USING THE CONSOLE CLI.........................................................................................................................................3
SWITCH PORT COMMANDS....................................................................................................................................22
PORT SECURITY COMMANDS................................................................................................................................25
DHCP SERVER COMMANDS.................................................................................................................................190
LIMITED IP MULTICAST ADDRESS.......................................................................................................................204
ACCESS CONTROL LIST (ACL) COMMANDS......................................................................................................227
TIME RANGE COMMANDS.....................................................................................................................................246
TIME AND SNTP COMMANDS...............................................................................................................................262
DNS COMMANDS....................................................................................................................................................301
IP MULTICASTING COMMANDS............................................................................................................................328
D-LINK SINGLE IP MANAGEMENT COMMANDS.................................................................................................413
COMMAND HISTORY LIST.....................................................................................................................................423
The Switch can be managed through the Switch’s serial port, Telnet, or the Web-based management agent. The Command Line
Interface (CLI) can be used to configure and manage the Switch via the serial port or Telnet interfaces.
This manual provides a reference for all of the commands contained in the CLI. Configuration and management of the Switch via the
Web-based management agent is discussed in the Manual.
Accessing the Switch via the Serial Port
The Switch’s serial port’s default settings are as follows:
• 115200 baud
• no parity
• 8 data bits
• 1 stop bit
A computer running a terminal emulation program capable of emulating a VT-100 terminal and a serial port configured as above is
then connected to the Switch’s serial port via an RS-232 DB-9 cable.
With the serial port properly connected to a management computer, the following screen should be visible. If this screen does not
appear, try pressing Ctrl+r o refresh the console screen.
Figure 1-1. Initial CLI screen
There is no initial username or password. Just press the Enter key twice to display the CLI input cursor − DGS-3627:5#. This is the
command line where all commands are input.
Setting the Switch’s IP Address
Each Switch must be assigned its own IP Address, which is used for communication with an SNMP network manager or other
TCP/IP application (for example BOOTP, TFTP). The Switch’s default IP address is 10.90.90.90. You can change the default Switch
IP address to meet the specification of your networking address scheme.
The Switch is also assigned a unique MAC address by the factory. This MAC address cannot be changed, and can be found on the
initial boot console screen – shown below.
The Switch’s MAC address can also be found in the Web management program on the Switch Information (Basic Settings) window
on the Configuration menu.
The IP address for the Switch must be set before it can be managed with the Web-based manager. The Switch IP address can be
automatically set using BOOTP or DHCP protocols, in which case the actual address assigned to the Switch must be known.
The IP address may be set using the Command Line Interface (CLI) over the console serial port as follows:
1. Starting at the command line prompt, enter the commands config ipif System ipaddress xxx.xxx.xxx.xxx/yyy.yyy.yyy.yyy.
Where the x’s represent the IP address to be assigned to the IP interface named System and the y’s represent the
corresponding subnet mask.
2. Alternatively, you can enter config ipif System ipaddress xxx.xxx.xxx.xxx /z. Where the x’s represent the IP address to be
assigned to the IP interface named System and the z represents the corresponding number of subnets in CIDR notation.
The IP interface named System on the Switch can be assigned an IP address and subnet mask which can then be used to connect a
management station to the Switch’s Telnet or Web-based management agent.
Figure 1-3. Assigning an IP Address
In the above example, the Switch was assigned an IP address of 10.24.22.200 with a subnet mask of 255.0.0.0. The system message
Success indicates that the command was executed successfully. The Switch can now be configured and managed via Telnet, SNMP
MIB browser and the CLI or via the Web-based management agent using the above IP address to connect to the Switch.
The Switch supports a console management interface that allows the user to connect to the Switch’s management agent via a serial
port and a terminal or a computer running a terminal emulation program. The console can also be used over the network using the
TCP/IP Telnet protocol. The console program can be used to configure the Switch to use SNMP-based network management software
over the network.
This chapter describes how to use the console interface to access the Switch, change its settings, and monitor its operation.
Note: Switch configuration settings are saved to non -volatile RA M using the save command. The current
configuration will then be retained in the Switch’s NV-RAM, and reloaded when the Switch is rebooted. If
the Switch is rebooted without using the save command, the last config uration saved to NV-RAM will be
loaded.
Connecting to the Switch
The console interface is used by connecting the Switch to a VT100-compatible terminal or a computer running an ordinary terminal
emulator program (e.g., the HyperTerminal program included with the Windows operating system) using an RS-232C serial cable.
Your terminal parameters will need to be set to:
• VT-100 compatible
• 115200 baud
• 8 data bits
• No parity
• One stop bit
• No flow control
Users can also access the same functions over a Telnet interface. Once an IP address has been set for the Switch, users can use a
Telnet program (in VT-100 compatible terminal mode) to access and control the Switch. All of the screens are identical, whether
accessed from the console port or from a Telnet interface.
After the Switch reboots and you have logged in, the console looks like this:
Figure 2- 1. Initial Console Screen after logging in
Commands are entered at the command prompt, DGS-3627:5#.
There are a number of helpful features included in the CLI. Entering the ? command will display a list of all of the top-level
commands.
Figure 2- 2. The ? Command
When users enter a command without its required parameters, the CLI will prompt a Next possible completions: message.
Figure 2- 3. Example Command Parameter Help
In this case, the command config account was entered with the parameter <username>. The CLI will then prompt to enter the
<username> with the message, Next possible completions:. Every command in the CLI has this feature, and complex commands
have several layers of parameter prompting.
In addition, after typing any given command plus one space, all of the next possible sub-commands can be seen, in sequential order,
by repeatedly pressing the Tab key.
To re-enter the previous command at the command prompt, press the up arrow cursor key. The previous command will appear at the
command prompt.
Figure 2- 4. Using the Up Arrow to Re-enter a Command
In the above example, the command config account was entered without the required parameter <username>, the CLI returned the
Next possible completions: <username> prompt. The up arrow cursor control key was pressed to re-enter the previous command
(config account) at the command prompt. Now the appropriate username can be entered and the config account command re-
executed.
All commands in the CLI function in this way. In addition, the syntax of the help prompts are the same as presented in this manual −
angle brackets < > indicate a numerical value or character string, braces { } indicate optional parameters or a choice of parameters,
and brackets [ ] indicate required parameters.
If a command is entered that is unrecognized by the CLI, the top-level commands will be displayed under the Available commands:
prompt.
Figure 2- 5. Available Commands
The top-level commands consist of commands such as show or config. Most of these commands require one or more parameters to
narrow the top-level command. This is equivalent to show what? or config what? Where the what? is the next parameter.
For example, if you enter the create command with no additional parameters, the CLI will then display all of the possible next
The following symbols are used to describe how command entries are made and values and arguments are specified in this manual.
The online help contained in the CLI and available through the console interface uses the same syntax.
Note: All commands are case-sensitive. Be sure to disable Caps Lock or
any other unwanted function that changes text case.
<angle brackets>
Purpose Encloses a variable or value that must be specified.
Syntax
Description In the above syntax example, users must supply an IP interface name in the
<ipif_name> space, a VLAN name in the <vlan_name 32> space, and the
network address, including the netmask, in the <network_address>
(<ip_addr/netmask>) space. Do not type the angle brackets.
Purpose Encloses an optional value or set of optional arguments.
Syntax
Description In the above syntax example, users have the option to specify config or
Example
command
reset {[config | system]}
system. It is not necessary to specify either optional value, however the effect
of the system reset is dependent on which, if any, value is specified. Therefore,
with this example there are three possible outcomes of performing a system
reset. See the following chapter, Basic Commands for more details about the
reset command.
reset config
Line Editing Key Usage
Delete Deletes the character under the cursor and then shifts the remaining characters
in the line to the left.
Backspace Deletes the character to the left of the cursor and then shifts the remaining
characters in the line to the left.
Insert or Ctrl+R Toggle on and off. When toggled on, inserts text and shifts previous text to the
right.
Left Arrow Moves the cursor to the left.
Right Arrow Moves the cursor to the right.
Up Arrow Repeats the previously entered command. Each time the up arrow is pressed,
the command previous to that displayed appears. This way it is possible to
review the command history for the current session. Use the down arrow to
progress sequentially forward through the command history list.
Down Arrow The down arrow will display the next command in the command history entered
in the current session. This displays each command sequentially as it was
entered. Use the up arrow to review previous commands.
Tab Shifts the cursor to the next field to the left.
Multiple Page Display Control Keys
Space Displays the next page.
CTRL+c Stops the display of remaining pages when multiple pages are to be displayed.
ESC Stops the display of remaining pages when multiple pages are to be displayed.
n Displays the next page.
p Displays the previous page.
q Stops the display of remaining pages when multiple pages are to be displayed.
r Refreshes the pages currently displayed.
a Displays the remaining pages without pausing between pages.
Enter Displays the next line or table entry.
The create account command is used to create user accounts that consist of a
username of 1 to 15 characters and a password of 0 to 15 characters. Up to eight
user accounts can be created.
admin <username 15> - Enter a name between 1 and 15 alphanumeric characters
to define the administrator account created here.
operator <username 15>- Enter a name between 1 and 15 alphanumeric
characters to define the operator account created here.
user <username 15>- Enter a name between 1 and 15 alphanumeric ch aracters
-- --------- ------------ ----- ----------8 03:36:27 Serial Port 5 Anonymous
Total Entries: 1
CTRL+CESCq Quit SPACEn Next Page p Previous Page r Refresh
Used to display a list of currently logged-in users.
This command displays a list of all the users that are logged-in at
the time the command is issued.
None
None.
Example usage:
To display the Switch’s information:
show switch
Purpose
Syntax show switch
Description
Parameters
Restrictions
DGS-3627:5#show switch
Command: show switch
Device Type : DGS-3627 Gigabit Ethernet Switch
MAC Address : 00-10-20-33-45-00
IP Address : 10.24.22.200 (Manual)
VLAN Name : default
Subnet Mask : 255.0.0.0
Default Gateway : 0.0.0.0
Boot PROM Version : Build 1.10-B06
Firmware Version : Build 2.40-B19
Hardware Version : 2A1G
System Name :
System Location :
System Contact :
Spanning Tree : Disabled
GVRP : Disabled
Used to display general information about the Switch.
This command displays information about the Switch.
None.
None.
802.1x : Disabled
Jumbo Frame : Off
Clipaging : Disabled
MAC Notification : Disabled
Port Mirror : Disabled
SNTP : Disabled
DHCP Relay : Disabled
DNSR Status : Disabled
VRRP : Disabled
HOL Prevention State : Disabled
Syslog Global State : Disabled
Single IP Management: Disabled
DGS-3627:5#
Example usage:
To display the serial port setting:
show serial_port
Purpose
Syntax show serial_port
Description
Parameters
Restrictions
DGS-3627:5#show serial_port
Command: show serial_port
Baud Rate : 115200
Data Bits : 8
Parity Bits : None
Stop Bits : 1
Auto-Logout : 10 mins
DGS-3627:5#
Used to display the current serial port settings.
This command displays the current serial port settings.
None.
None
Used to pause the scrolling of the console screen when the show
command displays more than one page.
This command is used when issuing the show command which
causes the console screen to rapidly scroll through several pages.
This command will cause the console to pause at the end of each
page. The default setting is enabled.
None.
Only administrator-level and operator-level users can issue this
command.
disable clipaging
Purpose
Used to disable the pausing of the console screen scrolling at the
This command is used to disable the pausing of the console screen
at the end of each page when the show command would display
more than one screen of information.
None.
Only administrator-level and operator-level users can issue this
command.
enable telnet
Purpose
Syntax enable telnet {<tcp_port_number 1-65535>}
Used to enable communication with and management of the Switch
using the Telnet protocol.
This command is used to enable the Telnet protocol on the Switch.
The user can specify the TCP or UDP port number the Switch will
use to listen for Telnet requests.
{<tcp_port_number 1-65535>}− The TCP port number. TCP ports
are numbered between 1 and 65535. The “well-known” TCP port for
the Telnet protocol is 23.
Only administrator-level and operator-level users can issue this
command.
Used to disable the Telnet protocol on the Switch.
Syntax disable telnet
Description
Parameters
This command is used to disable the Telnet protocol on the Switch.
None.
Only administrator-level and operator-level users can issue this
command.
enable web
Purpose
Syntax enable web {<tcp_port_number 1-65535>}
Description
Parameters
Used to enable the HTTP-based management software on the Switch.
This command is used to enable the Web-based management software
on the Switch. The user can specify the TCP port number the Switch
will use to listen for Telnet requests.
{<tcp_port_number 1-65535>}− The TCP port number. TCP ports are
numbered between 1 and 65535. The “well-known” port for the Webbased management software is 80.
Example usage:
To enable HTTP and configure port number:
Restrictions
DGS-3627:5#enable web 80
Command: enable web 80
Note: SSL will be disabled if web is enabled.
Success.
DGS-3627:5#
Only administrator-level and operator-level users can issue this
command.
disable web
Purpose
Syntax disable web
Description
Parameters
Used to disable the HTTP-based management software on the Switch.
This command disables the Web-based management software on the
Switch.
None.
Example usage:
To disable HTTP:
Restrictions
DGS-3627:5#disable web
Command: disable web
Only administrator-level and operator-level users can issue this
Used to save changes in the Switch’s configuration to non-volatile RAM.
This command is used to enter the current switch configuration or log
file into non-volatile RAM. The saved switch configuration will be loaded
into the Switch’s memory each time the Switch is restarted.
config <drive_id> – Specify to save current settings to the Flash
memory of the switch.
<drive_id> - Specify the ID of the drive where the log or configuration
file will be placed.
<pathname 64> - Enter a name of up to 64 characters to define the file
to be saved on the flash drive.
log – Specify to save current Switch log to NV-RAM.
all – Use to save the configuration and log file to NV-RAM.
Only administrator-level and operator-level users can issue this
command.
To restore all of the Switch’s parameters to its default values:
Used to reset the Switch to the factory default settings.
This command is used to restore the Switch’s configuration to the default
settings assigned from the factory.
config− If the keyword ‘config’ is specified, all of the factory default
settings are restored on the Switch including the IP address, user
accounts, and the switch history log. The Switch will not save or reboot.
system− If the keyword ‘system’ is specified all of the factory default
settings are restored on the Switch. The Switch will save and reboot after
the settings are changed to default. Rebooting will clear all entries in the
Forwarding Data Base.
If no parameter is specified, the Switch’s current IP address, user
accounts, and the switch history log are not changed. All other parameters
are restored to the factory default settings. The Switch will not save or
reboot.
Only administrator-level users can issue this command.
DGS-3627:5#reset config
Command: reset config
Are you sure to proceed with system reset?(y/n) y
Success.
DGS-3627:5#
Example usage:
To initiate the login procedure:
login
Purpose
Syntax login
Description
Parameters
Restrictions
DGS-3627:5#login
Command: login
UserName:
Used to log in a user to the Switch’s console.
This command is used to initiate the login procedure. The user will be
prompted for a Username and Password.
To show the current hardware status of the Switch:
Description
Parameters
Restrictions
DGS-3627:5#logout
This command terminates the current user’s session on the Switch’s
console.
None.
None.
show device_status
Purpose Used to display the current status of the hardware of the Switch.
Syntax
Description This command displays the current status of the Switch’s physical
Parameters None.
Restrictions None.
show device_status
elements.
DGS-3627:5#show device_status
Command: show device_status
Internal Power External power Side Fan Back Fan
---------------------- ------------------------ ---------------- -- ---------------
Active Fail OK ---
DGS-3627:5#
config command_prompt
Purpose Used to configure the command prompt for the Command Line
Interface.
Syntax
Description This command is used to configure the command prompt for the CLI
Parameters <string 16> - Enter an alphanumeric string of no more than 16
Firmware: Build 2.40-B19
Copyright(C) 2008 D-Link Corporation. All rights reserved.
===============================================================================
<Function Key> <Control Key>
Ctrl+C Quit without save left/right/
Ctrl+W Save and quit up/down Move cursor
Ctrl+D Delete line
Ctrl+X Erase all setting
Ctrl+L Reload original setting
This command allows for the configuration of the Switch’s Ethernet ports. Only the ports
listed in the <portlist> will be affected.
all − Configure all ports on the Switch.
<portlist> − Specifies a port or range of ports to be configured. The beginning and end of
the port list range are separated by a dash.
medium_type [fiber | copper] – This applies only to the Combo ports. If configuring the
Combo ports this defines the type of transport medium used.
speed – Allows the user to adjust the speed for a port or range of ports. The user has a
choice of the following:
• auto − Enables auto-negotiation for the specified range of ports.
• [10 | 100 | 1000] − Configures the speed in Mbps for the specified range of
ports. Gigabit ports are statically set to 1000 and cannot be set to slower
speeds.
•[half | full]− Configures the specified range of ports as either full-duplex or halfduplex.
•[master | slave] - The master setting (1000M/Full_M) will allow the port to
advertise capabilities related to duplex, speed and physical layer type. The
master setting will also determine the master and slave relationship between
the two connected physical layers. This relationship is necessary for
establishing the timing control between the two physical layers. The timing
control is set on a master physical layer by a local source. The slave setting
(1000M/Full_S) uses loop timing, where the timing comes form a data stream
received from the master. If one connection is set for 1000M/Full_M, the other
side of the connection must be set for 1000M/Full_S. Any other configuration
will result in a link down status for both ports.
flow_control [enable | disable] – Enable or disable flow control for the specified ports.
learning [enable | disable] − Enables or disables the MAC address learning on the
specified range of ports.
state [enable | disable] − Enables or disables the specified range of ports.
description <desc 1-32> - Enter an alphanumeric string of no more than 32 characters to
describe a selected port interface.
clear_description - Enter this command to clear the port description of the sele cted
To configure the speed of ports 1 to 3 to be 10 Mbps, full duplex, with learning and state enabled:
show ports
Purpose
Syntax show ports {<portlist>} {[description} | err_disabled]}
Description
Parameters
Only administrator-level and operator-level users can issue this command.
DGS-3627:5#config ports 1-3 speed 10_full learning enable state enable
Command: config ports 1-3 speed 10_full learning enable state enable
Success.
DGS-3627:5#
Used to display the current configuration of a range of ports.
This command is used to display the current configuration of a range of ports.
<portlist> − Specifies a port or range of ports to be displayed. The beginning
and end of the port list range are separated by a dash.
{description} – Adding this parameter to the show ports command indicates
that a previously entered port description will be included in the display.
err_disabled – Choosing this parameter will display ports that have been
disconnected due to an error on the port, such as a Loopback Detection.
Restrictions
Example usage:
To display the configuration of all ports on a standalone switch:
None.
DGS-3627:5#show ports
Command: show ports
Port Port Settings Connection Address
State Speed/Duplex/FlowCtrl Speed/Duplex/FlowCtrl Learning
------ ------------- --------------- ------------------- ------------------------------ --- ---------------1 Enabled Auto/Enabled Link Down Enabled
2 Enabled Auto/Enabled Link Down Enabled
3 Enabled Auto/Enabled Link Down Enabled
4 Enabled Auto/Enabled Link Down Enabled
5 Enabled Auto/Enabled Link Down Enabled
6 Enabled Auto/Enabled Link Down Enabled
7 Enabled Auto/Enabled Link Down Enabled
8 Enabled Auto/Enabled Link Down Enabled
9 Enabled Auto/Enabled Link Down Enabled
10 Enabled Auto/Enabled Link Down Enabled
11 Enabled Auto/Enabled 100M/Full/None Enabled
12 Enabled Auto/Enabled Link Down Enabled
13 Enabled Auto/Enabled Link Down Enabled
14 Enabled Auto/Enabled Link Down Enabled
15 Enabled Auto/Enabled Link Down Enabled
16 Enabled Auto/Enabled Link Down Enabled
17 Enabled Auto/Enabled Link Down Enabled
18 Enabled Auto/Enabled Link Down Enabled
19 Enabled Auto/Enabled Link Down Enabled
CTRL+CESCq Quit SPACEn Next Page p Previous Page r Refresh
23
Example usage:
To display the configuration of all ports on the Switch, with description:
DGS-3627:5#show ports description
Command: show ports description
Port Port Settings Connection Address
State Speed/Duplex/FlowCtrl Speed/Duplex/FlowCtrl Learning
------ -------- ------------------------------- -------------------------------- ------------ --1 Enabled Auto/Disabled Link Down Enabled
Description: dads1
2 Enabled Auto/Disabled Link Down Enabled
Description:
3 Enabled Auto/Disabled Link Down Enabled
Description:
4 Enabled Auto/Disabled Link Down Enabled
Description:
5 Enabled Auto/Disabled Link Down Enabled
Description:
6 Enabled Auto/Disabled Link Down Enabled
Description:
7 Enabled Auto/Disabled Link Down Enabled
Description:
8 Enabled Auto/Disabled Link Down Enabled
Description:
CTRL+CESCq Quit SPACEn Next Page p Previous Page r Refresh
To display the Error Disabled ports:
DGS-3627:5#show ports err_disabled
Command : show ports err_disabled
Port Port Connection status Reason
State
------- ------- -------------------------- -----------2 Enabled Err-disabled Storm control
Desc: Port 2
8 Enabled Err-disabled Storm control
Desc: Port 8
Syntax delete port_security_entry vlan_name <vlan_name 32> port
Description
Parameters
Restrictions
Example usage:
To delete a port security entry:
DGS-3627:5#delete port_security_entry vlan_name default port 6
mac_address 00-01-30-10-2C-C7
Command: delete port_security_entry vlan_name default port 6
mac_address 00-01-30-10-2C-C7
Success.
DGS-3627:5#
Used to delete a port security entry by MAC address, port number
and VLAN ID.
<port> mac_address <macaddr>
This command is used to delete a single, previously learned port
security entry by port, VLAN name, and MAC address.
vlan name <vlan_name 32> - Enter the corresponding vlan name of
the port to delete.
mac_address <macaddr> - Enter the corresponding MAC address,
previously learned by the port, which the user wishes to delete.
port <port> - Enter the port number which has learned the
previously entered MAC address.
Only administrator-level and operator-level users can issue this
command.
Example usage:
clear port_security_entry
Purpose
Syntax clear port_security_entr y port <portlist>
Description
Parameters
Restrictions
Used to clear MAC address entries learned from a specified port for
the port security function.
This command is used to clear MAC address entries which were
learned by the Switch by a specified port. This command only relates
to the port security function.
<portlist> − Specifies a port or port range to clear. The beginning
and end of the port list range are separated by a dash.
Only administrator-level and operator-level users can issue this
command.
Used to display the current port security configuration.
This command is used to display port security information of the
Switch’s ports. The information displayed includes port security,
admin state, maximum number of learning address and lock mode.
<portlist>− Specifies a port or range of ports to be viewed. The
beginning and end of the port list range are separated by a dash.
Each command is listed, in detail, in the following sections.
config box_priority
Purpose Used to configure box priority, which determines which box becomes the
Syntax
Description This command configures box (switch) priority.
Parameters current_box_id <value 1-12> – Identifies the Switch being configured. Range
Restrictions Only administrator-level and operator-level users can issue this command.
is 1-12.
priority <value 1-63> – Assigns a priority value to the box, with lower
numbers having higher priority. The possible priority range is 1-63. This field
is important when the stacking mode is automatically configured. Users who
wish a certain switch become the primary master of the switch stack should
configure their choice for the priority master switch to have the highest
priority (and in essence the lowest number).
config box_id
Purpose Used to configure box ID. Users can use this command to reassign box IDs.
Syntax
Description This command will assign box IDs to switches in a stack.
Parameters current_box_id – Identifies the Switch being configured. Range is 1-12.
DGS-3627:5#show stack_information
Command: show stack_information
Topology : Duplex ring
My Box ID : 1
Master ID : 1
BK Master ID : 2
Box Count : 3
Box User Prio- Prom Runtime H/W
ID Set Type Exist rity MAC version version version
--- ---- ----------- ----- ----- ------------------------- ------- -------- ------- 1 AUTO DGS-3627G Exist 16 00-16-9A-BA-72-CB 1.00-B06 2.20-B35 1A1G
2 AUTO DGS-3650 Exist 16 00-17-9C-BA-12-CB 1.00-B06 2.20-B35 2A1G
3 AUTO DGS-3650 Exist 16 01-17-1A-CA-72-CB 1.00-B06 2.20-B35 2A1G
4 - Not Exist no
5 - Not Exist no
6 - Not Exist no
7 - Not Exist no
8 - Not Exist no
9 - Not Exist no
10 - Not Exist no
11 - Not Exist no
12 - Not Exist no
switch. When enabled, the 10G ports on the rear of the switch will be
enabled for stacking.
stacking mode for the switch. Once this command is executed, it will
cause the switch to reboot. This mode cannot be changed when the
switch is currently stacked with other switches.
string – This string is used to set the confirmation question that will
follow the entry of this command. Entering a “/y” will command the
switch to prompt the user to answer a confirmation question
regarding the reboot of the switch. Entering “/n” will disable the
question and the switch will automatically restart once the command
has been entered.
NOTE: Only ports 26 and 27 of the DGS-3627 support stacking. Port
25 cannot be used for stacking, and is to be used only as a 10Gigabit uplink port.
The network management commands in the Command Line Interface (CLI) are listed (along with the appropriate parameters) in the
following table.
The Switch supports the Simple Network Management Protocol (SNMP) versions 1, 2c, and 3. After enabling SNMP, users can
specify which version of SNMP to use to monitor and control the Switch. Three versions of SNMP vary in the level of security
provided between the management station and the network device. The following table lists the security features of the three SNMP
versions:
SNMP
Version
v1 Community String
v2c Community String
v3 Username
v3 MD5 or SHA Authentication is based on the HMAC-MD5 or HMAC-
v3 MD5 DES or SHA DES Authentication is based on the HMAC-MD5 or HMAC-
The SNMP commands in the Command Line Interface (CLI) are listed (along with the appropriate parameters) in the following table.
Authentication
Method
Description
Community String is used for authentication −
NoAuthNoPriv
Community String is used for authentication −
NoAuthNoPriv
Username is used for authentication − NoAuthNoPriv
SHA algorithms − AuthNoPriv
SHA algorithms − AuthPriv.
DES 56-bit encryption is added based on the CBC-DES
Each command is listed, in detail, in the following sections.
enable snmp
Purpose
Syntax enable snmp
Description
Parameters
Restrictions
Used to enable SNMP on the Switch.
This command is used, in conjunction with the disable snmp
command below, to enable and disable Simple Network
Management Protocol (SNMP) on the Switch.
None.
Only administrator-level and operator-level users can issue this
This command is used, in conjunction with the enable snmp
command above, to enable and disable Simple Network Management
Protocol (SNMP) on the Switch.
None.
Only administrator-level and operator-level users can issue this
The create snmp user command creates a new SNMP user and adds the
user to an SNMP group that is also created by this command. SNMP ensures:
Message integrity − Ensures that packets have not been tampered with during
transit.
Authentication − Determines if an SNMP message is from a valid source.
Encryption − Scrambles the contents of messages to prevent it from being
viewed by an unauthorized source.
<user_name 32>− An alphanumeric name of up to 32 characters that will
identify the new SNMP user.
<groupname 32>− An alphanumeric name of up to 32 characters that will
identify the SNMP group with which the new SNMP user will be associated.
encrypted – Allows the user to choose a type of authorization for
authentication using SNMP. The user may choose:
•by_password – Requires the SNMP user to enter a password for
authentication and privacy. The password is defined by specifying
the auth_password below. This method is recommended.
•by_key – Requires the SNMP user to enter a encryption key for
authentication and privacy. The key is defined by specifying the key
in hex form below. This method is not recommended.
auth - The user may also choose the type of authentication algorithms used to
authenticate the snmp user. The choices are:
md5 − Specifies that the HMAC-MD5-96 authentication level will be used.
md5 may be utilized by entering one of the following:
•<auth password 8-16> - An alphanumeric sting of between 8 and 16
characters that will be used to authorize the agent to receive
packets for the host.
•<auth_key 32-32> - Enter an alphanumeric sting of exactly 32
characters, in hex form, to define the key that will be used to
authorize the agent to receive packets for the host.
sha − Specifies that the HMAC-SHA-96 authentication level will be used.
• <auth password 8-20> - An alphanumeric sting of between 8 and 20
characters that will be used to authorize the agent to receive
packets for the host.
•<auth_key 40-40> - Enter an alphanumeric sting of exactly 40
characters, in hex form, to define the key that will be used to
authorize the agent to receive packets for the host.
priv – Adding the priv (privacy) parameter will allow for encryption in addition
to the authentication algorithm for higher security. The user may choose:
• none – Adding this parameter will add no encryption.
• des – Adding this parameter will allow for a 56-bit encryption to be
added using the DES-56 standard using:
•<priv_pa ssword 8-16> - An alphanumeric string of between 8
and 16 characters that will be used to encrypt the contents of
messages the host sends to the agent.
•<priv_ke y 32-32> - Enter an alphanumeric key string of
exactly 32 characters, in hex form, that will be used to encrypt
the contents of messages the host sends to the agent.
DGS-3627:5#delete snmp view dlinkview all
Command: delete snmp view dlinkview all
Success.
DGS-3627:5#
Used to remove an SNMP view entry previously created on the
Switch.
The delete snmp view command is used to remove an SNMP view
previously created on the Switch.
<view_name 32> − An alphanumeric string of up to 32 characters that
identifies the SNMP view to be deleted.
all− Specifies that all of the SNMP views on the Switch will be
deleted.
<oid> − The object ID that identifies an object tree (MIB tree) that will
be deleted from the Switch.
Only administrator-level users can issue this command.
Example usage:
To display SNMP view configuration:
show snmp view
Purpose
Syntax Show snmp view {<view_name 32>}
Description
Parameters
Restrictions
DGS-3627:5#show snmp view
Command: show snmp view
Vacm View Table Settings
View Name Subtree View Type
-------------------- ------------------------- ------ --- ReadView 1 Included
WriteView 1 Included
NotifyView 1.3.6 Included
restricted 1.3.6.1.2.1.1 Included
restricted 1.3.6.1.2.1.11 Included
restricted 1.3.6.1.6.3.10.2.1 Included
restricted 1.3.6.1.6.3.11.2.1 Included
restricted 1.3.6.1.6.3.15.1.1 Included
CommunityView 1 Included
CommunityView 1.3.6.1.6.3 Excluded
CommunityView 1.3.6.1.6.3.1 Included
Used to display an SNMP view previously created on the Switch.
The show snmp view command displays an SNMP view
previously created on the Switch.
<view_name 32>− An alphanumeric string of up to 32 characters
that identifies the SNMP view that will be displayed.
Only administrator-level and operator-level users can issue this
command.
Syntax create snmp community <community_string 32> view <view_name
Description
Parameters
Used to create an SNMP community string to define the relationship
between the SNMP manager and an agent. The community string acts like
a password to permit access to the agent on the Switch. One or more of the
following characteristics can be associated with the community string:
An Access List of IP addresses of SNMP managers that are permitted to
use the community string to gain access to the Switch’s SNMP agent.
An MIB view that defines the subset of all MIB objects that will be
accessible to the SNMP community.
read_write or read_only level permission for the MIB objects accessible to
the SNMP community.
32> [read_only | read_write]
The create snmp community command is used to create an SNMP
community string and to assign access-limiting characteristics to this
community string.
<community_string 32> − An alphanumeric string of up to 32 characters
that is used to identify members of an SNMP community. This string is used
like a password to give remote SNMP managers access to MIB objects in
the Switch’s SNMP agent.
view <view_name 32> − An alphanumeric string of up to 32 characters that
is used to identify the group of MIB objects that a remote SNMP manager is
allowed to access on the Switch.
read_only − Specifies that SNMP community members using the
community string created with this command can only read the contents of
the MIBs on the Switch.
read_write− Specifies that SNMP community members using the
community string created with this command can read from and write to the
contents of the MIBs on the Switch.
Example usage:
To create the SNMP community string “dlink:”
Restrictions
DGS-3627:5#create snmp community dlink view ReadView read_write
Command: create snmp community dlink view ReadView read_write
Success.
DGS-3627:5#
Only administrator-level users can issue this command.
Purpose
Syntax delete snmp community <community_string 32>
Description
Parameters
Restrictions
DGS-3627:5#delete snmp community dlink
Command: delete snmp community dlink
Success.
DGS-3627:5#
Used to remove a specific SNMP community string from the Switch.
The delete snmp community command is used to remove a
previously defined SNMP community string from the Switch.
<community_string 32>− An alphanumeric string of up to 32
characters that is used to identify members of an SNMP community.
This string is used like a password to give remote SNMP managers
access to MIB objects in the Switch’s SNMP agent.
Only administrator-level users can issue this command.
Example usage:
To display the currently entered SNMP community strings:
show snmp community
Purpose
Syntax show snmp community <community_string 32>
Description
Parameters
Restrictions
DGS-3627:5#show snmp community
Command: show snmp community
SNMP Community Table
Community Name View Name Access Right
Used to display SNMP community strings configured on the Switch.
The show snmp community command is used to display SNMP
community strings that are configured on the Switch.
<community_string 32> − An alphanumeric string of up to 32
characters that is used to identify members of an SNMP community.
This string is used like a password to give remote SNMP managers
access to MIB objects in the Switch’s SNMP agent.
Only administrator-level and operator-level users can issue this
command.
the SNMP group with which the new SNMP user will be associated.
v1 – Specifies that SNMP version 1 will be used. The Simple Network Management
Protocol (SNMP), version 1, is a network management protocol that provides a
means to monitor and control network devices.
v2c – Specifies that SNMP version 2c will be used. The SNMP v2c supports both
centralized and distributed network management strategies. It includes
improvements in the Structure of Management Information (SMI) and adds some
security features.
v3 – Specifies that the SNMP version 3 will be used. SNMP v3 provides secure
access to devices through a combination of authentication and encrypting packets
over the network. SNMP v3 adds:
noauth_nopriv − Specifies that there will be no authorization and no encryption of
packets sent between the Switch and a remote SNMP manager.
auth_nopriv − Specifies that authorization will be required, but there will be no
encryption of packets sent between the Switch and a remote SNMP manager.
auth_priv− Specifies that authorization will be required, and that packets sent
between the Switch and a remote SNMP manger will be encrypted.
read_view – Specifies that the SNMP group being created can request SNMP
messages.
write_view – Specifies that the SNMP group being created has write privileges.
notify_view − Specifies that the SNMP group being created can receive SNMP trap
messages generated by the Switch’s SNMP agent.
• <view_name 32> − An alphanumeri c string of up to 32 characters that is
• Message integrity − Ensures that packets have not been tampered
with during transit.
• Authentication − Determines if an SNMP message is from a valid
source.
• Encryption − Scrambles the contents of messages to prevent it
being viewed by an unauthorized source.
used to identify the group of MIB objects that a remote SNMP manager is
allowed to access on the Switch.
Restrictions
Example usage:
To create an SNMP group named “sg1:”
Only administrator-level users can issue this command.
Purpose
Syntax delete snmp group <groupname 32>
Description
Parameters
Restrictions
DGS-3627:5#delete snmp group sg1
Command: delete snmp group sg1
Success.
DGS-3627:5#
Used to remove an SNMP group from the Switch.
The delete snmp group command is used to remove an SNMP
group from the Switch.
<groupname 32>− An alphanumeric name of up to 32 characters that
will identify the SNMP group with which the new SNMP user will be
associated.
Only administrator-level users can issue this command.
Purpose
Syntax Show snmp groups
Description
Parameters
Restrictions
Example usage:
To display the currently configured SNMP groups on the Switch:
Used to display the group-names of SNMP groups currently configured on
the Switch. The security model, level, and status of each group are also
displayed.
The show snmp groups command displays the group-names of SNMP
groups currently configured on the Switch. The security model, level, and
status of each group are also displayed.
None.
Only administrator-level and operator-level users can issue this command.
DGS-3627:5#show snmp groups
Command: show snmp groups
Vacm Access Table Settings
Group Name : Group3
ReadView Name : ReadView
WriteView Name : WriteView
Notify View Name : NotifyView
Security Model : SNMPv3
Security Level : NoAuthNoPriv
Group Name : initial
ReadView Name : restricted
WriteView Name :
Notify View Name : restricted
Security Model : SNMPv3
Security Level : NoAuthNoPriv
ReadView Name : CommunityView
WriteView Name :
Notify View Name : CommunityView
Security Model : SNMPv1
Security Level : NoAuthNoPriv
Group Name : ReadGroup
ReadView Name : CommunityView
WriteView Name :
Notify View Name : CommunityView
Security Model : SNMPv2
Security Level : NoAuthNoPriv
Group Name : WriteGroup
ReadView Name : CommunityView
WriteView Name : CommunityView
Notify View Name : CommunityView
Security Model : SNMPv1
Security Level : NoAuthNoPriv
Group Name : WriteGroup
ReadView Name : CommunityView
WriteView Name : CommunityView
Notify View Name : CommunityView
Security Model : SNMPv2
Security Level : NoAuthNoPriv
Used to create a recipient of SNMP traps generated by the Switch’s SNMP
agent.
auth_priv] <auth_string 32>]
The create snmp host command creates a recipient of SNMP traps
generated by the Switch’s SNMP agent.
<ipaddr>− The IP address of the remote management station that will serve
as the SNMP host for the Switch.
v1 – Specifies that SNMP version 1 will be used. The Simple Network
Management Protocol (SNMP), version 1, is a network management protocol
that provides a means to monitor and control network devices.
v2c – Specifies that SNMP version 2c will be used. The SNMP v2c supports
both centralized and distributed network management strategies. It includes
improvements in the Structure of Management Information (SMI) and adds
some security features.
v3 – Specifies that the SNMP version 3 will be used. SNMP v3 provides
secure access to devices through a combination of authentication and
encrypting packets over the network. SNMP v3 adds:
• Message integrity − ensures that packets have not been tampered
with during transit.
• Authentication − determines if an SNMP message is from a valid
source.
• Encryption − scrambles the contents of messages to prevent it
being viewed by an unauthorized source.
−
noauth_nopriv
encryption of packets sent between the Switch and a remote SNMP
manager.
auth_nopriv− Specifies that authorization will be required, but there will be no
encryption of packets sent between the Switch and a remote SNMP
manager.
auth_priv − Specifies that authorization will be required, and that packets sent
between the Switch and a remote SNMP manger will be encrypted.
•<auth_sting 32> − An alphanumeric string used to authorize a
Only administrator-level users can issue this command.
Specifies that there will be no authorization and no
remote SNMP manager to access the Switch’s SNMP agent.
Example usage:
To create an SNMP host to receive SNMP messages:
DGS-3627:5#create snmp host 10.48.74.100 v3 auth_priv public
Command: create snmp host 10.48.74.100 v3 auth_priv public
Success.
DGS-3627:5#
delete snmp host
Purpose
Syntax delete snmp host <ipaddr>
Description
Used to remove a recipient of SNMP traps generated by the Switch’s
SNMP agent.
The delete snmp host command deletes a recipient of SNMP traps
generated by the Switch’s SNMP agent.
<ipaddr>− The IP address of a remote SNMP manager that will
receive SNMP traps generated by the Switch’s SNMP agent.
Only administrator-level users can issue this command.
show snmp host
Purpose
Syntax show snmp host {<ipaddr>}
Description
Used to display the recipient of SNMP traps generated by the
Switch’s SNMP agent.
The show snmp host command is used to display the IP addresses
and configuration information of remote SNMP managers that are
designated as recipients of SNMP traps that are generated by the
Switch’s SNMP agent.
Example usage:
To display the currently configured SNMP hosts on the Switch:
Parameters
Restrictions
DGS-3627:5#show snmp host
Command: show snmp host
SNMP Host Table
Host IP Address SNMP Version Community Name/SNMPv3 User Name
To display the currently configured IPv6 SNMP hosts on the Switch:
Purpose
Syntax show snmp v6host {<ipv6addr>}
Description
Parameters
Restrictions
DGS-3627:5#show snmp host
Command: show snmp host
SNMP Host Table
-------------------------------------------------------------------------------------------Host IPv6 Address : FF::FF
SNMP Version : V3 na/np
CommunityName/SNMPv3 User Name : initial
Total Entries: 1
Used to display the IPv6 recipient of SNMP traps generated by the
Switch’s SNMP agent.
The show snmp v6host command is used to display the IPv6
addresses and configuration information of remote SNMP managers
that are designated as recipients of SNMP traps that are generated by
the Switch’s SNMP agent.
v6host <ipv6addr>− The IPv6 address of a remote SNMP manager
that will receive SNMP traps generated by the Switch’s SNMP agent.
Only administrator-level and operator-level users can issue this
command.
The create trusted_host command creates the trusted host. The
Switch allows specification of up to four IP addresses that are allowed
to manage the Switch via in-band SNMP or Telnet based
management software. These IP addresses must be members of the
Management VLAN. If no IP addresses are specified, then there is
nothing to prevent any IP address from accessing the Switch,
provided the user knows the Username and Password.
<ipaddr> − The IP address of the trusted host to be created.
<network_address> − IP address and netmask of the trusted host to
be created. The address and mask information can be specified using
the traditional format (for example, 10.1.2.3/255.0.0.0 or in CIDR
format, 10.1.2.3/8).
Only administrator-level users can issue this command.
Syntax show trusted_host <network_address>
Description
Parameters
Restrictions
DGS-3627:5#show trusted_host
Command: show trusted_host
Management Stations
IP Address
-----------------------
10.53.13.94
Total Entries: 1
DGS-3627:5#
Used to display a list of trusted hosts entered on the Switch using
the create trusted_host command above.
This command is used to display a list of trusted hosts entered on
the Switch using the create trusted_host command above.
<network_address> − IP address and netmask of the trusted host
to be viewed. The address and mask information can be specified
using the traditional format (for example, 10.1.2.3/255.0.0.0 or in
CIDR format, 10.1.2.3/8).
Only administrator-level and operator-level users can issue this
command.
<ipaddr> − The IP address of the trusted host.
network <network_address> − IP address and netmask of the
trusted host to be deleted. The address and mask information can be
specified using the traditional format (for example, 10.1.2.3/255.0.0.0
or in CIDR format, 10.1.2.3/8).
all – Enter this parameter to delete all configured trusted hosts.
enable snmp traps
Purpose Used to enable SNMP trap support.
Syntax
Description The enable snmp traps command is used to enable SNMP trap
Parameters None.
Restrictions Only administrator-level and operator-level users can issue this
To prevent SNMP traps from being sent from the Switch:
Purpose Used to disable SNMP trap support on the Switch.
Syntax
Description This command is used to disable SNMP trap support on the Switch.
Parameters None.
Restrictions Only administrator-level and operator-level users can issue this
Description The config snmp system_location command is used to enter a
description of the location of the Switch. A maximum of 255
characters can be used.
Parameters <sw_location> - A maximum of 255 char acters is allowed.
Restrictions Only administrator-level and operator-level users can issue this
Description This command is used to download a new firmware or a Switch configuration file from a
TFTP server. The user now has the option of saving the firmware or configuration file on
the flash memory located in the Switch using the previously allocated c:\ drive.
firmware_fromTFTP− Download and install new firmware on the Switch from a TFTP
server.
• <ipaddr> − The IP address of the TFTP server.
• <ipv6addr> - The IPv6 address of the TFTP serve r.
• <path_filename 64> − The DOS path and filename of the firmware file on the
TFTP server. For example, C:\3612.had.
•unit <unitid1-12>- Enter the ID of the Switch in the switch stack to where to
save the file.
• all – Use this parameter to select all switches in t he switch stack.
• <drive_id> - Enter the drive ID of the internal flash drive to where to save the
file.
•{<pathname 64>} – The pathname in the command refers to the flash memory
located on the switch. This drive is nominated c: and those who wish to save
the firmware, instead of uploading it directly to the NV-RAM must specify the
path on the flash memory to place this file (ex. c:/firm1). The filename cannot
exceed 64 alphanumeric characters.
•boot_up – Enter this parameter to use this file as the boot up file upon next
reboot of the switch.
config_fromTFTP− Download and install a configuration file on the Switch from a TFTP
server.
• <ipaddr> − The IP address of the TFTP server.
• <ipv6addr> - The IPv6 address of the TFTP serve r.
• <path_filename 64> − The DOS path and filename of the switch configuration
file on the TFTP server. For example, C:\3612.had.
•<drive_id> - Enter the drive ID of the internal flash drive to where to save the
file.
•{<path_filename 64>} – The second path_filename in the command refers to
the flash memory located on the switch. This drive is nominated c: and those
who wish to save the firmware, instead of uploading it directly to the NV-RAM
must specify the path on the flash memory to place this file (ex. c:/config1).
The filename cannot exceed 64 alphanumeric characters.
Restrictions Only administrator-level users can issue this command.
The download configuration command will initiate the loading of the various settings in the order listed in the configuration file.
When the file has been successfully loaded the message “End of configuration file for DGS-3600” appears followed by the command
prompt.
DGS-3627:5##--------------------------------------------------------------------------------------------------------DGS-3627:5## End of configuration file for DGS-3627
DGS-3627:5##---------------------------------------------------------------------------------------------------------
DGS-3627:5#
To download a firmware file to the FLASH memory of the Switch:
The user now has the option of saving the log or configuration file on the flash
memory located in the Switch using the previously allocated c:/ drive.
cfg_toTFTP− Used to upload the current Switch configuration file to a TFTP
server, or to upload a configuration file saved in the Switch’s flash memory to a
TFTP server.
• <ipaddr> − The IP address of the TFTP server.
• <ipv6addr> - The IPv6 address of the TFTP serve r.
• <path_filename 64> − The DOS path and filename of the configuration
file to be uploaded on the TFTP server. For example, C:\3612.cfg.
•<drive_id> - Enter the drive ID of the internal flash drive to where to
upload the file.
•{<path_filename 64>} – The second path_filename in the command
refers to the flash memory located on the Switch. This drive is
nominated c: and those who wish to save this file to a TFTP server
must enter the path and file name of the configuration file located on
the flash memory of the Switch using this parameter.
log_toTFTP− Used to upload a log file on the Switch to a TFTP server, or to
upload a log file saved in the Switch’s flash memory to a TFTP server.
• <ipaddr> − The IP address of the TFTP server.
• <ipv6addr> - The IPv6 address of the TFTP serve r.
•<path_filename 64>− The DOS path and filename of the log file to be
uploaded on the TFTP server. For example, C:\3612.txt.
firmware_toTFTP – Use this parameter to upload firmware to a TFTP server.
• <ipaddr> − The IP address of the TFTP server.
• <ipv6addr> - The IPv6 address of the TFTP serve r.
• <path_filename 64> − The DOS path and filename of the log file to be
uploaded on the TFTP server. For example, C:\3627.txt.
•<drive_id> - Enter the drive ID of the internal flash drive to where to
upload the file.
•{<path_filename 64>} – The second path_filename in the command
refers to the flash memory located on the Switch. This drive is
nominated c: and those who wish to save this file to a TFTP server
must enter the path and file name of the configuration file located on
the flash memory of the Switch using this parameter.
attack_log_toTFTP - This command is used to upload a switch attack log to a
TFTP server, such as a spoofing attack.
•<ipaddr> - Enter the IPv4 address of the TFTP server to which to
upload the attack log.
•<ipv6addr> - Enter the IPv6 address of the TFTP server to which to
upload the attack log.
•<path_filename 64> - Specifies the location of the Switch configuration
file on the TFTP server. This file will be replaced by the uploaded file
from the Switch.
•unit <unit_id 1-12> - Select the switch in the switch stack from where
these attack log files will be uploaded, denoted by unit ID number.
Restrictions Only administrator-level and operator-level users can issue this command.
Example usage:
To upload a configuration file to the TFTP server.
memory of the Switch, as the boot up configuration file.
firmware image is that will be configured, denoted by unit ID number.
<drive_id> - Enter the drive ID of the internal Flash drive to where to
upload the file.
<pathname 64> - Enter the path and file name of the firmware file
located in the Switch’s flash memory, which will be used as the boot
up firmware upon next reboot of the Switch.
boot_up – Entering this parameter will specify the firmware file as a
boot up section.
show config
Purpose
Syntax
Description
Used to display the current or saved version of the configuration settings of the
switch.
show config [active | boot_up | {<drive_id>} <pathname 64>]
Use this command to display all the configuration settings that are saved to NV
RAM or display the configuration settings as they are currently configured. Use the
keyboard to list settings one line at a time (Enter), one page at a time (Space) or
view all (a).
The configuration settings are listed by category in the following order:
1. Basic (serial port, Telnet and web
management status)
2. Storm control
3. IP group management (Single
IP)
4. Syslog
5. QoS
6. Port mirroring
7. Traffic segmentation
8. Port
9. Port lock
10. Time Range
11. ACL
12. IP-MAC address binding
13. VLAN
14. 802.1x
15. FDB
16. MAC address table notification
17. STP
18. Safeguard Engine
19. Banner and Prompt
20. SSH
active – Entering this parameter will display configurations entered without being
saved to NVRAM.
boot_up - Entering this parameter will display configurations that are to be used
upon the next reboot of the Switch.
drive_id – Enter the drive ID number where the firmware file is located on the flash
drive that is to be viewed.
<pathname 64> - The user may enter the path and file name of a configuration file
located on the flash memory of the Switch, which will then be displayed
21. SNTP
22. LACP
23. IP
24. IGMP snooping
25. MLD Snooping
26. Access Authentication Control
27. AAA
28. ARP
29. Static Route
30. Policy Route
31. IGMP
32. PIM
33. DVMRP
34. RIP
35. MD5
36. OSPF
37. DNSR
38. DHCP Relay
39. VRRP
Example usage:
To view the current configuration settings:
DGS-3627:5#show config active
Command: show config active
Purpose Used to list the files located on the flash memory drive, labeled c:.
Syntax
Description This command is used to display files saved to the flash directory of
Parameters unit <unitid 1-12> - Select the switch in the switch stack where the
Restrictions None.
dir {{unit [<unitid 1-12> | all]} <drive_id>}
the Switch. Since there is only one labeled drive located on the flash,
the user can only input the command dir c: to view the contents of
the flash memory.
files are, that will be displayed, denoted by unit ID number.
all – Use this parameter to select all switches in the switch stack.
<drive_id> - Enter the drive ID of the internal flash drive to be
----------------------------------------------------------- ------------------------------------ ----- Total Files 4
Total Size 9293625 bytes
Free Space 2097152 bytes
‘*’ means boot up section
DGS-3627:5#
Example usage:
copy
Purpose Used to copy a file.
Syntax
Description This command is used to copy a file from a source location and
Parameters <drive_id> - Enter the drive ID of the internal flash drive where the
Restrictions Only administrator-level and operator-level users can issue this
Purpose Used to show the currently set boot files located on the Switch.
Syntax
Description This command is used to display the name and path of the firmware
Parameters unit <unit_id 1-12> - Select the switch in the switch stack where the
Restrictions None.
Example usage:
To rename a file:
show boot_file {[unit <unitid 1-12> | all]}
image and configuration file that have been previously set up by the
user, as the boot up files.
boot file is located, denoted by unit ID number.
all – Enter this parameter to display the boot files on all switches in
the switch stack.
DGS-3627:5#show boot_file
Command: show boot_file
-----------------------------------------------------------------------------------------Unit ID : 1
Boot up firmware image : C:\RUN.HAD
Boot up configuration file: C:\STARTUP.CFG
may now upgrade the file system version to 2 which will bring
another, more stable, file system into the switch. Version one file
system is compatible with all firmwares, yet once the file system
has been upgraded to version 2, users may not return to release
one firmware as it may damage the file system.
system. If the designated file system version is lower than the
current file system version, this command will have no effect.
string – This string is used to set the confirmation question that will
follow the entry of this command. Entering “/y” will execute the
command without prompt. Entering “/n” will not execute the
command without prompt. If neither “/y” nor “/n” is specified, it will
prompt the user before executing the command.
power off the switch during the execution of this command.
Note: Do not power off the switch during the execution of this file as it may damage the
file system of the switch.
size <value 1-6000> - Use this parameter to set the datagram size of
the packet, or in essence, the number of bytes in each ping packet.
Users may set a size between 1 and 6000 bytes with a default
setting of 100 bytes.
timeout <value 1-10> - Select a timeout period between 1 and 10
seconds for this Ping message to reach its destination. If the packet
fails to find the IPv6 address in this specified time, the Ping packet
will be dropped.
Restrictions None.
DGS-3627:5#ping6 2009::280:C8FF:FE3C:5C8A times 4 timeout 10
Command: ping6 2009::280:C8FF:FE3C:5C8A times 4 timeout 10
Reply from 2009::280:C8FF:FE3C:5C8A, bytes=100 time<10 ms
Reply from 2009::280:C8FF:FE3C:5C8A, bytes=100 time<10 ms
Reply from 2009::280:C8FF:FE3C:5C8A, bytes=100 time<10 ms
Reply from 2009::280:C8FF:FE3C:5C8A, bytes=100 time<10 ms
Ping statistics for 2009::280:C8FF:FE3C:5C8A
Packets: Sent =4, Received =4, Lost =0
DGS-3627:5#
traceroute
Purpose Used to trace the routed path between the Switch and a destination
endstation.
Syntax
Description The traceroute command will trace a route between the Switch and a
Parameters <ipaddr> - Specifies the IP address of the host.
Restrictions Only administrator-level and operator-level users can issue this
ttl <value 1-60> - The time to live value of the trace route request. This is
the maximum number of routers the traceroute command will cross
while seeking the network path between two devices.
port <value 30000-64900> - The port number. Must be above 1024.The
value range is from 30000 to 64900.
timeout <sec 1-65535> - Defines the time-out period while waiting for a
response from the remote device. The user may choose an entry
between 1 and 65535 seconds.
probe <value 1-9> - The probe value is the number of times the Switch
will send probe packets to the next hop on the intended traceroute path.
The default is 1.
command.
Example usage:
To trace the routed path between the Switch and 172.18.212.109.
Purpose Used to activate the autoconfiguration function for the Switch. This will
load a previously saved configuration file for current use.
Syntax
Description When autoconfig is enabled on the Switch, the DHCP reply will contain a
Parameters None.
Restrictions When autoconfig is enabled, the Switch becomes a DHCP client
NOTE: Dual-purpose (DHCP/TFTP) server utility software may require entry of the
configuration file name and path within the user interface. Alternatively, the DHCP software
may require creating a separate ext file with the configuration file name and path in a specific
directory on the server. Consult the documentation for the DCHP server software if you are
unsure.
enable autoconfig
configuration file and path name. It will then request the file from the
TFTP server specified in the reply. When autoconfig is enabled, the ipif
settings will automatically become DHCP client.
automatically (same as: config ipif System dhcp). The DHCP server
must have the TFTP server IP address and configuration file name, and
be configured to deliver this information in the data field of the DHCP
reply packet. The TFTP server must be running and have the requested
configuration file in its base directory when the request is received from
the Switch. Consult the DHCP server and TFTP server software
instructions for information on loading a configuration file.
If the Switch is unable to complete the autoconfiguration process the
previously saved local configuration file present in Switch memory will be
loaded.
Only administrator-level and operator-level users can issue this
When autoconfig is enabled and the Switch is rebooted, the normal login screen will appear for a few moments while the autoconfig
request (i.e. download configuration) is initiated. The console will then display the configuration parameters as they are loaded from
the configuration file specified in the DHCP or TFTP server. This is exactly the same as using a download configuration command.
After the entire Switch configuration is loaded, the Switch will automatically “logout” the server. The configuration settings will be
saved automatically and become the active configuration.
NOTE: If the autoconfig function fails, the user will be prompted with a warning message and
the switch will not upload the configuration settings.
Upon booting up the autoconfig process is initiated, the console screen will appear similar to the example below. The configuration
settings will be loaded in normal order.
DGS-3627 Gigabit Ethernet Switch
Command Line Interface
Firmware: Build 2.40-B19
Copyright(C) 2008 D-Link Corporation. All rights reserved.
DGS-3627:5#
DGS-3627:5##------------------------------------------------------------------DGS-3627:5## End of configuration file for DGS-3627
DGS-3627:5#
**********
* Logout *
**********
NOTE: With autoconfig enabled, the Switch ipif settings now define the Switch as a DHCP client. Use the show switch command to display the new IP settings status.
disable autoconfig
Purpose Use this to deactivate autoconfiguration from DHCP.
Syntax
Description This instructs the Switch not to accept autoconfiguration instruction from the
Parameters None.
Restrictions Only administrator-level and operator-level users can issue this command.
Example usage:
disable autoconfig
DHCP server. This does not change the IP settings of the Switch. The ipif
settings will continue as DHCP client until changed with the config ipif
command.
Purpose Used to display the current autoconfig status of the Switch.
Syntax
Description This will list the current status of the autoconfiguration function.
Parameters None.
Restrictions Only administrator-level and operator-level users can issue this
Example usage:
To upload an autoconfiguration-:
DGS-3627:5#show autoconfig
Command: show autoconfig
----- ------------- ------------------- ---------------------------------------------------5 2006-08-21 00:01:09 Successful login through Console (Username: Anonymous,
IP:10.53.13.202, MAC: 00-0C-6E-6B-EB-0C)
4 2006-08-21 00:00:14 System started up
3 2006-08-21 00:00:06 Port 1 link up, 100Mbps FULL duplex
2 2006-08-21 00:00:01 Spanning Tree Protocol is disabled
1 2006-08-21 00:06:31 Configuration saved to flash (Username: Anonymous)
DGS-3627:5#
show attack_log
Purpose Used to display the switch history of attack log files.
Example usage:
To display the attack log:
DGS-3627:5#show attack_log index 1-2
Command: show attack_log index 1-2
Index Date Time Log Text
----- ---------------- ----------- -------- -------------------------------------------2 2006-04-25 12:38:00 Possible spoofing attack from 000d010023001 port 23
1 2006-04-25 12:37:42 Possible spoofing attack from 000d010023001 port 23
DGS-3627:5#
Syntax
Description This command will display the contents of the attack log of the
Parameters unit <unit_id 1-12> - Select the switch in the switch stack for which
Restrictions None.
show attack_log {unit <unit_id 1-12>} {index <value_list>}
Switch. This log displays the time and date of a possible attack on
the switch, such as a spoofing attack.
to view attack log files.
−
index <value list>
beginning at 1 and ending at the value specified by the user in the
<value_list> field.
If no parameter is specified, all history log entries will be displayed.
Purpose Used to clear the switch history of attack log files.
Example usage:
To clear the attack log:
Syntax
Description This command will clear the contents of the attack log of the Switch.
Parameters unit <unit_id 1-12> - Select the switch in the switch stack for which
Restrictions Only administrator-level and operator-level users can issue this
informational− Specifies that informational messages will be sent to the
remote host. This corresponds to number 6 from the list above.
warning− Specifies that warning messages will be sent to the remote
host. This corresponds to number 4 from the list above.
all− Specifies that all of the currently supported syslog messages that
are generated by the Switch will be sent to the remote host.
facility − Some of the operating system daemons and processes have
been assigned Facility values. Processes and daemons that have not
been explicitly assigned a Facility may use any of the "local use"
facilities or they may use the "user-level" Facility. Those Facilities that
have been designated are shown in the following: Bold font indicates the
facility values the Switch currently supports.
16 local use 0 (local0)
17 local use 1 (local1)
18 local use 2 (local2)
19 local use 3 (local3)
20 local use 4 (local4)
21 local use 5 (local5)
22 local use 6 (local6)
23 local use 7 (local7)
Description This command is used to configure the system severity levels on the Switch.
When an event occurs on the Switch, a message will be sent to the SNMP
agent (trap), the Switch’s log or both. Events occurring on the Switch are
separated into three main categories, these categories are NOT precisely the
same as the parameters of the same name (see below).
•Information – Events classified as information are basic events
occurring on the Switch that are not deemed as problematic, such as
enabling or disabling various functions on the Switch.
•Warning - Events classified as warning are problematic events that are
not critical to the overall function of the Switch but do require attention,
such as unsuccessful downloads or uploads and failed logins.
•Critical – Events classified as critical are fatal exceptions occurring on
the Switch, such as hardware failures or spoofing attacks.
Parameters Choose one of the following to identify where severity messages are to be
sent.
•trap – Entering this parameter will define which events occurring on
the Switch will be sent to a SNMP agent for analysis.
•log – Entering this parameter will define which events occurring on
the Switch will be sent to the Switch’s log for analysis.
•all – Entering this parameter will define which events occurring on
the Switch will be sent to a SNMP agent and the Switch’s log for
analysis.
Choose one of the following to identify what level of severity warnings are to
be sent to the destination entered above.
•critical – Entering this parameter along with the prop er de stination,
stated above, will instruct the Switch to send only critical events to
the Switch’s log or SNMP agent.
•warning – Entering this parameter along with the pro per destination,
stated above, will instruct the Switch to send critical and warning
events to the Switch’s log or SNMP agent.
•information – Entering this parameter along with the proper
destination, stated above, will instruct the switch to send
informational, warning and critical events to the Switch’s log or
SNMP agent.
Restrictions Only administrator-level and operator-level users can issue this command.
Example usage:
To configure the system severity settings for critical traps only:
The config log_save_timing command allows the user to
configure the time method used in saving log files to the switch’s
flash memory.
time_interval <min 1-65535> - Use this parameter to configure the
time interval that will be implemented for saving log files. The log
files will be save every x number of minutes that are configured
here.
on_demand - Users who choose this method will only save log files
when they manually tell the Switch to do so, using the save or save log command.
log_trigger - Users who choose this method will have log files saved
to the Switch every time a log event occurs on the Switch.
Only administrator-level and operator-level users can issue this
command.
This Switch supports three versions of the Spanning Tree Protocol; 802.1d STP, 802.1w Rapid STP and 802.1s MSTP. Multiple
Spanning Tree Protocol, or MSTP, is a standard defined by the IEEE community that allows multiple VLANs to be mapped to a
single spanning tree instance, which will provide multiple pathways across the network. Therefore, these MSTP configurations will
balance the traffic load, preventing wide scale disruptions when a single spanning tree instance fails. This will allow for faster
convergences of new topologies for the failed instance. Frames designated for these VLANs will be processed quickly and completely
throughout interconnected bridges utilizing either of the three spanning tree protocols (STP, RSTP or MSTP). This protocol will also
tag BPDU packets so receiving devices can distinguish spanning tree instances, spanning tree regions and the VLANs associated with
them. These instances will be classified by an instance_id. MSTP will connect multiple spanning trees with a Common and Internal
Spanning Tree (CIST). The CIST will automatically determine each MSTP region, its maximum possible extent and will appear as
one virtual bridge that runs a single spanning tree. Consequentially, frames assigned to different VLANs will follow different data
routes within administratively established regions on the network, continuing to allow simple and full processing of frames,
regardless of administrative errors in defining VLANs and their respective spanning trees. Each switch utilizing the MSTP on a
network will have a single MSTP configuration that will have the following three attributes:
a) A configuration name defined by an alphanumeric string of up to 32 characters (defined in the config stp mst_config_id
command as name <string>).
b) A configuration revision number (named here as a revision_level) and;
c) A 4096 element table (defined here as a vid_range) which will associate each of the possible 4096 VLANs supported by the
Switch for a given instance.
To utilize the MSTP function on the Switch, three steps need to be taken:
a) The Switch must be set to the MSTP setting (config stp version)
b) The correct spanning tree priority for the MSTP instance must be entered (config stp priority).
c) VLANs that will be shared must be added to the MSTP Instance ID (config stp instance_id).
The Multiple Spanning Tree Protocol commands in the Command Line Interface (CLI) are listed (along with the appropriate
parameters) in the following table.
entire switch. All commands here will be implemented for the STP version
that is currently set on the Switch.
maxage <value 6-40>− This value may be set to ensure that old
information does not endlessly circulate through redundant paths in the
network, preventing the effective propagation of the new information. Set
by the Root Bridge, this value will aid in determining that the Switch has
spanning tree configuration values consistent with other devices on the
bridged LAN. If the value ages out and a BPDU has still not been received
from the Root Bridge, the Switch will start sending its own BPDU to all
other switches for permission to become the Root Bridge. If it turns out
that your switch has the lowest Bridge Identifier, it will become the Root
Bridge. The user may choose a time between 6 and 40 seconds. The
default value is 20.
maxhops <value 1-20> - The number of hops between devices in a
spanning tree region before the BPDU (bridge protocol data unit) packet
sent by the Switch will be discarded. Each switch on the hop count will
reduce the hop count by one until the value reaches zero. The Switch will
then discard the BPDU packet and the information held for the port will
age out. The user may set a hop count from 1 to 20. The default is 20.
hellotime <value 1-10>− The user may set the time interval between
transmission of configuration messages by the root device in STP, or by
the designated router in RSTP, thus stating that the Switch is still
functioning. A time between 1 and 10 seconds may be chosen, with a
default setting of 2 seconds.
In MSTP, the spanning tree is configured by port and therefore,
the hellotime must be set using the configure stp ports command for
switches utilizing the Multiple Spanning Tree Protocol.
forwarddelay <value 4-30>− The maximum amount of time (in seconds)
that the root device will wait before changing states. The user may choose
a time between 4 and 30 seconds. The default is 15 seconds.
txholdcount <value 1-10> - The maximum number of BPDU Hello packets
transmitted per interval. The default value is 3.
fbpdu [enable | disable] − Allows the forwarding of STP BPDU packets
from other network devices when STP is disabled on the Switch. The
default is enable.
lbd [enable | disable] – This feature is used to temporarily shutdown a port
on the Switch when a BPDU packet has been looped back to the switch.
When the Switch detects its own BPDU packet coming back, it signifies a
loop on the network. STP will automatically be blocked and an alert will be
sent to the administrator. The LBD STP port will restart (change to
discarding state) when the LBD Recover Time times out. The Loopback
Detection function will only be implemented on one port at a time. The
default is enabled.
Example usage:
To configure STP with maxage 18 and maxhops of 15:
config stp ports
Purpose Used to setup STP on the port level.
Syntax
lbd_recover_timer [<value 0> | <value 60-1000000>] - This field will set the
time the STP port will wait before recovering the STP state set. 0 will
denote that the LBD will never time out or restart until the administrator
personally changes it. The user may also set a time between 60 and 1000000 seconds. The default is 60 seconds.
Restrictions Only administrator-level and operator-level users can issue this command.
Description This command is used to create and configure STP for a group of ports.
Parameters
<portlist>− Specifies a range of ports to be configured. The beginning and
end of the port list range are separated by a dash.
externalCost− This defines a metric that indicates the relative cost of
forwarding packets to the specified port list. Port cost can be set
automatically or as a metric value. The default value is auto.
•auto – Setting this parameter for the external cost will automatically
set the speed for forwarding packets to the specified port(s) in the list
for optimal efficiency. Default port cost: 100Mbps port = 200000.
hellotime <value 1-10>− The time interval between transmission of
configuration messages by the designated port, to other devices on the
bridged LAN, thus stating that the Switch is still functioning. The user may
choose a time between 1 and 10 seconds. The default is 2 seconds.
migrate [yes | no] – Setting this parameter as “yes” will set the ports to send
out BPDU packets to other bridges, requesting information on their STP
setting If the Switch is configured for RSTP, the port will be capable to
migrate from 802.1d STP to 802.1w RSTP. If the Switch is configured for
MSTP, the port is capable of migrating from 802.1d STP to 802.1s MSTP.
RSTP and MSTP can coexist with standard STP, however the benefits of
RSTP and MSTP are not realized on a port where an 802.1d network
connects to an 802.1w or 802.1s enabled network. Migration should be set a s
yes on ports connected to network stations or segments that are capable of
being upgraded to 802.1w RSTP or 802.1s MSTP on all or some portion of
the segment.
edge [true | false] – true designates the port as an edge port. Edge ports
cannot create loops, however an edge port can lose edge port status if a
topology change creates a potential for a loop. An edge port normally should
not receive BPDU packets. If a BPDU packet is received it automatically
loses edge port status. false indicates that the port does not have edge port
status.
p2p [true | false | auto] – true indicates a point-to-point (P2P) shared link. P2P
ports are similar to edge ports however they are restricted in that a P2P port
must operate in full-duplex. Like edge ports, P2P ports transition to a
forwarding state rapidly thus benefiting from RSTP. A P2P value of false
indicates that the port cannot have P2P status. auto allows the port to have
P2P status whenever possible and operate as if the P2P status were true. If
the port cannot maintain this status (for example if the port is forced to halfduplex operation) the P2P status changes to operate as if the P2P value
were false. The default setting for this parameter is auto.
state [enable | disable]− Allows STP to be enabled or disabled for the ports
specified in the port list. The default is enable.
lbd [enable | disable] - Used to enable or disable the loopback detection
function on the Switch for the ports configured above in the config stp
command.
fbpdu [enable | disable] − Allows the forwarding of STP BPDU packets from
other network devices when STP is disabled on the Switch. This function can
only be in use when STP is globally disabled and forwarding BPDU packets
is enabled. The default is enabled and BPDU packets will not be forwarded.
Gigabit port = 20000.
•<value 1-200000000> - Define a value between 1 and 200000000 to
determine the external cost. The lower the number, the greater the
probability the port will be chosen to forward packets.
Restrictions Only administrator-level and operator-level users can issue this command.
Example usage:
To configure STP with path cost 19, hellotime set to 5 seconds, migration enable, and state enable for ports 1-5.
Warning: there is no VLAN mapping to this instance_id!
Success.
DGS-3627:5#
create stp instance_id <value 1-15>
Multiple Spanning Tree Protocol. There are 16 STP instances on the
Switch (one internal CIST, unchangeable) and the user may create up
to four instance IDs for the Switch.
Tree instance on the Switch.
command.
config stp instance_id
Purpose Used to add or delete an STP instance ID.
Syntax
Description This command is used to map VIDs (VLAN IDs) to previously configured
Parameters <value 1-15> - Enter a number between 1 and 15 to define the
STP instances on the Switch by creating an instance_id. A STP instance
may have multiple members with the same MSTP configuration. There is
no limit to the number of STP regions in a network but each region only
supports a maximum of 16 spanning tree instances (one unchang eable
default entry). VIDs can belong to only one spanning tree instance at a
time.
Note that switches in the same spanning tree region having the same
STP instance_id must be mapped identically, and have the same
configuration revision_level number and the same name.
instance_id. The Switch supports 16 STP regions with one
unchangeable default instance ID set as 0.
add_vlan – Along with the vid_range <vidlist> parameter, this command
will add VIDs to the previously configured STP instance_id.
remove_vlan – Along with the vid_range <vidlist > parameter, this
command will remove VIDs to the previously configured STP
instance_id.
<vidlist> – Specify the VID range from configured VLANs set on the
Switch. Supported VIDs on the Switch range from ID number 1 to 4094.
Example usage:
To configure instance ID 2 to add VID 10:
Restrictions Only administrator-level and operator-level users can issue this
Description This command is used to update the STP instance configuration settings
on the Switch. The MSTP will utilize the priority in selecting the root
bridge, root port and designated port. Assigning higher priorities to STP
regions will instruct the Switch to give precedence to the selected
instance_id for forwarding packets. The lower the priority value set, the
higher the priority.
Parameters priority <value 0-61440> - Select a value between 0 and 61440 to
specify the priority for a specified instance id for forwarding packets. The
lower the value, the higher the priority. This entry must be divisible by
4096.
instance_id <value 0-15> - Enter the value corresponding to the
previously configured instance ID for which to set the priority value. An
instance id of 0 denotes the default instance_id (CIST) internally set on
Purpose Used to update the MSTP configuration identification.
Syntax
Description This command will uniquely identify the MSTP configuration currently
Parameters revision_level <int 0-65535>– Enter a number between 0 and 65535 to
Restrictions Only administrator-level and operator-level users can issue this
Example usage:
To configure the MSTP region of the Switch with revision_level 10 and the name “Zira”:
DGS-3627:5#config stp mst_config_id revision_level 10 name ZIra
Command: config stp mst_config_id revision_level 10 name Zira
Success.
DGS-3627:5#
config stp mst_config_id {revision_level <int 0-65535> | name
<string>}
configured on the Switch. Information entered here will be attached to
BPDU packets as an identifier for the MSTP region to which it belongs.
Switches having the same revision_level and name will be considered as
part of the same MSTP region.
identify the MSTP region. This value, along with the name will identify
the MSTP region configured on the Switch. The default setting is 0.
name <string> - Enter an alphanumeric string of up to 32 characters to
uniquely identify the MSTP region on the Switch. This name, along with
the revision_level value will identify the MSTP region configured on the
Switch. If no name is entered, the default name will be the MAC address
of the device.
command.
config stp mst_ports
Purpose Used to update the port configuration for a MSTP instance.
Syntax
Description This command will update the port configuration for a STP instance_id. If
interface to put into the forwarding state. Set a higher priority value for
interfaces to be selected for forwarding first. In instances where the
priority value is identical, the MSTP function will implement the lowest
port number into the forwarding state and other interfaces will be
blocked. Remember that lower priority values mean higher priorities for
forwarding packets.
Parameters <portlist> - Specifies a range of ports to be configured. The beginning
and end of the port list range are separated by a dash.
instance_id <value 0-15> - Enter a numerical value between 0 and 15 to
identify the instance_id previously configured on the Switch. An entry of
0 will denote the CIST (Common and Internal Spanning Tree.
internalCost – This parameter is set to represent the relative cost of
forwarding packets to specified ports when an interface is selecte d within
a STP instance. The default setting is auto. There are two options:
•auto – Selecting this parameter for the internalCost will set
quickest route automatically and optimally for an interface. The
default value is derived from the media speed of the interface.
•value 1-200000000 – Selecting this parameter with a value in
the range of 1-200000000 will set the quickest route when a
loop occurs. A lower internalCost represents a quicker
transmission.
priority <value 0-240> - Enter a value between 0 and 240 to set the
priority for the port interface. A higher priority will designate the interface
to forward packets first. A lower number denotes a higher priority.
Example usage:
To designate ports 1 to 2 on, with instance ID 1, to have an auto internalCost and a priority of 0:
Example usage:
To display the status of STP on the Switch:
Status 1: STP enabled with STP compatible version
Restrictions Only administrator-level and operator-level users can issue this
Purpose Used to display the Switch’s current STP configuration.
Syntax
Description This command displays the Switch’s current STP configuration.
Parameters None.
Restrictions None.
STP Status : Enabled
STP Version : STP Compatible
Max Age : 20
Hello Time : 2
Forward Delay : 15
Max Hops : 20
TX Hold Count : 3
Forwarding BPDU : Enabled
Loopback Detection : Enabled
LBD Recover Time : 60
DGS-3627:5#
Status 2 : STP enabled for RSTP
DGS-3627:5#show stp
Command: show stp
STP Bridge Global Settings
-----------------------------------------
STP Status : Enabled
STP Version : RSTP
Max Age : 20
Hello Time : 2
Forward Delay : 15
Max Hops : 20
TX Hold Count : 3
Forwarding BPDU : Enabled
Loopback Detection : Enabled
LBD Recover Time : 60
DGS-3627:5#
Status 3 : STP enabled for MSTP
DGS-3627:5#show stp
Command: show stp
STP Bridge Global Settings
-----------------------------------------
STP Status : Enabled
STP Version : MSTP
Max Age : 20
Forward Delay : 15
Max Hops : 20
TX Hold Count : 3
Forwarding BPDU : Enabled
Loopback Detection : Enabled
LBD Recover Time : 60
DGS-3627:5#
show stp ports
Purpose Used to display the Switch’s current instance_id configuration.
Syntax
Description This command displays the STP Instance Settings and STP Instance
show stp ports <portlist>
Operational Status currently implemented on the Switch.