HP 445942-001 User Manual

HP 10Gb Ethernet BL-c Switch
ISCLI Reference Guide
Part number: 445942-001
Third Edition: June 2007
© 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set
forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Microsoft®, Windows®, and Windows NT® are U.S. registered trademarks of Microsoft Corporation. SunOS™ and Solaris™ are trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Cisco® is a registered trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
2
Contents

Contents

ISCLI reference
Introduction........................................................................................................................................... 9
Additional references ............................................................................................................................. 9
Connecting to the switch......................................................................................................................... 9
Establishing a console connection ..................................................................................................... 10
Setting an IP address ....................................................................................................................... 10
Establishing a Telnet connection........................................................................................................ 11
Establishing an SSH connection ........................................................................................................ 11
Accessing the switch............................................................................................................................. 12
Idle timeout ......................................................................................................................................... 13
Typographical conventions.................................................................................................................... 14
ISCLI basics
Introduction......................................................................................................................................... 15
Accessing the ISCLI .............................................................................................................................. 15
ISCLI Command Modes ........................................................................................................................ 15
Global commands................................................................................................................................ 17
Command line interface shortcuts........................................................................................................... 18
Command abbreviation ................................................................................................................... 18
Tab completion............................................................................................................................... 18
Information Commands
Introduction......................................................................................................................................... 19
System Information commands............................................................................................................... 20
SNMPv3 Information commands ....................................................................................................... 21
SNMPv3 USM User Table information .......................................................................................... 22
SNMPv3 View Table information ................................................................................................. 22
SNMPv3 Access Table information............................................................................................... 23
SNMPv3 Group Table information ............................................................................................... 24
SNMPv3 Community Table information......................................................................................... 24
SNMPv3 Target Address Table information ................................................................................... 25
SNMPv3 Target Parameters Table information ............................................................................... 25
SNMPv3 Notify Table information................................................................................................ 26
SNMPv3 dump ............................................................................................................................... 27
System information............................................................................................................................... 28
Show recent syslog messages ................................................................................................................ 29
System user information ........................................................................................................................ 30
Layer 2 information .............................................................................................................................. 31
FDB information commands .............................................................................................................. 32
Show all FDB information............................................................................................................ 33
Clearing entries from the forwarding database .............................................................................. 33
Link Aggregation Control Protocol information .................................................................................... 33
LACP dump .................................................................................................................................... 34
802.1x information ......................................................................................................................... 35
Spanning Tree information ............................................................................................................... 37
Rapid Spanning Tree and Multiple Spanning Tree information .............................................................. 39
3
Contents
Common Internal Spanning Tree information ...................................................................................... 41
Trunk group information................................................................................................................... 43
VLAN information ........................................................................................................................... 44
Layer 3 information .............................................................................................................................. 45
Route information............................................................................................................................ 46
Show all IP Route information ........................................................................................................... 46
ARP information.............................................................................................................................. 48
Show all ARP entry information.................................................................................................... 48
ARP address list information ........................................................................................................ 49
OSPF information............................................................................................................................ 49
OSPF general information ........................................................................................................... 50
OSPF interface information.......................................................................................................... 50
OSPF Database information ........................................................................................................ 51
OSPF route codes information ..................................................................................................... 52
Routing Information Protocol ............................................................................................................. 53
RIP Routes information ................................................................................................................ 53
RIP user configuration ................................................................................................................. 53
IP information ................................................................................................................................. 54
IGMP multicast group information ..................................................................................................... 55
IGMP group information ............................................................................................................. 55
IGMP multicast router information ................................................................................................ 56
VRRP information ............................................................................................................................ 57
802.1p information.............................................................................................................................. 58
ACL information................................................................................................................................... 59
RMON Information .............................................................................................................................. 60
RMON history information ............................................................................................................... 60
RMON alarm information ................................................................................................................ 61
RMON event information ................................................................................................................. 62
Link status information........................................................................................................................... 63
Port information ................................................................................................................................... 64
Logical Port to GEA Port mapping .......................................................................................................... 65
Fiber Port SFP status ............................................................................................................................. 65
Uplink Failure Detection information ....................................................................................................... 66
Information dump................................................................................................................................. 66
Statistics Commands
Introduction......................................................................................................................................... 67
Port Statistics ....................................................................................................................................... 68
802.1x statistics.............................................................................................................................. 69
Bridging statistics ............................................................................................................................ 71
Ethernet statistics ............................................................................................................................. 72
Interface statistics ............................................................................................................................ 74
Internet Protocol (IP) statistics ............................................................................................................ 76
Link statistics................................................................................................................................... 76
Layer 2 statistics................................................................................................................................... 77
FDB statistics................................................................................................................................... 77
LACP statistics................................................................................................................................. 78
Layer 3 statistics................................................................................................................................... 79
IP statistics...................................................................................................................................... 80
Route statistics ................................................................................................................................ 81
ARP statistics .................................................................................................................................. 82
DNS statistics ................................................................................................................................. 82
4
Contents
ICMP statistics ................................................................................................................................ 83
TCP statistics................................................................................................................................... 84
UDP statistics .................................................................................................................................. 86
IGMP Multicast Group statistics......................................................................................................... 86
OSPF statistics ..................................................................................................................................... 87
OSPF global statistics ...................................................................................................................... 88
VRRP statistics...................................................................................................................................... 91
RIP statistics .................................................................................................................................... 92
GEA Layer 3 statistics ...................................................................................................................... 92
GEA Layer 3 statistics ...................................................................................................................... 92
Management Processor statistics ............................................................................................................ 93
Packet statistics ............................................................................................................................... 93
TCP statistics................................................................................................................................... 94
UDP statistics .................................................................................................................................. 95
CPU statistics .................................................................................................................................. 95
ACL statistics .................................................................................................................................. 95
SNMP statistics ............................................................................................................................... 96
NTP statistics .................................................................................................................................. 98
Uplink Failure Detection statistics....................................................................................................... 99
Statistics dump.............................................................................................................................. 100
Configuration Commands
Introduction....................................................................................................................................... 101
Viewing and saving changes............................................................................................................... 101
Saving the configuration ..................................................................................................................... 101
System configuration .......................................................................................................................... 102
System host log configuration ......................................................................................................... 103
Secure Shell Server configuration .................................................................................................... 105
RADIUS server configuration........................................................................................................... 106
TACACS+ server configuration ....................................................................................................... 107
NTP server configuration................................................................................................................ 109
System SNMP configuration ........................................................................................................... 110
SNMPv3 configuration .................................................................................................................. 111
User Security Model configuration................................................................................................... 113
SNMPv3 View configuration .......................................................................................................... 114
View-based Access Control Model configuration............................................................................... 114
SNMPv3 Group configuration ........................................................................................................ 115
SNMPv3 Community Table configuration ......................................................................................... 116
SNMPv3 Target Address Table configuration.................................................................................... 116
SNMPv3 Target Parameters Table configuration................................................................................ 117
SNMPv3 Notify Table configuration ................................................................................................ 118
System Access configuration........................................................................................................... 119
Management Networks configuration .............................................................................................. 119
User Access Control configuration................................................................................................... 120
User ID configuration..................................................................................................................... 120
HTTPS Access configuration............................................................................................................ 122
Port configuration............................................................................................................................... 123
Temporarily disabling a port........................................................................................................... 124
Port link configuration.................................................................................................................... 124
ACL Port configuration................................................................................................................... 125
Layer 2 configuration ......................................................................................................................... 126
802.1x configuration .................................................................................................................... 126
802.1x Global configuration.....................................................................................................127
5
Contents
802.1x Port configuration ......................................................................................................... 128
Rapid Spanning Tree Protocol / Multiple Spanning Tree Protocol configuration.................................... 129
Common Internal Spanning Tree configuration.................................................................................. 131
CIST bridge configuration ......................................................................................................... 131
CIST port configuration............................................................................................................. 132
Spanning Tree configuration........................................................................................................... 134
Bridge Spanning Tree configuration ........................................................................................... 135
Spanning Tree port configuration ............................................................................................... 136
Forwarding Database configuration ................................................................................................ 137
Static FDB configuration............................................................................................................ 137
Trunk configuration........................................................................................................................ 138
Layer 2 IP Trunk Hash configuration................................................................................................. 139
Link Aggregation Control Protocol configuration................................................................................ 140
LACP Port configuration ............................................................................................................ 140
VLAN configuration....................................................................................................................... 141
Layer 3 configuration ......................................................................................................................... 142
IP interface configuration................................................................................................................ 142
Default Gateway configuration ....................................................................................................... 143
IP Static Route configuration ........................................................................................................... 144
Address Resolution Protocol configuration ........................................................................................ 144
Static ARP configuration............................................................................................................ 145
IP Forwarding configuration ........................................................................................................... 146
Network Filter configuration ........................................................................................................... 146
Route Map configuration................................................................................................................ 147
IP Access List configuration............................................................................................................. 148
Routing Information Protocol configuration........................................................................................ 148
RIP Interface configuration......................................................................................................... 149
RIP Route Redistribution configuration ......................................................................................... 150
Open Shortest Path First configuration.............................................................................................. 151
OSFP Area Index configuration.................................................................................................. 152
OSPF Summary Range configuration .......................................................................................... 153
OSPF Interface configuration ..................................................................................................... 154
OSPF Virtual Link configuration.................................................................................................. 155
OSPF Host Entry configuration ...................................................................................................156
OSPF Route Redistribution configuration...................................................................................... 156
OSPF MD5 Key configuration.................................................................................................... 157
IGMP configuration ....................................................................................................................... 157
IGMP Snooping configuration ................................................................................................... 157
IGMPv3 Snooping configuration ................................................................................................ 158
IGMP static multicast router configuration.................................................................................... 160
IGMP filtering configuration ...................................................................................................... 160
IGMP filter definition ................................................................................................................ 161
IGMP filtering port configuration ................................................................................................ 161
Domain Name System configuration................................................................................................162
Bootstrap Protocol Relay configuration ............................................................................................. 162
Virtual Router Redundancy Protocol configuration.............................................................................. 163
VRRP Virtual Router configuration ...............................................................................................164
VRRP Virtual Router Priority Tracking configuration ....................................................................... 165
VRRP Virtual Router Group configuration..................................................................................... 166
VRRP Virtual Router Group Priority Tracking configuration ............................................................. 167
VRRP Interface configuration...................................................................................................... 168
VRRP Tracking configuration...................................................................................................... 168
Quality of Service configuration........................................................................................................... 170
QoS 802.1p configuration............................................................................................................. 170
6
Contents
Access Control configuration ............................................................................................................... 171
Access Control List configuration ..................................................................................................... 171
ACL Ethernet Filter configuration ..................................................................................................... 171
ACL IP Version 4 Filter configuration................................................................................................ 172
ACL TCP/UDP Filter configuration ................................................................................................... 173
ACL Packet Format configuration..................................................................................................... 174
ACL Metering configuration............................................................................................................ 174
ACL Re-mark configuration ............................................................................................................. 175
ACL Re-mark In-Profile configuration ................................................................................................ 175
Re-Mark Update User Priority configuration ......................................................................................176
ACL Re-mark Out-of-Profile configuration .......................................................................................... 176
ACL Group configuration ............................................................................................................... 177
Remote Monitoring configuration ......................................................................................................... 178
RMON history configuration........................................................................................................... 178
RMON event configuration............................................................................................................. 179
RMON alarm configuration............................................................................................................ 180
Port mirroring .................................................................................................................................... 181
Port-based port mirroring................................................................................................................ 182
Uplink Failure Detection configuration................................................................................................... 182
Failure Detection Pair configuration ................................................................................................. 183
Link to Monitor configuration .......................................................................................................... 183
Link to Disable configuration........................................................................................................... 184
Configuration Dump........................................................................................................................... 184
Saving the active switch configuration .................................................................................................. 185
Restoring the active switch configuration ............................................................................................... 185
Operations Commands
Introduction....................................................................................................................................... 186
Operations-level port options ............................................................................................................... 186
Operations-level port 802.1x options .............................................................................................. 187
Operations-level VRRP options ............................................................................................................. 187
Boot Options
Introduction....................................................................................................................................... 188
Updating the switch software image..................................................................................................... 188
Downloading new software to the switch ......................................................................................... 188
Selecting a software image to run ........................................................................................................ 190
Uploading a software image from the switch ......................................................................................... 190
Selecting a configuration block ............................................................................................................ 191
Resetting the switch ............................................................................................................................ 191
Accessing the AOS CLI .................................................................................................................. 191
Maintenance Commands
Introduction....................................................................................................................................... 192
System maintenance...................................................................................................................... 192
Forwarding Database maintenance .................................................................................................193
Debugging options........................................................................................................................ 193
ARP cache maintenance................................................................................................................. 194
IGMP Snooping maintenance ......................................................................................................... 194
IGMP Mrouter maintenance............................................................................................................ 195
Uuencode flash dump.................................................................................................................... 195
FTP/TFTP system dump put ............................................................................................................. 196
Clearing dump information............................................................................................................. 196
7
Contents
Panic command ............................................................................................................................ 197
Unscheduled system dumps ................................................................................................................. 197
Index
8
ISCLI reference

ISCLI reference

Introduction
The HP 10Gb Ethernet BL-c Switch is ready to perform basic switching functions right out of the box. Some of the more advanced features, however, require some administrative configuration before they can be used effectively. This guide provides a command reference for the HP 10GbE switch.
The extensive switching software included in the switch provides a variety of options for accessing and configuring the switch:
Text-based command line interfaces (AOS CLI and ISCLI) for access via a local terminal or remote
Telnet/Secure Shell (SSH) session
Simple Network Management Protocol (SNMP) support for access through network management
software such as HP Systems Insight Manager
A browser-based management interface for interactive network access through a Web browser
The ISCLI provides a direct method for collecting switch information and performing switch configuration. Use a basic terminal to view information and statistics about the switch, and to perform any necessary configuration.
This chapter explains how to access the ISCLI to the switch.
Additional references
Additional information about installing and configuring the switch is available in the following guides, which are available at http://www.hp.com/go/bladesystem/documentation
HP 10Gb Ethernet BL-c Switch User Guide
HP 10Gb Ethernet BL-c Switch Command Reference
HP 10Gb Ethernet BL-c Switch Application Guide
HP 10Gb Ethernet BL-c Switch Browser-based Interface Reference
HP 10Gb Ethernet BL-c Switch Quick Setup Instructions
Connecting to the switch
You can access the command line interface in one of the following ways:
Using a console connection via the console port
Using a Telnet connection over the network
Using a Secure Shell (SSH) connection to securely log in over a network
.
9
ISCLI reference

Establishing a console connection

To establish a console connection with the switch, you need:
A null modem cable with a female DB-9 connector (See the HP 10Gb Ethernet BL-c Switch User
Guide for more information.)
An ASCII terminal or a computer running terminal emulation software set to the parameters shown in
the table below.
Table 1 Console configuration parameters
Parameter Value
Baud Rate 9600
Data Bits 8
Parity None
Stop Bits 1
Flow Control None
To establish a console connection with the switch:
1. Connect the terminal to the console port using the null modem cable.
2. Power on the terminal.
3. Press the Enter key a few times on the terminal to establish the connection.
4. You will be required to enter a password for access to the switch.

Setting an IP address

To access the switch via a Telnet or an SSH connection, you need to have an Internet Protocol (IP) address set for the switch. The switch can get its IP address in one of the following ways:
Management port access:
Using a Dynamic Host Control Protocol (DHCP) server—When the /cfg/sys/dhcp command
is enabled, the management interface (interface 250) requests its IP address from a DHCP server. The default value for the /cfg/sys/dhcp command is enabled.
Configuring manually—If the network does not support DHCP, you must configure the
management interface (interface 250) with an IP address. If you want to access the switch from a remote network, you also must configure the management gateway (gateway 254).
Uplink port access:
Using a Bootstrap Protocol (BOOTP) server—By default, the management interface is set up to
request its IP address from a BOOTP server. If you have a BOOTP server on the network, add the Media Access Control (MAC) address of the switch to the BOOTP configuration file located on the BOOTP server. The MAC address can be found in the System Information (See the “System information” section in the “Information Commands” chapter.) If you are using a DHCP server that also does BOOTP, you do not have to configure the MAC address.
Configuring manually—If the network does not support BOOTP, you must configure the
management port with an IP address.
10
ISCLI reference

Establishing a Telnet connection

A Telnet connection offers the convenience of accessing the HP 10GbE switch from any workstation connected to the network. Telnet provides the same options for user, operator, and administrator access as those available through the console port. By default, Telnet is enabled on the switch. The switch supports four concurrent Telnet connections.
Once the IP parameters are configured, you can access the ISCLI using a Telnet connection. To establish a Telnet connection with the switch, run the Telnet program on the workstation and enter the telnet command, followed by the switch IP address:
telnet <10GbE switch IP address>
You will then be prompted to enter a password. The password determines the access level: administrator, operator, or user. See the “Accessing the switch” section later in this chapter for description of default passwords.

Establishing an SSH connection

Although a remote network administrator can manage the configuration of a switch via Telnet, this method does not provide a secure connection. The Secure Shell (SSH) protocol enables you to securely log into the switch over the network.
As a secure alternative to using Telnet to manage switch configuration, SSH ensures that all data sent over the network is encrypted and secure. In order to use SSH, you must first configure it on the switch. See the “Secure Shell Server configuration” section in the “Configuration Commands” chapter for information on how to configure SSH.
The switch can perform only one session of key/cipher generation at a time. Therefore, an SSH/Secure Copy (SCP) client will not be able to log in if the switch is performing key generation at that time or if another client has just logged in before this client. Similarly, the system will fail to perform the key generation if an SSH/SCP client is logging in at that time.
The supported SSH encryption and authentication methods are listed below.
Server Host Authentication—Client RSA authenticates the switch in the beginning of every connection
Key Exchange—RSA
Encryption:
AES256-CBC AES192-CBC AES128-CBC 3DES-CBC 3DES ARCFOUR
User Authentication—Local password authentication; Remote Authentication Dial-in User Service
(RADIUS)
11
ISCLI reference
The following SSH clients are supported:
SSH 3.0.1 for Linux (freeware)
SecureCRT® 4.1.8 (VanDyke Technologies, Inc.)
OpenSSH_3.9 for Linux (FC 3)
FedoraCore 3 for SCP commands
PuTTY Release 0.58 (Simon Tatham) for Windows
NOTE: The HP 10GbE switch implementation of SSH is based on versions 1.5 and 2.0, and
supports SSH clients from version 1.0 through version 2.0. SSH clients of other versions are not supported. You may configure the client software to use protocol SSH version 1 or version 2.
By default, SSH service is not enabled on the switch. Once the IP parameters are configured, you can access the ISCLI to enable SSH.
To establish an SSH connection with the switch, run the SSH program on the workstation by issuing the
ssh command, followed by the user account name and the switch IP address:
>> # ssh <user>@<10GbE switch IP address>
You will then be prompted to enter your password.
NOTE: The first time you run SSH from the workstation, a warning message might appear. At the
prompt, enter yes to continue.
Accessing the switch
To enable better switch management and user accountability, the HP 10GbE switch provides different levels or classes of user access. Levels of access to the CLI and Web management functions and screens increase as needed to perform various switch management tasks. The three levels of access are:
User—Interaction with the switch is completely passive—nothing can be changed on the switch.
Users may display information that has no security or privacy implications, such as switch statistics and current operational state information.
Operator—Interaction with the switch is completely passive—nothing can be changed on the switch.
Users may display information that has no security or privacy implications, such as switch statistics and current operational state information.
Administrator—Administrators are the only ones that may make permanent changes to the switch
configuration—changes that are persistent across a reload/reset of the switch. Administrators can access switch functions to configure and troubleshoot problems on the switch. Because administrators can also make temporary (operator-level) changes as well, they must be aware of the interactions between temporary and permanent changes.
Access to switch functions is controlled through the use of unique usernames and passwords. Once you are connected to the switch via the local console, Telnet, or SSH, you are prompted to enter a password. The password entered determines the access level. The default user names/password for each access level is listed in the following table.
NOTE: It is recommended that you change default switch passwords after initial configuration and
as regularly as required under your network security policies. For more information, see the “Setting passwords” section in the “First-time configuration” chapter.
12
ISCLI reference
Table 2 User access levels
User account Description and tasks performed
User The User has no direct responsibility for switch management. He or she can view all switch
status information and statistics, but cannot make any configuration changes to the switch. The user account is enabled by default, and the default password is user.
Oper The Operator has no direct responsibility for switch management. He or she can view all switch
status information and statistics, but cannot make any configuration changes to the switch. By default, the operator account is disabled and has no password.
Admin The super user administrator has complete access to all command modes on the switch,
including the ability to change both the user and administrator passwords. The admin account is enabled by default, and the default password is admin.
NOTE: With the exception of the admin user, access to each user level can be disabled by setting
the password to an empty value.
Once you enter the administrator password and it is verified, you are given complete access to the HP 10GbE switch.
Idle timeout
By default, the HP 10GbE switch disconnects the console, Telnet, or SSH session after five minutes of inactivity. This function is controlled by the idle timeout parameter, which can be set from 1 to 60 minutes. To change this parameter, see the “System configuration” section in the “Configuration Commands” chapter.
13
ISCLI reference
Typographical conventions
The following table describes the typographic styles used in this guide:
Table 3 Typographical conventions
Typeface or symbol Meaning
angle brackets < >
bold body text Indicates user-interface objects, such as buttons and tabs.
plain Courier text Indicates command syntax and system output (for example: prompts and system
braces { }
Indicate a variable to enter based on the description inside the brackets. Do not type the brackets as you enter the command.
Example: If the command syntax is
ping <IP address>
Enter: ping 192.32.10.12
messages). Example:
configure terminal
Indicate required elements in syntax descriptions where there is more than one option. You must choose only one of the options. Do not type the braces when entering the command.
Example: If the command syntax is:
show portchannel {<1-12>|hash|information}
Enter one of the following:
show portchannel <1-12>
show portchannel hash
show portchannel information
brackets [ ]
Indicate optional elements in syntax descriptions. Do not type the brackets when entering the command.
Example: If the command syntax is:
show ip interface [<1-250>]
Enter one of the following:
show ip interface
show ip interface 1
italic text Indicates variables in command syntax descriptions. Also indicates new terms and
book titles. Example: If the command syntax is:
show spanning-tree stp <1-128>
Then, <1-128> represents a number between 1 and 128.
vertical line |
Separates choices for command keywords and arguments. Enter only one of the choices. Do not type the vertical line when entering the command.
Example: If the command syntax is:
show portchannel {<1-12>|hash|information}
Enter one of the following:
show portchannel <1-12>
show portchannel hash
show portchannel information
14
ISCLI basics

ISCLI basics

Introduction
The ISCLI is used for viewing switch information and statistics. In addition, the administrator can use the CLI for performing all levels of switch configuration.
This chapter describes the ISCLI Command Modes, and provides a list of commands and shortcuts that typically are from all the command modes within the ISCLI.
Accessing the ISCLI
The first time you start the HP 10GbE switch, it boots into the AOS CLI. To access the ISCLI, enter the following command and reset the switch:
Main# boot/mode iscli
To access the AOS CLI, enter the following command from the ISCLI and reload the switch:
Switch(config)# boot cli-mode aos
The switch retains your CLI selection, even when you reset the configuration to factory defaults. The CLI boot mode is not part of the configuration settings.
ISCLI Command Modes
The ISCLI has three major command modes, listed in order of increasing privileges, as follows:
User EXEC mode: This is the initial mode of access. By default, password checking is disabled for this mode.
Privileged EXEC mode: The mode is accessed from User EXEC mode. If the Privileged EXEC password is enabled, you must enter a password to access Privileged EXEC mode.
Global Configuration mode: This mode allows you to make changes to the running configuration of the switch. If you save the configuration, the settings survive a reload of the HP 10GbE switch. Several submodes are available within the Global Configuration mode (the following table for more information.
Each command mode provides a specific set of commands. The command set of each higher-privilege mode is a superset of the lower-privilege mode(s). All commands available in lower-lower-privilege modes are available in the higher-privilege modes.
15
ISCLI basics
The following table describes the ISCLI command modes.
Table 4 ISCLI Command Modes
Command Mode/Prompt Command used to enter or exit.
User EXEC
Switch>
Privileged EXEC
Switch#
Global configuration
Switch(config)#
Interface port
Switch(config-if)#
VLAN configuration
Switch(config-vlan)#
Interface IP configuration
Switch(config-ip-if)#
Default mode, entered automatically
exit—Exit
logout—Exit
enable—Enter Privileged EXEC mode, from User EXEC mode
disable—Exit to User EXEC mode
exit or logout—Quit ISCLI
configure terminal—Enter Global Configuration mode, from
Privileged EXEC mode
end or exit—Exit to Privileged EXEC mode
interface port <port number>—Enter Interface port mode, from
Global Configuration mode
exit—Exit to Global Configuration mode
end—Exit to Privileged EXEC mode
vlan <1-4095>—Enter VLAN Configuration mode, from Global
Configuration mode
exit—Exit to Global Configuration mode
end—Exit to Privileged EXEC mode
interface ip <1-250>—Enter Interface IP Configuration mode, from
Global Configuration mode
exit—Exit to Global Configuration mode
end—Exit to Privileged EXEC mode
16
ISCLI basics
Global commands
Some basic commands are recognized throughout the ISCLI hierarchy. These commands are useful for obtaining online Help, navigating through the interface, and saving configuration changes. To get help about a specific command, type the command, followed by help.
The following table describes the global commands.
Table 5 Global commands
Command Action
?
exit
copy running-config startup-config
exit or quit
ping
traceroute
Provides more information about a specific command or lists commands available at the current level.
Go up one level in the command-mode structure.
Write configuration changes to non-volatile flash memory.
Exit from the command line interface and log out.
Verifies station-to-station connectivity across the network. The format is:
ping <host name>|<IP address> [attempts (1-32)> [msec delay]] [-m|-mgt|-d|-data]
IP address is the hostname or IP address of the device.
number of tries (optional) is the number of attempts (1-32).
msec delay (optional) is the number of milliseconds between attempts.
By default, the -m or -mgt option for the management port is used. To use data
ports, specify the -d or –data option.
Identifies the route used for station-to-station connectivity across the network. The format is:
traceroute <host name>|<IP address> [<max-hops> [ msec delay ]]
IP address is the hostname or IP address of the target station.
max-hops (optional) is the maximum distance to trace (1-32 devices).
msec delay (optional) is the number of milliseconds to wait for the response.
telnet
show history
console-log
who
Allows you to Telnet out of the switch. The format is as follows:
telnet <host name> | <IP address> [<port number>]
Displays the 10 most recent commands.
Enables or disables console logs for the current session.
Displays a list of users who are currently logged in.
17
ISCLI basics
Command line interface shortcuts
The following shortcuts allow you to enter commands quickly and easily.

Command abbreviation

Most commands can be abbreviated by entering the first characters that distinguish the command from the others in the same mode. For example, consider the following full command:
Switch(config)# spanning-tree stp 1 bridge hello 2
The command shown above could also be entered as:
Switch(config)# sp stp 1 br h 2

Tab completion

Enter the first letter of a command at any prompt and press the Tab key to display all available commands or options that begin with that letter. Enter additional letters to further refine the list of commands or options displayed.
If only one command fits the input text when you press the Tab key, that command is supplied on the command line, waiting to be entered.
18
Information Commands

Information Commands

Introduction
You can view configuration information for the switch in the ISCLI. This chapter discusses how to use the ISCLI to display switch information.
The following table describes general information commands.
Table 6 Information commands
Command Usage
show sys-info
show layer2 information
show layer3 information
show rmon
show interface link
show interface information
Displays system information. Command mode: All
Displays Layer 2 information. Command mode: All
Displays Layer 3 information. Command mode: All
Displays Remote Monitoring Information. Command mode: All
Displays configuration information about each port, including:
Port number
Port speed (10 Mb/s, 100 Mb/s, 1000 Mb/s, or any)
Duplex mode (half, full, or any)
Flow control for transmit and receive (no, yes, or any)
Link status (up or down)
Command mode: All except User EXEC
Displays port status information, including:
Port number
Whether the port uses VLAN tagging or not
Port VLAN ID (PVID)
Port name
VLAN membership
Command mode: All except User EXEC
show geaport
show sfp
show ufd
Displays GEA port mapping information, used by service personnel. Command mode: All
Displays the status of the Small Form Pluggable (SFP) module on each Fiber External Port.
Command mode: All
Displays Uplink Failure Detection information. Command mode: All
19
Information Commands
Table 6 Information commands
Command Usage
show information-dump
Dumps all switch information available (10K or more, depending on your configuration).
If you want to capture dump data to a file, set your communication software on your workstation to capture session data prior to issuing the dump commands.
Command mode: All
System Information commands
The following table describes the System Information commands.
Table 7 System Information commands
Command Usage
show snmp-server v3
show sys-info
Displays SNMP v3 information. Command mode: All
Displays system information, including: System date and time Switch model name and number Switch name and location Time of last boot MAC address of the switch management processor IP address of IP interface #1 Hardware version and part number Software image file and version number Configuration name Log-in banner, if one is configured Command mode: All
show logging messages
show access user
Displays most recent syslog messages. Command mode: All
Displays User Access information. Command mode: All except User EXEC
20
Information Commands

SNMPv3 Information commands

SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework by supporting the following:
a new SNMP message format
security for messages
access control
remote configuration of SNMP parameters
For more details on the SNMPv3 architecture, see RFC2271 to RFC2276.
The following table describes the SNMPv3 Information commands.
Table 8 SNMPv3 Information commands
Command Usage
show snmp-server v3 user
show snmp-server v3 view
show snmp-server v3 access
show snmp-server v3 group
show snmp-server v3 community
show snmp-server v3 target-address
show snmp-server v3 target-parameters
show snmp-server v3 notify
Displays User Security Model (USM) table information. Command mode: All
Displays information about view name, subtrees, mask and type of view.
Command mode: All
Displays View-based Access Control information. Command mode: All
Displays information about the group that includes the security model, user name, and group name.
Command mode: All
Displays information about the community table. Command mode: All
Displays the Target Address table. Command mode: All
Displays the Target parameters table. Command mode: All
Displays the Notify table. Command mode: All
show snmp-server v3
Displays all the SNMPv3 information. Command mode: All
21
Information Commands

SNMPv3 USM User Table information

The following command displays SNMPv3 user information:
show snmp-server v3 user
Command mode: All
The User-based Security Model (USM) in SNMPv3 provides security services such as authentication and privacy of messages. This security model makes use of a defined set of user identities displayed in the USM user table. The USM user table contains information like:
the user name
a security name in the form of a string whose format is independent of the Security Model
an authentication protocol, which is an indication that the messages sent on behalf of the user can
be authenticated
the privacy protocol.
The following table describes the SNMPv3 User Table information.
Table 9 User Table parameters
Field Description
User Name
Protocol
This is a string that represents the name of the user that you can use to access the switch.
This indicates whether messages sent on behalf of this user are protected from disclosure using a privacy protocol. Switch software supports DES algorithm for privacy. The software also supports two authentication algorithms: MD5 and HMAC-SHA.
SNMPv3 View Table information
The following command displays the SNMPv3 View Table:
show snmp-server v3 view
Command mode: All
View Name Subtree Mask Type
------------------ ---------------------------- ------------- --------
iso 1 included
v1v2only 1 included
v1v2only 1.3.6.1.6.3.15 excluded
v1v2only 1.3.6.1.6.3.16 excluded
v1v2only 1.3.6.1.6.3.18 excluded
The user can control and restrict the access allowed to a group to only a subset of the management information in the management domain that the group can access within each context by specifying the group’s rights in terms of a particular MIB view for security reasons.
22
Information Commands
The following table describes the SNMPv3 View Table information.
Table 10 View Table parameters
Field Description
View Name
Subtree
Mask
Type
Displays the name of the view.
Displays the MIB subtree as an OID string. A view subtree is the set of all MIB object instances which have a common Object Identifier prefix to their names.
Displays the bit mask.
Displays whether a family of view subtrees is included or excluded from the MIB view.
SNMPv3 Access Table information
The following command displays SNMPv3 access information:
show snmp-server v3 access
Command mode: All
Group Name Model Level ReadV WriteV NotifyV
---------- ------- ------------ --------- -------- ------­v1v2grp snmpv1 noAuthNoPriv iso iso v1v2only admingrp usm authPriv iso iso iso
The access control sub system provides authorization services.
The vacmAccessTable maps a group name, security information, a context, and a message type, which could be the read or write type of operation or notification into a MIB view.
The View-based Access Control Model defines a set of services that an application can use for checking access rights of a group. This group’s access rights are determined by a read-view, a write-view, and a notify-view. The read-view represents the set of object instances authorized for the group while reading the objects. The write-view represents the set of object instances authorized for the group when writing objects. The notify-view represents the set of object instances authorized for the group when sending a notification.
The following table describes the SNMPv3 Access Table information.
Table 11 Access Table parameters
Field Description
Group Name
Prefix
Model
Level
ReadV
WriteV
NotifyV
Displays the name of group.
Displays the prefix that is configured to match the values.
Displays the security model used, for example, SNMPv1, or SNMPv2 or USM.
Displays the minimum level of security required to gain rights of access. For example, noAuthNoPriv, authNoPriv, or auth-Priv.
Displays the MIB view to which this entry authorizes the read access.
Displays the MIB view to which this entry authorizes the write access.
Displays the Notify view to which this entry authorizes the notify access.
23
Information Commands
SNMPv3 Group Table information
The following command displays SNMPv3 group information:
show snmp-server v3 group
Command mode: All
Sec Model User Name Group Name
---------- ----------------------------- ------------------------------­snmpv1 v1v2only v1v2grp usm adminmd5 admingrp usm adminsha admingrp
A group is a combination of security model and security name that defines the access rights assigned to all the security names belonging to that group. The group is identified by a group name.
The following table describes the SNMPv3 Group Table information.
Table 12 Group Table parameters
Field Description
Sec Model
User Name
Group Name
Displays the security model used, which is any one of: USM, SNMPv1, SNMPv2, and SNMPv3.
Displays the name for the group.
Displays the access name of the group.
SNMPv3 Community Table information
The following command displays SNMPv3 community information:
show snmp-server v3 community
Command mode: All
Index Name User Name Tag
---------- ---------- -------------------- ---------­trap1 public v1v2only v1v2trap
This command displays the community table information stored in the SNMP engine.
The following table describes the SNMPv3 Community Table information.
Table 13 Community Table information
Field Description
Index
Displays the unique index value of a row in this table.
Name
User Name
Tag
Displays the community string, which represents the configuration.
Displays the User Security Model (USM) user name.
Displays the community tag. This tag specifies a set of transport endpoints from which a command responder application accepts management requests and to which a command responder application sends an SNMP trap.
24
Information Commands
SNMPv3 Target Address Table information
The following command displays SNMPv3 target address information:
show snmp-server v3 target-address
Command mode: All
Name Transport Addr Port Taglist Params
---------- --------------- ---- ---------- --------------­trap1 47.81.25.66 162 v1v2trap v1v2param
This command displays the SNMPv3 target address table information, which is stored in the SNMP engine.
The following table describes the SNMPv3 Target Address Table information.
Table 14 Target Address Table information
Field Description
Name
Transport Addr
Port
Taglist
Params
Displays the locally arbitrary, but unique identifier associated with this snmpTargetAddrEntry.
Displays the transport addresses.
Displays the SNMP UDP port number.
This column contains a list of tag values which are used to select target addresses for a particular SNMP message.
The value of this object identifies an entry in the snmpTargetParamsTable. The identified entry contains SNMP parameters to be used when generating messages to be sent to this transport address.
SNMPv3 Target Parameters Table information
The following command displays SNMPv3 target parameters information:
show snmp-server v3 target-parameters
Command mode: All
Name MP Model User Name Sec Model Sec Level
------------------- -------- -------------------- --------- ----------­v1v2param snmpv2c v1v2only snmpv1 noAuthNoPriv
The following table describes the SNMPv3 Target Parameters Table information.
Table 15 Target Parameters Table information
Field Description
Name
MP Model
User Name
Displays the locally arbitrary, but unique identifier associated with this snmpTargeParamsEntry.
Displays the Message Processing Model used when generating SNMP messages using this entry.
Displays the securityName, which identifies the entry on whose behalf SNMP messages will be generated using this entry.
25
Information Commands
Table 15 Target Parameters Table information
Field Description
Sec Model
Sec Level
Displays the security model used when generating SNMP messages using this entry. The system may choose to return an inconsistentValue error if an attempt is made to set this variable to a value for a security model which the system does not support.
Displays the level of security used when generating SNMP messages using this entry.
SNMPv3 Notify Table information
The following command displays the SNMPv3 Notify Table:
show snmp-server v3 notify
Command mode: All
Name Tag
-------------------- -------------------­v1v2trap v1v2trap
The following table describes the SNMPv3 Notify Table information.
Table 16 SNMPv3 Notify Table information
Field Description
Name
Tag
The locally arbitrary, but unique identifier associated with this snmpNotifyEntry.
This represents a single tag value which is used to select entries in the snmpTargetAddrTable. Any entry in the snmpTargetAddrTable that contains a tag value equal to the value of this entry is selected. If this entry contains a value of zero length, no entries are selected.
26
Information Commands

SNMPv3 dump

The following command displays SNMPv3 information:
show snmp-server v3
Command mode: All
Engine ID = 80:00:07:50:03:00:0F:6A:F8:EF:00 usmUser Table: User Name Protocol
-------------------------------- -------------------------------­admin NO AUTH, NO PRIVACY adminmd5 HMAC_MD5, DES PRIVACY adminsha HMAC_SHA, DES PRIVACY v1v2only NO AUTH, NO PRIVACY
vacmAccess Table: Group Name Prefix Model Level Match ReadV WriteV NotifyV
---------- ------ ------- ------------ ------ ------- -------- -----­admin usm noAuthNoPriv exact org org org v1v2grp snmpv1 noAuthNoPriv exact org org v1v2only admingrp usm authPriv exact org org org
vacmViewTreeFamily Table: View Name Subtree Mask Type
-------------------- --------------- ------------ -------------­org 1.3 included v1v2only 1.3 included v1v2only 1.3.6.1.6.3.15 excluded v1v2only 1.3.6.1.6.3.16 excluded v1v2only 1.3.6.1.6.3.18 excluded
vacmSecurityToGroup Table: Sec Model User Name Group Name
---------- ------------------------------- ----------------------­snmpv1 v1v2only v1v2grp usm admin admin usm adminsha admingrp
snmpCommunity Table: Index Name User Name Tag
---------- ---------- -------------------- ----------
snmpNotify Table: Name Tag
-------------------- --------------------
snmpTargetAddr Table: Name Transport Addr Port Taglist Params
---------- --------------- ---- ---------- ---------------
snmpTargetParams Table: Name MP Model User Name Sec Model Sec Level
-------------------- -------- ------------------ --------- -------
27
Information Commands
System information
The following command displays system information:
show sys-info
Command mode: All
System Information at 6:56:22 Thu Jan 11, 2007 Time zone: America/US/Pacific
HP 10 Gb Ethernet Blade Switch sysName: sysLocation: RackId: Default RUID RackName: Default Rack Name EnclosureSerialNumber: -none­EnclosureName: Default Chassis Name BayNumber: 1
Switch has been up for 3 days, 14 hours, 56 minutes and 22 seconds. Last boot: 17:25:38 Mon Jan 8, 2007 (software reset)
MAC address: 00:10:00:01:00:01 IP (If 1) address: 10.14.4.16 Revision: Switch Serial No: Hardware Part No: Spare Part No: Software Version 1.0.0 (FLASH image2), active configuration.
System information includes:
System date and time
Switch model name and number
HP c-Class Rack name and location
Time of last boot
MAC address of the switch management processor
IP address of the switch
Software image file and version number
Current configuration block (active, backup, or factory default)
Login banner, if one is configured
28
Information Commands
Show recent syslog messages
The following command displays system log messages:
show logging messages
Command mode: All
Date Time Severity level Message
---- ---- ----------------- ------­Jul 8 17:25:41 NOTICE system: link up on port 1 Jul 8 17:25:41 NOTICE system: link up on port 8 Jul 8 17:25:41 NOTICE system: link up on port 7 Jul 8 17:25:41 NOTICE system: link up on port 12 Jul 8 17:25:41 NOTICE system: link up on port 11 Jul 8 17:25:41 NOTICE system: link up on port 14 Jul 8 17:25:41 NOTICE system: link up on port 13 Jul 8 17:25:41 NOTICE system: link up on port 16 Jul 8 17:25:41 NOTICE system: link up on port 15 Jul 8 17:25:41 NOTICE system: link up on port 17 Jul 8 17:25:41 NOTICE system: link up on port 20 Jul 8 17:25:41 NOTICE system: link up on port 18 Jul 8 17:25:41 NOTICE system: link up on port 19 Jul 8 17:25:41 NOTICE system: link up on port 21 Jul 8 17:25:42 NOTICE system: link up on port 4 Jul 8 17:25:42 NOTICE system: link up on port 3 Jul 8 17:25:42 NOTICE system: link up on port 6 Jul 8 17:25:42 NOTICE system: link up on port 5 Jul 8 17:25:42 NOTICE system: link up on port 10 Jul 8 17:25:42 NOTICE system: link up on port 9
Each message contains a date and time field and has a severity level associated with it. One of eight different prefixes is used to indicate the condition:
EMERG—indicates the system is unusable
ALERT—indicates action should be taken immediately
CRIT—indicates critical conditions
ERR—indicates error conditions or eroded operations
WARNING—indicates warning conditions
NOTICE—indicates a normal but significant condition
INFO—indicates an information message
DEBUG—indicates a debug-level message
29
Information Commands
System user information
The following command displays user status information:
show access user
Command mode: All except User EXEC
Usernames: user - enabled oper - disabled admin - Always Enabled
Current User ID table: 1: name tech1 , ena, cos user , password valid, online 2: name tech2 , ena, cos user , password valid, offline
The following table describes the User Name information.
Table 17 User Name Information
Field Usage
user
oper
admin
Current User ID Table
Displays the status of the user access level.
Displays the status of the oper (operator) access level.
Displays the status of the admin (administrator) access level.
Displays the status of configured user IDs. To configure new user IDs, use the following command: access user x
30
Information Commands
Layer 2 information
The following table describes the Layer 2 Information commands. The following sections provide more detailed information and commands.
Table 18 Layer 2 information commands
Command Usage
show mac-address-table
show lacp information
show qos transmit-queue information
show dot1x information
show spanning-tree stp <1-128> information
Displays Forwarding Database Information. Command mode: All
Displays a summary of LACP information. Command mode: All
Displays 802.1p Information. Command mode: All
Displays 802.1x Information. Command mode: All
In addition to seeing if STP is enabled or disabled, you can view the following STP bridge information:
Priority
Hello interval
Maximum age value
Forwarding delay
Aging time
You can also refer to the following port-specific STP
information:
Port number and priority
Cost
State
Command mode: All
show spanning-tree mstp cist information
Displays Common internal Spanning Tree (CIST) bridge information, including the following:
Priority
Hello interval
Maximum age value
Forwarding delay
You can also view port-specific CIST information, including
the following:
Port number and priority
Cost
State
Command mode: All
show portchannel information
When trunk groups are configured, you can view the state of each port in the various trunk groups.
Command mode: All
31
Information Commands
Table 18 Layer 2 information commands
Command Usage
show vlan information
show layer2

FDB information commands

The forwarding database (FDB) contains information that maps the media access control (MAC) address of each known device to the switch port where the device address was learned. The FDB also shows which other ports have seen frames destined for a particular MAC address.
NOTE: The master forwarding database supports up to 8K MAC address entries on the
management processor (MP) per switch.
Displays VLAN configuration information, including:
VLAN Number
VLAN Name
Status
Port membership of the VLAN
Command mode: All
Dumps all switch information available from Layer 2 memory (10K or more, depending on your configuration).
If you want to capture dump data to a file, set your communication software on your workstation to capture session data prior to issuing the dump commands.
Command mode: All
Table 19 FDB information commands
Command Usage
show mac-address-table address <mac-address>
show mac-address-table port <port number>
show mac-address-table vlan <1-4095>
show mac-address-table state {flood|forward|ifmac|ignore|trunk| unknown}
show mac-address-table
Displays a single database entry by its MAC address. You are prompted to enter the MAC address of the device.
Enter the MAC address using the format:
xx:xx:xx:xx:xx:xx. (For example: 08:00:20:12:34:56)
You can also enter the MAC address using the format: xxxxxxxxxxxx. (For example: 080020123456)
Command mode: All
Displays all FDB entries for a particular port. Command mode: All
Displays all FDB entries on a single VLAN. The range is 1-4095.
Command mode: All
Displays all FDB entries that match a particular state. Command mode: All
Displays all entries in the Forwarding Database. Command mode: All
32
Information Commands
Show all FDB information
The following command displays Forwarding Database information:
show mac-address-table
Command mode: All
MAC address VLAN Port Trnk State
----------------- ---- ---- ---- ----- 00:02:01:00:00:00 300 1 TRK 00:02:01:00:00:01 300 20 FWD 00:02:01:00:00:02 300 20 FWD 00:02:01:00:00:03 300 20 FWD 00:02:01:00:00:04 300 20 FWD 00:02:01:00:00:05 300 20 FWD 00:02:01:00:00:06 300 20 FWD 00:02:01:00:00:07 300 20 FWD 00:02:01:00:00:08 300 20 FWD 00:02:01:00:00:09 300 20 FWD 00:02:01:00:00:0a 300 20 FWD 00:02:01:00:00:0b 300 20 FWD 00:02:01:00:00:0c 300 20 FWD
An address that is in the forwarding (FWD) state indicates that the switch has learned it. When in the trunking (TRK) state, the Trnk field displays the trunk group number. If the state for the port is listed as unknown (UNK), the MAC address has not yet been learned by the switch, but has only been seen as a destination address. When an address is in the unknown state, no outbound port is indicated.
Clearing entries from the forwarding database
To delete a static MAC address from the forwarding database (FDB), see the “Static FDB configuration” section in the “Configuration Commands” chapter.

Link Aggregation Control Protocol information

The following table describes the Link Aggregation Control Protocol information commands.
Table 20 LACP information commands
Command Usage
show interface port <port number> lacp aggregator
show lacp
show lacp information
Displays LACP aggregator information for the port. Command mode: All
Displays LACP information for the port. Command mode: All
Displays all LACP information parameters. Command mode: All
33
Information Commands

LACP dump

The following command displays LACP information:
show lacp information
Command mode: All
>> LACP# dump port lacp adminkey operkey selected prio attached trunk aggr
---------------------------------------------------------------------­ 1 off 1 1 n 32768 -- -­ 2 off 2 2 n 32768 -- -­ 3 off 3 3 n 32768 -- -­ 4 off 4 4 n 32768 -- -­ 5 off 5 5 n 32768 -- -­ 6 off 6 6 n 32768 -- -­ 7 off 7 7 n 32768 -- -­ 8 off 8 8 n 32768 -- -­…
LACP dump includes the following information for each port in the HP 10GbE switch:
lacp—Displays the port’s LACP mode (active, passive, or off)
adminkey—Displays the value of the port’s adminkey.
operkey—Shows the value of the port’s operational key.
selected—Indicates whether the port has been selected to be part of a Link Aggregation Group.
prio—Shows the value of the port priority.
attached aggr—Displays the aggregator associated with each port.
trunk—This value represents the LACP trunk group number.
34
Information Commands

802.1x information

The following command displays 802.1x information:
show dot1x information
Command mode: All
System capability : Authenticator System status : disabled Protocol version : 1 Authenticator Backend Port Auth Mode Auth Status PAE State Auth State
---- ------------ ------------ -------------- ---------­ 1 force-auth unauthorized initialize initialize 2 force-auth unauthorized initialize initialize 3 force-auth unauthorized initialize initialize 4 force-auth unauthorized initialize initialize 5 force-auth unauthorized initialize initialize 6 force-auth unauthorized initialize initialize 7 force-auth unauthorized initialize initialize 8 force-auth unauthorized initialize initialize 9 force-auth unauthorized initialize initialize 10 force-auth unauthorized initialize initialize 11 force-auth unauthorized initialize initialize 12 force-auth unauthorized initialize initialize 13 force-auth unauthorized initialize initialize 14 force-auth unauthorized initialize initialize 15 force-auth unauthorized initialize initialize 16 force-auth unauthorized initialize initialize *17 force-auth unauthorized initialize initialize *19 force-auth unauthorized initialize initialize *20 force-auth unauthorized initialize initialize *21 force-auth unauthorized initialize initialize
-----------------------------------------------------------------­* - Port down or disabled
The following table describes the IEEE 802.1x parameters.
Table 21 802.1x information
Field Description
Port
Auth Mode
Displays each port’s name.
Displays the Access Control authorization mode for the port. The Authorization mode can be one of the following:
force-unauth
auto
force-auth
Auth Status
Displays the current authorization status of the port, either authorized or unauthorized.
35
Information Commands
Table 21 802.1x information
Field Description
Authenticator PAE State
Backend Auth State
Displays the Authenticator Port Access Entity State. The PAE state can be one of the following:
initialize
disconnected
connecting
authenticating
authenticated
aborting
held
forceAuth
Displays the Backend Authorization State. The Backend Authorization state can be one of the following:
request
response
success
fail
timeout
idle
36
Information Commands

Spanning Tree information

The following table describes the Spanning Tree Protocol (STP) information commands.
Table 22 STP information commands
Command Usage
show spanning-tree stp <1-128>
show spanning-tree stp <1-128> bridge
show spanning-tree [<1-128>] information
Displays information about the spanning tree group. Command mode: All
Displays STP bridge information. Command mode: All
Displays STP information. Command mode: All
The following command displays Spanning Tree information:
show spanning-tree stp <1-128> information
Command mode: All
-----------------------------------------------------------------­upfast disabled, update 40
------------------------------------------------------------------
Spanning Tree Group 1: On (STP/PVST+) VLANs: 1
Current Root: Path-Cost Port Hello MaxAge FwdDel 8000 00:02:a5:d1:0f:ed 8 20 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging 32768 2 20 15 180
Port Priority Cost FastFwd State Designated Bridge Des Port
---- -------- ---- -------- ---------- ------------------- ------­ 1 0 0 n FORWARDING * 2 0 0 n FORWARDING * 3 0 0 n FORWARDING *
The switch software uses the IEEE 802.1d Spanning Tree Protocol (STP). If RSTP/MSTP is turned on, see the “Rapid Spanning Tree information” section for Spanning Tree Group information. In addition to seeing if STP is enabled or disabled, you can view the following STP bridge information:
Status of Uplink Fast (upfast)
Current root MAC address
Path cost
Port
Hello interval
Maximum age value
Forwarding delay
Aging time
37
Information Commands
You can also refer to the following port-specific STP information:
Port number and priority
Cost
State
Port Fast Forwarding state
Designated bridge
Designated port
The following table describes the STP parameters.
Table 23 STP parameters
Parameter Description
Current Root
Path-Cost
Port
Priority (bridge)
Hello
MaxAge
FwdDel
Aging
Shows information about the root bridge for the Spanning Tree. Information includes the priority (hex) and MAC address of the root.
Path-cost is the total path cost to the root bridge. It is the summation of the path cost between bridges (up to the root bridge).
The current root port refers to the port on the switch that receives data from the current root. Zero (0) indicates the root bridge of the STP.
The bridge priority parameter controls which bridge on the network will become the STP root bridge.
The hello time parameter specifies, in seconds, how often the root bridge transmits a configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge uses the root bridge hello value.
The maximum age parameter specifies, in seconds, the maximum time the bridge waits without receiving a configuration bridge protocol data unit before it reconfigures the STP network. If the bridge is not the root bridge, it uses the MaxAge value of the root bridge.
The forward delay parameter specifies, in seconds, the amount of time that a bridge port has to wait before it changes from learning state to forwarding state. If the bridge is not the root bridge, it uses the FwdDel value of the root bridge.
The aging time parameter specifies, in seconds, the amount of time the bridge waits without receiving a packet from a station before removing the station from the Forwarding Database.
Priority (port)
Cost
State
Designated bridge
Designated port
The port priority parameter helps determine which bridge port becomes the designated port. In a network topology that has multiple bridge ports connected to a single segment, the port with the lowest port priority becomes the designated port for the segment.
The port path cost parameter is used to help determine the designated port for a segment. Generally speaking, the faster the port, the lower the path cost.
The State field shows the current state of the port. The State field can be one of the following: BLOCKING, LISTENING, LEARNING, FORWARDING, or DISABLED.
Shows information about the bridge connected to each port, if applicable. Information includes the priority (hex) and MAC address of the Designated Bridge.
The port ID of the port on the Designated Bridge to which this port is connected. This information includes the port priority (hex) and the port number (hex).
38
Information Commands

Rapid Spanning Tree and Multiple Spanning Tree information

The following command displays RSTP/MSTP information:
show spanning-tree stp <1-128> information
Command mode: All
-----------------------------------------------------------------­upfast disabled, update 40
-----------------------------------------------------------------­Spanning Tree Group 1: On (RSTP) VLANs: 1-3
Current Root: Path-Cost Port Hello MaxAge FwdDel 8000 00:00:01:00:19:00 0 0 9 20 15
Parameters: Priority Hello MaxAge FwdDel Aging 32768 9 20 15 300
Port Prio Cost State Role Designated Bridge Des Port Type
---- ---- ---- ------ ---- --------------------- -------- ---­ 1 0 0 DSB 2 0 0 DSB 3 0 0 DSB 4 0 0 DSB 5 0 0 DSB 6 0 0 DSB 7 0 0 DSB 8 0 0 DSB 9 0 0 DSB 10 0 0 DISC 11 0 0 FWD DESG 8000-00:00:01:00:19:00 8017 P2P2,Edge 12 0 0 FWD DESG 8000-00:00:01:00:19:00 8018 P2P
The switch software can be set to use the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) or the IEEE
802.1s Multiple Spanning Tree Protocol (MSTP). If RSTP/MSTP is turned on, you can view the following RSTP bridge information for the Spanning Tree Group:
Status of Uplink Fast (upfast)
Current root MAC address
Path-Cost
Port
Hello interval
Maximum age value
Forwarding delay
Aging time
39
Information Commands
You can also refer to the following port-specific RSTP information:
Port number and priority
Cost
State
Role
Designated bridge and port
Link type
The following table describes the STP parameters in RSTP or MSTP mode.
Table 24 Rapid Spanning Tree parameter descriptions
Parameter Description
Current Root
Path-Cost
Port
Priority (bridge)
Hello
MaxAge
FwdDel
Aging
Shows information about the root bridge for the Spanning Tree. Information includes the priority (hex) and MAC address of the root.
Path-cost is the total path cost to the root bridge. It is the summation of the path cost between bridges (up to the root bridge).
The current root port refers to the port on the switch that receives data from the current root. Zero (0) indicates the root bridge of the STP.
The bridge priority parameter controls which bridge on the network will become the STP root bridge.
The hello time parameter specifies, in seconds, how often the root bridge transmits a configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge uses the root bridge hello value.
The maximum age parameter specifies, in seconds, the maximum time the bridge waits without receiving a configuration bridge protocol data unit before it reconfigures the STP network. If the bridge is not the root bridge, it uses the MaxAge value of the root bridge.
The forward delay parameter specifies, in seconds, the amount of time that a bridge port has to wait before it changes from learning state to forwarding state. If the bridge is not the root bridge, it uses the FwdDel value of the root bridge.
The aging time parameter specifies, in seconds, the amount of time the bridge waits without receiving a packet from a station before removing the station from the Forwarding Database.
Priority (port)
Cost
State
The port priority parameter helps determine which bridge port becomes the designated port. In a network topology that has multiple bridge ports connected to a single segment, the port with the lowest port priority becomes the designated port for the segment.
The port path cost parameter is used to help determine the designated port for a segment. Generally speaking, the faster the port, the lower the path cost. A setting of zero (0) indicates that the cost will be set to the appropriate default after the link speed has been auto-negotiated.
Shows the current state of the port. The State field in RSTP/MSTP mode can be one of the following: Discarding (DISC), Learning (LRN), Forwarding (FWD), or Disabled (DSB).
40
Information Commands
Table 24 Rapid Spanning Tree parameter descriptions
Parameter Description
Role
Designated bridge
Designated port
Type
Shows the current role of this port in the Spanning Tree. The port role can be one of the following: Designated (DESG), Root (ROOT), Alternate (ALTN), Backup (BKUP), Master (MAST), or Unknown (UNK).
Shows information about the bridge connected to each port, if applicable. Information includes the priority (hex) and MAC address of the Designated Bridge.
The port ID of the port on the Designated Bridge to which this port is connected.
Type of link connected to the port, and whether the port is an edge port. Link type values are AUTO, P2P, or SHARED.

Common Internal Spanning Tree information

The following command displays Common Internal Spanning Tree (CIST) information:
show spanning-tree mstp cist information
Command mode: All
Mstp Digest: 0xac36177f50283cd4b83821d8ab26de62 Common Internal Spanning Tree: VLANs MAPPED: 1-16 18-31 33-4094 VLANs: 1 25 26 4095
Current Root: Path-Cost Port MaxAge FwdDel 8000 00:03:42:fa:3b:80 0 1 20 15
CIST Regional Root: Path-Cost 8000 00:03:42:fa:3b:81 11
Parameters: Priority MaxAge FwdDel Hops 32768 20 15 20
Port Prio Cost State Role Designated Bridge Des Port Hello Type
---- ---- ---- ------ ---- --------------------- -------- ----- ---­ 1 128 2000 FWD DESG 8000-00:03:42:fa:3b:80 8001 4 P2P, Edge 2 128 2000 FWD DESG 8000-00:03:42:fa:3b:80 8002 3 128 2000 DSB 4 128 2000 DSB 5 128 2000 DSB 6 128 2000 DSB 7 128 2000 DSB 8 128 2000 DSB 9 128 2000 DSB 10 128 0 DSB 11 128 2000 FWD DESG 8000-00:03:42:fa:3b:80 12 128 2000 DSB ...
41
Information Commands
In addition to seeing if Common Internal Spanning Tree (CIST) is enabled or disabled, you can view the following CIST bridge information:
Status of Uplink Fast (upfast)
CIST root
CIST regional root
Priority
Maximum age value
Forwarding delay
Hops
You can also refer to the following port-specific CIST information:
Port number and priority
Cost
State
Role
Designated bridge and port
Hello interval
Link type and port type
The following table describes the CIST parameters.
Table 25 Common Internal Spanning Tree parameter descriptions
Parameter Description
CIST Root
CIST Regional Root
Priority (bridge)
MaxAge
FwdDel
Hops
Priority (port)
Shows information about the root bridge for the Common Internal Spanning Tree (CIST). Values on this row of information refer to the CIST root.
Shows information about the root bridge for this MSTP region. Values on this row of information refer to the regional root.
The bridge priority parameter controls which bridge on the network will become the STP root bridge.
The maximum age parameter specifies, in seconds, the maximum time the bridge waits without receiving a configuration bridge protocol data unit before it reconfigures the STP network.
The forward delay parameter specifies, in seconds, the amount of time that a bridge port has to wait before it changes from learning state to forwarding state.
Shows the maximum number of bridge hops allowed before a packet is dropped.
The port priority parameter helps determine which bridge port becomes the designated port. In a network topology that has multiple bridge ports connected to a single segment, the port with the lowest port priority becomes the designated port for the segment.
Cost
State
The port path cost parameter is used to help determine the designated port for a segment. Generally speaking, the faster the port, the lower the path cost. A setting of zero (0) indicates that the cost will be set to the appropriate default after the link speed has been auto-negotiated.
Shows the current state of the port. The state field can be one of the following: Discarding (DISC), Forwarding (FWD), or Disabled (DSB).
42
Information Commands
Table 25 Common Internal Spanning Tree parameter descriptions
Parameter Description
Role
Designated Bridge
Designated Port
Hello
Type
Shows the current role of this port in the Spanning Tree. The port role can be one of the following: Designated (DESG), Root (ROOT), Alternate (ALTN), Backup (BKUP), Master (MAST).
Shows information about the bridge connected to each port, if applicable. Information includes the priority (hex) and MAC address of the Designated Bridge.
The port ID of the port on the Designated Bridge to which this port is connected. Information includes the port priority (hex) and the port number (hex).
The hello time parameter specifies, in seconds, how often the root bridge transmits a configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge uses the root bridge hello value.
Type of link connected to the port, and whether the port is an edge port. Link type values are AUTO, P2P, or SHARED.

Trunk group information

The following command displays Trunk Group information:
show portchannel information
Command mode: All
Trunk group 1, Enabled port state: 20: STG 1 forwarding 21: STG 1 forwarding
When trunk groups are configured, you can view the state of each port in the various trunk groups.
NOTE: If Spanning Tree Protocol on any port in the trunk group is set to forwarding, the remaining
ports in the trunk group are set to forwarding.
43
Information Commands

VLAN information

The following table describes the VLAN information commands.
Table 26 VLAN information commands
Command Usage
show vlan
show vlan information
Displays VLAN information Command mode: All
Displays VLAN information, including spanning tree assignment. Command mode: All
The following command displays VLAN information:
show vlan
Command mode: All
VLAN Name Status Ports
---- -------------------------------- ------ ---------------­1 Default VLAN ena 4 5 2 pc03p ena 2 7 pc07f ena 7 11 pc04u ena 11 14 8600-14 ena 14 15 8600-15 ena 15 16 8600-16 ena 16 17 8600-17 ena 6 18 35k-1 ena 18 19 35k-2 ena 19 20 35k-3 ena 20 21 35k-4 ena 21 22 pc07z ena 21 24 redlan ena 21 300 ixiaTraffic ena 1 12 13 21 4000 bpsports ena 3-6 8-10 4095 Mgmt VLAN ena 17
This information display includes all configured VLANs and all member ports that have an active link state.
VLAN information includes:
VLAN Number
VLAN Name
Status
Port membership of the VLAN
44
Information Commands
Layer 3 information
The following table describes basic Layer 3 Information commands. The following sections provide more detailed information and commands.
Table 27 Layer 3 information commands
Command Usage
show ip route
show ip information
show ip arp
show ip ospf information
show interface ip rip
show layer3 information
show ip igmp
Displays all routes configured in the switch. Command mode: All except User EXEC
Displays general IP information. Command mode: All except User EXEC
Displays Address Resolution Protocol (ARP) Information. Command mode: All except User EXEC
Displays the OSPF information. Command mode: All except User EXEC
Displays RIP user’s configuration. Command mode: All
Displays IP Information. IP information, includes:
IP interface information: Interface number, IP address, subnet mask, VLAN
number, and operational status.
Default gateway information: Metric for selecting which configured
gateway to use, gateway number, IP address, and health status
IP forwarding information: Enable status, lnet and lmask
Port status
Command mode: All except User EXEC
Displays IGMP Information. Command mode: All except User EXEC
show ip vrrp information
show layer3
Displays the VRRP Information. Command mode: All except User EXEC
Dumps all switch information available from Layer 3 memory (10K or more, depending on your configuration).
If you want to capture dump data to a file, set your communication software on your workstation to capture session data prior to issuing the dump commands.
Command mode: All except User EXEC
45
Information Commands

Route information

Using the commands listed below, you can display all or a portion of the IP routes currently held in the switch.
Table 28 Route Information commands
Command Usage
show ip route address <IP address>
show ip route gateway <IP address>
show ip route type {indirect|direct|local|broadcast|martian| multicast}
show ip route tag {fixed|static|addr|rip|ospf|broadcast| multicast|martian}
show ip route interface <1-250>
show ip route

Show all IP Route information

The following command displays IP route information:
show ip route
Displays a single route by destination IP address. Command mode: All except User EXEC
Displays routes to a single gateway. Command mode: All except User EXEC
Displays routes of a single type. Command mode: All except User EXEC
Displays routes of a single tag. Command mode: All except User EXEC
Displays routes on a single interface. Command mode: All except User EXEC
Displays all routes configured in the switch.
Command mode: All except User EXEC
Command mode: All except User EXEC
Status code: * - best Destination Mask Gateway Type Tag Metr If
--------------- --------------- --------------- --------- --------- ---- -­* 11.0.0.0 255.0.0.0 11.0.0.1 direct fixed 211 * 11.0.0.1 255.255.255.255 11.0.0.1 local addr 211 * 11.255.255.255 255.255.255.255 11.255.255.255 broadcast broadcast 211 * 12.0.0.0 255.0.0.0 12.0.0.1 direct fixed 12 * 12.0.0.1 255.255.255.255 12.0.0.1 local addr 12 * 12.255.255.255 255.255.255.255 12.255.255.255 broadcast broadcast 12 * 13.0.0.0 255.0.0.0 11.0.0.2 indirect ospf 2 211 * 47.0.0.0 255.0.0.0 47.133.88.1 indirect static 24 * 47.133.88.0 255.255.255.0 47.133.88.46 direct fixed 24 * 172.30.52.223 255.255.255.255 172.30.52.223 broadcast broadcast 2 * 224.0.0.0 224.0.0.0 0.0.0.0 martian martian * 224.0.0.5 255.255.255.255 0.0.0.0 multicast addr
46
Information Commands
The following table describes the Type parameter.
Table 29 IP Routing Type information
Field Description
indirect
direct
local
broadcast
martian
multicast
The next hop to the host or subnet destination will be forwarded through a router at the Gateway address.
Packets will be delivered to a destination host or subnet attached to the switch.
Indicates a route to one of the switch’s IP interfaces.
Indicates a broadcast route.
The destination belongs to a host or subnet which is filtered out. Packets to this destination are discarded.
Indicates a multicast route.
The following table describes the Tag parameter.
Table 30 IP Routing Tag information
Field Description
fixed
static
addr
rip
The address belongs to a host or subnet attached to the switch.
The address is a static route which has been configured on the switch.
The address belongs to one of the switch’s IP interfaces.
The address was learned by the Routing Information Protocol (RIP).
ospf
broadcast
martian
The address was learned by Open Shortest Path First (OSPF).
Indicates a broadcast address.
The address belongs to a filtered group.
47
Information Commands

ARP information

The Address Resolution Protocol (ARP) information includes IP address and MAC address of each entry, address status flags, VLAN, and port for the address, and port referencing information.
The following table describes the Address Resolution Protocol commands.
Table 31 ARP information
Command Usage
show ip arp find <IP address>
show ip arp interface port <port number>
show ip arp vlan <1-4095>
show ip arp
show ip arp reply
Show all ARP entry information
Displays a single ARP entry by IP address. Command mode: All except User EXEC
Displays the ARP entries on a single port. Command mode: All except User EXEC
Displays the ARP entries on a single VLAN. Command mode: All except User EXEC
Displays all ARP entries, including:
IP address and MAC address of each entry
Address status flag
The VLAN and port to which the address belongs
The ports which have referenced the address (empty if no
port has routed traffic to the IP address shown)
Command mode: All except User EXEC
Displays the ARP address list: IP address, IP mask, MAC address, and VLAN flags.
Command mode: All except User EXEC
The following command displays ARP information:
show ip arp
Command mode: All except User EXEC
IP address Flags MAC address VLAN Port
--------------- ----- ----------------- ---- ----
192.168.2.4 00:50:8b:b2:32:cb 1 18
192.168.2.19 00:0e:7f:25:89:b5 1 17
192.168.2.61 P 00:0f:6a:ed:46:00 1
The Flag field provides additional information about an entry. If no flag displays, the entry is normal.
Table 32 ARP dump flag parameters
Flag Description
P
R
U
Permanent entry created for switch IP interface.
Indirect route entry.
Unresolved ARP entry. The MAC address has not been learned.
48
Information Commands
ARP address list information
The following command displays ARP address list information:
show ip arp reply
Command mode: All except User EXEC
IP address IP mask MAC address VLAN Flags
--------------- --------------- ----------------- ---- -----
205.178.18.66 255.255.255.255 00:70:cf:03:20:04 P
205.178.50.1 255.255.255.255 00:70:cf:03:20:06 1
205.178.18.64 255.255.255.255 00:70:cf:03:20:05 1
This screen displays all entries in the ARP cache.

OSPF information

The following table describes the OSPF commands.
Table 33 OSPF information commands
Command Usage
show ip ospf general-information
show ip ospf area information [<0-2>]
show ip ospf interface [<1-249>]
show ip ospf area-virtual-link information
show ip ospf neighbor
show ip ospf summary-range <0-2>
show ip ospf summary-range-nssa <0-2>
Displays general OSPF information. Command mode: All except User EXEC
Displays area information for a particular area index. If no parameter is supplied, it displays area information for all the areas.
Command mode: All except User EXEC
Displays interface information for a particular interface. If no parameter is supplied, it displays information for all the interfaces.
Command mode: All except User EXEC
Displays information about all the configured virtual links. Command mode: All except User EXEC
Displays the status of all the current neighbors. Command mode: All except User EXEC
Displays the list of summary ranges belonging to non-NSSA areas.
Command mode: All except User EXEC
Displays the list of summary ranges belonging to NSSA areas. Command mode: All except User EXEC
show ip ospf routes
show ip ospf information
Displays OSPF routing table. Command mode: All except User EXEC
Displays the OSPF information. Command mode: All except User EXEC
49
Information Commands
OSPF general information
The following command displays general OSPF information:
show ip ospf general-information
Command mode: All except User EXEC
OSPF Version 2 Router ID: 10.10.10.1 Started at 1663 and the process uptime is 4626 Area Border Router: yes, AS Boundary Router: no LS types supported are 6 External LSA count 0 External LSA checksum sum 0x0 Number of interfaces in this router is 2 Number of virtual links in this router is 1 16 new lsa received and 34 lsa originated from this router Total number of entries in the LSDB 10 Database checksum sum 0x0 Total neighbors are 1, of which 2 are >=INIT state, 2 are >=EXCH state, 2 are =FULL state Number of areas is 2, of which 3-transit 0-nssa 0-stub Area Id : 0.0.0.0 Authentication : none Import ASExtern : yes Number of times SPF ran : 8 Area Border Router count : 2 AS Boundary Router count : 0 LSA count : 5 Summary : noSummary
OSPF interface information
The following command displays OSPF interface information:
show ip ospf interface [<1-249>]
Command mode: All except User EXEC
Ip Address 10.10.12.1, Area 0.0.0.1, Admin Status UP Router ID 10.10.10.1, State DR, Priority 1 Designated Router (ID) 10.10.10.1, Ip Address 10.10.12.1 Backup Designated Router (ID) 10.10.14.1, Ip Address 10.10.12.2 Timer intervals, Hello 10, Dead 40, Wait 40, Retransmit 5, Transit delay 1 Neighbor count is 1 If Events 4, Authentication type none
50
Information Commands
OSPF Database information
The following table describes the OSPF Database information commands.
Table 34 OSPF Database information commands
Command Usage
show ip ospf database advertising­router <router ID>
show ip ospf database asbr-summary [advertising-router <router ID> |link-state-id <A.B.C.D> | self]
show ip ospf database database­summary
Takes advertising router as a parameter. Displays all the Link State Advertisements (LSAs) in the LS database that have the advertising router with the specified router ID, for example:
20.1.1.1. Command mode: All except User EXEC
Displays ASBR summary LSAs. The usage of this command is as follows:
asbrsum adv-rtr 20.1.1.1 displays ASBR summary
LSAs having the advertising router 20.1.1.1.
asbrsum link_state_id 10.1.1.1 displays ASBR
summary LSAs having the link state ID 10.1.1.1.
asbrsum self displays the self advertised ASBR summary
LSAs.
asbrsum with no parameters displays all the ASBR summary
LSAs.
Command mode: All except User EXEC
Displays the following information about the LS database in a table format:
The number of LSAs of each type in each area.
The total number of LSAs for each area.
The total number of LSAs for each LSA type for all areas
combined.
The total number of LSAs for all LSA types for all areas
combined.
No parameters are required. Command mode: All except User EXEC
show ip ospf database external [advertising-router <router ID> |link-state-id <A.B.C.D> | self]
show ip ospf database network [advertising-router <router ID> |link-state-id <A.B.C.D> | self]
show ip ospf database nssa [advertising-router <router ID> |link-state-id <A.B.C.D> | self]
show ip ospf database router [advertising-router <router ID> |link-state-id <A.B.C.D> | self]
show ip ospf database self
Displays the AS-external (type 5) LSAs with detailed information of each field of the LSAs.
Command mode: All except User EXEC
Displays the network (type 2) LSAs with detailed information of each field of the LSA.network LS database.
Command mode: All except User EXEC
Displays the NSSA (type 7) LSAs with detailed information of each field of the LSAs.
Command mode: All except User EXEC
Displays the router (type 1) LSAs with detailed information of each field of the LSAs.
Command mode: All except User EXEC
Displays all the self-advertised LSAs. No parameters are required.
Command mode: All except User EXEC
51
Information Commands
Table 34 OSPF Database information commands
Command Usage
show ip ospf database summary [advertising-router <router ID> | linkstate-id <A.B.C.D> | self]
show ip ospf database
OSPF route codes information
The following command displays OSPF route information:
show ip ospf routes
Command mode: All except User EXEC
Codes: IA - OSPF inter area, N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 * - best IA 10.10.0.0/16 via 200.1.1.2 IA 40.1.1.0/28 via 20.1.1.2 IA 80.1.1.0/24 via 200.1.1.2 IA 100.1.1.0/24 via 20.1.1.2 IA 140.1.1.0/27 via 20.1.1.2 IA 150.1.1.0/28 via 200.1.1.2 E2 172.18.1.1/32 via 30.1.1.2 E2 172.18.1.2/32 via 30.1.1.2 E2 172.18.1.3/32 via 30.1.1.2 E2 172.18.1.4/32 via 30.1.1.2 E2 172.18.1.5/32 via 30.1.1.2 E2 172.18.1.6/32 via 30.1.1.2 E2 172.18.1.7/32 via 30.1.1.2 E2 172.18.1.8/32 via 30.1.1.2
Displays the network summary (type 3) LSAs with detailed information of each field of the LSAs.
Command mode: All except User EXEC
Displays all the LSAs. Command mode: All except User EXEC
52
Information Commands

Routing Information Protocol

The following table describes the Routing Information Protocol (RIP) information commands.
Table 35 RIP information commands
Command Usage
show ip rip routes
show ip rip interface [<1-249>]
show interface ip rip
RIP Routes information
The following command displays RIP route information:
Displays RIP routes. Command mode: All except User EXEC
Displays RIP interface information. Command mode: All except User EXEC
Displays RIP user’s configuration. Command mode: All
show ip rip routes
Command mode: All except User EXEC
3.0.0.0/8 via 30.1.1.11 metric 4
4.0.0.0/16 via 30.1.1.11 metric 16
10.0.0.0/8 via 30.1.1.2 metric 3
20.0.0.0/8 via 30.1.1.2 metric 2
This table contains all dynamic routes learned through RIP, including the routes that are undergoing garbage collection with metric = 16. This table does not contain directly connected routes and locally configured static routes.
RIP user configuration
The following command displays RIP user information:
show interface ip [<1-250>] rip
Command mode: All
RIP USER CONFIGURATION : RIP on update 30 RIP Interface 2 : 102.1.1.1, enabled version 2, listen enabled, supply enabled, default none poison disabled, trigg enabled, mcast enabled, metric 1 auth none, key none RIP Interface 3 : 103.1.1.1, enabled version 2, listen enabled, supply enabled, default none poison disabled, trigg enabled, mcast enabled, metric 1
53
Information Commands

IP information

The following command displays Layer 3 information:
show layer3 information
Command mode: All
IP information: Interface information: 1: 10.80.23.243 255.255.254.0 10.80.23.255, vlan 1, up 250: 10.20.7.144 255.255.0.0 10.20.255.255, vlan 4095, up
Default gateway information: metric strict 1: 10.80.22.1, vlan any, up active 254: 10.20.1.1, vlan 4095, up active
Current BOOTP relay settings: OFF
0.0.0.0, 0.0.0.0
Current IP forwarding settings: OFF, dirbr disabled
Current network filter settings: none
Current route map settings:
The following interface and default gateway information is displayed:
Interface number
IP address
IP mask
IP broadcast address
Operational status
54
Information Commands

IGMP multicast group information

The following table describes the commands used to display information about IGMP groups learned by the switch.
Table 36 IGMP Multicast Group commands
Command Usage
show ip igmp groups address <IP address>
show ip igmp groups vlan <1-4094>
show ip igmp groups interface port <port number>
show ip igmp groups portchannel <1-40>
show ip igmp groups detail
show ip igmp groups
IGMP group information
The following command displays IGMP group information:
show ip igmp groups
Displays a single IGMP multicast group by its IP address. Command mode: All except User EXEC
Displays all IGMP multicast groups on a single VLAN. Command mode: All except User EXEC
Displays all IGMP multicast groups on a single port. Command mode: All except User EXEC
Displays all IGMP multicast groups on a single trunk group. Command mode: All except User EXEC
Displays details about IGMP multicast groups, including source and timer information.
Command mode: All except User EXEC
Displays information for all multicast groups.
Command mode: All except User EXEC
Command mode: All
Note: Local groups (224.0.0.x) are not snooped/relayed and will not appear. Source Group VLAN Port Version Mode Expires Fwd
-------------- --------------- ------- ------ -------- ----- ------- ---
10.1.1.1 232.1.1.1 2 21 V3 INC 4:16 Yes
10.1.1.5 232.1.1.1 2 21 V3 INC 4:16 Yes * 232.1.1.1 2 21 V3 INC - No
10.10.10.43 235.0.0.1 9 21 V3 INC 2:26 Yes * 236.0.0.1 9 21 V3 EXC - Yes
IGMP Group information includes:
IGMP source address
IGMP Group address
VLAN and port
IGMP version
IGMPv3 filter mode
Expiration timer value
IGMP multicast forwarding state
55
Information Commands
IGMP multicast router information
The following table describes the commands used to display information about multicast routers learned through IGMP Snooping.
Table 37 IGMP Multicast Router information commands
Command Usage
show ip igmp mrouter vlan <1-4094>
show ip igmp mrouter information
Displays information for all multicast groups on a single VLAN. Command mode: All except User EXEC
Displays information for all multicast groups learned by the switch. Command mode: All except User EXEC
56
Information Commands

VRRP information

Virtual Router Redundancy Protocol (VRRP) support on HP 10GbE switch provides redundancy between routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID number on each participating VRRP-capable routing device. One of the virtual routers is then elected as the master, based on a number of priority criteria, and assumes control of the shared virtual router IP address. If the master fails, one of the backup virtual routers will assume routing authority and take control of the virtual router IP address.
The following command displays VRRP information:
show ip vrrp information
Command mode: All except User EXEC
VRRP information: 1: vrid 2, 205.178.18.210, if 1, renter, prio 100, master, server 2: vrid 1, 205.178.18.202, if 1, renter, prio 100, backup 3: vrid 3, 205.178.18.204, if 1, renter, prio 100, master, proxy
When virtual routers are configured, you can view the status of each virtual router using this command. VRRP information includes:
Virtual router number
Virtual router ID and IP address
Interface number
Ownership status
owner identifies the preferred master virtual router. A virtual router is the owner when the IP
address of the virtual router and its IP interface are the same.
renter identifies virtual routers which are not owned by this device
Priority value. During the election process, the virtual router with the highest priority becomes master.
Activity status
master identifies the elected master virtual router. backup identifies that the virtual router is in backup mode. init identifies that the virtual router is waiting for a startup event. Once it receives a startup
event, it transitions to master if its priority is 255, (the IP address owner), or transitions to backup if it is not the IP address owner.
Server status. The server state identifies virtual routers.
Proxy status. The proxy state identifies virtual proxy routers, where the virtual router shares the same
IP address as a proxy IP address. The use of virtual proxy routers enables redundant switches to share the same IP address, minimizing the number of unique IP addresses that must be configured.
57
Information Commands
802.1p information
The following command displays 802.1p information:
show qos transmit-queue information
Command mode: All
Current priority to COS queue information: Priority COSq Weight
-------- ---- -----­ 0 0 1 1 0 1 2 0 1 3 0 1 4 1 2 5 1 2 6 1 2 7 1 2
Current port priority information: Port Priority COSq Weight
----- -------- ---- -----­ 1 0 0 1 2 0 0 1 3 0 0 1 4 0 0 1 … 20 0 0 1 21 0 0 1
The following table describes the IEEE 802.1p priority to COS queue information.
Table 38 802.1p Priority to COS Queue information
Field Description
Priority
Cosq
Weight
Displays the 802.1p Priority level.
Displays the Class of Service queue.
Displays the scheduling weight of the COS queue.
The following table describes the IEEE 802.1p port priority information.
Table 39 802.1p Port Priority information
Field Description
Port
Priority
Cosq
Weight
Displays the port number.
Displays the 802.1p Priority level.
Displays the Class of Service queue.
Displays the scheduling weight.
58
Information Commands
ACL information
The following table describes the commands used to display information about Access Control Lists and Groups.
Table 40 ACL information commands
Command Usage
show access-control list <1-384>
show access-control group <1-384>
show access-control
Displays information about the selected ACL. Command mode: All except User EXEC
Displays information about ACL Groups. Command mode: All except User EXEC
Displays information about all ACLs. Command mode: All
The following command displays Access Control List information:
show access-control
Command mode: All
Current ACL information:
-----------------------­ Filter 1 profile: Ethernet
- VID : 1/0xfff Actions : Set COS to 0 Filter 2 profile: Ethernet
- VID : 1/0xfff Actions : Permit No ACL groups configured.
ACL information provides configuration parameters for each Access Control List. It also shows which ACLs are included in each ACL Group.
59
Information Commands
RMON Information
The following command displays general RMON information:
show rmon
Command mode: All

RMON history information

The following command displays RMON history information:
show rmon history
Command mode: All
RMON History group configuration:
Index IFOID Interval Rbnum Gbnum
----- ------------------------------ -------- ----- ----­ 1 1.3.6.1.2.1.2.2.1.1.21 30 5 5 2 1.3.6.1.2.1.2.2.1.1.18 30 5 5 3 1.3.6.1.2.1.2.2.1.1.20 30 5 5 4 1.3.6.1.2.1.2.2.1.1.19 30 5 5 5 1.3.6.1.2.1.2.2.1.1.21 1800 5 5
The following table describes the RMON History Information parameters.
Table 41 RMON History Information
Command Usage
Index
IFOID
Interval
Rbnum
Gbnum
Displays the index number that identifies each history instance.
Displays the MIB Object Identifier.
Displays the time interval for each sampling bucket.
Displays the number of requested buckets, which is the number of data slots into which data is to be saved.
Displays the number of granted buckets that may hold sampled data.
60
Information Commands

RMON alarm information

The following command displays RMON alarm information:
show rmon alarm
Command mode: All
RMON Alarm group configuration:
Index Interval Type rLimit fLimit rEvtIdx fEvtIdx last value
----- -------- ---- -------- -------- ------- ------- ---------­ 1 30 abs 10 0 1 0 0 2 900 abs 0 10 0 2 0 3 300 abs 10 20 0 0 0 4 1800 abs 10 0 1 0 0 5 1800 abs 10 0 1 0 0 8 1800 abs 10 0 1 0 56344540 10 1800 abs 10 0 1 0 0 11 1800 abs 10 0 1 0 0 15 1800 abs 10 0 1 0 0 18 1800 abs 10 0 1 0 0 100 1800 abs 10 0 1 0 0
Index OID
----- -----------------------------­ 1 1.3.6.1.2.1.2.2.1.10.257 2 1.3.6.1.2.1.2.2.1.11.258 3 1.3.6.1.2.1.2.2.1.12.259 4 1.3.6.1.2.1.2.2.1.13.260 5 1.3.6.1.2.1.2.2.1.14.261 8 1.3.6.1.2.1.2.2.1.10.271 10 1.3.6.1.2.1.2.2.1.15.262 11 1.3.6.1.2.1.2.2.1.16.263 15 1.3.6.1.2.1.2.2.1.19.266 18 1.3.6.1.2.1.2.2.1.10.270 100 1.3.6.1.2.1.2.2.1.17.264
The following table describes the RMON Alarm Information parameters.
Table 42 RMON Alarm Information
Command Usage
Index
Interval
Type
Displays the index number that identifies each alarm instance.
Displays the time interval over which data is sampled and compared with the rising and falling thresholds.
Displays the method of sampling the selected variable and calculating the value to be compared against the thresholds, as follows:
abs—absolute value, the value of the selected variable is compared directly with the
thresholds at the end of the sampling interval.
delta—delta value, the value of the selected variable at the last sample is subtracted
from the current value, and the difference compared with the thresholds.
rLimit
fLimit
Displays the rising threshold for the sampled statistic.
Displays the falling threshold for the sampled statistic.
61
Information Commands
Table 42 RMON Alarm Information
Command Usage
rEvtIdx
fEvtIdx
Last value
OID
Displays the rising alarm event index that is triggered when a rising threshold is crossed.
Displays the falling alarm event index that is triggered when a falling threshold is crossed.
Displays the last sampled value.
Displays the MIB Object Identifier for each alarm index.

RMON event information

The following command displays RMON event information:
show rmon event
Command mode: All
RMON Event group configuration:
Index Type Last Sent Description
----- ---- ---------------- --------------------------------­ 1 both 0D: 0H: 1M:20S Event_1 2 none 0D: 0H: 0M: 0S Event_2 3 log 0D: 0H: 0M: 0S Event_3 4 trap 0D: 0H: 0M: 0S Event_4 5 both 0D: 0H: 0M: 0S Log and trap event for Link Down 10 both 0D: 0H: 0M: 0S Log and trap event for Link Up 11 both 0D: 0H: 0M: 0S Send log and trap for icmpInMsg 15 both 0D: 0H: 0M: 0S Send log and trap for icmpInEchos 100 both 0D: 0H: 0M: 0S Event_100
The following table describes the RMON Event Information parameters.
Table 43 RMON Event Information
Command Usage
Index
Type
Last Sent
Description
Displays the index number that identifies each event instance.
Displays the type of notification provided for this event, as follows: log, trap, both.
Displays the time that passed since the last switch reboot, when the most recent event was triggered. This value is cleared when the switch reboots.
Displays a text description of the event.
62
Information Commands
Link status information
The following command displays link information:
show interface link
Command mode: All except User EXEC
-----------------------------------------------------------------­Port Speed Duplex Flow Ctrl Link
---- ----- -------- --TX-----RX-- -----­ 1 10000 full yes yes down 2 10000 full yes yes down 3 10000 full yes yes down 4 10000 full yes yes down 5 10000 full yes yes down 6 10000 full yes yes down 7 10000 full yes yes down 8 10000 full yes yes down 9 10000 full yes yes up 10 10000 full yes yes down 11 10000 full yes yes down 12 10000 full yes yes down 13 10000 full yes yes down 14 10000 full yes yes down 15 10000 full yes yes down 16 10000 full yes yes down 17 100 full yes yes up 18 10000 full yes yes down 19 10000 full yes yes down 20 10000 full yes yes down 21 10000 full yes yes down
Use this command to display link status information about each port on a switch, including:
Port number
Port speed (10000 Mb/s or 100 Mb/s)
Duplex mode (half, full, or any)
Flow control for transmit and receive (no, yes, or any)
Link status (up, down, or disabled)
63
Information Commands
Port information
The following command displays port information:
show interface information
Command mode: All except User EXEC
Port Tag RMON PVID NAME VLAN(s)
---- --- ---- ---- -------------- ------------------------------­ 1 n d 1 Downlink1 1 2 n d 1 Downlink2 1 3 n d 1 Downlink3 1 4 n d 1 Downlink4 1 5 n d 1 Downlink5 1 6 n d 1 Downlink6 1 7 n d 1 Downlink7 1 8 n d 1 Downlink8 1 9 n d 1 Downlink9 1 10 n d 1 Downlink10 1 11 n d 1 Downlink11 1 12 n d 1 Downlink12 1 13 n d 1 Downlink13 1 14 n d 1*Downlink14 1 15 n d 1*Downlink15 1 16 n d 1*Downlink16 1 17 n d 4095 Mgmt 4095 18 n d 1*Uplink1 1 19 n d 1*Uplink2 1 20 n d 1*Uplink3 1 21 n d 1*Uplink4 1 * = PVID is tagged.
Port information includes:
Port number
Whether the port uses VLAN tagging or not (y or n)
Whether Remote Monitoring (RMON) is enabled or disabled (e or d)
Port VLAN ID (PVID)
Port name
VLAN membership
64
Information Commands
Logical Port to GEA Port mapping
The following command displays information about GEA ports:
show geaport
Command mode: All
Logical Port GEA Port(0-based) GEA Unit
------------ ----------------- --------­ 1 2 0 2 4 0 3 6 0 4 8 0 5 10 0 6 12 0 7 14 0 8 16 0 9 3 0 10 5 0 11 7 0 12 9 0 13 11 0 14 13 0 15 15 0 16 17 0 17 255 0 18 18 0 19 19 0 20 0 0 21 1 0
This display correlates the logical port number to the GEA unit on which each port resides.
Fiber Port SFP status
The following command displays XFP information:
show sfp
Command mode: All
-----------------------------------------­Port Device TX-Enable RX-Signal TX-Fault
------ ------ --------- --------- -------­ XFP1 SR-XFP enabled ok N/A XFP2 SR-XFP enabled LOST N/A XFP3 SR-XFP enabled ok N/A XFP4 SR-XFP **** NOT Installed ****
This command displays the status of the Small Form Pluggable (SFP) module on each Fiber External Port.
65
Information Commands
Uplink Failure Detection information
The following command displays Uplink Failure Detection (UFD) information:
show ufd
Command mode: All except User EXEC
Uplink Failure Detection: Enabled LtM status: Down Member STG STG State Link Status
--------- --- ------------ ----------­ port 20 down 1 DISABLED 10 DISABLED * 15 DISABLED * * = STP turned off for this port.
LtD status: Auto Disabled Member Link Status
--------- ----------­ port 1 disabled port 2 disabled port 3 disabled port 4 disabled
Uplink Failure Detection (UFD) information includes:
UFD status, either enabled or disabled
LtM status and member ports
Spanning Tree status for LtM ports
LtD status and member ports
Information dump
The following command dumps switch information:
show information-dump
Command mode: All
Use the dump command to dump all switch information available from switch memory (10K or more, depending on your configuration). This data is useful for tuning and debugging switch performance.
If you want to capture dump data to a file, set the communication software on your workstation to capture session data prior to issuing the dump commands.
66
Statistics Commands

Statistics Commands

Introduction
You can view switch performance statistics in the user, operator, and administrator command modes. This chapter discusses how to use the ISCLI to display switch statistics.
The following table describes general Statistics commands.
Table 44 Statistics commands
Command Usage
show layer3 counters
show snmp-server counters
show ntp counters
clear ntp
show ufd counters
show counters
Displays Layer 3 Statistics. Command mode: All
Displays SNMP statistics. Command mode: All
Displays Network Time Protocol (NTP) Statistics. You can execute the clear command option to delete all statistics. Command mode: All
Clears Network Time Protocol (NTP) Statistics. Command mode: All
Displays Uplink Failure Detection statistics. Command mode: All
Dumps all switch statistics. Use this command to gather data for tuning and debugging switch performance. If you want to capture dump data to a file, set your communication software on your workstation to capture session data prior to issuing the dump command.
Command mode: All
67
Statistics Commands
Port Statistics
The following table describes the Port Statistics commands. The following sections provide more detailed information and commands.
Table 45 Port Statistics commands
Command Usage
show interface port <port number> dot1x counters
show interface port <port number> bridging-counters
show interface port <port number> ethernet-counters
show interface port <port number> interface-counters
show interface port <port number> ip­counters
show interface port <port number> link­counters
show interface port <port number> rmon­counters
Displays IEEE 802.1x statistics for the port. Command mode: All
Displays bridging (“dot1”) statistics for the port. Command mode: All
Displays Ethernet (“dot3”) statistics for the port. Command mode: All
Displays interface statistics for the port. Command mode: All
Displays Internet Protocol statistics for the port. Command mode: All
Displays link statistics for the port. Command mode: All
Displays Remote Monitoring (RMON) statistics for the port.
Command mode: All
68
Statistics Commands

802.1x statistics

Use the following command to display the 802.1x authenticator statistics of the selected port:
show interface port <port number> dot1x counters
Command mode: All
Authenticator Statistics: eapolFramesRx = 0 eapolFramesTx = 0 eapolStartFramesRx = 0 eapolLogoffFramesRx = 0 eapolRespIdFramesRx = 0 eapolRespFramesRx = 0 eapolReqIdFramesTx = 0 eapolReqFramesTx = 0 invalidEapolFramesRx = 0 eapLengthErrorFramesRx = 0 lastEapolFrameVersion = 0 lastEapolFrameSource = 00:00:00:00:00:00
Authenticator Diagnostics: authEntersConnecting = 0 authEapLogoffsWhileConnecting = 0 authEntersAuthenticating = 0 authSuccessesWhileAuthenticating = 0 authTimeoutsWhileAuthenticating = 0 authFailWhileAuthenticating = 0 authReauthsWhileAuthenticating = 0 authEapStartsWhileAuthenticating = 0 authEapLogoffWhileAuthenticating = 0 authReauthsWhileAuthenticated = 0 authEapStartsWhileAuthenticated = 0 authEapLogoffWhileAuthenticated = 0 backendResponses = 0 backendAccessChallenges = 0 backendOtherRequestsToSupplicant = 0 backendNonNakResponsesFromSupplicant = 0 backendAuthSuccesses = 0 backendAuthFails = 0
The following table describes the 802.1x authenticator diagnostics for a selected port:
Table 46 802.1x statistics for port
Statistics
Authenticator Diagnostics
authEntersConnecting
authEapLogoffsWhileConnecting
Description
Total number of times that the state machine transitions to the CONNECTING state from any other state.
Total number of times that the state machine transitions from CONNECTING to DISCONNECTED as a result of receiving an EAPOL-Logoff message.
69
Statistics Commands
Table 46 802.1x statistics for port
Statistics
authEntersAuthenticating
authSuccessesWhileAuthenticating
authTimeoutsWhileAuthenticating
authFailWhileAuthenticating
authReauthsWhileAuthenticating
authEapStartsWhileAuthenticating
Description
Total number of times that the state machine transitions from CONNECTING to AUTHENTICATING, as a result of an EAPResponse/Identity message being received from the Supplicant.
Total number of times that the state machine transitions from AUTHENTICATING to AUTHENTICATED, as a result of the Backend Authentication state machine indicating successful authentication of the Supplicant.
Total number of times that the state machine transitions from AUTHENTICATING to ABORTING, as a result of the Backend Authentication state machine indicating authentication timeout.
Total number of times that the state machine transitions from AUTHENTICATING to HELD, as a result of the Backend Authentication state machine indicating authentication failure.
Total number of times that the state machine transitions from AUTHENTICATING to ABORTING, as a result of a re-authentication request
Total number of times that the state machine transitions from AUTHENTICATING to ABORTING, as a result of an EAPOL-Start message being received from the Supplicant.
authEapLogoffWhileAuthenticating
authReauthsWhileAuthenticated
authEapStartsWhileAuthenticated
authEapLogoffWhileAuthenticated
backendResponses
backendAccessChallenges
backendOtherRequestsToSupplicant
Total number of times that the state machine transitions from AUTHENTICATING to ABORTING, as a result of an EAPOL-Logoff message being received from the Supplicant.
Total number of times that the state machine transitions from AUTHENTICATED to CONNECTING, as a result of a re­authentication request.
Total number of times that the state machine transitions from AUTHENTICATED to CONNECTING, as a result of an EAPOL-Start message being received from the Supplicant.
Total number of times that the state machine transitions from AUTHENTICATED to DISCONNECTED, as a result of an EAPOLLogoff message being received from the Supplicant.
Total number of times that the state machine sends an initial Access­Request packet to the Authentication server. Indicates that the Authenticator attempted communication with the Authentication Server.
Total number of times that the state machine receives an initial Access-Challenge packet from the Authentication server. Indicates that the Authentication Server has communication with the Authenticator.
Total number of times that the state machine sends an EAP-Request packet (other than an Identity, Notification, Failure, or Success message) to the Supplicant. Indicates that the Authenticator chose an EAP-method.
70
Statistics Commands
Table 46 802.1x statistics for port
Statistics
backendNonNakResponsesFrom Supplicant
backendAuthSuccesses
backendAuthFails
Description

Bridging statistics

Use the following command to display the bridging statistics of the selected port:
show interface port <port number> bridging-counters
Command mode: All
Bridging statistics for port 1: dot1PortInFrames: 63242584 dot1PortOutFrames: 63277826 dot1PortInDiscards: 0 dot1TpLearnedEntryDiscards: 0 dot1StpPortForwardTransitions: 0
Total number of times that the state machine receives a response from the Supplicant to an initial EAP-Request, and the response is something other than EAP-NAK. Indicates that the Supplicant can respond to the Authenticators chosen EAP-method.
Total number of times that the state machine receives an Accept message from the Authentication Server. Indicates that the Supplicant has successfully authenticated to the Authentication Server.
Total number of times that the state machine receives a Reject message from the Authentication Server. Indicates that the Supplicant has not authenticated to the Authentication Server.
The following table describes the bridging statistics for a selected port:
Table 47 Bridging statistics for port
Statistics Description
dot1PortInFrames
dot1PortOutFrames
dot1PortInDiscards
The number of frames that have been received by this port from its segment.
A frame received on the interface corresponding to this port is counted by this object, if and only if, it is for a protocol being processed by the local bridging function, including bridge management frames.
The number of frames that have been transmitted by this port to its segment.
A frame transmitted on the interface corresponding to this port is counted by this object, if and only if, it is for a protocol being processed by the local bridging function, including bridge management frames.
Count of valid frames received which were discarded (that is, filtered) by the forwarding process.
71
Statistics Commands
Table 47 Bridging statistics for port
Statistics Description
dot1TpLearnedEntryDiscards
dot1StpPortForwardTransitions

Ethernet statistics

Use the following command to display the ethernet statistics of the selected port:
show interface port <port number> ethernet-counters
Command mode: All
Ethernet statistics for port 1: dot3StatsAlignmentErrors: 0 dot3StatsFCSErrors: 0 dot3StatsSingleCollisionFrames: 0 dot3StatsMultipleCollisionFrames: 0 dot3StatsLateCollisions: 0 dot3StatsExcessiveCollisions: 0 dot3StatsInternalMacTransmitErrors: NA dot3StatsFrameTooLongs: 0 dot3StatsInternalMacReceiveErrors: 0
The total number of Forwarding Database entries, which have been or would have been learned, but have been discarded due to a lack of space to store them in the Forwarding Database.
If this counter is increasing, it indicates that the Forwarding Database is regularly becoming full (a condition which has adverse performance effects on the sub network).
If this counter has a significant value but is not presently increasing, it indicates that the problem has been occurring but is not persistent.
The number of times this port has transitioned from the Learning state to the Forwarding state.
The following table describes the Ethernet statistics for a selected port:
Table 48 Ethernet statistics for port
Statistics Description
dot3StatsAlignmentErrors
A count of frames received on a particular interface that are not an integral number of octets in length and do not pass the Frame Check Sequence (FCS) check.
The count represented by an instance of this object is incremented when the alignmentError status is returned by the MAC service to the Logical Link Control (LLC) (or other MAC user).
Received frames for which multiple error conditions obtained are, according to the conventions of IEEE 802.3 Layer Management, counted exclusively according to the error status presented to the LLC.
72
Statistics Commands
Table 48 Ethernet statistics for port
Statistics Description
dot3StatsFCSErrors
dot3StatsSingleCollisionFrames
dot3StatsMultipleCollisionFrames
A count of frames received on a particular interface that are an integral number of octets in length but do not pass the Frame Check Sequence (FCS) check.
The count represented by an instance of this object is incremented when the frameCheckError status is returned by the MAC service to the LLC (or other MAC user).
Received frames for which multiple error conditions obtained are, according to the conventions of IEEE 802.3 Layer Management, counted exclusively according to the error status presented to the LLC.
A count of successfully transmitted frames on a particular interface for which transmission is inhibited by exactly one collision.
A frame that is counted by an instance of this object is also counted by the corresponding instance of the ifOutUcastPkts, ifOutMulticastPkts, or ifOutBroadcastPkts, and is not counted by the corresponding instance of the dot3StatsMultipleCollisionFrame object.
A count of successfully transmitted frames on a particular interface for which transmission is inhibited by more than one collision.
A frame that is counted by an instance of this object is also counted by the corresponding instance of either the
ifOutUcastPkts, ifOutMulticastPkts, or ifOutBroadcastPkts, and is not counted by the corresponding instance of the dot3StatsSingleCollisionFrames object.
dot3StatsLateCollisions
dot3StatsExcessiveCollisions
dot3StatsInternalMacTransmitErrors
The number of times that a collision is detected on a particular interface later than 512 bit-times into the transmission of a packet.
Five hundred and twelve bit-times corresponds to 51.2 microseconds on a 10 Mbps system. A (late) collision included in a count represented by an instance of this object is also considered as a (generic) collision for purposes of other collision-related statistics.
A count of frames for which transmission on a particular interface fails due to excessive collisions.
A count of frames for which transmission on a particular interface fails due to an internal MAC sublayer transmit error.
A frame is only counted by an instance of this object if it is not counted by the corresponding instance of either the
dot3StatsLateCollisions object, the dot3StatsExcessiveCollisions object, or the dot3StatsCarrierSenseErrors object.
The precise meaning of the count represented by an instance of this object is implementation specific. In particular, an instance of this object may represent a count of transmission errors on a particular interface that are not otherwise counted.
73
Statistics Commands
Table 48 Ethernet statistics for port
Statistics Description
dot3StatsFrameTooLongs
dot3StatsInternalMacReceiveErrors
A count of frames received on a particular interface that exceeds the maximum permitted frame size.
The count represented by an instance of this object is incremented when the frameTooLong status is returned by the MAC service to the LLC (or other MAC user).
Received frames for which multiple error conditions obtained are, according to the conventions of IEEE 802.3 Layer Management, counted exclusively according to the error status presented to the LLC.
A count of frames for which reception on a particular interface fails due to an internal MAC sublayer receive error.
A frame is only counted by an instance of this object if it is not counted by the corresponding instance of the
dot3StatsFrameTooLongs object, the dot3StatsAlignmentErrors object, or the dot3StatsFCSErrors object.
The precise meaning of the count represented by an instance of this object is implementation specific. In particular, an instance of this object may represent a count of received errors on a particular interface that are not otherwise counted.

Interface statistics

Use the following command to display the interface statistics of the selected port:
show interface port <port number> interface-counters
Command mode: All
Interface statistics for port 1: ifHCIn Counters ifHCOut Counters Octets: 51697080313 51721056808 UcastPkts: 65356399 65385714 BroadcastPkts: 0 6516 MulticastPkts: 0 0 Discards: 0 0 Errors: 0 21187
The following table describes the interface (IF) statistics for a selected port:
Table 49 Interface statistics for port
Statistics Description
Octets—IfHCIn
UcastPkts—IfHCIn
BroadcastPkts—IfHCIn
The total number of octets received on the interface, including framing characters.
The number of packets, delivered by this sublayer to a higher sublayer, which were not addressed to a multicast or broadcast address at this sublayer.
The number of packets, delivered by this sublayer to a higher sublayer, which were addressed to a broadcast address at this sublayer.
74
Statistics Commands
Table 49 Interface statistics for port
Statistics Description
MulticastPkts—IfHCIn
Discards—IfHCIn
Errors—IfHCIn
Octets—IfHCOut
UcastPkts—IfHCOut
BroadcastPkts—IfHCOut
The total number of packets, delivered by this sublayer. These are the packets that higher-level protocols requested to be transmitted, and which were addressed to a multicast address at this sublayer, including those that were discarded or not sent.
For a MAC layer protocol, this includes both group and functional addresses.
The number of inbound packets which were chosen to be discarded even though no errors were detected to prevent their being delivered to a higher-layer protocol. One possible reason for discarding such a packet could be to free up buffer space.
For packet-oriented interfaces, the number of inbound packets that contained errors preventing them from being delivered to a higher-layer protocol.
For character-oriented or fixed-length interfaces, the number of inbound transmission units that contained errors preventing them from being deliverable to a higher-layer protocol.
The total number of octets transmitted out of the interface, including framing characters.
The total number of packets that higher-level protocols requested to be transmitted, and which were not addressed to a multicast or broadcast address at this sublayer, including those that were discarded or not sent.
The total number of packets that higher-level protocols requested to be transmitted, and which were addressed to a broadcast address at this sublayer, including those that were discarded or not sent. This object is a 64-bit version of
ifOutBroadcastPkts.
MulticastPkts—IfHCOut
Discards—IfHCOut
Errors—IfHCOut
The total number of packets that higher-level protocols requested to be transmitted, and which were addressed to a multicast address at this sublayer, including those that were discarded or not sent.
For a MAC layer protocol, this includes both group and functional addresses. This object is a 64-bit version of ifOutMulticastPkts.
The number of outbound packets that were chosen to be discarded even though no errors had been detected to prevent their being transmitted. One possible reason for discarding such a packet could be to free up buffer space.
For packet-oriented interfaces, the number of outbound packets that could not be transmitted because of errors.
For character-oriented or fixed-length interfaces, the number of outbound transmission units that could not be transmitted because of errors.
75
Statistics Commands

Internet Protocol (IP) statistics

Use the following command to display the interface protocol statistics of the selected port:
show interface port <port number> ip-counters
Command mode: All
GEA IP statistics for port 1: ipInReceives : 0 ipInHeaderError: 0 ipInDiscards : 0
The following table describes the Internet Protocol (IP) statistics for a selected port:
Table 50 IP statistics for port
Statistics Description
ipInReceives
ipInHeaderError
ipInDiscards

Link statistics

Use the following command to display the link statistics of the selected port:
show interface port <port number> link-counters
Command mode: All
Link statistics for port 1: linkStateChange: 2
The following table describes the link statistics for a selected port:
Table 51 Link statistics for port
The total number of input datagrams received from interfaces, including those received in error.
The number of input datagrams discarded because the IP address in their IP header's destination field was not a valid address to be received at this entity (the switch).
The number of input IP datagrams for which no problems were encountered to prevent their continued processing, but which were discarded (for example, for lack of buffer space). Note that this counter does not include any datagrams discarded while awaiting re-assembly.
Statistic Description
linkStateChange
The total number of link state changes.
76
Statistics Commands
Layer 2 statistics
The following table describes the Layer 2 statistics commands. The following sections provide more detailed information and commands.
Table 52 Layer 2 Statistics commands
Command Usage
show mac-address-table counters
show interface port <port number> lacp counters
show layer2 counters

FDB statistics

Use the following command to display statistics regarding the use of the forwarding database, including the number of new entries, finds, and unsuccessful searches:
show mac-address-table counters
Command mode: All
FDB statistics: current: 91 hiwat: 91
These commands enable you to display statistics regarding the use of the forwarding database, including the number of current entries and the maximum number of entries ever recorded.
The following table describes the Forwarding Database (FDB) statistics:
Displays the Forwarding Database statistics. Command mode: All
Displays Link Aggregation Control Protocol (LACP) statistics. Command mode: All
Displays all Layer 2 statistics. Command mode: All
Table 53 Forwarding Database statistics
Statistic Description
current
hiwat
Current number of entries in the Forwarding Database.
Highest number of entries recorded at any given time in the Forwarding Database.
77
Statistics Commands

LACP statistics

Use the following command to display Link Aggregation Control Protocol (LACP) statistics:
show interface port <port number> lacp counters
Command mode: All
Valid LACPDUs received - 0 Valid Marker PDUs received - 0 Valid Marker Rsp PDUs received - 0 Unknown version/TLV type - 0 Illegal subtype received - 0 LACPDUs transmitted - 0 Marker PDUs transmitted - 0 Marker Rsp PDUs transmitted - 0
78
Statistics Commands
Layer 3 statistics
The following table describes basic Layer 3 statistics commands. The following sections provide more detailed information and commands.
Table 54 Layer 3 Statistics commands
Command Usage
show ip counters
clear ip counters
show ip route counters
show ip arp counters
show ip dns counters
show ip icmp counters
show ip tcp counters
show ip udp counters
Displays IP statistics. Command mode: All except User EXEC
Clears IP statistics. Use this command with caution as it deletes all the IP statistics.
Command mode: All except User EXEC
Displays route statistics. Command mode: All except User EXEC
Displays Address Resolution Protocol (ARP) statistics. Command mode: All except User EXEC
Displays Domain Name System (DNS) statistics. Command mode: All except User EXEC
Displays ICMP statistics. Command mode: All except User EXEC
Displays Transmission Control Protocol (TCP) statistics. Command mode: All except User EXEC
Displays User Datagram Protocol (UDP) statistics. Add the argument, clear, to clear UDP statistics.
Command mode: All except User EXEC
show ip igmp counters
show layer3 igmp-groups
show layer3 ipmc-groups
clear ip igmp [<1-4094>] counters
show ip ospf counters
clear ip ospf counters
show ip vrrp counters
clear ip vrrp counters
Displays IGMP statistics. Command mode: All except User EXEC
Displays the total number of IGMP groups that are learned/configured on the switch.
Command mode: All except User EXEC
Displays the total number of current IP multicast groups. Command mode: All except User EXEC
Clears all IGMP statistics for the selected VLANs. Command mode: All above Priv EXEC
Displays OSPF statistics. Command mode: All above Priv EXEC
Clears all OSPF statistics. Command mode: All above Priv EXEC
When virtual routers are configured, you can display VRRP statistics: Command mode: All above Priv EXEC
Clears VRRP statistics. Command mode: All above Priv EXEC
79
Statistics Commands
Table 54 Layer 3 Statistics commands
Command Usage
show ip rip counters
clear ip rip counters
show ip gea
show layer3 counters

IP statistics

The following command displays IP statistics:
show ip counters
Command mode: All except User EXEC
IP statistics: ipInReceives: 36475 ipInHdrErrors: 0 ipInAddrErrors: 905 ipInUnknownProtos: 0 ipInDiscards: 0 ipInDelivers: 4103 ipOutRequests: 30974 ipOutDiscards: 0 ipDefaultTTL: 255
Displays Routing Information Protocol (RIP) statistics. Command mode: All above Priv EXEC
Clears Routing Information Protocol (RIP) statistics. Command mode: All above Priv EXEC
Displays GEA statistics. Command mode: All above Priv EXEC
Displays all Layer 3 statistics. Command mode: All except User EXEC
The following table describes the IP statistics:
Table 55 IP statistics
Statistics Description
ipInReceives
ipInHdrErrors
ipInAddrErrors
ipInUnknownProtos
The total number of input datagrams received from interfaces, including those received in error.
The number of input datagrams discarded due to errors in their IP headers, including bad checksums, version number mismatch, other format errors, time-to-live exceeded, errors discovered in processing their IP options, and so on.
The number of input datagrams discarded because the IP address in their IP header destination field was not a valid address to be received at this switch. This count includes invalid addresses (for example, 0.0.0.0) and addresses of unsupported classes (for example, Class E).
For entities which are not IP gateways and therefore do not forward datagrams, this counter includes datagrams discarded because the destination address was not a local address.
The number of locally addressed datagrams received successfully but discarded because of an unknown or unsupported protocol.
80
Statistics Commands
Table 55 IP statistics
Statistics Description
ipInDiscards
ipInDelivers
ipOutRequests
ipOutDiscards
ipDefaultTTL

Route statistics

The number of input IP datagrams for which no problems were encountered to prevent their continued processing, but which were discarded (for example, for lack of buffer space).
This counter does not include any datagrams discarded while awaiting re-assembly.
The total number of input datagrams successfully delivered to IP user-protocols (including ICMP).
The total number of IP datagrams that local IP user-protocols (including ICMP) supplied to IP in requests for transmission.
This counter does not include any datagrams counted in ipForwDatagrams.
The number of output IP datagrams for which no problem was encountered to prevent their transmission to their destination, but which were discarded (for example, for lack of buffer space).
This counter would include datagrams counted in ipForwDatagrams if any such packets met this (discretionary) discard criterion.
The default value inserted into the Time-To-Live (TTL) field of the IP header of datagrams originated at this switch, whenever a TTL value is not supplied by the transport layer protocol.
The following command displays route statistics:
show ip route counters
Command mode: All except User EXEC
Route statistics: ipRoutesCur: 8 ipRoutesHighWater: 8 ipRoutesMax: 4096
The following table describes the Route statistics:
Table 56 Route statistics
Statistics Description
ipRoutesCur
ipRoutesMax
ipRoutesHighWater
The total number of outstanding routes in the route table.
The maximum number of supported routes.
The highest number of routes ever recorded in the route table.
81
Statistics Commands

ARP statistics

The following command displays Address Resolution Protocol statistics.
show ip arp counters
Command mode: All except User EXEC
ARP statistics: arpEntriesCur: 2 arpEntriesHighWater: 4 arpEntriesMax: 4095
The following table describes the Address Resolution Protocol (ARP) statistics:
Table 57 ARP statistics
Statistic Description
arpEntriesCur
arpEntriesMax
arpEntriesHighWater

DNS statistics

show ip dns counters
Command mode: All except User EXEC
DNS statistics: dnsInRequests: 0 dnsOutRequests: 0 dnsBadRequests: 0
The following table describes the Domain Name System (DNS) statistics:
Table 58 DNS statistics
Statistic Description
dnsInRequests
dnsOutRequests
dnsBadRequests
The total number of outstanding ARP entries in the ARP table.
The maximum number of ARP entries that are supported.
The highest number of ARP entries ever recorded in the ARP table.
The total number of DNS request packets that have been received.
The total number of DNS response packets that have been transmitted.
The total number of DNS request packets received that were dropped.
82
Statistics Commands

ICMP statistics

The following command displays ICMP statistics:
show ip icmp counters
Command mode: All except User EXEC
ICMP statistics: icmpInMsgs: 245802 icmpInErrors: 1393 icmpInDestUnreachs: 41 icmpInTimeExcds: 0 icmpInParmProbs: 0 icmpInSrcQuenchs: 0 icmpInRedirects: 0 icmpInEchos: 18 icmpInEchoReps: 244350 icmpInTimestamps: 0 icmpInTimestampReps: 0 icmpInAddrMasks: 0 icmpInAddrMaskReps: 0 icmpOutMsgs: 253810 icmpOutErrors: 0 icmpOutDestUnreachs: 15 icmpOutTimeExcds: 0 icmpOutParmProbs: 0 icmpOutSrcQuenchs: 0 icmpOutRedirects: 0 icmpOutEchos: 253777 icmpOutEchoReps: 18 icmpOutTimestamps: 0 icmpOutTimestampReps: 0 icmpOutAddrMasks: 0 icmpOutAddrMaskReps: 0
The following table describes the Internet Control Messaging Protocol (ICMP) statistics:
Table 59 ICMP statistics
Statistics Description
icmpInMsgs
icmpInErrors
icmpInDestUnreachs
icmpInTimeExcds
icmpInParmProbs
icmpInSrcQuenchs
icmpInRedirects
icmpInEchos
icmpInEchoReps
icmpInTimestamps
The total number of ICMP messages which the switch received. Note that this counter includes all those counted by icmpInErrors.
The number of ICMP messages which the switch received but determined as having ICMP specific errors (for example bad ICMP checksums and bad length).
The number of ICMP Destination Unreachable messages received.
The number of ICMP Time Exceeded messages received.
The number of ICMP Parameter Problem messages received.
The number of ICMP Source Quench (buffer almost full, stop sending data) messages received.
The number of ICMP Redirect messages received.
The number of ICMP Echo (request) messages received.
The number of ICMP Echo Reply messages received.
The number of ICMP Timestamp (request) messages received.
icmpInTimestampReps
icmpInAddrMasks
icmpInAddrMaskReps
icmpOutMsgs
The number of ICMP Timestamp Reply messages received.
The number of ICMP Address Mask Request messages received.
The number of ICMP Address Mask Reply messages received.
The total number of ICMP messages which this switch attempted to send. Note that this counter includes all those counted by icmpOutErrors.
83
Statistics Commands
Table 59 ICMP statistics
Statistics Description
icmpOutErrors
icmpOutDestUnreachs
icmpOutTimeExcds
icmpOutParmProbs
icmpOutSrcQuenchs
icmpOutRedirects
icmpOutEchos
icmpOutEchoReps
icmpOutTimestamps
icmpOutTimestampReps
icmpOutAddrMasks
icmpOutAddrMaskReps
The number of ICMP messages that this switch did not send due to problems discovered within ICMP such as a lack of buffer. This value should not include errors discovered outside the ICMP layer such as the inability of IP to route the resultant datagram. In some implementations there may be no types of errors that contribute to this counter's value.
The number of ICMP Destination Unreachable messages sent.
The number of ICMP Time Exceeded messages sent.
The number of ICMP Parameter Problem messages sent.
The number of ICMP Source Quench (buffer almost full, stop sending data) messages sent.
The number of ICMP Redirect messages sent.
The number of ICMP Echo (request) messages sent.
The number of ICMP Echo Reply messages sent.
The number of ICMP Timestamp (request) messages sent.
The number of ICMP Timestamp Reply messages sent.
The number of ICMP Address Mask Request messages sent.
The number of ICMP Address Mask Reply messages sent.

TCP statistics

The following command displays TCP statistics:
show ip tcp counters
Command mode: All except User EXEC
TCP statistics: tcpRtoAlgorithm: 4 tcpRtoMin: 0 tcpRtoMax: 240000 tcpMaxConn: 512 tcpActiveOpens: 252214 tcpPassiveOpens: 7 tcpAttemptFails: 528 tcpEstabResets: 4 tcpInSegs: 756401 tcpOutSegs: 756655 tcpRetransSegs: 0 tcpInErrs: 0 tcpCurBuff: 0 tcpCurConn: 3 tcpOutRsts: 417
The following table describes the Transmission Control Protocol (TCP) statistics:
Table 60 TCP statistics
Statistics Description
tcpRtoAlgorithm
The algorithm used to determine the timeout value used for retransmitting unacknowledged octets.
84
Statistics Commands
Table 60 TCP statistics
Statistics Description
tcpRtoMin
tcpRtoMax
tcpMaxConn
tcpActiveOpens
tcpPassiveOpens
tcpAttemptFails
tcpEstabResets
The minimum value permitted by a TCP implementation for the retransmission timeout, measured in milliseconds. More refined semantics for objects of this type depend upon the algorithm used to determine the retransmission timeout. In particular, when the timeout algorithm is rsre(3), an object of this type has the semantics of the LBOUND quantity described in Request For Comments (RFC) 793.
The maximum value permitted by a TCP implementation for the retransmission timeout, measured in milliseconds. More refined semantics for objects of this type depend upon the algorithm used to determine the retransmission timeout. In particular, when the timeout algorithm is rsre(3), an object of this type has the semantics of the UBOUND quantity described in RFC 793.
The limit on the total number of TCP connections the switch can support. In entities where the maximum number of connections is dynamic, this object should contain the value -1.
The number of times TCP connections have made a direct transition to the SYN-SENT state from the CLOSED state.
The number of times TCP connections have made a direct transition to the SYN-RCVD state from the LISTEN state.
The number of times TCP connections have made a direct transition to the CLOSED state from either the SYN-SENT state or the SYN-RCVD state, plus the number of times TCP connections have made a direct transition to the LISTEN state from the SYN-RCVD state.
The number of times TCP connections have made a direct transition to the CLOSED state from either the ESTABLISHED state or the CLOSE- WAIT state.
tcpInSegs
tcpOutSegs
tcpRetransSegs
tcpInErrs
tcpCurBuff
tcpCurConn
tcpOutRsts
The total number of segments received, including those received in error. This count includes segments received on currently established connections.
The total number of segments sent, including those on current connections but excluding those containing only retransmitted octets.
The total number of segments retransmitted, that is, the number of TCP segments transmitted containing one or more previously transmitted octets.
The total number of segments received in error (for example, bad TCP checksums).
The total number of outstanding memory allocations from heap by TCP protocol stack.
The total number of outstanding TCP sessions that are currently opened.
The number of TCP segments sent containing the reset (RST) flag.
85
Statistics Commands

UDP statistics

The following command displays UDP statistics:
show ip udp counters
Command mode: All except User EXEC
UDP statistics: udpInDatagrams: 54 udpOutDatagrams: 43 udpInErrors: 0 udpNoPorts: 1578077
The following table describes the User Datagram Protocol (UDP) statistics:
Table 61 UDP statistics
Statistics Description
udpInDatagrams
udpOutDatagrams
udpInErrors
udpNoPorts
The total number of UDP datagrams delivered to the switch.
The total number of UDP datagrams sent from this switch.
The number of received UDP datagrams that could not be delivered for reasons other than the lack of an application at the destination port.
The total number of received UDP datagrams for which there was no application at the destination port.

IGMP Multicast Group statistics

The following command displays statistics about the use of the IGMP Multicast Groups:
show ip igmp counters
Command mode: All except User EXEC
IGMP Snoop vlan 1 statistics:
------------------------------------------------------------
rxIgmpValidPkts: 0 rxIgmpInvalidPkts: 0
rxIgmpGenQueries: 0 rxIgmpGrpSpecificQueries: 0
rxIgmpGroupSrcSpecificQueries: 0
rxIgmpLeaves: 0 rxIgmpReports: 0
txIgmpReports: 0 txIgmpGrpSpecificQueries: 0
txIgmpLeaves: 0 rxIgmpV3CurrentStateRecords: 0
rxIgmpV3SourceListChangeRecords: 0 rxIgmpV3FilterChangeRecords: 0
These commands enable you to display statistics regarding the use of the IGMP Multicast Groups.
The following table describes the IGMP statistics:
Table 62 IGMP statistics
Statistic Description
rxIgmpValidPkts
rxIgmpInvalidPkts
rxIgmpGenQueries
Total number of valid IGMP packets received
Total number of invalid packets received
Total number of General Membership Query packets received
86
Statistics Commands
Table 62 IGMP statistics
Statistic Description
rxIgmpGrpSpecificQueries
Total number of Group Source Specific Queries (GSSQ) received
rxIgmpLeaves
rxIgmpReports
txIgmpReports
txIgmpGrpSpecificQueries
txIgmpLeaves
rxIgmpV3CurrentStateRecords
rxIgmpV3SourceListChangeRecords
rxIgmpV3FilterChangeRecords
OSPF statistics
The following table describes OSPF statistics commands.
Total number of Membership Query packets received from specific groups
Total number of Leave requests received
Total number of Membership Reports received
Total number of Membership reports transmitted
Total number of Membership Query packets transmitted to specific groups
Total number of Leave messages transmitted
Total number of Current State records received
Total number of Source List Change records received
Total number of Filter Change records received.
Table 63 OSPF Statistics commands
Command Usage
show ip ospf counters general
show ip ospf counters aindex [<0-2>]
show ip ospf counters interface [<1-249>]
Displays OSPF global statistics. Command mode: All except User EXEC
Displays area index statistics. Command mode: All except User EXEC
Displays interface statistics. Command mode: All except User EXEC
87
Statistics Commands

OSPF global statistics

The following command displays OSPF global statistics:
show ip ospf counters general
Command mode: All except User EXEC
OSPF stats
---------­Rx/Tx Stats: Rx Tx
-------- -------­Pkts 0 0 hello 23 518 database 4 12 ls requests 3 1 ls acks 7 7 ls updates 9 7 Nbr change stats: Intf change Stats: hello 2 up 4 start 0 down 2 n2way 2 loop 0 adjoint ok 2 unloop 0 negotiation done 2 wait timer 2 exchange done 2 backup 0 bad requests 0 nbr change 5 bad sequence 0 loading done 2 n1way 0 rst_ad 0 down 1 Timers kickoff hello 514 retransmit 1028 lsa lock 0 lsa ack 0 dbage 0 summary 0 ase export 0
The following table describes the OSPF global statistics:
Table 64 OSPF global statistics
Statistic Description
Rx Tx stats:
Rx Pkts
Tx Pkts
Rx Hello
Tx Hello
Rx Database
The sum total of all OSPF packets received on all OSPF areas and interfaces.
The sum total of all OSPF packets transmitted on all OSPF areas and interfaces.
The sum total of all Hello packets received on all OSPF areas and interfaces.
The sum total of all Hello packets transmitted on all OSPF areas and interfaces.
The sum total of all Database Description packets received on all OSPF areas and interfaces.
88
Statistics Commands
Table 64 OSPF global statistics
Statistic Description
Tx Database
Rx ls Requests
Tx ls Requests
Rx ls Acks
Tx ls Acks
Rx ls Updates
Tx ls Updates
Nbr change stats:
hello
Start
n2way
The sum total of all Database Description packets transmitted on all OSPF areas and interfaces.
The sum total of all Link State Request packets received on all OSPF areas and interfaces.
The sum total of all Link State Request packets transmitted on all OSPF areas and interfaces.
The sum total of all Link State Acknowledgement packets received on all OSPF areas and interfaces.
The sum total of all Link State Acknowledgement packets transmitted on all OSPF areas and interfaces.
The sum total of all Link State Update packets received on all OSPF areas and interfaces.
The sum total of all Link State Update packets transmitted on all OSPF areas and interfaces.
The sum total of all Hello packets received from neighbors on all OSPF areas and interfaces.
The sum total number of neighbors in this state (that is, an indication that Hello packets should now be sent to the neighbor at intervals of HelloInterval seconds) across all OSPF areas and interfaces.
The sum total number of bidirectional communication establishment between this router and other neighboring routers.
adjoint ok
negotiation done
exchange done
bad requests
bad sequence
loading done
The sum total number of decisions to be made (again) as to whether an adjacency should be established/maintained with the neighbor across all OSPF areas and interfaces.
The sum total number of neighbors in this state wherein the Master/slave relationship has been negotiated, and sequence numbers have been exchanged, across all OSPF areas and interfaces.
The sum total number of neighbors in this state (that is, in an adjacency's final state) having transmitted a full sequence of Database Description packets, across all OSPF areas and interfaces.
The sum total number of Link State Requests which have been received for a link state advertisement not contained in the database across all interfaces and OSPF areas.
The sum total number of Database Description packets which have been received that either:
Has an unexpected DD sequence number
Unexpectedly has the init bit set
Has an options field differing from the last Options field received in a Database
Description packet.
Any of these conditions indicate that some error has occurred during adjacency establishment for all OSPF areas and interfaces.
The sum total number of link state updates received for all out-of-date portions of the database across all OSPF areas and interfaces.
89
Statistics Commands
Table 64 OSPF global statistics
Statistic Description
n1way
rst_ad
down
Intf Change Stats:
up
down
loop
unloop
wait timer
backup
nbr change
The sum total number of Hello packets received from neighbors, in which this router is not mentioned across all OSPF interfaces and areas.
The sum total number of times the Neighbor adjacency has been reset across all OPSF areas and interfaces.
The total number of Neighboring routers down (that is, in the initial state of a neighbor conversation) across all OSPF areas and interfaces.
The sum total number of interfaces up in all OSPF areas.
The sum total number of interfaces down in all OSPF areas.
The sum total of interfaces no longer connected to the attached network across all OSPF areas and interfaces.
The sum total number of interfaces, connected to the attached network in all OSPF areas.
The sum total number of times the Wait Timer has been fired, indicating the end of the waiting period that is required before electing a (Backup) Designated Router across all OSPF areas and interfaces.
The sum total number of Backup Designated Routers on the attached network for all OSPF areas and interfaces.
The sum total number of changes in the set of bidirectional neighbors associated with any interface across all OSPF areas.
Timers Kickoff:
hello
retransmit
lsa lock
lsa ack
dbage
summary
ase export
The sum total number of times the Hello timer has been fired (which triggers the send of a Hello packet) across all OPSF areas and interfaces.
The sum total number of times the Retransmit timer has been fired across all OPSF areas and interfaces.
The sum total number of times the Link State Advertisement (LSA) lock timer has been fired across all OSPF areas and interfaces.
The sum total number of times the LSA Ack timer has been fired across all OSPF areas and interfaces.
The total number of times the data base age (Dbage) has been fired.
The total number of times the Summary timer has been fired.
The total number of times the Autonomous System Export (ASE) timer has been fired.
90
Statistics Commands
VRRP statistics
Virtual Router Redundancy Protocol (VRRP) support on the HP 10GbE switch provides redundancy between routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID number on each participating VRRP-capable routing device.
One of the virtual routers is then elected as the master, based on a number of priority criteria, and assumes control of the shared virtual router IP address. If the master fails, one of the backup virtual routers will assume routing authority and take control of the virtual router IP address.
When virtual routers are configured, you can display protocol statistics for VRRP:
The following command displays statistics for the VRRP LAN:
show ip vrrp counters
Command mode: All except User EXEC
>> Layer 3 Statistics# vrrp VRRP statistics: vrrpInAdvers: 0 vrrpBadAdvers: 0 vrrpOutAdvers: 0 vrrpBadVersion: 0 vrrpBadVrid: 0 vrrpBadAddress: 0 vrrpBadData: 0 vrrpBadPassword: 0 vrrpBadInterval: 0
The following table describes the VRRP statistics.
Table 65 VRRP statistics
Field Description
vrrpInAdvers
vrrpOutAdvers
vrrpBadVersion
vrrpBadAddress
vrrpBadPassword
vrrpBadAdvers
vrrpBadVrid
vrrpBadData
vrrpBadInterval
The total number of VRRP advertisements that have been received.
The total number of VRRP advertisements that have been sent.
The total number of VRRP advertisements that had a bad version number.
The total number of VRRP advertisements that had a bad address.
The total number of VRRP advertisements that had a bad password.
The total number of VRRP advertisements received that were dropped.
The total number of VRRP advertisements that had a bad virtual router ID.
The total number of VRRP advertisements that had bad data.
The total number of VRRP advertisements that had a bad interval.
91
Statistics Commands

RIP statistics

The following command displays RIP statistics:
show ip rip counters
Command mode: All except User EXEC
RIP ALL STATS INFORMATION: RIP packets received = 12 RIP packets sent = 75 RIP request received = 0 RIP response received = 12 RIP request sent = 3 RIP response sent = 72 RIP route timeout = 0 RIP bad size packet received = 0 RIP bad version received = 0 RIP bad zeros received = 0 RIP bad src port received = 0 RIP bad src IP received = 0 RIP packets from self received = 0

GEA Layer 3 statistics

The following table describes the Layer 3 GEA statistics commands.
Table 66 Layer 3 GEA statistics commands
Command Usage
show ip gea bucket <IP address>
show ip gea

GEA Layer 3 statistics

The following command displays GEA statistics:
show ip gea
Command mode: All except User EXEC
GEA L3 statistics: Max L3 table size : 4096 Number of L3 entries used : 3
Max LPM table size : 512 Number of LPM entries used : 4
Displays GEA statistics for a specific IP address. Command mode: All except User EXEC
Displays all GEA statistics. Command mode: All except User EXEC
92
Statistics Commands
Management Processor statistics
The following table describes the MP-specific Statistics commands. The following sections provide more detailed information and commands.
Table 67 MP-specific Statistics commands
Command Usage
show mp packet
show mp tcp-block
show mp udp-block
show mp cpu

Packet statistics

The following command displays packet statistics:
show mp packet
Command mode: All except User EXEC
Packet counts: allocs: 36692 frees: 36692 mediums: 0 mediums hi-watermark: 3 jumbos: 0 jumbos hi-watermark: 0 smalls: 0 smalls hi-watermark: 2 failures: 0
Displays packet statistics, to check for leads and load. Command mode: All
Displays all Transmission Control Protocol (TCP) control blocks (TCB) that are in use. Command mode: All
Displays all User Datagram Protocol (UDP) control blocks (UCB) that are in use. Command mode: All
Displays CPU utilization for periods of up to 1, 4, and 64 seconds. Command mode: All
The following table describes the packet statistics.
Table 68 MP specific packet statistics
Field Description
allocs
frees
mediums
mediums hi-watermark
jumbos
jumbos hi-watermark
Total number of packet allocations from the packet buffer pool by the TCP/IP protocol stack.
Total number of times the packet buffers are freed (released) to the packet buffer pool by the TCP/IP protocol stack.
Total number of packet allocations with size between 128 to 1536 bytes from the packet buffer pool by the TCP/IP protocol stack.
The highest number of packet allocation with size between 128 to 1536 bytes from the packet buffer pool by the TCP/IP protocol stack.
Total number of packet allocations with more than 1536 bytes from the packet buffer pool by the TCP/IP protocol stack.
The highest number of packet allocation with more than 1536 bytes from the packet buffer pool by the TCP/IP protocol stack.
93
Statistics Commands
Table 68 MP specific packet statistics
Field Description
smalls
smalls hi-watermark
failures

TCP statistics

The following command displays TCP statistics:
show mp tcp-block
Command mode: All except User EXEC
All TCP allocated control blocks: 10ad41e8: 0.0.0.0 0 <=> 0.0.0.0 80 listen 10ad5790: 47.81.27.5 1171 <=> 47.80.23.243 23 established
The following table describes the Transmission Control Protocol (TCP) control block (TCB) statistics shown in this example:
Table 69 TCP statistics
Total number of packet allocations with size less than 128 bytes from the packet buffer pool by the TCP/IP protocol stack.
The highest number of packet allocation with size less than 128 bytes from the packet buffer pool by the TCP/IP protocol stack.
Total number of packet allocation failures from the packet buffer pool by the TCP/IP protocol stack.
Description Example statistic
Memory
Destination IP address
Destination port
Source IP
Source port
State
10ad41e8/10ad5790
0.0.0.0/47.81.27.5
0/1171
0.0.0.0/47.80.23.243
80/23
listen/established
94
Statistics Commands

UDP statistics

The following command displays UDP statistics:
show mp udp-block
Command mode: All except User EXEC
All UDP allocated control blocks: 161: listen
The following table describes the User Datagram Protocol (UDP) control block (UCB) statistics shown in this example:
Table 70 UDP statistics
Description Example Statistic
Control block
State

CPU statistics

The following command displays the CPU utilization statistics:
show mp cpu
Command mode: All except User EXEC
CPU utilization: cpuUtil1Second: 8% cpuUtil4Seconds: 9% cpuUtil64Seconds: 8%
The following table describes the management port CPU utilization statistics:
Table 71 CPU statistics
Statistics Description
cpuUtil1Second
cpuUtil4Seconds
161
listen
The utilization of MP CPU over 1 second. This is shown as a percentage.
The utilization of MP CPU over 4 seconds. This is shown as a percentage.
cpuUtil64Seconds

ACL statistics

The following command displays the statistics for Access Control Lists (ACLs):
show access-control counters
Command mode: All except User EXEC
Hits for ACL 1: 26057515 Hits for ACL 2: 26057497
The utilization of MP CPU over 64 seconds. This is shown as a percentage.
95
Statistics Commands

SNMP statistics

The following command displays SNMP statistics:
show snmp-server counters
Command mode: All except User EXEC
SNMP statistics: snmpInPkts: 54 snmpInBadVersions: 0 snmpInBadC'tyNames: 0 snmpInBadC'tyUses: 0 snmpInASNParseErrs: 0 snmpEnableAuthTraps: 0 snmpOutPkts: 54 snmpInBadTypes: 0 snmpInTooBigs: 0 snmpInNoSuchNames: 0 snmpInBadValues: 0 snmpInReadOnlys: 0 snmpInGenErrs: 0 snmpInTotalReqVars: 105 snmpInTotalSetVars: 0 snmpInGetRequests: 2 snmpInGetNexts: 52 snmpInSetRequests: 0 snmpInGetResponses: 0 snmpInTraps: 0 snmpOutTooBigs: 0 snmpOutNoSuchNames: 2 snmpOutBadValues: 0 snmpOutReadOnlys: 0 snmpOutGenErrs: 0 snmpOutGetRequests: 0 snmpOutGetNexts: 0 snmpOutSetRequests: 0 snmpOutGetResponses: 54 snmpOutTraps: 0 snmpSilentDrops: 0 snmpProxyDrops: 0
The following table describes the Simple Network Management Protocol (SNMP) statistics:
Table 72 SNMP statistics
Statistics Description
snmpInPkts
snmpInBadVersions
snmpInBadC'tyNames
snmpInBadC'tyUses
snmpInASNParseErrs
The total number of messages delivered to the SNMP entity from the transport service.
The total number of SNMP messages, which were delivered to the SNMP protocol entity and were for an unsupported SNMP version.
The total number of SNMP messages delivered to the SNMP entity that used an SNMP community name not known to the switch.
The total number of SNMP messages delivered to the SNMP protocol entity that represented an SNMP operation which was not allowed by the SNMP community named in the message.
The total number of ASN.1 (Abstract Syntax Notation One) or BER (Basic Encoding Rules), errors encountered by the SNMP protocol entity when decoding SNMP messages received.
The Open Systems Interconnection (OSI) method of specifying abstract objects is called ASN.1 (Abstract Syntax Notation One, defined in X.208), and one set of rules for representing such objects as strings of ones and zeros is called the BER (Basic Encoding Rules, defined in X.209).
ASN.1 is a flexible notation that allows one to define a variety of data types, from simple types such as integers and bit strings to structured types such as sets and sequences.
BER describes how to represent or encode values of each ASN.1 type as a string of eight-bit octets.
snmpEnableAuthTraps
An object to enable or disable the authentication traps generated by this switch.
96
Statistics Commands
Table 72 SNMP statistics
Statistics Description
snmpOutPkts
snmpInBadTypes
snmpInTooBigs
snmpInNoSuchNames
snmpInBadValues
snmpInReadOnlys
snmpInGenErrs
snmpInTotalReqVars
snmpInTotalSetVars
The total number of SNMP messages which were passed from the SNMP protocol entity to the transport service.
The total number of SNMP messages which failed ASN.1 parsing.
The total number of SNMP Protocol Data Units (PDUs) that were delivered to the SNMP protocol entity and for which the value of the error-status field is too big.
The total number of SNMP Protocol Data Units (PDUs) that were delivered to the SNMP protocol entity and for which the value of the error-status field is noSuchName.
The total number of SNMP Protocol Data Units (PDUs) that were delivered to the SNMP protocol entity and for which the value of the error-status field is badValue.
The total number of valid SNMP Protocol Data Units (PDUs), which were delivered to the SNMP protocol entity and for which the value of the error-status field is read-only.
It should be noted that it is a protocol error to generate an SNMP PDU, which contains the value read-only in the error-status field. As such, this object is provided as a means of detecting incorrect implementations of the SNMP.
The total number of SNMP Protocol Data Units (PDUs), which were delivered to the SNMP protocol entity and for which the value of the error-status field is genErr.
The total number of MIB objects which have been retrieved successfully by the SNMP protocol entity as a result of receiving valid SNMP Get-Request and Get-Next Protocol Data Units (PDUs).
The total number of MIB objects, which have been altered successfully by the SNMP protocol entity as a result of receiving valid SNMP Set-Request Protocol Data Units (PDUs).
snmpInGetRequests
snmpInGetNexts
snmpInSetRequests
snmpInGetResponses
snmpInTraps
snmpOutTooBigs
snmpOutNoSuchNames
snmpOutBadValues
snmpOutReadOnlys
snmpOutGenErrs
The total number of SNMP Get-Request Protocol Data Units (PDUs), which have been accepted and processed by the SNMP protocol entity.
The total number of SNMP Get-Next Protocol Data Units (PDUs), which have been accepted and processed by the SNMP protocol entity.
The total number of SNMP Set-Request Protocol Data Units (PDUs), which have been accepted and processed by the SNMP protocol entity.
The total number of SNMP Get-Response Protocol Data Units (PDUs), which have been accepted and processed by the SNMP protocol entity.
The total number of SNMP Trap Protocol Data Units (PDUs), which have been accepted and processed by the SNMP protocol entity.
The total number of SNMP Protocol Data Units (PDUs), which were generated by the SNMP protocol entity and for which the value of the error-status field is too big.
The total number of SNMP Protocol Data Units (PDUs), which were generated by the SNMP protocol entity and for which the value of the error-status is noSuchName.
The total number of SNMP Protocol Data Units (PDUs), which were generated by the SNMP protocol entity and for which the value of the error-status field is badValue.
Not in use.
The total number of SNMP Protocol Data Units (PDUs), which were generated by the SNMP protocol entity and for which the value of the error-status field is genErr.
97
Statistics Commands
Table 72 SNMP statistics
Statistics Description
snmpOutGetRequests
snmpOutGetNexts
snmpOutSetRequests
snmpOutGetResponses
snmpOutTraps
snmpSilentDrops
snmpProxyDrops
The total number of SNMP Get-Request Protocol Data Units (PDUs), which have been generated by the SNMP protocol entity.
The total number of SNMP Get-Next Protocol Data Units (PDUs), which have been generated by the SNMP protocol entity.
The total number of SNMP Set-Request Protocol Data Units (PDUs), which have been generated by the SNMP protocol entity.
The total number of SNMP Get-Response Protocol Data Units (PDUs), which have been generated by the SNMP protocol entity.
The total number of SNMP Trap Protocol Data Units (PDUs), which have been generated by the SNMP protocol entity.
The total number of GetRequest-PDUs, GetNextRequest-PDUs, GetBulkRequest-PDUs, SetRequest-PDUs, and InformRequest-PDUs delivered to the SNMP entity that were silently dropped because the size of a reply containing an alternate Response-PDU with an empty variable-bindings field was too large.
The total number of GetRequest-PDUs, GetNextRequest-PDUs, GetBulkRequest-PDUs, SetRequest-PDUs, and InformRequest-PDUs delivered to the SNMP entity that were silently dropped because the transmission of the message to a proxy target failed in a manner (other than a time-out) such that no Response-PDU could be returned.

NTP statistics

The following command displays NTP statistics:
show ntp counters
Command mode: All
NTP statistics: Primary Server: Requests Sent: 17 Responses Received: 17 Updates: 1 Secondary Server: Requests Sent: 0 Responses Received: 0 Updates: 0 Last update based on response from primary server. Last update time: 18:04:16 Tue Mar 13, 2006 Current system time: 18:55:49 Tue Mar 13, 2006
The switch uses NTP (Network Timing Protocol) version 3 to synchronize the switch’s internal clock with an atomic time-calibrated NTP server. With NTP enabled, the switch can accurately update its internal clock to be consistent with other devices on the network and generates accurate syslogs.
The following table describes the NTP statistics:
98
Statistics Commands
Table 73 NTP statistics
Statistics Description
Primary Server
Requests Sent—The total number of NTP requests the switch sent to
the primary NTP server to synchronize time.
Responses Received—The total number of NTP responses received
from the primary NTP server.
Updates—The total number of times the switch updated its time based
on the NTP responses received from the primary NTP server.
Secondary Server
Requests Sent—The total number of NTP requests the switch sent to
the secondary NTP server to synchronize time.
Responses Received—The total number of NTP responses received
from the secondary NTP server.
Updates—The total number of times the switch updated its time based
on the NTP responses received from the secondary NTP server.
Last update based on response from primary server
Last update time
Last update of time on the switch based on either primary or secondary NTP response received.
The time stamp showing the time when the switch was last updated.
Current system time
The switch system time when the command show ntp counters was issued.

Uplink Failure Detection statistics

The following command allows you to display Uplink Failure Detection (UFD) statistics.
show ufd counters
Command mode: All
Uplink Failure Detection statistics: Number of times LtM link failure: 1 Number of times LtM link in Blocking State: 0 Number of times LtD got auto disabled: 1
The following table describes the Uplink Failure Detection (UFD) statistics:
Table 74 Uplink Failure Detection statistics
Statistic Description
Number of times LtM link failure
Number of times LtM link in Blocking State
The total numbers of times that link failures were detected on the uplink ports in the Link to Monitor group.
The total number of times that Spanning Tree Blocking state was detected on the uplink ports in the Link to Monitor group.
Number of times LtD got auto disabled
The total numbers of times that downlink ports in the Link to Disable group were automatically disabled because of a failure in the Link to Monitor group.
99
Statistics Commands

Statistics dump

The following command dumps switch statistics:
show counters
Use the dump command to dump all switch statistics available (40K or more, depending on your configuration). This data can be used to tune or debug switch performance.
If you want to capture dump data to a file, set your communication software on your workstation to capture session data prior to issuing the dump commands.
100
Loading...