Comandos de Referencia Zyxel
Comandos de Referencia Zyxel
Comandos de Referencia Zyxel
http://192.168.0.1
In-Band www.zyxel.com
Ports
http://192.168.1.1
User Name
admin
Password
1234
Copyright 2011
Copyright
2013 ZyXEL
Communications Corporation
ZyXEL
Communications
Corporation
IMPORTANT!
READ CAREFULLY BEFORE USE.
KEEP THIS GUIDE FOR FUTURE REFERENCE.
This is a Reference Guide for a series of products. Not all products support all firmware features.
Screenshots, graphics and commands in this book may differ slightly from your product due to
differences in your product firmware or your computer operating system. Every effort has been made
to ensure that the information in this manual is accurate.
Related Documentation
Users Guide
The Users Guide explains how to use the Web Configurator to configure the Switch.
Please refer to www.zyxel.com for product specific User Guides and product certifications.
How To Use This Guide
Read the How to Access the CLI chapter for an overview of various ways you can get to
the command interface on your Switch.
Use the Reference section in this guide for command syntax, description and examples.
Each chapter describes commands related to a feature.
To find specific information in this guide, use the Contents Overview, the Index of
Commands, or search the PDF file. E-mail techwriters@zyxel.com.tw if you cannot find
the information you require.
Document Conventions
Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this CLI Reference Guide.
Warnings tell you about things that could harm you or your device. See your
Users Guide for product specific warnings.
Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
This manual follows these general conventions:
ZyXELs switches may be referred to as the Switch, the device, the system or the
product in this Reference Guide.
Units of measurement may denote the metric value or the scientific value. For
example, k for kilo may denote 1000 or 1024, M for mega may denote 1000000
or 1048576 and so on.
Command descriptions follow these conventions:
Commands are in courier new font.
Required input values are in angle brackets <>; for example, ping <ip> means that you
must specify an IP address for this command.
Optional fields are in square brackets []; for instance show logins [name], the name
field is optional.
The following is an example of a required field within an optional field: snmp-server
[contact <system contact>], the contact field is optional. However, if you
use contact, then you must provide the system contact information.
Lists (such as <port-list>) consist of one or more elements separated by commas.
Each element might be a single value (1, 2, 3, ...) or a range of values (1-2, 3-5, ...)
separated by a dash.
The | (bar) symbol means or.
italic terms represent user-defined input values; for example, in snmp-server
[contact <system contact>], system contact can be replaced by the
administrators name.
A key stroke is denoted by square brackets and uppercase text, for example, [ENTER]
means the Enter or Return key on your keyboard.
Document Conventions
DESCRIPTION
show vlan
vlan <1-4094>
13
inactive
13
no inactive
13
Deletes a VLAN.
13
no vlan <1-4094>
The Table title identifies commands or the specific feature that the commands configure.
The COMMAND column shows the syntax of the command.
If a command is not indented, you run it in the enable or config mode. See Chapter 2 on
page 17 for more information on command modes.
If a command is indented, you run it in a sub-command mode.
The DESCRIPTION column explains what the command does. It also identifies legal input
values, if necessary.
The M column identifies the mode in which you run the command.
E: The command is available in enable mode. It is also available in user mode if the
privilege level (P) is less than 13.
C: The command is available in config (not indented) or one of the sub-command modes
(indented).
The P column identifies the privilege level of the command. If you dont have a high enough
privilege level you may not be able to view or execute some of the commands. See Chapter 2
on page 17 for more information on privilege levels.
Document Conventions
Contents Overview
Contents Overview
Introduction ............................................................................................................................ 11
How to Access and Use the CLI ................................................................................................13
Privilege Level and Command Mode .........................................................................................17
Initial Setup ................................................................................................................................23
Contents Overview
Contents Overview
Contents Overview
10
P ART I
Introduction
How to Access and Use the CLI (13)
Privilege Level and Command Mode (17)
Initial Setup (23)
11
12
C HA PT E R
DEFAULT VALUE
Terminal Emulation
VT100
Baud Rate
9600 bps
Parity
None
Flow Control
None
1.1.2 Telnet
1 Connect your computer to one of the Ethernet ports.
2 Open a Telnet session to the Switchs IP address. If this is your first login, use the default
values.
Table 3 Default Management IP Address
SETTING
DEFAULT VALUE
IP Address
192.168.1.1
Subnet Mask
255.255.255.0
Make sure your computer IP address is in the same subnet, unless you are accessing the
Switch through one or more routers.
13
1.1.3 SSH
1 Connect your computer to one of the Ethernet ports.
2 Use a SSH client program to access the Switch. If this is your first login, use the default
values in Table 3 on page 13 and Table 4 on page 14. Make sure your computer IP
address is in the same subnet, unless you are accessing the Switch through one or more
routers.
1.2 Logging in
Use the administrator username and password. If this is your first login, use the default values.
Table 4 Default User Name and Password
SETTING
DEFAULT VALUE
User Name
admin
Password
1234
The Switch automatically logs you out of the management interface after five
minutes of inactivity. If this happens to you, simply log back in again.
14
COMMAND / KEY(S)
DESCRIPTION
history
[CTRL]+U
[TAB]
help
You should save your changes after each CLI session. All unsaved
configuration changes are lost once you restart the Switch.
15
16
C HA PT E R
13
Configure features except for login accounts, SNMP user accounts, the
authentication method sequence and authorization settings, multiple logins,
administrator and enable passwords, and configuration information display.
14
17
Using vendor-specific attributes in an external authentication server. See the Users Guide
for more information.
The admin account has a privilege level of 14, so the administrator can run every command.
You cannot change the privilege level of the admin account.
The default enable password is 1234. Use this command to set the enable password.
password <password>
The password is sent in plain text and stored in the Switchs buffers. Use this command to set
the cipher password for password encryption.
password cipher <password>
18
In the following example, the login account user0 has a privilege level of 0 but knows that the
password for privilege level 13 is pswd13. Afterwards, the sessions privilege level is 13,
instead of 0, and the session changes to enable mode.
sysname> enable 13
Password: pswd13
sysname#
Users cannot use this command until you create passwords for specific privilege levels. Use
the following command to create passwords for specific privilege levels.
password <password> privilege <0-14>
19
PROMPT
enable
sysname#
config
sysname(config)#
config-interface
sysname(config-interface)#
Configure ports.
config-mvr
sysname(config-mvr)#
config-routedomain
sysname(config-if)#
config-dvmrp
sysname(config-dvmrp)#
config-igmp
sysname(config-igmp)#
config-ma
sysname(config-ma)#
config-ospf
sysname(config-ospf)#
config-rip
sysname(config-rip)#
config-vrrp
sysname(config-vrrp)#
Each command is usually in one and only one mode. If a user wants to run a particular
command, the user has to change to the appropriate mode. The command modes are organized
like a tree, and users start in enable mode. The following table explains how to change from
one mode to another.
Table 8 Changing Between Command Modes for Privilege Levels 13-14
MODE
ENTER MODE
LEAVE MODE
enable
--
--
configure
exit
config-interface
exit
config-mvr
mvr <1-4094>
exit
config-vlan
vlan <1-4094>
exit
config-route-domain
config-dvmrp
router dvmrp
exit
config-igmp
router igmp
exit
config-ospf
exit
config-rip
router rip
exit
config-vrrp
exit
config
20
3 Copy and paste the results into a text editor of your choice. This creates a list of all the
executable commands in the user and enable modes.
4 Type configure and press [ENTER]. This takes you to the config mode.
5 Type help and press [ENTER]. A list is displayed which shows all the commands
available in config mode and all the sub-commands. The sub-commands are preceded by
the command necessary to enter that sub-command mode. For example, the command
name <name-str> as shown next, is preceded by the command used to enter the
config-vlan sub-mode: vlan <1-4094>.
sysname# help
.
.
no arp inspection log-buffer logs
no arp inspection filter-aging-time
no arp inspection <cr>
vlan <1-4094>
vlan <1-4094> name <name-str>
vlan <1-4094> normal <port-list>
vlan <1-4094> fixed <port-list>
6 Copy and paste the results into a text editor of your choice. This creates a list of all the
executable commands in config and the other submodes, for example, the config-vlan
mode.
21
22
C HA PT E R
3
Initial Setup
This chapter identifies tasks you might want to do when you first configure the Switch.
It is recommended you change the default enable password. You can encrypt
the password with a cipher password. See Chapter 52 on page 229 for more
information.
23
Console port has higher priority than Telnet. See Chapter 49 on page 217 for more multilogin commands.
sysname# configure
sysname(config)# no multi-login
This example shows you how to change the management IP address in VLAN 1 to 172.16.0.1
with subnet mask 255.255.255.0.
sysname# configure
sysname(config)# vlan 1
sysname(config-vlan)# ip address default-management 172.16.0.1 255.255.255.0
Afterwards, you have to use the new IP address to access the Switch.
This example shows you how to change the out-of-band management IP address to 10.10.10.1
with subnet mask 255.255.255.0 and the default gateway 10.10.10.254
sysname# configure
sysname(config)# ip address 10.10.10.1 255.255.255.0
sysname(config)# ip address default-gateway 10.10.10.254
24
:
:
:
:
:
:
:
:
:
:
sysname
00:13:49:ae:fb:7a
V3.80(AII.0)b0 | 04/18/2007
1746416
280:32:52 (605186d ticks)
V1.00 | 05/17/2006
RAS Apr 18 2007 19:59:49
ES-2024PWR
See Chapter 87 on page 339 for more information about these attributes.
25
26
P ART II
Reference A-G
AAA Commands (29)
ARP Commands (31)
ARP Inspection Commands (33)
ARP Learning Commands (39)
Bandwidth Commands (41)
Broadcast Storm Commands (45)
CFM Commands (49)
Classifier Commands (59)
Cluster Commands (63)
Date and Time Commands (67)
DHCP Commands (79)
DHCP Snooping & DHCP VLAN Commands (83)
DiffServ Commands (87)
Display Commands (89)
DVMRP Commands (91)
Error Disable and Recovery Commands (93)
Ethernet OAM Commands (97)
External Alarm Commands (103)
GARP Commands (105)
Green Ethernet Commands (107)
GVRP Commands (111)
27
28
C HA PT E R
AAA Commands
Use these commands to configure authentication, authorization and accounting on the Switch.
DESCRIPTION
14
14
14
14
DESCRIPTION
13
13
13
29
DESCRIPTION
13
13
13
13
13
13
13
DESCRIPTION
14
14
14
14
30
C HA PT E R
ARP Commands
Use these commands to look at IP-to-MAC address mapping(s).
DESCRIPTION
show ip arp
clear ip arp
13
13
13
no arp
13
MAC
00:19:cb:6f:91:59
VLAN Port
1
CPU
Age(s)
0
Type
static
sysname#
DESCRIPTION
Index
IP
MAC
VLAN
Port
This field displays the number of the port from which the IP address was learned.
CPU indicates this IP address is the Switchs management IP address.
31
32
LABEL
DESCRIPTION
Age(s)
Type
C HA PT E R
DESCRIPTION
arp inspection
13
no arp inspection
13
DESCRIPTION
13
13
13
13
13
33
DESCRIPTION
13
13
13
13
13
DESCRIPTION
13
13
13
DESCRIPTION
13
13
13
13
34
Expiry (sec)
------------
Reason
--------------
DESCRIPTION
This field displays how long the MAC address filters remain in the Switch
after the Switch identifies an unauthorized ARP packet. The Switch
automatically deletes the MAC address filter afterwards.
MacAddress
This field displays the source MAC address in the MAC address filter.
VLAN
This field displays the source VLAN ID in the MAC address filter.
Port
This field displays the source port of the discarded ARP packet.
Expiry (sec)
This field displays how long (in seconds) the MAC address filter remains in
the Switch. You can also delete the record manually (Delete).
Reason
This field displays the reason the ARP packet was discarded.
MAC+VLAN: The MAC address and VLAN ID were not in the binding table.
IP: The MAC address and VLAN ID were in the binding table, but the IP
address was not valid.
Port: The MAC address, VLAN ID, and IP address were in the binding
table, but the port number was not valid.
This example looks at log messages that were generated by ARP packets and that have not
been sent to the syslog server yet.
sysname# show arp inspection log
Total Log Buffer Size : 32
Syslog rate : 5 entries per 1 seconds
Port
Vlan
Sender MAC
Time
---- ---- ------------------------------------Total number of logs: 0
Sender IP
Pkts
Reason
---------------
----
----------
----
35
DESCRIPTION
This field displays the maximum number (1-1024) of log messages that
were generated by ARP packets and have not been sent to the syslog
server yet.
If the number of log messages in the Switch exceeds this number, the
Switch stops recording log messages and simply starts counting the
number of entries that were dropped due to unavailable buffer.
Syslog rate
This field displays the maximum number of syslog messages the Switch
can send to the syslog server in one batch. This number is expressed as a
rate because the batch frequency is determined by the Log Interval.
Port
Vlan
Sender MAC
This field displays the source MAC address of the ARP packet.
Sender IP
Pkts
This field displays the number of ARP packets that were consolidated into
this log message. The Switch consolidates identical log messages
generated by ARP packets in the log consolidation interval into one log
message.
Reason
This field displays the reason the log message was generated.
dhcp deny: An ARP packet was discarded because it violated a dynamic
binding with the same MAC address and VLAN ID.
static deny: An ARP packet was discarded because it violated a static
binding with the same MAC address and VLAN ID.
deny: An ARP packet was discarded because there were no bindings with
the same MAC address and VLAN ID.
static permit: An ARP packet was forwarded because it matched a static
binding.
dhcp permit: An ARP packet was forwarded because it matched a
dynamic binding.
Time
This field displays the number of log messages that were generated by
ARP packets and that have not been sent to the syslog server yet. If one or
more log messages are dropped due to unavailable buffer, there is an entry
called overflow with the current number of dropped log messages.
This example displays whether ports are trusted or untrusted ports for ARP inspection.
sysname# show arp inspection interface port-channel 1
Interface Trusted State Rate (pps) Burst Interval
--------- ------------- ---------- -------------1
Untrusted
15
1
36
DESCRIPTION
Interface
This field displays the port number. If you configure the * port, the settings
are applied to all of the ports.
Trusted State
Rate (pps)
This field displays the maximum number for DHCP packets that the Switch
receives from each port each second. The Switch discards any additional
DHCP packets.
Burst Interval
This field displays the length of time over which the rate of ARP packets is
monitored for each port. For example, if the Rate is 15 pps and the burst
interval is 1 second, then the Switch accepts a maximum of 15 ARP
packets in every one-second interval. If the burst interval is 5 seconds, then
the Switch accepts a maximum of 75 ARP packets in every five-second
interval.
37
38
C HA PT E R
DESCRIPTION
13
arp-learning <arpreply|gratuitous-arp|arprequest>
Sets the ARP learning mode the Switch uses on the port.
arp-reply: the Switch updates the ARP table only with the
ARP replies to the ARP requests sent by the Switch.
gratuitous-arp: the Switch updates its ARP table with
either an ARP reply or a gratuitous ARP request. A gratuitous
ARP is an ARP request in which both the source and
destination IP address fields are set to the IP address of the
device that sends this request and the destination MAC
address field is set to the broadcast address.
arp-request: the Switch updates the ARP table with both
ARP replies, gratuitous ARP requests and ARP requests.
13
no arp-learning
13
39
40
C HA PT E R
Bandwidth Commands
Use these commands to configure the maximum allowable bandwidth for incoming or
outgoing traffic flows on a port.
See Section 8.2 on page 42 and Section 8.3 on page 43 for examples.
See also Chapter 79 on page 313 for information on how to use trTCM (Two Rate Three Color
Marker) to control traffic flow.
DESCRIPTION
port-list
The port number or a range of port numbers that you want to configure.
rate
The rate represents a bandwidth limit. Different models support different rate
limiting incremental steps. See your Users Guide for more information.
41
DESCRIPTION
bandwidth-control
13
no bandwidth-control
13
13
bandwidth-limit ingress
13
bandwidth-limit ingress
<rate>
13
bandwidth-limit egress
13
bandwidth-limit egress
<rate>
13
no bandwidth-limit ingress
13
no bandwidth-limit egress
13
bandwidth-limit cir
13
13
13
13
no bandwidth-limit cir
13
no bandwidth-limit pir
13
42
cir
cir 4000
pir
pir 5000
43
44
C HA PT E R
Some models use a single command (bmstorm-limit) to control the combined rate of
broadcast, multicast and DLF packets accepted on Switch ports.
Other models use three separate commands (broadcast-limit, multicastlimit, dlf-limit) to control the number of individual types of packets accepted on
Switch ports.
See Section 9.2 on page 46 and Section 9.3 on page 46 for examples.
DESCRIPTION
pkt/s
DESCRIPTION
storm-control
13
no storm-control
13
13
13
bmstorm-limit
45
DESCRIPTION
bmstorm-limit <rate>
13
no bmstorm-limit
13
broadcast-limit
13
broadcast-limit <pkt/s>
13
no broadcast-limit
13
multicast-limit
13
multicast-limit <pkt/s>
13
no multicast-limit
13
dlf-limit
13
dlf-limit <pkt/s>
13
no dlf-limit
13
46
Broadcast|Enabled
128 pkt/s|Yes
Multicast|Enabled
256 pkt/s|Yes
DLF-Limit|Enabled
64 pkt/s|Yes
47
48
C HA PT E R
10
CFM Commands
Use these commands to configure the Connectivity Fault Management (CFM) on the Switch.
CPE
CPE
49
MEP port - has the ability to send pro-active connectivity check (CC) packets and get
other MEP port information from neighbor switches CC packets within an MA.
MIP port - only forwards the CC packets.
CFM provides two tests to discover connectivity faults.
Loopback test - similar to using ping in Microsoft DOS mode to check connectivity
from your computer to a host. In a loopback test, a MEP port sends a LBM (Loop Back
Message) to a MIP port and checks for an LBR (Loop Back Response). If no response is
received, there might be a connectivity fault between them.
Link trace test - similar to using tracert in the Microsoft DOS mode to check
connectivity from your computer to a host. A link trace test provides additional
connectivity fault analysis to get more information on where the fault is. In a link trace
test, a MEP port sends a LTM (Link Trace Message) to a MIP port and checks for an LTR
(Link Trace Response). If an MIP or MEP port does not respond to the source MEP, this
may indicate a fault. Administrators can take further action to check the fault and resume
services according to the line connectivity status report.
An example is shown next. A user cannot access the Internet. To check the problem, the
administrator starts the link trace test from A which is an MEP port to B which is also an MEP
port. Each aggregation MIP port between aggregated devices responds to the LTM packets and
also forwards them to the next port. A fault occurs at port C. A discovers the fault since it only
gets the LTR packets from the ports before port C.
Figure 2 MIP and MEP Example
A (port 2, MEP)
B (port 8, MEP)
50
TERM
DESCRIPTION
CFM
MD
MA
DESCRIPTION
MEP
An MEP (Maintenance End Point) port has the ability to send and reply to the
CCMs, LBMs and LTMs. It also gets other MEP port information from neighbor
switches CCMs in an MA.
MIP
An MIP (Maintenance Intermediate Point) port forwards the CCMs, LBMs, and
LTMs and replies the LBMs and LTMs by sending Loop Back Responses (LBRs)
and Link Trace Responses (LTRs).
Connectivity
Check
Loop Back Test (LBT) checks if an MEP port receives its LBR (Loop Back
Response) from its target after it sends the LBM (Loop Back Message). If no
response is received, there might be a connectivity fault between them.
Link Trace Test (LTT) provides additional connectivity fault analysis to get more
information on where the fault is. In the link trace test, MIP ports also send LTR
(Link Trace Response) to response the source MEP ports LTM (Link Trace
Message). If an MIP or MEP port does not respond to the source MEP, this may
indicate a fault. Administrators can take further action to check and resume
services from the fault according to the line connectivity status report.
DESCRIPTION
mep-id
ma-index
md-index
mac-address
51
DESCRIPTION
13
13
13
13
ethernet cfm
13
13
13
13
13
52
DESCRIPTION
13
13
13
Sets whats to be included in the sender ID TLV (TypeLength-Value) transmitted by CFM packets.
Select none to not include the sender ID TLV.
Select chassis to include the chassis information.
Select management to include the management
information.
Select chassis-management to include both chassis
and management information.
13
exit
13
remote-mep <mep-id>
13
13
13
13
no remote-mep <mep-id>
13
no mep <mep-id>
13
Enables an MEP.
13
13
53
DESCRIPTION
13
13
13
13
13
no ethernet cfm
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
54
This example deletes MA2 (with MA index 2) from MD1 (with MD index 1).
sysname# config
sysname(config)# no ethernet cfm ma 2 md 1
sysname(config)# exit
sysname# write mem
This example creates MA3 (with MA index 3 and VLAN ID 123) under MD1, and associates
port 1 as an MEP port with MEP ID 301 in the specified CFM domain. This also sets MHF
(MIP half function) to default to have the Switch automatically create MIPs for this MA and
on the ports belonging to this MA's VLAN when there are no lower configured MD levels or
there is a MEP at the next lower configured MD level on the port. This also sets a remote MEP
in MA3.
sysname# config
sysname(config)# ethernet cfm ma 3 format string name MA3 md 1 primary-vlan
123
sysname(config-ma)# mep 301 interface port-channel 1 direction up priority 2
sysname(config-ma)# mep 301 interface port-channel 1 direction up priority 2
cc-enable
sysname(config-ma)# mhf-creation default
sysname(config-ma)# remote-mep 117
sysname(config-ma)# exit
sysname(config)# exit
sysname# write mem
55
This example lists all CFM domains. In this example, only one MD (MD1) is configured. The
MA3 with the associated MEP port 1 is under this MD1.
sysname# show ethernet cfm local
MD Index: 1
MD Name: MD1(string)
MD Level: 1
MA Index: 3
MA Name:
MA3(string)
Primary Vlan:
123
CC Interval:
1000 millisecond(s)
MHF Creation:
default
ID Permission:
none
MEP:301 (ACTIVE ) Port:1
Direction:DOWN
sysname#
Priority:5
CC-Enable:FALSE
This example starts a loopback test and displays the test result on the console.
sysname# ethernet cfm loopback remote-mep 2 mep 1 ma 1 md 1
Sending 5 Ethernet CFM Loopback messages to remote-mepid 2, timeout is 5
seconds .....
sysname# Loopback: Successful
Success rate is 100 percent, round-trip min/avg/max = 0/0/0 ms
sysname#
This example displays all neighbors MEP port information in the MIP-CCM databases.
sysname# show ethernet cfm local stack mip mip-ccmdb
MIP CCM DB
Port VID
Source Address
Retained
---- ---- ----------------- --------2
1 00:19:cb:00:00:04
0 hr(s)
7
1 00:19:cb:00:00:06
0 hr(s)
sysname#
56
LABEL
DESCRIPTION
Port
Displays the number of the port on which this CCM was received.
VID
Source Address
Retained
This example assigns a virtual MAC address to port 3 and displays the MAC addresses of the
ports 2 ~ 4. The assigned virtual MAC address should be unique in both the Switch and the
network to which it belongs.
sysname# config
sysname(config)# interface
sysname(config-interface)#
sysname(config-interface)#
sysname(config)# exit
sysname# show ethernet cfm
Virtual MACPort MAC
---- ----------------2
00:19:cb:00:00:02
3
00:19:cb:12:34:56
4
00:19:cb:00:00:02
sysname#
port-channel 3
ethernet cfm virtual-mac 00:19:cb:12:34:56
exit
virtual-mac port 2-4
This example sets the Switch to carry its host name and management IP address 192.168.100.1
in CFM packets.
sysname# config
sysname(config)# ethernet cfm management-address-domain ip 192.168.100.1
This example shows remote MEP database information. The remote MEP has been configured
to carry its host name and a specified IP address in CFM packets.
sysnam# show ethernet cfm remote
MD Index: 1
MD Name: customer123(string)
MD Level: 2
MA Index: 1
MA Name: 123(vid)
Primary Vlan: 123
MEP: 11
Remote MEP ID:
1
MAC Address: 00:19:cb:6f:91:5a
Chassis Id: MGS-3712F
Management Address: 192.168.100.1:161
sysname#
57
58
C HA PT E R
11
Classifier Commands
Use these commands to classify packets into traffic flows. After classifying traffic, policy
commands (Chapter 54 on page 235) can be used to ensure that a traffic flow gets the
requested treatment in the network.
DESCRIPTION
13
no classifier <name>
13
Enables a classifier.
13
59
The following table shows some other common Ethernet types and the corresponding protocol
number.
Table 32 Common Ethernet Types and Protocol Number
ETHERNET TYPE
PROTOCOL NUMBER
IP ETHII
0800
X.75 Internet
0801
NBS Internet
0802
ECMA Internet
0803
Chaosnet
0804
X.25 Level 3
0805
XNS Compat
0807
Banyan Systems
0BAD
BBN Simnet
5208
IBM SNA
80D5
AppleTalk AARP
80F3
In an IPv4 packet header, the Protocol field identifies the next level protocol. The following
table shows some common IPv4 protocol types and the corresponding protocol number. Refer
to http://www.iana.org/assignments/protocol-numbers for a complete list.
Table 33 Common IPv4Protocol Types and Protocol Numbers
PROTOCOL TYPE
PROTOCOL NUMBER
ICMP
TCP
UDP
17
EGP
L2TP
115
60
Rule
VLAN = 3;
This example creates a classifier (Class1) for packets which have a source MAC address of
11:22:33:45:67:89 and are received on port 1. You can then use the policy command and the
name Class1 to apply policy rules to this traffic flow. See the policy example in Chapter 54 on
page 235.
sysname# config
sysname(config)# classifier Class1 source-mac 11:22:33:45:67:89 source-port
1
sysname(config)# exit
sysname# show classifier
Index Active Name
Rule
1 Yes
Class1
SrcMac = 11:22:33:45:67:89; S...
61
62
C HA PT E R
12
Cluster Commands
Use these commands to configure cluster management.
DESCRIPTION
show cluster
cluster <vlan-id>
13
no cluster
13
13
13
13
13
63
64
LABEL
DESCRIPTION
Index
MACAddr
Name
Status
This field displays the current status of the member in the cluster.
Online: The member is accessible.
Error: The member is connected but not accessible. For example, the
members password has changed, or the member was set as the manager
and so left the member list. This status also appears while the Switch
finishes adding a new member to the cluster.
Offline: The member is disconnected. It takes approximately 1.5 minutes
after the link goes down for this status to appear.
This example logs in to the CLI of member 00:13:49:00:00:01, looks at the current firmware
version on the member Switch, logs out of the members CLI, and returns to the CLI of the
manager.
sysname# configure
sysname(config)# cluster rcommand 00:13:49:00:00:01
Connected to 127.0.0.2
Escape character is '^]'.
User name: admin
Password: ****
Copyright (c) 1994 - 2007 ZyXEL Communications Corp.
DESCRIPTION
Cluster Status
This field displays the role of this Switch within the cluster.
Manager: This Switch is the device through which you manage the cluster
member switches.
Member: This Switch is managed by the specified manager.
None: This Switch is not in a cluster.
VID
Manager
65
66
C HA PT E R
13
DESCRIPTION
week
day
month
oclock
DESCRIPTION
show time
time <hour:min:sec>
13
13
13
time daylight-saving-time
13
67
DESCRIPTION
Sets the day and time when Daylight Saving Time starts.
In most parts of the United States, Daylight Saving Time
starts on the second Sunday of March at 2 A.M. local
time. In the European Union, Daylight Saving Time starts
on the last Sunday of March at 1 A.M. GMT or UTC, so
the oclock field depends on your time zone.
13
Sets the day and time when Daylight Saving Time ends.
In most parts of the United States, Daylight Saving Time
ends on the first Sunday of November at 2 A.M. local
time. In the European Union, Daylight Saving Time ends
on the last Sunday of October at 1 A.M. GMT or UTC, so
the oclock field depends on your time zone.
13
no time daylight-saving-time
13
13
COMMAND
DESCRIPTION
show timesync
13
timesync <daytime|time|ntp>
13
no timesync
13
68
Time Configuration
----------------------------Time Zone
:UTC -600
Time Sync Mode
:USE_DAYTIME
Time Server IP Address :172.16.37.10
Time Server Sync Status:CONNECTING
DESCRIPTION
Time Zone
This field displays the time server protocol the Switch uses. It displays
NO_TIMESERVICE if the time server is disabled.
This field displays the status of the connection with the time server.
NONE: The time server is disabled.
CONNECTING: The Switch is trying to connect with the specified time
server.
OK: Synchronize with time server done.
FAIL: Synchronize with time server fail.
69
70
C HA PT E R
14
14.1 Overview
A traditional Ethernet network is best-effort, that is, frames may be dropped due to network
congestion. FCoE (Fiber Channel over Ethernet) transparently encapsulates fiber channel
traffic into Ethernet, so that you dont need separate fiber channel and Ethernet switches.
Data Center Bridging (DCB) enhances Ethernet technology to adapt to the FCoE. It supports
lossless Ethernet traffic (no frames discarded when there is network congestion) and can
allocate bandwidth for different traffic classes, based on IEEE802.1p priority with a
guaranteed minimum bandwidth. LAN traffic (large number of flows and not latencysensitive), SAN traffic (Storage Area Network, large packet sizes and requires lossless
performance), and IPC traffic (Inter-Process Communication, latency-sensitive messages) can
share the same physical connection while still having their own priority and guaranteed
minimum bandwidth.
You should configure DCB on any port that has both Ethernet and fiber channel traffic.
71
Application priority is used to globally assign a priority to all FCoE traffic on the Switch.
DCBX (Data Center Bridging capability eXchange, IEEE 802.1Qaz -2011) uses LLDP
(Link Layer Discovery Protocol) to advertize PFC, ETS and application priority
information between switches. PFC information should be consistent between connected
switches, so PFC can be configured automatically using DCBX.
The following table describes user-input values available in multiple commands for this
feature.
Table 41 dcb User-input Values
COMMAND
DESCRIPTION
<priority-list>
<port-list>
<id>
Possible values for traffic class ID range from 1 to 100. 0 is a default traffic
class and cannot be modified or deleted.
<tc-idN>
The traffic class ID for priority N (0 to 7). The traffic class ID range is from 1 to
100.
<name>
<weight>
14.2.1 PFC
PFC should be configured the same on connected switch ports. If DCBX is used, then one
switch port must be configured to accept network configuration from the peer switch port
(auto). If both switch ports are configured to accept configuration (auto on both switch
ports), then the configuration of the switch port with the lowest MAC address hex value sum is
used.
The following table lists the commands for this feature.
Table 42 priority-flow-control Command Summary
COMMAND
DESCRIPTION
13
priority-flow-control
13
no priority-flow-control
13
priority-flow-control auto
13
priority-flow-control priority
<priority-list>
13
no priority-flow-control
priority
13
72
DESCRIPTION
show priority-flow-control
show priority-flow-control
statistics interface port-channel
<port-list>
clear priority-flow-control
statistics interface port-channel
<port-list>
13
Use the show command to see the PFC configuration. Operation-Priority shows whether
switch A is using switch Bs configured priorities or not.
In the following example, Switch A is using Switch Bs configured priorities.
switchA# show priority-flow-control
Port
Admin
Operation
Admin-Priority
Operation-Priority
-------------------------------------------------------------------1
Auto
On
2
3-5
73
This is an example showing how many pause frames of certain priorities were temporarily
stopped (transmitted or received) on port 1.
sysname# show priority-flow-control statistics interface port-channel 1
Port Number: 1
PFC Tx
Priority 0: 0
Priority 1: 0
Priority 2: 0
Priority 3: 0
Priority 4: 0
Priority 5: 0
Priority 6: 0
Priority 7: 0
PFC Rx
Priority 0: 0
Priority 1: 0
Priority 2: 0
Priority 3: 0
Priority 4: 0
Priority 5: 0
Priority 6: 0
Priority 7: 0
sysname#
14.2.3 ETS
An IEEE 802.1p priority is assigned to a traffic class with guaranteed minimum bandwidth. A
traffic class can use SP (Strict Priority) or WFQ (Weighted Fair Queue) queuing method.
Available link bandwidth is reserved first for SP traffic. The guaranteed minimum bandwidth
for non-SP traffic (WFQ) is its weight value by remaining available bandwidth. If a non-strictpriority-traffic-class does not consume its allocated bandwidth, other non-strict-prioritytraffic-classes can share the unused bandwidth according to the weight ratio.
14.2.3.1 Notes on ETS
Priority 0 does not mean the highest or lowest priority. Priority level of importance is
mapped to a queue level (with queue level 0, the lowest importance).
You dont automatically configure ETS using DCBX negotiation. ETS is configured
manually on each Switch.
All priorities are mapped to traffic class ID 0 by default.
The default traffic class (named Default) has ID 0, and is an SP traffic-class. It cannot
be modified or deleted.
You can create up to 100 traffic class profiles, with ID from 1 to 100.
The weight range of WFQ traffic-class can be from 1 to 100.
Bandwidth can also be prioritized depending on whether traffic is unicast traffic or nonunicast (broadcast, multicast, DLF) traffic. For example, 100:50 means twice as much
unicast traffic to non-unicast traffic is allowed when there is network congestion. The
weight ranges of unicast and non-unicast traffic can be from 1 to 127.
74
DESCRIPTION
13
no traffic-class <id>
13
show traffic-class
13
ets
13
13
13
unicast-nonunicast-weight
<weight> <weight>
13
GUARANTEED BANDWIDTH
NAME
SP
Default
50
SAN
50
LAN
The guaranteed minimum bandwidth for both SAN and LAN traffic is 2.5Gbps with a link
bandwidth of 10Gbps.
Table 45 ETS Example Traffic Bandwidths
INCOMING TRAFFIC
BANDWIDTH (GBPS)
NAME
GUARANTEED
MINIMUM BANDWIDTH
OUTGOING TRAFFIC
BANDWIDTH (GBPS)
Default
5 (SP)
SAN
(10-5) * (50/(50+50)) =
2.5
2.5
LAN
(10-5) * (50/(50+50)) =
2.5
2.5
Create and name traffic class IDs, with weights for the non-SP traffic type.
sysname# configure
sysname(config)# traffic-class 1 scheduler ets 50 name LAN
sysname(config)# traffic-class 2 scheduler ets 50 name SAN
75
Scheduler
--------sp
ets
ets
Weight
-----50
50
Name
------------------------------Default
LAN
SAN
Next, configure a port for traffic class(es) and bind priorities to traffic classes on a port. In the
next example, we configure port 1 and bind priorities 0, 1 and 2 to traffic class 2 (LAN), 3, 4,
5 and 6 to class 1 (SAN) and 7 to class 0, the default traffic class.
Table 46 ETS Example Priority Traffic Class ID Mapping
PRIORITY
TRAFFIC CLASS ID
NAME
LAN
LAN
LAN
SAN
SAN
SAN
SAN
Default
sysname(config)# interface
sysname(config-interface)#
sysname(config-interface)#
sysname(config-interface)#
sysname(config-interface)#
port-channel 1
ets
ets traffic-class binding 2 2 2 1 1 1 1 0
unicast-nonunicast-weight 100 100
exit
DESCRIPTION
13
13
76
Application priority can then be used in conjunction with ETS and PFC as shown in the
following examples.
This is an application priority command example with PFC.
switchA(config)# interface port-channel 5
switchA(config-interface)# priority-flow-control
switchA(config-interface)# priority-flow-control priority 3
switchB(config)# interface port-channel 6
switchB(config-interface)# priority-flow-control
switchB(config-interface)# priority-flow-control priority 3
TRAFFIC CLASS ID
NAME
Default
Default
Default
FCoE
Ethernet
Ethernet
Default
Default
sysname# configure
sysname(config)# traffic-class 3 scheduler ets 40 name ethernet
sysname (config)# traffic-class 4 scheduler ets 60 name fcoe
sysname (config)# interface port-channel 6
sysname (config-interface)# ets
sysname (config-interface)# ets traffic-class binding 0 0 0 4 3 3 0 0
sysname (config-interface)# unicast-nonunicast-weight 100 100
77
14.2.7 DCBX
DCBX uses LLDP (Link Layer Discovery Protocol) to exchange PFC, ETS and application
priority information between switches. PFC information should be consistent between
switches, so this can be configured automatically using DCBX.
See Chapter 37 on page 179 for more information on LLDP.
In order for switches to exchange information, they must send their type-length values (TLVs)
in order to be able to read each others information.
The following table lists the commands for this feature.
Table 49 dcbx Command Summary
COMMAND
DESCRIPTION
13
13
13
13
admin-status tx-rx
org-specific-tlv dot1 dcbx-etsorg-specific-tlv dot1 dcbx-pfcorg-specific-tlv dot1 dcbx-application-
78
C HA PT E R
15
DHCP Commands
Use these commands to configure DHCP features on the Switch.
Use the dhcp relay commands to configure DHCP relay for specific VLAN.
Use the dhcp smart-relay commands to configure DHCP relay for all broadcast
domains.
Use the dhcp server commands to configure the Switch as a DHCP server. (This
command is available on a layer 3 Switch only.)
DESCRIPTION
dhcp smart-relay
13
13
13
13
13
13
13
79
DESCRIPTION
13
13
13
13
DESCRIPTION
dhcp relay-broadcast
13
no dhcp relay-broadcast
13
DESCRIPTION
13
13
13
13
13
13
13
13
80
VLAN1
VLAN2
This example shows how to configure the Switch for this configuration. DHCP relay agent
information option 82 is also enabled.
sysname# configure
sysname(config)# dhcp smart-relay
sysname(config)# dhcp smart-relay helper-address 192.168.1.100
sysname(config)# dhcp smart-relay option
sysname(config)# exit
sysname# show dhcp smart-relay
DHCP Relay Agent Configuration
Active:
Yes
Remote DHCP Server 1:192.168.1.100
Remote DHCP Server 2:
0.0.0.0
Remote DHCP Server 3:
0.0.0.0
Option82: Enable
Option82Inf: Disable
In this example, there are two VLANs (VIDs 1 and 2) in a campus network. Two DHCP
servers are installed to serve each VLAN. The Switch forwards DHCP requests from the
dormitory rooms (VLAN 1) to the DHCP server with IP address 192.168.1.100. DHCP
requests from the academic buildings (VLAN 2) are sent to the other DHCP server with IP
address 172.16.10.100.
81
VLAN 1
VLAN 2
DHCP: 172.16.10.100
This example shows how to configure these DHCP servers. The VLANs are already
configured.
sysname# configure
sysname(config)# dhcp relay 1 helper-address 192.168.1.100
sysname(config)# dhcp relay 2 helper-address 172.16.10.100
sysname(config)# exit
In this example, the Switch is a DHCP server for clients on VLAN 1 and VLAN 2. The DHCP
clients in VLAN 1 are assigned IP addresses in the range 192.168.1.100 to 192.168.1.200 and
clients on VLAN 2 are assigned IP addresses in the range 172.16.1.30 to 172.16.1.130.
Figure 5 Example: DHCP Relay for Two VLANs
VLAN 1
VLAN 2
This example shows how to configure the DHCP server for VLAN 1 with the configuration
shown in Figure 5 on page 82. It also provides the DHCP clients with the IP address of the
default gateway and the DNS server.
sysname# configure
sysname(config)# dhcp server 1 starting-address 192.168.1.100
255.255.255.0 size-of-client-ip-pool 100 default-gateway 192.168.1.1
primary-dns 192.168.5.1
82
C HA PT E R
16
DESCRIPTION
dhcp snooping
13
no dhcp snooping
13
13
13
13
13
13
no dhcp snooping database write- Resets how long (10-65535 seconds) the Switch waits to
update the DHCP snooping database the first time the current
delay
bindings change after an update to the default value (300).
13
83
DESCRIPTION
Specifies the VLAN IDs for VLANs you want to enable DHCP
snooping on.
13
Specifies the VLAN IDs for VLANs you want to disable DHCP
snooping on.
13
13
13
Sets the Switch to add the slot number, port number and
VLAN ID to DHCP requests that it broadcasts to the DHCP
VLAN, if specified, or VLAN.
13
Sets the Switch to not add the slot number, port number and
VLAN ID to DHCP requests that it broadcasts to the DHCP
VLAN, if specified, or VLAN.
13
13
13
13
13
13
13
13
13
DESCRIPTION
13
no dhcp dhcp-vlan
13
84
85
86
C HA PT E R
17
DiffServ Commands
Use these commands to configure Differentiated Services (DiffServ) on the Switch.
DESCRIPTION
show diffserv
diffserv
13
no diffserv
13
13
13
diffserv
13
no diffserv
13
87
88
C HA PT E R
18
Display Commands
Use these commands to display configuration information.
DESCRIPTION
14
14
display aaa
<[authentication][authorization][s
erver]>
14
no display aaa
<[authentication][authorization][s
erver]>
14
89
90
C HA PT E R
19
DVMRP Commands
This chapter explains how to use commands to activate the Distance Vector Multicast Routing
Protocol (DVMRP) on the Switch.
DESCRIPTION
router dvmrp
13
exit
13
threshold <ttl-value>
13
no router dvmrp
13
13
91
DESCRIPTION
ip dvmrp
13
no ip dvmrp
13
10.10.10.254
172.16.1.254
92
C HA PT E R
20
DESCRIPTION
port-list
The port number or a range of port numbers that you want to configure.
93
DESCRIPTION
13
13
13
13
13
cpu-protection cause
<ARP|BPDU|IGMP> rate-limit
<0-256>
DESCRIPTION
13
Sets the action that the Switch takes when the number of
ARP, BPDU or IGMP packets exceeds the rate limit on
port(s).
inactive-port: The Switch shuts down the port.
inactive-reason: The Switch bypasses the processing of
the specified control packets (such as ARP or IGMP packets),
or drops all the specified control packets (such as BPDU) on
the port.
rate-limitation: The Switch drops the additional control
packets the port(s) have to handle in every one second.
13
errdisable recovery
13
13
Sets how many seconds the Switch waits before enabling the
port(s) which was shut down.
13
13
no errdisable recovery
13
13
94
DESCRIPTION
show errdisable
13
13
13
Rate
------100
0
0
Mode
--------------inactive-port
inactive-port
inactive-port
Total Drops
-----------
Status
------enable
enable
enable
Mode
--------------inactive-port
rate-limitation
inactive-port
95
This example enables the disabled port recovery function and the recovery timer for the
loopguard feature on the Switch. If a port is shut down due to the specified reason, the Switch
activates the port 300 seconds (the default value) later. This example also shows the number of
the disabled port(s) and the time left before the port(s) becomes active.
sysname# configure
sysname(config)# errdisable recovery
sysname(config)# errdisable recovery cause loopguard
sysname(config)# exit
sysname# show errdisable recovery
Errdisable Recovery Status:Enable
Reason
---------loopguard
ARP
BPDU
IGMP
Timer Status
-----------Enable
Disable
Disable
Disable
Time
------300
300
300
300
96
Reason
----------
Time left(sec)
--------------
Mode
---------------
C HA PT E R
21
DESCRIPTION
ethernet oam
13
no ethernet oam
13
13
13
97
DESCRIPTION
13
13
ethernet oam
13
no ethernet oam
13
13
13
13
13
13
13
98
:
:
:
:
Down
3
Forward
Active Send Local
DESCRIPTION
OAM configurations
The remote device uses this information to determine what functions are
supported.
Mode
This field displays the OAM mode. The device in active mode (typically the
service provider's device) controls the device in passive mode (typically the
subscriber's device).
Active: The Switch initiates OAM discovery; sends information PDUs; and
may send event notification PDUs, variable request/response PDUs, or
loopback control PDUs.
Passive: The Switch waits for the remote device to initiate OAM discovery;
sends information PDUs; may send event notification PDUs; and may
respond to variable request PDUs or loopback control PDUs.
The Switch might not support some types of PDUs, as indicated in the
fields below.
Unidirectional
This field indicates whether or not the Switch can send information PDUs to
transmit fault information when the receive path is non-operational.
Remote loopback
This field indicates whether or not the Switch can use loopback control
PDUs to put the remote device into loopback mode.
Link events
This field indicates whether or not the Switch can interpret link events, such
as link fault and dying gasp. Link events are sent in event notification PDUs
and indicate when the number of errors in a given interval (time, number of
frames, number of symbols, or number of errored frame seconds) exceeds
a specified threshold. Organizations may create organization-specific link
event TLVs as well.
Variable retrieval
This field indicates whether or not the Switch can respond to requests for
more information, such as requests for Ethernet counters and statistics,
about link events.
This field displays the maximum size of PDU for receipt and delivery.
Operational status
Link status
99
DESCRIPTION
Info. revision
This field displays the current version of local state and configuration. This
two-octet value starts at zero and increments every time the local state or
configuration changes.
Parser state
Discovery state
This field indicates the state in the OAM discovery process. OAM-enabled
devices use this process to detect each other and to exchange information
about their OAM configuration and capabilities. OAM discovery is a
handshake protocol.
Fault: One of the devices is transmitting OAM PDUs with link fault
information, or the interface is not operational.
Active Send Local: The Switch is in active mode and is trying to see if the
remote device supports OAM.
Passive Wait: The Switch is in passive mode and is waiting for the remote
device to begin OAM discovery.
Send Local Remote: This state occurs in the following circumstances.
The Switch has discovered the remote device but has not accepted or
rejected the connection yet.
The Switch has discovered the remote device and rejected the
connection.
Send Local Remote OK: The Switch has discovered the remote device
and has accepted the connection. In addition, the remote device has not
accepted or rejected the connection yet, or the remote device has rejected
the connected.
Send Any: The Switch and the remote device have accepted the
connection. This is the operating state for OAM links that are fully
operational.
100
DESCRIPTION
Information OAMPDU Tx This field displays the number of OAM PDUs sent on the port.
Information OAMPDU Rx This field displays the number of OAM PDUs received on the port.
Event Notification
OAMPDU Tx
This field displays the number of unique or duplicate OAM event notification
PDUs sent on the port.
Event Notification
OAMPDU Rx
This field displays the number of unique or duplicate OAM event notification
PDUs received on the port.
Loopback Control
OAMPDU Tx
This field displays the number of loopback control OAM PDUs sent on the
port.
Loopback Control
OAMPDU Rx
This field displays the number of loopback control OAM PDUs received on
the port.
Variable Request
OAMPDU Tx
This field displays the number of OAM PDUs sent to request MIB objects
on the remote device.
Variable Request
OAMPDU Rx
This field displays the number of OAM PDUs received requesting MIB
objects on the Switch.
Variable Response
OAMPDU Tx
This field displays the number of OAM PDUs sent by the Switch in
response to requests.
Variable Response
OAMPDU Rx
This field displays the number of OAM PDUs sent by the remote device in
response to requests.
Unsupported OAMPDU
Tx
This field displays the number of unsupported OAM PDUs sent on the port.
Unsupported OAMPDU
Rx
This field displays the number of unsupported OAM PDUs received on the
port.
DESCRIPTION
Local
Port
Mode
Remote
MAC Addr
101
102
LABEL
DESCRIPTION
OUI
This field displays the OUI (first three bytes of the MAC address) of the
remote device.
Mode
Config
This field displays the capabilities of the Switch and remote device. THe
capabilities are identified in the OAM Config section.
C HA PT E R
22
DESCRIPTION
13
no external-alarm <index>
13
no external-alarm all
13
show external-alarm
13
103
104
C HA PT E R
23
GARP Commands
Use these commands to configure GARP.
DESCRIPTION
show garp
13
105
106
C HA PT E R
24
Not all Switches supports Green Ethernet completely. Some may only support
EEE.
107
DESCRIPTION
green-ethernet eee
13
no green-ethernet eee
13
green-ethernet auto-power-down
13
no green-ethernet auto-power-down
13
green-ethernet short-reach
13
no green-ethernet short-reach
13
13
green-ethernet eee
13
no green-ethernet eee
13
green-ethernet auto-power-down
13
no green-ethernet auto-powerdown
13
green-ethernet short-reach
13
no green-ethernet short-reach
13
108
Normal means auto power down has not reduced the power on this link
Power down means auto power down has reduced the power on this link
Unsupported means the Switch cannot display the status.
- means auto power down is not enabled
Short reach
Normal means short reach has not reduced the power on this link
Low power means short reach has reduced the power on this link
Unsupported means the Switch cannot display the status.
- means short reach is not enabled
Port status
--------------100M/F
Down
100M/F
Down
Config
------Enable
Enable
Enable
Disable
Status
--------Active
Inactive
Unsupported
-
Config
------Enable
Enable
Enable
Disable
Status
---------Power down
Normal
Unsupported
-
109
The following example shows how to configure short reach if the Switch supports short reach
per port
sysname# configure
sysname(config)# green-ethernet short-reach
sysname# configure
sysname(config)# interface port-channel 1-4
sysname(config-interface)# green-ethernet short-reach
The following example shows the display for short reach if the Switch supports short reach per
port and showing the status
sysname# show green-ethernet short-reach
Global configuration : Enable
Port
---1
2
3
4
110
Config
----------Enable
Disable
Enable
Enable
Status
-------------Low power
Unsupported
Normal
C HA PT E R
25
GVRP Commands
Use these commands to configure GVRP.
DESCRIPTION
13
vlan1q gvrp
Enables GVRP.
13
no vlan1q gvrp
13
13
gvrp
13
no gvrp
13
111
112
P ART III
Reference H-M
HTTPS Server Commands (115)
IEEE 802.1x Authentication Commands (119)
IGMP and Multicasting Commands (123)
IGMP Snooping Commands (127)
IGMP Filtering Commands (135)
Interface Commands (137)
Interface Route-domain Mode (143)
IP Commands (145)
IP Source Binding Commands (149)
Layer 2 Protocol Tunnel (L2PT) Commands (175)
Link Layer Discovery Protocol (LLDP) Commands (179)
Load Sharing Commands (189)
Logging Commands (191)
Login Account Commands (193)
Loopguard Commands (195)
MAC Address Commands (197)
MAC Authentication Commands (199)
MAC Filter Commands (201)
MAC Forward Commands (203)
Mirror Commands (205)
MRSTP Commands (209)
MSTP Commands (211)
Multiple Login Commands (217)
113
114
C HA PT E R
26
DESCRIPTION
show https
https cert-regeneration
<rsa|dsa>
Re-generates a certificate.
13
115
Port
0
0
0
0
0
0
0
0
Local IP
Port
SSL bytes
Sock bytes
DESCRIPTION
Configuration
Version
This field displays the current version of SSL (Secure Sockets Layer) and
TLS (Transport Layer Security).
Maximum session
number
This field displays the maximum number of HTTPS sessions the Switch
supports.
This field displays the maximum number of entries in the cache table the
Switch supports for HTTPS sessions.
Cache timeout
This field displays how long entries remain in the cache table before they
expire.
Support ciphers
This field displays the SSL or TLS cipher suites the Switch supports for
HTTPS sessions. The cipher suites are identified by their OpenSSL
equivalent names. If the name does not include the authentication used,
assume RSA authentication. See SSL v2.0, SSL v3.0, TLS v1.0, and RFC
3268 for more information.
Statistics
116
Total connects
This field displays the total number of HTTPS connections since the Switch
started up.
Current connects
DESCRIPTION
This field displays the number of HTTPS connections that have finished.
Renegotiate requested
This field displays the number of times the Switch requested clients to
renegotiate the SSL connection parameters.
This field displays the number of times the Switch used cache to satisfy a
request.
This field displays the number of times the Switch could not use cache to
satisfy a request.
This field displays the number of items that have expired in the cache.
Sessions
Remote IP
Port
Local IP
Port
SSL bytes
Sock bytes
DESCRIPTION
Protocol
Cipher
Session-ID
Session-ID-ctx
This field displays the session ID context, which is used to label the data
and cache in the sessions and to ensure sessions are only reused in the
appropriate context.
Master-Key
117
118
LABEL
DESCRIPTION
Key-Arg
Start Time
This field displays the start time (in seconds, represented as an integer in
standard UNIX format) of the session.
Timeout
This field displays the timeout for the session. If the session is idle longer
than this, the Switch automatically disconnects.
This field displays the return code when an SSL client certificate is verified.
C HA PT E R
27
DESCRIPTION
no port-access-authenticator
13
no port-access-authenticator
<port-list>
13
no port-access-authenticator
<port-list> reauthenticate
13
no port-access-authenticator
<port-list> guest-vlan
13
13
13
no port-access-authenticator
Resets the guest VLAN host-mode to its default settings
<port-list> guest-vlan Host-mode (Multi-host).
port-access-authenticator
119
DESCRIPTION
port-access-authenticator
<port-list>
13
port-access-authenticator
<port-list> guest-vlan
13
port-access-authenticator
Sets the guest VLAN ID number on the listed ports.
<port-list> guest-vlan <vlan-id>
13
port-access-authenticator
<port-list> guest-vlan Host-mode
Multi-host
13
port-access-authenticator
<port-list> guest-vlan Host-mode
Multi-secure [<1-24>]
13
port-access-authenticator
<port-list> max-req <1-10>
13
port-access-authenticator
<port-list> quiet-period <065535>
13
port-access-authenticator
<port-list> supp-timeout <3065535>
13
port-access-authenticator
<port-list> tx-period <1-65535>
Sets the number of seconds the Switch waits before resending an identity request to clients on the listed ports.
13
port-access-authenticator
<port-list> reauthenticate
13
port-access-authenticator
<port-list> reauth-period <165535>
13
show port-access-authenticator
show port-access-authenticator
<port-list>
120
121
122
C HA PT E R
28
DESCRIPTION
router igmp
13
exit
13
non-querier
13
no non-querier
13
unknown-multicast-frame
<drop|flooding>
13
no router igmp
13
13
13
ip igmp <v1|v2|v3>
123
DESCRIPTION
13
13
13
13
no ip igmp
13
COMMAND
DESCRIPTION
13
13
no ipmc egress-untag-vlan
13
124
Configures the IP interface 172.16.1.1 with subnet mask 255.255.255.0 to route IGMP
version 3 packets.
sysname(config)# router igmp
sysname(config-igmp)# non-querier
sysname(config-igmp)# unknown-multicast-frame flooding
sysname(config-igmp)# exit
sysname(config)# interface route-domain 172.16.1.1/24
sysname(config-if)# ip igmp v3
125
126
C HA PT E R
29
DESCRIPTION
igmp-flush
13
DESCRIPTION
clear igmp-snooping statistics all Removes all multicast statistics of the Switch.
clear igmp-snooping statistics
port
igmp-snooping
13
no igmp-snooping
13
13
igmp-snooping 8021p-priority <0-7> Sets the 802.1p priority for outgoing igmp snooping
packets.
no igmp-snooping 8021p-priority
13
igmp-snooping filtering
13
13
no igmp-snooping filtering
13
13
13
127
DESCRIPTION
13
13
igmp-snooping querier
13
no igmp-snooping querier
13
igmp-snooping leave-proxy
13
no igmp-snooping leave-proxy
13
igmp-snooping report-proxy
13
no igmp-snooping report-proxy
13
13
13
show igmp-snooping
128
DESCRIPTION
Displays the IGMP query mode for the ports on the Switch. E
DESCRIPTION
13
13
13
DESCRIPTION
129
DESCRIPTION
13
Set the IGMP snooping fast leave timeout (in miliseconds) the
Switch uses to update the forwarding table for the port(s).
This defines how many seconds the Switch waits for an IGMP
report before removing an IGMP snooping membership entry
when an IGMP leave message is received on this port from a
host.
13
igmp-snooping filtering
profile <name>
13
igmp-snooping group-limited
13
igmp-snooping group-limited
action <deny|replace>
Sets how the Switch deals with the IGMP reports when the
maximum number of the IGMP groups a port can join is
reached.
deny: The Switch drops any new IGMP join report received
on this port until an existing multicast forwarding table entry is
aged out.
replace: The Switch replaces an existing entry in the
multicast forwarding table with the new IGMP report(s)
received on this port.
13
igmp-snooping group-limited
number <number>
13
igmp-snooping leave-mode
<normal|immediate|fast>
13
igmp-snooping leave-timeout
<200-6348800>
13
130
DESCRIPTION
igmp-snooping querier-mode
<auto|fixed|edge>
13
no igmp-snooping filtering
profile
13
no igmp-snooping grouplimited
13
igmp-group-limited
13
igmp-group-limited number
<number>
13
no igmp-group-limited
13
igmp-immediate-leave
13
no igmp-immediate-leave
13
igmp-querier-mode
<auto|fixed|edge>
13
131
VID
----
Port
----
Multicast Group
----------------
Timeout
-------
DESCRIPTION
Index
VID
Port
This field displays the port number that belongs to the multicast group.
Multicast Group
Timeout
This field displays how long the port will belong to the multicast group.
132
VID
---3
Type
---------MVR
133
134
C HA PT E R
30
DESCRIPTION
igmp-filtering
13
no igmp-filtering
13
13
13
13
13
igmp-filtering profile
<name>
13
no igmp-filtering profile
13
no igmp-filtering profile <name> Removes the specified IGMP filtering profile. You cannot
delete an IGMP filtering profile that is assigned to any ports.
135
136
C HA PT E R
31
Interface Commands
Use these commands to configure basic port settings.
DESCRIPTION
13
13
bpdu-control
<peer|tunnel|discard|network>
13
cx4-length <0.5|1|3|5|10|15>
13
flow-control
13
frame-type
<all|tagged|untagged>
13
13
intrusion-lock
13
13
137
DESCRIPTION
no flow-control
13
no inactive
13
no intrusion-lock
13
pvid <1-4094>
13
13
speed-duplex <auto|10-half|10full|100-half|100-full|1000full|1000-auto|10000full|40000-full>
13
no interface <port-num>
13
138
:1
:100M/F
:FORWARDING
:Disabled
:7214
:395454
:0
:0.0
:0.0
:127:26:26
:7214
:0
:163
:0
:0
:395454
:186495
:200177
:0
:0
:0
:0
:0
:0
:0
:0
:285034
:31914
:22277
:50546
:1420
:4268
:0
DESCRIPTION
Port Info
Port NO.
Link
This field displays the speed (either 10M for 10 Mbps, 100M for 100 Mbps,
1000M for 1Gbps, 1000M for 1Gbps, 10000M for 10Gbps or 40000M for
40Gbps) and the duplex (F for full duplex or H for half duplex). It also shows
the cable type (Copper or Fiber). This field displays Down if the port is not
connected to any device.
Status
If STP (Spanning Tree Protocol) is enabled, this field displays the STP state
of the port. If STP is disabled, this field displays FORWARDING if the link is
up, otherwise, it displays STOP.
LACP
139
DESCRIPTION
TxPkts
RxPkts
Errors
Tx KBs/s
This field shows the number kilobytes per second transmitted on this port.
Rx KBs/s
This field shows the number of kilobytes per second received on this port.
Up Time
This field shows the total amount of time the connection has been up.
Tx Packet
The following fields display detailed information about packets transmitted.
Unicast
Multicast
Broadcast
Pause
Tagged
This field shows the number of packets with VLAN tags transmitted.
Rx Packet
The following fields display detailed information about packets received.
Unicast
Multicast
Broadcast
Pause
Control
This field shows the number of control packets received (including those
with CRC error) but it does not include the 802.3x Pause packets.
TX Collision
The following fields display information on collisions while transmitting.
Single
Multiple
Excessive
Late
This is the number of times a late collision is detected, that is, after 512 bits
of the packets have already been transmitted.
Error Packet
The following fields display detailed information about packets received that
were in error.
RX CRC
This field shows the number of packets received with CRC (Cyclic
Redundant Check) error(s).
Runt
This field shows the number of packets received that were too short
(shorter than 64 octets), including the ones with CRC errors.
Distribution
140
64
This field shows the number of packets (including bad packets) received
that were 64 octets in length.
65-127
This field shows the number of packets (including bad packets) received
that were between 65 and 127 octets in length.
DESCRIPTION
128-255
This field shows the number of packets (including bad packets) received
that were between 128 and 255 octets in length.
256-511
This field shows the number of packets (including bad packets) received
that were between 256 and 511 octets in length.
512-1023
This field shows the number of packets (including bad packets) received
that were between 512 and 1023 octets in length.
1024-1518
This field shows the number of packets (including bad packets) received
that were between 1024 and 1518 octets in length.
Giant
This field shows the number of packets (including bad packets) received
that were between 1519 octets and the maximum frame size.
The maximum frame size varies depending on your switch model. See
Product Specification chapter in your Users Guide.
port-channel 1,3-5
qos priority 4
name Test
speed-duplex 100-half
141
142
C HA PT E R
32
DESCRIPTION
13
13
exit
143
144
C HA PT E R
33
IP Commands
Use these commands to configure the management port IP address, default domain name
server and to look at IP domains.
DESCRIPTION
show ip
ip name-server <ip>
13
13
COMMAND
DESCRIPTION
show ip tcp
145
Chapter 33 IP Commands
DESCRIPTION
show ip udp
13
0
4294967295
188
25
4025
64
0
Remote socket
172.16.5.15:1510
0.0.0.0:0
0.0.0.0:0
0.0.0.0:0
0.0.0.0:0
0.0.0.0:0
146
LABEL
DESCRIPTION
tcpRtoAlgorithm
This field displays the algorithm used to determine the timeout value that is
used for retransmitting unacknowledged octets.
tcpRtoMin
tcpRtoMax
Chapter 33 IP Commands
DESCRIPTION
tcpMaxConn
This field displays the maximum number of TCP connections the Switch
can support. If the maximum number is dynamic, this field displays -1.
tcpActiveOpens
This field displays the number of times TCP connections have made a
direct transition to the SYN-SENT state from the CLOSED state.
tcpPassiveOpens
This field displays the number of times TCP connections have made a
direct transition to the SYN-RCVD state from the LISTEN state.
tcpAttemptFails
This field displays the number of times TCP connections have made a
direct transition to the CLOSED state from either the SYN-SENT state or
the SYN-RCVD state, plus the number of times TCP connections have
made a direct transition to the LISTEN state from the SYN-RCVD state.
tcpEstabResets
This field displays the number of times TCP connections have made a
direct transition to the CLOSED state from either the ESTABLISHED state
or the CLOSE-WAIT state.
tcpCurrEstab
This field displays the number of TCP connections for which the current
state is either ESTABLISHED or CLOSE-WAIT.
tcpInSegs
This field displays the total number of segments received, including those
received in error. This count includes segments received on currently
established connections.
tcpOutSegs
This field displays the total number of segments sent, including those on
current connections but excluding those containing only retransmitted
octets.
tcpRetransSegs
This field displays the total number of TCP segments transmitted containing
one or more previously transmitted octets.
tcpInErrs
This field displays the total number of segments received with error (for
example, bad TCP checksums).
tcpOutRsts
This field displays the number of TCP segments sent containing the RST
flag.
This section displays the current TCP listeners.
&TCB
Rcv-Q
This field displays the items on the receive queue in this connection.
Snd-Q
Rcv-Wnd
Snd-Wnd
This field displays the sending window size in this connection. It is offered
by the remote device.
Local socket
This field displays the local IP address and port number in this TCP
connection. In the case of a connection in the LISTEN state that is willing to
accept connections for any IP interface associated with the node, the value
is 0.0.0.0.
147
Chapter 33 IP Commands
DESCRIPTION
Remote socket
This field displays the remote IP address and port number in this TCP
connection.
State
This example shows the UDP statistics and listener ports. See RFC 1213 for more information.
sysname# show ip udp
( 1)udpInDatagrams
10198
( 3)udpInErrors
0
&UCB Rcv-Q Local socket
80bfdac0
0 0.0.0.0:53
80bfd9ac
0 0.0.0.0:520
80c78888
0 0.0.0.0:161
80c79184
0 0.0.0.0:162
80c3188c
0 0.0.0.0:1027
80c31830
0 0.0.0.0:1026
80bfdb78
0 0.0.0.0:1025
80bfdb1c
0 0.0.0.0:1024
80bfda64
0 0.0.0.0:69
80bfda08
0 0.0.0.0:263
( 2)udpNoPorts
( 4)udpOutDatagrams
81558
13
148
LABEL
DESCRIPTION
udpInDatagrams
This field displays the total number of UDP datagrams delivered to UDP
users.
udpNoPorts
This field displays the total number of received UDP datagrams for which
there was no application at the destination port.
udpInErrors
This field displays the number of received UDP datagrams that could not be
delivered for reasons other than the lack of an application at the destination
port.
udpOutDatagrams
This field displays the total number of UDP datagrams sent by the Switch.
&UCB
Rcv-Q
Local socket
This field displays the local IP address and port number for this UDP
listener. In the case of a UDP listener that is willing to accept datagrams for
any IP interface associated with the node, the value is 0.0.0.0.
C HA PT E R
34
DESCRIPTION
13
13
13
13
13
Lease
------------
Type VLAN
Port
------------- ---- ---
149
150
LABEL
DESCRIPTION
MacAddress
IpAddress
This field displays the IP address assigned to the MAC address in the
binding.
Lease
This field displays how many days, hours, minutes, and seconds the
binding is valid; for example, 2d3h4m5s means the binding is still valid for
2 days, 3 hours, 4 minutes, and 5 seconds. This field displays infinity if the
binding is always valid (for example, a static binding).
Type
VLAN
Port
This field displays the port number in the binding. If this field is blank, the
binding applies to all ports.
C HA PT E R
35
IPv6 Commands
35.1 IPv6 Overview
IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The
increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 1038
IP addresses. At the time of writing, the Switch supports the following features.
Static address assignment (see Section 35.1.1 on page 151) and stateless autoconfiguration
(see Stateless Autoconfiguration on page 154)
Neighbor Discovery Protocol (see Neighbor Discovery Protocol (NDP) on page 156)
Remote Management using SNMP, Telnet, HTTP and FTP services (see Chapter 63 on
page 265)
ICMPv6 (see ICMPv6 on page 155)
IPv4/IPv6 dual stack; the Switch can run IPv4 and IPv6 at the same time.
DHCPv6 client and relay (see DHCPv6 on page 154)
Multicast Listener Discovery (MLD) snooping and proxy (see Multicast Listener
Discovery on page 156)
For more information on IPv6 addresses, refer to RFC 2460 and RFC 4291.
Any number of consecutive blocks of zeros can be replaced by a double colon. A double
colon can only appear once in an IPv6 address. So
2001:0db8:0000:0000:1a2f:0000:0000:0015 can be written as
2001:0db8::1a2f:0000:0000:0015 or 2001:0db8:0000:0000:1a2f::0015.
151
Interface ID
10 bits
54 bits
64 bits
Global Address
A global address uniquely identifies a device on the Internet. It is similar to a public IP
address in IPv4. The global address format as follows.
Table 92 Global Address Format
001
Global ID
Subnet ID
Interface ID
3 bits
45 bits
16 bits
64 bits
The global ID is the network identifier or prefix of the address and is used for routing. This
may be assigned by service providers.
The subnet ID is a number that identifies the subnet of a site.
Multicast Addresse
In IPv6, multicast addresses provide the same functionality as IPv4 broadcast addresses.
Broadcasting is not supported in IPv6. A multicast address allows a host to send packets to all
hosts in a multicast group.
152
Multicast scope allows you to determine the size of the multicast group. A multicast address
has a predefined prefix of ff00::/8. The following table describes some of the predefined
multicast addresses.
Table 93 Predefined Multicast Address
MULTICAST ADDRESS
DESCRIPTION
FF01:0:0:0:0:0:0:1
FF01:0:0:0:0:0:0:2
FF02:0:0:0:0:0:0:1
FF02:0:0:0:0:0:0:2
FF05:0:0:0:0:0:0:2
FF05:0:0:0:0:0:1:3
The following table describes the multicast addresses which are reserved and can not be
assigned to a multicast group.
Table 94 Reserved Multicast Address
MULTICAST ADDRESS
FF00:0:0:0:0:0:0:0
FF01:0:0:0:0:0:0:0
FF02:0:0:0:0:0:0:0
FF03:0:0:0:0:0:0:0
FF04:0:0:0:0:0:0:0
FF05:0:0:0:0:0:0:0
FF06:0:0:0:0:0:0:0
FF07:0:0:0:0:0:0:0
FF08:0:0:0:0:0:0:0
FF09:0:0:0:0:0:0:0
FF0A:0:0:0:0:0:0:0
FF0B:0:0:0:0:0:0:0
FF0C:0:0:0:0:0:0:0
FF0D:0:0:0:0:0:0:0
FF0E:0:0:0:0:0:0:0
FF0F:0:0:0:0:0:0:0
Loopback
A loopback address (0:0:0:0:0:0:0:1 or ::1) allows a host to send packets to itself. It is similar
to 127.0.0.1 in IPv4.
153
Unspecified
An unspecified address (0:0:0:0:0:0:0:0 or ::) is used as the source address when a device does
not have its own address. It is similiar to 0.0.0.0 in IPv4.
EUI-64
The EUI-64 (Extended Unique Identifier) defined by the IEEE (Institute of Electrical and
Electronics Engineers) is an interface ID format designed to adapt with IPv6. It is derived from
the 48-bit (6-byte) Ethernet MAC address as shown next. EUI-64 inserts the hex digits fffe
between the third and fourth bytes of the MAC address and complements the seventh bit of the
first byte of the MAC address. See the following example.
MAC
EUI-64
00 : 13
02 : 13
: 49
: 49
: 12
: 34
: 56
: FF
: FE
: 12
: 34
: 56
Stateless Autoconfiguration
With stateless autoconfiguration in IPv6, addresses can be uniquely and automatically
generated. Unlike DHCPv6 (Dynamic Host Configuration Protocol version six) which is used
in IPv6 stateful autoconfiguration, the owner and status of addresses dont need to be
maintained by a DHCP server. Every IPv6 device is able to generate its own and unique IP
address automatically when IPv6 is initiated on its interface. It combines the prefix and the
interface ID (generated from its own Ethernet MAC address, see Interface ID and EUI-64) to
form a complete IPv6 address.
When IPv6 is enabled on a device, its interface automatically generates a link-local address
(beginning with fe80).
When the interface is connected to a network with a router and the ipv6 address
autoconfig command is issued on the Switch, it generates 1another address which
combines its interface ID and global and subnet information advertised from the router. This is
a routable global IP address.
DHCPv6
The Dynamic Host Configuration Protocol for IPv6 (DHCPv6, RFC 3315) is a server-client
protocol that allows a DHCP server to assign and pass IPv6 network addresses, prefixes and
other configuration information to DHCP clients. DHCPv6 servers and clients exchange
DHCP messages using UDP.
Each DHCP client and server has a unique DHCP Unique IDentifier (DUID), which is used
for identification when they are exchanging DHCPv6 messages. The DUID is generated from
the MAC address, time, vendor assigned ID and/or the vendor's private enterprise number
registered with the IANA. It should not change over time even after you reboot the device.
1.
154
Identity Association
An Identity Association (IA) is a collection of addresses assigned to a DHCP client, through
which the server and client can manage a set of related IP addresses. Each IA must be
associated with exactly one interface. The DHCP client uses the IA assigned to an interface to
obtain configuration from a DHCP server for that interface. Each IA consists of a unique IAID
and associated IP information.
The IA type is the type of address in the IA. Each IA holds one type of address. IA_NA means
an identity association for non-temporary addresses and IA_TA is an identity association for
temporary addresses. An IA_NA option contains the T1 and T2 fields, but an IA_TA option
does not. The DHCPv6 server uses T1 and T2 to control the time at which the client contacts
with the server to extend the lifetimes on any addresses in the IA_NA before the lifetimes
expire. After T1, the client sends the server (S1) (from which the addresses in the IA_NA were
obtained) a Renew message. If the time T2 is reached and the server does not respond, the
client sends a Rebind message to any available server (S2). For an IA_TA, the client may send
a Renew or Rebind message at the client's discretion.
T2
T1
Renew Renew
to S1
to S1
Renew Renew
to S1
to S1
Renew
to S1
Renew
to S1
Rebind
to S2
Rebind
to S2
155
156
MLD Messages
A multicast router or switch periodically sends general queries to MLD hosts to update the
multicast forwarding table. When an MLD host wants to join a multicast group, it sends an
MLD Report message for that address.
An MLD Done message is equivalent to an IGMP Leave message. When an MLD host wants
to leave a multicast group, it can send a Done message to the router or switch. If the leave
mode is not set to immediate, the router or switch sends a group-specific query to the port
on which the Done message is received to determine if other devices connected to this port
should remain in the group.
MLD Port Role
A port on the Switch can be either a downstream port or upstream port in MLD. A downstream
port (DSP in the figure) connects to MLD hosts and acts as a multicast router to send MLD
queries and listen to the MLD hosts Report and Done messages. An upstream port (USP in
the figure) connects to a multicast router and works as a host to send Report or Done messages
when receiving queries from a multicast router.
Proxy
Snooping
USP
DSP
MLD Snooping-Proxy
MLD snooping-proxy is a ZyXEL-proprietary feature. IPv6 MLD proxy allows only one
upstream interface on a switch, while MLD snooping-proxy supports more than one upstream
port on a switch. The upstream port in MLD snooping-proxy can report group changes to a
connected multicast router and forward MLD messages to other upstream ports. This helps
especially when you want to have a network that uses STP to provide backup links between
switches and also performs MLD snooping and proxy functions. MLD snooping-proxy, like
MLD proxy, can minimize MLD control messages and allow better network performance.
In MLD snooping-proxy, if one upstream port is learned via snooping, all other upstream ports
on the same device will be added to the same group. If one upstream port requests to leave a
group, all other upstream ports on the same device will also be removed from the group.
157
In the following MLD snooping-proxy example, all connected upstream ports (1 ~7) are
treated as one interface. The connection between ports 8 and 9 is blocked by STP to break the
loop. If there is one query from a router (X) or MLD Done or Report message from any
upstream port, it will be broadcast to all connected upstream ports.
X
1
Query
2
9
8
Report
4
6
Done
DESCRIPTION
interface-type
VLAN. The Switch supports only the VLAN interface type at the time of writing.
interfacenumber
A VLAN ID number.
DESCRIPTION
13
ipv6
13
13
13
158
DESCRIPTION
13
13
13
13
13
13
13
no ipv6
13
13
13
13
13
13
13
13
13
13
13
show ipv6
159
DESCRIPTION
DESCRIPTION
13
13
13
13
13
13
160
DESCRIPTION
13
DESCRIPTION
13
13
13
13
13
13
161
DESCRIPTION
13
13
13
13
13
13
13
13
13
13
13
13
13
13
13
162
DESCRIPTION
13
13
13
13
13
13
13
163
DESCRIPTION
13
13
13
13
13
164
DESCRIPTION
13
13
ipv6 nd managed-config-flag
13
13
ipv6 nd other-config-flag
13
13
13
ipv6 nd ra interval minimum <3- Specifies the minimum and maximum time intervals at
which the Switch sends router advertisements for this
1350> maximum <4-1800>
VLAN.
13
13
ipv6 nd ra suppress
13
13
no ipv6 nd dad-attempts
13
165
DESCRIPTION
no ipv6 nd managed-config-flag
13
no ipv6 nd ns-interval
13
no ipv6 nd other-config-flag
13
13
no ipv6 nd ra interval
13
no ipv6 nd ra lifetime
13
no ipv6 nd ra suppress
13
no ipv6 nd reachable-time
13
13
13
13
no ipv6 hop-limit
13
13
DESCRIPTION
13
13
166
DESCRIPTION
13
13
This example shows how to manually configure two IPv6 addresses (one uses the EUI-64
format, one doesnt) in VLAN 1, and then display the result. Before using ipv6 address
commands, you have to enable IPv6 in the VLAN and this has the Switch generate a link-local
address for the interface.
167
There are three addresses created in total for VLAN 1. The address
2001:db8:c18:1:219:cbff:fe00:1/64 is created with the interface ID 219:cbff:fe00:1
generated using the EUI-64 format. The address 2001:db8:c18:1::12b/64 is created exactly
the same as what you entered in the command.
sysname# config
sysname(config)# interface vlan 1
sysname(config-vlan)# ipv6
sysname(config-vlan)# ipv6 address 2001:db8:c18:1::127/64 eui-64
sysname(config-vlan)# ipv6 address 2001:db8:c18:1::12b/64
sysname(config-vlan)# exit
sysname(config)# exit
sysname# show ipv6
VLAN : 1 (VLAN1)
IPv6 is enabled.
MTU is 1500 bytes.
ICMP error messages limited to 10 every 100 milliseconds.
Stateless Address Autoconfiguration is disabled.
Link-Local address is fe80::219:cbff:fe00:1 [preferred]
Global unicast address(es):
2001:db8:c18:1::12b/64 [preferred]
2001:db8:c18:1:219:cbff:fe00:1/64 [preferred]
Joined group address(es):
ff02::1:ff00:12b
ff02::2
ff01::1
ff02::1
ff02::1:ff6f:9159
ND DAD is enabled, number of DAD attempts: 1
ND NS-interval is 1000 milliseconds
ND reachable time is 30000 milliseconds
ND router advertised managed config flag is disable
ND router advertised other config flag is disable
ND router advertisements are sent every 200 to 600 seconds
ND router advertisements lifetime 1800 seconds
This example shows the Switch owns (L displays in the T field) two manually configured
(permanent) IP addresses, 2001::1234 and fe80::219:cbff:fe00:1. It also displays a neighbor
fe80::2d0:59ff:feb8:103c in VLAN 1 is reachable from the Switch.
sysname# show ipv6 neighbor
Address
--------------------------------------2001::1234
fe80::219:cbff:fe00:1
fe80::2d0:59ff:feb8:103c
MAC
----------------00:19:cb:0:0:0:1
00:19:cb:0:0:0:1
00:d0:59:b8:10:3c
S
-R
R
R
T
L
L
D
Interface
-----------vlan 1
vlan 1
vlan 1
S: reachable(R),stale(S),delay(D),probe(P),invalid(IV),incomplete(I),unknown(?)
T: local(L),dynamic(D),static(S),other(O)
168
DESCRIPTION
Address
MAC
Interface
Expire
This example sends ping requests to an Ethernet device with IPv6 address
fe80::2d0:59ff:feb8:103c in VLAN 1. The device also responds the pings.
sysname# ping6 ffe80::2d0:59ff:feb8:103c -i vlan 1
PING6(56=40+8+8 bytes) fe80::219:cbff:fe00:1 --> fe80::2d0:59ff:feb8:103c
16 bytes from fe80::2d0:59ff:feb8:103c, icmp_seq=0 hlim=64 time=1.0 ms
16 bytes from fe80::2d0:59ff:feb8:103c, icmp_seq=1 hlim=64 time=1.0 ms
16 bytes from fe80::2d0:59ff:feb8:103c, icmp_seq=2 hlim=64 time=1.0 ms
--- fe80::2d0:59ff:feb8:103c ping6 statistics --3 packets transmitted, 3 packets received, 0.0 % packet loss
round-trip min/avg/max = 1.0 /1.0 /1.0 ms
sysname#
169
This example configures a static IPv6 route to forward packets with IPv6 prefix 2100:: and
prefix length 64 to the gateway with IPv6 address fe80::219:cbff:fe01:101 in VLAN 1.
sysname# config
sysname(config)# ipv6 route 2100::/64 fe80::219:cbff:fe01:101 vlan 1
sysname(config)# exit
sysname# show ipv6 route
Terminology:
C - Connected, S - Static
Destination/Prefix Length
Type
Next Hop
Interface
-----------------------------------------------------------2001:db8:c18:1::/64
C
::
VLAN1
2100::/64
S
fe80::219:cbff:fe01:101
VLAN1
sysname#
DNS
. .
. .
. .
. .
Suffix
. . . .
. . . .
. . . .
. . . .
.
.
.
.
.
:
:
:
:
:
10.1.1.46
255.255.255.0
fe80::2d0:59ff:feb8:103c%4
10.1.1.254
170
IPv6 is installed and enabled by default in Windows Vista. Use the ipconfig command to
check your automatic configured IPv6 address as well. You should see at least one IPv6
address available for the interface on your computer.
DESTINATION
FIREFOX
Windows
XP
A link-local address
Use http://address
The address should be converted using the following procedure.
1. Use a dash - to replace each colon : in an IPv6 address.
2. Append the Ethernet interface identifier you want to use to connect to the
Switch. But replace the percentage character % with s.
3. Append .ipv6-literal.net at the end.
For example, the Switch uses an address fe80::1234:5678. The Ethernet
interface identifier you want to use on your computer to access the Switch is %4.
You have to type the following to access the Switch.
http://fe80--1234-5678-1s4.ipv6-literal.net.
A global address
Windows
Vista
A link-local address
Use http://[address]
For example, http://[fe80--1234-5678-1]
A global address
This example shows you how to access the Switch using HTTP on Windows XP.
1 Make sure you have enabled IPv6 on your computer (see Section 35.4). Use the
ipconfig command in the command prompt to check the IPv6 address on your
computer. The example uses an interface with address fe80::2d0:59ff:feb8:103c to
171
access the Switch. So its Ethernet interface identifier is %4 and will be used later to
make a ping.
C:\>ipconfig
Windows IP Configuration
Ethernet adapter Local Area Connection:
Connection-specific
IP Address. . . . .
Subnet Mask . . . .
IP Address. . . . .
Default Gateway . .
DNS
. .
. .
. .
. .
Suffix
. . . .
. . . .
. . . .
. . . .
.
.
.
.
.
:
:
:
:
:
10.1.1.46
255.255.255.0
fe80::2d0:59ff:feb8:103c%4
10.1.1.254
2 Check the Switch IPv6 address(es) you want to ping. In this example, there are two IPv6
addresses in VLAN 1. One is a link-local address (fe80::219:cbff:fe00:1/64) and the
other one is a global address (2001::1234/64).
sysname# show ipv6
VLAN ID
: 1
IPv6 Status : Enable
Origin
--------manual
manual
IP Address/PrefixLength
Status
Expire
------------------------------------------- ---------- ------fe80::219:cbff:fe00:1/64
preferred permanent
2001::1234/64
preferred permanent
3 In order to access the Switch through its link-local address, do the address convertion
(See Table 103 on page 171).
3a Use a dash - to replace each colon : in an IPv6 address. Then the address
becomes:
fe80--219-cbff-fe00-1
3b In the step 1, the Ethernet interface identifier you want to use to connect to the
Switch is %4. Replace the percentage character % with s and then append it to
the address. The address becomes:
fe80--219-cbff-fe00-1s4
3c Append .ipv6-literal.net at the end. The address becomes:
fe80--219-cbff-fe00-1s4.ipv6-literal.net
172
Open an Internet Explorer 7.0 browser and type http://fe80--219-cbff-fe001s4.ipv6-literal.net. The login page appears.
4 Alternatively, you can use the global address to access the Switch. Type http://
[2001::1234] on your browser and the login page appears.
173
174
C HA PT E R
36
DESCRIPTION
clear l2protocol-tunnel
13
13
l2protocol-tunnel
13
l2protocol-tunnel cdp
13
l2protocol-tunnel mode
<access|tunnel>
13
13
13
13
175
DESCRIPTION
13
l2protocol-tunnel stp
13
l2protocol-tunnel vtp
13
no l2protocol-tunnel
13
no l2protocol-tunnel cdp
13
no l2protocol-tunnel point-topoint
13
13
13
13
no l2protocol-tunnel stp
13
no l2protocol-tunnel vtp
13
l2protocol-tunnel
13
13
no l2protocol-tunnel
13
show l2protocol-tunnel
13
13
176
This example enables L2PT for STP, CDP and VTP packets on port 3. It also sets L2PT mode
to access for this port.
sysname(config)# interface
sysname(config-interface)#
sysname(config-interface)#
sysname(config-interface)#
sysname(config)# exit
port-channel 3
l2protocol-tunnel
l2protocol-tunnel mode access
exit
This example displays L2PT settings and status on port 3. You can also see how many CDP,
STP, VTP, LACP, PAgP and UDLD packets received on this port are encapsulated,
decapsulated or dropped.
sysname# show l2protocol-tunnel interface port-channel 3
Status : Running
Layer 2 Protocol Tunneling: Enable
Destination MAC Address: 00:10:23:45:67:8e
Port
---3
Protocol
-------cdp
stp
vtp
lacp
pagp
udld
sysname#
State
Encapsulation
Counter
------ ------------Enable
0
Enable
1280
Enable
0
Disable
0
Disable
0
Disable
0
Decapsulation
Counter
------------0
2548
0
0
0
0
Drop
Counter
------0
0
0
0
0
0
177
178
C HA PT E R
37
The Switch also supports the IEEE 802.1 and IEEE 802.3 organizationally-specific TLVs.
Annex F of the LLDP specification defines the following set of IEEE 802.1 organizationally
specific TLVs:
Port VLAN ID TLV (optional)
Port and Protocol VLAN ID TLV (optional)
Annex G of the LLDP specification defines the following set of IEEE 802.3 Organizationally
Specific TLVs:
The optional TLVs are inserted between the Time To Live TLV and the End of LLDPDU TLV.
179
DESCRIPTION
13
13
13
13
13
13
13
lldp notification
13
13
13
13
13
13
13
no lldp admin-status
13
13
13
13
13
180
DESCRIPTION
13
no lldp notification
13
13
13
13
13
13
13
lldp
13
13
13
13
13
no lldp
13
181
DESCRIPTION
13
13
13
182
DESCRIPTION
Active
Transmit Interval
This displays how long the Switch waits before sending LLDP packets.
Transmit Hold
This displays the time-to-live (TTL) multiplier of LLDP frames. The device
information on the neighboring devices ages out and is discarded when its
corresponding TTL expires. The TTL value is to multiply the TTL multiplier
by the LLDP packets transmitting interval.
Transmit Delay
This displays the delay (in seconds) between the successive LLDP PDU
transmissions initiated by value or status changes in the Switch MIB.
Reinitialize Delay
This displays the number of seconds for LLDP to wait before initializing on
a port.
DESCRIPTION
Port
AdminStatus
Notification
183
DESCRIPTION
BasicTLV
This shows which Basic TLC flags are enabled on this port. For example,
N is System Name.
Dot1TLV
This shows which 802.1 TLV flags are enabled on this port. For example,
V is Port VLAN ID.
Dot3TLV
This shows which 802.3 TLV flags are enabled on this port. For example, L
is Link Aggregation.
BasicTLV Flags
The Basic TLV Flags are (P) Port Description, (N) System Name, (D)
System Description, (C) System Capabilities, and (M) Management
Address.
802.1TLV Flags
The 802.1 TLV Flags are (P) Port & Protocol VLAN ID, (V) Port VLAN ID,
(E) DCBX ETS Configuration, (F) DCBX PFC Configuration and (A) DCBX
Application Priority Configuration.
802.3TLV Flags
The 802.3 TLV Flags are (L) Link Aggregation, (M) MAC/PHY
Configuration/Status, (F) Maximun Frame Size, and (P) Power Via MDI.
0:00:00
sysname#
184
LABEL
DESCRIPTION
This displays the time the LLDP database was last updated for
this and neighboring Switches.
DESCRIPTION
Local Port
Frames Discarded
Frames Invalid
Frames Received
Frames Sent
TLVs Unrecognized
TLVs Discarded
Neighbor Ageouts
This displays the number of neighbors with expired TTLs on this port.
This example shows local Switch (the Switch youre accessing) LLDP information
sysname# show lldp info local
LLDP Global Local Device Information:
Chassis ID Subtype:
mac-address
Chassis ID:
00:19:cb:00:00:02
System Name:
sysname
System Description: V4.00(AAEW.0)b7 | 12/11/2012
System Capabilities Supported: Bridge
System Capabilities Enabled: Bridge
Management Address :
Management Address Subtype: ipv4 / all-802
Interface Number Subtype:
unknown
Interface Number: 0
Object Identifier: 0
sysname#
185
DESCRIPTION
This contans the chassis ID subtype, chassis ID, and system name.
System Description
System Capabilities
Supported
System Capabilities
Enabled
Management Address
This example shows local Switch (the Switch youre accessing) LLDP information on a port.
sysname# show lldp info local interface port-channel 2
LLDP Local Device Information Detail:
Local Port:
2
Port ID Subtype: local-assigned
Port ID:
2
Port Description:
Extended TLV Info 802.1 OUI (hex value) = 00-80-c2
-Port VLAN ID
-ID:
1
-DCBX Application Priority
ether-type:
fcoe
Priority:
2
-DCBX ETS Configuration
-Willing Bit: False
-Max Traffic Classes:
3
-Priority-Group 2:
Strict-priority, Priority-list:7
-Priority-Group 1:
ETS Bandwidth 50%, Priority-list:3-6
-Priority-Group 0:
ETS Bandwidth 50%, Priority-list:0-2
-DCBX PFC Configuration
-Willing Bit: True
-PFC capability:
8
-Priority enable list: 0-2
Extended TLV Info 802.3 OUI (hex value) = 00-12-0f
-MAC PHY Configuration & Status
-AN Supported:
Y
-AN Enabled:
Y
-AN Advertised Capability: 1000baseTFD
-Oper MAU type: 30
-Link Aggregation
-Capability:
Y
-Status:
N
-Port ID:
2
-Max Frame Size
-Frame Size: 1518
-------------------------------------------------sysname#
186
DESCRIPTION
This displays the local port, port ID, and port description.
Port VLAN ID
DCBX Application
Priority
DCBX ETS
Configuration
This displays the Willing Bit, Max Traffic Classes, and Traffic Class binding
for each priority.
DCBX PFC
Configuration
This displays the Willing Bit, PFC capability, and priority enable list.
Link Aggregation
This example shows remote Switch (the Switch connected to the port on the Switch youre
accessing) LLDP information.
sysname# show lldp info remote interface port-channel 2
LLDP Remote Device Information Detail:
Local Port:
2
Chassis ID Subtype: mac-address
Chassis ID: 00:19:cb:00:00:02
Port ID Subtype: local-assigned
Port ID:
47
Time To Live:
120
Extended TLV Info 802.1 OUI (hex value) = 00-80-c2
-Port VLAN ID
-ID:
1
-DCBX Application Priority
ether-type: fcoe
Priority:
2
-DCBX ETS Configuration
-Willing Bit: False
-Max Traffic Classes:
3
-Priority-Group 7:
Strict-priority, Priority-list:-Priority-Group 6:
Strict-priority, Priority-list:-Priority-Group 5:
Strict-priority, Priority-list:-Priority-Group 4:
Strict-priority, Priority-list:-Priority-Group 3:
Strict-priority, Priority-list:-Priority-Group 2:
Strict-priority, Priority-list:7
-Priority-Group 1:
ETS Bandwidth 50%, Priority-list:3-6
-Priority-Group 0:
ETS Bandwidth 50%, Priority-list:0-2
-DCBX PFC Configuration
-Willing Bit: True
-PFC capability:
8
-Priority enable list: 0-2
Extended TLV Info 802.3 OUI (hex value) = 00-12-0f
-Max Frame Size
-Frame Size: 1518
-------------------------------------------------sysname#
187
188
LABEL
DESCRIPTION
Local Port
This is the local port number which receives the LLDPDU from the remote
Switch.
Chassis ID Subtype
Chassis ID
Port ID Subtype
Port ID
Time To Live
This displays the time-to-live (TTL) multiplier of LLDP frames. The device
information on the neighboring devices ages out and is discarded when its
corresponding TTL expires. The TTL value is to multiply the TTL multiplier
by the LLDP frames transmitting interval.
Port VLAN ID
DCBX Application
Priority
This TLV displays the priority given to FCoE traffic on the remote Switch.
DCBX ETS
Configuration
This TLV displays the willing bit, ETS capability and traffic class settings
configured by ETS on the remote Switch.
DCBX PFC
Configuration
This TLV displays the willing bit, PFC capability, and enabled priority list
configured by PFC on the remote Switch.
This TLV displays the maximum transmission unit (MTU) sent by the
remote Switch.
C HA PT E R
38
DESCRIPTION
ip load-sharing
13
ip load-sharing <sip|sip-dip>
Sets the criteria the Switch uses to determine the routing path
for a packe.
sip: the Switch uses a hash algorithm to convert a packets
source IP address into a hash value which acts as an index to
a route path.
sip-dip: the Switch uses a hash algorithm to convert a
packets source and destination IP addresses into a hash
value which acts as an index to a route path.
13
13
ip load-sharing discover-time
<0-86400>
13
no ip load-sharing
13
189
190
C HA PT E R
39
Logging Commands
Use these commands to manage system logs.
DESCRIPTION
show logging
clear logging
13
no logging
13
show
Jan
Jan
Jan
Jan
Jan
Jan
Jan
Jan
Jan
Jan
Jan
Jan
logging
1 00:02:08
1 00:03:14
1 00:03:16
1 00:03:16
1 00:03:16
1 00:03:16
1 00:00:13
1 00:00:14
1 00:00:14
1 00:00:14
1 00:00:04
1 00:00:04
1970
1970
1970
1970
1970
1970
1970
1970
1970
1970
1970
1970
PP05 -WARN
INFO
PP0f -WARN
PINI -WARN
PINI -WARN
PINI INFO
PP26 INFO
PP0f -WARN
PINI -WARN
PINI INFO
PP05 -WARN
PP05 -WARN
191
192
C HA PT E R
40
DESCRIPTION
show logins
Creates account with the specified user name and sets the
password and privilege. The privilege level is applied the next
time the user logs in.
name: 1-32 alphanumeric characters.
password: 1-32 alphanumeric characters.
14
Creates account with the specified user name and sets the
cipher password and privilege. This is used for password
encryption. The privilege level is applied the next time the
user logs in.
name: 1-32 alphanumeric characters.
password: 32 alphanumeric characters.
14
14
193
194
C HA PT E R
41
Loopguard Commands
Use these commands to configure the Switch to guard against loops on the edge of your
network. The Switch shuts down a port if the Switch detects that packets sent out on the port
loop back to the Switch.
DESCRIPTION
show loopguard
loopguard
13
no loopguard
13
13
loopguard
13
no loopguard
13
13
clear loopguard
195
Total
Bad
Shutdown
RxPkts
Pkts Time
-------- ---- -----------------0
0
00:00:00 UTC Jan 1 1970
0
0
00:00:00 UTC Jan 1 1970
0
0
00:00:00 UTC Jan 1 1970
0
0
00:00:00 UTC Jan 1 1970
---------------------------------
196
LABEL
DESCRIPTION
LoopGuard Status
Port No
Port Status
LoopGuard Status
Total TxPkts
This field displays the number of packets that have been sent on this port
since loopguard was enabled on the port.
Total RxPkts
This field displays the number of packets that have been received on this
port since loopguard was enabled on the port.
Bad Pkts
This field displays the number of invalid probe packets that were received
on this port.
Shutdown Time
This field displays the last time the port was shut down because a loop
state was detected.
C HA PT E R
42
DESCRIPTION
show mac-aging-time
mac-aging-time <10-1000000>
13
show mac address-table multicast Displays the multicast MAC addresses learned by the Switch. E
mac-flush [<port-num>]
13
mac-transfer dynamic-to-filter
mac <mac-addr>
13
mac-transfer dynamic-to-filter
interface port-channel <portlist>
13
mac-transfer dynamic-to-filter
vlan <vlan-list>
13
mac-transfer dynamic-to-forward
mac <mac-addr>
13
197
DESCRIPTION
mac-transfer dynamic-to-forward
interface port-channel <portlist>
13
mac-transfer dynamic-to-forward
vlan <vlan-list>
13
Type
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
Dynamic
198
LABEL
DESCRIPTION
Port
This is the port from which the above MAC address was learned.
Drop: The entry is created from a filtering rule.
VLAN ID
MAC Address
This is the MAC address of the device from which this frame came.
Type
This shows whether the MAC address is dynamic (learned by the Switch)
or static (manually entered using mac-forward commands, see Chapter
45 on page 203).
C HA PT E R
43
You also need to configure a RADIUS server (see Chapter 62 on page 263).
See also Chapter 27 on page 119 for IEEE 802.1x port authentication commands and Chapter
56 on page 241 for port security commands.
DESCRIPTION
show mac-authentication
mac-authentication
13
mac-authentication nameprefix
<name-string>
13
mac-authentication password
<name-string>
13
13
no mac-authentication
13
199
DESCRIPTION
no mac-authentication timeout
13
13
mac-authentication
13
no mac-authentication
13
200
C HA PT E R
44
Use the running configuration commands to look at the current MAC filter
settings. See Chapter 66 on page 275.
Some models allow you to specify a filter rule and discard all packets with the specified
MAC address (source or destination) and VID.
Other models allow you to choose whether you want to discard traffic originating from the
specified MAC address and VID (src), sent to the specified MAC address (dst) or both.
See Section 44.2 on page 202 and Section 44.3 on page 202 for examples.
DESCRIPTION
mac-filter name <name> mac <mac- Configures a static MAC address port filtering rule.
addr> vlan <vlan-id>
name: 1-32 alphanumeric characters
no mac-filter mac <mac-addr>
vlan <vlan-id>
mac-filter name <name> mac <mac- Disables a static MAC address port filtering rule.
addr> vlan <vlan-id> inactive
name: 1-32 alphanumeric characters
no mac-filter mac <mac-addr>
vlan <vlan-id> inactive
mac-filter name <name> mac <mac- Specifies the source and or destination filter parameters.
addr> vlan <vlan-id> drop
<src|dst|both>
13
13
13
13
13
201
202
C HA PT E R
45
Use the mac commands to look at the current mac-forward settings. See
Chapter 42 on page 197.
DESCRIPTION
name
DESCRIPTION
13
13
13
13
203
204
C HA PT E R
46
Mirror Commands
Use these commands to copy a traffic flow for one or more ports to a monitor port (the port
you copy the traffic to) so that you can examine the traffic on the monitor port without
interference.
Use the running configuration commands to look at the current mirror settings.
See Chapter 66 on page 275.
DESCRIPTION
mirror-port
13
mirror-port <port-num>
13
no mirror-port
13
no mirror-port <port-num>
13
C
Enters config-interface mode for the specified port(s).
port-list: in a modular switch, enter the port number
preceded by a slot number and backslash (/). For example, 3/
11 indicates port 11 on the card in the third slot. Use a comma
(,) to separate individual ports or a desh (-) to indicates a
range of ports. For example, 3/11,4/5 or 3/7-3/9.
13
13
mirror
205
DESCRIPTION
mirror dir
<ingress|egress|both>
13
no mirror
13
DESCRIPTION
13
13
13
13
show mirror
206
This example displays the mirror settings of the Switch after you configured in the example
above.
sysname# show mirror
Mirroring: enable
Monitor port: 3
Mirrored port: 1,4-6
Ingress:
Egress: 1,4-6
Both:
207
208
C HA PT E R
47
MRSTP Commands
Use these commands to configure MRSTP on the Switch.
DESCRIPTION
13
mrstp <tree-index>
13
13
13
13
209
DESCRIPTION
13
13
13
13
13
no mrstp <tree-index>
13
13
In this example, we enable MRSTP on ports 21-24. Port 24 is connected to the host while ports
21-23 are connected to another switch.
sysname(config)#
sysname(config)#
sysname(config)#
sysname(config)#
sysname(config)#
210
configure
spanning-tree mode MRSTP
mrstp 1
mrstp interface 21-24
no mrstp interface 21-23 edge-port
C HA PT E R
48
MSTP Commands
Use these commands to configure Multiple Spanning Tree Protocol (MSTP) as defined in
IEEE 802.1s.
DESCRIPTION
show mstp
13
mstp
13
no mstp
13
13
13
13
13
13
13
211
DESCRIPTION
13
13
13
13
no mstp instance <number> vlan <1-4094> Disables the assignment of specific VLANs from an
MST instance.
mstp instance <number> interface portchannel <port-list>
13
13
13
13
212
DESCRIPTION
BridgeMaxAge
This field displays the maximum time (in seconds) the Switch can wait
without receiving a configuration message before attempting to reconfigure.
BridgeHelloTime
This field displays the time interval (in seconds) at which the Switch
transmits a configuration message.
BridgeForwardDelay
This field displays the time (in seconds) the Switch will wait before
changing states (that is, listening to learning to forwarding).
BridgeMaxHops
This field displays the number of hops (in seconds) in an MSTP region
before the BPDU is discarded and the port information is aged.
TransmissionLimit
This field displays the maximum number of BPDUs that can be transmitted
in the interval specified by BridgeHelloTime.
ForceVersion
This field indicates whether BPDUs are RSTP (a value less than 3) or
MSTP (a value greater than or equal to 3).
MST Configuration ID
Format Selector
This field displays zero, which indicates the use of the fields below.
Configuration Name
This field displays the configuration name for this MST region.
Revision Number
This field displays the revision number for this MST region.
Configuration Digest
msti
vlans mapped
This example shows the current CIST configuration (MSTP instance 0).
sysname# show mstp instance 0
Bridge Info: MSTID: 0
(a)BridgeID:
(b)TimeSinceTopoChange:
(c)TopoChangeCount:
(d)TopoChange:
(e)DesignatedRoot:
(f)RootPathCost:
(g)RootPort:
(h)RootMaxAge:
(i)RootHelloTime:
(j)RootForwardDelay:
(k)BridgeMaxAge:
(l)BridgeHelloTime:
(m)BridgeForwardDelay:
(n)ForceVersion:
(o)TransmissionLimit:
(p)CIST_RRootID:
(q)CIST_RRootPathCost:
8000-001349aefb7a
756003
0
0
8000-001349aefb7a
0
0x0000
20
(seconds)
2
(seconds)
15
(seconds)
20
(seconds)
2
(seconds)
15
(seconds)
mstp
3
8000-001349aefb7a
0
213
214
LABEL
DESCRIPTION
MSTID
BridgeID
This field displays the unique identifier for this bridge, consisting of bridge
priority plus MAC address.
TimeSinceTopoChange
This field displays the time since the spanning tree was last reconfigured.
TopoChangeCount
This field displays the number of times the spanning tree has been
reconfigured.
TopoChange
DesignatedRoot
This field displays the unique identifier for the root bridge, consisting of
bridge priority plus MAC address.
RootPathCost
This field displays the path cost from the root port on this Switch to the root
switch.
RootPort
This field displays the priority and number of the port on the Switch through
which this Switch must communicate with the root of the Spanning Tree.
RootMaxAge
This field displays the maximum time (in seconds) the root switch can wait
without receiving a configuration message before attempting to reconfigure.
RootHelloTime
This field displays the time interval (in seconds) at which the root switch
transmits a configuration message.
RootForwardDelay
This field displays the time (in seconds) the root switch will wait before
changing states (that is, listening to learning to forwarding).
BridgeMaxAge
This field displays the maximum time (in seconds) the Switch can wait
without receiving a configuration message before attempting to reconfigure.
BridgeHelloTime
This field displays the time interval (in seconds) at which the Switch
transmits a configuration message.
BridgeForwardDelay
This field displays the time (in seconds) the Switch will wait before
changing states (that is, listening to learning to forwarding).
ForceVersion
This field indicates whether BPDUs are RSTP (a value less than 3) or
MSTP (a value greater than or equal to 3).
TransmissionLimit
This field displays the maximum number of BPDUs that can be transmitted
in the interval specified by BridgeHelloTime.
CIST_RRootID
This field displays the unique identifier for the CIST regional root bridge,
consisting of bridge priority plus MAC address.
CIST_RRootPathCost
This field displays the path cost from the root port on this Switch to the
CIST regional root switch.
This example adds the Switch to the MST region MSTRegionNorth. MSTRegionNorth is on
revision number 1. In MSTRegionNorth, VLAN 2 is in MST instance 1, and VLAN 3 is in
MST instance 2.
sysname# configure
sysname(config)# mstp
sysname(config)# mstp
sysname(config)# mstp
sysname(config)# mstp
sysname(config)# mstp
sysname(config)# exit
configuration-name MSTRegionNorth
revision 1
instance 1 vlan 2
instance 2 vlan 3
215
216
C HA PT E R
49
DESCRIPTION
show multi-login
multi-login
Enables multi-login.
14
no multi-login
14
DESCRIPTION
index
This field displays a sequential number for this entry. If there is an asterisk
(*) next to the index number, this entry is your session.
session
This field displays the service the administrator used to log in.
remote ip
217
218
C HA PT E R
50
MVR Commands
Use these commands to configure Multicast VLAN Registration (MVR).
DESCRIPTION
show mvr
mvr <vlan-id>
13
8021p-priority <0-7>
13
inactive
13
no inactive
13
mode <dynamic|compatible>
13
name <name>
13
receiver-port <port-list>
13
13
no receiver-port <port-list> Disables the receiver port(s).An MVR receiver port can only
receive multicast traffic in a multicast VLAN.
source-port <port-list>
Sets the source port(s).An MVR source port can send and
receive multicast traffic in a multicast VLAN.
13
no source-port <port-list>
13
tagged <port-list>
13
no tagged <port-list>
13
13
no group
13
no group <name-str>
13
13
no mvr <vlan-id>
219
220
3
name multivlan
source-port 2,3,5
receiver-port 6-8
mode dynamic
group ipgroup start-address 224.0.0.1 end-address
exit
P ART IV
Reference N-S
OSPF Commands (223)
Password Commands (229)
PoE Commands (231)
Policy Commands (235)
Policy Route Commands (239)
Port Security Commands (241)
Port-based VLAN Commands (243)
PPPoE IA Commands (245)
Private VLAN Commands (251)
Protocol-based VLAN Commands (257)
Queuing Commands (259)
RADIUS Commands (263)
Remote Management Commands (265)
RIP Commands (267)
Running Configuration Commands (275)
sFlow (277)
Smart Isolation Commands (279)
SNMP Server Commands (283)
STP and RSTP Commands (287)
SSH Commands (291)
Static Multicast Commands (293)
Static Route Commands (295)
Subnet-based VLAN Commands (299)
221
222
C HA PT E R
51
OSPF Commands
This chapter explains how to use commands to configure the Open Shortest Path First (OSPF)
routing protocol on the Switch.
DESCRIPTION
show ip protocols
13
13
13
ip ospf authentication-same-aa
13
223
DESCRIPTION
ip ospf authentication-same-as-area
13
no ip ospf authentication-same-aa
13
no ip ospf authentication-same-as-area
13
13
13
13
13
13
13
13
area <area-id>
13
no area <area-id>
13
13
13
13
13
13
13
13
13
13
13
13
13
13
224
DESCRIPTION
13
13
13
13
13
13
distance <10-255>
13
13
13
no network <ip-addr/bits>
13
13
redistribute rip
13
no redistribute rip
13
225
DESCRIPTION
13
redistribute static
13
no redistribute static
13
passive-iface <ip-addr/bits>
13
no passive-iface <ip-addr/bits>
13
13
13
13
no router ospf
226
IP: 172.16.1.1
This example enables OSPF on the Switch, sets the router ID to 172.16.1.1, configures an
OSPF area ID as 0.0.0.0 (backbone) and enables simple authentication.
sysname(config)# router ospf 172.16.1.1
sysname(config-ospf)# area 0.0.0.0
sysname(config-ospf)# area 0.0.0.0 authentication
sysname(config-ospf)# area 0.0.0.0 name backbone
sysname(config-ospf)# network 172.16.1.1/24 area 0.0.0.0
sysname# show router ospf area
index:1
active:Y
name:backbone
area-id:0.0.0.0
auth:SIMPLE
stub-active:N stub-no-sum:N
default-cost:15
This example configures an OSPF interface for the 172.16.1.1/24 network and specifies to use
simple authentication with the key 1234abcd. The priority for the Switch is also set to 1, as
this router should participate in router elections.
sysname(config)# interface route-domain 172.16.1.1/24
sysname(config-if)# ip ospf authentication-key abcd1234
sysname(config-if)# ip ospf priority 1
sysname# show ip ospf interface
swif2 is up, line protocol is up
Internet Address 172.16.1.1/24, Area 0.0.0.0
Router ID 172.16.1.1, Network Type BROADCAST, Cost: 15
Transmit Delay is 1 sec, State Waiting, Priority 1
No designated router on this network
No backup designated router on this network
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
Hello due in 00:00:04
Neighbor Count is 0, Adjacent neighbor count is 0
In this example, the Switch (Z) is a redistributor between a RIP network and an OSPF
network. It summarizes 4 routing entries 192.168.8.0/24 ~ 192.168.11.0/24 (learned from RIP
router A) into 192.168.8.0/22 and then sends it to OSPF router B.
Figure 8 OSPF Redistribution Summary Address Example
RIP
A
192.168.8.0/24
192.168.9.0/24
OSPF
IP: 172.16.1.1
Redistributor
192.168.8.0/22
192.168.10.0/24
192.168.11.0/24
227
This example shows you how to enable the redistribution for RIP protocol and then show all
redistribution entries.
sysname# config
sysname(config)# router ospf 172.16.1.1
sysname(config-ospf)# redistribute rip metric-type 1 metric 123
sysname(config-ospf)# exit
sysname(config)# exit
sysname# show ip ospf database
OSPF Router with ID (172.16.1.1)
(Omit not external part K)
AS External Link States
Link ID
192.168.8.0
192.168.9.0
192.168.10.0
192.168.11.0
ADV Router
192.168.2.2
192.168.2.2
192.168.2.2
192.168.2.2
Age Seq#
CkSum Route
618 0x80000001 0x02f6 E1 192.168.8.0/24
618 0x80000001 0xf601 E1 192.168.9.0/24
618 0x80000001 0xeb0b E1 192.168.10.0/24
618 0x80000001 0xe015 E1 192.168.11.0/24
From the example above, the third octet of all the four network IP addresses is 00001000,
00001001, 00001010, 000001011 respectively. The first 4 digits (000010) are the common
part among these IP addresses. So 192.168.8.0/22 can be used to represent all of the 4
networks. The following example shows you how to configure the OSPF summary address
and then show all redistribution entries.
sysname# config
sysname(config)# router ospf 172.16.1.1
sysname(config-ospf)# summary-address 192.168.8.0 255.255.252.0
sysname(config-ospf)# exit
sysname(config)# exit
sysname# show ip ospf database
OSPF Router with ID (172.16.1.1)
(Omit not external part K)
AS External Link States
Link ID
192.168.8.0
228
ADV Router
192.168.2.2
Age Seq#
CkSum Route
6 0x80000001 0xf209 E1 192.168.8.0/22
C HA PT E R
52
Password Commands
Use these commands to configure passwords for specific privilege levels on the Switch.
DESCRIPTION
admin-password <pw-string>
<confirm-string>
14
admin-password <pw-string>
14
14
14
14
14
password encryption
14
no password encryption
14
229
230
C HA PT E R
53
PoE Commands
Use these commands to configure Power over Ethernet (PoE). These are applicable for PoE
models only.
DESCRIPTION
show pwr
show poe-status
13
13
13
pwr mibtrap
13
no pwr mibtrap
13
13
pwr mode
<classification|consumption>
13
231
This example shows the current status and configuration of Power over Ethernet.
GS2200# sh pwr
PoE Mode : Classification mode
Total Power:220.0(W)
Consuming Power:0.0(W)
Allocated Power:0.0 (W)
Remaining Power:220.0(W)
Averaged Junction Temperature: 38 (c), 98 (f).
Port State PD Class Priority Consumption (mW) MaxPower(mW)
---- ------ --- ----- -------- ---------------- -----------1 Enable
off
0
Low
0
0
2 Enable
off
0
Low
0
0
3 Enable
off
0
Low
0
0
4 Enable
off
0
Low
0
0
5 Enable
off
0
Low
0
0
6 Enable
off
0
Low
0
0
7 Enable
off
0
Low
0
0
8 Enable
off
0
Low
0
0
9 Enable
off
0
Low
0
0
10 Enable off
0
Low
0
0
11 Enable off
0
Low
0
0
12 Enable off
0
Low
0
0
13 Enable off
0
Low
0
0
14 Enable off
0
Low
0
0
15 Enable off
0
Low
0
0
16 Enable off
0
Low
0
0
17 Enable off
0
Low
0
0
18 Enable off
0
Low
0
0
19 Enable off
0
Low
0
0
20 Enable off
0
Low
0
0
21 Enable off
0
Low
0
0
22 Enable off
0
Low
0
0
23 Enable off
0
Low
0
0
24 Enable off
0
Low
0
0
232
DESCRIPTION
Averaged Junction
Temperature
Port
State
PD
Class
This field displays the maximum power level at the input of the PoEenabled devices connected to this port. The range of the maximum power
used by the PD is described below.
0: 0.44~12.95 W
1: 0.44~3.84 W
2: 3.84~6.49 W
3: 6.49~12.95 W
Priority
When the total power requested by the PDs exceeds the total PoE power
budget on the Switch, the Switch uses the PD priority to provide power to
ports with higher priority.
Consumption (mW)
This field displays the amount of power the Switch is currently supplying to
the PoE-enabled devices connected to this port.
MaxPower(mW)
This field displays the maximum amount of power the Switch can supply to
the PoE-enabled devices connected to this port.
Total Power
This field displays the total power the Switch can provide to PoE-enabled
devices.
Consuming Power
This field displays the amount of power the Switch is currently supplying to
the PoE-enabled devices.
Allocated Power
This field displays the total amount of power the Switch has reserved for
PoE after negotiating with the PoE device(s).
This field displays the amount of power the Switch can still provide for PoE.
233
234
C HA PT E R
54
Policy Commands
Use these commands to configure policies based on the classification of traffic flows. A
classifier distinguishes traffic into flows based on the configured criteria. A policy rule defines
the treatment of a traffic flow.
DESCRIPTION
show policy
235
DESCRIPTION
13
236
DESCRIPTION
13
no policy <name>
13
Enables a policy.
13
237
This example creates a policy (Policy1) for the traffic flow identified via classifier Class1 (see
the classifier example in Chapter 11 on page 59). This policy forwards Class1 packets to port
8.
sysname(config)# policy Policy1 classifier Class1 egress-port 8 outgoingeport
sysname(config)# exit
sysname# show policy Policy1
Policy Policy1:
Classifiers:
Class1;
Parameters:
VLAN = 1; Priority = 0;
Egress Port = 8;
Bandwidth = 64;
Action:
Send the packet to the egress port;
sysname#
238
C HA PT E R
55
Configure layer-3 classifiers before you configure policy routing. See Chapter
11 on page 59 for more information on classifiers.
DESCRIPTION
show ip policy-route
ip policy-route <name>
13
13
13
no ip policy-route <name>
13
no ip policy-route <name>
inactive
13
no ip policy-route <name>
sequence <number>
13
239
240
C HA PT E R
56
It is not recommended you disable both port security and MAC address
learning because this will result in many broadcasts.
DESCRIPTION
show port-security
port-security
13
no port-security
13
port-security <port-list>
13
no port-security <port-list>
13
13
no port-security <port-list>
learn inactive
13
port-security <port-list>
address-limit <number>
13
13
13
241
DESCRIPTION
no port-security <port-list>
vlan <vlan-id> address-limit
13
13
no port-security <port-list>
vlan <vlan-id> address-limit
inactive
13
242
C HA PT E R
57
DESCRIPTION
vlan-type <802.1q|port-based>
13
13
13
Removes the specified ports from the outgoing traffic port list. C
13
243
244
C HA PT E R
58
PPPoE IA Commands
Use these commands if you want the Switch to add a vendor-specific tag to PADI (PPPoE
Active Discovery Initiation) and PADR (PPPoE Active Discovery Request) packets from
PPPoE clients. This tag gives a PPPoE termination server additional information (such as the
port number, VLAN ID, and MAC address) that the server can use to identify and authenticate
a PPPoE client.
The Switch will drop all PPPoE discovery packets if you enable the PPPoE
intermediate agent and there are no trusted ports.
245
The Switch discards PADO and PADS packets which are sent from a PPPoE server but
received on an untrusted port.
DESCRIPTION
13
13
13
pppoe intermediate-agent
trust
13
pppoe intermediate-agent
format-type circuit-id
string <string>
Specify a string the Switch adds into the Agent Circuit ID sub- C
option for PPPoE discovery packets received on this port.
Spaces are allowed.
string: up to 63 ASCII characters
13
pppoe intermediate-agent
format-type remote-id string
<string>
13
pppoe intermediate-agent
vlan <vlan-id> format-type
circuit-id string <string>
Specify a string the Switch adds into the Agent Circuit ID sub- C
option for PPPoE discovery packets received on this VLAN
on the specified port. Spaces are allowed.
The Circuit ID you configure for a specific VLAN on a port has
the highest priority.
13
pppoe intermediate-agent
vlan <vlan-id> format-type
remote-id string <string>
13
no pppoe intermediate-agent
trust
13
no pppoe intermediate-agent
format-type circuit-id
13
no pppoe intermediate-agent
format-type remote-id
13
no pppoe intermediate-agent
vlan <vlan-id> format-type
circuit-id
13
no pppoe intermediate-agent
vlan <vlan-id> format-type
remote-id
13
no pppoe intermediate-agent
13
13
246
DESCRIPTION
no pppoe intermediate-agent
format-type access-nodeidentifier
13
no pppoe intermediate-agent
format-type identifier-string
13
13
13
pppoe intermediate-agent
13
C 13
vv
13
13
13
13
13
13
13
247
This example is more advanced. It assumes a PPPoE IA client is connected to port 2 and a
PPPoE IA server is connected to port 5. If we want PPPoE IA to work, port 2 and port 5 must
be belong to the some VLAN and the PPPoE IA must be enabled globally and in this
corresponding VLAN. We also need to set port 5 as trust port. Then the last thing we need to
do is to decide which sub-options the received PADI, PADR, or PADT packet needs to carry.
Here, assume both circuit-id and remote-id should be carried.
sysname# configure
sysname(config)# vlan 2
sysname(config-vlan)# fixed 2,5
sysname(config-vlan)# untagged 2,5
sysname(config-vlan)# exit
sysname(config)# pppoe intermediate-agent
sysname(config)# pppoe intermediate-agent vlan 2
sysname(config)# interface port-channel 2
sysname(config-interface)# pvid 2
sysname(config-interface)#exit
sysname(config)# interface port-channel 5
sysname(config-interface)# pvid 2
sysname(config-interface)# pppoe intermediate-agent trust
sysname(config-interface)#exit
sysname(config)# pppoe intermediate-agent vlan 2 circuit-id
sysname(config)# pppoe intermediate-agent vlan 2 remote-id
248
This is a variation of the previous one and uses the same initial setup (client on port 2, server
on port 5).
sysname# configure
sysname(config)# pppoe intermediate-agent
sysname(config)# pppoe intermediate-agent format-type identifier-string
string PrivateTest option spv delimiter /
sysname(config)# pppoe intermediate-agent vlan 1
sysname(config)# pppoe intermediate-agent vlan 1 circuit-id
sysname(config)# pppoe intermediate-agent vlan 1 remote-id
sysname(config)# interface port-channel 5
sysname(config-interface)# pppoe intermediate-agent trust
sysname(config-interface)#exit
Because we didn't assign the appended string for remote-id in examples 1 and 2, the Switch
appends a string to carry the client's MAC address as default. If we want the remote-id to carry
the "ForPortVlanRemoteIdTest" information for a specific VLAN on a port, we can add the
following configuration:
sysname# configure
sysname(config)# interface port-channel 2
sysname(config-interface)# pppoe intermediate-agent vlan 1 format-type
remote-id string ForPortVlanRemoteIdTest
sysname(config-interface)# exit
Similarly, we can let the circuit-id carry the information which we configure:
sysname# configure
sysname(config)# interface port-channel 2
sysname(config-interface)# pppoe intermediate-agent vlan 1 format-type
circuit-id string ForPortVlanCircuitIdTest
sysname(config-interface)# exit
249
Additionally, we can let the circuit-id or remote-id carry the user-configured information from
a specific port whose priority is less than the specific VLAN on a port setting:
sysname# configure
sysname(config)# interface port-channel 2
sysname(config-interface)# pppoe intermediate-agent format-type circuitid string ForPortCircuitIdTest
sysname(config-interface)# pppoe intermediate-agent format-type remoteid string ForPortRemoteIdTest
sysname(config-interface)# exit
Since we didn't assign the appended string for remote-id in example 1 and 2, it will carry the
client's MAC address as default.
250
C HA PT E R
59
10
VLAN 123
Isolated ports: 2 ~ 6
Promiscuous port: 10
If you change the VLAN settings, make sure you keep at least one port in the
promiscuous port list for a VLAN with private VLAN enabled. Otherwise, this
VLAN is blocked from the whole network.
251
DESCRIPTION
no private-vlan <vlan-id>
13
no private-vlan <vlan-id>
inactive
13
13
13
Sets a private VLAN rule for the specified VLAN. The Switch
automatically adds all ports (except the uplink port(s)) in this
VLAN to the isolated port list and blocks traffic between the
isolated ports. The uplink ports in the VLAN are always in the
promiscuous port list.
13
13
show private-vlan
252
This example sets a private VLAN rule (pvlan-111) that applies to VLAN 111. Ports 1, 2 and
24 belong to VLAN 111. Ports 1 and 2 are added to the isolated port list automatically and
cannot communicate with each other. Port 24 is the uplink port and also the promiscuour port
in this VLAN. The isolated ports in VLAN 111 can send and receive traffic from the uplink
port 24. This example also shows all private VLAN rules configured on the Switch.
sysname# configure
sysname(config)# private-vlan name pvlan-111 vlan 111
sysname(config)# exit
sysname# show private-vlan
Private VLAN: 111
Active: Yes
Name
Promiscuous Port
------------ -------------------------pvlan-111 24
sysname#
DESCRIPTION
private-vlan <name>
13
13
private-vlan <primary |
isolated | community>
private-vlan association
<secondary-vlan-list>
253
DESCRIPTION
no private-vlan
13
no private-vlan <primary |
isolated | community>
13
no private-vlan association
13
no private-vlan association
<secondary-vlan-list>
13
13
private-vlan mode
<promiscuous | isolated |
community> association
<vlan-id> dot1q <tagged |
untagged>
13
no private-vlan
13
no private-vlan mode
13
show private-vlan
254
Primary PVLAN 100 is then mapped to port 2 on the Switch and outgoing frames from port 2 will be
tagged
sysname# configure
sysname(config)# vlan 100
sysname(config-vlan)# private-vlan primary
sysname(config-vlan)# exit
sysname(config)# vlan 101
sysname(config-vlan)# private-vlan community
sysname(config-vlan)# exit
sysname(config)# vlan 102
sysname(config-vlan)# private-vlan isolated
sysname(config-vlan)# exit
sysname(config)# vlan 100
sysname(config-vlan)# private-vlan association 101
sysname(config-vlan)# private-vlan association 101,102
sysname(config-vlan)# exit
sysname(config)# exit
sysname# show vlan private-vlan
Private Vlan:
Primary Secondary
Type
Ports
------- --------- ---------- -------------------100
Primary
100
102
Isolated
100
101
Community
sysname#
ysname# configure
sysname(config)# interface port-channel 2
sysname(config-interface)# private-vlan mode promiscuous association 100-->
dot1q tagged
sysname(config-interface)#exit
sysname(config)#
255
256
C HA PT E R
60
Protocol-based VLAN
Commands
Use these commands to configure protocol based VLANs on the Switch.
DESCRIPTION
13
257
DESCRIPTION
13
13
258
C HA PT E R
61
Queuing Commands
Use queuing commands to help solve performance degradation when there is network
congestion.
Some models allow you to select a queuing method on a port-by-port basis. For example,
port 1 can use Strictly Priority Queuing and ports 2-8 can use Weighted Round Robin.
Other models allow you to specify one queuing method for all the ports at once.
Check your Users Guide for queuing algorithms supported by your model.
Strictly Priority Queuing (SPQ) - services queues based on priority only. As traffic
comes into the Switch, traffic on the highest priority queue, Q7 is transmitted first. When
that queue empties, traffic on the next highest-priority queue, Q6 is transmitted until Q6
empties, and then traffic is transmitted on Q5 and so on. If higher priority queues never
empty, then traffic on lower priority queues never gets sent.
Switch models which have only 4 queues, support a limited version of SPQ.
The highest level queue is serviced using SPQ and the remaining queues use
WRR queuing.
259
Weighted Fair Queuing (WFQ)- guarantees each queue's minimum bandwidth based on
its bandwidth weight (portion) when there is traffic congestion. WFQ is activated only
when a port has more traffic than it can handle. Queues with larger weights get more
guaranteed bandwidth than queues with smaller weights. This queuing mechanism is
highly efficient in that it divides any available bandwidth across the different traffic
queues. By default, the weight for Q0 is 1, for Q1 is 2, for Q2 is 3, and so on. Guaranteed
bandwidth is calculated as follows:
Queue Weight
x Port Speed
For example, using the default setting, Q0 on Port 1 gets a guaranteed bandwidth of:
1
1+2+3+4+5+6+7+8
Weighted Round Robin Scheduling (WRR) - services queues on a rotating basis and is
activated only when a port has more traffic than it can handle. A queue is a given an
amount of bandwidth based on the queue weight value. Queues with larger weights get
more service than queues with smaller weights. This queuing mechanism is highly
efficient in that it divides any available bandwidth across the different traffic queues and
returns to queues that have not yet emptied.
Hybrid Mode: WRR & SPQ or WFQ & SPQ - some switch models allow you to
configure higher priority queues to use SPQ and use WRR or WFQ for the lower level
queues.
DESCRIPTION
queue priority <0-7> level <0-7> Sets the IEEE 802.1p priority level-to-physical queue
mapping.
priority <0-7>: IEEE 802.1p defines up to eight separate
traffic types by inserting a tag into a MAC-layer frame that
contains bits to define class of service. Frames without an
explicit priority tag are given the default priority of the ingress
port.
level <0-7>: The Switch has up to 8 physical queues that
you can map to the 8 priority levels. On the Switch, traffic
assigned to higher index queues gets through faster while
traffic in lower index queues is dropped if the network is
congested.
13
13
13
260
DESCRIPTION
13
hybrid-spq lowest-queue
<q0|q1| ... |q7>
13
hybrid-spq <q0|q1|...|q7>
13
no hybrid-spq
13
wrr
13
wfq
13
13
13
weight <wt1> <wt2> ... <wt8> Assigns a weight value to each physical queue on the Switch.
When the Switch is using WRR or WFQ, bandwidth is divided
across different traffic queues according to their weights.
Queues with larger weights get more service than queues
with smaller weights. Weight values range: 1-15.
wrr <wt1> <wt2> ... <wt8>
261
DESCRIPTION
queue priority <0-7> level <0-7> Sets the IEEE 802.1p priority level-to-physical queue
mapping.
priority <0-7>: IEEE 802.1p defines up to eight separate
traffic types by inserting a tag into a MAC-layer frame that
contains bits to define class of service. Frames without an
explicit priority tag are given the default priority of the ingress
port.
level <0-7>: The Switch has up to 7 physical queues that
you can map to the 8 priority levels. On the Switch, traffic
assigned to higher index queues gets through faster while
traffic in lower index queues is dropped if the network is
congested.
13
13
wrr
13
wfq
13
13
This example configures the Switch to use WRR as a queueing method but configures the
Gigabit ports 9-12 to use SPQ for queues 5, 6 and 7.
sysname(config)# wrr
sysname(config)# interface port-channel 9-12
sysname(config-interface)# ge-spq 5
262
C HA PT E R
62
RADIUS Commands
Use these commands to configure external RADIUS (Remote Authentication Dial-In User
Service) servers.
DESCRIPTION
show radius-server
14
14
Specify the amount of time (in seconds) that the Switch waits
for an authentication request response from the RADIUS
server.
In index-priority mode, the timeout is divided by the
number of servers you configure. For example, if you
configure two servers and the timeout is 30 seconds, then the
Switch waits 15 seconds for a response from each server.
14
no radius-server <index>
14
DESCRIPTION
show radius-accounting
13
263
DESCRIPTION
13
no radius-accounting <index>
13
264
C HA PT E R
63
Remote Management
Commands
Use these commands to specify a group of one or more trusted computers from which an
administrator may use one or more services to manage the Switch and to decide what services
you may use to access the Switch.
DESCRIPTION
index
1-4
DESCRIPTION
remote-management <index>
13
no remote-management <index>
13
13
no remote-management <index>
service <[telnet] [ftp] [http]
[icmp] [snmp] [ssh] [https]>
13
DESCRIPTION
show service-control
service-control ftp
13
13
265
DESCRIPTION
no service-control ftp
13
service-control http
13
Specifies the service port for the HTTP service and defines
the timeout period (in minutes).
timeout: 1-255
13
no service-control http
13
service-control https
13
13
no service-control https
13
service-control icmp
13
no service-control icmp
13
service-control snmp
13
no service-control snmp
13
service-control ssh
13
13
no service-control ssh
13
service-control telnet
13
13
no service-control telnet
13
This example disables all SNMP and ICMP access to the Switch.
sysname# configure
sysname(config)# no service-control snmp
sysname(config)# no service-control icmp
sysname(config)# exit
266
C HA PT E R
64
RIP Commands
This chapter explains how to use commands to configure the Routing Information Protocol
(RIP) on the Switch.
DESCRIPTION
show ip protocols
router rip
13
267
DESCRIPTION
13
13
no router rip
13
13
13
distance <10-255>
ip rip direction
<Outgoing|Incoming|Both|None> version
<v1|v2b|v2m>
268
C HA PT E R
65
RMON
DESCRIPTION
Statistics
History
Alarm
Event
DESCRIPTION
event-index
This is an events index number in the event table, between 1 and 65535.
alarm-index
This is an alarms index number in the alarm table, between 1 and 65535.
etherstatsindex
This is an entrys index number in the Ethernet statistics table, between 1 and
65535.
historycontro
l-index
This is an entrys index number in the history control table, between 1 and 65535.
owner
This is a persons name who will handle the event, alarm, historycontrol, or
Ethernet statistics entry.
interface-id
269
Chapter 65 RMON
DESCRIPTION
13
13
13
13
13
13
13
13
270
Chapter 65 RMON
where
1-65535
variable
This is the variable(s) whose data is sampled. The allowed options are:
[ifType.<port>]
[ifMtu.<port>]
[ifSpeed.<port>]
[ifAdminStatus.<port>]
[ifOperStatus.<port>]
[ifLastChange.<port>]
[ifInOctets.<port>]
[ifInUcastPkts.<port>]
[ifInNUcastPkts.<port>]
[ifInDiscards.<port>]
[ifInErrors.<port>]
[ifInUnknownProtos.<port>]
[ifOutOctets.<port>]
[ifOutUcastPkts.<port>]
[ifOutNUcastPkts.<port>]
[ifOutDiscards.<port>]
[ifOutErrors.<port>]
[ifOutQLen.<port>]
[sysMgmtCPUUsage.<index>]
[sysMemoryPoolUtil.<index>]
[<OID>]
271
Chapter 65 RMON
interval
-integer
absolute
|delta
This is the method of obtaining the sample value and calculating the value to be
compared against the thresholds.
absolute - the sampling value of the selected variable will be compared directly
with the thresholds.
delta - the last sampling value of the selected variable will be subtracted from
the current sampling value first. Then use the difference to compare with the
thresholds.
startupalarm
Specify when the Switch should generate an alarm regarding to the rising and/or
falling thresholds.
risingAlarm - the Switch generates an alarm if the sampling value (or
calculated value) is greater than or equal to the rising threshold.
fallingAlarm - the Switch generates an alarm if the sampling value (or
calculated value) is less than or equal to the falling threshold.
risingOrFallingAlarm - the Switch generates an alarm either when the
sampling value (or calculated value) is greater than or equal to the rising
threshold or when the sampling value (or calculated value) is less than or equal to
the falling threshold.
risinginteger
Specify an integer for the rising threshold. When a value that is greater or equal to
this threshold, the Switch generates an alarm.
risingeventindex
Specify an events index number (between 0 and 65535). The Switch will take the
corresponding action of the selected event for the rising alarm. Set this to 0 if you do
not want to take any action for the alarm.
fallinginteger
Specify an integer for the falling threshold. When a value that is smaller or equal to
this threshold, the Switch generates an alarm.
fallingeventindex
Specify an events index number (between 0 and 65535). The Switch will take the
corresponding action of the selected event for the falling alarm. Set this to 0 if you do
not want to take any action for the alarm.
owner
This example shows you how to configure an alarm using the following settings:
272
Chapter 65 RMON
273
Chapter 65 RMON
This example also shows how to display the data collection results.
ras# config
ras(config)# rmon history historycontrol 1 buckets 10 interval 10 portchannel 12
ras(config)# exit
ras# show rmon history historycontrol index 1
History control 1 owned by is valid
Monitors interface port-channel 12 every 10 sec.
historyControlBucketsRequested: 10
historyControlBucketsGranted: 10
Monitored history 1:
Monitored at 0 days 00h:08m:59s
etherHistoryIntervalStart: 539
etherHistoryDropEvents: 0
etherHistoryOctets: 667217
etherHistoryPkts: 7697
etherHistoryBroadcastPkts: 5952
etherHistoryMulticastPkts: 505
etherHistoryCRCAlignErrors: 2
etherHistoryUndersizePkts: 0
etherHistoryOversizePkts: 0
etherHistoryFragments: 0
etherHistoryJabbers: 0
etherHistoryCollisions: 0
etherHistoryUtilization: 72
Monitored history 2:
Monitored at 0 days 00h:09m:08s
etherHistoryIntervalStart: 548
etherHistoryDropEvents: 0
etherHistoryOctets: 673408
etherHistoryPkts: 7759
etherHistoryBroadcastPkts: 5978
etherHistoryMulticastPkts: 519
etherHistoryCRCAlignErrors: 2
etherHistoryUndersizePkts: 0
etherHistoryOversizePkts: 0
etherHistoryFragments: 0
etherHistoryJabbers: 0
etherHistoryCollisions: 0
etherHistoryUtilization: 0
ras#
274
C HA PT E R
66
Running Configuration
Commands
Use these commands to back up and restore configuration and firmware.
DESCRIPTION
attribute
275
DESCRIPTION
13
13
13
13
erase running-config
13
13
13
sync running-config
13
This example copies all attributes of port 1 to port 2 and copies selected attributes (active,
bandwidth limit and STP settings) from port 1 to ports 5-8
sysname# copy running-config interface port-channel 1 2
sysname# copy running-config interface port-channel 1 5-8 active
bandwidth-limit spanning-tree
276
C HA PT E R
67
sFlow
This chapter shows you how to configure sFlow to have the Switch monitor traffic in a
network and send information to an sFlow collector for analysis.
DESCRIPTION
13
no sflow
13
13
sflow
13
13
13
no sflow
277
Chapter 67 sFlow
DESCRIPTION
13
sflow
13
13
show sflow
278
Poll-interval
------------120
120
120
120
120
120
120
Collector Address
----------------10.1.1.58
10.1.1.58
10.1.1.58
10.1.1.58
0.0.0.0
0.0.0.0
0.0.0.0
C HA PT E R
68
B
Isolated ports: 2~6
Root port: 7
Designated port: 8
C
Smart isolation allows you to prevent isolated ports on different switches from transmitting
traffic to each other. After you enable RSTP/MRSTP and smart isolation on the Switch, the
designated port(s) will be added to the isolated port list. In the following example, switch A is
the root bridge. Switch Bs root port 7 connects to switch A and switch Bs designated port 8
279
connects to switch C. Traffic from isolated ports on switch B can only be sent through nonisolated port 1 or root port 7 to switch A. This prevents isolated ports on switch B sending
traffic through designated port 8 to switch C. Traffic received on designated port 8 from
switch C will not be forwarded to any other isolated ports on switch B.
You should enable RSTP or MRSTP before you can use smart isolation on the Switch. If the
network topology changes, the Switch automatically updates the isolated port list with the
latest designated port information.
The uplink port connected to the Internet should be the root port. Otherwise,
with smart isolation enabled, the isolated ports cannot access the Internet.
DESCRIPTION
no smart-isolation
13
show smart-isolation
smart-isolation
13
280
DESCRIPTION
Port isolation
This section is available only when you have configured port isolation on
the Switch.
The following fields display the port isolation information before and after
smart isolation is enabled.
original isolated ports This field displays the isolated port list before smart isolation is enabled.
smart isolated ports
Private VLAN
This field displays the isolated port list after smart isolation is enabled.
This section is available only when you have configured private VLAN on
the Switch.
The following fields display the private VLAN information before and after
smart isolation is enabled.
281
282
DESCRIPTION
Original VLAN
This section displays the VLAN ID and isolated and promiscuous port list
before smart isolation is enabled
This section displays the VLAN ID and isolated and promiscuous port list
after smart isolation is enabled
C HA PT E R
69
DESCRIPTION
property
options
DESCRIPTION
show snmp-server
13
snmp-server version
<v2c|v3|v3v2c>
13
snmp-server get-community
<property>
13
snmp-server set-community
<property>
13
snmp-server trap-community
<property>
13
283
DESCRIPTION
snmp-server trap-destination
<ip> [udp-port <socket-number>]
[version <v1|v2c|v3>] [username
<name>]
13
no snmp-server trap-destination
<ip>
13
14
14
DESCRIPTION
snmp-server trap-destination
<ip> enable traps
13
no snmp-server trap-destination
<ip> enable traps
13
snmp-server trap-destination
<ip> enable traps aaa
13
no snmp-server trap-destination
<ip> enable traps aaa
13
snmp-server trap-destination
<ip> enable traps aaa <options>
13
284
DESCRIPTION
no snmp-server trap-destination
<ip> enable traps aaa <options>
13
snmp-server trap-destination
<ip> enable traps interface
13
no snmp-server trap-destination
<ip> enable traps interface
13
snmp-server trap-destination
<ip> enable traps interface
<options>
13
no snmp-server trap-destination
<ip> enable traps interface
<options>
13
snmp-server trap-destination
<ip> enable traps ip
13
no snmp-server trap-destination
<ip> enable traps ip
13
snmp-server trap-destination
<ip> enable traps ip <options>
13
no snmp-server trap-destination
<ip> enable traps ip <options>
13
snmp-server trap-destination
<ip> enable traps switch
13
no snmp-server trap-destination
<ip> enable traps switch
13
snmp-server trap-destination
<ip> enable traps switch
<options>
13
no snmp-server trap-destination
<ip> enable traps switch
<options>
13
snmp-server trap-destination
<ip> enable traps system
13
no snmp-server trap-destination
<ip> enable traps system
13
snmp-server trap-destination
<ip> enable traps system
<options>
13
no snmp-server trap-destination
<ip> enable traps system
<options>
13
285
v2c
public
public
public
[ Trap Destination ]
Index
Version
IP
---------------------1
v2c
0.0.0.0
2
v2c
0.0.0.0
3
v2c
0.0.0.0
4
v2c
0.0.0.0
Port
---162
162
162
162
Username
--------
This example shows you how to display all SNMP user information on the Switch.
sysname# show snmp-server user
[ User Information ]
Index
Name
SecurityLevel
---------- ------------1
admin
noauth
286
GroupName
-------------admin
C HA PT E R
70
DESCRIPTION
spanning-tree mode
<RSTP|MRSTP|MSTP>
13
spanning-tree
13
no spanning-tree
13
13
spanning-tree priority <0-61440> Sets the bridge priority of the Switch. The lower the numeric
value you assign, the higher the priority for this bridge.
priority: Must be a multiple of 4096.
13
spanning-tree <port-list>
13
no spanning-tree <port-list>
13
287
DESCRIPTION
Sets the specified ports as edge ports. This allows the port to
transition to a forwarding state immediately without having to
go through the listening and learning states.
13
13
13
spanning-tree <port-list>
priority <0-255>
Sets the priority for the specified ports. Priority decides which
port should be disabled when more than one port forms a
loop in a Switch. Ports with a higher priority numeric value are
disabled first.
13
spanning-tree help
13
sysname(config)#
sysname(config)#
sysname(config)#
--> 15
sysname(config)#
sysname(config)#
288
spanning-tree
spanning-tree priority 0
spanning-tree hello-time 4 maximum-age 20 forward-delay
spanning-tree 5 path-cost 150
spanning-tree 5 priority 20
DESCRIPTION
BridgeID
This field displays the unique identifier for this bridge, consisting of bridge
priority plus MAC address.
TimeSinceTopoChange
This field displays the time since the spanning tree was last reconfigured.
TopoChangeCount
This field displays the number of times the spanning tree has been
reconfigured.
TopoChange
DesignatedRoot
This field displays the unique identifier for the root bridge, consisting of
bridge priority plus MAC address.
RootPathCost
This field displays the path cost from the root port on this Switch to the root
switch.
RootPort
This field displays the priority and number of the port on the Switch through
which this Switch must communicate with the root of the Spanning Tree.
MaxAge
This field displays the maximum time (in seconds) the root switch can wait
without receiving a configuration message before attempting to reconfigure.
HelloTime
This field displays the time interval (in seconds) at which the root switch
transmits a configuration message.
ForwardDelay
This field displays the time (in seconds) the root switch will wait before
changing states (that is, listening to learning to forwarding).
BridgeMaxAge
This field displays the maximum time (in seconds) the Switch can wait
without receiving a configuration message before attempting to reconfigure.
BridgeHelloTime
This field displays the time interval (in seconds) at which the Switch
transmits a configuration message.
BridgeForwardDelay
This field displays the time (in seconds) the Switch will wait before
changing states (that is, listening to learning to forwarding).
289
DESCRIPTION
TransmissionLimit
This field displays the maximum number of BPDUs that can be transmitted
in the interval specified by BridgeHelloTime.
ForceVersion
This field indicates whether BPDUs are RSTP (a value less than 3) or
MSTP (a value greater than or equal to 3).
In this example, we enable RSTP on ports 21-24. Port 24 is connected to the host while ports
21-23 are connected to another switch
sysname(config)#
sysname(config)#
sysname(config)#
sysname(config)#
290
configure
spanning-tree
spanning-tree 21-24
no spanning-tree 21-23 edge-port
C HA PT E R
71
SSH Commands
Use these commands to configure SSH on the Switch.
DESCRIPTION
show ssh
13
Removes the specified remote hosts from the list of all known
hosts.
13
13
13
291
Port Local IP
Port
Bytes In
DESCRIPTION
Configuration
292
Version
This field displays the SSH versions and related protocols the Switch
supports.
Server
Port
This field displays the port number the SSH server uses.
This field displays the number of bits in the Switchs host key.
This field displays the number of bits in the SSH servers public key.
Support authentication
This field displays the authentication methods the SSH server supports.
Support ciphers
This field displays the encryption methods the SSH server supports.
Support MACs
This field displays the message digest algorithms the SSH server supports.
Compression levels
This field displays the compression levels the SSH server supports.
Sessions
Proto
This field displays the SSH protocol (SSH-1 or SSH-2) used in this session.
Serv
This field displays the type of SSH state machine (SFTP or SSH) in this
session.
Remote IP
Port
This field displays the port number the SSH client is using.
Local IP
Port
This field displays the port number the SSH server is using.
Bytes In
This field displays the number of bytes the SSH server has received from
the SSH client.
Bytes Out
This field displays the number of bytes the SSH server has sent to the SSH
client.
C HA PT E R
72
DESCRIPTION
show mac address-table multicast Displays the multicast MAC address table.
multicast-forward name <name>
mac <mac-addr> vlan <vlan-id>
inactive
13
13
13
13
293
This example removes a static multicast forwarding rule with multicast MAC address
(01:00:5e:06:01:46) which belongs to VLAN 1.
sysname# no multicast-forward mac 01:00:5e:06:01:46 vlan 1
This example creates a static multicast forwarding rule. The rule forwards frames with
destination MAC address 01:00:5e:00:00:06 to ports 10~12 in VLAN 1.
sysname# configure
sysname(config)# multicast-forward name AAA mac 01:00:5e:00:00:06 vlan 1
interface port-channel 10-12
294
C HA PT E R
73
DESCRIPTION
show ip route
13
13
13
13
13
295
Gateway
172.16.37.206
127.0.0.1
172.16.37.254
swp00
swp00
swp00
1
1
1
041b 0
041b 0
801b 0
Use
1494
0
12411
DESCRIPTION
Dest
This field displays the destination network number. Along with Len, this
field defines the range of destination IP addresses to which this entry
applies.
FF
Len
This field displays the destination subnet mask. Along with Dest, this field
defines the range of destination IP addresses to which this entry applies.
Device
Gateway
This field displays the IP address to which the Switch forwards packets
whose destination IP address is in the range defined by Dest and Len.
Metric
stat
Timer
This field displays the number of remaining seconds this entry remains
valid. It displays 0 if the entry is always valid.
Use
This field displays the number of times this entry has been used to forward
packets.
In this routing table, you can create an active static route if the <next-hop-ip> is in
172.16.37.0/24 or 127.0.0.0/16. You cannot create an active static route to other IP addresses.
For example, you cannot create an active static route that routes traffic for 192.168.10.1/24 to
192.168.1.1.
sysname# configure
sysname(config)# ip route 192.168.10.1 255.255.255.0 192.168.1.1
Error : The Action is failed. Please re-configure setting.
296
You can create an active static route that routes traffic for 192.168.10.1/24 to 172.16.37.254.
sysname# configure
sysname(config)# ip route 192.168.10.1 255.255.255.0 172.16.37.254
sysname(config)# exit
sysname# show ip route static
Idx Active Name
Dest. Addr.
Subnet Mask
Gateway Addr.
Metric
01
Y
static
192.168.10.1
255.255.255.0
172.16.37.254
297
298
C HA PT E R
74
DESCRIPTION
show subnet-vlan
subnet-based-vlan
13
subnet-based-vlan dhcp-vlanoverride
13
13
13
13
no subnet-based-vlan
13
299
DESCRIPTION
no subnet-based-vlan source-ip
<ip> mask-bits <mask-bits>
13
no subnet-based-vlan dhcp-vlanoverride
13
300
Mask-Bits
--------24
Vlan
---200
Priority
-------6
Entry Active
-----------1
C HA PT E R
75
Syslog Commands
Use these commands to configure the devices system logging settings and to configure the
external syslog servers.
DESCRIPTION
type
DESCRIPTION
syslog
13
no syslog
13
DESCRIPTION
13
13
13
13
DESCRIPTION
13
13
13
301
302
P ART V
Reference T-Z
TACACS+ Commands (305)
TFTP Commands (307)
Trunk Commands (309)
trTCM Commands (313)
VLAN Commands (317)
VLAN IP Commands (323)
VLAN Mapping Commands (325)
VLAN Port Isolation Commands (327)
VLAN Stacking Commands (329)
VLAN Trunking Commands (333)
VRRP Commands (335)
Additional Commands (339)
303
304
C HA PT E R
76
TACACS+ Commands
Use these commands to configure external TACACS+ (Terminal Access Controller AccessControl System Plus) servers.
DESCRIPTION
show tacacs-server
14
14
14
no tacacs-server <index>
14
DESCRIPTION
show tacacs-accounting
13
13
no tacacs-accounting <index>
13
305
306
C HA PT E R
77
TFTP Commands
Use these commands to back up and restore configuration and firmware via TFTP.
DESCRIPTION
13
13
13
13
307
308
C HA PT E R
78
Trunk Commands
Use these commands to logically aggregate physical links to form one logical, higherbandwidth link. The Switch adheres to the IEEE 802.3ad standard for static and dynamic
(Link Aggregate Control Protocol, LACP) port trunking.
Different models support different numbers of trunks (T1, T2, ...). This chapter
uses a model that supports six trunks (from T1 to T6).
DESCRIPTION
show trunk
trunk <T1|T2|T3|T4|T5|T6>
13
no trunk <T1|T2|T3|T4|T5|T6>
13
trunk <T1|T2|T3|T4|T5|T6>
criteria <src-mac|dst-mac|srcdst-mac|src-ip|dst-ip|src-dstip>
Sets the traffic distribution type used for the specified trunk
group.
13
no trunk <T1|T2|T3|T4|T5|T6>
criteria
13
trunk <T1|T2|T3|T4|T5|T6>
interface <port-list>
13
no trunk <T1|T2|T3|T4|T5|T6>
interface <port-list>
13
13
no trunk <T1|T2|T3|T4|T5|T6>
lacp
13
13
309
DESCRIPTION
show lacp
lacp
13
no lacp
13
13
This example disables trunk one (T1) and removes ports 1, 3, 4, and 5 from trunk two (T2).
sysname(config)# no trunk T1
sysname(config)# no trunk T2 interface 1,3-5
310
LABEL
DESCRIPTION
Group ID
This field displays the trunk ID number and the current status.
inactive: This trunk is disabled.
active: This trunk is enabled.
Status
This field displays how the ports were added to the trunk.
-: The trunk is disabled.
Static: The ports are static members of the trunk.
LACP: The ports joined the trunk via LACP.
DESCRIPTION
Member Number
Member
DESCRIPTION
ID
This field displays the trunk ID to identify a trunk group, that is, one logical
link containing multiple ports.
[(0000,00-00-00-00-0000,0000,00,0000)]
This field displays the system priority, MAC address, key, port priority, and
port number.
LINKS
In some switches this displays the ports whose link state are up.
In other switches this displays the ports which belong to this trunk group.
SYNCS
These are the ports that are currently transmitting data as one logical link in
this trunk group.
311
312
C HA PT E R
79
trTCM Commands
This chapter explains how to use commands to configure the Two Rate Three Color Marker
(trTCM) feature on the Switch.
DESCRIPTION
trtcm
13
13
no trtcm
13
13
13
13
13
trtcm
313
DESCRIPTION
no trtcm
13
13
13
13
13
13
13
13
Sets the Switch to inspect the DSCP value of packets (color-aware mode).
Enables trTCM on ports 1-5.
Sets the Committed Information Rate (CIR) to 4000 Kbps.
Sets the Peak Information Rate (PIR) to 4500 Kbps.
Specifies DSCP value 7 for green packets, 22 for yellow packets and 44 for red packets.
sysname(config)# trtcm
sysname(config)# trtcm mode color-aware
sysname(config)# interface port-channel 1-5
sysname(config-interface)# trtcm
sysname(config-interface)# trtcm cir 4000
sysname(config-interface)# trtcm pir 4500
sysname(config-interface)# trtcm dscp green 7
sysname(config-interface)# trtcm dscp yellow 22
sysname(config-interface)# trtcm dscp red 44
sysname(config-interface)# exit
sysname(config)# exit
sysname# show running-config interface port-channel 1 trtcm
Building configuration...
Current configuration:
interface port-channel 1
trtcm
trtcm cir 4000
trtcm pir 4500
trtcm dscp green 7
trtcm dscp yellow 22
trtcm dscp red 44
exit
314
This examples activates trTCM on the Switch with the following settings :
sysname# config
sysname(config)# trtcm
sysname(config)# diffserv
sysname(config)# trtcm mode color-aware
sysname(config)# trtcm dscp profile abc dscp green 1 yellow 2 red 3
sysname(config)# interface port-channel 1
sysname(config-interface)# trtcm
sysname(config-interface)# diffserv
sysname(config-interface)# trtcm dscp profile abc
sysname(config-interface)# trtcm cir 4000
sysname(config-interface)# trtcm pir 4500
sysname(config-interface)# exit
sysname(config)# exit
sysname # show running-config
Building configuration...
Current configuration:
vlan 1
name 1
normal ""
fixed 1-28
forbidden ""
untagged 1-28
ip address default-management 192.168.1.1 255.255.255.0
exit
trtcm
trtcm mode color-aware
trtcm dscp profile abc dscp green 1 yellow 2 red 3
interface port-channel 1
diffserv
trtcm
trtcm cir 4000
trtcm pir 4500
trtcm dscp profile abc
exit
diffserv
sysname #
315
316
C HA PT E R
80
VLAN Commands
Use these commands to configure IEEE 802.1Q VLAN.
317
DESCRIPTION
show vlan
vlan-type <802.1q|port-based>
13
vlan <vlan-id>
13
fixed <port-list>
13
no fixed <port-list>
13
forbidden <port-list>
13
no forbidden <port-list>
13
inactive
13
no inactive
13
name <name>
13
normal <port-list>
13
untagged <port-list>
Specifies the port(s) you dont want to tag all outgoing frames
transmitted with this VLAN Group ID.
13
no untagged <port-list>
13
Deletes a VLAN.
13
no vlan <vlan-id>
The following section lists the commands for the ingress checking feature
318
Some models enable or disable VLAN ingress checking on all the ports via the vlan1q
ingress-check command.
Other models enable or disable VLAN ingress checking on each port individually via the
ingress-check command in the config-interface mode.
Table 186 vlan1q ingress-check Command Summary
COMMAND
DESCRIPTION
vlan1q ingress-check
13
no vlan1q ingress-check
13
DESCRIPTION
13
ingress-check
13
no ingress-check
13
100
Static
0:00:17
Untagged :
Tagged
:1-4
200
Static
0:00:07
Untagged :1-2
Tagged
:3-8
319
DESCRIPTION
Idx.
VID
Status
This field displays how this VLAN was added to the Switch.
Dynamic: The VLAN was added via GVRP.
Static: The VLAN was added as a permanent entry
Other: The VLAN was added in another way, such as Multicast VLAN
Registration (MVR).
Elap-Time
This field displays how long it has been since a dynamic VLAN was
registered or a static VLAN was set up.
TagCtl
320
:1
:0.0
:2
:0
:2
:0
:2
:0
:0
:0
:0
:0
:0
:1
:0.384
:10
:0
:10
:0
:10
:0
:0
:0
:0
:0
:0
DESCRIPTION
System up time
This field shows the total amount of time the connection has been up.
VLAN Info
Packet
KBs/s
This field shows the number kilobytes per second flowing through this
VLAN.
Packets
This field shows the number of good packets (unicast, multicast and
broadcast) flowing through this VLAN.
Multicast
This field shows the number of good multicast packets flowing through this
VLAN.
Broadcast
This field shows the number of good broadcast packets flowing through this
VLAN.
Tagged
This field shows the number of VLAN-tagged packets flowing through this
VLAN.
Distribution
321
322
DESCRIPTION
64
This field shows the number of packets (including bad packets) received
that were 64 octets in length.
65-127
This field shows the number of packets (including bad packets) received
that were between 65 and 127 octets in length.
128-255
This field shows the number of packets (including bad packets) received
that were between 128 and 255 octets in length.
256-511
This field shows the number of packets (including bad packets) received
that were between 256 and 511 octets in length.
512-1023
This field shows the number of packets (including bad packets) received
that were between 512 and 1023 octets in length.
1024-1518
This field shows the number of packets (including bad packets) received
that were between 1024 and 1518 octets in length.
Giant
This field shows the number of packets (including bad packets) received
that were between 1519 octets and the maximum frame size.
The maximum frame size varies depending on your switch model. See
Product Specification chapter in your User's Guide.
C HA PT E R
81
VLAN IP Commands
Use these commands to configure the default gateway device and add IP domains for VLAN.
DESCRIPTION
vlan <1-4094>
13
13
13
13
13
13
ip address <ip-address>
<mask>
13
ip address <ip-address>
<mask> manageable
13
no ip address <ip-address>
<mask>
13
323
DESCRIPTION
ip address default-gateway
<ip-address>
13
no ip address defaultgateway
13
324
C HA PT E R
82
You can not enable VLAN mapping and VLAN stacking at the same time.
DESCRIPTION
no vlan-mapping
13
13
13
vlan-mapping
13
13
13
13
vlan-mapping
13
no vlan-mapping
13
325
326
C HA PT E R
83
DESCRIPTION
vlan1q port-isolation
13
no vlan1q port-isolation
13
13
no vlan1q port-isolation
13
vlan1q port-isolation
13
327
328
C HA PT E R
84
DESCRIPTION
13
13
13
13
13
no vlan-stacking
13
no vlan-stacking selective-qinq
interface port-channel <port>
cvid <vlan-id>
13
no vlan-stacking selective-qinq
interface port-channel <port>
cvid <vlan-id> inactive
13
show vlan-stacking
vlan-stacking
13
vlan-stacking priority <0-7> Sets the priority of the specified port(s) in port-based VLAN
stacking.
vlan-stacking role
<normal|access|tunnel>
329
DESCRIPTION
vlan-stacking <sptpid>
13
vlan-stacking selective-qinq
name <name> interface portchannel <port> cvid <cvid> spvid
<spvid> priority <0-7>
13
vlan-stacking selective-qinq
name <name> interface portchannel <port> cvid <cvid> spvid
<spvid> priority <0-7> inactive
13
VLAN 24
Customer A
Customer A
SPN
x
A: 37, 24
B: 48, 24
VLAN 24
Customer B
330
VLAN 24
Customer B
This example shows how to configure ports 1 and 2 on the Switch to tag incoming frames with
the service providers VID of 37 (ports are connected to customer A network). This example
also shows how to set the priority for ports 1 and 2 to 3.
sysname(config)# vlan-stacking
sysname(config)# interface port-channel 1-2
sysname(config-interface)# vlan-stacking role access
sysname(config-interface)# vlan-stacking spvid 37
sysname(config-interface)# vlan-stacking priority 3
sysname(config-interface)# exit
sysname(config)# exit
sysname# show vlan-stacking
Switch Vlan Stacking Configuration
Operation: active
STPID: 0x8100
Port
01
02
03
04
05
06
07
08
....
Role
access
access
access
access
access
access
access
access
SPVID
37
37
1
1
1
1
1
1
Priority
3
3
0
0
0
0
0
0
331
332
C HA PT E R
85
DESCRIPTION
13
vlan-trunking
13
no vlan-trunking
13
333
334
C HA PT E R
86
VRRP Commands
This chapter explains how to use commands to configure the Virtual Router Redundancy
Protocol (VRRP) on the Switch.
DESCRIPTION
13
name <name>
13
priority <1~254>
13
interval <1~255>
13
primary-virtual-ip <ip-address>
13
no primary-virtual-ip <ip-address>
13
secondary-virtual-ip <ip-address>
13
no secondary-virtual-ip
13
no primary-virtual-ip
13
inactive
13
no inactive
13
335
DESCRIPTION
no preempt
13
preempt
13
exit
13
13
13
13
13
X
Ethernet
Default Gateway
10.10.1.254
172.16.1.1
PVID = 200
VRID = 1
172.16.1.200
VR1
10.10.1.254
B
PVID = 200
172.16.1.10
10.10.1.253
Priority = 100
PVID = 100
336
This example shows how to create the IP routing domains and configure the Switch to act as
router A in the topology shown in Figure 11 on page 336.
sysname# config
sysname(config)# vlan 100
sysname(config-vlan)# fixed 1-4
sysname(config-vlan)# untagged 1-4
sysname(config-vlan)# ip address 10.10.1.252 255.255.255.0
sysname(config-vlan)# exit
sysname(config) interface port-channel 1-4
sysname(config-interface)# pvid 100
sysname(config-interface)# exit
sysname(config)# vlan 200
sysname(config-vlan)# fixed 24-28
sysname(config-vlan)# untagged 24-28
sysname(config-vlan)# ip address 172.16.1.1 255.255.255.0
sysname(config-vlan)# exit
sysname(config)# interface port-channel 24-28
sysname(config-interface)# pvid 200
sysname(config-interface)# exit
sysname(config)# router vrrp network 10.10.1.252/24 vr-id 1 uplink-gateway
172.16.1.200
sysname(config-vrrp)# name VRRP-networkA
sysname(config-vrrp)# priority 200
sysname(config-vrrp)# interval 2
sysname(config-vrrp)# primary-virtual-ip 10.10.1.254
sysname(config-vrrp)# exit
sysname(config)#
337
This example shows how to create the IP routing domains and configure the Switch to act as
router B in the topology shown in Figure 11 on page 336.
sysname# config
sysname(config)# vlan 100
sysname(config-vlan)# fixed 1-4
sysname(config-vlan)# untagged 1-4
sysname(config-vlan)# ip address 10.10.1.253 255.255.255.0
sysname(config-vlan)# exit
sysname(config) interface port-channel 1-4
sysname(config-interface)# pvid 100
sysname(config-interface)# exit
sysname(config)# vlan 200
sysname(config-vlan)# fixed 24-28
sysname(config-vlan)# untagged 24-28
sysname(config-vlan)# ip address 172.16.1.10 255.255.255.0
sysname(config-vlan)# exit
sysname(config)# interface port-channel 24-28
sysname(config-interface)# pvid 200
sysname(config-interface)# exit
sysname(config)# router vrrp network 10.10.1.253/24 vr-id 1 uplink-gateway
172.16.1.200
sysname(config-vrrp)# name VRRP-networkB
sysname(config-vrrp)# interval 2
sysname(config-vrrp)# primary-virtual-ip 10.10.1.254
sysname(config-vrrp)# exit
sysname(config)#
338
C HA PT E R
87
Additional Commands
Use these commands to configure or perform additional features on the Switch.
DESCRIPTION
enable
enable <0-14>
disable
13
configure
13
13
mvr <1-4094>
13
vlan <1-4094>
13
exit
13
logout
DESCRIPTION
baudrate <1|2|3|4|5>
13
13
339
<1|2>
cable-diagnostics <port-list>
DESCRIPTION
13
13
ping <ip|host-name> [vlan <vlan- Sends Ping packets to the specified Ethernet device.
id>] [size <0-1472>] [-t]
vlan-id: Specifies the VLAN ID to which the Ethernet
device belongs.
size <0-1472>: Specifies the size of the Ping packet.
-t: Sends Ping packets to the Ethernet device indefinitely.
Press [CTRL]+C to terminate the Ping process.
ping help
13
Restarts the card in the selected slot. The card restarts using
the last-saved configuration. Any unsaved changes are lost.
13
show al1arm-status
show cpu-utilization
show memory
show power-source-status
show slot
13
13
13
show system-information
13
340
DESCRIPTION
traceroute help
13
DESCRIPTION
bcp-transparency
13
default-management <inband|out-of-band>
13
hostname <name>
13
install help
13
13
13
mode zynos
13
13
13
13
341
This example sends Ping requests to an Ethernet device with IP address 172.16.37.254.
sysname# ping 172.16.37.254
Resolving 172.16.37.254... 172.16.37.254
sent rcvd rate
rtt
avg
mdev
1
1 100
0
0
0
2
2 100
0
0
0
3
3 100
10
1
3
max
0
0
10
min
0
0
0
reply from
172.16.37.254
172.16.37.254
172.16.37.254
DESCRIPTION
sent
This field displays the sequence number of the ICMP request the Switch
sent.
rcvd
This field displays the sequence number of the ICMP response the Switch
received.
rate
This field displays the percentage of ICMP responses for ICMP requests.
rtt
avg
This field displays the average round trip time to ping the specified IP
address.
mdev
This field displays the standard deviation in the round trip time to ping the
specified IP address.
max
This field displays the maximum round trip time to ping the specified IP
address.
min
This field displays the minimum round trip time to ping the specified IP
address.
reply from
This field displays the IP address from which the Switch received the ICMP
response.
This example shows the current status of the various alarms in the Switch.
sysname# show alarm-status
name status suppressAlarm
----------------- ------ ------------VOLTAGE Normal
No
TEMPERATURE Normal
No
FAN Normal
No
POE OVER LOAD Normal
No
POE SHORT CIRCUIT Normal
No
POE POWERBOX Normal
Yes
alarmLED
-------Off
Off
Off
Off
Off
Off
342
LABEL
DESCRIPTION
name
status
DESCRIPTION
suppressAlarm
alarmLED
This field displays whether or not the LED for this alarm is on.
util sec
ticks
util sec
ticks
137625
91.98
508456
SNIP ---------------------------------
DESCRIPTION
baseline
This field displays the number of CPU clock cycles per second.
sec
ticks
This field displays the number of CPU clock cycles the CPU was not used
during the interval.
util
343
This example looks at the current sensor readings from various places in the hardware.The
display for your Switch may be different.
sysname# show hardware-monitor C
PSU
---PSU1
PSU2
Serial Number
------------DIYD11M00CN
DIYD11M00DV
Customer Part
Number & Revision
-----------------
Current
------9360
9360
9360
9480
Max
----45.0
47.0
45.0
45.0
Max
----15960
16320
15720
15240
FAN TRAY
---------FAN TRAY 1
FAN TRAY 2
Air Flow
------------front-to-back
front-to-back
Voltage(V)
---------12V_PSU1
12V_PSU2
sysname#
Current
------11.737
11.676
Min
----33.0
32.0
31.0
32.0
Min
---9360
9360
9360
9360
Manufacturing
Fan Air Flow
------------ ------------20110124 front-to-back
20110125 front-to-back
Threshold
--------80.0
90.0
90.0
90.0
Threshold
--------500
500
500
500
Status
-----Normal
Normal
Normal
Normal
Status
-----Normal
Normal
Normal
Normal
Status
------Present
Present
Max
-----11.918
11.858
Min
-----11.737
11.676
Threshold
--------+/-10%
+/-10%
Status
-----Normal
Normal
DESCRIPTION
Customer Part
This displays information on the fan and power module kits installed in the
Switch.
PSU
Serial Number
Manufacturing
This displays the power module fan air flow. All fan air flows within a Switch
must be consistent, that is either front-to-back or back-to-front.
Temperature Unit
344
This field displays the unit of measure for temperatures in this screen.
Temperature
Current
DESCRIPTION
Max
Min
Threshold
Status
FAN Speed(RPM)
This field displays the fans in the Switch. Each fan has a sensor that is
capable of detecting and reporting when the fan speed falls below the
threshold.
Current
This field displays the current speed of the fan at this sensor.
Max
This field displays the maximum speed of the fan measured at this sensor.
Min
This field displays the minimum speed of the fan measured at this sensor. It
displays "<41" for speeds too small to measure. (See the Users Guide to
find out what speeds are too small to measure in your Switch.)
Threshold
This field displays the minimum speed at which the fan should work.
Status
FAN TRAY
Air Flow
This displays the fan module fan air flow. All fan air flows within a Switch
must be consistent, that is either front-to-back or back-to-front.
Status
Voltage(V)
This field displays the various power supplies in the Switch. Each power
supply has a sensor that is capable of detecting and reporting when the
voltage is outside tolerance.
Current
Max
This field displays the maximum voltage measured at this power supply.
Min
This field displays the minimum voltage measured at this power supply.
Threshold
This field displays the percentage tolerance within which the Switch still
works.
Status
VID
---123
Type
---------MVR
345
DESCRIPTION
Index
VID
Type
DESCRIPTION
Total Power
This field displays the total power the Switch can provide to PoE-enabled
devices.
Consuming Power
This field displays the amount of power the Switch is currently supplying to
the PoE-enabled devices.
Allocated Power
This field displays the total amount of power the Switch has reserved for
PoE after negotiating with the PoE device(s).
This field displays the amount of power the Switch can still provide for PoE.
346
LABEL
DESCRIPTION
Product Model
System Name
This field displays the system name (or hostname) of the Switch.
System Contact
This field displays the name of the person in charge of this Switch. Use the
snmp-server command to configure this. See Chapter 69 on page 283.
DESCRIPTION
System Location
This field displays the geographic location of this Switch. Use the snmpserver command to configure this. See Chapter 69 on page 283.
System up Time
This field displays how long the switch has been running since it last started
up.
Ethernet Address
Bootbase Version
RomRasSize
This example displays run-time SFP (Small Form Facter Pluggable) parameters on ports 9 (the
first SFP port 0, with an SFP transceiver installed) and 10 (the second SFP port 1, no SFP
transceiver installed) on the Switch. You can also see the alarm and warning threasholds for
: 1
347
This example displays run-time SFP (Small Form Facter Pluggable) parameters on port 21 on
the Switch. You can also see the alarm and warning threasholds for temperature, voltage,
:
:
:
:
:
:
:
21 (SFP)
ZyXEL
SFP-LX-10-D
S081133000074
V1.0
2008-08-11
1000BASE-LX
High ALarm
High Warn
Low Warn
Low Alarm
Threshold
Threshold
Threshold
Threshold
------------ ----------- ----------- -----------1.00
75.00
5.00
0.00
3.50
3.45
3.15
3.10
100.05
90.04
7.00
6.00
-2.99
-3.49
-8.96
-9.50
-2.99
-3.49
-20.50
-21.02
This example displays the firmware version the Switch is currently using..
sysname# show version
Current ZyNOS version: V3.80(BBA.3)b1 | 04/17/2008
348
349
350
P ART VI
Appendices and
Index of Commands
Default Values (353)
Legal Information (355)
Index of Commands (359)
351
352
A PPENDIX
Default Values
Some commands, particularly no commands, reset settings to their default values. The
following table identifies the default values for these settings.
Table 206 Default Values for Reset Commands
COMMAND
DEFAULT VALUE
Method 1: enable
Method 2: none
Method 3: none
Method 1: local
Method 2: none
Method 3: none
0 minutes
300 seconds
32 messages
5 syslog messages
1 second
no radius-server <index>
IP address: 0.0.0.0
Port number: 1812
Key: blank
no radius-accounting <index>
IP address: 0.0.0.0
Port number: 1813
Key: blank
353
354
A PPENDIX
Legal Information
Copyright
Copyright 2013 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed,
stored in a retrieval system, translated into any language, or transmitted in any form or by any
means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or
otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or
software described herein. Neither does it convey any license under its patent rights nor the
patent rights of others. ZyXEL further reserves the right to make changes in any products
described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL
Communications, Inc. Other trademarks mentioned in this publication are used for
identification purposes only and may be properties of their respective owners.
Certifications
Federal Communications Commission (FCC) Interference Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two
conditions:
This device may not cause harmful interference.
This device must accept any interference received, including interference that may cause
undesired operations.
355
FCC Warning
This device has been tested and found to comply with the limits for a Class A digital switch,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a commercial environment. This device generates,
uses, and can radiate radio frequency energy and, if not installed and used in accordance with
the instruction manual, may cause harmful interference to radio communications. Operation of
this device in a residential area is likely to cause harmful interference in which case the user
will be required to correct the interference at his own expense.
CE Mark Warning:
This is a class A product. In a domestic environment this product may cause radio interference
in which case the user may be required to take adequate measures.
Taiwanese BSMI (Bureau of Standards, Metrology and Inspection) A Warning:
Notices
Changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate the equipment.
This Class A digital apparatus complies with Canadian ICES-003.
Cet appareil numrique de la classe A est conforme la norme NMB-003 du Canada.
CLASS 1 LASER PRODUCT
APPAREIL A LASER DE CLASS 1
PRODUCT COMPLIES WITH 21 CFR 1040.10 AND 1040.11.
PRODUIT CONFORME SELON 21 CFR 1040.10 ET 1040.11.
Viewing Certifications
1 Go to http://www.zyxel.com.
2 Select your product on the ZyXEL home page to go to that product's page.
3 Select the certification you wish to view from this page.
356
whatever extent it shall deem necessary to restore the product or components to proper
operating condition. Any replacement will consist of a new or re-manufactured functionally
equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL.
This warranty shall not apply if the product has been modified, misused, tampered with,
damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the
purchaser. This warranty is in lieu of all other warranties, express or implied, including any
implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in
no event be held liable for indirect or consequential damages of any kind to the purchaser.
To obtain the services of this warranty, contact your vendor. You may also refer to the
warranty policy for the region in which you bought the device at http://www.zyxel.com/web/
support_warranty_info.php.
Registration
Register your product online to receive e-mail notices of firmware upgrades and information
at www.zyxel.com.
357
358
Index of Commands
Index of Commands
359
Index of Commands
360
Index of Commands
361
Index of Commands
362
Index of Commands
363
Index of Commands
364
Index of Commands
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
ipv6
............................................................................ 158
address <ipv6-address>/<prefix> ............................................ 158
address <ipv6-address>/<prefix> eui-64 ..................................... 158
address <ipv6-address>/<prefix> link-local ................................. 159
address autoconfig ......................................................... 159
address default-gateway <gateway-ipv6-address> ............................. 159
address dhcp client <ia-na> ................................................ 159
address dhcp client <ia-na> [rapid-commit] ................................. 159
address dhcp client information refresh minimum <600-4294967295> ........... 159
address dhcp client option <[dns][domain-list]> ............................ 159
dhcp relay vlan <1-4094> helper-address <remote-dhcp-server> ............... 160
dhcp relay vlan <1-4094> option interface-id ............................... 160
dhcp relay vlan <1-4094> option remote-id <remote-id> ...................... 160
hop-limit <1-255> .......................................................... 166
icmp error-interval <0-2147483647> [bucket-size <1-200>] ................... 161
mld snooping-proxy ......................................................... 162
mld snooping-proxy 8021p-priority <0-7> .................................... 162
mld snooping-proxy filtering ............................................... 162
mld snooping-proxy filtering group-limited ................................. 161
mld snooping-proxy filtering group-limited number <number> ................. 162
mld snooping-proxy filtering profile <name> ................................ 162
mld snooping-proxy filtering profile <name> start-address <ip> end-address <ip>
162
ipv6 mld snooping-proxy vlan <vlan-id> .......................................... 162
ipv6 mld snooping-proxy vlan <vlan-id> downstream interface port-channel <port-list>
162
ipv6 mld snooping-proxy vlan <vlan-id> downstream interface port-channel <port-list>
fast-leave-timeout <2-16775168> .......................................... 162
ipv6 mld snooping-proxy vlan <vlan-id> downstream interface port-channel <port-list>
leave-timeout <2-16775168> ............................................... 162
ipv6 mld snooping-proxy vlan <vlan-id> downstream interface port-channel <port-list> mode
<immediate | normal | fast> .............................................. 162
ipv6 mld snooping-proxy vlan <vlan-id> downstream query-interval <1000-31744000> 162
ipv6 mld snooping-proxy vlan <vlan-id> downstream query-max-response-time <1000-25000>
162
ipv6 mld snooping-proxy vlan <vlan-id> upstream interface port-channel <port-list> 163
ipv6 mld snooping-proxy vlan <vlan-id> upstream last-listener-query-interval <1-8387584>
163
ipv6 mld snooping-proxy vlan <vlan-id> upstream query-interval <1000-31744000> .. 163
ipv6 mld snooping-proxy vlan <vlan-id> upstream query-max-response-time <1000-25000>
163
ipv6 mld snooping-proxy vlan <vlan-id> upstream robustness-variable <1-25> ...... 163
ipv6 nd dad-attempts <0-600> .................................................... 165
ipv6 nd managed-config-flag ..................................................... 165
ipv6 nd ns-interval <1000-3600000> .............................................. 165
ipv6 nd other-config-flag ....................................................... 165
ipv6 nd prefix <ipv6-prefix>/<prefix-length> .................................... 165
ipv6 nd prefix <ipv6-prefix>/<prefix-length> <[valid-lifetime <0-4294967295>] [preferred-lifetime <0-4294967295>] [no-autoconfig] [no-onlink] [no-advertise]> 165
ipv6 nd ra interval minimum <3-1350> maximum <4-1800> ........................... 165
ipv6 nd ra lifetime <0-9000> .................................................... 165
ipv6 nd ra suppress ............................................................. 165
ipv6 nd reachable-time <1000-2147483647> ........................................ 165
ipv6 neighbor <interface-type> <interface-number> <ipv6-address> <mac-address> .. 167
ipv6 route <ipv6-prefix>/<prefix-length> <next-hop> ............................. 166
ipv6 route <ipv6-prefix>/<prefix-length> <next-hop> <interface-type> <interface-number>
166
kick tcp <session id> ........................................................... 146
l2protocol-tunnel ............................................................... 175
365
Index of Commands
366
Index of Commands
ma-index ......................................................................... 51
md-index ......................................................................... 51
mep <mep-id> interface port-channel <port> direction <up|down> priority <0-7> .... 53
mep <mep-id> interface port-channel <port> direction <up|down> priority <0-7> cc-enable
53
mep <mep-id> interface port-channel <port> direction <up|down> priority <0-7> inactive
53
mep-id ........................................................................... 51
mhf-creation < none | default | explicit> ........................................ 53
mirror .......................................................................... 205
mirror dir <ingress|egress|both> ................................................ 206
mirror-filter egress mac <mac-addr> ............................................. 206
mirror-filter egress type <all|dest|src> ........................................ 206
mirror-filter ingress mac <mac-addr> ............................................ 206
mirror-filter ingress type <all|dest|src> ....................................... 206
mirror-port ..................................................................... 205
mirror-port <port-num> .......................................................... 205
mode <dynamic|compatible> ....................................................... 219
mode zynos ...................................................................... 341
mrstp <tree-index> .............................................................. 209
mrstp <tree-index> hello-time <1-10> maximum-age <6-40> forward-delay <4-30> .... 209
mrstp <tree-index> priority <0-61440> ........................................... 209
mrstp interface <port-list> ..................................................... 209
mrstp interface <port-list> edge-port ........................................... 210
mrstp interface <port-list> path-cost <1-65535> ................................. 210
mrstp interface <port-list> priority <0-255> .................................... 210
mrstp interface <port-list> tree-index <tree-index> ............................. 210
mstp ............................................................................ 211
mstp configuration-name <name> .................................................. 211
mstp hello-time <1-10> maximum-age <6-40> forward-delay <4-30> .................. 211
mstp instance <number> interface port-channel <port-list> ....................... 212
mstp instance <number> interface port-channel <port-list> path-cost <1-65535> ... 212
mstp instance <number> interface port-channel <port-list> priority <0-255> ...... 212
mstp instance <number> priority <0-61440> ....................................... 212
mstp instance <number> vlan <vlan-list> ......................................... 212
mstp interface port-channel <port-list> edge-port ............................... 211
mstp max-hop <1-255> ............................................................ 211
mstp revision <0-65535> ......................................................... 211
multicast-forward name <name> mac <mac-addr> vlan <vlan-id> inactive ............ 293
multicast-forward name <name> mac <mac-addr> vlan <vlan-id> interface port-channel <portlist> .................................................................... 293
multicast-limit .................................................................. 46
multicast-limit <pkt/s> .......................................................... 46
multi-login ..................................................................... 217
mvr <1-4094> .................................................................... 339
mvr <vlan-id> ................................................................... 219
name <name> ..................................................................... 219
name <name> ..................................................................... 318
name <name> ..................................................................... 335
name <port-name-string> ......................................................... 137
network <ip-addr/bits> area <area-id> ........................................... 225
no aaa accounting commands ....................................................... 30
no aaa accounting dot1x .......................................................... 30
no aaa accounting exec ........................................................... 30
no aaa accounting system ......................................................... 30
no aaa accounting update ......................................................... 29
no aaa accounting update ........................................................ 353
no aaa authentication enable ..................................................... 29
no aaa authentication enable .................................................... 353
367
Index of Commands
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
368
Index of Commands
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
diffserv ...................................................................... 87
display aaa <[authentication][authorization][server]> ......................... 89
display user <[system][snmp]> ................................................. 89
dlf-limit ..................................................................... 46
egress set <port-list> ....................................................... 243
errdisable detect cause <ARP|BPDU|IGMP> ....................................... 94
errdisable recovery ........................................................... 94
errdisable recovery cause <loopguard|ARP|BPDU|IGMP> ........................... 94
ethernet cfm .................................................................. 54
ethernet cfm ma <ma-index> md <md-index> ...................................... 54
ethernet cfm management-address-domain ........................................ 54
ethernet cfm md <md-index> .................................................... 54
ethernet cfm virtual-mac ...................................................... 54
ethernet oam .................................................................. 97
ethernet oam .................................................................. 98
ethernet oam mode ............................................................. 98
ethernet oam remote-loopback ignore-rx ........................................ 98
ethernet oam remote-loopback supported ........................................ 98
ets traffic-class binding ..................................................... 75
external-alarm <index> ....................................................... 103
external-alarm all ........................................................... 103
fixed <port-list> ............................................................ 318
flow-control ................................................................. 138
forbidden <port-list> ........................................................ 318
green-ethernet auto-power-down ............................................... 108
green-ethernet auto-power-down ............................................... 108
green-ethernet eee ........................................................... 108
green-ethernet eee ........................................................... 108
green-ethernet short-reach ................................................... 108
green-ethernet short-reach ................................................... 108
group ........................................................................ 219
group <name-str> ............................................................. 219
gvrp ......................................................................... 111
hybrid-spq ................................................................... 261
igmp-filtering ............................................................... 135
igmp-filtering profile ....................................................... 135
igmp-filtering profile <name> ................................................ 135
igmp-filtering profile <name> start-address <ip> end-address <ip> ............ 135
igmp-group-limited ........................................................... 131
igmp-immediate-leave ......................................................... 131
igmp-snooping ................................................................ 127
igmp-snooping 8021p-priority ................................................. 127
igmp-snooping filtering ...................................................... 127
igmp-snooping filtering profile .............................................. 131
igmp-snooping filtering profile <name> ....................................... 127
igmp-snooping filtering profile <name> start-address <ip> end-address <ip> ... 127
igmp-snooping group-limited .................................................. 131
igmp-snooping leave-proxy .................................................... 128
igmp-snooping querier ........................................................ 128
igmp-snooping report-proxy ................................................... 128
igmp-snooping vlan <vlan-id> ................................................. 129
inactive ..................................................................... 138
inactive ..................................................................... 219
inactive ..................................................................... 318
inactive ..................................................................... 335
inactive ....................................................................... 5
ingress-check ................................................................ 319
install slot <slot> .......................................................... 341
interface <port-num> ......................................................... 138
369
Index of Commands
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
370
Index of Commands
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
371
Index of Commands
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
372
Index of Commands
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
373
Index of Commands
no
no
no
no
no
no
no
no
no
no
no
no
374
Index of Commands
375
Index of Commands
ple-type <absolute|delta> startup-alarm <startup-alarm> rising-threshold <risinginteger> <event-index> falling-threshold <falling-integer> <event-index> [owner
<owner>] ................................................................. 271
rmon event eventtable <event-index> [log] [trap <community>] [owner <owner>] [description
<description>] ........................................................... 270
rmon history historycontrol <historycontrol-index> buckets <1-65535> interval <1-3600>
port-channel <interface-id> [owner <owner>] .............................. 270
rmon statistics etherstats <etherstats-index> port-channel <interface-id> [owner <owner>] ..................................................................... 270
router dvmrp ..................................................................... 91
router igmp ..................................................................... 123
router ospf <router-id> ......................................................... 224
router rip ...................................................................... 267
router vrrp network <ip-address>/<mask-bits> vr-id <1~7> uplink-gateway <ip-address>
335
secondary-virtual-ip <ip-address> ............................................... 335
service-control ftp ............................................................. 265
service-control ftp <socket-number> ............................................. 265
service-control http ............................................................ 266
service-control http <socket-number> <timeout> .................................. 266
service-control https ........................................................... 266
service-control https <socket-number> ........................................... 266
service-control icmp ............................................................ 266
service-control snmp ............................................................ 266
service-control ssh ............................................................. 266
service-control ssh <socket-number> ............................................. 266
service-control telnet .......................................................... 266
service-control telnet <socket-number> .......................................... 266
sflow ........................................................................... 277
sflow ........................................................................... 278
sflow collector <ip-address> [poll-interval <20-120>] [sample-rate <256-65535>] . 277
sflow collector <ip-address> [udp-port <udp-port>] .............................. 278
show aaa accounting .............................................................. 29
show aaa accounting commands ..................................................... 29
show aaa accounting dot1x ........................................................ 30
show aaa accounting exec ......................................................... 30
show aaa accounting system ....................................................... 30
show aaa accounting update ....................................................... 29
show aaa authentication .......................................................... 29
show aaa authentication enable ................................................... 29
show aaa authentication login .................................................... 29
show aaa authorization ........................................................... 30
show aaa authorization dot1x ..................................................... 30
show aaa authorization exec ...................................................... 30
show al1arm-status .............................................................. 340
show arp inspection .............................................................. 33
show arp inspection filter [<mac-addr>] [vlan <vlan-id>] ......................... 33
show arp inspection interface port-channel <port-list> ........................... 34
show arp inspection log .......................................................... 34
show arp inspection statistics ................................................... 33
show arp inspection statistics vlan <vlan-list> .................................. 33
show arp inspection vlan <vlan-list> ............................................. 34
show classifier [<name>] ......................................................... 59
show cluster ..................................................................... 63
show cluster candidates .......................................................... 63
show cluster member .............................................................. 63
show cluster member config ....................................................... 63
show cluster member mac <mac> .................................................... 63
show cpu-protection interface port-channel <port-list> ........................... 94
376
Index of Commands
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
377
Index of Commands
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
378
Index of Commands
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
379
Index of Commands
380
Index of Commands
381
Index of Commands
382
Index of Commands
wfq .............................................................................
write memory [<index>] ..........................................................
wrr .............................................................................
wrr .............................................................................
wrr <wt1> <wt2> ... <wt8> .......................................................
262
341
261
262
261
383
Index of Commands
384