Permanent Assignments on AR400 Series Routers ..........................................197
Software Version 2.8.1
C613-10477-00 REV B
4IntroductionRelease Note
Introduction
Allied Telesis announces the release of Software Version 2.8.1 on the products
in the following table. This Release Note describes the new features and
enhancements.
Product seriesModels
x-900-48FEx-900-48FE, x-900-48FE-N
AT-9900AT-9924T, AT-9924SP, AT-9924T/4SP
AT-8900AT-8948
AT-9800AT-9812T, AT-9816GB
Rapier iRapier 24i, Rapier 48i, Rapier 16fi
AT-8800AT-8824, AT-8848
AT-8700XLAT-8724XL, AT-8748XL
AT-8600AT-8624T/2M, AT-8624PoE, AT-8648T/2SP
AR700AR725, AR745, AR750S, AR770S
AR400AR415S, AR440S, AR441S, AR442S, AR450S
The product series that each feature and enhancement applies to are shown in
“Overview of New Features” on page 6. This Release Note should be read in
conjunction with the Installation and Safety Guide or Quick Install Guide,
Hardware Reference, and Software Reference for your router or switch. These
documents can be found on the Documentation and Tools CD-ROM packaged
with your router or switch, or:
www.alliedtelesis.com/support/software
This Release Note has the following structure:
1.Upgrading to Software Version 2.8.1
This section lists the names of the files that may be downloaded from the
web site.
2.Overview of New Features
This section lists the new features and shows the product families on which
each feature is supported.
3.Descriptions of New Features
These sections describe how to configure each new feature.
Caution: Information in this document is subject to change without notice and
does not represent a commitment on the part of Allied Telesis Inc. While every
effort has been made to ensure that the information contained within this
document and the features and changes described are accurate, Allied Telesis
Inc. can not accept any type of liability for errors in, or omissions arising from,
the use of this information.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.15
Upgrading to Software Version 2.8.1
Software Version 2.8.1 is available as a flash release that can be downloaded
directly from the Software/Documentation area of the Allied Telesis website:
www.alliedtelesis.com/support/software
Software versions must be licenced and require a password to activate. To
obtain a licence and password, contact your authorised Allied Telesis
distributor or reseller.
The following table lists the file names for Software Version 2.8.1.
Product nameRelease fileGUI resource fileCLI help file
The asexternal parameter of the set ospf command has changed. See OSPF
backward compatibility).
6Overview of New FeaturesRelease Note
Overview of New Features
The following table lists the new features and enhancements by product series.
For supported models, see “Introduction” on page 4.
AR400
AR7x5
AR750S
Rapier
AT-8800
AT-8700XL
AT-8600
AT-9800
AT-8900
x900-48FE
System: Clearing System Parameters
99999999999
AT-9900
System: Extended Monitoring of CPU Utilisation
CLI: Command Line Interface (CLI) Enhancements
File System: File System Enhancement
Switching: Ordering Hardware Filters in 48-Port Switches
Switching: Limiting Rapid MAC Movement
Switching: Route Update Queue Length
Switching: Removing a Description from a Switch Port
Switching: Securing a Single VLAN through Switch Filters
Switching: Change of Debug Command Syntax
Switching: Enhanced Static Switch Filtering on Ports within a
Trunk Group
Switching: Ethernet Protection Switching Ring (EPSR)
MSTP: MSTP Enhancement
STP: STP Enhancement
Asyn Ports: Making Asynchronous Ports Respond More
Quickly
PPPoE: PPPoE Access Concentrator
99999999999
99999999999
99999999999
9999
999
999
9999999999
9999
99
99999
999
9999999
99999999
99999999999
999999999
IGMP: IGMP Proxy on x900 Series Switches
IGMP: IGMP filtering extended to all IGMP message types
IGMP: Monitoring reception of IGMP general query messages
IP: Expanded number of Eth interfaces per physical interface
IP: Expanded IP Troubleshooting
IP: IP Route Preference Options
IP: IPv4 Filter Expansion
IP: Enhancements to Display of UDP Connections over IPv4
IP: Waiting for a Response to an ARP Request
IP: Adding Static ARP Entries with Multicast MAC Addresses
IP: Enhanced Static ARP Entry Filtering on Ports within a
Trunk Group
IPv6: Display of UDP Connections over IPv6
999
99999999999
99999999999
999
99999999999
99999999999
99999999999
99999999999
99999999999
99999999999
99999999
999999999
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.17
AR400
AR7x5
AR750S
Rapier
AT-8800
AT-8700XL
AT-8600
AT-9800
AT-8900
x900-48FE
IPv6: IPv6 Tunnel Expansion
9
AT-9900
L2TP: Decoding Debug Output and Setting a Time Limit for
Debugging
L2TP: Resetting General L2TP Counters
L2TP: Handling PPP Link Negotiation Failures
OSPF: OSPF Interface Password
OSPF: NSSA Translator Role
OSPF: Redistributing External Routes
BGP: BGP Backoff Lower Threshold
BGP: BGP Peer and Peer Template Enhancements
BGP: Displaying Routes Learned from a Specific BGP Peer
MLD: MLD Packet Formats
MLD: ICMP type for MLDv2 Reports
MLD: MLD Snooping Group Membership Display
MLD: Change of Maximum Query Response Interval for MLD
Classifier: Extension to Range of Classifier fields for x900
Switches
QoS: Port Groups
999999999
999999999
999999999
99999999999
99999999999
99999999999
999999999
999999999
999999999
999999999
999999999
999999
999999999
999
999
QoS: Storm protection
SCP: Configuring Secure Copy
SCP: Loading using Secure Copy
SCP: Uploading using Secure Copy
SSL: SSL Counter Enhancement
Firewall: Firewall Licencing
Firewall: Disabling SIP ALG Call ID Translation
Firewall: Displaying SIP ALG Session Details
Firewall: Firewall Policy Rules Expansion
Firewall: Displaying a Subset of Policy Rules
IPSEC/VPN: Responding to IPsec Packets from an Unknown
Tunn el
IPSEC/VPN: Modifying the Message Retransmission Delay
IPSEC/VPN: Retrying ISAKMP Phase 1 and 2 Negotiations
IPSEC/VPN: VPN Tunnel Licencing
SNMP MIBs: SHDSL Line MIB
999
99999999999
99999999999
99999999999
99999999999
999999
99999
99999
99999
999999
99999
99999
99999
99999
9
SNMP MIBs: Logging SNMP operation
Software Version 2.8.1
C613-10477-00 REV B
99999999999
8Overview of New FeaturesRelease Note
AR400
AR7x5
AR750S
Rapier
AT-8800
AT-8700XL
AT-8600
AT-9800
AT-8900
x900-48FE
SNMP MIBs: Traps on OSPF state changes
99999999999
AT-9900
SNMP MIBs: Trap on VRRP topology changes
SNMP MIBs: Traps on MSTP state and topology changes
SNMP MIBs: Restart Log
SNMP MIBs: Trap on Login Failures
SNMP MIBs: VLAN-based port state changes
SNMP MIBs: Trap on Memory Levels
CDP: CDP over WAN Interfaces
Permanent Assignments on AR400 Series Routers
99999999999
9999999
99999999999
99999999999
99999999999
99999999999
999999999
9
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.19
System Enhancements
This Software Version includes the following enhancements to system
commands:
■Clearing System Parameters
■Extended Monitoring of CPU Utilisation
This section describes the enhancements. The new and modified commands to
implement them are described in Command Reference Updates.
Clearing System Parameters
The option none has been added to the following commands:
set system name={name|none}
set system contact={contact-name|none}
set system location={location|none}
This allows you to clear a previously specified system name, contact name or
location. For example, to clear the system name, use one of the commands:
set sys nam=none
set sys nam=””
set sys nam=
set sys nam
Command Changes
The following table summarises the modified commands:
CommandChange
set system nameNew none option for name parameter
set system contactNew none option for contact parameter
set system locationNew none option for location parameter
Extended Monitoring of CPU Utilisation
This Software Version includes a new feature for monitoring CPU utilisation.
You can now set the router or switch to capture data about which specific
functions the CPU is executing, and the level of instantaneous usage the CPU is
experiencing. This allows you, in conjunction with your authorised distributor
or reseller, to diagnose the causes of high rates of CPU utilisation on the router
or switch.
Software Version 2.8.1
C613-10477-00 REV B
You can set the router or switch to capture data continuously, or only when the
CPU experiences a specific level of instantaneous usage. The router or switch
holds up to 500 entries (10 seconds) of data about CPU utilisation.
10System EnhancementsRelease Note
To capture data when the CPU is experiencing a specific amount of
instantaneous usage, set the start and start percentages with the command:
activate cpu extended start=1..100 [stop=1..100]
When a start percentage is set, the router or switch automatically disables
extended monitoring once it has 500 data entries.
To enable extended monitoring, use the command:
enable cpu extended
This command also lets you capture data immediately, without first setting
start and stop percentages. This adds data entries continuously, until you stop
it. Only the last 10 seconds of data entries are stored.
To stop capturing data, and reset the start and stop parameters if they are set,
use the command:
disable cpu extended
To remove data entries and reset the start and stop parameters in the activate
cpu extended command, use the command:
reset cpu utilisation
This command interrupts active data capturing for a specific event. However,
monitoring remains enabled, and continues to collect data. This means you can
capture data for a particular event without having to disable and re-enable this
feature.
Command Changes
The following table summarises the new and modified commands:
CommandChange
activate cpu extendedNew command.
disable cpu extendedNew command.
enable cpu extendedNew command.
reset cpu utilisationModified command.
show cpuNew extended parameter in command.
New output field when extended parameter is used.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.111
Command Reference Updates
This section describes each new command and the changed portions of
modified commands and output screens. For modified commands and output,
the new parameters, options, and fields are shown in bold.
activate cpu extended
SyntaxACTivate CPU EXTended STARt=1..100 [STOp=1..100]
DescriptionThis new command lets you set monitoring so that it captures data when the
CPU experiences a specific amount of instantaneous usage.
The start parameter sets the percentage of utilisation the CPU must equal or
exceed before it can begin capturing data. When CPU utilisation reaches the
parameter, the router or switch begins capturing data. It continues until
utilisation falls below the stop parameter, or until it captures 500 entries (10
seconds worth).
The stop parameter sets the percentage of utilisation the CPU must reach to
stop data capturing. If CPU utilisation falls below the stop percentage before
the router or switch has 500 data entries, then the router or switch resumes data
capturing the next time utilisation reaches the start percentage. When the
router or switch has 500 entries, it stops collecting data.
ExampleTo capture extended CPU utilisation data when CPU utilisation exceeds 70%
and until it falls below 50%, use the command:
act cpu ext star=70 sto=50
disable cpu extended
SyntaxDISable CPU EXTended
DescriptionThis new command stops data capture of CPU utilisation, and resets
parameters in the activate cpu extended command.
ExampleTo stop capturing extended CPU utilisation data, use the command:
dis cpu ext
Software Version 2.8.1
C613-10477-00 REV B
enable cpu extended
SyntaxENAble CPU EXTended
DescriptionThis new command lets you capture up to 500 data entries (10 seconds) of CPU
utilisation data. Extended monitoring is disabled by default. This command
takes effect when you enter it, or use the activate cpu extended command to
collect data during specific usage levels.
ExampleTo begin capturing extended CPU utilisation data, use the command:
ena cpu ext
12System EnhancementsRelease Note
reset cpu utilisation
SyntaxRESET CPU UTIlisation
DescriptionThis command, which resets all CPU utilisation percentages, has been
modified to include resetting any start and stop percentages set with the
activate cpu extended command. It also removes any data captured during
extended utilisation monitoring, and clears this output from the show cpu
command.
ExampleTo reset the CPU utilisation, use the command:
reset cpu util
set system contact
SyntaxSET SYStem CONtact={contact-name|NONE}
The contact parameter specifies the contact name, which is:
■displayed in the output of the show system command
■stored in the MIB object sysContact
If the new option none is specified, no contact name is defined. Any existing
contact name is cleared. The default is none.
set system location
SyntaxSET SYStem LOCation={location|NONE}
The location parameter specifies the location of the router or switch, which is:
■displayed in the output of the show system command
■stored in the MIB object sysLocation
If the new option none is specified, no location is defined. Any existing
location is cleared. The default is none.
set system name
SyntaxSET SYStem NAMe={name|NONE}
The name parameter specifies the system name of the router or switch, which
is:
■displayed in the output of the show system command
■displayed in the CLI prompt so you know which router or switch you are
configuring
■stored in the MIB object sysName
If the new option none is specified, no name is defined. Any existing name is
cleared. The default is none.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.113
show cpu
SyntaxSHow CPU [EXTended]
DescriptionThe new extended parameter in this command displays information about
extended CPU utilisation data.
Figure 1: Example output from the show cpu extended command
Table 1: New parameters in output of the show cpu=extended command
ParameterMeaning
StateWhether extended CPU utilisation is enabled.
Current TimeCurrent time in hh:mm:ss format. The time in
milliseconds since midnight, and the current timestamp
are also in brackets.
Current InstallCurrent installed release, with the size of the release in
brackets.
Start percentPercentage of utilisation that the CPU must reach, if any,
before the router or switch can begin capturing
extended CPU utilisation data. A “-” shows if no
percentage is set.
Stop percentPercentage of utilisation that the CPU must fall below
before the router or switch stops capturing extended
CPU utilisation data.
msSMTime when the router or switch captured the CPU
utilisation sample. The time format is milliseconds since
midnight, in hexadecimal notation.
TimestampTime when the router or switch captured the CPU
utilisation sample. The time format is microseconds
since the router or switch last restarted. This figure
wraps at 4 294 967 295 to return to 0.
UtilPercentage of instantaneous CPU utilisation.
CallerReturn address of the function that the CPU is
executing.
Return 1, Return 2, Return 3Return addresses for function calls on the CPU stack.
ExampleTo display the extended CPU utilisation data, use the command:
sh cpu ext
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.115
keywords
action
placeholder
value
option
parameters
Command Line Interface (CLI)
Enhancements
The CLI has been enhanced in the following ways:
■More flexibility in Separating Parameters and Values
■Additional Shortcuts when Editing
■New command show command history that displays past commands.
Please note that it replaces the Ctrl-C shortcut.
■You can now use the create config command to also set the router or
switch to use the new configuration file.
This section describes the enhancements. The new and modified commands to
implement them are described in Command Reference Updates.
More flexibility in Separating Parameters and Values
The CLI has been enhanced to give you the flexibility of choosing whether the
equals sign should be required between parameters and their related values in
the syntax.
Parameters are keywords in a command that define the object or details of the
action. Parameter values can be numbers or text, or can come from a list of
items. Now you can set the syntax so that parameters and values can be
separated by either one of the following:
■an equals sign (=)
■a single space
The set command assignmentoperator command lets you change the syntax.
When using aliases, we suggest you use the = sign in the syntax to link
parameters with their values. Otherwise, if you separate a parameter with a
space, a matching alias could erroneously be substituted for the value. Note
that certain command handlers, such as STT, PERM, and ACC, always require
the = sign.
Parts of a Command
A command is a sequence of keywords and values that define an action for the
router or switch to perform. The Software Reference uses terms in the
following figure and table when describing commands.
keywords
Software Version 2.8.1
C613-10477-00 REV B
add ip rip interface=vlan2 auth=md5 ip=ipadd
action
value
parameters
option
placeholder
cli-command-parts
16Command Line Interface (CLI) EnhancementsRelease Note
Command Part Description
KeywordA generic term for a predefined sequence of characters that the CLI
treats as a single unit.
Actions, parameters, and some parameter values are keywords.
Keywords are not case sensitive. In this Software Reference and the
online help, uppercase letters indicate minimum keyword abbreviations.
ActionThe first keyword in a command. This defines the type of operation to
perform. Actions do not have values.
ParameterAdditional keywords that define:
• the object of the action (for example, “ip rip” in the figure above)
• the details of the action (for example, “auth” in the figure above)
Parameters are optional or required, may accept values, and are not case
sensitive. Spaces must separate parameters.
ValueThe value assigned to a parameter. Depending on the parameter, a value
can be:
• an item from a list of option keywords
• a number
• arbitrary text
Values are optional or required. Enter values with the syntax
parameter=value or parametervalue (for details, see Command
Reference Updates). Most values are not case sensitive, except for
text, such as passwords.
OptionA keyword that is one of a pre-defined list of values that a parameter
can accept.
PlaceholderA format convention that describes the value a parameter can accept.
Instead of typing the placeholder, replace it with an appropriate value.
In this Software Reference, placeholders are printed in lowercase italic
font.
DefaultThe value the router or switch uses as the parameter when you do not
enter one but the parameter requires one.
Command Changes
The following table summarises the new command.
CommandDescription
set command assignmentoperatorNew command that sets the assignment operator
of the command parser to allow either an equals
sign or a space between the parameter as the
value.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.117
Additional Shortcuts when Editing
You can now move the cursor to the beginning or end of lines by using single
keys on the keyboard.
To move the cursor to the... You could only press... Now you can also press the...
beginning of the command
line
end of the command lineCtrl+EEnd key
Command Changes
The following table summarises the changes new and modified commands.
CommandDescription
show command historyNew command that displays past commands.
create configNew set option that lets you set the switch to the
Ctrl+A Home key
Please note that it replaces the Ctrl-C shortcut.
configuration file that you create.
Software Version 2.8.1
C613-10477-00 REV B
18Command Line Interface (CLI) EnhancementsRelease Note
Command Reference Updates
This section describes each new command and the changed portions of
modified commands and output screens. For modified commands and output,
new parameters, options and fields are shown in bold.
create config
SyntaxCREate CONfig=filename [SET]
DescriptionThis command now lets you set the switch to a configuration file when you
create it. This command still requires a user with security officer privilege
when the router or switch is in security mode.
ParameterDescription
CONfigName of the configuration file or script to create. If one already exists,
it is replaced.
The filename is in the format [device:]filename.ext and can be:
DescriptionThis new command sets the assignment operator of the command parser
thereby defining the format of the command syntax for the CLI.
ParameterDescription
ASSignmentoperator Defines the operator between parameters when assigning values.
Default: Equals
EqualsRequires users to enter = sign. To ensure clarity
and accuracy, we recommend always using the =
sign.
SPaceorequalsLets users enter either the = sign or just leave a
single space between parameters.
The following commands have the same effect. Note that the first one is clearer
because of the = sign.
add ip rou=172.16.9.0 mask=255.255.255.0 int=vlan1
next=172.16.8.82 met=1
add ip rou 172.16.9.0 mask 255.255.255.0 int vlan1 next
172.16.8.82 met 1
Take care when using aliases because they match any whole word on the
command line. Therefore, if you separate a parameter with a space, a matching
alias could erroneously be substituted for the value.
Note that certain command handlers, such as those for STT, PERM, and ACC,
always require the = sign.
ExampleTo set the command processor so that you can enter a space between
parameters and values on the command line, use the command:
set com ass=sp
Software Version 2.8.1
C613-10477-00 REV B
20Command Line Interface (CLI) EnhancementsRelease Note
show command history
SyntaxSHow COMmand History
DescriptionThis new command replaces the Ctrl-C keyboard shortcut, and displays past
commands for you to select one from the list (Figure 1).
Figure 2: Example output from the show command history command
DescriptionThis new command takes output from a specific command or script and adds it
to a text file when you next issue that command or script. This is useful for
collecting debug output. If a file does not exist, one is created. While output is
being redirected, the text file cannot be edited, renamed, deleted, or uploaded.
ParameterDescription
FIleName of the text file where you want to send output. One is created
if it does not already exist.The filename is in the format
[device:]filename.txt and can be:
device indicates the physical location where the file is stored. The
default is flash.
Default: no default
COMmandCommand whose output is used to generate the text when it is next
issued. Commandstring is the command syntax enclosed in quotes.
Command and script are mutually exclusive.
SCRiptScript whose output is used to generate the text when it is next issued.
The script is treated as a simple list of commands. Flow control
statements are not accepted to ensure that the extra text the script
produces is not in the output file. Scriptname has the same format as
filename except it must have either a .cfg or .scp extension.
Command and script are mutually exclusive.
Software Version 2.8.1
C613-10477-00 REV B
22File System EnhancementRelease Note
Parameter (cont.)Description (cont.)
PERManentredirect Permanently directs output to the designated text file until the reset
file permanentredirect command is issued or the router or switch is
rebooted.
LIMITA decimal number from 0 to 1048576 bytes specifying the maximum
file size.
Default: 204800 bytes
ExamplesTo add output one time only from the show trace command to a file called
trace.txt command, use the command:
add fi=trace.txt com="show trace"
To permanently add output from the show debug command to a file called
debug2.txt command, use the command:
device indicates the physical location where the file is stored. The
default is flash.
Default: no default
FORCEOverwrites the text file if one already exists. If force is not specified
and the file exists, the command has no effect.
COMmandCommand whose output is used to generate the text when it is next
issued. Commandstring is the command syntax enclosed in quotes.
Command and script are mutually exclusive.
SCRiptScript whose output is used to generate the text when it is next issued.
The script is treated as a simple list of commands. Flow control
statements are not accepted to ensure that the extra text the script
produces is not in the output file. Scriptname has the same format as filename except it must have either a .cfg or .scp extension.
Command and script are mutually exclusive.
PERManentredirect Permanently directs output to the designated text file until the reset
file permanentredirect command is issued or the router or switch is
rebooted.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.123
ParameterDescription (cont.)
LIMITA decimal number from 0 to 1048 576 bytes specifying the maximum
file size.
Default: 204 800 bytes
ExampleTo permanently direct all debug output from the BGP module to a file named
bgp.txt, use the command:
cre fi=bgp.txt com="enable bgp debug=all" perm
reset file permanentredirect
SyntaxRESET FIle[=filename] PERManentredirect
DescriptionThis new command closes one or all text files so that they no longer receive
input from commands or scripts. After the file closes, it can be uploaded or
edited
ParameterDescription
FIleName of the text file to close. If no file is specified, all text files are
closed.
The filename is in the format [device:]filename.txt and can be:
Figure 4: Example output from the show file=filename permanentredirect command
File............ bgp.txt
TTY Instance.... 17
Current Size.... 12345
Limit........... 204800
Input(s)........ COMMAND="enable bgp debug=all"
Table 2: Parameters in output of the show file permanentredirect command
ParameterMeaning
TTY InstanceInstance number for the TTY device.
Current SizeSize of the text file in bytes.
LimitLimit of file size in bytes set by the limit parameter.
FileName of text file.
Input(s)Commands and scripts that generate input for the text file.
ExampleTo display all text files receiving output from commands or scripts, use the
command:
sh fi perm
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.125
Switching Enhancements
This Software Version includes the following enhancements to switching:
■Ordering Hardware Filters in 48-Port Switches
■Limiting Rapid MAC Movement
■Route Update Queue Length
■Removing a Description from a Switch Port
■Securing a Single VLAN through Switch Filters
■Change of Debug Command Syntax
■Enhanced Static Switch Filtering on Ports within a Trunk Group
■Ethernet Protection Switching Ring (EPSR)
This section describes the enhancements. The new and modified commands to
implement them are described in Command Reference Updates.
Ordering Hardware Filters in 48-Port Switches
This feature applies only to the following products: AT-8648, AT-8748, AT-8848,
and the Rapier 48i. These products contain 2 switching instances, which adds
complexity to the filtering process when packets are being sent between
instances.
This Software Version allows you to select between two modes of using
classifier-based packet filtering in 48-port switches: port-specific filters first, or
non port-specific filters first.
You can select different modes using the new set switch hwfiltermode
command. Selecting the right mode when setting up classifier-based packet
filters ensures that packets are filtered as expected across switch instances. The
switch defaults to port-specific filters first. You can change the filtering mode
on the switch by using the command:
set switch hwfilter mode={psf|npsf}
Port-specific filters apply to traffic either ingressing or egressing a particular
port. They use a classifier which specifies the iport or eport parameter. Non
port-specific filters can apply to all traffic travelling through the switch. Non
port-specific filters are created with a classifier that does not have the iport or
eport parameter specified.
Software Version 2.8.1
C613-10477-00 REV B
26Switching EnhancementsRelease Note
When to Use
Port-Specific Mode
Use the port-specific psf mode when you want non port-specific filters to
override the port-specific filters for certain circumstances. In the following
example:
■the first (port-specific) filter stops all traffic from ingressing port 2
■the second (port-specific) filter allows traffic with the specific IP address
(192.168.2.2) to ingress port 2
■the third (non port-specific) filter allows any ARP request (prot=0806) to
ingress and egress all ports
create classifier=1 iport=2
create classifier=2 iport=2 ipsa=192.168.2.2
create classifier=3 prot=0806
add swi hwf classifier=1 action=discard
add swi hwf classifier=2 action=nodrop
add swi hwf classifier=3 action=nodrop
In psf mode, you must enter the port-specific filters first. If you add a
port-specific filter after the non port-specific filters, the switch may still use a
matching non port-specific filter when the packet travels between ports on
different switch instances.
When to Use Non
Port-Specific Mode
Use the non port-specific npsf mode when you want port-specific filters to
override the non port-specific filters for certain circumstances. In the following
example, the second (port-specific) filter stops the first (non port-specific) filter
from discarding packets from port 50:
create class=1 ipsa=192.168.1.254/32
create class=4 ipo=50
add switch hwf class=1 ac=dis
add switch hwf class=4 ac=nod
In npsf mode, you must enter the non port-specific filters first. If you add a non
port-specific filter after the port-specific filters, the switch may not use the non
port-specific filter when the packet travels between ports on different switch
instances.
Changing ModesYou can change the filter mode after filters have been entered. When you
change modes, the filter entries remain in the original order. To see which
mode the switch is in, use the command:
show switch hwfilter
Command Changes
The following table summarises the new and modified commands:
CommandChange
set switch hwfilter modeNew command.
show switch hwfilterNew mode parameter in output.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.127
Limiting Rapid MAC Movement
This Software Version introduces the ability to limit rapid MAC movement.
MAC address thrashing occurs when MAC addresses move rapidly between
one or more ports or trunks. For example, certain MAC addresses are learnt on
one port, then very shortly afterwards are learnt on another port, then learnt on
the original port again, and so on. This typically occurs when there is an
uncontrolled loop on the network.
Disabling a portThere are different ways you can disable a port when thrashing is detected.
These are called thrash actions:
■learnDisable
Address learning is temporarily disabled on the port.
■portDisable
The port is logically disabled. Traffic flow is prevented, but the link
remains up. The device at the other end does not notice that the port has
changed status, and the link LEDs at both ends stay on. This is equivalent
to entering the disable switch port command.
■linkDown
The port is physically disabled and the link is down. This is equivalent to
entering the disable switch port link=disabled command.
■vlanDisable
The port is disabled only for the VLAN on which thrashing has occurred. It
can still receive and transmit traffic for any other VLANs of which it is a
member.
When a MAC address is thrashing between two ports, only one of those ports
is disabled. When multiple ports are involved, enough ports are disabled to
prevent the storm.
To set a thrash action for a port, use the command:
To view the thrash action that is set for a trunk, use the command:
show switch trunk={trunk}
28Switching EnhancementsRelease Note
To view details about disabled ports for VLANs, use one of the commands:
show vlan[={vlan-name|1..4094|all}]
show vlan[=all]
Re-enabling a portWhen a port is disabled, either completely or for a specific VLAN, it remains
disabled until it is manually re-enabled in any of the following ways:
■with SNMP
■as the result of a reboot
■by specifying a thrash timeout value along with the thrash action
■via the CLI
If the vlandisable thrash action has been applied, to re-enable one or more
ports from VLANs to which they belong, use the command:
enable switch port={port-list|all}
vlan[={vlan-name|1..4094|all}]
If either the portdisable or linkdown thrash action has been applied, to
re-enable one or more ports, use the command:
If the learndisable thrash action has been applied, the port is automatically
re-enabled when the defined timeout expires. You cannot manually re-enable
the port.
Port TypesLimiting rapid MAC movement is supported on all port types. It is also
supported on trunked ports.
Command Changes
The following table summarises the new and modified commands:
CommandChange
create switch trunkNew thrashaction parameter.
New thrashtimeout parameter.
enable switch port vlanNew command.
enable switch port vlanNew command.
set lacpNew thrashaction parameter.
New thrashtimeout parameter.
set switch portNew thrashaction parameter.
New thrashtimeout parameter.
New vlanstatustrap parameter.
set switch thrashlimitNew command.
set switch trunkNew thrashaction parameter.
New thrashtimeout parameter.
show lacpNew address learn thrash action parameter.
New address learn thrash timeout parameter.
show switch portNew address learn thrash status parameter.
New address learn thrash action parameter.
New address learn thrash timeout parameter.
New vlan status trap parameter.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.129
Route Update Queue Length
When hardware learning delay is enabled (the default), the switch learns new
routes in software, then places them into a queue for adding to its hardware
routing table. Defaults have been set for the maximum number of entries in the
queue, and depend on the amount of memory installed on the switch, as
shown in the following table:
Memory Size (Mbytes)Default length
(number of entries)
up to 128200000200000
129-25610000001500000
more than 25630000004000000
Maximum possible length
(number of entries)
You can alter the length of the queue, by using the following new command to
specify the maximum number of entries in the queue:
set switch hwrouteupdate=1..maximum
The maximum depends on the amount of memory on the switch, as shown in
the table above.
The purpose of this feature is to enable you to tune the balance between the
memory that the route update process uses, and the speed with which large
route updates are processed.
Output of the show switch command has been expanded to display
information about the queue settings.
Command Changes
The following table summarises the new and modified commands:
CommandChange
set switch hwrouteupdateNew command
show lacpNew fields about the hardware route update queue
Software Version 2.8.1
C613-10477-00 REV B
30Switching EnhancementsRelease Note
Removing a Description from a Switch Port
You can now return the description of a switch port to its original blank value
by entering the following command:
set switch port=port-number description=
and providing no value for the description parameter.
Command Changes
The following table summarises the modified command:
CommandChange
set switch portChanged description parameter
Securing a Single VLAN through Switch Filters
On AT-8824, Rapier 24i, AT-8724XL and AT-8624 switches only (not on 48-port
switches), this enhancement enables you to use switch filters to secure only the
current VLAN, instead of securing all VLANs on the switch. To turn on this
feature, a new command disables “vlansecure” mode for filters (see
“Configuring vlansecure” on page 31).
Without this enhancement (the default situation) a switch filter only allows a
host to access the network through a particular port on the switch. For
example, if you have a PC connected to port 15 in vlan2, and define the
following filter, the PC can only communicate when it is connected to port 15:
With this enhancement, the above filter limits the host to accessing vlan2
through port 15, but does not prevent the host from accessing other VLANs
through other ports in vlan2. For example, if the above filter exists and you
move the PC to another port in vlan2, this enhancement prevents the PC from
communicating with devices in vlan2 but allows it access to other VLANs on
the switch. The following figure shows a PC that has been moved from port 15
to port 16 to illustrate the effect.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.131
Default behaviour
(vlansecure enabled)
port 15port 16
vlan2
vlan1
Securing only the VLAN
(vlansecure disabled)
port 15port 16
vlan2
vlan1
swi-filter
Configuring vlansecure
To turn off the default behaviour, so that the filter prevents access to only the
current VLAN when you move the host, use the new command:
disable switch filter vlansecure
To return to the standard filter behaviour, use the new command:
enable switch filter vlansecure
To display which mode the filtering behaviour is in, use the existing command:
show switch filter
This command now displays the additional field VlanSecure, which is either
DISABLED or ENABLED.
Command Changes
The following table summarises the new and modified commands:
CommandChange
disable switch filter vlansecureNew command
enable switch filter vlansecureNew command
show switch filterNew VlanSecure field
Software Version 2.8.1
C613-10477-00 REV B
32Switching EnhancementsRelease Note
Change of Debug Command Syntax
This Software Version includes a change in syntax for the enable switch debug
and disable switch debug commands. To enable or disable debugging on the
switch chip operations, you now use the dev option. Previously, this type of
debugging was enabled or disabled using the m6 parameter. There is no
change in the style or type of debugging information displayed.
To enable debugging of the switch chip operations, use the command:
enable switch debug=dev [other options]
To disable debugging of the switch chip operations, use the command:
disable switch debug=dev
Command Changes
The following table summarises the modified commands:
CommandChange
disable switch debugNew dev option in debug parameter.
enable switch debugNew dev option in debug parameter.
show switch debugNew DEV option in output.
Enhanced Static Switch Filtering on Ports within a
Trunk Group
This Software Version ensures that traffic flow is not interrupted when a port
within a trunk group goes link-down.
In previous Software Versions, when a port that is part of a trunk group goes
link-down, the router or switch drops any traffic that is forwarded by a static
switch filter out of that port.
In this Software Version, when a port that is part of a trunk group goes
link-down, the router or switch modifies any static switch filters defined to
forward traffic out of that port. It modifies the egress port for the switch filter
entry to a port which is link-up within the trunk group. This ensures that traffic
can flow without interruption despite the original port going link-down.
Command Changes
This expansion does not affect any commands.
Ethernet Protection Switching Ring (EPSR)
EPSR is a protection system employed to prevent loops and provide high
resiliency within Ethernet ring based topologies. It offers:
■A rapid detection and recovery time (in the order of 50 ms, depending on
configuration) if a link or node fails.
■A faster and more effective alternative to spanning tree based options
when creating resilient ring networks.
Information about EPSR and its commands is shown in the EPSR chapter.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.133
Command Reference Updates
This section describes each new command and the changed portions of
modified commands and output screens. For modified commands and output,
new parameters, options and fields are shown in bold.
DescriptionThis command creates a trunk group on the switch and optionally adds ports
to the trunk group and sets port speed. must not be in another trunk group
The thrashaction parameter specifies the action the router or switch takes
when it detects MAC address thrashing on a trunk. Thrashing occurs when one
or more ports or trunks repeatedly learn the same MAC addresses, for
example, as a result of a network loop. The router or switch applies the trunk’s
thrashaction to all ports in the trunk.
Take care with the thrashaction parameter because misuse can impair your
network operation.
Set the thrashaction parameter to:
■none to apply no thrash limiting on the trunk.
■learndisable to disable MAC address learning on all ports in the thrashing
trunk, until the period specified with the thrashtimeout parameter has
elapsed. The default is learndisable.
■portdisable or linkdown to disable all ports in the thrashing trunk until
either the period specified by the thrashtimeout parameter has elapsed, or
until the ports or subset of ports in the trunk are re-enabled by the enable
switch port command.If linkdown is specified, the link state is down; if
portdisable is specified, the link state remains up.
■vlandisable to block all traffic on the VLAN where the address was
learned, on all ports in the thrashing trunk, until either the period specified
by thrashtimeout has elapsed, or until the ports are re-enabled using the
enable switch port vlan command. When thrashaction=vlandisable, there
is only one timer per trunk, so if multiple VLANs have been disabled on a
trunk, the timer starts when the last VLAN was disabled. When the timer
expires, all VLANs are re-enabled on the trunk. When
thrashaction=vlandisable, ingress filtering is automatically enabled on all
ports in the trunk.
Software Version 2.8.1
C613-10477-00 REV B
The thrashtimeout parameter specifies the time, in seconds, for which the
switch employs the thrash action specified by the thrashaction parameter. The
thrashtimeout cannot be set to none if thrashaction=learndisable. If
thrashtimeout=none, and thrashaction is then changed to learndisable, then
the router or switch automatically changes the thrashtimeout to 1 second.
If none is specified, the trunk is not automatically re-enabled, but individual
ports can be re-enabled by using the enable switch port command for
thrashaction=portdisable or linkdisable, and the enable switch port vlan
command for thrashaction=vlandisable. The default is 1 second.
34Switching EnhancementsRelease Note
disable switch debug
SyntaxDISable SWItch DEBug={ARL|DEV|DMA|PHY|ALL}
DescriptionThe m6 parameter is now replaced by the dev parameter in this command.
Debug OptionDescription
DEVDebugging occurs on operations related to the switch chip.
disable switch filter vlansecure
SyntaxDISable SWItch FILter VLANSecure
DescriptionThis new command modifies Layer 2 switch filtering by disabling vlansecure
mode. The vlansecure mode is enabled by default.
When vlansecure mode is disabled and a filter exists for a given host and port,
moving the host to a different port in the same VLAN only stops the host from
accessing that VLAN, not other VLANs. When vlansecure mode is enabled
and a filter exists for a given host and port, moving the host to a different port
blocks the host completely.
ExampleTo turn off the default filtering behaviour, use the command:
dis swi fil vlan
disable switch port vlan
SyntaxDISable SWItch POrt={port-list|ALL}
VLAN[={vlan-name|1..4094|ALL}]
where:
■port-list is a port number, range (specified as n-m), or comma-separated list
of numbers and/or ranges. Port numbers start at 1 and end at m, where m
is the highest numbered Ethernet switch port, including uplink ports.
■vlan-name is a unique name from 1 to 32 characters. Valid characters are
uppercase and lowercase letters, digits, the underscore, and hyphen.
DescriptionThis new command disables one or more ports from VLANs to which they
belong. Once disabled, a port remains a member of the VLAN, but does not
receive or transmit packets from that VLAN.
The port parameter specifies the port or ports to disable. If a trunked port is
specified, all ports in the trunk are disabled. When a VLAN is disabled on a
port, ingress filtering is automatically enabled for that port
The vlan parameter specifies the VLAN or VLANs for which ports are
disabled. Specified ports must be a member of the VLAN. If no value, or all is
specified, the specified ports will be disabled for all VLANs to which they
belong.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.135
ExampleTo disable the default vlan on port 1, use the command:
DescriptionThe m6 parameter is now replaced by the dev parameter in this command.
Debug OptionDescription
DEVDebugging is disabled for operations related to the switch chip.
enable switch filter vlansecure
SyntaxENAble SWItch FILter VLANSecure
DescriptionThis new command returns Layer 2 switch filtering to its default behaviour by
enabling vlansecure mode. The vlansecure mode is enabled by default.
When vlansecure mode is enabled and a filter exists for a given host and port,
moving the host to a different port blocks the host completely. When
vlansecure mode is disabled and a filter exists for a given host and port,
moving the host to a different port in the same VLAN only stops the host from
accessing that VLAN, not other VLANs.
ExampleTo turn on the default filtering behaviour, use the command:
ena swi fil vlan
enable switch port vlan
SyntaxENAble SWItch POrt={port-list|ALL}
VLAN[={vlan-name|1..4094|ALL}]
where:
■port-list is a port number, range (specified as n-m), or comma-separated list
of numbers and/or ranges. Port numbers start at 1 and end at m, where m
is the highest numbered Ethernet switch port, including uplink ports.
Software Version 2.8.1
C613-10477-00 REV B
■vlan-name is a unique name from 1 to 32 characters. Valid characters are
uppercase and lowercase letters, digits, the underscore, and hyphen.
DescriptionThis new command enables one or more ports for VLANs to which they
belong. A port is automatically enabled for a VLAN when it is added to that
VLAN, however, it can be disabled using the disable switch port vlan
command, or automatically disabled by thrash limiting or QoS protection.
The port parameter specifies the port or ports to enable. If a trunked port is
specified, all ports in the trunk are enabled.
36Switching EnhancementsRelease Note
The vlan parameter specifies the VLAN or VLANs for which ports are enabled.
Specified ports must be a member of the VLAN. If no value or all is specified,
the specified ports are enabled for all VLANs to which they belong.
Note that when a disabled VLAN is re-enabled on a port, the port
automatically has ingress filtering disabled, as long as there are no other
VLANs disabled on the port, and as long as ingress filtering was not previously
enabled by using the set switch port command.
ExampleTo enable the default vlan on port 1, use the command:
DescriptionThis command modifies the LACP parameters.
The thrashaction parameter specifies the action the router or switch takes
when it detects MAC address thrashing on any trunk created by LACP.
Thrashing occurs when one or more ports or trunks repeatedly learn the same
MAC addresses, for example, as a result of a network loop. The router or
switch applies the trunk’s thrashaction to all ports in the trunk.
Take care with the thrashaction parameter because misuse can impair your
network operation.
Set the thrashaction parameter to:
■none to apply no thrash limiting on the trunk.
■learndisable to disable MAC address learning on all ports in the thrashing
trunk, until the period specified with the thrashtimeout parameter has
elapsed. The default is learndisable.
■portdisable or linkdown to disable all ports in the thrashing trunk until
either the period specified by the thrashtimeout parameter has elapsed, or
until the ports or subset of ports in the trunk are re-enabled by the enable switch port command. If you specify linkdown, the link state is down; if
you specify portdisable, the link state remains up.
■vlandisable to block all traffic on the VLAN where the address was
learned, on all ports in the thrashing trunk, until either the period specified
by thrashtimeout has elapsed, or until the ports are re-enabled using the
enable switch port vlan command. When thrashaction=vlandisable, there
is only one timer per trunk, so if multiple VLANs have been disabled on a
trunk, the timer starts when the last VLAN was disabled. When the timer
expires, all VLANs are re-enabled on the trunk. When
thrashaction=vlandisable, ingress filtering is automatically enabled on all
ports in the trunk.
The thrashtimeout parameter specifies the time, in seconds, for which the
switch employs the thrash action specified by the thrashaction parameter. The
thrashtimeout cannot be set to none if thrashaction=learndisable. If
thrashtimeout=none, and thrashaction is then changed to learndisable, then the router or switch automatically changes the thrashtimeout to 1 second.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.137
If none is specified, the trunk is not automatically re-enabled, but individual
ports can be re-enabled by using the enable switch port command for
thrashaction=portdisable or linkdisable, and the enable switch port vlan
command for thrashaction=vlandisable. The default is 1 second.
set switch hwfilter mode
SyntaxSET SWItch HWFilter MODe={PSF|NPSF}
DescriptionThis new command changes the router or switch’s classifier-based packet filter
mode, and is only valid for models with 48 ports (two switch instances). Use
this command to ensure that packets are filtered as expected on 48-port routers
or switches.
You can change the hardware filter mode after filters have been entered. When
you change modes, the filter entries remain in the original order.
The mode parameter specifies the filtering mode the router or switch is set in.
The default mode is psf.
When you specify psf, the router or switch expects port-specific filters to be
entered first. Use this mode when you want non port-specific filters to override
the port-specific filters for certain circumstances. If you add a port-specific
filter after the non port-specific filters, the router or switch may still use a
matching non port-specific filter when the packet travels between ports on
different switch instances.
When you specify npsf, the router or switch expects non port-specific filters to
be entered first. Use this mode when you want port-specific filters to override
the non port-specific filters for certain circumstances. If you add a non
port-specific filter after the port-specific filters, the router or switch may not
use the port-specific filter when the packet travels between ports on different
switch instances.
ExampleTo set the hardware filter mode to non port-specific filters first, use the
command:
set swi hwf mod=npsf
set switch hwrouteupdate
SyntaxSET SWItch HWRouteupdate=1..maximum
Software Version 2.8.1
C613-10477-00 REV B
DescriptionThis new command sets the length of the hardware route update queue.
The hwrouteupdate parameter specifies the maximum possible number of
entries in the queue. The maximum and default values depend on the amount of
memory on the switch, as shown in the following table:
Memory Size (Mbytes)Default length
(number of entries)
up to 128200000200000
129-25610000001500000
more than 25630000004000000
Maximum possible length
(number of entries)
38Switching EnhancementsRelease Note
ExampleTo make the queue as long as possible on a switch with 256Mbytes of memory,
use the command:
set swi hwr=4000000
set switch port
SET SWItch POrt={port-list|ALL} [ACCeptable={ALL|VLAN}]
DescriptionThis command modifies the value of parameters for switch ports.
The description parameter can now be entered without a value, to remove an
existing description.
The thrashaction parameter specifies the action the router or switch takes
when it detects MAC address thrashing on a port. Thrashing occurs when one
or more ports repeatedly learn the same MAC addresses, for example, as a
result of a network loop.
Take care with the thrashaction parameter because misuse can impair your
network operation.
Set the thrashaction parameter to:
■none to apply no thrash limiting to the port.
■learndisable to disable MAC address learning on the port, until the period
specified with the thrashtimeout parameter has elapsed. The default is
learndisable.
■portdisable or linkdown to disable the port until either the period
specified by the thrashtimeout parameter has elapsed, or until the port is
re-enabled by using the enable switch port command. If you specify linkdown, the link state is down; if you specify portdisable, the link state
remains up.
■vlandisable to block all traffic on the VLAN where the address was
learned, until either the period specified by thrashtimeout has elapsed, or
until the port is re-enabled by using the enable switch port vlan
command.
The thrashtimeout parameter specifies the time, in seconds, for which the
switch employs the thrash action specified by the thrashaction parameter. The
thrashtimeout cannot be set to none if thrashaction=learndisable. If
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.139
thrashtimeout=none, and thrashaction is then changed to learndisable, then
the router or switch automatically changes the thrashtimeout to 1 second.
If none is specified, the port is not automatically re-enabled, but can be
re-enabled by using the enable switch port command for
thrashaction=portdisable or linkdisable, and the enable switch port vlan
command for thrashaction=vlandisable. The default is 1 second.
The vlanstatustrap parameter specifies whether the switch will send an SNMP
trap whenever a port is enabled or disabled for a VLAN. A port can be disabled
for a VLAN by using the disable switch port command, either when thrashing
is detected on a port and the port’s thrashaction is vlandisable, or when a
storm is detected by QoS storm protection and the stormaction is vlandisable.
If on is specified, a trap is sent. If off is specified, a trap is not sent. The default
is off.
set switch thrashlimit
SyntaxSET SWItch THRASHLimit=5..255
DescriptionThis new command sets the maximum number of times a MAC address can
move between ports, in one second. When the specified limit is reached, the
thrashaction specifed with the set switch port command is applied. The
default thrashlimit is 10.
ExampleTo set the switch thrash limit to 100 MAC movements per second, use the
DescriptionThis command sets the speed for a specific trunk group on the switch. The
switch supports static 802.3ad link aggregation, and port trunking is also called
link aggregation.
The thrashaction parameter specifies the action the router or switch takes
when it detects MAC address thrashing on a trunk. Thrashing occurs when one
or more ports or trunks repeatedly learn the same MAC addresses, for
example, as a result of a network loop. The router or switch applies the trunk’s
thrashaction to all ports in the trunk.
Software Version 2.8.1
C613-10477-00 REV B
Take care with the thrashaction parameter because misuse can impair your
network operation.
Set the thrashaction parameter to:
■none to apply no thrash limiting on the trunk.
■learndisable to disable MAC address learning on all ports in the thrashing
trunk, until the period specified with the thrashtimeout parameter has
elapsed. The default is learndisable.
40Switching EnhancementsRelease Note
■portdisable or linkdown to disable all ports in the thrashing trunk until
either the period specified by the thrashtimeout parameter has elapsed, or
until the ports or subset of ports in the trunk are re-enabled by the enable switch port command. If you specify linkdown, the link state is down; if
you specify portdisable, the link state remains up.
■vlandisable to block all traffic on the VLAN where the address was
learned, on all ports in the thrashing trunk, until either the period specified
by thrashtimeout has elapsed, or until the ports are re-enabled using the
enable switch port vlan command. When thrashaction=vlandisable, there
is only one timer per trunk, so if multiple VLANs have been disabled on a
trunk, the timer starts when the last VLAN was disabled. When the timer
expires, all VLANs are re-enabled on the trunk. When
thrashaction=vlandisable, ingress filtering is automatically enabled on all
ports in the trunk.
The thrashtimeout parameter specifies the time, in seconds, for which the
switch employs the thrash action specified by the thrashaction parameter. The
thrashtimeout cannot be set to none if thrashaction=learndisable. If
thrashtimeout=none, and thrashaction is then changed to learndisable, then
the router or switch automatically changes the thrashtimeout to 1 second.
If none is specified, the trunk is not automatically re-enabled, but individual
ports can be re-enabled by using the enable switch port command for
thrashaction=portdisable or linkdisable, and the enable switch port vlan
command for thrashaction=vlandisable. The default is 1 second.
show lacp
SyntaxSHow LACP
DescriptionThis command displays the state of LACP on the router or switch.
Table 3: Example output from the show lacp command
Actor System .................... 00-3e-0a-12-00-01
Address learn thrash action ..... Learn Disable
Address learn thrash timeout .... 1 second
LACP Ports ...................... 1-3,5,7,9-12
Active ........................ 1-3,5
Passive ....................... 7,9-12
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.141
Table 4: New parameters in output of the show lacp command
ParameterDescription
Address learn thrash
action
Address learn thrash
timeout
The thrashaction value that is applied to any trunks created by
LACP. This specifies the action the router or switch takes when the
address learn thrash limit is exceeded on the trunk.
Disable LearningLearning is disabled on all ports in the trunk
Disable PortAll ports in the trunk are disabled but the links
will remain up
Link DownAll ports in the trunk are disabled and the links
will go down
Disable VlanAll ports in the trunk are disabled for the
VLAN that thrashing occurring on.
The thrashtimeout value to apply to any trunks created by LACP. It
specifies the time, in seconds, for which a trunk remains disabled
after being disabled by thrashing protection.
If ‘None’ is shown, the trunk remains disabled until manually
re-enabled.
show switch
SyntaxSHow SWItch
DescriptionThis command now shows information about the hardware route update
queue (Figure 5, Figure 6, Table 5).
Figure 5: New parameters in output of the show switch command when hardware
learning delay is disabled
Table 5: New parameters in the output of the show switch command
ParameterMeaning
Learn delayNumber of milliseconds that the switch waits after the last IP
route is inserted before it starts to update the hardware
routing system.
Queue sizeThe number of entries currently in the hardware route update
queue.
Queue limitThe maximum number of entries that the queue can hold.
Percent in useThe percentage of the queue limit that is currently used.
High water markThe highest number of messages that have been seen on the
queue since the switch last started up.
Queue maximumThe maximum value to which you can set the queue size. This
depends on the amount of memory installed on the switch.
Queue defaultThe default maximum number of entries in the queue. This
depends on the amount of memory installed on the switch.
Updating hardware (status) The number of entries that the software has queued for
writing into the hardware table, followed by the status. Status
is Pending if the hardware is not currently processing queued
routes and Active if it is currently processing the routes.
show switch debug
SyntaxSHow SWItch DEBug
Figure 7: Example output from the show switch debug command
Table 8: Modified parameters in output of the show switch hwfilter command
ParameterMeaning
ModeWhether the router or switch expects hardware filters to be ordered
with port-specific filters first (“PSF”), or non port-specific filters first
(“NPSF”). This only displays for models with 48 ports (two switch
instances).
show switch port
SyntaxSHow SWItch POrt[={port-list|ALL}]
DescriptionThis command displays general information about all ports or a specific one.
Figure 10: Example output from the show switch port command for port-based VLANs
Description ................... To intranet hub, port 49
Status ........................ ENABLED
Link State .................... Up
UpTime ........................ 02:35:26
Port Media Type ............... ISO8802-3 CSMACD
Configured speed/duplex ....... Autonegotiate
Actual speed/duplex ........... 1000 Mbps, full duplex
MDI Configuration (Polarity) .. Manual (MDI)
Loopback ...................... Off
Configured master/slave mode .. Not applicable
Actual master/slave mode ...... Not applicable
Acceptable Frames Type ........ Admit All Frames
Disabled egress queues ........ Q0, Q3-4
BCast & MCast rate limit ...... 400 Kbytes\sec
BCSC rate Limiting ............ Broadcast and Multicast enabled
Egress rate limit ............. 10240 K/bs
Learn limit ................... -
Intrusion action .............. Discard
Current learned, lock state ... 0, locked by thrashing
Address learn thrash status ....Thrashing
Address learn thrash action ... Disable Learning
Address learn thrash timeout .. 1 second
VLAN Status Trap .............. OFF
.
.
.
Software Version 2.8.1
C613-10477-00 REV B
Table 9: New parameters in output of the show switch port command
ParameterMeaning
PortNumber of the switch port.
46Switching EnhancementsRelease Note
Table 9: New parameters in output of the show switch port command (cont.)
ParameterMeaning
Address learn thrash
status
The thrashing protection status of the port. If the thrash action is
set to vlandisable, the status is shown for each VLAN that the
port is a member of, with each VLAN listed on a separate line.
Not DetectedThrashing has not been detected on the port.
ThrashingThrashing has been detected and the specified
thrash action has been applied.
DisabledThrashing protection is disabled because the
thrashaction is set to none.
TrunkedThe port is trunked and therefore thrashing
protection is controlled by the trunk.
Address learn thrash
action
Action taken when the address learn thrash limit is exceeded:
Disable LearningAddress learning on the port is temporarily
disabled.
Disable PortThe port is disabled, but the link remains up.
Link DownThe port is disabled, and the link is down.
Disable VLANThe port is disabled for the VLAN on which
thrashing is occurring.
Address learn thrash
timeout
The time, in seconds for which a port remains disabled after being
disabled by thrashing protection. When a timeout value is
specified and the port is currently disabled by the thrash limit, the
time remaining before the port is re-enabled is shown in
parentheses.
NoneThe port remains disabled until manually
re-enabled.
VLAN Status TrapWhether an SNMP trap is sent when a port is enabled or disabled
for the VLAN. Either on or off.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.147
PPPoE Access Concentrator
This release introduces the ability for the PPPoE Access Concentrator and a
PPPoE Client to be active simultaneously. You can now specify the interface to
which the PPPoE Access Concentrator should attach.
Command Changes
The following table summarises the modified commands:
CommandChange
add ppp acserviceNew acinterface parameter to supercede the now
deprecated vlan parameter.
delete ppp acserviceNew acinterface parameter to supercede the now
deprecated vlan parameter.
set ppp acserviceNew acinterface parameter to supercede the now
deprecated vlan parameter.
show ppp pppoeNew description for the interface parameter.
Command Reference Updates
This section describes the changed portions of modified commands and output
screens. The new parameters and options are shown in bold for modified
commands.
■interface is an interface name formed by concatenating an interface type
and an interface instance (e.g. eth0). Valid interface types are ETH and
VLAN.
DescriptionThis command adds a new PPP over Ethernet Access Concentrator service to
the router or switch. PPPoE hosts are able to connect to the router or switch
using this service.
To allow a PPPoE host to be defined on the router or switch as well as on an
Access Concentrator service, the acinterface parameter must be used. The acinterface parameter specifies the interface to be used by the Access
Concentrator service. If none is specified, the Access Concentrator service uses
all valid interfaces. A service can be offered on several interfaces, but it is
necessary to issue one add ppp acservice command for each interface. For
example:
add ppp acservice=bob template=1 acint=eth0
add ppp acservice=bob template=1 acint=vlan5
Software Version 2.8.1
C613-10477-00 REV B
To offer the service on all the Ethernet interfaces only, there is no need to use
the acinterface parameter, as it defaults to none.
The acinterface parameter supercedes the now deprecated vlan parameter in
this command.
48PPPoE Access ConcentratorRelease Note
delete ppp acservice
SyntaxDELete PPP ACservice=service-name
[ACINTerface={NONE|interface}]
where:
■interface is an interface name formed by concatenating an interface type
and an interface instance (e.g. eth0). Valid interface types are ETH and
VLAN.
DescriptionThis command deletes a PPP over Ethernet Access Concentrator service from
the router or switch. Note that it is not possible to delete a service that is
currently in use.
The acinterface parameter specifies the interface on which the service is
offered. This parameter is used to further identify the service to delete, as it is
possible to have two or more services with the same name, but which are
offered on different interfaces:
■If you specify an interface, it is on that interface that the service with the
specified name is deleted.
■If you specify none, the service offered on the Ethernet port is deleted if it
was added with acinterface=none specified in the add ppp acservice
command.
If multiple interfaces exist for the service, you are prompted to specify an
acinterface. The default is none.
The acinterface parameter supercedes the now deprecated vlan parameter in
this command.
■interface is an interface name formed by concatenating an interface type
and an interface instance (e.g. eth0). Valid interface types are ETH and
VLAN.
DescriptionThis command sets the parameters associated with the specified PPPoE Access
Concentrator service.
The acinterface parameter specifies the interface on which the service is
offered. This parameter further identifies the service whose parameters are to
be changed, as it is possible to have two or more services with the same name
but offered on different interfaces. It is not possible to change the interface on
which the service is offered.
■If an interface is specified, the service with the specified name on that
interface has its parameters changed.
■If none is specified, the service offered on the Ethernet ports has its
parameters changed.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.149
■If the acinterface parameter is omitted, the service is mapped to its
corresponding interface (if one exists).
If multiple interfaces exist for the service, you are asked to specify an
acinterface. The default for this parameter is none.
The acinterface parameter supercedes the now deprecated vlan parameter in
this command.
show ppp pppoe
SyntaxSHow PPP PPPOE
DescriptionThis command displays information about PPPoE interfaces and services that
are currently configured.
Figure 11: Example output from the show ppp pppoe command
Table 10: New parameter in output of the show ppp pppoe command
Software Version 2.8.1
C613-10477-00 REV B
ParameterMeaning
InterfaceThe interface that the PPPoE Access Concentrator or
PPPoE Client is using. If all Ethernet interfaces are being
used, “ethernet" will be displayed.
50MSTP EnhancementRelease Note
MSTP Enhancement
Two new commands have been added to simplify MSTP operation.
Command Changes
The following table summarises the new commands:
CommandChange
disable mstp portNew command
enable mstp portNew command
Command Reference Updates
This section describes each new command.
disable mstp port
SyntaxDISable MSTP POrt={port-list|ALL}
where:
■port-list is a port number, range (specified as n-m), or comma-separated list
of port numbers and/or ranges. Port numbers start at 1 and end at m,
where m is the highest numbered Ethernet switch port, including uplink
ports.
DescriptionThis new command disables the Multiple Spanning Tree algorithm on the
specified ports, or all ports, for both the CIST and all currently configured
MSTIs. This command offers a shorter alternative to using the disable mstp cist port command, followed by the disable mstp msti port command.
ExampleTo disable the CIST and all MSTIs on ports 10-15, use the command:
dis mstp po=10-15
enable mstp port
SyntaxENAble MSTP POrt={port-list|ALL}
where:
■port-list is a port number, range (specified as n-m), or comma-separated list
of port numbers and/or ranges. Port numbers start at 1 and end at m,
where m is the highest numbered Ethernet switch port, including uplink
ports.
DescriptionThis new command enables operation of the Multiple Spanning Tree algorithm
on the specified ports, or all ports, for the both the CIST and all currently
configured MSTIs. This command offers a shorter alternative to using the
enable mstp cist port, command, followed by the enable mstp msti port
commands.
ExampleTo enable the CIST and all MSTIs on ports 10-15, use the command:
ena mstp po=10-15
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.151
STP Enhancement
You can now display the RSTP states for one or more ports by using the
existing command:
show stp port={port-list|all} rstpstate
The information for each port now starts with the port number. This makes the
output more readable.
Command Changes
The following table summarises the modified command:
CommandChange
show stp portNew Port field in output
Command Reference Updates
This section describes the changed portions of modified commands and output
screens. For modified commands and output, the new parameters, options,
and fields are shown in bold.
Port Role Selection ................. Role Selection
Port .................................. 1
Port State Machines ................. STATE
Port Information .................... Disabled
Port Role Transitions ............... Blocked Port
Port State Transition ............... Discarding
Topology Change ..................... Inactive
Port Protocol Migration ............. Init
Port Transmit ....................... Idle
Port .................................. 2
Port State Machines ................. STATE
Port Information .................... Disabled
Port Role Transitions ............... Blocked Port
Port State Transition ............... Discarding
Topology Change ..................... Inactive
Port Protocol Migration ............. Init
Port Transmit ....................... Idle
.
.
.
Software Version 2.8.1
C613-10477-00 REV B
Table 11: New parameters in the output of the show stp port rstpstate command
ParameterMeaning
PortThe number of the port for which state information is displayed.
52Asynchronous Port EnhancementRelease Note
Asynchronous Port Enhancement
This section describes the enhancement. The modified commands to
implement it are described in Command Reference Updates.
Making Asynchronous Ports Respond More Quickly
When an asynchronous port is in ten mode, it bundles together the characters
that it receives within a certain time period, instead of passing them one at a
time to a higher protocol layer for processing. The time period over which
characters are bundled is set by the ten timer.
Bundling reduces the load on the CPU by spreading the character processing
overhead across several characters. If a remote terminal session is involved,
bundling also reduces the number of packets on the network by sending more
characters in each packet. However, bundling reduces terminal responsiveness.
A ten timer value of 100 milliseconds is generally a good compromise between
responsiveness and processing overhead. If you need to increase the port’s
responsiveness, this enhancement enables you to reduce the length of the ten
timer. To do this, use the new tentimervalue parameter in the set asyn
command:
set asyn[=port-number] [tentimervalue=20..100] [other optional
parameters]
Unless you are logged in via the port you want to change, also specify the
asynchronous port number.
The default tentimervalue value is 100 milliseconds, which is the value it had
before this enhancement.
To display a port’s value for the ten timer, use the command:
show asyn=port-number
In the output, check the new Ten timer value field. Note that the Mode field
displays Te n if the asynchronous port is a terminal server port in ten mode.
Command Changes
The following table summarises the modified commands:
CommandChange
set asynNew tentimervalue parameter
show asynNew Ten timer value field
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.153
Command Reference Updates
This section describes the changed portions of modified commands and output
screens. For modified commands and output, the new parameters, options,
and fields are shown in bold.
DescriptionWhen you specify asyn=por t-number or asyn=all, the output of this command
now includes a new field (Figure 13, Tabl e 12).
Software Version 2.8.1
C613-10477-00 REV B
54Asynchronous Port EnhancementRelease Note
Figure 13: Example output from the show asyn=port-number command
ASYN 0 : 0003896346 seconds Last change at: 0000000000 seconds
ASYN information
Name ...................... Asyn 0
Status .................... enabled
Mode ...................... Ten
Data rate ................. 9600
Parity .................... none
Data bits ................. 8
Stop bits ................. 1
Test mode ................. no
In flow state (mode) ...... on (Hardware)
Out flow state (mode) ..... off (Hardware)
Autobaud mode ............. disabled
Max tx queue length ....... 16
TX queue length ........... 3
Transmit frame ............ none
RX queue length ........... 0
IP address ................ none
Max transmission unit ..... 1500
Ten timer value ........... 100
.
.
.
Table 12: New parameters in the output of the show asyn=port-number command
ParameterMeaning
Ten timer valueThe length of the ten timer, in milliseconds. When an asynchronous port
is in ten mode, it bundles together the characters that it receives within
a certain time period, instead of passing them one at a time to a higher
protocol layer for processing. The ten timer sets the time period over
which characters are bundled.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.155
Internet Group Management Protocol
(IGMP) Enhancements
This Software Version includes the following enhancements to IGMP:
■IGMP Proxy on x900 Series Switches
■IGMP filtering extended to all IGMP message types
■Monitoring reception of IGMP general query messages
This section describes the enhancements. The new and modified commands to
implement them are described in Command Reference Updates.
IGMP Proxy on x900 Series Switches
IGMP proxy was previously released on the following products:
■AR400 Series routers
■AR700 Series routers
■AT-8600 Series switches
■AT-8700XL Series switches
■AT-8800 Series switches
■Rapier Series switches
This software version adds support for IGMP proxy on the following x900
Series switches:
■AT-8948
■x900-48FE
■x900-48FE-N
■AT-9924T
■AT-9924SP
■AT-9924T/4SP
■x900-24XT
■x900-24XT-N
In a network with a simple tree topology, you can use IGMP proxy to simplify
the configuration of multicast routing. The router or switch at the root of the
tree must run a multicast routing protocol, but all other routers and switches in
the network can be configured as IGMP proxy agents.
Software Version 2.8.1
C613-10477-00 REV B
The IGMP proxy agent must be configured with a single upstream interface
and one or more downstream interfaces. An upstream interface is an interface
in the direction towards the root of the tree. A downstream interface is an
interface in the direction away from the root of the tree.
The IGMP proxy agent periodically transmits IGMP general membership
queries to the hosts attached to its downstream interfaces. The proxy agent
uses IGMP report and leave messages received on downstream interfaces to
build and maintain a database of multicast group memberships, and reports
changes to the list of multicast groups in the database on the upstream
56Internet Group Management Protocol (IGMP) EnhancementsRelease Note
interface. The following table summarises how the IGMP proxy agent
processes each IGMP message type.
When this message...Is received on this interface... Then the IGMP proxy agent...
Report downstream• adds the membership subscription to the multicast
group membership database
• forwards the report message on the upstream interface,
if the membership subscription is for a new multicast
group
upstream• discards the message without processing
Leavedownstream• removes the membership subscription from the
multicast group membership database
• forwards the leave message on the upstream interface,
if there are no remaining membership subscriptions for
the multicast group (no other hosts connected to any of
the downstream interfaces have members of the
multicast group)
upstream• discards the message without processing
Group-specific querydownstream• discards the message without processing
upstream• transmits a report message on the upstream interface,
if the multicast group membership database contains at
least one member of the multicast group attached to a
downstream interface
General querydownstream• discards the message without processing
upstream• transmits a report message on the upstream interface
for each multicast group in the multicast group
membership database with at least one member
attached to a downstream interface
The IGMP proxy agent uses the information maintained in the multicast group
membership database to forward multicast data packets received on the
upstream interface to all downstream interfaces that have members of the
multicast group.
Multicast packet forwarding is enabled as long as:
■a multicast routing protocol is not enabled
■an interface is configured with IGMP proxy in the upstream direction
■at least one interface is configured with IGMP proxy in the downstream
direction
To add an IP interface and configure IGMP proxying, use the command:
To configure IGMP proxy on an existing IP interface, use the command:
set ip interface=interface
igmpproxy={off|upstream|downstream}]
IGMP proxy is turned off by default.
IGMP must also be enabled on the router or switch and on the interface for
IGMP proxy to function.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.157
To enable IGMP on the router or switch, use the command:
enable ip igmp
To enable IGMP on a specific interface, use the command:
enable ip igmp interface=interface
You can configure the IGMP proxy agent to monitor the reception of IGMP
general query messages on an interface, and to generate a log message and an
SNMP trap if an IGMP general query message is not received on the interface
within a specified time interval.
To enable monitoring on an interface and set the time interval, use the
command:
set ip igmp interface=interface
querytimeout={none|0|1..65535}
To display information about IGMP and the IGMP proxy agent, use the
command:
show ip igmp
Command Changes
The following table summarises the new and modified commands:
CommandChange
add ip interfaceNew igmpproxy parameter
set ip interfaceNew igmpproxy parameter
set ip igmp interfaceNew command
show ip igmpNew IGMP Proxy field
IGMP filtering extended to all IGMP message types
IGMP filtering lets you manage the distribution of multicast services on each
switch port by controlling which multicast groups the hosts attached to a
switch port can join.
IGMP filtering is applied to multicast streams forwarded by IGMP, IGMP
Snooping, or MVR.
Filtering of IGMP membership reports was supported in a previous software
version. This software version adds support for filtering IGMP query, report
and leave messages.
Software Version 2.8.1
C613-10477-00 REV B
To configure an IGMP filter, you must create the filter and then apply it to one
or more switch ports.
To do this, first create the filter, using the command:
create igmp filter=filter-id
Then add one or more entries to the filter, using the command:
To remove a filter from a switch port, use the command:
set switch port={port-list|all} igmpfilter=none
[other-options...]
To destroy a filter, first remove the filter from all ports that it is applied to, then
use the command:
destroy igmp filter=filter-id
To display information about IGMP filters, use the command:
show igmp filter=filter-id
To display the IGMP filter assigned to a switch port, use the command:
show switch port[={port-list|all}]
Command Changes
The following table summarises the modified commands:
CommandChange
add igmp filterNew msgtype parameter
set igmp filterNew msgtype parameter
show igmp filterNew fields Msg Type, Reports, Queries, and Leaves.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.159
Monitoring reception of IGMP general query
messages
You can configure the IGMP proxy agent to monitor the reception of IGMP
general query messages on an interface. If an IGMP general query message is
not received on the interface within a specified time interval, IGMP generates
an igmpGeneralQueryNotReceivedEvent SNMP trap ({ enterprises(1)
alliedTelesyn(207) mibObject(8) brouterMib(4) atRouter(4) traps(2)
igmpTraps(1) 1 }) containing the ifName object for the interface, and the
following log message:
Message
Severity
Module
Log Type
Log Subtype
Recommended
Action
IGMP - No general query within time-interval
seconds on interface
5 / IMPORTANT
5 / IPG
021 / MSGS
002 / WARN
Check for connectivity between the device and the multicast router
acting as a Querier on the sub-network.
Check the current status of the Querier.
If the interface which generated the log message is not a
downstream multicasting port, use the set ip igmp interface
command to set the querytimeout to zero.
To enable monitoring on an interface and set the time interval, use the
command:
set ip igmp interface=interface
querytimeout={none|0|1..65535}
To display information about IGMP and the IGMP proxy agent, use the
command:
show ip igmp
Command Changes
The following table summarises the new and modified commands:
CommandChange
set ip igmp interfaceNew command
show ip igmpNew General Query Reception Timeout field.
Software Version 2.8.1
C613-10477-00 REV B
60Internet Group Management Protocol (IGMP) EnhancementsRelease Note
Command Reference Updates
This section describes each new command and the changed portions of
modified commands and output screens. For modified commands and output,
the new parameters, options, and fields are shown in bold.
■ipadd is an IP address in dotted decimal notation.
DescriptionThe new msgtype parameter specifies the type of incoming IGMP message to
match. If you specify query, the filter will match IGMP general and
group-specific query messages. If you specify report, the filter will match
IGMP report messages. If you specify leave, the filter will match IGMP leave
messages. The default is report.
The groupaddress parameter specifies an IP multicast group address or a
range of IP multicast group addresses to match. Set groupaddress to:
■0.0.0.0 to filter IGMP general query messages
■a multicast address or a range of multicast addresses to filter IGMP
group-specific query messages, report messages, and leave messages.
The action parameter specifies the action to take when an IGMP message with
a message type matching msgtype and a group address matching
groupaddress is received. If you specify include, the message is processed as
normal by IGMP. If you specify exclude, the message is excluded from
processing by IGMP, and the packet is discarded. The default is include.
If an IGMP filter contains at least one entry for a particular IGMP message
type, then messages of the same type for group addresses that do not match
any entries in the filter are implicitly excluded and the packets are discarded.
ExamplesTo add an entry to filter 6 to accept Membership Reports for multicast group
addresses in the range 229.1.1.2 to 230.1.2.3, use the command:
add igmp fil=6 msgt=rep gro=229.1.1.2-230.1.2.3
To add an entry to filter 1 to exclude all general queries, use the command:
add igmp fil=1 msgt=que gro=0.0.0.0 ac=excl
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.161
add ip interface
SyntaxADD IP INTerface=interface IPaddress={ipadd|DHCP}
■interface is an interface name formed by concatenating a Layer 2 interface
type, an interface instance, and optionally a hyphen followed by a logical
interface number from 0 to 15. If a logical interface is not specified, 0 is
assumed.
■ipadd is an IP address in dotted decimal notation.
DescriptionThe new igmpproxy parameter specifies the status of IGMP proxying for the
specified interface. If you specify off, the interface does not do IGMP Proxy. If
you specify upstream, the interface passes IGMP messages in the upstream
direction. A router or switch can have only one interface when the IGMP proxy
direction is upstream. If you specify downstream, the interface can receive
IGMP messages from the downstream direction. The default is off. To display
information about IGMP and multicast group membership for each IP
interface, use the show ip igmp command.
set igmp filter
SyntaxSET IGMP FILter=filter-id ENTry=1..65535
[GROupaddress={ipadd|ipadd-ipadd}]
[MSGType={QUEry|REPort|LEAVe}]
[ACtion={INCLude|EXCLude}]
Software Version 2.8.1
C613-10477-00 REV B
where:
■filter-id is a decimal number from 1 to 99.
■ipadd is an IP address in dotted decimal notation.
DescriptionThe new msgtype parameter specifies the type of incoming IGMP message to
match. If you specify query, the filter will match IGMP general and
group-specific query messages. If you specify report, the filter will match
IGMP report messages. If you specify leave, the filter will match IGMP leave
messages. The default is report.
62Internet Group Management Protocol (IGMP) EnhancementsRelease Note
The groupaddress parameter specifies an IP multicast group address or a
range of IP multicast group addresses to match. Set groupaddress to:
■0.0.0.0 to filter IGMP general query messages
■a multicast address or a range of multicast addresses to filter IGMP
group-specific query messages, report messages, and leave messages.
The action parameter specifies the action to take when an IGMP message with
a message type matching msgtype and a group address matching
groupaddress is received. If you specify include, the message is processed as
normal by IGMP. If you specify exclude, the message is excluded from
processing by IGMP, and the packet is discarded. The default is include.
If an IGMP filter contains at least one entry for a particular IGMP message
type, then messages of the same type for group addresses that do not match
any entries in the filter are implicitly excluded and the packets are discarded.
set ip igmp interface
SyntaxSET IP IGMP INTerface=interface
QUERYtimeout={NONE|0|1..65535}
where:
■interface is an interface name formed by concatenating a Layer 2 interface
type, an interface instance, and optionally a hyphen followed by a logical
interface number from 0 to 15. If a logical interface is not specified, 0 is
assumed.
DescriptionThis new command enables the monitoring of incoming IGMP general query
messages on an interface, and generates a log message and an SNMP trap if an
IGMP general query message is not received on the interface within a specified
time interval.
The interface parameter specifies the IP interface to monitor for IGMP general
query messages. Valid interfaces are:
■eth (such as eth0, eth0-1)
■PPP (such as ppp0, ppp1-1)
■FR (such as fr0, fr0-1)
■VLAN (such as vlan1, vlan1-1)
Modifying IGMP on an IP interface or a logical interface will change the
behaviour of IGMP on all logical interfaces associated with the IP interface.
The querytimeout parameter specifies the maximum expected time interval, in
seconds, between successive IGMP general query messages arriving on the
interface. If you specify none or 0, monitoring is disabled. If you specify a
non-zero time interval, IGMP generates a log message and an
igmpGeneralQueryNotReceivedEvent SNMP trap if an IGMP general query
message is not received on the interface within the time interval. Monitoring is
only active when:
■IGMP is enabled globally
■IGMP is enabled on the interface
■the interface is active
The default is none.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.163
ExampleTo set the maximum time period allowed between successive IGMP general
query messages on interface vlan2 to 120 seconds, use the command:
set ip igmp int=vlan2 query=120
set ip interface
SyntaxSET IP INTerface=interface [ADVertise={YES|NO}]
■interface is an interface name formed by concatenating a Layer 2 interface
type, an interface instance, and optionally a hyphen followed by a logical
interface number from 0 to 15. If a logical interface is not specified, 0 is
assumed.
■ipadd is an IP address in dotted decimal notation.
DescriptionThe new igmpproxy parameter specifies the status of IGMP proxying for the
specified interface. If you specify off, the interface does not do IGMP Proxy. If
you specify upstream, the interface passes IGMP messages in the upstream
direction. A router or switch can have one interface with the IGMP proxy
direction equal to upstream. If you specify downstream, the interface can
receive IGMP messages from the downstream direction. The default is off. To
display information about IGMP and multicast group membership for each IP
interface, use the show ip igmp command.
Software Version 2.8.1
C613-10477-00 REV B
64Internet Group Management Protocol (IGMP) EnhancementsRelease Note
show igmp filter
SyntaxSHow IGMP FILter[=filter-id]
where:
■filter-id is a decimal number from 1 to 99.
DescriptionThe output of this command includes new fields.
Figure 14: Example output from the show igmp filter command
IGMP Filters
------------------------------------------------------------------------------No. Entry Group Address Range Msg Type Action Matches
Table 13: New parameters in the output of the show igmp filter command
ParameterMeaning
Msg TypeThe type of IGMP message being filtered by this entry; one of
“Leave”, “Query”, or “Report”.
Reports,
Queries,
Leaves
RecdThe number of IGMP messages of the specified type that were
PassedThe number of IGMP messages of the specified type that were
DroppedThe number of IGMP messages of the specified type that were
The total number of IGMP messages of the specified type that
were received and processed on all the switch ports that this filter
is attached to.
received on all the switch ports that this filter is attached to.
received and accepted on all the switch ports that this filter is
attached to.
received and discarded on all the switch ports that this filter is
attached to.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.165
show ip igmp
SyntaxSHow IP IGMP [INTerface=interface] [DEStination=ipadd]
where:
■interface is an interface name formed by concatenating a Layer 2 interface
type, an interface instance, and optionally a hyphen followed by a logical
interface number from 0 to 15. If a logical interface is not specified, 0 is
assumed.
■ipadd is an IGMP multicast group address in dotted decimal notation.
DescriptionThe output of this command includes a new field.
Figure 15: Example output from the show ip igmp command
Table 14: New parameters in the output of the show ip igmp command
ParameterMeaning
IGMP ProxyThe status of IGMP proxy on this interface; one of “Off”,
“Upstream”, or “Downstream”.
General Query Reception
Timeout
The maximum expected time interval, in seconds, between
successive IGMP general query messages arriving on the
interface, or “none” if there is no limit. If a general query
message is not received within the time interval, a log message
and an SNMP trap are generated.
66Internet Protocol (IP) EnhancementsRelease Note
Internet Protocol (IP) Enhancements
This Software Version includes the following enhancements to IP:
■Expanded number of Eth interfaces per physical interface
■Expanded IP Troubleshooting
■IP Route Preference Options
■IPv4 Filter Expansion
■Enhancements to Display of UDP Connections over IPv4
■Display of UDP Connections over IPv6
■IPv6 Tunnel Expansion
■Waiting for a Response to an ARP Request
■Adding Static ARP Entries with Multicast MAC Addresses
■Enhanced Static ARP Entry Filtering on Ports within a Trunk Group
This section describes the enhancements. The new and modified commands to
implement them are described in Enhanced Static ARP Entry Filtering on
Ports within a Trunk Group.
Expanded number of Eth interfaces per physical
interface
This Software Version expands logical Ethernet interfaces (not VLAN) to 1000
per physical eth interface. Logical Eth interfaces can be numbered from 0 to
999, for example eth0-0 to eth0-999. Note that if you use the GUI to view
interfaces and have configured a large number, the Interface page may take
several minutes to display.
The add ip interface and set ip interface commands reflect this change, along
with other related commands, such as those to enable and delete IP interfaces.
Expanded IP Troubleshooting
This Software Version provides additional troubleshooting capabilities. The
following table summarises the new and modified commands:
CommandChange
show ip cacheNew command
show ip counterNew cache option and output
reset ip counterNew cache option
IP Route Preference Options
The option all has been added to the protocol parameter for the following
command:
This allows you to set the route preference for all protocol types at once.
Command Changes
The following table summarises the modified command:
CommandChange
set ip route preferenceNew all option for protocol parameter
IPv4 Filter Expansion
This Software Version increases the amount of IP filters you can create, and
allows you to assign a filter type to any IP filter.
IP Filter Number
Increase
Assigning the Filter
Ty pe
You can now create up to 1000 IP filters by using the add ip filter command.
Previously, you could create a maximum of 400 IP filters. The number range
you can now specify in the add ip filter command is 0 to 999. The type of filter
created is no longer associated with the IP filter number, so you can allocate
any filter type to any filter number.
Use the type parameter in the add ip filter command to define the filter type.
Previously, the filter type was determined by the range of numbers you set the
filter number in.
The type parameter lets you assign IP filters as traffic, policy, priority or
routing filters, regardless of the filter number. This allows you to create as
many IP filters of a specific type as you may need. Use the type parameter:
The type parameter is optional, to ensure that this Software Version is
backwards compatible with configuration scripts written using an earlier
Software Version. When type is not specified, the router or switch determines
the filter type based on the value of the filter number and the specified
parameters:
■Filters with a specified policy parameter are policy filters.
Software Version 2.8.1
C613-10477-00 REV B
■Filters with a specified priority parameter are priority filters.
■Filters with the action parameter specified are either traffic or routing
filters. If the filter number set is:
•between 0 to 99, they are traffic filters
•between 100 to 999, they are routing filters, as long as the only other
parameters specified are the source, entry and smask parameters. If
any other parameter is specified the filter is a traffic filter.
We recommend always using the type parameter to define the filter type. This
is particularly important when you are creating traffic filters with a filter
number between 100..999, as these can default to routing filters if type has no
value set. Routing filters are only used in conjunction with Border Gateway
Protocol (BGP). However, even if BGP is not available on your router or switch
you can still create a routing filter.
As with previous Software Versions, you cannot change the type of filter, or the
number assigned to the filter with the set ip filter command.
68Internet Protocol (IP) EnhancementsRelease Note
You can display IP filters with their filter number and filter type using the
command:
show ip filter[=0..999]
Command Changes
The following table summarises the modified commands:
CommandChange
add ip filterModified number range for filter parameter.
New type parameter.
set ip filterModified number range for filter parameter.
show ip filterNew Filter Type parameter and options in field.
Ty p e parameter modified to Pattern Type in field.
Enhancements to Display of UDP Connections over
IPv4
In this Software Version, the display of information about UDP connections has
been improved for connections over IPv4, with the following changes to the
output for the command show ip udp:
■A new Process field displays the process that is using each connection.
■The Local address field now displays the IP address of the last interface
that was used to transport UDP packets from the device, for the given
process.
Command Changes
The following table summarises the modified command:
CommandChange
show ip udpNew Process field and different information in the existing
Local address field.
Waiting for a Response to an ARP Request
When a router or switch receives a packet and does not have an ARP entry for
the destination address, it broadcasts an ARP Request message over the egress
IP interface. If the router or switch does not receive a reply within a particular
time, it notifies the sending device that the destination is unknown.
This enhancement lets you increase the length of time that the router or switch
waits for a response, which is useful for routers or switches that communicate
with devices that are slow to respond. To configure the waiting time, use the
following new command to specify the wait timeout period in seconds:
set ip arpwaittimeout=1..30
The default is 1 second.
The easiest way to test a changed wait timeout period is to ping an unavailable
device. The timeout determines the delay between pinging an IP address and
receiving the reply that the device is unreachable.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.169
Command Changes
The following table summarises the new and modified commands:
CommandChange
set ip arpwaittimeoutNew command
show ipNew Arp wait timeout field
Adding Static ARP Entries with Multicast MAC
Addresses
This Software Version allows you to add ARP entries with multicast MAC
addresses and allows the router or switch to accept packets with unicast IP
addresses and multicast MAC addresses. It introduces the enable ip macdisparity and disable ip macdisparity commands to support this.
Adding Static ARP
Entries
Accepting Packets
with Conflicting
Addresses
Valid ARP entries are normally restricted to unicast IP with unicast MAC
addresses. However, ARP entries can be configured with multicast MAC
addresses when macdisparity is enabled. Static ARP entries with multicast
MAC addresses are necessary for some third party networking solutions, such
as server clustering.
Before you can add an ARP entry with a multicast MAC address, you must
enable macdisparity using the command:
enable ip macdisparity
Once this feature is enabled, you can add an ARP entry with a multicast MAC
address using the add ip arp command.
Enabling macdisparity also allows the router or switch to accept packets with
conflicting IP and MAC addresses. Normally the router or switch discards
these packets as being invalid.
Conflicting IP and MAC addresses include:
■A multicast IP address with a unicast MAC address
■A unicast IP address with a multicast MAC address
macdisparity is disabled by default. When disabled, only ARP entries with
unicast IP and MAC addresses can be added, and packets with conflicting
addresses are discarded. Other routers or switches in the network may not
accept packets with conflicting addresses unless configured to. To disable this
functionality, use the command:
Software Version 2.8.1
C613-10477-00 REV B
disable ip macdisparity
ARP entries with multicast MAC addresses must be removed before the
disable ip macdisparity command will work. To see details on the current ARP
entries, use the command:
show ip arp
To see whether macdisparity is enabled or disabled, use the command:
show ip
70Internet Protocol (IP) EnhancementsRelease Note
For an example of how to use ARP entries with multicast MAC addresses, see
Guideline to Windows 2003 Network Load Balancing Clustering with Allied Telesyn
Switches. This is available from the Resource Center on your Documentation
The following table summarises the new and modified commands:
CommandChange
disable ip macdisparityNew command.
enable ip macdisparityNew command.
show ipNew IP/MAC address disparity parameter.
Enhanced Static ARP Entry Filtering on Ports within a
Tru nk Group
This Software Version ensures that traffic flow is not interrupted when a port
within a trunk group goes link-down.
In previous Software Versions, when a port that is part of a trunk group goes
link-down, the router or switch drops any traffic that is forwarded by a static
ARP entry out of that port.
In this Software Version, when a port that is part of a trunk group goes
link-down, the router or switch modifies any static ARP entries defined to
forward traffic out of that port. It modifies the egress port for the static ARP
entry to a port which is link-up within the trunk group. This ensures that traffic
can flow without interruption despite the original port going link-down.
Command Changes
This expansion does not affect any commands.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.171
Command Reference Updates
This section describes each new command and the changed portions of
modified commands and output screens. For modified commands and output,
the new parameters, options, and fields are shown in bold.
add ip filter
SyntaxTraffic filter:
ADD IP FILter=0..999 ACtion={INCLude|EXCLude} SOurce=ipadd
ADD IP FILter=0..999 ACtion={INCLude|EXCLude} SOurce=ipadd
[TYPE=ROUting] [ENTry=1..255] [SMask=ipadd]
72Internet Protocol (IP) EnhancementsRelease Note
DescriptionThis command adds a pattern to an IP traffic filter, policy filter, routing filter, or
priority filter. You now specify the type of filter by using the type parameter.
ParameterDescription
FILterThe filter number, from 0 to 999, that the pattern is added to. When
the type parameter is not specified, the router or switch may use the
filter number to help determine the filter type. See the description of
the type parameter for further details.
Default: no default
TYPEThe type of filter the router or switch creates. When type is not
specified, the router or switch determines the filter type based on the
IP filter number and the specified parameters:
Filters with a specified policy parameter are policy filters.
Filters with a specified priority parameter are priority filters.
Filters with a specified action parameter are either traffic or routing
filters. If the filter number set is:
• between 0 to 99, they are traffic filters
• between 100 to 999, they are routing filters, as long as the only
other parameters specified are the source, entry and smask
parameters. If any other parameter is specified the filter is a traffic
filter.
We recommend always defining this parameter, as a traffic filter created
without specifying type=traffic, and with a filter number between 100
and 999, can default to a routing filter.
See these sections in the IP chapter of the Software Reference for more
information about using traffic, policy and priority filters:
• “Traffic Filters”
• “Policy-Based Routing“
• “Priority-Based Routing“
Default: see the above description
TRAFficA traffic filter is created. The action parameter must
also be specified.
POLicyA policy filter is created. The policy parameter must
also be specified.
PRIorityA priority filter is created. The priority parameter
must also be specified.
ROUtingA routing filter is created. The action parameter
must also be specified.
disable ip macdisparity
SyntaxDISable IP MACdisparity
DescriptionThis new command stops ARP entries from being configured with
discrepancies in their address. When disabled, the router or switch will not
allow an ARP entry with a multicast MAC address to be added, and the router
or switch will discard packets received with address discrepancies.
ExampleTo ensure that entries with unicast IP addresses do not get assigned a multicast
MAC address, use the command:
dis ip mac
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.173
enable ip macdisparity
SyntaxENAble IP MACdisparity
DescriptionThis new command allows you to add static ARP entries with multicast MAC
addresses, and allows packets with conflicting IP and MAC addresses to pass
through the router or switch. Normally these packets are discarded as being
invalid by the router or switch.
Conflicting IP and MAC addresses include:
■A multicast IP address with a unicast MAC address
■A unicast IP address with a multicast MAC address
This feature is disabled by default. When disabled, you can only add ARP
entries with unicast MAC addresses, and the router or switch discards packets
with conflicting IP and MAC addresses.
Switches further downstream may not accept unicast IP addresses with
multicast MAC addresses.
ExampleTo allow static entries with multicast MAC addresses to be configured on the
DescriptionThis command sets IP counters to zero. The counter parameter specifies
particular counters depending on the option, and all resets all of them. You can
now specify cache as an option for the counter parameter.
ExampleTo reset the IP route counters to zero, use the command:
reset ip cou=rou
set ip arpwaittimeout
Software Version 2.8.1
C613-10477-00 REV B
SyntaxSET IP ARPWaittimeout=1..30
DescriptionThis new command sets the amount of time the router or switch waits for a
response after it sends an ARP request message.
The easiest way to test a changed wait timeout period is to ping an unavailable
device. The timeout determines the delay between pinging an IP address and
receiving the reply that the device is unreachable.
The arpwaittimeout parameter specifies the number of seconds that the router
or switch waits for a response to an ARP request message. If it does not receive
a reply after that number of seconds, it notifies the sending device that the
74Internet Protocol (IP) EnhancementsRelease Note
destination is unknown. You may need to increase the timeout period if you
are communicating with devices that are slow to respond. The default is 1
second.
ExampleTo set the router or switch to wait 2 seconds after you ping a device before
declaring that the device is unreachable, use the command:
The protocol parameter specifies which protocol’s routing table is updated
with the new preference value. If all is specified, all protocol routing tables are
updated with the new preference value.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.175
show ip
SyntaxSHow IP
Figure 16: Modified example output from the show ip command
DescriptionThis command displays all or selected parts of the IP MIB. You can now specify
cache as an option for the counter parameter. If all is specified or no option,
then all IP counters are displayed. The MIB can be selectively displayed by
specifying one of the options in the syntax.
Figure 19: Example output from the show ip counter=cache command
Cache Counters
hits ............... 304 rejects .............. 0
deletes .............. 0
Table 17: Parameters in output of the show ip counter=cache command
ParameterMeaning
hitsNumber of times that an entry was found in the cache.
rejectsNumber of times that an entry could not be added to the
cache.
deletesNumber of entries removed from the cache before they
timed out.
Software Version 2.8.1
C613-10477-00 REV B
78Internet Protocol (IP) EnhancementsRelease Note
show ip filter
SyntaxSHow IP FILter[= 0..999]
Figure 20: New parameters in example output from the show ip filter command
IP Filters
-------------------------------------------------------------------------------No. Filter Type
Ent. Source Port Source Address Source Mask Session Size
Dest. Port Dest. Address Dest. Mask Prot.(C/T) Options
Pattern Type Act/Pol/Pri Logging Matches
------------------------------------------------------------------------------- 2 Traffic
1 Any 192.168.166.2 255.255.255.255 Any Yes
Any 192.168.163.39 255.255.255.255 Any No
General Include Off 0
2 Any 192.168.163.21 255.255.255.255 Any Yes
23 192.168.163.39 255.255.255.255 TCP No
General Exclude Off 0
Requests: 0 Passes: 0 Fails: 0
Table 19: New and changed parameters in the output of the show ip udp command
Parameter Meaning
Local
Address
The IP address of the last interface that was used to transport UDP packets from
the router or switch, for a given process. An address of 0.0.0.0 indicates that the
UDP session is active, but either no packets have been transmitted yet, or packets
have been transmitted without specifying the source IP address.
ProcessThe process that is using the UDP session. The following process types may use
UDP on the router or switch:
NTPTime synchronisation using the Network Time Protocol
LBLoad Balancing
RSVPQuality of Service determination using the Resource Reservation
Protocol
UPNPUniversal Plug and Play
VOIPVoice over IP
L2TPTunnelling of PPP Link Layer data using the Layer 2 Tunnelling
Protocol
X25The X25 protocol
SYSLOGGeneration/reception of syslog type logs
SRLP LOGGeneration/reception of logs using the Secure Router Log
Protocol
NETM LOGGeneration/reception of logs using the Net Manage protocol
TFTPDownload/upload of files using the Trivial File Transfer Protocol
SNMPTransfer of device management data using the Simple Network
Management Protocol
DHCP SVRExternal network node configuration by the router or switch
acting as a Dynamic Host Configuration Protocol Server
DHCP CLTCommunications by the router or switch when acting as a client,
using the Dynamic Host Configuration Protocol
BOOTPCommunications by the router or switch when acting as a BOOTP
Relay Agent
UDP FWDForwarding of UDP packets to an external device using IP Helper.
DNSHostname resolution using the Domain Name System Protocol
DNS RELAYThe relaying of DNS messages from the router or switch to an
external host
RIPRouting of IP packets using the Routing Information Protocol
IKMPSecure communications using the Internet Security Association
and Key Management Protocol
IKMP NATSecure communications using the Internet Security Association
and Key Management Protocol via devices configured using
Network Address Translation
IPSECSecure communications using the IP Security Protocol
TACACSUser authentication using the Terminal Access Controller Access
Control System protocol
RADIUSUser authentication using the Remote Authentication Dial In User
Service Protocol
RAD ACCAccounting using the RADIUS protocol
Software Version 2.8.1
C613-10477-00 REV B
80IPv6 EnhancementsRelease Note
IPv6 Enhancements
This Software Version includes the following enhancements to IPv6
functionality:
■Display of UDP Connections over IPv6
■IPv6 Tunnel Expansion
This section describes the enhancements. The new command to implement
them are described in Command Reference Updates.
Display of UDP Connections over IPv6
This Software Version enables you to display the state of all active UDP over
IPv6 sessions, by using the following new command:
show ipv6 udp
Command Changes
The following table summarises the new command:
CommandChange
show ipv6 udpNew command.
IPv6 Tunnel Expansion
This Software Version increases the maximum number of simultaneous IPv6
tunnels available on these routers from 100 to 256:
■AR770S
■AR750S
Static IPv6 tunnels and 6-to-4 tunnels share this resource. For example, an
AR770S operating 110 static tunnels will have 146 free tunnels for 6-to-4
tunnelling.
Command Changes
This expansion does not affect any commands.
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.181
Command Reference Updates
This section describes the new command.
show ipv6 udp
SyntaxSHow IPV6 UDP
DescriptionThis new command displays the state of current UDP sessions over IPv6.
Figure 22: Example output of the new show ipv6 udp command
Table 20: Parameters in the output of the show ipv6 udp command
ParameterMeaning
Local PortThe UDP port number used for the UDP session on this router or switch.
Local AddressThe IPv6 address of the last interface that was used to transport UDP
packets from the router or switch for the given process. A blank address
indicates that the UDP session is active, but either no packets have been
transmitted yet, or packets have been transmitted without specifying the
source IP address.
Remote PortThe UDP port number used for the UDP session on the remote device. A
value of zero indicates that UDP packets from any remote port will be
accepted for the session.
ProcessThe process that is using the UDP session. The following process types
may use UDP on the router or switch:
TFTPDownload/upload of files using the Trivial File Transfer
Protocol
DHCP SVRExternal network node configuration by the router or
switch acting as a Dynamic Host Configuration Protocol
Server
DHCP CLTCommunications by the router or switch when acting as
a client, using the Dynamic Host Configuration Protocol
RIPRouting of IP packets using the Routing Information
Protocol
ISAKMPSecure communications using the Internet Security
Association and Key Management Protocol
Software Version 2.8.1
C613-10477-00 REV B
ExampleTo see whether any UDP sessions are active over IPv6 and which ports they are
using, use the command:
sh ipv6 udp
82L2TP EnhancementsRelease Note
L2TP Enhancements
This Software Version includes the following enhancements to Layer 2
Tunnelling Protocol:
■Decoding Debug Output and Setting a Time Limit for Debugging
■Resetting General L2TP Counters
■Handling PPP Link Negotiation Failures
This section describes the enhancements. The new and modified commands to
implement them are described in Command Reference Updates.
Decoding Debug Output and Setting a Time Limit for
Debugging
This Software Version has improved the display options for the enable l2tp
debug command with the addition of the decode and timeout parameters.
Decoding OutputThe new decode option allows you to display packet data in a human-readable
format. This is an alternative to the undecoded hexadecimal format displayed
when you specify pkt. Use the command:
The new decode option decodes control and payload messages into a
human-readable format. For control packets, all of the message is decoded. For
payload packets, only the header is decoded. The first 64 bytes of the
encapsulated frame is also displayed, but remains in hexadecimal format. For
an example of decoded control and payload packets, see the enable l2tp debug
command in the Command Reference Updates section.
To disable decoded debugging for L2TP, use the command:
Setting a Time LimitThe new timeout parameter in the enable l2tp debug command allows you to
set a time limit for how long L2TP debugging is enabled. This can be set to
between 1 to 300 seconds. Once the limit is reached, all debugging modes for
all calls and tunnels are automatically disabled. If this parameter is not set,
then any debugging options that you enable produce debugging information
until you explicitly turn them off by using the disable l2tp debug command.
To specify a time limit for how long debug information is produced, use the
timeout parameter in the command:
The following table summarises the modified commands:
CommandChange
disable l2tp debugNew decode option for debug parameter.
enable l2tp debugNew decode option for debug parameter.
New timeout parameter.
show l2tp tunnelNew decode option for debug field.
show l2tp tunnel callNew decode option for debug field for a specific call.
Resetting General L2TP Counters
This Software Version has the new command reset l2tp counter, which allows
you to reset the general counters for L2TP. This resets all counters displayed
using the show l2tp counter command. Use the command:
reset l2tp counter
Command Changes
The following table summarises the new command:
CommandChange
reset l2tp counterNew command.
Handling PPP Link Negotiation Failures
The connection between the router or switch, acting as an LNS, and a third
party peer, acting as an LAC, can sometimes fail during PPP link negotiation.
Frequent negotiation failures can indicate a compatibility problem between the
third party peer and Proxy Authentication responses from the router or switch.
You can now disable Proxy Authentication on the router or switch for
situations where the third party equipment is not compatible. Use
proxyauth=off in the command:
add l2tp ip=ipadd[-ipadd] ppptemplate=0..31
[number={off|on|startup}] [pre13={off|on}]
[proxyauth={off|on}]
[tosreflect={off|on|false|true|no|yes}]
The default for proxyauth is on. Proxy Authentication should not be disabled
unless necessary.
Software Version 2.8.1
C613-10477-00 REV B
Command Changes
The following table summarises the modified commands:
CommandChange
add l2tp ipNew proxyauth parameter.
show l2tp ipNew Proxy Authentication parameter in output.
84L2TP EnhancementsRelease Note
Command Reference Updates
This section describes each new command and the changed portions of
modified commands and output screens. For modified commands and output,
new parameters, options and fields are shown in bold.
DEBugThe debugging options to enable on the specified call or tunnel, or on
all currently active calls and tunnels.
Default: no default
DECodeDecode debugging is enabled (Figure 23 on
page 85, Table 21 on page 86). This decodes control
and payload messages into a human-readable
format. For control packets, all of the message is
decoded. For payload packets, only the header is
decoded. The first 64 bytes of the encapsulated
frame is also displayed, but remains in hexadecimal
format.
TIMEOutThe length of time, in seconds, for which debug information is
produced. After this time, all debugging modes are automatically
disabled.
Default: no time limit set (debugging continues until turned off using
the disable l2tp debug command)
Figure 23: Example output from the enable l2tp debug=decode command
18:07:20 L2TP DECODE: Rx [TID:0 CID:0 from 192.168.1.1:1701]
Header:
Version: 2 Type: Control Flags: T,L,S Length: 107
Tunnel ID: 0 Session ID: 0
Sequence Numbers: Ns 0 Nr 0
Attribute Value Pairs (AVPs):
Message Type (0)
Flags: M Len: 8 Value: SCCRQ
Protocol Version (2)
Flags: M Len: 8 Value: 1.0
Host Name (7)
Flags: M Len: 12 Value: L2TP A
Framing Capabilities (3)
Flags: M Len: 10 Value: Async Sync
Assigned Tunnel ID (9)
Flags: M Len: 8 Value: 36082
Bearer Capabilities (4)
Flags: M Len: 10 Value: Analog Digital
Tie Breaker (5)
Flags: - Len: 14
Value: 761cbc695895ce13
Firmware Revision (6)
Flags: - Len: 8 Value: 0207
Vendor Name (8)
Flags: - Len: 9 Value: ATI
Receive Window Size (10)
Flags: M Len: 8 Value: 4
If you set nssatranslator to always, the NSSA router will unconditionally
translate Type-7 LSAs as long as it has NSSA border router status, regardless of
the translator state of other border routers in the NSSA. If it loses border router
status it will stop translating Type-7 LSAs until it regains border router status.
If you set nssatranslator to candidate, the NSSA router will take part in the
NSSA translator election process. The NSSA border router with the highest
router identifier is elected as the translator. Once elected, the border router will
translate Type-7 LSAs until it loses border router status or another NSSA
border router with a higher router identifier is elected as the translator.
90Open Shortest Path First EnhancementsRelease Note
When the NSSA border router is acting as a translator it sets the Nt bit in router
LSAs it originates into the NSSA.
An elected translator loses its translator role when another NSSA border router
with a higher router identifier is elected as translator or an NSSA router
configured to always translate gains border router status. When an elected
translator loses its translator role, it continues to translate Type-7 LSAs for an
additional period of time set by the nssastability parameter. This allows a
more stable transition to the newly elected translator and minimises excessive
flushing of translated Type-7 LSAs.
The nssatranslator and nssastability parameters are only valid when stubarea
is set to nssa.
You can display the current translator role for an area using the command:
show ospf area=area-number
You can display the current translator role for all areas using the command:
show ospf area full
Command Changes
The following table summarises the modified commands:
CommandChange
add ospf areaNew parameter nssatranslator
New parameter nssastability
set ospf areaNew parameter nssatranslator
New parameter nssastability
show ospf areaNew output parameter Role
New output parameter Stability Interval
New output parameter State
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.191
Redistributing External Routes
OSPF static route redistribution has been enhanced to support additional route
sources. OSPF can now import and redistribute BGP, RIP, non-OSPF interface,
and statically configured routes. It can also optionally assign any of the
following settings to all routes it imports:
■a route metric
■the External metric type
■a tag—a number to label the route
Alternatively, you can assign a route map to select particular routes and set
their route parameters. The route map can also filter out a subset of routes, so
you do not have to import all routes.
The import settings also allow you to select whether to redistribute subnets
(classless network routes), or only classfull network routes.
To import and redistribute external routes into OSPF, create a route
redistribution definition for the source routing protocol, using the command:
To change a route redistribution definition, use the command:
set ospf redistribute protocol={bgp|interface|rip|static}
[other-options]
To display the currently configured route redistribution definitions, use the
command:
show ospf redistribute
You can still use the asexternal, bgpfilter, bgpimport, bgplimit, rip, and
staticexport parameters of the set ospf command to configure OSPF to import
BGP, RIP and static routes. However, we recommend that you use route
redistribution definitions to import and redistribute routes into OSPF, as they
provides more control over how the routes are imported.
For compatibility, the asexternal, bgpimport, rip, and staticexport parameters
are synchronised with the equivalent redistribution definition. Changing the
setting of these parameters will add or delete the corresponding route
redistribution definition, as summarised in the following table.
When you change this
set ospf parameter...From...To...Then OSPF...
rip off or export import or both adds a RIP route redistribution definition
import or both off or export deletes the RIP route redistribution definition
bgpimport off on adds a BGP route redistribution definition
on off deletes the BGP route redistribution definition
Software Version 2.8.1
C613-10477-00 REV B
92Open Shortest Path First EnhancementsRelease Note
When you change this
set ospf parameter...From...To...Then OSPF...
staticexport off on adds a static route redistribution definition,
if asexternal is set to on or nssa
on off deletes the static route redistribution definition,
if asexternal is set to on or nssa
asexternal off on or nssa adds a static route redistribution definition,
if staticexport is set to on
Similarly, adding or deleting a route redistribution definition changes the
setting of the corresponding bgpimport, rip, or staticexport parameter, as
summarised in the following table.
When you do this...Then this parameter...Changes from...To...
add a BGP route redistribution definitionbgpimport off on
delete a BGP route redistribution definitionbgpimport on off
add a RIP route redistribution definitionrip off or export import or both
delete a RIP route redistribution definitionrip import or both off or export
add a static route redistribution definitionstaticexport off on
delete a static route redistribution definitionstaticexport on or nssa off
OSPF backward
compatibility
These changes are also reflected in the output of the show config and create
config commands:
■If bgpimport is set to on in the set ospf command, then bgpimport will be
set to off (default) in the output, and the corresponding BGP redistribution
definition will be added to the output.
■If rip is set to import in the set ospf command, then rip will not written to
the output (default is off). Instead, the corresponding RIP redistribution
definition will be written to the output.
■If rip is set to both in the set ospf command, then rip will be set to export
in the output, and the corresponding RIP redistribution definition will be
added to the output.
■If staticexport is set to on in the set ospf command, then staticexport will
be set to off (default) in the output, and the corresponding static
redistribution definition will be added to the output.
In previous releases, the asexternal parameter of the set ospf command
controlled both the importation of non-OSPF interface routes and the
advertisement of external routes. If you set asexternal to on or nssa, OSPF
imported interface routes for interfaces that were not OSPF interfaces, with the
following exceptions:
■Routes that were Local and within an active OSPF range.
■Routes that exactly matched an OSPF host or stub network.
These routes were advertised as a stub link in the router LSA of the area to
which the active range belonged.
As of this software version, the asexternal parameter no longer imports and
redistributes any non-OSPF interface routes. If you need to import and
redistribute non-OSPF interface routes into OSPF you must explicitly add an
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.193
interface route redistribution definition to the OSPF configuration, using the
command:
Use a routemap to control which interface routes are imported.
Command Changes
The following table summarises the modified commands:
CommandChange
add ospf redistributeNew bgp, interface, and rip options for protocol parameter.
New limit parameter.
New original option for metric, tag, and type parameters.
Modified numeric range for metric and tag parameters.
delete ospf redistribute New bgp, interface, and rip options for protocol parameter.
disable ospf debugNew redistribute option for debug parameter.
enable ospf debugNew redistribute option for debug parameter.
set ospfModified behaviour of asexternal, bgpimport, rip and
staticexport parameters.
set ospf redistributeNew bgp, interface, and rip options for protocol parameter.
New limit parameter.
New original option for metric, tag, and type parameters.
Modified numeric range for metric and tag parameters.
show ospf redistributeNew Limit and Redistributed fields.
Modified Protocol field displays new bgp, interface, and rip
options.
Modified Metric, Tag , and Typ e fields displays new original
option.
Software Version 2.8.1
C613-10477-00 REV B
94Open Shortest Path First EnhancementsRelease Note
Command Reference Updates
This section describes each new command and the changed portions of
modified commands and output screens. For modified commands and output,
the new parameters, options, and fields are shown in bold.
where area-number is a 4-byte OSPF area number in dotted decimal notation
DescriptionThe new nssatranslator parameter sets the NSSA translator role when the
router or switch is acting as an NSSA border router. If you specify always, the
router or switch will always translate Type-7 LSAs to Type-5 LSAs, regardless
of the translator state of other border routers in the NSSA, as long as it retains
border router status. If it loses border router status it will stop translating
Type-7 LSAs until it regains border router status. If you specify candidate, the
router or switch will participate in the NSSA translator election process. The
NSSA border router with the highest router identifier is elected as the
translator. Once elected, the router or switch will translate Type-7 LSAs until it
loses border router status or another NSSA border router with a higher router
identifier is elected as the translator. The default is candidate. If the router or
switch is acting as a translator it will set the Nt bit in router LSAs it originates
into the NSSA. The nssatranslator parameter is only valid when stubarea is set
to nssa.
The new nssastability parameter specifies the additional time, in seconds, that
the router or switch will continue to translate Type-7 LSAs after losing the
translator role. An elected translator loses its translator role when another
NSSA border router with a higher router identifier is elected as translator, or an
NSSA router configured to always translate gains border router status. The
time interval allows for a more stable transition to the newly elected translator
and minimises excessive flushing of translated Type-7 LSAs. The default is 40.
The nssastability parameter is only valid when stubarea is set to nssa and
nssatranslator is set to candidate.
DescriptionThe password parameter specifies the password used for authentication. A
password is required if the authentication scheme for the area has been set to
password by using the add ospf area or the set ospf area commands. If none is
specified, no password is configured on the interface. The default is none.
DescriptionThe modified protocol parameter specifies the type of route to redistribute.
Specify bgp or rip to redistribute routes derived from BGP or RIP, respectively.
Specify interface to redistribute non-OSPF interface routes. Specify static to
redistribute statically configured routes.
The new limit parameter specifies the maximum number of routes that can be
redistributed into OSPF for the specified protocol. The default is 1000. If you
add a BGP redistribution definition, the limit parameter overwrites the setting
of the bgplimit parameter in the set ospf command on page 97.
The modified metric parameter specifies the route metric that OSPF assigns to
routes that it redistributes. If you specify original, the original route metric is
preserved in the redistributed route—metric1 for Type-1 routes or metric2 for
Type-2 routes. If you assign a route map that sets the metric, the route map
overrides the setting in this parameter. The default is 20.
The modified tag parameter specifies a number OSPF uses to label routes that
it redistributes. If you specify original, the original route tag is preserved in the
redistributed route. If you assign a route map that sets the tag, the route map
overrides the setting in this parameter. The default is original.
Software Version 2.8.1
C613-10477-00 REV B
The modified type parameter specifies the OSPF external route type that OSPF
assigns to routes that it redistributes. Use the type parameter to ensure that all
externally-sourced OSPF routes are the same type and therefore use the same
method to calculate route metrics. Specify 1 if you require the routes to have a
Type-1 external metric, or 2 if you require the routes to have a Type-2 external
metric. If you assign a route map that sets the type, the route map overrides the
setting in this parameter. The default is 2.
96Open Shortest Path First EnhancementsRelease Note
Adding a BGP, RIP, or static route redistribution definition will change the
setting of the bgpimport, rip, and staticexport parameters of the set ospf
command on page 97. If you configure a BGP route filter using the bgpfilter
parameter of the set ospf command, the filter will be applied before any BGP
route redistribution definition.
delete ospf redistribute
SyntaxDELete OSPF REDistribute
PROTocol={BGP|INTerface|RIP|STAtic}
DescriptionThe modified protocol parameter specifies the route redistribution definition
to delete. OSPF no longer imports and redistributes routes from the protocol.
Specify bgp or rip to delete the redistribution definition for BGP or RIP routes,
respectively. Specify interface to delete the redistribution definition for
non-OSPF interface routes. Specify static to delete the redistribution definition
for statically configured routes.
Deleting a BGP, RIP, or static interface route redistribution definition will
change the setting of the bgpimport, rip, and staticexport parameters of the set
DescriptionThe modified debug parameter specifies the debugging options to disable. If
all is specified, all debugging options are disabled. If ifstate is specified,
interface state debugging is disabled. If nbrstate is specified, neighbour state
debugging is disabled. If packet is specified, OSPF packet debugging is
disabled. If redistribute is specified, route redistribution debugging is
disabled. If spf is specified, debugging for the Shortest Path First routing
calculations are disabled. If state is specified, both interface and neighbour
state debugging are disabled.
DescriptionThe modified debug parameter specifies the debugging options to enable. If all
is specified, all debug options are enabled. If ifstate is specified, interface state
debugging is enabled. If nbrstate is specified, neighbour state debugging is
enabled. Output from ifstate and nbrstate includes the interface or neighbour
the state change relates to, the event that caused the state change, and the
previous and current states of the interface or neighbour. If packet is specified,
OSPF packet debugging is enabled. The level of detail shown in packet
Software Version 2.8.1
C613-10477-00 REV B
Software Version 2.8.197
debugging is set with the detail parameter, but the output always contains the
direction of the packet, the type of packet, the version of OSPF, the packet’s
source and destination, the router ID, area, length, checksum and
authentication type. If redistribute is specified, route redistribution debugging
is enabled. If spf is specified, debugging for the Shortest Path First routing
calculations is enabled. If state is specified, both interface and neighbour state
debugging are enabled.
■ipadd is an IP address in dotted decimal notation
■routemap is the name of an IP route map
DescriptionNo parameters or options have changed. However the behaviour of some
parameters has changed:
■For compatibility, the asexternal, bgpimport, rip, and staticexport
parameters are synchronised with the equivalent redistribution definition.
Changing the setting of these parameters will add or delete the
corresponding route redistribution definition. Similarly, adding or deleting
a route redistribution definition changes the setting of the corresponding
bgpimport, rip, or staticexport parameter.
■The asexternal parameter no longer imports and redistributes non-OSPF
interface routes.
Software Version 2.8.1
C613-10477-00 REV B
98Open Shortest Path First EnhancementsRelease Note
where area-number is a four-byte OSPF area number in dotted decimal notation
DescriptionThe new nssatranslator parameter sets the NSSA translator role when the
router or switch is acting as an NSSA border router. If you specify always, the
router or switch will always translate Type-7 LSAs to Type-5 LSAs, regardless
of the translator state of other border routers in the NSSA, as long as it retains
border router status. If it loses border router status it will stop translating
Type-7 LSAs until it regains border router status. If you specify candidate, the
router or switch will participate in the NSSA translator election process. The
NSSA border router with the highest router identifier is elected as the
translator. Once elected, the router or switch will translate Type-7 LSAs until it
loses border router status or another NSSA border router with a higher router
identifier is elected as the translator. The default is candidate. If the router or
switch is acting as a translator it will set the Nt bit in router LSAs it originates
into the NSSA. The nssatranslator parameter is only valid when stubarea is set
to nssa.
The new nssastability parameter specifies the additional time, in seconds, that
the router or switch will continue to translate Type-7 LSAs after losing the
translator role. An elected translator loses its translator role when another
NSSA border router with a higher router identifier is elected as translator, or an
NSSA router configured to always translate gains border router status. The
time interval allows for a more stable transition to the newly elected translator
and minimises excessive flushing of translated Type-7 LSAs. The default is 40.
The nssastability parameter is only valid when stubarea is set to nssa and
nssatranslator is set to candidate. Changes to nssastability will not take effect
until the next translator election.
DescriptionThe password parameter specifies the password used for authentication. A
password is required if the authentication scheme for the area has been set to
password with the add ospf area or set ospf area commands. If none is
specified, no password is configured on the interface, and any previously set
password is removed. The default is none.
DescriptionThe modified protocol parameter specifies the type of route to redistribute.
Specify bgp or rip to redistribute routes derived from BGP or RIP, respectively.
Specify interface to redistribute non-OSPF interface routes. Specify static to
redistribute statically configured routes.
The new limit parameter specifies the maximum number of routes that can be
redistributed into OSPF for the specified protocol. The default is 1000. If you
add a BGP redistribution definition, the limit parameter overwrites the setting
of the bgplimit parameter in the set ospf command on page 97.
The modified metric parameter specifies the route metric that OSPF assigns to
routes that it redistributes. If you specify original, the original route metric is
preserved in the redistributed route—metric1 for Type-1 routes or metric2 for
Type-2 routes. If you assign a route map that sets the metric, the route map
overrides the setting in this parameter. The default is 20.
The modified tag parameter specifies a number OSPF uses to label routes that
it redistributes. If you specify original, the original route tag is preserved in the
redistributed route. If you assign a route map that sets the tag, the route map
overrides the setting in this parameter. The default is original.
The modified type parameter specifies the OSPF external route type that OSPF
assigns to routes that it redistributes. Use the type parameter to ensure that all
externally-sourced OSPF routes are the same type and therefore use the same
method to calculate route metrics. Specify 1 if you require the routes to have a
Type-1 external metric, or 2 if you require the routes to have a Type-2 external
metric. If you assign a route map that sets the type, the route map overrides the
setting in this parameter. The default is 2.
Modifying a BGP, RIP, or static interface route redistribution definition will
change the setting of the bgpimport, rip, and staticexport parameters of the set
ospf command on page 97. If you configure a BGP route filter using the
bgpfilter parameter of the set ospf command, the filter will be applied before
any BGP route redistribution definition.
Software Version 2.8.1
C613-10477-00 REV B
100Open Shortest Path First EnhancementsRelease Note
where area-number is a 4-byte OSPF area number in dotted decimal notation
DescriptionThe output of this command includes new fields.
Figure 27: Example output from the show ospf area command for a specific area
Area 0.0.0.1:
State ......................... Active
Authentication .... ........... Password
Stub area ..................... No
Stub cost ..................... 1
NSSA .......................... Yes
Role ........................ CANDIDATE
Stability Interval .......... 40
State ....................... DISABLED
Summary LSAs .................. Send
SPF runs ...................... 23
Area border router count ...... 3
AS border router count ........ 2
LSA count ..................... 10
LSA sum of checksums .......... 345bf
Ranges:
Range ....................... 192.168.25.0
Mask ...................... 255.255.255.0
Range ....................... 192.168.250.0
Mask ...................... 255.255.255.0
Interfaces:
ppp23:
Type ...................... Point to point
State ..................... ptp
eth0:
Type ...................... Broadcast
State ..................... otherDR
Table 25: New parameters in output of the show ospf area command for a specific area
ParameterMeaning
RoleNSSA translator role; one of “CANDIDATE” or “ALWAYS”.
This field is only displayed when NSSA is “Yes”.
Stability IntervalTime period, in seconds, that the router or switch will
continue to translate Type-7 LSAs after losing its elected
translator role to another NSSA border router. This field is
only displayed when NSSA is “Yes”.
StateCurrent NSSA translator state. If Role is “ALWAYS”, one of
“DISABLED” or “ENABLED”. If Role is “CANDIDATE”, one
of “DISABLED” or “ELECTED”. This field is only displayed
when NSSA is “Yes”.
Software Version 2.8.1
C613-10477-00 REV B
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.