3Com Corporation reserves the right to revise this documentation and to make changes in co ntent from time to
time without obligation on the part of 3Com Corporation to provide notification of such revision or change.
3Com Corporation provides this documentation without warranty, term, or condition of any kind, either implied
or expressed, including, but not limited to, the implied warranties, terms or conditions of merchantability,
satisfactory quality, and fitness for a particular purpose. 3Com may make improvements or changes in the
product(s) and/or the program(s) described in this documentation at any time.
If there is any software on removable media described in this documentation, it is furnished under a license
agreement included with the product as a separate document, in the hard copy documentation, or on the
removable media in a directory file named LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy,
please contact 3Com and a copy will be provided to you.
UNITED STATES GOVERNMENT LEGEND
If you are a United States government agency, then this documentation and the software described herei n are
provided to you subject to the following:
All technical data and computer software are commercial in nature and developed solely at private expense.
Software is delivered as “Commercial Computer Software” as defined in DFARS 252.227 -7014 (June 1995) o r
as a “commercial item” as defined in FAR 2.101(a) and as such is provided with only such rig hts as are
provided in 3Com’s standard commercial license for the Software. Technical data is provided with limited rights
only as provided in DFAR 252.227-7015 (Nov 1995) or FAR 52.227-14 (June 1987), whichever is applicable.
You agree not to remove or deface any portion of any legend provided on any licensed program or
documentation contained in, or delivered to you in conjunction with, this User Guide.
Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may
not be registered in other countries.
3Com and the 3Com logo are registered trademarks of 3Com Corporation.
All other company and product names may be trademarks of the respective companies with which they are
associated.
ENVIRONMENTAL STATEMENT
It is the policy of 3Com Corporation to be environmentally-friendly in all operations. To uphold our policy, we
are committed to:
Establishing environmental performance standards that comply with national legislation and regulations.
Conserving energy, materials and natural resources in all operations.
Reducing the waste generated by all operations. Ensuring that all wa ste conforms to recognized environmental
standards. Maximizing the recyclable and reusable content of all products.
Ensuring that all products can be recycled, reused and disp osed of safely.
Ensuring that all products are labelled according to recognized environmental standards.
Improving our environmental record on a continual basis.
End of Life Statement
3Com processes allow for the recovery, reclamation and safe disposal of all end-of-life electronic compon ents.
Regulated Materials Statement
3Com products do not contain any hazardous or ozone-d epleting material.
Environmental Statement about the Documentation
The documentation for this product is printed on paper that comes from sustainabl e, managed forests; it is fully
biodegradable and recyclable, and is completely chlorine-free. The varnish is environmentally-f riendly, and the
inks are vegetable-based with a low heavy-metal content.
Page 3
About This Manual
Organization
3Com Switch 4510G Family Command Reference Guide is organized as follows:
Volume Features
00-Command
Index
01-Access
Volume
02-IP
Services
Volume
03-IP Routing
Volume
04-Multicast
Volume
05-QoS
Volume
Command Index
Ethernet Port Link AggregationPort Isolation MSTP
LLDP VLAN Isolate-User-VLAN Voice VLAN
GVRP QinQ BPDU Tunneling Port Mirroring
enable log updown System Volume 16-8
enable snmp trap updown Access Volume 2-10
enable snmp trap updown System Volume 10-10
escape-key System Volume 1-10
execute System Volume 5-5
exit Security Volume 10-20
expiration-date Security Volume 1-24
F
fast-leave (IGMP-Snooping view) IP Multicast Volume 1-3
fast-leave (MLD-Snooping view) IP Multicast Volume 3-3
file prompt System Volume 5-6
filename System Volume 18-16
filter QoS Volume 1-9
filter-policy export IP Routing Volume 5-7
filter-policy export (RIP view) IP Routing Volume 3-9
filter-policy import (RIP view) IP Routing Volume 3-10
filter-policy import (RIPng view) IP Routing Volume 5-8
fixdisk System Volume 5-7
flow-control Access Volume 1-16
flow-control System Volume 1-11
flow-interval Access Volume 1-17
flush enable High Availability Volume 1-3
format System Volume 5-7
fqdn Security Volume 11-14
free ftp user System Volume 6-3
A-18
Page 24
free user-interface System Volume 1-12
free web-users System Volume 2-2
frequency System Volume 18-16
ftp System Volume 6-14
ftp client source System Volume 6-15
ftp ipv6 System Volume 6-16
ftp server acl System Volume 6-3
ftp server enable System Volume 6-4
ftp timeout System Volume 6-4
ftp update System Volume 6-5
ftp-server System Volume 20-38
G
garp timer hold Access Volume 9-6
garp timer join Access Volume 9-6
garp timer leave Access Volume 9-7
garp timer leaveall Access Volume 9-8
get Security Volume 10-20
get System Volume 6-17
gratuitous-arp-learning enable IP Services Volume 2-7
gratuitous-arp-sending enable IP Services Volume 2-7
group Security Volume 1-25
group-member Access Volume 1-17
group-policy (IGMP-Snooping view) IP Multicast Volume 1-4
group-policy (MLD-Snooping view) IP Multicast Volume 3-4
gvrp Access Volume 9-9
gvrp registration Access Volume 9-9
handshake timeout Security Volume 12-5
header System Volume 3-16
help Security Volume 10-21
history-command max-size System Volume 1-13
history-records System Volume 18-17
holdtime System Volume 20-39
host-aging-time (IGMP-Snooping view) IP Multicast Volume 1-5
host-aging-time (MLD-Snooping view) IP Multicast Volume 3-5
host-route IP Routing Volume 3-11
hotkey System Volume 3-18
http-version System Volume 18-18
hwtacacs nas-ip Security Volume 3-4
hwtacacs scheme Security Volume 3-5
I
idle-cut enable Security Volume 1-25
idle-timeout System Volume 1-13
if-match QoS Volume 1-2
if-match acl IP Routing Volume 6-8
if-match cost IP Routing Volume 6-4
if-match interface IP Routing Volume 6-4
if-match ip IP Routing Volume 6-9
if-match ip-prefix IP Routing Volume 6-10
if-match ipv6 IP Routing Volume 6-14
if-match tag IP Routing Volume 6-5
igmp-snooping IP Multicast Volume 1-6
igmp-snooping drop-unknown IP Multicast Volume 1-6
igmp-snooping enable IP Multicast Volume 1-7
igmp-snooping fast-leave IP Multicast Volume 1-8
igmp-snooping general-query source-ip IP Multicast Volume 1-9
igmp-snooping group-limit IP Multicast Volume 1-9
igmp-snooping group-policy IP Multicast Volume 1-10
A-20
Page 26
igmp-snooping host-aging-time IP Multicast Volume 1-11
igmp-snooping host-join IP Multicast Volume 1-12
igmp-snooping last-member-query-interval IP Multicast Volume 1-13
igmp-snooping max-response-time IP Multicast Volume 1-14
igmp-snooping overflow-replace IP Multicast Volume 1-15
igmp-snooping querier IP Multicast Volume 1-15
igmp-snooping query-interval IP Multicast Volume 1-16
igmp-snooping router-aging-time IP Multicast Volume 1-17
igmp-snooping source-deny IP Multicast Volume 1-17
igmp-snooping special-query source-ip IP Multicast Volume 1-18
igmp-snooping static-group IP Multicast Volume 1-19
igmp-snooping static-router-port IP Multicast Volume 1-20
igmp-snooping version IP Multicast Volume 1-21
import QoS Volume 2-2
import-route IP Routing Volume 5-8
import-route (RIP view) IP Routing Volume 3-11
info-center channel name System Volume 16-9
info-center console channel System Volume 16-9
info-center enable System Volume 16-10
info-center logbuffer System Volume 16-11
info-center loghost System Volume 16-11
info-center loghost source System Volume 16-12
info-center monitor channel System Volume 16-13
info-center snmp channel System Volume 16-14
info-center source System Volume 16-15
info-center synchronous System Volume 16-17
info-center timestamp System Volume 16-19
info-center timestamp loghost System Volume 16-20
info-center trapbuffer System Volume 16-21
instance Access Volume 4-14
interface Access Volume 1-18
A-21
Page 27
interface bridge-aggregation Access Volume 2-10
interface vlan-interface Access Volume 6-4
ip (PKI entity view) Security Volume 11-14
ip address Access Volume 6-5
ip address IP Services Volume 1-4
ip address bootp-alloc IP Services Volume 8-2
ip address dhcp-alloc IP Services Volume 6-3
ip check source Security Volume 9-3
ip forward-broadcast (interface view) IP Services Volume 10-14
ip forward-broadcast (system view) IP Services Volume 10-15
ip host IP Services Volume 9-7
ip http acl System Volume 8-2
ip http enable System Volume 8-2
ip http port System Volume 8-3
ip https acl System Volume 9-2
ip https certificate access-control-policy System Volume 9-2
ip https enable System Volume 9-3
ip https port System Volume 9-4
ip https ssl-server-policy System Volume 9-4
ip ip-prefix IP Routing Volume 6-10
ip ipv6-prefix IP Routing Volume 6-14
ip redirects enable IP Services Volume 10-15
ip route-static IP Routing Volume 2-2
ip route-static default-preference IP Routing Volume 2-3
ip ttl-expires enable IP Services Volume 10-16
ip unreachables enable IP Services Volume 10-16
ipc performance enable System Volume 22-8
ip-pool System Volume 20-40
ip-subnet-vlan Access Volume 6-29
ipv6 IP Services Volume 12-23
ipv6 address IP Services Volume 12-23
A-22
Page 28
ipv6 address auto link-local IP Services Volume 12-24
ipv6 address eui-64 IP Services Volume 12-25
ipv6 address link-local IP Services Volume 12-26
ipv6 hoplimit-expires enable IP Services Volume 12-27
ipv6 host IP Services Volume 12-27
ipv6 icmp-error IP Services Volume 12-28
ipv6 icmpv6 multicast-echo-reply enable IP Services Volume 12-28
ipv6 nd autoconfig managed-address-flag IP Services Volume 12-29
ipv6 nd autoconfig other-flag IP Services Volume 12-30
ipv6 nd dad attempts IP Services Volume 12-30
ipv6 nd hop-limit IP Services Volume 12-31
ipv6 nd ns retrans-timer IP Services Volume 12-32
ipv6 nd nud reachable-time IP Services Volume 12-32
ipv6 nd ra halt IP Services Volume 12-33
ipv6 nd ra interval IP Services Volume 12-34
ipv6 nd ra prefix IP Services Volume 12-34
ipv6 nd ra router-lifetime IP Services Volume 12-35
ipv6 neighbor IP Services Volume 12-36
ipv6 neighbors max-learning-num IP Services Volume 12-37
ipv6 pathmtu IP Services Volume 12-38
ipv6 pathmtu age IP Services Volume 12-38
ipv6 route-static IP Routing Volume 4-2
irf auto-update enable System Volume 21-6
irf link-delay System Volume 21-7
irf mac-address persistent System Volume 21-8
irf member irf-port System Volume 21-11
irf member priority System Volume 21-8
irf member renumber System Volume 21-10
irf switch-to System Volume 21-12
isolate-user-vlan Access Volume 7-2
isolate-user-vlan enable Access Volume 7-4
mac-address (Interface view) System Volume 13-3
mac-address (system view) System Volume 13-4
mac-address information enable (Ethernet interface
view)
mac-address information enable (system view) System Volume 14-2
mac-address information interval System Volume 14-2
mac-address information mode System Volume 14-3
mac-address information queue-length System Volume 14-4
mac-authentication user-name-format Security Volume 7-5
mac-vlan enable Access Volume 6-20
mac-vlan mac-address Access Volume 6-20
management-vlan System Volume 20-41
management-vlan synchronization enable System Volume 20-42
max-response-time (IGMP-Snooping view) IP Multicast Volume 1-22
max-response-time (MLD-Snooping view) IP Multicast Volume 3-7
mdi Access Volume 1-24
mib-style System Volume 11-1
mirroring-group Access Volume 12-2
mirroring-group mirroring-port Access Volume 12-3
mirroring-group monitor-egress Access Volume 12-4
mirroring-group monitor-port Access Volume 12-5
mirroring-group remote-probe vlan Access Volume 12-6
mirroring-port Access Volume 12-7
mirror-to QoS Volume 5-1
mkdir Security Volume 10-22
mkdir System Volume 5-8
mkdir System Volume 6-20
mld-snooping IP Multicast Volume 3-7
mld-snooping enable IP Multicast Volume 3-8
mld-snooping fast-leave IP Multicast Volume 3-9
mld-snooping general-query source-ip IP Multicast Volume 3-9
mld-snooping group-limit IP Multicast Volume 3-10
mld-snooping group-policy IP Multicast Volume 3-11
mld-snooping host-aging-time IP Multicast Volume 3-12
mld-snooping host-join IP Multicast Volume 3-13
mld-snooping last-listener-query-interval IP Multicast Volume 3-14
mld-snooping max-response-time IP Multicast Volume 3-15
mld-snooping overflow-replace IP Multicast Volume 3-15
mld-snooping querier IP Multicast Volume 3-16
A-26
Page 32
mld-snooping query-interval IP Multicast Volume 3-17
mld-snooping router-aging-time IP Multicast Volume 3-18
mld-snooping source-deny IP Multicast Volume 3-18
mld-snooping special-query source-ip IP Multicast Volume 3-19
mld-snooping static-group IP Multicast Volume 3-20
mld-snooping static-router-port IP Multicast Volume 3-21
mld-snooping version IP Multicast Volume 3-22
monitor-link group High Availability Volume 2-2
monitor-port Access Volume 12-8
more System Volume 5-9
move System Volume 5-10
multicast-suppression Access Volume 1-25
multicast-vlan IP Multicast Volume 2-2
multicast-vlan ipv6 IP Multicast Volume 4-2
N
name Access Volume 6-6
nas-ip (HWTACACS scheme view) Security Volume 3-6
nas-ip (RADIUS scheme view) Security Volume 2-8
ndp enable System Volume 20-4
ndp timer aging System Volume 20-5
ndp timer hello System Volume 20-6
nest Access Volume 10-1
network IP Routing Volume 3-12
next-hop System Volume 18-18
nm-interface vlan-interface System Volume 20-43
nqa System Volume 18-19
nqa agent enable System Volume 18-19
nqa agent max-concurrent System Volume 18-20
nqa schedule System Volume 18-21
nqa server enable System Volume 18-39
nqa server tcp-connect System Volume 18-40
A-27
Page 33
nqa server udp-echo System Volume 18-41
ntdp enable System Volume 20-11
ntdp explore System Volume 20-11
ntdp hop System Volume 20-12
ntdp timer System Volume 20-13
ntdp timer hop-delay System Volume 20-13
ntdp timer port-delay System Volume 20-14
ntp-service access System Volume 19-5
ntp-service authentication enable System Volume 19-6
ntp-service authentication-keyid System Volume 19-7
ntp-service broadcast-client System Volume 19-8
ntp-service broadcast-server System Volume 19-8
ntp-service in-interface disable System Volume 19-9
ntp-service max-dynamic-sessions System Volume 19-9
ntp-service multicast-client System Volume 19-10
ntp-service multicast-server System Volume 19-11
ntp-service reliable authentication-keyid System Volume 19-12
ntp-service source-interface System Volume 19-12
ntp-service unicast-peer System Volume 19-13
ntp-service unicast-server System Volume 19-14
O
oam enable High Availability Volume 5-9
oam errored-frame period High Availability Volume 5-10
oam errored-frame threshold High Availability Volume 5-10
oam errored-frame-period period High Availability Volume 5-11
oam errored-frame-period threshold High Availability Volume 5-12
oam errored-frame-seconds period High Availability Volume 5-12
oam errored-frame-seconds threshold High Availability Volume 5-13
oam errored-symbol period High Availability Volume 5-13
oam errored-symbol threshold High Availability Volume 5-14
oam loopback High Availability Volume 5-15
A-28
Page 34
oam mode High Availability Volume 5-15
open System Volume 6-20
open ipv6 System Volume 6-21
operation (FTP test type view) System Volume 18-22
operation (HTTP test type view) System Volume 18-22
operation interface System Volume 18-23
organization Security Volume 11-16
organization-unit Security Volume 11-17
output-delay IP Routing Volume 3-13
overflow-replace (IGMP-Snooping view) IP Multicast Volume 1-23
overflow-replace (MLD-Snooping view) IP Multicast Volume 3-22
P
packet-filter Security Volume 14-33
packet-filter ipv6 Security Volume 14-34
parity System Volume 1-15
passive System Volume 6-22
password Security Volume 1-28
password (FTP test type view) System Volume 18-24
patch active System Volume 17-2
patch deactive System Volume 17-2
patch delete System Volume 17-3
patch install System Volume 17-4
patch load System Volume 17-5
patch location System Volume 17-5
patch run System Volume 17-6
peer IP Routing Volume 3-14
peer-public-key end Security Volume 13-3
ping System Volume 15-1
ping ipv6 System Volume 15-4
pki certificate access-control-policy Security Volume 11-17
pki certificate attribute-group Security Volume 11-18
A-29
Page 35
pki delete-certificate Security Volume 11-19
pki domain Security Volume 11-19
pki entity Security Volume 11-20
pki import-certificate Security Volume 11-21
pki request-certificate domain Security Volume 11-21
pki retrieval-certificate Security Volume 11-22
pki retrieval-crl domain Security Volume 11-23
pki validate-certificate Security Volume 11-23
pki-domain Security Volume 12-6
port Access Volume 6-10
port High Availability Volume 1-3
port High Availability Volume 2-2
port (IPv6 multicast VLAN view) IP Multicast Volume 4-3
port (multicast VLAN view) IP Multicast Volume 2-2
port access vlan Access Volume 6-10
port hybrid ip-subnet-vlan vlan Access Volume 6-30
port hybrid protocol-vlan Access Volume 6-24
port hybrid pvid vlan Access Volume 6-11
port hybrid vlan Access Volume 6-12
port link-aggregation group Access Volume 2-15
port link-type Access Volume 6-14
port monitor-link group High Availability Volume 2-3
port multicast-vlan IP Multicast Volume 2-3
port multicast-vlan ipv6 IP Multicast Volume 4-3
port smart-link group High Availability Volume 1-4
port trunk permit vlan Access Volume 6-15
port trunk pvid vlan Access Volume 6-17
port-group manual Access Volume 1-26
port-isolate enable Access Volume 3-2
port-security authorization ignore Security Volume 8-6
port-security enable Security Volume 8-6
sflow agent ip IP Services Volume 13-2
sflow collector ip IP Services Volume 13-3
sflow enable IP Services Volume 13-3
sflow interval IP Services Volume 13-4
sflow sampling-mode IP Services Volume 13-5
sflow sampling-rate IP Services Volume 13-6
A-37
Page 43
sftp Security Volume 10-26
sftp client ipv6 source Security Volume 10-27
sftp client source Security Volume 10-27
sftp ipv6 Security Volume 10-28
sftp server enable Security Volume 10-15
sftp server idle-timeout Security Volume 10-15
shell System Volume 1-19
shutdown Access Volume 1-28
shutdown Access Volume 2-17
shutdown Access Volume 6-7
shutdown-interval System Volume 4-30
silent-interface (RIP view) IP Routing Volume 3-25
slave auto-update config System Volume 5-28
smart-link flush enable High Availability Volume 1-8
smart-link group High Availability Volume 1-9
snmp-agent System Volume 10-11
snmp-agent calculate-password System Volume 10-12
snmp-agent community System Volume 10-13
snmp-agent group System Volume 10-15
snmp-agent local-engineid System Volume 10-16
snmp-agent log System Volume 10-17
snmp-agent mib-view System Volume 10-17
snmp-agent packet max-size System Volume 10-18
snmp-agent sys-info System Volume 10-19
snmp-agent target-host System Volume 10-20
snmp-agent trap enable System Volume 10-22
snmp-agent trap if-mib link extended System Volume 10-23
snmp-agent trap life System Volume 10-24
snmp-agent trap queue-size System Volume 10-24
snmp-agent trap source System Volume 10-25
snmp-agent usm-user { v1 | v2c } System Volume 10-26
A-38
Page 44
snmp-agent usm-user v3 System Volume 10-27
snmp-host System Volume 20-44
source interface System Volume 18-30
source ip System Volume 18-31
source port System Volume 18-32
source-deny (IGMP-Snooping view) IP Multicast Volume 1-26
source-deny (MLD-Snooping view) IP Multicast Volume 3-26
speed Access Volume 1-29
speed System Volume 1-20
speed auto Access Volume 1-30
ssh client authentication server Security Volume 10-10
ssh client first-time enable Security Volume 10-10
ssh client ipv6 source Security Volume 10-11
ssh client source Security Volume 10-12
ssh server authentication-retries Security Volume 10-3
ssh server authentication-timeout Security Volume 10-4
ssh server compatible-ssh1x enable Security Volume 10-5
ssh server enable Security Volume 10-5
ssh server rekey-interval Security Volume 10-6
ssh user Security Volume 10-7
ssh2 Security Volume 10-12
ssh2 ipv6 Security Volume 10-14
ssl client-policy Security Volume 12-8
ssl server-policy Security Volume 12-9
startup bootrom-access enable System Volume 4-31
startup saved-configuration System Volume 5-29
state Security Volume 1-30
state Security Volume 2-22
state Security Volume 11-25
statistics hold-time System Volume 18-32
statistics interval System Volume 18-34
display port······································································································································6-9
port·················································································································································6-10
port access vlan·····························································································································6-10
port hybrid pvid vlan ······················································································································6-11
port hybrid vlan······························································································································6-12
port link-type··································································································································6-14
port trunk permit vlan·····················································································································6-15
port trunk pvid vlan························································································································6-17
MAC Address-Based VLAN Configuration Commands········································································6-18
broadcast-suppression { ratio | pps max-pps }
undo broadcast-suppression
View
Ethernet port view, port group view
Default Level
2: System level
Parameters
ratio: Maximum percentage of broadcast traffic to the total transmission capability of an Ethernet port.
The smaller the ratio, the less broadcast traffic is allowed to pass through the interface. this argument
ranges from 1 to 100.
pps max-pps: Specifies the maximum number of broadcast packets that can be forwarded on an
Ethernet port per second (in pps, representing packets per second).
z For a Gigabit port, the value range is 1 to 1488100.
z For a 10-Gigabit port, the value range is 1 to 1488100.
Note that:
z When a suppression granularity larger than 1 is specified on the device, the value of the pps
z When no suppression granularity is specified or the suppression granularity is set to 1, the value
Description
Use the broadcast-suppression command to set a broadcast traffic threshold on one or multiple
Ethernet ports.
Use the undo broadcast-suppression command to restore the default.
keyword should be no smaller than and an integral multiple of the granularity. The broadcast
suppression threshold value configured through this keyword on an Ethernet port may not be the
one that actually takes effect. To display the actual broadcast suppression threshold value on an
Ethernet port, you can use the display interface command.
of the pps keyword should be no smaller than 1, and the broad cast sup pression thre shold value is
the one that actually takes effect on the Ethernet port.
By default, all broadcast traffic is allowed to pass through an Ethernet port, that is, broadcast traffic is
not suppressed.
1-1
Page 56
If you execute this command in Ethernet port view, the configuration takes effect only on the current
interface. If you execute this command in port-group view, the conf iguration t akes ef fect on all the ports
in the port group.
When broadcast traffic exceeds the broadcast traf fic t hreshold, the system begins to disca rd broadcast
packets until the broadcast traffic drops below the threshold to ensure operation of network se rvices.
z If you set different suppression ratios in Ethernet port view or port-group view for multiple times,
z Do not use the broadcast-suppression command along with the storm-constrain command.
Examples
# For Ethernet port GigabitEthernet 1/0/1, allow broadcast traffic equivalent to 20% of the total
transmission capability of GigabitEthernet 1/0/1 to pass.
the latest configuration takes effect.
Otherwise, the broadcast storm suppression ratio configured may get invalid.
# For all the ports of the manual port group named group1, allow broadca st traffic equivale nt to 20% of
the total transmission capability of each port to pass and suppress excessive broadcast packets.
text: Description of an Ethernet port, a string of 1 to 80 characters. Currently, the device supports the
following types of characters or symbols: standard English characters (numbers and case-sensitive
1-2
Page 57
letters), special English characters, spaces, and other characters or symbols that conform to the
Unicode standard.
z A port description can be the mixture of English characters and other Unicode characters. The
z To use a type of Unicode characters or symbols in a port description, you need to install the
z Each Unicode character or symbol (non-English characters) takes the space of two regular
Description
mixed description cannot exceed the specified length.
corresponding Input Method Editor (IME) and log in to the device through remote login software
that supports this character type.
characters. When the length of a description string reaches or exceeds the maximum line width on
the terminal software, the software starts a new line, possibly breaking a Unicode character into
two. As a result, garbled characters may be displayed at the end of a line.
Use the description command to set the description string of the current interface.
Use the undo description command to restore the default.
By default, the description of an interface is the interface name followed by the “interface” string,
GigabitEthernet1/0/1 Interface for example.
Related commands: display interface.
Examples
# Configure the description string of interface GigabitEthernet 1/0/1 as lanswitch-interface.
display brief interface [ interface-type [ interface-number ] ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default Level
1: Monitor level
Parameters
interface-type: Type of a specified interface.
interface-number: Number of a specified interface.
1-3
Page 58
|: Uses a regular expression to filter output information. For detailed description on regular expressi on,
refer to Basic System Configuration in the System Volume.
begin: Displays the line that matches the regular expression and all the subsequent lines.
exclude: Displays the lines that do not match the regular expression.
include: Displays the lines that match the regular expression.
regular-expression: Regular expression, a string of 1 to 256 characters. Note that this argument is
case-sensitive.
Description
Use the display brief interface command to display brief interface information.
z If neither interface type nor interface number is specified, all interface information will be
z If only interface type is specified, then only information of this particular type of interface will be
z If both interface type and interface number are specified, then only information of the specified
Related commands: interface.
displayed.
displayed.
interface will be displayed.
Examples
# Display the brief information of interfaces.
<Sysname> display brief interface
The brief information of interface(s) under route mode:
Interface Link Protocol-link Protocol type Main IP
Loop1 UP UP(spoofing) LOOP 2.2.2.1
NULL0 UP UP(spoofing) NULL -Vlan1 UP UP ETHERNET 192.168.0.153
Vlan10 DOWN DOWN ETHERNET 1.1.1.1
Vlan100 ADM DOWN DOWN ETHERNET --
The brief information of interface(s) under bridge mode:
Interface Link Speed Duplex Link-type PVID
BAGG1 DOWN auto auto access 1
GE1/0/1 DOWN auto auto access 1
GE1/0/2 DOWN auto auto access 1
GE1/0/3 DOWN auto auto access 1
GE1/0/4 UP 1G(a) full(a) access 1
GE1/0/5 DOWN auto auto access 1
GE1/0/6 DOWN auto auto access 1
GE1/0/7 DOWN auto auto access 1
GE1/0/8 DOWN auto auto access 1
GE1/0/9 DOWN auto auto access 1
GE1/0/10 DOWN auto auto access 1
GE1/0/11 DOWN auto auto trunk 1
GE1/0/12 DOWN auto auto trunk 1
# Display the information of interfaces beginning with the string “spoof”.
<Sysname> display brief interface | begin spoof
1-4
Page 59
The brief information of interface(s) under route mode:
Interface Link Protocol-link Protocol type Main IP
Loop0 UP UP(spoofing) LOOP 5.5.5.5
NULL0 UP UP(spoofing) NULL -Vlan999 UP UP ETHERNET 10.1.1.1
# Display the brief information of all UP interfaces.
<Sysname> display brief interface | include UP
The brief information of interface(s) under route mode:
Interface Link Protocol-link Protocol type Main IP
Loop0 UP UP(spoofing) LOOP 5.5.5.5
NULL0 UP UP(spoofing) NULL -Vlan999 UP UP ETHERNET 10.1.1.1
The brief information of interface(s) under bridge mode:
Interface Link Speed Duplex Link-type PVID
GE1/0/7 UP 100M(a) full(a) trunk 303
GE1/0/9 UP 100M(a) full(a) access 999
# Display the brief information of all interfaces excluding Ethernet ports.
<Sysname> display brief interface | exclude GE
The brief information of interface(s) under route mode:
Interface Link Protocol-link Protocol type Main IP
Loop1 UP UP(spoofing) LOOP 2.2.2.1
NULL0 UP UP(spoofing) NULL -Vlan1 UP UP ETHERNET 192.168.0.153
Vlan10 DOWN DOWN ETHERNET 1.1.1.1
Vlan100 ADM DOWN DOWN ETHERNET -The brief information of interface(s) under bridge mode:
Interface Link Speed Duplex Link-type PVID
BAGG1 DOWN auto auto access 1
interface-number: Number of a specified interface.
Description
Use the display interface command to display the current state of a specified interface and related
information.
z If neither interface type nor interface number is specified, all interface information will be
z If only interface type is specified, then only information of this particular type of interface will be
z If both interface type and interface number are specified, then only information of the specified
Related commands: interface.
Examples
# Display the current state of interface GigabitEthernet 1/0/1 and related information.
<Sysname> display interface GigabitEthernet 1/0/1
GigabitEthernet1/0/1 current state: DOWN
IP Packet Frame Type: PKTFMT_ETHNT_2, Hardware Address: 000f-e200-8048
Description: GigabitEthernet1/0/1 Interface
Loopback is not set
Media type is twisted pair, port hardware type is 100_BASE_TX
Unknown-speed mode, unknown-duplex mode
Link speed type is autonegotiation, link duplex type is autonegotiation
Flow-control is not enabled
The Maximum Frame Length is 9216
Broadcast MAX-ratio: 100%
Unicast MAX-ratio: 100%
displayed.
displayed.
interface will be displayed.
1-6
Page 61
Multicast MAX-ratio: 100%
Allow jumbo frame to pass
PVID: 100
Mdi type: auto
Link delay is 0(sec)
Port link-type: access
Tagged VLAN ID : none
Untagged VLAN ID : 100
Port priority: 0
Peak value of input: 96132560 bytes/sec, at 2007-10-26 07:05:06
Peak value of output: 0 bytes/sec, at 2000-04-26 12:00:12
Last 300 seconds input: 6 packets/sec 678 bytes/sec 20%
Last 300 seconds output: 1 packets/sec 179 bytes/sec 17%
Input (total): 61745144 packets, 12152212250 bytes
0 unicasts, 47519150 broadcasts, 12121681 multicasts
Input (normal): 61745144 packets, - bytes
205227373 unicasts, 47519150 broadcasts, 12121681 multicasts
Input: 0 input errors, 0 runts, 0 giants, 0 throttles
0 CRC, 0 frame, - overruns, 0 aborts
IP Packet Frame Type Frame type of the Ethernet port
Description Description of the interface
Unknown-speed mode
unknown-duplex mode
Unknown-speed mode, in which mode speed is negotiated
between the current host and the peer.
Unknown-duplex mode, in which mode speed is negotiated
between the current host and the peer.
The Maximum Frame Length The maximum frame length allowed on an interface
Broadcast storm suppression ratio (the maximum ratio of
Broadcast MAX-ratio
allowed number of broadcast packets to overall traffic through
an interface)
Unicast storm suppression ratio (the maximum ratio of allowed
Unicast MAX-ratio
number of unknown unicast packets to overall traffic over an
interface)
1-7
Page 62
Field Description
Multicast storm suppression ratio (the maximum ratio of
Multicast MAX-ratio
allowed number of multicast packets to overall traffic through
an interface)
PVID Default VLAN ID
Mdi type Cable type
Link delay The suppression time of physical-link-state changes
Port link-type Interface link type, which could be access, trunk, an d hybrid.
Tagged VLAN ID
Untagged VLAN ID
VLANs whose packets are sent through the port with VLAN tag
kept
VLANs whose packets are sent through the port with VLAN tag
stripped off
Peak value of input Peak value of inbound traffic, in bytes/sec.
Peak value of output Peak value of outbound traffic, in bytes/sec.
Last 300 seconds input: 0
packets/sec 0 bytes/sec
Last 300 seconds output: 0
Average rate of input and output traffic in the last 300 seconds,
in pps and Bps
Packet statistics on the inbound direction of the interface,
including the statistics of normal packets,and abnormal
packets, in packets and bytes
Number of unicast packets, broadcast packets, and multicast
packets on the inbound direction of the interface
Normal packet statistics on the inbound direction of the
interface, including the statistics of normal packets in packets
and bytes
Number of unicast packets, broadcast packets, and multicast
packets on the inbound direction of the interface.
input errors
runts
giants
throttles
CRC
frame
- overruns
Input packets with errors
Frames received that were shorter than 64 bytes, yet in correct
formats, and contained valid CRCs
Frames received that were longer than the maximum frame
length supported on the interface:
zFor an Ethernet interface that permits jumbo frames, giants
refer to frames that are longer than 9212 bytes (without
VLAN tags) or 9216 bytes (with VLAN tags).
zFor an Ethernet interface that forbids jumbo frames, giants
refer to frames that are longer than 1522 bytes (without
VLAN tags) or 1526 bytes (with VLAN tags)
The number of times the receiver on the interface was
disabled, possibly because of buffer or CPU overload
Total number of packets received that had a normal length, but
contained checksum errors
Total number of frames that contained checksum errors and a
non-integer number of bytes
Number of times the receive rate of the interface exceeded the
capacity of the input queue, causing packets to be discarded
1-8
Page 63
aborts
Field Description
Total number of illegal packets received, including:
zFragment frames: Frames that were shorter than 64 bytes
(with an integral or non-integral length) and contained
checksum errors
zJabber frames: Frames that were longer than the maximum
frame length supported on the Ethernet interface and
contained checksum errors (the frame lengths in bytes may
or may not be integers). For an Ethernet interface that
permits jumbo frames, jabber frames refer to frames that
are longer than 9212 bytes (without VLAN tags) or 9216
bytes (with VLAN tags) and contain checksum errors; for an
Ethernet interface that forbids jumbo frames, jabber frames
refer to frames that are longer than 1522 bytes (without
VLAN tags) or 1526 bytes (with VLAN tags) and contain
checksum errors.
zSymbol error frames: Frames that contained at least one
undefined symbol
zUnknown operation code frames: Frames that were MAC
control frames but not pause frames
zLength error frames: Frames whose 802.3 length fields did
not match the actual frame lengths (46 bytes to 1500 bytes)
Number of received packets ignored by the interface because
the interface hardware ran low on internal buffers
Total number of frames with parity errors
Packet statistics on the outbound direction of the interface,
including the statistics of normal packets, abnormal packets,
and normal pause frames, in packets a nd bytes
Number of unicast packets, broadcast packets, multicast
packets, and pause frames on the outbound direction of the
interface
Normal packet statistics on the outbound direction of the
interface, including the statistics of normal packets and pause
frames, in packets and bytes
Number of unicast packets, broadcast packets, multicast
packets, and pause frames on the outbound direction of the
interface.
Output packets with errors
Number of times the transmit rate of the interface exceeded the
capacity of the output queue, causing packets to be discarded.
This is a very rare hardware-related problem.
Number of packets dropped because the interface ran low on
output buffers
aborts
deferred
collisions
late collisions
Number of packets that failed to be transmitted due to causes
such as Ethernet collisions
Number of frames whose first transmission attempt was
delayed, due to traffic on the network media, and that were
successfully transmitted later
Number of times frames were delayed due to Ethernet
collisions detected during the transmission
Number of times frames were delayed due to the detection of
collisions after the first 512 bits of the frames were already on
the network
1-9
Page 64
Field Description
lost carrier
- no carrier
“-“ indicates that the corresponding entry is not supported.
display loopback-detection
Syntax
display loopback-detection
View
Any view
Number of times the carrier was lost during transmission. This
counter applies to serial WAN interfaces.
Number of times the carrier was not present in the
transmission. This counter applies to serial WAN interfaces.
Default Level
1: Monitor level
Parameters
None
Description
Use the display loopback-detection command to display loopback detection information on a port.
If loopback detection is already enabled, this command will also display the detection interval and
information on the ports currently detected with a loopback.
Examples
# Display loopback detection information on a port.
<Sysname> display loopback-detection
Loopback-detection is running
Detection interval time is 30 seconds
No port is detected with loopback
Loopback-detection is running Loopback-detection is running.
Detection interval time is 30 seconds Detection interval is 30 seconds.
No port is detected with loopback No port is currently being detected with a loopback.
interface-type: Type of a specified interface.
interface-number: Number of a specified interface.
Description
Use the display packet-drop interface command to displ ay information about dropped p acket s on an
interface or multiple interfaces.
zIf you do not specify an interface type or interface number, this command displays information
about dropped packets on all the interfaces on the device.
zIf you specify an interface type only, this command displays information about dropped packets on
the specified type of interfaces.
zIf you specify both the interface type and interface number, this command displays information
about dropped packets on the specified interface.
Examples
# Display information about dropped packets on GigabitEthernet 1/0/1.
<Sysname> display packet-drop interface GigabitEthernet 1/0/1
GigabitEthernet1/0/1:
Packets dropped by GBP full or insufficient bandwidth: 301
Packets dropped by FFP: 261
Packets dropped by STP non-forwarding state: 321
display packet-drop summary
Syntax
display packet-drop summary
View
Any view
Default Level
1: Monitor level
Parameters
None
1-11
Page 66
Description
Use the display packet-drop summary command to display information about dropped p ackets on all
interfaces.
Examples
# Display information about dropped packets on all interfaces.
<Sysname> display packet-drop summary
All interfaces:
Packets dropped by GBP full or insufficient bandwidth: 301
Packets dropped by FFP: 261
Packets dropped by STP non-forwarding state: 321
Packets dropped by Rate-limit: 143
Table 1-5 display port combo command output description
Field Description
Combo-group
Combo ports of the device, represented by Combo port number, which is
generated by the system.
Active Ports of the Combo ports that are active
Inactive Ports of the Combo ports that are inactive
As for the optical port and the electrical port of a Combo port, the one with the smaller port number is
active by default. You can determine whether a port is an optical port or an electrical port by checking
the “Media type is” field of the display interface command.
display port-group manual
Syntax
display port-group manual [ all | name port-group-name ]
View
Any view
Default Level
2: System level
Parameters
all: Specifies all the manual port gro ups.
name port-group-name: Specifie s the name of a manual port group, a string of 1 to 32 characters.
Description
Use the display port-group manual command to display the information about a manual port group
or all the manual port groups.
z If you provide the port-group-name argument, this command displays the details for a specified
z If you provide the all keyword, this command displays the details for all manual port groups,
z Absence of parameters indicates that the names of all the port groups will be displayed.
Examples
# Display the names of all the port groups.
<Sysname> display port-group manual
The following manual port group exist(s):
group1 group2
manual port group, including its name and the Ethernet port ports included.
including their names and the Ethernet port ports included.
# Display details of all the manual port groups.
<Sysname> display port-group manual all
1-13
Page 68
Member of group1:
GigabitEthernet1/0/3 GigabitEthernet1/0/4 GigabitEthernet1/0/5
GigabitEthernet1/0/6 GigabitEthernet1/0/7 GigabitEthernet1/0/8
broadcast: Displays the information about storm constrain for broadcast packets.
multicast: Displays the information about storm constrain for multicast packets.
interface interface-type interface-number: Specifies an interface by its type and number.
Description
Use the display storm-constrain command to display the information about storm constrain.
If you provide no argument or keyword, this command displays the information about storm constrain
for all types of packets on all the interfaces.
Examples
# Display the information about storm constrain for all types of packets on all the interfaces.
<Sysname> display storm-constrain
Abbreviation: BC - broadcast; MC - multicast; UC - unicast
Flow Statistic Interval: 10(second)
PortName Type LowerLimit UpperLimit CtrMode Status Trap Log SwiNum Unit
-----------------------------------------------------------------------------GE1/0/2 BC 1 2 N/A normal on on 0 kbps
GE1/0/2 MC 1 5 N/A normal on on 0 ratio
Flow Statistic Interval Interval for generating storm constrain statistics
1-14
Page 69
Field Description
PortName Abbreviated port name
Type of the packets for which storm constrain function is enabled, which
Type
LowerLimit Lower threshold (in pps, Kbps or percentage)
UpperLimit Upper threshold (in pps, Kbps or percentage)
can be broadcast (for broadcast packets), and multicast (for multicast
packets).
duplex
Syntax
duplex { auto | full | half }
undo duplex
View
CtrMode
Status
Trap
Log
SwiNum
Action to be taken when the upper threshold is reached, which can be
block, shutdown, and N/A.
Interface state, which can be normal (indicating the interface operates
properly), control (indicating the interface is blocked or shut down).
State of trap messages sending. “on” indicates trap message sending is
enabled; “off” indicates trap message sending is disabled.
State of log sending. “on” indicates log sending is enabled; “off” indicates
log sending is disabled.
Number of the forwarding state switching.
This field is numbered modulo 65,535.
Ethernet port view
Default Level
2: System level
Parameters
auto: Indicates that the interface is in auto-negotiation state.
full: Indicates that the interface is in full-duplex state.
half: Indicates that the interface is in half-duplex state. The optical interfaces of SFP ports and the
electrical interfaces of Ethernet ports whose port rate is configured as 1000 Mbps do not support the
half keyword.
Description
Use the duplex command to configure the duplex mode for an Ethernet port.
Use the undo duplex command to restore the duplex mode for an Ethernet port to the default.
By default, the duplex mode for an Ethernet port is auto.
1-15
Page 70
Related commands: speed.
10-Gigabit Ethernet ports do not support this command.
Examples
# Configure the interface GigabitEthernet 1/0/1 to work in full-duplex mode.
<Sysname> system-view
[Sysname] interface GigabitEthernet 1/0/1
[Sysname-GigabitEthernet1/0/1] duplex full
flow-control
Syntax
flow-control
undo flow-control
View
Ethernet port view
Default Level
2: System level
Parameters
None
Description
Use the flow-control command to enable flow control on an Ethernet port.
Use the undo flow-control command to disable flow control on an Ethernet port.
By default, flow control on an Ethernet port is disabled.
The flow control function takes effect on the local Ethernet port only when it is enabled on both the
local and peer devices.
Examples
# Enable flow control on interface GigabitEthernet1/0/1.
interval: Interval at which the interface collects statistics. It ranges from 5 to 300 seconds and must be
a multiple of 5. The default value is 300 seconds.
Description
Use the flow-interval command to configure the time interval for collecting interface st atistics.
Use the undo flow-interval command to restore the default interval.
Examples
# Set the time interval for collecting interface statistics to 100 seconds.
interface-list: Ethernet port list, in the form of interface-type interface-number [ to interface-type
interface-number ] &<1-10>, where &<1-10> indicates that you can specify up to 10 port or port
ranges.
1-17
Page 72
Description
Use the group-member command to assign an Ethernet port or a list of Ethernet ports to the manual
port group.
Use the undo group-member command to remove an Ethernet port or a list of Ethernet ports from the
manual port group.
By default, there is no Ethernet port in a manual port group.
Examples
# Add interface GigabitEthe rnet 1/0/1 to the manual port group named group1.
Use the jumboframe enable command to allow jumbo frames with the length of 9216 bytes to pass
through an Ethernet port.
Use the undo jumboframe enable command to prevent frames longer than 1522 bytes from passing
through an Ethernet port.
By default, the device allows frames no larger than 9216 bytes to pass through an Ethernet port.
You can configure length of jumbo frames on a port (in Ethernet port view, port-group view) to allow
them to pass through Ethernet ports.
zExecution of this command under Ethernet port view will only apply the configurations to the
current Ethernet port.
zExecution of this command under port group view will apply the configurations to the Ethernet
port(s) in the port group.
Examples
# Enable jumbo frames to pass through all the Ethernet ports in the manual port group named group1.
delay-time: Up/down suppression time for the physical connection of an Ethernet port (in seconds). in
the range 2 to 10.
1-19
Page 74
Description
Use the link-delay command to configure the suppression time of physical-link-state changes on an
Ethernet port.
Use the undo link-delay command to restore the default suppression time.
By default, the physical-link-state change suppression time is not configured.
Examples
# Set the up/down suppression time of the physical connection of an Ethernet port to 8 seconds.
external: Enables external loopback testing on an Ethernet port.
internal: Enables internal loopback testing on an Ethernet port.
Description
Use the loopback command to enable Ethernet port loopback testing.
Use the undo loopback command to disable Ethernet port loopback testing.
By default, Ethernet port loopback testing is disabled.
z Ethernet port loopback testing should be enabled while testing certain functionalities, such as
z While enabled, Ethernet port loopback testing will work in full-duplex mode. The interface will
Examples
# Enable loopback testing on GigabitEthernet 1/0/1.
during the initial identification of any network failure.
return to its original state upon completion of the loopback testing.
loopback-detection control enable
undo loopback-detection control enable
View
Ethernet port view
Default Level
2: System level
Parameters
None
Description
Use the loopback-detection control enable command to enable loopback detection for a Trunk port
or Hybrid port.
Use the undo loopback-detection control enable command to restore the default.
By default, loopback detection for a Trunk po rt or Hybrid port is disabled.
z When the loopback detection is enabled, if a port has been detected with loopback, it will be shut
z When the loopback detection is disabled, if a port has been detected with loopback, a Trap
Note that this command is inapplicable to an Access port as its loopback detection is enabled by
default.
Examples
# Enable loopback detection for the trunk port GigabitEthernet 1/0/1.
<Sysname> system-view
[Sysname] loopback-detection enable
[Sysname] interface GigabitEthernet 1/0/1
[Sysname-GigabitEthernet1/0/1] port link-type trunk
[Sysname-GigabitEthernet1/0/1] loopback-detection enable
[Sysname-GigabitEthernet1/0/1] loopback-detection control enable
down. A Trap message will be sent to the terminal and the corresponding MAC address
forwarding entries will be deleted.
message will be sent to the terminal. The port is still working properly.
Use the loopback-detection enable command to enable loopback detection globally or on a spe cified
port.
Use the undo loopback-detection enable command to disable loopback detection globally or on a
specified port.
By default, loopback detection is disabled for an Access, Trunk, or Hybrid port.
zIf an Access port has been detected with loopback, it will be shut down. A Trap message will be
sent to the terminal and the corresponding MAC address.
zIf a Trunk port or Hybrid port has been detected with loopback, a Trunk message will be sent to
the terminal. They will be shut down if the loopback testing function is enabled on them. In addition,
a Trap message will be sent to the terminal and the corresponding MAC address forwarding
entries will be deleted.
Related commands: loopback-detection control enable.
z Loopback detection on a given port is enabled only after the loopback-detection enable
z Loopback detection on all ports will be disabled after the configuration of the undo
Examples
# Enable loopback detection on the interface GigabitEthernet 1/0/1.
Use the loopback-detection per-vlan enable command to enable loopback detection in all VLANs
with Trunk ports or Hybrid ports.
Use the undo loopback-detection per-vlan enable command to enable loopback detection in the
default VLAN with Trunk ports or Hybrid ports.
By default, loopback detection is only enabled in the default VLAN(s) with Trunk port s or Hybrid port s.
Note that the loopback-detection per-vlan enable command is not applicable to Access ports.
1-23
Page 78
Examples
# Enable loopback detection in all the VLANs to which the Hybrid port GigabitEthernet 1/1 belongs.
across: Specifies the MDI mode as across.
auto: Specifies the MDI mode as auto.
normal: Specifies the MDI mode as normal.
Description
Use the mdi command to configure the MDI mode for an Ethernet port.
Use the undo mdi command to restore the system default.
By default, the MDI mode of an Ethernet port is auto, that is, the Ethernet port determines the physical
pin roles (transmit or receive) through negotiation.
The command is not applicable to optical interfaces of SFP ports or 10-Gigabit Ethernet ports.
Examples
# Set the MDI mode of GigabitEthernet 1/0/1 to across.
<Sysname> system-view
[Sysname] interface GigabitEthernet 1/0/1
[Sysname-GigabitEthernet1/0/1] mdi across
1-24
Page 79
multicast-suppression
Syntax
multicast-suppression { ratio | pps max-pps }
undo multicast-suppression
View
Ethernet port view, port group view
Default Level
2: System level
Parameters
ratio: Maximum percentage of multicast traffic to the total transmission capability of an Ethernet port, in
the range 1 to 100. The smaller the ratio is, the less multicast traffic is allowed to pass through the
interface.
pps max-pps: Specifies the maximum number of multicast packets allowed on an Ethernet port per
second (in pps, representin g packets per second).
z For a Gigabit port, the value range is 1 to 1488100.
z For a 10-Gigabit port, the value range is 1 to 14881000.
Note that:
z When a suppression granularity larger than 1 is specified on the device, the value of the pps
z When no suppression granularity is specified or the suppression granularity is set to 1, the value
Description
Use the multicast-suppression command to configure multicast storm suppression ratio on an
interface.
Use the undo multicast-suppression command to restore the default multicast suppression ratio.
By default, all multicast traffic is allowed to go through an Ethernet port, that is, multicast traffic is not
suppressed.
keyword should be no smaller than and an integral multiple of the granularity. The multicast
suppression threshold value configured through this keyword on an Ethernet port may not be the
one that actually takes effect. To display the actual multicast suppression threshold value on an
Ethernet port, you can use the display interface command.
of the pps keyword should be no smaller than 1, and the multicast suppression threshold value is
the one that actually takes effect on the Ethernet port.
If you execute this command in Ethernet port view, the configurations take effect only on the current
interface. If you execute this command in port-group view, the configurations take effect on all ports in
the port group.
Note that when multicast traffic exceeds the maximum value configured, the system will discard the
extra packets so that the multicast traffic ratio can drop below the limit to ensure that the network
functions properly.
1-25
Page 80
z If you set different suppression ratios in Ethernet port view or port-group view for multiple times,
z Do not use the multicast-suppression command along with the storm-constrain command.
Examples
# For Ethernet port GigabitEthernet 1/0/1, allow multicast traffic equivalent to 20% of the total
transmission capability of GigabitEthernet 1/0/1 to pass.
# For all the ports of the manual port group group1, allow multicast traf fic equivale nt to 20% of the total
transmission capability of each port to pass.
Use the reset counters interface command to clear the statistics of an interface.
Before sampling network traffic within a specific period of time on an interface, you need to clear the
existing statistics.
zIf neither interface type nor interface number is specified, this command clears the statistics of all
the interfaces.
zIf only the interface type is specified, this command clears the statistics of the interfaces that are of
the interface type specified.
zIf both the interface type and interface number are specified, this command clears the statistics of
interface-number: Number of a specified interface.
Description
Use the reset packet-drop interface command to clear statistics of dropped packets on an interface
or multiple interfaces. Sometimes when you want to collect the statistics of dropped packets on an
interface, you need to clear the old statistics on the interface first.
z If you do not specify an interface type or interface number, this command clears statistics of
z If you specify an interface type only, this command clears statistics of dropped packets on the
z If you specify both the interface type and interface number, this command clears statistics of
Examples
# Clear statistics of dropped pa ckets on GigabitEthernet 1/0/1.
# Clear statistics of dropped packets on all interfaces.
<Sysname> reset packet-drop interface
dropped packets on all the interfaces on the device.
specified type of interfaces.
dropped packets on the specified interface.
shutdown
Syntax
shutdown
undo shutdown
View
Ethernet port view
Default Level
2: System level
Parameters
None
Description
Use the shutdown command to shut down an Ethernet port.
Use the undo shutdown command to bring up an Ethernet port.
By default, an Ethernet port is in the up state.
In certain circumstances, modification to the interface parameters does not immediately take effect,
and therefore, you need to shut down the relative interface to make the modification work.
Note that in case of a Combo port, only one interface (either the optical port or the electrical port) is
active at a time. That is, once the optical port is active (after you execute the undoshutdown
command), the electrical port will be inactive automatically, and vice versa.
10: Specifies the interface auto-negotiation rate as 10 Mbps.
100: Specifies the interfa ce auto-negotiation rate as 100 Mbps.
1000: Specifies the interface auto -ne gotiation rate as 1000 Mbps..
Description
Use the speed auto command to configure the auto-negotiation rate range of the current Ethernet
port.
Use the undo speed command to restore the default.
The default value of the command varies with your device models.
If you repeatedly use the speed command and the speed auto command to configure the rate of an
interface, only the latest configuration takes effect. For example, if you configure speed 100 after
configuring speed auto 100 1000 on an interface, the rate is 100 Mbps by force, with no negotiation
performed between the interface and the peer end; if you configure speed auto 100 1000 after
configuring speed 100 on the interface, the rate through negotiation can be either 100 Mbps or 1000
Mbps only.
Notethat:
zIf the auto negotiation rate range specified on the local port and that on the peer do not overlap,
for example, 10 Mbps and 100 Mbps are specified on one end while 1000 Mbps is specified on
the other, the auto negotiation of interface rate will fail.
zIf the auto negotiation rate range specified on the local port and that on the peer overlap, for
example, 10 Mbps and 100 Mbps are specified on one end while 100 Mbps and 1000 Mbps are
specified on the other, the result of the interface rate auto negotiation is the overlapped part, that
is, 100 Mbps in the example.
1-30
Page 85
z If the auto negotiation rate range specified on the local port and that on the peer are the same,
z This function is available for auto-negotiation-capable Gigabit Layer-2 Ethernet electrical ports
z If you repeatedly use the speed and the speed auto commands to configure the transmission
Examples
# Set the auto-negotiation rate of interface GigabitEthernet 1/0/1 to 10 Mbps or 1000 Mbps.
for example, 100 Mbps and 1000 Mbps are specified on both ends, the result of the interface rate
auto negotiation is the larger value, that is, 1000 Mbps in the example.
only..
rate on an port, only the latest configuration takes effect.
all: Disables the storm constrain function for all types of packets (that is, multicast packets, and broadcast packets).
broadcast: Enables/Disables the storm constrain function for broadcast packets.
multicast: Enables/Disables the storm constrain function for multicast packets.
pps: Specifies the storm constrain threshold in terms of number of packets.
kbps: Specifies the storm constrain threshold in terms of number of kilobytes.
ratio: Specifies the storm constrain threshold in terms of percentages of the received packets to the
whole transmission capacity.
max-values: Upper threshold to be set, in pps, kbps, or percentages.
When the threshold is set in pps:
zFor a Gigabit port, the value range is 1 to 1488100.
1-31
Page 86
zFor a 10-Gigabit port, the value range is 1 to 14881000.
When the threshold is set in kbps:
z For a Gigabit port, the value range is 1 to 1000000.
z For a 10-Gigabit port, the value range is 1 to 10000000.
When the threshold is set in percentages, that is, keyword ratio is used, the value range is 1 to 100.
min-values: Lower threshold to be set, in pps, kbps, or percentages.
z For lower threshold to be set, in pps, this value ranges from 1 to max-values.
z For lower threshold to be set, in kbps, this value ranges from 1 to max-values.
z For lower threshold to be set, in percentages, this value ranges from 1 to max-values.
Description
Use the storm-constrain command to enable the storm constrain function for specific type of packets
and set the upper and lower thresholds.
Use the undo storm-constra in command to disable the storm constrain function for specific type of
packets.
By default, the storm constrain function is not enabled.
z Do not use the storm-constrain command along with the unicast-suppression command, the
z An upper threshold cannot be less than the corresponding lower threshold. Besides, do not
Examples
# Enable the storm constrain function for broadcast packets on
upper and lower threshold to 2000 kbps and 1500 kbps.
# Enable the storm constrain function for multicast packets on GigabitEthernet1/0/3 in terms of
percentages of the received multicast packets to the port’s total transmission capacity, setting the
upper and lower threshold to 80% and 15%.
multicast-suppression command, or the broadcast-suppression command. Otherwise, traffics
may be suppressed in an unpredictable way.
block: Blocks the traffic of a specific type on a port when the traffic detected exceeds the upper
threshold.
shutdown: Shuts down a port when a type of traf fic exceeds the correspon ding upper thresh old. A port
shut down by the storm constrain function stops forwarding all types of packets.
Description
Use the storm-constrain control command to set the action to be taken when a type of traffic
exceeds the corresponding upper threshold.
Use the undo storm-constrain control command to restore the default.
By default, no action is taken when a type of traffic exceeds the corresponding th reshold.
Examples
# Configure to block interface GigabitEthernet 1/0/1 when a type of traffic reaching it exceeds the
corresponding upper threshold.
<Sysname> system-view
[Sysname] interface GigabitEthernet 1/0/1
[Sysname-GigabitEthernet1/0/1] storm-constrain control block
Use the storm-constrain enable log command to enable log sending. With log sending enabled, the
system sends log when traffic reaching a port exceeds the corresponding threshold or the traffic drops
down below the lower threshold after exceeding the upper threshold.
1-33
Page 88
Use the undo storm-constrain enable log command to disable log sending.
By default, log sending is enabled.
Use the storm-constrain enable trap command to enable trap message sending. With trap message
sending enabled, the system sends trap messages when traffic reaching a port exceeds the
corresponding threshold or the traffic drops down below the lower threshold after exceeding the upper
threshold.
Use the undo storm-constrain enable trap command to disable trap message sendin g.
By default, trap message sending is enabled.
Examples
# Disable trap message sending for GigabitEthernet 1/0/1.
seconds: Interval for generating traffic statistics, in the range 1 to 300 (in seconds).
Description
Use the storm-constrain interval command to set the interval for generating traffic st atistics.
Use the undo storm-constrain interval command to restore the default.
By default, the interval for generating traffic statistics is 10 seconds.
zThe interval set by the storm-constrain interval command is specifically for the storm constrain
function. It is different form that set by the flow-interval command.
zFor network stability consideration, configure the interval for generating traffic statistics to a value
that is not shorter than the default.
Examples
# Set the interval for generating traffic statistics to 60 seconds.
unicast-suppression { ratio | pps max-pps }
undo unicast-suppression
View
Ethernet port view, port group view
Default Level
2: System level
Parameters
ratio: Maximum percentage of unicast traffic to the total transmission capability of an Ethernet port, in
the range of 1 to 100. The smaller the ratio is, the less unicast traffic is allowed through the interface.
pps max-pps: Specifies the maximum number of unknown unicast packets passing through an
Ethernet port per second (in pps, representing packets per second).
z For a Gigabit port, the value range is 1 to 1488100;
z For a 10-Gigabit port, the value range is 1 to 14881000.
1-35
Page 90
Note that:
z When a suppression granularity larger than 1 is specified on the device, the value of the pps
z When no suppression granularity is specified or the suppression granularity is set to 1, the value
Description
Use the unicast-suppression command to configure a unicast storm suppression ratio.
Use the undo unicast-suppression command to restore the default unicast suppression ratio.
By default, all unicast traffic is allowed to go through an Ethernet port, that is, unicast traffic is not
suppressed.
If you execute this command in Ethernet port view, the configurations take effect only on the current
interface. If you execute this command in port-group view, the configurations take effect on all ports in
the port group
keyword should be no smaller than and an integral multiple of the granularity. The unicast
suppression threshold value configured through this keyword on an Ethernet port may not be the
one that actually takes effect. To display the actual unicast suppression threshold value on an
Ethernet port, you can use the display interface command.
of the pps keyword should be no smaller than 1, and the unicast suppression threshold value is
the one that actually takes effect on the Ethernet port.
Note that when unicast traffic exceeds the maximum value configured, the system will discard the
extra packets so that the unknown unicast traffic ratio can drop below the limit to ensure that the
network functions properly.
z If you set different suppression ratios in Ethernet port view or port-group view repeatedly, the
z Do not use the unicast-suppression command along with the storm-constrain command.
Examples
# For Ethernet port GigabitEthernet 1/0/1, allow unknown unicast traffic equivalent to 20% of the total
transmission capability of the interface to pass and suppress the excessive unknown uni cast packets.
Otherwise, the unicast storm suppression ratio configured may get invalid.
# For all the ports of the manual port group group1, al low unkno wn unicast traffic equivalent to 20% of
the total transmission capability of each port to pass and suppress excessive unknown unicast
packets.
Use the virtual-cable-test command to test the cable connected to the Ethernet port once and to
display the testing result. The tested items include:
Note that:
z When the cable is functioning properly, the cable length in the test result represents the total cable
z When the cable is not functioning properly, the cable length in the test result represents the length
z 10-Gigabit ports and optical interfaces of SFP ports do not support this command.
z A link in the up state goes down and then up automatically if you execute this command on one of
z The test result is for your information only. The maximum error in the tested cable length is 5 m. A
Examples
# Enable the virtual cable test for the interface GigabitEthernet 1/0/1.
from the current interface to the failed position.
the Ethernet ports forming the link.
hyphen “-” indicates that the corresponding test item is not supported.
1-37
Page 92
2 Link Aggregation Configuration Commands
Link Aggregation Configuration Commands
description
Syntax
description text
undo description
View
Layer-2 aggregate interface view
Default Level
2: System level
Parameters
text: Description of an Ethernet interface, a string of 1 to 80 characters. Currently, the device supports
the following types of characters or symbols: standard English characters (numbers and case-sensitive
letters), special English characters, spaces, and other characters or symbols that conform to the
Unicode standard.
zA port description can be the mixture of English characters and other Unicode characters. The
mixed description cannot exceed the specified length.
zTo use a type of Unicode characters or symbols in a port description, you need to install the
corresponding Input Method Editor (IME) and log in to the device through remote login software
that supports this character type.
zEach Unicode character or symbol (non-English characters) takes the space of two regular
characters. When the length of a description string reaches or exceeds the maximum line width on
the terminal software, the software starts a new line, possibly breaking a Unicode character into
two. As a result, garbled characters may be displayed at the end of a line.
Description
Use the description command to set the description of the current interface.
Use the undo description command to restore the default.
By default, the description of an interface is interface-name Interface, such as Bridge-Aggregation1
Interface.
2-1
Page 93
Examples
# Set the description of interface Bridge-aggregation 1 to link-aggregation interface.
Use the display lacp system-id command to display the system ID of the local system (that is, the
actor).
The system ID comprises the system LACP priority and the system MAC address.
You can use the lacp system-priority command to change the LACP priority of the local system.
When you do that, the LACP priority value you specify in the command is in decimal format. However,
it is displayed as a hexadecimal value with the display lacp system-id command.
Related commands: lacp system-priority.
Examples
# Display the local system ID.
<Sysname> display lacp system-id
Actor System ID: 0x8000, 00e0-fc00-0100
The local system ID, which comprises the LA CP system priority
(0x8000 in this sample output) and the system MAC address
(00e0-fc00-0100 in this sample output).
bridge-aggregation: Displays the load sharing mode of the aggregation group corresponding to the specified Layer 2 aggregate interface.
interface-number: Specifies the number of an existing aggregate interface.
Description
Use the display link-aggregation load-sharing mode command to display load sharing mode for link
aggregation groups.
To display the global link aggregation load sharing mode, perform the command without the interface
keyword.
To display the load sharing mode of the aggregation group corresponding to each aggregate interface,
perform the command with the interface keyword but do not specify a particular interface.
To display the load sharing mode of a particular aggregation group, perform the command with the
aggregate interface specified.
Examples
# Display the default global link aggregation load sharing mode.
# Display the configured link aggregation load sharing mode of the aggregation group corresponding
to Layer 2 aggregate interface Bridge-Aggregation 10.
The default load sharing mode for Layer-2 traffic. In this
sample output, it is based on source MAC address and
destination MAC address.
The default load sharing mode for Layer-3 traffic. In this
sample output, it is based on source IP address and
destination IP address.
The user-configured link aggregation load sharing
mode. In this sample output, it is based on source MAC
address and destination MAC address.
Default Level
1: Monitor level
Parameters
interface-type interface-number: Port type and port number.
to: Specifies an interface range in the form of interface-type interface-number to interface-type
interface-number, where the start interface number must be smaller than the end interface number.
Note that both the start interface and the end interface are inclusive.
2-4
Page 96
Description
Use the display link-aggregation member-port command to display the detailed link aggregation
information of the specified interface(s) or all interfaces if no interface is specified.
For an interface in a static aggregation group, only its port number and operational key are displayed,
because it is not aware of the information of the partner.
Examples
# Display the detailed link aggregation information of GigabitEthernet 1/0/1, which is in a static
aggregation group.
One-octet LACP state flags field. From the least to the most significant
bit, they are represented by A through H as follows:
zA indicates whether LACP is enabled. 1 for enabled and 0 for
disabled.
zB indicates the timeout control value. 1 for short timeout, and 0 for
long timeout.
zC indicates whether the link is considered as aggregatable by the
sending system. 1 for true, and 0 for false.
zD indicates whether the link is considered as synchronized by the
sending system. 1 for true, and 0 for false.
Flags
zE indicates whether the sending system con siders tha t collection of
incoming frames is enabled on the link. 1 for true and 0 for false.
zF indicates whether the sending system considers that distribution
of outgoing frames is enabled on the link. 1 for true and 0 for false.
zG indicates whether the receive state machine of the sending
system is using default operational partner information. 1 for true
and 0 for false.
zH indicates whether the receive state machine of the sending
system is in the expired state. 1 for true and 0 for false.
If a flag bit is set to 1, the corresponding English letter that otherwise is
not output is displayed.
Aggregation Interface Aggregate interface to which the port belongs
Local:
Port Number
Port Priority
Oper-key
Flag
Remote:
System ID
Port Number
Port Priority
Oper-key
Flag
Received LACP Packets Number of LA CP packets received
Illegal Number of illegal packets
Sent LACP Packets Number of LACP packets sent
Information about the local end:
z Port Number: Number of the port.
z Port Priority: LACP priority of the port.
z Oper-key: Operational key
z Flag: LACP protocol state flag.
Information about the remote end:
zSystem ID: System ID of the remote end, comprising the system
LACP priority and the system MAC address.
z Port Number: Number of the port.
z Port Priority: LACP priority of the port.
z Oper-key: Operational key
z Flag: LACP protocol state flag.
display link-aggregation summary
Syntax
display link-aggregation summary
View
Any view
2-6
Page 98
Default Level
1: Monitor level
Parameters
None
Description
Use the display link-aggregation summary command to display the summary information of all
aggregation groups.
You may find out that information about the remote system for a static link aggregation group is either
replaced by none or not displayed at all. This is normal because this type of aggregation group is not
aware of its partner.
Examples
# Display the summary information of all aggregation groups.
<Sysname> display link-aggregation summary
Aggregation Interface Type:
BAGG -- Bridge-Aggregation, RAGG -- Route-Aggregation
Aggregation Mode: S -- Static, D -- Dynamic
Loadsharing Type: Shar -- Loadsharing, NonS -- Non-Loadsharing
Actor System ID: 0x8000, 000f-e267-6c6a
AGG AGG Partner ID Select Unselect Share
Interface Mode Ports Ports Type
------------------------------------------------------------------------BAGG1 S none 1 0 Shar
BAGG10 D 0x8000, 000f-e267-57ad 2 0 Shar
bridge-aggregation: Displays detailed information about the Layer-2 aggregate grou ps correspondin g
to Layer-2 aggregate interfaces.
interface-number: Aggregate interface number. Note that the aggregate interface you specify must
already exist.
Description
Use the display link-aggregation verbose command to display detailed information about the
aggregation groups corresponding to the aggregate interfaces.
To display the information of a specific Layer-2 aggregate group, use the display link-aggregationverbose bridge-aggregationinterface-number command.
To display the information of all Layer-2 aggregate groups, use the display link-aggregationverbose bridge-aggregation command.
To display the information of all aggregate groups, use the display link-aggregationverbose
command.
Examples
# Display the detailed information of the aggregation group corresponding to Layer-2 aggregate
interface Bridge-aggregation 10.
Loadsharing Type: Shar -- Loadsharing, NonS -- Non-Loadsharing
Port Status: S -- Selected, U -- Unselected
Flags: A -- LACP_Activity, B -- LACP_Timeout, C -- Aggregation,
D -- Synchronization, E -- Collecting, F -- Distributing,
G -- Defaulted, H -- Expired
Aggregation Interface: Bridge-Aggregation10
2-8
Page 100
Aggregation Mode: Dynamic
Loadsharing Type: Shar
System ID: 0x8000, 000f-e267-6c6a
Local:
Port Status Priority Oper-Key Flag
------------------------------------------------------------------------ GE1/0/6 S 32768 2 {ACDEF}
GE1/0/12 S 32768 2 {ACDEF}
Remote:
Actor Partner Priority Oper-Key SystemID Flag