express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional
warranty. NEC shall not be liable for technical or editorial errors or omissions contained herein.
Microsoft®, Windows®, and Windows NT® are U.S. registered trademarks of Microsoft Corporation.
SunOS™ and Solaris™ are trademarks of Sun Microsystems, Inc. in the U.S. and other countries.
Cisco® is a registered trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
Part number: 856-126757-304-00
Second edition: Oct 2007
Connecting to the switch ........................................................................................................................................ 8
Establishing a console connection .................................................................................................................... 8
Setting an IP address ........................................................................................................................................ 9
Establishing a Telnet connection ...................................................................................................................... 9
Establishing an SSH connection ....................................................................................................................... 9
Accessing the switch ............................................................................................................................................ 10
Accessing the ISCLI ............................................................................................................................................. 13
Global commands ................................................................................................................................................. 14
Command line interface shortcuts ........................................................................................................................ 15
System Information commands ............................................................................................................................ 17
SNMPv3 Information commands .......................................................................................................................... 17
SNMPv3 USM User Table information ............................................................................................................ 18
SNMPv3 View Table information .................................................................................................................... 18
System information ............................................................................................................................................... 24
Show recent syslog messages ............................................................................................................................. 25
System user information ....................................................................................................................................... 25
Layer 2 information ............................................................................................................................................... 26
FDB information commands ................................................................................................................................. 27
Show all FDB information ................................................................................................................................ 27
Clearing entries from the forwarding database ............................................................................................... 27
Link Aggregation Control Protocol information ..................................................................................................... 28
802.1x information ................................................................................................................................ ................ 29
Spanning Tree information ................................................................................................................................... 30
Rapid Spanning Tree and Multiple Spanning Tree information ............................................................................ 32
Common Internal Spanning Tree information ....................................................................................................... 34
Trunk group information ....................................................................................................................................... 36
VLAN information ................................................................................................................................................. 36
Layer 3 information ............................................................................................................................................... 37
Route information ................................................................................................................................................. 37
Show all IP Route information ......................................................................................................................... 38
ARP information ................................................................................................................................................... 39
Show all ARP entry information ...................................................................................................................... 39
ARP address list information ........................................................................................................................... 39
OSPF information ................................................................................................................................................. 40
OSPF general information ............................................................................................................................... 41
OSPF interface information ............................................................................................................................. 41
OSPF Database information ........................................................................................................................... 42
OSPF route codes information ........................................................................................................................ 43
Routing Information Protocol information ............................................................................................................. 43
RIP Routes information ................................................................................................................................... 43
RIP user configuration ..................................................................................................................................... 44
IP information ....................................................................................................................................................... 44
IGMP multicast group information ........................................................................................................................ 45
IGMP multicast router port information ................................................................................................................. 45
VRRP information ................................................................................................................................................. 46
802.1p information ................................................................................................................................................ 47
ACL information .................................................................................................................................................... 48
RMON Information ................................................................................................................................................ 48
RMON history information ............................................................................................................................... 48
RMON alarm information ................................................................................................................................ 49
RMON event information ................................................................................................................................. 50
Link status information .......................................................................................................................................... 51
Port information .................................................................................................................................................... 52
Logical Port to GEA Port mapping ........................................................................................................................ 53
SFP information .................................................................................................................................................... 53
Uplink Failure Detection information ..................................................................................................................... 54
Information dump .................................................................................................................................................. 54
Port Statistics ........................................................................................................................................................ 55
Internet Protocol (IP) statistics ........................................................................................................................ 61
Link statistics ................................................................................................................................................... 62
Port RMON statistics ....................................................................................................................................... 62
IP statistics ...................................................................................................................................................... 66
DNS statistics .................................................................................................................................................. 67
OSPF global statistics ..................................................................................................................................... 71
CPU statistics .................................................................................................................................................. 78
Viewing and saving changes ................................................................................................................................ 83
Saving the configuration ....................................................................................................................................... 83
System configuration ................................................................................................ ............................................ 84
System host log configuration ......................................................................................................................... 85
Secure Shell Server configuration................................................................................................................... 86
RADIUS server configuration .......................................................................................................................... 87
TACACS+ server configuration ....................................................................................................................... 88
NTP server configuration ................................................................................................................................ 89
System SNMP configuration ........................................................................................................................... 90
SNMPv3 View-based Access Control Model configuration............................................................................. 93
SNMPv3 Group configuration ......................................................................................................................... 93
SNMPv3 Community Table configuration ....................................................................................................... 94
System Access configuration .......................................................................................................................... 96
User Access Control configuration .................................................................................................................. 97
User ID configuration ...................................................................................................................................... 97
Port configuration ................................................................................................................................................. 99
Temporarily disabling a port .......................................................................................................................... 100
Port link configuration .................................................................................................................................... 100
ACL Port configuration .................................................................................................................................. 100
802.1x Global configuration .......................................................................................................................... 102
802.1x Port configuration .............................................................................................................................. 103
Rapid Spanning Tree Protocol / Multiple Spanning Tree Protocol configuration ................................................ 104
Common Internal Spanning Tree configuration ............................................................................................ 105
CIST port configuration ................................................................................................................................. 106
Spanning Tree configuration .............................................................................................................................. 107
Bridge Spanning Tree configuration .............................................................................................................. 108
Spanning Tree port configuration .................................................................................................................. 109
Layer 2 IP Trunk Hash configuration ............................................................................................................. 111
Link Aggregation Control Protocol configuration ................................................................................................ 111
LACP Port configuration ................................................................................................................................ 112
IP interface configuration .............................................................................................................................. 113
IP Forwarding configuration ................................................................................................................................ 115
IP Access List configuration .......................................................................................................................... 118
Routing Information Protocol configuration ........................................................................................................ 119
Open Shortest Path First configuration .............................................................................................................. 121
OSFP Area Index configuration .................................................................................................................... 122
OSPF Summary Range configuration ........................................................................................................... 123
IGMP filtering port configuration.................................................................................................................... 128
Domain Name System configuration .................................................................................................................. 128
Quality of Service configuration .......................................................................................................................... 134
Access Control configuration .............................................................................................................................. 135
Access Control List configuration .................................................................................................................. 135
ACL Group configuration ............................................................................................................................... 139
RMON history configuration .......................................................................................................................... 140
Port mirroring ...................................................................................................................................................... 142
Port-based port mirroring .............................................................................................................................. 142
Link to Monitor configuration ......................................................................................................................... 143
Link to Disable configuration ......................................................................................................................... 144
Saving the active switch configuration ................................................................................................................ 145
Restoring the active switch configuration ........................................................................................................... 145
Operations-level port options ........................................................................................................................ 146
Operations-level port 802.1x options ............................................................................................................ 146
Updating the switch software image ................................................................................................................... 148
Downloading new software to the switch ...................................................................................................... 148
Selecting a software image to run ...................................................................................................................... 149
Uploading a software image from the switch ...................................................................................................... 149
Selecting a configuration block ........................................................................................................................... 150
Resetting the switch ........................................................................................................................................... 150
Accessing the AOS CLI ................................................................................................................................. 151
System maintenance ..................................................................................................................................... 152
Technical support dump ................................................................................................................................ 154
TFTP/FTP technical support dump put ......................................................................................................... 154
TFTP/FTP system dump put ......................................................................................................................... 155
Clearing dump information ............................................................................................................................ 155
Unscheduled system dumps .............................................................................................................................. 156
The 1Gb Intelligent L3 Switch is ready to perform basic switching functions right out of the box. Some of the more
advanced features, however, require some administrative configuration before they can be used effectively.
The extensive switching software included in the switch provides a variety of options for accessing and configuring
the switch:
Text-based command line interfaces (AOS CLI and ISCLI) for access via a local terminal or remote
Telnet/Secure Shell (SSH) session
Simple Network Management Protocol (SNMP) support for access through network management software
such as NEC WebSAM NetvisorPro
A browser-based management interface for interactive network access through a Web browser
The ISCLI provides a direct method for collecting switch information and performing switch configuration. Use a
basic terminal to view information and statistics about the switch, and to perform any necessary configuration.
This chapter explains how to access the ISCLI to the switch.
Additional references
Additional information about installing and configuring the switch is available in the following guides, which are
attached in this product.
You can access the command line interface in one of the following ways:
Using a console connection via the console port
Using a Telnet connection over the network
Using a Secure Shell (SSH) connection to securely log in over a network
Establishing a console connection
To establish a console connection with the switch, you need:
A null modem cable with a female DB-9 connector (See the N8406-023 1Gb Intelligent L3 Switch User’s
Guide for more information.)
An ASCII terminal or a computer running terminal emulation software set to the parameters shown in the table
To establish a console connection with the switch:
1. Connect the terminal to the console port using the null modem cable.
2. Power on the terminal.
3. Press the Enter key a few times on the terminal to establish the connection.
4. You will be required to enter a password for access to the switch.
Setting an IP address
To access the switch via a Telnet or an SSH connection, you need to have an Internet Protocol (IP) address set for
the switch. The switch can get its IP address in one of the following ways:
Management port access:
Using a Dynamic Host Control Protocol (DHCP) server—When the dhcp client is enabled, the
management interface (interface 256) requests its IP address from a DHCP server. The default value for
the dhcp client is enabled.
Configuring manually—If the network does not support DHCP, you must configure the management
interface (interface 256) with an IP address. If you want to access the switch from a remote network, you
also must configure the management gateway (gateway 4).
Uplink port access:
Using a Bootstrap Protocol (BOOTP) server—By default, the management interface is set up to request
its IP address from a BOOTP server. If you have a BOOTP server on the network, add the Media Access
Control (MAC) address of the switch to the BOOTP configuration file located on the BOOTP server. The
MAC address can be found in the System Information menu (See the ―System Information commands‖
section in the ―Information Commands‖ chapter.) If you are using a DHCP server that also does BOOTP,
you do not have to configure the MAC address.
Configuring manually—If the network does not support BOOTP, you must configure the management port
with an IP address.
Establishing a Telnet connection
A Telnet connection offers the convenience of accessing the switch from any workstation connected to the network.
Telnet provides the same options for user, operator, and administrator access as those available through the
console port. By default, Telnet is enabled on the switch. The switch supports four concurrent Telnet connections.
Once the IP parameters are configured, you can access the ISCLI using a Telnet connection. To establish a Telnet
connection with the switch, run the Telnet program on the workstation and enter the telnet command, followed by
the switch IP address:
You will then be prompted to enter a password. The password determines the access level: administrator, operator,
or user. See the ―Accessing the switch‖ section later in this chapter for description of default passwords.
Establishing an SSH connection
Although a remote network administrator can manage the configuration of a switch via Telnet, this method does not
provide a secure connection. The Secure Shell (SSH) protocol enables you to securely log into this switch over the
network.
As a secure alternative to using Telnet to manage switch configuration, SSH ensures that all data sent over the
network is encrypted and secure. In order to use SSH, you must first configure it on the switch. See the ―Secure
Shell Server configuration‖ section in the ―Configuration Commands‖ chapter for information on how to configure
SSH.
The switch can perform only one session of key/cipher generation at a time. Therefore, an SSH/Secure Copy
(SCP) client will not be able to log in if the switch is performing key generation at that time or if another client has
just logged in before this client. Similarly, the system will fail to perform the key generation if an SSH/SCP client is
logging in at that time.
NOTE: This switch implementation of SSH is based on versions 1.5 and 2.0, and supports SSH clients from
version 1.0 through version 2.0. SSH clients of other versions are not supported. You may configure the client
software to use protocol SSH version 1 or version 2.
>> # ssh <user>@<1Gb Intelligent L3 Switch IP address>
NOTE: The first time you run SSH from the workstation, a warning message might appear. At the prompt,
enter yes to continue.
NOTE: It is recommended that you change default switch passwords after initial configuration and as
regularly as required under your network security policies. For more information, see the ―Setting passwords‖
section in the ―First-time configuration‖ chapter.
The supported SSH encryption and authentication methods are listed below.
Server Host Authentication—Client RSA authenticates the switch in the beginning of every connection
Key Exchange—RSA
Encryption:
User Authentication—Local password authentication; Remote Authentication Dial-in User Service (RADIUS)
The following SSH clients are supported:
SSH 3.0.1 for Linux (freeware)
SecureCRT® 4.1.8 (VanDyke Technologies, Inc.)
OpenSSH_3.9 for Linux (FC 3)
FedoraCore 3 for SCP commands
PuTTY Release 0.58 (Simon Tatham) for Windows
By default, SSH service is not enabled on the switch. Once the IP parameters are configured, you can access the
ISCLI to enable SSH.
To establish an SSH connection with the switch, run the SSH program on the workstation by issuing the ssh
command, followed by the user account name and the switch IP address:
You will then be prompted to enter your password.
Accessing the switch
To enable better switch management and user accountability, this switch provides different levels or classes of user
access. Levels of access to the CLI and Web management functions and screens increase as needed to perform
various switch management tasks. The three levels of access are:
User— Interaction with the switch is completely passive—nothing can be changed on this switch. Users may
display information that has no security or privacy implications, such as switch statistics and current
operational state information.
Operator— Interaction with the switch is completely passive—nothing can be changed on this switch. Users
may display information that has no security or privacy implications, such as switch statistics and current
operational state information.
Administrator— Administrators are the only ones that may make permanent changes to the switch
configuration—changes that are persistent across a reload/reset of the switch. Administrators can access
switch functions to configure and troubleshoot problems on this switch. Because administrators can also
make temporary (operator-level) changes as well, they must be aware of the interactions between temporary
and permanent changes.
Access to switch functions is controlled through the use of unique usernames and passwords. Once you are
connected to the switch via the local console, Telnet, or SSH, you are prompted to enter a password. The
password entered determines the access level. The default user names/password for each access level is listed in
the following table.
The User has no direct responsibility for switch management. He or she can view all switch
status information and statistics, but cannot make any configuration changes to the switch.
The user account is enabled by default, and the default password is user.
Oper
The Operator has no direct responsibility for switch management. He or she can view all
switch status information and statistics, but cannot make any configuration changes to the
switch.
By default, the operator account is disabled and has no password.
Admin
The super user administrator has complete access to all command modes on the switch,
including the ability to change both the user and administrator passwords.
The admin account is enabled by default, and the default password is admin.
NOTE: With the exception of the admin user, access to each user level can be disabled by setting the
password to an empty value.
Typeface or symbol
Meaning
angle brackets < >
Indicate a variable to enter based on the description inside the brackets. Do not type the
brackets as you enter the command.
Example: If the command syntax is
ping <IP address>
you enter
ping 192.32.10.12
bold body text
Indicates objects, such as window names, icons, and user-interface objects, such as
buttons and tabs.
bold Courier text
Indicates command names, options, and text that you must enter.
Example:
Use the show ip arp commands.
plain Courier text
Indicates command syntax and system output (for example: prompts and system
messages). Example:
configure terminal
braces { }
Indicate required elements in syntax descriptions where there is more than one option.
You must choose only one of the options. Do not type the braces when entering the
command.
Example: If the command syntax is
show portchannel {<1-12>|hash|information}
you must enter:
show portchannel <1-12>
or
show portchannel hash
or
show portchannel information
Once you enter the administrator password and it is verified, you are given complete access to this switch.
Idle timeout
By default, this switch disconnects the console, Telnet, or SSH session after five minutes of inactivity. This function
is controlled by the idle timeout parameter, which can be set from 1 to 60 minutes. To change this parameter, see
the ―System configuration‖ section in the ―Configuration Commands‖ chapter.
Typographical conventions
The following table describes the typographic styles used in this guide:
Indicate optional elements in syntax descriptions. Do not type the brackets when entering
the command.
Example: If the command syntax is
show ip interface [<1-256>]
you can enter
show ip interface
or
show ip interface 1
italic text
Indicates variables in command syntax descriptions. Also indicates new terms and book
titles. Where a variable is two or more words, the words are connected by a hyphen.
Example: If the command syntax is
show spanning-tree stp <1-32>
1-32 represents a number between 1-32.
vertical line |
Separates choices for command keywords and arguments. Enter only one of the choices.
Do not type the vertical line when entering the command.
Example: If the command syntax is
Default mode, entered automatically
Exit: exit or logout
Privileged EXEC
Switch#
Enter Privileged EXEC mode, from User EXEC mode: enable
Exit to User EXEC mode: disable
Quit ISCLI: exit or logout
Global configuration
Switch(config)#
Enter Global Configuration mode, from Privileged EXEC mode:
configure terminal
Exit to Privileged EXEC mode: end or exit
Port configuration
Switch(config-if)#
Enter Port Configuration mode, from Global Configuration mode:
interface gigabitethernet <port number>
Exit to Global Configuration mode: exit
Exit to Privileged EXEC mode: end
VLAN configuration
Switch(config-vlan)#
Enter VLAN Configuration mode, from Global Configuration mode: vlan <1-4095>
Exit to Global Configuration mode: exit
Exit to Privileged EXEC mode: end
Interface IP configuration
Switch(config-ip-if)#
Enter Interface IP Configuration mode, from Global Configuration mode:
interface ip <1-256>
Exit to Global Configuration mode: exit
Exit to Privileged EXEC mode: end
ISCLI basics
Introduction
The ISCLI is used for viewing switch information and statistics. In addition, the administrator can use the CLI for
performing all levels of switch configuration.
This chapter describes the ISCLI Command Modes, and provides a list of commands and shortcuts that are
commonly available from all the command modes within the ISCLI.
Accessing the ISCLI
The first time you start this switch, it boots into the AOS CLI. To access the ISCLI, enter the following command
and reset the switch:
To access the AOS CLI, enter the following command from the ISCLI and reload the switch:
The switch retains your CLI selection, even when you reset the configuration to factory defaults. The CLI boot mode
is not part of the configuration settings.
ISCLI Command Modes
The ISCLI has three major command modes, listed in order of increasing privileges, as follows:
User EXEC mode: This is the initial mode of access. By default, password checking is disabled for this mode.
Privileged EXEC mode: The mode is accessed from User EXEC mode. If the Privileged EXEC password is
enabled, you must enter a password to access Privileged EXEC mode.
Global Configuration mode: This mode allows you to make changes to the running configuration of the switch. If
you save the configuration, the settings survive a reload of the switch. Several submodes are available within the
Global Configuration mode (the following table for more information.
Each command mode provides a specific set of commands. The command set of each higher-privilege mode is a
superset of the lower-privilege mode(s). All commands available in lower-lower-privilege modes are available in the
higher-privilege modes.
The following table describes the ISCLI command modes.
IP address is the hostname or IP address of the target
station.
max-hops (optional) is the maximum distance to trace
(1-16 devices)
msec delay (optional) is the number of milliseconds to wait
for the response.
telnet
Allows you to Telnet out of the switch. The format is as follows:
telnet <host name> | <IP address> [<port
number>]
show history
Displays the 10 most recent commands.
console-log
Enables or disables console logs for the current session.
who
Displays a list of users who are currently logged in.
Global commands
Some basic commands are recognized throughout the ISCLI hierarchy. These commands are useful for obtaining
online Help, navigating through the interface, and saving configuration changes. To get help about a specific
command, type the command, followed by help.
The following table describes the global commands.
The following shortcuts allow you to enter commands quickly and easily.
Command abbreviation
Most commands can be abbreviated by entering the first characters that distinguish the command from the others
in the same mode. For example, consider the following full command:
The command shown above could also be entered as:
Tab completion
Entering the first letter of a command at any prompt and press the Tab key to display all available commands or
options that begin with that letter. Entering additional letters further refines the list of commands or options
displayed.
If only one command fits the input text when you press the Tab key, that command is supplied on the command
line, waiting to be entered.
Displays Remote Monitoring Information.
Command mode: All
show interface link
Displays configuration information about each port, including:
Port number Port speed (10 Mb/s, 100 Mb/s, 1000 Mb/s, or any) Duplex mode (half, full, or any) Flow control for transmit and receive (no, yes, or any) Link status (up or down)
Command mode: All
show interface information
Displays port status information, including:
Port number Whether the port uses VLAN tagging or not Port VLAN ID (PVID) Port name VLAN membership
Command mode: All
show geaport
Displays GEA port mapping information, used by service personnel.
Command mode: All
show sfp
Displays SFP module information.
Command mode: All
show ufd
Displays Uplink Failure Detection information.
Command mode: All
show information-dump
Dumps all switch information available (10K or more, depending on your
configuration).
If you want to capture dump data to a file, set your communication
software on your workstation to capture session data prior to issuing the
dump commands.
Command mode: All
Information Commands
Introduction
You can view configuration information for the switch in the ISCLI. This chapter discusses how to use the ISCLI to
display switch information.
The following table describes general information commands.
System date and time Switch model name and number Switch name and location Time of last boot MAC address of the switch management processor IP address of IP interface #1 Hardware version and part number Software image file and version number Configuration name Log-in banner, if one is configured
Command mode: All
show logging messages
Displays most recent syslog messages.
Command mode: All
show access user
Displays User Access information.
Command mode: All except User EXEC
Table 7 SNMPv3 Information commands
Command
Usage
show snmp-server v3 user
Displays User Security Model (USM) table information.
Command mode: All
show snmp-server v3 view
Displays information about view name, subtrees, mask and
type of view.
Command mode: All
show snmp-server v3 access
Displays View-based Access Control information.
Command mode: All
show snmp-server v3 group
Displays information about the group that includes the
security model, user name, and group name.
Command mode: All
show snmp-server v3 community
Displays information about the community table.
Command mode: All
show snmp-server v3 target-address
Displays the Target Address table.
Command mode: All
show snmp-server v3 target-parameters
Displays the Target parameters table.
Command mode: All
show snmp-server v3 notify
Displays the Notify table.
Command mode: All
show snmp-server v3
Displays all the SNMPv3 information.
Command mode: All
System Information commands
The following table describes the System Information commands.
SNMPv3 Information commands
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework by
supporting the following:
a new SNMP message format
security for messages
access control
remote configuration of SNMP parameters
For more details on the SNMPv3 architecture, see RFC2271 to RFC2276.
The following table describes the SNMPv3 Information commands.
-------------------------------- -------------------------------adminmd5 HMAC_MD5, DES PRIVACY
adminsha HMAC_SHA, DES PRIVACY
v1v2only NO AUTH, NO PRIVACY
Table 8 User Table parameters
Field
Description
User Name
This is a string that represents the name of the user that you can use to access the
switch.
Protocol
This indicates whether messages sent on behalf of this user are protected from
disclosure using a privacy protocol. switch software supports DES algorithm for privacy.
The software also supports two authentication algorithms: MD5 and HMAC-SHA.
View Name Subtree Mask Type
------------------ ---------------------------- ------------- -------iso 1 included
v1v2only 1 included
v1v2only 1.3.6.1.6.3.15 excluded
v1v2only 1.3.6.1.6.3.16 excluded
v1v2only 1.3.6.1.6.3.18 excluded
SNMPv3 USM User Table information
The following command displays SNMPv3 user information:
show snmp-server v3 user
Command mode: All
The User-based Security Model (USM) in SNMPv3 provides security services such as authentication and privacy of
messages. This security model makes use of a defined set of user identities displayed in the USM user table. The
USM user table contains information like:
the user name
a security name in the form of a string whose format is independent of the Security Model
an authentication protocol, which is an indication that the messages sent on behalf of the user can be
authenticated
the privacy protocol.
The following table describes the SNMPv3 User Table information.
SNMPv3 View Table information
The following command displays the SNMPv3 View Table:
show snmp-server v3 view
Command mode: All
The user can control and restrict the access allowed to a group to only a subset of the management information in
the management domain that the group can access within each context by specifying the group‘s rights in terms of
a particular MIB view for security reasons.
Displays the MIB subtree as an OID string. A view subtree is the set of all MIB
object instances which have a common Object Identifier prefix to their names.
Mask
Displays the bit mask.
Type
Displays whether a family of view subtrees is included or excluded from the MIB
view.
Group Name Model Level ReadV WriteV NotifyV
---------- ------- ------------ --------- -------- ------v1v2grp snmpv1 noAuthNoPriv iso iso v1v2only
admingrp usm authPriv iso iso iso
Table 10 Access Table parameters
Field
Description
Group Name
Displays the name of group.
Model
Displays the security model used, for example, SNMPv1, or SNMPv2 or USM.
Level
Displays the minimum level of security required to gain rights of access. For example,
noAuthNoPriv, authNoPriv, or auth-Priv.
ReadV
Displays the MIB view to which this entry authorizes the read access.
WriteV
Displays the MIB view to which this entry authorizes the write access.
NotifyV
Displays the Notify view to which this entry authorizes the notify access.
The following table describes the SNMPv3 View Table information.
SNMPv3 Access Table information
The following command displays SNMPv3 access information:
show snmp-server v3 access
Command mode: All
The access control sub system provides authorization services.
The vacmAccessTable maps a group name, security information, a context, and a message type, which could be
the read or write type of operation or notification into a MIB view.
The View-based Access Control Model defines a set of services that an application can use for checking access
rights of a group. This group‘s access rights are determined by a read-view, a write-view, and a notify-view. The
read-view represents the set of object instances authorized for the group while reading the objects. The write-view
represents the set of object instances authorized for the group when writing objects. The notify-view represents the
set of object instances authorized for the group when sending a notification.
The following table describes the SNMPv3 Access Table information.
Displays the security model used, which is any one of: USM, SNMPv1, SNMPv2, and SNMPv3.
User Name
Displays the name for the user.
Group Name
Displays the access name of the group.
Index Name User Name Tag
---------- ---------- -------------------- ---------trap1 public v1v2only v1v2trap
Table 12 Community Table information
Field
Description
Index
Displays the unique index value of a row in this table.
Name
Displays the community string, which represents the configuration.
User Name
Displays the User Security Model (USM) user name.
Tag
Displays the community tag. This tag specifies a set of transport endpoints from which a
command responder application accepts management requests and to which a command
responder application sends an SNMP trap.
SNMPv3 Group Table information
The following command displays SNMPv3 group information:
show snmp-server v3 group
Command mode: All
A group is a combination of security model and security name that defines the access rights assigned to all the
security names belonging to that group. The group is identified by a group name.
The following table describes the SNMPv3 Group Table information.
SNMPv3 Community Table information
The following command displays SNMPv3 community information:
show snmp-server v3 community
Command mode: All
This command displays the community table information stored in the SNMP engine.
The following table describes the SNMPv3 Community Table information.
Displays the locally arbitrary, but unique identifier associated with this snmpTargetAddrEntry.
Transport Addr
Displays the transport addresses.
Port
Displays the SNMP UDP port number.
Taglist
This column contains a list of tag values which are used to select target addresses for a
particular SNMP message.
Params
The value of this object identifies an entry in the snmpTargetParamsTable. The identified
entry contains SNMP parameters to be used when generating messages to be sent to this
transport address.
Displays the locally arbitrary, but unique identifier associated with this snmpTargeParamsEntry.
MP Model
Displays the Message Processing Model used when generating SNMP messages using this
entry.
User Name
Displays the securityName, which identifies the entry on whose behalf SNMP messages will be
generated using this entry.
Sec Model
Displays the security model used when generating SNMP messages using this entry. The system
may choose to return an inconsistentValue error if an attempt is made to set this variable to a
value for a security model which the system does not support.
Sec Level
Displays the level of security used when generating SNMP messages using this entry.
SNMPv3 Target Address Table information
The following command displays SNMPv3 target address information:
show snmp-server v3 target-address
Command mode: All
This command displays the SNMPv3 target address table information, which is stored in the SNMP engine.
The following table describes the SNMPv3 Target Address Table information.
SNMPv3 Target Parameters Table information
The following command displays SNMPv3 target parameters information:
show snmp-server v3 target-parameters
Command mode: All
The following table describes the SNMPv3 Target Parameters Table information.
The locally arbitrary, but unique identifier associated with this snmpNotifyEntry.
Tag
This represents a single tag value which is used to select entries in the snmpTargetAddrTable.
Any entry in the snmpTargetAddrTablethat contains a tag value equal to the value of this
entry is selected. If this entry contains a value of zero length, no entries are selected.
SNMPv3 Notify Table information
The following command displays the SNMPv3 Notify Table:
show snmp-server v3 notify
Command mode: All
The following table describes the SNMPv3 Notify Table information.
-------------------------------- -------------------------------admin NO AUTH, NO PRIVACY
adminmd5 HMAC_MD5, DES PRIVACY
adminsha HMAC_SHA, DES PRIVACY
v1v2only NO AUTH, NO PRIVACY
vacmAccess Table:
Group Name Prefix Model Level ReadV WriteV NotifyV
Switch is up 0 days, 14 hours, 56 minutes and 22 seconds.
Last boot: 17:25:38 Mon Jan 8, 2006 (software reset)
MAC address: 00:10:00:01:00:01 IP (If 1) address: 10.14.4.16
Revision:
Switch Serial No:
Spare Part No:
Software Version 1.0.0 (FLASH image2), active configuration.
System information
The following command displays system information:
show sys-info
Command mode: All
System information includes:
System date and time
Switch model name and number
Rack name and location
Time of last boot
MAC address of the switch management processor
IP address of the switch
Software image file and version number
Current configuration block (active, backup, or factory default)
Login banner, if one is configured
---- ---- ----------------- ------Jul 8 17:25:41 NOTICE system: link up on port 1
Jul 8 17:25:41 NOTICE system: link up on port 8
Jul 8 17:25:41 NOTICE system: link up on port 7
Jul 8 17:25:41 NOTICE system: link up on port 12
Jul 8 17:25:41 NOTICE system: link up on port 11
Jul 8 17:25:41 NOTICE system: link up on port 14
Jul 8 17:25:41 NOTICE system: link up on port 13
Jul 8 17:25:41 NOTICE system: link up on port 16
Jul 8 17:25:41 NOTICE system: link up on port 15
Jul 8 17:25:41 NOTICE system: link up on port 17
Jul 8 17:25:41 NOTICE system: link up on port 20
Jul 8 17:25:41 NOTICE system: link up on port 22
Jul 8 17:25:41 NOTICE system: link up on port 23
Jul 8 17:25:41 NOTICE system: link up on port 21
Jul 8 17:25:42 NOTICE system: link up on port 4
Jul 8 17:25:42 NOTICE system: link up on port 3
Jul 8 17:25:42 NOTICE system: link up on port 6
Jul 8 17:25:42 NOTICE system: link up on port 5
Jul 8 17:25:42 NOTICE system: link up on port 10
Current User ID table:
1: name tech1 , ena, cos user , password valid, online
2: name tech2 , ena, cos user , password valid, offline
Show recent syslog messages
The following command displays system log messages:
show logging messages
Command mode: All
Each message contains a date and time field and has a severity level associated with it. One of eight different
prefixes is used to indicate the condition:
EMERG—indicates the system is unusable
ALERT—indicates action should be taken immediately
CRIT—indicates critical conditions
ERR—indicates error conditions or eroded operations
WARNING—indicates warning conditions
NOTICE—indicates a normal but significant condition
INFO—indicates an information message
DEBUG—indicates a debug-level message
System user information
The following command displays user status information:
VLAN Number VLAN Name Status Port membership of the VLAN
Command mode: All
show layer2 information
Dumps all switch information available from Layer 2
memory (10K or more, depending on your configuration).
If you want to capture dump data to a file, set your
communication software on your workstation to capture
session data prior to issuing the dump commands.
Command mode: All
The following table describes the user status information.
Layer 2 information
The following table describes the Layer 2 Information commands. The following sections provide more detailed
information and commands.
NOTE: The master forwarding database supports up to 8K MAC address entries on the management
processor (MP) per switch.
Table 18 FDB information commands
show mac-address-table address<mac-
address>
Displays a single database entry by its MAC address. You are
prompted to enter the MAC address of the device.
Enter the MAC address using the format: xx:xx:xx:xx:xx:xx.
(For example: 08:00:20:12:34:56)
You can also enter the MAC address using the format:
xxxxxxxxxxxx. (For example: 080020123456)
Command mode: All
show mac-address-table port<port
number>
Displays all FDB entries for a particular port.
Command mode: All
show mac-address-table vlan <1-4095>
Displays all FDB entries on a single VLAN. The range is
1-4095.
Command mode: All
show mac-address-table state
{forward|trunk|unknown}
Displays all FDB entries that match a particular state.
Command mode: All
show mac-address-table
Displays all entries in the Forwarding Database.
Command mode: All
The forwarding database (FDB) contains information that maps the media access control (MAC) address of each
known device to the switch port where the device address was learned. The FDB also shows which other ports
have seen frames destined for a particular MAC address.
Show all FDB information
The following command displays Forwarding Database information:
show mac-address-table
Command mode: All
An address that is in the forwarding (FWD) state indicates that the switch has learned it. When in the trunking
(TRK) state, the Trnk field displays the trunk group number. If the state for the port is listed as unknown (UNK), the
MAC address has not yet been learned by the switch, but has only been seen as a destination address. When an
Clearing entries from the forwarding database
address is in the unknown state, no outbound port is indicated.
To delete a static MAC address from the forwarding database (FDB), see the ―Static FDB configuration‖ section in
The following table describes the Link Aggregation Control Protocol information commands.
LACP dump
The following command displays LACP information:
show lacp information
Command mode: All
LACP dump includes the following information for each port in the switch:
lacp—Displays the port‘s LACP mode (active, passive, or off)adminkey—Displays the value of the port‘s adminkey.operkey—Shows the value of the port‘s operational key.selected—Indicates whether the port has been selected to be part of a Link Aggregation Group.
prio—Shows the value of the port priority.
attached aggr—Displays the aggregator associated with each port.
trunk—This value represents the LACP trunk group number.