Enterasys C3G124-24, Enterasys C3 Configuration Manual

Enterasys® C3
Stackable Switches
Configuration Guide
Firmware Version 6.61.xx.xxxx
P/N 9034313-12
Notice
Enterasys Networks reserves the right to make changes in specifications and other information contained in this document and its web site without prior notice. The reader should in all cases consult Enterasys Networks to determine whether any such changes have been made.
The hardware, firmware, or software described in this document is subject to change without notice.
IN NO EVENT SHALL ENTERASYS NETWORKS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS DOCUMENT, WEB SITE, OR THE INFORMATION CONTAINED IN THEM, EVEN IF ENTERASYS NETWORKS HAS BEEN ADVISED OF, KNEW OF, OR SHOULD HAVE KNOWN OF, THE POSSIBILITY OF SUCH DAMAGES.
Enterasys Networks, Inc. 50 Minuteman Road Andover, MA 01810
2012 Enterasys Networks, Inc. All rights reserved.
Part Number: 9034313-12 July 2012
ENTERASYS, ENTERASYS NETWORKS, ENTERASYS SECURE NETWORKS, ENTERASYS NETSIGHT, WEBVIEW, and any logos associated therewith, are trademarks or registered trademarks of Enterasys Networks, Inc. in the United States and other countries. For a complete list of Enterasys trademarks, see http://www.enterasys.com/company/trademarks.aspx.
All other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies.
Documentation URL: https://extranet.enterasys.com/downloads/
Version: Information in this guide refers to Ente rasys C3 firmware ver sion 6.61.xx.xxxx or
higher.
Enterasys Networks, Inc. Firmware License Agreement
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT,
CAREFULLY READ THIS LICENSE AGREEMENT.
This document is an agreement (“Agreement”) between the end user (“You”) and Enterasys Networks, Inc., on behalf of itself and its Affiliates (as hereinafter defined) (“Enterasys”) that sets forth Your rights and obligations with respect to the Enterasys software program/firmware (including any accompanying documentation, hardware or media) (“Program”) in the package and prevails over any additional, conflicting or inconsistent terms and conditions appearing on any purchase order or other document submitted by You. “Affiliate” means any person, partnership, corporation, limited liability company, other form of enterprise that directly or indirectly through one or more intermediaries, controls, or is controlled by, or is under common control with the party specified. This Agreement constitutes the entire understanding between the parties, with respect to the subject matter of this Agreement. The Program may be contained in firmware, chips or other media.
BY INSTALLING OR OTHERWISE USING THE PROGRAM, YOU REPRESENT THAT YOU ARE AUTHORIZED TO ACCEPT THESE TERMS ON BEHALF OF THE END USER (IF THE END USER IS AN ENTITY ON WHOSE BEHALF YOU ARE AUTHORIZED TO ACT, “YOU” AND “YOUR” SHALL BE DEEMED TO REFER TO SUCH ENTITY) AND THAT YOU AGREE THAT YOU ARE BOUND BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES, AMONG OTHER PROVISIONS, THE LICENSE, THE DISCLAIMER OF WARRANTY AND THE LIMITATION OF LIABILITY. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT OR ARE NOT AUTHORIZED TO ENTER INTO THIS AGREEMENT, ENTERASYS IS UNWILLING TO LICENSE THE PROGRAM TO YOU AND YOU AGREE TO RETURN THE UNOPENED PRODUCT TO ENTERASYS OR YOUR DEALER, IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE OF RECEIPT FOR A FULL REFUND.
IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT ENTERASYS NETWORKS, LEGAL DEPARTMENT AT (978) 684-1000.
You and Enterasys agree as follows:
1. LICENSE. You have the non-exclusive and non-transferable right to use only the one (1) copy of the Program provided in
this package subject to the terms and conditions of this Agreement.
2. RESTRICTIONS. Except as otherwise authorized in writing by Enterasys, You may not, nor may You permit any third party to:
(a) Reverse engineer, decompile, disassemble or modify the Program, in whole or in part, including for reasons of error
correction or interoperability, except to the extent expressly permitted by applicable law and to the extent the parties shall not be permitted by that applicable law, such rights are expressly excluded. Information necessary to achieve interoperability or correct errors is available from Enterasys upon request and upon payment of Enterasys’ applicable fee.
(b) Incorporate the Program in whole or in part, in any other product or create derivative works based on the Program, in
whole or in part.
(c) Publish, disclose, copy reproduce or transmit the Program, in whole or in part.
(d) Assign, sell, license, sublicense, rent, lease, encumber by way of security interest, pledge or otherwise transfer the
Program, in whole or in part.
(e) Remove any copyright, trademark, proprietary rights, disclaimer or warning notice included on or embedded in any
part of the Program.
3. APPLICABLE LAW. This Agreement shall be interpreted and governed under the laws and in the state and federal courts of the Commonwealth of Massachusetts without regard to its conflicts of laws provisions. You accept the personal jurisdiction and venue of the Commonwealth of Massachusetts courts. None of the 1980 United Nations Convention on the Limitation Period in the International Sale of Goods, and the Uniform Computer Information Transactions Act shall apply to this Agreement.
4. EXPORT RESTRICTIONS. You understand that Enterasys and its Affiliates are subject to regulation by agencies of the U.S. Government, including the U.S. Department of Commerce, which prohibit export or diversion of certain technical products to certain countries, unless a license to export the product is obtained from the U.S. Government or an exception from obtaining such license may be relied upon by the exporting party.
If the Program is exported from the United States pursuant to the License Exception CIV under the U.S. Export Administration Regulations, You agree that You are a civil end user of the Program and agree that You will use the Program for civil end uses only and not for military purposes.
If the Program is exported from the United States pursuant to the License Exception TSR under the U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in Section 1 or 2 of this Agreement, You agree not to (i) reexport or release the Program, the source code for the Program or technology to a national of a country in Country Groups D:1 or E:2 (Albania, Armenia, Azerbaijan, Belarus, Cambodia, Cuba, Georgia, Iraq, Kazakhstan, Laos, Libya, Macau,
ii
Moldova, Mongolia, North Korea, the People’s Republic of China, Russia, Tajikistan, Turkmenistan, Ukraine, Uzbekistan, Vietnam, or such other countries as may be designated by the United States Government), (ii) export to Country Groups D:1 or E:2 (as defined herein) the direct product of the Program or the technology, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a complete plant or any major component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List or is subject to State Department controls under the U.S. Munitions List.
5. UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Program (i) was developed solely at private expense; (ii) contains “restricted computer software” submitted with restricted rights in accordance with section 52.227-19 (a) through (d) of the Commercial Computer Software-Restricted Rights Clause and its successors, and (iii) in all respects is proprietary data belonging to Enterasys and/or its suppliers. For Department of Defense units, the Program is considered commercial computer software in accordance with DFARS section 227.7202-3 and its successors, and use, duplication, or disclosure by the U.S. Government is subject to restrictions set forth herein.
6. DISCLAIMER OF WARRANTY. EXCEPT FOR THOSE WARRANTIES EXPRESSLY PROVIDED TO YOU IN WRITING BY ENTERASYS, ENTERASYS DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT WITH RESPECT TO THE PROGRAM. IF IMPLIED WARRANTIES MAY NOT BE DISCLAIMED BY APPLICABLE LAW, THEN ANY IMPLIED WARRANTIES ARE LIMITED IN DURATION TO THIRTY (30) DAYS AFTER DELIVERY OF THE PROGRAM TO YOU.
7. LIMITATION OF LIABILITY. IN NO EVENT SHALL ENTERASYS OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM, EVEN IF ENTERASYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS FOREGOING LIMITATION SHALL APPLY REGARDLESS OF THE CAUSE OF ACTION UNDER WHICH DAMAGES ARE SOUGHT.
THE CUMULATIVE LIABILITY OF ENTERASYS TO YOU FOR ALL CLAIMS RELATING TO THE PROGRAM, IN CONTRACT, TORT OR OTHERWISE, SHALL NOT EXCEED THE TOTAL AMOUNT OF FEES PAID TO ENTERASYS BY YOU FOR THE RIGHTS GRANTED HEREIN.
8. AUDIT RIGHTS. You hereby acknowledge that the intellectual property rights associated with the Program are of critical value to Enterasys, and, accordingly, You hereby agree to maintain complete books, records and accounts showing (i) license fees due and paid, and (ii) the use, copying and deployment of the Program. You also grant to Enterasys and its authorized representatives, upon reasonable notice, the right to audit and examine during Your normal business hours, Your books, records, accounts and hardware devices upon which the Program may be deployed to verify compliance with this Agreement, including the verification of the license fees due and paid Enterasys and the use, copying and deployment of the Program. Enterasys’ right of examination shall be exercised reasonably, in good faith and in a manner calculated to not unreasonably interfere with Your business. In the event such audit discovers non-compliance with this Agreement, including copies of the Program made, used or deployed in breach of this Agreement, You shall promptly pay to Enterasys the appropriate license fees. Enterasys reserves the right, to be exercised in its sole discretion and without prior notice, to terminate this license, effective immediately, f
or failure to comply with this Agreement. Upon any such termination, You shall immediately cease all use of the Program and shall return to Enterasys the Program and all copies of the Program.
9. OWNERSHIP. This is a license agreement and not an agreement for sale. You acknowledge and agree that the Program constitutes trade secrets and/or copyrighted material of Enterasys and/or its suppliers. You agree to implement reasonable security measures to protect such trade secrets and copyrighted material. All right, title and interest in and to the Program shall remain with Enterasys and/or its suppliers. All rights not specifically granted to You shall be reserved to Enterasys.
10. ENFORCEMENT. You acknowledge and agree that any breach of Sections 2, 4, or 9 of this Agreement by You may cause Enterasys irreparable damage for which recovery of money damages would be inadequate, and that Enterasys may be entitled to seek timely injunctive relief to protect Enterasys’ rights under this Agreement in addition to any and all remedies available at law.
11. ASSIGNMENT. You may not assign, transfer or sublicense this Agreement or any of Your rights or obligations under this Agreement, except that You may assign this Agreement to any person or entity which acquires substantially all of Your stock assets. Enterasys may assign this Agreement in its sole discretion. This Agreement shall be binding upon and inure to the benefit of the parties, their legal representatives, permitted transferees, successors and assigns as permitted by this Agreement. Any attempted assignment, transfer or sublicense in violation of the terms of this Agreement shall be void and a breach of this Agreement.
12. WAIVER. A waiver by Enterasys of a breach of any of the terms and conditions of this Agreement must be in writing and will not be construed as a waiver of any subsequent breach of such term or condition. Enterasys’ failure to enforce a term upon Your breach of such term shall not be construed as a waiver of Your breach or prevent enforcement on any other occasion.
iii
13. SEVERABILITY. In the event any provision of this Agreement is found to be invalid, illegal or unenforceable, the validity, legality and enforceability of any of the remaining provisions shall not in any way be affected or impaired thereby, and that provision shall be reformed, construed and enforced to the maximum extent permissible. Any such invalidity, illegality, or unenforceability in any jurisdiction shall not invalidate or render illegal or unenforceable such provision in any other jurisdiction.
14. TERMINATION. Enterasys may terminate this Agreement immediately upon Your breach of any of the terms and conditions of this Agreement. Upon any such termination, You shall immediately cease all use of the Program and shall return to Enterasys the Program and all copies of the Program.
iv
Contents
About This Guide
Using This Guide ..........................................................................................................................................xxxv
Structure of This Guide ................................................................................................................................. xxxv
Related Documents .....................................................................................................................................xxxvii
Conventions Used in This Guide ................................................................................................................xxxviii
Getting Help ................................................................................................................................................. xxxix
Chapter 1: Introduction
Enterasys C3 CLI Overview ...........................................................................................................................1-1
Switch Management Methods ............... ... .... ... ... ... ... .... ... ... ... .... ... .......................................... ... .....................1-1
Factory Default Settings .................................................................................................................................1-2
Using the Command Line Interface ................................................................................................................ 1-6
Starting a CLI Session .............................................................................................................................1-6
Logging In ................................................................................................................................................1-7
Navigating the Command Line Interface ..................................................................................................1-8
Chapter 2: Configuring Switches in a Stack
About Enterasys C3 Switch Operation in a Stack ..........................................................................................2-1
Installing a New Stackable System of Up to Eight Units ................................................................................2-2
Installing Previously-Configured Systems in a Stack ..................................................................................... 2-3
Adding a New Unit to an Existing Stack ......................................................................................................... 2-3
Creating a Virtual Switch Configuration .......................................................................................................... 2-3
Considerations About Using Clear Config in a Stack ......................................... .... ... ... ... .... ... ........................2-4
Issues Related to Mixed Type Stacks ............................................................................................................2-4
Feature Support ...................................................................................................................................... 2-4
Configuration ................................... .................................... ................................... .................................. 2-4
Stacking Configuration and Management Commands ................................................................................... 2-5
Purpose ................................. ............................. ................................. .....................................................2-5
Commands ...................................... .................................... ...................................... ...............................2-5
show switch ........................................................................................................................................2-5
show switch switchtype ......................................................................................................................2-7
show switch stack-ports......................................................................................................................2-8
set switch............................................................................................................................................2-8
set switch copy-fw ..............................................................................................................................2-9
set switch description .......................................................................................................................2-10
set switch movemanagement...........................................................................................................2-10
set switch member............................................................................................................................2-11
clear switch member.........................................................................................................................2-11
set switch stack-ports length ............................................................................................................2-12
clear switch stack-ports length .........................................................................................................2-13
show switch stack-ports length.........................................................................................................2-13
Chapter 3: Basic Configuration
Quick Start Setup Commands ........................................................................................................................3-1
Setting Basic Switch Properties ...................................................................................................................... 3-2
Purpose ................................. ............................. ................................. .....................................................3-2
Commands ...................................... .................................... ...................................... ...............................3-2
show ip address..................................................................................................................................3-3
set ip address.....................................................................................................................................3-4
clear ip address..................................................................................................................................3-5
v
show ip protocol..................................................................................................................................3-5
set ip protocol.....................................................................................................................................3-6
show ip route ......................................................................................................................................3-6
show system.......................................................................................................................................3-7
show system hardware.......................................................................................................................3-8
show system utilization.......................................................................................................................3-9
set system utilization ........................................................................................................................3-10
clear system utilization .....................................................................................................................3-11
show system enhancedbuffermode..................................................................................................3-11
set system enhancedbuffermode .....................................................................................................3-12
set system temperature....................................................................................................................3-12
clear system temperature.................................................................................................................3-13
show time .........................................................................................................................................3-14
set time.............................................................................................................................................3-14
show summertime ............................................................................................................................3-15
set summertime................................................................................................................................3-16
set summertime date........................................................................................................................3-16
set summertime recurring.................................................................................................................3-17
clear summertime.............................................................................................................................3-18
set prompt.........................................................................................................................................3-18
show banner.....................................................................................................................................3-19
set banner.........................................................................................................................................3-19
clear banner......................................................................................................................................3-20
show version.....................................................................................................................................3-21
set system name ..............................................................................................................................3-22
set system location...........................................................................................................................3-22
set system contact............................................................................................................................3-23
set width ...........................................................................................................................................3-23
set length..........................................................................................................................................3-24
show logout ......................................................................................................................................3-24
set logout .........................................................................................................................................3-25
show console....................................................................................................................................3-25
set console baud ..............................................................................................................................3-26
set console vt100..............................................................................................................................3-26
Downloading a Firmware Image ................................................................................................................... 3-27
Downloading from a TFTP or SFTP Server ...........................................................................................3-28
Downloading via the Serial Port .............................................................................................................3-28
Reverting to a Previous Image ............................................................................................................... 3-30
Reviewing and Selecting a Boot Firmware Image ........................................................................................ 3-31
Purpose ................................. ............................. ................................. ...................................................3-31
Commands ...................................... .................................... ...................................... .............................3-31
show boot system.............................................................................................................................3-31
set boot system ................................................................................................................................3-31
Starting and Configuring Telnet ....................................................................................................................3-32
Purpose ................................. ............................. ................................. ...................................................3-32
Commands ...................................... .................................... ...................................... .............................3-33
show telnet .......................................................................................................................................3-33
set telnet...........................................................................................................................................3-33
telnet.................................................................................................................................................3-34
Managing Switch Configuration and Files ....................................................................................................3-34
Configuration Persistence Mode ............ ... ... ... ....................................................................................... 3-34
Purpose ................................. ............................. ................................. ...................................................3-35
Commands ...................................... .................................... ...................................... .............................3-35
show snmp persistmode...................................................................................................................3-35
set snmp persistmode ......................................................................................................................3-36
save config .......................................................................................................................................3-37
vi
dir......................................................................................................................................................3-37
show file............................................................................................................................................3-38
show config.......................................................................................................................................3-39
configure...........................................................................................................................................3-40
copy..................................................................................................................................................3-41
delete................................................................................................................................................3-42
show tftp settings..............................................................................................................................3-42
set tftp timeout..................................................................................................................................3-43
clear tftp timeout...............................................................................................................................3-43
set tftp retry.......................................................................................................................................3-44
clear tftp retry....................................................................................................................................3-44
Clearing and Closing the CLI ........................................................................................................................3-45
Purpose ................................. ............................. ................................. ...................................................3-45
Commands ...................................... .................................... ...................................... .............................3-45
cls (clear screen) .... ... .......................................... ... .......................................... ................................3-45
exit....................................................................................................................................................3-46
Resetting the Switch .............................. ... .... .......................................... ... ...................................................3-46
Purpose ................................. ............................. ................................. ...................................................3-46
Commands ...................................... .................................... ...................................... .............................3-46
reset..................................................................................................................................................3-47
reset at..............................................................................................................................................3-47
reset in..............................................................................................................................................3-48
show reset ........................................................................................................................................3-49
clear config.......................................................................................................................................3-49
Using and Configuring WebView .................................................................................................................. 3-50
Purpose ................................. ............................. ................................. ...................................................3-50
Commands ...................................... .................................... ...................................... .............................3-50
show webview ..................................................................................................................................3-51
set webview......................................................................................................................................3-51
show ssl............................................................................................................................................3-52
set ssl ...............................................................................................................................................3-52
Gathering Technical Support Information .............................. .... ... ... ... .... ... ... ... ... .... ... ... ... .... ... ... ... ................3-53
Purpose ................................. ............................. ................................. ...................................................3-53
Command ..................................... ... ... .... ... ... .......................................... ................................................ 3-53
show support ....................................................................................................................................3-53
Configuring Hostprotect ................................................................................................................................3-54
Purpose ................................. ............................. ................................. ...................................................3-54
Commands ...................................... .................................... ...................................... .............................3-54
show system hostprotect..................................................................................................................3-54
set system hostprotect......................................................................................................................3-55
clear system hostprotect...................................................................................................................3-55
Chapter 4: Activating Licensed Features
License Key Field Descriptions ......................................................................................................................4-1
Licensing Procedure in a Stack Environment .................. .................................................... ...........................4-1
Adding a New Member to a Licensed Stack ............................................................................................4-2
Clearing, Showing, and Applying Licenses ....................................................................................................4-2
Commands ...................................... .................................... ...................................... ...............................4-2
set license...........................................................................................................................................4-3
show license.......................................................................................................................................4-4
clear license........................................................................................................................................4-4
Chapter 5: Setting User Accounts and Passwords
User Account and Password Management ....................................................................................................5-1
Features ....................................... ................................................................ ............................................5-1
vii
Defaults ................................. .............................................................. .....................................................5-4
Commands .....................................................................................................................................................5-5
show system login ..............................................................................................................................5-5
set system login..................................................................................................................................5-6
clear system login...............................................................................................................................5-8
set password ......................................................................................................................................5-9
set system password-resetbutton.....................................................................................................5-10
show system password ....................................................................................................................5-10
set system password........................................................................................................................5-13
clear system password.....................................................................................................................5-15
show system lockout ........................................................................................................................5-17
set system lockout............................................................................................................................5-18
Chapter 6: Management Authentication Notification MIB Commands
show mgmt-auth-notify .......................................................................................................................6-1
set mgmt-auth-notify...........................................................................................................................6-2
clear mgmt-auth-notify........................................................................................................................6-3
Chapter 7: Setting the Security Mode
About the Security Mode ................................................................................................................................ 7-1
Additional Security Feature Information ......................................................................................................... 7-2
Commands .....................................................................................................................................................7-2
set security profile...............................................................................................................................7-2
clear security profile............................................................................................................................7-3
show security profile...........................................................................................................................7-3
Chapter 8: Configuring System Power and PoE
Commands .....................................................................................................................................................8-1
show inlinepower................................................................................................................................8-1
set inlinepower threshold....................................................................................................................8-2
set inlinepower trap ............................................................................................................................8-3
set inlinepower detectionmode...........................................................................................................8-3
show port inlinepower.........................................................................................................................8-4
set port inlinepower ............................................................................................................................8-5
Chapter 9: Transmit Queue Monitoring Configuration
Transmit Queue Monitoring Overview ............................................................................................................ 9-1
Commands .....................................................................................................................................................9-1
set txqmonitor.....................................................................................................................................9-2
set txqmonitor downtime.....................................................................................................................9-2
set txqmonitor minrate........................................................................................................................9-3
set txqmonitor threshold .....................................................................................................................9-3
clear txqmonitor..................................................................................................................................9-4
show txqmonitor .................................................................................................................................9-5
show txqmonitor flowcontrol ...............................................................................................................9-6
show txqmonitor port ..........................................................................................................................9-6
Chapter 10: Discovery Protocol Configuration
Configuring CDP ........................................................................................................................................... 10-1
Purpose ................................. ............................. ................................. ...................................................10-1
Commands ...................................... .................................... ...................................... .............................10-1
show cdp ..........................................................................................................................................10-2
set cdp state .....................................................................................................................................10-3
set cdp auth......................................................................................................................................10-4
viii
set cdp interval .................................................................................................................................10-4
set cdp hold-time ..............................................................................................................................10-5
clear cdp...........................................................................................................................................10-5
show neighbors ................................................................................................................................10-6
Configuring Cisco Discovery Protocol .......................................................................................................... 10-7
Purpose ................................. ............................. ................................. ...................................................10-7
Commands ...................................... .................................... ...................................... .............................10-7
show ciscodp....................................................................................................................................10-7
show ciscodp port info......................................................................................................................10-8
set ciscodp status.............................................................................................................................10-9
set ciscodp timer...............................................................................................................................10-9
set ciscodp holdtime.......................................................................................................................10-10
set ciscodp port ..............................................................................................................................10-10
clear ciscodp...................................................................................................................................10-12
Configuring Link Layer Discovery Protocol and LLDP-MED ...................................................................... 10-13
Overview ..............................................................................................................................................10-13
Configuration Tasks ..................... ... ... .... .......................................... ....................................................10-13
Commands ...................................... .................................... ...................................... ...........................10-14
show lldp.........................................................................................................................................10-15
show lldp port status.......................................................................................................................10-15
show lldp port trap ..........................................................................................................................10-16
show lldp port tx-tlv.........................................................................................................................10-17
show lldp port location-info.............................................................................................................10-17
show lldp port local-info..................................................................................................................10-18
show lldp port remote-info ..............................................................................................................10-21
show lldp port network-policy .........................................................................................................10-22
set lldp tx-interval............................................................................................................................10-23
set lldp hold-multiplier.....................................................................................................................10-24
set lldp trap-interval ........................................................................................................................10-24
set lldp med-fast-repeat..................................................................................................................10-25
set lldp port status ..........................................................................................................................10-25
set lldp port trap..............................................................................................................................10-26
set lldp port med-trap......................................................................................................................10-26
set lldp port location-info.................................................................................................................10-27
set lldp port tx-tlv ............................................................................................................................10-28
set lldp port network-policy.............................................................................................................10-29
clear lldp.........................................................................................................................................10-31
clear lldp port status .......................................................................................................................10-31
clear lldp port trap...........................................................................................................................10-32
clear lldp port med-trap...................................................................................................................10-32
clear lldp port location-info..............................................................................................................10-33
clear lldp port network-policy..........................................................................................................10-33
clear lldp port tx-tlv .........................................................................................................................10-34
Chapter 11: Port Configuration
Port Configuration Summary .............. ... ... .... ... ... ... ... .... .......................................... ... ... ... .... ... ......................11-1
Port String Syntax Used in the CLI ........................................ ... ... .... ... ... ................................................11-1
Reviewing Port Status .................................................................................................................................. 11-2
Purpose ................................. ............................. ................................. ...................................................11-2
Commands ...................................... .................................... ...................................... .............................11-2
show port..........................................................................................................................................11-2
show port status ...............................................................................................................................11-3
show port counters ...........................................................................................................................11-4
clear port counters............................................................................................................................11-5
show port cablestatus.......................................................................................................................11-6
ix
Disabling / Enabling and Naming Ports ........................................................................................................ 11-7
Purpose ................................. ............................. ................................. ...................................................11-7
Commands ...................................... .................................... ...................................... .............................11-7
set port disable .................................................................................................................................11-7
set port enable..................................................................................................................................11-8
show port alias..................................................................................................................................11-8
set port alias.....................................................................................................................................11-9
Setting Speed and Duplex Mode ................................................................................................................ 11-10
Purpose ................................. ............................. ................................. .................................................11-10
Commands ...................................... .................................... ...................................... ...........................11-10
show port speed .............................................................................................................................11-10
set port speed.................................................................................................................................11-11
show port duplex ............................................................................................................................11-11
set port duplex................................................................................................................................11-12
Enabling / Disabling Jumbo Frame Support ...............................................................................................11-13
Purpose ................................. ............................. ................................. .................................................11-13
Commands ...................................... .................................... ...................................... ...........................11-13
show port jumbo .............................................................................................................................11-13
set port jumbo.................................................................................................................................11-14
clear port jumbo..............................................................................................................................11-14
Setting Auto-Negotiation and Advertised Ability .........................................................................................11-15
Purpose ................................. ............................. ................................. .................................................11-15
Commands ...................................... .................................... ...................................... ...........................11-15
show port negotiation .....................................................................................................................11-15
set port negotiation.........................................................................................................................11-16
show port advertise ........................................................................................................................11-16
set port advertise............................................................................................................................11-17
clear port advertise.........................................................................................................................11-18
show port mdix ...............................................................................................................................11-19
set port mdix...................................................................................................................................11-19
Setting Flow Control ................. ... .... ... ... ... .......................................... .... ... ... ... ........................................... 11-21
Purpose ................................. ............................. ................................. .................................................11-21
Commands ...................................... .................................... ...................................... ...........................11-21
show flowcontrol.............................................................................................................................11-21
set flowcontrol.................................................................................................................................11-21
Setting Port Link Traps and Link Flap Detection ........................................................................................11-23
Purpose ................................. ............................. ................................. .................................................11-23
Commands ...................................... .................................... ...................................... ...........................11-23
show port trap.................................................................................................................................11-23
set port trap ....................................................................................................................................11-24
show linkflap...................................................................................................................................11-24
set linkflap globalstate ....................................................................................................................11-27
set linkflap portstate........................................................................................................................11-27
set linkflap interval..........................................................................................................................11-28
set linkflap action............................................................................................................................11-28
clear linkflap action.........................................................................................................................11-29
set linkflap threshold.......................................................................................................................11-30
set linkflap downtime ......................................................................................................................11-30
clear linkflap down............................................................................................................
..............11-31
clear linkflap....................................................................................................................................11-31
show newaddrtrap ..........................................................................................................................11-32
set newaddrtrap..............................................................................................................................11-32
Configuring Broadcast Suppression ........................................................................................................... 11-34
Purpose ................................. ............................. ................................. .................................................11-34
Commands ...................................... .................................... ...................................... ...........................11-34
show port broadcast .......................................................................................................................11-34
x
set port broadcast...........................................................................................................................11-35
clear port broadcast........................................................................................................................11-35
Port Mirroring ................................... ... .......................................... ..............................................................11-37
Mirroring Features ................................................................................................................................11-37
Remote Port Mirroring ..........................................................................................................................11-37
Configuring SMON MIB Port Mirroring ................................................................................................. 11-38
Purpose ................................. ............................. ................................. .................................................11-39
Commands ...................................... .................................... ...................................... ...........................11-39
show port mirroring.........................................................................................................................11-39
set port mirroring ............................................................................................................................11-40
clear port mirroring .........................................................................................................................11-41
set mirror vlan.................................................................................................................................11-41
clear mirror vlan..............................................................................................................................11-42
Link Aggregation Control Protocol (LACP) ................................................................................................. 11-44
LACP Operation ................................................................................................................................... 11-44
Flexible Link Aggregation Groups ........................................................................................................11-45
LACP Terminology ............................................................................................................................... 11-45
Enterasys C3 Usage Considerations ................................................................................................... 11-46
Commands ...................................... .................................... ...................................... ...........................11-47
show lacp........................................................................................................................................11-47
set lacp...........................................................................................................................................11-49
set lacp asyspri...............................................................................................................................11-49
set lacp aadminkey.........................................................................................................................11-50
clear lacp........................................................................................................................................11-50
set lacp static..................................................................................................................................11-51
clear lacp static...............................................................................................................................11-52
set lacp singleportlag......................................................................................................................11-52
clear lacp singleportlag...................................................................................................................11-53
show port lacp ................................................................................................................................11-53
set port lacp....................................................................................................................................11-55
clear port lacp.................................................................................................................................11-57
set lacp groups...............................................................................................................................11-58
clear lacp groups............................................................................................................................11-59
show lacp groups............................................................................................................................11-59
Configuring Protected Ports .......................................................................................................................11-61
Protected Port Operation .....................................................................................................................11-61
Commands ...................................... .................................... ...................................... ...........................11-61
set port protected............................................................................................................................11-61
show port protected........................................................................................................................11-62
clear port protected.........................................................................................................................11-62
set port protected name..................................................................................................................11-63
show port protected name..............................................................................................................11-63
clear port protected name...............................................................................................................11-64
Chapter 12: SNMP Configuration
SNMP Configuration Summary ....................................................................................................................12-1
SNMPv1 and SNMPv2c ......................................................................................................................... 12-2
SNMPv3 ....................................... ................................................................ ..........................................12-2
About SNMP Security Models and Levels ............................................................................................. 12-2
Using SNMP Contexts to Access Specific MIBs ....................................................................................12-3
Configuration Considerations .................................... ... ... .... .......................................... ... ... ... ................12-3
Reviewing SNMP Statistics .......................................................................................................................... 12-3
Purpose ................................. ............................. ................................. ...................................................12-3
Commands ...................................... .................................... ...................................... .............................12-4
show snmp counters.........................................................................................................................12-4
xi
Configuring SNMP Users, Groups, and Communities .................................................................................. 12-7
Purpose ................................. ............................. ................................. ...................................................12-7
Commands ...................................... .................................... ...................................... .............................12-7
show snmp user ...............................................................................................................................12-7
set snmp user...................................................................................................................................12-8
clear snmp user..............................................................................................................................12-10
show snmp group ...........................................................................................................................12-10
set snmp group...............................................................................................................................12-11
clear snmp group............................................................................................................................12-12
show snmp community...................................................................................................................12-13
set snmp community.......................................................................................................................12-13
clear snmp community....................................................................................................................12-14
Configuring SNMP Access Rights .............................................................................................................. 12-15
Purpose ................................. ............................. ................................. .................................................12-15
Commands ...................................... .................................... ...................................... ...........................12-15
show snmp access .........................................................................................................................12-15
set snmp access.............................................................................................................................12-17
clear snmp access..........................................................................................................................12-18
Configuring SNMP MIB Views ....................................................................................................................12-19
Purpose ................................. ............................. ................................. .................................................12-19
Commands ...................................... .................................... ...................................... ...........................12-19
show snmp view .............................................................................................................................12-19
show snmp context.........................................................................................................................12-20
set snmp view.................................................................................................................................12-21
clear snmp view..............................................................................................................................12-21
Configuring SNMP Target Parameters ....................................................................................................... 12-22
Purpose ................................. ............................. ................................. .................................................12-22
Commands ...................................... .................................... ...................................... ...........................12-22
show snmp targetparams ...............................................................................................................12-22
set snmp targetparams...................................................................................................................12-24
clear snmp targetparams................................................................................................................12-25
Configuring SNMP Target Addresses ........................................................................................................12-25
Purpose ................................. ............................. ................................. .................................................12-25
Commands ...................................... .................................... ...................................... ...........................12-25
show snmp targetaddr....................................................................................................................12-25
set snmp targetaddr........................................................................................................................12-26
clear snmp targetaddr.....................................................................................................................12-28
Configuring SNMP Notification Parameters ...............................................................................................12-28
About SNMP Notify Filters ...................................................................................................................12-28
Purpose ................................. ............................. ................................. .................................................12-28
Commands ...................................... .................................... ...................................... ...........................12-29
show snmp notify............................................................................................................................12-29
set snmp notify ...............................................................................................................................12-30
clear snmp notify ............................................................................................................................12-31
show snmp notifyfilter.....................................................................................................................12-31
set snmp notifyfilter.........................................................................................................................12-32
clear snmp notifyfilter......................................................................................................................12-33
show snmp notifyprofile..................................................................................................................12-33
set snmp notifyprofile......................................................................................................................12-34
clear snmp notifyprofile...................................................................................................................12-35
Creating a Basic SNMP Trap Configuration ...............................................................................................12-35
Example ...............................................................................................................................................12-36
Configuring the SNMP Management Interface ........................................................................................... 12-37
Purpose ................................. ............................. ................................. .................................................12-37
Commands ...................................... .................................... ...................................... ...........................12-37
show snmp interface.......................................................................................................................12-37
xii
set snmp interface ..........................................................................................................................12-38
clear snmp interface .......................................................................................................................12-39
Configuring the SNMP Engine ID ............................................................................................................... 12-39
Purpose ................................. ............................. ................................. .................................................12-39
Commands ...................................... .................................... ...................................... ...........................12-39
show snmp engineid.......................................................................................................................12-40
set snmp engineid ..........................................................................................................................12-40
clear snmp engineid .......................................................................................................................12-41
Chapter 13: Spanning Tree Configuration
Spanning Tree Configuration Summary ................ .......................................................................................13-1
Overview: Single, Rapid, and Multiple Spanning Tree Protocols ...........................................................13-1
Spanning Tree Features ........................................................................................................................ 13-2
Loop Protect .... .......................................... ... .......................................... ... ............................................. 13-2
Multisource Detection ............................. ... ... .......................................... ................................................ 13-3
Configuring Spanning Tree Bridge Parameters ............................................................................................ 13-4
Purpose ................................. ............................. ................................. ...................................................13-4
Commands ...................................... .................................... ...................................... .............................13-4
show spantree stats..........................................................................................................................13-6
set spantree......................................................................................................................................13-8
show spantree version......................................................................................................................13-8
set spantree version .........................................................................................................................13-9
clear spantree version ......................................................................................................................13-9
show spantree bpdu-forwarding .....................................................................................................13-10
set spantree bpdu-forwarding.........................................................................................................13-10
show spantree bridgeprioritymode .................................................................................................13-11
set spantree bridgeprioritymode.....................................................................................................13-11
clear spantree bridgeprioritymode..................................................................................................13-12
show spantree mstilist ....................................................................................................................13-12
set spantree msti ............................................................................................................................13-13
clear spantree msti .........................................................................................................................13-13
show spantree mstmap ..................................................................................................................13-14
set spantree mstmap......................................................................................................................13-14
clear spantree mstmap...................................................................................................................13-15
show spantree vlanlist ....................................................................................................................13-15
show spantree mstcfgid..................................................................................................................13-16
set spantree mstcfgid .....................................................................................................................13-17
clear spantree mstcfgid ..................................................................................................................13-17
set spantree priority........................................................................................................................13-18
clear spantree priority.....................................................................................................................13-18
set spantree hello ...........................................................................................................................13-19
clear spantree hello ........................................................................................................................13-19
set spantree maxage......................................................................................................................13-20
clear spantree maxage...................................................................................................................13-20
set spantree fwddelay.....................................................................................................................13-21
clear spantree fwddelay..................................................................................................................13-21
show spantree backuproot .............................................................................................................13-22
set spantree backuproot.................................................................................................................13-22
clear spantree backuproot..............................................................................................................13-23
show spantree tctrapsuppress........................................................................................................13-24
set spantree tctrapsuppress ...........................................................................................................13-24
clear spantree tctrapsuppress ........................................................................................................13-25
set spantree protomigration............................................................................................................13-25
show spantree spanguard ........................................................................................................
set spantree spanguard..................................................................................................................13-26
......13-26
xiii
clear spantree spanguard...............................................................................................................13-27
show spantree spanguardtimeout ..................................................................................................13-27
set spantree spanguardtimeout......................................................................................................13-28
clear spantree spanguardtimeout...................................................................................................13-28
show spantree spanguardlock........................................................................................................13-29
clear / set spantree spanguardlock.................................................................................................13-29
show spantree spanguardtrapenable .............................................................................................13-30
set spantree spanguardtrapenable.................................................................................................13-30
clear spantree spanguardtrapenable..............................................................................................13-31
show spantree legacypathcost .......................................................................................................13-31
set spantree legacypathcost...........................................................................................................13-32
clear spantree legacypathcost........................................................................................................13-32
show spantree autoedge ................................................................................................................13-33
set spantree autoedge....................................................................................................................13-33
clear spantree autoedge.................................................................................................................13-34
show spantree debug .....................................................................................................................13-34
clear spantree debug......................................................................................................................13-35
Configuring Spanning Tree Port Parameters .................. ... .......................................... ... .... ... ... .................13-37
Purpose ................................. ............................. ................................. .................................................13-37
Commands ...................................... .................................... ...................................... ...........................13-37
set spantree portadmin...................................................................................................................13-37
clear spantree portadmin................................................................................................................13-38
show spantree portadmin ...............................................................................................................13-38
show spantree portpri.....................................................................................................................13-39
set spantree portpri.........................................................................................................................13-39
clear spantree portpri......................................................................................................................13-40
show spantree adminpathcost........................................................................................................13-41
set spantree adminpathcost ...........................................................................................................13-41
clear spantree adminpathcost ........................................................................................................13-42
show spantree adminedge .............................................................................................................13-42
set spantree adminedge.................................................................................................................13-43
clear spantree adminedge..............................................................................................................13-43
show spantree operedge................................................................................................................13-44
Configuring Spanning Tree Loop Protect Parameters ............... ... ... ... .... ... ... ... ... .... ... ... .............................. 13-45
Purpose ................................. ............................. ................................. .................................................13-45
Commands ...................................... .................................... ...................................... ...........................13-45
set spantree lp................................................................................................................................13-46
show spantree lp ............................................................................................................................13-46
clear spantree lp.............................................................................................................................13-47
show spantree lplock......................................................................................................................13-47
clear spantree lplock.......................................................................................................................13-48
set spantree lpcapablepartner........................................................................................................13-49
show spantree lpcapablepartner .................................................................................................
...13-49
clear spantree lpcapablepartner.....................................................................................................1 3-50
set spantree lpthreshold .................................................................................................................13-50
show spantree lpthreshold..............................................................................................................13-51
clear spantree lpthreshold ..............................................................................................................13-51
set spantree lpwindow....................................................................................................................13-52
show spantree lpwindow ................................................................................................................13-52
clear spantree lpwindow.................................................................................................................13-53
set spantree lptrapenable...............................................................................................................13-53
show spantree lptrapenable ...........................................................................................................13-54
clear spantree lptrapenable............................................................................................................13-54
set spantree disputedbpduthreshold ..............................................................................................13-55
show spantree disputedbpduthreshold...........................................................................................13-56
clear spantree disputedbpduthreshold ...........................................................................................13-56
xiv
show spantree nonforwardingreason .............................................................................................13-57
Chapter 14: 802.1Q VLAN Configuration
VLAN Configuration Summary .....................................................................................................................14-1
Port String Syntax Used in the CLI ........................................ ... ... .... ... ... ................................................14-1
Creating a Secure Management VLAN .. ... ... ... ... .... ... ... .......................................... ... .... ... ... ... ... .... ... ......14-2
Viewing VLANs ............................................................................................................................................. 14-3
Purpose ................................. ............................. ................................. ...................................................14-3
Command ..................................... ... ... .... ... ... .......................................... ................................................ 14-3
show vlan..........................................................................................................................................14-3
Creating and Naming Static VLANs ............................................................................................................. 14-5
Purpose ................................. ............................. ................................. ...................................................14-5
Commands ...................................... .................................... ...................................... .............................14-5
set vlan .............................................................................................................................................14-5
set vlan name ...................................................................................................................................14-6
clear vlan..........................................................................................................................................14-6
clear vlan name................................................................................................................................14-7
Assigning Port VLAN IDs (PVIDs) and Ingress Filtering ..............................................................................14-8
Purpose ................................. ............................. ................................. ...................................................14-8
Commands ...................................... .................................... ...................................... .............................14-8
show port vlan ..................................................................................................................................14-8
set port vlan......................................................................................................................................14-9
clear port vlan...................................................................................................................................14-9
show port ingress-filter ...................................................................................................................14-10
set port ingress-filter.......................................................................................................................14-11
show port discard ...........................................................................................................................14-11
set port discard...............................................................................................................................14-12
Configuring the VLAN Egress List ..............................................................................................................14-13
Purpose ................................. ............................. ................................. .................................................14-13
Commands ...................................... .................................... ...................................... ...........................14-13
show port egress ............................................................................................................................14-13
set vlan forbidden ...........................................................................................................................14-14
set vlan egress ...............................................................................................................................14-15
clear vlan egress ............................................................................................................................14-15
show vlan dynamicegress ..............................................................................................................14-16
set vlan dynamicegress..................................................................................................................14-17
Setting the Host VLAN ........................ ... ... .......................................... .... ....................................................14-18
Purpose ................................. ............................. ................................. .................................................14-18
Commands ...................................... .................................... ...................................... ...........................14-18
show host vlan................................................................................................................................14-18
set host vlan ...................................................................................................................................14-18
clear host vlan ................................................................................................................................14-19
Enabling/Disabling GVRP (GARP VLAN Registration Protocol) ................................................................14-20
About GARP VLAN Registration Protocol (GVRP) ... ... ... ..................................................................... 14-20
Purpose ................................. ............................. ................................. .................................................14-21
Commands ...................................... .................................... ...................................... ...........................14-21
show gvrp .......................................................................................................................................14-22
show garp timer..............................................................................................................................14-22
set gvrp...........................................................................................................................................14-23
clear gvrp.....................................................................................................................
set garp timer..................................................................................................................................14-24
clear garp timer...............................................................................................................................14-25
Configuring VLAN Associations ..................................................................................................................14-26
Commands ...................................... .................................... ...................................... ...........................14-26
set vlan association ........................................................................................................................14-26
...................14-24
xv
clear vlan association.....................................................................................................................14-27
show vlan association.....................................................................................................................14-28
Chapter 15: Policy Classification Configuration
Policy Classification Configuration Summary ............................................................................................... 15-1
Configuring Policy Profiles ............................................................................................................................ 15-2
Purpose ................................. ............................. ................................. ...................................................15-2
Commands ...................................... .................................... ...................................... .............................15-2
show policy profile ............................................................................................................................15-2
set policy profile................................................................................................................................15-3
clear policy profile.............................................................................................................................15-5
Configuring Classification Rules ...................................................................................................................15-6
Purpose ................................. ............................. ................................. ...................................................15-6
Commands ...................................... .................................... ...................................... .............................15-6
show policy rule................................................................................................................................15-6
show policy capability.......................................................................................................................15-8
set policy rule..................................................................................................................................15-10
clear policy rule...............................................................................................................................15-13
clear policy all-rules........................................................................................................................15-14
Assigning Ports to Policy Profiles ...............................................................................................................15-15
Purpose ................................. ............................. ................................. .................................................15-15
Commands ...................................... .................................... ...................................... ...........................15-15
set policy port .................................................................................................................................15-15
clear policy port ..............................................................................................................................15-16
show policy port..............................................................................................................................15-16
Configuring Policy Class of Service (CoS) .................................................................................................15-18
About Policy-Based CoS Configurations ............................. ...... ....... ...... ...... .... ...... ....... ...... ...... ........... 15-18
About CoS-Based Flood Control .......................................................................................................... 15-20
Commands ...................................... .................................... ...................................... ...........................15-21
set cos state ...................................................................................................................................15-21
show cos state................................................................................................................................15-22
clear cos state ................................................................................................................................15-22
set cos settings...............................................................................................................................15-23
clear cos settings............................................................................................................................15-24
show cos settings ...........................................................................................................................15-24
set cos port-config ...................................................................................................................... ....15-25
show cos port-config.......................................................................................................................15-26
clear cos port-config .......................................................................................................................15-27
set cos port-resource irl..................................................................................................................15-28
set cos port-resource flood-ctrl.......................................................................................................15-29
show cos port-resource ..................................................................................................................15-30
clear cos port-resource irl...............................................................................................................15-31
clear cos port-resource flood-ctrl....................................................................................................15-32
set cos reference............................................................................................................................15-32
show cos reference ........................................................................................................................15-33
clear cos reference.........................................................................................................................15-34
show cos unit..................................................................................................................................15-35
clear cos all-entries.........................................................................................................................15-36
show cos port-type .........................................................................................................................15-36
Chapter 16: Port Priority Configuration
Port Priority Configuration Summary ............................................................................................................ 16-1
Configuring Port Priority ............................................................................................................................... 16-2
Purpose ................................. ............................. ................................. ...................................................16-2
Commands ...................................... .................................... ...................................... .............................16-2
xvi
show port priority ..............................................................................................................................16-2
set port priority..................................................................................................................................16-3
clear port priority...............................................................................................................................16-3
Configuring Priority to Transmit Queue Mapping .................. .... ... .......................................... ... ... ... .............16-4
Purpose ................................. ............................. ................................. ...................................................16-4
Commands ...................................... .................................... ...................................... .............................16-4
show port priority-queue...................................................................................................................16-4
set port priority-queue.......................................................................................................................16-5
clear port priority-queue....................................................................................................................16-6
Configuring Quality of Service (QoS) ....................... .... ... ... ... .... ... ... ... .... ... ... ... ............................................. 16-7
Purpose ................................. ............................. ................................. ...................................................16-7
Commands ...................................... .................................... ...................................... .............................16-7
show port txq ....................................................................................................................................16-7
set port txq........................................................................................................................................16-8
clear port txq.....................................................................................................................................16-9
Chapter 17: IGMP Configuration
IGMP Overview ............................................................................................................................................17-1
About IP Multicast Group Management .................................................................................................17-1
About Multicasting ..................................................................................................................................17-2
Configuring IGMP at Layer 2 ........................................................................................................................ 17-2
Purpose ................................. ............................. ................................. ...................................................17-2
Commands ...................................... .................................... ...................................... .............................17-2
show igmpsnooping..........................................................................................................................17-2
set igmpsnooping adminmode..........................................................................................................17-3
set igmpsnooping interfacemode......................................................................................................17-4
set igmpsnooping groupmembershipinterval....................................................................................17-4
set igmpsnooping maxresponse.......................................................................................................17-5
set igmpsnooping mcrtrexpiretime....................................................................................................17-6
set igmpsnooping add-static.............................................................................................................17-6
set igmpsnooping remove-static.......................................................................................................17-7
show igmpsnooping static ................................................................................................................17-7
show igmpsnooping mfdb.................................................................................................................17-8
clear igmpsnooping ..........................................................................................................................17-9
Configuring IGMP on Routing Interfaces .................................................................................................... 17-10
Purpose ................................. ............................. ................................. .................................................17-10
Commands ...................................... .................................... ...................................... ...........................17-10
ip igmp.................................... ... ... .... ... ... ....................................... ... ... ... .... ... ... ... .... .......................17-10
ip igmp enable........ ... ... ... .... .......................................... ... .......................................... ... .................17-11
ip igmp version ............. ... .... ... ... ... .... ... ...........................................................................................17-12
show ip igmp interface....................................................................................................................17-12
show ip igmp groups.......................................................................................................................17-13
ip igmp query-interval...... .... .......................................... ... ... ... .... ....................................................17-13
ip igmp query-max-response-time................................. ... ... ... .... ... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ....17-14
ip igmp startup-query-interval.........................................................................................................17-14
ip igmp startup-query-count............................................................................................................17-15
ip igmp last-member-query-interval................................................................................................17-16
ip igmp last-member-query-count..................... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... .... .......................17-16
ip igmp robustness .............. ... ... ... .... ... ... ... .......................................... ... ........................................17-17
Chapter 18: Network Management
Monitoring Network Events and Status ........................................................................................................18-1
Purpose ................................. ............................. ................................. ...................................................18-1
Commands ...................................... .................................... ...................................... .............................18-1
history...............................................................................................................................................18-1
xvii
show history......................................................................................................................................18-2
set history.........................................................................................................................................18-3
ping...................................................................................................................................................18-3
show users .......................................................................................................................................18-4
disconnect ........................................................................................................................................18-4
show netstat .....................................................................................................................................18-5
Managing Switch Network Addresses and Routes .......................................................................................18-7
Purpose ................................. ............................. ................................. ...................................................18-7
Commands ...................................... .................................... ...................................... .............................18-7
show arp...........................................................................................................................................18-7
set arp...............................................................................................................................................18-8
clear arp............................................................................................................................................18-9
traceroute .........................................................................................................................................18-9
show mac .......................................................................................................................................18-10
show mac agetime..........................................................................................................................18-11
set mac agetime.............................................................................................................................18-12
clear mac agetime ..........................................................................................................................18-12
set mac algorithm...........................................................................................................................18-13
show mac algorithm........................................................................................................................18-13
clear mac algorithm ........................................................................................................................18-14
set mac multicast............................................................................................................................18-14
clear mac address ..........................................................................................................................18-15
show mac unreserved-flood ...........................................................................................................18-16
set mac unreserved-flood...............................................................................................................18-16
Configuring Node Aliases ........................................................................................................................... 18-17
Purpose ................................. ............................. ................................. .................................................18-17
Commands ...................................... .................................... ...................................... ...........................18-17
show nodealias config ....................................................................................................................18-17
set nodealias ..................................................................................................................................18-18
clear nodealias config.....................................................................................................................18-19
Chapter 19: Configuring System Logging
About Security Audit Logging ....................................................................................................................... 19-1
Security Events Logged .........................................................................................................................19-1
Trap Generation ................. .......................................... ... .... ... ... .............................................................19-2
Format Examples ............ ... ... .... ... ... ... .... ... ... .......................................... ... ............................................. 19-2
Commands ...................................................................................................................................................19-3
show logging server..........................................................................................................................19-3
set logging server .............................................................................................................................19-4
clear logging server ..........................................................................................................................19-5
show logging default.........................................................................................................................19-6
set logging default ............................................................................................................................19-6
clear logging default .........................................................................................................................19-7
show logging application ..................................................................................................................19-7
set logging application......................................................................................................................19-9
clear logging application.................................................................................................................19-10
show logging local..........................................................................................................................19-11
set logging local..............................................................................................................................19-11
clear logging local...........................................................................................................................19-12
show logging buffer ........................................................................................................................19-13
show logging interface....................................................................................................................19-13
set logging interface .......................................................................................................................19-14
clear logging interface ....................................................................................................................19-15
xviii
Chapter 20: Configuring SNTP
About SNTP Authentication ..........................................................................................................................20-1
General SNTP Commands ................................. ... ... .... ... ... ... .... ... .......................................... ... ...................20-2
show sntp .........................................................................................................................................20-2
set sntp client....................................................................................................................................20-4
clear sntp client.................................................................................................................................20-5
set sntp server..................................................................................................................................20-5
clear sntp server...............................................................................................................................20-6
set sntp poll-interval..........................................................................................................................20-6
clear sntp poll-interval.......................................................................................................................20-7
set sntp poll-retry..............................................................................................................................20-7
clear sntp poll-retry...........................................................................................................................20-8
set sntp poll-timeout .........................................................................................................................20-8
clear sntp poll-timeout ......................................................................................................................20-8
set timezone.....................................................................................................................................20-9
show sntp interface.........................................................................................................................20-10
set sntp interface ............................................................................................................................20-11
clear sntp interface .........................................................................................................................20-12
SNTP Authentication Commands .................................................................................................... ...........20-12
set sntp authenticate ......................................................................................................................20-12
set sntp authentication-key.............................................................................................................20-13
clear sntp authentication-key..........................................................................................................20-14
set sntp trusted-key ........................................................................................................................20-14
clear sntp trusted-key .....................................................................................................................20-15
Chapter 21: RMON Configuration
RMON Monitoring Group Functions .............................................................................................................21-1
Design Considerations .......................... .......................................... ... .... ... ... ................................................21-2
Statistics Group Commands ............................... ... ... .... ... ... .......................................... ... .... ... ......................21-3
Purpose ................................. ............................. ................................. ...................................................21-3
Commands ...................................... .................................... ...................................... .............................21-3
show rmon stats ...............................................................................................................................21-4
set rmon stats...................................................................................................................................21-4
clear rmon stats................................................................................................................................21-5
History Group Commands ............................................................................................................................21-6
Purpose ................................. ............................. ................................. ...................................................21-6
Commands ...................................... .................................... ...................................... .............................21-6
show rmon history ............................................................................................................................21-6
set rmon history................................................................................................................................21-7
clear rmon history.............................................................................................................................21-7
Alarm Group Commands ..............................................................................................................................21-9
Purpose ................................. ............................. ................................. ...................................................21-9
Commands ...................................... .................................... ...................................... .............................21-9
show rmon alarm..............................................................................................................................21-9
set rmon alarm properties...............................................................................................................21-10
set rmon alarm status.....................................................................................................................21-11
clear rmon alarm.............................................................................................................................21-12
Event Group Commands ............................................................................................................................21-13
Purpose ................................. ............................. ................................. .................................................21-13
Commands ...................................... .................................... ...................................... ...........................21-13
show rmon event ............................................................................................................................21-13
set rmon event properties...............................................................................................................21-14
set rmon event status .....................................................................................................................21-15
clear rmon event.............................................................................................................................21-15
Filter Group Commands ............................................................................................................................. 21-16
xix
Commands ...................................... .................................... ...................................... ...........................21-16
show rmon channel ........................................................................................................................21-16
set rmon channel............................................................................................................................21-17
clear rmon channel.........................................................................................................................21-18
show rmon filter ..............................................................................................................................21-18
set rmon filter..................................................................................................................................21-19
clear rmon filter...............................................................................................................................21-20
Packet Capture Commands .......................................................................................................................21-21
Purpose ................................. ............................. ................................. .................................................21-21
Commands ...................................... .................................... ...................................... ...........................21-21
show rmon capture.........................................................................................................................21-21
set rmon capture.............................................................................................................................21-22
clear rmon capture..........................................................................................................................21-23
Chapter 22: DHCP Server Configuration
DHCP Overview ........................................................................................................................................... 22-1
DHCP Relay Agent ................................................................................................................................22-1
DHCP Server ......................................................................................................................................... 22-1
Configuring a DHCP Server ................................................................................................................... 22-2
Configuring General DHCP Server Parameters ........................................................................................... 22-3
Purpose ................................. ............................. ................................. ...................................................22-3
Commands ...................................... .................................... ...................................... .............................22-3
set dhcp............................................................................................................................................22-4
set dhcp bootp..................................................................................................................................22-4
set dhcp conflict logging ...................................................................................................................22-5
show dhcp conflict ............................................................................................................................22-5
clear dhcp conflict.............................................................................................................................22-6
set dhcp exclude...............................................................................................................................22-7
clear dhcp exclude............................................................................................................................22-7
set dhcp ping....................................................................................................................................22-8
clear dhcp ping .................................................................................................................................22-8
show dhcp binding............................................................................................................................22-9
clear dhcp binding ............................................................................................................................22-9
show dhcp server statistics.............................................................................................................22-10
clear dhcp server statistics .. ... .......................................... ... ... .... ... .................................................22-11
Configuring IP Address Pools .....................................................................................................................22-12
Manual Pool Configuration Considerations ..........................................................................................22-12
Purpose ................................. ............................. ................................. .................................................22-12
Commands ...................................... .................................... ...................................... ...........................22-12
set dhcp pool..................................................................................................................................22-13
clear dhcp pool ...............................................................................................................................22-14
set dhcp pool network.....................................................................................................................22-14
clear dhcp pool network............. ... .... .......................................... ... ... ... ... ........................................22-15
set dhcp pool hardware-address ....................................................................................................22-15
clear dhcp pool hardware-address ... ...... ... ... .... ... ...........................................................................22-16
set dhcp pool host ..........................................................................................................................22-16
clear dhcp pool host ......................................................... ... .......................................... ... ..............22-17
set dhcp pool client-identifier..........................................................................................................22-17
clear dhcp pool client-identifier.................................. .... ... ... ... .... ... ... ... ...........................................22-18
set dhcp pool client-name...............................................................................................................22-19
clear dhcp pool client-name.......... .... ... ... ... ... ..................................................................................22-19
set dhcp pool bootfile......................................................................................................................22-20
clear dhcp pool bootfile.............. ... .... ... ... ... ... .... ... ... ... .......................................... .... ... ... ... ..............22-20
set dhcp pool next-server ...............................................................................................................22-21
clear dhcp pool next-server .................................... ... .... ... ... ... .... ... ... ... ... .... ... .................................22-21
xx
set dhcp pool lease.........................................................................................................................22-22
clear dhcp pool lease.............. ... ... .... ... ... ... .......................................... ... ........................................22-22
set dhcp pool default-router............................................................................................................22-23
clear dhcp pool default-router.............................................................. ... .... ... ... ... .... ... ... ... ... ...........22-23
set dhcp pool dns-server ................................................................................................................22-24
clear dhcp pool dns-server........ ... .... ... ... ... .....................................................................................22-24
set dhcp pool domain-name...........................................................................................................22-25
clear dhcp pool domain-name ... ... .... ... ... ... ... .... ... ... ... .... ... .......................................... ... ... ... .... .......22-25
set dhcp pool netbios-name-server ................................................................................................22-26
clear dhcp pool netbios-name-server .............................................................................................22-26
set dhcp pool netbios-node-type ....................................................................................................22-27
clear dhcp pool netbios-node-type ......... ... ... .... ... ... ... .... ... ... .......................................... ... ... .... ... ....22-28
set dhcp pool option .......................................................................................................................22-28
clear dhcp pool option .................. .... ... ... ... ... .......................................... .... ... ... ... ...........................22-29
show dhcp pool configuration.........................................................................................................22-29
Chapter 23: DHCP Snooping and Dynamic ARP Inspection
DHCP Snooping Overview ........................................................................................................................... 23-1
DHCP Message Processing ...................................................................................................................23-1
Building and Maintaining the Database ........................... ....................................... ... .... ... ... ... ... .............23-2
Rate Limiting .......................................................................................................................................... 23-3
Basic Configuration ................................................................................................................................ 23-3
DHCP Snooping Commands ........................................................................................................................23-4
set dhcpsnooping .............................................................................................................................23-4
set dhcpsnooping vlan......................................................................................................................23-5
set dhcpsnooping trust .....................................................................................................................23-5
set dhcpsnooping binding.................................................................................................................23-6
set dhcpsnooping verify....................................................................................................................23-7
set dhcpsnooping log-invalid ............................................................................................................23-7
set dhcpsnooping limit......................................................................................................................23-8
show dhcpsnooping..........................................................................................................................23-9
show dhcpsnooping port.................................................................................................................23-10
show dhcpsnooping binding ...........................................................................................................23-11
show dhcpsnooping statistics.........................................................................................................23-12
clear dhcpsnooping binding............................................................................................................23-12
clear dhcpsnooping statistics..........................................................................................................23-13
clear dhcpsnooping limit.................................................................................................................23-13
Dynamic ARP Inspection Overview ............................................................................................................23-15
Functional Description .................................. ... ... .... ... ... ... .......................................... .... ... ....................23-15
Basic Configuration .............................................................................................................................. 23-17
Example Configuration ......................................................................................................................... 23-17
Dynamic ARP Inspection Commands ........................................................................................................23-18
set arpinspection vlan.....................................................................................................................23-19
set arpinspection trust ....................................................................................................................23-20
set arpinspection validate...............................................................................................................23-20
set arpinspection limit.....................................................................................................................23-21
set arpinspection filter.....................................................................................................................23-22
show arpinspection access-list.......................................................................................................23-23
show arpinspection ports................................................................................................................23-24
show arpinspection vlan .................................................................................................................23-24
show arpinspection statistics..........................................................................................................23-25
clear arpinspection validate............................................................................................................23-25
clear arpinspection vlan..................................................................................................................23-26
clear arpinspection filter..................................................................................................................23-27
clear arpinspection limit..................................................................................................................23-29
xxi
clear arpinspection statistics...........................................................................................................23-29
Chapter 24: Preparing for Router Mode
Pre-Routing Configuration Tasks .................................................................................................................24-1
Example .................................................................................................................................................24-2
Enabling Router Configuration Modes ..........................................................................................................24-2
Chapter 25: IP Configuration
Configuring Routing Interface Settings .........................................................................................................25-1
Purpose ................................. ............................. ................................. ...................................................25-1
Commands ...................................... .................................... ...................................... .............................25-1
show interface ..................................................................................................................................25-2
interface............................................................................................................................................25-3
show ip interface...............................................................................................................................25-4
ip address..................................... .... ... ....................................... ... ... ... ... .... ... ... ... .............................25-5
no shutdown .....................................................................................................................................25-6
no ip routing......................................................................................................................................25-6
show running-config .........................................................................................................................25-7
Configuring Tunnel Interfaces ......................................................................................................................25-8
Purpose ................................. ............................. ................................. ...................................................25-8
Commands ...................................... .................................... ...................................... .............................25-8
interface tunnel.................................................................................................................................25-8
tunnel source....................................................................................................................................25-9
tunnel destination ...........................................................................................................................25-10
tunnel mode....................................................................................................................................25-10
show interface tunnel......................................................................................................................25-11
Reviewing and Configuring the ARP Table ................................................................................................25-12
Purpose ................................. ............................. ................................. .................................................25-12
Commands ...................................... .................................... ...................................... ...........................25-12
show ip arp .....................................................................................................................................25-12
arp ..................................................................................................................................................25-13
ip proxy-arp............. ... ... ....................................... ... ... .... ... ... ... .... ... .................................................25-14
arp timeout......................................................................................................................................25-15
clear arp-cache...............................................................................................................................25-15
Configuring Broadcast Settings .................................................................................................................. 25-16
Purpose ................................. ............................. ................................. .................................................25-16
Commands ...................................... .................................... ...................................... ...........................25-16
ip directed-broadcast................................. ... .... ... ... ... .... ... ... ... .... ....................................................25-16
ip forward-protocol............... ... ... ... .... ............................................................................. .................25-17
ip helper-address............................................................................................................................25-18
Reviewing IP Traffic and Configuring Routes ............................................................................................. 25-19
Purpose ................................. ............................. ................................. .................................................25-19
Commands ...................................... .................................... ...................................... ...........................25-19
show ip route ..................................................................................................................................25-19
ip route............. ... ....................................... ... .... ... ... ... .... ...................................... .... .......................25-21
ping.................................................................................................................................................25-21
traceroute .......................................................................................................................................25-22
Configuring ICMP Redirects ....................................................................................................................... 25-23
Purpose ................................. ............................. ................................. .................................................25-23
Commands ...................................... .................................... ...................................... ...........................25-23
ip icmp redirect enable ........................................................ ... .......................................... ..............25-23
show ip icmp redirect......................................................................................................................25-24
Chapter 26: IPv4 Basic Routing Protocol Configuration
Configuring RIP ............................................................................................................................................26-1
xxii
RIP Configuration Task List and Commands .........................................................................................26-1
Router Configuration Commands ........................................................................................................... 26-2
router rip...........................................................................................................................................26-2
distance ............................................................................................................................................26-3
no auto-summary..............................................................................................................................26-4
split-horizon poison...........................................................................................................................26-4
passive-interface ..............................................................................................................................26-5
receive-interface...............................................................................................................................26-6
redistribute........................................................................................................................................26-6
Interface Configuration Commands ....................................................................................................... 26-7
ip rip enable......................................... ... ... ... .... ... ... ... .... ... .......................................... ......................26-7
ip rip send version ..................... ... .... ... .......................................... ... ... ... .... ......................................26-8
ip rip receive version.........................................................................................................................26-8
ip rip authentication-key................ .... ... ... ... ... .... ... ... ... .... ... ... .......................................... ... .......... ......26-9
ip rip message-digest-key.... ... ... ... .... ... ... ... .......................................... ... ........................................26-10
Configuring IRDP ........................................................................................................................................ 26-11
Purpose ................................. ............................. ................................. .................................................26-11
Commands ...................................... .................................... ...................................... ...........................26-11
ip irdp enable.................................... ... ... ... ... .... ...................................... .... ... ... ... .... ... ....................26-11
ip irdp maxadvertinterval ........... ... .... ... ... ... ... .... ... ... ... .... .......................................... ... ... ... ... ...........26-12
ip irdp minadvertinterval ............ ... .... ... ... ... ... .... ... ... ... .... .......................................... ... ... ... ..............26-12
ip irdp holdtime....... ... ... ... .... .......................................... ... .......................................... ....................26-13
ip irdp preference.......... ... .... ............................................................................. ... .... ... ... .................26-13
ip irdp broadcast..................................... ... ... .... ... ... ... .......................................... .... .......................26-14
show ip irdp ....................................................................................................................................26-14
Chapter 27: IPv4 Advanced Routing Protocol Configuration
Activating Advanced Routing Features ........................................................................................................27-1
Configuring OSPF ........................................................................................................................................ 27-2
Purpose ................................. ............................. ................................. ...................................................27-2
OSPF Configuration Task List and Commands ..................................................................................... 27-2
router id ............................................................................................................................................27-3
router ospf ........................................................................................................................................27-4
1583compatibility..............................................................................................................................27-4
ip ospf enable .. ... ....................................... ... .... ... ... ... ....................................... ... .... ... ... ...................27-5
ip ospf areaid................................ .... ...................................... .... ... ... ... ... ..........................................27-6
ip ospf cost ............. ... ... ... .... ...................................... .... ... ... ... .... ......................................................27-6
ip ospf priority ......................................... ... ... .... ...................................... .... ... ... ... .... .........................27-7
timers spf................................... ... .... ... ....................................... ... ... ... ... .... ... ... ... .............................27-7
ip ospf retransmit-interval .................................................................................................................27-8
ip ospf transmit-delay ............. ... ... .... ... ... ... ... .......................................... ..........................................27-9
ip ospf hello-interval......... .... ... ... ... .... ... ... ... ... .... .......................................... ......................................27-9
ip ospf dead-interval ......................................... ... ... ... .... ... ..............................................................27-10
ip ospf authentication-key....... ....................................... ... ... ... .... ... ... ... ... ........................................27-10
ip ospf message digest key md5 ....................................................................................................27-11
distance ospf ..................................................................................................................................27-12
area range......................................................................................................................................27-12
area stub.........................................................................................................................................27-13
area default-cost.............................................................................................................................27-14
area nssa........................................................................................................................................27-14
area virtual-link ...............................................................................................................................27-15
passive-interface ............................................................................................................................27-16
redistribute......................................................................................................................................27-17
show ip ospf....................................................................................................................................27-18
show ip ospf area ...........................................................................................................................27-19
xxiii
show ip ospf database....................................................................................................................27-19
show ip ospf interface.....................................................................................................................27-21
show ip ospf neighbor.....................................................................................................................27-22
show ip ospf virtual-links.................................................................................................................27-23
clear ip ospf process.......................................................................................................................27-24
Configuring DVMRP ................................................................................................................................... 27-25
Purpose ................................. ............................. ................................. .................................................27-25
Enabling DVMRP on an Interface ........................................................................................................27-25
Commands ...................................... .................................... ...................................... ...........................27-25
ip dvmrp.................. ... ... ... .... ... ... ....................................... ... ... .... ... ... ... ...........................................27-26
ip dvmrp enable................................ ... ... ... .....................................................................................27-26
ip dvmrp metric............................. ....................................... ... .... ... ... ... ...........................................27-27
show ip dvmrp ................................................................................................................................27-27
Configuring VRRP ......................................................................................................................................27-29
Purpose ................................. ............................. ................................. .................................................27-29
Commands ...................................... .................................... ...................................... ...........................27-29
router vrrp.......................................................................................................................................27-29
create..............................................................................................................................................27-30
address...........................................................................................................................................27-31
priority.............................................................................................................................................27-32
master-icmp-reply...........................................................................................................................27-32
advertise-interval ............................................................................................................................27-33
preempt ..........................................................................................................................................27-34
enable.............................................................................................................................................27-35
ip vrrp authentication-key ............. .... ... ... ... ... .... ... ... .......................................... ... .... ... ... .................27-35
show ip vrrp ....................................................................................................................................27-36
Configuring PIM-SM ...................................................................................................................................27-37
Design Considerations .................................................... .... ... ... ... ........................................................27-37
Purpose ................................. ............................. ................................. .................................................27-37
Commands ...................................... .................................... ...................................... ...........................27-37
ip pimsm . ... ....................................... ... ... ... ... .... ... ....................................... ... ... ... .... ... ....................27-38
ip pimsm staticrp.............. .... ... ... ... .... ... ... .......................................... ... ... .... ... .................................27-38
ip pimsm enable ..................... .......................................... ... .......................................... ... ..............27-39
ip pimsm query-interval ................ .... ... ... ... ... .... ... ... ... .... ... ... ... .... ... .................................................27-40
show ip pimsm................................................................................................................................27-40
show ip pimsm componenttable .....................................................................................................27-41
show ip pimsm interface.................................................................................................................27-42
show ip pimsm neighbor.................................................................................................................27-43
show ip pimsm rp............................................................................................................................27-44
show ip pimsm rphash....................................................................................................................27-45
show ip pimsm staticrp ...................................................................................................................27-46
show ip mroute ........................................................................................................................... ....27-47
Chapter 28: IPv6 Management
Purpose ................................. ............................. ................................. ...................................................28-1
Commands ...................................... .................................... ...................................... .............................28-1
show ipv6 status...............................................................................................................................28-1
set ipv6.............................................................................................................................................28-2
set ipv6 address ...............................................................................................................................28-3
show ipv6 address............................................................................................................................28-4
clear ipv6 address ............................................................................................................................28-4
set ipv6 gateway...............................................................................................................................28-5
clear ipv6 gateway............................................................................................................................28-6
show ipv6 neighbors.........................................................................................................................28-7
show ipv6 netstat..............................................................................................................................28-7
xxiv
ping ipv6...........................................................................................................................................28-9
traceroute ipv6................................................................................................................................28-10
Chapter 29: IPv6 Configuration
Overview ................................... ................ ................ ................. ................ ................ ...................................29-1
Default Conditions ..................................................................................................................................29-2
General Configuration Commands ............................................... ... ... .... ... ... ... ... .... ... ... ................................ 29-3
ipv6 forwarding ... .... ... ... ... .... .......................................... ... .......................................... ... ...................29-3
ipv6 hop-limit ............. ... ... .... ... ... ... .... ... ....................................... ... ... ... ... .... ... ... ... .............................29-3
ipv6 route................... ....................................... ... ... ... .... ... ....................................... ... ......................29-4
ipv6 route distance ........................................... ... ... ... .... ... ....................................... ... ... ... ................29-5
ipv6 unicast-routing ............. ... .......................................... ... .......................................... ...................29-6
ping ipv6...........................................................................................................................................29-6
ping ipv6 interface ............................................................................................................................29-7
traceroute ipv6..................................................................................................................................29-8
Interface Configuration Commands ............................................................................................................29-10
ipv6 address.... ... ....................................... ... .... ... ... ... .... ... ... ....................................... ... .................29-10
ipv6 enable ... ... ... .... ... ....................................... ... ... ... .... ... ... ... .... ....................................................29-11
ipv6 mtu............................... ... ... ... ....................................... ... .... ... ... ... ...........................................29-12
Neighbor Cache and Neighbor Discovery Commands ...............................................................................29-14
clear ipv6 neighbors .......................................................................................................................29-14
ipv6 nd dad attempts ......................................................................................................................29-15
ipv6 nd ns-interval ............... ... ... ... .... ... ... ... ... .......................................... .... ....................................29-15
ipv6 nd reachable-time.... .... ... ... ... .... ... ... ... ... .......................................... .... ... ... ... ...........................29-16
ipv6 nd other-config-flag............................... .......................................... .... ....................................29-17
ipv6 nd ra-interval................................... ... ... .... ... ... .......................................... ... ...........................29-18
ipv6 nd ra-lifetime...... ... ... .... ... ... ... .......................................... ........................................................29-18
ipv6 nd suppress-ra................................ ... ... .... ... ... ... .... .......................................... ... ....................29-19
ipv6 nd prefix...... .... ...................................... .... ... ... ... .... ... ... ... ........................................................29-19
Query Commands ....................... .... ... ... ... .... ... ... ... ... .... .......................................... ... ................................. 29-22
show ipv6 interface.........................................................................................................................29-22
show ipv6 neighbors.......................................................................................................................29-23
show ipv6 route ..............................................................................................................................29-25
show ipv6 route preferences ..........................................................................................................29-26
show ipv6 route summary...............................................................................................................29-27
show ipv6 traffic..............................................................................................................................29-28
clear ipv6 statistics .........................................................................................................................29-33
Chapter 30: DHCPv6 Configuration
Overview ................................... ................ ................ ................. ................ ................ ...................................30-1
Default Conditions ..................................................................................................................................30-2
Global Configuration Commands .......................... ... .... .......................................... ... ... ... .... ... ... ...................30-2
Purpose ................................. ............................. ................................. ...................................................30-2
Commands ...................................... .................................... ...................................... .............................30-2
ipv6 dhcp enable .................... ... ... .......................................... .......................................... ................30-2
ipv6 dhcp relay-agent-info-opt..........................................................................................................30-3
ipv6 dhcp relay-agent-info-remote-id-subopt....................................................................................30-4
ipv6 dhcp pool ................. .... ... ... ... .... ... ... ... .......................................... ... ..........................................30-4
Address Pool Configuration Commands ............ ... ... .... ... ... ... .... ... .......................................... ... ...................30-6
Purpose ................................. ............................. ................................. ...................................................30-6
Commands ...................................... .................................... ...................................... .............................30-6
domain-name....................................................................................................................................30-6
dns-server.........................................................................................................................................30-7
prefix-delegation...............................................................................................................................30-7
exit....................................................................................................................................................30-8
xxv
Interface Configuration Commands ............................................................................................................30-10
Purpose ................................. ............................. ................................. .................................................30-10
Commands ...................................... .................................... ...................................... ...........................30-10
ipv6 dhcp server . .... ... ............................................................................. .... ... ... ... .... ... ... .................30-10
ipv6 dhcp relay ................ .... ... ... ... .... ... ... ... ... .......................................... .... ....................................30-11
DHCPv6 Show Commands ........................................................................................................................ 30-13
Purpose ................................. ............................. ................................. .................................................30-13
Commands ...................................... .................................... ...................................... ...........................30-13
show ipv6 dhcp...............................................................................................................................30-13
show ipv6 dhcp interface................................................................................................................30-14
show ipv6 dhcp statistics................................................................................................................30-16
clear ipv6 dhcp statistics.................................................................................................................30-17
show ipv6 dhcp pool.......................................................................................................................30-18
show ipv6 dhcp binding ..................................................................................................................30-18
Chapter 31: OSPFv3 Configuration
Overview ................................... ................ ................ ................. ................ ................ ...................................31-1
Default Conditions ..................................................................................................................................31-2
Global OSPFv3 Configuration Commands ................................................................................................... 31-3
Purpose ................................. ............................. ................................. ...................................................31-3
Commands ...................................... .................................... ...................................... .............................31-3
ipv6 router id.................... .... ............................................................................. ... .... ... ......................31-3
ipv6 router ospf....................... ... .......................................... ... ..........................................................31-4
default-information originate.............................................................................................................31-4
default-metric....................................................................................................................................31-5
distance ospf ....................................................................................................................................31-6
exit-overflow-interval.........................................................................................................................31-7
external-lsdb-limit .............................................................................................................................31-7
maximum-paths................................................................................................................................31-8
redistribute........................................................................................................................................31-8
passive-interface ..............................................................................................................................31-9
Area Configuration Commands ..................................................................................................................31-10
Purpose ................................. ............................. ................................. .................................................31-10
Commands ...................................... .................................... ...................................... ...........................31-10
area default-cost.............................................................................................................................31-11
area nssa........................................................................................................................................31-11
area nssa default-info-originate......................................................................................................31-12
area nssa no-redistribute................................................................................................................31-13
area nssa no-summary...................................................................................................................31-13
area nssa translator role.................................................................................................................31-14
area nssa translator-stab-intv.........................................................................................................31-15
area range......................................................................................................................................31-15
area stub.........................................................................................................................................31-16
area stub no-summary....................................................................................................................31-17
area virtual-link ...............................................................................................................................31-18
area virtual-link dead-interval .........................................................................................................31-18
area virtual-link hello-interval..........................................................................................................31-19
area virtual-link retransmit-interval .................................................................................................31-20
area virtual-link transmit-delay........................................................................................................31-20
Interface Configuration Commands ............................................................................................................31-22
Purpose ................................. ............................. ................................. .................................................31-22
Commands ...................................... .................................... ...................................... ...........................31-22
ipv6 ospf enable ............................................... ... ... ... .... ... ... ... .... ....................................................31-22
ipv6 ospf areaid ......................................... .....................................................................................31-23
ipv6 ospf cost............................................. ... .... ... ... ... .... ...................................... .... ... ....................31-23
xxvi
ipv6 ospf dead-interval ........ ... ... ... .... ...................................... .... ... ... ... ... .... ... ... ..............................31-24
ipv6 ospf hello-interval............... ... .... ... ... ... ... .... ... ... .......................................... ..............................31-25
ipv6 ospf mtu-ignore............................ ... ... ... .... ..............................................................................31-25
ipv6 ospf network.... ... ... ... .... ... ....................................... ... ... ... .... ... .................................................31-26
ipv6 ospf priority ........ ... ... .... ... ... ....................................... ... ... .... ... ... ... ... .... ....................................31-27
ipv6 ospf retransmit-interval ...........................................................................................................31-27
ipv6 ospf transmit-delay....... .......................................... ... .......................................... ....................31-28
OSPFv3 Show Commands ................. .......................................... .......................................... ... .................31-30
Purpose ................................. ............................. ................................. .................................................31-30
Commands ...................................... .................................... ...................................... ...........................31-30
show ipv6 ospf................................................................................................................................31-30
show ipv6 ospf area........................................................................................................................31-32
show ipv6 ospf abr..........................................................................................................................31-33
show ipv6 ospf asbr........................................................................................................................31-34
show ipv6 ospf database................................................................................................................31-35
show ipv6 ospf interface.................................................................................................................31-39
show ipv6 ospf interface stats ........................................................................................................31-41
show ipv6 ospf neighbor.................................................................................................................31-43
show ipv6 ospf range......................................................................................................................31-45
show ipv6 ospf stub table ...............................................................................................................31-46
show ipv6 ospf virtual-link...............................................................................................................31-47
Chapter 32: Authentication and Authorization Configuration
Overview of Authentication and Authorization Methods ...............................................................................32-1
RADIUS Filter-ID Attribute and Dynamic Policy Profile Assignment ......................................................32-3
Setting the Authentication Login Method ...................................... ............................................. ...................32-4
Purpose ................................. ............................. ................................. ...................................................32-4
Commands ...................................... .................................... ...................................... .............................32-4
show authentication login .................................................................................................................32-4
set authentication login.....................................................................................................................32-4
clear authentication login..................................................................................................................32-5
Configuring RADIUS ..................................................................................................................................... 32-6
Purpose ................................. ............................. ................................. ...................................................32-6
Commands ...................................... .................................... ...................................... .............................32-6
show radius ......................................................................................................................................32-6
set radius..........................................................................................................................................32-8
set radius ipsec...............................................................................................................................32-10
clear radius.....................................................................................................................................32-10
clear radius ipsec............................................................................................................................32-11
show radius accounting..................................................................................................................32-12
set radius accounting......................................................................................................................32-12
clear radius accounting...................................................................................................................32-13
show radius interface......................................................................................................................32-14
set radius interface .........................................................................................................................32-14
clear radius interface ......................................................................................................................32-15
set radius attribute mgmt password................................................................................................32-16
show radius attribute mgmt password............................................................................................32-17
Configuring 802.1X Authentication .............................................................................................................32-19
Purpose ................................. ............................. ................................. .................................................32-19
Commands ...................................... .................................... ...................................... ...........................32-19
show dot1x .....................................................................................................................................32-19
show dot1x auth-config...................................................................................................................32-21
set dot1x.........................................................................................................................................32-22
set dot1x auth-config ......................................................................................................................32-23
clear dot1x auth-config ...................................................................................................................32-24
xxvii
show eapol .....................................................................................................................................32-25
set eapol.........................................................................................................................................32-27
clear eapol......................................................................................................................................32-27
Configuring MAC Authentication ................................................................................................................32-29
Purpose ................................. ............................. ................................. .................................................32-29
Commands ...................................... .................................... ...................................... ...........................32-29
show macauthentication.................................................................................................................32-29
show macauthentication session....................................................................................................32-31
set macauthentication.....................................................................................................................32-32
set macauthentication password ....................................................................................................32-32
clear macauthentication password .................................................................................................32-33
set macauthentication port .............................................................................................................32-33
set macauthentication portinitialize.................................................................................................32-34
set macauthentication portquietperiod............................................................................................32-34
clear macauthentication portquietperiod.........................................................................................32-35
set macauthentication macinitialize................................................................................................32-35
set macauthentication reauthentication..........................................................................................32-36
set macauthentication portreauthenticate.......................................................................................32-36
set macauthentication macreauthenticate......................................................................................32-37
set macauthentication reauthperiod ...............................................................................................32-37
clear macauthentication reauthperiod ............................................................................................32-38
set macauthentication significant-bits.............................................................................................32-39
clear macauthentication significant-bits..........................................................................................32-39
Configuring Multiple Authentication Methods .............................................................................................32-41
About Multiple Authentication Types ...................... ................................... ........................................... 32-41
About Multi-User Authentication ......................... ....... ...... ....... ...... ....... ...... ....... ... ...... ....... ...... .............. 32-41
Commands ...................................... .................................... ...................................... ...........................32-41
show multiauth................................................................................................................................32-42
set multiauth mode .........................................................................................................................32-43
clear multiauth mode ......................................................................................................................32-43
set multiauth precedence ...............................................................................................................32-44
clear multiauth precedence ............................................................................................................32-44
show multiauth port ........................................................................................................................32-45
set multiauth port............................................................................................................................32-45
clear multiauth port.........................................................................................................................32-46
show multiauth station....................................................................................................................32-47
show multiauth session ..................................................................................................................32-47
show multiauth idle-timeout............................................................................................................32-48
set multiauth idle-timeout................................................................................................................32-49
clear multiauth idle-timeout.............................................................................................................32-50
show multiauth session-timeout .....................................................................................................32-50
set multiauth session-timeout.........................................................................................................32-51
clear multiauth session-timeout................................................................................................
......32-52
Configuring User + IP Phone Authentication ..............................................................................................32-52
Configuring VLAN Authorization (RFC 3580) .............................................................................................32-53
Purpose ................................. ............................. ................................. .................................................32-53
Commands ...................................... .................................... ...................................... ...........................32-53
set vlanauthorization.......................................................................................................................32-54
set vlanauthorization egress...........................................................................................................32-54
clear vlanauthorization....................................................................................................................32-55
show vlanauthorization...................................................................................................................32-55
Configuring Policy Maptable Response ........................ ................ ................ ................ ................ .............. 32-56
Operational Description ........................................................................................................................32-57
Commands ...................................... .................................... ...................................... ...........................32-58
show policy maptable .....................................................................................................................32-58
set policy maptable.........................................................................................................................32-59
xxviii
clear policy maptable......................................................................................................................32-60
Configuring MAC Locking ...........................................................................................................................32-61
Purpose ................................. ............................. ................................. .................................................32-61
Commands ...................................... .................................... ...................................... ...........................32-61
show maclock.................................................................................................................................32-62
show maclock stations....................................................................................................................32-64
set maclock enable.........................................................................................................................32-65
set maclock disable ........................................................................................................................32-65
set maclock.....................................................................................................................................32-66
clear maclock..................................................................................................................................32-67
set maclock static ...........................................................................................................................32-67
clear maclock static ........................................................................................................................32-68
set maclock firstarrival....................................................................................................................32-68
clear maclock firstarrival.................................................................................................................32-69
set maclock agefirstarrival..............................................................................................................32-70
clear maclock agefirstarrival...........................................................................................................32-70
set maclock clearonlinkchange.......................................................................................................32-71
clear maclock clearonlinkchange....................................................................................................32-71
set maclock move...........................................................................................................................32-72
set maclock trap .............................................................................................................................32-72
set maclock syslog .........................................................................................................................32-73
set maclock disable-port.................................................................................................................32-74
clear maclock disable-port..............................................................................................................32-75
clear maclock violation disabled-port..............................................................................................32-75
Configuring Port Web Authentication (PWA) .............................................................................................. 32-77
About PWA ........................................................................................................................................... 32-77
Purpose ................................. ............................. ................................. .................................................32-77
Commands ...................................... .................................... ...................................... ...........................32-77
show pwa........................................................................................................................................32-78
set pwa...........................................................................................................................................32-79
show pwa banner ...........................................................................................................................32-80
set pwa banner...............................................................................................................................32-80
clear pwa banner............................................................................................................................32-81
set pwa displaylogo ........................................................................................................................32-81
set pwa ipaddress...........................................................................................................................32-82
set pwa protocol .............................................................................................................................32-82
set pwa guestname ........................................................................................................................32-83
clear pwa guestname .....................................................................................................................32-83
set pwa guestpassword..................................................................................................................32-84
set pwa gueststatus........................................................................................................................32-84
set pwa initialize .............................................................................................................................32-85
set pwa quietperiod ........................................................................................................................32-85
set pwa maxrequest .......................................................................................................................32-86
set pwa portcontrol.........................................................................................................................32-86
show pwa session ..........................................................................................................................32-87
set pwa enhancedmode .................................................................................................................32-88
Configuring Secure Shell (SSH) ................................................................................................................. 32-89
Purpose ................................. ............................. ................................. ........................
......................... 32-89
Commands ...................................... .................................... ...................................... ...........................32-89
show ssh status..............................................................................................................................32-89
set ssh ............................................................................................................................................32-89
set ssh hostkey...............................................................................................................................32-90
Chapter 33: Configuring IPsec
About IPsec ..................................................................................................................................................33-1
xxix
Implementation Defaults ........................................................................................................................ 33-2
Commands ...................................................................................................................................................33-2
show ipsec........................................................................................................................................33-2
set ipsec authentication....................................................................................................................33-3
set ipsec encryption..........................................................................................................................33-3
set ipsec ike dh-group ......................................................................................................................33-4
set ipsec ike lifetime .........................................................................................................................33-5
set ipsec ike phase1.........................................................................................................................33-5
set ipsec ike version .........................................................................................................................33-6
Chapter 34: Configuring Access Control Lists
About Access Control Lists .................... ... .......................................... .... ......................................................34-1
IPv6 and MAC ACL Considerations .......................................................................................................34-1
Rule Actions .......... ... .... ... ... ... .... ... ... ... .......................................... .... ...................................................... 34-2
Commands ...................................................................................................................................................34-2
access-list ipv6mode . ... ... .... ... ... ... .......................................... .... ... ... ... ... .... ......................................34-2
show access-lists..............................................................................................................................34-3
access-list (standard) .......... .......................................... ... .......................................... ... ...................34-4
access-list (extended).......... ... ... .......................................... ... .......................................... ................34-6
access-list mac................................. ............................................................................. ...................34-8
access-list ipv6 ...............................................................................................................................34-10
ip access-group .. .... ... ....................................... ... ... ... .... ... ... ... .... ....................................................34-12
ipv6 access-group ..... ... ... .... ... ... ... .............................................................................. ... ... ..............34-13
access-list interface................................ ... ... .... ... ... ... .... .......................................... .......................34-14
Chapter 35: Configuring Service Access Control Lists
About Service Access Control Lists ..............................................................................................................35-1
Restricting Management Access to the Console Port .................................. .... ... ... ... .... ......................... 35-2
Commands ...................................................................................................................................................35-2
set system service-acl ......................................................................................................................35-2
show system service-acl...................................................................................................................35-4
clear system service-acl ...................................................................................................................35-4
set system service-class...................................................................................................................35-5
show system service-class...............................................................................................................35-5
clear system service-class................................................................................................................35-6
Chapter 36: TACACS+ Configuration
show tacacs......................................................................................................................................36-2
set tacacs .........................................................................................................................................36-3
show tacacs server...........................................................................................................................36-3
set tacacs server ..............................................................................................................................36-4
clear tacacs server ...........................................................................................................................36-5
show tacacs session.........................................................................................................................36-6
set tacacs session ............................................................................................................................36-7
clear tacacs session .........................................................................................................................36-8
show tacacs command.....................................................................................................................36-9
set tacacs command.........................................................................................................................36-9
show tacacs singleconnect.............................................................................................................36-10
set tacacs singleconnect ................................................................................................................36-10
show tacacs interface.....................................................................................................................36-11
set tacacs interface.........................................................................................................................36-11
clear tacacs interface......................................................................................................................36-12
xxx
Chapter 37: sFlow Configuration
Overview ................................... ................ ................ ................. ................ ................ ...................................37-1
Using sFlow in Your Network ............................. .................................................................... ................ 37-1
Definitions ..............................................................................................................................................37-2
sFlow Agent Functionality ......................................................................................................................37-2
Sampling Mechanisms ........................................................................................................................... 37-2
Example Configuration ........................................................................................................................... 37-4
Commands ...................................................................................................................................................37-4
show sflow receivers ........................................................................................................................37-5
set sflow receiver owner...................................................................................................................37-7
set sflow receiver ip..........................................................................................................................37-7
set sflow receiver maxdatagram.......................................................................................................37-8
set sflow receiver port.......................................................................................................................37-9
clear sflow receiver...........................................................................................................................37-9
set sflow port poller.........................................................................................................................37-10
show sflow pollers ..........................................................................................................................37-11
clear sflow port poller......................................................................................................................37-12
set sflow port sampler.....................................................................................................................37-12
show sflow samplers ......................................................................................................................37-13
clear sflow port sampler..................................................................................................................37-14
set sflow interface...........................................................................................................................37-14
show sflow interface .......................................................................................................................37-15
clear sflow interface........................................................................................................................37-16
show sflow agent............................................................................................................................37-17
Figures
1-1 Enterasys C3 Startup Screen.............................................................................................................1-6
1-2 Sample CLI Defaults Description........................................................................................................ 1-8
1-3 Performing a Keyword Lookup ............................... ... .... ... ... .......................................... ... ... .... ...........1-8
1-4 Performing a Partial Keyword Lookup................................................................................................ 1-9
1-5 Scrolling Screen Output... .......................................... .... ... ... ... .... ... ... ... ... .... ........................................ 1-9
1-6 Abbreviating a Command.................................................................................................................1-10
14-1 Example of VLAN Propagation via GVRP...................................................................................... 14-21
Tables
1-1 Default Settings for Basic Switch Operation.......................................................................................1-2
1-2 Default Settings for Router Operation ................................................................................................ 1-4
1-3 Basic Line Editing Commands.......................................................................................................... 1-10
3-1 Required CLI Setup Commands......................................................................................................... 3-1
3-2 Optional CLI Setup Commands..........................................................................................................3-2
3-3 show system Output Details...............................................................................................................3-8
3-4 show version Output Details............................................................................................................. 3-21
5-1 User Account and Password Parameter Defaults by Security Mode .................................................5-4
5-2 show system password Output Details............................................................................................. 5-11
5-3 show system lockout Output Details................................................................................................. 5-17
8-1 show inlinepower Output Details ........................................................................................................8-2
8-2 show port inlinepower Output Details .................................................................................................8-5
10-1 show cdp Output Details................................................................................................................... 10-2
10-2 show ciscodp Output Details ............................................................................................................ 10-8
10-3 show ciscodp port info Output Details ..............................................................................................10-9
10-4 show lldp port local-info Output Details ..........................................................................................10-19
10-5 show lldp port remote-info Output Display......................................................................................10-22
11-1 show port status Output Details........................................................................................................ 11-4
11-2 show port counters Output Details ...................................................................................................11-5
11-3 show port cablestatus Output Details............................................................................................... 11-7
xxxi
11-4 show linkflap parameters Output Details................... .... ... ... ... .... ... ... .............................................. 11-26
11-5 show linkflap metrics Output Details. ... .......................................... .................................................11-27
11-6 LACP Terms and Definitions ..........................................................................................................11-45
11-7 show lacp Output Details................................................................................................................11-48
12-1 SNMP Security Levels......................................................................................................................12-3
12-2 show snmp counters Output Details................................................................................................. 12-5
12-3 show snmp user Output Details........................................................................................................12-8
12-4 show snmp group Output Details ...................................................................................................12-11
12-5 show snmp access Output Details .................................................................................................12-16
12-6 show snmp view Output Details .....................................................................................................12-20
12-7 show snmp targetparams Output Details .......................................................................................12-23
12-8 show snmp targetaddr Output Details ............................................................................................12-26
12-9 show snmp notify Output Details................................................................................................ ....12-30
12-10 Basic SNMP Trap Configuration.....................................................................................................12-36
12-11 show snmp engineid Output Details...............................................................................................12-40
13-1 show spantree Output Details ... ... .... ... ... ... ... .... ... ....................................... ... ... ... .... ... ... ... ... .............13-7
14-1 Command Set for Creating a Secure Management VLAN...............................................................14-2
14-2 show vlan Output Details..................................................................................................................14-4
14-3 show gvrp configuration Output Details........ .... ... ... ... .... ... ... ....................................... ... ... ... .... ....... 14-23
15-1 show policy profile Output Details ....................................................................................................15-3
15-2 show policy rule Output Details ........................................................................................................ 15-8
15-3 Valid Values for Policy Classification Rules ............................... ... ... ... ... .... ... ................................. 15-12
18-1 show netstat Output Details.............................................................................................................. 18-6
18-2 show arp Output Details ................................................................................................................... 18-8
18-3 show mac Output Details................................................................................................................ 18-11
18-4 show nodealias config Output Details ............................................................................................18-18
19-1 show logging server Output Details.............. .......................................... .... ...................................... 19-4
19-2 show logging application Output Details........................................................................................... 19-8
19-3 Mnemonic Values for Logging Applications......................................................................................19-9
20-1 show sntp Output Details.................................................................................................................. 20-3
21-1 RMON Monitoring Group Functions and Commands............. .... ... ... ... .............................................21-1
21-2 show rmon alarm Output Details .................................................................................................... 21-10
21-3 show rmon event Output Details ....................................................................................................21-14
24-1 Enabling the Switch for Routing .......................................................................................................24-2
24-2 Router CLI Configuration Modes...................................................................................................... 24-2
25-1 show ip interface Output Details.......................................................................................................25-5
25-2 show ip arp Output Details .............................................................................................................25-13
26-1 RIP Configuration Task List and Commands ................................... ... ... .... ... ... ... .... ... ... ... ................
26-1
27-1 OSPF Configuration Task List and Commands... ... ... .... ... .......................................... ......................27-2
27-2 show ip ospf database Output Details............................................................................................ 27-20
27-3 show ip ospf interface Output Details............................................................................................. 27-21
27-4 show ip ospf neighbor Output Details.............................................................................................27-23
27-5 show ip ospf virtual links Output Details......................................................................................... 27-23
27-6 Commands to Enable DVMRP on an Interface.......................... ......................................... .... ... ... . 27-25
27-7 show ip pimsm Output Details........................................................................................................27-41
27-8 show ip pimsm componenettable Output Details ...... .... ... ... ... .... ... ... .......................................... ... . 27-42
27-9 show ip pimsm interface vlan Output Details.................................... ... ... .... ... ... ... .... ... ... ... ..............27-43
27-10 show ip pimsm interface stats Output Details.................................................................................27-43
27-11 show ip pimsm neighbor Output Details......................................................................................... 27-44
27-12 show ip pimsm rp Output Details....................................................................................................27-45
27-13 show ip pimsm staticrp Output Details ...........................................................................................27-47
28-1 show ipv6 netstat Output Display ...................................................................................................28-8
29-1 show ipv6 neighbor Output Details............ ... .... ... ... ... .... ...................................... .... ... ... ... ... ........... 29-24
29-2 show ipv6 route Output Details.......................................................................................................29-26
29-3 show ipv6 route preferences Output Details...................................................................................29-27
29-4 show ipv6 summary Output Details................................................................................................ 29-28
xxxii
29-5 show ipv6 traffic Output Details .....................................................................................................29-30
30-1 Output of show ipv6 dhcp interface Command............................................................................... 30-15
30-2 Output of show ipv6 dhcp statistics Command...............................................................................30-16
31-1 show ipv6 ospf Output Details........................................................................................................31-31
31-2 show ipv6 ospf area Output Details................................................................................................31-32
31-3 show ipv6 ospf abr Output Details..................................................................................................31-33
31-4 show ipv6 ospf asbr Output Details................................................................................................31-34
31-5 show ipv6 ospf database Output Details .......................................................................................31-37
31-6 show ipv6 ospf database database-summary Output Details ........................................................ 31-38
31-7 show ipv6 ospf interface Command Output Details ... .... ... ... ... .... ... .................................................31-40
31-8 show ipv6 ospf interface stats Output Details.................................................................................31-42
31-9 show ipv6 ospf neighbor Output Details ... ... .......................................... .... .................................... 31-44
31-10 show ipv6 ospf neighbor routerid Output Details............................................................................31-45
31-11 show ipv6 ospf range Output Details..............................................................................................31-46
31-12 show ipv6 ospf stub table Output Details .......................................................................................31-46
31-13 show ipv6 ospf virtual-link Output Details.......................................................................................31-47
32-1 show radius Output Details............................................................................................................... 32-7
32-2 show eapol Output Details..............................................................................................................32-26
32-3 show macauthentication Output Details .........................................................................................32-30
32-4 show macauthentication session Output Details............................................................................ 32-31
32-5 show vlanauthorization Output Details ...........................................................................................32-56
32-6 show maclock Output Details ......................................................................................................... 32-63
32-7 show maclock stations Output Details............................................................................................32-64
32-8 show pwa Output Details................................................................................................................32-78
36-1 show tacacs Output Details..............................................................................................................36-2
37-1 sFlow Definitions .............................................................................................................................. 37-2
37-2 show sflow receivers Output Descriptions........................................................................................37-6
xxxiii
xxxiv
Welcome to the Enterasys® C3 CLI Reference. This manual explains how to access the device’s Command Line Interface (CLI) and how to use it to configure Enterasys C3 switch devices.
Depending on the firmware version used in your C3 device, some features described in this document may not be supported. Refer to the Release Notes for your device to determine which features are supported.
Using This Guide
A general working knowledge of basic network operations and an understanding of CLI management applications is helpful before configuring the device.
This manual describes how to do the following:
Access the swtitch CLI.
Use CLI commands to perform network management and device configuration operations
Establish and manage Virtual Local Area Networks (VLANs).
About This Guide
Important Notice
Establish and manage static and dynamically-assigned policy classifications.
Establish and manage priority classification.
Configure IP routing and routing protocols, including RIP versions 1 and 2, OSPF, DVMRP, IRDP, and VRRP.
Configure IPv6 routing, including OSPFv3.
Configure security protocols, including 802.1X and RADIUS, SSHv2, PWA, MAC locking, and MAC authentication.
Configure access control lists (ACLs).
Structure of This Guide
The guide is organized as follows:
Chapter 1, Introduction, provides an overview of the tasks that can be accomplished using the
CLI interface, an overview of local management requirements, an overview of the device’s factory default settings, and information about using the Command Line Interface (CLI).
Chapter 2, Configuring Switches in a Stack, provides information about how to configure and
manage stacked switches.
Chapter 3, Basic Configuration, provides how to set basic system properties, how to download a
firmware image, how to configure WebView and Telnet, how to manage configuration files, how to set the login password, and how to exit the CLI.
Chapter 4, Activating Licensed Features, describes the commands used to enable advanced
routing and IPv6 routing licensed features.
Enterasys C3 Configuration Guide xxxv
Structure of This Guide
Chapter 5, Setting User Accounts and Passwords, describes user account and password
management functionality.
Chapter 6, Management Authentication Notification MIB Commands, provides detailed
information for the management authentication notification MIB set of commands. Management authentication notification MIB functionality includes enabling/disabling the sending of SNMP notifications when a user login authentication event occurs for various authentication notification types.
Chapter 7, Setting the Security Mode, describes how to configure the switch security mode.
Chapter 8, Configuring System Power and PoE, describes the commands used to review and set
system power and PoE parameters on devices that offer Power over Ethernet.
Chapter 9, Transmit Queue Monitoring Configuration, describes the commands used to monitor
transmit queues and, if a queue is found to be stalled, to take corrective action.
Chapter 10, Discovery Protocol Configuration provides how to configure discovery protocols
supported by the device.
Chapter 11, Port Configuration, describes how to review and configure console port settings, and
how to enable or disable switch ports and configure switch port settings, including port speed, duplex mode, auto-negotiation, flow control, port mirroring, link aggegation and broadcast suppression.
Chapter 12, SNMP Configuration, describes how to configure SNMP users and user groups,
access rights, target addresses, and notification parameters.
Chapter 13, Spanning Tree Configuration, describes how to review and set Spanning Tree bridge
parameters for the device, including bridge priority, hello time, maximum aging time and forward delay; and how to review and set Spanning Tree port parameters, including port priority and path costs. Configuring the SpanGuard and Loop Protect functions is also described.
Chapter 14, 802.1Q VLAN Configuration, describes how to create static VLANs, select the mode
of operation for each port, establish VLAN forwarding (egress) lists, route frames according to VLAN ID, display the current ports and port types associated with a VLAN and protocol, create a secure management VLAN, and configure ports on the device as GVRP-aware ports.
Chapter 15, Policy Classification Configuration, describes how to create, change or remove user
roles or profiles based on business-specific use of network services; how to permit or deny access to specific services by creating and assigning classification rules which map user profiles to frame filtering policies; how to classify frames to a VLAN or Class of Service (CoS); and how to assign or unassign ports to policy profiles so that only ports activated for a profile will be allowed to transmit frames accordingly.
Chapter 16, Port Priority Configuration, describes how to set the transmit priority of each port
and configure a rate limit for a given port and list of priorities.
Chapter 17, IGMP Configuration, describes how to configure Internet Group Management
Protocol (IGMP) settings for multicast filtering.
Chapter 18, Network Management, describes how to manage general switch settings, how to
monitor network events and status,and how to configure node aliases.
Chapter 19, Configuring System Logging, describes how to display and configure system
logging, including Syslog server settings, Syslog default settings, and the logging buffer. This chapter also includes information about security audit logging.
Chapter 20, Configuring SNTP, describes how to use CLI commands to configure the Simple
Network Time Protocol (SNTP), which synchronizes device clocks in a network. Also included are SNTP authentication commands.
Chapter 21, RMON Configuration, describes how to use RMON (Remote Network Monitoring),
which provides comprehensive network fault diagnosis, planning, and performance tuning
xxxvi About This Guide
Related Documents
information and allows for interoperability between SNMP management stations and monitoring agents.
Chapter 22, DHCP Server Configuration, describes how to review and configure DHCP server
parameters, how to review and configure DHCP address pools, and how to display DHCP server information.
Chapter 23, DHCP Snooping and Dynamic ARP Inspection, describes two security features:
DHCP snooping, which monitors DHCP messages between a DHCP client and DHCP server to filter harmful DHCP messages and to build a database of authorized address bindings, and Dynamic ARP inspection, which uses the bindings database created by the DHCP snooping feature to reject invalid and malicious ARP packets.
Chapter 24, Preparing for Router Mode, provides information about router modes.
Chapter 25, IP Configuration, describes how to enable IP routing for router mode operation, how
to configure IP interface settings, how to review and configure the routing ARP table, how to review and configure routing broadcasts, how to configure PIM, and how to configure IP routes.
Chapter 26, IPv4 Basic Routing Protocol Configuration, describes how to configure basic IPv4
routing protocols, including RIP and IRDP.
Chapter 27, IPv4 Advanced Routing Protocol Configuration, describes how to configure
advanced IPv4 routing protocols, including OSPF, DVMRP, VRRP, and PIM-SM. To use these protocols, you must purchase and install an advanced routing license.
Chapter 28, IPv6 Management, describes the commands used to configure IPv6 at the switch
level.
Chapter 29, IPv6 Configuration, describes the commands used to configure IPv6 at the routing
level. To configure IPv6 at the routing level, you must purchase and install an IPv6 license.
Chapter 30, DHCPv6 Configuration, describes the commands used to configure the Dynamic
Host Configuration Protocol for IPv6. To configure DHCPv6, you must purchase and install an IPv6 license.
Chapter 31, OSPFv3 Configuration, describes the commands used to configure the Open Shortest
Path First routing protocol for IPv6. To configure OSPFv3, you must purchase and install an IPv6 license.
Chapter 32, Authentication and Authorization Configuration, describes how to configure 802.1X
authentication using EAPOL, how to configure RADIUS server, Secure Shell server, MAC authentication, MAC locking, and Port Web Authentication.
Chapter 33, Configuring IPsec, describes how to configure IPsec (IP Security) as specified in RFC
4301.
Chapter 34, Configuring Access Control Lists, describes how to configure and apply router mode
Access Control Lists (ACLs).
Chapter 35, Configuring Service Access Control Lists, describes how to configure and apply
switch mode Service Access Control Lists (ACLs).
Chapter 36
configure and monitor TACACS+ (Terminal Access Controller Access-Control System Plus).
, TACACS+ Configuration, provides information about the commands used to
Chapter 37, sFlow Configuration, provides information about the commands used to configure
and monitor the sFlow system.
Related Documents
The following Enterasys Networks documents may help you to set up, control, and manage the device:
Enterasys C3 Configuration Guide xxxvii
Conventions Used in This Guide
Enterasys Firmware Feature Guides
Enterasys C3 Installation Guide
Redundant Power Supply Quick References
Documents listed above can be obtained from the World Wide Web in Adobe Acrobat Portable Document Format (PDF) at the following web site:
https://extranet.enterasys.com/downloads/
Conventions Used in This Guide
The following conventions are used in the text of this document:
Convention Description Bold font Indicates mandatory keywords, parameters or keyboard keys.
italic font Indicates complete document titles.
Courier font Used for examples of information displayed on the screen.
Courier font in italics Indicates a user-supplied value, either required or optional. [ ] Square brackets indicate an optional value. { } Braces indicate required values. One or more values may be required. | A vertical bar indicates a choice in values. [x | y | z] Square brackets with a vertical bar indicate a choice of a value. {x | y | z} Braces with a vertical bar indicate a choice of a required value. [x {y | z} ] A combina tio n of square brackets with braces and vertical bars indicates a
required choice of an optional value.
The following icons are used in this guide:
Note: Calls the reader’s attention to any item of information that may be of special importance.
Router: Calls the reader’s attention to router-specific commands and information.
Caution: Contains information essential to avoid damage to the equipment.
xxxviii About This Guide
Getting Help
For additional support related to this switch or document, contact Enterasys Networks using one of the following methods:
World Wide Web http://www.enterasys.com/support Phone 1-800-872-8440 (toll-free in U.S. and Canada)
Internet mail support@enterasys.com
Before calling Enterasys Networks, have the following information ready:
Your Enterasys Networks service contract number
A description of the failure
A description of any action(s) already taken to resolve the problem (for example, changing
The serial and revision numbers of all involved Enterasys Networks products in the network
Getting Help
or 1-978-684-1000 For the Enterasys Networks Support toll-free number in your country:
http://www.enterasys.com/support/contact/
To expedite your message, type [C-SERIES] in the subject line.
mode switches or rebooting the unit)
A description of your network environment (for example, layout, cable type)
Network load and frame size at the time of trouble (if known)
The switch history (for example, have you returned the switch before, is this a recurring problem?)
Any previous Return Material Authorization (RMA) numbers
Enterasys C3 Configuration Guide xxxix
Getting Help
xl About This Guide
This chapter provides an overview of the Enterasys C3’s unique features and functionality, an overview of the tasks that may be accomplished using the CLI interface, an overview of ways to manage the switch, factory default settings, and information about how to use the Command Line Interface to configure the switch.
For information about... Refer to page...
Enterasys C3 CLI Overview 1-1 Switch Management Methods 1-1 Factory Default Settings 1-2 Using the Command Line Interface 1-6
Enterasys C3 CLI Overview
1
Introduction
The Enterasys Networks Enterasys C3 CLI interface allows you to perform a variety of network management tasks, including the following:
Use CLI commands to perform network management and switch configuration operations.
Download a new firmware image.
Assign IP address and subnet mask.
Select a default gateway.
Establish and manage Virtual Local Area Networks (VLANs).
Establish and manage policy profiles and classifications.
Establish and manage priority classification.
Configure IPv4 routing and routing protocols.
Configure IPv6 routing and routing protocols, including OSPFv3.
Configure security protocols, including 802.1X and RADIUS, SSHv2, PWA, MAC locking, and MAC authentication.
Configure access control lists (ACLs).
Switch Management Methods
The Enterasys C3 switch can be managed using the following methods:
Locally using a VT type terminal connected to the console port.
Remotely using a VT type terminal connected through a modem.
Enterasys C3 Configuration Guide 1-1
Factory Default Settings
Remotely using an SNMP management station.
In-band through a Telnet connection.
In-band using the Enterasys NetSight
Remotely using WebView™, Enterasys Networks’ embedded web server application.
The Installation Guide for your Enterasys C3 device provides setup instructions for connecting a terminal or modem to the switch.
Factory Default Settings
The following tables list factory default settings available on the Enterasys C3 switch.
Table 1-1 Default Settings for Basic Switch Operation
Feature Default Setting Switch Mode Defaults
CDP discovery protocol Auto enabled on all ports. CDP authentication code Set to 00-00-00-00-00-00-00-00 CDP hold time Set to 180 seconds. CDP interval Transmit frequency of CDP messages set to 60 seconds.
®
management application.
Cisco discovery protocol Auto enabled on all ports. Cisco DP hold time Set to 180 seconds. Cisco DP interval timer Set to 60 seconds. Community name Public. Console (serial) port
required settings
DHCP server Disabled. EAPOL Disabled. EAPOL authentication
mode GARP timer Join timer set to 20 centiseconds; leave timer set to 60 centiseconds; leaveall
GVRP Globally enabled. Disabled per port. History buffer size 20 lines. IEEE 802.1 authentication Disabled.
Baud rate: 9600 Data bits: 8 Flow control: disabled Stop bits: 1 Parity: none
When enabled, set to auto for all ports.
timer set to 1000 centiseconds.
IGMP snooping Disabled. When enabled, query interval is set to 260 seconds and response
IP mask and gateway Subnet mask set to 0.0.0.0; default gateway set to 0.0.0.0. IP routes No static routes configured. Jumbo frame support Enabled on all ports.
1-2 Introduction
time is set to 10 seconds.
Table 1-1 Default Settings for Basic Switch Operation (Continued)
Feature Default Setting
Factory Default Settings
Link aggregation control
Globally enabled. Enabled per port.
protocol (LACP) Link aggregation admin
Set to 32768 for all ports.
key Link aggregation flow
Disabled.
regeneration Link aggregation system
Set to 32768 for all ports.
priority Link aggregation outport
Set to DIP-SIP.
algorithm Lockout Set to disable Read-Write and Read-Only users, and to lockout the default
admin (Super User) account for 15 minutes, after 3 failed login attempts.
Logging Syslog port set to UDP port number 514. Logging severity level set to 6
(significant conditions) for all applications. MAC aging time Set to 300 seconds. MAC locking Disabled (globally and on all ports). Passwords Set to an empty string for all default user accounts. User must press ENTER
at the password prompt to access CLI. Password aging Disabled. Password history No passwords are checked for duplication. Policy classification Classification rules are automatically enabled when created. Port auto-negotiation Enabled on all ports. Port advertised ability Maximum ability advertised on all ports. Port broadcast suppression Enabled and set to limit broadcast packets to 14,881 per second on all switch
ports. Port duplex mode Set to half duplex, except for 100BASE-FX and 1000BASE-X, which is set to
full duplex. Port enable/disable Enabled. Port priority Set to 0. Port speed Set to 10 Mbps, except for 1000BASE-X, which is set to 1000 Mbps, and
100BASE-FX, which is set to 100 Mbps. Port trap All ports are enabled to send link traps. Power over Ethernet port
Administrative state is on (auto). admin state
Priority classification Classification rules are automatically enabled when created. RADIUS client Disabled. RADIUS retries When the client is enabled, set to 3. RADIUS timeout When the client is enabled, set to 20 seconds. SNMP Enabled. SNTP Disabled.
Enterasys C3 Configuration Guide 1-3
Factory Default Settings
Table 1-1 Default Settings for Basic Switch Operation (Continued)
Feature Default Setting
Spanning Tree Globally enabled and enabled on all ports. Spanning Tree edge port
administrative status
Spanning Tree edge port delay
Spanning Tree forward delay
Spanning Tree hello interval
Spanning Tree ID (SID) Set to 0. Spanning Tree maximum
aging time Spanning Tree port priority All ports with bridge priority are set to 128 (medium priority). Spanning Tree priority Bridge pri ority is set to 32768. Spanning Tree topology
change trap suppression Spanning Tree version Set to mstp (Multiple Spanning Tree Protocol). SSH Disabled. System baud rate Set to 9600 baud.
Edge port administrative status begins with the value set to false initially after
the device is powered up. If a Spanning Tree BDPU is not received on the
port within a few seconds, the status setting changes to true.
Enabled.
Set to 15 seconds.
Set to 2 seconds.
Set to 20 seconds.
Enabled.
System contact Set to empty string. System location Set to empty string. System name Set to empty string. Telnet Enabled. Telnet port (IP) Set to port number 23. Terminal CLI display set to 80 columns and 24 rows. Timeout Set to 5 minutes. User names Login accounts set to ro for Read-Only access; rw for Read-Write access;
and admin for Super User access. VLAN dynamic egress Disabled on all VLANs. VLAN ID All ports use a VLAN identifier of 1. Host VLAN Default host VLAN is 1.
Not all of the following routing features are available on all platforms. Check the Release Notes for your specific platforms for details.
Table 1-2 Default Settings for Router Operation
Feature Default Setting
Access groups (IP security) None configured. Access control lists None configured.
1-4 Introduction
Factory Default Settings
Table 1-2 Default Settings for Router Operation (Continued)
Feature Default Setting
Area authentication (OSPF) Disabled. Area default cost (OSPF) Set to 1. Area NSSA (OSPF) None configured. Area range (OSPF) None configured. ARP table No permanent entries configured. ARP timeout Set to 14,400 seconds. Authentication key (RIP and OSPF) None configured. Authentication mode (RIP and OSPF) N one configured. Dead interval (OSPF) Set to 40 seconds. Disable triggered updates (RIP) Triggered updates allowed. Distribute list (RIP) No filters applied. DVMRP Disabled. Metric set to 1. Hello interval (OSPF) Set to 10 seconds for broadcast and point-to-point networks. Set
to 30 seconds for non-broadcast networks. ICMP Enabled for echo-reply and mask-reply modes. IP-directed broadcasts Disabled. IP forward-protocol Enabled with no port specified. IP interfaces Disabled with no IP addresses specified. IRDP Disabled on all interfaces. When enabled, maximum
advertisement interval is set to 600 seconds, minimum
advertisement interval is set to 450 seconds, holdtime is set to
1800 seconds, and address preference is set to 0. MD5 authentication (OSPF) Disabled with no password set. MTU size Set to 1500 bytes on all interfaces. OSPF Disabled. OSPF cost Set to 10 for all interfaces. OSPF network None configured. OSPF priority Set to 1. Passive interfaces (RIP) None configured. Proxy ARP Enabled on all interfaces. Receive interfaces (RIP) Enabled on all interfaces. Retransmit delay (OSPF) Set to 1 second. Retransmit interval (OSPF) Set to 5 seconds. RIP receive version Set to accept both version 1 and version 2. RIP send version Set to version 1. RIP offset No value applied. SNMP Enabled.
Enterasys C3 Configuration Guide 1-5
Using the Command Line Interface
Table 1-2 Default Settings for Router Operation (Continued)
Feature Default Setting
Split horizo n Enabled for RIP packets withou t po i so n re verse. Stub area (OSPF) None configured. Timers (OSPF) SPF delay set to 5 seconds. SPF holdtime set to 10 seconds. Transmit delay (OSPF) Set to 1 second. VRRP Disabled.
Using the Command Line Interface
Starting a CLI Session
Connecting Using the Console Port
Connect a terminal to the local console port as described in your Enterasys C3 Installation Guide. The startup screen, Figure 1-1, will display on the terminal. You can now start the Command Line Interface (CLI) by
using a default user account, as described in “Using a Default User Account” on page 1-7, or
using an administratively-assigned user account as described in “Using an Administratively
Configured User Account” on page 1-7.
Figure 1-1 Enterasys C3 Startup Screen
Username:admin Password:
Enterasys C3
Command Line Interface
Enterasys Networks, Inc. 50 Minuteman Rd. Andover, MA 01810-1008 U.S.A.
Phone: +1 978 684 1000 E-mail: support@enterasys.com WWW: http://www.enterasys.com
(c) Copyright Enterasys Networks, Inc. 2012
Chassis Serial Number: 041800249041 Chassis Firmware Revision: 6.61.xx.xxxx
C3(su)->
Connecting Using Telnet
Once the Enterasys C3 device has a valid IP address, you can establish a Telnet session from any TCP/IP based node on the network. For information about setting the switch’s IP address, refer to “set ip address” on page 3-4.
1-6 Introduction
To establish a Telnet session:
1. Telnet to the switch’s IP address.
2. Enter login (user name) and password information in one of the following ways:
If the switch’s default login and password settings have not been changed, follow the
Enter an administratively-configured user name and password.
The notice of authorization and the prompt displays as shown in Figure 1-1.
For information about configuring Telnet settings, refer to “Starting and Configuring Telnet” on page 3-32.
Refer to the instructions included with the Telnet application for information about establishing a Telnet session.
Logging In
By default, the Enterasys C3 switch is configured with three user login accounts—ro for Read-Only access, rw for Read-Write access, and admin for super-user access to all modifiable parameters. The default password is set to a blank string. For information on changing these default settings, refer to “User Account and Password Management” on page 5-1.
Using the Command Line Interface
steps listed in “Using a Default User Account” on page 1-7, or
Using a Default User Account
If this is the first time you are logging in to the Enterasys C3 switch, or if the default user accounts have not been administratively changed, proceed as follows:
1. At the login prompt, enter one of the following default user names:
ro for Read-Only access.
rw for Read-Write access.
admin for Super User access.
2. Press ENTER. The Password prompt displays.
3. Leave this string blank and press ENTER. The switch information and prompt displays as shown in Figure 1-1.
Using an Administratively Configured User Account
If the switch’s default user account settings have been changed, proceed as follows:
1. At the login prompt, enter your administratively-assigned user name and press ENTER.
2. At the Password prompt, enter your password and press ENTER.
The notice of authorization and the prompt displays as shown in Figure 1-1.
Note: Users with Read-Write (rw) and Read-Only access can use the set password command (page 5-9) to change their own passwords. Administrators with Super User (su) access can use the set system login command (page 5-6) to create and change user accounts, and the set
password command to change any local account password.
Enterasys C3 Configuration Guide 1-7
Using the Command Line Interface
Navigating the Command Line Interface
Getting Help with CLI Syntax
The Enterasys C3 switch allows you to display usage and syntax information for individual commands by typing help or ? after the command.
CLI Command Defaults Descriptions
Each command description in this guide includes a section entitled “Defaults” which contains different information from the factory default settings on the switch described in Table 1 -1 . The section defines CLI behavior if the user enters a command without typing optional parameters (indicated by square brackets [ ]). For commands without optional parameters, the defaults section lists “None”. For commands with optional parameters, this section describes how the CLI responds if the user opts to enter only the keywords of the command syntax. Figure 1-2 provides an example.
Figure 1-2 Sample CLI Defaults Description
Syntax
show port status [port-string]
Defaults
If port-string is not specified, status information for all ports will be displayed.
CLI Command Modes
Each command description in this guide includes a section entitled “Mode” which states whether the command is executable in Admin (Super User), Read-Write, or Read-Only mode. Users with Read-Only access will only be permitted to view Read-Only (show) commands. Users with Read­Write access will be able to modify all modifiable parameters in set and show commands, as well as view Read-Only commands. Administrators or Super Users will be allowed all Read-Write and Read-Only privileges, and will be able to modify local user accounts. The Enterasys C3 switch indicates which mode a user is logged in as by displaying one of the following prompts:
Admin: C3(su)->
Read-Write: C3(rw)->
Read-Only: C3(ro)->
Performing Keyword Lookups
Entering a space and a question mark (?) after a keyword will display all commands beginning with the keyword. Figure 1-3 shows how to perform a keyword lookup for the show snmp command. In this case, four additional keywords are used by the show snmp command. Entering a space and a question mark (?) after any of these parameters (such as show snmp community) will display additional parameters nested within the syntax.
Figure 1-3 Performing a Keyword Lookup
C3(su)->show snmp ?
community SNMP v1/v2c community name configuration notify SNMP notify configuration targetaddr SNMP target address configuration targetparams SNMP target parameters configuration
1-8 Introduction
Using the Command Line Interface
Entering a question mark (?) without a space after a partial keyword will display a list of commands that begin with the partial keyword. Figure 1-4 shows how to use this function for all commands beginning with co:
Figure 1-4 Performing a Partial Keyword Lookup
C3(rw)->co? configure copy C3(su)->co
Note: At the end of the lookup display, the system will repeat the command you entered without the ?.
Displaying Scrolling Screens
If the CLI screen length has been set using the set length command as described on page 3-24, CLI output requiring more than one screen will display --More-- to indicate continuing screens. To display additional screen output:
Press any key other than ENTER to advance the output one screen at a time.
Press ENTER to advance the output one line at a time.
The example in Figure 1-5 shows how the show mac command indicates that output continues on more than one screen.
Figure 1-5 Scrolling Screen Output
C3(su)->show mac
MAC Address FID Port Type
---------------------------------------------------------­ 00-00-1d-67-68-69 1 host Management 00-00-02-00-00-00 1 ge.1.2 Learned 00-00-02-00-00-01 1 ge.1.3 Learned 00-00-02-00-00-02 1 ge.1.4 Learned 00-00-02-00-00-03 1 ge.1.5 Learned 00-00-02-00-00-04 1 ge.1.6 Learned 00-00-02-00-00-05 1 ge.1.7 Learned 00-00-02-00-00-06 1 ge.1.8 Learned 00-00-02-00-00-07 1 ge.1.9 Learned 00-00-02-00-00-08 1 ge.1.10 Learned
--More--
Abbreviating and Completing Commands
The Enterasys C3 switch allows you to abbreviate CLI commands and keywords down to the number of characters that will allow for a unique abbreviation. Figure 1-6 shows how to abbreviate the show netstat command to sh net.
Enterasys C3 Configuration Guide 1-9
Using the Command Line Interface
Figure 1-6 Abbreviating a Command
C3(su)->sh net Active Internet connections (including servers) Proto Recv-Q Send-Q Local Address Foreign Address State
----- ------ ------ --------------------- --------------------- ------- TCP 0 0 10.21.73.13.23 134.141.190.94.51246 ESTABLISHED TCP 0 275 10.21.73.13.23 134.141.192.119.4724 ESTABLISHED TCP 0 0 *.80 *.* LISTEN TCP 0 0 *.23 *.* LISTEN UDP 0 0 10.21.73.13.1030 134.141.89.113.514 UDP 0 0 *.161 *.* UDP 0 0 *.1025 *.* UDP 0 0 *.123 *.*
Basic Line Editing Commands
The CLI supports EMACs-like line editing commands. Ta ble 1 -3 lists some commonly used commands.
Table 1-3 Basic Line Editing Commands
Key Sequence Command
Ctrl+A Move cursor to beginning of line. Ctrl+B Move cursor back one character. Ctrl+D Delete a character. Ctrl+E Move cursor to end of line. Ctrl+F Move cursor forward one characte r. Ctrl+H Delete character to left of cursor. Ctrl+I or TAB Complete word. Ctrl+K Delete all characters after cursor. Ctrl+N Scroll to next command in command history (use the CLI history command to
display the history). Ctrl+P Scroll to previous command in command history. Ctr1+Q Resume the CLI process. Ctr1+S Pause the CLI process (for scrolling). Ctrl+T Transpose characters. Ctrl+U or Ctrl+X Delete all characters before cursor. Ctrl+W Delete word to the left of cursor. Ctrl+Y Restore the most recently deleted item.
1-10 Introduction
Configuring Switches in a Stack
This chapter provides information about configuring Enterasys C3 switches in a stack.
For information about ... Refer to page ...
About Enterasys C3 Switch Operation in a Stack 2-1 Installing a New Stackable System of Up to Eight Units 2-2 Installing Previously-Configured Systems in a Stack 2-3 Adding a New Unit to an Existing Stack 2-3 Creating a Virtual Switch Configuration 2-3 Considerations About Using Clear Config in a Stack 2-4 Issues Related to Mixed Type Stacks 2-4 Stacking Configuration and Management Commands 2-5
2
About Enterasys C3 Switch Operation in a Stack
The Enterasys C3 products are stackable switches that can be adapted and scaled to help meet your network needs. These switches provide a management platform and uplink to a network backbone for a stacked group of up to eight Enterasys C3 switches.
Note: You can mix SecureStack C2 and C3 switches in a single stack, although only the lowest common denominator of functionality will be supported in a mixed stack. Refer to “Issues Related to
Mixed Type Stacks” on page 2-4 for information about configuring a mixed stack.
Once installed in a stack, the switches behave and perform as a single switch product. As such, you can start with a single unit and add more units as your network expands. You can also mix different products in the family in a single stack to provide a desired combination of port types and functions to match the requirements of individual applications. In all cases, a stack of units performs as one large product, and is managed as a single network entity.
When switches are installed and connected as described in your Enterasys C3 Installation Guide, the following occurs during initialization:
The switch that will manage the stack is automatically established. This is known as the manager switch.
All other switches are established as members in the stack.
The hierarchy of the switches that will assume the function of backup manager is also determined in case the current manager malfunctions, is powered down, or is disconnected from the stack.
Enterasys C3 Configuration Guide 2-1
Installing a New Stackable System of Up to Eight Units
The console port on the manager switch remains active for out-of-band (local) switch management, but the console port on each member switch is deactivated. This enables you to set the IP address and system password using a single console port. Now each switch can be configured locally using only the manager’s console port, or inband using a remote device and the CLI set of commands described in this section.
Once a stack is created (more than one switch is interconnected), the following procedure occurs:
1. By default, unit IDs are arbitrarily assigned on a first-come, first-served basis.
2. Unit IDs are saved against each module. Then, every time a board is power-cycled, it will initialize with the same unit ID. This is important for port-specific information (for example: ge.4.12 is the 12th Gigabit Ethernet port on Unit # 4).
3. The management election process uses the following precedence to assign a management switch:
a. Previously assigned / elected management unit
b. Management assigned priority (values 1-15)
c. Hardware preference level
d. Highest MAC Address
Use the following recommended procedures when installing a new stackable system or adding a new unit to an existing stack.
Important
The following procedures assume that all units have a clean configuration from manufacturing. When adding a new unit to an already running stack, it is also assumed that the new unit is using the same firmware image version as other units in the stack.
Installing a New Stackable System of Up to Eight Units
Use the following procedure for installing a new stack of up to eight units out of the box.
1. Before applying power, make all physical connections with the stack cables as described in your Enterasys C3 Installation Guide.
2. Once all of the stack cables have been connected, individually power on each unit from top to bottom.
Notes: Ensure that each switch is fully operational before applying power to the next switch. Since unit IDs are assigned on a first-come, first-served basis, this will ensure that unit IDs are ordered sequentially.
Once unit IDs are assigned, they are persistent and will be retained during a power cycle to any or all of the units.
3. (Optional) If desired, change the management unit using the set switch movemanagement command as described in “set switch movemanagement” on page 2-10.
4. Once the desired master unit has been selected, reset the system using the reset command (page 3-47).
5. After the stack has been configured, you can use the show switch unit command (page 2-5) to physically identify each unit. When you enter the command with a unit number, the MGR LED of the specified switch will blink for 10 seconds. The normal state of this LED is off for member units and steady green for the manager unit.
2-2 Configuring Switches in a Stack
Installing Previously-Configured Systems in a Stack
Installing Previously-Configured Systems in a Stack
If member units in a stack have been previous members of a different stack, you may need to configure the renumbering of the stack as follows:
1. Stack the units in the method desired, and connect the stack cables.
2. Power up only the unit you wish to be manager.
3. Once the management unit is powered up, log into the CLI, and use the show switch command as described inshow switch” on page 2-5 to display stacking information.
4. Clear any switches which are listed as “unassigned” using the clear switch member command as described in “clear switch member” on page 2-11.
5. Power up the member of the stack you wish to become unit 2. Once the second unit is fully powered, the COM session of the CLI will state that a new CPU was added.
6. Use the show switch command to redisplay stacking information.
a. If the new member displays as unit 2, you can proceed to repeat this step with the next
unit.
b. If the new member displays a different unit number, you must:
(1) Renumber the stack using the set switch renumber command as described in “set
switch” on page 2-8, then
(2) Clear the original unit number using the clear switch member command.
7. Repeat Step 6 until all members have been renumbered in the order you desire.
8. After the stack has been reconfigured, you can use the show switch unit command (“show
switch” on page 2-5) to physically confirm the identity of each unit. When you enter the
command with a unit number, the MGR LED of the specified switch will blink for 10 seconds. The normal state of this LED is off for member units and steady green for the manager unit.
Adding a New Unit to an Existing Stack
Use the following procedure for installing a new unit to an existing stack configuration. This procedure assumes that the new unit being added has a clean configuration from manufacturing and is running the same firmware image version as other units in the stack.
1. Ensure that power is off on the new unit being installed.
2. Use one of the following methods to complete stack cable connections:
If the running stack uses a daisy chain topology, make the stack cable connections from
the bottom of the stack to the new unit (that is, STACK DOWN port from the bottom unit of the running stack to the STACK UP port on the new unit).
If the running stack uses a ring stack topology, break the ring and make the stack cable
connections to the new unit to close the ring.
3. Apply power to the new unit.
Creating a Virtual Switch Configuration
You can create a configuration for a Enterasys C3 switch before adding the actual physical device to a stack. This preconfiguration feature includes configuring protocols on the ports of the “virtual switch.”
Enterasys C3 Configuration Guide 2-3
Considerations About Using Clear Config in a Stack
To create a virtual switch configuration in a stack environment:
1. Display the types of switches supported in the stack, using the show switch switchtype command (page 2-7).
2. Using the output of the show switch switchtype command, determine the switch index (SID) of the model of switch being configured.
3. Add the virtual switch to the stack using the set switch member command (page 2-11). Use the SID of the switch model, determined in the previous step, and the unit ID that you want to assign to this switch member.
4. Proceed to configure the ports of the virtual switch as you would do for physically present devices.
Note: If you preconfigure a virtual switch and then add a physical switch of a different type to the stack as that unit number, any configured functionality that cannot be supporte d on th e ph ysi ca l switch will cause a configuration mismatch status for that device and the ports of the new device will join detached. You must clear the mismatch before the new device will properly join the stack.
Considerations About Using Clear Config in a Stack
When using the clear config command (page 3-49) to clear configuration parameters in a stack, it is important to remember the following:
•Use clear config to clear config parameters without clearing stack unit IDs. This command WILL NOT clear stack parameters or the IP address and avoids the process of renumbering the stack.
•Use clear config all when it is necessary to clear all config parameters, including stack unit IDs and switch priority values. This command will not clear the IP address nor will it remove an applied advanced feature license.
•Use clear ip address to remove the IP address of the stack.
•Use clear license to remove an applied license from a switch.
Configuration parameters and stacking information can also be cleared on the master unit only by selecting the “restore configuration to factory defaults” option from the boot menu on switch startup. This selection will leave stacking priorities on all other units.
Issues Related to Mixed Type Stacks
Feature Support
Because the SecureStack C2 and C3 switches have different hardware architectures, the functionality supported by the two switch types is different. When the two types of switches are mixed in a stack, the functionality supported will be the lowest common denominator of features supported on all platforms. Refer to the firmware Release Notes for information about supported features.
Configuration
Common Firmware Version
Mixed stacking is supported by SecureStack C2 firmware version 5.02.xx.xxxx only. You can install the C2 firmware first, with the C3 switch in stand-alone mode, or you can add the C3 switch to the
2-4 Configuring Switches in a Stack
Stacking Configuration and Management Commands
stack and then copy the C2 firmware to the C3 switch using the set switch copy-fw command (page 2-9). After copying the C2 firmware to the C3 switch, you must reset the stack.
Switch Manager
It is recommended that a SecureStack C3 switch be made the manager of a mixed stack. Use the set
switch movemanagement command (page 2-10) to change the manager unit.
Stacking Configuration and Management Commands
Purpose
To review, individually configure and manage switches in a Enterasys C3 stack.
Commands
For information about... Refer to page...
show switch 2-5 show switch switchtype 2-7 show switch stack-ports 2-8 set switch 2-8 set switch copy-fw 2-9 set switch description 2-10 set switch movemanagement 2-10 set switch member 2-1 1 clear switch member 2-1 1 set switch stack-ports length 2-12 clear switch stack-ports length 2-13 show switch stack-ports length 2-13
show switch
Use this command to display information about one or more units in the stack.
Syntax
show switch [status] [unit]
Parameters
status (Optional) Displays power and administrative status information for one
unit (Optional) Specifies the unit(s) for which information will display.
or more units in the stack.
Enterasys C3 Configuration Guide 2-5
show switch
Defaults
If not specified, status and other configuration information about all units will be displayed.
Mode
Switch command, read-only.
Usage
After a stack has been configured, you can use this command to physically confirm the identity of each unit. When you enter the command with a unit number, the MGR LED of the specified switch will blink for 10 seconds. The normal state of this LED is off for member units and steady green for the manager unit.
Examples
This example shows how to display information about all switch units in the stack:
C3(rw)->show switch Management Preconfig Plugged-in Switch Code Switch Status Model ID Model ID Status Version
------ ------------ ------------- ------------- --------------------- --------
1 Mgmt Switch C3G124-24 C3G124-24 OK 06.61.xx.xxxx 2 Stack Member C3G124-24 C3G124-24 OK 06.61.xx.xxxx 3 Stack Member C3G124-24 C3G124-24 OK 06.61.xx.xxxx 4 Stack Member C3G124-24 C3G124-24 OK 06.61.xx.xxxx 5 Stack Member C3G124-24 C3G124-24 OK 06.61.xx.xxxx 6 Stack Member C3G124-24 C3G124-24 OK 06.61.xx.xxxx 7 Stack Member C3G124-24 C3G124-24 OK 06.61.xx.xxxx 8 Stack Member C3G124-24 C3G124-24 OK 06.61.xx.xxxx
This example shows how to display information about switch unit 1 in the stack:
C3(ro)->show switch 1 Switch 1 Management Status Management Switch Hardware Management Preference Unassigned Admin Management Preference Unassigned Switch Type C3G124-24 Preconfigured Model Identifier C3G124-24 Plugged-in Model Identifier C3G124-24 Switch Status OK Switch Description Enterasys Networks, Inc. C3 -- Model C3G124-24 Detected Code Version 06.61.xx.xxxx Detected Code in Flash 03.01.20 Detected Code in Back Image 02.01.37 Up Time 0 days 6 hrs 37 mins 54 secs
This example shows how to display status information for switch unit 1 in the stack:
C3(ro)->show switch status 1 Switch 1 Switch Status Full Admin State Power State Inserted Switch: Model Identifier C3G124-24 Description Enterasys Networks, Inc. C3 -- Model C3G124-24
2-6 Configuring Switches in a Stack
Configured Switch: Model Identifier C3G124-24 Description Enterasys Networks, Inc. C3 -- Model C3G124-24
show switch switchtype
Use this command to display information about supported switch types in the stack.
Syntax
show switch switchtype [switchindex]
Parameters
switchindex (Optional) Specifies the switch index (SID) of the switch type to display.
Defaults
None.
Mode
show switch switchtype
Switch command, read-only.
Examples
This example shows how to display switch type information about all switches in the stack:
C3(ro)->show switch switchtype Mgmt Code SID Switch Model ID Pref Version
--- -------------------------------- ---- ---------
1 C2G124-24 1 0xa08245 2 C2K122-24 1 0xa08245 3 C2G124-48 1 0xa08245 4 C2G124-48P 1 0xa08245 5 C2H124-48 1 0xa08245 6 C2H124-48P 1 0xa08245 7 C2G134-24P 1 0xa08245 8 C2G170-24 1 0xa08245 9 C3G124-24P 1 0xa08245 10 C3G124-48P 1 0xa08245 11 C3G124-48 1 0xa08245 12 C3G124-24 1 0xa08245 13 C3K172-24 1 0xa08245 15 C3K122-24 1 0xa08245 17 C3K122-24P 1 0xa08245
This example shows how to display switch type information about SID1:
C3(ro)->show switch switchtype 1 Switch Type 0x56950200 Model Identifier C2G124-24 Switch Description Enterasys Networks, Inc. C2 -­ Model C2G124-24 Management Preference 1 Expected Code Version 0xa08245
Enterasys C3 Configuration Guide 2-7
show switch stack-ports
Supported Cards:
Slot 0 Card Index (CID) 1 Model Identifier C2G124-24
show switch stack-ports
Use this command to display various data flow and error counters on stack ports.
Syntax
show switch stack-ports [unit]
Parameters
unit (Optional) Specifies the switch unit ID, an integer ranging from 1 to 8.
Defaults
None.
Mode
Switch command, read-only.
Usage
If a stacking port has been configured to use a 5 meter stacking cable with the set switch stack­ports length command, 5m will be displayed in the Stacking Port column next to the port
descriptor (Up or Down).
Example
This example shows how to display data and error information on stack ports:
C3(ro)->show switch stack-ports
------------TX-------------- ------------RX-----------
Data Error Data Error Stacking Rate Rate Total Rate Rate Total Switch Port (Mb/s) (Errors/s) Errors (Mb/s) (Errors/s) Errors
------ ---------- ------ ---------- ---------- ------ ---------- --------
1 Up 0 0 0 0 0 0 Down 0 0 0 0 0 0
set switch
Use this command to assign a switch ID, to set a switch’s priority for becoming the management switch if the previous management switch fails, or to change the switch unit ID for a switch in the stack.
Syntax
set switch {unit [priority value | renumber newunit]}
2-8 Configuring Switches in a Stack
Parameters
unit Specifies a unit number for the switch. Value can range from 1 to 8.
priority value Specifies a priority value for the unit. Valid values are 1 to 15 with higher
values assigning higher priority.
renumber newunit Specifies a new number for the unit.
Note: This number must be a previously unassigned unit ID number.
Defaults
None.
Mode
Switch command, read-write.
Examples
This example shows how to assign priority 3 to switch 5:
C3(su)->set switch 5 priority 3
This example shows how to renumber switch 5 to switch 7:
set switch copy-fw
C3(su)->set switch 5 renumber 7
set switch copy-fw
Use this command to replicate the code image file from the management switch to other switch(es) in the stack.
Syntax
set switch copy-fw [destination-system unit]
Parameters
destination-system
unit
Defaults
If destination-system is not specified, the management image file will be replicated to all switches in the stack.
Mode
Switch command, read-write.
(Optional) Specifies the unit number of unit on which to copy the management image file.
Example
This example shows how to replicate the management image file to all switches in the stack:
C3(su)->set switch copy-fw
Are you sure you want to copy firmware? (y/n) y
Code transfer completed successfully.
Enterasys C3 Configuration Guide 2-9
set switch description
set switch description
Use this command to assign a name to a switch in the stack.
Syntax
set switch description unit description
Parameters
unit Specifies a unit number for the switch.
description Specifies a text description for the unit.
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to assign the name “FirstUnit” to switch unit 1 in the stack:
C3(su)->set switch description 1 FirstUnit
set switch movemanagement
Use this command to move management switch functionality from one switch to another.
Syntax
set switch movemanagement fromunit tounit
Parameters
fromunit Specifies the unit number of the current management switch.
tounit Specifies the unit number of the newly-designated management switch.
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to move management functionality from switch 1 to switch 2:
C3(su)->set switch movemenagement 1 2 Moving stack management will unconfigure entire stack including all interfaces. Are you sure you want to move stack management? (y/n) y
2-10 Configuring Switches in a Stack
set switch member
Use this command to add a virtual member to a stack. This allows you to preconfigure a switch before the physical device is actually added to the stack.
Syntax
set switch member unit switch-id
Parameters
unit Specifies a unit number for the switch.
switch-id Specifies a switch ID (SID) for the switch. SIDs can be displayed with the
Defaults
None.
Mode
Switch command, read-write.
set switch member
show switch switchtype command.
Usage
Refer to “Creating a Virtual Switch Configuration” on page 2-3 for more information about how to add a virtual switch to a stack.
Example
This example shows how to specify a switch as unit 1 with a switch ID of 1:
C3(su)->set switch member 1 1
clear switch member
Use this command to remove a member entry from the stack.
Syntax
clear switch member unit
Parameters
unit Specifies the unit number of the switch.
Defaults
None.
Mode
Switch command, read-write.
Enterasys C3 Configuration Guide 2-11
set switch stack-ports length
Example
This example shows how to remove the switch 5 entry from the stack:
C3(su)->clear switch member 5
set switch stack-ports length
Use this command to configure a stacking port to use a 5 meter stacking cable.
Syntax
set switch stack-ports length unit {down | up} {5m | standard}
Parameters
unit Specifies the switch in the stack to be configured. Value can range from
1 to 8.
down | up Specifies which stack port to configure, either the up or down port.
5m | standard Specifies the type of stacking cable to configure the port for, either a 5
meter cable, or a standard length cable. Standard cables include the 0.3 meter, 1 meter, and 2 meter length cables.
Defaults
Stacking ports not configured with this command to use 5 meter cables are assumed to be using one of the standard length cables.
Mode
Switch mode, read-write.
Usage
This command allows you to manually identify stacking ports using a 5 meter stacking cable. Identifying stacking ports that will use a 5 meter cable prevents potential stacking errors and packet loss.
Stacking ports not configured to use a 5 meter cable with this command will be assumed to be using one of the standard cables, which includes the 0.3 meter, 1 meter, and 2 meter length cables. Use the show switch stack-ports length command to display the current cable configuration for switches in the stack.
Example
This example configures the down stacking port on unit 1 and the up stacking port on unit 2 to use a 5 meter stacking cable, and then displays the current configuration.
C3(su)->set switch stack-ports length 1 down 5m C3(su)->set switch stack-ports length 2 up 5m
C3(su)->show switch stack-ports length Stacking Switch Port Length
------ ---------- --------
1 Up standard Down 5m 2 Up 5m
2-12 Configuring Switches in a Stack
Down standard
clear switch stack-ports length
Use this command to clear the stack port lengths to the default of standard for one or all swtiches in the stack.
Syntax
clear switch stack-ports length [unit]
Parameters
unit (Optional) Specifies the switch in the stack to clear stack port lengths.
Defaults
If no switch is specified, all switches in the stack have their stack port lengths cleared to use a standard length cable.
Mode
Switch mode, read-write
clear switch stack-ports length
Example
This example clears the stack port cable length on switch unit 1.
C3(su)->clear switch stack-ports length 1
show switch stack-ports length
Use this command to display the current stack port cable configuration.
Syntax
show switch stack-ports length [unit]
Parameters
unit (Optional) Specifies the switch in the stack to show stack port cable
configurations.
Defaults
If no switch is specified, all switches in the stack are displayed.
Mode
Switch command, read-only.
Example
This example shows the stack port cable length configuration for all switches in the stack.
C3(su)->show switch stack-ports length Stacking Switch Port Length
Enterasys C3 Configuration Guide 2-13
show switch stack-ports length
------ ---------- --------
1 Up standard Down 5m 2 Up 5m Down standard
2-14 Configuring Switches in a Stack
3
Basic Configuration
At startup, the Enterasys C3 switch is configured with many defaults and standard features. This chapter describes how to customize basic system settings to adapt to your work environment.
For information about... Refer to page...
Quick Start Setup Commands 3-1 Setting Basic Switch Properties 3-2 Downloading a Firmware Image 3-27 Reviewing and Selecting a Boot Firmware Image 3-31 Starting and Configuring Telnet 3-32 Managing Switch Configuration and Files 3-34 Clearing and Closing the CLI 3-45 Resetting the Switch 3-46 Using and Configuring WebView 3-50 Gathering Technical Support Information 3-53 Configuring Hostprotect 3-54
Quick Start Setup Commands
The tables in this section provide a quick reference for the CLI commands needed to begin basic C3 switch operation. Table 3 -1 lists tasks and their associated CLI commands required for setting up the switch with the latest firmware. Tab le 3-2 lists optional CLI commands that will help you perform additional basic configuration on the switch. Refer to the pages listed for more information about each command.
Table 3-1 Required CLI Setup Commands
Step Task CLI commands 1 Set a new password. set password [username] 5-9 2 Set the switch IP address. set ip address ip-address [mask
3 Download, activate, and verify new
firmware on the switch using TFTP copy.
Refer to page...
3-4
ip-mask] [gateway ip-gateway] copy tftp://tftp_server_ip_address/
filename system:image set boot system filename 3-31 show version 3-21
3-41
Enterasys C3 Configuration Guide 3-1
Setting Basic Switch Properties
Table 3-2 Optional CLI Setup Commands
Task CLI commands
Save the active configuration. save config 3-37 Enable or disable SSH. set ssh enable | disable 32-89 Enable or disable Telnet. set telnet {enable | disable} [inbound |
Enable or disable HTTP management (WebView).
Enable or disable SNMP port link traps.
Set the per port broadcast limit set port broadcast port-string threshold-value 11-35 Configure a VLAN. set vlan create vlan-id 14-5
Set a Syslog server IP and severity
Configure and enable a RADIUS server.
Refer to page...
3-33
outbound | all] set webview {enable | disable} 3-51
set port trap port-string {enable | disable} 11-24
set port vlan port-string vlan-id modify-egress 14-9 set logging server index ip-addr ip-addr
severity severity state enable set radius server index ip-addr
port [secret-value]{realm { management-access | any | network-access}
set radius enable 32-8
19-4
32-8
Setting Basic Switch Properties
Purpose
To display and set the system IP address and other basic system (switch) properties.
Commands
For information about... Refer to page...
show ip address 3-3 set ip address 3-4 clear ip address 3-5 show ip protocol 3-5 set ip protocol 3-6 show ip route 3-6 show system 3-7 show system hardware 3-8 show system utilization 3-9 set system utilization 3-10 clear system utilization 3-1 1 show system enhancedbuffermode 3-1 1 set system enhancedbuffermode 3-12
3-2 Basic Configuration
show ip address
For information about... Refer to page...
set system temperature 3-12 clear system temperature 3-13 show time 3-14 set time 3-14 show summertime 3-15 set summertime 3-16 set summertime date 3-16 set summertime recurring 3-17 clear summertime 3-18 set prompt 3-18 show banner 3-19 set banner 3-19 clear banner 3-20 show version 3-21 set system name 3-22 set system location 3-22 set system contact 3-23 set width 3-23 set length 3-24 show logout 3-24 set logout 3-25 show console 3-25 set console baud 3-26 set console vt100 3-26
show ip address
Use this command to display the system IP address and subnet mask.
Syntax
show ip address
Parameters
None.
Defaults
None.
Enterasys C3 Configuration Guide 3-3
set ip address
Mode
Switch command, read-only.
Example
This example shows how to display the system IP address and subnet mask:
C3(su)->show ip address Name Address Mask
---------------- ---------------- ----------------
host 10.42.13.20 255.255.0.0
set ip address
Use this command to set the system IP address, subnet mask and default gateway.
Syntax
set ip address ip-address [mask ip-mask] [gateway ip-gateway]
Note: The C3 does not support the ability for a user to configure the host's gateway to be a local routed interface IP. The host's gateway must exist on a different device in the network if one is configured.
Parameters
ip-address Sets the IP address for the system. For Enterasys C3 systems, this is the IP
address of the management switch as described in “About Enterasys C3
Switch Operation in a Stack” on page 2-1.
mask ip-mask (Optional) Sets the system’s subnet mask.
gateway ip-gateway (Optional) Sets the system’s default gateway (next-hop device).
Defaults
If not specified, ip-mask will be set to the natural mask of the ip-address and ip-gateway will be set to the ip-address.
Mode
Switch command, read-write.
Usage
Parameters must be entered in the order shown (host IP, then mask, then gateway) for the command to be accepted.
Example
This example shows how to set the system IP address to 10.1.10.1 with a mask of 255.255.128.0:
C3(su)->set ip address 10.1.10.1 mask 255.255.128.0
3-4 Basic Configuration
clear ip address
Use this command to clear the system IP address.
Syntax
clear ip address
Parameters
None.
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to clear the system IP address:
C3(rw)->clear ip address
clear ip address
show ip protocol
Use this command to display the method used to acquire a network IP address for switch management.
Syntax
show ip protocol
Parameters
None.
Defaults
None.
Mode
Switch command, read-only.
Example
This example shows how to display the method used to acquire a network IP address:
C3(su)->show ip protocol System IP address acquisition method: dhcp
Enterasys C3 Configuration Guide 3-5
set ip protocol
set ip protocol
Use this command to specify the protocol used to acquire a network IP address for switch management.
Syntax
set ip protocol {bootp | dhcp | none}
Parameters
bootp Selects BOOTP as the protocol to use to acquire the system IP address.
dhcp Selects DHCP as the protocol to use to acquire the system IP address.
none No protocol will be used to acquire the system IP address.
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to set the method used to acquire a network IP address to DHCP.
C3(su)->set ip protocol dhcp
show ip route
Use this command to display the IP route table.
Syntax
show ip route
Parameters
None.
Defaults
None.
Mode
Switch command, read only.
Example
This example shows the output of this command.
C3(ro)->show ip route
INET route table Destination Gateway Flags Use If Metric
0.0.0.0/0 61.200.10.1 UG 5112086 host 5
61.200.10.0/24 61.200.10.10 UC 59 host 5
3-6 Basic Configuration
61.200.10.10 61.200.10.10 UH 38 lo0 5
127.0.0.1 127.0.0.1 UH 0 lo0 5
INET6 route table Destination Gateway Flags Use If Metric ::/0 FE80::21F:45FF:FE09:E757%dtl0 UG 339 host 10 ::1 ::1 UH 0 lo0 5 2001:FF:7010:FF::/64 2001:FF:7010:FF::FFFF UmC 0 host 5 2001:FF:7010:FF::FFFF 2001:FF:7010:FF::FFFF UH 0 lo0 5 FE80::21F:45FF:FEB2:B89C%host 2001:FF:7010:FF::FFFF UH 0 lo0 5
show system
Use this command to display system information, including contact information, power and fan tray status and uptime.
Syntax
show system
Parameters
None.
show system
Defaults
None.
Mode
Switch command, read-only.
Example
This example shows how to display system information:
C3(su)->show system System contact: System location: System name:
Switch 1
--------
PS1-Status PS2-Status
---------- ----------
Ok Not Installed and/or Not Operating
Fan1-Status Fan2-Status
----------- -----------
Ok Ok
Temp-Alarm
-----------
off Thermal Threshold: 58% Temp alarm max threshold: 100% Temp alarm trap: disabled Temp alarm syslog: disabled
Uptime d,h:m:s Logout
Enterasys C3 Configuration Guide 3-7
show system hardware
-------------- -------
0,20:36:49 0 min
The following table provides an explanation of the command output.
Table 3-3 show system Output Details
Output What It Displays...
System contact Contact person for the system. Default of a blank string can be changed with the
set system contact command (“set system contact” on page 3-23).
System location Where the system is located. De fault of a blank string can be changed with the
set system location command (“set system location” on page 3-22).
System name Name identifying the system. Default of a blank string can be changed with the
set system name command (“set system name” on page 3-22).
Switch x Indicates the switch position in the stack. When multiple switches are in a stack,
information for each switch is displayed. PS1-Status Operational status for the primary power supply. PS2-Status Operational status for the secondary power supply, if installed. Fanx-Status Operational status of the fan(s). Temp-Alarm Indicates status of temperature alarm — on, off. The status will show NA (not
available) on switches that do not support this functionality. Thermal Threshold Percentage of thermal threshold reached. The status will show NA (not available)
Temp alarm max threshold
Temp alarm trap Indicates whether the sending of temperature alarm traps is enabled or disabled.
Temp alarm syslog Indicates whether temperature alarm syslog messages are enabled or disabled.
Uptime d,h:m:s System uptime. Logout Time an idle console or Telnet CLI session will remain connected before timing
show system hardware
Use this command to display the system’s hardware configuration.
Syntax
show system hardware
on switches that do not support this functionality.
The temperature alarm threshold expressed as a percentage of the maximum
rated. The default value is 100%.
The default is disabled.
The default is disabled.
out. Default of 5 minutes can be changed with the set logout command (“set
logout” on page 3-25).
Parameters
None.
Defaults
None.
3-8 Basic Configuration
Mode
Switch command, read-only.
Example
This example shows how to display the system’s hardware configuration. Please note that the information you see displayed may differ from this example.
C3(su)->show system hardware UNIT 1 HARDWARE INFORMATION
--------------------------­ Model: <platform specific> Serial Number: <switch specific> Vendor ID: 0xbc00 Base MAC Address: 00:11:88:B1:76:C0 Hardware Version: BCM56514 REV 1 FirmWare Version: 06.61.00.0052 Boot Code Version: 01.00.52 CPLD Version: 2.0
show system utilization
Use this command to display detailed information about the processor running on the switch, or the overall memory usage of the Flash and SDRAM storage devices on the unit, or the processes running on the switch. Only the memory usage in the master unit of a stack is shown.
show system utilization
Syntax
show system utilization {cpu | storage | process}
Parameters
cpu Display information about the processor running on the switch.
storage Display information about the overall memory usage on the switch.
process Display information about the processes running on the switch.
Defaults
None.
Mode
Switch command, read-only.
Examples
This example shows how to display the system’s CPU utilization:
C3(ro)->show system utilization cpu
CPU Utilization Threshold Traps enable: Threshold = 80.0%
Total CPU Utilization:
Switch CPU 5 sec 1 min 5 min
----------------------------------------------­1 1 50% 49% 49%
Enterasys C3 Configuration Guide 3-9
set system utilization
This example shows how to display the system’s overall memory usage:
C3(ro)->show system utilization storage Storage Utilization: Type Description Size(Kb) Available (Kb)
--------------------------------------------------------------­RAM RAM device 262144 97173 Flash Images, Config, Other 31095 8094
This example shows how to display information about the processes running on the system. Only partial output is shown.
C3(ro)->show system utilization process Switch:1 CPU:1
TID Name 5Sec 1Min 5Min
---------------------------------------------------------­ c157930 ipMapForwardingTask 3.60% 3.02% 3.48% cc70000 RMONTask 0.00% 0.00% 0.00% ccb0b60 SNMPTask 34.80% 34.06% 31.78% d4847a0 tEmWeb 0.00% 0.03% 0.01% d4ca360 hapiRxTask 3.20% 4.80% 5.00% dec8600 lvl7TaskUtilMonitorTas 0.40% 0.40% 0.40% eb74120 bcmRX 2.00% 2.91% 4.48% eb7fbc8 bcmLINK.0 0.40% 0.22% 0.32% f00c9a0 bcmTX 0.00% 0.33% 0.53% f027648 bcmCNTR.0 0.00% 0.00% 0.03% f034858 bcmL2X.0 0.00% 0.02% 0.04%
set system utilization
Use this command to set the threshold for sending CPU utilization notification messages.
Syntax
set system utilization threshold threshold
Parameters
threshold threshold Specifies a threshold value in 1/10 of a percent. Valid range is 1 to 1000.
Defaults
The default threshold value is 80%.
Mode
Switch command, read-write.
Usage
This command sets the percentage of system CPU utilitization that will cause a trap notification to be sent. After the threshold has been exceeded, additional notifications will be sent once a minute until the utilization has dropped back below the threshold.
A value of 0 disables utilization notification messages.
Example
This example sets the CPU utilization threshold to 75%.
3-10 Basic Configuration
C3(rw)->set system utilization threshold 750
clear system utilization
Use this command to reset the CPU utilization threshold to the default of 80%.
Syntax
clear system utilization
Parameters
None.
Defaults
The default threshold value is 80%.
Mode
Switch command, read-write.
Example
clear system utilization
This example resets the CPU utilization threshold to the default.
C3(rw)->show system utilization cpu
CPU Utilization Threshold Traps enable: Threshold = 75.0%
Total CPU Utilization:
Switch CPU 5 sec 1 min 5 min
------------------------------------------------­1 1 10% 10% 10%
C3(rw)->clear system utilization C3(rw)->show system utilization cpu
CPU Utilization Threshold Traps enable: Threshold = 80.0%
Total CPU Utilization:
Switch CPU 5 sec 1 min 5 min
------------------------------------------------­1 1 14% 11% 10%
show system enhancedbuffermode
Use this command to display the status of enhanced buffer mode, which optimizes buffer distribution into a single CoS queue operation for standalone switches or non-stacked switches.
Syntax
show system enhancedbuffermode
Parameters
None.
Enterasys C3 Configuration Guide 3-11
set system enhancedbuffermode
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to display enhanced buffer mode status:
C3(su)->show system enhancedbuffermode enable Optimized system buffer distribution Disable
set system enhancedbuffermode
Use this command to enable or disable enhanced buffer mode, which optimizes buffer distribution into a single CoS queue operation for standalone switches or non-stacked switches. Executing this command will reset the switch, so the system prompts you to confirm whether you want to proceed.
Syntax
set system enhancedbuffermode {enable | disable}
Parameters
enable | disable Enables or disables enhanced buffer mode.
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to enable enhanced buffer mode:
C3(su)->set system enhancedbuffermode enable
Changes in the enhanced buffer mode will require resetting this unit. Are you sure you want to continue? (y/n)
set system temperature
Use this command to set the system high temperature threshold limit and the high temperature alert parameters, on the platforms that support this feature.
Syntax
set system temperature {[syslog enable | disable] [trap enable | disable] [overtemp-threshold value]}
3-12 Basic Configuration
Parameters
clear system temperature
syslog enable | disable
trap enable | disable Enables or disables sending high temperature alerts by means of SNMP
overtemp-threshold
value
Enables or disables logging high temperature alerts to the system log when the system transitions into an alarm state.
traps when the system transitions into an alarm state.
Sets the thermal threshold as a percentage of the maximum rated for the specific platform. Value can range from 0 to 100%.
Defaults
Syslog alerts are disabled by default.
Trap alerts are disabled by default.
Overtemp threshold is 100% by default.
Mode
Switch command, read-write.
Usage
On the platforms that support this feature, temperature sensors are located in several different locations within the device. Threshold calibrations have been calculated separately for each platform. The thermal overtemp threshold is the high-water mark that, when reached, triggers an alert to warn the system administrator that the device is operating at high temperatures.
When a high temperature alert condition occurs, the CPU LED on the front panel of the switch will flash red. In addition, if enabled, a syslog message will be logged and/or an SNMP trap will be sent.
The values set with this command can be viewed with the show system command.
Note: Refer to the Release Note for your platform to determine if the High-Temperature Alert feature is supported on your platform.
Example
The following example enables sending SNMP traps and sets the overtemp threshold to 60%.
C3(su)->set system temperature trap enable overtemp-threshold 60
clear system temperature
Use this command to reset system high temperature parameters to their default values, on the platforms that support this feature.
Syntax
clear system temperature
Parameters
None.
Enterasys C3 Configuration Guide 3-13
show time
Defaults
Mode
Usage
Example
show time
None.
Switch command, read-write.
This command resets all the high temperature parameters to their default values:
Syslog alerts are disabled by default.
Trap alerts are disabled by default.
Overtemp threshold is 100% by default.
This example resets all high temperature parameters to their defaults.
C3(su)->clear system temperature
Use this command to display the current time of day in the system clock.
Syntax
show time
Parameters
None.
Defaults
None.
Mode
Switch command, read-only.
Example
This example shows how to display the current time. The output shows the day of the week, month, day, and the time of day in hours, minutes, and seconds and the year:
C3(su)->show time THU SEP 05 09:21:57 2002
set time
Use this command to change the time of day on the system clock.
Syntax
set time [mm/dd/yyyy] [hh:mm:ss]
3-14 Basic Configuration
Parameters
show summertime
[mm/dd/yyyy] [hh:mm:ss]
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to set the system clock to 7:50 a.m:
C3(su)->set time 7:50:00
show summertime
Use this command to display daylight savings time settings.
Syntax
show summertime
Sets the time in:
month, day, year and/or
24-hour format
At least one set of time parameters must be entered.
Parameters
None.
Defaults
None.
Mode
Switch command, read-only.
Example
This example shows how to display daylight savings time settings:
C3(su)->show summertime Summertime is Enabled and set to '' Start : SUN MAR 14 02:00:00 End : SUN NOV 7 02:00:00 Offset: 60 minutes (1 hours 0 minutes) Recurring: yes, starting at 2:00 of the second Sunday of March an d ending at 2:00 of the first Sunday of November
Enterasys C3 Configuration Guide 3-15
set summertime
set summertime
Use this command to enable or disable the daylight savings time function.
Syntax
set summertime {enable | disable} [zone]
Parameters
enable | disable Enables or disables the daylight savings time function.
zone (Optional) Applies a name to the daylight savings time settings.
Defaults
If a zone name is not specified, none will be applied.
Mode
Switch command, read-only.
Example
This example shows how to enable daylight savings time function:
C3(su)->set summertime enable
set summertime date
Use this command to configure specific dates to start and stop daylight savings time. These settings will be non-recurring and will have to be reset annually.
Syntax
set summertime date start_month start_date start_year start_hr_min end_month end_date end_year end_hr_min [offset_minutes]
Parameters
start_month Specifies the month of the year to start daylight savings time.
start_date Specifies the day of the month to start daylight savings time.
start_year Specifies the year to start daylight savings time.
start_hr_min Specifies the time of day to start daylight savings time. Format is hh:mm.
end_month Specifies the month of the year to end daylight savings time.
end_date Specifies the day of the month to end daylight savings time.
end_year Specifies the year to end daylight savings time.
end_hr_min Specifies the time of day to end daylight savings time. Format is hh:mm.
offset_minutes (Optional) Specifies the amount of time in minutes to offset daylight
Defaults
If an offset is not specified, none will be applied.
3-16 Basic Configuration
savings time from the non-daylight savings time system setting. Valid values are 1 - 1440.
Mode
Switch command, read-write.
Example
This example shows how to set a daylight savings time start date of April 4, 2004 at 2 a.m. and an ending date of October 31, 2004 at 2 a.m. with an offset time of one hour:
C3(su)->set summertime date April 4 2004 02:00 October 31 2004 02:00 60
set summertime recurring
Use this command to configure recurring daylight savings time settings. These settings will start and stop daylight savings time at the specified day of the month and hour each year and will not have to be reset annually.
Syntax
set summertime recurring start_week start_day start_month start_hr_min end_week end_day end_month end_hr_min [offset_minutes]
Parameters
set summertime recurring
start_week Specifies the week of the month to restart daylight savings time. Valid
values are: first, second, third, fourth, and last.
start_day Specifies the day of the week to restart daylight savings time.
start_hr_min Specifies the time of day to restart daylight savings time. Format is
hh:mm.
end_week Specifies the week of the month to end daylight savings time.
end_day Specifies the day of the week to end daylight savings time.
end_hr_min Specifies the time of day to end daylight savings time. Format is hh:mm.
offset_minutes (Optional) Specifies the amount of time in minutes to offset daylight
savings time from the non-daylight savings time system setting. Valid values are 1 - 1440.
Defaults
If an offset is not specified, none will be applied.
Mode
Switch command, read-write.
Example
This example shows how set daylight savings time to recur starting on the first Sunday of April at 2 a.m. and ending the last Sunday of October at 2 a.m. with an offset time of one hour:
C3(su)->set summertime recurring first Sunday April 02:00 last Sunday October 02:00 60
Enterasys C3 Configuration Guide 3-17
clear summertime
clear summertime
Use this command to clear the daylight savings time configuration.
Syntax
clear summertime
Parameters
None.
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to clear the daylight savings time configuration:
C3(su)->clear summertime
set prompt
Use this command to modify the command prompt.
Syntax
set prompt prompt_string
Parameters
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to set the command prompt to Switch 1:
prompt_string Specifies a text string for the command prompt.
Note: A prompt string containing a space in the text must be enclosed in quotes as shown in the example below.
C3(su)->set prompt “Switch 1” Switch 1(su)->
3-18 Basic Configuration
show banner
Use this command to show the login banner or message of the day banner. The login banner displays before session login, and the message of the day banner displays after session login.
Syntax
show banner {login | motd}
Parameters
login Show the message banner displayed before session login.
motd Show the message of the day banner displayed after session login.
Defaults
None.
Mode
Switch command, read-only.
Usage
show banner
A login banner causes a prompt to display when a user logs in to the system, requiring the user to verify y/n before the login will continue. The acknowledgement is logged in the audit log in association with the user’s login name. For more information, see “set banner” on page 3-19.
A message of the day banner is displayed after a user has logged in.
Example
This example shows how to display the message of the day banner:
C3(rw)->show banner motd This system belongs to XYZ Corporation. Use of this system is strictly limited to authorized personnel.
set banner
Use this command to set a login banner or message of the day banner.
Syntax
set banner {login | motd} message
Parameters
login Specifies that the banner message being configured is a login banner.
motd Specifies that the banner message being configured is a message of the
day banner.
message Specifies a message of the day. This is a text string that needs to be in
double quotes if any spaces are used. Use a \n for a new line and \t for a tab (eight spaces). The message can be up to 2048 characters in length.
Enterasys C3 Configuration Guide 3-19
clear banner
Defaults
None.
Mode
Switch command, read-write
Usage
A login banner is displayed prior to session login. When configured, a login banner will cause a prompt to display which requires the user to verify y/n before the login will continue. These acknowledgements are recoded in the audit log in association with the user’s login name.
For example, if the login banner is configured as "By proceeding with this login you are verifying that you are an Enterasys employee and authorized to use this system.", the following will display prior to entering the login password:
By proceeding with this login you are verifying that you are an Enterasys employee and authorized to use this system.
Proceed to login? (y/n) [n]?
For SSH sessions which do not allow for an acceptance prompt, the following message will be added after the banner display and before the login prompt:
Entering a password constitutes your understanding of, and compliance with,the preceding banner message.
A message of the day banner is displayed after session login.
Banner message text must be enclosed in beginning and ending double quotation marks. The message itself cannot contain any additional double quotation marks. Use the \? Escape sequence when ending a banner with a question mark to avoid the question mark being treated as a help request.
Example
This example shows how to set the message of the day banner to read: “This system belongs to XYZ Corporation. Use of this system is strictly limited to authorized personnel.”
C3(rw)->set banner motd "\tThis system belongs to XYZ Corporation.\nUse of this system is strictly limited to authorized personnel."
clear banner
Use this command to clear the login banner or message of the day banner. to a blank string.
Syntax
clear banner {login | motd}
Parameters
login Specifies that the pre-session login message should be cleared.
motd Specifies that the message of the day banner should be cleared.
Defaults
None.
3-20 Basic Configuration
Mode
Switch command, read-write.
Example
This example shows how to clear the message of the day banner to a blank string:
C3(rw)->clear banner motd
show version
Use this command to display hardware and firmware information. Refer to “Downloading a
Firmware Image” on page 3-27 for instructions on how to download a firmware image.
Syntax
show version
Parameters
None.
Defaults
show version
None.
Mode
Switch command, read-only.
Example
This example shows how to display version information. Please note that you may see different information displayed, depending on the type of hardware.
C3(su)->show version
Model Serial # Versions
-------------- ----------------- ------------------­C3G124-48P 001188021035 Hw:BCM5665 REV 17 Bp:01.00.29 Fw:6.61.xx.xxxx BuFw:03.01.13 PoE:500_3
Tab le 3 -4 provides an explanation of the command output.
Table 3-4 show version Output Details
Output Field What It Displays...
Model Switch’s model number.
Enterasys C3 Configuration Guide 3-21
set system name
Table 3-4 show version Output Details (Continued)
Output Field What It Displays...
Serial # Serial number of the switch. Versions • Hw: Hardware version number.
set system name
Use this command to configure a name for the system.
Syntax
set system name [string]
Parameters
string (Optional) Specifies a text string that identifies the system.
• Bp: BootPROM version.
• Fw: Current firmware version number.
• BuFw: Backup firmware version number.
• PoE: Power over Ethernet driver version. (Displays only for PoE switches.)
Defaults
If string is not specified, the system name will be cleared.
Mode
Switch command, read-write.
Example
This example shows how to set the system name to Information Systems:
C3(su)->set system name “Information Systems”
set system location
Use this command to identify the location of the system.
Syntax
set system location [string]
Parameters
Note: A name string containing a space in the text must be enclosed in quotes as
shown in the example below.
string (Optional) Specifies a text string that indicates where the system is
3-22 Basic Configuration
located.
Note: A location string containing a space in the text must be enclosed in quotes as shown in the example below.
Defaults
If string is not specified, the location name will be cleared.
Mode
Switch command, read-write.
Example
This example shows how to set the system location string:
C3(su)->set system location “Bldg N32-04 Closet 9”
set system contact
Use this command to identify a contact person for the system.
Syntax
set system contact [string]
Parameters
set system contact
Defaults
Mode
Example
set width
Syntax
string (Optional) Specifies a text string that contains the name of the person to
contact for system administration.
Note: A contact string containing a space in the text must be enclosed in quotes as shown in the example below.
If string is not specified, the contact name will be cleared.
Switch command, read-write.
This example shows how to set the system contact string:
C3(su)->set system contact “Joe Smith”
Use this command to set the number of columns for the terminal connected to the switch’s console port.
set width screenwidth [default]
Parameters
screenwidth Sets the number of terminal columns. Valid values are 50 to 150.
default (Optional) Makes this setting persistent for all future sessions (written to
NV-RAM).
Enterasys C3 Configuration Guide 3-23
set length
Defaults
Mode
Usage
Example
set length
None.
Switch command, read-write.
The number of rows of CLI output displayed is set using the set length command as described in “set length” on page 3-24.
This example shows how to set the terminal columns to 50:
C3(su)->set width 50
Use this command to set the number of lines the CLI will display. This command is persistent (written to NV-RAM).
Syntax
set length screenlength
Parameters
screenlength Sets the number of lines in the CLI display. Valid values are 0, which
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to set the terminal length to 50:
C3(su)->set length 50
show logout
disables the scrolling screen feature described in “Displaying Scrolling
Screens” on page 1-9, and from 5 to 512.
Use this command to display the time (in seconds) an idle console, Telnet, or SSH CLI session will remain connected before timing out.
Syntax
show logout
3-24 Basic Configuration
Parameters
None.
Defaults
None.
Mode
Switch command, read-only.
Example
This example shows how to display the CLI logout setting:
C3(su)->show logout Logout currently set to: 10 minutes.
set logout
Use this command to set the time (in minutes) an idle console or Telnet CLI session will remain connected before timing out.
set logout
Syntax
set logout timeout
Parameters
timeout Sets the number of minutes the system will remain idle before timing out.
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to set the system timeout to 10 minutes:
C3(su)->set logout 10
show console
Use this command to display console settings.
Syntax
show console [baud] [bits] [flowcontrol] [parity] [stopbits] [vt100]
Parameters
baud (Optional) Displays the input/output baud rate.
bits (Optional) Displays the number of bits per character.
Enterasys C3 Configuration Guide 3-25
set console baud
Defaults
Mode
Example
flowcontrol (Optional) Displays the type of flow control.
parity (Optional) Displays the type of parity.
stopbits (Optional) Displays the number of stop bits.
vt100 (Optional) Displays the state of VT100 mode.
If no parameters are specified, all settings will be displayed.
Switch command, read-only.
This example shows how to display all console settings:
C3(su)->show console vt100 terminal mode disabled Baud Flow Bits StopBits Parity
------ ------- ---- ---------- -----­9600 Disable 8 1 none
set console baud
Use this command to set the console port baud rate.
Syntax
set console baud rate
Parameters
rate Sets the console baud rate. Valid values are: 1200, 2400, 4800, 9600, 19200, 38400,
Defaults
None.
Mode
Switch command, read-write.
Example
This example shows how to set the console port baud rate to 19200:
C3(su)->set console baud 19200
57600, and 115200.
set console vt100
Use this command to enable or disable VT100 terminal mode.
Syntax
set console vt100 {enable | disable)
3-26 Basic Configuration
Downloading a Firmware Image
Parameters
enable Enables VT100 terminal mode.
disable Disables VT100 terminal mode.
Defaults
VT100 terminal mode is disabled by default.
Mode
Switch mode, read-write, when security profile = normal.
Switch mode, super-user, when security profile = C2.
Usage
VT100 mode is required to support automatic console session termination on removal of the serial connection (vs. timeout). This mode requires that the attached console device be running VT100 terminal emulation.
In VT100 mode, the switch polls for device status (using the appropriate VT100 escape sequence) to detect an attached device, which requires that the attached device be running VT100 terminal emulation. At any time, if the switch fails to get a status reply, an existing console session is terminated.
On receipt of the first polled status response, the login banner is displayed if it is configured.
Example
This example enables VT100 mode.
C3(su)->set console vt100 enable
Downloading a Firmware Image
You can upgrade the operational firmware in the Enterasys C3 switch without physically opening the switch or being in the same location. There are two ways to download firmware to the switch:
Via TFTP or SFTP download. This procedure uses a TFTP or SFTP server connected to the network and downloads the firmware using the TFTP or SFTP protocol. For details on how to perform a TFTP or SFTP download using the copy command, refer to “copy” on page 3-41. For information on setting TFTP timeout and retry parameters, refer to “set tftp timeout” on page 3-43 and “set tftp retry” on page 3-44.
Via the serial (console) port. This procedure is an out-of-band operation that copies the firmware through the serial port to the switch. It should be used in cases when you cannot connect the switch to perform the in-band copy download procedure via TFTP. Serial console download has been successfully tested with the following applications:
HyperTerminal Copyright 1999
Tera Term Pro Version 2.3
Any other terminal applications may work but are not explicitly supported.
The C3 switch allows you to download and store dual images. The backup image can be downloaded and selected as the startup image by using the commands described in this section.
Enterasys C3 Configuration Guide 3-27
Downloading a Firmware Image
Downloading from a TFTP or SFTP Server
To perform a TFTP or SFTP download, proceed as follows:
1. If you have not already done so, set the switch’s IP address using the set ip address command
as detailed in “set ip address” on page 3-4.
2. Download a new image file using the copy command as detailed in “copy” on page 3-41.
Downloading via the Serial Port
To download switch firmware via the serial (console) port, proceed as follows:
1. With the console port connected, power up the switch. A message similar to the following displays.
Within 2 seconds, type 2 to select “Start Boot Menu”. Use “administrator” for the Password.
Version 06.61.xx 05-09-2012
Computing MD5 Checksum of operational code... Select an option. If no selection in 2 seconds then operational code will start.
1 - Start operational code. 2 - Start Boot Menu. Select (1, 2):2
Password: *************
Note: The “Boot Menu” password “administrator” can be changed using boot menu option 11.
Boot Menu Version 06.61.xx 05-09-2012
Options available 1 - Start operational code 2 - Change baud rate 3 - Retrieve event log using XMODEM (64KB). 4 - Load new operational code using XMODEM 5 - Display operational code vital product data 6 - Run Flash Diagnostics 7 - Update Boot Code 8 - Delete operational code 9 - Reset the system 10 - Restore Configuration to factory defaults (delete config files) 11 - Set new Boot Code password [Boot Menu] 2
2. Type 2. The following baud rate selection screen displays:
1 - 1200 2 - 2400 3 - 4800 4 - 9600 5 - 19200 6 - 38400 7 - 57600
3-28 Basic Configuration
Downloading a Firmware Image
8 - 115200 0 - no change
3. Type 8 to set the switch baud rate to 115200. The following message displays:
Setting baud rate to 115200, you must change your terminal baud rate.
4. Set your terminal emulation baud rate to 115200. For example:
HyperTerminal: File > Properties > Configure > Bits per Second > Apply > OK > OK
TeraTerm: Setup > Serial port > Baud rate > OK
5. Press ENTER. The switch will complete the baud rate change, displaying a new boot menu prompt.
6. From the boot menu options screen, type 4 to load new operational code using XMODEM.
7. Set up for XMODEM file transmission. For example:
HyperTerminal: Transfer > Send File > Browse > Open > Protocol Xmodem > Send > bps/
cps
TeraTerm: File > Transfer > XMODEM > Send > Browse > Open
8. Progress messages will indicate the status of the file transfer.
[Boot Menu] 4
Ready to receive the file with XMODEM/CRC....
Ready to RECEIVE File xcode.bin in binary mode Send several Control-X characters to cCKCKCKCKCKCKCK
XMODEM transfer complete, checking CRC....
Verified operational code CRC.
The following Enterasys Header is in the image:
MD5 Checksum....................fe967970996c4c8c43a10cd1cd7be99a
Boot File Identifier............0x0517
Header Version..................0x0100
Image Type......................0x82
Image Offset....................0x004d
Image length....................0x006053b3
Ident Strings Length............0x0028
Ident Strings...................
<platform specific>
Image Version Length............0x7
Image Version Bytes.............0x30 0x2e 0x35 0x2e 0x30 0x2e 0x34 (x.xx.xx)
...
Operational code update completed successfully.
Verifying Operational Code CRC..... CRC is OK.
9. Press ENTER so the switch will complete the file transfer operation, displaying a fresh prompt.
[Boot Menu] 2
10. Type 2 to display the baud rate selection screen again.
11. Type 4 set the switch baud rate to 9600. The following message displays:
Setting baud rate to 9600, you must change your terminal baud rate.
Enterasys C3 Configuration Guide 3-29
Downloading a Firmware Image
12. In your teminal emulation program, set the terminal baud rate to 9600.
HyperTerminal: File > Properties > Configure > Bits per Second > Apply > OK > OK
TeraTerm: Setup > Serial port > Baud rate > OK
13. Press ENTER so the switch will complete the baud rate change and display a fresh prompt.
[Boot Menu] 1
14. Type 1 to start the new operational code. A message similar to the following displays:
Operational Code Date: Tue Jun 29 08:34:05 2012
Uncompressing.....
15. After the switch comes back up, log in and confirm that the new image has been detected and is now running. You can use either the “show boot system” command or the “dir” command.
C5(rw)->show boot system Current system image to boot: c5-series_06.61.xx C5(rw)->
Reverting to a Previous Image
In the event that you need to downgrade to a previous version of code, you can do so by completing the following steps as described in this chapter.
Caution: Before reverting to a previous image, always back up your configuration by saving it to a file (show config outfile on page 3-39). You can then copy the file to a remote location (copy on page 3-41).
Note: You will not be able to peform these steps remotely unless you have remote console support.
1. Save your running configuration with the save config command.
2. Make a copy of the current configuration with the show config outfile configs/filename command. Use the dir command to confirm that the file was created.
3. If desired, copy the file to a remote TFTP server with the copy command:
copy configs/filename tftp://server_ipaddr/filename
4. Load your previous version of code on the device, as described in “Downloading a Firmware
Image” (page 3-27).
5. Set this older version of code to be the boot code with the set boot system command (page 3-
31). When the system asks if you want to reset the device, specify no (n).
6. Reload the saved configuration onto the device with the configure command, described on page 3-40.
7. Reboot the system using the reset command (page 3-47).
Caution: If you do not follow the steps above, you may lose remote connectivity to the switch.
3-30 Basic Configuration
Reviewing and Selecting a Boot Firmware Image
Reviewing and Selecting a Boot Firmware Image
Purpose
To display and set the image file the switch loads at startup. The C3 switch allows you to download and store a backup image, which can be selected as the startup image by using the commands described in this section.
Commands
For information about... Refer to page...
show boot system 3-31 set boot system 3-31
show boot system
Use this command to display the firmware image the switch loads at startup.
Syntax
show boot system
Parameters
None.
Defaults
None.
Mode
Switch command, read-only.
Example
This example shows how to display the switch’s boot firmware image:
C3(su)->show boot system Current system image to boot: bootfile
set boot system
Use this command to set the firmware image the switch loads at startup.
Syntax
set boot system filename
Parameters
filename Specifies the name of the firmware image file.
Enterasys C3 Configuration Guide 3-31
Starting and Configuring Telnet
Defaults
None.
Mode
Switch command, read-write.
Usage
This command allows you to set the firmware image to be loaded at startup. You can choose to reset the system to use the new firmware image immediately, or you can choose to only specify the new image to be loaded the next time the switch is rebooted.
You can use the dir command to display the “Active” image and the “Boot” image, which will be the image loaded at the next system reboot.
Example
This example shows how to set the boot firmware image file to be used at the next reboot of the system, by answering “n” to the prompt. The dir command is then executed to display the Active and Boot images.
Note: If you are changing the firmware image to a version earlier than the current version, refer to Reverting to a Previous Image” on page 3-30 for the correct steps to follow.
C3(su)->set boot system c3_06.61.03.0007 This command can optionally reset the system to boot the new image. Do you want to reset now (y/n) [n]?n
C3(su)->dir Images: ================================================================== Filename: c3-series_06.61.00.0026 (Active) Version: 06.61.00.0026 Size: 9405440 (bytes) Date: Fri Jul 18 12:48:35 2008 CheckSum: f1626ccf10d8f48cd6c3e79ab602342a Compatibility: <platform specific>
Filename: c3-series_06.61.03.0007 (Boot) Version: 06.61.03.0007 Size: 8290304 (bytes) Date: Fri May 9 11:35:27 2008 CheckSum: 9f820d79239f10890442f8ff1f2bc914 Compatibility: <platform specific>
Starting and Configuring Telnet
Purpose
To enable or disable Telnet, and to start a Telnet session to a remote host. The Enterasys C3 switch allows a total of four inbound and / or outbound Telnet session to run simultaneously.
3-32 Basic Configuration
Commands
For information about... Refer to page...
show telnet 3-33 set telnet 3-33 telnet 3-34
show telnet
Use this command to display the status of Telnet on the switch.
Syntax
show telnet
Parameters
None.
Defaults
show telnet
Mode
Example
set telnet
Syntax
Parameters
None.
Switch command, read-only.
This example shows how to display Telnet status:
C3(su)->show telnet Telnet inbound is currently: ENABLED Telnet outbound is currently: ENABLED
Use this command to enable or disable Telnet on the switch.
set telnet {enable | disable} [inbound | outbound | all]
enable | disable Enables or disables Telnet services.
inbound | outbound | all
(Optional) Specifies inbound service (the ability to Telnet to this switch), outbound service (the ability to Telnet to other devices), or all (both inbound and outbound).
Defaults
If not specified, both inbound and outbound Telnet service will be enabled.
Enterasys C3 Configuration Guide 3-33
telnet
telnet
Mode
Switch command, read-write.
Example
This example shows how to disable inbound and outbound Telnet services:
C3(su)->set telnet disable all Disconnect all telnet sessions and disable now (y/n)? [n]: y All telnet sessions have been terminated, telnet is now disabled.
Use this command to start a Telnet connection to a remote host. The Enterasys C3 switch allows a total of four inbound and / or outbound Telnet session to run simultaneously.
Syntax
telnet host [port]
Parameters
host Specifies the name or IP address of the remote host.
port (Optional) Specifies the server port number.
Defaults
If not specified, the default port number 23 will be used.
Mode
Switch command, read-write.
Example
This example shows how to start a Telnet session to a host at 10.21.42.13:
C3(su)->telnet 10.21.42.13
Managing Switch Configuration and Files
Configuration Persistence Mode
The default state of configuration persistence mode is “auto,” which means that when CLI configuration commands are entered, or when a configuration file stored on the switch is executed, the configuration is saved to NVRAM automatically at the following intervals:
On a standalone unit, the configuration is checked every two minutes and saved if there has been a change.
On a stack, the configuration is saved across the stack every 5 minutes if there has been a change.
If you want to save a running configuration to NVRAM more often than the automatic intervals, execute the save config command and wait for the system prompt to return. After the prompt returns, the configuration will be persistent.
3-34 Basic Configuration
Loading...