Brocade, the B-wing symbol, BigIron, DCX, Fabric OS, FastIron, IronPoint, IronShield, IronView, IronWare, JetCore, NetIron,
SecureIron, ServerIron, StorageX, and TurboIron are registered trademarks, and DCFM, Extraordinary Networks, and SAN Health
are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. All other brands,
products, or service names are or may be trademarks or service marks of, and are used to identify, products or services of their
respective owners.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning
any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to
this document at any time, without notice, and assumes no responsibility for its use. This informational document describes
features that may not be currently available. Contact a Brocade sales office for information on feature and product availability.
Export of technical data contained in this document may require an export license from the United States government.
The authors and Brocade Communications Systems, Inc. shall have no liability or responsibility to any person or entity with
respect to any loss, cost, liability, or damages arising from the information contained in this book or the computer programs that
accompany it.
The product described by this document may contain “open source” software covered by the GNU General Public License or other
open source license agreements. To find out which open source software is included in Brocade products, view the licensing
terms applicable to the open source software, and obtain a copy of the programming source code, please visit
http://www.brocade.com/support/oscd.
Brocade Communications Systems, Incorporated
Corporate and Latin American Headquarters
Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
Tel: 1-408-333-8000
Fax: 1-408-333-8101
E-mail: info@brocade.com
European Headquarters
Brocade Communications Switzerland Sàrl
Centre Swissair
Tour B - 4ème étage
29, Route de l'Aéroport
Case Postale 105
CH-1215 Genève 15
Switzerland
Tel: +41 22 799 5640
Fax: +41 22 799 5641
E-mail: emea-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems China HK, Ltd.
No. 1 Guanghua Road
Chao Yang District
Units 2718 and 2818
Beijing 100020, China
Tel: +8610 6588 8888
Fax: +8610 6588 9999
E-mail: china-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems Co., Ltd. (Shenzhen WFOE)
Citic Plaza
No. 233 Tian He Road North
Unit 1308 – 13th Floor
Guangzhou, China
Tel: +8620 3891 2000
Fax: +8620 3891 2111
E-mail: china-info@brocade.com
This document is organized to help you find the information that you want as quickly and easily as
possible.
The document contains the following components:
• Chapter 1, “CLI Basics” describes how to access the switch and the CEE CLI command modes.
• Chapter 2, “CEE Commands” describes thecommands to manage the configuration files and
includes other file management commands.
Supported hardware and software
This document includes updated information specific to Fabric OS 7.0.0. The following hardware
platforms are supported in this release of the CEE Administrator’s Guide:
• Brocade 8000
The following blades are supported by this release of the CEE Administrator’s Guide:
• Brocade FCOE10-24 blade
Within this manual, any appearance of the term “Brocade FCoE hardware” is referring to:
Although many different software and hardware configurations are tested and supported by
Brocade Communications Systems, Inc. for Fabric OS 7.0.0, documenting all possible
configurations and scenarios is beyond the scope of this document.
To obtain information about an OS version other than Fabric OS v7.0.0, refer to the documentation
specific to that OS version.
What’s new in this document
This document has been updated for for Fabric OS v7.0.0.
This document has been updated with corrections and updates for defects discovered since the
release of the previous version.
For further information about new features and documentation updates for this release, refer to
the release notes.
Document conventions
This section describes text formatting conventions and important notice formats used in this
document.
Text formatting
The narrative-text formatting conventions that are used are as follows:
bold textIdentifies command names
Identifies the names of user-manipulated GUI elements
Identifies keywords and operands
Identifies text to enter at the GUI or CLI
italic textProvides emphasis
Identifies variables
Identifies paths and Internet addresses
Identifies document titles
code textIdentifies CLI output
Identifies command syntax examples
For readability, command names in the narrative portions of this guide are presented in mixed
lettercase: for example, switchShow. In actual examples, command lettercase is all lowercase.
xiiConverged Enhanced Ethernet Command Reference
53-1002164-01
.Command syntax conventions
NOTE
ATTENTION
CAUTION
DANGER
Command syntax in this manual follows these conventions:
TABLE 1Command syntax conventions
ConventionDescription
[ ]Default responses to system prompts appear in square brackets.
{x | y | z} A choice of required keywords appears in braces separated by vertical
bars. You must select one.
screen fontExamples of information displayed on the screen.
<>Nonprinting characters, for example passwords, appear in angle
brackets
[ ]Keywords or arguments that appear within square brackets are
optional.
bold face font Commands and keywords.
italicVariables for which you supply values.
Notes, cautions, and warnings
The following notices and statements are used in this manual. They are listed below in order of
increasing severity of potential hazards.
A note provides a tip, guidance, or advice, emphasizes important information, or provides a
reference to related information.
An Attention statement indicates potential damage to hardware or data.
A Caution statement alerts you to situations that can be potentially hazardous to you or cause
damage to hardware, firmware, software, or data.
A Danger statement indicates conditions or situations that can be potentially lethal or extremely
hazardous to you. Safety labels are also attached directly to products to warn of these conditions
or situations.
Key terms
For definitions specific to Brocade and Fibre Channel, see the technical glossaries on Brocade
Connect. See “Brocade resources” on page xiv for instructions on accessing Brocade Connect.
This document may contain references to the trademarks of the following corporations. These
trademarks are the properties of their respective companies and corporations.
These references are made for informational purposes only.
CorporationReferenced Trademarks and Products
Microsoft CorporationWindows, Windows NT, Internet Explorer
Oracle CorporationOracle, Java
Netscape Communications CorporationNetscape
Red Hat, Inc.Red Hat, Red Hat Network, Maximum RPM, Linux Undercover
Additional information
This section lists additional Brocade and industry-specific documentation that you might find
helpful.
Brocade resources
To get up-to-the-minute information, go to http://my.brocade.com and register at no cost for a user
ID and password.
White papers, online demonstrations, and data sheets are available through the Brocade website
at:
For additional Brocade documentation, visit the Brocade website:
http://www.brocade.com
Release notes are available on the MyBrocade website and are also bundled with the Fabric OS
firmware.
Other industry resources
For additional resource information, visit the Technical Committee T11 website. This website
provides interface standards for high-performance and mass storage applications for Fibre
Channel, storage management, and other applications:
http://www.t11.org
For information about the Fibre Channel industry, visit the Fibre Channel Industry Association
website:
http://www.fibrechannel.org
xivConverged Enhanced Ethernet Command Reference
53-1002164-01
Getting technical help
Contact your switch support supplier for hardware, firmware, and software support, including
product repairs and part ordering. To expedite your call, have the following information available:
1. General Information
• Switch model
• Switch operating system version
• Error numbers and messages received
• supportSave command output
• Detailed description of the problem, including the switch or fabric behavior immediately
following the problem, and specific questions
• Description of any troubleshooting steps already performed and the results
• Serial console and Telnet session logs
• syslog message logs
2. Switch Serial Number
The switch serial number and corresponding bar code are provided on the serial number label,
as illustrated below:
*FT00X0054E9*
FT00X0054E9
The serial number label is located as follows:
• Brocade 8000 —On the switch ID pull-out tab located inside the chassis on the port side
on the left.
3. World Wide Name (WWN)
Use the licenseIdShow command to display the WWN of the chassis.
If you cannot use the licenseIdShow command because the switch is inoperable, you can get
the WWN from the same place as the serial number, except for the Brocade DCX. For the
Brocade DCX, access the numbers on the WWN cards by removing the Brocade logo plate at
the top of the nonport side of the chassis.
Document feedback
Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and
completeness of this document. However, if you find an error or an omission, or you think that a
topic needs further development, we want to hear from you. Forward your feedback to:
documentation@brocade.com
Provide the title and version number of the document and as much detail as possible about your
comment, including the topic heading and page number and your suggestions for improvement.
The Brocade FCoE hardware runs traditional Fabric OS software and can be managed using the
same tools traditionally used for SAN management. Using the Fabris OS command line interface
(CLI), administrators have access to all commands and utilities common to other Brocade switches.
In addition, Fabris OS software on the Brocade 8000 enables Brocade Web Tools to support the
following features for configuring and managing a Converged Ethernet Network:
• CEE interface display and configuration
• FCoE trunk display and configuration
• CEE configuration including link aggregation control protocol (LACP), Virtual LANs (VLANs),
Quality of Service (QoS), and Link Layer Discovery Protocol (LLDP)/Data Center Bridging
eXchange (DCBX) protocol
• FCoE login groups
1
CEE command line interface
The Brocade CEE CLI is designed to support the management of CEE and Layer 2 Ethernet
switching functionality. The CEE CLI uses an industry-standard hierarchical shell familiar to
Ethernet/IP networking administrators.
All conventional port-related Fabric OS CLI commands are only applicable to Fibre Channel. These
commands have no knowledge of the Ethernet ports. The CEE features and CEE ports can only be
configured through the CEE CLI interface, which is accessed by entering the cmsh command from
the Fabric OS shell.
The system starts up with the default Fabric OS configuration and the CEE startup configuration.
After logging in, you are in the Fabric OS shell. For information on accessing the CEE commands
from the Fabric OS shell, see “Accessing the CEE CLI from the Fabric OS shell” on page 3.
Some Fabric OS commands are available in the CEE shell. Enter the Fabris OS ? command at the
CEE CLI privileged EXEC mode command prompt to view the available Fabric OS commands. The
traditional Fabric OS command help found in the Fabric OS shell is not available through the CEE
shell.
The CEE configuration is not affected by the configUpload and configDownload commands entered
in the Fabric OS shell.
Saving your configuration changes
Any configuration changes made to the switch are written into the running-config file. This is a
dynamic file that is lost when the switch reboots. During the boot sequence, the switch resets all
configuration settings to the values in the startup-config file.
To make your changes permanent, you must use either the write memory command or the copy
command to commit the running-config file to the startup--config file.
Saving configuration changes with the copy command
Perform this task from privileged EXEC mode.
Enter the copy command to save the running-config file to the startup-config file.
switch#copy running-config startup-config
Saving configuration changes with the write memory command
Perform this task from privileged EXEC mode.
Enter the write memory command to save the running-config file to the startup-config file.
switch# write memory
Overwrite the startup config file (y/n): y
Building configuration...
CEE CLI RBAC permissions
Role-Based Action Control (RBAC) defines the capabilities that a user account has based on the
role the account has been assigned. Table 2 displays the permissions matrix for CEE. Permissions
are specifically defined as follows:
• OM—When you enter the cmsh command, you are put directly into privileged EXEC mode.
• O—When you enter the cmsh command, you are limited to EXEC mode.
O = observe, OM = observe and modify, N = access not allowed
Accessing the CEE CLI through the console or Telnet
The procedure to access the CEE CLI is the same through either the console interface or through a
Telnet session; both access methods bring you to the login prompt.
2Converged Enhanced Ethernet Command Reference
53-1002164-01
CEE command line interface
NOTE
NOTE
Protocol configurationInterface configuration
Port-channel
10-Gigabit Ethernet
VLAN
CEE CLI features
CEE map
ACLs
Console and VTY (line)
configuration
Console
Virtual terminal
Global configuration
EXEC
Privileged EXEC
LLDP
Spanning-tree
1
While this example uses the admin role to log in to the switch, any role listed in the “CEE CLI RBAC
From the global configuration mode,
specify a protocol by entering one of
the following commands:
• protocol lldp
• protocol spanning-tree mstp
• protocol spanning-tree rstp
• protocol spanning-tree stp
Display running system information
and set terminal line parameters.
Display and change system
parameters. Note that this is the
administrative mode and also
includes EXEC mode commands.
Configure features that affect the
entire switch.
Access and configure individual
interfaces.
Access and configure protocols.
4Converged Enhanced Ethernet Command Reference
53-1002164-01
NOTE
TABLE 3CEE CLI command modes (Continued)
CEE command line interface
1
Command
mode
Feature
configuration
Console and
VTY (line)
configuration
PromptHow to access the command modeDescription
CEE map:
switch(config-ceemap)#
Standard ACL:
switch(conf-macl-std)#
Extended ACL:
switch(conf-macl-ext)#
switch(config-line)#From the global configuration mode,
From the global configuration mode,
specify a CEE feature by entering
one of the following commands:
• cee-map
• mac access-list
configure a terminal connected
through the console port by entering
the line console command.
Configure a terminal connected
through a Telnet session by entering
the line vty command.
Access and configure CEE features.
Identify traffic based on the MAC
addresses, such as VLAN IDs and
different encapsulations.
Standard Access Control Lists filter
the traffic on a source address and
block traffic close to a destination.
Extended Access Control Lists block
traffic based on any given packet
attribute.
Configure a terminal connected
through the console port or a
terminal connected through a Telnet
session.
After you apply the access list to an
interface, a Virtual Teletype (VTY), or
through a command using the
access list keyword, it becomes
effective.
Pressing Ctrl+Z or entering the end command in any mode returns you to privileged EXEC mode.
Entering exit in any mode returns you to the previous mode.
CEE CLI keyboard shortcuts
Tab le 4 lists CEE CLI keyboard shortcuts.
TABLE 4CEE CLI keyboard shortcuts
KeystrokeDescription
Ctrl+B or the left arrow keyMoves the cursor back one character.
Ctrl+F or the right arrow keyMoves the cursor forward one character.
Ctrl+AMoves the cursor to the beginning of the command line.
Ctrl+EMoves the cursor to the end of the command line.
Esc BMoves the cursor back one word.
Esc FMoves the cursor forward one word.
Ctrl+ZReturns to privileged EXEC mode.
Ctrl+P or the up arrow keyDisplays commands in the history buffer with the most recent command
displayed first.
Ctrl+N or the down arrow keyDisplays commands in the history buffer with the most recent command
In EXEC and privileged EXEC modes, use the show history command to list the commands most recently entered. The switch retains the history of the last 1000 commands entered.
Using the do command as a shortcut
You can use the do command to save time when you are working in any configuration mode and
you want to run a command in EXEC or privileged EXEC mode.
For example, if you are configuring an LLDP and you want to execute a privileged EXEC mode
command, such as the dir command, you would first have to exit the LLDP configuration mode.
However, by using the do command with the dir command, you can ignore the need to change
configuration modes, as shown in the following example.
switch(conf-lldp)#do dir
Contents of flash://
-rw-r----- 1276 Wed Feb 4 07:08:49 2009 startup_rmon_config
-rw-r----- 1276 Wed Feb 4 07:10:30 2009 rmon_config
-rw-r----- 1276 Wed Feb 4 07:12:33 2009 rmon_configuration
-rw-r----- 1276 Wed Feb 4 10:48:59 2009 starup-config
Displaying CEE CLI commands and command syntax
Enter a question mark (?) in any command mode to display the list of commands available in that
mode.
switch>?
Exec commands:
enable Turn on privileged mode command
exit End current mode and down to previous mode
help Description of the interactive help system
logout Exit from the EXEC
quit Exit current mode and down to previous mode
show Show running system information
terminal Set terminal line parameters
To display a list of commands that start with the same characters, type the characters followed by
the question mark (?).
switch>e?
enable Turn on privileged mode command
exit End current mode and down to previous mode
To display the keywords and arguments associated with a command, enter the keyword followed by
the question mark (?).
switch#terminal ?
length Set number of lines on a screen
no Negate a command or set its defaults
If the question mark (?) is typed within an incomplete keyword, and the keyword is the only keyword
starting with those characters, the CLI displays help for that keyword only.
switch#show d?
dot1x IEEE 802.1X Port-Based Access Control
<cr>
6Converged Enhanced Ethernet Command Reference
53-1002164-01
CEE command line interface
1
If the question mark (?) is typed within an incomplete keyword but the keyword matches several
keywords, the CLI displays help for all the matching keywords.
switch#show i?
interface Interface status and configuration
ip Internet Protocol (IP)
The CEE CLI accepts abbreviations for commands. The following example is the abbreviation for the
show qos interface all command.
switch#sh q i a
If the switch does not recognize a command after Enter is pressed, an error message displays.
switch#hookup
^
% Invalid input detected at '^' marker.
If an incomplete command is entered, an error message displays.
switch#show
% Incomplete command.
CEE CLI command completion
To automatically complete the spelling of commands or keywords, begin typing the command or
keyword and then press Tab. For example, at the CLI command prompt, type te and press Tab:
switch#te
The CLI displays:
switch#terminal
If there is more than one command or keyword associated with the characters typed, the CEE CLI
displays all choices. For example, at the CLI command prompt, type show l and press Tab:
switch#show l
The CLI displays:
switch#show l
lacp line lldp
CEE CLI command output modifiers
You can filter the output of the CEE CLI show commands using the output modifiers described in
Tab le 5.
TABLE 5CEE CLI command output modifiers
Output modifierDescription
append Appends the output to a file.
redirectRedirects the command output to the specified file.
includeDisplays the command output that includes the specified expression.
excludeDisplays the command output that excludes the specified expression.
appendAppends the command output to the specified file.
beginDisplays the command output that begins with the specified expression.
lastDisplays only the last few lines of the command output.
teeRedirects the command output to the specified file. Note that this modifier also
displays the command output.
FLASHRedirects the output to flash memory.
8Converged Enhanced Ethernet Command Reference
53-1002164-01
Chapter
CEE Commands
advertise dcbx-fcoe-app-tlv
Advertises application Type, Length, Values (TLVs) to ensure interoperability of traffic over the Data
Center Bridging eXchange protocol (DCBX), which runs over LLDP to negotiate an FCoE application
TLV.
Synopsisadvertise dcbx-fcoe-app-tlv
no advertise dcbx-fcoe-app-tlv
OperandsNone
DefaultsAdvertise is enabled.
Command
Modes
DescriptionUse this command to advertise application TLVs to ensure interoperability of traffic over DCBX
Protocol LLDP configuration mode
packets. Converged Enhanced Ethernet (CEE) parameters related to FCoE must be negotiated
before FCoE traffic can begin on a CEE link. An FCoE application TLV is exchanged over LLDP, which
negotiates information such as FCoE priority, and Priority Flow Control (PFC) pause. Use the no
advertise dcbx-fcoe-app-tlv command to return to the default setting.
2
Usage
Guidelines
ExamplesNone
See Alsoadvertise dot1-tlv, advertise dot3-tlv, advertise optional-tlv
Advertises to any attached device the FCoE status of the logical link.
Synopsisadvertise dcbx-fcoe-logical-link-tlv
no advertise dcbx-fcoe-logical-link-tlv
OperandsNone
DefaultsAdvertise is enabled.
Command
Modes
DescriptionUse this command to advertise to any attached device the FCoE status of the logical link. Use the
Usage
Guidelines
ExamplesNone
See Alsoadvertise dcbx-fcoe-app-tlv, advertise dcbx-iscsi-app-tlv
Protocol LLDP configuration mode
no advertise dcbx-fcoe-logical-link-tlv command to return to the default setting.
There are no usage guidelines for this command.
10Converged Enhanced Ethernet Command Reference
53-1002164-01
advertise dcbx-iscsi-app-tlv
Advertises application Type, Length, Values (TLVs) to ensure interoperability of traffic over the Data
Center Bridging eXchange protocol (DCBX), which runs over LLDP to negotiate an iSCSI application
TLV.
Synopsisadvertise dcbx-iscsi-app-tlv
no advertise dcbx-iscsi-app-tlv
OperandsNone
DefaultsAdvertise is enabled.
advertise dcbx-iscsi-app-tlv
2
Command
Modes
DescriptionUse this command to advertise application TLVs to ensure interoperability of traffic over DCBX
Usage
Guidelines
ExamplesNone
See Alsoadvertise dcbx-fcoe-app-tlv
Protocol LLDP configuration mode
packets. Converged Enhanced Ethernet (CEE) parameters related to iSCSI must be negotiated
before iSCSI traffic can begin on a CEE link. An iSCSI application TLV is exchanged over LLDP, which
negotiates information such as iSCSI priority, and Priority Flow Control (PFC) pause. Use the no
advertise dcbx-iscsi-app-tlv command to return to the default setting.
Synopsischannel-group number mode {active | passive | on} {type standard | brocade}
OperandsnumberSpecifies a Link Aggregation Group (LAG) port channel-group number to
Enables Link Aggregation on an interface.
no channel-group
which this link should administratively belong to. The range of valid values is
from 1 through 63.
modeSpecifies the mode of Link Aggregation.
activeEnables the initiation of LACP negotiation on an interface.
passiveDisables LACP on an interface.
onEnables static link aggregation on an interface.
typeSpecifies the type of LAG.
standardSpecifies the 802.3ad standard-based LAG.
brocadeSpecifies the Brocade proprietary hardware-based trunking.
channel-group
2
DefaultsBy default, the type is set to standard.
Command
Modes
DescriptionUse this command to add an interface to a port-channel specified by the channel-group number.
Usage
Guidelines
Interface configuration mode
This command enables link aggregation on an interface, so that it may be selected for aggregation
by the local system. Use the no channel-group command to remove the port-channel members.
Only a maximum of 24 LAGs can be created. Note the following guidelines:
• A maximum of four link aggregation groups can be created per switch when the type is set to
brocade.
• A maximum of four links can become part of a single aggregation group when the type is set to
brocade and they must be on the same port-channel.
• Links 0 through 7 belong to port-channel 1; links 8 through 15 belong to port-channel 2, and
links 16 through 23 belong to port-channel 3.
• For the standard type, a maximum of 16 links can be aggregated per aggregation group and
they can be members of any port-channel.
ExamplesTo set the channel-group number to 4 and the mode to active:
Configures the switch to interoperate with some legacy Cisco switches.
Synopsiscisco-interoperability {disable| enable}
OperandsdisableDisables Cisco interoperability for the Multiple Spanning Tree Protocol (MSTP)
enableEnables Cisco interoperability for the MSTP switch.
DefaultsCisco interoperability is disabled.
switch.
Command
Multiple Protocol Spanning Tree mode
Modes
DescriptionUse this command to enable or disable the switch to interoperate with some legacy Cisco switches.
For some switches, the MSTP field Version 3 Length does not adhere to the current standards.
Usage
Guidelines
If Cisco interoperability is required on any switch in the network, then all switches in the network
must be compatible, and therefore enabled using this command for interoperability with a Cisco
switch.
ExamplesTo enable Cisco interoperability on a switch:
Clears all the Media Access Control (MAC) access control list (ACL) counters for all interfaces that
have an ACL applied on them or for a specific interface.
Synopsisclear counters access-list mac name {interface |port-channel number | tengigabitethernet
slot/port | vlan vlan_id}
Operands.nameSpecifies the name of the MAC ACL.
interface tengigabitethernet
Specifies a valid 10 Gbps Ethernet interface.
slotSpecifies a valid slot number.
portSpecifies a valid port number.
port-channel number
Specifies the port-channel number. The range of valid values is from 1
through 63.
vlan vlan_idSpecifies the VLAN number. The range of valid values is from 1 through 3583.
DefaultsThere are no default configurations for this command.
Command
Modes
DescriptionUse this command to clear counters for all MAC ACL counters, or for a specific interface for the MAC
Usage
Guidelines
ExamplesTo clear counters for the configured MAC ACL named test on an interface:
See Alsoshow mac access-group, show statistics access-list mac
Privileged EXEC mode
ACL.
If the interface keyword is not specified, then ACL counters on all interfaces that have this ACL
applied are cleared. There are 255 ACL counters supported per port group.
switch#clear counters access-list mac test interface tengigabitethernet 0/1
To clear counters for the configured MAC access list named test on all interfaces on which this ACL
is applied:
switch#clear counters access-list mac test
22Converged Enhanced Ethernet Command Reference
53-1002164-01
clear dot1x statistics
Clears all 802.1X statistics.
Synopsisclear dot1x statistics
OperandsNone
DefaultsThere are no defaults for this command.
clear dot1x statistics
2
Command
Modes
DescriptionUse this command to clear all accumulated port authentication statistics on all ports.
no debug lldp packet { all | interface tengigabitethernet slot/port }
Operandsall Turns on LLDP packet debugging on all interfaces.
interface tengigabitethernet
debug lldp packet
Specifies the 10 Gbps Ethernet interface.
slotSpecifies the slot number.
portSpecifies the port number.
both Turns on debugging for both transmit and receive packets.
detailTurns on debugging with detailed information.
rxTurns on debugging for only received LLDP packets.
txTurns on debugging for only transmitted LLDP packets.
2
DefaultsBy default, debugging is not turned on.
Command
Modes
DescriptionUse this command to enable debugging for Link Layer Discovery Protocol (LLDP).
Usage
Guidelines
ExamplesTo enable debugging of LLDP for both received and transmitted packets on 10 Gbps Ethernet
See Alsoshow debug lldp
Privileged EXEC mode
EXEC mode
To display debugging outputs on a particular cmsh session, use the terminal monitor command.
Use the no debug lldp packet command to disable debugging.
no debug spanning-tree {all | bpdu {rx | tx {all | interface port-channel number | interface
tengigabitethernet slot/port}}}
Operandsall Turns on spanning-tree packet debugging on all interfaces.
bpduTu rns on Bridge Protocol Data Unit debugging.
rxTurns on debugging for only received spanning-tree packets.
txTurns on debugging for only transmitted spanning-tree packets.
interface port-channel number
interface tengigabitethernet
Specifies the port-channel interface. The range of valid values is from 1
through 63.
Specifies the 10 Gbps Ethernet interface.
slotSpecifies the slot number.
portSpecifies the port number.
DefaultsBy default, debugging is not turned on.
Command
Modes
Privileged EXEC mode
EXEC mode
DescriptionUse this command to enable debugging for the Spanning Tree Protocol.
Usage
Guidelines
To display debugging outputs on a particular cmsh session, use the terminal monitor command.
Use the no debug command to disable debugging.
ExamplesTo enable debugging of spanning-tree packets for both Rx and Tx on 10 Gbps Ethernet interface
0/1:
switch#debug spanning-tree bpdu rx interface tengigabitethernet 0/1
switch#debug spanning-tree bpdu tx interface tengigabitethernet 0/1
switch#show debug spanning-tree
MSTP debugging status:
Spanning-tree rx debugging is off
Te 0/1 rx is on
Spanning-tree tx debugging is off
Te 0/1 tx is on
See Alsoshow debug spanning-tree
38Converged Enhanced Ethernet Command Reference
53-1002164-01
delete
delete
2
Deletes a specified file from flash memory.
Synopsisdelete filename
OperandsfilenameSpecifies the name of the file to be deleted from flash memory on the local
switch using the following format: [flash://]filename.
DefaultsThere is no default configuration for this command.
Command
Privileged EXEC mode
Modes
DescriptionUse this command to delete a file from flash memory. After the file is deleted, it cannot be restored.
Usage
There are no usage guidelines for this command.
Guidelines
ExamplesTo delete a file from flash memory:
switch#delete file1
% Warning: File will be deleted (from flash:)!
Continue?(y/n):y
or
switch#delete flash://file1
% Warning: File will be deleted (from flash:)!
Continue?(y/n):y
Configures a MAC address rule to drop traffic based on the source and destination MAC addresses.
Synopsisdeny {any | host MAC _ACL| MAC_ACL} {any | host MAC _ACL| MAC _ACL} {EtherType | arp | fcoe
| ipv4} [count]
no deny {any | host MAC _ACL| MAC_ACL} {any | host MAC _ACL| MAC _ACL} {EtherType | arp |
fcoe | ipv4}
OperandsanySpecifies any source MAC address.
host MAC_ACLSpecifies a host-specific source host MAC address for which to set deny
MAC_ACLSpecifies any MAC address for which to set deny conditions. Use the format
anySpecifies any destination MAC address.
host MAC_ACLSpecifies a host-specific destination address for which to set deny conditions.
MAC_ACLSpecifies any destination address for which to set deny conditions. Use the
conditions. Use the format HHHH.HHHH.HHHH.
HHHH.HHHH.HHHH.
Use the format HHHH.HHHH.HHHH.
format HHHH.HHHH.HHHH.
EthertypeSpecifies the protocol number for which to set the deny conditions. The
range of valid values is from 1536 through 65535.
arpSpecifies to deny the Address Resolution Protocol (0x0806).
fcoeSpecifies to deny the Fibre Channel over Ethernet Protocol (0x8906).
ipv4Specifies to deny the IPv4 protocol (0x0800).
countEnables counting of the packets matching the rule.
DefaultsBy default, no MAC ACLs are configured.
Command
Modes
DescriptionUse this command to configure rules to match and drop traffic based on the source and
Usage
Guidelines
ExamplesTo create a rule in an extended MAC ACL to drop IPv4 traffic from the source MAC address
Feature Access Control List configuration mode
destination MAC addresses and the protocol type. You can also enable counters for a specific rule.
There are 255 ACL counters supported per port group. Use the no deny command to remove a rule
from the MAC ACL.
The first set of {any |
address. The second set of {any | host MAC_ACL | MAC_ACL} parameters is specific to the
destination MAC address. The host MAC_ACL parameters is used for host sources only.
0022.3333.4444 to the destination MAC address 0022.3333.5555
of packets:
Configures a MAC address rule to drop traffic based on the source MAC address.
Synopsisdeny {MAC_ACL | any} [count]
no deny {MAC_ACL | any}
OperandsMAC_ACLSpecifies the source host MAC address for which to set deny conditions. Use
anySpecifies any source MAC address.
countEnables counting of the packets matching the rule.
DefaultsBy default, no MAC ACLs are configured.
the format HHHH.HHHH.HHHH.
Command
Modes
DescriptionUse this command to configure rules to match and to drop traffic based on the source MAC
Usage
Guidelines
ExamplesTo create a rule in a standard MAC ACL to drop traffic from the source MAC address
See Alsomac access-list standard, permit (standard ACLs)
Feature Access Control List configuration mode
address. You can also enable counters for a specific rule. There are 255 ACL counters supported
per port group. Use the no deny command to remove a rule from the MAC ACL.
There are no usage guidelines for this command.
0022.3333.4444 and to enable the counting of packets:
switch(conf-macl-std)#deny 0022.3333.4444 count
To delete a rule from a standard MAC ACL:
switch(conf-macl-std)#no deny 0022.3333.4444
42Converged Enhanced Ethernet Command Reference
53-1002164-01
description (interface)
Specifies a string that contains the description of the interface.
Synopsisdescription line
no description
OperandslineSpecifies characters describing the interface. The maximum number of
DefaultsThere are no default configurations for this command.
characters is 64.
description (interface)
2
Command
Modes
DescriptionUse this command to specify a string that contains the description of the interface. Use the no
Usage
Guidelines
ExamplesTo set the string describing tengigabitethernet interface 0/1:
Exits the privileged EXEC mode and returns to the EXEC mode.
DefaultsThere are no default configurations for this command.
Command
Modes
DescriptionUse this command to exit the privileged EXEC mode and return to the EXEC mode. See “CEE CLI
Usage
Guidelines
ExamplesTo return to the EXEC mode:
See Alsoenable, end, exit, quit
Privileged EXEC mode
command modes” on page 3.
This is the only command that allows you to return to the EXEC mode. Using the exit or quit
commands from the privileged EXEC mode ends the session instead of returning to the EXEC
mode.
switch#disable
switch>
46Converged Enhanced Ethernet Command Reference
53-1002164-01
do
Allows you to run commands in EXEC mode from the configuration mode.
Synopsisdo command
OperandscommandSpecifies the command you want to run.
DefaultsThere are no default configurations for this command.
do
2
Command
All configuration modes
Modes
DescriptionUse this command to save time when you are configuring the switch in any configuration mode and
you want to run a command in the privileged EXEC mode.
Usage
There are no usage guidelines for this command.
Guidelines
ExamplesTo r u n t h e clear counters all command with the do command:
switch(config)#do clear counters all
To display the contents from the working directory using the do command:
switch(config)#do dir
Contents of flash://
-rw-r----- 1276 Wed Feb 4 07:08:49 2009 startup_rmon_config
-rw-r----- 1276 Wed Feb 4 07:10:30 2009 rmon_config
-rw-r----- 1276 Wed Feb 4 07:12:33 2009 rmon_configuration
-rw-r----- 1276 Wed Feb 4 10:48:59 2009 starup-config
Sets the number of seconds that a switch remains quiet between a failed authentication and an
attempt to retry authentication.
Synopsisdot1x quiet-period interval seconds
no dot1x quiet-period
Operandsinterval secondsSpecifies the time in seconds between attempts at authentication. The range
DefaultsThe default time is 60 seconds.
of valid values is from 1 through 65535.
Command
Modes
DescriptionUse this command to set the time in seconds after which a switch attempts to perform
Usage
Guidelines
ExamplesTo change the interval time to 200 seconds:
See AlsoNone
Interface configuration mode
authentication after a failed authentication. Use the no dot1x quiet-period command to return to
the default setting. When a switch cannot authenticate a client, the switch remains idle for a
quiet-period interval of time, then attempts the operation again.
Changing the quiet-period interval time to a number lower than the default can result in a faster
response time.
Sets the time in seconds that a switch waits for a response to an Extensible Authentication Protocol
(EAP) request frame from the client before resending the request.
Synopsisdot1x timeout supp-timeout seconds
OperandssecondsSpecifies the number of seconds that the switch waits for a response to the
DefaultsThe default timeout is 30 seconds.
EAP frame. The range of valid values is from 1 through 65535.
Command
Modes
DescriptionUse this command to specify the EAP response timeout.
Usage
Guidelines
ExamplesTo set 40 seconds as the switch-to-client retransmission time for the EAP request frame:
Sets the number of seconds that the switch waits for a response to an Extensible Authentication
Protocol (EAP) request or identity frame from the client before retransmitting the request.
Synopsisdot1x timeout tx-period seconds
Operandsseconds Specifies the time in seconds between successive request ID attempts. The
DefaultsThe default timeout is 30 seconds.
dot1x timeout tx-period
range of valid values is from 1 through 65535.
2
Command
Modes
DescriptionUse this command to set the interval between successive attempts to request an ID (EAP ID Req).
Usage
Guidelines
ExamplesTo set 34 as the number of seconds to wait for a response to an EAP request or identity frame from
DefaultsThere are no default configurations for this command.
Command
Modes
DescriptionUse this command to enable the privileged EXEC command mode.
Usage
Guidelines
ExamplesTo enable the privileged EXEC mode:
See Alsodisable
EXEC mode
To return to the EXEC mode from privileged EXEC mode, use the disable command. Using the exit
or quit command from the privileged EXEC mode ends the session. See “CEE CLI command modes”
on page 3.
switch> enable
switch#
60Converged Enhanced Ethernet Command Reference
53-1002164-01
end
Returns to the privileged EXEC command mode from all configuration modes.
Synopsisend
OperandsNone
DefaultsThere are no default configurations for this command.
end
2
Command
Modes
DescriptionUse this command to return to the privileged EXEC command mode from any command mode. See
Usage
Guidelines
ExamplesTo return to the privileged EXEC mode from interface configuration mode:
DefaultsThere are no default configurations for this command.
Erases all the files from flash memory.
Command
Modes
DescriptionUse this command to erase the files from flash memory.
Usage
Guidelines
ExamplesTo erase the files from flash memory:
See Alsodir, delete
EXEC mode
There are no usage guidelines for this command.
switch#erase flash
%% Warning: Erasing flash filesystem will remove all files in flash://.
Continue to erase?(y/n):y
switch#
62Converged Enhanced Ethernet Command Reference
53-1002164-01
error-disable-timeout enable
Enables the timer to bring the interface out of the error-disabled state.
Synopsiserror-disable-timeout enable
OperandsNone
DefaultsThere are no default configurations for this command.
error-disable-timeout enable
2
Command
Modes
DescriptionUse this command to enable the timer to bring the interface out of the disabled state.
Usage
Guidelines
ExamplesTo bring the interface out of the disabled state:
See Alsoerror-disable-timeout interval
Spanning Tree Protocol configuration mode
When the Spanning Tree Protocol (STP) Bridge Protocol Data Unit (BPDU) guard disables a port, the
port remains in the disabled state unless the port is enabled manually. This command allows you
to enable the interface from the disabled state.
OperandsminutesSpecifies the time interval in minutes. The range is from 0 through 35791.
DefaultsThe default is 10 minutes.
exec-timeout
Sets the interval that the EXEC command interpreter waits for user input.
no exec-timeout
seconds Specifies the time interval in seconds. The range is from 0 through 2147483.
2
Command
Modes
DescriptionUse this command to set the interval; the command interpreter waits for user input detected. Use
Usage
Guidelines
ExamplesTo configure the wait interval for the console session:
See Alsoline console, line vty, show line
Console and VTY (line) configuration mode
no exec-timeout to disable the wait interval that the command interpreter waits.
The exec-timeout command is used to set the time the Telnet session waits for an idle VTY session,
before it time outs. An exec-timeout setting of 0 (zero) causes the Telnet session to wait indefinitely.
DescriptionOnly a single FCoE map is allowed, named “default”.
User GuidelinesThere are no usage guidelines for this command.
ExamplesTo activate the FCoE map:
See Alsocee-map, fcoeport, fcoe-vlan
Global configuration mode
If you do not execute the fcoe-vlan command first, VLAN 1002 is created automatically and
becomes the FCoE VLAN. If VLAN 1002 already exists, it is modified to become the FCoE VLAN.
DefaultsThere are no default configurations for this command.
Applies the FCoE map to an interface.
Command
Modes
DescriptionUse this command to apply the FCoE map to an interface. You must be in interface configuration
User GuidelinesThere are no usage guidelines for this command.
ExamplesTo enter interface configuration mode and then apply the FCoE map:
See Alsocee-map, fcoe-map, fcoe-vlan
Interface configuration mode
mode for a selected interface.
This command makes the interface FCoE-capable. The CEE map is added to the interface, and if
the interface is CEE-capable, the FCoE VLAN is added to the interface.
value_1 The first CoS value. The range of valid values is from 0 through 7.
value_2 The second CoS value. The range of valid values is from 0 through 7.
value_3 The third CoS value. The range of valid values is from 0 through 7.
value_4 The fourth CoS value. The range of valid values is from 0 through 7.
value_5 The fifth CoS value. The range of valid values is from 0 through 7.
value_6 The sixth CoS value. The range of valid values is from 0 through 7.
value_7 The seventh CoS value. The range of valid values is from 0 through 7.
2
value_8The eighth CoS value. The range of valid values is from 0 through 7.
DefaultsThe default list value is 3.
Command
Modes
DescriptionThe FCoE priority bit setting is a bitmap setting where each bit position stands for a priority. When
User GuidelinesThough setting multiple bits is allowed (exercising the full range of values), there is no reason to set
ExamplesThe following example sets the first CoS value:
See Alsolldp fcoe-priority-bits
Protocol LLDP configuration mode
you set a bit for a particular priority, that priority setting is applied to the FCoE traffic (that is, the
incoming FCoE traffic will have that priority).
FCoE traffic is only supported on the priority level that also has flow control enabled. This means
that the final advertised FCoE priority consists of the configured FCoE priority setting and the
per-priority flow control setting.
more than one bit because the adapters do not support multiple priorities for FCoE.
OperandssecondsSpecifies the range of time in seconds that an interface spends in the
DefaultsThe default is 15 seconds.
forward-delay
Specifies the time an interface spends in each of the listening and learning states.
no forward-delay
Spanning Tree Protocol (STP) learning and listening states. The range of valid
values is from 4 through 30.
2
Command
Modes
DescriptionUse this command to specify how long the listening and learning states last before the interface
Usage
Guidelines
Spanning Tree Protocol configuration mode
begins the forwarding of all spanning-tree instances. Use the no forward-delay command to return
to the default settings.
STP interface states:
• Listening - The interface processes the Bridge Protocol Data Units (BPDUs) and awaits possible
new information that might cause it to return to the blocking state.
• Learning - The interface does not yet forward frames (packets). Instead it learns source
addresses from frames received and adds them to the filtering database (switching database).
• Forwarding - An interface receiving and sending data (normal operation). STP still monitors
incoming BPDUs that can indicate it should return to the blocking state to prevent a loop.
• Blocking - An interface that can cause a switching loop (no user data is sent or received), but it
might go to the forwarding state if the other links in use fail and the STP determines that the
interface may transition to the forwarding state. BPDU data continues to be received in the
blocking state.
When you change the spanning-tree forward-delay time, it affects all spanning-tree instances.
When configuring the forward-delay, the following relationship should be kept:
Operandsinstance_idSpecifies the MSTP instance. The range of valid values is from 1 through 15.
DefaultsThe default priority value is 32768.
Maps a VLAN to a Multiple Spanning Tree Protocol (MSTP) instance.
no instance
vlan vlan_idSpecifies the VLAN to map to an MSTP instance. The range of valid values is
from 1 through 3583.
priority priority_id
Specifies the priority for the specified instance. The range of valid values is
from 0 through 61440. The priority values can be set only in increments of
4096.
Command
Modes
DescriptionUse this command to map a VLAN to an MTSP instance. You can group a set of VLANs to an
Usage
Guidelines
Multiple Spanning Tree Protocol configuration mode
instance. This command can be used only after the VLAN is defined. Use the no instance command
to unmap the VLAN from the MSTP instance.
The following rules apply:
• VLANs must be created before mapping to instances.
• VLAN instance mapping is removed from the configuration if the underlying VLANs are deleted.