NEC N8406-022A Command Reference Guide

Part number: 856-126757-306-00
456-01767-000
PN# 456-01767-000
N8406-022A 1Gb Intelligent L2 Switch
Command Reference Guide (ISCLI)
Legal notices © 2008 NEC Corporation The information contained herein is subject to change without notice. The only warranties for NEC products and services are set forth in the
express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. NEC shall not be liable for technical or editorial errors or omissions contained herein.
Microsoft®, Windows®, and Windows NT® are U.S. registered trademarks of Microsoft Corporation. SunOS™ and Solaris™ are trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Cisco® is a registered trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Part number: 856-126757-306-00 First edition: July 2008
2
Contents
ISCLI Reference
Introduction ............................................................................................................................................................. 7
Additional references .............................................................................................................................................. 7
Connecting to the switch ........................................................................................................................................ 7
Establishing a console connection .................................................................................................................... 7
Setting an IP address ........................................................................................................................................ 8
Establishing a Telnet connection ...................................................................................................................... 8
Establishing an SSH connection ....................................................................................................................... 8
Accessing the switch .............................................................................................................................................. 9
Idle timeout ........................................................................................................................................................... 10
Typographical conventions ................................................................................................................................... 10
ISCLI basics
Introduction ........................................................................................................................................................... 12
Accessing the ISCLI ............................................................................................................................................. 12
ISCLI Command Modes ....................................................................................................................................... 12
Global commands ................................................................................................................................................. 13
Command line interface shortcuts ........................................................................................................................ 14
Command abbreviation ................................................................................................................................... 14
Tab completion ................................................................................................................................................ 14
Information Commands
Introduction ........................................................................................................................................................... 15
System Information commands ............................................................................................................................ 16
SNMPv3 Information commands .......................................................................................................................... 16
SNMPv3 USM User Table information ............................................................................................................ 17
SNMPv3 View Table information .................................................................................................................... 17
SNMPv3 Access Table information................................................................................................................. 18
SNMPv3 Group Table information .................................................................................................................. 19
SNMPv3 Community Table information .......................................................................................................... 19
SNMPv3 Target Address Table information .................................................................................................... 20
SNMPv3 Target Parameters Table information .............................................................................................. 20
SNMPv3 Notify Table information ................................................................................................................... 21
SNMPv3 dump ................................................................................................................................................ 22
System information ............................................................................................................................................... 23
Show recent syslog messages ............................................................................................................................. 24
System user information ....................................................................................................................................... 24
Layer 2 information ............................................................................................................................................... 25
FDB information commands ................................................................................................................................. 26
Show all FDB information ................................................................................................................................ 26
Link Aggregation Control Protocol information ..................................................................................................... 27
LACP dump ..................................................................................................................................................... 27
Spanning Tree information ................................................................................................................................... 28
Rapid Spanning Tree and Multiple Spanning Tree information ............................................................................ 29
Common Internal Spanning Tree information ....................................................................................................... 31
Trunk group information ....................................................................................................................................... 33
VLAN information ................................................................................................................................................. 33
Layer 3 information ............................................................................................................................................... 34
ARP information ................................................................................................................................................... 34
Show all ARP entry information ...................................................................................................................... 35
ARP address list information ........................................................................................................................... 35
IP information ....................................................................................................................................................... 35
IGMP multicast group information ........................................................................................................................ 36
IGMP multicast router port information ................................................................................................................. 36
RMON Information ................................................................................................................................................ 36
RMON history information ............................................................................................................................... 36
RMON alarm information ................................................................................................................................ 37
RMON event information ................................................................................................................................. 38
Link status information .......................................................................................................................................... 39
Port information .................................................................................................................................................... 40
Logical Port to GEA Port mapping ........................................................................................................................ 41
Uplink Failure Detection information ..................................................................................................................... 42
Command Reference Guide (ISCLI) Command Reference Guide (ISCLI) 3
Information dump .................................................................................................................................................. 42
Statistics commands
Introduction ........................................................................................................................................................... 43
Port Statistics ........................................................................................................................................................ 43
Bridging statistics ............................................................................................................................................ 44
Ethernet statistics ............................................................................................................................................ 44
Interface statistics ........................................................................................................................................... 46
Internet Protocol (IP) statistics ........................................................................................................................ 47
Link statistics ................................................................................................................................................... 48
Port RMON statistics ....................................................................................................................................... 48
Layer 2 statistics ................................................................................................................................................... 50
FDB statistics .................................................................................................................................................. 50
LACP statistics ................................................................................................................................................ 50
Layer 3 statistics ................................................................................................................................................... 51
IP statistics ...................................................................................................................................................... 51
ARP statistics .................................................................................................................................................. 52
DNS statistics .................................................................................................................................................. 53
ICMP statistics ................................................................................................................................................ 53
TCP statistics .................................................................................................................................................. 54
UDP statistics .................................................................................................................................................. 55
IGMP Multicast Group statistics ...................................................................................................................... 56
GEA Layer 3 statistics .......................................................................................................................................... 56
GEA Layer 3 statistics ..................................................................................................................................... 56
Management Processor statistics ......................................................................................................................... 57
Packet statistics .............................................................................................................................................. 57
TCP statistics .................................................................................................................................................. 58
UDP statistics .................................................................................................................................................. 58
CPU statistics .................................................................................................................................................. 58
SNMP statistics .................................................................................................................................................... 59
NTP statistics ........................................................................................................................................................ 61
Uplink Failure Detection statistics ......................................................................................................................... 62
Statistics dump ..................................................................................................................................................... 62
Configuration Commands
Introduction ........................................................................................................................................................... 63
Viewing and saving changes ................................................................................................................................ 63
Saving the configuration ....................................................................................................................................... 63
System configuration ................................................................................................ ............................................ 64
System host log configuration ......................................................................................................................... 65
Secure Shell Server configuration................................................................................................................... 66
RADIUS server configuration .......................................................................................................................... 67
TACACS+ server configuration ....................................................................................................................... 68
NTP server configuration ................................................................................................................................ 69
System SNMP configuration ........................................................................................................................... 70
SNMPv3 configuration .................................................................................................................................... 71
SNMPv3 User Security Model configuration ................................................................................................... 72
SNMPv3 View configuration ............................................................................................................................ 72
SNMPv3 View-based Access Control Model configuration............................................................................. 73
SNMPv3 Group configuration ......................................................................................................................... 73
SNMPv3 Community Table configuration ....................................................................................................... 74
SNMPv3 Target Address Table configuration ................................................................................................. 74
SNMPv3 Target Parameters Table configuration ........................................................................................... 75
SNMPv3 Notify Table configuration ................................................................................................................ 75
System Access configuration .......................................................................................................................... 76
Management Networks configuration .............................................................................................................. 76
User Access Control configuration .................................................................................................................. 77
User ID configuration ...................................................................................................................................... 77
HTTPS Access configuration .......................................................................................................................... 78
Port configuration ................................................................................................................................................. 79
Temporarily disabling a port ............................................................................................................................ 79
Port link configuration ...................................................................................................................................... 80
Layer 2 configuration ............................................................................................................................................ 80
Rapid Spanning Tree Protocol / Multiple Spanning Tree Protocol configuration .................................................. 81
Common Internal Spanning Tree configuration .............................................................................................. 82
CIST bridge configuration ............................................................................................................................... 82
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI) 4
CIST port configuration ................................................................................................................................... 83
Spanning Tree configuration ................................................................................................................................ 84
Bridge Spanning Tree configuration ................................................................................................................ 85
Spanning Tree port configuration .................................................................................................................... 86
Forwarding Database configuration ...................................................................................................................... 87
Static FDB configuration ................................................................................................................................. 87
Trunk configuration ............................................................................................................................................... 87
Layer 2 IP Trunk Hash configuration ............................................................................................................... 88
Link Aggregation Control Protocol configuration .................................................................................................. 88
LACP Port configuration .................................................................................................................................. 89
VLAN configuration ............................................................................................................................................... 89
Layer 3 configuration ............................................................................................................................................ 90
IP interface configuration ................................................................................................................................ 90
Default Gateway configuration ........................................................................................................................ 91
Address Resolution Protocol configuration ........................................................................................................... 91
IGMP configuration ............................................................................................................................................... 92
IGMP snooping configuration .......................................................................................................................... 92
IGMP static multicast router configuration ...................................................................................................... 93
IGMP filtering configuration ............................................................................................................................. 93
IGMP filter definition ........................................................................................................................................ 93
IGMP filtering port configuration...................................................................................................................... 94
Domain Name System configuration .................................................................................................................... 94
Remote Monitoring configuration .......................................................................................................................... 95
RMON history configuration ............................................................................................................................ 95
RMON event configuration .............................................................................................................................. 95
RMON alarm configuration .............................................................................................................................. 96
Port mirroring ........................................................................................................................................................ 97
Port-based port mirroring ................................................................................................................................ 97
Uplink Failure Detection configuration .................................................................................................................. 98
Failure Detection Pair configuration ................................................................................................................ 98
Link to Monitor configuration ........................................................................................................................... 99
Link to Disable configuration ........................................................................................................................... 99
Configuration Dump ............................................................................................................................................ 100
Saving the active switch configuration ................................................................................................................ 100
Restoring the active switch configuration ........................................................................................................... 100
Operations Commands
Introduction ......................................................................................................................................................... 101
Operations-level port options ........................................................................................................................ 101
Boot Options
Introduction ......................................................................................................................................................... 102
Updating the switch software image ................................................................................................................... 102
Downloading new software to the switch ...................................................................................................... 102
Selecting a software image to run ...................................................................................................................... 103
Uploading a software image from the switch ...................................................................................................... 104
Selecting a configuration block ........................................................................................................................... 104
Resetting the switch ........................................................................................................................................... 105
Accessing the AOS CLI ...................................................................................................................................... 105
Current switch software information ................................................................................................................... 105
Maintenance Commands
Introduction ......................................................................................................................................................... 106
System maintenance ..................................................................................................................................... 106
Forwarding Database maintenance .............................................................................................................. 106
Debugging options ........................................................................................................................................ 107
ARP cache maintenance ............................................................................................................................... 107
IGMP Snooping maintenance ....................................................................................................................... 108
IGMP Mrouter maintenance .......................................................................................................................... 108
Technical support dump ................................................................................................................................ 108
FTP/TFTP technical support dump put ......................................................................................................... 108
Uuencode flash dump ................................................................................................................................... 109
FTP/TFTP system dump put ......................................................................................................................... 109
Clearing dump information ............................................................................................................................ 109
Panic command ............................................................................................................................................ 110
Unscheduled system dumps .............................................................................................................................. 110
Command Reference Guide (ISCLI) Command Reference Guide (ISCLI) 5
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI) 6
ISCLI Reference
Table 1 Console configuration parameters
Parameter
Value
Baud Rate
9600
Data Bits
8
Parity
None
Stop Bits
1
Flow Control
None
Introduction
The 1Gb Intelligent L2 Switch is ready to perform basic switching functions right out of the box. Some of the more advanced features, however, require some administrative configuration before they can be used effectively.
The extensive switching software included in the switch provides a variety of options for accessing and configuring the switch:
Text-based command line interfaces (AOS CLI and ISCLI) for access via a local terminal or remote
Telnet/Secure Shell (SSH) session
Simple Network Management Protocol (SNMP) support for access through network management software
such as NEC WebSAM NetvisorPro
A browser-based management interface for interactive network access through a Web browser
The ISCLI provides a direct method for collecting switch information and performing switch configuration. Use a basic terminal to view information and statistics about the switch, and to perform any necessary configuration.
This guide describes how to use and configure on the Layer2 switch mode of the switch. The switch does not provide ISCLI on the SmartPanel.
This chapter explains how to access the ISCLI to the switch.
Additional references
Additional information about installing and configuring the switch is available in the following guides, which are attached in this product.
N8406-022A 1Gb Intelligent L2 Switch Users Guide N8406-022A 1Gb Intelligent L2 Switch Application Guide N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (AOS) N8406-022A 1Gb Intelligent L2 Switch Browser-based Interface Reference Guide N8406-022A 1Gb Intelligent L2 Switch SmartPanel Reference Guide
Connecting to the switch
You can access the command line interface in one of the following ways:
Using a console connection via the console port Using a Telnet connection over the network Using a Secure Shell (SSH) connection to securely log in over a network
Establishing a console connection
To establish a console connection with the switch, you need:
A null modem cable with a female DB-9 connector (See the Users Guide for more information.) An ASCII terminal or a computer running terminal emulation software set to the parameters shown in the table
below
Command Reference Guide (ISCLI) Command Reference Guide (ISCLI) 7
telnet <1Gb Intelligent L2 Switch IP address>
To establish a console connection with the switch:
1. Connect the terminal to the console port using the null modem cable.
2. Power on the terminal.
3. Press the Enter key a few times on the terminal to establish the connection.
4. You will be required to enter a password for access to the switch.
Setting an IP address
To access the switch via a Telnet or an SSH connection, you need to have an Internet Protocol (IP) address set for the switch. The switch can get its IP address in one of the following ways:
Management port access:
Using a Dynamic Host Control Protocol (DHCP) serverWhen the dhcp client is enabled, the
management interface (interface 256) requests its IP address from a DHCP server. The default value for the dhcp client is enabled.
Configuring manuallyIf the network does not support DHCP, you must configure the management
interface (interface 256) with an IP address. If you want to access the switch from a remote network, you also must configure the management gateway (gateway 4).
Uplink port access:
Using a Bootstrap Protocol (BOOTP) serverBy default, the management interface is set up to request
its IP address from a BOOTP server. If you have a BOOTP server on the network, add the Media Access Control (MAC) address of the switch to the BOOTP configuration file located on the BOOTP server. The
MAC address can be found in the System Information menu (See the ―System Information commands‖ section in the ―Information Commands‖ chapter.) If you are using a DHCP server that also does BOOTP,
you do not have to configure the MAC address.
Configuring manuallyIf the network does not support BOOTP, you must configure the management port
with an IP address.
Establishing a Telnet connection
A Telnet connection offers the convenience of accessing the switch from any workstation connected to the network. Telnet provides the same options for user, operator, and administrator access as those available through the console port. By default, Telnet is enabled on the switch. The switch supports four concurrent Telnet connections.
Once the IP parameters are configured, you can access the ISCLI using a Telnet connection. To establish a Telnet connection with the switch, run the Telnet program on the workstation and enter the telnet command, followed by the switch IP address:
You will then be prompted to enter a password. The password determines the access level: administrator, operator, or user. See the ―Accessing the switch‖ section later in this chapter for description of default passwords.
Establishing an SSH connection
Although a remote network administrator can manage the configuration of a switch via Telnet, this method does not provide a secure connection. The Secure Shell (SSH) protocol enables you to securely log into this switch over the network.
As a secure alternative to using Telnet to manage switch configuration, SSH ensures that all data sent over the
network is encrypted and secure. In order to use SSH, you must first configure it on the switch. See the ―Secure
Shell Server configuration‖ section in the ―Configuration Commands‖ chapter for information on how to configure SSH.
The switch can perform only one session of key/cipher generation at a time. Therefore, an SSH/Secure Copy (SCP) client will not be able to log in if the switch is performing key generation at that time or if another client has just logged in before this client. Similarly, the system will fail to perform the key generation if an SSH/SCP client is logging in at that time.
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI) 8
The supported SSH encryption and authentication methods are listed below.
NOTE: This switch implementation of SSH is based on versions 1.5 and 2.0, and supports SSH clients from version 1.0 through version 2.0. SSH clients of other versions are not supported. You may configure the client software to use protocol SSH version 1 or version 2.
>> # ssh <user>@<1Gb Intelligent L2 Switch IP address>
NOTE: The first time you run SSH from the workstation, a warning message might appear. At the prompt, enter yes to continue.
NOTE: It is recommended that you change default switch passwords after initial configuration and as
regularly as required under your network security policies. For more information, see the ―Setting passwords‖
section in the ―First-time configuration‖ chapter.
Server Host AuthenticationClient RSA authenticates the switch in the beginning of every connection Key ExchangeRSA Encryption:
AES256-CBC AES192-CBC AES128-CBC 3DES-CBC 3DES ARCFOUR
User AuthenticationLocal password authentication; Remote Authentication Dial-in User Service (RADIUS)
The following SSH clients are supported:
SSH 3.0.1 for Linux (freeware) SecureCRT® 4.1.8 (VanDyke Technologies, Inc.) OpenSSH_3.9 for Linux (FC 3) FedoraCore 3 for SCP commands PuTTY Release 0.58 (Simon Tatham) for Windows
By default, SSH service is not enabled on the switch. Once the IP parameters are configured, you can access the ISCLI to enable SSH.
To establish an SSH connection with the switch, run the SSH program on the workstation by issuing the ssh command, followed by the user account name and the switch IP address:
You will then be prompted to enter your password.
Accessing the switch
To enable better switch management and user accountability, this switch provides different levels or classes of user access. Levels of access to the CLI and Web management functions and screens increase as needed to perform various switch management tasks. The three levels of access are:
User Interaction with the switch is completely passivenothing can be changed on this switch. Users may
display information that has no security or privacy implications, such as switch statistics and current operational state information.
Operator Interaction with the switch is completely passivenothing can be changed on this switch. Users
may display information that has no security or privacy implications, such as switch statistics and current operational state information.
Administrator Administrators are the only ones that may make permanent changes to the switch
configurationchanges that are persistent across a reload/reset of the switch. Administrators can access switch functions to configure and troubleshoot problems on this switch. Because administrators can also make temporary (operator-level) changes as well, they must be aware of the interactions between temporary and permanent changes.
Access to switch functions is controlled through the use of unique usernames and passwords. Once you are connected to the switch via the local console, Telnet, or SSH, you are prompted to enter a password. The password entered determines the access level. The default user names/password for each access level is listed in the following table.
Command Reference Guide (ISCLI) Command Reference Guide (ISCLI) 9
Table 2 User access levels
User account
Description and tasks performed
User
The User has no direct responsibility for switch management. He or she can view all switch status information and statistics, but cannot make any configuration changes to the switch. The user account is enabled by default, and the default password is user.
Oper
The Operator has no direct responsibility for switch management. He or she can view all switch status information and statistics, but cannot make any configuration changes to the switch. By default, the operator account is disabled and has no password.
Admin
The super user administrator has complete access to all command modes on the switch, including the ability to change both the user and administrator passwords. The admin account is enabled by default, and the default password is admin.
NOTE: With the exception of the admin user, access to each user level can be disabled by setting the password to an empty value.
Typeface or symbol
Meaning
angle brackets < >
Indicate a variable to enter based on the description inside the brackets. Do not type the brackets as you enter the command. Example: If the command syntax is
ping <IP address>
you enter
ping 192.32.10.12
bold body text
Indicates objects, such as window names, icons, and user-interface objects, such as buttons and tabs.
bold Courier text
Indicates command names, options, and text that you must enter. Example: Use the show ip arp commands.
plain Courier text
Indicates command syntax and system output (for example: prompts and system messages). Example:
configure terminal
braces { }
Indicate required elements in syntax descriptions where there is more than one option. You must choose only one of the options. Do not type the braces when entering the command. Example: If the command syntax is
show portchannel {<1-12>|hash|information}
you must enter:
show portchannel <1-12>
or
show portchannel hash
or
show portchannel information
Once you enter the administrator password and it is verified, you are given complete access to this switch.
Idle timeout
By default, this switch disconnects the console, Telnet, or SSH session after five minutes of inactivity. This function is controlled by the idle timeout parameter, which can be set from 1 to 60 minutes. To change this parameter, see the ―System configuration‖ section in the ―Configuration Commands‖ chapter.
Typographical conventions
The following table describes the typographic styles used in this guide:
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI) 10
Typeface or symbol
Meaning
brackets [ ]
Indicate optional elements in syntax descriptions. Do not type the brackets when entering the command. Example: If the command syntax is
show ip interface [<1-256>]
you can enter
show ip interface
or
show ip interface 1
italic text
Indicates variables in command syntax descriptions. Also indicates new terms and book titles. Where a variable is two or more words, the words are connected by a hyphen. Example: If the command syntax is
show spanning-tree stp <1-32>
1-32 represents a number between 1-32.
vertical line |
Separates choices for command keywords and arguments. Enter only one of the choices. Do not type the vertical line when entering the command. Example: If the command syntax is
show portchannel {<1-12>|hash|information}
you must enter:
show portchannel <1-12>
or
show portchannel hash
or
show portchannel information
Command Reference Guide (ISCLI) Command Reference Guide (ISCLI) 11
Main# boot/mode iscli
Switch(config)# boot cli-mode aos
Table 3 ISCLI Command Modes
Command Mode/Prompt
Command used to enter or exit.
User EXEC
Switch>
Default mode, entered automatically Exit: exit or logout
Privileged EXEC
Switch#
Enter Privileged EXEC mode, from User EXEC mode: enable Exit to User EXEC mode: disable Quit ISCLI: exit or logout
Global configuration
Switch(config)#
Enter Global Configuration mode, from Privileged EXEC mode:
configure terminal
Exit to Privileged EXEC mode: end or exit
Port configuration
Switch(config-if)#
Enter Port Configuration mode, from Global Configuration mode:
interface gigabitethernet <port number>
Exit to Global Configuration mode: exit Exit to Privileged EXEC mode: end
VLAN configuration
Switch(config-vlan)#
Enter VLAN Configuration mode, from Global Configuration mode: vlan <1-4095> Exit to Global Configuration mode: exit Exit to Privileged EXEC mode: end
Interface IP configuration
Switch(config-ip-if)#
Enter Interface IP Configuration mode, from Global Configuration mode:
interface ip <1-256>
Exit to Global Configuration mode: exit Exit to Privileged EXEC mode: end
ISCLI basics
Introduction
The ISCLI is used for viewing switch information and statistics. In addition, the administrator can use the CLI for performing all levels of switch configuration.
This chapter describes the ISCLI Command Modes, and provides a list of commands and shortcuts that are commonly available from all the command modes within the ISCLI.
Accessing the ISCLI
The first time you start this switch, it boots into the AOS CLI. To access the ISCLI, enter the following command and reset the switch:
To access the AOS CLI, enter the following command from the ISCLI and reload the switch:
The switch retains your CLI selection, even when you reset the configuration to factory defaults. The CLI boot mode is not part of the configuration settings.
ISCLI Command Modes
The ISCLI has three major command modes, listed in order of increasing privileges, as follows: User EXEC mode: This is the initial mode of access. By default, password checking is disabled for this mode. Privileged EXEC mode: The mode is accessed from User EXEC mode. If the Privileged EXEC password is
enabled, you must enter a password to access Privileged EXEC mode. Global Configuration mode: This mode allows you to make changes to the running configuration of the switch. If
you save the configuration, the settings survive a reload of the switch. Several submodes are available within the Global Configuration mode (the following table for more information.
Each command mode provides a specific set of commands. The command set of each higher-privilege mode is a superset of the lower-privilege mode(s). All commands available in lower-lower-privilege modes are available in the higher-privilege modes.
The following table describes the ISCLI command modes.
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI) 12
Table 3 ISCLI Command Modes
Command Mode/Prompt
Command used to enter or exit.
FDP configuration
Switch(config-fdp)#
Enter RIP Configuration mode, from Global Configuration mode: ufd fdp <1-4> Exit to Global Configuration mode: exit Exit to Privileged EXEC mode: end
Table 4 Global commands
Command
Action
?
Provides more information about a specific command or lists commands available at the current level.
exit
Go up one level in the command-mode structure.
copy running-config startup-config
Write configuration changes to flash memory.
exit or quit
Exit from the command line interface and log out.
ping
Verify station-to-station connectivity across the network. The format is as follows:
ping <host name> | <IP address> [<number of tries>] [<msec delay>]
IP address is the hostname or IP address of the device. number of tries (optional) is the number of attempts
(1-32).
msec delay (optional) is the number of milliseconds between
attempts.
traceroute
Identifies the route used for station-to-station connectivity across the network. The format is as follows:
traceroute <host name> | <IP address> [<max-hops>] [<msec delay>]
IP address is the hostname or IP address of the target
station.
max-hops (optional) is the maximum distance to trace
(1-16 devices)
msec delay (optional) is the number of milliseconds to wait
for the response.
telnet
Allows you to Telnet out of the switch. The format is as follows:
telnet <host name> | <IP address> [<port number>]
show history
Displays the 10 most recent commands.
console-log
Enables or disables console logs for the current session.
who
Displays a list of users who are currently logged in.
Global commands
Some basic commands are recognized throughout the ISCLI hierarchy. These commands are useful for obtaining online Help, navigating through the interface, and saving configuration changes. To get help about a specific command, type the command, followed by help.
The following table describes the global commands.
Command Reference Guide (ISCLI) Command Reference Guide (ISCLI) 13
Switch(config)# spanning-tree stp 1 bridge hello-time 2
Switch(config)# sp stp 1 br h 2
Command line interface shortcuts
The following shortcuts allow you to enter commands quickly and easily.
Command abbreviation
Most commands can be abbreviated by entering the first characters that distinguish the command from the others in the same mode. For example, consider the following full command:
The command shown above could also be entered as:
Tab completion
Entering the first letter of a command at any prompt and press the Tab key to display all available commands or options that begin with that letter. Entering additional letters further refines the list of commands or options displayed.
If only one command fits the input text when you press the Tab key, that command is supplied on the command line, waiting to be entered.
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI) 14
Information Commands
Table 5 Information commands
Command
Usage
show sys-info
Displays system information. Command mode: All
show layer2 information
Displays Layer 2 information. Command mode: All
show layer3 information
Displays Layer 3 information. Command mode: All
show rmon
Displays Remote Monitoring Information. Command mode: All
show interface link
Displays configuration information about each port, including:
Port number Port speed (10 Mb/s, 100 Mb/s, 1000 Mb/s, or any) Duplex mode (half, full, or any) Flow control for transmit and receive (no, yes, or any) Link status (up or down)
Command mode: All
show interface information
Displays port status information, including:
Port number Whether the port uses VLAN tagging or not Port VLAN ID (PVID) Port name VLAN membership
Command mode: All
show geaport
Displays GEA port mapping information, used by service personnel. Command mode: All
show ufd
Displays Uplink Failure Detection information. Command mode: All
show information-dump
Dumps all switch information available (10K or more, depending on your configuration). If you want to capture dump data to a file, set your communication software on your workstation to capture session data prior to issuing the dump commands. Command mode: All
Introduction
You can view configuration information for the switch in the ISCLI. This chapter discusses how to use the ISCLI to display switch information.
The following table describes general information commands.
Command Reference Guide (ISCLI) Command Reference Guide (ISCLI) 15
Table 6 System Information commands
Command
Usage
show snmp-server v3
Displays SNMP v3 information. Command mode: All
show sys-info
Displays system information, including:
System date and time Switch model name and number Switch name and location MAC address of the switch management processor IP address of IP interface #1 Hardware version and part number Software image file and version number Configuration name Log-in banner, if one is configured
Command mode: All
show logging messages
Displays most recent syslog messages. Command mode: All
show access user
Displays User Access information. Command mode: All except User EXEC
Table 7 SNMPv3 Information commands
Command
Usage
show snmp-server v3 user
Displays User Security Model (USM) table information. Command mode: All
show snmp-server v3 view
Displays information about view name, subtrees, mask and type of view. Command mode: All
show snmp-server v3 access
Displays View-based Access Control information. Command mode: All
show snmp-server v3 group
Displays information about the group that includes the security model, user name, and group name. Command mode: All
show snmp-server v3 community
Displays information about the community table. Command mode: All
show snmp-server v3 target-address
Displays the Target Address table. Command mode: All
show snmp-server v3 target-parameters
Displays the Target parameters table. Command mode: All
show snmp-server v3 notify
Displays the Notify table. Command mode: All
show snmp-server v3
Displays all the SNMPv3 information. Command mode: All
System Information commands
The following table describes the System Information commands.
SNMPv3 Information commands
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework by supporting the following:
a new SNMP message format security for messages access control remote configuration of SNMP parameters
For more details on the SNMPv3 architecture, see RFC2271 to RFC2276. The following table describes the SNMPv3 Information commands.
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI) 16
SNMPv3 USM User Table information
usmUser Table User Name Protocol
-------------------------------- -------------------------------­adminmd5 HMAC_MD5, DES PRIVACY adminsha HMAC_SHA, DES PRIVACY v1v2only NO AUTH, NO PRIVACY
Table 8 User Table parameters
Field
Description
User Name
This is a string that represents the name of the user that you can use to access the switch.
Protocol
This indicates whether messages sent on behalf of this user are protected from disclosure using a privacy protocol. switch software supports DES algorithm for privacy. The software also supports two authentication algorithms: MD5 and HMAC-SHA.
View Name Subtree Mask Type
------------------ ---------------------------- ------------- -------­iso 1 included v1v2only 1 included v1v2only 1.3.6.1.6.3.15 excluded v1v2only 1.3.6.1.6.3.16 excluded v1v2only 1.3.6.1.6.3.18 excluded
The following command displays SNMPv3 user information:
show snmp-server v3 user
Command mode: All
The User-based Security Model (USM) in SNMPv3 provides security services such as authentication and privacy of messages. This security model makes use of a defined set of user identities displayed in the USM user table. The USM user table contains information like:
the user name a security name in the form of a string whose format is independent of the Security Model an authentication protocol, which is an indication that the messages sent on behalf of the user can be
authenticated
the privacy protocol.
The following table describes the SNMPv3 User Table information.
SNMPv3 View Table information
The following command displays the SNMPv3 View Table:
show snmp-server v3 view
Command mode: All
The user can control and restrict the access allowed to a group to only a subset of the management information in the management domain that the group can access within each context by specifying the group‘s rights in terms of a particular MIB view for security reasons.
Command Reference Guide (ISCLI) Command Reference Guide (ISCLI) 17
Table 9 View Table parameters
Field
Description
View Name
Displays the name of the view.
Subtree
Displays the MIB subtree as an OID string. A view subtree is the set of all MIB object instances which have a common Object Identifier prefix to their names.
Mask
Displays the bit mask.
Type
Displays whether a family of view subtrees is included or excluded from the MIB view.
Group Name Model Level ReadV WriteV NotifyV
---------- ------- ------------ --------- -------- ------­v1v2grp snmpv1 noAuthNoPriv iso iso v1v2only admingrp usm authPriv iso iso iso
Table 10 Access Table parameters
Field
Description
Group Name
Displays the name of group.
Model
Displays the security model used, for example, SNMPv1, or SNMPv2 or USM.
Level
Displays the minimum level of security required to gain rights of access. For example, noAuthNoPriv, authNoPriv, or auth-Priv.
ReadV
Displays the MIB view to which this entry authorizes the read access.
WriteV
Displays the MIB view to which this entry authorizes the write access.
NotifyV
Displays the Notify view to which this entry authorizes the notify access.
The following table describes the SNMPv3 View Table information.
SNMPv3 Access Table information
The following command displays SNMPv3 access information:
show snmp-server v3 access
Command mode: All
The access control sub system provides authorization services. The vacmAccessTable maps a group name, security information, a context, and a message type, which could be
the read or write type of operation or notification into a MIB view. The View-based Access Control Model defines a set of services that an application can use for checking access
rights of a group. This group‘s access rights are determined by a read-view, a write-view, and a notify-view. The read-view represents the set of object instances authorized for the group while reading the objects. The write-view represents the set of object instances authorized for the group when writing objects. The notify-view represents the set of object instances authorized for the group when sending a notification.
The following table describes the SNMPv3 Access Table information.
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI) 18
SNMPv3 Group Table information
Sec Model User Name Group Name
---------- ----------------------------- ------------------------------­snmpv1 v1v2only v1v2grp usm adminmd5 admingrp usm adminsha admingrp
Table 11 Group Table parameters
Field
Description
Sec Model
Displays the security model used, which is any one of: USM, SNMPv1, SNMPv2, and SNMPv3.
User Name
Displays the name for the user.
Group Name
Displays the access name of the group.
Index Name User Name Tag
---------- ---------- -------------------- ---------­trap1 public v1v2only v1v2trap
Table 12 Community Table information
Field
Description
Index
Displays the unique index value of a row in this table.
Name
Displays the community string, which represents the configuration.
User Name
Displays the User Security Model (USM) user name.
Tag
Displays the community tag. This tag specifies a set of transport endpoints from which a command responder application accepts management requests and to which a command responder application sends an SNMP trap.
The following command displays SNMPv3 group information:
show snmp-server v3 group
Command mode: All
A group is a combination of security model and security name that defines the access rights assigned to all the security names belonging to that group. The group is identified by a group name.
The following table describes the SNMPv3 Group Table information.
SNMPv3 Community Table information
The following command displays SNMPv3 community information:
show snmp-server v3 community
Command mode: All
This command displays the community table information stored in the SNMP engine. The following table describes the SNMPv3 Community Table information.
Command Reference Guide (ISCLI) Command Reference Guide (ISCLI) 19
Name Transport Addr Port Taglist Params
---------- --------------- ---- ---------- --------------­trap1 47.81.25.66 162 v1v2trap v1v2param
Table 13 Target Address Table information
Field
Description
Name
Displays the locally arbitrary, but unique identifier associated with this snmpTargetAddrEntry.
Transport Addr
Displays the transport addresses.
Port
Displays the SNMP UDP port number.
Taglist
This column contains a list of tag values which are used to select target addresses for a particular SNMP message.
Params
The value of this object identifies an entry in the snmpTargetParamsTable. The identified entry contains SNMP parameters to be used when generating messages to be sent to this transport address.
Name MP Model User Name Sec Model Sec Level
------------------- -------- -------------------- --------- ----------­v1v2param snmpv2c v1v2only snmpv1 noAuthNoPriv
Table 14 Target Parameters Table information
Field
Description
Name
Displays the locally arbitrary, but unique identifier associated with this snmpTargeParamsEntry.
MP Model
Displays the Message Processing Model used when generating SNMP messages using this entry.
User Name
Displays the securityName, which identifies the entry on whose behalf SNMP messages will be generated using this entry.
Sec Model
Displays the security model used when generating SNMP messages using this entry. The system may choose to return an inconsistentValue error if an attempt is made to set this variable to a value for a security model which the system does not support.
Sec Level
Displays the level of security used when generating SNMP messages using this entry.
SNMPv3 Target Address Table information
The following command displays SNMPv3 target address information:
show snmp-server v3 target-address
Command mode: All
This command displays the SNMPv3 target address table information, which is stored in the SNMP engine. The following table describes the SNMPv3 Target Address Table information.
SNMPv3 Target Parameters Table information
The following command displays SNMPv3 target parameters information:
show snmp-server v3 target-parameters
Command mode: All
The following table describes the SNMPv3 Target Parameters Table information.
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI) 20
SNMPv3 Notify Table information
Name Tag
-------------------- -------------------­v1v2trap v1v2trap
Table 15 SNMPv3 Notify Table information
Field
Description
Name
The locally arbitrary, but unique identifier associated with this snmpNotifyEntry.
Tag
This represents a single tag value which is used to select entries in the snmpTargetAddrTable. Any entry in the snmpTargetAddrTable that contains a tag value equal to the value of this entry is selected. If this entry contains a value of zero length, no entries are selected.
The following command displays the SNMPv3 Notify Table:
show snmp-server v3 notify
Command mode: All
The following table describes the SNMPv3 Notify Table information.
Command Reference Guide (ISCLI) Command Reference Guide (ISCLI) 21
Engine ID = 80:00:07:50:03:00:0F:6A:F8:EF:00
usmUser Table: User Name Protocol
-------------------------------- -------------------------------­admin NO AUTH, NO PRIVACY adminmd5 HMAC_MD5, DES PRIVACY adminsha HMAC_SHA, DES PRIVACY v1v2only NO AUTH, NO PRIVACY
vacmAccess Table: Group Name Model Level ReadV WriteV NotifyV
---------- ------- ------------ ------- -------- -----­admin usm noAuthNoPriv org org org v1v2grp snmpv1 noAuthNoPriv org org v1v2only admingrp usm authPriv org org org
vacmViewTreeFamily Table: View Name Subtree Mask Type
-------------------- --------------- ------------ -------------­org 1.3 included v1v2only 1.3 included v1v2only 1.3.6.1.6.3.15 excluded v1v2only 1.3.6.1.6.3.16 excluded v1v2only 1.3.6.1.6.3.18 excluded
vacmSecurityToGroup Table: Sec Model User Name Group Name
---------- ------------------------------- ----------------------­snmpv1 v1v2only v1v2grp usm admin admin usm adminsha admingrp
snmpCommunity Table: Index Name User Name Tag
---------- ---------- -------------------- ----------
snmpNotify Table: Name Tag
-------------------- --------------------
snmpTargetAddr Table: Name Transport Addr Port Taglist Params
---------- --------------- ---- ---------- ---------------
snmpTargetParams Table: Name MP Model User Name Sec Model Sec Level
-------------------- -------- ------------------ --------- -------
SNMPv3 dump
The following command displays SNMPv3 information:
show snmp-server v3
Command mode: All
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI) 22
System information
System Information at 6:56:22 Thu Jan 11, 2006
Time zone: Asia/Tokyo
Blade Network Technologies 1Gb Intelligent L2 Switch
sysName:
sysLocation:
RackId: NEC01A 6X00125
RackName: Default_Rack_Name
EnclosureSerialNumber: NEC01A 6X00125
EnclosureName: Default_Chassis_Name
BayNumber: 1
Switch is up 0 days, 14 hours, 56 minutes and 22 seconds.
Last boot reason: reset from console
MAC address: 00:10:00:01:00:01 IP (If 1) address: 10.14.4.16
Revision:
Switch Serial No:
Hardware Part No: Spare Part No:
Software Version 1.2.0 (FLASH image1), active configuration.
The following command displays system information:
show sys-info
Command mode: All
System information includes:
System date and time Switch model name and number Rack name and location MAC address of the switch management processor IP address of the switch Software image file and version number Current configuration block (active, backup, or factory default) Login banner, if one is configured
Command Reference Guide (ISCLI) Command Reference Guide (ISCLI) 23
Date Time Severity level Message
---- ---- ----------------- ------­Jul 8 17:25:41 NOTICE system: link up on port 1 Jul 8 17:25:41 NOTICE system: link up on port 8 Jul 8 17:25:41 NOTICE system: link up on port 7 Jul 8 17:25:41 NOTICE system: link up on port 12 Jul 8 17:25:41 NOTICE system: link up on port 11 Jul 8 17:25:41 NOTICE system: link up on port 14 Jul 8 17:25:41 NOTICE system: link up on port 13 Jul 8 17:25:41 NOTICE system: link up on port 16 Jul 8 17:25:41 NOTICE system: link up on port 15 Jul 8 17:25:41 NOTICE system: link up on port 17 Jul 8 17:25:41 NOTICE system: link up on port 20 Jul 8 17:25:41 NOTICE system: link up on port 22 Jul 8 17:25:41 NOTICE system: link up on port 23 Jul 8 17:25:41 NOTICE system: link up on port 21 Jul 8 17:25:42 NOTICE system: link up on port 4 Jul 8 17:25:42 NOTICE system: link up on port 3 Jul 8 17:25:42 NOTICE system: link up on port 6 Jul 8 17:25:42 NOTICE system: link up on port 5 Jul 8 17:25:42 NOTICE system: link up on port 10
Jul 8 17:25:42 NOTICE system: link up on port 9
Usernames: user - enabled oper - disabled admin - Always Enabled
Current User ID table:
1: name tech1 , ena, cos user , password valid, online
2: name tech2 , ena, cos user , password valid, offline
Show recent syslog messages
The following command displays system log messages:
show logging messages
Command mode: All
Each message contains a date and time field and has a severity level associated with it. One of eight different prefixes is used to indicate the condition:
EMERGindicates the system is unusable ALERTindicates action should be taken immediately CRITindicates critical conditions ERRindicates error conditions or eroded operations WARNINGindicates warning conditions NOTICEindicates a normal but significant condition INFOindicates an information message DEBUGindicates a debug-level message
System user information
The following command displays user status information:
show access user
Command mode: All except User EXEC
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI) 24
The following table describes the user status information.
Table 16 User status Information
Field
Usage
user
Displays the status of the user access level.
oper
Displays the status of the oper (operator) access level.
admin
Displays the status of the admin (administrator) access level.
Current User ID Table
Displays the status of configured user IDs.
Table 17 Layer 2 information commands
Command
Usage
show mac-address-table
Displays Forwarding Database Information. Command mode: All
show spanning-tree stp <1-32> information
In addition to seeing if STP is enabled or disabled, you can
view the following STP bridge information:
Priority Hello interval Maximum age value Forwarding delay Aging time
You can also refer to the following port-specific STP information:
Port number and priority Cost State
Command mode: All
show spanning-tree mstp cist information
Displays Common internal Spanning Tree (CIST) bridge information, including the following:
Priority Hello interval Maximum age value Forwarding delay
You can also view port-specific CIST information, including the following:
Port number and priority Cost State
Command mode: All
show portchannel information
When trunk groups are configured, you can view the state of each port in the various trunk groups. Command mode: All
show vlan information
Displays VLAN configuration information, including:
VLAN Number VLAN Name Status Port membership of the VLAN
Command mode: All
show layer2 information
Dumps all switch information available from Layer 2 memory (10K or more, depending on your configuration). If you want to capture dump data to a file, set your communication software on your workstation to capture session data prior to issuing the dump commands. Command mode: All
Layer 2 information
The following table describes the Layer 2 Information commands. The following sections provide more detailed information and commands.
Command Reference Guide (ISCLI) Command Reference Guide (ISCLI) 25
NOTE: The master forwarding database supports up to 8K MAC address entries on the management processor (MP) per switch.
Table 18 FDB information commands
show mac-address-table address <mac­address>
Displays a single database entry by its MAC address. You are prompted to enter the MAC address of the device. Enter the MAC address using the format: xx:xx:xx:xx:xx:xx. (For example: 08:00:20:12:34:56) You can also enter the MAC address using the format: xxxxxxxxxxxx. (For example: 080020123456) Command mode: All
show mac-address-table port <port number>
Displays all FDB entries for a particular port. Command mode: All
show mac-address-table vlan <1-4095>
Displays all FDB entries on a single VLAN. The range is 1-4095. Command mode: All
show mac-address-table state
{forward|trunk|unknown}
Displays all FDB entries that match a particular state. Command mode: All
show mac-address-table
Displays all entries in the Forwarding Database. Command mode: All
MAC address VLAN Port Trnk State
----------------- ---- ---- ---- ----- 00:02:01:00:00:00 300 1 TRK 00:02:01:00:00:01 300 23 FWD 00:02:01:00:00:02 300 23 FWD 00:02:01:00:00:03 300 23 FWD 00:02:01:00:00:04 300 23 FWD 00:02:01:00:00:05 300 23 FWD 00:02:01:00:00:06 300 23 FWD 00:02:01:00:00:07 300 23 FWD 00:02:01:00:00:08 300 23 FWD 00:02:01:00:00:09 300 23 FWD 00:02:01:00:00:0a 300 23 FWD 00:02:01:00:00:0b 300 23 FWD 00:02:01:00:00:0c 300 23 FWD
FDB information commands
The forwarding database (FDB) contains information that maps the media access control (MAC) address of each known device to the switch port where the device address was learned. The FDB also shows which other ports have seen frames destined for a particular MAC address.
Show all FDB information
The following command displays Forwarding Database information:
show mac-address-table
Command mode: All
An address that is in the forwarding (FWD) state indicates that the switch has learned it. When in the trunking (TRK) state, the Trnk field displays the trunk group number. If the state for the port is listed as unknown (UNK), the MAC address has not yet been learned by the switch, but has only been seen as a destination address. When an
Clearing entries from the forwarding database
address is in the unknown state, no outbound port is indicated.
To delete a static MAC address from the forwarding database (FDB), see the ―Static FDB configuration‖ section in
the ―Configuration Commands‖ chapter.
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI) 26
Link Aggregation Control Protocol information
Table 19 LACP information commands
Command
Usage
show interface gigabitEthernet <port number> lacp information
Displays LACP aggregator information for the port. Command mode: All
show lacp
Displays LACP information for the port. Command mode: All
show lacp information
Displays all LACP information parameters. Command mode: All
>> LACP# dump
port lacp adminkey operkey selected prio attached trunk
aggr
----------------------------------------------------------------------
1 off 1 1 n 32768 -- --
2 off 2 2 n 32768 -- --
3 off 3 3 n 32768 -- --
4 off 4 4 n 32768 -- --
5 off 5 5 n 32768 -- --
6 off 6 6 n 32768 -- --
7 off 7 7 n 32768 -- --
8 off 8 8 n 32768 -- --
The following table describes the Link Aggregation Control Protocol information commands.
LACP dump
The following command displays LACP information:
show lacp information
Command mode: All
LACP dump includes the following information for each port in the switch:
lacp—Displays the port‘s LACP mode (active, passive, or off) adminkey—Displays the value of the port‘s adminkey. operkey—Shows the value of the port‘s operational key. selectedIndicates whether the port has been selected to be part of a Link Aggregation Group. prioShows the value of the port priority. attached aggrDisplays the aggregator associated with each port. trunkThis value represents the LACP trunk group number.
Command Reference Guide (ISCLI) Command Reference Guide (ISCLI) 27
Table 20 STP information commands
Command
Usage
show spanning-tree stp <1-32>
Displays information about the spanning tree group. Command mode: All
show spanning-tree stp <1-32> bridge
Displays STP bridge information. Command mode: All
show spanning-tree stp <1-32> information
Displays STP information. Command mode: All
show spanning-tree
Displays all STP information. Command mode: All
------------------------------------------------------------------
upfast disabled, update 40
------------------------------------------------------------------
Spanning Tree Group 1: On (STP/PVST+) VLANs: 1
Current Root: Path-Cost Port Hello MaxAge FwdDel 8000 00:02:a5:d1:0f:ed 8 20 2 20 15
Parameters: Priority Hello MaxAge FwdDel Aging 32768 2 20 15 300
Port Priority Cost FastFwd State Designated Bridge Des Port
---- -------- ---- -------- ---------- --------------------- ------­ 1 0 0 n FORWARDING * 2 0 0 n FORWARDING * 3 0 0 n FORWARDING *
Spanning Tree information
The following table describes the Spanning Tree Protocol (STP) information commands.
The following command displays Spanning Tree information:
show spanning-tree
Command mode: All
The switch software uses the IEEE 802.1D Spanning Tree Protocol (STP). If RSTP/MSTP is turned on, see the
―Rapid Spanning Tree information‖ section for Spanning Tree Group information. In addition to seeing if STP is
enabled or disabled, you can view the following STP bridge information:
Status of Uplink Fast (upfast) Current root MAC address Path cost Port Hello interval Maximum age value Forwarding delay Aging time
You can also refer to the following port-specific STP information:
Port number and priority Cost State Port Fast Forwarding state Designated bridge Designated port
The following table describes the STP parameters.
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI) 28
Table 21 STP parameters
Parameter
Description
Current Root
Shows information about the root bridge for the Spanning Tree. Information includes the priority (hex) and MAC address of the root.
Path-Cost
Path-cost is the total path cost to the root bridge. It is the summation of the path cost between bridges (up to the root bridge).
Port
The current root port refers to the port on the switch that receives data from the current root. Zero (0) indicates the root bridge of the STP.
Priority (bridge)
The bridge priority parameter controls which bridge on the network will become the STP root bridge.
Hello
The hello time parameter specifies, in seconds, how often the root bridge transmits a configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge uses the root bridge hello value.
MaxAge
The maximum age parameter specifies, in seconds, the maximum time the bridge waits without receiving a configuration bridge protocol data unit before it reconfigures the STP network.
FwdDel
The forward delay parameter specifies, in seconds, the amount of time that a bridge port has to wait before it changes from learning state to forwarding state.
Aging
The aging time parameter specifies, in seconds, the amount of time the bridge waits without receiving a packet from a station before removing the station from the Forwarding Database.
Priority (port)
The port priority parameter helps determine which bridge port becomes the designated port. In a network topology that has multiple bridge ports connected to a single segment, the port with the lowest port priority becomes the designated port for the segment.
Cost
The port path cost parameter is used to help determine the designated port for a segment. Generally speaking, the faster the port, the lower the path cost.
State
The State field shows the current state of the port. The State field can be one of the following: BLOCKING, LISTENING, LEARNING, FORWARDING, or DISABLED.
Designated bridge
Shows information about the bridge connected to each port, if applicable. Information includes the priority (hex) and MAC address of the Designated Bridge.
Designated port
The port ID of the port on the Designated Bridge to which this port is connected.
------------------------------------------------------------------
upfast disabled, update 40
------------------------------------------------------------------
Spanning Tree Group 1: On (RSTP) VLANs: 1-3 4095
Current Root: Path-Cost Port Hello MaxAge FwdDel 8000 00:00:01:00:19:00 0 0 9 20 15
Parameters: Priority Hello MaxAge FwdDel Aging 32768 9 20 15 300
Port Prio Cost State Role Designated Bridge Des Port Type
---- ---- ---- ------ ---- --------------------- -------- ---­ 1 0 0 DSB 2 0 0 DSB 3 0 0 DSB 4 0 0 DSB 5 0 0 DSB 6 0 0 DSB 7 0 0 DSB 8 0 0 DSB 9 0 0 DSB 10 0 0 DISC 11 0 0 FWD DESG 8000-00:00:01:00:19:00 8017 P2P2,Edge 12 0 0 FWD DESG 8000-00:00:01:00:19:00 8018 P2P
Rapid Spanning Tree and Multiple Spanning Tree information
The following command displays RSTP/MSTP information:
show spanning-tree
Command mode: All
Command Reference Guide (ISCLI) Command Reference Guide (ISCLI) 29
Table 22 Rapid Spanning Tree parameter descriptions
Parameter
Description
Current Root
Shows information about the root bridge for the Spanning Tree. Information includes the priority (hex) and MAC address of the root.
Path-Cost
Path-cost is the total path cost to the root bridge. It is the summation of the path cost between bridges (up to the root bridge).
Port
The current root port refers to the port on the switch that receives data from the current root. Zero (0) indicates the root bridge of the STP.
Priority (bridge)
The bridge priority parameter controls which bridge on the network will become the STP root bridge.
Hello
The hello time parameter specifies, in seconds, how often the root bridge transmits a configurationbridge protocol data unit (BPDU). Any bridge that is not the root bridge uses the root bridge hello value.
MaxAge
The maximum age parameter specifies, in seconds, the maximum time the bridge waits without receiving a configuration bridge protocol data unit before it reconfigures the STP network.
FwdDel
The forward delay parameter specifies, in seconds, the amount of time that a bridge port has to wait before it changes from learning state to forwarding state.
Aging
The aging time parameter specifies, in seconds, the amount of time the bridge waits without receiving a packet from a station before removing the station from the Forwarding Database.
Priority (port)
The port priority parameter helps determine which bridge port becomes the designated port. In a network topology that has multiple bridge ports connected to a single segment, the port with the lowest port priority becomes the designated port for the segment.
Cost
The port path cost parameter is used to help determine the designated port for a segment. Generally speaking, the faster the port, the lower the path cost. A setting of zero (0) indicates that the cost will be set to the appropriate default after the link speed has been auto-negotiated.
State
Shows the current state of the port. The State field in RSTP/MSTP mode can be one of the following: Discarding (DISC), Learning (LRN), Forwarding (FWD), or
Disabled (DSB).
Role
Shows the current role of this port in the Spanning Tree. The port role can be one of the following: Designated (DESG), Root (ROOT), Alternate (ALTN), Backup (BKUP), Master (MAST), or Unknown (UNK).
Designated bridge
Shows information about the bridge connected to each port, if applicable. Information includes the priority (hex) and MAC address of the Designated Bridge.
Designated port
The port ID of the port on the Designated Bridge to which this port is connected.
Type
Type of link connected to the port, and whether the port is an edge port. Link type values are AUTO, P2P, or SHARED.
The switch software can be set to use the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) or the IEEE 802.1s Multiple Spanning Tree Protocol (MSTP). If RSTP/MSTP is turned on, you can view the following RSTP bridge information for the Spanning Tree Group:
Status of Uplink Fast (upfast) Current root MAC address Path-Cost Port Hello interval Maximum age value Forwarding delay Aging time
You can also refer to the following port-specific RSTP information:
Port number and priority Cost State Role Designated bridge and port Link type
The following table describes the STP parameters in RSTP or MSTP mode.
N8406-022A 1Gb Intelligent L2 Switch Command Reference Guide (ISCLI) 30
Loading...
+ 80 hidden pages