Allied Telesis X900-24XS, X900, X900-24XT, X908, X900-24XT-N User Manual

Page 1
Software Reference for SwitchBlade
®
x908 and x900 Series Switches
AlliedWare Plus Operating System Version 5.4.3
SwitchBlade® x908 x900-12XT/S x900-24XS x900-24XT x900-24XT-N
C613-50026-01-Rev B
Page 2

Acknowledgments

This product includes software developed by the University of California, Berkeley and its contributors. Copyright All rights reserved.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Tool k it (http://www.openssl.org/).
Copyright
This product includes software licensed under the GNU General Public License available from:
http://www.gnu.org/licenses/gpl2.html
Source code for all GPL licensed software in this product can be obtained from the Allied Telesis GPL Code Download Center at:
http://www.alliedtelesis.com/support/default.aspx
Allied Telesis is committed to meeting the requirements of the open source licenses including the GNU General Public License (GPL) and will make all required source code available.
If you would like a copy of the GPL source code contained in Allied Telesis products, please send us a request by registered mail including a check for US$15 to cover production and shipping costs and a CD with the GPL code will be mailed to you.
©1982, 1986, 1990, 1991, 1993 The Regents of the University of California.
©1998-2008 The OpenSSL Project. All rights reserved.
GPL Code Request Allied Telesis Labs (Ltd) PO Box 8011 Christchurch. New Zealand
©2013 Allied Telesis Inc. All rights reserved.
This documentation is subject to change without notice. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s internal use without the written permission of Allied Telesis, Inc.
Allied Telesis, AlliedWare Plus, EPSRing, SwitchBlade, and VCStack are trademarks or registered trademarks in the United States and elsewhere of Allied Telesis, Inc. Adobe, Acrobat, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Additional brands, names and products mentioned herein may be trademarks of their respective companies.

Getting the most from this manual

Although you can view this document using Acrobat version 5, to get the best from this manual, we recommend using Adobe Acrobat Reader version 8. You can download Acrobat Reader 8 free from http://www.adobe.com/.

New features in this software version

For a list of new and enhanced features and commands in this version, see
Appendix B: Changes in Version 5.4.3 (with links to corresponding sections in this
Software Reference), or the Software Release Note for Version 5.4.3. Documentation can be downloaded from the Support area of our website at
http://www.alliedtelesis.com. Note that to download software files, you need a valid
user account.
Software Reference for SwitchBlade® x908 and x900 Series Switches
ii AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 3

Table of Contents

Part 1 Setting up the Switch
Chapter 1 Getting Started
Introduction...................................................................................................................................................................... 1.3
How to Login.................................................................................................................................................................... 1.3
How to get Command Help........................................................................................................................................ 1.4
Viewing a List of Valid Parameters .................................................................................................................... 1.4
Completing Keywords ........................................................................................................................................... 1.9
Viewing Command Error Messages ................................................................................................................1.10
How to Work with Command Modes....................................................................................................................1.11
Entering Privileged Exec Commands When in a Configuration Mode .............................................. 1.14
How to See the Current Configuration................................................................................................................. 1.16
Default Settings.............................................................................................................................................................1.17
The Default Configuration Script............................................................................................................................1.18
How to Change the Password..................................................................................................................................1.19
How to Set Strong Passwords ..................................................................................................................................1.20
How to Set a Management IP Address ................................................................................................................. 1.22
How to Set an IP Address on VLAN 1..................................................................................................................... 1.23
How to Save and Boot from the Current Configuration.................................................................................1.24
How to Save to the Default Configuration File........................................................................................... 1.24
How to Create and Use a New Configuration File ..................................................................................... 1.24
How to Return to the Factory Defaults .................................................................................................................1.26
How to See System Information .............................................................................................................................1.27
Viewing Overall System Information..............................................................................................................1.27
Viewing Temperature, Voltage, and Fan Status ......................................................................................... 1.28
Viewing the Serial Number ................................................................................................................................1.28
How to Set System Parameters ...............................................................................................................................1.29
How to Change the Telnet Session Timeout ............................................................................................... 1.29
How to Name the Switch ....................................................................................................................................1.29
How to Display a Text Banner at Login..........................................................................................................1.30
How to Set the Time and Date................................................................................................................................. 1.32
How to Show Current Settings ......................................................................................................................... 1.32
How to Set the Time and Date..........................................................................................................................1.32
How to Set the Timezone ...................................................................................................................................1.33
How to Configure Summer-time .....................................................................................................................1.33
How to Add and Remove Users...............................................................................................................................1.34
Pre-encrypted Passwords ................................................................................................................................... 1.35
How to Undo Settings.................................................................................................................................................1.37
How to Use the no Parameter ........................................................................................................................... 1.37
How to Use the default Parameter .................................................................................................................. 1.37
How to Upgrade the Firmware ................................................................................................................................1.38
Save Power With the Eco-Friendly Feature ......................................................................................................... 1.39
Trouble-shoot fiber and pluggable issues........................................................................................................... 1.40
Using the Find Me feature .........................................................................................................................................1.41
Continuous Reboot Prevention............................................................................................................................... 1.42
Controlling “show” Command Output .................................................................................................................1.44
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 iii
Page 4
Commands Available in each Mode ...................................................................................................................... 1.46
User Exec Mode ...................................................................................................................................................... 1.46
Privileged Exec Mode........................................................................................................................................... 1.47
Global Configuration Mode ...............................................................................................................................1.48
AlliedWare Plus GUI .....................................................................................................................................................1.49
Chapter 2 Command Syntax Conventions in this Software Reference
Chapter 3 Start-up Sequence
AlliedWare Plus Start-up .............................................................................................................................................. 3.2
Diagnostic Menu............................................................................................................................................................. 3.3
Bootloader Menu............................................................................................................................................................ 3.5
Start-up Sequence.......................................................................................................................................................... 3.9
Chapter 4 CLI Navigation Commands
Command List.................................................................................................................................................................. 4.2
Chapter 5 User Access Commands
Introduction...................................................................................................................................................................... 5.2
Command List.................................................................................................................................................................. 5.2
Chapter 6 Creating and Managing Files
Introduction...................................................................................................................................................................... 6.2
Working With Files ......................................................................................................................................................... 6.2
Listing files ................................................................................................................................................................. 6.2
Displaying the contents of configuration and text files ............................................................................ 6.4
Navigating through the filesystem ................................................................................................................... 6.4
Using the editor........................................................................................................................................................ 6.6
Creating and Using Configuration Files ................................................................................................................. 6.8
Creating a configuration file ................................................................................................................................ 6.8
Specifying the start-up configuration script.................................................................................................. 6.8
Working with configuration files ....................................................................................................................... 6.9
The configuration file fallback order ..............................................................................................................6.10
Copying Files To and From Your Device .............................................................................................................. 6.12
URL syntax................................................................................................................................................................ 6.12
Copying files ............................................................................................................................................................ 6.12
Copying from a Server to Running Configuration.....................................................................................6.16
The Autoboot Feature ................................................................................................................................................6.18
Restoring a switch using Autoboot from external media....................................................................... 6.20
Configure Autoboot ............................................................................................................................................. 6.21
Chapter 7 File Management Commands
Introduction...................................................................................................................................................................... 7.3
URL Syntax and Keyword Usage ........................................................................................................................ 7.3
Command List.................................................................................................................................................................. 7.4
Chapter 8 System Configuration and Monitoring Commands
Command List.................................................................................................................................................................. 8.3
Software Reference for SwitchBlade® x908 and x900 Series Switches
iv AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 5
Chapter 9 Debugging and Logging
Introduction...................................................................................................................................................................... 9.2
Debugging........................................................................................................................................................................ 9.2
Logging to terminal ................................................................................................................................................ 9.2
Turning off debugging .......................................................................................................................................... 9.3
Logging .............................................................................................................................................................................. 9.3
Log Outputs............................................................................................................................................................... 9.4
Chapter 10 Logging Commands
Command List................................................................................................................................................................10.2
Chapter 11 Interface Commands
Command List................................................................................................................................................................11.2
Chapter 12 Scripting Commands
Command List................................................................................................................................................................12.2
Chapter 13 Interface Testing Commands
Command List................................................................................................................................................................13.2
Part 2 Layer Two Switching
Chapter 14 Switching Introduction
Introduction....................................................................................................................................................................14.2
Physical Layer Information ........................................................................................................................................ 14.3
Switch Ports .............................................................................................................................................................14.3
Activating and Deactivating Switch Ports .................................................................................................... 14.4
Autonegotiation.....................................................................................................................................................14.4
Duplex mode...........................................................................................................................................................14.4
Speed options.........................................................................................................................................................14.4
MDI/MDIX Connection Modes .......................................................................................................................... 14.5
Switch Bay Provisioning ............................................................................................................................................. 14.7
Provisioned Board Classes..................................................................................................................................14.7
Applying Hardware Provisioning..................................................................................................................... 14.7
Removing or Changing XEM BAY Provisioning.......................................................................................... 14.8
Displaying Provisioned Configurations.........................................................................................................14.8
Provisioning and Change Management .....................................................................................................14.10
Provisioning and Software Version Aspects ..............................................................................................14.11
The Layer 2 Switching Process...............................................................................................................................14.12
The Ingress Rules .................................................................................................................................................14.12
The Learning Process .........................................................................................................................................14.13
The Forwarding Process ....................................................................................................................................14.14
The Egress Rules...................................................................................................................................................14.14
Layer 2 Filtering...........................................................................................................................................................14.15
Ingress Filtering....................................................................................................................................................14.15
Storm-control...............................................................................................................................................................14.16
Loop Protection...........................................................................................................................................................14.17
Loop Detection ....................................................................................................................................................14.17
Thrash Limiting.....................................................................................................................................................14.18
Support for Jumbo Frames .....................................................................................................................................14.19
Port Mirroring...............................................................................................................................................................14.20
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 v
Page 6
Port Security .................................................................................................................................................................14.21
MAC Address Learn Limits................................................................................................................................14.21
IEEE 802.1X.............................................................................................................................................................14.21
Quality of Service ........................................................................................................................................................14.22
IGMP Snooping............................................................................................................................................................14.23
Chapter 15 Switching Commands
Command List................................................................................................................................................................15.3
Chapter 16 VLAN Introduction
Introduction....................................................................................................................................................................16.2
Virtual LANs (VLANs).................................................................................................................................................... 16.2
Configuring VLANs................................................................................................................................................ 16.3
VLAN Double Tagging (VLAN Stacking) ...............................................................................................................16.5
How double-tagged VLANs work .................................................................................................................... 16.5
VLAN Rules for double tagging ........................................................................................................................16.5
Restrictions when using double-tagged VLANs.........................................................................................16.6
Configuring double-tagged VLANs ................................................................................................................16.6
Private VLANs...............................................................................................................................................................16.11
Private VLANs for ports in access mode ......................................................................................................16.11
Private VLAN operation with ports in access mode................................................................................16.13
Access mode private VLAN configuration example................................................................................16.14
Private VLANs for trunked ports.....................................................................................................................16.17
Trunked port private VLAN configuration example................................................................................16.18
Protocol based VLAN configuration example...........................................................................................16.21
Chapter 17 VLAN Commands
Command List................................................................................................................................................................17.2
Chapter 18 Spanning Tree Introduction: STP, RSTP, and MSTP
Introduction....................................................................................................................................................................18.2
Overview of Spanning Trees.....................................................................................................................................18.2
Spanning tree operation.....................................................................................................................................18.2
Spanning tree modes...........................................................................................................................................18.4
Spanning Tree Protocol (STP)................................................................................................................................... 18.5
Configuring STP ............................................................................................................................................................18.6
Rapid Spanning Tree Protocol (RSTP) ...................................................................................................................18.8
Configuring RSTP.......................................................................................................................................................... 18.9
Multiple Spanning Tree Protocol (MSTP) ...........................................................................................................18.11
Multiple Spanning Tree Instances (MSTI)....................................................................................................18.12
MSTP Regions........................................................................................................................................................18.13
Common and Internal Spanning Tree (CIST) .............................................................................................18.15
MSTP Bridge Protocol Data Units (BPDUs) .................................................................................................18.17
Configuring MSTP.......................................................................................................................................................18.19
Chapter 19 Spanning Tree Commands
Command List................................................................................................................................................................19.3
Software Reference for SwitchBlade® x908 and x900 Series Switches
vi AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 7
Chapter 20 Link Aggregation Introduction and Configuration
Introduction and Overview.......................................................................................................................................20.2
Static and Dynamic (LACP) Link Aggregation....................................................................................................20.3
Static Channel Groups .........................................................................................................................................20.3
Dynamic (LACP) Channel Groups ....................................................................................................................20.3
Link Aggregation Control Protocol (LACP)................................................................................................... 20.3
Configuring an LACP Channel Group.................................................................................................................... 20.5
Minimal LACP Group Configuration ............................................................................................................... 20.8
Configuring a Static Channel Group......................................................................................................................20.9
Chapter 21 Link Aggregation Commands
Introduction....................................................................................................................................................................21.2
Command List................................................................................................................................................................21.2
Chapter 22 GVRP Introduction and Configuration
Introduction....................................................................................................................................................................22.2
GVRP Example.........................................................................................................................................................22.3
GVRP Guidelines.....................................................................................................................................................22.4
GVRP and Network Security...............................................................................................................................22.5
GVRP-inactive Intermediate Switches............................................................................................................ 22.5
Enabling GVRP on the Switch............................................................................................................................ 22.5
Enabling GVRP on the Ports............................................................................................................................... 22.6
Setting the GVRP Timers .....................................................................................................................................22.6
Disabling GVRP on the Ports.............................................................................................................................. 22.7
Disabling GVRP on the Switch ..........................................................................................................................22.7
Configuring and validating GVRP ...........................................................................................................................22.8
Chapter 23 GVRP Commands
Command List................................................................................................................................................................23.2
Part 3 Layer Three, Switching and Routing
Chapter 24 Internet Protocol (IP) Addressing and Protocols
Introduction....................................................................................................................................................................24.2
Address Resolution Protocol (ARP) ........................................................................................................................ 24.3
Static ARP Entries...................................................................................................................................................24.3
Timing Out ARP Entries ....................................................................................................................................... 24.3
Deleting ARP Entries.............................................................................................................................................24.4
Proxy ARP .................................................................................................................................................................24.4
ARP Logging ............................................................................................................................................................ 24.7
Domain Name System (DNS)....................................................................................................................................24.8
Domain name parts ..............................................................................................................................................24.8
Server hierarchy .....................................................................................................................................................24.8
DNS Client ................................................................................................................................................................24.9
DNS Relay ...............................................................................................................................................................24.10
DHCP options........................................................................................................................................................24.12
Internet Control Message Protocol (ICMP)........................................................................................................24.13
ICMP Router Discovery Protocol (IRDP)..............................................................................................................24.14
Router discovery ..................................................................................................................................................24.14
Router discovery process ..................................................................................................................................24.14
Configuration procedure ..................................................................................................................................24.16
Checking IP Connections .........................................................................................................................................24.18
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 vii
Page 8
Ping...........................................................................................................................................................................24.18
Traceroute ..............................................................................................................................................................24.18
IP Helper.........................................................................................................................................................................24.19
IP Directed Broadcast ................................................................................................................................................24.20
Chapter 25 IP Addressing and Protocol Commands
Introduction....................................................................................................................................................................25.3
Command List................................................................................................................................................................25.4
Chapter 26 IPv6 Introduction
Introduction....................................................................................................................................................................26.2
Overview.......................................................................................................................................................................... 26.2
IPv6 Addresses and Prefixes .....................................................................................................................................26.3
Address types.......................................................................................................................................................... 26.3
IPv6 Headers............................................................................................................................................................ 26.5
The Internet Control Message Protocol (ICMPv6)......................................................................................26.7
IPv6 Routing ..........................................................................................................................................................26.10
Integration of IPv4 and IPv6 ............................................................................................................................26.10
IPv6 on your Switch ...................................................................................................................................................26.11
Enabling IPv6.........................................................................................................................................................26.11
IPv6 Stateless Address Autoconfiguration (SLAAC)................................................................................26.11
IPv6 EUI-64 Addressing......................................................................................................................................26.11
IPv6 Link-local Addresses..................................................................................................................................26.12
IPv6 RA Guard ..............................................................................................................................................................26.13
RA Guard Introduction.......................................................................................................................................26.13
Enabling IPv6 RA Guard.....................................................................................................................................26.13
Chapter 27 IPv6 Commands
Command List................................................................................................................................................................27.2
Chapter 28 IPv6to4 Tunneling Configuration
Introduction....................................................................................................................................................................28.2
6to4 Automatic Tunnel Configuration.................................................................................................................. 28.2
Tunneling Operation ............................................................................................................................................ 28.2
6to4 tunnels operation and configuration summary............................................................................... 28.3
Example 6to4 configuration ..............................................................................................................................28.4
Chapter 29 IPv6to4 Tunneling Commands
Command List................................................................................................................................................................29.2
Chapter 30 Routing Protocol Overview
Introduction....................................................................................................................................................................30.2
RIP....................................................................................................................................................................................... 30.2
OSPF ..................................................................................................................................................................................30.2
BGP..................................................................................................................................................................................... 30.3
PIM-SM..............................................................................................................................................................................30.4
VRRP ..................................................................................................................................................................................30.4
Software Reference for SwitchBlade® x908 and x900 Series Switches
viii AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 9
Chapter 31 Route Selection
Introduction....................................................................................................................................................................31.2
Types of Routes .............................................................................................................................................................31.2
Interface Routes .....................................................................................................................................................31.2
Static Routes............................................................................................................................................................ 31.2
Dynamic Routes .....................................................................................................................................................31.3
RIB and FIB Routing Tables........................................................................................................................................31.4
Administrative Distance ...................................................................................................................................... 31.5
Equal Cost Multipath Routing ........................................................................................................................... 31.7
How AlliedWare Plus Deletes Routes ............................................................................................................. 31.7
How AlliedWare Plus Adds Routes ..................................................................................................................31.8
Chapter 32 Routing Commands
Introduction....................................................................................................................................................................32.2
Command List................................................................................................................................................................32.2
Chapter 33 RIP Configuration
Introduction....................................................................................................................................................................33.2
Enabling RIP.................................................................................................................................................................... 33.2
Specifying the RIP Version......................................................................................................................................... 33.4
RIPv2 Authentication (Single Key).......................................................................................................................... 33.6
RIPv2 Text Authentication (Multiple Keys)..........................................................................................................33.8
RIPv2 md5 authentication (Multiple Keys) ........................................................................................................33.12
Chapter 34 RIP Commands
Introduction....................................................................................................................................................................34.2
Command List................................................................................................................................................................34.2
Chapter 35 RIPng Configuration
Introduction....................................................................................................................................................................35.2
Enabling RIPng ..............................................................................................................................................................35.2
Troubleshooting RIPng Adjacency.........................................................................................................................35.5
Chapter 36 RIPng Commands
Introduction....................................................................................................................................................................36.2
Command List................................................................................................................................................................36.2
Chapter 37 OSPF Introduction and Configuration
OSPF Introduction ........................................................................................................................................................ 37.2
Features............................................................................................................................................................................ 37.2
OSPF Components .......................................................................................................................................................37.2
Autonomous Systems ..........................................................................................................................................37.2
Routing Areas.......................................................................................................................................................... 37.3
Adjacencies and Designated Routers............................................................................................................. 37.3
Link State Advertisements..................................................................................................................................37.4
OSPF Packet Types ................................................................................................................................................37.4
OSPF States .............................................................................................................................................................. 37.5
OSPF Metrics............................................................................................................................................................ 37.6
Automatic Cost Calculation ...............................................................................................................................37.6
Routing with OSPF ................................................................................................................................................ 37.6
Network Types ........................................................................................................................................................ 37.6
Passive Interfaces................................................................................................................................................... 37.7
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 ix
Page 10
Authenticating OSPF ............................................................................................................................................ 37.7
Redistributing External Routes ......................................................................................................................... 37.8
Enabling OSPF on an Interface ................................................................................................................................ 37.9
Setting priority.............................................................................................................................................................37.11
Configuring an Area Border Router .....................................................................................................................37.13
Redistributing Routes Into OSPF...........................................................................................................................37.14
OSPF Cost ......................................................................................................................................................................37.15
Configuring Virtual Links .........................................................................................................................................37.18
OSPF Authentication .................................................................................................................................................37.20
Chapter 38 OSPF Commands
Introduction....................................................................................................................................................................38.3
Command List................................................................................................................................................................38.3
Chapter 39 OSPFv3 for IPv6 Introduction and Configuration
OSPFv3 Introduction ................................................................................................................................................... 39.2
Features............................................................................................................................................................................ 39.2
Licensing.......................................................................................................................................................................... 39.3
Routing Overview.........................................................................................................................................................39.3
OSPF Components .......................................................................................................................................................39.4
Autonomous Systems ..........................................................................................................................................39.4
Routing Areas.......................................................................................................................................................... 39.4
Relationships Between Routers........................................................................................................................ 39.4
OSPFv3 Packet Types ...........................................................................................................................................39.4
Link State Advertisements (LSAs) ....................................................................................................................39.9
LSA Header...............................................................................................................................................................39.9
OSPFv3 States .......................................................................................................................................................39.10
OSPFv3 Metrics.....................................................................................................................................................39.10
Automatic Cost Calculation .............................................................................................................................39.10
Network Types ......................................................................................................................................................39.11
Passive Interfaces.................................................................................................................................................39.11
Redistributing External Routes .......................................................................................................................39.12
Differences between OSPFV2 and OSPFv3 .......................................................................................................39.13
OSPFv3 Authentication and Encryption Overview ........................................................................................39.15
OSPFv3 Authentication and Encryption Support ....................................................................................39.15
Configuring OSPFv3 ..................................................................................................................................................39.17
Example 1: Single-Area Network Configuration.......................................................................................39.18
Example 2: Two-Area Network Configuration ..........................................................................................39.25
Setting Up the Metrics .......................................................................................................................................39.27
Configuring OSPFv3 Authentication and Encryption ..................................................................................39.32
Configuring OSPFv3 Authentication on a VLAN ......................................................................................39.33
Configuring OSPFv3 Encryption on a VLAN...............................................................................................39.34
Configuring OSPFv3 Authentication in an OSPFv3 Area ......................................................................39.35
Configuring OSPFv3 Encryption in an OSPFv3 Area ...............................................................................39.36
Configuring OSPFv3 Authentication and Encryption for a Virtual Link ...........................................39.37
OSPFv3 Authentication in an OSPFv3 Area................................................................................................39.38
OSPFv3 Encryption in an OSPFv3 Area........................................................................................................39.40
OSPFv3 Authentication on a VLAN ...............................................................................................................39.42
OSPFv3 Encryption on a VLAN ........................................................................................................................39.44
OSPFv3 Authentication with two VLANs ....................................................................................................39.46
OSPFv3 Encryption with two VLANs.............................................................................................................39.48
OSPFv3 Authentication for a Virtual Link....................................................................................................39.50
OSPFv3 Encryption for a Virtual Link ............................................................................................................39.52
Software Reference for SwitchBlade® x908 and x900 Series Switches
x AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 11
Chapter 40 OSPFv3 for IPv6 Commands
Command List................................................................................................................................................................40.3
Chapter 41 BGP Configuration
Introduction....................................................................................................................................................................41.2
Enabling BGP Peers In The Same Autonomous System ................................................................................. 41.2
Enabling BGP Between Different Autonomous Systems ...............................................................................41.4
Route Reflector .............................................................................................................................................................. 41.5
Confederations .............................................................................................................................................................. 41.7
BGP Authentication ...................................................................................................................................................41.10
Configuring BGP Graceful Reset............................................................................................................................41.12
Configuring BGP Graceful Restart.........................................................................................................................41.14
Chapter 42 BGP Commands
Introduction....................................................................................................................................................................42.4
Command List................................................................................................................................................................42.5
Chapter 43 Route Map Configuration
Introduction....................................................................................................................................................................43.2
Route-Map.......................................................................................................................................................................43.2
Chapter 44 Route Map Commands
Command List................................................................................................................................................................44.2
Chapter 45 VRF-Lite Introduction and Configuration
Introduction....................................................................................................................................................................45.2
VRF-Lite ............................................................................................................................................................................ 45.2
Configuring VRF-Lite ...................................................................................................................................................45.6
Creating and Partitioning VRF Instances.......................................................................................................45.6
Sharing Connectivity Between VRF Instances............................................................................................. 45.7
Intra-VRF Routing .......................................................................................................................................................45.13
Inter-VRF Routing .......................................................................................................................................................45.13
Static Inter-VRF Routing ...........................................................................................................................................45.14
Dynamic VRF Routing ...............................................................................................................................................45.15
Utilities Available within VRF-Lite.........................................................................................................................45.15
Utilities Unavailable within VRF-Lite....................................................................................................................45.16
Chapter 46 VRF-Lite Commands
Introduction....................................................................................................................................................................46.3
Command List................................................................................................................................................................46.3
Part 4 Multicast Applications
Chapter 47 Multicast Introduction and Commands
Multicast Introduction ................................................................................................................................................ 47.2
Multicast groups .................................................................................................................................................... 47.3
Components in a multicast network .............................................................................................................. 47.3
Command List................................................................................................................................................................47.5
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 xi
Page 12
Chapter 48 IGMP and IGMP Snooping Introduction
Introduction....................................................................................................................................................................48.2
IGMP ..................................................................................................................................................................................48.3
Joining a multicast group (Membership report) ........................................................................................ 48.4
Staying in the multicast group (Query message)....................................................................................... 48.4
Leaving the multicast group (Leave message) ........................................................................................... 48.4
IGMP Snooping.............................................................................................................................................................. 48.5
How IGMP Snooping operates..........................................................................................................................48.5
IGMP Snooping and Querier configuration example ............................................................................... 48.6
Query Solicitation .........................................................................................................................................................48.8
How Query Solicitation Works ..........................................................................................................................48.8
Query Solicitation Operation.............................................................................................................................48.9
Speeding up IGMP convergence in a non-looped topology...............................................................48.11
Enabling Query Solicitation on multiple switches in a looped topology........................................48.11
Chapter 49 IGMP and IGMP Snooping Commands
Introduction....................................................................................................................................................................49.2
Command List................................................................................................................................................................49.2
Chapter 50 PIM-SM Introduction and Configuration
Introduction....................................................................................................................................................................50.2
PIM-SM.............................................................................................................................................................................. 50.2
Characteristics of PIM-SM .......................................................................................................................................... 50.2
Roles in PIM-SM .............................................................................................................................................................50.3
Operation of PIM-SM ................................................................................................................................................... 50.4
PIM-SM Configuration................................................................................................................................................. 50.6
Static Rendezvous Point configuration .........................................................................................................50.7
Dynamic Rendezvous Point configuration...................................................................................................50.9
Bootstrap Router configuration .....................................................................................................................50.11
PIM-SSM .........................................................................................................................................................................50.14
Characteristics of PIM-SSM......................................................................................................................................50.14
PIM-SSM IP Address Range ..............................................................................................................................50.14
IGMPv3 and SSM-Mapping ..............................................................................................................................50.14
How PIM-SSM Works ..........................................................................................................................................50.15
How IGMP SSM-Mapping Works....................................................................................................................50.16
Configure PIM-SSM .............................................................................................................................................50.16
Chapter 51 PIM-SM Commands
Command List................................................................................................................................................................51.2
Chapter 52 PIM-SMv6 Introduction and Configuration
Introduction....................................................................................................................................................................52.2
PIM-SMv6......................................................................................................................................................................... 52.2
Characteristics of PIM-SMv6 .....................................................................................................................................52.3
Roles in PIM-SMv6 ........................................................................................................................................................ 52.4
PIM-SMv6 Terminology ..............................................................................................................................................52.5
Operation of PIM-SMv6 .............................................................................................................................................. 52.6
Data Flow from Source to Receivers for PIM-SMv6.......................................................................................... 52.8
PIM-SMv6 Embedded RP, RP and BSR Candidate Configurations ............................................................52.10
Embedded RP Configuration...........................................................................................................................52.10
Verify Embedded RP Configuration..............................................................................................................52.12
RP and BSR Candidate Configuration...........................................................................................................52.13
Verify RP and RP Candidate Configuration.................................................................................................52.15
Software Reference for SwitchBlade® x908 and x900 Series Switches
xii AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 13
PIM-SMv6 Static RP, DR, BSR Configurations....................................................................................................52.17
Static Rendezvous Point Configuration.......................................................................................................52.18
Verify Static Rendezvous Point Configuration..........................................................................................52.19
Dynamic Rendezvous Point Configuration................................................................................................52.20
Verify PIM group-to-RP mappings.................................................................................................................52.21
Verify RP details ....................................................................................................................................................52.21
Boot Strap Router Configuration ...................................................................................................................52.22
Verify Boot Strap Router Configuration.......................................................................................................52.23
Chapter 53 PIM-SMv6 Commands
Command List................................................................................................................................................................53.3
Chapter 54 PIM-DM Introduction and Configuration
Introduction....................................................................................................................................................................54.2
Characteristics of PIM-DM .........................................................................................................................................54.2
PIM-DM Terminology .................................................................................................................................................. 54.3
PIM-DM Configuration................................................................................................................................................ 54.4
Configuration Example........................................................................................................................................54.4
Verifying Configuration .......................................................................................................................................54.6
Chapter 55 PIM-DM Commands
Command List................................................................................................................................................................55.2
Chapter 56 MLD and MLD Snooping Introduction and Commands
MLD Introduction .........................................................................................................................................................56.2
MLD Snooping........................................................................................................................................................ 56.3
MLD Snooping Configuration Examples....................................................................................................... 56.4
Command List................................................................................................................................................................56.7
Part 5 Access and Security
Chapter 57 Access Control Lists Introduction
Introduction....................................................................................................................................................................57.2
Overview................................................................................................................................................................... 57.2
ACL Rules .................................................................................................................................................................. 57.3
ACL Source and Destination Addresses ........................................................................................................57.3
ACL Reverse Masking ...........................................................................................................................................57.3
Hardware and Software ACL Types........................................................................................................................57.4
Defining Hardware MAC ACLs ..........................................................................................................................57.5
Defining Hardware IP ACLs ................................................................................................................................ 57.6
Actions for Hardware ACLs.................................................................................................................................57.7
Attaching hardware ACLs to interfaces.........................................................................................................57.7
Hardware ACLs and QoS classifications................................................................................................................57.8
Classifying Your Traffic.........................................................................................................................................57.8
Security ACLs...........................................................................................................................................................57.8
QoS ACLs................................................................................................................................................................... 57.9
Profile Limitations.................................................................................................................................................. 57.9
Attaching hardware ACLs using QoS ...........................................................................................................57.11
Filtering hardware ACLs with QoS.................................................................................................................57.12
Using QoS Match Commands with TCP Flags...........................................................................................57.13
ACL Filter Sequence Numbers ...............................................................................................................................57.15
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 xiii
Page 14
ACL Filter Sequence Number Behavior .......................................................................................................57.15
ACL Filter Sequence Number Applicability................................................................................................57.15
ACL Filter Sequence Number Types .............................................................................................................57.16
ACL Filter Sequence Configuration......................................................................................................................57.19
Creating ACLs in Global Configuration Mode ...........................................................................................57.21
Display the ACL configuration details..........................................................................................................57.23
Chapter 58 IPv4 Hardware Access Control List (ACL) Commands
Introduction....................................................................................................................................................................58.2
IPv4 Hardware Access List Commands and Prompts ...................................................................................... 58.3
Command List................................................................................................................................................................58.4
Chapter 59 IPv4 Software Access Control List (ACL) Commands
Introduction....................................................................................................................................................................59.2
IPv4 Software Access List Commands and Prompts ........................................................................................59.3
Command List................................................................................................................................................................59.4
Chapter 60 IPv6 Hardware Access Control List (ACL) Commands
Introduction....................................................................................................................................................................60.2
IPv6 Hardware Access List Commands and Prompts ...................................................................................... 60.3
Command List................................................................................................................................................................60.4
Chapter 61 IPv6 Software Access Control List (ACL) Commands
Introduction....................................................................................................................................................................61.2
IPv6 Software Access List Commands and Prompts ........................................................................................61.3
Command List................................................................................................................................................................61.4
Chapter 62 Quality of Service (QoS) Introduction
Introduction....................................................................................................................................................................62.2
QoS Operations ......................................................................................................................................................62.2
QoS Packet Information ............................................................................................................................................. 62.3
Link Layer QoS ........................................................................................................................................................62.3
Differentiated Services Architecture............................................................................................................... 62.4
The Differential Services Field ...........................................................................................................................62.5
Processing pre-marked packets .......................................................................................................................62.6
Applying QoS on Your Switch..................................................................................................................................62.7
Classifying your Data............................................................................................................................................ 62.7
Class Maps ................................................................................................................................................................ 62.7
Policy Maps ............................................................................................................................................................62.10
Premarking Your Traffic............................................................................................................................................62.11
CoS to egress queue premarking ..................................................................................................................62.11
DSCP to egress queue premarking ...............................................................................................................62.13
Policing (Metering) Your Data................................................................................................................................62.16
Single-rate Three-color Policing.....................................................................................................................62.17
Two-rate Three-color Policing.........................................................................................................................62.18
Configuring and Applying a Policer..............................................................................................................62.19
Remarking Your Data ................................................................................................................................................62.20
Configuring the Egress Queues.............................................................................................................................62.22
Fabric queues - The Internal Paths ................................................................................................................62.22
Egress Queues and QoS markers ...................................................................................................................62.22
Egress Queue Commands Hierarchy ............................................................................................................62.23
Egress Queue Shaping..............................................................................................................................................62.24
Scheduling .............................................................................................................................................................62.24
Software Reference for SwitchBlade® x908 and x900 Series Switches
xiv AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 15
Drop Mode .............................................................................................................................................................62.26
Egress Queue Mapping .....................................................................................................................................62.33
Storm Protection.........................................................................................................................................................62.35
QoS and the Switching Fabric................................................................................................................................62.36
Policy-Based Routing ................................................................................................................................................62.37
Practical Example.................................................................................................................................................62.37
Chapter 63 QoS Commands
Command List................................................................................................................................................................63.3
Chapter 64 802.1X Introduction and Configuration
Introduction....................................................................................................................................................................64.2
The 802.1X Implementation.....................................................................................................................................64.2
Configuring 802.1X ......................................................................................................................................................64.3
Chapter 65 802.1X Commands
Command List................................................................................................................................................................65.2
Chapter 66 Authentication Introduction and Configuration
Authentication Introduction .................................................................................................................................... 66.2
Tri-Authentication Introduction.......................................................................................................................66.2
Tri-Authentication Configuration....................................................................................................................66.2
Configuring a Guest VLAN..................................................................................................................................66.3
Roaming Authentication ........................................................................................................................................... 66.4
Roaming Authentication Overview ................................................................................................................ 66.5
Roaming Authentication Feature Interactions ........................................................................................... 66.6
Unauthenticated Supplicant Traffic.......................................................................................................................66.7
Deciding when a supplicant fails authentication ...................................................................................... 66.9
Authentication Enhancements..............................................................................................................................66.10
Web-authentication Enhancements.............................................................................................................66.10
Guest VLAN Enhancements .............................................................................................................................66.12
Failed authentication VLAN .............................................................................................................................66.12
Limitations on allowed feature combinations ..........................................................................................66.13
Chapter 67 Authentication Commands
Command List................................................................................................................................................................67.3
Chapter 68 AAA Introduction and Configuration
AAA Introduction..........................................................................................................................................................68.2
Available functions and server types..............................................................................................................68.2
Server Groups and Method Lists ......................................................................................................................68.3
Configuring AAA Login Authentication ............................................................................................................... 68.5
AAA Configuration Tasks .................................................................................................................................... 68.5
Sample Authentication Configurations................................................................................................................68.7
Sample 802.1X Authentication Configuration............................................................................................ 68.7
Sample MAC Authentication Configuration................................................................................................68.8
Sample Web-Authentication Configuration................................................................................................ 68.9
Sample Tri-Authentication Configuration..........................................................................................
Chapter 69 AAA Commands
Command List................................................................................................................................................................69.2
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 xv
........68.10
Page 16
Chapter 70 RADIUS Introduction and Configuration
Introduction....................................................................................................................................................................70.2
RADIUS Packets ...................................................................................................................................................... 70.3
RADIUS Attributes ................................................................................................................................................. 70.4
RADIUS Security .....................................................................................................................................................70.5
RADIUS Proxy .......................................................................................................................................................... 70.6
RADIUS Accounting ..............................................................................................................................................70.7
RADIUS Configuration ................................................................................................................................................ 70.8
Switch Configuration Tasks................................................................................................................................70.8
Switch to RADIUS Server Communication ................................................................................................... 70.9
AAA Server Groups Configuration.................................................................................................................70.11
RADIUS Configuration Examples ..........................................................................................................................70.14
RADIUS Authentication .....................................................................................................................................70.14
Single RADIUS Server Configuration ............................................................................................................70.15
Multiple RADIUS Server Configuration........................................................................................................70.16
RADIUS Server Group Configuration............................................................................................................70.16
RADIUS Server Configuration using Server Groups ................................................................................70.17
Chapter 71 RADIUS Commands
Command List................................................................................................................................................................71.2
Chapter 72 TACACS+ Introduction and Configuration
Introduction....................................................................................................................................................................72.2
TACACS+ Overview...................................................................................................................................................... 72.2
The AlliedWare Plus TACACS+ Implementation ........................................................................................ 72.2
Authentication........................................................................................................................................................ 72.3
Authorization .......................................................................................................................................................... 72.3
Accounting...............................................................................................................................................................72.4
Configuration.................................................................................................................................................................72.5
Configure TACACS+.............................................................................................................................................. 72.5
TACACS+ Configuration Example ...................................................................................................................72.7
Chapter 73 TACACS+ Commands
Command List................................................................................................................................................................73.2
Chapter 74 Local RADIUS Server Introduction and Configuration
Local RADIUS Server Introduction..........................................................................................................................74.2
Enable the Local RADIUS Server....................................................................................................................... 74.2
Add the Local RADIUS Server as a RADIUS Server ..................................................................................... 74.3
Add authenticators to the list of authenticators........................................................................................ 74.3
Configure the Local RADIUS Server User Database .................................................................................. 74.4
Authenticating login sessions...........................................................................................................................74.5
RADIUS Authentication with User Privileges............................................................................................... 74.5
Creating certificates for single users and all users..................................................................................... 74.8
Defined RADIUS attributes list ................................................................................................................................. 74.9
Chapter 75 Local RADIUS Server Commands
Command List................................................................................................................................................................75.2
Software Reference for SwitchBlade® x908 and x900 Series Switches
xvi AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 17
Chapter 76 Secure Shell (SSH) Introduction
Introduction....................................................................................................................................................................76.2
Secure Shell on AlliedWare Plus.......................................................................................................................76.2
Configuring the SSH Server ......................................................................................................................................76.4
Creating a Host Key............................................................................................................................................... 76.4
Enabling the Server............................................................................................................................................... 76.4
Modifying the Server ............................................................................................................................................76.5
Validating the Server Configuration...............................................................................................................76.6
Adding SSH Users .................................................................................................................................................. 76.6
Authenticating SSH Users................................................................................................................................... 76.7
Adding a Login Banner........................................................................................................................................ 76.7
Monitoring the Server and Managing Sessions.......................................................................................... 76.8
Debugging the Server..........................................................................................................................................76.8
Configuring the SSH Client .......................................................................................................................................76.9
Modifying the Client............................................................................................................................................. 76.9
Adding SSH Servers ............................................................................................................................................76.10
Authenticating with a Server...........................................................................................................................76.10
Connecting to a Server and Running Commands ...................................................................................76.11
Copying files to and from the Server............................................................................................................76.11
Debugging the Client ........................................................................................................................................76.11
Chapter 77 Secure Shell (SSH) Configuration
SSH Server Configuration Example........................................................................................................................77.2
Chapter 78 Secure Shell (SSH) Commands
Introduction....................................................................................................................................................................78.2
Command List................................................................................................................................................................78.2
Chapter 79 DHCP Snooping Introduction and Configuration
Introduction....................................................................................................................................................................79.2
DHCP Snooping.............................................................................................................................................................79.2
DHCP Snooping Database..................................................................................................................................79.3
DHCP Relay Agent Option 82 ............................................................................................................................79.4
Traffic Filtering with DHCP Snooping ............................................................................................................79.5
ARP Security.............................................................................................................................................................79.8
MAC Address Verification ...................................................................................................................................79.8
DHCP Snooping Violations................................................................................................................................. 79.8
Interactions with Other Features ............................................................................................................................79.9
Configuration...............................................................................................................................................................79.10
Configure DHCP Snooping...............................................................................................................................79.10
Disabling DHCP Snooping................................................................................................................................79.16
Related Features ..................................................................................................................................................79.16
Chapter 80 DHCP Snooping Commands
Command List................................................................................................................................................................80.2
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 xvii
Page 18
Part 6 Network Availability
Chapter 81 VRRP Introduction and Configuration
VRRP Introduction ........................................................................................................................................................81.2
Virtual Router Redundancy Protocol..................................................................................................................... 81.3
VRRP Configuration for IPv4 .....................................................................................................................................81.4
VRRP election and preempt for IPv4............................................................................................................... 81.6
VRRP Configuration for IPv6 .....................................................................................................................................81.8
VRRP election and preempt for IPv6.............................................................................................................81.11
VRRP debugging .........................................................................................................................................................81.13
VRRP Configuration Examples ...............................................................................................................................81.14
VRRP Preferred Master with Backup Configuration ................................................................................81.14
VRRP Circuit Failover Configuration .............................................................................................................81.17
VRRPv2 to VRRPv3 Transition Configuration.............................................................................................81.22
VRRP IPv6 Configuration Example.................................................................................................................81.28
Chapter 82 VRRP Commands
Command List................................................................................................................................................................82.2
Chapter 83 EPSR Introduction and Configuration
Introduction....................................................................................................................................................................83.2
Ring Components and Operation ..........................................................................................................................83.2
Fault Detection and Recovery..................................................................................................................................83.4
Fault Recovery ........................................................................................................................................................ 83.4
Restoring Normal Operation .............................................................................................................................83.6
Managing Rings with Two Breaks....................................................................................................................83.7
Recovery When One Break is Restored.......................................................................................................... 83.9
Configuration Examples...........................................................................................................................................83.11
Single Domain, Single Ring Network............................................................................................................83.11
Single Ring, Dual Domain Network...............................................................................................................83.16
Interconnected Rings ................................................................................................................................................83.17
Superloop Protection .........................................................................................................................................83.18
EPSR Superloop Prevention.............................................................................................................................83.19
Configuring a Basic Superloop Protected Two Ring EPSR Network..................................................83.22
Sample Show Output .........................................................................................................................................83.37
Adding a new data VLAN to a functioning superloop topology........................................................83.40
EPSR and Spanning Tree Operation..............................................................................................................83.43
Chapter 84 EPSR Commands
Command List................................................................................................................................................................84.2
Part 7 Network Management
Chapter 85 NTP Introduction and Configuration
Introduction....................................................................................................................................................................85.2
Overview.......................................................................................................................................................................... 85.2
NTP on the Switch ........................................................................................................................................................ 85.3
Troubleshooting ...........................................................................................................................................................85.4
Configuration Example............................................................................................................................................... 85.5
Software Reference for SwitchBlade® x908 and x900 Series Switches
xviii AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 19
Chapter 86 NTP Commands
Command List................................................................................................................................................................86.2
Chapter 87 Dynamic Host Configuration Protocol (DHCP) Introduction
Introduction....................................................................................................................................................................87.2
BOOTP........................................................................................................................................................................ 87.2
DHCP ..........................................................................................................................................................................87.2
DHCP Relay Agents ...............................................................................................................................................87.3
Configuring the DHCP Server................................................................................................................................... 87.3
Create the Pool .......................................................................................................................................................87.4
Define the Network............................................................................................................................................... 87.4
Define the Range ................................................................................................................................................... 87.5
Set the Lease ...........................................................................................................................................................87.5
Enable DHCP Leasequery ................................................................................................................................... 87.6
Set the Options.......................................................................................................................................................87.7
DHCP Lease Probing............................................................................................................................................. 87.8
DHCP Relay Agent Introduction..............................................................................................................................87.9
Configuring the DHCP Relay Agent ................................................................................................................87.9
DHCP Relay Agent Information Option (Option 82) ...............................................................................87.10
DHCPv6 Relay Agent Notification for DHCPv6 PD...................................................................................87.13
Configuring the DHCP Client..................................................................................................................................87.14
Clearing Dynamically Allocated Lease Bindings .............................................................................................87.14
Chapter 88 Dynamic Host Configuration Protocol (DHCP) Commands
Command List................................................................................................................................................................88.2
Chapter 89 DHCP for IPv6 (DHCPv6)
Introduction and Configuration
DHCPv6 Introduction ..................................................................................................................................................89.2
DHCPv6 for IPv6 .....................................................................................................................................................89.3
DHCPv6 Prefix Delegation..................................................................................................................................89.3
DHCPv6 RFCs...........................................................................................................................................................89.4
DHCPv6 Messages.................................................................................................................................................89.5
DHCPv6 Renewal and Rebinding..................................................................................................................... 89.8
Stateful DHCPv6 Message Exchange..............................................................................................................89.9
Stateless DHCPv6 Message Exchange .........................................................................................................89.10
DHCPv6 Relay Agent Stateful Message Exchange ..................................................................................89.11
DHCPv6 Prefix Delegation Message Exchange.........................................................................................89.12
DHCPv6 Client and Server Identification ...........................................................................................................89.13
DHCPv6 Server and Client Functionality............................................................................................................89.14
DHCPv6 Server Functionality ..........................................................................................................................89.14
DHCPv6 Client Functionality ...........................................................................................................................89.16
Configuring DHCPv6 Prefix Delegation..............................................................................................................89.17
Configuring the DHCPv6 Server Delegation Pool ...................................................................................89.17
Configuring the DHCPv6 PD Client..............................................................................................................89.18
Configure DHCPv6 Server/Stateful Client (Prefix)....................................................................................89.19
Configure DHCPv6 Server/Stateful Client (Range) ..................................................................................89.21
Configure DHCPv6 Server/Stateless Client ................................................................................................89.23
Configure DHCPv6 Relay / Server / Client...................................................................................................89.25
Configure PD Server / PD Client / Stateless Client...................................................................................89.30
Configure PD via DHCPv6 Relay .....................................................................................................................89.32
Configure PD subdelegation with SLAAC...................................................................................................89.35
Configure PD subdelegation for multiple VLANs ....................................................................................89.38
Configure DHCPv6 Relay with recursive PD subdelegation ................................................................89.41
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 xix
Page 20
PD Subdelegation System Configuration ..........................................................................................................89.45
Stateful_Client Configuration .........................................................................................................................89.47
Stateless_Client Configuration .......................................................................................................................89.47
PD_Client Configuration ...................................................................................................................................89.47
DHCPv6_Relay Configuration .........................................................................................................................89.48
PD_Subdelegation Configuration .................................................................................................................89.49
PD_Server1 Configuration................................................................................................................................89.50
PD_Server2 Configuration................................................................................................................................89.50
Chapter 90 DHCP for IPv6 (DHCPv6) Commands
Command List................................................................................................................................................................90.2
Chapter 91 SNMP Introduction
Introduction....................................................................................................................................................................91.2
Network Management Framework........................................................................................................................91.2
Structure of Management Information ................................................................................................................ 91.4
Names ........................................................................................................................................................................ 91.5
Instances ................................................................................................................................................................... 91.6
Syntax ........................................................................................................................................................................ 91.7
Access ........................................................................................................................................................................ 91.7
Status ......................................................................................................................................................................... 91.7
Description...............................................................................................................................................................91.7
The SNMP Protocol ......................................................................................................................................................91.8
SNMP Versions........................................................................................................................................................ 91.8
SNMP Messages .....................................................................................................................................................91.9
Polling versus Event Notification.....................................................................................................................91.9
Message Format for SNMPv1 and SNMPv2c..............................................................................................91.10
SNMP Communities (Version v1 and v2c) ..................................................................................................91.11
SNMPv3 Entities ...................................................................................................................................................91.11
SNMPv3 Message Protocol Format...............................................................................................................91.12
SNMPv1 and SNMPv2c .............................................................................................................................................91.13
SNMP MIB Views for SNMPv1 and SNMPv2c .............................................................................................91.13
SNMP Communities............................................................................................................................................91.13
Configuration Example (SNMPv1 and v2) ..................................................................................................91.15
SNMPv3 ..........................................................................................................................................................................91.19
SNMP MIB Views for SNMPv3 ..........................................................................................................................91.19
SNMP Groups ........................................................................................................................................................91.19
SNMP Users ............................................................................................................................................................91.19
Configuration Example (SNMPv3).................................................................................................................91.20
Using SNMP to Manage Files and Software......................................................................................................91.21
Copy a File to or from a TFTP Server .............................................................................................................91.21
Upgrade Software and Configuration Files................................................................................................91.23
Chapter 92 SNMP Commands
Command List................................................................................................................................................................92.2
Chapter 93 SNMP MIBs
Introduction....................................................................................................................................................................93.2
About MIBs...............................................................................................................................................................93.2
About SNMP ............................................................................................................................................................ 93.2
Obtaining MIBs .......................................................................................................................................................93.2
Loading MIBs...........................................................................................................................................................93.3
Allied Telesis Enterprise MIB .....................................................................................................................................93.5
AT-SMI-MIB...............................................................................................................................................................93.6
Software Reference for SwitchBlade® x908 and x900 Series Switches
xx AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 21
AT-PRODUCTS-MIB................................................................................................................................................ 93.8
AT-BOARDS-MIB...................................................................................................................................................93.10
AT-SYSINFO-MIB...................................................................................................................................................93.13
AT-XEM-MIB...........................................................................................................................................................93.15
AT-ENVMONv2-MIB.............................................................................................................................................93.16
AT-VCSTACK-MIB .................................................................................................................................................93.21
AT-MIBVERSION-MIB...........................................................................................................................................93.25
AT-USER-MIB .........................................................................................................................................................93.26
AT-RESOURCE-MIB ..............................................................................................................................................93.28
AT-LICENSE-MIB ...................................................................................................................................................93.29
AT-TRIGGER-MIB...................................................................................................................................................93.32
AT-LOOPPROTECT-MIB ......................................................................................................................................93.34
AT-SETUP-MIB .......................................................................................................................................................93.36
AT-DNS-CLIENT-MIB............................................................................................................................................93.45
AT-NTP-MIB............................................................................................................................................................93.46
AT-EPSRv2-MIB .....................................................................................................................................................93.49
AT-DHCPSN-MIB...................................................................................................................................................93.52
AT-FILEv2-MIB .......................................................................................................................................................93.55
AT-LOG-MIB ...........................................................................................................................................................93.61
AT-IP-MIB ................................................................................................................................................................93.63
Public MIBs....................................................................................................................................................................93.65
Private MIBs ..................................................................................................................................................................93.69
Chapter 94 LLDP Introduction and Configuration
Introduction....................................................................................................................................................................94.2
Link Layer Discovery Protocol..................................................................................................................................94.2
LLDP-MED........................................................................................................................................................................94.3
Voice VLAN...................................................................................................................................................................... 94.3
LLDP Advertisements..................................................................................................................................................94.4
Type-Length-Value (TLV) .................................................................................................................................... 94.4
LLDP-MED: Location Identification TLV.........................................................................................................94.7
Transmission and Reception ....................................................................................................................................94.8
LLDP-MED Operation ........................................................................................................................................... 94.9
Storing LLDP Information ........................................................................................................................................94.10
Configuring LLDP .......................................................................................................................................................94.11
Configure LLDP.....................................................................................................................................................94.12
Configure LLDP-MED..........................................................................................................................................94.14
Configure Authentication for Voice VLAN..................................................................................................94.18
Chapter 95 LLDP Commands
Introduction....................................................................................................................................................................95.2
Command List................................................................................................................................................................95.2
Chapter 96 SMTP Commands
Command List................................................................................................................................................................96.2
Chapter 97 RMON Introduction and Configuration
Introduction....................................................................................................................................................................97.2
Overview.......................................................................................................................................................................... 97.2
RMON Configuration Example.................................................................................................................................97.4
Chapter 98 RMON Commands
Command List................................................................................................................................................................98.2
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 xxi
Page 22
Chapter 99 Triggers Introduction
Introduction....................................................................................................................................................................99.2
Trigger Facility ...............................................................................................................................................................99.2
Configuring a Trigger ..................................................................................................................................................99.2
Troubleshooting Triggers ..........................................................................................................................................99.5
Chapter 100 Triggers Configuration
Introduction..................................................................................................................................................................100.2
Restrict Internet Access ............................................................................................................................................100.2
Capture Unusual CPU and RAM Activity ............................................................................................................100.4
See Daily Statistics......................................................................................................................................................100.6
Turn Off Power to Port LEDs ...................................................................................................................................100.7
Reduce Power Supplied to Ports...........................................................................................................................100.9
Capture Show Output and Save to an SD Card ............................................................................................100.11
Load a Release File From an SD Card ...............................................................................................................100.12
Chapter 101 Trigger Commands
Command List..............................................................................................................................................................101.2
Chapter 102 Ping Polling Introduction and Configuration
Introduction..................................................................................................................................................................102.2
How Ping Polling Works ...........................................................................................................................................102.2
Configuring Ping Polling..........................................................................................................................................102.4
Creating a Polling Instance ..............................................................................................................................102.4
Customizing a Polling Instance ......................................................................................................................102.5
Troubleshooting Ping Polling .........................................................................................................................102.6
Interaction with Other Protocols ..........................................................................................................................102.7
Chapter 103 Ping-Polling Commands
Command List..............................................................................................................................................................103.2
Chapter 104 sFlow Introduction and Configuration
sFlow Introduction .....................................................................................................................................................104.2
The sFlow Agent .........................................................................................................................................................104.3
Sampling Methods ..............................................................................................................................................104.3
The sFlow Collector....................................................................................................................................................104.5
Configuring sFlow on your Switch.......................................................................................................................104.6
Configuration Procedure ..................................................................................................................................104.7
Configuration Examples....................................................................................................................................104.8
sFlow Datagrams ..................................................................................................................................................... 104.13
The sFlow MIB ........................................................................................................................................................... 104.14
Chapter 105 sFlow Commands
Command List..............................................................................................................................................................105.2
Software Reference for SwitchBlade® x908 and x900 Series Switches
xxii AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 23
Part 8 Virtual Chassis Stacking
Chapter 106 Stacking Introduction
VCStack Introduction ................................................................................................................................................106.2
Features of Virtual Chassis Stacking .............................................................................................................106.2
VCStack Supported Platforms.........................................................................................................................106.2
The Physical Stack ...............................................................................................................................................106.3
Two Switch Stack Configuration....................................................................................................................106.3
Resilient Stacked Topology..............................................................................................................................106.6
Stack Formation ..........................................................................................................................................................106.8
The Role of the Stack Master ...........................................................................................................................106.8
Stack Management VLAN ..............................................................................................................................106.10
Stack Member Failure and Recovery ................................................................................................................106.13
Fixed or Virtual MAC Addressing ................................................................................................................ 106.13
Stack Resiliency Link ........................................................................................................................................ 106.14
Stack Failure Recovery .................................................................................................................................... 106.16
Stack Separation and Recovery ...................................................................................................................106.16
Stack Maintenance........................................................................................................................................... 106.16
Disabled Master Monitoring (DMM).................................................................................................................106.18
Provisioning (Stack Members) ............................................................................................................................106.20
Provisioned Board Classes............................................................................................................................. 106.20
Applying Hardware Provisioning................................................................................................................ 106.21
Removing Hardware Provisioning.............................................................................................................. 106.23
Displaying Provisioned Configurations....................................................................................................106.25
Provisioning and Configuration Management...................................................................................... 106.26
Software Version Auto Synchronization ......................................................................................................... 106.27
Introduction........................................................................................................................................................106.27
How auto synchronization works ...............................................................................................................106.27
Stack License Management .................................................................................................................................106.29
Chapter 107 Stacking Commands
Introduction..................................................................................................................................................................107.2
Command List..............................................................................................................................................................107.3
Appendix A: Command List
Appendix B: Changes in Version 5.4.3
Appendix C: GUI Reference
Introduction...................................................................................................................................................................... C.3
Installing the GUI and setting the switch...............................................................................................................C.4
System Requirements ............................................................................................................................................ C.4
Installing the GUI to your switch using an SD card ..................................................................................... C.4
Installing the GUI to your switch via TFTP server ......................................................................................... C.5
Setting up your switch and logging into the GUI ........................................................................................ C.6
Using the GUI ................................................................................................................................................................... C.9
System > Status > System Details....................................................................................................................C.11
System > Status > System Date and Time ....................................................................................................C.11
System > Status > Top Ten Utilised Ports .....................................................................................................C.12
System > File Management > Upload File....................................................................................................C.20
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 xxiii
Page 24
System > File Management > Download File .............................................................................................C.21
System > File Management > Copy File........................................................................................................C.22
System > File Management > Move File.......................................................................................................C.22
System > File Management > Delete File .....................................................................................................C.23
System > File Management > Delete Folder ...............................................................................................C.23
System > Stacking > Configure Stacking......................................................................................................C.27
System > Stacking > Configure Stack Member ..........................................................................................C.28
System > License Management > Add Feature License..........................................................................C.30
System > License Management > Delete Feature License.....................................................................C.31
Switching > Ports > Monitor Port ....................................................................................................................C.35
Switching > Ports > Configure Port ................................................................................................................C.36
Switching > VLANs > Add VLAN.......................................................................................................................C.40
Switching > Link Aggregation > Add Static Channel...............................................................................C.44
Switching > Link Aggregation > Add Dynamic Channel ........................................................................C.44
Switching > FDB Table.........................................................................................................................................C.45
IP > IP Interfaces > Configure Primary IP Address .....................................................................................C.48
IP > IP Interfaces > Add Secondary IP Address ...........................................................................................C.49
IP > Static Routes > Add Static Route.............................................................................................................C.51
IP > DNS > Add DNS Server................................................................................................................................C.55
IP > IGMP Snooping > Configure Interface ..................................................................................................C.57
Management > NTP > Add NTP Association ...............................................................................................C.65
Management > Logs > Export Logs................................................................................................................C.72
Appendix D: Glossary
Numerics............................................................................................................................................................................D.2
A............................................................................................................................................................................................D.2
B ............................................................................................................................................................................................D.5
C ............................................................................................................................................................................................D.7
D............................................................................................................................................................................................D.9
E.......................................................................................................................................................................................... D.13
F.......................................................................................................................................................................................... D.14
G.........................................................................................................................................................................................D.15
H.........................................................................................................................................................................................D.15
I...........................................................................................................................................................................................D.15
L.......................................................................................................................................................................................... D.17
M........................................................................................................................................................................................ D.19
N.........................................................................................................................................................................................D.21
O......................................................................................................................................................................................... D.22
P ......................................................................................................................................................................................... D.22
Q......................................................................................................................................................................................... D.25
R ......................................................................................................................................................................................... D.25
S.......................................................................................................................................................................................... D.28
T.......................................................................................................................................................................................... D.31
U.........................................................................................................................................................................................D.33
V ......................................................................................................................................................................................... D.33
W........................................................................................................................................................................................ D.35
X .........................................................................................................................................................................................D.35
Software Reference for SwitchBlade® x908 and x900 Series Switches
xxiv AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 25

Part 1: Setting up the Switch

Chapter 1 Getting Started
Chapter 2 Command Syntax Conventions in this Software
Reference
Chapter 3 Start-up Sequence
Chapter 4 CLI Navigation Commands
Chapter 5 User Access Commands
Chapter 6 Creating and Managing Files
Chapter 7 File Management Commands
Chapter 8 System Configuration and Monitoring
Commands
Chapter 9 Debugging and Logging
Chapter 10 Logging Commands
Chapter 11 Interface Commands
Chapter 12 Scripting Commands
Chapter 13 Interface Testing Commands
Page 26
Page 27

Chapter 1: Getting Started

Introduction ...........................................................................................................................................1.3
How to Login .........................................................................................................................................1.3
How to get Command Help .............................................................................................................1.4
Viewing a List of Valid Parameters..........................................................................................1.4
Completing Keywords.................................................................................................................1.9
Viewing Command Error Messages .................................................................................... 1.10
How to Work with Command Modes ........................................................................................ 1.11
Entering Privileged Exec Commands When in a Configuration Mode................... 1.14
How to See the Current Configuration ..................................................................................... 1.16
Default Settings ................................................................................................................................. 1.17
The Default Configuration Script ................................................................................................1.18
How to Change the Password ......................................................................................................1.19
How to Set Strong Passwords....................................................................................................... 1.20
How to Set a Management IP Address...................................................................................... 1.22
How to Set an IP Address on VLAN 1 ......................................................................................... 1.23
How to Save and Boot from the Current Configuration ..................................................... 1.24
How to Save to the Default Configuration File ............................................................... 1.24
How to Create and Use a New Configuration File.......................................................... 1.24
How to Return to the Factory Defaults...................................................................................... 1.26
How to See System Information.................................................................................................. 1.27
Viewing Overall System Information .................................................................................. 1.27
Viewing Temperature, Voltage, and Fan Status ............................................................. 1.28
Viewing the Serial Number..................................................................................................... 1.28
How to Set System Parameters ....................................................................................................1.29
How to Change the Telnet Session Timeout ................................................................... 1.29
How to Name the Switch ........................................................................................................ 1.29
How to Display a Text Banner at Login.............................................................................. 1.30
How to Set the Time and Date ..................................................................................................... 1.32
How to Show Current Settings ............................................................................................. 1.32
How to Set the Time and Date .............................................................................................. 1.32
How to Set the Timezone........................................................................................................ 1.33
How to Configure Summer-time.......................................................................................... 1.33
How to Add and Remove Users ................................................................................................... 1.34
Pre-encrypted Passwords ....................................................................................................... 1.35
How to Undo Settings ..................................................................................................................... 1.37
How to Use the no Parameter ............................................................................................... 1.37
How to Use the default Parameter....................................................................................... 1.37
How to Upgrade the Firmware .................................................................................................... 1.38
Save Power With the Eco-Friendly Feature.............................................................................. 1.39
Trouble-shoot fiber and pluggable issues ............................................................................... 1.40
Using the Find Me feature ............................................................................................................. 1.41
Continuous Reboot Prevention ................................................................................................... 1.42
Controlling “show” Command Output...................................................................................... 1.44
Commands Available in each Mode........................................................................................... 1.46
User Exec Mode ..........................................................................................................................1.46
Privileged Exec Mode ............................................................................................................... 1.47
Global Configuration Mode ................................................................................................... 1.48
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.1
Page 28
Getting Started
AlliedWare Plus GUI.......................................................................................................................... 1.49
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.2 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 29

Introduction

Getting Started
This chapter introduces a number of commonly-used management features of the AlliedWare Plus
TM
Operating System (OS).

How to Login

Step 1: Set the console baud rate
The default baud rate is 9600.
By default the AlliedWare Plus port. This means that the terminal size is 80 columns by 24 rows.
Step 2: Login with manager/friend
The defaults are:
username: manager password: friend
The switch logs you into User Exec mode. From User Exec mode, you can perform high­level diagnostics (some show commands, ping, traceroute etc), start sessions (Telnet, SSH), and change mode.
TM
OS supports VT100 compatible terminals on the console
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.3
Page 30
Getting Started
Abbreviations
Command

How to get Command Help

The following kinds of command help are available:
lists of valid parameters with brief descriptions (the ? key)
completion of keywords (the Tab key)
error messages for incomplete or incorrect syntax
The AlliedWare Plus example, the show interface command can be entered in the abbreviated form shown below:
configure terminal24
awplus(config)#
TM
CLI contains a number of abbreviations for its commands. For
awplus#
sh in vlan100
awplus#
router rip24
sh in vlan100
Enter the Global Configuration mode.
Define a RIP routing process and enter the Router Configuration mode.
awplus(config-router)#
network 10.10.11.0/24
awplus(config-router)#
network 10.10.12.0/24
Associate networks with the RIP process
Associate networks with the RIP process
Viewing a List of Valid Parameters
To get syntax help, type ? (i.e. “space question mark”) after:
the prompt. This will list all commands available in the mode you are in.
one or more parameters. This will list parameters that can come next in the partial
command.
one or more letters of a parameter. This will list matching parameters.
Note
The AlliedWare PlusTM OS only displays one screenful of text at a time, with the prompt “--More--” at the end of each screenful. Press the space bar to display the next screenful or the Q key to return to the command prompt.
Example To see which commands are available in Privileged Exec mode, enter “?” at the Privileged
Exec mode command prompt:
awplus#
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.4 AlliedWare Plus
?
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 31
This results in the following output:
Figure 1-1: Example output from the ? command
Exec commands: activate Activate a script cd Change the current working directory clear Reset functions clock Manage clock configure Enter configuration mode copy Copy from one file to another debug Debugging functions (see also 'undebug') delete Delete a file dir List the files on a filesystem disable Turn off privileged mode command dot1x IEEE 802.1X Port-Based Access Control echo Echo a string edit Text Editor enable Turn on privileged mode command erase Erase the system startup configuration exit End current mode and down to previous mode help Description of the interactive help system license Activate software feature license logout Exit from the EXEC mail Send an email mkdir Make a new directory move Rename or move a file mstat Show statistics after multiple multicast traceroutes mtrace Trace multicast path from source to destination no Negate a command or set its defaults ping Send echo messages platform Execute built-in self-tests pwd Print the current working directory quit Exit current mode and down to previous mode reboot Halt and perform a cold restart reload Halt and perform a cold restart remote-command Remote stack member command execution restart Restart routing protocol rmdir Remove a directory rmon Debugging functions (see also 'undebug') show Show running system information ssh Open an SSH connection tcpdump Execute tcpdump telnet Open a telnet connection terminal Set terminal line parameters test Test device functionality traceroute Trace route to destination trigger Automatic scripted responses to device events undebug Disable debugging functions (see also 'debug') wait Wait for a specified number of seconds write Write running configuration to memory, file or terminal
Getting Started
Example To see which commands are available in Configuration mode, enter “?” at the Config mode
command prompt:.
awplus#
awplus(config)#
configure terminal
?
This results in the following output:
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.5
Page 32
Getting Started
Figure 1-2: Example output from the ? command
Configure commands: aaa Authentication,Authorization and Accounting access-list Add an access list entry arp Address Resolution Protocol (ARP) auth-web-server Web authentication server configuration commands banner Define a login banner bgp Border Gateway Protocol (BGP) boot Boot configuration class-map Class map command clock Manage clock crypto Security Specific Commands cvlan Configure C-VLAN parameters debug Debugging functions (see also 'undebug') default Restore default settings do To run exec commands in config mode dot1x IEEE 802.1X Port-Based Access Control enable Modify enable password parameters epsr Ethernet Protection Switching Ring (EPSR) exception Configure exception settings exit End current mode and down to previous mode fib FIB information help Description of the interactive help system hostname Set system's network name interface Select an interface to configure ip Internet Protocol (IP) ipv6 Internet Protocol version 6 (IPv6) key Authentication key management lacp LACP commands line Configure a terminal line log Logging control loop-protection Loop Protection mac mac address mail Send an email max-fib-routes Set maximum fib routes number max-static-routes Set maximum static routes number maximum-access-list Maximum access-list entries maximum-paths Set multipath numbers installed to FIB mls Multi-Layer Switch(L2/L3) no Negate a command or set its defaults ntp Configure NTP ospf Open Shortest Path First (OSPF) ping-poll Ping Polling platform Configure global settings for the switch asic policy-map Policy map command radius-server Radius server remote-command Remote stack member command execution rip Routing Information Protocol (RIP) rmon Remote Monitoring Protocol (RMON) route-map Create route-map or enter route-map command mode router Enable a routing process router-id Router identifier for this system service Modify use of network based services show Show running system information snmp-server Enable the snmp agent spanning-tree Spanning tree commands ssh Secure Shell stack Manage VCS feature system System properties telnet Configure telnet trigger Automatic scripted responses to device events undebug Disable debugging functions (see also 'debug') username Establish User Name Authentication virtual-server Virtual-server configuration vlan Configure VLAN parameters vrrp VRRP configuration
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.6 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 33
Getting Started
Example To see which show commands that start with “i” are available in Privileged Exec mode,
enter “?” after show i:
awplus#
show i?
This results in the following output:
Figure 1-3: Example output from the show i? command
interface Select an interface to configure ip Internet Protoc6ol (IP) ipv6 Internet Protocol version 6 (IPv6)
Examples To use the ? help to work out the syntax for the clock timezone command, enter the
following sequence of commands:
awplus(config)#
summer-time Manage summer-time timezone Set clock timezone
clock ?
awplus(config)#
clock timezone ?
TIMEZONE Timezone name, up to 5 characters
awplus(config)#
clock timezone NZST ?
minus negative offset plus positive offset
awplus(config)#
clock timezone NZST plus ?
<0-12> Time zone offset to UTC
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.7
Page 34
Getting Started
awplus(config)#
The above example demonstrates that the ? help only indicates what you can type next. For commands that have a series of parameters, like clock timezone, the ? help does not make the number of parameters obvious.
clock timezone NZST plus 12
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.8 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 35
Completing Keywords
To complete keywords, type the Tab key after part of the command.
Getting Started
If only one keyword matches the partial command, the AlliedWare Plus
TM
OS fills in that
keyword. If multiple keywords match, it lists them.
Examples In this example we use Tab completion in successive steps to build the complete
command show ip dhcp server summary. We have included “<Tab>” to show where to type the Tab key - this is not displayed on screen.
awplus#
show ip <Tab>
Figure 1-4: Example output after entering the command, show ip <Tab>
as-path-access-list bgp community-list dhcp dhcp-relay domain-list domain-name extcommunity-list filter forwarding igmp interface irdp mroute mvif name-server nat ospf pim protocols rip route rpf
awplus#
show ip d<Tab>
Figure 1-5: Example output after entering the command, show ip d<Tab>
dhcp dhcp-relay domain-list domain-name
awplus#
show ip dhcp <Tab>
Figure 1-6: Example output from the show ip dhcp <Tab> command
binding pool server
awplus#
show ip dhcp server s<Tab>
Figure 1-7: Example output from the show ip dhcp s<Tab> command
statistics summary
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.9
Page 36
Getting Started
Viewing Command Error Messages
The switch displays the following generic error messages about command input:
% Incomplete command—this message indicates that the command requires more parameters. Use the ? help to find out what other parameters are available.
awplus#
% Incomplete command.
% Invalid input detected at '^' marker—this indicates that the switch could not process the command you entered. The switch also prints the command and marks the first invalid character by putting a '^' under it. Note that you may get this error if you enter a command in the wrong mode, as the following output shows.
awplus#
interface port1.0.1 ^ % Invalid input detected at '^' marker.
interface
interface port1.0.1
% Unrecognized command—when you try to use ? help and get this message, it indicates that the switch can not provide help on the command because it does not recognize it. This means the command does not exist, or that you have entered it in the wrong mode, as the following output shows.
awplus#
% Unrecognized command
Note
The AlliedWare PlusTM OS does not tell you when commands are successful. If it does not display an error message, you can assume the command was successful.
interface ?
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.10 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 37
Getting Started

How to Work with Command Modes

The following figure shows the command mode hierarchy and the commands you use to move to lower-level modes.
Multiple users can telnet and issue commands using the User Exec mode and the Privileged Exec mode. However, only one user is allowed to use the Configure mode at a time. This prevents multiple users from issuing configuration commands simultaneously.
TM
Figure 1-8: AlliedWare Plus
CLI modes
AlliedWare Plus CLI modes
interface
[interface name]
Interface
mode
Configuration
sub-modes
User
Exec mode
enable
Privileged
Exec mode
configure terminal
Global
mode
Other
Command mode
Command used to enter the next command mode
router [routing
protocol ]
Router
mode
User Exec mode User Exec mode is the mode you log into on the switch.
It lets you perform high-level diagnostics (show commands, ping, traceroute etc), start sessions (Telnet, SSH), and change mode.
The default User Exec mode prompt is awplus>.
Privileged Exec
mode
To change from User Exec to Privileged Exec mode, enter the command:
awplus>
enable
Privileged Exec mode is the main mode for monitoring—for example, running show commands and debugging. From Privileged Exec mode, you can do all the commands from User Exec mode plus many system commands.
The default Privileged Exec mode prompt is awplus#.
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.11
Page 38
Getting Started
Global
To change from Privileged Exec to Global Configuration mode, enter the command:
Configuration
mode
awplus#
configure terminal
From Global Configuration mode, you can configure most aspects of the switch.
The default Global Configuration mode prompt is awplus(config)#.
Lower-level
configuration
A number of features are configured by entering a lower-level mode from Global Configuration mode. The following table lists these features.
modes
Table 1-1: Features configured using the lower level modes
Mode What it configures Command Default prompt
Interface Switch ports, VLANs, the
interface <name>
awplus(config-if)#
management Eth port.
Class map QoS classes, which isolate and
class-map <name>
awplus(config-cmap)#
name specific traffic flows (classes) from all other traffic.
EPSR Ethernet Protection Switching Ring,
epsr configuration
awplus(config-epsr)#
a loop protection mechanism with extremely fast convergence times.
Line Console port settings or virtual
terminal settings for telnet.
Ping poll Ping polling, which checks whether
line console 0 line vty number
ping-poll <number>
awplus(config-line)#
awplus(config-ping-poll)#
specified devices are reachable or not.
Policy map QoS policies, a collection of user-
policy-map <name>
awplus(config-pmap)#
defined QoS classes and the default class.
Policy map class
The QoS actions to take on a class­map, and which class-maps to associate with a QoS policy.
(in Policy map mode)
class <name>
awplus(config-pmap-c)#
This mode is a sub-mode of Policy map mode.
Route map Route maps, which select routes to
include or exclude from the switch’s routing table and/or route
route-map name deny|permit
<entry-number>
awplus(config-route-map)#
advertisements.
Router Routing using BGP, IP, IPv6, OSPF,
RIP, or VRRP.
router <protocol
other-parameters>
MST Multiple Spanning Tree Protocol. spanning-tree mst
awplus(config-router)#
awplus(config-mst)#
configuration
Trigger Triggers, which run configuration
trigger <number>
awplus(config-trigger)#
scripts in response to events.
VLAN
VLANs. vlan database
awplus(config-vlan)#
database
Some protocols have commands in both Global Configuration mode and lower-level configuration modes. For example, to configure MSTP, you use:
Global Configuration mode to select MSTP as the spanning tree mode
MST mode to create instances and specify other MSTP settings
Interface Configuration mode to associate the instances with the appropriate ports.
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.12 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 39
Getting Started
AlliedWare Plus CLI modes - returning to higher-level modes
User
Exec mode
Privileged
Exec mode
Router
mode
Interface
mode
mode
disable
Command used to return to this command mode
Command mode
exit
Other
sub-modes
exit
exit
exit
end
or Ctrl+Z
or Ctrl+C
Global
Configuration
Returning to
higher-level
modes
The following figure shows the commands to use to move from a lower-level mode to a higher-level mode.
Figure 1-9: Returning to higher-level modes
Examples To go from Interface Configuration to Global Configuration mode:
awplus(config-if)#
awplus(config)#
To go from Interface Configuration to Privileged Exec mode:
awplus(config-if)#
awplus#
exit
end
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.13
Page 40
Getting Started
To go from Privileged Exec to User Exec:
awplus#
awplus>
exit
Entering Privileged Exec Commands When in a Configuration Mode
As you configure the switch you will be constantly entering various show commands to confirm your configuration. This requires constantly changing between configuration modes and Privileged Exec mode.
However, you can run Privileged Exec commands without changing mode, by using the command:
do <command you want to run>
You cannot use the ? help to find out command syntax when using the do command.
Example To display information about the IP interfaces when in Global Configuration mode, enter
the command:
This results in the following output:
awplus(config)#
Figure 1-10: Example output after entering the command, do show ip int brief
Interface IP-Address Status Protocol vlan1 unassigned admin up running vlan2 unassigned admin up running
Main Command
Modes Summary
Table 1-2: Main command modes and modal prompts
Present Mode Prompt Command New Mode
User Exec
Privileged Exec
Global Configuration
Global Configuration
The table below lists the main command modes, how to access each mode, the prompt for each command mode. From any mode, use exit to move up a mode, or end to move to the Privileged Exec mode.
awplus>
awplus#
awplus(config)#
awplus(config)#
do show ip int brief
enable
configure terminal
vlan database
line vt <line-number>
Privileged Exec
Global Configuration
VLAN Configuration
Line Configuration
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.14 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 41
Getting Started
Sub-modes
Summary
The table below lists the sub-modes, how to access each mode, the prompt for each command mode, and how to exit that mode. Prompts listed use the default awplus.
Table 1-3: Sub-modes, prompt for each sub-mode, how to access each sub-mode, and how to exit each sub-mode
Prompt and Command
Mode
Ping Poll Configuration
Route Map Configuration
Router Configuration
Examples How to Enter Mode How to Exit Mode
awplus#configure
terminal
awplus(config)#ping-poll
awplus(config-ping-poll)#
awplus#configure
terminal
awplus(config)#route-map
route1 permit 1
awplus(config-route-map)#
awplus#configure
terminal
awplus(config)#router rip
awplus(config-router)#
Use the ping-poll command available from the Global Configuration mode.
Use the route-map command available from the Global Configuration mode.
Use one of the following commands available from the Global Configuration mode:
router rip
router ipv6 rip
router ospf
router bgp
router vrrp
Use the exit command to return to the Global Configuration mode.
Use the end command to return to the Privileged Exec mode.
Use the exit command to return to the Global Configuration mode.
Use the end command to return to the Privileged Exec mode.
Use the exit command to return to the Global Configuration mode.
Use the end command to return to the Privileged Exec mode.
(interface)
MST (Multiple Spanning Tree) Configuration
Trigger Configuration
EPSR Configuration
Class Map Configuration (QoS)
awplus#configure
terminal
awplus(config)#spanning-
tree mst configuration
awplus(config-mst)#
awplus#configure
terminal
awplus(config)#trigger 1
awplus(config-trigger)#
awplus#configure
terminal
awplus(config)#epsr
configuration
awplus(config-epsr)#
awplus#configure
terminal
awplus(config)#class map
cmap1
awplus(config-cmap)#
Use the spanning-
tree mst configuration
command available from the Global Configuration mode.
Use the trigger command from Global Configuration mode.
Use the epsr
configuration
command available from the Global Configuration mode.
Use the class-map command available from the Global Configuration mode.
Use the exit command to return to the Global Configuration mode.
Use the end command to return to the Privileged Exec mode.
Use the exit command to return to the Global Configuration mode.
Use the end command to return to the Privileged Exec mode.
Use the exit command to return to the Global Configuration mode.
Use the end command to return to the Privileged Exec mode.
Use the exit command to return to the Global Configuration mode.
Use the end command to return to the Privileged Exec mode.
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.15
Page 42
Getting Started
Table 1-3: Sub-modes, prompt for each sub-mode, how to access each sub-mode, and how to exit each sub-mode
Prompt and Command
Mode
Policy Map Configuration (QoS)
Policy Map Class Configuration (QoS)
Examples How to Enter Mode How to Exit Mode
awplus#configure
terminal
awplus(config)#policy-map
pmap1
awplus(config-pmap)#
awplus#configure
terminal
awplus(config)#policy-map
pmap1
awplus(config-pmap)#class
cmap1
awplus(config-pmap-c)#
Use the policy-map command available from the Global Configuration mode.
Use the class command available from the Policy map mode.
Use the exit command to return to the Global Configuration mode.
Use the end command to return to the Privileged Exec mode.
Use the exit command to return to the Policy Map Configuration mode.
Use the end command to return to the Privileged Exec mode.

How to See the Current Configuration

The current configuration is called the running-config. To see it, enter the following command in either Privileged Exec mode or any configuration mode:
awplus#
To see only part of the current configuration, enter the command:
awplus#
This displays only the lines that contain word.
To start the display at a particular place, enter the command:
awplus#
This searches the running-config for the first instance of word and begins the display with that line.
Note
The show running-config command works in all modes except User Exec mode.
show running-config
show running-config|include <word>
show running-config |begin <word>
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.16 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 43
Getting Started

Default Settings

When the switch first starts up with the AlliedWare PlusTM OS, it applies default settings and copies these defaults dynamically into its running-config.
TM
These default settings mean that the AlliedWare Plus
encrypts passwords, such as user passwords
records log message priority in log messages
turns on jumbo frame support for all ports
turns on the telnet server so that you can telnet to the switch
enables the switch to look up domain names (but for domain name lookups to work,
you have to configure a DNS server)
turns off L3 multicast packet switching in the switch’s hardware. This prevents L3
multicast from flooding the switch’s CPU in its default state as an L2 switch
sets the maximum number of ECMP routes to 8
turns on RSTP on all ports. Note that the ports are not set to be edge ports
OS:
sets all the switch ports to access mode. This means they are untagged ports, suitable
for connecting to hosts
creates VLAN 1and adds all the switch ports to it
allows logins on the serial console port
allows logins on VTY sessions (for telnet etc)
has switching enabled, so Layer 2 traffic is forwarded appropriately without further
configuration
allocates all the routing table memory space to IPv4 and IPv6 routes
has ports set to autonegotiate their speed and duplex mode
has copper ports set to auto MDI/MDI-X mode
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.17
Page 44
Getting Started

The Default Configuration Script

Most of the above default settings are in the form of commands, which the switch copies to its running-config when it first boots up.
The switch stores a copy of the default configuration commands in the file, default.cfg and uses this as its default start-up file.
For more information about start-up files, see “How to Save and Boot from the Current
Configuration” on page 1.24.
The following table shows the contents of the default file.
Contents of default file Description
! An empty comment line (comments begin
with an !).
service password-encryption !
log record-priority Records log message priority.
username manager privilege 15 password 8 $1$bJoVec4D$JwOJGPr7YqoExA0GV asdE0
service telnet !
ip domain-lookup !
no ip multicast-routing !
maximum-paths 8 Sets maximum number of ECMP routes.
spanning-tree mode rstp !
interface eth0 !
interface port1.X.X-1.X.XX switchport switchport mode access !
interface vlan1 !
line con 0 A heading for any configuration settings for
line vty 0 32
! end
Forces passwords in the script to be encrypted.
Specifies the password for the manager user
Turns on the telnet server.
Allows domain name lookups.
Turns off L3 multicast packet switching in the switch hardware.
Turns on RSTP.
A heading for any configuration settings for the management eth0 port. There are no eth0 settings.
Sets each switch port to access mode.
Creates VLAN 1.
the console port. There are no console port settings.
A heading for any configuration settings for VTY sessions. There are no VTY session settings.
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.18 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 45
Getting Started

How to Change the Password

To change the password for the manager account, enter Global Configuration mode and enter the following command:
awplus(config)#
The password can be up to 23 characters in length and include characters from up to four categories. The password categories are:
uppercase letters: A to Z
lowercase letters: a to z
digits: 0 to 9
special symbols: all printable ASCII characters not included in the previous three
categories.The question mark ? cannot be used as it is reserved for help functionality.
username manager password <new-password>
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.19
Page 46
Getting Started

How to Set Strong Passwords

The password security rules are disabled by default. To set password security rules for users with administrative rights, or privilege level 15, enter Global Configuration mode.
You can then either specify whether the user is forced to change an expired password at the next login, or specify whether the user is not allowed to login with an expired password. You will need to specify a password lifetime greater than 0 before selecting either of these features. Note that the security-password forced-change and the security- password reject-expired-pwd commands cannot be enabled concurrently.
Password lifetime Enter the following command to specify the password lifetime in days:
Password forced
change
Reject expired
password
awplus(config)#
Note that the value 0 will disable lifetime functionality and passwords will never expire. If lifetime functionality is disabled, the security-password forced-change command and the security-password warning command are also disabled.
To specify that a user is forced to change an expired password at the next login, enter the following command:
awplus(config)#
If the security-password forced-change command is enabled, users with expired passwords are forced to change to a password that must comply with the current password security rules at the next login.
To specify that a user is not allowed to login with an expired password, enter the following command:
awplus(config)#
If the security-password reject-expired-pwd command is enabled, users with expired passwords are rejected at login. Users then have to contact the Network Administrator to
change their password.
security-password lifetime <0-1000>
security-password forced-change
security-password reject-expired-pwd
Caution
Use other password security rules to further configure password security settings.
Password warning To specify the number of days before the password expires that the user will receive a
warning message specifying the remaining lifetime of the password, enter the command:
The value 0 will disable warning functionality and the warning period must be less than, or equal to, the password lifetime.
1.20 AlliedWare Plus
Once all users’ passwords are expired you are unable to login to the device again if the security-password reject-expired-pwd command has been executed. You will have to reboot the device with a default configuration file, or load an earlier software version that does not have the security password feature.
We recommend you never have the command line “security-password reject-expired-pwd” in a default config file.
awplus(config)#
Software Reference for SwitchBlade® x908 and x900 Series Switches
security-password warning <0-1000>
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 47
Getting Started
Password history To specify the number of previous passwords that are unable to be reused enter the
command:
Password minimum
length
Password minimum
categories
awplus(config)#
security-password history <0-15>
The value 0 will disable history functionality. If history functionality is disabled, all users’ password history is reset and all password history is lost. A new password is invalid if it matches a password retained in the password history.
To specify the minimum allowable password length, enter the command:
awplus(config)#
security-password minimum-length <1-23>
To specify the minimum number of categories that the password must contain in order to be considered valid, enter the command:
awplus(config)#
security-password minimum-categories <1-4>
The password categories are:
uppercase letters: A to Z
lowercase letters: a to z
digits: 0 to 9
special symbols: all printable ASCII characters not included in the previous three
categories. The question mark ? cannot be used as it is reserved for help functionality
Display security
password settings
To ensure password security, the minimum number of categories should align with the lifetime selected, i.e. the fewer categories specified the shorter the lifetime specified.
How to add a user is described in “How to Add and Remove Users” on page 1.34.
To list the configuration settings for the various security password rules, enter the command:
awplus(config)#
show security-password configuration
To list users remaining lifetime or last password change, enter the command:
awplus(config)#
show security-password user
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.21
Page 48
Getting Started

How to Set a Management IP Address

This section describes how to set an IP address on the eth0 management port.
Step 1: If desired, check the current configuration
After logging in, enter Privileged Exec mode by using the command:
awplus#
awplus>enable
Then check the current configuration by using one of the following commands:
awplus#
This results in the following output:
Interface IP-Address Status Protocol eth0 172.28.8.200 admin up running
awplus#
enable
show ip interface eth0 brief
show running-config interface eth0
This results in the following output:
! interface eth0 ip address 172.28.8.200/16 !
Step 2: Enter Interface Configuration mode for the eth0 interface
Enter Global Configuration mode and enter the command:
awplus(config)#
Step 3: Enter the IP address and mask
Enter the command:
awplus(config-if)#
For example, to set the address to 172.28.8.210/16, enter the command:
awplus(config-if)#
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.22 AlliedWare Plus
interface eth0
ip address <address/mask>
ip address 172.28.8.210/16
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 49

How to Set an IP Address on VLAN 1

This section describes how to set an IP address on the default VLAN (vlan1).
Step 1: If desired, check the current configuration
After logging in, enter Privileged Exec mode by using the command:
Getting Started
awplus#
Then check the current configuration by using one of the following commands:
awplus#
This results in the following output:
Interface IP-Address Status Protocol vlan1 172.28.8.200 admin up running
awplus#
This results in the following output:
enable
show ip interface vlan1 brief
show running-config interface vlan1
! interface vlan1 ip address 172.28.8.200/16 !
Step 2: Enter Interface Configuration mode for the vlan1 interface
Enter Global Configuration mode and enter the command:
awplus(config)#
interface vlan1
Step 3: Enter the IP address and mask
Enter the command:
awplus(config-if)#
For example, to set the address to 172.28.8.210/16, enter the command:
awplus(config-if)#
ip address <address/mask>
ip address 172.28.8.210/16
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.23
Page 50
Getting Started

How to Save and Boot from the Current Configuration

This section tells you how to save your configuration and run the saved configuration when the switch starts up.
You can either:
save the configuration to the switch’s default configuration file (called “default.cfg”).
By default, the switch uses that file at start-up.
create a new configuration file and set the switch to use the new configuration file at
start-up.
How to Save to the Default Configuration File
Enter Privileged Exec mode and enter the command:
awplus#
The parameter startup-config is a short-cut for the current boot configuration file, which will be the default configuration file unless you have changed it, as described in the next section.
copy running-config startup-config
How to Create and Use a New Configuration File
Step 1: Copy the current configuration to a new file
Enter Privileged Exec mode and enter the command:
awplus#
Example To save the current configuration in a file called example.cfg, enter the command
awplus#
Step 2: Set the switch to use the new file at startup
To run the new file’s configuration when the switch starts up, enter Global Configuration mode and enter the command:
copy running-config <destination-url>
copy running-config example.cfg
awplus(config)#
Note that you can set the switch to use a configuration file on a SD card if you have saved the configuration file to a card. You can only specify that the configuration file is on a SD card if there is a backup configuration file already specified in Flash.
To set a backup configuration file to load if the main configuration file cannot be loaded, enter the command:
awplus(config)#
For an explanation of the configuration fallback order, see “The configuration file
fallback order” on page 6.10.
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.24 AlliedWare Plus
boot config-file <filepath-filename>
boot config-file backup <filepath-filename>
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 51
Example To ru n the commands i n example.cfg on startup, enter the command:
Getting Started
awplus(config)#
boot config-file flash:/example.cfg
To se t backup.cfg as the backup to the main configuration file, enter the command:
awplus(config)#
boot config-file backup flash:/backup.cfg
Step 3: Display the new settings
To see the files that the switch uses at startup, enter Privileged Exec mode and enter the command:
awplus#
The output looks like this:
Boot configuration
---------------------------------------------------------------­Current software : x900-5.4.3.rel Current boot image : flash:/x900-5.4.3.rel Backup boot image : flash:/x900-5.4.3.rel Default boot config: flash:/default.cfg Current boot config: card:/example.cfg (file exists) Backup boot config: flash:/backup.cfg (file exists)
show boot
Step 4: Continue updating the file when you change the configuration
When you next want to save the current configuration, enter Privileged Exec mode and enter the command:
awplus#
The parameter startup-config is a short-cut for the current boot configuration file.
copy running-config startup-config
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.25
Page 52
Getting Started

How to Return to the Factory Defaults

The switch dynamically adds the default settings to the running-config at start-up if the default file is not present. This section describes how to use this feature to return to the
factory defaults.
Note
After reboot the show running-config output will show the default factory settings for your switch once you have removed the default.cfg file. To recreate the default.cfg file enter copy running-config startup-config. When you enter copy running-config startup-config commands the default.cfg file is updated with the startup-config.
Completely
restore defaults
To completely remove your configuration and return to the factory default configuration, delete or rename the default file and make sure no other file is set as the start-up configuration file.
To find the location of the default boot configuration file, enter Privileged Exec mode and enter the command:
awplus#
To delete the default file when it is the current boot configuration file, enter Privileged Exec mode and enter either of the commands:
awplus#
or:
Note that erasing startup-config deletes the current boot configuration file—it does not simply stop the file from being the boot file.
To make sure that no other file is loaded at start-up, enter Global Configuration mode and enter the command:
awplus(config)#
delete force <filename>
awplus#
show boot
erase startup-config
no boot config-file
Partially restore
defaults
1.26 AlliedWare Plus
To partially restore the default settings, make a configuration file that contains the settings you want to keep and set this as the start-up configuration file. On start-up, the switch will add the missing settings to the running-config.
For example, to use default settings but still keep an IP address on the eth0 management port, create a file like the following one and set it as the boot configuration file:
awplus#
The output looks like this:
! interface eth0 ip address 172.28.8.210/16 ! ip route 0.0.0.0/0 172.28.0.1 ! end
Software Reference for SwitchBlade® x908 and x900 Series Switches
show file eth0-ip.cfg
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 53
Getting Started

How to See System Information

This section describes how to view the following system information:
overview information
details of temperature and voltage
serial number
Viewing Overall System Information
To display an overview of the switch hardware, software, and system settings, enter User Exec or Privileged Exec mode and enter the command:
awplus#
show system
The output looks like this:
Switch System Status Fri Dec 5 02:55:58 2012 Board ID Bay Board Name Rev Serial number
-------------------------------------------------------------------------------­Base 280 x900-24XT-N A-0 45AX5300X PSU 212 PSU2 AT-PWR01-AC B-1 61400717 Fan module 214 PSU1 AT-FAN01 F-1 66111841
-------------------------------------------------------------------------------­RAM: Total: 514264 kB Free: 372404 kB Flash: 31.0MB Used: 14.8MB Available: 16.2MB
-------------------------------------------------------------------------------­Environment Status : Normal Uptime : 0 days 02:12:03 Bootloader version : 1.0.9 Current software : x900-5.4.3.rel Software version : 5.4.3 Build date : Mon Dec 15 14 13:04:00 NZDT 2010 Current boot config: flash:/default.cfg (file exists) Territory : japan System Name System Contact System Location
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.27
Page 54
Getting Started
Viewing Temperature, Voltage, and Fan Status
The switch monitors the environmental status of the switch and its power supplies and fan. To display this information, enter User Exec or Privileged Exec mode and enter the command:
awplus#
show system environment
The output looks like the following figure.
Environment Monitoring Status Overall Status: Normal
Resource ID: 1 Name: PSU bay 1 ID Sensor (Units) Reading Low Limit High Limit Status 1 Device Present Yes - - Ok 2 PSU Overtemp No - - Ok 3 PSU Fan Fail No - - Ok 4 PSU Power Output No - - Ok
Resource ID: 2 Name: PSU bay 2 ID Sensor (Units) Reading Low Limit High Limit Status 1 Device Present Yes - - Ok 2 PSU Overtemp No - - Ok 3 PSU Fan Fail No - - Ok 4 PSU Power Output Yes - - Ok
Resource ID: 3 Name: x900-24XT-N ID Sensor (Units) Reading Low Limit High Limit Status 1 Voltage: 2.5V (Volts) 2.565 2.344 2.865 Ok 2 Voltage: 1.65V (Volts) 1.629 1.488 1.816 Ok 3 Voltage: 3.3V (Volts) 3.334 2.973 3.627 Ok 4 Voltage: 1.8V (Volts) 1.771 1.615 1.979 Ok 5 Voltage: 12V (Volts) 12.000 10.813 13.188 Ok 6 Temp: Ambient (Degrees C) 33 -127 55 Ok 7 Temp: Mid Internal (Degrees C) 52 -127 85 Ok 8 Temp: Bk Internal (Degrees C) 47 -127 75 Ok
Viewing the Serial Number
The switch’s serial number is displayed in the output of the show system command on page 8.56, but for convenience, you can also display it by itself. To do this, enter User Exec or Privileged Exec mode and enter the command:
awplus#
The output looks like this:
P1FY7502C
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.28 AlliedWare Plus
show system serialnumber
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 55
Getting Started

How to Set System Parameters

You can set system parameters to personalize the switch and make it easy to identify it when troubleshooting. This section describes how to configure the following system parameters:
telnet session timeout
switch name
login banner
How to Change the Telnet Session Timeout
By default, telnet sessions time out after 10 minutes of idle time. If desired, you can change this.
To change the timeout for all telnet sessions, enter Global Configuration mode and enter the commands:
awplus(config)#
awplus(config-line)#
The new timeout value only applies to new sessions, not current sessions.
Examples To set the timeout to 30 minutes, enter the command:
line vty 0 32
exec-timeout <new-timeout>
awplus(config-line)#
To set the timeout to 30 seconds, enter the command:
awplus(config-line)#
To set the timeout to infinity, so that sessions never time out, enter either of the commands:
awplus(config-line)#
awplus(config-line)#
How to Name the Switch
exec-timeout 30
exec-timeout 0 30
no exec-timeout
exec-timeout 0 0
To give the switch a name, enter Global Configuration mode and enter the command:
awplus(config)#
For example, to name the switch “switch1.mycompany.com”:
awplus(config)#
The prompt displays the new name:
awplusswitch1.mycompany.com(config)#
The name can contain hyphens and underscore characters.
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
hostname <name>
hostname switch1.mycompany.com
TM
Operating System - Version 5.4.3 1.29
Page 56
Getting Started
However, the name must be a single word, as the following example shows.
awplus(config)#hostname switch1.mycompany.com more words hostname switch1.mycompany.com more words ^ % Invalid input detected at '^' marker.
It also cannot be surrounded by quote marks, as the following example shows.
awplus(config)#hostname "switch1.mycompany.com more words" % Please specify string starting with alphabet
Removing the
name
To remove the hostname, enter the command:
awplusswitch1.mycompany.com(config)#
no hostname
The prompt changes back to the default prompt:
awplus(config)#
How to Display a Text Banner at Login
By default, the switch displays the AlliedWare PlusTM OS version and build date before login. You can customize this by changing the Message of the Day (MOTD) banner.
To enter a new MOTD banner, enter Global Configuration mode and enter the command:
awplus(config)#
banner motd <banner-text>
The text can contain spaces and other printable characters. You do not have to surround words with quote marks.
Example To display “this is a new banner” when someone logs in, enter the command:
awplus(config)#
banner motd this is a new banner
This results in the following output at login:
awplus login: manager Password: this is a new banner awplus>
Removing the
banner
1.30 AlliedWare Plus
To return to the default banner (AlliedWare Plus command:
awplus(config)#
Software Reference for SwitchBlade® x908 and x900 Series Switches
TM
OS version and build date), enter the
banner motd default
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 57
To remove the banner instead of replacing it, enter the command:
Getting Started
awplus(config)#
no banner motd
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.31
Page 58
Getting Started

How to Set the Time and Date

There are three aspects to setting the time and date:
setting the current time and date (“How to Set the Time and Date” on page 1.32)
setting the timezone (“How to Set the Timezone” on page 1.33)
configuring the switch to automatically change the time when summer-time begins
and ends (“How to Configure Summer-time” on page 1.33)
Instead of manually setting the time, you can use NTP to automatically get the time from another device.
How to Show Current Settings
To display the current time, timezone and date, enter Privileged Exec mode and enter the command:
awplus#
show clock
The output looks like this:
UTC Time: Wed, 3 Dec 2008 16:08:14 +0000 Timezone: UTC Timezone Offset: +00:00 Summer time zone: None
How to Set the Time and Date
To set the time and date, enter Privileged Exec mode and enter the clock set command:
clock set <hh:mm:ss> <day> <month> <year>
:where:
hh is two digits giving the hours in 24-hour format (e.g. 14)
mm is two digits giving the minutes
ss is two digits giving the seconds
day is two digits giving the day of the month
month is the first three letters of the month name (e.g. sep)
year is four digits giving the year
Example To set the time to 14:00:00 on 25 January 2012, use the command:
awplus#
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.32 AlliedWare Plus
clock set 14:00:00 25 jan 2012
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 59
Getting Started
How to Set the Timezone
To set the timezone, enter Global Configuration mode and enter the clock timezone command:
clock timezone <timezone-name> {plus|minus} <0-12>
The <timezone-name> can be any string up to 6 characters long.
To return the timezone to UTC+0, enter the command:
awplus(config)#
Example To set the timezone to Eastern Standard Time, use the command:
awplus(config)#
no clock timezone
clock timezone EST minus 5
How to Configure Summer-time
There are two approaches for setting summer-time:
recurring, when you specify the week when summer-time starts and ends and each
year the switch changes the time at those weeks. For example, Eastern Daylight Time (EDT) starts at 2 am on the second Sunday in March and ends at 2 am on the first Sunday in November.
date-based, when you specify the start and end dates for summer-time for a particular
year. For example, Eastern Daylight Time (EDT) starts at 2 am on Sunday, 8 March 2008 and ends at 2 am on Sunday, 2 November 2008.
Recurring To set summer-time with recurring dates, enter Global Configuration mode and enter the
clock summer-time recurring command:
clock summer-time <zone-name> recurring <start-week> <start­day> <start-month> <start-time> <end-week> <end-day> <end-month> <end-time> <1-180>
The <zone-name> can be any string up to 6 characters long.
The <start-time> and <end-time> are in the form hh:mm, in 24-hour time.
Note that if you specify 5 for the week, this changes the time on the last day of the month, not the 5th week.
Example To configure EDT, enter the command:
awplus(config)#
Date-based To set summer-time for a single year, enter Global Configuration mode and enter the clock
summer-time date command:
clock summer-time <zone-name> date <start-day> <start-month> <start-year> <start-time> <end-day> <end-month> <end-year> <end-time> <1-180>
The <zone-name> can be any string up to 6 characters long.
The <start-time> and <end-time> are in the form hh:mm, in 24-hour time.
clock summer-time EDT recurring 2 Sun Mar 02:00 1 Sun Nov 02:00 60
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.33
Page 60
Getting Started
Example For example, to configure EDT for 2008 enter the command:
awplus(config)#
clock summer-time EDT date 8 Mar 2008 02:00 2 Nov 2008 02:00 60

How to Add and Remove Users

Adding users To add a new user with administrative rights, enter Global Configuration mode and enter
the command:
awplus(config)#
Both <name> and <password> can contain any printable character and are case sensitive.
When you add a user with administrative rights, <password> will have to conform to the rules specified by the security-password minimum-categories command on page 5.17 and the security-password minimum-length command on page 5.18. If the security-
password history command on page 5.14 is enabled, <password> is invalid if it matches a
password retained in the password history.
The AlliedWare Plus are limited to User Exec mode so you need to set most users to level 15.
For example, to add user Bob with password 123$%^, enter the command:
username <name> privilege 15 password <password>
TM
OS gives you a choice of 1 or 15 for the privilege level. Level 1 users
awplus(config)#
Removing users To remove a user, enter Global Configuration mode and enter the command:
no username <name>
For example, to remove user Bob, enter the command:
awplus(config)#
Note that you can delete all users, including the user called “manager” and the user you are logged in as. If all privilege 15 user accounts are deleted, a warning message is generated:
% Warning: No privileged users exist.
If all privilege level 15 user accounts are deleted, and there are no other users configured for the device, you may have to reboot with the default configuration file.
username Bob privilege 15 password 123$%^
no username Bob
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.34 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 61
Getting Started
If there is a user account on the device with a lower privilege level and a password has already been set with the enable password command on page 5.3, you can login and still enter privileged mode. When executing the enable command, enter the password created with the enable password command. For example, if the password is mypassword:
awplus>
awplus#
Displaying users To list the currently logged-in users, enter User Exec or Privileged Exec mode and enter the
command:
awplus#
The output looks like this:
Line User Host(s) Idle Location Priv Idletime Timeout con 0 manager idle 00:00:00 ttyS0 15 10 N/A vty 0 bob idle 00:00:03 172.16.11.3 1 0 5
To list all configured users, enter User Exec or Privileged Exec mode and enter the command:
awplus#
The output looks like this:
enable mypassword
show users
show running-config |include username
username manager privilege 15 password 8 $1$bJoVec4D$JwOJGPr7YqoExA0GVasdE0
username Bob privilege 15 password 8 $1$gXJLY8dw$iqkMXLgQxbzSOutNUa5E2.
Pre-encrypted Passwords
The running-config output above includes the number 8 after the password parameter. This indicates that the password is displayed in its encrypted form.
You can enter the number 8 and a pre-encrypted password on the command line. You may want to pre-encrypt passwords if you need to load them onto switches via an insecure method (such as HTTP, or by emailing them to remote users).
Testin g this
feature
Caution
If you want to test the effect of this, create a new user for the test instead of using the manager user. The test stops you from logging in as the test user, so you need to have the manager user available to log in as.
Only enter the number 8 if you are entering a pre-encrypted password— otherwise, you will be unable to log in using the password and will be unable to access the switch through that username. The next section describes why.
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.35
Page 62
Getting Started
The following output shows how specifying the number 8 puts the password into the running-config exactly as you typed it:
awplus(config)#username Bob privilege 15 password 8 friend
awplus(config)#show running-config |include username Bob
username Bob privilege 15 password 8 friend
After entering the command above, logging in as “Bob” with a password of “friend” does not work. This is because the switch takes the password you enter (“friend”), hashes it, and compares the hash with the string in the running-config (“friend”). The hashed value and “friend” are not the same, so the switch rejects the login.
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.36 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 63

How to Undo Settings

There are two possibilities for undoing settings: the no parameter and the default parameter.
How to Use the no Parameter
To undo most settings, simply re-enter the first parameters of the configuration command with the parameter no before them.
Example You can set the timezone to Eastern Standard Time by entering the command:
Getting Started
awplus(config)#
To remove the timezone setting, enter the command:
awplus(config)#
clock timezone EST minus 5
no clock timezone
How to Use the default Parameter
Some commands have a default parameter that returns the feature to its default setting.
Example You can change the login banner to “this is a new banner” by entering the command:
awplus(config)#
To return to the default banner, enter the command:
awplus(config)#
Note that this command also has a no parameter that lets you remove the banner altogether.
banner motd this is a new banner
banner motd default
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.37
Page 64
Getting Started

How to Upgrade the Firmware

New releases of the AlliedWare PlusTM OS become available regularly. Contact your customer support representative for more information.
Step 1: Put the new release onto your TFTP server
Step 2: If necessary, create space in the switch’s Flash memory for the
new release
Note that you cannot delete the current release file.
To see how much space is free, use the command:
awplus#
show file systems
Step 3: Copy the new release from your TFTP server onto the switch
Follow the relevant instructions in “Copying with Trivial File Transfer Protocol (TFTP)”
on page 6.15.
Step 4: Set the switch to boot from the new release
Enter Global Configuration mode and enter the command:
awplus(config)#
boot system <filepath-filename>
You can set a backup release file to load if the main release file cannot be loaded. Enter the command:
awplus(config)#
Step 5: Check the boot settings
Enter Privileged Exec mode and enter the command:
awplus#
boot system backup <filepath-filename>
show boot
Step 6: Reboot
Enter Privileged Exec mode and enter the command:
awplus#
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.38 AlliedWare Plus
reboot
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 65
Getting Started

Save Power With the Eco-Friendly Feature

You can conserve power by enabling the eco-friendly LED (Light Emitting Diode) feature with the ecofriendly led command on page 8.18. This feature disables power to the port LEDs on XEMs installed in the switch, the stack ID LED on the XEM-STK and all port LEDs on the switch, except the eth0 port. On the switch, power to the fault, SD and PSU LEDs is not disabled, and in addition, on the SwitchBlade® x908 power to the stacking status LED is not disabled. On the XEM-1XP and XEM-2XP power to the XFP LED is not disabled.
When the eco-friendly LED feature is enabled, a change of port status will not affect the display of the associated LED. When the eco-friendly feature is disabled and power is returned to port LEDs, the LEDs will correctly show the current state of the ports.
In a stack environment, enabling the eco-friendly LED feature on the stack master will apply the feature to every member of the stack.
The eco-friendly LED feature is disabled by default. To enable the feature, enter the commands:
awplus#
awplus(config)#
For an example of how to configure a trigger to enable the eco-friendly LED feature, see
“Turn Off Power to Port LEDs” on page 100.7.
You can also conserve power by enabling the eco-friendly LPI (Low Power Idle) feature with the ecofriendly lpi command on page 8.19. This feature reduces the power supplied to the ports on XEMs installed in the switch, except the eth0 port, whenever ports are idle and are connected to IEEE802.3az Energy Efficient Ethernet compliant host devices. All ports configured for LPI must support LPI in hardware and must be configured to autonegotiate by default or by using the speed and duplex commands as needed.
LPI is a feature of the IEEE 802.3az Energy Efficient Ethernet (EEE) standard. LPI lowers power consumption of switch ports during periods of low link utilization when connected to IEEE 802.3az compliant host devices. If no data is sent then the switch port can enter a sleep state, called Low Power Idle (LPI), to conserve power used by the switch.
The eco-friendly LPI (Low Power Idle) feature is disabled by default. To enable the feature for a switch port, or for a range of switch ports in the example below, enter the commands:
awplus#
awplus(config)#
configure terminal
ecofriendly led
configure terminal
interface port1.0.2-port1.0.22
awplus(config-if)#
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
ecofriendly lpi
TM
Operating System - Version 5.4.3 1.39
Page 66
Getting Started

Trouble-shoot fiber and pluggable issues

Digital Optical Monitoring (DOM) for XFP (10 Gigabit Small Form Factor Pluggable) transceivers and Digital Diagnostics Monitoring (DDM) for SFP (1 Gigabit Small Form­factor Pluggable) and SFP+ (10 Gigabit Small Form-factor Pluggable) transceivers, allow you to measure optical parameters for pluggables installed in a switch and trouble shoot fiber issues.
Fiber cable can be vulnerable to damage. Patch panels and patch cables can be connected with the wrong type of fiber, fiber splices can become faulty and fiber cables can be cut accidentally. Trouble shooting fiber issues has required special equipment and expertise to find the source of a problem causing signal attenuation. XFP DOM and SFP DDM features help find fiber issues.
Different types of transceivers are supported in different models of switch. See your Allied Telesis dealer for more information about the particular models of pluggables that your switch supports, and if these transceivers also support DDM or DOM.
To display XFP DOM, SFP DDM or SFP+ DDM diagnostic information about transceivers installed on your switch, enter the following command:
awplus#
show system pluggable diagnostics
The following parameters are measured by DOM for XFP transceivers and DDM for SFP and SFP+ transceivers, and are displayed in show system pluggable diagnostics command output:
Temperature (Centigrade) inside the transceiver
Vcc (Volts) voltage supplied to the transceiver
Tx Bias (mA) current to the Laser Diode in the transceiver
Tx Power (mW) the amount of light transmitted from the transceiver
Rx Power (mW) the amount of light received in the transceiver
You can track Tx Bias to find out how the Laser Diode in the transceiver is aging by comparing the Tx Bias for one transceiver against Tx Bias for others. You can use this information to see if any transceivers may need replacement.
You can trouble shoot fiber connectivity issues by checking the Tx Power at one end of the fiber link against the Rx Power at the other end of the fiber link to measure the attenuation. Knowing the attenuation enables you to determine if there are anomalies in the fiber cable.
Note that Tx Power differences between the same type of transceivers installed on a switch may indicate that a transceiver is not seated or locked. Ensuring transceivers are seated and locked in place with the retaining clip will keep the fiber link up if there is any vibration or movement that can dislodge a fiber cable. Rx Power differences may indicate poor fiber patch cables, poor connectors or poor splices. Tracking Tx Bias for installed transceivers and measuring attenuation for fiber links allows you to perform periodic preventative maintenance, instead of reacting to a failure. Tracking Tx Power differences can be used as an indicator of failure in an which may need replacing.
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.40 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 67
Getting Started

Using the Find Me feature

The Find Me feature enables you to physically locate a specific device from a group of similar devices.
Running the findme command on page 8.21 causes the device’s LEDs to alternately flash green and amber at a rate of 1 Hz. If the switch has no amber LED, then the green LED will flash on/off at a rate of 1 Hz.
An optional interface parameter specifies one or more interfaces to flash, while an optional member parameter specifies a particular stack member. Both these parameters are mutually exclusive. If no interface or member parameter is specified then all ports on the device or stack are flashed.
An optional timeout parameter specifies the flash behavior duration. The default time is one minute (60 seconds). Normal LED behavior is restored automatically after either the default time, or a specified time, has elapsed or a no findme command is used.
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.41
Page 68
Getting Started

Continuous Reboot Prevention

Occasionally, due to network conditions or to recover from a software failure, the recovery mechanism of the switch is to reboot to resume normal operation. Provided the same error condition does not recur within a short period of time this is acceptable behavior. However, if the error condition repeatedly occurs within a short time period, the switch will go into a cycle of continuous reboots, causing network problems.
Although a switch continuously rebooting will come to the attention of a network administrator who can then resolve he issue, it is likely that in the meantime network problems have arisen. For example, a broadcast storm due to STP becoming unstable and trying to continually reconverge could cause the switch to reboot continuously.
In a VCStack situation, a continually rebooting switch will destabilize the stack and may cause the master and member devices to continually swap roles as they both reboot. This can serious effect the network, because both devices will become too busy rebooting and forming the stack to forward traffic.
The continuous reboot prevention feature, enabled with the continuous-reboot-
prevention command on page 8.13, allows the user to configure a switch to stop
rebooting if the device gets into a cycle of continuous rebooting. The user can configure the time period, the maximum number of times the switch can reboot within the specified time period, referred to as the threshold, and the action to take if the threshold is exceeded.
There are three actions you can specify:
linkdown
The reboot procedure continues and all switch ports and stack ports stay link down. This is the default action.
logonly
The reboot procedure continues normally.
stopreboot
The reboot procedure stops and the user is prompted to enter the key ”c” via the CLI. Normal reboot procedure then continues.
Note that when the continuous reboot prevention feature is enabled on the switch, user initiated reboots via the CLI and software version auto-synchronization reboots (VCStack implementation) are not counted toward the threshold value.
The continuous reboot prevention feature is disabled by default. To enable the feature, enter the following commands:
awplus#
awplus(config)#
configure terminal
continuous-reboot-prevention enable
Unless the period, threshold and action parameter values are explicitly set, the defaults are used:
period - 600 seconds
threshold - 1 reboot event
action - linkdown
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.42 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 69
Getting Started
To co nfigure th e period, threshold and the action to take if the number of reboots exceeds the specified threshold, enter the following commands:
awplus#
awplus(config)#
configure terminal
continuous-reboot-prevention [period <60­604800>] [threshold <1-10>] [action [linkdown|logonly|stopreboot]]
If the action stopreboot is specified, the reboot procedure stops and the following message is displayed:
Please input key 'c' if you want to continue processing.
When the user has input “c” via the CLI, the reboot procedure continues.
To disable the continuous reboot prevention feature, enter the following commands:
awplus#
awplus(config)#
configure terminal
no continuous-reboot-prevention enable
To return either one or more of the period, threshold and the action parameters to the default, use the commands:
awplus#
configure terminal
awplus(config)#
no continuous-reboot-prevention [period] [threshold] [action]
To display the current continuous reboot prevention configuration, enter the command:
awplus#
show continuous-reboot-prevention
To display the reboot history of the switch, enter the command:
awplus#
show reboot history
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.43
Page 70
Getting Started

Controlling “show” Command Output

You can control the output of show commands by using the | and > or >> tokens in the following ways:
To display only part of the output, follow the command with | and then other
keywords (see Output Modifiers below)
To save the output to a file, follow the command with > filename
To append the output to an existing file, follow the command with >> filename
Using the ? after typing the show command displays the following information about these tokens:
awplus#
| Output modifiers
> Output redirection
>> Output redirection (append)
show users
Output Modifiers Type the | (vertical bar) to use Output modifiers.
append Append output begin Begin with the first line that contains matching output exclude Exclude lines that contain matching output include Include lines that contain matching output redirect Redirect output
Begin The begin parameter causes the display to begin at the first line that contains the input
string.
awplus#
show run | begin vlan1
...skipping interface vlan1 ip address 192.168.14.1 !! line con 0 login line vty 0 4 login ! end
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.44 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 71
Getting Started
Exclude The exclude parameter excludes all lines of output that contain the input string. In the
following output all lines containing the word “input” are excluded:
awplus#
Interface vlan1 Scope: both Hardware is Ethernet, address is 192.168.14.1 index 3 metric 1 mtu 1500 <UP,BROADCAST,RUNNING,MULTICAST> Label switching is disabled No Virtual Circuit configured Administrative Group(s): None DSTE Bandwidth Constraint Mode is MAM output packets 4438, bytes 394940, dropped 0 output errors 0, aborted 0, carrier 0, fifo 0, heartbeat 0, window 0 collisions 0
show interface vlan1 | exclude input
Include The include parameter includes only those lines of output that contain the input string. In
the output below, all lines containing the word “input” are included:
awplus#
input packets 80434552, bytes 2147483647, dropped 0, multicast packets 0 input errors 0, length 0, overrun 0, CRC 0, frame 0, fifo 1, missed 0
show interface vlan1 | include input
Redirect The redirect parameter puts the lines of output into the specified file. If the file already
exists, the new output overwrites the file’s contents; the new output is not appended to the existing file contents.
| redirect and > are synonyms.
show history | redirect history.txt
Output
Redirection
awplus#
The output redirection token > puts the lines of output into the specified file. If the file already exists, the new output overwrites the file’s contents; the new output is not appended to the existing file contents.
| redirect and > are synonyms.
show history > history.txt
Append
Output
awplus#
The append output token >> adds the lines of output into the specified file. The file must already exist, for the new output to be added to the end of the file’s contents; the new output is appended to the existing file contents.
| append and >> are synonyms.
awplus#
show history >> history.txt
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.45
Page 72
Getting Started

Commands Available in each Mode

This appendix lists the commands available in the following command modes:
“User Exec Mode” on page 1.46
“Privileged Exec Mode” on page 1.47
“Global Configuration Mode” on page 1.48
User Exec Mode
awplus>? clear Reset functions debug Debugging functions (see also 'undebug') disable Turn off privileged mode command echo Echo a string enable Turn on privileged mode command exit End current mode and down to previous mode help Description of the interactive help system logout Exit from the EXEC mstat Show statistics after multiple multicast traceroutes mtrace Trace multicast path from source to destination no Negate a command or set its defaults ping Send echo messages quit Exit current mode and down to previous mode remote-command Remote stack member command execution rmon Debugging functions (see also 'undebug') show Show running system information ssh Open an SSH connection telnet Open a telnet connection terminal Set terminal line parameters traceroute Trace route to destination
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.46 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 73
Privileged Exec Mode
awplus>enable awplus#? activate Activate a script cd Change the current working directory clear Reset functions clock Manage clock configure Enter configuration mode copy Copy from one file to another debug Debugging functions (see also 'undebug') delete Delete a file dir List the files on a filesystem disable Turn off privileged mode command dot1x IEEE 802.1X Port-Based Access Control echo Echo a string edit Text Editor enable Turn on privileged mode command erase Erase the system startup configuration exit End current mode and down to previous mode help Description of the interactive help system license Activate software feature license logout Exit from the EXEC mail Send an email mkdir Make a new directory move Rename or move a file mstat Show statistics after multiple multicast traceroutes mtrace Trace multicast path from source to destination no Negate a command or set its defaults ping Send echo messages platform Execute built-in self-tests pwd Print the current working directory quit Exit current mode and down to previous mode reboot Halt and perform a cold restart reload Halt and perform a cold restart remote-command Remote stack member command execution restart Restart routing protocol rmdir Remove a directory rmon Debugging functions (see also 'undebug') show Show running system information ssh Open an SSH connection tcpdump Execute tcpdump telnet Open a telnet connection terminal Set terminal line parameters test Test device functionality traceroute Trace route to destination trigger Automatic scripted responses to device events undebug Disable debugging functions (see also 'debug') wait Wait for a specified number of seconds write Write running configuration to memory, file or terminal
Getting Started
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.47
Page 74
Getting Started
Global Configuration Mode
awplus(config)#? access-list Add an access list entry arp Address Resolution Protocol (ARP) auth-web-server Web authentication server configuration commands banner Define a login banner bgp Border Gateway Protocol (BGP) boot Boot configuration class-map Class map command clock Manage clock crypto Security Specific Commands cvlan Configure C-VLAN parameters debug Debugging functions (see also 'undebug') default Restore default settings do To run exec commands in config mode dot1x IEEE 802.1X Port-Based Access Control enable Modify enable password parameters epsr Ethernet Protection Switching Ring (EPSR) exception Configure exception settings exit End current mode and down to previous mode fib FIB information help Description of the interactive help system hostname Set system's network name interface Select an interface to configure ip Internet Protocol (IP) ipv6 Internet Protocol version 6 (IPv6) key Authentication key management lacp LACP commands line Configure a terminal line log Logging control loop-protection Loop Protection mac mac address mail Send an email max-fib-routes Set maximum fib routes number max-static-routes Set maximum static routes number maximum-access-list Maximum access-list entries maximum-paths Set multipath numbers installed to FIB mls Multi-Layer Switch(L2/L3) no Negate a command or set its defaults ntp Configure NTP ospf Open Shortest Path First (OSPF) ping-poll Ping Polling platform Configure global settings for the switch asic policy-map Policy map command radius-server RADIUS server configuration commands rip Routing Information Protocol (RIP) rmon Remote Monitoring Protocol (RMON) route-map Create route-map or enter route-map command mode router Enable a routing process router-id Router identifier for this system security-password Configure strong security passwords service Modify use of network based services show Show running system information snmp-server Manage snmp server spanning-tree Spanning tree commands ssh Secure Shell stack Virtual Chassis Stacking (VCS) system System properties telnet Configure telnet trigger Select a trigger to configure undebug Disable debugging functions (see also'debug') username Establish User Name Authentication virtual-server Virtual-server configuration vlan Configure VLAN parameters vrrp VRRP configuration
Software Reference for SwitchBlade® x908 and x900 Series Switches
1.48 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 75
Getting Started

AlliedWare Plus GUI

Information on loading and using the AlliedWare PlusTM GUI is outside the scope of the main body of this reference manual. This topic is covered in a separate appendix to this document. See “Appendix C: GUI Reference”.
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 1.49
Page 76
Page 77
Chapter 2: Command Syntax Conventions in
this Software Reference
The following table describes how command line interface syntax is shown in this Software Reference.
What to enter in the command
Syntax element Example
line
Keywords are shown in lowercase fixed-width font or bold variable-width font.
Number ranges are enclosed in angle-brackets < > and separated by a hyphen.
Placeholders are shown in lowercase italics within angle­brackets < >, or in uppercase italics.
Repeats are shown with ellipsis.
Optional elements are shown in
brackets: [ ]
Required choices are enclosed in braces and separated by a vertical bar (pipe) : {|}.
Optional choices are enclosed in or brackets and separated by a vertical bar (pipe): [|]
Inclusive options are enclosed in braces, and separated by brackets: {[ ] [ ]}.
show spanning-tree mst
or
show ip route
<0-255>
<port-list>
or
ip dhcp pool NAME
param1...
vlan <vid> [name <vlan- name>]
spanning-tree {mstp|rstp| stp} enable
[param1|param2]
{[param1] [param2] [param3]}
Some keywords are required, and others are optional parameters. Type keywords exactly as they appear in the command syntax.
Enter a number from the range. Do not enter the angle brackets.
Replace the placeholder with the value you require. The placeholder may be an IP address, a text string, or some other value. See the parameter table for the command for information about the type of value to enter. Do not enter the angle-brackets.
Enter the parameter one or more times.
If you need the optional parameter, enter it. Do not enter the brackets.
Enter one only of the options. Do not enter the braces or vertical bar.
If needed, enter one only of the options. Do not enter the brackets or vertical bar.
Enter one or more of the options and separate them with a space. Do not enter the braces or brackets.
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 2.1
Page 78
Page 79

Chapter 3: Start-up Sequence

AlliedWare Plus Start-up....................................................................................................................3.2
Diagnostic Menu ..................................................................................................................................3.3
Bootloader Menu .................................................................................................................................3.5
Start-up Sequence ...............................................................................................................................3.9
Start-up Sequence
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 3.1
Page 80
Start-up Sequence

AlliedWare Plus Start-up

Every switch has a start-up process. A specified version of product software must be loaded and executed. The bootloader is the executable code responsible for setting up the system and loading the release software.
The bootloader is the software that runs the unit when it first powers up, performing basic initialization and executing the product software release. As part of the start-up process of the switch, the bootloader allows you various options before running the product release software.
Previous versions of AlliedWare provide the option to boot to EPROM if a software release cannot be loaded, is unlicensed, or if selected by the user. The EPROM provides enough basic functionality to get a working software release loaded and operational on the switch. In AlliedWare Plus™ this task is handled by the bootloader.
As AlliedWare Plus™ begins its start-up process; there are two options that allow you to access either the diagnostic menu, or the bootloader menu. The following prompt is displayed when these options are temporarily available:
Bootloader 1.0.9 loaded
Press <Ctrl+B> for the Boot Menu
You can now enter one of the following two options to determine how the start-up process proceeds:
Enter Ctrl+D to display the diagnostic menu.
Enter Ctrl+B to display the bootloader menu.
Software Reference for SwitchBlade® x908 and x900 Series Switches
3.2 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 81
Start-up Sequence

Diagnostic Menu

Enter Ctrl+D during start-up to access the bootloader diagnostic menu, and provide options for performing various hardware tests. This can be useful as a tool for confirming a suspected hardware problem at the direction of network engineering personnel. When you enter Ctrl+D, the stage 1 diagnostics menu is displayed:
Bootup Stage 1 Diagnostics Menu:
0. Restart
1. Full RAM test
2. Quick RAM test
3. Battery backed RAM (NVS) test
4. Bootloader ROM checksum test
----------------------------------
7. Bootup stage 2 diagnostics menu
----------------------------------
8. Quit to U-Boot shell
9. Quit and continue booting Enter selection ==>
The options in the stage 1 diagnostics menu allow you to initiate the following tests:
RAM
The Bootloader fully tests any/all SDRAM installed in the system.
NVS
The Bootloader fully tests any/all non-volatile (battery backed) SRAM installed in the system.
checksum
The Bootloader checksum ROM memory for error detection.
For example, enter “2” to select a Quick RAM test:
Quick RAM test - press Q to quit, S to skip when failing
Writing pattern ................................
Checking pattern ................................
Writing complemented pattern ....................
Checking complemented pattern ...................
Pass 1 total errors 0
Enter “7” to display the stage 2 diagnostics menu:
Entering stage 2... Bootup Stage 2 Diagnostics Menu:
0. Restart
2. Test FLASH (Filesystem only)
4. Erase FLASH (Filesystem only)
5. Card slot test
----------------------------------
8. Quit to U-Boot shell
9. Quit and continue booting
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 3.3
Page 82
Start-up Sequence
The options in the stage 2 diagnostics menu allow you to initiate the following tests:
Flash
The Bootloader tests the user file system area of Flash. The bootloader is stored in a protected area of Flash that is not accessed by the user file system.
Flash Erase
The Bootloader erases the user file system area of Flash only.
SD (and SDHC) Card slot
The Bootloader tests the Card slot.
Once any required tests are completed from the diagnostics menu, enter “9” to quit the diagnostic menu and continue the switch boot-up process.
Software Reference for SwitchBlade® x908 and x900 Series Switches
3.4 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 83
Start-up Sequence

Bootloader Menu

Enter Ctrl+B during start-up to access the bootloader menu where boot options can be set. The boot options shown are explained in detail under this example.
Boot Menu:
-----------------------------------------------------­ B. Boot backup software
------------------------------------------------------
0. Restart
1. Perform one-off boot from alternate source
2. Change the default boot source (for advanced users)
3. Update Bootloader
4. Adjust the console baud rate
5. Special boot options
6. System information
7. Restore Bootloader factory settings
------------------------------------------------------
9. Quit and continue booting
Boot options A powerful feature of AlliedWare Plus™ is the ability to boot from a variety of sources.
Previously the switch was constrained to just booting off the release loaded into Flash memory. The only software release upgrade path being to load a new release into Flash memory and then set this release to be loaded at the next restart.
With AlliedWare Plus™ the switch can boot from other sources, such as a SD card or network server. This provides a very flexible system, with multiple options to upgrade software releases and for system recovery.
Details of the bootloader menu options are as follows:
1. Perform one-off boot from alternate source
Enter “1” to provide the following one-off boot options:
Enter selection ==> 1
Select device:
0. Return to previous menu
------------------------------------------------------
1. Flash (flash:)
2. SD Card (card:)
3. TFTP (tftp://)
4. YMODEM (ymodem:)
Enter selection ==>
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 3.5
Page 84
Start-up Sequence
You can select a one-off boot from Flash, SD (or SDHC) card, network server (TFTP), or ymodem. The selected option will be used for the next restart (only) of the switch. If you select to boot from the network, the bootloader prompts the user for the required network address details.
Note
These settings are specific to the Bootloader. They are not related in any way to what may be configured by the main software release.
.
Enter IP version [4|6]......... [4]:
Enter IP address for eth0 ..... [0.0.0.0]: 172.28.8.210
Enter subnet mask ............. [0.0.0.0]: 255.255.0.0
Enter gateway IP .............. [0.0.0.0]: 172.28.0.1
Enter TFTP server IP .......... [0.0.0.0]: 172.30.1.242
Enter filename ................ []: x900-5.4.3.rel
Loading tftp://172.30.1.242/x900-5.4.3.rel...
When the switch is booted up using the ‘one-off’ selected source for the software release, it provides the option to copy the release just used to Flash for further/ permanent use:
login: manager Password: ****** The system has been booted using the one off boot/recovery mechanism. Bootup has successfully completed. Write this release to flash? (y/n):
2. Change the default boot source (for advanced users)
Entering “2” provides the option to set the boot source permanently.
NOTE: These settings are specific to the Bootloader. They are not related in any way to what may be configured by the 'boot system' command in the main software release. Select device:
0. Return to previous menu
------------------------------------------------------
1. Flash (flash:)
2. SD Card (card:)
3. TFTP (tftp://)
4. YMODEM (ymodem:)
------------------------------------------------------
9. Boot from default (determined by main CLI)
Enter selection ==>
The same four boot source options are provided as with the one-off selection, but this time every restart of the switch will result in the unit booting from the selected source.
Software Reference for SwitchBlade® x908 and x900 Series Switches
3.6 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 85
Start-up Sequence
3. Update Bootloader
This option allows for the bootloader code to be updated. It is not detailed here, as it is envisioned that this would rarely need to be done, and only at the request of (and with support from) Allied Telesis engineering.
4. Adjust the console baud rate
The baud rate of the console session is set here to match the terminal program being used for management of the switch when connected directly to the asynchronous port. The switches default value is 9600. The baud rate selected can be set as the ‘new’ default for
future use if preferred.
Select baud rate:
0. Return to previous menu
------------------------------------------------------
1. 9600
2. 19200
3. 38400
4. 57600
5. 115200
6. 230400 (Setting can't be made permanent)
7. 460800 (Setting can't be made permanent)
Enter selection ==> 1
Change your terminal program baud rate to 9600 and press enter... if for some reason you are unable to do this, power cycle the device and the existing baud rate will be restored. Use this baud rate by default? (Y/N) ==> n
5. Special boot options
The special boot options allow for system recovery in the event of a forgotten password or to the default configuration.
Special boot options menu:
0. Return to previous menu
------------------------------------------------------
1. Skip startup script (Use system defaults)
Enter selection ==>
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 3.7
Page 86
Start-up Sequence
6. System information
The system information option provides some details on the hardware platform in use, such as CPU, memory, hardware (MAC) address and so on.
System information:
System (Detected values)
-----------------------------------------------------­ CPU:
Type ...............: MPC8541E
Speed ..............: 666 MHz
Memory:
Total installed ....: 512 MB
Speed ..............: 133 MHz
Flash:
Total installed ....: 32 MB
------------------------------------------------------
Product information
-----------------------------------------------------­ Compatible software ..: 1 (r1)
Serial ...............: 45AX5300X
Manufacture date .....: 03/2005
Product ..............: 280
Product name .........: x900-24XT-N
Revision .............: A
First MAC address ....: 00:00:CD:23:55:C8
------------------------------------------------------
Boot software information
------------------------------------------------------
Version ..............: 1.0.9
Build time ...........: Aug 3 2007 - 09:07:12
Built by .............: matthewm
Build host ...........: matthewm-dl
Build key ............: at9924ts
Compatible products:
255 ................: AT-9924Ts
256 ................: AT-9924SPs
270 ................: x900-24XT
271 ................: x900-24XS
280 ................: x900-24XT-N
287 ................: x900-12XT/S
------------------------------------------------------
Press any key to continue...
7. Restore Bootloader factory settings
This option allows the bootloader to be set back to factory defaults.
Caution
This option erases any settings that may have been configured by this menu
Are you sure? (Y/N) ==>
The bootloader menu provides a powerful set of options for flexibility in the way software releases are upgraded on the switch, and system recovery is performed.
Software Reference for SwitchBlade® x908 and x900 Series Switches
3.8 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 87

Start-up Sequence

Start-up Sequence
The start-up sequence for a device running AlliedWare Plus™ under normal circumstances will be as seen below - this sequence will be seen when everything loads and runs as expected.
Note
To enter the bootloader or diagnostic menus discussed previously, Ctrl+B or Ctrl+D must be entered when prompted before the software modules start loading.
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 3.9
Page 88
Start-up Sequence
Reading flash:x900-5.4.3.rel...
Verifying release... OK Booting... Starting base/first... [ OK ]
______________ ____ /\ \ / /______\ / \ \_ __/ /| ______ | / \ | | / | ______ | / \ \ / / \ ____ / /______/\____\ \/ /____________/
Allied Telesis Inc. AlliedWare Plus (TM) v5.4.2 Original release filename: x900-5.4.3.rel Built: Fri Nov 14 13:03:59 NZDT 2011 by: maker@awpmaker06-dl
Mounting virtual filesystems... [ OK ] Mounting static filesystems... [ OK ] Mounting flash... [ OK ] Checking NVS filesystem... [ OK ] Mounting NVS filesystem... [ OK ] Starting base/dbus... [ OK ] Starting base/klogd... [ OK ] Starting base/loopback... [ OK ] Starting base/sysctl... [ OK ] Starting base/syslog... [ OK ] Starting base/appmond... [ OK ] Starting base/portmapper... [ OK ] Starting base/cron... [ OK ] Starting hardware/openhpi... [ OK ] Starting hardware/timeout... [ OK ] Starting base/autofs... [ OK ] Starting base/inet... [ OK ] Starting base/modules... [ OK ] Received event baseboard.found Received event hardware.done Starting network/startup... [ OK ] Starting hardware/openhpilog... [ OK ] Starting network/trigger... [ OK ] 23:19:53 awplus HPI: HOTSWAP PSU 2 hotswapped in: AT-PWR01-AC 23:19:53 awplus HPI: HOTSWAP FOM 1 hotswapped in: AT-FAN01 Received event network.enabled
Initializing HA processes: auth, bgpd, cntrd, epsr, exfx, hostd, hsl imi, irdpd, lacp, loopprot, mstp, nsm, openhpid ospfd, pdmd, pimd, ripd, ripngd, rmon, vrrpd
Received event network.initialized Received event standalone
Assigning Active Workload to HA processes: hsl, lacpd, loopprotd, mstpd, nsm, pdmd, ripngd rmond, vrrpd, authd, bgpd, epsrd, irdpd, ospfd pimd, ripd, imi
Received event network.activated
Loading configuration file flash:/ipgw.cfg, please wait. .. Received event network.configured
awplus login: manager Password:
AlliedWare Plus (TM) 5.4.3 11/14/12 13:00:27
Bootloader 1.0.9 loaded Press <Ctrl+B> for the Boot Menu
Software Reference for SwitchBlade® x908 and x900 Series Switches
3.10 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 89
There are three possible status results displayed for each module loaded - OK, INFO, ERROR:
OK means that the module has loaded correctly.
INFO means that an error occurred, but the device is usable.
ERROR means that an error occurred and device operation may be affected.
Additional specific information accompanies an INFO or ERROR status result. For example, if a corrupt release file was set as the startup release, the following error message would be seen:
Bootloader 1.0.9 loaded Press <Ctrl+B> for the Boot Menu Reading filesystem... Error: Release filename is invalid (should be <release>.rel) Error: There is no backup release file set Error: Boot failed. Please recover the system using the Boot Menu Restarting...Bootloader 1.0.9 loaded Press <Ctrl+B> for the Boot Menu
Start-up Sequence
Whether an error message results in a case of the device being unusable will depend on the specific error and message, so will need to be dealt with on a case by case basis. If a software release has been corrupted, as shown on start-up, a new release may need to be loaded.
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 3.11
Page 90
Page 91

Chapter 4: CLI Navigation Commands

Command List .......................................................................................................................................4.2
configure terminal ...............................................................................................................................4.2
disable (Privileged Exec mode) .......................................................................................................4.2
do ...............................................................................................................................................................4.3
enable (Privileged Exec mode)........................................................................................................4.4
end.............................................................................................................................................................4.6
exit .............................................................................................................................................................4.6
help ...........................................................................................................................................................4.7
logout .......................................................................................................................................................4.7
show history...........................................................................................................................................4.8
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 4.1
Page 92
CLI Navigation Commands
Syntax configure terminal
Mode Privileged Exec
Example To enter the Global Configuration command mode (note the change in the command

Command List

This chapter provides an alphabetical reference for the commands used to navigate between different modes. This chapter also provides a reference for the help and show commands used to help navigate within the CLI.

configure terminal

This command enters the Global Configuration command mode.
prompt), enter the command:
awplus#
awplus(config)#

disable (Privileged Exec mode)

This command exits the Privileged Exec mode, returning the prompt to the User Exec mode. To end a session, use the exit command.
Syntax disable
Mode Privileged Exec
Example To exit the Privileged Exec mode, enter the command:
awplus#
awplus>
Related Commands enable (Privileged Exec mode)
end exit
configure terminal
disable
Software Reference for SwitchBlade® x908 and x900 Series Switches
4.2 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 93
do
This command lets you to run User Exec and Privileged Exec mode commands when you are in a Configuration mode.
Syntax do <command>
Parameter Description
<command> Specify the command and its parameters.
CLI Navigation Commands
Mode
Example
Any configuration mode
awplus#
awplus(config)#
configure terminal
do ping 192.0.2.23
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 4.3
Page 94
CLI Navigation Commands
Syntax enable [<privilege-level>]

enable (Privileged Exec mode)

This command enters the Privileged Exec mode and optionally changes the privilege level for a session. If a privilege level is not specified then the maximum privilege level (15) is applied to the session. If the optional privilege level is omitted then only users with the maximum privilege level can access Privileged Exec mode without providing the password as specified by the enable password or enable secret commands. If no password is specified then only users with the maximum privilege level set with the
username command can assess Privileged Exec mode.
Parameter Description
privilege-
<
level>
Specify the privilege level for a CLI session in the range <1-15>, where 15 is the maximum privilege level, 7 is the intermediate privilege level and 1 is the minimum privilege level. The privilege level for a user must match or exceed the privilege level set for the CLI session for the user to access Privileged Exec mode. Privilege level for a user is configured by username.
Mode User Exec
Usage Many commands are available from the Privileged Exec mode that configure operating
parameters for the switch, so you should apply password protection to the Privileged Exec mode to prevent unauthorized use. Passwords can be encrypted but then cannot be recovered. Note that un-encrypted passwords are shown in plain text in configurations.
The username command sets the privilege level for the user. After login, users are given access to privilege level 1. Users access higher privilege levels with the enable (Privileged
Exec mode) command. If the privilege level specified is higher than the users configured
privilege level specified by the username command, then the user is prompted for the password for that level.
Note that a separate password can be configured for each privilege level using the enable
password and the enable secret commands from the Global Configuration mode. The service password-encryption command encrypts passwords configured by the enable password and the enable secret commands, so passwords are not shown in plain text in
configurations.
Example The following example shows the use of the enable command to enter the Privileged Exec
mode (note the change in the command prompt).
awplus>
awplus#
enable
Software Reference for SwitchBlade® x908 and x900 Series Switches
4.4 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 95
CLI Navigation Commands
The following example shows the enable command enabling access the Privileged Exec mode for users with a privilege level of 7 or greater. Users with a privilege level of 7 or greater do not need to enter a password to access Privileged Exec mode. Users with a privilege level 6 or less need to enter a password to access Privilege Exec mode. Use the
enable password command or the enable secret commands to set the password to
enable access to Privileged Exec mode.
awplus>
awplus#
Related Commands disable (Privileged Exec mode)
enable password enable secret exit service password-encryption username
enable 7
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 4.5
Page 96
CLI Navigation Commands
Syntax end
end
This command returns the prompt to the Privileged Exec command mode from any other advanced command mode.
Mode
Example The following example shows the use of the end command to return to the Privileged
Related Commands disable (Privileged Exec mode)
All command modes
Exec mode directly from Interface mode.
awplus#
awplus(config)#
awplus(config-if)#
awplus#
enable (Privileged Exec mode) exit

exit

This command exits the current mode, and returns the prompt to the mode at the previous level. When used in User Exec mode, the exit command terminates the session.
Syntax exit
configure terminal
interface vlan2
end
Mode All command modes.
Example The following example shows the use of exit command to exit Interface mode, and
return to Configure mode.
awplus#
awplus(config)#
awplus(config-if)#
awplus(config)#
Related Commands disable (Privileged Exec mode)
enable (Privileged Exec mode) end
configure terminal
interface vlan2
exit
Software Reference for SwitchBlade® x908 and x900 Series Switches
4.6 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 97

help

This command displays a description of the AlliedWare PlusTM OS help system.
Syntax help
CLI Navigation Commands
Mode
Example To display a description on how to use the system help, use the command:
Output Figure 4-1: Example output from the help command
All command modes
awplus#
When you need help at the command line, press '?'.
If nothing matches, the help list will be empty. Delete characters until entering a '?' shows the available options.
Enter '?' after a complete parameter to show remaining valid command parameters (e.g. 'show ?').
Enter '?' after part of a parameter to show parameters that complete the typed letters (e.g. 'show ip?').
help

logout

This command exits the User Exec or Privileged Exec modes and ends the session.
Syntax logout
Mode
Example To exit the User Exec mode, use the command:
User Exec and Privileged Exec
awplus#
logout
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 4.7
Page 98
CLI Navigation Commands
Syntax show history
Mode User Exec and Privileged Exec
Example To display the commands entered during the current session, use the command:

show history

This command lists the commands entered in the current session. The history buffer is cleared automatically upon reboot.
The output lists all command line entries, including commands that returned an error.
For information on output options, see “Controlling “show” Command Output” on
page 1.44.
awplus#
Output Figure 4-2: Example output from the show history command
1 en 2 show ru 3 con t 4 route-map er deny 3 5 exit 6 ex 7 di
show history
Software Reference for SwitchBlade® x908 and x900 Series Switches
4.8 AlliedWare Plus
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Page 99

Chapter 5: User Access Commands

Introduction ...........................................................................................................................................5.2
Command List .......................................................................................................................................5.2
clear line console..................................................................................................................................5.2
clear line vty ...........................................................................................................................................5.2
enable password ..................................................................................................................................5.3
enable secret..........................................................................................................................................5.6
exec-timeout..........................................................................................................................................5.9
flowcontrol hardware (asyn/console)........................................................................................ 5.10
length (asyn) .......................................................................................................................................5.11
line .......................................................................................................................................................... 5.12
privilege level .....................................................................................................................................5.13
security-password history .............................................................................................................. 5.14
security-password forced-change .............................................................................................. 5.15
security-password lifetime............................................................................................................. 5.16
security-password minimum-categories.................................................................................. 5.17
security-password minimum-length ......................................................................................... 5.18
security-password reject-expired-pwd ..................................................................................... 5.19
security-password warning ........................................................................................................... 5.20
service advanced-vty ....................................................................................................................... 5.21
service http.......................................................................................................................................... 5.22
service password-encryption........................................................................................................ 5.23
service telnet....................................................................................................................................... 5.24
service terminal-length ................................................................................................................... 5.25
show security-password configuration..................................................................................... 5.26
show security-password user ....................................................................................................... 5.26
show privilege....................................................................................................................................5.27
show telnet.......................................................................................................................................... 5.27
show users ........................................................................................................................................... 5.28
telnet...................................................................................................................................................... 5.29
telnet server ........................................................................................................................................ 5.30
terminal length .................................................................................................................................. 5.31
terminal resize .................................................................................................................................... 5.32
username ............................................................................................................................................. 5.33
Software Reference for SwitchBlade® x908 and x900 Series Switches
C613-50026-01 REV B AlliedWare Plus
TM
Operating System - Version 5.4.3 5.1
Page 100
User Access Commands
Syntax clear line console 0

Introduction

This chapter provides an alphabetical reference of commands used to configure user access.

Command List

clear line console

This command resets a console line. If a terminal session exists on the line then the terminal session is terminated. If console line settings have changed then the new settings are applied.
Mode
Example To reset the console line (asyn), use the command:
Related Commands clear line vty
Privileged Exec
awplus#
flowcontrol hardware (asyn/console) line show users

clear line vty

This command resets a VTY line. If a session exists on the line then it is closed.
Syntax clear line vty <0-32>
Parameter Description
<0-32> Line number
clear line console 0
% The new settings for console line 0 have been applied
Mode
Example To reset the first vty line, use the command:
Related Commands privilege level
5.2 AlliedWare Plus
Privileged Exec
awplus#
line show telnet show users
Software Reference for SwitchBlade® x908 and x900 Series Switches
clear line vty 1
TM
Operating System - Version 5.4.3 C613-50026-01 REV B
Loading...