Omni Stack Ls 6224 Series
Omni Stack Ls 6224 Series
Omni Stack Ls 6224 Series
D June 2007
Alcatel OS-LS-6200
User Guide
www.alcatel.com
An Alcatel service agreement brings your company the assurance of 7x24 no-excuses technical support. Youll also receive regular software updates to maintain and maximize your Alcatel products features and functionality and on-site hardware replacement through our global network of highly qualified service delivery partners. Additionally, with 24-hour-a-day access to Alcatels Service and Support web page, youll be able to view and update any case (open or closed) that you have reported to Alcatels technical support, open a new case or access helpful release notes, technical bulletins, and manuals. For more information on Alcatels Service Programs, see our web page at www.ind.alcatel.com, call us at 1-800-995-2696, or email us at support@ind.alcatel.com.
This Manual documents Alcatel 6200 hardware and software. The functionality described in this Manual is subject to change without notice.
Copyright 2007 by Alcatel Internetworking, Inc. All rights reserved. This document may not be reproduced in whole or in part without the express written permission of Alcatel Internetworking, Inc. Alcateland the Alcatel logo are registered trademarks of Compagnie Financire Alcatel, Paris, France. OmniSwitch and OmniStack are registered trademarks of Alcatel Internetworking, Inc. Omni Switch/Router, SwitchExpertSM, the Xylan logo are trademarks of Alcatel Internetworking, Inc. All other brand and product names are trademarks of their respective companies.
26801 West Agoura Road Calabasas, CA 91301 (818) 880-3500 FAX (818) 880-3505 info@ind.alcatel.com US Customer Support-(800) 995-2696 International Customer Support-(818) 878-4507 Internet-http://eservice.ind.alcatel.com
Warning This equipment has been tested and found to comply with the limits for Class A digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions in this guide, may cause interference to radio communications. Operation of this equipment in a residential area is likely to cause interference, in which case the user will be required to correct the interference at his own expense. The user is cautioned that changes and modifications made to the equipment without approval of the manufacturer could void the users authority to operate this equipment. It is suggested that the user use only shielded and grounded cables to ensure compliance with FCC Rules. This digital apparatus does not exceed the Class A limits for radio noise emissions from digital apparatus set out in the radio interference regulations of the Canadian department of communications. Le present appareil numerique nemet pas de bruits radioelectriques depassant les limites applicables aux appareils numeriques de la Class A prescrites dans le reglement sur le brouillage radioelectrique edicte par le ministere des communications du Canada. Utilice slo adaptadores con las siguientes caractersticas elctricas y que estn debidamente certificados de acuerdo a la legislacin vigente. El uso de otros adaptadores podra daar el dispositivo y anular la garanta adems de provocar riesgos al usuario. Caractersticas de entrada: AC100/115/220/230V; 50/60Hz; 2.0/1.7/0.9/ 0.9A; Clase I AC100/115/220/230V; 50/60Hz; 4.0/3.4/1.8/ 1.8A; Clase I AC 100/115/220/230V; 50/60Hz; 0.4/0.4/0.2/ 0.2A; Clase I AC100/115/220/230V; 50/60Hz; 0.6/0.6/0.4/ 0.4A; Clase I AC 100/115/220/230V 50/60Hz 1.0/1.0/0.5/ 0.5A Clase I Caractersticas de salida: DC 12V, 4.0A; -50V, 3.6A DC 12V, 7.5A; -50V, 7.5A DC 12V, 4.5A DC 12V, 4.5A DC 12V , 4.5A
Adaptador: OS-LS-6224P OS-LS-6248P OS-LS-6248 OS-LS-6224 Modelo: OS-LS-62BP-P OS-LS-62BP-P OS-LS-62BP-DC & OS-LS-62BP OS-LS-62BP-DC & OS-LS-62BP Marca comercial: 3Y Power Alcatel Accton & 3Y Power Accton & 3Y Power
Contents
Contents
Chapter 1: Introduction 1 Key Features ........................................................................................................ 1 Description of Software Features ......................................................................... 3 System Defaults ................................................................................................... 9 Chapter 2: Initial Configuration 13 General Configuration Information ..................................................................... 14 Auto-Negotiation 15 Device Port Default Settings 15 Booting the Switch .............................................................................................. 16 Configuration Overview ...................................................................................... 18 Initial Configuration ............................................................................................. 18 Static IP Address and Subnet Mask 18 User Name 19 SNMP Community Strings 19 Advanced Configuration ..................................................................................... 21 Retrieving an IP Address From a DHCP Server 21 Receiving an IP Address From a BOOTP Server 22 Security Management and Password Configuration .......................................... 23 Configuring Security Passwords Introduction 23 Configuring an Initial Console Password 24 Configuring an Initial Telnet Password 24 Configuring an Initial SSH password 24 Configuring an Initial HTTP Password 25 Configuring an initial HTTPS Password 25 Software Download and Reboot ......................................................................... 25 Software Download through XModem 25 Software Download Through TFTP Server 26 Boot Image Download 27 Startup Menu Functions ..................................................................................... 28 Chapter 3: Configuring the Switch 33 Using the Web Interface ..................................................................................... 33 Navigating the Web Browser Interface ............................................................... 33 Home Page 33 Configuration Options 34 Panel Display 35 Main Menu 35 Managing Device Information ............................................................................. 36 Managing Stacking ............................................................................................. 37 Understanding the Stack Topology 38 Stacking Failover Topology 38
v
Contents Stacking Members and Unit ID 38 Removing and Replacing Stacking Members 39 Exchanging Stacking Members 40 Switching between the Stacking Master and the Secondary Master 40 Configuring Stacking 41 Resetting the Stack 42 Managing System Logs ......................................................................................43 Enabling System Logs 43 Viewing Memory Logs 45 Viewing the Device FLASH Logs 47 Remote Log Configuration 48 Configuring SNTP ...............................................................................................51 Polling for Unicast Time Information 51 Polling for Anycast Time Information 51 Polling For Broadcast Time Information 52 Defining SNTP Global Settings 52 Defining SNTP Authentication 53 Defining SNTP Servers 54 Defining SNTP Interface Settings 56 Configuring System Time ...................................................................................57 Configuring Daylight Savings Time 57 Managing System Files ......................................................................................61 Downloading System Files 62 Uploading System Files 64 Copying Files 65 Active Image 66 TCAM Resources ...............................................................................................67 Configuring Interfaces .........................................................................................69 Configuring Interface Connections 69 Creating Trunks (LAGs) 72 Configuring LACP 73 Displaying Port Statistics ....................................................................................75 Interface Statistics 76 Etherlike Statistics 77 Configuring IP Information ..................................................................................80 Defining IP Addresses 80 Defining Default Gateways 81 Configuring DHCP 82 Configuring ARP 83 Configuring Domain Name Service ....................................................................85 Configuring General DNS Server Parameters 86 Configuring Static DNS Host to Address Entries 87 Configuring SNMP ..............................................................................................88 Enabling SNMP 89 Defining SNMP Users 90
vi
Contents Defining SNMP Group Profiles 92 Defining SNMP Views 93 Defining SNMP Communities 95 Defining SNMP Notification Recipients 96 Defining SNMP Notification Global Parameters 98 Defining SNMP Notification Filters 100 Configuring User Authentication ....................................................................... 101 Defining Local Users Passwords 101 Defining Line Passwords 102 Defining Enable Passwords 103 Configuring Authentication Methods ................................................................ 104 Defining Access Profiles 104 Defining Profile Rules 107 Defining Authentication Profiles 109 Mapping Authentication Methods 112 Defining TACACS+ Methods 114 Defining RADIUS Settings 115 Managing RMON Statistics .............................................................................. 118 Viewing RMON Statistics 118 Defining RMON History Control 120 Viewing the RMON History Table 121 Defining RMON Events Control 124 Viewing the RMON Events Logs 125 Defining RMON Alarms 126 Alcatel Mapping Adjacency Protocol (AMAP) ................................................... 128 Configuring AMAP 128 Viewing Adjacent Devices 130 Configuring LLDP ............................................................................................. 131 Defining LLDP Port Settings 132 Defining Media Endpoint Discovery Network Policy 133 Defining LLDP MED Port Settings 134 Viewing the LLDP Neighbor Information 135 Viewing Neighbor Information Details 136 Managing Power-over-Ethernet Devices .......................................................... 139 Defining PoE System Information 139 Defining PoE Interfaces 140 Device Diagnostic Tests ................................................................................... 142 Configuring Port Mirroring 142 Viewing Integrated Cable Tests 144 Viewing Optical Transceivers 145 Viewing Device Health 147 Configuring Traffic Control ............................................................................... 149 Enabling Storm Control 149 Configuring Port Security 151 802.1X Port-Based Authentication ................................................................... 153
vii
Contents Advanced Port-Based Authentication 154 Defining Network Authentication Properties 155 Defining Port Authentication 157 Modify Port Authentication Page 158 Configuring Multiple Hosts 160 Defining Authentication Hosts 162 Viewing EAP Statistics 164 Defining Access Control Lists ...........................................................................167 Configuring Access Control Lists 167 Binding Device Security ACLs 168 Defining IP Based Access Control Lists 169 Defining MAC Based Access Control Lists 171 DHCP Snooping ...............................................................................................173 DHCP Snooping Properties 174 Defining DHCP Snooping on VLANs 175 Defining Trusted Interfaces 176 Binding Addresses to the DHCP Snooping Database 177 Configuring Option 82 .......................................................................................178 Dynamic ARP Inspection ..................................................................................179 ARP Inspection Properties 180 ARP Inspection Trusted Interface Settings 181 Defining ARP Inspection List 182 Assigning ARP Inspection VLAN Settings 183 IP Source Guard ...............................................................................................184 Configuring IP Source Guard Properties 185 Defining IP Source Guard Interface Settings 185 Adding Interfaces to the IP Source Guard Database 186 Defining the Forwarding Database ...................................................................188 Defining Static Forwarding Database Entries 188 Defining Dynamic Forwarding Database Entries 189 Configuring Spanning Tree ...............................................................................191 Defining Spanning Tree 192 Defining STP on Interfaces 194 Defining Rapid Spanning Tree 197 Defining Multiple Spanning Tree 199 Defining MSTP Instance Settings 200 Defining MSTP Interface Settings 201 Configuring VLANs ...........................................................................................204 Assigning Ports to VLANs 204 Tagged/Untagged VLANs 206 Displaying Basic VLAN Information 206 Defining VLAN Membership 207 Defining VLAN Interface Settings 210 Defining Customer Mapping for Multicast TV 211 Mapping CPE VLANs 212
viii
Contents Defining VLAN Groups ..................................................................................... 213 Configuring MAC Based VLAN Groups 213 Configuring Subnet Based VLAN Groups 214 Configuring Protocol Based VLAN Groups 215 Mapping Groups to VLANs 216 Defining GARP 217 Defining GVRP 219 Viewing GVRP Statistics 220 Multicast Filtering ............................................................................................ 223 Defining IGMP Snooping 223 Specifying Static Interfaces for a Multicast Group 225 Displaying Interfaces Attached to a Multicast Router 227 Configuring Multicast TV 228 Defining Multicast TV Membership 229 Configuring Triple Play ..................................................................................... 230 Configuring Quality of Service .......................................................................... 231 Access Control Lists 232 Mapping to Queues 233 QoS Modes 234 Enabling QoS 235 Defining Global Queue Settings 236 Defining Bandwidth Settings 237 Configuring VLAN Rate Limit 239 Mapping CoS Values to Queues 240 Mapping DSCP Values to Queues 241 Defining Basic QoS Settings 242 Defining QoS DSCP Rewriting Settings 243 Defining QoS DSCP Mapping Settings 244 Defining QoS Class Maps 245 Defining Policies 246 Defining Tail Drop 248 Viewing the Policy Table 248 Viewing Policy Bindings 250 Chapter 4: Command Line Interface 253 Using the Command Line Interface .................................................................. 253 Accessing the CLI 253 Console Connection 253 Telnet Connection 253 Entering Commands ......................................................................................... 255 Keywords and Arguments 255 Minimum Abbreviation 255 Command Completion 255 Getting Help on Commands 255
ix
Contents Partial Keyword Lookup 257 Negating the Effect of Commands 257 Using Command History 257 Understanding Command Modes 257 Exec Commands 258 Configuration Commands 258 Command Line Processing 259 Command Groups ............................................................................................261 802.1x Commands ............................................................................................263 aaa authentication dot1x 264 dot1x system-auth-control 265 dot1x port-control 266 dot1x re-authentication 267 dot1x timeout re-authperiod 268 dot1x re-authenticate 269 dot1x timeout quiet-period 269 dot1x timeout tx-period 270 dot1x max-req 271 dot1x timeout supp-timeout 272 dot1x timeout server-timeout 273 show dot1x 274 show dot1x users 277 show dot1x statistics 279 ADVANCED FEATURES 281 dot1x auth-not-req 281 dot1x multiple-hosts 282 dot1x single-host-violation 283 dot1x guest-vlan 284 dot1x guest-vlan enable 285 dot1x mac-authentication 285 show dot1x advanced 286 AAA Commands ...............................................................................................288 aaa authentication login 288 aaa authentication enable 290 login authentication 291 enable authentication 292 ip http authentication 293 ip https authentication 294 show authentication methods 294 password 296 enable password 296 username 297 show users accounts 298 ACL Commands ...............................................................................................300 ip-access-list 300
x
Contents permit (ip) 301 deny (IP) 304 mac access-list 306 permit (MAC) 307 deny (MAC) 308 service-acl 310 show access-lists 310 show interfaces access-lists 311 Address Table Commands ............................................................................... 313 bridge address 314 bridge multicast filtering 315 bridge multicast address 316 bridge multicast forbidden address 317 bridge multicast forward-all 318 bridge multicast forbidden forward-all 319 bridge aging-time 320 clear bridge 320 port security 321 port security mode 321 port security max 322 port security routed secure-address 323 show bridge address-table 324 show bridge address-table static 325 show bridge address-table count 326 show bridge multicast address-table 327 show bridge multicast address-table static 328 show bridge multicast filtering 329 show ports security 330 show ports security addresses 331 LLDP Commands ............................................................................................. 333 lldp optional-tlv 333 lldp med enable 334 lldp med network-policy (global) 334 lldp med network-policy (interface) 335 lldp med location 335 clear lldp rx 336 show lldp configuration 337 show lldp med configuration 337 show lldp local 338 show lldp neighbors 340 AMAP Commands ............................................................................................ 345 amap enable 345 amap discovery time 346 amap common time 346 show amap 346
xi
Contents Clock Commands .............................................................................................348 349 clock set 349 clock source 350 clock timezone 350 clock summer-time 351 sntp authentication-key 353 sntp authenticate 353 sntp trusted-key 354 sntp client poll timer 355 sntp broadcast client enable 356 sntp anycast client enable 357 sntp client enable (Interface) 357 sntp unicast client enable 358 sntp unicast client poll 359 sntp server 360 show clock 361 show sntp configuration 362 show sntp status 363 Configuration and Image File Commands ........................................................365 copy 365 delete 368 dir 369 more 370 rename 371 boot system 372 show running-config 373 show startup-config 373 show bootvar 374 Ethernet Configuration Commands ..................................................................376 interface ethernet 376 interface range ethernet 377 shutdown 378 description 379 speed 380 duplex 381 negotiation 382 flowcontrol 383 mdix 383 back-pressure 384 clear counters 385 set interface active 386 show interfaces advertise 386 show interfaces configuration 388 show interfaces status 390
xii
Contents show interfaces description 392 show interfaces counters 392 port storm-control broadcast enable 395 port storm-control broadcast rate 396 show ports storm-control 397 GVRP Commands ............................................................................................ 399 gvrp enable (Global) 399 gvrp enable (Interface) 400 garp timer 401 gvrp vlan-creation-forbid 402 gvrp registration-forbid 402 clear gvrp statistics 403 show gvrp configuration 404 show gvrp statistics 405 show gvrp error-statistics 406 IGMP Snooping Commands ............................................................................. 408 ip igmp snooping (Global) 408 ip igmp snooping (Interface) 409 ip igmp snooping host-time-out 410 ip igmp snooping mrouter-time-out 410 ip igmp snooping leave-time-out 411 ip igmp snooping multicast-tv 412 ip igmp snooping querier enable 413 ip igmp snooping querier address 413 ip igmp snooping querier version 414 show ip igmp snooping mrouter 414 show ip igmp snooping interface 415 show ip igmp snooping groups 416 IP Addressing Commands ................................................................................ 418 ip address 418 ip address dhcp 419 ip default-gateway 420 show ip interface 421 arp 422 arp timeout 423 clear arp-cache 424 show arp 424 ip domain-lookup 425 ip domain-name 426 ip name-server 426 ip host 427 clear host 428 clear host dhcp 429 show hosts 429 LACP Commands ............................................................................................. 431
xiii
Contents lacp system-priority 431 lacp port-priority 432 lacp timeout 432 show lacp ethernet 433 show lacp port-channel 435 Line Commands ................................................................................................437 line 437 speed 438 autobaud 439 exec-timeout 439 history 440 history size 440 terminal history 441 terminal history size 442 show line 443 Management ACL Commands .........................................................................445 management access-list 445 permit (Management) 446 deny (Management) 447 management access-class 448 show management access-list 449 show management access-class 450 PHY Diagnostics Commands ...........................................................................451 test copper-port tdr 451 show copper-ports tdr 452 show copper-ports cable-length 452 show fiber-ports optical-transceiver 453 Port Channel Commands .................................................................................455 interface port-channel 455 interface range port-channel 455 channel-group 456 show interfaces port-channel 457 Port Monitor Commands ...................................................................................458 port monitor 458 show ports monitor 459 Power over Ethernet Commands ......................................................................460 power inline 460 power inline powered-device 461 power inline priority 462 power inline usage-threshold 462 power inline traps enable 463 show power inline 464 QoS Commands ...............................................................................................467 qos 468 show qos 469
xiv
Contents class-map 469 show class-map 470 match 471 policy-map 472 class 472 rate-limit 473 rate-limit (VLAN) 474 show policy-map 474 trust cos-dscp 475 set 476 police 477 service-policy 478 qos aggregate-policer 478 show qos aggregate-policer 480 police aggregate 481 wrr-queue cos-map 481 priority-queue out num-of-queues 482 traffic-shape 483 show qos interface 484 qos wrr-queue threshold 486 qos map dscp-dp 487 qos map policed-dscp 487 qos map dscp-queue 488 qos trust (Global) 489 qos trust (Interface) 490 qos cos 490 qos dscp-mutation 491 qos map dscp-mutation 492 show qos map 493 RADIUS Commands ........................................................................................ 495 radius-server host 495 radius-server key 497 radius-server retransmit 497 radius-server source-ip 498 radius-server timeout 499 radius-server deadtime 500 show radius-servers 501 RMON Commands ........................................................................................... 503 show rmon statistics 503 rmon collection history 505 show rmon collection history 506 show rmon history 507 rmon alarm 510 show rmon alarm-table 511 show rmon alarm 512
xv
Contents rmon event 514 show rmon events 514 show rmon log 515 rmon table-size 517 SNMP Commands ............................................................................................518 snmp-server community 519 snmp-server view 520 snmp-server group 521 snmp-server user 522 snmp-server engineID local 523 snmp-server enable traps 525 snmp-server filter 525 snmp-server host 526 snmp-server v3-host 528 snmp-server trap authentication 529 snmp-server contact 529 snmp-server location 530 snmp-server set 531 show snmp 531 show snmp engineid 533 show snmp views 534 show snmp groups 535 show snmp filters 536 show snmp users 536 Spanning-Tree Commands ...............................................................................538 spanning-tree 539 spanning-tree mode 540 spanning-tree forward-time 541 spanning-tree hello-time 542 spanning-tree max-age 543 spanning-tree priority 544 spanning-tree disable 544 spanning-tree cost 545 spanning-tree port-priority 546 spanning-tree portfast 547 spanning-tree link-type 548 spanning-tree pathcost method 549 spanning-tree bpdu 550 clear spanning-tree detected-protocols 551 spanning-tree mst priority 551 spanning-tree mst max-hops 552 spanning-tree mst port-priority 553 spanning-tree mst cost 554 spanning-tree mst configuration 556 instance (mst) 556
xvi
Contents name (mst) 558 revision (mst) 558 show (mst) 559 exit (mst) 561 abort (mst) 561 spanning-tree guard root 562 spanning-tree bpduguard 563 dot1x bpdu 563 show dot1x bpdu 564 show spanning-tree 564 SSH Commands ............................................................................................... 580 ip ssh port 580 ip ssh server 581 crypto key generate dsa 581 crypto key generate rsa 582 ip ssh pubkey-auth 583 crypto key pubkey-chain ssh 584 user-key 585 key-string 586 show ip ssh 587 show crypto key mypubkey 588 show crypto key pubkey-chain ssh 589 Syslog Commands ........................................................................................... 591 logging on 591 logging 592 logging console 593 logging buffered 594 logging buffered size 595 clear logging 595 logging file 596 clear logging file 597 aaa logging 597 file-system logging 598 management logging 598 show logging 599 show logging file 601 show syslog-servers 603 System Management Commands .................................................................... 604 ping 604 traceroute 606 telnet 608 resume 611 reload 612 hostname 612 stack master 613
xvii
Contents stack reload 614 stack display-order 614 show stack 615 show users 617 show sessions 617 show system 618 show version 619 service cpu-utilization 620 show cpu utilization 621 TACACS+ Commands ......................................................................................622 tacacs-server host 622 tacacs-server key 623 tacacs-server timeout 624 tacacs-server source-ip 625 show tacacs 625 Triple Play Commands .....................................................................................627 switchport customer vlan 627 switchport customer multicast-tv vlan 627 ip igmp snooping map cpe vlan 628 show ip igmp snooping cpe vlans 629 show ip igmp snooping interface 629 DHCP Snooping, IP Source Guard and ARP Inspection Commands ..............631 ip dhcp snooping 632 ip dhcp snooping vlan 633 ip dhcp snooping trust 634 ip dhcp information option allowed-untrusted 634 ip dhcp information option 635 ip dhcp snooping verify 635 ip dhcp snooping database 636 ip dhcp snooping database update-freq 636 ip dhcp snooping binding 637 clear ip dhcp snooping database 638 show ip dhcp snooping 638 show ip dhcp snooping binding 639 ip source-guard (global) 640 ip source-guard (interface) 640 ip source-guard binding 641 ip source-guard tcam retries-freq 642 ip source-guard tcam locate 643 show ip source-guard 643 show ip source-guard inactive 644 ip arp inspection 645 ip arp inspection vlan 646 ip arp inspection trust 646 ip arp inspection validate 647
xviii
Contents ip arp inspection list create 648 ip mac 648 ip arp inspection list assign 649 ip arp inspection logging interval 650 show ip arp inspection 650 show ip arp inspection list 651 User Interface Commands ............................................................................... 652 do 652 enable 653 disable 654 login 654 configure 655 exit (Configuration) 655 exit 656 end 657 help 657 terminal datadump 658 show history 659 show privilege 659 VLAN Commands ............................................................................................. 661 vlan database 662 vlan 663 default-vlan vlan 664 interface vlan 664 interface range vlan 665 name 666 map protocol protocols-group 666 switchport general map protocols-group vlan 667 switchport mode 668 switchport access vlan 669 switchport trunk allowed vlan 670 switchport trunk native vlan 671 switchport general allowed vlan 672 switchport general pvid 673 switchport general ingress-filtering disable 674 switchport general acceptable-frame-type tagged-only 675 switchport forbidden vlan 676 map mac macs-group 677 switchport general map macs-group vlan 677 map subnet subnets-group 678 switchport general map subnets-group vlan 679 switchport protected 680 ip internal-usage-vlan 681 show vlan 682 show vlan internal usage 683
xix
Contents show interfaces switchport 684 switchport access multicast-tv vlan 687 show vlan protocols-groups 688 show vlan macs-groups 688 show vlan subnets-groups 689 show vlan multicast-tv 690 Web Server Commands ...................................................................................691 ip http server 691 ip http port 692 ip http exec-timeout 693 ip https server 693 ip https port 694 ip https exec-timeout 695 crypto certificate generate 695 crypto certificate request 696 crypto certificate import 698 ip https certificate 699 show crypto certificate mycertificate 699 show ip http 700 show ip https 701 Appendix A. Configuration Examples 703 Configuring QinQ ..............................................................................................704 Configuring Customer VLANs using the CLI ....................................................707 Configuring Multicast TV ..................................................................................709 Configuring Customer VLANs ...........................................................................716 Configuring Customer VLANs Using the Web Interface ...................................716 Appendix B. Software Specifications 721 Software Features ............................................................................................721 Management Features ......................................................................................722 Standards .........................................................................................................722 Management Information Bases .......................................................................723 Appendix C. Troubleshooting 725 Problems Accessing the Management Interface ..............................................725 Using System Logs ...........................................................................................726 Appendix D. Glossary 727
xx
Figures
Figures
Figure 2-1. Figure 2-2. Figure 3-3. Figure 3-4. Figure 3-5. Figure 3-6. Figure 3-7. Figure 3-8. Figure 3-9. Figure 3-10. Figure 3-11. Figure 3-12. Figure 3-13. Figure 3-14. Figure 3-15. Figure 3-16. Figure 3-17. Figure 3-18. Figure 3-19. Figure 3-20. Figure 3-21. Figure 3-22. Figure 3-23. Figure 3-24. Figure 3-25. Figure 3-26. Figure 3-27. Figure 3-28. Figure 3-29. Figure 3-30. Figure 3-31. Figure 3-32. Figure 3-33. Figure 3-34. Figure 3-35. Figure 3-36. Figure 3-37. Figure 3-38. Figure 3-39. Figure 3-40. Figure 3-41. Figure 3-42. Installation and Configuration Send File window Home Page Ports Panel System Information Page Stack Management Topology Page Stack Management - Reset Page Logs Settings Page Memory Page FLASH Logs Page Remote Log Page SNTP Configuration Page SNTP Authentication Page SNTP Servers Page SNTP Interface Page Clock Time Zone Page File Download Page File Upload Page Copy Files Page Active image Page TCAM Resources Page Interface Configuration Page LAG Membership Page Interface LACP Configuration Page Statistics Interface Page Statistics Etherlike Page IP Interface Page Default Gateway Page DHCP Page ARP Page DNS Server Page DNS Host Mapping Page Engine ID Page SNMP Users Page SNMP Groups Page SNMP Views Page SNMP Communities Page SNMP Trap Station Management Page SNMP Global Trap Settings Page Trap Filter Settings Page Local Users Page Line Page 14 29 34 35 37 41 42 44 46 48 49 53 54 55 56 61 63 65 66 67 69 71 73 75 77 78 81 82 83 84 86 88 90 92 93 94 96 98 99 100 102 103
xxi
Figures Figure 3-43. Figure 3-44. Figure 3-45. Figure 3-46. Figure 3-47. Figure 3-48. Figure 3-49. Figure 3-50. Figure 3-51. Figure 3-52. Figure 3-53. Figure 3-54. Figure 3-55. Figure 3-56. Figure 3-57. Figure 3-58. Figure 3-59. Figure 3-60. Figure 3-61. Figure 3-62. Figure 3-63. Figure 3-64. Figure 3-65. Figure 3-66. Figure 3-67. Figure 3-68. Figure 3-69. Figure 3-70. Figure 3-71. Figure 3-72. Figure 3-73. Figure 3-74. Figure 3-75. Figure 3-76. Figure 3-77. Figure 3-78. Figure 3-79. Figure 3-80. Figure 3-81. Figure 3-82. Figure 3-83. Figure 3-84. Figure 3-85. Figure 3-86. Figure 3-87.
xxii
Enable Page Access Profiles Page Profiles Rules Page Authentication Profiles Page Authentication Mapping Page TACACS+ Page RADIUS Page RMON Statistics Page History Control Page History Table Page Events Control Page Events Logs Page Alarm Page AMAP Settings Page AMAP Adjacencies Page LLDP Properties Page LLDP Port Settings Page MED Networking Policy Page MED Port Settings Page LLDP Neighbor Information Page Details Neighbor Information Page Properties Page PoE Interface Page Port Mirroring Page Copper Cable Page Optical Transceiver Page Health Page Storm Control Page Port Security Page System Information Page Port Authentication Page Multiple Hosts Page Authentication Host Page Statistics Page ACL Binding Page IP Based ACL Page MAC Based ACL Page DHCP Snooping Properties Page VLAN Settings Page Trusted Interface Page Binding Database Page DHCP Option 82 Page ARP Inspection Properties Page ARP Inspection Trusted Interface Page ARP Inspection List Page
104 107 109 110 113 115 117 119 121 122 125 126 128 129 130 132 133 134 135 136 138 140 142 144 145 146 148 150 153 156 160 162 163 166 169 171 173 175 176 177 178 179 181 182 183
Figures Figure 3-88. VLAN Settings Page Figure 3-89. IP Source Guard Properties Page Figure 3-90. Interface Settings Page Figure 3-91. IP Source Guard Binding Database Page Figure 3-92. Static Addresses Page Figure 3-93. Dynamic Addresses Page Figure 3-94. STP General Page Figure 3-95. Interface Configuration Page Figure 3-96. RSTP Page Figure 3-97. MSTP General Page Figure 3-98. MSTP Instance Settings Page Figure 3-99. MSTP Interface Settings Page Figure 3-100. VLAN Basic Information Page Figure 3-101. Current Table Page Figure 3-102. Interface Configuration Page Figure 3-103. Customer Multicast TV VLAN Page Figure 3-104. CPE VLANs Mapping Page Figure 3-105. MAC-Based Groups Page Figure 3-106. Subnet-Based Groups Page Figure 3-107. Protocol Based Groups Page Figure 3-108. Mapping Groups to VLAN Page Figure 3-109. GARP Configuration Page Figure 3-110. GVRP Parameters Page Figure 3-111. GVRP Statistics Page Figure 3-112. IGMP Snooping Page Figure 3-113. Multicast Group Page Figure 3-114. Multicast Forward All Page Figure 3-115. IGMP Snooping Mapping Page Figure 3-116. Multicast TV Membership Page Figure 3-117. CoS Mode Page Figure 3-118. Queue Priority Page Figure 3-119. Bandwidth Configuration Page Figure 3-120. VLAN Rate Limit Page Figure 3-121. CoS to Queue Page Figure 3-122. DSCP Priority Page Figure 3-123. QoS General Page Figure 3-124. DSCP Rewrite Page Figure 3-125. DSCP Mapping Page Figure 3-126. Class Map Page Figure 3-127. Aggregate Policer Page Figure 3-128. Tail Drop Page Figure 3-129. Policy Table Page Figure 3-130. Policy Binding Page Figure 1. VLAN Basic Information Page Figure 2. Add 802.1q VLAN Page 184 185 186 187 189 190 194 197 199 200 201 203 207 209 211 212 213 214 215 216 217 218 220 221 225 226 228 229 230 236 237 239 240 241 242 243 244 245 246 247 248 249 251 704 705
xxiii
Figures Figure 3. Figure 4. Figure 5. Figure 6. Figure 7. Figure 8. Figure 9. Figure 10. Figure 11. Figure 12. Figure 13. Figure 14. Figure 15. Figure 16. Figure 17. VLAN Interface Configuration Page Modify VLAN Interface Configuration Page VLAN Current Table QinQ Configuration Example Triple Play Configuration Add VLAN Membership Page CPE VLAN Mapping Page CPE VLAN Mapping Page VLAN Interface Settings Page Customer Multicast TV VLAN Page VLAN Basic Information Page Add VLAN Page VLAN Interface Configuration Page Modify VLAN Interface Configuration Page VLAN Current Table 705 706 707 707 709 712 713 714 715 716 717 717 718 718 719
xxiv
Chapter 1: Introduction
The OmniStack 6200 series has seven platforms: OS-LS-6212 Ethernet based switch with 12 RJ-45 10/100Base-TX ports, two Gigabit combo uplink ports (with SFP or 10/100/1000Base-TX interfaces) and two ports full-duplex Gigabit stacking OS-LS-6212P Ethernet based switch with 12 RJ-45 10/100Base-TX ports providing
standard-based Power over Ethernet, two Gigabit combo uplink ports (with SFP or 10/ 100/1000Base-TX interfaces) and two ports full-duplex Gigabit stacking
OS-LS-6224 Ethernet based switch with 24 RJ-45 10/100Base-TX ports, two Gigabit combo uplink ports (with SFP or 10/100/1000Base-TX interfaces) and two ports full-duplex Gigabit stacking (optional DC power source) OS-LS-6224P Ethernet based switch with 24 RJ-45 10/100Base-TX ports providing standard-based Power over Ethernet, two Gigabit combo uplink ports (with SFP or 10/100/1000Base-TX interfaces) and two ports full-duplex Gigabit stacking OS-LS-6248 Ethernet based switch with 48 RJ-45 10/100Base-TX ports, two Gigabit combo uplink ports (with SFP or 10/100/1000Base-TX interfaces) and two ports full-duplex Gigabit stacking (optional DC power source) OS-LS-6248P Ethernet based switch with 48 RJ-45 10/100Base-TX ports providing standard-based Power over Ethernet, two Gigabit combo uplink ports (with SFP or 10/100/1000Base-TX interfaces) and two ports full-duplex Gigabit stacking OS-LS-6224U Ethernet based switch with 24 100Base-FX external SFP ports, two Gigabit combo ports with assicuated Mini-GBIC slots or RJ-45 ports and two 1000Base-T stacking ports All devices have a management port which is used for debugging and management purposes. This switch provides a broad range of features for switching. It includes a management agent that allows you to configure the features listed in this manual. The default configuration can be used for most of the features provided by this switch. However, there are many options that you should configure to maximize the switchs performance for your particular network environment.
Key Features
Table 1-1. Key Features Feature Configuration Backup and Restore Description Backup to TFTP server
Introduction
Table 1-1. Key Features
Feature Authentication
Description Console, Telnet, web User name / password, RADIUS, TACACS+ Web HTTPS; Telnet SSH SNMP v1/2c - Community strings SNMP version 3 MD5 or SHA password Port IEEE 802.1x Supports up to 1K IP or MAC ACLs Supported Supported Speed, duplex mode and flow control Input and output rate limiting per port One or more ports mirrored to single analysis port Supports up to 8 trunks using either static or dynamic trunking (LACP) Supported Up to 16K MAC addresses in the forwarding table Supports dynamic data switching and addresses learning Supported to ensure wire-speed switching while eliminating bad frames Supports standard STP, Rapid Spanning Tree Protocol (RSTP), Multiple Spanning Trees (MSTP). Up to 255 using IEEE 802.1Q, port-based, protocol-based, or private VLANs GVRP Default port priority, traffic class map, queue scheduling, IP Precedence, or Differentiated Services Code Point (DSCP) and TCP/UDP Port Prevents devices outside the network core from being assigned the spanning tree root. Used as a security mechanism to protect the network from invalid configurations. MAC authentication ensures that end-user stations meet security policies criteria, and protects networks from viruses. Expands network security by providing a firewall security between untrusted interfaces and DHCP servers. Enables to add information for the DHCP server on request. Restricts IP traffic on non-routed, Layer 2 interfaces by filtering traffic. This feature is based on the DHCP snooping binding database and on manually configured IP source bindings. Classic Address Resolution Protocol is a TCP/IP protocol that translates IP addresses into MAC addresses.
Access Control Lists DHCP Client DNS Server Port Configuration Rate Limiting Port Mirroring Port Trunking Broadcast Storm Control Static Address IEEE 802.1D Bridge Store-and-Forward Switching Spanning Tree Protocol Virtual LANs Traffic Prioritization STP Root Guard STP BPDU Guard 802.1x - MAC Authentication DHCP Snooping DHCP Option 82 IP Source Address Guard ARP Inspection
Increases network flexibility by allowing different IP systems to co-exist on a single network. Supports Quality of Service (QoS). Supports IGMP snooping and query. Enables PoE support. Supplies multicast transmissions to L2-isolated subscribers, without replicating the multicast transmissions for each subscriber VLAN. Packets are classified according to the packets source IP subnet in its IP header Packets are classified according to MAC address Support of mini jumbo frames allows forwarding of packets up to 1632 bytes. Allows network managers to add an additional tag to previously tagged packets
Introduction
MAC Address Capacity Support The device supports up to 16K MAC addresses. The device reserves specific MAC addresses for system use. Self-Learning MAC Addresses The device enables automatic MAC addresses learning from incoming packets. Automatic Aging for MAC Addresses MAC addresses from which no traffic is received for a given period are aged out. This prevents the Bridging Table from overflowing. Static MAC Entries User defined static MAC entries are stored in the Bridging Table, in addition to the Self Learned MAC addresses. VLAN-Aware MAC-based Switching Packets arriving from an unknown source address are sent to the CPU. When source addresses are added to the Hardware Table, packets addressed to this address are then forwarded straight to corresponding port. MAC Multicast Support Multicast service is a limited broadcast service, which allows one-to-many and many-to-many connections for information distribution. Layer 2 multicast service is where a single frame is addressed to a specific multicast address, and copies of the frame transmitted to relevant all relevant ports. Address Resolution Protocol IP routing generally utilizes routers and Layer 3 switches to inter-communicate using various routing protocols to discover network topology and define Routing tables. Device Next-Hop MAC addresses are automatically derived by ARP. This includes directly attached end systems. Users can override and supplement this by defining additional ARP Table entries. QinQ tagging QinQ tagging allows network managers to add an additional tag to previously tagged packets. Adding additional tags to the packets helps create more VLAN space. The added tag provides an VLAN ID to each customer, this ensures private and segregated network traffic. Port Configuration You can manually configure the speed, duplex mode, and flow control used on specific ports, or use auto-negotiation to detect the connection settings used by the attached device. Use the full-duplex mode on ports whenever possible to double the throughput of switch connections. Flow control should also be enabled to control network traffic during periods of congestion and prevent the loss of packets when port buffer thresholds are exceeded. The switch supports flow control based on the IEEE 802.3x standard. Rate Limiting This feature controls the maximum rate for traffic transmitted or received on an interface. Rate limiting is configured on interfaces at the edge of a network to limit traffic into or out of the network. Traffic that falls within the rate limit is transmitted, while packets that exceed the acceptable amount of traffic are dropped. Port Mirroring The switch can unobtrusively mirror traffic from any port to a monitor port. You can then attach a protocol analyzer or RMON probe to this port to perform traffic analysis and verify connection integrity. Port Trunking Ports can be combined into an aggregate connection. Trunks can be manually set up or dynamically configured using IEEE 802.3ad Link Aggregation
Control Protocol (LACP). The additional ports dramatically increase the throughput across any connection, and provide redundancy by taking over the load if a port in the trunk should fail. The switch supports up to 6 trunks. Broadcast Storm Control Broadcast suppression prevents broadcast traffic from overwhelming the network. When enabled on a port, the level of broadcast traffic passing through the port is restricted. If broadcast traffic rises above a pre-defined threshold, it will be throttled until the level falls back beneath the threshold. Static Addresses A static MAC address can be assigned to a specific interface on this switch. Static addresses are bound to the assigned interface and will not be moved. When a static address is seen on another interface, the address will be ignored and will not be written to the address table. Static addresses can be used to provide network security by restricting access for a known host to a specific port. STP BPDU Guard Bridge Protocol Data Units (BPDU) Guard expands network adminstrators ablility to enforce STP borders and maintain STP topologies realibility. BPDU is utilized when Fast Link ports is enabled and/or if the Spanning Tree Protocol is disabled on ports. If a BPDU message is sent to a port on which STP is disabled, BPDU Guard shuts down the port, and generates a SNMP message. STP Root Guard Spanning Tree Root Guard is used to prevent an unauthorized device from becoming the root of a spanning tree. Root guard functionality enables detection and resolution of misconfigurations, while preventing loops or loss of connectivity. 802.1x - MAC Authentication MAC authentication like the 802.1X allows network access to a device, for example, printers and IP phones, that do not have the 802.1X supplicant capability. MAC authentication uses the MAC address of the connecting device to grant or deny network access. To support MAC authentication, the RADIUS authentication server maintains a database of MAC addresses for devices that require access to the network. In order for the feature to be active, 802.1x must be in auto-mode. User then can enable the MAC authentication feature in one of following modes: MAC Only Where only MAC authentication is enabled MAC + 802.1x (In that case 802.1x takes precedence) The feature can be enabled per port. The port must be a member of a guest VLAN prior of activating the feature. DHCP Snooping DHCP Snooping expands network security by providing a firewall security between untrusted interfaces and DHCP servers. By enabling DHCP Snooping network administrators can identify between trusted interfaces connected to end-users or DHCP Servers, and untrusted interface located beyond the network firewall. DHCP Snooping creates and maintains a DHCP Snooping Table which contains information received from untrusted packets. Interfaces are untrusted if the packet is received from an interface from outside the network or from a interface beyond the network firewall.
Introduction
DHCP Option 82 DHCP server can insert information into DHCP requests. The DHCP information is used to assign IP addresses to network interfaces. IP Source Address Guard IP source guard stops malignant network users from using unallocated network IP addresses. IP Source Guard ensures that only packets with an IP address stored in the DHCP Database are forwarded. IP address stored in the DHCP Snooping Database are either statically configured by the network administrator or are retrieved using DHCP. IP source guard can be enabled only on DHCP snooping untrusted interface. Dynamic ARP Inspection ARP Inspection eliminates man-in-the-middle attacks, where false ARP packets are inserted into the subnet. ARP requests and responses are inspected, and their MAC Address to IP Address binding is checked. Packets with invalid ARP Inspection Bindings are logged and dropped. Packets are classified as: Trusted Indicates that the interface IP and MAC address are recognized, and recorded in the ARP Inspec-tion List. Trusted packets are forward without ARP Inspection. Untrusted Indicates that the packet arrived from an interface that does not have a recognized IP and MAC addresses. The packet is checked for: Source MAC Compares the packets source MAC address against the senders MAC address in the ARP request. This check is performed on both ARP requests and responses. Destination MAC Compares the packets destination MAC address against the destination interfaces MAC address. This check is performed for ARP responses. IP Addresses Compares the ARP body for invalid and unexpected IP addresses. Addresses include 0.0.0.0, 255.255.255.255, and all IP Multicast addresses. If the packets IP address was not found in the ARP Inspection List, and DHCP snooping is enabled for a VLAN, a search of the DHCP Snooping Database is performed. If the IP address is found the packet is valid, and is forwarded. ARP inspection is performed only on untrusted interfaces. LLDP - The Link Layer Discovery Protocol (LLDP) allows network managers to troubleshoot and enhance network management by discovering and maintaining network topologies over multi-vendor environments. LLDP discovers network neighbors by standardizing methods for network devices to advertise themselves to other system, and to store discovered information. Device discovery information includes: Device Identification Device Capabilities Device Configuration The advertising device transmits multiple advertisement message sets in a single LAN packet. The multiple advertisement sets are sent in the packet Type Length Value (TLV) field. LLDP devices must support chassis and port ID advertisement, as well as system name, system ID, system description, and system capability
LLDP-MED LLDP Media Endpoint Discovery (LLDP-MED) increases network flexibility by allowing different IP systems to co-exist on a single network. Provides detailed network topology information, including what device are located on the network, and where the devices are located. For example, which IP phone is connect to what port, which software is running on what switch, and which port is connected to what PC. Spanning Tree Protocol The switch supports these spanning tree protocols: Spanning Tree Protocol (STP, IEEE 802.1D) This protocol adds a level of fault tolerance by allowing two or more redundant connections to be created between a pair of LAN segments. When there are multiple physical paths between segments, this protocol will choose a single path and disable all others to ensure that only one route exists between any two stations on the network. This prevents the creation of network loops. However, if the chosen path should fail for any reason, an alternate path will be activated to maintain the connection. Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) This protocol reduces the convergence time for network topology changes to about 10% of that required by the older IEEE 802.1D STP standard. It is intended as a complete replacement for STP, but can still interoperate with switches running the older standard by automatically reconfiguring ports to STP-compliant mode if they detect STP protocol messages from attached devices. Multiple Spanning Tree Protocol (MSTP, IEEE 802.1s) This protocol is a direct extension of RSTP. It can provide an independent spanning tree for different VLANs. It simplifies network management, provides for even faster convergence than RSTP by limiting the size of each region, and prevents VLAN members from being segmented from the rest of the group (as sometimes occurs with IEEE 802.1D STP). Virtual LANs The switch supports up to 255 VLANs. A Virtual LAN is a collection of network nodes that share the same broadcast domain regardless of their physical location or connection point in the network. The switch supports tagged VLANs based on the IEEE 802.1Q standard. Members of VLAN groups can be dynamically learned via GVRP, or ports can be manually assigned to a specific set of VLANs. This allows the switch to restrict traffic to the VLAN groups to which a user has been assigned. By segmenting your network into VLANs, you can: Eliminate broadcast storms which severely degrade performance in a flat network. Simplify network management for node changes/moves by remotely configuring VLAN membership for any port, rather than having to manually change the network connection. Provide data security by restricting all traffic to the originating VLAN. Use private VLANs to restrict traffic to pass only between data ports and the uplink ports, thereby isolating adjacent ports within the same VLAN, and allowing you to limit the total number of VLANs that need to be configured. Use protocol VLANs to restrict traffic to specified interfaces based on protocol type.
Introduction
Traffic Prioritization This switch prioritizes each packet based on the required level of service, using eight priority queues with strict or Weighted Round Robin Queuing. It uses IEEE 802.1p and 802.1Q tags to prioritize incoming traffic based on input from the end-station application. These functions can be used to provide independent priorities for delay-sensitive data and best-effort data. This switch also supports several common methods of prioritizing layer 3/4 traffic to meet application requirements. Traffic can be prioritized based on the priority bits in the IP frames Type of Service (ToS) octet or the number of the TCP/UDP port. When these services are enabled, the priorities are mapped to a Class of Service value by the switch, and the traffic then sent to the corresponding output queue. Multicast Filtering Specific multicast traffic can be assigned to its own VLAN to ensure that it does not interfere with normal network traffic and to guarantee real-time delivery by setting the required priority level for the designated VLAN. The switch uses IGMP Snooping and Query to manage multicast group registration. Virtual Cable Testing (VCT) VCT detects and reports copper link cabling occurrences, such as open cables and cable shorts. MDI/MDIX Support The device supports auto-detection between crossed and straight-through cables. Standard wiring for end stations is Media-Dependent Interface (MDI) and the standard wiring for hubs and switches is known as Media-Dependent Interface with Crossover (MDIX). Quality of Service (QoS) Support Network traffic is usually unpredictable, and the only basic assurance that can be offered is Best Effort traffic delivery. To overcome this challenge, Quality of Service (QoS) is applied throughout the network. This ensures that network traffic is prioritized according to specified criteria, and that specific traffic receives preferential treatment. QoS in the network optimizes network performance. The device supports the following QoS modes: Basic Advanced Class Of Service 802.1p Support The IEEE 802.1p signaling technique is an OSI Layer 2 standard for marking and prioritizing network traffic at the data link/MAC sub-layer. 802.1p traffic is classified and sent to the destination. No bandwidth reservations or limits are established or enforced. 802.1p is a spin-off of the 802.1Q (Vlans) standard. 802.1p establishes eight levels of priority, similar to the IP Precedence IP Header bit-field. Quality of Service Basic Mode In the Basic QoS mode, it is possible to activate a trust mode (to trust VPT, DSCP, TCP/UDP or none). In addition, a single Access Control List can be attached to an interface. Web Based Management With web based management, the system can be managed from any web browser. The system contains an Embedded Web Server (EWS), which serves HTML pages, through which the system can be monitored and configured. The system internally converts web-based input into configuration commands, MIB variable settings and other management-related settings.
System Defaults
Remote Monitoring Remote Monitoring (RMON) is an extension to SNMP, which provides comprehensive network traffic monitoring capabilities (as opposed to SNMP which allows network device management and monitoring). RMON is a standard MIB that defines current and historical MAC-layer statistics and control objects, allowing real-time information to be captured across the entire network. VLAN Groups Provides VLAN classification by MAC address, subnet, and protocol groups. Multicast TV Supplies multicast transmissions to L2-isolated subscribers, without replicating the multicast transmissions for each subscriber VLAN Port Based Authentication Port based authentication enables authenticating system users on a per-port basis via an external server. Only authenticated and approved system users can transmit and receive data. Ports are authenticated via the Remote Authentication Dial In User Service (RADIUS) server using the Extensible Authentication Protocol (EAP).
System Defaults
The device is configured with default settings. To reset the device to the default settings, delete the startup configuration. The following table lists some of the basic system defaults.
Table 1-2. System Defaults Function Console Port Connection Parameter Baud Rate Data bits Stop bits Parity Local Console Timeout Authentication Privileged Exec Level Normal Exec Level Default 9600 8 1 0 10 no password no password
Enable Privileged Exec from Normal no password Exec Level RADIUS Authentication TACACS Authentication 802.1x Port Authentication HTTPS SSH Port Security disabled disabled disabled disabled disabled disabled
Introduction
Table 1-2. System Defaults
Function SNMP
Default no SNMP communities disabled local engine ID of device is comprised of IANA Private Enterprise number & MAC address of device enabled on off list of all capabilities on port enabled 300 sec. 30 sec. disabled up to 8 port in 8 trunks can be defined 1 1 long disabled 100 kbps enabled STP enabled 300 seconds 1 1 all on hybrid (tagged/untagged) disabled disabled
Port Configuration
AMAP
Input and output limits Static Trunks LACP system priority LACP Port-priority LACP
Status Broadcast Limit Rate Status Spanning Tree Mode Fast Forwarding (Edge Port)
Aging Time Default VLAN PVID Acceptable Frame Type Ingress Filtering Switchport Mode (Egress Mode) GVRP (global) GVRP (port interface)
10
System Defaults
Table 1-2. System Defaults Function Quality of Service Parameter QoS Mode CoS Mapping Default disabled
Cos 0 - queue 1; CoS 1 - queue 1; Cos 2 queue 1 Cos 3 - queue 1; CoS 4 - queue 2; Cos 5 queue 2 Cos 6 - queue 3; CoS 7 - queue 3; all queues are expedite queues none none none disabled enabled if configuration is empty and there is no command line activity within 60 seconds enabled disabled on 200 200 0:00 Jan 1, 2000 internal disabled no servers defined disabled disabled disabled disabled disabled disabled disabled disabled disabled disabled enabled
Scheduling IP Settings IP Address Subnet Mask Default Gateway DHCP BOOTP DNS Server Multicast Filtering System Log Domain Lookup IGMP Snooping Status Messages Logged Messages Logged to Flash SNTP Clockset Clock source Daylight Savings SNTP Port Security Port Lock DHCP Snooping DHCP Option 82 STP BPDU Guard ARP Inspection IP Source Address Guard Root Guard Multicast Forwarding IGMP Snooping (Global) IGMP Snooping (Interface) Multicast TV VLAN SSH Server
11
1
SSL
Introduction
Table 1-2. System Defaults
Function
RADIUS TACACS+
12
13
Initial Configuration
14
Auto-Negotiation
Auto-negotiation allows a device to advertise modes of operation and share information with another device that shares a point-to-point link segment. This automatically configures both devices to take maximum advantage of their abilities. Auto-negotiation is performed completely within the physical layers during link initiation, without any additional overhead to either the MAC or higher protocol layers. Auto-negotiation allows the ports to do the following: Advertise their abilities Acknowledge receipt and understanding of the common modes of operation that both devices share Reject the use of operational modes that are not shared by both devices Configure each port for the highest-level operational mode that both ports can support If connecting a port of the switch to the network interface card (NIC) of a terminal that does not support auto-negotiation or is not set to auto-negotiation, both the device port and the NIC must be manually set with the Web browser interface or CLI commands to the same speed and duplex mode. Note: If the station on the other side of the link attempts to auto-negotiate with a port that
is manually configured to full duplex, the auto-negotiation results in the station attempting to operate in half duplex. The resulting mismatch may lead to significant frame loss. This is inherent in the auto-negotiation standard.
Note: These default settings can be modified once the device is installed. The following is an example for changing the port speed on port g1 using CLI commands:
Console (config)# interface ethernet g1 Console (config-if)# speed 100 4-376 4-380
15
Initial Configuration
The following is an example for enabling flow control on port e1 using CLI commands:
Console (config)# interface ethernet e1 Console (config-if)# flowcontrol on 4-376 4-383
The following is an example for enabling back pressure on port e1 using CLI commands.
Console (config)# interface ethernet e1 Console (config-if)# speed 10 Console (config-if)# back-pressure 4-376 4-380 4-384
When the power is turned on with the local terminal already connected, the switch goes through Power On Self Test (POST). POST runs every time the device is initialized and checks hardware components to determine if the device is fully operational before completely booting. If a critical problem is detected, the program flow stops. If POST passes successfully, a valid executable image is loaded into RAM. POST messages are displayed on the terminal and indicate test success or failure. As the switch boots, the bootup test first counts the device memory availability and then continues to boot. The following screen is an example of the displayed POST.
------ Performing the Power-On Self Test (POST) -----Boot1 Checksum Test...............................PASS Boot2 Checksum Test...............................PASS Flash Image Validation Test.......................PASS BOOT Software Version x.x.x.xx Built 07-Jan-200x 10:53:05 Processor: xxxxxx xxxxx xxxx, xx MByte SDRAM. I-Cache 8 KB. D-Cache 8 KB. Cache Enabled. Autoboot in 2 seconds - press RETURN or Esc. to abort and enter prom.
16
During boot, the Startup menu can be accessed if necessary to run special procedures. To enter the Startup menu, press <Esc> or <Enter> within the first two seconds after the auto-boot message is displayed. For information on the Startup menu, see "Startup Menu Functions." If the system boot is not interrupted by pressing <Esc> or <Enter>, the system continues operation by decompressing and loading the code into RAM. The code starts running from RAM and the list of numbered system ports and their states (up or down) are displayed. Note: The following screen is an example configuration. Items such as addresses,
versions, and dates may differ for each device.
Preparing to decompress... Decompressing SW from image-1 638000 OK Running from RAM... ********************************************************************* *** Running SW Ver. x.x.x.x Date 11-Jan-200x Time 15:43:13 *** ********************************************************************* HW version is Base Mac address is: 00:00:b0:24:11:80 Dram size is: xxM bytes Dram first block size is: 47104K bytes Dram first PTR is: 0x1200000 Flash size is: xM Devices on SMI BUS: ------------------smi dev id = 16, dev type=0xd0411ab, dev revision=0x1 Device configuration: Prestera based - Back-to-back system Slot 1 - DB-DX240-24G HW Rev. xx.xx Tapi Version: xx.x.x-x Core Version: xx.x.x-x 01-Jan-200x 01:01:22 %INIT-I-InitCompleted: Initialization task is completed Console> 01-Jan-200x 01-Jan-200x 01:01:23 01-Jan-200x 01:01:23 01-Jan-200x 01:01:23 . . . 01-Jan-200x 01:01:23 01-Jan-200x 01:01:23 01-Jan-200x 01:01:23 01:01:23 %LINK-I-Up: %LINK-W-Down: e2 %LINK-I-Up: Vlan 1 %LINK-W-Down: e4 e1
After the switch boots successfully, a system prompt appears (console>) and the local terminal can be used to begin configuring the switch. However, before
17
Initial Configuration
configuring the switch, ensure that the software version installed on the device is the latest version. If it is not the latest version, download and install the latest version. See "Software Download and Reboot."
Configuration Overview
Before assigning a static IP address to the device, obtain the following information from the network administrator: A specific IP address allocated by the network administrator for the switch to be configured Network mask for the network There are two types of configuration: Initial configuration consists of configuration functions with basic security considerations, whereas advanced configuration includes dynamic IP configuration and more advanced security considerations. After making any configuration changes, the new configuration must be saved before rebooting. To save the configuration, enter the following CLI command:
Console#
4-365
Initial Configuration
Initial configuration, which starts after the device has booted successfully, includes static IP address and subnet mask configuration, and setting user name and privilege level to allow remote management. If the device is to be managed from an SNMP-based management station, SNMP community strings must also be configured. The following configurations are completed: Static IP Address and Subnet Mask Static Route Configuration User Name SNMP Community strings
18
Initial Configuration
To configure a static route, enter the command at the system prompt as shown in the following configuration example where 101.1.1.2 is the specific management station:
Console# configure Console(config)# interface vlan 1 Console(config-if)# ip address 100.1.1.1 255.255.255.0 Console(config-if)# exit Console(config)# ip default-gateway 100.1.1.10
.
Gateway IP Address Gateway IP Type Address 10.7.1.1 Static IP Address Interface --------------------10.7.1.192/24 VLAN1 10.7.2.192/24 VLAN2 Activity Status Active Type ------------static DHCP
User Name
A user name is used to manage the device remotely, for example through SSH, Telnet, or the Web interface. To gain complete administrative (super-user) control over the device, the highest privilege level 15 must be specified. Note: Only the administrator (super-user) with the highest privilege level (15) is allowed
to manage the device through the Web browser interface.
For more information about the privilege level, see the Command Line Interface. The configured user name is entered as a login name for remote management sessions. To configure user name and privilege level, enter the command at the system prompt as shown in the configuration example: Console> enable Console# configure Console(config)# username admin password lee privilege 15
19
Initial Configuration
exact structure of the MIB tree and receive the complete private MIBs information before being able to manage the MIBs. All parameters are manageable from any SNMP management platform, except the SNMP management station IP address and community (community name and access rights). The SNMP management access to the switch is disabled if no community strings exist. Note: The device switch is delivered with no community strings configured. The following screen displays the default device configuration:
Console#
show snmp
Community-Access ---------------IP address ----------
4-531
The community-string, community-access, and IP address can be configured through the local terminal during the initial configuration procedure. The SNMP configuration options for the Community String are as follows: Access rights options: ro (read only), rw (read-and-write) or su (super). An option to configure IP address or not: If an IP address is not configured, it means that all community members having the same community name are granted the same access rights. Common practice is to use two community strings for the switch one (public community) with read-only access and the other (private community) with read-write access. The public string allows authorized management stations to retrieve MIB objects, while the private string allows authorized management stations to retrieve and modify MIB objects. During initial configuration, it is recommended to configure the device according to the network administrator requirements, in accordance with using an SNMP-based management station. To configure SNMP station IP address and community string(s) perform the following: 1. 2. 3. At the console prompt, enter the command Enable. The prompt is displayed as #. Enter the command configure and press <Enter>. In the configuration mode, enter the SNMP configuration command with the parameters including community name (private), community access right (read and write) and IP address, as shown in the following example:
20
Advanced Configuration
Console# configure Config(config)# snmp-server router Config(config)# exit Console(config)# show snmp Community-String ----------------
Community-Access ----------------
private readWrite 11.1.1.2 Traps are enabled. Authentication-failure trap is enabled. Trap-Rec-Address ---------------System Contact: System Location: Trap-Rec-Community -----------------Version -------
This completes the initial configuration of the device from a local terminal. The configured parameters enable further device configuration from any remote location.
Advanced Configuration
This section provides information about dynamic allocation of IP addresses and security management based on the authentication, authorization, and accounting (AAA) mechanism, and includes the following topics: Configuring IP Addresses through DHCP Configuring IP Addresses through BOOTP Security Management and Password Configuration When configuring/receiving IP addresses through DHCP and BOOTP, the configuration received from these servers includes the IP address, and may include subnet mask and default gateway.
21
Initial Configuration
Assigning Dynamic IP Addresses:
console# configure console(config)# interface ethernet e1 console(config-if)# ip address dhcp hostname sales console(config-if)# exit console(config)#
The interface receives the IP address automatically. 3. To verify the IP address, enter the show ip interface command at the system prompt as shown in the following example.
Console#
show ip interface
Type
Activity status
-----Static
--------------Active
IP address ------------10.7.1.192/24
Interface --------VLAN 1
Type ------Static
22
and in 60 seconds starts sending BOOTP requests. The device receives the IP address automatically. Note: When the device reboot begins, any input at the ASCII terminal or keyboard
automatically cancels the BOOTP process before completion and the device does not receive an IP address from the BOOTP server.
To verify the IP address, enter the show ip interface command. The device is now configured with an IP address.
23
Initial Configuration
a password, it is recommended to always assign a password. If there is no specified password, privileged users can access the Web interface with any password.
When initially logging on to a device through a console session, enter george at the password prompt. When changing a devices mode to enable, enter george at the password prompt.
When initially logging onto a device through a Telnet session, enter bob at the password prompt. When changing a device mode to enable, enter bob.
When initially logging onto a device through a SSH session, enter jones at the password prompt. When changing a device mode to enable, enter jones.
24
4-293 4-297
4-294 4-297
Enter the following commands once when configuring to use a console, a Telnet, or an SSH session in order to use an HTTPS session. In the Web browser enable SSL 2.0 or greater for the content of the page to appear.
Console(config)# crypto certificate Console(config)# ip https server
When initially enabling an http or https session, enter admin for user name and user1 for password. Note: HTTP and HTTPS services require level 15 access and connect directly to the
configuration level access.
2.
Specify the path of the source file within 20 seconds. If the path is not specified within 20 seconds, the command times out.
To download a software image file using XModem: 1. Enter the command xmodem:image. The switch is ready to receive the file via
25
Initial Configuration
the XModem protocol. 2. Specify the path of the source file to begin the transfer process. The following is an example of the information that appears:
Console# copy xmodem:image Please download program using XMODEM console# 4-365
4.
Enter the command show bootvar to verify which system image is currently active. The following is an example of the information that appears:
Console# show bootvar 4-374 Images currently available on the Flash Image-1 active (selected for next boot)Image-2 not active Console#
5.
Enter the command copy tftp://{tftp address}/{file name} image to copy a new system image to the device. When the new image is downloaded, it is saved in
26
the area allocated for the other copy of system image (image-2, as given in the example). The following is an example of the information that appears:
Console# copy tftp://176.215.31.3/file1 image Accessing file file1 on 176.215.31.3... 4-365 Loading file1 from 176.215.31.3:!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!! Copy took 00:01:11 [hh:mm:ss]
Exclamation symbols indicate that a copying process is in progress. A period indicates that the copying process is timed out. Many periods in a row indicate that the copying process failed. 6. Select the image for the next boot by entering the boot system command. After this command, enter the command show bootvar to verify that the copy indicated as a parameter in the boot system command is selected for the next boot. The following is an example of the information that appears:
Console# boot system image-2 Console# show bootvar Images currently available on the Flash Image-1 active Image-2 not active (selected for next boot) 4-372 4-374
If the image for the next boot is not selected by entering the boot system command, the system boots from the currently active image (image-1,as given in the example). 7. Enter the command reload. The following message is displayed:
Console# reload This command will reset the whole system and disconnect your current session.Do you want to continue (y/n)[n]? 4-612
8.
27
2 3.
Initial Configuration
Enter the command show version to verify which boot version is currently running on the device. The following is an example of the information that appears:
Console# show version 4-619 SW version x.xx.xx (date xx-xxx-2004 time 13:42:41)Boot version x.xx.xx (date xx-xx-2004 time 15:12:20)HW version xx.xx.xx (date xx-xxx-2004 time 12:12:20)
4.
Enter the command copy tftp://{tftp address}/{file name} boot to copy the boot image to the switch. The following is an example of the information that appears:
Console# copy tftp://176.215.31.3/6024_boot-10013.rfb 4-365 boot Erasing file ...done.!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!Copy:393232 bytes copied in 00:00:05 [hh:mm:ss]
5.
6.
The Startup menu is displayed and contains the following configuration functions:
[1]Download Software [2]Erase Flash File [3]Erase Flash Sectors [4]Password Recovery Procedure [5]Enter Diagnostic Mode [6]Back Enter your choice or press 'ESC' to exit:
28
Only technical support personnel can operate the Diagnostics Mode. For this reason, the Enter Diagnostic Mode option of the Startup menu is not described in this guide.
Download Software
Use the software download option when a new software version must be downloaded to replace corrupted files, update, or upgrade the system software. To download software from the Startup menu: 1. On the Startup menu, press 1. The following prompt is displayed:
Downloading code using XMODEM
2. 3.
When using HyperTerminal, click Transfer on the HyperTerminal menu bar. From the Transfer menu, click Send File. The Send File window is displayed.
Figure 2-2. Send File window 4. 5. 6. Enter the file path for the file to be downloaded. Ensure the protocol is defined as Xmodem. Click Send. The software is downloaded. Software downloading takes several minutes. The terminal emulation application, such as HyperTerminal, may display the progress of the loading process.
29
Initial Configuration
After software downloads, the device reboots automatically.
2.
3. 4.
Enter config as the name of the flash file. The configuration is erased and the device reboots. Perform the switchs initial configuration.
2.
3.
Enter the first flash block to be erased and press <Enter>. The following message is displayed:
Enter Last flash block (1 -63):
30
5.
Password Recovery
If a password is lost, use the Password Recovery option on the Startup menu. The procedure enables the user to enter the device once without a password. To recover a lost password for the local terminal only: 1. 2. From the Startup menu, select 4 and press <Enter>. The password is deleted. To ensure device security, reconfigure passwords for applicable management methods.
31
Initial Configuration
32
Prior to accessing the switch from a Web browser, be sure you have first performed the following tasks: 1. Configure the switch with a valid IP address, subnet mask, and default gateway using an out-of-band serial connection, BOOTP or DHCP protocol. 2. Set user names and passwords using an out-of-band serial connection. Access to the Web agent is controlled by the same user names and passwords as the onboard configuration program. After you enter a user name and password, you will have access to the system configuration program.
the configuration settings or change the guest password. If you log in as admin (Privileged Exec level), you can change the settings on any page.
3.
Notes: 1. If you log into the CLI interface as guest (Normal Exec level), you can view
2. If the path between your management station and this switch does not pass
through any device that uses the Spanning Tree Algorithm, then you can set the switch port attached to your management station to fast forwarding (i.e., enable Admin Edge Port) to improve the switchs response time to management commands issued through the web interface.
Home Page
When your web browser connects with the switchs web agent, the home page is displayed as shown below. The home page displays the Main Menu on the left side of the screen and System Information on the right side. The Main Menu links are
33
used to navigate to other menus, and display configuration parameters and statistics.
Configuration Options
Configurable parameters have a dialog box or a drop-down list. Once a configuration change has been made on a page, be sure to click on the Apply or Apply Changes button to confirm the new setting. The following table summarizes the web page configuration buttons:
Table 3-1. Add Modify Apply Delete Checkbox Test Now Clear Counters Adds new device configuration information. Modifies existing device configuration information. Saves new or modified configuration information to the device. Deletes current device configuration information. Performs either copper or fiber cable tests. Clears device statistics.
Notes: 1. To ensure proper screen refresh, be sure that Internet Explorer 5.x is
configured as follows: Under the menu Tools / Internet Options / General / Temporary Internet Files / Settings, the setting for item Check for newer versions of stored pages should be Every visit to the page.
2. When using Internet Explorer 5.0, you may have to manually refresh the
screen after making configuration changes by pressing the browsers refresh button.
34
Panel Display
The web agent displays an image of the switchs ports. The Mode can be set to display different information for the ports, including Active (i.e., up or down), Duplex (i.e., half or full duplex, or Flow Control (i.e., with or without flow control). Clicking on the image of a port opens the Interface Configuration Page as described on page 3-71.
Main Menu
Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, or monitor network conditions. The following table briefly describes the selections available from this program:
Table 3-2. EWS Menu Options System System Management Provides system information including the general device information, stacking information, system logs, system time parameters, and parameters for managing system files. Provides information for configuring the device interfaces. Provides information for configuring IP addressing. In addition, this section contains information for defining ARP, DHCP, and DNS settings. Provides information for configuring SNMP. Provides information for configuring system passwords, and web access. Provides information for viewing RMON statistics. Provides Information for configuring the LLDP and the AMAP protocols. Provides information for managing Power-over-Ethernet devices and system diagnostics. Provides information for managing PoE devices and viewing PoE statistics. Provides information for performing copper and fiber cable tests, performing port mirroring, and viewing device health information.
Interfaces IP Addressing
SNMP Web View Management RMON Network Discovery Physical Ethernet Diagnostics Security
35
DHCP Snooping Layer 2 Address Tables Spanning Tree VLAN Multicast Policy General QoS Basic Mode Advanced Mode
36
Managing Stacking
Software Version Displays the installed software version number. Boot Version Displays the current boot version running on the device. Web Click System, System Management, System Information. Specify the system name, location, and contact information for the system administrator, then click Apply.
Figure 3-5. System Information Page CLI The following is an example of the CLI System Information commands:
console# show system 4-618
Managing Stacking
Stacking provides multiple switch management through a single point as if all stack members are a single unit. All stack members are accessed through a single IP address through which the stack is managed. The stack is managed from the following: Web-based interface SNMP Management Station Command Line Interface (CLI) Devices support stacking up to six units per stack, or can operate as stand-alone units. During the Stacking setup, one switch is selected as the Stacking Master and another stacking member can be selected as the Secondary Master. All other devices are selected as stack members, and assigned a unique Unit ID.
37
Switch software is downloaded separately for each stack members. However, all units in the stack must be running the same software version. Switch stacking and configuration is maintained by the Stacking Master. The Stacking Master detects and configures the ports with minimal operational impact in the event of: Unit Failure Inter-unit Stacking Link Failure Unit Insertion Removal of a Stacking Unit This section provides an introduction to the user interface, and includes the following topics: Understanding the Stack Topology Stacking Failover Topology Stacking Members and Unit ID Removing and Replacing Stacking Members Exchanging Stacking Members Switching between the Stacking Master and the Secondary Master
38
Managing Stacking
LEDS. During bootup, the Stacking LEDs indicate the stacking Unit number. When the device is running, the stack ID selector displays the unit ID number. Pressing a second time displays the port speed. For example, if the user selected stand-alone mode, the device boots in the boot-up process as a stand-alone device. The device units are shipped with a default Unit ID of the stand-alone unit. If the device is operating as a stand-alone unit, all stacking LEDs are off. Once the user selects a different Unit ID, it is not erased, and remains valid, even if the unit is reset. Unit ID 1 and Unit ID 2 are reserved for Master enabled units. Unit IDs 3 to 8 can be defined for stack members. When the Master unit boots or when inserting or removing a stack member, the Master unit initiates a stacking discovering process. Note: If two members are discovered with the same Unit ID the stack continues to
function, however only the unit with the older join time joins the stack. A message is sent to the user, notifying that a unit failed to join the stack.
39
Stacking Master must synchronize the Stacking Secondary Master. The Dynamic configuration is not saved, for example, dynamically learned MAC addresses are not saved. Each port in the stack has a specific Unit ID, port type, and port number, which is part of both the configuration commands and the configuration files. Configuration files are managed only from the device Stacking Master, including: Saving to the FLASH Uploading Configuration files to an external TFTP Server Downloading Configuration files from an external TFTP Server Whenever a reboot occurs, topology discovery is performed, and the master learns all units in the stack. Unit IDs are saved in the unit and are learned through topology discovery. If a unit attempts to boot without a selected Master, and the unit is not operating in stand-alone mode, the unit does not boot. Configuration files are changed only through explicit user configuration. Configuration files are not automatically modified when: Units are Added Units are Removed Units are reassigned Unit IDs Units toggle between Stacking Mode and Stand-alone Mode Each time the system reboots, the Startup Configuration file in the Master unit is used to configure the stack. If a stack member is removed from the stack, and then replaced with a unit with the same Unit ID, the stack member is configured with the original device configuration. Only ports which are physically present are displayed in the home page, and can be configured through the WebViewMgmt system. Non-present ports are configured through the CLI or SNMP interfaces.
40
Managing Stacking
Configuring Stacking
The Stack Management Topology Page allows network managers to either reset the entire stack or a specific device. Device configuration changes that are not saved before the device is reset are not saved. If the Stacking Master is reset, the entire stack is reset. Command Attributes Top Unit Indicates the first stack members number. Possible values are Master and 1-8. Bottom Unit Indicates the second stack members number. Possible values are Master and 1-8. Stack Order Displays the number of the unit within the stack. Neighbor 1 Indicates the first stack member of the stack. Neighbor 2 Indicates the second stack member of the stack. Switch Stack Control from Unit 1 to Unit 2 Switches the stack control from the Stack Master to the Secondary Stack Master. The possible field values are: Checked Enables switching the stack control to the Secondary Stack Master. Unchecked Maintains the current stacking control. Web Click System, System Management, Stack Management, Topology. Specify the upper and lower stacking members, then click Apply.
Figure 3-6. Stack Management Topology Page It is recommended to upgrade software on all units in a stack simultaneously. Use the following steps:
41
3
1. 2. 3. 4. 5. 6.
42
Le vel
7 6 5 4 3 2 1 0
Se verity Name
Debug Informational Notice Warning Error Critical Alert Emergency
Des cription
Debugging messages Informational messages only Normal but significant condition, such as cold start Warning conditions (e.g., return false, unexpected return) Error conditions (e.g., invalid input, default used) Critical conditions (e.g., memory allocation, or free memory error - resource exhausted) Immediate action needed System unusable
43
Emergency Indicates the highest warning level. If the device is down or not functioning properly, an emergency log message is saved to the specified logging location. Alert Indicates the second highest warning level. An alert log is saved, if there is a serious device malfunction; for example, all device features are down. Critical Indicates the third highest warning level. A critical log is saved if a critical device malfunction occurs; for example, two device ports are not functioning, while the rest of the device ports remain functional. Error Indicates that a device error has occurred, for example, if a single port is offline. Warning Indicates the lowest level of a device warning. The device is functioning, but an operational problem has occurred. Notice Provides device information, for example, a port is not operating. Informational Provides device information. Debug Provides debugging messages. Console Defines the minimum severity level from which logs are sent to the console. RAM Logs Defines the minimum severity level from which logs are sent to the Event Log kept in RAM (Cache). Log File Defines the minimum severity level from which logs are sent to the Message Log kept in FLASH memory. Web Click System, System Management, Logs, Log Settings, and enable logs.
Figure 3-8. Logs Settings Page CLI The following is an example of the CLI commands used to view system logs:
44
console# config 4-655 console(config)# logging on 4-591 console(config)# logging console errors 4-593 console(config)# logging buffered debugging 4-594 console(config)# logging file alert 4-594 console(nconfig)# exit 4-656 console# clear logging file 4-595 Clear Logging File [y/n]y
45
46
CLI The following is an example of the CLI commands used to view memory logs:
Console# show logging 4-599 Logging is enabled. Console logging: level debugging. Console Messages: 0 Dropped (severity). Buffer logging: level debugging. Buffer Messages: 11 Logged, 200 Max. File logging: level notifications. File Messages: 0 Dropped (severity). Syslog server 192.180.2.27 logging: errors. Messages: 6 Dropped (severity). Syslog server 192.180.2.28 logging: errors. Messages: 6 Dropped (severity). 2 messages were not logged (resources) Application filtering control Application Event Status ----------- ----- -----AAA Login Enabled File system Copy Enabled File system Delete-Rename Enabled Management ACL Deny Enabled Buffer log: 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/0, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/1, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/2, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/3, changed state to up 11-Aug-2004 15:41:43: %SYS-5-CONFIG_I: Configured from memory by console 11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface 11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/0, changed state to down 11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/1, changed state to down 11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/2, changed state to down 11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface
47
Figure 3-10. FLASH Logs Page CLI The following is an example of the CLI commands used to display FLASH logs:
Console# show logging file 4-601 Logging is enabled. Console Logging: Level info. Console Messages: 0 Dropped. Buffer Logging: Level info. Buffer Messages: 62 Logged, 62 Displayed, 200 Max. File Logging: Level debug. File Messages: 11 Logged, 51 Dropped. SysLog server 12.1.1.2 Logging: warning. Messages: 14 Dropped. SysLog server 1.1.1.1 Logging: info. Messages: 0 Dropped. 01-Jan-2000 01:12:01:%COPY-W-TRAP: The copy operation was completed successfully 01-Jan-2000 01:11:49:%LINK-I-Up: 1/e11 01-Jan-2000 01:11:46:%LINK-I-Up: 1/e12 01-Jan-2000 01:11:42:%LINK-W-Down: 1/e13
48
is assigned, the first facility is overridden. All applications defined for a device utilize the same facility on a server. The field default is Local 7. The possible field values are Local 0 - Local 7. Description Displays the user-defined server description. Minimum Severity Indicates the minimum severity from which logs are sent to the server. For example, if Notice is selected, all logs with a severity level of Notice and higher are sent to the remote server. Remove Deletes the currently selected server from the Servers list. The possible field values are: Checked Removes the selected server from the Remote Log Page. Once removed, logs are no longer sent to the removed server. Unchecked Maintains the remote servers. Web Click System, System Management, Logs, Remote Logs. Specify Remote Log Status.
Figure 3-11. Remote Log Page CLI Enable system logging and then specify the level of messages to be logged to remote logs. Use the show logging command to display the current settings.
49
Console# show logging file 4-601 Logging is enabled. Console logging: level debugging. Console Messages: 0 Dropped (severity). Buffer logging: level debugging. Buffer Messages: 11 Logged, 200 Max. File logging: level notifications. File Messages: 0 Dropped (severity). Syslog server 192.180.2.27 logging: errors. Messages: 6 Dropped (severity). Syslog server 192.180.2.28 logging: errors. Messages: 6 Dropped (severity). 2 messages were not logged (resources) Application filtering control Buffer log: 11-Aug-2004 15:41:43:%LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up 11-Aug-2004 15:41:43:%LINK-3-UPDOWN: Interface Ethernet1/0, changed state to up 11-Aug-2004 15:41:43:%LINK-3-UPDOWN: Interface Ethernet1/1, changed state to up 11-Aug-2004 15:41:43:%LINK-3-UPDOWN: Interface Ethernet1/2, changed state to up 11-Aug-2004 15:41:43:%LINK-3-UPDOWN: Interface Ethernet1/3, changed state to up 11-Aug-2004 15:41:43:%SYS-5-CONFIG_I: Configured from memory by console 11-Aug-2004 15:41:39:%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up 11-Aug-2004 15:41:39:%LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/0, changed state to down 11-Aug-2004 15:41:39:%LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/1, changed state to down 11-Aug-2004 15:41:39:%LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/2, changed state to down 11-Aug-2004 15:41:39:%LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/3, changed state to down
50
Configuring SNTP
Configuring SNTP
Simple Network Time Protocol (SNTP) allows the switch to set its internal clock based on periodic updates from a time server (SNTP or NTP). Maintaining an accurate time on the switch enables the system log to record meaningful dates and times for event entries. You can also manually set the clock using the CLI. If the clock is not set, the switch will only record the time from the factory default set at the last bootup. Note: The system time is not saved in NVRAM. The device can poll the following server types for the server time: Unicast Anycast Broadcast Time sources are established by stratums. Stratums define the accuracy of the reference clock. The higher the stratum (where zero is the highest), the more accurate the clock is. The device receives time from stratum 1 and above. The following is an example of stratums: Stratum 0 A real time clock (such as a GPS system) is used as the time source. Stratum 1 A server that is directly linked to a Stratum 0 time source is used. Stratum 1 time servers provide primary network time standards. Stratum 2 The time source is distanced from the Stratum 1 server over a network path. For example, a Stratum 2 server receives the time over a network link, via NTP, from a Stratum 1 server. Information received from SNTP servers is evaluated based on the Time level and server type. SNTP time definitions are assessed and determined by the following time levels: T1 The time at which the original request was sent by the client. T2 The time at which the original request was received by the server. T3 The time at which the server sent the client a reply. T4 The time at which the client received the server's reply.
51
52
Configuring SNTP
Figure 3-12. SNTP Configuration Page
53
Authentication Key Indicates the key used for authentication. Trusted Key Indicates the encryption key used (Unicast/Anycast) or elected (Broadcast) to authenticate the SNTP server. Remove Removes Encryption Key IDs. The possible field values are: Checked Removes the selected Encryption Key ID Unchecked Maintains the Encryption Key IDs. This is the default value. Web Select System, System Management, SNTP, Authentication. Define the fields and click Apply.
Figure 3-13. SNTP Authentication Page CLI - The following is an example of the SNTP authentication commands:
Console(config)# sntp authentication-key 8 md5 ClkKey 4-353 Console(config)# sntp trusted-key 8 4-354 Console(config)# sntp authenticate 4-353
54
Configuring SNTP
Encryption Key ID Displays the encryption key identification used to communicate between the SNTP server and device. The field range is 1-4294967295. Preference Indicates the SNTP server providing SNTP system time information. The possible field values are: Primary Indicates the primary server provides SNTP information. Secondary Indicates the backup server provides SNTP information. Status Displays the SNTP server operating status. Last Response Displays the last time a response was received from the SNTP server. Offset Indicates the time difference between the device local clock and the acquired time from the SNTP server. Delay Indicates the amount of time it takes for a device request to reach the SNTP server. Remove Removes SNTP servers from the SNTP server list. The possible field values are: Checked Removes the SNTP server. Unchecked Maintains the SNTP server. Web Select System, System Management, SNTP, Servers. Define the fields and click Apply.
55
Figure 3-15. SNTP Interface Page CLI - The following is an example of the SNTP interface commands:
Console(config)# interface ethernet 1/e3 Console(config-if)# sntp client enable 4-376 4-357
56
57
58
Switzerland From the last weekend of March until the last weekend of October. Syria From March 31 until October 30. Taiwan Taiwan does not use Daylight Saving Time. Turkey From the last weekend of March until the last weekend of October. United Kingdom From the last weekend of March until the last weekend of October. United States of America From the first Sunday in April at 02:00 to the last Sunday in October at 02:00. Command Attributes Clock Source The source used to set the system clock. The possible field values are: None Indicates that a clock source is not used. The clock is set locally. SNTP Indicates that the system time is set via an SNTP server. Date The system date. The field format is Day/Month/Year. For example: 04/ May/50 (May 4, 2050). Local Time The system time. The field format is HH:MM:SS. For example: 21:15:03. Time Zone Offset The difference between Greenwich Mean Time (GMT) and local time. For example, the Time Zone Offset for Paris is GMT +1, while the Time Zone Offset for New York is GMT 5. Daylight Savings Enables automatic Daylight Savings Time (DST) on the device based on the devices location. There are two types of daylight settings, either by a specific date in a particular year or a recurring setting irrespective of the year. For a specific setting in a particular year complete the Daylight Savings area, and for a recurring setting, complete the Recurring area. The possible field values are: USA Enables switching to DST at 2:00 a.m. on the first Sunday of April, and reverts to standard time at 2:00 a.m. on the last Sunday of October. European Enables switching to DST at 1:00 am on the last Sunday in March and reverts to standard time at 1:00 am on the last Sunday in October. The European option applies to EU members, and other European countries using the EU standard. Other Indicates the DST definitions are user-defined based on the device locality. If Other is selected, the From and To fields must be defined. Time Set Offset (1-1440) Used for non-USA and European countries to set the amount of time for DST (in minutes). The default time is 60 minutes. From Indicates the time that DST begins in countries other than the USA and Europe, in the format Day/Month/Year in one field and HH:MM in another. For example, if DST begins on October 25, 2007 at 5:00 am, the two fields should be set to 25/Oct/07 and 05:00. The possible field values are: Date The date on which DST begins. The possible field range is 1-31. Month The month of the year in which DST begins. The possible field range is Jan-Dec.
59
Year The year in which the configured DST begins. Time The time at which DST begins. The field format is HH:MM. For example: 05:30. To Indicates the time that DST ends in countries other than the USA and Europe, in the format Day/Month/Year in one field and HH:MM in another. For example, if DST ends on March 23, 2008 at midnight, the two fields should be 23/ Mar/08 and 00:00. The possible field values are: Date The date on which DST ends. The possible field range is 1-31. Month The month of the year in which DST ends. The possible field range is Jan-Dec. Year The year in which the configured DST ends. Time The time at which DST starts. The field format is HH:MM. For example: 05:30. Recurring Enables user-defined DST for countries in which DST is constant from year to year, other than the USA and Europe. From The time that DST begins each year. In the example, DST begins locally every first Sunday in April at midnight. The possible field values are: Day The day of the week from which DST begins every year. The possible field range is Sunday-Saturday. Week The week within the month from which DST begins every year. The possible field range is 1-5. Month The month of the year in which DST begins every year. The possible field range is Jan-Dec. Time The time at which DST begins every year. The field format is Hour:Minute. For example: 02:10. To The time that DST ends each year. In the example, DST ends locally every first Sunday in October at midnight. The possible field values are: Day The day of the week at which DST ends every year. The possible field range is Sunday-Saturday. Week The week within the month at which DST ends every year. The possible field range is 1-5. Month The month of the year in which DST ends every year. The possible field range is Jan-Dec. Time The time at which DST ends every year. The field format is HH:MM. For example: 05:30. Web Select System, System Management, SNTP, Clock Time Zone. Define the fields and set the offset for your time zone relative to the UTC, and click Apply.
60
Figure 3-16. Clock Time Zone Page CLI - The following is an example of the system clock commands:
Console# clock set 13:32:00 7 Mar 2002 4-349 Console# configure 4-655 Console(config)# clock source sntp 4-350 Console(config)# clock timezone -6 zone CST 4-350 Console(config)# clock summer-time recurring first sun apr 2:00 last sun oct 2:00 4-351
61
Startup Configuration File Contains the commands required to reconfigure the device to the same settings as when the device is powered down or rebooted. The Startup file is created by copying the configuration commands from the Running Configuration file or the Backup Configuration file. Running Configuration File Contains all configuration file commands, as well as all commands entered during the current session. After the device is powered down or rebooted, all commands stored in the Running Configuration file are lost. During the startup process, all commands in the Startup file are copied to the Running Configuration File and applied to the device. During the session, all new commands entered are added to the commands existing in the Running Configuration file. Commands are not overwritten. To update the Startup file, before powering down the device, the Running Configuration file must be copied to the Startup Configuration file. The next time the device is restarted, the commands are copied back into the Running Configuration file from the Startup Configuration file. Image files Software upgrades are used when a new version file is downloaded. The file is checked for the right format, and that it is complete. After a successful download, the new version is marked, and is used after the device is reset.
62
Configuration Download Indicates that the download is for configuration files. If Configuration Download is selected, the Firmware Download fields are grayed out. Configuration TFTP Server IP Address Specifies the TFTP Server IP Address from which the configuration files are downloaded. Configuration Source File Name Specifies the configuration files to be downloaded. Configuration Destination File Specifies the destination file to which to the configuration file is downloaded. The possible field values are: Running Configuration Downloads commands into the Running Configuration file. Startup Configuration Downloads the Startup Configuration file, and overwrites the old Startup Configuration file. Web Click System, System Management, File Management, File Download. Define the fields. Click Apply.
Figure 3-17. File Download Page CLI The following is an example of downloading system files using CLI
63
commands:
Console# 4-365
Accessing file 'file1' on 172.16.101.101.. Loading file1 from 172.16.101.101: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!! [OK] Copy took 0:01:11 [hh:mm:ss]
64
Figure 3-18. File Upload Page CLI The following is an example of downloading system files using CLI commands:
Console# 4-365
Accessing file 'file1' on 172.16.101.101.. Loading file1 from 172.16.101.101: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!! [OK] Copy took 0:01:11 [hh:mm:ss]
Copying Files
Files can be copied and deleted from the Copy Files Page. Command Attributes Copy Master Firmware Copies the Firmware file currently running on the Stacking Master. The possible field values are selected from the following list boxes: Source Select if the Software Image or Bootcode file will be copied. Destination Unit Select the stacking member to which the firmware is copied, the possible field values are All, Backup, and stacking members 1-4. Copy Configuration Copies the Running Configuration File. The possible field values are: The possible field values are: Source Select if the Starting Configuration file, the Running Configuration file,
65
or the Backup file will be copied. Destination Specifies the usage for the source file after it is copied. It may be used as a Starting Configuration file, the Running Configuration file, the Backup file, or as a configuration file with a new name. Restore Configuration Factory Defaults Resets the Configuration file to the factory defaults. The factory defaults are reset after the device is reset. When unselected, the device maintains the current Configuration file. Web System, System Management, File Management, Copy Files. Define the fields. Click Apply.
Figure 3-19. Copy Files Page CLI The following is an example of downloading system files using CLI commands:
Console# copy running-config startup-config 4-365 !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!! [OK] Copy took 0:01:11 [hh:mm:ss]
Active Image
The Active Image Page allows network managers to select and reset the Image files. The Active Image file for each unit in a stacking configuration can be individually selected. Command Attributes Image Binary file that contains executable code
66
TCAM Resources
Filename The name of the file Version Binary code version Date Versions date Status Indicates Image status Image After Reset The Image file which is active on the unit after the device is reset. The possible field values are: Image 1 Activates Image file 1 after the device is reset. Image 2 Activates Image file 2 after the device is reset. Web System, System Management, File Management, Active Image. Define the fields. Click Apply.
TCAM Resources
The TCAM Resources Page display the availability of TCAM resources (Ternary Content Addressable Memory) across the stack. TCAM is used for high-speed searching throughout the stack, in order to perform security, QoS, and other types of applications. In contrast with binary CAM, TCAM allows a third matching state of X or Dont Care bits in data searches ( the first two bit types are 0 and 1), adding more flexibility to searches. However, the need to encode three possible states instead of two also adds greater resource costs. The maximum number of rules that may be allocated by all applications on the device is 1024. The following table lists all applications that can allocate TCAM rules. Each allocation has its specific allocation policy.
67
Note: Some applications allocate rules upon their initiation. Additionally, applications that
initialize during system boot use some of their rules during the startup process. Table 3-3. TCAM Allocation Application Per Port/ Per Device Port Alloca tion on Activa tion 6/ device 6/ device 2/port or LAG 0 Application Upper Limit TCAM rules per User ACL Comments
No limit
1 or 2 TCAM entries per each rule. 1 or 2 TCAM entries per each rule. ---
Feature is activated by default. Feature is activated by default. Feature is activated by default. Allocation done only during initialization. Rules are duplicated for both IP and MAC based VLANs. Rules are duplicated for both IP and MAC based VLANs. Rules are duplicated for both IP and MAC based VLANs.
Port
No limit
Port
---
IP Subnet VLAN Protocol Based VLAN MAC Based VLAN DHCP Snooping IP Source Guard ARP Inspection VLAN Rate Limiting
Port
255
2 or 4
Port
No limit
1 or 2
Port
432
1 or 2
2/ device 0 2/ device 0
8 TCAM entries/1 DHCP Snooping rule 1 TCAM entry/1 IP Source Guard entry 4 TCAM entries/1 ARP Inspection rule 1 global rule/1 VLAN Rate Limit. Additional rule is created for each permit rule on the interface.
Command Attributes Stack Unit Indicates the stacking member for which TCAM resource usage is displayed. TCAM Utilization Percentage of the available TCAM resources which are used. For example, if more ACLs and policy maps are defined, the system will use more TCAM resources.
68
Configuring Interfaces
Configuring Interfaces
The Interfaces pages provide detailed information about each interface on the switch, such as administrative status, input/output packets, packet errors and discards.
69
Port Status Indicates whether the port is currently operational or non-operational. The possible field values are: Up Indicates the port is currently operating. Down Indicates the port is currently not operating. Port Speed Displays the configured rate for the port. The port type determines what speed setting options are available. Port speeds can only be configured when auto negotiation is disabled. The possible field values are: 10M Indicates the port is currently operating at 10 Mbps. 100M Indicates the port is currently operating at 100 Mbps. 1000M Indicates the port is currently operating at 1000 Mbps. Duplex Mode Displays the port duplex mode. This field is configurable only when auto negotiation is disabled, and the port speed is set to 10M or 100M. This field cannot be configured on LAGs. The possible field values are: Full The interface supports transmission between the device and its link partner in both directions simultaneously. Half The interface supports transmission between the device and the client in only one direction at a time. Auto Negotiation Displays the auto negotiation status on the port. Auto negotiation is a protocol between two link partners that enables a port to advertise its transmission rate, duplex mode, and flow control abilities to its partner. Advertisement Defines the auto negotiation setting the port advertises. The possible field values are: Max Capability Indicates that all port speeds and duplex mode settings are accepted. 10 Half Indicates that the port advertises for a 10 Mbps speed port and half duplex mode setting. 10 Full Indicates that the port advertises for a 10 Mbps speed port and full duplex mode setting. 100 Half Indicates that the port advertises for a 100 Mbps speed port and half duplex mode setting. 100 Full Indicates that the port advertises for a 100 Mbps speed port and full duplex mode setting. 1000 Full Indicates that the port advertises for a 1000 Mbps speed port and full duplex mode setting Back Pressure Displays the back pressure mode on the Port. Back pressure mode is used with half duplex mode to disable ports from receiving messages. Flow Control Displays the flow control status on the port. Operates when the port is in full duplex mode. MDI/MDIX Displays the MDI/MDIX status on the port. Hubs and switches are deliberately wired opposite the way end stations are wired, so that when a hub or switch is connected to an end station, a straight through Ethernet cable can be used, and the pairs are matched up properly. When two hubs or switches are connected to each other, or two end stations are connected to each other, a
70
Configuring Interfaces
crossover cable is used to ensure that the correct pairs are connected. The possible field values are: Auto Use to automatically detect the cable type. MDI (Media Dependent Interface) Use for end stations. MDIX (Media Dependent Interface with Crossover) Use for hubs and switches. LAG Indicates the LAG of which the port is a member. PVE Enables a port to be a Private VLAN Edge (PVE) port. When a port is defined as PVE, it bypasses the Forwarding Database (FDB), and forwards all Unicast, Multicast and Broadcast traffic to an uplink (except MAC-to-me packets). Uplinks can be a port or GE port. Traffic from the uplink is distributed to all interfaces. Only one uplink can be defined for a protected port. Private VLANs cannot be configured on ports on which IGMP snooping or Multicast TV VLAN has been configured. An IP address cannot be configured on the VLAN of which a protected port is a member. Only one uplink can be defined for a protected port. Private VLANs cannot be configured on ports on which IGMP snooping or Multicast TV VLAN has been configured. An IP address cannot be configured on the VLAN of which a protected port is a member. Web Click System, Interfaces, Interface, Interface Configuration. Modify the required interface settings, and click Apply.
71
72
Configuring Interfaces
The LAG Membership Page contains parameters for defining LAG and LACP ports. Command Attributes LAG Port Displays the LAG number. Name Displays the user-defined port name. Link State Displays the link operational status. Member Displays the ports configured to the LAG. Remove Removes the LAG. The possible field values: Checked Removes the selected LAG. Unchecked Maintains the LAGs. Web Click System, Interfaces, Interface, LAG Membership. Define the fields and click Apply.
Figure 3-23. LAG Membership Page CLI The following is an example of the CLI commands for aggregating ports:
Console(config-if)# channel-group 1 mode on 4-456
Configuring LACP
Aggregate ports can be linked into link-aggregation port-groups. Each group is comprised of ports with the same speed, set to full-duplex operations. LAG ports can contain different media types if the ports are operating at the same speed. Aggregated links can be set up manually or automatically established by enabling Link Aggregation Control Protocol (LACP) on the relevant links. Aggregate ports can be linked into link-aggregation port-groups. Each group is comprised of
73
ports with the same speed. Ports assigned to a common port channel must meet the following criteria: Ports must have the same LACP System Priority. Notes: 1. If the port channel admin key is not set (through the CLI) when a channel
group is formed (i.e., it has a null value of 0), this key is set to the same value as the port admin key used by the interfaces that joined the group (lacp admin key).
2. To avoid creating a loop in the network, be sure you enable LACP before
connecting the ports, and also disconnect the ports before disabling LACP.
3. If the target switch has also enabled LACP on the connected ports, the trunk
will be activated automatically.
5. All ports on both ends of an LACP trunk must be configured for full duplex,
either by forced mode or auto-negotiation.
The Interface LACP Configuration Page contains parameters for defining the LACP ports. Command Attributes LACP System Priority Determines the link aggregation group (LAG) membership, and to identify this device to other switches during LAG negotiations. Ports must be configured with the same system priority to join the same LAG. System priority is combined with the switchs MAC address to form the LAG identifier. This identifier is used to indicate a specific LAG during LACP negotiations with other systems. The field range is 1 - 65535, and the default is 1. Unit No. Displays the stacking member for which the LACP parameters are displayed Port Displays the port number to which timeout and priority values are assigned. Port-Priority Displays the LACP priority value for the port. The field range is 1-65535. LACP Timeout Displays the administrative LACP timeout. Web Click System, Interfaces, Interface, LACP Configuration. Define the port LACP parameters and click Apply.
74
Figure 3-24. Interface LACP Configuration Page CLI The following is an example of the LACP interface CLI commands:
75
Interface Statistics
Command Attributes Unit No. Displays the stacking member for which the Interface Statistics are displayed. Interface Indicates the device for which statistics are displayed. The possible field values are: Port Defines the specific port for which interface statistics are displayed. LAG Defines the specific LAG for which interface statistics are displayed. Refresh Rate Defines the amount of time that passes before the interface statistics are refreshed. The possible field values are: 15 Sec Indicates that the Interface statistics are refreshed every 15 seconds. 30 Sec Indicates that the Interface statistics are refreshed every 30 seconds. 60 Sec Indicates that the Interface statistics are refreshed every 60 seconds. No Refresh Indicates that the Interface statistics are not refreshed. Receive Statistics Total Bytes (Octets) Displays the number of octets received on the selected interface. Unicast Packets Displays the number of Unicast packets received on the selected interface. Multicast Packets Displays the number of Multicast packets received on the selected interface. Broadcast Packets Displays the number of Broadcast packets received on the selected interface. Packets with Errors Displays the number of error packets received from the selected interface. Packet with Errors counts all errors without the CRC errors. Transmit Statistics Total Bytes (Octets) Displays the number of octets transmitted from the selected interface. Unicast Packets Displays the number of Unicast packets transmitted from the selected interface. Multicast Packets Displays the number of Multicast packets transmitted from the selected interface. Broadcast Packets Displays the number of Broadcast packets transmitted from the selected interface.
76
Etherlike Statistics
Command Attributes Unit No. Displays the stacking member for which the Etherlike Statistics are displayed. Interface Indicates the device for which statistics are displayed. The possible field values are: Port Defines the specific port for which Etherlike statistics are displayed. LAG Defines the specific LAG for which Etherlike statistics are displayed. Refresh Rate Defines the amount of time that passes before the interface statistics are refreshed. The possible field values are: 15 Sec Indicates that the Etherlike statistics are refreshed every 15 seconds. 30 Sec Indicates that the Etherlike statistics are refreshed every 30 seconds. 60 Sec Indicates that the Etherlike statistics are refreshed every 60 seconds. No Refresh Indicates that the Etherlike statistics are not refreshed. Frame Check Sequence (FCS) Errors Displays the number of FCS errors received on the selected interface. Single Collision Frames Displays the number of single collision frames received on the selected interface.
77
Late Collisions Displays the number of late collision frames received on the selected interface. Oversize Packets Displays the number of oversized packet errors on the selected interface. Received Pause Frames Displays the number of received paused frames on the selected interface. Transmitted Pause Frames Displays the number of paused frames transmitted from the selected interface. Web Click System, Interfaces, Statistics, Interface or System, Interfaces, Statistics, Etherlike. Select the required interface, and click Query. Use the Refresh button at the bottom of the page to update the screen.
Figure 3-26. Statistics Etherlike Page CLI The following is an example of the CLI commands displaying Interface statistics:
Console> show rmon statistics ethernet 1/e1 4-503 Port: 1/e1 Octets: 878128 Broadcast: 7 CRC Align Errors: 0 Undersize Pkts: 0 Fragments: 0 Packets: 978 Multicast: 1 Collisions: 0 Oversize Pkts: 0 Jabbers: 0
78
CLI The following is an example of the CLI commands displaying Etherlike statistics:
Console#
InUcastPkts ----------0 0 0
InMcastPkts ----------0 0 0
InBcastPkts ----------0 0 0
OutUcastPkts -----------0 0 0
OutMcastPkts -----------0 0 0
OutBcastPkts -----------0 0 0
Ch --1
InOctets -------27889
InUcastPkts ---------0
InMcastPkts ----------0
InBcastPkts ----------0
Ch --1
OutOctets --------23739
OutUcastPkts -----------0
OutMcastPkts -----------0
OutBcastPkts -----------0
79
Configuring IP Information
This section describes how to configure an initial IP interface for management access over the network. The IP address for this switch is unassigned by default. To manually configure an address, you need to change the switch IP address and netmask to values that are compatible with your network. You may also need to establish a default gateway between the switch and management stations that exist on another network segment. You can manually configure a specific IP address, or direct the device to obtain an address from a DHCP server. Valid IP addresses consist of four decimal numbers, 0 to 255, separated by periods. The system supports up-to 5 IP addresses per device. Anything outside this format will not be accepted by the CLI program.
Defining IP Addresses
The IP Interface Page contains fields for assigning IP parameters to interfaces, and for assigning gateway devices. Packets are forwarded to the default IP when frames are sent to a remote network. The configured IP address must belong to the same IP address subnet of one of the IP interfaces. Command Attributes IP Address Displays the currently configured IP address. Mask Displays the currently configured IP address mask. Interface Displays the interface used to manage the device. Remove Removes the selected IP address from the interface. The possible field values are: Checked Removes the IP address from the interface. Unchecked Maintains the IP address assigned to the Interface.
Web Click System, IP Addressing, IP Addressing, IP Interface, define the fields, and specify a Primary interface, click Apply.
80
Configuring IP Information
Figure 3-27. IP Interface Page CLI The following is an example of the CLI commands for defining an IP interface:
Console(config)# interface vlan 1 4-664 Console(config-if)# ip address 131.108.1.27 255.255.255.0 4-418
81
Figure 3-28. Default Gateway Page CLI The following is an example of the CLI commands for defining a default gateway:
Console(config)# 4-420
ip default-gateway 192.168.1.1
Configuring DHCP
The Dynamic Host Configuration Protocol (DHCP) assigns dynamic IP addresses to devices on a network. DHCP ensures that network devices can have a different IP address every time the device connects to the network. DHCP may lease addresses to clients indefinitely or for a specific period of time. If the address expires or the switch is moved to another network segment, you will lose management access to the switch. If DHCP is enabled, the IP will not function until a reply has been received from the server. Requests will be broadcast periodically by the switch for an IP address. If your network provides DHCP services, you can configure the switch to be dynamically configured by these services. The DHCP Page contains parameters for assigning IP addresses to devices. Command Attributes Unit No. Displays the stacking member for which the DHCP is assigned. Interface Displays the DHCP interface address which is connected to the device. Host Name Displays the system name.
82
Configuring IP Information
Remove Removes DHCP interfaces. The possible field values are: Checked Removes the selected DHCP interface. Unchecked Maintains the DHCP interfaces. Web Click System, IP Addressing, DHCP, define the fields, specify a primary interface, and click Apply.
Figure 3-29. DHCP Page CLI The following is an example of the DHCP CLI commands:
Console(config)# interface ethernet 1/e16 4-376 Console(config-if)# ip address dhcp 4-419
Configuring ARP
The Address Resolution Protocol (ARP) converts IP addresses into physical addresses, and maps the IP address to a MAC address. ARP allows a host to communicate with other hosts only when the IP address of its neighbors is known. The ARP Page contains parameters for defining ARP. Command Attributes ARP Entry Age Out Specifies the amount of time (in seconds) that passes between ARP Table entry requests. Following the ARP Entry Age period, the entry is deleted from the table. The range is 1 - 40000000. The default value is 60000 seconds. Clear ARP Table Entries Specifies the types of ARP entries that are cleared. The possible values are: None Does not clear ARP entries.
83
All Clears all ARP entries. Dynamic Clears only dynamic ARP entries. Static Clears only static ARP entries. Interface Displays the interface type for which ARP parameters are displayed. The possible field values are: Port The port for which ARP parameters are defined. LAG The LAG for which ARP parameters are defined. VLAN The VLAN for which ARP parameters are defined. IP Address Indicates the station IP address, which is associated with the MAC address filled in below. MAC Address Displays the station MAC address, which is associated in the ARP table with the IP address. Status Displays the ARP table entry type. Possible field values are: Dynamic The ARP entry is learned dynamically. Static The ARP entry is a static entry. Remove Removes a specific ARP entry. The possible field values are: Checked Removes the selected ARP entries. Unchecked Maintains the current ARP entries. Web Click System, IP Addressing, IP Addressing, ARP, define the fields, and specify a primary interface. Click Apply.
84
85
Web Select System, IP Addressing, Domain Name System, DNS Server. Set the default domain name or DNS server list, define the fields and click Apply.
86
4-426
87
Configuring SNMP
Simple Network Management Protocol (SNMP) is a communication protocol designed specifically for managing devices on a network. Equipment commonly managed with SNMP includes switches, routers and host computers. SNMP is typically used to configure these devices for proper operation in a network environment, as well as to monitor them to evaluate performance or detect potential problems. Managed devices supporting SNMP contain software, which runs locally on the device and is referred to as an agent. A defined set of variables, known as managed objects, is maintained by the SNMP agent and used to manage the device. These objects are defined in a Management Information Base (MIB) that provides a standard presentation of the information controlled by the agent. SNMP defines both the format of the MIB specifications and the protocol used to access this information over the network. The switch includes an onboard agent that supports SNMP versions 1, 2c, and 3. This agent continuously monitors the status of the switch hardware, as well as the traffic passing through its ports. A network management station can access this information using software such as HP OpenView. Access to the onboard agent using SNMP v1 and v2c is controlled by community strings. To communicate with the switch, the management station must first submit a valid community string for authentication. Access to the switch using SNMPv3 provides additional security features that cover message integrity, authentication, and encryption; as well as controlling user access to specific areas of the MIB tree. The SNMPv3 security structure consists of security models, with each model having its own security levels. There are three security models defined, SNMPv1, SNMPv2c, and SNMPv3. Users are assigned to groups that are defined by a security model and specified security levels. Each group also has a defined security access to set of MIB objects for reading and writing, which are known as views. The switch has a default view (all MIB objects) and default groups defined for security models v1 and v2c. The following table shows the security models and levels available and the system default settings.
88
Configuring SNMP
Table 3-4. SNMPv3 Security Models and Levels Model v1 v1 v1 v2c v2c v2c v3 v3 v3 Level noAuthNoPriv noAuthNoPriv noAuthNoPriv noAuthNoPriv noAuthNoPriv noAuthNoPriv noAuthNoPriv AuthNoPriv AuthPriv Group DefaultROGroup user defined DefaultROGroup user defined user defined user defined user defined Read View defaultview user defined defaultview user defined user defined user defined user defined Write View none defaultview user defined none defaultview user defined user defined user defined user defined Security Community string only Community string only Community string only Community string only Community string only Community string only A user name match only Provides user authentication via MD5 or SHA algorithms Provides user authentication via MD5 or SHA algorithms and data privacy using DES 56-bit encryption
DefaultRWGroup defaultview
DefaultRWGroup defaultview
The predefined default groups and view can be deleted from the system.
Enabling SNMP
The Engine ID Page permits the enabling of both SNMP and Authentication notifications. An SNMPv3 engine is an independent SNMP agent that resides on the switch. This engine protects against message replay, delay, and redirection. The engine ID is also used in combination with user passwords to generate the security keys for authenticating and encrypting SNMPv3 packets. A local engine ID is automatically generated that is unique to the switch. This is referred to as the default engine ID. If the local engine ID is deleted or changed, all SNMP users will be cleared. You will need to reconfigure all existing users. A new engine ID can be specified by entering 1 to 26 hexadecimal characters. If less than 26 characters are specified, trailing zeroes are added to the value. For example, the value 1234 is equivalent to 1234 followed by 22 zeroes. SNMP is enabled by default. Command Attributes Local Engine ID (10-64 Hex Characters) Displays the local device Engine ID. The field value is a hexadecimal string. Each byte in hexadecimal character strings is two hexadecimal digits. Each byte can be separated by a period or a colon. The Engine ID must be defined before SNMPv3 is enabled. Select a default Engine ID that is comprised of an Enterprise number and the default MAC address. Use Default Uses the device-generated Engine ID. The default Engine ID is based on the device MAC address and is defined per standard as: First 4 octets First bit = 1, the rest is IANA Enterprise number. Fifth octet Set to 3 to indicate the MAC address that follows.
89
Last 6 octets MAC address of the device. Web Click System, SNMP, Security, Engine ID. Define the fields and click Apply.
Figure 3-33. Engine ID Page CLI The following example enables SNMPv3 on the switch:
90
Configuring SNMP
Authentication Displays the method used to authenticate users. The possible field values are: MD5 Key Users are authenticated using the HMAC-MD5 algorithm. SHA Key Users are authenticated using the HMAC-SHA-96 authentication level. MD5 Password The HMAC-MD5-96 password is used for authentication. The user should enter a password. SHA Password Users are authenticated using the HMAC-SHA-96 authentication level. The user should enter a password. No Authentication No user authentication is used. Remove Removes users from a specified group. The possible field values are: Checked Removes the selected user. Unchecked Maintains the list of users. Authentication Method Defines the SNMP Authentication Method. ADD Command Attributes Password Defines the password for the group member. Authentication Key Defines the HMAC-MD5-96 or HMAC-SHA-96 authentication level. The authentication and privacy keys are entered to define the authentication key. If only authentication is required, 16 bytes are defined. If both privacy and authentication are required, 32 bytes are defined. Each byte in hexadecimal character strings is two hexadecimal digits. Each byte can be separated by a period or a colon. Privacy Key Defines the privacy key (LSB). If only authentication is required, 20 bytes are defined. If both privacy and authentication are required, 36 bytes are defined. Each byte in hexadecimal character strings is two hexadecimal digits. Each byte can be separated by a period or colon. Web Click System, SNMP, Security, Users. Click Add to configure a user name. In the New User page, define a name and assign it to a group, then click Apply to save the configuration and return to the User Name list. To delete a user, check the box next to the user name, then click Delete. To change the assigned group of a user, click Change Group in the Actions column of the users table and select the new group.
91
Figure 3-34. SNMP Users Page CLI The following is an example of the SNMP User CLI commands:
92
Configuring SNMP
Privacy Encrypts SNMP messages. Operation Defines the group access rights. The possible field values are: Read Management access is restricted to read-only, and changes cannot be made to the assigned SNMP view. Write Management access is read-write and changes can be made to the assigned SNMP view. Notify Sends traps for the assigned SNMP view. Remove Removes SNMP groups. The possible field values are: Checked Removes the selected SNMP group. Unchecked Maintains the SNMP groups. Web Click System, SNMP, Security, Groups. Click New to configure a user name. In the New User page, define a name and assign it to a group, then click Add to save the configuration and return to the User Name list. To delete a user, check the box next to the user name, then click Delete. To change the assigned group of a user, click Change Group in the Actions column of the users table and select the new group.
Figure 3-35. SNMP Groups Page CLI The following is an example of the SNMP CLI commands:
93
example, a view can be defined which provides that SNMP group A has Read Only (R/O) access to Multicast groups, while SNMP group B has Read-Write (R/W) access to Multicast groups. Feature access is granted via the MIB name or MIB Object ID. The SNMP Views Page contains fields for assigning parameters that provide or block access to device features. Command Attributes View Name Displays the user-defined views. The view name can contain a maximum of 30 alphanumeric characters. Object ID Subtree Displays the device feature OID included in or excluded from the selected SNMP view. View Type Indicates whether the defined OID branch will be included in or excluded from the selected SNMP view. Remove Deletes the currently selected view. The possible field values are: Checked Removes the selected view. Unchecked Maintains the list of views. Web Click System, SNMP, Security, Views. Click New to configure a new view. In the New View page, define a name and specify OID subtrees in the switch MIB to be included or excluded in the view. Click Back to save the new view and return to the SNMPv3 Views list. For a specific view, click on View OID Subtrees to display the current configuration, or click on Edit OID Subtrees to make changes to the view settings. To delete a view, check the box next to the view name, then click Delete.
94
Configuring SNMP
CLI The following in an example of the SNMP View CLI commands:
Console(config)# snmp-server filter filter-name system included Console(config)# snmp-server filter filter-name system.7 excluded Console(config)# snmp-server filter filter-name ifEntry.*.1 included 4-360
95
3
Add.
Figure 3-37. SNMP Communities Page CLI The following is an example of the SNMP Communities CLI commands:
Console(config)# snmp-server community public su 192.168.1.20 4-360
96
Configuring SNMP
Command Attributes SNMPv1,2 Notification Recipient
Recipients IP Displays the IP address to which the traps are sent. Notification Type Displays the notification sent. The possible field values are: Trap Indicates traps are sent. Inform Indicates informs are sent. Community String Displays the community string of the trap manager. Notification Version Displays the trap type. The possible field values are: SNMP V1 Indicates that SNMP Version 1 traps are sent. SNMP V2c Indicates that SNMP Version 2 traps are sent. UDP Port Displays the UDP port used to send notifications. The default is 162. Filter Name Indicates if the SNMP filter for which the SNMP Notification filter is defined. Timeout Indicates the amount of time (in seconds) the device waits before re-sending informs. The default is 15 seconds. Retries Indicates the amount of times the device re-sends an inform request. The default is 3 seconds. Remove Deletes the currently selected recipient. The possible field values are: Checked Removes the selected recipient from the list of recipients. Unchecked Maintains the list of recipients. SNMPv3 Notification Recipient Recipient IP Displays the IP address to which the traps are sent. Notification Type Displays the type of notification sent. The possible field values are: Trap Indicates that traps are sent. Inform Indicates that informs are sent. User Name Displays the user to which SNMP notifications are sent. Security Level Displays the means by which the packet is authenticated. The possible field values are: No Authentication Indicates that the packet is neither authenticated nor encrypted. Authentication Indicates that the packet is authenticated. Privacy Encrypts SNMP messages. UDP Port The UDP port used to send notifications. The field range is 1-65535. The default is 162. Filter Name Includes or excludes SNMP filters. Timeout The amount of time (seconds) the device waits before resending informs. The field range is 1-300. The default is 10 seconds. Retries The amount of times the device resends an inform request. The field range is 1-255. The default is 3.
97
Remove Deletes the currently selected recipient. The possible field values are: Checked Removes the selected recipient from the list of recipients. Unchecked Maintains the list of recipients. Web Click SNMP, Trap Management, Trap Station Management. Define the fields and click Add.
Figure 3-38. SNMP Trap Station Management Page CLI The following is an example of the SNMP Recipient commands:
Console(config)# snmp-server host 10.1.1.1 management 2
98
Configuring SNMP
fields and click Apply.
Figure 3-39. SNMP Global Trap Settings Page CLI The following is an example of the SNMP commands for enabling traps:
Console(config)# snmp server enable traps 4-360
99
Figure 3-40. Trap Filter Settings Page CLI The following is an example of the Trap Management CLI commands:
Console(config)# snmp-server filter filter-name system included Console(config)# snmp-server filter filter-name system.7 excluded Console(config)# snmp-server filter filter-name ifEntry.*.1 included 4-360
100
101
Figure 3-41. Local Users Page CLI The following is an example of the CLI commands used for configuring Local Users Passwords:
Console(config)# 4-297
102
Web Click System, WebViewMgmt, Passwords, Line, define the fields, and click Apply.
Figure 3-42. Line Page CLI The following is an example of the CLI commands used for configuring Line Passwords.
Console(config)# line console 4-437 Console(config-line)# password secret 4-296
103
Figure 3-43. Enable Page CLI The following is an example of the CLI commands used for configuring Enable Passwords:
Console(config)# 4-296
104
management methods include: All Telnet Secure Telnet (SSH) HTTP Management access to different management methods may differ between user groups. For example, User Group 1 can access the switch module only via an HTTPS session, while User Group 2 can access the switch module via both HTTPS and Telnet sessions. The Access Profiles Page contains the currently configured access profiles and their activity status. Assigning an access profile to an interface denies access via other interfaces. If an access profile is assigned to any interface, the device can be accessed by all interfaces. Use the Authentication Settings menu to restrict management access based on specified user names and passwords. You can manually configure access rights on the switch, or you can use a remote access authentication server based on RADIUS or TACACS+ protocols. Remote Authentication Dial-in User Service (RADIUS) and Terminal Access Controller Access Control System Plus (TACACS+) are logon authentication protocols that use software running on a central server to control access to RADIUS-aware or TACACS- aware devices on the network. An authentication server contains a database of multiple user name/password pairs with associated privilege levels for each user that requires management access to the switch. For example, if you select (1) RADIUS, (2) TACACS+ and (3) Local, the user name and password on the RADIUS server is verified first. If the RADIUS server is not available, then authentication is attempted using the TACACS+ server, and finally the local user name and password is checked. Ensure the following when configuring Authentication Profiles: By default, management access is always checked against the authentication database stored on the local switch. If a remote authentication server is used, you must specify the authentication sequence and the corresponding parameters for the remote authentication protocol. Local and remote logon authentication control management access via the console port, web browser, or Telnet. RADIUS and TACACS+ logon authentication assign a specific privilege level for each user name/password pair. The user name, password, and privilege level must be configured on the authentication server. Command Attributes Access Profile Name Defines the access profile name. The access profile name can contain up to 32 characters. Current Active Access Profile Defines the access profile currently active. Remove Removes the selected access profile. The possible field values are: Checked Removes the selected access profile.
105
Unchecked Maintains the access profiles. Rule Priority Defines the rule priority. When the packet is matched to a rule, user groups are either granted permission or denied device management access. The rule number is essential to matching packets to rules, as packets are matched on a first-fit basis. The rule priorities are assigned in the Profiles Rules Page. Management Method Defines the management method for which the rule is defined. Users with this access profile can access the device using the management method selected. The possible field values are: All Assigns all management methods to the rule. Telnet Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device. Secure Telnet (SSH) Assigns SSH access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device. HTTP Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting access profile criteria are permitted or denied access to the device. Secure HTTP (HTTPS) Assigns HTTPS access to the rule. If selected, users accessing the device using HTTPS meeting access profile criteria are permitted or denied access to the device. SNMP Assigns SNMP access to the rule. If selected, users accessing the device using SNMP meeting access profile criteria are permitted or denied access to the device. Interface Defines the interface on which the access profile is defined. The possible field values are: Port Specifies the port on which the access profile is defined. LAG Specifies the LAG on which the access profile is defined. VLAN Specifies the VLAN on which the access profile is defined. Source IP Address Defines the interface source IP address to which the access profile applies. The Source IP Address field is valid for a subnetwork. Network Mask The IP subnetwork mask. Prefix Length The number of bits that comprises the source IP address prefix, or the network mask of the source IP address. Action Defines the action attached to the rule. The possible field values are: Permit Permits access to the device. Deny Denies access to the device. This is the default. Web Click System, WebViewMgmt, Authentication, Access Profiles, define the fields, and click Apply.
106
Figure 3-44. Access Profiles Page CLI The following is an example of the CLI commands used for configuring Access Profiles:
Console(config)# ip https port 100 4-694 Console(config)# ip http port 100 4-692
107
Priority Defines the rule priority. When the packet is matched to a rule, user groups are either granted permission or denied device management access. The rule number is essential to matching packets to rules, as packets are matched on a first-fit basis. Interface Indicates the interface type to which the rule applies. The possible field values are: Port Attaches the rule to the selected port. LAG Attaches the rule to the selected LAG. VLAN Attaches the rule to the selected VLAN. Management Method Defines the management method for which the rule is defined. Users with this access profile can access the device using the management method selected. The possible field values are: All Assigns all management methods to the rule. Telnet Assigns Telnet access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device. Secure Telnet (SSH) Assigns SSH access to the rule. If selected, users accessing the device using Telnet meeting access profile criteria are permitted or denied access to the device. HTTP Assigns HTTP access to the rule. If selected, users accessing the device using HTTP meeting access profile criteria are permitted or denied access to the device. Secure HTTP (HTTPS) Assigns HTTPS access to the rule. If selected, users accessing the device using HTTPS meeting access profile criteria are permitted or denied access to the device. SNMP Assigns SNMP access to the rule. If selected, users accessing the device using SNMP meeting access profile criteria are permitted or denied access to the device. Source IP Address Defines the interface source IP address to which the rule applies. Prefix Length Defines the number of bits that comprise the source IP address prefix, or the network mask of the source IP address. Action Defines the action attached to the rule. The possible field values are: Permit Permits access to the device. Deny Denies access to the device. This is the default. Remove Removes rules from the selected access profiles. The possible field values are: Checked Removes the selected rule from the access profile. Unchecked Maintains the rules attached to the access profile. Web Click System, WebViewMgmt, Authentication, Profiles Rules, define the fields, and click Apply.
108
Figure 3-45. Profiles Rules Page CLI The following is an example of the CLI commands used for configuring Profile Rules:
Console(config)# ip http server 4-691 Console(config)# ip https server 4-693
109
Line Authenticates the user using a line password. Enable Authenticates the user using an enable password. TACACS+ Authenticates the user at the TACACS+ server. Remove Removes the selected authentication profile. The possible field values are: Checked Removes the selected authentication profile. Unchecked Maintains the authentication profiles. Profile Method Login Specifies the user-defined authentication profile list for login passwords. Enable Specifies the user-define authentication profile list for enable passwords. Web Click System, WebViewMgmt, Authentication, Authentication Profiles, define the fields, and click Apply.
Figure 3-46. Authentication Profiles Page CLI The following is an example of the CLI commands used for configuring
110
enable none
4-288 Console(config)# ip http authentication radius local 4-293 Console(config)# ip https authentication radius local 4-294 Console(config)# line console 4-296 Console(config-line)# login authentication default 4-291
111
112
TACACS+ Authentication occurs at the TACACS+ server. Line Authentication using a line password. Enable Authentication using enable. Local, RADIUS Authentication first occurs locally. If authentication cannot be verified locally, the RADIUS server authenticates the management method. If the RADIUS server cannot authenticate the management method, the session is blocked. RADIUS, Local Authentication first occurs at the RADIUS server. If authentication cannot be verified at the RADIUS server, the session is authenticated locally. If the session cannot be authenticated locally, the session is blocked. Local, RADIUS, None Authentication first occurs locally. If authentication cannot be verified locally, the RADIUS server authenticates the management method. If the RADIUS server cannot authenticate the management method, the session is permitted. RADIUS, Local, None Authentication first occurs at the RADIUS server. If authentication cannot be verified at the RADIUS server, the session is authenticated locally. If the session cannot be authenticated locally, the session is permitted. Web Click System, WebViewMgmt, Authentication, Authentication Mapping, define the fields, and click Apply.
Figure 3-47. Authentication Mapping Page CLI The following is an example of the CLI commands used for mapping
113
authentication mapping:
Console(config)# 4-290
114
Status Indicates the connection status between the device and the TACACS+ server. The possible field values are: Connected Indicates there is currently a connection between the device and the TACACS+ server. Not Connected Indicates there is not currently a connection between the device and the TACACS+ server. Remove Removes TACACS+ server. The possible field values are: Checked Removes the selected TACACS+ server. Unchecked Maintains the TACACS+ servers. Web Click System, WebViewMgmt, Authentication, TACACS+, define the fields, and click Apply.
Figure 3-48. TACACS+ Page CLI The following is an example of the TACACS+ CLI Commands:
Console(config)# 4-622 Console(config)# 4-623 Console(config)# 4-624 Console(config)# 4-625
tacacs-server host 172.16.1.1 tacacs-server key tacacs-server timeout 30 tacacs-server source-ip 172.16.8.1
115
Default parameters are user-defined, and are applied to newly defined RADIUS servers. If new default parameters are not defined, the system default values are applied to newly defined RADIUS servers. The RADIUS Page contains parameters for defining RADIUS servers. Command Attributes Default Retries Defines the number of transmitted requests sent to the RADIUS server before a failure occurs. Possible field values are 1-10. Default Timeout for Reply Defines the amount of time (in seconds) the device waits for an answer from the RADIUS server before retrying the query, or switching to the next server. Possible field values are 1-30. Default Dead Time Defines the default amount of time (in minutes) that a RADIUS server is bypassed for service requests. The range is 0-2000. Default Key String Defines the default key string used for authenticating and encrypting all RADIUS-communications between the device and the RADIUS server. This key must match the RADIUS encryption. Source IP Address Displays the source address. The following parameters are configured for each TACACS+ server: Source IP Address Defines the default IP address of a device accessing the RADIUS server. IP Address Lists the RADIUS server IP addresses. Priority Displays the RADIUS server priority. The possible values are 1-65535, where 1 is the highest value. The RADIUS server priority is used to configure the server query order. Authentication Port Identifies the authentication port. The authentication port is used to verify the RADIUS server authentication. The authenticated port default is 1812. Number of Retries Defines the number of transmitted requests sent to the RADIUS server before a failure occurs. The possible field values are 1-10. Three is the default value. Timeout for Reply Defines the amount of time (in seconds) the device waits for an answer from the RADIUS server before retrying the query, or switching to the next server. The possible field values are 1-30. Three is the default value. Dead Time Defines the amount of time (in minutes) that a RADIUS server is bypassed for service requests. The range is 0-2000. The default is 0 minutes. source IP address Defines the source IP address that is used for communication with RADIUS servers. Usage Type Specifies the RADIUS server authentication type. The default value is All. The possible field values are: Log in The RADIUS server is used for authenticating user name and passwords. 802.1X The RADIUS server is used for 802.1X authentication. All The RADIUS server is used for authenticating user names and passwords, and 802.1X port authentication.
116
Remove Removes a RADIUS server. The possible field values are: Checked Removes the selected RADIUS server. Unchecked Maintains the RADIUS servers. Web Click System, WebViewMgmt, Authentication, RADIUS, define the fields, and click Apply.
Figure 3-49. RADIUS Page CLI The following is an example of the RADIUS CLI Commands:
Console(config)# radius-server host 192.168.10.1 auth-port 20 timeout 20 4-495 Console(config)# 4-497 console(config)# 4-497 console(config)# 4-498 Console(config)# 4-499 Console(config)# 4-500
radius-server key alcatel-server radius-server retransmit 5 radius-server source-ip 10.1.1.1 radius-server timeout 5 radius-server deadtime 10
117
118
Fragments Displays the number of fragments (packets with less than 64 octets, excluding framing bits, but including FCS octets) received on the interface since the device was last refreshed. Jabbers Displays the total number of received packets that were longer than 1518 octets. This number excludes frame bits, but includes FCS octets that had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral octet (Alignment Error) number. The field range to detect jabbers is between 20 ms and 150 ms. Collisions Displays the number of collisions received on the interface since the device was last refreshed. Frames of xx Bytes Number of xx-byte frames received on the interface since the device was last refreshed. Web Click System, RMON, Statistics. Select an interface.
Figure 3-50. RMON Statistics Page CLI The following is an example of the CLI commands used to view RMON statistics:
Console# show rmon statistics ethernet 1/e1 4-503 Port: 1/e1 Octets: 878128 Broadcast: 7 CRC Align Errors: 0 Packets: 978 Multicast: 1 Collisions: 0
119
Undersize Pkts: 0 Fragments: 0 64 Octets: 98 128 to 255 Octets: 0 512 to 1023 Octets: 491
Oversize Pkts: 0 Jabbers: 0 65 to 127 Octets: 0 256 to 511 Octets: 0 1024 to 1518 Octets: 389
120
Figure 3-51. History Control Page CLI The following is an example of the CLI commands used to view RMON History Control statistics:
Console(config)# interface ethernet 1/e1 4-376 Console(config-if)# rmon collection history 1 interval 2400 4-506
121
Broadcast Packets Displays the number of good Broadcast packets received on the interface since the device was last refreshed. This number does not include Multicast packets. Multicast Packets Displays the number of good Multicast packets received on the interface since the device was last refreshed. CRC Align Errors Displays the number of CRC and Align errors that have occurred on the interface since the device was last refreshed. Undersize Packets Displays the number of undersized packets (less than 64 octets) received on the interface since the device was last refreshed. Oversize Packets Displays the number of oversized packets (over 1518 octets) received on the interface since the device was last refreshed. Fragments Displays the number of fragments (packets with less than 64 octets, excluding framing bits, but including FCS octets) received on the interface since the device was last refreshed. Jabbers Displays the total number of received packets that were longer than 1518 octets. This number excludes frame bits, but includes FCS octets that had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral octet (Alignment Error) number. The field range to detect jabbers is between 20 ms and 150 ms. Collisions Displays the number of collisions received on the interface since the device was last refreshed. Utilization Displays the percentage of the interface utilized. Web Click System, RMON, History, History Table and select an a history entry number.
122
CLI The following is an example of the CLI commands used to view RMON History Table statistics:
Console#
4-507
Time
Octets
Packets
Broadcas t -------3289
Multicast
Util
---------
-------
---------
-----
303595962
357568
7287
19%
287696304
275686
2789
5878
20%
Console#
4-507
Undersize --------1
Oversize -------0
Fragments --------49
Jabbers ------0
27
123
Console#
4-507
Time
Dropped
Collisio ns --------0 0
--------------------
--------
3 3
124
Figure 3-53. Events Control Page CLI The following is an example of the CLI commands used to view RMON events Control statistics:
Console(config)# rmon event 10 log 4-514
125
Figure 3-54. Events Logs Page CLI The following is an example of the CLI commands used to view RMON events Logs:
Console> 4-514
Index ----1 2
Community ---------
Owner ----CLI
device
Manag er
126
Interface Displays interface for which RMON statistics are displayed. The possible field values are: Port Displays the RMON statistics for the selected port. LAG Displays the RMON statistics for the selected LAG. Counter Value Displays the selected MIB variable value. Sample Type Defines the sampling method for the selected variable and comparing the value against the thresholds. The possible field values are: Delta Subtracts the last sampled value from the current value. The difference in the values is compared to the threshold. Absolute Compares the values directly with the thresholds at the end of the sampling interval. Rising Threshold Displays the rising counter value that triggers the rising threshold alarm. The rising threshold is presented on top of the graph bars. Each monitored variable is designated a color. Rising Event Displays the mechanism in which the alarms are reported. The possible field values are: LOG Indicates there is not a saving mechanism for either the device or in the management system. If the device is not reset, the entry remains in the Log Table. TRAP Indicates that an SNMP trap is generated, and sent via the Trap mechanism. The Trap can also be saved using the Trap mechanism. Both Indicates that both the Log and Trap mechanisms are used to report alarms. Falling Threshold Displays the falling counter value that triggers the falling threshold alarm. The falling threshold is graphically presented on top of the graph bars. Each monitored variable is designated a color. Falling Event Displays the mechanism in which the alarms are reported. Startup Alarm Displays the trigger that activates the alarm generation. Rising is defined by crossing the threshold from a low-value threshold to a higher-value threshold. Rising Alarm The rising counter value that triggers the rising threshold alarm. Falling Alarm The falling counter value that triggers the falling threshold alarm. Rising and Falling The rising and falling counter values that trigger the alarm. Interval Defines the alarm interval time in seconds. Owner Displays the device or user that defined the alarm. Remove Removes the RMON Alarms Table entry. Web Click System, RMON, Alarm, define the fields, and click Apply.
127
Figure 3-55. Alarm Page CLI The following is an example of the CLI commands used to set RMON alarms:
Console(config)# rmon alarm 1000 1.3.6.1.2.1.10.7.2.1.3.51 1000000 1000000 10 20 1 4-510
Configuring AMAP
The AMAP protocol discovers adjacent switches by sending and receiving AMAP Hello packets on active Spanning Tree ports. Each port can be defined as being in one of three logical states of processing the AMAP Hello Packets: discovery, common, or passive. Note: AMAP packets are registered only on a default VLAN. Use the AMAP Settings Page to enable/disable AMAP and configure timeout
128
parameters. The following parameters describe the three main AMAP port states: Discovery The initial state where a port transmits a Hello packet to detect an adjacent switch and then waits for a response. Common The port has detected an adjacent switch and periodically sends Hello packets to determine that it is still present. Passive A port enters this state if there is no response to a Discovery hello packet. This is a receive-only state and no Hello packets are transmitted. If a Hello packet is received from an adjacent switch, the port enters the Common state and then transmits a Hello packet in reply. Command Attributes AMAP Status Enables or disables AMAP on the switch. (Default: enabled) Discovery Timeout Interval Sets the time the switch will wait before sending a Hello packet to detect an adjacent switch. (Range:1-65535 seconds) Common Timeout Interval After detecting an adjacent switch this sets the time the switch will wait before sending a further Hello packet to determine if the adjacent switch is still connected. (Range:1-65535 seconds) Web Click System, Network Discovery, AMAP, AMAP Settings. Select whether to enable AMAP, enter the desired timeout intervals and click Apply.
Figure 3-56. AMAP Settings Page CLI The following is an example of the AMAP CLI commands:
129
Console(config)# amap enable Console(config)# amap discovery time 3000 Console(config)# amap common time 5000
130
Configuring LLDP
CLI The following is an example of the AMAP Adjacencies commands:
Console# show amap Operational Status: active, Common Phase Timeout Interval (seconds)= 300, Discovery Phase Timeout Interval (seconds)= 30.
4-346
Configuring LLDP
The Link Layer Discovery Protocol (LLDP) allows network managers to troubleshoot and enhance network management by discovering and maintaining network topologies over multi-vendor environments. LLDP discovers network neighbors by standardizing methods for network devices to advertise themselves to other system, and to store discovered information. Device discovery information includes: Device Identification Device Capabilities Device Configuration The advertising device transmits multiple advertisement message sets in a single LAN packet. The multiple advertisement sets are sent in the packet Type Length Value (TLV) field. LLDP devices must support chassis and port ID advertisement, as well as system name, system ID, system description, and system capability advertisements. Command Attributes Enable LLDP Indicates if LLDP is enabled on the device. The possible field values are: Enabled Indicates that LLDP is enabled on the device. Disabled Indicates that LLDP is disabled on the device. This is the default value. Updates Interval (5-32768) Indicates that rate at which LLDP advertisement updates are sent. The possible field range is 5 - 3276 seconds. The default value is 30 seconds. Hold Multiplier Indicates the amount of time that LLDP packets are held before the packets are discarded. The value represents a multiple of the Updates Interval. The possible field range is 2 - 10. The field default is 4. For example, if the Update Interval is 30 seconds and the Hold Multiplier is 4, then the LLDP packets are discarded after 120 seconds. Reinitializing Delay (1-10) Indicates the amount of time that passes between disabling LLDP and when reinitializing begins. The possible field range is 1 - 10 seconds. The field default is 2 seconds. Transmit Delay Indicates the amount of time that passes between successive LLDP frame transmissions due to changes in the LLDP local systems MIB. The possible field value is 1 8192 seconds. The field default is 2 seconds. Web Click Network Discovery, LLDP, Properties. Define the fields and click Apply.
131
opens:
132
Configuring LLDP
133
Guest VLAN Indicates that the network policy is defined for a Guest VLAN application. Guest VLAN Signaling Indicates that the network policy is defined for a Guest VLAN Signalling application. Softphone Voice Indicates that the network policy is defined for a Softphone Voice application. Video Conferencing Indicates that the network policy is defined for a Video Conferencing application. Streaming Video Indicates that the network policy is defined for a Streaming Video application. VLAN ID Indicates the VLAN ID for which the Network policy is assigned. VLAN Type Indicates the VLAN type for which the network policy is defined. The possible field values are: Tagged Indicates the network policy is defined for tagged VLANs. Untagged Indicates the network policy is defined for untagged VLANs. User Priority Defines the priority assigned to the network application. DSCP Value Defines the DSCP value assigned to the network policy. The possible field value is 1-64. Web Click Network Discovery, LLDP, MED Network Policy. Define the fields and click Apply.
134
Configuring LLDP
Command Attributes
Unit No. Indicates the stacking member for which the interface configuration information is displayed. Port Displays the port to which the network policy is attached. LLDP MED Status Indicates if LLDP is enabled on the device. The possible field values are: Enable Enables LLDP MED on the device. Disable Disables LLDP MED on the device. This is the default value Network Policy Indicates whether activated or not. Location Indicates whether activated or not. PoE Indicates whether activated or not. Web Click Network Discovery, LLDP, MED Port Settings. Define the fields and click Apply.
135
click Apply
136
Configuring LLDP
LLDP MED Power over Ethernet Power Type Indicates whether the device is a Power Sourcing Entity (PSE) or Power Device (PD) Power Source Indicates the power source used by a PSE or PD device. A PSE device advertises its power capability. The possible field values are: Primary power Indicates the power source is the primary power source used by the PSE or the PD Local power Indicates the power source is the local power source used by the PSE or the PD. Power Priority Indicates the power source used by a PSE or PD device. A PSE device advertises its power capability. The possible field values are: Critical Defines the power capability as critical High Defines the power capability as high Low Defines the power capability as low Power Value Indicates the total power in watts required by a PD device from a PSE device, or the total power a PSE device is capable of sourcing over a maximum length cable based on its current configuration. LLDP Network Policy The LLDP Network Policy table displays the application for which the network policy is defined. The possible field values are: Voice Indicates that the network policy is defined for a Voice application. Voice Signaling Indicates that the network policy is defined for a Voice Signaling application. Guest Voice Indicates that the network policy is defined for a Guest Voice application. Guest Voice Signaling Indicates that the network policy is defined for a Guest Voice Signalling application. Softphone Voice Indicates that the network policy is defined for a Softphone Voice application. Video Conferencing Indicates that the network policy is defined for a Video Conferencing application. Streaming Video Indicates that the network policy is defined for a Streaming Video application. Video Signaling Indicates that the network policy is defined for a Video Signaling application. LLDP Med Location Location Coordinate Displays the devices location coordinates. Location Civic Address Displays the devices civic or street address location, for example 414 23rd Ave E. Location ECS ELIN Displays the devices ECS ELIN location. Web Click Network Discovery, LLDP, Neighbors Information, Details button.
137
138
139
Figure 3-64. Properties Page CLI The following is an example of PoE properties commands:
Console(config)# power inline usage threshold 80 4-460 Console(config)# power inline traps enable 4-463 Console(config)# end Console# show power inline 4-464 Power: On Nominal Power: 150 Watt Consumed Power: 120 Watts (80%) Usage Threshold: 95% Traps: Enabled
140
learn their classification. This is the default setting. Never Disables the Device Discovery protocol, and stops the power supply to the device using the PoE module. Oper. Status Indicates if the port is enabled to work on PoE. The possible field values are: On Indicates the device is delivering power to the interface. Off Indicates the device is not delivering power to the interface. Test Fail Indicates the powered device test has failed. For example, a port could not be enabled and cannot be used to deliver power to the powered device. Testing Indicates the powered device is being tested. For example, a powered device is tested to confirm it is receiving power from the power supply. Searching Indicates that the device is currently searching for a powered device. Searching is the default PoE operational status. Fault Indicates that the device has detected a fault on the powered device. For example, the powered device memory could not be read. Priority Level Determines the port priority if the power supply is low. The port power priority is used if the power supply is low. The field default is low. For example, if the power supply is running at 99% usage, and port 1 is prioritized as high, but port 3 is prioritized as low, port 1 is prioritized to receive power, and port 3 may be denied power. The possible field values are: Low Defines the PoE priority level as low. High Defines the PoE priority level as high. Critical Defines the PoE priority level as Critical. This is the highest PoE priority level. Power Consumption Indicates the amount of power assigned to the powered device connected to the selected interface. The possible field values are: Class 0 1 2 3 4 Usage Default Optional Optional Optional Reserved Min. power level at PSE output 15.4 watt 4.0 watt 7.0 watt 15.4 watt As class 0
Powered Device Provides a user-defined powered device description. The field can contain up to 24 characters. Web Click Physical, Ethernet, Power over Ethernet, Interface page. Define the fields and click Apply.
141
142
can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner. When configuring port mirroring, ensure the following: Monitor port speed should match or exceed source port speed, otherwise traffic may be dropped from the monitor port. All mirror sessions have to share the same destination port. When mirroring port traffic, the target port must be included in the same VLAN as the source port. The Port Mirroring Page contains parameters for monitoring and mirroring of network traffic. Command Attributes Unit No. Indicates the stacking member for which the port mirroring configuration information is displayed. Destination Port Defines the port number to which port traffic is copied. Source Port Indicates the port from which the packets are mirrored. Type Indicates the port mode configuration for port mirroring. The possible field values are: CopyRXOnly Defines the port mirroring on receiving ports. CopyTXOnly Defines the port mirroring on transmitting ports. CopyBoth Defines the port mirroring on both receiving and transmitting ports. This is the default value. Status Indicates if the port is currently monitored. The possible field values are: Active Indicates the port is currently monitored. notReady Indicates the port is not currently monitored. Remove Removes the port mirroring session. The possible field values are: Checked Removes the selected port mirroring sessions. Unchecked Maintains the port mirroring session. Web Click Physical, Diagnostics, Port Mirroring. Specify the source port, the traffic type to be mirrored, and the destination port, then click Add.
143
Figure 3-66. Port Mirroring Page CLI The following is an example of the Port Mirroring CLI commands:
Console(config)# interface ethernet 1/e1 4-376 Console(config-if)# port monitor 1/e8 4-458
144
OK Indicates that the cable passed the test. Cable Fault Distance Indicates the distance from the port where the cable error occurred. Last Update Indicates the last time the port was tested. Cable Length Indicates the approximate cable length. This test can only be performed when the port is up. Web Click Physical, Diagnostics, Copper Cable, define the fields, and click Test.
Figure 3-67. Copper Cable Page CLI The following is an example of the CLI commands used to test copper cables:
Console# show copper-ports cable-length 4-452
145
present. Command Attributes Unit No. Indicates the stacking member for which the interface configuration information is displayed. Port Displays the IP address of the port on which the cable is tested. Temperature Displays the temperature (C) at which the cable is operating. Voltage Displays the voltage (V) at which the cable is operating. Current Displays the current (mA) at which the cable is operating. Output Power Indicates the rate (mW) at which the output power is transmitted. Input Power Indicates the rate (mW) at which the input power is transmitted. Transmitter Fault Indicates if a fault occurred during transmission. Loss of Signal Indicates if a signal loss occurred in the cable. Data Ready Indicates the transceiver has achieved power up and data is ready. Web Click Physical, Diagnostics, Optical Transceivers.
Figure 3-68. Optical Transceiver Page CLI The following is an example of the CLI commands used to fiber cables:
Console# 4-453
146
---W OK Copper
------OK OK
------E OK
-----OK OK
----OK OK
------OK E
--OK OK
Temp Internally measured transceiver temperature. Voltage - Internally measured supply voltage. Current Measured TX bias current. Output Power Measured TX output power. Input Power Measured RX received power. Tx Fault Transmitter fault LOS Loss of signal N/A - Not Available, N/S - Not Supported, W - Warning, E - Error
Table 1:
147
Celsius 10 15 20 25 30 35 40
Fahrenheit 50 59 68 77 86 95 104
Figure 3-69. Health Page CLI The following is an example of the device Health CLI commands:
Console# show system 4-618
Unit ---1
Type ----------------Alcatel
148
Unit ---1
Unit ---1
Fan1 ---OK
Fan2 ---OK
Fan3 ---OK
Fan4 ---OK
Fan5 ---OK
149
Broadcast Rate Threshold The maximum rate (kilobits per second) at which unknown packets are forwarded. Rate limitations are as follows: The range for FE ports is 70 - 100000. Default is 3500. The range for GE ports is 3500 - 1000000. The default value is 3500. Broadcast Mode Specifies the Broadcast mode currently enabled on the device or stack. The possible field values are: Broadcast Only Counts only Broadcast traffic. Multicast & Broadcast Counts Broadcast and Multicast traffic together. Web Click Security, Traffic Control, Storm Control, define the fields, and click Apply.
Figure 3-70. Storm Control Page CLI The following is an example of the Storm Control CLI commands:
Console# configure Console(config)# port storm-control include-multicast 4-395 Console(config)# interface ethernet 2/e3 4-376 Console(config-if)# port storm-control include-multicast 4-395 Console(config-if)# port storm-control broadcast enable 4-395 Console(config-if)# port storm-control broadcast rate 900 4-396
150
151
Interface Indicates the port or LAG number. Interface Status Indicates if the interface is locked or unlocked. Learning Mode Defines the locked interface mode. The Learning Mode field is enabled only if Locked is selected in the Set Port field. The possible field values are: Classic Lock Locks the port using the classic lock mechanism. The port is immediately locked, regardless of the number of addresses that have already been learned. Limited Dynamic Lock Locks the port by deleting the current dynamic MAC addresses associated with the port. The port learns up to the maximum addresses allowed on the port. Both relearning and aging MAC addresses are enabled. Max Entries Specifies the number of MAC address that can be learned on the port. The Max Entries field is enabled only if Locked is selected in the Set Port field. In addition, the Limited Dynamic Lock mode is selected. The default is 1. Action Defines the action to be applied to packets arriving on a locked port. The possible field values are: Forward Forwards packets from an unknown source without learning the MAC address. Discard Discards packets from any unlearned source. This is the default value. Shutdown Discards packets from any unlearned source and shuts down the port. The port remains shut down until reactivated, or until the device is reset. Trap Enables traps when a packet is received on a locked port. The possible field values are: Checked (True) Enables traps. Unchecked (False) Disables traps. Trap Frequency (Sec) Defines the amount of time (in seconds) between traps. The default value is 10 seconds. Web Click Security, Traffic Control, Port Security. Define the fields and click Apply.
152
Figure 3-71. Port Security Page CLI The following is an example of the Port Security CLI commands:
Console(config)# interface ethernet 1/e1 Console(config-if)# port security forward Console(config-if)# port security mode Console(config-if)# port security max 20
trap 100
153
Supplicants Specifies the host connected to the authenticated port requesting to access the system services. Authentication Server Specifies the server that performs the authentication on behalf of the authenticator, and indicates whether the supplicant is authorized to access system services. The RADIUS server verifies the client identity and sends an access challenge back to the client. The EAP packet from the RADIUS server contains not only the challenge, but the authentication method to be used. The client can reject the authentication method and request another, depending on the configuration of the client software and the RADIUS server. The RADIUS server verifies the client credentials and responds with an accept or reject packet. If authentication is successful, the switch allows the client to access the network. Otherwise, network access is denied and the port remains blocked. Port-based authentication creates two access states: Controlled Access Permits communication between the supplicant and the system, if the supplicant is authorized. Uncontrolled Access Permits uncontrolled communication regardless of the port state. The device currently supports port-based authentication via RADIUS servers.
154
administrator can use Guest VLANs to deny network access via port-based authentication, but grant Internet access to unauthorized users. Unauthenticated VLANS Are available to users, even if the ports attached to the VLAN are defined as unauthorized. When configuring port based authentication, ensure the following: The switch must have an IP address assigned. RADIUS authentication must be enabled on the switch and the IP address of the RADIUS server specified. Each switch port must be set to dot1x Auto mode. Each client that needs to be authenticated must have dot1x client software installed and properly configured. The RADIUS server and 802.1x client support EAP. (The switch only supports EAPOL in order to pass the EAP packets from the server to the client.) The RADIUS server and client also have to support the same EAP authentication type MD5. (Some clients have native support in Windows, otherwise the dot1x client must support it.)
Guest VLAN Specifies whether the Guest VLAN is enabled on the device. The possible field values are: Enable Enables use of a Guest VLAN for unauthorized ports. If a Guest VLAN is enabled, the unauthorized port automatically joins the VLAN selected in the VLAN List field. Disable Disables use of a Guest VLAN for unauthorized ports. This is the default. Guest VLAN ID Contains a list of VLANs. The Guest VLAN is selected from the VLAN list.
155
EAP Frames Determines how EAP packets are managed when port based authentication is disabled on the device. EAP packets are used to transmit authentication information. The possible field values are: Filtering Filters EAP packets when port based authentication is disabled globally. Bridging Indicates that if the port based authentication is globally disabled, untagged and tagged EAP packets are flooded, and are subject to ingress and egress VLAN rules. Web Click Security, 802.1x, System Information.
Figure 3-72. System Information Page CLI The following is an example of the device Authentication CLI commands:
Console(config)# 4-265 Console(config)# 4-264
156
157
Quiet Period Displays the number of seconds that the device remains in the quiet state following a failed authentication exchange. The possible field range is 0-65535. The field default is 60 seconds. Resending EAP Defines the amount of time (in seconds) that lapses before EAP requests are resent. The field default is 30 seconds. Max EAP Requests Displays the total amount of EAP requests sent. If a response is not received after the defined period, the authentication process is restarted. The field default is 2 retries. Supplicant Timeout Displays the amount of time (in seconds) that lapses before EAP requests are resent to the supplicant. The field default is 30 seconds. Server Timeout Displays the amount of time (in seconds) that lapses before the device re-sends a request to the authentication server. The field default is 30 seconds. Termination Cause Indicates the reason for which the port authentication was terminated.
158
802.1X Only Enables only 802.1X authentication on the device. MAC Only Enables only MAC authentication on the device. MAC + 802.1X Enables MAC Authentication + 802.1X authentication on the device. Periodic Reauthentication Permits immediate port reauthentication. The possible field values are: Enable Enables immediate port reauthentication. This is the default value. Disable Disables port reauthentication. Reauthenticate Now Reauthenticates the selected ports immediately. Select All selects all ports for reauthentication. Authenticator State Displays the current authenticator state. Quiet Period Displays the number of seconds that the device remains in the quiet state following a failed authentication exchange. The possible field range is 0-65535. The field default is 60 seconds. Resending EAP Defines the amount of time (in seconds) that lapses before EAP requests are resent. The field default is 30 seconds. Max EAP Requests Displays the total amount of EAP requests sent. If a response is not received after the defined period, the authentication process is restarted. The field default is 2 retries. Supplicant Timeout Displays the amount of time (in seconds) that lapses before EAP requests are resent to the supplicant. The field default is 30 seconds. Server Timeout Displays the amount of time (in seconds) that lapses before the device re-sends a request to the authentication server. The field default is 30 seconds. Termination Cause Indicates the reason for which the port authentication was terminated. Web Click Security, 802.1x, Port Authentication, define the fields, and click Apply.
159
Figure 3-73. Port Authentication Page CLI The following is an example of the Port Authentication CLI commands:
Console# dot1x re-authenticate ethernet 1/e16 4-267 Console(config)# interface ethernet 1/e16 Console(config-if)# dot1x port-control auto 4-266 Console(config-if)# dot1x re-authentication 4-267 Console(config-if)# dot1x timeout re-authperiod 300 4-268 Console(config-if)# dot1x timeout quiet-period 3600 Console(config-if)# dot1x timeout tx-period 3600 4-270 Console(config-if)# dot1x max-req 6 4-271 Console(config-if)# dot1x timeout supp-timeout 3600 4-272 Console(config-if)# dot1x timeout server-timeout 3600 4-273
4-376
4-269
160
Port Displays the port number for which advanced port-based authentication is enabled. Host Authentication Indicates the Host Authentication mode. The possible field values are: Single Host Mode Only the authorized host can access the port. Multiple Host Mode Multiple hosts can be attached to a single 802.1x-enabled port. Only one host must be authorized for all hosts to access the network. If the host authentication fails, or an EAPOL-logoff message is received, all attached clients are denied access to the network. Multiple Sessions Mode - Multiple sessions mode enables number of specific hosts that has been authorized to get access to the port. Filtering is based on the source MAC address. Action on Violation Defines the action to be applied to packets arriving in single-host mode, from a host whose MAC address is not the supplicant MAC address. The possible field values are: Forward Forwards the packet. Discard Discards the packets. This is the default value. DiscardDisable Discards the packets and shuts down the port. The ports remains shut down until reactivated, or until the device is reset. Traps Indicates if traps are enabled for Multiple Hosts. The possible field values are: Enabled Indicates that traps are enabled for Multiple hosts. Disabled Indicates that traps are disabled for Multiple hosts. Trap Frequency Defines the time period by which traps are sent to the host. The Trap Frequency (1-1000000) field can be defined only if multiple hosts are disabled. The default is 10 seconds. Web Click Security, 802.1x, Multiple Hosts, define the fields, and click Apply.
161
Figure 3-74. Multiple Hosts Page CLI The following is an example of the Multiple Hosts CLI commands:
Console(config-if)# 4-282 Console(config-if)# 4-283
162
Figure 3-75. Authentication Host Page CLI The following is an example of the Authentication Host CLI commands:
Console# 4-274
show dot1x
802.1x is enabled
Port
Admin Mode
Oper Mode
Username
163
Console# 4-274
802.1x is enabled.
Port
Admin Mode
Oper Mode
Username
---1/e3
---------Auto
--------Unauthorized
-------Clark
Quiet period: 60 Seconds Tx period:30 Seconds Max req: 2 Supplicant timeout: 30 Seconds Server timeout: 30 Seconds Session Time (HH:MM:SS): 08:19:17 MAC Address: 00:08:78:32:98:78 Authentication Method: Remote Termination Cause: Supplicant logoff
164
Refresh Rate Indicates the amount of time that passes before the EAP statistics are refreshed. The possible field values are: 15 Sec Indicates that the EAP statistics are refreshed every 15 seconds. 30 Sec Indicates that the EAP statistics are refreshed every 30 seconds. 60 Sec Indicates that the EAP statistics are refreshed every 60 seconds. No Refresh Indicates that the EAP statistics are not refreshed. Frames Receive Indicates the number of valid EAPOL frames received on the port. Frames Transmit Indicates the number of EAPOL frames transmitted via the port. Start Frames Receive Indicates the number of EAPOL Start frames received on the port. Log off Frames Receive Indicates the number of EAPOL Logoff frames that have been received on the port. Respond ID Frames Receive Indicates the number of EAP Resp/Id frames that have been received on the port. Respond Frames Receive Indicates the number of valid EAP Response frames received on the port. Request ID Frames Transmit Indicates the number of EAP Req/Id frames transmitted via the port. Request Frames Transmit Indicates the number of EAP Request frames transmitted via the port. Invalid Frames Receive Indicates the number of unrecognized EAPOL frames that have been received by on this port. Length Error Frames Receive Indicates the number of EAPOL frames with an invalid Packet Body Length received on this port. Last Frame Version Indicates the protocol version number attached to the most recently received EAPOL frame. Last Frame Source Indicates the source MAC address attached to the most recently received EAPOL frame. Web Click Security, 802.1x, Statistics and select an interface.
165
Figure 3-76. Statistics Page CLI The following is an example of the 802.1X Statistics CLI commands:
Console# show dot1x statistics ethernet 1/e1 4-279
EapolFramesRx: 11 EapolFramesTx: 12 EapolStartFramesRx: 12 EapolLogoffFramesRx: 1 EapolRespIdFramesRx: 3 EapolRespFramesRx: 6 EapolReqIdFramesTx: 3 EapolReqFramesTx: 6 InvalidEapolFramesRx: 0 EapLengthErrorFramesRx: 0 LastEapolFrameVersion: 1 LastEapolFrameSource: 00:08:78:32:98:78
166
167
The switch does not support the explicit deny any rule for the egress IP ACL or the egress MAC ACLs. If these rules are included in ACL, and you attempt to bind the ACL to an interface for egress checking, the bind operation will fail. The order in which active ACLs are checked is as follows: User-defined rules in the Egress MAC ACL for egress ports. User-defined rules in the Egress IP ACL for egress ports. User-defined rules in the Ingress MAC ACL for ingress ports. User-defined rules in the Ingress IP ACL for ingress ports. Explicit default rule (permit any any) in the ingress IP ACL for ingress ports. Explicit default rule (permit any any) in the ingress MAC ACL for ingress ports. If no explicit rule is matched, the implicit default is permit all.
168
Figure 3-77. ACL Binding Page CLI The following is an example of the IP Based ACL CLI commands:
Console(config)# ipaccess-list ip-acl1 4-300 Console(config-ip-al)#
169
L2IP Matches the packet to Layer 2 Internet Protocol (L2IP). Protocol ID Adds user-defined protocols by which packets are matched to the ACE. Each protocol has a specific protocol number which is unique. The possible field range is 0-255. Flag Set Displays the TCP flag that is triggered. ICMP Type Specifies an ICMP message type for filtering ICMP packets. ICMP Code Specifies an ICMP message code for filtering ICMP packets. ICMP packets that are filtered by ICMP message type can also be filtered by the ICMP message code. IGMP Type Displays the IGMP message type. IGMP packets can be filtered by IGMP message type. Source IP Address Matches the source IP address, to which packets are addressed to the ACE. Source Mask Defines the source IP address wildcard mask. Wildcard masks specify which bits are used and which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all the bits are important. For example, if the source IP address 149.36.184.198 and the wildcard mask is 255.36.184.00, the first eight bits of the IP address are ignored, while the last eight bits are used. Destination Port Defines the TCP/UDP destination port. This field is active only if 800/6-TCP or 800/17-UDP are selected in the Select from List drop-down menu. The possible field range is 0 - 65535. Dest. IP Address Matches the destination IP address, to which packets are addressed to the ACE. Mask Defines the destination IP address wildcard mask. Wildcard masks specify which bits are used and which bits are ignored. A wild card mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all the bits are important. For example, if the destination IP address 149.36.184.198 and the wildcard mask is 255.36.184.00, the first eight bits of the IP address are ignored, while the last eight bits are used. Match DSCP Matches the packet DSCP value to the ACE. Either the DSCP value or the IP Precedence value is used to match packets to ACLs. The possible field range is 0-63. Match IP Precedence Matches the packet IP Precedence value to the ACE. Either the DSCP value or the IP Precedence value is used to match packets to ACLs. The possible field range is 0-7. Action The ACL forwarding action. Possible values are: Permit Forwards packets which meet the ACL criteria. Deny Drops packets which meet the ACL criteria. Shutdown Drops packet that meets the ACL criteria, and disables the port to which the packet was addressed. Ports are reactivated from the Interface Configuration Page. Remove If checked, remove the ACE. Web Click Security, Access Control, IP Based ACL, define the fields and click
170
Figure 3-78. IP Based ACL Page CLI The following is an example of the IP Based ACLs CLI commands:
Console(config)#
ipaccess-list ip-acl1 permit rsvp 192.1.1.1 0.0.0.0 any dscp 56 deny rsvp 192.1.1.1 0.0.0.255 any
4-300
Console(config-ip-al)#
4-304
Console(config-ip-al)#
4-304
171
which bits are used and which are ignored. A wild card mask of FF:FF:FF:FF:FF:FF indicates that no bit is important. A wildcard of 00.00.00.00.00.00.00 indicates that all bits are important. For example, if the source MAC address is 00:AB:22:11:33:00 and the wildcard mask is 00:00:00:00:00:FF, the first two bits of the MAC are used, while the last two bits are ignored. Destination MAC Address Matches the destination MAC address, to which packets are addressed to the ACE. Destination MAC Mask Defines the destination MAC mask. Wild cards are used to mask all or part of a destination MAC address. Wild card masks specify which bits are used and which are ignored. A wild card mask of FF:FF:FF:FF:FF:FF indicates that no bit is important. A wildcard of 00.00.00.00.00.00.00 indicates that all bits are important. For example, if the source MAC address is 00:AB:22:11:33:00 and the wildcard mask is 00:00:00:00:00:FF, the first two bits of the MAC are used, while the last two bits are ignored. VLAN ID Matches the packets VLAN ID to the ACE. The possible field values are 1 to 4095. CoS Class of Service of the packet. CoS Mask Wildcard bits to be applied to the CoS. Ethertype The Ethernet type of the packet. Action Indicates the ACL forwarding action. Possible field values are: Permit Forwards packets which meet the ACL criteria. Deny Drops packets which meet the ACL criteria. Shutdown Drops packet that meet the ACL criteria, and disables the port to which the packet was addressed. Ports are reactivated from the Interface Configuration Page. Remove Removes MAC based ACLs. The possible field values are: Checked Removes the selected ACL. Unchecked Maintains the current MAC based ACLs. Create ACL and Create ACE windows contain the additional following fields: Rule Priority Value that specifies the rule priority. Inner VLAN The inner VLAN ID of a double tagged packet. Web Click Security, Access Control, MAC Based ACL, and click Apply.
172
DHCP Snooping
Figure 3-79. MAC Based ACL Page CLI The following is an example of the MAC Based ACL CLI commands:
Console(config)#
4-306
Console(config-mac-al)#
4-307
Console (config-mac-acl)#
deny 66:66:66:66:66:66
4-308
DHCP Snooping
DHCP Snooping expands network security by providing an extra layer of security between untrusted interfaces and DHCP servers. By enabling DHCP Snooping network administrators can identify between trusted interfaces connected to end-users or DHCP Servers, and untrusted interface located beyond the network firewall. DHCP Snooping filters untrusted messages. DHCP Snooping creates and maintains a DHCP Snooping Table which contains information received from untrusted packets. Interfaces are untrusted if the packet is received from an interface from outside the network or from a interface beyond the network firewall. Trusted interfaces receive packets only from within the network or the network firewall. The DHCP Snooping Table contains the untrusted interfaces MAC address, IP address, Lease Time, VLAN ID, and interface information. The DHCP section contains the following topics:
173
174
DHCP Snooping
and click Apply.
175
176
DHCP Snooping
177
Configuring Option 82
DHCP with Option 82 attaches authentication messages to the packets sent from the host. DHCP passes the configuration information to hosts on a TCP/IP network. This permits network administrators to limit address allocation authorized hosts. DHCP with Option 82 can be enabled only if DHCP snooping is enabled. Command Attributes DHCP Option 82 Insertion Indicates if DHCP Option 82 with data insertion is enabled on the device. The possible field values are: Enable Enables DHCP Option 82 with data insertion on the device. If DHCP Option 82 with data insertion is enabled the DHCP server can insert information into DHCP requests. The DHCP information is used to assign IP addresses to network interfaces or apply Access Control Lists and QoS policies to network users. Disable Disables DHCP Option 82 with data insertion on the device. This is the default value. Web Click Security, DHCP Snooping, DHCP Option 82. Define the fields and click Apply.
178
179
Destination MAC Compares the packets destination MAC address in the Ethernet header against the destination interfaces MAC address. This check is performed for ARP responses. IP Addresses Compares the ARP body for invalid and unexpected IP addresses. Addresses include 0.0.0.0, 255.255.255.255, and all IP Multicast addresses. If the packets IP address was not found in the ARP Inspection List, and DHCP snooping is enabled for a VLAN, a search of the DHCP Snooping Database is performed. If the IP address is found the packet is valid, and is forwarded. ARP inspection is performed only on untrusted interfaces
180
181
Command Attributes Interface Displays the interfaces on which ARP Inspection Trust mode can be enabled. The possible field values are: Units Indicates the port on which ARP Inspection Trust mode is enabled. LAGs Indicates the LAG on which ARP Inspection Trust mode is enabled. Trust Indicates if the selected interface is trusted or untrusted. The possible field values are: Enable Indicates that the port or LAG is a trusted interface, and ARP inspection is not performed on the ARP requests/replies sent to/from the interface. Disable Indicates the port or LAG is a trusted interface, and ARP inspection is performed on the ARP requests/replies sent to/from the interface. This is the default value if ARP Inspection is enabled. Web Click Security, DHCP Snooping, ARP Inspection, Trusted Interface. Define the fields and click Apply.
182
Select List Contains a list of user-defined ARP Inspection Lists. New Defines a new ARP Inspection List. The lists name can contain up to 32 characters. Static ARP Table IP Address Specifies IP address included in ARP Binding Lists which is checked against ARP requests. MAC Address Specifies MAC address included in ARP Binding Lists which is checked against ARP requests. Remove Removes the entry. The possible field values are: Checked Removes the selected entry. Unchecked Maintains the current entry information. Web Click Security, DHCP Snooping, ARP Inspection, ARP Inspection List. Define the fields and click Apply.
183
Remove Removes the entry. The possible field values are: Checked Removes the selected entry. Unchecked Maintains the current entry information. Web Click Security, DHCP Snooping, ARP Inspection, VLAN Settings. Define the fields and click Apply.
IP Source Guard
IP Source Guard is a security feature that restricts the client IP traffic to those source IP addresses configured in the binding. IP traffic restrictions are applied according to definitions in both the DHCP Snooping Binding Database and in manually configured IP source bindings. For example, IP Source Guard can help prevent traffic attacks caused when a host tries to use the IP address of its neighbor. Notes: 1. IP Source Guard must be enabled globally in the IP Source Guard Properties
Page before it can be enabled on the device interfaces.
4. IP Source Guard cannot be configured on routed ports. 5. If IP Source Guard and MAC address filtering is enabled on a port, Port
Security cannot be activated on the same port.
184
IP Source Guard
3. When the ports status changes from untrusted to trusted, the static IP
address filtering entries remain but become inactive.
185
Command Attributes Interface Displays the interface on which can be defined as Trusted. The possible field values are: Ports Displays the ports which can be defined as trusted. LAGs Displays the LAGs which can be defined as trusted. Interfaces Contains a list of existing interfaces. Status Indicates if IP Source Guard is enabled or disabled. Enable Indicates that IP Source Guard is enabled on the interface. Disable Indicates that IP Source Guard is disabled on the interface. This is the default value. Web Click Security, DHCP Snooping, IP Source Guard, Interface Settings. Select an interface, click Modify to define the fields and click Apply.
186
IP Source Guard
IP Address Indicates the IP addresses recorded in the IP Source Guard Database. The Database can be queried by IP address. VLAN Indicates the VLANs recorded in the IP Source Guard Database. The Database can be queried by VLAN. Interface Contains a list of interface by which the IP Source Guard Database can be queried. The possible field values are: Port Queries the VLAN database by port number. LAG Queries the VLAN database by LAG number. Interface Displays the VLAN ID to which the IP address is attached in the IP Source Guard Database. Status Displays the Interface status. Type Displays the IP address binding type. The possible field values are: Static Indicates the IP address remains static. Dynamic Indicates the IP address was obtained from the DHCP server. Reason Indicates a reason if the Status is Inactive. The possible field options are: No Problem VLAN Trusted Port Resource Problem Web Click Security, DHCP Snooping, IP Source Guard, Binding Database. Define the fields and click Apply.
187
188
Figure 3-92. Static Addresses Page CLI The following is an example of the CLI commands used to define static addresses:
Console(config)# interface 4-664 Console(config-if)# bridge
permanent
4-314
189
Command Attributes Address Aging Specifies the amount of time the MAC address remains in the Dynamic MAC Address table before it is timed out, if no traffic from the source is detected. The default value is 300 seconds. Clear Table If checked, clears the MAC address table. In the Query By table, the following fields are query filter options. In the Current Address Table, the following fields are parameters of the MAC address entries. Interface Specifies the interface for which the table is queried. There are two interface types from which to select. MAC Address Specifies the MAC address for which the table is queried. VLAN ID Specifies the VLAN ID for which the table is queried. Address Table Sort Key Specifies the means by which the Dynamic MAC Address Table is sorted. The address table can be sorted by address, VLAN, or interface. Web Click Layer 2, Address Table, Dynamic Addresses. Specify the search type, select the sorting method and click Query.
Figure 3-93. Dynamic Addresses Page CLI The following is an example of the CLI commands used to define dynamic
190
1/e8
4-318 Console(config-if)# bridge multicast forbidden forward-all add ethernet 1/e1 4-319
191
network topology. RSTP is designed as a general replacement for the slower, legacy STP. RSTP is also incorporated into MSTP. RSTP achieves must faster reconfiguration (i.e., around one tenth of the time required by STP) by reducing the number of state changes before active ports start learning, predefining an alternate route that can be used when a node or port fails, and retaining the forwarding database for ports insensitive to changes in the tree structure when reconfiguration occurs. When using STP or RSTP, it may be difficult to maintain a stable path between all VLAN members. Frequent changes in the tree structure can easily isolate some of the group members. MSTP (an extension of RSTP) is designed to support independent spanning trees based on VLAN groups. Once you specify the VLANs to include in a Multiple Spanning Tree Instance (MSTI), the protocol will automatically build an MSTI tree to maintain connectivity among each of the VLANs. MSTP maintains contact with the global network because each instance is treated as an RSTP node in the Common Spanning Tree (CST).
192
Short Specifies 1 through 65,535 range for port path cost. This is the default value. Long Specifies 1 through 200,000,000 range for port path cost. The default path cost assigned to an interface varies according to the selected method (Hello Time, Max Age, or Forward Delay). Priority Specifies the bridge priority value. When switches or bridges are running STP, each is assigned a priority. After exchanging BPDUs, the device with the lowest priority value becomes the Root Bridge. The default value is 32768. The port priority value is provided in increments of 4096. Hello Time Specifies the device Hello Time. The Hello Time indicates the amount of time in seconds a Root Bridge waits between configuration messages. The default is 2 seconds. Max Age Specifies the device Maximum Age Time. The Maximum Age Time is the amount of time in seconds a bridge waits before sending configuration messages. The default Maximum Age Time is 20 seconds. Forward Delay Specifies the device Forward Delay Time. The Forward Delay Time is the amount of time in seconds a bridge remains in a listening and learning state before forwarding packets. The default is 10 seconds. Bridge ID Identifies the Bridge priority and MAC address. Root Bridge ID Identifies the Root Bridge priority and MAC address. Root Port Indicates the port number that offers the lowest cost path from this bridge to the Root Bridge. This field is significant when the bridge is not the Root Bridge. The default is zero. Root Path Cost The cost of the path from this bridge to the Root Bridge. Topology Changes Counts Specifies the total amount of STP state changes that have occurred. Last Topology Change Indicates the amount of time that has elapsed since the bridge was initialized or reset, and the last topographic change that occurred. The time is displayed in a day-hour-minute-second format, such as 2 days 5 hours 10 minutes and 4 seconds.
connected to the network.
Note: The current root port and current root cost display as zero when this device is not Web Click Layer 2, Spanning Tree, STP, General.
193
Figure 3-94. STP General Page CLI This command displays global STA settings, followed by settings for each port.
Console(config)# 4-540 console(config)# 4-540 Console(config)# 4-550 Console(config)# 4-549 Console(config)# 4-376 Console(config)# 4-544 Console(config)# 4-542 Console(config)# 4-543 Console(config)# 4-541 spanning-tree spanning-tree mode rstp spanning-tree bpdu flooding spanning-tree pathcost method long interface ethernet 1/e15 spanning-tree priority 12288 spanning-tree hello-time 5 spanning-tree max-age 12 spanning-tree forward-time 25
194
configuring STP on an interface: A port on a network segment with no other STP compliant bridging device is always forwarding. If two ports of a switch are connected to the same segment and there is no other STP device attached to this segment, the port with the smaller ID forwards packets and the other is discarding. All ports are discarding when the switch is booted, then some of them change state to learning, and then to forwarding. Command Attributes Unit No. Indicates the stacking member for which the STP settings information is displayed. Query by Interface Queries the interface configuration table either by: All ports, All Lags, Active Ports or Blocked Ports. Interface The interface for which the information is displayed. STP Indicates if STP is enabled on the port. The possible field values are: Enable Indicates that STP is enabled on the port. Disable Indicates that STP is disabled on the port. Priority Indicates the priority value of the port. The priority value influences the port choice when a bridge has two ports connected in a loop. The priority value is between 0-240. The priority value is determined in increments of 16. Port State Displays the current STP state of a port. If enabled, the port state determines what forwarding action is taken on traffic. Possible port states are: Disabled Indicates that STP is currently disabled on the port. The port forwards traffic while learning MAC addresses. Blocking Indicates that the port is currently blocked and cannot forward traffic or learn MAC addresses. Blocking is displayed when Classic STP is enabled. Forwarding Indicates the port is currently in the Forwarding mode. The port can forward traffic and learn new MAC addresses. Port Role Displays the port role assigned by the STP algorithm to provide to STP paths. The possible field values are: Root Provides the lowest cost path to forward packets to the root switch. Designated The port or LAG through which the designated switch is attached to the LAN. Alternate Provides an alternate path to the root switch from the root interface. Backup Provides a backup path to the designated port path toward the Spanning Tree leaves. Backup ports occur only when two ports are connected in a loop by a point-to-point link, or when a LAN has two or more connections to a shared segment. Disabled The port is not participating in the Spanning Tree. Speed Indicates the speed at which the port is operating.
195
Path Cost Indicates the port contribution to the root path cost. The path cost is adjusted to a higher or lower value, and is used to forward traffic when a path is rerouted. Default Path Cost Indicates if the default path cost of the port is automatically set by the port speed and the default path cost method. Port Fast Indicates if Fast Link is enabled on the port. If Fast Link mode is enabled for a port, the Port State is automatically placed in the Forwarding state when the port link is up. Fast Link optimizes the STP protocol convergence. STP convergence can take 30-60 seconds in large networks. Enable Port Fast is enabled. Disable Port Fast is disabled. Auto Port Fast mode is enabled a few seconds after the interface becomes active. Root Guard Used to prevent an unauthorized device from becoming the root of a spanning tree. It also enables detection and resolution of misconfigurations, while preventing loops or loss of connectivity. BPDU Guard BPDU Guard is used as a security mechanism to protect the network from invalid configurations. It is usually used either when fast link ports (ports connected to clients) are enabled or when STP feature is disabled. When BPDU guard is enabled on a port, the port is shut down if a BPDU message is received and an appropriate SNMP trap is generated. The port must then be reactivated by using the set interface active command. The BPDU Guard indicates if BPDU is enabled for the selected interface. The possible field values are: Enable Enables BPDU guard on the selected port or LAG. Disable Disables BPDU guard on the selected port or LAG. This is the default value. Designated Bridge ID Indicates the bridge priority and the MAC Address of the designated bridge. Designated Port ID Indicates the selected port priority and interface. Designated Cost Indicates the cost of the port participating in the STP topology. Ports with a lower cost are less likely to be blocked if STP detects loops. Forward Transitions Indicates the number of times the port has changed from Forwarding state to Blocking state. LAG Indicates the LAG to which the port belongs.
196
Figure 3-95. Interface Configuration Page CLI The following is an example of the STP interface commands:
Console(config)# interface ethernet 1/e5 4-376 Console(config-if)# spanning-tree disable 4-544 Console(config-if)# spanning-tree cost 35000 4-545 Console(config-if)# spanning-tree port-priority 96 4-553 Console(config-if)# spanning-tree portfast 4-547
197
198
Figure 3-96. RSTP Page CLI The following is an example of the RSTP commands:
console# show spanning-tree 4-564
199
Revision An unsigned 16-bit number that identifies the revision of the current MSTP configuration. The revision number is required as part of the MSTP configuration. The possible field range is 0-65535. Max Hops Specifies the total number of hops that occur in a specific region before the BPDU is discarded. Once the BPDU is discarded, the port information is aged out. The possible field range is 1-40. The field default is 20 hops. IST Master Identifies the Spanning Tree Master instance. The IST Master is the specified instance root. Web Click Layer 2, Spanning Tree, MSTP, General. Define the fields and Click Apply.
Figure 3-97. MSTP General Page CLI The following is an example of the MSTP general properties commands:
Console(config)# 4-552
200
Instance ID Specifies the VLAN group to which the interface is assigned. Included VLAN Maps the selected VLANs to the selected instance. Each VLAN belongs to one instance. Bridge Priority Specifies the selected spanning tree instance device priority. The field range is 0-61440. Designated Root Bridge ID Indicates the ID of the bridge with the lowest path cost to the instance ID. Root Port Indicates the selected instances root port. Root Path Cost Indicates the selected instances path cost. Bridge ID Indicates the bridge ID of the selected instance. Remaining Hops Indicates the number of hops remaining to the next destination. Web Click Layer 2, Spanning Tree, MSTP, Instance Settings. Define the fields and Click Apply.
Figure 3-98. MSTP Instance Settings Page CLI The following is an example of the MSTP Instance Settings commands:
Console(config)# spanning-tree mst configuration 4-556 Console(config-mst)# instance 1 add vlan 10-20 4-556
201
Interface Settings Page. Command Attributes Instance ID Lists the MSTP instances configured on the device. Possible field range is 0-15. Interface Displays the interface for which the MSTP settings are displayed. The possible field values are: Port Specifies the port for which the MSTP settings are displayed. LAG Specifies the LAG for which the MSTP settings are displayed. STP Port Status Indicates if STP is enabled on the port. The possible field values are: Enabled Indicates that STP is enabled on the port. Disabled Indicates that STP is disabled on the port. Port State Indicates whether the port is enabled for the specific instance. The possible field values are: Enabled Enables the port for the specific instance. Disabled Disables the port for the specific instance. Type Indicates whether the port is a Boundary or Master port. The possible field values are: Boundary Port Indicates that the port is a Boundary port. A Boundary port attaches MST bridges to LANs in an outlying region. If the port is a Boundary port, this field also indicates whether the device on the other side of the link is working in RSTP or STP mode Master Port Indicates the port is a master port. A Master port provides connectivity from a MSTP region to the outlying CIST root. Role Indicates the port role assigned by the STP algorithm to provide to STP paths. The possible field values are: Root Provides the lowest cost path to forward packets to the root device. Designated Indicates the port or LAG through which the designated device is attached to the LAN. Alternate Provides an alternate path to the root device from the root interface. Backup Provides a backup path to the designated port path toward the Spanning Tree leaves. Backup ports occur only when two ports are connected in a loop by a point-to-point link or when a LAN has two or more connections connected to a shared segment. Disabled Indicates the port is not participating in the Spanning Tree. Mode Indicates the STP mode by which STP is enabled on the device. The possible field values are: Classic STP Classic STP is enabled on the device. This is the default value. Rapid STP Rapid STP is enabled on the device. Multiple STP Multiple STP is enabled on the device. Interface Priority Defines the interface priority for the specified instance. The default value is 128.
202
Path Cost Indicates the port contribution to the Spanning Tree instance. The range should always be 1-200,000,000. Designated Bridge ID Displays the ID of the bridge that connects the link or shared LAN to the root. Designated Port ID Displays the ID of the port on the designated bridge that connects the link or the shared LAN to the root. Designated Cost Indicates that the default path cost is assigned according to the method selected on the Spanning Tree Global Settings page. Forward Transitions Indicates the number of times the LAG State has changed from a Forwarding state to a Blocking state. Remain Hops Indicates the hops remaining to the next destination. Web Click Layer 2, Spanning Tree, MSTP, Interface Settings. Define the fields and Click Apply.
Figure 3-99. MSTP Interface Settings Page CLI The following is an example of the MSTP Interface Settings commands.
Console (config) # spanning-tree mst 1 priority 4096 4-551 Console(config)# interface ethernet g1 4-376 Console(config-if)# spanning-tree mst 1 port-priority 144 4-546 Console(config-if) # spanning-tree mst 1 cost 4 4-554
203
Configuring VLANs
In large networks, routers are used to isolate broadcast traffic for each subnet into separate domains. This switch provides a similar service at Layer 2 by using VLANs to organize any group of network nodes into separate broadcast domains. VLANs confine broadcast traffic to the originating group, and can eliminate broadcast storms in large networks. This also provides a more secure and cleaner network environment. An IEEE VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong to the same physical segment. VLANs help to simplify network management by allowing you to move devices to a new VLAN without having to change any physical connections. VLANs can be easily organized to reflect departmental groups (such as Marketing or R&D), usage groups (such as e-mail), or multicast groups (used for multimedia applications such as video conferencing). VLANs provide greater network efficiency by reducing broadcast traffic, and allow you to make network changes without having to update IP addresses or IP subnets. VLANs inherently provide a high level of network security since traffic must pass through a configured Layer 3 link to reach a different VLAN. This switch supports the following VLAN features: Up to 255 VLANs based on the IEEE 802.1Q standard Distributed VLAN learning across multiple switches using explicit or implicit tagging and GVRP protocol Port overlapping, allowing a port to participate in multiple VLANs End stations can belong to multiple VLANs Passing traffic between VLAN-aware and VLAN-unaware devices Priority tagging
204
Configuring VLANs
VLAN Classification When the switch receives a frame, it classifies the frame in one of two ways. If the frame is untagged, the switch assigns the frame to an associated VLAN (based on the default VLAN ID of the receiving port). But if the frame is tagged, the switch uses the tagged VLAN ID to identify the port broadcast domain of the frame. Port Overlapping Port overlapping can be used to allow access to commonly shared network resources among different VLAN groups, such as file servers or printers. Untagged VLANs Untagged (or static) VLANs are typically used to reduce broadcast traffic and to increase security. A group of network users assigned to a VLAN form a broadcast domain that is separate from other VLANs configured on the switch. Packets are forwarded only between ports that are designated for the same VLAN. Untagged VLANs can be used to manually isolate user groups or subnets. However, you should use IEEE 802.3 tagged VLANs with GVRP whenever possible to fully automate VLAN registration. Automatic VLAN Registration GVRP (GARP VLAN Registration Protocol) defines a system whereby the switch can automatically learn the VLANs to which each end station should be assigned. If an end station (or its network adapter) supports the IEEE VLAN protocol, it can be configured to broadcast a message to your network indicating the VLAN groups it wants to join. When this switch receives these messages, it will automatically place the receiving port in the specified VLANs, and then forward the message to all other ports. When the message arrives at another switch that supports GVRP, it will also place the receiving port in the specified VLANs, and pass the message on to all other ports. VLAN requirements are propagated in this way throughout the network. This allows GVRP-compliant devices to be automatically configured for VLAN groups based solely on endstation requests. To implement GVRP in a network, first add the host devices to the required VLANs (using the operating system or other application software), so that these VLANs can be propagated onto the network. For both the edge switches attached directly to these hosts, and core switches in the network, enable GVRP on the links between these devices. You should also determine security boundaries in the network and disable GVRP on the boundary ports to prevent advertisements from being propagated, or forbid those ports from joining restricted VLANs.
205
Note: If you have host devices that do not support GVRP, you should configure static or
untagged VLANs for the switch ports connected to these devices. But you can still enable GVRP on these edge switches, as well as on the core switches in the network.
Tagged/Untagged VLANs
If you want to create a small port-based VLAN for devices attached directly to a single switch, you can assign ports to the same untagged VLAN. However, to participate in a VLAN group that crosses several switches, you should create a VLAN for that group and enable tagging on all ports. Ports can be assigned to multiple tagged or untagged VLANs. Each port on the switch is therefore capable of passing tagged or untagged frames. When forwarding a frame from this switch along a path that contains any VLAN-aware devices, the switch should include VLAN tags. When forwarding a frame from this switch along a path that does not contain any VLAN-aware devices (including the destination host), the switch must first strip off the VLAN tag before forwarding the frame. When the switch receives a tagged frame, it will pass this frame onto the VLAN(s) indicated by the frame tag. However, when this switch receives an untagged frame from a VLAN-unaware device, it first decides where to forward the frame, and then inserts a VLAN tag reflecting the ingress ports default VID.
206
Configuring VLANs
Web Click Layer 2, VLAN, VLAN, Basic Information.
Figure 3-100. VLAN Basic Information Page CLI The following is an example of the VLAN Basic Information CLI commands:
Console# 4-682
show vlan
Name ------default VLAN0010 VLAN0011 VLAN0020 VLAN0021 VLAN0030 VLAN0031 VLAN0011 Guest VLAN
Authorization -----------Required Required Required Required Required Required Required Not Required -
1/e1-e2 1/e17
static guest
207
information about VLAN groups used on this switch to external network devices, you must specify a VLAN ID for each of these groups. The Current Table Page contains parameters for defining VLAN groups: Command Attributes Unit No. Indicates the stacking member for which the Current Table information is displayed. VLAN ID Displays the user-defined VLAN ID. VLAN Name Displays the name of the VLAN. VLAN Type Indicates the VLAN type. The possible field values are: Dynamic The VLAN was dynamically created through GARP. Static The VLAN is user-defined. Default The VLAN is the default VLAN. Port/LAG Indicates the port or LAG membership status of the VLAN. The possible values are: Untagged (Brown) Indicates the interface is an untagged VLAN member. Packets forwarded by the interface are untagged. Tagged (Red) Indicates the interface is a tagged member of a VLAN. All packets forwarded by the interface are tagged. The packets contain VLAN information. Exclude (Gray) Excludes the interface from the VLAN. However, the interface can be added to the VLAN through GARP. Forbidden (Purple) Denies the interface VLAN membership, even if GARP indicates the port is to be added. Web Click Layer 2, VLAN, VLAN, Current Table. Define the VLAN ID, VLAN Name, and VLAN type fields. and define the port settings, and click Apply.
208
Configuring VLANs
Figure 3-101. Current Table Page CLI The following is an example of the CLI commands used to create VLANs:
Console(config)# vlan database Console(config-vlan)# vlan 1972 Console(config-if)# exit Console(config)# interface vlan 19 Console(config-if)# name Marketing Console(config-if)# exit Console(config)# interface ethernet 1/e16 Console(config-if)# Console(config-if)# Console(config-if)# Console(config-if)# switchport switchport switchport switchport
mode general 4-668 general allowed vlan add 2,5-6 tagged 4-672 general pvid 234 4-673 forbidden vlan add 234-256 4-676
console(config-if)# switchport mode general console(config-if)# switchport g allowed vlan add 2 console(config-if)# switch port g console(config)# interface ethernet 1/e21 console(config-if)# switchport trunk allowed vlan re 2 console(config-if)# switchport mode access console(config-if)# switchport access vlan 2 console(config-if)#
209
Command Attributes Unit No. Indicates the stacking member for which the interface configuration information is displayed. Interface Displays the port number included in the VLAN. Interface VLAN Mode Displays the port mode. The possible values are: General Indicates the port belongs to VLANs, and each VLAN is user-defined as tagged or untagged (full IEEE802.1q mode). Access Indicates a port belongs to a single untagged VLAN. When a port is in Access mode, the packet types which are accepted on the port cannot be designated. Ingress filtering cannot be enabled or disabled on an access port. Trunk Indicates the port belongs to VLANs in which all ports are tagged, except for one port that can be untagged. Customer Indicates the port belongs to a customer VLAN in which all ports are double tagged. For more information, see Configuring Customer VLANs. Multicast TV VLAN Indicates if a Multicast TV VLAN is enabled on the device. Multicast TV VLANs enable VLANs to receive Multicast TV transmissions from ports that are not Access ports. PVID Assigns a VLAN ID to untagged packets. The possible values are 1-4094. VLAN 4095 is defined as per standard and industry practice as the Discard VLAN. Packets classified to the Discard VLAN are dropped. Frame Type Specifies the packet type accepted on the port. The possible field values are: Admit Tag Only Only tagged packets are accepted on the port. Admit All Both tagged and untagged packets are accepted on the port. Ingress Filtering Indicates whether ingress filtering is enabled on the port. The possible field values are: Enable Enables ingress filtering on the device. Ingress filtering discards packets that are defined to VLANs of which the specific port is not a member. Disable Disables ingress filtering on the device. Reserved VLAN Indicates the VLAN selected by the user to be the reserved VLAN if not in use by the system. Web Click Layer 2, VLAN, VLAN, Interface Configuration. Define the VLAN interface settings and click Apply.
210
Configuring VLANs
Figure 3-102. Interface Configuration Page CLI The following is an example of the VLAN interface configuration :
Console(config)# interface ethernet 1/e16 4-376 Console(config-if)# switchport general ingress-filtering disable 4-674 Console(config-if)# switchport general acceptable-frame-type tagged-only 4-675 Console(config)# interface ethernet 1/e19 4-376 Console(config-if)# switchport access multicast-tv vlan 20 4-687
211
Figure 3-103. Customer Multicast TV VLAN Page CLI The following is an example of the Customer Multicast TV VLAN CLI commands:
Console(config-if)# switchport customer multicast-tv vlan add 20 4-627
212
Unchecked Maintains all CPE VLAN to Multicast VLAN mappings. Web Click Layer 2, VLAN, CPE VLAN Mapping, click Add, define the fields, and click Apply.
Figure 3-104. CPE VLANs Mapping Page CLI The following is an example of the Mapping CPE VLANs CLI commands:
Console(config)# ip igmp snooping map cpe vlan 3 multicast-tv vlan 20 4-628
213
Command Attributes MAC Address Defines the MAC address assigned to the VLAN group. Prefix Defines the MAC addresss prefix. The possible field range is 0-32. Group ID Defines the MAC based VLAN ID. The possible field range is 1 2147483647. Remove If checked, deletes the MAC-Based VLAN Group. Web Click Layer 2, VLAN, VLAN Groups, MAC-based VLAN Groups. Define the fields and click Apply.
Figure 3-105. MAC-Based Groups Page CLI The following is an example of the CLI commands used to create MAC Based VLAN groups:
console(config)# vlan database 4-662 console(config-vlan)# map mac 00:08:78:32:98:78 9 macs-group 1 interface ethernet e17 4-376
214
Remove If checked, deletes the Subnet-Based VLAN Group. Web Click Layer 2, VLAN, VLAN Groups, Subnet-based Groups. Define the fields and click Apply.
Figure 3-106. Subnet-Based Groups Page CLI The following is an example of the CLI commands used to create IP Based VLAN groups:
console(config)# vlan database console(config-vlan)# map protocol ethernet protocols-group 2000 4-662 4-666
215
Figure 3-107. Protocol Based Groups Page CLI The following is an example of the CLI commands used to create Protocol Based VLAN groups:
console(config)# vlan console(config-vlan)# console(config-vlan)# console(config-vlan)# database map protocol protocols-group switchport general map protocols-group vlan show vlan protocols-groups 4-662 4-666 4-667 4-688
216
Group ID Defines the protocol group ID to which the interface is added. VLAN ID Attaches the interface to a user-defined VLAN ID. VLAN group ports can either be attached to a VLAN ID or a VLAN name. The possible field range is 1-4093, and 4095 (4094 is not available for configuration). Remove If checked, removes the VLAN Group mapping. Web Click Layer 2, VLAN, VLAN Groups, Mapping Groups to VLAN. Define the fields and click Apply.
Figure 3-108. Mapping Groups to VLAN Page CLI The following is an example of the CLI commands used to map interfaces to VLAN groups:
Console(config)# switchport general map macs-group vlan Console(config)# switchport general map subnets-group vlan 4-677 4-679
Defining GARP
Generic Attribute Registration Protocol (GARP) protocol is a general-purpose protocol that registers any network connectivity or membership-style information. GARP defines a set of devices interested in a given network attribute, such as VLAN or multicast address. When configuring GARP, ensure the following: The leave time must be greater than or equal to three times the join time. The leave-all time must be greater than the leave time. Set the same GARP timer values on all Layer 2-connected devices. If the GARP timers are set differently on the Layer 2-connected devices, the GARP application does not operate successfully. The GARP Configuration Page contains parameters for defining network attributes such as VLAN or multicast addresses.
217
Command Attributes Copy from Entry Number Indicates the row number from which GARP parameters are copied. To Entry Number Indicates the row number to which GARP parameters are copied. Interface Displays the port or LAG on which GARP is enabled. Join Timer Indicates the amount of time, in centiseconds, that PDUs are transmitted. The default value is 20 centiseconds. Leave Timer Indicates the amount of time lapse, in centiseconds, that the device waits before leaving its GARP state. Leave time is activated by a Leave All Time message sent/received, and cancelled by the Join message received. Leave time must be greater than or equal to three times the join time. The default value is 60 centiseconds. Leave All Timer Indicates the amount of time lapse, in centiseconds, that all device waits before leaving the GARP state. The leave all time must be greater than the leave time. The default value is 1000 centiseconds. Web Click Layer 2, VLAN, GARP. Enable or disable GARP, and click Apply.
Figure 3-109. GARP Configuration Page CLI The following is an example of the GARP configuration commands:
Console(config)# interface ethernet 1/e6 4-376 Console(config-if)# garp timer leave 900 4-401
218
Defining GVRP
GARP VLAN Registration Protocol (GVRP) defines a way for switches to exchange VLAN information in order to register VLAN members on ports across the network. VLANs are dynamically configured based on join messages issued by host devices and propagated throughout the network. GVRP must be enabled to permit automatic VLAN registration, and to support VLANs which extend beyond the local switch (Default: Disabled). The GVRP Parameters Page is divided into port and LAG parameters. The field definitions are the same. Command Attributes GVRP Global Status Indicates if GVRP is enabled on the device. The possible field values are: Enable Enables GVRP on the selected device. Disable Disables GVRP on the selected device. Unit No. Indicates the stacking member for which the Multiple Hosts information is displayed. Interface Displays the port on which GVRP is enabled. The possible field values are: Port Indicates the port number on which GVRP is enabled. LAG Indicates the LAG number on which GVRP is enabled. GVRP State Indicates if GVRP is enabled on the port. The possible field values are: Enabled Enables GVRP on the selected port. Disabled Disables GVRP on the selected port. Dynamic VLAN Creation Indicates if Dynamic VLAN creation is enabled on the interface. The possible field values are: Enabled Enables Dynamic VLAN creation on the interface. Disabled Disables Dynamic VLAN creation on the interface. GVRP Registration Indicates if VLAN registration through GVRP is enabled on the device. The possible field values are: Enabled Enables GVRP registration on the device. Disabled Disables GVRP registration on the device. Global System LAGs Displays the same field information as the ports, but represent the LAG RSTP. Web Click Layer 2, VLAN, VLAN, GVRP Parameters, define the fields, and click
219
Apply.
Figure 3-110. GVRP Parameters Page CLI The following is an example of the GVRP configuration commands:
Console(config)# gvrp enable 4-399 Console(config)# interface ethernet 1/e6 4-376 Console(config-if)# gvrp enable 4-399 Console(config-if)# gvrp vlan-creation-forbid 4-402 Console(config-if)# gvrp registration-forbid 4-402
220
No RefreshIndicates that the GVRP statistics are not refreshed. Join EmptyDisplays the device GVRP Join Empty statistics. EmptyDisplays the device GVRP Empty statistics. Leave EmptyDisplays the device GVRP Leave Empty statistics. Join InDisplays the device GVRP Join In statistics. Leave InDisplays the device GVRP Leave in statistics. Leave AllDisplays the device GVRP Leave all statistics. Invalid Protocol IDDisplays the device GVRP Invalid Protocol ID statistics. Invalid Attribute TypeDisplays the device GVRP Invalid Attribute ID statistics. Invalid Attribute ValueDisplays the device GVRP Invalid Attribute Value statistics. Invalid Attribute LengthDisplays the device GVRP Invalid Attribute Length statistics. Invalid EventDisplays the device GVRP Invalid Event statistics. Web Click Layer 2, VLAN, VLAN, GVRP Statistics. Enable or disable GVRP, define the fields, and click Apply.
Figure 3-111. GVRP Statistics Page CLI The following is an example of the GVRP statistics commands:
Console# 4-405
GVRP Statistics:
221
3
Legend: rJE :
Join Empty Received Empty Received Leave Empty Received Join Empty Sent Empty Sent Leave Empty Sent rJE rJIn rEmp rLIn rLE
Join In Received Leave In Received Leave All Received Join In Sent Leave In Sent Leave All Sent sJIn sEmp sLIn sLE sLA
222
Multicast Filtering
Multicast Filtering
Multicasting is used to support real-time applications such as video conferencing or streaming audio. A multicast server does not have to establish a separate connection with each client. It merely broadcasts its service to the network, and any hosts that want to receive the multicast register with their local multicast switch or router. Although this approach reduces the network overhead required by a multicast server, the broadcast traffic must be carefully pruned at every multicast switch/router it passes through to ensure that traffic is only passed on to the hosts which subscribed to this service. This section contains information for configuring Multicast forwarding and Multicast TV, and includes the following sections: Defining IGMP Snooping Specifying Static Interfaces for a Multicast Group Displaying Interfaces Attached to a Multicast Router Configuring Multicast TV Defining Multicast TV Membership
223
VLAN-level Parameters VLAN ID VLAN number of the VLAN on which IGMP is enabled. IGMP Snooping Status Indicates if IGMP snooping is enabled on the VLAN. When enabled the switch will monitors network traffic to determine which hosts want to receive multicast traffic. This is also referred to as IGMP Snooping. (Default: Disperformance, so multicast packets will only be forwarded to those ports containing multicast group hosts or multicast routers/switches, instead of flooding traffic to all ports in the subnet (VLAN). The possible field values are: Enable Enables IGMP Snooping on the VLAN. Disable Disables IGMP Snooping on the VLAN. IGMP Querier Status Indicates if the specific VLAN can operate as an IGMP Querier. The possible field values are: Enable Enables IGMP Querying on the VLAN. Disable Disables IGMP Querying on the VLAN. IGMP Querier Version Indicates the version of IGMP in the VLAN. The possible values are: IGMPv2 Version 2 of the IGMP protocol. IGMPv3 The latest version of the IGMP protocol. Querier IP Address IP address of the interface which serves as the querier on the VLAN. Source IP address Defines the interface source IP address from which queries are sent. Auto Learn Indicates if Auto Learn is enabled on the device. If Auto Learn is enabled, the device automatically learns where other Multicast groups are located. Enables or disables Auto Learn on the Ethernet device. The possible field values are: Enable Enables auto learn Disable Disables auto learn. MRouter Timeout Indicates the amount of the time the Multicast router waits to receive a message before it times out. The default value is 300 seconds. Host Timeout Indicates the amount of time host waits to receive a message before timing out. The default time is 260 seconds. Leave Timeout Indicates the amount of time the host waits, after requesting to leave the IGMP group and not receiving a Join message from another station, before timing out. If a Leave Timeout occurs, the switch notifies the Multicast device to stop sending traffic. The Leave Timeout value is either user-defined, or an immediate leave value. The default timeout is 10 seconds. Web Click Layer 2, Multicast, IGMP Snooping. Adjust the IGMP settings as required, and then click Apply. (The default settings are shown below.)
224
Multicast Filtering
Figure 3-112. IGMP Snooping Page CLI The following is an example of the IGMP CLI commands:
console(config)# bridge multicast filtering 4-315 console(config)# ip igmp snooping 4-408
225
Figure 3-113. Multicast Group Page CLI The following is an example of the Multicast Group CLI commands:
Console(config-if)# bridge multicast address 0100.5e02.0203 add ethernet 1/e11,1/e12 4-316 Console(config-if)# end 4-657 Console# show bridge multicast address-table 4-327
Vlan ----
Type -----
Ports ----------
226
Multicast Filtering
1 19 19
Vlan ---1 19
Command Attributes VLAN ID DIsplays the VLAN for which Multicast parameters are displayed. Ports Ports that can be added to a Multicast service. LAGs LAGs that can be added to a Multicast service. Web Click Layer 2, Multicast, Bridge Multicast, Multicast Forward All. Select the required VLAN ID from the scroll-down list to display the associated multicast routers.
227
Figure 3-114. Multicast Forward All Page CLI The following is an example of the Multicast Forward All CLI commands:
Console (config)# interface vlan 1 4-664 Console (config-if)# bridge multicast forward-all add ethernet 1/e3 4-319
Configuring Multicast TV
Multicast TV allows subscribers to join the same Multicast stream, even if the subscribers are not members of the same VLAN, eliminating television traffic duplication. Ports which receive Multicast Transmissions, or Receiver Ports, can be defined in any VLAN, and not just in the Multicast VLAN. Receiver ports can only receive Multicast transmissions, they cannot initiate a Multicast TV transmission. Multicast TV source ports must be a Multicast VLAN members. IGMP messages are used to indicate which ports are requesting to join or leave the Multicast group. The IGMP Snooping Mapping Page allows network managers to map IGMP snooping to VLANs. Command Attributes VLAN Defines the VLAN attached to the for which the IGMP Snooping mapping is defined. Multicast Group Defines the Multicast group IP addressed mapped to the VLAN. Remove Removes Multicast TV IGMP mappings. The possible field values are:
228
Multicast Filtering
Checked Removes the specific IGMP mapping from the selected VLAN. Unchecked Maintains the IGMP mapping. Web Click Layer 2, Multicast, Multicast TV, IGMP Snooping Mapping, click Add, define the fields, and click Apply.
Figure 3-115. IGMP Snooping Mapping Page CLI The following is an example of the Multicast Forward All CLI commands:
console(config)# interface ethernet 1/e21 console(config-if)# switchport access multicast-tv vlan VLAN_ID VLAN ID of the Multicast TV VLAN console(config-if)# switchport access multicast-tv vlan 2 console(config-if)# ec % Unrecognized command console(config-if)# ex console(config)# IP igmp snooping multicast-tv vlan vlan console(config)# IP igmp snooping multicast-tv vlan VLAN_ID VLAN ID value console(config)# IP igmp snooping multicast-tv vlan 2 add add IP multicast address to multicast-tv vlan remove remove IP multicast address from multicast-tv vlan console(config)# IP igmp snooping multicast-tv vlan 2 add A.B.C.D IP multicast address console(config)# IP igmp snooping multicast-tv vlan 2 add 224.2.2.2 count Configure multiple contiguous multicast IP address <cr> console(config)# IP igmp snooping multicast-tv vlan 2 add 224.2.2.2 console(config)#
229
Note: Ports and trunks are assigned to Multicast VLAN in the Interface Configuration
Page.
Command Attributes Multicast TV VLAN ID Indicates the Multicast VLAN ID to which the source ports and receiver ports are members. Receiver Ports Indicates the port on which Multicast TV transmissions are received. Transceiver Ports Indicates the source port from which the Multicast TV transmission originates. The source port is learned through the IGMP messages. Web Click Layer 2, Multicast, Multicast TV, Multicast TV Membership, click Add, define the fields, and click Apply.
Figure 3-116. Multicast TV Membership Page CLI The following is an example of the Multicast TV Membership CLI commands:
console(config)# switchport customer vlan 4-627 Console# show vlan multicast-tv vlan 1000 4-690 10
Source ports Receiver Ports ------------- ----------------------------------------1/8, 1/9 2/1-18, 3/1-18, 4/1-18
230
Technology. Triple Plays services catapult networking into the next generation of IT services by combining cable television, VoIP, and high speed internet connections via a single cable. Triple Play service ensure that Layer 2 isolation between subscribers remains intact. Service provider packets sent to the subscriber arrive from the following VLAN types: Subscriber VLANs Multicast TV VLANs Each subscriber on a network maintains a Customer Premise Equipment Multi-Connect (CPE MUX) box. The MUX boxes directs network traffic from uplink ports to MUX access ports. MUX access ports are based on VLAN tags located in packet headers. Service providers packets are tagged twice. Each packet has an internal tag and an external tag. The external tag indicates if the packet arrived from a Multicast TV VLAN or from a subscribers VLAN. The internal tag indicates the port within the VLAN to which the packet is addressed. The VLAN tag identifies: The media service type, including: Internet TV Phone The service provider.
231
CoS provides varying Layer 2 traffic services. CoS refers to classification of traffic to traffic-classes, which are handled as an aggregate whole, with no per-flow settings. CoS is usually related to the 802.1p service that classifies flows according to their Layer 2 priority, as set in the VLAN header. QoS refers to Layer 2 traffic and above. QoS handles per-flow settings, even within a single traffic class. The QoS facility involves the following elements: Access Control Lists (ACLs) Used to decide which traffic is allowed to enter the system, and which is to be dropped. Only traffic that meets this criteria are subject to CoS or QoS settings. ACLs are used in QoS and network security. Traffic Classification Classifies each incoming packet as belonging to a given traffic class, based on the packet contents and/or the context. Assignment to Hardware Queues Assigns incoming packets to forwarding queues. Packets are sent to a particular queue for handling as a function of the traffic class to which they belong, as defined by the classification mechanism. Traffic Class-Handling Attributes Applies QoS/CoS mechanisms to different classes, including: Bandwidth Management Shaping/ Rate Limiting Policing
232
management traffic, such as telnet, HTTP, or SNMP that is directed to the router itself. Two types of ACLs are defined: IP ACL Applies only to IP packets. All classification fields are related to IP packets. MAC ACL Applies to any packet, including non-IP packets. Classification fields are based only on Layer 2. There are two ways to apply ACLs to an interface: Policy In this form, ACLs are grouped together into a more complex structure, called a policy. The policy can contain both ACLs and QoS rules. The user can apply the policy to an interface (see Advanced QoS Mode). Simple In the simple form, a single (MAC or IP) ACL is applied to an interface. Although a policy cannot be applied to an interface, it is possible to apply basic QoS rules that classify packets to output queues (see Basic QoS Mode).
Mapping to Queues
Queues are used in both Basic and Advanced QoS modes. Default settings are applied to maps in Service QoS mode. A Trust Behavior can be selected, or the output service fields can be selected, including: VLAN Priority Tags (VPT) VPTs are mapped to an output queues based on the VPT. While queue mapping is user-configurable, the VPT default mapping to the output queue is as follows. In the VPT default mapping, Queue 2 has the lowest priority. The following table contains the VPT to Queue default settings:
Table 3-5. VPT Default Mapping Table VPT Value 0 1 2 3 4 5 6 7 Queue Number 2 1 1 2 3 3 4 4
2. Packets may egress with a different VLAN Priority Tag than the one with
which they ingressed. A different tag may be applied to the packets. If no QoS mode is configured, then the VPT for tagged packets remains unchanged. For untagged traffic, a VPT is assigned. When VPT trust mode is configured, untagged packets are mapped to the default port VPT.
233
Default CoS Packets arriving untagged are assigned to a default VPT, which can be set by the user on a per port basis. Once the VPT is assigned, the packet is treated as if it had arrived with this tag. The VPT mapping to the output queue is based on the same user-defined 802.1p tag-based definitions. DSCP The user can configure the system to use the IP DSCP of the incoming packet to the output priority queues. The mapping of the IP DSCP to priority queue is set on a per system basis. If this mode is active, a non-IP packet is always classified to the best effort queue. The default mapping is shown in the following table:
Table 3-6. DSCP Default Mapping Table DSCP Value 0-15 16-31 32-47 48-64 Queue Number q1 (Lowest Priority) q2 q3 q4
All network traffic which is not assigned a DSCP value is forwarded with Best Effort service. After packets are assigned to a specific queue, using the chosen classification method various services can be applied. Scheduling for output queues can be configured, including: Strict priority. Weighted Round Robin (WRR) Scheduling schemes are specified per system. For each interface or queue, the following output shaping can also be configured: Committed Information Rate (CIR)
QoS Modes
The device supports the following QoS modes: Basic QoS Mode Advanced QoS Mode Note: When moving to and from basic and advanced QoS modes, some settings may be
lost.
234
have a Forward action are assigned to the output queue, based on the specified classification. By properly configuring the output queues, the following basic mode services can be set: Minimum Delay The queue is assigned to a strict priority policy, and traffic is assigned to the highest priority queue. Best Effort Traffic is assigned to the lowest priority queue Bandwidth Assignments Bandwidths are assigned by configuring the WRR scheduling scheme.
Enabling QoS
The CoS Mode Page contains fields for enabling or disabling QoS. Command Attributes CoS/QoS Mode Indicates if QoS is enabled on the device. The possible values are: Basic Enables QoS on the interface. Disable Disables QoS on the interface. Advanced Enables QoS Advanced mode on the interface. Copy from Entry Number Copies the port QoS information from the selected port. To Entry Number Indicates the port to which the port QoS information is copied. Unit No./LAG Select whether the displayed information refers to one of the stacked member devices (Unit No.) or to a LAG. Interface Displays the interface for which the global QoS parameters are defined. Port Selects the port for which the global QoS parameters are defined. LAG Selects the LAG for which the global QoS parameters are defined.
235
Default CoS Determines the default CoS value for incoming packets for which a VLAN tag is not defined. The possible field values are 0-7. The default CoS is 0. Restore Defaults Restores the factory QoS default settings to the selected port. Checked Restores the factory QoS default settings to the ports. Unchecked Maintains the current QoS settings. Web Click Policy, General QoS, General, CoS Mode, define the fields, and click Apply.
Figure 3-117. CoS Mode Page CLI The following is an example of the CLI commands used to enable QoS:
Console(config)# 4-468
qos
236
WRR Weight Assigns WRR weights to queues. This field shows the wrr weight assigned to the queue. This field can not be modified. % of WRR Bandwidth Indicates the amount of bandwidth assigned to the QoS queue. Web Click Policy, General QoS, General, Queue Priority. Define the fields, and click Apply.
Figure 3-118. Queue Priority Page CLI The following is an example of the CLI commands used to enable QoS:
console(config)# priority-queue out num-of-queues 4 4-482
237
Port Indicates the port for which the bandwidth settings are displayed. LAG Indicates the LAG for which the bandwidth settings are displayed. Ingress Rate Limit Indicates the traffic limit for ingress interfaces. The possible field values are: Status Enables or Disables rate limiting for ingress interfaces. Disable is the default value. Rate Limit Defines the rate limit for ingress ports. The possible field values are: Interface FE GE Rate 70 Kbps - 1 Gbps, depending on the maximum port speed. 3.5 Mbps - 1 Gbps, depending on the maximum port speed.
Egress Shaping Rates Indicates the traffic shaping type, if enabled, for egress ports. The possible field values are: CIR Defines Committed Information Rate (CIR) as the queue shaping type. The possible field values are: Interface FE GE Rate 0-62.5 Mbps 64 Kbps - 1 Gbps
CbS Defines Committed Burst Size (CbS) as the queue shaping type. CbS is supported only on GE interfaces. The possible field values are 4 Kbps 16 Mbps.
238
Web Click Policy, General QoS, Bandwidth Configuration. Define the fields, and click Apply.
Figure 3-119. Bandwidth Configuration Page CLI The following is an example of the CLI commands used to configure traffic shaping:
Console(config)# interface ethernet 1/e5 4-376 Console(config-if) traffic-shape 124000 96000 4-483
239
240
Figure 3-121. CoS to Queue Page CLI The following is an example of the CLI commands used to map CoS values to forwarding queues:
Console(config)# wrr-queue cos-map 2 7 4-481
241
Figure 3-122. DSCP Priority Page CLI The following is an example of the CLI commands used to map DSCP values to queues:
Console(config)# qos map dscp-queue 33 40 41 4-488
to 1
242
Figure 3-123. QoS General Page CLI The following is an example of the CLI commands used to configure QoS Basic Modes general parameters:
Console(config)# qos trust dscp 4-489
243
Figure 3-124. DSCP Rewrite Page CLI The following is an example of the CLI commands used to rewrite DSCP values:
Console(config)# 4-491
qos dscp-mutation
244
Figure 3-125. DSCP Mapping Page CLI The following is an example of the CLI commands used to map DSCP values:
Console(config)# qos map dscp-mutation 1 2 4 5 6 to 63 4-492
245
click Apply.
Figure 3-126. Class Map Page CLI The following is an example of the CLI commands used to define class maps:
Console(config)# qos advance 4-468 Console(config)#class-map class 4-469 Console(config-cmap)# match access-group royrogers 4-471
Defining Policies
A policy is a collection of classes, each of which is a combination of a class map and a QoS action to apply to matching traffic. Classes are applied in a first-fit manner within a policy. Before configuring policies for classes whose match criteria are defined in a class map, a class map must first be defined, or the name of the policy map to be created, added to, or modified must first be specified. Class policies can be configured in a policy map only if the classes have defined match criteria. An aggregate policer can be applied to multiple classes in the same policy map, but an aggregate policer cannot be used across different policy maps. Define an aggregate policer if the policer is shared with multiple classes. Policers in one port cannot be shared with other policers in another device. Traffic from two different ports can be aggregated for policing purposes.
246
Aggregate Policer User-defined aggregate policers. Ingress Committed Information Rate (CIR) CIR in bits per second. This field is only relevant when the Police value is Single. Ingress Committed Burst Size (CBS) CBS in bytes per second. This field is only relevant when the Police value is Single. Exceed Action Action assigned to incoming packets when limits (CIR) are exceeded. This field is only relevant when the Police value is Single. Possible values are: Drop Drops packets exceeding the defined CIR value. Remark DSCP Remarks packets DSCP values exceeding the defined CIR value. None Forwards packets exceeding the defined CIR value. Remove Removes policies. The possible field values are: Checked Removes the selected policy. Unchecked Maintains the selected policy. Web Click Policy, Advanced Mode, Policy Map, Aggregate Policer. Define the fields and click Apply.
Figure 3-127. Aggregate Policer Page CLI The following is an example of the CLI commands used for defining policy
247
maps:
Console(config)# policy-map policy1 4-472 Console(config-pmap)# class class1 Console(config-pmap-c)# police 124000 9600 exceed-action drop
4-472 4-477
248
Policy Name Contains a list of user-defined policies that can be attached to the interface. Remove Removes policies. Checked Removes the selected policies. Unchecked Maintains the policies.
Figure 3-129. Policy Table Page In addition to the fields in the Policy Table Page, the Add QoS Policy Profile Page contains the following fields: Class Map Selects a class map for the class. Action Indicates the action performed on incoming packets matching the policy profile. The possible field values are: Trust - Applies the selected Trust settings. Set - Redefines the DSCP settings. Police Policer type for the class. Possible values are: Aggregate Configures the class to use a configured aggregate policer selected from the drop-down menu. An aggregate policer is defined if the policer is shared with multiple classes. Traffic from two different ports can be configured for policing purposes. An aggregate policer can be applied to multiple classes in the same policy map, but cannot be used across different policy maps. Single Configures the class to use manually configured information rates and
249
exceed actions. Aggregate Policer User-defined aggregate policers. Ingress Committed Information Rate (CIR) CIR in bits per second. This field is only relevant when the Police value is Single. Ingress Committed Burst Size (CBS) CBS in bytes per second. This field is only relevant when the Police value is Single. Exceed Action Action assigned to incoming packets exceeding the CIR. This field is only relevant when the Police value is Single. Possible values are: Drop Drops packets exceeding the defined CIR value. Remark DSCP Remarks packets DSCP values exceeding the defined CIR value. CLI The following is an example of the CLI commands used to bind policies:
Console# show policy-map 4-474 Policy Map policy1 class class1 set Ip dscp 7 Policy Map policy2 class class 2 police 96000 4800 exceed-action drop class class3 police 124000 96000 exceed-action policed-dscp-transmit
250
Web Click Policy, Advanced Mode, Policy Profile, Policy Binding. Define the fields, and click Apply.
Figure 3-130. Policy Binding Page CLI The following is an example of the CLI commands used to bind policies:
Console# show policy-map 4-474 Policy Map policy1 class class1 set Ip dscp 7 Policy Map policy2 class class 2 police 96000 4800 exceed-action drop class class3 police 124000 96000 exceed-action policed-dscp-transmit
{[A
251
252
Console Connection
To access the switch through the console port, perform these steps: 1. At the console prompt, enter the user name and password. (The default user names are admin and guest with corresponding passwords of admin and guest.) When the administrator user name and password is entered, the CLI displays the Console# prompt and enters privileged access mode (i.e., Privileged Exec). But when the guest user name and password is entered, the CLI displays the Console> prompt and enters normal access mode (i.e., Normal Exec). Enter the necessary commands to complete your desired tasks. When finished, exit the session with the quit or exit command.
2. 3.
After connecting to the system through the console port, the login screen displays:
User Access Verification Username: admin Password: CLI session with the OmniStack 6300 is opened. To end the CLI session, enter [Exit]. Console#
Telnet Connection
Telnet operates over the IP transport protocol. In this environment, your management station and any network device you want to manage over the network must have a valid IP address. Valid IP addresses consist of four numbers, 0 to 255, separated by periods. Each address consists of a network portion and host portion. For example, the IP address assigned to this switch, 10.1.0.1, consists of a network portion (10.1.0) and a host portion (1).
Note: The IP address for this switch is unassigned by default.
253
To access the switch through a Telnet session, you must first set the IP address for the switch, and set the default gateway if you are managing the switch from a different IP subnet. For example,
Console(config)#interface vlan 1 Console(config-if)#ip address 10.1.0.254 255.255.255.0 Console(config-if)#exit Console(config)#ip default-gateway 10.1.0.254
If your corporate network is connected to another network outside your office or to the Internet, you need to apply for a registered IP address. However, if you are attached to an isolated network, then you can use any IP address that matches the network segment to which you are attached. After you configure the switch with an IP address, you can open a Telnet session by performing these steps: 1. 2. 3. 4. From the remote host, enter the Telnet command and the IP address of the device you want to access. At the prompt, enter the user name and system password. Enter the necessary commands to complete your desired tasks. When finished, exit the session with the quit or exit command.
Note: You can open up to four sessions to the device via Telnet.
254
Entering Commands
Entering Commands
This section describes how to enter CLI commands.
To enter commands that require parameters, enter the required parameters after the command keyword. For example, to set a password for the administrator, enter:
Console(config)#username admin password 0 smith
Minimum Abbreviation
The CLI will accept a minimum number of characters that uniquely identify a command. For example, the command configure can be entered as con. If an entry is ambiguous, the system will prompt for further input.
Command Completion
If you terminate input with a Tab key, the CLI will print the remaining characters of a partial keyword up to the point of ambiguity. In the logging history example, typing log followed by a tab will result in printing the command up to logging.
255
Showing Commands
If you enter a ? at the command prompt, the system will display the first level of keywords for the current command class (Normal Exec or Privileged Exec) or configuration class (Global, ACL, Interface, Line, VLAN Database, or MSTP). You can also display a list of valid keywords for a specific command. For example, the command show ? displays a list of possible show commands:
Console#show ? access-group access-list amap bridge-ext calendar class map dns dot1x garp gvrp history hosts interfaces ip lacp line logging mac mac-address-table management map marking policy-map port protocol-vlan public-key pvlan queue radius-server running-config snmp sntp spanning-tree ssh startup-config system tacacs-server users version vlan Console#show Access groups Access lists Show AMAP status Bridge extend information Date information Display class maps DNS information Show 802.1x content Garp property Show GVRP information of interface Information of history Host information Information of interfaces IP information Show lacp statistic TTY line information Show the contents of logging buffers MAC access lists Set configuration of the address table Show management ip filter Map priority Specify marker Display policy maps Characteristics of the port Protocol-vlan information Show information of public key Information of private VLAN Information of priority queue RADIUS server information The system configuration of running SNMP statistics Sntp Specify spanning-tree Secure shell The system configuration of starting up Information of system Login by tacacs server Display information about terminal lines System hardware and software status Switch VLAN Virtual Interface
256
If you terminate a partial keyword with a question mark, alternatives that match the initial letters are provided. (Remember not to leave a space between the command and question mark.) For example s? shows all the keywords starting with s.
Console#show s? snmp sntp system Console# spanning-tree ssh startup-config
* You must be in Privileged Exec mode to access the Global configuration mode. You must be in Global Configuration mode to access any of the other configuration modes.
257
Exec Commands
When you open a new console session on the switch with the user name and password guest, the system enters the Normal Exec command mode (or guest mode), displaying the Console> command prompt. Only a limited number of the commands are available in this mode. You can access all commands only from the Privileged Exec command mode (or administrator mode). To access Privilege Exec mode, open a new console session with the user name and password admin. The system will now display the Console# command prompt. You can also enter Privileged Exec mode from within Normal Exec mode, by entering the enable command, followed by the privileged level password super . To enter Privileged Exec mode, enter the following user names and passwords:
Username: admin Password: [admin login password] CLI session with the OmniStack 6300-24 is opened. To end the CLI session, enter [Exit]. Console# Username: guest Password: [guest login password] CLI session with the OmniStack 6300-24 is opened. To end the CLI session, enter [Exit]. Console#enable Password: [privileged level password] Console#
Configuration Commands
Configuration commands are privileged level commands used to modify switch settings. These commands modify the running configuration only and are not saved when the switch is rebooted. To store the running configuration in non-volatile storage, use the copy running-config startup-config command. The configuration commands are organized into different modes: Global Configuration - These commands modify the system level configuration, and include commands such as hostname and snmp-server community. Access Control List Configuration - These commands are used for packet filtering. Interface Configuration - These commands modify the port configuration such as speed-duplex and negotiation. Line Configuration - These commands modify the console port and Telnet configuration, and include command such as parity and databits. VLAN Configuration - Includes the command to create VLAN groups. Multiple Spanning Tree Configuration - These commands configure settings for the selected multiple spanning tree instance.
258
Entering Commands
To enter the Global Configuration mode, enter the command configure in Privileged Exec mode. The system prompt will change to Console(config)# which gives you access privilege to all Global Configuration commands.
Console#configure Console(config)#
To enter the other modes, at the configuration prompt type one of the following commands. Use the exit or end command to return to the Privileged Exec mode.
Table 4-2. Configuration Command Modes Mode Line Access Control List Command line (console) access-list ip standard access-list ip extended access-list ip mask-precedence access-list mac access-list mac mask-precedence vlan database spanning-tree mst-configuration class-map Prompt Console(config-line)# Console(config-std-acl) Console(config-ext-acl) Console(config-ip-mask-acl) Console(config-mac-acl) Console(config-mac-mask-acl) Console(config-vlan) Console(config-mstp)# Console(config-cmap)#
For example, you can use the following commands to enter interface configuration mode, and then return to Privileged Exec mode
Console(config)#interface ethernet 1/5 . . . Console(config-if)#exit Console(config)#
259
Keystroke Ctrl-F Ctrl-K Ctrl-L Ctrl-N Ctrl-P Ctrl-R Ctrl-U Ctrl-W Esc-B Esc-D Esc-F Delete key or backspace key
Function Shifts cursor to the right one character. Deletes all characters from the cursor to the end of the line. Repeats current command line on a new line. Enters the next command line in the history buffer. Enters the last command. Repeats current command line on a new line. Deletes from the cursor to the beginning of the line. Deletes the last word typed. Moves the cursor back one word. Deletes from the cursor to the end of the word. Moves the cursor forward one word. Erases a mistake when entering a command.
260
Command Groups
Command Groups
The system commands can be broken down into the functional groups shown below.
Table 4-4. Command Groups Command Group 802.1x Commands AAA Commands ACL Commands Address Table Commands LLDP Commands Clock Commands Configuration and Image File Commands Ethernet Configuration Commands GVRP Commands IGMP Snooping Commands LACP Commands Line Commands Management ACL Commands PHY Diagnostics Commands Port Monitor Commands Power over Ethernet Commands QoS Commands RADIUS Commands RMON Commands SNMP Commands Spanning-Tree Commands SSH Commands Syslog Commands Description Configures Port based authentication for authenticating system users on a per-port basis via a external server. Configures connection security including authorization and passwords. Configures and displays ACL information. Configures bridging address tables. Configures AMAP protocol for discovering adjacent switches by sending and receiving AMAP "Hello" packets on active Spanning Tree ports. Configures system time parameters for both the local hardware clock and the external SNTP clock. Manages the device configuration files. Configures all port configuration options for example ports, storm control, port speed and auto-negotiation. Configures and displays GVRP configuration and information. Configures IGMP snooping and displays IGMP configuration and IGMP information. Configures and displays LACP information. Configures the console and remote Telnet connection. Configures and displays management access-list information. Diagnoses and displays the interface status. Page 4-263 4-288 4-300 4-313 4-333 4-348 4-365 4-376 4-399 4-408 4-418 4-431 4-437 4-445 4-451 4-455 4-458 4-460 4-467 4-495 4-503 4-518 4-538 4-580 4-591
Port Channel Commands Configures and displays Port channel information. Monitors activity on specific target ports. Configuring PoE interfaces, including the interface PoE operation status and the interfaces power consumption. Configures and displays QoS information. Configures and displays RADIUS information. Displays RMON statistics. Configures SNMP communities, traps and displays SNMP information. Configures and reports on Spanning Tree protocol. Configures SSH authentication. Manages and displays syslog messages.
261
Command Group System Management Commands TACACS+ Commands Triple Play Commands DHCP Snooping, IP Source Guard and ARP Inspection Commands VLAN Commands Web Server Commands
Description Configures the device clock, name and authorized users. Configures Terminal Access Controller Access Control System (TACACS+) which provides centralized security user access validation. Configures Triple Play. Configures the DHCP Snooping, IP Source Guard, and the ARP Inspection Commands
User Interface Commands Describes user commands used for entering CLI commands. Configures VLANS and displays VLAN information. Configures Web based access to the device.
The access mode shown in the following tables is indicated by these abbreviations: NE (Normal Exec) PE (Privileged Exec) GC (Global Configuration) ACL (Access Control List Configuration) ICE (Interface Configuration Ethernet) ICV (Interface Configuration VLAN) PCC (Policy-Map Class Configuration) SPK (SSH Public Key-string) IC (Interface Configuration) LC (Line Configuration) VC (VLAN Database Configuration) MST (Multiple Spanning Tree) UE (User Exec) CMC (Class-Map Configuration PMC (Policy-Map Configuration)
262
802.1x Commands
802.1x Commands
.
Table 4-5. 802.1x Commands Command aaa authentication dot1x Function Mode Page 4-264 Specifies one or more authentication, authorization, and GC accounting (AAA) methods for use on interfaces running IEEE 802.1X. To return to the default configuration, use the no form of this command
dot1x Enables 802.1x globally. To return to the default configuration, use GC system-auth-control the no form of this command dot1x port-controll Auto - Enables 802.1X authentication on the interface and causes ICE the port to transition to the authorized or unauthorized state based on the 802.1X authentication exchange between the port and the client. Force-authorized - Disables 802.1X authentication on the interface and causes the port to transition to the authorized state without any authentication exchange required. The port resends and receives normal traffic without 802.1X-based authentication of the client. Force-unauthorized -Denies all access through this interface by forcing the port to transition to the unauthorized state and ignoring all attempts by the client to authenticate. The device cannot provide authentication services to the client through the interface. Enables periodic re-authentication of the client. To return to the default configuration, use the no form of this command. ICE
4-265 4-266
dot1x re-authentication dot1x timeout re-authperiod dot1x re-authenticate dot1x timeout quiet-period dot1x timeout tx-period dot1x max-req
Sets the number of seconds between re-authentication attempts. ICE To return to the default configuration, use the no form of this command. Manually initiates a re-authentication of all 802.1X-enabled ports PE or the specified 802.1X-enabled port Sets the number of seconds that the device remains in the quiet ICE state following a failed authentication exchange (for example, the client provided an invalid password). To return to the default configuration, use the no form of this command Sets the number of seconds that the device waits for a response ICE to an Extensible Authentication Protocol (EAP)-request/identity frame from the client before resending the request. To return to the default configuration, use the no form of this command Sets the maximum number of times that the device sends an Extensible Authentication Protocol (EAP)-request/identity frame (assuming that no response is received) to the client, before restarting the authentication process. To return to the default configuration, use the no form of this command Sets the time for the retransmission of an Extensible Authentication Protocol (EAP)-request frame to the client. To return to the default configuration, use the no form of this command ICE
4-270
4-271
ICE
4-272
263
Command dot1x timeout server-timeout show dot1x show dot1x users dot1x auth-not-req
Function Sets the time that the device waits for a response from the authentication server. To return to the default configuration, use the no form of this command Displays the 802.1X status of the device or specified interface Displays active 802.1X authenticated users for the device. Enables unauthorized devices access to the VLAN. To disabled access to the VLAN, use the no form of this command.
show dot1x statistics Displays 802.1X statistics for the specified interface.
dot1x multiple-hosts Enables multiple hosts (clients) on an 802.1X-authorized port, ICE where the authorization state of the port is set to auto. To return to the default configuration, use the no form of this command dot1x Configures the action to be taken, when a station whose MAC single-host-violation address is not the supplicant MAC address, attempts to access the interface. Use the no form of this command to return to default. dot1x guest-vlan dot1x guest-vlan enable dot1x mac-authentication show dot1x advanced ICE
Defines a guest VLAN. To return to the default configuration, use ICV the no form of this command. Enables unauthorized users on the interface access to the Guest ICE VLAN. To disable access, use the no form of this command. Enables authentication based on the stations MAC address Displays 802.1X advanced features for the device or specified interface ICE PE
264
802.1x Commands
Default Setting No authentication method is defined. Command Mode Global Configuration
Command Usage Additional methods of authentication are used only if the previous method returns an error and not if the request for authentication is denied. To ensure that authentication succeeds even if all methods return an error, specify none as the final method in the command line. The RADIUS server must support MD-5 challenge and EAP type frames. Example The following example uses the aaa authentication dot1x default command with no authentication.
Console(config)# aaa authentication dot1x default none
dot1x system-auth-control
The dot1x system-auth-control Global Configuration mode command enables 802.1x globally. To return to the default configuration, use the no form of this command. Syntax
dot1x system-auth-control no dot1x system-auth-control
Default Configuration 802.1x is disabled globally. Command Modes Global Configuration mode Command Usage There are no user guidelines for this command. Examples The following example enables 802.1x globally.
Console(config)# dot1x system-auth-control
265
dot1x timeout re-authperiod dot1x timeout quiet-period dot1x timeout tx-period dot1x max-req dot1x timeout supp-timeout dot1x timeout server-timeout show dot1x show dot1x users
dot1x port-control
The dot1x port-control Interface Configuration mode command enables manually controlling the authorization state of the port. To return to the default configuration, use the no form of this command. Syntax
dot1x port-control {auto | force-authorized | force-unauthorized} no dot1x port-control
Parameters auto Enables 802.1X authentication on the interface and causes the port to transition to the authorized or unauthorized state based on the 802.1X authentication exchange between the port and the client. force-authorized Disables 802.1X authentication on the interface and causes the port to transition to the authorized state without any authentication exchange required. The port resends and receives normal traffic without 802.1X-based authentication of the client. force-unauthorized Denies all access through this interface by forcing the port to transition to the unauthorized state and ignoring all attempts by the client to authenticate. The device cannot provide authentication services to the client through the interface. Default Configuration Port is in the force-authorized state Command Mode Interface Configuration (Ethernet) Command Usage It is recommended to disable spanning tree or to enable spanning-tree PortFast mode on 802.1x edge ports (ports in auto state that are connected to end stations), in order to get immediately to the forwarding state after successful authentication.
266
802.1x Commands
Example The following example enables 802.1X authentication on Ethernet port 1/e16.
Console(config)# interface ethernet 1/e16 Console(config-if)# dot1x port-control auto
Related Commands dot1x re-authentication dot1x timeout re-authperiod dot1x timeout quiet-period dot1x timeout tx-period dot1x max-req dot1x timeout supp-timeout dot1x timeout server-timeout show dot1x show dot1x users
dot1x re-authentication
The dot1x re-authentication Interface Configuration mode command enables periodic re-authentication of the client. To return to the default configuration, use the no form of this command. Syntax
dot1x re-authentication no dot1x re-authentication
Default Setting Periodic re-authentication is disabled. Command Mode Interface Configuration (Ethernet) Command Usage There are no user guidelines for this command. Example The following example enables periodic re-authentication of the client.
Console(config)# interface ethernet 1/e16 Console(config-if)# dot1x re-authentication
267
dot1x timeout re-authperiod dot1x timeout quiet-period dot1x timeout tx-period dot1x max-req dot1x timeout supp-timeout dot1x timeout server-timeout show dot1x show dot1x users
Parameters seconds Number of seconds between re-authentication attempts. (Range: 300 - 4294967295) Default Setting Re-authentication period is 3600 seconds. Command Mode Interface Configuration (Ethernet) mode Command Usage There are no user guidelines for this command. Example The following example sets the number of seconds between re-authentication attempts, to 300.
Console(config)# interface ethernet 1/e16 Console(config-if)# dot1x timeout re-authperiod 300
Related Commands dot1x port-control dot1x re-authentication dot1x timeout quiet-period dot1x timeout tx-period
268
802.1x Commands
dot1x max-req dot1x timeout supp-timeout dot1x timeout-server-timeout show dot1x show dot1x users
dot1x re-authenticate
The dot1x re-authenticate Privileged EXEC mode command manually initiates a re-authentication of all 802.1X-enabled ports or the specified 802.1X-enabled port. Syntax
dot1x re-authenticate [ethernet interface]
Parameters interface Valid Ethernet port. (Full syntax: unit/port) Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following command manually initiates a re-authentication of 802.1X-enabled Ethernet port 1/e16.
Console# dot1x re-authenticate ethernet 1/e16
269
Parameters seconds Specifies the time in seconds that the device remains in the quiet state following a failed authentication exchange with the client. (Range: 0 - 65535 seconds) Default Setting Quiet period is 60 seconds. Command Mode Interface Configuration (Ethernet) mode Command Usage During the quiet period, the device does not accept or initiate authentication requests. The default value of this command should only be changed to adjust for unusual circumstances, such as unreliable links or specific behavioral problems with certain clients and authentication servers. To provide a faster response time to the user, a smaller number than the default value should be entered. Example The following example sets the number of seconds that the device remains in the quiet state following a failed authentication exchange to 3600.
Console(config)# interface ethernet 1/e16 Console(config-if)# dot1x timeout quiet-period 3600
Related Commands dot1x port-control dot1x re-authentication dot1x timeout re-authperiod dot1x timeout tx-period dot1x max-req dot1x timeout supp-timeout dot1x timeout server-timeout show dot1x show dot1x users
270
802.1x Commands
resending the request. To return to the default configuration, use the no form of this command. Syntax
dot1x timeout tx-period seconds no dot1x timeout tx-period
Parameters seconds Specifies the time in seconds that the device waits for a response to an EAP-request/identity frame from the client before resending the request. (Range: 1-65535 seconds) Default Configuration Timeout period is 30 seconds. Command Mode Interface Configuration (Ethernet) mode Command Usage The default value of this command should be changed only to adjust for unusual circumstances, such as unreliable links or specific behavioral problems with certain clients. and authentication servers Example The following command sets the number of seconds that the device waits for a response to an EAP-request/identity frame, to 3600 seconds.
Console(config)# interface ethernet 1/e16 Console(config-if)# dot1x timeout tx-period 3600
Related Commands dot1x port-control dot1x re-authentication dot1x timeout re-authperiod dot1x timeout quiet-period dot1x max-req dot1x timeout supp-timeout dot1x timeout server-timeout show dot1x show dot1x users
dot1x max-req
The dot1x max-req Interface Configuration mode command sets the maximum number of times that the device sends an Extensible Authentication Protocol
271
(EAP)-request/identity frame (assuming that no response is received) to the client, before restarting the authentication process. To return to the default configuration, use the no form of this command. Syntax
dot1x max-req count no dot1x max-req
Parameters count Number of times that the device sends an EAP-request/identity frame before restarting the authentication process. (Range: 1-10) Default Configuration The default number of times is 2. Command Mode Interface Configuration (Ethernet) mode Command Usage The default value of this command should be changed only to adjust for unusual circumstances, such as unreliable links or specific behavioral problems with certain clients. and authentication servers. Example The following example sets the number of times that the device sends an EAP-request/identity frame to 6 .
Console(config)# interface ethernet 1/e16 Console(config-if)# dot1x max-req 6
Related Commands dot1x port-control dot1x re-authentication dot1x timeout re-authperiod dot1x timeout quiet-period dot1x timeout tx-period dot1x timeout supp-timeout dot1x timeout server-timeout show dot1x show dot1x users
272
802.1x Commands
frame to the client. To return to the default configuration, use the no form of this command. Syntax
dot1x timeout supp-timeout seconds no dot1x timeout supp-timeout
Parameters seconds Time in seconds that the device waits for a response to an EAP-request frame from the client before resending the request. (Range: 1- 65535 seconds) Default Configuration Default timeout period is 30 seconds. Command Mode Interface configuration (Ethernet) mode Command Usage The default value of this command should be changed only to adjust for unusual circumstances, such as unreliable links or specific behavioral problems with certain clients. and authentication servers. Example The following example sets the timeout period before retransmitting an EAP-request frame to the client to 3600 seconds.
Console(config-if)# dot1x timeout supp-timeout 3600
Related Commands dot1x port-control dot1x re-authentication dot1x timeout re-authperiod dot1x timeout quiet-period dot1x timeout tx-period dot1x max-req dot1x timeout server-timeout show dot1x show dot1x users
273
Syntax
dot1x timeout server-timeout seconds no dot1x timeout server-timeout
Parameters seconds Time in seconds that the device waits for a response from the authentication server. (Range: 1-65535 seconds) Default Configuration The timeout period is 30 seconds. Command Mode Interface configuration (Ethernet) mode Command Usage The actual timeout can be determined by comparing the dot1x timeout server-timeout value and the result of multiplying the radius-server retransmit value with the radius-server timeout value and selecting the lower of the two values. Example The following example sets the time for the retransmission of packets to the authentication server to 3600 seconds.
Console(config-if)# dot1x timeout server-timeout 3600
Related Commands dot1x port-control dot1x re-authentication dot1x timeout re-authperiod dot1x timeout quiet-period dot1x timeout tx-period dot1x max-req dot1x timeout supp-timeout show dot1x show dot1x users
show dot1x
The show dot1x Privileged EXEC mode command displays the 802.1X status of the device or specified interface. Syntax
show dot1x [ethernet interface]
274
802.1x Commands
Parameters interface Valid Ethernet port. (Full syntax: unit/port) Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the status of 802.1X-enabled Ethernet ports.
Console# show dot1x
802.1x is enabled
Port
Admin Mode
Oper Mode
Reauth Period
Username
----
----------
---------
------
--------
802.1x is enabled.
Port
Admin Mode
Oper Mode
Reaut h Contr ol
Reauth Period
Username
275
----
----------
---------
-----Ena
------
--------
1/e3
Auto
Unauthorized
3600
Clark
Quiet period: 60 Seconds Tx period:30 Seconds Max req: 2 Supplicant timeout: 30 Seconds Server timeout: 30 Seconds Session Time (HH:MM:SS): 08:19:17 MAC Address: 00:08:78:32:98:78 Authentication Method: Remote Termination Cause: Supplicant logoff
276
802.1x Commands
Quiet period
The number of seconds that the device remains in the quiet state following a failed authentication exchange (for example, the client provided an invalid password). The number of seconds that the device waits for a response to an Extensible Authentication Protocol (EAP)-request/identity frame from the client before resending the request. The maximum number of times that the device sends an Extensible Authentication Protocol (EAP)-request frame (assuming that no response is received) to the client before restarting the authentication process. Time in seconds the switch waits for a response to an EAP-request frame from the client before resending the request. Time in seconds the switch waits for a response from the authentication server before resending the request. The amount of time the user is logged in. The supplicant MAC address. The authentication method used to establish the session. The reason for the session termination. The current value of the Authenticator PAE state machine and of the Backend state machine. The number of times the state machine received a Success message from the Authentication Server. The number of times the state machine received a Failure message from the Authentication Server.
Tx period
Max req
Supplicant timeout
Server timeout Session Time MAC address Authentication Method Termination Cause State Authentication success Authentication fails
Related Commands dot1x port-control dot1x re-authentication dot1x timeout re-authperiod dot1x timeout quiet-period dot1x timeout tx-period dot1x max-req dot1x timeout supp-timeout dot1x timeout server-timeout show dot1x users
277
Syntax show dot1x users [username username] Parameters username Supplicant username (Range: 1-160 characters) Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays 802.1X users.
Console# show dot1x users
Por t ---1/ e1 1/ e2
Username
MAC Address
--------
--------------
Bob
0008:3b79:8787
John
08:19:17
None
0008:3b89:3127
Username: Bob Por t ---1/ e1 Username Session Time ----------1d:03:08.58 Auth Method ---------Remote MAC Address
--------
--------------
Bob
0008:3b79:8787
278
802.1x Commands
The following table describes significant fields shown above:
Field Port Username Session Time Authentication Method MAC Address Description The port number. The username representing the identity of the Supplicant. The period of time the Supplicant is connected to the system. Authentication method used by the Supplicant to open the session. MAC address of the Supplicant.
Related Commands dot1x port-control dot1x re-authentication dot1x timeout re-authperiod dot1x timeout quiet-period dot1x timeout tx-period dot1x max-req dot1x timeout supp-timeout dot1x timeout server-timeout show dot1x
Parameters interface Valid Ethernet port. (Full syntax: unit/port) Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command.
279
Example The following example displays 802.1X statistics for the specified interface.
Console# show dot1x statistics ethernet 1/e1
EapolFramesRx: 11 EapolFramesTx: 12 EapolStartFramesRx: 12 EapolLogoffFramesRx: 1 EapolRespIdFramesRx: 3 EapolRespFramesRx: 6 EapolReqIdFramesTx: 3 EapolReqFramesTx: 6 InvalidEapolFramesRx: 0 EapLengthErrorFramesRx: 0 LastEapolFrameVersion: 1 LastEapolFrameSource: 00:08:78:32:98:78
The following table describes the significant fields shown in the display:
Field EapolFramesRx EapolFramesTx EapolStartFramesRx EapolLogoffFramesRx EapolRespIdFramesRx EapolRespFramesRx Description The number of valid EAPOL frames of any type that have been received by this Authenticator. The number of EAPOL frames of any type that have been transmitted by this Authenticator. The number of EAPOL Start frames that have been received by this Authenticator. The number of EAPOL Logoff frames that have been received by this Authenticator. The number of EAP Resp/Id frames that have been received by this Authenticator. The number of valid EAP Response frames (other than Resp/Id frames) that have been received by this Authenticator. The number of EAP Req/Id frames that have been transmitted by this Authenticator. The number of EAP Request frames (other than Rq/Id frames) that have been transmitted by this Authenticator.
EapolReqIdFramesTx EapolReqFramesTx
280
802.1x Commands
InvalidEapolFramesRx
The number of EAPOL frames that have been received by this Authenticator in which the frame type is not recognized. The number of EAPOL frames that have been received by this Authenticator in which the Packet Body Length field is invalid. The protocol version number carried in the most recently received EAPOL frame. The source MAC address carried in the most recently received EAPOL frame.
EapLengthErrorFramesRx
LastEapolFrameVersion LastEapolFrameSource
Related Commands dot1x port-control dot1x re-authentication dot1x timeout re-authperiod dot1x timeout quiet-period dot1x timeout tx-period dot1x max-req dot1x timeout supp-timeout dot1x timeout server-timeout
Default Configuration Access is enabled. Command Mode Interface Configuration (VLAN) mode Command Usage An access port cannot be a member in an unauthenticated VLAN. The native VLAN of a trunk port cannot be an unauthenticated VLAN. For a general port, the PVID can be an unauthenticated VLAN (although only tagged packets would be accepted in the unauthorized state.)
281
Examples The following example enables access to the VLAN to unauthorized devices.
Console(config-if)# dot1x auth-not-req
dot1x multiple-hosts
The dot1x multiple-hosts Interface Configuration mode command enables multiple hosts (clients) on an 802.1X-authorized port, where the authorization state of the port is set to auto. To return to the default configuration, use the no form of this command. Syntax
dot1x multiple-hosts [authentication]] no dot1x multiple-hosts
Parameters authentication Specifies that each station should be 802.1x authenticated. Default Configuration Multiple hosts are disabled. Command Mode Interface Configuration (Ethernet) mode Command Usage This command enables the attachment of multiple clients to a single 802.1X-enabled port. If you use this command without the authentication keyword, only one of the attached hosts must be successfully authorized for all hosts to be granted network access. If the port becomes unauthorized, all attached clients are denied access to the network. If you use this command with the authentication keyword, each host must be successfully authorized in order to grant network access. Please note that packets are NOT encrypted, and after success full authentication filtering is based on the source MAC address only. For unauthenticated VLANs multiple hosts are always enabled. Port security on a port cannot be enabled if the port if multiple hosts are disabled or multiple hosts are enabled with authentication per host.
282
802.1x Commands
Example The following command enables multiple hosts (clients) on an 802.1X-authorized port.
Console(config-if)# dot1x multiple-hosts
Related Commands
dot1x single-host-violation
dot1x single-host-violation
The dot1x single-host-violation Interface Configuration mode command configures the action to be taken, when a station whose MAC address is not the supplicant MAC address, attempts to access the interface. Use the no form of this command to return to default. Syntax
dot1x single-host-violation {forward | discard | discard-shutdown} [trap
seconds]
no port dot1x single-host-violation
Parameters forward Forwards frames with source addresses that are not the supplicant address, but does not learn the source addresses. discard Discards frames with source addresses that are not the supplicant address. discard-shutdown Discards frames with source addresses that are not the supplicant address. The port is also shut down. trap Indicates that SNMP traps are sent. seconds Specifies the minimum amount of time in seconds between consecutive traps. (Range: 1- 1000000) Default Setting Frames with source addresses that are not the supplicant address are discarded. No traps are sent. Command Mode Interface Configuration (Ethernet) mode Command Usage The command is relevant when multiple hosts is disabled and the user has been successfully authenticated.
283
Examples The following example forwards frames with source addresses that are not the supplicant address and sends consecutive traps at intervals of 100 seconds.
Console(config-if)# dot1x single-host-violation forward trap 100
Related Commands
dot1x multiple-hosts
dot1x guest-vlan
The dot1x guest-vlan Interface Configuration mode command defines a guest VLAN. To return to the default configuration, use the no form of this command. Syntax
dot1x guest-vlan no dot1x guest-vlan
Default Setting No VLAN is defined as a guest VLAN. Command Mode Interface Configuration (VLAN) mode Command Usage Use the dot1x guest-vlan enable Interface Configuration mode command to enable unauthorized users on an interface to access the guest VLAN. If the guest VLAN is defined and enabled, the port automatically joins the guest VLAN when the port is unauthorized and leaves it when the port becomes authorized. To be able to join or leave the guest VLAN, the port should not be a static member of the guest VLAN. Example The following example defines VLAN 2 as a guest VLAN.
Console# Console# configure Console(config)# vlan database Console(config-vlan)# vlan 2 Console(config-vlan)# exit Console(config)# interface vlan 2 Console(config-if)# dot1x guest-vlan
284
The dot1x vlans guest-vlan enable Interface Configuration mode command enables unauthorized users on the interface access to the Guest VLAN. To disable access, use the no form of this command Syntax
dot1x guest-vlan enable no dot1x guest-vlan enable
Default Setting Disabled. Command Mode Interface Configuration (Ethernet) mode Command Usage A device can have only one global guest VLAN. The guest VLAN is defined using the dot1x guest-vlan Interface Configuration mode command. Example The following example enables unauthorized users on Ethernet port 1/e1 to access the guest VLAN.
Console# configure Console(config)# interface ethernet 1/e1 Console(config-if)# dot1x guest-vlan enable
dot1x mac-authentication
Use the mac-authentication interface configuration command to enable authentication based on the stations MAC address. Use the no form of this command to disable MAC authentication. Syntax dot1x mac-authentication {mac-only | mac-and-802.1x} no dot1x mac-authentication Parameters mac-only Enable authentication based on the stations MAC address only. 802.1X frames are ignored. mac-and-802.1x Enable 802.1X authentication and MAC address authentication on the interface. Default Disabled.
285
Command Modes Interface configuration (Ethernet) Usage Guidelines Guest VLAN must be enabled when MAC authentication is enabled. Static MAC addresses cannot be authorized on a guest VLAN when MAC authentication is enabled. Do not change an authenticated MAC address to a static address. It is not recommended to delete authenticated MAC addresses. Reauthentication must be enabled when working in this mode. Examples TBA
Parameters interface Valid Ethernet port. (Full syntax: unit/port) Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Examples The following example displays 802.1X advanced features for the device.
Switch# show dot1x advanced
Port
Multiple Hosts
Guest VLAN
---------
--------------
----------
286
802.1x Commands
1/e1 1/e2
Disabled Enabled
Enabled Disabled
MAC-and-802.1x Disabled
Port
Multiple Hosts
Guest VLAN
--------1/e12
-------------Disabled
---------Disabled
Single host parameters Violation action: Discard Trap: Disabled Trap frequency: 10 Status: Not in auto mode Violations since last trap: 9
Related Commands
dot1x auth-not-req dot1x multiple-hosts dot1x single-host-violation dot1x guest-vlan dot1x guest-vlan enable
287
AAA Commands
Table 4-6. AAA Commands Command aaa authentication login aaa authentication enable Function Mode Page 4-288 4-290 4-291 Defines login authentication. To return to the default configuration, GC use the no form of this command. Defines authentication method lists for accessing higher privilege GC levels. To return to the default configuration, use the no form of this command.
login authentication Specifies the login authentication method list for a remote telnet or LC console. To return to the default configuration specified by the aaa authentication login command, use the no form of this command. enable authentication ip http authentication ip https authentication Specifies the authentication method list when accessing a higher LC privilege level from a remote telnet or console. To return to the default configuration specified by the aaa authentication enable command, use the no form of this command. Specifies authentication methods for HTTP server users. To return to the default configuration, use the no form of this command. Specifies authentication methods for HTTPS server users. To return to the default configuration, use the no form of this command. GC GC PE
4-292
show authentication Displays information about the authentication methods. methods password enable password username show users accounts
Specifies a password on a line. To remove the password, use the LC no form of this command. GC Sets a local password to control access to user and privilege levels. To remove the password requirement, use the no form of this command.t Creates a user account in the local database. To remove a user name, use the no form of this command. Displays information about the local user database. GC PE
288
AAA Commands
Parameters default Uses the listed authentication methods that follow this argument as the default list of methods when a user logs in. list-name Character string used to name the list of authentication methods activated when a user logs in. (Range: 1-12 characters). method1 [method2...] Specify at least one from the following table:
Keyword enable line local none radius tacacs Description Uses the enable password for authentication. Uses the line password for authentication. Uses the local username database for authentication. Uses no authentication. Uses the list of all RADIUS servers for authentication. Uses the list of all TACACS+ servers for authentication.
Default Setting The local user database is checked. This has the same effect as the command aaa authentication login list-name local.
Note: On the console, login succeeds without any authentication check if the authentication method is not defined.
Command Mode Global Configuration mode Command Usage The default and optional list names created with the aaa authentication login command are used with the login authentication command. Create a list by entering the aaa authentication login list-name method command for a particular protocol, where list-name is any character string used to name this list. The method argument identifies the list of methods that the authentication algorithm tries, in the given sequence. The additional methods of authentication are used only if the previous method returns an error, not if it fails. To ensure that the authentication succeeds even if all methods return an error, specify none as the final method in the command line. Example The following example configures the authentication login.
Console(config)# aaa authentication login default radius local
enable none
289
Related Commands aaa authentication enable login authentication show authentication methods
Parameters default Uses the listed authentication methods that follow this argument as the default list of methods, when using higher privilege levels. list-name Character string used to name the list of authentication methods activated, when using access higher privilege levels. (Range: 1-12 characters) method1 [method2...] Specify at least one from the following table:
Keyword enable line none radius tacacs Description Uses the enable password for authentication. Uses the line password for authentication. Uses no authentication. Uses the list of all RADIUS servers for authentication. Uses username $enabx$., where x is the privilege level. Uses the list of all TACACS+ servers for authentication. Uses username "$enabx$." where x is the privilege level.
Default Setting If the default list is not set, only the enable password is checked. This has the same effect as the command aaa authentication enable default enable. On the console, the enable password is used if it exists. If no password is set, the process still succeeds. This has the same effect as using the command aaa authentication enable default enable none. Command Mode Global Configuration mode
290
AAA Commands
Command Usage The default and optional list names created with the aaa authentication enable command are used with the enable authentication command. The additional methods of authentication are used only if the previous method returns an error, not if it fails. To ensure that the authentication succeeds even if all methods return an error, specify none as the final method in the command line. All aaa authentication enable default requests sent by the device to a RADIUS or TACACS+ server include the username $enabx$., where x is the requested privilege level. Example The following example sets the enable password for authentication when accessing higher privilege levels.
Console(config)# aaa authentication enable default enable
Related Commands aaa authentication dot1x aaa authentication login login authentication show authentication methods
login authentication
The login authentication Line Configuration mode command specifies the login authentication method list for a remote telnet or console. To return to the default configuration specified by the aaa authentication login command, use the no form of this command. Syntax
login authentication {default | list-name} no login authentication
Parameters default Uses the default list created with the aaa authentication login command. list-name Uses the indicated list created with the aaa authentication login command. Default Setting Uses the default set with the command aaa authentication login. Command Mode Line Configuration mode
291
Command Usage Changing login authentication from default to another value may disconnect the telnet session. Example The following example specifies the default authentication method for a console.
Console(config)# line console Console(config-line)# login authentication default
Related Commands aaa authentication login aaa authentication enable show authentication methods
enable authentication
The enable authentication Line Configuration mode command specifies the authentication method list when accessing a higher privilege level from a remote telnet or console. To return to the default configuration specified by the aaa authentication enable command, use the no form of this command. Syntax
enable authentication {default | list-name} no enable authentication
Parameters default Uses the default list created with the aaa authentication enable command. list-name Uses the indicated list created with the aaa authentication enable command. Default Setting Uses the default set with the aaa authentication enable command. Command Mode Line Configuration mode Command Usage There are no user guidelines for this command. Example The following example specifies the default authentication method when accessing a higher privilege level from a console.
Console(config)# line console Console(config-line)# enable authentication default
292
AAA Commands
Related Commands show authentication methods
ip http authentication
The ip http authentication Global Configuration mode command specifies authentication methods for HTTP server users. To return to the default configuration, use the no form of this command. Syntax
ip http authentication method1 [method2...] no ip http authentication
Parameters method1 [method2...] Specify at least one from the following table:
Keyword local none radius tacacs Description Uses the local username database for authentication. Uses no authentication. Uses the list of all RADIUS servers for authentication. Uses the list of all TACACS+ servers for authentication.
Default Setting The local user database is checked. This has the same effect as the command ip http authentication local. Command Mode Global Configuration mode Command Usage The additional methods of authentication are used only if the previous method returns an error, not if it fails. To ensure that the authentication succeeds even if all methods return an error, specify none as the final method in the command line. Example The following example configures the HTTP authentication.
Console(config)# ip http authentication radius local
293
ip https authentication
The ip https authentication Global Configuration mode command specifies authentication methods for HTTPS server users. To return to the default configuration, use the no form of this command. Syntax
ip https authentication method1 [method2...] no ip https authentication
Parameters method1 [method2...] Specify at least one from the following table:
Keyword local none radius tacacs Source or destination Uses the local username database for authentication. Uses no authentication. Uses the list of all RADIUS servers for authentication. Uses the list of all TACACS+ servers for authentication.
Default Setting The local user database is checked. This has the same effect as the command ip https authentication local. Command Mode Global Configuration mode Command Usage The additional methods of authentication are used only if the previous method returns an error, not if it fails. To ensure that the authentication succeeds even if all methods return an error, specify none as the final method in the command line. Example The following example configures HTTPS authentication.
Console(config)# ip https authentication radius local
294
AAA Commands
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the authentication configuration.
Console# show authentication methods Login Authentication Method Lists --------------------------------Default: Radius, Local, Line Console_Login: Line, None
Enable Authentication Method Lists ---------------------------------Default: Radius, Enable Console_Enable: Enable, None
Line
--------------
-----------------
Related Commands aaa authentication login aaa authentication enable login authentication
295
password
The password Line Configuration mode command specifies a password on a line. To remove the password, use the no form of this command. Syntax
password password [encrypted] no password
Parameters password Password for this level (Range: 1-159 characters). encrypted Encrypted password to be entered, copied from another device configuration. Default Setting No password is defined. Command Mode Line Configuration mode Command Usage If a password is defined as encrypted, the required password length is 32 characters. Example The following example specifies password secret on a console.
Console(config)# line console Console(config-line)# password secret
enable password
The enable password Global Configuration mode command sets a local password to control access to user and privilege levels. To remove the password requirement, use the no form of this command. Syntax
enable password [level level] password [encrypted] no enable password [level level]
296
AAA Commands
level Level for which the password applies. If not specified the level is 15 (Range: 1-15). encrypted Encrypted password entered, copied from another device configuration. Default Setting No enable password is defined. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example sets local level 15 password secret to control access to user and privilege levels.
Console(config)# enable password level 15 secret
username
The username Global Configuration mode command creates a user account in the local database. To remove a user name, use the no form of this command. Syntax
username name [password password] [level level] [encrypted] no username name
Parameters name The name of the user (Range: 1- 20 characters). password The authentication password for the user. (Range: 1-159 characters) level The user level (Range: 1-15). encrypted Encrypted password entered, copied from another device configuration. Default Setting No user is defined. Command Mode Global Configuration mode Command Usage User account can be created without a password.
297
Example The following example configures user bob with password lee and user level 15 to the system.
Console(config)# username bob password lee level 15
Privilege --------1 15
Lockout -------
298
AAA Commands
Lockout
If lockout control is enabled, specifies the number of failed authentication attempts since the user last logged in successfully. If the user account is locked, specifies LOCKOUT.
299
4
.
ACL Commands
Table 4-7. ACL Commands Command ip-access-list permit (ip) deny (IP) mac access-list permit (MAC) deny (MAC) service-acl Function Enables the IP-Access Configuration mode and creates Layer 3 ACLs. To delete an ACL, use the no form of this command. Permits traffic if the conditions defined in the permit statement match. Denies traffic if the conditions defined in the deny statement match. Enables the MAC-Access List Configuration mode and creates Layer 2 ACLs. To delete an ACL, use the no form of this command. Defines permit conditions of an MAC ACL. Denies traffic if the conditions defined in the deny statement match. Mode GC ACL ACL GC ACL ACL Page 4-300 4-301 4-304 4-306 4-307 4-308 4-310
Applies an ACL to the input interface. To detach an ACL from an IC input interface, use the no form of this command. Displays access control lists (ACLs) defined on the device. Displays access lists applied on interfaces. PE PE
4-310 4-311
ip-access-list
The ip-access-list Global Configuration command enables the IP-Access Configuration mode and creates Layer 3 ACLs. To delete an ACL, use the no form of this command. Syntax
ip-access-list name no ip-access-list name
Parameters name Specifies the name of the ACL. Default Setting The default for all ACLs is deny-all. Command Mode Global Configuration mode Command Usage Up to 1018 rules can be defined on the device, depending on the type of rule defined.
300
ACL Commands
Examples The following example shows how to create an IP ACL.
Console(config)# ip-access-list ip-acl1 Console(config-ip-al)#
Related Commands permit (ip) deny (IP) show access-lists service-acl match
permit (ip)
The permit IP-Access List Configuration mode command permits traffic if the conditions defined in the permit statement match. Syntax
permit {any | protocol} {any | {source source-wildcard}} {any | {destination destination-wildcard}} [dscp dscp number | ip-precedence ip-precedence] permit-icmp {any | {source source-wildcard}} {any | {destination destination-wildcard}} {any | icmp-type} {any | icmp-code} [dscp number | ip-precedence number] permit-igmp {any | {source source-wildcard}} {any | {destination destination-wildcard}} {any | igmp-type} [dscp number | ip-precedence number] permit-tcp {any | { source source-wildcard}} {any | source-port} {any |{ destination destination-wildcard}} {any | destination-port} [dscp number | ip-precedence number] [flags list-of-flags] permit-udp {any | { source source-wildcard}} {any | source-port} {any | {destination destination-wildcard}} {any | destination-port} [dscp number | ip-precedence number]
Parameters source Specifies the source IP address of the packet. Specify any to indicate IP address 0.0.0.0 and mask 255.255.255.255. source-wildcard Specifies wildcard to be applied to the source IP address. Use 1s in bit positions to be ignored. Specify any to indicate IP address 0.0.0.0 and mask 255.255.255.255. destination Specifies the destination IP address of the packet. Specify any to indicate IP address 0.0.0.0 and mask 255.255.255.255. destination-wildcard Specifies wildcard to be applied to the destination IP address. Use 1s in bit positions to be ignored. . Specify any to indicate IP address 0.0.0.0 and mask 255.255.255.255.
301
protocol Specifies the abbreviated name or number of an IP protocol. (Range: 0-255) The following table lists protocols that can be specified:
IP Protocol Internet Control Message Protocol Internet Group Management Protocol IP in IP (encapsulation) Protocol Transmission Control Protocol Exterior Gateway Protocol Interior Gateway Protocol User Datagram Protocol Host Monitoring Protocol Reliable Data Protocol Inter-Domain Policy Routing Protocol Inter-Domain Routing Protocol Reservation Protocol General Routing Encapsulation Encapsulating Security Payload (50) Authentication Header EIGRP routing protocol Open Shortest Path Protocol Protocol Independent Multicast Layer Two Tunneling Protocol ISIS over IPv4 (any IP protocol) Abbreviated Name icmp igmp ipinip tcp egp igp udp hmp rdp idpr idrp rsvp gre esp ah eigrp ospf pim l2tp isis any Protocol Number 1 2 4 6 8 9 17 20 27 35 45 46 47 50 51 88 89 103 115 124 (25504)
dscp Indicates matching the dscp number with the packet dscp value. ip-precedence Indicates matching ip-precedence with the packet ip-precedence value. icmp-type Specifies an ICMP message type for filtering ICMP packets. Enter a value or one of the following values: echo-reply, destination-unreachable, source-quench, redirect, alternate-host-address, echo-request, router-advertisement, router-solicitation, time-exceeded, parameter-problem, timestamp,
302
ACL Commands
timestamp-reply, information-request, information-reply,address-mask-request, address-mask-reply, traceroute, datagram-conversion-error, mobile-host-redirect, mobile-registration-request, mobile-registration-reply, domain-name-request, domain-name-reply, skip and photuris.
(Range: 0-255) icmp-code Specifies an ICMP message code for filtering ICMP packets. ICMP packets that are filtered by ICMP message type can also be filtered by the ICMP message code. (Range: 0-255) igmp-type IGMP packets can be filtered by IGMP message type. Enter a number or one of the following values: dvmrp, host-query, host-report, pim or trace, host-report-v2, host-leave-v2, host-report-v3 (Range: 0-255) destination-port Specifies the UDP/TCP destination port. (Range: 0-65535) source-port Specifies the UDP/TCP source port. (Range: 0-65535) list-of-flags Specifies a list of TCP flags that can be triggered. If a flag is set, it is prefixed by +. If a flag is not set, it is prefixed by -. Possible values: +urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack, -psh, -rst, -syn and -fin. The flags are concatenated into one string. For example: +fin-ack. Default Setting No IPv4 ACL is defined. Command Mode IP-Access List Configuration mode Command Usage Use the ip-access-list Global Configuration mode command to enable the IP-Access List Configuration mode. Before an Access Control Element (ACE) is added to an ACL, all packets are permitted. After an ACE is added, an implied deny-any-any condition exists at the end of the list and those packets that do not match the conditions defined in the permit statement are denied. Examples The following example shows how to define a permit statement for an IP ACL.
Console(config)# ip-access-list ip-acl1 Console(config-ip-al)# permit rsvp 192.1.1.1 0.0.0.0 any dscp 56
303
deny (IP)
The deny IP-Access List Configuration mode command denies traffic if the conditions defined in the deny statement match. Syntax
deny [disable-port] {any | protocol} {any | {source source-wildcard}} {any | {destination destination-wildcard}} [dscp dscp number | ip-precedence ip-precedence] [in-port port-num | out-port port-num]
deny-icmp [disable-port] {any|{source source-wildcard}} {any|{destination destination-wildcard}} {any|icmp-type} {any|icmp-code} [dscp number | ip-precedence number] deny-igmp [disable-port] {any|{source source-wildcard}} {any|{destination destination-wildcard}} {any|igmp-type} [dscp number | ip-precedence number] deny-tcp [disable-port] {any|{ source source-wildcard}} {any|source-port} {any|{ destination destination-wildcard}} {any|destination-port} [dscp number | ip-precedence number] [flags list-of-flags] deny-udp [disable-port] {any|{ source source-wildcard}} {any| source-port} {any|{destination destination-wildcard}} {any|destination-port} [dscp number | ip-precedence number] Parameters disable-port Specifies the ethernet interface is disabled if the condition is matched. source Specifies the IP address or host name from which the packet was sent. Specify any to indicate IP address 0.0.0.0 and mask 255.255.255.255. source-wildcard (Optional for the first type) Specifies wildcard bits by placing 1s in bit positions to be ignored. Specify any to indicate IP address 0.0.0.0 and mask 255.255.255.255. destination Specifies the IP address or host name to which the packet is being sent. Specify any to indicate IP address 0.0.0.0 and mask 255.255.255.255. destination-wildcard (Optional for the first type) Specifies wildcard bits by placing 1s in bit positions to be ignored. Specify any to indicate IP address 0.0.0.0 and mask 255.255.255.255. protocol Specifies the abbreviated name or number of an IP protocol. in-port port-num (Optional) Specifies the output port of the devise. In case of egress classification this port will be devise input port. out-port port-num (Optional) Specifies the input port of the devise. dscp number Specifies the DSCP value. ip-precedence number Specifies the IP precedence value. fragments Displays the set of conditions would be applied only to noninitial fragments. icmp-type Specifies an ICMP message type for filtering ICMP packets.
304
ACL Commands
Enter a number or one of the following values: echo-reply, destination-unreachable, source-quench, redirect, alternate-host-address, echo-request, router-advertisement, router-solicitation, time-exceeded, parameter-problem, timestamp, timestamp-reply, information-request, information-reply, address-mask-request, address-mask-reply, traceroute, datagram-conversion-error, mobile-host-redirect, mobile-registration-request, mobile-registration-reply, domain-name-request, domain-name-reply, skip, photuris. icmp-code Specifies an ICMP message code for filtering ICMP packets. igmp-type IGMP packets can be filtered by IGMP message type. Enter a number or one of the following values: host-query, host-report, dvmrp, pim, cisco-trace, host-report-v2, host-leave-v2, host-report-v3. destination-port Specifies the UDP/TCP destination port. source-port Specifies the UDP/TCP source port. flags list-of-flags List of TCP flags that should occur. If a flag should be set it is prefixed by "+".If a flag should be unset it is prefixed by "-". Avaiable options are +urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack, -psh, -rst, -syn and -fin. The flags are concatenated to a one string. For example: +fin-ack. The following table lists protocols that can be specified:
IP Protocol Internet Control Message Protocol Internet Group Management Protocol IP in IP (encapsulation) Protocol Transmission Control Protocol Exterior Gateway Protocol Interior Gateway Protocol User Datagram Protocol Host Monitoring Protocol Reliable Data Protocol Inter-Domain Policy Routing Protocol Inter-Domain Routing Protocol Reservation Protocol General Routing Encapsulation Encapsulating Security Payload (50) Authentication Header EIGRP routing protocol Abbreviated Name icmp igmp ip tcp egp igp udp hmp rdp idpr idrp rsvp gre esp ah eigrp Protocol Number 1 2 4 6 8 9 17 20 27 35 45 46 47 50 51 88
305
IP Protocol Open Shortest Path Protocol Protocol Independent Multicast Layer Two Tunneling Protocol ISIS over IPv4 (any IP protocol)
Default Setting This command has no default configuration Command Mode IP-Access List Configuration mode Command Usage Use the ip-access-list Global Configuration mode command to enable the IP-Access List Configuration mode. Before an Access Control Element (ACE) is added to an ACL, all packets are permitted. After an ACE is added, an implied deny-any-any condition exists at the end of the list and those packets that do not match the defined conditions are denied. Examples The following example shows how to define a permit statement for an IP ACL.
Console(config)# ip-access-list ip-acl1 Console(config-ip-al)# deny rsvp 192.1.1.1 0.0.0.255 any
mac access-list
The mac access-list Global Configuration mode command enables the MAC-Access List Configuration mode and creates Layer 2 ACLs. To delete an ACL, use the no form of this command. Syntax
mac access-list name no mac access-list name
306
ACL Commands
Parameters name Specifies the name of the ACL. Default Setting The default for all ACLs is deny all. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example shows how to create a MAC ACL.
Console(config)# mac access-list macl-acl1 Console(config-mac-al)#
Related Commands permit (MAC) deny (MAC) show access-lists service-acl match
permit (MAC)
The permit MAC-Access List Configuration mode command defines permit conditions of an MAC ACL. Syntax
permit {any | {host source source-wildcard} any | {destination destination-wildcard}} [vlan vlan-id] [cos cos cos-wildcard] [ethtype eth-type] [inner-vlan vlan-id]
Parameters source Specifies the source MAC address of the packet. source-wildcard Specifies wildcard bits to be applied to the source MAC address. Use 1s in bit positions to be ignored. destination Specifies the MAC address of the host to which the packet is being sent. destination-wildcard Specifies wildcard bits to be applied to the destination MAC address. Use 1s in bit positions to be ignored. vlan-id Specifies the ID of the packet vlan. (Range: 0-4095) cos Specifies the Class of Service (CoS) for the packet. (Range: 0-7) cos-wildcard Specifies wildcard bits to be applied to the CoS. eth-type Specifies the Ethernet type of the packet.(Range: 0-0xFFFF)
307
Default Setting No MAC ACL is defined. Command Mode MAC-Access List Configuration mode Command Usage Before an Access Control Element (ACE) is added to an ACL, all packets are permitted. After an ACE is added, an implied deny-any-any condition exists at the end of the list and those packets that do not match the conditions defined in the permit statement are denied. If the VLAN ID is specified, the policy map cannot be connected to the VLAN interface. The inner-vlan field can be assigned only on: Fast Ethernet customer interfaces (the port mode is customer). Service provider interfaces when ALL the traffic is double tagged. Example The following example shows how to create a MAC ACL with permit rules.
Console(config)# mac access-list macl-acl1 Console(config-mac-al)# permit 6:6:6:6:6:6 0:0:0:0:0:0 any vlan 6
deny (MAC)
The deny MAC-Access List Configuration mode command denies traffic if the conditions defined in the deny statement match.
deny destination deny [disable-port] {any | {source source-wildcard} {any | {destination destination- wildcard}}[vlan vlan-id] [cos cos cos-wildcard] [ethtype eth-type] [inner-vlan vlan id]
Parameters disable-port Indicates that the port is disabled if the statement is deny. source Specifies the MAC address of the host from which the packet was sent. source-wildcard (Optional for the first type) Specifies wildcard bits by placing 1s in bit positions to be ignored. destination Specifies the MAC address of the host to which the packet is
308
ACL Commands
being sent. destination-wildcard (Optional for the first type) Specifies wildcard bits by placing 1s in bit positions to be ignored. vlan-id Specifies the ID of the packet vlan. (Range: 0-4095). cos Specifies the packetss Class of Service (CoS) (Range: 0-7). cos-wildcard Specifies wildcard bits to be applied to the CoS. eth-type Specifies the packets Ethernet type (Range: 0-0xFFFF). inner-vlan vlan id The inner VLAN ID of a double tagged packet. Default Setting This command has no default configuration. Command Mode MAC-Access List Configuration mode Command Usage MAC BPDU packets cannot be denied. This command defines an Access Control Element (ACE). An ACE can only be removed by deleting the ACL, using the no mac access-list Global Configuration mode command. Alternatively, the Web-based interface can be used to delete ACEs from an ACL. The inner-vlan field can be assigned only on: Fast Ethernet customer interfaces (the port mode is customer). Service provider interfaces when ALL the traffic is double tagged. Use the following user guidelines: Before an Access Control Element (ACE) is added to an ACL, all packets are permitted. After an ACE is added, an implied deny-any-any condition exists at the end of the list and those packets that do not match the conditions defined in the permit statement are denied. If the VLAN ID is specified, the policy map cannot be connected to the VLAN interface. Example The following example shows how to create a MAC ACL with deny rules on a device.
Console(config)# mac access-list macl1 Console (config-mac-acl)# deny 6:6:6:6:6:6:0:0:0:0:0:0 any
309
service-acl
The service-acl Interface Configuration mode command applies an ACL to the input interface. To detach an ACL from an input interface, use the no form of this command. Syntax
service-acl {input acl-name} no service-acl {input}
Parameters acl-name Specifies the ACL to be applied to the input interface. Default Setting This command has no default configuration. Command Mode Interface (Ethernet, port-channel) Configuration mode. Command Usage In advanced mode, when an ACL is bound to an interface, the port trust mode is set to trust L2-L3 and not to L2. Example The following example, binds (services) an ACL to port 1/e16.
Console(config)# interface ethernet 1/e16 Console(config-if)# service-acl input macl1
show access-lists
The show access-lists Privileged EXEC mode command displays access control lists (ACLs) defined on the device. Syntax
show access-lists [name]
Parameters name Name of the ACL. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command.
310
ACL Commands
Examples The following example displays access lists on a device.
Console# show access-lists IP access list ACL1 permit ip host 172.30.40.1 any permit rsvp host 172.30.8.8 any
Related Commands ip-access-list permit (ip) deny (IP) mac access-list permit (MAC) deny (MAC)
port-channel-number] Parameters interface Valid Ethernet port. (Full syntax: unit/port). port-channel-number Valid port-channel number. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays ACLs applied to the interfaces of a device:
Console# show interfaces access-lists
311
312
Enables forwarding all multicast packets on a port. To restore the ICV default configuration, use the no form of this command. Forbids a port to be a forward-all-multicast port. To restore the default configuration, use the no form of this command. Sets the address table aging time. To restore the default configuration, use the no form of this command. Removes any learned entries from the forwarding database. Locks the port, thereby, blocking unknown traffic and preventing the port from learning new addresses. To return to the default configuration, use the no form of this command. Configures the port security mode. To return to the default configuration, use the no form of this command. Configures the maximum number of addresses that can be learned on the port while the port is in port security mode. To return to the default configuration, use the no form of this command. Adds a MAC-layer secure address to a routed port. Use the no form of this command to delete a MAC address. Displays all entries in the bridge-forwarding database. ICV GC PE IC IC IC
IC PE PE PE UE
show bridge Displays statically created entries in the bridge-forwarding address-table static database. show bridge Displays the number of addresses present in the Forwarding address-table countt Database. show bridge multicast address-tablet Displays bridge multicast address table information
313
Command
Function
Mode UE UE PE PE
show bridge Displays the statically configured multicast addresses. multicast address-table statict show bridge multicast filtering show ports security show ports security addresses Displays the multicast filtering configuration. Displays the port-lock status. Displays the current dynamic addresses in locked ports.
bridge address
The bridge address Interface Configuration (VLAN) mode command adds a MAC-layer station source address to the bridge table. To delete the MAC address, use the no form of this command. Syntax
bridge address mac-address {ethernet interface | port-channel port-channel-number} [permanent | delete-on-reset | delete-on-timeout | secure] no bridge address [mac-address]
Parameters mac-address A valid MAC address. interface A valid Ethernet port. port-channel-number A valid port-channel number. permanent The address can only be deleted by the no bridge address command. delete-on-reset The address is deleted after reset. delete-on-timeout The address is deleted after "age out" time has expired. secure The address is deleted after the port changes mode to unlock learning (no port security command). This parameter is only available when the port is in the learning locked mode. Default Setting No static addresses are defined. The default mode for an added address is permanent. Command Mode Interface Configuration (VLAN) mode Command Usage Using the no form of the command without specifying a MAC address deletes all static MAC addresses belonging to this VLAN).
314
Example The following example adds a permanent static MAC-layer station source address 3aa2.64b3.a245 on port 1/e16 to the bridge table.
Console(config)# interface vlan 2 Console(config-if)# bridge address 3aa2.64b3.a245 ethernet 1/e16
permanent
Related Commands clear bridge show bridge address-table static show bridge address-table count
Default Setting Filtering multicast addresses is disabled. All multicast addresses are flooded to all ports. Command Mode Global Configuration mode Command Usage If multicast devices exist on the VLAN, do not change the unregistered multicast addresses state to drop on the switch ports. If multicast devices exist on the VLAN and IGMP-snooping is not enabled, the
bridge multicast forward-all command should be used to enable forwarding all
multicast packets to the multicast switches. Example In this example, bridge multicast filtering is enabled.
Console(config)# bridge multicast filtering
Related Commands bridge multicast address bridge multicast forbidden address bridge multicast forward-all
315
Parameters add Adds ports to the group. If no option is specified, this is the default option. remove Removes ports from the group. mac-multicast-address A valid MAC multicast address. interface-list Separate nonconsecutive Ethernet ports with a comma and no spaces; a hyphen is used to designate a range of ports. port-channel-number-list Separate nonconsecutive port-channels with a comma and no spaces; a hyphen is used to designate a range of ports. Default Setting No multicast addresses are defined. Command Mode Interface configuration (VLAN) mode Command Usage If the command is executed without add or remove, the command only registers the group in the bridge database. Static multicast addresses can only be defined on static VLANs. Examples The following example registers the MAC address:
Console(config)# interface vlan 8 Console(config-if)# bridge multicast address 01:00:5e:02:02:03
The following example registers the MAC address and adds ports statically.
Console(config)# interface vlan 8 Console(config-if)# bridge multicast address 01:00:5e:02:02:03 add ethernet 1/e1-e9, 2/e2
316
Parameters add Adds ports to the group. remove Removes ports from the group. mac-multicast-address A valid MAC multicast address. interface-list Separate nonconsecutive Ethernet ports with a comma and no spaces; hyphen is used to designate a range of ports. port-channel-number-list Separate nonconsecutive valid port-channels with a comma and no spaces; a hyphen is used to designate a range of port-channels. Default Setting No forbidden addresses are defined. Command Modes Interface Configuration (VLAN) mode Command Usage Before defining forbidden ports, the multicast group should be registered. Examples In this example, MAC address 0100.5e02.0203 is forbidden on port 2/e9 within VLAN 8.
Console(config)# interface vlan 8 Console(config-if)# bridge multicast address 0100.5e.02.0203 Console(config-if)# bridge multicast forbidden address 0100.5e02.0203 add ethernet 2/e9
317
bridge multicast address bridge multicast forward-all bridge multicast forbidden forward-all show bridge multicast filtering
Parameters add Force forwarding all multicast packets. remove Do not force forwarding all multicast packets. interface-list Separate nonconsecutive Ethernet ports with a comma and no spaces; a hyphen is used to designate a range of ports. port-channel-number-list Separate nonconsecutive port-channels with a comma and no spaces; a hyphen is used to designate a range of port-channels. Default Setting This setting is disabled. Command Mode Interface Configuration (VLAN) mode Command Usage There are no user guidelines for this command. Example In this example, all multicast packets on port 1/e8 are forwarded.
Console(config)# interface vlan 2 Console(config-if)# bridge multicast forward-all add ethernet 1/e8
Related Commands bridge multicast filtering bridge multicast address bridge multicast forbidden address bridge multicast forbidden forward-all show bridge multicast filtering
318
bridge multicast forbidden forward-all {add | remove} {ethernet interface-list | port-channel port-channel-number-list} no bridge multicast forbidden forward-all
Parameters add Forbids forwarding all multicast packets. remove Does not forbid forwarding all multicast packets. interface-list Separates nonconsecutive Ethernet ports with a comma and no spaces; a hyphen is used to designate a range of ports. port-channel-number-list Separates nonconsecutive port-channels with a comma and no spaces; a hyphen is used to designate a range of port-channels. Default Setting This setting is disabled. Command Mode Interface Configuration (VLAN) mode Command Usage IGMP snooping dynamically discovers multicast device ports. When a multicast device port is discovered, all the multicast packets are forwarded to it unconditionally. This command prevents a port from becoming a multicast device port. Example In this example, forwarding all multicast packets to 1/e1 with VLAN 2 is forbidden.
Console(config)# interface vlan 2 Console(config-if)# bridge multicast forbidden forward-all add ethernet 1/e1
Related Commands bridge multicast filtering bridge multicast address bridge multicast forbidden address bridge multicast forward-all show bridge multicast filtering
319
bridge aging-time
The bridge aging-time Global Configuration mode command sets the address table aging time. To restore the default configuration, use the no form of this command. Syntax
bridge aging-time seconds no bridge aging-time
Parameters seconds Time in seconds. (Range: 10-630 seconds) Default Setting The default is 300 seconds. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example In this example the bridge aging time is set to 250.
Console(config)# bridge aging-time 250
clear bridge
The clear bridge Privileged EXEC mode command removes any learned entries from the forwarding database. Syntax
clear bridge
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example In this example, the bridge tables are cleared.
Console# clear bridge
320
port security
The port security Interface Configuration mode command locks the port, thereby, blocking unknown traffic and preventing the port from learning new addresses. To return to the default configuration, use the no form of this command. Syntax
port security [forward | discard | discard-shutdown] [trap seconds] no port security
Parameters forward Forwards packets with unlearned source addresses, but does not learn the address. discard Discards packets with unlearned source addresses. This is the default if no option is indicated. discard-shutdown Discards packets with unlearned source addresses. The port is also shut down. seconds Sends SNMP traps and defines the minimum amount of time in seconds between consecutive traps. (Range: 1-1000000) Default Setting This setting is disabled. Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage Port must be set to dot1x multiple-hosts in order to perform Port Security. Example In this example, port 1/e1 forwards all packets without learning addresses of packets from unknown sources and sends traps every 100 seconds if a packet with an unknown source address is received.
Console(config)# interface ethernet 1/e1 Console(config-if)# port security forward trap 100
321
Syntax
port security mode {lock | mac-addresses} no port security mode
Parameters lock Saves the current dynamic MAC addresses associated with the port and disables learning, relearning and aging. mac-addresses Deletes the current dynamic MAC addresses associated with the port and learns up to the maximum number addresses allowed on the port. Relearning and aging are enabled. Default Setting This setting is disabled. Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage There are no user guidelines for this command. Example In this example, port security mode is set to dynamic for Ethernet interface 1/e7.
Console(config)# interface ethernet 1/e7 Console(config-if)# port security mac-addresses
Parameters max-addr Maximum number of addresses that can be learned by the port. (Range: 1-128) Default Setting The default is 1 address.
322
Parameters mac-address A valid MAC address. Default Setting No addresses are defined. Command Mode Interface Configuration (Ethernet, port-channel) mode. Cannot be configured for a range of interfaces (range context). Command Usage The command enables adding secure MAC addresses to a routed port in port security mode. The command is available when the port is a routed port and in port security mode. The address is deleted if the port exits the security mode or is not a routed port.
323
Example In this example, the MAC-layer address 66:66:66:66:66:66 is added to port 1/e1.
Console(config)# interface ethernet 1/e1 Console(config-if)# port security routed secure-address 66:66:66:66:66:66
port-channel-number] Parameters vlan Specifies a valid VLAN, such as VLAN 1. interface A valid Ethernet port. port-channel-number A valid port-channel number. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage Internal usage VLANs (VLANs that are automatically allocated on ports with a defined Layer 3 interface) are presented in the VLAN column by a port number and not by a VLAN ID. "Special" MAC addresses that were not statically defined or dynamically learned are displayed in the MAC address table. This includes, for example, MAC addresses defined in ACLS. Example In this example, all classes of entries in the bridge-forwarding database are displayed.
Console# show bridge address-table
interface
mac address
Port
Type
324
--------1 1 200
port-channel-number] Parameters vlan Specifies a valid VLAN, such as VLAN 1. interface A valid Ethernet port. port-channel-number A valid port-channel number. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example In this example, all static entries in the bridge-forwarding database are displayed.
Console# show bridge address-table static
325
Parameters vlan Specifies a valid VLAN, such as VLAN 1. interface A valid Ethernet port. port-channel-number A valid port-channel number. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example In this example, the number of addresses present in all VLANs are displayed.
Console# show bridge address-table count
326
show bridge multicast address-table [vlan vlan-id] [address mac-multicast-address | ip-multicast-address] [format ip | format mac] [source
ip address] Parameters vlan-id A valid VLAN ID value. mac-multicast-address A valid MAC multicast address. ip-multicast-address A valid IP multicast address. format ip|mac Multicast address format. This is relevant only f the bridging mode is mac group. Can be ip or mac. If the format is unspecified, the default is mac. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage A MAC address can be displayed in IP format only if it is in the range of 0100.5e00.0000-0100.5e7f.ffff. Example In this example, multicast MAC address and IP address table information is displayed.
Console# show bridge multicast address-table format ip
Vlan ---1 1 19 19
Vlan
IP/MAC Address
Ports
327
---1 19
----------------224-239.130|2.2.3 224-239.130|2.2.8
-----2/e8 2/e8
show bridge multicast address-table static [vlan vlan-id] [address mac-multicast-address | ip-multicast-address] [source ip-address]
Parameters vlan-id Indicates the VLAN ID. This has to be a valid VLAN ID value. mac-multicast-address A valid MAC multicast address. ip-multicast-address A valid IP multicast address. ip-address Source IP address. Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines A MAC address can be displayed in IP format only if it's in the range 0100.5e00.0000 through 0100.5e7f.ffff.
328
MAC-GROUP table
Vlan ---1
Type ------static
Vlan ----
Ports -----
Parameters vlan-id VLAN ID value. Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command.
329
Port
--------Forbidden Forward -
Related Commands bridge multicast filtering bridge multicast forbidden address bridge multicast forward-all bridge multicast forbidden forward-all
Parameters interface A valid Ethernet port. port-channel-number A valid port-channel number. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command.
330
Maximum ------3 28 8
Frequency --------100 -
port-channel-number] Parameters interface A valid Ethernet port. port-channel-number A valid port-channel number
331
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example In this example, dynamic addresses in currently locked ports are displayed.
Console# show ports security addresses
Current ------0
Maximum ------1 1 1
Port is a member in port-channel ch1 Disabled Enabled Enabled Enabled Lock Max-addresses Max-addresses Max-addresses 0 0 0 1 10 50 128
In this example, dynamic addresses in currently locked port 1/e1 are displayed.
Console# show ports security addresses ethernet 1/e1
Port ---1/e1
Status -------Disabled
Learning -------Lock
Current -------
Maximum ------1
332
LLDP Commands
LLDP Commands
Table 4-9. LLDP Commands Command lldp optional-tlv lldp med enable lldp med network-policy (global) lldp med network-policy (interface) lldp med location Function To specify which optional TLVs from the basic set should be transmitted, use the lldp optional-tlv command in interface configuration mode. Mode ICE Page 4-333 4-334 4-334 4-335 4-335
To enable Link Layer Discovery Protocol (LLDP) Media Endpoint ICE Discovery (MED) on an interface, use the lldp med enable command in interface configuration mode. To define LLDP MED network policy, use the lldp med network-policy command in global configuration mode. GC
To attach an LLDP MED network policy to a port, use the lldp med ICE network-policy command in interface configuration mode. To configure location information for the Link Layer Discovery Protocol (LLDP) Media Endpoint Discovery (MED) for an interface, use the lldp med location command in interface configuration mode. ICE
clear lldp rx show lldp configuration show lldp med configuration show lldp local
To restart the LLDP RX state machine and clearing the neighbors PE table To display the Link Layer Discovery Protocol (LLDP) configuration. PE
To display the Link Layer Discovery Protocol (LLDP) Media PE Endpoint Discovery (MED) configuration, use the show lldp med configuration command in privileged EXEC mode. To display the Link Layer Discovery Protocol (LLDP) information PE that is advertised from a specific port, use the show lldp local command in privileged EXEC mode. PE
show lldp neighbors To display information about neighboring devices discovered using Link Layer Discovery Protocol (LLDP), use the show lldp neighbors command in privileged EXEC mode.
lldp optional-tlv
The lldp optional-tlv Interface Configuration (Ethernet) mode command specifies which optional TLVs from the basic set should be transmitted. To revert to the default setting, use the no form of this command. Syntax lldp optional-tlv tlv1 [tlv2 tlv5] no lldp optional-tlv Parameters tlv Specifies TLV that should be included. Available optional TLVs are:
333
Default Configuration No optional TLV is transmitted. Command Mode Interface Configuration (Ethernet) mode User Guidelines There are no guidelines for this command.
334
LLDP Commands
application defined for this network policy. Available application names are: voice, voice-signaling, guest-voice, guest-voice-signaling, softphone-voice, video-conferencing, streaming-video, video-signaling. vlan id VLAN identifier for the application. vlan-type Specifies if the application is using a 'tagged' or an 'untagged' VLAN. up priority User Priority (Layer 2 priority) to be used for the specified application. dscp value DSCP value to be used for the specified application.
Default Configuration No network policy is defined. Command Mode Global Configuration mode User Guidelines Use the lldp med network-policy interface configuration command to attach a network policy to a port.
335
Syntax lldp med location coordinate data no lldp med location coordinate
lldp med location ecs-elin data no lldp med location ecs-elin Parameters coordinate Displays the location is specified as coordinates. civic-address Displays the location is specified as civic address. ecs-elin Displays the location is specified as ECS ELIN. data Displays the data format is as defined in ANSI/TIA 1057. Specifies the location as dotted hexadecimal data: Each byte in hexadecimal character strings is two hexadecimal digits. Each byte can be separated by a period or colon. For coordinated: 16. For civic address: 6 - 160 hexadecimal digits . For ECS ELIN: 10 - 25 hexadecimal digits. Default Configuration The location is not configured. Command Mode Interface Configuration (Ethernet) mode User Guidelines There are no guidelines for this command.
clear lldp rx
The clear lldp rx Privileged EXEC mode command restarts the LLDP RX state machine and clearing the neighbors table. Syntax clear lldp rx [ethernet interface] Parameters interface Ethernet port Command Mode Privileged EXEC User Guidelines There are no guidelines for this command.
336
The show lldp configuration Privileged EXEC mode command displays the Link Layer Discovery Protocol (LLDP) configuration. Syntax show lldp configuration [ethernet interface] Parameters interface Ethernet port Command Mode Privileged EXEC User Guidelines There are no guidelines for this command.
Switch# show lldp med configuration Network policy 1 ------------------Application type: Voice VLAN ID: 2 tagged Layer 2 priority: 0 DSCP: 0
337
Command Line Interface Capabilities Network Policy ---------Yes Yes Yes ---------Yes Yes No Location ---------Yes Yes No PoE ---------Yes Yes Yes
Port ---------1/1
Location ---------Yes
PoE ---------Yes
Network Policies: 1
338
LLDP Commands
Example
Switch# show lldp local ethernet 1/1 Device ID: 0060.704C.73FF Port ID: 1 Capabilities: Bridge System Name: ts-7800-1 System description: Port description: Management address: 172.16.1.8 802.3 MAC/PHY Configuration/Status Auto-negotiation support: Supported Auto-negotiation status: Enabled Auto-negotiation Advertised Capabilities: 100BASE-TX full duplex, 1000BASE-T full duplex Operational MAU type: 1000BaseTFD LLDP-MED capabilities: Network Policy, Location Identification LLDP-MED Device type: Network Connectivity LLDP-MED Network policy Application type: Voice Flags: Tagged VLAN VLAN ID: 2 Layer 2 priority: 0 DSCP: 0 LLDP-MED Power over Ethernet Device Type: Power Sourcing Entity Power source: Primary Power Source Power priority: High Power value: 9.6 Watts
340
LLDP Commands
Example
Switch# show lldp neighbors
Port
Device ID Port ID
---------- ---------- ---------- ---------- ---------- ---------1/1 1/1 1/2 1/3 0060.704C. 1 73F E 0060.704C. 1 73FD 0060.704C. 9 73F C 0060.704C. 1 73FB 117 93 1 92 B B B, R W ts-7800-2 ts-7800-2 ts-7900-1 ts-7900-2
341
Switch# show lldp neighbors ethernet 1/1 Device ID: 0060.704C.73FE Port ID: 1 Hold Time: 117 Capabilities: B System Name: ts-7800-2 System description: Port description: Management address: 172.16.1.1 802.3 MAC/PHY Configuration/Status Auto-negotiation support: Supported. Auto-negotiation status: Enabled. Auto-negotiation Advertised Capabilities: 100BASE-TX full duplex, 1000BASE-T full duplex. Operational MAU type: 1000BaseTFD LLDP-MED capabilities: Network Policy. LLDP-MED Device type: Endpoint class 2. LLDP-MED Network policy Application type: Voice Flags: Unknown policy VLAN ID: 0 Layer 2 priority: 0 DSCP: 0 LLDP-MED Power over Ethernet Device Type: Power Device Power source: Primary power Power priority: High Power value: 9.6 Watts LLDP-MED Hardware Firmware Software 342 Inventory revision: 2.1 revision: 2.3 revision: 2.7.1
LLDP Commands Location information, if exists, should be displayed too. The following table describes significant LLDP fields:
F ie l d
Port Device ID Port ID Hold time
Description
The port number. The configured ID (name) or MAC address of the neighbor device. The port ID of the neighbor device. The remaining amount of time, in seconds, the current device will hold the LLDP advertisement from the neighbor device before discarding it. The capabilities discovered on the neighbor device. Possible values are: B - Bridge R - Router W - WLAN Access Point T - Telephone D - DOCSIS cable device H - Hostr - Repeater O - Other The neighbor device administratively assigned name. The system description of the neighbor device. The port description of the neighbor device. The management address of the neighbor device. Specify if the port support auto-negotiation. Specify if auto-negotiation is enabled on the port. The speed/duplex/flow-control capabilities of the port that are advertised by the auto-negotiation. Indicates the MAU type of the port. Define the sender's LLDP-MED capabilities. Contains a value that indicates whether the sender is a Network Connectivity Device or Endpoint Device, and if an Endpoint, which Endpoint Class it belongs to.
Capabilities
System name System description Port description Management address Auto-negotiation support Auto-negotiation status Auto-negotiation Advertised Capabilities Operational MAU type LLDP MED Capabilities Device type
343
LLDP MED - Network Policy Application type Flags Indicates the primary function of the application defined for this network policy. Unknown policy: Policy is required by the device, but is currently unknown. Tagged VLAN: whether the specified application type is using a 'tagged' or an 'untagged' VLAN. VLAN identifier for the application. Layer 2 priority to be used for the specified application. DSCP value to be used for the specified application. Indicates whether the device is a Power Sourcing Entity (PSE) or Power Device (PD). Indicates the power source being utilized by a PSE or PD device. A PSE device would advertise its power capability. Available values are: Primary power source and Backup power source. A PD device would advertise its power source. Available values are: Primary power, Local power, Primary and Local power. Power priorityIndicates the priority of the PD device. A PSE device would advertise the power priority configured for the port. A PD device would advertise the power priority configured for the device. Available values are: Critical, High and Low. Indicates the priority of the PD device. A PSE device would advertise the power priority configured for the port. A PD device would advertise the power priority configured for the device. Available values are: Critical, High and Low. Indicates the total power in watts required by a PD device from a PSE device, or the total power a PSE device is capable of sourcing over a maximum length cable based on its current configuration. Displays the raw data of the location information.
DSCP LLDP MED - Power Over Ethernet Power type Power Source
Power priority
Power value
344
AMAP Commands
AMAP Commands
The AMAP protocol discovers adjacent switches by sending and receiving AMAP Hello packets on active Spanning Tree ports. Each port can be defined as being in one of three logical states of processing the AMAP "Hello" packets: Discovery The initial state where a port transmits a Hello packet to detect an adjacent switch and then waits for a response. Common The port has detected an adjacent switch and periodically sends Hello packets to determine that it is still present. Passive A port enters this state if there is no response to a Discovery hello packet. This is a receive-only state and no Hello packets are transmitted. If a Hello packet is received from an adjacent switch, the port enters the Common state and then transmits a Hello packet in reply. Use the AMAP Global Configuration screen to enable/disable AMAP and configure timeout parameters.
Table 4-10. AMAP Commands Command amap enable Function Enables, or disables AMAP on the switch Mode GC GC GC PE Page 4-345 4-346 4-346 4-346
amap discovery time Sets the discovery transmission time interval amap common timer Sets the common phase transmission time interval show amap Displays the current AMAP settings
amap enable
This command enables AMAP on the switch. Use the amap disable command to disable the feature. Syntax amap {enable} Parameters enable Enables AMAP. Default Setting Enabled Command Mode Global Configuration Example
Console(config)#amap enable Console(config)
345
show amap
This command displays the current AMAP settings on the switch.
346
AMAP Commands
Syntax show amap Default Setting None Command Mode Priviledged Executive Example
Console#sh amap AMAP is currently enabled AMAP Common Phase Timeout Interval (seconds) = 5000 AMAP Discovery Phase Timeout Interval (seconds) = 3000 Console#
347
4
.
Clock Commands
Table 4-11. Clock Commands Command clock set clock source clock timezone clock summer-time Function Manually sets the system clock. Mode PE Page 4-349 4-350 4-350 4-351
Configures an external time source for the system clock. Use no GC form of this command to disable external time source. Configures an external time source for the system clock. Use no GC form of this command to disable external time source. Configures the system to automatically switch to summer time (daylight saving time). To configure the software not to automatically switch to summer time, use the no form of this command. GC
Defines an authentication key for Simple Network Time Protocol GC (SNTP). To remove the authentication key for SNTP, use the no form of this command. Grants authentication for received Simple Network Time Protocol GC (SNTP) traffic from servers. To disable the feature, use the no form of this command. Sets the amount of time the management console is inaccessible GC after the number of unsuccessful logon attempts exceeds the threshold set by the password-thresh command
sntp client poll timer Sets the polling time for the Simple Network Time Protocol GC (SNTP) client. To return to default configuration, use the no form of this command. sntp broadcast client Enables Simple Network Time Protocol (SNTP) broadcast clients. GC enable To disable SNTP broadcast clients, use the no form of this command.t sntp anycast client enable sntp client enable (Interface) sntp unicast client enable sntp unicast client poll sntp server Enables SNTP anycast client. To disable the SNTP anycast client, GC use the no form of this command. Enables the Simple Network Time Protocol (SNTP) client on an interface. This applies to both receive broadcast and anycast updates. To disable the SNTP client, use the no form of this command. IC
Enables the device to use the Simple Network Time Protocol GC (SNTP) to request and accept SNTP traffic from servers. To disable requesting and accepting SNTP traffic from servers, use the no form of this command. Enables polling for the Simple Network Time Protocol (SNTP) GC predefined unicast servers. To disable the polling for SNTP client, use the no form of this command. Configures the device to use the Simple Network Time Protocol GC (SNTP) to request and accept SNTP traffic from a specified server. To remove a server from the list of SNTP servers, use the no form of this command. Displays the time and date from the system clock. UE
4-358
4-359 4-360
show clock
4-361
348
Clock Commands
Table 4-11. Clock Commands Command show sntp configuration show sntp status Function Shows the configuration of the Simple Network Time Protocol (SNTP). Shows the status of the Simple Network Time Protocol (SNTP). Mode PE PE
4
Page 4-362 4-363
clock set
The clock set Privileged EXEC mode command manually sets the system clock. Syntax
clock set hh:mm:ss day month year
or
clock set hh:mm:ss month day year
Parameters hh:mm:ss Current time in hours (military format), minutes, and seconds (hh: 0 - 23, mm: 0 - 59, ss: 0 - 59). day Current day (by date) in the month (1 - 31). month Current month using the first three letters by name (Jan, , Dec). year Current year (2000 - 2097). Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example sets the system time to 13:32:00 on the 7th March 2002.
Console# clock set 13:32:00 7 Mar 2002
349
clock source
The clock source Global Configuration mode command configures an external time source for the system clock. Use no form of this command to disable external time source. Syntax
clock source {sntp} no clock source
Parameters sntp SNTP servers Default Setting No external clock source Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Examples The following example configures an external time source for the system clock.
Console(config)# clock source sntp
clock timezone
The clock timezone Global Configuration mode command sets the time zone for display purposes. To set the time to the Coordinated Universal Time (UTC), use the no form of this command. Syntax
clock timezone hours-offset [minutes minutes-offset] [zone acronym] no clock timezone
350
Clock Commands
Default Setting Clock set to UTC. Command Mode Global Configuration mode
Command Usage The system internally keeps time in UTC, so this command is used only for display purposes and when the time is manually set. Example The following example sets the timezone to 6 hours difference from UTC.
Console(config)
clock summer-time
The clock summer-time Global Configuration mode command configures the system to automatically switch to summer time (daylight saving time). To configure the software not to automatically switch to summer time, use the no form of this command. Syntax
clock summer-time recurring {usa | eu | {week day month hh:mm week day month hh:mm}} [offset offset] [zone acronym] clock summer-time date date month year hh:mm date month year hh:mm [offset offset] [zone acronym] clock summer-time date month date year hh:mm month date year hh:mm [offset offset] [zone acronym] no clock summer-time recurring
Parameters recurring Indicates that summer time should start and end on the corresponding specified days every year. date Indicates that summer time should start on the first specific date listed in the command and end on the second specific date in the command. usa The summer time rules are the United States rules. eu The summer time rules are the European Union rules. week Week of the month. (Range: 1 - 5, first, last) day Day of the week (Range: first three letters by name, like sun) date Date of the month. (Range:1 - 31)
351
Default Setting Summer time is disabled. offset Default is 60 minutes. acronym If unspecified default to the timezone acronym. If the timezone has not been defined, the default is UTC. Command Mode Global Configuration mode Command Usage In both the date and recurring forms of the command, the first part of the command specifies when summer time begins, and the second part specifies when it ends. All times are relative to the local time zone. The start time is relative to standard time. The end time is relative to summer time. If the starting month is chronologically after the ending month, the system assumes that you are in the southern hemisphere. USA rule for daylight savings time: EU Start: First Sunday in April End: Last Sunday in October Time: 2 am local time rule for daylight savings time:
Start: Last Sunday in March End: Last Sunday in October Time: 1.00 am (01:00) Example The following example sets summer time starting on the first Sunday in April at 2 am and finishing on the last Sunday in October at 2 am.
Console(config)# clock summer-time recurring first sun apr 2:00 last sun oct 2:00
352
Clock Commands
clock timezone
sntp authentication-key
The sntp authentication-key Global Configuration mode command defines an authentication key for Simple Network Time Protocol (SNTP). To remove the authentication key for SNTP, use the no form of this command. Syntax
sntp authentication-key number md5 value no sntp authentication-key number
Parameters number Key number (Range: 1-4294967295) value Key value (Range: 1-8 characters) Default Setting No authentication key is defined. Command Mode Global Configuration mode Command Usage Multiple keys can be generated. Examples The following example defines the authentication key for SNTP.
Console(config)# sntp authentication-key 8 md5 ClkKey
Related Commands sntp authenticate sntp trusted-key sntp client poll timer sntp broadcast client enable sntp anycast client enable sntp unicast client enable sntp unicast client poll
sntp authenticate
The sntp authenticate Global Configuration mode command grants authentication for received Simple Network Time Protocol (SNTP) traffic from servers. To disable the feature, use the no form of this command. Syntax
sntp authenticate
353
Default Setting No authentication Command Mode Global Configuration mode Command Usage The command is relevant for both unicast and broadcast. Examples The following example defines the authentication key for SNTP and grants authentication.
Console(config)# sntp authentication-key 8 md5 ClkKey Console(config)# sntp trusted-key 8 Console(config)# sntp authenticate
Related Commands sntp authentication-key sntp trusted-key sntp client poll timer sntp broadcast client enable sntp anycast client enable sntp unicast client enable sntp unicast client poll
sntp trusted-key
The sntp trusted-key Global Configuration mode command authenticates the identity of a system to which Simple Network Time Protocol (SNTP) will synchronize. To disable authentication of the identity of the system, use the no form of this command. Syntax
sntp trusted-key key-number no sntp trusted-key key-number
Parameters key-number Key number of authentication key to be trusted. (Range: 1 - 4294967295) Default Setting No keys are trusted.
354
Clock Commands
Command Mode Global Configuration mode Command Usage The command is relevant for both received unicast and broadcast. If there is at least 1 trusted key, then unauthenticated messages will be ignored. Examples The following example authenticates key 8.
Console(config)# sntp authentication-key 8 md5 ClkKey Console(config)# sntp trusted-key 8 Console(config)# sntp authenticate
Related Commands sntp authentication-key sntp authenticate sntp client poll timer sntp broadcast client enable sntp anycast client enable sntp unicast client enable sntp unicast client poll
Parameters seconds Polling interval in seconds (Range: 60-86400) Default Setting Polling interval is 1024 seconds. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command.
355
Example The following example sets the polling time for the Simple Network Time Protocol (SNTP) client to 120 seconds.
Console(config)# sntp client poll timer 120
Related Commands sntp authentication-key sntp authenticate sntp trusted-key sntp broadcast client enable sntp anycast client enable sntp unicast client enable sntp unicast client poll
Default Setting The SNTP broadcast client is disabled. Command Mode Global Configuration mode Command Usage Use the sntp client enable (Interface) Interface Configuration mode command to enable the SNTP client on a specific interface. Examples The following example enables the SNTP broadcast clients.
Console(config)# sntp broadcast client enable
356
Clock Commands
sntp client poll timer sntp anycast client enable sntp unicast client enable sntp unicast client poll
Default Setting The SNTP anycast client is disabled. Command Mode Global Configuration mode Command Usage Use the sntp client enable (Interface) Interface Configuration mode command to enable the SNTP client on a specific interface. Example The following example enables SNTP anycast clients.
console(config)# sntp anycast client enable
Related Commands sntp authentication-key sntp authenticate sntp trusted-key sntp client poll timer sntp broadcast client enable sntp unicast client enable sntp unicast client poll
357
Syntax
sntp client enable no sntp client enable
Default Setting The SNTP client is disabled on an interface. Command Mode Interface configuration (Ethernet, port-channel, VLAN) mode Command Usage Use the sntp broadcast client enable Global Configuration mode command to enable broadcast clients globally. Use the sntp anycast client enable Global Configuration mode command to enable anycast clients globally. Examples The following example enables the SNTP client on Ethernet port 1/e3.
Console(config)# interface ethernet 1/e3 Console(config-if)# sntp client enable
Default Setting The SNTP unicast client is disabled. Command Mode Global Configuration mode Command Usage Use the sntp server Global Configuration mode command to define SNTP servers.
358
Clock Commands
Example The following example enables the device to use the Simple Network Time Protocol (SNTP) to request and accept SNTP traffic from servers.
Console(config)# sntp unicast client enable
Related Commands sntp authentication-key sntp authenticate sntp trusted-key sntp client poll timer sntp broadcast client enable sntp anycast client enable sntp unicast client poll
Default Setting Polling is disabled. Command Mode Global Configuration mode Command Usage Polling time is determined by the sntp client poll timer Global Configuration mode command. Examples The following example enables polling for Simple Network Time Protocol (SNTP) predefined unicast clients.
Console(config)# sntp unicast client poll
359
sntp trusted-key sntp client poll timer sntp broadcast client enable sntp anycast client enable sntp unicast client enable
sntp server
The sntp server Global Configuration mode command configures the device to use the Simple Network Time Protocol (SNTP) to request and accept SNTP traffic from a specified server. To remove a server from the list of SNTP servers, use the no form of this command. Syntax
sntp server {ip-address | hostname}[poll] [key keyid] no sntp server host
Parameters ip-address IP address of the server. hostname Hostname of the server. (Range: 1-158 characters) poll Enable polling. keyid Authentication key to use when sending packets to this peer. (Range:1-4294967295) Default Setting No servers are defined. Command Mode Global Configuration mode Command Usage Up to 8 SNTP servers can be defined. Use the sntp unicast client enable Global Configuration mode command to enable predefined unicast clients globally. To enable polling you should also use the sntp unicast client poll Global Configuration mode command for global enabling. Polling time is determined by the sntp client poll timer Global Configuration mode command. Examples The following example configures the device to accept SNTP traffic from the server on 192.1.1.1.
Console(config)# sntp server 192.1.1.1
360
Clock Commands
Related Commands sntp anycast client enable sntp unicast client enable
show clock
The show clock User EXEC mode command displays the time and date from the system clock. Syntax
show clock [detail]
Parameters detail Shows timezone and summertime configuration. Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage The symbol that precedes the show clock display indicates the following:
Symbol * (blank) . Description Time is not authoritative. Time is authoritative. Time is authoritative, but SNTP is not synchronized.
Example The following example displays the time and date from the system clock.
Console> show clock 15:29:03 PDT(UTC-7) Jun 17 2002 Time source is SNTP Console> show clock detail 15:29:03 PDT(UTC-7) Jun 17 2002 Time source is SNTP Time zone: Acronym is PST Offset is UTC-8 Summertime: Acronym is PDT Recurring every year. Begins at first Sunday of April at 2:00. Ends at last Sunday of October at 2:00. Offset is 60 minutes.
361
Related Commands clock set clock source clock timezone clock summer-time
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the current SNTP configuration of the device.
Console# show sntp configuration
362
Clock Commands
Broadcast Clients: Enabled Anycast Clients: Enabled Broadcast and Anycast Interfaces: 1/e1, 1/e3
Related Commands sntp server sntp authentication-key sntp authenticate sntp trusted-key sntp client poll timer sntp broadcast client enable sntp anycast client enable sntp client enable (Interface) sntp unicast client enable
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example shows the status of the SNTP.
Console# show sntp status Clock is synchronized, stratum 4, reference is 176.1.1.8, unicast Reference time is AFE2525E.70597B34 (00:10:22.438 PDT Jul 5 1993)
Unicast servers:
363
Server
Status
Last response
---------176.1.1.8 176.1.8.17 9
-------
----------------------------
Up Unknown
7.33 8.98
117.79 189.19
Anycast server: Server Interfa ce Sta tus Last response Offset Delay
[mSec] -----
176.1.11.8
VLAN 118
7.19
119.89
---------
----------------------------
176.9.1.1
Related Commands sntp server sntp authentication-key sntp authenticate sntp trusted-key sntp client poll timer sntp broadcast client enable sntp anycast client enable sntp client enable (Interface) sntp unicast client enable
364
4
Page 4-365 4-368 4-369 4-370 4-371 4-372 4-373 4-373 4-374
show running-config Displays the contents of the currently running configuration file. show startup-config Displays the contents of the startup configuration file.
show startup-config Displays the active system image file that is loaded by the device PE at startup.
copy
The copy Privileged EXEC mode command copies files from a source to a destination. Syntax
copy source-url destination-url
Parameters source-url The source file location URL or reserved keyword of the source file to be copied. (Range: 1-160 characters) destination-url The destination file URL or reserved keyword of the destination file. (Range: 1-160 characters) The following table displays keywords and URL prefixes:
Keyword flash: running-config startup-config image boot tftp:// Source or Destination Source or destination URL for flash memory. Its the default in case a URL is specified without a prefix. Represents the current running configuration file. Represents the startup configuration file. If the source file, represents the active image file. If the destination file, represents the non-active image file. Boot file. Source or destination URL for a TFTP network server. The syntax for this alias is tftp://host/[directory]/filename. The host can be represented by its IP address or hostname.
365
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage Up to five backup configuration files are supported on the device. The location of a file system dictates the format of the source or destination URL. The entire copying process may take several minutes and differs from protocol to protocol and from network to network. *.prv and *.sys files cannot be copied.
Understanding Invalid Combinations of Source and Destination
Some invalid combinations of source and destination exist. Specifically, you cannot copy if one of the following conditions exist: The source file and destination file are the same file.
xmodem: is the destination file. The source file can be copied to image, boot and null: only. tftp:// is the source file and destination file on the same copy.
366
For network transfers, indicates that the copy process is taking place. Each exclamation point indicates successful transfer of ten packets (512 bytes each). For network transfers, indicates that the copy process timed out. Generally, many periods in a row means that the copy process may fail.
To copy an image file from a server to flash memory, use the copy source-url image command.
Copying a Boot File from a Server to Flash Memory
To copy a boot file from a server to flash memory, enter the copy source-url boot command.
Copying a Configuration File from a Server to the Running Configuration File
To load a configuration file from a network server to the running configuration file of the device, enter the copy source-url running-config command. The commands in the loaded configuration file are added to those in the running configuration file as if the commands were typed in the command-line interface (CLI). Thus, the resulting configuration file is a combination of the previous running configuration and the loaded configuration files with the loaded configuration file taking precedence.
Copying a Configuration File from a Server to the Startup Configuration
To copy a configuration file from a network server to the startup configuration file of the device, enter copy source-url startup-config. The startup configuration file is replaced by the copied configuration file.
Storing the Running or Startup Configuration on a Server
Use the copy running-config destination-url command to copy the current configuration file to a network server using TFTP. Use the copy startup-config destination-url command to copy the startup configuration file to a network server.
Saving the Running Configuration to the Startup Configuration
To copy the running configuration to the startup configuration file, enter the copy running-config startup-config command.
Backing up the Running or Startup Configuration to a Backup Configuration File
To copy the running configuration file to a backup configuration file, enter the copy running-config file command. To copy the startup configuration file to a backup configuration file, enter the copy startup-config file command. Before copying from the backup configuration file to the running configuration file, make sure that the backup configuration file has not been corrupted.
367
Example The following example copies system image file1 from the TFTP server 172.16.101.101 to a non-active image file.
Console# copy tftp://172.16.101.101/file1 image Accessing file 'file1' on 172.16.101.101... Loading file1 from 172.16.101.101: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!! [OK] Copy took 0:01:11 [hh:mm:ss]
delete
The delete Privileged EXEC mode command deletes a file from a flash memory device. Syntax
delete url
Parameters url The location URL or reserved keyword of the file to be deleted. (Range: 1-160 characters) The following table displays keywords and URL prefixes:
Keyword flash: startup-config Source or Destination Source or destination URL for flash memory. Its the default in case a URL is specified without a prefix. Represents the startup configuration file.
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage *.sys, *.prv, image-1 and image-2 files cannot be deleted.
368
dir
The dir Privileged EXEC mode command displays the list of files on a flash file system. Syntax dir Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Example The following example displays the list of files on a flash file system.
Console# dir Directory of flash: File Name ---------bb cc dd Permission. DataSize ---------rw rw rw FlashSize Modified
--------- --------- ---------97 97 97 500000 500000 500000 13-Feb-2005 10:30:21 13-Feb-2005 10:30:35 13-Feb-2005 10:30:50
369
4
ee
Command Line Interface rw rw rw -rr97 ------95 500000 5767168 5767168 262144 262144 262144 262144 400000 13-Feb-2005 10:31:04 07-Feb-2005 10:15:56 07-Feb-2005 10:15:56 07-Feb-2005 10:16:02 07-Feb-2005 10:16:02 07-Feb-2005 10:16:02 07-Feb-2005 10:15:56 13-Feb-2005 18:46:34
directory.prv -startup-config rw
Total size of flash: 33292288 bytes Free size of flash: 20708893 bytes more
The more Privileged EXEC mode command displays a file. Syntax more url Parameters url The location URL or reserved keyword of the source file to be copied. (Range: 1-160 characters) The following table displays keywords and URL prefixes:
Keyword flash: running-config startup-config Source or Destination Source or destination URL for flash memory. Its the default in case a URL is specified without a prefix Represents the current running configuration file. Represents the startup configuration file.
370
Example
The following example displays the contents of the running configuration file.
.
Console# more configuration.bak ! version 12.1 ! . . . interface FastEthernet1/1 ip address 176.242.100.100 255. ip pim dense-mode duplex auto speed auto ! . . . end rename
The rename Privileged EXEC mode command renames the file. Syntax rename url new-url Parameters url The location URL. (Range: 1-160 characters) new-url New URL. (Range: 1-160 characters) The following table displays keywords and URL prefixes:
Keyword Source or Destination
371
Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines *.sys and *.prv files cannot be renamed. Example The following example renames the configuration file.
Parameters unit Specifies the unit number. image-1 Specifies image 1 as the system startup image. image-2 Specifies image 2 as the system startup image. Default Setting If the unit number is unspecified, the default setting is the master unit number. Command Mode Privileged EXEC mode Command Usage Use the show bootvar command to find out which image is the active image. Example The following example loads system image 1 at device startup.
Console# boot system image-1
372
The show running-config Privileged EXEC mode command displays the contents of the currently running configuration file. Syntax
show running-config
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the contents of the running configuration file.
Console# show running-config software version 1.1
hostname device
interface ethernet 1/e1 ip address 176.242.100.100 255.255.255.0 duplex full speed 1000
interface ethernet 1/e2 ip address 176.243.100.100 255.255.255.0 duplex full speed 1000
show startup-config
The show startup-config Privileged EXEC mode command displays the contents of the startup configuration file. Syntax
show startup-config
373
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the contents of the running configuration file.
Console# show startup-config software version 1.1
hostname device
interface ethernet 1/e1 ip address 176.242.100.100 255.255.255.0 duplex full speed 1000
interface ethernet 1/e2 ip address 176.243.100.100 255.255.255.0 duplex full speed 1000
show bootvar
The show bootvar Privileged EXEC mode command displays the active system image file that is loaded by the device at startup. Syntax
show bootvar [unit unit]
Parameters unit Specifies the unit number. Default Setting This command has no default configuration.
374
Unit ---1 2
375
Configures the full/half duplex operation of a given ICE Ethernet interface when not using auto-negotiation. Enables auto-negotiation operation for the speed and duplex parameters of a given interface. Configures flow control on a given interface. Enables cable crossover on a given interface. Enables back pressure on a given interface. Clears statistics on an interface. Reactivates an interface that was shutdown. Displays autonegotiation data. Displays the configuration for all configured interfaces. Displays the status of all configured interfaces. Displays traffic seen by the physical interface. IC IC ICE IC UE PE PE PE PE UE
Displays the description for all configured interfaces. PE Counts multicast packets in broadcast storm control. ICE Enables broadcast storm control. Configures the maximum broadcast rate. Displays the storm control configuration. ICE ICE UE
interface ethernet
The interface ethernet Global Configuration mode command enters the interface configuration mode to configure an Ethernet type interface. The system supports up-to five IP addresses per device. Syntax
interface ethernet interface
376
Related Commands shutdown description speed duplex negotiation flowcontrol mdix back-pressure show interfaces status
Parameters port-range List of valid ports. Where more than one port is listed, separate nonconsecutive ports with a comma and no spaces, use a hyphen to designate a range of ports and group a list separated by commas in brackets. all All Ethernet ports. Default Setting This command has no default configuration.
377
Command Mode Global Configuration mode Command Usage Commands under the interface range context are executed independently on each active interface in the range. If the command returns an error on one of the active interfaces, it does not stop executing commands on other active interfaces. Example The following example shows how ports 5/e18 to 5/e20 and 3/e1 to 3/24 are grouped to receive the same command.
Console(config)# interface range ethernet 5/e18-5/e20,3/e1-3/e24 Console(config-if)#
Related Commands shutdown description speed duplex negotiation flowcontrol mdix back-pressure show interfaces status
shutdown
The shutdown Interface Configuration (Ethernet, port-channel) mode command disables an interface. To restart a disabled interface, use the no form of this command. Syntax
shutdown no shutdown
Default Setting The interface is enabled. Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage There are no user guidelines for this command.
378
Related Commands speed duplex negotiation flowcontrol mdix back-pressure show interfaces configuration show interfaces status
description
The description Interface Configuration (Ethernet, port-channel) mode command adds a description to an interface. To remove the description, use the no form of this command. Syntax
description string no description
Parameters string Comment or a description of the port to enable the user to remember what is attached to the port. (Range: 1-64 characters) Default Setting The interface does not have a description. Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage There are no user guidelines for this command.
379
speed
The speed Interface Configuration (Ethernet, port-channel) mode command configures the speed of a given Ethernet interface when not using auto-negotiation. To restore the default configuration, use the no form of this command. Syntax
speed {10 | 100 | 1000} no speed
Parameters 10 Forces10 Mbps operation. 100 Forces 100 Mbps operation. 1000 Forces 1000 Mbps operation. Default Setting Maximum port capability Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage The no speed command in a port-channel context returns each port in the port-channel to its maximum capability. Example The following example configures the speed operation of Ethernet port 1/e5 to 100 Mbps operation.
Console(config)# interface ethernet 1/e5 Console(config-if)# speed 100
380
duplex
The duplex Interface Configuration (Ethernet) mode command configures the full/ half duplex operation of a given Ethernet interface when not using auto-negotiation. To restore the default configuration, use the no form of this command. Syntax
duplex {half | full}
Parameters no duplex half Forces half-duplex operation full Forces full-duplex operation Default Setting The interface is set to full duplex. Command Mode Interface Configuration (Ethernet) mode Command Usage When configuring a particular duplex mode on the port operating at 10/100 Mbps, disable the auto-negotiation on that port. Half duplex mode can be set only for ports operating at 10 Mbps or 100 Mbps. Example The following example configures the duplex operation of Ethernet port 1/e5 to full duplex operation.
Console(config)# interface ethernet 1/e5 Console(config-if)# duplex full
Related Commands shutdown speed negotiation flowcontrol mdix back-pressure show interfaces configuration show interfaces status
381
negotiation
The negotiation Interface Configuration (Ethernet, port-channel) mode command enables auto-negotiation operation for the speed and duplex parameters of a given interface. To disable auto-negotiation, use the no form of this command. Syntax
negotiation [capability1 [capability2capability5]] no negotiation
Parameters capability Specifies the capabilities to advertise. (Possible values: 10h, 10f, 100h,100f, 1000f) Default Setting Auto-negotiation is enabled. If unspecified, the default setting is to enable all capabilities of the port. Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage If capabilities were specified when auto-negotiation was previously entered, not specifying capabilities when currently entering auto-negotiation overrides the previous configuration and enables all capabilities. Example The following example enables auto-negotiation on Ethernet port 1/e5.
Console(config)# interface ethernet 1/e5 Console(config-if)# negotiation
Related Commands shutdown speed duplex flowcontrol mdix back-pressure show interfaces advertise show interfaces configuration show interfaces status
382
The flowcontrol Interface Configuration (Ethernet, port-channel) mode command configures flow control on a given interface. To disable flow control, use the no form of this command. Syntax
flowcontrol {auto | on | off} no flowcontrol
Parameters auto Indicates auto-negotiation on Enables flow control. off Disables flow control. Default Setting Flow control is off. Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage Negotiation should be enabled for flow control auto. Flow control can be configured only in full duplex mode. Example In the following example, flow control is enabled on port 1/e5.
Console(config)# interface ethernet 1/e5 Console(config-if)# flowcontrol on
Related Commands shutdown speed duplex negotiation mdix back-pressure show interfaces configuration show interfaces status
mdix
The mdix Interface Configuration (Ethernet) mode command enables cable crossover on a given interface. To disable cable crossover, use the no form of this command.
383
Syntax
mdix {on | auto} no mdix
Parameters on Manual mdix auto Automatic mdi/mdix Default Setting The default is on. Command Mode Interface Configuration (Ethernet) mode Command Usage Auto: All possibilities to connect a PC with cross or normal cables are supported and are automatically detected.
On: It is possible to connect to a PC only with a normal cable and to connect to another device only with a cross cable.
No: It is possible to connect to a PC only with a cross cable and to connect to another device only with a normal cable. Example In the following example, automatic crossover is enabled on port 1/e5.
Console(config)# interface ethernet 1/e5 Console(config-if)# mdix auto
Related Commands shutdown speed duplex negotiation flowcontrol back-pressure show interfaces configuration show interfaces status
back-pressure
The back-pressure Interface Configuration (Ethernet ) mode command enables back pressure on a given interface. To disable back pressure, use the no form of this command.
384
Default Setting Back pressure is enabled. Command Mode Interface Configuration (Ethernet) mode Command Usage The back pressure Interface Configuration mode command enables back pressure on half duplex mode only, therefore it can not be configured on a channel port. Example In the following example back pressure is enabled on port 1/e5.
Console(config)# interface ethernet 1/e5 Console(config-if)# back-pressure
Related Commands shutdown speed duplex negotiation flowcontrol mdix show interfaces configuration show interfaces status
clear counters
The clear counters User EXEC mode command clears statistics on an interface. Syntax
clear counters [ethernet interface | port-channel port-channel-number]
Parameters interface Valid Ethernet port. (Full syntax: unit/port) port-channel-number Valid port-channel number. Default Setting This command has no default configuration.
385
Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example In the following example, the counters for interface 1/e1 are cleared.
Console> clear counters ethernet 1/e1
Parameters interface Valid Ethernet port. (Full syntax: unit/port) port-channel-number Valid port-channel number. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage This command is used to activate interfaces that were configured to be active, but were shutdown by the system for some reason (e.g., port security). Example The following example reactivates interface 1/e5.
Console# set interface active ethernet 1/e5
386
port-channel-number] Parameters interface Valid Ethernet port. (Full syntax: unit/port) port-channel-number Valid port-channel number. Default Setting This command has no default configuration. Command Modes Privileged EXEC mode Command Usage There are no user guidelines for this command. Examples The following examples display autonegotiation information.
Console# show interfaces advertise
Type ----------100M-Copper 100M-Copper 100M-Copper 100M-Copper 100M-Copper 100M-Copper 100M-Copper 100M-Copper 100M-Copper 100M-Copper 100M-Copper 100M-Copper 100M-Copper 100M-Copper 100M-Copper
Neg ------Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled
387
------
port-channel-number | interface] Parameters interface Valid Ethernet port. (Full syntax: unit/port) port-channel-number Valid port-channel number. Default Setting This command has no default configuration. Command Modes Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the configuration of all configured interfaces:
Console# show interfaces configuration
Por t
Type
Duple x
Spee d
Neg
Fl ow Ct rl --Of f Of f
Back Pressur e
Mdix Mode
--e1
---------100M-Coppe r 100M-Coppe r
----Full
---100
-----Enable d Enable d
------Disable d Disable d
----
Auto
e2
Full
100
Up
Auto
388
e3
100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r
Full
100
Enable d Enable d Enable d Enable d Enable d Enable d Enable d Enable d Enable d Enable d Enable d Enable d Enable d Enable d Enable d Enable d Enable d
Of f Of f Of f Of f Of f Of f Of f Of f Of f Of f Of f Of f Of f Of f Of f Of f Of f
Up
Disable d Disable d Disable d Disable d Disable d Disable d Disable d Disable d Disable d Disable d Disable d Disable d Disable d Disable d Disable d Disable d Disable d
Auto
e4
Full
100
Up
Auto
e5
Full
100
Up
Auto
e6
Full
100
Up
Auto
e7
Full
100
Up
Auto
e8
Full
100
Up
Auto
e9
Full
100
Up
Auto
e10
Full
100
Up
Auto
e11
Full
100
Up
Auto
e12
Full
100
Up
Auto
e13
Full
100
Up
Auto
e14
Full
100
Up
Auto
e15
Full
100
Up
Auto
e16
Full
100
Up
Auto
e17
Full
100
Up
Auto
e18
Full
100
Up
Auto
e19
Full
100
Up
Auto
389
Parameters interface A valid Ethernet port. (Full syntax: unit/port) port-channel-number A valid port-channel number. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the status of all configured interfaces:
Console# show interfaces status
Por t
Type
Duple x
Spee d
Neg
Fl ow Ct rl ----
Link Stat e
Back Pressur e
Mdix Mode
--e1
------
-----
-------
---Down
--------
----
--
e2
--
--
--
--
Down
--
--
e3
--
--
--
--
Down
--
--
e4
--
--
--
--
Down
--
--
e5
Full
100
Enable d
Of f
Up
Disable d
Auto
390
e6
100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r 100M-Coppe r
--
--
--
--
Down
--
--
e7
--
--
--
--
Down
--
--
e8
--
--
--
--
Down
--
--
e9
--
--
--
--
Down
--
--
e10
--
--
--
--
Down
--
--
e11
--
--
--
--
Down
--
--
e12
--
--
--
--
Down
--
--
e13
--
--
--
--
Down
--
--
e14
--
--
--
--
Down
--
--
e15
--
--
--
--
Down
--
--
e16
--
--
--
--
Down
--
--
e17
--
--
--
--
Down
--
--
e18
--
--
--
--
Down
--
--
e19
--
--
--
--
Down
--
--
Related Commands shutdown speed duplex negotiation flowcontrol mdix back-pressure show interfaces configuration
391
port-channel-number] Parameters interface Valid Ethernet port. (Full syntax: unit/port) port-channel-number A valid port-channel number. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays descriptions of configured interfaces.
Console# show interfaces description
Description ----------lab
392
port-channel-number] Parameters interface A valid Ethernet port. (Full syntax: unit/port) port-channel-number A valid port-channel number. Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays traffic seen by the physical interface:
Console# show interfaces counters
InUcastPkts ----------0 0 0
InMcastPkts ----------0 0 0
InBcastPkts ----------0 0 0
OutUcastPkts -----------0 0 0
OutMcastPkts -----------0 0 0
OutBcastPkts -----------0 0 0
Ch --1
InOctets -------27889
InUcastPkts ---------0
InMcastPkts ----------0
InBcastPkts ----------0
393
4
Ch
OutOctets --------23739
OutUcastPkts -----------0
OutMcastPkts -----------0
OutBcastPkts -----------0
--1
Port ----1/e1
InOctets -----------
InUcastPkts --------------
InMcastPkts -----------
InBcastPkts -----------
183892
Port ----1/e1
OutOctets -----------
OutUcastPkts --------------
OutMcastPkts ------------
OutBcastPkts ------------
9188
FCS Errors: 8 Single Collision Frames: 0 Late Collisions: 0 Oversize Packets: 0 Internal MAC Rx Errors: 0 Symbol Errors: 0 Received Pause Frames: 0 Transmitted Pause Frames: 0
394
Counted received frames that are an integral number of octets in length but do not pass the FCS check. Counted frames that are involved in a single collision, and are subsequently transmitted successfully. Number of times that a collision is detected later than one slotTime into the transmission of a packet. Counted frames received that exceed the maximum permitted frame size. Counted frames for which reception fails due to an internal MAC sublayer receive error. Counted MAC Control frames received with an opcode indicating the PAUSE operation. Counted MAC Control frames transmitted on this interface with an opcode indicating the PAUSE operation.
395
Command Mode Interface Configuration (Ethernet) mode Command Usage Use the port storm-control broadcast rate Interface Configuration (Ethernet) mode command, to set the maximum allowable broadcast rate. Example The following example enables broadcast storm control on port 1/g1 of a device.
Console(config)# interface ethernet 1/g1 Console(config)# port storm-control broadcast enable
Related Commands port storm-control broadcast enable port storm-control broadcast rate show ports storm-control
Parameters rate Maximum kilobits per second of broadcast and multicast traffic on a port. Default Setting The default value is 3500 Kbits/Sec. Command Mode Interface Configuration (Ethernet) mode Command Usage Use the port storm-control broadcast enable Interface Configuration mode command to enable broadcast storm control. Example The following example configures the maximum storm control broadcast rate at 900 Kbits/Sec on Ethernet port 1/e5 of a device.
Console(config)# interface ethernet 1/e5 Console(config-if)# port storm-control broadcast rate 900
396
Parameters interface A valid Ethernet port. (Full syntax: unit/port) Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the storm control configuration .
Console# show ports storm-control Port State Rate [Kbits/ Sec] --------------70 Included
----
--------
1/e1
Enabled
2/e1 3/e1
Enabled Disabled
100 100
397
2/g1 3/g1
Disabled Disabled
Related Commands port storm-control broadcast enable port storm-control broadcast rate
398
GVRP Commands
GVRP Commands
Table 4-14. GVRP Commands Command Function Mode Page 4-399 4-400 4-401 4-402 4-402 4-403 4-404 4-405 4-406 gvrp enable (Global) Enables GVRP globally. To disable GVRP on the device, use the GC no form of this command. gvrp enable (Interface) garp timer gvrp vlan-creation-forbid gvrp registration-forbid clear gvrp statistics show gvrp configuration Enables GVRP on an interface. To disable GVRP on an interface, IC use the no form of this command. Adjusts the values of the join, leave and leaveall timers of GARP IC applications. To return to the default configuration, use the no form of this command. Disables dynamic VLAN creation or modification. To enable dynamic VLAN creation or modification, use the no form of this command.t IC
Deregisters all dynamic VLANs on a port and prevents VLAN LC creation or registration on the port. To allow dynamic registration of VLANs on a port, use the no form of this command. Clears all GVRP statistical information. PE Displays GVRP configuration information, including timer values, UE whether GVRP and dynamic VLAN creation is enabled, and which ports are running GVRP. UE LC
show gvrp statistics Displays GVRP statistics. show gvrp error-statistics Displays GVRP error statistics.
399
Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example enables GVRP globally on the device.
Console(config)# gvrp enable
Default Setting GVRP is disabled on all interfaces. Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage An access port does not dynamically join a VLAN because it is always a member in only one VLAN. Membership in an untagged VLAN is propagated in the same way as in a tagged VLAN. That is, the PVID is manually defined as the untagged VLAN VID. Example The following example enables GVRP on Ethernet port 1/e6.
Console(config)# interface ethernet 1/e6 Console(config-if)# gvrp enable
400
GVRP Commands
gvrp vlan-creation-forbid gvrp registration-forbid show gvrp configuration
garp timer
The garp timer Interface Configuration (Ethernet, Port channel) mode command adjusts the values of the join, leave and leaveall timers of GARP applications. To return to the default configuration, use the no form of this command. Syntax
garp timer {join | leave | leaveall} timer_value no garp timer
Parameters {join | leave | leaveall} Indicates the type of timer. timer_value Timer values in milliseconds in multiples of 10. (Range: 10-2147483640) Default Setting Following are the default timer values: Join timer 200 milliseconds Leave timer 600 milliseconds Leavall timer 10000 milliseconds Command Mode Interface configuration (Ethernet, port-channel) mode Command Usage The timer_value value must be a multiple of 10. You must maintain the following relationship for the various timer values: Leave time must be greater than or equal to three times the join time. Leave-all time must be greater than the leave time. Set the same GARP timer values on all Layer 2-connected devices. If the GARP timers are set differently on the Layer 2-connected devices, the GARP application will not operate successfully. Example The following example sets the leave timer for Ethernet port 1/e6 to 900 milliseconds.
Console(config)# interface ethernet 1/e6 Console(config-if)# garp timer leave 900
401
Related Commands gvrp enable (Interface) gvrp vlan-creation-forbid gvrp registration-forbid show gvrp configuration
gvrp vlan-creation-forbid
The gvrp vlan-creation-forbid Interface Configuration (Ethernet, port-channel) mode command disables dynamic VLAN creation or modification. To enable dynamic VLAN creation or modification, use the no form of this command. Syntax
gvrp vlan-creation-forbid no gvrp vlan-creation-forbid
Default Setting Dynamic VLAN creation or modification is enabled. Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage This command forbids dynamic VLAN creation from the interface. The creation or modification of dynamic VLAN registration entries as a result of the GVRP exchanges on an interface are restricted only to those VLANs for which static VLAN registration exists. Example The following example disables dynamic VLAN creation on Ethernet port 1/e6.
Console(config)# interface ethernet 1/e6 Console(config-if)# gvrp vlan-creation-forbid
Related Commands gvrp enable (Interface) garp timer gvrp registration-forbid show gvrp configuration
gvrp registration-forbid
The gvrp registration-forbid Interface Configuration (Ethernet, port-channel) mode command deregisters all dynamic VLANs on a port and prevents VLAN creation or registration on the port. To allow dynamic registration of VLANs on a port, use the no form of this
402
GVRP Commands
command. Syntax
gvrp registration-forbid no gvrp registration-forbid
Default Setting Dynamic registration of VLANs on the port is allowed. Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage There are no user guidelines for this command. Example The following example forbids dynamic registration of VLANs on Ethernet port 1/e6.
Console(config)# interface ethernet 1/e6 Console(config-if)# gvrp registration-forbid
Related Commands gvrp enable (Interface) garp timer gvrp vlan-creation-forbid show gvrp configuration
Parameters interface A valid Ethernet port. (Full syntax: unit/port) port-channel-number A valid port-channel number. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode
403
Command Usage There are no user guidelines for this command. Example The following example clears all GVRP statistical information on Ethernet port 1/e6.
Console# clear gvrp statistics ethernet 1/e6
port-channel-number] Parameters interface A valid Ethernet port. (Full syntax: unit/port) port-channel-number A valid port-channel number. Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays GVRP configuration information:
Console> show gvrp configuration
Timers (milliseconds) Port(s ) Status Registration Dynamic VLAN Creation Join Leave Leave All
404
GVRP Commands
-----2/e1 4/e4
------Enabled Enabled
-----------Normal Normal
--------Enabled Enabled
---200 200
----600 600
--------10000 10000
Related Commands gvrp enable (Interface) garp timer gvrp vlan-creation-forbid clear gvrp statistics
Parameters interface A valid Ethernet port. (Full syntax: unit/port) port-channel-number A valid port-channel number. Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example The following example shows GVRP statistical information:
Console> show gvrp statistics
GVRP Statistics: Legend: rJE : Join Empty Received Empty Received Leave Empty Received Join Empty Sent Empty Sent rJIn: rLIn: rLA : sJIn: sLIn: Join In Received Leave In Received Leave All Received Join In Sent Leave In Sent
sEmp :
405
sLE Port
: rJE
sLA : sJE
port-channel-number] Parameters interface A valid Ethernet port. (Full syntax: unit/port) port-channel-number A valid port-channel number. Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays GVRP statistical information.
Console> show gvrp error-statistics GVRP Error Statistics: Legend: INVPROT: Invalid Protocol Id INVALEN : Invalid Attribute Length Invalid Event
INVATYP:
INVEVENT:
INVAVAL:
406
GVRP Commands
show gvrp statistics
407
Configures the host-time-out. If an IGMP report for a multicast ICV group was not received for a host-time-out period from a specific port, this port is deleted from the member list of that multicast group. To return to the default configuration, use the no form of this command. Configures the mrouter-time-out. The ip igmp snooping mrouter-time-out Interface Configuration (VLAN) mode command is used for setting the aging-out time after multicast device ports are automatically learned. To return to the default configuration, use the no form of this command. ICV
4-410
Configures the leave-time-out. If an IGMP report for a multicast ICV group was not received for a leave-time-out period after an IGMP Leave was received from a specific port, this port is deleted from the member list of that multicast group. To return to the default configuration, use the no form of this command. Defines the multicast ip-addresses that are associated with a multicast-tv VLAN Displays information on dynamically learned multicast device interfaces. GC UE
4-411
ip igmp snooping multicast-tv ip igmp snooping querier enable ip igmp snooping querier enable ip igmp snooping querier address ip igmp snooping querier version show ip igmp snooping interface show ip igmp snooping groups
Use the ip igmp snooping querier enable interface configuration ICV command to enable Internet Group Management Protocol (IGMP) querier on a specific VLAN. Use the ip igmp snooping querier address interface configuration ICV command to define the source IP address that the IGMP Snooping querier would use. Use the ip igmp snooping querier version interface configuration ICV command to configure the IGMP version of an IGMP querier on a specific VLAN. Sets the number of data bits per character that are interpreted and UE generated by hardware Displays multicast groups learned by IGMP snooping. UE
408
Default Setting IGMP snooping is disabled. Command Mode Global Configuration mode Command Usage IGMP snooping can only be enabled on static VLANs. It must not be enabled on Private VLANs or their community VLANs. Example The following example enables IGMP snooping.
Console(config)# ip igmp snooping
Default Setting IGMP snooping is disabled. Command Mode Interface Configuration (VLAN) mode Command Usage IGMP snooping can only be enabled on static VLANs. It must not be enabled on Private VLANs or their community VLANs. Example The following example enables IGMP snooping on VLAN 2.
Console(config)# interface vlan 2 Console(config-if)# ip igmp snooping
409
Related Commands ip igmp snooping querier enable show ip igmp snooping groups
Parameters no ip igmp snooping host-time-out time-out Host timeout in seconds. (Range: 60 - 2147483647) Default Setting The default host-time-out is 260 seconds. Command Mode Interface Configuration (VLAN) mode Command Usage The timeout should be at least greater than 2*query_interval+max_response_time of the IGMP router. IGMP snooping works on PVE protected ports; however forwarding of query/ reports is not limited to the PVE uplink. Example The following example configures the host timeout to 300 seconds.
Console(config)# interface vlan 2 Console(config-if)# ip igmp snooping host-time-out 300
410
Parameters time-out Multicast device timeout in seconds (Range: 1 - 2147483647) Default Setting The default value is 300 seconds. Command Mode Interface Configuration (VLAN) mode Command Usage There are no user guidelines for this command. Example The following example configures the multicast device timeout to 200 seconds.
Console(config)# interface vlan 2 Console(config-if)# ip igmp snooping mrouter-time-out 200
Parameters time-out Specifies the leave-time-out in seconds for IGMP queries. (Range: 0-2147483647) immediate-leave Indicates that the port should be immediately removed from the members list after receiving IGMP Leave. Default Setting The default leave-time-out configuration is 10 seconds. Command Mode Interface Configuration (VLAN) mode
411
Command Usage The leave timeout should be set greater than the maximum time that a host is allowed to respond to an IGMP query. Use immediate leave only where there is just one host connected to a port. Example The following example configures the host leave-time-out to 60 seconds.
Console(config)# interface vlan 2 Console(config-if)# ip igmp snooping leave-time-out 60
412
User Guidelines IGMP snooping querier can be enabled on a VLAN only if IGMP snooping is enabled for that VLAN. No more than one switch can be configured as an IGMP Querier for a VLAN. When IGMP Snooping Querier is enabled, it starts after host-time-out/2 with no IGMP traffic detected from a multicast router. The IGMP Snooping Querier would disable itself if it detects IGMP traffic from a multicast router. It would restart itself after host-time-out/2. Following are the IGMP Snooping Querier parameters as function of the IGMP Snooping parameters:
413
Command Mode Interface Configuration (VLAN) mode User Guidelines If an IP address is not configured by this command, and no IP address is configured for the IGMP querier VLAN interface, the querier would be disabled.
Parameters vlan-id VLAN number. Default Setting This command has no default configuration.
414
VLAN ---1000
Ports ----1/e1
Detected multicast devices that are forbidden statically: VLAN ---1000 Ports ----1/e19
Related Commands ip igmp snooping (Global) ip igmp snooping (Interface) ip igmp snooping mrouter-time-out ip igmp snooping leave-time-out
Parameters vlan-id VLAN number. Default Setting This command has no default configuration. Command Mode User EXEC mode
415
Command Usage There are no user guidelines for this command. Example The following example displays IGMP snooping information on VLAN 1000.
Console> show ip igmp snooping interface IGMP Snooping is globally enabled IGMP Snooping admin: Enabled Hosts and routers IGMP version: 2 IGMP snooping oper mode: Enabled IGMP snooping querier admin: Enabled IGMP snooping querier oper: Enabled IGMP snooping querier address admin: default IGMP snooping querier address oper: 172.16.1.1 IGMP snooping querier version: 3 IGMP host timeout is 300 sec IGMP Immediate leave is disabled. IGMP leave timeout is 10 sec IGMP mrouter timeout is 300 sec Automatic learning of multicast router ports is enabled
Related Commands ip igmp snooping (Global) ip igmp snooping (Interface) ip igmp snooping mrouter-time-out ip igmp snooping leave-time-out
[source ip-address] Parameters vlan-id VLAN number. ip-multicast-address IP multicast address. ip-address Source IP address. Default Setting This command has no default configuration. Command Mode User EXEC mode
416
Vlan
Group address
Exlude Ports
----
-----------------
1 1 19 19 19
1/12 1/12
IGMP Reporters that are forbidden statically: --------------------------------------------Vlan Group Address Source address 172.16.1.1 172.16.1.1 Ports
1 19
231.2.2.3 231.2.2.8
2/8 2/8
417
IP Addressing Commands
Table 4-16. IP Addressing Commands Command ip address ip address dhcp Function Mode Page 4-418 4-419 Sets an IP address. To remove an IP address, use the no form of IC this command. Acquires an IP address for an Ethernet interface from the Dynamic Host Configuration Protocol (DHCP) server. To deconfigure an acquired IP address, use the no form of this command. Defines a default gateway ( device). To return to the default configuration, use the no form of this command. Sets the interval that the system waits for a login attempt IC
ip default-gateway show ip interface arp arp timeout clear arp-cache show arp ip domain-lookup ip domain-name
GC PE
Adds a permanent entry in the Address Resolution Protocol (ARP) GC cache. To remove an entry from the ARP cache, use the no form of this command. Configures how long an entry remains in the ARP cache. To return GC to the default configuration, use the no form of this command. Deletes all dynamic entries from the ARP cache. Displays entries in the ARP table. Enables the IP Domain Naming System (DNS)-based host name-to-address translation. To disable DNS-based host name-to-address translation, use the no form of this command. PE PE GC
Defines a default domain name used by the software to complete GC unqualified host names (names without a dotted-decimal domain name). To remove the default domain name, use the no form of this command. Defines the available name servers. To remove a name server, use the no form of this command. GC
Defines static host name-to-address mapping in the host cache. GC To remove the name-to-address mapping, use the no form of this command. Deletes entries from the host name-to-address cache. PE Deletes entries from the host name-to-address mapping received PE from Dynamic Host Configuration Protocol (DHCP). Displays the default domain name, a list of name server hosts, the PE static and the cached list of host names and addresses.
ip address
The ip address Interface Configuration (Ethernet, VLAN, port-channel) mode command sets an IP address. To remove an IP address, use the no form of this command.
418
IP Addressing Commands
Syntax
ip address ip-address {mask | prefix-length} no ip address [ip-address]
Parameters ip-address Valid IP address mask Valid network mask of the IP address. prefix-length Specifies the number of bits that comprise the IP address prefix. The prefix length must be preceded by a forward slash (/). (Range: 8 -30) Default Setting No IP address is defined for interfaces. Command Mode Interface Configuration (Ethernet, VLAN, port-channel) mode Command Usage An IP address cannot be configured for a range of interfaces (range context). Example The following example configures VLAN 1 with IP address 131.108.1.27 and subnet mask 255.255.255.0.
Console(config)# interface vlan 1 Console(config-if)# ip address 131.108.1.27 255.255.255.0
ip address dhcp
The ip address dhcp Interface Configuration (Ethernet, VLAN, port-channel) mode command acquires an IP address for an Ethernet interface from the Dynamic Host Configuration Protocol (DHCP) server. To deconfigure an acquired IP address, use the no form of this command. Syntax
ip address dhcp [hostname host-name] no ip address dhcp
Parameters host-name Specifies the name of the host to be placed in the DHCP option 12 field. This name does not have to be the same as the host name specified in the hostname Global Configuration mode command. (Range: 1-20 characters)
419
Default Setting This command has no default configuration. Command Mode Interface Configuration (Ethernet, VLAN, port-channel) mode Command Usage The ip address dhcp command allows any interface to dynamically learn its IP address by using the DHCP protocol. Some DHCP servers require that the DHCPDISCOVER message have a specific host name. The ip address dhcp hostname host-name command is most typically used when the host name is provided by the system administrator. If the device is configured to obtain its IP address from a DHCP server, it sends a DHCPDISCOVER message to provide information about itself to the DHCP server on the network. If the ip address dhcp command is used with or without the optional keyword, the DHCP option 12 field (host name option) is included in the DISCOVER message. By default, the specified DHCP host name is the globally configured host name of the device. However, the ip address dhcp hostname host-name command can be used to place a different host name in the DHCP option 12 field. The no ip address dhcp command deconfigures any IP address that was acquired, thus sending a DHCPRELEASE message. Example The following example acquires an IP address for Ethernet port 1/e16 from DHCP.
Console(config)# interface ethernet 1/e16 Console(config-if)# ip address dhcp
ip default-gateway
The ip default-gateway Global Configuration mode command defines a default gateway ( device). To return to the default configuration, use the no form of this command. Syntax
ip default-gateway ip-address no ip default-gateway
420
IP Addressing Commands
Parameters ip-address Valid IP address of the default gateway. Default Setting No default gateway is defined. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example defines default gateway 192.168.1.1.
Console(config)# ip default-gateway 192.168.1.1
show ip interface
The show ip interface Privileged EXEC mode command displays the usability status of configured IP interfaces. Syntax
show ip interface [ethernet interface-number | vlan vlan-id | port-channel
port-channel number] Parameters interface-number Valid Ethernet port. vlan-id Valid VLAN number. port-channel number Valid Port-channel number. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example the displays the configured IP interfaces and their types.
Console# show ip interface
421
Type -----Static
arp
The arp Global Configuration mode command adds a permanent entry in the Address Resolution Protocol (ARP) cache. To remove an entry from the ARP cache, use the no form of this command. Syntax
arp ip_addr hw_addr {ethernet interface-number | vlan vlan-id | port-channel
port-channel number}
no arp ip_addr {ethernet interface-number | vlan vlan-id | port-channel
port-channel number} Parameters ip_addr Valid IP address or IP alias to map to the specified MAC address. hw_addr Valid MAC address to map to the specified IP address or IP alias. interface-number Valid Ethernet port. vlan-id Valid VLAN number. port-channel number. Valid port-channel number. Default Setting This command has no default configuration. Command Mode Global Configuration mode
422
IP Addressing Commands
Command Usage The software uses ARP cache entries to translate 32-bit IP addresses into 48-bit hardware addresses. Because most hosts support dynamic resolution, static ARP cache entries do not generally have to be specified. Example The following example adds IP address 198.133.219.232 and MAC address 00:00:0c:40:0f:bc to the ARP table.
Console(config)# arp 198.133.219.232 00:00:0c:40:0f:bc ethernet 1/e6
arp timeout
The arp timeout Global Configuration mode command configures how long an entry remains in the ARP cache. To return to the default configuration, use the no form of this command. Syntax
arp timeout seconds no arp timeout
Parameters seconds Time (in seconds) that an entry remains in the ARP cache. (Range: 1 - 40000000) Default Setting The default timeout is 60000 seconds. Command Mode Global Configuration mode Command Usage It is recommended not to set the timeout value to less than 3600. Example The following example configures the ARP timeout to 12000 seconds.
Console(config)# arp timeout 12000
423
clear arp-cache
The clear arp-cache Privileged EXEC mode command deletes all dynamic entries from the ARP cache. Syntax
clear arp-cache
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example deletes all dynamic entries from the ARP cache.
Console# clear arp-cache
show arp
The show arp Privileged EXEC mode command displays entries in the ARP table. Syntax show arp [ip-address ip-address] [mac-address mac-address] [ethernet interface | port-channel port-channel-number] Parameters ip-address Displays the ARP entry of a specific IP address. mac-address Displays the ARP entry of a specific MAC address. interface Displays the ARP entry of a specific Ethernet port interface. port-channel-number Displays the ARP entry of a specific Port-channel number interface. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command.
424
IP Addressing Commands
Example The following example displays entries in the ARP table.
Console# show arp ARP timeout: 80000 Seconds
ip domain-lookup
The ip domain-lookup Global Configuration mode command enables the IP Domain Naming System (DNS)-based host name-to-address translation. To disable DNS-based host name-to-address translation, use the no form of this command. Syntax
ip domain-lookup no ip domain-lookup
Default Setting IP Domain Naming System (DNS)-based host name-to-address translation is enabled. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example enables IP Domain Naming System (DNS)-based host name-to-address translation.
Console(config)# ip domain-lookup
425
ip domain-name
The ip domain-name Global Configuration mode command defines a default domain name used by the software to complete unqualified host names (names without a dotted-decimal domain name). To remove the default domain name, use the no form of this command. Syntax
ip domain-name name no ip domain-name
Parameters name Specifies the default domain name used to complete unqualified host names. Do not include the initial period that separates an unqualified name from the domain name. (Range: 1-158 characters) Default Setting A default domain name is not defined. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example defines default domain name www.Alcatel.com.
Console(config)# ip domain-name www.Alcatel.com
ip name-server
The ip name-server Global Configuration mode command defines the available name servers. To remove a name server, use the no form of this command. Syntax
ip name-server server-address [server-address2 server-address8] no ip name-server [server-address1 server-address8]
426
IP Addressing Commands
Parameters server-address Specifies IP addresses of the name server. Default Setting No name server addresses are specified. Command Mode Global Configuration mode
Command Usage The preference of the servers is determined by the order in which they were entered. Up to 8 servers can be defined using one command or using multiple commands. Example The following example sets the available name server.
Console(config)# ip name-server 176.16.1.18
ip host
The ip host Global Configuration mode command defines static host name-to-address mapping in the host cache. To remove the name-to-address mapping, use the no form of this command. Syntax
ip host name address no ip host name
Parameters name Name of the host (Range: 1-158 characters) address Associated IP address. Default Setting No host is defined. Command Mode Global Configuration mode
427
Command Usage There are no user guidelines for this command. Example The following example defines a static host name-to-address mapping in the host cache.
Console(config)# ip host accounting.Alcatel.com 176.10.23.1
clear host
The clear host Privileged EXEC mode command deletes entries from the host name-to-address cache. Syntax clear host {name | *} Parameters name Specifies the host entry to be removed. (Range: 1-158 characters) * Removes all entries. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example deletes all entries from the host name-to-address cache.
Console# clear host *
428
The clear host dhcp Privileged EXEC mode command deletes entries from the host name-to-address mapping received from Dynamic Host Configuration Protocol (DHCP). Syntax
clear host dhcp {name | *}
Parameters name Specifies the host entry to be removed. (Range: 1-158 characters) * Removes all entries. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage This command deletes the host name-to-address mapping temporarily until the next renewal of the IP address. Example The following example deletes all entries from the host name-to-address mapping.
Console# clear host dhcp *
show hosts
The show hosts Privileged EXEC mode command displays the default domain name, a list of name server hosts, the static and the cached list of host names and addresses. Syntax
show hosts [name]
Parameters name Specifies the host name. (Range: 1-158 characters) Default Setting This command has no default configuration. Command Mode Privileged EXEC mode
429
Command Usage There are no user guidelines for this command. Example The following example displays host information.
Console# show hosts Host name: Device Default domain is gm.com, sales.gm.com, usa.sales.gm.com(DHCP) Name/address lookup is enabled Name servers (Preference order): 176.16.1.18 176.16.1.19
Configured host name-to-address mapping: Host ---accounting.gm.com Addresses --------176.16.8.8 176.16.8.9 (DHCP)
www.stanford.edu
72
171.64.14.203
430
LACP Commands
LACP Commands
Table 4-17. LACP Commands Command Function Mode GC ICE Page 4-431 4-432 4-432 4-433 4-435 lacp system-priority Configures the system priority. To return to the default configuration, use the no form of this command. lacp port-priority lacp timeout show lacp ethernet show lacp port-channel Configures physical port priority. To return to the default configuration, use the no form of this command.
Assigns an administrative LACP timeout. To return to the default ICE configuration, use the no form of this command. Displays LACP information for Ethernet ports. Displays LACP information for a port-channel. PE PE
lacp system-priority
The lacp system-priority Global Configuration mode command configures the system priority. To return to the default configuration, use the no form of this command. Syntax
lacp system-priority value no lacp system-priority
Parameters value Specifies system priority value. (Range: 1 - 65535) Default Setting The default system priority is 1. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example configures the system priority to 120.
Console(config)# lacp system-priority 120
431
lacp port-priority
The lacp port-priority Interface Configuration (Ethernet) mode command configures physical port priority. To return to the default configuration, use the no form of this command. Syntax
lacp port-priority value no lacp port-priority
Parameters value Specifies port priority. (Range: 1 - 65535) Default Setting The default port priority is 1. Command Mode Interface Configuration (Ethernet) mode Command Usage There are no user guidelines for this command. Example The following example defines the priority of Ethernet port 1/e6 as 247.
Console(config)# interface ethernet 1/e6 Console(config-if)# lacp port-priority 247
Related Commands lacp timeout show lacp ethernet show lacp port-channel
lacp timeout
The lacp timeout Interface Configuration (Ethernet) mode command assigns an administrative LACP timeout. To return to the default configuration, use the no form of this command. Syntax
lacp timeout {long | short} no lacp timeout
Parameters long Specifies the long timeout value. short Specifies the short timeout value. Default Setting The default port timeout value is long.
432
LACP Commands
Command Mode Interface Configuration (Ethernet) mode Command Usage There are no user guidelines for this command.
Example The following example assigns a long administrative LACP timeout to Ethernet port 1/e6 .
Console(config)# interface ethernet 1/e6 Console(config-if)# lacp timeout long
Related Commands lacp port-priority show lacp ethernet show lacp port-channel
Parameters interface Valid Ethernet port. (Full syntax: unit/port) parameters Link aggregation parameter information. statistics Link aggregation statistics information. protocol-state Link aggregation protocol-state information. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example display LACP information for Ethernet port 1/e1.
Console# show lacp ethernet 1/e1
433
system priority: system mac addr: port Admin key: port Oper key: port Oper number: port Admin priority: port Oper priority: port Admin timeout: port Oper timeout: LACP Activity: Aggregation: synchronization: collecting: distributing: expired: Partner system priority: system mac addr: port Admin key: port Oper key: port Oper number: port Admin priority: port Oper priority: port Oper timeout: LACP Activity: Aggregation: synchronization: collecting: distributing: expired:
Port 1/e1 LACP Statistics: LACP PDUs sent: LACP PDUs received: 2 2
434
LACP Commands
LACP State Machines: Receive FSM: Mux FSM: Periodic Tx FSM: Control Variables: BEGIN: LACP_Enabled: Ready_N: Selected: Port_moved: NNT: Port_enabled: Timer counters: periodic tx timer: current while timer: wait while timer: 0 0 0 FALSE TRUE FALSE UNSELECTED FALSE FALSE FALSE Port Disabled State Detached State No Periodic State
Parameters port_channel_number Valid port-channel number. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command.
435
Related Commands lacp system-priority lacp port-priority lacp timeout show lacp ethernet
436
Line Commands
Line Commands
Table 4-18. Line Commands Command line speed autobaud exec-timeout history history size terminal history Function Identifies a specific line for configuration and enters the Line Configuration command mode. Mode GC Page 4-437 4-438 4-439 4-439 4-440 4-440 4-441 4-442 4-443
Sets the line baud rate. To return to the default configuration, use LC the no form of the command. Sets the line for automatic baud rate detection (autobaud). To disable automatic baud rate detection, use the no form of the command. LC
Sets the interval that the system waits until user input is detected. LC To return to the default configuration, use the no form of this command. Enables the command history function. To disable the command LC history function, use the no form of this command. Configures the command history buffer size for a particular line. To LC reset the command history buffer size to the default configuration, use the no form of this command. Enables the command history function for the current terminal session. To disable the command history function, use the no form of this command. UE
terminal history size Configures the command history buffer size for the current UE terminal session. To reset the command history buffer size to the default setting, use the no form of this command. show line Displays line parameters. UE
line
The line Global Configuration mode command identifies a specific line for configuration and enters the Line Configuration command mode. Syntax
line {console | telnet | ssh}
Parameters console Console terminal line. telnet Virtual terminal for remote console access (Telnet). ssh Virtual terminal for secured remote console access (SSH). Default Setting This command has no default configuration. Command Mode Global Configuration mode
437
Command Usage There are no user guidelines for this command. Example The following example configures the device as a virtual terminal for remote console access.
Console(config)# line telnet Console(config-line)#
speed
The speed Line Configuration mode command sets the line baud rate. To return to the default configuration, use the no form of the command. Syntax
speed bps no speed
Parameters bpsBaud rate in bits per second (bps). Possible values are 2400, 9600, 19200, 38400, 57600 and 115200. Default Setting The default speed is 9600 bps. Command Mode Line Configuration (console) mode Command Usage This command is available only on the line console. The configured speed is applied when Autobaud is disabled. This configuration applies only to the current session. Examples The following example configures the line baud rate to 115200.
Console(config)# line console Console(config-line)# speed 115200
438
The autobaud Line Configuration mode command sets the line for automatic baud rate detection (autobaud). To disable automatic baud rate detection, use the no form of the command. Syntax
autobaud no autobaud
Default Setting Autobaud is disabled. Command Mode Line Configuration (console) mode Command Usage This command is available only on the line console. To start communication using Autobaud , press <Enter> twice. This configuration applies only to the current session. Example The following example enables autobaud.
Console(config)# line console Console(config-line)# autobaud
exec-timeout
The exec-timeout Line Configuration mode command sets the interval that the system waits until user input is detected. To return to the default configuration, use the no form of this command. Syntax
exec-timeout minutes [seconds] no exec-timeout
Parameters minutes Specifies the number of minutes. (Range: 0 - 65535) seconds Specifies additional time intervals in seconds. (Range: 0 - 59) Default Setting The default configuration is 10 minutes. Command Mode Line Configuration mode
439
Command Usage To specify no timeout, enter the exec-timeout 0 command. Example The following example configures the interval that the system waits until user input is detected to 20 minutes.
Console(config)# line console Console(config-line)# exec-timeout 20
history
The history Line Configuration mode command enables the command history function. To disable the command history function, use the no form of this command. Syntax
history no history
Default Setting The command history function is enabled. Command Mode Line Configuration mode Command Usage This command enables the command history function for a specified line. To enable or disable the command history function for the current terminal session, use the terminal history user EXEC mode command. Example The following example enables the command history function for telnet.
Console(config)# line telnet Console(config-line)# history
history size
The history size Line Configuration mode command configures the command history buffer size for a particular line. To reset the command history buffer size to the default configuration, use the no form of this command.
440
Line Commands
Syntax
history size number-of-commands no history size
Parameters number-of-commandsNumber of commands that the system records in its history buffer. (Range: 10 - 147) Default Setting The default history buffer size is 10. Command Mode Line Configuration mode Command Usage This command configures the command history buffer size for a particular line. To configure the command history buffer size for the current terminal session, use the terminal history size User EXEC mode command. Example The following example changes the command history buffer size to 100 entries for a particular line.
Console(config-line)# history size 100
terminal history
The terminal history user EXEC command enables the command history function for the current terminal session. To disable the command history function, use the no form of this command. Syntax
terminal history terminal no history
Default Setting The default configuration for all terminal sessions is defined by the history line configuration command. Command Mode User EXEC mode
441
Command Usage There are no user guidelines for this command. Example The following example disables the command history function for the current terminal session.
Console# terminal no history
Parameters number-of-commands Specifies the number of commands the system may record in its command history buffer. The buffer size is dependent on device resources. Default Setting The command history buffer size has no default. Command Mode User EXEC mode Command Usage The terminal history size user EXEC command configures the size of the command history buffer for the current terminal session. To change the default size of the command history buffer, use the history line configuration command. Example The following example configures the command history buffer size to 20 commands for the current terminal session.
Console# terminal history size 20
442
Parameters console Console terminal line. telnet Virtual terminal for remote console access (Telnet). ssh Virtual terminal for secured remote console access (SSH). Default Setting If the line is not specified, the default value is console. Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the line configuration.
Console> show line
Console configuration: Interactive timeout: Disabled History: 10 Baudrate: 9600 Databits: 8 Parity: none Stopbits: 1
443
Related Commands line speed autobaud exec-timeout history history size terminal historyterminal history size
444
deny (Management) Defines a deny rule. Restricts management connections by defining the active management access list. To disable this restriction, use the no form of this command. Sets the interval that the command interpreter waits until user input is detected
Sets the password intrusion threshold, which limits the number of PE failed logon attempts
management access-list
The management access-list Global Configuration mode command configures a management access list and enters the Management Access-list Configuration command mode. To delete an access list, use the no form of this command. Syntax
management access-list name no management access-list name
Parameters name Access list name. (Range: 1-32 characters) Default Setting This command has no default configuration. Command Mode Global Configuration mode Command Usage Use this command to configure a management access list. The command enters the Access-list Configuration mode, where permit and deny access rules are defined using the permit (Management) and deny (Management) commands. If no match criteria are defined, the default is deny.
445
Example The following example creates a management access list called mlist, configures management Ethernet interfaces 1/e1 and 2/e9 and makes the new access list the active list.
Console(config)# management Console(config-macl)# permit Console(config-macl)# permit Console(config-macl)# exit Console(config)# management
The following example creates a management access list called mlist, configures all interfaces to be management interfaces except Ethernet interfaces 1/e1 and 2/e9 and makes the new access list the active list.
Console(config)# management access-list mlist Console(config-macl)# deny ethernet 1/e1 Console(config-macl)# deny ethernet 2/e9 Console(config-macl)# permit Console(config-macl)# exit Console(config)# management access-class mlist
Related Commands permit (Management) deny (Management) show management access-list show management access-class management access-class
permit (Management)
The permit Management Access-List Configuration mode command defines a permit rule. Syntax
permit [ethernet interface-number | vlan vlan-id | port-channel port-channel-number] [service service]
446
permit ip-source ip-address [mask mask | prefix-length] [ethernet interface-number | vlan vlan-id | port-channel port-channel-number | ] [service
service] Parameters interface-number A valid Ethernet port number. vlan-id A valid VLAN number. port-channel-number A valid port channel index. ip-address A valid source IP address. mask A valid network mask of the source IP address. prefix-length Number of bits that comprise the source IP address prefix. The prefix length must be preceded by a forward slash (/). (Range: 0 - 32) service Service type. Possible values: telnet, ssh, http, https and snmp. Default Setting If no permit rule is defined, the default is set to deny. Command Mode Management Access-list Configuration mode Command Usage Rules with Ethernet, VLAN and port-channel parameters are valid only if an IP address is defined on the appropriate interface. The system supports up to 128 management access rules. Example The following example permits all ports in the mlist access list.
Console(config)# management access-list mlist Console(config-macl)# permit
deny (Management)
The deny Management Access-List Configuration mode command defines a deny rule. Syntax
deny [ethernet interface-number | vlan vlan-id | port-channel port-channel-number] [service service] deny ip-source ip-address [mask mask | prefix-length] [ethernet interface-number | vlan vlan-id | port-channel port-channel-number | ] [service service]
447
Parameters interface-number A valid Ethernet port number. vlan-id A valid VLAN number. port-channel-number A valid port-channel number. ip-address A valid source IP address. mask A valid network mask of the source IP address. mask prefix-length Specifies the number of bits that comprise the source IP address prefix. The prefix length must be preceded by a forward slash (/). (Range: 0-32) service Service type. Possible values: telnet, ssh, http, https and snmp. Default Setting This command has no default configuration. Command Mode Management Access-list Configuration mode Command Usage Rules with Ethernet, VLAN and port-channel parameters are valid only if an IP address is defined on the appropriate interface. The system supports up to 128 management access rules. Example The following example denies all ports in the access list called mlist.
Console(config)# management access-list mlist Console(config-macl)# deny
management access-class
The management access-class Global Configuration mode command restricts management connections by defining the active management access list. To disable this restriction, use the no form of this command. Syntax
management access-class {console-only | name} no management access-class
Parameters console-only Indicates that the device can be managed only from the console. name Specifies the name of the access list to be used.
448
Parameters name Specifies the name of a management access list. (Range: 1 - 32 characters) Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the mlist management access list.
Console# show management access-list mlist mlist ----permit ethernet 1/e1
449
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays information about the active management access list.
Console# show management access-class Management access-class is enabled, using access list mlist
450
4
Page 4-376 4-452 4-452 4-453
Parameters interface A valid Ethernet port. (Full syntax: unit/port) Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage The port to be tested should be shut down during the test, unless it is a combination port with fiber port active. The maximum length of the cable for the TDR test is 120 meter. Example The following example results in a report on the cable attached to port 1/e3.
Console# test copper-port tdr 1/e3 Cable is open at 64 meters Console# test copper-port tdr 2/e3 Cant perform this test on fiber ports
451
Parameters interface A valid Ethernet port. (Full syntax: unit/port) Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage The maximum length of the cable for the TDR test is 120 meter. Example The following example displays information on the last TDR test performed on all copper ports.
Console> show copper-ports tdr
Date ----
50
Test has not been performed Open Fiber 64 13:32:00 23 July 2005 -
452
Parameters interface A valid Ethernet port. (Full syntax: unit/port) detailed Detailed diagnostics. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode
453
Command Usage To test optical transceivers, ensure a fiber link is present. Examples The following examples display the optical transceiver diagnostics.
Console# show fiber-ports optical-transceiver
Power Port ---1/g1 1/g2 1/g3 Temp ---W OK Copper Voltage ------OK OK Current ------E OK Output -----OK OK Input ----OK OK TX Fault ------OK E LOS --OK OK
Temp Internally measured transceiver temperature. Voltage - Internally measured supply voltage. Current Measured TX bias current. Output Power Measured TX output power. Input Power Measured RX received power. Tx Fault Transmitter fault LOS Loss of signal N/A - Not Available, N/S - Not Supported, W - Warning, E - Error
Console# show fiber-ports optical-transceiver detailed Power Port Temp Voltag e [Volt] -----5.15 5.15 Current Output Input TX Fault LOS
[mA] ------50 10
Temp Internally measured transceiver temperature. Voltage - Internally measured supply voltage. Current Measured TX bias current. Output Power Measured TX output power. Input Power Measured RX received power. Tx Fault Transmitter fault LOS Loss of signal
454
interface port-channel
The interface port-channel Global Configuration mode command enters the interface configuration mode to configure a specific port-channel. Syntax
interface port-channel port-channel-number
Parameters port-channel-number A valid port-channel number. Default Setting This command has no default configuration. Command Mode Global Configuration mode Command Usage Eight aggregated links can be defined with up to eight member ports per port-channel. The aggregated links valid IDs are 1-8. Example The following example enters the context of port-channel number 1.
Console(config)# interface port-channel 1
455
Syntax interface range port-channel {port-channel-range | all} Parameters port-channel-range List of valid port-channels to add. Separate nonconsecutive port-channels with a comma and no spaces. A hyphen designates a range of port-channels. all All valid port-channels. Default Setting This command has no default configuration. Command Mode Global Configuration mode Command Usage Commands under the interface range context are executed independently on each interface in the range. Example The following example groups port-channels 1, 2 and 6 to receive the same command.
Console(config)# interface range port-channel 1-2,6
channel-group
The channel-group Interface Configuration (Ethernet) mode command associates a port with a port-channel. To remove a port from a port-channel, use the no form of this command. Syntax
channel-group port-channel-number mode {on | auto} no channel-group
Parameters port-channel_number Specifies the number of the valid port-channel for the current port to join. on Forces the port to join a channel without an LACP operation. auto Allows the port to join a channel as a result of an LACP operation. Default Setting The port is not assigned to a port-channel. Command Mode Interface Configuration (Ethernet) mode
456
Parameters port-channel-number Valid port-channel number. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays information on all port-channels.
Console# show interfaces port-channel
Channel ------1 2 3
Ports --------------------------------Active: 1/e1, 2/e2 Active: 2/e2, 2/e7 Inactive: 3/e1 Active: 3/e3, 3/e8
457
port monitor
The port monitor Interface Configuration mode command starts a port monitoring session. To stop a port monitoring session, use the no form of this command. Syntax
port monitor src-interface [rx | tx] no port monitor src-interface
Parameters src-interface Valid Ethernet port. (Full syntax: unit/port) rx Monitors received packets only. tx Monitors transmitted packets only. Default Setting Monitors both received and transmitted packets. Command Mode Interface Configuration (Ethernet) mode Command Usage This command enables traffic on one port to be copied to another port, or between the source port (src-interface) and a destination port (port being configured). The following restrictions apply to ports configured as destination ports: The port cannot be already configured as a source port. The port cannot be a member in a port-channel. An IP interface is not configured on the port. GVRP is not enabled on the port. The port is not a member of a VLAN, except for the default VLAN (will automatically be removed from the default VLAN). The following restrictions apply to ports configured to be source ports: The port cannot be already configured as a destination port.
458
Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example The following example shows how the port monitoring status is displayed.
Console# show ports monitor Source Port ----------1/e1 1/e2 1/e18 Destination Port ---------------1/e8 1/e8 1/e8 Type ----RX,TX RX,TX RX Status ------Active Active Active VLAN Tagging -----------No No No
459
Adds a comment or description of the powered device type to ICE enable the user to remember what is attached to the interface. To remove the description, use the no form of this command.
power inline priority Configures the inline power management priority of the interface. ICE To return to the default configuration, use the no form of this command. power inline usage-threshold power inline traps enable show power inline . Configures the threshold for initiating inline power usage alarms. GC To return to the default configuration, use the no form of this command. Enables inline power traps. To disable inline power traps, use the GC no form of this command. Displays the information about inline power. UE
power inline
The port inline Interface Configuration (Ethernet) mode command configures the administrative mode of inline power on an interface. Syntax
power inline {auto | never}
Parameters auto Enables the device discovery protocol and, if found, supplies power to the device. never Disables the device discovery protocol and stops supplying power to the device. Default Setting The device discovery protocol is enabled. Command Mode Interface Configuration (Ethernet) mode Command Usage There are no user guidelines for this command. Example The following example enables powered device discovery protocol on port 1/e1, so that power will be supplied to a discovered device.
Console(config)# interface ethernet 1/e1 Console(config-if)# power inline auto
460
Parameters pd-type Specifies the type of powered device attached to the interface (Range: 1-24 characters). Default Setting This command has no default configuration. Command Mode Interface Configuration (Ethernet) mode Command Usage There are no user guidelines for this command. Example The following example configures a description to an IP-phone to a powered device connected to Ethernet interface 1/e1.
Console(config)# interface ethernet 1/e1 Console(config-if)# power inline powered-device IP-phone
Related Commands power inline power inline priority power inline usage-threshold show power inline
461
Parameters critical Indicates that operating the powered device is critical. high Indicates that operating the powered device has high priority. low Indicates that operating the powered device has low priority. Default Setting The default setting is low priority. Command Mode Interface Configuration (Ethernet) mode Command Usage There are no user guidelines for this command. Example The following example configures the device connected to Ethernet interface 1/e1 as a high-priority powered device.
Console(config)# interface ethernet 1/e1 Console(config-if)# power inline priority high
Related Commands power inline power inline powered-device power inline usage-threshold show power inline
462
Example The following example configures the power usage threshold for which alarms are sent to 80%.
Console(config)# power inline usage-threshold 80
Related Commands power inline power inline powered-device power inline priority show power inline
Default Setting Inline power traps are disabled. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example enables inline power traps to be sent when a power usage threshold is exceeded.
Console(config)# power inline traps enable
463
Parameters interface Valid Ethernet port. (Full syntax: unit/port) Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays information about inline power.
Console# show power inline
Power: On Nominal Power: 150 Watt Consumed Power: 120 Watts (80%) Usage Threshold: 95% Traps: Enabled
Port ----
State -----
Priority --------
Status ------
1/e1
Auto
High
On
0.44 - 12.95
2/e1
Auto
Low
On
0.44 - 3.84
3/e1
Auto
Low
Off
N/A
464
Port ----
State -----
Priority --------
Status ------
1/e1
Auto
High
On
0.44 - 12.95
Overload Counter: 1 Short Counter: 0 Denied Counter: 0 Absent Counter: 0 Invalid Signature Counter: 0
The following table describes the significant fields shown in the example:
Field Power Nominal Power Consumed Power Usage Threshold Traps Port Powered Device State Priority Status Classification Overload Counter Short Counter Denied Counter Description The operational status of the inline power sourcing equipment. The nominal power of the inline power sourcing equipment in Watts. Measured usage power in Watts. The usage threshold expressed in percents for comparing the measured power and initiating an alarm if threshold is exceeded. Indicates if inline power traps are enabled. The Ethernet port number. Description of the powered device type. Indicates if the port is enabled to provide power. Can be: Auto or Never. The priority of the port from the point of view of inline power management. Can be: Critical, High or Low. Describes the inline power operational status of the port. Can be: On, Off, Test-Fail, Testing, Searching or Fault. The power consumption range of the powered device. Can be: 0.44 12.95, 0.44 3.84, 3.84 6.49 or 6.49 12.95. Counts the number of overload conditions that has been detected. Counts the number of short conditions that has been detected. Counts the number of times power has been denied.
465
Related Commands power inline power inline powered-device power inline priority power inline usage-threshold power inline traps enable
466
QoS Commands
QoS Commands
Table 4-24. QoS Commands Command qos show qos class-map show class-map match policy-map class rate-limit show policy-map trust cos-dscp Function Mode Page 4-468 4-469 4-469 4-470 4-471 4-472 4-472 4-473 4-474 4-475 Enables quality of service (QoS) on the device. To disable QoS on GC the device, use the no form of this command. Displays the quality of service (QoS) mode for the device. Creates or modifies a class map and enters the Class-map Configuration mode. To delete a class map, use the no form of this command. Displays all class maps. Defines the match criteria for classifying traffic. To delete the match criteria, use the no form of this command. UE GC UE CMC
Creates a policy map and enters the Policy-map Configuration GC mode. To delete a policy map, use the no form of this command. Defines a traffic classification and enters the Policy-map Class PMC Configuration mode. To remove a class map from the policy map, use the no form of this command. Limits the rate of the incoming traffic. Displays the policy maps. UE UE
Configures the trust state. The trust state determines the source PCC of the internal DSCP value used by Quality of Service (QoS). To return to the default configuration, use the no form of this command. Sets new values in the IP packet. Defines the policer for classified traffic. To remove a policer, use the no form of this command. PCC PCC
Defines the policer parameters that can be applied to multiple GC traffic classes within the same policy map. To remove an existing aggregate policer, use the no form of this command. Displays the aggregate policer parameter. UE
Applies an aggregate policer to multiple classes within the same PCC policy map. To remove an existing aggregate policer from a policy map, use the no form of this command. GC GC IC UE
wrr-queue cos-map Maps Class of Service (CoS) values to a specific egress queue. To return to the default configuration, use the no form of this command. priority-queue out num-of-queues traffic-shape show qos interface Configures the number of expedite queues. To return to the default configuration, use the no form of this command. Configures the shaper of the egress port/queue. To disable the shaper, use the no form of this command. Displays Quality of Service (QoS) information on the interface.
467
Command qos wrr-queue threshold qos map dscp-dp qos map policed-dscp qos map dscp-queue qos trust (Global) qos cos qos dscp-mutation qos map dscp-mutation show qos map
Function Assigns queue thresholds globally. To return to the default configuration, use the no form of this command. Use the qos map dscp-dp Global Configuration mode command to map DSCP to Drop Precedence. To return to the default setting, use the no form of this command.
Mode GC GC
Page 4-486 4-487 4-487 4-488 4-489 4-490 4-491 4-492 4-493
Modifies the policed-DSCP map for remarking purposes. To return GC to the default map, use the no form of this command. Modifies the DSCP to CoS map. To return to the default map, use GC the no form of this command. Configures the system to the basic mode and trust state. To return GC to the untrusted state, use the no form of this command. Defines the default CoS value of a port. To return to the default configuration, use the no form of this command. IC
Applies the DSCP Mutation map to a system DSCP trusted port. GC To return to the trust state with no DSCP mutation, use the no form of this command. Modifies the DSCP to DSCP mutation map. To return to the default DSCP to DSCP mutation map, use the no form of this command. Displays the QoS mapping information. GC GC
qos
The qos Global Configuration mode command enables quality of service (QoS) on the device. To disable QoS on the device, use the no form of this command. Syntax
qos [basic | advanced] no qos
Parameters basic QoS basic mode. advanced QoS advanced mode, which enables the full range of QoS configuration. Default Setting The QoS basic mode is enabled. Command Mode Global Configuration mode Command Usage If QoS Mode is set to Advanced, the command qos trust is applied only to packets that egress from the GE ports.
468
QoS Commands
Example The following example enables QoS on the device.
Console(config)# qos
show qos
The show qos User EXEC mode command displays the quality of service (QoS) mode for the device. Syntax
show qos
Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage Trust mode is displayed if QoS is enabled in basic mode. Example The following example displays QoS attributes when QoS is enabled in basic mode on the device.
Console> show qos Qos: basic Basic tust: dscp
class-map
The create-map Global Configuration mode command creates or modifies a class map and enters the Class-map Configuration mode. To delete a class map, use the no form of this command. Syntax
class-map class-map-name [match-all | match-any] no class-map class-map-name
Parameters class-map-name Specifies the name of the class map. match-all Checks that the packet matches all classification criteria in the class map match statement.
469
Default Setting By default, the match-all parameter is selected. Command Mode Global Configuration mode Command Usage The class-map Global Configuration mode command is used to define packet classification, marking and aggregate policing as part of a globally named service policy applied on a per-interface basis. The Class-Map Configuration mode enables entering up to two match Class-map Configuration mode commands to configure the classification criteria for the specified class. If two match Class-map Configuration mode commands are entered, each should point to a different type of ACL (e.g., one to an IP ACL and one to a MAC ACL). Since packet classification is based on the order of the classification criteria, the order in which the match Class-Map Configuration mode commands are entered is important. If there is more than one match statement in a match-all class map and the same classification field appears in the participating ACLs, an error message is generated.
Note: A class map in match-all mode cannot be configured if it contains both an IP ACL and a MAC ACL with an ether type that is not 0x0800.
Example The following example creates a class map called class1 and configures it to check that packets match all classification criteria in the class map match statement.
Console(config)# class-map class1 match-all Console(config-cmap)#
show class-map
The show class-map User EXEC mode command displays all class maps. Syntax
show class-map [class-map-name]
Parameters class-map-name Specifies the name of the class map to be displayed. Default Setting This command has no default configuration.
470
QoS Commands
Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example The following example shows the class map for class1.
Console> show class-map class1 Class Map match-any class1 (id4) Match Ip dscp 11 21
match
The match Class-map Configuration mode command defines the match criteria for classifying traffic. To delete the match criteria, use the no form of this command. Syntax
match access-group acl-name no match access-group acl-name
Parameters acl-name Specifies the name of an IP or MAC ACL. Default Setting No match criterion is supported. Command Mode Class-map Configuration mode. Command Usage There are no user guidelines for this command. Example The following example defines the match criterion for classifying traffic as an access group called Alcatel in a class map called class1..
Console (config)# class-map class1 Console (config-cmap)# match access-group alcatel
471
policy-map
The policy-map Global Configuration mode command creates a policy map and enters the Policy-map Configuration mode. To delete a policy map, use the no form of this command. Syntax
policy-map policy-map-name no policy-map policy-map-name
Parameters policy-map-name Specifies the name of the policy map. Default Setting If the packet is an IP packet, the DCSP value of the policy map is 0. If the packet is tagged, the CoS value is 0. Command Mode Global Configuration mode Command Usage Before configuring policies for classes whose match criteria are defined in a class map, use the policy-map Global Configuration mode command to specify the name of the policy map to be created or modified. Class policies in a policy map can only be defined if match criteria has already been defined for the classes. Use the class-map Global Configuration and match Class-map Configuration commands to define the match criteria of a class. Only one policy map per interface per direction is supported. A policy map can be applied to multiple interfaces and directions. Example The following example creates a policy map called policy1 and enters the Policy-map Configuration mode.
Console (config)# policy-map policy1 Console (config-pmap)#
class
The class Policy-map Configuration mode command defines a traffic classification and enters the Policy-map Class Configuration mode. To remove a class map from the policy map, use the no form of this command.
472
QoS Commands
Syntax
class class-map-name [access-group acl-name] no class class-map-name
Parameters class-map-name Specifies the name of an existing class map. If the class map does not exist, a new class map will be created under the specified name. acl-name Specifies the name of an IP or MAC ACL. Default Setting No policy map is defined. Command Mode Policy-map Configuration mode Command Usage Before modifying a policy for an existing class or creating a policy for a new class, use the policy-map Global Configuration mode command to specify the name of the policy map to which the policy belongs and to enter the Policy-map Configuration mode. Example The following example defines a traffic classification called class1 with an access-group called Alcatel. The class is in a policy map called policy1.
Console(config)# policy-map policy1 Console (config-pmap)# class class1 access-group Alcatel
rate-limit
The rate-limit interface configuration command limits the rate of the incoming traffic. The no form of this command is used to disable rate limit. Syntax
rate-limit rate no rate-limit
Parameters rate Maximum of kilobits per second of ingress traffic on a port. (Range: 62K - 100M) Default Setting 1000 Kbits/Sec Command Mode Interface configuration (Ethernet)
473
Command Usage The command can be enabled on a specific port only if port storm-control brodcast enable interface configuration command is not enabled on that port. Example The following example limits the rate of the incoming traffic to 62.
Console(config-ip)# rate-limit 62
rate-limit (VLAN)
The rate-limit VLAN global configuration command limits the rate of the incoming traffic for a VLAN. Use the no form to disable rate limit. Syntax rate-limit vlan committed-rate-kbps committed-burst-byte no rate-limit vlan Parameters vlan Specifies the VLAN ID. committed-rate-kbps The average traffic rate (CIR) in kbits per second(bps). committed-burst-byte The maximum burst size (CBS) in bytes. Default Setting Disabled. Command Mode Global configuration Command Usage Rate limit is calculated separately for each unit in a stack, and for each packet processor in a unit. Traffic policing in a policy map have precedence over VLAN rate limiting. I.e. if a packet is subject to traffic policing in a policy map and is associated with a VLAN that is rate limited, the packet would be counted only in the traffic policing of the policy map. Example The following example limits the rate of the incoming traffic for a VLAN.
Console(config)# rate-limit CIR CBS
show policy-map
The show policy-map User EXEC command displays the policy maps. Syntax
show policy-map [policy-map-name [class class-name]]
474
QoS Commands
Parameters policy-map-name Specifies the name of the policy map to be displayed. class-name Specifies the name of the class whose QoS policies are to be displayed. Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays all policy maps.
Console> show policy-map Policy Map policy1 class class1 set Ip dscp 7 Policy Map policy2 class class 2 police 96000 4800 exceed-action drop class class3 police 124000 96000 exceed-action policed-dscp-transmit
trust cos-dscp
The trust cos-dscp Policy-map Class Configuration mode command configures the trust state. The trust state determines the source of the internal DSCP value used by Quality of Service (QoS). To return to the default configuration, use the no form of this command. Syntax
trust cos-dscp no trust cos-dscp
Default Setting The port is not in the trust mode. If the port is in trust mode, the internal DSCP value is derived from the ingress packet. Command Mode Policy-map Class Configuration mode
475
Command Usage Action serviced to a class, so that if an IP packet arrives, the queue is assigned per DSCP. If a non-IP packet arrives, the queue is assigned per CoS (VPT). Example The following example configures the trust state for a class called class1 in a policy map called policy1.
Console (config)# policy-map policy1 Console (config-pmap)# class class1 Console (config-pmap-c)# trust cos-dscp
set
The set Policy-map Class Configuration mode command sets new values in the IP packet. Syntax
set {dscp new-dscp | queue queue-id | cos new-cos} no set
Parameters new-dscp Specifies a new DSCP value for the classified traffic (Range: 0-63). queue-id Specifies an explicit queue ID for setting the egress queue. new-cos Specifies a new user priority for marking the packet (Range: 0-7). Default Setting This command has no default configuration. Command Mode Policy-map Class Configuration mode Command Usage This command is mutually exclusive with the trust Policy-map Class Configuration command within the same policy map. Policy maps that contain set or trust Policy-map Class Configuration commands or that have ACL classifications cannot be attached to an egress interface by using the service-policy (Ethernet, Port-channel) Interface Configuration mode command. To return to the Policy-map Configuration mode, use the exit command. To return to privileged EXEC mode, use the end command.
476
QoS Commands
If QoS Mode is set to Advanced, the command qos trust is applied only to packets that egress from the GE ports. The command does not function an FE port.
Example The following example sets the dscp value in the packet to 56 for classes in in policy map called policy1.
Console (config)# policy-map policy1 Console (config-pmap)# set dscp 56 Console (config-if)# service-policy input policy1
police
The police Policy-map Class Configuration mode command defines the policer for classified traffic. To remove a policer, use the no form of this command. Syntax
police committed-rate-bps committed-burst-byte [exceed-action {drop | policed-dscp-transmit }] no police
Parameters committed-rate-bps Specifies the average traffic rate (CIR) in Kbps. (Range: 64-1000000) committed-burst-byte Specifies normal burst size (CBS) in bytes (Range: 4096-16769020). The FE maximum rate is 62500. drop Indicates that when the rate is exceeded, the packet is dropped. policed-dscp-transmit Indicates that when the rate is exceeded, the DSCP of the packet is remarked according to the policed-DSCP map as configured by the qos map policed-dscp Global Configuration mode command. Default Setting This command has no default configuration. Command Mode Policy-map Class Configuration mode Command Usage Policing uses a token bucket algorithm. CIR represents the speed with which the token is removed from the bucket. CBS represents the depth of the bucket.
477
Example The following example defines a policer for classified traffic. When the traffic rate exceeds 124,000 bps or the normal burst size exceeds 96000 bps, the packet is dropped. The class is called class1 and is in a policy map called policy1..
Console (config)# policy-map policy1 Console (config-pmap)# class class1 Console (config-pmap-c)# police 124000 9600 exceed-action drop
service-policy
The service-policy command applies a policy map to the input of a particular interface. Use no form in order to detach policy map from interface. Syntax service-policy input policy-map-name no service-policy input
no police
Parameters policy-map-name Applies the specified policy-map to the input interface. Default Setting This command has no default configuration. Command Mode Interface configuration (Ethernet, VLAN, Port-Channel). Command Usage One policy map per interface per direction is supported. Example The following command applies a policy map to the input of a particular interface.
Console(config)# interface ethernet 1/1 Console(config-if) service-policy input
qos aggregate-policer
The qos aggregate-policer Global Configuration mode command defines the policer parameters that can be applied to multiple traffic classes within the same policy map. To remove an existing aggregate policer, use the no form of this command.
478
QoS Commands
Syntax
qos aggregate-policer aggregate-policer-name committed-rate-bps excess-burst-byte exceed-action {drop | policed-dscp-transmit} [dscp dscp] no qos aggregate-policer
Parameters aggregate-policer-name Specifies the name of the aggregate policer. committed-rate-bps Specifies the average traffic rate (CIR) in Kbps (Range: 64-1000000). excess-burst-byte Specifies the excess burst size (CBS) in bytes (Range: 4096-16769020). The FE maximum rate is 62500. drop Indicates that when the rate is exceeded, the packet is dropped. policed-dscp-transmit Indicates that when the rate is exceeded, the DSCP of the packet is remarked. dscp Specifies the value that the DSCP would be remarked. If unspecified, the DSCP would be remarked according to the policed-DSCP map as configured by the qos map policed-dscp Global Configuration mode command. Default Setting No aggregate policer is define. Command Mode Global Configuration mode Command Usage Policers that contain set or trust Policy-map Class Configuration commands or that have ACL classifications cannot be attached to an output interface. Define an aggregate policer if the policer is shared with multiple classes. Policers in one port cannot be shared with other policers in another device; traffic from two different ports can be aggregated for policing purposes. An aggregate policer can be applied to multiple classes in the same policy map. An aggregate policer cannot be applied across multiple policy maps. This policer can also be used in Cascade police to make a cascade policer. An aggregate policer cannot be deleted if it is being used in a policy map. The no police aggregate Policy-map Class Configuration command must first be used to delete the aggregate policer from all policy maps. Policing uses a token bucket algorithm. CIR represents the speed with which the token is removed from the bucket. CBS represents the depth of the bucket. Example The following example defines the parameters of a policer called policer1 that can be applied to multiple classes in the same policy map. When the average traffic rate
479
exceeds 124,000 bps or the normal burst size exceeds 96000 bps, the packet is dropped..
Console (config)# qos aggregate-policer policer1 124000 96000
exceed-action drop
Parameters aggregate-policer-name Specifies the name of the aggregate policer to be displayed. Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines. Example The following example displays the parameters of the aggregate policer called policer1.
Console> show qos aggregate-policer policer1 aggregate-policer policer1 96000 4800 exceed-action drop not used by any policy map
480
The police aggregate Policy-map Class Configuration mode command applies an aggregate policer to multiple classes within the same policy map. To remove an existing aggregate policer from a policy map, use the no form of this command. Syntax
police aggregate aggregate-policer-name no police aggregate aggregate-policer-name
Parameters aggregate-policer-name Specifies the name of the aggregate policer. Default Setting This command has no default configuration. Command Mode Policy-map Class Configuration mode Command Usage An aggregate policer can be applied to multiple classes in the same policy map; An aggregate policer cannot be applied across multiple policy maps or interfaces. To return to the Policy-map Configuration mode, use the exit command. To return to the Privileged EXEC mode, use the end command. Example The following example applies the aggregate policer called policer1 to a calass called class1 in policy map called policy1.
Console(config)# policy-map policy1 Console(config-pmap)# class class1 Console(config-pmap-c)# police aggregate policer1
wrr-queue cos-map
The wrr-queue cos-map Global Configuration mode command maps Class of Service (CoS) values to a specific egress queue. To return to the default configuration, use the no form of this command. Syntax
wrr-queue cos-map queue-id cos1...cos8 no wrr-queue cos-map [queue-id]
481
Parameters queue-id Specifies the queue number to which the CoS values are mapped. cos1...cos8 Specifies CoS values to be mapped to a specific queue (Range: 0-7). Default Setting There is no default configuration for this command. Command Mode Global Configuration mode Command Usage This command can be used to distribute traffic into different queues, where each queue is configured with different Weighted Round Robin (WRR) and Weighted Random Early Detection (WRED) parameters. It is recommended to specifically map a single VPT to a queue, rather than mapping multiple VPTs to a single queue. Use the priority-queue out Interface Configuration (Ethernet, Port-channel) mode command to enable expedite queues. Example The following example maps CoS 7 to queue 2.
Console(config)# wrr-queue cos-map 2 7
Parameters number-of-queues Specifies the number of expedite queues. Expedite queues have higher indexes (Range: 0-4). Default Setting All queues are expedite queues. Command Mode Global Configuration mode
482
QoS Commands
Command Usage Configuring the number of expedite queues affects the Weighted Round Robin (WRR) weight ratio because fewer queues participate in the WRR. Example The following example configures the number of expedite queues as 0.
Console(config)# priority-queue out num-of-queues 0
traffic-shape
The traffic-shape Interface Configuration (Ethernet, port-channel) mode command configures the shaper of the egress port. To disable the shaper, use the no form of this command. Syntax
traffic-shape { committed-rate committed-burst } no traffic-shape
Parameters committed-rate Specifies the average traffic rate (CIR) in Kbps. (Range: 64-1000000) excess-burst Specifies the excess burst size (CBS) in bytes. (Range: 4096-16769020). The FE maximum rate is 62500. Default Setting No shape is defined. Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage This command activates the shaper on a specified egress port. To activate the shaper on an egress port, enter the Interface Configuration mode and specify the port number. Then run this command without the queue-id parameter. The CIR and the CBS will be applied to the specified port. Example The following example sets a shaper on Ethernet port 1/g1 when the average traffic rate exceeds 124000 bps or the normal burst size exceeds 96000 bps.
Console(config)# interface ethernet 1/g1 Console(config-if) traffic-shape 124000 96000
483
484
QoS Commands
Notify Q depth
qid 1 2 3 4 5 6 7 8
qid 1 2 3 4 5 6 7 8
qid
Weight
1 2 3 4 5 6 7 8
485
Parameters gigabitethernet Indicates that the thresholds are to be applied to Gigabit Ethernet ports. queue-id Specifies the queue number to which the threshold is assigned. threshold-percentage 0,1,2 Specifies the queue threshold percentage value. Each value is separated by a space. (Range: 0-100) Default Setting 80 percent for all thresholds. Command Mode Global Configuration mode. Command Usage The packet refers to a certain threshold by the conformance level. If threshold 0 is exceeded, packets with the corresponding DP are dropped until the threshold is no longer exceeded. However, packets assigned to threshold 1 or 2 continue to be queued and sent as long as the second or third threshold is not exceeded. Example The following example assigns a threshold of 80 percent to WRR queue 1.
Console (config)# qos wrr-queue threshold gigabitethernet 1 80
486
Use the qos map dscp-dp Global Configuration mode command to map DSCP to Drop Precedence. To return to the default setting, use the no form of this command. Syntax
qos map dscp-dp dscp-list to dp no qos map dscp-dp
Parameters dscp-list Specifies up to 8 DSCP values separated by a space. dp Enter the Drop Precedence value to which the DSCP value corresponds. (Possible values are 0 - 2 where 2 is the highest Drop Precedence) dp Enter the Drop Precedence value to which the DSCP value corresponds. (Possible values are 0 - 1 where 1 is the highest Drop Precedence) Parameters Range dscp-list 0 -63 dp 0 -2 dp 0 -1 Default Setting All the DSCPs are mapped to Drop Precedence 0. Command Mode Global Configuration mode. Command Usage There are no user guidelines for this command.
Example The following example maps DSCP value 123 to Drop Precedence 1.
Console (config)# qos map dscp-dp 123 to 1
487
Parameters dscp- list Specifies up to 8 DSCP values separated by a space. (Range: 0-63) dscp-mark-down Specifies the DSCP value to mark down. (Range: 0-63) Default Setting The default map is the Null map, which means that each incoming DSCP value is mapped to the same DSCP value. Command Mode Global Configuration mode. Command Usage DSCP values 3,11,19 cannot be remapped to other values.
Example
The following example marks down incoming DSCP value 3 as DSCP value 43 on the policed-DSCP map.
Console(config)# qos map policed-dscp 3 to 43 Reserved DSCP. DSCP 3 was not configured.
Parameters dscp-list Specifies up to 4 DSCP values separated by a space. (Range: 0 - 63) queue-id Specifies the queue number to which the DSCP values are mapped. Default Setting The following table describes the default map.
DSCP value Queue-ID 0-15 1 16-31 2 32-47 3 48-63 4
488
QoS Commands
Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example maps DSCP values 33, 40 and 41 to queue 1.
Console(config)# qos map dscp-queue 33 40 41 to 1
Parameters cos Indicates that ingress packets are classified with packet CoS values. Untagged packets are classified with the default port CoS value. dscp Indicates that ingress packets are classified with packet DSCP values. Default Setting CoS is the default trust mode. Command Mode Global Configuration mode Command Usage Packets entering a quality of service (QoS) domain are classified at the edge of the QoS domain. When packets are classified at the edge, the switch port within the QoS domain can be configured to one of the trusted states because there is no need to classify the packets at every device in the domain. A switch port on an inter-QoS domain boundary can be configured to the DSCP trust state, and, if the DSCP values are different between the QoS domains, the DSCP to DSCP mutation map can be applied. Use this command to specify whether the port is trusted and which fields of the packet to use to classify traffic.
489
Example The following example configures the system to the DSCP trust state.
Console(config)# qos trust dscp
qos cos
The qos cos Interface Configuration (Ethernet, port-channel) mode command defines the default CoS value of a port. To return to the default configuration, use the no form of this command. Syntax
qos cos default-cos
Parameters default-cos Specifies the default CoS value of the port. (Range: 0 - 7) Default Setting Default CoS value of a port is 0.
490
QoS Commands
Command Mode Interface Configuration (Ethernet, port-channel) mode
Command Usage If the port is trusted, the default CoS value of the port is used to assign a CoS value to all untagged packets entering the port. Example The following example configures port 1/e15 default CoS value to 3.
Console(config)# interface ethernet 1/e15 Console(config-if) qos cos 3
qos dscp-mutation
The qos dscp-mutation Global Configuration mode command applies the DSCP Mutation map to a system DSCP trusted port. To return to the trust state with no DSCP mutation, use the no form of this command. Syntax
qos dscp-mutation no qos dscp-mutation
Default Setting This command has no default configuration. Command Mode Global Configuration mode. Command Usage The DSCP to DSCP mutation map is applied to a port at the boundary of a Quality of Service (QoS) administrative domain. If two QoS domains have different DSCP definitions, use the DSCP to DSCP mutation map to match one set of DSCP values with the DSCP values of another domain. Apply the DSCP to DSCP mutation map only to ingress and to DSCP-trusted ports. Applying this map to a port causes IP packets to be rewritten with newly mapped DSCP values at the ingress ports. If the DSCP to DSCP mutation map is applied to an untrusted port, class of service (CoS) or IP-precedence trusted port, this command has no immediate effect until the port becomes DSCP-trusted.
491
Example The following example applies the DSCP Mutation map to system DSCP trusted ports.
Console(config)# qos dscp-mutation
no qos map dscp-mutation Parameters in-dscp Specifies up to 8 DSCP values separated by spaces. (Range: 0-63) out-dscp Specifies up to 8 DSCP values separated by spaces. (Range: 0-63) Default Setting The default map is the Null map, which means that each incoming DSCP value is mapped to the same DSCP value. Command Mode Global Configuration mode. Command Usage This is the only map that is not globally configured. it is possible to have several maps and assign each one to different ports. Example The following example changes DSCP values 1, 2, 4, 5 and 6 to DSCP mutation map value 63.
Console (config)# qos map dscp-mutation 1 2 4 5 6 to 63
492
QoS Commands
The following table describes the significant fields shown in the example:
Field Power Nominal Power Consumed Power Usage Threshold Traps Port Powered Device State Priority Status Classification Overload Counter Short Counter Denied Counter Absent Counter Invalid Signature Counter Description The operational status of the inline power sourcing equipment. The nominal power of the inline power sourcing equipment in Watts. Measured usage power in Watts. The usage threshold expressed in percents for comparing the measured power and initiating an alarm if threshold is exceeded. Indicates if inline power traps are enabled. The Ethernet port number. Description of the powered device type. Indicates if the port is enabled to provide power. Can be: Auto or Never. The priority of the port from the point of view of inline power management. Can be: Critical, High or Low. Describes the inline power operational status of the port. Can be: On, Off, Test-Fail, Testing, Searching or Fault.
The power consumption range of the powered device. Can be: 0.44 12.95, 0.44 3.84, 3.84 6.49 or 6.49 12.95. Counts the number of overload conditions that has been detected. Counts the number of short conditions that has been detected. Counts the number of times power has been denied. Counts the number of times power has been removed because powered device dropout was detected. Counts the number of times an invalid signature of a powered device was detected.
493
Default Configuration The default configuration is set to disabled. Command Mode EXEC mode User Guidelines There are no user guidelines for this command. Example The following example displays the QoS mapping information. Console> show qos map
494
RADIUS Commands
RADIUS Commands
Table 4-25. RADIUS Commands Command radius-server host radius-server key Function Mode Page 4-495 4-497 Specifies a RADIUS server host. To delete the specified RADIUS GC host, use the no form of this command. Sets the authentication and encryption key for all RADIUS communications between the device and the RADIUS daemon. To return to the default configuration, use the no form of this command. GC
Specifies the number of times the software searches the list of GC RADIUS server hosts. To reset the default configuration, use the no form of this command. Specifies the source IP address used for communication with RADIUS servers. To return to the default configuration, use the no form of this comman. GC
Sets the interval during which the device waits for a server host to GC reply. To return to the default configuration, use the no form of this command. Improves RADIUS response time when servers are unavailable. GC The command is used to cause the unavailable servers to be skipped. To return to the default configuration, use the no form of this command. GC
4-501
radius-server host
The radius-server host Global Configuration mode command specifies a RADIUS server host. To delete the specified RADIUS host, use the no form of this command. Syntax
radius-server host {ip-address | hostname} [auth-port auth-port-number] [timeout timeout] [retransmit retries] [deadtime deadtime] [key key-string] [source source] [priority priority] [usage type] no radius-server host {ip-address | hostname}
Parameters ip-address IP address of the RADIUS server host. hostname Hostname of the RADIUS server host. (Range: 1-158 characters) auth-port-number Port number for authentication requests. The host is not used for authentication if the port number is set to 0. (Range: 0-65535) timeout Specifies the timeout value in seconds. (Range: 1-30) retries Specifies the retransmit value. (Range: 1-10) deadtime Length of time in minutes during which a RADIUS server is
495
Default Setting No RADIUS server host is specified. The port number for authentication requests is 1812. The usage type is all. Command Mode Global Configuration mode Command Usage To specify multiple hosts, multiple radius-server host commands can be used. If no host-specific timeout, retries, deadtime or key-string values are specified, global values apply to each RADIUS server host. The address type of the source parameter must be the same as the
ip-address parameter.
To define a RADIUS server on the out-of-band port, use the out-of-band IP address format - oob/ip-address. Example The following example specifies a RADIUS server host with IP address 192.168.10.1, authentication request port number 20 and a 20-second timeout period.
Console(config)# radius-server host 192.168.10.1 auth-port 20 timeout 20
Related Commands radius-server key radius-server retransmit radius-server source-ip radius-server timeout radius-server deadtime
496
RADIUS Commands
show radius-servers
radius-server key
The radius-server key Global Configuration mode command sets the authentication and encryption key for all RADIUS communications between the device and the RADIUS daemon. To return to the default configuration, use the no form of this command. Syntax
radius-server key [key-string] no radius-server key
Parameters key-string Specifies the authentication and encryption key for all RADIUS communications between the device and the RADIUS server. This key must match the encryption used on the RADIUS daemon. (Range: 0-128 characters) Default Setting The key-string is an empty string. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example defines the authentication and encryption key for all RADIUS communications between the device and the RADIUS daemon.
Console(config)# radius-server key alcatel-server
Related Commands radius-server host radius-server retransmit radius-server source-ip radius-server timeout radius-server deadtime show radius-servers
radius-server retransmit
The radius-server retransmit Global Configuration mode command specifies the number of times the software searches the list of RADIUS server hosts. To reset the default configuration, use the no form of this command.
497
Syntax
radius-server retransmit retries no radius-server retransmit
Parameters retries Specifies the retransmit value. (Range: 1 - 10) Default Setting The software searches the list of RADIUS server hosts 3 times. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example configures the number of times the software searches the list of RADIUS server hosts to 5 times.
console(config)# radius-server retransmit 5
Related Commands radius-server host radius-server key radius-server source-ip radius-server timeout radius-server deadtime show radius-servers
radius-server source-ip
The radius-server source-ip Global Configuration mode command specifies the source IP address used for communication with RADIUS servers. To return to the default configuration, use the no form of this command. Syntax
radius-server source-ip source no radius-source-ip source
Parameters source Specifies a valid source IP address. Default Setting The source IP address is the IP address of the outgoing IP interface.
498
RADIUS Commands
Command Mode Global Configuration mode
Command Usage To define source-ip on the out-of-band port, use the out-of-band IP address format - oob/ip-address. Example The following example configures the source IP address used for communication with RADIUS servers to 10.1.1.1.
console(config)# radius-server source-ip 10.1.1.1
Related Commands radius-server host radius-server key radius-server retransmit radius-server timeout radius-server deadtime show radius-servers
radius-server timeout
The radius-server timeout Global Configuration mode command sets the interval during which the device waits for a server host to reply. To return to the default configuration, use the no form of this command. Syntax
radius-server timeout timeout no radius-server timeout
Parameters timeout Specifies the timeout value in seconds. (Range: 1 - 30) Default Setting The timeout value is 3 seconds. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example configures the timeout interval to 5 seconds.
Console(config)# radius-server timeout 5
499
Related Commands radius-server host radius-server key radius-server retransmit radius-server source-ip radius-server deadtime show radius-servers
radius-server deadtime
The radius-server deadtime Global Configuration mode command improves RADIUS response time when servers are unavailable. The command is used to cause the unavailable servers to be skipped. To return to the default configuration, use the no form of this command. Syntax
radius-server deadtime deadtime no radius-server deadtime
Parameters deadtime Length of time in minutes during which a RADIUS server is skipped over by transaction requests. (Range: 0 - 2000) Default Setting The deadtime setting is 0. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example sets the deadtime to 10 minutes.
Console(config)# radius-server deadtime 10
Related Commands radius-server host radius-server key radius-server retransmit radius-server source-ip radius-server timeout show radius-servers
500
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays RADIUS server settings.
Console# show radius-servers
IP address
TimeOu t
Retransm it
DeadTim e
Source IP
Priori ty
Usag e
-------172.16.1 .1 172.16.1 .2
-----Global
--------Global
------
-------
------1
---All
Global
11
Global
Global
All
501
502
RMON Commands
RMON Commands
Table 4-26. RMON Commands Command show interfaces status rmon collection history show rmon collection history show rmon history rmon alarm show rmon alarm-table show rmon alarm rmon event show rmon events show rmon log rmon table-size Function Displays RMON Ethernet statistics. Enables a Remote Monitoring (RMON) MIB history statistics group on an interface. To remove a specified RMON history statistics group, use the no form of this command. Displays the requested RMON history group statistics. Displays RMON Ethernet history statistics. Configures alarm conditions. To remove an alarm, use the no form of this command. Displays the alarms table. Displays alarm configuration. Mode UE IC UE UE GC UE UE Page 4-390 4-505 4-506 4-507 4-510 4-511 4-512 4-514 4-514 4-515 4-517
Configures an event. To remove an event, use the no form of this GC command. Displays the RMON event table. Displays the RMON log table. Configures the maximum size of RMON tables. To return to the default configuration, use the no form of this command. UE UE GC
port-channel-number} Parameters interface number Valid Ethernet port. port-channel-number Valid port-channel number. Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command.
503
Example The following example displays RMON Ethernet statistics for Ethernet port 1/e1.
Console> show rmon statistics ethernet 1/e1 Port: 1/e1 Octets: 878128 Broadcast: 7 CRC Align Errors: 0 Undersize Pkts: 0 Fragments: 0 64 Octets: 98 128 to 255 Octets: 0 512 to 1023 Octets: 491 Packets: 978 Multicast: 1 Collisions: 0 Oversize Pkts: 0 Jabbers: 0 65 to 127 Octets: 0 256 to 511 Octets: 0 1024 to max Octets: 389
504
RMON Commands
Jabbers
The total number of packets received longer than 1632 octets (excluding framing bits, but including FCS octets), and either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error). The total number of packets (including bad packets) received that are 64 octets in length (excluding framing bits but including FCS octets). The total number of packets (including bad packets) received that are between 65 and 127 octets in length inclusive (excluding framing bits but including FCS octets). The total number of packets (including bad packets) received that are between 128 and 255 octets in length inclusive (excluding framing bits but including FCS octets). The total number of packets (including bad packets) received that are between 256 and 511 octets in length inclusive (excluding framing bits but including FCS octets). The total number of packets (including bad packets) received that are between 512 and 1023 octets in length inclusive (excluding framing bits but including FCS octets). The total number of packets (including bad packets) received that are between 1024 and 1632 octets in length inclusive (excluding framing bits but including FCS octets).
64 Octets 65 to 127 Octets 128 to 255 Octets 256 to 511 Octets 512 to 1023 Octets 1024 to 1518 Octets
Parameters index Specifies the statistics group index . (Range: 1-65535) ownername Specifies the RMON statistics group owner name. bucket-number Number of buckets specified for the RMON collection history group of statistics. If unspecified, defaults to 50. (Range:1-65535) seconds Number of seconds in each polling cycle. (Range: 1-3600) Default Setting RMON statistics group owner name is an empty string. Number of buckets specified for the RMON collection history statistics group is 50. Number of seconds in each polling cycle is 1800.
505
Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage Cannot be configured for a range of interfaces (range context). Example The following example enables a Remote Monitoring (RMON) MIB history statistics group on Ethernet port 1/e1 with index number 1 and a polling interval period of 2400 seconds.
Console(config)# interface ethernet 1/e1 Console(config-if)# rmon collection history 1 interval 2400
port-channel-number] Parameters interface Valid Ethernet port. (Full syntax: unit/port) port-channel-number Valid port-channel number. Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays all RMON history group statistics.
Console> show rmon collection history
Index
Interface
Interval
Owner
-----
---------
--------
-------
506
RMON Commands
1 2
1/e1 1/e1
30 1800
50 50
50 50
CLI Manager
Parameters index Specifies the requested set of samples. (Range: 1 - 65535) throughput Indicates throughput counters. errors Indicates error counters. other Indicates drop and collision counters. seconds Specifies the period of time in seconds. (Range: 1-4294967295) Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command.
507
Examples The following examples displays RMON Ethernet history statistics for index 1.
Console> show rmon history 1 throughput Sample Set: 1 Interface: 1/e1 Requested samples: 50 Owner: CLI Interval: 1800 Granted samples: 50
Time
Octets
Util
--------------------
---------
-----
303595962 287696304
19% 20%
Console> show rmon history 1 errors Sample Set: 1 Interface: 1/e1 Requested samples: 50 Owner: Me Interval: 1800 Granted samples: 50
Time
CRC Align
Oversiz e ------0 0
Fragmen ts -------49 27
Jabbe rs -----0 0
----------
---------
1 1
Console> show rmon history 1 other Sample Set: 1 Interface: 1/e1 Requested samples: 50 Owner: Me Interval: 1800 Granted samples: 50
508
RMON Commands
Time
Droppe d ------3 3
--------------------
Undersize
Oversize
Fragments
509
Jabbers
Dropped
Collisions
rmon alarm
The rmon alarm Global Configuration mode command configures alarm conditions. To remove an alarm, use the no form of this command. Syntax
rmon alarm index MIB_OBJECT_ID interval rthreshold fthreshold revent fevent [type type] [startup direction] [owner name] no rmon alarm index
Parameters index Specifies the alarm index. (Range: 1-65535) MIB_OBJECT_ID Specifies the object identifier (MIB Number) of the variable to be sampled. interval Specifies the interval in seconds during which the data is sampled and compared with rising and falling thresholds. (Range: 1-4294967295) rthreshold Specifies the rising threshold. (Range: 0-4294967295) fthreshold Specifies the falling threshold. (Range: 0-4294967295) revent Specifies the event index used when a rising threshold is crossed. (Range: 1-65535) fevent Specifies the event index used when a falling threshold is crossed. (Range: 1-65535) type Specifies the method used for sampling the selected variable and calculating the value to be compared against the thresholds. Possible values are absolute and delta. - If the method is absolute, the value of the selected variable is compared directly with the thresholds at the end of the sampling interval. If the method is delta, the selected variable value of the last sample is subtracted from the current value, and the difference is compared with the thresholds. direction Specifies the alarm that may be sent when this entry is first set to valid. Possible values are rising, rising-falling and falling.
510
RMON Commands
- If the first sample (after this entry becomes valid) is greater than or equal to rthreshold and direction is equal to rising or rising-falling, a single rising alarm is generated. If the first sample (after this entry becomes valid) is less than or equal to fthreshold and direction is equal to falling or rising-falling, a single falling alarm is generated. name Specifies the name of the person who configured this alarm. If unspecified, the name is an empty string. Default Setting The type is absolute. The startup direction is rising-falling. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example configures the following alarm conditions: Alarm index 1000 MIB_OBJECT_ID MIB Number Sample interval 360000 seconds Rising threshold 1000000 Falling threshold 1000000 Rising threshold event index 10 Falling threshold event index 20
Default Setting This command has no default configuration. Command Mode User EXEC mode
511
Command Usage There are no user guidelines for this command. Example The following example displays the alarms table.
Console> show rmon alarm-table
Index ----1 2 3
Parameters number Specifies the alarm index. (Range: 1 - 65535) Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command.
512
RMON Commands
Example The following example displays RMON 1 alarms.
Console> show rmon alarm 1 Alarm 1 ------OID: 1.3.6.1.2.1.2.2.1.10.1 Last sample Value: 878128 Interval: 30 Sample Type: delta Startup Alarm: rising Rising Threshold: 8700000 Falling Threshold: 78 Rising Event: 1 Falling Event: 1 Owner: CLI
The following table describes the significant fields shown in the display:
Field Alarm OID Last Sample Value Description Alarm index. Monitored variable OID. The statistic value during the last sampling period. For example, if the sample type is delta, this value is the difference between the samples at the beginning and end of the period. If the sample type is absolute, this value is the sampled value at the end of the period. The interval in seconds over which the data is sampled and compared with the rising and falling thresholds. The method of sampling the variable and calculating the value compared against the thresholds. If the value is absolute, the value of the variable is compared directly with the thresholds at the end of the sampling interval. If the value is delta, the value of the variable at the last sample is subtracted from the current value, and the difference compared with the thresholds. The alarm that may be sent when this entry is first set. If the first sample is greater than or equal to the rising threshold, and startup alarm is equal to rising or rising and falling, then a single rising alarm is generated. If the first sample is less than or equal to the falling threshold, and startup alarm is equal falling or rising and falling, then a single falling alarm is generated. A sampled statistic threshold. When the current sampled value is greater than or equal to this threshold, and the value at the last sampling interval is less than this threshold, a single event is generated. A sampled statistic threshold. When the current sampled value is less than or equal to this threshold, and the value at the last sampling interval is greater than this threshold, a single event is generated. The event index used when a rising threshold is crossed. The event index used when a falling threshold is crossed. The entity that configured this entry.
Startup Alarm
Rising Threshold
Falling Threshold
513
rmon event
The rmon event Global Configuration mode command configures an event. To remove an event, use the no form of this command. Syntax
rmon event index type [community text] [description text] [owner name] no rmon event index
Parameters index Specifies the event index. (Range: 1 - 65535) type Specifies the type of notification generated by the device about this event. Possible values: none, log, trap, log-trap. community text If the specified notification type is trap, an SNMP trap is sent to the SNMP community specified by this octet string. (Range: 0-127 characters) description text Specifies a comment describing this event. (Range: 0-127 characters) name Specifies the name of the person who configured this event. If unspecified, the name is an empty string. Default Setting This command has no default configuration. Command Mode Global Configuration mode Command Usage If log is specified as the notification type, an entry is made in the log table for each event. If trap is specified, an SNMP trap is sent to one or more management stations. Example The following example configures an event identified as index 10 and for which the device generates a notification in the log table.
Console(config)# rmon event 10 log
514
RMON Commands
Syntax
show rmon events
Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the RMON event table.
Console> show rmon events
Inde x --1 2
Description
Type
Community
Owner
-------Log Log-Trap
---------
-----CLI
device
Manage r
515
Syntax
show rmon log [event]
Parameters event Specifies the event index. (Range: 0 - 65535) Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the RMON log table.
Console> show rmon log Maximum table size: 500 Event ------1 1 2 Description -------------Errors Errors High Broadcast Time --------Jan 18 2002 23:48:19 Jan 18 2002 23:58:17 Jan 18 2002 23:59:48
Console> show rmon log Maximum table size: 500 (800 after reset) Event ------1 1 2 Description -------------Errors Errors High Broadcast Time --------Jan 18 2002 23:48:19 Jan 18 2002 23:58:17 Jan 18 2002 23:59:48
The following table describes the significant fields shown in the display:
Field Event Description Time Description An index that uniquely identifies the event. A comment describing this event. The time this entry was created.
516
RMON Commands
Related Commands rmon alarm
rmon table-size
The rmon table-size Global Configuration mode command configures the maximum size of RMON tables. To return to the default configuration, use the no form of this command. Syntax
rmon table-size {history entries | log entries} no rmon table-size {history | log}
Parameters history entries Maximum number of history table entries. (Range: 20-32767) log entries Maximum number of log table entries. (Range: 20-32767) Default Setting History table size is 270. Log table size is 200. Command Mode Global Configuration mode Command Usage The configured table size taskes effect after the device is rebooted. Example The following example configures the maximum RMON history table sizes to 100 entries.
Console(config)# rmon table-size history 100
517
4
.
SNMP Commands
Table 4-27. SNMP Commands Command snmp-server community snmp-server view snmp-server group snmp-server userr snmp-server engineID locall Function Configures the community access string to permit access to the SNMP protocol. To remove the specified community string, use the no form of this command. Creates or updates a Simple Network Management Protocol (SNMP) server view entry. To remove a specified SNMP server view entry, use the no form of this command. Mode GC GC Page 4-519 4-520 4-521 4-522 4-523 4-525 4-525 4-526 4-528 4-529 4-529 4-530 4-531 4-531 4-533 4-534 4-535 4-536 4-536
Configures a new Simple Management Protocol (SNMP) group or GC a table that maps SNMP users to SNMP views. To remove a specified SNMP group, use the no form of this command. Configures a new SNMP Version 3 user. To remove a user, use the no form of this command. GC
Specifies the Simple Network Management Protocol (SNMP) GC engineID on the local device. To remove the configured engine ID, use the no form of this command.
snmp-server enable Enables the device to send SNMP traps. To disable SNMP traps, GC traps use the no form of the command. snmp-server filter snmp-server host snmp-server v3-hostt snmp-server trap authentication Creates or updates a Simple Network Management Protocol GC (SNMP) server filter entry. To remove the specified SNMP server filter entry, use the no form of this command. Specifies the recipient of Simple Network Management Protocol GC Version 1 or Version 2 notifications. To remove the specified host, use the no form of this command. Specifies the recipient of Simple Network Management Protocol GC Version 3 notifications. To remove the specified host, use the no form of this command. Enables the device to send SNMP traps when authentication fails. GC To disable SNMP failed authentication traps, use the no form of this command. GC GC GC PE
snmp-server contact Configures the system contact (sysContact) string. To remove system contact information, use the no form of the command. snmp-server location snmp-server sett show snmp Configures the system location string. To remove the location string, use the no form of this command. Defines the SNMP MIB value. Displays the SNMP status.
show snmp engineid Displays the ID of the local Simple Network Management Protocol PE (SNMP) engine. show snmp views show snmp groups show snmp filters show snmp users . Displays the configuration of views. Displays the configuration of groups. Displays the configuration of filters. Displays the configuration of users. PE PE PE PE
518
The snmp-server community Global Configuration mode command configures the community access string to permit access to the SNMP protocol. To remove the specified community string, use the no form of this command. Syntax
snmp-server community community [ro | rw | su] [ip-address][view
view-name]
snmp-server community-group community group-name [ip-address] no snmp-server community community [ip-address]
Parameters community Community string that acts like a password and permits access to the SNMP protocol. (Range: 1-20 characters) ro Indicates read-only access (default). rw Indicates read-write access. su Indicates SNMP administrator access. ip-address Specifies the IP address of the management station. group-name Specifies the name of a previously defined group. A group defines the objects available to the community. (Range: 1-30 characters) view-name Specifies the name of a previously defined view. The view defines the objects available to the community. (Range: 1-30 characters) Default Setting No communities are defined. Command Mode Global Configuration mode Command Usage The view-name parameter cannot be specified for su, which has access to the whole MIB. The view-name parameter can be used to restrict the access rights of a community string. When it is specified: An internal security name is generated. The internal security name for SNMPv1 and SNMPv2 security models is mapped to an internal group name. The internal group name for SNMPv1 and SNMPv2 security models is mapped to a view-name (read-view and notify-view always, and for rw for write-view also) The group-name parameter can also be used to restrict the access rights of a community string. When it is specified: An internal security name is generated.
519
Example The following example defines community access string public to permit administrative access to SNMP protocol at an administrative station with IP address 192.168.1.20.
Console(config)# snmp-server community public su 192.168.1.20
snmp-server view
The snmp-server view Global Configuration mode command creates or updates a Simple Network Management Protocol (SNMP) server view entry. To remove a specified SNMP server view entry, use the no form of this command. Syntax
snmp-server view view-name oid-tree {included | excluded} no snmp-server view view-name [oid-tree]
Parameters view-name Specifies the label for the view record that is being created or updated. The name is used to reference the record. (Range: 1-30 characters) oid-tree Specifies the object identifier of the ASN.1 subtree to be included or excluded from the view. To identify the subtree, specify a text string consisting of numbers, such as 1.3.6.2.4, or a word, such as system. Replace a single subidentifier with the asterisk (*) wildcard to specify a subtree family; for example 1.3.*.4. included Indicates that the view type is included. excluded Indicates that the view type is excluded. Default Setting No view entry exists. Command Mode Global Configuration mode Command Usage This command can be entered multiple times for the same view record. The number of views is limited to 64. No check is made to determine that a MIB node corresponds to the "starting portion" of the OID until the first wildcard.
520
SNMP Commands
Example The following example creates a view that includes all objects in the MIB-II system group except for sysServices (System 7) and all objects for interface 1 in the MIB-II interface group.
Console(config)# snmp-server view user-view system included Console(config)# snmp-server view user-view system.7 excluded Console(config)# snmp-server view user-view ifEntry.*.1 included
snmp-server group
The snmp-server group Global Configuration mode command configures a new Simple Management Protocol (SNMP) group or a table that maps SNMP users to SNMP views. To remove a specified SNMP group, use the no form of this command. Syntax
snmp-server group groupname {v1 | v2 | v3 {noauth | auth | priv} [notify notifyview ] } [read readview] [write writeview] no snmp-server group groupname {v1 | v2 | v3 [noauth | auth | priv]}
Parameters groupname Specifies the name of the group. v1 Indicates the SNMP Version 1 security model. v2 Indicates the SNMP Version 2 security model. v3 Indicates the SNMP Version 3 security model. noauth Indicates no authentication of a packet. Applicable only to the SNMP Version 3 security model. auth Indicates authentication of a packet without encrypting it. Applicable only to the SNMP Version 3 security model. priv Indicates authentication of a packet with encryption. Applicable only to the SNMP Version 3 security model. readview Specifies a string that is the name of the view that enables only viewing the contents of the agent. If unspecified, all objects except for the community-table and SNMPv3 user and access tables are available. writeview Specifies a string that is the name of the view that enables entering data and configuring the contents of the agent. If unspecified, nothing is defined for the write view. notifyview Specifies a string that is the name of the view that enables specifying an inform or a trap. If unspecified, nothing is defined for the notify view. Applicable only to the SNMP Version 3 security model. Default Setting No group entry exists.
521
Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example attaches a group called user-group to SNMPv3 and assigns to the group the privacy security level and read access rights to a view called user-view.
Console(config)# snmp-server group user-group v3 priv read user-view
snmp-server user
The snmp-server user Global Configuration mode command configures a new SNMP Version 3 user. To remove a user, use the no form of this command. Syntax
snmp-server user username groupname [remote engineid-string] [ auth-md5 password | auth-sha password | auth-md5-key md5-des-keys | auth-sha-key sha-des-keys ] no snmp-server user username [remote engineid-string]
Parameters username Specifies the name of the user on the host that connects to the agent. (Range: 1-30 characters) groupname Specifies the name of the group to which the user belongs. (Range: 1-30 characters) engineid-string Specifies the engine ID of the remote SNMP entity to which the user belongs. The engine ID is a concatenated hexadecimal string. Each byte in the hexadecimal character string is two hexadecimal digits. Each byte can be separated by a period or colon. (Range: 5-32 characters) auth-md5 password Indicates the HMAC-MD5-96 authentication level. The user should enter a password for authentication and generation of a DES key for privacy. (Range: 1-32 characters) auth-sha password Indicates the HMAC-SHA-96 authentication level. The user should enter a password for authentication and generation of a DES key for privacy. (Range: 1-32 characters) auth-md5-key md5-des-keys Indicates the HMAC-MD5-96 authentication level. The user should enter a concatenated hexadecimal string of the MD5 key (MSB) and the privacy key (LSB). If authentication is
522
SNMP Commands
only required, 16 bytes should be entered; if authentication and privacy are required, 32 bytes should be entered. Each byte in the hexadecimal character string is two hexadecimal digits. Each byte can be separated by a period or colon. (16 or 32 bytes) auth-sha-key sha-des-keys Indicates the HMAC-SHA-96 authentication level. The user should enter a concatenated hexadecimal string of the SHA key (MSB) and the privacy key (LSB). If authentication is only required, 20 bytes should be entered; if authentication and privacy are required, 36 bytes should be entered. Each byte in the hexadecimal character string is two hexadecimal digits. Each byte can be separated by a period or colon. (20 or 36 bytes) Default Setting No group entry exists. Command Mode Global Configuration mode Command Usage If auth-md5 or auth-sha is specified, both authentication and privacy are enabled for the user. When a show running-config Privileged EXEC mode command is entered, a line for this user will not be displayed. To see if this user has been added to the configuration, type the show snmp users Privileged EXEC mode command. An SNMP EngineID has to be defined to add SNMP users to the device. Changing or removing the SNMP EngineID value deletes SNMPv3 users from the devices database. The remote engineid designates the remote management station and should be defined to enable the device to receive informs. Example The following example configures an SNMPv3 user John in group user-group.
Console(config)# snmp-server user John user-group
523
Parameters engineid-string Specifies a character string that identifies the engine ID. (Range: 5-32 characters) default The engine ID is created automatically based on the device MAC address. Default Setting The engine ID is not configured. If SNMPv3 is enabled using this command, and the default is specified, the default engine ID is defined per standard as: First 4 octets first bit = 1, the rest is IANA Enterprise number = 674. Fifth octet set to 3 to indicate the MAC address that follows. Last 6 octets MAC address of the device. Command Mode Global Configuration mode Command Usage To use SNMPv3, you have to specify an engine ID for the device. You can specify your own ID or use a default string that is generated using the MAC address of the device. If the SNMPv3 engine ID is deleted or the configuration file is erased, SNMPv3 cannot be used. By default, SNMPv1/v2 are enabled on the device. SNMPv3 is enabled only by defining the Local Engine ID. If you want to specify your own ID, you do not have to specify the entire 32-character engine ID if it contains trailing zeros. Specify only the portion of the engine ID up to the point where just zeros remain in the value. For example, to configure an engine ID of 123400000000000000000000, you can specify snmp-server engineID local 1234. Since the engine ID should be unique within an administrative domain, the following is recommended: For a standalone device, use the default keyword to configure the engine ID. For a stackable system, configure the engine ID and verify its uniqueness. Changing the value of the engine ID has the following important side-effect. A user's password (entered on the command line) is converted to an MD5 or SHA security digest. This digest is based on both the password and the local engine ID. The users command line password is then destroyed, as required by RFC 2274. As a result, the security digests of SNMPv3 users become invalid if the local value of the engine ID change, and the users will have to be reconfigured.
524
SNMP Commands
You cannot specify an engine ID that consists of all 0x0, all 0xF or 0x000000001.
The show running-config Privileged EXEC mode command does not display the SNMP engine ID configuration. To see the SNMP engine ID configuration, enter the snmp-server engineID local GlobalConfiguration mode command. Example The following example enables SNMPv3 on the device and sets the local engine ID of the device to the default value.
Console(config) # snmp-server engineID local default
Default Setting SNMP traps are enabled. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example enables SNMP traps.
Console(config)# snmp-server enable traps
snmp-server filter
The snmp-server filter Global Configuration mode command creates or updates a Simple Network Management Protocol (SNMP) server filter entry. To remove the specified SNMP server filter entry, use the no form of this command. Syntax
snmp-server filter filter-name oid-tree {included | excluded}
525
Parameters filter-name Specifies the label for the filter record that is being updated or created. The name is used to reference the record. (Range: 1-30 characters) oid-tree Specifies the object identifier of the ASN.1 subtree to be included or excluded from the view. To identify the subtree, specify a text string consisting of numbers, such as 1.3.6.2.4, or a word, such as system. Replace a single subidentifier with the asterisk (*) wildcard to specify a subtree family; for example, 1.3.*.4. included Indicates that the filter type is included. excluded Indicates that the filter type is excluded. Default Setting No filter entry exists. Command Mode Global Configuration mode Command Usage This command can be entered multiple times for the same filter record. Later lines take precedence when an object identifier is included in two or more lines. Example The following example creates a filter that includes all objects in the MIB-II system group except for sysServices (System 7) and all objects for interface 1 in the MIB-II interfaces group.
Console(config)# snmp-server filter filter-name system included Console(config)# snmp-server filter filter-name system.7 excluded Console(config)# snmp-server filter filter-name ifEntry.*.1 included
snmp-server host
The snmp-server host Global Configuration mode command specifies the recipient of Simple Network Management Protocol Version 1 or Version 2 notifications. To remove the specified host, use the no form of this command. Syntax
snmp-server host {ip-address | hostname} community-string [traps | informs] [1 | 2] [udp-port port] [filter filtername] [timeout seconds] [retries retries] no snmp-server host {ip-address | hostname} [traps | informs]
526
SNMP Commands
Parameters ip-address Specifies the IP address of the host (targeted recipient). hostname Specifies the name of the host. (Range:1-158 characters) community-string Specifies a password-like community string sent with the notification operation. (Range: 1-20) traps Indicates that SNMP traps are sent to this host. If unspecified, SNMPv2 traps are sent to the host. informs Indicates that SNMP informs are sent to this host. Not applicable to SNMPv1. 1 Indicates that SNMPv1 traps will be used. 2 Indicates that SNMPv2 traps will be used. If port Specifies the UDP port of the host to use. If unspecified, the default UDP port number is 162. (Range:1-65535) filtername Specifies a string that defines the filter for this host. If unspecified, nothing is filtered. (Range: 1-30 characters) seconds Specifies the number of seconds to wait for an acknowledgment before resending informs. If unspecified, the default timeout period is 15 seconds. (Range: 1-300) retries Specifies the maximum number of times to resend an inform request. If unspecified, the default maximum number of retries is 3. (Range: 1-255) Default Setting This command has no default configuration. Command Mode Global Configuration mode Command Usage When configuring an SNMPv1 or SNMPv2 notification recipient, a notification view for that recipient is automatically generated for all the MIB. When configuring an SNMPv1 notification recipient, the Inform option cannot be selected. If a trap and inform are defined on the same target, and an inform was sent, the trap is not sent. Example The following example enables SNMP traps for host 10.1.1.1 with community string "management" using SNMPv2.
Console(config)# snmp-server host 10.1.1.1 management 2
527
snmp-server v3-host
The snmp-server v3-host Global Configuration mode command specifies the recipient of Simple Network Management Protocol Version 3 notifications. To remove the specified host, use the no form of this command. Syntax
snmp-server v3-host {ip-address | hostname} username [traps | informs] {noauth | auth | priv} [udp-port port] [filter filtername] [timeout seconds] [retries retries] no snmp-server v3-host {ip-address | hostname} username [traps | informs]
Parameters ip-address Specifies the IP address of the host (targeted recipient). hostname Specifies the name of the host. (Range:1-158 characters) username Specifies the name of the user to use to generate the notification. (Range: 1-25) traps Indicates that SNMP traps are sent to this host. informs Indicates that SNMP informs are sent to this host. noauth Indicates no authentication of a packet. auth Indicates authentication of a packet without encrypting it. priv Indicates authentication of a packet with encryption. port Specifies the UDP port of the host to use. If unspecified, the default UDP port number is 162. (Range: 1-65535) filtername Specifies a string that defines the filter for this host. If unspecified, nothing is filtered. (Range: 1-30 characters) seconds Specifies the number of seconds to wait for an acknowledgment before resending informs. If unspecified, the default timeout period is 15 seconds. (Range: 1-300) retries Specifies the maximum number of times to resend an inform request. If unspecified, the default maximum number of retries is 3. (Range: 1-255) Default Setting This command has no default configuration. Command Mode Global Configuration mode Command Usage A user and notification view are not automatically created. Use the snmp-server user, snmp-server group and snmp-server view Global Configuration mode commands to generate a user, group and notify group, respectively.
528
SNMP Commands
Example The following example configures an SNMPv3 host.
Console(config)# snmp-server v3-host 192.168.0.20 john noauth
Default Setting SNMP failed authentication traps are enabled. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example enables SNMP failed authentication traps.
Console(config)# snmp-server trap authentication
snmp-server contact
The snmp-server contact Global Configuration mode command configures the system contact (sysContact) string. To remove system contact information, use the no form of the command. Syntax
snmp-server contact text no snmp-server contact
Parameters text Specifies the string that describes system contact information. (Range: 0-160 characters)
529
Default Setting This command has no default configuration. Command Mode Global Configuration mode Command Usage Do not include spaces in the text string or place text that includes spaces inside quotation marks. Example The following example configures the system contact point called Alcatel_Technical_Support.
console(config)# snmp-server contact Alcatel_Technical_Support
snmp-server location
The snmp-server location Global Configuration mode command configures the system location string. To remove the location string, use the no form of this command. Syntax
snmp-server location text no snmp-server location
Parameters text Specifies a string that describes system location information. (Range: 0-160 characters) Default Setting This command has no default configuration. Command Mode Global Configuration mode Command Usage Do not include spaces in the text string or place text that includes spaces inside quotation marks. Example The following example defines the device location as New_York.
Console(config)# snmp-server location New_York
530
SNMP Commands
Related Commands show snmp
snmp-server set
The snmp-server set Global Configuration mode command defines the SNMP MIB value. Syntax
snmp-server set variable-name name1 value1 [name2 value2 ]
Parameters variable-name MIB variable name. name value List of name and value pairs. In the case of scalar MIBs, only a single pair of name values. In the case of an entry in a table, at least one pair of name and value followed by one or more fields. Default Setting This command has no default configuration. Command Mode Global Configuration mode Command Usage Although the CLI can set any required configuration, there might be a situation where a SNMP user sets a MIB variable that does not have an equivalent command. In order to generate configuration files that support those situations, the snmp-server set command is used. This command is case-sensitive. Example The following example configures the scalar MIB sysName with the value Alcatel.
Console(config)# snmp-server set sysName sysname Alcatel
show snmp
The show snmp Privileged EXEC mode command displays the SNMP status. Syntax
show snmp
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode
531
Command Usage There are no user guidelines for this command. Example The following example displays the SNMP communications status.
Console# show snmp
View name
Community-stri ng --------------public
IP address
----------
all
Version 1,2 notifications Target Address Type Community Version UDP Port ---162 162 Filter Name -----TO Sec --15 15 Retri es ----3 3
-------------192.122.173.42 192.122.173.42
----Trap Inform
--------public public
------2 2
Version 3 notifications Target Address Type Username Security Level ------UDP Port ---Filter Name -----TO Sec --Retri es -----3
--------------
-----
---------
192.122.173.42
Inform
Bob
Priv
162
15
532
SNMP Commands
Related Commands snmp-server user snmp-server engineID local snmp-server enable traps snmp-server filter snmp-server host snmp-server v3-host snmp-server trap authentication snmp-server contact snmp-server location snmp-server set
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode
533
Command Usage There are no user guidelines for this command. Example The following example displays the SNMP engine ID.
Console# show snmp engineID Local SNMP engineID: 08009009020C0B099C075878
Parameters viewname Specifies the name of the view. (Range: 1-30) Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the configuration of views.
Console# show snmp views
534
The show snmp groups Privileged EXEC mode command displays the configuration of groups. Syntax
show snmp groups [groupname]
Parameters groupnameSpecifies the name of the group. (Range: 1-30) Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the configuration of views.
Console# show snmp groups
Name
Views Read ------Default Default Default Write ------"" Default "" Notify ------"" "" ""
----V3 V3 V3
535
Parameters filternameSpecifies the name of the filter. (Range: 1-30) Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the configuration of filters.
Console# show snmp filters
536
SNMP Commands
Syntax
show snmp users [username]
Parameters usernameSpecifies the name of the user. (Range: 1-30) Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the configuration of users.
Console# show snmp users
Remote -------------------------
08009009020C0B099C075879
537
Spanning-Tree Commands
Table 4-28. Spanning-Tree Commands Command spanning-tree Function Enables spanning-tree functionality. To disable spanning-tree functionality, use the no form of this command. Mode GC GC Page 4-539 4-540 4-541
spanning-tree mode Configures the spanning-tree protocol. To return to the default configuration, use the no form of this command. spanning-tree forward-time spanning-tree hello-time spanning-tree max-age spanning-tree priority spanning-tree disable spanning-tree costt spanning-tree port-priority spanning-tree portfast spanning-tree link-type spanning-tree pathcost method
Configures the spanning-tree bridge forward time, which is the GC amount of time a port remains in the listening and learning states before entering the forwarding state. To return to the default configuration, use the no form of this command. Configures the spanning tree bridge hello time, which is how often GC the device broadcasts hello messages to other devices.To return to the default configuration, use the no form of this command.t Configures the spanning tree bridge maximum age. To return to the default configuration, use the no form of this command. GC
Configures the spanning tree priority of the device. The priority GC value is used to determine which bridge is elected as the root bridge. To return to the default configuration, use the no form of this command. Disables spanning tree on a specific port. To enable spanning tree IC on a port, use the no form of this command. Configures the spanning tree path cost for a port. To return to the IC default configuration, use the no form of this command. Configures port priority. To return to the default configuration, use IC the no form of this command. Enables PortFast mode. In PortFast mode, the interface is immediately put into the forwarding state upon linkup without waiting for the standard forward time delay. To disable PortFast mode, use the no form of this command. IC
Overrides the default link-type setting determined by the duplex IC mode of the port and enables Rapid Spanning Tree Protocol (RSTP) transitions to the forwarding state. To return to the default configuration, use the no form of this command. Sets the default path cost method. To return to the default configuration, use the no form of this command. GC GC
4-548
spanning-tree bpdu Defines BPDU handling when the spanning tree is disabled globally or on a single interface. To return to the default configuration, use the no form of this command. clear spanning-tree detected-protocols spanning-tree mst priority
Restarts the protocol migration process (forces renegotiation with PE neighboring devices) on all interfaces or on a specified interface. Configures the device priority for the specified spanning-tree instance. To return to the default configuration, use the no form of this command. GC
538
Spanning-Tree Commands
Table 4-28. Spanning-Tree Commands Command spanning-tree mst max-hops spanning-tree mst port-priority spanning-tree mst cost Function Mode
4
Page 4-552 4-553 4-554
Configures the number of hops in an MST region before the BPDU GC is discarded and the port information is aged out. To return to the default configuration, use the no form of this command. Configures port priority for the specified MST instance. To return IC to the default configuration, use the no form of this command. Configures the path cost for multiple spanning tree (MST) IC calculations. If a loop occurs, the spanning tree considers path cost when selecting an interface to put in the forwarding state. To return to the default configuration, use the no form of this command. Enables configuring an MST region by entering the Multiple Spanning Tree (MST) mode. Maps VLANS to an MST instance. Defines the configuration name. To return to the default setting, use the no form of this command. GC MST MST
spanning-tree mst configuration instance (mst) name (mst) revision (mst) show (mst) exit (mst) abort (mst)
Defines the configuration revision number. To return to the default MST configuration, use the no form of this command. Displays the current or pending MST region configuration. Exits the MST configuration mode and applies all configuration changes. Exits the MST configuration mode without applying the configuration changes. MST MST MST
spanning-tree guard Enables root guard on all spanning tree instances on the interface. IC root Root guard prevents the interface from becoming the root port of the device. To disable root guard on the interface, use the no form of this command. spanning-tree bpduguard dot1x bpdu show dot1x bpdu Use the spanning-tree bpduguard interface configuration command to shutdown an interface when it receives a bridge protocol data unit (BPDU). Use the dot1x bpdu global configuration command to define 802.1x BPDU handling when 802.1x is globally disabled. IC GC
Use the show dot1x bpdu EXEC command to display the 802.1x UE BPDU handling when 802.1x is globally disabled. PE
spanning-tree
The spanning-tree Global Configuration mode command enables spanning-tree functionality. To disable spanning-tree functionality, use the no form of this command. Syntax
spanning-tree no spanning-tree
539
Default Setting Spanning-tree is enabled. Command Modes Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example enables spanning-tree functionality.
Console(config)# spanning-tree
spanning-tree mode
The spanning-tree mode Global Configuration mode command configures the spanning-tree protocol. To return to the default configuration, use the no form of this command. Syntax
spanning-tree mode {stp | rstp| mstp} no spanning-tree mode
Parameters stp Indicates that the Spanning Tree Protocol (STP) is enabled. rstp Indicates that the Rapid Spanning Tree Protocol (RSTP) is enabled. mstp Indicates that the Multiple Spanning Tree Protocol (RSTP) is enabled. Default Setting STP is enabled. Command Modes Global Configuration mode Command Usage In RSTP mode, the device uses STP when the neighbor device uses STP. In MSTP mode, the device uses RSTP when the neighbor device uses RSTP and uses STP when the neighbor device uses STP.
540
Spanning-Tree Commands
Example The following example configures the spanning-tree protocol to RSTP.
console(config)# spanning-tree mode rstp
spanning-tree forward-time
The spanning-tree forward-time Global Configuration mode command configures the spanning-tree bridge forward time, which is the amount of time a port remains in the listening and learning states before entering the forwarding state. To return to the default configuration, use the no form of this command. Syntax
spanning-tree forward-time seconds no spanning-tree forward-time
Parameters seconds Time in seconds. (Range: 4 - 30) Default Setting The default forwarding time for the IEEE Spanning Tree Protocol (STP) is 15 seconds. Command Modes Global Configuration mode Command Usage When configuring the forwarding time, the following relationship should be kept: 2*(Forward-Time - 1) >= Max-Age Example The following example configures the spanning tree bridge forwarding time to 25 seconds.
Console(config)# spanning-tree forward-time 25
Related Commands spanning-tree hello-time spanning-tree max-age spanning-tree priority spanning-tree disable
541
spanning-tree cost spanning-tree port-priority spanning-tree portfast spanning-tree link-type show spanning-tree
spanning-tree hello-time
The spanning-tree hello-time Global Configuration mode command configures the spanning tree bridge hello time, which is how often the device broadcasts hello messages to other devices.To return to the default configuration, use the no form of this command. Syntax spanning-tree hello-time seconds
no spanning-tree hello-time
Parameters seconds Time in seconds. (Range: 1 - 10) Default Setting The default hello time for IEEE Spanning Tree Protocol (STP) is 2 seconds. Command Modes Global Configuration mode Command Usage When configuring the hello time, the following relationship should be kept: Max-Age >= 2*(Hello-Time + 1) Example The following example configures spanning tree bridge hello time to 5 seconds.
Console(config)# spanning-tree hello-time 5
Related Commands spanning-tree forward-time spanning-tree max-age spanning-tree priority spanning-tree disable spanning-tree cost spanning-tree port-priority spanning-tree portfast
542
Spanning-Tree Commands
spanning-tree link-type show spanning-tree
spanning-tree max-age
The spanning-tree max-age Global Configuration mode command configures the spanning tree bridge maximum age. To return to the default configuration, use the no form of this command. Syntax
spanning-tree max-age seconds no spanning-tree max-age
Parameters seconds Time in seconds. (Range: 6 - 40) Default Setting The default maximum age for IEEE Spanning Tree Protocol (STP) is 20 seconds. Command Modes Global Configuration mode Command Usage When configuring the maximum age, the following relationships should be kept: 2*(Forward-Time - 1) >= Max-Age Max-Age >= 2*(Hello-Time + 1) Example The following example configures the spanning tree bridge maximum-age to 10 seconds.
Console(config)# spanning-tree max-age 10
Related Commands spanning-tree forward-time spanning-tree hello-time spanning-tree priority spanning-tree disable spanning-tree cost spanning-tree port-priority spanning-tree portfast spanning-tree link-type
543
show spanning-tree
spanning-tree priority
The spanning-tree priority Global Configuration mode command configures the spanning tree priority of the device. The priority value is used to determine which bridge is elected as the root bridge. To return to the default configuration, use the no form of this command. Syntax
spanning-tree priority priority no spanning-tree priority
Parameters priority Priority of the bridge. (Range: 0 - 61440 in steps of 4096) Default Setting The default bridge priority for IEEE Spanning Tree Protocol (STP) is 32768. Command Modes Global Configuration mode Command Usage The bridge with the lowest priority is elected as the root bridge. Example The following example configures spanning tree priority to 12288.
Console(config)# spanning-tree priority 12288
Related Commands spanning-tree forward-time spanning-tree hello-time spanning-tree max-age spanning-tree disable spanning-tree cost spanning-tree port-priority spanning-tree portfast spanning-tree link-type show spanning-tree
spanning-tree disable
The spanning-tree disable Interface Configuration mode command disables spanning tree on a specific port. To enable spanning tree on a port, use the no form of this command.
544
Spanning-Tree Commands
Syntax
spanning-tree disable no spanning-tree disable
Default Setting Spanning tree is enabled on all ports. Command Modes Interface Configuration (Ethernet, port-channel) mode Command Usage There are no user guidelines for this command. Example The following example disables spanning-tree on Ethernet port 1/e5.
Console(config)# interface ethernet 1/e5 Console(config-if)# spanning-tree disable
Related Commands spanning-tree forward-time spanning-tree hello-time spanning-tree max-age spanning-tree priority spanning-tree cost spanning-tree port-priority spanning-tree portfast spanning-tree link-type show spanning-tree
spanning-tree cost
The spanning-tree cost Interface Configuration mode command configures the spanning tree path cost for a port. To return to the default configuration, use the no form of this command. Syntax
spanning-tree cost cost no spanning-tree cost
545
Default Setting Default path cost is determined by port speed and path cost method (long or short) as shown below:
Interface Port-channel Gigabit Ethernet (1000 Mbps) Fast Ethernet (100 Mbps) Ethernet (10 Mbps) Long 20,000 20,000 200,000 2,000,000 Short 4 4 19 100
Command Modes Interface Configuration (Ethernet, port-channel) mode Command Usage The path cost method is configured using the spanning-tree pathcost method Global Configuration mode command. Example The following example configures the spanning-tree cost on Ethernet port 1/e15 to 35000.
Console(config)# interface ethernet 1/e15 Console(config-if)# spanning-tree cost 35000
Related Commands spanning-tree forward-time spanning-tree hello-time spanning-tree max-age spanning-tree priority spanning-tree disable spanning-tree port-priority spanning-tree portfast spanning-tree link-type show spanning-tree
spanning-tree port-priority
The spanning-tree port-priority Interface Configuration mode command configures port priority. To return to the default configuration, use the no form of this command. Syntax
spanning-tree port-priority priority
546
Spanning-Tree Commands
no spanning-tree port-priority
Parameters priority The priority of the port. (Range: 0 - 240 in multiples of 16) Default Setting The default port priority for IEEE Spanning TreeProtocol (STP) is 128. Command Modes Interface Configuration (Ethernet, port-channel) mode Command Usage There are no user guidelines for this command. Example The following example configures the spanning priority on Ethernet port 1/e15 to 96.
Console(config)# interface ethernet 1/e15 Console(config-if)# spanning-tree port-priority 96
Related Commands spanning-tree forward-time spanning-tree hello-time spanning-tree max-age spanning-tree priority spanning-tree disable spanning-tree cost spanning-tree portfast spanning-tree link-type show spanning-tree
spanning-tree portfast
The spanning-tree portfast Interface Configuration mode command enables PortFast mode. In PortFast mode, the interface is immediately put into the forwarding state upon linkup without waiting for the standard forward time delay. To disable PortFast mode, use the no form of this command. Syntax
spanning-tree portfast [auto] no spanning-tree portfast
Parameters auto Specifies that the software waits for 3 seconds (with no BPDUs received on the interface) before putting the interface into PortFast mode.
547
Default Setting PortFast mode is disabled. Command Modes Interface Configuration (Ethernet, port-channel) mode Command Usage This feature should be used only with interfaces connected to end stations. Otherwise, an accidental topology loop could cause a data packet loop and disrupt device and network operations.
An interface with PortFast mode enabled is moved directly to the spanning tree forwarding state when linkup occurs without waiting the standard forward-time delay.
Related Commands spanning-tree forward-time spanning-tree hello-time spanning-tree max-age spanning-tree priority spanning-tree disable spanning-tree cost spanning-tree port-priority spanning-tree link-type show spanning-tree
spanning-tree link-type
The spanning-tree link-type Interface Configuration mode command overrides the default link-type setting determined by the duplex mode of the port and enables Rapid Spanning Tree Protocol (RSTP) transitions to the forwarding state. To return to the default configuration, use the no form of this command. Syntax
spanning-tree link-type {point-to-point | shared} no spanning-tree spanning-tree link-type
548
Spanning-Tree Commands
shared Indicates that the port link type is shared.
Default Setting The device derives the port link type from the duplex mode. A full-duplex port is considered a point-to-point link and a half-duplex port is considered a shared link. Command Modes Interface Configuration (Ethernet, port-channel) mode Command Usage There are no user guidelines for this command. Example The following example enables shared spanning-tree on Ethernet port 1/e5.
Console(config)# interface ethernet 1/e15 Console(config-if)# spanning-tree link-type shared
Related Commands spanning-tree forward-time spanning-tree hello-time spanning-tree max-age spanning-tree priority spanning-tree disable spanning-tree cost spanning-tree port-priority spanning-tree portfast show spanning-tree
Parameters long Specifies port path costs with a range of 1-200,000,000 . short Specifies port path costs with a range of 1-65,535.
549
Default Setting Short path cost method. Command Mode Global Configuration mode Command Usage This command applies to all spanning tree instances on the device. The cost is set using the spanning-tree cost command. Example The following example sets the default path cost method to long.
Console(config)# spanning-tree pathcost method long
spanning-tree bpdu
The spanning-tree bpdu Global Configuration mode command defines BPDU handling when the spanning tree is disabled globally or on a single interface. To return to the default configuration, use the no form of this command. Syntax
spanning-tree bpdu {filtering | flooding | bridging}
no spanning-tree bpdu Parameters filtering When Spanning Tree is disabled on an interface, BPDU packets are filtered. flooding When Spanning Tree is disabled on an interface, untagged BPDU packets are flooded unconditionally (Without applying VLAN rules), to all ports which have Spanning Tree disabled. bridging When Spanning Tree is globally disabled, untagged or tagged BPDU packets are flooded, and are subject to ingress and egress VLAN rules. This mode is not relevant if Spanning Tree is disabled only on a group of ports. Default Setting The default setting is flooding. Command Modes Global Configuration mode Command Usage There are no user guidelines for this command.
550
Spanning-Tree Commands
Example The following example defines BPDU packet flooding when the spanning-tree is disabled on an interface.
Console(config)# spanning-tree bpdu flooding
port-channel-number] Parameters interface A valid Ethernet port. port-channel-number A valid port-channel number. Default Setting This command has no default configuration. Command Modes Privileged EXEC mode Command Usage This feature should be used only when working in RSTP or MSTP mode. Example The following example restarts the protocol migration process on Ethernet port 1/ e11.
Console# clear spanning-tree detected-protocols ethernet 1/e11
551
Parameters instance-id ID of the spanning -tree instance. (Range: 1-Product Specific upper limit) priority Device priority for the specified spanning-tree instance. (Range: 0-61440 in multiples of 4096) Default Setting The default bridge priority for IEEE Spanning Tree Protocol (STP) is 32768. Command Mode Global Configuration mode Command Usage The device with the lowest priority is selected as the root of the spanning tree. Example The following example configures the spanning tree priority of instance 1 to 4096.
Console (config) # spanning-tree mst 1 priority 4096
Related Commands spanning-tree mst max-hops spanning-tree mst port-priority spanning-tree mst cost spanning-tree mst configuration instance (mst) name (mst) revision (mst) show (mst) exit (mst) abort (mst) show spanning-tree
552
Spanning-Tree Commands
Parameters hop-count Number of hops in an MST region before the BPDU is discarded. (Range: 1-40) Default Setting The default number of hops is 20. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example configures the maximum number of hops that a packet travels in an MST region before it is discarded to 10.
Console (config) # spanning-tree mst max-hops 10
Related Commands spanning-tree mst priority spanning-tree mst port-priority spanning-tree mst cost spanning-tree mst configuration instance (mst) name (mst) revision (mst) show (mst) exit (mst) abort (mst) show spanning-tree
553
Default Setting The default port priority for IEEE Multiple Spanning Tree Protocol (MSTP) is 128. Command Modes Interface Configuration (Ethernet, port-channel) mode Command Usage There are no user guidelines for this command. Example The following example configures the port priority of port g1 to 142.
Console(config)# interface ethernet g1 Console(config-if)# spanning-tree mst 1 port-priority 142
Related Commands spanning-tree mst priority spanning-tree mst max-hops spanning-tree mst cost spanning-tree mst configuration instance (mst) name (mst) revision (mst) show (mst) exit (mst) abort (mst) show spanning-tree
554
Spanning-Tree Commands
Parameters instance-ID ID of the spanning -tree instance (Range: 1-16). cost The port path cost. (Range: 1 - 200,000,000)
Default path cost is determined by port speed and path cost method (long or short) as shown below:
Interface Port-channel Gigabit Ethernet (1000 Mbps) Fast Ethernet (100 Mbps) Ethernet (10 Mbps) Long 20,000 20,000 200,000 2,000,000 Short 4 4 19 100
Command Modes Interface Configuration (Ethernet, port-channel) mode Command Usage There are no user guidelines for this command. Example The following example configures the MSTP instance 1 path cost for Ethernet port 1/ e9 to 4.
Console(config) # interface ethernet 1/e9 Console(config-if) # spanning-tree mst 1 cost 4
Related Commands spanning-tree mst priority spanning-tree mst max-hops spanning-tree mst port-priority spanning-tree mst configuration instance (mst) name (mst) revision (mst) show (mst) exit (mst) abort (mst) show spanning-tree
555
Default Setting This command has no default configuration. Command Mode Global Configuration mode Command Usage All devices in an MST region must have the same VLAN mapping, configuration revision number and name. Example The following example configures an MST region.
Console(config)# spanning-tree mst configuration Console(config-mst) # instance 1 add vlan 10-20 Console(config-mst) # name region1 Console(config-mst) # revision 1
Related Commands spanning-tree mst priority spanning-tree mst max-hops spanning-tree mst port-priority spanning-tree mst cost instance (mst) name (mst) revision (mst) show (mst) exit (mst) abort (mst) show spanning-tree
instance (mst)
The instance MST Configuration mode command maps VLANS to an MST instance. Syntax
instance instance-id {add | remove} vlan vlan-range
556
Spanning-Tree Commands
Parameters instance-ID ID of the MST instance. (Range: 1-Product Specific upper limit) vlan-range VLANs to be added to or removed from the specified MST instance. To specify a range of VLANs, use a hyphen. To specify a series of VLANs, use a comma. (Range: 1-4094) Default Setting VLANs are mapped to the common and internal spanning tree (CIST) instance (instance 0). Command Modes MST Configuration mode Command Usage All VLANs that are not explicitly mapped to an MST instance are mapped to the common and internal spanning tree (CIST) instance (instance 0) and cannot be unmapped from the CIST. For two or more devices to be in the same MST region, they must have the same VLAN mapping, the same configuration revision number, and the same name. Example The following example maps VLANs 10-20 to MST instance 1.
Console(config)# spanning-tree mst configuration Console(config-mst)# instance 1 add vlan 10-20
Related Commands spanning-tree mst priority spanning-tree mst max-hops spanning-tree mst port-priority spanning-tree mst cost spanning-tree mst configuration name (mst) revision (mst) show (mst) exit (mst) abort (mst) show spanning-tree
557
name (mst)
The name MST Configuration mode command defines the configuration name. To return to the default setting, use the no form of this command. Syntax
name string
no name Parameters string MST configuration name. Case-sensitive (Range: 1-32 characters). Default Setting The default name is a bridge ID. Command Mode MST Configuration mode Command Usage There are no user guidelines for this command. Example The following example defines the configuration name as region1.
Console(config) # spanning-tree mst configuration Console(config-mst) # name region 1
Related Commands spanning-tree mst priority spanning-tree mst max-hops spanning-tree mst port-priority spanning-tree mst cost spanning-tree mst configuration instance (mst) revision (mst) show (mst) exit (mst) abort (mst) show spanning-tree
revision (mst)
The revision MST configuration command defines the configuration revision number. To return to the default configuration, use the no form of this command.
558
Spanning-Tree Commands
Syntax
revision value no revision
Parameters value Configuration revision number (Range: 0-65535). Default Setting The default configuration revision number is 0. Command Mode MST Configuration mode Command Usage There are no user guidelines for this command. Example The following example sets the configuration revision to 1.
Console(config) # spanning-tree mst configuration Console(config-mst) # revision 1
Related Commands spanning-tree mst priority spanning-tree mst max-hops spanning-tree mst port-priority spanning-tree mst cost spanning-tree mst configuration instance (mst) name (mst) show (mst) exit (mst) abort (mst) show spanning-tree
show (mst)
The show MST Configuration mode command displays the current or pending MST region configuration. Syntax
show {current | pending}
559
Parameters current Indicates the current region configuration. pending Indicates the pending region configuration. Default Setting This command has no default configuration. Command Mode MST Configuration mode Command Usage The pending MST region configuration takes effect only after exiting the MST configuration mode. Example The following example displays a pending MST region configuration.
Console(config-mst)# show pending Pending MST configuration Name: Region1 Revision: 1 Instance -------0 1 Vlans Mapped -----------1-9,21-4094 10-20 State ------Enabled Enabled
Related Commands spanning-tree mst priority spanning-tree mst max-hops spanning-tree mst port-priority spanning-tree mst cost spanning-tree mst configuration instance (mst) name (mst) revision (mst) exit (mst) abort (mst) show spanning-tree
560
The exit MST Configuration mode command exits the MST configuration mode and applies all configuration changes. Syntax
exit
Default Setting This command has no default configuration. Command Mode MST Configuration mode Command Usage There are no user guidelines for this command. Example The following example exits the MST configuration mode and saves changes.
Console(config) # spanning-tree mst configuration Console(config-mst) # exit
Related Commands spanning-tree mst priority spanning-tree mst max-hops spanning-tree mst port-priority spanning-tree mst cost spanning-tree mst configuration instance (mst) name (mst) revision (mst) show (mst) abort (mst) show spanning-tree
abort (mst)
The abort MST Configuration mode command exits the MST configuration mode without applying the configuration changes. Syntax
abort
561
Command Mode MST Configuration mode Command Usage There are no user guidelines for this command. Example The following example exits the MST configuration mode without saving changes.
Console(config) # spanning-tree mst configuration Console(config-mst) # abort
Related Commands spanning-tree mst priority spanning-tree mst max-hops spanning-tree mst port-priority spanning-tree mst cost spanning-tree mst configuration instance (mst) name (mst) revision (mst) show (mst) exit (mst) show spanning-tree
Default Setting Root guard is disabled. Command Mode Interface Configuration (Ethernet, port-channel) mode
562
Spanning-Tree Commands
Command Usage Root guard can be enabled when the device operates in STP, RSTP and MSTP. When root guard is enabled, the port changes to the alternate state if spanning-tree calculations selects the port as the root port. Examples The following example prevents Ethernet port 1/g1 from being the root port of the device.
Console(config) # interface ethernet 1/g1 Console(config-mst) # spanning-tree guard root
spanning-tree bpduguard
The spanning-tree bpduguard Interface Configuration (Ethernet, port-channel) mode command shutdowns an interface when it receives a bridge protocol data unit (BPDU). To restore the default configuration, use the no form of this command. Syntax spanning-tree bpduguard no spanning-tree bpduguard Default Configuration The default configuration is set to disabled. Command Mode Interface Configuration (Ethernet, port-channel) mode User Guidelines You can enable the command when the spanning tree is enabled (useful when the port is in the PortFast mode) or disabled.
dot1x bpdu
Use the dot1x bpdu global configuration command to define 802.1x BPDU handling when 802.1x is globally disabled. Use the no form of this command to return to default. Syntax dot1x bpdu {filtering | bridging} no dot1x bpdu Parameters filtering Specify that when 802.1x is globally disabled, 802.1x BPDU packets would be filtered.
563
Default Filtering Command Modes Global configuration Usage Guidelines According to IEEE802.1 standards the 802.1X BPDUs should never be forwarded - The 802.1X BPDUs should be handled by the software in case 802.1X is enabled on the ingress port, or discarded in all other cases. This feature enables to bridge 802.1X BPDUs packets as data packets. The feature can be enabled only when 802.1X is globally disabled (by the no dot1x system-auth-control global configuration command). If the port is disabled for 802.1X but 802.1X is enabled globally, 802.1X BPDUs would always be discarded.
show spanning-tree
The show spanning-tree Privileged EXEC mode command displays spanning-tree configuration.
564
Spanning-Tree Commands
Syntax
show spanning-tree [ethernet interface -number| port-channel port-channel-number] [instance instance-id] show spanning-tree [detail] [active | blockedports] [instance instance-id] show spanning-tree mst-configuration
Parameters interface-number A valid Ethernet port. port-channel-number A valid port channel number. detail Indicates detailed information. active Indicates active ports only. blockedports Indicates blocked ports only. mst-configuration Indicates the MST configuration identifier. instance-id Specifies the ID of the spanning tree instance (The range lower limit is 0. The upper limit is product-specific). Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays spanning-tree information.
Console# show spanning-tree
Spanning tree enabled mode RSTP Default port cost method: long
Root ID
Priority
32768
00:01:42:97:e0:00 20000
565
4
Brid ge ID
Priority
36864
Interfaces Name ---1/e1 1/e2 1/e3 1/e4 1/e5 State ------Enabled Enabled Disabled Enabled Enabled Prio.Nbr -------128.1 128.2 128.3 128.4 128.5 Cost ----20000 20000 20000 20000 20000 Sts --FWD FWD BLK DIS Role ---Root Desg ALTN PortFast -------No No No Type ---------P2p (RSTP) Shared (STP) Shared (STP) -
Spanning tree enabled mode RSTP Default port cost method: long
Root ID
Priority
36864
Address
00:02:4b:29:7a:00
This switch is the root. Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Interfaces Name ---1/e1 1/e2 1/e3 1/e4 State ------Enabled Enabled Disabled Enabled Prio.Nbr -------128.1 128.2 128.3 128.4 Cost ----20000 20000 20000 20000 Sts --FWD FWD FWD Role ---Desg Desg Desg PortFast -------No No No Type ---------P2p (RSTP) Shared (STP) Shared (STP)
566
Spanning-Tree Commands
1/e5
Enabled
128.5
20000
DIS
Spanning tree disabled (BPDU filtering) mode RSTP Default port cost method: long
Root ID
Priority
N/A
N/A N/A
N/A
Brid ge ID
Priority
36864
Interfaces Name ---1/e1 1/e2 1/e3 1/e4 1/e5 State ------Enabled Enabled Disabled Enabled Enabled Prio.Nbr -------128.1 128.2 128.3 128.4 128.5 Cost ----20000 20000 20000 20000 20000 Sts --Role ---PortFast -------Type ----
567
Spanning tree enabled mode RSTP Default port cost method: long
Root ID
Priority
32768
00:01:42:97:e0:00 20000
Brid ge ID
Priority
36864
Interfaces Name ---1/e1 1/e2 1/e4 State ------Enabled Enabled Enabled Prio.Nbr -------128.1 128.2 128.4 Cost ----20000 20000 20000 Sts --FWD FWD BLK Role ---Root Desg ALTN PortFast -------No No No Type ---------P2p (RSTP) Shared (STP) Shared (STP)
568
Spanning-Tree Commands
Spanning tree enabled mode RSTP Default port cost method: long
Root ID
Priority
32768
00:01:42:97:e0:00 20000
Brid ge ID
Priority
36864
Interfaces Name ---1/e4 State ------Enabled Prio.Nbr -------128.4 Cost ----20000 Sts --BLK Role ---ALTN PortFast -------No Type ---------Shared (STP)
569
Spanning tree enabled mode RSTP Default port cost method: long
Root ID
Priority
32768
00:01:42:97:e0:00 20000
Brid ge ID
Priority
36864
Number of topology changes 2 last change occurred 2d18h ago Time s: hold 1, topology change 35, notification 2
Port 1 (1/e1) enabled State: Forwarding Port id: 128.1 Type: P2p (configured: auto) RSTP Designated bridge Priority: 32768 Designated port id: 128.25 Role: Root Port cost: 20000 Port Fast: No (configured:no) Address: 00:01:42:97:e0:00 Designated path cost: 0
570
Spanning-Tree Commands
Port 2 (1/e2) enabled State: Forwarding Port id: 128.2 Type: Shared (configured: auto) STP Designated bridge Priority: 32768 Designated port id: 128.2 Role: Designated Port cost: 20000 Port Fast: No (configured:no) Address: 00:02:4b:29:7a:00 Designated path cost: 20000
Port 3 (1/e3) disabled State: N/A Port id: 128.3 Type: N/A (configured: auto) Designated bridge Priority: N/A Designated port id: N/A Role: N/A Port cost: 20000 Port Fast: N/A (configured:no) Address: N/A Designated path cost: N/A
Number of transitions to forwarding state: N/A BPDU: sent N/A, received N/A
Port 4 (1/e4) enabled State: Blocking Port id: 128.4 Type: Shared (configured:auto) STP Designated bridge Priority: 28672 Designated port id: 128.25 Role: Alternate Port cost: 20000 Port Fast: No (configured:no) Address: 00:30:94:41:62:c8 Designated path cost: 20000
Port 5 (1/e5) enabled State: Disabled Port id: 128.5 Type: N/A (configured: auto) Designated bridge Priority: N/A Designated port id: N/A Role: N/A Port cost: 20000 Port Fast: N/A (configured:no) Address: N/A Designated path cost: N/A
571
Number of transitions to forwarding state: N/A BPDU: sent N/A, received N/A
Name: Region1 Revision: 1 Instance -------Vlans mapped -----------State ----Ena ble d Ena ble d
1-9, 21-4094
10-20
Spanning tree enabled mode MSTP Default port cost method: long
###### MST 0 Vlans Mapped: 1-9, 21-4094 CST Root ID Priority 32768
572
Spanning-Tree Commands
00:01:42:97:e0:00 20000
IST Master ID
Priority Address
This switch is the IST master. Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Max hops
20
Interfaces Name ---1/e1 State ------Enabled Prio.Nbr -------128.1 Cost ----20000 Sts --FWD Role ---Root PortFast -------No Type ---------P2p Bound (RSTP) Shared Bound (STP) P2p P2p
1/e2
Enabled
128.2
20000
FWD
Desg
No
1/e3 1/e4
Enabled Enabled
128.3 128.4
20000 20000
FWD FWD
Desg Desg
No No
###### MST 1 Vlans Mapped: 10-20 CST Root ID Priority Address Path Cost Root Port Rem hops 24576 00:02:4b:29:89:76 20000
4 (1/ e4) 19
Bridge ID
Priority
32768
573
Address
00:02:4b:29 :7a:00
Interfaces Name ---1/e1 State ------Enabled Prio.Nbr -------128.1 Cost ----20000 Sts --FWD Role ---Boun PortFast -------No Type ---------P2p Bound (RSTP) Shared Bound (STP) P2p P2p
1/e2
Enabled
128.2
20000
FWD
Boun
No
1/e3 1/e4
Enabled Enabled
128.3 128.4
20000 20000
BLK FWD
Altn Desg
No No
Spanning tree enabled mode MSTP Default port cost method: long
###### MST 0 Vlans Mapped: 1-9, 21-4094 CST Root ID Priority Address Path Cost Root Port 32768 00:01:42:97:e0:00 20000
IST Master ID
Priority Address
This switch is the IST master. Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Max hops
20
574
Spanning-Tree Commands
Times: hold 1, topology change 35, notification 2 hello 2, max age 20, forward delay 15
Port 1 (1/e1) enabled State: Forwarding Port id: 128.1 Type: P2p (configured: auto) Boundary RSTP Designated bridge Priority: 32768 Designated port id: 128.25 Number of transitions to forwarding state: 1 BPDU: sent 2, received 120638 Role: Root Port cost: 20000 Port Fast: No (configured:no) Address: 00:01:42:97:e0:00 Designated path cost: 0
Port 2 (1/e2) enabled State: Forwarding Port id: 128.2 Type: Shared (configured: auto) Boundary STP Designated bridge Priority: 32768 Designated port id: 128.2 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 Role: Designated Port cost: 20000 Port Fast: No (configured:no)
Port 3 (1/e3) enabled State: Forwarding Port id: 128.3 Type: Shared (configured: auto) Internal Designated bridge Priority: 32768 Designated port id: 128.3 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 Role: Designated Port cost: 20000 Port Fast: No (configured:no) Address: 00:02:4b:29:7a:00 Designated path cost: 20000
575
Port id: 128.4 Type: Shared (configured: auto) Internal Designated bridge Priority: 32768 Designated port id: 128.2 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638
Port cost: 20000 Port Fast: No (configured:no) Address: 00:02:4b:29:7a:00 Designated path cost: 20000
###### MST 1 Vlans Mapped: 10-20 Root ID Priority Address Path Cost Port Cost Rem hops 24576 00:02:4b:29:89:76 20000
4 (1/ e4) 19
Bridge ID
Priority Address
32768 00:02:4b:29:7a:00
Number of topology changes 2 last change occurred 1d9h ago Times: hold 1, topology change 2, notification 2 hello 2, max age 20, forward delay 15
Port 1 (1/e1) enabled State: Forwarding Port id: 128.1 Type: P2p (configured: auto) Boundary RSTP Designated bridge Priority: 32768 Designated port id: 128.1 Number of transitions to forwarding state: 1 BPDU: sent 2, received 120638 Role: Boundary Port cost: 20000 Port Fast: No (configured:no) Address: 00:02:4b:29:7a:00 Designated path cost: 20000
576
Spanning-Tree Commands
Port 2 (1/e2) enabled State: Forwarding Port id: 128.2 Type: Shared (configured: auto) Boundary STP Designated bridge Priority: 32768 Designated port id: 128.2 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 Role: Designated Port cost: 20000 Port Fast: No (configured:no)
Port 3 (1/e3) disabled State: Blocking Port id: 128.3 Type: Shared (configured: auto) Internal Designated bridge Priority: 32768 Designated port id: 128.78 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 Role: Alternate Port cost: 20000 Port Fast: No (configured:no) Address: 00:02:4b:29:1a:19 Designated path cost: 20000
Port 4 (1/e4) enabled State: Forwarding Port id: 128.4 Type: Shared (configured: auto) Internal Designated bridge Priority: 32768 Designated port id: 128.2 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 Role: Designated Port cost: 20000 Port Fast: No (configured:no) Address: 00:02:4b:29:7a:00 Designated path cost: 20000
Spanning tree enabled mode MSTP Default port cost method: long
577
###### MST 0 Vlans Mapped: 1-9, 21-4094 CST Root ID Priority Address Path Cost Root Port 32768 00:01:42:97:e0:00 20000
IST Master ID
Priority Address
19
Brid ge ID
Priority
32768
Address
Max hops
20
Spanning tree enabled mode MSTP Default port cost method: long
###### MST 0 Vlans Mapped: 1-9, 21-4094 CST Root ID Priority Address 32768 00:01:42:97:e0:00
This switch is root for CST and IST master. Root Port 1 (1/ e1)
578
Spanning-Tree Commands
Max hops
20
Related Commands spanning-tree spanning-tree mode spanning-tree forward-time spanning-tree hello-time spanning-tree max-age spanning-tree priority spanning-tree disable spanning-tree cost spanning-tree port-priority spanning-tree portfast spanning-tree link-type spanning-tree pathcost method spanning-tree bpdu clear spanning-tree detected-protocols spanning-tree mst priority spanning-tree mst max-hops spanning-tree mst port-priority spanning-tree mst cost spanning-tree mst configuration instance (mst) name (mst) revision (mst) show (mst) exit (mst) abort (mst) spanning-tree guard root
579
SSH Commands
Table 4-29. SSH Commands Command ip ssh port ip ssh server Function Mode Page 4-580 4-581 4-581 4-582 4-583 4-584 4-585 4-586 4-587 4-588 4-589 Specifies the port to be used by the SSH server. To return to the GC default configuration, use the no form of this command. Enables the device to be configured from a SSH server. To disable GC this function, use the no form of this command. GC GC
crypto key generate Generates DSA key pairs. dsa crypto key generate Generates RSA key pairs. rsa ip ssh pubkey-auth crypto key pubkey-chain ssh user-key key-string show ip ssh show crypto key mypubkey show crypto key pubkey-chain ssh
Enables public key authentication for incoming SSH sessions. To GC disable this function, use the no form of this command. Enters the SSH Public Key-chain Configuration mode. The mode GC is used to manually specify other device public keys such as SSH client public keys. Specifies which SSH public key is manually configured. To remove an SSH public key, use the no form of this command. Manually specifies an SSH public key. Displays the SSH server configuration. Displays the SSH public keys on the device. Displays SSH public keys stored on the device. SPK SPK PE PE PE
ip ssh port
The ip ssh port Global Configuration mode command specifies the port to be used by the SSH server. To return to the default configuration, use the no form of this command. Syntax
ip ssh port port-number no ip ssh port
Parameters port-number Port number for use by the SSH server (Range: 1 - 65535). Default Setting The default port number is 22. Command Mode Global Configuration mode
580
SSH Commands
Command Usage There are no user guidelines for this command. Example The following example specifies the port to be used by the SSH server as 8080.
Console(config)# ip ssh port 8080
ip ssh server
The ip ssh server Global Configuration mode command enables the device to be configured from a SSH server. To disable this function, use the no form of this command. Syntax
ip ssh server no ip ssh server
Default Setting Device configuration from a SSH server is enabled. Command Mode Global Configuration mode Command Usage If encryption keys are not generated, the SSH server is in standby until the keys are generated. To generate SSH server keys, use the crypto key generate dsa, and crypto key generate rsa Global Configuration mode commands. Example The following example enables configuring the device from a SSH server.
Console(config)# ip ssh server
581
Syntax
crypto key generate dsa
Default Setting DSA key pairs do not exist. Command Mode Global Configuration mode Command Usage DSA keys are generated in pairs: one public DSA key and one private DSA key. If the device already has DSA keys, a warning and prompt to replace the existing keys with new keys are displayed. This command is not saved in the device configuration; however, the keys generated by this command are saved in the private configuration, which is never displayed to the user or backed up on another device. DSA keys are saved to the backup master. This command may take a considerable period of time to execute. Example The following example generates DSA key pairs.
Console(config)# crypto key generate dsa
Related Commands crypto key generate rsa ip ssh pubkey-auth crypto key pubkey-chain ssh user-key key-string show crypto key mypubkey show crypto key pubkey-chain ssh
582
SSH Commands
Command Mode Global Configuration mode
Command Usage RSA keys are generated in pairs: one public RSA key and one private RSA key. If the device already has RSA keys, a warning and prompt to replace the existing keys with new keys are displayed. This command is not saved in the device configuration; however, the keys generated by this command are saved in the private configuration which is never displayed to the user or backed up on another device. RSA keys are saved to the backup master. This command may take a considerable period of time to execute. Example The following example generates RSA key pairs.
Console(config)# crypto key generate rsa
Related Commands crypto key generate dsa ip ssh pubkey-auth crypto key pubkey-chain ssh user-key key-string show crypto key mypubkey show crypto key pubkey-chain ssh
ip ssh pubkey-auth
The ip ssh pubkey-auth Global Configuration mode command enables public key authentication for incoming SSH sessions. To disable this function, use the no form of this command. Syntax
ip ssh pubkey-auth no ip ssh pubkey-auth
Default Setting Public Key authentication fo incoming SSH sessions is disabled. Command Mode Global Configuration mode Command Usage AAA authentication is independent
583
Example The following example enables public key authentication for incoming SSH sessions.
Console(config)# ip ssh pubkey-auth
Related Commands crypto key generate dsa crypto key generate rsa crypto key pubkey-chain ssh user-key key-string show crypto key mypubkey show crypto key pubkey-chain ssh
Default Setting No keys are specified. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command.
584
SSH Commands
Example The following example enters the SSH Public Key-chain Configuration mode and manually configures the RSA key pair for SSH public key-chain bob.
Console(config)# crypto key pubkey-chain ssh Console(config-pubkey-chain)# user-key bob rsa Console(config-pubkey-key)# key-string row AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl Al4kpqIw9GBRonZQZxjHKcqKL6rMlQ+ ZNXfZSkvHG+QusIZ/76ILmFT34v7u7ChFAE+ Vu4GRfpSwoQUvV35LqJJk67IOU/zfwOl1g kTwml75QR9gHujS6KwGN2QWXgh3ub8gDjTSq muSn/Wd05iDX2IExQWu08licglk02LYciz +Z4TrEU/9FJxwPiVQOjc+KBXuR0juNg5nFYsY 0ZCk0N/W9a/tnkm1shRE7Di71+w3fNiOA 6w9o44t6+AINEICBCCA4YcF6zMzaT1wefWwX6f+ Rmt5nhhqdAtN/4oJfce166DqVX1gWmN zNR4DYDvSzg0lDnwCAC8Qh Fingerprint: a4:16:46:23:5a:8d:1d:b5:37:59:eb:44:13:b9:33:e9
Related Commands crypto key generate dsa crypto key generate rsa ip ssh pubkey-auth user-key key-string show crypto key mypubkey show crypto key pubkey-chain ssh
user-key
The user-key SSH Public Key-string Configuration mode command specifies which SSH public key is manually configured. To remove an SSH public key, use the no form of this command. Syntax
user-key username {rsa | dsa} no user-key username
Parameters username Specifies the username of the remote SSH client. (Range: 1-48 characters) rsa Indicates the RSA key pair. dsa Indicates the DSA key pair. Default Setting No SSH public keys exist.
585
Command Mode SSH Public Key-string Configuration mode Command Usage Follow this command with the key-string SSH Public Key-String Configuration mode command to specify the key. Example The following example enables manually configuring an SSH public key for SSH public key-chain bob.
Console(config)# crypto key pubkey-chain ssh Console(config-pubkey-chain)# user-key bob rsa Console(config-pubkey-key)# key-string row
Related Commands crypto key generate dsa crypto key generate rsa ip ssh pubkey-auth crypto key pubkey-chain ssh key-string show crypto key mypubkey show crypto key pubkey-chain ssh
key-string
The key-string SSH Public Key-string Configuration mode command manually specifies an SSH public key. Syntax
key-string key-string row key-string
Parameters row Indicates the SSH public key row by row. key-string Specifies the key in UU-encoded DER format; UU-encoded DER format is the same format in the authorized_keys file used by OpenSSH. Default Setting No keys exist. Command Mode SSH Public Key-string Configuration mode
586
SSH Commands
Command Usage Use the key-string SSH Public Key-string Configuration mode command to specify which SSH public key is to be interactively configured next. To complete the command, you must enter a row with no characters.
Use the key-string row SSH Public Key-string Configuration mode command to specify the SSH public key row by row. Each row must begin with a key-string row command. This command is useful for configuration files. Example The following example enters public key strings for SSH public key client bob.
Console(config)# crypto key pubkey-chain ssh Console(config-pubkey-chain)# user-key bob rsa Console(config-pubkey-key)# key-string AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl Al4kpqIw9GBRonZQZxjHKcqKL6rMlQ+ ZNXfZSkvHG+QusIZ/76ILmFT34v7u7ChFAE+ Vu4GRfpSwoQUvV35LqJJk67IOU/zfwOl1g kTwml75QR9gHujS6KwGN2QWXgh3ub8gDjTSq muSn/Wd05iDX2IExQWu08licglk02LYciz +Z4TrEU/9FJxwPiVQOjc+KBXuR0juNg5nFYsY 0ZCk0N/W9a/tnkm1shRE7Di71+w3fNiOA 6w9o44t6+AINEICBCCA4YcF6zMzaT1wefWwX6f+ Rmt5nhhqdAtN/4oJfce166DqVX1gWmN zNR4DYDvSzg0lDnwCAC8Qh Fingerprint: a4:16:46:23:5a:8d:1d:b5:37:59:eb:44:13:b9:33:e9 Console(config)# crypto key pubkey-chain ssh Console(config-pubkey-chain)# user-key bob rsa Console(config-pubkey-key)# key-string row AAAAB3Nza Console(config-pubkey-key)# key-string row C1yc2
Related Commands crypto key generate dsa crypto key generate rsa ip ssh pubkey-auth crypto key pubkey-chain ssh user-key show crypto key mypubkey show crypto key pubkey-chain ssh
show ip ssh
The show ip ssh Privileged EXEC mode command displays the SSH server configuration. Syntax
show ip ssh
587
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the SSH server configuration.
Console# show ip ssh SSH server enabled. Port: 22 RSA key was generated. DSA (DSS) key was generated. SSH Public Key Authentication is enabled. Active incoming sessions: IP address SSH username ---------John Brown Version Cipher Auth Code
--------172.16.0.1
--------2.0 3
------DES
---------HMAC-SHA1
588
SSH Commands
Parameters rsa Indicates the RSA key. dsa Indicates the DSA key. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the SSH public RSA keys on the device.
Console# show crypto key mypubkey rsa RSA key data: 005C300D 06092A86 4886F70D 01010105 00034B00 30480241 00C5E23B 55D6AB22 04AEF1BA A54028A6 9ACC01C5 129D99E4 64CAB820 847EDAD9 DF0B4E4C 73A05DD2 BD62A8A9 FA603DD2 E2A8A6F8 98F76E28 D58AD221 B583D7A4 71020301 87685768 Fingerprint(Hex): 77:C7:19:85:98:19:27:96:C9:CC:83:C5:78:89:F8:86 Fingerprint(Bubble Babble): yteriuwt jgkljhglk yewiury hdskjfryt gfhkjglk
Related Commands crypto key generate dsa crypto key generate rsa ip ssh pubkey-auth crypto key pubkey-chain ssh user-key key-string show crypto key pubkey-chain ssh
Parameters username Specifies the remote SSH client username. bubble-babble Fingerprint in Bubble Babble format. hex Fingerprint in Hex format.
589
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Examples The following example displays SSH public keys stored on the device.
Console# show crypto key pubkey-chain ssh Username -------bob john Fingerprint ----------------------------------------------9A:CC:01:C5:78:39:27:86:79:CC:23:C5:98:59:F1:86 98:F7:6E:28:F2:79:87:C8:18:F8:88:CC:F8:89:87:C8
Console# show crypto key pubkey-chain ssh username bob Username: bob Key: 005C300D 06092A86 4886F70D 01010105 00034B00 30480241 00C5E23B 55D6AB22 04AEF1BA A54028A6 9ACC01C5 129D99E4 Fingerprint: 9A:CC:01:C5:78:39:27:86:79:CC:23:C5:98:59:F1:86
Related Commands crypto key generate dsa crypto key generate rsa ip ssh pubkey-auth crypto key pubkey-chain ssh user-key key-string show crypto key mypubkey
590
Syslog Commands
Syslog Commands
Table 4-30. Syslog Commands Command logging on Function Mode Page 4-591 Controls error message logging. This command sends debug or GC error messages to a logging process, which logs messages to designated locations asynchronously to the process that generated the messages. To disable the logging process, use the no form of this command. Logs messages to a syslog server. To delete the syslog server with the specified address from the list of syslogs, use the no form of this command. GC
logging logging console logging buffered logging buffered size clear logging logging file clear logging file aaa logging file-system logging management logging show logging show logging file
Limits messages logged to the console based on severity. To GC disable logging to the console, use the no form of this command. Limits syslog messages displayed from an internal buffer based on severity. To cancel using the buffer, use the no form of this command. Changes the number of syslog messages stored in the internal buffer. To return to the default configuration, use the no form of this command. Clears messages from the internal logging buffer. GC GC PE
Limits syslog messages sent to the logging file based on severity. GC To cancel using the buffer, use the no form of this command. Clears messages from the logging file. Enables logging AAA login events. To disable logging AAA login events, use the no form of this command. PE GC 4-596 4-597 4-598 4-598 4-599 4-601 4-603
Enables logging file system events. To disable logging file system GC events, use the no form of this command. Enables logging management access list (ACL) events. To GC disable logging management access list events, use the no form of this command. Displays the state of logging and the syslog messages stored in the internal buffer. Displays the state of logging and the syslog messages stored in the logging file.S PE PE PE
logging on
The logging on Global Configuration mode command controls error message logging. This command sends debug or error messages to a logging process, which logs messages to designated locations asynchronously to the process that generated the messages. To disable the logging process, use the no form of this command.
591
Syntax
logging on no logging on
Default Setting Logging is enabled. Command Mode Global Configuration mode Command Usage The logging process controls the distribution of logging messages at various destinations, such as the logging buffer, logging file or syslog server. Logging on and off at these destinations can be individually configured using the logging buffered, logging file, and logging Global Configuration mode commands. However, if the logging on command is disabled, no messages are sent to these destinations. Only the console receives messages. Example The following example enables logging error messages.
Console(config)# logging on
logging
The logging Global Configuration mode command logs messages to a syslog server. To delete the syslog server with the specified address from the list of syslogs, use the no form of this command. Syntax
logging {ip-address | hostname} [port port] [severity level] [facility facility] [description text] no logging {ip-address | hostname}
Parameters ip-address IP address of the host to be used as a syslog server. hostname Specifies the host name of the syslog server. (Range: 1-158 characters) port Specifies the port number for syslog messages. (Range: 1 - 65535) level Specifies the severity level of logged messages sent to the syslog servers. Possible values: emergencies, alerts, critical, errors, warnings, notifications, informational and debugging. facility Specifies the facility that is indicated in the message. Possible
592
Syslog Commands
values: local0, local1, local2, local3, local4, local5, local 6, local7. text Syslog server description. (Range: 1-64 characters) Default Setting The default port number is 514. The default logging message level is informational. The default facility is local7. Command Mode Global Configuration mode Command Usage Up to 8 syslog servers can be used.
If no specific severity level is specified, the global values apply to each server. Example The following example limits logged messages sent to the syslog server with IP address 10.1.1.1 to severity level critical.
Console(config)# logging 10.1.1.1 severity critical
logging console
The logging console Global Configuration mode command limits messages logged to the console based on severity. To disable logging to the console, use the no form of this command. Syntax
logging console level no logging console
Parameters level Specifies the severity level of logged messages displayed on the console. Possible values: emergencies, alerts, critical, errors, warnings,
notifications, informational, debugging.
Default Setting The default severity level is informational. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command.
593
Example The following example limits logging messages displayed on the console to severity level errors.
Console(config)# logging console errors
logging buffered
The logging buffered Global Configuration mode command limits syslog messages displayed from an internal buffer based on severity. To cancel using the buffer, use the no form of this command. Syntax
logging buffered level no logging buffered
Parameters level Specifies the severity level of messages logged in the buffer. Possible values: emergencies, alerts, critical, errors, warnings,
notifications, informational, debugging.
Default Setting The default severity level is informational. Command Mode Global Configuration mode Command Usage All the syslog messages are logged to the internal buffer. This command limits the messages displayed to the user. Example The following example limits syslog messages displayed from an internal buffer based on severity level debugging.
Console(config)# logging buffered debugging
594
Parameters number Specifies the maximum number of messages stored in the history table. (Range: 20 - 400) Default Setting The default number of messages is 200. Command Mode Global Configuration mode Command Usage This command takes effect only after Reset. Example The following example changes the number of syslog messages stored in the internal buffer to 300.
Console(config)# logging buffered size 300
clear logging
The clear logging Privileged EXEC mode command clears messages from the internal logging buffer. Syntax
clear logging
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command.
595
Example The following example clears messages from the internal logging buffer.
Console# clear logging Clear logging buffer [confirm]
logging file
The logging file Global Configuration mode command limits syslog messages sent to the logging file based on severity. To cancel using the buffer, use the no form of this command. Syntax
logging file level no logging file
Parameters level Specifies the severity level of syslog messages sent to the logging filePossible values:: emergencies, alerts, critical, errors, warnings, notifications, informational and debugging. Default Setting The default severity level is errors. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example limits syslog messages sent to the logging file based on severity level alerts.
Console(config)# logging file alerts
596
The clear logging file Privileged EXEC mode command clears messages from the logging file. Syntax
clear logging file
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example clears messages from the logging file.
Console# clear logging file Clear Logging File [confirm]
aaa logging
The aaa logging Global Configuration mode command enables logging AAA login events. To disable logging AAA login events, use the no form of this command. Syntax
aaa logging login no aaa logging login
Parameters login Indicates logging messages related to successful login events, unsuccessful login events and other login-related events. Default Setting Logging AAA login events is enabled. Command Mode Global Configuration mode Command Usage Other types of AAA events are not subject to this command.
597
Example The following example enables logging messages related to AAA login events.
Console(config)# aaa logging login
file-system logging
The file-system logging Global Configuration mode command enables logging file system events. To disable logging file system events, use the no form of this command. Syntax
file-system logging copy no file-system logging copy file-system logging delete-rename no file-system logging delete-rename
Parameters copy Indicates logging messages related to file copy operations. delete-rename Indicates logging messages related to file deletion and renaming operations. Default Setting Logging file system events is enabled. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example enables logging messages related to file copy operations.
Console(config)# file-system logging copy
management logging
The management logging global configuration command enables logging management access list (ACL) events. To disable logging management access list events, use the no form of this command.
598
Syslog Commands
Syntax
management logging deny no management logging deny
Parameters deny Indicates logging messages related to deny actions of management ACLs. Default Setting Logging management ACL events is enabled. Command Mode Global Configuration mode Command Usage Other types of management ACL events are not subject to this command. Example The following example enables logging messages related to deny actions of management ACLs.
Console(config)# management logging deny
show logging
The show logging Privileged EXEC mode command displays the state of logging and the syslog messages stored in the internal buffer. Syntax
show logging
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command.
599
Example The following example displays the state of logging and the syslog messages stored in the internal buffer.
Console# show logging
Logging is enabled. Console logging: level debugging. Console Messages: 0 Dropped (severity). Buffer logging: level debugging. Buffer Messages: 11 Logged, 200 Max. File logging: level notifications. File Messages: 0 Dropped (severity). Syslog server 192.180.2.27 logging: errors. Messages: 6 Dropped (severity). Syslog server 192.180.2.28 logging: errors. Messages: 6 Dropped (severity). 2 messages were not logged (resources) Application filtering control Application ----------AAA File system File system Management ACL Event ----Login Copy Delete-Rename Deny Status -----Enabled Enabled Enabled Enabled
Buffer log: 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/0, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/1, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/2, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/3, changed state to up 11-Aug-2004 15:41:43: %SYS-5-CONFIG_I: Configured from memory by console 11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up 11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/0, changed state to down 11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/1, changed state to down 11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/2, changed state to down 11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/3, changed state to down
600
Syslog Commands
Related Commands logging on logging logging console logging buffered logging buffered size clear logging logging file clear logging file aaa logging file-system logging management logging
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the logging state and the syslog messages stored in the logging file.
Console# show logging file
Logging is enabled. Console logging: level debugging. Console Messages: 0 Dropped (severity). Buffer logging: level debugging. Buffer Messages: 11 Logged, 200 Max. File logging: level notifications. File Messages: 0 Dropped (severity). Syslog server 192.180.2.27 logging: errors. Messages: 6 Dropped (severity). Syslog server 192.180.2.28 logging: errors. Messages: 6 Dropped (severity). 2 messages were not logged (resources)
601
Application filtering control Application ----------AAA File system File system Management ACL Event ----Login Copy Delete-Rename Deny Status -----Enabled Enabled Enabled Enabled
Buffer log: 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/0, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/1, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/2, changed state to up 11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/3, changed state to up 11-Aug-2004 15:41:43: %SYS-5-CONFIG_I: Configured from memory by console 11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up 11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/0, changed state to down 11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/1, changed state to down 11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/2, changed state to down 11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/3, changed state to down
Related Commands logging on logging logging console logging buffered logging buffered size clear logging logging file clear logging file aaa logging
602
Syslog Commands
file-system logging management logging
show syslog-servers
The show syslog-servers Privileged EXEC mode command displays the settings of the syslog servers. Syntax
show syslog-servers
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the settings of the syslog servers.
Console# show syslog-servers
Device Configuration IP address -----------192.180.2.27 192.180.2.28 Port ---514 514 Severity ------------Informational Warning Facility -------local7 local7 Description -----------
603
Discovers routes that packets actually take when traveling to their UE destination. Enables logging on to a host that supports Telnet. Enables switching to another open Telnet session. Reloads the operating system. Specifies or modifies the device host name. To remove the existing host name, use the no form of the command. Enables forcing the selection of a stack master. To return to the default configuration, use the no form of this command. Reloads stack members. Configures the order of the units in the display. To return to the default configuration, use the no form of this command .t Displays information about the status of a stack. Displays information about the active users. Lists open Telnet sessions. Displays system information. Displays system version information. Enables measuring CPU utilization. To return to the default configuration, use the no form of this command. UE UE PE GC GC PE GC UE UE UE UE UE GC UE
ping
The ping User EXEC mode command sends ICMP echo request packets to another node on the network. Syntax
ping {ip-address | hostname }[size packet_size] [count packet_count] [timeout
time_out] Parameters ip-address IP address to ping. hostname Host name to ping. (Range: 1-158 characters) packet_size Number of bytes in a packet. The actual packet size is eight bytes larger than the specified size specified because the device adds header information. (Range: 56 - 1472 bytes)
604
packet_count Number of packets to send. If 0 is entered, it pings until stopped. (Range: 0-65535 packets) time_out Timeout in milliseconds to wait for each reply. (Range: 50 - 65535 milliseconds) Default Setting Default packet size is 56 bytes. Default number of packets to send is 4. Default timeout value is 2000 milliseconds. Command Mode User EXEC mode Command Usage Press Esc to stop pinging. Following are examples of unsuccessful pinging: Destination does not respond. If the host does not respond, a no answer from host appears in ten seconds. Destination unreachable. The gateway for this destination indicates that the destination is unreachable. Network or host unreachable. The device found no corresponding entry in the route table. Examples The following example displays pinging results:
Console> ping 10.1.1.1 Pinging 10.1.1.1 with 64 bytes of data:
64 64 64 64
----10.1.1.1 PING Statistics---4 packets transmitted, 4 packets received, 0% packet loss round-trip (ms) min/avg/max = 7/8/11
605
4
64 64 64 64
----10.1.1.1 PING Statistics---4 packets transmitted, 4 packets received, 0% packet loss round-trip (ms) min/avg/max = 7/8/11
traceroute
The traceroute User EXEC mode command discovers routes that packets actually take when traveling to their destination. Syntax
traceroute {ip-address |hostname }[size packet_size] [ttl max-ttl] [count packet_count] [timeout time_out] [source ip-address] [tos tos]
Parameters ip-address IP address of the destination host. hostname Host name of the destination host. (Range: 1-158 characters) packet_size Number of bytes in a packet. (Range: 40-1500) max-ttl The largest TTL value that can be used. The traceroute command terminates when the destination is reached or when this value is reached. (Range:1-255) packet_count The number of probes to be sent at each TTL level. (Range:1-10) time_out The number of seconds to wait for a response to a probe packet. (Range:1-60) ip-address One of the devices interface addresses to use as a source address for the probes. The device normally selects what it feels is the best source address to use. tos The Type-Of-Service byte in the IP Header of the packet. (Range: 0-255) Default Setting The default number of bytes in a packet is 40. The default maximum TTL value is 30. The default number of probes to be sent at each TTL level is 3. The default timeout interval in seconds is 3. Command Mode User EXEC mode
606
Command Usage The traceroute command takesadvantage of the error messages generated by the devices when a datagram exceeds its time-to-live (TTL) value. The traceroute command starts by sending probe datagrams with a TTL value of one. This causes the first device to discard the probe datagram and send back an error message. The traceroute command sends several probes at each TTL level and displays the round-trip time for each. The traceroute command sends out one probe at a time. Each outgoing packet may result in one or two error messages. A "time exceeded" error message indicates that an intermediate device has seen and discarded the probe. A "destination unreachable" error message indicates that the destination node has received the probe and discarded it because it could not deliver the packet. If the timer goes off before a response comes in, the traceroute command prints an asterisk (*). The traceroute command terminates when the destination responds, when the maximum TTL is exceeded or when the user interrupts the trace by pressing Esc. Examples The following example discovers the routes that packets will actually take when traveling to their destination.
Console> traceroute umaxp1.physics.lsa.umich.edu Type Esc to abort. Tracing the route to umaxp1.physics.lsa.umich.edu (141.211.101.64) 1 i2-gateway.stanford.edu (192.68.191.83) 0 msec 0 msec 0 msec 2 STAN.POS.calren2.NET (171.64.1.213) 0 msec 0 msec 0 msec 3 SUNV--STAN.POS.calren2.net (198.32.249.73) 1 msec 1 msec 1 msec 4 Abilene--QSV.POS.calren2.net (198.32.249.162) 1 msec 1 msec 1 msec 5 kscyng-snvang.abilene.ucaid.edu (198.32.8.103) 33 msec 35 msec 35 msec 6 iplsng-kscyng.abilene.ucaid.edu (198.32.8.80) 47 msec 45 msec 45 msec 7 so-0-2-0x1.aa1.mich.net (192.122.183.9) 56 msec 53 msec 54 msec 8 atm1-0x24.michnet8.mich.net (198.108.23.82) 56 msec 56 msec 57 msec 9 * * * 10 A-ARB3-LSA-NG.c-SEB.umnet.umich.edu (141.211.5.22) 58 msec 58 msec 58 msec 11 umaxp1.physics.lsa.umich.edu (141.211.101.64) 62 msec 63 msec 63 msec
607
The following table describes characters that may appear in the traceroute command output.
Field * ? A F H N P Q R S U Description The probe timed out. Unknown packet type. Administratively unreachable. Usually, this output indicates that an access list is blocking traffic. Fragmentation is required and DF is set. Host unreachable. Network unreachable. Protocol unreachable. Source quench. Fragment reassembly time exceeded. Source route failed. Port unreachable.
telnet
The telnet User EXEC mode command enables logging on to a host that supports Telnet. Syntax
telnet {ip-address | hostname} [port] [keyword1......]
Parameters ip-address IP address of the destination host. hostname Host name of the destination host. (Range: 1-158 characters) port A decimal TCP port number, or one of the keywords listed in the Ports table in the Command Usage. keyword One or more keywords listed in the Keywords table in the Command Usage. Default Setting The default port is the Telnet port (decimal23) on the host. Command Mode User EXEC mode
608
At any time during an active Telnet session, Telnet commands can be listed by pressing the Ctrl-shift-6-? keys at the system prompt. A sample of this list follows. Note that the Ctrl-shift-6 sequence appears as ^^ on the screen.
Console> Ctrl-shift-6 ? [Special telnet escape help] ^^ B sends telnet BREAK ^^ C sends telnet IP ^^ H sends telnet EC ^^ O sends telnet AO ^^ T sends telnet AYT ^^ U sends telnet EL Ctrl-shift-6 x suspends the session (return to system command prompt)
Several concurrent Telnet sessions can be opened and switched. To open a subsequent session, the current connection has to be suspended by pressing the escape sequence keys (Ctrl-shift-6) and x to return to the system command prompt. Then open a new connection with the telnet User EXEC mode command.
Keywords Table Options /echo /quiet /source-interface Description Enables local echo. Prevents onscreen display of all messages from the software. Specifies the source interface.
609
/stream
Ctrl-shift-6 x Ports Table Keyword BGP chargen cmd daytime discard domain echo exec finger ftp ftp-data gopher hostname ident irc klogin kshell login lpd nntp pim-auto-rp pop2 pop3 smtp
Description Border Gateway Protocol Character generator Remote commands Daytime Discard Domain Name Service Echo Exec Finger File Transfer Protocol FTP data connections Gopher NIC hostname server Ident Protocol Internet Relay Chat Kerberos login Kerberos shell Login Printer service Network News Transport Protocol PIM Auto-RP Post Office Protocol v2 Post Office Protocol v3 Simple Mail Transport Protocol
Port Number 179 19 514 13 9 53 7 512 79 21 20 70 101 113 194 543 544 513 515 119 496 109 110 25
610
This command lists concurrent telnet connections to remote hosts that were opened by the current telnet session to the local device. It does not list telnet connections to remote hosts that were opened by other telnet sessions. Example The following example displays connecting to 176.213.10.50 via Telnet.
Console> telnet 176.213.10.50 Esc U sends telnet EL
resume
The resume User EXEC mode command enables switching to another open Telnet session. Syntax
resume [connection]
Parameters connection The connection number. (Range: 1 - 4 connections) Default Setting The default connection number is that of the most recent connection. Command Mode User EXEC mode Command Usage There are no user guidelines for this command.
611
reload
The reload Privileged EXEC mode command reloads the operating system. Syntax
reload
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage Caution should be exercised when resetting the device, to ensure that no other activity is being performed. In particular, the user should verify that no configuration files are being downloaded at the time of reset. Example The following example reloads the operating system.
Console# reload This command will reset the whole system and disconnect your current session. Do you want to continue (y/n) [n]?
hostname
The hostname Global Configuration mode command specifies or modifies the device host name. To remove the existing host name, use the no form of the command. Syntax
hostname name no hostname
Parameters name The host name. of the device. (Range: 1-158 characters)
612
stack master
The stack master Global Configuration mode command enables forcing the selection of a stack master. To return to the default configuration, use the no form of this command. Syntax
stack master unit unit no stack master
Parameters unit Unit number of the new master (Range: 1-2) Default Setting Disables forcing the selection of a stack master. Command Mode Global Configuration mode Command Usage The following algorithm is used to select a unit as the master: If only one master-enabled unit is in the stack (1 or 2), it becomes the master. If a unit configured as a forced master, it becomes the master. If a forced master unit is removed from a stack and placed in a different stack with another forced master unit, both are considered to be forced, and the election criteria continue as follows: The unit with the longer up-time is elected master. Units are considered to have the same up-time if they were powered up within ten minutes of each other.
613
stack reload
The stack reload Privileged EXEC mode command reloads stack members. Syntax
stack reload [unit]
Parameters unit Number of the unit to be reloaded (Range: 1-6) Default Setting All units are reloaded. Command Modes Privileged EXEC mode Command Usage If no unit is specified, all units are reloaded. Example The following example reloads Unit 2 of the stack.
Console(config)# stack reload unit 2
stack display-order
The stack display-order Global Configuration mode command configures the order of the units in the display. To return to the default configuration, use the no form of this command . Syntax
stack display-order top unit bottom unit
614
Parameters top unit Specifies the number of the unit displayed at the top. (Range: 1-8) bottom unit Specifies the number of the unit displayed at the bottom. (Range: 1-8) Default Setting The master unit is displayed at the top. Command Modes Global Configuration mode Command Usage If the units are not adjacent in ring or chain topology, the units are not at the edge and the default display order is used. Example This example displays unit 8 at the top of the display and unit 1 at the bottom.
Console# config Console(config)# stack display-order top 8 bottom 1
show stack
The show stack User EXEC mode command displays information about the status of a stack. Syntax
show stack [unit unit]
Parameters unit Specifies the number of the unit. (Range: 1-8) Default Setting This command has no default configuration. Command Mode User EXEC mode
615
Console> show stack Unit ---3 4 5 6 1 2 Address ----------------00:00:b0:87:12:13 00:00:b0:87:12:14 00:00:b0:87:12:15 00:00:b0:87:12:16 00:00:b0:87:12:12 00:00:b0:87:12:11 Software Master -------- -----1.0.0.0 1.0.0.0 1.0.0.0 1.0.0.0 1.0.0.0 Forced 1.0.0.0 Enabled Uplink -----1 3 4 5 6 2 Downlink -------4 5 6 2 1 3 Status -----Slave Slave Slave Slave Master Slave
Configured order: Unit 1 at Top, Unit 6 at bottom Cant display order as requested.
Console> show stack 1 Unit 1: MAC address: 00:00:b0:87:12:11 Master: Forced. Product: OS-LS-6224. Software: 1.0.0.0 Status: Master Active image: image-1. Selected for next boot: image-2.
616
show users
The show users User EXEC mode command displays information about the active users. Syntax
show users
Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays information about the active users.
Console show users
Location ------------
show sessions
The show sessions User EXEC mode command lists open Telnet sessions. Syntax
show sessions
617
Command Mode User EXEC mode Command Usage There are no user guidelines for this command. Example The following example lists open Telnet sessions.
Console> show sessions
Connection ---------1 2
Port ----23 23
Byte ---89 8
show system
The show system User EXEC mode command displays system information. Syntax
show system [unit unit]
Parameters unit Specifies the number of the unit. (Range: 1-6) Default Setting This command has no default configuration. Command Mode User EXEC mode
618
Unit ---1
Unit ---1
Unit ---1
Fan1 ---OK
Fan2 ---OK
Fan3 ---OK
Fan4 ---OK
Fan5 ---OK
show version
The show version User EXEC mode command displays system version information. Syntax
show version [unit unit]
Parameters unit Specifies the number of the unit. (Range: 1-6) Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage There are no user guidelines for this command.
619
Example The following example displays system version information (only for demonstration purposes).
Console> show version SW version 1.0.0.0 Boot version 1.0.0.0 HW version 1.0.0 (date 23-Jul-2004 time 17:34:19) (date 11-Jan-2004 time 11:48:21)
Unit ---1 2
service cpu-utilization
The service cpu-utilization Global Configuration mode command enables measuring CPU utilization. To return to the default configuration, use the no form of this command. Syntax
service cpu-utilization no service cpu-utilization
Default Setting Disabled. Command Mode Global Configuration mode Command Usage Use the show cpu utilization Privileged EXEC command to view information on CPU utilization. Example The following example enables measuring CPU utilization.
Console(config)# service cpu-utilization
620
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage Use the service cpu-utilization Global Configuration mode command to enable measuring CPU utilization. Example The following example displays information about CPU utilization.
Console# show cpu utilization CPU utilization service is on. CPU utilization -------------------------------------------------five seconds: 5%; one minute: 3%; five minutes: 3%
621
TACACS+ Commands
Table 4-32. TACACS+ Commands Command tacacs-server hostt tacacs-server key tacacs-server timeout tacacs-server source-ip show tacacs Function Specifies a TACACS+ host. To delete the specified name or address, use the no form of this command. Mode GC Page 4-622 4-623 4-624 4-625 4-625
Sets the authentication encryption key used for all TACACS+ GC communications between the device and the TACACS+ daemon. To disable the key, use the no form of this command. Sets the interval during which the device waits for a TACACS+ GC server to reply. To return to the default configuration, use the no form of this command. Configures the source IP address to be used for communication GC with TACACS+ servers. To return to the default configuration, use the no form of this command. Displays configuration and statistical information about a TACACS+ server. PE
tacacs-server host
The tacacs-server host Global Configuration mode command specifies a TACACS+ host. To delete the specified name or address, use the no form of this command. Syntax
tacacs-server host {ip-address | hostname} [single-connection] [port port-number] [timeout timeout] [key key-string] [source source] [priority priority] no tacacs-server host {ip-address | hostname}
Parameters ip-address IP address of the TACACS+ server. hostname Host name of the TACACS+ server. (Range: 1 - 158 characters) single-connection Indicates a single-connection. Rather than have the device open and close a TCP connection to the daemon each time it must communicate, the single-connection option maintains a single open connection between the device and the daemon. port-number Specifies a server port number. (Range: 0 - 65535) timeout Specifies the timeout value in seconds. (Range: 1 - 30) key-string Specifies the authentication and encryption key for all TACACS+ communications between the device and the TACACS+ server. This key must match the encryption used on the TACACS+ daemon. To specify an empty string, enter "". (Range: 0 - 128 characters) source Specifies the source IP address to use for the communication. 0.0.0.0 indicates a request to use the IP address of the outgoing IP
622
TACACS+ Commands
interface. priority Determines the order in which the TACACS+ servers are used, where 0 is the highest priority. (Range: 0 - 65535) Default Setting No TACACS+ host is specified. If no port number is specified, default port number 49 is used. If no host-specific timeout, key-string or source value is specified, the global value is used. If no TACACS+ server priority is specified, default priority 0 is used. Command Mode Global Configuration mode Command Usage Multiple tacacs-server host commands can be used to specify multiple hosts. Example The following example specifies a TACACS+ host.
Console(config)# tacacs-server host 172.16.1.1
Related Commands tacacs-server key tacacs-server timeout tacacs-server source-ip show tacacs
tacacs-server key
The tacacs-server key Global Configuration mode command sets the authentication encryption key used for all TACACS+ communications between the device and the TACACS+ daemon. To disable the key, use the no form of this command. Syntax
tacacs-server key key-string no tacacs-server key
Parameters key-string Specifies the authentication and encryption key for all TACACS+ communications between the device and the TACACS+ server. This key must match the encryption used on the TACACS+ daemon. (Range: 0-128 characters) Default Setting Empty string.
623
Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Examples The following example sets the authentication encryption key.
Console(config)# tacacs-server key alcatel-s
Related Commands tacacs-server host tacacs-server timeout tacacs-server source-ip show tacacs
tacacs-server timeout
The tacacs-server timeout Global Configuration mode command sets the interval during which the device waits for a TACACS+ server to reply. To return to the default configuration, use the no form of this command. Syntax
tacacs-server timeout timeout no tacacs-server timeout
Parameters timeout Specifies the timeout value in seconds. (Range: 1 - 30) Default Setting 5 seconds Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Examples The following example sets the timeout value to 30.
Console(config)# tacacs-server timeout 30
624
TACACS+ Commands
tacacs-server source-ip show tacacs
tacacs-server source-ip
The tacacs-server source-ip Global Configuration mode command configures the source IP address to be used for communication with TACACS+ servers. To return to the default configuration, use the no form of this command. Syntax
tacacs-server source-ip source no tacacs-server source-ip source
Parameters source Specifies the source IP address. Default Setting The source IP address is the address of the outgoing IP interface. Command Mode Global Configuration mode Command Usage There are no user guidelines for this command. Example The following example specifies the source IP address.
Console(config)# tacacs-server source-ip 172.16.8.1
Related Commands tacacs-server host tacacs-server key tacacs-server timeout show tacacs
show tacacs
The show tacacs Privileged EXEC mode command displays configuration and statistical information about a TACACS+ server. Syntax show tacacs [ip-address] Parameters ip-address Name or IP address of the TACACS+ server. Default Setting This command has no default configuration.
625
Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays configuration and statistical information about a TACACS+ server.
Console# show tacacs
IP address --------172.16.1. 1
Status
Port
TimeO ut -----Globa l
Source IP -------Global
Priority
------
----
--------
Connecte d
49
Related Commands tacacs-server host tacacs-server key tacacs-server timeout tacacs-server source-ip
626
switchport customer Enables the receiving of Multicast transmissions from a VLAN Interface 4-627 multicast-tv vlan that is not the Customer ports VLAN, while keeping the L2 Configurati segregation with subscribers on different Customer port VLANs. on ip igmp snooping map cpe vlan show ip igmp snooping cpe vlans Maps CPE VLANs to multicast-TV VLANs. Displays the CPE VLANs to Multicast TV VLANs mappings. Global 4-628 Configurati on Privileged EXEC mode 4-629
627
Syntax
switchport customer multicast-tv vlan {add vlan-list | remove vlan-list}
vlan-list List of Multicast TV VLANs. Default Setting The port is not member in any multicast TV VLAN. Command Mode Interface configuration (Ethernet, port-channel) Command Usage The user cannot transmit Multicast transmissions on Multicast TV VLANs. Example The following example configure port e1 to enable receiving multicast transmissions from a VLAN that is not the customer ports VLAN.
Console (config-if)# switchport customer multicast-tv vlan add 3000
Related Commands ip igmp snooping map cpe vlan show ip igmp snooping cpe vlans
Parameters cpe vlan vlan-id Specify the CPE VLAN. multicast-tv vlan vlan-id Specify the Multicast VLAN. Default Setting No mapping exists. Command Mode Global configuration Command Usage Use this command to associate CPE VLAN to a multicast-TV VLAN. If an IGMP message is received on a customer port tagged with a CPE VLAN, and there is a mapping from that CPE VLAN to a multicast-TV VLAN, the IGMP message would be associated with the multicast-TV VLAN.
628
Example The following example maps an internal CPE VLAN number 4 to the Multicast TV VLAN number 300.
Console (config)# ip igmp snooping map cpe vlan 4 multicast-tv vlan 300
Related Commands switchport customer multicast-tv vlan show ip igmp snooping cpe vlans
Parameters vlan-id CPE VLAN ID value. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the CPE VLANs to Multicast TV VLANs mappings.
Console# show ip igmp snooping cpe vlans CPE VLAN -------3 3 Multicast-TV VLAN -----------------1118 1119
Related Commands switchport customer multicast-tv vlan ip igmp snooping map cpe vlan
629
Syntax show ip igmp snooping interface vlan-id Parameters vlan-id Specifies the valid VLAN number. Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Example The following example shows IGMP snooping information on multicast groups.
Console # show ip igmp snooping interface 1000 IGMP Snooping is globally enabled IGMP Snooping admin: Enabled Hosts and routers IGMP version: 2 IGMP snooping oper mode: Enabled IGMP snooping querier admin: Enabled IGMP snooping querier oper: Enabled IGMP snooping querier address admin: IGMP snooping querier address oper: 172.16.1.1 IGMP snooping querier version admin: 3 IGMP snooping querier version oper: 2
IGMP host timeout is 300 sec IGMP Immediate leave is disabled. IGMP leave timeout is 10 sec IGMP mrouter timeout is 300 sec Automatic learning of multicast router ports is enabled
630
Use the ip dhcp snooping trust interface configuration command IC to configure a port as trusted for DHCP snooping purposes. Use the ip dhcp information option allowed-untrusted global GC configuration command on a switch to configure it to accept DHCP packets with option-82 information from an untrusted port. Use the ip dhcp information option global configuration command GC to enable DHCP option-82 data insertion. Use the ip dhcp snooping verify global configuration command to GC configure the switch to verify on an untrusted port that the source MAC address in a DHCP packet matches the client hardware address. Use the ip dhcp snooping database global configuration command to configure the DHCP snooping binding file. Use the ip dhcp snooping database update-freq global configuration command to configure the update frequency ofthe DHCP snooping binding file. Use the ip dhcp snooping binding privileged EXEC command to configure the DHCP snooping binding database and to add binding entries to the database. Use the clear ip dhcp snooping database privileged EXEC command to clear the DHCP binding database. Use the show ip dhcp snooping EXEC command to display the DHCP snooping configuration. GC GC PE PE UE
Use the show ip dhcp snooping binding user EXEC command to UE display the DHCP snooping binding database and configuration information for all interfaces on a switch.
Use the ip source-guard binding global configuration command to GC configure static IP source bindings on the switch.
631
Command ip source-guard tcam retries-freq ip source-guard tcam locate show ip source-guard show ip source-guard inactive ARP Inspection ip arp inspection ip arp inspection vlan ip arp inspection trust ip arp inspection validate
Function Use the ip source-guard tcam retries-freq global configuration command to configure the frequency of retries for TCAM resources for inactive IP source guard addresses
Mode GC
Use the ip source-guard tcam locate privileged EXEC command PE to manually retry to locate TCAM resources for inactive IP source guard addresses. Use the show ip source-guard EXEC command to display the IP UE source guard configuration. Use the show ip source-guard inactive EXEC command to display UE the IP source guard inactive addresses.
Use the ip arp inspection global configuration command to globally enable ARP inspection.
GC
4-645 4-646 4-646 4-647 4-648 4-648 4-649 4-650 4-646 4-651
Use the ip arp inspection vlan global configuration command to GC enable ARP inspection based on DHCP snooping database on a VLAN. Use the ip arp inspection trust interface configuration command to ICE configure an interface trust state that determines if incoming Address Resolution Protocol (ARP) packets are inspected. Use the ip arp inspection validate global configuration command GC to perform specific checks for dynamic Address Resolution Protocol (ARP) inspection.
ip arp inspection list Use the ip arp inspection list create global configuration command GC create to create static ARP binding list and to enter to the ARP list configuration mode. ip mac Use the ip mac ARP-list configuration command to static ARP binding. ALC
ip arp inspection list Use the ip arp inspection list assign global configuration command GC assign to assign static ARP binding list to a VLAN. ip arp inspection logging interval show ip arp inspection show ip arp inspection list Use the ip arp inspection logging interval global configuration command to configure the minimal interval between successive ARP SYSLOG messages. Use the show ip arp inspection EXEC command to display the ARP inspection configuration. GC UE
Use the show ip arp inspection list priviledged EXEC command to PE display the static ARP binding list.
ip dhcp snooping
The ip dhcp snooping Global Configuration mode command globally enables DHCP snooping. To return to the default configuration, use the no form of this command. Syntax ip dhcp snooping
632
User Guidelines For any DHCP snooping configuration to take effect, DHCP snooping must be globally enable. DHCP snooping is not active until you enable snooping on a VLAN by using the ip dhcp snooping vlan global configuration command. Example The following example globally enables DHCP snooping.
Console # (config)# ip dhcp snooping Console # (config)#
633
634
Example The following example configures the switch to accept DHCP packets with option-82 information from an untrusted port.
Console # (config)# ip dhcp information option allowed-untrusted Console # (config)#
635
User Guidelines There are no user guidelines for this command. Example The following example configures the switch to verify, on an untrusted port, that the source MAC address in a DHCP packet matches the client hardware address.
Console # (config)# ip dhcp snooping verify Console # (config)#
636
637
User Guidelines After entering this command an entry would be added to the DHCP snooping database. If DHCP snooping binding file exists, the entry would be added to that file also. The entry would be displayed in the show commands as a DHCP Snooping entry. Example The following example configures the DHCP snooping binding database.
Console # ip dhcp snooping binding 00:00:B4:00:7F:EE 1 10.6.22.195 ethernet 1/e16 Console #
638
639
Example The following examples displays the DHCP snooping binding database and configuration information for all interfaces on a switch.
Console# show ip dhcp snooping binding Update frequency: 1200 Total number of binding: 3
VLAN ---------3
snooping (s) 3
ip source-guard (global)
The ip source-guard Global Configuration mode command globally enables the IP source guard. To disable IP source guard, use the no form of this command. Syntax ip source-guard no ip source-guard Default Configuration IP source guard is disabled. Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command. Example The following example globally enables the IP source guard.
Console # (config)# ip source-guard Console # (config)#
ip source-guard (interface)
The ip source-guard Interface Configuration (Ethernet, Port-channel) mode command enables IP source guard on an interface. To disable IP source guard, use the no form of this command. Syntax ip source-guard no ip source-guard
640
ip source-guard binding
The ip source-guard binding Global Configuration mode command configures the static IP source bindings on the switch. To delete static bindings, use the no form of this command. Syntax ip source-guard binding mac-address vlan-id ip-address {ethernet interface | port-channel port-channel-number} no ip source-guard binding mac-address vlan-id Parameters mac-address Specifies a MAC address. vlan-id Specifies a VLAN number. ip-address Specifies an IP address. interface Specifies an Ethernet port. port-channel-number Specifies the Port-channel number. Default Configuration No static binding exists. Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command.
641
Example The following example configures the static IP source bindings on the switch for port 1/e16.
Console # (config)# ip source-guard binding 00:60:70:4C:73:FF 1 10.6.22.195 ethernet 1/e16 Console # (config)#
642
show ip source-guard
The show ip source-guard EXEC mode command displays the IP source guard configuration. Syntax show ip source-guard [mac-address mac-address] [ip-address ip-address] [vlan vlan] [ethernet interface | port-channel port-channel-number]
643
Parameters mac-address Specifies a MAC address. ip-address Specifies an IP address. vlan-id Specifies a VLAN number. interface Specifies an Ethernet port. port-channel-number Specifies a port-channel number. Default Configuration This command has no default configuration. Command Mode EXEC mode User Guidelines There are no user guidelines for this command. Example The following example displays the IP source guard configuration.
Console# show ip source-guard IP source guard is enabled.
Interface
Filter
Status
VLAN
Type
---------- ---------- ---------- ---------- ---------- ---------- ---------1/21 1/22 1/22 1/22 1/23 1/24 1/32 IP IP IP IP IP IP IP Active Active Active Active Active Active Inactive 10.1.8.1 10.1.12.2 10.1.8.2 10.1.12.2 Deny All 10.1.8.218 0060.704C. 3 7BAC 10.1.8.32 0060.704C. 3 83FF Static DHCP 0060.704C. 3 73FF 0060.704C. 4 7BC3 0060.704C. 3 7BC1 0060.704C. 4 7BC3 DHCP DHCP DHCP DHCP
644
User Guidelines Since the IP source guard uses the Ternary Content Addressable Memory (TCAM) resources, there may be situations where IP source guard addresses are inactive because of lack of TCAM resources. By default, every minute the software conducts a search for available space in the TCAM for the inactive IP source guard addresses. The ip source-guard tcam retries-freq Global Configuration mode command changes the frequency or disables automatic retries for TCAM space. The ip source-guard tcam locate Privileged EXEC mode command retries locating TCAM resources for the inactive IP source guard addresses. This command displays the inactive IP source guard addresses. Example The following example displays the IP source guard inactive addresses.
Console# show ip source-guard inactive TCAM resources search frequency: 10 minutes
Interface
Filter
VLAN
Type
Reason
---------- ---------- ---------- ---------- ---------- ---------- ---------1/32 IP 10.1.8.32 0060.704C. 3 83FF 3DHCP Resource Problem
ip arp inspection
The ip arp inspection Global Configuration mode command globally enables ARP inspection. To disable ARP inspection, use the no form of this command. Syntax ip arp inspection no ip arp inspection Default Configuration The default configuration is set to disabled. Command Mode Global Configuration mode
645
User Guidelines There are no user guidelines for this command. Example The following example globally enables the ARP inspection.
Console # (config)# ip arp inspection Console # (config)# 01-Jan-2000 23:07:53 %ARPINSP-I-PCKTLOG: ARP packet dropped from port g3 with VLAN tag 1 and reason: packet verification failed SRC MAC 00:00:5e:00:01:07 SRC IP 10.6.22.193 DST MAC 00:00:00:00:00:00 DST IP 10.6.22.195
646
For untrusted interfaces, the switch intercepts all ARP requests and responses. It verifies that the intercepted packets have valid IP-to-MAC address bindings before updating the local cache and before forwarding the packet to the appropriate destination. The switch drops invalid packets and logs them in the log buffer according to the logging configuration specified with the ip arp inspection log-buffer vlan Global Configuration mode command. Example The following example configures an ARP inspection trust state on port 1/e16.
Console # (config)# interface ethernet 1/e16 Console # (config-if)# ip arp inspection trust Console # (config-if)#
647
ip mac
The ip mac ARP-list Configuration mode command displays static ARP binding. To delete a binding, use the no form of this command. Syntax ip ip-address mac mac-address
648
Parameters ip-address Specifies the IP address to be entered to the list. mac-address Specifies the MAC address associated with the IP address. Default Configuration No binding is defined. Command Mode ARP-list Configuration mode User Guidelines There are no user guidelines for this command. Example The following example displays static ARP binding.
Console(config)# ip arp inspection list servers Console(config-ARP-list)# ip 172.16.1.1 mac 0060.704C.7321 Console(config-ARP-list)# ip 172.16.1.2 mac 0060.704C.7322
649
650
Trusted ----------yes no
IP ----------172.16.1.1 172.16.1.2
651
Exits any configuration mode to the next highest mode in the CLI All mode hierarchy. Configur ation Modes Closes an active terminal session by logging off the device. Ends the current configuration session and returns to the Privileged EXEC mode. Displays a brief description of the help system. PE,UE All Configur ation Modes All Comma nd Modes
exit end
4-656 4-657
help
4-657
Enables dumping all the output of a show command without UE prompting. To disable dumping, use the no form of this command. Lists the commands entered in the current session. Displays the current privilege level. UE PE,UE
do
To execute an EXEC-level command from the Global Configuration mode or any configuration submode, use the do command in any configuration mode. Syntax
do command
Parameters command The EXEC command to be executed. Default Setting This command has no default configuration. Command Mode All configuration modes
652
Authorization Required Required Required Required Required Required Required Not required Guest
enable
The enable User EXEC mode command enters the Privileged EXEC mode. Syntax
enable [privilege-level]
Parameters privilege-level Privilege level to enter the system. (Range: 1 - 15) Default Setting The default privilege level is 15. Command Mode User EXEC mode Command Usage There are no user guidelines for this command.
653
disable
The disable Privileged EXEC mode command returns to the User EXEC mode. Syntax
disable [privilege-level]
Parameters privilege-level Privilege level to enter the system. (Range: 1 - 15) Default Setting The default privilege level is 1. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example return to Users EXEC mode.
Console# disable Console>
login
The login User EXEC mode command changes a login username. Syntax
login
Default Setting This command has no default configuration. Command Mode User EXEC mode
654
configure
The configure Privileged EXEC mode command enters the Global Configuration mode. Syntax
configure
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example enters Global Configuration mode.
Console# configure Console(config)#
exit (Configuration)
The exit command exits any configuration mode to the next highest mode in the CLI mode hierarchy. Syntax
exit
655
Default Setting This command has no default configuration. Command Mode All configuration modes Command Usage There are no user guidelines for this command. Example The following example changes the configuration mode from Interface Configuration mode to Privileged EXEC mode.
Console(config-if)# exit Console(config)# exit Console#
exit
The exit Privileged/User EXEC mode command closes an active terminal session by logging off the device. Syntax
exit
Default Setting This command has no default configuration. Command Mode Privileged and User EXEC modes Command Usage There are no user guidelines for this command. Example The following example closes an active terminal session.
Console> exit
656
Default Setting This command has no default configuration. Command Mode All configuration modes. Command Usage There are no user guidelines for this command. Example The following example changes from Global Configuration mode to Privileged EXEC mode.
Console(config)# end Console#
help
The help command displays a brief description of the help system. Syntax
help
Default Setting This command has no default configuration. Command Mode All command modes Command Usage There are no user guidelines for this command.
657
terminal datadump
The terminal datadump User EXEC mode command enables dumping all the output of a show command without prompting. To disable dumping, use the no form of this command. Syntax
terminal datadump no terminal datadump
Default Setting Dumping is disabled. Command Mode User EXEC mode Command Usage By default, a More prompt is displayed when the output contains more lines than can be displayed on the screen. Pressing the Enter key displays the next line; pressing the Spacebar displays the next screen of output. The datadump command enables dumping all output immediately after entering the show command. This command is relevant only for the current session. Example This example dumps all output immediately after entering a show command.
Console> terminal datadump
658
show history
The show history User EXEC mode command lists the commands entered in the current session. Syntax
show history
Default Setting This command has no default configuration. Command Mode User EXEC mode Command Usage The buffer includes executed and unexecuted commands. Commands are listed from the first to the most recent command. The buffer remains unchanged when entering into and returning from configuration modes. Example The following example displays all the commands entered while in the current Privileged EXEC mode.
Console# show version SW version 3.131 (date 23-Jul-2004 time 17:34:19) HW version 1.0.0 Console# show clock 15:29:03 Jun 17 2004 Console# show history show version show clock show history 3 commands were logged (buffer size is 10)
show privilege
The show privilege Privileged/User EXEC mode command displays the current privilege level. Syntax
show privilege
659
Default Setting This command has no default configuration. Command Mode Privileged and User EXEC modes Command Usage There are no user guidelines for this command. Example The following example displays the current privilege level for the Privileged EXEC mode.
Console# show privilege Current privilege level is 15
660
VLAN Commands
VLAN Commands
Table 4-36. VLAN Commands Command vlan database vlan default-vlan vlan interface vlan name map protocol protocols-group Function Enters the VLAN Configuration mode. Use the vlan VLAN Configuration mode command to create a VLAN. To delete a VLAN, use the no form of this command. Mode GC VC CM GC GC Page 4-662 4-663 4-664 4-664 4-665 4-666 4-666 4-667 4-668 4-669 4-670 4-671 4-672 4-673 4-674 4-675 4-676 4-677
to create a VLAN
Enters the Interface Configuration (VLAN) mode.
Adds a name to a VLAN. To remove the VLAN name, use the no ICV form of this command. Maps a protocol to a group of protocols. ICV ICV
switchport general Maps a protocol to a group of protocols. map protocols-group vlan switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vlan switchport general allowed vlan switchport general pvid switchport general ingress-filtering disable
Configures the VLAN membership mode of a port. To return to the IC default configuration, use the no form of this command. Configures the VLAN ID when the interface is in access mode. To IC return to the default configuration, use the no form of this command. Adds or removes VLANs to or from a trunk port. IC
Defines the native VLAN when the interface is in trunk mode. To IC return to the default configuration, use the no form of this command. Adds or removes VLANs from a general port. Configures the PVID when the interface is in general mode. To return to the default configuration, use the no form of this command. Disables port ingress filtering. To return to the default configuration, use the no form of this command. IC IC IC IC IC
switchport general Discards untagged frames at ingress. To return to the default acceptable-frame-ty configuration, use the no form of this command. pe tagged-only switchport forbidden Forbids adding specific VLANs to a port. To return to the default vlan configuration, use the remove parameter for this command. map mac macs-group
661
Function Sets a mac-based classification rule. Maps the IP subnet to a group of IP subnets.
Mode IC IC IC
Page 4-677 4-678 4-679 4-680 4-681 4-682 4-683 4-684 4-687
switchport protected Overrides the FDB decision and sends all Unicast, Multicast and IC Broadcast traffic to an uplink port. To return to the default configuration, use the no form of the command . ip internal-usage-vlan show vlan show vlan internal usage show interfaces switchport switchport access multicast-tv vlan Reserves a VLAN as the internal usage VLAN of an interface. To IC return to the default configuration, use the no form of this command. Displays VLAN information. Displays a list of VLANs used internally by the device. Displays the switchport configuration. PE PE PE
Use the switchport access multicast-tv vlan Interface IC Configuration mode command to enable receiving multicast transmissions from a VLAN that is not the Access port VLAN, while keeping the L2 segregation with subscribers on different Access port VLANs. Use the no form of this command to disable receiving multicast transmissions. Displays protocols-groups information. Displays macs-groups information. Displays Subnets-groups Information. PE PE PE
show vlan protocols-groups show vlan macs-groups Show Vlan Subnets-groups show vlan multicast-tv
Use the show vlan multicast-TV command to display information PE on the source ports and receiver ports of multicast-TV VLAN.
vlan database
The vlan database Global Configuration mode command enters the VLAN Configuration mode. Syntax
vlan database
Default Setting This command has no default configuration. Command Mode Global Configuration mode
662
VLAN Commands
Command Usage There are no user guidelines for this command. Example The following example enters the VLAN database mode.
Console(config)# vlan database Console(config-vlan)#
vlan
Use the vlan VLAN Configuration mode command to create a VLAN. To delete a VLAN, use the no form of this command. Syntax
vlan vlan-range no vlan vlan-range
Parameters vlan-range Specifies a list of VLAN IDs to be added. Separate nonconsecutive VLAN IDs with a comma and no spaces; a hyphen designates a range of IDs. Default Setting This command has no default configuration. Command Mode VLAN Configuration mode Command Usage There are no user guidelines for this command. Example The following example VLAN number 1972 is created.
Console(config)# vlan database Console(config-vlan)# vlan 1972
663
default-vlan vlan
Use the vlan VLAN Configuration mode command to create a VLAN. To restore the default configuration or delete a VLAN, use the no form of this command. Syntax default-vlan vlan vlan-id no default-vlan vlan Parameters vlan-id VLAN ID of the default VLAN. Default Configuration The default configuration is set to one. Command Mode VLAN Configuration mode User Guidelines There are no user guidelines for this command.
interface vlan
The interface vlan Global Configuration mode command enters the Interface Configuration (VLAN) mode. Syntax
interface vlan vlan-id
Parameters vlan-id Specifies an existing VLAN ID. Default Setting This command has no default configuration. Command Mode Global Configuration mode Command Usage If the VLAN doesn't exist ("ghost VLAN") only a partial list of the commands are available under the interface VLAN context. The commands that are supported for VLAN that don't exist are: 1) IGMP snooping control 2) Bridge multicast configuration
664
VLAN Commands
Example The following example configures VLAN 1 with IP address 131.108.1.27 and subnet mask 255.255.255.0.
Console(config)# interface vlan 1 Console(config-if)# ip address 131.108.1.27 255.255.255.0
Parameters vlan-range Specifies a list of VLAN IDs to be added. Separate nonconsecutive VLAN IDs with a comma and no spaces; a hyphen designates a range of IDs. all All existing static VLANs. Default Setting This command has no default configuration. Command Mode Global Configuration mode Command Usage Commands under the interface range context are executed independently on each interface in the range. If the command returns an error on one of the interfaces, an error message is displayed and execution of the command continues on the other interfaces. Example The following example groups VLANs 221, 228 and 889 to receive the same command.
Console(config)# interface range vlan 221-228,889 Console(config-if)#
665
show vlan
name
The name Interface Configuration mode command adds a name to a VLAN. To remove the VLAN name, use the no form of this command. Syntax
name string no name
Parameters string Unique name to be associated with this VLAN. (Range: 1-32 characters) Default Setting No name is defined. Command Mode Interface Configuration (VLAN) mode. Cannot be configured for a range of interfaces (range context). Command Usage There are no user guidelines for this command. Example The following example gives VLAN number 19 the name Marketing.
Console(config)# interface vlan 19 Console(config-if)# name Marketing
Parameters - protocol The protocol is 16 bits protocol number or one of the reserved names that are defined in the usage guidelines. (Range: 0x0000 0x0600)
666
VLAN Commands
- group Group number of group of protocols associated together. (Range: 1 2147483647) - encapsulation Currently the protocol ethernet is supported. If no option is indicated the default is ethernet. Default Setting There are no default settings for this command. Command Mode VLAN Configuration mode Command Usage The following protocol names are reserved for Ethernet Encapsulation: - ip-arp - ipx - ip Example The following example maps a protocol 0x0000 to protocol group 1000 for Ethernet port 1/e16 .
Console(config-vlan)# map protocol 0x000 ethernet protocols-group 1000 Console(config-if)# switchport mode access
Parameters - group Group number as defined in the map protocol to protocols-group. (Range: 1 - 65535) - vlan-id Define the VLAN ID in the classifying rule. Default Setting There are no default settings for this command.
667
Command Mode Interface configuration (Ethernet, port-channel) Command Usage The priority between VLAN classification rules is: 1) MAC based VLAN (Best match between the rules) 2) Subnet based VLAN (Best match between the rules) 3) Protocol based VLAN 4) PVID Example Console (config-if)# switchport general map protocols-group 1 vlan 8 The following example sets a protocol-based classification rule for Ethernet port 1/ e16.
Console(config)# interface ethernet 1/e16 Console(config-if)# switchport general map protocols-group 1 vlan 8
switchport mode
The switchport mode Interface Configuration mode command configures the VLAN membership mode of a port. To return to the default configuration, use the no form of this command. Syntax
switchport mode {access | trunk | general} no switchport mode
Parameters access Indicates an untagged layer 2 VLAN port. trunk Indicates a trunking layer 2 VLAN port. general Indicates a full 802-1q supported VLAN port. Default Setting All ports are in access mode, and belong to the default VLAN (whose VID=1). Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage There are no user guidelines.
668
VLAN Commands
Example The following example configures Ethernet port 1/e16 as an untagged layer 2 VLAN port.
Console(config)# interface ethernet 1/e16 Console(config-if)# switchport mode access
Related Commands switchport access vlan switchport trunk allowed vlan switchport trunk native vlan switchport general allowed vlan switchport general pvid switchport general ingress-filtering disable switchport general acceptable-frame-type tagged-only switchport forbidden vlan show interfaces switchport switchport access multicast-tv vlan
Parameters vlan-id Specifies the ID of the VLAN to which the port is configured. dynamicIndicates that the port is assigned to a VLAN based on the source MAC address of the host connected to the port. Default Setting All ports belong to VLAN 1. Command Mode Interface configuration (Ethernet, port-channel) mode Command Usage The command automatically removes the port from the previous VLAN and adds it to the new VLAN.
669
Example The following example configures a VLAN ID of 23 to the untagged layer 2 VLAN Ethernet port 1/e16.
Console(config)# interface ethernet 1/e16 Console(config-if)# switchport access vlan 23
Related Commands switchport mode switchport trunk allowed vlan switchport trunk native vlan switchport general allowed vlan switchport general pvid switchport general ingress-filtering disable switchport general acceptable-frame-type tagged-only switchport forbidden vlan show interfaces switchport switchport access multicast-tv vlan
Parameters add vlan-list List of VLAN IDs to be added. Separate nonconsecutive VLAN IDs with a comma and no spaces. A hyphen designates a range of IDs. remove vlan-list List of VLAN IDs to be removed. Separate nonconsecutive VLAN IDs with a comma and no spaces. A hyphen designates a range of IDs. Default Setting This command has no default configuration. Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage There are no user guidelines for this command.
670
VLAN Commands
Example The following example adds VLANs 1, 2, 5 to 6 to the allowed list of Ethernet port 1/ e16.
Console(config)# interface ethernet 1/e16 console(config-if)# switchport trunk allowed vlan add 1-2,5-6
Related Commands switchport mode switchport access vlan switchport trunk native vlan switchport general allowed vlan switchport general pvid switchport general ingress-filtering disable switchport general acceptable-frame-type tagged-only switchport forbidden vlan show interfaces switchport switchport access multicast-tv vlan
Parameters vlan-id Specifies the ID of the native VLAN. Default Setting VID=1. Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage The command adds the port as a member in the VLAN. If the port is already a member in the VLAN (not as a native), it should be first removed from the VLAN.
671
Example The following example configures VLAN number 123 as the native VLAN when Ethernet port 1/e16 is in trunk mode.
Console(config)# interface ethernet 1/e16 Console(config-if)# switchport trunk native vlan 123
Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport general allowed vlan switchport general pvid switchport general ingress-filtering disable switchport general acceptable-frame-type tagged-only switchport forbidden vlan show interfaces switchport switchport access multicast-tv vlan
Parameters add vlan-list Specifies the list of VLAN IDs to be added. Separate nonconsecutive VLAN IDs with a comma and no spaces. A hyphen designates a range of IDs. remove vlan-list Specifies the list of VLAN IDs to be removed. Separate nonconsecutive VLAN IDs with a comma and no spaces. A hyphen designates a range of IDs. tagged Indicates that the port transmits tagged packets for the VLANs. untagged Indicates that the port transmits untagged packets for the VLANs. Default Setting If the port is added to a VLAN without specifying tagged or untagged, the default setting is tagged.
672
VLAN Commands
Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage This command enables changing the egress rule (e.g., from tagged to untagged) without first removing the VLAN from the list.
Example The following example adds VLANs 2, 5, and 6 to the allowed list of Ethernet port 1/ e16 .
Console(config)# interface ethernet 1/e16 Console(config-if)# switchport general allowed vlan add 2,5-6 tagged
Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vlan switchport general pvid switchport general ingress-filtering disable switchport general acceptable-frame-type tagged-only switchport forbidden vlan show interfaces switchport switchport access multicast-tv vlan
Parameters vlan-id Specifies the PVID (Port VLAN ID). Default Setting If the default VLAN is enabled, PVID = 1. Otherwise, PVID=4095. Command Mode Interface Configuration (Ethernet, port-channel) mode
673
Command Usage There are no user guidelines for this command. Example The following example configures the PVID for Ethernet port 1/e16, when the interface is in general mode.
Console(config)# interface ethernet 1/e16 Console(config-if)# switchport general pvid 234
Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vlan switchport general allowed vlan switchport general ingress-filtering disable switchport general acceptable-frame-type tagged-only switchport forbidden vlan show interfaces switchport switchport access multicast-tv vlan
Default Setting Ingress filtering is enabled. Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage There are no user guidelines for this command.
674
VLAN Commands
Example The following example disables port ingress filtering on Ethernet port 1/e16.
Console(config)# interface ethernet 1/e16 Console(config-if)# switchport general ingress-filtering disable
Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vlan switchport general allowed vlan switchport general pvid switchport general acceptable-frame-type tagged-only switchport forbidden vlan show interfaces switchport switchport access multicast-tv vlan
Default Setting All frame types are accepted at ingress. Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage There are no user guidelines for this command. Example The following example configures Ethernet port 1/e16 to discard untagged frames at ingress.
Console(config)# interface ethernet 1/e16 Console(config-if)# switchport general acceptable-frame-type tagged-only
675
Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vlan switchport general allowed vlan switchport general pvid switchport general ingress-filtering disable switchport forbidden vlan show interfaces switchport switchport access multicast-tv vlan
Parameters add vlan-list Specifies the list of VLAN IDs to be added. Separate nonconsecutive VLAN IDs with a comma and no spaces. A hyphen designates a range of IDs. remove vlan-list Specifies the list of VLAN IDs to be removed. Separate nonconsecutive VLAN IDs with a comma and no spaces. A hyphen designates a range of IDs. Default Setting All VLANs are allowed. Command Mode Interface Configuration (Ethernet, port-channel) mode Command Usage This command can be used to prevent GVRP from automatically making the specified VLANs active on the selected ports. Example The following example forbids adding VLAN IDs 234 to 256 to Ethernet port 1/e16.
Console(config)# interface ethernet 1/e16 Console(config-if)# switchport forbidden vlan add 234-256
676
VLAN Commands
Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vlan switchport general allowed vlan switchport general pvid switchport general ingress-filtering disable switchport general acceptable-frame-type tagged-only show interfaces switchport switchport access multicast-tv vlan
677
Syntax
switchport general map macs-group group vlan vlan-id no switchport general map macs-group group
Parameters - group Group number. (Range: 1 2147483647) - vlan-id Define the VLAN ID that is associated with the rule. Default Setting There is no default setting for this command. Command Mode Interface configuration (Ethernet, port-channel) Command Usage MAC based VLAN rules cannot contain overlapping ranges on the same interface. The priority between VLAN classification rules is: 1) MAC based VLAN (Best match between the rules) 2) Subnet based VLAN (Best match between the rules) 3) Protocol based VLAN 4) PVID Example The following example maps group 100 to VLAN 23 for Ethernet port 1/e16.
Console(config)# interface ethernet 1/e16 Console(config-if)# switchport general map macs-group 100 vlan 23
678
VLAN Commands
Default Configuration This command has no default configuration. Command Mode VLAN Configuration mode User Guidelines There are no user guidelines for this command.
Parameters - group Group number. (Range: 1 2147483647) - vlan-id Define the VLAN ID that is associated with the rule. Default Setting There is no default setting for this command. Command Mode Interface configuration (Ethernet, port-channel) Command Usage The priority between VLAN classification rules is: 1) MAC based VLAN (Best match between the rules) 2) Subnet based VLAN (Best match between the rules) 3) Protocol based VLAN 4) PVID Example The following example maps sub-group 200 to VLAN 46 for Ethernet port 1/e16.
Console(config)# interface ethernet 1/e16 Console(config-if)# switchport general map subnets-group 200 vlan 46
679
switchport protected
The switchport protected Interface Configuration mode command overrides the FDB decision and sends all Unicast, Multicast and Broadcast traffic to an uplink GE port. To return to the default configuration, use the no form of the command . Syntax
switchport protected {ethernet port | port-channel port-channel-number } no switchport protected
Parameters port Specifies the uplink Ethernet GE port. port-channel-number Specifies the port-channel uplink GE port. Default Setting Overriding the FDB decision is disabled. Command Mode Interface Configuration (Ethernet, port-channel) Command Usage Packets to the MAC address of the device are sent to the device and not forwarded to the uplink. IGMP snooping works on PVE protected ports; however forwarding of query/ reports is not limited to the PVE uplink. Example The following example overrides the FDB decision and sends all Unicast, Multicast and Broadcast traffic to Ethernet port 1/g8.
Console# config Console(config)# interface ethernet 1/g8 Console(config-if)# switchport protected
Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vlan switchport general allowed vlan switchport general pvid switchport general ingress-filtering disable switchport general acceptable-frame-type tagged-only show interfaces switchport
680
VLAN Commands
switchport access multicast-tv vlan
ip internal-usage-vlan
The ip internal-usage-vlan Interface Configuration mode command reserves a VLAN as the internal usage VLAN of an interface. To return to the default configuration, use the no form of this command. Syntax
ip internal-usage-vlan vlan-id no ip internal-usage-vlan
Parameters vlan-id Specifies the ID of the internal usage VLAN. Default Setting The software reserves a VLAN as the internal usage VLAN of an interface. Command Mode Interface Configuration (Ethernet, port-channel) mode. The command cannot be configured for a range of interfaces. Command Usage An internal usage VLAN is required when an IP interface is configured on an Ethernet port or port-channel. This command enables the user to configure the internal usage VLAN of a port. If an internal usage VLAN is not configured and the user wants to configure an IP interface, an unused VLAN is selected by the software. If the software selected a VLAN for internal use and the user wants to use that VLAN as a static or dynamic VLAN, the user should do one of the following: Remove the IP interface. Create the VLAN and recreate the IP interface. Use this command to explicitly configure a different VLAN as the internal usage VLAN. Example The following example reserves an unused VLAN as the internal usage VLAN of ethernet port 1/e8.
Console# config Console(config)# interface ethernet 1/e8 Console(config-if)# ip internal-usage-vlan
Related Commands switchport mode switchport access vlan switchport trunk allowed vlan
681
switchport trunk native vlan switchport general allowed vlan switchport general pvid switchport general ingress-filtering disable switchport general acceptable-frame-type tagged-only show interfaces switchport switchport access multicast-tv vlan
show vlan
The show vlan Privileged EXEC mode command displays VLAN information. Syntax
show vlan [id vlan-id | name vlan-name]
Parameters vlan-id specifies a VLAN ID. vlan-name Specifies a VLAN name string. (Range: 1 - 32 characters) Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays all VLAN information.
Console# show vlan
VLAN ---1 10 11 20 21 30 31
682
VLAN Commands
91 3978
1/e1-e2 1/e17
static guest
Not Required -
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays VLANs used internally by the device.
Console# show vlan internal usage
Related Commands switchport access vlan switchport trunk allowed vlan switchport trunk native vlan switchport general allowed vlan switchport forbidden vlan
683
port-channel-number} Parameters interface A valid Ethernet port number. port-channel-number A valid port-channel number. Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the switchport configuration for Ethernet port 1/e1.
Console# show interface switchport ethernet 1/e1 Port 1/e1: VLAN Membership mode: General
Operating parameters: PVID: 1 (default) Ingress Filtering: Enabled Acceptable Frame Type: All GVRP status: Enabled Protected: Enabled, Uplink is 1/e9.
Port 1/e1 is member in: Vlan ---1 8 11 Name ------default VLAN008 VLAN011 Egress rule ----------untagged tagged tagged Type ------System Dynamic Static
684
VLAN Commands
72
VLAN0072
untagged
Static
Static configuration: PVID: 1 (default) Ingress Filtering: Enabled Acceptable Frame Type: All
Port 1/e1 is statically configured to: Vlan ---1 11 72 Name ------default VLAN011 VLAN0072 Egress rule ----------untagged tagged untagged
Console# show interface switchport ethernet 1/e2 Port 1/e2: VLAN Membership mode: General
Operating parameters: PVID: 4095 (discard vlan) Ingress Filtering: Enabled Acceptable Frame Type: All
Port 1/e1 is member in: Vlan ---91 Name -----------IP Telephony Egress rule ----------tagged Type -----Static
685
Static configuration: PVID: 8 Ingress Filtering: Disabled Acceptable Frame Type: All
Port 1/e2 is statically confgiured to: Vlan ---8 91 Name -----------VLAN0072 IP Telephony Egress rule ----------untagged tagged
Port 2/e19
Static configuration: PVID: 2922 Ingress Filtering: Enabled Acceptable Frame Type: Untagged GVRP status: Disabled
Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vlan switchport general allowed vlan switchport general pvid switchport general ingress-filtering disable switchport general acceptable-frame-type tagged-only
686
VLAN Commands
switchport forbidden vlan switchport access multicast-tv vlan
Related Commands switchport mode switchport access vlan switchport trunk allowed vlan switchport trunk native vlan switchport general allowed vlan switchport general pvid switchport general ingress-filtering disable switchport general acceptable-frame-type tagged-only
687
Default Configuration There are no user default configuration for this command. Command Mode Priviledged EXEC mode User Guidelines There are no user guidelines for this command. Example The following example configures displays IPMP Snooping configuration.
Console> show vlan protocols-groups Protocol -------0x800 (IP) 0x806 (ARP) 0x8898 Encapsulation ------------Ethernet Ethernet Ethernet Group ----1 1 3
688
VLAN Commands
Command Mode Privileged EXEC mode User Guidelines There are no user guidelines for this command. Example The following example displays macs-groups information.
Console# show vlan macs-groups
Group -------1 1
MAC ------------172.16.1.0
Group -------1
172.16.2.0
689
690
Specifies the TCP port to be used by the Web browser interface. GC To return to the default configuration, use the no form of this command. GC
ip http exec-timeout Sets the interval, which the system waits to user input in http sessions before automatic logoff. ip https server ip https port ip https exec-timeout crypto certificate generate crypto certificate request crypto certificate import ip https certificate show crypto certificate mycertificate show ip http show ip https
Enables configuring the device from a secured browser. To return GC to the default configuration, use the no form of this command. Specifies the TCP port used by the server to configure the device GC through the Web browser. To return to the default configuration, use the no form of this command.t sets the interval that the system waits to user input in https sessions before automatic logoff. Generates a self-signed HTTPS certificate. Generates and displays certificate requests for HTTPS. Imports a certificate signed by the Certification Authority for HTTPS. Configures the active certificate for HTTPS. To return to the default configuration, use the no form of this command. Displays the SSH certificates of the device. Displays the HTTP server configuration. Displays the HTTPS server configuration. GC GE PE GC GC PE PE PE
ip http server
The ip http server Global Configuration mode command enables configuring the device from a browser. To disable this function, use the no form of this command. Syntax
ip http server no ip http server
691
Command Mode Global Configuration Command Usage Only a user with access level 15 can use the Web server. Example The following example enables configuring the device from a browser.
Console(config)# ip http server
ip http port
The ip http port Global Configuration mode command specifies the TCP port to be used by the Web browser interface. To return to the default configuration, use the no form of this command. Syntax
ip http port port-number no ip http port
Parameters port-number Port number for use by the HTTP server. (Range: 1 - 65535) Default Setting The default port number is 80. Command Mode Global Configuration Command Usage Use the crypto certificate generate Global Configuration mode command to generate an HTTPS certificate. Specifying 0 as the port number effectively disables HTTP access to the device. Example The following example configures the http port number to 100.
Console(config)# ip http port 100
692
ip http exec-timeout
The ip http exec-timeout Global Configuration mode command sets the interval, which the system waits to user input in http sessions before automatic logoff. To restore the default configuration, use the no form of this command. Syntax ip http exec-timeout minutes [seconds] no ip http exec-timeout Parameters minutes Integer that specifies the number of minutes. seconds Additional time intervals in seconds. Default Configuration The default is 10 minutes. Command Mode Global Configuration mode User Guidelines This command also configures the exec-timeout for HTTPS in case the HTTPS timeout was not set. To specify no timeout, enter the ip https exec-timeout 0 0 command.
ip https server
The ip https server Global Configuration mode command enables configuring the device from a secured browser. To return to the default configuration, use the no form of this command. Syntax
ip https server no ip https server
Default Setting Disabled. Command Mode Global Configuration mode Command Usage Use the crypto certificate generate Global Configuration mode command to generate an HTTPS certificate.
693
Example The following example enables configuring the device from a secured browser.
Console(config)# ip https server
ip https port
The ip https port Global Configuration mode command specifies the TCP port used by the server to configure the device through the Web browser. To return to the default configuration, use the no form of this command. Syntax
ip https port port-number no ip https port
Parameters port-number Port number to be used by the HTTP server. (Range: 0 - 65535) Default Setting The default port number is 443. Command Mode Global Configuration mode Command Usage Specifying 0 as the port number effectively disables HTTP access to the device. Example The following example configures the https port number to 100.
Console(config)# ip https port 100
694
The ip https exec-timeout Global Configuration mode command sets the interval that the system waits to user input in https sessions before automatic logoff. To restore the default configuration, use the no form of this command. Syntax ip https exec-timeout minutes [seconds] no ip https exec-timeout Parameters minutes Integer that specifies the number of minutes. (Range: 1 - 65535) seconds Additional time intervals in seconds. (Range: 0-59) Default Configuration The default configuration is the exec-timeout set by the ip http exec-timeout command. Command Mode Global Configuration mode User Guidelines To specify no timeout, enter the ip https exec-timeout 0 0 command.
Parameters number Specifies the certificate number. (Range: 1 - 2) key-generate Regenerate the SSL RSA key. length Specifies the SSL RSA key length. (Range: 512 - 2048) common- name Specifies the fully qualified URL or IP address of the device. (Range: 1 - 64) organization Specifies the organization name. (Range: 1 - 64) organization-unit Specifies the organization-unit or department name. (Range: 1 - 64) location Specifies the location or city name. (Range: 1 - 64) state Specifies the state or province name. (Range: 1 - 64) country Specifies the country name. (Range: 2 - 2) days Specifies number of days certification is valid. (Range: 30 - 3650)
695
Default Setting The Certificate and SSLs RSA key pairs do not exist. If no certificate number is specified, the default certificate number is 1. If no RSA key length is specified, the default length is 1024. If no URL or IP address is specified, the default common name is the lowest IP address of the device at the time that the certificate is generated. If the number of days is not specified, the default period of time that the certification is valid is 365 days. Command Mode Global Configuration mode Command Usage The command is not saved in the device configuration; however, the certificate and keys generated by this command are saved in the private configuration (which is never displayed to the user or backed up to another device). Use this command to generate a self-signed certificate for the device. If the RSA keys do not exist, parameter key-generate must be used. Example The following example regenerates an HTTPS certificate.
Console(config)# crypto certificate 1 generate key-generate
Related Commands crypto certificate request crypto certificate import ip https certificate show crypto certificate mycertificate
Parameters number Specifies the certificate number. (Range: 1 - 2) common-name Specifies the fully qualified URL or IP address of the device. (Range: 1- 64) organization-unit Specifies the organization-unit or department name. (Range: 1- 64)
696
Default Setting There is no default configuration for this command. Command Mode Privileged EXEC mode Command Usage Use this command to export a certificate request to a Certification Authority. The certificate request is generated in Base64-encoded X.509 format. Before generating a certificate request you must first generate a self-signed certificate using the crypto certificate generate Global Configuration mode command. Be aware that you have to reenter the certificate fields. After receiving the certificate from the Certification Authority, use the crypto certificate import Global Configuration mode command to import the certificate into the device. This certificate replaces the self-signed certificate. Example The following example generates and displays a certificate request for HTTPS.
Console# crypto certificate 1 request -----BEGIN CERTIFICATE REQUEST----MIwTCCASoCAQAwYjELMAkGA1UEBhMCUFAxCzAJBgNVBAgTAkNDMQswCQYDVQQH EwRDEMMAoGA1UEChMDZGxkMQwwCgYDVQQLEwNkbGQxCzAJBgNVBAMTAmxkMRAw DgKoZIhvcNAQkBFgFsMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC8ecwQ HdML0831i0fh/F0MV/Kib6Sz5p+3nUUenbfHp/igVPmFM+1nbqTDekb2ymCu6K aKvEbVLF9F2LmM7VPjDBb9bb4jnxkvwW/wzDLvW2rsy5NPmH1QVl+8Ubx3GyCm /oW93BSOFwxwEsP58kf+sPYPy+/8wwmoNtDwIDAQABoB8wHQYJKoZIhvcNAQkH MRDjEyMwgICCAgICAICAgIMA0GCSqGSIb3DQEBBAUAA4GBAGb8UgIx7rB05m+2 m5ZZPhIwl8ARSPXwhVdJexFjbnmvcacqjPG8pIiRV6LkxryGF2bVU3jKEipcZa g+uNpyTkDt3ZVU72pjz/fa8TF0n3 -----END CERTIFICATE REQUEST----CN= router.gm.com 0= General Motors C= US
Related Commands crypto certificate generate crypto certificate import ip https certificate show crypto certificate mycertificate
697
Parameters number Specifies the certificate number. (Range: 1 - 2) Default Setting This command has no default configuration. Command Mode Global Configuration mode Command Usage Use this command to enter an external certificate (signed by Certification Authority) to the device. To end the session, enter an empty line. The imported certificate must be based on a certificate request created by the
crypto certificate request Privileged EXEC mode command.
If the public key found in the certificate does not match the device's SSL RSA key, the command fails. This command is not saved in the device configuration; however, the certificate imported by this command is saved in the private configuration (which is never displayed to the user or backed up to another device). Examples The following example imports a certificate signed by Certification Authority for HTTPS.
Console(config)# crypto certificate 1 import -----BEGIN CERTIFICATE----dHmUgUm9vdCBDZXJ0aWZpZXIwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAp4HS nnH/xQSGA2ffkRBwU2XIxb7n8VPsTm1xyJ1t11a1GaqchfMqqe0kmfhcoHSWr yf1FpD0MWOTgDAwIDAQABo4IBojCCAZ4wEwYJKwYBBAGCNxQCBAYeBABDAEEw CwR0PBAQDAgFGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFAf4MT9BRD47 ZvKBAEL9Ggp+6MIIBNgYDVR0fBIIBLTCCASkwgdKggc+ggcyGgclsZGFwOi8v L0VByb3h5JTIwU29mdHdhcmUlMjBSb290JTIwQ2VydGlmaWVyLENOPXNlcnZl -----END CERTIFICATE----Certificate imported successfully. Issued to: router.gm.com Issued by: www.verisign.com Valid from: 8/9/2003 to 8/9/2004 Subject: CN= router.gm.com, 0= General Motors, C= US Finger print: DC789788 DC88A988 127897BC BB789788
698
ip https certificate
The ip https certificate Global Configuration mode command configures the active certificate for HTTPS. To return to the default configuration, use the no form of this command. Syntax
ip https certificate number no ip https certificate
Parameters number Specifies the certificate number. (Range: 1 - 2) Default Setting Certificate number 1. Command Mode Global Configuration mode Command Usage The crypto certificate generate command should be used to generate HTTPS certificates. Example The following example configures the active certificate for HTTPS.
Console(config)# ip https certificate 1
Related Commands ip https server ip https port show ip https crypto certificate generate crypto certificate request crypto certificate import show crypto certificate mycertificate
699
Syntax
show crypto certificate mycertificate [number]
Parameters number Specifies the certificate number. (Range: 1- 2) Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the certificate.
Console# show crypto certificate mycertificate 1 -----BEGIN CERTIFICATE----dHmUgUm9vdCBDZXJ0aWZpZXIwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAp4HS nnH/xQSGA2ffkRBwU2XIxb7n8VPsTm1xyJ1t11a1GaqchfMqqe0kmfhcoHSWr yf1FpD0MWOTgDAwIDAQABo4IBojCCAZ4wEwYJKwYBBAGCNxQCBAYeBABDAEEw CwR0PBAQDAgFGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFAf4MT9BRD47 ZvKBAEL9Ggp+6MIIBNgYDVR0fBIIBLTCCASkwgdKggc+ggcyGgclsZGFwOi8v L0VByb3h5JTIwU29mdHdhcmUlMjBSb290JTIwQ2VydGlmaWVyLENOPXNlcnZl -----END CERTIFICATE-----
Issued by: www.verisign.com Valid from: 8/9/2003 to 8/9/2004 Subject: CN= router.gm.com, 0= General Motors, C= US Finger print: DC789788 DC88A988 127897BC BB789788
Related Commands crypto certificate generate crypto certificate request crypto certificate import ip https certificate
show ip http
The show ip http Privileged EXEC mode command displays the HTTP server configuration. Syntax
show ip http
700
show ip https
The show ip https Privileged EXEC mode command displays the HTTPS server configuration. Syntax
show ip https
Default Setting This command has no default configuration. Command Mode Privileged EXEC mode Command Usage There are no user guidelines for this command. Example The following example displays the HTTP server configuration.
Console# show ip https HTTPS server enabled. Port: 443
Certificate 1 is active Issued by: www.verisign.com Valid from: 8/9/2004 to 8/9/2005 Subject: CN= router.gm.com, 0= General Motors, C= US Finger print: DC789788 DC88A988 127897BC BB789788
Certificate 2 is inactive Issued by: self-signed Valid from: 8/9/2004 to 8/9/2005 Subject: CN= router.gm.com, 0= General Motors, C= US Finger print: 1873B936 88DC3411 BC8932EF 782134BA
701
702
-703
Configuring QinQ
This section contains information for configuring Customer VLANs using the Web Interface and using the CLI. QinQ tagging allows network managers to add an additional tag to previously tagged packets. Customer VLANs are configured using QinQ. Adding additional tags to the packets helps create more VLAN space. The added tag provides an VLAN ID to each customer, this ensures private and segregated network traffic. The VLAN ID tag is assigned to a customer port in the service providers network. The designated port then provides additional services to the packets with the double-tags. This allows administrators to expand service to VLAN users. To configure customer VLANs: 1. Click Layer 2 > VLAN > VLAN > Basic Information. The VLAN Basic Information Page opens.
2.
Click
-704
Click Layer 2 > VLAN > VLAN > Interface Configuration. The VLAN Interface Configuration Page opens.
-705
11. Click Layer 2 > VLAN > VLAN > Current Table. The VLAN Current Table opens.
-706
2.
3.
-707
4.
5.
Vlan ---100
Name ----------------------100
-708
Group ID --------
Vlan ID ------------------
console#
Configuring Multicast TV
For an example of configuring Multicast TV, triple play, there are two service providers each with two customers CPE 1 and CPE 2. The example configuration is for transmitting multicast streams from both service providers A and B, to each of the CPE customers. For this purpose port e4 is configured as a trunked port, tagged for VLANs 1001, 1048, 3000, 3001, with port e1 and e48 configured as the triple play ports connected to the customer site.
-709
2.
3.
Create VLANs for customer port 1 and port 48 for QinQ. Each customer has separate VLAN.
Console (config-vlan)# vlan 1001 Console (config-vlan)# vlan 1048
4.
5.
6.
7.
8.
Configure the VLAN membership mode of port e1 as a customer port on VLAN 1001.
Console (Config)# interface ethernet e1 Console (config-if)# switchport mode customer Console (config-if)# switchport customer vlan 1001
9.
Configure port e1 to enable receiving multicast transmissions from a VLAN that is not the customer ports VLAN.
Console (config-if)# switchport customer multicast-tv vlan add 3000 Console (config-if)# switchport customer multicast-tv vlan add 3001
10. Configure the VLAN membership mode of port e48 as a customer port on VLAN 1048.
Console (Config)# interface ethernet e48 Console (config-if)# switchport mode customer Console (config-if)# switchport customer vlan 1048
11. Configure port e48 to enable receiving multicast transmissions from a VLAN that is not the customer ports VLAN.
Console (config-if)# switchport customer multicast-tv vlan add 3000 Console (config-if)# switchport customer multicast-tv vlan add 3001
-710
12. To configure the QinQ uplink, configure port e4 as a trunked port, tagged for VLANs 1001, 1048, 3000 and 3001.
Console Console Console Console Console Console (Config)# interface ethernet e4 (config-if)# switchport mode trunk (config-if)# switchport trunk allowed (config-if)# switchport trunk allowed (config-if)# switchport trunk allowed (config-if)# switchport trunk allowed
To configure triple play using the Webview, perform the following: 1. Click Layer 2 > VLAN > VLAN > Basic Information. The VLAN Basic Information Page opens. Click . The Add VLAN Membership Page opens:
2.
-711
5. 6.
-712
7.
Click Layer 2 > VLAN > VLAN > CPE VLAN Mapping. The CPE VLAN Mapping Page opens.
8. 9.
Click
Map the internal CPE VLAN 3 to the Multicast TV VLAN 3001, and map the internal CPE VLAN 4 to the Multicast TV VLAN 3000. .
10. Click
-713
12. Click Layer 2 > VLAN > VLAN > Current Table. The VLAN Current Table Page opens. 13. Select VLAN ID number 1001 and double-click port e1. The VLAN Membership Settings page opens.
16. Close the VLAN Membership Settings Page. 17. Click Layer 2 > VLAN > VLAN > Interface Configuration. The VLAN Interface Configuration Page opens. 18. Click on the row displaying port e1 configuration. The VLAN Interface Settings Page opens.
-714
21. Close the VLAN Interface Settings Page. 22. Repeat steps 18 to 21 configuring port e48 as a customer port on VLAN 1048. 23. Click Layer 2 > VLAN > VLAN > Customer Multicast TV VLAN. The Customer Multicast VLAN Page opens. 24. In the VLAN field, select 3000.
-715
-716
To configure customer VLANs: 1. Click Layer 2 > VLAN > VLAN > Basic Information. The VLAN Basic Information Page opens.
2.
Click
-717
5.
Click Layer 2 > VLAN > VLAN > Interface Configuration. The VLAN Interface Configuration Page opens.
6.
Click on previously defined customer VLAN row. The Modify VLAN Interface Configuration Page opens:
-718
7. 8. 9.
Select the interface. Set the Interface VLAN Mode field to Customer. Define the remaining fields. . The VLAN interface settings are saved, and the device is
11. Click Layer 2 > VLAN > VLAN > Current Table. The VLAN Current Table opens.
-719
-720
721
VLAN Support Up to 255 groups; port-based, protocol-based, or tagged (802.1Q), GVRP for automatic VLAN learning, private VLANs Class of Service Supports eight levels of priority and Weighted Round Robin Queueing (which can be configured by VLAN tag or port), Layer 3/4 priority mapping: IP Precedence, IP DSCP Multicast Filtering IGMP Snooping (Layer 2) Additional Features BOOTP client SNTP (Simple Network Time Protocol) SNMP (Simple Network Management Protocol) RMON (Remote Monitoring, groups 1,2,3,9)
Management Features
In-Band Management Telnet, Web-based HTTP or HTTPS, SNMP manager, or Secure Shell Out-of-Band Management RS-232 RJ-45 console port Software Loading TFTP in-band or XModem out-of-band SNMP Management access via MIB database Trap management to specified hosts RMON Groups 1, 2, 3, 9 (Statistics, History, Alarm, Event)
Standards
IEEE 802.3 Ethernet, IEEE 802.3u Fast Ethernet IEEE 802.3x Full-duplex flow control (ISO/IEC 8802-3) IEEE 802.3z Gigabit Ethernet, IEEE 802.3ab 1000BASE-T IEEE 802.3ac VLAN tagging IEEE 802.1Q VLAN IEEE 802.1v Protocol-based VLANs IEEE 802.3ad Link Aggregation Control Protocol IEEE 802.1D Spanning Tree Protocol and traffic priorities IEEE 802.1p Priority tags
722
723
SNMP Target MIB, SNMP Notification MIB (RFC 2573) SNMP User-Based SM MIB (RFC 2574) SNMP View Based ACM MIB (RFC 2575)
SNMP Community MIB (RFC 2576)
TACACS+ Authentication Client MIB TCP MIB (RFC 2013) Trap (RFC 1215) UDP MIB (RFC 2012)
724
Appendix C. Troubleshooting
Problems Accessing the Management Interface
Troubleshooting Chart Symptom Cannot connect using Telnet, Web browser, or SNMP software Action Be sure the switch is powered up. Check network cabling between the management station and the switch. Check that you have a valid network connection to the switch and that the port you are using has not been disabled. Be sure you have configured the VLAN interface through which the management station is connected with a valid IP address, subnet mask and default gateway. Be sure the management station has an IP address in the same subnet as the switchs IP interface to which it is connected. If you are trying to connect to the switch via the IP address for a tagged VLAN group, your management station, and the ports connecting intermediate switches in the network, must be configured with the appropriate tag. If you cannot connect using Telnet, you may have exceeded the maximum number of concurrent Telnet/SSH sessions permitted. Try connecting again at a later time.
Cannot access the on-board Be sure you have set the terminal emulator program to VT100 compatible, configuration program via a 8 data bits, 1 stop bit, no parity, and the baud rate set to any of the serial port connection following (9600, 19200, 38400, 57600, 115200 bps). Check that the null-modem serial cable conforms to the pin-out connections provided in the Installation Guide. Forgot or lost the password Contact your local distributor.
725
For example:
Console(config)#logging on Console(config)#logging file debugging Console(config)#snmp-server host 192.168.1.23
726
Appendix D. Glossary
Access Control List (ACL)
ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for certain IP or MAC (i.e., Layer 2) information.
Boot Protocol (BOOTP) BOOTP is used to provide bootup information for network devices, including IP
address information, the address of the TFTP server that contains the devices system files, and the name of the boot file.
727
IEEE 802.1D
Specifies a general method for the operation of MAC bridges, including the Spanning Tree Protocol.
IEEE 802.1Q
VLAN TaggingDefines Ethernet frame tags which carry VLAN information. It allows switches to assign endstations to different virtual LANs, and defines a standard way for VLANs to communicate across switched networks.
IEEE 802.1p
An IEEE standard for providing quality of service (QoS) in Ethernet networks. The standard uses packet tags that define up to eight traffic classes and allows switches to transmit packets based on the tagged priority value.
IEEE 802.1s
An IEEE standard for the Multiple Spanning Tree Protocol (MSTP) which provides independent spanning trees for VLAN groups.
IEEE 802.1x
Port Authentication controls access to the switch ports by requiring users to first enter a user ID and password for authentication.
IEEE 802.3ac
Defines frame extensions for VLAN tagging.
728
IEEE 802.3x
Defines Ethernet frame start/stop requests and timers used for flow control on full-duplex links.
IGMP Snooping
Listening to IGMP Query and IGMP Report packets transferred between IP Multicast Routers and IP Multicast host groups to identify IP Multicast group members.
IGMP Query
On each subnetwork, one IGMP-capable device will act as the querier that is, the device that asks all hosts to report on the IP multicast groups they wish to join or to which they already belong. The elected querier will be the device with the lowest IP address in the subnetwork.
In-Band Management
Management of the network from a station attached directly to the network.
IP Multicast Filtering
A process whereby this switch can pass multicast traffic along to participating hosts.
IP Precedence
The Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eight different priority levels ranging from highest priority for network control packets to lowest priority for routine traffic. The eight values are mapped one-to-one to the Class of Service categories by default, but may be configured differently to suit the requirements for specific network applications.
Layer 2
Data Link layer in the ISO 7-Layer Data Communications Protocol. This is related directly to the hardware interface for network devices and passes on traffic based on MAC addresses.
Link Aggregation
See Port Trunk.
729
Multicast Switching
A process whereby the switch filters incoming multicast frames for services for which no attached host has registered, or forwards them to all ports contained within the designated multicast VLAN group.
Out-of-Band Management
Management of the network from a station not attached to the network.
Port Authentication
See IEEE 802.1x.
Port Mirroring
A method whereby data on a target port is mirrored to a monitor port for troubleshooting with a logic analyzer or RMON probe. This allows data on the target port to be studied unobstructively.
Port Trunk
Defines a network link aggregation and trunking method which specifies how to create a single high-speed logical link that combines several lower-speed physical links.
Private VLANs
Private VLANs provide port-based security and isolation between ports within the assigned VLAN. Data traffic on downlink ports can only be forwarded to, and from, uplink ports.
Remote Authentication Dial-in User Service (RADIUS) RADIUS is a logon authentication protocol that uses software running on a central
server to control access to RADIUS-compliant devices on the network.
730
Rapid Spanning Tree Protocol (RSTP) RSTP reduces the convergence time for network topology changes to about 10% of
that required by the older IEEE 802.1D STP standard.
Simple Network Time Protocol (SNTP) SNTP allows a device to set its internal clock based on periodic updates from a
Network Time Protocol (NTP) server. Updates can be requested from a specific NTP server, or can be received via broadcasts sent by NTP servers.
Telnet
Defines a remote communication facility for interfacing to a terminal device over TCP/IP.
Terminal Access Controller Access Control System Plus (TACACS+) TACACS+ is a logon authentication protocol that uses software running on a central
server to control access to TACACS-compliant devices on the network.
731
User Datagram Protocol (UDP) UDP provides a datagram mode for packet-switched communications. It uses IP as
the underlying transport mechanism to provide access to IP-like services. UDP packets are delivered just like IP packets connection-less datagrams that may be discarded before reaching their targets. UDP is useful when TCP would be too complex, too slow, or just unnecessary.
XModem
A protocol used to transfer files between devices. Data is grouped in 128-byte blocks and error-corrected.
732
Index
Index
Numerics
802.1p 234
A
Access Control Element 232 Access Control List See ACL Access Control Lists 167, 232 ACE 232 ACEs 167, 232 ACL 234, 245 ACLs 232, 233 Address Resolution Protocol 83 Advanced QoS 235 ARP 83 Authentication method lists 112 Authentication profiles 112
DNS 85 default domain name 86 domain name list 86 enabling lookup 86 name server list 86 static entries 87 Domain Name Service 85 DSCP 234, 244 Dynamic Host Configuration Protocol 82
E
E-911 133 Emergency Call Service 133 Enable 110
F
Failure 38 Fast link 196 FCS 119, 122 FCS error 119, 122 FDB 69, 71 Forwarding Database 69, 71 Frame Check Sequence 119, 122
B
Bandwidth assignments 235 Best effort 235 Best Effort service 234 BPDU 191, 200
G C
CIR 234, 238 Class of Service 231 CLI 37 CLI, showing commands 256 Command Line Interface 37 command line interface See CLI Committed Burst Siz 238 Committed Information Rate 234, 238 CoS 231 Gateway 80
H
HMAC-MD5-96 91 HMAC-SHA-96 91 HTTP 233
I
IDRP 169 IEEE 802.1D 191 IEEE 802.1w 191 Inter-Domain Routing Protocol 169 IP addresses 80
D
Default Gateway 80 default settings, system 9 DHCP 82
L
L2IP 170 LACP 73 Layer 2 Internet Protocol 170 LCP 198
733
Index
Line 110 Link Aggregation Control Protocol 73 Link Control Protocol 198 LLDP Media Endpoint Discovery 133 LLDP-MED 133 log-in, Web interface 33 logon authentication TACACS+ client 105 TACACS+ server 105
R
RADIUS 109 Rapid Spanning Tree Protocol 197 RSTP 197 Rules 107, 233
S
Scheduling 234 Secure Shell 112 Security 232 Shaping 232 Simple 233 SNMP 37, 233 SNMP management station 37 specifications, software 721 SSH 112 Stack master 37, 38 Stacking discovering 39 Stacking failover topology 38 standards, IEEE 722 statistics port 75 STP 198 Strict priority 234 System time 57
M
MAC addresses 151 main menu 35 Management Access Lists 105 Management Information Bases (MIBs) 723 MDI 8 MDIX 8 Minimum delay 235 multicast filtering 223
N
NCP 198 Network Control Protocols 198 None 234
P
PIM 169 PoE 139 Policing 232 Policy 233 port, statistics 75 Power over Ethernet 139 Privacy Key 91 Private VLAN Edge 71 problems, troubleshooting 725 Protocol Independent Multicast 169 PVE 71
T
TACACS+, logon authentication 105 Telnet 112 Time Domain Reflectometry 144 Topology 38 Traffic shaping 231 troubleshooting 725 Trust 233
U
Unit failure 38 Unit IDs 38
Q
QoS 231 Quality of Service 231 Queue 232 Queues 233
V
VLANs displaying basic information 206 VPT 233, 234
734
Index
Web interface access requirements 33 configuration buttons 34 home page 33 menu list 35 panel display 35 Weighted Round Robin 234 WRR 234, 235
W
Warm standby 39
735
Index
736