Dell Force10 S25N-S50N Command Line Reference Guide

0 (0)

FTOS Command Line

Reference Guide

FTOS 8.4.2.6

E-Series TeraScale, C-Series,

S-Series (S50/S25)

Notes, Cautions, and Warnings

NOTE: A NOTE indicates important information that helps you make better use of your computer.

CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

Information in this publication is subject to change without notice. © 2012 Dell Force10. All rights reserved.

Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.

Trademarks used in this text: Dell™, the DELL logo, Dell Precision™, OptiPlex™, Latitude™, PowerEdge™, PowerVault™, PowerConnect™, OpenManage™, EqualLogic™, KACE™, FlexAddress™ and Vostro™ are trademarks of Dell Inc. Intel®, Pentium®, Xeon®, Core™ and Celeron® are registered trademarks of Intel Corporation in the U.S. and other countries. AMD® is a registered trademark and AMD Opteron™, AMD Phenom™, and AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft®, Windows®, Windows Server®, MS-DOS® and Windows Vista® are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat Enterprise Linux® and Enterprise Linux® are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell® is a registered trademark and SUSE ™ is a trademark of Novell Inc. in the United States and other countries. Oracle® is a registered trademark of Oracle Corporation and/or its affiliates. Citrix®, Xen®, XenServer® and XenMotion® are either registered trademarks or trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware®, Virtual SMP®, vMotion®, vCenter®, and vSphere® are registered trademarks or trademarks of VMWare, Inc. in the United States or other countries.

Other trademarks and trade names may be used in this publication to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.

January 2012

Table of Contents

1 Preface

Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

Information Symbols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

Related Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

2 CLI Basics

Accessing the Command Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 Multiple Configuration Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Navigating the Command Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Obtaining Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 Using the Keyword No . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 Filtering show Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19

Displaying All Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20 Filtering Command Output Multiple Times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20 Command Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20 EXEC Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 EXEC Privilege Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 CONFIGURATION Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 INTERFACE Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 LINE Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 TRACE-LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 MAC ACCESS LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 IP ACCESS LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 ROUTE-MAP Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 PREFIX-LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 AS-PATH ACL Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 IP COMMUNITY LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 REDIRECT-LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 SPANNING TREE Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 Per-VLAN SPANNING TREE Plus Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 RAPID SPANNING TREE Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 MULTIPLE SPANNING TREE Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 PROTOCOL GVRP Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 ROUTER OSPF Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 ROUTER RIP Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 ROUTER ISIS Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 ROUTER BGP Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26

Determining the Chassis Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26

Table of Contents | 3

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

3 File Management

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

Basic File Management Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

Upgrading the C-Series FPGA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56

4 BOOT_USER Mode

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59

5 Control and Monitoring

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73

6 802.1ag

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159

7 802.3ah

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .171 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .171

8 802.1X

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .183

9 Access Control Lists (ACL)

 

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

199

Commands Common to all ACL Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

199

Common IP ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

201

Standard IP ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

205

Extended IP ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

212

Common MAC Access List Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

243

Standard MAC ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

246

Extended MAC ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

251

IP Prefix List Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

256

Route Map Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

262

AS-Path Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

279

IP Community List Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

282

10 ACL VLAN Group

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .287

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .287

4

|

Table of Contents

11 Bidirectional Forwarding Detection (BFD)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .293

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .293

12 Border Gateway Protocol IPv4 (BGPv4)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .307

BGPv4 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .307

MBGP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .383

BGP Extended Communities (RFC 4360) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .410

13 Content Addressable Memory (CAM) for ExaScale

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .419 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .419 Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .420

14 Content Addressable Memory (CAM)

 

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

427

CAM Profile Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

427

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

428

CAM IPv4flow Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

439

CAM Layer 2 ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

442

15 Configuration Rollback

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .445

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .445

16 Dynamic Host Configuration Protocol (DHCP)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .455 Commands to Configure the System to be a DHCP Server . . . . . . . . . . . . . . . . . . . . .455 Commands to Configure Secure DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .463

17 Equal Cost Multi-Path

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .471

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .471

18 Far-End Failure Detection (FEFD)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .477

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .477

19 Force10 Resilient Ring Protocol (FRRP)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .483

Table of Contents | 5

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .483

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .483

20 Force10 Service Agent

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .491

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .491

21 GARP VLAN Registration (GVRP)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .523

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .523

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .524

22 High Availability (HA)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .533

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .533

23 Internet Group Management Protocol (IGMP)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .543

IGMP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .543

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .543

IGMP Snooping Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .553

Important Points to Remember for IGMP Snooping . . . . . . . . . . . . . . . . . . . . . . . .553

Important Points to Remember for IGMP Querier . . . . . . . . . . . . . . . . . . . . . . . . . .554

24 Interfaces

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .559

Basic Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .559

Port Channel Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .614

Time Domain Reflectometer (TDR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .624

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .624

UDP Broadcast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .625

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .626

25 IPv4 Routing

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .629

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .629

26 IPv6 Access Control Lists (IPv6 ACLs)

 

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

681

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

681

IPv6 ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

682

6

|

Table of Contents

IPv6 Route Map Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .708

27 IPv6 Basics

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .713

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .713

28 IPv6 Border Gateway Protocol (IPv6 BGP)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .731

IPv6 BGP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .731

IPv6 MBGP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .793

29 Intermediate System to Intermediate System (IS-IS)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .817 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .817

30 Link Aggregation Control Protocol (LACP)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .859

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .859

31 Layer 2

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .865

MAC Addressing Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .865

Virtual LAN (VLAN) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .884

32 Link Layer Detection Protocol (LLDP)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .893

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .893

LLDP-MED Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .902

33 Multicast Listener Discovery (MLD)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 911

MLD Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 911

MLD Snooping Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .918

34 Multicast Source Discovery Protocol (MSDP)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .923

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .923

35 Multiple Spanning Tree Protocol (MSTP)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .933

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .933

Table of Contents | 7

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

36

Multicast

 

 

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

.949

 

IPv4 Multicast Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

.949

 

IPv6 Multicast Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

.966

37

Neighbor Discovery Protocol (NDP)

 

 

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

.973

 

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

.973

38

Object Tracking

 

 

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

.981

 

IPv4 Object Tracking Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

.981

 

IPv6 Object Tracking Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

.995

39

Open Shortest Path First (OSPFv2 and OSPFv3)

 

 

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1001

 

OSPFv2 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1001

 

OSPFv3 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1059

40

Policy-based Routing (PBR)

 

 

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1081

 

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1081

41

PIM-Dense Mode (PIM-DM)

 

 

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1091

 

IPv4 PIM-Dense Mode Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1091

42

PIM-Sparse Mode (PIM-SM)

 

 

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1093

 

IPv4 PIM-Sparse Mode Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1093

 

IPv6 PIM-Sparse Mode Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1116

43

PIM-Source Specific Mode (PIM-SSM)

 

 

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1127

 

IPv4 PIM Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1127

 

IPv4 PIM-Source Specific Mode Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1127

 

IPv6 PIM Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1129

 

IPv6 PIM-Source Specific Mode Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1129

44

Power over Ethernet (PoE)

 

 

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1131

8

|

Table of Contents

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1131

45 Port Monitoring

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1137

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1137

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1138

46 Private VLAN (PVLAN)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1151

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1151

Private VLAN Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1151

47 Per-VLAN Spanning Tree plus (PVST+)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1161 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1161

48 Quality of Service (QoS)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1175

Global Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1175

Per-Port QoS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1176

Policy-Based QoS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1184

Important Points to Remember—multicast-bandwidth option . . . . . . . . . . . . . . . . 1197

Queue-Level Debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1220

49 Router Information Protocol (RIP)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1231

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1231

50 Remote Monitoring (RMON)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1249

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1249

51 Rapid Spanning Tree Protocol (RSTP)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1261

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1261

52 Security

 

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1273

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1273

AAA Accounting Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1273

Authorization and Privilege Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1276

Table of Contents | 9

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

Authentication and Password Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1280

RADIUS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1291

TACACS+ Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1296

Port Authentication (802.1X) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1299

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1299

SSH Server and SCP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1306

Trace List Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1318

Secure DHCP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1328

53 Service Provider Bridging

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1333

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1333

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1333

54 sFlow

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1339 Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1339 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1340

55 SNMP and Syslog

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1351

SNMP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1351

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1352

Syslog Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1367

56 SONET

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1379

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1379

57 S-Series Stacking Commands

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1397

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1397

58 Storm Control

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1405

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1405

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1405

59 Spanning Tree Protocol (STP)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1413

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1413

10

|

Table of Contents

60 Time and Network Time Protocol (NTP)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1425

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1425

61 Uplink Failure Detection (UFD)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1441

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1441

62 VLAN Stacking

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1451

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1451

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1451

63 Virtual Routing and Forwarding (VRF)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1461

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1461

64 Virtual Router Redundancy Protocol (VRRP)

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1471

IPv4 VRRP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1471

IPv6 VRRP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1485

65 C-Series Diagnostics and Debugging

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1491

Inter-process Communication Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1491

RPM Management Port Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1497

Data Path Debugging Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1499

Interface Troubleshooting Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1502

Advanced ASIC Debugging Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1506

ACL and System-Flow Debug Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1510

Interface Management Debug Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1512

Layer 2 Debug Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1514

Trace Logging Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1515

Offline Diagnostic Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1521

PoE Hardware Status Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1523

Buffer Tuning Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1524

66 E-Series ExaScale Debugging and Diagnostics

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1531

Diagnostics and Monitoring Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1531

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1532

Table of Contents | 11

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

Offline Diagnostic Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1549

Hardware Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1552

67 E-Series Debugging and Diagnostics

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1575

Diagnostics and Monitoring Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1575

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1576

Offline Diagnostic Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1596

Hardware Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1598

68 S-Series Debugging and Diagnostics

Offline Diagnostic Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1615

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1615

Buffer Tuning Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1617

Hardware Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1622

AICMP Message Types

BSNMP Traps Index Command Index

12

|

Table of Contents

1

Preface

About this Guide

This book provides information on the FTOS Command Line Interface (CLI). It includes some information on the protocols and features found in FTOS and on the Dell Force10 systems supported by FTOS (C-Series c, E-Series e, and S-Series s).

This chapter includes:

Objectives

Audience

Conventions

Related Documents

Objectives

This document is intended as a reference guide for the FTOS command line interface (CLI) commands, with detailed syntax statements, along with usage information and sample output.

For details on when to use the commands, refer to the FTOS Configuration Guide. That guide contains an Appendix with a list of the RFCs and MIBs (management information base files) supported.

Audience

This document is intended for system administrators who are responsible for configuring or maintaining networks. This guide assumes you are knowledgeable in Layer 2 and Layer 3 networking technologies.

Conventions

 

This document uses the following conventions to describe command syntax:

 

 

Convention

Description

 

 

keyword

Keywords are in bold and should be entered in the CLI as listed.

 

 

parameter

Parameters are in italics and require a number or word to be entered in the CLI.

 

 

Preface | 13

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

{X}

Keywords and parameters within braces must be entered in the CLI.

[X]

Keywords and parameters within brackets are optional.

 

 

x | y

Keywords and parameters separated by bar require you to choose one.

 

 

x||y

Keywords and parameters separated by a double bar enables you to choose any or all of them.

 

 

Information Symbols

Table 1-1 describes symbols contained in this guide.

Table 1-1. Information Symbols

Symbol

Brief

Description

 

 

 

 

Note

This symbol signals important operational information.

 

 

 

 

Caution

This symbol signals information about situations that could result in equipment damage or loss

 

 

of data.

 

 

 

 

Warning

This symbol signals information about hardware handling that could result in injury.

 

 

 

 

 

c

C-Series

This symbol indicates that the selected feature is supported on the C-Series.

 

 

 

e

E-Series

This symbol indicates that the selected feature is supported on the E-Series TeraScale AND

 

 

E-Series ExaScale.

 

 

 

et

E-Series

This symbol indicates that the selected feature is supported on the E-Series TeraScale platform

 

TeraScale

only.

 

 

 

ex

E-Series

This symbol indicates that the selected feature is supported on the E-Series ExaScale platform

 

ExaScale

only.

 

 

 

s

S-Series

This symbol indicates that the selected feature is supported on the S-Series.

 

 

 

Related Documents

For more information about the system, refer to the following documents:

FTOS Configuration Guide

Installation and maintenance guides for your system

Release Notes for your system and FTOS version

14 | Preface

2

CLI Basics

This chapter describes the command structure and command modes. FTOS commands are in a text-based interface that allows you to use launch commands, change the command modes, and configure interfaces and protocols.

This chapter covers the following topics:

Accessing the Command Line

Multiple Configuration Users

Navigating the Command Line Interface

Obtaining Help

Using the Keyword No

Filtering show Commands

Command Modes

Accessing the Command Line

When the system boots successfully, you are positioned on the command line in the EXEC mode and not prompted to log in. You can access the commands through a serial console port or a Telnet session. When you Telnet into the switch, you are prompted to enter a login name and password.

Figure 2-1 is an example of a successful Telnet login session.

Figure 2-1. Login Example

telnet 172.31.1.53 Trying 172.31.1.53...

Connected to 172.31.1.53. Escape character is '^]'. Login: username

Password:

Force10>

Once you log into the switch, the prompt provides you with current command-level information (refer to Table 2-1).

CLI Basics | 15

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

Multiple Configuration Users

When a user enters the CONFIGURATION mode and another user(s) is already in that configuration mode, FTOS generates an alert warning message similar to the following:

Figure 2-2. Configuration Mode User Alert

Force10#conf

% Warning: The following users are currently configuring the system:

User "" on line console0

User "admin" on line vty0 ( 123.12.1.123 )

User "admin" on line vty1 ( 123.12.1.123 )

User "Irene" on line vty3 ( 123.12.1.321 )

Force10(conf)#Force10#

When another user enters the CONFIGURATION mode, FTOS sends a message similar to the following, where the user in this case is “admin” on vty2:

% Warning: User “admin” on line vty2 “172.16.1.210” is in configuration

Navigating the Command Line Interface

The Command Line Interface (CLI) prompt displayed by FTOS is comprised of:

“hostname”— the initial part of the prompt, “Force10” by default. You can change it with the hostname command, as described in hostname.

The second part of the prompt, reflecting the current CLI mode, as shown in Table 2-1.

The CLI prompt changes as you move up and down the levels of the command structure. Table 2-1 lists the prompts and their corresponding command levels, called modes. Starting with the CONFIGURATION mode, the command prompt adds modifiers to further identify the mode. The command modes are explained in Command Modes.

Note: Some of the following modes are not available on C-Series or S-Series.

Table 2-1. Command Prompt and Corresponding Command Mode

Prompt

CLI Command Mode

 

 

Force10>

EXEC

 

 

Force10#

EXEC Privilege

 

 

Force10(conf)#

CONFIGURATION

 

 

16

|

CLI Basics

Table 2-1. Command Prompt and Corresponding Command Mode

Prompt

CLI Command Mode

 

 

Force10(conf-if)#

INTERFACE

Force10(conf-if-gi-0/0)#

 

Force10(conf-if-te-0/0)#

 

Force10(conf-if-lo-0)#

 

Force10(conf-if-nu-0)#

 

Force10(conf-if-po-0)#

 

Force10(conf-if-vl-0)#

 

Force10(conf-if-so-0/0)#

 

Force10(conf-if-ma-0/0)#

 

Force10(conf-if-range)#

 

 

 

Force10(config-ext-nacl)#

IP ACCESS LIST

Force10(config-std-nacl)#

 

 

 

Force10(config-line-aux)#

LINE

Force10(config-line-console)#

 

Force10(config-line-vty)#

 

 

 

Force10(config-ext-macl)#

MAC ACCESS LIST

Force10(config-std-macl)#

 

 

 

Force10(config-mon-sess)#

MONITOR SESSION

 

 

Force10(config-span)#

STP

 

 

Force10(config-mstp)#

MULTIPLE SPANNING TREE

 

 

Force10(config-pvst)#

Per-VLAN SPANNING TREE Plus

 

 

Force10(config-rstp)#

RAPID SPANNING TREE

 

 

Force10(config-gvrp)#

PROTOCOL GVRP

 

 

Force10(config-route-map)#

ROUTE-MAP

 

 

Force10(conf-nprefixl)#

PREFIX-LIST

 

 

Force10(conf-router_rip)#

ROUTER RIP

 

 

Force10(conf-redirect-list)#

REDIRECT

 

 

Force10(conf-router_bgp)#

ROUTER BGP

 

 

Force10(conf-router_ospf)#

ROUTER OSPF

 

 

Force10(conf-router_isis)#

ROUTER ISIS

 

 

Force10(conf-trace-acl)#

TRACE-LIST

 

 

Obtaining Help

As soon as you are in a command mode there are several ways to access help.

To obtain a list of keywords at any command mode, do the following:

Enter a ? at the prompt or after a keyword. There must always be a space before the ?.

To obtain a list of keywords with a brief functional description, do the following:

Enter help at the prompt.

To obtain a list of available options, do the following:

CLI Basics | 17

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

Type a keyword followed by a space and a ?

Type a partial keyword followed by a ?

A display of keywords beginning with the partial keyword is listed.

Figure 2-3 illustrates the results of entering ip ? at the prompt.

Figure 2-3. Partial Keyword Example

Force10(conf)#ip ?

Named access-list

access-list

as-path

BGP autonomous system path filter

community-list

Add a community list entry

domain-list

Domain name to complete unqualified host name

domain-lookup

Enable IP Domain Name System hostname translation

domain-name

Define the default domain name

fib

FIB configuration commands

ftp

FTP configuration commands

host

Add an entry to the ip hostname table

max-frag-count

Max. fragmented packets allowed in IP re-assembly

multicast-routing

Enable IP multicast forwarding

name-server

Specify addess of name server to use

pim

Protocol Independent Multicast

prefix-list

Build a prefix list

radius

Interface configuration for RADIUS

redirect-list

Named redirect-list

route

Establish static routes

scp

SCP configuration commands

source-route

Process packets with source routing header options

ssh

SSH configuration commands

tacacs

Interface configuration for TACACS+

telnet

Specify telnet options

tftp

TFTP configuration commands

trace-group

Named trace-list

trace-list

Named trace-list

Force10(conf)#ip

 

When entering commands, you can take advantage of the following timesaving features:

The commands are not case sensitive.

You can enter partial (truncated) command keywords. For example, you can enter int gig int

interface for the interface gigabitethernet interface command.

Use the TAB key to complete keywords in commands.

Use the up arrow key to display the last enabled command.

Use either the Backspace key or the Delete key to erase the previous character.

18

|

CLI Basics

Use the left and right arrow keys to navigate left or right in the FTOS command line. Table 2-2 defines the key combinations valid at the FTOS command line.

Table 2-2. Short-cut Keys and their Actions

Key

 

Combination

Action

 

 

CNTL-A

Moves the cursor to the beginning of the command line.

 

 

CNTL-B

Moves the cursor back one character.

 

 

CNTL-D

Deletes character at cursor.

 

 

CNTL-E

Moves the cursor to the end of the line.

 

 

CNTL-F

Moves the cursor forward one character.

 

 

CNTL-I

Completes a keyword.

 

 

CNTL-K

Deletes all characters from the cursor to the end of the command line.

 

 

CNTL-L

Re-enters the previous command.

 

 

CNTL-N

Return to more recent commands in the history buffer after recalling commands with Ctrl-P

 

or the up arrow key

 

 

CNTL-P

Recalls commands, beginning with the last command

 

 

CNTL-R

Re-enters the previous command.

 

 

CNTL-U

Deletes the line.

 

 

CNTL-W

Deletes the previous word.

 

 

CNTL-X

Deletes the line.

 

 

CNTL-Z

Ends continuous scrolling of command outputs.

 

 

Esc B

Moves the cursor back one word.

 

 

Esc F

Moves the cursor forward one word.

 

 

Esc D

Deletes all characters from the cursor to the end of the word.

 

 

Using the Keyword No

To disable, delete, or return to default values, use the no form of the commands. For most commands, if you type the keyword no in front of the command, you will disable that command or delete it from the running configuration. In this document, the no form of the command is discussed in the Command Syntax portion of the command description.

Filtering show Commands

You can filter the display output of a show command to find specific information, to display certain information only, or to begin the command output at the first instance of a regular expression or phrase.

When you execute a show command, followed by a pipe ( | ) and one of the parameters listed below and a regular expression, the resulting output either excludes or includes those parameters, as defined by the parameter:

display — display additional configuration information

CLI Basics | 19

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

except— display only text that does not match the pattern (or regular expression)

find — search for the first occurrence of a pattern

grep — display text that matches a pattern

no-more — do not paginate the display output

save - copy output to a file for future use

Note: FTOS accepts a space before or after the pipe, no space before or after the pipe, or any

combination. For example:

Force10#command | grep gigabit |except regular-expression | find regular-expression

The grep command option has an ignore-case sub-option that makes the search case-insensitive. For example, the commands:

show run | grep Ethernet would return a search result with instances containing a capitalized

“Ethernet,” such as interface GigabitEthernet 0/0.

show run | grep ethernet would not return the search result, above, because it only searches for instances containing a non-capitalized “ethernet.”

Executing the command show run | grep Ethernet ignore-case would return instances containing both “Ethernet” and “ethernet.”

Displaying All Output

To display the output all at once (not one screen at a time), use the no-more after the pipe. This is similar to the terminal length screen-length command except that the no-more option affects the output of just the specified command.For example:

Force10#show running-config | no-more

Filtering Command Output Multiple Times

You can filter a single command output multiple times. Place the save option as the last filter. For example:

Force10# command | grep regular-expression | except regular-expression | grep other-regular-expression | find regular-expression | no-more | save

Command Modes

To navigate to various CLI modes, you need to use specific commands to launch each mode.

Navigation to these modes is discussed in the following sections.

Note: Some of the following modes are not available on C-Series or S-Series.

20

|

CLI Basics

EXEC Mode

When you initially log in to the switch, by default, you are logged into the EXEC mode. This mode allows you to view settings and to enter the EXEC Privilege mode to configure the device. While you are in the EXEC mode, the > prompt is displayed following the “hostname” prompt, as described above. which is “Force10” by default. You can change it with the hostname command. See the command hostname. Each mode prompt is preceded by the hostname.

EXEC Privilege Mode

The enable command accesses the EXEC Privilege mode. If an administrator has configured an “Enable” password, you will be prompted to enter it here.

The EXEC Privilege mode allows you to access all commands accessible in EXEC mode, plus other commands, such as to clear ARP entries and IP addresses. In addition, you can access the CONFIGURATION mode to configure interfaces, routes, and protocols on the switch. While you are logged in to the EXEC Privilege mode, the # prompt is displayed.

CONFIGURATION Mode

In the EXEC Privilege mode, use the configure command to enter the CONFIGURATION mode and configure routing protocols and access interfaces.

To enter the CONFIGURATION mode:

1.Verify that you are logged in to the EXEC Privilege mode.

2.Enter the configure command. The prompt changes to include (conf).

From this mode, you can enter INTERFACE by using the interface command.

INTERFACE Mode

Use the INTERFACE mode to configure interfaces or IP services on those interfaces. An interface can be physical (for example, a Gigabit Ethernet port) or virtual (for example, the Null interface).

To enter INTERFACE mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the interface command followed by an interface type and interface number that is available on the switch.

3.The prompt changes to include the designated interface and slot/port number, as outlined in Table 2-3.

Table 2-3. Interface prompts

Prompt

Interface Type

 

 

Force10(conf-if)#

INTERFACE mode

 

 

Force10(conf-if-gi-0/0)#

Gigabit Ethernet interface followed by slot/port information

 

 

Force10(conf-if-te-0/0)#

Ten Gigabit Ethernet interface followed by slot/port information

 

 

Force10(conf-if-lo-0)#

Loopback interface number.

 

 

CLI Basics | 21

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

Table 2-3. Interface prompts

Prompt

Interface Type

 

 

Force10(conf-if-nu-0)#

Null Interface followed by zero

 

 

Force10(conf-if-po-0)#

Port-channel interface number

 

 

Force10(conf-if-vl-0)#

VLAN Interface followed by VLAN number (range 1 to 4094)

 

 

Force10(conf-if-so-0/0)#

SONET interface followed by slot/port information.

 

 

Force10(conf-if-ma-0/0)#

Management Ethernet interface followed by slot/port information

 

 

Force10(conf-if-range)#

Designated interface range (used for bulk configuration; see interface range).

 

 

LINE Mode

Use the LINE mode to configure console or virtual terminal parameters.

To enter LINE mode:

1.Verify that you are logged in to the CONFIGURATION mode.

2.Enter the line command. You must include the keywords console or vty and their line number available on the switch.The prompt changes to include (config-line-console) or (config-line-vty).

You can exit this mode by using the exit command.

TRACE-LIST Mode

When in the CONFIGURATION mode, use the trace-list command to enter the TRACE-LIST mode and configure a Trace list.

1.Verify that you are logged in to the CONFIGURATION mode.

2.Enter the ip trace-list command. You must include the name of the Trace list. The prompt change to include (conf-trace-acl).

You can exit this mode by using the exit command.

MAC ACCESS LIST Mode

While in the CONFIGURATION mode, use the mac access-list standard or mac access-list extended command to enter the MAC ACCESS LIST mode and configure either standard or extended access control lists (ACL).

To enter MAC ACCESS LIST mode:

1.Verify that you are logged in to the CONFIGURATION mode.

2.Use the mac access-list standard or mac access-list extended command. You must include a name for the ACL.The prompt changes to include (conf-std-macl) or (conf-ext-macl).

You can return to the CONFIGURATION mode by entering the exit command.

22

|

CLI Basics

IP ACCESS LIST Mode

While in the CONFIGURATION mode, use the ip access-list standard or ip access-list extended command to enter the IP ACCESS LIST mode and configure either standard or extended access control lists (ACL).

To enter IP ACCESS LIST mode:

1.Verify that you are logged in to the CONFIGURATION mode.

2.Use the ip access-list standard or ip access-list extended command. You must include a name for the ACL.The prompt changes to include (conf-std-nacl) or (conf-ext-nacl).

You can return to the CONFIGURATION mode by entering the exit command.

ROUTE-MAP Mode

While in the CONFIGURATION mode, use the route-map command to enter the ROUTE-MAP mode and configure a route map.

To enter ROUTE-MAP mode:

1.Verify that you are logged in to the CONFIGURATION mode.

2.Use the route-map map-name [permit | deny] [sequence-number] command. The prompt changes to include (route-map).

You can return to the CONFIGURATION mode by entering the exit command.

PREFIX-LIST Mode

While in the CONFIGURATION mode, use the ip prefix-list command to enter the PREFIX-LIST mode and configure a prefix list.

To enter PREFIX-LIST mode:

1.Verify that you are logged in to the CONFIGURATION mode.

2.Enter the ip prefix-list command. You must include a name for the prefix list.The prompt changes to include (conf-nprefixl).

You can return to the CONFIGURATION mode by entering the exit command.

AS-PATH ACL Mode

Use the AS-PATH ACL mode to configure an AS-PATH Access Control List (ACL) on the E-Series. See Chapter 9, Access Control Lists (ACL).

To enter AS-PATH ACL mode:

1.Verify that you are logged in to the CONFIGURATION mode.

2.Enter the ip as-path access-list command. You must include a name for the AS-PATH ACL.The prompt changes to include (config-as-path).

You can return to the CONFIGURATION mode by entering the exit command.

CLI Basics | 23

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

IP COMMUNITY LIST Mode

Use the IP COMMUNITY LIST mode to configure an IP Community ACL on the E-Series. See Chapter 9, Access Control Lists (ACL).

To enter IP COMMUNITY LIST mode:

1.Verify that you are logged in to the CONFIGURATION mode.

2.Enter the ip community-list command. You must include a name for the Community list.The prompt changes to include (config-community-list).

You can return to the CONFIGURATION mode by entering the exit command.

REDIRECT-LIST Mode

Use the REDIRECT-LIST mode to configure a Redirect list on the E-Series, as described in Chapter 40, Policy-based Routing (PBR).

To enter REDIRECT-LIST mode:

1.Verify that you are logged in to the CONFIGURATION mode.

2.Use the ip redirect-list command. You must include a name for the Redirect-list.The prompt changes to include (conf-redirect-list).

You can return to the CONFIGURATION mode by entering the exit command.

SPANNING TREE Mode

Use the STP mode to enable and configure the Spanning Tree protocol, as described in Chapter 59, Spanning Tree Protocol (STP).

To enter STP mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the protocol spanning-tree stp-id command.

You can return to the CONFIGURATION mode by entering the exit command.

Per-VLAN SPANNING TREE Plus Mode

Use PVST+ mode to enable and configure the Per-VLAN Spanning Tree (PVST+) protocol, as described in Chapter 47, Per-VLAN Spanning Tree plus (PVST+).

Note: The protocol is PVST+, but the plus sign is dropped at the CLI prompt

To enter PVST+ mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the protocol spanning-tree pvst command.

You can return to the CONFIGURATION mode by entering the exit command.

24

|

CLI Basics

RAPID SPANNING TREE Mode

Use PVST+ mode to enable and configure the RSTP protocol, as described in Chapter 51, Rapid Spanning Tree Protocol (RSTP).

To enter RSTP mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the protocol spanning-tree rstp command.

You can return to the CONFIGURATION mode by entering the exit command.

MULTIPLE SPANNING TREE Mode

Use MULTIPLE SPANNING TREE mode to enable and configure the Multiple Spanning Tree protocol, as described in Chapter 35, Multiple Spanning Tree Protocol (MSTP).

To enter MULTIPLE SPANNING TREE mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the protocol spanning-tree mstp command.

You can return to the CONFIGURATION mode by entering the exit command.

PROTOCOL GVRP Mode

Use the PROTOCOL GVRP mode to enable and configure GARP VLAN Registration Protocol (GVRP), as described in Chapter 21, GARP VLAN Registration (GVRP).

To enter PROTOCOL GVRP mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the protocol gvrp command syntax.

You can return to the CONFIGURATION mode by entering the exit command.

ROUTER OSPF Mode

Use the ROUTER OSPF mode to configure OSPF, as described in Chapter 39, Open Shortest Path First (OSPFv2 and OSPFv3).

To enter ROUTER OSPF mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Use the router ospf {process-id} command.The prompt changes to include (conf-router_ospf-id).

You can switch to the INTERFACE mode by using the interface command or you can switch to the ROUTER RIP mode by using the router rip command.

CLI Basics | 25

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

ROUTER RIP Mode

Use the ROUTER RIP mode to configure RIP on the C-Series or E-Series, as described in Chapter 49, Router Information Protocol (RIP).

To enter ROUTER RIP mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the router rip command.The prompt changes to include (conf-router_rip).

You can switch to the INTERFACE mode by using the interface command or you can switch to the ROUTER OSPF mode by using the router ospf command.

ROUTER ISIS Mode

Use the ROUTER ISIS mode to configure ISIS on the E-Series, as described in Intermediate System to Intermediate System (IS-IS).

To enter ROUTER ISIS mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the router isis [tag] command.The prompt changes to include (conf-router_isis).

You can switch to the INTERFACE mode by using the interface command or you can switch to the ROUTER RIP mode by using the router rip command.

ROUTER BGP Mode

Use the ROUTER BGP mode to configure BGP on the C-Series or E-Series, as described in

Chapter 12, Border Gateway Protocol IPv4 (BGPv4).

To enter ROUTER BGP mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the router bgp as-number command.The prompt changes to include (conf-router_bgp).

You can return to the CONFIGURATION mode by entering the exit command.

Determining the Chassis Mode

The chassis mode in FTOS determines which hardware is being supported in an E-Series chassis. The chassis mode is programmed into an EEPROM on the backplane of the chassis and the change takes place only after the chassis is rebooted. Configuring the appropriate chassis mode enables the system to use all the ports on the card and recognize all software features.

26

|

CLI Basics

3

File Management

Overview

This chapter contains commands needed to manage the configuration files and includes other file management commands found in FTOS. This chapter contains these sections:

Basic File Management Commands

Upgrading the C-Series FPGA

Basic File Management Commands

The commands included in this chapter are:

boot config

boot host

boot network

boot system

boot system gateway

cd

change bootflash-image

copy

copy (Streamline Upgrade)

copy running-config startup-config

delete

dir

download alt-boot-image

download alt-full-image

download alt-system-image

format (C-Series and E-Series)

format flash (S-Series)

logging coredump

logging coredump server

pwd

rename

boot system

show bootvar

show file

File Management | 27

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

show file-systems

show linecard

show os-version

show running-config

show startup-config

show version

upgrade (E-Series version)

upgrade (C-Series version)

upgrade (S-Series management unit) on page 55

upgrade fpga-image

boot config

ce

Syntax

Parameters

Set the location and name of the configuration file that is loaded at system start-up (or reload) instead of the default startup-configuration.

boot config {remote-first | rpm0 file-url | rpm1 file-url}

remote-first Enter the keywords remote-first to attempt to load the boot configuration files from a remote location.

Defaults

Command Modes

Command

History

Usage

Information

rpm0

Enter the keywords rpm0 first to specify the local boot configuration file for RPM 0.

rpm1

Enter the keywords rpm1 first to specify the local boot configuration file for RPM 1.

 

 

file-url

Enter the location information:

 

For a file on the internal Flash, enter flash:// followed by the filename.

 

For a file on the external Flash, enter slot0:// followed by the filename.

Not configured.

CONFIGURATION

Version 7.5.1.0 Introduced on C-Series

E-Series original Command

To display these changes in the show bootvar command output, you must save the running configuration to the startup configuration (copy running-config startup-config or write).

Dell Force10 strongly recommends using local files for configuration (RPM0 or RPM1 flash or slot0).

When you specify a file as the boot config file, it is listed in the boot variables (bootvar) as LOCAL CONFIG FILE. If you do not specify a boot config file, then the startup-configuration is used, although the bootvar shows LOCAL CONFIG FILE = variable does not exist. When you specify a boot config file, the switch reloads with that config file, rather than the startup-config. Note that if you specify a local config file which is not present in the specified location, then the startup-configuration is loaded.

The write memory command always saves the running-configuration to the file labeled startup-configuration. When using a LOCAL CONFIG FILE other than the startup-config, use the copy command to save any running-configuration changes to that local file.

28

|

File Management

Dell Force10 S25N-S50N Command Line Reference Guide

Related

Commands

Output for show bootvar with no boot configuration configured

Force10#show bootvar

PRIMARY IMAGE FILE = flash://FTOS-EF-8.2.1.0.bin

SECONDARY IMAGE FILE = flash://FTOS-EF-7.6.1.0.bin

DEFAULT IMAGE FILE = flash://FTOS-EF-7.5.1.0.bin

LOCAL CONFIG FILE = variable does not exist

PRIMARY HOST CONFIG FILE = variable does not exist

SECONDARY HOST CONFIG FILE = variable does not exist

PRIMARY NETWORK CONFIG FILE = variable does not exist

SECONDARY NETWORK CONFIG FILE = variable does not exist

CURRENT IMAGE FILE = flash://FTOS-EF-8.2.1.0.bin

CURRENT CONFIG FILE 1 = flash://startup-config

CURRENT CONFIG FILE 2 = variable does not exist

CONFIG LOAD PREFERENCE = local first

BOOT INTERFACE GATEWAY IP ADDRESS = variable does not exist

Output for show bootvar with boot configuration configured

Force10#show bootvar

PRIMARY IMAGE FILE = flash://FTOS-EF-8.2.1.0.bin

SECONDARY IMAGE FILE = flash://FTOS-EF-7.6.1.0.bin

DEFAULT IMAGE FILE = flash://FTOS-EF-7.5.1.0.bin

LOCAL CONFIG FILE = variable does not exist

PRIMARY HOST CONFIG FILE = variable does not exist

SECONDARY HOST CONFIG FILE = variable does not exist

PRIMARY NETWORK CONFIG FILE = variable does not exist

SECONDARY NETWORK CONFIG FILE = variable does not exist

CURRENT IMAGE FILE = flash://FTOS-EF-8.2.1.0.bin

CURRENT CONFIG FILE 1 = flash://CustomerA.cfg

CURRENT CONFIG FILE 2 = variable does not exist

CONFIG LOAD PREFERENCE = local first

BOOT INTERFACE GATEWAY IP ADDRESS = variable does not exist

show bootvar

Display the variable settings for the E-Series boot parameters.

boot host

ce

Syntax

Parameters

Defaults

Command Modes

Command

History

Usage

Information

Set the location of the configuration file from a remote host.

boot host {primary | secondary} remote-url

primary

Enter the keywords primary to attempt to load the primary host configuration files.

secondary

Enter the keywords secondary to attempt to load the secondary host configuration files.

remote-url Enter the following location keywords and information:

For a file on an FTP server, enter ftp://user:password@hostip/filepath

For a file on a TFTP server, enter tftp://hostip/filepath

Not configured.

CONFIGURATION

Version 7.5.1.0 Introduced on C-Series

E-Series original Command

To display these changes in the show bootvar command output, you must save the running configuration to the startup configuration (using the copy command).

File Management | 29

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

Related

 

 

show bootvar

Display the variable settings for the E-Series boot parameters.

Commands

 

 

boot network

ce

Syntax

Parameters

Set the location of the configuration file in a remote network.

boot network {primary | secondary} remote-url

primary

Enter the keywords primary to attempt to load the primary network configuration files.

secondary

Enter the keywords secondary to attempt to load the secondary network configuration

 

files.

Defaults

Command Modes

Command

History

Usage

Information

Related

Commands

remote-url Enter the following location keywords and information:

For a file on an FTP server, enter ftp://user:password@hostip/filepath

For a file on a TFTP server, enter tftp://hostip/filepath

None

CONFIGURATION

Version 7.5.1.0 Introduced on C-Series

E-Series original Command

To display these changes in the show bootvar command output, you must save the running configuration to the startup configuration (using the copy command).

show bootvar Display the variable settings for the E-Series boot parameters.

boot system

ce

Syntax

Parameters

Tell the system where to access the FTOS image used to boot the system.

boot system {rpm0 | rpm1} (default | primary | secondary} file-url

rpm0

Enter the keyword rpm0 to configure boot parameters for RPM0.

rpm1

Enter the keyword rpm1 to configure boot parameters for RPM1.

 

 

default

After entering rpm0 or rpm1, enter the keyword default to specify the parameters to

 

be used if those specified by primary or secondary fail. The default location should

 

always be the internal flash device (flash:), so that you can be sure that a verified image is

 

available there.

 

 

primary

After entering rpm0 or rpm1, enter the keyword primary to configure the boot

 

parameters used in the first attempt to boot FTOS.

 

 

30

|

File Management

Loading...
+ 1656 hidden pages