Enterasys Networks reserves the right to make changes in specifications and other information contained in this document and
its web site without prior notice. The reader should in all cases consult Enterasys Networks to determine whether any such
changes have been made.
The hardware, firmware, or software described in this document is subject to change without notice.
IN NO EVENT SHALL ENTERASYS NETWORKS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, OR
CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING OUT OF
OR RELATED TO THIS DOCUMENT, WEB SITE, OR THE INFORMATION CONTAINED IN THEM, EVEN IF ENTERASYS
NETWORKS HAS BEEN ADVISED OF, KNEW OF, OR SHOULD HAVE KNOWN OF, THE POSSIBILITY OF SUCH
DAMAGES.
Enterasys Networks, Inc.
50 Minuteman Road
Andover, MA 01810
2012 Enterasys Networks, Inc. All rights reserved.
Part Number: 9034313-12 July 2012
ENTERASYS, ENTERASYS NETWORKS, ENTERASYS SECURE NETWORKS, ENTERASYS NETSIGHT, WEBVIEW, and any
logos associated therewith, are trademarks or registered trademarks of Enterasys Networks, Inc. in the United States and other
countries. For a complete list of Enterasys trademarks, see http://www.enterasys.com/company/trademarks.aspx.
All other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies.
Version:Information in this guide refers to Ente rasys C3 firmware ver sion 6.61.xx.xxxx or
higher.
i
Enterasys Networks, Inc. Firmware License Agreement
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT,
CAREFULLY READ THIS LICENSE AGREEMENT.
This document is an agreement (“Agreement”) between the end user (“You”) and Enterasys Networks, Inc., on behalf of itself
and its Affiliates (as hereinafter defined) (“Enterasys”) that sets forth Your rights and obligations with respect to the Enterasys
software program/firmware (including any accompanying documentation, hardware or media) (“Program”) in the package
and prevails over any additional, conflicting or inconsistent terms and conditions appearing on any purchase order or other
document submitted by You. “Affiliate” means any person, partnership, corporation, limited liability company, other form of
enterprise that directly or indirectly through one or more intermediaries, controls, or is controlled by, or is under common
control with the party specified. This Agreement constitutes the entire understanding between the parties, with respect to the
subject matter of this Agreement. The Program may be contained in firmware, chips or other media.
BY INSTALLING OR OTHERWISE USING THE PROGRAM, YOU REPRESENT THAT YOU ARE AUTHORIZED TO ACCEPT
THESE TERMS ON BEHALF OF THE END USER (IF THE END USER IS AN ENTITY ON WHOSE BEHALF YOU ARE
AUTHORIZED TO ACT, “YOU” AND “YOUR” SHALL BE DEEMED TO REFER TO SUCH ENTITY) AND THAT YOU
AGREE THAT YOU ARE BOUND BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES, AMONG OTHER
PROVISIONS, THE LICENSE, THE DISCLAIMER OF WARRANTY AND THE LIMITATION OF LIABILITY. IF YOU DO NOT
AGREE TO THE TERMS OF THIS AGREEMENT OR ARE NOT AUTHORIZED TO ENTER INTO THIS AGREEMENT,
ENTERASYS IS UNWILLING TO LICENSE THE PROGRAM TO YOU AND YOU AGREE TO RETURN THE UNOPENED
PRODUCT TO ENTERASYS OR YOUR DEALER, IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE OF RECEIPT
FOR A FULL REFUND.
IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT ENTERASYS NETWORKS, LEGAL
DEPARTMENT AT (978) 684-1000.
You and Enterasys agree as follows:
1.LICENSE. You have the non-exclusive and non-transferable right to use only the one (1) copy of the Program provided in
this package subject to the terms and conditions of this Agreement.
2.RESTRICTIONS. Except as otherwise authorized in writing by Enterasys, You may not, nor may You permit any third
party to:
(a) Reverse engineer, decompile, disassemble or modify the Program, in whole or in part, including for reasons of error
correction or interoperability, except to the extent expressly permitted by applicable law and to the extent the parties
shall not be permitted by that applicable law, such rights are expressly excluded. Information necessary to achieve
interoperability or correct errors is available from Enterasys upon request and upon payment of Enterasys’ applicable
fee.
(b) Incorporate the Program in whole or in part, in any other product or create derivative works based on the Program, in
whole or in part.
(c) Publish, disclose, copy reproduce or transmit the Program, in whole or in part.
(d) Assign, sell, license, sublicense, rent, lease, encumber by way of security interest, pledge or otherwise transfer the
Program, in whole or in part.
(e) Remove any copyright, trademark, proprietary rights, disclaimer or warning notice included on or embedded in any
part of the Program.
3.APPLICABLE LAW. This Agreement shall be interpreted and governed under the laws and in the state and federal courts
of the Commonwealth of Massachusetts without regard to its conflicts of laws provisions. You accept the personal jurisdiction
and venue of the Commonwealth of Massachusetts courts. None of the 1980 United Nations Convention on the Limitation Period
in the International Sale of Goods, and the Uniform Computer Information Transactions Act shall apply to this Agreement.
4.EXPORT RESTRICTIONS. You understand that Enterasys and its Affiliates are subject to regulation by agencies of the
U.S. Government, including the U.S. Department of Commerce, which prohibit export or diversion of certain technical products
to certain countries, unless a license to export the product is obtained from the U.S. Government or an exception from obtaining
such license may be relied upon by the exporting party.
If the Program is exported from the United States pursuant to the License Exception CIV under the U.S. Export
Administration Regulations, You agree that You are a civil end user of the Program and agree that You will use the Program for
civil end uses only and not for military purposes.
If the Program is exported from the United States pursuant to the License Exception TSR under the U.S. Export
Administration Regulations, in addition to the restriction on transfer set forth in Section 1 or 2 of this Agreement, You agree not
to (i) reexport or release the Program, the source code for the Program or technology to a national of a country in Country
Groups D:1 or E:2 (Albania, Armenia, Azerbaijan, Belarus, Cambodia, Cuba, Georgia, Iraq, Kazakhstan, Laos, Libya, Macau,
ii
Moldova, Mongolia, North Korea, the People’s Republic of China, Russia, Tajikistan, Turkmenistan, Ukraine, Uzbekistan,
Vietnam, or such other countries as may be designated by the United States Government), (ii) export to Country Groups D:1 or
E:2 (as defined herein) the direct product of the Program or the technology, if such foreign produced direct product is subject to
national security controls as identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a
complete plant or any major component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a
major component thereof, if such foreign produced direct product is subject to national security controls as identified on the
U.S. Commerce Control List or is subject to State Department controls under the U.S. Munitions List.
5.UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Program (i) was developed solely at private
expense; (ii) contains “restricted computer software” submitted with restricted rights in accordance with section 52.227-19 (a)
through (d) of the Commercial Computer Software-Restricted Rights Clause and its successors, and (iii) in all respects is
proprietary data belonging to Enterasys and/or its suppliers. For Department of Defense units, the Program is considered
commercial computer software in accordance with DFARS section 227.7202-3 and its successors, and use, duplication, or
disclosure by the U.S. Government is subject to restrictions set forth herein.
6.DISCLAIMER OF WARRANTY. EXCEPT FOR THOSE WARRANTIES EXPRESSLY PROVIDED TO YOU IN WRITING
BY ENTERASYS, ENTERASYS DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR
PURPOSE, TITLE AND NON-INFRINGEMENT WITH RESPECT TO THE PROGRAM. IF IMPLIED WARRANTIES MAY NOT
BE DISCLAIMED BY APPLICABLE LAW, THEN ANY IMPLIED WARRANTIES ARE LIMITED IN DURATION TO THIRTY
(30) DAYS AFTER DELIVERY OF THE PROGRAM TO YOU.
7.LIMITATION OF LIABILITY. IN NO EVENT SHALL ENTERASYS OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS,
BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR
RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM, EVEN IF
ENTERASYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS FOREGOING LIMITATION SHALL
APPLY REGARDLESS OF THE CAUSE OF ACTION UNDER WHICH DAMAGES ARE SOUGHT.
THE CUMULATIVE LIABILITY OF ENTERASYS TO YOU FOR ALL CLAIMS RELATING TO THE PROGRAM, IN
CONTRACT, TORT OR OTHERWISE, SHALL NOT EXCEED THE TOTAL AMOUNT OF FEES PAID TO ENTERASYS BY
YOU FOR THE RIGHTS GRANTED HEREIN.
8.AUDIT RIGHTS. You hereby acknowledge that the intellectual property rights associated with the Program are of critical
value to Enterasys, and, accordingly, You hereby agree to maintain complete books, records and accounts showing (i) license
fees due and paid, and (ii) the use, copying and deployment of the Program. You also grant to Enterasys and its authorized
representatives, upon reasonable notice, the right to audit and examine during Your normal business hours, Your books, records,
accounts and hardware devices upon which the Program may be deployed to verify compliance with this Agreement, including
the verification of the license fees due and paid Enterasys and the use, copying and deployment of the Program. Enterasys’ right
of examination shall be exercised reasonably, in good faith and in a manner calculated to not unreasonably interfere with Your
business. In the event such audit discovers non-compliance with this Agreement, including copies of the Program made, used
or deployed in breach of this Agreement, You shall promptly pay to Enterasys the appropriate license fees. Enterasys reserves
the right, to be exercised in its sole discretion and without prior notice, to terminate this license, effective immediately, f
or failure
to comply with this Agreement. Upon any such termination, You shall immediately cease all use of the Program and shall return
to Enterasys the Program and all copies of the Program.
9.OWNERSHIP. This is a license agreement and not an agreement for sale. You acknowledge and agree that the Program
constitutes trade secrets and/or copyrighted material of Enterasys and/or its suppliers. You agree to implement reasonable
security measures to protect such trade secrets and copyrighted material. All right, title and interest in and to the Program shall
remain with Enterasys and/or its suppliers. All rights not specifically granted to You shall be reserved to Enterasys.
10. ENFORCEMENT. You acknowledge and agree that any breach of Sections 2, 4, or 9 of this Agreement by You may cause
Enterasys irreparable damage for which recovery of money damages would be inadequate, and that Enterasys may be entitled
to seek timely injunctive relief to protect Enterasys’ rights under this Agreement in addition to any and all remedies available at
law.
11. ASSIGNMENT. You may not assign, transfer or sublicense this Agreement or any of Your rights or obligations under this
Agreement, except that You may assign this Agreement to any person or entity which acquires substantially all of Your stock
assets. Enterasys may assign this Agreement in its sole discretion. This Agreement shall be binding upon and inure to the benefit
of the parties, their legal representatives, permitted transferees, successors and assigns as permitted by this Agreement. Any
attempted assignment, transfer or sublicense in violation of the terms of this Agreement shall be void and a breach of this
Agreement.
12. WAIVER. A waiver by Enterasys of a breach of any of the terms and conditions of this Agreement must be in writing and
will not be construed as a waiver of any subsequent breach of such term or condition. Enterasys’ failure to enforce a term upon
Your breach of such term shall not be construed as a waiver of Your breach or prevent enforcement on any other occasion.
iii
13. SEVERABILITY. In the event any provision of this Agreement is found to be invalid, illegal or unenforceable, the validity,
legality and enforceability of any of the remaining provisions shall not in any way be affected or impaired thereby, and that
provision shall be reformed, construed and enforced to the maximum extent permissible. Any such invalidity, illegality, or
unenforceability in any jurisdiction shall not invalidate or render illegal or unenforceable such provision in any other
jurisdiction.
14. TERMINATION. Enterasys may terminate this Agreement immediately upon Your breach of any of the terms and
conditions of this Agreement. Upon any such termination, You shall immediately cease all use of the Program and shall return
to Enterasys the Program and all copies of the Program.
iv
Contents
About This Guide
Using This Guide ..........................................................................................................................................xxxv
Structure of This Guide ................................................................................................................................. xxxv
Related Documents .....................................................................................................................................xxxvii
Conventions Used in This Guide ................................................................................................................xxxviii
Getting Help ................................................................................................................................................. xxxix
Using the Command Line Interface ................................................................................................................ 1-6
Starting a CLI Session .............................................................................................................................1-6
Logging In ................................................................................................................................................1-7
Navigating the Command Line Interface ..................................................................................................1-8
Chapter 2: Configuring Switches in a Stack
About Enterasys C3 Switch Operation in a Stack ..........................................................................................2-1
Installing a New Stackable System of Up to Eight Units ................................................................................2-2
Installing Previously-Configured Systems in a Stack ..................................................................................... 2-3
Adding a New Unit to an Existing Stack ......................................................................................................... 2-3
Creating a Virtual Switch Configuration .......................................................................................................... 2-3
Considerations About Using Clear Config in a Stack ......................................... .... ... ... ... .... ... ........................2-4
Issues Related to Mixed Type Stacks ............................................................................................................2-4
Feature Support ...................................................................................................................................... 2-4
show switch ........................................................................................................................................2-5
show switch switchtype ......................................................................................................................2-7
show switch stack-ports......................................................................................................................2-8
set switch............................................................................................................................................2-8
set switch copy-fw ..............................................................................................................................2-9
set switch description .......................................................................................................................2-10
set switch movemanagement...........................................................................................................2-10
set switch member............................................................................................................................2-11
show ip address..................................................................................................................................3-3
set ip address.....................................................................................................................................3-4
clear ip address..................................................................................................................................3-5
v
show ip protocol..................................................................................................................................3-5
set ip protocol.....................................................................................................................................3-6
show ip route ......................................................................................................................................3-6
show system.......................................................................................................................................3-7
show system hardware.......................................................................................................................3-8
show system utilization.......................................................................................................................3-9
set system utilization ........................................................................................................................3-10
clear system utilization .....................................................................................................................3-11
show system enhancedbuffermode..................................................................................................3-11
set system enhancedbuffermode .....................................................................................................3-12
set system temperature....................................................................................................................3-12
clear system temperature.................................................................................................................3-13
show time .........................................................................................................................................3-14
set time.............................................................................................................................................3-14
show summertime ............................................................................................................................3-15
set summertime................................................................................................................................3-16
set summertime date........................................................................................................................3-16
set summertime recurring.................................................................................................................3-17
set prompt.........................................................................................................................................3-18
show banner.....................................................................................................................................3-19
set banner.........................................................................................................................................3-19
show version.....................................................................................................................................3-21
set system name ..............................................................................................................................3-22
set system location...........................................................................................................................3-22
set system contact............................................................................................................................3-23
set width ...........................................................................................................................................3-23
set length..........................................................................................................................................3-24
show logout ......................................................................................................................................3-24
set logout .........................................................................................................................................3-25
show console....................................................................................................................................3-25
set console baud ..............................................................................................................................3-26
set console vt100..............................................................................................................................3-26
Downloading a Firmware Image ................................................................................................................... 3-27
Downloading from a TFTP or SFTP Server ...........................................................................................3-28
Downloading via the Serial Port .............................................................................................................3-28
Reverting to a Previous Image ............................................................................................................... 3-30
Reviewing and Selecting a Boot Firmware Image ........................................................................................ 3-31
show boot system.............................................................................................................................3-31
set boot system ................................................................................................................................3-31
Starting and Configuring Telnet ....................................................................................................................3-32
show telnet .......................................................................................................................................3-33
set telnet...........................................................................................................................................3-33
show snmp persistmode...................................................................................................................3-35
set snmp persistmode ......................................................................................................................3-36
save config .......................................................................................................................................3-37
show file............................................................................................................................................3-38
show config.......................................................................................................................................3-39
set tftp retry.......................................................................................................................................3-44
Clearing and Closing the CLI ........................................................................................................................3-45
show reset ........................................................................................................................................3-49
show webview ..................................................................................................................................3-51
set webview......................................................................................................................................3-51
show ssl............................................................................................................................................3-52
set ssl ...............................................................................................................................................3-52
show system hostprotect..................................................................................................................3-54
set system hostprotect......................................................................................................................3-55
clear system hostprotect...................................................................................................................3-55
Chapter 4: Activating Licensed Features
License Key Field Descriptions ......................................................................................................................4-1
Licensing Procedure in a Stack Environment .................. .................................................... ...........................4-1
Adding a New Member to a Licensed Stack ............................................................................................4-2
Clearing, Showing, and Applying Licenses ....................................................................................................4-2
set license...........................................................................................................................................4-3
show license.......................................................................................................................................4-4
User Account and Password Management ....................................................................................................5-1
Features ....................................... ................................................................ ............................................5-1
About the Security Mode ................................................................................................................................ 7-1
Additional Security Feature Information ......................................................................................................... 7-2
show cdp ..........................................................................................................................................10-2
set cdp state .....................................................................................................................................10-3
set cdp auth......................................................................................................................................10-4
viii
set cdp interval .................................................................................................................................10-4
set cdp hold-time ..............................................................................................................................10-5
show lldp.........................................................................................................................................10-15
show lldp port status.......................................................................................................................10-15
show lldp port trap ..........................................................................................................................10-16
show lldp port tx-tlv.........................................................................................................................10-17
show lldp port location-info.............................................................................................................10-17
show lldp port local-info..................................................................................................................10-18
show lldp port remote-info ..............................................................................................................10-21
show lldp port network-policy .........................................................................................................10-22
set lldp tx-interval............................................................................................................................10-23
set lldp hold-multiplier.....................................................................................................................10-24
set lldp trap-interval ........................................................................................................................10-24
set lldp med-fast-repeat..................................................................................................................10-25
set lldp port status ..........................................................................................................................10-25
set lldp port trap..............................................................................................................................10-26
set lldp port med-trap......................................................................................................................10-26
set lldp port location-info.................................................................................................................10-27
set lldp port tx-tlv ............................................................................................................................10-28
set lldp port network-policy.............................................................................................................10-29
Port String Syntax Used in the CLI ........................................ ... ... .... ... ... ................................................11-1
Reviewing Port Status .................................................................................................................................. 11-2
show port..........................................................................................................................................11-2
show port status ...............................................................................................................................11-3
show port counters ...........................................................................................................................11-4
clear port counters............................................................................................................................11-5
show port cablestatus.......................................................................................................................11-6
ix
Disabling / Enabling and Naming Ports ........................................................................................................ 11-7
set port disable .................................................................................................................................11-7
set port enable..................................................................................................................................11-8
show port alias..................................................................................................................................11-8
set port alias.....................................................................................................................................11-9
Setting Speed and Duplex Mode ................................................................................................................ 11-10
show port trap.................................................................................................................................11-23
set port trap ....................................................................................................................................11-24
show linkflap...................................................................................................................................11-24
set linkflap globalstate ....................................................................................................................11-27
set linkflap portstate........................................................................................................................11-27
set linkflap interval..........................................................................................................................11-28
set linkflap action............................................................................................................................11-28
show port broadcast .......................................................................................................................11-34
x
set port broadcast...........................................................................................................................11-35
clear port broadcast........................................................................................................................11-35
Port Mirroring ................................... ... .......................................... ..............................................................11-37
Mirroring Features ................................................................................................................................11-37
Remote Port Mirroring ..........................................................................................................................11-37
Configuring SMON MIB Port Mirroring ................................................................................................. 11-38
show lacp........................................................................................................................................11-47
set lacp...........................................................................................................................................11-49
set lacp asyspri...............................................................................................................................11-49
set lacp aadminkey.........................................................................................................................11-50
Creating a Basic SNMP Trap Configuration ...............................................................................................12-35
Example ...............................................................................................................................................12-36
Configuring the SNMP Management Interface ........................................................................................... 12-37
show vlan..........................................................................................................................................14-3
Creating and Naming Static VLANs ............................................................................................................. 14-5
set vlan .............................................................................................................................................14-5
set vlan name ...................................................................................................................................14-6
show port vlan ..................................................................................................................................14-8
set port vlan......................................................................................................................................14-9
clear port vlan...................................................................................................................................14-9
show port ingress-filter ...................................................................................................................14-10
set port ingress-filter.......................................................................................................................14-11
show port discard ...........................................................................................................................14-11
set port discard...............................................................................................................................14-12
Configuring the VLAN Egress List ..............................................................................................................14-13
show gvrp .......................................................................................................................................14-22
show garp timer..............................................................................................................................14-22
set gvrp...........................................................................................................................................14-23
set cos state ...................................................................................................................................15-21
show cos state................................................................................................................................15-22
clear cos state ................................................................................................................................15-22
set cos settings...............................................................................................................................15-23
clear cos settings............................................................................................................................15-24
show cos settings ...........................................................................................................................15-24
set cos port-config ...................................................................................................................... ....15-25
show cos port-config.......................................................................................................................15-26
clear cos port-config .......................................................................................................................15-27
set cos port-resource irl..................................................................................................................15-28
set cos port-resource flood-ctrl.......................................................................................................15-29
show cos port-resource ..................................................................................................................15-30
clear cos port-resource irl...............................................................................................................15-31
clear cos port-resource flood-ctrl....................................................................................................15-32
set cos reference............................................................................................................................15-32
show cos reference ........................................................................................................................15-33
clear cos reference.........................................................................................................................15-34
show cos unit..................................................................................................................................15-35
clear cos all-entries.........................................................................................................................15-36
show cos port-type .........................................................................................................................15-36
Chapter 16: Port Priority Configuration
Port Priority Configuration Summary ............................................................................................................ 16-1
Configuring Port Priority ............................................................................................................................... 16-2
show port priority ..............................................................................................................................16-2
set port priority..................................................................................................................................16-3
clear port priority...............................................................................................................................16-3
show port txq ....................................................................................................................................16-7
set port txq........................................................................................................................................16-8
clear port txq.....................................................................................................................................16-9
About IP Multicast Group Management .................................................................................................17-1
About Multicasting ..................................................................................................................................17-2
Configuring IGMP at Layer 2 ........................................................................................................................ 17-2
show history......................................................................................................................................18-2
set history.........................................................................................................................................18-3
show arp...........................................................................................................................................18-7
set arp...............................................................................................................................................18-8
About SNTP Authentication ..........................................................................................................................20-1
show sntp .........................................................................................................................................20-2
set sntp client....................................................................................................................................20-4
History Group Commands ............................................................................................................................21-6
Alarm Group Commands ..............................................................................................................................21-9
Filter Group Commands ............................................................................................................................. 21-16
DHCP Server ......................................................................................................................................... 22-1
Configuring a DHCP Server ................................................................................................................... 22-2
Configuring General DHCP Server Parameters ........................................................................................... 22-3
set dhcp............................................................................................................................................22-4
set dhcp bootp..................................................................................................................................22-4
set dhcp conflict logging ...................................................................................................................22-5
show dhcp conflict ............................................................................................................................22-5
Configuring IP Address Pools .....................................................................................................................22-12
Manual Pool Configuration Considerations ..........................................................................................22-12
Example .................................................................................................................................................24-2
no shutdown .....................................................................................................................................25-6
no ip routing......................................................................................................................................25-6
show running-config .........................................................................................................................25-7
OSPF Configuration Task List and Commands ..................................................................................... 27-2
router id ............................................................................................................................................27-3
area range......................................................................................................................................27-12
area stub.........................................................................................................................................27-13
area default-cost.............................................................................................................................27-14
area nssa........................................................................................................................................27-14
area virtual-link ...............................................................................................................................27-15
show ipv6 status...............................................................................................................................28-1
set ipv6.............................................................................................................................................28-2
set ipv6 address ...............................................................................................................................28-3
show ipv6 address............................................................................................................................28-4
area default-cost.............................................................................................................................31-11
area nssa........................................................................................................................................31-11
area nssa default-info-originate......................................................................................................31-12
area nssa no-redistribute................................................................................................................31-13
area nssa no-summary...................................................................................................................31-13
area nssa translator role.................................................................................................................31-14
area nssa translator-stab-intv.........................................................................................................31-15
area range......................................................................................................................................31-15
area stub.........................................................................................................................................31-16
area stub no-summary....................................................................................................................31-17
area virtual-link ...............................................................................................................................31-18
area virtual-link dead-interval .........................................................................................................31-18
area virtual-link hello-interval..........................................................................................................31-19
area virtual-link retransmit-interval .................................................................................................31-20
area virtual-link transmit-delay........................................................................................................31-20
show radius ......................................................................................................................................32-6
set radius..........................................................................................................................................32-8
set radius ipsec...............................................................................................................................32-10
show dot1x .....................................................................................................................................32-19
show dot1x auth-config...................................................................................................................32-21
set dot1x.........................................................................................................................................32-22
set dot1x auth-config ......................................................................................................................32-23
show eapol .....................................................................................................................................32-25
set eapol.........................................................................................................................................32-27
Configuring MAC Locking ...........................................................................................................................32-61
Configuring Port Web Authentication (PWA) .............................................................................................. 32-77
About PWA ........................................................................................................................................... 32-77
show pwa........................................................................................................................................32-78
set pwa...........................................................................................................................................32-79
show pwa banner ...........................................................................................................................32-80
set pwa banner...............................................................................................................................32-80
show ssh status..............................................................................................................................32-89
set ssh ............................................................................................................................................32-89
set ssh hostkey...............................................................................................................................32-90
Chapter 33: Configuring IPsec
About IPsec ..................................................................................................................................................33-1
show ipsec........................................................................................................................................33-2
set ipsec authentication....................................................................................................................33-3
set ipsec encryption..........................................................................................................................33-3
set ipsec ike dh-group ......................................................................................................................33-4
set ipsec ike lifetime .........................................................................................................................33-5
set ipsec ike phase1.........................................................................................................................33-5
set ipsec ike version .........................................................................................................................33-6
Chapter 34: Configuring Access Control Lists
About Access Control Lists .................... ... .......................................... .... ......................................................34-1
IPv6 and MAC ACL Considerations .......................................................................................................34-1
set system service-acl ......................................................................................................................35-2
show system service-acl...................................................................................................................35-4
clear system service-acl ...................................................................................................................35-4
set system service-class...................................................................................................................35-5
show system service-class...............................................................................................................35-5
clear system service-class................................................................................................................35-6
Chapter 36: TACACS+ Configuration
show tacacs......................................................................................................................................36-2
set tacacs .........................................................................................................................................36-3
show tacacs server...........................................................................................................................36-3
set tacacs server ..............................................................................................................................36-4
clear tacacs server ...........................................................................................................................36-5
show tacacs session.........................................................................................................................36-6
set tacacs session ............................................................................................................................36-7
Welcome to the Enterasys® C3 CLI Reference. This manual explains how to access the device’s
Command Line Interface (CLI) and how to use it to configure Enterasys C3 switch devices.
Depending on the firmware version used in your C3 device, some features described in this
document may not be supported. Refer to the Release Notes for your device to determine which
features are supported.
Using This Guide
A general working knowledge of basic network operations and an understanding of CLI
management applications is helpful before configuring the device.
This manual describes how to do the following:
•Access the swtitch CLI.
•Use CLI commands to perform network management and device configuration operations
•Establish and manage Virtual Local Area Networks (VLANs).
About This Guide
Important Notice
•Establish and manage static and dynamically-assigned policy classifications.
•Establish and manage priority classification.
•Configure IP routing and routing protocols, including RIP versions 1 and 2, OSPF, DVMRP,
IRDP, and VRRP.
•Configure IPv6 routing, including OSPFv3.
•Configure security protocols, including 802.1X and RADIUS, SSHv2, PWA, MAC locking, and
MAC authentication.
•Configure access control lists (ACLs).
Structure of This Guide
The guide is organized as follows:
Chapter 1, Introduction, provides an overview of the tasks that can be accomplished using the
CLI interface, an overview of local management requirements, an overview of the device’s factory
default settings, and information about using the Command Line Interface (CLI).
Chapter 2, Configuring Switches in a Stack, provides information about how to configure and
manage stacked switches.
Chapter 3, Basic Configuration, provides how to set basic system properties, how to download a
firmware image, how to configure WebView and Telnet, how to manage configuration files, how
to set the login password, and how to exit the CLI.
Chapter 4, Activating Licensed Features, describes the commands used to enable advanced
routing and IPv6 routing licensed features.
Enterasys C3 Configuration Guide xxxv
Structure of This Guide
Chapter 5, Setting User Accounts and Passwords, describes user account and password
information for the management authentication notification MIB set of commands. Management
authentication notification MIB functionality includes enabling/disabling the sending of SNMP
notifications when a user login authentication event occurs for various authentication notification
types.
Chapter 7, Setting the Security Mode, describes how to configure the switch security mode.
Chapter 8, Configuring System Power and PoE, describes the commands used to review and set
system power and PoE parameters on devices that offer Power over Ethernet.
Chapter 9, Transmit Queue Monitoring Configuration, describes the commands used to monitor
transmit queues and, if a queue is found to be stalled, to take corrective action.
Chapter 10, Discovery Protocol Configuration provides how to configure discovery protocols
supported by the device.
Chapter 11, Port Configuration, describes how to review and configure console port settings, and
how to enable or disable switch ports and configure switch port settings, including port speed,
duplex mode, auto-negotiation, flow control, port mirroring, link aggegation and broadcast
suppression.
Chapter 12, SNMP Configuration, describes how to configure SNMP users and user groups,
access rights, target addresses, and notification parameters.
Chapter 13, Spanning Tree Configuration, describes how to review and set Spanning Tree bridge
parameters for the device, including bridge priority, hello time, maximum aging time and forward
delay; and how to review and set Spanning Tree port parameters, including port priority and path
costs. Configuring the SpanGuard and Loop Protect functions is also described.
Chapter 14, 802.1Q VLAN Configuration, describes how to create static VLANs, select the mode
of operation for each port, establish VLAN forwarding (egress) lists, route frames according to
VLAN ID, display the current ports and port types associated with a VLAN and protocol, create a
secure management VLAN, and configure ports on the device as GVRP-aware ports.
Chapter 15, Policy Classification Configuration, describes how to create, change or remove user
roles or profiles based on business-specific use of network services; how to permit or deny access
to specific services by creating and assigning classification rules which map user profiles to frame
filtering policies; how to classify frames to a VLAN or Class of Service (CoS); and how to assign or
unassign ports to policy profiles so that only ports activated for a profile will be allowed to
transmit frames accordingly.
Chapter 16, Port Priority Configuration, describes how to set the transmit priority of each port
and configure a rate limit for a given port and list of priorities.
Chapter 17, IGMP Configuration, describes how to configure Internet Group Management
Protocol (IGMP) settings for multicast filtering.
Chapter 18, Network Management, describes how to manage general switch settings, how to
monitor network events and status,and how to configure node aliases.
Chapter 19, Configuring System Logging, describes how to display and configure system
logging, including Syslog server settings, Syslog default settings, and the logging buffer. This
chapter also includes information about security audit logging.
Chapter 20, Configuring SNTP, describes how to use CLI commands to configure the Simple
Network Time Protocol (SNTP), which synchronizes device clocks in a network. Also included are
SNTP authentication commands.
Chapter 21, RMON Configuration, describes how to use RMON (Remote Network Monitoring),
which provides comprehensive network fault diagnosis, planning, and performance tuning
xxxvi About This Guide
Related Documents
information and allows for interoperability between SNMP management stations and monitoring
agents.
Chapter 22, DHCP Server Configuration, describes how to review and configure DHCP server
parameters, how to review and configure DHCP address pools, and how to display DHCP server
information.
Chapter 23, DHCP Snooping and Dynamic ARP Inspection, describes two security features:
DHCP snooping, which monitors DHCP messages between a DHCP client and DHCP server to
filter harmful DHCP messages and to build a database of authorized address bindings, and
Dynamic ARP inspection, which uses the bindings database created by the DHCP snooping
feature to reject invalid and malicious ARP packets.
Chapter 24, Preparing for Router Mode, provides information about router modes.
Chapter 25, IP Configuration, describes how to enable IP routing for router mode operation, how
to configure IP interface settings, how to review and configure the routing ARP table, how to
review and configure routing broadcasts, how to configure PIM, and how to configure IP routes.
Chapter 26, IPv4 Basic Routing Protocol Configuration, describes how to configure basic IPv4
routing protocols, including RIP and IRDP.
Chapter 27, IPv4 Advanced Routing Protocol Configuration, describes how to configure
advanced IPv4 routing protocols, including OSPF, DVMRP, VRRP, and PIM-SM. To use these
protocols, you must purchase and install an advanced routing license.
Chapter 28, IPv6 Management, describes the commands used to configure IPv6 at the switch
level.
Chapter 29, IPv6 Configuration, describes the commands used to configure IPv6 at the routing
level. To configure IPv6 at the routing level, you must purchase and install an IPv6 license.
Chapter 30, DHCPv6 Configuration, describes the commands used to configure the Dynamic
Host Configuration Protocol for IPv6. To configure DHCPv6, you must purchase and install an
IPv6 license.
Chapter 31, OSPFv3 Configuration, describes the commands used to configure the Open Shortest
Path First routing protocol for IPv6. To configure OSPFv3, you must purchase and install an IPv6
license.
Chapter 32, Authentication and Authorization Configuration, describes how to configure 802.1X
authentication using EAPOL, how to configure RADIUS server, Secure Shell server, MAC
authentication, MAC locking, and Port Web Authentication.
Chapter 33, Configuring IPsec, describes how to configure IPsec (IP Security) as specified in RFC
4301.
Chapter 34, Configuring Access Control Lists, describes how to configure and apply router mode
Access Control Lists (ACLs).
Chapter 35, Configuring Service Access Control Lists, describes how to configure and apply
switch mode Service Access Control Lists (ACLs).
Chapter 36
configure and monitor TACACS+ (Terminal Access Controller Access-Control System Plus).
, TACACS+ Configuration, provides information about the commands used to
Chapter 37, sFlow Configuration, provides information about the commands used to configure
and monitor the sFlow system.
Related Documents
The following Enterasys Networks documents may help you to set up, control, and manage the
device:
Enterasys C3 Configuration Guide xxxvii
Conventions Used in This Guide
•Enterasys Firmware Feature Guides
•Enterasys C3 Installation Guide
•Redundant Power Supply Quick References
Documents listed above can be obtained from the World Wide Web in Adobe Acrobat Portable
Document Format (PDF) at the following web site:
https://extranet.enterasys.com/downloads/
Conventions Used in This Guide
The following conventions are used in the text of this document:
ConventionDescription
Bold fontIndicates mandatory keywords, parameters or keyboard keys.
italic fontIndicates complete document titles.
Courier fontUsed for examples of information displayed on the screen.
Courier font in italicsIndicates a user-supplied value, either required or optional.
[ ]Square brackets indicate an optional value.
{ }Braces indicate required values. One or more values may be required.
|A vertical bar indicates a choice in values.
[x | y | z]Square brackets with a vertical bar indicate a choice of a value.
{x | y | z} Braces with a vertical bar indicate a choice of a required value.
[x {y | z} ]A combina tio n of square brackets with braces and vertical bars indicates a
required choice of an optional value.
The following icons are used in this guide:
Note: Calls the reader’s attention to any item of information that may be of special importance.
Router: Calls the reader’s attention to router-specific commands and information.
Caution: Contains information essential to avoid damage to the equipment.
xxxviii About This Guide
Getting Help
For additional support related to this switch or document, contact Enterasys Networks using one
of the following methods:
World Wide Webhttp://www.enterasys.com/support
Phone1-800-872-8440 (toll-free in U.S. and Canada)
Internet mailsupport@enterasys.com
Before calling Enterasys Networks, have the following information ready:
•Your Enterasys Networks service contract number
•A description of the failure
•A description of any action(s) already taken to resolve the problem (for example, changing
•The serial and revision numbers of all involved Enterasys Networks products in the network
Getting Help
or 1-978-684-1000
For the Enterasys Networks Support toll-free number in your country:
http://www.enterasys.com/support/contact/
To expedite your message, type [C-SERIES] in the subject line.
mode switches or rebooting the unit)
•A description of your network environment (for example, layout, cable type)
•Network load and frame size at the time of trouble (if known)
•The switch history (for example, have you returned the switch before, is this a recurring
problem?)
•Any previous Return Material Authorization (RMA) numbers
Enterasys C3 Configuration Guide xxxix
Getting Help
xl About This Guide
This chapter provides an overview of the Enterasys C3’s unique features and functionality, an
overview of the tasks that may be accomplished using the CLI interface, an overview of ways to
manage the switch, factory default settings, and information about how to use the Command Line
Interface to configure the switch.
For information about...Refer to page...
Enterasys C3 CLI Overview1-1
Switch Management Methods1-1
Factory Default Settings1-2
Using the Command Line Interface1-6
Enterasys C3 CLI Overview
1
Introduction
The Enterasys Networks Enterasys C3 CLI interface allows you to perform a variety of network
management tasks, including the following:
•Use CLI commands to perform network management and switch configuration operations.
•Download a new firmware image.
•Assign IP address and subnet mask.
•Select a default gateway.
•Establish and manage Virtual Local Area Networks (VLANs).
•Establish and manage policy profiles and classifications.
•Establish and manage priority classification.
•Configure IPv4 routing and routing protocols.
•Configure IPv6 routing and routing protocols, including OSPFv3.
•Configure security protocols, including 802.1X and RADIUS, SSHv2, PWA, MAC locking, and
MAC authentication.
•Configure access control lists (ACLs).
Switch Management Methods
The Enterasys C3 switch can be managed using the following methods:
•Locally using a VT type terminal connected to the console port.
•Remotely using a VT type terminal connected through a modem.
Enterasys C3 Configuration Guide 1-1
Factory Default Settings
•Remotely using an SNMP management station.
•In-band through a Telnet connection.
•In-band using the Enterasys NetSight
•Remotely using WebView™, Enterasys Networks’ embedded web server application.
The Installation Guide for your Enterasys C3 device provides setup instructions for connecting a
terminal or modem to the switch.
Factory Default Settings
The following tables list factory default settings available on the Enterasys C3 switch.
Table 1-1Default Settings for Basic Switch Operation
FeatureDefault Setting
Switch Mode Defaults
CDP discovery protocolAuto enabled on all ports.
CDP authentication codeSet to 00-00-00-00-00-00-00-00
CDP hold timeSet to 180 seconds.
CDP intervalTransmit frequency of CDP messages set to 60 seconds.
®
management application.
Cisco discovery protocolAuto enabled on all ports.
Cisco DP hold timeSet to 180 seconds.
Cisco DP interval timerSet to 60 seconds.
Community namePublic.
Console (serial) port
IGMP snoopingDisabled. When enabled, query interval is set to 260 seconds and response
IP mask and gatewaySubnet mask set to 0.0.0.0; default gateway set to 0.0.0.0.
IP routesNo static routes configured.
Jumbo frame supportEnabled on all ports.
1-2 Introduction
time is set to 10 seconds.
Table 1-1Default Settings for Basic Switch Operation (Continued)
FeatureDefault Setting
Factory Default Settings
Link aggregation control
Globally enabled. Enabled per port.
protocol (LACP)
Link aggregation admin
Set to 32768 for all ports.
key
Link aggregation flow
Disabled.
regeneration
Link aggregation system
Set to 32768 for all ports.
priority
Link aggregation outport
Set to DIP-SIP.
algorithm
LockoutSet to disable Read-Write and Read-Only users, and to lockout the default
admin (Super User) account for 15 minutes, after 3 failed login attempts.
LoggingSyslog port set to UDP port number 514. Logging severity level set to 6
(significant conditions) for all applications.
MAC aging timeSet to 300 seconds.
MAC lockingDisabled (globally and on all ports).
PasswordsSet to an empty string for all default user accounts. User must press ENTER
at the password prompt to access CLI.
Password agingDisabled.
Password historyNo passwords are checked for duplication.
Policy classificationClassification rules are automatically enabled when created.
Port auto-negotiationEnabled on all ports.
Port advertised abilityMaximum ability advertised on all ports.
Port broadcast suppression Enabled and set to limit broadcast packets to 14,881 per second on all switch
ports.
Port duplex modeSet to half duplex, except for 100BASE-FX and 1000BASE-X, which is set to
full duplex.
Port enable/disableEnabled.
Port prioritySet to 0.
Port speedSet to 10 Mbps, except for 1000BASE-X, which is set to 1000 Mbps, and
100BASE-FX, which is set to 100 Mbps.
Port trapAll ports are enabled to send link traps.
Power over Ethernet port
Administrative state is on (auto).
admin state
Priority classificationClassification rules are automatically enabled when created.
RADIUS clientDisabled.
RADIUS retriesWhen the client is enabled, set to 3.
RADIUS timeoutWhen the client is enabled, set to 20 seconds.
SNMPEnabled.
SNTPDisabled.
Enterasys C3 Configuration Guide 1-3
Factory Default Settings
Table 1-1Default Settings for Basic Switch Operation (Continued)
FeatureDefault Setting
Spanning TreeGlobally enabled and enabled on all ports.
Spanning Tree edge port
administrative status
Spanning Tree edge port
delay
Spanning Tree forward
delay
Spanning Tree hello
interval
Spanning Tree ID (SID)Set to 0.
Spanning Tree maximum
aging time
Spanning Tree port priorityAll ports with bridge priority are set to 128 (medium priority).
Spanning Tree priorityBridge pri ority is set to 32768.
Spanning Tree topology
change trap suppression
Spanning Tree versionSet to mstp (Multiple Spanning Tree Protocol).
SSH Disabled.
System baud rateSet to 9600 baud.
Edge port administrative status begins with the value set to false initially after
the device is powered up. If a Spanning Tree BDPU is not received on the
port within a few seconds, the status setting changes to true.
Enabled.
Set to 15 seconds.
Set to 2 seconds.
Set to 20 seconds.
Enabled.
System contactSet to empty string.
System locationSet to empty string.
System nameSet to empty string.
TelnetEnabled.
Telnet port (IP)Set to port number 23.
TerminalCLI display set to 80 columns and 24 rows.
TimeoutSet to 5 minutes.
User namesLogin accounts set to ro for Read-Only access; rw for Read-Write access;
and admin for Super User access.
VLAN dynamic egressDisabled on all VLANs.
VLAN ID All ports use a VLAN identifier of 1.
Host VLANDefault host VLAN is 1.
Not all of the following routing features are available on all platforms. Check the Release Notes for
your specific platforms for details.
Table 1-2Default Settings for Router Operation
FeatureDefault Setting
Access groups (IP security)None configured.
Access control lists None configured.
1-4 Introduction
Factory Default Settings
Table 1-2Default Settings for Router Operation (Continued)
FeatureDefault Setting
Area authentication (OSPF)Disabled.
Area default cost (OSPF)Set to 1.
Area NSSA (OSPF)None configured.
Area range (OSPF)None configured.
ARP tableNo permanent entries configured.
ARP timeoutSet to 14,400 seconds.
Authentication key (RIP and OSPF)None configured.
Authentication mode (RIP and OSPF)N one configured.
Dead interval (OSPF)Set to 40 seconds.
Disable triggered updates (RIP)Triggered updates allowed.
Distribute list (RIP)No filters applied.
DVMRPDisabled. Metric set to 1.
Hello interval (OSPF)Set to 10 seconds for broadcast and point-to-point networks. Set
to 30 seconds for non-broadcast networks.
ICMPEnabled for echo-reply and mask-reply modes.
IP-directed broadcastsDisabled.
IP forward-protocolEnabled with no port specified.
IP interfacesDisabled with no IP addresses specified.
IRDPDisabled on all interfaces. When enabled, maximum
advertisement interval is set to 600 seconds, minimum
advertisement interval is set to 450 seconds, holdtime is set to
1800 seconds, and address preference is set to 0.
MD5 authentication (OSPF)Disabled with no password set.
MTU sizeSet to 1500 bytes on all interfaces.
OSPFDisabled.
OSPF costSet to 10 for all interfaces.
OSPF networkNone configured.
OSPF prioritySet to 1.
Passive interfaces (RIP)None configured.
Proxy ARPEnabled on all interfaces.
Receive interfaces (RIP)Enabled on all interfaces.
Retransmit delay (OSPF)Set to 1 second.
Retransmit interval (OSPF)Set to 5 seconds.
RIP receive versionSet to accept both version 1 and version 2.
RIP send versionSet to version 1.
RIP offsetNo value applied.
SNMPEnabled.
Enterasys C3 Configuration Guide 1-5
Using the Command Line Interface
Table 1-2Default Settings for Router Operation (Continued)
FeatureDefault Setting
Split horizo nEnabled for RIP packets withou t po i so n re verse.
Stub area (OSPF)None configured.
Timers (OSPF)SPF delay set to 5 seconds. SPF holdtime set to 10 seconds.
Transmit delay (OSPF)Set to 1 second.
VRRPDisabled.
Using the Command Line Interface
Starting a CLI Session
Connecting Using the Console Port
Connect a terminal to the local console port as described in your Enterasys C3 Installation Guide.
The startup screen, Figure 1-1, will display on the terminal. You can now start the Command Line
Interface (CLI) by
•using a default user account, as described in “Using a Default User Account” on page 1-7, or
•using an administratively-assigned user account as described in “Using an Administratively
Configured User Account” on page 1-7.
Figure 1-1 Enterasys C3 Startup Screen
Username:admin
Password:
Enterasys C3
Command Line Interface
Enterasys Networks, Inc.
50 Minuteman Rd.
Andover, MA 01810-1008 U.S.A.
Chassis Serial Number: 041800249041
Chassis Firmware Revision: 6.61.xx.xxxx
C3(su)->
Connecting Using Telnet
Once the Enterasys C3 device has a valid IP address, you can establish a Telnet session from any
TCP/IP based node on the network. For information about setting the switch’s IP address, refer to
“set ip address” on page 3-4.
1-6 Introduction
To establish a Telnet session:
1.Telnet to the switch’s IP address.
2.Enter login (user name) and password information in one of the following ways:
–If the switch’s default login and password settings have not been changed, follow the
–Enter an administratively-configured user name and password.
The notice of authorization and the prompt displays as shown in Figure 1-1.
For information about configuring Telnet settings, refer to “Starting and Configuring Telnet” on
page 3-32.
Refer to the instructions included with the Telnet application for information about establishing a
Telnet session.
Logging In
By default, the Enterasys C3 switch is configured with three user login accounts—ro for
Read-Only access, rw for Read-Write access, and admin for super-user access to all modifiable
parameters. The default password is set to a blank string. For information on changing these
default settings, refer to “User Account and Password Management” on page 5-1.
Using the Command Line Interface
steps listed in “Using a Default User Account” on page 1-7, or
Using a Default User Account
If this is the first time you are logging in to the Enterasys C3 switch, or if the default user accounts
have not been administratively changed, proceed as follows:
1.At the login prompt, enter one of the following default user names:
–ro for Read-Only access.
–rw for Read-Write access.
–admin for Super User access.
2.Press ENTER. The Password prompt displays.
3.Leave this string blank and press ENTER. The switch information and prompt displays as
shown in Figure 1-1.
Using an Administratively Configured User Account
If the switch’s default user account settings have been changed, proceed as follows:
1.At the login prompt, enter your administratively-assigned user name and press ENTER.
2.At the Password prompt, enter your password and press ENTER.
The notice of authorization and the prompt displays as shown in Figure 1-1.
Note: Users with Read-Write (rw) and Read-Only access can use the set password command
(page 5-9) to change their own passwords. Administrators with Super User (su) access can use
the set system login command (page 5-6) to create and change user accounts, and the set
password command to change any local account password.
Enterasys C3 Configuration Guide 1-7
Using the Command Line Interface
Navigating the Command Line Interface
Getting Help with CLI Syntax
The Enterasys C3 switch allows you to display usage and syntax information for individual
commands by typing help or ? after the command.
CLI Command Defaults Descriptions
Each command description in this guide includes a section entitled “Defaults” which contains
different information from the factory default settings on the switch described in Table 1 -1 . The
section defines CLI behavior if the user enters a command without typing optional parameters
(indicated by square brackets [ ]). For commands without optional parameters, the defaults
section lists “None”. For commands with optional parameters, this section describes how the CLI
responds if the user opts to enter only the keywords of the command syntax. Figure 1-2 provides
an example.
Figure 1-2 Sample CLI Defaults Description
Syntax
show port status [port-string]
Defaults
If port-string is not specified, status information for all ports will be displayed.
CLI Command Modes
Each command description in this guide includes a section entitled “Mode” which states whether
the command is executable in Admin (Super User), Read-Write, or Read-Only mode. Users with
Read-Only access will only be permitted to view Read-Only (show) commands. Users with ReadWrite access will be able to modify all modifiable parameters in set and show commands, as well
as view Read-Only commands. Administrators or Super Users will be allowed all Read-Write and
Read-Only privileges, and will be able to modify local user accounts. The Enterasys C3 switch
indicates which mode a user is logged in as by displaying one of the following prompts:
•Admin: C3(su)->
•Read-Write: C3(rw)->
•Read-Only: C3(ro)->
Performing Keyword Lookups
Entering a space and a question mark (?) after a keyword will display all commands beginning
with the keyword. Figure 1-3 shows how to perform a keyword lookup for the show snmp
command. In this case, four additional keywords are used by the show snmp command. Entering
a space and a question mark (?) after any of these parameters (such as show snmp community)
will display additional parameters nested within the syntax.
Figure 1-3 Performing a Keyword Lookup
C3(su)->show snmp ?
community SNMP v1/v2c community name configuration
notify SNMP notify configuration
targetaddr SNMP target address configuration
targetparams SNMP target parameters configuration
1-8 Introduction
Using the Command Line Interface
Entering a question mark (?) without a space after a partial keyword will display a list of
commands that begin with the partial keyword. Figure 1-4 shows how to use this function for all
commands beginning with co:
Figure 1-4 Performing a Partial Keyword Lookup
C3(rw)->co?
configure copy
C3(su)->co
Note: At the end of the lookup display, the system will repeat the command you entered without the
?.
Displaying Scrolling Screens
If the CLI screen length has been set using the set length command as described on page 3-24, CLI
output requiring more than one screen will display --More-- to indicate continuing screens. To
display additional screen output:
•Press any key other than ENTER to advance the output one screen at a time.
•Press ENTER to advance the output one line at a time.
The example in Figure 1-5 shows how the show mac command indicates that output continues on
more than one screen.
The Enterasys C3 switch allows you to abbreviate CLI commands and keywords down to the
number of characters that will allow for a unique abbreviation. Figure 1-6 shows how to
abbreviate the show netstat command to sh net.
Enterasys C3 Configuration Guide 1-9
Using the Command Line Interface
Figure 1-6 Abbreviating a Command
C3(su)->sh net
Active Internet connections (including servers)
Proto Recv-Q Send-Q Local Address Foreign Address State
The CLI supports EMACs-like line editing commands. Ta ble 1 -3 lists some commonly used
commands.
Table 1-3Basic Line Editing Commands
Key SequenceCommand
Ctrl+AMove cursor to beginning of line.
Ctrl+BMove cursor back one character.
Ctrl+DDelete a character.
Ctrl+EMove cursor to end of line.
Ctrl+FMove cursor forward one characte r.
Ctrl+HDelete character to left of cursor.
Ctrl+I or TABComplete word.
Ctrl+KDelete all characters after cursor.
Ctrl+NScroll to next command in command history (use the CLI history command to
display the history).
Ctrl+PScroll to previous command in command history.
Ctr1+QResume the CLI process.
Ctr1+SPause the CLI process (for scrolling).
Ctrl+TTranspose characters.
Ctrl+U or Ctrl+XDelete all characters before cursor.
Ctrl+WDelete word to the left of cursor.
Ctrl+YRestore the most recently deleted item.
1-10 Introduction
Configuring Switches in a Stack
This chapter provides information about configuring Enterasys C3 switches in a stack.
For information about ...Refer to page ...
About Enterasys C3 Switch Operation in a Stack2-1
Installing a New Stackable System of Up to Eight Units2-2
Installing Previously-Configured Systems in a Stack2-3
Adding a New Unit to an Existing Stack2-3
Creating a Virtual Switch Configuration2-3
Considerations About Using Clear Config in a Stack2-4
Issues Related to Mixed Type Stacks2-4
Stacking Configuration and Management Commands2-5
2
About Enterasys C3 Switch Operation in a Stack
The Enterasys C3 products are stackable switches that can be adapted and scaled to help meet
your network needs. These switches provide a management platform and uplink to a network
backbone for a stacked group of up to eight Enterasys C3 switches.
Note: You can mix SecureStack C2 and C3 switches in a single stack, although only the lowest
common denominator of functionality will be supported in a mixed stack. Refer to “Issues Related to
Mixed Type Stacks” on page 2-4 for information about configuring a mixed stack.
Once installed in a stack, the switches behave and perform as a single switch product. As such,
you can start with a single unit and add more units as your network expands. You can also mix
different products in the family in a single stack to provide a desired combination of port types
and functions to match the requirements of individual applications. In all cases, a stack of units
performs as one large product, and is managed as a single network entity.
When switches are installed and connected as described in your Enterasys C3 Installation Guide,
the following occurs during initialization:
•The switch that will manage the stack is automatically established. This is known as the
manager switch.
•All other switches are established as members in the stack.
•The hierarchy of the switches that will assume the function of backup manager is also
determined in case the current manager malfunctions, is powered down, or is disconnected
from the stack.
Enterasys C3 Configuration Guide 2-1
Installing a New Stackable System of Up to Eight Units
•The console port on the manager switch remains active for out-of-band (local) switch
management, but the console port on each member switch is deactivated. This enables you to
set the IP address and system password using a single console port. Now each switch can be
configured locally using only the manager’s console port, or inband using a remote device and
the CLI set of commands described in this section.
Once a stack is created (more than one switch is interconnected), the following procedure occurs:
1.By default, unit IDs are arbitrarily assigned on a first-come, first-served basis.
2.Unit IDs are saved against each module. Then, every time a board is power-cycled, it will
initialize with the same unit ID. This is important for port-specific information (for example:
ge.4.12 is the 12th Gigabit Ethernet port on Unit # 4).
3.The management election process uses the following precedence to assign a management
switch:
a.Previously assigned / elected management unit
b. Management assigned priority (values 1-15)
c.Hardware preference level
d. Highest MAC Address
Use the following recommended procedures when installing a new stackable system or adding a
new unit to an existing stack.
Important
The following procedures assume that all units have a clean configuration from manufacturing. When adding
a new unit to an already running stack, it is also assumed that the new unit is using the same firmware image
version as other units in the stack.
Installing a New Stackable System of Up to Eight Units
Use the following procedure for installing a new stack of up to eight units out of the box.
1.Before applying power, make all physical connections with the stack cables as described in
your Enterasys C3 Installation Guide.
2.Once all of the stack cables have been connected, individually power on each unit from top to
bottom.
Notes: Ensure that each switch is fully operational before applying power to the next switch.
Since unit IDs are assigned on a first-come, first-served basis, this will ensure that unit IDs are
ordered sequentially.
Once unit IDs are assigned, they are persistent and will be retained during a power cycle to any or
all of the units.
3.(Optional) If desired, change the management unit using the set switch movemanagement
command as described in “set switch movemanagement” on page 2-10.
4.Once the desired master unit has been selected, reset the system using the reset command
(page 3-47).
5.After the stack has been configured, you can use the show switchunit command (page 2-5) to
physically identify each unit. When you enter the command with a unit number, the MGR
LED of the specified switch will blink for 10 seconds. The normal state of this LED is off for
member units and steady green for the manager unit.
2-2 Configuring Switches in a Stack
Installing Previously-Configured Systems in a Stack
Installing Previously-Configured Systems in a Stack
If member units in a stack have been previous members of a different stack, you may need to
configure the renumbering of the stack as follows:
1.Stack the units in the method desired, and connect the stack cables.
2.Power up only the unit you wish to be manager.
3.Once the management unit is powered up, log into the CLI, and use the show switch
command as described in “show switch” on page 2-5 to display stacking information.
4.Clear any switches which are listed as “unassigned” using the clear switch member
command as described in “clear switch member” on page 2-11.
5.Power up the member of the stack you wish to become unit 2. Once the second unit is fully
powered, the COM session of the CLI will state that a new CPU was added.
6.Use the show switch command to redisplay stacking information.
a.If the new member displays as unit 2, you can proceed to repeat this step with the next
unit.
b. If the new member displays a different unit number, you must:
(1) Renumber the stack using the set switch renumber command as described in “set
switch” on page 2-8, then
(2) Clear the original unit number using the clear switch member command.
7.Repeat Step 6 until all members have been renumbered in the order you desire.
8.After the stack has been reconfigured, you can use the show switchunit command (“show
switch” on page 2-5) to physically confirm the identity of each unit. When you enter the
command with a unit number, the MGR LED of the specified switch will blink for 10 seconds.
The normal state of this LED is off for member units and steady green for the manager unit.
Adding a New Unit to an Existing Stack
Use the following procedure for installing a new unit to an existing stack configuration. This
procedure assumes that the new unit being added has a clean configuration from manufacturing
and is running the same firmware image version as other units in the stack.
1.Ensure that power is off on the new unit being installed.
2.Use one of the following methods to complete stack cable connections:
–If the running stack uses a daisy chain topology, make the stack cable connections from
the bottom of the stack to the new unit (that is, STACK DOWN port from the bottom unit
of the running stack to the STACK UP port on the new unit).
–If the running stack uses a ring stack topology, break the ring and make the stack cable
connections to the new unit to close the ring.
3.Apply power to the new unit.
Creating a Virtual Switch Configuration
You can create a configuration for a Enterasys C3 switch before adding the actual physical device
to a stack. This preconfiguration feature includes configuring protocols on the ports of the “virtual
switch.”
Enterasys C3 Configuration Guide 2-3
Considerations About Using Clear Config in a Stack
To create a virtual switch configuration in a stack environment:
1.Display the types of switches supported in the stack, using the show switch switchtype
command (page 2-7).
2.Using the output of the show switch switchtype command, determine the switch index (SID)
of the model of switch being configured.
3.Add the virtual switch to the stack using the set switch member command (page 2-11). Use
the SID of the switch model, determined in the previous step, and the unit ID that you want to
assign to this switch member.
4.Proceed to configure the ports of the virtual switch as you would do for physically present
devices.
Note: If you preconfigure a virtual switch and then add a physical switch of a different type to the
stack as that unit number, any configured functionality that cannot be supporte d on th e ph ysi ca l
switch will cause a configuration mismatch status for that device and the ports of the new device will
join detached. You must clear the mismatch before the new device will properly join the stack.
Considerations About Using Clear Config in a Stack
When using the clear config command (page 3-49) to clear configuration parameters in a stack, it
is important to remember the following:
•Use clear config to clear config parameters without clearing stack unit IDs. This command
WILL NOT clear stack parameters or the IP address and avoids the process of renumbering
the stack.
•Use clear config all when it is necessary to clear all config parameters, including stack unit
IDs and switch priority values. This command will not clear the IP address nor will it remove
an applied advanced feature license.
•Use clear ip address to remove the IP address of the stack.
•Use clear license to remove an applied license from a switch.
Configuration parameters and stacking information can also be cleared on the master unit only
by selecting the “restore configuration to factory defaults” option from the boot menu on switch
startup. This selection will leave stacking priorities on all other units.
Issues Related to Mixed Type Stacks
Feature Support
Because the SecureStack C2 and C3 switches have different hardware architectures, the
functionality supported by the two switch types is different. When the two types of switches are
mixed in a stack, the functionality supported will be the lowest common denominator of features
supported on all platforms. Refer to the firmware Release Notes for information about supported
features.
Configuration
Common Firmware Version
Mixed stacking is supported by SecureStack C2 firmware version 5.02.xx.xxxx only. You can install
the C2 firmware first, with the C3 switch in stand-alone mode, or you can add the C3 switch to the
2-4 Configuring Switches in a Stack
Stacking Configuration and Management Commands
stack and then copy the C2 firmware to the C3 switch using the set switch copy-fw command
(page 2-9). After copying the C2 firmware to the C3 switch, you must reset the stack.
Switch Manager
It is recommended that a SecureStack C3 switch be made the manager of a mixed stack. Use the set
switch movemanagement command (page 2-10) to change the manager unit.
Stacking Configuration and Management Commands
Purpose
To review, individually configure and manage switches in a Enterasys C3 stack.
Commands
For information about... Refer to page...
show switch2-5
show switch switchtype2-7
show switch stack-ports2-8
set switch2-8
set switch copy-fw2-9
set switch description2-10
set switch movemanagement2-10
set switch member2-1 1
clear switch member2-1 1
set switch stack-ports length2-12
clear switch stack-ports length2-13
show switch stack-ports length2-13
show switch
Use this command to display information about one or more units in the stack.
Syntax
show switch [status] [unit]
Parameters
status(Optional) Displays power and administrative status information for one
unit(Optional) Specifies the unit(s) for which information will display.
or more units in the stack.
Enterasys C3 Configuration Guide 2-5
show switch
Defaults
If not specified, status and other configuration information about all units will be displayed.
Mode
Switch command, read-only.
Usage
After a stack has been configured, you can use this command to physically confirm the identity of
each unit. When you enter the command with a unit number, the MGR LED of the specified
switch will blink for 10 seconds. The normal state of this LED is off for member units and steady
green for the manager unit.
Examples
This example shows how to display information about all switch units in the stack:
C3(rw)->show switch
Management Preconfig Plugged-in Switch Code
Switch Status Model ID Model ID Status Version
1 Mgmt Switch C3G124-24 C3G124-24 OK 06.61.xx.xxxx
2 Stack Member C3G124-24 C3G124-24 OK 06.61.xx.xxxx
3 Stack Member C3G124-24 C3G124-24 OK 06.61.xx.xxxx
4 Stack Member C3G124-24 C3G124-24 OK 06.61.xx.xxxx
5 Stack Member C3G124-24 C3G124-24 OK 06.61.xx.xxxx
6 Stack Member C3G124-24 C3G124-24 OK 06.61.xx.xxxx
7 Stack Member C3G124-24 C3G124-24 OK 06.61.xx.xxxx
8 Stack Member C3G124-24 C3G124-24 OK 06.61.xx.xxxx
This example shows how to display information about switch unit 1 in the stack:
C3(ro)->show switch 1
Switch 1
Management Status Management Switch
Hardware Management Preference Unassigned
Admin Management Preference Unassigned
Switch Type C3G124-24
Preconfigured Model Identifier C3G124-24
Plugged-in Model Identifier C3G124-24
Switch Status OK
Switch Description Enterasys Networks, Inc. C3 -- Model
C3G124-24
Detected Code Version 06.61.xx.xxxx
Detected Code in Flash 03.01.20
Detected Code in Back Image 02.01.37
Up Time 0 days 6 hrs 37 mins 54 secs
This example shows how to display status information for switch unit 1 in the stack:
C3(ro)->show switch status 1
Switch 1
Switch Status Full
Admin State
Power State
Inserted Switch:
Model Identifier C3G124-24
Description Enterasys Networks, Inc. C3 -- Model
C3G124-24
2-6 Configuring Switches in a Stack
Configured Switch:
Model Identifier C3G124-24
Description Enterasys Networks, Inc. C3 -- Model
C3G124-24
show switch switchtype
Use this command to display information about supported switch types in the stack.
Syntax
show switch switchtype [switchindex]
Parameters
switchindex(Optional) Specifies the switch index (SID) of the switch type to display.
Defaults
None.
Mode
show switch switchtype
Switch command, read-only.
Examples
This example shows how to display switch type information about all switches in the stack:
C3(ro)->show switch switchtype
Mgmt Code
SID Switch Model ID Pref Version
This example shows how to display switch type information about SID1:
C3(ro)->show switch switchtype 1
Switch Type 0x56950200
Model Identifier C2G124-24
Switch Description Enterasys Networks, Inc. C2 - Model C2G124-24
Management Preference 1
Expected Code Version 0xa08245
Enterasys C3 Configuration Guide 2-7
show switch stack-ports
Supported Cards:
Slot 0
Card Index (CID) 1
Model Identifier C2G124-24
show switch stack-ports
Use this command to display various data flow and error counters on stack ports.
Syntax
show switch stack-ports [unit]
Parameters
unit(Optional) Specifies the switch unit ID, an integer ranging from 1 to 8.
Defaults
None.
Mode
Switch command, read-only.
Usage
If a stacking port has been configured to use a 5 meter stacking cable with the set switch stackports length command, 5m will be displayed in the Stacking Port column next to the port
descriptor (Up or Down).
Example
This example shows how to display data and error information on stack ports:
Use this command to assign a switch ID, to set a switch’s priority for becoming the management
switch if the previous management switch fails, or to change the switch unit ID for a switch in the
stack.
Syntax
set switch {unit [priority value | renumber newunit]}
2-8 Configuring Switches in a Stack
Parameters
unitSpecifies a unit number for the switch. Value can range from 1 to 8.
priorityvalueSpecifies a priority value for the unit. Valid values are 1 to 15 with higher
values assigning higher priority.
renumbernewunitSpecifies a new number for the unit.
Note: This number must be a previously unassigned unit ID number.
Defaults
None.
Mode
Switch command, read-write.
Examples
This example shows how to assign priority 3 to switch 5:
C3(su)->set switch 5 priority 3
This example shows how to renumber switch 5 to switch 7:
set switch copy-fw
C3(su)->set switch 5 renumber 7
set switch copy-fw
Use this command to replicate the code image file from the management switch to other
switch(es) in the stack.
Syntax
set switch copy-fw [destination-system unit]
Parameters
destination-system
unit
Defaults
If destination-system is not specified, the management image file will be replicated to all switches
in the stack.
Mode
Switch command, read-write.
(Optional) Specifies the unit number of unit on which to copy the
management image file.
Example
This example shows how to replicate the management image file to all switches in the stack:
C3(su)->set switch copy-fw
Are you sure you want to copy firmware? (y/n) y
Code transfer completed successfully.
Enterasys C3 Configuration Guide 2-9
set switch description
set switch description
Use this command to assign a name to a switch in the stack.
Syntax
set switch description unit description
Parameters
unitSpecifies a unit number for the switch.
descriptionSpecifies a text description for the unit.
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to assign the name “FirstUnit” to switch unit 1 in the stack:
C3(su)->set switch description 1 FirstUnit
set switch movemanagement
Use this command to move management switch functionality from one switch to another.
Syntax
set switch movemanagement fromunit tounit
Parameters
fromunitSpecifies the unit number of the current management switch.
tounitSpecifies the unit number of the newly-designated management switch.
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to move management functionality from switch 1 to switch 2:
C3(su)->set switch movemenagement 1 2
Moving stack management will unconfigure entire stack including all interfaces.
Are you sure you want to move stack management? (y/n) y
2-10 Configuring Switches in a Stack
set switch member
Use this command to add a virtual member to a stack. This allows you to preconfigure a switch
before the physical device is actually added to the stack.
Syntax
set switch member unit switch-id
Parameters
unitSpecifies a unit number for the switch.
switch-idSpecifies a switch ID (SID) for the switch. SIDs can be displayed with the
Defaults
None.
Mode
Switch command, read-write.
set switch member
show switch switchtype command.
Usage
Refer to “Creating a Virtual Switch Configuration” on page 2-3 for more information about how to
add a virtual switch to a stack.
Example
This example shows how to specify a switch as unit 1 with a switch ID of 1:
C3(su)->set switch member 1 1
clear switch member
Use this command to remove a member entry from the stack.
Syntax
clear switch member unit
Parameters
unitSpecifies the unit number of the switch.
Defaults
None.
Mode
Switch command, read-write.
Enterasys C3 Configuration Guide 2-11
set switch stack-ports length
Example
This example shows how to remove the switch 5 entry from the stack:
C3(su)->clear switch member 5
set switch stack-ports length
Use this command to configure a stacking port to use a 5 meter stacking cable.
Syntax
set switch stack-ports length unit {down | up} {5m | standard}
Parameters
unitSpecifies the switch in the stack to be configured. Value can range from
1 to 8.
down | upSpecifies which stack port to configure, either the up or down port.
5m | standardSpecifies the type of stacking cable to configure the port for, either a 5
meter cable, or a standard length cable. Standard cables include the 0.3
meter, 1 meter, and 2 meter length cables.
Defaults
Stacking ports not configured with this command to use 5 meter cables are assumed to be using
one of the standard length cables.
Mode
Switch mode, read-write.
Usage
This command allows you to manually identify stacking ports using a 5 meter stacking cable.
Identifying stacking ports that will use a 5 meter cable prevents potential stacking errors and
packet loss.
Stacking ports not configured to use a 5 meter cable with this command will be assumed to be
using one of the standard cables, which includes the 0.3 meter, 1 meter, and 2 meter length cables.
Use the show switch stack-ports length command to display the current cable configuration for
switches in the stack.
Example
This example configures the down stacking port on unit 1 and the up stacking port on unit 2 to use
a 5 meter stacking cable, and then displays the current configuration.
C3(su)->set switch stack-ports length 1 down 5m
C3(su)->set switch stack-ports length 2 up 5m
C3(su)->show switch stack-ports length
Stacking
Switch Port Length
------ ---------- --------
1 Up standard
Down 5m
2 Up 5m
2-12 Configuring Switches in a Stack
Down standard
clear switch stack-ports length
Use this command to clear the stack port lengths to the default of standard for one or all swtiches
in the stack.
Syntax
clear switch stack-ports length [unit]
Parameters
unit(Optional) Specifies the switch in the stack to clear stack port lengths.
Defaults
If no switch is specified, all switches in the stack have their stack port lengths cleared to use a
standard length cable.
Mode
Switch mode, read-write
clear switch stack-ports length
Example
This example clears the stack port cable length on switch unit 1.
C3(su)->clear switch stack-ports length 1
show switch stack-ports length
Use this command to display the current stack port cable configuration.
Syntax
show switch stack-ports length [unit]
Parameters
unit(Optional) Specifies the switch in the stack to show stack port cable
configurations.
Defaults
If no switch is specified, all switches in the stack are displayed.
Mode
Switch command, read-only.
Example
This example shows the stack port cable length configuration for all switches in the stack.
C3(su)->show switch stack-ports length
Stacking
Switch Port Length
Enterasys C3 Configuration Guide 2-13
show switch stack-ports length
------ ---------- --------
1 Up standard
Down 5m
2 Up 5m
Down standard
2-14 Configuring Switches in a Stack
3
Basic Configuration
At startup, the Enterasys C3 switch is configured with many defaults and standard features. This
chapter describes how to customize basic system settings to adapt to your work environment.
For information about...Refer to page...
Quick Start Setup Commands3-1
Setting Basic Switch Properties3-2
Downloading a Firmware Image3-27
Reviewing and Selecting a Boot Firmware Image3-31
Starting and Configuring Telnet3-32
Managing Switch Configuration and Files3-34
Clearing and Closing the CLI3-45
Resetting the Switch3-46
Using and Configuring WebView3-50
Gathering Technical Support Information3-53
Configuring Hostprotect3-54
Quick Start Setup Commands
The tables in this section provide a quick reference for the CLI commands needed to begin basic
C3 switch operation. Table 3 -1 lists tasks and their associated CLI commands required for setting
up the switch with the latest firmware. Tab le 3-2 lists optional CLI commands that will help you
perform additional basic configuration on the switch. Refer to the pages listed for more
information about each command.
Table 3-1Required CLI Setup Commands
Step TaskCLI commands
1Set a new password.set password [username]5-9
2Set the switch IP address.set ip addressip-address [mask
filename system:image
set boot system filename3-31
show version3-21
3-41
Enterasys C3 Configuration Guide 3-1
Setting Basic Switch Properties
Table 3-2Optional CLI Setup Commands
TaskCLI commands
Save the active configuration.save config3-37
Enable or disable SSH.set ssh enable | disable32-89
Enable or disable Telnet.set telnet {enable | disable} [inbound |
Enable or disable HTTP
management (WebView).
Enable or disable SNMP port link
traps.
Set the per port broadcast limit set port broadcast port-string threshold-value11-35
Configure a VLAN.set vlan create vlan-id14-5
Set a Syslog server IP and
severity
Configure and enable a RADIUS
server.
Refer to
page...
3-33
outbound | all]
set webview {enable | disable}3-51
set port trap port-string {enable | disable}11-24
set port vlan port-string vlan-id modify-egress14-9
set logging server index ip-addr ip-addr
severity severity state enable
set radius server index ip-addr
port [secret-value]{realm { management-access |
any | network-access}
set radius enable32-8
19-4
32-8
Setting Basic Switch Properties
Purpose
To display and set the system IP address and other basic system (switch) properties.
Commands
For information about...Refer to page...
show ip address 3-3
set ip address 3-4
clear ip address 3-5
show ip protocol 3-5
set ip protocol3-6
show ip route3-6
show system 3-7
show system hardware 3-8
show system utilization 3-9
set system utilization3-10
clear system utilization3-1 1
show system enhancedbuffermode 3-1 1
set system enhancedbuffermode 3-12
3-2 Basic Configuration
show ip address
For information about...Refer to page...
set system temperature3-12
clear system temperature3-13
show time 3-14
set time 3-14
show summertime 3-15
set summertime 3-16
set summertime date 3-16
set summertime recurring 3-17
clear summertime 3-18
set prompt 3-18
show banner3-19
set banner 3-19
clear banner3-20
show version 3-21
set system name 3-22
set system location 3-22
set system contact 3-23
set width 3-23
set length 3-24
show logout 3-24
set logout 3-25
show console 3-25
set console baud 3-26
set console vt1003-26
show ip address
Use this command to display the system IP address and subnet mask.
Syntax
show ip address
Parameters
None.
Defaults
None.
Enterasys C3 Configuration Guide 3-3
set ip address
Mode
Switch command, read-only.
Example
This example shows how to display the system IP address and subnet mask:
Use this command to set the system IP address, subnet mask and default gateway.
Syntax
set ip address ip-address [mask ip-mask] [gateway ip-gateway]
Note: The C3 does not support the ability for a user to configure the host's gateway to be a local
routed interface IP. The host's gateway must exist on a different device in the network if one is
configured.
Parameters
ip-addressSets the IP address for the system. For Enterasys C3 systems, this is the IP
address of the management switch as described in “About Enterasys C3
Switch Operation in a Stack” on page 2-1.
mask ip-mask(Optional) Sets the system’s subnet mask.
gateway ip-gateway(Optional) Sets the system’s default gateway (next-hop device).
Defaults
If not specified, ip-mask will be set to the natural mask of the ip-address and ip-gateway will be set to
the ip-address.
Mode
Switch command, read-write.
Usage
Parameters must be entered in the order shown (host IP, then mask, then gateway) for the
command to be accepted.
Example
This example shows how to set the system IP address to10.1.10.1 with a mask of 255.255.128.0:
C3(su)->set ip address 10.1.10.1 mask 255.255.128.0
3-4 Basic Configuration
clear ip address
Use this command to clear the system IP address.
Syntax
clear ip address
Parameters
None.
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to clear the system IP address:
C3(rw)->clear ip address
clear ip address
show ip protocol
Use this command to display the method used to acquire a network IP address for switch
management.
Syntax
show ip protocol
Parameters
None.
Defaults
None.
Mode
Switch command, read-only.
Example
This example shows how to display the method used to acquire a network IP address:
C3(su)->show ip protocol
System IP address acquisition method: dhcp
Enterasys C3 Configuration Guide 3-5
set ip protocol
set ip protocol
Use this command to specify the protocol used to acquire a network IP address for switch
management.
Syntax
set ip protocol {bootp | dhcp | none}
Parameters
bootpSelects BOOTP as the protocol to use to acquire the system IP address.
dhcpSelects DHCP as the protocol to use to acquire the system IP address.
noneNo protocol will be used to acquire the system IP address.
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to set the method used to acquire a network IP address to DHCP.
C3(su)->set ip protocol dhcp
show ip route
Use this command to display the IP route table.
Syntax
show ip route
Parameters
None.
Defaults
None.
Mode
Switch command, read only.
Example
This example shows the output of this command.
C3(ro)->show ip route
INET route table
Destination Gateway Flags Use If Metric
Use this command to display system information, including contact information, power and fan
tray status and uptime.
Syntax
show system
Parameters
None.
show system
Defaults
None.
Mode
Switch command, read-only.
Example
This example shows how to display system information:
C3(su)->show system
System contact:
System location:
System name:
Switch 1
--------
PS1-Status PS2-Status
---------- ----------
Ok Not Installed and/or Not Operating
Fan1-Status Fan2-Status
----------- -----------
Ok Ok
Temp-Alarm
-----------
off
Thermal Threshold: 58%
Temp alarm max threshold: 100%
Temp alarm trap: disabled
Temp alarm syslog: disabled
Uptime d,h:m:s Logout
Enterasys C3 Configuration Guide 3-7
show system hardware
-------------- -------
0,20:36:49 0 min
The following table provides an explanation of the command output.
Table 3-3show system Output Details
OutputWhat It Displays...
System contactContact person for the system. Default of a blank string can be changed with the
set system contact command (“set system contact” on page 3-23).
System locationWhere the system is located. De fault of a blank string can be changed with the
set system location command (“set system location” on page 3-22).
System nameName identifying the system. Default of a blank string can be changed with the
set system name command (“set system name” on page 3-22).
Switch xIndicates the switch position in the stack. When multiple switches are in a stack,
information for each switch is displayed.
PS1-StatusOperational status for the primary power supply.
PS2-StatusOperational status for the secondary power supply, if installed.
Fanx-StatusOperational status of the fan(s).
Temp-AlarmIndicates status of temperature alarm — on, off. The status will show NA (not
available) on switches that do not support this functionality.
Thermal ThresholdPercentage of thermal threshold reached. The status will show NA (not available)
Temp alarm max
threshold
Temp alarm trapIndicates whether the sending of temperature alarm traps is enabled or disabled.
Temp alarm syslogIndicates whether temperature alarm syslog messages are enabled or disabled.
Uptime d,h:m:sSystem uptime.
LogoutTime an idle console or Telnet CLI session will remain connected before timing
show system hardware
Use this command to display the system’s hardware configuration.
Syntax
show system hardware
on switches that do not support this functionality.
The temperature alarm threshold expressed as a percentage of the maximum
rated. The default value is 100%.
The default is disabled.
The default is disabled.
out. Default of 5 minutes can be changed with the set logout command (“set
logout” on page 3-25).
Parameters
None.
Defaults
None.
3-8 Basic Configuration
Mode
Switch command, read-only.
Example
This example shows how to display the system’s hardware configuration. Please note that the
information you see displayed may differ from this example.
C3(su)->show system hardware
UNIT 1 HARDWARE INFORMATION
-------------------------- Model: <platform specific>
Serial Number: <switch specific>
Vendor ID: 0xbc00
Base MAC Address: 00:11:88:B1:76:C0
Hardware Version: BCM56514 REV 1
FirmWare Version: 06.61.00.0052
Boot Code Version: 01.00.52
CPLD Version: 2.0
show system utilization
Use this command to display detailed information about the processor running on the switch, or
the overall memory usage of the Flash and SDRAM storage devices on the unit, or the processes
running on the switch. Only the memory usage in the master unit of a stack is shown.
show system utilization
Syntax
show system utilization {cpu | storage | process}
Parameters
cpuDisplay information about the processor running on the switch.
storageDisplay information about the overall memory usage on the switch.
processDisplay information about the processes running on the switch.
Defaults
None.
Mode
Switch command, read-only.
Examples
This example shows how to display the system’s CPU utilization:
C3(ro)->show system utilization cpu
CPU Utilization Threshold Traps enable: Threshold = 80.0%
Use this command to set the threshold for sending CPU utilization notification messages.
Syntax
set system utilization threshold threshold
Parameters
threshold thresholdSpecifies a threshold value in 1/10 of a percent. Valid range is 1 to 1000.
Defaults
The default threshold value is 80%.
Mode
Switch command, read-write.
Usage
This command sets the percentage of system CPU utilitization that will cause a trap notification to
be sent. After the threshold has been exceeded, additional notifications will be sent once a minute
until the utilization has dropped back below the threshold.
A value of 0 disables utilization notification messages.
Example
This example sets the CPU utilization threshold to 75%.
3-10 Basic Configuration
C3(rw)->set system utilization threshold 750
clear system utilization
Use this command to reset the CPU utilization threshold to the default of 80%.
Syntax
clear system utilization
Parameters
None.
Defaults
The default threshold value is 80%.
Mode
Switch command, read-write.
Example
clear system utilization
This example resets the CPU utilization threshold to the default.
C3(rw)->show system utilization cpu
CPU Utilization Threshold Traps enable: Threshold = 75.0%
Use this command to display the status of enhanced buffer mode, which optimizes buffer
distribution into a single CoS queue operation for standalone switches or non-stacked switches.
Syntax
show system enhancedbuffermode
Parameters
None.
Enterasys C3 Configuration Guide 3-11
set system enhancedbuffermode
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to display enhanced buffer mode status:
C3(su)->show system enhancedbuffermode enable
Optimized system buffer distribution Disable
set system enhancedbuffermode
Use this command to enable or disable enhanced buffer mode, which optimizes buffer
distribution into a single CoS queue operation for standalone switches or non-stacked switches.
Executing this command will reset the switch, so the system prompts you to confirm whether you
want to proceed.
Syntax
set system enhancedbuffermode {enable | disable}
Parameters
enable | disableEnables or disables enhanced buffer mode.
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to enable enhanced buffer mode:
C3(su)->set system enhancedbuffermode enable
Changes in the enhanced buffer mode will require resetting this unit.
Are you sure you want to continue? (y/n)
set system temperature
Use this command to set the system high temperature threshold limit and the high temperature
alert parameters, on the platforms that support this feature.
Syntax
set system temperature {[syslog enable | disable] [trap enable | disable]
[overtemp-thresholdvalue]}
3-12 Basic Configuration
Parameters
clear system temperature
syslog enable |
disable
trap enable | disableEnables or disables sending high temperature alerts by means of SNMP
overtemp-threshold
value
Enables or disables logging high temperature alerts to the system log
when the system transitions into an alarm state.
traps when the system transitions into an alarm state.
Sets the thermal threshold as a percentage of the maximum rated for the
specific platform. Value can range from 0 to 100%.
Defaults
Syslog alerts are disabled by default.
Trap alerts are disabled by default.
Overtemp threshold is 100% by default.
Mode
Switch command, read-write.
Usage
On the platforms that support this feature, temperature sensors are located in several different
locations within the device. Threshold calibrations have been calculated separately for each
platform. The thermal overtemp threshold is the high-water mark that, when reached, triggers an
alert to warn the system administrator that the device is operating at high temperatures.
When a high temperature alert condition occurs, the CPU LED on the front panel of the switch
will flash red. In addition, if enabled, a syslog message will be logged and/or an SNMP trap will
be sent.
The values set with this command can be viewed with the show system command.
Note: Refer to the Release Note for your platform to determine if the High-Temperature Alert
feature is supported on your platform.
Example
The following example enables sending SNMP traps and sets the overtemp threshold to 60%.
C3(su)->set system temperature trap enable overtemp-threshold 60
clear system temperature
Use this command to reset system high temperature parameters to their default values, on the
platforms that support this feature.
Syntax
clear system temperature
Parameters
None.
Enterasys C3 Configuration Guide 3-13
show time
Defaults
Mode
Usage
Example
show time
None.
Switch command, read-write.
This command resets all the high temperature parameters to their default values:
•Syslog alerts are disabled by default.
•Trap alerts are disabled by default.
•Overtemp threshold is 100% by default.
This example resets all high temperature parameters to their defaults.
C3(su)->clear system temperature
Use this command to display the current time of day in the system clock.
Syntax
show time
Parameters
None.
Defaults
None.
Mode
Switch command, read-only.
Example
This example shows how to display the current time. The output shows the day of the week,
month, day, and the time of day in hours, minutes, and seconds and the year:
C3(su)->show time
THU SEP 05 09:21:57 2002
set time
Use this command to change the time of day on the system clock.
Syntax
set time [mm/dd/yyyy] [hh:mm:ss]
3-14 Basic Configuration
Parameters
show summertime
[mm/dd/yyyy]
[hh:mm:ss]
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to set the system clock to 7:50 a.m:
C3(su)->set time 7:50:00
show summertime
Use this command to display daylight savings time settings.
Syntax
show summertime
Sets the time in:
month, day, year and/or
24-hour format
At least one set of time parameters must be entered.
Parameters
None.
Defaults
None.
Mode
Switch command, read-only.
Example
This example shows how to display daylight savings time settings:
C3(su)->show summertime
Summertime is Enabled and set to ''
Start : SUN MAR 14 02:00:00
End : SUN NOV 7 02:00:00
Offset: 60 minutes (1 hours 0 minutes)
Recurring: yes, starting at 2:00 of the second Sunday of March an d ending at 2:00
of the first Sunday of November
Enterasys C3 Configuration Guide 3-15
set summertime
set summertime
Use this command to enable or disable the daylight savings time function.
Syntax
set summertime {enable | disable} [zone]
Parameters
enable | disableEnables or disables the daylight savings time function.
zone(Optional) Applies a name to the daylight savings time settings.
Defaults
If a zone name is not specified, none will be applied.
Mode
Switch command, read-only.
Example
This example shows how to enable daylight savings time function:
C3(su)->set summertime enable
set summertime date
Use this command to configure specific dates to start and stop daylight savings time. These
settings will be non-recurring and will have to be reset annually.
Syntax
set summertime date start_month start_date start_year start_hr_min end_month
end_date end_year end_hr_min [offset_minutes]
Parameters
start_month Specifies the month of the year to start daylight savings time.
start_date Specifies the day of the month to start daylight savings time.
start_year Specifies the year to start daylight savings time.
start_hr_minSpecifies the time of day to start daylight savings time. Format is hh:mm.
end_monthSpecifies the month of the year to end daylight savings time.
end_dateSpecifies the day of the month to end daylight savings time.
end_yearSpecifies the year to end daylight savings time.
end_hr_minSpecifies the time of day to end daylight savings time. Format is hh:mm.
offset_minutes(Optional) Specifies the amount of time in minutes to offset daylight
Defaults
If an offset is not specified, none will be applied.
3-16 Basic Configuration
savings time from the non-daylight savings time system setting. Valid
values are 1 - 1440.
Mode
Switch command, read-write.
Example
This example shows how to set a daylight savings time start date of April 4, 2004 at 2 a.m. and an
ending date of October 31, 2004 at 2 a.m. with an offset time of one hour:
C3(su)->set summertime date April 4 2004 02:00 October 31 2004 02:00 60
set summertime recurring
Use this command to configure recurring daylight savings time settings. These settings will start
and stop daylight savings time at the specified day of the month and hour each year and will not
have to be reset annually.
start_week Specifies the week of the month to restart daylight savings time. Valid
values are: first, second, third, fourth, and last.
start_day Specifies the day of the week to restart daylight savings time.
start_hr_minSpecifies the time of day to restart daylight savings time. Format is
hh:mm.
end_weekSpecifies the week of the month to end daylight savings time.
end_daySpecifies the day of the week to end daylight savings time.
end_hr_minSpecifies the time of day to end daylight savings time. Format is hh:mm.
offset_minutes(Optional) Specifies the amount of time in minutes to offset daylight
savings time from the non-daylight savings time system setting. Valid
values are 1 - 1440.
Defaults
If an offset is not specified, none will be applied.
Mode
Switch command, read-write.
Example
This example shows how set daylight savings time to recur starting on the first Sunday of April at
2 a.m. and ending the last Sunday of October at 2 a.m. with an offset time of one hour:
C3(su)->set summertime recurring first Sunday April 02:00 last Sunday October
02:00 60
Enterasys C3 Configuration Guide 3-17
clear summertime
clear summertime
Use this command to clear the daylight savings time configuration.
Syntax
clear summertime
Parameters
None.
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to clear the daylight savings time configuration:
C3(su)->clear summertime
set prompt
Use this command to modify the command prompt.
Syntax
set prompt prompt_string
Parameters
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to set the command prompt to Switch 1:
prompt_stringSpecifies a text string for the command prompt.
Note: A prompt string containing a space in the text must be enclosed in quotes as
shown in the example below.
C3(su)->set prompt “Switch 1”
Switch 1(su)->
3-18 Basic Configuration
show banner
Use this command to show the login banner or message of the day banner. The login banner
displays before session login, and the message of the day banner displays after session login.
Syntax
show banner {login | motd}
Parameters
loginShow the message banner displayed before session login.
motdShow the message of the day banner displayed after session login.
Defaults
None.
Mode
Switch command, read-only.
Usage
show banner
A login banner causes a prompt to display when a user logs in to the system, requiring the user to
verify y/n before the login will continue. The acknowledgement is logged in the audit log in
association with the user’s login name. For more information, see “set banner” on page 3-19.
A message of the day banner is displayed after a user has logged in.
Example
This example shows how to display the message of the day banner:
C3(rw)->show banner motd
This system belongs to XYZ Corporation.
Use of this system is strictly limited to authorized personnel.
set banner
Use this command to set a login banner or message of the day banner.
Syntax
set banner {login | motd} message
Parameters
loginSpecifies that the banner message being configured is a login banner.
motdSpecifies that the banner message being configured is a message of the
day banner.
messageSpecifies a message of the day. This is a text string that needs to be in
double quotes if any spaces are used. Use a \n for a new line and \t for a
tab (eight spaces). The message can be up to 2048 characters in length.
Enterasys C3 Configuration Guide 3-19
clear banner
Defaults
None.
Mode
Switch command, read-write
Usage
A login banner is displayed prior to session login. When configured, a login banner will cause a
prompt to display which requires the user to verify y/n before the login will continue. These
acknowledgements are recoded in the audit log in association with the user’s login name.
For example, if the login banner is configured as "By proceeding with this login you are verifying
that you are an Enterasys employee and authorized to use this system.", the following will display
prior to entering the login password:
By proceeding with this login you are verifying that you are an Enterasys
employee and authorized to use this system.
Proceed to login? (y/n) [n]?
For SSH sessions which do not allow for an acceptance prompt, the following message will be
added after the banner display and before the login prompt:
Entering a password constitutes your understanding of, and compliance with,the
preceding banner message.
A message of the day banner is displayed after session login.
Banner message text must be enclosed in beginning and ending double quotation marks. The
message itself cannot contain any additional double quotation marks. Use the \? Escape sequence
when ending a banner with a question mark to avoid the question mark being treated as a help
request.
Example
This example shows how to set the message of the day banner to read: “This system belongs to
XYZ Corporation. Use of this system is strictly limited to authorized personnel.”
C3(rw)->set banner motd "\tThis system belongs to XYZ Corporation.\nUse of this
system is strictly limited to authorized personnel."
clear banner
Use this command to clear the login banner or message of the day banner. to a blank string.
Syntax
clear banner {login | motd}
Parameters
loginSpecifies that the pre-session login message should be cleared.
motd Specifies that the message of the day banner should be cleared.
Defaults
None.
3-20 Basic Configuration
Mode
Switch command, read-write.
Example
This example shows how to clear the message of the day banner to a blank string:
C3(rw)->clear banner motd
show version
Use this command to display hardware and firmware information. Refer to “Downloading a
Firmware Image” on page 3-27 for instructions on how to download a firmware image.
Syntax
show version
Parameters
None.
Defaults
show version
None.
Mode
Switch command, read-only.
Example
This example shows how to display version information. Please note that you may see different
information displayed, depending on the type of hardware.
This example shows how to set the console port baud rate to 19200:
C3(su)->set console baud 19200
57600, and 115200.
set console vt100
Use this command to enable or disable VT100 terminal mode.
Syntax
set console vt100 {enable | disable)
3-26 Basic Configuration
Downloading a Firmware Image
Parameters
enableEnables VT100 terminal mode.
disableDisables VT100 terminal mode.
Defaults
VT100 terminal mode is disabled by default.
Mode
Switch mode, read-write, when security profile = normal.
Switch mode, super-user, when security profile = C2.
Usage
VT100 mode is required to support automatic console session termination on removal of the serial
connection (vs. timeout). This mode requires that the attached console device be running VT100
terminal emulation.
In VT100 mode, the switch polls for device status (using the appropriate VT100 escape sequence)
to detect an attached device, which requires that the attached device be running VT100 terminal
emulation. At any time, if the switch fails to get a status reply, an existing console session is
terminated.
On receipt of the first polled status response, the login banner is displayed if it is configured.
Example
This example enables VT100 mode.
C3(su)->set console vt100 enable
Downloading a Firmware Image
You can upgrade the operational firmware in the Enterasys C3 switch without physically opening
the switch or being in the same location. There are two ways to download firmware to the switch:
•Via TFTP or SFTP download. This procedure uses a TFTP or SFTP server connected to the
network and downloads the firmware using the TFTP or SFTP protocol. For details on how to
perform a TFTP or SFTP download using the copy command, refer to “copy” on page 3-41.
For information on setting TFTP timeout and retry parameters, refer to “set tftp timeout” on
page 3-43 and “set tftp retry” on page 3-44.
•Via the serial (console) port. This procedure is an out-of-band operation that copies the
firmware through the serial port to the switch. It should be used in cases when you cannot
connect the switch to perform the in-band copy download procedure via TFTP. Serial console
download has been successfully tested with the following applications:
–HyperTerminal Copyright 1999
–Tera Term Pro Version 2.3
Any other terminal applications may work but are not explicitly supported.
The C3 switch allows you to download and store dual images. The backup image can be
downloaded and selected as the startup image by using the commands described in this section.
Enterasys C3 Configuration Guide 3-27
Downloading a Firmware Image
Downloading from a TFTP or SFTP Server
To perform a TFTP or SFTP download, proceed as follows:
1.If you have not already done so, set the switch’s IP address using the set ip address command
as detailed in “set ip address” on page 3-4.
2.Download a new image file using the copy command as detailed in “copy” on page 3-41.
Downloading via the Serial Port
To download switch firmware via the serial (console) port, proceed as follows:
1.With the console port connected, power up the switch. A message similar to the following
displays.
Within 2 seconds, type 2 to select “Start Boot Menu”. Use “administrator” for the Password.
Version 06.61.xx 05-09-2012
Computing MD5 Checksum of operational code...
Select an option. If no selection in 2 seconds then
operational code will start.
Image Version Bytes.............0x30 0x2e 0x35 0x2e 0x30 0x2e 0x34 (x.xx.xx)
...
Operational code update completed successfully.
Verifying Operational Code CRC..... CRC is OK.
9.Press ENTER so the switch will complete the file transfer operation, displaying a fresh
prompt.
[Boot Menu] 2
10. Type 2 to display the baud rate selection screen again.
11. Type 4 set the switch baud rate to 9600. The following message displays:
Setting baud rate to 9600, you must change your terminal baud rate.
Enterasys C3 Configuration Guide 3-29
Downloading a Firmware Image
12. In your teminal emulation program, set the terminal baud rate to 9600.
–HyperTerminal: File > Properties > Configure > Bits per Second > Apply > OK > OK
–TeraTerm: Setup > Serial port > Baud rate > OK
13. Press ENTER so the switch will complete the baud rate change and display a fresh prompt.
[Boot Menu] 1
14. Type 1 to start the new operational code. A message similar to the following displays:
Operational Code Date: Tue Jun 29 08:34:05 2012
Uncompressing.....
15. After the switch comes back up, log in and confirm that the new image has been detected and
is now running. You can use either the “show boot system” command or the “dir” command.
C5(rw)->show boot system
Current system image to boot: c5-series_06.61.xx
C5(rw)->
Reverting to a Previous Image
In the event that you need to downgrade to a previous version of code, you can do so by
completing the following steps as described in this chapter.
Caution: Before reverting to a previous image, always back up your configuration by saving it to a
file (show config outfile on page 3-39). You can then copy the file to a remote location (copy on
page 3-41).
Note: You will not be able to peform these steps remotely unless you have remote console support.
1.Save your running configuration with the save config command.
2.Make a copy of the current configuration with the show config outfile configs/filename
command. Use the dir command to confirm that the file was created.
3.If desired, copy the file to a remote TFTP server with the copy command:
copyconfigs/filenametftp://server_ipaddr/filename
4.Load your previous version of code on the device, as described in “Downloading a Firmware
Image” (page 3-27).
5.Set this older version of code to be the boot code with the set boot system command (page 3-
31). When the system asks if you want to reset the device, specify no (n).
6.Reload the saved configuration onto the device with the configure command, described on
page 3-40.
7.Reboot the system using the reset command (page 3-47).
Caution: If you do not follow the steps above, you may lose remote connectivity to the switch.
3-30 Basic Configuration
Reviewing and Selecting a Boot Firmware Image
Reviewing and Selecting a Boot Firmware Image
Purpose
To display and set the image file the switch loads at startup. The C3 switch allows you to
download and store a backup image, which can be selected as the startup image by using the
commands described in this section.
Commands
For information about...Refer to page...
show boot system 3-31
set boot system 3-31
show boot system
Use this command to display the firmware image the switch loads at startup.
Syntax
show boot system
Parameters
None.
Defaults
None.
Mode
Switch command, read-only.
Example
This example shows how to display the switch’s boot firmware image:
C3(su)->show boot system
Current system image to boot: bootfile
set boot system
Use this command to set the firmware image the switch loads at startup.
Syntax
set boot system filename
Parameters
filenameSpecifies the name of the firmware image file.
Enterasys C3 Configuration Guide 3-31
Starting and Configuring Telnet
Defaults
None.
Mode
Switch command, read-write.
Usage
This command allows you to set the firmware image to be loaded at startup. You can choose to
reset the system to use the new firmware image immediately, or you can choose to only specify the
new image to be loaded the next time the switch is rebooted.
You can use the dir command to display the “Active” image and the “Boot” image, which will be
the image loaded at the next system reboot.
Example
This example shows how to set the boot firmware image file to be used at the next reboot of the
system, by answering “n” to the prompt. The dir command is then executed to display the Active
and Boot images.
Note: If you are changing the firmware image to a version earlier than the current version, refer to
“Reverting to a Previous Image” on page 3-30 for the correct steps to follow.
C3(su)->set boot system c3_06.61.03.0007
This command can optionally reset the system to boot the new image.
Do you want to reset now (y/n) [n]?n
To enable or disable Telnet, and to start a Telnet session to a remote host. The Enterasys C3 switch
allows a total of four inbound and / or outbound Telnet session to run simultaneously.
3-32 Basic Configuration
Commands
For information about...Refer to page...
show telnet 3-33
set telnet 3-33
telnet 3-34
show telnet
Use this command to display the status of Telnet on the switch.
Syntax
show telnet
Parameters
None.
Defaults
show telnet
Mode
Example
set telnet
Syntax
Parameters
None.
Switch command, read-only.
This example shows how to display Telnet status:
C3(su)->show telnet
Telnet inbound is currently: ENABLED
Telnet outbound is currently: ENABLED
Use this command to enable or disable Telnet on the switch.
set telnet {enable | disable} [inbound | outbound | all]
enable | disableEnables or disables Telnet services.
inbound |
outbound | all
(Optional) Specifies inbound service (the ability to Telnet to this switch),
outbound service (the ability to Telnet to other devices), or all (both
inbound and outbound).
Defaults
If not specified, both inbound and outbound Telnet service will be enabled.
Enterasys C3 Configuration Guide 3-33
telnet
telnet
Mode
Switch command, read-write.
Example
This example shows how to disable inbound and outbound Telnet services:
C3(su)->set telnet disable all
Disconnect all telnet sessions and disable now (y/n)? [n]: y
All telnet sessions have been terminated, telnet is now disabled.
Use this command to start a Telnet connection to a remote host. The Enterasys C3 switch allows a
total of four inbound and / or outbound Telnet session to run simultaneously.
Syntax
telnet host [port]
Parameters
hostSpecifies the name or IP address of the remote host.
port(Optional) Specifies the server port number.
Defaults
If not specified, the default port number 23 will be used.
Mode
Switch command, read-write.
Example
This example shows how to start a Telnet session to a host at 10.21.42.13:
C3(su)->telnet 10.21.42.13
Managing Switch Configuration and Files
Configuration Persistence Mode
The default state of configuration persistence mode is “auto,” which means that when CLI
configuration commands are entered, or when a configuration file stored on the switch is
executed, the configuration is saved to NVRAM automatically at the following intervals:
•On a standalone unit, the configuration is checked every two minutes and saved if there has
been a change.
•On a stack, the configuration is saved across the stack every 5 minutes if there has been a
change.
If you want to save a running configuration to NVRAM more often than the automatic intervals,
execute the save config command and wait for the system prompt to return. After the prompt
returns, the configuration will be persistent.
3-34 Basic Configuration
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.