg (protection mode that supports 802.11b and g clients) on an 802.11bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#speed default basic-set 802.11g
60000CRG0-35B
2525
station-role access-point
Use the station-role access-point command to set the radio operation mode to access point (AP). Use the no form of this command to return to the default value. Syntax Description
No subcommands.
Default Values
By default, the station role is set to access-point.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example sets the station role to access-point on an 802.11bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#station-role access-point
60000CRG0-35B
2526
vap-isolation
Use the vap-isolation command to enable virtual access point (VAP) isolation, which prevents clients from one VAP on a radio from directly accessing clients in another VAP on the same radio. Use the no form of this command to return to the default value. Syntax Description
No subcommands.
Default Values
By default, VAP isolation is disabled.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example enables VAP isolation an 802.11bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#vap-isolation
60000CRG0-35B
2527
world-mode dot11d
Use the world-mode dot11d command to enable 802.11d mode. This mode allows country codes to be transmitted in beacons sent from the access point (AP). Use the no form of this command to disable 802.11d mode. Syntax Description
No subcommands.
Default Values
By default, 802.11d mode is disabled.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example enables 802.11d mode on an 802.11bg wireless radio: (config)#interface dot11ap 1/1 radio-type 802.11bg (config-dot11ap 1/1-bg)#world-mode dot11d
60000CRG0-35B
2528
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. accounting on page 2531 client-separation on page 2533 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2534
60000CRG0-35B
2529
radius-server host on page 2535 security mode on page 2536 security wep-key on page 2539 security wep-key generate on page 2541 security wep-key-length on page 2542 security wep-key seed <passphrase> on page 2543 security wpa group-key on page 2544 ssid on page 2545 vlan-id <vlan id> on page 2546
60000CRG0-35B
2530
accounting
Use the accounting command to enable remote authentication dial-in user service (RADIUS) accounting for associations with this virtual access point (VAP) and specify update intervals. Use the no form of this command to disable accounting for this VAP. Variations of this command include:
accounting enabled accounting update accounting update newinfo accounting update periodic accounting update periodic <value>
Syntax Description
enabled update Enables RADIUS accounting on this VAP. Defines the RADIUS accounting update setting. Executing the accounting update command without specifying any further parameters will send updates when new information occurs. This is the same as executing the accounting update newinfo command. Specifies sending RADIUS accounting records as they occur. Specifies collecting accounting records and sending them periodically. The default value is 5. Optional. Specifies the number of minutes between periodic accounting updates. Valid range is 1 to 99.
Default Values
By default, RADIUS accounting is disabled.
Functional Notes
The RADIUS server host, access point (AP) IP address, and IP gateway must be configured on the access point for this feature to work. Refer to radius-server host on page 2535, ip address <ip address> <subnet mask> on page 2499, and ip default-gateway <ip address> on page 2500 for more information on configuring these parameters.
Command History
Release 15.1 Command was introduced.
60000CRG0-35B
2531
Usage Examples
The following example enables RADIUS accounting for associations with this VAP: (config)#interface dot11ap 1/1.1 (config-dot11ap 1/1.1-bg)#accounting enabled The following example enables sending RADIUS accounting updates as they occur for this VAP: (config)#interface dot11ap 1/1.1 (config-dot11ap 1/1.1-bg)#accounting update newinfo
60000CRG0-35B
2532
client-separation
Use the client-separation command to prevent wireless clients within this virtual access point (VAP) from communicating directly with each other. Use the no form of this command to disable this feature, allowing clients to communicate with one another. It is recommended to enable this command. Syntax Description
No subcommands.
Default Values
By default, this feature is disabled.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example prevents wireless clients on this VAP interface from communicating directly with each other: (config)#interface dot11ap 1/1.1 (config-dot11ap 1/1.1-bg)#client-separation
60000CRG0-35B
2533
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#interface dot11ap 1/1.1 (config-dot11ap 1/1.1-bg)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2534
radius-server host
Use the radius-server host command to specify the parameters for a remote authentication dial-in user service (RADIUS) server to be used when sending RADIUS messages from the virtual access point (VAP). At a minimum, the IP address of the server must be given. The other parameters are also allowed and (if not specified) will use default values or fall back on the global RADIUS servers default settings. Use the no form of this command to remove the RADIUS server properties. This prevents the VAP from using authentication, authorization, and accounting (AAA) methods. Variations of this command include:
radius-server host <ip address> acct-port <port> auth-port <port> key <key> radius-server host <ip address> acct-port <port> key <key> radius-server host <ip address> auth-port <port> acct-port <port> key <key> radius-server host <ip address> auth-port <port> key <key> radius-server host <ip address> key <key>
Syntax Description
<ip address> acct-port auth-port <port> Specifies a valid IP address for the RADIUS server. IP address should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the remote port to send accounting requests to. Specifies a remote port to send authentication requests to. Specifies a User Datagram Protocol (UDP) port number to be used when sending authentication or accounting information to the RADIUS server. Valid range is 0 to 65535. Defines the shared key used between the RADIUS server and the access point. The key must appear last on the input line since it reads the rest of the line beyond the key keyword. The maximum length is 64 bytes.
key <key>
Default Values
By default, a RADIUS server is not defined. The default setting for acct-port is 1813 and for auth-port is 1812. By default, no key is configured.
Command History
Release 15.1 Command was expanded to include the VAP interface.
Usage Examples
The following example defines the RADIUS server parameters with an IP address of 10.10.10.1, sets the accounting port to 1646, and configures the shared key as abc123: (config)#interface dot11ap 1/1.1 (config-dot11ap 1/1.1-bg)#radius-server host 10.10.10.1 acct-port 1646 key abc123
60000CRG0-35B
2535
security mode
Use the security mode command to configure the security mode settings for this virtual access point (VAP). Use the no form of this command to return to the default setting. Depending on the mode chosen between wired equivalency privacy (WEP) and wi-fi protected access (WPA), further command options are available.
In order to connect to the access point (AP), a client must support the same security mode as configured on this VAP.
Syntax Description
none Specifies that no security be used on this VAP. There is no authentication required to connect to this VAP and no encryption is provided on the wireless connection. Configures the VAP for WEP security mode. Specifies that the WEP security mode use open authentication with static WEP keys. The client and the VAP must be configured with the same static key. A static WEP key is configured on the VAP by using the command security wep-key on page 2539. Specifies that the WEP security mode use shared authentication with encrypted static keys. The client and the VAP must be configured with the same static key. A static WEP key is configured on the VAP by using the command security wep-key on page 2539.
wep open-key
shared-key
60000CRG0-35B
2536
VAP Interface Command Set Specifies that the WPA security mode use the Extensible Authentication Protocol (EAP) as a universal authentication framework in the wireless network. A client must support WEP with 802.1x. Authentication is performed between the client and a remote authentication dial-in user service (RADIUS) server. Defines the WEP security mode for this VAP. A client must support WEP with 802.1x. Authentication is performed between the client and a RADIUS server. It indicates that all clients are using EAP-type message digest 5 (MD5). This EAP type does not perform key generation and requires appropriate static WEP keys be configured on this VAP (refer to security wep-key on page 2539). The user can specify security WEP keys 2 through 4, the first WEP key is obtained from the RADIUS server.
eap md5-static-key
eap md5-static-key-optional Defines the WEP security mode for this VAP. A client must support WEP with 802.1x. Authentication is performed between the client and a RADIUS server. It indicates that some clients are using EAP-type MD5 while other clients are using more advanced EAP types (transport layer security (TLS), Protected Extensible Authentication Protocol (PEAP), etc.). Unlike the advanced EAP types, EAP-type MD5 does not perform key generation and requires appropriate static WEP keys be configured on this VAP (refer to security wep-key on page 2539). The user can specify security WEP keys 2 through 4, the first WEP key is obtained from the RADIUS server. wpa aes-ccmp tkip Configures this VAP for WPA security mode. Specifies using the WPA2 algorithms. This security setting can be used alone or in combination with Temporal Key Integrity Protocol (TKIP). Specifies that the WPA security mode use TKIP as its keying structure. This protocol specifies the algorithms used for rotating keys. TKIP can be used alone or in combination with aes-ccmp. Specifies that the WPA security mode use preshared keys (PSKs) for key management. PSK may be used in combination with tkip and/or aes-ccmp. This method does not require a RADIUS authentication server. The PSK must be known on all VAP clients. Defines the PSK for security. The key must consist of 8 to 63 ASCII or 16 to 126 hexadecimal characters. Clients supporting WPA PSK are allowed to connect to this VAP.
psk
<key>
Default Values
By default, no security mode is defined.
Command History
Release 15.1 Command was introduced.
60000CRG0-35B
2537
Usage Examples
The following example shows a typical configuration of these parameters: (config)#interface dot11ap 1/1.1 (config-dot11ap 1/1.1-bg)#security mode wpa tkip psk myPresharedKey
60000CRG0-35B
2538
security wep-key
Use the security wep-key command to define the wired equivalency privacy (WEP) keys for use in wep shared-key and wep open-key security modes (refer to the command security mode on page 2536). Up to four keys can be programmed. Set these keys before selecting the WEP security mode. Use the no form of this command to disable the specified key. Variations of this command include:
security wep-key <index> <key> security wep-key <index> <key> transmit-key
Specifying security mode wep open-key eap does not require any WEP keys to be defined on the virtual access point (VAP). Syntax Description
<index> Indicates the WEP key index value. The value and order of WEP-static keys must match on the access point (AP) and all connecting clients. Valid entries are 1 to 4 for wep shared-key and wep open-key. For eap md5-static-key and eap md5-static-key-optional modes, the user can specify security wep-key 2 through security wep-key 4, the first WEP key is obtained from the remote authentication dial-in user service (RADIUS) server. Specifies the WEP key in hexadecimal characters. The key size is determined using the command security mode on page 2536 for wep shared-key or wep open-key security. The key length must follow the setting of the security wep-key-length on page 2542. Enables the specified key to encrypt all wireless traffic sent by this VAP. Only one WEP key index can be the current transmit key. The first index entered under a VAP becomes the transmit key by default. The most recent index specified with the transmit-key keyword becomes the current transmit key. The default is the first WEP key index entered for the VAP.
<key>
transmit-key
Default Values
By default, no keys are defined.
Command History
Release 15.1 Command was introduced.
60000CRG0-35B
2539
Functional Notes
The client and the AP must be configured with the same static key. The corresponding number of hexadecimal or ASCII characters required is: AP WEP Key Size 40 104 128 Hexadecimal CharactersASCII Characters 10 26 32 5 13 16
The addition of 24-bit initialization vector (IV) makes the 40 bits become 64 bits, 104 bits become 128, and 128 bits become 152 on the client.
Usage Examples
The following example creates a static WEP key at index 2 with a hexadecimal value of 343f49546a: (config)#interface dot11ap 1/1.1 (config-dot11ap 1/1.1-bg)# security wep-key 2 343f49546a
60000CRG0-35B
2540
Default Values
By default, no keys are defined or generated.
Command History
Release 17.2 Command was introduced.
Functional Notes
The generation of WEP keys occurs through the use of a standard message digest 5 (MD5) key generator. The generator creates secure WEP keys by assigning random values for each element (letters or numbers) in the passphrase entered using the command security wep-key seed <passphrase> on page 2543.
Usage Examples
The following example enables WEP key generation on 802.11bg wireless radio virtual access point (VAP) 1 based on the passphrase adtran6808: (config)#interface dot11ap 1/1.1 radio-type 802.11bg (config-dot11ap 1/1.1-bg)#security wep-key-seed adtran6808 (config-dot11ap 1/1.1-bg)#security wep-key generate
60000CRG0-35B
2541
security wep-key-length
Use the security wep-key-length command to specify the length of the wired equivalency privacy (WEP) key to be programmed with the security wep-key command. Use the no form of this command to return to the default setting. Variations of this command include:
security wep-key-length 104 security wep-key-length 128 security wep-key-length 40
The addition of 24-bit initialization vector (IV) makes the 40 bits become 64 bits, 104 bits become 128, and 128 bits become 152 on the client.
Syntax Description
wep-key-length Specifies the WEP key length. Valid entries are 40, 104, and 128.
Default Values
By default, no keys are defined.
Command History
Release 15.1 Command was introduced.
Functional Notes
There are four keys to program. At least one WEP key must be defined. The corresponding number of hexadecimal characters required is determined by: key size on client, key size on AP = number of keys multiplied by the hexadecimal characters in the key Examples: 64, 40 = 4 x 10 128, 104 = 4 x 26 152, 128 = 4 x 32
Usage Examples
The following example sets the WEP key length to 104: (config)#interface dot11ap 1/1.1 (config-dot11ap 1/1.1-bg)#security wep-key-length 104
60000CRG0-35B
2542
Default Values
By default, no passphrase is set.
Command History
Release 17.2 Command was introduced.
Functional Notes
The generation of WEP keys occurs through the use of a standard message digest 5 (MD5) key generator. The generator creates secure WEP keys by assigning random values for each element (letters or numbers) in the passphrase. Refer to the command security wep-key generate on page 2541 for more information.
Usage Examples
The following example creates a passphrase of adtran6808 to use in WEP key generation on 802.11bg wireless radio on virtual access point (VAP) 1: (config)#interface dot11ap 1/1.1 radio-type 802.11bg (config-dot11ap 1/1.1-bg)#security wep-key seed adtran6808
60000CRG0-35B
2543
Syntax Description
change <minutes> Enables a periodic change of the group key. Specify the number of minutes between group key changes. Valid range is 10 to 600 minutes, with the default being 30 minutes. Optional. Specifies a change of the group key at the termination of any membership association.
membership-termination
Default Values
By default, group key rotation is disabled.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example enables wired WPA group key rotation on the VAP: (config)#interface dot11ap 1/1.1 (config-dot11ap 1/1.1-bg)#security wpa group-key The following example enables a 15-minute change of the group key and also enables the group key to change any time a membership is terminated: (config)#interface dot11ap 1/1.1 (config-dot11ap 1/1.1-bg)#security wpa group-key change 15 membership-termination
60000CRG0-35B
2544
ssid
Use the ssid command to assign the service set identifier (SSID) for this virtual access point (VAP) and indicate whether to broadcast the SSID over the network. The SSID is a unique identifier consisting of up to 32 characters (letters or numbers). Use the no form of this command to return to the default setting. Variations of this command include:
ssid broadcast-mode <text> ssid non broadcast-mode <text>
Syntax Description
broadcast-mode non broadcast-mode Enables broadcasting the SSID in beacons transmitted for this VAP. Blocks broadcasting the SSID for this VAP. This setting is used in closed wireless networks. Devices connecting to the access point (AP) in nonbroadcast mode require the wireless device to enter the SSID. Specifies an SSID for the VAP. The SSID can consist of up to 32 characters using text or letters and can also include spaces.
<text>
Default Values
By default, the SSID is set as wireless vap-index radio-index.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example configures the SSID of VAP interface 1 as WLAN1 and blocks broadcasting this SSID: (config)#interface dot11ap 1/1.1 (config-dot11ap 1/1.1-bg)#ssid non broadcast-mode WLAN1
60000CRG0-35B
2545
Default Values
By default, the VLAN ID is the same number as the VAP interface number.
Functional Notes
Once encapsulation 802.1q is enabled on the AP, all wireless traffic received on the VAPs service set identifier (SSID) is mapped to the VLAN (specified by the VLAN ID) when sent out the AP's Ethernet interface. All wireless traffic received on this VLAN ID at the AP's Ethernet interface is mapped to this VAP's SSID for wireless transmission.
Command History
Release 15.1 Command was expanded to include the VAP interface.
Usage Examples
The following example configures the vlan-id to 4 for VAP interface 1: (config)#interface dot11ap 1/1.1 (config-dot11ap 1/1.1-bg)#vlan-id 4
60000CRG0-35B
2546
60000CRG0-35B
2547
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 interface on page 72 All other commands for this command set are described in this section in alphabetical order. deny <value> on page 2549 permit <value> on page 2550
60000CRG0-35B
2548
deny <value>
Use the deny command to add an entry to the community list that denies Border Gateway Protocol (BGP) routes containing the specified community number in the community attribute. Use the no form of this command to remove the statement from the community list. Syntax Description
<value> Denies routes that contain this value in their community attribute. This is a numeric value that can be an integer from 1 to 4294967295 or string in the form aa:nn, where aa is the autonomous system (AS) number and nn is the community number. Multiple community number parameters can be present in the command.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example creates a community list named MyList to deny BGP routes that match the AS path attributes 30:22: (config)#ip as-path-list MyList (config-as-path-list)#deny 30:22
60000CRG0-35B
2549
permit <value>
Use the permit command to add an entry to the community list that allows only Border Gateway Protocol (BGP) routes containing the specified community number in the community attribute. Use the no form of this command to remove the statement from the community list. Syntax Description
<value> Permits routes that contain this value in their community attribute. This is a numeric value that can be an integer from 1 to 4294967295 or string in the form aa:nn, where aa is the autonomous system (AS) number and nn is the community number. Multiple community number parameters can be present in the command.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example creates a community list named MyList to permit BGP routes that match the AS path attributes 30:22: (config)#ip as-path-list MyList (config-as-path-list)#permit 30:22
60000CRG0-35B
2550
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 interface on page 72 All other commands for this command set are described in this section in alphabetical order. bgp on page 2552 bgp default local-preference <value> on page 2553 bgp fast-external-failover on page 2554 bgp log-neighbor-changes on page 2555 bgp router-id <ip address> on page 2556 distance bgp <external> <internal> <local> on page 2557 hold-timer <value> on page 2558 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2559 maximum-paths <value> on page 2560 neighbor <ip address> on page 2561 network <ip address> mask <subnet mask> on page 2562 redistribute connected on page 2563 redistribute ospf on page 2564 redistribute rip on page 2565 redistribute static on page 2566
60000CRG0-35B
2551
bgp
Use the bgp command to instruct AOS on how to handle multi-exit discriminators (MEDs) for all routes from the same autonomous system (AS). Use the no form of this command to disable this feature. Variations of this command include:
bgp always-compare-med bgp compare-med bgp deterministic-med bgp ignore-med
Syntax Description
always-compare-med compare-med deterministic-med ignore-med Configures AOS to always compare MEDs for all paths for a route, regardless of the AS through which the paths pass. Configures AOS to compare MEDs for all received routes. Configures AOS to compare the MEDs for all routes received from different neighbors within the same AS. Configures AOS to disregard MEDs for all received routes.
Default Values
By default, AOS compares the MED attributes for routes from the same AS.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example enables this option: (config)#router bgp 100 (config-bgp)#bgp compare-med
60000CRG0-35B
2552
Default Values
By default, the local preference is set to 100.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example changes the default local preference to 200: (config)#router bgp 100 (config-bgp)#bgp default local-preference 200
60000CRG0-35B
2553
bgp fast-external-failover
Use the bgp fast-external-failover command to enable the fast-external-failover feature. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is enabled.
Command History
Release 8.1 Command was introduced.
Functional Notes
When enabled, if the link interface over which the router is communicating with a Border Gateway Protocol (BGP) peer goes down, the BGP session with that peer is immediately cleared. When failover is disabled and the link goes down, the session is maintained until the BGP hold timer expires.
Usage Examples
The following example enables this option: (config)#router bgp 100 (config-bgp)#bgp fast-external-failover
60000CRG0-35B
2554
bgp log-neighbor-changes
Use the bgp log-neighbor-changes command to control the logging of neighbor state changes. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, neighbor changes are not logged.
Command History
Release 8.1 Command was introduced.
Functional Notes
This command controls logging of Border Gateway Protocol (BGP) neighbor state changes (up/down) and resets. This information is useful for troubleshooting and determining network stability.
Usage Examples
The following example enables logging of BGP neighbor state changes: (config)#router bgp 100 (config-bgp)#bgp log-neighbor-changes
60000CRG0-35B
2555
Default Values
By default, no router ID is configured. The default action is detailed in Functional Notes below.
Command History
Release 8.1 Command was introduced.
Functional Notes
This command allows an IP address to be specified for use as the BGP router ID. If no IP address is configured at BGP startup, it uses the highest IP address configured on a loopback interface. If no loopback interfaces are configured, it uses the highest IP address configured on any interface that is active. If the specified router ID is changed, existing sessions with BGP neighbors are reset.
Usage Examples
The following example configures IP address 10.0.0.1 as the BGP router ID: (config)#router bgp 100 (config-bgp)#bgp router-id 10.0.0.1
60000CRG0-35B
2556
Default Values
By default, external is set to 20, internal to 200, and local to 200. Normally, these default settings should not be changed.
Command History
Release 8.1 Command was introduced.
Functional Notes
This command sets the administrative distance for BGP routes. The administrative distance is a local variable that allows a router to choose the best route when there are multiple paths to the same network. Routes with lower administrative distances are preferable.
Usage Examples
The following example gives external BGP routes an administrative distance of 30, internal BGP routes an administrative distance of 200, and local routes an administrative distance of 240: (config)#router bgp 100 (config-bgp)#distance bgp 30 200 240
60000CRG0-35B
2557
hold-timer <value>
Use the hold-timer command to set the default hold time for all neighbors in the Border Gateway Protocol (BGP) process. Syntax Description
<value> Specifies a time interval (in seconds) within which a keepalive must be received from a peer before it is declared dead peer. Range is 0 to 65535 seconds.
Default Values
By default, the hold time is 180 seconds.
Command History
Release 8.1 Command was introduced.
Functional Notes
Using the hold-timer command in BGP configuration mode sets the default hold time for all neighbors in that BGP process. Using the hold-timer command in BGP neighbor configuration mode sets the hold time for only that neighbor. The peers will negotiate and use the lowest configured setting. The keepalive interval will be set to one-third of the negotiated hold time.
Usage Examples
The following example sets a hold time of 120 seconds for a specific neighbor, with an understood keepalive interval of 40 seconds: (config)#router bgp 100 (config-bgp)#hold-timer 120
60000CRG0-35B
2558
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#router bgp 100 (config-bgp)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2559
maximum-paths <value>
Use the maximum-paths command to specify the number of parallel routes (shared paths) External Border Gateway Protocol (eBGP) neighbors can inject into the route table. When IP load sharing is enabled, traffic is balanced to a specific destination across up to six equal paths. Use the no form of this command to return to the default value. Syntax Description
<value> Specifies the number of parallel routes eBGP neighbors can inject into the route table. Valid range is 1 to 6.
Default Values
By default, a single path can exist in the route table.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures AOS to allow 4 parallel paths in the route table: (config)#router bgp 100 (config-bgp)#maximum-paths 4
60000CRG0-35B
2560
Default Values
By default, there are no configured BGP neighbors.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures a BGP neighbor with an IP address of 10.10.10.1: (config)#router bgp 100 (config-bgp)#neighbor 10.10.10.1 (config-bgp-neighbor)#
60000CRG0-35B
2561
<subnet mask>
Default Values
By default, there are no configured BGP networks.
Functional Notes
This command can be used to enable transmission of a default route to BGP neighbors.This is done by entering the following: (config-bgp)#network 0.0.0.0 mask 0.0.0.0 An entry for the default route must appear in the interior gateway protocol (IGP) routing table in order for the above command to work in BGP.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example adds the 10.10.10.1 network with a subnet mask of 255.255.255.0: (config)#router bgp 100 (config-bgp)#network 10.10.10.1 mask 255.255.255.0
60000CRG0-35B
2562
redistribute connected
Use the redistribute connected command to pass routes from one network to another, regardless of the routing protocol implemented on the routing domain. Using the connected keyword allows the propagation of routes connected to other interfaces using the Border Gateway Protocol (BGP) routing protocol. Use the no form of this command to disable the propagation of the specified route type. Variations of this command include:
redistribute connected redistribute connected metric <value> redistribute connected route-map <name>
Syntax Description
metric <value> route-map <name> Optional. Specifies the hop count to use for advertising redistributed connected routes in BGP. Optional. Specifies the route map filter to use for advertising redistributed connected routes in BGP.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Command was introduced.
Functional Notes
BGP does not blindly broadcast out of all interfaces. Instead, the network statement tells which networks to include in BGP updates. The redistribute connected command simply covers all connected networks.
Usage Examples
The following example passes the connected routes found in the route table to other networks running the BGP routing protocol: (config)#router bgp 100 (config-bgp)#redistribute connected
60000CRG0-35B
2563
redistribute ospf
Use the redistribute ospf command to advertise routes from one protocol to another, regardless of the routing protocol implemented on the routing domain. Using the ospf keyword allows the propagation of open shortest path first (OSPF) routes into Border Gateway Protocol (BGP). Use the no form of this command to disable the propagation of the specified route type. Variations of this command include:
redistribute ospf redistribute ospf metric <value> redistribute ospf route-map <name>
Syntax Description
metric <value> route-map <name> Optional. Specifies the hop count to use for advertising redistributed OSPF routes in BGP. Optional. Specifies the route map filter to use for advertising redistributed OSPF routes in BGP.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Command was introduced.
Functional Notes
Redistributing OSPF routes imports those routes into BGP without specifying those subnets with a network statement. The OSPF routes imported this way are not covered by a network command. If redistribute ospf is enabled and no metric value is specified, the value defaults to 0.
Usage Examples
The following example imports OSPF routes into BGP: (config)#router bgp 100 (config-bgp)#redistribute ospf
60000CRG0-35B
2564
redistribute rip
Use the redistribute rip command to advertise routes from one protocol to another, regardless of the routing protocol implemented on the routing domain. Using the rip keyword allows the propagation of Routing Information Protocol (RIP) routes into Border Gateway Protocol (BGP). Use the no form of this command to disable the propagation of the specified route type. Variations of this command include:
redistribute rip redistribute rip metric <value> redistribute rip route-map <name>
Syntax Description
metric <value> route-map <name> Optional. Specifies the hop count to use for advertising redistributed RIP routes in BGP. Optional. Specifies the route map filter to use for advertising redistributed RIP routes in BGP.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Command was introduced.
Functional Notes
Redistributing RIP routes imports those routes into BGP. The RIP routes imported this way are not covered by a network command. If redistribute rip is enabled and no metric value is specified, the value defaults to 0.
Usage Examples
The following example imports RIP routes into BGP: (config)#router bgp 100 (config-bgp)#redistribute rip
60000CRG0-35B
2565
redistribute static
Use the redistribute static command to pass routes from one network to another, regardless of the routing protocol implemented on the routing domain. Using the static keyword allows the propagation of static routes into the Border Gateway Protocol (BGP) routing protocol. Use the no form of this command to disable the propagation of the specified route type. Variations of this command include:
redistribute static redistribute static metric <value> redistribute static route-map <name>
The gateway network for the static route must participate in BGP by using the network command for the gateway network.
Syntax Description
metric <value> route-map <name> Optional. Specifies the hop count to use for advertising redistributed static routes in BGP. Optional. Specifies the route map filter to use for advertising redistributed static routes in BGP.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Command was introduced.
Functional Notes
Redistributing static routes allows other network devices to learn about routes without requiring manual input to each device on the network.
Usage Examples
The following example passes the static routes found in the route table to other networks running the BGP routing protocol: (config)#router bgp 100 (config-bgp)#redistribute static
60000CRG0-35B
2566
The local router must be able to reach the IP address configured as the neighbor ID. View the routing table and verify that it includes a route to this address.
For example:
>enable #configure terminal (config)#router bgp 1 (config-bgp)#router bgp-neighbor 192.22.73.101 (config-bgp-neighbor)#
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. advertisement-interval <value> on page 2569 as-path-list <name> on page 2570 distribute-list <name> on page 2571
60000CRG0-35B
2567
ebgp-multihop <value> on page 2572 hold-timer <value> on page 2573 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2574 local-as <value> on page 2575 next-hop-self on page 2577 no default-originate on page 2579 password <password> on page 2580 prefix-list <name> on page 2581 remote-as <value> on page 2582 route-map <name> on page 2583 send-community standard on page 2584 soft-reconfiguration inbound on page 2585 update-source <interface> on page 2586
60000CRG0-35B
2568
advertisement-interval <value>
Use the advertisement-interval command to configure AOS to specify how long the Border Gateway Protocol (BGP) process waits before sending updates to the neighbor. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the advertisement interval in seconds. Range is 0 to 600 seconds.
Default Values
By default, the advertisement interval is 30 seconds for external neighbors and 5 seconds for internal neighbors.
Command History
Release 8.1 Command was introduced.
Functional Notes
This command sets the minimum interval between sending updates to the specified neighbor.
Usage Examples
The following example configures the BGP process to wait at least 100 seconds before sending updates to the neighbor: (config)#router bgp 100 (config-bgp)#neighbor 192.22.73.101 (config-bgp-neighbor)#advertisement-interval 100
60000CRG0-35B
2569
as-path-list <name>
Use the as-path-list command to assign a predefined autonomous system (AS) path list to a Border Gateway Protocol (BGP) neighbor. This list is then used to filter inbound and/or outbound BGP route updates. Use the no form of this command to discontinue use of the list. Variations of this command include:
as-path-list <name> in as-path-list <name> out
Syntax Description
<name> in out Assigns an AS path list to this BGP neighbor. Specifies the filtering of all inbound BGP route updates. Specifies the filtering of all outbound BGP route updates.
Default Values
By default, no AS path lists are specified for filtering.
Command History
Release 9.3 Command was introduced.
Functional Notes
Before they can be assigned to a neighbor, AS path lists must first be defined using the ip as-path-list command.
Usage Examples
The following example uses the no15 AS path list to filter all inbound BGP route updates: (config)#router bgp 100 (config-bgp)#neighbor 192.22.73.101 (config-bgp-neighbor)#as-path-list no15 in
60000CRG0-35B
2570
distribute-list <name>
Use the distribute-list command to add route filtering functionality by assigning inbound and outbound access control lists (ACLs) to a BGP neighbor. Only one inbound/outbound pair of ACLs can be configured for a particular neighbor. Use the no form of this command to disable filtering. Variations of this command include:
distribute-list <name> in distribute-list <name> out
For a complete list of all extended and standard ACL configuration commands, refer to the
Syntax Description
<name> in out Specifies an ACL name. This is a standard IP ACL against which the contents of the incoming/outgoing routing updates are matched. Applies route filtering to inbound data. Applies route filtering to outbound data.
Default Values
By default, distribute-list filtering is disabled.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example will filter out all network advertisements received via Ethernet interface 0/1 with the exception of the 10.10.10.0 network: (config)#ip access-list standard TRUSTED (config-std-nacl)#permit 10.10.10.0 0.0.0.255 (config-std-nacl)#exit (config)#router bgp 100 (config-bgp)#neighbor 192.22.73.101 (config-bgp-neighbor)#distribute-list TRUSTED in
60000CRG0-35B
2571
ebgp-multihop <value>
Use the ebgp-multihop command to configure the maximum hop count of Border Gateway Protocol (BGP) messages to a neighbor. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the maximum hop count of BGP messages to a neighbor. Range is 1 to 254 hops.
Default Values
By default, External Border Gateway Protocol (eBGP) multihop is set to 1.
Command History
Release 8.1 Command was introduced.
Functional Notes
This command allows an eBGP neighbor to be on a network that is not directly connected. Normally, eBGP peers are directly connected. In certain applications, a non-BGP device, such as a firewall or router, may reside between eBGP peers. In this case, the eBGP multihop command is required to allow updates to have a time to live (TTL) greater than 1 and to allow received BGP updates to be added to the BGP table when the next-hop address is not directly connected.
Usage Examples
The following example allows a BGP message to travel 10 hops to a neighbor: (config)#router bgp 100 (config-bgp)#neighbor 192.22.73.101 (config-bgp-neighbor)#ebgp-multihop 10
60000CRG0-35B
2572
hold-timer <value>
Use the hold-timer command to set the default hold time for this Border Gateway Protocol (BGP) neighbor. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies a time interval (in seconds) within which a keepalive must be received from a peer before it is declared dead peer. Range is 0 to 65535 seconds.
Default Values
By default, the hold time is 180 seconds.
Command History
Release 8.1 Command was introduced.
Functional Notes
Using the hold-timer command in BGP configuration mode sets the default hold time for all neighbors in that BGP process. Using the hold-timer command in BGP neighbor configuration mode sets the hold time for only that neighbor. The peers will negotiate and use the lowest configured setting. The keepalive interval will be set to one-third of the negotiated hold time.
Usage Examples
The following example sets a hold time of 120 seconds for a specific neighbor, with an understood keepalive interval of 40 seconds: (config)#router bgp 100 (config-bgp)#neighbor 192.22.73.101 (config-bgp-neighbor)#hold-timer 120
60000CRG0-35B
2573
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#router bgp 100 (config-bgp)#neighbor 192.22.73.101 (config-bgp-neighbor)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2574
local-as <value>
Use the local-as command to specify an autonomous system (AS) number for the unit to use when communicating with this Border Gateway Protocol (BGP) neighbor. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the AS number to use when communicating with this neighbor. Must be different than the AS number for this router and the peer router. Only valid for external Border Gateway Protocol (eBGP) connections. Range is 0 to 4294967295.
Default Values
By default, no local AS number is defined. The routers BGP AS number is used.
Command History
Release 9.3 Release 18.1 Command was introduced. Command was altered to support 4-byte AS numbers (previously AOS only supported 2-byte numbers).
Functional Notes
This command substitutes a different AS number to be used for communicating with this BGP neighbor (other than the one the router is actually a member of). This can be used to satisfy network designs requiring a customer to appear as one AS number when communicating with one Internet service provider (ISP) and another when communicating with another ISP.
Usage Examples
The following example configures this BGP neighbors AS number to be 300: (config)#router bgp 100 (config-bgp)#neighbor 192.22.73.101 (config-bgp-neighbor)#local-as 300
Technology Review
This router appears (to the peer router) to be in the AS specified with the local-as command. Therefore, all routes learned from the peer have this number prepended to the AS path. In network advertisements from routers using the local-as command, the routers true AS number (the number specified using the router bgp as-number command) is prepended to the AS path attribute, and the local AS (the number specified in the neighbor local-as command) is prepended to the AS path attribute. This makes it appear that the path to the network is first through the local AS, and then through the true AS. To further illustrate, consider the following example network.
60000CRG0-35B
2575
Command Reference Guide In this network: Router A is in AS 100. Router B is in AS 300. Router A is an eBGP peer with Router B. Router As connection to Router B specifies a local-as of 200. Router B is configured to connect to Router A in AS 200.
Therefore: To Router B, all aspects of Router A appear as AS 200. Networks advertised from Router A to Router B will have the AS path 200 100 prepended to the AS path attribute. Router A will add AS 200 to the AS path of networks learned from Router B.
60000CRG0-35B
2576
next-hop-self
Use the next-hop-self command to force the NEXT_HOP attribute to be changed to this units IP address for each network it advertises to the BGP neighbor. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, this command is disabled and the next autonomous system (AS) is advertised as the NEXT_HOP attribute.
Command History
Release 9.3 Command was introduced.
Functional Notes
Internal Gateway Protocols (IGPs), such as Routing Information Protocol (RIP) and Open Shortest Path First (OSPF), always use the source IP address of a routing update as the next-hop address for each network that is placed in the routing table. Conversely, since BGP routes AS-to-AS, the default next hop that is advertised is the next AS. This behavior can present a problem in situations where an internal Border Gateway Protocol (iBGP) router learns about networks outside of its AS through one of its iBGP peers. By default, the next-hop address for the external networks advertised to the iBGP router is the entry point for the next AS. When the iBGP router receives packets destined for one of the external networks, it performs a recursive lookup of the entries in its own IGP routing table to determine how to reach the BGP next-hop address. Unless the iBGP router has a static route or an entry in its IGP routing table indicating how to reach the edge router in the external AS, packets destined for those networks will be dropped. To remedy this scenario, the iBGP peer must advertise its own IP address as the next-hop address to the external networks. Consider the following example: In external Border Gateway Protocol (eBGP), routes are normally advertised with a next hop set to the IP address that the receiving peer has configured in its neighbor statement for this router. In the eBGP case where the receiving router is in the same subnet as the current next hop, the current next hop is not changed. For broadcast multiaccess networks (Ethernet), this provides more efficient routing. For nonbroadcast multiaccess (NBMA) networks, such as Frame Relay with a partial mesh using point-to-multipoint circuits, this rule can cause significant problems. Since the partial mesh is on the same subnet, BGP applies the rule of not changing the next-hop address, rendering routes in certain topologies invalid. This is one case where this command is necessary to solve a problem.
60000CRG0-35B
2577
Usage Examples
The following example enables next-hop-self: (config)#router bgp 100 (config-bgp)#neighbor 192.22.73.101 (config-bgp-neighbor)#next-hop-self
60000CRG0-35B
2578
no default-originate
Use the no default-originate command to prevent the unit from sending the default route to a Border Gateway Protocol (BGP) neighbor. This command must be issued on a per-neighbor basis. Syntax Description
No subcommands.
Default Values
By default, the default route is not sent to the BGP neighbor.
Command History
Release 13.1 Command was introduced.
Functional Notes
This command cannot be enabled. In other words, the command default-originate cannot be entered to enable the default route to be sent to a BGP neighbor. The transmission of default routes to BGP neighbors is accomplished by manually entering a default route in BGP Configuration Mode. This is done by entering the following command: (config-bgp)#network 0.0.0.0 mask 0.0.0.0 An entry for the default route must appear in the interior gateway protocol (IGP) routing table in order for the above command to work in BGP. Refer to the command network <ip address> mask <subnet mask> on page 2562 for additional information.
60000CRG0-35B
2579
password <password>
Use the password command to enable message digest 5 (MD5) password authentication on Transmission Control Protocol (TCP). Use the no form of this command to disable authentication. Syntax Description
<password> Specifies the password string to be used for authentication. The password is case sensitive and must not exceed 80 characters.
Default Values
By default, authentication is disabled.
Command History
Release 9.3 Command was introduced.
Functional Notes
Authentication must be configured on both peers using the same password. Every Border Gateway Protocol (BGP) TCP segment sent is authenticated. Configuring authentication causes an existing session to be torn down and re-established using the currently specified authentication.
Usage Examples
The following example enables authentication for this BGP neighbor and sets a password of user1: (config)#router bgp 100 (config-bgp)#neighbor 192.22.73.101 (config-bgp-neighbor)#password user1
60000CRG0-35B
2580
prefix-list <name>
Use the prefix-list command to assign a predefined prefix list to a Border Gateway Protocol (BGP) neighbor. The list is then used to filter BGP route updates received and/or sent from/by the specified peer. Use the no form of this command to discontinue use of the prefix list. Variations of this command include:
prefix-list <name> in prefix-list <name> out
Syntax Description
<name> in out Assigns the specified prefix list to this BGP neighbor. Specifies that all inbound BGP route updates received from the specified peer be filtered. Specifies that all outbound BGP route updates being sent to the specified peer be filtered.
Default Values
By default, no prefix lists are specified for filtering.
Command History
Release 9.3 Command was introduced.
Functional Notes
Before they can be assigned to a BGP neighbor, prefix lists must first be defined using the ip prefix-list <name> seq <number> command. Refer to the command ip prefix-list <name> seq <number> on page 994 for more information.
Usage Examples
The following example uses the MyList prefix list to filter all BGP updates received from the specified peer: (config)#router bgp 100 (config-bgp)#neighbor 192.22.73.101 (config-bgp-neighbor)#prefix-list MyList in
60000CRG0-35B
2581
remote-as <value>
Use the remote-as command to specify the Border Gateway Protocol (BGP) autonomous system (AS) to which the neighbor belongs, adding an entry to the BGP neighbor table. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the AS number. This number must be different from the AS number of the local router (which is defined using the command router bgp <value> on page 1195. Range is 1 to 4294967295.
Command History
Release 9.3 Release 18.1 Command was introduced. Command was altered to support 4-byte AS numbers (previously AOS only supported 2-byte numbers).
Usage Examples
The following example configures a remote AS number of 200 for this neighbor: (config)#router bgp 100 (config-bgp)#neighbor 192.22.73.101 (config-bgp-neighbor)#remote-as 200
60000CRG0-35B
2582
route-map <name>
Use the route-map command to assign a route map to this Border Gateway Protocol (BGP) neighbor. The route map is then used to filter or modify inbound and/or outbound BGP route updates. Use the no form of this command to return to the default setting. Variations of this command include:
route-map <name> in route-map <name> out
Syntax Description
<name> in out Assigns the specified route map to this BGP neighbor. Specifies the filtering/modification of all inbound BGP route updates. Specifies the filtering/modification of all outbound BGP route updates.
Default Values
By default, no route map is assigned.
Command History
Release 9.3 Command was introduced.
Functional Notes
Before a route map can be assigned to a BGP neighbor, it must first be defined using the command route-map on page 1193.
Usage Examples
The following example assigns a route map to this neighbor for outbound filtering: (config)#router bgp 100 (config-bgp)#neighbor 192.22.73.101 (config-bgp-neighbor)#route-map MapName out
60000CRG0-35B
2583
send-community standard
Use the send-community standard command to insert a standard Border Gateway Protocol (BGP) community attribute to all outgoing route updates for this neighbor. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example inserts a standard BGP community attribute to all outgoing route updates for the specified neighbor: (config)#router bgp 100 (config-bgp)#neighbor 192.22.73.101 (config-bgp-neighbor)#send-community standard
60000CRG0-35B
2584
soft-reconfiguration inbound
Use the soft-reconfiguration inbound command to enable this unit to store all updates from a Border Gateway Protocol (BGP) neighbor in case the inbound policy is changed. Syntax Description
No subcommands.
Default Values
By default, this command is enabled.
Command History
Release 9.3 Command was introduced.
Functional Notes
The soft-reconfiguration inbound command allows a network administrator to reconfigure BGP policies without clearing active BGP sessions. Administrators can then institute new policies at any time without forcing the neighbors to re-establish their connection and possibly disrupting traffic. BGP updates are stored prior to filtering; thus, allowing the clear ip bgp soft command to be used in the absence of route refresh (RFC 2918) capability. The unfiltered table is used when an inbound policy is changed; allowing the router to immediately implement policy changes immediately based on the stored table instead of having to wait on a new table to be built after a hard reset. A soft reset is beneficial over a hard reset because it allows policy updates without disrupting network traffic flow. A hard reset terminates the existing BGP session, effectively removing all routes learned from a neighbor. A new session is then created and all of the routes must be relearned. Due to the fact that this process takes place with a hard reset, a network outage can potentiality occur until the BGP database and route table have been rebuilt. Refer to clear ip bgp on page 110 for more information.
Usage Examples
The following example enables the unit to store BGP updates for the specified neighbor: (config)#router bgp 100 (config-bgp)#neighbor 192.22.73.101 (config-bgp-neighbor)#soft-reconfiguration inbound
60000CRG0-35B
2585
update-source <interface>
Use the update-source command to specify which interfaces IP address will be used as the source IP address for the Border Gateway Protocol (BGP) Transmission Control Protocol (TCP) connection (when connecting to this peer). Use the no form of this command to return to the default setting. Syntax Description
<interface> Specifies the interface to be used as the source IP address. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type update-source ? for a complete list of valid interfaces.
Default Values
By default, the outbound interface's IP address is used for BGP updates.
Command History
Release 9.3 Release 14.1 Release A4.01 Command was introduced. Command was expanded to include the asynchronous transfer mode (ATM) and high level data link control (HDLC) interfaces. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
Functional Notes
This is most often configured as a loopback interface that is reachable by the peer router. The peer will specify this address in its neighbor commands for this router.
Usage Examples
The following example configures the loopback 1 interface as the source IP: (config)#router bgp 100 (config-bgp)#neighbor 192.22.73.101 (config-bgp-neighbor)#update-source loopback 1
60000CRG0-35B
2586
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 interface on page 72 All other commands for this command set are described in this section in alphabetical order. deny on page 2588 permit on page 2589
60000CRG0-35B
2587
deny
Use the deny command to add an entry to the community list that denies Border Gateway Protocol (BGP) routes containing the specified community number in the community attribute. Use the no form of this command to remove the statement from the community list. Variations of this command include:
deny <value> deny internet deny local-as deny no-advertise deny no-export
Syntax Description
<value> Denies routes that contain this value in their community attribute. This is a numeric value that can be an integer from 1 to 4294967295 or string in the form aa:nn, where aa is the autonomous system (AS) number and nn is the community number. Multiple community number parameters can be present in the command. Denies routes that contain the reserved community number for the Internet community. Denies routes that contain the reserved community number for NO_EXPORT_SUBCONFED. Routes containing this attribute should not be advertised to external BGP peers. Denies routes that contain the reserved community number for NO_ADVERTISE. Routes containing this attribute should not be advertised to any BGP peer. Denies routes that contain the reserved community number for NO_EXPORT. Routes containing this attribute should not be advertised to BGP peers outside a confederation boundary.
internet local-as
no-advertise
no-export
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example creates a community list named MyList to deny BGP routes that have the Internet community number in their community attribute: (config)#ip community-list MyList (config-comm-list)#deny no-export
60000CRG0-35B
2588
permit
Use the permit command to add an entry to the community list that allows only Border Gateway Protocol (BGP) routes containing the specified community number in the community attribute. Use the no form of this command to remove the statement from the community list. Variations of this command include:
permit <value> permit internet permit local-as permit no-advertise permit no-export
Syntax Description
<value> Permits routes that contain this value in their community attribute. This is a numeric value that can be an integer from 1 to 4294967295 or string in the form aa:nn, where aa is the autonomous system (AS) number and nn is the community number. Multiple community number parameters can be present in the command. Permits routes that contain the reserved community number for the Internet community. Permits routes that contain the reserved community number for NO_EXPORT_SUBCONFED. Routes containing this attribute should not be advertised to external BGP peers. Permits routes that contain the reserved community number for NO_ADVERTISE. Routes containing this attribute should not be advertised to any BGP peer. Permits routes that contain the reserved community number for NO_EXPORT. Routes containing this attribute should not be advertised to BGP peers outside a confederation boundary.
internet local-as
no-advertise
no-export
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example permits BGP routes that match the AS path attributes: (config)#ip as-path-list listname (config-comm-list)#permit 30:22
60000CRG0-35B
2589
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 exit on page 71 interface on page 72 The following commands are applicable to ICMP echo probe types and can be executed after this command:
(config)#probe <probe name> icmp-echo
data <pattern> on page 2597 destination on page 2598 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2603 period <value> on page 2605 shutdown on page 2608 size <payload length> on page 2609 source-address <ip address> on page 2610 timeout <value> on page 2614 tolerance on page 2615
60000CRG0-35B
2590
The following commands are applicable to TCP connect probe types and can be executed after this command:
(config)#probe <probe name> tcp-connect
destination on page 2598 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2603 period <value> on page 2605 shutdown on page 2608 source-address <ip address> on page 2610 source-port <port> on page 2611 timeout <value> on page 2614 tolerance on page 2615 The following commands are applicable to HTTP request probe types and can be executed after this command:
(config)#probe <probe name> http-request
absolute-path <name> on page 2593 destination on page 2598 expect regex <expression> on page 2600 expect status <minimum> <maximum> on page 2601 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2603 period <value> on page 2605 raw-string on page 2606 shutdown on page 2608 source-address <ip address> on page 2610 source-port <port> on page 2611 timeout <value> on page 2614 tolerance on page 2615 type on page 2617 The following commands are applicable to ICMP timestamp probe types and can be executed after this command:
(config)#probe <probe name> icmp-timestamp
data on page 2596 destination on page 2598 dscp <value> on page 2599 history-depth <value> on page 2602 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2603
60000CRG0-35B
2591
num-packets <value> on page 2604 period <value> on page 2605 send-schedule periodic <value> on page 2607 shutdown on page 2608 size <payload length> on page 2609 source-address <ip address> on page 2610 threshold on page 2612 timeout <value> on page 2614 tolerance on page 2615 The following commands are applicable to TWAMP probe types and can be executed after this command:
(config)#probe <probe name> twamp
auth-mode open on page 2594 control on page 2595 data on page 2596 destination on page 2598 dscp <value> on page 2599 history-depth <value> on page 2602 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2603 num-packets <value> on page 2604 period <value> on page 2605 send-schedule periodic <value> on page 2607 shutdown on page 2608 size <payload length> on page 2609 source-address <ip address> on page 2610 source-port <port> on page 2611 threshold on page 2612 timeout <value> on page 2614 tolerance on page 2615
60000CRG0-35B
2592
absolute-path <name>
Use the absolute-path command to specify the servers root path. Use the no form of this command to return to the default setting. Syntax Description
<name> Specifies a path name.
Default Values
By default, the path name is the forward slash symbol ( / ).
Command History
Release 13.1 Command was introduced.
Functional Notes
This command can only be executed while in the probe <name> http-request command set.
Usage Examples
The following example sets the absolute path to /home/index.html: (config)#probe probe1 http-request (config-probe-probe1)#absolute-path/home/index.html
60000CRG0-35B
2593
auth-mode open
Use the auth-mode open command to specify the authentication mode the probe must use for communication. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, the authentication mode is open.
Command History
Release 17.2 Command was introduced.
Functional Notes
This command can only be executed while in the probe <name> twamp command set.
Usage Examples
The following example sets the authentication mode to open: (config)#probe probe1 twamp (config-probe-probe1)#auth-mode open
60000CRG0-35B
2594
control
Use the control command to specify source and destination ports. Use the no form of this command to return to the default setting. Variations of this command include:
control dest-port owamp-control control dest-port twamp-control control dest-port <port> control source-port <port>
Syntax Description
dest-port owamp-control twamp-control <port> source-port <port> Specifies the type of destination control port. Specifies the destination One-Way Active Measurement Protocol (OWAMP) control port (861). Specifies the destination Two-Way Active Measurement Protocol (TWAMP) default control port (862). Specifies a destination TWAMP control port other than the default port 862. The valid range is 1 to 65535. Specifies the TWAMP source control port. The valid range is 0 to 65535.
Default Values
By default, the source port is 0, which means that the source port will be dynamically selected by the probe. The default destination port is the TWAMP control port, port 862.
Command History
Release 17.2 Release 17.6 Command was introduced. Command was expanded to include the twamp-control parameter and default destination port was set to port 862.
Functional Notes
This command can only be executed while in the probe <name> twamp command set.
Usage Examples
The following example specifies a destination control port for the probe1 probe: (config)#probe probe1 twamp (config-probe-probe1)#control dest-port owamp-control
60000CRG0-35B
2595
data
Use the data command to specify the data for padding a measurement packet. Payload data specifies the data used to pad a measurement packet. Payload data can consist of all zeros pattern, a random pattern, or a user-defined pattern. If the payload size is greater than the length of the pattern, the pattern will be repeated. Use the no form of this command to return to the default setting. Variations of this command include:
data pattern ascii <string> data pattern hex <string> data random data zero
Syntax Description
pattern ascii <string> pattern hex <string> random zero Specifies an ASCII data pattern. Specifies a hexadecimal data pattern. Specifies using a pattern of random numbers. Specifies using a pattern of zeros.
Default Values
By default, the data pattern is set to zero.
Command History
Release 17.2 Command was introduced to function with Two-Way Active Measurement Protocol (TWAMP) and Internet Control Message Protocol (ICMP) timestamp probes only.
Functional Notes
This command can only be executed while in the probe <name> twamp and probe <name> icmp-timestamp command set.
Usage Examples
The following example specifies a data pattern as random: (config)#probe probe2 twamp (config-probe-probe2)#data random
60000CRG0-35B
2596
data <pattern>
Use the data command to specify a hexadecimal pattern to repeat in the Internet Control Message Protocol (ICMP) packet data section. Use the no form of this command to return to the default setting. Syntax Description
<pattern> Specifies a hexadecimal data pattern.
Default Values
By default, the data pattern is a standard ping packet pattern of data values starting with 0x00, incrementing by one for the length of the packet. Refer to ping on page 39 for more information on ping packet data patterns.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example specifies a data pattern of 0FF0 for probe1: (config)#probe probe1 icmp-echo (config-probe-probe1)#data 0FF0
60000CRG0-35B
2597
destination
Use the destination command to specify the destination host name and port for the probe object. Use the no form of this command to remove the setting. Variations of this command include:
destination <hostname> destination <hostname> port <number> destination <ip address> destination <ip address> port <number>
Syntax Description
<hostname> <ip address> port <number> Specifies the IP host by name. Specifies a valid IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies port number. This feature is not used with icmp-echo probes. The valid range is 1 to 65535.
Default Values
By default, there is no setting for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example specifies www.adtran.com as the host and port 21 File Transfer Protocol (FTP) as the destination for probe1: (config)#probe probe1 http-request (config-probe-probe1)#destination www.adtran.com port 21
60000CRG0-35B
2598
dscp <value>
Use the dscp command to specify the differentiated services code point (DSCP) value placed in the test packets. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the DSCP value. The range is 0 to 63.
Default Values
By default, the DSCP value is 0.
Command History
Release 13.1 Release 17.2 Command was introduced. Command was added to the Two-Way Active Measurement Protocol (TWAMP) and Internet Control Message Protocol (ICMP) timestamp probes.
Usage Examples
The following example specifies DSCP value to be placed in the probe: (config)#probe probe2 icmp-timestamp (config-probe-probe2)#dscp 15
60000CRG0-35B
2599
Default Values
By default, no regular expression is defined.
Command History
Release 13.1 Command was introduced.
Functional Notes
This command can only be executed while in the probe <name> http-request command set.
Usage Examples
The following example only allows the probe1 test to pass if the word success is found in the HTTP server response message: (config)#probe probe1 http-request (config-probe-probe1)#expect regex success
60000CRG0-35B
2600
Syntax Description
<minimum> <maximum> Specifies a minimum number value for the status code. Valid range is 0 to 999. Optional. Specifies a maximum number to create a range of status codes. Valid range is 0 to 999.
Default Values
By default, there is no setting for this command.
Command History
Release 13.1 Command was introduced.
Functional Notes
This command can only be executed while in the probe <name> http-request command set. Specifying only a minimum value indicates only one value can match the status code. Entering a maximum value indicates a range of possible matches.
Usage Examples
The following example configures probe1 to expect a status code of 200 (the status of a successful HTTP request): (config)#probe probe1 http-request (config-probe-probe1)#expect status 200
60000CRG0-35B
2601
history-depth <value>
Use the history-depth command to specify the number of probe operation results allowed to be stored in the units memory. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the number of probe operation results to keep in the history memory. The range is 1 to 120.
Default Values
By default, the history-depth value is set to 1.
Command History
Release 17.2 Command was introduced.
Functional Notes
This command can only be executed while in the probe <name> icmp-timestamp or probe <name> twamp command set.
Usage Examples
The following example specifies the number of probe results that can be stored in the unit: (config)#probe probe2 icmp-timestamp (config-probe-probe2)#history-depth 30
60000CRG0-35B
2602
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)probe probe3 twamp (config-probe-probe3)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2603
num-packets <value>
Use the num-packets command to specify the number of packets to send and receive during a single probe operation. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the number of packets. Valid range is 1 to 1000 packets.
Default Values
By default, the num-packets is set to 10.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example specifies sending 10 packets during the probe test: (config)#probe probe3 twamp (config-probe-probe3)#num-packets 10
60000CRG0-35B
2604
period <value>
Use the period command to specify the time between probe test attempts. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the time (in seconds) between probe test attempts. Valid range is 1 to 65535 seconds.
Default Values
By default, the period between probe tests is 60 seconds.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example specifies probe1 to initiate probe tests every 90 seconds: (config)#probe probe1 icmp-echo (config-probe-probe1)#period 90
60000CRG0-35B
2605
raw-string
Use the raw-string command to enter text to appear in the data portion of a Hypertext Transfer Protocol (HTTP) request. Refer to ping on page 365 for more details on the output text. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Functional Notes
This command can only be executed while in the probe <name> http-request command set. The type should be set to RAW. Refer to tolerance on page 2615 for more information. The following system variables can be used in the text: $SYSTEM_NAME = The host name of the system. $SYSTEM_SERIAL_NUMBER = The serial number of the system. $SYSTEM_DESCRIPTION = The product name and part number of the system. $SYSTEM_SOFTWARE_VERSION = The firmware version of the system.
Usage Examples
The following example configures a RAW HTTP request that attempts to access update.php on the Web server. This command could be useful if the server administrator creates a PHP script that logs network connectivity information. Additional information (the router name and its uptime) placed after update.php is sent to the HTTP server. (config)#probe probe1 http-request (config-probe-probe1)#raw-string GET/update.php?hostname=$SYSTEM_NAME&uptime=$SYSTEM_UPTIME HTTP/1.0 \r\n \r\n exit
60000CRG0-35B
2606
Default Values
By default, the time interval is 20 milliseconds.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example specifies a 45 millisecond time interval between the packets during probe1 test: (config)#probe probe1 twamp (config-probe-probe1)#send-schedule periodic 45
60000CRG0-35B
2607
shutdown
Use the shutdown command to disable a probe and cause it to cease generating traffic. While a probe is shut down, it will return a fail value to a track. Use the no form of this command to enable a probe to generate traffic. Syntax Description
No subcommands.
Default Values
By default, probes are shut down when created.
Command History
Release 13.1 Command was introduced.
Functional Notes
A probe must be created first using the probe command. Refer to probe on page 1179 for more information. Issuing the shutdown command at the probe configuration prompt will disable a probe, causing it to cease generating traffic.
Usage Examples
The following example disables probe1: (config)#probe probe1 http-request (config-probe-probe1)#shutdown
60000CRG0-35B
2608
Default Values
By default, the payload length is 0 bytes.
Command History
Release 13.1 Release 17.2 Command was introduced. Command was updated with a new default, range, and description.
Usage Examples
The following example sets the length of the Internet Control Message Protocol (ICMP) echo packets padding field for probe1 to 25 bytes: (config)#probe probe1 icmp-echo (config-probe-probe1)#size 25
60000CRG0-35B
2609
Default Values
By default, the IP address of the outbound interface is used.
Command History
Release 13.1 Command was introduced.
Functional Notes
A valid local IP address must be entered for proper functionality.
Usage Examples
The following example configures the source IP address on probe1: (config)#probe probe1 icmp-echo (config-probe-probe1)#source-address 10.10.10.1
60000CRG0-35B
2610
source-port <port>
Use the source-port command to specify a port source to use for probe traffic. Use the no form of this command to return to the default setting. Syntax Description
<port> Specifies the port number. Valid range is 0 to 65535.
Default Values
By default, the port is set to 0 which means that the probe will dynamically select the port number.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example configures the source port on probe1 as 5000: (config)#probe probe1 http-request (config-probe-probe1)#source-port 5000
60000CRG0-35B
2611
threshold
Use the threshold command to specify the criteria for a probe to be declared as passing or failing for the delay, ipdv-abs, and packet-loss values measured by the probe. Any combination of direction and type of threshold can be simultaneously configured and performed during the probe. Use the no form of this command to return to the default setting. Variations of this command include the following:
threshold delay [in | out | round-trip] [avg | max | min] <fail value> <pass value> threshold ipdv-abs [in | out | round-trip] [avg | max | min] <fail value> <pass value> threshold packet-loss round-trip [avg | max | min] <fail value> <pass value>
Syntax Description
delay Specifies the thresholds for changing the state of the probe between pass and fail based on the measured delay. The fail and pass value range is -2147483648 to 2147483647 milliseconds. Specifies the thresholds for changing the state of the probe between pass and fail based on measured interpacket delay variation (IPDV). The fail and pass value range is 0 to 4294967295 milliseconds. Specifies inbound delay or IPDV. avg max min out avg max min round-trip packet-loss Specifies the inbound average delay or IPDV. Specifies the inbound maximum delay or IPDV. Specifies the inbound minimum delay or IPDV. Specifies outbound delay or IPDV. Specifies the outbound average delay or IPDV. Specifies the outbound maximum delay or IPDV. Specifies the outbound minimum delay or IPDV. Specifies round trip delay or IPDV. Specifies the thresholds for changing the state of the probe between pass and fail based on measured packet loss. The fail and pass value range is 1 to 1000 packets. Specifies round trip packet loss. Specifies the average round trip packet loss. Specifies the maximum round trip packet loss. Specifies the minimum round trip packet loss. <fail value> <pass value> Specifies the probes failing value. Refer to the specific threshold type above for the valid range. Specifies the probes passing value. Refer to the specific threshold type above for the valid range.
ipdv-abs
in
Default Values
By default, the delay pass and fail value is 2147483647 milliseconds, the ipdv-abs pass and fail value is 4294967295 milliseconds, and the packet-loss pass and fail value is 1000. This disables each of these thresholds by default.
60000CRG0-35B
2612
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example configures the probe to fail if it loses 100 packets and change to pass if packet loss is below 75: (config)#probe probe1 icmp-echo (config-probe-probe1)#threshold packet-loss in max 100 75
60000CRG0-35B
2613
timeout <value>
Use the timeout command to specify the amount of time to wait for a test result before determining a failure. Use the no form of this command to remove the timeout setting. Syntax Description
<value> Specifies the timeout value in milliseconds. This value must be less than the probe period value (refer to dscp <value> on page 2599). Valid range is 1 to 900000 milliseconds.
Default Values
By default, the timeout is 2000 milliseconds, and 10000 milliseconds (10 seconds) for Transmission Control Protocol (TCP) connect probes and 10000 milliseconds (10 seconds) for Hypertext Transfer Protocol (HTTP) request probes.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example configures AOS to wait 90 milliseconds before determining a failure on probe1: (config)#probe probe1 icmp-echo (config-probe-probe1)#timeout 90
60000CRG0-35B
2614
tolerance
Use the tolerance command to configure the tolerance limit for test failures before returning a fail status from the probe. Limits can be specified for consecutive failures or by rate of failure. Tolerance levels can also be different based upon whether the probe is transitioning to the pass or fail state. Use the no form of this command to remove tolerance levels from probes. Variations of this command include:
tolerance consecutive fail <number> tolerance consecutive pass <number> tolerance consecutive fail <number> pass <number> tolerance rate fail <number> of <set size> tolerance rate pass <number> of <set size> tolerance rate fail <number> pass <number> of <set size>
Syntax Description
consecutive rate fail <number> Specifies that the probe state transitions occur only after a consecutive number of test results conflict with the current state. Specifies that the probe state transitions occur after a certain ratio of test results conflict with the current state. Specifies the number of failures that must occur before transitioning the probe to the FAIL state. Valid ranges are 1 to 255 consecutive failures and 1 to 254 failures per set. Specifies the number of passes before transitioning the probe to the PASS state. Valid ranges are 1 to 255 consecutive passes and 1 to 254 passes per set. Specifies test set size for rate configuration. Valid range is 1 to 255.
pass <number>
of <set size>
Default Values
By default, there are no configured tolerance levels. Therefore, a probe that does not have a defined tolerance will never fail. When probes are set in consecutive mode, any state not explicitly configured has its tolerance value set to 1. In rate mode, any state not explicitly configured has its tolerance value set to 1+s-t, where s is the set size and t is the value of the other state.
60000CRG0-35B
2615
Command History
Release 14.1 Release 15.1 Release 17.2 Command was introduced. Command revised to include pass and fail values. Command was added to the Two-Way Active Measurement Protocol (TWAMP) and Internet Control Message Protocol (ICMP) timestamp probes.
Functional Notes
This command has been modified from its original form. All tolerance configurations before Revision 15.1 are deprecated, but will be supported for existing units that are upgraded.
Usage Examples
The following example configures probe1 to allow 10 consecutive failures before changing the probe status to FAIL, and requires 5 consecutive passes to change its status to PASS when in the FAIL state: (config)#probe probe1 icmp-echo (config-probe-probe1)#tolerance consecutive fail 10 pass 5 In the following example, the probe is configured for rate tolerance. To move to the FAIL state, 5 of the last 10 tests must fail. Once in this state, 8 of the last 10 tests must pass in order to transition the probe back to PASS: (config)#probe probe1 icmp-echo (config-probe-probe1)#tolerance rate fail 5 pass 8 of 10
60000CRG0-35B
2616
type
Use the type command to specify a Hypertext Transfer Protocol (HTTP) request type. Use the no form of this command to return to the default setting. Variations of this command include:
type get type head type raw
Syntax Description
get head raw Specifies the probe to use HTTP get request. Specifies the probe to use HTTP head request. Specifies the probe to use HTTP raw request.
Default Values
By default, the probes HTTP request is set to get.
Command History
Release 13.1 Command was introduced.
Functional Notes
This command can only be executed while in the probe <name> http-request command set.
Usage Examples
The following example configures probe1 to use HTTP request raw: (config)#probe probe1 http-request (config-probe-probe1)#type raw
60000CRG0-35B
2617
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: do on page 69 cross-connect on page 65 (applicable to the ICMP timestamp and UDP echo responders only) exit on page 71 interface on page 72 The following commands are applicable to ICMP timestamp probe responder types and can be executed after this command:
(config)#probe responder icmp-timestamp
access-class <name> in on page 2620 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2623 shutdown on page 2626
60000CRG0-35B
2618
The following commands are applicable to TWAMP probe responder types and can be executed after this command:
(config)#probe responder twamp
access-class <name> in on page 2620 control source-port on page 2621 control timeout <value> on page 2622 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2623 max-sessions <value> on page 2624 port <value> on page 2625 shutdown on page 2626 source-interface <interface> on page 2627 test timeout <value> on page 2628 The following commands are applicable to User Datagram Protocol (UDP) echo probe responder types and can be executed after this command:
(config)#probe responder udp-echo
access-class <name> in on page 2620 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2623 port <value> on page 2625 shutdown on page 2626 source-interface <interface> on page 2627
60000CRG0-35B
2619
access-class <name> in
Use the access-class in command to specify an access control list (ACL) to filter access to the responder. Use the no form of this command to remove the ACL from the responder. Syntax Description
<name> Specifies a name of the ACL.
Default Values
By default, no ACL is configured.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example sets an ACL for the Two-Way Active Measurement Protocol (TWAMP) responder: (config)#probe responder twamp (config-responder-twamp)#access-class Anet in
60000CRG0-35B
2620
control source-port
Use the control source-port command to specify the Two-Way Active Measurement Protocol (TWAMP) source control port. Use the no form of this command to return to the default setting. Variations of this command include:
control source-port owamp-control control source-port twamp-control control source-port <port>
Syntax Description
owamp-control twamp-control <port> Specifies One-Way Active Measurement Protocol (OWAMP) control port (861) as the source port. Specifies the default TWAMP control port (862) as the source port. Specifies a source TWAMP control port other than the default port 862. The valid range is 1 to 65535.
Default Values
By default, the source port is the TWAMP control port, port 862.
Command History
Release 17.2 Release 17.6 Command was introduced. Command was expanded to include the twamp-control parameter and the default source port was set to port 862.
Usage Examples
The following example specifies the OWAMP control port as the source control port for the TWAMP responder: (config)#probe responder twamp (config-responder-twamp)#control source-port owamp-control
60000CRG0-35B
2621
Default Values
By default, the control timeout value is set to 900.
Command History
Release 17.6 Command was introduced.
Usage Examples
In the following example, the TWAMP control session is set to timeout after 7200 seconds: (config)#probe responder twamp (config-responder-twamp)#control timeout 7200
60000CRG0-35B
2622
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#probe responder twamp (config-responder-twamp)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2623
max-sessions <value>
Use the max-sessions command to specify the number of simultaneous Two-Way Active Measurement Protocol (TWAMP) control sessions the responder can handle. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the maximum number of simultaneous TWAMP-control sessions.
Default Values
By default, the maximum sessions is 10.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example specifies the max-sessions value of 5: (config)#probe responder twamp (config-responder-twamp)#max-sessions 5
60000CRG0-35B
2624
port <value>
Use the port command to specify the User Datagram Protocol (UDP) port to listen for and respond to UDP echo packets. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the port number. Valid range is 1 to 65535.
Default Values
By default, the UDP port value is 6.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example specifies port 5055 as the UDP port for the UDP echo responder: (config)#probe responder udp-echo (config-responder-udp)#port 5055
60000CRG0-35B
2625
shutdown
Use the shutdown command to disable a responder and cause it to cease operation. While a responder is shut down, it will not respond to probe packets. Use the no form of this command to enable a responder to respond to probe traffic. Syntax Description
No subcommands.
Default Values
By default, probe responders are shut down when created.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example enables responder twamp: (config)#probe responder twamp (config-responder-twamp)#no shutdown
60000CRG0-35B
2626
source-interface <interface>
Use the source-interface command to specify an interface with the primary IP address used as the source address for responder traffic that originated from the unit. Use the no form of this command to return to the default setting. Syntax Description
<interface> Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1.
Default Values
By default, the source interface is not configured.
Command History
Release 17.2 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
Usage Examples
The following example configures the source interface as vlan1: (config)#probe responder twamp (config-responder-twamp)#source-interface vlan1
60000CRG0-35B
2627
Default Values
By default, the test session timeout is set to 900 seconds.
Command History
Release 17.6 Command was introduced.
Usage Examples
The following example sets the TWAMP probe responders timeout interval to 7200 seconds: (config)#probe responder twamp (config-responder-twamp)#test timeout 7200
60000CRG0-35B
2628
The following command is common to multiple command sets and is covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order: dampening-interval on page 2630 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2631 log-changes on page 2632 shutdown on page 2633 snmp trap state-change on page 2634 test if on page 2635 test list on page 2639 test list weighted on page 2642 time-schedule <name> on page 2645
60000CRG0-35B
2629
dampening-interval
Use the dampening-interval command to specify an amount of time to wait before allowing a new probe status change to trigger a new action. Use the no form of this command to return to the default setting. Variations of this command include:
dampening-interval <value> dampening-interval fail<value> dampening-interval pass <value>
Syntax Description
<value> Specifies the time interval value in seconds. Valid range is 1 to 4294967295 seconds. If neither the fail or pass subcommand is specified, the value will be used for both conditions. Specifies the delay in seconds following pass-to-fail transitions before a new action can be triggered. Specifies the delay in seconds following fail-to-pass transitions before a new action can be triggered.
Default Values
By default, the interval is set to 1 seconds.
Command History
Release 13.1 Release 14.1 Command was introduced. Command was expanded to include the fail and pass criteria.
Usage Examples
The following example sets the dampening interval to 90 seconds for a fail-to-pass transition: (config)#track track1 (config-track-track1)#dampening-interval pass 90
60000CRG0-35B
2630
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#track track1 (config-track-track1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2631
log-changes
Use the log-changes command to enable logging of status changes. When enabled, probe state transitions are displayed (real time) on the terminal (or Telnet) screen. Unlike track debug commands, the log-changes command appears in the running configuration and can be saved to persist through a unit restart. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this feature is disabled.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example enables the logging of status changes: (config)#track track1 (config-track-track1)#log-changes
60000CRG0-35B
2632
shutdown
Use the shutdown command to disable a track. While a track is shut down, it is forced to fail. Use the no form of this command to enable a track. Syntax Description
No subcommands.
Default Values
By default, tracks are active when created.
Command History
Release 13.1 Command was introduced.
Functional Notes
A track must be created first using the track command in the Global Configuration mode. Refer to the command track <name> on page 1251 for more information. Issuing the shutdown command at the track configuration prompt will force the track to fail.
Usage Examples
The following example enables track1: (config)#track track1 (config-track-track1)#no shutdown
60000CRG0-35B
2633
Default Values
By default, the state-change trap is disabled.
Command History
Release 18.1 Command was introduced.
Functional Notes
The network monitor track set of traps must also be enabled using the snmp-server enable traps track command in the Global Configuration mode. Refer to snmp-server enable traps on page 1208 for more information. Additional configuration steps are necessary to configure SNMP traps for this feature to function. Refer to the SNMP in AOS configuration guide available online at http://kb.adtran.com (article number 1134).
Usage Examples
The following example enables the snmp trap state-change for network monitoring: (config)#track track1 (config-track-track1)#snmp trap state-change
60000CRG0-35B
2634
test if
Use the test if command to specify a single object (schedule, probe, or interface) to be tested. Use the no form of this command to remove the track test. Variations of this command include:
test if interface <interface> ip-routing test if interface <interface> line-protocol test if probe <name> test if schedule <name> test if not interface <interface> ip-routing test if not interface <interface> line-protocol test if not probe <name> test if not schedule <name>
Syntax Description
interface <interface> Specifies an interface as the object to be tested. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a virtual local area network interface, use vlan 1. Type test if interface ? for a complete list of valid interfaces. Specifies the interfaces ability to perform IP routing will be tested. Specifies the line-protocol state of an interface will be tested. Optional. Negates the test results when specifying a single object (schedule, probe, or interface) to be tested. Specifies the name of the probe. Specifies the name of the schedule.
Network monitoring probes and their associated names are created using the command probe on page 1179. Schedules and their associated names are created using the command schedule <name> on page 1201. More information refer to the command interface on page 72. Default Values
By default, a track is not associated with any probes or interfaces.
Functional Notes
The test if command specifies a conditional test where the track state (pass or fail) is dependent upon the state of the object (probe, schedule, or interface) being tested. For example, the track will PASS if the schedule or probe is in an ACTIVE or PASS state. Conversely, the track will FAIL if the schedule or probe is in an INACTIVE or FAIL state.
60000CRG0-35B
2635
The test if not command specifies a conditional test where the track state (pass or fail) is dependent upon the state of the object (probe, schedule, or interface) being tested. The not keyword indicates that the track state will negate the result of the object test. For example, the track will FAIL if the schedule or probe is in an ACTIVE or PASS state. Conversely, the track will PASS if the schedule or probe is in an INACTIVE or FAIL state. An interface is IP routing if its line-protocol state is up and if it has a valid, nonzero IP address. This means that interfaces using Dynamic Host Configuration Protocol (DHCP) or negotiated Point-to-Point Protocol (PPP) will not pass until their primary IP address is dynamically configured.
Command History
Release 15.1 Release 16.1 Release A4.01 Command was introduced. Command was expanded to include the interface parameter. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
Usage Examples
The following example demonstrates the use of the test if probe command to specify a single object to test: (config)#track PINGTEST (config-track-PINGTEST)#test if probe PINGREMOTE The following example demonstrates the logic of the test if not command used with schedule tracking: (config)#track DELAY (config-track-DELAY)#test if not schedule DELAY-AFTER-BOOT
The inverse logic of this command means that track DELAY will pass only if the schedule DELAY-AFTER-BOOT is inactive.
The explanation that follows uses a real-world example to provide insight into the example above: A customer has a primary Ethernet wide area network (WAN) interface, as well as a dial-on-demand interface enabled on an AOS unit. The demand interface is intended as a backup for the primary Ethernet interface. During router initialization and bootup, the Ethernet interface negotiates an IP address and default route from a DHCP server. Due to this negotiation process, the active state of the Ethernet interface lags behind that of the demand interface. As a result, the Ethernet interface appears down and the demand interface dials out to back up the connection. The customer would like to prevent the demand interface from dialing out before the Ethernet connection has had a chance to obtain its DHCP settings and become active. It is determined that 180 seconds is a sufficient amount of time to allow for the Ethernet interface to become active. The following bullets describe the setup via command line interface (CLI) to accomplish the customer's goals:
60000CRG0-35B
2636
A schedule called DELAY-AFTER-BOOT is created and specified to become active 180 seconds after the AOS unit has booted up. A track named DELAY is created. Track DELAY is associated with the schedule DELAY-AFTER-BOOT via the following command: (config-track-DELAY)#test if not schedule DELAY-AFTER-BOOT The inverse logic of this command means that track DELAY will pass only if the schedule DELAY-AFTER-BOOT is inactive. Therefore, this track will pass only during the first 180 seconds following bootup of the AOS unit.
A default route to null interface 0 is created and associated with track DELAY. This default route will only be inserted into the routing table when track DELAY is in the pass state. The administrative distance for the default route to null interface 0 is 10 and is set to be lower than the administrative distance for the demand interface default route (200).
Output from the show run command summarizes the CLI configuration: #show run (some output omitted) . schedule DELAY-AFTER-BOOT !! Schedule is Inactive for first 180 seconds, then Active thereafter relative start-after 180 ! track DELAY log-changes test if not schedule DELAY-AFTER-BOOT no shutdown ! !!! Below is a default route to null 0 with an admin distance of !!! 10 that is tracked by DELAY and a default route to demand 1 !!! with admin distance of 200 ip route 0.0.0.0 0.0.0.0 null 0 10 track DELAY ip route 0.0.0.0 0.0.0.0 demand 1 200 Since track DELAY is in a pass state during the first 180 seconds after the AOS unit has booted up, the default route to null interface 0 will be in effect and all traffic using the default route in the route table will be routed to null interface 0. The demand interface will not be activated during the first 180 seconds because the default route to null interface 0 has a lower administrative distance than the demand interface default route. As soon as a default route has been assigned to the primary Ethernet WAN interface, the route will appear in the routing table with an administrative distance of 1 (which is lower than the administrative distance of 10 for the null interface). Due to the lower administrative distance, all traffic using the default route in the route table will switch to the default route associated with the primary Ethernet interface.
60000CRG0-35B
2637
180 seconds after bootup, the schedule DELAY-AFTER-BOOT becomes active. Subsequently, track DELAY fails. The default route to null interface 0 is removed from the routing table and will not be placed in the route table again as long as the AOS unit is up. The two default routes that remain are the current default route to the primary WAN Ethernet interface (administrative distance is 1) and the backup default route to the demand interface (administrative distance is 200). The following example uses the test if interface command to specify testing the IP routing capability of an Ethernet interface: (config)#track track1 (config-track-track1)#test if interface ethernet 0/1 ip-routing To view the results of the test, use the do show track track1 command: (config-track-track1)#do show track track1 Current State: FAIL (Admin: UP) Testing: interface eth 0/1 ip-routing (FAIL) Dampening Interval: 1 seconds Time in current state: 0 days, 0 hours, 0 minutes, 4 seconds Track State Changes: 1 Tracking:
60000CRG0-35B
2638
test list
Use the test list command to enter the Boolean Track Test List command set, which is used to specify multiple objects (schedule, probe, or interface) to be tested. Use the no form of this command to remove the test list. Variations of this command include:
test list and test list or
The following additional subcommands are available once you have entered the Boolean Track Test List Configuration mode:
if interface <interface> ip-routing if interface <interface> line-protocol if probe <name> if schedule <name> if not interface <interface> ip-routing if not interface <interface> line-protocol if not probe <name> if not schedule <name>
When using any command under the Boolean AND/OR track test list, it is important to remember how the logic will affect every object in the track test list. Syntax Description
and Specifies the relationship between all objects placed in this list. The logical AND relationship means that all objects in this list must be in the PASS state for the track test list to pass, or at least one object in a FAIL state for the track test list to fail. Specifies the relationship between all objects placed in this list. The logical OR relationship means that only one of the objects in this list must be in the PASS state for the track test list to pass, and all objects in a FAIL state for the track test list to fail. Specifies a single conditional test to be added to the test track list.
or
if not [probe | schedule | interface] Specifies a single conditional test to be added to the test track list. The not keyword indicates that the individual track state will negate the result of the object test. <interface> Specifies the interface to be added to the test track list. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a virtual local area network interface, use vlan 1. Type if interface ? for a complete list of valid interfaces. Specifies the interfaces ability to perform IP routing will be tested.
ip-routing
60000CRG0-35B
2639
Network Monitor Track Command Set Specifies the line-protocol state of an interface will be tested. Specifies the name of the probe or schedule.
Network monitoring probes and their associated names are created using the command probe on page 1179. Schedules and their associated names are created using the command schedule <name> on page 1201. More information refer to the command interface on page 72. Default Values
By default, a track list does not exist.
Command History
Release 15.1 Release 16.1 Command was introduced. Command was expanded to include the interface parameter.
Functional Notes
There is no limit to how many probes, schedules, or interfaces can be tested within a single test list. However, only one type (AND, OR, or weighted) of test list can exist on a track at any given time. An interface is IP routing if its line-protocol state is up and if it has a valid, nonzero IP address. This means that interfaces using Dynamic Host Configuration Protocol (DHCP) or negotiated Point-to-Point Protocol (PPP) will not pass until their primary IP address is dynamically configured.
Usage Examples
The following example demonstrates use of the test list and command to create a Boolean track test list where ALL tests must PASS in order for the track to PASS. The test list for track LB contains two probe tests, LB and LB2. (config)#track LB (config-track-track LB)#test list and (config-track-track LB test)#if probe LB (config-track-track LB test)#if probe LB2 (config-track-track LB test)#exit (config-track-track LB)#no shutdown The show track LB command is executed to see whether track LB is in a PASS state: #show track LB Current State: PASS (Admin: UP) Testing: probe LB (PASS) AND probe LB2 (PASS) Dampening Interval: 1 seconds Time in current state: 0 days, 0 hours, 0 minutes, 29 seconds Track State Changes: 2
60000CRG0-35B
2640
Currently, track LB is in a PASS state. Due to the AND Boolean logic for this test list, track LB is in a PASS state because the test probe statements within the test list (probe LB and LB2) are also BOTH in a PASS state. Now, probe LB has been forced to fail for demonstration purposes in this example. Output from the show track LB command shows track LB in a FAIL state. (config-loop 1)#do show track LB Current State: FAIL (Admin: UP) Testing: probe LB (FAIL) AND probe LB2 (PASS) Dampening Interval: 1 seconds Time in current state: 0 days, 0 hours, 0 minutes, 10 seconds Track State Changes: 3 Tracking: Probe LB is now in a FAIL state. As a result, track LB is also in a FAIL state.
If the test list in this example had specified the OR Boolean logic (using the test list or command), then track LB would have passed even though one of the test probes was in the FAIL state.
60000CRG0-35B
2641
Syntax Description
if [probe | schedule | interface] if not [probe | schedule | interface] Specifies a single conditional test to be added to the test track list. Specifies a single conditional test to be added to the test track list. The not keyword indicates that the individual track state will negate the result of the object test. Specifies the interface to be added to the test track list. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a virtual local area network interface, use vlan 1. Type if interface ? for a complete list of valid interfaces. Specifies the interfaces ability to perform IP routing will be tested. Specifies the line-protocol state of an interface will be tested. Specifies the name of the probe or schedule. Specifies the weight value to use if this test is successful. Range is 1 to 65535. Specifies a baseline weight for state transitions. Range is 1 to 4294967295. Optional. Specifies the number which, if reached or exceeded, will change the state of the track test list to pass. Range is 1 to 4294967295.
<interface>
60000CRG0-35B
2642
Network Monitor Track Command Set Optional. Specifies the number that will change the state of the track test list to fail. Range is 1 to 4294967295.
Network monitoring probes and their associated names are created using the command probe on page 1179. Schedules and their associated names are created using the command schedule <name> on page 1201. More information refer to the command interface on page 72. Default Values
By default, a track list does not exist.
Command History
Release 15.1 Release 16.1 Command was introduced. Command was expanded to include the interface parameter.
Functional Notes
There is no limit to how many probes, schedules, or interfaces can be tested within a single test list. However, only one type (AND, OR, or weighted) of test list can exist on a track at any given time. An interface is IP routing if its line-protocol state is up and if it has a valid, nonzero IP address. This means that interfaces using Dynamic Host Configuration Protocol (DHCP) or negotiated Point-to-Point Protocol (PPP) will not pass until their primary IP address is dynamically configured.
Usage Examples
The following example demonstrates use of the test list weighted command. The list contains three probe tests and each test has been assigned a different weight value (10, 20, and 30). When a probe test passes, its weight is added to the sum of the weights from other successful tests contained within the Weighted Track Test List. The pass threshold in this example is set to 35. The sum of all the weights must meet or exceed the value of 35 before the Weighted Track Test List will transition to a PASS state. The fail threshold in this example is set to 25. Therefore, if the sum of all the weights falls below the value of 25, the Weighted Track Test List will transition to a FAIL state. (config)#track LB-test (config-track-LB-test)#test list weighted (config-track-LB-test-test)#if probe LB weight 10 (config-track-LB-test-test)#if probe LB2 weight 20 (config-track-LB-test-test)#if probe LB3 weight 30 (config-track-LB-test-test)#threshold pass 35 fail 25 (config-track-LB-test-test)#exit (config-track-LB-test)#no shutdown
60000CRG0-35B
2643
The show track LB-test command is executed to see whether track LB-test is in a PASS state: #show track LB-test Current State: PASS (Admin: UP) Testing: +10 if probe LB (PASS) +20 if probe LB2 (PASS) +30 if probe LB3 (PASS) Total = 60 currently, < 25 changes state to FAIL Dampening Interval: 1 seconds Time in current state: 2 days, 5 hours, 21 minutes, 13 seconds Track State Changes: 0 Tracking: Currently, all probe test commands are in the PASS state. Therefore, the sum of the assigned weights equals 60. The value of 60 exceeds the specified pass threshold of 35. As a result, the current state of the track is PASS. Probe LB and probe LB3 have been forced to fail for demonstration purposes in this example. Output from the show track LB-test command shows track LB-test to be in a FAIL state. (config-loop 1)#do show track LB-test Current State: FAIL (Admin: UP) Testing: +10 if probe LB (FAIL) +20 if probe LB2 (PASS) +30 if probe LB3 (FAIL) Total = 20 currently, >= 35 changes state to PASS Dampening Interval: 1 seconds Time in current state: 0 days, 0 hours, 0 minutes, 33 seconds Track State Changes: 1 Tracking: Only probe LB2 is in the PASS state. Therefore, the sum of the assigned weights equals 20. The value of 20 falls below the FAIL threshold of 25. As a result, the current state of the track is now FAIL.
60000CRG0-35B
2644
time-schedule <name>
Use the time-schedule command to specify the time period a track has an effect. While the specified schedule is active, the track follows the state of its associated probe. Use the no form of this command to remove the time schedule from this track. Refer to the command schedule <name> on page 1201 for more information on creating and modifying a schedule. Variations of this command include:
time-schedule <name> pass time-schedule <name> fail
Syntax Description
<name> pass fail Specifies the name of the time schedule to apply. Specifies that the track status is PASS when the schedule is inactive. Specifies that the track status is FAIL when the schedule is inactive.
Default Values
By default, no time schedule is assigned to the track. Therefore, the track always follows the state of its associated probe.
Command History
Release 14.1 Release 15.1 Command was introduced. Command was expanded to allow specification of the track state when the schedule is inactive.
Usage Examples
The following example specifies that schedule1 will be used to determine when track1 follows the state of its probe: (config)#track track1 (config-track-track1)#time-schedule schedule1 pass
60000CRG0-35B
2645
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. area <area id> default-cost <value> on page 2647 area <area id> range <ip address> <subnet mask> on page 2648 area <area id> stub on page 2649 auto-cost reference-bandwidth <value> on page 2650 default-information-originate on page 2651 default-metric <value> on page 2652 distance <number> on page 2653 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2655 maximum-paths <value> on page 2656 network <ip address> <wildcard mask> area <area id> on page 2657 redistribute bgp on page 2658 redistribute connected on page 2659 redistribute rip on page 2660 redistribute static on page 2662 summary-address <ip address> <subnet mask> on page 2664 timers lsa-group-pacing <value> on page 2665 timers spf <delay> <hold> on page 2666
60000CRG0-35B
2646
<value>
Default Values
By default, the summary route cost is set to 0. There is no default for the area ID.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example defines a default cost of 85 to a specific area: (config)#router ospf (config-ospf)#area 192.22.72.0 default-cost 85
60000CRG0-35B
2647
Syntax Description
<area id> Specifies the identifier for this area. Specifies as an integer (range is 0 to 4294967295) or an IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the IP address of the advertised summary route. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IP addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Specifies that the address range will be advertised to other networks. Specifies that the address range will not be advertised to other networks.
advertise not-advertise
Default Values
By default, open shortest path first (OSPF) is not enabled.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example defines an address range for a specific area that allows the unit to advertise this range to other networks: (config)#router ospf (config-ospf)#area 11.0.0.0 range 11.0.0.0 255.0.0.0 advertise
60000CRG0-35B
2648
Syntax Description
<area id> Specifies the identifier for this area. Specifies as an integer (range is 0 to 4294967295) or an IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Designates the area as a total stub area. No summary link advertisements will be sent by the area border router (ABR) into the stub area.
no-summary
Default Values
By default, open shortest path first (OSPF) is not enabled.
Command History
Release 3.1 Command was introduced.
Technology Review
It is important to coordinate configuration of all routers and access servers in the stub area. The area stub command must be configured for each of those pieces of equipment. Use the area router configuration command with the area default-cost command to specify the cost of a default internal router sent into a stub area by an ABR. Refer to area <area id> default-cost <value> on page 2647 for related information.
Usage Examples
The following example configures area 2 as a stub area: (config)#router ospf (config-ospf)#area 2 stub
60000CRG0-35B
2649
Default Values
By default, the rate is set to 100.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example sets the auto cost reference bandwidth to 1000 Mbps: (config)#router ospf (config-ospf)#auto-cost reference-bandwidth 1000
60000CRG0-35B
2650
default-information-originate
Use the default-information-originate command to cause an autonomous system boundary router (ASBR) to generate a default route. It must have its own default route before it generates one unless the always keyword is used. Use the no form of this command to return to the default setting. Variations of this command include:
default-information-originate default-information-originate always default-information-originate always metric <value> default-information-originate always metric <value> metric-type <type> default-information-originate always metric-type <type> default-information-originate metric <value> default-information-originate metric <value> metric-type <type> default-information-originate metric-type <type>
Syntax Description
always metric <value> metric-type <type> Optional. Specifies to always advertise default route. Optional. Configures the metric value. Range is 0 to 16777214. Optional. Configures the metric type. Select from type 1 or 2.
Default Values
By default, the metric value is set to 10 and the metric type is set to 2.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example configures a router to always advertise default routes and assigns the default router a metric value of 10000 and a metric type of 2: (config)#router ospf (config-ospf)#default-information-originate always metric 10000 metric-type 2
60000CRG0-35B
2651
default-metric <value>
Use the default-metric command to set a metric value for redistributed routes. Use the no form of this command to return to the default setting. Syntax Description
<value> Sets the default metric value. Range is 0 to 4294967295.
Default Values
By default, default-metric value is set at 20.
Command History
Release 3.1 Command was introduced.
Functional Notes
The metric value defined using the redistribute command overrides the default-metric commands metric setting. Refer to redistribute ospf on page 2683 for related information.
Usage Examples
The following example shows a router using both Routing Information Protocol (RIP) and open shortest path first (OSPF) routing protocols. The example advertises RIP-derived routes using the OSPF protocol and assigns the RIP-derived routes an OSPF metric of 10. (config)#router ospf (config-ospf)#default-metric 10 (config-ospf)#redistribute rip
60000CRG0-35B
2652
distance <number>
Use the distance command to overwrite the open shortest path first (OSPF) route administrative distance. This can be the same for all OSPF routes or different based on the route type. Use the no form of this command to set the OSPF administrative distance to the default value. Variations of this command include:
distance <number> distance ospf intra-area <number> distance ospf inter-area <number> distance ospf external <number>
Syntax Description
<number> ospf intra-area ospf inter-area ospf external Specifies the administrative distance to use when adding OSPF routes into the route table. Range is 0 to 255. Specifies using a unique administrative distance for route paths between a source and destination in the same routing area. Specifies using a unique administrative distance for route paths between a source and destination in different areas. Specifies using a unique administrative distance for route paths between different autonomous systems (ASs).
Default Values
By default, 110 is the administrative distance for OSPF routes.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example configures external OSPF routes to use an administrative distance of 20 while other OSPF routes continue to use the default value of 110: (config)#router ospf (config-ospf)#distance ospf external 20
Technology Review
An AS is a set of routers under common administration control that usually use a common routing strategy. Each AS is composed of routing areas, which are groups of adjoining networks and attached hosts. Intra-area routing occurs when the source and destination hosts are in the same area; inter-area routing occurs when the source and destination hosts are in different areas; and external routing occurs when communication is between different ASs.
60000CRG0-35B
2653
Administrative distance is a feature that routers employ in order to select the most reliable path when there are two or more routes to the same destination from two different routing protocols. Administrative distance defines the reliability of a routing protocol by assigning a value (the smaller the value, the more trustworthy the protocol) that is then used by the router to organize routing protocols according to reliability.
60000CRG0-35B
2654
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#router ospf (config-ospf)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2655
maximum-paths <value>
Use the maximum-paths command to specify the number of parallel routes (shared paths) open shortest path first (OSPF) can inject into the route table. When IP load sharing is enabled, traffic is balanced to a specific destination across up to six equal paths. Use the no form of this command to return to the default value. Syntax Description
<value> Specifies the number of routes OSPF can insert into the route table. Valid range is 1 to 6.
Default Values
By default, the maximum-paths value is 4.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the maximum number of multipath routes OSPF can insert in the route table to 5. (config)#router ospf (config-ospf)#maximum-paths 5
60000CRG0-35B
2656
<area id>
Default Values
No default values are necessary for this command.
Command History
Release 3.1 Command was introduced.
Functional Notes
In order for OSPF to operate on an interface, the primary address for the interface must be included in the network area command. Assigning an interface to an OSPF area is done using the network area command. There is no limit to the number of network area commands used on a router. If the address ranges defined for different areas overlap, the first area in the network area command list is used and all other overlapping portions are disregarded. Try to avoid overlapping to avoid complications.
Usage Examples
In the following example, the OSPF routing process is enabled and two OSPF areas are defined: (config)#router ospf (config-ospf)#network 192.22.72.101 0.0.0.255 area 0 (config-ospf)#network 10.0.0.0 0.255.255.255 area 10.0.0.0
60000CRG0-35B
2657
redistribute bgp
Use the redistribute bgp command to advertise routes from one protocol to another. Using the bgp keyword allows the advertisement of Border Gateway Protocol (BGP) routes into the open shortest path first (OSPF) routing protocol. This will advertise BGP routes on OSPF-enabled interfaces. It does not enable OSPF on all interfaces. Use the no form of this command to disable the propagation of the specified route type. Variations of this command include:
redistribute bgp redistribute bgp metric <value> redistribute bgp metric-type <type> redistribute bgp route-map <name> redistribute bgp subnets
Syntax Description
metric <value> metric-type <type> route-map <name> subnets Optional. Specifies an OSPF metric value to be assigned to routes learned via BGP. Optional. Specifies a type 1 or type 2 external route as the external link type. If not specified, the default is 2. Optional. Specifies the route map access-list filter to use for advertising redistributed BGP routes in OSPF. Optional. Specifies subnet redistribution when redistributing routes into OSPF.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Command was introduced.
Functional Notes
Redistributing BGP routes imports those routes into OSPF without the interfaces in question actually participating in OSPF. The BGP routes imported this way are not covered by a network command and do not send/receive OSPF traffic. This allows OSPF to learn and distribute routes to networks that do not participate in OSPF.
Usage Examples
The following example imports BGP routes into OSPF: (config)#router ospf (config-ospf)#redistribute bgp
60000CRG0-35B
2658
redistribute connected
Use the redistribute connected command to advertise routes from one protocol to another. Using the connected keyword allows the advertisement of connected routes into the open shortest path first (OSPF) routing protocol. This will advertise all connected routes on OSPF-enabled interfaces. It does not enable OSPF on all interfaces. Use the no form of this command to disable the propagation of the specified route type. Variations of this command include:
redistribute connected redistribute connected metric <value> redistribute connected metric-type <type> redistribute connected route-map <name> redistribute connected subnets
Syntax Description
metric <value> metric-type <type> route-map <name> subnets Optional. Specifies an OSPF metric value to be assigned to connected routes (if no other value is specified). Optional. Specifies a type 1 or type 2 external route as the external link type. If not specified, the default is 2. Optional. Specifies the route map filter to use for advertising redistributed static routes in OSPF. Optional. Specifies subnet redistribution when redistributing routes into OSPF.
Default Values
By default, this command is disabled.
Command History
Release 3.1 Release 10.1 Release 14.1 Command was introduced. Subcommands were added. Command was expanded to include the route map filtering.
Functional Notes
Redistributing connected routes imports those routes into OSPF without the interfaces in question actually participating in OSPF. The connected routes imported this way are not covered by a network command and do not send/receive OSPF traffic.
Usage Examples
The following example imports connected routes into OSPF: (config)#router ospf (config-ospf)#redistribute connected
60000CRG0-35B
2659
redistribute rip
Use the redistribute rip command to advertise routes from one protocol to another, regardless of the routing protocol implemented on the routing domain. Using the rip keyword allows the propagation of Routing Information Protocol (RIP) routes into open shortest path first (OSPF). It does not enable OSPF on all interfaces. Use the no form of this command to disable the propagation of the specified route type. Variations of this command include:
redistribute rip redistribute rip metric <value> redistribute rip metric-type <type> redistribute rip route-map <name> redistribute rip subnets
Syntax Description
rip metric <value> metric-type <type> route-map <name> subnets Specifies advertising RIP routes using OSPF. Optional. Specifies a metric value to be carried from one OSPF process to the next (if no other value is specified). Optional. Specifies a type 1 or type 2 external route as the external link type. If not specified, the default is 2. Optional. Specifies the route map filter to use for advertising redistributed static routes in OSPF. Optional. Specifies subnet redistribution when redistributing routes into OSPF.
Default Values
By default, this command is disabled.
Command History
Release 3.1 Release 10.1 Release 14.1 Command was introduced. Subcommands were added. Command was expanded to include the route map filtering.
Functional Notes
Redistributing RIP routes imports routes learned via RIP into OSPF. RIP routes imported this way are not covered by a network command.
60000CRG0-35B
2660
Usage Examples
The following example imports RIP routes into OSPF: (config)#router ospf (config-ospf)#redistribute rip
60000CRG0-35B
2661
redistribute static
Use the redistribute static command to advertise routes from one protocol to another, regardless of the routing protocol implemented on the routing domain. Using the static keyword allows the advertisement of static routes into the open shortest path first (OSPF) routing protocol. This will advertise all static routes on OSPF-enabled interfaces. It does not enable OSPF on all interfaces. Use the no form of this command to disable the propagation of the specified route type. Variations of this command include:
redistribute static redistribute static metric <value> redistribute static metric-type <type> redistribute static route-map <name> redistribute static subnets
Syntax Description
static metric <value> metric-type <type> route-map <name> subnets Specifies advertising static routes using OSPF. Optional. Specifies a metric value to be carried from one OSPF process to the next (if no other value is specified). Optional. Specifies a type 1 or type 2 external route as the external link type. If not specified, the default is 2. Optional. Specifies the route map filter to use for advertising redistributed static routes in OSPF. Optional. Specifies subnet redistribution when redistributing routes into OSPF.
Default Values
By default, this command is disabled.
Command History
Release 3.1 Release 10.1 Release 14.1 Command was introduced. Subcommands were added. Command was expanded to include the route map filtering.
Functional Notes
Redistributing static routes imports static routes into OSPF. Static routes imported this way are not covered by a network command. This allows OSPF to advertise routes that are configured as static routes without the identified network participating in OSPF.
60000CRG0-35B
2662
Usage Examples
The following example imports static routes into OSPF: (config)#router ospf (config-ospf)#redistribute static
60000CRG0-35B
2663
Syntax Description
<ip address> <subnet mask> Specifies a valid IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies the subnet mask that corresponds to a range of IP addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). Optional. Causes suppression of routes that match the specified IP address and subnet mask.
not-advertise
Default Values
By default, this command is disabled.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example suppresses advertisement of the routes that match the specified IP address and subnet mask: (config)#router ospf (config-ospf)#summary-address 11.0.0.0 255.0.0.0 not-advertise
60000CRG0-35B
2664
Default Values
By default, this value is set at 240 seconds.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example sets the refresh interval for six minutes: (config)#router ospf (config-ospf)#timers lsa-group-pacing 360
60000CRG0-35B
2665
Default Values
By default, the SPF delay is 5 seconds and the hold interval is set to 10 seconds.
Command History
Release 3.1 Command was introduced.
Usage Examples
The following example defines a delay of 10 seconds and a hold time of 30 seconds: (config)#router ospf (config-ospf)#timers spf 10 30
60000CRG0-35B
2666
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2668 join-prune-msg-interval <value> on page 2669 rp-address <ip address> on page 2670 spt-threshold on page 2671
60000CRG0-35B
2667
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#router pim-sparse (config-pim-sparse)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2668
join-prune-msg-interval <value>
Use the join-prune-msg-interval command to set a timing rate for protocol-independent multicast (PIM) sparse join/prune messages. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the PIM sparse join/prune message interval. Valid range: 10 to 65534 seconds.
Default Values
By default, the message interval is set to 60 seconds.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the interval for 50 seconds: (config)#router pim-sparse (config-pim-sparse)#join-prune-msg-interval 50
60000CRG0-35B
2669
Syntax Description
<ip address> access-group <name> Specifies the IP address for the RP. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the particular access group to which the RP applies.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Functional Notes
The access-group keyword is used to limit the multicast group addresses to which the RP applies. If more than one RP is configured for a given multicast group address, then a hash algorithm determines the appropriate hierarchy (as shown below). The results of the hash algorithm can be seen with the show ip pim-sparse rp-map command. The hash algorithm is defined in RFC 2117 section 3.7 as follows: For each RP address C(i) in the RP-Set, whose Group-prefix covers G, compute a value: Value(G,M,C(i))=(1103515245 * ((1103515245 * (G&M)+12345) XOR C(i)) + 12345) mod 2^31 where M is a hash-mask included in Bootstrap messages.This hash-mask allows a small number of consecutive groups (e.g., 4) to always hash to the same RP. For instance, hierarchically encoded data can be sent on consecutive group addresses to get the same delay and fate-sharing characteristics. The candidate with the highest resulting value is then chosen as the RP for that group, and its identity and hash value are stored with the entry created. Ties between C-RPs having the same hash value are broken in advantage of the highest address.
Usage Examples
The following example specifies an IP address of 172.22.5.100 for the RP: (config)#router pim-sparse (config-pim-sparse)#rp-address 172.22.5.100
60000CRG0-35B
2670
spt-threshold
Use the spt-threshold command to change the protocol-independent multicast (PIM) sparse shortest path tree (SPT) threshold, which specifies the number of packets the router sends using the rendezvous point (RP) before switching to the SPT. Use the no form of this command to return to the default setting. Variations of this command include:
spt-threshold <value> spt-threshold infinity
Syntax Description
<value> Optional. Specifies the number of packets the routing switch sends using the RP before switching to the SPT. Valid range is 1 to 4294967295 packets. Optional. Causes all sources to use the shared RP tree.
infinity
Default Values
By default, the SPT threshold is set to 1 packet.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the SPT threshold at five packets: (config)#router pim-sparse (config-pim-sparse)#spt-threshold 5
60000CRG0-35B
2671
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. auto-summary on page 2673 default-metric <value> on page 2674 distance <number> on page 2675 distribute-list <name> on page 2676 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2678 network <ip address> <subnet mask> on page 2679 passive-interface <interface> on page 2680 redistribute bgp on page 2681 redistribute connected on page 2682 redistribute ospf on page 2683 redistribute static on page 2684 timeout-timer <value> on page 2685 update-timer <value> on page 2686 version on page 2687
60000CRG0-35B
2672
auto-summary
Use the auto-summary command to have Routing Information Protocol (RIP) version 2 summarize subnets to the classful boundaries. Use the no form of this command to disable this summarization. Syntax Description
No subcommands.
Default Values
By default, auto-summary is disabled.
Command History
Release 3.1 Command was introduced.
Functional Notes
Use this command if you are subdividing a classful network into many subnets and these subnets are to be advertised over a slow link (64k or less) to a router that can only reach the classful network via the router you are configuring.
Usage Examples
The following example configures the router to not automatically summarize network numbers: (config)#router rip (config-rip)#no auto-summary
60000CRG0-35B
2673
default-metric <value>
Use the default-metric command to set the default metric value for the Routing Information Protocol (RIP). Use the no form of this command to return to the default setting. Syntax Description
<value> Sets the default metric value in Mbps. Range is 1 to 4294967295 Mbps.
Default Values
By default, this value is set at 0.
Command History
Release 3.1 Command was introduced.
Functional Notes
The metric value defined using the redistribute command overrides the default-metric commands metric setting. Refer to redistribute ospf on page 2683 for related information.
Usage Examples
The following example shows a router using both RIP and open shortest path first (OSPF) routing protocols. The example advertises OSPF-derived routes using RIP and assigns the OSPF-derived routes a RIP metric of 10. (config)#router rip (config-rip)#default-metric 10 (config-rip)#redistribute ospf
60000CRG0-35B
2674
distance <number>
Use the distance command to set the administrative distance for Routing Information Protocol (RIP) routes that are added to the route table. Use the no form of this command to set the RIP administrative distance to the default value. Syntax Description
<number> Specifies the new administrative distance. Range is 0 to 255.
Default Values
By default, the administrative distance for RIP routes is set to 120.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following configuration sets the administrative distance to 109, which gives RIP routes a lower administrative distance than open shortest path first (OSPF) routes: (config)#router rip (config-rip)#distance 109
Technical Review
Administrative distance is a feature that routers employ in order to select the most reliable path when there are two or more routes to the same destination from two different routing protocols. Administrative distance defines the reliability of a routing protocol by assigning a value (the smaller the value, the more trustworthy the protocol) that is then used by the router to organize routing protocols according to reliability.
60000CRG0-35B
2675
distribute-list <name>
Use the distribute-list command to add route filtering functionality by assigning inbound and outbound access control lists (ACLs) on either a per-interface or global basis. Only one inbound/outbound pair of ACLs can be configured for a particular interface. Use the no form of this command to disable the filtering. Variations of this command include:
distribute-list <name> in distribute-list <name> in <interface> distribute-list <name> out distribute-list <name> out <info source>
Syntax Description
<name> in in <interface> Specifies an ACL name. This is a standard IP ACL against which the contents of the incoming/outgoing routing updates are matched. Applies route filtering to inbound data. Optional. Specifies the interface in which to apply the ACL. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type distribute-list list1 in ? for a complete list of applicable interfaces. Applies route filtering to outbound data. Optional. Specifies the source of the routing information. The source can be an interface or a routing process (connected, ospf, rip, or static). Type distribute list <name> out ? for a list of available options.
Default Values
By default, distribute-list filtering is disabled.
Command History
Release 12.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
60000CRG0-35B
2676
Usage Examples
The following example filters out all network advertisements received via Ethernet interface 0/1 with the exception of the 10.10.10.0 network: (config)#router rip (config-rip)#version 2 (config-rip)#network 192.168.1.0 255.255.255.0 (config-rip)#distribute-list list_1 in eth 0/1 (config-rip)#exit (config)#ip access-list standard list_1 (config-std-nacl)#permit 10.10.10.0 0.0.0.255
60000CRG0-35B
2677
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#router rip (config-rip)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2678
<subnet mask>
Default Values
By default, RIP is not enabled.
Command History
Release 1.1 Command was introduced.
Functional Notes
AOS will only allow processing (sending and receiving) RIP messages on interfaces with IP addresses that are contained in the networks listed using this command. All RIP messages received on interfaces not listed using this command will be discarded. To allow for receiving and participating in RIP, but not for transmitting, use the passive-interface command (refer to passive-interface <interface> on page 2680).
Usage Examples
The following example enables RIP on the 102.22.72.252 /30, 192.45.2.0 /24, and 10.200.0.0 /16 networks: (config)#router rip (config-rip)#network 102.22.72.252 255.255.255.252 (config-rip)#network 192.45.2.0 255.255.255.0 (config-rip)#network 10.200.0.0 255.255.0.0
60000CRG0-35B
2679
passive-interface <interface>
Use the passive-interface command to disable the transmission of routing updates on the specified interface. Use the no form of this command to enable the transmission of routing updates on an interface. Syntax Description
<interface> Specifies an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type passive-interface ? for a complete list of valid interfaces.
Default Values
By default, Routing Information Protocol (RIP) is not enabled.
Command History
Release 1.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
Functional Notes
All routing updates received on that interface will still be processed (and advertised to other interfaces), but no updates will be transmitted to the network connected to the specified interface. Multiple passive-interface commands may be used to create a customized list of interfaces.
Usage Examples
The following example disables routing updates on the Frame Relay link (labeled 1.17) and the Point-to-Point Protocol (PPP) link (labeled 1): (config)#router rip (config-rip)#passive-interface frame-relay 1.17 (config-rip)#passive-interface ppp 1
60000CRG0-35B
2680
redistribute bgp
Use the redistribute bgp command to advertise routes from one protocol to another, regardless of the routing protocol implemented on the routing domain. Using the bgp keyword allows the propagation of Border Gateway Protocol (BGP) routes into Routing Information Protocol (RIP). Use the no form of this command to disable the propagation of the specified route type. Variations of this command include:
redistribute bgp redistribute bgp metric <value> redistribute bgp route-map <name>
Syntax Description
metric <value> route-map <name> Optional. Specifies the hop count to use for advertising redistributed BGP routes in RIP. Optional. Specifies the route map filter to use for advertising redistributed BGP routes in RIP.
Default Values
By default, this command is disabled.
Command History
Release 14.1 Command was introduced.
Functional Notes
Redistributing BGP routes imports those routes into RIP without the interfaces in question actually participating in RIP. The BGP routes imported this way are not covered by a network command and are learned via BGP. This allows RIP to distribute routes for networks that are not participating in this RIP network. If redistribute bgp is enabled and no metric value is specified, the value defaults to 0. The metric value defined using the redistribute bgp metric command overrides the default-metric commands metric setting. Refer to default-metric <value> on page 2674 for more information.
Usage Examples
The following example imports BGP routes into RIP: (config)#router rip (config-rip)#redistribute bgp
60000CRG0-35B
2681
redistribute connected
Use the redistribute connected command to pass routes from one network to another, regardless of the routing protocol implemented on the routing domain. Using the connected keyword allows the propagation of routes connected to other interfaces using the Routing Information Protocol (RIP). Use the no form of this command to disable the propagation of the specified route type. Variations of this command include:
redistribute connected redistribute connected metric <value> redistribute connected route-map <name>
Syntax Description
metric <value> route-map <name> Optional. Specifies the hop count to use for advertising redistributed routes in RIP. Optional. Specifies the route map filter to use for advertising redistributed routes in RIP.
Default Values
By default, this command is disabled.
Command History
Release 3.1 Release 14.1 Command was introduced. Command was expanded to include the route map filtering.
Functional Notes
Redistributing connected routes imports those routes into RIP without the interfaces in question actually participating in RIP. The connected routes imported this way are not covered by a network command and do not send/receive RIP traffic.
Usage Examples
The following example passes the connected routes found in the route table to other networks running the RIP routing protocol: (config)#router rip (config-rip)#redistribute connected
60000CRG0-35B
2682
redistribute ospf
Use the redistribute ospf command to advertise routes from one protocol to another, regardless of the routing protocol implemented on the routing domain. Using the ospf keyword allows the propagation of open shortest path first (OSPF) routes into Routing Information Protocol (RIP). Use the no form of this command to disable the propagation of the specified route type. Variations of this command include:
redistribute ospf redistribute ospf metric <value> redistribute ospf route-map <name>
Syntax Description
metric <value> route-map <name> Optional. Specifies the hop count to use for advertising redistributed OSPF routes in RIP. Optional. Specifies the route map filter to use for advertising redistributed OSPF routes in RIP.
Default Values
By default, this command is disabled.
Command History
Release 3.1 Release 14.1 Command was introduced. Command was expanded to include the route map filtering.
Functional Notes
Redistributing OSPF routes imports those routes into RIP without the interfaces in question actually participating in RIP. The OSPF routes imported this way are not covered by a network command and do not send/receive RIP traffic. This allows RIP to distribute routes for networks that are not participating in this RIP network. If redistribute ospf is enabled and no metric value is specified, the value defaults to 0. The metric value defined using the redistribute ospf metric command overrides the default-metric commands metric setting. Refer to default-metric <value> on page 2674 for more information.
Usage Examples
The following example imports OSPF routes into RIP: (config)#router rip (config-rip)#redistribute ospf
60000CRG0-35B
2683
redistribute static
Use the redistribute static command to pass routes from one network to another, regardless of the routing protocol implemented on the routing domain. Using the static keyword allows the propagation of static routes to other interfaces using the Routing Information Protocol (RIP). Use the no form of this command to disable the propagation of the specified route type. Variations of this command include:
redistribute static redistribute static metric <value> redistribute static route-map <name>
The gateway network for the static route must participate in RIP by using the network command for the gateway network.
Syntax Description
metric <value> route-map <name> Optional. Specifies the hop count to use for advertising redistributed static routes in RIP. Optional. Specifies the route map filter to use for advertising redistributed static routes in RIP.
Default Values
By default, this command is disabled.
Command History
Release 1.1 Release 14.1 Command was introduced. Command was expanded to include the route map filtering.
Functional Notes
Redistributing static routes allows other network devices to learn about routes without requiring manual input to each device on the network.
Usage Examples
The following example passes the static routes found in the route table to other networks running the RIP routing protocol: (config)#router rip (config-rip)#redistribute static
60000CRG0-35B
2684
timeout-timer <value>
Use the timeout-timer command to set the timeout timer value for a route when it is learned via Routing Information Protocol (RIP). Each time a RIP update for that route is received, the timeout timer is reset to this value. If no updates for that route are received in the specified number of seconds and the timeout timer expires, the route is considered invalid, and it will be removed from the route table. Use the no form of this command to return to the default setting. Syntax Description
<value> Sets the timeout timer value. Valid range is 5 to 4294967295 seconds.
Default Values
By default, this value is set at 180 seconds.
Command History
Release 11.1 Command was introduced.
Functional Notes
Note that the timeout timer value cannot be set to a value less than the update-timer value. It is recommended that this timer be set to a value that is three times the value of the update-timer (refer to update-timer <value> on page 2686).
Usage Examples
The following example configures the router to mark routes invalid if no RIP updates for those routes are received within 120 seconds: (config)#router rip (config-rip)#timeout-timer 120
60000CRG0-35B
2685
update-timer <value>
Use the update-timer command to set the value of the Routing Information Protocol (RIP) update interval timer. The RIP update interval is the number of seconds that must elapse between RIP update packet transmissions. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the number of seconds allowed to elapse between RIP update packet transmissions. Valid range is 5 to 4294967295 seconds.
Default Values
By default, this value is set at 30 seconds.
Command History
Release 11.1 Command was introduced.
Functional Notes
Note that the timeout-timer value cannot be set to a value less than the update-timer value. It is recommended that the timeout-timer be set to a value that is three times the value of the update-timer. (Refer to timeout-timer <value> on page 2685 for more information.)
Usage Examples
The following example sets the rate at which RIP update messages are transmitted from the router to 20 seconds. (config)#router rip (config-rip)#update-timer 20
60000CRG0-35B
2686
version
Use the version command to specify (globally) the Routing Information Protocol (RIP) version used on all IP interfaces. This global configuration is overridden using the configuration commands ip rip send version and ip rip receive version. Use the no form of this command to return to the default value. Variations of this command include:
version 1 version 2
Syntax Description
1 2 Specifies RIP version 1 be used globally. Specifies RIP version 2 be used globally.
Default Values
By default, RIP is not enabled.
Command History
Release 1.1 Command was introduced.
Usage Examples
The following example specifies RIP version 2 as the global RIP version: (config)#router rip (config-rip)#version 2
60000CRG0-35B
2687
60000CRG0-35B
2688
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the section listed below: do on page 69 exit on page 71
60000CRG0-35B
2689
All other commands in this command set are described in this section in alphabetical order: anti-spyware current on page 2691 anti-virus current on page 2692 auto-update current on page 2693 firewall enable on page 2694 security-update current on page 2695
60000CRG0-35B
2690
anti-spyware current
Use the anti-spyware current command to define the local desktop auditing policy to monitor clients antispyware status. If the antispyware is inactive, disabled, or not up-to-date, the client is a violator and its statistics will be collected. Using the no form of this command removes antispyware monitoring from the policy. Syntax Description
No subcommands.
Default Values
By default, desktop monitoring local policies monitor all NAP information for each client.
Command History
Release 17.8 Command was introduced.
Usage Examples
The following example specifies that the local policy will monitor clients antispyware status: (config)#desktop-auditing local-policy (desktop-audit-policy)#anti-spyware current
60000CRG0-35B
2691
anti-virus current
Use the anti-virus current command to define the local desktop auditing policy to monitor clients antivirus status. If the antivirus is inactive, disabled, or not up-to-date, the client is a violator and its statistics will be collected. Using the no form of this command removes antivirus monitoring from the policy. Syntax Description
No subcommands.
Default Values
By default, desktop monitoring local policies monitor all NAP information for each client.
Command History
Release 17.8 Command was introduced.
Usage Examples
The following example specifies that the local policy will monitor clients antivirus status: (config)#desktop-auditing local-policy (desktop-audit-policy)#anti-virus current
60000CRG0-35B
2692
auto-update current
Use the auto-update current command to define the local desktop auditing policy to monitor clients auto-update status. If the auto-updates are not configured to check for updates, download them, and install them automatically, then the client is a violator and its statistics will be collected. Using the no form of this command removes auto-update monitoring from the policy. Syntax Description
No subcommands.
Default Values
By default, desktop monitoring local policies monitor all NAP information for each client.
Command History
Release 17.8 Command was introduced.
Usage Examples
The following example specifies that the local policy will monitor clients auto-update status: (config)#desktop-auditing local-policy (desktop-audit-policy)#auto-update current
60000CRG0-35B
2693
firewall enable
Use the firewall enable command to define the local desktop auditing policy to monitor clients firewall states. If the firewall is disabled or inactive, the client is a violator and its statistics will be collected. Using the no form of this command removes firewall monitoring from the policy. Syntax Description
No subcommands.
Default Values
By default, desktop monitoring local policies monitor all NAP information for each client.
Command History
Release 17.8 Command was introduced.
Usage Examples
The following example specifies that the local policy will monitor clients firewall states: (config)#desktop-auditing local-policy (desktop-audit-policy)#firewall enable
60000CRG0-35B
2694
security-update current
Use the security-update current command to define the local desktop auditing policy to monitor clients security update status. If security updates are not current, the client is a violator and its statistics will be collected. Using the no form of this command removes security update monitoring from the policy. Syntax Description
No subcommands.
Default Values
By default, desktop monitoring local policies monitor all NAP information for each client.
Command History
Release 17.8 Command was introduced.
Usage Examples
The following example specifies that the local policy will monitor clients security update status: (config)#desktop-auditing local-policy (desktop-audit-policy)#security-update current
60000CRG0-35B
2695
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. bootfile <name> on page 2698 client-identifier <identifier> on page 2699 client-name <name> on page 2700 default-router on page 2701 dns-server on page 2702 domain-name <name> on page 2703 hardware-address on page 2704 host <ip address> on page 2706 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2707 lease <days> on page 2708 nap on page 2709 netbios-name-server on page 2710 netbios-node-type on page 2711 network on page 2712 next-server <ip address> on page 2713 next-server-file <name> on page 2714 ntp-server <ip address> on page 2715 option on page 2716 tftp-server <name> on page 2717 timezone-offset <value> on page 2718
60000CRG0-35B
2696
60000CRG0-35B
2697
bootfile <name>
Use the bootfile command to specify a fully qualified directory-path name to a file located on a Trivial File Transfer Protocol (TFTP) server on the network. Some network devices use the file (the path sent to the Dynamic Host Configuration Protocol (DHCP) client in the DHCPOFFER message) for initial configuration. Use the no form of this command to remove a configured boot file. Syntax Description
<name> Specifies a fully qualified directory-path name to the file located on the network. If the file is located in the root directory of the TFTP server, enter the file name only.
Default Values
By default, there is no specified boot file.
Command History
Release 2.1 Command was introduced.
Functional Notes
RFC 2131 provides specifications for DHCP servers to supply clients with information that allows the clients to exchange packets with other hosts on the network. DHCP clients that do not store the correct boot software on an internal flash drive can receive a boot file from a TFTP server. The AOS DHCP server can provide these devices with the address of the network TFTP server and the configuration file name. For example, some IP phones use this functionality to download the feature and key activation file. Use the command tftp-server <name> on page 2717 to specify the IP address of the network TFTP server. RFC 2131 includes provisions to allow DHCP servers to utilize the 128 octets designated for the boot file directory-path for expanding the DHCP options field. RFC 1533 outlines the available DHCP variables for the options field. This process must be negotiated between client and server during the DHCPDISCOVER process and should only take place if the client specifies a small maxDHCPmessage size in the DHCPDISCOVER message.
Usage Examples
The following example specifies the location of a TFTP server on the local area network (LAN) at 10.10.0.4 and a boot file of myconfig.cfg (located in the TFTP server root directory) for the DHCP pool IP_Phones: (config)#ip dhcp-server pool IP_Phones (config-dhcp)#tftp sever 10.10.0.4 (config-dhcp)#bootfile myconfig.cfg
60000CRG0-35B
2698
client-identifier <identifier>
Use the client-identifier command to specify a unique identifier (in dotted hexadecimal notation) for a Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to remove a configured client identifier. Syntax Description
<identifier> Specifies a client identifier using 7 to 28 hexadecimal characters with colon delimiters. Refer to the Functional Notes below for more information.
Default Values
No default values are necessary for this command.
Command History
Release 2.1 Command was introduced.
Functional Notes
DHCP clients use client identifiers in place of hardware addresses. To create the client identifier, begin with the two-digit numerical code representing the media type and append the clients medium access control (MAC) address. For example, a Microsoft client with an Ethernet (01) MAC address d2:17:04:91:11:50 uses a client identifier of 01:d2:17:04:91:11:50.
Usage Examples
The following example specifies the client identifier for a Microsoft client with an Ethernet MAC address of d217.0491.1150: (config)#ip dhcp-server pool Microsoft_Clients (config-dhcp)#client-identifier 01:d2:17:04:91:11:50
60000CRG0-35B
2699
client-name <name>
Use the client-name command to specify the name of a Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to remove the configured client name. Syntax Description
<name> Identifies the DHCP client (example is client1) using an alphanumeric string (up to 32 characters in length).
The specified client name should not contain the domain name.
Default Values
By default, there are no specified client names.
Command History
Release 2.1 Command was introduced.
Usage Examples
The following example specifies a client name of myclient: (config)#ip dhcp-server pool MyPool (config-dhcp)#client-name myclient
60000CRG0-35B
2700
default-router
Use the default-router command to specify the default primary and secondary routers to use for the Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to remove the configured router. Variations of this command include:
default-router <ip address> default-router <ip address> <secondary>
Syntax Description
<ip address> <secondary> Specifies the IP address of the preferred router on the clients subnet. Optional. Specifies the IP address of the second preferred router on the clients subnet. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
Default Values
By default, there are no specified default routers.
Command History
Release 2.1 Command was introduced.
Functional Notes
When specifying a router to use as the primary/secondary preferred router, verify that the listed router is on the same subnet as the DHCP client. AOS allows a designation for two routers, listed in order of precedence.
Usage Examples
The following example configures a default router with address 192.22.4.253 and a secondary router with address 192.22.4.254: (config)#ip dhcp-server pool MyPool (config-dhcp)#default-router 192.22.4.253 192.22.4.254
60000CRG0-35B
2701
dns-server
Use the dns-server command to specify the default domain naming system (DNS) servers (up to four servers) to use for the Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to remove the configured DNS server. Variations of this command include:
dns-server <ip address> dns-server <ip address> <second> dns-server <ip address> <second> <third> dns-server <ip address> <second> <third> <fourth>
Syntax Description
<ip address> <second> <third> <fourth> Specifies the IP address of the preferred DNS server on the network. Optional. Specifies the IP address of the second preferred DNS server on the network. Optional. Specifies the IP address of the third preferred DNS server on the network. Optional. Specifies the IP address of the fourth preferred DNS server on the network. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
Default Values
By default, there are no specified default DNS servers.
Command History
Release 2.1 Release 4.1 Release 17.3 Command was introduced. Command was expanded to include the Internet key exchange (IKE) client configuration pool. Command was expanded to include a third and fourth DNS server listing.
Usage Examples
The following example specifies a default DNS server with address 192.72.3.254 and a secondary DNS server with address 192.100.4.253: (config)#ip dhcp-server pool MyPool (config-dhcp)#dns-server 192.72.3.254 192.100.4.253
60000CRG0-35B
2702
domain-name <name>
Use the domain-name command to specify the domain name for the Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to remove the configured domain name. Syntax Description
<name> Identifies the DHCP client (e.g., adtran.com) using an alphanumeric string (up to 32 characters in length).
Default Values
By default, there are no specified domain names.
Command History
Release 2.1 Command was introduced.
Usage Examples
The following example specifies a domain name of adtran.com: (config)#ip dhcp-server pool MyPool (config-dhcp)#domain-name adtran.com
60000CRG0-35B
2703
hardware-address
Use the hardware-address command to specify the name of a Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to remove the configured client name. Variations of this command include:
hardware-address <mac address> hardware-address <mac address> <type> hardware-address <mac address> ethernet hardware-address <mac address> ieee802
Syntax Description
<mac address> Specifies a valid 48-bit medium access control (MAC) address. MAC addresses should be expressed in the following format xx:xx:xx:xx:xx:xx (for example, 00:A0:C8:00:00:01). Optional. Specifies one of the hardware types listed in RFC 1700. Valid range is 1 to 21. The valid hardware types are as follows: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ethernet ieee802 10 Mb Ethernet Experimental 3 Mb Ethernet Amateur Radio AX.25 Proteon ProNET Token Ring Chaos IEEE 802 Networks ARCNET Hyperchannel Lanstar Autonet Short Address LocalTalk LocalNet (IBM PCNet or SYTEK LocalNet) Ultra link SMDS Frame Relay Asynchronous Transfer Mode (ATM) High Level Data Link Control (HDLC) Fibre Channel Asynchronous Transfer Mode Serial Line Asynchronous Transfer Mode
<type>
Optional. Specifies standard Ethernet networks. Optional. Specifies IEEE 802 standard networks.
60000CRG0-35B
2704
Default Values
By default, the hardware address type is set to 10 Mbps Ethernet (1).
Command History
Release 2.1 Command was introduced.
Usage Examples
The following example specifies an Ethernet client with a MAC address of ae:11:54:60:99:10: (config)#ip dhcp-server pool MyPool (config-dhcp)#hardware-address ae:11:54:60:99:10 ethernet
60000CRG0-35B
2705
Syntax Description
<ip address> Specifies the IP address for a manual binding to a DHCP client. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the subnet mask that corresponds to a range of IP addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). If the subnet mask is left unspecified, the DHCP server examines its address pools to obtain an appropriate mask. If no valid mask is found in the address pools, the DHCP server uses the Class A, B, or C natural mask.
<subnet mask>
Default Values
By default, there are no specified host addresses.
Command History
Release 2.1 Command was introduced.
Usage Examples
The following examples show two different ways to specify a client with IP address 12.200.5.99 and a 21-bit subnet mask: (config)#ip dhcp-server pool MyPool (config-dhcp)#host 12.200.5.99 255.255.248.0 or (config)#ip dhcp-server pool MyPool (config-dhcp)#host 12.200.5.99 /21
60000CRG0-35B
2706
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#ip dhcp-server pool MyPool (config-dhcp)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2707
lease <days>
Use the lease command to specify the duration of the lease for an IP address assigned to a Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to return to the default lease value. Variations of this command include:
lease <days> lease <days> <hours> lease <days> <hours> <minutes>
Syntax Description
<days> <hours> <minutes> Specifies the duration of the IP address lease in days. Optional. Specifies the number of hours in a lease. You may only enter a value in the hours field if the days field is specified. Optional. Specifies the number of minutes in a lease. You may only enter a value in the minutes field if the days and hours fields are specified.
Default Values
By default, an IP address lease is one day.
Command History
Release 2.1 Command was introduced.
Usage Examples
The following example specifies a lease of 2 days: (config)#ip dhcp-server pool MyPool (config-dhcp)#lease 2 The following example specifies a lease of 1 hour: (config)#ip dhcp-server pool MyPool (config-dhcp)#lease 0 1 The following example specifies a lease of 30 minutes: (config)#ip dhcp-server pool MyPool (config-dhcp)#lease 0 0 30
60000CRG0-35B
2708
nap
Use the nap command to enable network access protection (NAP) advertisements for the Dynamic Host Configuration Protocol (DHCP) server pools of AOS units that are operating as DHCP servers. Use the no form of this command to disable NAP advertisements on the server pool. Syntax Descriptions
No subcommands.
Default Values
By default, NAP advertisements are disabled on DHCP server pools.
Command History
Release 17.8 Command was introduced.
Functional Notes
This command is used if your AOS unit is functioning as a DHCP server and you want DHCP server pools to advertise that they are NAP compatible because you are using desktop auditing. Desktop auditing is an AOS feature that collects NAP information through NAP messages sent in DHCP messages between clients connected to the network and the network server. Desktop auditing is configured by enabling the feature (using the command desktop-auditing dhcp on page 873) and by configuring filters to limit the output of the collected NAP information. Information is limited by specifying local desktop auditing policies. The configuration of these policies is outlined in Desktop Auditing Local Policy Command Set on page 2689. For more information about desktop auditing, refer to the Configuring Desktop Auditing in AOS configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example enables NAP advertisements on the DHCP server pool MyPool: (config)#ip dhcp-server pool MyPool (config-dhcp)#nap
60000CRG0-35B
2709
netbios-name-server
Use the netbios-name-server command to specify the primary and secondary network basic input/output system (NetBIOS) Windows Internet Naming Service (WINS) name servers available for use by the Dynamic Host Configuration Protocol (DHCP) clients. Use the no form of this command to remove a configured NetBIOS name server. Variations of this command include:
netbios-name-server <ip address> netbios-name-server <ip address> <secondary>
Syntax Description
<ip address> <secondary> Specifies the IP address of the preferred NetBIOS WINS name server on the network. Optional. Specifies the IP address of the second preferred NetBIOS WINS name server on the network. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
Default Values
By default, there are no configured NetBIOS WINS name servers.
Command History
Release 2.1 Command was introduced.
Usage Examples
The following example specifies a primary NetBIOS WINS name server with an IP address of 172.45.6.99 and a secondary with an IP address of 172.45.8.15: (config)#ip dhcp-server pool MyPool (config-dhcp)#netbios-name-server 172.45.6.99 172.45.8.15
60000CRG0-35B
2710
netbios-node-type
Use the netbios-node-type command to specify the type of network basic input/output system (NetBIOS) node used with Dynamic Host Configuration Protocol (DHCP) clients. Use the no form of this command to remove a configured NetBIOS node type. Variations of this command include:
netbios-node-type <value> netbios-node-type b-node netbios-node-type h-node netbios-node-type m-node netbios-node-type p-node
Syntax Description
<value> b-node h-node m-node p-node Specifies the NetBIOS node type using the numerical value. Refer to the node types below for the corresponding numerical values. Specifies the broadcast node. Numeric value is 1. Specifies the hybrid node (recommended). Numeric value is 8. Specifies the mixed node. Numeric value is 4. Specifies the peer-to-peer node. Numeric value is 2.
Default Values
By default, the netbios-node-type is set to h-node (hybrid node, numeric value 8).
Command History
Release 2.1 Command was introduced.
Usage Examples
The following example specifies a clients NetBIOS node type as h-node: (config)#ip dhcp-server pool MyPool (config-dhcp)#netbios-node-type h-node Alternately, the following also specifies the clients NetBIOS node type as h-node: (config-dhcp)#netbios-node-type 8
60000CRG0-35B
2711
network
Use the network command to specify the subnet number and mask for an AOS Dynamic Host Configuration Protocol (DHCP) server address pool. Use the no form of this command to remove a configured subnet. Variations of this command include:
network <ip address> network <ip address> <subnet mask>
Syntax Description
<ip address> <subnet mask> Specifies the IP address of the DHCP address pool. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the subnet mask that corresponds to a range of IP addresses (network) or a specific host. Subnet masks can be expressed in dotted decimal notation (for example, 255.255.255.0) or as a prefix length (for example, /24). If the subnet mask is left unspecified, the DHCP server uses the Class A, B, or C natural mask.
Default Values
By default, there are no configured DHCP address pools.
Command History
Release 2.1 Command was introduced.
Usage Examples
The following examples show two different ways to configure an address pool subnet of 192.34.0.0 with a 16-bit subnet mask: (config)#ip dhcp-server pool MyPool (config-dhcp)#network 192.34.0.0 255.255.0.0 or (config)#ip dhcp-server pool MyPool (config-dhcp)#network 192.34.0.0 /16
60000CRG0-35B
2712
Default Values
By default, no next server is defined.
Command History
Release 18.1 Command was introduced.
Functional Notes
This command specifies a different element of a DHCPOFFER message than what is specified using the tftp-server command.
Usage Examples
The following example specifies the IP address presented in the SIADDR field of the BOOTP header of the DHCP offer packet: (config)#ip dhcp-server pool MyPool (config-dhcp)#next-server 192.168.1.1
60000CRG0-35B
2713
next-server-file <name>
Use the next-server-file command to specify the file name presented in the boot file name field in the Bootstrap Protocol (BOOTP) header of the DHCPOFFER message. This file name is generally located on the next-server, the address of which is specified by the server Internet Protocol (IP) address (SIADDR) field presented in the BOOTP header. Use the no form of this command to remove a configured next server file. Syntax Description
<file name> Specifies the name of the file presented in the BOOTP header.
Default Values
By default, no next server file is configured.
Command History
Release 18.1 Command was introduced.
Functional Notes
This command specifies a different element of a DHCPOFFER message than what is specified using the bootfile command.
Usage Examples
The following example specifies test.cfg as the file presented in the BOOTP header: (config)#ip dhcp-server pool MyPool (config-dhcp)#next-server-file test.cfg
60000CRG0-35B
2714
Default Values
By default, no NTP server is defined.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example specifies the IP address of the NTP server: (config)#ip dhcp-server pool MyPool (config-dhcp)#ntp-server 192.168.1.1
60000CRG0-35B
2715
option
Use the option command to describe a generic Dynamic Host Configuration Protocol (DHCP) option to be published to the client. The user may specify any number of generic options to be published to the client. Use the no form of this command to return to the default value. Variations of this command include:
option <option value> ascii <value> option <option value> hex <value> option <option value> ip <value>
Syntax Description
<option value> ascii hex ip <value> Specifies the value of the generic DHCP option published to the client. Range is 0 to 255. Specifies the DHCP option information in ASCII format. Specifies the DHCP option information in hexadecimal format. Specifies the DHCP option information in IP format. Specifies the ASCII, hexadecimal, or IP value. The value for ascii is simple text. The value for hex is an 8-digit hexadecimal number (32 bit). The value for ip is an IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
Default Values
No default values are necessary for this command.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example publishes DHCP options to the client: (config)#ip dhcp-server pool MyPool (config-dhcp)#option 100 ascii ascii_value (config-dhcp)#option 101 hex AB458E80 (config-dhcp)#option 102 ip 192.168.1.1
60000CRG0-35B
2716
tftp-server <name>
Use the tftp-server command to specify the IP address or domain naming system (DNS) name of the Trivial File Transfer Protocol (TFTP) server published to the client. Use the no form of this command to remove a defined TFTP server. Syntax Description
<name> Specifies the DNS name or dotted decimal notation IP address of the server.
Default Values
By default, no TFTP server is defined.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example specifies the IP address of the TFTP server: (config)#ip dhcp-server pool MyPool (config-dhcp)#tftp-server 192.168.1.1 The following example specifies the DNS name of the TFTP server: (config)#ip dhcp-server pool MyPool (config-dhcp)#tftp-server MyServer.adtran.com
60000CRG0-35B
2717
timezone-offset <value>
Use the timezone-offset command to specify the time zone adjustment (in hours) published to the client. Use the no form of this command to remove a time zone offset. Syntax Description
<value> Specifies the time zone adjustment (in hours) published to the client. Use an integer from -12 to 12 hours.
Default Values
No default values are necessary for this command.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example sets the time zone adjustment for the client to -3 hours. For example, if the server time is configured for Eastern time and the client is configured for Pacific time, you can set the client time zone adjustment to -3 hours: (config)#ip dhcp-server pool MyPool (config-dhcp)#timezone-offset -3
60000CRG0-35B
2718
vrf <name>
Use the vrf command to associate a Dynamic Host Configuration Protocol (DHCP) address pool with a specific VPN routing and forwarding (VRF) instance. An address pool can only be assigned to one VRF, but a VRF can have multiple address pools providing addresses for it. Use the no form of this command to remove the association with the named VRF instance and assign the address pool to the default (unnamed) VRF. Keep in mind that associating a DHCP address pool with a nondefault VRF will clear all previously configured settings for the address pool.
Syntax Description
<name> Specifies the name of the VRF to associate with the DHCP address pool.
Default Values
By default, DHCP address pools are associated with the default unnamed VRF.
Command History
Release 17.1 Command was introduced.
Functional Notes
VRF instances must be created first before a DHCP address pool can be assigned. An address pool can only be assigned to one VRF, but multiple address pools can be assigned to the same VRF. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example creates a DHCP address pool named PRIVATE and assigns it to the VRF instance named RED: (config)#ip dhcp-server pool PRIVATE (config-dhcp)#vrf RED WARNING!!! All settings for this pool have been removed (config-dhcp)#network 10.22.199.0 255.255.255.0
60000CRG0-35B
2719
Once Ethernet OAM CFM is enabled, you must create a maintenance domain using the ethernet cfm domain <name> level <level> command (refer to ethernet cfm domain on page 880). This command is entered from the Global Configuration mode prompt, and enters the maintenance domain configuration. Enter the command as follows:
>enable #configure terminal (config)#ethernet cfm domain domain1 level 6 (config-ecfm-domain)#
60000CRG0-35B
2720
After entering the MD Configuration mode, you can access the MA Configuration mode, the MEP Configuration mode, and the Interface Configuration mode. The following command set describes commands common to all CFM Configuration modes, as well as those specific to maintenance association (MA), MEP, or Interface configurations. For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013). The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 exit on page 71 interface on page 72 The following commands are MD configuration commands: association <name> on page 2722 remote-mep hold-time <minutes> on page 2723 The association <name> command, as described in the MD configuration command section, creates an MA and enters the MA Configuration mode. The following commands are MA configuration commands: ccm interval on page 2724 component <component> vlan on page 2725 mep-validation on page 2727 remote-mep <mep id> on page 2729 The component command, as described in the MA configuration command section, creates a component and enters the Component Configuration mode. The following commands are component configuration commands: mp-sender-id on page 2730 Ethernet OAM CFM can also be configured at the interface level. CFM must be enabled and an MEP must be created at the interface level using the commands ethernet-cfm down on page 1472 and ethernet-cfm mep on page 1473 from the Ethernet or Ethernet subinterfaces. Once CFM is enabled and the MEP is created at the interface level, the MEP can be configured using the following commands: alarm-priority-level on page 2731 alarm timers <alarm time> <reset time> on page 2733 ccm-enabled on page 2734 mep-enabled on page 2735 priority <value> on page 2736 snmp-trap fault alarm on page 2737
60000CRG0-35B
2721
association <name>
Use the association command to create, enable, and enter the configuration of an Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) maintenance association (MA). Use the no form of this command to remove the association and its association maintenance endpoints (MEPs). Syntax Description
<name> Specifies the name of the MA. Names can be up to 42 characters in length.
Default Values
By default, no MAs exist.
Command History
Release 17.4 Command was introduced.
Functional Notes
For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example enables and creates MA association1 from the Maintenance Domain (MD) Configuration mode, and enters the MA Configuration mode: (config)#ethernet cfm domain domain1 level 6 (config-ecfm-domain)#association association1 (config-ecfm-assoc)#
60000CRG0-35B
2722
Default Values
By default, MEPs remain in the MDs MEP database for 100 minutes.
Command History
Release 17.4 Command was introduced.
Functional Notes
Each MEP that is created is associated with a particular MD. The MDs maintain an MEP database of remote MEPs, listing all configured and associated remote MEPs within the system. When a remote MEP fails, it can be removed from this database after a specified amount of time. When the remote MEP entry is purged, any errors logged relating to the remote MEP are also purged. For more information regarding Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example specifies that remote MEP entries are purged from the MDs remote MEP database after 60 minutes: (config)#ethernet cfm domain domain1 level 6 (config-ecfm-domain)#remote-mep hold-time 60 (config-ecfm-domain)#
60000CRG0-35B
2723
ccm interval
Use the ccm interval command to specify how frequently maintenance endpoints (MEPs) of this association send continuity check messages (CCMs). Use the no form of this command to return to the default value. Variations of this command include:
ccm interval 100ms ccm interval 1s ccm interval 10s ccm interval 1m ccm interval 10m
Syntax Description
100ms 1s 10s 1m 10m Specifies the interval as 100 milliseconds. Specifies the interval as 1 second. Specifies the interval as 10 seconds. Specifies the interval as 1 minute. Specifies the interval as 10 minutes.
Default Values
By default, the continuity check message (CCM) interval is set to 1 second.
Command History
Release 17.4 Command was introduced.
Functional Notes
For more information regarding Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example sets the CCM interval to 1 minute: (config-ecfm-domain)#association association1 (config-ecfm-assoc)#ccm interval 1m (config-ecfm-assoc)#
60000CRG0-35B
2724
Syntax Description
<component> Specifies the component to be added to the MA. Components are specified in the form <component type [slot/port]>. For example, for an Ethernet component, use eth 0/1. To discover available components, enter component ? at the prompt. Specifies that this MA component is not attached to a virtual local area network (VLAN). Specifies to which VLAN this MA component is attached. VLAN IDs range from 1 to 4094.
Default Values
By default, no component is defined.
Command History
Release 17.4 Command was introduced.
Functional Notes
At least one component must be added to each MA. The components and VLANs are associated so that the VLANs are protected by the MA to which the component belongs. The first VLAN ID listed is the primary VLAN ID for the entry being created.
A component must be configured on a VLAN before you can configure its associated maintenance endpoint (MEP).
For more information regarding Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
60000CRG0-35B
2725
Usage Examples
The following example configures an Ethernet component that is associated with vlan 5, and enters the Component Configuration mode: (config-ecfm-domain)#association association1 (config-ecfm-assoc)#component ethernet 0/1 vlan 5 (config-ecfm-ma-comp)#
60000CRG0-35B
2726
mep-validation
Use the mep-validation command to specify whether or not maintenance endpoints (MEPs) use a comparison between their continuity check message (CCM) database (received CCMs) and their list of configured remote MEPs (that should be sending CCMs) to generate an alarm when a mismatch is discovered. The no form of this command disables MEP validation. Variations of this command include:
mep-validation mep-validation start-delay <delay>
Syntax Description
start-delay <delay> Optional. Specifies a delay (in seconds) that the MEP will wait before enforcing MEP validation. Delay range is 1 to 65535 seconds.
Default Values
By default, MEP validation is enabled with a delay of 30 seconds.
Command History
Release 17.4 Command was introduced.
Functional Notes
The MEP validation is used to compare an MEPs list of received CCMs with a list of MEPs that should be sending CCMs. When MEP validation is enabled, an alarm is sent when a mismatch is discovered. By default, each MEP validates their MEP list, and all CCMs received must correspond to preconfigured remote MEPs in the maintenance association (MA). Disabling validation (using the no form of the command), or changing the start delay, can be useful when creating a domain association or when troubleshooting. Disabling validation in these circumstances prevents unnecessary alarms and warnings. For example, if you wish to allow the unit to dynamically learn its remote MEPs rather than manually entering them, disabling validation allows you to do that without generating unnecessary alarms. For more information regarding Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example disables MEP validation: (config-ecfm-domain)#association association1 (config-ecfm-assoc)#no mep-validation (config-ecfm-assoc)#
60000CRG0-35B
2727
Command Reference Guide The following example changes the delay interval to 1000 seconds: (config-ecfm-domain)#association association1 (config-ecfm-assoc)#mep-validation start-delay 1000 (config-ecfm-assoc)#
60000CRG0-35B
2728
Default Values
By default, no remote MEPs are listed.
Command History
Release 17.4 Command was introduced.
Functional Notes
Using the remote-mep command populates the maintenance associations (MAs) remote MEP list. Remote MEPs are MEPs not on this device, but communicate with other MEPs in the same MA. Local MEPs, or those on the same device, are automatically listed. Each MEP ID is stored and can be compared to the MEPs continuity check message (CCM) database learned by listening to CCMs from other MEPs in the network. This allows each MEP to determine if it is receiving CCMs from expected MEPs, as well as detect any unexpected MEPs in the network.
You will need to repeat this command as many times as necessary to populate the MAs remote MEP list with all of the remote MEPs in your network.
For more information regarding Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example adds the remote MEP with the MEP ID of 1000 to this associations remote MEP list: (config-ecfm-domain)#association association1 (config-ecfm-assoc)#remote-mep 1000 (config-ecfm-assoc)#
60000CRG0-35B
2729
mp-sender-id
Use the mp-sender-id command to enable each maintenance endpoint (MEP) in this association to send sender ID type length values (TLVs) in transmitted packets. Use the no form of this command to revert the sender ID setting to that of the parent association. Variations of this command include:
mp-sender-id chassis-id mp-sender-id chassis-id management-address mp-sender-id management-address mp-sender-id management-address chassis-id mp-sender-id none
Syntax Description
chassis-id management-address none Specifies that the chassis IDs are transmitted. Specifies that management addresses are transmitted. Specifies that no sender ID is transmitted.
Default Values
By default, the MEPs sender ID setting is the same as that of the parent association.
Command History
Release 17.4 Command was introduced.
Functional Notes
TLVs are included in continuity check messages (CCMs) and used in Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) fault detection. It is important to note how the chassis ID and management address are created for the system. The chassis ID is created either from Simple Network Management Protocol (SNMP), using the command snmp-server chassis-id <string> on page 1205, or if SNMP is not configured, using the system medium access control (MAC) address. The management address is created either from SNMP through the primary IP of the source interface shown in the command snmp-server source-interface <interface> on page 1220, or if SNMP is not configured, using the primary IP of the MEPs interface. For more information regarding Ethernet OAM CFM and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example specifies that MEPs in this association include their chassis ID in the sender ID TLVs: (config-ecfm-domain)#association association1 (config-ecfm-ma-comp)#mp-sender-id chassis-id (config-ecfm-ma-comp)#
60000CRG0-35B
2730
alarm-priority-level
Use the alarm-priority-level command to configure the lowest level priority condition that generates an alarm on this maintenance endpoint (MEP). Use the no form of this command to return to the default priority condition. Variations of this command include:
alarm-priority-level errorccm alarm-priority-level macstatus alarm-priority-level none alarm-priority-level rdi-ccm alarm-priority-level remoteccm alarm-priority-level xconccm
Syntax Description
errorccm macstatus none rdi-ccm remoteccm xconccm Specifies that priority conditions of 4 or higher generate alarms. Specifies that priority conditions of 2 or higher generate alarms. Specifies that no priority conditions generate alarms. Specifies that priority conditions of 1 or higher generate alarms. Specifies that priority conditions of 3 or higher generate alarms. Specifies that priority conditions of 5 or higher generate alarms.
Default Values
By default, priority conditions of 1 or higher generate alarms.
Command History
Release 17.4 Command was introduced.
Functional Notes
Alarm notifications are sent either by using the AOS event priority system or through Simple Network Management Protocol (SNMP) notification. The alarms are sent as priority 1 (error), and cleared alarms are sent as priority 3 (notice). SNMP notification of alarms are sent to the fault alarm address configured on the MEP reporting the fault. No SNMP notification is sent when an alarm clears. You can specify using SNMP notification for alarms by using the command snmp-trap fault alarm on page 2737. For more information regarding Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
60000CRG0-35B
2731
The following table describes the five Ethernet OAM CFM defect conditions, as well as the root cause, the priority, and the importance of each. Defect
DefXconCCM
Description
Indicates an MEP that could be from another MA is sending CCMs to an MEP in this MA.
Cause(s)
The CCM received is from an MEP that does not have a MAID that matches the local MEPs MAID, or that the transmitting MEP has an MD level lower than the local MEPs. The transmitting MEPs ID is not in the MAs configured list of remote MEPs, the MEP ID is not the same as the receiving MEPs ID, or the CCM interval does not match the configured value. An MEP in this MEPs configured list has not sent a CCM in three CCM intervals. Either all remote MEPs are reporting Port Status TLV errors, or at least one remote MEP is reporting an Interface Status TLV error.
Priority
5
Importance
Highest
DefErrorCCM
Indicates erroneous CCMs are being received from some MEP in the local MEPs MA.
DefRemoteCCM
Indicates the local MEP is not receiving CCMs from an MEP in its configured list. Indicates the last CCM received by this MEP from another MEP indicated the other MEPs associated MAC is reporting an error status via the Port or Interface Status TLV. Indicates the last CCM received by this MEP from some remote MEP contained the remote defect indication (RDI) bit.
DefMACStatus
DefRDICCM
Lowest
Usage Examples
The following example specifies that events of a priority 3 or higher generate alarms: (config-eth 0/1)#ethernet-cfm mep Domain1 association1 100 down (config-eth 0/1-mep)#alarm-priority-level remoteccm (config-eth 0/1-mep)#
60000CRG0-35B
2732
Default Values
By default, the alarm time is 2500 ms and the reset time is 10000 ms.
Command History
Release 17.4 Command was introduced.
Functional Notes
Timer values are stored in 1/1000 of a second. Therefore, entering the command as follows: alarm timers 2514 10239 stores the timer values as 2510 and 10230. Defect conditions are the problems detected by Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM). These conditions are detailed in the Functional Notes section of the alarm-priority-level command. For more information on defect conditions and Ethernet OAM CFM in general, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example specifies that the alarm time is 3000 ms and the reset time is 6000 ms for this MEPs alarm timers: (config-eth 0/1)#ethernet-cfm mep Domain1 association1 100 down (config-eth 0/1-mep)#alarm timers 3000 6000 (config-eth 0/1-mep)#
60000CRG0-35B
2733
ccm-enabled
Use the ccm-enabled command to enable maintenance endpoint (MEP) continuity check message (CCM) transmissions. Use the no form of this command to disable CCM transmissions on the MEP. Syntax Description
No subcommands.
Default Values
By default, CCM transmissions are disabled.
Command History
Release 17.4 Command was introduced.
Functional Notes
Even when CCM transmissions are disabled, the MEP can still process received CCMs. For more information regarding Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) and its operation on AOS products, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example enables CCM transmissions on the MEP: (config-eth 0/1)#ethernet-cfm mep Domain1 association1 100 down (config-eth 0/1-mep)#ccm-enabled (config-eth 0/1-mep)#
60000CRG0-35B
2734
mep-enabled
Use the mep-enabled command to enable the maintenance endpoint (MEP) and all the MEPs in its association. Use the no form of this command to halt all associated MEP functionality for this MEP. Syntax Description
No subcommands.
Default Values
By default, all MEPs are disabled.
Command History
Release 17.4 Command was introduced.
Functional Notes
When an MEP is disabled, no frames are sent or received by the MEP, but all other configuration properties are retained. For more information regarding Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM), refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example enables an MEP: (config-eth 0/1)#ethernet-cfm mep Domain1 association1 100 down (config-eth 0/1-mep)#mep-enabled (config-eth 0/1-mep)#
60000CRG0-35B
2735
priority <value>
Use the priority command to specify the 802.1p priority given to Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) frames and linktrace messages transmitted by the maintenance endpoint (MEP). Use the no form of this command to return the priority to the default value. Syntax Description
<value> Specifies the priority. Range is 0 to 7.
Default Values
By default, the priority value is 7.
Command History
Release 17.4 Command was introduced.
Functional Notes
Priority only applies to CFM frames if the MEPs interface supports virtual local area network (VLAN) tags and the message will be sent with a tag. For more information regarding Ethernet OAM CFM, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example specifies a priority of 3 for CFM frames and linktrace messages transmitted by this MEP: (config-eth 0/1)#ethernet-cfm mep Domain1 association1 100 down (config-eth 0/1-mep)#priority 3 (config-eth 0/1-mep)#
60000CRG0-35B
2736
Default Values
By default, SNMP fault alarm notification is disabled.
Command History
Release 17.4 Command was introduced.
Functional Notes
SNMP notification is an alternate method to configuring and receiving Ethernet operations, administration, and maintenance (OAM) connectivity fault management (CFM) alarm notifications through the AOS event priority system. SNMP notifications of alarms are sent to the fault alarm address configured on the MEP reporting the fault. No SNMP notification is sent when an alarm clears. For more information regarding Ethernet OAM CFM, refer to the Ethernet OAM CFM in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3013).
Usage Examples
The following example enables SNMP notification for alarm notifications from this MEP: (config-eth 0/1)#ethernet-cfm mep Domain1 association1 100 down (config-eth 0/1-mep)#snmp-trap fault alarm (config-eth 0/1-mep)#
60000CRG0-35B
2737
60000CRG0-35B
2738
Once the access map has been created and associated with a hardware ACL, it must be applied to a virtual local area network (VLAN) for the ACL to be fully functional. Access maps can be applied to a single VLAN or a range of VLANs, however, only one access map can be applied to a VLAN at a time. To create an IP hardware ACL and enter the ACLs configuration, enter the command ip hw-access-list extended <name> on page 958 from the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#ip hw-access-list extended Trusted Configuring New IP Hardware Extended ACL Trusted (config-ext-ip-hw-nacl)#
To create a MAC hardware ACL and enter the ACLs configuration, enter the command mac hw-access-list extended <name> on page 1148 from the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#mac hw-access-list extended Untrusted Configuring New MAC Hardware Extended ACL Untrusted (config-ext-mac-hw-nacl)#
To create a hardware access map and enter the maps configuration, enter the command hw-access-map <name> on page 892 from the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#hw-access-map Map1 (config-hw-access-map)#
Technology Review
Hardware access maps and ACLs regulate traffic through the routed network. When designing your traffic flow configuration, it is important to keep the following in mind: A hardware ACL serves as a traffic selector, defining exactly which frames should take the given action. A hardware access map defines the action to take on the frames selected by the ACL. A hardware ACL is inactive until it is assigned to an active hardware access map. A hardware access map is inactive until it is assigned to a VLAN interface.
For more information on both hardware ACLs and hardware access maps, refer to the Hardware ACLs in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 3088). The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65
60000CRG0-35B
2739
The following are commands used to configure an IP hardware ACL. IP hardware ACL configuration includes creating a remark for the ACL, specifying an ACL action, a protocol, a packet source, a source port, a packet destination, and a destination port. These commands are described in this section in alphabetical order: deny <protocol> <source> <source port> <destination> <destination port> on page 2741 permit <protocol> <source> <source port> <destination> <destination port> on page 2743 remark <text> on page 2745 The following are commands used to configure a MAC hardware ACL. MAC hardware ACL configuration includes creating a remark for the ACL, specifying the ACL action, a source MAC address, and a destination MAC address. These commands are described in this section in alphabetical order: deny mac <source> <destination> on page 2746 permit mac <source> <destination> on page 2748 remark <text> on page 2745 The following are commands used to configure a hardware access map. Access map configuration includes specifying which hardware ACL(s) the map will use and the relationship between those ACLs, and applying the access map to a VLAN or VLANs. These commands are described in this section in alphabetical order: forward ip <acl name> on page 2750 forward mac <acl name> on page 2752 vlans <vlan id> on page 2754
60000CRG0-35B
2740
Syntax Description
<protocol> <source> Specifies the data protocol as ip, tcp, or udp. Specifies the source used for packet matching. Sources can be expressed in one of three ways: 1. Using the keyword any to match any IP address. 2. Using host <ip address> to specify a single host address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). 3. Using the <ip address> <wildcard mask> format to match all IP addresses in a range. The wildcard mask corresponds to a range of IP addresses (network) or a specific host. Wildcard masks are expressed in dotted decimal notation (for example, 0.0.0.255). <source port> Optional. The source port is used only when <protocol> is tcp or udp. The following keywords and port numbers/names are supported for the <source port> field: eq <port> range <min> <max> Matches only packets equal to the specified port number. Range is 0 to 65535. Matches only packets that contain a port number in the specified range. Range is 0 to 65535.
<destination>
Specifies the destination used for packet matching. Destinations can be expressed in one of three ways: 1. Using the keyword any to match any IP address. 2. Using host <ip address> to specify a single host address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). 3. Using the <ip address> <wildcard mask> format to match all IP addresses in a range. The wildcard mask corresponds to a range of IP addresses (network) or a specific host. Wildcard masks are expressed in dotted decimal notation (for example, 0.0.0.255).
<destination port>
Optional. The destination port is used only when <protocol> is tcp or udp. The following keywords and port numbers are supported for the <destination port> field: eq <port> Matches only packets equal to the specified port number. Range is 0 to 65535.
60000CRG0-35B
2741
Hardware ACLs and Hardware Access Maps Matches only packets that contain a port number in the specified range. Range is 0 to 65535.
log
Optional. Enables logging of any packets that match the hardware ACL entry. These are the logs that appear in the command debug hw-access-list <name> on page 246.
Default Values
By default, all AOS security features are disabled, and there are no configured hardware ACLs.
Command History
Release 17.6 Command was introduced.
Functional Notes
Hardware ACLs are used as frame selectors by the hardware access maps; by themselves they do nothing. Hardware ACLs are composed of an ordered list of entries with an implicit deny any at the end of each list. A hardware ACL with no entries includes an implicit permit any. An ACL entry contains two parts: an action (permit or deny) and a frame pattern. A permit ACL matches frames (meeting the specified pattern) and allows them to enter the network. A deny ACL advances AOS to the next ACL entry. ACL criteria are compared to the incoming frame in the order in which they were entered or from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
Changing hardware ACL or hardware access map configuration or application causes new information to be reinstalled on the hardware. It is possible to run out of hardware resources depending on how many resources are needed to apply the desired change. If there are not enough hardware resources to install the new criteria in the hardware, an error message is displayed. You can view the amount of hardware resources available using the command show hw-filter-resource on page 471. Usage Examples
The following example creates an IP hardware ACL Untrusted to deny packets from any source destined for IP address 192.168.20.0: (config)#ip hw-access-list extended Untrusted (config-ext-ip-hw-nacl)#deny ip any host 192.168.20.0 The following example creates an entry in the Untrusted IP hardware ACL that denies any UDP packets from being forwarded to the UDP ports that range between 1080 and 1150: (config)#ip hw-access-list extended Untrusted (config-ext-nacl)#deny udp any any range 1080 1150
60000CRG0-35B
2742
Syntax Description
<protocol> <source> Specifies the data protocol as ip, tcp, or udp. Specifies the source used for packet matching. Sources can be expressed in one of three ways: 1. Using the keyword any to match any IP address. 2. Using host <ip address> to specify a single host address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). 3. Using the <ip address> <wildcard mask> format to match all IP addresses in a range. The wildcard mask corresponds to a range of IP addresses (network) or a specific host. Wildcard masks are expressed in dotted decimal notation (for example, 0.0.0.255). <source port> Optional. The source port is used only when <protocol> is tcp or udp. The following keywords and port numbers/names are supported for the <source port> field: eq <port> range <min> <max> Matches only packets equal to the specified port number. Range is 0 to 65535. Matches only packets that contain a port number in the specified range. Range is 0 to 65535.
<destination>
Specifies the destination used for packet matching. Destinations can be expressed in one of three ways: 1. Using the keyword any to match any IP address. 2. Using host <ip address> to specify a single host address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). 3. Using the <ip address> <wildcard mask> format to match all IP addresses in a range. The wildcard mask corresponds to a range of IP addresses (network) or a specific host. Wildcard masks are expressed in dotted decimal notation (for example, 0.0.0.255).
<destination port>
Optional. The destination port is used only when <protocol> is tcp or udp. The following keywords and port numbers are supported for the <destination port> field: eq <port> Matches only packets equal to the specified port number. Range is 0 to 65535.
60000CRG0-35B
2743
Hardware ACLs and Hardware Access Maps Matches only packets that contain a port number in the specified range. Range is 0 to 65535.
log
Optional. Enables logging of any packets that match the hardware ACL entry. These are the logs that appear in the command debug hw-access-list <name> on page 246.
Default Values
By default, all AOS security features are disabled, and there are no configured hardware ACLs.
Command History
Release 17.6 Command was introduced.
Functional Notes
Hardware ACLs are used as frame selectors by the hardware access maps; by themselves they do nothing. Hardware ACLs are composed of an ordered list of entries with an implicit deny any at the end of each list. A hardware ACL with no entries includes an implicit permit any. An ACL entry contains two parts: an action (permit or deny) and a frame pattern. A permit ACL matches frames (meeting the specified pattern) and allows them to enter the network. A deny ACL advances AOS to the next ACL entry. ACL criteria are compared to the incoming frame in the order in which they were entered or from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
Changing hardware ACL or hardware access map configuration or application causes new information to be reinstalled on the hardware. It is possible to run out of hardware resources depending on how many resources are needed to apply the desired change. If there are not enough hardware resources to install the new criteria in the hardware, an error message is displayed. You can view the amount of hardware resources available using the command show hw-filter-resource on page 471. Usage Examples
The following example creates an IP hardware ACL Trusted to permit packets from any source destined for IP address 192.168.20.0: (config)#ip hw-access-list extended Trusted (config-ext-ip-hw-nacl)#permit ip any host 192.168.20.0 The following example creates an entry in the Trusted IP hardware ACL that permits any UDP packets to be forwarded to the UDP ports that range between 1080 and 1150: (config)#ip hw-access-list extended Trusted (config-ext-nacl)#permit udp any any range 1080 1150
60000CRG0-35B
2744
remark <text>
Use the remark command to associate a descriptive tag with a hardware access control list (ACL). Use the no form of this command to remove the descriptive tag. Syntax Description
<text> Specifies a descriptive tag for the ACL. Tags can be up to 80 alphanumeric characters. For example, This list blocks all outbound Web traffic.
Default Values
By default, all AOS security features are disabled, and there are no configured hardware ACLs.
Command History
Release 17.6 Command was introduced.
Usage Examples
The following example specifies a description for IP hardware ACL Matchall: (config)#ip hw-access-list extended Matchall (config-ext-ip-hw-nacl)#remark allows all ip traffic from remote location The following example specifies a description for medium access control (MAC) hardware ACL Matchall: (config)#mac hw-access-list extended Matchall (config-ext-mac-hw-nacl)#remark allows all ip traffic from remote location
60000CRG0-35B
2745
Syntax Description
<source> Specifies the source used for frame matching. Sources can be expressed in one of three ways: 1. Using the keyword any to match any MAC address. 2. Using address <mac address> to specify a single host address. IP addresses should be expressed in dotted decimal notation (for example, 08:00:69:02:06:CB). 3. Using the <mac address> <wildcard mask> format to match all IP addresses in a range. The wildcard mask corresponds to a range of IP addresses (network) or a specific host. Wildcard masks are expressed in dotted decimal notation (for example, 0.0.0.255). <destination> Specifies the destination used for frame matching. Destinations can be expressed in one of three ways: 1. Using the keyword any to match any MAC address. 2. Using address <mac address> to specify a single host address. IP addresses should be expressed in dotted decimal notation (for example, 08:00:69:02:06:CB). 3. Using the <mac address> <wildcard mask> format to match all IP addresses in a range. The wildcard mask corresponds to a range of IP addresses (network) or a specific host. Wildcard masks are expressed in dotted decimal notation (for example, 0.0.0.255). log Optional. Enables logging of any frames that match the hardware ACL entry. These are the logs that appear in the command debug hw-access-list <name> on page 246.
Default Values
By default, all AOS security features are disabled, and there are no configured hardware ACLs.
Command History
Release 17.6 Command was introduced.
60000CRG0-35B
2746
Functional Notes
Hardware ACLs are used as frame selectors by the hardware access maps; by themselves they do nothing. Hardware ACLs are composed of an ordered list of entries with an implicit deny any at the end of each list. A hardware ACL with no entries includes an implicit permit any. An ACL entry contains two parts: an action (permit or deny) and a frame pattern. A permit ACL matches frames (meeting the specified pattern) and allows them to enter the network. A deny ACL advances AOS to the next access list entry. ACL criteria are compared to the incoming frame in the order in which they were entered or from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
Changing hardware ACL or hardware access map configuration or application causes new information to be reinstalled on the hardware. It is possible to run out of hardware resources depending on how many resources are needed to apply the desired change. If there are not enough hardware resources to install the new criteria in the hardware, an error message is displayed. You can view the amount of hardware resources available using the command show hw-filter-resource on page 471. Usage Examples
The following example specifies that the MAC hardware ACL Untrusted deny traffic from MAC address 08:00:69:02:01:FC with a destination of MAC address 08:00:69:02:06:CB. Traffic that matches this description will be logged. (config)#mac hw-access-list extended Untrusted (config-ext-mac-hw-nacl)#deny address 08:00:69:02:01:FC address 08:00:69:02:06:CB log
60000CRG0-35B
2747
Syntax Description
<source> Specifies the source used for frame matching. Sources can be expressed in one of three ways: 1. Using the keyword any to match any MAC address. 2. Using address <mac address> to specify a single host address. IP addresses should be expressed in dotted decimal notation (for example, 08:00:69:02:06:CB). 3. Using the <mac address> <wildcard mask> format to match all IP addresses in a range. The wildcard mask corresponds to a range of IP addresses (network) or a specific host. Wildcard masks are expressed in dotted decimal notation (for example, 0.0.0.255). <destination> Specifies the destination used for frame matching. Destinations can be expressed in one of three ways: 1. Using the keyword any to match any MAC address. 2. Using address <mac address> to specify a single host address. IP addresses should be expressed in dotted decimal notation (for example, 08:00:69:02:06:CB). 3. Using the <mac address> <wildcard mask> format to match all IP addresses in a range. The wildcard mask corresponds to a range of IP addresses (network) or a specific host. Wildcard masks are expressed in dotted decimal notation (for example, 0.0.0.255). log Optional. Enables logging of any frames that match the hardware ACL entry. These are the logs that appear in the command debug hw-access-list <name> on page 246.
Default Values
By default, all AOS security features are disabled, and there are no configured hardware ACLs.
Command History
Release 17.6 Command was introduced.
60000CRG0-35B
2748
Functional Notes
Hardware ACLs are used as frame selectors by the hardware access maps; by themselves they do nothing. Hardware ACLs are composed of an ordered list of entries with an implicit deny any at the end of each list. A hardware ACL with no entries includes an implicit permit any. An ACL entry contains two parts: an action (permit or deny) and a frame pattern. A permit ACL matches frames (meeting the specified pattern) and allows them to enter the network. A deny ACL advances AOS to the next access list entry. ACL criteria are compared to the incoming frame in the order in which they were entered or from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
Changing hardware ACL or hardware access map configuration or application causes new information to be reinstalled on the hardware. It is possible to run out of hardware resources depending on how many resources are needed to apply the desired change. If there are not enough hardware resources to install the new criteria in the hardware, an error message is displayed. You can view the amount of hardware resources available using the command show hw-filter-resource on page 471. Usage Examples
The following example specifies that the MAC hardware ACL Trusted permit traffic from any MAC address destined for MAC address 08:00:69:02:06:CB. Traffic that matches this description will be logged. (config)#mac hw-access-list extended Trusted (config-ext-mac-hw-nacl)#permit any address 08:00:69:02:06:CB log
60000CRG0-35B
2749
Syntax Description
<acl name> mac <acl name> Specifies the hardware ACL the access map will use when determining which traffic to forward. Specifies the medium access control (MAC) hardware ACL that the access map will use in conjunction with the IP hardware ACL to determine which traffic to forward. Specifies that the relationship between the IP and MAC ACLs is such that the access map will forward traffic only if both ACLs indicate that it should be forwarded.
and
Default Values
By default, all AOS security features are disabled, and there are no configured hardware access maps.
Command History
Release 17.6 Command was introduced.
Functional Notes
Hardware access maps can only forward traffic. This action can be performed based on the criteria outlined in a single IP hardware ACL, a single MAC hardware ACL, or both. Like the hardware ACLs, the hardware access map will match traffic in top-down order. Use the forward ip command if the first criteria for the access map is to match traffic based on IP information. Specifying and indicates to the access map that both ACLs must conclude the frame should be forwarded for the access map to forward it. If you configure the access map to reference a nonexistent IP or MAC hardware ACL, the ACL will be created. Note that this newly created ACL will have permit any as the default entry because no other entries are present. Hardware access maps are not active until they are applied to a virtual local area network (VLAN). For instructions on how to apply an access map to a VLAN, refer to vlans <vlan id> on page 2754.
60000CRG0-35B
2750
Changing hardware ACL or hardware access map configuration or application causes new information to be reinstalled on the hardware. It is possible to run out of hardware resources depending on how many resources are needed to apply the desired change. If there are not enough hardware resources to install the new criteria in the hardware, an error message is displayed. You can view the amount of hardware resources available using the command show hw-filter-resource on page 471. Usage Examples
In the following example, the access map Map1 is configured to operate on both an IP hardware ACL (Trusted) and a MAC hardware ACL (Untrusted), specifying that both must agree that a frame should be forwarded before the access list will forward it. (config)#hw-access-map Map1 (config-hw-access-map)#forward ip Trusted and mac Untrusted
60000CRG0-35B
2751
Syntax Description
<acl name> ip <acl name> and Specifies the hardware ACL the access map will use when determining which traffic to forward. Specifies the IP hardware ACL that the access map will use in conjunction with the MAC hardware ACL to determine which traffic to forward. Specifies that the relationship between the MAC and IP ACLs is such that the access map will forward traffic only if both ACLs indicate that it should be forwarded.
Default Values
By default, all AOS security features are disabled, and there are no configured hardware access maps.
Command History
Release 17.6 Command was introduced.
Functional Notes
Hardware access maps can only forward traffic. This action can be performed based on the criteria outlined in a single IP hardware ACL, a single MAC hardware ACL, or both. Like the hardware ACLs, the hardware access map will match traffic in top-down order. Use the forward mac command if the first criteria for the access map is to match traffic based on MAC addresses. Specifying and indicates to the access map that both ACLs must conclude the frame should be forwarded for the access map to forward it. If you configure the access map to reference a nonexistent IP or MAC hardware ACL, the ACL will be created. Note that this newly created ACL will have permit any as the default entry because no other entries are present. Hardware access maps are not active until they are applied to a virtual local area network (VLAN). For instructions on how to apply an access map to a VLAN, refer to vlans <vlan id> on page 2754.
Changing hardware ACL or hardware access map configuration or application causes new information to be reinstalled on the hardware. It is possible to run out of hardware resources depending on how many resources are needed to apply the desired change. If there are not enough hardware resources to install the new criteria in the hardware, an error message is displayed. You can view the amount of hardware resources available using the command show hw-filter-resource on page 471.
60000CRG0-35B
2752
Usage Examples
In the following example, the access map Map1 is configured to operate on both a MAC hardware ACL (Trusted) and an IP hardware ACL (Untrusted), specifying that both must agree that a frame should be forwarded before the access list will forward it. (config)#hw-access-map Map1 (config-hw-access-map)#forward mac Trusted and ip Untrusted
60000CRG0-35B
2753
Default Values
By default, access maps are not applied to any VLAN interfaces.
Command History
Release 17.6 Command was introduced.
Functional Notes
Once an access map has been created and associated with a hardware access control list (ACL), it must be applied to a VLAN for the ACL or access map to be fully functional. Access maps can be applied to a single VLAN or a range of VLANs, however, only one access map can be applied to a VLAN at a time. If you attempt to apply a second access map to a VLAN, an error is displayed.
Changing hardware ACL or hardware access map configuration or application causes new information to be reinstalled on the hardware. It is possible to run out of hardware resources depending on how many resources are needed to apply the desired change. If there are not enough hardware resources to install the new criteria in the hardware, an error message is displayed. You can view the amount of hardware resources available using the command show hw-filter-resource on page 471. Usage Examples
The following example specifies that the access map Map1, which uses IP hardware ACL Trusted and MAC hardware ACL Untrusted, is applied to VLANs 1,2, and 15-30. (config)#hw-access-map Map1 (config-hw-access-map)#forward ip Trusted and mac Untrusted (config-hw-access-map)#vlans 1,2,15-30
60000CRG0-35B
2754
To create an extended IPv4 ACL and activate the Extended IPv4 ACL Configuration Mode, enter the ip access-list extended <name> command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#ip access-list extended MATCHALL (config-ext-nacl)#
An IPv4 ACL will remain inactive until it is assigned to an active IPv4 ACP. For more information on configuring and activating IPv4 ACPs, refer to the IPv4 Access Control Policy Command Set on page 2773. Technology Review
IPv4 ACPs and IPv4 ACLs regulate traffic through the routed network. When designing your traffic flow configuration, it is important to keep the following in mind: An IPv4 ACL serves as a packet selector, defining exactly which packets should take the given action. An IPv4 ACP defines the action to take on the packets selected by the ACL. An IPv4 ACL is inactive until it is assigned to an active ACP. An IPv4 ACP is inactive until it is assigned to an interface.
60000CRG0-35B
2755
IPv4 ACPs are used to allow, discard, or manipulate (using network address translation (NAT)) data for each physical interface. Each IPv4 ACP consists of an action (allow, discard, nat) and a selector (IPv4 ACL). In a sense, the IPv4 ACPs answer the question, What should I do? while the IPv4 ACLs answer the question, On which packets? When packets are received on an interface with an IPv4 ACP applied, the ACP is used to determine whether the data is processed or discarded. Both IPv4 ACLs and IPv4 ACPs are order dependent. When a packet is evaluated, the matching engine begins with the first entry in the list and progresses through the entries until it finds a match. The first entry that matches is executed. The IPv4 ACP has an implicit discard at the end of the list. Typically, the most specific entries should be at the top and the most general at the bottom. IPv4 Access Control Lists (ACLs) IPv4 ACLs are used as packet selectors by IPv4 ACPs. They must be assigned to an IPv4 ACP in order to be active.
IPv4 ACP must use an IPv4 ACL. You cannot apply an IPv4 ACL to an IPv6 ACP, or vice-versa. In addition, all IPv4 ACLs and IPv4 ACPs must have a different name than any configured IPv6 ACLs or IPv6 ACPs.
IPv4 ACLs are composed of an ordered list of entries. Each entry contains two parts: an action (permit or deny) and a packet pattern. A permit action is used to allow packets (meeting the specified pattern) to enter the router system. A deny action is used to disregard packets (that do not match the pattern) and proceed to the next entry on the IPv4 ACP. The IPv4 ACL has an implicit deny at the end of the list. The AOS provides two types of IPv4 ACLs: standard and extended. A standard IPv4 ACL allows source IPv4 address packet patterns only. An extended IPv4 ACL may specify patterns using most fields in the IPv4 header and the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) header. Creating and Assigning IPv4 ACLs and IPv4 ACPs Creating IPv4 ACPs and IPv4 ACLs to regulate traffic through the routed network is a four-step process: Step 1: Enable the security features of AOS using the ip firewall command. Refer to the command ip firewall on page 920 for more information. Step 2: Create an IPv4 ACP that uses a configured IPv4 ACL by issuing the ip policy-class command. AOS IPv4 ACPs are used to allow, discard, or manipulate (using NAT) data for each physical interface. Each IPv4 ACP consists of an action (allow, discard, nat) and a selector (IPv4 ACL). When packets are received on an interface, the configured IPv4 ACPs are applied to determine whether the data will be processed or discarded.
60000CRG0-35B
2756
Step 3: Create an IPv4 ACL to permit or deny specified traffic by using either the ip access-list extended or ip access-list standard command. Standard IPv4 ACLs match based on the source IPv4 address of the packet. Extended IPv4 ACLs match based on the source and destination of the packet. Refer to the command ip access-list extended <ipv4 acl name> on page 898 or the command ip access-list standard <ipv4 acl name> on page 900 for more information. Sources can be expressed in one of four ways: 1. Using the keyword any to match any IPv4 address. 2. Using host <ip address> to specify a single host address. 3. Using the <ip address> <wildcard> format to match all IPv4 addresses in a range. Wildcard masks work in reverse logic from subnet masks. When broken out into binary form, a 0 indicates which bits of the IPv4 address to consider, a 1 indicates which bits are disregarded. For example, specifying 255 in any octet of the wildcard mask equates to a dont care for that octet in the IPv4 address. Additionally, a 30-bit mask would be represented with the wildcard string 0.0.0.3, a 28-bit mask with 0.0.0.15, a 24-bit mask with 0.0.0.255, and so forth. 4. Using the keyword hostname to match based on a domain naming system (DNS) name. DNS servers must be configured or host names must be locally defined for this function to work. Step 4: Apply the created IPv4 ACP to an interface. To assign an IPv4 ACP to an interface, enter the interface configuration mode for the desired interface and enter access-policy <acp name>. The following example assigns ACP UNTRUSTED to the Ethernet 0/1 interface: (config)#interface ethernet 0/1 (config-eth 0/1)#access-policy UNTRUSTED
For more information about configuring ACLs, ACPs, and the AOS Firewall, refer to the IP Firewall configuration guide (article number 1543) available at http://kb.adtran.com.
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 exit on page 71 interface on page 72 The following are commands used to configure an extended IPv4 ACL. Extended IPv4 ACL configuration includes specifying an IPv4 ACL action, a protocol, a packet source, a source port, a packet destination, and a destination port. These commands are described in this section in alphabetical order. deny <protocol> <source> <source port> <destination> <destination port> on page 2759 permit <protocol> <source> <source port> <destination> <destination port> on page 2763
60000CRG0-35B
2757
remark <remark> on page 2767 The following are commands for configuring a standard IPv4 ACL. Standard IPv4 ACL configuration includes specifying an IPv4 ACL action and a packet source. These commands are described in this section in alphabetical order. deny <source> on page 2768 permit <source> on page 2770 remark <remark> on page 2772
60000CRG0-35B
2758
Syntax Description
<protocol> <source> Specifies the data protocol ip, icmp, tcp, udp, ahp, esp, gre, or a specific protocol. Range is 0 to 255. Specifies the source used for packet matching. Sources can be expressed in one of four ways: 1. Using the keyword any to match any IPv4 address. 2. Using host <ip address> to specify a single host address. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). 3. Using the <ip address> <wildcard mask> format to match all IPv4 addresses in a range. The wildcard mask corresponds to a range of IPv4 addresses (network) or a specific host. Wildcard masks are expressed in dotted decimal notation (for example, 0.0.0.255). 4. Using the keyword hostname <hostname> to match based on a DNS name. The unit must be configured with DNS servers for this function to work. Using vrf <name> in conjunction with the hostname parameter associates a nondefault VRF with the DNS host name for the source. The VRF is required if the routers DNS server is on a nondefault VRF. This parameter can only be used with the hostname source. <source port> Optional. The source port is used only when <protocol> is tcp or udp. The following keywords and port numbers/names are supported for the <source port> field: any eq <port number/name> gt <port number/name> lt <port number/name> neq <port number/name> range <begin port number/name> <end port number/name> Matches any destination port. Matches only packets equal to specified port number. Matches only packets with a port number greater than the specified port number. Matches only packets with a port number less than the specified port number. Matches only packets that are not equal to the specified port number. Matches only packets that contain a port number in the specified range.
60000CRG0-35B
2759
IPv4 Access Control List Command Set Specifies the port number used by Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) to pass information to upper layers using the following syntax: <0-65535>. All ports below 1024 are considered well-known ports, and are controlled by the Internet Assigned Numbers Authority (IANA). All ports above 1024 are dynamically assigned ports that include registered ports for vendor-specific applications. The following UDP port numbers can be specified using the associated names: biff (Port 512) bootpc (Port 68) bootps (Port 67) discard (Port 9) dnsix (Port 195) domain (Port 53) echo (Port 7) isakmp (Port 500) mobile-ip (Port 434) ntp (Port 123) pim-auto-rp (Port 496) rip (Port 520) snmp (Port 161) snmptrap (Port 162) sunrpc (Port 111) syslog (Port 514) tacacs (Port 49) talk (Port 517)
<port name>
nameserver (Port 42) tftp (Port 69) netbios-dgm (Port 138)time (Port 37) netbios-ns (Port 137) who (Port 513) netbios-ss (Port 139) xdmcp (Port 177) The following TCP port numbers can be specified using the associated names: bgp (Port 179) chargen (Port 19) cmd (Port 514) daytime (Port 13) discard (Port 9) domain (Port 53) echo (Port 7) exec (Port 512) finger (Port 79) ftp (Port 21) gopher (Port 70) ident (Port 113) lpd (Port 515) nntp (Port 119) pim-auto-rp (Port 496) pop2 (Port 109) pop3 (Port 110) smtp (Port 25) sunrpc (Port 111) syslog (Port 514) tacacs (Port 49) talk (Port 517) tftp (Port 69) time (Port 37)
60000CRG0-35B
2760
IPv4 Access Control List Command Set irc (Port 194) klogin (Port 543) kshell (Port 544) login (Port 513) uucp (Port 540) whois (Port 43) www (Port 80)
<destination>
Specifies the destination used for packet matching. Destinations can be expressed in one of five ways: 1. Using the keyword any to match any IPv4 address. 2. Using host <ip address> to specify a single host address. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). 3. Using the <ip address> <wildcard mask> format to match all IPv4 addresses in a range. The wildcard mask corresponds to a range of IPv4 addresses (network) or a specific host. Wildcard masks are expressed in dotted decimal notation (for example, 0.0.0.255). 4. Using the keyword hostname <hostname> to match based on a DNS name. The unit must be configured with DNS servers for this function to work. Using vrf <name> in conjunction with the hostname parameter associates a nondefault VRF with the DNS host name for the source. The VRF is required if the routers DNS server is on a nondefault VRF. This parameter can only be used with the hostname source.
<destination port>
Optional. Specifies the destination port. Only valid when <protocol> is tcp or udp. The same keywords and port numbers/names used for the <source port> field are valid for the <destination port> field. Refer to previously listed <source port> for more details. Optional. Enables logging of any packets that match the IPv4 ACL entry. Optional. Makes the IPv4 ACL entry dependent upon a track.
Default Values
By default, all AOS IPv4 security features are disabled, and there are no configured IPv4 ACLs.
Command History
Release 2.1 Release 16.1 Command was introduced. Command was expanded to include the log, track, and vrf parameters.
Functional Notes
IPv4 Access control lists (ACLs) are used as packet selectors by different AOS features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. IPv4 ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An IPv4 ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit IPv4 ACL is used to match packets (meeting the specified pattern) to enter the router system. A deny IPv4 ACL advances AOS to the next access policy entry. AOS provides two types of IPv4 ACLs: standard and extended. Standard IPv4 ACLs match based on the source of the packet. Extended IPv4 ACLs match based on the source and destination of the packet.
60000CRG0-35B
2761
IPv4 ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example creates an ACL DenyIKE to deny all Internet key exchange (IKE) (UDP Port 500) packets from the 190.72.22.0 /24 network: (config)#ip access-list extended DenyIKE (config-ext-nacl)#deny udp 190.72.22.0 0.0.0.255 eq 500 any eq 500 The following example creates an entry in the Untrusted IPv4 ACL to deny ip packets from host name www.adtran.com using the nondefault VRF RED to resolve the DNS host name with any destination: (config)#ip access-list extended Untrusted (config-ext-nacl)#deny ip hostname www.adtran.com vrf RED any
60000CRG0-35B
2762
Syntax Description
<protocol> <source> Specifies the IPv4 data protocol ip, icmp, tcp, udp, ahp, esp, gre, or a specific protocol. Range is 0 to 255. Specifies the source used for IPv4 packet matching. Sources can be expressed in one of four ways: 1. Using the keyword any to match any IPv4 address. 2. Using host <ip address> to specify a single host address. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). 3. Using the <ip address> <wildcard mask> format to match all IPv4 addresses in a range. The wildcard mask corresponds to a range of IPv4 addresses (network) or a specific host. Wildcard masks are expressed in dotted decimal notation (for example, 0.0.0.255). 4. Using the keyword hostname <hostname> to match based on a DNS name. The unit must be configured with DNS servers for this function to work. Using vrf <name> in conjunction with the hostname parameter associates a nondefault VRF with the DNS host name for the source. The VRF is required if the routers DNS server is on a nondefault VRF. This parameter can only be used with the hostname source. <source port> Optional. The source port is used only when <protocol> is tcp or udp. The following keywords and port numbers/names are supported for the <source port> field: any eq <port number/name> gt <port number/name> lt <port number/name> neq <port number/name> range <begin port number/name> <endport number/name> Matches any destination port. Matches only packets equal to specified port number. Matches only packets with a port number greater than the specified port number. Matches only packets with a port number less than the specified port number. Matches only packets that are not equal to the specified port number. Matches only packets that contain a port number in the specified range.
60000CRG0-35B
2763
IPv4 Access Control List Command Set Specifies the port number used by Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) to pass information to upper layers using the following syntax: <0-65535>. All ports below 1024 are considered well-known ports, and are controlled by the Internet Assigned Numbers Authority (IANA). All ports above 1024 are dynamically assigned ports that include registered ports for vendor-specific applications. The following UDP port numbers can be specified using the associated names: biff (Port 512) bootpc (Port 68) bootps (Port 67) discard (Port 9) dnsix (Port 195) domain (Port 53) echo (Port 7) isakmp (Port 500) mobile-ip (Port 434) ntp (Port 123) pim-auto-rp (Port 496) rip (Port 520) snmp (Port 161) snmptrap (Port 162) sunrpc (Port 111) syslog (Port 514) tacacs (Port 49) talk (Port 517)
<port name>
nameserver (Port 42) tftp (Port 69) netbios-dgm (Port 138)time (Port 37) netbios-ns (Port 137) who (Port 513) netbios-ss (Port 139) xdmcp (Port 177) The following TCP port numbers can be specified using the associated names: bgp (Port 179) chargen (Port 19) cmd (Port 514) daytime (Port 13) discard (Port 9) domain (Port 53) echo (Port 7) exec (Port 512) finger (Port 79) ftp (Port 21) gopher (Port 70) ident (Port 113) lpd (Port 515) nntp (Port 119) pim-auto-rp (Port 496) pop2 (Port 109) pop3 (Port 110) smtp (Port 25) sunrpc (Port 111) syslog (Port 514) tacacs (Port 49) talk (Port 517) tftp (Port 69) time (Port 37)
60000CRG0-35B
2764
IPv4 Access Control List Command Set irc (Port 194) klogin (Port 543) kshell (Port 544) login (Port 513) uucp (Port 540) whois (Port 43) www (Port 80)
<destination>
Specifies the destination used for IPv4 packet matching. Destinations can be expressed in one of five ways: 1. Using the keyword any to match any IPv4 address. 2. Using host <ip address> to specify a single host address. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). 3. Using the <ip address> <wildcard mask> format to match all IPv4 addresses in a range. The wildcard mask corresponds to a range of IPv4 addresses (network) or a specific host. Wildcard masks are expressed in dotted decimal notation (for example, 0.0.0.255). 4. Using the keyword hostname <hostname> to match based on a DNS name. The unit must be configured with DNS servers for this function to work. Using vrf <name> in conjunction with the hostname parameter associates a nondefault VRF with the DNS host name for the source. The VRF is required if the routers DNS server is on a nondefault VRF. This parameter can only be used with the hostname source.
<destination port>
Optional. Specifies the destination port. Only valid when <protocol> is tcp or udp. The same keywords and port numbers/names used for the <source port> field are valid for the <destination port> field. Refer to previously listed <source port> for more details. Optional. Enables logging of any packets that match the IPv4 ACL entry. Optional. Makes the IPv4 ACL entry dependent upon a track.
Default Values
By default, all AOS security features are disabled, and there are no configured IPv4 ACLs.
Command History
Release 2.1 Release 16.1 Command was introduced. Command was expanded to include the log, track, and vrf parameters.
Functional Notes
IPv4 Access control lists (ACLs) are used as packet selectors by different AOS features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. IPv4 ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An IPv4 ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit IPv4 ACL is used to match packets (meeting the specified pattern) to enter the router system. A deny IPv4 ACL advances AOS to the next access policy entry. AOS provides two types of IPv4 ACLs: standard and extended. Standard IPv4 ACLs match based on the source of the packet. Extended IPv4 ACLs match based on the source and destination of the packet.
60000CRG0-35B
2765
IPv4 ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example creates an IPv4 ACL AllowIKE to allow all Internet key exchange (IKE) (UDP Port 500) packets from the 190.72.22.0 /24 network: (config)#ip access-list extended AllowIKE (config-ext-nacl)#permit udp 190.72.22.0 0.0.0.255 eq 500 any eq 500 The following example creates an entry in the MatchAll IPv4 ACL to permit ip packets from host name www.adtran.com using the nondefault VRF RED to resolve the DNS host name with any destination: (config)#ip access-list extended MatchAll (config-ext-nacl)#permit ip hostname www.adtran.com vrf RED any
60000CRG0-35B
2766
remark <remark>
Use the remark command to associate a descriptive tag with an extended Internet Protocol version 4 (IPv4) access control list (ACL). Use the no form of this command to remove the descriptive tag. Syntax Description
<remark> Specifies a descriptive tag for the IPv4 ACL. Tags can be up to 80 alphanumeric characters enclosed in quotation marks. For example, This list blocks all outbound Web traffic.
Default Values
By default, all AOS security features are disabled, and there are no configured IPv4 ACLs.
Command History
Release 2.1 Command was introduced.
Usage Examples
The following example specifies a description for extended IPv4 ACL matchall: (config)#ip access-list extended matchall (config-ext-nacl)#remark allows all ip traffic from remote location
60000CRG0-35B
2767
deny <source>
Use the deny command to configure the standard Internet Protocol version 4 (IPv4) access control list (ACL) to deny specified packets entry into the routing system. Use the no form of this command to remove the deny parameter from the IPv4 ACL. Variations of this command include:
deny <source> deny <source> log deny <source> track <name>
Syntax Description
<source> Specifies the source used for IPv4 packet matching. Sources can be expressed in one of four ways: 1. Using the keyword any to match any IPv4 address. 2. Using host <ip address> to specify a single host address. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). 3. Using the <ip address> <wildcard mask> format to match all IPv4 addresses in a range. The wildcard mask corresponds to a range of IPv4 addresses (network) or a specific host. Wildcard masks are expressed in dotted decimal notation (for example, 0.0.0.255). 4. Using the keyword hostname <hostname> to match based on a DNS name. The unit must be configured with DNS servers for this function to work. Using vrf <name> in conjunction with the hostname parameter associates a nondefault VRF with the DNS host name for the source. The VRF is required if the routers DNS server is on a nondefault VRF. This parameter can only be used with the hostname source. log track <name> Optional. Enables logging of any packets that match the IPv4 ACL entry. Optional. Makes the IPv4 ACL entry dependent upon a track.
Default Values
By default, all AOS security features are disabled, and there are no configured IPv4 ACLs.
Command History
Release 2.1 Release 16.1 Command was introduced. Command was expanded to include the log, track, and vrf parameters.
Functional Notes
IPv4 Access control lists (ACLs) are used as packet selectors by different AOS features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. IPv4 ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An IPv4 ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit IPv4 ACL is used to match packets (meeting the specified pattern) to enter the router system. A deny IPv4 ACL advances AOS to the next access policy entry. AOS provides two types of IPv4 ACLs: standard and extended. Standard IPv4 ACLs match based on the source of the packet. Extended IPv4 ACLs match based on the source and destination of the packet.
60000CRG0-35B
2768
IPv4 ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example creates an IPv4 ACL UnTrusted to deny all packets from the 190.72.22.248 /30 network: (config)#ip access-list standard UnTrusted (config-std-nacl)#deny 190.72.22.248 0.0.0.3
60000CRG0-35B
2769
permit <source>
Use the permit command to configure the standard Internet Protocol version 4 (IPv4) access control list (ACL) to permit specified packets entry into the routing system. Use the no form of this command to remove the permit permission from the IPv4 ACL. Variations of this command include:
permit <source> permit <source> log permit <source> track <name>
Syntax Description
<source> Specifies the source used for IPv4 packet matching. Sources can be expressed in one of four ways: 1. Using the keyword any to match any IPv4 address. 2. Using host <ip address> to specify a single host address. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). 3. Using the <ip address> <wildcard mask> format to match all IPv4 addresses in a range. The wildcard mask corresponds to a range of IPv4 addresses (network) or a specific host. Wildcard masks are expressed in dotted decimal notation (for example, 0.0.0.255). 4. Using the keyword hostname <hostname> to match based on a DNS name. The unit must be configured with DNS servers for this function to work. Using vrf <name> in conjunction with the hostname parameter associates a nondefault VRF with the DNS host name for the source. The VRF is required if the routers DNS server is on a nondefault VRF. This parameter can only be used with the hostname source. log track <name> Optional. Enables logging of any packets that match the IPv4 ACL entry. Optional. Makes the IPv4 ACL entry dependent upon a track.
Default Values
By default, all AOS security features are disabled, and there are no configured IPv4 ACLs.
Command History
Release 2.1 Release 16.1 Command was introduced. Command was expanded to include the log, track, and vrf parameters.
Functional Notes
IPv4 Access control lists (ACLs) are used as packet selectors by different AOS features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. IPv4 ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An IPv4 ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit IPv4 ACL is used to match packets (meeting the specified pattern) to enter the router system. A deny IPv4 ACL advances AOS to the next access policy entry. AOS provides two types of IPv4 ACLs: standard and extended. Standard IPv4 ACLs match based on the source of the packet. Extended IPv4 ACLs match based on the source and destination of the packet.
60000CRG0-35B
2770
IPv4 ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom. VRF on AOS products allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF will only affect the default unnamed VRF.
Usage Examples
The following example creates an IPv4 ACL Trusted to permit all packets from the 190.72.22.248 /30 network: (config)#ip access-list standard Trusted (config-std-nacl)#permit 190.72.22.248 0.0.0.3
60000CRG0-35B
2771
remark <remark>
Use the remark command to associate a descriptive tag with a standard Internet Protocol version 4 (IPv4) access control list (ACL). Use the no form of this command to remove the descriptive tag. Syntax Description
<remark> Specifies a descriptive tag for the IPv4 ACL. Tags can be up to 80 alphanumeric characters enclosed in quotation marks. For example, This list blocks all outbound Web traffic.
Default Values
By default, all AOS security features are disabled, and there are no configured IPv4 ACLs.
Command History
Release 2.1 Command was introduced.
Usage Examples
The following example specifies a description for standard IPv4 ACL matchall: (config)#ip access-list extended matchall (config-std-nacl)#remark allows all ip traffic from remote location
60000CRG0-35B
2772
Configured IPv4 ACPs will only be active if the ip firewall command has been entered at the Global Configuration mode prompt to enable the AOS security features. All configuration parameters are valid, but no security data processing will be attempted unless the security features are enabled. Before applying an IPv4 ACP to an interface, verify your Telnet or secure shell (SSH) connection will not be affected by the policy. If an IPv4 ACP is applied to the interface you are connecting through and it does not allow Telnet or SSH traffic, your connection will be lost. Technology Review
IPv4 ACPs and IPv4 ACLs regulate traffic through the routed network. When designing your traffic flow configuration, it is important to keep the following in mind: An IPv4 ACL serves as a packet selector, defining exactly which packets should take the given action. An IPv4 ACP defines the action to take on the packets selected by the IPv4 ACL. An IPv4 ACL is inactive until it is assigned to an active IPv4 ACP. An IPv4 ACP is inactive until it is assigned to an interface.
IPv4 Access Control Policies (ACPs) IPv4 ACPs are used to allow, discard, or manipulate (using network address translation (NAT)) data for each physical interface. Each IPv4 ACP consists of an action (allow, discard, nat) and a selector (IPv4 ACL). In a sense, the IPv4 ACPs answer the question, What should I do? while the IPv4 ACLs answer the question, On which packets?
60000CRG0-35B
2773
When packets are received on an interface with an IPv4 ACP applied, the IPv4 ACP is used to determine whether the data is processed or discarded. Both IPv4 ACLs and IPv4 ACPs are order dependent. When a packet is evaluated, the matching engine begins with the first entry in the list and progresses through the entries until it finds a match. The first entry that matches is executed. The IPv4 ACP has an implicit discard at the end of the list. Typically, the most specific entries should be at the top and the most general at the bottom. IPv4 Access Control Lists (ACLs) IPv4 ACLs are used as packet selectors by IPv4 ACPs. They must be assigned to an IPv4 ACP in order to be active.
IPv4 ACP must use an IPv4 ACL. You cannot apply an IPv4 ACL to an IPv6 ACP, or vice-versa. In addition, all IPv4 ACLs and IPv4 ACPs must have a different name than any configured IPv6 ACLs or IPv6 ACPs.
IPv4 ACLs are composed of an ordered list of entries. Each entry contains two parts: an action (permit or deny) and a packet pattern. A permit action is used to allow packets (meeting the specified pattern) to enter the router system. A deny action is used to disregard packets (that do not match the pattern) and proceed to the next entry on the IPv4 ACP. The IPv4 ACL has an implicit deny at the end of the list. The AOS provides two types of IPv4 ACLs: standard and extended. A standard IPv4 ACL allows source IPv4 address packet patterns only. An extended IPv4 ACL may specify patterns using most fields in the IPv4 header and the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) header. Creating and Assigning IPv4 ACLs and IPv4 ACPs Creating IPv4 ACPs and IPv4 ACLs to regulate traffic through the routed network is a four-step process: Step 1: Enable the security features of AOS using the ip firewall command. Refer to the command ip firewall on page 920 for more information. Step 2: Create an IPv4 ACP that uses a configured IPv4 ACL by issuing the ip policy-class command. AOS IPv4 ACPs are used to allow, discard, or manipulate (using NAT) data for each physical interface. Each IPv4 ACP consists of an action (allow, discard, nat) and a selector (IPv4 ACL). When packets are received on an interface, the configured IPv4 ACPs are applied to determine whether the data will be processed or discarded. Step 3: Create an IPv4 ACL to permit or deny specified traffic by using either the ip access-list extended or ip access-list standard command. Standard IPv4 ACLs match based on the source IPv4 address of the packet. Extended IPv4 ACLs match based on the source and destination of the packet. Refer to the command ip access-list extended <ipv4 acl name> on page 898 or the command ip access-list standard <ipv4 acl name> on page 900 for more information. Sources can be expressed in one of four ways: 1. Using the keyword any to match any IPv4 address.
60000CRG0-35B
2774
Command Reference Guide 2. Using host <ip address> to specify a single host address.
3. Using the <ip address> <wildcard> format to match all IPv4 addresses in a range. Wildcard masks work in reverse logic from subnet masks. When broken out into binary form, a 0 indicates which bits of the IPv4 address to consider, a 1 indicates which bits are disregarded. For example, specifying 255 in any octet of the wildcard mask equates to a dont care for that octet in the IPv4 address. Additionally, a 30-bit mask would be represented with the wildcard string 0.0.0.3, a 28-bit mask with 0.0.0.15, a 24-bit mask with 0.0.0.255, and so forth. 4. Using the keyword hostname to match based on a domain naming system (DNS) name. DNS servers must be configured or host names must be locally defined for this function to work. Step 4: Apply the created IPv4 ACP to an interface. To assign an IPv4 ACP to an interface, enter the interface configuration mode for the desired interface and enter ip access-policy <acp name>. The following example assigns ACP UNTRUSTED to the Ethernet 0/1 interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ip access-policy UNTRUSTED
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. allow list on page 2776 allow reverse list on page 2778 discard list on page 2780 nat destination list on page 2782 nat destination list <acl name> pool <pool name> on page 2784 nat source list on page 2786 nat source list <acl name> pool <pool name> on page 2789
60000CRG0-35B
2775
allow list
Use the allow list command to specify an Internet Protocol version 4 (IPv4) access control list (ACL) to determine which packets are allowed to enter the interface to which the IPv4 access control policy (ACP) is assigned, and create a firewall association in the firewall. All associations created by the allow list command are subject to the built-in firewall timers (refer to ip policy-timeout on page 990). Variations of this command include:
allow list <acl name> allow list <acl name> policy <acp name> allow list <acl name> policy <acp name> stateless allow list <acl name> self allow list <acl name> self stateless allow list <acl name> stateless
Syntax Description
<acl name> Specifies the IPv4 ACL against which to check traffic before allowing packets to enter the interface. All packets not matched by the IPv4 ACL will be processed by the next IPv4 ACP entry or implicitly discarded if no further IPv4 ACP entries exist. Optional. Specifies the destination IPv4 ACP against which to match traffic. The firewall attempts to match the specified IPv4 ACP with the IPv4 ACP that is applied to the packet's egress interface as determined by the routing table or policy-based routing configuration. If there is a match, the firewall will process the packet. If there is no match, the firewall will process the packet based on the next IPv4 ACP entry or implicitly discard it if no further IPv4 ACP entries exist. Optional. Allows packets to pass that are permitted by the IPv4 ACL and destined for any local interface on the unit. These packets are terminated by the unit and are not routed or forwarded to other destinations. Using the self keyword is helpful when opening up remote administrative access to the unit (Telnet, secure shell (SSH), Internet Control Message Protocol (ICMP), Web-based graphical user interface (GUI)). Optional. Enables bypassing of stateful firewall processing and application-level gateways (ALGs). Use for trusted traffic or traffic that the firewall is incorrectly blocking as a perceived attack. Stateless processing is helpful when passing traffic over virtual private network (VPN) tunnels. Traffic sent over VPN tunnels is purposely selected and encrypted; there is no need for additional inspection of the traffic by the firewall. VPN configurations created using the VPN Wizard in the GUI use stateless processing by default.
self
stateless
Default Values
By default, all AOS security features are disabled and there are no configured IPv4 ACP entries.
60000CRG0-35B
2776
Command History
Release 2.1 Command was introduced.
Usage Examples
The following example configures the IPv4 ACP name UNTRUSTED to allow any traffic that matches the IPv4 ACL named INWEB to enter the router system: (config)#ip policy-class UNTRUSTED (config-policy-class)#allow list INWEB
60000CRG0-35B
2777
Syntax Description
<acl name> Specifies the IPv4 ACL against which to check traffic before allowing packets to enter the interface. All packets not matched by the IPv4 ACL will be processed by the next IPv4 ACP entry or implicitly discarded if no further IPv4 ACP entries exist. Optional. Specifies the destination IPv4 ACP against which to match traffic. The firewall attempts to match the specified IPv4 ACP with the IPv4 ACP that is applied to the packet's egress interface as determined by the routing table or policy-based routing configuration. If there is a match, the firewall will process the packet. If there is no match, the firewall will process the packet based on the next IPv4 ACP entry or implicitly discard it if no further IPv4 ACP entries exist. Optional. Allows packets to pass that are permitted by the IPv4 ACL and destined for any local interface on the unit. These packets are terminated by the unit and are not routed or forwarded to other destinations. Using the self keyword is helpful when opening up remote administrative access to the unit (Telnet, secure shell (SSH), Internet Control Message Protocol (ICMP), Web-based graphical user interface (GUI)). Optional. Enables bypassing of stateful firewall processing and application-level gateways (ALGs). Use for trusted traffic or traffic that the firewall is incorrectly blocking as a perceived attack. Stateless processing is helpful when passing traffic over VPN tunnels. Traffic sent over VPN tunnels is purposely selected and encrypted; there is no need for additional inspection of the traffic by the firewall. VPN configurations created using the VPN Wizard in the GUI use stateless processing by default.
self
stateless
Default Values
By default, all AOS security features are disabled and there are no configured IPv4 ACP entries.
60000CRG0-35B
2778
Command History
Release 2.1 Command was introduced.
Usage Examples
The following example configures the IPv4 ACP named UNTRUSTED to allow any traffic that matches the IPv4 ACL named INWEB (with source and destination information reversed) to enter the router system: (config)#ip policy-class UNTRUSTED (config-policy-class)#allow reverse list INWEB
60000CRG0-35B
2779
discard list
Use the discard list command to specify an Internet Protocol version 4 (IPv4) access control list (ACL) to determine which packets are discarded after entering the interface to which the IPv4 access control policy (ACP) is assigned. Packets matched by the IPv4 ACL will be discarded, and no further IPv4 ACP entries will be inspected. All packets not matched by the IPv4 ACL will be processed by the next IPv4 ACP entry or implicitly discarded if no further IPv4 ACP entries exist. Variations of this command include:
discard list <acl name> discard list <acl name> policy <acp name> discard list <acl name> self
Syntax Description
<acl name> Specifies the IPv4 ACL against which to check traffic before discarding the packet. All packets not matched by the IPv4 ACL will be processed by the next IPv4 ACP entry or implicitly discarded if no further IPv4 ACP entries exist. Optional. Specifies the destination IPv4 ACP against which to match traffic. The firewall attempts to match the specified IPv4 ACP with the IPv4 ACP that is applied to the packet's egress interface as determined by the routing table or policy-based routing configuration. If there is a match, the firewall will discard the packet. If there is no match, the firewall will process the packet based on the next IPv4 ACP entry or implicitly discard it if no further IPv4 ACP entries exist. Optional. Discards packets that are matched by the IPv4 ACL and destined for any local interface on the unit. These packets, had they been allowed, would be terminated by the unit and not routed or forwarded to other destinations. Using the self keyword is helpful when forbidding certain access to the unit.
self
Default Values
By default, all AOS security features are disabled and there are no configured IPv4 ACP entries.
Command History
Release 2.1 Command was introduced.
Functional Notes
AOS IPv4 ACPs are used to allow, discard, or manipulate (using network address translation (NAT)) data for each physical interface. Each IPv4 ACP consists of an action (allow, discard, nat) and a selector (IPv4 ACL). When packets are received on an interface, the configured IPv4 ACPs are applied to determine whether the data will be processed or discarded.
60000CRG0-35B
2780
An implicit discard exists at the end of every IPv4 ACP. Specifying a discard list is unnecessary in most applications and should be used with caution. A discard list can adversely affect certain functions of a unit (virtual private network (VPN), routing protocols, etc.). Specifying an empty IPv4 ACL or a nonexistent IPv4 ACL in an IPv4 ACP will result in an implicit permit. Usage Examples
The following example configures the IPv4 ACP named UNTRUSTED to discard any traffic that matches the IPv4 ACL named INWEB: (config)#ip policy-class UNTRUSTED (config-policy-class)#discard list INWEB
60000CRG0-35B
2781
Syntax Description
<acl name> Specifies the IPv4 ACL against which to check traffic before allowing packets to enter the interface. All packets not matched by the IPv4 ACL will be processed by the next IPv4 ACP entry or implicitly discarded if no further IPv4 ACP entries exist. Specifies the address of the private IPv4 host to which the translated packets are destined. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). corresponding to the specified post-NAT destination address. no-alg Optional. Allows packets matching the IPv4 ACP entry to traverse the firewall without being processed by the application-level gateways (ALGs). This parameter, along with the appropriate IPv4 ACL, prevents specific destinations from being processed by the ALGs. Optional. Translates the original destination port to a user-specified port.
address vrf <ip address> <vrf name> Specifies the VPN routing and forwarding (VRF) instance
Default Values
By default, all AOS security features are disabled and there are no configured IPv4 ACP entries.
Command History
Release 2.1 Release 16.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the no-alg parameter. Command was expanded to include the vrf parameter. Syntax for the address vrf parameter was altered.
60000CRG0-35B
2782
Functional Notes
AOS IPv4 ACPs are used to allow, discard, or manipulate (using network address translation (NAT)) data for each physical interface. Each IPv4 ACP consists of an action (allow, discard, nat) and a selector (ACL). When packets are received on an interface, the configured IPv4 ACPs are applied to determine whether the data will be processed or discarded.
An implicit discard exists at the end of every IPv4 ACP. Specifying a discard list is unnecessary in most applications and should be used with caution. A discard list can adversely affect certain functions of a unit (VPN, routing protocols, etc.). Specifying an empty IPv4 ACL or a nonexistent IPv4 ACL in an IPv4 ACP will result in an implicit permit.
The optional vrf <vrf name> parameter specifies the VRF instance. The VRF does not have to be the same VRF from which the packet originated. VRF on an AOS product allows a single physical router to be partitioned into multiple virtual routers. Each router instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF indicates that the specified address corresponds to the default unnamed VRF.
Usage Examples
The following example enables NAT for traffic that matches the IPv4 ACL INWEB and changes the destination address to 192.168.0.253: (config)#ip policy-class UNTRUSTED (config-policy-class)#nat destination list INWEB address 192.168.0.253
60000CRG0-35B
2783
Syntax Description
<acl name> Specifies the IPv4 ACL against which to check traffic before allowing packets to enter the interface. All packets not matched by the IPv4 ACL will be processed by the next IPv4 ACP entry or implicitly discarded if no further IPv4 ACP entries exist. Specifies the NAT pool to use for address mapping. If the destination IPv4 address does not fall within the global range of the specified pool, the packet will be processed by the next IPv4 ACP entry or implicitly discarded if no further IPv4 ACP entries exist. Optional. Allows packets matching the IPv4 ACP entry to traverse the firewall without being processed by the application-level gateways (ALGs). This parameter, along with the appropriate IPv4 ACL, prevents specific destinations from being processed by the ALGs.
no-alg
Default Values
By default, all AOS security features are disabled and there are no configured IPv4 ACP entries.
Command History
Release 17.4 Command was introduced.
Functional Notes
AOS IPv4 ACPs are used to allow, discard, or manipulate (using NAT) data for each physical interface. Each IPv4 ACP consists of an action (allow, discard, nat) and a selector (ACL). When packets are received on an interface, the configured IPv4 ACPs are applied to determine whether the data will be processed or discarded.
An implicit discard exists at the end of every IPv4 ACP. Specifying a discard list is unnecessary in most applications and should be used with caution. A discard list can adversely affect certain functions of a unit (virtual private network (VPN), routing protocols, etc.). Specifying an empty IPv4 ACL or a nonexistent IPv4 ACL in an IPv4 ACP will result in an implicit permit.
60000CRG0-35B
2784
Usage Examples
The following example enables NAT for traffic that matches the IPv4 ACL OUTSIDE and uses the NAT pool POOL1 to map addresses: (config)#ip policy-class PUBLIC (config-policy-class)#nat destination list OUTSIDE pool POOL1
60000CRG0-35B
2785
Syntax Description
<acl name> Specifies the IPv4 ACL against which to check traffic before allowing packets to enter the interface. All packets not matched by the IPv4 ACL will be processed by the next IPv4 ACP entry or implicitly discarded if no further IPv4 ACP entries exist. Specifies the IPv4 address from which the translated packets will be sourced. IPv4 addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). corresponding to the specified post-NAT source address. interface <interface> Specifies the interface from which the translated packets will be sourced. The primary IPv4 address of an interface is used as the source IPv4 address for translated packets. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id]>. For example, for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; and for an ATM subinterface, use atm 1.1. Type nat source list <acl name> interface ? for a list of valid interfaces.
address vrf <ip address> <vrf name> Specifies the VPN routing and forwarding (VRF) instance
60000CRG0-35B
2786
IPv4 Access Control Policy Command Set Optional. Specifies the IPv4 ACP against which to match traffic. The firewall attempts to match the specified IPv4 ACP with the IPv4 ACP that is applied to the packet's egress interface as determined by the routing table or policy-based routing configuration. If there is a match, the firewall will process the packet. If there is no match, the firewall will process the packet based on the next IPv4 ACP entry or implicitly discard it if no further IPv4 ACP entries exist. Allows multiple source IPv4 addresses to be replaced with the single IPv4 address specified or the primary IPv4 address of the specified interface. This conceals private IPv4 addresses from outside the local network. The overload command is not optional and must be used when using the nat source list command with a single address or interface. To perform static 1:1 NAT, use a network address translation (NAT) pool instead (refer to nat source list <acl name> pool <pool name> on page 2789). Optional. Allows packets matching the IPv4 ACP entry to traverse the firewall without being processed by the application-level gateways (ALGs). This parameter, along with the appropriate IPv4 ACL, prevents specific sources from being processed by the ALGs. For example, this option can be used to prevent specific hosts from being uniform resource locator (URL) filtered by configuring an IPv4 ACP entry with the no-alg parameter that matches specific hosts followed by another IPv4 ACP entry that matches remaining hosts. The no-alg parameter can be placed before or after the policy <acp name> parameter.
overload
no-alg
Default Values
By default, all AOS security features are disabled and there are no configured IPv4 ACP entries.
Command History
Release 2.1 Release 16.1 Release 17.1 Release A4.01 Command was introduced. Command was expanded to include the no-alg parameter. Command was expanded to include the vrf parameter. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface and alter the syntax for the address vrf parameter.
60000CRG0-35B
2787
Functional Notes
AOS IPv4 ACPs are used to allow, discard, or manipulate (using NAT) data for each physical interface. Each IPv4 ACP consists of an action (allow, discard, nat) and a selector (ACL). When packets are received on an interface, the configured IPv4 ACPs are applied to determine whether the data will be processed or discarded.
An implicit discard exists at the end of every IPv4 ACP. Specifying a discard list is unnecessary in most applications and should be used with caution. A discard list can adversely affect certain functions of a unit (VPN, routing protocols, etc.). Specifying an empty IPv4 ACL or a nonexistent IPv4 ACL in an IPv4 ACP will result in an implicit permit.
The optional vrf <vrf name> parameter specifies the VRF instance corresponding to the specified address. (If an interface is specified, the VRF of that interface is used.) The VRF does not have to be the same VRF from which the packet originated. VRF on an AOS product allows a single physical router to be partitioned into multiple virtual routers. Each router VRF instance has its own route table and interface assignments. Beginning with Release 16.1, all AOS routers supporting multiple VRF instances (multi-VRF) have an unnamed default VRF instance regardless of whether multi-VRF is configured. Therefore, executing the abovementioned commands without specifying a VRF indicates that the specified address corresponds to the default unnamed VRF.
Usage Examples
The following configuration enables NAT for traffic that matches the IPv4 ACL MATCHALL and changes the source address to 63.12.1.2: (config)#ip policy-class UNTRUSTED (config-policy-class)#nat source list MATCHALL address 63.12.1.2 overload
60000CRG0-35B
2788
Syntax Description
<acl name> Specifies the IPv4 ACL against which to check traffic before allowing packets to enter the interface. All packets not matched by the IPv4 ACL will be processed by the next IPv4 ACP entry or implicitly discarded if no further IPv4 ACP entries exist. Specifies the network address translation (NAT) pool to use for address mapping. If the source IPv4 address does not fall within the local range of the specified pool, the packet will be processed by the next IPv4 ACP entry or implicitly discarded if no further IPv4 ACP entries exist. Optional. Specifies the IPv4 ACP against which to match traffic. The firewall attempts to match the specified IPv4 ACP with the IPv4 ACP that is applied to the packet's egress interface as determined by the routing table or policy-based routing configuration. If there is a match, the firewall will process the packet. If there is no match, the firewall will process the packet based on the next IPv4 ACP entry or implicitly discard it if no further IPv4 ACP entries exist. Optional. Allows packets matching the IPv4 ACP entry to traverse the firewall without being processed by the application-level gateways (ALGs). This parameter, along with the appropriate IPv4 ACL, prevents specific sources from being processed by the ALGs. For example, this option can be used to prevent specific hosts from being uniform resource locator (URL) filtered by configuring an IPv4 ACP entry with the no-alg parameter that matches specific hosts followed by another IPv4 ACP entry that matches remaining hosts. The no-alg parameter can be placed before or after the policy <acp name> parameter.
no-alg
Default Values
By default, all AOS security features are disabled and there are no configured IPv4 ACP entries.
60000CRG0-35B
2789
Command History
Release 17.4 Command was introduced.
Functional Notes
AOS IPv4 ACPs are used to allow, discard, or manipulate (using NAT) data for each physical interface. Each IPv4 ACP consists of an action (allow, discard, nat) and a selector (ACL). When packets are received on an interface, the configured IPv4 ACPs are applied to determine whether the data will be processed or discarded.
An implicit discard exists at the end of every IPv4 ACP. Specifying a discard list is unnecessary in most applications and should be used with caution. A discard list can adversely affect certain functions of a unit (virtual private network (VPN), routing protocols, etc.). Specifying an empty IPv4 ACL or a nonexistent IPv4 ACL in an IPv4 ACP will result in an implicit permit. Usage Examples
The following example configures the IPv4 ACP PRIVATE using an undefined IPv4 ACL that matches all traffic, specifies the NAT pool POOL1, and specifies that the traffic matching this entry should be destined for the PUBLIC policy class: (config)#ip policy-class PRIVATE (config-policy-class)#nat source list MATCHALL pool POOL1 policy PUBLIC
60000CRG0-35B
2790
To create an extended IPv6 ACL and activate the Extended IPv6 ACL Configuration mode, enter the ipv6 access-list extended <ipv6 acl name> command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#ipv6 access-list extended MATCHALLv6 (config-ext6-nacl)#
An IPv6 ACL will remain inactive until it is assigned to an active IPv6 ACP. For more information on configuring and activating IPv6 ACPs, refer to the IPv6 Access Control Policy Command Set on page 2821. Technology Review
IPv6 ACPs and ACLs regulate traffic through the routed network. When designing your traffic flow configuration, it is important to keep the following in mind: An IPv6 ACL serves as a packet selector, defining exactly which packets should take the given action. An IPv6 ACP defines the action to take on the packets selected by the ACL. An IPv6 ACL is inactive until it is assigned to an active IPv6 ACP. An IPv6 ACP is inactive until it is assigned to an interface.
60000CRG0-35B
2791
IPv6 ACPs are used to allow or discard data for each physical interface. Each IPv6 ACP consists of an action (allow, discard) and a selector (IPv6 ACL). In a sense, the IPv6 ACPs answer the question, What should I do? while the IPv6 ACLs answer the question, On which packets? When IPv6 packets are received on an interface with an IPv6 ACP applied, the ACP is used to determine whether the data is processed or discarded. Both IPv6 ACLs and ACPs are order dependent. When a packet is evaluated, the matching engine begins with the first entry in the list and progresses through the entries until it finds a match. The first entry that matches is executed. The IPv6 ACP has an implicit discard at the end of the list. Typically, the most specific entries should be at the top and the most general at the bottom. IPv6 Access Control Lists IPv6 ACLs are used as packet selectors by IPv6 ACPs. They must be assigned to an IPv6 ACP in order to be active.
IPv6 ACPs must use an IPv6 ACL. You cannot apply an IPv4 ACL to an IPv6 ACP, or vice versa. In addition, all IPv6 ACLs and IPv6 ACPs must have a different name than any configured IPv4 ACLs or IPv4 ACPs.
IPv6 ACLs are composed of an ordered list of entries. Each entry contains two parts: an action (permit or deny) and a packet pattern. A permit action is used to allow packets (meeting the specified pattern) to enter the router system. A deny action is used to disregard packets (that do not match the specified pattern) and proceed to the next entry on the ACP. In IPv4, packets either match a permit or a deny entry in the ACL. In IPv6, if no match is found between the packet and the match criteria, a miss entry is passed to the application using the ACL. Depending on the application, the miss can be processed differently. For example, with typical IPv6 traffic, access groups treat a miss as a deny, effectually giving a deny any any at the end of the IPv6 ACL. For IPv6 Neighbor Discovery (ND) protocol messages, however, access groups treat miss packets as a permit, resulting in a permit for ND before the end of the ACL. The AOS provides two types of IPv6 ACLs: standard and extended. A standard IPv6 ACL allows source IPv6 address packet patterns only. An extended IPv6 ACL can specify patterns using most fields in the IPv6 header, as well as the TCP header, UDP header, or ICMPv6 message type or code. Creating and Assigning IPv6 ACLs and ACPs Creating IPv6 ACPs and ACLs to regulate traffic through the routed network is a four-step process: Step 1: Enable the security features of AOS using the ipv6 firewall command. Refer to the command ipv6 firewall on page 1102 for more information. Step 2: Create an IPv6 ACP that uses a configured IPv6 ACL by issuing the ipv6 policy-class command. AOS IPv6 ACPs are used to allow or discard data for each physical interface. Each IPv6 ACP consists of an action (allow, discard) and a selector (IPv6 ACL). When IPv6 packets are received on an interface, the configured IPv6 ACPs are applied to determine whether the data will be processed or discarded.
60000CRG0-35B
2792
Step 3: Create an IPv6 ACL to permit or deny specified IPv6 traffic by using either the ipv6 access-list extended or ipv6 access-list standard command. Standard IPv6 ACLs match based on the source IPv6 address of the packet. Extended IPv6 ACLs match based on the source and destination of the packet. Refer to the command ipv6 access-list extended <ipv6 acl name> on page 1098 or the command ipv6 access-list standard <ipv6 acl name> on page 1100 for more information. Sources can be expressed in one of three ways: 1. Using the keyword any to match any IPv6 address. 2. Using host <ipv6 address> to specify a single host address. 3. Using the <ipv6 prefix/prefix-length> to specify a source IPv6 address to match. Step 4: Apply the created IPv6 ACP to an interface. To assign an IPv6 ACP to an interface, enter the interface configuration mode for the desired interface and enter ipv6 access-policy <ipv6 acp name>. The following example assigns IPv6 ACP UNTRUSTED to the Ethernet 0/1 interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 access-policy UNTRUSTED
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 exit on page 71 interface on page 72 The following are commands used to configure an extended IPv6 ACL. Extended IPv6 ACL configuration includes specifying an IPv6 ACL action, a protocol, a packet source, a source port, a packet destination, and a destination port. These commands are described in this section in alphabetical order. deny <protocol> <source> <destination> on page 2795 deny [tcp | udp] <source> <source port> <destination> <destination port> <tcp flags> on page 2797 deny icmpv6 <source> <destination> on page 2801 permit <protocol> <source> <destination> on page 2805 permit [tcp | udp] <source> <source port> <destination> <destination port> <tcp flags> on page 2807 permit icmpv6 <source> <destination> on page 2811 remark <remark> on page 2815
60000CRG0-35B
2793
The following are commands for configuring a standard IPv6 ACL. Standard IPv6 ACL configuration includes specifying an ACL action and a packet source. These commands are described in this section in alphabetical order. deny <source> on page 2816 permit <source> on page 2818 remark <remark> on page 2820
60000CRG0-35B
2794
<source>
Default Values
By default, all AOS IPv6 security features are disabled, and there are no configured IPv6 ACLs.
Command History
Release 18.1 Command was introduced.
60000CRG0-35B
2795
Functional Notes
IPv6 ACLs are used as packet selectors by different AOS features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. IPv6 ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An IPv6 ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit ACL is used to match packets (meeting the specified pattern) and allow them to enter the router system or specify that the feature using the ACL should apply its action to this traffic. A deny ACL advances AOS to the next ACP entry, discards the traffic, or specifies that the feature using the ACL should not apply its action to this traffic. AOS provides two types of IPv6 ACLs: standard and extended. Standard IPv6 ACLs match based on the source of the packet. Extended IPv6 ACLs match based on the source and destination of the packet. ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
Usage Examples
The following example creates an entry in the Untrustedv6 IPv6 ACL that denies IPv6 traffic matching source IPv6 prefix 2001:DB8:3F::/64 and any destination IPv6 address: (config)#ipv6 access-list extended Untrustedv6 (config-ext6-nacl)#deny ipv6 2001:DB8:3F::/64 any
60000CRG0-35B
2796
deny [tcp | udp] <source> <source port> <destination> <destination port> <tcp flags>
Use the deny [tcp | udp] command to configure the extended Internet Protocol version 6 (IPv6) access control list (ACL) to deny specified Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) packets entry into the routing system. This command provides traffic matching based on the IPv6 header field and the upper layer protocol flags (TCP or UDP). Use the no form of this command to remove the deny parameter from the IPv6 ACL. Variations of this command include:
deny tcp <source> <destination> deny tcp <source> <source port> <destination> deny tcp <source> <source port> <destination> <destination port> deny tcp <source> <source port> <destination> <destination port> <tcp flags> deny udp <source> <destination> deny udp <source> <source port> <destination> deny udp <source> <source port> <destination> <destination port>
Syntax Description
tcp udp <source> Specifies the IPv6 data protocol as TCP, indicating that TCP upper-layer protocol headers and fields are used for matching in this ACL entry. Specifies the IPv6 data protocol as UDP, indicating that UDP upper-layer protocol headers and fields are used for matching in this ACL entry. Specifies the source used for IPv6 packet matching. Sources can be expressed in one of three ways: 1. Using the keyword any to match any IPv6 address. 2. Using host <ipv6 address> to specify a single host address. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. 3. Using <ipv6 prefix/prefix-length> to specify a source address to match. IPv6 prefixes should be expressed in colon hexadecimal format (X:X::X/<Z>). For example, 2001:DB8:3F::/64. The prefix length (<Z>) is an integer with a value between 0 and 128. <source port> Optional. Specifies that traffic comparison is conducted on the source port for the associated protocol (TCP or UDP). When you specify a source port, you must enter a port operator and a port number or name. The following keywords and port numbers/names are supported for the <source port> field: any eq <port number/name> gt <port number/name> lt <port number/name> Matches any destination port. Matches only packets equal to specified port number. Matches only packets with a port number greater than the specified port number. Matches only packets with a port number less than the specified port number.
60000CRG0-35B
2797
IPv6 Access Control List Command Set Matches only packets that are not equal to the specified port number.
range <beginning port number/ name> Matches only packets that contain a port <ending port number/name> number in the specified range. <port number> Specifies the port number used by TCP or UDP to pass information to upper layers using the following syntax: <0-65535>. All ports below 1024 are considered well-known ports, and are controlled by the Internet Assigned Numbers Authority (IANA). All ports above 1024 are dynamically assigned ports that include registered ports for vendor-specific applications. The following UDP port numbers can be specified using the associated names: biff (Port 512)ntp (Port 123) bootpc (Port 68) bootps (Port 67) discard (Port 9) dnsix (Port 195) domain (Port 53) echo (Port 7) isakmp (Port 500) mobile-ip (Port 434) pim-auto-rp (Port 496) rip (Port 520) snmp (Port 161) snmptrap (Port 162) sunrpc (Port 111) syslog (Port 514) tacacs (Port 49) talk (Port 517)
<port name>
nameserver (Port 42) tftp (Port 69) netbios-dgm (Port 138)time (Port 37) netbios-ns (Port 137) who (Port 513) netbios-ss (Port 139) xdmcp (Port 177) The following TCP port numbers can be specified using the associated names: bgp (Port 179) chargen (Port 19) cmd (Port 514) daytime (Port 13) discard (Port 9) domain (Port 53) echo (Port 7) exec (Port 512) finger (Port 79) ftp (Port 21) lpd (Port 515) nntp (Port 119) pim-auto-rp (Port 496) pop2 (Port 109) pop3 (Port 110) smtp (Port 25) sunrpc (Port 111) syslog (Port 514) tacacs (Port 49) talk (Port 517)
60000CRG0-35B
2798
IPv6 Access Control List Command Set gopher (Port 70) ident (Port 113) irc (Port 194) klogin (Port 543) kshell (Port 544) login (Port 513) tftp (Port 69) time (Port 37) uucp (Port 540) whois (Port 43) www (Port 80)
<destination>
Specifies the destination used for IPv6 packet matching. Destinations can be expressed in one of three ways: 1. Using the keyword any to match any IPv6 address. 2. Using host <ipv6 address> to specify a single host address. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. 3. Using <ipv6 prefix/prefix-length> to specify a destination address to match. IPv6 prefixes should be expressed in colon hexadecimal format (X:X::X/<Z>). For example, 2001:DB8:3F::/64. The prefix length (<Z>) is an integer with a value between 0 and 128.
<destination port>
Optional. Specifies that traffic comparison is conducted on the destination port for the associated protocol (TCP or UDP).The same keywords and port numbers/names used for the <source port> field are valid for the <destination port> field. Refer to previously listed <source port> for more details. Optional. When used with the TCP protocol, this option defines which flag in the TCP flag to use for traffic matching. The following keywords are the supported TCP flags: ack fin psh rst syn urg Matches the TCP acknowledgement header flag. Matches the TCP finish header flag. Matches the TCP push header flag. Matches the TCP reset header flag. Matches the TCP synchronize header flag. Matches the TCP urgent pointer header flag.
<tcp flags>
Default Values
By default, all AOS IPv6 security features are disabled, and there are no configured IPv6 ACLs.
Command History
Release 18.1 Command was introduced.
60000CRG0-35B
2799
Functional Notes
IPv6 ACLs are used as packet selectors by different AOS features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. IPv6 ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An IPv6 ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit ACL is used to match packets (meeting the specified pattern) and allow them to enter the router system or specify that the feature using the ACL should apply its action to this traffic. A deny ACL advances AOS to the next ACP entry, discards the traffic, or specifies that the feature using the ACL should not apply its action to this traffic. AOS provides two types of IPv6 ACLs: standard and extended. Standard IPv6 ACLs match based on the source of the packet. Extended IPv6 ACLs match based on the source and destination of the packet. ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
Usage Examples
The following example creates an entry in the Untrustedv6 IPv6 ACL that denies IPv6 traffic matching TCP source IPv6 prefix 2001:DB8:3F::/64 from port 1080 and any destination IPv6 address: (config)#ipv6 access-list extended Untrustedv6 (config-ext6-nacl)#deny tcp ipv6 2001:DB8:3F::/64 eq 1080 any
60000CRG0-35B
2800
Syntax Description
<source> Specifies the source used for IPv6 packet matching. Sources can be expressed in one of three ways: 1. Using the keyword any to match any IPv6 address. 2. Using host <ipv6 address> to specify a single host address. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. 3. Using <ipv6 prefix/prefix-length> to specify a source address to match. IPv6 prefixes should be expressed in colon hexadecimal format (X:X::X/<Z>). For example, 2001:DB8:3F::/64. The prefix length (<Z>) is an integer with a value between 0 and 128. <destination> Specifies the destination used for IPv6 packet matching. Destinations can be expressed in one of three ways: 1. Using the keyword any to match any IPv6 address. 2. Using host <ipv6 address> to specify a single host address. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. 3. Using <ipv6 prefix/prefix-length> to specify a destination address to match. IPv6 prefixes should be expressed in colon hexadecimal format (X:X::X/<Z>). For example, 2001:DB8:3F::/64. The prefix length (<Z>) is an integer with a value between 0 and 128. <message name> Optional. Specifies the ICMP message type used for matching ICMPv6 packets. ICMP message names are specified using one of the following keywords: beyond-scope Indicates the destination is unreachable because it is beyond the scope of the source address. Indicates the destination address is unreachable. Indicates a home agent address discovery reply message.
dest-unreachable dhaad-reply
60000CRG0-35B
2801
dhaad-request echo-reply echo-request header hop-limit mld-query mld-reduction mld-report mp-advertisement mp-solicitation nd-na nd-ns next-header no-admin
Indicates a home agent address discovery request message. Indicates an echo reply message. Indicates an echo request message. Indicates an erroneous header field has been encountered. Indicates the hop limit has been exceeded in packet transit. Indicates a mulitcast listener discovery query message. Indicates a multicast listener discovery reduction message. Indicates a multicast listener discovery report message. Indicates a mobile prefix advertisement message. Indicates a mobile prefix solicitation message. Indicates a Neighbor Discovery neighbor advertisement message. Indicates a Neighbor Discovery neighbor solicitation message. Indicates an unrecognized next header type was encountered. Indicates the destination is unreachable because communication with the destination is administratively prohibited. Indicates the destination is unreachable because there is no route to the destination. Indicates the packet is too large. Indicates that an unrecognized IPv6 option was encountered. Indicates there is a parameter problem with the packet. Indicates the destination is unreachable because the port is unreachable.
no-route
60000CRG0-35B
2802
reassembly-timeout redirect renum-command renum-result renum-seq-number router-advertisement router-renumbering router-solicitation time-exceeded unreachable <message type>
Indicates that the fragment reassembly time limit has been exceeded. Indicates a redirect message. Indicates a router renumbering command. Indicates a router renumbering result. Indicates a router sequence number reset. Indicates a router advertisement message. Indicates a router renumbering for all codes. Indicates an router solicitation message. Indicates the time limit has been exceeded. Indicates the destination is unreachable.
Optional. Specifies the ICMP message type for matching ICMPv6 packets. When you specify an ICMP message type, you must also specify an ICMP message code. Message types range from 0 to 127 for error messages and from 128 to 255 for informational messages. Optional. Specifies the ICMP message code for matching ICMPv6 packets. You must specify the message code when you specify the ICMP message type. Message code range is 0 to 255.
<message code>
Default Values
By default, all AOS IPv6 security features are disabled, and there are no configured IPv6 ACLs.
Command History
Release 18.1 Command was introduced.
60000CRG0-35B
2803
Functional Notes
IPv6 ACLs are used as packet selectors by different AOS features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. IPv6 ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An IPv6 ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit ACL is used to match packets (meeting the specified pattern) and allow them to enter the router system or specify that the feature using the ACL should apply its action to this traffic. A deny ACL advances AOS to the next ACP entry, discards the traffic, or specifies that the feature using the ACL should not apply its action to this traffic. AOS provides two types of IPv6 ACLs: standard and extended. Standard IPv6 ACLs match based on the source of the packet. Extended IPv6 ACLs match based on the source and destination of the packet. ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
Usage Examples
The following example creates an extended IPv6 ACL named Untrustedv6 IPv6 ACL that denies any IPv6 traffic from a source with the same prefix bits as 2001:DB8:3F::/64, headed to a destination of 2001:DB8:85A3::8A2E:0370:7334, and an ICMPv6 message type of echo-request: (config)#ipv6 access-list extended Untrustedv6 (config-ext6-nacl)#deny icmpv6 2001:DB8:3F::/64 2001:DB8:85A3::8A2E:0370:7334 echo-request
60000CRG0-35B
2804
<source>
Default Values
By default, all AOS IPv6 security features are disabled, and there are no configured IPv6 ACLs.
Command History
Release 18.1 Command was introduced.
60000CRG0-35B
2805
Functional Notes
IPv6 ACLs are used as packet selectors by different AOS features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. IPv6 ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An IPv6 ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit ACL is used to match packets (meeting the specified pattern) and allow them to enter the router system or specify that the feature using the ACL should apply its action to this traffic. A deny ACL advances AOS to the next ACP entry, discards the traffic, or specifies that the feature using the ACL should not apply its action to this traffic. AOS provides two types of IPv6 ACLs: standard and extended. Standard IPv6 ACLs match based on the source of the packet. Extended IPv6 ACLs match based on the source and destination of the packet. ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
Usage Examples
The following example creates an entry in the Untrustedv6 IPv6 ACL that permits IPv6 traffic matching source IPv6 prefix 2001:DB8:3F::/64 and any destination IPv6 address: (config)#ipv6 access-list extended Untrustedv6 (config-ext6-nacl)#permit ipv6 2001:DB8:3F::/64 any
60000CRG0-35B
2806
permit [tcp | udp] <source> <source port> <destination> <destination port> <tcp flags>
Use the permit [tcp | udp] command to configure the extended Internet Protocol version 6 (IPv6) access control list (ACL) to permit specified Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) packets entry into the routing system. This command provides traffic matching based on the IPv6 header field and the upper layer protocol flags (TCP or UDP). Use the no form of this command to remove the deny parameter from the IPv6 ACL. Variations of this command include:
permit tcp <source> <destination> permit tcp <source> <source port> <destination> permit tcp <source> <source port> <destination> <destination port> permit tcp <source> <source port> <destination> <destination port> <tcp flags> permit udp <source> <destination> permit udp <source> <source port> <destination> permit udp <source> <source port> <destination> <destination port>
Syntax Description
tcp udp <source> Specifies the IPv6 data protocol as TCP, indicating that TCP upper-layer protocol headers and fields are used for matching in this ACL entry. Specifies the IPv6 data protocol as UDP, indicating that UDP upper-layer protocol headers and fields are used for matching in this ACL entry. Specifies the source used for IPv6 packet matching. Sources can be expressed in one of three ways: 1. Using the keyword any to match any IPv6 address. 2. Using host <ipv6 address> to specify a single host address. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. 3. Using <ipv6 prefix/prefix-length> to specify a source address to match. IPv6 prefixes should be expressed in colon hexadecimal format (X:X::X/<Z>). For example, 2001:DB8:3F::/64. The prefix length (<Z>) is an integer with a value between 0 and 128. <source port> Optional. Specifies that traffic comparison is conducted on the source port for the associated protocol (TCP or UDP). When you specify a source port, you must enter a port operator and a port number or name. The following keywords and port numbers/names are supported for the <source port> field: any eq <port number/name> gt <port number/name> lt <port number/name> Matches any destination port. Matches only packets equal to specified port number. Matches only packets with a port number greater than the specified port number. Matches only packets with a port number less than the specified port number.
60000CRG0-35B
2807
Command Reference Guide neq <port number/name> range <beginning port number/ name> <ending port number/name> <port number>
IPv6 Access Control List Command Set Matches only packets that are not equal to the specified port number. Matches only packets that contain a port number in the specified range.
Specifies the port number used by TCP or UDP to pass information to upper layers using the following syntax: <0-65535>. All ports below 1024 are considered well-known ports, and are controlled by the Internet Assigned Numbers Authority (IANA). All ports above 1024 are dynamically assigned ports that include registered ports for vendor-specific applications. The following UDP port numbers can be specified using the associated names: biff (Port 512) bootpc (Port 68) bootps (Port 67) discard (Port 9) dnsix (Port 195) domain (Port 53) echo (Port 7) isakmp (Port 500) mobile-ip (Port 434) ntp (Port 123) pim-auto-rp (Port 496) rip (Port 520) snmp (Port 161) snmptrap (Port 162) sunrpc (Port 111) syslog (Port 514) tacacs (Port 49) talk (Port 517)
<port name>
nameserver (Port 42) tftp (Port 69) netbios-dgm (Port 138)time (Port 37) netbios-ns (Port 137) who (Port 513) netbios-ss (Port 139) xdmcp (Port 177) The following TCP port numbers can be specified using the associated names: bgp (Port 179) chargen (Port 19) cmd (Port 514) daytime (Port 13) discard (Port 9) domain (Port 53) echo (Port 7) exec (Port 512) finger (Port 79) ftp (Port 21) lpd (Port 515) nntp (Port 119) pim-auto-rp (Port 496) pop2 (Port 109) pop3 (Port 110) smtp (Port 25) sunrpc (Port 111) syslog (Port 514) tacacs (Port 49) talk (Port 517)
60000CRG0-35B
2808
IPv6 Access Control List Command Set gopher (Port 70) ident (Port 113) irc (Port 194) klogin (Port 543) kshell (Port 544) login (Port 513) tftp (Port 69) time (Port 37) uucp (Port 540) whois (Port 43) www (Port 80)
<destination>
Specifies the destination used for IPv6 packet matching. Destinations can be expressed in one of three ways: 1. Using the keyword any to match any IPv6 address. 2. Using host <ipv6 address> to specify a single host address. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. 3. Using <ipv6 prefix/prefix-length> to specify a destination address to match. IPv6 prefixes should be expressed in colon hexadecimal format (X:X::X/<Z>). For example, 2001:DB8:3F::/64. The prefix length (<Z>) is an integer with a value between 0 and 128.
<destination port>
Optional. Specifies that traffic comparison is conducted on the destination port for the associated protocol (TCP or UDP).The same keywords and port numbers/names used for the <source port> field are valid for the <destination port> field. Refer to previously listed <source port> for more details. Optional. When used with the TCP protocol, this option defines which flag in the TCP flag to use for traffic matching. The following keywords are the supported TCP flags: ack fin psh rst syn urg Matches the TCP acknowledgement header flag. Matches the TCP finish header flag. Matches the TCP push header flag. Matches the TCP reset header flag. Matches the TCP synchronize header flag. Matches the TCP urgent pointer header flag.
<tcp flags>
Default Values
By default, all AOS IPv6 security features are disabled, and there are no configured IPv6 ACLs.
Command History
Release 18.1 Command was introduced.
60000CRG0-35B
2809
Functional Notes
IPv6 ACLs are used as packet selectors by different AOS features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. IPv6 ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An IPv6 ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit ACL is used to match packets (meeting the specified pattern) and allow them to enter the router system or specify that the feature using the ACL should apply its action to this traffic. A deny ACL advances AOS to the next ACP entry, discards the traffic, or specifies that the feature using the ACL should not apply its action to this traffic. AOS provides two types of IPv6 ACLs: standard and extended. Standard IPv6 ACLs match based on the source of the packet. Extended IPv6 ACLs match based on the source and destination of the packet. ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
Usage Examples
The following example creates an entry in the Untrustedv6 IPv6 ACL that permits IPv6 traffic matching TCP source IPv6 prefix 2001:DB8:3F::/64 from port 1080 and any destination IPv6 address: (config)#ipv6 access-list extended Untrustedv6 (config-ext6-nacl)#permit tcp ipv6 2001:DB8:3F::/64 eq 1080 any
60000CRG0-35B
2810
Syntax Description
<source> Specifies the source used for IPv6 packet matching. Sources can be expressed in one of three ways: 1. Using the keyword any to match any IPv6 address. 2. Using host <ipv6 address> to specify a single host address. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. 3. Using <ipv6 prefix/prefix-length> to specify a source address to match. IPv6 prefixes should be expressed in colon hexadecimal format (X:X::X/<Z>). For example, 2001:DB8:3F::/64. The prefix length (<Z>) is an integer with a value between 0 and 128. <destination> Specifies the destination used for IPv6 packet matching. Destinations can be expressed in one of three ways: 1. Using the keyword any to match any IPv6 address. 2. Using host <ipv6 address> to specify a single host address. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. 3. Using <ipv6 prefix/prefix-length> to specify a destination address to match. IPv6 prefixes should be expressed in colon hexadecimal format (X:X::X/<Z>). For example, 2001:DB8:3F::/64. The prefix length (<Z>) is an integer with a value between 0 and 128. <icmp message name> Optional. Specifies the ICMP message type used for matching ICMPv6 packets. ICMP message names are specified using one of the following keywords: beyond-scope Indicates the destination is unreachable because it is beyond the scope of the source address. Indicates the destination address is unreachable. Indicates a home agent address discovery reply message.
dest-unreachable dhaad-reply
60000CRG0-35B
2811
dhaad-request echo-reply echo-request header hop-limit mld-query mld-reduction mld-report mp-advertisement mp-solicitation nd-na nd-ns next-header no-admin
Indicates a home agent address discovery request message. Indicates an echo reply message. Indicates an echo request message. Indicates an erroneous header field has been encountered. Indicates the hop limit has been exceeded in packet transit. Indicates a mulitcast listener discovery query message. Indicates a multicast listener discovery reduction message. Indicates a multicast listener discovery report message. Indicates a mobile prefix advertisement message. Indicates a mobile prefix solicitation message. Indicates a Neighbor Discovery neighbor advertisement message. Indicates an Neighbor Discovery neighbor solicitation message. Indicates an unrecognized next header type was encountered. Indicates the destination is unreachable because communication with the destination is administratively prohibited. Indicates the destination is unreachable because there is no route to the destination. Indicates the packet is too large. Indicates that an unrecognized IPv6 option was encountered. Indicates there is a parameter problem with the packet. Indicates the destination is unreachable because the port is unreachable.
no-route
60000CRG0-35B
2812
reassembly-timeout redirect renum-command renum-result renum-seq-number router-advertisement router-renumbering router-solicitation time-exceeded unreachable <message type>
Indicates that the fragment reassembly time limit has been exceeded. Indicates a redirect message. Indicates a router renumbering command. Indicates a router renumbering result. Indicates a router sequence number reset. Indicates a router advertisement message. Indicates a router renumbering for all codes. Indicates an router solicitation message. Indicates the time limit has been exceeded. Indicates the destination is unreachable.
Optional. Specifies the ICMP message type for matching ICMPv6 packets. When you specify an ICMP message type, you must also specify an ICMP message code. Message types range from 0 to 127 for error messages and from 128 to 255 for informational messages. Optional. Specifies the ICMP message code for matching ICMPv6 packets. You must specify the message code when you specify the ICMP message type. Message code range is 0 to 255.
<message code>
Default Values
By default, all AOS IPv6 security features are disabled, and there are no configured IPv6 ACLs.
Command History
Release 18.1 Command was introduced.
60000CRG0-35B
2813
Functional Notes
IPv6 ACLs are used as packet selectors by different AOS features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. IPv6 ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An IPv6 ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit ACL is used to match packets (meeting the specified pattern) and allow them to enter the router system or specify that the feature using the ACL should apply its action to this traffic. A deny ACL advances AOS to the next ACP entry, discards the traffic, or specifies that the feature using the ACL should not apply its action to this traffic. AOS provides two types of IPv6 ACLs: standard and extended. Standard IPv6 ACLs match based on the source of the packet. Extended IPv6 ACLs match based on the source and destination of the packet. ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
Usage Examples
The following example creates an extended IPv6 ACL named Untrustedv6 that permits any IPv6 traffic from a source with the same prefix bits as 2001:DB8:3F::/64, headed to a destination of 2001:DB8:85A3::8A2E:0370:7334, and an ICMPv6 message type of echo-request: (config)#ipv6 access-list extended Untrustedv6 (config-ext6-nacl)#permit icmpv6 2001:DB8:3F::/64 2001:DB8:85A3::8A2E:0370:7334 echo-request
60000CRG0-35B
2814
remark <remark>
Use the remark command to associate a descriptive tag with an extended Internet Protocol version 6 (IPv6) access control list (ACL). Use the no form of this command to remove the descriptive tag. Syntax Description
<remark> Specifies a descriptive tag for the ACL. Tags can be up to 80 alphanumeric characters enclosed in quotation marks. For example, This list blocks all outbound Web traffic.
Default Values
By default, all AOS IPv6 security features are disabled, and there are no configured IPv6 ACLs.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example specifies a description for extended IPv6 ACL matchall: (config)#ipv6 access-list extended matchall (config-ext6-nacl)#remark Allows all ip traffic from remote location.
60000CRG0-35B
2815
deny <source>
Use the deny command to configure the Internet Protocol version 6 (IPv6) standard access control list (ACL) to deny specified packets entry into the routing system. Use the no form of this command to remove the permit permission from the ACL. Syntax Description
<source> Specifies the source used for IPv6 packet matching. Sources can be expressed in one of three ways: 1. Using the keyword any to match any IPv6 address. 2. Using host <ipv6 address> to specify a single host address. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. 3. Using <ipv6 prefix/prefix-length> to specify a source address to match. IPv6 prefixes should be expressed in colon hexadecimal format (X:X::X/<Z>). For example, 2001:DB8:3F::/64. The prefix length (<Z>) is an integer with a value between 0 and 128.
Default Values
By default, all AOS IPv6 security features are disabled, and there are no configured IPv6 ACLs.
Command History
Release 18.1 Command was introduced.
Functional Notes
IPv6 ACLs are used as packet selectors by different AOS features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. IPv6 ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An IPv6 ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit ACL is used to match packets (meeting the specified pattern) and allow them to enter the router system or specify that the feature using the ACL should apply its action to this traffic. A deny ACL advances AOS to the next ACP entry, discards the traffic, or specifies that the feature using the ACL should not apply its action to this traffic. AOS provides two types of IPv6 ACLs: standard and extended. Standard IPv6 ACLs match based on the source of the packet. Extended IPv6 ACLs match based on the source and destination of the packet. ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
60000CRG0-35B
2816
Usage Examples
The following example creates an IPv6 ACL Untrusted to deny all traffic from a source with the same prefix bits as 2001:DB8:3F::/48: (config)#ipv6 access-list standard Untrusted (config-std6-nacl)#deny 2001:DB8:3F::/48
60000CRG0-35B
2817
permit <source>
Use the permit command to configure the Internet Protocol version 6 (IPv6) standard access control list (ACL) to permit specified packets entry into the routing system. Use the no form of this command to remove the permit permission from the ACL. Syntax Description
<source> Specifies the source used for IPv6 packet matching. Sources can be expressed in one of three ways: 1. Using the keyword any to match any IPv6 address. 2. Using host <ipv6 address> to specify a single host address. IPv6 addresses should be expressed in colon hexadecimal format (X:X:X:X::X). For example, 2001:DB8:1::1. 3. Using <ipv6 prefix/prefix-length> to specify a source address to match. IPv6 prefixes should be expressed in colon hexadecimal format (X:X::X/<Z>). For example, 2001:DB8:3F::/64. The prefix length (<Z>) is an integer with a value between 0 and 128.
Default Values
By default, all AOS IPv6 security features are disabled, and there are no configured IPv6 ACLs.
Command History
Release 18.1 Command was introduced.
Functional Notes
IPv6 ACLs are used as packet selectors by different AOS features (firewall, virtual private network (VPN), quality of service (QoS)); by themselves they do nothing. IPv6 ACLs are composed of an ordered list of entries with an implicit deny all at the end of each list. An IPv6 ACL entry contains two parts: an action (permit or deny) and a packet pattern. A permit ACL is used to match packets (meeting the specified pattern) and allow them to enter the router system or specify that the feature using the ACL should apply its action to this traffic. A deny ACL advances AOS to the next ACP entry, discards the traffic, or specifies that the feature using the ACL should not apply its action to this traffic. AOS provides two types of IPv6 ACLs: standard and extended. Standard IPv6 ACLs match based on the source of the packet. Extended IPv6 ACLs match based on the source and destination of the packet. ACLs are performed in order from the top of the list down. Generally, the most specific entries should be at the top and the more general at the bottom.
60000CRG0-35B
2818
Usage Examples
The following example creates an IPv6 ACL Trusted to permit all traffic from a source with the same prefix bits as 2001:DB8:3F::/48: (config)#ipv6 access-list standard Trusted (config-std6-nacl)#permit 2001:DB8:3F::/48
60000CRG0-35B
2819
remark <remark>
Use the remark command to associate a descriptive tag with a standard Internet Protocol version 6 (IPv6) access control list (ACL). Use the no form of this command to remove the descriptive tag. Syntax Description
<remark> Specifies a descriptive tag for the ACL. Tags can be up to 80 alphanumeric characters enclosed in quotation marks. For example, This list blocks all outbound Web traffic.
Default Values
By default, all AOS IPv6 security features are disabled, and there are no configured IPv6 ACLs.
Command History
Release 18.1 Command was introduced.
Usage Examples
The following example specifies a description for standard IPv6 ACL matchall: (config)#ipv6 access-list standard matchall (config-std6-nacl)#remark Allows all ip traffic from remote location.
60000CRG0-35B
2820
Configured IPv6 ACPs will only be active if the ipv6 firewall command has been entered at the Global Configuration mode prompt to enable the AOS IPv6 security features. All configuration parameters are valid, but no security data processing will be attempted unless the security features are enabled. Before applying an IPv6 ACP to an interface, verify your Telnet or secure shell (SSH) connection will not be affected by the policy. If an IPv6 ACP is applied to the interface you are connecting through and it does not allow Telnet or SSH traffic, your connection will be lost. Technology Review
IPv6 ACPs and ACLs regulate traffic through the routed network. When designing your traffic flow configuration, it is important to keep the following in mind: An IPv6 ACL serves as a packet selector, defining exactly which packets should take the given action. An IPv6 ACP defines the action to take on the packets selected by the ACL. An IPv6 ACL is inactive until it is assigned to an active IPv6 ACP. An IPv6 ACP is inactive until it is assigned to an interface.
60000CRG0-35B
2821
IPv6 ACPs are used to allow or discard data for each physical interface. Each IPv6 ACP consists of an action (allow, discard) and a selector (IPv6 ACL). In a sense, the IPv6 ACPs answer the question, What should I do? while the IPv6 ACLs answer the question, On which packets? When IPv6 packets are received on an interface with an IPv6 ACP applied, the ACP is used to determine whether the data is processed or discarded. Both IPv6 ACLs and ACPs are order dependent. When a packet is evaluated, the matching engine begins with the first entry in the list and progresses through the entries until it finds a match. The first entry that matches is executed. The IPv6 ACP has an implicit discard at the end of the list. Typically, the most specific entries should be at the top and the most general at the bottom. IPv6 Access Control Lists IPv6 ACLs are used as packet selectors by IPv6 ACPs. They must be assigned to an IPv6 ACP in order to be active.
IPv6 ACPs must use an IPv6 ACL. You cannot apply an IPv4 ACL to an IPv6 ACP, or vice versa. In addition, all IPv6 ACLs and IPv6 ACPs must have a different name than any configured IPv4 ACLs or ACPs.
IPv6 ACLs are composed of an ordered list of entries. Each entry contains two parts: an action (permit or deny) and a packet pattern. A permit action is used to allow packets (meeting the specified pattern) to enter the router system. A deny action is used to disregard packets (that do not match the pattern) and proceed to the next entry on the ACP. In IPv4, packets either match a permit or a deny entry in the ACL. In IPv6, if no match is found between the packet and the match criteria, a miss entry is passed to the application using the ACL. Depending on the application, the miss can be processed differently. For example, with typical IPv6 traffic, access groups treat a miss as a deny, effectually giving a deny any any at the end of the IPv6 ACL. For IPv6 Neighbor Discovery (ND) messages, however, access groups treat miss packets as a permit, resulting in a permit for ND before the end of the ACL. The AOS provides two types of IPv6 ACLs: standard and extended. A standard IPv6 ACL allows source IPv6 address packet patterns only. An extended IPv6 ACL may specify patterns using most fields in the IPv6 header and the Transmission Control Protocol (TCP) header, User Datagram Protocol (UDP) header, or Internet Control Message Protocol version 6 (ICMPv6) message type or code. Creating and Assigning IPv6 ACLs and ACPs Creating IPv6 ACPs and ACLs to regulate traffic through the routed network is a four-step process: Step 1: Enable the security features of AOS using the ipv6 firewall command. Refer to the command ipv6 firewall on page 1102 for more information.
60000CRG0-35B
2822
Step 2: Create an IPv6 ACP that uses a configured IPv6 ACL by issuing the ipv6 policy-class command. Refer to the command ipv6 policy-class <ipv6 acp name> on page 1114 for more information. AOS IPv6 ACPs are used to allow or discard data for each physical interface. Each IPv6 ACP consists of an action (allow, discard) and a selector (IPv6 ACL). When IPv6 packets are received on an interface, the configured IPv6 ACPs are applied to determine whether the data will be processed or discarded. Up to 20 IPv6 ACPs can be created. Step 3: Create an IPv6 ACL to permit or deny specified IPv6 traffic by using either the ipv6 access-list extended or ipv6 access-list standard command. Standard IPv6 ACLs match based on the source IPv6 address of the packet. Extended IPv6 ACLs match based on the source and destination of the packet. Refer to the command ipv6 access-list extended <ipv6 acl name> on page 1098 or the command ipv6 access-list standard <ipv6 acl name> on page 1100 for more information. Sources can be expressed in one of three ways: 1. Using the keyword any to match any IPv6 address. 2. Using host <ipv6 address> to specify a single host address. 3. Using the <ipv6-prefix/prefix-length> to specify a source IPv6 address to match. Step 4: Apply the created IPv6 ACP to an interface. To assign an IPv6 ACP to an interface, enter the interface configuration mode for the desired interface and enter ipv6 access-policy <ipv6 acp name>. The following example assigns IPv6 ACP UNTRUSTED to the Ethernet 0/1 interface: (config)#interface ethernet 0/1 (config-eth 0/1)#ipv6 access-policy UNTRUSTED
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. allow list on page 2824 allow reverse list on page 2826 discard list on page 2828
60000CRG0-35B
2823
allow list
Use the allow list command to specify an Internet Protocol version 6 (IPv6) access control list (ACL) to determine which packets are allowed to enter the interface to which the IPv6 access control policy (ACP) is assigned, and create a firewall association in the IPv6 firewall. All associations created by the allow list command are subject to the built-in firewall timers. Variations of this command include:
allow list <ipv6 acl name> allow list <ipv6 acl name> policy <ipv6 acp name> allow list <ipv6 acl name> policy <ipv6 acp name> stateless allow list <ipv6 acl name> self allow list <ipv6 acl name> self stateless allow list <ipv6 acl name> stateless
Syntax Description
<ipv6 acl name> Specifies the IPv6 ACL against which to check traffic before allowing packets to enter the interface. All packets not matched by the IPv6 ACL will be processed by the next IPv6 ACP entry or implicitly discarded if no further ACP entries exist. Optional. Specifies the destination IPv6 ACP against which to match traffic. The IPv6 firewall attempts to match the specified ACP with the ACP that is applied to the packet's egress interface as determined by the routing table. If there is a match, the firewall attempts to match the ACL next. If there is no match, the firewall will process the packet based on the next ACP entry or implicitly discard it if no further ACP entries exist. Optional. Allows packets to pass that are permitted by the IPv6 ACL and destined for any local interface on the unit. These packets are terminated by the unit and are not routed or forwarded to other destinations. Using the self keyword is helpful when opening up remote administrative access to the unit (Telnet, secure shell (SSH), Internet Control Message Protocol (ICMP)). Optional. Enables bypassing of built-in firewall timers. A stateless policy session will time out, but because it does not perform stateful attack checking, a new policy session for existing connections can be easily recreated. Use for trusted traffic or traffic that the firewall is incorrectly blocking as a perceived attack.
self
stateless
Default Values
By default, all AOS IPv6 security features are disabled and there are no configured IPv6 ACP entries.
Command History
Release 18.1 Command was introduced.
60000CRG0-35B
2824
Usage Examples
The following example configures the IPv6 ACP name UNTRUSTED to allow any traffic that matches the IPv6 ACL named INWEB to enter the router system: (config)#ipv6 policy-class UNTRUSTED (config-policy6-class)#allow list INWEB
60000CRG0-35B
2825
Syntax Description
<ipv6 acl name> Specifies the IPv6 ACL against which to check traffic before allowing packets to enter the interface. All packets not matched by the ACL will be processed by the next IPv6 ACP entry or implicitly discarded if no further ACP entries exist. Optional. Specifies the destination IPv6 ACP against which to match traffic. The firewall attempts to match the specified ACP with the ACP that is applied to the packet's egress interface as determined by the routing table. If there is a match, the firewall attempts to match the ACL next. If there is no match, the firewall will process the packet based on the next ACP entry or implicitly discard it if no further ACP entries exist. Optional. Allows packets to pass that are permitted by the IPv6 ACL and destined for any local interface on the unit. These packets are terminated by the unit and are not routed or forwarded to other destinations. Using the self keyword is helpful when opening up remote administrative access to the unit (Telnet, secure shell (SSH), Internet Control Message Protocol (ICMP)). Optional. Enables bypassing of built-in firewall timers. A stateless policy session will time out, but because it does not perform stateful attack checking, a new policy session for existing connections can be easily recreated. Use for trusted traffic or traffic that the firewall is incorrectly blocking as a perceived attack.
self
stateless
Default Values
By default, all AOS IPv6 security features are disabled and there are no configured IPv6 ACP entries.
Command History
Release 18.1 Command was introduced.
60000CRG0-35B
2826
Usage Examples
The following example configures the IPv6 ACP named UNTRUSTED to allow any traffic that matches the IPv6 ACL named INWEB (with source and destination information reversed) to enter the router system: (config)#ipv6 policy-class UNTRUSTED (config-policy6-class)#allow reverse list INWEB
60000CRG0-35B
2827
discard list
Use the discard list command to specify an Internet Protocol version 6 (IPv6) access control list (ACL) to determine which packets are discarded after entering the interface to which the IPv6 access control policy (ACP) is assigned. Packets matched by the IPv6 ACL will be discarded, and no further IPv6 ACP entries will be inspected. All packets not matched by the IPv6 ACL will be processed by the next ACP entry or implicitly discarded if no further ACP entries exist. Variations of this command include:
discard list <ipv6 acl name> discard list <ipv6 acl name> policy <ipv6 acp name> discard list <ipv6 acl name> self
Syntax Description
<ipv6 acl name> Specifies the IPv6 ACL against which to check traffic before discarding the packet. All packets not matched by the IPv6 ACL will be processed by the next IPv6 ACP entry or implicitly discarded if no further ACP entries exist. Optional. Specifies the destination IPv6 ACP against which to match traffic. The firewall attempts to match the specified ACP with the ACP that is applied to the packet's egress interface as determined by the routing table. If there is a match, the firewall attempts to match the ACL next. If there is no match, the firewall will process the packet based on the next IPv6 ACP entry or implicitly discard it if no further ACP entries exist. Optional. Discards packets that are matched by the IPv6 ACL and destined for any local interface on the unit. These packets, had they been allowed, would be terminated by the unit and not routed or forwarded to other destinations.
self
Default Values
By default, all AOS IPv6 security features are disabled and there are no configured IPv6 ACP entries.
Command History
Release 18.1 Command was introduced.
Functional Notes
AOS IPv6 ACPs are used to allow or discard IPv6 data for each physical interface. Each IPv6 ACP consists of an action (allow, discard) and a selector (IPv6 ACL). When IPv6 packets are received on an interface, the configured ACPs are applied to determine whether the data will be processed or discarded.
An implicit discard exists at the end of every ACP. Specifying a discard list is unnecessary in most applications and should be used with caution. Specifying an empty ACL or a nonexistent ACL in an ACP will result in an implicit permit.
60000CRG0-35B
2828
Usage Examples
The following example configures the IPv6 ACP named UNTRUSTED to discard any traffic that matches the IPv6 ACL named INWEB: (config)#ipv6 policy-class UNTRUSTED (config-policy6-class)#discard list INWEB
60000CRG0-35B
2829
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. address on page 2831 body size <bytes> on page 2832 capture commands on page 2833 capture header on page 2834 capture trigger on page 2835 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2837 send test on page 2838 send trigger on page 2839 server <dns-name/ip address> on page 2840 subject <text> on page 2841
60000CRG0-35B
2830
address
Use the address command to specify the CC, From, and To fields in the email messages. Use the no form of this command to remove the specified information from the email header. Variations of this command include:
address cc <email address(es)> address from <email address(es)> address to <email address>
Syntax Description
cc <email address(es)> from <email address(es)> to <email address> Specifies the CC field in the email message. Multiple email addresses are separated by semicolons. Specifies the From field in the email message. Multiple email addresses are separated by semicolons. Specifies the To field in the email message.
Default Values
By default, the CC value is empty. The To default value is set using the command logging email address-list <email address> ; <email address> on page 1131 and the From default value is set using the command logging email sender on page 1137.
Command History
Release 17.2 Command was introduced.
Functional Notes
The address to command uses a default value from the command logging email address-list <email address> ; <email address> on page 1131. If the logging email address-list command has been configured, and the mail agent notification will go to the same email, using the address to command is not necessary.
Usage Examples
The following example configures the CC, From, and To fields in the email notification sent by mail agent myagent: (config)#mail-client myagent (config-mail-client-myagent)#address to manager@company.net (config-mail-client-myagent)#address cc fellowemployee@company.net; assistntmngr@company.net (config-mail-client-myagent)#address from goodemployee@company.net
60000CRG0-35B
2831
Default Values
By default, the buffer size is set to 4048 bytes.
Command History
Release 17.2 Command was introduced.
Functional Notes
All output generated after the buffer size has been reached will be ignored.
Usage Examples
The following example sets the body text buffer size to 6000 bytes for mail agent myagent: (config)#mail-client myagent (config-mail-client-myagent)#body size 6000
60000CRG0-35B
2832
capture commands
Use the capture commands command to specify the command output to capture and include in the body of the email. Use the no form of this command to remove the specified commands. Syntax Description
No subcommands.
Default Values
By default, no commands are specified.
Command History
Release 17.2 Command was introduced.
Functional Notes
The capture commands command specifies the command output to be captured by the mail agent. Show and tcl commands can be captured. When the capture commands command is entered, each command to be captured is specified with the do keyword followed by the command. The terminal configuration mode is enabled by default for the capture commands command, making it necessary to use the keyword do. List all commands to be sent in a single notification, followed by the exit keyword.
Usage Examples
The following example specifies that the mail agent myagent will capture the output from the show ip route and show clock commands: (config)#mail-client myagent (config-mail-client-myagent)#capture commands Enter the commands you wish to run, one line at a time. Entries are run from the terminal configuration prompt. For example, you must enter do show run or int eth 0/1. When finished, type exit on a new line to end. #do show ip route #do show clock #exit (config-mail-client-myagent)#
60000CRG0-35B
2833
capture header
Use the capture header command to specify that header information (ASCII demarcation and a timestamp) is included when command output is captured. Use the no form of this command to remove the header information from captured command output. Syntax Description
No subcommands.
Default Values
By default, header information is included in captured command output.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example removes header information from the captured command output for mail agent myagent: (config)#mail-client myagent (config-mail-client-myagent)#no capture header
60000CRG0-35B
2834
capture trigger
Use the capture trigger command to configure the trigger that causes the mail agent to capture the command output. Use the no form of this command to remove the trigger. Variations of this command include:
capture trigger capture trigger track <name> fail capture trigger track <name> pass
Syntax Description
track <name> fail track <name> pass Optional. Specifies the command output is captured when the named track changes from a pass state to a fail state. Optional. Specifies the command output is captured when the named track changes from a fail state to a pass state.
Default Values
By default, no tracks are configured and no trigger is defined.
Command History
Release 17.2 Command was introduced.
Functional Notes
If no trigger is specified, the mail agent will immediately run the specified commands and capture their output. If a track is specified as the capture trigger, the command output will be captured every time the track switches to the specified state. The track used should be a preconfigured track with an associated schedule. The track will change states when its associated schedule becomes active or inactive. For more information on schedules, refer to schedule <name> on page 1201. For more information on tracks, refer to the Network Monitor Track Command Set on page 2629 of this guide. For more information on the functions of tracks and schedules as part of the mail agent feature, refer to the Generic Mail Agent quick configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 2341). The command send trigger on page 2839 can be used without the capture trigger command. If only the send trigger command is used, the send trigger command will function as the capture trigger command and immediately capture the command output and send an email of the captured output. If both commands are used, the command output is captured at the time the capture trigger occurs, and then an email is sent at the time the send trigger occurs.
60000CRG0-35B
2835
Usage Examples
The following example specifies that when the track mail changes to a pass state, the mail agent myagent will capture command output: (config)#mail-client myagent (config-mail-client-myagent)#capture trigger track mail pass
60000CRG0-35B
2836
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#mail-client myagent (config-mail-client-myagent)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2837
send test
Use the send test command to have the mail agent send a test email message to the email address(es) specified by the address to command (refer to address on page 2831) or the logging email address-list command (refer to logging email address-list <email address> ; <email address> on page 1131). Syntax Description
No subcommands.
Default Values
By default, the test email is sent using your Simple Mail Transfer Protocol (SMTP) settings even if the mail client is currently shut down.
Command History
Release 17.2 Command was introduced.
Functional Notes
The command appends This is a test message onto the current message buffer and sends an email to the configured addresses. This command is used to test that the agent is sending emails to the proper addresses.
Usage Examples
The following example instructs mail agent myagent to send a test email to the previously configured email addresses: (config)#mail-client myagent (config-mail-client-myagent)#send test
60000CRG0-35B
2838
send trigger
Use the send trigger command to configure when an email with command output is sent to the email address(es) specified by the address to command (refer to address on page 2831) or the logging email address-list command (refer to logging email address-list <email address> ; <email address> on page 1131). Use the no form of this command to remove the configuration. Variations of this command include:
send trigger send trigger track <name> fail send trigger track <name> pass
Syntax Description
track <name> fail track <name> pass Optional. Specifies the email message is sent when the named track changes from a pass state to a fail state. Optional. Specifies the email message is sent when the named track changes from a fail state to a pass state.
Default Values
By default, no email is sent.
Command History
Release 17.2 Command was introduced.
Functional Notes
If no trigger is specified, the mail agent will immediately send the email. If a track is specified as the send trigger, the email will be sent every time the track switches to the specified state. The track used should be a preconfigured track with an associated schedule. The track will change states when its associated schedule becomes active or inactive. For more information on schedules, refer to the command schedule <name> on page 1201. For more information on tracks, refer to the Network Monitor Track Command Set on page 2629 of this guide. For more information on the functions of tracks and schedules as part of the mail agent feature, refer to the Generic Mail Agent quick configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 2341). The send trigger command can be used without the capture trigger command (refer to capture trigger on page 2835). If only the send trigger command is used, the send trigger command will function as the capture trigger command and immediately capture the command output and send an email of the captured output. If both commands are used, the command output is captured at the time the capture trigger occurs, and then an email is sent at the time the send trigger occurs.
Usage Examples
The following example specifies when the track named sendmail changes to a fail state, mail agent myagent will send an email with captured command output: (config)#mail-client myagent (config-mail-client-myagent)#send trigger track sendmail fail
60000CRG0-35B
2839
Default Values
By default, the SMTP server is set to the value defined by the command logging email receiver-ip <ip address | hostname> on page 1136.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example specifies that mail agent myagent use the SMTP server at IP address 172.5.67.99 to send email messages: (config)#mail-client myagent (config-mail-client-myagent)#server 172.5.67.99
60000CRG0-35B
2840
subject <text>
Use the subject command to specify the Subject field in the mail agent email message. Use the no form of this command to clear the Subject field. Syntax Description
<text> Specifies the text of the Subject field.
Default Values
By default, this field is empty.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example specifies a Subject of report1 for the email message sent my mail agent myagent: (config)#mail-client myagent (config-mail-client-myagent)#subject report1
60000CRG0-35B
2841
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. connect men-port efm-group <group id> on page 2843 preserve-ce-vlan on page 2844 s-tag <vlan id> on page 2845
60000CRG0-35B
2842
Default Values
By default, no interfaces are connected to the EVC.
Command History
Release A4.01 Command was introduced.
Functional Notes
Multiple EVCs can be associated with a single EFM group. The EFM group must be created before associating the EVC and the group. For more information about configuring EFM groups, refer to EFM Group Command Set on page 1932.
Usage Examples
The following example associates EVC DATA with EFM group 1: (config)#mef evc DATA (config-evc-DATA)#connect men-port efm-group 1
60000CRG0-35B
2843
preserve-ce-vlan
Use the preserve-ce-vlan command to specify whether the customer equipment (CE) virtual local area network (VLAN) ID is preserved in traffic outbound on the Ethernet virtual connection (EVC). Use the no form of this command to disable CE VLAN ID preservation. Syntax Description
No subcommands.
Default Values
By default, the CE VLAN ID is preserved.
Command History
Release A4.01 Command was introduced.
Functional Notes
The CE VLAN ID is the ID of the VLAN on the Metro Ethernet Forum (MEF) Ethernet subinterface. A VLAN on the MEF Ethernet subinterface must be configured to preserve the CE VLAN ID. The preserved CE VLAN ID can be used for matching traffic in EVC maps, although for most applications you will not need to preserve the CE VLAN ID.
Usage Examples
The following example disables CE VLAN ID preservation for outbound traffic on EVC DATA: (config)#mef evc DATA (config-evc-DATA)#preserve-ce-vlan
60000CRG0-35B
2844
Default Values
By default, the s-tag is 0, which indicates the traffic on the EVC is untagged.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies the s-tag for traffic outbound on EVC DATA is 20: (config)#mef evc DATA (config-evc-DATA)#s-tag 20
60000CRG0-35B
2845
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. connect on page 2847 connect discard on page 2848 match on page 2849 men-pri on page 2850 men-queue on page 2851
60000CRG0-35B Copyright 2011 ADTRAN, Inc. 2846
connect
Use the connect command to associate the Ethernet virtual connection (EVC) map with an EVC component. EVC maps must be associated with both an EVC and a user network interface (UNI) for the map to function properly. Use the no form of this command to remove the association between the EVC map and the EVC or the UNI. Variations of this command include:
connect evc <name> connect uni mef-ethernet <slot/port>
Syntax Description
evc <name> Specifies the EVC to which the matching traffic is mapped. uni mef-ethernet <slot/port> Specifies the Metro Ethernet Forum (MEF) Ethernet interface (UNI) from which the traffic is evaluated.
Default Values
By default, no EVC components are connected to the EVC map.
Command History
Release A4.01 Command was introduced.
Functional Notes
EVC maps are associated with both an EVC and a UNI (MEF Ethernet interface) to specify where the traffic comes from as it is evaluated (UNI) and where it is mapped to if it matches the criteria outlined in the map (EVC). Both variations of this command must be entered as separate commands for the EVC map to function properly.
Usage Examples
The following example specifies that EVC map Map1 is associated with MEF Ethernet interface 1/1 and with the EVC DATA: (config)#mef evc-map Map1 (config-evc-map-Map1)#connect uni mef-ethernet 1/1 (config-evc-map-Map1)#connect evc DATA
60000CRG0-35B
2847
connect discard
Use the connect discard command to specify that traffic matching the Ethernet virtual connection (EVC) map criteria is discarded. Using the no form of this command disables traffic discard. Syntax Description
No subcommands.
Default Values
By default, no traffic is discarded.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies that traffic matching the criteria outlined in EVC map Map1 is discarded: (config)#mef evc-map Map1 (config-evc-map-Map1)#connect discard
60000CRG0-35B
2848
match
Use the match command to specify the traffic matching criteria used by the Ethernet virtual connection (EVC) map to identify which traffic to send to the associated EVC. Use the no form of this command to remove the matching criteria from the EVC map. Variations of this command include:
match ce-vlan-id <vlan id> match ce-vlan-pri <value> match dscp <value> match untagged
Syntax Description
ce-vlan-id <vlan id> Specifies that traffic with a customer equipment (CE) virtual local area network (VLAN) ID that matches the specified ID is mapped to the associated EVC. Valid range is 1 to 4095. Specifies that traffic with a CE VLAN priority value that matches the specified value is mapped to the associated EVC. The priority value is also the CE VLAN 802.1p value. Valid range is 0 to 7. Specifies that traffic matching the specified differentiated services code point (DSCP) value is mapped to the associated EVC. Valid range is 0 to 63. Specifies that untagged traffic is mapped to the associated EVC.
ce-vlan-pri <value>
dscp <value>
untagged
Default Values
By default, no matching criteria is specified.
Command History
Release A4.01 Command was introduced.
Functional Notes
Traffic is compared to the first criteria entered in the maps configuration. Subsequent criteria are then compared to the traffic in the order the criteria are entered. Multiple matches form a logical AND, meaning that if multiple criteria are entered in the map, the traffic must match all criteria to be matched to the EVC.
Usage Examples
The following example configures EVC map Map1 to send all traffic with a CE VLAN ID of 5 and a DSCP value of 10 to the EVC associated with the map: (config)#mef evc-map Map1 (config-evc-map-Map1)#match ce-vlan-id 5 (config-evc-map-Map1)#match dscp 10
60000CRG0-35B
2849
men-pri
Use the men-pri command to specify the Metro Ethernet network (MEN) priority that the Ethernet virtual connection (EVC) will use for traffic matching the EVC map. Use the no form of this command to return to the default setting. Variations of this command include:
men-pri inherit men-pri <value>
Syntax Description
inherit Specifies that the MEN priority value for the matched traffic is inherited from the 802.1p value of the customer equipment (CE) virtual local area network (VLAN). Specifies a specific priority value is given to the matched traffic in the EVC. Valid range is 0 to 7.
<value>
Default Values
By default, matched traffic has an inherited priority.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies that traffic matching EVC map Map1 is given a priority of 5 in the associated EVC: (config)#mef evc-map Map1 (config-evc-map-Map1)#men-pri 5
60000CRG0-35B
2850
men-queue
Use the men-queue command to specify the output queue used by the Ethernet virtual connection (EVC) for traffic that matches the EVC map. Use the no form of this command to return to the default setting. Variations of this command include:
men-queue inherit men-queue <value>
Syntax Description
inherit Specifies that the queue used by the EVC for matched traffic is based on the Metro Ethernet network (MEN) priority setting (specified using the command men-pri on page 2850). Specifies the queue to which the matched traffic is mapped by the EVC. Valid range is 1 to 8.
<value>
Default Values
By default, matched traffic inherits the queue information.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies that traffic matching EVC map Map1 is queued in output queue 4: (config)#mef evc-map Map1 (config-evc-map-Map1)#men-queue 4
60000CRG0-35B
2851
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. cbs <number> on page 2853 cir <number> on page 2854 ebs <number> on page 2855 eir <number> on page 2856 per on page 2857
60000CRG0-35B
2852
cbs <number>
Use the cbs command to configure the committed burst size (CBS) for the Metro Ethernet Forum (MEF) policer policy. The CBS threshold specifies the maximum allowable number of bytes transmitted as a burst before the policer policy can drop the traffic. Use the no form of this command to return to the default setting. Syntax Description
<number> Specifies the CBS threshold in bytes. Valid range is 0 to 2147483647.
Default Values
By default, the CBS is 0 bytes.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies that MEF policer Policy1 uses a CBS threshold of 6500000: (config)#mef policer Policy1 (config-policer-Policy1)#cbs 6500000
60000CRG0-35B
2853
cir <number>
Use the cir command to configure the committed information rate (CIR) for the Metro Ethernet Forum (MEF) policer policy. The CIR threshold specifies the average maximum data transmission rate of traffic in kilobits per second (kbps) allowed before the traffic can be dropped. Use the no form of this command to return to the default setting. Syntax Description
<number> Specifies the CIR threshold in kbps. Valid range is 250 to 600000.
Default Values
By default, the CIR is 600000 kbps.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies that MEF policer Policy1 uses a CIR threshold of 10000: (config)#mef policer Policy1 (config-policer-Policy1)#cir 10000
60000CRG0-35B
2854
ebs <number>
Use the ebs command to configure the excess burst size (EBS) for the Metro Ethernet Forum (MEF) policer policy. The EBS threshold specifies the maximum number of bytes transmitted as a burst of data in excess of the committed burst size (CBS) threshold before the policer policy drops traffic. Set the CBS threshold using the command cbs <number> on page 2853. Use the no form of this command to return to the default setting. Syntax Description
<number> Specifies the EBS threshold in bytes. Valid range is 0 to 2147483647.
Default Values
By default, the EBS is 0 bytes.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies that MEF policer Policy1 uses an EBS threshold of 60000: (config)#mef policer Policy1 (config-policer-Policy1)#ebs 60000
60000CRG0-35B
2855
eir <number>
Use the eir command to configure the excess information rate (EIR) for the Metro Ethernet Forum (MEF) policer policy. The EIR threshold specifies the maximum rate in kilobits per second (kbps), over and above the committed information rate (CIR) threshold, before the policer policy drops traffic. The EIR value must be greater than or equal to the CIR value. Use the no form of this command to return to the default setting. Syntax Description
<number> Specifies the EIR threshold in kbps. Valid range is 250 to 600000.
Default Values
By default, the EIR is 600000 kbps.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies that MEF policer Policy1 uses an EIR threshold of 1000: (config)#mef policer Policy1 (config-policer-Policy1)#eir 1000
60000CRG0-35B
2856
per
Use the per command to apply the Metro Ethernet Forum (MEF) policer policy to an Ethernet virtual connection (EVC) component. Use the no form of this command to remove the policer policy from the EVC component. Variations of this command include:
per custom add-map <name> per custom remove-map <name> per evc <name> per uni mef-ethernet <slot/port>
Syntax Description
custom add-map <name> custom remove-map <map> evc <name> uni mef-ethernet <slot/port> Adds the MEF policer policy to the named EVC map. Removes the MEF policer policy from the named EVC map. Applies the MEF policer policy to the named EVC. Applies the MEF policer policy to the specified MEF Ethernet interface (the user network interface (UNI)).
Default Values
By default, no policer policies are applied to any EVC components.
Command History
Release A4.01 Command was introduced.
Functional Notes
When MEF policer policies are applied to an EVC, they are applied on egress traffic. When MEF policer policies are applied to a MEF Ethernet interface, they are applied on ingress traffic.
Usage Examples
The following example applies MEF policer Policy1 to EVC map Map1: (config)#mef policer Policy1 (config-policer-Policy1)#per custom add-map Map1
60000CRG0-35B
2857
MGCP gateways communicate with internal MGCP endpoints. MGCP endpoints are dedicated foreign exchange station (FXS) ports configured to use MGCP to communicate with a call agent. The endpoints are configured with a few specialized MGCP commands and a large number of commands that are similar to those used for voice user configuration. To create an MGCP endpoint and access its configuration, enter the voice mgcp-endpoint <index> command from the Global Configuration mode prompt as follows:
>enable #configure terminal (config)#voice mgcp-endpoint 1 (config-mgcp-1)#
The following configuration command set describes commands associated with configuring MGCP endpoints. For more information about MGCP gateway and endpoint configuration, refer to the MGCP in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 2347). The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 exit on page 71 interface on page 72
60000CRG0-35B
2858
All other commands in this command set are described in this section in alphabetical order: alc on page 2860 block-caller-id on page 2861 codec-group <name> on page 2862 connect fxs <slot/port> on page 2863 description <text> on page 2864 echo-cancellation on page 2865 forward-disconnect delay on page 2866 modem-passthrough on page 2867 name <text> on page 2868 nls on page 2869 plc on page 2870 rtp delay-mode on page 2871 rtp dtmf-relay on page 2872 rtp frame-packetization <value> on page 2873 rtp packet-delay on page 2874 rtp qos dscp <value> on page 2875 t38 on page 2876 t38 error-correction on page 2877 t38 fallback-mode g711 on page 2878 t38 max-buffer <value> on page 2879 t38 max-datagram <value> on page 2880 t38 max-rate on page 2881 t38 redundancy on page 2882 vad on page 2883
60000CRG0-35B
2859
alc
Use the alc command to enable automatic level control (ALC). ALC reduces Realtime Transport Protocol (RTP) received signals that are out of specification to the predefined levels. It is not necessary to enable ALC on those networks that guarantee signal levels to be within specification. Use the no form of this command to disable this feature. Variations of this command include:
alc alc level -16 alc level -17 alc level -18 alc level -19 alc level -20 alc level -21 alc level -22
Syntax Description
level -16 level -17 level -18 level -19 level -20 level -21 level -22 Optional. Specifies the ALC attenuation level is -16 dBm0. Optional. Specifies the ALC attenuation level is -17 dBm0. Optional. Specifies the ALC attenuation level is -18 dBm0. Optional. Specifies the ALC attenuation level is -19 dBm0. Optional. Specifies the ALC attenuation level is -20 dBm0. Optional. Specifies the ALC attenuation level is -21 dBm0. Optional. Specifies the ALC attenuation level is -22 dBm0.
Default Values
By default, ALC is disabled.
Command History
Release 14.1 Release 15.1 Release A2 Release A2.04 Command was introduced. Command was added to the Voice Line Interface. Command was added to the Media Gateway Control Protocol (MGCP) endpoint configuration. Command was expanded to include the level parameters.
Usage Examples
The following example activates the ALC for MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#alc
60000CRG0-35B
2860
block-caller-id
Use the block-caller-id command to block caller ID information included in Media Gateway Control Protocol (MGCP) signaling on the endpoint. Use the no form of this command to allow caller ID information to appear. Syntax Description
No subcommands.
Default Values
By default, caller ID information is allowed.
Command History
Release 10.1 Release A2 Command was introduced. Command was added to the MGCP endpoint configuration.
Usage Examples
The following example enables caller ID information blocking on MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#block-caller-id
60000CRG0-35B
2861
codec-group <name>
Use the codec-group command to specify the coder-decoder (CODEC) list to be used by this account. Use the no form of this command to remove the CODEC list from the account. Syntax Description
<name> Specifies the CODEC list to be used for this account.
Default Values
By default, no CODEC lists are assigned.
Command History
Release 9.3 Release 11.1 Release 15.1 Release A1 Release A2 Command was introduced. Command was expanded to include the integrated services digital network (ISDN) trunk. Command was added to the Voice Line Configuration command set. Command was included in the Voice Loopback Account Configuration command set. Command was added to the Media Gateway Control Protocol (MGCP) Configuration command set.
Functional Notes
The codec-group command applies a previously configured CODEC list to an interface, voice trunk, or voice account. These lists are lists of CODECs used by the interface, trunk, or account in call negotiation, and are arranged in preferred order with the first listed CODEC being the most preferred. CODEC lists are created using the codec command from the Voice CODEC List Configuration mode prompt. For more information about creating CODEC lists, refer to the Voice CODEC List Command Set on page 3359.
Usage Examples
The following example applies the CODEC list List1 to the MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#codec-group List1
60000CRG0-35B
2862
Default Values
By default, the endpoint is connected to a virtual port.
Command History
Release A2 Command was introduced.
Functional Notes
This command fails if the specified FXS port is already in use on another MGCP endpoint or by a configured voice user.
Usage Examples
The following example connects MGCP endpoint 1 to the physical FXS port 0/1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#connect fxs 0/1
60000CRG0-35B
2863
description <text>
Use the description command to give a textual description to a Media Gateway Control Protocol (MGCP) endpoint. Use the no form of this command to remove the endpoints description. Syntax Description
<text> Specifies the textual description of the endpoint.
Default Values
By default, no description is given to an endpoint.
Command History
Release A2 Command was introduced.
Usage Examples
The following example gives the description of farendpoint to MGCP endpoint 1: (config)#voice mgcp-endpoint1 (config-mgcp-1)#description farendpoint
60000CRG0-35B
2864
echo-cancellation
Use the echo-cancellation command to improve voice quality for packetized-based voice calls, such as Voice over Internet Protocol (VoIP) or Media Gateway Control Protocol (MGCP). Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, echo-cancellation is enabled.
Command History
Release 9.3 Release 15.1 Release A2 Command was introduced. Command was added to the Voice Line Interface. Command was added to the MGCP endpoint configuration.
Usage Examples
The following example activates echo-cancellation for MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#echo-cancellation
60000CRG0-35B
2865
forward-disconnect delay
Use the forward-disconnect delay command to modify the forward disconnect delay time (in milliseconds) for the Media Gateway Control Protocol (MGCP) endpoint. Use the no form of this command to return the delay period to the default value. Variations of this command include:
forward-disconnect delay 250 forward-disconnect delay 500 forward-disconnect delay 750 forward-disconnect delay 900 forward-disconnect delay 1000 forward-disconnect delay 2000 forward-disconnect delay follow-switch
Syntax Description
250 500 750 900 1000 2000 follow-switch Specifies a 250 ms delay time. Specifies a 500 ms delay time. Specifies a 750 ms delay time. Specifies a 900 ms delay time. Specifies a 1000 ms delay time. Specifies a 2000 ms delay time. Specifies a delay time follows the switch.
Default Values
By default, the forward disconnect delay is set to follow the switch.
Command History
Release A2.04 Release A4.01 Command was introduced. Command syntax was updated from fwd-disconnect delay to forward-disconnect delay.
Functional Notes
Although the MGCP endpoint forward disconnect delay is set to follow the switch by default, this delay time varies depending on the endpoints RFC 2833 signaling specification. If the RFC 2833 signaling is enabled, then the follow-switch parameter indicates that the Class 5 switch determines the length of the delay time. If RFC 2833 signaling is disabled, then using follow-switch indicates that the battery is removed for the default time of 900 ms.
Usage Examples
The following example specifies the forward disconnect delay for MGCP endpoint 1 is 1000 ms: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#forward-disconnect delay 1000
60000CRG0-35B
2866
modem-passthrough
Use the modem-passthrough command to switch to passthrough mode on fax or modem tone detection. This command allows modem and fax calls to maintain a connection without altering the signals with the voice improvement settings, such as echo cancellation and voice activity detection (VAD). Use the no form of this command to disable this feature. Variations of this command include:
modem-passthrough modem-passthrough detection-time <time>
Syntax Description
detection-time <time> Optional. Specifies the time (in seconds) for fax or modem tone detection. Range is 0 to 120 seconds.
Default Values
By default, modem-passthrough is enabled. By default, the detection time is set to 8 seconds.
Command History
Release 11.1 Release 12.1 Release A2 Release A4.02 Command was introduced. Command was expanded. Command was added to the Media Gateway Control Protocol (MGCP) endpoint configuration. Command was expanded to include the detection-time parameter.
Usage Examples
The following example disables modem-passthrough on MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#no modem-passthrough
60000CRG0-35B
2867
name <text>
Use the name command to specify a textual name that the Media Gateway Control Protocol (MGCP) call agent will use to refer to a specific endpoint. Use the no form of this command to return to the default naming convention. Syntax Description
<text> Specifies the textual name of the MGCP endpoint.
Default Values
By default, when endpoints are created and given an index number, they are named in the following format: aaln/x, where x is the index number. For example, an endpoint with an index of 4 will by default have the name aaln/4.
Command History
Release A2 Command was introduced.
Usage Examples
The following example renames endpoint 1 as endpoint243: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#name endpoint243
60000CRG0-35B
2868
nls
Use the nls command to enable the non-linear suppression (NLS) option for the Media Gateway Control Protocol (MGCP) endpoint. This option sets the echo canceller to reduce acoustic echo. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 14.1 Release 15.1 Release A2 Command was introduced. Command was added to the Voice Line Interface. Command was added to the MGCP endpoint configuration.
Usage Examples
The following example enables NLS for MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#nls
60000CRG0-35B
2869
plc
Use the plc command to enable packet loss concealment (PLC). PLC is used to prevent choppy connections by concealing a packet loss by replacing the lost packet with another voice packet in the data stream. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, PLC is enabled.
Command History
Release 11.1 Release 15.1 Release A2 Command was introduced. Command was added to the Voice Line Interface. Command was added to the Media Gateway Control Protocol (MGCP) endpoint configuration.
Usage Examples
The following example disables PLC for the MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#no plc
60000CRG0-35B
2870
rtp delay-mode
Use the rtp delay-mode command to configure the Realtime Transport Protocol (RTP) jitter buffer packet delay mode settings. RTP is used to prevent static on voice connections by enhancing the quality of the packet delivery. Use the no form of this command to return to the default setting. Variations of this command include:
rtp delay-mode adaptive rtp delay-mode fixed
Syntax Description
adaptive fixed Configures the RTP jitter buffer packet delay to adjust during a call based on network conditions. Configures the RTP jitter buffer packet delay to remain constant.
Default Values
By default, the RTP delay mode is set to adaptive. This allows for minimal latency by adjusting the average packet delay based on the conditions of the network.
Command History
Release 11.1 Release 15.1 Release A2 Command was introduced. Command was added to the Voice Line Interface. Command was added to the Media Gateway Control Protocol (MGCP) endpoint configuration.
Usage Examples
The following example configures RTP delay mode as fixed on MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#rtp delay-mode fixed
60000CRG0-35B
2871
rtp dtmf-relay
Use the rtp dtmf-relay command to configure the method by which Realtime Transport Protocol (RTP) dual tone multi-frequency (DTMF) events are relayed. The dial digits can be sent inband or out-of-band (OOB) of the voice stream. Use the no form of this command to return to the default value. Variations of this command include:
rtp dtmf-relay inband rtp dtmf-relay nte <value>
Syntax Description
inband nte <value> Specifies that RTP DTMF events be relayed inband in the RTP stream. Specifies that RTP DTMF events be relayed OOB using named telephone events (NTEs). Enter an NTE value between 96 and 127.
Default Values
By default, the rtp dtmf-relay is set for NTE 101.
Command History
Release 9.3 Release 15.1 Release A2 Command was introduced. Command was added to the Voice Line Interface. Command was added to the Media Gateway Control Protocol (MGCP) endpoint configuration.
Usage Examples
The following example configures RTP DTMF relay events for inband: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#rtp dtmf-relay inband
60000CRG0-35B
2872
Default Values
By default, the rtp frame-packetization time is set to 20 milliseconds on all MGCP endpoints.
Command History
Release 9.3 Release 15.1 Release A2 Command was introduced. Command was added to the Voice Line Interface. Command was added to the MGCP endpoint configuration.
Usage Examples
The following example sets the frame packetization time for MGCP endpoint 1 to 10 milliseconds: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#rtp frame-packetization 10
60000CRG0-35B
2873
rtp packet-delay
Use the rtp packet-delay command to configure the maximum Realtime Transport Protocol (RTP) packet delays. This command is used to set the allowable limits of latency on the network. Use the no form of this command to return to the default value. Variations of this command include:
rtp packet-delay fax <value> rtp packet-delay maximum <value> rtp packet-delay nominal <value>
Syntax Description
fax <value> maximum <value> nominal <value> Sets the fax delay time value in increments of 10 milliseconds. Range is 0 to 500 milliseconds. Sets the maximum delay time value in increments of 10 milliseconds. Range is 40 to 320 milliseconds. Sets the nominal delay time value in increments of 10 milliseconds. Range is 10 to 240 milliseconds.
Default Values
By default, the RTP packet delay for fax is 50, maximum is 100, and for nominal is 50.
Command History
Release 11.1 Release 15.1 Release A2 Command was introduced. Command was added to the Voice Line Interface. Command was added to the Media Gateway Control Protocol (MGCP) endpoint configuration.
Usage Examples
The following example configures the RTP maximum delay time on MGCP endpoint 1 to 200 milliseconds: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#rtp packet-delay maximum 200
60000CRG0-35B
2874
Default Values
By default, the RTP QoS parameter for DSCP on Media Gateway Control Protocol (MGCP) endpoints is 46.
Command History
Release 9.3 Release 15.1 Release A2 Command was introduced. Command was added to the Voice Line Interface. Command was added to the MGCP endpoint configuration.
Usage Examples
The following example configures the RTP QoS DSCP for MGCP endpoint 1 to 60: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#rtp qos dscp 60
60000CRG0-35B
2875
t38
Use the t38 command to enable T.38 fax operation on the Media Gateway Control Protocol (MGCP) endpoint. Use the no form of this command to disable this feature. The modem-passthrough command must be enabled for T.38 operation to work. Refer to modem-passthrough on page 2867 for more information.
Syntax Description
No subcommands.
Default Values
By default, T.38 is disabled.
Command History
Release 16.1 Release A2 Command was introduced. Command was added to the MGCP endpoint configuration.
Usage Examples
The following example enables T.38 on MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#t38
Technology Review
T.38 is an International Telecommunication Union (ITU) specification that allows Group-3 Fax (T.30) data to be transported over the Internet. It is similar to dual tone multi-frequency (DTMF) relay (RFC 2833) in that the digital signal processor (DSP) decodes tones and demodulated fax data and converts them into packets. A similar device on the other end takes the packets/tones and remodulates them so that an analog fax machine on the other end can receive the fax. AOSs previous support (revisions 12 through 15) for fax/modem signals was simply detecting a tone and forcing the coder-decoder (CODEC) into G.711 and disabling/enabling echo cancellers based on the tones detected. When packet loss becomes high, sending faxes over G.711 becomes problematic, due to dropped messages and timeouts/retrains. T.38 can be used in conjunction with various call-control schemes, such as H.323, Session Initiation Protocol (SIP), and MGCP. AOS only supports SIP as the call-control method. This is typically referred to T.38/Annex-D. Annex-D describes the Session Initiation Protocol/Session Description Protocol (SIP/SDP) call establishment procedures.
60000CRG0-35B
2876
t38 error-correction
Use the t38 error-correction command to specify the type of fax error correction. Use the no form of this command to disable this feature. Variations of this command include:
t38 error-correction fec t38 error-correction redundancy
Syntax Description
fec Specifies forward error correction (FEC) as the fax error correction. FEC is a system of error control where the sender adds redundant data to its messages, allowing the receiver to detect and correct errors (within certain bounds) without the need to request additional data from the sender. Specifies redundancy as the fax error correction. Redundancy error correction replicates the payload a user-specified number of times to determine if errors are present. The number of redundant packets is set using the command t38 redundancy on page 2882.
redundancy
Default Values
By default, t38 error-correction is set to fec for Media Gateway Control Protocol (MGCP) endpoints.
Command History
Release 16.1 Release A2 Command was introduced. Command was added to the MGCP endpoint configuration.
Usage Examples
The following example sets the t38 error-correction to redundancy on MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#t38 error-correction redundancy
60000CRG0-35B
2877
Default Values
By default, t38 fallback-mode is disabled.
Command History
Release 16.1 Release A2 Command was introduced. Command was added to the Media Gateway Control Protocol (MGCP) endpoint configuration.
Usage Examples
The following example enables the t38 fallback-mode on MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#t38 fallback-mode g711
60000CRG0-35B
2878
Default Values
By default, the maximum buffer size is set to 200.
Command History
Release 16.1 Release A2 Command was introduced. Command was added to the MGCP endpoint configuration.
Usage Examples
The following example sets the t38 max-buffer to 100 on MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#t38 max-buffer 100
60000CRG0-35B
2879
Default Values
By default, the maximum datagram value is set to 75.
Command History
Release 16.1 Release A2 Command was introduced. Command was added to the MGCP endpoint configuration.
Usage Examples
The following example sets the t38 max-datagram to 100 on MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#t38 max-datagram 100
60000CRG0-35B
2880
t38 max-rate
Use the t38 max-rate command to specify the fax maximum rate for Media Gateway Control Protocol (MGCP) endpoints. The actual transmission rate may be lower than specified rate if the receiving end cannot support the maximum rate. Use the no form of this command to return to the default value. Variations of this command include:
t38 max-rate 14400 t38 max-rate 12000 t38 max-rate 2400 t38 max-rate 4800 t38 max-rate 7200 t38 max-rate 9600
Syntax Description
14400 12000 2400 4800 7200 9600 Specifies 14400 baud/bits as fax maximum rate. Specifies 12000 baud/bits as fax maximum rate. Specifies 2400 baud/bits as fax maximum rate. Specifies 4800 baud/bits as fax maximum rate. Specifies 7200 baud/bits as fax maximum rate. Specifies 9600 baud/bits as fax maximum rate.
Default Values
By default, the maximum fax rate is set to 14400.
Command History
Release 16.1 Release A2 Command was introduced. Command was added to the MGCP endpoint configuration.
Usage Examples
The following example sets the t38 max-rate to 4800 on MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#t38 max-rate 4800
60000CRG0-35B
2881
t38 redundancy
Use the t38 redundancy command to set the number of redundant packets sent when the t38 error-correction redundancy feature is enabled on Media Gateway Control Protocol (MGCP) endpoints. Use the no form of this command to return to the default value. Variations of this command include:
t38 redundancy high-speed <value> t38 redundancy low-speed <value>
Syntax Description
high-speed <value> Specifies the number of redundant T.38 fax packets to be sent for data messages (high-speed fax machine image data). Range is 0 (no redundancy) to 4 packets. Specifies the number of redundant T.38 fax packets to be sent for the signaling messages (low-speed fax machine protocol). Range is 0 (no redundancy) to 7 packets.
low-speed <value>
Default Values
By default, high-speed and low-speed redundancy values are set to 0 (no redundancy).
Command History
Release 16.1 Release A2 Command was introduced. Command was added to the MGCP endpoint configuration.
Usage Examples
The following example enables t38 error-correction redundancy and sets the number of redundant data messages to high-speed 3 on MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#t38 error-correction redundancy (config-mgcp-1)#t38 redundancy high-speed 3
60000CRG0-35B
2882
vad
Use the vad command to enable voice activity detection (VAD) on Media Gateway Control Protocol (MGCP) endpoints. VAD blocks out noise categorized as silence during a voice connection. The silent voice packets are not transmitted, allowing bandwidth usage to be reduced. Although VAD saves bandwidth, the quality of the voice call may be compromised. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, VAD is enabled for all MGCP endpoints.
Command History
Release 9.3 Release A2 Command was introduced. Command was added to the MGCP endpoint configuration.
Usage Examples
The following example disables VAD on MGCP endpoint 1: (config)#voice mgcp-endpoint 1 (config-mgcp-1)#no vad
60000CRG0-35B
2883
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. bandwidth on page 2886 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2889 match on page 2890 match dscp on page 2894 match precedence <value> on page 2898 priority on page 2900 qos-policy <map name> on page 2904 set cos <value> on page 2906 set dscp on page 2907 set precedence <value> on page 2909
60000CRG0-35B
2884
60000CRG0-35B
2885
bandwidth
Use the bandwidth command to specify bandwidth allocation for individual traffic classes for class-based weighted fair queuing (CBWFQ) configurations. Use the no form of this command to remove a configured bandwidth allocation. Variations of this command include:
bandwidth <rate> bandwidth <rate> Kbps bandwidth <rate> Mbps bandwidth percent <value> bandwidth remaining percent <value>
Syntax Description
<rate> Allocates the minimum bandwidth for a traffic class, specifying the minimum as an absolute bandwidth in kilobits per second (kbps). Range is 8 to 2000000 kbps. Optional. Indicates the rate specified is in kbps. Optional. Indicates the rate specified is in megabits per second (Mbps). Allocates a minimum bandwidth for a traffic class, specifying the minimum as a percentage of the total interface bandwidth. Refer to Functional Notes below for more details. Allocates a minimum bandwidth for a traffic class, specifying the minimum as a percentage of the total interface bandwidth not allocated to priority classes in the quality of service (QoS) map. Refer to Functional Notes below for more details.
Default Values
By default, there is no bandwidth allocation configured for a QoS map entry. The bandwidth rate is assumed to be provided in Kbps unless Mbps is specified.
Command History
Release 10.1 Release 17.5 Command was introduced. Command was expanded to allow specifying the rate in kbps and Mbps.
Functional Notes
When configuring bandwidth allocations for CBWFQ, there are a few rules that must be obeyed. 1. The units of the bandwidth (Kbps, Mbps, percent, or remaining percent) must be consistent for all class-based entries (using the bandwidth command) in a QoS map set. 2. The total bandwidth between all priority entries (priority command) and class-based entries (bandwidth command) in a QoS map set should not be configured beyond the specified max-reserved-bandwidth (default 75 percent) on the interface to which the QoS policy is applied (using the qos-policy command), or the map will be disabled. In a QoS map, even
60000CRG0-35B
2886
though limits are defined regarding consumption of bandwidth by traffic, traffic can burst up to the maximum interface rate when the output queue is not in a congested state. Qos maps are constantly classifying traffic when they are active on an interface, but some of their actions depend on the state of the output queue. When congestion is present, policies defined with the bandwidth command will be limited to the minimum value specified, with excess traffic being queued. During a congested state, policies defined with the priority command will be limited to the maximum value specified, with excess traffic being dropped. Policies defined with the shape or set commands are always enforced regardless of congestion. When the configured QoS map is applied to a physical interface, AOS displays bandwidth information for the map and the physical interface. For example, if the Frame Relay interface (fr 1) has been connected to the E1 interface (e1 1/1) using the cross-connect command, applying the QoS map (MyMapA) to the Frame Relay interface (fr 1) produces the following status message: 2005.08.09 07:28:22 QOS.INTERFACE QOS policy MyMapA requires 1288 kbps of bandwidth and 1488 kbps is now available for interface fr 1 -> the QOS policy for this port has been forced ACTIVE. This status message displays the total of the bandwidths specified in the QoS map (1288 kbps) and the available interface bandwidth using the total line rate configured on the interface (1488 kbps). 3. Up to five class-based entries (bandwidth commands) can be configured in a particular QoS map set. 4. Within a QoS map entry, CBWFQ bandwidth and low latency priority actions are mutually exclusive. However, bandwidth and priority actions may be applied to different entries in the same QoS map. Determining Bandwidth Entries
When possible, use the bandwidth <value> command to specify an absolute amount of bandwidth (in kbps) for the traffic class.
When determining the percent <value> entry, use the following formula: Bandwidth x 100 [(max-reserved-bandwidth)(Line Rate)] where Bandwidth max-reserved-bandwidth Line Rate Specifies the minimum amount of bandwidth needed for the traffic (in kbps). Specifies the percentage of the total line rate available for use by QoS. Specifies the total data rate configured on the interface (for example, 8 DS0s (64 kbps per DS0) on a T1 equals a line rate of 512 kbps).
For example, to specify 80 kbps of data on an interface with a total of 512 kbps of available bandwidth, and reserving 5 percent of the bandwidth for routing and L2 protocol traffic (max-reserved-bandwidth = 95) enter the following command: (config-qos-map 1)#bandwidth percent 15
60000CRG0-35B
2887
When determining the remaining percent <value> entry, use the following formula: Bandwidth x 100 [(max-reserved-bandwidth)(Line Rate)] - Priority Traffic where Bandwidth max-reserved-bandwidth Line Rate Priority Traffic Specifies the minimum amount of bandwidth needed for the traffic (in kbps). Specifies the percentage of the total line rate available for use by QoS. Specifies the total data rate configured on the interface (for example, 8 DS0s (64 kbps per DS0) on a T1 equals a line rate of 512 kbps). Specifies the amount of bandwidth reserved using the priority command.
For example, to specify 80 kbps of data on an interface with a total of 512 kbps of available bandwidth, 256 kbps reserved (using the priority command), and reserving 15 percent of the bandwidth for routing and L2 protocol traffic (max-reserved-bandwidth = 85) enter the following command: (config-qos-map 1)#bandwidth remaining percent 45
Usage Examples
The following example creates a QoS map with four traffic classes (based on IP packet precedence values) and allocates bandwidth to each class: (config)#qos map MyMap 1 (config-qos-map)#match precedence 5 (config-qos-map)#bandwidth percent 25 (config)#qos map MyMap 2 (config-qos-map)#match precedence 3 (config-qos-map)#bandwidth percent 10 (config)#qos map MyMap 3 (config-qos-map)#match precedence 2 (config-qos-map)#bandwidth percent 10 (config)#qos map MyMap 4 (config-qos-map)#match precedence 1 (config-qos-map)#bandwidth percent 15
60000CRG0-35B
2888
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#qos map MyMap 4 (config-qos-map)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2889
match
Use the match command to specify which traffic should be processed by this quality of service (QoS) map entry. Use the no form of this command to discontinue matching. Variations of this command include:
match any match fr-dlci <number> match ip rtp <port> match ip rtp <begin port range> <end port range> match ip rtp <begin port range> <end port range> all match list <name> match protocol bridge match protocol bridge netbeui match vlan <id>
Syntax Description
any Match all packets within a QoS map entry that were not matched in previous map entries. Since map entries are processed in the order of their sequence numbers, the match any command can be used to process all packets not previously matched by a map entry if it is specified as the last QoS map entry. Match all packets by the specified Frame Relay data link connection identifier (DLCI). Indicate the valid DLCI number from 16 to 1007. Matches Realtime Transport Protocol (RTP) packets with the specified User Datagram Protocol (UDP) destination port.
fr-dlci <number>
ip rtp <port>
ip rtp <begin port range> <end port range> Matches RTP packets with even UDP destination port numbers in the specified range. all Optional. Specifies matching all UDP port numbers in the specified range (even and odd). Valid only for ip rtp matches.
list <name>
Specifies the name of the access control list (ACL) you want to use to match packets for this QoS map. Refer to ip access-list extended <ipv4 acl name> on page 898 for more information on creating ACLs. Matches frames being bridged by the router. Matches only network basic input/output system (NetBIOS) extended user interface (NetBEUI) frames being bridged by the router. Match packets associated with a particular virtual local area network (VLAN). Indicate the VLAN ID number from 1 to 4095.
vlan <id>
60000CRG0-35B
2890
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Release 17.2 Release 17.5 Command was introduced. Command was expanded to include the any and vlan <id> options. Command was expanded to include the fr-dlci <number> parameter.
Functional Notes
QoS policies are configured in the ADTRAN Operating System (AOS) command line interface (CLI) to dictate the priority for servicing specified traffic types on a particular interface. QoS policies contain at least one match reference (using the match command) and one or more action items (using the priority, bandwidth, shape average, or set commands). The match command specifies the criteria used when determining whether incoming traffic is a candidate for the QoS policy action. Multiple match statements can exist within the same QoS policy, allowing a single QoS policy to service various types of traffic. You can require all of the multiple conditions be met (AND logic) by including the match-all parameter when creating the QoS policy. Alternatively, you can choose to include traffic meeting any of the conditions (OR logic) by using the match-any parameter when creating the QoS policy. Both of these conditions are explained in qos map <name> <number> on page 1184.
Each listed match statement is handled independently by the processor. Entering too many match statements in a QoS policy can burden the processor.
For example, consider a network that contains Class A and Class B traffic that each require 25 percent of the total allocated interface bandwidth, the following configuration would be appropriate: (config)#qos map MyMap 10 (config-qos-map)#match list Class_A (config-qos-map)#bandwidth percent 25 (config)#qos map MyMap 20 (config-qos-map)#match list Class_B (config-qos-map)#bandwidth percent 25
60000CRG0-35B
2891
In this example, the combination of both classes will not exceed 25 percent of the total allocated interface bandwidth. Class A and Class B will share the 25 percent allocation between them. Since there are two match statements in this QoS map entry, traffic can match either ACL Class_A or Class_B to be processed. By default, this example assumes the match-any logic is being applied since it is not specifically configured: (config)#qos map MyMap 10 (config-qos-map)#match list Class_A (config-qos-map)#match list Class_B (config-qos-map)#bandwidth percent 25 To remove a configured match statement, enter the entire match statement with a preceding no. For example, to remove the match statements from the above configured QoS map: (config)#qos map MyMap 10 (config-qos-map)#no match list Class_A and (config)#qos map MyMap 20 (config-qos-map)#no match list Class_B
Usage Examples
The following example configures QoS for a network with the following needs: Reserve 15 percent of the line rate for routing traffic and L2 protocol traffic (max-reserved-bandwidth = 85) Line Rate = 512 kbps Guaranteed 256 kbps for Voice Guaranteed 96 kbps for Class 1 Guaranteed 52 kbps for Class 2 To configure this QoS policy, enter the following QoS map and interface commands: 1. Allocate low latency queuing (LLQ) priority voice traffic. (config)#qos map MyMap 10 (config-qos-map)#match list VOICE (config-qos-map)#priority 256 2. Allocate the class-based weighted fair queuing (CBWFQ) data traffic bandwidth for Classes 1 and 2. (config)#qos map MyMap 20 (config-qos-map)#match list CLASS_1 (config-qos-map)#bandwidth 96
60000CRG0-35B
2892
Command Reference Guide (config)#qos map MyMap 30 (config-qos-map)#match list CLASS_2 (config-qos-map)#bandwidth 52
3. Specify the reserved bandwidth on the appropriate interface and apply the map. (config-fr 1)#max-reserved-bandwidth 85 (config-fr 1)#qos-policy out MyMap
60000CRG0-35B
2893
match dscp
Use the match dscp command to specify which traffic should be processed by this quality of service (QoS) map based on the differentiated services code point (DSCP) value in the IP header of the packet. Up to eight DSCP values or identifiers, separated by a space, may be specified in a match dscp command. Traffic matching any one of the DSCP values qualifies as a match for the given map entry. Use the no form of this command to discontinue matching. Variations of this command include:
match dscp <value> match dscp <value> afxx match dscp <value> csx match dscp afxx match dscp csx match dscp default match dscp ef
Syntax Description
<value> afxx Specifies the DSCP numeric value. Valid range is 0 to 63. Specifies the assured forwarding (AF) class and subclass. Select from: 11 (001010), 12 (001100), 13 (001110), 21 (010010), 22 (010100), 23 (010110), 31 (011010), 32 (011100), 33 (011110), 41 (100010), 42 (100100), or 43 (100110). Up to 8 DSCP values or identifiers may be specified. Specifies the class selector (CS) value. Valid range is 1 to 7. Up to 8 DSCP values or identifiers may be specified. Specifies the default IP DSCP value (000000). Specifies marking for expedited forwarding (EF).
csx default ef
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example instructs the QoS map named MyMap to match the IP header with a DSCP AF Class 1, Subclass 2 (af12): (config)#qos map MyMap 20 (config-qos-map)#match ip dscp af12
60000CRG0-35B
2894
Technology Review
The DSCP model was created in RFC 2474 and 2475 to build on the original type of service (ToS) field by creating a 6-bit sequence (combining the precedence value with the delay, throughput, and reliability bits). This 6-bit sequence increased the number of available values from 8 to 64. The DiffServ model introduced a new concept to QoS in the IP network environment: per-hop behaviors (PHBs). The PHB premise is that equipment using the DiffServ model have an agreed upon set of rules (PHB types) for handling certain network traffic. Though the RFC explicitly defines what each PHB should be capable of, it does not restrict vendor-specific implementation of the PHBs. Each vendor is free to decide how their network product implements the various defined PHBs. According to RFC 2474, the differentiated services (DS) field contains the following bits: 0 1 2 3 4 5 6 7
Unused*
*The previously unused bits in the DS field are now used for congestion control and are not discussed in this document.
Equipment following the DiffServ model (DSCP-compliant nodes) must use the entire 6-bit DSCP value to determine the appropriate PHB. The PHBs are defined as the following: Default PHB Class selector PHB Assured forwarding PHB (RFC 2597) Expedited forwarding PHB (RFC 2598)
Default PHB All DSCP-compliant nodes must provide a default PHB to offer best-effort forwarding service. For default PHBs, the DSCP value is 0. Any packet that does not contain a standardized DSCP should be mapped to the default PHB and handled accordingly. Class Selector PHB In the class selector PHB, the first three bits in the DSCP value are used for backwards compatibility to systems implementing IP precedence. In this scenario, all but the first three bits of the DS field are set to 0. This compatibility requires DSCP-compliant nodes to provide the same data services as are provided by nodes implementing IP precedence. The following table is a comparison of IP precedence values to their corresponding DSCP values. IP Precedence Value (bits) 0 (000) 1 (001) 2 (010) DSCP Value (bits) 0 (000000) 8 (001000) 16 (010000)
60000CRG0-35B
2895
The flexibility of DiffServ allows for more developed subclasses of service within each main class using the last three bits of the DSCP. As defined in RFC 2597, the assured forwarding PHB creates four main classes of service: Class AF1 AF2 AF3 AF4 DSCP Bits 001XX0 010XX0 011XX0 100XX0
X indicates a do not care value. The first three bits of the DSCP specify the class and the last bit is always 0. Each class is separated into subclasses using the two remaining bits in the DSCP (bits 3 and 4). The subclasses are divided based on the likelihood that packets in the class are dropped in the event of network congestion. The higher the value for bits 3 and 4, the greater the likelihood that the packets will be dropped. Bit 3 0 1 1 Bit 4 1 0 1 Drop Precedence Low Medium High
60000CRG0-35B
2896
The following table lists the assured forwarding PHB subclasses and their corresponding DSCP bits and values. Class AF1 Subclass 1 2 3 AF2 1 2 3 AF3 1 2 3 AF4 1 2 3 Expedited Forwarding PHB RFC 2598 created a new DiffServ PHB intended to provide the best service possible on an IP network. Packets using the expedited forwarding PHB markings should provide service to reduce latency, jitter, and dropped packets, and be guaranteed bandwidth during the entire end-to-end transmission journey through the network. The DSCP value for the expedited forwarding PHB is 46 (DSCP bits are 101110). DSCP Bits 001010 001100 001110 010010 010100 010110 011010 011100 011110 100010 100100 100110 DSCP Value 10 12 14 18 20 22 26 28 30 34 36 38
60000CRG0-35B
2897
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example instructs the QoS map named MyMap to match the IP precedence value of 5: (config)#qos map MyMap 20 (config-qos-map)#match precedence 5
Technology Review
RFC 791 created a single octet (labeled type of service (ToS)) to help with the difficulty of trying to provide QoS handling in IP networks. According to RFC 791, the ToS field contains the following bits: 0 1 2 3 4 5 6 7
Precedence
60000CRG0-35B
2898
Command Reference Guide The 3-bit IP precedence values (0 through 7) are specified as: 111 110 101 100 011 010 001 000 Network Control Packets Internetwork Control Packets Critical Traffic Flash Override Flash Immediate Servicing Priority Traffic Routine Data
The IP precedence values provide network routers with information about what kind of traffic is contained in the IP packet. Based on the IP precedence values, some networks (when supported) can offer special handling to certain packets. In addition, providing IP precedence values to critical traffic (such as route information) ensures that critical packets will always be delivered regardless of network congestion. This traffic is often critical to network and internetwork operation. In general, the higher the IP precedence value, the more important the traffic and the better handling it should receive in the network. It is important to remember that not all equipment in the public IP network will be configured to recognize and handle IP precedence values. While it is a good idea to set the values for critical traffic, it does not guarantee special handling. In addition to the precedence values, RFC 791 specifies bits for delay, throughput, and reliability to help balance the needs of particular traffic types when traveling on the IP network infrastructure. When these bits are set to 0, they are handled with normal operation. When set to 1, each bit specifies premium handling for that parameter. For example, a 1 in the delay position indicates that the traffic is delay sensitive and care should be taken to minimize delay. A 1 in the throughput position indicates that the traffic has higher bandwidth requirements that should be met. A 1 in the reliability position indicates that the traffic is sensitive to delivery issues and care should be taken to ensure proper delivery with all packets of this type. These extra bits are rarely used because they are quite difficult to balance the cost and benefits of each parameter (especially when more than one bit is set to 1).
60000CRG0-35B
2899
priority
Use the priority command to specify a high-priority queue, prioritizing this traffic above all others. If no traffic is present in any other queue, priority traffic is allowed to burst up to the interface rate; otherwise, priority traffic above the specified bandwidth is dropped. Use the no form of this command to disable this feature. Variations of this command include:
priority <rate> priority <rate> strict-rate-limiting priority <rate> <burst size> priority <rate> <burst size> strict-rate-limiting priority <rate> <burst size> Bytes priority <rate> <burst size> Bytes strict-rate-limiting priority <rate> <burst size> KB priority <rate> <burst size> KB strict-rate-limiting priority <rate> <burst size> MB priority <rate> <burst size> MB strict-rate-limiting priority <rate> Kbps priority <rate> Kbps strict-rate-limiting priority <rate> Kbps <burst size> priority <rate> Kbps <burst size> strict-rate-limiting priority <rate> Kbps <burst size> Bytes priority <rate> Kbps <burst size> Bytes strict-rate-limiting priority <rate> Kbps <burst size> KB priority <rate> Kbps <burst size> KB strict-rate-limiting priority <rate> Kbps <burst size> MB priority <rate> Kbps <burst size> MB strict-rate-limiting priority <rate> Mbps priority <rate> Mbps strict-rate-limiting priority <rate> Mbps <burst size> priority <rate> Mbps <burst size> strict-rate-limiting priority <rate> Mbps <burst size> Bytes priority <rate> Mbps <burst size> Bytes strict-rate-limiting priority <rate> Mbps <burst size> KB priority <rate> Mbps <burst size> KB strict-rate-limiting priority <rate> Mbps <burst size> MB priority <rate> Mbps <burst size> MB strict-rate-limiting priority percent <value> priority percent <value> strict-rate-limiting priority percent <value> <burst size> priority percent <value> <burst size> strict-rate-limiting priority percent <value> <burst size> Bytes priority percent <value> <burst size> Bytes strict-rate-limiting priority percent <value> <burst size> KB priority percent <value> <burst size> KB strict-rate-limiting priority percent <value> <burst size> MB
60000CRG0-35B
2900
Command Reference Guide priority percent <value> <burst size> MB strict-rate-limiting priority unlimited
The priority command cannot be specified in conjunction with the shape average command in a quality of service (QoS) entry. Syntax Description
<rate> <burst size> Specifies the bandwidth rate, prioritizing this traffic above all other user traffic. Range is 8 to 1000000 kilobits per second (kbps). Optional. Specifies the maximum burst size (MBS) (in bytes) for traffic in this priority queue. This parameter should be left unconfigured for optimal performance. Range for bandwidth burst is 32 to 1000000 bytes. Range for percentage burst is 32 to 2000000 bytes. Optional. Indicates the rate specified is in kbps. Optional. Indicates the rate specified is in megabits per second (Mbps). Optional. Indicates the burst size specified is in bytes. Optional. Indicates the burst size specified is in kilobytes (kB). Optional. Indicates the burst size specified is in megabytes (MB). Allocates a maximum bandwidth for a traffic class, specifying the maximum as a percentage of the total interface bandwidth. This command is especially useful for protecting bandwidth allocation in multilink applications. Refer to Functional Notes for more details. Optional. When used with the priority command, this feature limits priority traffic to a maximum rate as specified by the <rate> variable. When used with priority percent command, this feature limits priority traffic to a maximum percentage of the interface bandwidth as specified by the <value> variable. Optional. Specifies no limits on the priority queue bandwidth. Use of this feature could potentially use all of the available bandwidth on the interface, even when the max-reserved-bandwidth command is not set to 100 percent.
strict-rate-limiting
unlimited
Use the priority unlimited command with caution as it could prevent vital Layer 2 traffic from being processed. A network outage could occur when excessive priority traffic is present and consumes all of the available bandwidth on the interface. Default Values
No default values are necessary for this command. The priority rate is assumed to be provided in Kbps unless Mbps is specified. The burst size is assumed to be provided in bytes unless KB or MB is specified.
60000CRG0-35B
2901
Command History
Release 6.1 Release 17.5 Release 18.1 Command was introduced. Command was expanded to allow specifying the rate in kbps and Mbps. Specifying the burst size in bytes, MB, and kB was also added. Command was expanded to include the strict-rate-limiting parameter.
Functional Notes
Priority queues are intended for constant bit rate (CBR) traffic, such as voice (due to the rate limiting). Non-CBR traffic typically does not respond well to packet dropping when it is rate limited, so the transfer rate can be much less efficient. Important data traffic should typically use the class-based queue bandwidth command (refer to bandwidth on page 2886) instead. The sum of the bandwidths reserved by priority and bandwidth commands for all entries of a QoS map cannot exceed the available bandwidth on the interface (calculated by the total interface bandwidth minus the max-reserved-bandwidth rate specified for the interfaces to which the QoS map is applied). Priority bandwidth is guaranteed bandwidth (in kbps).
Weighted fair queuing (WFQ) must be enabled on an interface to use priority queuing. By default, WFQ is enabled for all interfaces with maximum bandwidth speeds equivalent to T1/E1 and below.
Determining Bandwidth Entries
When possible, use the priority <rate> command to specify an absolute amount of bandwidth (in kbps) for the priority queue.
60000CRG0-35B
2902
When determining the priority percent <value> entry, use the following formula: Bandwidth x 100 [(max-reserved-bandwidth)(Line Rate)] where Bandwidth max-reserved-bandwidth Line Rate Specifies the minimum amount of bandwidth needed for the traffic (in kbps). Specifies the percentage of the total line rate available for use by QoS. Specifies the total data rate configured on the interface (for example, 8 DS0s (64 kbps per DS0) on a T1 equals a line rate of 512 kbps).
For example, to specify 80 kbps of data on an interface with a total of 512 kbps of available bandwidth, enter the following command: (config-qos-map 1)#priority percent 16
Usage Examples
The following example configures QoS for a network with the following needs: Reserve 15 percent of the line rate for routing traffic and L2 protocol traffic (max-reserved-bandwidth = 85). Line Rate = 512 kbps Guaranteed 256 kbps for Voice Guaranteed 96 kbps for Class 1 Guaranteed 52 kbps for Class 2 To configure this QoS policy, enter the following QoS map and interface commands: 1. Allocate low latency queuing (LLQ) priority voice traffic. (config)#qos map MyMap 10 (config-qos-map)#match list VOICE (config-qos-map)#priority 256 2. Allocate the class-based weighted fair queuing (CBWFQ) data traffic bandwidth for Classes 1 and 2. (config)#qos map MyMap 20 (config-qos-map)#match list CLASS_1 (config-qos-map)#bandwidth 96 (config)#qos map MyMap 30 (config-qos-map)#match list CLASS_2 (config-qos-map)#bandwidth 52 3. Specify the reserved bandwidth on the appropriate interface and apply the map. (config-fr 1)#max-reserved-bandwidth 85 (config-fr 1)#qos-policy out MyMap
60000CRG0-35B
2903
Syntax Description
<map name> Specifies the QoS map name.
Default Values
No default values are necessary for this command.
Command History
Release 17.2 Command was introduced.
Functional Notes
The qos-policy command has two functions in the ADTRAN Operating System (AOS) command line interface (CLI). In the application described here, it is used to further subdivide a class into more specific subclasses. From the interface configuration command set, it is used to apply a QoS map to the interface. Refer to qos-policy on page 1554 in the Ethernet Interface Command Set for more information on using the qos-policy command in the interface configuration command set. When subdividing a QoS policy map, the most specific (or child map) QoS map should be created first and then the map is referenced using the qos-policy command within the QoS map entry of the base map that is being subdivided. The base (or parent map) is applied to the interface using the qos-policy out command (refer to qos-policy on page 1554). Only two levels of maps are allowed, meaning child maps (or subclasses) cannot have additional child maps beneath them. A child map cannot reference another child map. If the child map referenced by this command is deleted, then the qos-policy command is also deleted from the parent map.
Usage Examples
For example, the following configuration uses the ShapeEVCs QoS map to constrain each VLANs traffic to specific rates. The virtual local area network (VLAN) 2 traffic that is put into the shaping queue is broken up into class-based queuing (CBQ) or low latency queuing (LLQ) subclasses using the classQueues QoS map. Traffic not matching a QoS map entry is treated as best effort, and is dynamically assigned to a best effort weighted fair queuing (WFQ). (config)#qos map classQueues 10 (config-qos-map)#match dscp ef (config-qos-map)#priority 200
60000CRG0-35B
2904
Command Reference Guide (config-qos-map)#qos map classQueues 20 (config-qos-map)#match dscp af31 af32 af33 (config-qos-map)#bandwidth 500 ! class based rate in Kbps (config-qos-map)#qos map ShapeEVCs 10 (config-qos-map)#match vlan 2 (config-qos-map)#shape average 1000000 (config-qos-map)#qos-policy classQueues (config-qos-map)#qos map ShapeEVCs 20 (config-qos-map)#match vlan 3 (config-qos-map)#shape average 2000000 (config-qos-map)#interface eth 0/1 (config-eth 0/1)#encapsulation 802.1q (config-eth 0/1)#qos-policy out ShapeEVCs (config-eth 0/1)#interface eth 0/1.2 (config-eth 0/1.2)#vlan-id 2 (config-eth 0/1.2)#interface eth 0/1.3 (config-eth 0/1.3)#vlan-id 3
! vlan2Rate in bps
! vlan3Rate
60000CRG0-35B
2905
Default Values
No default values are necessary for this command.
Command History
Release 17.2 Command was introduced.
Functional Notes
QoS policies are configured in the ADTRAN Operating System (AOS) command line interface (CLI) to dictate the priority for servicing specified traffic types on a particular interface. QoS policies contain at least one match reference (using the match command) and one or more action items (using the priority, bandwidth, shape, or set commands). The set cos command can be used to change the Ethernet 802.1p priority field for traffic serviced by the QoS policy. Every 802.1q tagged Ethernet frame contains a 3-bit CoS field used for marking data types requiring special handling when traveling through the network.
Usage Examples
The following example sets the CoS value, for all matching traffic within the specified QoS map entry, to 1: (config)#qos map VOICEMAP 10 (config-qos-map)#set cos 1 The following example removes all CoS value change requests from the QoS map entry: (config)#qos map VOICEMAP 10 (config-qos-map)#no set cos
60000CRG0-35B
2906
set dscp
Use the set dscp command to modify the differentiated services code point (DSCP) field (on matching packets) to the specified value. For more details on determining the DSCP field, refer to the Technology Review section of the command match dscp on page 2894. Use the no form of this command to remove a specified DSCP value. Variations of this command include:
set dscp <value> set dscp afxx set dscp csx set dscp default set dscp ef
Syntax Description
<value> afxx Specifies the DSCP numeric value. Valid range is 0 to 63. Specifies the assured forwarding (AF) class and subclass. Select from: 11 (001010), 12 (001100), 13 (001110), 21 (010010), 22 (010100), 23 (010110), 31 (011010), 32 (011100), 33 (011110), 41 (100010), 42 (100100), or 43 (100110). Specifies the class selector (CS) value. Valid range is 1 to 7. Specifies the default IP DSCP value (000000). Specifies marking for expedited forwarding (EF).
csx default ef
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Command was introduced.
Functional Notes
Quality of service (QoS) policies are configured in the ADTRAN Operating System (AOS) command line interface (CLI) to dictate the priority for servicing specified traffic types on a particular interface. QoS policies contain at least one match reference (using the match command) and one or more action items (using the priority, bandwidth, shape, or set commands). The set dscp command can be used to change the differentiated services (DS) field for incoming traffic serviced by the quality of service (QoS) policy. Every IPv4 header contains an 8-bit type of service (ToS) field used for marking data types requiring special handling when traveling through the network. Originally this ToS field was used for IP precedence markings (using only the first three bits of the 8-bit field), and was later revised in RFC 2474 to create the 6-bit DS field (reserving the last two bits of the field for future use). The DS field can be manipulated to indicate higher or lower traffic priority using decimal values between 0 and 63.
60000CRG0-35B
2907
Usage Examples
This command sets the DSCP value, for all matching traffic within the specified QoS map entry, to 46: (config)#qos map VOICEMAP 10 (config-qos-map)#set dscp 46
60000CRG0-35B
2908
Default Values
No default values are necessary for this command.
Command History
Release 17.2 Command was introduced.
Usage Examples
The following example sets the precedence value, for all matching traffic within the specified QoS map entry, to 1: (config)#qos map VOICEMAP 10 (config-qos-map)#set precedence 1 The following example removes all precedence value change requests from the QoS map entry: (config)#qos map VOICEMAP 10 (config-qos-map)#no set precedence
60000CRG0-35B
2909
shape average
Use the shape average command to shape the traffic in this class to an average rate. Use the no form of this command to disable this feature. Variations of this command include:
shape average <rate> [count-eth-overhead] shape average <rate> bps shape average <rate> bps burst <size> shape average <rate> bps burst <size> Bytes [count-eth-overhead] shape average <rate> bps burst <size> KB [count-eth-overhead] shape average <rate> bps burst <size> MB [count-eth-overhead] shape average <rate> bps burst <size> [count-eth-overhead] shape average <rate> bps [count-eth-overhead] shape average <rate> Kbps shape average <rate> Kbps burst <size> shape average <rate> Kbps burst <size> Bytes [count-eth-overhead] shape average <rate> Kbps burst <size> KB [count-eth-overhead] shape average <rate> Kbps burst <size> MB [count-eth-overhead] shape average <rate> Kbps burst <size> [count-eth-overhead] shape average <rate> Kbps [count-eth-overhead] shape average <rate> Mbps shape average <rate> Mbps burst <size> shape average <rate> Mbps burst <size> Bytes [count-eth-overhead] shape average <rate> Mbps burst <size> KB [count-eth-overhead] shape average <rate> Mbps burst <size> MB [count-eth-overhead] shape average <rate> Mbps burst <size> [count-eth-overhead] shape average <rate> Mbps [count-eth-overhead] shape average <rate> burst <size> [count-eth-overhead] shape average <rate> burst <size> Bytes [count-eth-overhead] shape average <rate> burst <size> KB [count-eth-overhead] shape average <rate> burst <size> MB [count-eth-overhead]
The shape average command cannot be specified in conjunction with the priority command in a quality of service (QoS) entry.
60000CRG0-35B
2910
Syntax Description
<rate> burst <size> Specifies an average bandwidth. Range is 8192 to 1000000000 bits per second (bps). Optional. Specifies the maximum burst size (MBS) (in bytes) for traffic in this QoS map entry. This parameter should be left unconfigured for optimal performance. Range is 1600 to 6250000 bytes. Optional. Indicates to include the Ethernet header overhead bytes when determining packet size. Optional. Indicates the rate specified is in bps. Optional. Indicates the rate specified is in kilobits per second (kbps). Optional. Indicates the rate specified is in megabits per second (Mbps). Optional. Indicates the burst size specified is in bytes. Optional. Indicates the burst size specified is in kilobytes (kB). Optional. Indicates the burst size specified is in megabytes (MB).
Default Values
The default shape average rate is specified in bps. The default burst size is specified in bytes.
Command History
Release 17.2 Release 17.5 Command was introduced. Command was expanded to allow specifying shape average rate in bps, kbps, and Mbps. Specifying the burst size in bytes, MB, and kB was also added.
Functional Notes
Traffic shaping allows the traffic to be smoothed in order to maintain a uniform rate to take full advantage of the provided bandwidth. Short bursts of traffic above the configured rate are allowed when there is sufficient budget. Traffic outside of the current budget is put into a shaping queue and transmitted once the budget is available.
Usage Examples
The following example shapes the traffic in this QoS class to an average rate of 2000000 bps: (config)#qos map VOICEMAP 10 (config-qos-map)#shape average 2000000
60000CRG0-35B
2911
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2913 server <hostname | ip address> on page 2914
60000CRG0-35B
2912
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#aaa group server radius RADAuthgroup (config-sg-radius)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2913
Syntax Description
<hostname | ip address> Specifies the server to add to the group. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). If a host name is used, a domain naming system (DNS) server should be learned by the AOS device using Dynamic Host Configuration Protocol (DHCP), Point-to-Point Protocol (PPP), or specified in the Global Configuration mode with the command ip name-server on page 983. Optional. Specifies the User Datagram Protocol (UDP) port for AAA accounting services with the RADIUS server being added to the RADIUS server group. Port range is 0 to 65535. This command is reserved for future use as currently AOS does not allow RADIUS servers for use with accounting. Optional. Specifies the UDP port for AAA authentication services with the RADIUS server being added to the RADIUS server group. Port range is 0 to 65535.
acct-port <number>
auth-port <number>
Default Values
By default, the accounting port is set to 1813 and the authentication port is set to 1812.
Command History
Release 5.1 Command was introduced.
Functional Notes
Empty RADIUS server groups are not saved. When the last server is removed from a group, AOS automatically deletes the group. If you choose to change the default authentication port for the RADIUS server, you can then create multiple host entries for the same server. Server groups can have multiple host entries for the same server as long as each entry has a unique identifier (an IP address and a UDP port). If you configure two host entries on the same RADIUS server and are using both host entries for the same service (for example, using both entries for authentication), then the second entry functions as a failover. RADIUS host entries are tried in the order they are configured, so the failover entry is the second configured entry. For more information about server groups, refer to the command aaa group server on page 830.
60000CRG0-35B
2914
Usage Examples
The following example specifies that the RADIUS servers at IP address 192.168.1.2 and 192.168.1.3 are added to the server group RADAuthgroup: (config)#aaa group server radius RADAuthgroup (config-sg-radius)#server 192.168.1.2 (config-sg-radius)#server 192.168.1.3 (config-sg-radius)#exit (config)#
60000CRG0-35B
2915
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2918 match as-path <name> on page 2919 match community <name> on page 2920 match ip address <name> on page 2921 match ip address prefix-list <name> on page 2922 match ip dscp on page 2923 match ip precedence on page 2927 match length <minimum> <maximum> on page 2929 match metric <value> on page 2930 match tag <number> on page 2931 set as-path prepend on page 2932 set comm-list <name> delete on page 2933 set community on page 2934 set default interface on page 2936 set interface <interface> on page 2937 set ip default next-hop <interface> on page 2938
60000CRG0-35B
2916
set ip df on page 2939 set ip dscp on page 2940 set ip next-hop <ip address> on page 2941 set ip precedence on page 2942set local-preference <value> on page 2943 set metric <value> on page 2944 set metric-type on page 2945
60000CRG0-35B
2917
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#route-map MyMap permit 100 (config-route-map)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2918
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example instructs the route map named MyMap to match the AS path list named TestPath: (config)#route-map MyMap permit 100 (config-route-map)#match as-path TestPath
60000CRG0-35B
2919
Syntax Description
<name> exact-match Specifies the name of the community you want to match. Optional. Specifies that the route map must match the community name exactly.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example instructs the route map named MyMap to match the community named MyCommunity: (config)#route-map MyMap permit 100 (config-route-map)#match community MyCommunity
60000CRG0-35B
2920
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example instructs the route map named MyMap to match the IP address ACL named MyList: (config)#route-map MyMap permit 100 (config-route-map)#match ip address MyList
60000CRG0-35B
2921
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example instructs the route map named MyMap to match the IP address prefix list named MyList: (config)#route-map MyMap permit 100 (config-route-map)#match ip address prefix-list MyList
60000CRG0-35B
2922
match ip dscp
Use the match ip dscp command to configure the route map to route traffic based on the differentiated services code point (DSCP) value in the IP header of the packet. Use the no form of this command to discontinue matching. Variations of this command include:
match ip dscp <value> match ip dscp afxx match ip dscp csx match ip dscp default match ip dscp ef
Syntax Description
<value> afxx Specifies the DSCP numeric value. Valid range is 0 to 63. Specifies the assured forwarding (AF) class and subclass. Select from: 11 (001010), 12 (001100), 13 (001110), 21 (010010), 22 (010100), 23 (010110), 31 (011010), 32 (011100), 33 (011110), 41 (100010), 42 (100100), or 43 (100110). Specifies the class selector (CS) value. Valid range is 1 to 7. Specifies the default IP DSCP value (000000). Specifies marking for expedited forwarding (EF).
csx default ef
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Functional Notes
The differentiated services (DiffServ or DS) model was created in RFC 2474 and RFC 2475 to build on the original type of service (ToS) field by creating a six-bit sequence (combining the precedence value with the delay, throughput, and reliability bits). This six-bit sequence increased the number of available values from 8 to 64. The DiffServ model introduced a new concept to quality of service (QoS) in the IP network environment: per-hop behaviors (PHBs). The PHB premise is that equipment using the DiffServ model have an agreed upon set of rules (PHB types) for handling certain network traffic. Though the RFC explicitly defines what each PHB should be capable of, it does not restrict vendor-specific implementation of the PHBs. Each vendor is free to decide how their network product implements the various defined PHBs.
60000CRG0-35B
2923
Command Reference Guide According to RFC 2474, the DS field contains the following bits:
Unused*
* The previously unused bits in the DS field are now used for congestion control and are not discussed in this document.
Equipment following the DiffServ model (DS-compliant nodes) must use the entire six-bit DSCP value to determine the appropriate PHB. The PHBs are defined as the following: Default PHB Class selector PHB Assured forwarding PHB (RFC 2597) Expedited forwarding PHB (RFC 2598)
Default PHB All DS-compliant nodes must provide a default PHB to offer best-effort forwarding service. For default PHBs, the DSCP value is 0. Any packet that does not contain a standardized DSCP should be mapped to the Default PHB and handled accordingly. Class Selector PHB In the class selector PHB, the first three bits in the DSCP value are used for backwards compatibility to systems implementing IP precedence. In this scenario, all but the first three bits of the DS field are set to 0. This compatibility requires DS-compliant nodes to provide the same data services as are provided by nodes implementing IP precedence. The following table is a comparison of IP precedence values to their corresponding DSCP values. IP Precedence Value (bits) 0 (000) 1 (001) 2 (010) 3 (011) 4 (100) 5 (101) 6 (110) 7 (111) DSCP Value (bits) 0 (000000) 8 (001000) 16 (010000) 24 (011000) 32 (100000) 40 (101000) 48 (110000) 56 (111000)
60000CRG0-35B
2924
The flexibility of DiffServ allows for more developed subclasses of service within each main class using the last three bits of the DSCP. As defined in RFC 2597, the assured forwarding PHB creates four main classes of service: Class AF1 AF2 AF3 AF4 DSCP Bits 001XX0 010XX0 011XX0 100XX0
The first three bits of the DSCP specify the class and the last bit is always zero. Each class is separated into subclasses using the two remaining bits in the DSCP (bits 3 and 4). The subclasses are divided based on the likelihood that packets in the class are dropped in the event of network congestion. The higher the value for bits 3 and 4, the greater the likelihood that the packets will be dropped. Drop Precedence Low Medium High
Bit 3 0 1 1
Bit 4 1 0 1
The following table lists the assured forwarding PHB subclasses and their corresponding DSCP bits and values. Class AF1 Subclass 1 2 3 AF2 1 2 3 AF3 1 2 3 AF4 1 2 3 DSCP Bits 001010 001100 001110 010010 010100 010110 011010 011100 011110 100010 100100 100110 DSCP Value 10 12 14 18 20 22 26 28 30 34 36 38
60000CRG0-35B
2925
RFC 2598 created a new DiffServ PHB intended to provide the best service possible on an IP network. Packets using the expedited forwarding PHB markings should provide service to reduce latency, jitter, and dropped packets, and be guaranteed bandwidth during the entire end-to-end transmission journey through the network. The DSCP value for the expedited forwarding PHB is 46 (DSCP bits are 101110).
Usage Examples
The following example instructs the route map named MyMap to match the IP header with a DSCP AF Class 1, Subclass 2 (af12): (config)#route-map MyMap permit 100 (config-route-map)#match ip dscp af12
60000CRG0-35B
2926
match ip precedence
Use the match ip precedence command to configure the route map to route traffic based on the precedence value in the IP header of the packet. Use the no form of this command to discontinue matching. Variations of this command include:
match ip precedence <value> match ip precedence critical match ip precedence flash match ip precedence flash-override match ip precedence immediate match ip precedence internet match ip precedence network match ip precedence priority match ip precedence routine
Syntax Description
<value> routine priority immediate flash flash-override critical internet network Specifies matching the IP precedence (in numeric value). Valid range is 0 to 7 in ascending order of importance. Specifies matching the IP precedence routine. (Numeric value of 0.) Specifies matching the IP precedence priority. (Numeric value of 1.) Specifies matching the IP precedence immediate. (Numeric value of 2.) Specifies matching the IP precedence flash. (Numeric value of 3.) Specifies matching the IP precedence flash-override. (Numeric value of 4.) Specifies matching the IP precedence critical. (Numeric value of 5.) Specifies matching the IP precedence internet. (Numeric value of 6.) This level is reserved for internal network use. Specifies matching the IP precedence network. (Numeric value of 7.) This level is reserved for internal network use.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Functional Notes
RFC 791 created a single octet (labeled type of service (ToS)) to help with the difficulty of trying to provide quality of service (QoS) handling in IP networks.
60000CRG0-35B
2927
Command Reference Guide According to RFC 791, the ToS field contains the following bits:
Unused
The three-bit IP precedence values (0 through 7) are specified as: 111 110 101 100 011 010 001 000 Network Control Packets Internetwork Control Packets Critical Traffic Flash Override Flash Immediate Servicing Priority Traffic Routine Data
The IP precedence values provide network routers with information about the kind of traffic contained in the IP packet. Based on the IP precedence values, some networks (when supported) can offer special handling to certain packets. In addition, providing IP precedence values to critical traffic (such as route information) ensures that critical packets will always be delivered regardless of network congestion. This traffic is often critical to network and internetwork operation. In general, the higher the IP precedence value, the more important the traffic and the better handling it should receive in the network. It is important to remember that not all equipment in the public IP network will be configured to recognize and handle IP precedence values. While it is a good idea to set the values for critical traffic, it does not guarantee special handling. In addition to the IP precedence values, RFC 791 specifies bits for delay, throughput, and reliability to help balance the needs of particular traffic types when traveling on the IP network infrastructure. When these bits are set to 0, they are handled with normal operation. When set to 1, each bit specifies premium handling for that parameter. For example, a 1 in the delay position indicates that the traffic is delay sensitive and care should be taken to minimize delay. A 1 in the throughput position indicates that the traffic has higher bandwidth requirements that should be met. A 1 in the reliability position indicates that the traffic is sensitive to delivery issues and care should be taken to ensure proper delivery with all packets of this type. These extra bits are rarely used because it is quite difficult to balance the cost and benefits of each parameter (especially when more than one bit is set to 1).
Usage Examples
The following example instructs the route map named MyMap to match the IP precedence value of critical: (config)#route-map MyMap permit 100 (config-route-map)#match ip precedence critical
60000CRG0-35B
2928
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example instructs the route map named MyMap to match packets with a minimum length of 1 and a maximum length of 200: (config)#route-map MyMap permit 100 (config-route-map)#match length 1 200
60000CRG0-35B
2929
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example instructs the route map named MyMap to match the metric value 100: (config)#route-map MyMap permit 100 (config-route-map)#match metric 100
60000CRG0-35B
2930
Syntax Description
<number> Specifies the desired route tag value to match. If more than one value is specified, the match command will pass if any value matches. Valid range is 1 to 65535.
Default Values
No default values are necessary for this command.
Command History
Release 15.1 Command was introduced.
Functional Notes
More than one value may be specified as a tag to be matched.
Usage Examples
The following example instructs the route map named MyMap to match a route tag of 100 or 200: (config)#route-map MyMap permit 100 (config-route-map)#match tag 100 200
Technical Review
The command ip route on page 997 is related to the match tag command in that it includes an optional parameter to set the route tag value for local static routes. Virtual private network (VPN) reverse-route injection (RRI) routes can also have a tag applied.
60000CRG0-35B
2931
Syntax Description
<number> last-as <number> Specifies a number to be prepended to the AS path value as an autonomous number. Valid range is 1 to 65535. Specifies a number to be prepended to the last AS path number. Valid range is 1 to 10.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example prepends the number 2 to the last AS path number: (config)#route-map MyMap permit 100 (config-route-map)#set as-path prepend last-as 2
60000CRG0-35B
2932
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Functional Notes
A community list must be defined using the ip community-list command before the set comm-list delete command can be used. Refer to ip community-list <name> on page 904 for information on configuring a community list.
Usage Examples
The following example deletes the community list named listname: (config)#route-map MyMap permit 100 (config-route-map)#set comm-list listname delete
60000CRG0-35B
2933
set community
Use the set community command to modify the community attribute for all paths serviced by the route map. Use the no form of this command to disable this feature. Variations of this command include:
set community <value> set community <value> add set community <value> internet set community <value> local-as set community <value> no-advertise set community <value> no-export set community none
Syntax Description
<value> Sets the community attribute to the specified community number for routes serviced by this route map. This is a numeric value that can be an integer from 1 to 4294967295 or string in the form aa:nn, where the value of aa is the autonomous system (AS) number and the value of nn is the community number. Multiple community-number parameters can be present in the command. Appends the listed community number to the end of the community attribute for routes serviced by this route map. Sets the community attribute to the INTERNET community number for routes serviced by this route map. Sets the community attribute to the NO_EXPORT_SUBCONFED community number for routes serviced by this route map. Routes containing this attribute should not be advertised to external Border Gateway Protocol (BGP) peers. Sets the community attribute to the NO_ADVERTISE community number for routes serviced by this route map. Routes containing this attribute should not be advertised to any BGP peer. Sets the community attribute to the NO_EXPORT community number for routes serviced by this route map. Routes containing this attribute should not be advertised to BGP peers outside a confederation boundary. Removes all communities from BGP routes serviced by this route map.
no-advertise
no-export
none
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
60000CRG0-35B
2934
Usage Examples
The following example sets the community number for BGP routes to the Internet community: (config)#route-map MyMap permit 100 (config-route-map)#set community internet
60000CRG0-35B
2935
Syntax Description
<interface> Specifies the default interface. Specify an interface in the format <interface type [slot/port | slot/port.subinterface id | interface id | interface id.subinterface id | ap | ap/radio | ap/radio.vap]>. For example, for a T1 interface, use t1 0/1; for an Ethernet subinterface, use eth 0/1.1; for a PPP interface, use ppp 1; for an ATM subinterface, use atm 1.1; and for a wireless virtual access point, use dot11ap 1/1.1. Type set default interface ? for a list of valid interface types. Redirects traffic to the specified interface regardless of available routing information.
null 0
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
Usage Examples
The following example sets the default interface as ppp 1 interface: (config)#route-map MyMap permit 100 (config-route-map)#set default interface ppp 1
60000CRG0-35B
2936
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release A4.01 Command was introduced. Command was expanded to include the Metro Ethernet Forum (MEF) Metro Ethernet interface.
Usage Examples
The following example sets the output interface as Point-to-Point Protocol (PPP) 1: (config)#route-map MyMap permit 100 (config-route-map)#set interface ppp 1
60000CRG0-35B
2937
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the default next-hop interface to the ppp 1 interface: (config)#route-map MyMap permit 100 (config-route-map)#set ip default next-hop ppp 1
60000CRG0-35B
2938
set ip df
Use the set ip df command to identify the packet as dont fragment (DF). Use the no form of this command to remove this designation. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example designates the packet as DF: (config)#route-map MyMap permit 100 (config-route-map)#set ip df
60000CRG0-35B
2939
set ip dscp
Use the set ip dscp command to configure the route map to set the differentiated services code point (DSCP) value in the IP header of the packet for traffic serviced by this route map. For more details on DSCP values, refer to the command match ip dscp on page 2923. Use the no form of this command to remove the specified DSCP value. Variations of this command include:
set ip dscp <value> set ip dscp afxx set ip dscp csx set ip dscp default set ip dscp ef
Syntax Description
<value> afxx Specifies the DSCP numeric value. Valid range is 0 to 63. Specifies the assured forwarding (AF) class and subclass. Select from: 11 (001010), 12 (001100), 13 (001110), 21 (010010), 22 (010100), 23 (010110), 31 (011010), 32 (011100), 33 (011110), 41 (100010), 42 (100100), or 43 (100110). Specifies the class selector (CS) value. Valid range is 1 to 7. Specifies the default IP DSCP value (000000). Specifies marking for expedited forwarding (EF).
csx default ef
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example instructs the route map named MyMap to set the IP header with a DSCP AF Class 1, Subclass 2 (af12): (config)#route-map MyMap permit 100 (config-route-map)#set ip dscp af12
60000CRG0-35B
2940
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the ip next-hop interface to 10.10.11.254 in the header of the route map named MyMap: (config)#route-map MyMap permit 100 (config-route-map)#set ip next-hop 10.10.11.254
60000CRG0-35B
2941
set ip precedence
Use the set ip precedence command to configure the route map to set the precedence value in the IP header of the packet for traffic serviced by the route map. For more details on IP precedence values, refer to the command match ip precedence on page 2927. Use the no form of this command to remove the specified IP precedence value. Variations of this command include:
set ip precedence <value> set ip precedence critical set ip precedence flash set ip precedence flash-override set ip precedence immediate set ip precedence internet set ip precedence network set ip precedence priority set ip precedence routine
Syntax Description
<value> routine priority immediate flash flash-override critical internet network Specifies matching the IP precedence (in numeric value). Valid range is 0 to 7 in ascending order of importance. Specifies matching the IP precedence routine. (Numeric value of 0.) Specifies matching the IP precedence priority. (Numeric value of 1.) Specifies matching the IP precedence immediate. (Numeric value of 2.) Specifies matching the IP precedence flash. (Numeric value of 3.) Specifies matching the IP precedence flash-override. (Numeric value of 4.) Specifies matching the IP precedence critical. (Numeric value of 5.) Specifies matching the IP precedence internet. (Numeric value of 6.) This level is reserved for internal network use. Specifies matching the IP precedence network. (Numeric value of 7.) This level is reserved for internal network use.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets an IP precedence value of critical in the IP header of the route map named MyMap: (config)#route-map MyMap permit 100 (config-route-map)#set ip precedence critical
60000CRG0-35B
2942
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example sets the local preference for MyMap to a value of 100: (config)#route-map MyMap permit 100 (config-route-map)#set local-preference 100
60000CRG0-35B
2943
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example sets the metric value for MyMap to 100: (config)#route-map MyMap permit 100 (config-route-map)#set metric 100
60000CRG0-35B
2944
set metric-type
Use the set metric-type command to set the open shortest path first (OSPF) metric type for the route map. Use the no form of this command to return to the default value. Variations of this command include:
set metric-type type-1 set metric-type type-2
Syntax Description
type-1 type-2 Specifies intra-area metric. Specifies inter-area metric.
Default Values
By default, the metric type is set to type 1.
Command History
Release 14.1 Command was introduced.
Usage Examples
The following example sets the metric-type value for MyMap to type 2: (config)#route-map MyMap permit 100 (config-route-map)#set metric-type type-2
60000CRG0-35B
2945
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the section listed below: cross-connect on page 65 exit on page 71 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order: color on page 2947 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2948 stats-filter <name> on page 2949 threat on page 2950
60000CRG0-35B
2946
color
Use the color command to display threats in the security monitor using a colored background to correspond to their threat level. Use the no version of this command to restore the system default. Syntax Description
No subcommands.
Default Values
By default, no color is displayed.
Command History
Release 17.5 Command was introduced.
Usage Examples
The following example turns on color in the security monitor: (config-)#ip security monitor (config-secmon)#color
60000CRG0-35B
2947
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config-)#ip security monitor (config-secmon)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2948
stats-filter <name>
Use the stats-filter command to apply a previously created security monitor statistics filter globally. Use the no version of this command to remove the filter. Syntax Description
<name> Specifies the filter to be applied.
Default Values
No default values are necessary for this command.
Command History
Release 17.5 Command was introduced.
Functional Notes A security monitor statistics filter is created from the global configuration mode using the command ip security monitor stats-filter <name> on page XXX. Usage Examples
The following example applies a filter named F1: (config-)#ip security monitor (config-secmon)# stats-filter F1
Functional Notes
A security monitor stats filter is created from the global configuration mode using the command ip security monitor stats-filter <name> on page 1029.
60000CRG0-35B
2949
threat
Use the threat command to define a filter. Use the no version of this command to remove all threats from the filter.Variations of this command include:
threat all threat all except <id(s)> threat add <id(s)> threat add <id(s)> except <id(s)> threat none threat remove <id(s)> threat remove <id(s)> except <id(s)>
Syntax Description
all <id(s)> add except none remove Adds all security threats to the filter. Specifies the ID of the security threat. Adds the specified security threats to the filter. Optional. Specifies security threats to be exempted from the filter. Removes all security threats from the filter. Removes the specified security threats from the filter.
Default Values
No default values are necessary for this command.
Command History
Release 17.5 Command was introduced.
Usage Examples
The following example adds all security threats to the filter: (config-)#ip security monitor stats-filter F1 Creating new filter F1. (config-secmon-filter)#threat all (config-secmon-filter)#
Functional Notes A list of security threat IDs can be displayed using the command show ip security on page 574. The security monitor stats filter is created from the global configuration mode using the command ip security monitor stats-filter <name> on page 1029.
60000CRG0-35B
2950
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2952 server <hostname | ip address> on page 2953
60000CRG0-35B
2951
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#aaa group server tacacs+ TACAuthgroup (config-sg-tacacs+)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2952
Default Values
By default, no TACACS+ server groups are configured.
Command History
Release 5.1 Command was introduced.
Functional Notes
Empty TACACS+ server groups are saved. When the last server is removed from a group, AOS automatically maintains the group. For more information about server groups, refer to the command aaa group server on page 830.
Usage Examples
The following example specifies that the TACACS+ servers at IP address 192.168.1.4 and 192.168.1.5 are added to the server group TACAuthgroup: (config)#aaa group server tacacs+ TACAuthgroup (config-sg-tacacs+)#server 192.168.1.4 (config-sg-tacacs+)#server 192.168.1.5 (config-sg-tacacs+)#exit (config)#
60000CRG0-35B
2953
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. interval on page 2955 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 2956 match list <name> on page 2957 monitor port <number> <description> on page 2958 sort-by on page 2959 top <number> on page 2960
60000CRG0-35B
2954
interval
Use the interval command to specify the minimum interval for which Top Talkers data is collected. Use the no form of this command to reset the interval to the default value. Variations of this command include:
interval 5 interval 10 interval 15
If the interval is changed after Top Talkers has been enabled, all accumulated data will be lost.
Syntax Description
5 10 15 Collects Top Talkers data at 5-minute intervals. Collects Top Talkers data at 10-minute intervals. Collects Top Talkers data at 15-minute intervals.
Default Values
By default, the interval for Top Talkers data collection is set to 5-minute intervals.
Command History
Release 17.1 Command was introduced.
Functional Notes
When viewing Top Talkers data, the current interval displayed is the interval set with this command. As the specified interval for data accumulation ends, the data is compiled into hourly, 24 hourly, and daily readouts.
Usage Examples
The following example sets the interval for Top Talkers data collection to 10-minute intervals: (config)#ip flow top-talkers (config-top-talkers)#interval 10
60000CRG0-35B
2955
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#ip flow top-talkers (config-top-talkers)#pv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
2956
Default Values
By default, no ACL is assigned and all traffic is considered.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example applies the ACL named engineering to filter Top Talkers data collection: (config)#ip flow top-talkers (config-top-talkers)#match list engineering
60000CRG0-35B
2957
Default Values
By default, port monitoring is enabled and monitors well-known Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports when Top Talkers is enabled. Up to 32 custom ports can be added to the port monitoring list.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example adds port 3724, the World of Warcraft gaming port, to Top Talkers port monitoring list: (config)#ip flow top-talkers (config-top-talkers)#monitor port 3724 World of Warcraft Gaming
60000CRG0-35B
2958
sort-by
Use the sort-by command to specify the type of data for the Top Talkers collection. Use the no form of this command to return the sorting procedure to the default setting. Variations of this command include the following:
sort-by packets sort-by bytes
If the statistic to be gathered is changed once Top Talkers is configured, all existing data will be lost.
Syntax Description
packets bytes Specifies packet statistics are monitored for Top Talkers collection. Specifies byte statistics are monitored for Top Talkers collection.
Default Values
By default, Top Talkers will collect byte statistics.
Command History
Release 17.1 Command was introduced.
Functional Notes
Data used in the Top Talkers collection can be collected by monitoring the number of packets sent or received or the number of bytes sent or received in a specified amount of time. Collection by byte count and packet count are mutually exclusive and must be configured by the user. Yet each can be helpful depending on specific network needs. Using packet counts to monitor hosts can make it easier to identify the source of problems in cases where a host is infected by a virus, or attacking the network with a port scan. Using byte counts can display overall bandwidth consumption on a host-by-host basis.
Usage Examples
The following example specifies packet statistics for collection: (config)#ip flow top-talkers (config-top-talkers)#sort-by packets
60000CRG0-35B
2959
top <number>
Use the top command to specify the number of listings included in the Top Talkers report. Use the no form of this command to return to the default value. If the number of listings is changed after Top Talkers has been enabled, all accumulated data will be lost.
Syntax Description
<number> Specifies the number of listings shown in the Top Talkers report. Range is 1 to 20.
Default Values
By default, Top Talkers will display 5 listings in a report.
Command History
Release 17.1 Command was introduced.
Usage Examples
The following example specifies that 10 listings will be included in the Top Talkers report: (config)#ip flow top-talkers (config-top-talkers)#top 10
60000CRG0-35B
2960
60000CRG0-35B
2961
The following commands are common to multiple command sets and are covered in a centralized section of this guide. for more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 exit on page 71 All other commands for this command set are described in this section in alphabetical order. member <extension> on page 2963 pickup-extension <extension> on page 2964
60000CRG0-35B
2962
member <extension>
Use the member command to add members to the call pickup group. Use the no form of this command to remove the member from the group. Syntax Description
<extension> Specifies the four-digit extension of the user being added to the group.
Default Values
By default, no members are included in call pickup groups.
Command History
Release A4.01 Command was introduced.
Functional Notes
Use the member command as many times as necessary to add the desired number of members to the group.
Usage Examples
The following example adds the user with extension 1234 to the call pickup group Sales: (config)#voice pickup-group Sales (config-Sales)#member 1234
60000CRG0-35B
2963
pickup-extension <extension>
Use the pickup-extension command to specify the extension dialed by members of the call pickup group to answer calls. To be used by the call pickup group, this extension must not be assigned to another user. Use the no form of this command to remove the extension from the call pickup group. Syntax Description
<extension> Specifies the four-digit extension used by members of the call pickup group to answer calls.
Default Values
By default, there is no pickup extension defined for call pickup groups.
Command History
Release A4.01 Command was introduced.
Functional Notes
The extension specified for the group must be a previously unassigned extension.
Usage Examples
The following example specifies that extension 8510 is used by the members of the call pickup group Sales to answer calls: (config)#voice pickup-group Sales (config-Sales)#pickup-extension 8510
60000CRG0-35B
2964
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. accept-number <number> on page 2966 call-type on page 2967 connect pri on page 2968 incoming-accept-number <number> on page 2969 max-channels <value> on page 2971 min-channels <value> on page 2972 resource pool-member <name> on page 2973
60000CRG0-35B
2965
accept-number <number>
Use the accept-number command to specify the incoming number to be accepted by this integrated services digital network (ISDN) group. This number will be accepted and passed from the network to the end users. Syntax Description
<number> Specifies the incoming number to be accepted by this ISDN group.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example specifies that ISDN group 1 will accept calls from 256-555-1234: (config)#isdn-group 1 (config-isdn-group 1)#accept-number 2565551234
60000CRG0-35B
2966
call-type
Use the call-type command to specify the type of communication allocated for this group. Use the no form of this command to return to the default value. Variations of this command include:
call-type analog call-type voice
Syntax Description
analog voice Configures the type of communication for 3.1 kHz audio. Configures the type of communication for speech.
Default Values
By default, the call type is set to voice.
Command History
Release 11.1 Release A4.03 Command was introduced. Command was expanded to include analog call type.
Usage Examples
The following example sets the call type for integrated services digital network (ISDN) group 1 to voice: (config)#isdn-group 1 (config-isdn-group 1)#call-type voice
60000CRG0-35B
2967
connect pri
Use the connect pri command to associate a specific interface with the integrated services digital network (ISDN) group. Use the no form of this command to disconnect the specified interface from the ISDN group. Syntax Description
pri Connects a primary rate interface (PRI) interface to the ISDN group. Type connect ? for a list of valid interfaces.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example associates the pri 1 interface with ISDN group 1: (config)#isdn-group 1 (config-isdn-group 1)#connect pri 1
60000CRG0-35B
2968
incoming-accept-number <number>
Use the incoming-accept-number command to configure the incoming number to be accepted by this group from the public switched telephone network (PSTN). Use the no form of this command to remove a configured accept number. Syntax Description
<number> Specifies the phone number(s) accepted for this integrated services digital network (ISDN) group. The accept number entered should match the digits that populate the called party information element received on the ISDN interface for the call. Refer to the Functional Notes for more information on entering the number.
Default Values
By default, there are no configured incoming accept numbers. The ISDN group will not be able to accept calls without a configured incoming accept number.
Command History
Release 11.1 Command was introduced.
Functional Notes
Special characters (parentheses, commas, and dashes) can be entered in the incoming accept number for readability, but they are ignored by the system. Incoming accept numbers are entered as a single number, or as a range of numbers using the available wildcard characters. The following wildcards can be used to define numbers: X N [1,2,3] $ Any single digit 0 through 9 Any single digit 2 through 9 Specifies single digit in this group Any number; effectively functions as a dont care
The following list provides some examples for proper wildcard usage: Incoming Accept Number(s) Entry 555-1111 and 555-1112 555-111[1,2] All numbers from the 916 area code916$ Numbers between 555-1000 and 555-2000555-[1,2]XXX Wildcard characters are especially useful in situations where ISDN hunt groups are deployed and the ISDN interfaces are all assigned to the same ISDN group in the router. ISDN hunt groups bundle multiple ISDN interfaces (with unique local directory numbers (LDNs)) together into a single group at the central office. When a call to any of the LDNs assigned to the ISDN interfaces in the hunt group is received at the central office, the switch sends the call to the first available ISDN interface. The ISDN group must be able to accept calls to multiple LDNs. Wildcard characters can simplify a configuration by allowing a single entry to match several numbers.
60000CRG0-35B
2969
Usage Examples
The following example configures the group to accept calls for 256-555-1000 through 256-555-2000: (config)#isdn-group 1 (config-isdn-group 1)#incoming-accept-number 256-555-[1,2]XXX
60000CRG0-35B
2970
max-channels <value>
Use the max-channels command to specify the maximum number of channels allocated for the integrated services digital network (ISDN) group. Use the no form of this command to return to the default value. Syntax Description
<value> Specifies the maximum number of channels allocated for the ISDN group. Valid range is from 1 to 255 channels.
Default Values
By default, the maximum number of channels is set to 0. When max-channels is set to 0, the group does not limit the number of usable channels and can use all available channels. Use the no max-channels command to return to the default value.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the maximum number of channels for ISDN group 1 to 50: (config)#isdn-group 1 (config-isdn-group 1)#max-channels 50
60000CRG0-35B
2971
min-channels <value>
Use the min-channels command to specify the minimum number of channels allocated for the integrated services digital network (ISDN) group. Use the no form of this command to return to the default value. Syntax Description
<value> Specifies the minimum number of channels allocated for the ISDN group. Valid range is from 1 to 255 channels.
Default Values
By default, the minimum number of channels is set to 0. When min-channels is set to 0, no channels are reserved for this group. This group can use available channels, but does not have any channels specifically reserved. Use the no min-channels command to return to the default value.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the minimum number of channels for ISDN group 1 to 10: (config)#isdn-group 1 (config-isdn-group 1)#min-channels 10
60000CRG0-35B
2972
Default Values
By default, the group is not assigned to any resource pool.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures the integrated services digital network (ISDN) group 1 as a member of resource pool MyPool: (config)#isdn-group 1 (config-isdn-group 1)#resource pool-member MyPool
60000CRG0-35B
2973
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 do on page 69 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. coverage on page 2976 did <number> on page 2978 email <address> on page 2979 email-secondary <address> on page 2980
60000CRG0-35B
2974
login-member <number> on page 2981 match ani <template> substitute <template> on page 2982 max-inbound <value> on page 2984 member <number> on page 2985 num-rings <value> on page 2986 prefix on page 2987 sip-identity on page 2988 type on page 2989 voicemail on page 2990
60000CRG0-35B
2975
coverage
Use the coverage command to configure call coverage parameters for members of this group. The call coverage setting determines how a call is handled if the party dialed does not answer after a specified number of rings. Use the no form of this command to remove an individual coverage parameter. Variations of this command include:
coverage aa coverage aa <number> coverage internal <number> coverage internal <number> num-rings <value> coverage override aa coverage override aa <number> coverage override internal <number> coverage override internal <number> num-rings <value> coverage override vm coverage override vm <number> coverage vm coverage vm <number> coverage <system mode> aa coverage <system mode> aa <number> coverage <system mode> internal <number> coverage <system mode> internal <number> num-rings <value> coverage <system mode> vm coverage <system mode> vm <number>
Syntax Description
<system mode> Optional. Specifies the system mode to use for call coverage. Choose from custom1, custom2, custom3, lunch, night, or weekend. Refer to the Functional Notes of this command for more information on configuring system modes. Forwards the call to the default auto attendant. Forwards the call to a specific extension programmed for the auto attendant. If no extension is specified, the phone is forwarded to the default auto attendant. Forwards the call to the specified internal number. Optional. Specifies the number of rings for the call before performing the next action. Valid range is 1 to 9. Ignores the programmed system mode schedule. Forwards the call to voicemail. Optional. Forwards the call to the specified mailbox number.
aa aa <number>
Default Values
By default, no call coverage is specified.
60000CRG0-35B
2976
Command History
Release 9.3 Release 11.1 Release 12.1 Release A1 Command was introduced. Command was updated to include the voicemail and number of rings options. Command was updated to include the auto attendant options. Command was updated to include the system mode feature options.
Functional Notes
System mode call coverage provides more diverse functionality for call handling. In previous versions of AOS (revision 15.1 or earlier), up to five coverage modes were allowed. Calls were processed in the order in which the coverage options were entered into the system. With the addition of the system mode options, up to five coverage options per system mode are allowed. The system modes can be modified using the command voice system-mode on page 1320.
Usage Examples
The following example specifies that the call be forwarded to the internal extension 8500 after 3 rings. (config)#voice operator-group (config-operator-group)#coverage internal 8500 num-rings 3
60000CRG0-35B
2977
did <number>
Use the did command to configure direct inward dialing (DID) for this group. DID is used if a service provider is providing digits to the unit on inbound calls or if the unit needs to provide DID information to a piece of customer premises equipment (CPE). Use the no form of this command to disable this feature. Syntax Description
<number> Defines the DID number assigned to the operator group.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example assigns DID 44 to the operator ring group: (config)#voice operator-group (config-operator-group)#did 44
60000CRG0-35B
2978
email <address>
Use the email command to enter the email address for this operator group. Use the no form of this command to disable this feature. Syntax Description
<address> Specifies an email address for this group.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example creates an email contact for this group: (config)#voice operator-group (config-operator-group)#email admin@helpdesk.com
60000CRG0-35B
2979
email-secondary <address>
Use the email-secondary command to enter a secondary email address for this operator group. Use the no form of this command to disable this feature. Syntax Description
<address> Specifies a contact email address for this group.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example creates a secondary email contact for this group: (config)#voice operator-group (config-operator-group)#email-secondary lead@helpdesk.com
60000CRG0-35B
2980
login-member <number>
Use the login-member command to log an existing member of the operator group into the system. The member command must first be used to create a new group member. Use the no form of this command to disable this feature. Refer to member <number> on page 2985 for more information. Syntax Description
<number> Specifies the extension number of the user who is logging in.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Functional Notes
This command allows a user to log in and out of an operator group, letting the system know when a user is available to accept calls.
Usage Examples
The following example logs in the user at extension 4422: (config)#voice operator-group (config-operator-group)#login-member 4422
60000CRG0-35B
2981
Syntax Description
ani <template> Specifies the ANI information to be substituted. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the ANI information that is substituted for the original ANI information. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Optional. Specifies the name associated with the ANI information. This option is only available on trunks that support ANI name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
substitute <template>
name <name>
Default Values
By default, no ANI substitution is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for ANI templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
2982
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match ani command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match ani ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the ANI information from numbers 555-8111 to 555-8115 will be substituted by 555-8110 for outbound calls: (config)#voice operator-group (config-operator-group)#match ani 555-811[125] substitute 555-8110
60000CRG0-35B
2983
max-inbound <value>
Use the max-inbound command to define the maximum number of calls that can be inbound at the same time. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the maximum number of calls that can be inbound at the same time. Range is 1 to 10 calls.
Default Values
By default, the maximum number of inbound calls is set to 1.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example sets the maximum number of inbound calls to 3: (config)#voice operator-group (config-operator-group)#max-inbound 3
60000CRG0-35B
2984
member <number>
Use the member command to create a new member of the operator group. Use the no form of this command to remove a users extension from an operator group. Syntax Description
<number> Specifies the extension number of the user to be added as an operator group member.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Functional Notes
A user can log in and out of the operator group using the login-member and no login-member commands. Refer to login-member <number> on page 2981 for more information.
Usage Examples
The following example adds the user at extension 4422 to the operator ring group: (config)#voice operator-group (config-operator-group)#member 4422
60000CRG0-35B
2985
num-rings <value>
Use the num-rings command to specify the number of rings for call pickup before the system redirects the call. Each system mode call coverage action can be configured with a different number of rings based on preference. Use the no form of this command to return to the default setting. Variations of this command include:
num-rings <value> num-rings <system mode> <value> num-rings override <value>
Syntax Description
<system mode> Optional. Specifies the system mode to configure for call coverage. Choose from custom1, custom2, custom3, lunch, night, or weekend. Refer to the Functional Notes of this command for more information on configuring system modes. Ignores the programmed system mode schedule. Specifies the number of rings before the next action. Specify 1 through 9 rings.
override <value>
Default Values
By default, the maximum number of rings allowed at each extension is 2.
Command History
Release 10.1 Release A1 Command was introduced. Command was updated to include the system mode feature options.
Functional Notes
System mode call coverage provides more diverse functionality for call handling. In previous versions of AOS (revision 15.1 or earlier), up to five coverage modes were allowed. Calls were processed in the order in which the coverage options were entered into the system. With the addition of the system mode options, up to five coverage options per system mode are allowed. The system modes can be modified using the command voice system-mode on page 1320.
Usage Examples
The following example sets the maximum number of rings for the operator ring group to 6: (config)#voice operator-group (config-operator-group)#num-rings 6
60000CRG0-35B
2986
prefix
Use the prefix command to turn on the caller ID prefix for this ring group, causing GRP: to display in front of the caller ID information. Use the no form of this command to turn the prefix off. Variations of this command include:
prefix prefix <prefix>
Syntax Description
<prefix> Optional. Specifies an alphanumeric outbound calling name prefix. Maximum length is 40 characters.
Default Values
By default, no prefixes are enabled.
Command History
Release 10.1 Release A2.04 Command was introduced. Command was expanded to include the optional <prefix> parameter.
Usage Examples
The following example turns on the caller ID prefix for the operator ring group: (config)#voice operator-group (config-operator-group)#prefix
60000CRG0-35B
2987
sip-identity
Use the sip-identity command to configure the Session Initiation Protocol (SIP) registration options for the user. Use the no form of this command to disable the setting. Variations of this command include the following:
sip-identity <station> <Txx> sip-identity <station> <Txx> register sip-identity <station> <Txx> register auth-name <username> password <password>
Syntax Description
<station> <Txx> register Specifies the station to be used for SIP trunk (e.g., station extension). Specifies the SIP trunk through which to register the server. The trunk is specified in the format Txx (e.g., T01). Registers the user to the server.
auth-name <username> Optional. Sets the user name that will be required as authentication for registration to the SIP server. password <password> Optional. Sets the password that will be required as authentication for registration to the SIP server.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 13.1 Command was introduced. Command functionality was introduced to this section.
Usage Examples
The following example specifies trunk T02 and extension 4400 for SIP identity: (config)#voice operator-group (config-operator-group)#sip-identity 4400 t02
60000CRG0-35B
2988
type
Use the type command to configure the group type for the operator group. Variations of this command include:
type all type executive type linear type ucd
Syntax Description
all executive linear Configures the group as an all-inclusive operator group. When an operator group call comes in, all phones ring simultaneously. Configures an executive operator group. Refer to email <address> on page 3004 for more information. Configures the group as a linear hunt operator group. Member phones ring one at a time until the call is picked up. When the next call comes in, the call cycle begins again by ringing the first operator group member. Refer to member <number> on page 2985 for more information. Configures the group as a uniform call distribution (UCD) operator group. Member phones ring one at a time until the call is picked up. When the next call comes in, the system remembers which member extension it last dialed and then continues the call cycle by ringing the next member in the operator group.
ucd
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example configures all phones in the operator ring group to ring each time a call comes in: (config)#voice operator-group (config-operator-group)#type all
60000CRG0-35B
2989
voicemail
Use the voicemail command to configure the voicemail options for the user. Use the no form of this command to disable the settings. Variations of this command include the following:
voicemail attachment-level <dB> voicemail attachment-level disabled voicemail auth-mode full voicemail auth-mode password voicemail auto-play voicemail cos <name> voicemail delete-msg-on-email voicemail envelope-play voicemail greeting alternate voicemail greeting default voicemail greeting standard voicemail new-user voicemail notify email attach-message pcm voicemail notify email attach-message pcm max-size <size> voicemail notify email text-only voicemail oper-assist <number> voicemail password <password>
Syntax Description
attachment-level <dB> attachment-level disabled auth-mode full auth-mode password auto-play cos <name> delete-msg-on-email envelope-play greeting alternate greeting default greeting standard new-user notify email attach-message Specifies the number of decibels for voicemail attachment files. Valid entries are -30, -25, -20, -15, or -10 dB. Disables the automatic gain control (AGC) for voicemail attachments. Specifies that the extension and password are required to access voicemail. Specifies that the password is required to access voicemail. Only the password is required if set to password authentication mode. Specifies automatic playback of messages when entering the mailbox. Configures the voicemail class of service (CoS) type by entering the name of the selected CoS. Enables deletion of stored voicemail on email attachments. Automatically plays message envelopes during message playback. Specifies the alternate recorded voicemail greeting to be used. Specifies the default voicemail greeting to be used. Specifies the users standard recorded voicemail greeting to be used. Executes the new-user wizard for voicemail configuration. Specifies sending an email notification when a new voicemail is received. Sends the voicemail as a WAV file attachment to the specified email. The email client must be configured for email options to work.
60000CRG0-35B
2990
Command Reference Guide pcm max-size <size> text-only oper-assist <number> password <password>
Voice Operator Ring Group Command Set Indicates message sent as email attachment will be in pulse-code modulation (PCM) format. Optional. Indicates truncating email attachments at the specified maximum size in kilobits (kb). Minimum size entry is 10 kb. Sends only a text message to the specified email address. Directs all operator calls to the specified phone number. Creates the password/personal identification number (PIN) that will be required to access voicemail.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 15.1 Release A2 Release A2.04 Command was introduced. Command was expanded. Command was expanded to include the notify email parameters. Command was expanded to include attachment-level parameters.
Usage Examples
The following example sets the voicemail CoS to class1: (config)#voice operator-group (config-operator-group)#voicemail cos class1
60000CRG0-35B
2991
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: description <text> on page 68 do on page 69 end on page 70 exit on page 71 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. codec on page 2993 include-paging-port on page 2994 member <extension> on page 2995 page-timeout <seconds> on page 2996
60000CRG0-35B
2992
codec
Use the codec command to specify the coder-decoder (CODEC) that is used for the audio of the paging group. Use the no form of this command to return to the default. Variations of this command include:
codec g711alaw codec g711ulaw codec g722 codec g729
Syntax Description
g711alaw g711ulaw g722 g729 Specifies the audio of the paging group is set to G.711 A-Law 64 kilobits per second (Kbps). Specifies the audio of the paging group is set to G.711 mu-Law 64 Kbps. Specifies the audio of the paging group is set to G.722 8 Kbps. Specifies the audio of the paging group is set to G.729 8 Kbps.
Default Values
By default, the CODEC for the paging group is set to G.729.
Command History
Release A2.04 Command was introduced in the Voice Paging Group.
Functional Notes
The default CODEC used by paging groups is G.729, and is recommended for bandwidth optimization. Other CODECs can be used when a page initiator or recipient does not support G.729. This codec command is not to be confused with the codec command used when creating CODEC lists (refer to Voice CODEC List Command Set on page 3359 or codec on page 3360). This command does not create a list of CODECs, nor can it be entered multiple times. This codec command, used when configuring the voice paging group, specifies a single CODEC to be used by the paging group. If another CODEC is entered from the Voice Paging Group Configuration mode prompt, it will override any previous CODEC entries.
Usage Examples
The following example specifies the paging group using extension 8956 will use CODEC G.722 for audio: (config)#voice paging-group 8956 (config-8956)#codec g722
60000CRG0-35B
2993
include-paging-port
Use the include-paging-port command to enable overhead paging for the paging group. Use the no form of this command to disable overhead paging for the paging group. Syntax Description
No subcommands.
Default Values
By default, overhead paging is not enabled in paging groups.
Command History
Release A2.04 Command was introduced.
Functional Notes
Enabling the paging port for a handset paging group allows the page to transmit through IP phone handsets and an overhead paging system. This option will only function if an overhead paging system is available.
Usage Examples
The following example enables overhead paging for the paging group using extension 8956: (config)#voice paging-group 8956 (config-8956)#include-paging-port
60000CRG0-35B
2994
member <extension>
Use the member command to add a new member to the paging group. Use the no form of this command to remove a member from the paging group. Syntax Description
<extension> Specifies the four-digit extension of the user to add to the paging group.
Default Values
By default, no members are included in a paging group.
Command History
Release A2.04 Command was introduced.
Usage Examples
The following example adds a user at extension 4567 to the paging group using extension 8956: (config)#voice paging-group 8956 (config-8956)#member 4567
60000CRG0-35B
2995
page-timeout <seconds>
Use the page-timeout command to specify the amount of time page group users have to connect to the page before the call is started. Use the no form of this command to return to the default value. Syntax Description
<seconds> Specifies the time (in seconds) that users have to connect to a page before information is transmitted. Range is 1 to 10 seconds.
Default Values
By default, the page timeout is set to 2 seconds.
Command History
Release A2.04 Command was introduced.
Functional Notes
If no connection is made before the timeout period expires, the paging call is terminated.
Usage Examples
The following example sets the page timeout to 5 seconds for the paging group using extension 8956: (config)#voice paging-group 8956 (config-8956)#page-timeout 5
60000CRG0-35B
2996
*where xxxx = the ring groups four-digit extension. The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 exit on page 71 interface on page 72
60000CRG0-35B
2997
All other commands for this command set are described in this section in alphabetical order. assistant-extension <number> on page 2999 cos on page 3000 coverage on page 3001 did <number> on page 3003 email <address> on page 3004 email-secondary <address> on page 3005 executive-extension <number> on page 3006 login-member <number> on page 3007 match ani <template> substitute <template> on page 3008 member <number> on page 3011 num-rings on page 3012 prefix on page 3013 sip-identity on page 3014 type on page 3015 voicemail on page 3016
60000CRG0-35B
2998
assistant-extension <number>
Use the assistant-extension command to tie an assistants extension to an executives extension. This command only applies to a ring group of type executive. Refer to type on page 3015 for more information.
Syntax Description
<number> Specifies the number of the assistants extension.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Functional Notes
This command is used in conjunction with the executive-extension command (refer to executive-extension <number> on page 3006). When the executives extension is dialed, both the assistants and the executives phones will ring. If neither phone is answered (or both are busy or set to do-not-disturb (DND)), the call is forwarded through the executives call coverage list.
Usage Examples
The following example creates the executive ring group 1234 and causes both the executive (extension 4440) and the assistant (extension 4444) phones to ring when the executive extension is dialed: (config)#voice ring-group 1234 (config-1234)#type executive (config-1234)#executive-extension 4440 (config-1234)#assistant-extension 4444
60000CRG0-35B
2999
cos
Use the cos command to set class of service (CoS) mode for the ring group. The CoS can be set to change for the members of the ring group based on the current system mode by including the system mode parameter. The CoS defines the types of phone service that will be available to the user during the time period. Use the no form of this command to disable this feature. Variations of this command include:
cos <name> cos <system mode> <name> cos no-access cos <system mode> no-access cos override <name> cos override no-access
Syntax Description
<name> <system mode> Specifies the predefined CoS. Optional. Specifies the system mode to configure. Choose from custom1, custom2, custom3, lunch, night, or weekend. Refer to the Functional Notes of this command for more information on configuring system modes. Blocks users from placing calls when applied to the CoS. Ignores the programmed system mode schedule.
no-access override
Default Values
By default, CoS is set to no-access.
Command History
Release 9.3 Release A1 Command was introduced. Command was expanded to include the system mode options.
Functional Notes
Additional functionality for this feature is provided by assigning a CoS to a specific system mode. When the system mode changes at a trigger point, the ring groups CoS changes. For example, a CoS applied to the ring group when the system mode is specified as night can be used to prevent outbound calls during evening hours. System modes are defined from the Global Configuration mode using the command voice system-mode on page 1320.
Usage Examples
The following example assigns the CoS Assistant to the ring group 1234: (config)#voice ring-group 1234 (config-1234)#cos Assistant
60000CRG0-35B
3000
coverage
Use the coverage command to configure call coverage parameters for members of this group. The call coverage setting determines how a call is handled if the party dialed does not answer after a specified number of rings. Use the no form of this command to remove an individual coverage parameter. Variations of this command include:
coverage aa coverage aa <number> coverage internal <number> coverage internal <number> num-rings <value> coverage operator coverage operator num-rings <value> coverage override aa coverage override aa <number> coverage override external <number> coverage override internal <number> coverage override internal <number> num-rings <value> coverage override operator coverage override operator num-rings <value> coverage override vm coverage override vm <number> coverage vm coverage vm <number> coverage <system mode> aa coverage <system mode> aa <number> coverage <system mode> external <number> coverage <system mode> internal <number> coverage <system mode> internal <number> num-rings <value> coverage <system mode> operator coverage <system mode> operator num-rings <value> coverage <system mode> vm coverage <system mode> vm <number>
Syntax Description
<system mode> Optional. Specifies the system mode to configure for call coverage. Choose from custom1, custom2, custom3, lunch, night, or weekend. Refer to the Functional Notes of this command for more information on configuring system modes. Forwards the call to the default auto attendant. Forwards the call to a specific extension programmed for the auto attendant. If no extension is specified, the phone is forwarded to the default auto attendant. Forwards the call to the specified external number. If no number is entered, the default auto answer is used.
aa aa <number>
external <number>
60000CRG0-35B
3001
Command Reference Guide internal <number> num-rings <value> operator override vm vm <number>
Voice Ring Group Command Set Forwards the call to the specified internal number. Optional. Specifies the number of rings for the call before performing the next action. Valid range is 1 to 9. Forwards the call to the operator. Ignores the programmed system mode schedule. Forwards the call to voicemail. Optional. Forwards the phone to the specified mailbox number.
Default Values
By default, no call coverage is specified.
Command History
Release 9.3 Release 11.1 Release 12.1 Release A1 Command was introduced. Command was updated to include the voicemail and number of rings options. Command was updated to include the auto attendant and operator options. Command was updated to include the system mode feature options.
Functional Notes
System mode call coverage provides more diverse functionality for call handling. In previous versions of AOS (revision 15.1 or earlier), up to five coverage modes were allowed. Calls were processed in the order in which the coverage options were entered into the system. With the addition of the system mode options, up to five coverage options per system mode are allowed. The system modes can be modified using the command voice system-mode on page 1320.
Usage Examples
The following example specifies that calls to the ring group 1234 be forwarded to the internal extension 8500 when in the night system mode. (config)#voice ring-group 1234 (config-1234)#coverage night internal 8500
60000CRG0-35B
3002
did <number>
Use the did command to configure direct inward dialing (DID) for this group. DID is used if a service provider is providing digits to the unit on inbound calls or if the unit needs to provide DID information to a piece of customer premises equipment (CPE). Use the no form of this command to disable this feature. Syntax Description
<number> Defines the DID number assigned to the ring group.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example assigns DID 44 to the ring group 1234: (config)#voice ring-group 1234 (config-1234)#did 44
60000CRG0-35B
3003
email <address>
Use the email command to enter the email address for this users group. Use the no form of this command to disable this feature. Syntax Description
<address> Specifies an email address for this group.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example creates an email contact for this group: (config)#voice ring-group 1234 (config-1234)#email admin@helpdesk.com
60000CRG0-35B
3004
email-secondary <address>
Use the email-secondary command to enter a secondary email address for this users group. Use the no form of this command to disable this feature. Syntax Description
<address> Specifies a contact email address for this group.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example creates a secondary email contact for this group: (config)#voice ring-group 1234 (config-1234)#email-secondary lead@helpdesk.com
60000CRG0-35B
3005
executive-extension <number>
Use the executive-extension command to tie an executives extension to an assistants extension.
This command only applies to type executive ring group(s). Refer to type on page 3015 for more information.
Syntax Description
<number> Specifies the number of the executives extension.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Functional Notes
This command is used in conjunction with the assistant-extension command (refer to assistant-extension <number> on page 2999). When the executives extension is dialed, both the assistants and the executives phones will ring. If neither phone is answered (or both are busy or set to do-not-disturb (DND)), the call is forwarded through the executives call coverage list.
Usage Examples
The following example creates the executive ring group 1234 and causes both the executive (extension 4440) and the assistant (extension 4444) phones to ring when the executive extension is dialed: (config)#voice ring-group 1234 (config-1234)#type executive (config-1234)#executive-extension 4440 (config-1234)#assistant-extension 4444
60000CRG0-35B
3006
login-member <number>
Use the login-member command to log an existing member of the ring group into the system. You must first use the member command to create a new group member. Use the no form of this command to disable this feature. Refer to member <number> on page 3011 for more information. Syntax Description
<number> Specifies the extension number of the user who is logging in.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Functional Notes
This command allows a user to log in and out of a ring group, letting the system know when a user is available to accept calls.
Usage Examples
The following example logs in the user at extension 4422: (config)#voice ring-group 1234 (config-1234)#login-member 4422
60000CRG0-35B
3007
Syntax Description
ani <template> Specifies the ANI information to be substituted. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the ANI information that is substituted for the original ANI information. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Optional. Specifies the name associated with the ANI information. This option is only available on trunks that support ANI name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
substitute <template>
name <name>
Default Values
By default, no ANI substitution is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for ANI templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3008
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match ani command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match ani ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the ANI information from numbers 555-8111 to 555-8115 will be substituted by 555-8110 for outbound calls for voice ring group 1234: (config)#voice ring-group 1234 (config-1234)#match ani 555-811[125] substitute 555-8110
60000CRG0-35B
3009
max-inbound <value>
Use the max-inbound command to define the maximum number of calls that can be inbound at the same time. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the maximum number of calls that can be inbound at the same time. Range is 1 to 10 calls.
Default Values
By default, the maximum number of inbound calls is set to 1.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example sets the maximum number of inbound calls on ring group 1234 to 3: (config)#voice ring-group 1234 (config-1234)#max-inbound 3
60000CRG0-35B
3010
member <number>
Use the member command to create a new member of the ring group. Use the no form of this command to remove a users extension from a ring group. Syntax Description
<number> Specifies the extension number of the user you want to add as a ring group member.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Functional Notes
A user can log in and out of the ring group using the login-member and no login-member commands. Refer to login-member <number> on page 3007 for more information.
Usage Examples
The following example adds the user at extension 4422 to the ring group 1234: (config)#voice ring-group 1234 (config-1234)#member 4422
60000CRG0-35B
3011
num-rings
Use the num-rings command to specify the number of rings for call pickup before the system redirects the call. Each system mode call coverage action can be configured with a different number of rings based on preference. Use the no form of this command to return to the default setting. Variations of this command include:
num-rings <value> num-rings <system mode> <value> num-rings override <value>
Syntax Description
<system mode> Optional. Specifies the system mode to configure for call coverage. Choose from custom1, custom2, custom3, lunch, night, or weekend. Refer to the Functional Notes of this command for more information on configuring system modes. Ignores the programmed system mode schedule. Specifies the number of rings before the next action. Specify 0 through 9 rings. Entering 0 specifies an unlimited number of rings.
override <value>
Default Values
By default, the num-rings is set to 4.
Command History
Release 9.3 Release A1 Command was introduced. Command was updated to include the system mode feature options.
Usage Examples
The following example sets the number of rings for this ring group to 6: (config)#voice ring-group 1234 (config-1234)#num-rings 6
60000CRG0-35B
3012
prefix
Use the prefix command to turn on the caller ID prefix for this ring group, causing GRP: to display in front of the caller ID information. Use the no form of this command to turn the prefix off. Variations of this command include:
prefix prefix <prefix>
Syntax Description
<prefix> Optional. Specifies an alphanumeric outbound calling name prefix. Maximum length is 40 characters.
Default Values
By default, no prefixes are enabled.
Command History
Release 10.1 Release A2.04 Command was introduced. Command was expanded to include the optional <prefix> parameter.
Usage Examples
The following example turns on the caller ID prefix for ring group 1234: (config)#voice ring-group 1234 (config-1234)#prefix
60000CRG0-35B
3013
sip-identity
Use the sip-identity command to configure the Session Initiation Protocol (SIP) registration options for the user. Use the no form of this command to disable the settings. Variations of this command include the following:
sip-identity <station> <Txx> sip-identity <station> <Txx> register sip-identity <station> <Txx> register auth-name <username> password <password>
Syntax Description
<station> <Txx> register Specifies the station to be used for SIP trunk (e.g., station extension). Specifies the SIP trunk through which to register the server. The trunk is specified in the format Txx (e.g., T01). Registers the user to the server.
auth-name <username> Optional. Sets the user name that will be required as authentication for registration to the SIP server. password <password> Optional. Sets the password that will be required as authentication for registration to the SIP server.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example specifies trunk T02 and extension 4400 for SIP identity: (config)#voice ring-group 1234 (config-1234)#sip-identity 4400 T02
60000CRG0-35B
3014
type
Use the type command to configure the group type for the ring group. Variations of this command include:
type all type executive type linear type ucd
Syntax Description
all executive linear Configures the group as an all-inclusive ring group. When a ring group call comes in, all phones ring simultaneously. Configures an executive ring group. Refer to executive-extension <number> on page 3006 for more information. Configures the group as a linear hunt ring group. Member phones ring one at a time until the call is picked up. When the next call comes in, the call cycle begins again by ringing the first ring group member. Refer to member <number> on page 3011 for more information. Configures the group as a uniform call distribution (UCD) ring group. Member phones ring one at a time until the call is picked up. When the next call comes in, the system remembers which member extension it last dialed and then continues the call cycle by ringing the next member in the ring group.
ucd
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example configures the ring group 1234 to ring all phones in the ring group each time a call comes in: (config)#voice ring-group 1234 (config-1234)#type all
60000CRG0-35B
3015
voicemail
Use the voicemail command to configure the voicemail options for the user. Use the no form of this command to disable the settings. Variations of this command include the following:
voicemail attachment-level <dB> voicemail attachment-level disabled voicemail auth-mode full voicemail auth-mode password voicemail auto-play voicemail cos <name> voicemail delete-msg-on-email voicemail envelope-play voicemail greeting alternate voicemail greeting default voicemail greeting standard voicemail new-user voicemail notify email attach-message pcm voicemail notify email attach-message pcm max-size <size> voicemail notify email text-only voicemail oper-assist <number> voicemail password <password>
Syntax Description
attachment-level <dB> attachment-level disabled auth-mode full auth-mode password auto-play cos <name> delete-msg-on-email envelope-play greeting alternate greeting default greeting standard new-user notify email attach-message Specifies the number of decibels for voicemail attachment files. Valid entries are -30, -25, -20, -15, or -10 dB. Disables the automatic gain control (AGC) for voicemail attachments. Specifies that the extension and password are required to access voicemail. Specifies that the password is required to access voicemail. Only the password is required if set to password authentication mode. Specifies automatic playback of messages when entering the mailbox. Configures the voicemail class of service (CoS) type by entering the name of the selected CoS. Enables deletion of stored voicemail on email attachments. Automatically plays message envelopes during message playback. Specifies the alternate recorded voicemail greeting to be used. Specifies the default voicemail greeting to be used. Specifies the users standard recorded voicemail greeting to be used. Executes the new-user wizard for voicemail configuration. Specifies sending an email notification when a new voicemail is received. Sends the voicemail as a WAV file attachment to the specified email. The email client must be configured for email options to work.
60000CRG0-35B
3016
Command Reference Guide pcm max-size <size> text-only oper-assist <number> password <password>
Voice Ring Group Command Set Indicates message sent as email attachment will be in pulse-code modulation (PCM) format. Optional. Indicates truncating email attachments at the specified maximum size in kilobits (kb). Minimum size entry is 10 kb. Sends only a text message to the specified email address. Directs all operator calls to the specified phone number. Creates the password/personal identification number (PIN) that will be required to access voicemail.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 15.1 Release A2 Release A2.04 Command was introduced. Command was expanded. Command was expanded to include the notify email parameters. Command was expanded to include attachment-level parameters.
Usage Examples
The following example sets the voicemail CoS for this user to class1: (config)#voice ring-group 1234 (config-1234)#voicemail cos class1
60000CRG0-35B
3017
Syntax Description
ani <template> Specifies the ANI information to be substituted. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the ANI information that is substituted for the original ANI information. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry.
substitute <template>
Default Values
By default, no ANI substitution is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for ANI templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3018
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match ani command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match ani ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits )
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it mus t be at the end of the number. 6) "X" matc hes [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the ANI information from numbers 555-8111 to 555-8115 on all inbound trunks will be substituted by 555-8110: (config)#voice ring-group 1234 (config)#voice match ani 555-811[125] substitute 555-8110
60000CRG0-35B
3019
For more information about configuring trunk groups, refer to the NetVanta 7000 Series Trunk Accounts configuration guide available online at http://kb.adtran.com (article number 1541). Integrated services digital network (ISDN) trunk groups are created using the command isdn-group <number> on page 1120. For more information regarding the creation of ISDN trunk groups, refer to the Voice ISDN Group Command Set on page 2965. To enter the Voice Trunk Group Configuration mode, enter the voice grouped-trunk command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#voice grouped-trunk TestGroup (config-TestGroup)#
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 exit on page 71 interface on page 72
60000CRG0-35B
3020
All other commands for this command set are described in this section in alphabetical order. accept <pattern> on page 3022 deny on page 3024 match ani <template> substitute <template> on page 3025 permit on page 3027 reject <pattern> on page 3028 resource-selection on page 3030 trunk <Txx> on page 3031
60000CRG0-35B
3021
accept <pattern>
Use the accept command to specify numbers that users can dial on the trunk. This command controls the type of outbound calls users can place on the system. Use the no form of this command to remove a configured dial pattern and return to the default setting. Variations of this command include:
accept <pattern> accept <pattern> cost <value>
Syntax Description
<pattern> Specifies the patterns users can dial on the trunk. You can enter a complete phone number or wildcards can be used to help define accepted numbers. Refer to Functional Notes below for more information on using wildcards. Specifies the cost value for the trunk. This option is used if a call is accepted by several trunks. The call will be routed to the trunk with the lowest cost value. The valid range is 0 to 499.
cost <value>
Default Values
By default, the cost value is zero.
Command History
Release 9.3 Command was introduced.
Functional Notes
The available wildcards for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
The special characters ( ), -, + are always ignored. Examples:1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) 1-800$ matches any 1-800 calls. 4) Nxx-xxxx matches 7 digit local. 5) 1-Nxx-Nxx-xxxx matches long distance calls in North America.
60000CRG0-35B
3022
Usage Examples
The following example allows users on the trunk TestGroup to dial any local number: (config)#voice grouped-trunk TestGroup (config-TestGroup)#accept Nxxxxxx
60000CRG0-35B
3023
deny
Use the deny command to add a proxy, automatic number identification (ANI) list, or trunk list to a voice trunk groups deny policy. Use the no form of this command to remove the proxy, ANI list, or trunk list from the deny policy. Variations of this command include:
deny list <name> deny proxy
Syntax Description
list <name> proxy Specifies that either a trunk list or ANI list is added to the trunk groups deny policy. Specifies that the proxy is added to the trunk groups deny policy.
Default Values
By default, no list or proxy is part of the trunk groups deny policy.
Command History
Release A2 Command was introduced.
Functional Notes
The trunk and ANI lists are created as part of the Source and ANI Based Routing (SABR) feature on AOS voice products. For more information about SABR, refer to the SABR in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 2510). For more information about creating ANI or trunk lists, refer to voice ani-list <name> on page 1256 or voice trunk-list <name> on page 1326.
Although there is no limit on the number of lists applied to voice trunk groups, it is important to remember that the more lists that are applied to a trunk group, the more the runtime performance of call routing will be affected. Usage Examples
The following example applies the TEST2 list to the deny policy of trunk group TestGroup: (config)#voice grouped-trunk TestGroup (config-TestGroup)#deny list TEST2
60000CRG0-35B
3024
Syntax Description
ani <template> Specifies the ANI information to be substituted. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the ANI information that is substituted for the original ANI information. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Optional. Specifies the name associated with the ANI information. This option is only available on trunks that support ANI name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
substitute <template>
name <name>
Default Values
By default, no ANI substitution is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for ANI templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3025
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match ani command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match ani ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the ANI information from numbers 555-8111 to 555-8115 will be substituted by 555-8110 for outbound calls for trunk group TestGroup: (config)#voice grouped-trunk TestGroup (config-TestGroup)#match ani 555-811[125] substitute 555-8110
60000CRG0-35B
3026
permit
Use the permit command to add a proxy, automatic number identification (ANI) list, or trunk list to a voice trunk groups permit policy. Use the no form of this command to remove the proxy, ANI list, or trunk list from the permit policy. Variations of this command include:
permit list <name> permit proxy
Syntax Description
list <name> proxy Specifies that either a trunk list or ANI list is added to the trunk groups permit policy. Specifies that the proxy is added to the trunk groups permit policy.
Default Values
By default, no list or proxy is part of the trunk groups permit policy.
Command History
Release A2 Command was introduced.
Functional Notes
The trunk and ANI lists are created as part of the Source and ANI Based Routing (SABR) feature on AOS voice products. For more information about SABR, refer to the SABR in AOS configuration guide available on the AOS Documentation CD shipped with your product or online at http://kb.adtran.com (article number 2510). For more information about creating ANI or trunk lists, refer to voice ani-list <name> on page 1256 or voice trunk-list <name> on page 1326.
Although there is no limit on the number of lists applied to voice trunk groups, it is important to remember that the more lists that are applied to a trunk group, the more the runtime performance of call routing will be affected. Usage Examples
The following example applies the TEST1 list to the permit policy of trunk group TestGroup: (config)#voice grouped-trunk TestGroup (config-TestGroup)#permit list TEST1
60000CRG0-35B
3027
reject <pattern>
Use the reject command to specify numbers users cannot dial on the trunk. This feature allows administrators to restrict callers from unwanted outbound calls, such as international calls and 900 numbers. Use the no form of this command to disable this feature. Syntax Description
<pattern> Specifies the patterns that users cannot dial on the trunk. You can enter a complete phone number or wildcards can be used to help define rejected numbers. Refer to Functional Notes below for more information on using wildcards. For example, you can enter 900$ to prevent users from dialing all 900 numbers.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Functional Notes
The available wildcards for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
The special characters ( ), -, + are always ignored. Examples:1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) 1-800$ matches any 1-800 calls. 4) Nxx-xxxx matches 7 digit local. 5) 1-Nxx-Nxx-xxxx matches long distance calls in North America.
60000CRG0-35B
3028
Usage Examples
The following example blocks calls to any 900 number on the trunk TestGroup: (config)#voice grouped-trunk TestGroup (config-TestGroup)#reject 900$
60000CRG0-35B
3029
resource-selection
Use the resource-selection command to determine how the switchboard uses outbound call resources contained within a time division multiplexing (TDM) based trunk group. Use the no form of this command to disable this feature. Variations of this command include:
resource-selection circular resource-selection circular ascending resource-selection circular descending resource-selection linear resource-selection linear ascending resource-selection linear descending
Syntax Description
circular Performs call load balancing among available DS0s/B-channels in this trunk. Subsequent calls will be delivered to the next available DS0/B-channel in a round-robin fashion. Specifies that a call being delivered to this trunk will be accepted out the first available DS0/B-channel available at the time the call is received. Optional. Distributes calls in an order from the lowest to the highest channel (DS0 1, 2, 3 through 24). Optional. Distributes calls in an order from the highest to the lowest channel (DS0 24, 23, 22 through 1).
Default Values
By default, resource selection is set to linear.
Command History
Release 9.3 Release 13.1 Command was introduced. Command was expanded to include the ascending and descending subcommands.
Usage Examples
The following example specifies circular resource selection on the trunk TestGroup: (config)#voice grouped-trunk TestGroup (config-TestGroup)#resource-selection circular
60000CRG0-35B
3030
trunk <Txx>
Use the trunk command to add an existing trunk to the trunk group so outbound calls may be placed out that particular trunk as well. Use the no form of this command to remove a configured trunk group. Syntax Description
<Txx> Specifies an ID number for the trunk. The trunk ID is in the format Txx where xx is the trunk ID number. Enter a trunk ID between 1 and 99. For example, trunk T02.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example adds trunk T02 to the trunk group TestGroup: (config)#voice grouped-trunk TestGroup (config-TestGroup)#trunk t02
60000CRG0-35B
3031
60000CRG0-35B
3032
To enter the Voice Analog Trunk LS Configuration mode, enter the following command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#voice trunk t01 type analog supervision loop-start (config-t01)#
To enter the Voice Analog Trunk GS Configuration mode, enter the following command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#voice trunk t01 type analog supervision ground-start (config-t01)#
Not all Voice Analog Trunk commands apply to all analog trunk types. Use the ? command to display a list of valid commands.
60000CRG0-35B
3033
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. alc on page 3036 blind-dial on page 3037 busy all on page 3038 busy fxo <slot/port> on page 3039 busy monitor track <name> on page 3040 busy range fxo <range> on page 3041 caller-id on page 3042 caller-id-override on page 3043 codec-group <name> on page 3044 connect fxo <slot/port> on page 3045 connect range fxo <range> on page 3046 dialtone timeout <value> on page 3047 did digits-transferred <value> on page 3048 disconnect-supervision tone busy on page 3049 early-cut-through on page 3050 echo-cancellation on page 3051 match ani <template> substitute <template> on page 3052 match dnis <template> substitute <template> on page 3054 modem-passthrough on page 3056 plc on page 3057 prefer trunk-routing on page 3058 reject-external on page 3059 resource-selection on page 3060 rtp delay-mode on page 3061 rtp dtmf-relay on page 3062 rtp frame-packetization <value> on page 3063 rtp packet-delay on page 3064 rtp qos dscp <value> on page 3065 rtp rx-gain <value> on page 3066 rtp tx-gain <value> on page 3067
60000CRG0-35B Copyright 2011 ADTRAN, Inc. 3034
trunk-number <number> on page 3068 t38 on page 3069 t38 error-correction on page 3070 t38 fallback-mode g711 on page 3071 t38 max-buffer <value> on page 3072 t38 max-datagram <value> on page 3073 t38 max-rate on page 3074 t38 redundancy on page 3075 vad on page 3076
60000CRG0-35B
3035
alc
Use the alc command to enable automatic level control (ALC). ALC reduces Realtime Transport Protocol (RTP) received signals that are out of specification to the predefined levels. It is not necessary to enable ALC on those networks that guarantee signal levels to be within specification. Use the no form of this command to disable this feature. Variations of this command include:
alc alc level -16 alc level -17 alc level -18 alc level -19 alc level -20 alc level -21 alc level -22
Syntax Description
level -16 level -17 level -18 level -19 level -20 level -21 level -22 Optional. Specifies the ALC attenuation level is -16 dBm0. Optional. Specifies the ALC attenuation level is -17 dBm0. Optional. Specifies the ALC attenuation level is -18 dBm0. Optional. Specifies the ALC attenuation level is -19 dBm0. Optional. Specifies the ALC attenuation level is -20 dBm0. Optional. Specifies the ALC attenuation level is -21 dBm0. Optional. Specifies the ALC attenuation level is -22 dBm0.
Default Values
By default, ALC is disabled.
Command History
Release 14.1 Release 15.1 Release A2 Release A2.04 Command was introduced. Command was added to the Voice Line Interface. Command was added to the Media Gateway Control Protocol (MGCP) endpoint configuration. Command was expanded to include the level parameters.
Usage Examples
The following example activates ALC on trunk T01: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#alc
60000CRG0-35B
3036
blind-dial
Use the blind-dial command to allow calls to be placed without the presence of dial tone. Use the no form of this command to disable blind dialing. Syntax Description
No subcommands.
Default Values
By default, blind-dial is disabled.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example enables blind dialing: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#blind-dial
60000CRG0-35B
3037
busy all
Use the busy all command to set all level zero digital signals (DS0s) to busy so that no calls are allowed inbound or outbound. If any calls are active at the time this command is issued, the calls will stay active until either party terminates the call. Once terminated, the DS0s are busied out. Use the no form of this command to return to the default setting. Variations of this command include:
busy all busy all now
Syntax Description
now Optional. Immediately terminates calls that are active at the time the command is issued (for example, in the middle of a conversation).
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release 11.1 Command was introduced. Command was expanded to include the analog voice trunk.
Usage Examples
The following example sets all DS0s on trunk T01 to busy and terminates calls that are active at the time the command is issued: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#busy all now
60000CRG0-35B
3038
Syntax Description
<slot/port> now Specifies the slot/port for the foreign exchange office (FXO). Optional. Immediately terminates active call at the time the command is issued (for example, in the middle of a conversation).
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release 11.1 Command was introduced. Command was expanded to include the analog voice trunk.
Usage Examples
The following example sets FXO 0/1 to busy and terminates an active call when the command is issued: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#busy fxo 0/1 now
60000CRG0-35B
3039
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example shuts down trunk T01 when the on_fail track fails: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#busy-out monitor track on_fail
60000CRG0-35B
3040
Syntax Description
<range> now Specifies a range of ports in the format <slot/begin port range-end port range> (for example, 0/1-4). Optional. Terminates calls that are active at the time the command is issued (for example, in the middle of a conversation).
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets DS0s to busy and terminates calls assigned to port range fxo 0/1 through fxo 0/4 when the command is issued: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#busy range fxo 0/1-4 now
60000CRG0-35B
3041
caller-id
Use the caller-id command to interpret and pass caller identification (ID) on this trunk. This information usually displays the name, number, time, and date of the calling party. Use the no form of this command to cancel the setting. Syntax Description
No subcommands.
Default Values
By default, caller ID is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example enables caller ID: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#caller-id
60000CRG0-35B
3042
caller-id-override
Use the caller-id-override command to replace the calling party information for this trunk with a specific number. This command is used to conceal a users name and number or to display a different name and number for internal or external caller ID. Use the no form of this command to cancel the setting. Variations of this command include:
caller-id-override emergency-outbound <number> caller-id-override emergency-outbound match-substitute caller-id-override number-inbound <number> caller-id-override number-inbound <number> if-no-cpn caller-id-override number-inbound <number> <trunk id>
Syntax Description
<number> <trunk id> emergency-outbound match-substitute number-inbound if-no-cpn Specifies the number to display on caller ID. Optional. Specifies the trunk ID (Txx) for outbound calls. Specifies the calling party number on outbound emergency calls. Specifies the configured automatic number identification (ANI) match substitution for outbound emergency calls. Specifies the calling party number on inbound calls. Optional. Specifies caller ID override only if calling party number is not available in the automatic number identification (ANI).
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 15.1 Release 16.1 Release A4.01 Command was introduced. Command was expanded. Command was expanded to include the if-no-cpn subcommand. Command was expanded to include the match-substitute subcommand.
Usage Examples
The following example sets the caller ID override number on the trunk where the command is issued: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#caller-id-override number-inbound 555-8000
60000CRG0-35B
3043
codec-group <name>
Use the codec-group command to specify the coder-decoder (CODEC) list to be used by this account. Use the no form of this command to remove the CODEC list from the account. Syntax Description
<name> Specifies the CODEC list to be used for this account.
Default Values
By default, no CODEC lists are assigned.
Command History
Release 9.3 Release 11.1 Release 15.1 Release A1 Release A2 Command was introduced. Command was expanded to include the integrated services digital network (ISDN) trunk. Command was added to the Voice Line Configuration command set. Command was included in the Voice Loopback Account Configuration command set. Command was added to the Media Gateway Control Protocol (MGCP) Configuration command set.
Functional Notes
The codec-group command applies a previously configured CODEC list to an interface, voice trunk, or voice account. These lists are lists of CODECs used by the interface, trunk, or account in call negotiation, and are arranged in preferred order with the first listed CODEC being the most preferred. CODEC lists are created using the codec command from the Voice CODEC List Configuration mode prompt. For more information about creating CODEC lists, refer to the Voice CODEC List Command Set on page 3359.
Usage Examples
The following example applies the CODEC list List1 to the trunk: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#codec-group List1
60000CRG0-35B
3044
Default Values
By default, no physical interface is assigned.
Command History
Release 9.3 Release 11.1 Command was introduced. Command was expanded to include the analog voice trunk.
Usage Examples
The following example specifies this trunk to use port fxo 0/1: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#connect fxo 0/1
60000CRG0-35B
3045
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example specifies that this analog loop start (LS) trunk will use the contiguous port range fxo 0/1 through fxo 0/4: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#connect range fxo 0/1-4
60000CRG0-35B
3046
Default Values
By default, the dial tone detection timeout period is 2000 milliseconds for the United States, Puerto Rico, and Canada and is 4000 milliseconds for all other supported countries.
Command History
Release A4.05 Command was introduced.
Usage Examples
The following example specifies that analog loop start trunk t01 will use a 3000 milliseconds dial tone detection timeout period: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#dialtone timeout 3000
60000CRG0-35B
3047
Syntax Description
<value> prefix <number> Specifies the number of digits to be transferred. Range is 1 to 16 digits. Optional. Specifies a sequence of digits to be prepended to the digits that will be transmitted. For example, if seven digits will be transferred via DID, then prefix the seven digits with 256. Thus, 555-8000 would be prefixed with 256, transmitting out the string of digits 256-555-8000.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Functional Notes
User Role Example: 555-1000 is an incoming call on the trunk. With did digits-transferred <value> set to 4, the number 1000 will be sent to the switchboard. On a network role trunk, the did digits-transferred command allows you to define how many of the digits from the Accept criteria should be sent externally from a call that was routed by the switchboard. The number of digits transferred are the least significant digits received. Network Role Example: 555-1000 is accepted on the universal time (UT) interface. With did digits-transferred <value> set to 4, the number of 1000 will be sent to the device connected to the UT interface. This command cannot be specified if and when trunk-number is being used. Conversely, if DID is used, trunk-number will not be allowed.
Usage Examples
The following example transfers the digits 555-8000 and adds the prefix 256: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#did digits-transferred 5558000 prefix 256
60000CRG0-35B
3048
Default Values
By default, disconnect-supervision is disabled.
Command History
Release A4.05 Command was introduced.
Functional Notes
Disconnect supervision monitors a foreign exchange office (FXO) port for a specific condition to determine when the line should be released. Disconnect supervision is used in auto attendant, fax, and modem applications to ensure that a connection is not maintained indefinitely when a call has ended or could not be completed.
Usage Examples
The following example enables disconnect supervision for busy tone: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#disconnect-supervision tone busy
60000CRG0-35B
3049
early-cut-through
Use the early-cut-through command to provide the caller with inband ringback and other call progress signals. This command should not be issued if the connected equipment does not provide inband ringback and other call progress signals. This option is only valid for voice trunks in the network role. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, early-cut-through is disabled.
Command History
Release A1 Command was introduced.
Usage Examples
The following example activates early-cut-through: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#early-cut-through
60000CRG0-35B
3050
echo-cancellation
Use the echo-cancellation command to improve voice quality for packetized-based voice calls, such as Voice over Internet Protocol (VoIP) or Media Gateway Control Protocol (MGCP). Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, echo-cancellation is enabled.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example activates echo-cancellation: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#echo-cancellation
60000CRG0-35B
3051
Syntax Description
ani <template> Specifies the ANI information to be substituted. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the ANI information that is substituted for the original ANI information. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Optional. Specifies the name associated with the ANI information. This option is only available on trunks that support ANI name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
substitute <template>
name <name>
Default Values
By default, no ANI substitution is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for ANI templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3052
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match ani command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match ani ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the ANI information from numbers 555-8111 to 555-8115 will be substituted by 555-8110 for outbound calls on the trunk T03: (config)#voice trunk t03 type analog supervision loop-start (config-t03)#match ani 555-811[125] substitute 555-8110
60000CRG0-35B
3053
Syntax Description
dnis <template> Specifies the DNIS information to be substituted. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the DNIS information that is substituted for the original DNIS information. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Optional. Specifies the name associated with the DNIS information. This option is only available on trunks that support DNIS name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
substitute <template>
name <name>
Default Values
By default, no DNIS substitution is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for DNIS templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3054
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match dnis command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match dnis ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the DNIS information for dialed numbers on trunk T03 that match 1-334-NXX-XXXX are substituted with 1-800-557-4500: (config)#voice trunk t03 type analog supervision loop-start (config-t03)#match dnis 1-334-NXX-XXXX substitute 1-800-557-4500
60000CRG0-35B
3055
modem-passthrough
Use the modem-passthrough command to switch to passthrough mode on fax or modem tone detection. This command allows modem and fax calls to maintain a connection without altering the signals with the voice improvement settings, such as echo cancellation and voice activity detection (VAD). Use the no form of this command to disable this feature. Variations of this command include:
modem-passthrough modem-passthrough detection-time <value>
Syntax Description
detection-time <value> Optional. Specifies the fax and/or modem detection time length value in seconds. Range is 0 to 8 seconds.
Default Values
By default, modem-passthrough is enabled.
Command History
Release 11.1 Release 12.1 Command was introduced. Command was expanded.
Usage Examples
The following example disables modem-passthrough: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#no modem-passthrough
60000CRG0-35B
3056
plc
Use the plc command to enable packet loss concealment (PLC). PLC is used to prevent choppy connections by concealing a packet loss by replacing the lost packet with another voice packet in the data stream. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, PLC is enabled on this interface.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example disables PLC on trunk T01: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#no plc
60000CRG0-35B
3057
prefer trunk-routing
Use the prefer trunk-routing command to add a trunk to a list of trunks that are considered first for call routing, regardless of system routing mode or locally configured extensions. Use the no form of this command to remove the trunk from the list. Syntax Description
No subcommands.
Default Values
By default, prefer trunk-routing is disabled.
Command History
Release A2 Command was introduced.
Functional Notes
Trunk routing can be specified as a preference for specific trunks, allowing the trunk to be considered first for routing rather than relying on the internal or external nature of the call to dictate whether the trunk or voice station is the first choice routing path. The prefer trunk-routing command, executed from a specific trunks configuration mode, adds the trunk to a list of trunks that are considered first for routing. By default, no trunk routing preference is set, so that each trunk operates as dictated by normal call routing modes. Adding the trunk routing preference only affects how inbound calls from the specific trunk are handled.
Usage Examples
The following example specifies that trunk routing is preferred on the trunk T01: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#prefer trunk-routing
60000CRG0-35B
3058
reject-external
Use the reject-external command to prevent inbound calls on the trunk from being routed back out of the same trunk. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, reject-external is enabled on this interface.
Command History
Release 9.3 Command was introduced.
Functional Notes
In general, trunks are assigned to the user role, which means they terminate lines from a Telco provider. If this is the case, reject-external should be enabled so that inbound calls on the trunk cannot be routed back out of the same trunk. If the configuration is poor, inbound long distance calls could be routed back out the same trunk, causing the owner of the unit to be charged for long distance calls without his knowledge. For network-role trunks and Session Initiation Protocol (SIP) based trunks, this command should be disabled to allow calls to be properly routed in the unit.
Usage Examples
The following example disables reject-external: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#no reject-external
60000CRG0-35B
3059
resource-selection
Use the resource-selection command to determine how the switchboard uses outbound call resources contained within a time division multiplexing (TDM) based trunk group. Use the no form of this command to disable this feature. Variations of this command include:
resource-selection circular resource-selection circular ascending resource-selection circular descending resource-selection linear resource-selection linear ascending resource-selection linear descending
Syntax Description
circular Performs call load balancing among available DS0s/B-channels in this trunk. Subsequent calls will be delivered to the next available DS0/B-channel in a round-robin fashion. Specifies that a call being delivered to this trunk will be accepted out the first available DS0/B-channel available at the time the call is received. Optional. Distributes calls in an order from the lowest to the highest channel (DS0 1, 2, 3 through 24). Optional. Distributes calls in an order from the highest to the lowest channel (DS0 24, 23, 22 through 1).
Default Values
By default, resource selection is set to linear.
Command History
Release 9.3 Release 13.1 Command was introduced. Command was expanded to include the ascending and descending subcommands.
Usage Examples
The following example specifies circular resource selection: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#resource-selection circular
60000CRG0-35B
3060
rtp delay-mode
Use the rtp delay-mode command to configure the Realtime Transport Protocol (RTP) jitter buffer packet delay mode settings. RTP is used to prevent static on voice connections by enhancing the quality of the packet delivery. Use the no form of this command to return to the default setting. Variations of this command include:
rtp delay-mode adaptive rtp delay-mode fixed
Syntax Description
adaptive fixed Configures the RTP jitter buffer packet delay to adjust during a call based on network conditions. Configures the RTP jitter buffer packet delay to remain constant.
Default Values
By default, the RTP delay mode is set to adaptive. This allows for minimal latency by adjusting the average packet delay based on the conditions of the network.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures RTP delay mode as fixed: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#rtp delay-mode fixed
60000CRG0-35B
3061
rtp dtmf-relay
Use the rtp dtmf-relay command to configure the method by which Realtime Transport Protocol (RTP) dual tone multi-frequency (DTMF) events are relayed. The dial digits can be sent inband or out-of-band (OOB) of the voice stream. Use the no form of this command to return to the default value. Variations of this command include:
rtp dtmf-relay inband rtp dtmf-relay nte <value>
Syntax Description
inband nte <value> Specifies that RTP DTMF events be relayed inband in the RTP stream. Specifies that RTP DTMF events be relayed OOB using named telephone event (NTE). Enter an NTE value between 96 and 127.
Default Values
By default, the rtp dtmf-relay is set for NTE 101.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example configures RTP DTMF relay events for inband: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#rtp dtmf-relay inband
60000CRG0-35B
3062
Default Values
By default, the rtp frame-packetization time is set to 20 milliseconds on all trunks and users.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example sets the frame packetization time for trunk T01 to 10 milliseconds: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#rtp frame-packetization 10
60000CRG0-35B
3063
rtp packet-delay
Use the rtp packet-delay command to configure the maximum Realtime Transport Protocol (RTP) packet delays. This command is used to set the allowable limits of latency on the network. Use the no form of this command to return to the default value. Variations of this command include:
rtp packet-delay fax <value> rtp packet-delay maximum <value> rtp packet-delay nominal <value>
Syntax Description
fax <value> maximum <value> nominal <value> Sets the fax delay time value. Range is 0 to 500 milliseconds. Sets the maximum delay time value in increments of 10 milliseconds. Range is 40 to 320 milliseconds. Sets the nominal delay time value in increments of 10 milliseconds. Range is 10 to 240 milliseconds.
Default Values
By default, the RTP packet delay for fax is 300, maximum is 100, and nominal is 50.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures the RTP fax delay time on trunk T01 to 200 milliseconds: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#rtp packet-delay fax 200
60000CRG0-35B
3064
Default Values
By setting the rtp qos dscp value on an individual trunk or user, you will override the global rtp qos dscp setting for RTP packets.
Command History
Release 9.3 Command was introduced.
Functional Notes
By setting the rtp qos dscp value on an individual trunk or user, you will override the global rtp qos dscp setting for RTP packets. QoS is set using a DSCP value. Valid DSCP values are 10 to 63, and a higher DSCP value has a higher priority. The default DSCP value for RTP is 46. Remember that if you are using a public IP connection, such as the Internet, for Voice over Internet Protocol (VoIP), end-to-end QoS may not be guaranteed. The default DSCP value for Session Initiation Protocol (SIP) is 26. To configure QoS for the RTP traffic that carries the voice conversation, use the command ip rtp qos dscp followed by the desired DSCP value.
Usage Examples
The following example configures the RTP QoS DSCP for trunk T02 to 60: (config)#voice trunk t02 type analog supervision loop-start (config-t02)#rtp qos dscp 60
60000CRG0-35B
3065
Default Values
By default, RTP RX gain is set to 0 dB.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies the RTP RX gain for trunk T01 is 4 dB: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#rtp rx-gain 4
60000CRG0-35B
3066
Default Values
By default, RTP TX gain is set to 0 dB.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies the RTP TX gain for trunk T01 is 4 dB: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#rtp tx-gain 4
60000CRG0-35B
3067
trunk-number <number>
Use the trunk-number command to define the call routing when direct inward dialing (DID) is disabled. This feature directs incoming calls to the specified number when DID is not present. This command also allows users to activate different system modes of operation that redirect incoming calls to a different number depending on the specified mode. Use the no form of this command to disable this feature. Variations of this command include:
trunk-number <number> trunk-number no-number trunk-number <system mode> <number> trunk-number <system mode> no-number trunk-number override <number> trunk-number override no-number
Syntax Description
<number> <system mode> Specifies the number used for call routing when DID is disabled. Optional. Specifies the system mode to configure. Choose from custom1, custom2, custom3, lunch, night, or weekend. Refer to the command voice system-mode on page 1320 for more information on system modes. Specifies no inbound calls are allowed on this trunk. Ignores the programmed system mode schedule.
no-number override
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 15.1 Release A1 Command was introduced. Command was added to the feature group D (FGD) trunk options. Command was expanded to include the new subcommands.
Usage Examples
The following example defines call routing on trunk T03: (config)#voice trunk t03 type t1-rbs supervision fgd role user (config-t03)#trunk-number 4000
60000CRG0-35B
3068
t38
Use the t38 command to enable T.38 fax operation. Use the no form of this command to disable this feature. The command modem-passthrough on page 3056 must be enabled for T.38 operation to work.
Syntax Description
No subcommands.
Default Values
By default, T.38 is disabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables T.38 on trunk T03: (config)#voice trunk t03 type t1-rbs supervision fgd role user (config-t03)#t38
Technology Review
T.38 is an International Telecommunication Union (ITU) specification that allows Group-3 Fax (T.30) data to be transported over the Internet. It is similar to dual tone multi-frequency (DTMF) relay (RFC 2833) in that the digital signal processor (DSP) decodes tones and demodulated fax data and converts them into packets. A similar device on the other end takes the packets/tones and remodulates them so that an analog fax machine on the other end can receive the fax. AOSs previous support (revisions 12 through 15) for fax/modem signals was simply detecting a tone and forcing the coder-decoder (CODEC) into G.711 and disabling/enabling echo cancellers based on the tones detected. When packet loss becomes high, sending faxes over G.711 becomes problematic, due to dropped messages and timeouts/retrains. T.38 can be used in conjunction with various call-control schemes, such as H.323, Session Initiation Protocol (SIP), and Media Gateway Control Protocol (MGCP). AOS only supports SIP as the call-control method. This is typically referred to T.38/Annex-D. Annex-D describes the Session Initiation Protocol/Session Description Protocol (SIP/SDP) call establishment procedures.
60000CRG0-35B
3069
t38 error-correction
Use the t38 error-correction command to specify the type of fax error correction. Use the no form of this command to disable this feature. Variations of this command include:
t38 error-correction fec t38 error-correction redundancy
Syntax Description
fec Specifies forward error correction (FEC) as the fax error correction. FEC is a system of error control where the sender adds redundant data to its messages, allowing the receiver to detect and correct errors (within certain bounds) without the need to request additional data from the sender. Specifies redundancy as the fax error correction. Redundancy error correction replicates the payload a user-specified number of times to determine if errors are present. The number of redundant packets is set using the command t38 redundancy on page 3075.
redundancy
Default Values
By default, t38 error-correction is set to redundancy.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 error-correction to fec on trunk T03: (config)#voice trunk t03 type t1-rbs supervision fgd role user (config-t03)#t38 error-correction fec
60000CRG0-35B
3070
Default Values
By default, t38 fallback-mode is disabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables the t38 fallback-mode on trunk T03: (config)#voice trunk t03 type t1-rbs supervision fgd role user (config-t03)#t38 fallback-mode g711
60000CRG0-35B
3071
Default Values
By default, the maximum buffer size is set to 200.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 max-buffer to 100 on trunk T03: (config)#voice trunk t03 type t1-rbs supervision fgd role user (config-t03)#t38 max-buffer 100
60000CRG0-35B
3072
Default Values
By default, the maximum datagram value is set to 75.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 max-datagram to 100 on trunk T03: (config)#voice trunk t03 type t1-rbs supervision fgd role user (config-t03)#t38 max-datagram 100
60000CRG0-35B
3073
t38 max-rate
Use the t38 max-rate command to specify the fax maximum rate. The actual transmission rate may be lower than specified rate if the receiving end cannot support the maximum rate. Use the no form of this command to return to the default value. Variations of this command include:
t38 max-rate 14400 t38 max-rate 12000 t38 max-rate 2400 t38 max-rate 4800 t38 max-rate 7200 t38 max-rate 9600
Syntax Description
14400 12000 2400 4800 7200 9600 Specifies 14400 baud/bits as fax maximum rate. Specifies 12000 baud/bits as fax maximum rate. Specifies 2400 baud/bits as fax maximum rate. Specifies 4800 baud/bits as fax maximum rate. Specifies 7200 baud/bits as fax maximum rate. Specifies 9600 baud/bits as fax maximum rate.
Default Values
By default, the maximum fax rate is set to 14400.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 max-rate to 4800 on trunk T03: (config)#voice trunk t03 type t1-rbs supervision fgd role user (config-t03)#t38 max-rate 4800
60000CRG0-35B
3074
t38 redundancy
Use the t38 redundancy command to set the number of redundant packets sent when the t38 error-correction redundancy feature is enabled. Use the no form of this command to return to the default value. Variations of this command include:
t38 redundancy high-speed <value> t38 redundancy low-speed <value>
Syntax Description
high-speed <value> Specifies the number of redundant T.38 fax packets to be sent for data messages (high-speed fax machine image data). Range is 0 (no redundancy) to 4 packets. Specifies the number of redundant T.38 fax packets to be sent for the signaling messages (low-speed fax machine protocol). Range is 0 (no redundancy) to 7 packets.
low-speed <value>
Default Values
By default, high-speed and low-speed redundancy values are set to 0 (no redundancy).
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables t38 error-correction redundancy and sets the number of redundant data messages to 3 on trunk T03: (config)#voice trunk t03 type t1-rbs supervision fgd role user (config-t03)#t38 error-correction redundancy (config-t03)#t38 redundancy high-speed 3
60000CRG0-35B
3075
vad
Use the vad command to enable voice activity detection (VAD). VAD blocks out noise categorized as silence during a voice connection. The silent voice packets are not transmitted, allowing bandwidth usage to be reduced. Although VAD saves bandwidth, the quality of the voice call may be compromised. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, VAD is enabled for all T1 robbed bit signaling (RBS) trunks and users.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example disables VAD on trunk T01: (config)#voice trunk t01 type analog supervision loop-start (config-t01)#no vad
60000CRG0-35B
3076
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. alc on page 3079 caller-id-override on page 3080 codec-group <name> on page 3081 connect isdn-group <number> on page 3082 echo-cancellation on page 3083 match ani <template> substitute <template> on page 3084 match dnis <template> replace ani <number> on page 3086 match dnis <template> substitute <template> on page 3088
60000CRG0-35B
3077
modem-passthrough on page 3090 plc on page 3091 prefer trunk-routing on page 3092 reject-external on page 3093 resource-selection on page 3094 rtp delay-mode on page 3095 rtp dtmf-relay on page 3096 rtp frame-packetization <value> on page 3097 rtp packet-delay on page 3098 rtp qos dscp <value> on page 3099 rtp rx-gain <value> on page 3100 rtp tx-gain <value> on page 3101 trunk-number <number> on page 3102 t38 on page 3103 t38 error-correction on page 3104 t38 fallback-mode g711 on page 3105 t38 max-buffer <value> on page 3106 t38 max-datagram <value> on page 3107 t38 max-rate on page 3108 t38 redundancy on page 3109 vad on page 3110
60000CRG0-35B
3078
alc
Use the alc command to enable automatic level control (ALC). ALC reduces Realtime Transport Protocol (RTP) received signals that are out of specification to the predefined levels. It is not necessary to enable ALC on those networks that guarantee signal levels to be within specification. Use the no form of this command to disable this feature. Variations of this command include:
alc alc level -16 alc level -17 alc level -18 alc level -19 alc level -20 alc level -21 alc level -22
Syntax Description
level -16 level -17 level -18 level -19 level -20 level -21 level -22 Optional. Specifies the ALC attenuation level is -16 dBm0. Optional. Specifies the ALC attenuation level is -17 dBm0. Optional. Specifies the ALC attenuation level is -18 dBm0. Optional. Specifies the ALC attenuation level is -19 dBm0. Optional. Specifies the ALC attenuation level is -20 dBm0. Optional. Specifies the ALC attenuation level is -21 dBm0. Optional. Specifies the ALC attenuation level is -22 dBm0.
Default Values
By default, ALC is disabled.
Command History
Release 14.1 Release 15.1 Release A2 Release A2.04 Command was introduced. Command was added to the Voice Line Interface. Command was added to the Media Gateway Control Protocol (MGCP) endpoint configuration. Command was expanded to include the level parameters.
Usage Examples
The following example activates the ALC for the trunk: (config)#voice trunk t01 type isdn (config-t01)#alc
60000CRG0-35B
3079
caller-id-override
Use the caller-id-override command to replace the calling party information for this trunk with a specific number. This command is used to conceal a users name and number or to display a different name and number for internal or external caller ID. Use the no form of this command to cancel the setting. Variations of this command include:
caller-id-override emergency-outbound <number> caller-id-override emergency-outbound match-substitute caller-id-override number-inbound <number> caller-id-override number-inbound <number> if-no-cpn caller-id-override number-inbound <number> <trunk id>
Syntax Description
<number> <trunk id> emergency-outbound match-substitute number-inbound if-no-cpn Specifies the number to display on caller ID. Optional. Specifies the trunk ID (Txx) for outbound calls. Specifies the calling party number on outbound emergency calls. Specifies the configured automatic number identification (ANI) match substitution for outbound emergency calls. Specifies the calling party number on inbound calls. Optional. Specifies caller ID override only if calling party number is not available in the automatic number identification (ANI).
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 15.1 Release 16.1 Release A4.01 Command was introduced. Command was expanded. Command was expanded to include the if-no-cpn subcommand. Command was expanded to include the match-substitute subcommand.
Usage Examples
The following example sets the caller ID override number on the trunk where the command is issued: (config)#voice trunk t01 type isdn (config-t01)#caller-id-override number 555-8000
60000CRG0-35B
3080
codec-group <name>
Use the codec-group command to specify the coder-decoder (CODEC) list to be used by this account. Use the no form of this command to remove the CODEC list from the account. Syntax Description
<name> Specifies the CODEC list to be used for this account.
Default Values
By default, no CODEC lists are assigned.
Command History
Release 9.3 Release 11.1 Release 15.1 Release A1 Release A2 Command was introduced. Command was expanded to include the integrated services digital network (ISDN) trunk. Command was added to the Voice Line Configuration command set. Command was included in the Voice Loopback Account Configuration command set. Command was added to the Media Gateway Control Protocol (MGCP) Configuration command set.
Functional Notes
The codec-group command applies a previously configured CODEC list to an interface, voice trunk, or voice account. These lists are lists of CODECs used by the interface, trunk, or account in call negotiation, and are arranged in preferred order with the first listed CODEC being the most preferred. CODEC lists are created using the codec command from the Voice CODEC List Configuration mode prompt. For more information about creating CODEC lists, refer to the Voice CODEC List Command Set on page 3359.
Usage Examples
The following example applies the CODEC list List1 to the trunk: (config)#voice trunk t01 type isdn (config-t01)#codec-group List1
60000CRG0-35B
3081
Default Values
By default, no group is defined.
Command History
Release 9.3 Release 11.1 Command was introduced. Command was expanded to include the ISDN trunk.
Usage Examples
The following example specifies that this trunk will use the ISDN group 1: (config)#voice trunk t01 type isdn (config-t01)#connect isdn-group 1
60000CRG0-35B
3082
echo-cancellation
Use the echo-cancellation command to improve voice quality for packetized-based voice calls, such as Voice over IP (VoIP) or Media Gateway Control Protocol (MGCP). Enabling this command may significantly improve the voice quality in calls across the telephone network. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, echo-cancellation is enabled.
Command History
Release 9.3 Release 11.1 Command was introduced. Command was expanded to include the integrated services digital network (ISDN) trunk.
Usage Examples
The following example activates echo-cancellation: (config)#voice trunk t01 type isdn (config-t01)#echo-cancellation
60000CRG0-35B
3083
Syntax Description
ani <template> Specifies the ANI information to be substituted. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the ANI information that is substituted for the original ANI information. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Optional. Specifies the name associated with the ANI information. This option is only available on trunks that support ANI name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
substitute <template>
name <name>
Default Values
By default, no ANI substitution is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for ANI templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3084
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match ani command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match ani ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the ANI information from numbers 555-8111 to 555-8115 will be substituted by 555-8110 for outbound calls on the trunk T03: (config)#voice trunk t03 type isdn (config-t03)#match ani 555-811[125] substitute 555-8110
60000CRG0-35B
3085
Syntax Description
dnis <template> Specifies the DNIS information to be replaced. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the ANI information that replaces the original DNIS information. This information is entered using numerical digits. Enter the number without punctuation. Optional. Specifies the name associated with the ANI information. This option is only available on trunks that support ANI name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
name <name>
Default Values
By default, no DNIS replacement is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for DNIS templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3086
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match dnis command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match dnis ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the DNIS information for dialed numbers on trunk T03 that match 1-256-524-8600 are replaced with 882-6467: (config)#voice trunk t03 type isdn (config-t03)#match dnis 1-256-524-8600 replace ani 8826467
60000CRG0-35B
3087
Syntax Description
dnis <template> Specifies the DNIS information to be substituted. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the DNIS information that is substituted for the original DNIS information. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Optional. Specifies the name associated with the DNIS information. This option is only available on trunks that support DNIS name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
substitute <template>
name <name>
Default Values
By default, no DNIS substitution is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for DNIS templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3088
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match dnis command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match dnis ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the DNIS information for dialed numbers on trunk T03 that match 1-334-NXX-XXXX are substituted with 1-800-557-4500: (config)#voice trunk t03 type isdn (config-t03)#match dnis 1-334-NXX-XXXX substitute 1-800-557-4500
60000CRG0-35B
3089
modem-passthrough
Use the modem-passthrough command to switch to passthrough mode on fax or modem tone detection. This command allows modem and fax calls to maintain a connection without altering the signals with the voice improvement settings, such as echo cancellation and voice activity detection (VAD). Use the no form of this command to disable this feature. Variations of this command include:
modem-passthrough modem-passthrough detection-time <value>
Syntax Description
detection-time <value> Optional. Specifies the fax and/or modem detection time length value in seconds. Range is 0 to 8 seconds.
Default Values
By default, modem-passthrough is enabled.
Command History
Release 11.1 Release 12.1 Command was introduced. Command was expanded.
Usage Examples
The following example enables modem-passthrough: (config)#voice trunk t01 type isdn (config-t01)#modem-passthrough
60000CRG0-35B
3090
plc
Use the plc command to enable packet loss concealment (PLC). PLC is used to prevent choppy connections by concealing a packet loss by replacing the lost packet with another voice packet in the data stream. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, PLC is enabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example enables PLC on trunk T01: (config)#voice trunk t01 type isdn (config-t01)#plc
60000CRG0-35B
3091
prefer trunk-routing
Use the prefer trunk-routing command to add a trunk to a list of trunks that are considered first for call routing, regardless of system routing mode or locally configured extensions. Use the no form of this command to remove the trunk from the list. Syntax Description
No subcommands.
Default Values
By default, prefer trunk-routing is disabled.
Command History
Release A2 Command was introduced.
Functional Notes
Trunk routing can be specified as a preference for specific trunks, allowing the trunk to be considered first for routing rather than relying on the internal or external nature of the call to dictate whether the trunk or voice station is the first choice routing path. The prefer trunk-routing command, executed from a specific trunks configuration mode, adds the trunk to a list of trunks that are considered first for routing. By default, no trunk routing preference is set, so that each trunk operates as dictated by normal call routing modes. Adding the trunk routing preference only affects how inbound calls from the specific trunk are handled.
Usage Examples
The following example specifies that trunk routing is preferred on the trunk T01: (config)#voice trunk t01 type isdn (config-t01)#prefer trunk-routing
60000CRG0-35B
3092
reject-external
Use the reject-external command to blocked outbound (external) call attempts. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is enabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example enables packet loss concealment (PLC) on trunk T01: (config)#voice trunk t01 type isdn (config-t01)#reject-external
60000CRG0-35B
3093
resource-selection
Use the resource-selection command to determine how the switchboard uses outbound call resources contained within a time division multiplexing (TDM) based trunk group. Use the no form of this command to disable this feature. Variations of this command include:
resource-selection circular resource-selection circular ascending resource-selection circular descending resource-selection linear resource-selection linear ascending resource-selection linear descending
Syntax Description
circular Performs call load balancing among available DS0s/B-channels in this trunk. Subsequent calls will be delivered to the next available DS0/B-channel in a round-robin fashion. Specifies that a call being delivered to this trunk will be accepted out the first available DS0/B-channel available at the time the call is received. Optional. Distributes calls in an order from the lowest to the highest channel (DS0 1, 2, 3 through 24). Optional. Distributes calls in an order from the highest to the lowest channel (DS0 24, 23, 22 through 1).
Default Values
By default, resource selection is set to linear.
Command History
Release 9.3 Release 13.1 Command was introduced. Command was expanded to include the ascending and descending subcommands.
Usage Examples
The following example specifies circular resource selection: (config)#voice trunk t01 type isdn (config-t01)#resource-selection circular
60000CRG0-35B
3094
rtp delay-mode
Use the rtp delay-mode command to configure the Realtime Transport Protocol (RTP) jitter buffer packet delay mode settings. RTP is used to prevent static on voice connections by enhancing the quality of the packet delivery. Use the no form of this command to return to the default setting. Variations of this command include:
rtp delay-mode adaptive rtp delay-mode fixed
Syntax Description
adaptive fixed Configures RTP jitter buffer packet delay to adjust during a call based on network conditions. Configures the RTP jitter buffer packet delay to remain constant.
Default Values
By default, this command is set to adaptive.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures RTP delay mode as fixed: (config)#voice trunk t01 type isdn (config-t01)#rtp delay-mode fixed
60000CRG0-35B
3095
rtp dtmf-relay
Use the rtp dtmf-relay command to configure the method by which Realtime Transport Protocol (RTP) dual tone multi-frequency (DTMF) events are relayed, either inband in the RTP stream or out-of-band (OOB) using named telephone events (NTEs). RTP DTMF relay is used to prevent the tone (dialed digits) from being corrupted. Use the no form of this command to return to the default value. Variations of this command include:
rtp dtmf-relay inband rtp dtmf-relay nte <value>
Syntax Description
inband nte <value> Configures RTP DTMF relay events for inband. Configures RTP DTMF relay events for NTE. Enter a value between 96 and 127.
Default Values
By default, the rtp dtmf-relay is set for NTE 101.
Command History
Release 9.3 Release 11.1 Command was introduced. Command was expanded to include the integrated services digital network (ISDN) trunk.
Usage Examples
The following example configures RTP DTMF relay events for NTE with an event value of 101: (config)#voice trunk t01 type isdn (config-t01)#rtp dtmf-relay nte 101
60000CRG0-35B
3096
Default Values
By default, the rtp frame-packetization time is set to 20 milliseconds on all trunks and users.
Command History
Release 9.3 Release 11.1 Command was introduced. Command was expanded to include the integrated services digital network (ISDN) trunk.
Usage Examples
The following example sets the frame packetization time for trunk T01 to 20 milliseconds: (config)#voice trunk t01 type isdn (config-t01)#rtp frame-packetization 20
60000CRG0-35B
3097
rtp packet-delay
Use the rtp packet-delay command to configure the maximum Realtime Transport Protocol (RTP) packet delays. This command is used to set the allowable limits of latency on the network. Use the no form of this command to return to the default value. Variations of this command include:
rtp packet-delay fax <value> rtp packet-delay maximum <value> rtp packet-delay nominal <value>
Syntax Description
fax <value> maximum <value> nominal <value> Sets the fax delay time in milliseconds. Range is 0 to 500 milliseconds. Sets the maximum delay time in increments of 10 milliseconds. Range is 40 to 320 milliseconds. Sets the nominal delay time in increments of 10 milliseconds. Range is 10 to 240 milliseconds.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures the RTP fax delay time on trunk T01 to 10 milliseconds: (config)#voice trunk t01 type isdn (config-t01)#rtp packet-delay fax 10
60000CRG0-35B
3098
Default Values
By default, no RTP QoS DSCP is configured for this interface.
Command History
Release 9.3 Release 11.1 Command was introduced. Command was expanded to include the integrated services digital network (ISDN) trunk.
Functional Notes
By setting the rtp qos dscp value on an individual trunk or user, you will override the global rtp qos dscp setting for RTP packets. QoS is set using a DSCP value. Valid DSCP values are 10 to 63, and a higher DSCP value has a higher priority. The default DSCP value for RTP is 46. Remember that if you are using a public IP connection, such as the Internet, for Voice over Internet Protocol (VoIP), end-to-end QoS may not be guaranteed. The default DSCP value for Session Initiation Protocol (SIP) is 26. To configure QoS for the RTP traffic that carries the voice conversation, use the command ip rtp qos dscp followed by the desired DSCP value.
Usage Examples
By setting the rtp qos dscp value on an individual trunk or user, you will override the global rtp qos dscp setting for RTP packets. The following example sets the DSCP value for RTP packets that trunk T02 generates to 60. (config)#voice trunk t02 type isdn (config-t02)#rtp qos dscp 60
60000CRG0-35B
3099
Default Values
By default, RTP RX gain is set to 0 dB.
Command History
Release A2.04 Command was introduced.
Usage Examples
The following example specifies the RTP RX gain for integrated services digital network (ISDN) trunk T01 is 4 dB: (config)#voice trunk t01 type isdn (config-t01)#rtp rx-gain 4
60000CRG0-35B
3100
Default Values
By default, RTP TX gain is set to 0 dB.
Command History
Release A2.04 Command was introduced.
Usage Examples
The following example specifies the RTP TX gain for integrated services digital network (ISDN) trunk T01 is 4 dB: (config)#voice trunk t01 type isdn (config-t01)#rtp tx-gain 4
60000CRG0-35B
3101
trunk-number <number>
Use the trunk-number command to define the call routing when direct inward dialing (DID) is disabled. This feature directs incoming calls to the specified number when DID is not present. This command also allows users to activate different system modes of operation that redirect incoming calls to a different number depending on the specified mode. Use the no form of this command to disable this feature. Variations of this command include:
trunk-number <number> trunk-number no-number trunk-number <system mode> <number> trunk-number <system mode> no-number trunk-number override <number> trunk-number override no-number
Syntax Description
<number> <system mode> Specifies the number used for call routing when DID is disabled. Optional. Specifies the system mode to configure. Choose from custom1, custom2, custom3, lunch, night, or weekend. Refer to the command voice system-mode on page 1320 for more information on system modes. Specifies no inbound calls are allowed on this trunk. Ignores the programmed system mode schedule.
no-number override
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 15.1 Release A1 Command was introduced. Command was added to the feature group D (FGD) trunk options. Command was expanded to include the new subcommands.
Usage Examples
The following example defines call routing on trunk T02: (config)#voice trunk t02 type isdn (config-t02)#trunk-number 4000
60000CRG0-35B
3102
t38
Use the t38 command to enable T.38 fax operation. Use the no form of this command to disable this feature. The command modem-passthrough on page 3090 must be enabled for T.38 operation to work.
Syntax Description
No subcommands.
Default Values
By default, T.38 is disabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables T.38: (config)#voice trunk t02 type isdn (config-t02)#t38
Technology Review
T.38 is an International Telecommunication Union (ITU) specification that allows Group-3 Fax (T.30) data to be transported over the Internet. It is similar to dual tone multi-frequency (DTMF) relay (RFC 2833) in that the digital signal processor (DSP) decodes tones and demodulated fax data and converts them into packets. A similar device on the other end takes the packets/tones and remodulates them so that an analog fax machine on the other end can receive the fax. AOSs previous support (revisions 12 through 15) for fax/modem signals was simply detecting a tone and forcing the coder-decoder (CODEC) into G.711 and disabling/enabling echo cancellers based on the tones detected. When packet loss becomes high, sending faxes over G.711 becomes problematic, due to dropped messages and timeouts/retrains. T.38 can be used in conjunction with various call-control schemes, such as H.323, Session Initiation Protocol (SIP), and Media Gateway Control Protocol (MGCP). AOS only supports SIP as the call-control method. This is typically referred to T.38/Annex-D. Annex-D describes the Session Initiation Protocol/Session Description Protocol (SIP/SDP) call establishment procedures.
60000CRG0-35B
3103
t38 error-correction
Use the t38 error-correction command to specify the type of fax error correction. Use the no form of this command to disable this feature. Variations of this command include:
t38 error-correction fec t38 error-correction redundancy
Syntax Description
fec Specifies forward error correction (FEC) as the fax error correction. FEC is a system of error control where the sender adds redundant data to its messages, allowing the receiver to detect and correct errors (within certain bounds) without the need to request additional data from the sender. Specifies redundancy as the fax error correction. Redundancy error correction replicates the payload a user-specified number of times to determine if errors are present. The number of redundant packets is set using the command t38 redundancy on page 3109).
redundancy
Default Values
By default, t38 error-correction is set to redundancy.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 error-correction to fec: (config)#voice trunk t02 type isdn (config-t02)#t38 error-correction fec
60000CRG0-35B
3104
Default Values
By default, t38 fallback-mode is disabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables the t38 fallback-mode on trunk T02: (config)#voice trunk t02 type isdn (config-t02)#t38 fallback-mode g711
60000CRG0-35B
3105
Default Values
By default, the maximum buffer size is set to 200.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 max-buffer to 100: (config)#voice trunk t02 type isdn (config-t02)#t38 max-buffer 100
60000CRG0-35B
3106
Default Values
By default, the maximum datagram value is set to 75.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 max-datagram to 100: (config)#voice trunk t02 type isdn (config-t02)#t38 max-datagram 100
60000CRG0-35B
3107
t38 max-rate
Use the t38 max-rate command to specify the fax maximum rate. The actual transmission rate may be lower than specified rate if the receiving end cannot support the maximum rate. Use the no form of this command to return to the default value. Variations of this command include:
t38 max-rate 14400 t38 max-rate 12000 t38 max-rate 2400 t38 max-rate 4800 t38 max-rate 7200 t38 max-rate 9600
Syntax Description
14400 12000 2400 4800 7200 9600 Specifies 14400 baud/bits as fax maximum rate. Specifies 12000 baud/bits as fax maximum rate. Specifies 2400 baud/bits as fax maximum rate. Specifies 4800 baud/bits as fax maximum rate. Specifies 7200 baud/bits as fax maximum rate. Specifies 9600 baud/bits as fax maximum rate.
Default Values
By default, the maximum fax rate is set to 14400.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 max-rate to 4800: (config)#voice trunk t02 type isdn (config-t02)#t38 max-rate 4800
60000CRG0-35B
3108
t38 redundancy
Use the t38 redundancy command to set the number of redundant packets sent when the t38 error-correction redundancy feature is enabled. Use the no form of this command to return to the default value. Variations of this command include:
t38 redundancy high-speed <value> t38 redundancy low-speed <value>
Syntax Description
high-speed <value> Specifies the number of redundant T.38 fax packets to be sent for data messages (high-speed fax machine image data). Range is 0 (no redundancy) to 4 packets. Specifies the number of redundant T.38 fax packets to be sent for the signaling messages (low-speed fax machine protocol). Range is 0 (no redundancy) to 7 packets.
low-speed <value>
Default Values
By default, high-speed and low-speed redundancy values are set to 0 (no redundancy).
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables t38 error-correction redundancy and sets the number of redundant data messages to 3: (config)#voice trunk t02 type isdn (config-t02)#t38 error-correction redundancy (config-t02)#t38 redundancy high-speed 3
60000CRG0-35B
3109
vad
Use the vad command to enable voice activity detection (VAD). VAD blocks out noise categorized as silence during a voice connection. The silent voice packets are not transmitted, allowing bandwidth usage to be reduced. Although VAD saves bandwidth, the quality of the voice call may be compromised. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, VAD is enabled for all T1 robbed-bit signaling RBS trunks and users.
Command History
Release 9.3 Release 11.1 Command was introduced. Command was expanded to include the integrated services digital network (ISDN) trunk.
Usage Examples
The following example enables voice activation detection on trunk T01: (config)#voice trunk t01 type isdn (config-t01)#vad
60000CRG0-35B
3110
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. alc on page 3113 alert-info on page 3114 authentication username <username> password <password> on page 3115 busy all on page 3116 busy monitor track <name> on page 3117 caller-id-override on page 3118 check-supported replaces on page 3119 codec-group <name> on page 3120 conferencing-uri <value> on page 3121 dial-string source on page 3122 diversion-supported on page 3123
60000CRG0-35B
3111
domain <name> on page 3124 grammar alert-info url <url> on page 3125 grammar from on page 3126 grammar p-asserted-identity host on page 3128 grammar proxy-require privacy on page 3129 grammar request-uri on page 3130 grammar require 100rel on page 3131 grammar supported 100rel on page 3132 grammar to host on page 3133 incoming-music-on-hold on page 3134 match ani <template> add diversion <template> on page 3135 match ani <template> add p-asserted-identity <template> on page 3138 match ani <template> replace diversion <template> on page 3140 match ani <template> substitute <template> on page 3143 match dnis <template> replace ani <number> on page 3145 match dnis <template> substitute <template> on page 3147 max-number-calls <value> on page 3149 media-loopback on page 3150 outbound-proxy primary <value> on page 3151 outbound-proxy secondary <value> on page 3152 p-assert-diversion on page 3153 prefer trunk-routing on page 3154 register on page 3155 registrar expire-time <value> on page 3157 registrar max-concurrent-reg <value> on page 3158 registrar primary <value> on page 3159 registrar require-expires on page 3160 registrar secondary <value> on page 3161 registrar threshold on page 3162 reject-external on page 3163 sip-keep-alive on page 3164 sip-server primary <value> on page 3165 sip-server rollover on page 3166 sip-server secondary <value> on page 3167 transfer-mode on page 3168 trust-domain on page 3169 vm-diversion on page 3170
60000CRG0-35B
3112
alc
Use the alc command to enable automatic level control (ALC). ALC reduces Realtime Transport Protocol (RTP) received signals that are out of specification to the predefined levels. It is not necessary to enable ALC on those networks that guarantee signal levels to be within specification. Use the no form of this command to disable this feature. Variations of this command include:
alc alc level -16 alc level -17 alc level -18 alc level -19 alc level -20 alc level -21 alc level -22
Syntax Description
level -16 level -17 level -18 level -19 level -20 level -21 level -22 Optional. Specifies the ALC attenuation level is -16 dBm0. Optional. Specifies the ALC attenuation level is -17 dBm0. Optional. Specifies the ALC attenuation level is -18 dBm0. Optional. Specifies the ALC attenuation level is -19 dBm0. Optional. Specifies the ALC attenuation level is -20 dBm0. Optional. Specifies the ALC attenuation level is -21 dBm0. Optional. Specifies the ALC attenuation level is -22 dBm0.
Default Values
By default, ALC is disabled.
Command History
Release 14.1 Release 15.1 Release A2 Release A2.04 Command was introduced. Command was added to the Voice Line Interface. Command was added to the Media Gateway Control Protocol (MGCP) endpoint configuration. Command was expanded to include the level parameters.
Usage Examples
The following example activates the ALC on trunk T01: (config)#voice trunk t01 type sip (config-t01)#alc
60000CRG0-35B
3113
alert-info
Use the alert-info command to allow the alert information attribute on incoming and/or outgoing auto answer alert information. Use the no form of this command to cancel the setting. Variations of this command include:
alert-info incoming auto-answer alert-info outgoing auto-answer
Syntax Description
incoming auto-answer outgoing auto-answer Specifies processing incoming ALERT-INFO attribute. Specifies allowing the outgoing ALERT-INFO auto-answer attribute.
Default Values
By default, both incoming and outgoing auto answer alert information is allowed on the NetVanta 7000 Series in the ALERT-INFO messages. However, both are disabled by default in the IP business gateways (IPBGs) (Total Access 900 Series and NetVanta 1335). The IPBGs will ignore incoming auto answer in the ALERT-INFO messages, and will not send the information on outgoing trunks.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example blocks outgoing alert-info auto-answer attribute on trunk T01: (config)#voice trunk t01 type sip (config-t01)#alert-info outgoing auto-answer
60000CRG0-35B
3114
Default Values
By default, authentication is not enabled.
Command History
Release 9.3 Command was introduced.
Functional Notes
If all users on the trunk use the same user name/password, enter the user name and password for authentication under the trunk. Otherwise, enter authentication information for each user individually in the Voice User command set that overrides the setting of this command. Refer to Voice User Account Command Set on page 3261 for more information.
Usage Examples
The following example configures a user name of iaduser and password of totalaccess at the trunk level: (config)#voice trunk t01 type sip (config-t01)#authentication username iaduser password totalaccess
60000CRG0-35B
3115
busy all
Use the busy all command to set all level zero digital signals (DS0s) to busy so that no calls are allowed inbound or outbound. If any calls are active at the time this command is issued, the calls will stay active until either party terminates the call. Once terminated, the DS0s are busied out. Use the no form of this command to disable this feature. Variations of this command include:
busy all busy all now
Syntax Description
now Optional. Immediately terminates calls that are active at the time the command is issued.
Default Values
By default, this command is disabled.
Command History
Release 9.3 Release 15.1 Command was introduced. Command was added to the Voice Trunk Session Initiation Protocol (SIP) command set.
Usage Examples
The following example sets all DS0s on trunk T01 to busy and terminates calls that are active at the time the command is issued: (config)#voice trunk t01 type sip (config-t01)#busy all now
60000CRG0-35B
3116
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example shuts down trunk T01 when the on_fail track fails: (config)#voice trunk t01 type sip (config-t01)#busy-out monitor track on_fail
60000CRG0-35B
3117
caller-id-override
Use the caller-id-override command to replace the calling party information for this trunk with a specific number. This command is used to conceal a users name and number or to display a different name and number for internal or external caller ID. Use the no form of this command to cancel the setting. Variations of this command include:
caller-id-override emergency-outbound <number> caller-id-override emergency-outbound match-substitute caller-id-override number-inbound <number> caller-id-override number-inbound <number> if-no-cpn caller-id-override number-inbound <number> <trunk id>
Syntax Description
<number> <trunk id> emergency-outbound match-substitute number-inbound if-no-cpn Specifies the number to display on caller ID. Optional. Specifies the trunk ID (Txx) for outbound calls. Specifies the calling party number on outbound emergency calls. Specifies the configured automatic number identification (ANI) match substitution for outbound emergency calls. Specifies the calling party number on inbound calls. Optional. Specifies caller ID override only if calling party number is not available in the automatic number identification (ANI).
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 15.1 Release 16.1 Release A4.01 Command was introduced. Command was expanded. Command was expanded to include the if-no-cpn subcommand. Command was expanded to include the match-substitute subcommand.
Usage Examples
The following example sets the caller ID override number on the trunk where the command is issued: (config)#voice trunk t01 type sip (config-t01)#caller-id-override number 555-8000
60000CRG0-35B
3118
check-supported replaces
Use the check-supported replaces command to check all support extensions on outbound messages and only send replaces when supported by the far-end device. Otherwise, replaces are automatically sent regardless of the far-end capabilities. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example sets all DS0s on trunk T01 to busy and terminates calls that are active at the time the command is issued: (config)#voice trunk t01 type sip (config-t01)#check-supported replaces
60000CRG0-35B
3119
codec-group <name>
Use the codec-group command to specify the coder-decoder (CODEC) list to be used by this account. Use the no form of this command to remove the CODEC list from the account. Syntax Description
<name> Specifies the CODEC list to be used for this account.
Default Values
By default, no CODEC lists are assigned.
Command History
Release 9.3 Release 11.1 Release 15.1 Release A1 Release A2 Command was introduced. Command was expanded to include the integrated services digital network (ISDN) trunk. Command was added to the Voice Line Configuration command set. Command was included in the Voice Loopback Account Configuration command set. Command was added to the Media Gateway Control Protocol (MGCP) Configuration command set.
Functional Notes
The codec-group command applies a previously configured CODEC list to an interface, voice trunk, or voice account. These lists are lists of CODECs used by the interface, trunk, or account in call negotiation, and are arranged in preferred order with the first listed CODEC being the most preferred. CODEC lists are created using the codec command from the Voice CODEC List Configuration mode prompt. For more information about creating CODEC lists, refer to the Voice CODEC List Command Set on page 3359.
Usage Examples
The following example applies the CODEC list List1 to trunk T01: (config)#voice trunk t01 type sip (config-t01)#codec-group List1
60000CRG0-35B
3120
conferencing-uri <value>
Use the conferencing-uri command to configure a conference application server uniform resource identifier (URI) that controls and uniquely identifies a conference. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the extension or complete URI of the conference application server.
Default Values
By default, conferencing-uri is not configured.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the conferencing-uri to 0606: (config)#voice trunk t01 type sip (config-t01)#conferencing-uri 0606
60000CRG0-35B
3121
dial-string source
Use the dial-string source command to set the Session Initiation Protocol (SIP) dialing string field of your choice. Use the no form of this command to remove the specified setting. Variations of this command include the following:
dial-string source request-uri dial-string source to
Syntax Description
request-uri to Specifies the Request URI user field as the dialing string source. Specifies the To header field as the dialing string source.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example enables the To header user field as the dial-string for this trunk: (config)#voice trunk t01 type sip (config-t01)#dial-string source to
60000CRG0-35B
3122
diversion-supported
Use the diversion-supported command to apply a Session Initiation Protocol (SIP) Diversion header to redirected calls on the trunk. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, this feature is disabled on the NetVanta 7000 Series products. By default, this feature is enabled on the Total Access 900(e) Series products and NetVanta 6000 Series products.
Command History
Release A2.03 Command was introduced.
Functional Notes
This feature retains the originating number when a call is processed through an auto attendant, transferred from a user extension, or is forwarded by a user phone to an external number. For these calls, the number included in the From field of the SIP messages are subject to the automatic number identification (ANI) substitution and a SIP Diversion header is added with the original caller ID number. Calls from internal extensions are subject to the ANI substitution configured on the trunk without the addition of a SIP Diversion header.
Usage Examples
The following example enables diversion-supported: (config)#voice trunk t01 type sip (config-t01)#diversion-supported
60000CRG0-35B
3123
domain <name>
Use the domain command to configure the assigned domain name for host messages. The domain is an unique identifier for the Session Initiation Protocol (SIP) users on the trunk. Use the no form of this command to disable this feature. Syntax Description
<name> Specifies the domain name for the SIP trunk commands.
Default Values
By default, no domain is configured.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the domain name as home.com: (config)#voice trunk t01 type sip (config-t01)#domain home.com
60000CRG0-35B
3124
Default Values
By default, the local loopback address is the host in the Alert-Info header (127.0.0.1).
Command History
Release A2 Command was introduced.
Usage Examples
The following example sets the Alert-Info header to use a specific URL as shown in the sample header below: (config)#voice trunk t01 type sip (config-t01)#grammar alert-info url www.notused.com Sample header: Alert-Info:<http://www.notused.com>;info=alert-internal
60000CRG0-35B
3125
grammar from
Use the grammar from command to configure the From header on Session Initiation Protocol (SIP) messages. Use the no form of this command to return to the default setting. Variations of this command include:
grammar from host domain grammar from host local grammar from host sip-server grammar from user domestic grammar from user domestic <Txx> grammar from user international grammar from user international <Txx>
Syntax Description
host domain local sip-server user domestic international <Txx> Specifies the Host field formatting for the From header. Specifies the trunk domain setting for formatting the From header. Specifies the local IP for formatting the From header. Specifies the SIP server settings for formatting the From header. Specifies the User field formatting for the From header. Specifies domestic formatting for the From user header. Specifies international formatting for the From user header. Optional. Indicates a two-digit trunk identifier (i.e., T01).
Default Values
By default, the host for formatting messages is sip-server. Also, the default for the user format is domestic.
Command History
Release A2 Command was introduced.
Functional Notes
Omitting the trunk identifier when issuing the grammar from user command specifies the User header globally.
Usage Examples
The following example sets the From header format to use a local IP: (config)#voice trunk t01 type sip (config-t01)#grammar from host local
60000CRG0-35B
3126
The following example sets the From header format to use calling party format on trunk T02: (config)#voice trunk t01 type sip (config-t01)#grammar from user domestic T02
Technology Review
This technology review provides information about the E.164 recommendation for international numbering plans and telephone number formats. A fully specified telephone number can have a maximum of 15 digits, including country code, area code, and the subscribers number. These numbers usually consist of a + prefix. E.164 numbers exclude dialing prefixes. The most familiar prefixes are international direct dialing (IDD) and national direct dialing (NDD). In countries other than the United States, the IDD and NDD are represented by different numbers. Additionally, E.123 describes the use of + to indicate a fully specified international number. The + is used in SIP headers to provide consistency across national and international phone calls. AOS products provide support for E.164 by being able to specify a country code and an IDD prefix. Nationally formatted telephone numbers are converted to international format by prefixing them with + and the country code. On outbound international calls, + is substituted for the IDD. On incoming international calls, the + is removed. If the country code matches the configured value, it too is removed.
Setting the From header to international will cause phone numbers to be formatted as indicated by E.164. The country code must be configured, and the number must be of type national for this feature to work successfully.
60000CRG0-35B
3127
Syntax Description
domain local sip-server Specifies the domain host for formatting the header. Specifies the local IP as host for formatting the header. Specifies the SIP server as host for formatting the header.
Default Values
By default, the host for formatting messages is sip-server.
Command History
Release A2 Command was introduced.
Usage Examples
The following example sets the p-asserted-identity header host format to use a local IP for constructing the header: (config)#voice trunk t01 type sip (config-t01)#grammar p-asserted-identity host local
60000CRG0-35B
3128
Default Values
By default, this feature is disabled.
Command History
Release A2 Command was introduced.
Usage Examples
The following example allows a Proxy-Require header to be added to packets containing a privacy header: (config)#voice trunk t01 type sip (config-t01)#grammar proxy-require privacy
60000CRG0-35B
3129
grammar request-uri
Use the grammar request-uri command to format the Request uniform resource identifier (URI) for Session Initiation Protocol (SIP) trunk messages. Use the no form of this command to return to the default setting. Variations of this command include:
grammar request-uri host domain grammar request-uri host sip-server grammar request-uri host-resolve
Syntax Description
host domain host sip-server host-resolve Specifies the trunk domain setting for formatting the Request-URI header. Specifies the trunk SIP server setting for formatting the Request-URI header. Enables the local unit to resolve the domain before constructing the Request-URI header.
Default Values
By default, the host for formatting messages is the SIP server. Also by default, host-resolve is disabled.
Command History
Release A2 Command was introduced.
Usage Examples
The following example enables SIP trunk messages to resolve the Request-URI from the host domain: (config)#voice trunk t01 type sip (config-t01)#grammar request-uri host domain The following example enables SIP trunk messages to resolve the Request-URI from the local unit: (config)#voice trunk t01 type sip (config-t01)#grammar request-uri host-resolve
60000CRG0-35B
3130
Default Values
By default, grammar require 100rel is disabled.
Command History
Release A2 Command was introduced.
Functional Notes
This command enables or disables the sending of reliable provisional responses to clients that support 100rel. Reliable provisional responses will always be sent to clients that require 100rel even with grammar require 100rel disabled.
Usage Examples
The following example enables grammar require 100rel: (config)#voice trunk t01 type sip (config-t01)#grammar require 100rel
Technology Review
There are two Require headers that may use the 100rel tag, one in the initial request, and one in the provisional response. The user agent client (UAC) is used to initiate Session Initiation Protocol (SIP) requests. When the UAC creates a new request, it can require reliable provisional responses for that request by adding the option tag 100rel to the Require header of that request. The user agent server (UAS) contacts the user when SIP requests are received, and returns responses on behalf of the user, using provisional responses for request progress information. Provisional responses (100 to 199) are transmitted on a best-effort basis. By using reliable provisional responses, responses are sent by the UAS until they are acknowledged as received. This is especially beneficial when sending provisional responses over an unreliable transport, such as User Datagram Protocol (UDP). The UAS must send any non-100rel provisional responses reliably if the initial request contained a Require header field with the option tag 100rel. If the UAS is unwilling to do so, it must reject the initial request with a Bad Extension message and include an Unsupported header field containing the option tag 100rel. If the client supports 100rel, the UAS has the option of sending provisional responses with or without the Require 100rel tag as instructed by the grammar require 100rel command.
60000CRG0-35B
3131
Default Values
By default, grammar supported 100rel is disabled.
Command History
Release A2 Command was introduced.
Usage Examples
The following example enables grammar supported 100rel: (config)#voice trunk t01 type sip (config-t01)#grammar supported 100rel
60000CRG0-35B
3132
grammar to host
Use the grammar to host command to configure the To header host format of Session Initiation Protocol (SIP) trunk messages. Use the no form of this command to return to the default setting. Variations of this command include:
grammar to host domain grammar to host sip-server
Syntax Description
domain sip-server Specifies using the trunk domain setting to format the To header. Specifies using the trunk SIP server settings to format the To header.
Default Values
By default, the host for formatting messages is the SIP server.
Command History
Release A2 Command was introduced.
Usage Examples
The following example configures the To header format construction to use the trunk domain: (config)#voice trunk t01 type sip (config-t01)#grammar to host domain
60000CRG0-35B
3133
incoming-music-on-hold
Use the incoming-music-on-hold command to activate music on hold for hold re-invites on Session Initiation Protocol (SIP) trunk calls. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this feature is disabled.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example activates music on hold for hold re-invites on SIP trunk calls: (config)#voice trunk t01 type sip (config-t01)#incoming-music-on-hold
60000CRG0-35B
3134
Syntax Description
ani <template> Specifies the source automatic number identification (ANI) information to be matched. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies that when the match source matches the match source template, SIP Diversion headers are added to the SIP trunk messages. Specifies the match target and match target template used to execute the command action when adding SIP Diversion headers to SIP messages. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Optional. Specifies the reason for the diversion. If you specify the diversion type, you must also specify whether or not the diversion is screened by the network, and whether diversion privacy is used. Diversion reasons include the following: away deflection do-not-disturb follow-me no-answer out-of-service time-of-day unavailable unconditional unknown user-busy Diverts the message if the receiving SIP agent is away. Diverts the message if the receiving SIP agent is deflecting calls. Diverts the message if the receiving SIP agent has do-not-disturb enabled. Diverts the message if the receiving SIP agent has FindMe-FollowMe enabled. Diverts the message if the receiving SIP agent does not answer. Diverts the message if the receiving SIP agent is out-of-service. Diverts the message if the message is sent at a particular time of day. Diverts the message if the receiving SIP agent is unavailable. Diverts the message on an unconditional basis. Diverts the message if an unknown error occurs. Diverts the message if the receiving SIP agent is busy.
<diversion type>
60000CRG0-35B
3135
Voice SIP Trunk Command Set Optional. Specifies whether the diversion is screened by the network. Screening types include: no yes Specifies that the diversion used is not screened by the network. Specifies that the diversion used is screened by the network.
<privacy setting>
Optional. Specifies whether privacy is used when SIP Diversion headers are added to the SIP messages. Privacy settings include: full off Specifies that the diversion uses full privacy. Specifies that the diversion does not use privacy.
Default Values
By default, SIP diversions are specified as unconditional (unconditional), do not use network screening (no), and do not use privacy (off).
This command can get very lengthy. To shorten the length of the command, you must elect to use all default values for the diversion options, or you must override all options.
Command History
Release A4.01 Command was introduced.
Functional Notes
Both match source and match target templates are defined in the same way as dial plan entries. Wildcards available for use are as follows: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use exclamation points, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3136
Command Reference Guide The following are example template entries using wildcards: 1. 555-81xx matches 555-8100 to 555-8199. 2. 555-812[012] matches 555-8120 to 555-8122. 3. Nxx-xxxx matches 7 digits local. 4. 1-Nxx-Nxx-xxxx matches long distance calls in North America.
Additional wildcards ($ and 0 to 9) can also be used. The CLI also contains helpful information regarding the construction of the template and can be viewed by entering the match ani command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match ani ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $ (Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9]. 7) A preceding ! will match the inverse of the template following the !. 8) The ! is only valid as the first character of a match source template.
In the following example command, the match source template is in bold: match ani !2565558XXX add diversion 2565558000 unconditional yes full
In this example, the template includes a ! at the beginning. The ! indicates that the inverse of the template is matched. Inverse matching can only be used with the match source template and requires a static target template (the target template cannot contain wildcards).
For additional information about configuring SIP Diversion headers in SIP messaging, refer to the quick configuration guide, Modifying SIP Headers to SIP Trunks in AOS Voice Products available online at http://kb.adtran.com (article number 3408).
Usage Examples
In the following example, the SIP trunk (t01) is configured so that when the ANI source template (2565558XXX) is matched, an unconditional SIP Diversion header with a target template of 2565558000 and network screening and full privacy are added to the message. (config)#voice trunk t01 (config-T01)#match ani 2565558XXX add diversion 2565558000 unconditional yes full
60000CRG0-35B
3137
Default Values
By default, P-Asserted-Identity headers are not added to SIP messages.
Command History
Release A4.01 Command was introduced.
Functional Notes
Both match source and match target templates are defined in the same way as dial plan entries. Wildcards available for use are as follows: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use exclamation points, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3138
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: 1. 555-81xx matches 555-8100 to 555-8199. 2. 555-812[012] matches 555-8120 to 555-8122. 3. Nxx-xxxx matches 7 digits local. 4. 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The CLI also contains helpful information regarding the construction of the template and can be viewed by entering the match ani command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match ani ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $ (Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9]. 7) A preceding ! will match the inverse of the template following the !. 8) The ! is only valid as the first character of a match source template.
In the following example command, the match source template is in bold: match ani !2565558XXX add diversion 2565558000 unconditional yes full
In this example, the template includes a ! at the beginning. The ! indicates that the inverse of the template is matched. Inverse matching can only be used with the match source template and requires a static target template (the target template cannot contain wildcards).
For additional information about configuring SIP Diversion headers in SIP messaging, refer to the quick configuration guide, Adding SIP Headers to SIP Trunks in AOS Voice Products available online at http://kb.adtran.com.
Usage Examples
In the following example, a P-Asserted-Identity header is adding to a SIP message when the ANI source template of 2565558XXX is matched with the target template of 2565558000: (config)#voice trunk t01 (config-T01)#match ani 2565558XXX add p-asserted-identity 2565558000
60000CRG0-35B
3139
Syntax Description
ani <template> Specifies the source automatic number identification (ANI) information to be matched. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies that when the match source matches the match source template, SIP Diversion headers are replaced on the SIP trunk messages. Specifies the match target and match target template used to execute the command action when replacing SIP Diversion headers in SIP messages. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Optional. Specifies the reason for the diversion. If you specify the diversion type, you must also specify whether or not the diversion is screened by the network, and whether diversion privacy is used. Diversion reasons include the following: away deflection do-not-disturb follow-me no-answer out-of-service time-of-day unavailable unconditional unknown user-busy Diverts the message if the receiving SIP agent is away. Diverts the message if the receiving SIP agent is deflecting calls. Diverts the message if the receiving SIP agent has do-not-disturb enabled. Diverts the message if the receiving SIP agent has FindMe-FollowMe enabled. Diverts the message if the receiving SIP agent does not answer. Diverts the message if the receiving SIP agent is out-of-service. Diverts the message if the message is sent at a particular time of day. Diverts the message if the receiving SIP agent is unavailable. Diverts the message on an unconditional basis. Diverts the message if an unknown error occurs. Diverts the message if the receiving SIP agent is busy.
<diversion type>
60000CRG0-35B
3140
Voice SIP Trunk Command Set Optional. Specifies whether the diversion is screened by the network. Screening types include: no yes Specifies that the diversion used is not screened by the network. Specifies that the diversion used is screened by the network.
<privacy setting>
Optional. Specifies whether privacy is used when SIP Diversion headers are added to the SIP messages. Privacy settings include: full off Specifies that the diversion uses full privacy. Specifies that the diversion does not use privacy.
Default Values
By default, SIP diversions are specified as unconditional (unconditional), do not use network screening (no), and do not use privacy (off).
This command can get very lengthy. To shorten the length of the command, you must elect to use all default values for the diversion options, or you must override all options.
Command History
Release A4.05 Command was introduced.
Functional Notes
Both match source and match target templates are defined in the same way as dial plan entries. Wildcards available for use are as follows: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use exclamation points, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3141
Command Reference Guide The following are example template entries using wildcards: 1. 555-81xx matches 555-8100 to 555-8199. 2. 555-812[012] matches 555-8120 to 555-8122. 3. Nxx-xxxx matches 7 digits local. 4. 1-Nxx-Nxx-xxxx matches long distance calls in North America.
Additional wildcards ($ and 0 to 9) can also be used. The CLI also contains helpful information regarding the construction of the template and can be viewed by entering the match ani command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match ani ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $ (Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9]. 7) A preceding ! will match the inverse of the template following the !. 8) The ! is only valid as the first character of a match source template.
In the following example command, the match source template is in bold: match ani !2565558XXX replace diversion 2565558000 unconditional yes full
In this example, the template includes a ! at the beginning. The ! indicates that the inverse of the template is matched. Inverse matching can only be used with the match source template and requires a static target template (the target template cannot contain wildcards).
For additional information about configuring SIP Diversion headers in SIP messaging, refer to the configuration guide, Modifying SIP Headers on SIP Trunks in AOS Voice Products available online at http://kb.adtran.com (article number 3408).
Usage Examples
In the following example, the SIP trunk (t01) is configured so that when the ANI source template (2565558XXX) is matched, an unconditional SIP Diversion header with a target template of 2565558000 and network screening and full privacy replaces the original SIP header. (config)#voice trunk t01 (config-T01)#match ani 2565558XXX replace diversion 2565558000 unconditional yes full
60000CRG0-35B
3142
Syntax Description
ani <template> Specifies the ANI information to be substituted. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the ANI information that is substituted for the original ANI information. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Optional. Specifies the name associated with the ANI information. This option is only available on trunks that support ANI name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
substitute <template>
name <name>
Default Values
By default, no ANI substitution is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for ANI templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3143
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match ani command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match ani ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the ANI information from numbers 555-8111 to 555-8115 will be substituted by 555-8110 for outbound calls on the trunk T03: (config)#voice trunk t03 type sip (config-t03)#match ani 555-811[125] substitute 555-8110
60000CRG0-35B
3144
Syntax Description
dnis <template> Specifies the DNIS information to be replaced. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the ANI information that replaces the original DNIS information. This information is entered using numerical digits. Enter the number without punctuation. Optional. Specifies the name associated with the ANI information. This option is only available on trunks that support ANI name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
name <name>
Default Values
By default, no DNIS replacement is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for DNIS templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3145
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match dnis command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match dnis ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the DNIS information for dialed numbers on trunk T03 that match 1-256-524-8600 are replaced with 882-6467: (config)#voice trunk t03 type sip (config-t03)#match dnis 1-256-524-8600 replace ani 8826467
60000CRG0-35B
3146
Syntax Description
dnis <template> Specifies the DNIS information to be substituted. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the DNIS information that is substituted for the original DNIS information. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Optional. Specifies the name associated with the DNIS information. This option is only available on trunks that support DNIS name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
substitute <template>
name <name>
Default Values
By default, no DNIS substitution is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for DNIS templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3147
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match dnis command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match dnis ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the DNIS information for dialed numbers on trunk T03 that match 1-334-NXX-XXXX are substituted with 1-800-557-4500: (config)#voice trunk t03 type sip (config-t03)#match dnis 1-334-NXX-XXXX substitute 1-800-557-4500
60000CRG0-35B
3148
max-number-calls <value>
Use the max-number-calls command to configure the maximum number of calls allowed on this trunk. This command is useful in controlling the call usage of the trunk. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies the maximum number of calls allowed on this trunk. Range is 1 to 64 calls.
Default Values
By default, no maximum number of calls is specified.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example sets the maximum number of calls allowed to 25: (config)#voice trunk t01 type sip (config-t01)#max-number-calls 25
60000CRG0-35B
3149
media-loopback
Use the media-loopback command to configure a Session Initiation Protocol (SIP) trunk to allow media loopback calls to be placed on the trunk. Media loopback enables media sessions to be established where the media is looped back to the transmitter. This is typically referred to as active monitoring of services. This command allows media loopback sessions on some SIP trunks while disallowing media-loopback on others. Use the no form of this command do disable this feature. Syntax Description
No subcommands.
Default Values
By default, media-loopback is enabled on SIP trunks.
Command History
A4.03 Command was introduced.
Usage Examples
The following example enables media loopback on trunk T01: (config)#voice trunk t01 type sip (config-t01)#media-loopback
60000CRG0-35B
3150
Syntax Description
<value> <number> tcp udp Specifies the fully qualified domain name (FQDN) or IP address of the outbound proxy server. Optional. Specifies the port number. Range is 0 to 65535. Optional. Sets the Transmission Control Protocol (TCP) port of the outbound proxy server. Optional. Sets the User Datagram Protocol (UDP) port of the outbound proxy server.
Default Values
By default, the IP address is set to 0.0.0.0 and the UDP port is set to 5060.
Command History
Release 9.3 Release 15.1 Command was introduced. Command was expanded.
Functional Notes
The configured value must resolve to a valid IP address.
Usage Examples
The following example sets the outbound proxy server to sip-proxy.adtran.com with a UDP port of 2222: (config)#voice trunk t01 type sip (config-t01)#outbound-proxy primary sip-proxy.adtran.com udp 2222
60000CRG0-35B
3151
Syntax Description
<value> <number> tcp udp Specifies the fully qualified domain name (FQDN) or IP address of the outbound proxy server. Optional. Specifies the port number. Range is 0 to 65535. Optional. Sets the Transmission Control Protocol (TCP) port of the outbound proxy server. Optional. Sets the User Datagram Protocol (UDP) port of the outbound proxy server.
Default Values
By default, the IP address is set to 0.0.0.0 and the UDP port is set to 5060.
Command History
Release 15.1 Command was introduced.
Functional Notes
The configured value must resolve to a valid IP address.
Usage Examples
The following example sets the outbound proxy server to sip-proxy.adtran.com with a UDP port of 2244: (config)#voice trunk t01 type sip (config-t01)#outbound-proxy secondary sip-proxy.adtran.com udp 2244
60000CRG0-35B
3152
p-assert-diversion
Use the p-assert-diversion command to enable sending P-Asserted-Identity in place of the Session Initiation Protocol (SIP) diversion header. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example enables P-Asserted-Identity in place of the SIP diversion header: (config)#voice trunk t01 type sip(config-t01)#p-assert-diversion
60000CRG0-35B
3153
prefer trunk-routing
Use the prefer trunk-routing command to add a trunk to a list of trunks that are considered first for call routing, regardless of system routing mode or locally configured extensions. Use the no form of this command to remove the trunk from the list. Syntax Description
No subcommands.
Default Values
By default, prefer trunk-routing is disabled.
Command History
Release A2 Command was introduced.
Functional Notes
Trunk routing can be specified as a preference for specific trunks, allowing the trunk to be considered first for routing rather than relying on the internal or external nature of the call to dictate whether the trunk or voice station is the first choice routing path. The prefer trunk-routing command, executed from a specific trunks configuration mode, adds the trunk to a list of trunks that are considered first for routing. By default, no trunk routing preference is set, so that each trunk operates as dictated by normal call routing modes. Adding the trunk routing preference only affects how inbound calls from the specific trunk are handled.
Usage Examples
The following example specifies that trunk routing is preferred on the trunk T01: (config)#voice trunk t01 type sip (config-t01)#prefer trunk-routing
60000CRG0-35B
3154
register
Use the register command to define the Session Initiation Protocol (SIP) name for registration of the authorization name(s) and password(s). Use the no form of this command to remove a registration. Variations of this command include the following:
register <name> register <name> auth-name <username> password <word> register range <begin> <end> register range <begin> <end> auth-name <username> password <word> register range <begin> <end> auth-name range <begin> <end> password range <begin> <end> register range <begin> <end> auth-name range <begin> <end> password <word>
When using the range option, there must be the same number of elements in each related range. In other words, each SIP user in a range must have one authentication name and/or one password. Syntax Description
<name> range <begin> <end> auth-name <username> password <word> Specifies the name of the SIP trunk to register. Specifies the beginning and ending of the range to register SIP users, authentication names, and/or passwords. Optional. Specifies the user name for authentication. Optional. Specifies the password for authentication.
Default Values
By default, no registration range is programmed.
Command History
Release 12.1 Release 15.1 Command was introduced. Command was expanded.
Functional Notes
Using the range option reduces the time required to program individual user registration and authentication settings. The range configuration option allows multiple users to be configured in one step for example: register range 2565553000 2565553100 auth-name range Adtran3000 Adtran3100 password range adtn3000 adtn3100 In this example, 100 users in the range (256) 555-3000 to (256) 555-3100 are registered with authentication names ranging from Adtran3000 to Adtran3100 and passwords ranging from adtn3000 to adtn3100.
60000CRG0-35B
3155
The user may enter an authentication name range, password range, or both. An error will be returned if the provided authentication name and/or password range values are not large enough for the SIP identity range provided (i.e., in the example, if the user had entered Adtran3000 Adtran3099 for the authentication name range, an error would have been returned because the specified SIP identity range is 100 users (not 99)).
Usage Examples
The following example registers trunk T01 under the name of MainOffice: (config)#voice trunk t01 type sip (config-t01)#register MainOffice The following example sets the authorization name and password range for a group of SIP users: (config)#voice trunk t01 type sip (config-t01)#register range 2565554000 2565554100 auth-name range Adtran4000 Adtran4100 password range adtn8000 adtn8100
60000CRG0-35B
3156
Default Values
By default, no registration expiration time is programmed.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example enables registration expiration time for the SIP trunk: (config)#voice trunk t01 type sip (config-t01)#registrar expire-time
60000CRG0-35B
3157
Default Values
By default, the maximum number of concurrent registrations is set to 32.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example sets the maximum number on concurrent registrations to 12: (config)#voice trunk t01 type sip (config-t01)#registrar max-concurrent-reg 12
60000CRG0-35B
3158
A secondary SIP registrar can be set using the command registrar secondary <value> on page 3161.
Syntax Description
<value> <number> tcp udp Specifies the FQDN or IP address of the registrar server. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the port number. Range is 0 to 65535. Optional. Sets the Transmission Control Protocol (TCP) port of the outbound proxy server. Optional. Sets the User Datagram Protocol (UDP) port of the outbound proxy server.
Default Values
By default, the IP address is set to 0.0.0.0 and the UDP port is set to 5060.
Command History
Release 9.3 Release 15.1 Command was introduced. Command was expanded.
Functional Notes
This command specifies which trunk will send SIP register messages. The configured value must resolve to a valid IP address.
Usage Examples
The following example sets the registrar server to as1.adtran.com with a UDP port of 9060: (config)#voice trunk t01 type sip (config-t01)#registrar primary as1.adtran.com udp 9060
60000CRG0-35B
3159
registrar require-expires
Use the registrar require-expires command to define the Session Initiation Protocol (SIP) expiration time for registration. A successful response to a register contains an expires header or the response is considered a failure. When disabled, a successful response does not require an expires header to be considered successful. Use the no form of this command to return to the default setting. Syntax Description
<value> Specifies expiration time (in seconds) for a response to a registration request.
Default Values
By default, the registration expiration time is enabled.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example disables registration expiration time for the SIP trunk: (config)#voice trunk t01 type sip (config-t01)#no registrar require-expires
60000CRG0-35B
3160
Syntax Description
<value> <number> tcp udp Specifies the FQDN or IP address of the registrar server. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the port number. Range is 0 to 65535. Optional. Sets the Transmission Control Protocol (TCP) port of the outbound proxy server. Optional. Sets the User Datagram Protocol (UDP) port of the outbound proxy server.
Default Values
By default, the IP address is set to 0.0.0.0 and the UDP port is set to 5060.
Command History
Release 15.1 Command was introduced.
Functional Notes
This command specifies which trunk will send SIP register messages. The configured value must resolve to a valid IP address.
Usage Examples
The following example sets the registrar server to as1.adtran.com with a UDP port of 9060: (config)#voice trunk t01 type sip (config-t01)#registrar secondary as1.adtran.com udp 9060
60000CRG0-35B
3161
registrar threshold
Use the registrar threshold command to configure when the Session Initiation Protocol (SIP) trunk registration will be renewed. Use the no form of this command to return to the default value. Variations of this command include:
registrar threshold absolute <value> registrar threshold percentage <percent>
Syntax Description
absolute <value> percentage <percent> Configures an absolute threshold time. This is the time in seconds between registrations. Valid range is 30 to 604800 seconds (1 week). Configures the threshold time as a percentage of the returned valid registration time. Valid range is 1 to 90 percent.
Default Values
By default, the registrar threshold is set at absolute 300 seconds.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example sets the registrar threshold time at 50 percent of the returned valid registration time: (config)#voice trunk t01 type sip (config-t01)#registrar threshold percentage 50
60000CRG0-35B
3162
reject-external
Use the reject-external command to prevent inbound calls on the trunk from being routed back out of the same trunk. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Functional Notes
In general, trunks are assigned to the user role, which means they terminate lines from a Telco provider. If this is the case, reject-external should be enabled so that inbound calls on the trunk cannot be routed back out of the same trunk. If the configuration is poor, inbound long distance calls could be routed back out of the same trunk, causing the owner of the unit to be charged for long distance calls without his knowledge. For network-role trunks and SIP-based trunks, this command should be disabled to allow calls to be properly routed in the unit.
Usage Examples
The following example activates reject-external: (config)#voice trunk t01 type sip (config-t01)#reject-external
60000CRG0-35B
3163
sip-keep-alive
Use the sip-keep-alive command to configure the type of keep-alive method for this Session Initiation Protocol (SIP) trunk. Keep-alive messages must be sent between SIP device and the registrar to keep the connected channel open for communication. Use the no form of this command to return to the default setting. Variations of this command include the following:
sip-keep-alive info sip-keep-alive info <value> sip-keep-alive options sip-keep-alive options <value>
Syntax Description
info options <value> Specifies the INFO method to be used for the keep-alives on the trunk. Specifies the OPTIONS method to be used for the keep-alives on the trunk. Optional. Specifies the amount of time in seconds between the type of SIP keep-alive messages being sent during a call. Range is 30 to 3600 seconds.
Default Values
By default, this command is not configured.
Command History
Release 13.1 Release A2.04 Command was introduced Command was added to the Voice Line and Voice User command sets.
Usage Examples
The following example sets the keep-alive method to info: (config)#voice trunk t01 type sip (config-t01)#sip-keep-alive info
60000CRG0-35B
3164
Syntax Description
<value> Specifies the fully qualified domain name (FQDN) or IP address of the SIP proxy server. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the port number. Range is 0 to 65535. Optional. Sets the Transmission Control Protocol (TCP) port of the outbound proxy server. Optional. Sets the User Datagram Protocol (UDP) port of the outbound proxy server.
Default Values
By default, the IP address is set to 0.0.0.0 and the UDP port is set to 5060.
Command History
Release 9.3 Release 15.1 Command was introduced. Command was expanded.
Usage Examples
The following example sets the SIP proxy server to as1.adtran.com with a UDP port of 9060: (config)#voice trunk t01 type sip (config-t01)#sip-server primary as1.adtran.com udp 9060
60000CRG0-35B
3165
sip-server rollover
Use the sip-server rollover command to configure the rollover behavior of the Session Initiation Protocol (SIP) server. Use the no form of this command to return to the default setting. Variations of this command include:
sip-server rollover service-unavailable-or-timeout sip-server rollover timeout-only
Syntax Description
service-unavailable-or-timeout timeout-only Specifies the rollover to the next SIP server to occur after receiving a 503 Service Unavailable message or no response. Specifies the rollover to the next SIP server to occur only after no response is received.
Default Values
By default, the sip-server rollover is set to timeout-only.
Command History
Release A2.03 Command was introduced.
Usage Examples
The following example sets the SIP server rollover to timeout-only: (config)#voice trunk t01 type sip (config-t01)#sip-server rollover timeout-only
60000CRG0-35B
3166
Syntax Description
<value> Specifies the fully qualified domain name (FQDN) or IP address of the SIP proxy server. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Optional. Specifies the port number. Range is 0 to 65535. Optional. Sets the Transmission Control Protocol (TCP) port of the outbound proxy server. Optional. Sets the User Datagram Protocol (UDP) port of the outbound proxy server.
Default Values
By default, the IP address is set to 0.0.0.0 and the UDP port is set to 5060.
Command History
Release 9.3 Release 15.1 Command was introduced. Command was expanded.
Usage Examples
The following example sets the SIP proxy server to as1.adtran.com with a UDP port of 9070: (config)#voice trunk t01 type sip (config-t01)#sip-server secondary as1.adtran.com udp 9070
60000CRG0-35B
3167
transfer-mode
Use the transfer-mode command to specify the behavior of the Session Initiation Protocol (SIP) trunk when configured in a network with a Netvanta Unified Communications product. This feature determines whether transferred calls will be controlled by the unit locally, or by the network. Use the no form of this command to return to the default setting. Variations of this command include:
transfer-mode local transfer-mode network
Syntax Description
local network Specifies that call transferring is controlled locally by the unit. Specifies that call transferring is controlled by the network.
Default Values
By default, the network controls call transfers.
Command History
Release A4.05 Command was introduced for the NetVanta 7000 Series products.
Functional Notes
When this command is issued on a specific SIP trunk, it overrides the voice transfer-mode configuration (if previously set in the Global Configuration mode) but only applies the new configuration setting to the SIP trunk on which it was issued. Refer to voice transfer-mode on page 1324 for more information on using the Global command.
Usage Examples
The following example configures the network to handle call transfers: (config)#voice trunk t01 type sip (config-t01)#transfer-mode network
60000CRG0-35B
3168
trust-domain
Use the trust-domain command to add security measures for users identity and privacy by connecting the trunk to a trusted domain. Using the trusted domain adds another level of privacy from participating service providers. The system supports RFC 3323 and RFC 3325. Use the no form of this command to return to the default setting. Variations of this command include the following:
trust-domain trust-domain p-asserted-identity-required
Syntax Description
p-asserted-identity-required Requires the use of P-Asserted-Identity SIP privacy for this trusted domain.
Default Values
By default, the trust-domain is disabled.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example enables the trust-domain: (config)#voice trunk t01 type sip (config-t01)#trust-domain
60000CRG0-35B
3169
vm-diversion
Use the vm-diversion command to apply a Session Initiation Protocol (SIP) Diversion header to calls forwarded to the external voice mail server. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, this feature is disabled.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example enables vm-diversion: (config)#voice trunk t01 type sip (config-t01)#vm-diversion
60000CRG0-35B
3170
To create a T1 RBS trunk account using FGD and enter the Trunk Account Configuration mode, enter the following command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#voice trunk t01 type t1-rbs supervision fgd role user (config-t01)#
60000CRG0-35B
3171
To create a T1 RBS trunk account using GS and enter the Trunk Account Configuration mode, enter the following command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#voice trunk t01 type t1-rbs supervision ground-start role user (config-t01)#
To create a T1 RBS trunk using LS and enter the Trunk Account Configuration mode, enter the following command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#voice trunk t01 type t1-rbs supervision loop-start role user (config-t01)#
To create a T1 RBS trunk account using wink and enter the Trunk Account Configuration mode, enter the following command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#voice trunk t01 type t1-rbs supervision wink role [network | user] (config-t01)#
To create a T1 RBS trunk using immediate supervision and enter the Trunk Account Configuration mode, enter the following command at the Global Configuration mode prompt. For example:
>enable #configure terminal (config)#voice trunk t01 type t1-rbs supervision immediate role [network | user] (config-t01)#
Not all T1 Trunk commands apply to all T1 trunk types. Use the ? command to display a list of valid commands.
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 exit on page 71 interface on page 72
60000CRG0-35B
3172
All other commands for this command set are described in this section in alphabetical order. alc on page 3175 blind-dial on page 3176 busy all on page 3177 busy t1 <slot/port> tdm-group <number> on page 3178 caller-id on page 3179 caller-id-override on page 3180 codec-group <name> on page 3181 connect t1 <slot/port> tdm-group <number> on page 3182 dialtone on page 3183 did digits-transferred on page 3184 dnis-digits <value> prefix <number> on page 3185 early-cut-through on page 3186 echo-cancellation on page 3187 match ani <template> substitute <template> on page 3188 match dnis <template> replace ani <number> on page 3190 match dnis <template> substitute <template> on page 3192 modem-passthrough on page 3194 nls on page 3195 plc on page 3196 prefer trunk-routing on page 3197 reject-external on page 3198 resource-selection on page 3199 rtp delay-mode on page 3200 rtp dtmf-relay on page 3201 rtp frame-packetization <value> on page 3202 rtp packet-delay on page 3203 rtp qos dscp <value> on page 3204 rtp rx-gain <value> on page 3205 rtp rx-gain <value> on page 3205 treat-inbound-as-internal on page 3207 trunk-number <number> on page 3208 t38 on page 3210 t38 error-correction on page 3211 t38 fallback-mode g711 on page 3212 t38 max-buffer <value> on page 3213 t38 max-datagram <value> on page 3214 t38 max-rate on page 3215
60000CRG0-35B
3173
t38 redundancy on page 3216 tx-ani on page 3217 vad on page 3218
60000CRG0-35B
3174
alc
Use the alc command to enable automatic level control (ALC). ALC reduces Realtime Transport Protocol (RTP) received signals that are out of specification to the predefined levels. It is not necessary to enable ALC on those networks that guarantee signal levels to be within specification. Use the no form of this command to disable this feature. Variations of this command include:
alc alc level -16 alc level -17 alc level -18 alc level -19 alc level -20 alc level -21 alc level -22
Syntax Description
level -16 level -17 level -18 level -19 level -20 level -21 level -22 Optional. Specifies the ALC attenuation level is -16 dBm0. Optional. Specifies the ALC attenuation level is -17 dBm0. Optional. Specifies the ALC attenuation level is -18 dBm0. Optional. Specifies the ALC attenuation level is -19 dBm0. Optional. Specifies the ALC attenuation level is -20 dBm0. Optional. Specifies the ALC attenuation level is -21 dBm0. Optional. Specifies the ALC attenuation level is -22 dBm0.
Default Values
By default, ALC is disabled.
Command History
Release 14.1 Release 15.1 Release A2 Release A2.04 Command was introduced. Command was added to the Voice Line Interface. Command was added to the Media Gateway Control Protocol (MGCP) endpoint configuration. Command was expanded to include the level parameters.
Usage Examples
The following example activates the ALC on trunk T01: (config)#voice trunk t01 type t1-rbs supervision loop-start role user (config-t01)#alc
60000CRG0-35B
3175
blind-dial
Use the blind-dial command to allow calls to be placed without the presence of dial tone. Use the no form of this command to disable blind dialing. Syntax Description
No subcommands.
Default Values
By default, blind-dial is disabled.
Command History
Release 9.1 Command was introduced.
Usage Examples
The following example enables blind dialing: (config)#voice trunk t01 type t1-rbs supervision loop-start role user (config-t01)#blind-dial
60000CRG0-35B
3176
busy all
Use the busy all command to set all level zero digital signals (DS0s) to busy so that no calls are allowed inbound or outbound. If any calls are active at the time this command is issued, the calls will stay active until either party terminates the call. Once terminated, the DS0s are busied out. Use the no form of this command to disable this feature. Variations of this command include:
busy all busy all now
Syntax Description
now Optional. Immediately terminates calls that are active at the time the command is issued.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example sets all DS0s on trunk T01 to busy and terminates calls that are active at the time the command is issued: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#busy all now
60000CRG0-35B
3177
Syntax Description
<slot/port> <number> now Specifies the slot/port for the T1. Specifies the TDM group ID number. Optional. Terminates calls that are active at the time the command is issued (for example, in the middle of a conversation).
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example sets DS0s in TDM group 2 to busy and terminates calls that are active when the command is issued: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#busy t1 0/1 tdm-group 2 now
60000CRG0-35B
3178
caller-id
Use the caller-id number command to interpret and pass caller identification (ID) on this trunk. This information usually displays the name, number, time, and date of the calling party. Use the no form of this command to cancel the setting. Syntax Description
No subcommands.
Default Values
By default, caller ID is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example enables caller ID: (config)#voice trunk t01 type t1-rbs supervision fgd role user (config-t01)#caller-id
60000CRG0-35B
3179
caller-id-override
Use the caller-id-override command to replace the calling party information for this trunk with a specific number. This command is used to conceal a users name and number or to display a different name and number for internal or external caller ID. Use the no form of this command to cancel the setting. Variations of this command include:
caller-id-override emergency-outbound <number> caller-id-override emergency-outbound match-substitute caller-id-override number-inbound <number> caller-id-override number-inbound <number> if-no-cpn caller-id-override number-inbound <number> <trunk id>
Syntax Description
<number> <trunk id> emergency-outbound match-substitute number-inbound if-no-cpn Specifies the number to display on caller ID. Optional. Specifies the trunk ID (Txx) for outbound calls. Specifies the calling party number on outbound emergency calls. Specifies the configured automatic number identification (ANI) match substitution for outbound emergency calls. Specifies the calling party number on inbound calls. Optional. Specifies caller ID override only if calling party number is not available in the automatic number identification (ANI).
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Release 15.1 Release 16.1 Release A4.01 Command was introduced. Command was expanded. Command was expanded to include the if-no-cpn subcommand. Command was expanded to include the match-substitute subcommand.
Usage Examples
The following example sets the caller ID override number on the trunk where the command is issued: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#caller-id-override number-inbound 555-8000
60000CRG0-35B
3180
codec-group <name>
Use the codec-group command to specify the coder-decoder (CODEC) list to be used by this account. Use the no form of this command to remove the CODEC list from the account. Syntax Description
<name> Specifies the CODEC list to be used for this account.
Default Values
By default, no CODEC lists are assigned.
Command History
Release 9.3 Release 11.1 Release 15.1 Release A1 Release A2 Command was introduced. Command was expanded to include the integrated services digital network (ISDN) trunk. Command was added to the Voice Line Configuration command set. Command was included in the Voice Loopback Account Configuration command set. Command was added to the Media Gateway Control Protocol (MGCP) Configuration command set.
Functional Notes
The codec-group command applies a previously configured CODEC list to an interface, voice trunk, or voice account. These lists are lists of CODECs used by the interface, trunk, or account in call negotiation, and are arranged in preferred order with the first listed CODEC being the most preferred. CODEC lists are created using the codec command from the Voice CODEC List Configuration mode prompt. For more information about creating CODEC lists, refer to the Voice CODEC List Command Set on page 3359.
Usage Examples
The following example applies the CODEC list List1 to the trunk: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#codec-group List1
60000CRG0-35B
3181
Default Values
By default, no physical interface is assigned.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example specifies that this trunk will use the level zero digital signals (DS0s) in TDM group 3 (on T1 interface 0/1): (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#connect t1 0/1 tdm-group 3
60000CRG0-35B
3182
dialtone
Use the dialtone command to enable dial tone generation. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, the dial tone is enabled.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example disables dial tone on trunk T01: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#no dialtone
60000CRG0-35B
3183
did digits-transferred
Use the did digits-transferred command to define how many of the received digits should be sent to the internal switchboard from an incoming call on a user role trunk. The number of digits transferred are the least significant digits received. Direct inward dialing (DID) should be used if a Telco provider is providing digits to the unit on inbound calls or if the unit needs to provide DID information to a piece of customer premises equipment (CPE). Use the no form of this command to disable this feature. Variations of this command include:
did digits-transferred <value> did digits-transferred <value> prefix <number>
Syntax Description
<value> prefix <number> Specifies the number of digits to be transferred. Range is 1 to 16 digits. Optional. Specifies a sequence of digits to be prepended to the digits that will be transmitted. For example, if seven digits will be transferred via DID, then prefix the seven digits with 256. Thus, 555-8000 would be prefixed with 256, transmitting out the string of digits 256-555-8000.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Command was introduced.
Functional Notes
User Role Example: 555-1000 is an incoming call on the trunk. With did digits-transferred <value> set to 4, the number 1000 will be sent to the switchboard. On a network role trunk, the did digits-transferred command allows you to define how many of the digits from the Accept criteria should be sent externally from a call that was routed by the switchboard. The number of digits transferred are the least significant digits received. Network Role Example: 555-1000 is accepted on the universal time (UT) interface. With did digits-transferred <value> set to 4, the number of 1000 will be sent to the device connected to the UT interface. This command cannot be specified if and when trunk-number is being used. Conversely, if DID is used, trunk-number will not be allowed.
Usage Examples
The following example transfers the digits 555-8000 and adds the prefix 256: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#did digits-transferred 5558000 prefix 256
60000CRG0-35B
3184
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example sets the number of transferred dialed number identification service (DNIS) digits to 4 on trunk T01 and sets the prefix 555: (config)#voice trunk t01 type t1-rbs supervision fgd role user (config-t01)#dnis-digits 4 prefix 555
60000CRG0-35B
3185
early-cut-through
Use the early-cut-through command to provide the caller with inband ringback and other call progress signals. This command should not be issued if the connected equipment does not provide inband ringback and other call progress signals. This option is only valid for voice trunks in the network role. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, early-cut-through is disabled.
Command History
Release A1 Command was introduced.
Usage Examples
The following example activates early-cut-through: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#early-cut-through
60000CRG0-35B
3186
echo-cancellation
Use the echo-cancellation command to improve voice quality for packetized-based voice calls, such as Voice over Internet Protocol (VoIP) or Media Gateway Control Protocol (MGCP). Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, echo-cancellation is enabled.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example activates echo-cancellation: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#echo-cancellation
60000CRG0-35B
3187
Syntax Description
ani <template> Specifies the ANI information to be substituted. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the ANI information that is substituted for the original ANI information. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Optional. Specifies the name associated with the ANI information. This option is only available on trunks that support ANI name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
substitute <template>
name <name>
Default Values
By default, no ANI substitution is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for ANI templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3188
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match ani command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match ani ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the ANI information from numbers 555-8111 to 555-8115 will be substituted by 555-8110 for outbound calls on the trunk T03: (config)#voice trunk t03 type t1-rbs supervision wink role network (config-t03)#match ani 555-811[125] substitute 555-8110
60000CRG0-35B
3189
Syntax Description
dnis <template> Specifies the DNIS information to be replaced. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the ANI information that replaces the original DNIS information. This information is entered using numerical digits. Enter the number without punctuation. Optional. Specifies the name associated with the ANI information. This option is only available on trunks that support ANI name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
name <name>
Default Values
By default, no DNIS replacement is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for DNIS templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3190
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match dnis command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match dnis ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the DNIS information for dialed numbers on trunk T03 that match 1-256-524-8600 are replaced with 882-6467: (config)#voice trunk t03 type t1-rbs supervision wink role network (config-t03)#match dnis 1-256-524-8600 replace ani 8826467
60000CRG0-35B
3191
Syntax Description
dnis <template> Specifies the DNIS information to be substituted. This information is entered using wildcards and numerical digits.Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the DNIS information that is substituted for the original DNIS information. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Optional. Specifies the name associated with the DNIS information. This option is only available on trunks that support DNIS name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
substitute <template>
name <name>
Default Values
By default, no DNIS substitution is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for DNIS templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3192
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Example: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4)1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match dnis command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match dnis ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the DNIS information for dialed numbers on trunk T03 that match 1-334-NXX-XXXX are substituted with 1-800-557-4500: (config)#voice trunk t03 type t1-rbs supervision wink role network (config-t03)#match dnis 1-334-NXX-XXXX substitute 1-800-557-4500
60000CRG0-35B
3193
modem-passthrough
Use the modem-passthrough command to switch to passthrough mode on fax or modem tone detection. This command allows modem and fax calls to maintain a connection without altering the signals with the voice improvement settings, such as echo cancellation and voice activity detection (VAD). Use the no form of this command to disable this feature. Variations of this command include:
modem-passthrough modem-passthrough detection-time <value>
Syntax Description
detection-time <value> Optional. Specifies the fax and/or modem detection time length value in seconds. Range is 0 to 8 seconds.
Default Values
By default, modem-passthrough is enabled.
Command History
Release 11.1 Release 12.1 Command was introduced. Command was expanded.
Usage Examples
The following example disables modem-passthrough: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#no modem-passthrough
60000CRG0-35B
3194
nls
Use the nls command to enable the non-linear suppression (NLS) option for the user. This option sets the echo canceller to reduce acoustic echo. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 14.1 Release 15.1 Command was introduced. Command was added to the Voice Trunk T1 command set.
Usage Examples
The following example enables NLS on trunk T01: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#nls
60000CRG0-35B
3195
plc
Use the plc command to enable packet loss concealment (PLC). PLC is used to prevent choppy connections by concealing a packet loss by replacing the lost packet with another voice packet in the data stream. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, PLC is enabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example disables PLC on trunk T01: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#no plc
60000CRG0-35B
3196
prefer trunk-routing
Use the prefer trunk-routing command to add a trunk to a list of trunks that are considered first for call routing, regardless of system routing mode or locally configured extensions. Use the no form of this command to remove the trunk from the list. Syntax Description
No subcommands.
Default Values
By default, prefer trunk-routing is disabled.
Command History
Release A2 Command was introduced.
Functional Notes
Trunk routing can be specified as a preference for specific trunks, allowing the trunk to be considered first for routing rather than relying on the internal or external nature of the call to dictate whether the trunk or voice station is the first choice routing path. The prefer trunk-routing command, executed from a specific trunks configuration mode, adds the trunk to a list of trunks that are considered first for routing. By default, no trunk routing preference is set, so that each trunk operates as dictated by normal call routing modes. Adding the trunk routing preference only affects how inbound calls from the specific trunk are handled.
Usage Examples
The following example specifies that trunk routing is preferred on the trunk T01: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#prefer trunk-routing
60000CRG0-35B
3197
reject-external
Use the reject-external command to prevent inbound calls on the trunk from being routed back out of the same trunk. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, reject-external is enabled on this interface.
Command History
Release 9.3 Command was introduced.
Functional Notes
In general, trunks are assigned to the user role, which means they terminate lines from a Telco provider. If this is the case, reject-external should be enabled so that inbound calls on the trunk cannot be routed back out of the same trunk. If the configuration is poor, inbound long distance calls could be routed back out of the same trunk, causing the owner of the unit to be charged for long distance calls without his knowledge. For network-role trunks and Session Initiation Protocol (SIP) based trunks, this command should be disabled to allow calls to be properly routed in the unit.
Usage Examples
The following example disables reject-external: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#no reject-external
60000CRG0-35B
3198
resource-selection
Use the resource-selection command to determine how the switchboard uses outbound call resources contained within a time division multiplexing (TDM) based trunk group. Use the no form of this command to disable this feature. Variations of this command include:
resource-selection circular resource-selection circular ascending resource-selection circular descending resource-selection linear resource-selection linear ascending resource-selection linear descending
Syntax Description
circular Performs call load balancing among available DS0s/B-channels in this trunk. Subsequent calls will be delivered to the next available DS0/B-channel in a round-robin fashion. Specifies that a call being delivered to this trunk will be accepted out the first available DS0/B-channel available at the time the call is received. Optional. Distributes calls in an order from the lowest to the highest channel (DS0 1, 2, 3 through 24). Optional. Distributes calls in an order from the highest to the lowest channel (DS0 24, 23, 22 through 1).
Default Values
By default, resource selection is set to linear.
Command History
Release 9.3 Release 13.1 Command was introduced. Command was expanded to include the ascending and descending subcommands.
Usage Examples
The following example specifies circular resource selection: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#resource-selection circular
60000CRG0-35B
3199
rtp delay-mode
Use the rtp delay-mode command to configure the Realtime Transport Protocol (RTP) jitter buffer packet delay mode settings. RTP is used to prevent static on voice connections by enhancing the quality of the packet delivery. Use the no form of this command to return to the default setting. Variations of this command include:
rtp delay-mode adaptive rtp delay-mode fixed
Syntax Description
adaptive fixed Configures the RTP jitter buffer packet delay to adjust during a call based on network conditions. Configures the RTP jitter buffer packet delay to remain constant.
Default Values
By default, the RTP delay mode is set to adaptive.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures RTP delay mode as fixed: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#rtp delay-mode fixed
60000CRG0-35B
3200
rtp dtmf-relay
Use the rtp dtmf-relay command to configure the method by which Realtime Transport Protocol (RTP) dual tone multi-frequency (DTMF) events are relayed. The dial digits can be sent inband or out-of-band (OOB) of the voice stream. Use the no form of this command to return to the default value. Variations of this command include:
rtp dtmf-relay inband rtp dtmf-relay nte <value>
Syntax Description
inband nte <value> Specifies that RTP DTMF events be relayed inband in the RTP stream. Specifies that RTP DTMF events be relayed OOB using named telephone event (NTE). Enter an NTE value between 96 and 127.
Default Values
By default, the rtp dtmf-relay is set for NTE 101.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example configures RTP DTMF relay events for inband: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#rtp dtmf-relay inband
60000CRG0-35B
3201
Default Values
By default, the rtp frame-packetization time is set to 20 milliseconds on all trunks and users.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example sets the frame packetization time for trunk T01 to 10 milliseconds: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#rtp frame-packetization 10
60000CRG0-35B
3202
rtp packet-delay
Use the rtp packet-delay command to configure the maximum Realtime Transport Protocol (RTP) packet delays. This command is used to set the allowable limits of latency on the network. Use the no form of this command to return to the default value. Variations of this command include:
rtp packet-delay fax <value> rtp packet-delay maximum <value> rtp packet-delay nominal <value>
Syntax Description
fax <value> maximum <value> nominal <value> Sets the fax delay time value. Range is 0 to 500 milliseconds. Sets the maximum delay time value in increments of 10 milliseconds. Range is 40 to 320 milliseconds. Sets the nominal delay time value in increments of 10 milliseconds. Range is 10 to 240 milliseconds.
Default Values
By default, the RTP packet delay for fax is 300, maximum is 100, and nominal is 50.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures the RTP fax delay time on trunk T01 to 200 milliseconds: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#rtp packet-delay fax 200
60000CRG0-35B
3203
Default Values
By default, no RTP QoS DSCP is configured for this interface.
Command History
Release 9.3 Command was introduced.
Functional Notes
By setting the rtp qos dscp value on an individual trunk or user, you will override the global rtp qos dscp setting for RTP packets. QoS is set using a DSCP value. Valid DSCP values are 10 to 63, and a higher DSCP value has a higher priority. The default DSCP value for RTP is 46. Remember that if you are using a public IP connection, such as the Internet, for Voice over Internet Protocol (VoIP), end-to-end QoS may not be guaranteed. The default DSCP value for Session Initiation Protocol (SIP) is 26. To configure QoS for the RTP traffic that carries the voice conversation, use the command ip rtp qos dscp followed by the desired DSCP value.
Usage Examples
The following example configures the RTP QoS DSCP for trunk T01 to 60: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#rtp qos dscp 60
60000CRG0-35B
3204
Default Values
By default, RTP RX gain is set to 0 dB.
Command History
Release A2.04 Command was introduced.
Command History
Release A2.04 Command was introduced.
Usage Examples
The following example specifies the RTP RX gain for trunk T01 is 4 dB: (config)#voice trunk t03 type t1-rbs supervision fgd role user (config-t01)#rtp rx-gain 4
60000CRG0-35B
3205
Default Values
By default, RTP TX gain is set to 0 dB.
Command History
Release A2.04 Command was introduced.
Usage Examples
The following example specifies the RTP TX gain for trunk T01 is 4 dB: (config)#voice trunk t03 type t1-rbs supervision fgd role user (config-t01)#rtp tx-gain 4
60000CRG0-35B
3206
treat-inbound-as-internal
Use the treat-inbound-as-internal command to make incoming trunk calls appear as internal calls. Use the no form of this command to cancel the setting. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example configures the unit to treat inbound calls on trunk T03 as internal calls: (config)#voice trunk t03 type t1-rbs supervision fgd role user (config-t03)#treat-inbound-as-internal
60000CRG0-35B
3207
trunk-number <number>
Use the trunk-number command to define the call routing when direct inward dialing (DID) is disabled. This feature directs incoming calls to the specified number when DID is not present. This command also allows users to activate different system modes of operation that redirect incoming calls to a different number depending on the specified mode. Use the no form of this command to disable this feature. Variations of this command include:
trunk-number <number> trunk-number custom1 <number> trunk-number custom1 no-number trunk-number custom2 <number> trunk-number custom2 no-number trunk-number custom3 <number> trunk-number custom3 no-number trunk-number lunch <number> trunk-number lunch no-number trunk-number night <number> trunk-number night no-number trunk-number no-number trunk-number override <number> trunk-number override no-number trunk-number weekend <number> trunk-number weekend no-number
Syntax Description
<number> custom1 - custom3 lunch night no-number override weekend Specifies the number used for call routing when DID is disabled. Specifies the custom mode to use. Specifies the lunch-time mode. Specifies the night-time mode. Specifies no inbound calls are allowed on this trunk. Specifies the override mode. Specifies the weekend mode.
Default Values
No default values are necessary for this command.
Command History
Release 11.1 Release 15.1 Release 16.1 Command was introduced. Command was added to the feature group D (FGD) trunk options. Command was expanded to include the new subcommands.
60000CRG0-35B
3208
Usage Examples
The following example defines call routing on trunk T03: (config)#voice trunk t03 type t1-rbs supervision fgd role user (config-t03)#trunk-number 4000
60000CRG0-35B
3209
t38
Use the t38 command to enable T.38 fax operation. Use the no form of this command to disable this feature. The modem-passthrough command must be enabled for T.38 operation to work. Refer to modem-passthrough on page 3194.
Syntax Description
No subcommands.
Default Values
By default, T.38 is disabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables T.38 for trunk T03: (config)#voice trunk t03 type t1-rbs supervision fgd role user (config-t03)#t38
Technology Review
T.38 is an International Telecommunication Union (ITU) specification that allows Group-3 Fax (T.30) data to be transported over the Internet. It is similar to dual tone multi-frequency (DTMF) relay (RFC 2833) in that the digital signal processor (DSP) decodes tones and demodulated fax data and converts them into packets. A similar device on the other end takes the packets/tones and remodulates them so that an analog fax machine on the other end can receive the fax. AOSs previous support (revisions 12 through 15) for fax/modem signals was simply detecting a tone and forcing the coder-decoder (CODEC) into G.711 and disabling/enabling echo cancellers based on the tones detected. When packet loss becomes high, sending faxes over G.711 becomes problematic, due to dropped messages and timeouts/retrains. T.38 can be used in conjunction with various call-control schemes, such as H.323, Session Initiation Protocol (SIP), and Media Gateway Control Protocol (MGCP). AOS only supports SIP as the call-control method. This is typically referred to T.38/Annex-D. Annex-D describes the Session Initiation Protocol/Session Description Protocol (SIP/SDP) call establishment procedures.
60000CRG0-35B
3210
t38 error-correction
Use the t38 error-correction command to specify the type of fax error correction. Use the no form of this command to disable this feature. Variations of this command include:
t38 error-correction fec t38 error-correction redundancy
Syntax Description
fec Specifies forward error correction (FEC) as the fax error correction. FEC is a system of error control where the sender adds redundant data to its messages, allowing the receiver to detect and correct errors (within certain bounds) without the need to request additional data from the sender. Specifies redundancy as the fax error correction. Redundancy error correction replicates the payload a user-specified number of times to determine if errors are present. The number of redundant packets is set using the command t38 redundancy on page 3216.
redundancy
Default Values
By default, t38 error-correction is set to redundancy.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 error-correction to fec for user trunk T03: (config)#voice trunk t03 type t1-rbs supervision fgd role user (config-t03)#t38 error-correction fec
60000CRG0-35B
3211
Default Values
By default, t38 fallback-mode is disabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables the t38 fallback-mode for trunk T01: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#t38 fallback-mode g711
60000CRG0-35B
3212
Default Values
By default, the maximum buffer size is set to 200.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 max-buffer to 100 for trunk T01: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#t38 max-buffer 100
60000CRG0-35B
3213
Default Values
By default, the maximum datagram value is set to 75.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 max-datagram to 100 for trunk T01: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#t38 max-datagram 100
60000CRG0-35B
3214
t38 max-rate
Use the t38 max-rate command to specify the fax maximum rate. The actual transmission rate may be lower than specified rate if the receiving end cannot support the maximum rate. Use the no form of this command to return to the default value. Variations of this command include:
t38 max-rate 14400 t38 max-rate 12000 t38 max-rate 2400 t38 max-rate 4800 t38 max-rate 7200 t38 max-rate 9600
Syntax Description
14400 12000 2400 4800 7200 9600 Specifies 14400 baud/bits as fax maximum rate. Specifies 12000 baud/bits as fax maximum rate. Specifies 2400 baud/bits as fax maximum rate. Specifies 4800 baud/bits as fax maximum rate. Specifies 7200 baud/bits as fax maximum rate. Specifies 9600 baud/bits as fax maximum rate.
Default Values
By default, the maximum fax rate is set to 14400.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 max-rate to 4800 for trunk T01: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#t38 max-rate 4800
60000CRG0-35B
3215
t38 redundancy
Use the t38 redundancy command to set the number of redundant packets sent when the t38 error-correction redundancy feature is enabled. Use the no form of this command to return to the default value. Variations of this command include:
t38 redundancy high-speed <value> t38 redundancy low-speed <value>
Syntax Description
high-speed <value> Specifies the number of redundant T.38 fax packets to be sent for data messages (high-speed fax machine image data). Range is 0 (no redundancy) to 4 packets. Specifies the number of redundant T.38 fax packets to be sent for the signaling messages (low-speed fax machine protocol). Range is 0 (no redundancy) to 7 packets.
low-speed <value>
Default Values
By default, high-speed and low-speed redundancy values are set to 0 (no redundancy).
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables t38 error-correction redundancy and sets the number of redundant data messages to 3 for trunk T01: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#t38 error-correction redundancy (config-t01)#t38 redundancy high-speed 3
60000CRG0-35B
3216
tx-ani
Use the tx-ani command to transmit automatic number identification (ANI) (calling-party number) and dialed number identification service (DNIS) (called-party number) for outbound feature group D (FGD) calls. This command is only valid on a trunk configured for FGD supervision. Use the no form of this command to cancel the setting. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 15.1 Command was introduced. Command was added to the FGD command set.
Usage Examples
The following example configures the system to transmit ANI/DNIS information on the outbound FGD trunk: (config)#voice trunk t03 type t1-rbs supervision fgd role user (config-t03)#tx-ani
60000CRG0-35B
3217
vad
Use the vad command to enable voice activity detection (VAD). VAD blocks out noise categorized as silence during a voice connection. The silent voice packets are not transmitted, allowing bandwidth usage to be reduced. Although VAD saves bandwidth, the quality of the voice call may be compromised. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, VAD is enabled for all T1 robbed-bit signaling (RBS) trunks and users.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example disables VAD on trunk T01: (config)#voice trunk t01 type t1-rbs supervision wink role network (config-t01)#no vad
60000CRG0-35B
3218
60000CRG0-35B
3219
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: description <text> on page 68 do on page 69 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. accept <pattern> on page 3222 alc on page 3223 codec-group <name> on page 3224 coverage on page 3225 echo-cancellation on page 3227 nls on page 3228 num-rings <value> on page 3229 password <password> on page 3230 plc on page 3231 reject <pattern> on page 3232 rtp delay-mode on page 3234 rtp dtmf-relay on page 3235 rtp frame-packetization <value> on page 3236 rtp packet-delay on page 3237
60000CRG0-35B
3220
rtp qos dscp <value> on page 3238 seize-timeout <seconds> on page 3239 sip-keep-alive on page 3240 trunk <Txx> on page 3241 vad on page 3242
60000CRG0-35B
3221
accept <pattern>
Use the accept command to specify numbers that users can dial. This command controls the type of outbound calls users can place. Use the no form of this command to remove a configured dial pattern and return to the default setting. Syntax Description
<pattern> Specifies the patterns users can dial. You can enter a complete phone number or wildcards can be used to help define accepted numbers. Refer to Functional Notes below for more information on using wildcards.
Default Values
By default, the cost value is zero.
Command History
Release 9.3 Release 15.1 Command was introduced. Command was added to the Voice Line Interface.
Functional Notes
The available wildcards for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
The special characters ( ), -, + are always ignored. Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) 1-800$ matches any 1-800 calls. 4) Nxx-xxxx matches 7 digit local. 5) 1-Nxx-Nxx-xxxx matches long distance calls in North America.
Usage Examples
The following example allows users on the line sales to dial any local number: (config)#voice line sales (config-sales)#accept Nxxxxxx
60000CRG0-35B
3222
alc
Use the alc command to enable auto level control (ALC). ALC reduces Realtime Transport Protocol (RTP) received signals that are out of specification to the predefined levels. It is not necessary to enable ALC on those networks that guarantee signal levels to be within specification. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 14.1 Release 15.1 Command was introduced. Command was added to the Voice Line Interface.
Usage Examples
The following example activates the ALC for line sales: (config)#voice line sales (config-sales)#alc
60000CRG0-35B
3223
codec-group <name>
Use the codec-group command to specify the coder-decoder (CODEC) list to be used by this account. Use the no form of this command to remove the CODEC list from the account. Syntax Description
<name> Specifies the CODEC list to be used for this account.
Default Values
By default, no CODEC lists are assigned.
Command History
Release 9.3 Release 11.1 Release 15.1 Release A1 Release A2 Command was introduced. Command was expanded to include the integrated services digital network (ISDN) trunk. Command was added to the Voice Line Configuration command set. Command was included in the Voice Loopback Account Configuration command set. Command was added to the Media Gateway Control Protocol (MGCP) Configuration command set.
Functional Notes
The codec-group command applies a previously configured CODEC list to an interface, voice trunk, or voice account. These lists are lists of CODECs used by the interface, trunk, or account in call negotiation, and are arranged in preferred order with the first listed CODEC being the most preferred. CODEC lists are created using the codec command from the Voice CODEC List Configuration mode prompt. For more information about creating CODEC lists, refer to the Voice CODEC List Command Set on page 3359.
Usage Examples
The following example applies the CODEC list List1 to the voice line sales: (config)#voice line sales (config-sales)#codec-group List1
60000CRG0-35B
3224
coverage
Use the coverage command to configure call coverage parameters for the line. The call coverage setting determines how a call is handled if the party dialed does not answer after a specified number of rings. Use the no form of this command to remove an individual coverage parameter. Variations of this command include:
coverage aa coverage aa <number> coverage internal <number> num-rings <value> coverage operator coverage operator num-rings <value> coverage override <value> coverage vm coverage vm <number> coverage <system mode> aa coverage <system mode> aa <number> coverage <system mode> external <number> coverage <system mode> internal <number> coverage <system mode> internal <number> num-rings <value> coverage <system mode> operator coverage <system mode> operator num-rings <value> coverage <system mode> vm coverage <system mode> vm <number>
Syntax Description
<system mode> Optional. Specifies the system mode to configure for call coverage. Choose from custom1, custom2, custom3, lunch, night, or weekend. Refer to the Functional Notes of this command for more information on configuring system modes. Forwards the call to the default auto attendant. Forwards the call to a specific extension programmed for the auto attendant. If no extension is specified, the phone is forwarded to the default auto attendant. Forwards the call to the specified external number. If no number is entered, the default auto answer is used. Forwards the call to the specified internal number. Optional. Specifies the number of rings for the call before performing the next action. Valid range is 1 to 9. Forwards the call to the operator. Ignores the programmed system mode schedule. Forwards the call to voicemail. Optional. Forwards the call to the specified mailbox number.
aa aa <number>
external <number> internal <number> num-rings <value> operator override <value> vm vm <number>
60000CRG0-35B
3225
Default Values
By default, no call coverage is specified.
Command History
Release 9.3 Release 11.1 Release 12.1 Release A1 Command was introduced. Command was updated to include the voicemail and number of rings options. Command was updated to include the auto attendant, global, and operator options. Command was updated to include the system mode feature options.
Functional Notes
System mode call coverage provides more diverse functionality for call handling. In previous versions of AOS (revision 15.1 or earlier), up to five coverage modes were allowed. Calls were processed in the order in which the coverage options were entered into the system. With the addition of the system mode options, up to five coverage options per system mode are allowed. The system modes can be modified using the command voice system-mode on page 1320.
Usage Examples
The following example specifies that the line be forwarded after 3 rings to the internal extension 8500 when in the night system mode: (config)#voice line sales (config-sales)#coverage night internal 8500 num-rings 3
60000CRG0-35B
3226
echo-cancellation
Use the echo-cancellation command to improve voice quality for packetized-based voice calls, such as Voice over Internet Protocol (VoIP) or Media Gateway Control Protocol (MGCP). Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, echo-cancellation is enabled.
Command History
Release 9.3 Release 15.1 Command was introduced. Command was added to the Voice Line Interface.
Usage Examples
The following example activates echo-cancellation for voice line sales: (config)#voice line sales (config-sales)#echo-cancellation
60000CRG0-35B
3227
nls
Use the nls command to enable the non-linear suppression (NLS) option for the line. This option sets the echo canceller to reduce acoustic echo. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 14.1 Release 15.1 Command was introduced. Command was added to the Voice Line Interface.
Usage Examples
The following example enables NLS for voice line sales: (config)#voice line sales (config-sales)#nls
60000CRG0-35B
3228
num-rings <value>
Use the num-rings command to specify the number of rings for call pickup before the system redirects the call. Each system mode call coverage action can be configured with a different number of rings based on preference. Use the no form of this command to return to the default setting. Variations of this command include:
num-rings <value> num-rings <system mode> <value> num-rings override <value>
Syntax Description
<system mode> Optional. Specifies the system mode to configure for call coverage. Choose from custom1, custom2, custom3, lunch, night, or weekend. Refer to the Functional Notes of this command for more information on configuring system modes. Ignores the programmed system mode schedule. Specifies the number of rings before the next action. The valid range is 1 to 9.
override <value>
Default Values
By default, num-rings is set to 4.
Command History
Release 9.3 Release A1 Command was introduced. Command was updated to include the system mode feature options.
Functional Notes
System mode call coverage provides more diverse functionality for call handling. In previous versions of AOS (revision 15.1 or earlier), up to five coverage modes were allowed. Calls were processed in the order in which the coverage options were entered into the system. With the addition of the system mode options, up to five coverage options per system mode are allowed. The system modes can be modified using the command voice system-mode on page 1320.
Usage Examples
The following example sets the number of rings for voice line sales to 6: (config)#voice line sales (config-sales)#num-rings 6
60000CRG0-35B
3229
password <password>
Use the password command to create a password or personal identification number (PIN) to protect voice settings and messages. Use the no form of this command to remove a password. The password configured must be used when configuring the IP phone using the IP Phone Configs Web-based graphical user interface (GUI) menu.
Syntax Description
<password> Specifies a 4-digit password or PIN.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release 15.1 Command was introduced. Command was added to the Voice Line Interface.
Usage Examples
The following example sets the password for voice line sales to 4321: (config)#voice line sales (config-sales)#password 4321
60000CRG0-35B
3230
plc
Use the plc command to enable packet loss concealment (PLC). PLC is used to prevent choppy connections by concealing a packet loss by replacing the lost packet with another voice packet in the data stream. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, PLC is enabled.
Command History
Release 11.1 Release 15.1 Command was introduced. Command was added to the Voice Line Interface.
Usage Examples
The following example disables PLC for the voice line sales: (config)#voice line sales (config-sales)#no plc
60000CRG0-35B
3231
reject <pattern>
Use the reject command to specify numbers users cannot dial on the line. This feature allows administrators to restrict callers from unwanted outbound calls, such as international calls and 900 numbers. Use the no form of this command to disable this feature. Syntax Description
<pattern> Specifies the patterns that users cannot dial on the line. You can enter a complete phone number or wildcards can be used to help define rejected numbers. Refer to Functional Notes below for more information on using wildcards. For example, you can enter 900$ to prevent users from dialing all 900 numbers.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release 15.1 Command was introduced. Command was added to the Voice Line Interface.
Functional Notes
The available wildcards for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
The special characters ( ), -, + are always ignored. Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) 1-800$ matches any 1-800 calls. 4) Nxx-xxxx matches 7 digit local. 5) 1-Nxx-Nxx-xxxx matches long distance calls in North America.
60000CRG0-35B
3232
Usage Examples
The following example blocks calls to any 900 number on the line sales: (config)#voice line sales (config-sales)#reject 1900$
60000CRG0-35B
3233
rtp delay-mode
Use the rtp delay-mode command to configure the Realtime Transport Protocol (RTP) jitter buffer packet delay mode settings. RTP is used to prevent static on voice connections by enhancing the quality of the packet delivery. Use the no form of this command to return to the default setting. Variations of this command include:
rtp delay-mode adaptive rtp delay-mode fixed
Syntax Description
adaptive fixed Configures the RTP jitter buffer packet delay to adjust during a call based on network conditions. Configures the RTP jitter buffer packet delay to remain constant.
Default Values
By default, the RTP delay mode is set to adaptive. This allows for minimal latency by adjusting the average packet delay based on the conditions of the network.
Command History
Release 11.1 Release 15.1 Command was introduced. Command was added to the Voice Line Interface.
Usage Examples
The following example configures RTP delay mode as fixed: (config)#voice line sales (config-sales)#rtp delay-mode fixed
60000CRG0-35B
3234
rtp dtmf-relay
Use the rtp dtmf-relay command to configure the method by which Realtime Transport Protocol (RTP) dual tone multi-frequency (DTMF) events are relayed. The dial digits can be sent inband or out-of-band (OOB) of the voice stream. Use the no form of this command to return to the default value. Variations of this command include:
rtp dtmf-relay inband rtp dtmf-relay nte <value>
Syntax Description
inband nte <value> Specifies that RTP DTMF events be relayed inband in the RTP stream. Specifies that RTP DTMF events be relayed OOB using named telephone events (NTEs). Enter an NTE value between 96 and 127.
Default Values
By default, the rtp dtmf-relay is set for NTE 101.
Command History
Release 9.3 Release 15.1 Command was introduced. Command was added to the Voice Line Interface.
Usage Examples
The following example configures RTP DTMF relay events for inband: (config)#voice line sales (config-sales)#rtp dtmf-relay inband
60000CRG0-35B
3235
Default Values
By default, the rtp frame-packetization time is set to 20 milliseconds on all trunks and users.
Command History
Release 9.3 Release 15.1 Command was introduced. Command was added to the Voice Line Interface.
Usage Examples
The following example sets the frame packetization time for voice line sales to 10 milliseconds: (config)#voice line sales (config-sales)#rtp frame-packetization 10
60000CRG0-35B
3236
rtp packet-delay
Use the rtp packet-delay command to configure the maximum Realtime Transport Protocol (RTP) packet delays. This command is used to set the allowable limits of latency on the network. Use the no form of this command to return to the default value. Variations of this command include:
rtp packet-delay maximum <value> rtp packet-delay nominal <value>
Syntax Description
maximum <value> nominal <value> Sets the maximum delay time value in increments of 10 milliseconds. Range is 40 to 320 milliseconds. Sets the nominal delay time value in increments of 10 milliseconds. Range is 10 to 240 milliseconds.
Default Values
By default, the RTP packet delay for maximum is 100, and for nominal is 50.
Command History
Release 11.1 Release 15.1 Command was introduced. Command was added to the Voice Line Interface.
Usage Examples
The following example configures the RTP maximum delay time on voice line sales to 200 milliseconds: (config)#voice line sales (config-sales)#rtp packet-delay maximum 200
60000CRG0-35B
3237
Default Values
By setting the rtp qos dscp value on an individual trunk or user, you will override the global rtp qos dscp setting for RTP packets.
Command History
Release 9.3 Release 15.1 Command was introduced. Command was added to the Voice Line Interface.
Functional Notes
By setting the rtp qos dscp value on an individual trunk or user, you will override the global rtp qos dscp setting for RTP packets. QoS is set using a DSCP value. Valid DSCP values are 10 to 63, and a higher DSCP value has a higher priority. The default DSCP value for RTP is 46. Remember that if you are using a public IP connection, such as the Internet, for Voice over Internet Protocol (VoIP), end-to-end QoS may not be guaranteed. The default DSCP value for Session Initiation Protocol (SIP) is 26. To configure QoS for the RTP traffic that carries the voice conversation, use the command ip rtp qos dscp followed by the desired DSCP value.
Usage Examples
The following example configures the RTP QoS DSCP for voice line sales to 60: (config)#voice line sales (config-sales)#rtp qos dscp 60
60000CRG0-35B
3238
seize-timeout <seconds>
Use the seize-timeout command to specify the maximum time the trunk will be seized before placing a call. Use the no form of this command to return to the default timeout interval. Syntax Description
<seconds> Specifies maximum number of seconds the trunk will be seized before placing a call. Valid range is 5 to 120 seconds.
Default Values
By default, the seize-timeout period is set to 30 seconds.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example sets the seize-timeout period to 20 seconds: (config)#voice line sales (config-sales)#seize-timeout 20
60000CRG0-35B
3239
sip-keep-alive
Use the sip-keep-alive command to configure the type of keep-alive method for this Session Initiation Protocol (SIP) trunk. Keep-alive messages must be sent between SIP device and the registrar to keep the connected channel open for communication. Use the no form of this command to return to the default setting. Variations of this command include the following:
sip-keep-alive info sip-keep-alive info <value> sip-keep-alive options sip-keep-alive options <value>
Syntax Description
info options <value> Specifies the INFO method to be used for the keep-alives on the trunk. Specifies the OPTIONS method to be used for the keep-alives on the trunk. Optional. Specifies the amount of time in seconds between the type of SIP keep-alive messages being sent during a call. Range is 30 to 3600 seconds.
Default Values
By default, this command is not configured.
Command History
Release 13.1 Release A2.04 Command was introduced Command was added to the Voice Line and Voice User command sets.
Usage Examples
The following example sets the keep-alive method to info: (config)#voice line sales (config-sales)#sip-keep-alive info
60000CRG0-35B
3240
trunk <Txx>
Use the trunk command to specify the trunk the voice line will use. Use the no form of this command to remove a configured trunk group. Syntax Description
<Txx> Specifies an ID number for the trunk. The trunk ID is in the format Txx, where xx is the trunk ID number. Enter a trunk ID between 1 and 99. For example, trunk T02.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release 15.1 Command was introduced. Command was added to the Voice Line Interface.
Usage Examples
The following example adds trunk T02 to the voice line sales: (config)#voice line sales (config-sales)#trunk t02
60000CRG0-35B
3241
vad
Use the vad command to enable voice activity detection (VAD). VAD blocks out noise categorized as silence during a voice connection. The silent voice packets are not transmitted, allowing bandwidth usage to be reduced. Although VAD saves bandwidth, the quality of the voice call may be compromised. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, VAD is enabled for all T1 robbed-bit signaling (RBS) trunks and users.
Command History
Release 9.3 Release 15.1 Command was introduced. Command was added to the Voice Line Interface.
Usage Examples
The following example disables VAD on voice line sales: (config)#voice line sales (config-sales)#no vad
60000CRG0-35B
3242
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 exit on page 71 interface on page 72
60000CRG0-35B
3243
All other commands for this command set are described in this section in alphabetical order. alc on page 3245 appearances <value> on page 3246 caller-id on page 3247 codec-group <name> on page 3248 echo-cancellation on page 3249 media-loopback on page 3250 nls on page 3251 num-rings <value> on page 3252 plc on page 3253 rtp delay-mode on page 3254 rtp dtmf-relay on page 3255 rtp frame-packetization <value> on page 3256 rtp packet-delay on page 3257 rtp qos dscp <value> on page 3258 shutdown on page 3259 sip-identity on page 3260
60000CRG0-35B
3244
alc
Use the alc command to enable auto level control (ALC). ALC reduces Realtime Transport Protocol (RTP) received signals that are out of specification to the predefined levels. It is not necessary to enable ALC on those networks that guarantee signal levels to be within specification. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 14.1 Release A1 Command was introduced. Command was included in the Voice Loopback Account Configuration command set.
Usage Examples
The following example activates ALC for loopback 5555: (config)#voice loopback 5555 (config-LB-5555)#alc
60000CRG0-35B
3245
appearances <value>
Use the appearances command to specify the number of simultaneous loopback calls allowed on the system. The maximum number of calls allowed is five. Use the no form of this command to reset the number of call appearances allowed on this account. Syntax Description
<value> Configures the number of calls. Range is 1 to 5.
Default Values
By default, the call appearances is set to 1.
Command History
Release A1 Command was introduced.
Usage Examples
The following example specifies that 3 simultaneous loopback calls be allowed on the system: (config)#voice loopback 5555 (config-LB-5555)#appearances 3
60000CRG0-35B
3246
caller-id
Use the caller-id command to specify a name or number to display as the caller ID information. Use the no form of this command to return to the default value. Variations of this command include:
caller-id name <name> caller-id number <number>
Syntax Description
name <name> number <number> Specifies the name of the loopback account. Specifies the number of the loopback account.
Default Values
By default, the caller ID will display the extension number used when creating the loopback account. If no name or alternate number is specified, the loopback extension number will be displayed.
Command History
Release A1 Command was introduced.
Usage Examples
The following example sets the caller ID information for the loopback account: (config)#voice loopback 5555 (config-LB-5555)#caller-id name VQMTesting (config-LB-5555)#caller-id number 372-5555
60000CRG0-35B
3247
codec-group <name>
Use the codec-group command to specify the coder-decoder (CODEC) list to be used by this account. Use the no form of this command to remove the CODEC list from the account. Syntax Description
<name> Specifies the CODEC list to be used for this account.
Default Values
By default, no CODEC lists are assigned.
Command History
Release 9.3 Release 11.1 Release 15.1 Release A1 Release A2 Command was introduced. Command was expanded to include the integrated services digital network (ISDN) trunk. Command was added to the Voice Line Configuration command set. Command was included in the Voice Loopback Account Configuration command set. Command was added to the Media Gateway Control Protocol (MGCP) Configuration command set.
Functional Notes
The codec-group command applies a previously configured CODEC list to an interface, voice trunk, or voice account. These lists are lists of CODECs used by the interface, trunk, or account in call negotiation, and are arranged in preferred order with the first listed CODEC being the most preferred. CODEC lists are created using the codec command from the Voice CODEC List Configuration mode prompt. For more information about creating CODEC lists, refer to the Voice CODEC List Command Set on page 3359.
Usage Examples
The following example applies the CODEC list List1 to loopback account 5555: (config)#voice loopback 5555 (config-LB-5555)#codec-group List1
60000CRG0-35B
3248
echo-cancellation
Use the echo-cancellation command to improve voice quality for packetized-based voice calls, such as Voice over Internet Protocol (VoIP) or Media Gateway Control Protocol (MGCP). Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, echo-cancellation is enabled.
Command History
Release 9.3 Release A1 Command was introduced. Command was included in the Voice Loopback Account Configuration command set.
Usage Examples
The following example activates echo-cancellation for loopback 5555: (config)#voice loopback 5555 (config-LB-5555)#echo-cancellation
60000CRG0-35B
3249
media-loopback
Use the media-loopback command to designate a voice loopback account to be used for media loopback. Media loopback enables media sessions to be established where the media is looped back to the transmitter. This is typically referred to as active monitoring of services. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, media-loopback is disabled.
Command History
Release A4.03 Command was introduced.
Usage Examples
The following example configures voice loopback account 5555 to be used for media loopback: (config)#voice loopback 5555 (config-LB-5555)#media-loopback
60000CRG0-35B
3250
nls
Use the nls command to enable the non-linear suppression (NLS) option for the user. This option sets the echo canceller to reduce acoustic echo. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 14.1 Release A1 Command was introduced. Command was included in the Voice Loopback Account Configuration command set.
Usage Examples
The following example enables NLS for loopback 5555: (config)#voice loopback 5555 (config-LB-5555)#nls
60000CRG0-35B
3251
num-rings <value>
Use the num-rings command to specify the number of rings before the loopback account answers (when called). Use the no form of this command to return to the default value. Syntax Description
<value> Specifies the number of rings before answering. Specify 0 through 9 rings. Entering 0 specifies answering the call immediately.
Default Values
By default, num-rings is set to 0.
Command History
Release 9.3 Release A1 Command was introduced. Command was included in the Voice Loopback Account Configuration command set.
Usage Examples
The following example sets the number of rings for loopback 5555 to 3: (config)#voice loopback 5555 (config-LB-5555)#num-rings 3
60000CRG0-35B
3252
plc
Use the plc command to enable packet loss concealment (PLC). PLC is used to prevent choppy connections by replacing a lost packet with another voice packet in the data stream. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, PLC is enabled.
Command History
Release 11.1 Release A1 Command was introduced. Command was included in the Voice Loopback Account Configuration command set.
Usage Examples
The following example disables PLC for loopback 5555: (config)#voice loopback 5555 (config-LB-5555)#no plc
60000CRG0-35B
3253
rtp delay-mode
Use the rtp delay-mode command to configure the Realtime Transport Protocol (RTP) jitter buffer packet delay mode settings. RTP is used to prevent static on voice connections by enhancing the quality of the packet delivery. Use the no form of this command to return to the default setting. Variations of this command include:
rtp delay-mode adaptive rtp delay-mode fixed
Syntax Description
adaptive fixed Configures the RTP jitter buffer packet delay to adjust during a call based on network conditions. Configures the RTP jitter buffer packet delay to remain constant.
Default Values
By default, the RTP delay mode is set to adaptive. This allows for minimal latency by adjusting the average packet delay based on the conditions of the network.
Command History
Release 11.1 Release A1 Command was introduced. Command was included in the Voice Loopback Account Configuration command set.
Usage Examples
The following example configures the RTP delay mode as fixed: (config)#voice loopback 5555 (config-LB-5555)#rtp delay-mode fixed
60000CRG0-35B
3254
rtp dtmf-relay
Use the rtp dtmf-relay command to configure the method by which Realtime Transport Protocol (RTP) dual tone multi-frequency (DTMF) events are relayed. The dial digits can be sent inband or out-of-band (OOB) of the voice stream. Use the no form of this command to return to the default value. Variations of this command include:
rtp dtmf-relay inband rtp dtmf-relay nte <value>
Syntax Description
inband nte <value> Specifies that RTP DTMF events be relayed inband in the RTP stream. Specifies that RTP DTMF event value be relayed OOB using named telephone events (NTEs). Enter a named telephone event (NTE) value between 96 and 127.
Default Values
By default, the rtp dtmf-relay is set for nte 101.
Command History
Release 9.3 Release A1 Command was introduced. Command was included in the Voice Loopback Account Configuration command set.
Usage Examples
The following example configures RTP DTMF relay events for inband: (config)#voice loopback 5555 (config-LB-5555)#rtp dtmf-relay inband
60000CRG0-35B
3255
Default Values
By default, the rtp frame-packetization time is set to 20 milliseconds on all trunks and users.
Command History
Release 9.3 Release A1 Command was introduced. Command was included in the Voice Loopback Account Configuration command set.
Usage Examples
The following example sets the frame packetization time for loopback account 5555 to 10 milliseconds: (config)#voice loopback 5555 (config-LB-5555)#rtp frame-packetization 10
60000CRG0-35B
3256
rtp packet-delay
Use the rtp packet-delay command to configure the maximum Realtime Transport Protocol (RTP) packet delays. This command is used to set the allowable limits of latency on the network. Use the no form of this command to return to the default value. Variations of this command include:
rtp packet-delay fax <value> rtp packet-delay maximum <value> rtp packet-delay nominal <value>
Syntax Description
fax <value> maximum <value> nominal <value> Sets the fax delay time value in milliseconds. Range is 0 to 500 milliseconds. Sets the maximum delay time value in increments of 10 milliseconds. Range is 40 to 320 milliseconds. Sets the nominal delay time value in increments of 10 milliseconds. Range is 10 to 240 milliseconds.
Default Values
By default, the RTP packet delays are fax 300, maximum 100, and nominal 50.
Command History
Release 11.1 Release A1 Command was introduced. Command was included in the Voice Loopback Account Configuration command set.
Usage Examples
The following example configures the RTP fax delay time for loopback 5555 to 200 milliseconds: (config)#voice loopback 5555 (config-LB-5555)#rtp packet-delay fax 200
60000CRG0-35B
3257
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release A1 Command was introduced. Command was included in the Voice Loopback Account Configuration command set.
Usage Examples
The following example sets the RTP quality of service (QoS) DSCP value to 14: (config)#voice loopback 5555 (config-LB-5555)#rtp qos dscp 14
60000CRG0-35B
3258
shutdown
Use the shutdown command to disable the loopback account and prevent future calls into the account. Use the no form of this command to reactivate the loopback account. Syntax Description
No subcommands.
Default Values
By default, no loopback accounts are configured.
Command History
Release A1 Command was included in the Voice Loopback Account Configuration command set.
Usage Examples
The following example disables the loopback account 5555: (config)#voice loopback 5555 (config-LB-5555)#shutdown
60000CRG0-35B
3259
sip-identity
Use the sip-identity command to configure the Session Initiation Protocol (SIP) registration options for the user. Use the no form of this command to disable the setting. Variations of this command include the following:
sip-identity <station> <Txx> sip-identity <station> <Txx> register sip-identity <station> <Txx> register auth-name <username> password <password>
Syntax Description
<station> <Txx> register Specifies the station to be used for SIP trunk (e.g., station extension). Specifies the SIP trunk through which to register the server. The trunk is specified in the format Txx (e.g., T01). Registers the user to the server.
auth-name <username> Optional. Sets the user name that will be required as authentication for registration to the SIP server. password <password> Optional. Sets the password that will be required as authentication for registration to the SIP server.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release A1 Command was introduced. Command was included in the Voice Loopback Account Configuration command set.
Usage Examples
The following example specifies trunk T02 and extension 4400 for SIP identity on the loopback account: (config)#voice loopback 5555 (config-LB-5555)#sip-identity 4400 T02
60000CRG0-35B
3260
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. alc on page 3264 block-caller-id on page 3265 caller-id-override on page 3266 call-waiting on page 3267 codec-group <name> on page 3268 connect on page 3269 contact-group <group number> on page 3270 cos on page 3271 coverage on page 3273 did <number> on page 3276 directory-include on page 3277 dnd on page 3278
60000CRG0-35B
3261
dnis-digits <value> on page 3279 door-phone on page 3282 echo-cancellation on page 3283 email <address> on page 3284 email-secondary <address> on page 3285 findme-followme on page 3286 first-name <name> on page 3287 forward <number> on page 3288 forward-disconnect on page 3289 fwd-courtesy on page 3290 group-ring-call-waiting on page 3291 hotel on page 3292 hotline <number> on page 3293 last-name <name> on page 3294 location <text> on page 3295 match ani <template> substitute <template> on page 3296 message-waiting on page 3298 modem-passthrough on page 3299 nls on page 3300 notify email on page 3301 num-rings on page 3302 password <password> on page 3304 plc on page 3305 rtp delay-mode on page 3306 rtp dtmf-relay on page 3307 rtp frame-packetization <value> on page 3308 rtp frame-packetization mode on page 3309 rtp packet-delay on page 3310 rtp qos dscp <value> on page 3311 script <name> on page 3312 show voice mail on page 3313 sip-authentication password <password> on page 3315 sip-identity on page 3316 sip-keep-alive on page 3317 special-ring-cadences on page 3318 speed-dial <number> on page 3319 station-lock on page 3320 t38 on page 3321 t38 error-correction on page 3322
60000CRG0-35B
3262
t38 fallback-mode g711 on page 3323 t38 max-buffer <value> on page 3324 t38 max-datagram <value> on page 3325 t38 max-rate on page 3326 t38 redundancy on page 3327 vad on page 3328 voicemail on page 3329 voicemail notify schedule on page 3332
60000CRG0-35B
3263
alc
Use the alc command to enable automatic level control (ALC). ALC reduces Realtime Transport Protocol (RTP) received signals that are out of specification to the predefined levels. It is not necessary to enable ALC on those networks that guarantee signal levels to be within specification. Use the no form of this command to disable this feature. Variations of this command include:
alc alc level -16 alc level -17 alc level -18 alc level -19 alc level -20 alc level -21 alc level -22
Syntax Description
level -16 level -17 level -18 level -19 level -20 level -21 level -22 Optional. Specifies the ALC attenuation level is -16 dBm0. Optional. Specifies the ALC attenuation level is -17 dBm0. Optional. Specifies the ALC attenuation level is -18 dBm0. Optional. Specifies the ALC attenuation level is -19 dBm0. Optional. Specifies the ALC attenuation level is -20 dBm0. Optional. Specifies the ALC attenuation level is -21 dBm0. Optional. Specifies the ALC attenuation level is -22 dBm0.
Default Values
By default, ALC is disabled.
Command History
Release 14.1 Release 15.1 Release A2 Release A2.04 Command was introduced. Command was added to the Voice Line Interface. Command was added to the Media Gateway Control Protocol (MGCP) endpoint configuration. Command was expanded to include the level parameters.
Usage Examples
The following example activates the ALC for voice user 4444: (config)#voice user 4444 (config-4444)#alc
60000CRG0-35B
3264
block-caller-id
Use the block-caller-id command to block all inbound caller ID delivery to this user. This command prevents the selected user from receiving caller ID information. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example activates the block-caller-id command for user 4444: (config)#voice user 4444 (config-4444)#block-caller-id
60000CRG0-35B
3265
caller-id-override
Use the caller-id-override command to manipulate caller ID information for the user. This command is used to conceal users name and number or to display a different name and number for internal or external caller ID. Use the no form of this command to disable this feature. Variations of this command include:
caller-id-override emergency-number <number> caller-id-override external-number <number> caller-id-override external-name <name> caller-id-override external-name empty caller-id-override internal-name empty caller-id-override internal-name <name> caller-id-override internal-number empty caller-id-override internal-number <number>
Syntax Description
emergency-number <number> Replaces the caller ID number on emergency calls with the specified number. external-number <number> external-name <name> internal-name <name> internal-number <number> empty Replaces the caller ID number on external calls with the specified number. Replaces the caller ID name on external calls with the specified name. Replaces the caller ID name on internal calls with the specified name. Replaces caller ID number on internal calls with the specified number. Makes the caller ID name or number on internal calls and the caller ID name on external calls display as blank.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release A4.01 Command was introduced. Command was expanded to include the emergency-number and external-name parameters.
Usage Examples
The following example activates the caller-id-override command for external numbers for user 4444: (config)#voice user 4444 (config-4444)#caller-id-override external-number 256-555-8000 This example activates the caller-id-override command for names with internal calls and makes the display appear blank: (config)#voice user 4444 (config-4444)#caller-id-override internal-number empty
60000CRG0-35B
3266
call-waiting
Use the call-waiting command to enable call waiting for a user. The selected user will be allowed to receive caller ID information. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example activates the call-waiting command for user 4444: (config)#voice user 4444 (config-4444)#call-waiting
60000CRG0-35B
3267
codec-group <name>
Use the codec-group command to specify the coder-decoder (CODEC) list to be used by this account. Use the no form of this command to remove the CODEC list from the account. Syntax Description
<name> Specifies the CODEC list to be used for this account.
Default Values
By default, no CODEC lists are assigned.
Command History
Release 9.3 Release 11.1 Release 15.1 Release A1 Release A2 Command was introduced. Command was expanded to include the integrated services digital network (ISDN) trunk. Command was added to the Voice Line Configuration command set. Command was included in the Voice Loopback Account Configuration command set. Command was added to the Media Gateway Control Protocol (MGCP) Configuration command set.
Functional Notes
The codec-group command applies a previously configured CODEC list to an interface, voice trunk, or voice account. These lists are lists of CODECs used by the interface, trunk, or account in call negotiation, and are arranged in preferred order with the first listed CODEC being the most preferred. CODEC lists are created using the codec command from the Voice CODEC List Configuration mode prompt. For more information about creating CODEC lists, refer to the Voice CODEC List Command Set on page 3359.
Usage Examples
The following example applies the CODEC list List1 to user 4444: (config)#voice user 4444 (config-4444)#codec-group List1
60000CRG0-35B
3268
connect
Use the connect command to associate physical ports with the user. This command assigns a specific station or port type to the user. Use the no form of this command to remove associations. Variations of this command include:
connect fxs <slot/port> connect sip
Syntax Description
fxs <slot/port> sip Specifies that a foreign exchange station (FXS) port is associated with the user. Specifies that this is a Session Initiation Protocol (SIP) user.
Default Values
By default, users are not associated with physical ports.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example associates the physical FXS slot 1/port 1 interface with the user 4444: (config)#voice user 4444 (config-4444)#connect fxs 1/1 The following example associates a SIP port with the user 4444. (config)#voice user 4444 (config-4444)#connect sip
60000CRG0-35B
3269
Default Values
By default, no contact groups are configured.
Command History
Release A4.01 Command was introduced.
Functional Notes
FindMe-FollowMe must be enabled on the user account to use configured contact groups. FindMe-FollowMe is enabled using the command findme-followme on page 3286. Each contact group is numbered, and group numbers specify which contact group FindMe-FollowMe searches first. For example, the calling party number will be matched to the permitted calling party number list in contact group 1 before contact group 2. If a match is found, the actions for contact group 1 are performed. Otherwise, the next contact group is searched for matches. Each user account can have up to 5 contact groups. The contact-group command creates a FindMe-FollowMe contact group and enters the groups configuration mode. Commands in this configuration mode are detailed in the section FindMe-FollowMe Contact Group Command Set on page 3408.
Usage Examples
The following example creates contact group 1 for voice user 4444, and enters the groups configuration mode: (config)#voice user 4444 (config-4444)#contact-group 1 (config-4444-cg-1)#
60000CRG0-35B
3270
cos
Use the cos command to set class of service (CoS) mode for the user. The CoS can be set to change for the user based on the current system mode by including the system mode parameter. The CoS defines the types of phone service that will be available to the user during the time period. Use the no form of this command to disable this feature. Variations of this command include:
cos <name> cos <system mode> <name> cos no-access cos <system mode> no-access cos override <name> cos override no-access
Syntax Description
<name> <system mode> Specifies the predefined CoS. Optional. Specifies the system mode to configure. Choose from custom1, custom2, custom3, lunch, night, or weekend. Refer to the Functional Notes of this command for more information on configuring system modes. Blocks users from placing calls when the CoS is applied. Ignores the programmed system mode schedule.
no-access override
Default Values
By default, the CoS is set to no-access.
Command History
Release 9.3 Release A1 Command was introduced. Command was expanded to include the system mode options.
Functional Notes
Additional functionality for this feature is provided by assigning a CoS to a specific system mode. When the system mode changes at a trigger point, the users CoS changes. For example, a CoS applied to the user when the system mode is specified as night can be used to prevent outbound calls during evening hours. System modes are defined from the Global Configuration mode using the command voice system-mode on page 1320.
Usage Examples
The following example specifies the CoS Assistant for the user 4444. (config)#voice user 4444 (config-4444)#cos Assistant
60000CRG0-35B
3271
The following example configures the users CoS to change to general when the system mode changes to night. (config)#voice user 4444 (config-4444)#cos night general
60000CRG0-35B
3272
coverage
Use the coverage command to configure call coverage parameters for the user. The call coverage setting determines how a call is handled if the dialed party does not answer after a specified number of rings. Use the no form of this command to remove an individual coverage parameter. Variations of this command include:
coverage aa coverage aa <number> coverage findme-followme coverage global <name> coverage internal <number> coverage internal <number> num-rings <value> coverage operator coverage operator num-rings <value> coverage override external <number> coverage override global <name> coverage override internal <number> coverage override internal <number> num-rings <value> coverage override operator coverage override operator num-rings <value> coverage override vm coverage override vm <number> coverage vm coverage vm <number> coverage <system mode> aa coverage <system mode> aa <number> coverage <system mode> external <number> coverage <system mode> findme-followme coverage <system mode> global <name> coverage <system mode> internal <number> coverage <system mode> internal <number> num-rings <value> coverage <system mode> operator coverage <system mode> operator num-rings <value> coverage <system mode> vm coverage <system mode> vm <number>
Syntax Description
<system mode> Optional. Specifies the system mode to configure for call coverage. Choose from custom1, custom2, custom3, lunch, night, or weekend. Refer to the Functional Notes of this command for more information on configuring system modes. Forwards the call to the default auto attendant. Forwards the call to a specific extension programmed for the auto attendant. If no extension is specified, the phone is forwarded to the default auto attendant.
aa aa <number>
60000CRG0-35B
3273
Command Reference Guide external <number> findme-followme global <name> internal <number> num-rings <value> operator override vm vm <number>
Voice User Account Command Set Forwards the call to the specified external number. If no number is entered, the default auto answer is used. Specifies that FindMe-FollowMe is the preferred coverage type for this user. Uses the specified global call coverage list. Forwards the call to the specified internal number. Optional. Specifies the number of rings for the call before performing the next action. Valid range is 1 to 9. Forwards the call to the operator. Ignores the programmed system mode schedule. Forwards the call to voicemail. Optional. Forwards the phone to the specified mailbox number.
Default Values
By default, no system mode call coverage is specified.
Command History
Release 9.3 Release 11.1 Release 12.1 Release A1 Release A4.01 Command was introduced. Command was updated to include the voicemail and num-rings parameters. Command was updated to include the aa, global, and operator parameters. Command was updated to include the system mode feature options. Command was updated to include the findme-followme parameter.
Functional Notes
System mode call coverage provides more diverse functionality for call handling. In previous versions of AOS (revision 15.1 or earlier), up to five coverage modes were allowed. Calls were processed in the order in which the coverage options were entered into the system. With the addition of the system mode options, up to five coverage options per system mode are allowed. The system modes can be modified using the command voice system-mode on page 1320. The FindMe-FollowMe feature can be used instead of other call coverages. When FindMe-FollowMe is enabled as the call coverage mode, incoming callers are directed according to the users configuration of the FindMe-FollowMe feature. For more information about configuring FindMe-FollowMe, refer to the commands contact-group <group number> on page 3270 and findme-followme on page 3286, as well as to the command sets FindMe-FollowMe Contact Group Command Set on page 3408 and FindMe-FollowMe Action Script Command Set on page 3400. If you would like more information about FindMe-FollowMe, its configuration, and how it relates to call coverage, refer to the Configuring User Accounts on the NetVanta 7000 Series quick configuration guide available online at http://kb.adtran.com.
60000CRG0-35B
3274
Usage Examples
The following example specifies that the user's phone be forwarded to the internal extension 8500 when in the night system mode after 3 rings. (config)#voice user 4444 (config-4444)#coverage night internal 8500 num-rings 3 The following example specifies that incoming calls to the user extension 4444 follow the call coverage outlined in the users FindMe-FollowMe configuration: (config)#voice user 4444 (config-4444)#coverage findme-followme
60000CRG0-35B
3275
did <number>
Use the did command to configure direct inward dialing (DID) parameters for the extension. DID is used if a service provider is providing digits to the unit on inbound calls or if the unit needs to provide DID information to a piece of customer premises equipment (CPE). Use the no form of this command to disable this feature. Syntax Description
<number> Specifies the DID number for the user.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example assigns a did number of 555-4560 to user 4444: (config)#voice user 4444 (config-4444)#did 5554560
60000CRG0-35B
3276
directory-include
Use the directory-include command to add this user in a dial-by-name (DBN) directory. Adding users to the directory allows the users to call parties by the voice users name stored in the system. Use the no form of this command to disable this feature. Variations of this command include:
directory-include directory-include first-name <name> directory-include first-name <name> last-name <name> directory-include <directory name> directory-include <directory name> first-name <name> directory-include <directory name> first-name <name> last-name <name>
Syntax Description
first-name <name> last-name <name> <directory name> Optional. Specifies the directory entry of the users first name to be included in the directory. Optional. Specifies the directory entry of the users last name to be included in the directory. Optional. Specifies the name of a directory.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Release 14.1 Command was introduced. Command was expanded.
Functional Notes
Using this command automatically retrieves the values stored in the first-name and last-name for the DBN directory. If a user also uses an alias, you may add extra entries into the DBN directory by specifying the first and last names within the directory-include command. By default, a system directory is always available. All voice users are automatically added as members of the system directory.
Usage Examples
The following example adds the user 4444 to a DBN directory: (config)#voice user 4444 (config-4444)#directory-include
60000CRG0-35B
3277
dnd
Use the dnd command to enable the do-not-disturb (DND) option for the user. This setting prevents the phone extension assigned to the user from ringing. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example enables DND for user 4444: (config)#voice user 4444 (config-4444)#dnd
60000CRG0-35B
3278
dnis-digits <value>
Use the dnis-digits command to enable the dialed number identification service (DNIS) delay feature and to specify the number of DNIS dual tone multi-frequency (DTMF) digits that are outpulsed to the terminal when a call is routed to an automatic call distributor (ACD), such as a fax server, that is connected to a foreign exchange station (FXS) port. For more information on how this feature works, refer to the Functional Notes and Technology Review sections below. Use the no form of this command to disable the DNIS delay feature. Variations of this command include:
dnis-digits <value> dnis-digits <value> digit-delay <value> dnis-digits <value> digit-delay <value> cut-through-delay <value>
Syntax Description
dnis-digits <value> digit-delay <value> Specifies the number of DNIS digits that are to be outpulsed. Range is 1 to 16 digits. Optional. Specifies the delay (in milliseconds) between the terminal going off-hook and the first DNIS digit outpulse. The delay is specified in 100 ms increments and the range is 100 to 1000 ms. Optional. Specifies the delay (in milliseconds) between the outpulsing of the final DNIS digit and the start of two-way voice traffic. The delay is specified in 100 ms increments and the range is 100 to 2000 ms.
cut-through-delay <value>
Default Values
By default, this feature is disabled and zero DNIS digits are outpulsed. When the shortest version of the command is used (dnis-digits <value>), the digit delay is set to 200 ms and the cut-through-delay is set to 500 ms by default.
Command History
Release A2.04 Command was introduced.
Functional Notes
The DNIS delay feature is used when an FXS port is connected to an ACD, such as a fax server. When the switchboard routes a call to the port and the terminal answers, the trailing digits of the called number are outpulsed to allow the terminal to finish routing the call. The dnis-digits command allows you to configure how many digits are outpulsed. For more information on how the feature operates, refer to the Technology Review section of this command. This feature is available only when the voice user type is specified as FXS.
60000CRG0-35B
3279
Usage Examples
The following example specifies that the voice users terminal outpulse 4 DNIS digits and use the delay default values (200 ms for digit-delay and 500 ms for cut-through-delay): (config)#voice user 4444 (config-4444)#dnis-digits 4
Technology Review
The following diagram demonstrates the actions taken by the FXS port and the DNIS delay feature:
Idle
Delay 1 (digit-delay)
Outpulse DNIS
Delay 2 (cut-through-delay)
Connect
The diagram shows that the DNIS feature is idle while the FXS port is alerting and waiting for the terminal to go off-hook. After the terminal is off-hook, the DNIS feature enters the Delay 1 state, specified by the digit-delay parameter of this command. Entering this state allows sufficient time for any transients audible on the two-way wire to die away, and for the terminal to attach a digit register. After Delay 1 times out, DNIS DTMF digits are outpulsed to the terminal. The feature then enters the Delay 2 state, specified by the cut-through-delay parameter of this command. Entering this state allows for the connected terminal to finish routing the call. Once the feature enters the Connect state, a two-way voice band connection is established. Using the dnis-digits command allows you to specify the number of DNIS digits outpulsed and the duration of both delay periods in this process. This feature is intended for use with a fax server, where multiple inbound fax numbers are all routed to a single analog port. To use this feature effectively, follow these steps: 1. Create a voice user account using the command voice user <extension> on page 1330. The extension number assigned can be arbitrary, or it can be one of the desired inbound fax lines. 2. Connect an analog port using the command connect on page 3269. 3. Assign an alias for each inbound fax line to be steered into the fax server using the command alias <text> on page 64. 4. Set the number of DNIS digits using the dnis-digits command. These digits must be set in conjunction with the fax server configuration.
60000CRG0-35B
3280
Command Reference Guide The configuration of the DNIS digits feature appears as follows: (config)#voice user 4444 (config-4444)#connect fxs 0/1 (config-4444)#description fax-server (config-4444)#alias 2565552081 (config-4444)#alias 2565552082 (config-4444)#alias 2568882093 (config-4444)#alias 2568882094 (config-4444)#dnis-digits 7 (config-4444)#exit
60000CRG0-35B
3281
door-phone
Use the door-phone command to enable the door phone mode for this extension. Use the no form of this command to disable the door phone mode for this extension. Syntax Description
No subcommands.
Default Values
By default, the door phone mode is disabled.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example makes extension 4444 the door phone extension. (config)#voice user 4444 (config-4444)#door-phone
60000CRG0-35B
3282
echo-cancellation
Use the echo-cancellation command to improve voice quality for packetized-based voice calls, such as Voice over Internet Protocol (VoIP) or Media Gateway Control Protocol (MGCP). Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, echo-cancellation is enabled.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example activates echo-cancellation for user 4444: (config)#voice user 4444 (config-4444)#echo-cancellation
60000CRG0-35B
3283
email <address>
Use the email command to configure the primary email notification address for this extension. Use the no form of this command to remove a configured email address. Syntax Description
<address> Specifies the primary email notification address for this extension.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example configures the primary email notification address for this extension as first.last@company.com. (config)#voice user 4444 (config-4444)#email first.last@company.com
60000CRG0-35B
3284
email-secondary <address>
Use the email-secondary command to configure the secondary email notification address for this extension. The secondary email address will be used based on the email notification schedule. Use the no form of this command to remove a configured secondary email address. Syntax Description
<address> Specifies the secondary email notification address for this extension.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example configures the secondary email notification address for this extension as first.last@company.com. (config)#voice user 4444 (config-4444)#email-secondary first.last@company.com
60000CRG0-35B
3285
findme-followme
Use the findme-followme command to enable the FindMe-FollowMe feature for the user. Use the no form of this command to disable the feature. Variations of this command include:
findme-followme findme-followme enhanced
Syntax Description
enhanced Optional. Specifies that the enhanced version of FindMe-FollowMe is enabled on the user account.
Default Values
By default, FindMe-FollowMe is disabled.
Command History
Release A4.01 Command was introduced.
Functional Notes
The enhanced version of FindMe-FollowMe allows the AOS device to remain in the talk path only for external calls with press-to-accept enabled.
FindMe-FollowMe is a complex feature requiring a large amount of system resources. Decreasing the amount of enhanced FindMe-FollowMe can reduce the amount of system resources used by the feature.
This command must be enabled on the user account for additional FindMe-FollowMe configurations. For more information about configuring the FindMe-FollowMe feature, refer to FindMe-FollowMe Contact Group Command Set on page 3408 and FindMe-FollowMe Action Script Command Set on page 3400, or the Configuring User Accounts for the NetVanta 7000 Series quick configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example enables the basic FindMe-FollowMe feature for voice user 4444: (config)#voice user 4444 (config-4444)#findme-followme
60000CRG0-35B
3286
first-name <name>
Use the first-name command to specify the users first name. The name will represent the users first name in the system. Use the no form of this command to remove a first name. Syntax Description
<name> Specifies the users first name.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example specifies the first name of user 4444: (config)#voice user 4444 (config-4444)#first-name John
60000CRG0-35B
3287
forward <number>
Use the forward command to redirect all calls to this extension to a specified number. Forwarding calls allows the user to receive incoming calls at a different number. Use the no form of this command to disable this feature. Syntax Description
<number> Forwards all calls to the specified number. Do not include dashes or hyphens in the number.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example forwards all calls to user 4444 to the number 256-555-8000: (config)#voice user 4444 (config-4444)#forward 2565558000
60000CRG0-35B
3288
forward-disconnect
Use the forward-disconnect command to specify the method of manipulating the polarity to signal a disconnect of the line. Use the no form of this command to return to the default value. Variations of this command include:
forward-disconnect battery none forward-disconnect battery remove forward-disconnect battery reverse forward-disconnect delay <value>
Syntax Description
battery none battery remove battery reverse delay <value> Specifies that the battery will not be removed or reversed upon disconnect. Specifies that the battery will be removed upon disconnect. Specifies that the battery will be reversed upon disconnect. Sets a forward disconnect delay time value in milliseconds. Specify 250, 500, 750, 1000, or 2000 milliseconds.
Default Values
By default, forward-disconnect battery remove is enabled.
Command History
Release 9.3 Release A4.05 Command was introduced. Command was expanded to include the battery none parameter.
Usage Examples
The following example removes the battery upon disconnect for user 4444. This command is used most often with a fax machine that needs to be alerted that a call has ended: (config)#voice user 4444 (config-4444)#forward-disconnect battery remove
60000CRG0-35B
3289
fwd-courtesy
Use the fwd-courtesy command to enable the courtesy ring feature when a call is forwarded to notify the user that an incoming call has been re-routed. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example sends a courtesy ring when a call is forwarded: (config)#voice user 4444 (config-4444)#fwd-courtesy
60000CRG0-35B
3290
group-ring-call-waiting
Use the group-ring-call-waiting command to enable the user to receive multiple calls from a ring group. Use the no form of this command to disable the feature. Syntax Description
No subcommands.
Default Values
By default, users cannot receive multiple calls from a ring group.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example enables user 4444 to receive multiple calls from a ring group: (config)#voice user 4444 (config-4444)#group-ring-call-waiting
60000CRG0-35B
3291
hotel
Use the hotel command to allow extension reassignment to an alternate phone. Use the no form of this command to deny extension reassignment. Syntax Description
No subcommands.
Default Values
By default, the hotel feature is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example enables the user to assign extension 4444 to an alternate phone: (config)#voice user 4444 (config-4444)#hotel
60000CRG0-35B
3292
hotline <number>
Use the hotline command to configure the users phone as a hotline phone. When the user picks up the phone, it will automatically ring the extension assigned. Use the no form of this command to disable this feature. Syntax Description
<number> Specifies the hotline number to dial when the phone is off-hook.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example sets up user 4444 as a hotline and specifies that the number 256-555-8000 will be dialed when user 4444s phone is off-hook: (config)#voice user 4444 (config-4444)#hotline 2565558000
60000CRG0-35B
3293
last-name <name>
Use the last-name command to specify the users last name. The stored name will appear in the caller ID information and directory for the user. Use the no form of this command to remove a last name. Syntax Description
<name> Specifies the users last name.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example specifies the last name of user 4444: (config)#voice user 4444 (config-4444)#last-name Smith
60000CRG0-35B
3294
location <text>
Use the location command to specify the users physcial location within the companys physical address. The users location is used to enhance emergency call email alert notification with the location of the caller. Use the no form of this command to remove the users location. Syntax Description
<text> Specifies the users location using no more than 40 characters.
Default Values
No default values are necessary for this command.
Command History
Release A4.03 Command was introduced.
Usage Examples
The following example specifies the location of user 4444: (config)#voice user 4444 (config-4444)#location 5th floor, room 582
60000CRG0-35B
3295
Syntax Description
ani <template> Specifies the ANI information to be substituted. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Specifies the ANI information that is substituted for the original ANI information. This information is entered using wildcards and numerical digits. Refer to the Functional Notes of this command for available wildcards and proper data entry. Optional. Specifies the name associated with the ANI information. This option is only available on trunks that support ANI name information (integrated services digital network (ISDN) trunks, Session Initiation Protocol (SIP) trunks, T1 loop start (LS) network trunks, and T1 ground start (GS) network trunks).
substitute <template>
name <name>
Default Values
By default, no ANI substitution is configured.
Command History
Release A2 Command was introduced.
Functional Notes
The convention for ANI templates is very similar to dial plan entries. Wildcards available for this command are: 0-9 = Match exact digit only. M = Any digit 1 to 8. X = Any single digit (0 to 9). N = Any digit 2 to 9. [123] = Any digit contained in the bracketed list.
Do not use dashes, commas, spaces, etc., inside the brackets. Commas are implied between numbers in the brackets.
60000CRG0-35B
3296
The special characters ( ), -, and + are always ignored in the template. The following are example template entries using wildcards: Examples: 1) 555-81xx matches 555-8100 to 555-8199. 2) 555-812[012] matches 555-8120 to 555-8122. 3) Nxx-xxxx matches 7 digits local. 4) 1-Nxx-Nxx-xxxx matches long distance calls in North America. Additional wildcards ($ and 0 to 9) can also be used. The command line interface (CLI) also contains helpful information regarding the construction of the template and can be viewed by entering the match ani command followed by a question mark. For example, entering the command as follows results in the template input specifications: (config)#match ani ?
Examples and rules of use. MATCH # 1) NXX-XXXX 2) 1-NXX-XXX-XXXX 3) 1-NXX-NXX-XXXX 4) 411 5) $ 6) XXXX$ SUBST # 256-NXX-XXXX NXX-XXX-XXXX 10-10-220-NXX-NXX-XXXX 256-555-1212 10$ $
(Format a call for 10 digit dialing) (Format LD call for 10 digit dialing) (Insert a LD call PIC code) (Redirect 411 information calls) (Prepend a number) (Strip leading digits)
SUBSTITUTE Number Rules 1) All "," characters are ignored. 2) All "[" and "]" brackets must match, no nesting, no wildcards. 3) All "[" and "]" brackets may hold digits, commas [1239], [1,2,3,9]. 4) All "[" and "]" brackets may contain a range [1-39], [1-3,9]. 5) If using a "$" wildcard, it must be at the end of the number. 6) "X" matches [0-9], "N" matches [2-9].
Usage Examples
The following example specifies that the ANI information from numbers 555-8111 to 555-8115 will be substituted by 555-8110 for outbound calls for user 4444: (config)#voice user 4444 (config-4444)#match ani 555-811[125] substitute 555-8110
60000CRG0-35B
3297
message-waiting
Use the message-waiting command to configure message-waiting notification methods. Use this command to select the phone alert used to notify users of new voicemail. Use the no form of this command to disable this feature. Variations of this command include:
message-waiting both message-waiting dialtone-only message-waiting lamp-only
Syntax Description
both dialtone-only lamp-only Sets message-waiting notification for both dial tone and lamp. Sets message-waiting notification for dial tone only. Sets message-waiting notification for lamp-only.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example sets message-waiting notification for user 4444 for both dial tone and lamp: (config)#voice user 4444 (config-4444)#message-waiting both
60000CRG0-35B
3298
modem-passthrough
Use the modem-passthrough command to switch to passthrough mode on fax or modem tone detection. This command allows modem and fax calls to maintain a connection without altering the signals with the voice improvement settings, such as echo cancellation and voice activity detection (VAD). Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, modem-passthrough is enabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example disables modem-passthrough: (config)#voice user 4444 (config-4444)#no modem-passthrough
60000CRG0-35B
3299
nls
Use the nls command to enable the non-linear suppression (NLS) option for the user. This option sets the echo canceller to reduce acoustic echo. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 14.1 Command was introduced.
Usage Examples
The following example enables NLS for user 4444: (config)#voice user 4444 (config-4444)#nls
60000CRG0-35B
3300
notify email
Use the notify email command to indicate either the primary or secondary email address for voicemail notification during the voicemail notification schedule. The primary and secondary email addresses must be configured using the commands email <address> on page 3284 and email-secondary <address> on page 3285. Use the no form of this command to disable this feature. Variations of this command include the following:
notify email primary notify email secondary
Syntax Description
primary secondary Specifies that email notifications for this schedule will be sent to the primary email address. Specifies that email notifications for this schedule will be sent to the secondary email address.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 15.1 Command was introduced. Command was expanded.
Usage Examples
The following example configures the unit to send email notification for this schedule to the secondary email address. (config)#voice user 4444 (config-4444)#voicemail notify schedule monday 06:00 am Configuring New Schedule monday 06:00 am. (config-4444-mon-06:00am)#notify email secondary
60000CRG0-35B
3301
num-rings
Use the num-rings command to specify the number of rings for call pickup before the system redirects the call. Each system mode call coverage action can be configured with a different number of rings based on preference. Use the no form of this command to return to the default setting. Variations of this command include:
num-rings <value> num-rings disabled num-rings <system mode> <value> num-rings <system mode> disabled num-rings override <value>
Syntax Description
disabled Optional. Specifies that the extension does not ring. This parameter is used when the FindMe-FollowMe feature is in call coverage mode and causes the FindMe-FollowMe actions to begin as soon as the incoming call is placed. Optional. Specifies the system mode to configure for call coverage. Choose from custom1, custom2, custom3, lunch, night, or weekend. Refer to the Functional Notes of this command for more information on configuring system modes. Ignores the programmed system mode schedule. Specifies the number of unanswered rings before the next call action begins. Specify 0 through 9 rings. Entering 0 specifies an unlimited number of rings.
<system mode>
override <value>
Default Values
By default, the num-rings is set to 4.
Command History
Release 9.3 Release A1 Release A4.01 Command was introduced. Command was updated to include the system mode feature options. Command was expanded to include the disabled parameter.
Functional Notes
System mode call coverage provides more diverse functionality for call handling. In previous versions of AOS (revision 15.1 or earlier), up to five coverage modes were allowed. Calls were processed in the order in which the coverage options were entered into the system. With the addition of the system mode options, up to five coverage options per system mode are allowed. The system modes can be modified using the command voice system-mode on page 1320.
60000CRG0-35B
3302
The disabled parameter specifies that the extension does not ring. This parameter is useful when the FindMe-FollowMe feature is enabled on the user account and is set as the preferred call coverage mode. For more information about configuring FindMe-FollowMe, refer to the Configuring User Accounts on the NetVanta 7000 Series quick configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example allows the extension 4444 to ring 6 times before redirecting the call: (config)#voice user 4444 (config-4444)#num-rings 6 The following example sets the number of rings to 1 before redirecting the call when the system mode is set to weekend: (config)#voice user 4444 (config-4444)#num-rings weekend 1 The following example specifies that extension 4444 will not ring during lunch when the lunch system mode is enabled: (config)#voice user 4444 (config-4444)#num-rings lunch disabled
60000CRG0-35B
3303
password <password>
Use the password command to create a password or personal identification number (PIN) to protect voice settings and messages. Use the no form of this command to remove a password. Syntax Description
<password> Specifies a 4-digit password or PIN.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example sets the password for user 4444 to 4321: (config)#voice user 4444 (config-4444)#password 4321
60000CRG0-35B
3304
plc
Use the plc command to enable packet loss concealment (PLC). PLC is used to prevent choppy connections by concealing a packet loss by replacing the lost packet with another voice packet in the data stream. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, PLC is enabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example disables PLC for user 4444: (config)#voice user 4444 (config-4444)#no plc
60000CRG0-35B
3305
rtp delay-mode
Use the rtp delay-mode command to configure the Realtime Transport Protocol (RTP) jitter buffer packet delay mode settings. RTP is used to prevent static on voice connections by enhancing the quality of the packet delivery. Use the no form of this command to return to the default setting. Variations of this command include:
rtp delay-mode adaptive rtp delay-mode fixed
Syntax Description
adaptive fixed Configures RTP jitter buffer packet delay to adjust during a call based on network conditions. Configures the RTP jitter buffer packet delay to remain constant.
Default Values
By default, the RTP delay mode is set to adaptive. This allows for minimal latency by adjusting the average packet delay based on the conditions of the network.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures RTP delay mode as fixed: (config)#voice user 4444 (config-4444)#rtp delay-mode fixed
60000CRG0-35B
3306
rtp dtmf-relay
Use the rtp dtmf-relay command to configure the method by which Realtime Transport Protocol (RTP) dual tone multi-frequency (DTMF) events are relayed. The dial digits can be sent inband or out-of-band (OOB) of the voice stream. Use the no form of this command to return to the default value. Variations of this command include:
rtp dtmf-relay inband rtp dtmf-relay nte <value>
Syntax Description
inband nte <value> Specifies that RTP DTMF events be relayed inband in the RTP stream. Specifies that RTP DTMF event value be relayed OOB using named telephone event (NTE). Enter an NTE value between 96 and 127.
Default Values
By default, the rtp dtmf-relay is set for NTE 101.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example configures RTP DTMF relay events for inband: (config)#voice user 4444 (config-4444)#rtp dtmf-relay inband
60000CRG0-35B
3307
Default Values
By default, the rtp frame-packetization time is set to 20 milliseconds on all trunks and users.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example sets the frame packetization time for user 4444 to 10 milliseconds: (config)#voice user 4444 (config-4444)#rtp frame-packetization 10
60000CRG0-35B
3308
Syntax Description
fixed Specifies that received calls always use the configured packetization period. This period is set using the command rtp frame-packetization <value> on page 3308. Specifies that the trunks and users use the packetization period specified in the Session Description Protocol (SDP) offer.
negotiated
Default Values
By default, the rtp frame-packetization mode is set to negotiated.
Command History
Release A2.04 Command was introduced.
Usage Examples
The following example sets the method for determining the frame packetization mode for user 4444 to fixed: (config)#voice user 4444 (config-4444)#rtp frame-packetization mode fixed
60000CRG0-35B
3309
rtp packet-delay
Use the rtp packet-delay command to configure the maximum Realtime Transport Protocol (RTP) packet delays. This command is used to set the allowable limits of latency on the network. Use the no form of this command to return to the default value. Variations of this command include:
rtp packet-delay fax <value> rtp packet-delay maximum <value> rtp packet-delay nominal <value>
Syntax Description
fax <value> maximum <value> nominal <value> Sets the fax delay time value in milliseconds. Range is 0 to 500 milliseconds. Sets the maximum delay time value in increments of 10 milliseconds. Range is 40 to 320 milliseconds. Sets the nominal delay time value in increments of 10 milliseconds. Range is 10 to 240 milliseconds.
Default Values
By default, the RTP packet delay for fax is 300, maximum is 100, and nominal is 50.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example configures the RTP fax delay time for user 4444 to 200 milliseconds: (config)#voice user 4444 (config-4444)#rtp packet-delay fax 200
60000CRG0-35B
3310
Default Values
By default, no RTP QoS DSCP is configured for this interface.
Command History
Release 9.3 Command was introduced.
Functional Notes
By setting the rtp qos dscp value on an individual trunk or user, you will override the global rtp qos dscp setting for RTP packets. QoS is set using a DSCP value. Valid DSCP values are 10 to 63, and a higher DSCP value has a higher priority. The default DSCP value for RTP is 46. Remember that if you are using a public IP connection, such as the Internet, for Voice over Internet Protocol (VoIP), end-to-end QoS may not be guaranteed. The default DSCP value for Session Initiation Protocol (SIP) is 26. To configure QoS for the RTP traffic that carries the voice conversation, use the command ip rtp qos dscp followed by the desired DSCP value.
Usage Examples
The following example configures the RTP QoS DSCP for user 4444 to 60: (config)#voice user 4444 (config-4444)#rtp qos dscp 60
60000CRG0-35B
3311
script <name>
Use the script command to create a FindMe-FollowMe action script for the user and to enter the scripts configuration mode. Use the no form of this command to remove the script from the users FindMe-FollowMe configuration. Syntax Description
<name> Specifies the name of the action script using no more than 10 characters.
Default Values
By default, no FindMe-FollowMe action scripts are configured.
Command History
Release A4.01 Command was introduced.
Functional Notes
Each FindMe-FollowMe action script is the set of actions taken when FindMe-FollowMe is enabled and set as the call coverage mode for the user. Action scripts are associated with FindMe-FollowMe contact groups, and each group has one associated script. When the script command is entered from the user accounts configuration mode, you will enter the action script configuration mode. Each action script can hold 10 actions. For more information about enabling FindMe-FollowMe and specifying it as the call coverage mode for the user, refer to the commands findme-followme on page 3286 and coverage on page 3273. For more information about contact group configuration, refer to FindMe-FollowMe Contact Group Command Set on page 3408. For more information about action script configuration, refer to FindMe-FollowMe Action Script Command Set on page 3400. For more information about configuring the FindMe-FollowMe feature, refer to the Configuring User Accounts on the NetVanta 7000 Series quick configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example creates the action script BUSINESS for user 4444, and enters the scripts configuration mode: (config)#voice user 4444 (config-4444)#script BUSINESS (config-4444-sc-BUSINESS)#
60000CRG0-35B
3312
The output of all show commands can be limited by appending the following modifiers to the end of the command: | begin <text>, | exclude <text>, and | include <text>. The include modifier limits output to lines that contain the specified text, the exclude modifier excludes any lines with the specified text, and the begin modifier displays the first line of output with the specified text and all lines thereafter. For specific instructions and examples regarding these modifiers, refer to the introduction of the Enable Mode Command Set on page 81. Syntax Description
notify-schedule Displays the voicemail notification schedule.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 17.1 Command was introduced. Command was expanded to include the modifiers begin, exclude, and include.
Usage Examples
The following example shows sample output from the show voice mail command for extension 4444: (config)#voice user 4444 (config-4444)#show voice mail Voicemail information for account: 4444 VM Class of Service: normal_voicemail Standard Greeting (min): 01:00 Total Voicemail Usage (min): 05:00 Alternate Greeting (min): 01:00 Total Voicemail Free (min): 10:00 Recorded Name (min): 00:10
60000CRG0-35B
3313
The following is sample output for the show voice mail notify-schedule command for extension 4444: (config)#voice user 4444 (config-4444)#voicemail notify schedule monday 06:00 am Configuring New Schedule "monday 06:00 am". (config-4444-mon-06:00am)#show voice mail notify-schedule Start End Email 1 Email 2 -------------------------------------------------------------------------------------------Sun 12:00am Sun 11:59pm ----Mon 12:00am Mon 5:59am ----Mon 6:00am at 11:59pm -----
60000CRG0-35B
3314
Default Values
By default, no SIP authentication password is configured.
Command History
Release A2.04 Command was introduced.
Usage Examples
The following example specifies that user 4444 will use the password Password for authentication: (config)#voice user 4444 (config-4444)#sip-authentication password Password
60000CRG0-35B
3315
sip-identity
Use the sip-identity command to configure the Session Initiation Protocol (SIP) registration options for the user. Use the no form of this command to disable the settings. Variations of this command include the following:
sip-identity <station> <Txx> sip-identity <station> <Txx> register sip-identity <station> <Txx> register auth-name <username> password <password>
Syntax Description
<station> <Txx> register Specifies the station to be used for SIP trunk (e.g., station extension). Specifies the SIP trunk through which to register the server. The trunk is specified in the format Txx (e.g., T01). Registers the user to the server.
auth-name <username> Optional. Sets the user name that will be required as authentication for registration to the SIP server. password <password> Optional. Sets the password that will be required as authentication for registration to the SIP server.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example specifies trunk T02 and extension 4400 for SIP identity: (config)#voice user 4444 (config-4444)#sip-identity 4400 T02
60000CRG0-35B
3316
sip-keep-alive
Use the sip-keep-alive command to configure the type of keep-alive method for this Session Initiation Protocol (SIP) trunk. Keep-alive messages must be sent between SIP device and the registrar to keep the connected channel open for communication. Use the no form of this command to return to the default setting. Variations of this command include the following:
sip-keep-alive info sip-keep-alive info <value> sip-keep-alive options sip-keep-alive options <value>
Syntax Description
info options <value> Specifies the INFO method to be used for the keep-alives on the trunk. Specifies the OPTIONS method to be used for the keep-alives on the trunk. Optional. Specifies the amount of time in seconds between the type of SIP keep-alive messages being sent during a call. Range is 30 to 3600 seconds.
Default Values
By default, this command is not configured.
Command History
Release 13.1 Release A2.04 Command was introduced Command was added to the Voice Line and Voice User command sets.
Usage Examples
The following example sets the keep-alive method to info: (config)#voice user 4444 (config-4444)#sip-keep-alive info
60000CRG0-35B
3317
special-ring-cadences
Use the special-ring-cadences command to enable special ring cadences for this user. This command allows the user to be alerted with a distinctive ring. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example enables special ring cadences for user 4444: (config)#voice user 4444 (config-4444)#special-ring-cadences
60000CRG0-35B
3318
speed-dial <number>
Use the speed-dial command to assign a number (1 through 20) to the user. The speed dial number allows the user to call each other by simply dialing 1- or 2-digit numbers. Use the no form of this command to disable this feature. Syntax Description
<number> Specifies the speed dial number for the user. Select from numbers 1 through 20.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example assigns a speed-dial number to user 4444: (config)#voice user 4444 (config-4444)#speed-dial 2
60000CRG0-35B
3319
station-lock
Use the station-lock command to lock the (station) against inbound or outbound calls. Locking a station will restrict phone privileges. Use the no form of this command to disable this feature. Variations of this command include:
station-lock admin station-lock admin inbound station-lock admin inbound-outbound station-lock user station-lock user inbound station-lock user inbound-outbound
Syntax Description
admin user inbound inbound-outbound Allows the administrator to block calls. Allows the user to block calls. Optional. Blocks inbound calls. Optional. Blocks both inbound and outbound calls.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example configures an administrator inbound and outbound station lock: (config)#voice user 4444 (config-4444)#station-lock admin inbound-outbound
60000CRG0-35B
3320
t38
Use the t38 command to enable T.38 fax operation. Use the no form of this command to disable this feature. The command modem-passthrough on page 3299 must be enabled for T.38 operation to work.
Syntax Description
No subcommands.
Default Values
By default, T.38 is disabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables T.38 for user 4444: (config)#voice user 4444 (config-4444)#t38
Technology Review
T.38 is an International Telecommunication Union (ITU) specification that allows Group-3 Fax (T.30) data to be transported over the Internet. It is similar to dual tone multi-frequency (DTMF) relay (RFC 2833) in that the digital signal processor (DSP) decodes tones and demodulated fax data and converts them into packets. A similar device on the other end takes the packets/tones and remodulates them so that an analog fax machine on the other end can receive the fax. AOSs previous support (revisions 12 through 15) for fax/modem signals was simply detecting a tone and forcing the coder-decoder (CODEC) into G.711 and disabling/enabling echo cancellers based on the tones detected. When packet loss becomes high, sending faxes over G.711 becomes problematic, due to dropped messages and timeouts/retrains. T.38 can be used in conjunction with various call-control schemes, such as H.323, Session Initiation Protocol (SIP), and Media Gateway Control Protocol (MGCP). AOS only supports SIP as the call-control method. This is typically referred to T.38/Annex-D. Annex-D describes the Session Initiation Protocol/Session Description Protocol (SIP/SDP) call establishment procedures.
60000CRG0-35B
3321
t38 error-correction
Use the t38 error-correction command to specify the type of fax error correction. Use the no form of this command to disable this feature. Variations of this command include:
t38 error-correction fec t38 error-correction redundancy
Syntax Description
fec Specifies forward error correction (FEC) as the fax error correction. FEC is a system of error control where the sender adds redundant data to its messages, allowing the receiver to detect and correct errors (within certain bounds) without the need to request additional data from the sender. Specifies redundancy as the fax error correction. Redundancy error correction replicates the payload a user-specified number of times to determine if errors are present. The number of redundant packets is set using the command t38 redundancy on page 3327.
redundancy
Default Values
By default, t38 error-correction is set to redundancy.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 error-correction to fec for user 4444: (config)#voice user 4444 (config-4444)#t38 error-correction fec
60000CRG0-35B
3322
Default Values
By default, t38 fallback-mode is disabled.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables the t38 fallback-mode for voice user 4444: (config)#voice user 4444 (config-4444)#t38 fallback-mode g711
60000CRG0-35B
3323
Default Values
By default, the maximum buffer size is set to 200.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 max-buffer to 100 for user 4444: (config)#voice user 4444 (config-4444)#t38 max-buffer 100
60000CRG0-35B
3324
Default Values
By default, the maximum datagram value is set to 75.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 max-datagram to 100 for user 4444: (config)#voice user 4444 (config-4444)#t38 max-datagram 100
60000CRG0-35B
3325
t38 max-rate
Use the t38 max-rate command to specify the fax maximum rate. The actual transmission rate may be lower than specified rate if the receiving end cannot support the maximum rate. Use the no form of this command to return to the default value. Variations of this command include:
t38 max-rate 14400 t38 max-rate 12000 t38 max-rate 2400 t38 max-rate 4800 t38 max-rate 7200 t38 max-rate 9600
Syntax Description
14400 12000 2400 4800 7200 9600 Specifies 14400 baud/bits as fax maximum rate. Specifies 12000 baud/bits as fax maximum rate. Specifies 2400 baud/bits as fax maximum rate. Specifies 4800 baud/bits as fax maximum rate. Specifies 7200 baud/bits as fax maximum rate. Specifies 9600 baud/bits as fax maximum rate.
Default Values
By default, the maximum fax rate is set to 14400.
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example sets the t38 max-rate to 4800 for user 4444: (config)#voice user 4444 (config-4444)#t38 max-rate 4800
60000CRG0-35B
3326
t38 redundancy
Use the t38 redundancy command to set the number of redundant packets sent when the t38 error-correction redundancy feature is enabled. Use the no form of this command to return to the default value. Variations of this command include:
t38 redundancy high-speed <value> t38 redundancy low-speed <value>
Syntax Description
high-speed <value> Specifies the number of redundant T.38 fax packets to be sent for data messages (high-speed fax machine image data). Range is 0 (no redundancy) to 4 packets. Specifies the number of redundant T.38 fax packets to be sent for the signaling messages (low-speed fax machine protocol). Range is 0 (no redundancy) to 7 packets.
low-speed <value>
Default Values
By default, high-speed and low-speed redundancy values are set to 0 (no redundancy).
Command History
Release 16.1 Command was introduced.
Usage Examples
The following example enables t38 error-correction redundancy and sets the number of redundant data messages to 3 for user 4444: (config)#voice user 4444 (config-4444)#t38 error-correction redundancy (config-4444)#t38 redundancy high-speed 3
60000CRG0-35B
3327
vad
Use the vad command to enable voice activity detection (VAD). VAD blocks out noise categorized as silence during a voice connection. The silent voice packets are not transmitted, allowing bandwidth usage to be reduced. Although VAD saves bandwidth, the quality of the voice call may be compromised. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, VAD is enabled for all voice trunks and users.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example disables VAD for user 4444: (config)#voice user 4444 (config-4444)#no vad
60000CRG0-35B
3328
voicemail
Use the voicemail command to configure the voicemail options for the user. Use the no form of this command to disable the settings. Variations of this command include the following:
voicemail attachment-level <dB> voicemail attachment-level disabled voicemail auth-mode full voicemail auth-mode none voicemail auth-mode password voicemail auto-play voicemail cos <name> voicemail delete-msg-on-email voicemail envelope-play voicemail greeting alternate voicemail greeting default voicemail greeting standard voicemail language-preference English voicemail language-preference FrenchCanadian voicemail language-preference LatinAmSpanish voicemail new-user voicemail notify email voicemail notify email-secondary voicemail notify email attach-message pcm voicemail notify email attach-message pcm max-size <size> voicemail notify email text-only voicemail oper-assist <number> voicemail password <password>
Syntax Description
attachment-level <dB> attachment-level disabled auth-mode full auth-mode none auth-mode password auto-play cos <name> delete-msg-on-email envelope-play greeting alternate greeting default Specifies the number of decibels for voicemail attachment files. Valid entries are -30, -25, -20, -15, or -10 dB. Disables the automatic gain control (AGC) for voicemail attachments. Specifies that the extension and password are required to access voicemail. Specifies that voicemail authentication is disabled. Specifies that the password is required to access voicemail. Only the password is required if set to password authentication mode. Specifies automatic playback of messages when entering the mailbox. Configures the voicemail class of service (CoS) type by entering the name of the selected CoS. Enables deletion of stored voicemail on email attachments. Automatically plays message envelopes during message playback. Specifies the alternate recorded voicemail greeting to be used. Specifies the default voicemail greeting to be used.
60000CRG0-35B
3329
Command Reference Guide greeting standard language-preference English FrenchCanadian LatinAmSpanish new-user notify email
Voice User Account Command Set Specifies the users standard recorded voicemail greeting to be used. Specifies the language of the users voicemail audio prompts. Specifies English as the language of the users voicemail audio prompts. Specifies French Canadian as the language of the users voicemail audio prompts. Specifies Latin American Spanish as the language of the users voicemail audio prompts. Executes the new-user wizard for voicemail configuration. Specifies sending an email notification when a new voicemail is received. This email is sent to the users primary email address specified by the command email <address> on page 3284. Specifies that the email notification is sent to the users secondary email address. This address is specified by the command email-secondary <address> on page 3285. Sends the voicemail as a WAV file attachment to the specified email. The email client must be configured for email options to work. Indicates message sent as email attachment will be in pulse-code modulation (PCM) format. Optional. Indicates truncating email attachments at the specified maximum size in kilobits (kb). Minimum size entry is 10 kb. Sends only a text message to the specified email address. Directs all operator calls to the specified phone number. Creates the password/personal identification number (PIN) that will be required to access voicemail.
secondary
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Release 15.1 Release A2 Release A2.04 Release A4.01 Release A4.03 Command was introduced. Command was expanded. Command was expanded to include the notify email parameters. Command was expanded to include attachment-level parameters. Command was expanded to include auth-mode none parameters. Command was expanded to include the language-preference parameter.
Usage Examples
The following example sets the voicemail CoS for this user to class1: (config)#voice user 4444 (config-4444)#voicemail cos class1
60000CRG0-35B
3330
Once you have entered the voicemail notify schedule command, you are in the notification schedule configuration mode. From this mode you can enter the notify email command to specify whether notifications are sent to the primary or secondary user email address. Use the no form of this command to disable email notification. Variations of this command include:
notify email primary notify email secondary
Syntax Description
<day> Specifies the day of the week for the voicemail notification. Options include: Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, and Sunday. Specifies the time of day voicemail notifications are sent in the HH:MM format. For example, to send a notification at 5:00, enter 05:00. Specifies the voicemail notification time is in the a.m. Specifies the voicemail notification time is in the p.m. Specifies the email notification is sent to the users primary email address. This address is specified using the command email <address> on page 3284. Specifies the email notification is sent to the users secondary email address. This address is specified using the command email-secondary <address> on page 3285.
<HH:MM> am pm primary
secondary
Default Values
By default, no voicemail notification schedule is configured.
Command History
Release 12.1 Release 15.1 Command was introduced. Command was expanded to include the secondary email address.
60000CRG0-35B
3331
Usage Examples
The following example configures a voicemail notification schedule for user 4444. This user is scheduled to receive voicemail notifications on Monday at 3:00 pm by an email sent to the primary email address: (config)#voice user 4444 (config-4444)#voicemail notify schedule monday 03:00 pm Configuring New Schedule monday 03:00 pm. (config-4444-mon-03:00pm)#notify email primary
60000CRG0-35B
3332
60000CRG0-35B
3333
60000CRG0-35B
3334
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: alias <text> on page 64 cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order. entry-filename <name> on page 3336 sip-identity on page 3337
60000CRG0-35B
3335
entry-filename <name>
Use the entry-filename command to enter the extensible markup language (XML) file to use for this auto attendant. Use the no form of this command to disable the setting. Syntax Description
<name> Specifies the name of the XML file name to use for this auto attendant.
Default Values
No default values are necessary for this command.
Command History
Release 13.1 Command was introduced.
Usage Examples
The following example shows the entry-filename command being executed to select the XML file to use for this auto attendant: (config)#voice autoattendant Example 1212 (config-aa1212)#entry-filename Operaa
60000CRG0-35B
3336
sip-identity
Use the sip-identity command to configure Session Initiation Protocol (SIP) registration options for the user. Use the no form of this command to disable the setting. Variations of this command include the following:
sip-identity <station> <Txx> sip-identity <station> <Txx> register sip-identity <station> <Txx> register auth-name <username> password <password>
Syntax Description
<station> <Txx> register Specifies the station to be used for SIP trunk (e.g., station extension). Specifies the SIP trunk through which to register the server. The trunk is specified in the format Txx (e.g., T01). Registers the user to the server.
auth-name <username> Sets the user name that will be required as authentication for registration to the SIP server. password <password> Sets the password that will be required as authentication for registration to the SIP server.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example configures the auto attendant to use extension 5000 as its identity on trunk T02: (config)#voice autoattendant Example 1212 (config-aa1212)#sip-identity 5000 T02
60000CRG0-35B
3337
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the section listed below: cross-connect on page 65 exit on page 71 shutdown on page 80 All other commands for this command set are described in this section in alphabetical order: deliver-member <extension> on page 3339 dequeue-extension on page 3340 description <text> on page 3341 digit-action dial-extension <extension> on page 3342 greeting on page 3343 lock on page 3344 login-member <extension> on page 3345 max-number-calls <number> on page 3346 max-wait-time <seconds> on page 3347 member <extension> on page 3348 name <queue> on page 3349 overflow-extension <extension> on page 3350 prefix <characters> on page 3351 rest-period <seconds> on page 3352 ringback-only on page 3353 ring-time on page 3354
60000CRG0-35B
3338
deliver-member <extension>
Use the deliver-member command to send a call to a member extension even though that member is currently on the phone. Use the no version of this command to disable this feature. Syntax Description
<extension> Specifies the member extension.
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sends a call to the member at extension 6535: (config)# voice queue 6407 (config-6407)# deliver-member 6535
60000CRG0-35B
3339
dequeue-extension
Use the dequeue-extension command to set the dequeue extension for a call queue. People who are not members of the queue can call the dequeue extension to answer queued calls. Use the no version of this command to remove the dequeue extension. Syntax Description
<extension> Specifies the extension to be used as the dequeue extension.
Default Values
By default, no dequeue-extension is specified.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sets the dequeue extension of the call queue to 7900: (config)# voice queue 6407 (config-6407)#dequeue-extension 7900
60000CRG0-35B
3340
description <text>
Use the description command to define a description for the call queue. Use the no version of this command to remove the description. Syntax Description
<text> Describes the call queue.
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sets the call queues description to tech support queue: (config)# voice queue 6407 (config-6407)#description tech support queue
60000CRG0-35B
3341
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sets the digit-action dial-extension for the call queue to 5150: (config)# voice queue 6407 (config-6407)#digit-action dial-extension 5150
60000CRG0-35B
3342
greeting
Use the greeting command to configure all greeting types associated with the call queuing feature to use a greeting other than the system default. Use the no version of this command to restore the system defaults.Variations of this command include:
greeting periodic <number> <file> greeting periodic <number> <file> time <seconds> greeting periodic disabled greeting pickup <file> greeting pickup disabled greeting welcome <file> greeting welcome disabled
Syntax Description
<number> <file> disabled periodic pickup time <seconds> welcome Specifies the index of the greeting to be configured. Specifies the file name to be used as the greeting. Disables the greeting type. Configures a call queue periodic greeting. Configures a call queue pickup greeting. Specifies the number of seconds between periodic greetings. The valid range is 0 to 3600 seconds. Configures a call queue welcome greeting.
Default Values
By default, AOS uses system default periodic, pickup, and welcome greetings.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sets the first periodic greeting for a call queue to file1: (config)# voice queue 6407 (config-6407)#greeting periodic 1 file1
60000CRG0-35B
3343
lock
Use the lock command to prevent new calls from entering the call queue. Use the no version of this command to unlock the call queue. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example locks the call queue: (config)# voice queue 6407 (config-6407)#lock
60000CRG0-35B
3344
login-member <extension>
Use the login-member command to log an existing queue member into the call queue. Use the no version of this command to log a member out of the call queue. Syntax Description
<extension> Specifies the extension of the call queue member.
Default Values
By default, members are logged out of the call queue.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example logs existing queue member 6535 into the call queue: (config)# voice queue 6407 (config-6407)# login-member 6535
60000CRG0-35B
3345
max-number-calls <number>
Use the max-number-calls command to define the maximum number of calls allowed in the call queue. Use the no version of this command to restore the system default. Syntax Description
<number> Specifies the maximum number of calls allowed in the call queue. The range for this command is dependent upon the NetVanta unit and will be reflected in an error message if the range is exceeded.
Default Values
By default, 16 calls are allowed in the call queue.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sets the maximum number of calls allowed in the queue to 10: (config)# voice queue 6407 (config-6407)#max-number-calls 10
60000CRG0-35B
3346
max-wait-time <seconds>
Use the max-wait-time command to define the maximum amount of time a call can wait in the queue before being sent to the overflow extension. If no overflow extension is set, the call will remain in the queue until it is answered or the caller hangs up. Use the no version of this command to restore the default value. Syntax Description
<seconds> Indicates the maximum wait time in seconds, with a range from 30 to 6400.
Default Values
By default, the max-wait-time is 3600 seconds.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sets the call queues maximum wait time to 900 seconds: (config)# voice queue 6407 (config-6407)#max-wait-time 900
60000CRG0-35B
3347
member <extension>
Use the member command to add members to a call queue. Use the no version of this command to remove the member from the queue. Syntax Description
<extension> Specifies the extension of the member to be added.
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example adds extension 6535 as a member of the call queue: (config)# voice queue 6407 (config-6407)#member 6535
60000CRG0-35B
3348
name <queue>
Use the name command to define the name of a call queue. Use the no version of this command to remove the name of the queue. Syntax Description
<queue> Specifies the name of the call queue.
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example defines the name of the call queue on extension 6407 as TSQueue: (config)# voice queue 6407 (config-6407)#name TSQueue
60000CRG0-35B
3349
overflow-extension <extension>
Use the overflow-extension command to define the extension to which a queued caller will be forwarded if the call queue is not available. This includes when the queue is locked, shutdown, at maximum capacity, or the call has been in queue past the maximum wait time. Use the no version of this command to remove the overflow extension. Syntax Description
<extension> Specifies the extension to which callers will be forwarded.
Default Values
By default, if no overflow extension is specified, queued calls will be dropped.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sets the overflow extension for the call queue to 5309: (config)# voice queue 6407 (config-6407)#overflow-extension 5309 (config-6407)#
60000CRG0-35B
3350
prefix <characters>
Use the prefix command to define the characters that are pre-pended to calls coming into the call queue. The prefix is displayed along with the calling number in the call queue members caller ID. Use the no version of this command to restore the system default. Syntax Description
<characters> Specifies the characters to be prepended to queued calls.
Default Values
By default, AOS pre-pends CQ_ to all calls entering the call queue.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sets the prefix for the call queue to TSQ: (config)# voice queue 6407 (config-6407)#prefix TSQ
60000CRG0-35B
3351
rest-period <seconds>
Use the rest-period command to set the rest period for a call queue. The rest period is the amount of time after hanging up before another queued call can be sent to the member extension. Use the no version of this command to restore the system default. Syntax Description
<seconds> Specifies the length of the rest period, from 0 to 600 seconds.
Default Values
By default, the rest period is 120 seconds.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sets the call queues rest period to 60 seconds: (config)# voice queue 6407 (config-6407)#rest-period 60
60000CRG0-35B
3352
ringback-only
Use the ringback-only command to set the call queue to ringback-only mode. Queued calls will hear only ringback instead of hold music and greetings, conserving system resources. Use the no version of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, the ringback-only mode is disabled and the full-featured queue is available.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sets the call queue to ringback only mode: (config)# voice queue 6407 (config-6407)#ringback-only
60000CRG0-35B
3353
ring-time
Use the ring-time command to define the time (in seconds) that outbound calls from the call queue are allowed to ring logged-in members. Use the no version of this command to restore the system default. Syntax Description
<seconds> Specifies the ring-time, from 0 (unlimited) to 60 seconds..
Default Values
By default, the ring-time is 30 seconds.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sets the ring time for the call queue to 60 seconds: (config)# voice queue 6407 (config-6407)#ring-time 60
60000CRG0-35B
3354
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: do on page 69 exit on page 71 All other commands for this command set are described in this section in alphabetical order. coverage on page 3356 default on page 3358
60000CRG0-35B
3355
coverage
Use the coverage command to configure global call coverage parameters for the AOS unit. The call coverage setting determines how a call is handled if the dialed party does not answer after a specified number of rings. Use the no form of this command to remove an individual coverage parameter. Variations of this command include:
coverage aa coverage aa <number> coverage internal <number> coverage internal <number> num-rings <value> coverage operator coverage operator num-rings <value> coverage override external <number> coverage override global <name> coverage override internal <number> coverage override internal <number> num-rings <value> coverage override operator coverage override operator num-rings <value> coverage override vm coverage override vm <number> coverage vm coverage vm <number> coverage <system mode> aa coverage <system mode> aa <number> coverage <system mode> external <number> coverage <system mode> internal <number> coverage <system mode> internal <number> num-rings <value> coverage <system mode> operator coverage <system mode> operator num-rings <value> coverage <system mode> vm coverage <system mode> vm <number>
Syntax Description
<system mode> Optional. Specifies the system mode to configure for call coverage. Choose from custom1, custom2, custom3, lunch, night, or weekend. Refer to the Functional Notes of this command for more information on configuring system modes. Forwards the call to the default auto attendant. Forwards the call to a specific extension programmed for the auto attendant. If no extension is specified, the phone is forwarded to the default auto attendant. Forwards the call to the specified external number. If no number is entered, the default auto answer is used. Forwards the call to the specified internal number.
aa aa <number>
60000CRG0-35B
3356
Voice Coverage Command Set Optional. Specifies the number of rings for the call before performing the next action. Valid range is 1 to 9. Forwards the call to the operator. Ignores the programmed system mode schedule. Forwards the call to voicemail. Optional. Forwards the phone to the specified mailbox number.
Default Values
By default, no system mode call coverage is specified.
Command History
Release 9.3 Release 11.1 Release 12.1 Release A1 Command was introduced. Command was updated to include the voicemail and number of rings options. Command was updated to include the auto attendant, global, and operator options. Command was updated to include the system mode feature options.
Functional Notes
System mode call coverage provides more diverse functionality for call handling. In previous versions of AOS (revision 15.1 or earlier), up to five coverage modes were allowed. Calls were processed in the order in which the coverage options were entered into the system. With the addition of the system mode options, up to five coverage options per system mode are allowed. The system modes can be modified using the command voice system-mode on page 1320.
Usage Examples
The following example specifies that the user's phone be forwarded to the internal extension 8500 when in the night system mode after 3 rings. (config)#voice coverage Evening (config-gch)#coverage night internal 8500 num-rings 3
60000CRG0-35B
3357
default
Use the default command to specify the global call coverage list as the default list for the AOS unit. Use the no form of this command to remove the list as the default list. Syntax Description
No subcommands.
Default Values
By default, no global call coverage list is configured.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example specifies that the global call coverage list Evening is the default coverage list and is used for all new users unless coverage is configured on a per-user basis: (config)#voice coverage Evening (config-gch)#default
60000CRG0-35B
3358
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. codec on page 3360 default on page 3362
60000CRG0-35B
3359
codec
Use the codec command to specify the order of preference for coder-decoders (CODECs) used by the CODEC list. Use the no form of this command to remove a CODEC from the CODEC list. Variations of this command include:
codec g711alaw codec g711ulaw codec g722 codec g729
Syntax Description
g711alaw g711ulaw g722 g729 Assigns the G.711 A-Law CODEC (64000 bps) as the preferred CODEC for negotiation. Assigns the G.711 Mu-Law CODEC (64000 bps) as the preferred CODEC for negotiation. Assigns the G.722 CODEC as the preferred CODEC for negotiation. Assigns the G.729 CODEC (8000 bps) as the preferred CODEC for negotiation.
Default Values
By default, no CODEC lists are created.
Command History
Release 9.3 Release 15.1 Release A2.04 Command was introduced. Command was expanded to include the g711alaw parameter. Command was expanded to include the g722 parameter.
Functional Notes
You can enter as many CODECs in the list as necessary by repeating the codec command while in the Voice CODEC List Configuration mode (refer to the Usage Examples section of this command). Order is important when creating a CODEC list. The interface attempts to use the first CODEC in the list to negotiate a call. If the first CODEC negotiation is unsuccessful, the interface uses the second CODEC in the list and so on. If this process is unsuccessful, the call will fail. CODEC lists do not take any action until they are applied to an interface. For information on applying CODEC lists, refer to the codec-group <name> command in the command section of the interface to which you want to apply the list.
60000CRG0-35B
3360
Usage Examples
The following example creates a CODEC list, List1, and specifies that the interface to which this list is applied will use g729 first, g711ulaw second, and g722 third as it negotiates the call: (config)#voice codec-list List1 (config-codec)#codec g729 (config-codec)#codec g711ulaw (config-codec)#codec g722
60000CRG0-35B
3361
default
Use the default command to set the coder-decoder (CODEC) list as the default list for call negotiation on the interface to which it is applied. Use the no form of this command to remove the CODEC list as the default. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 9.3 Command was introduced.
Usage Examples
The following example specifies the CODEC list List1 is used as the default list for call negotiation on the interfaces to which the list is applied: (config)#voice codec-list List1 (config-codec)#default
60000CRG0-35B
3362
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. aa-initiate-permit <template> on page 3365 billing-codes on page 3366 block-caller-id on page 3367 call-privilege on page 3368 camp-on on page 3370 conference on page 3371 default-level on page 3372 deny-template <template> on page 3373 disable-callwaiting on page 3374 dnd on page 3375 door-phone on page 3376 external-fwd on page 3377 forward on page 3378
60000CRG0-35B
3363
hold on page 3379 hotel on page 3380 logout-group on page 3381 message-waiting on page 3382 overhead-paging on page 3383 override-passcode <passcode> on page 3384 park on page 3385 permit template <number> on page 3386 pickup on page 3387 program-user-speed on page 3388 redial on page 3389 remote-fwd on page 3390 rename <name> on page 3391 retrieve-park on page 3392 return-last-call on page 3393 station-lock on page 3394 system-mode on page 3395 system-speed on page 3396 transfer on page 3397 unlock-door on page 3398 user-speed on page 3399
60000CRG0-35B
3364
aa-initiate-permit <template>
Use the aa-initiate-permit command to enable the handsfree auto answer feature. Handsfree voice communication (similar to using a speakerphone or intercom) will be available for the programmed number template. When using aa-initiate-permit, the receiving partys phone automatically answers the phone. Use the no form of this command to disable this feature. Syntax Description
<template> Allows users with the specified number template to initiate auto answer calls.
Default Values
By default, aa-initiate-permit is disabled.
Command History
Release 13.1 Command was introduced.
Functional Notes
In order to place an auto answer call, you must dial ** prior to the number. Users can also program ** as a soft key to dial ** separately before dialing the number to call. Users must dial *971 to block auto answer calls and *970 to reactivate the feature.
Usage Examples
The following example enables the handsfree auto answer for users with the extension range of 4200 to 4299: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#aa-initiate-permit 42xx
60000CRG0-35B
3365
billing-codes
Use the billing-codes command to enable a billing account code collection. If enabled, users must enter a billing code prior to dialing a number. This feature is useful for controlling access to the long distance privileges. Use the no form of this command to disable account code collection. Syntax Description
No subcommands.
Default Values
By default, billing codes are disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example enables account code collection in rule set set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#billing-codes
60000CRG0-35B
3366
block-caller-id
Use the block-caller-id command to conceal caller ID information for outbound calls. Use the no form of this command to allow caller ID for outbound calls. Syntax Description
No subcommands.
Default Values
By default, the block-caller-id feature is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example blocks caller ID for outbound calls in rule set set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#block-caller-id
60000CRG0-35B
3367
call-privilege
Use the call-privilege command to assign general call privileges for outbound access. This determines what type of calls a user is permitted to make as a member of this class of service (CoS). Use the no form of this command to remove general call privileges for outbound access. Variations of this command include:
call-privilege 900-number call-privilege all call-privilege extensions call-privilege international call-privilege local call-privilege long-distance call-privilege operator-assisted call-privilege specify-carrier call-privilege toll-free call-privilege [user1 | user2 | user3]
Syntax Description
900-number all extensions international local long-distance operator-assisted specify-carrier toll-free user1 user2 user3 Permits 900 calls in the form 1-900-NXX-XXXX and 976-XXXX. Permits all calls. Permits internal calls. Permits international calls in the form 011-number. Permits local calls in the form NXX-XXXX. Permits long distance calls in the form 1-NXX-NXX-XXXX. Permits operator-assisted calls. Permits calls that specify carrier. Permits toll free calls. Permits calls that match the first user-defined template. Permits calls that match the second user-defined template. Permits calls that match the third user-defined template. Valid characters include: 0-9 - Any single digit. X - Any single digit 0 through 9. N - Any single digit 2 through 9.
Default Values
By default, no call privileges are enabled.
Command History
Release 10.1 Command was introduced.
60000CRG0-35B
3368
Usage Examples
The following example permits long distance calls in rule set set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#call-privilege long-distance
60000CRG0-35B
3369
camp-on
Use the camp-on command to allow automatic retry of a busy extension. This feature enables a user to reach the busy party as soon as the line is available. Use the no form of this command to disable automatic retry. Syntax Description
No subcommands.
Default Values
By default, the camp-on feature is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example enables automatic retry of a busy extension in rule set set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#camp-on
60000CRG0-35B
3370
conference
Use the conference command to allow the initiation of three-way conference calls. This feature allows multiple parties to communicate at the same time on the same line. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, the three-way conference call feature is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example allows the initiation of three-way conference calls in rule set set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#conference
60000CRG0-35B
3371
default-level
Use the default-level command to set this class of service (CoS) level as the default. When enabled, new users that are added to the system are assigned this CoS by default. To change the default from this CoS level, use the no form of this command. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example sets the rule set set1 as the default CoS level: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#default-level
60000CRG0-35B
3372
deny-template <template>
Use the deny-template command to configure a number template that specifies the types of calls that users in this class of service (CoS) are not allowed to make. Use the no form of this command to remove a deny template. Syntax Description
<template> Specifies a number template. All calls matching this pattern will be denied. Valid characters include: 0-9 - Any single digit. X - Any single digit 0 through 9. N - Any single digit 2 through 9. M - Any single digit 2 through 8. [ ] - Any single digit of those within the brackets. -(), - Punctuation characters that are ignored. For example: 555-81XX matches 555-8100 through 555-8199 and 555-812[0,1,2] matches 555-8120 through 555-8122.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example denies users in rule set set1 the ability to make any call beginning with 555: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#deny-template 555-xxxx
60000CRG0-35B
3373
disable-callwaiting
Use the disable-callwaiting command to allow users to control the call waiting feature. Disabling call waiting will block the alert of an incoming call while the user is on the phone. Use the no form of this command to enable call waiting. Syntax Description
No subcommands.
Default Values
By default, call waiting is enabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example allows users in rule set set1 to disable call waiting: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#disable-callwaiting
60000CRG0-35B
3374
dnd
Use the dnd command to enable do-not-disturb (DND). Do-not-disturb makes the line appear busy to incoming calls. Use the no form of this command to return to the default setting. Syntax Description
No subcommands.
Default Values
By default, the do-not-disturb feature is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example enables the do-not-disturb feature in rule set set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#dnd
60000CRG0-35B
3375
door-phone
Use the door-phone command to allow the user to call the door phone using a special prefix (SPRE) code. Use the no form of this command to deny door phone access. Syntax Description
No subcommands.
Default Values
By default, door phone access is denied.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example allows door phone access in voice class of service (CoS) rule set named set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#door-phone
60000CRG0-35B
3376
external-fwd
Use the external-fwd command to allow forwarding of calls to an external number. When enabled, the users can forward their phones to lines outside the system, such as their home numbers. Use the no form of this command to disable external call forwarding. Syntax Description
No subcommands.
Default Values
By default, forwarding calls to an external number is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example allows users in rule set set1 to forward calls to an external number: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#external-fwd
60000CRG0-35B
3377
forward
Use the forward command to allow users to forward calls to another extension. Forwarding calls allows the user to receive incoming calls at a different number. Use the no form of this command to end call forwarding. Syntax Description
No subcommands.
Default Values
By default, internal call forwarding is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example allows users in rule set set1 to forward calls: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#forward
60000CRG0-35B
3378
hold
Use the hold command to allow users to place calls on standby. Use the no form of this command to disable the call hold option. Syntax Description
No subcommands.
Default Values
By default, the call hold option is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example enables users in rule set set1 to place a call on hold: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#hold
60000CRG0-35B
3379
hotel
Use the hotel command to allow extension reassignment to an alternate phone. Use the no form of this command to disable extension reassignment. Syntax Description
No subcommands.
Default Values
By default, the hotel feature is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example enables users in rule set set1 to reassign an extension to an alternate phone: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#hotel
60000CRG0-35B
3380
logout-group
Use the logout-group command to allow a user to issue a special prefix (SPRE) command to log out of a user group. Use the no form of this command to deny the ability to log out of a user group. Syntax Description
No subcommands.
Default Values
By default, the ability to log out of a user group is denied.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example allows the user in rule set set1 to log out of a user group: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#logout-group
60000CRG0-35B
3381
message-waiting
Use the message-waiting command to allow message waiting indicator control. This allows users to change the manner in which message notification takes place. Use the no form of this command to disable message waiting indicator control. Syntax Description
No subcommands.
Default Values
By default, control of the message waiting indicator is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example allows users in rule set set1 to manage message waiting indicators: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#message-waiting
60000CRG0-35B
3382
overhead-paging
Use the overhead-paging command to allow the user to connect to overhead paging using a special prefix (SPRE) code. Use the no form of this command to deny the ability to connect to overhead paging. Syntax Description
No subcommands.
Default Values
By default, the ability to connect to overhead paging is denied.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example allows the user in rule set set1 to connect to overhead paging: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#overhead-paging
60000CRG0-35B
3383
override-passcode <passcode>
Use the override-passcode command to assign an override passcode. This four-digit code is used in conjunction with the class of service (CoS) override feature and enables a user to override an extensions configured CoS with the new CoS as defined by the passcode. Use the no form of this command to remove an override passcode. Syntax Description
<passcode> Specifies a four-digit numerical passcode.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example sets the override passcode to 1234 in rule set set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#override-passcode 1234
60000CRG0-35B
3384
park
Use the park command to allow users to park calls on the system. Use the no form of this command to disable the call parking feature. Syntax Description
No subcommands.
Default Values
By default, the parking feature is enabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example allows users to park calls in rule set set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#park
60000CRG0-35B
3385
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example allows the number 325-1234 to be dialed in rule set set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#permit template 325-1234
60000CRG0-35B
3386
pickup
Use the pickup command to enable the call pickup feature. If enabled, users with this voice class of service (CoS) applied can enter a special prefix (SPRE) code or group extension to answer calls ringing on another phone. Using the no form of this command disabled the call pickup feature on the CoS. Syntax Description
No subcommands.
Default Values
By default, call pickup is disabled.
Command History
Release A4.01 Command was introduced.
Functional Notes
There are two types of call pickup available: directed call pickup and call pickup groups. Directed call pickup allows a user to answer a ringing phone by dialing a SPRE code in addition to the phones extension. For example, using directed call pickup, a user would dial *528509 where *52 is the call pickup SPRE code and 8509 is the ringing phones extension. Call pickup groups allow the user to dial the group extension to answer the ringing phone. For more information about configuring call pickup, refer to the Configuring the Call Pickup Feature on AOS Voice Products quick configuration guide available online at http://kb.adtran.com.
Usage Examples
The following example enables the call pickup feature in the CoS set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#pickup
60000CRG0-35B
3387
program-user-speed
Use the program-user-speed command to allow users to access speed dial functionality through the system. Use the no form of this command to disable the speed dialing feature. Syntax Description
No subcommands.
Default Values
By default, the speed dial feature is disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example enables the speed dial feature for users in rule set set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#program-user-speed
60000CRG0-35B
3388
redial
Use the redial command to grant users access to the redial functionality, which redials the last outgoing number. Use the no form of this command to disable last number redial. Syntax Description
No subcommands.
Default Values
By default, the last number redial feature is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example enables the last number redial feature in rule set set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#redial
60000CRG0-35B
3389
remote-fwd
Use the remote-fwd command to allow a user to control call forwarding from a remote location. Use the no form of this command to disable remote forwarding. Syntax Description
No subcommands.
Default Values
By default, remote forwarding feature is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example allows users in rule set set1 to enable call forwarding from a remote location: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#remote-fwd
60000CRG0-35B
3390
rename <name>
Use the rename command to assign a new name to the class of service (CoS) rule set. Syntax Description
<name> Specifies the new name of the CoS rule set.
Default Values
No default values are necessary for this command.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example changed the name of rule set set1 to accounting: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#rename accounting (config-cos-accounting)#
60000CRG0-35B
3391
retrieve-park
Use the retrieve-park command to allow the retrieval of parked calls. Use the no form of this command to disable the retrieve parked calls feature. Syntax Description
No subcommands.
Default Values
By default, the retrieve parked calls feature is disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example enables retrieval of parked calls in rule set set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#retrieve-park
60000CRG0-35B
3392
return-last-call
Use the return-last-call command to allow users to return the last call received. Use the no form of this command to disable the return last call received feature. Syntax Description
No subcommands.
Default Values
By default, the return-last-call feature is disabled.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example allows users in rule set set1 to return the last call received: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#return-last-call
60000CRG0-35B
3393
station-lock
Use the station-lock command to allow users to lock an extension, preventing it from making outbound calls. Use the no form of this command to revoke users ability to disable outbound calling capabilities. Syntax Description
No subcommands.
Default Values
By default, the station-lock feature is disabled. Users are not allowed to block their extensions capability to place outbound calls.
Command History
Release 10.1 Command was introduced.
Usage Examples
The following example enables the station-lock feature in rule set set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#station-lock
60000CRG0-35B
3394
system-mode
Use the system-mode command to enable the system mode feature for this class of service (CoS). Once enabled, users to whom this CoS is applied can activate different system modes on the unit via the command line interface (CLI), special prefix (SPRE) codes, auto attendant, or the Web-based graphical user interface (GUI). Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release A1 Command was introduced.
Usage Examples
The following example enables the system mode feature for users with the applied CoS set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#system-mode
60000CRG0-35B
3395
system-speed
Use the system-speed command to enable system speed dial usage for the system. Use the no form of this command to disable the system speed setting. Syntax Description
No subcommands.
Default Values
By default, system-speed is enabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example enables configuration of the system speed in rule set set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#system-speed
60000CRG0-35B
3396
transfer
Use the transfer command to allow users to perform call transfers. Use the no form of this command to disable call transfers. Syntax Description
No subcommands.
Default Values
By default, the call transfer feature is disabled.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example allows users in rule set set1 to perform call transfers: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#transfer
60000CRG0-35B
3397
unlock-door
Use the unlock-door command to enable the user to use a special prefix (SPRE) code to control the door contact. Use the no form of this command to disable door contact operation. Syntax Description
No subcommands.
Default Values
By default, door contact operation is disabled.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example enables door contact operation in rule set set1: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#unlock-door
60000CRG0-35B
3398
user-speed
Use the user-speed command to allow users to program speed dial numbers. Use the no form of this command to deny this privilege. Syntax Description
No subcommands.
Default Values
By default, user speed dial programming is not allowed.
Command History
Release 11.1 Command was introduced.
Usage Examples
The following example allows users in rule set set1 to program speed dial numbers: (config)#voice class-of-service set1 Configuring Existing Level set1. (config-cos-set1)#user-speed
60000CRG0-35B
3399
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69
60000CRG0-35B
3400
All other commands for this command set are described in this section in alphabetical order. action <number> email on page 3402 action <number> external <phone number> on page 3403 action <number> internal <extension> on page 3404 action <number> refer <extension> on page 3405 action <number> vm on page 3406 description <text> on page 3407
60000CRG0-35B
3401
Syntax Description
<number> primary secondary Specifies the order number for the action. Valid range is 1 to 10. Specifies that the email is sent to the users primary email address. Specifies that the email is sent to the users secondary email address.
Default Values
By default, no action lists are configured.
Command History
Release A4.01 Command was introduced.
Functional Notes
This action sends an email to the called partys primary or secondary email address. These addresses are specified in the user account configuration mode using the commands email <address> on page 3284 and email-secondary <address> on page 3285.
Usage Examples
The following example specifies that the first action for the action script Business, in user 4444s FindMe-FollowMe configuration, is to send a notification email to the users primary email address: (config)#voice user 4444 (config-4444)#script Business (config-4444-sc-Business)#action 1 email primary
60000CRG0-35B
3402
Syntax Description
<number> <phone number> press-to-accept no-press-to-accept ring-time <seconds> Specifies the order number for the action. Valid range is 1 to 10. Specifies the external number to ring. Specifies that the called party is prompted to enter a digit to answer the call, generally selecting 1 to accept the call. Specifies that the called party is not prompted to enter a digit to answer the call. Optional. Specifies the time (in seconds) that FindMe-FollowMe rings the external number before moving on to the next action in the list. Range is 1 to 60 seconds.
Default Values
By default, no external numbers are specified and the ring time is set to 24 seconds.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies that the first action for the action script Business, in user 4444s FindMe-FollowMe configuration, is to ring the external number of 12565550980. For this action, the called party presses a digit to answer the call, and the ring time is specified at 30 seconds: (config)#voice user 4444 (config-4444)#script Business (config-4444-sc-Business)#action 1 external 12565550980 press-to-accept ring-time 30
60000CRG0-35B
3403
Syntax Description
<number> <extension> press-to-accept no-press-to-accept ring-time <seconds> Specifies the order number for the action. Valid range is 1 to 10. Specifies the internal extension to ring. Specifies that the called party is prompted to enter a digit to answer the call, generally selecting 1 to accept the call. Specifies that the called party is not prompted to enter a digit to answer the call. Optional. Specifies the time (in seconds) that FindMe-FollowMe rings the external number before moving on to the next action in the list. Range is 1 to 60 seconds.
Default Values
By default, no internal numbers are specified and the ring time is set to 24 seconds.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies that the first action for the action script Business, in user 4444s FindMe-FollowMe configuration, is to ring the internal extension of 8989. For this action, the called party presses a digit to answer the call, and the ring time is specified at 30 seconds: (config)#voice user 4444 (config-4444)#script Business (config-4444-sc-Business)#action 1 internal 8989 press-to-accept ring-time 30
60000CRG0-35B
3404
Default Values
By default, no action scripts are configured.
Command History
Release A4.01 Command was introduced.
Functional Notes
When a refer action is added to the action script, no other actions are performed after the refer. When a FindMe-FollowMe call is referred to another user, the call no longer uses the FindMe-FollowMe action script, but rather uses the call coverage configured for the user to which the call was referred.
Usage Examples
The following example specifies that the fifth and final action for the action script Business, in user 4444s FindMe-FollowMe configuration, is to refer the call to user 1234. When the call is accepted by extension 1234, the call follows the call coverage configured for that user. (config)#voice user 4444 (config-4444)#script Business (config-4444-sc-Business)#action 5 refer 1234
60000CRG0-35B
3405
action <number> vm
Use the action <number> vm command to specify that FindMe-FollowMe sends the caller to voicemail. Use the no form of this command to remove the action from the action script. Variations of this command include:
action <number> vm action <number> vm <mailbox>
Syntax Description
<number> <mailbox> Specifies the order number for the action. Valid range is 1 to 10. Optional. Sends the caller to a specific voice mailbox, rather than the users mailbox.
Default Values
By default, the call is sent to the users voice mailbox unless another mailbox is specified.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies that the fourth action for the action script Business, in user 4444s FindMe-FollowMe configuration, is to send the call to the users voice mailbox: (config)#voice user 4444 (config-4444)#script Business (config-4444-sc-Business)#action 4 vm
60000CRG0-35B
3406
description <text>
Use the description command to enter a short description of the action script. This description can be useful when you have multiple scripts and contact groups configured. Use the no form of this command to remove the description. Syntax Description
<text> Describes the action script. The text should be enclosed in quotation marks.
Default Values
By default, no action scripts are configured.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example creates a description (New Business Contacts) for the action script Business (in user 4444s FindMe-FollowMe configuration): (config)#voice user 4444 (config-4444)#script Business (config-4444-sc-Business)#description New Business Contacts
60000CRG0-35B
3407
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 All other commands for this command set are described in this section in alphabetical order. courtesy-greeting on page 3410 digit-prompt on page 3411 group-description <text> on page 3412 implicitly-allow on page 3413 permit-caller-id number <number> on page 3414 presence available script <name> on page 3415 record-calling-name on page 3416
60000CRG0-35B
3408
60000CRG0-35B
3409
courtesy-greeting
Use the courtesy-greeting command to enable a courtesy greeting for the inbound caller while FindMe-FollowMe performs actions to locate the called party. The courtesy greeting provided by AOS tells callers to Please wait while I locate your party. Using the no form of this command disables the courtesy greeting. Syntax Description
No subcommands.
Default Values
By default, the courtesy greeting is enabled.
Command History
Release A4.01 Command was introduced.
Functional Notes
If ringback is enabled in the FindMe-FollowMe contact group, then all prompts and greetings are ignored.
Usage Examples
The following example disables the courtesy greeting for contact group 2 in voice user 4444s FindMe-FollowMe configuration: (config)#voice user 4444 (config-4444)#contact-group 2 (config-4444-cg-2)#no courtesy-greeting
60000CRG0-35B
3410
digit-prompt
Use the digit-prompt command to enable dual tone multi-frequency (DTMF) digit prompting for the FindMe-FollowMe contact group. When DTMF digit prompting is enabled, inbound callers can control the incoming call using DTMF tones. When callers hear the prompt To leave a voicemail at any time, press 1, they can then press 1 to leave a voicemail message. Using the no form of this command disables DTMF digit prompting for the contact group. Syntax Description
No subcommands.
Default Values
By default, DTMF digit prompting is disabled in FindMe-FollowMe.
Command History
Release A4.01 Command was introduced.
Functional Notes
To use DTMF digit prompting, enhanced FindMe-FollowMe must be enabled on the user account. Refer to the command findme-followme on page 3286 for more information.
Usage Examples
The following example enables DTMF digit prompting for contact group 2 in voice user 4444s FindMe-FollowMe configuration: (config)#voice user 4444 (config-4444)#contact-group 2 (config-4444-cg-2)#digit-prompt
60000CRG0-35B
3411
group-description <text>
Use the group-description command to enter a short description for the contact group. Using the no form of this command removes the group description. Syntax Description
<text> Describes the contact group. Enter the descriptions in quotation marks.
Default Values
By default, no group description exists.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example describes contact group 2 in voice user 4444s FindMe-FollowMe configuration as Business Contacts: (config)#voice user 4444 (config-4444)#contact-group 2 (config-4444-cg-2)#group-description Business Contacts
60000CRG0-35B
3412
implicitly-allow
Use the implicitly-allow command to specify the callers that are implicitly allowed into the users FindMe-FollowMe contact group. Using the no form of this command removes implicit users from the contact group. Variations of this command include:
implicitly-allow all implicitly-allow external implicitly-allow internal
Syntax Description
all external internal Specifies that all callers are implicitly included in the contact group. Specifies that only external callers are implicitly included in the contact group. Specifies that only internal callers are implicitly included in the contact group.
Default Values
By default, no users are included implicitly in a contact group.
Command History
Release A4.01 Command was introduced.
Usage Examples
In the following example, external callers are implicitly included in contact group 2 for voice user 4444s FindMe-FollowMe configuration: (config)#voice user 4444 (config-4444)#contact-group 2 (config-4444-cg-2)#implicitly-allow external
60000CRG0-35B
3413
Syntax Description
<number> <description> Specifies the calling number of the known member to add to the contact group. Optional. Specifies a short description of the member to add to the group. Descriptions should be in quotation marks.
Default Values
By default, no members are explicitly included in the contact group.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example adds the member Company A VIP (who calls from number 12565557890) to contact group 2 of voice user 4444s FindMe-FollowMe configuration: (config)#voice user 4444 (config-4444)#contact-group 2 (config-4444-cg-2)#permit-caller-id number 12565557890 Company A VIP
60000CRG0-35B
3414
Default Values
By default, no action scripts are associated with the contact group.
Command History
Release A4.01 Command was introduced.
Functional Notes
FindMe-FollowMe works by executing actions to locate the called party. These actions are determined by configuring action scripts for each contact group. Each contact group can have 1 action script associated with it, and each action script can support up to 10 actions. For more information about configuring FindMe-FollowMe action scripts, refer to FindMe-FollowMe Action Script Command Set on page 3400.
Usage Examples
In the following example, the action script Business is associated with contact group 2 in voice user 4444s FindMe-FollowMe configuration: (config)#voice user 4444 (config-4444)#contact-group 2 (config-4444-cg-2)#presence available script Business
60000CRG0-35B
3415
record-calling-name
Use the record-calling-name command to enable a prompt that asks incoming callers to record their names. When the name recording option is enabled, the system records 3 seconds of audio before moving on to other scripts or actions. Using the no form of this command disables the name recording feature. Syntax Description
No subcommands.
Default Values
By default, callers are not prompted to record their names.
Command History
Release A4.01 Command was introduced.
Functional Notes
When ringback is enabled for the contact group, all prompts and greetings are ignored.
Usage Examples
The following example enables caller name recording in contact group 2 of voice user 4444s FindMe-FollowMe configuration: (config)#voice user 4444 (config-4444)#contact-group 2 (config-4444-cg-2)#record-calling-name
60000CRG0-35B
3416
ringback
Use the ringback command to enable ringback for the contact group. When ringback is enabled, inbound FindMe-FollowMe calls are only answered when an outbound call is answered or if one of the FindMe-FollowMe actions requires the call to be answered (for example, voicemail). If ringback is disabled, then the call is answered immediately, any configured greetings are played, and music on hold is eventually played while the called party is located. Using the no form of this command disables ringback. Syntax Description
No subcommands.
Default Values
By default, ringback is disabled.
Command History
Release A4.01 Command was introduced.
Functional Notes
Ringback must be disabled for any contact group configured prompts or greetings to be played. However, using the prompts and greetings can drain system resources. ADTRAN recommends you use ringback as much as possible to save these resources.
Usage Examples
The following example enables ringback for contact group 2 in voice user 4444s FindMe-FollowMe configuration: (config)#voice user 4444 (config-4444)#contact-group 2 (config-4444-cg-2)#ringback
60000CRG0-35B
3417
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the section listed below: cross-connect on page 65 exit on page 71 All other commands for this command set are described in this section in alphabetical order: default on page 3419 file <filename> on page 3420
60000CRG0-35B
3418
default
Use the default command to set the current music on hold (MOH) player as the default player. Use the no version of this command to restore the system default. Default Values
By default, the system player is set as the default player.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sets the player moh1 as the default MOH player: (config)#voice music-on-hold player moh1 (config-moh1)#default
60000CRG0-35B
3419
file <filename>
Use the file command to add music files to a music on hold (MOH) player. Use the no version of this command to remove the file from the MOH player. Syntax Description
<filename> Specifies the name of the music file to be added to the MOH player.
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example adds the file named holdmusic1.wav to the MOH player: (config)#voice music-on-hold player moh1 (config-moh1)#file holdmusic1.wav
60000CRG0-35B
3420
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: do on page 69 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. accept <template> on page 3422 expire-time <seconds> on page 3424 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 3425 proxy-mode on page 3426 reject <template> on page 3427 target <host> on page 3429
60000CRG0-35B
3421
accept <template>
Use the accept command to specify a number pattern to match to a user ID and add the user to the Session Initiation Protocol (SIP) Proxy user database. Once the accept entry is added to the proxy user template, SIP messages are permitted and routed on the proxy server for the identified user. Use the no form of this command to remove a configured template entry from the proxy user template.
AOS will process the reject patterns before the accept patterns, regardless of the order they appear in the configuration of the proxy user template. Refer to reject <template> on page 3427 for additional information. Syntax Description
<template> Specifies the patterns to match to a proxy user and allow the user as an entry to the SIP Proxy user database. You can enter a complete phone number, or use wildcards to define accepted numbers. Refer to Functional Notes below for more information on using wildcards.
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Functional Notes
The available wildcards for this command are: 0-9 = Match exact digit only. X = Match any single digit 0 through 9. N = Match any single digit 2 through 9. M = Match any single digit 1 through 8. $ = Match any number string dialed. [ ] = Match any digit contained in the bracketed list (for example: [146] will match 1, 4, or 6). Rules: The following rules apply to the number templates. 1. Any open bracket must have a corresponding closing bracket to complete the statement. 2. Use only numbers inside brackets. Do not use dashes, spaces, wildcards, or other special characters inside the brackets. Commas can be used in the brackets but are ignored. 3. Bracketed lists cannot be nested. 4. The $ wildcard can only be used as the last character in a template.
60000CRG0-35B
3422
Command Reference Guide Examples: 1) 1234 2) 555-81XX 3) 555-812[012] 4) 1-800$ 5) NXX-XXXX 6) 1-NXX-NXX-XXXX 7) [78]$
matches 1234 exactly. matches 555-8100 to 555-8199. matches 555-8120 to 555-8122. matches any 1-800 numbers. matches 7 digit numbers beginning with 2 through 9. matches long distance calls in North America. matches any length number starting with 7 or 8.
Usage Examples
The following example configures the Set1 proxy user template to permit SIP messages for users with the 256-555 exchange in their ID: (config)#ip sip proxy user-template Set1 (config-template-Set1)#accept 256555XXXX
60000CRG0-35B
3423
expire-time <seconds>
Use the expire-time command to set the number of seconds before a proxy user entry is removed from the SIP proxy user database. In the Proxy User Template command set, this command applies to a user entry created as a result of matching the specified proxy user template. Use the no form of this command to return to the default value of 3600 seconds. Syntax Description
<seconds> Specifies the number of seconds until the user entry expires. Valid range is 30 to 86400 seconds. A value of 0 means the entry will never expire.
Default Values
By default, the expiration time is set to 3600, which means the user entry will be removed from the database after 1 hour.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example sets the expiration time to 7200 seconds (or 2 hours) for the Set1 proxy user template: (config)#ip sip proxy user-template Set1 (config-template-Set1)#expire-time 7200
60000CRG0-35B
3424
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#ip sip proxy user-template Set1 (config-template-Set1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
3425
proxy-mode
Use the proxy-mode command to enable the appropriate Session Initiation Protocol (SIP) proxy operation mode for users added to the SIP proxy user database by the specified proxy user template. Use the no form of this command to return to the default setting. Variations of this command include:
proxy-mode auto proxy-mode outbound-proxy proxy-mode stateful proxy-mode transparent
Syntax Description
auto outbound-proxy stateful transparent Detects the correct proxy mode automatically. Specifies using outbound proxy mode. Specifies using stateful proxy mode. Specifies using transparent proxy mode.
Default Values
By default, this feature is set to auto. The auto setting detects the correct proxy mode for outbound requests based upon how the INVITE is addressed. The correct proxy mode for inbound requests cannot be initially detected until the proxy server has trained using an outbound message from the user. Therefore, in situations where it is essential to correctly identify the proxy mode for inbound messages, it is suggested to specifically configure the proxy-mode for outbound-proxy, stateful, or transparent, whichever is most appropriate for your situation.
Command History
Release A4.01 Command was introduced.
Functional Notes
For more information on the operation and configuration of SIP proxy, refer to the configuration guide Configuring SIP Proxy in AOS (article number 2183) available online at http://kb.adtran.com.
Usage Examples
The following example enables transparent proxy mode operation for users added by the Set1 proxy user template: (config)#ip sip proxy user-template Set1 (config-template-Set1)#proxy-mode transparent
60000CRG0-35B
3426
reject <template>
Use the reject command to specify a number pattern to match to a user ID for rejection from the SIP Proxy user database. If a match is successful, SIP messages are rejected for the matching user. Use the no form of this command to remove a configured template entry from the proxy user template. AOS will process the reject patterns before the accept patterns, regardless of the order they appear in the configuration of the proxy user template. Refer to accept <template> on page 3422 for additional information. Syntax Description
<template> Specifies the patterns to match a proxy user and reject the user as an entry to the SIP proxy user database. You can enter a complete phone number, or wildcards can be used to help define rejected numbers. Refer to Functional Notes below for more information on using wildcards.
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Functional Notes
The available wildcards for this command are: 0-9 = Match exact digit only. X = Match any single digit 0 through 9. N = Match any single digit 2 through 9. M = Match any single digit 1 through 8. $ = Match any number string dialed. [ ] = Match any digit contained in the bracketed list (for example: [146] will match 1, 4, or 6). Rules: The following rules apply to the number templates. 1. Any open bracket must have a corresponding closing bracket to complete the statement. 2. Use only numbers inside brackets. Do not use dashes, spaces, wildcards, or other special characters inside the brackets. Commas can be used in the brackets but are ignored. 3. Bracketed lists cannot be nested. 4. The $ wildcard can only be used as the last character in a template. Examples: 1) 1234 2) 555-81XX 3) 555-812[012]
60000CRG0-35B
3427
matches any 1-800 numbers. matches 7 digit numbers beginning with 2 through 9. matches long distance calls in North America. matches any length number starting with 7 or 8.
Usage Examples
The following example configures the Set1 proxy user template to reject the user matching ID 2565556031 as an entry to the SIP proxy user database: (config)#ip sip proxy user-template Set1 (config-template-Set1)#reject 2565556031
60000CRG0-35B
3428
target <host>
Use the target command to specify the proxy users location. This command indicates the host name or IP address, protocol, and port number to use in locating the proxy user. Use the no form of this command to remove the target configuration. Variations of this command include:
target <host> target <host> tcp target <host> tcp <port> target <host> udp target <host> udp <port>
Syntax Description
<host> Specifies the fully qualified domain name (FQDN) or IP address of the target server. IP addresses should be expressed in dotted decimal notation (for example, 208.61.209.1). Optional. Specifies using Transmission Control Protocol (TCP). Optional. Specifies using User Datagram Protocol (UDP). Optional. Specifies the TCP or UDP port used by the target host. Range is 1 to 65535.
Default Values
By default, no target server is configured. If a target is configured with no protocol or port specified, the proxy server operates using UDP on port 5060. If a protocol is specified, but no port is specified, the proxy server uses port 5060.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example specifies the users matching the proxy user template Set1 are located at IP address 10.10.10.3 and to use UDP port 5061: (config)#ip sip proxy user-template Set1 (config-template-Set1)#target 10.10.10.3 udp 5061
60000CRG0-35B
3429
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: do on page 69 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. default-level on page 3431 expire-time <days> on page 3432 greeting-length-max <time> on page 3433 greeting-quota <time> on page 3434 message-length-max <time> on page 3435 message-quota <time> on page 3436 prompt-delete on page 3437 rename <name> on page 3438
60000CRG0-35B
3430
default-level
Use the default-level command to set the current voicemail class of service (CoS) level as the default level. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release A4.01 Command was introduced.
Usage Examples
The following example configures the voicemail CoS class1 as the default CoS: (config)#voice mail class-of-service class1 Configuring Existing Level "class1". (config-vm-class1)#default-level
60000CRG0-35B
3431
expire-time <days>
Use the expire-time command to set the number of days before a voicemail message expires. Use the no form of this command to return to the default value. Syntax Description
<days> Specifies the number of days until a message expires. Valid range is 5 to 60 days. A value of 0 means messages will never expire.
Default Values
By default, the number of days is set to 0, which means messages will never expire.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example configures the voicemail class of service (CoS) class1 to delete voicemail messages after 14 days: (config)#voice mail class-of-service class1 Configuring Existing Level "class1". (config-vm-class1)#expire-time 14
60000CRG0-35B
3432
greeting-length-max <time>
Use the greeting-length-max command to set the maximum length (in seconds) for a voicemail greeting. Use the no form of this command to return to the default value. Syntax Description
<time> Specifies the length in seconds for a voicemail greeting. Valid range is 20 to 120 seconds.
Default Values
By default, the maximum voicemail greeting time is set to 60 seconds.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example configures the maximum length for a voicemail greeting in rule set class1 to 60 seconds: (config)#voice mail class-of-service class1 Configuring Existing Level "class1". (config-vm-class1)#greeting-length-max 60
60000CRG0-35B
3433
greeting-quota <time>
Use the greeting-quota command to set the maximum storage time (in minutes) of all greeting messages. Use the no form of this command to return to the default value. Syntax Description
<time> Specifies the maximum storage time (in minutes) for the storage of all greeting messages. Valid range is 1 to 9 minutes.
Default Values
By default, the maximum storage time for all greeting messages is 3 minutes.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example configures the maximum storage time for all greeting messages in rule set class1 to 5 minutes: (config)#voice mail class-of-service class1 Configuring Existing Level "class1". (config-vm-class1)#greeting-quota 5
60000CRG0-35B
3434
message-length-max <time>
Use the message-length-max command to set the maximum length (in seconds) for a voicemail message. Use the no form of this command to return to the default value. Syntax Description
<time> Specifies the maximum length (in seconds) for a voicemail message. Valid range is 30 to 600 seconds.
Default Values
By default, the maximum length for a voicemail message is 120 seconds.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example sets the maximum length a voicemail message in rule set class1 to 300 seconds: (config)#voice mail class-of-service class1 Configuring Existing Level "class1". (config-vm-class1)#message-length-max 300
60000CRG0-35B
3435
message-quota <time>
Use the message-quota command to set the maximum storage time (in minutes) of all voicemail messages. Use the no form of this command to return to the default value. Syntax Description
<time> Specifies the maximum storage time (in minutes) of all voicemail messages. Valid range is 1 to 180 minutes.
Default Values
By default, the maximum storage time of all voicemail messages is 10 minutes.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example sets the maximum storage time of all voicemail messages in rule set class1 to 120 minutes: (config)#voice mail class-of-service class1 Configuring Existing Level "class1". (config-vm-class1)#message-quota 120
60000CRG0-35B
3436
prompt-delete
Use the prompt-delete command to configure the unit to prompt the user before deleting messages. Use the no form of this command to disable the prompt before deleting messages. Syntax Description
No subcommands.
Default Values
By default, the prompt before deleting messages is disabled.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example configures the unit to prompt the user before deleting voicemail messages: (config)#voice mail class-of-service class1 Configuring Existing Level "class1". (config-vm-class1)#prompt-delete
60000CRG0-35B
3437
rename <name>
Use the rename command to rename the voicemail class of service (CoS) rule set. Use the no form of this command to return to the previous name. Syntax Description
<name> Specifies the new name of the CoS rule set.
Default Values
No default values are necessary for this command.
Command History
Release 12.1 Command was introduced.
Usage Examples
The following example assigns a new name (class2) to the current CoS rule set class1: (config)#voice mail class-of-service class1 Configuring Existing Level "class1". (config-vm-class1)#rename class2
60000CRG0-35B
3438
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the section listed below: cross-connect on page 65 description <text> on page 68 do on page 69 exit on page 71 shutdown on page 80 All other commands in this command set are described in this section in alphabetical order: collector on page 3440 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 3442 max-queue-depth <value> on page 3443 max-retries <value> on page 3444 outbound-proxy on page 3445 sip grammar on page 3447
60000CRG0-35B
3439
collector
Use the collector command to specify the IP address or host name of the server that will be receiving information from the voice quality monitoring (VQM) reporter. Use the no form of this command to remove the server from the reporters configuration. Variations of this command include:
collector primary <hostname | ip address> collector primary <hostname | ip address> tcp collector primary <hostname | ip address> tcp <port> collector primary <hostname | ip address> udp collector primary <hostname | ip address> udp <port> collector secondary <hostname | ip address> collector secondary <hostname | ip address> tcp collector secondary <hostname | ip address> tcp <port> collector secondary <hostname | ip address> udp collector secondary <hostname | ip address> udp <port>
Syntax Description
primary secondary <hostname | ip address> tcp udp <port> Specifies that the server is the primary contact server for the VQM reporter. Specifies that the server is the secondary contact server for the VQM reporter. Specifies the host name or IP address of the server. IP addresses should be expressed in the decimal dotted notation (for example, 10.10.10.1). Optional. Specifies that the reporter and server communicate using Transmission Control Protocol (TCP). Optional. Specifies that the reporter and server communicate using User Datagram Protocol (UDP). Optional. Specifies the TCP or UDP port used for communication between the reporter and the server. Range is 0 to 65535.
Default Values
By default, no server is configured.
Command History
Release 17.6 Command was introduced.
60000CRG0-35B
3440
Usage Examples
The following example specifies that the VQM reporter uses the server with the IP address of 172.5.67.99 as its primary server: (config)#ip rtp quality-monitoring reporter Reporter1 (config-rtp-reporter-Reporter1)#collector primary 172.5.67.99
60000CRG0-35B
3441
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#ip rtp quality-monitoring reporter Reporter1 (config-rtp-reporter-Reporter1)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
3442
max-queue-depth <value>
Use the max-queue-depth command to specify the number of reports held in queue that are waiting to send requests or receive responses. Use the no form of this command to return the queue depth to the default value. Syntax Description
<value> Specifies the number of reports held in queue. Range is 0 to 2000.
Default Values
By default, the reporter is configured to hold 512 reports in queue.
Command History
Release 17.6 Command was introduced.
Usage Examples
The following example sets the reporter to hold 700 reports in its queue: (config)#ip rtp quality-monitoring reporter Reporter1 (config-rtp-reporter-Reporter1)#max-queue-depth 700
60000CRG0-35B
3443
max-retries <value>
Use the max-retries command to specify the number of times the reporter will attempt to contact the server. Use the no form of this command to return the number of attempts to the default value. Syntax Description
<value> Specifies the number of connection attempts. Range is 0 to 5.
Default Values
By default, the voice quality monitoring (VQM) reporter is set to attempt to connect to the server 3 times.
Command History
Release 17.6 Command was introduced.
Functional Notes
After the reporter has attempted the maximum number of times to contact the server, the reports sent to the server are discarded. You can see how many reports have been discarded by using the command debug ip rtp quality-monitoring reporter on page 291.
Usage Examples
The following example sets the number of connection attempts to 4: (config)#ip rtp quality-monitoring reporter Reporter1 (config-rtp-reporter-Reporter1)#max-retries 4
60000CRG0-35B
3444
outbound-proxy
Use the outbound-proxy command to specify the IP address or host name of the device receiving information from the voice quality monitoring (VQM) reporter before the information is sent to the collector. This command allows you to configure additional devices to receive VQM reporters in addition to a single collector. Using the no form of this command removes the outbound proxy server from the VQM reporter configuration. Variations of this command include:
outbound-proxy primary <hostname | ip address> outbound-proxy primary <hostname | ip address> tcp outbound-proxy primary <hostname | ip address> tcp <port> outbound-proxy primary <hostname | ip address> udp outbound-proxy primary <hostname | ip address> udp <port> outbound-proxy secondary <hostname | ip address> outbound-proxy secondary <hostname | ip address> tcp outbound-proxy secondary <hostname | ip address> tcp <port> outbound-proxy secondary <hostname | ip address> udp outbound-proxy secondary <hostname | ip address> udp <port>
Syntax Description
primary secondary <hostname | ip address> Specifies this outbound proxy server as the primary contact server for the VQM reporter. Specifies this outbound proxy server as the secondary contact server for the VQM reporter. Specifies the host name or IP address of the outbound proxy. IP addresses should be expressed in the decimal dotted notation (for example, 10.10.10.1). Optional. Specifies that the reporter and outbound proxy server communicate using Transmission Control Protocol (TCP). Optional. Specifies that the reporter and outbound proxy server communicate using User Datagram Protocol (UDP). Optional. Specifies the TCP or UDP port used for communication between the reporter and the outbound proxy server. Range is 0 to 65535.
Default Values
By default, no server is configured. By default, the port used by both TCP and UDP is 5060.
Command History
Release A4.03 Command was introduced.
60000CRG0-35B
3445
Usage Examples
The following example specifies that the VQM reporter uses the outbound proxy server with the IP address of 172.5.67.99 as its primary server: (config)#ip rtp quality-monitoring reporter Reporter1 (config-rtp-reporter-Reporter1)#outbound-proxy primary 172.5.67.99
60000CRG0-35B
3446
sip grammar
Use the sip grammar command to specify the user that the voice quality monitoring (VQM) reporter report is coming from and to which user it is going. Use the no form of this command to return the user values to the default. Variations of this command include:
sip grammar from-user <username> sip grammar to-user <username>
Syntax Description
from-user <username> to-user <username> Specifies the user from which the report originates. Specifies the user to which the report is destined.
Default Values
By default, the from-user is set to the units serial number. By default, the to-user is set to the specified server.
Command History
Release 17.6 Command was introduced.
Usage Examples
The following example specifies that the VQM reporter report originates from user 300: (config)#ip rtp quality-monitoring reporter Reporter1 (config-rtp-reporter-Reporter1)#sip grammar from-user 300
60000CRG0-35B
3447
60000CRG0-35B
3448
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. crl optional on page 3450 email address <address> on page 3451 enrollment retry on page 3452 enrollment terminal on page 3453 enrollment url <url> on page 3454 fqdn <name> on page 3455 ip-address <address> on page 3456 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 3457 password <password> on page 3458 serial-number on page 3459 subject-name <name> on page 3460
60000CRG0-35B
3449
crl optional
Use the crl optional command to make certificate revocation list (CRL) verification optional. Syntax Description
No subcommands.
Default Values
By default, CRL optional is enabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
If enabled, AOS is able to accept certificates even if no CRL is loaded into the configuration. Currently, this is the only mode supported by AOS for CRL negotiations.
Usage Examples
The following example sets CRL verification as optional: (config)#crypto ca profile MyProfile Configuring New CA Profile MyProfile (ca-profile)#crl optional
60000CRG0-35B
3450
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
Configuring this setting simplifies the crypto ca enroll dialog, allowing you to enter the email address only once rather than every time you go through the enrollment process. Refer to crypto ca enroll <name> on page 857.
Usage Examples
The following example specifies joesmith@company.com as the email address to be sent in certificate requests: (config)#crypto ca profile MyProfile Configuring New CA Profile MyProfile (ca-profile)#email address joesmith@company.com
60000CRG0-35B
3451
enrollment retry
Use the enrollment retry command to determine how AOS handles certificate requests. Use the no form of this command to return to the default setting. Variations of this command include:
enrollment retry count <number> enrollment retry period <value>
Syntax Description
count <number> period <value> Specifies the number of times AOS re-sends a certificate request when it does not receive a response from the previous request. Range is 1 to 100. Specifies the time period between certificate request retries. The default is 1 minute between retries. Range is 1 to 60 minutes.
Default Values
By default, period is set to 5 minutes, and count is set to 12 retries.
Command History
Release 5.1 Command was introduced.
Usage Examples
The following example configures AOS to send certificate requests every 2 minutes, stopping after 50 retries (if no response is received): (config)#crypto ca profile MyProfile Configuring New CA Profile MyProfile (ca-profile)#enrollment retry count 50 (ca-profile)#enrollment retry period 2
60000CRG0-35B
3452
enrollment terminal
Use the enrollment terminal command to specify manual (i.e., cut-and-paste) certificate enrollment. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, this command is enabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
This mode is overridden if the enrollment url command specifies the certificate authority (CA) to which automatic certificate requests are to be sent via Simple Certificate Exchange Protocol (SCEP). Issuing an enrollment terminal command after using the enrollment url command deletes the uniform resource locator (URL) and forces the unit to use manual enrollment. Refer to enrollment url <url> on page 3454 for more information.
Usage Examples
The following example configures AOS to accept manual certificate enrollment input: (config)#crypto ca profile MyProfile Configuring New CA Profile MyProfile (ca-profile)#enrollment terminal
60000CRG0-35B
3453
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
When entering the URL, http:// is required followed by the IP address or domain naming system (DNS) of the CA. If the port number is something other than 80, include it after the IP address or DNS name separated with a colon (:). The CA may have other necessary information to include in the common gateway interface (CGI) path before ending with the actual CGI program. An example template to follow is http://hostname:port/path/to/program.exe. Use the default program pkiclient.exe without specifying it, end the URL with a slash (/). Otherwise, you must enter the program name to use. For example, http://10.10.10.1:400/abcdefg/ will assume pkiclient.exe as the program (but not including the terminating slash is a configuration error). Specifying this command will override the enrollment terminal setting as described previously (refer to enrollment terminal on page 3453).
Usage Examples
The following example specifies http://CAserver/certsrv/mscep/mscep.dll as the URL to which AOS will send certificate requests: (config)#crypto ca profile MyProfile Configuring New CA Profile MyProfile (ca-profile)#enrollment url http://CAserver/certsrv/mscep/mscep.dll
60000CRG0-35B
3454
fqdn <name>
Use the fqdn command to specify a fully qualified domain name (FQDN) to be included in the certificate requests. Use the no form of this command to remove an FQDN. Syntax Description
<name> Specifies the FQDN (e.g., company.com) to be included in requests.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
Configuring this setting simplifies the crypto ca enroll dialog, allowing you to enter the FQDN only once rather than every time you go through the enrollment process. Refer to crypto ca enroll <name> on page 857.
Usage Examples
The following example specifies company.com as the FQDN to be sent in certificate requests: (config)#crypto ca profile MyProfile Configuring New CA Profile MyProfile (ca-profile)#fqdn company.com
60000CRG0-35B
3455
ip-address <address>
Use the ip-address command to specify an IP address to be included in the certificate requests. Use the no form of this command to remove a defined IP address. Syntax Description
<address> Specifies a valid IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
Configuring this setting simplifies the crypto ca enroll dialog, allowing you to enter the IP address only once rather than every time you go through the enrollment process. Refer to crypto ca enroll <name> on page 857.
Usage Examples
The following example specifies 66.203.52.193 as the IP address to be sent in certificate requests: (config)#crypto ca profile MyProfile Configuring New CA Profile MyProfile (ca-profile)#ip-address 66.203.52.193
60000CRG0-35B
3456
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#crypto ca profile MyProfile Configuring New CA Profile MyProfile (ca-profile)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
3457
password <password>
Use the password command to specify the challenge password for Simple Certificate Exchange Protocol (SCEP). Use the no form of this command to allow certificate authority (CA) requests to be sent automatically (using SCEP) without requiring a password. Syntax Description
<password> Specifies the SCEP password (up to 80 characters).
Default Values
By default, no password is required.
Command History
Release 5.1 Command was introduced.
Functional Notes
There are two places for configuring a SCEP password: At the (ca-profile)# prompt. If it is not configured at the (ca-profile)# prompt, you are prompted to enter one when going through the certificate enrollment process.
The password is sent to the CA from which you are requesting a certificate. The CA may then ask for the password later before a certificate can be revoked. Refer to crypto ca enroll <name> on page 857.
Usage Examples
The following example sets the SCEP challenge password to adtran: (config)#crypto ca profile MyProfile Configuring New CA Profile MyProfile (ca-profile)#password adtran
60000CRG0-35B
3458
serial-number
Use the serial-number command to specify that a serial number will be included in the certificate request. Use the no form of this command to prevent a serial number from being included in the certificate request. Syntax Description
No subcommands.
Default Values
By default, this command is disabled.
Command History
Release 5.1 Command was introduced.
Functional Notes
By default, this command is set to no serial-number, which means that the serial number is not included in the certificate requests.
Usage Examples
The following example configures AOS to include a serial number in the certificate request: (config)#crypto ca profile MyProfile Configuring New CA Profile MyProfile (ca-profile)#serial-number
60000CRG0-35B
3459
subject-name <name>
Use the subject-name command to specify the subject name used in the certificate request. Use the no form of this command to remove a configured subject name. Syntax Description
<name> Specifies a subject name string using up to 256 characters entered in X.500 Lightweight Directory Access Protocol (LDAP) format.
Default Values
By default, there is no subject name configured.
Command History
Release 5.1 Command was introduced.
Functional Notes
Configuring this setting simplifies the crypto ca enroll dialog, allowing you to enter the subject name only once rather than every time you go through the enrollment process. Refer to crypto ca enroll <name> on page 857.
Usage Examples
The following example assigns a subject name of Adtran-cert to certificate requests: (config)#crypto ca profile MyProfile Configuring New CA Profile MyProfile (ca-profile)#subject-name Adtran-cert
60000CRG0-35B
3460
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. certificate <serial number> on page 3462 certificate ca <serial number> on page 3463 crl on page 3464 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 3465
60000CRG0-35B
3461
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
The user typically does not enter this command. It is primarily used to restore certificates from the startup configuration when the product is powered up.
Usage Examples
The following example removes the certificate with the serial number 73f0bfe5ed8391a54d1214390a36cee7: (config)#crypto ca certificate chain MyProfile (config-cert-chain)#no certificate 73f0bfe5ed8391a54d1214390a36cee7
60000CRG0-35B
3462
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
The user typically does not enter this command. It is primarily used to restore certificates from the startup configuration when the product is powered up.
Usage Examples
The following example removes the CA certificate with the serial number 0712: (config)#crypto ca certificate chain MyProfile (config-cert-chain)#no certificate ca 0712
60000CRG0-35B
3463
crl
Use the crl command to restore a certificate revocation list (CRL). Use the no form of this command to remove the CRL for the specific certificate authority (CA). Syntax Description
No subcommands.
Default Values
No default values are necessary for this command.
Command History
Release 5.1 Command was introduced.
Functional Notes
The user typically does not enter this command. It is primarily used to restore CRLs from the startup configuration when the product is powered up.
Usage Examples
The following example removes the CRL for the current CA: (config)#crypto ca certificate chain MyProfile (config-cert-chain)#no crl
60000CRG0-35B
3464
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#crypto ca certificate chain MyProfile (config-cert-chain)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
3465
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 description <text> on page 68 do on page 69 end on page 70 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. antireplay on page 3467 commit-bit on page 3468 ike-policy <number> on page 3470 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 3471 match address <name> on page 3472 match track <name> on page 3474 reverse-route on page 3476 set peer on page 3478 set pfs on page 3480 set security-association idle-time <value> on page 3481 set security-association lifetime on page 3482 set transform-set on page 3483 For virtual private network (VPN) configuration example scripts, refer to the Virtual Private Network configuration guide available on the AOS Documentation CD provided with your unit, or online at http://kb.adtran.com (article number 1616).
60000CRG0-35B
3466
antireplay
Use the antireplay command to enable anti-replay sequence number checking for all security associations (SAs) created on this crypto map. Use the no form of this command to disable this feature. Variations of this command include:
antireplay antireplay <value>
Syntax Description
<value> Optional. Specifies the anti-replay window size in bytes. Select from 64,128, 256, 512, or 1024 bytes.
Default Values
By default, the window size is set to 64 bytes.
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example enables anti-replay sequence checking on crypto map VPN 100: (config)#crypto map MyMap 100 ipsec-ike (config-crypto-map)#antireplay
60000CRG0-35B
3467
commit-bit
Use the commit-bit command to set the commit-bit in the Internet Security Association and Key Management Protocol (ISAKMP) header when sending the second message of quick mode on an IPSec tunnel negotiation. Use the no form of this command to disable this feature. Syntax Description
No subcommands.
Default Values
By default, the commit-bit will be used.
Command History
Release 12.1 Command was introduced.
Functional Notes
As an extra security measure, the commit-bit can be set by the responder of a quick mode negotiation to force the initiator to wait for the fourth message of quick mode before bringing up its IPSec security associations (SAs). By default, this feature is enabled on all AOS products with virtual private network (VPN) capabilities. Some vendors, however, may have incorrect implementations of the commit-bit that do not interoperate well with AOS products. In that case, the commit-bit should be disabled on all crypto maps that have a peer that does not support the commit-bit.
Usage Examples
The following example disables the use of commit-bit: (config)#crypto map MyMap 100 ipsec-ike (config-crypto-map)#no commit-bit The following example displays a configuration with the commit-bit disabled: ip crypto ! crypto ike-policy 100 initiate main respond main local-id address 10.10.10.1 peer 192.168.1.1 attribute 2 encryption aes-256-cbc authentication pre-share lifetime 3600 !
60000CRG0-35B
3468
crypto ike remote-id address 10.10.10.1 preshared-key adtran ike-policy 100 crypto map VPN 10 no-mode-config no-xauth ! crypto ipsec transform-set esp-aes-256-cbc-esp-sha-hmac esp-aes-256-cbc esp-sha-hmac mode tunnel ! crypto map VPN 10 ipsec-ike description VPN to Main Site match address VPN-10-vpn-selectors set peer 192.168.1.1 set transform-set esp-aes-256-cbc-esp-sha-hmac set security-association lifetime seconds 3600 no commit-bit ike-policy 100
60000CRG0-35B
3469
ike-policy <number>
Use the ike-policy command to ensure that only a specified Internet key exchange (IKE) policy is used to establish the IPSec tunnel. This prevents any mobile virtual private network (VPN) policies from using IPSec policies that are configured for static VPN peer policies. Use the no form of this command to remove a configured policy. Syntax Description
<number> Specifies the policy number of the policy to assign to this crypto map.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example sets the IKE policy 100 for crypto map MyMap: (config)#crypto map MyMap 100 ipsec-ike (config-crypto-map)#ike-policy 100
60000CRG0-35B
3470
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#crypto map MyMap 100 ipsec-ike (config-crypto-map)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
3471
Default Values
By default, no IP ACLs are defined.
Command History
Release 4.1 Command was introduced.
Functional Notes
Crypto map entries do not directly contain the selectors used to determine which data to secure. Instead, the crypto map entry refers to an ACL. An ACL is assigned to the crypto map using the match address command. If no ACL is configured for a crypto map, then the entry is incomplete and will have no effect on the system.
For a complete list of all extended ACL configuration commands, refer to the IPv4 Access Control List Command Set on page 2755.
The entries of the ACL used in a crypto map should be created with respect to traffic sent by the ADTRAN product. The source information must be the local ADTRAN product and the destination must be the peer. Only extended ACLs can be used in crypto maps.
Usage Examples
The following example shows setting up an ACL (called NewList) and then assigning the new list to a crypto map (called NewMap): (config)#ip access-list extended NewList Configuring New Extended ACL NewList (config-ext-nacl)#exit (config)#crypto map NewMap 10 ipsec-ike (config-crypto-map)#match address NewList
60000CRG0-35B
3472
Technology Review
A crypto map entry is a single policy that describes how certain traffic is to be secured. There are two types of crypto map entries: ipsec-manual and ipsec-ike. Each entry is given an index, which is used to sort the ordered list. When a nonsecured packet arrives on an interface, the crypto map set associated with that interface is processed in order. If a crypto map entry matches the nonsecured traffic, the traffic is discarded. When a packet is to be transmitted on an interface, the crypto map set associated with that interface is processed in order. The first crypto map entry that matches the packet will be used to secure the packet. If a suitable security association (SA) exists, that is used for transmission. Otherwise, Internet key exchange (IKE) is used to establish an SA with the peer. If no SA exists, and the crypto map entry is respond only, the packet is discarded. When a secured packet arrives on an interface, its security parameter index (SPI) is used to look up an SA. If an SA does not exist, or if the packet fails any of the security checks (bad authentication, traffic does not match SA selectors, etc.), it is discarded. If all checks pass, the packet is forwarded normally.
60000CRG0-35B
3473
Default Values
By default, there are no network monitoring tracks assigned.
Command History
Release 14.1 Command was introduced.
Functional Notes
To increase availability of a network with two virtual private network (VPN) gateways, a track can be assigned to a primary crypto map policy. This track will ensure connectivity to the primary VPN gateway. If the track detects connectivity problems on this gateway, the primary crypto map policy is disabled. Network traffic is then allowed to flow over the backup VPN gateway using the backup crypto map policy (which would have a similar match address access control list (ACL) as the primary crypto map policy). Once the track detects connectivity with the primary VPN gateway again, it will re-enable the primary crypto map policy. Network monitoring tracks must be created first with the track command executed from the Global Configuration mode command prompt. Once created, further configuration is accomplished through the commands available in the Network Monitor Track Command Set on page 2629.
Usage Examples
The following example shows the preliminary steps necessary before assigning a track to a crypto map policy, as well as configuring the track to disable the primary VPN gateway if connectivity issues are detected. Define a probe named primaryping to ping the primary VPN gateway (10.22.156.251): (config)#probe primaryping icmp-echo (config-probe-primaryping)#destination 10.22.156.251 (config-probe-primaryping)#period 10 (config-probe-primaryping)#tolerance consecutive fail 3 (config-probe-primaryping)#no shutdown
60000CRG0-35B
3474
Command Reference Guide Create a track named track1 to test the probe defined above: (config)#track track1 (config-track-track1)#test probe primaryping (config-track-track1)#no shutdown (config-track-track1)#exit
Configure the crypto map (NewMap) to create a VPN tunnel to the primary VPN gateway (10.22.156.251): (config)#crypto map NewMap 10 ipsec-ike (config-crypto-map)#description Primary VPN policy (config-crypto-map)#match track track1 (config-crypto-map)#match address VPN-selectors (config-crypto-map)#set peer 10.22.156.251 Configure the crypto map (NewMap) to create a VPN tunnel to the backup VPN gateway (10.22.156.240): (config)#crypto map NewMap 20 ipsec-ike (config-crypto-map)#description Backup VPN policy (config-crypto-map)#match address VPN-selectors (config-crypto-map)#set peer 10.22.156.240
60000CRG0-35B
3475
reverse-route
Use the reverse-route command to enable virtual private network (VPN) reverse route injection for a particular crypto map. Use the no form of this command to disable reverse route injection. Variations of this command include the following:
reverse-route reverse-route <number> reverse-route <number> tag <value> reverse-route tag <value>
Syntax Description
<number> tag <value> Optional. Specifies the administrative distance for the static route. Range is 1 to 255. Optional. Specifies that a tag will be added to the static route in the route table. Range from 1 to 65535.
Default Values
By default, reverse routing is disabled.
Command History
Release 15.1 Command was introduced.
Functional Notes
Reverse route injection automatically inserts a static route to a peers remote network into the route table of a VPN gateway. The tags used in reverse route injection allow the routes to be individuated from other static routes.
Usage Examples
The following example enables reverse route injection for crypto map MyMap with an administrative distance of 20 and a tag value of 10: (config)#crypto map MyMap 100 ispec-ike (config-crypto-map)#reverse-route 20 tag 10
60000CRG0-35B
3476
Technology Review
The reverse route injection allows a crypto IPSec policy to inject static routes to a remote network into its own route table, leaving it to the configuration of routing protocols to propagate the routes within the network. Reverse route injection serves as a method of updating routing tables when using a backup VPN server. In case one VPN is taken down or is unreachable, the VPN peers route is removed out of the VPN gateways route table and other route tables within the network. Administrative distance is a feature that routers employ in order to select the most reliable path when there are two or more routes to the same destination from two different routing protocols. Administrative distance defines the reliability of a routing protocol by assigning a value (the smaller the value, the more trustworthy the protocol) that is then used by the router to organize routing protocols according to reliability.
60000CRG0-35B
3477
set peer
Use the set peer command to set the IP address or host name of the peer device. Use the no form of this command to remove a peer device. Variations of this command include:
set peer hostname <hostname> set peer <ip address>
Syntax Description
hostname <hostname> <ip address> Specifies the host name of the peer device expressed in the format <host.example.com> (for example, vpn.somecompany.com). Specifies the IP address of the peer device. If this is not configured, it implies responder only to any peer. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
Default Values
No default values are necessary for this command.
Command History
Release 4.1 Release 16.1 Command was introduced. Command was expanded to include the host name parameters.
Functional Notes
If no peer IP address or host name is configured, the entry will only be used to respond to IPSec requests; it cannot initiate the requests (since it doesn't know which IP address to which to send the packet). When a peer IP address is configured, the crypto map entry can be used to both initiate and respond to security associations (SAs). The peer address or host name is not checked when a tunnel is initiated from a remote unit; this address only serves as the virtual private network (VPN) peer to which to initiate a tunnel. The peer IP address is the public IP address of the device that will terminate the IPSec tunnel. If the peer IP address is not static, or the peers address cannot be attained through the domain naming system (DNS) host name, the ADTRAN product cannot initiate the VPN tunnel. There are many Dynamic DNS services that can serve DNS for hosts that are dynamically addressed. By setting no peer IP address, the ADTRAN product can respond to an IPSec tunnel request. Only one peer IP address or host name can be set. When using DNS host names for peer IP addresses, the crypto map is not able to initiate a tunnel until the DNS host name resolves. This DNS host name is checked every 10 minutes.
60000CRG0-35B
3478
Usage Examples
The following example sets the peer IP address of 10.100.23.64: (config)#crypto map MyMap 100 ipsec-ike (config-crypto-map)#set peer 10.100.23.64 The following example sets the peer host name to vpn.examplehost.com: (config)#crypto map MyMap 100 ipsec-ike (config-crypto-map)#set peer hostname vpn.examplehost.com
60000CRG0-35B
3479
set pfs
Use the set pfs command to choose the type of perfect forward secrecy (PFS), if any, that will be required during the IPsec negotiation of security associations (SAs) for this crypto map. Use the no form of this command to return to the default setting. Variations of this command include:
set pfs group1 set pfs group2 set pfs group5 set pfs group1 legacy-peer set pfs group2 legacy-peer set pfs group5 legacy-peer
Syntax Description
group1 group2 group5 legacy-peer Requires IPSec to use Diffie-Hellman Group 1 (768-bit modulus) exchange during IPSec security association (SA) key generation. Requires IPSec to use Diffie-Hellman Group 2 (1024-bit modulus) exchange during IPSec SA key generation. Requires IPSec to use Diffie-Hellman Group 5 (1536-bit modulus) exchange during IPSec SA key generation. Optional. Specifies using the Diffie-Hellman secret generation for legacy peers (running AOS versions prior to A1.08 for voice products or 17.6.1 for data products).
Default Values
By default, no PFS will be used during IPsec SA key generation.
Command History
Release 4.1 Release 15.1 Release 17.6/A2.04 Command was introduced. Command was expanded to include the group5 parameter. Command was expanded to include legacy-peer option.
Functional Notes
If left at the default setting, no PFS will be used during IPSec SA key generation. If PFS is specified, then the specified Diffie-Hellman Group exchange will be used for the initial and all subsequent key generation, thus providing no data linkage between prior keys and future keys.
Usage Examples
The following example specifies use of the Diffie-Hellman Group 1 exchange during IPSec SA key generation: (config)#crypto map MyMap 100 ipsec-ike (config-crypto-map)#set pfs group1
60000CRG0-35B
3480
Default Values
By default, the idle timeout is not defined.
Command History
Release 15.1 Command was introduced.
Usage Examples
The following example sets the receive idle timeout to 60 seconds: (config)#crypto map MyMap 100 ipsec-ike (config-crypto-map)#set security-association idle-time 60
60000CRG0-35B
3481
Syntax Description
kilobytes <value> seconds <value> Specifies the SA lifetime limit in kilobytes. Specifies the SA lifetime limit in seconds.
Default Values
By default, the security-association lifetime is set to 28800 seconds, and there is no default for the kilobytes lifetime.
Command History
Release 4.1 Command was introduced.
Functional Notes
Values can be entered for this command in both kilobytes and seconds. Whichever limit is reached first will end the SA.
Usage Examples
The following example sets the SA lifetime to 300 kilobytes and 2 hours (7200 seconds): (config)#crypto map MyMap 100 ipsec-ike (config-crypto-map)#set security-association lifetime kilobytes 300 (config-crypto-map)#set security-association lifetime seconds 7200
60000CRG0-35B
3482
set transform-set
Use the set transform-set command to assign up to six transform sets to a crypto map. Use the no form of this command to return to the default setting. Refer to crypto ipsec transform-set <name> <parameters> on page 868 for information on defining transform sets. Variations of this command include:
set transform-set <name> set transform-set <name> <name> set transform-set <name> <name> <name> set transform-set <name> <name> <name> <name> set transform-set <name> <name> <name> <name> <name> set transform-set <name> <name> <name> <name> <name> <name>
Syntax Description
<name> Assigns up to six transform sets to this crypto map by listing the set names, separated by a space.
Default Values
By default, there is no transform set assigned to the crypto map.
Command History
Release 4.1 Command was introduced.
Functional Notes
Crypto map entries do not directly contain the transform configuration for securing data. Instead, the crypto map is associated with transform sets that contain specific security algorithms (refer to crypto ipsec transform-set <name> <parameters> on page 868). If no transform set is configured for a crypto map, then the entry is incomplete and will have no effect on the system.
Usage Examples
The following example first creates a transform set (Set1) consisting of two security algorithms (up to three may be defined), and then assigns the transform set to a crypto map (MyMap): (config)#crypto ipsec transform-set Set1 esp-3des esp-sha-hmac (cfg-crypto-trans)#exit (config)#crypto map MyMap 100 ipsec-ike (config-crypto-map)#set transform-set Set1
60000CRG0-35B
3483
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: description <text> on page 68 cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. antireplay on page 3485 ike-policy <number> on page 3486 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 3487 match address <name> on page 3488 set peer <ip address> on page 3490 set session-key on page 3491 set transform-set <name> on page 3495 For virtual private network (VPN) configuration example scripts, refer to the VPN configuration guide located on the AOS Documentation CD provided with your unit.
60000CRG0-35B
3484
antireplay
Use the antireplay command to enable anti-replay sequence number checking for all security associations (SAs) created on this crypto map. Use the no form of this command to disable this feature. Variations of this command include:
antireplay antireplay <value>
Syntax Description
<value> Optional. Specifies the anti-replay window size in bytes. Select from 64, 128, 256, 512, or 1024 bytes.
Default Values
By default, the window size is set to 64 bytes.
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example enables anti-replay sequence checking on crypto map VPN 100: (config)#crypto map VPN 100 ipsec-manual (config-crypto-map)#antireplay
60000CRG0-35B
3485
ike-policy <number>
Use the ike-policy command to ensure that only a specified Internet key exchange (IKE) policy is used to establish the IPSec tunnel. This prevents any mobile virtual private network (VPN) policies from using IPSec policies that are configured for static VPN peer policies. Use the no form of this command to remove a configured IKE policy. Syntax Description
<number> Specifies the policy number of the policy to assign to this crypto map.
Default Values
No default values are necessary for this command.
Command History
Release 6.1 Command was introduced.
Usage Examples
The following example shows a typical crypto map configuration: (config)#crypto ike policy 100 (config)#crypto map VPN 10 ipsec-manual (config-crypto-map)#description Remote Office (config-crypto-map)#match address VPN-10-vpn-selectors (config-crypto-map)#set peer 10.22.17.13 (config-crypto-map)#set transform-set esp-3des-esp-md5-hmac (config-crypto-map)#ike-policy 100
60000CRG0-35B
3486
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#crypto map NewMap 10 ipsec-manual (config-crypto-map)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
3487
Default Values
By default, no IP ACLs are defined.
Command History
Release 4.1 Command was introduced.
Functional Notes
Crypto map entries do not directly contain the selectors used to determine which data to secure. Instead, the crypto map entry refers to an ACL. An ACL is assigned to the crypto map using the match address command. If no ACL is configured for a crypto map, then the entry is incomplete and will have no effect on the system.
For a complete list of all extended ACL configuration commands, refer to the IPv4 Access Control List Command Set on page 2755.
The entries of the ACL used in a crypto map should be created with respect to traffic sent by the ADTRAN product. The source information must be the local ADTRAN product, and the destination must be the peer. Only extended ACLs can be used in crypto maps.
Usage Examples
The following example shows setting up an ACL (called NewList) and then assigning the new list to a crypto map (called NewMap): (config)#ip access-list extended NewList Configuring New Extended ACL "NewList" (config-ext-nacl)#exit (config)#crypto map NewMap 10 ipsec-manual (config-crypto-map)#match address NewList
60000CRG0-35B
3488
Technology Review
A crypto map entry is a single policy that describes how certain traffic is to be secured. There are two types of crypto map entries: ipsec-manual and ipsec-ike. Each entry is given an index, which is used to sort the ordered list. When a nonsecured packet arrives on an interface, the crypto map set associated with that interface is processed in order. If a crypto map entry matches the nonsecured traffic, the traffic is discarded. When a packet is to be transmitted on an interface, the crypto map set associated with that interface is processed in order. The first crypto map entry that matches the packet will be used to secure the packet. If a suitable security association (SA) exists, that is used for transmission. Otherwise, Internet key exchange (IKE) is used to establish an SA with the peer. If no SA exists, and the crypto map entry is respond only, the packet is discarded. When a secured packet arrives on an interface, its security parameter index (SPI) is used to look up an SA. If an SA does not exist, or if the packet fails any of the security checks (bad authentication, traffic does not match SA selectors, etc.), it is discarded. If all checks pass, the packet is forwarded normally.
60000CRG0-35B
3489
Default Values
No default values are necessary for this command.
Command History
Release 4.1 Command was introduced.
Functional Notes
If no peer IP address is configured, the manual crypto map is not valid and not complete. A peer IP address is required for manual crypto maps. To change the peer IP address, the no set peer command must be issued first; then the new peer IP address can be configured.
Usage Examples
The following example sets the peer IP address of 10.100.23.64: (config-crypto-map)#set peer 10.100.23.64
60000CRG0-35B
3490
set session-key
Use the set session-key command to define the encryption and authentication keys for this crypto map. Use the no form of this command to remove defined encryption and authentication keys. Variations of this command include the following:
set session-key inbound ah <SPI> <key> set session-key inbound esp <SPI> authenticator <key> set session-key inbound esp <SPI> cipher <key> set session-key inbound esp <SPI> cipher <key> authenticator <key> set session-key outbound ah <SPI> <key> set session-key outbound esp <SPI> authenticator <key> set session-key outbound esp <SPI> cipher <key> set session-key outbound esp <SPI> cipher <key> authenticator <key>
Syntax Description
inbound outbound ah <SPI> esp <SPI> cipher <key> authenticator <key> Defines encryption keys for inbound traffic. Defines encryption keys for outbound traffic. Specifies Authentication Header (AH) Protocol and security parameter index (SPI). Specifies Encapsulating Security Payload (ESP) Protocol and SPI. Optional. Specifies encryption/decryption key. Optional. Specifies authentication key.
Default Values
No default values are necessary for this command.
Command History
Release 4.1 Command was introduced.
Functional Notes
The inbound local SPI must equal the outbound remote SPI. The outbound local SPI must equal the inbound remote SPI. The key values are the hexadecimal representations of the keys. They are not true ASCII strings. Therefore, a key of 3031323334353637 represents 01234567.
60000CRG0-35B
3491
Command Reference Guide Refer to the following list for key length requirements. Algorithm: DES 3DES AES-128-CBC AES-192-CBC AES-256-CBC MD5 SHA1 Minimum key length required: 64 bits in length; 8 hexadecimal bytes 192 bits in length; 24 hexadecimal bytes 128 bits in length; 16 hexadecimal bytes 192 bits in length; 24 hexadecimal bytes 256 bits in length; 32 hexadecimal bytes 128 bits in length; 16 hexadecimal bytes 160 bits in length; 20 hexadecimal bytes
Usage Examples
The following example configures an AOS product for virtual private network (VPN) using IPSec manual keys. This example assumes that the AOS product has been configured with a wide area network (WAN) IP address of 63.97.45.57 on interface ppp 1 and a local area network (LAN) IP address of 10.10.10.254 on interface ethernet 0/1. The peer private IP subnet is 10.10.20.0. For more detailed information on VPN configuration, refer to the VPN configuration guide located on the AOS Documentation CD provided with your unit. Step 1: Enter the Global Configuration mode (i.e., config terminal mode). >enable #configure terminal Step 2: Enable VPN support using the ip crypto command. This command allows crypto maps to be applied to interfaces, and enables the Internet key exchange (IKE) server to listen for IKE negotiation sessions on User Datagram Protocol (UDP) port 500. (config)#ip crypto Step 3: Define the transform set. A transform set defines the encryption and/or authentication algorithms to be used to secure the data transmitted over the VPN tunnel. Multiple transform sets may be defined in a system. Once a transform set is defined, many different crypto maps within the system can reference it. In this example, a transform set named highly_secure has been created. This transform set defines ESP with authentication implemented using 3DES encryption and SHA1 authentication. (config)#crypto ipsec transform-set highly_secure esp-3des esp-sha-hmac (cfg-crypto-trans)#mode tunnel
60000CRG0-35B
3492
Step 4: Define an IP access control list (ACL). An extended ACL is used to specify which traffic needs to be sent securely over the VPN tunnel. The entries in the list are defined with respect to the local system. The source IP address will be the source of the traffic to be encrypted. The destination IP address will be the receiver of the data on the other side of the VPN tunnel. (config)#ip access-list extended corporate_traffic (config-ext-nacl)#permit ip 10.10.10.0 0.0.0.255 10.10.20.0 0.0.0.255 log deny ip any any Step 5: Create crypto map and define manual keys. A crypto map is used to define a set of encryption schemes to be used for a given interface. A crypto map entry has a unique index within the crypto map set. The crypto map entry will specify whether IKE is used to generate encryption keys, or if manually specified keys will be used. The crypto map entry will also specify who will be terminating the VPN tunnel, as well as which transform set or sets will be used to encrypt and/or authenticate the traffic on that VPN tunnel. It also specifies the lifetime of all created IPSec security associations (SAs). The keys for the algorithms defined in the transform set associated with the crypto map will be defined by using the set session-key command. A separate key is needed for both inbound and outbound traffic. The key format consists of a string of hexadecimal values without the leading 0x for each character. For example, a cipher key of this is my cipher key would be entered as: 74686973206973206D7920636970686572206B6579. A unique SPI is needed for both inbound and outbound traffic. The local system's inbound SPI and keys will be the peer's outbound SPI and keys. The local system's outbound SPI and keys will be the peer's inbound SPI and keys. In this example, the following keys and SPIs are used: Inbound cipher SPI: Outbound cipher SPI: 300 400 Inbound cipher key: Outbound cipher key: "2te$#g89jnr(j!@4rvnfhg5e" "8564hgjelrign*&(gnb#1$d3"
(config)#crypto map corporate_vpn 1 ipsec-ike (config-crypto-map)#match address corporate_traffic (config-crypto-map)#set peer 63.105.15.129 (config-crypto-map)#set transform-set highly_secure (config-crypto-map)#set session-key inbound esp 300 cipher 32746524236738396A6E72286A21403472766E6668673565 authenticator 7235255E756768656D626B64686A333424782E3C (config-crypto-map)#set session-key outbound esp 400 cipher 3835363468676A656C7269676E2A2628676E622331246433 authenticator 696F37382A37676E65722334286D676E73642133
60000CRG0-35B
3493
Step 6: Configure public interface. This process includes configuring the IP address for the interface and applying the appropriate crypto map to the interface. Crypto maps are applied to the interface on which encrypted traffic will be transmitted. (config)#interface ppp 1 (config-ppp 1)#ip address 63.97.45.57 255.255.255.248 (config-ppp 1)#crypto map corporate_vpn (config-ppp 1)#no shutdown Step 7: Configure private interface to allow all traffic destined for the VPN tunnel to be routed to the appropriate gateway. (config)#interface ethernet 0/1 (config-eth 0/1)#ip address 10.10.10.254 255.255.255.0 (config-eth 0/1)#no shutdown (config-eth 0/1)#exit
60000CRG0-35B
3494
Default Values
By default, no transform set is assigned to the crypto map.
Command History
Release 4.1 Command was introduced.
Functional Notes
Crypto map entries do not directly contain the transform configuration for securing data. Instead, the crypto map is associated with transform sets that contain specific security algorithms (refer to crypto ipsec transform-set <name> <parameters> on page 868). If no transform set is configured for a crypto map, then the entry is incomplete and will have no effect on the system. For manual key crypto maps, only one transform set can be specified.
Usage Examples
The following example first creates a transform set (Set1) consisting of two security algorithms (up to three may be defined), and then assigns the transform set to a crypto map (Map1): (config)#crypto ipsec transform-set Set1 esp-3des esp-sha-hmac (cfg-crypto-trans)#exit (config)#crypto map Map1 1 ipsec-manual (config-crypto-map)#set transform-set Set1
60000CRG0-35B
3495
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. dns-server on page 3497 ip-range <start ip address> <end ip address> on page 3498 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 3499 netbios-name-server <ip address> <secondary> on page 3500
For virtual private network (VPN) configuration example scripts, refer to the VPN configuration guide located on the AOS Documentation CD provided with your unit.
60000CRG0-35B
3496
dns-server
Use the dns-server command to specify the default primary and secondary domain naming system (DNS) servers to use for the Dynamic Host Configuration Protocol (DHCP) client. Use the no form of this command to remove the configured DNS server. Variations of this command include:
dns-server <ip address> dns-server <ip address> <secondary>
Syntax Description
<ip address> <secondary> Specifies the IP address of the preferred DNS server on the network. Optional. Specifies the IP address of the second preferred DNS server on the network. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1).
Default Values
By default, there are no specified default DNS servers.
Command History
Release 2.1 Release 4.1 Command was introduced. Command was expanded to include the Internet key exchange (IKE) client configuration pool.
Usage Examples
The following example specifies a default DNS server with address 192.72.3.254 and a secondary DNS server with address 192.100.4.253: (config)#crypto ike client configuration pool ConfigPool1 (config-ike-client-pool)#dns-server 192.72.3.254 192.100.4.253
60000CRG0-35B
3497
Default Values
By default, no IP address range is defined.
Command History
Release 4.1 Command was introduced.
Usage Examples
The following example defines an IP address range for this configuration pool: (config)#crypto ike client configuration pool ConfigPool1 (config-ike-client-pool)#ip-range 172.1.1.1 172.1.1.25
60000CRG0-35B
3498
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#crypto ike client configuration pool ConfigPool1 (config-ike-client-pool)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
3499
Syntax Description
<ip address> <secondary> Specifies the primary WINS server IP address to assign. Optional. Specifies the secondary WINS server IP address to assign.
Default Values
By default, no WINS server address is defined.
Command History
Release 4.1 Command was introduced.
Usage Examples
The following example defines two WINS server addresses for this configuration pool: (config)#crypto ike client configuration pool ConfigPool1 (config-ike-client-pool)#netbios-name-server 172.1.17.1 172.1.17.25
60000CRG0-35B
3500
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. authentication on page 3502 encryption on page 3503 group on page 3504 hash on page 3505 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 3506 lifetime <value> on page 3507
For virtual private network (VPN) configuration example scripts, refer to the VPN configuration guide located on the AOS Documentation CD provided with your unit.
60000CRG0-35B
3501
authentication
Use the authentication command to configure this Internet key exchange (IKE) policys use of preshared secrets and signed certificates during IKE negotiation. Use the no form of this command to disable this feature. Variations of this command include:
authentication dss-sig authentication pre-share authentication rsa-sig
Syntax Description
dss-sig pre-share rsa-sig Specifies to use DSS-signed certificates during IKE negotiation to validate the peer. Specifies the use of preshared secrets during IKE negotiation to validate the peer. Specifies to use RSA-signed certificates during IKE negotiation to validate the peer.
Default Values
By default, authentication is set to pre-share.
Command History
Release 4.1 Release 5.1 Command was introduced. Command was expanded to include the signed certificates.
Functional Notes
Both sides must share the same preshared secret in order for the negotiation to be successful.
Usage Examples
The following example enables preshared secrets for this IKE policy: (config-ike)#attribute 10 (config-ike-attribute)#authentication pre-share
60000CRG0-35B
3502
encryption
Use the encryption command to specify which encryption algorithm this Internet key exchange (IKE) policy will use to transmit data over the IKE-generated security association (SA). Use the no form of this command to return to the default value. Variations of this command include:
encryption aes-128-cbc encryption aes-192-cbc encryption aes-256-cbc encryption des encryption 3des
Syntax Description
aes-128-cbc aes-192-cbc aes-256-cbc des 3des Specifies the AES-128-CBC encryption algorithm. Specifies the AES-192-CBC encryption algorithm. Specifies the AES-256-CBC encryption algorithm. Specifies the DES encryption algorithm. Specifies the 3DES encryption algorithm.
Default Values
By default, encryption is set to DES.
Command History
Release 4.1 Command was introduced.
Usage Examples
The following example selects 3DES as the encryption algorithm for this IKE policy: (config-ike)#attribute 10 (config-ike-attribute)#encryption 3des
60000CRG0-35B
3503
group
Use the group command to specify the Diffie-Hellman Group (1, 2, or 5) to be used by this Internet key exchange (IKE) policy to generate the keys (which are then used to create the IPSec security association (SA)). Use the no form of this command to return to the default setting. Variations of this command include:
group 1 group 2 group 5
Syntax Description
1 2 5 Requires the IKE policy to use Diffie-Hellman Group 1 (768-bit modulus) exchange during IPSec SA key generation. Requires the IKE policy to use Diffie-Hellman Group 2 (1024-bit modulus) exchange during IPSec SA key generation. Requires the IKE policy to use Diffie-Hellman Group 5 (1536-bit modulus) exchange during IPSec SA key generation.
Default Values
By default, group is set to 1.
Command History
Release 4.1 Release 15.1 Command was introduced. Command was expanded to include the group 5 parameter.
Functional Notes
The local IKE policy and the peer IKE policy must have matching group settings in order for negotiation to be successful.
Usage Examples
The following example sets this IKE policy to use Diffie-Hellman Group 2: (config-ike)#attribute 10 (config-ike-attribute)#group 2
60000CRG0-35B
3504
hash
Use the hash command to specify the hash algorithm to be used to authenticate the data transmitted over the Internet key exchange (IKE) security association (SA). Use the no form of this command to return to the default setting. Variations of this command include:
hash md5 hash sha
Syntax Description
md5 sha Choose the message digest 5 (MD5) hash algorithm. Choose the SHA hash algorithm.
Default Values
By default, hash is set to sha.
Command History
Release 4.1 Command was introduced.
Usage Examples
The following example specifies md5 as the hash algorithm: (config-ike)#attribute 10 (config-ike-attribute)#hash md5
60000CRG0-35B
3505
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config-ike)#attribute 10 (config-ike-attribute)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
3506
lifetime <value>
Use the lifetime command to specify how long an Internet key exchange (IKE) security association (SA) is valid before expiring. Use the no form of this command to return to the default setting. Syntax Description
<value> Specify how many seconds an IKE SA will last before expiring. The valid range is 60 to 1209600.
Default Values
By default, lifetime is set to 28800 seconds.
Command History
Release 4.1 Command was introduced.
Usage Examples
The following example sets a lifetime of two hours: (config-ike)#attribute 10 (config-ike-attribute)#lifetime 7200
60000CRG0-35B
3507
The following commands are common to multiple command sets and are covered in a centralized section of this guide. For more information, refer to the sections listed below: cross-connect on page 65 do on page 69 end on page 70 exit on page 71 interface on page 72 All other commands for this command set are described in this section in alphabetical order. attribute <number> on page 3509 client authentication host on page 3510 client authentication host xauth-type on page 3511 client authentication server list <listname> on page 3512 client configuration pool <name> on page 3513 initiate on page 3514 ipv6 policy-class <ipv6 acp name> max-sessions <number> on page 3515 local-id on page 3516 nat-traversal on page 3518 peer on page 3519 respond on page 3521
For virtual private network (VPN) configuration example scripts, refer to the VPN configuration guide located on the AOS Documentation CD provided with your unit.
60000CRG0-35B
3508
attribute <number>
Use the attribute command to define attributes for the associated Internet key exchange (IKE) policy. Multiple attributes can be created for a single IKE policy. Once you enter this command, you are in the IKE Policy Attribute mode. Refer to IKE Policy Attributes Command Set on page 3501 for more information. Use the no form of this command to remove a defined attribute. Syntax Description
<number> Assigns a number (range: 1 to 65535) to the attribute policy. The number is the attribute's priority number and specifies the order in which the resulting virtual private network (VPN) proposals get sent to the far end. This command takes you to the (config-ike-attribute)# prompt. From here, you can configure the settings for the attribute as outlined in the section IKE Policy Attributes Command Set on page 3501.
Default Values
By default, no attribute is defined.
Command History
Release 4.1 Command was introduced.
Functional Notes
Multiple attributes on an IKE policy are ordered by number (with the lowest number representing the highest priority).
Usage Examples
The following example defines a policy attribute (10) and takes you into the IKE policy attributes: (config)#crypto ike policy 1 (config-ike)#attribute 10 (config-ike-attribute)#
60000CRG0-35B
3509
Syntax Description
password <password> username <username> passphrase <phrase> Specifies the value sent via Xauth as the password. Specifies the value sent via Xauth as the user name. Optional. Specifies the value sent via Xauth as the passphrase. This is only used with authentication type one time password (OTP).
Default Values
By default, if this command is not present in the IKE policy, the unit does not act as an Xauth host.
Command History
Release 5.1 Command was introduced.
Functional Notes
The specified credentials are programmed into the unit, and there is no prompt for entering values real time. Therefore, schemes requiring real-time input or additional responses (e.g., SecureID) are not supported. The client authentication host and the client authentication server commands are mutually exclusive. Refer to client authentication server list <listname> on page 3512 for more information.
Usage Examples
The following example specifies the login credentials to be sent: (config)#crypto ike policy 1 (config-ike)#client authentication host username jsmith password password1 passphrase phrase
60000CRG0-35B
3510
Syntax Description
generic otp radius Specifies generic authentication type. Specifies one time password (OTP) authentication type. Specifies remote authentication dial-in user service (RADIUS) authentication type.
Default Values
By default, authentication is set to generic.
Command History
Release 5.1 Command was introduced.
Functional Notes
This command is used along with the client authentication host username. Refer to client configuration pool <name> on page 3513 for more information. When acting as an Xauth host, this command allows the user to specify the Xauth authentication type if a type other than generic is desired.
Usage Examples
The following example sets the Xauth type to radius: (config)#crypto ike policy 1 (config-ike)#client authentication host xauth-type radius
60000CRG0-35B
3511
Syntax Description
default <listname> Specifies the default AAA authentication method list is applied in the IKE policy. Specifies the named AAA authentication method list is applied in the IKE policy.
Default Values
By default, no AAA authentication method list is applied to the IKE policy and extended authentication is not performed.
Command History
Release 5.1 Command was introduced.
Functional Notes
When this IKE policy is negotiated and the peer has indicated Xauth via the IKE authentication method and/or the Xauth vendor ID, this command allows the unit to perform as an Xauth server (edge device). The specified AAA authentication method list is used to identify the location of the user authentication database. The AAA authentication method list used by the IKE policy is most often the AAA login authentication method list. For more information about configuring these lists, refer to the command aaa authentication login on page 815. For more information about configuring AAA in your network, refer to the configuration guide Configuring AAA in AOS available online at http://kb.adtran.com.
Usage Examples
The following example specifies that the AAA authentication method list AuthList1 is used in the IKE policy for extended authentication: (config)#crypto ike policy 1 (config-ike)#client authentication server list AuthList1
60000CRG0-35B
3512
Syntax Description
<name> initiate respond Specifies the pool from which to obtain parameters to assign to the client. Enables set/ack (push) mode. Enables request/response mode.
Default Values
By default, if this command is not present in the IKE policy, the ADTRAN device allocates mode-config IP addresses, domain naming system (DNS) server addresses, and network basic input/output system (NetBIOS) name server addresses, and mode-config is not performed.
Command History
Release 4.1 Command was introduced.
Functional Notes
This command ties an existing client configuration pool to an IKE policy. By using the initiate and respond commands, you can configure the IKE policy to initiate and respond, initiate only, or respond only. It is an error if you have both initiate and respond disabled.
Usage Examples
The following example ties the ConfigPool1 configuration pool to this IKE policy: (config)#crypto ike policy 1 (config-ike)#client configuration pool ConfigPool1
60000CRG0-35B
3513
initiate
Use the initiate command to allow the Internet key exchange (IKE) policy to initiate negotiation (in main mode or aggressive mode) with peers. Use the no form of this command to allow the policy to respond only. Variations of this command include:
initiate aggressive initiate main
Syntax Description
aggressive Specifies to initiate using aggressive mode. Aggressive mode can be used when one end of the virtual private network (VPN) tunnel has a dynamically assigned address. The side with the dynamic address must be the initiator of the traffic and tunnel. The side with the static address must be the responder. Specifies to initiate using main mode. Main mode requires that each end of the VPN tunnel has a static wide area network (WAN) IP address. Main mode is more secure than aggressive mode because more of the main mode negotiations are encrypted.
main
Default Values
By default, the main initiation mode is enabled.
Command History
Release 4.1 Command was introduced.
Functional Notes
By using the initiate and respond commands, you can configure the IKE policy to initiate and respond, initiate only, or respond only. It is an error if you have both initiate and respond disabled.
Usage Examples
The following example enables the AOS device to initiate IKE negotiation in main mode: (config)#crypto ike policy 1 (config-ike)#initiate main
60000CRG0-35B
3514
<number>
Default Values
By default, the maximum IPv6 ACP sessions allowed are based on the amount of RAM in the AOS unit. The following table outlines the default values based on RAM: RAM Amount 64 MB 128 MB 256 MB 512 MB 768 MB 1 GB Default Max Sessions 10000 30000 80000 200000 300000 450000
Command History
Release 18.1 Command was introduced.
Functional Notes
To set the system-wide maximum limit for ACP sessions (both IPv4 and IPv6), use the command policy-class max-sessions <number> on page 1170.
Usage Examples
The following example allows no more than 100 policy sessions on the IPv6 ACP named PRIVATEv6: (config)#crypto ike policy 1 (config-ike)#ipv6 policy-class PRIVATEv6 max-sessions 100
60000CRG0-35B
3515
local-id
Use the local-id command to set the local ID for the Internet key exchange (IKE) policy. This setting overrides the system local ID setting (set in the Global Configuration mode using the crypto ike local-id address command). Use the no form of this command to remove a local ID. Variations of this command include:
local-id address <ip address> local-id asn1-dn <name> local-id fqdn <name> local-id user-fqdn <name>
Syntax Description
address <ip address> asn1-dn <name> fqdn <name> user-fqdn <name> Specifies a remote IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Specifies an abstract syntax notation distinguished name as the remote ID (enter this value in Lightweight Directory Access Protocol (LDAP) format). Specifies a fully qualified domain name (FQDN) (e.g., adtran.com) as the remote ID. Specifies a user FQDN or email address (e.g., user1@adtran.com) as the remote ID.
Default Values
By default, the local ID is not defined.
Command History
Release 4.1 Command was introduced.
Functional Notes
The local ID for a particular IKE policy can be set in two ways. The first (default) method is done in the Global Configuration mode: (config)#crypto ike local-id address This command, which by default is executed on startup, makes the local ID of an IKE policy equal to the IPv4 address of the interface on which an IKE negotiation is occurring. This is particularly useful for products that could have multiple public interfaces. The second method is to use the IKE policy command: (config)#crypto ike policy 1 (config-ike)#local-id [address | asn1-dn | fqdn | user-fqdn] <ip address or name>
60000CRG0-35B
3516
This policy-specific command allows you to manually set the local ID for an IKE policy on a per-policy basis. You can use both methods simultaneously in the product. Several IKE policies can be created, some of which use the default system setting of the IPv4 address of the public interface. Others can be set to override this system setting and manually configure a local ID specific to those policies. When a new IKE policy is created, they default to no local-id. This allows the system local ID setting to be applied to the policy.
Usage Examples
The following example sets the local ID of this IKE policy to the IPv4 address 63.97.45.57: (config)#crypto ike policy 1 (config-ike)#local-id address 63.97.45.57
60000CRG0-35B
3517
nat-traversal
Use the nat-traversal command to allow, force, or disable network address translation (NAT) traversal versions 1 and 2 on a specific Internet key exchange (IKE) policy. Use the no form of this command to disable this feature. Variations of this command include:
nat-traversal v1 allow nat-traversal v1 disable nat-traversal v1 force nat-traversal v2 allow nat-traversal v2 disable nat-traversal v2 force
Syntax Description
v1 v2 allow disable force Specifies NAT traversal version 1. Specifies NAT traversal version 2. Sets the IKE policy to allow the specified NAT traversal version. Sets the IKE policy to disable the specified NAT traversal version. Sets the IKE policy to force the specified NAT traversal version.
Default Values
The default values for this command are nat-traversal v1 allow and nat-traversal v2 allow.
Command History
Release 7.1 Command was introduced.
Usage Examples
The following example disables version 2 on IKE policy 1: (config)#crypto ike policy 1 (config-ike)#nat-traversal v2 disable
60000CRG0-35B
3518
peer
Use the peer command to enter the IP address of the peer device. Repeat this command for multiple peers. Use the any keyword if you want to set up a policy that will initiate or respond to any peer. Use the no form of this command to remove a peer device. Variations of this command include:
peer <ip address> peer any
Syntax Description
<ip address> any Specifies a peer IP address. IP addresses should be expressed in dotted decimal notation (for example, 10.10.10.1). Allows any peer to connect to this Internet key exchange (IKE) policy.
Default Values
No default values are necessary for this command.
Command History
Release 4.1 Command was introduced.
Functional Notes
An IKE policy is incomplete unless one of the peer commands is specified. Only one IKE policy can be configured with peer any.
Usage Examples
The following example sets multiple peers on an IKE policy for an initiate-and-respond policy using preshared secret, DES, message digest 5(MD5), and Diffie-Hellman Group 1: (config)#crypto ike policy 1 (config-ike)#peer 63.97.45.57 (config-ike)#peer 63.105.15.129 (config-ike)#peer 192.168.1.3 (config-ike)#respond anymode (config-ike)#initiate main The following example sets up a policy allowing any peer to initiate using preshared secret, DES, MD5, and Diffie-Hellman Group 1. (config)#crypto ike policy 1 (config-ike)#peer any (config-ike)#respond anymode (config-ike)#initiate main
60000CRG0-35B
3519
Technology Review
IKE policies must have a peer address associated with them to allow certain peers to negotiate with the ADTRAN product. This is a problem when you have roaming users (those who obtain their IP address using Dynamic Host Configuration Protocol (DHCP) or some other dynamic means). To allow for roaming users, the IKE policy can be set up with peer any to allow any peer to negotiate with the ADTRAN product. There can only be one peer any policy in the running configuration.
60000CRG0-35B
3520
respond
Use the respond command to allow the Internet key exchange (IKE) policy to respond to negotiations by a peer. Use the no form of this command to allow the policy to only initiate negotiations. Variations of this command include:
respond aggressive respond anymode respond main
Syntax Description
aggressive anymode main Specifies to respond only to aggressive mode. Specifies to respond to any mode. Specifies to respond only to main mode.
Default Values
By default, respond to any mode is enabled.
Command History
Release 4.1 Command was introduced.
Functional Notes
By using the initiate and respond commands, you can configure the IKE policy to initiate and respond, initiate only, or respond only. It is an error if you have both initiate and respond disabled.
Usage Examples
The following example configures the router to initiate and respond to IKE negotiations: (config)#crypto ike policy 1 (config-ike)#respond anymode
60000CRG0-35B
3521