This document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part
of this document may be reproduced in any form by any means without prior written authorization of Blade Network Technologies, Inc.
Documentation is provided “as is” without warranty of any kind, either express or implied, including any kind of implied or express
warranty of non-infringement or the implied warranties of merchantability or fitness for a particular purpose.
U.S. Government End Users: This document is provided with a “commercial item” as defined by FAR 2.101 (Oct. 1995) and contains
“commercial technical data” and “commercial software documentation” as those terms are used in FAR 12.211-12.212 (Oct. 1995).
Government End Users are authorized to use this documentation only in accordance with those rights and restrictions set forth herein,
consistent with FAR 12.211- 12.212 (Oct. 1995), DFARS 227.7202 (JUN 1995) and DFARS 252.227-7015 (Nov. 1995).
Blade Network Technologies, Inc. reserves the right to change any products described herein at any time, and without notice. Blade
Network Technologies, Inc. assumes no responsibility or liability arising from the use of products described herein, except as expressly
agreed to in writing by Blade Network Technologies, Inc. The use and purchase of this product does not convey a license under any patent
rights, trademark rights, or any other intellectual property rights of Blade Network Technologies, Inc.
Microsoft®, Windows®, and Windows NT® are U.S. registered trademarks of Microsoft Corporation.
SunOS™ and Solaris™ are trademarks of Sun Microsystems, Inc. in the U.S. and other countries.
Cisco® is a registered trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
Part number: BMD00022
January 2008
Contents
Command line interface.......................................................................................................................... 8
Menu basics ........................................................................................................................................ 14
Main Menu ........................................................................................................................................... 14
Menu summary...................................................................................................................................... 14
Global commands.................................................................................................................................. 15
Command line history and editing............................................................................................................ 17
Command line interface shortcuts............................................................................................................. 18
System information............................................................................................................................ 33
Show last 100 syslog messages.......................................................................................................... 34
System user information ..................................................................................................................... 35
Layer 2 information ................................................................................................................................ 36
FDB information menu ....................................................................................................................... 37
Link Aggregation Control Protocol information ...................................................................................... 38
Hot Links Trigger information .............................................................................................................. 39
Spanning Tree information ................................................................................................................. 42
Rapid Spanning Tree / Multiple Spanning Tree information.................................................................... 44
Common Internal Spanning Tree information ........................................................................................ 46
Trunk group information..................................................................................................................... 48
Contents 3
VLAN information ............................................................................................................................. 48
Fast Uplink Convergence status........................................................................................................... 49
Layer 3 information ................................................................................................................................ 50
Routing Information Protocol information .............................................................................................. 58
IP information ................................................................................................................................... 59
IGMP multicast group information ....................................................................................................... 60
VRRP information .............................................................................................................................. 62
Server Mobility Port information .......................................................................................................... 63
QoS information .................................................................................................................................... 64
RMON Information Menu ....................................................................................................................... 66
RMON history information ................................................................................................................. 66
RMON alarm information .................................................................................................................. 67
RMON event information ................................................................................................................... 68
Link status information ............................................................................................................................ 69
Port information ..................................................................................................................................... 70
Menu information .................................................................................................................................. 72
Port Statistics Menu ................................................................................................................................ 73
Internet Protocol (IP) statistics .............................................................................................................. 81
Link statistics..................................................................................................................................... 81
Port RMON statistics.......................................................................................................................... 82
GEA Layer 3 statistics menu ............................................................................................................... 87
IP statistics........................................................................................................................................ 88
System Access configuration............................................................................................................. 127
Port configuration................................................................................................................................. 131
Temporarily disabling a port ............................................................................................................ 132
Port link configuration...................................................................................................................... 132
Port ACL/QoS configuration............................................................................................................. 133
Port PVRST configuration .................................................................................................................. 134
Port mirroring ...................................................................................................................................... 202
Port-based port mirroring ................................................................................................................. 203
Menu information ................................................................................................................................ 211
Updating the switch software image....................................................................................................... 211
Downloading new software to the switch ........................................................................................... 211
Selecting a software image to run .......................................................................................................... 213
Uploading a software image from the switch ........................................................................................... 213
Selecting a configuration block .............................................................................................................. 214
Resetting the switch .............................................................................................................................. 214
Accessing the ISCLI .............................................................................................................................. 215
Maintenance Menu ............................................................................................................................216
Unscheduled system dumps ................................................................................................................... 223
Index ................................................................................................................................................ 224
Contents 7
Command line interface
Introduction
The HP 10Gb Ethernet BL-c Switch is ready to perform basic switching functions right out of the box.
Some of the more advanced features, however, require some administrative configuration before they
can be used effectively. This guide provides a command reference for the HP 10Gb Ethernet BL-c
Switch.
The extensive switching software included in the switch provides a variety of options for accessing
and configuring the switch:
• Built-in, text-based command line interfaces (AOS CLI and ISCLI) for access via a local terminal
or remote Telnet/Secure Shell (SSH) session
• Simple Network Management Protocol (SNMP) support for access through network management
software such as HP Systems Insight Manager
• A browser-based management interface for interactive network access through the Web browser
The command line interface provides a direct method for collecting switch information and performing
switch configuration. Using a basic terminal, you can view information and statistics about the switch,
and perform any necessary configuration.
This chapter explains how to access the AOS CLI to the switch.
Additional references
Additional information about installing and configuring the switch is available in the following guides:
• HP 10Gb Ethernet BL-c Switch User Guide
• HP 10Gb Ethernet BL-c Switch BladeSystem ISCLI Reference
• HP 10Gb Ethernet BL-c Switch Application Guide
• HP 10Gb Ethernet BL-c Switch Browser-based Interface Reference
• HP 10Gb Ethernet BL-c Switch Quick Setup Instructions
Connecting to the switch
You can access the command line interface in one of the following ways:
• Using a console connection via the console port
• Using a Telnet connection over the network
• Using a Secure Shell (SSH) connection to securely log in over a network
Command line interface 8
Establishing a console connection
To establish a console connection with the switch, you need:
•A null modem cable with a female DB-9 connector (See the HP 10Gb Ethernet BL-c Switch User
Guide for more information.)
• An ASCII terminal or a computer running terminal emulation software set to the parameters
shown in the table below
Table 1
Parameter Value
Baud Rate 9600
Data Bits 8
Parity None
Stop Bits 1
Flow Control None
To establish a console connection with the switch:
1. Connect the terminal to the console port using the null modem cable.
2. Power on the terminal.
3. Press the Enter key a few times on the terminal to establish the connection.
4. You will be required to enter a password for access to the switch. (For more information, see the
Console configuration parameters
“Setting passwords” section in the “First-time configuration” chapter.)
Setting an IP address
To access the switch via a Telnet or an SSH connection, you need to have an Internet Protocol (IP)
address set for the switch. The switch can get its IP address in one of the following ways:
• Management port access:
○ Using a Dynamic Host Control Protocol (DHCP) server—When the /cfg/sys/dhcp
command is enabled, the management interface (interface 250) requests its IP address from
a DHCP server. The default value for the /cfg/sys/dhcp command is enabled.
○ Configuring manually—If the network does not support DHCP, you must configure the
management interface (interface 250) with an IP address. If you want to access the switch
from a remote network, you also must configure the management gateway (gateway 254).
• Uplink port access:
○ Using a Bootstrap Protocol (BOOTP) server—By default, the management interface is set up
to request its IP address from a BOOTP server. If you have a BOOTP server on the network,
add the Media Access Control (MAC) address of the switch to the BOOTP configuration file
located on the BOOTP server. The MAC address can be found in the System Information
menu. (See the “System information” section in the “Information Menu” chapter.) If you are
using a DHCP server that also does BOOTP, you do not have to configure the MAC address.
○ Configuring manually—If the network does not support BOOTP, you must configure the
management port with an IP address.
Command line interface 9
Establishing a Telnet connection
A Telnet connection offers the convenience of accessing the switch from any workstation connected to
the network. Telnet provides the same options for user, operator, and administrator access as those
available through the console port. By default, Telnet is enabled on the switch. The switch supports
four concurrent Telnet connections.
Once the IP parameters are configured, you can access the CLI using a Telnet connection. To
establish a Telnet connection with the switch, run the Telnet program on the workstation and enter the
telnet command, followed by the switch IP address:
telnet <10GbE switch IP address>
You will then be prompted to enter a password. The password entered determines the access level:
administrator, operator, or user. See the “Accessing the switch” section later in this chapter for
description of default passwords.
Establishing an SSH connection
Although a remote network administrator can manage the configuration of a switch via Telnet, this
method does not provide a secure connection. The Secure Shell (SSH) protocol enables you to
securely log into the switch over the network.
As a secure alternative to using Telnet to manage switch configuration, SSH ensures that all data sent
over the network is encrypted and secure. In order to use SSH, you must first configure it on the
switch. See the “Secure Shell Server configuration” section in the “Configuration Menu” chapter for
information on how to configure SSH.
The switch can perform only one session of key/cipher generation at a time. Therefore, an
SSH/Secure Copy (SCP) client will not be able to log in if the switch is performing key generation at
that time or if another client has just logged in before this client. Similarly, the system will fail to
perform the key generation if an SSH/SCP client is logging in at that time.
The supported SSH encryption and authentication methods are listed below.
• Server Host Authentication—Client RSA authenticates the switch in the beginning of every
• User Authentication—Local password authentication; Remote Authentication Dial-in User Service
(RADIUS)
Command line interface 10
The following SSH clients are supported:
• SSH 3.0.1 for Linux (freeware)
• SecureCRT® 4.1.8 (VanDyke Technologies, Inc.)
• OpenSSH_3.9 for Linux (FC 3)
• FedoraCore 3 for SCP commands
• PuTTY Release 0.58 (Simon Tatham) for Windows
NOTE: The switch implementation of SSH is based on versions 1.5 and 2.0, and supports SSH
clients from version 1.0 through version 2.0. SSH clients of other versions are not supported. You
may configure the client software to use protocol SSH version 1 or version 2.
By default, SSH service is not enabled on the switch. Once the IP parameters are configured, you can
access the command line interface to enable SSH.
To establish an SSH connection with the switch, run the SSH program on the workstation by issuing
the ssh command, followed by the user account name and the switch IP address:
>> # ssh <user>@<10Gb switch IP address>
You will then be prompted to enter your password.
NOTE: The first time you run SSH from the workstation, a warning message might appear. At the
prompt, enter yes to continue.
Accessing the switch
To enable better switch management and user accountability, the switch provides different levels or
classes of user access. Levels of access to the CLI and Web management functions and screens
increase as needed to perform various switch management tasks. The three levels of access are:
• User—User interaction with the switch is completely passive; nothing can be changed on the
switch. Users may display information that has no security or privacy implications, such as switch
statistics and current operational state information.
• Operator—Operators can only effect temporary changes on the switch. These changes will be
lost when the switch is rebooted/reset. Operators have access to the switch management
features used for daily switch operations. Because any changes an operator makes are undone
by a reset of the switch, operators cannot severely impact switch operation, but do have access
to the Maintenance menu.
• Administrator—Only administrators can make permanent changes to the switch configuration,
changes that are persistent across a reboot/reset of the switch. Administrators can access switch
functions to configure and troubleshoot problems on the switch. Because administrators can also
make temporary (operator-level) changes as well, they must be aware of the interactions
between temporary and permanent changes.
Access to switch functions is controlled through the use of unique usernames and passwords. Once
you are connected to the switch via the local console, Telnet, or SSH, you are prompted to enter a
password. The password entered determines the access level. The default user names/password for
each access level is listed in the following table.
NOTE: It is recommended that you change default switch passwords after initial configuration and
as regularly as required under your network security policies. For more information, see the “Setting
passwords” section in the “First-time configuration” chapter.
Command line interface 11
Table 2 User access levels
User account Description and tasks performed
User The user has no direct responsibility for switch management. He or she can view all switch
status information and statistics, but cannot make any configuration changes to the switch.
The user account is enabled by default, and the default password is user.
Oper The operator manages all functions of the switch. The operator can reset ports or the entire
switch. By default, the operator account is disabled and has no password.
Admin The super user administrator has complete access to all menus, information, and
configuration commands on the switch, including the ability to change both the user and
administrator passwords. The admin account is enabled by default, and the default
password is admin.
NOTE: With the exception of the admin user, setting the password to an empty value can disable
access to each user level.
Once you enter the administrator password and it is verified, you are given complete access to the
switch.
After logging in, the Main Menu of the CLI is displayed. See the “Menu basics” chapter for a
summary of the Main Menu options.
[Main Menu]
info - Information Menu
stats - Statistics Menu
cfg - Configuration Menu
oper - Operations Command Menu
boot - Boot Options Menu
maint - Maintenance Menu
diff - Show pending config changes [global command]
apply - Apply pending config changes [global command]
save - Save updated config to FLASH [global command]
revert - Revert pending or applied changes [global command]
exit - Exit [global command, always available]
>> Main#
Idle timeout
By default, the switch will disconnect the console, Telnet, or SSH session after five minutes of
inactivity. This function is controlled by the idle timeout parameter, which can be set from 1 to 60
minutes. For information on changing this parameter, see the “System configuration” section in the
“Configuration Menu” chapter.
Command line interface 12
Typographical conventions
The following table describes the typographic styles used in this guide:
Table 3
Typographical conventions
Typeface or
symbol
AaBbCc123
AaBbCc123
<AaBbCc123>
[ ]
Meaning Example
This type depicts onscreen computer output and prompts.
This type displays in command examples and shows text
that must be typed in exactly as shown.
This italicized type displays in command examples as a
parameter placeholder. Replace the indicated text with the
appropriate real name or value when using the command.
Do not type the brackets.
This also shows guide titles, special terms, or words to be
emphasized.
Command items shown inside brackets are optional and
can be used or excluded as the situation demands. Do not
type the brackets.
Main#
Main# sys
To establish a Telnet session,
enter:
host# telnet <IP
address>
Read the user guide
thoroughly.
host# ls [-a]
Command line interface 13
Menu basics
Introduction
The AOS CLI is used for viewing switch information and statistics. In addition, the administrator can
use the CLI for performing all levels of switch configuration.
To make the CLI easy to use, the various commands have been logically grouped into a series of
menus and submenus. Each menu displays a list of commands and/or submenus that are available,
along with a summary of what each command will do. Below each menu is a prompt where you can
enter any command appropriate to the current menu.
This chapter describes the Main Menu commands, and provides a list of commands and shortcuts that
commonly are available from all the menus within the CLI.
Main Menu
The Main Menu displays after a successful connection and login. The following table shows the Main
Menu for the administrator login. Some features are not available under the user login.
[Main Menu]
info - Information Menu
stats - Statistics Menu
cfg - Configuration Menu
oper - Operations Command Menu
boot - Boot Options Menu
maint - Maintenance Menu
diff - Show pending config changes [global command]
apply - Apply pending config changes [global command]
save - Save updated config to FLASH [global command]
revert - Revert pending or applied changes [global command]
exit - Exit [global command, always available]
Menu summary
The Main Menu displays the following submenus:
• Information Menu
The Information Menu provides submenus for displaying information about the current status of
the switch: from basic system settings to VLANs, and more.
• Statistics Menu
This menu provides submenus for displaying switch performance statistics. Included are port, IP,
ICMP, TCP, UDP, SNMP, routing, ARP, and DNS.
• Configuration Menu
This menu is available only from an administrator login. It includes submenus for configuring
every aspect of the switch. Changes to configuration are not active until explicitly applied.
Changes can be saved to non-volatile memory (NVRAM).
• Operations Command Menu
Menu basics 14
Operations-level commands are used for making immediate and temporary changes to switch
configuration. This menu is used for bringing ports temporarily in and out of service. This menu is
available only from an administrator and operator login.
• Boot Options Menu
The Boot Options Menu is available only from an administrator login. This menu is used for
upgrading switch software, selecting configuration blocks, and for resetting the switch when
necessary. This menu is also used to set the switch back to factory settings.
• Maintenance Menu
This menu is used for debugging purposes, enabling you to generate a technical support dump
of the critical state information in the switch, and to clear entries in the Forwarding Database
and the Address Resolution Protocol (ARP) and routing tables. This menu is available only from
an administrator and operator login.
Global commands
Some basic commands are recognized throughout the menu hierarchy. These commands are useful
for obtaining online Help, navigating through menus, and for applying and saving configuration
changes.
For help on a specific command, enter help. The following screen displays:
Global Commands: [can be issued from any menu]
help up print pwd
lines verbose exit quit
diff apply save revert
ping traceroute telnet history
pushd popd who
The following are used to navigate the menu structure:
. Print current menu
.. Move up one menu level
/ Top menu if first, or command separator
! Execute command from history
The following table describes the global commands.
Table 4
Global commands
Command Action
? command or
help
. or print Displays the current menu.
.. or up Moves up one level in the menu structure.
/
Provides usage information about a specific command on the current menu. When used
without the command parameter, a summary of the global commands is displayed.
If placed at the beginning of a command, displays the Main Menu. Otherwise, this is
used to separate multiple commands placed on the same line.
lines
diff
apply
Sets the number of lines (n) that display on the screen at one time. The default is 24 lines.
When used without a value, the current setting is displayed.
Shows any pending configuration changes that have not been applied.
diff flash displays all pending configuration changes that have been applied but not
saved to flash memory (NVRAM), as well as those that have not been applied.
Applies pending configuration changes.
Menu basics 15
Table 4 Global commands
Command Action
save
Saves the active configuration to backup, and saves the current configuration as active.
save n saves the current configuration as active, without saving the active configuration
to backup.
revert
Exit or quit Exits from the command line interface and logs out.
ping
Removes changes that have been made, but not applied.
revert apply removes all changes that have not been saved.
Verifies station-to-station connectivity across the network. The format is:
By default, the -m or -mgt option for the management port is used. To use data ports,
specify the -d or –data option.
Displays the history of the last ten commands.
Remembers the current location in the directory of menu commands.
Returns to the last pushd location.
Displays users who are logged in.
Menu basics 16
Command line history and editing
Using the command line interface, you can retrieve and modify previously entered commands with
just a few keystrokes. The following options are available globally at the command line:
Table 5
Command line history and editing options
Option Description
history
!!
!n
<Ctrl-p> or Up arrow key Recalls the previous command from the history list. This can be used multiple
<Ctrl-n> or Down arrow
key
<Ctrl-a>
<Ctrl-e>
<Ctrl-b> or Left arrow key Moves the cursor back one position to the left.
<Ctrl-f> or Right arrow
key
<Backspace> or Delete key Erases one character to the left of the cursor position.
Displays a numbered list of the last ten previously entered commands.
Repeats the last entered command.
Repeats the nth command shown on the history list.
times to work backward through the last ten commands. The recalled command
can be entered as is, or edited using the options below.
Recalls the next command from the history list. This can be used multiple times to
work forward through the last ten commands. The recalled command can be
entered as is, or edited using the options below.
Moves the cursor to the beginning of the command line.
Moves cursor to the end of the command line.
Moves the cursor forward one position to the right.
<Ctrl-d>
<Ctrl-k>
<Ctrl-l>
<Ctrl-u>
Other keys Inserts new characters at the cursor position.
.
..
Deletes one character at the cursor position.
Erases all characters from the cursor position to the end of the command line.
Redisplays the current line.
Clears the entire line.
Prints the current level menu list.
Moves to the previous directory level.
Menu basics 17
Command line interface shortcuts
The following shortcuts allow you to enter commands quickly and easily.
Command stacking
As a shortcut, you can type multiple commands on a single line, separated by forward slashes (/).
You can connect as many commands as required to access the menu option that you want.
For example, the keyboard shortcut to access the Simple Network Management Protocol (SNMP)
Configuration Menu from the Main# prompt is:
Main# cfg/sys/ssnmp/name
Command abbreviation
Most commands can be abbreviated by entering the first characters that distinguish the command
from the others in the same menu or submenu.
For example, the command shown above could also be entered as:
Main# c/sys/ssn/n
Tab completion
By entering the first letter of a command at any menu prompt and pressing the Tab key, the CLI will
display all commands or options in that menu that begin with that letter. Entering additional letters will
further refine the list of commands or options displayed.
If only one command fits the input text when the Tab key is pressed, that command will be supplied
on the command line, waiting to be entered. If the Tab key is pressed without any input on the
command line, the currently active menu displays.
Menu basics 18
First-time configuration
Introduction
This chapter describes how to perform first-time configuration and how to change system passwords.
To begin first-time configuration of the switch, perform the following steps.
1. Connect to the switch console. After connecting, the login prompt displays.
HP 10Gb Ethernet BL-c Switch
Copyright(C)2006 Hewlett-Packard Development Company, L.P.
Password:
2.Enter admin as the default administrator password.
The system displays the Main Menu with administrator privileges.
[Main Menu]
info - Information Menu
stats - Statistics Menu
cfg - Configuration Menu
oper - Operations Command Menu
boot - Boot Options Menu
maint - Maintenance Menu
diff - Show pending config changes [global command]
apply - Apply pending config changes [global command]
save - Save updated config to FLASH [global command]
revert - Revert pending or applied changes [global command]
exit - Exit [global command, always available]
>> Main#
3. From the Main Menu, enter the following command to access the Configuration Menu:
Main# /cfg
The Configuration Menu is displayed.
[Configuration Menu]
sys - System-wide Parameter Menu
port - Port Menu
l2 - Layer 2 Menu
l3 - Layer 3 Menu
qos - QOS Menu
acl - Access Control List Menu
rmon - RMON Menu
pmirr - Port Mirroring Menu
ufd - Uplink Failure Detection Menu
dump - Dump current configuration to script file
ptcfg - Backup current configuration to FTP/TFTP server
gtcfg - Restore current configuration from FTP/TFTP server
cur - Display current configuration
First-time configuration 19
Configuring Simple Network Management Protocol support
2. Set SNMP read or write community string. By default, they are public and private respectively:
>> # /cfg/sys/ssnmp/rcomm|wcomm
3. When prompted, enter the proper community string.
4. Apply and save configuration if you are not configuring the switch with Telnet support.
Otherwise apply and save after the performing the “Optional Setup for Telnet Support” steps.
>> System# apply
>> System# save
Setting passwords
HP recommends that you change all passwords after initial configuration and as regularly as required
under the network security policies. See the “Accessing the switch” section in the “Command line
interface” chapter for a description of the user access levels.
To change the user, operator, or administrator password, you must log in using the administrator
password. Passwords cannot be modified from the user or operator command mode.
NOTE: If you forget your administrator password, call HP technical support for help using the
password fix-up mode.
Changing the default administrator password
The administrator has complete access to all menus, information, and configuration commands,
including the ability to change the user, operator, and administrator passwords.
The default password for the administrator account is admin. To change the default password:
1. Connect to the switch and log in using the admin password.
2. From the Main Menu, use the following command to access the Configuration Menu:
Main# /cfg
The Configuration Menu is displayed.
[Configuration Menu]
sys - System-wide Parameter Menu
port - Port Menu
l2 - Layer 2 Menu
l3 - Layer 3 Menu
qos - QOS Menu
acl - Access Control List Menu
rmon - RMON Menu
pmirr - Port Mirroring Menu
ufd - Uplink Failure Detection Menu
dump - Dump current configuration to script file
ptcfg - Backup current configuration to FTP/TFTP server
gtcfg - Restore current configuration from FTP/TFTP server
cur - Display current configuration
First-time configuration 20
3.
From the Configuration Menu, use the following command to select the System Menu:
>> Configuration# sys
The System Menu is displayed.
[System Menu]
syslog - Syslog Menu
sshd - SSH Server Menu
radius - RADIUS Authentication Menu
tacacs+ - TACACS+ Authentication Menu
ntp - NTP Server Menu
ssnmp - System SNMP Menu
access - System Access Menu
date - Set system date
time - Set system time
timezone - Set system timezone (daylight savings)
olddst - Set system DST for US
dlight - Set system daylight savings
idle - Set timeout for idle CLI sessions
notice - Set login notice
bannr - Set login banner
hprompt - Enable/disable display hostname (sysName) in CLI prompt
bootp - Enable/disable use of BOOTP
dhcp - Enable/disable use of DHCP on Mgmt interface
reminders - Enable/disable Reminders
cur - Display current system-wide parameters
4. Enter the following command to set the administrator password:
System# access/user/admpw
5. Enter the current administrator password at the prompt:
NOTE: If you forget your administrator password, call your technical support representative for help
Enter current administrator password:
using the password fix-up mode.
6. Enter the new administrator password at the prompt:
Enter new administrator password:
7. Enter the new administrator password, again, at the prompt:
Re-enter new administrator password:
8. Apply and save the change by entering the following commands:
System# apply
System# save
First-time configuration 21
Changing the default user password
The user login has limited control of the switch. Through a user account, you can view switch
information and statistics, but you cannot make configuration changes.
The default password for the user account is user. This password cannot be changed from the user
account. Only the administrator has the ability to change passwords, as shown in the following
procedure.
1. Connect to the switch and log in using the admin password.
2. From the Main Menu, use the following command to access the Configuration Menu:
Main# cfg
3. From the Configuration Menu, use the following command to select the System Menu:
>> Configuration# sys
4. Enter the following command to set the user password:
System# access/user/usrpw
5. Enter the current administrator password at the prompt.
Only the administrator can change the user password. Entering the administrator password
confirms your authority.
Changing USER password; validation required...
Enter current administrator password:
6. Enter the new user password at the prompt:
Enter new user password:
7. Enter the new user password, again, at the prompt:
Re-enter new user password:
8. Apply and save the changes:
System# apply
System# save
Changing the default operator password
The operator manages all functions of the switch. The operator can reset ports or the entire switch.
Operators can only effect temporary changes on the switch. These changes will be lost when the
switch is rebooted/reset. Operators have access to the switch management features used for daily
switch operations. Because any changes an operator makes are undone by a reset of the switch,
operators cannot severely impact switch operation.
By default, the operator account is disabled and has no password. This password cannot be changed
from the operator account. Only the administrator has the ability to change passwords, as shown in
the following procedure.
1. Connect to the switch and log in using the admin password.
2. From the Main Menu, use the following command to access the Configuration Menu:
Main# cfg
3. From the Configuration Menu, use the following command to select the System Menu:
>> Configuration# sys
4. Enter the following command to set the operator password:
System# access/user/opw
5. Enter the current administrator password at the prompt.
First-time configuration 22
Only the administrator can change the user password. Entering the administrator password
confirms your authority.
Changing OPERATOR password; validation required...
Enter current administrator password:
6. Enter the new operator password at the prompt:
Enter new operator password:
7. Enter the new operator password, again, at the prompt:
Re-enter new operator password:
8. Apply and save the changes:
System# apply
System# save
First-time configuration 23
Information Menu
Introduction
You can view configuration information for the switch in the user, operator, and administrator
command modes. This chapter discusses how to use the CLI to display switch information.
Menu overview
Command: /info
[Information Menu]
sys - System Information Menu
l2 - Layer 2 Information Menu
l3 - Layer 3 Information Menu
qos - QoS Menu
acl - Show ACL information
rmon - Show RMON information
link - Show link status
port - Show port information
transcvr - Show Port Transceiver status
ufd - Show Uplink Failure Detection information
sfd - Show Server Link Failure Detection information
dump - Dump all information
The following table describes the Information Menu options.
Table 6
Command Usage
sys
l2
l3
qos
acl
rmon
link
Information Menu options
Displays system information.
Displays the Layer 2 Information Menu.
Displays the Layer 3 Information Menu.
Displays the Quality of Service (QoS) Information Menu.
Displays the Access Control List Information Menu.
Displays the Remote Monitoring Information Menu.
Displays configuration information about each port, including:
• Port number
• Port speed
• Duplex mode (half, full, or any)
• Flow control for transmit and receive (no, yes, or any)
• Link status (up or down)
Information Menu 24
Table 6 Information Menu options
Command Usage
port
Displays port status information, including:
• Port number
• Whether the port uses VLAN tagging or not
• Port VLAN ID (PVID)
• Port name
• VLAN membership
transcvr
ufd
sfd
dump
Displays the status of the Small Form Pluggable (SFP) module on each Fiber
External Port.
Displays Uplink Failure Detection information.
Displays Server Link Failure Detection information.
Dumps all switch information available from the Information Menu (10K or more,
depending on your configuration).
If you want to capture dump data to a file, set your communication software on
your workstation to capture session data prior to issuing the dump commands.
System Information Menu
Command: /info/sys
[System Menu]
snmpv3 - SNMPv3 Information Menu
general - Show general system information
log - Show last 100 syslog messages
user - Show current user status
dump - Dump all system information
The following table describes the System Information Menu options.
Table 7
System Information Menu options
Command Usage
snmpv3
general
Displays the SNMP v3 Menu.
Displays system information, including:
• System date and time
• Switch model name and number
• Switch name and location
• Time of last boot
• MAC address of the switch management processor
• IP address of IP interface #1
• Hardware version and part number
• Software image file and version number
• Configuration name
• Log-in banner, if one is configured
log
Displays 100 most recent syslog messages.
Information Menu 25
Table 7 System Information Menu options
Command Usage
user
Displays the User Access Information Menu.
dump
Dumps all switch information available from the Information Menu (10K or more,
depending on your configuration).
SNMPv3 Information Menu
Command: /info/sys/snmpv3
[SNMPv3 Information Menu]
usm - Show usmUser table information
view - Show vacmViewTreeFamily table information
access - Show vacmAccess table information
group - Show vacmSecurityToGroup table information
comm - Show community table information
taddr - Show targetAddr table information
tparam - Show targetParams table information
notify - Show notify table information
dump - Show all SNMPv3 information
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2
Framework by supporting the following:
• a new SNMP message format
• security for messages
• access control
• remote configuration of SNMP parameters
For more details on the SNMPv3 architecture, see RFC2271 to RFC2276.
The following table describes the SNMPv3 Information Menu options.
Table 8
SNMPv3 Information Menu options
Command Usage
usm
view
access
group
comm
taddr
tparam
notify
dump
Displays User Security Model (USM) table information.
Displays information about view name, subtrees, mask and type of view.
Displays View-based Access Control information.
Displays information about the group that includes the security model, user name, and
group name.
Displays information about the community table.
Displays the Target Address table.
Displays the Target parameters table.
Displays the Notify table.
Displays all the SNMPv3 information.
Information Menu 26
SNMPv3 USM User Table information
Command: /info/sys/snmpv3/usm
usmUser Table:
User Name Protocol
-------------------------------- -------------------------------adminmd5 HMAC_MD5, DES PRIVACY
adminsha HMAC_SHA, DES PRIVACY
v1v2only NO AUTH, NO PRIVACY
The User-based Security Model (USM) in SNMPv3 provides security services such as authentication
and privacy of messages. This security model makes use of a defined set of user identities displayed
in the USM user table. The USM user table contains information like:
• the user name
• a security name in the form of a string whose format is independent of the Security Model
• an authentication protocol, which is an indication that the messages sent on behalf of the user
can be authenticated
• the privacy protocol.
The following table describes the SNMPv3 User Table information.
Table 9
User Table parameters
Field Description
User Name
Protocol
This is a string that represents the name of the user that you can use to access the switch.
This indicates whether messages sent on behalf of this user are protected from disclosure
using a privacy protocol. Switch software supports DES algorithm for privacy. The
software also supports two authentication algorithms: MD5 and HMAC-SHA.
The user can control and restrict the access allowed to a group to only a subset of the management
information in the management domain that the group can access within each context by specifying
the group’s rights in terms of a particular MIB view for security reasons.
Information Menu 27
The following table describes the SNMPv3 View Table information.
Table 10
View Table parameters
Field Description
View Name
Subtree
Mask
Type
Displays the name of the view.
Displays the MIB subtree as an OID string. A view subtree is the set of all MIB object
instances which have a common Object Identifier prefix to their names.
Displays the bit mask.
Displays whether a family of view subtrees is included or excluded from the MIB view.
SNMPv3 Access Table information
Command: /info/sys/snmpv3/access
Group Name Model Level ReadV WriteV NotifyV
---------- ------- ------------ --------- -------- ------v1v2grp snmpv1 noAuthNoPriv iso iso v1v2only
admingrp usm authPriv iso iso iso
The access control sub system provides authorization services.
The vacmAccessTable maps a group name, security information, a context, and a message type,
which could be the read or write type of operation or notification into a MIB view.
The View-based Access Control Model defines a set of services that an application can use for
checking access rights of a group. This group’s access rights are determined by a read-view, a writeview, and a notify-view. The read-view represents the set of object instances authorized for the group
while reading the objects. The write-view represents the set of object instances authorized for the
group when writing objects. The notify-view represents the set of object instances authorized for the
group when sending a notification.
The following table describes the SNMPv3 Access Table information.
Table 11
Access Table parameters
Field Description
Group Name
Prefix
Model
Level
ReadV
WriteV
NotifyV
Displays the name of group.
Displays the prefix that is configured to match the values.
Displays the security model used, for example, SNMPv1, or SNMPv2 or USM.
Displays the minimum level of security required to gain rights of access. For
example, noAuthNoPriv, authNoPriv, or auth-Priv.
Displays the MIB view to which this entry authorizes the read access.
Displays the MIB view to which this entry authorizes the write access.
Displays the Notify view to which this entry authorizes the notify access.
A group is a combination of security model and security name that defines the access rights assigned
to all the security names belonging to that group. The group is identified by a group name.
The following table describes the SNMPv3 Group Table information.
Table 12
Group Table parameters
Field Description
Sec Model
User Name
Group Name
Displays the security model used, which is any one of: USM, SNMPv1, SNMPv2, and
SNMPv3.
Displays the name for the group.
Displays the access name of the group.
SNMPv3 Community Table information
Command: /info/sys/snmpv3/comm
Index Name User Name Tag
---------- ---------- -------------------- ---------trap1 public v1v2only v1v2trap
This command displays the community table information stored in the SNMP engine.
The following table describes the SNMPv3 Community Table information.
Table 13
Field Description
Community Table parameters
Index
Name
User Name
Tag
Displays the unique index value of a row in this table.
Displays the community string, which represents the configuration.
Displays the User Security Model (USM) user name.
Displays the community tag. This tag specifies a set of transport endpoints from which a
command responder application accepts management requests and to which a
command responder application sends an SNMP trap.
This command displays the SNMPv3 target address table information, which is stored in the SNMP
engine.
The following table describes the SNMPv3 Target Address Table information.
Table 14
Target Address Table parameters
Field Description
Name
Transport Addr
Port
Taglist
Params
Displays the locally arbitrary, but unique identifier associated with this
snmpTargetAddrEntry.
Displays the transport addresses.
Displays the SNMP UDP port number.
This column contains a list of tag values which are used to select target addresses
for a particular SNMP message.
The value of this object identifies an entry in the snmpTargetParamsTable. The
identified entry contains SNMP parameters to be used when generating messages
to be sent to this transport address.
The following table describes the SNMPv3 Target Parameters Table information.
Table 15
Target Parameters Table
Field Description
Name
MP Model
User Name
Sec Model
Sec Level
Displays the locally arbitrary, but unique identifier associated with this snmpTargeParamsEntry.
Displays the Message Processing Model used when generating SNMP messages using this
entry.
Displays the securityName, which identifies the entry on whose behalf SNMP messages will be
generated using this entry.
Displays the security model used when generating SNMP messages using this entry. The
system may choose to return an inconsistentValue error if an attempt is made to set this
variable to a value for a security model which the system does not support.
Displays the level of security used when generating SNMP messages using this entry.
Information Menu 30
Loading...
+ 198 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.