Dell Force10 S4810P Command Reference Guide

0 (0)

FTOS Command Line Reference Guide for the S4810 System FTOS 8.3.12.1

Publication Date: November 2012

Notes, Cautions, and Warnings

NOTE: A NOTE indicates important information that helps you make better use of your computer.

CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.

WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

Information in this publication is subject to change without notice. © 2012 Dell Force10. All rights reserved.

Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.

Trademarks used in this text: Dell™, the DELL logo, Dell Precision™, OptiPlex™, Latitude™, PowerEdge™, PowerVault™, PowerConnect™, OpenManage™, EqualLogic™, KACE™, FlexAddress™ and Vostro™ are trademarks of Dell Inc. Intel®, Pentium®, Xeon®, Core™ and Celeron® are registered trademarks of Intel Corporation in the U.S. and other countries. AMD® is a registered trademark and AMD Opteron™, AMD Phenom™, and AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft®, Windows®, Windows Server®, MS-DOS® and Windows Vista® are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat Enterprise Linux® and Enterprise Linux® are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell® is a registered trademark and SUSE ™ is a trademark of Novell Inc. in the United States and other countries. Oracle® is a registered trademark of Oracle Corporation and/or its affiliates. Citrix®, Xen®, XenServer® and XenMotion® are either registered trademarks or trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware®, Virtual SMP®, vMotion®, vCenter®, and vSphere® are registered trademarks or trademarks of VMWare, Inc. in the United States or other countries.

Other trademarks and trade names may be used in this publication to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.

November 2012

1 About this Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 Information Symbols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 Related Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

2 CLI Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15

Accessing the Command Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 Multiple Configuration Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Navigating the Command Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Obtaining Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 Using the Keyword No . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 Filtering show Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19

Displaying All Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20 Filtering Command Output Multiple Times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20 Command Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 EXEC Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 EXEC Privilege Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 CONFIGURATION Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 INTERFACE Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 LINE Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 TRACE-LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22 MAC ACCESS LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 IP ACCESS LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 ROUTE-MAP Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 PREFIX-LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 AS-PATH ACL Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 IP COMMUNITY LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 REDIRECT-LIST Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 SPANNING TREE Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 Per-VLAN SPANNING TREE Plus Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 RAPID SPANNING TREE Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 MULTIPLE SPANNING TREE Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 PROTOCOL GVRP Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 ROUTER OSPF Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 ROUTER RIP Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 ROUTER ISIS Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 ROUTER BGP Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27 VLT DOMAIN Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

Determining the Chassis Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

3 File Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29

Basic File Management Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29

| 3

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

Upgrading the C-Series FPGA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61

4 Control and Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65

5 802.1ag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153

6 802.1X. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166

7 Access Control Lists (ACL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .181

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

181

Commands Common to all ACL Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

181

Common IP ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

184

Standard IP ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

188

Extended IP ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

196

Common MAC Access List Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

231

Standard MAC ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

234

Extended MAC ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

238

IP Prefix List Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

244

Route Map Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

250

AS-Path Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

269

IP Community List Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

272

8 Bidirectional Forwarding Detection (BFD). . . . . . . . . . . . . . . . . . . . . . . .277

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .277

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .277

9 Border Gateway Protocol IPv4 (BGPv4) . . . . . . . . . . . . . . . . . . . . . . . . .293

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .293

BGPv4 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .293

MBGP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .378

BGP Extended Communities (RFC 4360) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .403

10 Bare Metal Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .413

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .413

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .413

4 |

11 Content Addressable Memory (CAM) . . . . . . . . . . . . . . . . . . . . . . . . . . .417

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

417

CAM Profile Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

417

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

418

CAM IPv4flow Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

431

CAM Layer 2 ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

434

12 Control Plane Policing (CoPP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .439

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .439

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .439

13 Data Center Bridging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .445

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .445

DCB Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .445

PFC Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .445

ETS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .446

DCBX Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .446

14 Dynamic Host Configuration Protocol (DHCP) . . . . . . . . . . . . . . . . . . . .479

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .479 Commands to Configure the System to be a DHCP Server . . . . . . . . . . . . . . . . . . . . .479 Commands to Configure Secure DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .486

15 Equal Cost Multi-Path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .495

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .495

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .495

16 FIP Snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .505

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .505

FIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .505

17 Force10 Resilient Ring Protocol (FRRP) . . . . . . . . . . . . . . . . . . . . . . . .517

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .517

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .517

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .517

18 GARP VLAN Registration (GVRP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .525

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .525

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .525

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .526

| 5

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

19 High Availability (HA). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .535

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .535

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .535

20 ICMP Message Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .547

21 Internet Group Management Protocol (IGMP) . . . . . . . . . . . . . . . . . . . .549

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .549

IGMP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .549

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .549

IGMP Snooping Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .561

Important Points to Remember for IGMP Snooping . . . . . . . . . . . . . . . . . . . . . . . .561

Important Points to Remember for IGMP Querier . . . . . . . . . . . . . . . . . . . . . . . . . .562

22 Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .567

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .567

Basic Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .567

Port Channel Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .629

Time Domain Reflectometer (TDR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .640

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .640

UDP Broadcast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .642

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .642

23 IPv4 Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .647

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .647

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .647

24 IPv6 Access Control Lists (IPv6 ACLs) . . . . . . . . . . . . . . . . . . . . . . . . .707

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

707

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

707

IPv6 ACL Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

708

IPv6 Route Map Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

734

25 IPv6 Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .739

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .739

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .739

26 IPv6 Border Gateway Protocol (IPv6 BGP). . . . . . . . . . . . . . . . . . . . . . .761

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .761

IPv6 BGP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .761

IPv6 MBGP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .827

6 |

27 iSCSI Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .853

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .853

28 Intermediate System to Intermediate System (IS-IS) . . . . . . . . . . . . . . .861

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .861 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .861

29 Link Aggregation Control Protocol (LACP) . . . . . . . . . . . . . . . . . . . . . . .907

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .907

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .907

30 Layer 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .915

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .915

MAC Addressing Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .915

Virtual LAN (VLAN) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .936

Far-End Failure Detection (FEFD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .947

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .947

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .947

31 Link Layer Discovery Protocol (LLDP) . . . . . . . . . . . . . . . . . . . . . . . . . .955

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .955

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .955

LLDP-MED Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .965

32 Multicast Source Discovery Protocol (MSDP). . . . . . . . . . . . . . . . . . . . .975

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .975

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .975

33 Multiple Spanning Tree Protocol (MSTP) . . . . . . . . . . . . . . . . . . . . . . . .987

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .987

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .987

34 Multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1003

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1003

IPv4 Multicast Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1003

IPv6 Multicast Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1013

35 Neighbor Discovery Protocol (NDP) . . . . . . . . . . . . . . . . . . . . . . . . . . .1019

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1019

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1019

| 7

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

36 Object Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1027

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1027

IPv4 Object Tracking Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1027

IPv6 Object Tracking Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1039

37 Open Shortest Path First (OSPFv2) . . . . . . . . . . . . . . . . . . . . . . . . . . .1045

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1045

OSPFv2 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1045

38 PIM-Sparse Mode (PIM-SM). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1107

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1107

IPv4 PIM-Sparse Mode Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1107

IPv6 PIM-Sparse Mode Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1130

39 Port Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1143

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1143

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1143

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1143

40 Private VLAN (PVLAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1149

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1149

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1149

Private VLAN Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1149

41 Per-VLAN Spanning Tree Plus (PVST+). . . . . . . . . . . . . . . . . . . . . . . .1159

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1159

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1159

42 Quality of Service (QoS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1173

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1173

Global Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1173

Per-Port QoS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1174

Policy-Based QoS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1184

Important Points to Remember — multicast-bandwidth option . . . . . . . . . . . . . . . 1199

Queue-Level Debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1223

43 Routing Information Protocol (RIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . .1233

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1233

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1233

8 |

44 Remote Monitoring (RMON) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1253

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1253

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1253

45 Rapid Spanning Tree Protocol (RSTP) . . . . . . . . . . . . . . . . . . . . . . . . .1267

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1267

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1267

46 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1279

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1279

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1279

AAA Accounting Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1279

Authorization and Privilege Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1283

Authentication and Password Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1287

RADIUS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1300

TACACS+ Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1306

Port Authentication (802.1X) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1309

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1310

SSH Server and SCP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1319

Trace List Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1334

Secure DHCP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1344

47 Service Provider Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1349

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1349

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1349

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1349

48 sFlow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1355

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1355 Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1355 Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1356

49 Simple Network Management Protocol and Syslog . . . . . . . . . . . . . . .1367

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1367

SNMP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1367

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1368

Syslog Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1385

50 S-Series Stacking Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1399

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1399

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1399

| 9

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

51 Storm Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1409

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1409

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1409

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1409

52 Spanning Tree Protocol (STP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1419

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1419

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1419

53 System Time and Date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1431

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1431

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1431

54 VLAN Stacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1449

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1449

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1449

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1449

55 S4810 u-Boot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1461

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1461

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1461

56 Uplink Failure Detection (UFD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1465

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1465

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1465

57 Virtual Link Trunking (VLT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1475

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1475

Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1475

58 Virtual Router Redundancy Protocol (VRRP) . . . . . . . . . . . . . . . . . . . .1487

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1487

IPv4 VRRP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1487

IPv6 VRRP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1500

59 S-Series Debugging and Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . .1505

Offline Diagnostic Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1505

Important Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1505

Buffer Tuning Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1508

Hardware Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1513

10 |

60 SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1525

61 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1529

62 Command Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1565

| 11

| 12

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

1

About this Guide

This book provides information on the FTOS Command Line Interface (CLI). It includes some information on the protocols and features found in FTOS and on the Dell Force10 systems supported by FTOS (C-Series c, E-Series e, and S-Series s).

This chapter includes:

Objectives

Audience

Conventions

Related Documents

Objectives

This document is intended as a reference guide for the FTOS command line interface (CLI) commands, with detailed syntax statements, along with usage information and sample output.

For details on when to use the commands, refer to the FTOS Configuration Guide. That guide contains a chapter with a list of the RFCs and MIBs (management information base files) supported.

Audience

This document is intended for system administrators who are responsible for configuring or maintaining networks. This guide assumes you are knowledgeable in Layer 2 and Layer 3 networking technologies.

About this Guide | 13

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

 

Conventions

 

This document uses the following conventions to describe command syntax:

 

 

Convention

Description

 

 

keyword

Keywords are in bold and should be entered in the CLI as listed.

 

 

parameter

Parameters are in italics and require a number or word to be entered in the CLI.

 

 

{X}

Keywords and parameters within braces must be entered in the CLI.

 

 

[X]

Keywords and parameters within brackets are optional.

 

 

x | y

Keywords and parameters separated by bar require you to choose one.

 

 

x||y

Keywords and parameters separated by a double bar enables you to choose any or all of them.

 

 

Information Symbols

Table 1-1 describes symbols contained in this guide.

Table 1-1. Information Symbols

Symbol

Brief

Description

 

 

 

c

C-Series

This symbol indicates that the selected feature is supported on the C-Series.

 

 

 

e

E-Series

This symbol indicates that the selected feature is supported on the E-Series TeraScale AND

 

 

E-Series ExaScale.

 

 

 

et

E-Series

This symbol indicates that the selected feature is supported on the E-Series TeraScale platform

 

TeraScale

only.

 

 

 

ex

E-Series

This symbol indicates that the selected feature is supported on the E-Series ExaScale platform

 

ExaScale

only.

 

 

 

s

S-Series

This symbol indicates that the selected feature is supported on the S-Series.

 

 

 

Related Documents

For more information about the system, refer to the following documents:

FTOS Configuration Guide

Installation and maintenance guides for your system

Release Notes for your system and FTOS version

14

|

About this Guide

2

CLI Basics

This chapter describes the command structure and command modes. FTOS commands are in a text-based interface that allows you to use launch commands, change the command modes, and configure interfaces and protocols.

This chapter covers the following topics:

Accessing the Command Line

Multiple Configuration Users

Navigating the Command Line Interface

Obtaining Help

Using the Keyword No

Filtering show Commands

Command Modes

Accessing the Command Line

When the system boots successfully, you are positioned on the command line in the EXEC mode and not prompted to log in. You can access the commands through a serial console port or a Telnet session. When you Telnet into the switch, you are prompted to enter a login name and password.

The following text is an example of a successful Telnet login session.

telnet 172.31.1.53 Trying 172.31.1.53...

Connected to 172.31.1.53. Escape character is '^]'. Login: username

Password: FTOS>

Once you log into the switch, the prompt provides you with current command-level information (refer to Table 2-1).

CLI Basics | 15

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

Multiple Configuration Users

When a user enters the CONFIGURATION mode and another user(s) is already in that configuration mode, FTOS generates an alert warning message similar to the following:

FTOS#conf

% Warning: The following users are currently configuring the system:

User "" on line console0

User "admin" on line vty0 ( 123.12.1.123 )

User "admin" on line vty1 ( 123.12.1.123 )

User "Irene" on line vty3 ( 123.12.1.321 )

FTOS#conf

When another user enters the CONFIGURATION mode, FTOS sends a message similar to the following, where the user in this case is “admin” on vty2:

% Warning: User "admin" on line vty2 "172.16.1.210" is in configuration

Navigating the Command Line Interface

The Command Line Interface (CLI) prompt displayed by FTOS is comprised of:

“hostname”— the initial part of the prompt, “FTOS” by default. You can change it with the hostname command, as described in hostname.

The second part of the prompt, reflecting the current CLI mode, as shown in Table 2-1.

The CLI prompt changes as you move up and down the levels of the command structure. Table 2-1 lists the prompts and their corresponding command levels, called modes. Starting with the CONFIGURATION mode, the command prompt adds modifiers to further identify the mode. The command modes are explained in Command Modes.

Note: Some of the following modes are not available on C-Series or S-Series.

Table 2-1. Command Prompt and Corresponding Command Mode

Prompt

CLI Command Mode

 

 

FTOS>

EXEC

 

 

FTOS#

EXEC Privilege

 

 

FTOS(conf)#

CONFIGURATION

 

 

16

|

CLI Basics

Table 2-1. Command Prompt and Corresponding Command Mode

Prompt

CLI Command Mode

 

 

FTOS(conf-if)#

INTERFACE

FTOS(conf-if-gi-0/0)#

 

FTOS(conf-if-te-0/0)#

 

FTOS(conf-if-fo-0/0)#

 

FTOS(conf-if-lo-0)#

 

FTOS(conf-if-nu-0)#

 

FTOS(conf-if-po-0)#

 

FTOS(conf-if-vl-0)#

 

FTOS(conf-if-so-0/0)#

 

FTOS(conf-if-ma-0/0)#

 

FTOS(conf-if-range)#

 

 

 

FTOS(config-ext-nacl)#

IP ACCESS LIST

FTOS(config-std-nacl)#

 

 

 

FTOS(config-line-aux)#

LINE

FTOS(config-line-console)#

 

FTOS(config-line-vty)#

 

 

 

FTOS(config-ext-macl)#

MAC ACCESS LIST

FTOS(config-std-macl)#

 

 

 

FTOS(config-mon-sess)#

MONITOR SESSION

 

 

FTOS(config-span)#

STP

 

 

FTOS(config-mstp)#

MULTIPLE SPANNING TREE

 

 

FTOS(config-pvst)#

Per-VLAN SPANNING TREE Plus

 

 

FTOS(config-rstp)#

RAPID SPANNING TREE

 

 

FTOS(config-gvrp)#

PROTOCOL GVRP

 

 

FTOS(config-route-map)#

ROUTE-MAP

 

 

FTOS(conf-nprefixl)#

PREFIX-LIST

 

 

FTOS(conf-router_rip)#

ROUTER RIP

 

 

FTOS(conf-redirect-list)#

REDIRECT

 

 

FTOS(conf-router_bgp)#

ROUTER BGP

 

 

FTOS(conf-router_ospf)#

ROUTER OSPF

 

 

FTOS(conf-router_isis)#

ROUTER ISIS

 

 

FTOS(conf-trace-acl)#

TRACE-LIST

 

 

FTOS(config-vlt-domain)

VLT DOMAIN

 

 

Obtaining Help

As soon as you are in a command mode there are several ways to access help.

To obtain a list of keywords at any command mode, do the following:

CLI Basics | 17

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

Enter a ? at the prompt or after a keyword. There must always be a space before the ?.

To obtain a list of keywords with a brief functional description, do the following:

Enter help at the prompt.

To obtain a list of available options, do the following:

Type a keyword followed by a space and a ?

Type a partial keyword followed by a ?

A display of keywords beginning with the partial keyword is listed.

The following text illustrates the results of entering ip ? at the prompt.

FTOS(conf)#ip ?

Named access-list

access-list

as-path

BGP autonomous system path filter

community-list

Add a community list entry

domain-list

Domain name to complete unqualified host name

domain-lookup

Enable IP Domain Name System hostname translation

domain-name

Define the default domain name

fib

FIB configuration commands

ftp

FTP configuration commands

host

Add an entry to the ip hostname table

max-frag-count

Max. fragmented packets allowed in IP re-assembly

multicast-routing

Enable IP multicast forwarding

name-server

Specify address of name server to use

pim

Protocol Independent Multicast

prefix-list

Build a prefix list

radius

Interface configuration for RADIUS

redirect-list

Named redirect-list

route

Establish static routes

scp

SCP configuration commands

source-route

Process packets with source routing header options

ssh

SSH configuration commands

tacacs

Interface configuration for TACACS+

telnet

Specify telnet options

tftp

TFTP configuration commands

trace-group

Named trace-list

trace-list

Named trace-list

FTOS(conf)#ip

 

When entering commands, you can take advantage of the following timesaving features:

The commands are not case sensitive.

You can enter partial (truncated) command keywords. For example, you can enter int gig int interface for the interface gigabitethernet interface command.

Use the TAB key to complete keywords in commands.

Use the up arrow key to display the last enabled command.

Use either the Backspace key or the Delete key to erase the previous character.

18

|

CLI Basics

Use the left and right arrow keys to navigate left or right in the FTOS command line. Table 2-2 defines the key combinations valid at the FTOS command line.

Table 2-2. Short-cut Keys and their Actions

Key

 

Combination

Action

 

 

CNTL-A

Moves the cursor to the beginning of the command line.

 

 

CNTL-B

Moves the cursor back one character.

 

 

CNTL-D

Deletes character at cursor.

 

 

CNTL-E

Moves the cursor to the end of the line.

 

 

CNTL-F

Moves the cursor forward one character.

 

 

CNTL-I

Completes a keyword.

 

 

CNTL-K

Deletes all characters from the cursor to the end of the command line.

 

 

CNTL-L

Re-enters the previous command.

 

 

CNTL-N

Return to more recent commands in the history buffer after recalling commands

 

with Ctrl-P or the up arrow key

 

 

CNTL-P

Recalls commands, beginning with the last command

 

 

CNTL-R

Re-enters the previous command.

 

 

CNTL-U

Deletes the line.

 

 

CNTL-W

Deletes the previous word.

 

 

CNTL-X

Deletes the line.

 

 

CNTL-Z

Ends continuous scrolling of command outputs.

 

 

Esc B

Moves the cursor back one word.

 

 

Esc F

Moves the cursor forward one word.

 

 

Esc D

Deletes all characters from the cursor to the end of the word.

 

 

Using the Keyword No

To disable, delete, or return to default values, use the no form of the commands. For most commands, if you type the keyword no in front of the command, you will disable that command or delete it from the running configuration. In this document, the no form of the command is discussed in the Command Syntax portion of the command description.

Filtering show Commands

You can filter the display output of a show command to find specific information, to display certain information only, or to begin the command output at the first instance of a regular expression or phrase.

CLI Basics | 19

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

When you execute a show command, followed by a pipe ( | ) and one of the parameters listed below and a regular expression, the resulting output either excludes or includes those parameters, as defined by the parameter:

display — display additional configuration information

except— display only text that does not match the pattern (or regular expression)

find — search for the first occurrence of a pattern

grep — display text that matches a pattern

no-more — do not paginate the display output

save — copy output to a file for future use

Note: FTOS accepts a space before or after the pipe, no space before or after the pipe, or any combination. For example:

FTOS#command | grep gigabit |except regular-expression | find regular-expression

The grep command option has an ignore-case sub-option that makes the search case-insensitive. For example, the commands:

show run | grep Ethernet would return a search result with instances containing a

capitalized “Ethernet,” such as interface GigabitEthernet 0/0.

show run | grep ethernet would not return the search result, above, because it only

searches for instances containing a non-capitalized “ethernet.”

Executing the command show run | grep Ethernet ignore-case would return instances containing both “Ethernet” and “ethernet.”

Displaying All Output

To display the output all at once (not one screen at a time), use the no-more after the pipe. This is similar to the terminal length screen-length command except that the no-more option affects the output of just the specified command.For example:

FTOS#show running-config|no-more

Filtering Command Output Multiple Times

You can filter a single command output multiple times. Place the save option as the last filter. For example:

FTOS# command | grep regular-expression | except regular-expression | grep other-regular-expression | find regular-expression | no-more | save

20

|

CLI Basics

Command Modes

To navigate to various CLI modes, you need to use specific commands to launch each mode. Navigation to these modes is discussed in the following sections.

Note: Some of the following modes are not available on C-Series or S-Series.

EXEC Mode

When you initially log in to the switch, by default, you are logged into the EXEC mode. This mode allows you to view settings and to enter the EXEC Privilege mode to configure the device. While you are in the EXEC mode, the > prompt is displayed following the “hostname” prompt, as described above, which is “FTOS” by default. You can change it with the hostname command. Refer to the command hostname. Each mode prompt is preceded by the hostname.

EXEC Privilege Mode

The enable command accesses the EXEC Privilege mode. If an administrator has configured an “Enable” password, you will be prompted to enter it here.

The EXEC Privilege mode allows you to access all commands accessible in EXEC mode, plus other commands, such as to clear ARP entries and IP addresses. In addition, you can access the CONFIGURATION mode to configure interfaces, routes, and protocols on the switch. While you are logged in to the EXEC Privilege mode, the # prompt is displayed.

CONFIGURATION Mode

In the EXEC Privilege mode, use the configure command to enter the CONFIGURATION mode and configure routing protocols and access interfaces.

To enter the CONFIGURATION mode:

1.Verify that you are logged in to the EXEC Privilege mode.

2.Enter the configure command. The prompt changes to include (conf).

From this mode, you can enter INTERFACE by using the interface command.

INTERFACE Mode

Use the INTERFACE mode to configure interfaces or IP services on those interfaces. An interface can be physical (for example, a Gigabit Ethernet port) or virtual (for example, the Null interface).

CLI Basics | 21

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

To enter INTERFACE mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the interface command followed by an interface type and interface number that is available on the switch.

3.The prompt changes to include the designated interface and slot/port number, as outlined in Table 2-3.

Table 2-3. Interface prompts

Prompt

Interface Type

 

 

FTOS(conf-if)#

INTERFACE mode

 

 

FTOS(conf-if-gi-0/0)#

Gigabit Ethernet interface followed by slot/port information

 

 

FTOS(conf-if-te-0/0)#

Ten Gigabit Ethernet interface followed by slot/port information

 

 

FTOS(conf-if-fo-0/0)#

Forty Gigabit Ethernet interface followed by slot/port information

 

 

FTOS(conf-if-lo-0)#

Loopback interface number.

 

 

FTOS(conf-if-nu-0)#

Null Interface followed by zero

 

 

FTOS(conf-if-po-0)#

Port-channel interface number

 

 

FTOS(conf-if-vl-0)#

VLAN Interface followed by VLAN number (range 1 to 4094)

 

 

FTOS(conf-if-so-0/0)#

SONET interface followed by slot/port information.

 

 

FTOS(conf-if-ma-0/0)#

Management Ethernet interface followed by slot/port information

 

 

FTOS(conf-if-range)#

Designated interface range (used for bulk configuration; refer to

 

interface range).

 

 

LINE Mode

Use the LINE mode to configure console or virtual terminal parameters.

To enter LINE mode:

1.Verify that you are logged in to the CONFIGURATION mode.

2.Enter the line command. You must include the keywords console or vty and their line number available on the switch.The prompt changes to include (config-line-console) or (con- fig-line-vty).

You can exit this mode by using the exit command.

TRACE-LIST Mode

When in the CONFIGURATION mode, use the trace-list command to enter the TRACE-LIST mode and configure a Trace list.

1.Verify that you are logged in to the CONFIGURATION mode.

2.Enter the ip trace-list command. You must include the name of the Trace list. The prompt change to include (conf-trace-acl).

22

|

CLI Basics

You can exit this mode by using the exit command.

MAC ACCESS LIST Mode

While in the CONFIGURATION mode, use the mac access-list standard or mac access-list extended command to enter the MAC ACCESS LIST mode and configure either standard or extended access control lists (ACL).

To enter MAC ACCESS LIST mode:

1.Verify that you are logged in to the CONFIGURATION mode.

2.Use the mac access-list standard or mac access-list extended command. You must include a name for the ACL.The prompt changes to include (conf-std-macl) or (conf-ext-macl).

You can return to the CONFIGURATION mode by entering the exit command.

IP ACCESS LIST Mode

While in the CONFIGURATION mode, use the ip access-list standard or ip access-list extended command to enter the IP ACCESS LIST mode and configure either standard or extended access control lists (ACL).

To enter IP ACCESS LIST mode:

1.Verify that you are logged in to the CONFIGURATION mode.

2.Use the ip access-list standard or ip access-list extended command. You must include a name for the ACL.The prompt changes to include (conf-std-nacl) or (conf-ext-nacl).

You can return to the CONFIGURATION mode by entering the exit command.

ROUTE-MAP Mode

While in the CONFIGURATION mode, use the route-map command to enter the ROUTE-MAP mode and configure a route map.

To enter ROUTE-MAP mode:

1.Verify that you are logged in to the CONFIGURATION mode.

2.Use the route-map map-name [permit | deny] [sequence-number] command. The prompt changes to include (route-map).

You can return to the CONFIGURATION mode by entering the exit command.

CLI Basics | 23

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

PREFIX-LIST Mode

While in the CONFIGURATION mode, use the ip prefix-list command to enter the PREFIX-LIST mode and configure a prefix list.

To enter PREFIX-LIST mode:

1.Verify that you are logged in to the CONFIGURATION mode.

2.Enter the ip prefix-list command. You must include a name for the prefix list.The prompt changes to include (conf-nprefixl).

You can return to the CONFIGURATION mode by entering the exit command.

AS-PATH ACL Mode

Use the AS-PATH ACL mode to configure an AS-PATH Access Control List (ACL) on the E-Series. Refer to Chapter 7, Access Control Lists (ACL).

To enter AS-PATH ACL mode:

1.Verify that you are logged in to the CONFIGURATION mode.

2.Enter the ip as-path access-list command. You must include a name for the AS-PATH ACL.The prompt changes to include (config-as-path).

You can return to the CONFIGURATION mode by entering the exit command.

IP COMMUNITY LIST Mode

Use the IP COMMUNITY LIST mode to configure an IP Community ACL on the E-Series. Refer to Chapter 7, Access Control Lists (ACL).

To enter IP COMMUNITY LIST mode:

1.Verify that you are logged in to the CONFIGURATION mode.

2.Enter the ip community-list command. You must include a name for the Community list.The prompt changes to include (config-community-list).

You can return to the CONFIGURATION mode by entering the exit command.

REDIRECT-LIST Mode

Use the REDIRECT-LIST mode to configure a Redirect list on the E-Series, as described in the E-Series FTOS Command Line Reference Guide Chapter 39, Policy-based Routing (PBR).

To enter REDIRECT-LIST mode:

24

|

CLI Basics

1.Verify that you are logged in to the CONFIGURATION mode.

2.Use the ip redirect-list command. You must include a name for the Redirect-list.The prompt changes to include (conf-redirect-list).

You can return to the CONFIGURATION mode by entering the exit command.

SPANNING TREE Mode

Use the STP mode to enable and configure the Spanning Tree protocol, as described in Chapter 52, Spanning Tree Protocol (STP).

To enter STP mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the protocol spanning-tree stp-id command.

You can return to the CONFIGURATION mode by entering the exit command.

Per-VLAN SPANNING TREE Plus Mode

Use PVST+ mode to enable and configure the Per-VLAN Spanning Tree (PVST+) protocol, as described in Chapter 41, Per-VLAN Spanning Tree Plus (PVST+).

Note: The protocol is PVST+, but the plus sign is dropped at the CLI prompt

To enter PVST+ mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the protocol spanning-tree pvst command.

You can return to the CONFIGURATION mode by entering the exit command.

RAPID SPANNING TREE Mode

Use PVST+ mode to enable and configure the RSTP protocol, as described in Chapter 45, Rapid Spanning Tree Protocol (RSTP).

To enter RSTP mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the protocol spanning-tree rstp command.

You can return to the CONFIGURATION mode by entering the exit command.

CLI Basics | 25

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

MULTIPLE SPANNING TREE Mode

Use MULTIPLE SPANNING TREE mode to enable and configure the Multiple Spanning Tree protocol, as described in Chapter 33, Multiple Spanning Tree Protocol (MSTP).

To enter MULTIPLE SPANNING TREE mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the protocol spanning-tree mstp command.

You can return to the CONFIGURATION mode by entering the exit command.

PROTOCOL GVRP Mode

Use the PROTOCOL GVRP mode to enable and configure GARP VLAN Registration Protocol (GVRP), as described in Chapter 18, GARP VLAN Registration (GVRP).

To enter PROTOCOL GVRP mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the protocol gvrp command syntax.

You can return to the CONFIGURATION mode by entering the exit command.

ROUTER OSPF Mode

Use the ROUTER OSPF mode to configure OSPF, as described in Chapter 37, Open Shortest Path First (OSPFv2).

To enter ROUTER OSPF mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Use the router ospf {process-id} command.The prompt changes to include (conf-router_ospf-id).

You can switch to the INTERFACE mode by using the interface command or you can switch to the ROUTER RIP mode by using the router rip command.

ROUTER RIP Mode

Use the ROUTER RIP mode to configure RIP on the C-Series or E-Series, as described in Chapter 43, Routing Information Protocol (RIP).

To enter ROUTER RIP mode:

1. Verify that you are logged into the CONFIGURATION mode.

26

|

CLI Basics

2. Enter the router rip command.The prompt changes to include (conf-router_rip).

You can switch to the INTERFACE mode by using the interface command or you can switch to the ROUTER OSPF mode by using the router ospf command.

ROUTER ISIS Mode

Use the ROUTER ISIS mode to configure ISIS on the E-Series, as described in the E-Series E-Series FTOS Command Line Reference Guide chapter Intermediate System to Intermediate System (IS-IS).

To enter ROUTER ISIS mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the router isis [tag] command.The prompt changes to include (conf-router_isis).

You can switch to the INTERFACE mode by using the interface command or you can switch to the ROUTER RIP mode by using the router rip command.

ROUTER BGP Mode

Use the ROUTER BGP mode to configure BGP on the C-Series or E-Series, as described in Chapter 9, Border Gateway Protocol IPv4 (BGPv4).

To enter ROUTER BGP mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the router bgp as-number command.The prompt changes to include (conf-router_bgp).

You can return to the CONFIGURATION mode by entering the exit command.

VLT DOMAIN Mode

Use VLT DOMAIN mode to enable and configure the VLT domain protocol, as described in Chapter 57, Virtual Link Trunking (VLT).

To enter VLT DOMAIN mode:

1.Verify that you are logged into the CONFIGURATION mode.

2.Enter the config-vlt-domain command.

You can return to the CONFIGURATION mode by entering the exit command.

CLI Basics | 27

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

Determining the Chassis Mode

The chassis mode in FTOS determines which hardware is being supported in an E-Series chassis. The chassis mode is programmed into an EEPROM on the backplane of the chassis and the change takes place only after the chassis is rebooted. Configuring the appropriate chassis mode enables the system to use all the ports on the card and recognize all software features.

28

|

CLI Basics

3

File Management

Overview

This chapter contains commands needed to manage the configuration files and includes other file management commands found in FTOS. The commands in this chapter are supported by FTOS on Dell Force10 platforms, as indicated by the characters that appear under each of the command headings: eE-Series, cC-Series, sS-Series,S4810.

This chapter contains these sections:

Basic File Management Commands

Upgrading the C-Series FPGA

Basic File Management Commands

The commands included in this chapter are:

boot config

boot host

boot network

boot system

boot system gateway

cd

change bootflash-image

copy

copy (Streamline Upgrade)

copy running-config startup-config

delete

dir

download alt-boot-image

download alt-full-image

download alt-system-image

format (C-Series and E-Series)

format flash (S-Series)

File Management | 29

Dell Force10 S4810P Command Reference Guide

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

boot config

ce

Syntax

Parameters

format flash (Z9000)

logging coredump

logging coredump server

pwd

rename

boot system

show bootvar

show file

show file-systems

show linecard

show os-version

show running-config

show startup-config

show version

upgrade (E-Series version)

upgrade (C-Series version)

upgrade (S-Series management unit and Z9000)

upgrade fpga-image

Set the location and name of the configuration file that is loaded at system start-up (or reload) instead of the default startup-configuration.

boot config {remote-first | rpm0 file-url | rpm1 file-url}

remote-first Enter the keywords remote-first to attempt to load the boot configuration files from a remote location.

Defaults

Command Modes

Command

History

Usage

Information

rpm0

Enter the keywords rpm0 first to specify the local boot configuration file for RPM 0.

rpm1

Enter the keywords rpm1 first to specify the local boot configuration file for RPM 1.

 

 

file-url

Enter the location information:

 

For a file on the internal Flash, enter flash:// followed by the filename.

 

For a file on the external Flash, enter slot0:// followed by the filename.

 

 

 

Not configured.

CONFIGURATION

Version 7.5.1.0 Introduced on C-Series

E-Series original Command

To display these changes in the show bootvar command output, you must save the running

configuration to the startup configuration (copy running-config startup-config or write)......

30

|

File Management

Loading...
+ 1550 hidden pages