Brocade, the B-wing symbol, BigIron, DCX, Fabric OS, FastIron, IronPoint, IronShield, IronView, IronWare, JetCore, NetIron,
SecureIron, ServerIron, StorageX, and TurboIron are registered trademarks, and DCFM, Extraordinary Networks, and SAN Health
are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. All other brands,
products, or service names are or may be trademarks or service marks of, and are used to identify, products or services of their
respective owners.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning
any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to
this document at any time, without notice, and assumes no responsibility for its use. This informational document describes
features that may not be currently available. Contact a Brocade sales office for information on feature and product availability.
Export of technical data contained in this document may require an export license from the United States government.
The authors and Brocade Communications Systems, Inc. shall have no liability or responsibility to any person or entity with
respect to any loss, cost, liability, or damages arising from the information contained in this book or the computer programs that
accompany it.
The product described by this document may contain “open source” software covered by the GNU General Public License or other
open source license agreements. To find out which open source software is included in Brocade products, view the licensing
terms applicable to the open source software, and obtain a copy of the programming source code, please visit
http://www.brocade.com/support/oscd.
Brocade Communications Systems, Incorporated
Corporate and Latin American Headquarters
Brocade Communications Systems, Inc.
1745 Technology Drive
San Jose, CA 95110
Tel: 1-408-333-8000
Fax: 1-408-333-8101
E-mail: info@brocade.com
European Headquarters
Brocade Communications Switzerland Sàrl
Centre Swissair
Tour B - 4ème étage
29, Route de l'Aéroport
Case Postale 105
CH-1215 Genève 15
Switzerland
Tel: +41 22 799 5640
Fax: +41 22 799 5641
E-mail: emea-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems China HK, Ltd.
No. 1 Guanghua Road
Chao Yang District
Units 2718 and 2818
Beijing 100020, China
Tel: +8610 6588 8888
Fax: +8610 6588 9999
E-mail: china-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems Co., Ltd. (Shenzhen WFOE)
Citic Plaza
No. 233 Tian He Road North
Unit 1308 – 13th Floor
Guangzhou, China
Tel: +8620 3891 2000
Fax: +8620 3891 2111
E-mail: china-info@brocade.com
commands used to monitor and collect long-term statistics.
• Chapter 12, “QoS Commands” describes the commands used to enable Quality of Service on
the device.
• Chapter 13, “Port Authentication Commands” describes the 802.1x port authentication
configuration commands.
Supported hardware and software
This document includes updated information specific to Fabric OS 6.4.0. The following hardware
platforms are supported in this release:
• Brocade 300
• Brocade 4100
• Brocade 4900
• Brocade 5000
• Brocade 5100
• Brocade 5300
• Brocade 5410
• Brocade 5424
• Brocade 5450
• Brocade 5480
• Brocade 7500
• Brocade 7500E
• Brocade 7600
• Brocade 7800
• Brocade 8000
• Brocade Encryption Switch
• Brocade VA-40FC
• Brocade 48000
• Brocade DCX
• Brocade DCX-4S
Within this manual, any appearance of the term “Brocade FCoE hardware” is referring to:
• Brocade 8000
• Brocade FCOE10-24 port blade
Although many different software and hardware configurations are tested and supported by
Brocade Communications Systems, Inc. for Fabric OS 6.4.0, documenting all possible
configurations and scenarios is beyond the scope of this document.
To obtain information about an OS version other than 6.4.0, refer to the documentation specific to
that OS version.
xiiConverged Enhanced Ethernet Command Reference
53-1001762-01
DRAFT: BROCADE CONFIDENTIAL
What’s new in this document
This document has been updated for 6.4.0.
New commands have been added for:
• Internet Group Management Protocol
For further information about new features and documentation updates for this release, refer to
the release notes.
Document conventions
This section describes text formatting conventions and important notice formats used in this
document.
Text formatting
The narrative-text formatting conventions that are used are as follows:
bold textIdentifies command names
Identifies the names of user-manipulated GUI elements
Identifies keywords and operands
Identifies text to enter at the GUI or CLI
italic textProvides emphasis
Identifies variables
Identifies paths and Internet addresses
Identifies document titles
code textIdentifies CLI output
Identifies command syntax examples
For readability, command names in the narrative portions of this guide are presented in mixed
lettercase: for example, switchShow. In actual examples, command lettercase is all lowercase.
.
Command syntax conventions
Command syntax in this manual follows these conventions:
TABLE 1Command syntax conventions
ConventionDescription
bold face font Commands and keywords.
italicVariables for which you supply values.
[ ]Keywords or arguments that appear within square brackets are
optional.
{x | y | z} A choice of required keywords appears in braces separated by vertical
bars. You must select one.
screen fontExamples of information displayed on the screen.
<>Nonprinting characters, for example passwords, appear in angle
brackets
[ ]Default responses to system prompts appear in square brackets.
Notes, cautions, and warnings
The following notices and statements are used in this manual. They are listed below in order of
increasing severity of potential hazards.
A note provides a tip, guidance, or advice, emphasizes important information, or provides a
reference to related information.
An Attention statement indicates potential damage to hardware or data.
A Caution statement alerts you to situations that can be potentially hazardous to you or cause
damage to hardware, firmware, software, or data.
A Danger statement indicates conditions or situations that can be potentially lethal or extremely
hazardous to you. Safety labels are also attached directly to products to warn of these conditions
or situations.
Key terms
For definitions specific to Brocade and Fibre Channel, see the technical glossaries on Brocade
Connect. See “Brocade resources” on page xv for instructions on accessing Brocade Connect.
Notice to the reader
This document may contain references to the trademarks of the following corporations. These
trademarks are the properties of their respective companies and corporations.
These references are made for informational purposes only.
CorporationReferenced Trademarks and Products
Microsoft CorporationWindows, Windows NT, Internet Explorer
Oracle CorporationOracle, Java
xivConverged Enhanced Ethernet Command Reference
53-1001762-01
CorporationReferenced Trademarks and Products
Netscape Communications CorporationNetscape
Red Hat, Inc.Red Hat, Red Hat Network, Maximum RPM, Linux Undercover
Additional information
This section lists additional Brocade and industry-specific documentation that you might find
helpful.
Brocade resources
To get up-to-the-minute information, go to http://my.brocade.com and register at no cost for a user
ID and password.
White papers, online demonstrations, and data sheets are available through the Brocade website
at:
For additional Brocade documentation, visit the Brocade website:
http://www.brocade.com
Release notes are available on the Brocade Connect website and are also bundled with the Fabric
OS firmware.
Other industry resources
White papers, online demonstrations, and data sheets are available through the Brocade website
at http://www.brocade.com/products/software.jhtml.
• Best practice guides, white papers, data sheets, and other documentation is available through
the Brocade Partner website.
For additional resource information, visit the Technical Committee T11 website. This website
provides interface standards for high-performance and mass storage applications for Fibre
Channel, storage management, and other applications:
http://www.t11.org
For information about the Fibre Channel industry, visit the Fibre Channel Industry Association
website:
Contact your switch support supplier for hardware, firmware, and software support, including
product repairs and part ordering. To expedite your call, have the following information available:
1. General Information
• Switch model
• Switch operating system version
• Error numbers and messages received
• supportSave command output
• Detailed description of the problem, including the switch or fabric behavior immediately
following the problem, and specific questions
• Description of any troubleshooting steps already performed and the results
• Serial console and Telnet session logs
• syslog message logs
DRAFT: BROCADE CONFIDENTIAL
2. Switch Serial Number
The switch serial number and corresponding bar code are provided on the serial number label,
as illustrated below:
Encryption Switch—On the switch ID pull-out tab located inside the chassis on the port side
on the left
• Brocade 5000—On the switch ID pull-out tab located on the bottom of the port side of the
switch
• Brocade 7600—On the bottom of the chassis
• Brocade 48000—Inside the chassis next to the power supply bays
• Brocade DCX—On the bottom right on the port side of the chassis
• Brocade DCX-4S—On the bottom right on the port side of the chassis, directly above the
cable management comb
3. World Wide Name (WWN)
Use the licenseIdShow command to display the WWN of the chassis.
If you cannot use the licenseIdShow command because the switch is inoperable, you can get
the WWN from the same place as the serial number, except for the Brocade DCX. For the
Brocade DCX, access the numbers on the WWN cards by removing the Brocade logo plate at
the top of the nonport side of the chassis.
xviConverged Enhanced Ethernet Command Reference
53-1001762-01
Document feedback
Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and
completeness of this document. However, if you find an error or an omission, or you think that a
topic needs further development, we want to hear from you. Forward your feedback to:
documentation@brocade.com
Provide the title and version number of the document and as much detail as possible about your
comment, including the topic heading and page number and your suggestions for improvement.
After you log on to the switch, you can access the commands through a serial terminal port or a
Telnet session. When you Telnet into the switch, you are prompted to enter a login name and
password. When you log on to a switch supporting CEE, all of the 10 Gbps ports are disabled and
must be enabled. Refer to the Fibre Channel over Ethernet Administrator’s Guide for information
regarding feature configuration and management procedures.
Following is an example of logging in to a switch supporting FCoE and CEE.
1
telnet 10.32.152.21
switch login: admin
Password:xxxxxx
switch cmsh – cmsh takes you to the CEE Brocade8000 CLI prompt.
switch>
CLI command modes
Following are the main command modes for the Brocade FCoE hardware:
• EXEC
• Privileged EXEC
• Global configuration
• Interface configuration
• Feature configuration
• CEE map: switch (config-ceemap)
• Standard ACL: switch (conf-macl-std)
• Extended ACL: switch (conf-macl-ext)
• Console and VTY (line) configuration
Tab le 2 lists the main command modes, how to access each mode, the prompt you see in that
mode, and how to exit that mode. The prompts listed use the default name switch.
From the global configuration mode,
specify a protocol by entering one of
the following protocol types:
• protocol lldp
• protocol spanning-tree mstp
• protocol spanning-tree rstp
• protocol spanning-tree stp
From the global configuration mode,
specify a CEE feature by entering
one of the following feature names:
• cee-map
• mac access-list
Display running system information
and set terminal line parameters.
This is the administrative mode
which also includes EXEC mode
commands and allows you to display
and change system parameters.
Configure features that affect the
entire switch.
Access and configure individual
interfaces.
Access and configure protocols.
Access and configure CEE features.
Extended ACL:
switch (conf-macl-ext)#
Console and
VTY (line)
configuration
2Converged Enhanced Ethernet Command Reference
switch (config-line)#From the global configuration mode,
configure a terminal connected
through the console port by entering
the line console command.
Configure a terminal connected
through a Telnet session by entering
the line vty command.
Configure a terminal connected
through the console port or a
terminal connected through a Telnet
session.
53-1001762-01
DRAFT: BROCADE CONFIDENTIAL
L2 ACL commands
Use Layer 2 Media Access Control (MAC) list commands to do the following:
• Identify traffic based on the MAC-addresses, such as VLAN IDs and different encapsulations.
• Configure multiple access-lists or rules and store them in a configuration.
• After you apply the access list either to an interface, a Virtual TeletYpe (VTY), or through a
command using the access-list keyword, it becomes effective.
Following are the two types of access list commands:
• Standard Access Control Lists
Standard Access Control Lists filter the traffic on a source address and block traffic close to a
destination. There are exceptions when the address in a standard access list is not a source
address. When using a Telnet session, for outbound VTY access lists, the address in the
access list entry is used as a destination address instead of a source address.
• Extended Access Control Lists
Extended Access Lists block traffic based on any given packet attribute. Use Extended access
control lists to test source and destination addresses and other IP packet data, such as
protocols, TCP or UDP port numbers, type of service and to provide Reflective access-lists and
Time-based access-lists.capabilities.
DescriptionUse this command to list the contents of the current directory.
Usage
Guidelines
ExamplesTo list the contents of the current directory:
See Alsodelete
Privileged EXEC mode
There are no usage guidelines for this command.
switch#dir
Contents of flash://
-rw-r----- 1276 Wed Feb 4 07:08:49 2009 startup_rmon_config
-rw-r----- 1276 Wed Feb 4 07:10:30 2009 rmon_config
-rw-r----- 1276 Wed Feb 4 07:12:33 2009 rmon_configuration
-rw-r----- 1276 Wed Feb 4 10:18:15 2009 starup-config
8Converged Enhanced Ethernet Command Reference
53-1001762-01
DRAFT: BROCADE CONFIDENTIAL
disable
Exits the Privileged EXEC mode and returns to the EXEC mode.
Synopsisdisable
Operandsnone
DefaultsThere are no default configurations for this command.
Command
Modes
DescriptionUse this command to exit the Privileged EXEC mode and return to the EXEC mode.
Usage
Guidelines
ExamplesTo return to the EXEC mode:
Privileged EXEC mode
This is the only command that allows you to return to the EXEC mode. Using the exit or quit
commands from the Privileged EXEC mode ends the session instead of returning to the EXEC
mode.
Allows you to run commands in EXEC mode from the configuration mode.
Synopsisdo command
OperandscommandSpecifies the command you want to run.
DefaultsThere are no default configurations for this command.
Command
All configuration modes
Modes
DescriptionUse this command to save time when you are configuring the switch in any configuration mode and
you want to run a command in the Privileged EXEC mode.
Usage
There are no usage guidelines for this command.
Guidelines
ExamplesTo r un the clear counters all command with the do command:
switch(config)#do clear counters all
switch(config)#
To display the contents from the working directory using the do command:
switch(config)#do dir
Contents of flash://
-rw-r----- 1276 Wed Feb 4 07:08:49 2009 startup_rmon_config
-rw-r----- 1276 Wed Feb 4 07:10:30 2009 rmon_config
-rw-r----- 1276 Wed Feb 4 07:12:33 2009 rmon_configuration
-rw-r----- 1276 Wed Feb 4 10:48:59 2009 starup-config
switch(config)#
See Alsonone
10Converged Enhanced Ethernet Command Reference
53-1001762-01
DRAFT: BROCADE CONFIDENTIAL
enable
Enables the Privilege EXEC mode.
Synopsisenable
Operandsnone
DefaultsThere are no default configurations for this command.
Command
Modes
DescriptionUse this command to enable the Privileged EXEC command mode.
Usage
Guidelines
ExamplesTo enable the Privileged EXEC mode:
EXEC mode
To return to the EXEC mode from Privileged EXEC mode, use the disable command. Using the exit
or quit command from the Privileged EXEC mode ends the session.