The xStack DES-6500 layer 3 modular chassis Ethernet switch is a member of the D-Link xStack family. Ranging from
10/100Mbps edge switches to core gigabit switches, the xStack switch family has been future-proof designed to provide a
stacking architecture with fault tolerance, flexibility, port density, robust security and maximum throughput with a user-friendly
management interface for the networking professional.
The Switch can be managed through the Switch’s serial port, Telnet, or the Web-based management agent. The Command Line
Interface (CLI) can be used to configure and manage the Switch via the serial port or Telnet interfaces.
This manual provides a reference for all of the commands contained in the CLI. Configuration and management of the switch
via the Web-based management agent is discussed in the User’s Guide.
Accessing the Switch via the Serial Port
The Switch’s serial port’s default settings are as follows:
• 115200 baud
• no parity
• 8 data bits
• 1 stop bit
A computer running a terminal emulation program capable of emulating a VT-100 terminal and a serial port configured as
above is then connected to the Switch’s serial port via an RS-232 DB-9 cable.
With the serial port properly connected to a management computer, the following screen should be visible. If this screen does
not appear, try pressing Ctrl+r to refresh the console screen.
There is no initial username or password. Just press the Enter key twice to display the CLI input cursor − DES-6500:4#. This is
the command line where all commands are input.
Setting the Switch’s IP Address
Each switch must be assigned its own IP Address, which is used for communication with an SNMP network manager or other
TCP/IP application (for example BOOTP, TFTP). The Switch’s default IP address is 10.90.90.90. You can change the default
switch IP address to meet the specification of your networking address scheme.
The Switch is also assigned a unique MAC address by the factory. This MAC address cannot be changed, and can be found on
the initial boot console screen – shown below.
Figure 1-2. Boot Screen
The Switch’s MAC address can also be found in the Web management program on the Switch Information (Basic Settings)
window on the Configuration menu.
The IP address for the Switch must be set before it can be managed with the Web-based manager. The Switch IP address can be
automatically set using BOOTP or DHCP protocols, in which case the actual address assigned to the Switch must be known.
The IP address may be set using the Command Line Interface (CLI) over the console serial port as follows:
1. Starting at the command line prompt, enter the commands config ipif System ipaddress
xxx.xxx.xxx.xxx/yyy.yyy.yyy.yyy. Where the x’s represent the IP address to be assigned to the IP interface named
System and the y’s represent the corresponding subnet mask.
2. Alternatively, you can enter config ipif System ipaddress xxx.xxx.xxx.xxx/z. Where the x’s represent the IP address
to be assigned to the IP interface named System and the z represents the corresponding number of subnets in CIDR
notation.
The IP interface named System on the Switch can be assigned an IP address and subnet mask which can then be used to connect
a management station to the Switch’s Telnet or Web-based management agent.
In the above example, the Switch was assigned an IP address of 10.53.13.144 with a subnet mask of 255.0.0.0. The system
message Success indicates that the command was executed successfully. The Switch can now be configured and managed via
Telnet and the CLI or via the Web-based management agent using the above IP address to connect to the Switch.
The XStack DES-6500 supports a console management interface that allows the user to connect to the Switch’s management
agent via a serial port and a terminal or a computer running a terminal emulation program. The console can also be used over the
network using the TCP/IP Telnet protocol. The console program can be used to configure the Switch to use an SNMP-based
network management software over the network.
This chapter describes how to use the console interface to access the Switch, change its settings, and monitor its operation.
Note: Switch configuration settings are saved to non-volatile RAM using
the save command. The current configuration will then be retained in the
Switch’s NV-RAM, and reloaded when the Switch is rebooted. If the
Switch is rebooted without using the save command, the last configuration
saved to NV-RAM will be loaded.
Connecting to the Switch
The console interface is used by connecting the Switch to a VT100-compatible terminal or a computer running an ordinary
terminal emulator program (e.g., the HyperTerminal program included with the Windows operating system) using an RS-232C
serial cable. Your terminal parameters will need to be set to:
• VT-100 compatible
• 115200 baud
• 8 data bits
• No parity
• One stop bit
• No flow control
You can also access the same functions over a Telnet interface. Once you have set an IP address for your Switch, you can use a
Telnet program (in VT-100 compatible terminal mode) to access and control the Switch. All of the screens are identical,
whether accessed from the console port or from a Telnet interface.
After the Switch reboots and you have logged in, the console looks like this:
In this case, the command config account was entered with the parameter <username>. The CLI will then prompt to enter the
<username> with the message, Next possible completions:. Every command in the CLI has this feature, and complex
commands have several layers of parameter prompting.
In addition, after typing any given command plus one space, you can see all of the next possible sub-commands, in sequential
order, by repeatedly pressing the Tab key.
To re-enter the previous command at the command prompt, press the up arrow cursor key. The previous command will appear at
the command prompt.
Figure 2-4. Using the Up Arrow to Re-enter a Command
In the above example, the command config account was entered without the required parameter <username>, the CLI returned
the Next possible completions: <username> prompt. The up arrow cursor control key was pressed to re-enter the previous
command (config account) at the command prompt. Now the appropriate User name can be entered and the config account
command re-executed.
All commands in the CLI function in this way. In addition, the syntax of the help prompts are the same as presented in this
manual − angle brackets < > indicate a numerical value or character string, braces { } indicate optional parameters or a choice of
parameters, and brackets [ ] indicate required parameters.
If a command is entered that is unrecognized by the CLI, the top-level commands will be displayed under the Available
commands: prompt.
Figure 2-5. The Available Commands Prompt
The top-level commands consist of commands such as show or config. Most of these commands require one or more parameters
to narrow the top-level command. This is equivalent to show what? or config what? Where the what? is the next parameter.
For example, if you enter the show command with no additional parameters, the CLI will then display all of the possible next
parameters.
Figure 2-6. Next possible completions: Show Command
In the above example, all of the possible next parameters for the show command are displayed. At the next command prompt,
the up arrow was used to re-enter the show command, followed by the account parameter. The CLI then displays the user
accounts configured on the Switch.
The following symbols are used to describe how command entries are made and values and arguments are specified in this
manual. The online help contained in the CLI and available through the console interface uses the same syntax.
Note: All commands are case-sensitive. Be sure to disable Caps Lock or
any other unwanted function that changes text case.
<angle brackets>
Purpose Encloses a variable or value that must be specified.
Syntax
Description In the above syntax example, the user must supply an IP
interface name in the <ipif_name> space, a VLAN name in the
<vlan_name 32> space, and the network address in the
<network_address> space. Do not type the angle brackets.
Purpose Encloses an optional value or set of optional arguments.
Syntax
Description In the above syntax example, you have the option to specify
Example command
reset {[config | system]}
config or system. It is not necessary to specify either optional
value, however the effect of the system reset is dependent on
which, if any, value is specified. Therefore, with this example
there are three possible outcomes of performing a system
reset. See the following chapter, Basic Commands for more
details about the reset command.
reset config
Line Editing Key Usage
Delete Deletes the character under the cursor and then shifts the
remaining characters in the line to the left.
Backspace Deletes the character to the left of the cursor and shifts the
remaining characters in the line to the left.
Left Arrow Moves the cursor to the left.
Right Arrow Moves the cursor to the right.
Up Arrow Repeat the previously entered command. Each time the up
arrow is pressed, the command previous to that displayed
appears. This way it is possible to review the command history
for the current session. Use the down arrow to progress
sequentially forward through the command history list.
Down Arrow The down arrow will display the next command in the command
history entered in the current session. This displays each
command sequentially as it was entered. Use the up arrow to
review previous commands.
Tab Shifts the cursor to the next field to the left.
Multiple Page Display Control Keys
Space Displays the next page.
CTRL+c Stops the display of remaining pages when multiple pages are to
be displayed.
ESC Stops the display of remaining pages when multiple pages are to
be displayed.
n Displays the next page.
p Displays the previous page.
q Stops the display of remaining pages when multiple pages are to
be displayed.
r Refreshes the pages currently displayed.
a Displays the remaining pages without pausing between pages.
Enter Displays the next line or table entry.
Parameters admin <username> - Entering this parameter will give the
Restrictions Only Administrator-level users can issue this command.
Example usage:
To create an administrator-level user account with the username “dlink”.
create [admin | user] <username 15>
The create account command is used to create user accounts
that consist of a username of 1 to 15 characters and a password
of 0 to 15 characters. Up to 8 user accounts can be created.
specified user administrative-level privileges over configuring
functions of the Switch. This user may perform any function listed
in this manual. A username of up to 15 characters must be
created with this command to identify the admin user.
user <username> - Entering this parameter will give the specified
user user-level privileges over configuring functions of the Switch.
User-level privileges limit the execution of many commands listed
in this manual. A username of up to 15 characters must be
created with this command to identify the user.
Usernames can be between 1 and 15 characters.
Passwords can be between 0 and 15 characters.
DES-6500:4#create account admin dlink
Command: create account admin dlink
Enter a case-sensitive new password:****
Enter the new password again for confirmation:****
Success.
DES-6500:4#
config account
Purpose Used to configure user accounts
Syntax
Description
Parameters <username>- Enter the username of the account to be configured.
Restrictions Only Administrator-level users can issue this command.
config account <username>
The config account command configures a user account that
has been created using the create account command.
Usernames can be between 1 and 15 characters.
Example usage:
To configure the user password of “dlink” account:
following list which the Switch will automatically log out of the
serial port.
• never − No time limit on the length of time the console can
be open with no user input.
• 2_minutes − The console will log out the current user if
there is no user input for 2 minutes.
• 5_minutes − The console will log out the current user if
there is no user input for 5 minutes.
• 10_minutes − The console will log out the current user if
there is no user input for 10 minutes.
• 15_minutes − The console will log out the current user if
there is no user input for 15 minutes.
To configure baud rate:
DES-6500:4#config serial_port baud_rate 115200
Command: config serial_port baud_rate 115200
Success.
DES-6500:4#
enable clipaging
Purpose Used to pause the scrolling of the console screen when the show
command displays more than one page.
Syntax
Description This command is used when issuing the show command which
Parameters None.
Restrictions Only administrator-level users can issue this command.
enable clipaging
causes the console screen to rapidly scroll through several
pages. This command will cause the console to pause at the end
of each page. The default setting is enable.
Example usage:
To enable pausing of the screen display when the command output reaches the end of the page:
Purpose Used to disable the Telnet protocol on the Switch.
Syntax
Description This command is used to disable the Telnet protocol on the
Parameters None.
Restrictions Only administrator-level users can issue this command.
Example usage:
To disable the Telnet protocol on the Switch:
enable web
Purpose Used to enable the HTTP-based management software on the
disable telnet
Switch.
DES-6500:4#disable telnet
Command: disable telnet
Success.
DES-6500:4#
Switch.
Syntax
Description This command is used to enable the Web-based management
Parameters
Restrictions Only administrator-level users can issue this command.
Example usage:
To enable HTTP and configure port number:
enable web <tcp_port_number 1-65535>
software on the Switch. The user can specify the TCP port
number the Switch will use to listen for Telnet requests.
<tcp_port_number 1-65535> − The TCP port number. TCP ports
are numbered between 1 and 65535. The “well-known” port for
the Web-based management software is 80.
DES-6500:4#enable web 80
Command: enable web 80
Note: SSL will be disabled if web is enabled.
Success.
Description This command is used to restart the Switch.
Parameters None.
Restrictions None.
Example usage:
To restart the Switch:
DES-6500:4#reboot
Command: reboot
Are you sure want to proceed with the system reboot? (y/n)
Please wait, the Switch is rebooting...
reset
Purpose Used to reset the Switch to the factory default settings.
Syntax
Description This command is used to restore the Switch’s configuration to the
reboot
reset {[config | system]}
default settings assigned from the factory.
Parameters
Restrictions Only administrator-level users can issue this command.
Example usage:
To restore all of the Switch’s parameters to their default values:
DES-6500:4#reset config
Command: reset config
Success.
config− If the keyword ‘config’ is specified, all of the factory
default settings are restored on the Switch including the IP
address, user accounts, and the Switch history log. The Switch
will not save or reboot.
system− If the keyword ‘system’ is specified all of the factory
default settings are restored on the Switch. The Switch will save
and reboot after the settings are changed to default. Rebooting
will clear all entries in the Forwarding Data Base.
If no parameter is specified, the Switch’s current IP address, user
accounts, and the Switch history log are not changed. All other
parameters are restored to the factory default settings. The Switch
will not save or reboot.
CLI interface of the Switch. The current command prompt
consists of “product name + : + user level + product name” (ex.
DES-6500:4#). The user may replace all parts of the command
prompt, except the # by entering a string of 16 alphanumerical
characters with no spaces, or the user may enter the current
login username configured on the Switch.
Parameters <string 16> - Enter an alphanumeric string of no more than 16
characters to define the command prompt for the CLI interface.
username – Entering this parameter will replace the current CLI
command prompt with the login username configured on the
default – Entering this parameter will return the command
prompt to its original factory default setting.
Restrictions
Example usage:
To configure the command prompt:
DES-6500:4#config command prompt Trinity
Command: config command prompt Trinity
Success.
Trinity#
The reset command will not alter the configured command
prompt, yet the reset system command will return the command
prompt to its original factory default setting.
Only administrator-level users can issue this command.
config greeting_message
Purpose Used to configure the greeting message or banner for the
opening screen of the Command Line Interface.
Syntax
Description This command is used to configure the greeting message or
config greeting_message {default}
login banner for the opening screen of the CLI.
Parameters default – Adding this parameter will return the greeting command
to its original factory default configuration.
Restrictions
Example usage:
To configure the greeting message:
The reset command will not alter the configured greeting
message, yet the reset system command will return the
greeting message to its original factory default setting.
The maximum character capacity for the greeting banned is 6
lines and 80 characters per line. Entering Ctrl+W will save the
current configured banner to the DRAM only. To enter it into the
FLASH memory, the user must enter the save command.
Only administrator-level users can issue this command.
Firmware: Build 3.00-B29
Copyright(C) 2004-2007 D-Link Corporation. All rights Reserved
===============================================================================
<Function Key> <Control Key>
Ctrl+C Quit without save left/right/
Ctrl+W Save and quit up/down Move cursor
Ctrl+D Delete line
Ctrl+X Erase all setting
Ctrl+L Reload original setting
Ethernet ports. Only the ports listed in the <portlist> will be
affected.
all − Configure all ports on the Switch.
<portlist> − Specifies a range of ports to be configured. The port
list is specified by listing the lowest switch number and the
beginning port number on that switch, separated by a colon. Then
the highest switch number, and the highest port number of the
range (also separated by a colon) are specified. The beginning
and end of the port list range are separated by a dash. For
example, 1:3 specifies switch number 1, port 3. 2:4 specifies
switch number 2, port 4. 1:3-2:4 specifies all of the ports between
switch 1, port 3 and switch 2, port 4 − in numerical order.
auto − Enables auto-negotiation for the specified range of ports.
[10 | 100 | 1000] − Configures the speed in Mbps for the specified
range of ports.
[half | full]− Configures the specified range of ports as either full-
or half-duplex.
[master | slave | None] – The master and slave parameters refer
to connections running a 1000BASE-T cable for connection
between the Switch port and other device capable of a gigabit
connection. The master setting will allow the port to advertise
capabilities related to duplex, speed and physical layer type. The
master setting will also determine the master and slave
relationship between the two connected physical layers. This
relationship is necessary for establishing the timing control
between the two physical layers. The timing control is set on a
master physical layer by a local source. The slave setting uses
loop timing, where the timing comes form a data stream received
25
config ports
Restrictions Only administrator-level users can issue this command.
Example usage:
To configure the speed of port 3 of unit 1 to be 10 Mbps, full duplex, learning and state enable:
from the master. If one connection is set for 1000 master, the
other side of the connection must be set for 1000 slave. Any other
configuration will result in a link down status for both ports. None
denotes the Switch will serve no role for stacking.
flow_control [enabled | disabled] – Enable or disable flow control
for the specified ports.
learning [enabled| disabled] − Enables or disables the MAC
address learning on the specified range of ports.
state [enabled | disabled] − Enables or disables the specified
range of ports.
description <desc 32> - Enter an alphanumeric string of no more
than 32 characters to describe a selected port interface.
clear – Enter this command to clear the port description of the
selected port(s).
Purpose Used to display the current configuration of a range of ports.
Syntax
Description This command is used to display the current configuration of a
Parameters
show ports {<portlist>} {description}
range of ports.
{<portlist>} − Specifies a range of ports to be displayed. The port
list is specified by listing the lowest slot number and the beginning
port number on that slot, separated by a colon. Then the highest
slot number, and the highest port number of the range (also
separated by a colon) are specified. The beginning and end of the
port list range are separated by a dash. For example, 1:3 specifies
slot number 1, port 3. 2:4 specifies slot number 2, port 4. 1:3-2:4
specifies all of the ports between slot 1, port 3 and slot 2, port 4 −
in numerical order.
Restrictions None.
Example usage:
To display the configuration of all ports on a standalone switch:
{description} – Adding this parameter to the command will allow
the user to view previously configured descriptions set on various
ports on the Switch.
Port Port Settings Connection Address
State Speed/Duplex/FlowCtrl Speed/Duplex/FlowCtrl Learning
------ -------- --------------------- --------------------- -------1:1 Enabled Auto/Enabled Link Down Enabled
1:2 Enabled Auto/Enabled Link Down Enabled
1:3 Enabled Auto/Enabled Link Down Enabled
1:4 Enabled Auto/Enabled Link Down Enabled
1:5 Enabled Auto/Enabled Link Down Enabled
1:6 Enabled Auto/Enabled Link Down Enabled
1:7 Enabled Auto/Enabled Link Down Enabled
1:8 Enabled Auto/Enabled Link Down Enabled
1:9 Enabled Auto/Enabled Link Down Enabled
1:10 Enabled Auto/Enabled 100M/Full/802.3x Enabled
1:11 Enabled Auto/Enabled Link Down Enabled
1:12 Enabled Auto/Enabled Link Down Enabled
2:1 Enabled Auto/Disabled Link Down Enabled
2:2 Enabled Auto/Disabled Link Down Enabled
2:3 Enabled Auto/Disabled Link Down Enabled
2:4 Enabled Auto/Disabled Link Down Enabled
2:5 Enabled Auto/Disabled Link Down Enabled
2:6 Enabled Auto/Disabled Link Down Enabled
2:7 Enabled Auto/Disabled Link Down Enabled
2:8 Enabled Auto/Disabled Link Down Enabled
CTRL+C ESC q Quit SPACE n Next Page p Previous Page r Refresh
Example usage;
To display port descriptions:
DES-6500:4#show ports 1:1 description
Command: show ports 1:1 description
Port Port Settings Connection Address
State Speed/Duplex/FlowCtrl Speed/Duplex/FlowCtrl Learning
------ -------- --------------------- --------------------- -------1:1 Enabled Auto/Enabled Link Down Enabled
Description: Accounting
CTRL+C ESC q Quit SPACE n Next Page p Previous Page r Refresh
feature. Only the ports listed in the <portlist> are effected.
<portlist> − Specifies a range of ports to be displayed. The port
list is specified by listing the lowest slot number and the beginning
port number on that slot, separated by a colon. Then the highest
slot number, and the highest port number of the range (also
separated by a colon) are specified. The beginning and end of the
port list range are separated by a dash. For example, 1:3 specifies
slot number 1, port 3. 2:4 specifies slot number 2, port 4. 1:3-2:4
specifies all of the ports between slot 1, port 3 and slot 2, port 4 −
in numerical order.
all − Configure port security for all ports on the Switch.
admin_state [enabled | disabled] – Enable or disable port security
for the listed ports.
max_learning_addr <max_lock_no 0-64> - Use this to limit the
number of MAC addresses dynamically listed in the FDB for the
ports.
lock_address_mode [Permanent | DeleteOnTimeout |
DeleteOnReset] – Indicates the method of locking addresses. The
user has three choices:
Permanent – The locked addresses will not age out after
the aging timer expires.
DeleteOnTimeout – The locked addresses will age out
after the aging timer expires.
DeleteOnReset – The locked addresses will not age out
until the Switch has been reset.
Restrictions Only administrator-level users can issue this command.
Purpose Used to display the current port security configuration.
Syntax
Description This command is used to display port security information of the
Parameters
Restrictions None.
Example usage:
DES-6500:4#
show port_security {ports <portlist>}
Switch ports. The information displayed includes port security admin
state, maximum number of learning address and lock mode.
ports <portlist>− Specifies a range of ports to be displayed. The
port list is specified by listing the lowest slot number and the
beginning port number on that switch, separated by a colon. Then the
highest slot number, and the highest port number of the range (also
separated by a colon) are specified. The beginning and end of the
port list range are separated by a dash. For example, 1:3 specifies
slot number 1, port 3. 2:4 specifies slot number 2, port 4. 1:3-2:4
specifies all of the ports between slot 1, port 3 and slot 2, port 4 − in
numerical order.
To display the port security configuration:
DES-6500:4#show port_security ports 1:1-1:10
Command: show port_security ports 1:1-1:10
Port# Admin State Max. Learning Addr. Lock Address Mode
Purpose Used to delete an entry from the Switch’s port security settings.
Syntax
Description This command is used to remove an entry from the port security
Parameters <vlan_name 32> - Enter the corresponding VLAN of the entry to
Restrictions Only administrator-level users can issue this command.
Example usage:
To delete an entry from the port security list:
DES-6500:4#delete port_security_entry_vlan_name default port
1:1 mac_address 00-0C-6E-73-2B-C9
Command: delete port_security_entry_vlan_name default port
1:1 mac_address 00-0C-6E-73-2B-C9
delete
port_security_entry_vlan_name <vlan_name 32> port
<port> mac_address <macaddr>
entries learned by the Switch and entered into the forwarding
database.
delete.
port <port> - Enter the corresponding port of the entry to delete. The
port is specified by listing the lowest slot number and the beginning
port number on that slot, separated by a colon. For example, 1:3
specifies switch number 1, port 3. 2:4 specifies switch number 2,
port 4.
mac_address <macaddr> - Enter the corresponding MAC address of
the entry to delete.
The network management commands in the Command Line Interface (CLI) are listed (along with the appropriate parameters) in
the following table.
The xStack DES-6500 support the Simple Network Management Protocol (SNMP) versions 1, 2c, and 3. You can specify which
version of the SNMP you want to use to monitor and control the Switch. The three versions of SNMP vary in the level of
security provided between the management station and the network device. The following table lists the security features of the
three SNMP versions:
SNMP Version Authentication Method Description
v1 Community String
v2c Community String
v3 Username
v3 MD5 or SHA
v3 MD5 DES or SHA DES
Each command is listed, in detail, in the following sections.
Command Parameters
create snmp user create snmp user <SNMP_name 32> <groupname 32>
Encryption − Scrambles the contents of messages to prevent it from
being viewed by an unauthorized source.
Parameters
<username 32>− An alphanumeric name of up to 32 characters
that will identify the new SNMP user.
<groupname 32>− An alphanumeric name of up to 32 characters
that will identify the SNMP group with which the new SNMP user
will be associated.
encrypted – Allows the user to choose a type of authorization for
authentication using SNMP. The user may choose:
•
by_password – Requires the SNMP user to enter a
password for authentication and privacy. The password is
defined by specifying the auth_password below. This
method is recommended.
•
by_key – Requires the SNMP user to enter a encryption
key for authentication and privacy. The key is defined by
specifying the key in hex form below. This method is not
recommended.
auth - The user may also choose the type of authentication
algorithms used to authenticate the snmp user. The choices are:
•
md5 − Specifies that the HMAC-MD5-96 authentication
level will be used. md5 may be utilized by entering one of
the following:
<auth password 8-16> - An alphanumeric sting of
between 8 and 16 characters that will be used to
authorize the agent to receive packets for the host.
<auth_key 32-32> - Enter an alphanumeric sting of
exactly 32 characters, in hex form, to define the key that
will be used to authorize the agent to receive packets for
the host.
−
•
priv – Adding the priv (privacy) parameter will allow for encryption in
addition to the authentication algorithm for higher security. The user
may choose:
•
Specifies that the HMAC-SHA-96 authentication
sha
level will be used.
<auth password 8-20> - An alphanumeric sting of
between 8 and 20 characters that will be used to
authorize the agent to receive packets for the host.
<auth_key 40-40> - Enter an alphanumeric sting of
exactly 40 characters, in hex form, to define the key that
will be used to authorize the agent to receive packets for
the host.
des – Adding this parameter will allow for a 56-bit
encryption to be added using the DES-56 standard using:
<priv_password 8-16> - An alphanumeric string of
between 8 and 16 characters that will be used to
encrypt the contents of messages the host sends to
Vacm View Table Settings
View Name Subtree View Type
-------------------- ------------------------- --------- ReadView 1 Included
WriteView 1 Included
NotifyView 1.3.6 Included
restricted 1.3.6.1.2.1.1 Included
restricted 1.3.6.1.2.1.11 Included
restricted 1.3.6.1.6.3.10.2.1 Included
restricted 1.3.6.1.6.3.11.2.1 Included
restricted 1.3.6.1.6.3.15.1.1 Included
CommunityView 1 Included
CommunityView 1.3.6.1.6.3 Excluded
CommunityView 1.3.6.1.6.3.1 Included
Total Entries: 11
DES-6500:4#
create snmp community
Purpose Used to create an SNMP community string to define the relationship
between the SNMP manager and an agent. The community string acts
like a password to permit access to the agent on the Switch. One or
more of the following characteristics can be associated with the
community string:
An Access List of IP addresses of SNMP managers that are permitted to
use the community string to gain access to the Switch’s SNMP agent.
An MIB view that defines the subset of all MIB objects that will be
accessible to the SNMP community.
Read-write or read-only level permission for the MIB objects accessible
to the SNMP community.
The create snmp community command is used to create an SNMP
community string and to assign access-limiting characteristics to this
community string.
<community_string 32> − An alphanumeric string of up to 32 characters
that is used to identify members of an SNMP community. This string is
used like a password to give remote SNMP managers access to MIB
objects in the Switch’s SNMP agent.
view <view_name 32>− An alphanumeric string of up to 32 characters
that is used to identify the group of MIB objects that a remote SNMP
manager is allowed to access on the Switch.
read_only − Specifies that SNMP community members using the
community string created with this command can only read the contents
of the MIBs on the Switch.
read_write − Specifies that SNMP community members using the
community string created with this command can read from and write to
the contents of the MIBs on the Switch.
Restrictions Only administrator-level users can issue this command.
37
Example usage:
To create the SNMP community string “dlink:”
delete snmp community
Purpose Used to remove a specific SNMP community string from the
DES-6500:4#create snmp community dlink view ReadView read_write
Command: create snmp community dlink view ReadView read_write
Success.
DES-6500:4#
Switch.
Syntax
Description
Parameters
Restrictions Only administrator-level users can issue this command.
Example usage:
To delete the SNMP community string “dlink:”
show snmp community
delete snmp community <community_string 32>
The delete snmp community command is used to remove a
previously defined SNMP community string from the Switch.
<community_string 32> − An alphanumeric string of up to 32
characters that is used to identify members of an SNMP
community. This string is used like a password to give remote
SNMP managers access to MIB objects in the Switch’s SNMP
agent.
DES-6500:4#delete snmp community dlink
Command: delete snmp community dlink
Success.
DES-6500:4#
Purpose Used to display SNMP community strings configured on the
Switch.
Syntax
Description
Parameters
Restrictions None.
show snmp community {<community_string 32>}
The show snmp community command is used to display SNMP
community strings that are configured on the Switch.
<community_string 32>− An alphanumeric string of up to 32
characters that is used to identify members of an SNMP
community. This string is used like a password to give remote
SNMP managers access to MIB objects in the Switch’s SNMP
agent.
38
Example usage:
To display the currently entered SNMP community strings:
config snmp engineID
Purpose Used to configure a name for the SNMP engine on the Switch.
The create snmp group command creates a new SNMP group,
or a table that maps SNMP users to SNMP views.
<groupname 32>− An alphanumeric name of up to 32 characters
that will identify the SNMP group the new SNMP user will be
associated with.
v1 – Specifies that SNMP version 1 will be used. The Simple
Network Management Protocol (SNMP), version 1, is a network
management protocol that provides a means to monitor and
control network devices.
v2c – Specifies that SNMP version 2c will be used. The SNMP
v2c supports both centralized and distributed network
management strategies. It includes improvements in the Structure
of Management Information (SMI) and adds some security
features.
v3 – Specifies that the SNMP version 3 will be used. SNMP v3
provides secure access to devices through a combination of
authentication and encrypting packets over the network. SNMP v3
adds:
Message integrity − Ensures that packets have not been
tampered with during transit.
Authentication − Determines if an SNMP message is from
a valid source.
Encryption − Scrambles the contents of messages to
prevent it being viewed by an unauthorized source.
noauth_nopriv − Specifies that there will be no authorization and
no encryption of packets sent between the Switch and a remote
SNMP manager.
auth_nopriv − Specifies that authorization will be required, but
there will be no encryption of packets sent between the Switch
and a remote SNMP manager.
auth_priv− Specifies that authorization will be required, and that
packets sent between the Switch and a remote SNMP manger will
40
create snmp group
Restrictions Only administrator-level users can issue this command.
read_view – Specifies that the SNMP group being created can
request SNMP messages.
write_view – Specifies that the SNMP group being created has
write privileges.
<view_name 32>− An alphanumeric string of up to 32 characters
that is used to identify the group of MIB objects that a remote
SNMP manager is allowed to access on the Switch.
notify_view− Specifies that the SNMP group being created can
receive SNMP trap messages generated by the Switch’s SNMP
agent.
Purpose Used to display the group-names of SNMP groups currently
configured on the Switch. The security model, level, and status of
each group are also displayed.
Syntax
Description
Parameters None.
Restrictions None.
Example usage:
To display the currently configured SNMP groups on the Switch:
show snmp groups
The show snmp groups command displays the group-names of
SNMP groups currently configured on the Switch. The security
model, level, and status of each group are also displayed.
DES-6500:4#show snmp groups
Command: show snmp groups
Vacm Access Table Settings
Group Name : Group3
ReadView Name : ReadView
WriteView Name : WriteView
Notify View Name : NotifyView
Security Model : SNMPv3
Security Level : NoAuthNoPriv
Group Name : Group4
ReadView Name : ReadView
WriteView Name : WriteView
Notify View Name : NotifyView
Security Model : SNMPv3
Security Level : authNoPriv
Group Name : Group5
ReadView Name : ReadView
WriteView Name : WriteView
Notify View Name : NotifyView
Security Model : SNMPv3
Security Level : authNoPriv
Group Name : Group6
ReadView Name : ReadView
WriteView Name : WriteView
Notify View Name : NotifyView
Security Model : SNMPv3
Security Level : authPriv
Group Name : Group7
ReadView Name : ReadView
WriteView Name : WriteView
Notify View Name : NotifyView
Security Model : SNMPv3
Security Level : authPriv
ReadView Name : restricted
WriteView Name :
Notify View Name : restricted
Security Model : SNMPv3
Security Level : NoAuthNoPriv
Group Name : ReadGroup
ReadView Name : CommunityView
WriteView Name :
Notify View Name : CommunityView
Security Model : SNMPv1
Security Level : NoAuthNoPriv
Group Name : ReadGroup
ReadView Name : CommunityView
WriteView Name :
Notify View Name : CommunityView
Security Model : SNMPv2
Security Level : NoAuthNoPriv
Group Name : WriteGroup
ReadView Name : CommunityView
WriteView Name : CommunityView
Notify View Name : CommunityView
Security Model : SNMPv1
Security Level : NoAuthNoPriv
Group Name : WriteGroup
ReadView Name : CommunityView
WriteView Name : CommunityView
Notify View Name : CommunityView
Security Model : SNMPv2
Security Level : NoAuthNoPriv
Total Entries: 10
DES-6500:4#
create snmp host
Purpose Used to create a recipient of SNMP traps generated by the
The create snmp host command creates a recipient of SNMP
traps generated by the Switch’s SNMP agent.
<ipaddr> − The IP address of the remote management station
that will serve as the SNMP host for the Switch.
v1 – Specifies that SNMP version 1 will be used. The Simple
Network Management Protocol (SNMP), version 1, is a network
management protocol that provides a means to monitor and
control network devices.
v2c – Specifies that SNMP version 2c will be used. The SNMP
v2c supports both centralized and distributed network
management strategies. It includes improvements in the Structure
of Management Information (SMI) and adds some security
features.
v3 – Specifies that the SNMP version 3 will be used. SNMP v3
provides secure access to devices through a combination of
authentication and encrypting packets over the network. SNMP
v3 adds:
noauth_nopriv− Specifies that there will be no authorization and
no encryption of packets sent between the Switch and a remote
SNMP manager.
auth_nopriv− Specifies that authorization will be required, but
there will be no encryption of packets sent between the Switch
and a remote SNMP manager.
Message integrity − Ensures that packets have not been
tampered with during transit.
Authentication − Determines if an SNMP message is from
a valid source.
Encryption − Scrambles the contents of messages to
prevent it being viewed by an unauthorized source.
Restrictions Only administrator-level users can issue this command.
Example usage:
To create an SNMP host to receive SNMP messages:
delete snmp host
Purpose Used to remove a recipient of SNMP traps generated by the
auth_priv − Specifies that authorization will be required, and that
packets sent between the Switch and a remote SNMP manger
will be encrypted.
<auth_sting 32>− An alphanumeric string used to authorize a
remote SNMP manager to access the Switch’s SNMP agent.
DES-6500:4#create snmp host 10.48.74.100 v3 auth_priv public
Command: create snmp host 10.48.74.100 v3 auth_priv public
Success.
DES-6500:4#
Switch’s SNMP agent.
Syntax
Description
Parameters
Restrictions Only administrator-level users can issue this command.
delete snmp host <ipaddr> <auth_string 32>
The delete snmp host command deletes a recipient of SNMP
traps generated by the Switch’s SNMP agent.
<ipaddr>− The IP address of a remote SNMP manager that will
receive SNMP traps generated by the Switch’s SNMP agent.
<auth_sting 32>− The alphanumeric string created to authorize a
remote SNMP manager to access the Switch’s SNMP agent.
44
Example usage:
To delete an SNMP host entry:
show snmp host
Purpose Used to display the recipient of SNMP traps generated by the
To display the currently configured SNMP hosts on the Switch:
show snmp host {<ipaddr>}
The show snmp host command is used to display the IP
addresses and configuration information of remote SNMP
managers that are designated as recipients of SNMP traps that
are generated by the Switch’s SNMP agent.
<ipaddr>− The IP address of a remote SNMP manager that will
receive SNMP traps generated by the Switch’s SNMP agent.
DES-6500:4#show snmp host
Command: show snmp host
SNMP Host Table
Host IP Address SNMP Version Community Name/SNMPv3 User Name
The create trusted_host command creates the trusted host.
The Switch allows specification up to four IP addresses that are
allowed to manage the Switch via in-band SNMP or TELNET
based management software. These IP addresses must be
members of the Management VLAN. If no IP addresses are
specified, then there is nothing to prevent any IP address from
accessing the Switch, provided the user knows the Username
and Password.
Parameters <sw_contact> - A maximum of 255 characters is allowed. A NULL
Restrictions Only administrator-level users can issue this command.
Example usage:
To configure the Switch contact to “
DES-6500:4#config snmp system_contact MIS Department II
Command: config snmp system_contact MIS Department II
Success.
DES-6500:4#
config snmp system_contact {<sw_contact>}
The config snmp system_contact command is used to enter the
name and/or other information to identify a contact person who is
responsible for the Switch. A maximum of 255 character can be
used.
string is accepted if there is no contact.
MIS Department II
”:
config snmp system_location
Purpose Used to enter a description of the location of the Switch.
Syntax
Description
Parameters <sw_location> - A maximum of 255 characters is allowed. A NULL
Restrictions Only administrator-level users can issue this command.
Example usage:
config snmp system_location {<sw_location>}
The config snmp system_location command is used to enter a
description of the location of the Switch. A maximum of 255
characters can be used.
string is accepted if there is no location desired.
Purpose Used to download and install new firmware or a switch
configuration file from a TFTP server or a CompactFlash memory
card.
Syntax
[firmware_fromTFTP <ipaddr> <path_filename 64> unit
[all_line_card | cpu | <unitid 1-8>]} | cfg_fromTFTP <ipaddr>
<path_filename 64> {increment}
Description This command is used to download a new firmware or a switch
configuration file from a TFTP server or a CompactFlash memory
card.
Parameters
firmware_fromTFTP− Download and install new firmware on the
Switch from a TFTP server.
<ipaddr> − The IP address of the TFTP server. The TFTP
server must be on the same IP subnet as the Switch.
<path_filename 64> − The DOS path and filename of the
firmware or switch configuration file on the TFTP server. For
example, C:\3226S.had.
unit [all_line_card | cpu | <unitid 1-8>] − all specifies all
installed modules except the CPU module, cpu specifies the
chassis’ CPU module and <unitid> is the unit ID of a specific
installed module that will receive the download.
cfg_fromTFTP - Download a switch configuration file from a TFTP
server.
<ipaddr> − The IP address of the TFTP server. The TFTP
server must be on the same IP subnet as the Switch.
<path_filename 64> − The DOS path and filename of the
firmware or switch configuration file on the TFTP server or
CompactFlash card. For example, C:\3226S.had.
increment − Allows the download of a partial switch
configuration file. This allows a file to be downloaded that will
change only the Switch parameters explicitly stated in the
configuration file. All other switch parameters will remain
unchanged.
Due to a backward compatability issue, when a user upgrades to R3 firmware (3.00-B29),
all settings previously configured for any ACL function (CPU ACL included) on the Switch
will be lost. We recommend that the user save a configuration file of current settings before
upgrading to R3 firmware.
upload
Purpose Used to upload the current switch settings or the switch history log
to a TFTP server or a CompactFlash memory card.
Syntax
Description This command is used to upload either the Switch’s current settings,
the Switch’s history log or firmware to a TFTP server or a
CompactFlash memory card.
cfg_toTFTP − Specifies that the Switch’s current settings will be
uploaded to the TFTP server.
log_toTFTP − Specifies that the Switch’s current log will be
uploaded to the TFTP server.
<ipaddr>− The IP address of the TFTP server. The TFTP
server must be on the same IP subnet as the Switch.
<path_filename 64>− Specifies the location of the Switch
configuration file on the TFTP server. This file will be replaced
by the uploaded file from the Switch.
Restrictions The TFTP server must be on the same IP subnet as the Switch.
Example usage:
To upload a configuration file:
Only administrator-level users can issue this command.
(ICMP) echo messages to a remote IP address. The remote IP
address will then “echo” or return the message. This is used to
confirm connectivity between the Switch and the remote device.
times <value 1-255> - The number of individual ICMP echo
messages to be sent. The maximum value is 255. The default is 0.
timeout <sec 1-99> - Defines the time-out period while waiting for a
response from the remote device. A value of 1 to 99 seconds can
be specified. The default is 1 second.
Pinging an IP address without the times parameter will ping the
target device an infinite amount of times.
traceroute
Purpose Used to trace the routed path between the Switch and a destination
endstation.
Syntax
Description The traceroute command allows you to trace a route between the Switch
ttl <value 1-60> - The time to live value of the trace route request. This is
the maximum number of routers the traceroute command will cross while
seeking the network path between two devices.
port <value 30000-64900> - The port number. Must be above 1024.The
value range is from 30000 to 64900.
timeout <sec 1-65535> - Defines the time-out period while waiting for a
response from the remote device. The user may choose an entry
between 1 and 65535 seconds.
probe <value 1-9> - The probe value is the number of times the Switch
will send probe packets to the next hop on the intended traceroute path.
The default is 1.
Purpose Used to activate the autoconfiguration function for the Switch. This will load a
previously saved configuration file for current use.
Syntax
Description When autoconfig is enabled on the Switch, the DHCP reply will contain a
Parameters None.
Restrictions When autoconfig is enabled, the Switch becomes a DHCP client automatically
enable autoconfig
configuration file and path name. It will then request the file from the TFTP
server specified in the reply. When autoconfig is enabled, the ipif settings will
automatically become DHCP client.
(same as: config ipif System dhcp). The DHCP server must have the TFTP
server IP address and configuration file name, and be configured to deliver
this information in the data field of the DHCP reply packet. The TFTP server
must be running and have the requested configuration file in its base directory
when the request is received from the Switch. Consult the DHCP server and
TFTP server software instructions for information on loading a configuration
file.
If the Switch is unable to complete the autoconfiguration process the
previously saved local configuration file present in Switch memory will be
loaded.
NOTE: Dual-purpose (DHCP/TFTP) server utility software may require entry of the
configuration file name and path within the user interface. Alternatively, the DHCP
software may require creating a separate ext file with the configuration file name
and path in a specific directory on the server. Consult the documentation for the
DCHP server software if you are unsure.
When autoconfig is enabled and the Switch is rebooted, the normal login screen will appear for a few moments while the
autoconfig request (i.e. download configuration) is initiated. The console will then display the configuration parameters as they
are loaded from the configuration file specified in the DHCP or TFTP server. This is exactly the same as using a download configuration command. After the entire Switch configuration is loaded, the Switch will automatically “logout” the server. The
configuration settings will be saved automatically and become the active configuration.
Upon booting up the autoconfig process is initiated, the console screen will appear similar to the example below. The
configuration settings will be loaded in normal order.
DES-6500:4#
DES-6500:4##------------------------------------------------------------------DES-6500:4## End of configuration file for DES-6500
DES-6500:4#
Purpose Use this to deactivate autoconfiguration from DHCP.
Syntax
Description This instructs the Switch not to accept autoconfiguration instruction from
Parameters None.
Restrictions None.
Example usage:
To stop the autoconfiguration function:
DES-6500:4#disable autoconfig
Command: disable autoconfig
Success.
DES-6500:4#
disable autoconfig
the DHCP server. This does not change the IP settings of the Switch. The
ipif settings will continue as DHCP client until changed with the config ipif
command.
NOTE:With autoconfig enabled, the Switch ipif settings now define the
Switch as a DHCP client. Use the show switch command to display the
new IP settings status.
show autoconfig
Purpose Used to display the current autoconfig status of the Switch.
Syntax
Description This will list the current status of the autoconfiguration function.
Parameters None.
Restrictions None.
Example usage:
To show the autoconfig configuration set on the Switch:
Each command is listed, in detail, in the following sections.
show packet ports
Purpose Used to display statistics about the packets sent and received by
the Switch.
Syntax
Description This command is used to display statistics about packets sent and
show packet ports <portlist>
received by ports specified in the port list. The results are
separated into three tables, labeled A, B, and C in the window
above. Table A is relevant to the size of the packets, Table B is
relevant to the type of packets and Table C is relevant to the type
of frame associated with these packets.
To display the packets analysis for port 7 of module 2:
<portlist>− Specifies a range of ports to be displayed. The port list
is specified by listing the lowest slot number and the beginning
port number on that slot, separated by a colon. Then the highest
slot number, and the highest port number of the range (also
separated by a colon) are specified. The beginning and end of the
port list range are separated by a dash. For example, 1:3 specifies
slot number 1, port 3. 2:4 specifies slot number 2, port 4. 1:3-2:4
specifies all of the ports between slot 1, port 3 and slot 2, port 4 −
in numerical order.
DES-6500:4#show packet port 2:7
Command: show packet port 2:7
Port number : 2:7
(A) (B)
Frame Size Frame Counts Frames/sec Frame Type Total Total/sec
CTRL+C ESC q Quit SPACE n Next Page p Previous Page r Refresh
show error ports
Purpose Used to display the error statistics for a range of ports.
Syntax
Description This command will display all of the packet error statistics
Parameters
Restrictions None.
show error ports <portlist>
collected and logged by the Switch for a given port list.
<portlist>− Specifies a range of ports to be displayed. The port
list is specified by listing the lowest slot number and the
beginning port number on that slot, separated by a colon. Then
the highest slot number, and the highest port number of the
range (also separated by a colon) are specified. The beginning
and end of the port list range are separated by a dash. For
example, 1:3 specifies slot number 1, port 3. 2:4 specifies slot
number 2, port 4. 1:3-2:4 specifies all of the ports between slot 1,
port 3 and slot 2, port 4 − in numerical order.
59
Example usage:
To display the errors of the port 3 of module 1:
show utilization
Purpose Used to display real-time port and cpu utilization statistics.
Box Prio- Prom Runtime H/W
ID Type Exist rity version version version
--- ----------- ----- ----- -------- -------- ------- 1 DES-6507 exist 16 2.00-B20 3.00-B29 1A1
2 USR-NOT-CFG no
3 USR-NOT-CFG no
4 USR-NOT-CFG no
5 USR-NOT-CFG no
6 USR-NOT-CFG no
7 USR-NOT-CFG no
8 USR-NOT-CFG no
-------------------------------------------------------------------------------------------------Topology :STAR
Current state :MASTER
Box Count :1
DES-6500:4#
clear counters
Purpose Used to clear the Switch’s statistics counters.
Syntax
Description This command will clear the counters used by the Switch to compile
Parameters
Restrictions Only administrator-level users can issue this command.
Example usage:
To clear the counters:
DES-6500:4#clear counters ports 2:7-2:9
Command: clear counters ports 2:7-2:9
Success.
DES-6500:4#
clear counters {ports <portlist>}
statistics.
ports <portlist>− Specifies a range of ports to be displayed. The
port list is specified by listing the lowest slot number and the
beginning port number on that slot, separated by a colon. Then the
highest slot number, and the highest port number of the range (also
separated by a colon) are specified. The beginning and end of the
port list range are separated by a dash. For example, 1:3 specifies
slot number 1, port 3. 2:4 specifies slot number 2, port 4. 1:3-2:4
specifies all of the ports between slot 1, port 3 and slot 2, port 4 − in
numerical order.
Description This command will clear the Switch’s history log.
Parameters None.
Restrictions Only administrator-level users can issue this command.
Example usage:
To clear the log information:
show log
Purpose Used to display the Switch history log.
clear log
DES-6500:4#clear log
Command: clear log
Success.
DES-6500:4#
Syntax
Description This command will display the contents of the Switch’s history log.
Parameters
Restrictions None.
Example usage:
To display the Switch history log:
show log {index <value_list>}
index <value_list>− Enter a value that corresponds to an entry
made in the log. Multiple entries may be made in the form of x-x
where x is the number of an entry in the log. The smallest number
(and therefore the earlier entry) will be first.
DES-6500:4#show log index 1-4
Command: show log index 1-4
Index Date Time Log Text
----- ---------- -------- ----------------------------------------------------4 2000-03-02 01:54:53 Port 1:13 link up, 100Mbps FULL duplex
3 2000-03-02 01:54:53 Spanning Tree Protocol is enabled
2 2000-03-02 01:54:53 Unit 1, System started up
1 2000-02-28 06:06:09 Spanning Tree Protocol is disabled
The create syslog host command is used to create a new syslog host.
<index 1-4> − Specifies that the command will be applied to an index of
hosts. There are four available indexes, numbered 1 through 4.
severity − Severity level indicator, as shown below:
Bold font indicates that the corresponding severity level is currently
supported on the Switch.
Numerical Severity
Code
0 Emergency: system is unusable
1 Alert: action must be taken immediately
2 Critical: critical conditions
3 Error: error conditions
4 Warning: warning conditions
5 Notice: normal but significant condition
6 Informational: informational messages
7 Debug: debug-level messages
informational− Specifies that informational messages will be sent to the
remote host. This corresponds to number 6 from the list above.
warning − Specifies that warning messages will be sent to the remote
host. This corresponds to number 4 from the list above.
all
−
Specifies that all of the currently supported syslog messages that
are generated by the Switch will be sent to the remote host.
facility− Some of the operating system daemons and processes have
been assigned Facility values. Processes and daemons that have not
been explicitly assigned a Facility may use any of the "local use"
facilities or they may use the "user-level" Facility. Those Facilities that
have been designated are shown in the following: Bold font indicates
the facility values that the Switch currently supports.
Numerical Facility
Code
0 kernel messages
1 user-level messages
2 mail system
3 system daemons
4 security/authorization messages
5 messages generated internally by syslog
6 line printer subsystem
7 network news subsystem
8 UUCP subsystem
9 clock daemon
10 security/authorization messages
11 FTP daemon
12 NTP subsystem
13 log audit
14 log alert
15 clock daemon
16 local use 0 (local0)
17 local use 1 (local1)
18 local use 2 (local2)
19 local use 3 (local3)
20 local use 4 (local4)
21 local use 5 (local5)
22 local use 6 (local6)
23 local use 7 (local7)
local0− Specifies that local use 0 messages will be sent to the remote
host. This corresponds to number 16 from the list above.
local1− Specifies that local use 1 messages will be sent to the remote
host. This corresponds to number 17 from the list above.
local2− Specifies that local use 2 messages will be sent to the remote
host. This corresponds to number 18 from the list above.
local3− Specifies that local use 3 messages will be sent to the remote
host. This corresponds to number 19 from the list above.
−
local4
host. This corresponds to number 20 from the list above.
local5− Specifies that local use 5 messages will be sent to the remote
host. This corresponds to number 21 from the list above.
local6− Specifies that local use 6 messages will be sent to the remote
host. This corresponds to number 22 from the list above.
local7 − Specifies that local use 7 messages will be sent to the remote
host. This corresponds to number 23 from the list above.
udp_port <udp_port_number> − Specifies the UDP port number that
the syslog protocol will use to send messages to the remote host.
ipaddress <ipaddr>− Specifies the IP address of the remote host
Specifies that local use 4 messages will be sent to the remote
66
create syslog host
Restrictions Only administrator-level users can issue this command.
warning − Specifies that warning messages will be sent to the
remote host. This corresponds to number 4 from the list above.
all − Specifies that all of the currently supported syslog messages
that are generated by the Switch will be sent to the remote host.
facility− Some of the operating system daemons and processes
have been assigned Facility values. Processes and daemons that
have not been explicitly assigned a Facility may use any of the
"local use" facilities or they may use the "user-level" Facility.
Those Facilities that have been designated are shown in the
following: Bold font indicates the facility values the Switch
currently supports.
16 local use 0 (local0)
17 local use 1 (local1)
18 local use 2 (local2)
19 local use 3 (local3)
20 local use 4 (local4)
21 local use 5 (local5)
22 local use 6 (local6)
23 local use 7 (local7)
local0 − Specifies that local use 0 messages will be sent to the
remote host. This corresponds to number 16 from the list above.
local1− Specifies that local use 1 messages will be sent to the
remote host. This corresponds to number 17 from the list above.
local2− Specifies that local use 2 messages will be sent to the
remote host. This corresponds to number 18 from the list above.
local3− Specifies that local use 3 messages will be sent to the
remote host. This corresponds to number 19 from the list above.
local4− Specifies that local use 4 messages will be sent to the
remote host. This corresponds to number 20 from the list above.
local5− Specifies that local use 5 messages will be sent to the
remote host. This corresponds to number 21 from the list above.
local6− Specifies that local use 6 messages will be sent to the
remote host. This corresponds to number 22 from the list above.
local7− Specifies that local use 7 messages will be sent to the
68
config syslog host
Restrictions Only administrator-level users can issue this command.
severity − Severity level indicator, as described below:
Bold font indicates that the corresponding severity level is
currently supported on the Switch.
Numerical Severity
Code
0 Emergency: system is unusable
1 Alert: action must be taken immediately
2 Critical: critical conditions
3 Error: error conditions
4 Warning: warning conditions
5 Notice: normal but significant condition
6 Informational: informational messages
7 Debug: debug-level messages
informational− Specifies that informational messages will be sent
to the remote host. This corresponds to number 6 from the list
above.
warning − Specifies that warning messages will be sent to the
remote host. This corresponds to number 4 from the list above.
all − Specifies that all of the currently supported syslog messages
that are generated by the Switch will be sent to the remote host.
facility− Some of the operating system daemons and processes
have been assigned Facility values. Processes and daemons that
have not been explicitly assigned a Facility may use any of the
"local use" facilities or they may use the "user-level" Facility.
Those Facilities that have been designated are shown in the
following: Bold font indicates that the facility values the Switch
currently supports.
16 local use 0 (local0)
17 local use 1 (local1)
18 local use 2 (local2)
19 local use 3 (local3)
20 local use 4 (local4)
21 local use 5 (local5)
22 local use 6 (local6)
23 local use 7 (local7)
Description This command is used to configure the system severity levels on the
Switch. When an event occurs on the Switch, a message will be sent
to the SNMP agent (trap), the Switch’s log or both. Events occurring
on the Switch are separated into three main categories.
• Information – Events classified as information are basic events
occurring on the Switch that are not deemed as problematic,
such as enabling or disabling various functions on the Switch.
• Warning - Events classified as warning are problematic events
that are not critical to the overall function of the Switch but do
require attention, such as unsuccessful downloads or uploads
and failed logins.
• Critical – Events classified as critical are fatal exceptions
occurring on the Switch, such as hardware failures or spoofing
attacks.
Parameters Choose one of the following to identify where severity messages are
to be sent.
• trap – Entering this parameter will define which events
occurring on the Switch will be sent to a SNMP agent for
analysis.
• log – Entering this parameter will define which events
occurring on the Switch will be sent to the Switch’s log for
analysis.
• all – Entering this parameter will define which events occurring
Choose one of the following to identify what type of severity
warnings are to be sent to the destination entered above.
• critical – Entering this parameter along with the proper
• warning – Entering this parameter along with the proper
• information – Entering this parameter along with the proper
Restrictions Only administrator-level users can issue this command.
Example usage:
To configure the system severity:
on the Switch will be sent to a SNMP agent and the Switch’s
log for analysis.
destination, stated above, will instruct the Switch to send only
critical events to the Switch’s log or SNMP agent.
destination, stated above, will instruct the Switch to send
critical and warning events to the Switch’s log or SNMP agent.
destination, stated above, will instruct the switch to send
informational, warning and critical events to the Switch’s log or
SNMP agent.
This switch supports three versions of the Spanning Tree Protocol; 802.1d STP, 802.1w Rapid STP and 802.1s MSTP. Multiple
Spanning Tree Protocol, or MSTP, is a standard defined by the IEEE community that allows multiple VLANs to be mapped to a
single spanning tree instance, which will provide multiple pathways across the network. Therefore, these MSTP configurations
will balance the traffic load, preventing wide scale disruptions when a single spanning tree instance fails. This will allow for
faster convergences of new topologies for the failed instance. Frames designated for these VLANs will be processed quickly
and completely throughout interconnected bridges utilizing either of the three spanning tree protocols (STP, RSTP or MSTP).
This protocol will also tag BPDU packets so receiving devices can distinguish spanning tree instances, spanning tree regions
and the VLANs associated with them. These instances will be classified by an instance_id. MSTP will connect multiple
spanning trees with a Common and Internal Spanning Tree (CIST). The CIST will automatically determine each MSTP region,
its maximum possible extent and will appear as one virtual bridge that runs a single spanning tree. Consequentially, frames
assigned to different VLANs will follow different data routes within administratively established regions on the network,
continuing to allow simple and full processing of frames, regardless of administrative errors in defining VLANs and their
respective spanning trees. Each switch utilizing the MSTP on a network will have a single MSTP configuration that will have
the following three attributes:
a) A configuration name defined by an alphanumeric string of up to 32 characters (defined in the config stp mst_config_id
command as name <string>).
b) A configuration revision number (named here as a revision_level) and;
c) A 4096 element table (defined here as a vid_range) which will associate each of the possible 4096 VLANs supported
by the Switch for a given instance.
To utilize the MSTP function on the Switch, three steps need to be taken:
a) The Switch must be set to the MSTP setting (config stp version)
b) The correct spanning tree priority for the MSTP instance must be entered (config stp priority).
c) VLANs that will be shared must be added to the MSTP Instance ID (config stp instance_id).
The Multiple Spanning Tree Protocol commands in the Command Line Interface (CLI) are listed (along with the appropriate
parameters) in the following table.
for the entire switch. All commands here will be implemented for
the STP version that is currently set on the Switch.
maxage <value 6-40>− This value may be set to ensure that old
information does not endlessly circulate through redundant paths
in the network, preventing the effective propagation of the new
information. Set by the Root Bridge, this value will aid in
determining that the Switch has spanning tree configuration
values consistent with other devices on the bridged LAN. If the
value ages out and a BPDU has still not been received from the
Root Bridge, the Switch will start sending its own BPDU to all
other switches for permission to become the Root Bridge. If it
turns out that your switch has the lowest Bridge Identifier, it will
become the Root Bridge. The user may choose a time between 6
and 40 seconds. The default value is 20.
maxhops <value 1-20> - The number of hops between devices in
a spanning tree region before the BPDU (bridge protocol data
unit) packet sent by the Switch will be discarded. Each switch on
the hop count will reduce the hop count by one until the value
reaches zero. The Switch will then discard the BDPU packet and
the information held for the port will age out. The user may set a
hop count from 1 to 20. The default is 20.
hellotime <value 1-10>− The user may set the time interval
between transmission of configuration messages by the root
device in STP, or by the designated router in RSTP, thus stating
that the Switch is still functioning. A time between 1 and 10
seconds may be chosen, with a default setting of 2 seconds.
In MSTP, the spanning tree is configured by port and
therefore, the hellotime must be set using the configure stp ports
command for switches utilizing the Multiple Spanning Tree
Protocol.
forwarddelay <value 4-30>− The maximum amount of time (in
seconds) that the root device will wait before changing states. The
user may choose a time between 4 and 30 seconds. The default is
15 seconds.
txholdcount <value 1-10> - The maximum number of BDPU Hello
packets transmitted per interval. Default value = 3.
fbpdu [enable | disable] − Allows the forwarding of STP BPDU
packets from other network devices when STP is disabled on the
Switch. The default is enable.
lbd [enable | disable] – Enabling this feature temporarily blocks
STP on the Switch when a BPDU packet has been looped back to
the Switch. When the Switch detects its own BPDU packet coming
back, it signifies a loop on the network. STP will automatically be
blocked and an alert will be sent to the administrator. The LBD
STP port will restart (change to discarding state) when the LBD Recover Time times out. The default is enabled.
lbd_recover_timer [0 | <value 60-1000000>] - This field will set the
time the STP port will wait before recovering the STP state set. 0
will denote that the LBD will never time out or restart until the
administrator personally changes it. The user may also set a time
between 60 and 1000000 seconds. The default is 60 seconds.
Restrictions Only administrator-level users can issue this command.
Example usage:
To configure STP with maxage 18 and maxhops of 15:
<portlist>− Specifies a range of ports to be displayed. The port list
is specified by listing the lowest slot number and the beginning
port number on that slot, separated by a colon. Then the highest
slot number, and the highest port number of the range (also
separated by a colon) are specified. The beginning and end of the
port list range are separated by a dash. For example, 1:3 specifies
slot number 1, port 3. 2:4 specifies slot number 2, port 4. 1:3-2:4
specifies all of the ports between slot 1, port 3 and slot 2, port 4 −
in numerical order.
externalCost− This defines a metric that indicates the relative cost
of forwarding packets to the specified port list. Port cost can be set
automatically or as a metric value. The default value is auto.
auto – Setting this parameter for the external cost will
automatically set the speed for forwarding packets to the
specified port(s) in the list for optimal efficiency. Default port
cost: 100Mbps port = 200000. Gigabit port = 20000.
<value 1-200000000> - Define a value between 1 and
200000000 to determine the external cost. The lower the
number, the greater the probability the port will be chosen to
forward packets.
hellotime <value 1-10>− The time interval between transmission
of configuration messages by the designated port, to other
devices on the bridged LAN, thus stating that the Switch is still
functioning. The user may choose a time between 1 and 10
seconds. The default is 2 seconds.
migrate [yes | no] – Setting this parameter as “yes” will set the
ports to send out BDPU packets to other bridges, requesting
information on their STP setting If the Switch is configured for
RSTP, the port will be capable to migrate from 802.1d STP to
802.1w RSTP. If the Switch is configured for MSTP, the port is
capable of migrating from 802.1d STP to 802.1s MSTP. RSTP
and MSTP can coexist with standard STP, however the benefits of
RSTP and MSTP are not realized on a port where an 802.1d
network connects to an 802.1w or 802.1s enabled network.
Migration should be set as yes on ports connected to network
stations or segments that are capable of being upgraded to
802.1w RSTP or 802.1s MSTP on all or some portion of the
segment.
edge [true | false] – true designates the port as an edge port.
Edge ports cannot create loops, however an edge port can lose
edge port status if a topology change creates a potential for a
loop. An edge port normally should not receive BPDU packets. If a
BPDU packet is received it automatically loses edge port status.
false indicates that the port does not have edge port status.
shared link. P2P ports are similar to edge ports however they are
restricted in that a P2P port must operate in full-duplex. Like edge
ports, P2P ports transition to a forwarding state rapidly thus
benefiting from RSTP. A p2p value of false indicates that the port
cannot have p2p status. auto allows the port to have p2p status
whenever possible and operate as if the p2p status were true. If
the port cannot maintain this status (for example if the port is
forced to half-duplex operation) the p2p status changes to operate
as if the p2p value were false. The default setting for this
parameter is auto.
Restrictions Only administrator-level users can issue this command.
Example usage:
To configure STP with path cost 19, hellotime set to 5 seconds, migration enable, and state enable for ports 1-5 of
module 1.
create stp instance_id
state [enable | disable]− Allows STP to be enabled or disabled for
the ports specified in the port list. The default is enable.
lbd [enable | disable] - Used to enable or disable the loopback
detection function on the switch for the ports configured above in
the config stp command.
Purpose Used to create a STP instance ID for MSTP.
Syntax
Description This command allows the user to create a STP instance ID for the
Parameters <value 1-15> - Enter a value between 1 and 15 to identify the
Restrictions Only administrator-level users can issue this command.
create stp instance_id <value 1-15>
Multiple Spanning Tree Protocol. There are 16 STP instances on
the Switch (one internal CIST, unchangeable) and the user may
create up to 15 instance IDs for the Switch.
configured STP instances on the Switch by creating an instance_id. A
STP instance may have multiple members with the same MSTP
configuration. There is no limit to the number of STP regions in a
network but each region only supports a maximum of 16 spanning tree
instances (one unchangeable default entry). VIDs can belong to only
one spanning tree instance at a time.
Note that switches in the same spanning tree region having the same
STP instance_id must be mapped identically, and have the same
configuration revision_level number and the same name.
instance_id. The Switch supports 16 STP regions with one
unchangeable default instance ID set as 0.
add_vlan – Along with the vid_range <vidlist> parameter, this
command will add VIDs to the previously configured STP
instance_id.
remove_vlan – Along with the vid_range <vidlist> parameter,
this command will remove VIDs to the previously configured STP
instance_id.
<vidlist> – Specify the VID range from configured VLANs set
on the Switch. Supported VIDs on the Switch range from ID
number 1 to 4094.
Restrictions Only administrator-level users can issue this command.
Description This command is used to update the STP instance configuration
settings on the Switch. The MSTP will utilize the priority in
selecting the root bridge, root port and designated port. Assigning
higher priorities to STP regions will instruct the Switch to give
precedence to the selected instance_id for forwarding packets.
The lower the priority value set, the higher the priority.
Parameters priority <value 0-61440> - Select a value between 0 and 61440 to
specify the priority for a specified instance ID for forwarding
packets. The lower the value, the higher the priority. This entry
must be divisible by 4096.
instance_id <value 0-15> - Enter the value corresponding to the
previously configured instance ID of which to set the priority value.
An instance id of 0 denotes the default instance_id (CIST)
internally set on the Switch.
Restrictions Only administrator-level users can issue this command.
To set the priority value for instance_id 2 as 4096:
DES-6500:4#config stp priority 4096 instance_id 2
Command : config stp priority 4096 instance_id 2
Success.
DES-6500:4#
config stp mst_config_id
Purpose Used to update the MSTP configuration identification.
Syntax
Description This command will uniquely identify the MSTP configuration
Parameters revision_level <int 0-65535>– Enter a number between 0 and
Restrictions Only administrator-level users can issue this command.
Example usage:
To configure the MSTP region of the Switch with revision_level 10 and the name “Trinity”:
DES-6500:4#config stp mst_config_id revision_level 10 name Trinity
Command : config stp mst_config_id revision_level 10 name Trinity
Success.
DES-6500:4#
config stp mst_config_id {revision_level <int 0-65535> | name
<string>
currently configured on the Switch. Information entered here will
be attached to BDPU packets as an identifier for the MSTP region
to which it belongs. Switches having the same revision_level and name will be considered as part of the same MSTP region.
65535 to identify the MSTP region. This value, along with the
name will identify the MSTP region configured on the Switch. The
default setting is 0.
name <string> - Enter an alphanumeric string of up to 32
characters to uniquely identify the MSTP region on the Switch.
This name, along with the revision_level value will identify the
MSTP region configured on the Switch. If no name is entered, the
default name will be the MAC address of the device.
config stp mst_ports
Purpose Used to update the port configuration for a MSTP instance.
Syntax
Description This command will update the port configuration for a STP
higher priority value for interfaces to be selected for forwarding
first. In instances where the priority value is identical, the MSTP
function will implement the lowest port number into the forwarding
state and other interfaces will be blocked. Remember that lower
priority values mean higher priorities for forwarding packets.
Parameters <portlist> - Specifies a port or range of ports to be configured. The
port list is specified by listing the lowest slot number and the
beginning port number on that slot, separated by a colon. Then
the highest slot number, and the highest port number of the range
(also separated by a colon) are specified. The beginning and end
of the port list range are separated by a dash. For example, 1:3
specifies slot number 1, port 3. 2:4 specifies slot number 2, port
4. 1:3-2:4 specifies all of the ports between slot 1, port 3 and slot
2, port 4 − in numerical order.
instance_id <value 0-15> - Enter a numerical value between 0 and
15 to identify the instance_id previously configured on the Switch.
An entry of 0 will denote the CIST (Common and Internal
Spanning Tree.
internalCost – This parameter is set to represent the relative cost
of forwarding packets to specified ports when an interface is
selected within a STP instance. The default setting is auto. There
are two options:
Restrictions Only administrator-level users can issue this command.
Example usage:
To designate ports 1 through 5 on module one, with instance ID 2, to have an auto internalCost and a priority of 16:
auto – Selecting this parameter for the internalCost will
set quickest route automatically and optimally for an
interface. The default value is derived from the media speed
of the interface.
value 1-2000000 – Selecting this parameter with a value
in the range of 1-2000000 will set the quickest route when a
loop occurs. A lower internalCost represents a quicker
transmission.
priority <value 0-240> - Enter a value between 0 and 240 to set
the priority for the port interface. A higher priority will designate the
interface to forward packets first. A lower number denotes a
higher priority.
Purpose Used to display the Switch’s current STP configuration.
Syntax
Description This command displays the Switch’s current STP configuration.
Parameters None.
Restrictions None.
Example usage:
To display the status of STP on the Switch:
Status 1: STP enabled with STP compatible version
show stp
DES-6500:4#show stp
Command: show stp
STP Status : Enabled
STP Version : STP Compatible
Max Age : 20
Hello Time : 2
Forward Delay : 15
Max Age : 20
TX Hold Count : 3
Forwarding BPDU : Enabled
Loopback Detection : Enabled
LBD Recover Time : 60
DES-6500:4#
Status 2 : STP enabled for RSTP
DES-6500:4#show stp
Command: show stp
STP Status : Enabled
STP Version : RSTP
Max Age : 20
Hello Time : 2
Forward Delay : 15
Max Age : 20
TX Hold Count : 3
Forwarding BPDU : Enabled
Loopback Detection : Enabled
LBD Recover Time : 60
DES-6500:4#
Status 3 : STP enabled for MSTP
DES-6500:4#show stp
Command: show stp
STP Status : Enabled
STP Version : MSTP
Max Age : 20
Forward Delay : 15
CTRL+C ESC q Quit SPACE n Next Page p Previous Page r Refresh
show stp ports <portlist>
Instance Operational Status currently implemented on the Switch.
<portlist>− Specifies a range of ports to be displayed. The port
list is specified by listing the lowest slot number and the beginning
port number on that slot, separated by a colon. Then the highest
slot number, and the highest port number of the range (also
separated by a colon) are specified. The beginning and end of the
port list range are separated by a dash. For example, 1:3
specifies slot number 1, port 3. 2:4 specifies slot number 2, port
4. 1:3-2:4 specifies all of the ports between slot 1, port 3 and slot
2, port 4 − in numerical order.
show stp instance_id
Purpose Used to display the Switch’s STP instance configuration
Syntax
Description This command displays the Switch’s current STP Instance
Parameters <value 0-15> - Enter a value defining the previously configured
show stp instance_id <value 0-15>
Settings and the STP Instance Operational Status.
instance_id on the Switch. An entry of 0 will display the STP
86
show stp instance_id
Restrictions None.
Example usage:
To display the STP instance configuration for instance 0 (the internal CIST) on the Switch:
Each command is listed, in detail, in the following sections.
create fdb
Purpose Used to create a static entry to the unicast MAC address
forwarding table (database).
Syntax
Description This command will make an entry into the Switch’s unicast MAC
Parameters
create fdb <vlan_name 32> <macaddr> port <port>
address forwarding database.
<vlan_name 32>− The name of the VLAN on which the MAC
address resides.
<macaddr>− The MAC address that will be added to the
forwarding table.
port <port>− Enter the corresponding port of the entry to delete.
The port is specified by listing the lowest slot number and the
beginning port number on that slot, separated by a colon. For
example, 1:3 specifies slot number 1, port 3. 2:4 specifies switch
number 2, port 4.
Restrictions Only administrator-level users can issue this command.
<portlist> − Specifies a range of ports to be displayed the
beginning port number on that slot, separated by a colon.
Then the highest slot number, and the highest port number
of the range (also separated by a colon) are specified. The
beginning and end of the port list range are separated by a
dash. For example, 1:3 specifies slot number 1, port 3. 2:4
specifies slot number 2, port 4. 1:3-2:4 specifies all of the
ports between slot 1, port 3 and slot 2, port 4 − in numerical
order.
Purpose Used to set the aging time of the forwarding database.
Syntax
Description The aging time affects the learning process of the Switch.
Parameters
Example usage:
To set the fdb aging time:
config fdb aging_time <sec 10-1000000>
Dynamic forwarding table entries, which are made up of the
source MAC addresses and their associated port numbers, are
deleted from the table if they are not accessed within the aging
time. The aging time can be from 10 to 1000000 seconds with a
default value of 300 seconds. A very long aging time can result in
dynamic forwarding table entries that are out-of-date or no longer
exist. This may cause incorrect packet forwarding decisions by the
Switch. If the aging time is too short however, many entries may
be aged out too soon. This will result in a high percentage of
received packets whose source addresses cannot be found in the
forwarding table, in which case the Switch will broadcast the
packet to all ports, negating many of the benefits of having a
switch.
<sec10-1000000>− The aging time for the MAC address
forwarding database value. The value in seconds may be between
10 and 1000000 seconds. The default is 300 seconds.
Only administrator-level users can issue this command. Restrictions
DES-6500:4#config fdb aging_time 300
Command: config fdb aging_time 300
Success.
DES-6500:4#
delete fdb
Purpose Used to delete an entry to the Switch’s forwarding database.
Syntax
Description This command is used to delete a previous entry to the Switch’s
Parameters
Restrictions Only administrator-level users can issue this command.
delete fdb <vlan_name 32> <macaddr>
MAC address forwarding database.
<vlan_name 32>− The name of the VLAN on which the MAC
address resides.
<macaddr>− The MAC address that will be deleted from the
forwarding table.
Purpose Used to clear the Switch’s forwarding database of all
dynamically learned MAC addresses.
Syntax
Description This command is used to clear dynamically learned entries to
Parameters
Restrictions Only administrator-level users can issue this command.
DES-6500:4#clear fdb all
clear fdb [vlan <vlan_name 32> | port <port> | all]
the Switch’s forwarding database.
vlan <vlan_name 32>− The name of the VLAN on which the
MAC address resides.
port <port>− Enter the corresponding port of the entry to delete.
The port is specified by listing the lowest slot number and the
beginning port number on that slot, separated by a colon. For
example, 1:3 specifies slot number 1, port 3. 2:4 specifies slot
number 2, port 4.
all − Clears all dynamic entries to the Switch’s forwarding
database.
port <port>− The port number corresponding to the MAC
destination address. Enter the corresponding port of the entry to
delete. The port is specified by listing the lowest slot number and
the beginning port number on that slot, separated by a colon. For
example, 1:3 specifies slot number 1, port 3. 2:4 specifies slot
number 2, port 4.
<vlan_name 32> − The name of the VLAN on which the MAC
address resides.
<macaddr>− The MAC address that is present in the forwarding
database table.
static − Displays the static MAC address entries.
aging_time − Displays the aging time for the MAC address
------------ --------------- ------ -----------System 10.0.0.1 1:13 Dynamic
System 10.0.0.2 1:13 Dynamic
System 10.0.0.3 1:13 Dynamic
System 10.0.0.4 1:13 Dynamic
System 10.0.0.7 1:13 Dynamic
System 10.0.0.30 1:13 Dynamic
System 10.0.34.1 1:13 Dynamic
System 10.0.51.1 1:13 Dynamic
System 10.0.58.4 1:13 Dynamic
System 10.0.85.168 1:13 Dynamic
System 10.1.1.1 1:13 Dynamic
System 10.1.1.99 1:13 Dynamic
System 10.1.1.101 1:13 Dynamic
System 10.1.1.102 1:13 Dynamic
System 10.1.1.103 1:13 Dynamic
System 10.1.1.152 1:13 Dynamic
System 10.1.1.157 1:13 Dynamic
System 10.1.1.161 1:13 Dynamic
System 10.1.1.162 1:13 Dynamic
System 10.1.1.163 1:13 Dynamic
CTRL+C ESC q Quit SPACE n Next Page ENTER Next Entry a All
On a computer network, packets such as Multicast packets and Broadcast packets continually flood the network as normal
procedure. At times, this traffic may increase do to a malicious endstation on the network or a malfunctioning device, such as a
faulty network card. Thus, switch throughput problems will arise and consequently affect the overall performance of the switch
network. To help rectify this packet storm, the Switch implements two methods to monitor and control the situation.
1. Hardware: The packet storm is monitored using the Switch’s hardware to determine if too many packets are
flooding the network, based on the threshold level provided by the user. Once a packet storm has been detected, the
Switch will drop packets coming into the Switch until the storm has subsided. This method can be utilized by
selecting the drop option of the Action field in the config traffic control command below.
2. Software: The device’s software will scan and monitor packets coming into the Switch by monitoring the Switch’s
chip counter. This method is only viable for Broadcast and Multicast storms because the chip only has counters for
these two types of packets. Once a storm has been detected (that is, once the packet threshold set below has been
exceeded), the Switch will shutdown the port to all incoming traffic with the exception of STP BPDU packets for a
time period, specified using the countdown field. If this field times out and the packet storm continues, the port will
be placed in a Shutdown Forever mode which will produce a warning message to be sent to the Trap Receiver. Once
in Shutdown Forever mode, the only method of recovering this port is to manually recoup it using the config traffic control_recover setting seen in the command list below. To utilize the Software method of Storm Control, choose
the shutdown option of the action field in the config traffic control command below.
The broadcast storm control commands in the Command Line Interface (CLI) are listed (along with the appropriate parameters)
in the following table.