SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide1
show interfaces access-lists62
Chapter 4: ARP Inspection Commands 64
ip arp inspection64
ip arp inspection vlan65
ip arp inspection trust66
ip arp inspection validate67
ip arp inspection list create68
ip mac69
ip arp inspection list assign70
ip arp inspection logging interval71
show ip arp inspection72
Contents
show ip arp inspection list73
Chapter 5: Address Table Commands 75
bridge address75
bridge multicast filtering76
bridge multicast address77
bridge multicast forbidden address79
bridge multicast forward-all80
bridge multicast forbidden forward-all82
bridge aging time83
clear bridge84
port security85
port security mode86
port security max87
show bridge address-table88
show bridge address-table static89
show bridge address-table count91
show bridge multicast address-table92
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide2
show bridge multicast address-table static94
show bridge multicast filtering95
show ports security96
show ports security addresses98
Chapter 6: Clock Commands 100
clock set100
clock source101
clock timezone102
clock summer-time103
sntp authentication-key105
sntp authenticate106
Contents
sntp port107
sntp trusted-key108
sntp client poll timer109
sntp broadcast client enable110
sntp anycast client enable111
sntp client enable112
sntp client enable (Interface)113
sntp unicast client enable114
sntp unicast client poll115
sntp server116
show clock117
show sntp configuration119
show sntp status120
Chapter 7: Configuration and Image File Commands 122
copy122
delete startup-config125
show running-config126
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide3
show startup-config127
Chapter 8: DHCP Commands 129
ip dhcp snooping129
ip dhcp snooping vlan130
ip dhcp snooping trust131
ip dhcp information option allowed-untrusted132
ip dhcp snooping verify133
ip dhcp snooping database134
ip dhcp snooping database update-freq135
ip dhcp snooping binding136
clear ip dhcp snooping database137
Contents
show ip dhcp snooping138
show ip dhcp snooping binding139
Chapter 9: DHCP Relay Commands 141
ip dhcp relay enable (global)141
ip dhcp relay enable (interface)142
ip dhcp relay address143
show ip dhcp relay144
Chapter 10: DHCP Option 82 Commands 145
ip dhcp information option145
show ip dhcp information option146
Chapter 11: DHCP Auto-configuration 147
ip dhcp autoconfig147
ip dhcp autoconfig file148
show ip dhcp autoconfig149
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide4
Chapter 12: Ethernet Configuration Commands 150
interface ethernet150
interface range ethernet151
shutdown152
description153
speed154
duplex155
negotiation156
port jumbo-frame157
show system flowcontrol158
flowcontrol159
mdix160
Contents
back-pressure161
port jumbo-frame162
sfp speed163
clear counters164
set interface active165
show interfaces configuration166
show interfaces status167
show interfaces advertise169
show interfaces description170
show interfaces counters171
show ports jumbo-frame174
port storm-control broadcast enable175
port storm-control broadcast rate176
port storm-control include-multicast177
port storm-control unknown-unicast fastethernet enable178
port storm-control unknown-unicast fastethernet rate179
show ports storm-control180
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide5
Chapter 13: GVRP Commands 182
Contents
gvrp enable (Global)182
gvrp enable (Interface)183
garp timer184
gvrp vlan-creation-forbid185
gvrp registration-forbid186
clear gvrp statistics187
show gvrp configuration188
show gvrp statistics189
show gvrp error-statistics190
Chapter 14: IGMP Snooping Commands 192
ip igmp snooping (global)192
ip igmp snooping (Interface)193
ip igmp snooping mrouter194
ip igmp snooping querier enable195
ip igmp snooping host-time-out196
ip igmp snooping mrouter-time-out197
ip igmp snooping leave-time-out198
ip igmp snooping multicast-tv199
ip igmp snooping map cpe vlan200
show ip igmp snooping mrouter201
show ip igmp snooping interface202
show ip igmp snooping groups203
show ip igmp snooping multicast-tv205
show ip igmp snooping cpe vlans206
Chapter 15: IP Address Commands 208
ip address208
ip address dhcp209
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide6
Contents
renew dhcp211
ip default-gateway212
show ip interface213
arp214
arp timeout215
clear arp-cache216
show arp217
ip domain-lookup218
ip domain-name219
ip name-server220
ip host221
clear host222
clear host dhcp223
show hosts224
Chapter 16: IP Source Guard Commands 226
ip source-guard (global)226
ip source-guard (interface)227
ip source-guard binding228
ip source-guard tcam retries-freq229
show ip source-guard configuration230
show ip source-guard status231
show ip source-guard inactive233
Chapter 17: LACP Commands 235
lacp system-priority235
lacp port-priority236
lacp timeout237
show lacp ethernet238
show lacp port-channel240
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide7
Chapter 18: Line Commands 242
Contents
line242
speed243
exec-timeout244
show line245
Chapter 19: Management ACL Commands 247
management access-list247
management access-class248
permit (management)249
deny (management)251
show management access-list252
show management access-class253
Chapter 20: PHY Diagnostics Commands 254
test copper-port tdr254
show copper-ports tdr255
show copper-ports cable-length256
show fiber-ports optical-transceiver257
Chapter 21: Port Channel Commands 260
interface port-channel260
interface range port-channel261
channel-group262
show interfaces port-channel263
Chapter 22: Port Monitor Commands 265
port monitor265
show ports monitor266
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide8
Chapter 23: QoS Commands 268
qos268
show qos269
class-map270
show class-map271
match272
policy-map273
class274
show policy-map276
trust277
set279
police280
Contents
qos aggregate-policer281
show qos aggregate-policer283
police aggregate284
wrr-queue bandwidth285
wrr-queue cos-map286
priority-queue out num-of-queues288
traffic-shape289
rate-limit (Ethernet)290
show qos interface291
qos wrr-queue threshold293
qos map policed-dscp295
qos map dscp-queue296
qos map dscp-dp297
qos trust (Global)298
qos trust (Interface)299
qos cos300
qos dscp-mutation301
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide9
qos map dscp-mutation302
show qos map303
Chapter 24: RADIUS Commands 306
Contents
radius-server host306
radius-server key308
radius-server retransmit309
radius-server source-ip310
radius-server timeout311
radius-server deadtime312
show radius-servers313
Chapter 25: RMON Commands 314
show rmon statistics314
rmon collection history317
show rmon collection history318
show rmon history319
rmon alarm323
show rmon alarm-table325
show rmon alarm326
rmon event329
show rmon events330
show rmon log331
rmon table-size333
Chapter 26: SNMP Commands 334
snmp-server community334
snmp-server view336
snmp-server group337
snmp-server user339
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide10
Contents
snmp-server filter341
snmp-server host342
snmp-server v3-host344
snmp-server engineID local346
snmp-server enable traps348
snmp-server trap authentication349
snmp-server contact350
snmp-server location351
snmp-server set352
show snmp353
show snmp engineID355
show snmp views355
show snmp groups356
show snmp filters358
show snmp users359
Chapter 27: RSA and Certificate Commands 361
crypto certificate generate361
crypto key generate dsa363
crypto key generate rsa364
Chapter 28: Spanning Tree Commands 365
spanning-tree365
spanning-tree mode366
spanning-tree forward-time367
spanning-tree hello-time368
spanning-tree max-age369
spanning-tree priority370
spanning-tree disable371
spanning-tree cost372
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide11
Contents
spanning-tree port-priority373
spanning-tree portfast374
spanning-tree link-type375
spanning-tree pathcost method376
spanning-tree bpdu377
spanning-tree guard root378
clear spanning-tree detected-protocols379
spanning-tree mst priority380
spanning-tree mst max-hops381
spanning-tree mst port-priority382
spanning-tree mst cost383
spanning-tree mst configuration385
instance (mst)386
name (mst)387
revision (mst)388
show (mst)389
exit (mst)390
abort (mst)391
show spanning-tree392
Chapter 29: SSH Commands 403
ip ssh port403
ip ssh server404
ip ssh pubkey-auth405
crypto key pubkey-chain ssh406
user-key407
key-string408
show ip ssh410
show crypto key pubkey-chain ssh411
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide12
show crypto key mypubkey412
crypto certificate request413
crypto certificate import415
crypto certificate export417
show crypto certificate mycertificate418
Chapter 30: Syslog Commands 420
logging on420
logging421
logging console422
logging buffered423
logging buffered size424
Contents
clear logging425
logging file426
clear logging file427
aaa logging428
file-system logging429
management logging430
show logging431
show logging file432
show syslog-servers434
Chapter 31: System Management Commands 436
ping436
traceroute438
telnet441
resume445
reload446
hostname447
service cpu-utilization448
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide13
show cpu utilization449
show users450
show sessions451
show system452
show version454
show system tcam utilization455
Chapter 32: TACACS+ Commands 456
tacacs-server host456
tacacs-server key458
tacacs-server timeout459
tacacs-server source-ip460
Contents
show tacacs461
Chapter 33: User Interface Commands 463
login463
configure464
exit (configuration)464
exit(EXEC)465
end466
help467
history468
history size469
terminal history470
terminal history size471
terminal datadump472
debug-mode473
show history474
do475
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide14
Chapter 34: VLAN Commands 477
switchport protected477
switchport protected-port478
switchport protected-port fastethernet479
vlan database480
vlan481
default-vlan vlan482
interface vlan483
interface range vlan484
name485
switchport mode486
switchport protected487
Contents
switchport access vlan488
switchport access multicast-tv vlan489
switchport trunk allowed vlan490
switchport trunk native vlan491
switchport general allowed vlan492
switchport general pvid494
switchport general ingress-filtering disable495
switchport general acceptable-frame-type tagged-only496
switchport customer vlan497
switchport customer multicast-tv vlan498
switchport forbidden vlan499
show interfaces protected-ports500
show protected-ports fastethernet501
show vlan502
show vlan multicast-tv503
show interfaces switchport504
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide15
Chapter 35: Web Server Commands 506
Contents
ip http server506
ip http port507
ip http exec-timeout508
ip https server509
ip https port510
ip https exec-timeout511
ip https certificate512
show ip http513
show ip https514
Chapter 36: 802.1x Commands 516
aaa authentication dot1x516
dot1x system-auth-control517
dot1x port-control518
dot1x re-authentication519
dot1x timeout re-authperiod520
dot1x re-authenticate521
dot1x timeout quiet-period522
dot1x timeout tx-period523
dot1x max-req524
dot1x timeout supp-timeout525
dot1x timeout server-timeout527
show dot1x528
show dot1x users531
show dot1x statistics532
Advanced Features535
dot1x auth-not-req535
dot1x multiple-hosts536
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide16
dot1x radius-attributes vlan537
dot1x single-host-violation538
dot1x bpdu539
show dot1x bpdu541
dot1x guest-vlan542
dot1x guest-vlan enable543
dot1x mac-authentication544
show dot1x advanced545
Appendix A: Alias Names547
Contents
Alias Name Support547
Appendix B: Where to Go From Here548
Product Resources548
Related Documentation548
Appendix C: Additional Information549
Regulatory Compliance and Safety Information549
Warranty549
End User License Agreement (EULA)549
Appendix D: Support Contacts550
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide17
Introduction
Overview
This document describes the Command Line Interface (CLI) used to manage the
Linksys SPS208G, SPS224G4, and SPS2024 switches. Unless noted otherwise,
all of the CLI commands in this document apply to all three switches.
This chapter describes the CLI command modes, how to access the CLI, and the
CLI command editing features.
1
CLI Command Modes
For greater ease of use, the Command Line Interface (CLI) is divided into four
command modes arranged hierarchically by privilege level. The command modes
are (in the order in which they are accessed):
•User EXEC mode (lowest privilege)
•Privileged EXEC mode
•Global Configuration mode
•Interface Configuration mode (highest privilege)
Each command mode has its own unique console prompt and set of CLI
commands. Entering a question mark at the console prompt displays a list of
available commands for the current mode. Specific commands are used to switch
from one mode to another.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide18
Introduction
CLI Command Modes
1
User EXEC Mode
This is the initial mode after system login (except for users who are defined as
privileged users; refer to “
tasks that do not change the configuration, such as performing basic tests and
listing system information.
The user-level prompt consists of the Switch host name followed by the angle
bracket >:
Console>
The default host name is Console unless it is changed via the hostname command
in Global Configuration mode.
To access the next higher mode (Privileged EXEC mode), use the enable
command and enter a password when prompted.
Privileged EXEC Mode
”). User EXEC mode is used for
Privileged EXEC Mode
Privileged EXEC mode is password-protected to prevent unauthorized use, as
many of its commands set operating system parameters. The password is not
displayed on the screen and is case-sensitive.
Privileged users start in Privileged EXEC mode. To enter this mode from User
EXEC mode, follow these steps:
STEP 1At the prompt enter the enable command and press Enter. A password prompt is
displayed.
STEP 2Enter the password and press Enter. (For security purposes, each character in the
password is replaced by *). The Privileged EXEC mode prompt, consisting of the
Switch host name followed by, is displayed.
Console#
To return from the Privileged EXEC mode to the User EXEC mode, use the disable
command.
The following example illustrates how to access Privileged EXEC mode and then
return to User EXEC mode:
Console> enable
Enter Password: ******
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide19
Introduction
CLI Command Modes
1
Console#
Console# disable
Console>
Global Configuration Mode
The Global Configuration mode is used to configure features at the system level,
and not at the interface level.
To access Global Configuration mode from Privileged EXEC mode, enter the
configure command at the Privileged EXEC mode prompt and press Enter. The
Global Configuration mode prompt, consisting of the device host name followed
by (config)#, is displayed:
Console(config)#
Use any of the following commands to return from Global Configuration mode to
the Privileged EXEC mode:
exit
end
Ctrl+Z
The following example shows how to access Global Configuration mode and
return to Privileged EXEC mode:
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide20
Introduction
CLI Command Modes
1
Interface Configuration Mode
Interface Configuration mode commands perform operations on specific
interfaces. This mode is divided into the following submodes, each with a specific
function:
•Line Interface — Contains commands used to configure the management
connections. These include commands such as line timeout settings, etc.
The line Global Configuration mode command is used to enter the Line
Configuration command mode.
•VLAN Database — Contains commands used to create a VLAN as a whole.
The vlan database Global Configuration mode command is used to enter
the VLAN Database Interface Configuration mode.
•Management Access List — Contains commands used to define
management access-lists. The management access-list Global
Configuration mode command is used to enter the Management Access
List Configuration mode.
•Ethernet — Contains commands used to manage port configuration. The
interface ethernet Global Configuration mode command is used to enter the
Interface Configuration mode.
•Port Channel — Contains commands used to configure port-channels; for
example, assigning ports to a port-channel. Most of these commands are
the same as the commands in the Ethernet interface mode, and are used to
manage the member ports as a single entity. The interface port-channel
Global Configuration mode command is used to enter the Port Channel
Interface Configuration mode.
•SSH Public Key-chain — Contains commands used to manually specify
other device SSH public keys. The crypto key pubkey-chain ssh Global
Configuration mode command is used to enter the SSH Public Key-chain
Configuration mode.
•QoS — Contains commands related to service definitions. The qos Global
Configuration mode command is used to enter the QoS services
configuration mode.
•MAC Access-List — Configures conditions required to allow traffic based
on MAC addresses. The mac access-list Global Configuration mode
command is used to enter the MAC access-list configuration mode.
To return from any Interface Configuration mode to the Global Configuration mode,
use the exit command.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide21
Introduction
Accessing the Command Line Interface
Accessing the Command Line Interface
The Command Line Interface (CLI) can be accessed from a terminal or computer
by performing one of the following tasks:
•Running a terminal application, such as HyperTerminal, on a computer that is
directly connected to the Switch’s console port,
—or—
•Running a telnet session from a command prompt on a computer with a
network connection to the Switch.
If access is via a telnet connection, ensure that the following conditions are met
before using CLI commands:
•The Switch has a defined IP address.
1
•Corresponding management access is granted.
•The workstation used to access the Switch is connected to the Switch.
Using HyperTerminal over the Console Interface
NOTE When using HyperTerminal with Microsoft® Windows® 2000, ensure that
Windows® 2000 Service Pack 2 or later is installed on your computer. The arrow
keys will not function properly using HyperTerminal’s VT100 emulation in
Windows® 2000 prior to Service Pack 2. For information on Windows® 2000
service packs, go to www.microsoft.com.
The Switch’s RS-232 serial console port provides a direct connection to a
computer’s serial port using a standard DB-9 null-modem or crossover cable.
Once the computer and Switch are connected, run a terminal application such as
HyperTerminal to access the Command Line Interface.
To access the Command Line Interface using the HyperTerminal application,
perform the following steps:
STEP 1Click the Start button.
STEP 2Select All Programs > Accessories > Communications > HyperTerminal.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide22
Introduction
Accessing the Command Line Interface
Figure1Start > All Programs > Accessories > Communications >
HyperTerminal
STEP 3Enter a name for this connection. Select an icon for the application, then click OK.
STEP 4Select a port to communicate with the switch. Select COM1 or COM2.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide23
Introduction
Accessing the Command Line Interface
Fig ure 3H yp er Term in al Co nn ec t To Sc re en
1
STEP 5Set the serial port settings as follows, then click OK.
•Bits per Second: 38400
•Databits: 8
•Parity: one
•Stop bits: 1
•Flow control: None
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide24
Introduction
Accessing the Command Line Interface
Figure 4HyperTerminal Properties Screen
1
STEP 6When the
and press Enter.
Figure 5Command Line User Name Prompt
The console# prompt is displayed. This prompt is where you enter CLI commands.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide25
Command Line Interface
appears, enter admin at the
User Name
prompt
Introduction
Accessing the Command Line Interface
Figure 6Command Line
You can now enter CLI commands to manage the Switch. For detailed information
on CLI commands, refer to the appropriate chapter(s) of this Reference Guide.
1
Using Telnet over an Ethernet Interface
Telnet provides a method of connecting to the Command Line Interface using TCP/
IP over a standard Ethernet connection. A telnet session can be established in
HyperTerminal or from a command prompt.
To establish a telnet session from the command prompt, perform the following
steps:
STEP 1Click Start, then select All Programs > Accessories > Command Prompt to open a
command prompt.
Figure 7Start > All Programs > Accessories > Command Prompt
STEP 2At the prompt, enter telnet 192.168.1.254, then press Enter.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide26
Introduction
Accessing the Command Line Interface
Figure 8Command Prompt
1
STEP 3The
STEP 4The console# prompt is displayed. This prompt is where you enter CLI commands.
Command Line Interface
prompt and press Enter.
Figure 9Command Line User Name Prompt
Figure 10Command Line
will be displayed. Enter admin at the
User Name
You can now enter CLI commands to manage the Switch. For detailed information
on CLI commands, refer to the appropriate chapter(s) of this Reference Guide.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide27
Introduction
Editing Features
Editing Features
Entering Commands
A CLI command is a series of keywords and arguments. Keywords identify a
command, and arguments specify configuration parameters. For example, in the
command show interfaces status ethernet e11,
keywords,
specifies the port.
To enter commands that require parameters, enter the required parameters after
the command keyword. For example, to set a password for the administrator,
enter:
is an argument that specifies the interface type, and
and
status
e1 1
1
are
When working with the CLI, the command options are not displayed. The
command is not selected from a menu, but is manually entered. To see what
commands are available in each mode or within an Interface Configuration, the CLI
does provide a method of displaying the available commands, the command
syntax requirements and in some instances parameters required to complete the
command. The standard command to request help is ?.
There are two instances where help information can be displayed:
•Keyword lookup — The character ? is entered in place of a command. A list
of all valid commands and corresponding help messages are is displayed.
•Partial keyword lookup — If a command is incomplete and or the character
? is entered in place of a parameter, the matched keyword or parameters
for this command are displayed.
To assist in using the CLI, there is an assortment of editing features. The following
features are described:
•Terminal Command Buffer
•Command Completion
•Nomenclature
•Keyboard Shortcuts
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide28
Introduction
Editing Features
1
Term inal C o mmand Buffe r
Every time a command is entered in the CLI, it is recorded on an internally
managed Command History buffer. Commands stored in the buffer are maintained
on a First In First Out (FIFO) basis. These commands can be recalled, reviewed,
modified, and reissued. This buffer is not preserved across device resets.
KeywordDescription
Up-Arrow key
Ctrl+P
Down-Arrow keyReturns to more recent commands in the
By default, the history buffer system is enabled, but it can be disabled at any time.
For more information on enabling or disabling the history buffer, refer to the history
command.
There is a standard default number of commands that are stored in the buffer. The
standard number of 10 commands can be increased to 216. By configuring 0, the
effect is the same as disabling the history buffer system. For more information on
configuring the command history buffer, refer to the history size command.
To display the history buffer, refer to the show history command.
Recalls commands in the history buffer,
beginning with the most recent command.
Repeat the key sequence to recall
successively older commands.
history buffer after recalling commands
with the up-arrow key. Repeating the key
sequence will recall successively more
recent commands.
Negating the Effect of Commands
For many configuration commands, the prefix keyword no can be entered to
cancel the effect of a command or reset the configuration to the default value. This
Reference Guide provides a description of the negation effect for each CLI
command.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide29
Introduction
Editing Features
1
Command Completion
If the command entered is incomplete, invalid or has missing or invalid parameters,
then the appropriate error message is displayed. This assists in entering the
correct command. By pressing Ta b after an incomplete command is entered, the
system will attempt to identify and complete the command. If the characters
already entered are not enough for the system to identify a single matching
command, press ? to display the available commands matching the characters
already entered.
Nomenclature
Within the CLI, Ethernet ports are denoted as follows:
Switch
SPS208G e1 through e8g1 through g2
SPS224G4e1 through e24g1 through g
PS2024n/ag1 through g24
S
The ports may be described on an individual basis or within a range. Use format
port number-port number to specify a set of consecutive ports and port number,
port number to indicate a set of non-consecutive ports. For example, g1- 3 stands
for Gigabit Ethernet ports 1, 2, and 3, and g1, 5 stands for Gigabit Ethernet ports 1
and 5.
10/100 Ethernet
ports
Gigabit Ethernet
ports
4
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide30
Introduction
Editing Features
1
Keyboard Shortcuts
The CLI has a range of keyboard shortcuts to assist in editing the CLI commands.
The following table describes the CLI shortcuts.
Keyboard Key
Up-arrow Recalls commands from the history buffer,
Down-arrowReturns the most recent commands from the
Ctrl+AMoves the cursor to the beginning of the
Ctrl+EMoves the cursor to the end of the command line.
Ctrl+Z / EndReturns back to the Privileged EXEC mode from
BackspaceDeletes one character left to the cursor position.
Description
beginning with the most recent command. Repeat
the key sequence to recall successively older
commands.
history buffer after recalling commands with the
up arrow key. Repeating the key sequence will
recall successively more recent commands.
command line.
any configuration mode.
CLI Command Conventions
When entering commands there are certain command entry standards that apply
to all commands. The following table describes the command conventions.
Convention
[ ]In a command line, square brackets indicate an
{ }In a command line, curly brackets indicate a
parameterItalic text indicates a parameter.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide31
Description
option entry.
selection of compulsory parameters separated
the | character. One option must be selected. For
example, flowcontrol {auto|on|off} means that for
the flowcontrol command, either auto, on, or off
must be selected.
Introduction
Editing Features
1
Convention
press keyNames of keys to be pressed are shown in bold.
Ctrl+F4Keys separated by the + character are to be
Screen DisplayFixed-width font indicates CLI prompts, CLI
allWhen a parameter is required to define a range of
Description
pressed simultaneously on the keyboard
commands entered by the user, and system
messages displayed on the console.
ports or parameters and all is an option, the
default for the command is all when no parameters
are defined. For example, the command interface
range port-channel has the option of either
entering a range of channels, or selecting all.
When the command is entered without a
parameter, it automatically defaults to all.
Copying and Pasting Text
Up to 1000 lines of text (or commands) can be copied and pasted into the device.
NOTE It is the user’s responsibility to ensure that the text copied into the device consists
of legal commands only.
This feature is dependent on the baud rate of the device.
When copying and pasting commands from a configuration file, make sure that the
following conditions exist:
•A device Configuration mode has been accessed.
•The commands contain no encrypted data, like encrypted passwords or
keys. Encrypted data cannot be copied and pasted into the device.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide32
AAA Commands
aaa authentication login
The aaa authentication login Global Configuration mode command defines login
authentication. To restore defaults, use the no form of this command.
Syntax
2
aaa authentication login {default |
no aaa authentication login {default |
list-name} method1 [method2...
list-name
}
Parameters
•
default — Uses the listed authentication methods that follow this argument
as the default list of methods when a user logs in.
•
list-name
methods activated when a user logs in. (Range: 1-12 characters)
•
method1 [method2...
KeywordDescription
enableUses the enable password for authentication.
lineUses the line password for authentication.
localUses the local username database password
— Character string used to name the list of authentication
] — Specify at least one method from the following list:
for authentication.
]
noneUses no authentication.
radiusUses the list of all RADIUS servers for
authentication.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide33
AAA Commands
aaa authentication login
NOTE If the authentication method is not defined, console users will be able to log in
2
KeywordDescription
tacacsUses the list of all TACACS+ servers for
authentication.
Default Configuration
The local user database is checked. This has the same effect as the command aaa
authentication login
without any authentication check.
list-name local.
Command Mode
Global Configuration mode
User Guidelines
The default and optional list names created with the aaa authentication login
command are used with the login authentication command.
Create a list by entering the aaa authentication login
for a particular protocol, where
list. The
algorithm tries, in the given sequence.
The additional methods of authentication are used only if the previous method
returns an error, not if it fails. To ensure that the authentication succeeds even if all
methods return an error, specify none as the final method in the command line.
method
argument identifies the list of methods that the authentication
list-name
is any character string used to name this
list-name method
command
Example
The following example configures the authentication login:
Console(config)# aaa authentication login default radius tacacs
enable line local none
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide34
AAA Commands
aaa authentication enable
aaa authentication enable
The aaa authentication enable Global Configuration mode command defines
authentication method lists for accessing higher privilege levels. To restore
defaults, use the no form of this command.
Syntax
2
aaa authentication enable {default |
no aaa authentication enable default
list-name} method1 [method2...
Parameters
•
default — Uses the listed authentication methods that follow this argument
as the default list of methods, when using higher privilege levels.
•
list-name
methods activated, when using access higher privilege levels. (Range: 1-12
characters)
•
method1 [method2...
KeywordDescription
enableUses the enable password for authentication.
lineUses the line password for authentication.
noneUses no authentication.
— Character string used to name the list of authentication
] — Specify at least one method from the following list:
]
radiusUses the list of all RADIUS servers for
authentication.
tacacsUses the list of all TACACS+ servers for
authentication.
Default Configuration
If the default list is not set, only the enable password is checked. This has the
same effect as the command aaa authentication enable default enable.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide35
AAA Commands
login authentication
2
On the console, the enable password is used if it exists. If no password is set, the
process still succeeds. This has the same effect as using the command aaa
authentication enable default enable none.
Command Mode
Global Configuration mode
User Guidelines
The default and optional list names created with the aaa authentication enable
command are used with the enable authentication command.
The additional methods of authentication are used only if the previous method
returns an error, not if it fails. To ensure that the authentication succeeds even if all
methods return an error, specify none as the final method in the command line.
All aaa authentication enable
TACACS+ server include the username $enabx$., where x is the requested
privilege level.
Example
The following example sets the enable password for authentication when
accessing higher privilege levels.
The login authentication Line Configuration mode command specifies the login
authentication method list for a remote telnet or console. To restore the default
configuration specified by the aaa authentication login command, use the no form
of this command.
default
requests sent by the device to a RADIUS or
Syntax
login authentication {default |
no login authentication
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide36
list-name
}
AAA Commands
enable authentication
Parameters
default — Uses the default list created with the aaa authentication login
•
command.
•
list-name —
command.
Uses the indicated list created with the aaa authentication login
Default Configuration
Uses the default set with the command aaa authentication login.
Command Mode
Line Configuration mode
2
User Guidelines
To change (or rename) an authentication method, use the negate command and
create a new rule with the new method name.
Example
The following example specifies the default authentication method for a console.
Console(config)# line console
Console(config-line)# login authentication default
enable authentication
The enable authentication Line Configuration mode command specifies the
authentication method list when accessing a higher privilege level from a remote
Telnet or console. To restore the default configuration specified by the aaa
authentication enable command, use the no form of this command.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide37
AAA Commands
enable authentication
2
Syntax
enable authentication {default |
no enable authentication
list-name
}
Parameters
•
default — Uses the default list created with the aaa authentication enable
command.
•
list-name
enable command.
— Uses the indicated list created with the aaa authentication
Default Configuration
Uses the default set with the aaa authentication enable command.
Command Mode
Line Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example specifies the default authentication method when
accessing a higher privilege level from a console.
Console(config)# line console
Console(config-line)# enable authentication default
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide38
AAA Commands
ip http authentication
ip http authentication
The ip http authentication Global Configuration mode command specifies
authentication methods for HTTP server users. To restore the default
configuration, use the no form of this command.
Syntax
2
ip http authentication
no ip http authentication
method1 [method2...
]
Parameters
•
method1 [method2...
KeywordDescription
localUses the local username database for
authentication.
noneUses no authentication.
radiusUses the list of all RADIUS servers for
authentication.
tacacsUses the list of all TACACS+ servers for
authentication.
] — Specify at least one method from the following list:
Default Configuration
The local user database is checked. This has the same effect as the command ip
http authentication
local
.
Command Mode
Global Configuration mode
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide39
AAA Commands
ip https authentication
User Guidelines
The additional methods of authentication are used only if the previous method
returns an error, not if it fails. To ensure that the authentication succeeds even if all
methods return an error, specify none as the final method in the command line.
Example
The following example configures the HTTP authentication.
Console(config)# ip http authentication radius tacacs local none
ip https authentication
2
The ip https authentication Global Configuration mode command specifies
authentication methods for HTTPS server users. To restore the default
configuration, use the no form of this command.
Syntax
ip https authentication
no ip https authentication
method1 [method2...
]
Parameters
•
method1 [method2...
KeywordDescription
localUses the local username database for
authentication.
noneUses no authentication.
] — Specify at least one method from the following list:
radiusUses the list of all RADIUS servers for
authentication.
tacacsUses the list of all TACACS+ servers for
authentication.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide40
AAA Commands
show authentication methods
2
Default Configuration
The local user database is checked. This has the same effect as the command ip
https authentication
Command Mode
Global Configuration mode
User Guidelines
The additional methods of authentication are used only if the previous method
returns an error, not if it fails. To ensure that the authentication succeeds even if all
methods return an error, specify none as the final method in the command line.
local
.
Example
The following example configures HTTPS authentication.
Console(config)# ip https authentication radius tacacs local
none
show authentication methods
The show authentication methods Privileged EXEC mode command displays
information about the authentication methods.
Syntax
show authentication methods
Default Configuration
This command has no default configuration.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide41
AAA Commands
show authentication methods
2
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the authentication configuration.
Console# show authentication methods
Login Authentication Method Lists
--------------------------------Default: Radius, Local, Line
http: Radius, Local
https: Radius, Local
dot1x: Radius
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide42
AAA Commands
password
password
2
The password Line Configuration mode command specifies a password on a line.
To remove the password, use the no form of this command.
Syntax
password
no password
password
[encrypted]
Parameters
password
•
— Password for this level. (Range: 1-159 characters)
•encrypted — Encrypted password to be entered, copied from another
device configuration.
Default Configuration
No password is defined.
Command Mode
Line Configuration mode
User Guidelines
If a password is defined as encrypted, the required password length is 32
characters.
Example
The following example specifies the password called ‘secret’ on a console.
Console(config)# line console
Console(config-line)# password secret
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide43
AAA Commands
enable password
enable password
The enable password Global Configuration mode command sets a local
password to control access to user and privilege levels. To remove the password
requirement, use the no form of this command.
Syntax
2
enable password [level
no enable password [level
level] password
level]
encrypted]
Parameters
•
password —
•
level —
(Range: 1-15).
Password for this level. (Range: 1-159 characters)
Level for which the password applies. If not specified the level is 15
•encrypted — Encrypted password entered, copied from another device
configuration.
Default Configuration
No enable password is defined.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example sets a local level 15 password called ‘secret’ to control
access to user and privilege levels.
Console(config)# enable password secret level 15
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide44
AAA Commands
username
username
2
The username Global Configuration mode command creates a user account in the
local database. To remove a user name, use the no form of this command.
Syntax
username
no username
name
name
[password
password
] [evel
level
] [encrypted]
Parameters
name —
•
•
password
characters)
•
level
automatically set to 1.
The name of the user. (Range: 1-20 characters)
— The authentication password for the user. (Range: 1-159
— The user level (Range: 1-15). If a level is not specified, the level is
•encrypted — Encrypted password entered, copied from another device
configuration.
Default Configuration
No user is defined.
Command Mode
Global Configuration mode
User Guidelines
User account can be created without a password.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide45
AAA Commands
show users accounts
Example
The following example configures a user named ‘bob’ with password ‘lee’ and user
level 15 to the system.
Console(config)# username bob password lee level 15
show users accounts
The show users accounts Privileged EXEC mode command displays information
about the users local database.
Syntax
2
show users accounts
Default Configuration
No default configuration for this command.
Command Mode
Privileged EXEC mode
User Guidelines
User account can be created without a password.
Example
The following example displays information about the users local database.
Console# show users accounts
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide46
AAA Commands
show privilege
show privilege
2
UsernamePrivilege
----------------Bob15
Robert15
Smith15
To display your current level of privilege, use the show privilege command in EXEC
mode.
Syntax
show privilege
Parameters
This command has no arguments or key words
Default Configuration
This command has no default configuration.
Command Mode
EXEC
Example
Console# show privilege
Current privilege level is 15
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide47
ACL Commands
ip access-list
The ip access-list Global Configuration mode command enables the IP-Access
Configuration mode and creates Layer 3 ACLs. To delete an ACL, use the no form
of this command.
3
Syntax
ip access-list
no ip access-list access-list-name
Parameters
access-list-name
•
characters) Use “” for empty string.
Default Configuration
The default for all ACLs is deny-all.
Command Mode
Global Configuration mode
access-list-name
— Specifies the name of the ACL. (Range: 0-32
User Guidelines
There are no user guidelines for this command.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide48
ACL Commands
permit (ip)
permit (ip)
3
Example
The following example shows how to create an IP ACL.
Console(config)# ip access-list ip-acl1
Console(config-ip-al)#
The permit IP-Access List Configuration mode command permits traffic if the
conditions defined in the permit statement match.
Syntax
permit {any |
destination-wildcard
permit-icmp {any | {
wildcard
ip-precedence
permit-igmp {any | {
wildcard
permit-tcp {any | {
destination-wildcard
ip-precedence
permit-udp {any | {
destination-wildcard
ip-precedence
protocol
}} {ny |
}} {ny |
source source-wildcard
icmp-type
]
source source-wildcard
igmp-type
source source-wildcard
] [flags
source source-wildcard
]
Parameters
source
•
indicate IP address 0.0.0.0 and mask 255.255.255.255.
— Specifies the source IP address of the packet. Specify any to
} {any | {
}} [dscp
}} {ny |
list-of-flags
}} {any |
source source-wildcard
dscp-number
} {any |
} [dscp
destination-port
destination-port
| ip-precedence
}} {any | {
icmp-code
dscp-number
]
} [dscp
}} {any | {
}} {any |
} [dscp
}} {any |
}} {any | {
destination destination-
dscp-number
destination destination-
| ip-precedence
source-port
dscp-number
source-port
} [dscp
dscp-number
destination
ip-precedence
| ip-precedence
ip-precedence
} {any |{
} {any | {
destination
| ip-precedence
destination
| ip-precedence
]
]
•
source-wildcard
address. Use 1s in bit positions to be ignored. Specify any to indicate IP
address 0.0.0.0 and mask 255.255.255.255.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide49
— Specifies wildcard to be applied to the source IP
ACL Commands
permit (ip)
•
destination
any to indicate IP address 0.0.0.0 and mask 255.255.255.255.
•
destination-wildcard
IP address. Use 1s in bit positions to be ignored. Specify any to indicate IP
address 0.0.0.0 and mask 255.255.255.255.
•
protocol
(Range: 0-255). The following table lists the protocols that can be specified:
— Specifies the destination IP address of the packet. Specify
— Specifies wildcard to be applied to the destination
— Specifies the abbreviated name or number of an IP protocol.
3
IP ProtocolAbbreviated
Name
Internet Control Message Protocolicmp1
Internet Group Management Protocoligmp2
IP in IP (encapsulation) Protocolip4
Transmission Control Protocoltcp6
Exterior Gateway Protocolegp8
Interior Gateway Protocoligp9
User Datagram Protocoludp17
Host Monitoring Protocolhmp20
Reliable Data Protocolrdp27
Inter-Domain Policy Routing Protocolidpr35
Ipv6 protocolipv641
Routing Header for IPv6ipv6-route43
Protocol
Number
Fragment Header for IPv6ipv6-frag44
Inter-Domain Routing Protocolidrp45
Reservation Protocolrsvp46
General Routing Encapsulationgre47
Encapsulating Security Payload (50)esp50
Authentication Headerah51
ICMP for IPv6ipv6-icmp58
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide50
ACL Commands
permit (ip)
3
IP ProtocolAbbreviated
Name
(any IP protocol)any(25504)
EIGRP routing protocoleigrp88
Open Shortest Path Protocolospf89
IP-within-IP Encapsulation Protocolipip94
Protocol Independent Multicastpim103
Layer Two Tunneling Protocoll2tp115
ISIS over IPv4isis124
•dscp — Indicates matching the
(Range: 0-63)
•ip-precedence — Indicates matching the
packet ip-precedence value. (Range: 0-7)
•
icmp-type
Enter a value or one of the following values: echo-reply, destinationunreachable, source-quench, redirect, alternate-host-address,
echorequest, router-advertisement, router-solicitation, time-exceeded,
parameter-problem, timestamp, timestamp-reply,information-request,
information-reply, address-mask-request,address-mask-reply, traceroute,
datagram-conversion-error,mobile-host-redirect, ipv6-where-are-you, ipv6i-am-here,mobile-registration-request, mobile-registration-reply, domainname-request,domain-name-reply, skip and photuris. (Range: 0-255)
— Specifies an ICMP message type for filtering ICMP packets.
dscp-number
ip-precedence
with the packet dscp value.
Protocol
Number
number with the
•
icmp-code
ICMP packets that are filtered by ICMP message type can also be filtered
by the ICMP message code. (Range: 0-255)
•
igmp-type
number or one of the following values: dvmrp, host-query, host-report, im or
trace. (Range: 0-255)
•
destination-port
65535)
•
source-port
— Specifies an ICMP message code for filtering ICMP packets.
— IGMP packets can be filtered by IGMP message type. Enter a
— Specifies the UDP/TCP destination port. (Range: 0-
— Specifies the UDP/TCP source port. (Range: 0-65535)
•list-of-flags — Specifies a list of TCP flags that can be triggered. If a flag is
set, it is prefixed by “+”. If a flag is not set, it is prefixed by “-”. The possible
values are: +urg, +ack, +psh, +rst, +syn, +fin, -urg, -ack, -psh, -rst, -syn and -
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide51
ACL Commands
deny (IP)
3
fin. The flags are concatenated into one string. For example: +fin-ack. To
define more than 1 flag - enter additional flags one after another without a
space (example +syn-ack).
Default Configuration
No IPv4 ACL is defined.
Command Mode
IP-Access List Configuration mode
User Guidelines
deny (IP)
Use the ip access-list Global Configuration mode command to enable the IPAccess List Configuration mode.
Before an Access Control Element (ACE) is added to an ACL, all packets are
permitted. After an ACE is added, an implied deny-any-any condition exists at the
end of the list and those packets that do not match the conditions defined in the
permit statement are denied.
Example
The following example shows how to define a permit statement for an IP ACL.
Console(config)# ip access-list ip-acl1
Console(config-ip-al)# permit rsvp 192.1.1.1 0.0.0.0 any dscp 56
The deny IP-Access List Configuration mode command denies traffic if the
conditions defined in the deny statement match.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide52
ACL Commands
deny (IP)
3
Syntax
deny [disable-port] {any |
{
destination destination-wildcard
precedence
deny-icmp [disable-port] {any | {
destination-wildcard
precedence
deny-igmp [disable-port] {any | {
destination-wildcard
deny-tcp [disable-port] {any | {
destination destination-wildcard
{
precedence
eny-udp [disable-port] {any | {
{
destination destination-wildcard
precedence
]
number
number
number
protocol
}} {ny |
]
}} {any |
] [flags
]
icmp-type
igmp-type
source source-wildcard
list-of-flags
source source-wildcard
Parameters
•
disable-port — Specifies that the port is disabled.
} {any | {
}} [dscp
source source-wildcard
source source-wildcard
}} {any |
}} {any |
source source-wildcard
dscp number
} {any |
icmp-code
} [dscp
]
number
destination-port
destination-port
| ip-precedence
}} {any |
}} {any |
}} {ny |
| ip-precedence
}} {any | {
} [dscp
}} {any | {
} [dscp
} [dscp
destination
number
destination
source-port
number
source-port
number
ip-
| ip-
number
} {any |
| ip-
} {any |
| ip-
]
•
source
sent. Specify any to indicate IP address 0.0.0.0 and mask 255.255.255.255.
•
source-wildcard
placing 1’s in bit positions to be ignored. Specify any to indicate IP address
0.0.0.0 and mask 255.255.255.255.
•
destination
being sent. Specify any to indicate IP address 0.0.0.0 and mask
255.255.255.255.
•
destination-wildcard
by placing 1’s in bit positions to be ignored. Specify any to indicate IP
address 0.0.0.0 and mask 255.255.255.255.
— Specifies the IP address or host name from which the packet was
— (Optional for the first type) Specifies wildcard bits by
— Specifies the IP address or host name to which the packet is
— (Optional for the first type) Specifies wildcard bits
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide53
ACL Commands
deny (IP)
•
protocol
(Range: 0-255). The following table lists the protocols that can be specified:
— Specifies the abbreviated name or number of an IP protocol.
3
IP ProtocolAbbreviated
Name
Internet Control Message Protocolicmp1
Internet Group Management Protocoligmp2
IP in IP (encapsulation) Protocolip4
Transmission Control Protocoltcp6
Exterior Gateway Protocolegp8
Interior Gateway Protocoligp9
User Datagram Protocoludp17
Host Monitoring Protocolhmp20
Reliable Data Protocolrdp27
Inter-Domain Policy Routing Protocolidpr35
Ipv6 protocolipv641
Routing Header for IPv6ipv6-route43
Protocol
Number
Fragment Header for IPv6ipv6-frag44
Inter-Domain Routing Protocolidrp45
Reservation Protocolrsvp46
General Routing Encapsulationgre47
Encapsulating Security Payload (50)esp50
Authentication Headerah51
ICMP for IPv6ipv6-icmp58
EIGRP routing protocoleigrp88
Open Shortest Path Protocolospf89
IP-within-IP Encapsulation Protocolipip94
Protocol Independent Multicastpim103
Layer Two Tunneling Protocoll2tp115
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide54
ACL Commands
deny (IP)
3
IP ProtocolAbbreviated
Name
ISIS over IPv4isis124
(any IP protocol)any(25504)
Protocol
Number
•in-port port-num — (Optional) Specifies the input port of the device. In case
of egress classification this port will be the device input port.
•out-port port-num — (Optional) Specifies the output port of the device.
•dscp
•ip-precedence
number
value.
with the packet ip-precedence value.
— Indicates matching the dscp
number
— Indicates matching the ip-precedence
number
with the packet dscp
number
Default Configuration
This command has no default configuration
Command Mode
IP-Access List Configuration mode
User Guidelines
Use the ip access-list Global Configuration mode command to enable the IPAccess List Configuration mode.
Before an Access Control Element (ACE) is added to an ACL, all packets are
permitted. After an ACE is added, an implied deny-any-any condition exists at the
end of the list and those packets that do not match the defined conditions are
denied.
Example
The following example shows how to define a permit statement for an IP ACL.
Console(config)# ip access-list ip-acl1
Console(config-ip-al)# deny rsvp 192.1.1.1 0.0.0.255 any
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide55
ACL Commands
mac access-list
mac access-list
The mac access-list Global Configuration mode command enables the MACAccess List Configuration mode and creates Layer 2 ACLs. To delete an ACL, use
the no form of this command.
Syntax
3
mac access-list
no mac access-list
name
name
Parameters
•
name —
empty string.
Specifies the name of the ACL. (Range: 0-32 characters) Use “” for
Default Configuration
The default for all ACLs is deny all.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example shows how to create a MAC ACL.
Console(config)# mac access-list macl-acl1
Console(config-mac-al)#
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide56
ACL Commands
permit (MAC)
permit (MAC)
3
The permit MAC-Access List Configuration mode command defines permit
conditions of an MAC ACL.
Syntax
permit {any | {host
[lan
vlan-id
] [cos
Parameters
source
•
•
source-wildcard
address. Use 1s in bit positions to be ignored.
•
destination
being sent.
•
destination-wildcard —
destination MAC address. Use 1s in bit positions to be ignored.
•
vlan-id
•
cos
•
cos-wildcard —
•
eth-type
(hex))
— Specifies the source MAC address of the packet.
— Specifies the ID of the packet vlan. (Range: 0-4094)
— Specifies the Class of Service (CoS) for the packet. (Range: 0-7)
— Specifies the Ethernet type of the packet .(Range: 05dd-ffff
source source-wildcard
cos cos-wildcard
— Specifies wildcard bits to be applied to the source MAC
— Specifies the MAC address of the host to which the packet is
Specifies wildcard bits to be applied to the CoS.
] thtype
Specifies wildcard bits to be applied to the
} any | {
eth-type
destination destination-wildcard
] [inner-vlan
vlan-id
]
}}
•
inner-vlan vlan-id
— Specifies the inner VLAN ID of a double tagged packet
Default Configuration
No MAC ACL is defined.
Command Mode
MAC-Access List Configuration mode
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide57
ACL Commands
deny (MAC)
3
User Guidelines
Before an Access Control Element (ACE) is added to an ACL, all packets are
permitted. After an ACE is added, an implied deny-any-any condition exists at the
end of the list and those packets that do not match the conditions defined in the
permit statement are denied.
If the VLAN ID is specified, the policy map cannot be connected to the VLAN
interface.
Example
The following example shows how to create a MAC ACL with permit rules.
Console(config)# mac access-list macl-acl1
Console(config-mac-al)# permit 6:6:6:6:6:6 0:0:0:0:0:0 ny vlan 6
deny (MAC)
The deny MAC-Access List Configuration mode command denies traffic if the
conditions defined in the deny statement match.
Syntax
deny [disable-port] {any | {
wildcard
[cos
}}[vlan
cos cos-wildcard
vlan-id
source source-wildcard
]
] [ethtype
eth-type
} {any | {
]
destination destination-
Parameters
•
disable-port — Indicates that the port is disabled if the statement is deny.
•
source
was sent.
•
source-wildcard —
placing 1’s in bit positions to be ignored.
— Specifies the MAC address of the host from which the packet
(Optional for the first type) Specifies wildcard bits by
•
destination
being sent.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide58
— Specifies the MAC address of the host to which the packet is
ACL Commands
deny (MAC)
•
destination-wildcard —
by placing 1’s in bit positions to be ignored.
•
vlan-id
•
cos
•
cos-wildcard —
•
eth-type
— Specifies the ID of the packet vlan.
— Specifies the packet’s Class of Service (CoS).
Specifies wildcard bits to be applied to the CoS.
— Specifies the packet’s Ethernet type.
(Optional for the first type) Specifies wildcard bits
Default Configuration
This command has no default configuration.
Command Mode
3
MAC-Access List Configuration mode
User Guidelines
MAC BPDU packets cannot be denied.
This command defines an Access Control Element (ACE). An ACE can only be
removed by deleting the ACL, using the no mac access-list Global Configuration
mode command. Alternatively, the Web-based interface canbe used to delete
ACEs from an ACL.
Before an Access Control Element (ACE) is added to an ACL, all packets are
permitted. After an ACE is added, an implied deny-any-any condition exists at the
end of the list and those packets that do not match the conditions defined in the
permit statement are denied.
If the VLAN ID is specified, the policy map cannot be connected to the VLAN
interface.
Example
The following example shows how to create a MAC ACL with deny rules on a
device.
Console(config)# mac access-list macl1
Console (config-mac-acl)# deny 00:00:00:00:10:00 any
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide59
ACL Commands
service-policy
service-policy
3
Apply a policy map to the input of a particular interface. Use no form in order to
detach policy map from interface.
The command is available in Advanced mode only.
Syntax
service-policy input policy-map-name
no service-policy input
Parameters
service-acl
•
input — Use inputpolicy-map-name to apply the specified policy-map to
the input interface.
Only one policy map per interface per direction is supported.
To control access to an interface, use the service-acl command in interface
configuration mode. To remove the access control, use the no form of this
command.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide60
ACL Commands
show access-lists
3
Syntax
service-acl input acl-name1
no service-acl input
Parameters
acl-name — Specifies an ACL to apply to the interface. Please see the usage
guidelines.
Default Configuration
No ACL is assigned.
Command Mode
Interface configuration (Ethernet, Port-Channel).
Usage Guidelines
•
•An ACL can’t be added to a port that is already bounded to an ACL, without
show access-lists
The show access-lists Privileged EXEC mode command displays access control
lists (ACLs) defined on the device.
Syntax
Two ACLs of the same type can’t be added to a port.
first removing the current ACL and binding the two ACLs together.
show access-lists [
name
]
Parameters
name
•
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide61
— The name of the ACL.
ACL Commands
show interfaces access-lists
3
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays access lists defined on a device.
Console# show access-lists
IP access list ACL1
permit ip host 172.30.40.1 any
permit rsvp host 172.30.8.8 any
show interfaces access-lists
The show interfaces access-lists Privileged EXEC mode command displays
access lists applied on interfaces.
Syntax
show interfaces access-lists [ethernet interface | port-channel port-channelnumber]
Parameters
•
interface —
•
port-channel-number —
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide62
Valid Ethernet port.
Valid port-channel number.
ACL Commands
show interfaces access-lists
3
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
The following example displays ACLs applied to the interfaces of a device:
Console# show interfaces access-lists
InterfaceInput
-------------e1ACL1
e2ACL3
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide63
ARP Inspection Commands
ip arp inspection
The ip arp inspection Global Configuration mode command globally enables ARP
inspection. To disable ARP inspection, use the no form of this command.
Syntax
4
ip arp inspection
no ip arp inspection
Default Configuration
The default configuration is set to disabled.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example globally enables ARP inspection.
Console(config)# ip arp inspection
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide64
ARP Inspection Commands
ip arp inspection vlan
ip arp inspection vlan
The ip arp inspection vlan Global Configuration mode command enables ARP
inspection based on DHCP snooping database on a VLAN. To disable ARP
inspection on a VLAN, use the no form of this command.
Syntax
4
ip arp inspection
no ip arp inspection
vlan-id
vlan-id
Parameters
•
vlan-id
— Specifies a VLAN ID.
Default Configuration
The default configuration is set to disabled.
Command Mode
Global Configuration mode
User Guidelines
This command enables ARP inspection on a VLAN based on the DHCP snooping
database. The ip arp inspection list assign Global Configuration mode command
enables static ARP inspection.
Example
The following example enables ARP inspection on a VLAN based on the DHCP
snooping database.
Console(config)# ip arp inspection vlan
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide65
ARP Inspection Commands
ip arp inspection trust
ip arp inspection trust
The ip arp inspection trust Interface Configuration (Ethernet, Port-channel) mode
command configures an interface trust state that determines if incoming Address
Resolution Protocol (ARP) packets are inspected. To return to the default
configuration, use the no form of this command.
The switch does not check ARP packets, which are received on the trusted
interface; it simply forwards the packets.
For untrusted interfaces, the switch intercepts all ARP requests and responses. It
verifies that the intercepted packets have valid IP-to-MAC address bindings
before updating the local cache and before forwarding the packet to the
appropriate destination. The switch drops invalid packets and logs them in the log
buffer according to the logging configuration specified with the ip arp inspection
log-buffer vlan Global Configuration mode command.
Example
The following example configures an interface trust state that determines if
incoming Address Resolution Protocol (ARP) packets are inspected.
Console(config)# interface ethernet 1
Console(config-if)# ip arp inspection trust
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide66
ARP Inspection Commands
ip arp inspection validate
ip arp inspection validate
The ip arp inspection validate Global Configuration mode command performs
specific checks for dynamic Address Resolution Protocol (ARP) inspection. Use
the no form of this command to return to the default settings.
Syntax
ip arp inspection validate
no ip arp inspection validate
Default Configuration
4
The default configuration is set to disabled.
Command Mode
Global Configuration mode.
User Guidelines
The following are performed:
•Source MAC: Compare the source MAC address in the Ethernet header
against the sender MAC address in the ARP body. This check is performed
on both ARP requests and responses.
•Destination MAC: Compare the destination MAC address in the Ethernet
header against the target MAC address in ARP body. This check is
performed for ARP responses.
•IP addresses: Compare the ARP body for invalid and unexpected IP
addresses. Addresses include 0.0.0.0, 255.255.255.255, and all IP Multicast
addresses.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide67
ARP Inspection Commands
ip arp inspection list create
Example
The following example perform specific checks for dynamic Address Resolution
Protocol (ARP) inspection.
Console(config)# ip arp inspection validate
ip arp inspection list create
The ip arp inspection list create Global Configuration mode command creates a
static ARP binding list and to enter the ARP list configuration mode. To delete the
list, use the no form of this command.
4
Syntax
ip arp inspection list create
no ip arp inspection list create
name
Parameters
•
name
— Specifies the list name. (Range: 1-32 characters)
Default Configuration
No static ARP binding list exists.
Command Mode
Global Configuration mode
User Guidelines
name
This command enables static ARP inspection on a VLAN.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide68
ARP Inspection Commands
ip mac
Example
The following example creates a static ARP binding list and to enter the ARP list
configuration mode.
Console(config)# ip arp inspection list create
ip mac
The ip mac ARP-list Configuration mode command displays static ARP binding. To
delete a binding, use the no form of this command.
Syntax
4
ip
ip-address
no ip
ip-address
mac
mac-address
mac
mac-address
Parameters
ip-address —
•
•
mac-address —
address.
Specifies the IP address to be entered to the list.
Specifies the MAC address associated with the IP
Default Configuration
No binding is defined.
Command Mode
ARP-list Configuration mode
User Guidelines
There are no user guidelines for this command.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide69
ARP Inspection Commands
ip arp inspection list assign
Example
The following example displays static ARP binding.
Console(config)# ip arp inspection list servers
Console(config-ARP-list)# ip 172.16.1.1 mac 0060.704C.7321
Console(config-ARP-list)# ip 172.16.1.2 mac 0060.704C.7322
ip arp inspection list assign
The ip arp inspection list assign Global Configuration mode command assigns
static ARP binding lists to a VLAN. To delete the assignment, use the no form of this
command.
4
Syntax
ip arp inspection list assign
no ip arp inspection list assign
vlan-id name
vlan
Parameters
•
vlan-id —
•
name —
Specifies the VLAN ID.
Specifies the list name.
Default Configuration
No static ARP binding list assignment exists.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide70
ARP Inspection Commands
ip arp inspection logging interval
Example
The following example assigns static ARP binding lists to a VLAN.
Console(config)# ip arp inspection list assign
ip arp inspection logging interval
The ip arp inspection logging interval Global Configuration mode command
configures the minimal interval between successive ARP SYSLOG messages. To
return to the default configuration, use the no form of this command.
Syntax
4
ip arp inspection logging interval {
no ip arp inspection logging interval
seconds
Parameters
seconds —
•
SYSLOG messages. A 0 value means that a system message is
immediately generated. (Range: 0-86400)
•infinite
Specifies the minimal interval between successive ARP
—
Specifies SYSLOG messages are not generated.
Default Configuration
The default value is 5 seconds.
Command Mode
Global Configuration mode
| infinite}
User Guidelines
There are no user guidelines for this command.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide71
ARP Inspection Commands
show ip arp inspection
Example
The following example configures the minimal interval between successive ARP
SYSLOG messages.
Console(config)# ip arp inspection logging interval
show ip arp inspection
The show ip arp inspection EXEC mode command displays the ARP inspection
configuration.
Syntax
4
show ip arp inspection [ethernet
interface
| port-channel
Parameters
•
interface —
•
port-channel-number —
Specifies an Ethernet port.
Specifies a port-channel number.
Default Configuration
This command has no default configuration.
Command Mode
EXEC
User Guidelines
There are no user guidelines for this command.
port-channel-number
]
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide72
ARP Inspection Commands
show ip arp inspection list
Example
The following example displays the ARP inspection configuration.
Console# show ip arp inspection
IP ARP inspection is enabled.
IP ARP inspection is configured on following VLANs: 2, 7-18
Verification of packet header is enabled
Syslog messages interval: 5 seconds
InterfaceTrusted
---------------e1yes
e2no
4
show ip arp inspection list
The show ip arp inspection list Privileged EXEC mode command displays the
static ARP binding list.
Syntax
show ip arp inspection list
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide73
ARP Inspection Commands
show ip arp inspection list
Example
The following example displays the static ARP binding list.
Console# show ip arp inspection list
List name: servers
Assigned to VLANs: 1,2
IPARP
------------------------
172.16.1.10060.704C.7321
172.16.1.20060.704C.7322
4
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide74
Address Table Commands
bridge address
The bridge address Interface Configuration (VLAN) mode command adds a MAClayer station source address to the bridge table. To delete the MAC address, use
the no form of this command.
The bridge multicast filtering Global Configuration mode command enables
filtering Multicast addresses. To disable filtering Multicast addresses, use the no
form of this command.
Syntax
bridge multicast filtering
no bridge multicast filtering
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide76
Address Table Commands
bridge multicast address
Default Configuration
Filtering Multicast addresses is disabled. All Multicast addresses are flooded to all
ports.
Command Mode
Global Configuration mode
User Guidelines
If Multicast devices exist on the VLAN, do not change the unregistered Multicast
addresses state to drop on the switch ports.
If Multicast devices exist on the VLAN and IGMP-snooping is not enabled, the
bridge multicast forward-all command should be used to enable forwarding all
Multicast packets to the Multicast switches.
5
Example
In the following example, bridge Multicast filtering is enabled.
Console(config)# bridge multicast filtering
bridge multicast address
The bridge multicast address Interface Configuration (VLAN) mode command
registers a MAC-layer Multicast address in the bridge table and statically adds
ports to the group. To unregister the MAC address, use the no form of this
command.
Syntax
bridge multicast address {
bridge multicast address {
remove] {ethernet
mac-multicast-address | ip-multicast-address
mac-multicast-address | ip-multicast-address
interface-list
| port-channel
port-channel-number-list
}
} [add |
}
no bridge multicast address {
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide77
mac-multicast-address | ip-multicast-address
}
Address Table Commands
bridge multicast address
Parameters
add — Adds ports to the group. If no option is specified, this is the default
•
option.
•remove — Removes ports from the group.
•
mac-multicast-address —
•
ip- multicast-address —
•
interface-list
no spaces; a hyphen is used to designate a range of ports.
•
port-channel-number-list
comma and no spaces; a hyphen is used to designate a range of portchannels.
— Separate nonconsecutive Ethernet ports with a comma and
A valid MAC Multicast address.
A valid IP Multicast address.
— Separate nonconsecutive port-channels with a
5
Default Configuration
No Multicast addresses are defined.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
If the command is executed without add or remove, the command only registers
the group in the bridge database. Static Multicast addresses can only be defined
on static VLANs.
The bridge multicast forbidden address Interface Configuration (VLAN) mode
command forbids adding a specific Multicast address to specific ports. Use the no
form of this command to restore the default configuration.
Syntax
5
bridge multicast forbidden address {
address
number-list
no bridge multicast forbidden address {
address
} [add | remove] {ethernet
}
}
mac-multicast-address | ip-multicast-
interface-list
mac-multicast-address | ip-multicast-
Parameters
•
add — Adds ports to the group. If no option is specified, this is the default
option.
•remove — Removes ports from the group.
•
mac-multicast-address —
•
ip- multicast-address —
•
interface-list
no spaces; a hyphen is used to designate a range of ports.
•
port-channel-number-list
comma and no spaces; a hyphen is used to designate a range of portchannels.
— Separate nonconsecutive Ethernet ports with a comma and
A valid MAC Multicast address.
A valid IP Multicast address.
— Separate nonconsecutive port-channels with a
| port-channel
port-channel-
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide79
Address Table Commands
bridge multicast forward-all
Default Configuration
No forbidden addresses are defined.
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
Before defining forbidden ports, the Multicast group should be registered.
Example
5
In this example, MAC address 0100.5e02.0203 is forbidden on port e9 within
VLAN 8.
The bridge multicast forward-all Interface Configuration (VLAN) mode command
enables forwarding all Multicast packets on a port. Use the no form of this
command to restore the default configuration.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide81
Address Table Commands
bridge multicast forbidden forward-all
bridge multicast forbidden forward-all
The bridge multicast forbidden forward-all Interface Configuration (VLAN) mode
command forbids a port to be a forward-all-Multicast port. Use the no form of this
command to restore the default configuration.
•remove — Does not forbid forwarding all Multicast packets.
•
interface-list
and no spaces; a hyphen is used to designate a range of ports.
•
port-channel-number-list
a comma and no spaces; a hyphen is used to designate a range of portchannels.
— Separates nonconsecutive Ethernet ports with a comma
— Separates nonconsecutive port-channels with
Default Configuration
This setting is disabled
interface-list
|
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
IGMP snooping dynamically discovers Multicast device ports. When a Multicast
device port is discovered, all the Multicast packets are forwarded to it
unconditionally.
This command prevents a port from becoming a Multicast device port.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide82
Address Table Commands
bridge aging time
Example
In this example, forwarding all Multicast packets to e1 with VLAN 2 is forbidden.
The bridge aging-time Global Configuration mode command sets the address
table aging time. To restore the default configuration, use the no form of this
command.
5
Syntax
bridge aging-time
no bridge aging-time
seconds
Parameters
•
seconds
— Time in seconds. (Range: 10-630 seconds)
Default Configuration
The default setting is 300 seconds.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide83
Address Table Commands
clear bridge
Example
In the following example, the bridge aging time is set to 250 seconds.
Console(config)# bridge aging-time 250
clear bridge
The clear bridge Privileged EXEC mode command removes any learned entries
from the forwarding database.
Syntax
5
clear bridge
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
There are no user guidelines for this command.
Example
In the following example, the bridge tables are cleared.
Console# clear bridge
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide84
Address Table Commands
port security
port security
The port security Interface Configuration mode command locks the port to block
unknown traffic and prevent the port from learning new addresses. To restore
defaults, use the no form of this command.
Syntax
5
port security [forward | discard | discard-shutdown] [trap
no port security
seconds
]
Parameters
•
forward — Forwards packets with unlearned source addresses, but does
not learn the address.
•discard — Discards packets with unlearned source addresses. This is the
default if no option is indicated.
•discard-shutdown — Discards packets with unlearned source addresses.
The port is also shut down.
•
seconds
seconds between consecutive traps. (Range: 1-1000000)
— Sends SNMP traps and defines the minimum amount of time in
•max — Maximum number of addresses that can be learned on the interface.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide85
Address Table Commands
port security mode
Example
In this example, port e1 forwards all packets without learning addresses of
packets from unknown sources and sends traps every 100 seconds if a packet
with an unknown source address is received.
Console(config)# interface ethernet e1
Console(config-if)# port security forward trap 100
port security mode
The port security mode Interface Configuration mode command configures the
port security mode. To restore defaults, use the no form of this command.
5
Syntax
port security mode {lock | mac-addresses}
no port security mode
Parameters
lock — Saves the current dynamic MAC addresses associated with the
•
port and disables learning, relearning and aging.
•mac-addresses — Deletes the current dynamic MAC addresses
associated with the port and learns up to the maximum number addresses
allowed on the port. Relearning and aging are enabled.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide86
Address Table Commands
port security max
User Guidelines
There are no user guidelines for this command.
Example
In this example, port security mode is set to dynamic for Ethernet interface e7.
Console(config)# interface ethernet e7
Console(config-if)# port security mode mac-addresses
port security max
5
The port security max Interface Configuration mode command configures the
maximum addresses that can be learned on the port while the port is in port
security max-addresses mode. Use the no form of this command to return to
default.
Syntax
port security max
no port security max
max-addr
Parameters
max-addr
•
port. The range is 1-128.
— Maximum number of addresses that can be learned on the
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide87
Address Table Commands
show bridge address-table
User Guidelines
There are no user guidelines for this command.
Example
In this example the port security max interface configuration command configures
the maximum addresses that can be learned on the port while the port is in port
security max-addresses mode.
Console(config)# interface ethernet e7
Console(config-if)# port security max max addr
show bridge address-table
5
The show bridge address-table Privileged EXEC mode command displays all
entries in the bridge-forwarding database.
Syntax
show bridge address-table [vlan
channel-number
| address
mac-address
vlan
] [ethernet
interface
]
| port-channel
port-
Parameters
vlan —
•
•
interface —
•
port-channel-number —
•
mac-address —
Specifies a valid VLAN, such as VLAN 1.
A valid Ethernet port.
A valid port-channel number.
A valid MAC address.
Default Configuration
This command has no default configuration.
SPS208G/SPS224G4/SPS2024 Command Line Interface Reference Guide88
Address Table Commands
show bridge address-table static
Command Mode
Privileged EXEC mode
User Guidelines
Internal usage VLANs (VLANs that are automatically allocated on ports with a
defined Layer 3 interface) are presented in the VLAN column by a port number
and not by a VLAN ID.
“Special” MAC addresses that were not statically defined or dynamically learned
are displayed in the MAC address table. This includes, for example, MAC
addresses defined in ACLs.
Example
5
In this example, all classes of entries in the bridge-forwarding database are
displayed
Console# show bridge address-table
Aging time is 300 secs
interface mac addressPortType