Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell, the DELL logo, and PowerConnect are trademarks of Dell Inc.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or
their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
The Command Language Interface (CLI) is a network management application operated through
an ASCII terminal without the use of a Graphic User Interface (GUI) driven software application.
By directly entering commands, you have greater configuration flexibility. The CLI is a basic
command-line interpreter similar to the UNIX C shell.
An Ethernet Switch Module can be configured and maintained by entering commands from the
CLI, which is based solely on textual input and output with commands being entered from a
terminal keyboard and the output displayed as text via a terminal monitor. The CLI can be
accessed from a VT100 terminal connected to the console port of the Ethernet Switch Module or
through a Telnet connection from a remote host.
This guide describes how the Command Line Interface (CLI) is structured, describes the
command syntax, and describes the command functionality.
This guide also provides information for configuring the PowerConnect Ethernet Switch Module,
details the procedures and provides configuration examples. Basic installation configuration is
described in the
Command Groups
User’s Guide
and must be completed before using this document.
1
The system commands can be broken down into the functional groups shown below.
Command GroupDescription
AAAConfigures connection security including authorization and
passwords.
Address TableConfigures bridging address tables.
Configuration and Image FilesManages the Ethernet Switch Module configuration files.
ClockConfigures clock commands on the Ethernet Switch Module.
Ethernet ConfigurationConfigures all port configuration options for, example ports, storm
control, and auto-negotiation.
GVRPConfigures and displays GVRP configuration and information.
IGMP SnoopingConfigures IGMP snooping and displays IGMP configuration and
IGMP information.
IPConfigures and manages IP addresses on the device.
LACPConfigures and displays LACP information.
LineConfigures the console and remote Telnet connection.
LLDPConfigures and displays LLDP information.
Command Groups1
Management ACLConfigures and displays management access-list information.
PHY DiagnosticsDiagnoses and displays the interface status.
Port ChannelConfigures and displays Port Channel information.
Port MonitorMonitors activity on specific target ports.
QoSConfigures and displays QoS information.
RADIUSConfigures and displays RADIUS information.
RMONDisplays RMON statistics.
SNMPConfigures SNMP communities, traps and displays SNMP
information.
Spanning Tree
SSHConfigures SSH authentication.
Syslog CommandsManages and displays syslog messages.
System ManagementConfigures the Ethernet Switch Module clock, name and
TACACS
User InterfaceDescribes user commands used for entering CLI commands.
VLANConfigures VLANs and displays VLAN information.
Web ServerConfigures Web based access to the Ethernet Switch Module.
802.1x
Configures and reports on Spanning Tree protocol
authorized users.
Configures TACACS+ commands
Configures commands related to 802.1x security protocol.
ip http serverEnables the Ethernet Switch Module to be configured
from a browser.
ip http portSpecifies the TCP port for use by a web browser to
configure the Ethernet Switch Module.
ip https portConfigures a TCP port for use by a secure web browser to
configure the Ethernet Switch Module.
ip https serverEnables the Ethernet Switch Module to be configured
from a secured browser.
crypto certificate
generate
crypto certificate
request
crypto certificate
import
ip https certificate
show ip httpDisplays the HTTP server configuration.Privileged
show ip httpsDisplays the HTTPS server configuration.Privileged
show crypto certificate
mycertificate
Generates a HTTPS certificate.Global
Generates and displays certificate requests for
HTTPS.
Imports a certificate signed by Certification
Authority for HTTPS.
Configures the active certificate for HTTPS.
Displays the SSL certificates of the Ethernet Switch
Module
Global
Configuration
Global
Configuration
Global
Configuration
Global
Configuration
Configuration
Privileged
EXEC
Global
Configuration
Global
Configuration
EXEC
EXEC
Privileged
EXEC
802.1x Commands
Command DescriptionAccess Mode
aaa authentication
dot1x
dot1x system-authcontrol
dot1x port-control
22Command Groups
Specifies one or more authentication, authorization, and
accounting (AAA) methods for use on interfaces running
IEEE 802.1X.
Enables 802.1x globally.
Enables manual control of the authorization state of the
port
Global
Configuration
Global
Configuration
Interface
Configuration
dot1x re-authentication
dot1x timeout reauthperiod
dot1x re-authenticate
dot1x timeout quietperiod
dot1x timeout tx-period
dot1x max-req
dot1x timeout supptimeout
dot1x timeout servertimeout
show dot1xAllows multiple hosts on an 802.1X-authorized port, that
show dot1x usersDisplays 802.1X statistics for the specified interface.Privileged
show dot1x statisticsDisplays 802.1X statistics for the specified interface.Privileged
dot1x auth-not-reqEnables unauthorized users access to that VLAN.VLAN
dot1x multiple-hostsAllows multiple hosts (clients) on an 802.1X-authorized
dot1x single-hostviolation
show dot1x advancedDisplays 802.1X advanced features for the switch or for
Enables periodic re-authentication of the client.
Sets the number of seconds between re-authentication
attempts.
Manually initiates a re-authentication of all 802.1Xenabled ports or the specified 802.1X-enabled port.
Sets the number of seconds that the Ethernet Switch
Module remains in the quiet state following a failed
authentication exchange.
Sets the number of seconds that the Ethernet Switch
Module waits for a response to an Extensible
Authentication Protocol (EAP) - request/identity frame
from the client, before resending the request.
Sets the maximum number of times that the Ethernet
Switch Module sends an EAP - request/identity frame to
the client, before restarting the authentication process.
Sets the time for the retransmission of an Extensible
Authentication Protocol (EAP)-request frame to the
client.
Sets the time for the retransmission of packets to the
authentication server.
dot1x port-control
has the
mand set to
port, that has the dot1x port-control Interface
Configuration mode command set to auto.
Configures the action to be taken, when a station whose
MAC address is not the supplicant MAC address,
attempts to access the interface.
the specified interface.
auto
.
interface configuration com-
Interface
Configuration
Interface
Configuration
Privileged
EXEC
Interface
Configuration
Interface
Configuration
Interface
Configuration
Interface
Configuration
Interface
Configuration
Privileged
EXEC
EXEC
EXEC
Configuration
Interface
Configuration
Interface
Configuration
Privileged
EXEC
Command Groups23
24Command Groups
Command Modes
GC (Global Configuration) Mode
CommandDescription
aaa authentication enableDefines authentication method lists for accessing higher privilege
aaa authentication dot1xSpecifies one or more authentication, authorization, and accounting
(AAA) methods for use on interfaces running IEEE 802.1X.
arpAdds a permanent entry in the ARP cache.
arp timeoutConfigures how long an entry remains in the ARP cache.
asset-tagSpecifies the Ethernet Switch Module asset-tag.
bridge aging-timeSets the address table aging time.
bridge multicast filteringEnables filtering of multicast addresses.
clock sourceConfigures an external time source for the system clock.
clock timezoneSets the time zone for display purposes.
clock summer-timeConfigures the system to automatically switch to summer time
(daylight saving time).
crypto certificate generateGenerates a HTTPS certificate.
crypto certificate importImports a certificate signed by Certification Authority for HTTPS.
crypto key generate dsaGenerates DSA key pairs.
crypto key generate rsaGenerates RSA key pairs.
crypto key pubkey-chain sshEnters SSH Public Key-chain configuration mode.
dot1x system-auth-controlEnables 802.1x globally.
enable passwordSets a local password to control access to normal and privilege levels.
endEnds the current configuration session and returns to the previous
command mode.
gvrp enable (global)Enables GVRP globally.
hostnameSpecifies or modifies the Ethernet Switch Module host name.
interface ethernetEnters the interface configuration mode to configure an Ethernet type
interface.
interface port-channelEnters the interface configuration mode of a specific port-channel.
2
Command Modes25
interface range ethernetEnters the interface configuration mode to configure multiple ethernet
type interfaces.
interface range port-channelEnters the interface configuration mode to configure multiple port-
channels.
interface range vlanEnters the interface configuration mode to configure multiple VLANs.
interface vlanEnters the interface configuration (VLAN) mode.
ip default-gatewayDefines a default gateway.
ip domain-lookupEnables the IP Domain Naming System (DNS)-based host name-to-
address translation.
ip domain-nameDefines a default domain name, that the software uses to complete
unqualified host names.
ip hostDefines static host name-to-address mapping in the host cache.
ip http authenticationSpecifies authentication methods for HTTP.
ip http portSpecifies the TCP port for use by a web browser to configure the
Ethernet Switch Module.
ip http serverEnables the Ethernet Switch Module to be configured from a
browser.
ip https authenticationSpecifies authentication methods for HTTPS.
ip https certificateConfigures the active certificate for HTTPS. Use the no form of this
command to return to default.
ip https serverEnables the Ethernet Switch Module to be configured from a secured
browser.
ip https portConfigures a TCP port for use by a secure web browser to configure
the Ethernet Switch Module.
ip igmp snooping (Global)Enables Internet Group Management Protocol (IGMP) snooping.
ip name-serverSets the available name servers.
ip ssh portSpecifies the port to be used by the SSH server.
ip ssh pubkey-authEnables public key authentication for incoming SSH sessions.
ip ssh serverEnables the Ethernet Switch Module to be configured from a SSH
server.
lacp system-priorityConfigures the system LACP priority.
lineIdentifies a specific line for configuration and enters the line
configuration command mode.
loggingLogs messages to a syslog server.
logging bufferedLimits syslog messages displayed from an internal buffer based on
severity.
26Command Modes
logging buffered sizeChanges the number of syslog messages stored in the internal buffer.
logging consoleLimits messages logged to the console based on severity.
logging fileLimits syslog messages sent to the logging file based on severity.
logging onControls error messages logging.
management access-classDefines which management access-list is used.
management access-listDefines a management access-list, and enters the access-list for
configuration.
port jumbo-frameEnables jumbo frames for the Ethernet Switch Module.
port storm-control includemulticast
priority-queue out num-ofqueues
qosEnables Quality of Service (QoS) on the Ethernet Switch Module and
qos map dscp-queueModifies the DSCP to CoS map.
qos trust (Global)Configure the system to "trust" state.
radius-server deadtimeImproves RADIUS response times when servers are unavailable.
port storm-control broadcast
rate
qos map dscp-queueDefines the wrr-queue mechanism on an egress queue.
wrr-queue bandwidthAssigns Weighted Round Robin (WRR) weights to egress queues.
radius-server hostSpecifies a RADIUS server host.
radius-server keySets the authentication and encryption key for all RADIUS
radius-server retransmitSpecifies the number of times the software searches the list of RADIUS
radius-server source-ipSpecifies the source IP address used for communication with RADIUS
radius-server timeoutSets the interval for which a Ethernet Switch Module waits for a server
rmon alarmConfigures alarm conditions.
rmon eventConfigures a RMON event.
rmon table-sizeConfigures the maximum RMON tables sizes.
snmp-server communitySets up the community access string to permit access to SNMP
Enables the Ethernet Switch Module to count multicast packets.
Enables the egress queues to be SP queues.
enters QoS basic or advance mode.
Configures the maximum broadcast rate.
communications between the Ethernet Switch Module and the
RADIUS daemon.
server hosts.
servers.
host to reply.
protocol.
Command Modes27
snmp-server contactSets up a system contact.
snmp-server enable trapsEnables the Ethernet Switch Module to send SNMP traps or SNMP
notifications.
snmp-server host
snmp-server locationSets up the information on where the Ethernet Switch Module is
snmp-server setSets SNMP MIB value by the CLI.
snmp-server trap
authentication
sntp authenticateGrants authentication for received Network Time Protocol (NTP)
sntp authentication-keyDefines an authentication key for Simple Network Time Protocol
spanning-treeEnables spanning tree functionality.
spanning-tree bpduDefines BPDU handling when spanning tree is disabled on an interface.
spanning-tree forward-timeConfigures the spanning tree bridge forward time.
spanning-tree hello-timeConfigures the spanning tree bridge Hello Time.
spanning-tree max-ageConfigures the spanning tree bridge maximum age.
spanning-tree modeConfigures the spanning tree protocol.
spanning-tree pathcost methodSets the default pathcost method.
spanning-tree priorityConfigures the spanning tree priority.
tacacs-server keySets the authentication encryption key used for all TACACS+
tacacs-server source-ipSpecifies the source IP address that will be used for the communication
tacacs-server timeoutSets the timeout value.
tacacs-server hostSpecifies a TACACS+ host.
usernameEstablishes a username-based authentication system.
wrr-queue cos-map
Specifies the recipient of Simple Network Management Protocol
notification operation
located.
Enables the Ethernet Switch Module to send Simple Network
Management Protocol traps when authentication failed.
traffic from servers.
(SNTP).
communications between the Ethernet Switch Module and the
TAC A C S + daemo n .
with TACACS+ servers.
Maps assigned CoS values to select one of the egress queues.
.
IC (Interface Configuration) Mode
CommandDescription
28Command Modes
back-pressureEnables Back Pressure on a given interface.
channel-groupAssociates a port with a Port-channel.
descriptionAdds a description to an interface.
dot1x max-reqSets the maximum number of times that the Ethernet Switch Module
sends an EAP - request/identity frame to the client, before restarting the
authentication process.
dot1x multiple-hostsAllows multiple hosts (clients) on an 802.1X-authorized port, that has
the dot1x port-control Interface Configuration mode command set to
auto.
dot1x port-controlEnables manual control of the authorization state of the port.
dot1x re-authenticationEnables periodic re-authentication of the client.
dot1x single-host-violationConfigures the action to be taken, when a station whose MAC address is
not the supplicant MAC address, attempts to access the interface.
dot1x timeout quiet-periodSets the number of seconds that the Ethernet Switch Module remains in
the quiet state following a failed authentication exchange.
dot1x timeout re-authperiodSets the number of seconds between re-authentication attempts.
dot1x timeout server-timeoutSets the time for the retransmission of packets to the authentication
server.
dot1x timeout supp-timeoutSets the time for the retransmission of an EAP-request frame to the
client.
dot1x timeout tx-period
duplexConfigures the full/half duplex operation of a given ethernet interface
flowcontrolConfigures the Flow Control on a given interface.
garp timerAdjusts the GARP application join, leave, and leaveall GARP timer
gvrp enable (interface)Enables GVRP on an interface.
gvrp registration-forbidDe-registers all VLANs, and prevents dynamic VLAN registration on the
gvrp vlan-creation-forbidEnables or disables dynamic VLAN creation.
ip addressSets an IP address.
ip address dhcpAcquires an IP address on an interface from the DHCP server.
lacp port-priorityConfigures the priority value for physical ports.
lacp timeoutAssigns an administrative LACP timeout.
Sets the number of seconds that the Ethernet Switch Module waits for
a response to an Extensible Authentication Protocol (EAP) request/identity frame, from the client, before resending the request.
when not using auto-negotiation.
values.
port.
Command Modes29
mdixEnables automatic crossover on a given interface.
nameConfigures a name to a VLAN.
negotiationEnables auto-negotiation operation for the speed and duplex parameters
of a given interface.
port monitorStarts a port monitoring session.
port securityDisables new address learning/forwarding on an interface.
port security routed secureaddress
port storm-control broadcast
enable
qos cosConfigures the default port CoS value.
qos trust (Interface)Enables each port trust state while the system is in basic mode.
rmon collection historyEnables a Remote Monitoring (RMON) MIB history statistics group on
shutdownDisables interfaces.
sntp client enable (interface)Enables the Simple Network Time Protocol (SNTP) client on an
spanning-tree costConfigures the spanning tree path cost for a port.
spanning-tree disableDisables spanning tree on a specific port.
spanning-tree link-typeOverrides the default link-type setting.
spanning-tree portfastEnables PortFast mode.
spanning-tree port-priorityConfigures port priority.
speed
Adds MAC-layer secure addresses to a routed port.
Enables broadcast storm control.
an interface.
interface.
Configures the speed of a given Ethernet interface when not using
auto-negotiation.
LC (Line Configuration) Mode
CommandDescription
enable authenticationSpecifies the authentication method list when accessing a higher
exec-timeoutConfigures the interval that the system waits until user input is detected.
login authenticationSpecifies the login authentication method list for a remote telnet or
historyEnables the command history function.
history sizeChanges the command history buffer size for a particular line.
30Command Modes
privilege level from a remote telnet or console.
console.
passwordSpecifies a password on a line.
MA (Management Access-level) Mode
CommandDescription
deny (management)Defines a deny rule.
permit (management)Defines a permit rule.
PE (Privileged EXEC) Mode
CommandDescription
boot systemSpecifies the system image that the Ethernet Switch Module loads at
startup.
clear arp-cacheDeletes all dynamic entries from the ARP cache.
clear bridgeRemoves any learned entries from the forwarding database.
clear gvrp statisticsClears all the GVRP statistics information.
clear hostDeletes entries from the host name-to-address cache.
clear host dhcpDeletes entries from the host name-to-address mapping received from
Dynamic Host Configuration Protocol (DHCP).
clear loggingClears messages from the internal logging buffer.
clear logging fileClears messages from the logging file.
clear spanning-tree detectedprotocols
clock setManually sets the system clock.
configureEnters the global configuration mode.
copyCopies files from a source to a destination.
crypto certificate requestGenerates and displays certificate requests for HTTPS.
dot1x re-authenticateManually initiates a re-authentication of all 802.1X-enabled ports or the
loginReturns to User EXEC mode.
reloadReloads the operating system.
set interface activeReactivates an interface that was suspended by the system.
show arpDisplays entries in the ARP table.
show authentication methodsDisplays information about the authentication methods.
Restarts the protocol migration process on all interfaces or on the
specified interface.
specified 802.1X-enabled port.
Command Modes31
show bootvarDisplays the active system image file that the Ethernet Switch Module
loads at startup
show bridge address-tableDisplays all entries in the bridge-forwarding database.
show bridge address-table
count
show bridge multicast addresstable
show bridge multicast addresstable
show bridge multicast filteringDisplays the multicast filtering configuration.
show copper-ports cablelength
show copper-ports tdrDisplays the last TDR (Time Domain Reflectometry) tests on specified
show crypto key mypubkeyDisplays the SSH public keys stored on the Ethernet Switch Module.
show crypto key pubkey-chain
ssh
show crypto certificate
mycertificate
show dot1xDisplays 802.1X status for the Ethernet Switch Module or for the
show dot1x advancedDisplays 802.1X enhanced features for the Ethernet Switch Module or
show dot1x usersDisplays 802.1X users for the Ethernet Switch Module.
show dot1x statisticsDisplays 802.1X statistics for the specified interface.
show hostsDisplays the default domain name, a list of name server hosts, the static
show ip sshDisplays the SSH server configuration.
show ip interfaceDisplays the usability status of interfaces configured for IP.
show lacp ethernetDisplays LACP information for Ethernet ports.
show lacp port-channel
show loggingDisplays the state of logging and the syslog messages stored in the
show logging fileDisplays the state of logging and the syslog messages stored in the
show management access-classDisplays the active management access-list.
Displays the number of addresses present in all VLANs or at specific
VLAN.
Displays all entries in the bridge-forwarding database.
Displays multicast MAC or IP address table information.
Displays the estimated copper cable length attached to a port.
ports.
Displays SSH public keys stored on the Ethernet Switch Module.
Displays the SSL certificates of the Ethernet Switch Module.
specified interface.
for the specified interface.
and the cached list of host names and addresses.
Displays LACP information for a port-channel.
internal buffer.
logging file.
32Command Modes
show management access-listDisplays management access-lists.
show ports securityDisplays the port-lock status.
show ports storm-controlDisplays the storm control configuration.
show radius-serversDisplays the RADIUS server settings.
show running-configDisplays the contents of the currently running configuration file.
show snmpDisplays the SNMP status.
show spanning-treeDisplays spanning tree configuration.
show startup-configDisplays the startup configuration file contents.
show syslog-serversDisplays the syslog servers settings.
show tacacsDisplays configuration and statistics for a TACACS+ servers.
show users accountsDisplays information about the local user database.
test copper-port tdrDiagnoses with TDR (Time Domain Reflectometry) technology the
quality and characteristics of a copper cable attached to a port.
SP (SSH Public Key) Mode
CommandDescription
key-stringManually specifies a SSH public key.
user-keySpecifies which SSH public key is manually configured and enters the
SSH public key-string configuration command.
UE (User EXEC) Mode
CommandDescription
clear countersClears statistics on an interface.
enableEnters the privileged EXEC mode.
exit(EXEC)Closes an active terminal session by logging off the Ethernet Switch
Module.
loginChanges a login username.
pingSends ICMP echo request packets to another node on the network.
show clockDisplays the time and date from the system clock.
show gvrp configurationDisplays GVRP configuration information.
show gvrp error-statisticsDisplays GVRP error statistics.
Command Modes33
clear gvrp statisticsDisplays GVRP statistics.
show historyLists the commands entered in the current session.
show ip igmp snooping
mrouter
show interfaces configurationDisplays the configuration for all interfaces.
show interfaces countersDisplays traffic seen by the physical interface.
show interfaces descriptionDisplays the description for all interfaces.
show interfaces port-channelDisplays Port-channel information.
show interfaces statusDisplays the status for all interfaces.
show ip igmp snooping groupsDisplays multicast groups learned by IGMP snooping.
show ip igmp snooping
interface
show ip igmp snooping
mrouter
show lineDisplays line parameters.
show ports jumbo-frameDisplays the jumbo frames configuration.
show ports monitorDisplays the port monitoring status.
show privilegeDisplays the current privilege level.
show qosDisplays the QoS status.
show qos interfaceAssigns CoS values to select one of the egress queues.
show qos mapDisplays all the maps for QoS.
show rmon alarmDisplays alarm configurations.
show rmon alarm-tableDisplays the alarms summary table.
show rmon collection historyDisplays the requested history group configuration.
show rmon eventsDisplays the RMON event table.
show rmon historyDisplays RMON Ethernet Statistics history.
show rmon logDisplays the RMON logging table.
show rmon statisticsDisplays RMON Ethernet Statistics.
show systemDisplays system information.
show system idDisplays the service id information.
show usersDisplays information about the active users.
show versionDisplays the system version information.
Enables automatic learning of multicast switch ports in the context of a
specific VLAN.
Displays IGMP snooping configuration.
Displays information on dynamically learned multicast router
interfaces.
34Command Modes
VC (VLAN Configuration) Mode
CommandDescription
bridge addressAdds a static MAC-layer station source address to the bridge table.
bridge multicast addressRegisters MAC-layer multicast addresses to the bridge table, and adds
static ports to the group.
bridge multicast forbidden
address
bridge multicast forbidden
forward-all
bridge multicast forward-allEnables forwarding of all multicast frames on a port.
ip igmp snoopingEnables Internet Group Management Protocol (IGMP) snooping on a
ip igmp snooping host-timeout
ip igmp snooping leave-timeout
ip igmp snooping mroutertime-out
ip igmp snooping mrouter
learn-pim-dvmrp
vlanCreates a VLAN.
vlan databaseEnters the VLAN database configuration mode.
dot1x auth-not-reqEnables unauthorized users access to that VLAN
nameConfigures a name to a VLAN.
Forbids adding a specific multicast address to specific ports.
Enables forbidding forwarding of all multicast frames to a port.
specific VLAN.
Configures the host-time-out.
Configures the leave-time-out.
Configures the mrouter-time-out.
The ip igmp snooping mrouter Interface Configuration mode
command enables automatic learning of multicast router ports in
the context of a specific VLAN.
Command Modes35
36Command Modes
3
Using the CLI
This chapter describes how to start using the CLI and describes implemented command editing
features to assist in using the CLI.
CLI Command Modes
Introduction
To assist in configuring Ethernet Switch Modules, the Command Line Interface (CLI) is divided
into different command modes. Each command mode has its own set of specific commands.
Entering a question mark "?" at the system prompt (console prompt) displays a list of commands
available for that particular command mode.
From each mode a specific command is used to navigate from one command mode to another. The
standard order to access the modes is as follows:
Configuration
command mode access path.
mode, and
Interface Configuration
User EXEC
mode. The following figure illustrates the
mode,
Privileged EXEC
mode,
Global
Using the CLI37
When starting a session, the initial mode is the User EXEC mode. Only a limited subset of
commands are available in User EXEC Mode. This level is reserved for tasks that do not change the
configuration. To enter the next level, the Privileged EXEC mode, a password is required.
The Privileged mode gives access to commands that are restricted on EXEC mode and provides
access to the Ethernet Switch Module Configuration mode.
The Global Configuration mode manages the Ethernet Switch Module configuration on a global
level.
The Interface Configuration mode configures specific interfaces in the Ethernet Switch Module.
User EXEC Mode
After logging into the Ethernet Switch Module, the user is automatically in User EXEC command
mode unless the user is defined as a privileged user. In general, the User EXEC commands allow
the user to perform basic tests, and list system information.
The user-level prompt consists of the Ethernet Switch Module "host name" followed by the angle
bracket (>).
console>
The default host name is "Console" unless it has been changed using the
hostname
command in
the Global Configuration mode.
Privileged EXEC Mode
Privileged access is password protected to prevent unauthorized use because many of the privileged
commands set operating system parameters:. The password is not displayed on the screen and is
case sensitive.
Privileged users enter directly into the Privileged EXEC mode. To enter the Privileged EXEC mode
from the User EXEC mode, perform the following steps:
1
At the prompt, enter the command
displayed.
2
Enter the password and press <Enter>. The password is displayed as "*". The Privileged
EXEC mode prompt is displayed. The Privileged EXEC mode prompt consists of the device
Ethernet Switch Module "host name" followed by "
console#
To return from Privileged Exec mode to User EXEC mode, type the
command prompt.
enable
and press <Enter>. A password prompt is
#
".
disable
command at the
38Using the CLI
The following example illustrates how to access Privileged Exec mode and return back to the User
EXEC mode:
console>enable
Enter Password: ******
console#
console#disable
console>
Exit
The
to User EXEC mode from the Privileged EXEC mode. For example, the
command is used to return from any mode to the previous mode except when returning
Exit
command is used to
return from the Interface Configuration mode to the Global Configuration mode.
Global Configuration Mode
Global Configuration mode commands apply to features that affect the system as a whole, rather
than just a specific interface. The Privileged EXEC mode command
Global Configuration mode.
To enter the Global Configuration mode, perform the following steps:"
1
At the Privileged EXEC mode prompt, enter the command
The Global Configuration mode prompt is displayed. The Global Configuration mode
prompt consists of the Ethernet Switch Module "host name" followed by the word "(config)"
and "
#
".
configure
configure
is used to enter the
and press
<Enter>
.
console(config)#
To return from the Global Configuration mode to the Privileged EXEC mode, the user can use one
of the following commands:
•exit
•end
•Ctrl+Z
The following example illustrates how to access Global Configuration mode and returns to the
Privileged EXEC mode:
Interface Configuration Mode and Specific Configuration Modes
Interface Configuration mode commands are used to modify specific interface operations. The
following are the Interface Configuration modes:
•
Line Interface
include commands such as line timeout settings, etc. The Global Configuration mode
command
•
VLAN Database
Configuration mode command
Configuration mode.
•
Management Access List
Global Configuration mode command
Management Access List Configuration mode.
•
Ethernet
mode command
configure an Ethernet type interface.
•
Port Channel
ports to a port-channel. Most of these commands are the same as the commands in the
Ethernet interface mode, and are used to manage the member ports as a single entity. The
Global Configuration mode command
Channel Interface Configuration mode.
•
SSH Public Key-chain
Module SSH public keys. The Global Configuration mode command
chain ssh
•QoS — Contains commands related to service definitions. The Global Configuration
mode command qos is used to enter the QoS services configuration mode.
— Contains commands to configure the management connections. These
line
is used to enter the Line Configuration command mode.
— Contains commands to create a VLAN as a whole. The Global
vlan database
— Contains commands to define management access-lists. The
— Contains commands to manage port configuration. The Global Configuration
interface ethernet
— Contains commands to configure port-channels, for example, assigning
— Contains commands to manually specify other Ethernet Switch
is used to enter the SSH Public Key-chain Configuration mode.
is used to enter the Interface Configuration mode to
is used to enter the VLAN Database Interface
management access-list
interface port-channel
is used to enter the
is used to enter the Port
crypto key pubkey-
Starting the CLI
The Ethernet Switch Module can be managed over a direct connection to the Ethernet Switch
Module console port or via a Telnet connection. The Ethernet Switch Module is managed by
entering command keywords and parameters at the prompt. Using the Ethernet Switch Module
command-line interface (CLI) is very similar to entering commands on a UNIX system.
If access is via a Telnet connection, ensure the Ethernet Switch Module has an IP address defined,
corresponding management access is granted, and the workstation used to access the Ethernet
Switch Module is connected to the Ethernet Switch Module prior to using CLI commands.
NOTE: The following steps are for use on the console line only.
To start using the CLI, perform the following steps:
1
Ensure the Ethernet Switch Module is installed in the Dell Modular Server Chassis, see
Connect the DB9 null-modem or cross over cable to the RS-232 serial port of the Dell
Remote Access Controller / Modular Chassis (DRAC/MC) in the Dell Modular Server
Chassis to the RS-232 serial port of the terminal or computer running the terminal emulation
application.
NOTE: The default data rate of the DRAC/MC is 115200.
a
Set the data format to 8 data bits, 1 stop bit, and no parity.
b
Set Flow Control to
c
Under
Properties
d
Select
Term in a l k ey s for
Ter mi na l k ey s (not Windows keys
NOTICE: When using HyperTerminal with Microsoft® Windows 2000, ensure that Windows® 2000
Service Pack 2 or later is installed. With Windows 2000 Service Pack 2, the arrow keys function properly
in HyperTerminal’s VT100 emulation. Go to www.microsoft.com for information on Windows 2000 service
packs.
none
, select
.
VT100 for Emulation
mode.
Function, Arrow, and Ctrl keys
).
. Ensure that the setting is for
On the console monitor, the DRAC/MC application displays a login screen.
3
Log in onto the DRAC/MC using the default username "root" and password "calvin".
The DRAC/MC CLI command prompt "DRAC/MC:" is displayed.
For more information, see
4
If Dell Modular Server Chassis is off then power it on using the following DRAC/MC CLI
Dell Modular Server System User's Guide
.
command:
racadm chassisaction -m chassis powerup
NOTE: The Ethernet Switch Module inserted into the Chassis I/O bay is powered on automatically when
the Dell Modular Server Chassis is powered on. For further details on configuring the Dell Modular
Server Chassis via the DRAC/MC CLI interface, please see the Dell Remote Access Controller / ModularChassis User's Guide.
Power cycle the Ethernet Switch Module using the following DRAC/MC CLI command:
5
racadm chassisaction -m switch-N powercycle
where N is the Chassis I/O Module bay number in which the Ethernet Switch Module is
inserted.
6
Redirect the DRAC/MC serial console to the Ethernet Switch Module internal serial console
interface. This action is performed by entering the CLI command at the command prompt of
the DRAC/MC CLI.
connect switch-N
where N is the Chassis I/O Module bay number in which the Ethernet Switch Module is
inserted.
Using the CLI41
NOTE: To switch back to the context of the DRAC/MC CLI command prompt press the following
sequence of keys: "<Enter>~."; that is, first press <Enter>, then press on tilde "~" (remember to depress the
<Shift> key if the tilde character is located in the upper register of your keyboard) and then press period
(dot) ".".
For further details on configuring and using the DRAC/MC see
/ Modular Chassis User's Guide
.
Dell Remote Access Controller
Once the Ethernet Switch Module is connected to the console, wait until the Ethernet
Switch Module is fully booted. Observe the booting information being outputed to the
terminal window and wait for the Ethernet Switch Module CLI command prompt "console>"
to appear. Press <Enter> several times in order to ensure that the terminal connection is
successfully established and the Ethernet Switch Module can be configured through the CLI
command interface.
7
Make sure that the system LED on the Ethernet Switch Module is illuminated green and is
not flashing, which indicates that the Ethernet Switch Module is operating properly.
8
If an error is displayed, or the green system LED is flashing, stop the installation process and
contact Dell technical support.
9
Enter the following commands to begin the configuration procedure:
Configure the Ethernet Switch Module and enter the necessary commands to complete the
required tasks.
11
When finished, exit the session with the
exit
command.
When a different user is required to log onto the system, in the Privileged EXEC mode command
mode, the
login
command is entered. This effectively logs off the current user and logs on the new
user.
Editing Features
Entering Commands
A CLI command is a series of keywords and arguments. Keywords identify a command, and
arguments specify configuration parameters. For example, in the command "
ethernet g11
interface type, and
To enter commands that require parameters, enter the required parameters after the command
keyword. For example, to set a password for the administrator, enter:
console(config)#
42Using the CLI
,"
show, interfaces
g11
specifies the port.
username
and
admin
status
are keywords,
password
smith
ethernet
show interfaces status
is an argument that specifies the
When working with the CLI, the command options are not displayed. The command is not
selected from a menu, but is manually entered. To see what commands are available in each mode
or within an interface configuration, the CLI does provide a method of displaying the available
commands, the command syntax requirements and in some instances parameters required to
complete the command. The standard command to request help is "
?
".
There are two instances where the help information can be displayed:
•
Keyword lookup
— The character ? is entered in place of a command. A list of all valid
commands and corresponding help messages are is displayed.
•
Partial keyword lookup
— If an A command is incomplete and or the character ? is entered in
place of a parameter. The matched keyword or parameters for this command are displayed.
To assist in using the CLI, there is an assortment of editing features. The following features are
described:
•Terminal Command Buffer
•Command Completion
•Keyboard Shortcuts
Terminal Command Buffer
Every time a command is entered in the CLI, it is recorded on an internally managed Command
History buffer. Commands stored in the buffer are maintained on a
These commands can be recalled, reviewed, modified, and reissued. This buffer is not preserved
across Ethernet Switch Module resets.
First In First Out (FIFO)
basis.
KeywordDescription
Up-arrow key
Ctrl+P
Down-arrow keyReturns to more recent commands in the history buffer after recalling
Recalls commands in the history buffer, beginning with the most recent
command. Repeats the key sequence to recall successively older
commands.
commands with the up-arrow key. Repeating the key sequence will recall
successively more recent commands.
By default, the history buffer system is enabled, but it can be disabled at any time. For information
about the command syntax to enable or disable the history buffer, see
history
.
There is a standard default number of commands that are stored in the buffer. The standard
number of 10 commands can be increased to 216. By configuring 0, the effect is the same as
disabling the history buffer system. For information about the command syntax for configuring the
command history buffer, see
To display the history buffer, see
history size
show history
.
.
Using the CLI43
Negating the Effect of Commands
For many configuration commands, the prefix keyword "no" can be entered to cancel the effect of a
command or reset the configuration to the default value. This guide describes the negation effect
for all applicable commands.
Command Completion
If the command entered is incomplete, invalid or has missing or invalid parameters, then the
appropriate error message is displayed. This assists in entering the correct command. By pressing
the <
Ta b
> button, an incomplete command is entered. If the characters already entered are not
enough for the system to identify a single matching command, press "
?
" to display the available
commands matching the characters already entered.
Keyboard Shortcuts
The CLI has a range of keyboard shortcuts to assist in editing the CLI commands. The following
table describes the CLI shortcuts.
Keyboard KeyDescription
Up-arrow keyRecalls commands from the history buffer, beginning with the most recent
command. Repeat the key sequence to recall successively older commands.
Down-arrow keyReturns the most recent commands from the history buffer after recalling
commands with the up arrow key. Repeating the key sequence will recall
successively more recent commands.
Ctrl+AMoves the cursor to the beginning of the command line.
Ctrl+EMoves the cursor to the end of the command line.
Ctrl+Z / EndReturns back to the Privileged EXEC mode from any mode.
Backspace keyDeletes one character left to the cursor position.
CLI Command Conventions
When entering commands, there are certain command entry standards that apply to all
commands. The following table describes the command conventions.
ConventionDescription
[ ]In a command line, square brackets indicates an optional entry.
{ }In a command line, curly brackets indicate a selection of compulsory
Italic font
44Using the CLI
parameters separated by the | character. One option must be selected. For
example:
command either
flowcontrol {auto|on|off}
auto, on
or
off
must be selected.
means that for the
flowcontrol
Indicates a parameter.
<Enter>
Any individual key on the keyboard. For example press <Enter>.
Ctrl+F4Any combination keys pressed simultaneously on the keyboard.
Screen
Indicates system messages and prompts appearing on the console.
Display
all
When a parameter is required to define a range of ports or parameters
and all is an option, the default for the command is all when no
parameters are defined. For example, the command interface range port-
channel has the option of either entering a range of channels, or selecting
all. When the command is entered without a parameter, it automatically defaults to all.
Global Configuration mode commands define login authentication.
no
form of this command.
4
...]
no aaa authentication login {default | list-name
•
default
— Uses the listed authentication methods that follow this argument as the
default list of methods when a user logs in.
•
list-name
when a user logs in.
•
method1 [method2
KeywordDescription
enableUses the enable password for authentication.
lineUses the line password for authentication.
localUses the local username database for authentication.
noneUses no authentication.
radiusUses the list of all RADIUS servers for authentication.
tacacsUses the list of all TACACS+ servers for authentication.
Default Configuration
The local user database is checked. This has the same effect as the command
authentication login list-name local
NOTE: On the console, login succeeds without any authentication check if the authentication method is
not defined.
Command Mode
Global Configuration mode
— Character string used to name the list of authentication methods activated
...] — Specify at least one from the following table:
.
}
aaa
User Guidelines
•The default and optional list names created with the
used with the
login authentication
command.
aaa authentication login
command are
AAA Commands47
•Create a list by entering the
particular protocol, where
aaa authentication login
list-name
is any character string used to name this list. The
list-name method
command for a
method
argument identifies the list of methods that the authentication algorithm tries, in the given
sequence.
•The additional methods of authentication are used only if the previous method returns an
error, not if it fails. To ensure that the authentication succeeds even if all methods return an
error, specify
Example
none
as the final method in the command line.
The following example configures authentication login.
console(config)# aaa authentication login default radius local
enable none
aaa authentication enable
The
aaa authentication enable
method lists for accessing higher privilege levels. To return to the default configuration use the
form of this command.
Global Configuration mode command defines authentication
...]
no
•
default
default list of methods, when using higher privilege levels.
•
list-name
methods activated, when using access higher privilege levels.
•
method1 [method2
KeywordDescription
enableUses the enable password for authentication.
lineUses the line password for authentication.
noneUses no authentication.
radiusUses the list of all RADIUS servers for authentication. Uses username
tacacsUses the list of all TACACS+ servers for authentication. Uses
48AAA Commands
— Uses the listed authentication methods that follow this argument as the
— Character string, up to 12 characters, used to name the list of authentication
...] — Specify at least one from the following table:
"$enabx$." where x is the privilege level.
username "$enabx$." where x is the privilege level.
Default Configuration
If the
default
the command
list is not set, only the enable password is checked. This has the same effect as
aaa authentication enable default enable
.
On the console, the enable password is used if it exists. If no password is set, the process still
succeeds. This has the same effect as using the command
enable none
Command Mode
.
aaa authentication enable default
Global Configuration mode
User Guidelines
•The default and optional list names created with the
used with the
•Create a list by entering the
list-name
enable authentication
command.
aaa authentication enable
is any character string used to name this list. The
aaa authentication enable
list-name method
method
command where
argument identifies the
command are
list of methods that the authentication algorithm tries, in the given sequence.
•The additional methods of authentication are used only if the previous method returns an
error, not if it fails. To ensure that the authentication succeeds even if all methods return an
error, specify
•All
aaa authentication enable default
none
as the final method in the command line.
requests sent by the Ethernet Switch Module to a
RADIUS or TACACS+ server include the username "$enab15$".
Example
The following example sets authentication when accessing higher privilege levels.
method list for a remote telnet, SSH or console. To return to the default specified by the
authentication login command, use the
Syntax
login authentication {default
no login authentication
•
default
— Uses the default list created with the
•
list-name
Line Configuration mode command specifies the login authentication
no
form of this command.
|
list-name
}
authentication login
— Uses the indicated list created with the
command.
authentication login
command.
AAA Commands49
Default Configuration
Uses the default set with the command
Command Mode
authentication login
.
Line Configuration mode
User Guidelines
•Changing login authentication from default to another value may disconnect the telnet
session.
Example
The following example specifies the default authentication method for a console.
console(config)# line console
console(config-line)# login authentication default
enable authentication
The
enable authentication
method list when accessing a higher privilege level from a remote telnet, SSH or console. To return
to the default specified by the
Syntax
enable authentication {default
Line Configuration mode command specifies the authentication
enable authentication
|
list-name
command, use the no form of this command.
}
no enable authentication
•
default
•
list-name
Default Configuration
Uses the default set with the command
Command Mode
Line Configuration mode
User Guidelines
There are no user guidelines for this command.
Example
The following example specifies the default authentication method when accessing a higher
privilege level from a console.
50AAA Commands
— Uses the default list created with the
— Uses the indicated list created with the
authentication enable
authentication enable
authentication enable
.
command.
command.
console(config)# line console
console(config-line)# enable authentication default
ip http authentication
The
ip http authentication
methods for http. To return to the default, use the
Syntax
ip http authentication
no ip http authentication
•
method1 [method2
KeywordDescription
localUses the local username database for authentication.
noneUses no authentication.
radiusUses the list of all RADIUS servers for authentication.
tacacsUses the list of all TACACS+ servers for authentication.
Default Configuration
The local user database is checked. This has the same effect as the command
authentication local
Global Configuration mode command specifies authentication
no
form of this command.
method1 [method2
...]
...] — Specify at least one from the following table:
.
ip http
Command Mode
Global Configuration mode
User Guidelines
•The additional methods of authentication are used only if the previous method returns an
error, not if it fails. To ensure that the authentication succeeds even if all methods return an
error, specify
Example
none
as the final method in the command line.
The following example configures the http authentication.
console(config)# ip http authentication radius local
ip https authentication
The
ip https authentication
methods for https servers. To return to the default, use the
Global Configuration mode command specifies authentication
no
form of this command.
AAA Commands51
Syntax
ip https authentication
method1 [method2
...]
no ip https authentication
•
method1 [method2
KeywordSource or destination
localUses the local username database for authentication.
noneUses no authentication.
radiusUses the list of all RADIUS servers for authentication.
tacacsUses the list of all TACACS+ servers for authentication.
Default Configuration
The local user database is checked. This has the same effect as the command
authentication local
Command Mode
...] — Specify at least one from the following table:
ip https
.
Global Configuration mode
User Guidelines
•The additional methods of authentication are used only if the previous method returns an
error, not if it fails. To ensure that the authentication succeeds even if all methods return an
error, specify
none
as the final method in the command line.
Example
The following example configures https authentication.
console(config)# ip https authentication radius local
show authentication methods
The
authentication methods
authentication methods.
Syntax
show authentication methods
Default Configuration
This command has no default configuration.
Command Mode
Privileged EXEC mode
52AAA Commands
Privileged EXEC mode command displays information about the
User Guidelines
There are no user guidelines for this command.
Example
The following example displays the authentication configuration.
console# show authentication methods
Login Authentication Method Lists
----------------------------------Console_Default: None
Network_Default: Local
— Does not forbid forwarding all multicast packets.
•
interface-list
— Separates non-consecutive valid Ethernet ports with a comma and no
spaces; a hyphen is used to designate a range of ports.
•
port-channel-number-list
— Separates non-consecutive valid port-channels with a comma
and no spaces; a hyphen is used to designate a range of port-channels.
Default Configuration
By default, this setting is disabled (forwarding to the port is not forbidden).
Command Mode
Interface Configuration (VLAN) mode
User Guidelines
•IGMP snooping dynamically discovers multicast router ports. When a multicast router port is
discovered, all the multicast packets are forwarded to it unconditionally.
•This command prevents a port to be a multicast router port.
Example
In this example, forwarding all multicast packets to g16 are forbidden.
•Multiple hosts must be enabled see "dot1x multiple-hosts".
Example
In this example, the port g12 is locked for learning, but continues to forward all packets received,
with traps being sent every 100 seconds if a packet with an unkown source address is received.
console(config)# interface ethernet g12
console(config-if)# port security forward trap 100
port security routed secure-address
The
port security routed secure-address
command adds MAC-layer secure addresses to a routed port. Use the
delete the MAC addresses.
— Specify a MAC address in the format of xx:xx:xx:xx:xx:xx.
Default Configuration
No addresses are defined.
Command Mode
Interface configuration (Ethernet, port-channel) mode. Cannot be configured for a range of
interfaces (range context).
User Guidelines
•The command enables adding secure MAC addresses to a routed port in port security mode.
The command is available when the port is a routed port and in port security mode. The
address is deleted if the port exits the security mode or is not a routed port.
Example
In this example, the MAC-layer address 66:66:66:66:66:66 is added to port g13.
console(config)# interface ethernet g13
console(config-if)# port security routed secure-address
66:66:66:66:66:66
show bridge address-table
The
show bridge address-table
forwarding database.
Privileged EXEC mode command displays all entries in the bridge-
Syntax
show bridge address-table [vlan
number
]
•
vlan
— Specific valid VLAN, such as VLAN 1.
•
interface —
•
port-channel-number
Default Configuration
A valid Ethernet port
— A valid port-channel number.
vlan
] [
ethernet interface |
.
port-channel
port-channel-
This command has no default configuration.
Command Mode
Privileged EXEC mode
User Guidelines
•Internal usage VLANs (VLANs that are automatically allocated on routed ports) would be
presented in the VLAN column by a port number and not by a VLAN ID.
Address Table Commands65
Example
In this example, all classes of entries in the bridge-forwarding database are displayed.
Global Configuration mode command sets the time zone for display purposes.
no
form of this command.
] [
zone acronym
Hours difference from UTC. (Range: -12
Minutes difference from UTC. (Range: 0 – 59)
The acronym of the time zone. (Range: Up to 4 characters)
]
– +
13)
Default Configuration
Command Mode
User Guidelines
Examples
The following example sets the timezone to 6 hours difference from UTC.
74Clock
Clock set to UTC.
Global Configuration mode
•The system internally keeps time in UTC, so this command is used only for display purposes
and when the time is manually set.
console(config)
# clock timezone -6 zone CST
clock summer-time
The
clock summer-time
automatically switch to summer time (daylight saving time). To configure the software not to
automatically switch to summer time, use the
Syntax
clock summer-time recurring {usa
[
offset
offset
Global Configuration mode command configures the system to
no
form of this command.
] [
zone acronym
| eu | {
]
week day month hh:mm week day month hh:mm
}}
clock summer-time date date month year hh:mm date month year hh:mm [offset offset
acronym
clock summer-time date month date year hh:mm month date year hh:mm [offset
acronym
]
offset
]
no clock summer-time recurring
•
recurring
— Indicates that summer time should start and end on the corresponding
specified days every year.
•
date
— Indicates that summer time should start on the first specific date listed in the
command and end on the second specific date in the command.
•
usa
— The summer time rules are the United States rules.
•
eu
— The summer time rules are the European Union rules.
•
•
•
•
•
•
•
•
week —
day —
date —
month —
year —
hh:mm —
offset —
acronym
Week of the month. (Range: 1 - 5,
Day of the week (Range: first three letters by name, like
first, last
)
sun
)
Date of the month (Range:1 - 31)
Month (Range: first three letters by name, like Jan)
year - no abbreviation (Range: 2000 - 2097)
Time in military format, in hours and minutes (Range: hh: 0 - 23, mm:0 - 59)
Number of minutes to add during summer time (Range: 1 - 1440).
— The acronym of the time zone to be displayed when summer time is in effect.
If unspecified default to the timezone acronym. (Range: Up to 4 characters)
] [
] [
zone
zone
Default Configuration
Summer time is disabled.
offset —
acronym
Default is 60 minutes.
— If unspecified default to the timezone acronym.
If the timezone has not been defined, the default will be UTC.
Clock75
Command Mode
Global Configuration mode
User Guidelines
•In both the
date
and
recurring
forms of the command, the first part of the command specifies
when summer time begins, and the second part specifies when it ends. All times are relative to
the local time zone. The start time is relative to standard time. The end time is relative to
summer time. If the starting month is chronologically after the ending month, the system
assumes that you are in the southern hemisphere.
•USA rule for daylight saving time:
•Start: First Sunday in April
•End: Last Sunday in October
•Time: 2 am local time
•EU rule for daylight saving time:
•Start: Last Sunday in March
•End: Last Sunday in October
•Time: 1 am (01:00)
•The following steps must be completed before setting the summer clock:
a
Configure the summer time.
b
Define the timezone.
c
Set the clock. For example:
console(config)# clock summer-time recurring usa
Examples
The following example sets summer time starting on the first Sunday in April at 2 am and finishing
on the last Sunday in October at 2 am.
sntp authentication-key
The
for Simple Network Time Protocol (SNTP). To remove the authentication key for SNTP, use the
form of this command.
76Clock
console(config)# clock timezone 2 zone TMZ2
console(config)# clock set 10:00:00 apr 15 2004
console(config)# clock summer-time recurring first sun apr 2:00
last sun oct 2:00
sntp authentication-key
Global Configuration mode command defines an authentication key
no
Syntax
sntp authentication-key
no sntp authentication-key
•
number —
•
value —
Default Configuration
number
md5 value
number
Key number (Range: 1 - 4294967295)
Key value (Range: 1-8 characters)
No authentication key is defined.
Command Mode
Global Configuration mode
User Guidelines
•Multiple keys can be generated.
Examples
The following example defines the authentication key for SNTP.
Simple Network Time Protocol (SNTP) client. To return to default, use the
command.
Global Configuration mode command sets the polling time for the
no
form of this
78Clock
Syntax
sntp client poll timer
seconds
no sntp client poll timer
•
seconds —
Default Configuration
Polling interval in seconds (Range: 60-86400)
Polling interval is 1024 seconds.
Command Mode
Global Configuration mode
User Guidelines
There are no user guidelines for this command.
Examples
The following example sets the polling time for the Simple Network Time Protocol (SNTP) client
to 120 seconds.
console(config)# sntp client poll timer 120
sntp broadcast client enable
The
sntp broadcast client enable
Network Time Protocol (SNTP) broadcast clients. To disable the SNTP broadcast clients, use the
no
form of this command.
Global Configuration mode command enables the Simple
Syntax
sntp broadcast client enable
no sntp broadcast client enable
Default Configuration
Client is disabled.
Command Mode
Global Configuration mode
User Guidelines
•Use the
sntp client enable
Interface Configuration mode command to enable the SNTP
client on a specific interface.
•The port must have an IP interface already configured.
Clock79
Examples
The following example enables the SNTP broadcast clients.
console(config)# sntp broadcast client enable
sntp anycast client enable
The
sntp anycast client enable
disable the anycast client, use the
Syntax
sntp anycast client enable
no sntp anycast client enable
Default Configuration
Client is disabled.
Command Mode
Global Configuration mode
User Guidelines
Global Configuration mode command enables anycast client. To
no
form of this command.
Examples
The following example enables anycast clients.
sntp client enable (interface)
The
enables the Simple Network Time Protocol (SNTP) client on an interface. This applies to both
receive broadcast and anycast updates. To disable the SNTP client, use the
command.
Syntax
80Clock
•Polling time is determined by the
sntp client poll timer
Global Configuration mode
command.
•Use the
sntp client enable
Interface Configuration mode command to enable the SNTP
client on a specific interface.
•The port must have an IP interface already configured.