3Com Corporation reserves the right to revise this documentation and to make changes in content from time
to time without obligation on the part of 3Com Corporation to provide notification of such revision or change.
3Com Corporation provides this documentation without warranty, term, or condition of any kind, either
implied or expressed, including, but not limited to, the implied warranties, terms or conditions of
merchantability, satisfactory quality, and fitness for a particular purpose. 3Com may make improvements or
changes in the product(s) and/or the program(s) described in this documentation at any time.
If there is any software on removable media described in this documentation, it is furnished under a license
agreement included with the product as a separate document, in the hard copy documentation, or on the
removable media in a directory file named LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy,
please contact 3Com and a copy will be provided to you.
UNITED STATES GOVERNMENT LEGEND
If you are a United States government agency, then this documentation and the software described herein are
provided to you subject to the following:
All technical data and computer software are commercial in nature and developed solely at private expense.
Software is delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or
as a “commercial item” as defined in FAR 2.101(a) and as such is provided with only such rights as are
provided in 3Com’s standard commercial license for the Software. Technical data is provided with limited rights
only as provided in DFAR 252.227-7015 (Nov 1995) or FAR 52.227-14 (June 1987), whichever is applicable.
You agree not to remove or deface any portion of any legend provided on any licensed program or
documentation contained in, or delivered to you in conjunction with, this User Guide.
Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not
be registered in other countries.
3Com and the 3Com logo are registered trademarks of 3Com Corporation.
ntel and Pentium are registered trademarks of Intel Corporation. Microsoft, MS-DOS, Windows, and Windows
NT are registered trademarks of Microsoft Corporation. Novell and NetWare are registered trademarks of
Novell, Inc. UNIX is a registered trademark in the United States and other countries, licensed exclusively
through X/Open Company, Ltd.
IEEE and 802 are registered trademarks of the Institute of Electrical and Electronics Engineers, Inc.
All other company and product names may be trademarks of the respective companies with which they are
associated.
ENVIRONMENTAL STATEMENT
It is the policy of 3Com Corporation to be environmentally friendly in all operations. To uphold our policy, we
are committed to:
Establishing environmental performance standards that comply with national legislation and regulations.
Conserving energy, materials and natural resources in all operations.
Reducing the waste generated by all operations. Ensuring that all waste conforms to recognized environmental
standards. Maximizing the recyclable and reusable content of all products.
Ensuring that all products can be recycled, reused and disposed of safely.
Ensuring that all products are labelled according to recognized environmental standards.
Improving our environmental record on a continual basis.
End of Life Statement
3Com processes allow for the recovery, reclamation and safe disposal of all end-of-life electronic components.
Regulated Materials Statement
3Com products do not contain any hazardous or ozone-depleting material.
Environmental Statement about the Documentation
The documentation for this product is printed on paper that comes from sustainable, managed forests; it is
fully biodegradable and recyclable, and is completely chlorine-free. The varnish is environmentally friendly, and
the inks are vegetable-based with a low heavy-metal content.
Page 3
CONTENTS
USINGTHE CLI
Overview19
CLI Command Modes19
Introduction19
User EXEC Mode20
Privileged EXEC20
Global Configuration Mode21
Interface Configuration and Specific Configuration Modes21
Starting the CLI22
Editing Features23
Entering Commands23
Terminal Command Buffer24
Negating the Effect of Commands25
Command Completion25
Nomenclature25
Keyboard Shortcuts26
CLI Command Conventions27
Copying and Pasting Text27
AAA COMMANDS
aaa authentication login29
aaa authentication enable30
login authentication32
enable authentication33
ip http authentication33
ip https authentication34
show authentication methods35
password37
enable password37
username38
Page 4
ACL COMMANDS
ip access-list41
permit (ip)41
deny (IP)45
mac access-list47
permit (MAC)48
deny (MAC)49
service-acl50
show access-lists51
show interfaces access-lists52
ADDRESS TABLE COMMANDS
bridge address55
bridge multicast filtering56
bridge multicast address57
bridge multicast forbidden address58
bridge multicast forward-all59
bridge multicast forbidden forward-all60
bridge aging-time62
clear bridge62
port security63
port security mode64
port security routed secure-address65
show bridge address-table66
show bridge address-table static67
show bridge address-table count68
show bridge multicast address-table70
show bridge multicast filtering72
show ports security73
show ports security addresses74
ETHERNET CONFIGURATION COMMANDS
interface ethernet77
interface range ethernet77
shutdown78
Page 5
description79
speed80
duplex81
negotiation81
flowcontrol82
mdix83
clear counters84
set interface active85
show interfaces advertise85
show interfaces configuration87
show interfaces status88
show interfaces description90
show interfaces counters91
port storm-control include-multicast (GC)94
port storm-control include-multicast (IC)95
port storm-control broadcast enable96
port storm-control broadcast rate97
show ports storm-control97
LINE COMMANDS
line99
speed99
autobaud100
exec-timeout101
history102
history size102
terminal history103
terminal history size104
show line105
PHY DIAGNOSTICS COMMANDS
test copper-port tdr107
show copper-ports tdr108
show copper-ports cable-length109
show fiber-ports optical-transceiver110
Page 6
PORT CHANNEL COMMANDS
interface port-channel113
interface range port-channel113
channel-group114
show interfaces port-channel115
QOS COMMANDS
qos117
show qos118
class-map118
show class-map120
match120
policy-map121
class122
show policy-map123
trust cos-dscp124
set125
police126
service-policy127
qos aggregate-policer128
show qos aggregate-policer129
police aggregate130
wrr-queue cos-map131
wrr-queue bandwidth132
priority-queue out num-of-queues133
traffic-shape134
rate-limit interface configuration135
show qos interface136
qos map policed-dscp138
qos map dscp-queue139
qos trust (Global)140
qos trust (Interface)141
qos cos142
qos dscp-mutation143
qos map dscp-mutation143
security-suite enable144
Page 7
security-suite dos protect145
security-suite deny martian-addresses146
show rmon statistics167
rmon collection history169
show rmon collection history170
show rmon history172
rmon alarm175
show rmon alarm-table177
show rmon alarm178
rmon event180
show rmon events181
show rmon log182
rmon table-size183
Page 8
IGMP SNOOPING COMMANDS
ip igmp snooping (Global)185
ip igmp snooping (Interface)185
ip igmp snooping mrouter learn-pim-dvmrp186
ip igmp snooping host-time-out187
ip igmp snooping mrouter-time-out188
ip igmp snooping leave-time-out189
show ip igmp snooping mrouter189
show ip igmp snooping interface190
show ip igmp snooping groups191
LACP COMMANDS
lacp system-priority193
lacp port-priority193
lacp timeout194
show lacp ethernet195
show lacp port-channel198
POWEROVER ETHERNETCOMMANDS
power inline201
power inline powered-device202
power inline priority202
power inline usage-threshold203
power inline traps enable204
show power inline204
snmp-server community283
snmp-server view284
snmp-server group286
snmp-server user287
snmp-server engineID local289
snmp-server enable traps291
snmp-server filter291
snmp-server host292
snmp-server v3-host294
snmp-server trap authentication295
snmp-server contact296
snmp-server location297
snmp-server set297
show snmp298
show snmp engineid300
show snmp views301
show snmp groups302
show snmp filters303
show snmp users304
IP ADDRESS COMMANDS
ip address307
ip address dhcp308
ip default-gateway309
show ip interface310
arp311
arp timeout312
clear arp-cache312
Page 11
show arp313
ip domain-name314
ip name-server315
MANAGEMENT ACL COMMANDS
management access-list317
permit (Management)318
deny (Management)319
management access-class320
show management access-list321
show management access-class322
WIRELESS ROGUE AP COMMANDS
rogue-detect enable (Radio)323
rogue-detect rogue-scan-interval324
wlan rogue-detect rogue-ap325
clear wlan rogue-ap326
show wlan rogue-aps configuration326
show wlan rogue-aps list327
show wlan rogue-aps neighborhood328
WIRELESS ESS COMMANDS
wlan ess create331
wlan ess configure331
ssid332
open vlan333
qos334
load-balancing334
mac-filtering action335
mac-filtering list336
security suite create337
security suite configure339
vlan (Security-Suite ESS)340
timer (Security-Suite ESS)341
update-gkey-on-leave (Security-Suite ESS)342
Page 12
wpa2 pre-authentication343
show wlan ess344
show wlan ess mac-filtering lists347
show wlan ess counters348
WIRELESS AP GENERAL COMMANDS
clear wlan ap351
wlan ap active352
wlan ap key352
wlan ap config353
name354
tunnel priority355
wan enable355
interface ethernet356
vlan allowed357
vlan native358
wlan template ap configure358
set wlan copy359
show wlan aps360
show wlan ap interface radio364
show wlan ap interface ethernet365
show wlan aps counters366
show wlan aps discovered368
show wlan template aps369
SSH COMMANDS
ip ssh port371
ip ssh server372
crypto key generate dsa372
crypto key generate rsa373
ip ssh pubkey-auth374
crypto key pubkey-chain ssh374
user-key375
key-string376
show ip ssh378
show crypto key mypubkey379
Page 13
show crypto key pubkey-chain ssh380
WEB SERVER COMMANDS
ip http server383
ip http port383
ip http exec-timeout384
ip https server385
ip https port385
crypto certificate generate386
crypto certificate request388
crypto certificate import389
ip https certificate390
show crypto certificate mycertificate391
show ip http392
show ip https393
TACACS+ COMMANDS
tacacs-server host395
tacacs-server key396
tacacs-server timeout397
tacacs-server source-ip398
show tacacs399
ping419
traceroute421
telnet424
resume427
reload428
hostname429
show users429
show sessions430
show system431
show version432
service cpu-utilization433
show cpu utilization434
wlan tx-power off501
wlan country-code502
wlan tx-power auto enable504
wlan tx-power auto interval505
wlan tx-power auto signal-strength506
Page 17
wlan tx-power auto signal-loss506
wlan station idle-timeout507
clear wlan station508
show wlan509
show wlan auto-tx-power510
show wlan logging configuration511
show wlan stations512
show wlan stations counters513
TROUBLESHOOTING
Problem Management515
Troubleshooting Solutions515
Page 18
Page 19
USINGTHE CLI
1
OverviewThis document describes the Command Line Interface (CLI) used to
manage the 3Com Unified Gigabit Wireless PoE switch.
Most of the CLI commands are applicable to all devices.
This chapter describes how to start using the CLI and the CLI command
editing features.
CLI Command Modes
IntroductionTo assist in configuring the device, the Command Line Interface (CLI) is
divided into different command modes. Each command mode has its
own set of specific commands. Entering a question mark ? at the system
prompt (console prompt) displays a list of commands available for that
particular command mode.
From each mode, a specific command is used to navigate from one
command mode to another. The standard order to access the modes is as
follows: User EXEC mode, Privileged EXEC mode, Global Configuration
mode, and Interface Configuration mode.
When starting a session, the initial mode is the User EXEC mode. Only a
limited subset of commands are available in User EXEC mode. This level is
reserved for tasks that do not change the configuration. To enter the next
level, the Privileged EXEC mode, a password is required.
The Privileged EXEC mode gives access to commands that are restricted
on User EXEC mode and provides access to the device Configuration
mode.
The Global Configuration mode manages the device configuration on a
global level.
The Interface Configuration mode configures specific interfaces in the
device.
Page 20
20CHAPTER 1: USINGTHE CLI
User EXEC ModeAfter logging into the device, the user is automatically in User EXEC
command mode unless the user is defined as a privileged user. In general,
the User EXEC commands allow the user to perform basic tests, and list
system information.
The user-level prompt consists of the device host name followed by the
angle bracket (>).
Console>
The default host name is Console unless it has been changed using the
hostname command in the Global Configuration mode.
Privileged EXECPrivileged access is password protected to prevent unauthorized use
because many of the Privileged commands set operating system
parameters. The password is not displayed on the screen and is case
sensitive.
Privileged users enter directly into the Privileged EXEC mode. To enter the
Privileged EXEC mode from the User EXEC mode, perform the following
steps:
1 At the prompt enter the enable command and press <Enter>. A
password prompt is displayed.
2 Enter the password and press <Enter>. The password is displayed as *.
The Privileged EXEC mode prompt is displayed. The Privileged EXEC mode
prompt consists of the device host name followed by #.
3 To return from the Privileged EXEC mode to the User EXEC mode, use the
disable command.
The following example illustrates how to access the Privileged EXEC
mode and return to the User EXEC mode:
Console>
Enter Password: ******
Console#
Console#
Console>
enable
disable
4 The exit command is used to return from any mode to the previous
mode except when returning to the User EXEC mode from the Privileged
EXEC mode. For example, the exit command is used to return from the
Interface Configuration mode to the Global Configuration mode.
Page 21
Overview21
Global Configuration
Mode
Global Configuration mode commands apply to features that affect the
system as a whole, rather than just a specific interface. The configure
Privileged EXEC mode command is used to enter the Global
Configuration mode.
To enter the Global Configuration mode perform the following steps:
1 At the Privileged EXEC mode prompt, enter the configure command and
press <Enter>. The Global Configuration mode prompt is displayed. The
Global Configuration mode prompt consists of the device host name
followed by (config) and #.
Console(config)#
2 To return from the Global Configuration mode to the Privileged EXEC
mode, the user can use one of the following commands:
■ exit
■ end
■ Ctrl+Z
The following example illustrates how to access the Global Configuration
mode and return to the Privileged EXEC mode:
Console#
Console#
Console(config)#
Console#
configure
exit
Interface
Configuration and
Specific
Configuration Modes
Interface Configuration mode commands modify specific interface
operations. The following are the Interface Configuration modes:
■ Line Interface — Contains commands to configure the management
connections. These include commands such as line timeout settings,
etc. The line Global Configuration mode command is used to enter
the Line Configuration command mode.
■ VLAN Database — Contains commands to create a VLAN as a
whole. The vlan database Global Configuration mode command is
used to enter the VLAN Database Interface Configuration mode.
■ Management Access List — Contains commands to define
management access-lists. The management access-list Global
Configuration mode command is used to enter the Management
Access List Configuration mode.
Page 22
22CHAPTER 1: USINGTHE CLI
■ Ethernet — Contains commands to manage port configuration. The
■ Port Channel — Contains commands to configure port-channels, for
■ SSH Public Key-chain — Contains commands to manually specify
■ QoS — Contains commands related to service definitions. The qos
■ MAC Access-List — Configures conditions required to allow traffic
interface ethernet Global Configuration mode command is used to
enter the Interface Configuration mode to configure an Ethernet type
interface.
example, assigning ports to a port-channel. Most of these commands
are the same as the commands in the Ethernet interface mode, and
are used to manage the member ports as a single entity. The
interface port-channel Global Configuration mode command is
used to enter the Port Channel Interface Configuration mode.
other device SSH public keys. The crypto key pubkey-chain ssh
Global Configuration mode command is used to enter the SSH Public
Key-chain Configuration mode.
Global Configuration mode command is used to enter the QoS
services configuration mode.
based on MAC addresses. The mac access-list Global Configuration
mode command is used to enter the MAC access-list configuration
mode.
Starting the CLIThe device can be managed over a direct connection to the device
console port or via a Telnet connection. The device is managed by
entering command keywords and parameters at the prompt. Using the
device command-line interface (CLI) is very similar to entering commands
on a UNIX system.
If access is via a Telnet connection, ensure that the device has a defined IP
address, corresponding management access is granted, and the
workstation used to access the device is connected to the device prior to
using CLI commands.
The following instructions are for use on the console line only.
Page 23
Editing Features23
To start using the CLI, perform the following steps:
1 Connect the DB9 null-modem or cross over cable to the RS-232 serial
port of the device to the RS-232 serial port of the terminal or computer
running the terminal emulation application.
a Set the data format to 8 data bits, 1 stop bit, and no parity.
b Set Flow Control to none.
c Under Properties, select VT100 for Emulation mode.
d Select Terminal keys for Function, Arrow, and Ctrl keys. Ensure
that the setting is for Terminal keys (not Windows keys).
Note: When using HyperTerminal with Microsoft® Windows 2000,
ensure that Windows® 2000 Service Pack 2 or later is installed.With
Windows 2000 Service Pack 2, the arrow keys function properly in
HyperTerminal’s VT100 emulation. Go to www.microsoft.com for
information on Windows 2000 service packs.
2 Enter the following commands to begin the configuration procedure:
Console>
Console#
Console(config)#
enable
configure
3 Configure the device and enter the necessary commands to complete the
required tasks.
4 When finished, exit the session with the exit command.
When a different user is required to log onto the system, use the login
Privileged EXEC mode command. This effectively logs off the current user
and logs on the new user.
Editing Features
Entering CommandsA CLI command is a series of keywords and arguments. Keywords identify
a command, and arguments specify configuration parameters. For
example, in the command show interfaces status ethernet g11,
show, interfaces and status are keywords, ethernet is an argument
that specifies the interface type, and g11 specifies the port.
Page 24
24CHAPTER 1: USINGTHE CLI
To enter commands that require parameters, enter the required
parameters after the command keyword. For example, to set a password
for the administrator, enter:
Console(config)#
username
admin
password
alansmith
When working with the CLI, the command options are not displayed. The
command is not selected from a menu, but is manually entered. To see
what commands are available in each mode or within an Interface
Configuration, the CLI does provide a method of displaying the available
commands, the command syntax requirements and in some instances
parameters required to complete the command. The standard command
to request help is ?.
There are two instances where help information can be displayed:
■ Keyword lookup — The character ? is entered in place of a
command. A list of all valid commands and corresponding help
messages are is displayed.
■ Partial keyword lookup — If a command is incomplete and or the
character ? is entered in place of a parameter. The matched keyword
or parameters for this command are displayed.
To assist in using the CLI, there is an assortment of editing features. The
following features are described:
■ Terminal Command Buffer
■ Command Completion
■ Nomenclature
■ Keyboard Shortcuts
Terminal Command Buffer
Every time a command is entered in the CLI, it is recorded on an internally
managed Command History buffer. Commands stored in the buffer are
maintained on a First In First Out (FIFO) basis. These commands can be
recalled, reviewed, modified, and reissued. This buffer is not preserved
across device resets.
Table 1:KeywordTable 2:Description
Page 25
Editing Features25
Up-arrow key
Ctrl+P
Down-arrow keyReturns to more recent commands in
Recalls commands in the history buffer,
beginning with the most recent
command. Repeats the key sequence
to recall successively older commands.
the history buffer after recalling
commands with the up-arrow key.
Repeating the key sequence will recall
successively more recent commands.
By default, the history buffer system is enabled, but it can be disabled at
any time. For information about the command syntax to enable or disable
the history buffer, see history.
There is a standard default number of commands that are stored in the
buffer. The standard number of 10 commands can be increased to 216.
By configuring 0, the effect is the same as disabling the history buffer
system. For information about the command syntax for configuring the
command history buffer, see history size.
To display the history buffer, see “show history”.
Negating the Effect of Commands
For many configuration commands, the prefix keyword no can be
entered to cancel the effect of a command or reset the configuration to
the default value. This guide describes the negation effect for all
applicable commands.
Command Completion
If the command entered is incomplete, invalid or has missing or invalid
parameters, then the appropriate error message is displayed. This assists
in entering the correct command. By pressing the <Tab> button, an
incomplete command is entered. If the characters already entered are not
enough for the system to identify a single matching command, press ? to
display the available commands matching the characters already entered.
Nomenclature
When referring to an Ethernet port in a CLI command, the following
format is used:
■ For an Ethernet port: Ethernet_type port_number
The Ethernet type may be Gigabit Ethernet (indicated by “g”).
For example, g3 stands for Gigabit Ethernet port 3 on the device.
Page 26
26CHAPTER 1: USINGTHE CLI
The ports may be described on an individual basis or within a range. Use
format port number-port number to specify a set of consecutive ports
and port number, port number to indicates a set of non-consecutive
ports. For example, g1-3 stands for Gigabit Ethernet ports 1, 2 and 3, and
g1,5 stands for Gigabit Ethernet ports 1 and 5.
Keyboard Shortcuts
The CLI has a range of keyboard shortcuts to assist in editing the CLI
commands. The following table describes the CLI shortcuts.
Table 3:Keyboard KeyTable 4:Description
Up-arrow keyRecalls commands from the history
buffer, beginning with the most recent
command. Repeat the key sequence to
recall successively older commands.
Down-arrow keyReturns the most recent commands
from the history buffer after recalling
commands with the up arrow key.
Repeating the key sequence will recall
successively more recent commands.
Ctrl+AMoves the cursor to the beginning of
the command line.
Ctrl+EMoves the cursor to the end of the
command line.
Ctrl+Z / EndReturns back to the Privileged EXEC
mode from any configuration mode.
Backspace keyDeletes one character left to the cursor
position.
Page 27
Editing Features27
CLI Command Conventions
When entering commands there are certain command entry standards
that apply to all commands. The following table describes the command
conventions.
ConventionDescription
[ ]In a command line, square brackets
{ }In a command line, curly brackets
Italic fontIndicates a parameter.
<Enter> Indicates an individual key on the
Ctrl+F4Any combination keys pressed
Screen Display
allWhen a parameter is required to define
indicates an optional entry.
indicate a selection of compulsory
parameters separated by the |
character. One option must be
selected. For example: flowcontrol
{auto|on|off} means that for the
flowcontrol command either auto,
on or off must be selected.
keyboard. For example, <Enter>
indicates the Enter key.
simultaneously on the keyboard.
Indicates system messages and
prompts appearing on the console.
a range of ports or parameters and all
is an option, the default for the
command is all when no parameters
are defined. For example, the
command interface range port-channel has the option of either
entering a range of channels, or
selecting all. When the command is
entered without a parameter, it
automatically defaults to all.
Copying and Pasting
Te xt
Up to 1000 lines of text (or commands) can be copied and pasted into
the device.
It is the user’s responsibility to ensure that the text copied into the device
consists of legal commands only.
This feature is dependent on the baud rate of the device.
When copying and pasting commands from a configuration file, make
sure that the following conditions exist:
Page 28
28CHAPTER 1: USINGTHE CLI
■ A device Configuration mode has been accessed.
■ The commands contain no encrypted data, like encrypted passwords
or keys. Encrypted data cannot be copied and pasted into the device.
Page 29
2
AAA COMMANDS
aaa authentication
login
The aaa authentication login Global Configuration mode command
defines login authentication. To restore defaults, use the no form of this
command.
■ default — Uses the listed authentication methods that follow this
argument as the default list of methods when a user logs in.
■ list-name — Character string used to name the list of authentication
methods activated when a user logs in. (Range: 1-12 characters)
■ method1 [method2...] — Specify at least one method from the
following list:
KeywordDescription
enableUses the enable password for authentication.
lineUses the line password for authentication.
localUses the local username database for authentication.
noneUses no authentication.
radiusUses the list of all RADIUS servers for authentication.
tacacsUses the list of all TACACS+ servers for authentication.
Default Configuration
The local user database is checked. This has the same effect as the
command aaa authentication login list-name local.
Page 30
30CHAPTER 2: AAA COMMANDS
On the console, login succeeds without any authentication check if the
authentication method is not defined.
Command Mode
Global Configuration mode
User Guidelines
The default and optional list names created with the aaa authentication
login command are used with the login authentication command.
Create a list by entering the aaa authentication login list-name method
command for a particular protocol, where list-name is any character
string used to name this list. The method argument identifies the list of
methods that the authentication algorithm tries, in the given sequence.
The additional methods of authentication are used only if the previous
method returns an error, not if it fails. To ensure that the authentication
succeeds even if all methods return an error, specify none as the final
method in the command line.
Example
aaa authentication
enable
The following example configures the authentication login.
Console(config)#
login default radius tacacs enable line local none
aaa authentication
The aaaauthentication enable Global Configuration mode command
defines authentication method lists for accessing higher privilege levels.
To restore defaults, use the no form of this command.
no aaa authentication enable {default | list-name}
Parameters
■ default — Uses the listed authentication methods that follow this
argument as the default list of methods, when using higher privilege
levels.
Page 31
aaa authentication enable31
■ list-name — Character string used to name the list of authentication
methods activated, when using access higher privilege levels. (Range:
1-12 characters)
■ method1 [method2...] — Specify at least one method from the
following list:
KeywordDescription
enableTUses the enable password for authentication.
lineUses the line password for authentication.
noneUses no authentication.
radiusUses the list of all RADIUS servers for authentication.
Uses username $enabx$., where x is the privilege level.
tacacsUses the list of all TACACS+ servers for authentication.
Uses username "$enabx$." where x is the privilege level.
Default Configuration I
If the default list is not set, only the enable password is checked. This has
the same effect as the command aaa authentication enable default enable.
On the console, the enable password is used if it exists. If no password is
set, the process still succeeds. This has the same effect as using the
command aaa authentication enable default enable none.
Command Mode
Global Configuration mode
User Guidelines
The default and optional list names created with the aaa authentication
enable command are used with the enable authentication command.
The additional methods of authentication are used only if the previous
method returns an error, not if it fails. To ensure that the authentication
succeeds even if all methods return an error, specify none as the final
method in the command line.
All aaa authentication enable default requests sent by the device to a
RADIUS or TACACS+ server include the username $enabx$., where x is
the requested privilege level.
Example
Page 32
32CHAPTER 2: AAA COMMANDS
The following example sets the enable password for authentication when
accessing higher privilege levels.
login
authentication
Console(config)#
aaa authentication enable default enable
The login authentication Line Configuration mode command specifies
the login authentication method list for a remote telnet or console. To
restore the default configuration specified by the aaa authentication login command, use the no form of this command.
Syntax
Login authentication {default | list-name}
no login authentication
Parameters
■ default — Uses the default list created with the aaa authentication
❥
login command.
■ list-name — Uses the indicated list created with the aaa
authentication login command.
Default Configuration
Uses the default set with the command aaa authentication login.
Command Mode
Line Configuration mode
User Guidelines
To change (or rename) an authentication method, use the negate
command and create a new rule with the new method name.
Example
The following example specifies the default authentication method for a
console.
Console(config)#
Console(config-line)#
line console
login authentication default
Page 33
enable authentication33
enable
authentication
The enable authentication Line Configuration mode command
specifies the authentication method list when accessing a higher privilege
level from a remote Telnet or console. To restore the default configuration
specified by the aaa authentication enable command, use the no form
of this command.
Syntax
enable authentication {default | list-name}
no enable authentication
Parameters
■ default — Uses the default list created with the aaa authentication
enable command.
■ list-name — Uses the indicated list created with the aaa
authentication enable command.
Default Configuration
Uses the default set with the aaa authentication enable command.
Command Mode
Line Configuration mode
ip http
authentication
User Guidelines
There are no user guidelines for this command.
Example
The following example specifies the default authentication method when
accessing a higher privilege level from a console.
Console(config)#
Console(config-line)#
line console
enable authentication default
The ip http authentication Global Configuration mode command
specifies authentication methods for HTTP server users. To restore the
default configuration, use the no form of this command.
Page 34
34CHAPTER 2: AAA COMMANDS
Syntax
ip http authentication method1 [method2...]
no ip http authentication
Parameters
■ Method1 [method2...] — Specify at least one method from the
KeywordDescription
localUses the local username database for authentication.
noneUses no authentication.
radiusUses the list of all RADIUS servers for authentication.
tacacsUses the list of all TACACS+ servers for
Default Configuration
The local user database is checked. This has the same effect as the
command ip http authentication local.
following list:
authentication.
ip https
authentication
Command Mode
Global Configuration mode
User Guidelines
The additional methods of authentication are used only if the previous
method returns an error, not if it fails. To ensure that the authentication
succeeds even if all methods return an error, specify none as the final
method in the command line.
Example
The following example configures the HTTP authentication.
Console(config)#
none
ip http authentication radius tacacs local
The ip https authentication Global Configuration mode command
specifies authentication methods for HTTPS server users. To restore the
default configuration, use the no form of this command.
Page 35
show authentication methods35
Syntax
ip https authentication method1 [method2...]
no ip https authentication
Parameters
■ method1 [method2...] — Specify at least one method from the
following list:
KeywordSource or Destination
localUses the local username database for authentication.
noneUses no authentication.
radiusUses the list of all RADIUS servers for authentication.
tacacsUses the list of all TACACS+ servers for authentication.
Default Configuration
The local user database is checked. This has the same effect as the
command ip https authentication local.
show
authentication
methods
Command Mode
Global Configuration mode
User Guidelines
The additional methods of authentication are used only if the previous
method returns an error, not if it fails. To ensure that the authentication
succeeds even if all methods return an error, specify none as the final
method in the command line.
Example
The following example configures HTTPS authentication.
Console(config)#
none
ip https authentication radius tacacs local
The show authentication methods Privileged EXEC mode command
displays information about the authentication methods.
Syntax
show authentication methods
Page 36
36CHAPTER 2: AAA COMMANDS
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the authentication configuration.
packets. ICMP packets that are filtered by ICMP message type can also
be filtered by the ICMP message code. (Range: 0-255)
Enter a number or one of the following values: dvmrp, host-query, host-report, pim or trace. (Range: 0-255)
0-65535)
■ list-of-flags — Specifies a list of TCP flags that can be triggered. If a
flag is set, it is prefixed by “+”. If a flag is not set, it is prefixed by “-”.
The possible values are: +urg, +ack, +psh, +rst, +syn, +fin, -urg,
-ack, -psh, -rst, -syn and -fin. The flags are concatenated into one
string. For example: +fin-ack.
Default Configuration
No IPv4 ACL is defined.
Command Mode
IP-Access List Configuration mode
User Guidelines
Use the ip access-list Global Configuration mode command to enable
the IP-Access List Configuration mode.
Before an Access Control Element (ACE) is added to an ACL, all packets
are permitted. After an ACE is added, an implied deny-any-any
condition exists at the end of the list and those packets that do not match
the conditions defined in the permit statement are denied.
Page 45
deny (IP)45
Example
The following example shows how to define a permit statement for an IP
ACL.
Console(config)#
Console(config-ip-al)#
ip access-list
permit
rsvp 192.1.1.1 0.0.0.0
ip-acl1
any dscp
56
deny (IP)The deny IP-Access List Configuration mode command denies traffic if
the conditions defined in the deny statement match.
■ disable-port — Specifies that the port is disabled.
■ source — Specifies the IP address or host name from which the packet
was sent. Specify any to indicate IP address 0.0.0.0 and mask
255.255.255.255.
■ source-wildcard — (Optional for the first type) Specifies wildcard bits
by placing 1s in bit positions to be ignored. Specify any to indicate IP
address 0.0.0.0 and mask 255.255.255.255.
■ destination — Specifies the IP address or host name to which the
packet is being sent. Specify any to indicate IP address 0.0.0.0 and
mask 255.255.255.255.
■ destination-wildcard — (Optional for the first type) Specifies wildcard
bits by placing 1s in bit positions to be ignored. Specify any to
indicate IP address 0.0.0.0 and mask 255.255.255.255.
■ protocol — Specifies the abbreviated name or number of an IP
protocol. The following table lists protocols that can be specified:
Page 46
46CHAPTER 3: ACL COMMANDS
IP Protocol
Abbreviated
Name
Protocol
Number
Internet Control Message Protocolicmp1
Internet Group Management Protocoligmp2
IP in IP (encapsulation) Protocolip4
Transmission Control Protocol tcp6
Exterior Gateway Protocolegp8
Interior Gateway Protocoligp9
User Datagram Protocoludp17
Host Monitoring Protocolhmp20
Reliable Data Protocolrdp27
Inter-Domain Policy Routing Protocolidpr35
Ipv6 protocolipv641
Routing Header for IPv6ipv6-route43
Fragment Header for IPv6ipv6-frag44
Inter-Domain Routing Protocolidrp45
Reservation Protocolrsvp46
General Routing Encapsulationgre47
Encapsulating Security Payload (50)esp50
Authentication Headerah51
ICMP for IPv6ipv6-icmp58
EIGRP routing protocoleigrp88
Open Shortest Path Protocolospf89
IP-within-IP Encapsulation Protocolipip94
Protocol Independent Multicastpim103
Layer Two Tunneling Protocoll2tp115
ISIS over IPv4isis124
(any IP protocol)any(25504)
■ dscp — Indicates matching the dscp number with the packet dscp
value.
■ ip-precedence — Indicates matching ip-precedence with the packet
ip-precedence value.
Page 47
mac access-list47
Default Configuration
This command has no default configuration
Command Mode
IP-Access List Configuration mode
User Guidelines
Use the ip access-list Global Configuration mode command to enable
the IP-Access List Configuration mode.
Before an Access Control Element (ACE) is added to an ACL, all packets
are permitted. After an ACE is added, an implied deny-any-any
condition exists at the end of the list and those packets that do not match
the defined conditions are denied.
Example
The following example shows how to define a permit statement for an IP
ACL.
Console(config)# ip access-list ip-acl1
Console(config-ip-al)# deny rsvp 192.1.1.1 0.0.0.255 any
mac access-list The mac access-list Global Configuration mode command enables the
MAC-Access List Configuration mode and creates Layer 2 ACLs. To delete
an ACL, use the no form of this command.
Syntax
mac access-list name
no mac access-list name
Parameters
■ name — Specifies the name of the ACL. (Range: 0-32 characters)
Default Configuration
The default for all ACLs is deny all.
Command Mode
Global Configuration mode
Page 48
48CHAPTER 3: ACL COMMANDS
User Guidelines
There are no user guidelines for this command.
Example
The following example shows how to create a MAC ACL.
Console(config)#
Console(config-mac-al)#
mac access-list
macl-acl1
permit (MAC)The permit MAC-Access List Configuration mode command defines
permit conditions of an MAC ACL.
Syntax
permit {any | {host source source-wildcard} any | {destination
destination-wildcard}} [vlan vlan-id] [cos cos cos-wildcard] [ethtype
eth-type]
Parameters
■ source — Specifies the source MAC address of the packet.
■ source-wildcard — Specifies wildcard bits to be applied to the source
MAC address. Use 1s in bit positions to be ignored.
■ destination — Specifies the MAC address of the host to which the
packet is being sent.
■ destination-wildcard — Specifies wildcard bits to be applied to the
destination MAC address. Use 1s in bit positions to be ignored.
■ vlan-id — Specifies the ID of the packet vlan. (Range: 0-4095)
■ cos — Specifies the Class of Service (CoS) for the packet. (Range: 0-7)
■ cos-wildcard — Specifies wildcard bits to be applied to the CoS.
■ eth-type — Specifies the Ethernet type of the packet .(Range:
0-65535)
Default Configuration
No MAC ACL is defined.
Command Mode
MAC-Access List Configuration mode
Page 49
deny (MAC)49
User Guidelines
Before an Access Control Element (ACE) is added to an ACL, all packets
are permitted. After an ACE is added, an implied deny-any-any
condition exists at the end of the list and those packets that do not match
the conditions defined in the permit statement are denied.
If the VLAN ID is specified, the policy map cannot be connected to the
VLAN interface.
Example
The following example shows how to create a MAC ACL with permit
rules.
Console(config)#
Console(config-mac-al)#
vlan 6
mac access-list
permit 6:6:6:6:6:6 0:0:0:0:0:0 any
macl-acl1
deny (MAC)The deny MAC-Access List Configuration mode command denies traffic
if the conditions defined in the deny statement match.
■ disable-port — Indicates that the port is disabled if the statement is
deny.
■ source — Specifies the MAC address of the host from which the
packet was sent.
■ source-wildcard — (Optional for the first type) Specifies wildcard bits
by placing 1s in bit positions to be ignored.
■ destination — Specifies the MAC address of the host to which the
packet is being sent.
■ destination-wildcard — (Optional for the first type) Specifies wildcard
bits by placing 1s in bit positions to be ignored.
■ vlan-id — Specifies the ID of the packet vlan.
■ cos — Specifies the packets’s Class of Service (CoS).
Page 50
50CHAPTER 3: ACL COMMANDS
■ cos-wildcard — Specifies wildcard bits to be applied to the CoS.
■ eth-type — Specifies the packet’s Ethernet type.
Default Configuration
This command has no default configuration.
Command Mode
MAC-Access List Configuration mode
User Guidelines
MAC BPDU packets cannot be denied.
This command defines an Access Control Element (ACE). An ACE can
only be removed by deleting the ACL, using the no mac access-list
Global Configuration mode command. Alternatively, the Web-based
interface can be used to delete ACEs from an ACL.
Before an Access Control Element (ACE) is added to an ACL, all packets
are permitted. After an ACE is added, an implied deny-any-any
condition exists at the end of the list and those packets that do not match
the conditions defined in the permit statement are denied.
If the VLAN ID is specified, the policy map cannot be connected to the
VLAN interface.
Example
The following example shows how to create a MAC ACL with deny rules
on a device.
Console(config)#
Console (config-mac-acl)#
mac access-list
deny
6:6:6:6:6:6:0:0:0:0:0:0
macl1
any
service-aclThe service-acl Interface Configuration mode command applies an ACL
to the input interface. To detach an ACL from an input interface, use the
no form of this command.
Syntax
service-acl {input acl-name}
no service-acl {input}
Page 51
show access-lists51
Parameters
■ acl-name—Specifies the ACL to be applied to the input interface.
■ port-channel-number — A valid port-channel number.
■ permanent — The address can only be deleted by the no bridge
address command.
■ delete-on-reset — The address is deleted after reset.
■ delete-on-timeout — The address is deleted after "age out" time
has expired.
■ secure — The address is deleted after the port changes mode to
unlock learning (no port security command). This parameter is only
available when the port is in the learning locked mode.
Default Configuration
No static addresses are defined. The default mode for an added address is
permanent.
Page 56
56CHAPTER 4: ADDRESS TABLE COMMANDS
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
Using the no form of the command without specifying a MAC address
deletes all static MAC addresses belonging to this VLAN).
Example
The following example adds a permanent static MAC-layer station source
address 3aa2.64b3.a245 on port 1 to the bridge table.
bridge multicast
filtering
Console(config)#
Console(config-if)#
permanent
interface vlan
bridge address
2
3aa2.64b3.a245
ethernet
g16
The bridge multicast filtering Global Configuration mode command
enables filtering multicast addresses. To disable filtering multicast
addresses, use the no form of this command.
Syntax
bridge multicast filtering
no bridge multicast filtering
Default Configuration
Filtering multicast addresses is disabled. All multicast addresses are
flooded to all ports.
Command Mode
Global Configuration mode
User Guidelines
If multicast devices exist on the VLAN, do not change the unregistered
multicast addresses state to drop on the switch ports.
Page 57
bridge multicast address57
If multicast devices exist on the VLAN and IGMP-snooping is not enabled,
the bridge multicast forward-all command should be used to enable
forwarding all multicast packets to the multicast switches.
Example
In the folowing example, bridge multicast filtering is enabled.
bridge multicast
address
Console(config)#
bridge multicast filtering
The bridge multicast address Interface Configuration (VLAN) mode
command registers a MAC-layer multicast address in the bridge table and
statically adds ports to the group. To unregister the MAC address, use the
no form of this command.
no bridge multicast address {mac-multicast-address |
ip-multicast-address}
Parameters
■ add — Adds ports to the group. If no option is specified, this is the
default option.
■ remove — Removes ports from the group.
■ mac-multicast-address — A valid MAC multicast address.
■ ip- multicast-address — A valid IP multicast address.
■ interface-list — Separate nonconsecutive Ethernet ports with a
comma and no spaces; a hyphen is used to designate a range of ports.
■ port-channel-number-list — Separate nonconsecutive port-channels
with a comma and no spaces; a hyphen is used to designate a range
of ports.
Page 58
58CHAPTER 4: ADDRESS TABLE COMMANDS
Default Configuration
No multicast addresses are defined.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
If the command is executed without add or remove, the command only
registers the group in the bridge database.
Static multicast addresses can only be defined on static VLANs.
Example
The following example registers the MAC address:
bridge multicast
forbidden address
Console(config)#
Console(config-if)#
interface vlan
bridge multicast address
8
01:00:5e:02:02:03
The following example registers the MAC address and adds ports
statically.
Console(config)#
Console(config-if)#
add ethernet
interface vlan
bridge multicast address
g1, g2
8
01:00:5e:02:02:03
The bridge multicast forbidden address Interface Configuration
(VLAN) mode command forbids adding a specific multicast address to
specific ports. Use the no form of this command to restore the default
configuration.
The bridge multicast forward-all Interface Configuration (VLAN) mode
command enables forwarding all multicast packets on a port. To restore
the default configuration, use the no form of this command.
with a comma and no spaces; a hyphen is used to designate a range
of port-channels.
Default Configuration
This setting is disabled.
bridge multicast
forbidden
forward-all
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
There are no user guidelines for this command.
Example
In this example, all multicast packets on port 8 are forwarded.
Console(config)#
Console(config-if)#
ethernet g8
interface vlan 2
bridge multicast forward-all add
The bridge multicast forbidden forward-all Interface Configuration
(VLAN) mode command forbids a port to be a forward-all-multicast port.
To restore the default configuration, use the no form of this command.
with a comma and no spaces; a hyphen is used to designate a range
of port-channels.
Default Configuration
This setting is disabled.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
IGMP snooping dynamically discovers multicast device ports. When a
multicast device port is discovered, all the multicast packets are
forwarded to it unconditionally.
This command prevents a port from becoming a multicast device port.
Example
In this example, forwarding all multicast packets to g1 with VLAN 2 is
forbidden.
Console(config)#
Console(config-if)#
add ethernet g
interface vlan
bridge multicast forbidden forward-all
1
2
Page 62
62CHAPTER 4: ADDRESS TABLE COMMANDS
bridge aging-timeThe bridge aging-time Global Configuration mode command sets the
address table aging time. To restore the default configuration, use the no
form of this command.
Syntax
bridge aging-time seconds
no bridge aging-time
Parameters
■ seconds — Time in seconds. (Range: 10-630 seconds)
Default Configuration
The default setting is 300 seconds.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
In the following example, the bridge aging time is set to 250 seconds.
In this example, port g1 forwards all packets without learning addresses
of packets from unknown sources and sends traps every 100 seconds if a
packet with an unknown source address is received.
Console(config)#
Console(config-if)#
interface ethernet
port security forward trap
g1
100
port security modeThe port security mode Interface Configuration mode command
configures the port security mode. To restore the default configuration,
use the no form of this command.
Syntax
port security mode {lock | mac-addresses}
no port security mode
Parameters
■ lock — Saves the current dynamic MAC addresses associated with the
port and disables learning, relearning and aging.
■ mac-addresses — Deletes the current dynamic MAC addresses
associated with the port and learns up to the maximum number
addresses allowed on the port. Relearning and aging are enabled.
In this example, port security mode is set to dynamic for Ethernet
interface g7.
port security routed
secure-address
Console(config)#
Console(config-if)#
interface ethernet
port security mode mac-addresses
g7
The port security routed secure-address Interface Configuration
(Ethernet, port-channel) mode command adds a MAC-layer secure
address to a routed port. Use the no form of this command to delete a
MAC address.
Syntax
port security routed secure-addressmac-address
no port security routed secure-address mac-address
Parameters
■ mac-address — A valid MAC address.
Default Configuration
No addresses are defined.
Command Mode
Interface Configuration (Ethernet, port-channel) mode. Cannot be
configured for a range of interfaces (range context).
User Guidelines
Page 66
66CHAPTER 4: ADDRESS TABLE COMMANDS
The command enables adding secure MAC addresses to a routed port in
port security mode. The command is available when the port is a routed
port and in port security mode. The address is deleted if the port exits the
security mode or is not a routed port.
Example
In this example, the MAC-layer address 66:66:66:66:66:66 is added to
port g1.
show bridge
address-table
Console(config)#
Console(config-if)#
66:66:66:66:66:66
interface ethernet
port security routed secure-address
g1
The show bridge address-table Privileged EXEC mode command
displays all entries in the bridge-forwarding database.
Syntax
show bridge address-table [vlan vlan] [ethernet interface |
port-channel port-channel-number | address mac address]
Parameters
■ vlan — Specifies a valid VLAN, such as VLAN 1.
■ interface — A valid Ethernet port.
■ port-channel-number — A valid port-channel number.
■ mac address — A valid MAC address.
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
Page 67
show bridge address-table static67
User Guidelines
Internal usage VLANs (VLANs that are automatically allocated on ports
with a defined Layer 3 interface) are presented in the VLAN column by a
port number and not by a VLAN ID.
"Special" MAC addresses that were not statically defined or dynamically
learned are displayed in the MAC address table. This includes, for
example, MAC addresses defined in ACLS.
Example
In this example, all classes of entries in the bridge-forwarding database
are displayed.
show bridge
address-table static
Console#
Aging time is 300 sec
interfacemac addressPortType
---------------------------------100:60:70:4C:73
100:60:70:8C:73
20000:10:0D:48:37
show bridge address-table
g8dynamic
:FF
g8dynamic
:FF
g9static
:FF
The show bridge address-table static Privileged EXEC mode command
displays statically created entries in the bridge-forwarding database.
interface ethernetThe interface ethernet Global Configuration mode command enters
the interface configuration mode to configure an Ethernet type interface.
Syntax
interface ethernetinterface
Parameters
■ interface — Valid Ethernet port. Elana
Default Configuration
This command has no default configuration.
Command Mode
interface range
ethernet
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example enables configuring Ethernet port g18.
Console(config)#
The interface range ethernet Global Configuration mode command
configures multiple Ethernet type interfaces at the same time.
Syntax
interface range ethernet {port-list | all}
interface ethernet
g18
Page 78
78CHAPTER 5: ETHERNET CONFIGURATION COMMANDS
Parameters
■ port-list — List of valid ports. Where more than one port is listed,
separate the nonconsecutive ports with a comma and no spaces, use a
hyphen to designate a range of ports and group a list separated by
commas in brackets.
■ all — All Ethernet ports.
Default Configuration
This command has no default configuration.
Command Mode
Global Configuration mode
User Guidelines
Commands under the interface range context are executed
independently on each active interface in the range. If the command
returns an error on one of the active interfaces, it does not stop executing
commands on other active interfaces.
Example
The following example shows how ports g18 to g20 and g1 to g24 are
grouped to receive the same command.
command configures the speed of a given Ethernet interface when not
using auto-negotiation. To restore the default configuration, use the no
form of this command.
configures the full/half duplex operation of a given Ethernet interface
when not using auto-negotiation. To restore the default configuration,
use the no form of this command.
Syntax
duplex {half | full}
Parameters
■ no duplex
■ half — Forces half-duplex operation
■ full — Forces full-duplex operation
Default Configuration
The interface is set to full duplex.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
When configuring a particular duplex mode on the port operating at
10/100 Mbps, disable the auto-negotiation on that port.
Half duplex mode can be set only for ports operating at 10 Mbps or 100
Mbps.
Example
The following example configures the duplex operation of Ethernet port
g1 to full duplex operation.
command enables auto-negotiation operation for the speed and duplex
parameters of a given interface. To disable auto-negotiation, use the no
form of this command.
If capabilities were specified when auto-negotiation was previously
entered, not specifying capabilities when currently entering
auto-negotiation overrides the previous configuration and enables all
capabilities.
Example
The following example enables auto-negotiation on Ethernet port 1.
FCS ErrorsCounted received frames that are an integral number of
Single Collision
Frames
Late CollisionsNumber of times that a collision is detected later than one
Excessive CollisionsNumber of excessive collisions received on the selected
Oversize PacketsCounted frames received that exceed the maximum
Internal MAC Rx
Errors
Received Pause
Frames
Transmitted Pause
Frames
octets in length but do not pass the FCS check.
Counted frames that are involved in a single collision, and
are subsequently transmitted successfully.
slotTime into the transmission of a packet.
interface.
permitted frame size.
Counted frames for which reception fails due to an
internal MAC sublayer received error.
Counted MAC Control frames received with an opcode
indicating the PAUSE operation.
Counted MAC Control frames transmitted on this
interface with an opcode indicating the PAUSE operation.
port storm-control
include-multicast
(GC)
The port storm-control include-multicast Interface Configuration
mode command enables counting multicast packets in the port storm-control broadcast rate command. To disable counting multicast
packets, use the no form of this command.
Syntax
port storm-control include-multicast
no port storm-control include-multicast
Default Configuration
Multicast packets are not counted.
Command Modes
Interface Configuration (Ethernet) mode
Page 95
port storm-control include-multicast (IC)95
User Guidelines
To control multicasts storms, use the port storm-control broadcast
enable and port storm-control broadcast rate commands.
Example
The following example enables counting multicast packets.
port storm-control
include-multicast
(IC)
Console#
Console(config-if)#
Console(config-if)# port storm-control iinclude-multicast
unknown-unicast
configure
port storm-control include-multicast
The port storm-control include-multicast Interface Configuration
(Ethernet) mode command counts multicast packets in broadcast storm
control. To disable counting multicast packets, use the no form of this
command.
Syntax
port storm-control include-multicast [unknown-unicast]
no port storm-control include-multicast
Parameters
■ unknown-unicast — Specifies also counting unknown unicast
packets.
Default Configuration
Multicast packets are not counted.
Command Modes
Interface Configuration (Ethernet) mode
User Guidelines
There are no user guidelines for this command.
Page 96
96CHAPTER 5: ETHERNET CONFIGURATION COMMANDS
Example
The following example enables counting broadcast and multicast packets
on Ethernet port 2.
port storm-control
broadcast enable
Console(config)#
Console(config-if)#
unknown-unicast
interface ethernet
port storm-control include-multicast
2
The port storm-control broadcast enable Interface Configuration
(Ethernet) mode command enables broadcast storm control. To disable
broadcast storm control, use the no form of this command.
Syntax
port storm-control broadcast enable
no port storm-control broadcast enable
Default Configuration
Broadcast storm control is disabled.
Command Modes
Interface Configuration (Ethernet) mode
User Guidelines
Use the port storm-control broadcast rate Interface Configuration
(Ethernet) mode command, to set the maximum allowable broadcast
rate.
Use the port storm-control include-multicast Global Configuration
mode command to enable counting multicast packets in the storm
control calculation.
Example
The following example enables broadcast storm control on port 1 of a
device.
Console(config)#
Console(config-if)#
interface ethernet
port storm-control broadcast enable
1
Page 97
port storm-control broadcast rate97
port storm-control
broadcast rate
The port storm-control broadcast rate Interface Configuration
(Ethernet) mode command configures the maximum broadcast rate. To
restore the default configuration, use the no form of this command.
Syntax
port storm-control broadcast rate rate
no port storm-control broadcast rate
Parameters
■ rate — Maximum kilobits per second of broadcast and multicast traffic
on a port. (Range of 3500-1000000)
Default Configuration
The default storm control broadcast rate is 3500 Kbits/Sec.
Command Mode
Interface Configuration (Ethernet) mode
User Guidelines
Use the port storm-control broadcast enable Interface Configuration
mode command to enable broadcast storm control.
show ports
storm-control
Example
The following example configures a port storm-control broadcast rate
4000 on port g2.
(config)#
Console(config-if)#
interface ethernet
port storm-control broadcast rate
g2
4000
The show ports storm-control Privileged EXEC mode command
displays the storm control configuration.
Syntax
show ports storm-control [interface]
Parameters
■ interface — A valid Ethernet port. Elana
Page 98
98CHAPTER 5: ETHERNET CONFIGURATION COMMANDS
Default Configuration
This command has no default configuration.
Command Modes
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the storm control configuration.