Brocade, the B-wing symbol, BigIron, DCX, Fabric OS, FastIron, IronPoint, IronShield, IronView, IronWare, JetCore, NetIron,
SecureIron, ServerIron, StorageX, and TurboIron are registered trademarks, and DCFM, Extraordinary Networks, and SAN Health
are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. All other brands,
products, or service names are or may be trademarks or service marks of, and are used to identify, products or services of their
respective owners.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning
any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to
this document at any time, without notice, and assumes no responsibility for its use. This informational document describes
features that may not be currently available. Contact a Brocade sales office for information on feature and product availability.
Export of technical data contained in this document may require an export license from the United States government.
The authors and Brocade Communications Systems, Inc. shall have no liability or responsibility to any person or entity with
respect to any loss, cost, liability, or damages arising from the information contained in this book or the computer programs that
accompany it.
The product described by this document may contain “open source” software covered by the GNU General Public License or other
open source license agreements. To find out which open source software is included in Brocade products, view the licensing
terms applicable to the open source software, and obtain a copy of the programming source code, please visit
http://www.brocade.com/support/oscd.
Brocade Communications Systems, Incorporated
Corporate and Latin American Headquarters
Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
Tel: 1-408-333-8000
Fax: 1-408-333-8101
E-mail: info@brocade.com
European Headquarters
Brocade Communications Switzerland Sàrl
Centre Swissair
Tour B - 4èm e étag e
29, Route de l'Aéroport
Case Postale 105
CH-1215 Genève 15
Switzerland
Tel: +41 22 799 5640
Fax: +41 22 799 5641
E-mail: emea-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems China HK, Ltd.
No. 1 Guanghua Road
Chao Yang District
Units 2718 and 2818
Beijing 100020, China
Tel: +8610 6588 8888
Fax: +8610 6588 9999
E-mail: china-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems Co., Ltd. (Shenzhen WFOE)
Citic Plaza
No. 233 Tian He Road North
Unit 1308 – 13th Floor
Guangzhou, China
Tel: +8620 3891 2000
Fax: +8620 3891 2111
E-mail: china-info@brocade.com
The Brocade Mobility RFS7000-GR Controller CLI Reference Guide is intended for system
administrators responsible for the implementing, configuring, and maintaining the Brocade
Mobility RFS7000-GR Controller using the switch command line interface (CLI). It also serves as a
reference for configuring and modifying most common system settings. The administrator must be
familiar with wireless technologies, network concepts, Ethernet concepts, as well as IP addressing
and SNMP concepts.
How to Use this Guide
This guide helps you implement, configure, and administer the Brocade Mobility RFS7000-GR
Controller and associated network elements. This guide is organized into the following sections:
ChapterJump to this section if you want to...
Chapter 1, “Introduction”Review the overall feature-set of the Brocade Mobility RFS7000-GR
Chapter 2, “Common Commands”Summarize the commands common amongst many contexts and
Chapter 3, “User Exec Commands”Summarize the User Exec commands within the Brocade Mobility
Chapter 4, “Privileged Exec Commands”Summarize the Priv Exec commands within the Brocade Mobility
Chapter 5, “Global Configuration
Commands”
Chapter 6, “Crypto-isakmp Instance”Summarizes the crypto-isakmp commands within the Brocade
Controller, as well as the many configuration options available.
instance contexts within the Brocade Mobility RFS7000-GR
Controller CLI.
RFS7000-GR Controller CLI.
RFS7000-GR Controller CLI.
Summarize the Global Config commands within the Brocade
Mobility RFS7000-GR Controller CLI.
Mobility RFS7000-GR Controller CLI.
Brocade Mobility RFS7000-GR Controller CLI Reference Guide xi
53-1001945-01
Conventions Used in this Guide
ChapterJump to this section if you want to...
Chapter 7, “Crypto-group Instance”Summarizes the crypto-group commands within the Brocade
Chapter 8, “Crypto-peer Instance”Summarizes the crypto-peer commands within the Brocade
Chapter 9, “Crypto-ipsec Instance”Summarizes the crypto-ipsec commands within the Brocade
Chapter 10, “Crypto-map Instance”Summarizes the crypto-map commands within the Brocade
Chapter 11, “Crypto-trustpoint Instance”Summarize the
Chapter 12, “Interface Instance”Summarize the
Chapter 13, “Spanning tree-mst Instance”Summarize the
Chapter 14, “Extended ACL Instance”Summarize the
Chapter 15, “Standard ACL Instance”Summarize the
Chapter 16, “Extended MAC ACL Instance”Summarize the
Chapter 17, “DHCP Server Instance”Summarize the
Chapter 18, “DHCP Class Instance”
Chapter 19, “RADIUS Server Instance”Summarize the
Chapter 20, “Wireless Instance”Summarize the
Chapter 21, “RTLS Instance”Summarize the
Chapter 22, “SOLE Instance”Summarize the
Mobility RFS7000-GR Controller CLI.
Mobility RFS7000-GR Controller CLI.
Mobility RFS7000-GR Controller CLI.
Mobility RFS7000-GR Controller CLI.
(crypto-trustpoint) commands within the
Brocade Mobility RFS7000-GR Controller CLI.
(config-if) commands within the Brocade
Mobility RFS7000-GR Controller CLI.
(config-mst) commands within the Brocade
Mobility RFS7000-GR Controller CLI.
(config-ext-nacl) commands within the
Brocade Mobility RFS7000-GR Controller CLI.
(config-std-nacl) commands within the
Brocade Mobility RFS7000-GR Controller CLI.
(config-ext-macl) commands within the
Brocade Mobility RFS7000-GR Controller CLI.
(config-dhcp pool) commands within the
Brocade Mobility RFS7000-GR Controller CLI.
Summarize the (config-dhcp-class) instance commands
within the Brocade Mobility RFS7000-GR Controller CLI.
(config-radsrv) instance commands within
the Brocade Mobility RFS7000-GR Controller CLI.
(config-wireless) instance commands
within the Brocade Mobility RFS7000-GR Controller CLI.
(config-rtls) instance commands within the
Brocade Mobility RFS7000-GR Controller CLI.
(config-sole) instance commands within the
Brocade Mobility RFS7000-GR Controller CLI.
Conventions Used in this Guide
This section describes the following topics:
• Annotated Symbols
• Notational Conventions
Annotated Symbols
The following document conventions are used in this document:
boldBold text indicates commands and keywords that you
enter literally
italicsItalic text indicates arguments for which you supply
values.
()(on|off)Grouping (exactly one of a list of tokens)on
{}{key1|key2|key3} Selective recursive (multiple tokens allowed, but each
can only be used once)
[ ]
[key1|key2|key3]
..<1-10>Simple infinite recursive1 2 6
?[key1|?key2]Selective keyword in infinite recursive.key1 key1
Infinite recursive (multiple tokens allowed, each can
be used multiple times)
key1 key3
key1 key1
key2 key3
key2 key3
key2
Brocade Mobility RFS7000-GR Controller CLI Reference Guide xiii
53-1001945-01
Web support sites
Web support sites
Customer Support Web Site
Brocade Support Central Web site, located at www.brocade.com/support provides information and
online assistance including developer tools, software downloads, product manuals and online
repair requests.
Downloads
http://www.brocade.com/support/
Manuals
http://www.brocade.com/support/
Because quality is our first concern at Brocade, we have made every effort to ensure the accuracy
and completeness of this document. However, if you find an error or an omission, or you think that
a topic needs further development, we want to hear from you. Forward your feedback to:
documentation@brocade.com
.
Provide the title and version number and as much detail as possible about your comment,
including the topic heading and page number and your suggestions for improvement.
E-mail and telephone access
Go to http://www.brocade.com/services-support/index.page for email and telephone contact
information.
This chapter describes the commands used by the Brocade Mobility RFS7000-GR Controller
Command Line Interface (CLI). Access the CLI by running a terminal emulation program on a
computer connected to the serial port at the front of the switch, or by using telnet or secure shell
(ssh) to access the switch over the network.
The default cli user is cli. The default username and password is admin and superuser,
respectively.
Common Criteria Operational Requirements
To run the product in the Common Criteria evaluated configuration, the following conditions must
be met:
1. The product shall run in the FIPS mode of operation. For FIPS configuration information please
refer to the “Secure Installation Procedure” section of the Brocade Mobility RFS7000-GR
Controller Switch Installation Guide
2. The product shall be configured to use an external FIPS-compliant RADIUS server for
authentication of wireless users using EAP-TLS, EAP-PEAP or EAP-TTLS protocol.
3. The product shall use the internal administrator database for authentication of administrators
4. The product shall be configured to use an external NTP server for time synchronization
5. The product shall be configured to use an external audit server for transmission of audit
records
6. Connections to the external servers shall be protected by an encrypted IPSec/IKE tunnel.
7. In support of the audit server, the IT environment shall provide the capability to protect audit
information and authentication credentials. The environment shall also provide the capability
to selectively view audit data.
8. In support of the authentication server, the IT environment shall provide facilities to manage
authentication information and limit brute force password attacks.
RFS7000(config-ext-macl)#permit any 00-15-70-38-08-4c/00-15-70-38-08-4c type wisp
RFS7000(config-ext-macl)#exit
Applying MAC ACL to physical port GE1 and Running Configuration after Config Changes
RFS7000(config)#interface ge 1
RFS7000(config-if)#mac access-group drop_nonwisp in
RFS7000(config-if)#
RFS7000(config)#show running-config
!
! configuration of RFS7000 version 4.1.0.0-040GR
!
version 1.4
!
!
aaa authentication login default local
network-element-id 172.2.1.0/24
!
username "admin" password 1 8e67bb26b358e2ed20fe552ed6fb832f397a507d
username "admin" privilege superuser
username "operator" password 1 fe96dd39756ac41b74283a9292652d366d73931f
!
!
mac access-list extended drop_nonwisp
permit any 00:15:70:38:08:4c/00:15:70:38:08:4c type wisp rule-precedence 10
!
spanning-tree mst cisco-interoperability enable
spanning-tree mst configuration
name My Name
!
ip domain-name Brocade.com
country-code us
logging buffered 4
logging console 4
snmp-server engineid netsnmp 6b8b45673a4fa870
!
!
radius-server local
sole
!
interface ge1
switchport access vlan 2
ip dhcp trust
mac access-group drop_nonwisp in
!
interface ge2
switchport access vlan 3
ip dhcp trust
!
interface ge3
switchport access vlan 4
ip dhcp trust
!
interface ge4
switchport mode trunk
switchport trunk native vlan 1
switchport trunk allowed vlan none
switchport trunk allowed vlan add 1,20,
ip dhcp trust
!
interface me1
ip address 10.1.1.100/24
!
interface vlan1
ip address 172.17.1.100/24
!
interface vlan10
no ip address
!
interface vlan20
ip address 172.2.1.100/24
!
ip dhcp pool vlan20pool
address range 172.17.2.150
address range 172.17.2.160
!
service dhcp
!
line con 0
line vty 0 24
!
auth-time 1
end
RFS7000(config-if)#
Warning: This will display secure information.Do you want to proceed? (y/n): y
!
! configuration of RFS7000 version 4.1.0.0-040GR
!
version 1.1
!
!
aaa authentication login default local
!
ip dhcp pool vlan20pool
default-router 172.2.1.100
network 172.2.1.0/24
address range 172.2.1.150 172.2.1.160
!
service dhcp
!
line con 0
line vty 0 24
!
end
RFS7000(config)#
Configuration of IP ACL For Common Criteria Operation
If access points are connected over L3 network then user shall use MAC and IP ACLs in
combination as explained below.
RFS7000#
RFS7000#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
RFS7000(config)#
Creating MAC ACL to assign to a physical port to allow arp,ip and wisp packets.
RFS7000(config)#mac access-list extended drop_nonwisp
RFS7000(config-ext-macl)#permit any any type arp rule-precedence 5
RFS7000(config-ext-macl)#permit any any type ip rule-precedence 10
RFS7000(config-ext-macl)#permit any 00:15:70:13:f0:5e/00:15:70:13:f0:5e type wisp
rule-precedence 20
RFS7000(config-ext-macl)#exit
RFS7000(config)#interface ge 1
RFS7000(config-if)#mac access-group drop_nonwisp in
RFS7000(config-if)#exit
Creating WLAN1 with Preshared Key and Assigning VLAN20
RFS7000(config)#wireless
RFS7000(config-wireless)#wlan 1 ssid cc
RFS7000(config-wireless)#wlan 1 enable
RFS7000(config-wireless)#wlan 1 encryption-type ccmp
RFS7000(config-wireless)#wlan1 1 vlan 20
RFS7000(config-wireless)#wlan 1 dot11i key 1234567890123456789012345678901234567
890123456789012345678901234
RFS7000(config-wireless)#exit
Adopt a ap7131 to the switch over L2. (Connect a cable from GE1 to POE Switch and
connect ap7131 to POE Switch)and see ap7131 is adopted to the switch.
RFS7000(config-wireless)#show wireless ap
Number of access-ports adopted : 1
Available licenses : 47
Redundancy enabled : N
Redundancy mode : active
# Mac Radios [indices] Model-Number Adoption-Mode Static IP
1 00-A0-F8-D8-7E-94 2 [ 1 2 ] WSAP-5110-100-WW L2 (vlan: 20)
RFS7000(config-wireless)#
Configure Static and Switch IP Addresses to AP 1
RFS7000(config-wireless)#ap-ip 1 ?
static-ip Static IP address, netmask and gateway address
switch-ip static switch IP addresses
RFS7000(config-wireless)#ap-ip 1 static-ip 172.16.1.99/24 172.16.1.101
RFS7000(config-wireless)#ap-ip 1 switch-ip add 172.2.1.100
RFS7000(config)#show wireless ap
Number of access-ports adopted : 0
Number of AAPs adopted : 0
Available AP licenses : 0
Available AAP licenses : 0
Redundancy enabled : N
Redundancy mode : active
Number of access-ports adopted : 1
Available licenses : 47
Redundancy enabled : N
Redundancy mode : active
# Mac Radios [indices] Model-Number Adoption-Mode Static IP
1 00-A0-F8-D8-7E-94 2 [ 1 2 ] WSAP-5110-100-WW L2 (vlan: 20)
172.16.1.99/24 172.16.1.101
RFS7000(config)#
Disconnect AP and Connect it in 172.16.1.0/24 subnet which is reachable to
172.2.1.0/24 via 172.16.1.101
RFS7000(config)#show wireless ap
Number of access-ports adopted : 1
Available licenses : 47
Redundancy enabled : N
Redundancy mode : active
# Mac Radios [indices] Model-Number Adoption-Mode Static IP
1 00-A0-F8-D8-7E-94 2 [ 1 2 ] WSAP-5110-100-WW L3 (IP: 172.16.1.99)
172.16.1.99/24 172.16.1.101
RFS7000(config)#
RFS7000(config)#
CLI Overview
The CLI is used for configuring, monitoring, and maintaining Brocade devices. The CLI interface
allows you to execute commands, whether using a serial console or using remote access methods.
This chapter describes the basic features of the Brocade CLI and how to use them. Topics covered
include an introduction to command modes, navigation and editing features, help features, and
command history features.
The CLI is divided into different command modes. Each command mode has its own set of
commands available for configuration, maintenance and monitoring. The commands available at
any given time depend on the mode you are in. Enter a question mark (?) at the system prompt to
view the list of commands available for each command mode/instance.
Use specific commands to navigate from one command mode to another. The standard order is as
follows: USER EXEC mode; PRIV EXEC mode and GLOBAL CONFIG mode.
A session generally begins in USER EXEC mode, which is one of the two access levels of EXEC
mode. For security purposes, only limited subset of EXEC commands are made available in USER
EXEC mode. This level of access is reserved for tasks that do not change the configuration of the
switch, such as determining the current switch configuration.
To access commands, enter the PRIV EXEC mode, which is the second level of access for the EXEC
mode. In the PRIV EXEC mode, enter any EXEC command. The PRIV EXEC mode is a superset of the
USER EXEC mode.
Most of the USER EXEC mode commands are one-time commands and are not saved across
reboots of the switch. For example, show command displays the current configuration and clear
command clears the counter or interface.
Enter GLOBAL CONFIG mode from PRIV EXEC mode. In this mode, enter commands that configure
general system characteristics. Use the global configuration mode to enter specific configuration
modes. Configuration modes, including global configuration mode, allows you to make changes to
the running configuration. If you save the configuration later, these commands are stored across
switch reboots.
Enter a variety of protocol-specific or feature-specific configuration modes from global
configuration mode. The CLI hierarchy requires you enter these specific configuration modes only
through global configuration mode.
Enter configuration submodes from global configuration modes. Configuration submodes are used
to configure specific features within the scope of a given configuration mode.
The table below summarizes the commands available to configure and monitor the switch.
User Exec ModePriv Exec ModeGlobal Configuration Mode
User Exec ModePriv Exec ModeGlobal Configuration Mode
Getting Context Sensitive Help
Enter a question mark (?) at the system prompt to display a list of commands available for each
command mode. Optionally obtain a list of the arguments and keywords available for any
command using context-sensitive help.
rmdirservice
runshow
servicespanning-tree
showtimezone
terminalusername
traceroutevpn
upgradewireless
upgrade-abortwlan-acl
writezeroize
Use any of the following commands to get help specific to a command mode, command name,
keyword or argument:
CommandDescription
(prompt)# helpDisplays a brief description of the help system.
(prompt)# abbreviated-command-entry ?Lists commands in the current mode that begin with a particular
character string.
(prompt)# abbreviated-command-entry <Tab>Completes a partial command name.
(prompt)# ?Lists all commands available in the command mode.
prompt)# command ?Lists the available syntax options (arguments and keywords) for the
command.
(prompt)# command keyword ?Lists the next available syntax option for the command.
NOTE
The system prompt ma varies depending on which configuration mode you are in.
When using context-sensitive help, the space (or lack of a space) before the question mark (?) is
significant. To obtain a list of commands that begin with a particular character sequence, type in
those characters followed by the question mark (?). Do not include a space. This form of help is
called word help, because it completes a word.
RFS7000#service?
service Service Commands
RFS7000#service
Enter a question mark (?) in place of a keyword or argument to list keywords or arguments. Include
a space before the ?. This form of help is called command syntax help and shows which keywords
or arguments are available based on the command/ keywords and arguments already entered.
RFS7000>service ?
clear Reset functions
diag Diagnostics
diag-shell Provide diag shell access
encrypt Encrypt password or key with secret
ip Internet Protocol (IP)
locator flash all LEDS to locate switch visually
pm Process Monitor
save-cli Save CLI tree for all modes in html format
securitymgr Securitymgr parameters
show Show running system information
smart-rf Smart-RF Management Commands
watchdog enable the watchdog
wireless Wireless parameters
diag Diagnostics
encrypt Encrypt password or key with secret
locator flash all LEDS to locate switch visually
show Show running system information
wireless Wireless parameters
RFS7000>service
1
It is possible to abbreviate commands and keywords to the number of characters allowing a unique
abbreviation. For example, configure terminal can be abbreviated as config t. Since the
abbreviated form of the command is unique, the switch accepts the abbreviated form and
executes the command.
Enter the help command (available in any command mode) to provide the following description:
RFS7000>help
CLI provides advanced help feature. When you need help,
anytime at the command line please press '?'.
If nothing matches, the help list will be empty and you must backup
until entering a '?' shows the available options.
Two styles of help are provided:
1. Full help is available when you are ready to enter a
command argument (e.g. 'show ?') and describes each possible
argument.
2. Partial help is provided when an abbreviated argument is entered
and you want to know what arguments match the input
(e.g. 'show ve?'.)
RFS7000>
Using the no and default forms of Commands
Almost every configuration command has a no form. In general, use the no form to disable a
feature or function. Use the command without the no keyword to re enable a disabled feature or
enable a feature disabled by default.
To help prevent unauthorized access to the swtich, the adminstrator account will timeout and log
off after 3 minutes of inactivity. To change the inactivity timeout, from the global configuration
context issue the following commands:
RFS7000(config)# line console 0
RFS7000(config)# exec-timeout <timeout>
The valid timeout range is between 1-35791 minutes
Basic Conventions
The following are conventions to keep in mind while working within the CLI:
• Always use ? at the end of the command to view if there are any further sub modes that can be
used. If so, type the first few alphabets of the submode and press the tab key. Continue using
? until you reach the final sub-submode.
• Pre-defined CLI commands and keywords are case-insensitive: cfg = Cfg = CFG.
• Commands can be entered in uppercase, lowercase, or mixed case. Only passwords are case
sensitive.
NOTE
CLI commands starting with #, at the RFS7000# prompt, are ignored and are not executed. Any
leading space before a CLI command is ignored in execution.
Using CLI Editing Features and Shortcuts
A variety of shortcuts and editing features are available. The following sections describe these
features:
• Moving the Cursor on the Command Line
• Completing a Partial Command Name
• Deleting Entries
• Re-displaying the Current Command Line
• Transposing Mistyped Characters
• Controlling Capitalization
Moving the Cursor on the Command Line
The following table shows the key combinations or sequences to move the cursor on the command
line to make corrections or changes. Ctrl indicates the Control key, which must be pressed
simultaneously with its associated letter key. Esc indicates the Escape key, which must be pressed
first, followed by its associated letter key. Keys are not case sensitive. Many letters used for CLI
navigation and editing were chosen to provide an easy means of remembering their functions.
In the following table, bolded characters inside the Function Summary column indicate the
relationship between the letter used and the function.
KeystrokesFunction SummaryFunction Details
Left Arrow or Ctrl-BBack characterMoves the cursor one character to the left.
When you enter a command extending beyond a single line,
press the Left Arrow or Ctrl-B keys repeatedly to scroll back to
the system prompt and verify the beginning of the command
entry, or press the Ctrl-A key combination.
Right Arrow or Ctrl-FForward characterMoves the cursor one character to the right.
Esc, BBack wordMoves the cursor back one word.
Esc, FForward wordMoves the cursor forward one word.
Ctrl-ABeginning of lineMoves the cursor to the beginning of the line.
Ctrl-EEnd of lineMoves the cursor to the end of the command line.
Ctrl-dDeletes current character.
Ctrl-UDeletes text up to cursor.
Ctrl-KDeletes from cursor to end of line.
Ctrl-PGets the prior command from history.
Ctrl-NGets the next command from history.
Esc-CConverts the rest of word to uppercase.
Esc-LConverts the rest of word to lowercase.
Esc-DDeletes the remainder of word.
Ctrl-WDeletes a word up to the cursor.
Ctrl-ZEnters the command and retursn to the root prompt.
Ctrl-LRefreshes the input line.
1
Completing a Partial Command Name
Enter the first few letters of the command and press the Tab key if you do not remember the
complete command name, or to reduce the amount of typing. The command line parser completes
the command if the string entered is unique to the command mode. Use Ctrl-I if your keyboard
does not have a Tab key.
The CLI recognizes a command once you have entered enough characters to make the command
unique. For example, if you enter conf in privileged EXEC mode, the CLI associates your entry with
the configure command only because the configure command begins with
In the following example, the CLI recognizes the unique string for privileged EXEC mode of conf
when the Tab key is pressed:
When you use the command completion feature, the CLI displays the full command name. The
command is not executed until you use the Return or Enter key. This way, the command can be
modified if the full command was not what you intended by abbreviation. Enter a set of characters
that could indicate more than one command to list commands that begin with that set of
characters.
Alternatively, enter a question mark (?) to obtain a list of commands that begin with that set of
characters. Do not leave a space between the last letter you enter and the question mark (?).
For example, entering
RFS7000#co?
configure Enter configuration mode
copy Copy from one file to another
RFS7000#co
RFS7000# co?
copy? commit
RFS7000# co
co? lists commands available in the current command mode:
NOTE
The characters entered before the question mark are reprinted to the screen to complete the
command entry.
Deleting Entries
Use any of the following keystrokes to delete command entries:
KeystrokesPurpose
BackspaceDeletes the character to the left of the cursor.
Ctrl-DDeletes the character at the cursor.
Ctrl-KDeletes all characters from the cursor to the end of the command line.
Ctrl-WDeletes the word up to the cursor.
Esc, DDeletes from the cursor to the end of the word.
Re-displaying the Current Command Line
It is easy to recall the current command line entry if the system suddenly displays a message when
entering a command. To redisplay the current command line (refresh the screen), use the following
keystroke:
KeystrokesPurpose
Ctrl-LRedisplays the current command line.
Command Output Pagination
When working with the CLI, output often extends beyond the visible screen length. In such a case,
Press Any Key to Continue (Q to Quit) displays at the bottom of the screen. To resume,
press the Return key to scroll down one line, or press the Spacebar to display the next full screen of
output.
If you have mistyped a command, it is possible to transpose the mistyped characters. To transpose
characters, use the following keystroke:
KeystrokesPurpose
Ctrl-TTransposes the character to the left of the cursor with the character located at the cursor.
Controlling Capitalization
CLI commands are generally case-insensitive, and are typically in lowercase. To change the
capitalization of the commands, use any of the following key sequences:
KeystrokesPurpose
Esc, CCapitalizes the letters at the right of cursor.
Esc, LChanges the letters at the right of cursor to lowercase.
This chapter explains the common CLI commands used amongst the USER EXEC and PRIV EXEC
modes.
The PRIV EXEC command set contains the commands available in USER EXEC mode. Some
commands can be entered in either mode. Commands entered in either USER EXEC mode or PRIV
EXEC mode are referred to as EXEC mode commands. If the user or privilege is not specified, the
referenced command can be entered in either mode.
Use this command to access the advanced help feature. Use “?” at the command prompt to access
the help topic.
Two styles of help are provided:
1. Full help is available when ready to enter a command argument and describe each possible
argument. There is a space between the command and ?, (for example 'show ?') .
2. Partial help is provided when an abbreviated argument is entered and you want to know what
arguments match the input. There is no space between the command and ?, (for example,
'show ve?').
Syntax
help
or
?
Parameters
None.
Example
RFS7000>show ?
autoinstall autoinstall configuration
banner Display Message of the Day Login banner
commands Show command lists
debugging Debugging information outputs
environment show environmental information
history Display the session command history
interfaces Interface status
ip Internet Protocol (IP)
ldap LDAP server
licenses Show any installed licenses
logging Show logging configuration and buffer
mac MAC access-list assignment
mac-address-table Display MAC address table
management Display L3 Managment Interface name
mobility Display Mobility parameters
ntp Network time protocol
privilege Show current privilege level
radius RADIUS configuration commands
redundancy-group Display redundancy group parameters
redundancy-history Display state transition history of the switch.
redundancy-members Display redundancy group members in detail
snmp Display SNMP engine parameters
snmp-server Display SNMP engine parameters
spanning-tree spanning-tree Display spanning tree information
static-channel-group static channel group membership
terminal Display terminal configuration parameters
timezone Display timezone
users Display information about terminal lines
version Display software & hardware version
wireless Wireless configuration commands
access-banner Reset Access Banner to Default string
access-list Configure access-lists
arp Address Resolution Protocol (ARP)
auth-timeout Set the AUTH timeout
autoinstall autoinstall configuration command
bridge Bridge group commands
country-code Clear the currently configured country code. All existing
radio configuration will be erased
crypto encryption module
errdisable errdisable
firewall Wireless firewall
hostname Reset system's network name to default
interface Delete a virtual interface
ip Internet Protocol (IP)
line Configure a terminal line
local Local user authentication database for VPN
logging Modify message logging facilities
mac MAC configuration
mac-address-table Configure MAC address table
mac-name Remove a configured MAC address Name
management sets properties of the management interface
network-element-id Reset system's network element ID to default
Remove all local ap log files (does not clear them off the AP)
Remove clitree.html (created by the save-cli command)
Firewall
Securitymgr parameters
Clear Static and Dynamic Snoop Entries
wireless related parameters
Enables service diagnostics.
Identifies this switch by flashing the LEDs.
Diagnostic limit command.
• buffer – Buffer usage warning limit.
• fan – Fan speed limit.
• filesys – File system freespace limit.
• inodes – File system inode limit.
• load – Agregate processor load.
• maxFDs – Maximum number of file descriptors.
• pkbuffers – Packet buffer head cache.
• procRAM – Percent RAM used by a process.
• ram – Percent free RAM.
• routecache – IP route cache usage.
• temperature – Temperature limit.
Use this parameter to set the diagnostic limit submodes/commands.
Configure the buffer usage warning limit. The warning limit can be set to
one of the following sizes:
• buffer – Buffer usage warning limit.
• 128 – 128 byte buffer limit.
• 128k – 128k byte buffer limit.
• 16k – 16k byte buffer limit.
• 1k – 1k byte buffer limit.
• 256 – 256 byte buffer limit.
• 2k – 2k byte buffer limit.
• 32 – 32 byte buffer limit.
• 32k – 32k byte buffer limit.
• 4k – 4k byte buffer limit.
• 512 – 512 byte buffer limit.
• 64 – 64 byte buffer limit.
• 64k – 64k byte buffer limit.
• 8k – 8 byte buffer limit.
• <0-65535> – Buffer usage warning limit 0-65535.
Use this parameter to set the fan speed limit. Configure the fan speed limit for both
fans or just one.
service securitymgr [disable|disable-flow-rate-limit|dump-core|enable-http-stats]
service show [cli|command-history|crash-info|diag|info|memory|
pm(history)[process-name|all]|process|reboot-history|securitymgr|startup-log|upgr
ade-history|watchdog|wireless]
service wireless [ap-history|buffer-counters|clear-ap-log <1-256>|dump-core
|idle-radio-send-multicast|legacy-load-balance|map-radios <1-127>|
rate-scale|request-ap-log <1-256>|save-ap-log|snmp-trap-throttle]
• filesys (etc2|flash|var) – File system freespace limit.
• inodes (etc2|flash|var) – File system inode limit.
• load (1|15|5) – Aggregate processor load during the previous minutes,
based on the option selected.
• maxFDs <0-32767> – Maximum number of file descriptors.
• pkbuffers <0-65535> – Packet buffer head cache.
• procRAM <0.0-100.0> – RAM % used by a process.
• ram <0.0-25.0> – Percent free RAM.
• routecache <0-65535> – IP route cache usage.
• temperature <1-8> (critical|high|low) – Temperature limit.
• period <100-30000> – Set diagnostics period. The default period is set as
1000 milliseconds.
Encrypts passwords.
• secret (2) – Encrypts passwords with secret phrase, using SHA256-AES256
encryption.
• LINE – Enter a passphrase for encryption.
Process Monitor.
• sys-restart – Enables PMLite to reboot the system when a deamon has been
restarted maximum number of times. The default value is to reboot the system.
This enables the process monitor to restart the system when a process fails.
NOTE: Use the [no] service pm sys-restart command to disallow a
reboot of the system eve nafter a process has been restarted to its maximum
number of times. This is useful for debugging purpose.
Enables the RADIUS Server.
set (command-history
<10-300>|reboot-history
<10-100>|
upgrade-history <10-100>)
Set service parameters.
• command-history <10-300> – Sets the size of the command history. The
default value is 200.
• reboot-history <10-100> – Sets the size of the reboot history. The default value
is 50.
• upgrade-history <10-100> – Sets the size of the upgrade history. The default
value is 50.
show (cli)
Displays running system information.
• cli – Shows the CLI tree of current mode.
terminal-length <0-512>
System wide terminal length configuration.
• <0-512> – Number of lines of VTY (0 means no line control).
led LED control
limit diagnostic limit command
period Set diagnostics period
RFS7000#service diaglimit ?
buffer buffer usage warning limit
fan Fan speed limit
filesys file system freespace limit
load agregate processor load
maxFDs maximum number of file descriptors
pkbuffers packet buffer head cache
procRAM percent RAM used by a process
ram percent free RAM
routecache IP route cache usage
temperature temperature limit
RFS7000#service diag limit load ?
1 during the previous minute
15 during the previous 15 minutes
5 during the previous five minutes
RFS7000#service diag limit load 5 ?
WORD percentage load from 0.0 to 100.0
RFS7000(config)#show access-banner
Attention:
This is a protected and private wireless system. No un-authorized access allowed.
You must have proper rights to access and manage this system from the authorized
personnel.
RFS7000(config)#
no debug certmgr ( error|info|all )
no debug certmgr ( error|info|all )
no debug certmgr ( error|info|all )
no debug ip https
no debug ip ssh
no debug mstp all
no debug mstp cli
no debug mstp packet rx
no debug mstp packet tx
no debug mstp protocol
no debug mstp protocol detail
no debug mstp timer
no debug mstp timer detail
no page
no service diag enable
no service diag period
no service diag watchdog
no service locator
p
page
(exit|logout|quit)
show autoinstall
show autoinstall status
show banner motd
show commands
show debugging
show debugging mstp
show environment
show history
show crypto ipsec(sa|security-association(lifetime)|transformset)
show crypto isakmp(policy(<1-10000>)|sa)
show crypto key(mypubkey)(rsa)
show crypto map(interface|tag)
show crypto pki(request|trustpoints)
• mypubkey – Show public keys assoicated with the switch.
• rsa – Displays Rsa public keys
Displays crypto maps.
• interface (name) – Crypto maps for an interface.
• tag (name) – Crypto maps with a given tag
Displays Public Key Infrastructure (PKI) commands.
• request (name) – Displays certificate request.
• trustpoints (name) – Displays trustpoints configured and configuration.
Security engine periodically updates the IPSec and Isakamp statistics for every 60 seconds.
Example
RFS7000(config)#show crypto pki trustpoints
Trustpoint :default-trustpoint
-----------------------------------------------
Server certificate configured
Subject Name:
Common Name: Motorola
Organizational Unit: EWLAN
Organization: Enterprise Mobility
Location: San Jose
State: CA
Country: US
RFS7000(config)#show crypto ipsec sa | ?
append Append output
begin Begin with the line that matches
exclude Exclude lines that match
include Include lines that match
redirect Redirect output
RFS7000(config)#show crypto ipsec sa | append ?
FILE Output file name
RFS7000(config)#show crypto ipsec sa | append FILE ?
<cr>
RFS7000(config)#show crypto ipsec sa | append FILE
RFS7000(config)#show crypto-error-log | ?
append Append output
begin Begin with the line that matches
exclude Exclude lines that match
include Include lines that match
redirect Redirect output
RFS7000(config)#show crypto-error-log | append ?
FILE Output file name
RFS7000(config)#show cryptocrypto-error-log crypto-log
RFS7000(config)#show crypto-log
Sat Jan 12 05:14:34 2008 FIPS self test started this can take some time
Sat Jan 12 05:15:20 2008 FIPS integrity check of the WIOS image successful
Sat Jan 12 05:15:20 2008 FIPS data integrity check is successful
Sat Jan 12 05:15:20 2008 FIPS Power-up tests for openSSL library
Sat Jan 12 05:15:21 2008 1. Automatic power-up self test includes RNG, HMAC,
AES, 3DES, RSA, DSA selftests...Successful
Sat Jan 12 05:15:21 2008 2. AES encryption/decryption...Successful
Sat Jan 12 05:15:23 2008 3. RSA key generation and
encryption/decryption...successful
Sat Jan 12 05:15:23 2008 4. 3DES-ECB encryption/decryption...successful
Sat Jan 12 05:15:24 2008 5. DSA key generation and signature
validation...successful
Sat Jan 12 05:15:24 2008 6a. SHA-1 hash...successful
Sat Jan 12 05:15:24 2008 6b. SHA-256 hash...successful
Sat Jan 12 05:15:24 2008 6c. SHA-512 hash...successful
Sat Jan 12 05:15:24 2008 6d. HMAC-SHA-1 hash...successful
Sat Jan 12 05:15:24 2008 6e. HMAC-SHA-224 hash...successful
Sat Jan 12 05:15:24 2008 6f. HMAC-SHA-256 hash...successful
Sat Jan 12 05:15:24 2008 6g. HMAC-SHA-384 hash...successful
Sat Jan 12 05:15:24 2008 6h. HMAC-SHA-512 hash...successful
Sat Jan 12 05:15:24 2008 The tests completed without errors
Sat Jan 12 05:15:24 2008 openSSL Power-up self test successful
Sat Jan 12 05:15:24 2008 FIPS Power-up tests for quickSec library
Sat Jan 12 05:15:24 2008 quickSec Power-up self test successful
Sat Jan 12 05:15:24 2008 FIPS Power-up tests for Wireless Crypto library
Sat Jan 12 05:15:24 2008 Wireless crypto Power-up self test for AES-CBC
successful.
Sat Jan 12 05:15:24 2008 wireless crypto Power-up self test successful
RFS7000(config)#show environment
upwind of CPU temperature : 30.0 C
CPU die temperature : 49.0 C
left side temperature : 31.0 C
by FPGA temperature : 28.0 C
front right temperature : 26.0 C
front left temperature : 27.0 C
fan 1 fan : 6600 rpm
fan 2 fan : 6840 rpm
fan 3 fan : 6540 rpm
RFS7000(config)#
RFS7000>show environment
upwind of CPU temperature : 30.0 C
CPU die temperature : 53.0 C
left side temperature : 30.0 C
by FPGA temperature : 29.0 C
front right temperature : 27.0 C
front left temperature : 27.0 C
fan 1 fan : 6540 rpm
fan 2 fan : 6660 rpm
fan 3 fan : 6420 rpm
RFS7000>
RFS7000>show history
Warning: This will display secure information.Do you want to proceed? (y/n): y
1 admin
2 en
3 con ter
4 show crypto-log | include LINE redirect > exit
5 show environment
6 show history
7 en
8 dis
9 show history
RFS7000>
RFS7000>show history
1 show
2 clrscr
3 enable
4 clrscr
5 configure terminal
6 exit
1. It has been noted the interface and VLAN status is displayed as UP despite of a disconnection.
In such a case, shutdown the VLAN. Follow these steps:
a. Check the status of the interface and VLAN:
RFS7000(config)#show ip interface brief
b. Interface IP-Address/Mask Status Protocol
c.me1 10.1.1.100/24 up down
d. vlan1 unassigned up up
e. vlan10 172.16.10.1/24 up up
f.RFS7000(config)#
g. RFS7000(config)#show ip interface brief
Interface IP-Address Status Protocol
vlan1 157.235.208.69(DHCP) up up
vlan3 unassigned up up
RFS7000(config)#
h. If the stauts of the VLAN is UP (even if interfaces are diconnected), shutdown the VLAN
associated with fe1:
RFS7000(config)*#show ip interface brief
Interface IP-Address/Mask Status Protocol
fe 157.235.208.122/24(DHCP) up up
vlan1 unassigned(DHCP) up up
vlan200 unassigned up up
RFS7000(config)*#shutdown
i.Check the status and note if the VLAN has been disassociated. Its status has now changed
to DOWN.
RFS7000(config)#show ip interface brief
Interface IP-Address Status Protocol
vlan1 157.235.208.69(DHCP) up up
vlan3 unassigned administratively down down
RFS7000(config)#
2. The above instance may occur when a DHCP interface is disconnected. DHCP is not effected
because it runs on a virtual interface and not on the physical interface. In this case, it is the
physical interface that is disconnected not the virtual interface.
When the Ethernet interface comes back up, it restarts the DHCP client on any of the virtual
interfaces (SVIs) in which the physical interface is a member port. This ensures (if the interface
was disconnected and reconnected to a different interface), it gets a new ip address, route,
name server, domain name etc. corresponding to the new DHCP server/ scope.
Standard IP access list 20
mark 8021p 5 any rule-precedence 10
RFS7000(config)#
RFS7000(config)# show ip access-list
Standard IP access list 1
permit 172.16.10.10/24 rule-precedence 10
RFS7000(config)#
RFS7000#showip dhcp binding
IP MAC/Client-Id Type Expiry Time
-- ------------- ---- -----------
RFS7000(config)#show ip dhcp binding
IP MAC/Client-Id Type Expiry Time
-- ------------- ---- -----------
RFS7000(config)#
RFS7000#showip dhcp pool
!
ip dhcp pool pl
!
ip dhcp pool pool1
domain-name test.com
bootfile 123
network 10.10.10.0/24
address range 10.10.10.2 10.10.10.30
!
ip dhcp pool poo110
next-server 1.1.1.1
netbios-node-type b-node
show
2
RFS7000#show ip dhcp-vendor-options
Server Info:
Firmware Image File:
Config File:
Cluster Config File:
RFS7000#show ip domain-name
IP domain-lookup : Enable
Domain Name : Brocade.com
RFS7000#show ip http server
HTTP server: Running
Config status: Enabled
S 1.1.0.0/16 [1/0] via 1.1.1.1 inactive
S 1.1.1.0/24 [1/0] via 1.1.1.2 inactive
S 10.0.0.0/8 [1/0] via 10.10.10.10 inactive
S 157.235.208.0/24 [1/0] via 157.235.208.246 inactive
RFS7000(config-radsrv)#show ldap configuration
LDAP Server Config Details
__________________________
Primary LDAP Server configuration
IP Address : 10.10.10.1
Port : 369
Login :
(sAMAccountName=%{Stripped-User-Name:-%{User-Name}})
Bind DN : cn=kumar,ou=Brocade,dc=activedirectory,dc=com
Base DN : ou=Brocade,dc=activedirectory,dc=com
Password : 0 Brocade@123
Password Attribute : UserPassword
Group Name : cn
Group Membership Filter: (&(objectClass=group)(member=%{Ldap-UserDn}))
Group Member Attr : radiusGroupName
Net timeout : 1 second(s)
Secondary LDAP
IP Address : 10.10.10.5
Port : 369
Login :
(sAMAccountName=%{Stripped-User-Name:-%{User-Name}})
Bind DN : cn=kumar,ou=Brocade,dc=activedirectory,dc=com
Base DN : ou=Brocade,dc=activedirectory,dc=com
Password : 0 Brocade@123
Password Attribute : UserPassword
Group Name : cn
Group Membership Filter: (&(objectClass=group)(member=%{Ldap-UserDn}))
Group Member Attr : radiusGroupName
Net timeout : 1 second(s)
show mobility [event-log|forwarding|global|mobile-unit|peer|statistics]
show mobility event-log [mobile-unit|peer]
show mobility forwarding (AA-BB-CC-DD-EE-FF)
show mobility mobile-unit [<AA-BB-CC-DD-EE-FF>|detail]
show mobility peer [<A.B.C.D>|detail]
show mobility statistics <AA-BB-CC-DD-EE-FF>
Parameters
event-log
Displays mobility event logs .
• mobile-unit – MU event logs.
• peer – Peer event logs.
forwarding
Mobile units in the forwarding plane.
• AA-BB-CC-DD-EE-FF – MAC address of the mobile unit.
global
mobile-unit
Global mobility parameters.
Mobile units in the mobility database.
• AA-BB-CC-DD-EE-FF – MAC address of the mobile unit.
• detail – Displays detailed information.
peer
Mobility peers.
• A.B.C.D – IP address of Peer.
• detail – Displays detailed information.
statistics
Mobility statistics.
• AA-BB-CC-DD-EE-FF – MAC address of the mobile unit.
Example
RFS7000(config)#show mobility ?
event-log Event Log
forwarding Mobile-unit information in the forwarding plane
global Global Mobility parameters
mobile-unit Mobile-units in the Mobility Database
peer Mobility peers
statistics Mobile-unit Statistics
RFS7000(config)#show mobility global
Mobility Global Parameters
Admin Status : DISABLED
Operational-Status : DISABLED (Admin-status is DISABLED)
Local Address : 0.0.0.0
Port Number : 58788
Max Roam Period : 5 sec
Number of Peers : 0 (established=0)
Number of MUs : 0 (Home=0, Foreign=0, Fwding-plane=0,
Delete-pend=0)
L3-Mobility enabled WLANs : NONE
RFS7000(config)#
RFS7000(config)#show mobility event-log mobile-unit
Time Event Evt-Src-IP MU-Mac MU-IP
RFS7000(config)#show ntp status
Clock is synchronized, stratum 0, actual frequency is 0.0000 Hz, precision is 2^0
reference time is 00000000.00000000 (Feb 07 06:28:16 UTC 2036)
clock offset is 0.000 msec, root delay is 0.000 msec
root dispersion is 0.000 msec,
RFS7000(config)#
RFS7000(config)#show ntp status
Clock is unsynchronized, stratum 16, reference is INIT
actual frequency is 0.0000 Hz, precision is 2**-20
reference time is 00000000.00000000 (Feb 07 06:28:16 UTC 2036)
clock offset is 0.000 msec, root delay is 0.000 msec
root dispersion is 1395.000 msec,
This command displays the switch’s IP address, number of active neighbors, group license,
installed license, cluster AP adoption count, switch adoption count, hold time, discovery time,
heartbeat interval, cluster id, switch mode etc.
In a cluster, this command displays the redundancy runtime and configured information of the
self-switch. Use
parameter to view runtime information.
Syntax
show redundancy-group [dynamic-ap-load-balance (config)|group
(config|runtime)|history|member|] config|runtime]
Parameters
config parameter to view only configuration information and/or runtime
dynamic-ap-load-balance
config
config
group
config
runtime
history
members
A.B.C.D
brief
runtime
Displays redundancy group information.Display redundancy dynamic AP load
balance parameters
Display configuration details for dynamic AP Load Balance
Display redundancy group parameters
Display configured redundancy group information.
Display runtime redundancy group information.
Display state transition history of the switch.
Display redundancy group members in detail
IP address of member switch
Display members in brief
Displays runtime redundancy group information.
Example
RFS7000(config)#show redundancy members brief
Member ID (Self) : 0.0.0.0
Member State : Not Applicable
RFS7000(config)#
Per AP MU Threshold : 32
RFS7000(config)#
RFS7000(config)#show redundancy-group
Redundancy Group Configuration Detail
Redundancy Feature : Disabled
Redundancy group ID : 1
Redundancy Mode : Standby
Redundancy Interface IP : 0.0.0.0
Number of configured peer(s) : 0
Heartbeat-period : 5 Seconds
Hold-period : 15 Seconds
Discovery-period : 30 Seconds
Handle STP : Disabled
Switch Installed License : 256
Switch running image version : 1.1.0.0-36536X
Auto-revert-period : 5 mins
Auto-revert Feature : Enabled
DHCP-Server Redundancy : Disabled
Redundancy Group Runtime Information
Redundancy Protocol Version : 2.0
Redundancy Group License : 0
Cluster AP Adoption Count : Not Applicable
Switch AP Adoption Count : Not Applicable
Redundancy State : Disabled
Radio Portals adopted by Group : Not Applicable
Radio Portals adopted by this Switch : Not Applicable
Rogue APs detected in this Group : Not Applicable
Rogue APs detected by this Switch : Not Applicable
MUs associated in this Group : Not Applicable
MUs associated in this Switch : Not Applicable
Selfhealing RPs in this Group : Not Applicable
Selfhealing APs in this Switch : Not Applicable
Group maximum AP adoption capacity : Not Applicable
Switch Adoption capacity : Not Applicable
Established Peer(s) Count : Not Applicable
Redundancy Group Connectivity status : Not Applicable
DHCP Server in group : Not Applicable
show
2
RFS7000(config)#
RFS7000(config)#show redundancy-group config
Redundancy Group Configuration Detail
Redundancy Feature : Disabled
Redundancy group ID : 1
Redundancy Mode : Primary
Redundancy Interface IP : 0.0.0.0
Number of configured peer(s) : 0
Heartbeat-period : 5 Seconds
Hold-period : 15 Seconds
Discovery-period : 30 Seconds
Handle STP : Disabled
Switch Installed License : 256
Switch running image version : 1.1.0.0-36536X
Auto-revert-period : 5 mins
Auto-revert Feature : Disabled
DHCP-Server Redundancy : Disabled
Redundancy Group Runtime Information
Redundancy Protocol Version : 2.0
Redundancy Group License : 0
Cluster AP Adoption Count : Not Applicable
Switch AP Adoption Count : Not Applicable
Redundancy State : Disabled
Radio Portals adopted by Group : Not Applicable
Radio Portals adopted by this Switch : Not Applicable
Rogue APs detected in this Group : Not Applicable
Rogue APs detected by this Switch : Not Applicable
MUs associated in this Group : Not Applicable
MUs associated in this Switch : Not Applicable
Selfhealing RPs in this Group : Not Applicable
Selfhealing APs in this Switch : Not Applicable
Group maximum AP adoption capacity : Not Applicable
Switch Adoption capacity : Not Applicable
Established Peer(s) Count : Not Applicable
Redundancy Group Connectivity status : Not Applicable
DHCP Server in group : Not Applicable
This command displays the history of the state transition by the Brocade Mobility RFS7000-GR
Controller. In a cluster, this command displays the history of the switch state transitions of the
self-switch.
Syntax
show redundancy-history
Parameters
None.
Example
RFS7000(config)#show redundancy-history
State Transition History
This command displays the switches in the cluster which are all seen by the Brocade Mobility
RFS7000-GR Controller. The user can provide the IP address of the switch in cluster whose
information alone is needed.
Syntax
show redundancy-members (A.B.C.D|brief)
Parameters
A.B.C.D
brief
IP address of the member switch.
Displays members in brief.
Example
RFS7000(config)#show redundancy-members brief
Member ID (Self) : 10.10.10.10
Member State : Not Applicable
Member ID : 10.10.10.1
Member State : Peer Configured
RFS7000(config)#show version
RFS7000 version 4.1.0.0-040GR
Copyright (c) 2006-2009 Motorola, Inc.
Booted from secondary.
Switch uptime is 7 days, 0 hours 33 minutes
CPU is RMI XLR V0.4
255484 kB of on-board RAM
RFS7000(config)#
RFS7000(config)#show version
RFS7000 version 4.1.0.0-040GR MIB=01a
Copyright (c) 2010 Motorola Inc.
Booted from primary.
show
2
Switch uptime is 0 days, 5 hours 50 minutes
CPU is RMI Phoenix V0.4
255188 kB of on-board RAM
RFS7000(config)#
RFS7000(config)#show version verbose
RFS7000(config)#show version verbose
RFS7000 version 4.1.0.0-040GR
Copyright (c) 2010 Motorola Inc.
Booted from secondary.
Switch uptime is 7 days, 0 hours 32 minutes
CPU is RMI XLR V0.4
PCI bus 0 device 3 function 2
USB Controller
unknown mfg
unknown
PCI bus 0 device 3 function 1
USB Controller
unknown mfg
unknown
PCI bus 0 device 3 function 0
USB Controller
unknown mfg
unknown
PCI bus 0 device 1 function 0
Ethernet controller
unknown mfg
unknown
255484 kB of on-board RAM
RFS7000(config)#
RFS7000 version 4.1.0.0-040GR MIB=01a
Copyright (c) 2010 Brocade, Inc.
Booted from primary.
Switch uptime is 0 days, 11 hours 53 minutes
CPU is RMI Phoenix V0.4
PCI bus 0 device 3 function 2
USB Controller
unknown mfg
unknown
PCI bus 0 device 3 function 1
USB Controller
unknown mfg
unknown
PCI bus 0 device 3 function 0
USB Controller
unknown mfg
unknown
PCI bus 0 device 1 function 0
Ethernet controller
unknown mfg
unknown
255188 kB of on-board RAM
RFS7000(config)#