express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional
warranty. NEC shall not be liable for technical or editorial errors or omissions contained herein.
Microsoft®, Windows®, and Windows NT® are U.S. registered trademarks of Microsoft Corporation.
SunOS™ and Solaris™ are trademarks of Sun Microsystems, Inc. in the U.S. and other countries.
Cisco® is a registered trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
Part number: 856-126757-304-00
Second edition: Oct 2007
Connecting to the switch ........................................................................................................................................ 8
Establishing a console connection .................................................................................................................... 8
Setting an IP address ........................................................................................................................................ 9
Establishing a Telnet connection ...................................................................................................................... 9
Establishing an SSH connection ....................................................................................................................... 9
Accessing the switch ............................................................................................................................................ 10
Accessing the ISCLI ............................................................................................................................................. 13
Global commands ................................................................................................................................................. 14
Command line interface shortcuts ........................................................................................................................ 15
System Information commands ............................................................................................................................ 17
SNMPv3 Information commands .......................................................................................................................... 17
SNMPv3 USM User Table information ............................................................................................................ 18
SNMPv3 View Table information .................................................................................................................... 18
System information ............................................................................................................................................... 24
Show recent syslog messages ............................................................................................................................. 25
System user information ....................................................................................................................................... 25
Layer 2 information ............................................................................................................................................... 26
FDB information commands ................................................................................................................................. 27
Show all FDB information ................................................................................................................................ 27
Clearing entries from the forwarding database ............................................................................................... 27
Link Aggregation Control Protocol information ..................................................................................................... 28
802.1x information ................................................................................................................................ ................ 29
Spanning Tree information ................................................................................................................................... 30
Rapid Spanning Tree and Multiple Spanning Tree information ............................................................................ 32
Common Internal Spanning Tree information ....................................................................................................... 34
Trunk group information ....................................................................................................................................... 36
VLAN information ................................................................................................................................................. 36
Layer 3 information ............................................................................................................................................... 37
Route information ................................................................................................................................................. 37
Show all IP Route information ......................................................................................................................... 38
ARP information ................................................................................................................................................... 39
Show all ARP entry information ...................................................................................................................... 39
ARP address list information ........................................................................................................................... 39
OSPF information ................................................................................................................................................. 40
OSPF general information ............................................................................................................................... 41
OSPF interface information ............................................................................................................................. 41
OSPF Database information ........................................................................................................................... 42
OSPF route codes information ........................................................................................................................ 43
Routing Information Protocol information ............................................................................................................. 43
RIP Routes information ................................................................................................................................... 43
RIP user configuration ..................................................................................................................................... 44
IP information ....................................................................................................................................................... 44
IGMP multicast group information ........................................................................................................................ 45
IGMP multicast router port information ................................................................................................................. 45
VRRP information ................................................................................................................................................. 46
802.1p information ................................................................................................................................................ 47
ACL information .................................................................................................................................................... 48
RMON Information ................................................................................................................................................ 48
RMON history information ............................................................................................................................... 48
RMON alarm information ................................................................................................................................ 49
RMON event information ................................................................................................................................. 50
Link status information .......................................................................................................................................... 51
Port information .................................................................................................................................................... 52
Logical Port to GEA Port mapping ........................................................................................................................ 53
SFP information .................................................................................................................................................... 53
Uplink Failure Detection information ..................................................................................................................... 54
Information dump .................................................................................................................................................. 54
Port Statistics ........................................................................................................................................................ 55
Internet Protocol (IP) statistics ........................................................................................................................ 61
Link statistics ................................................................................................................................................... 62
Port RMON statistics ....................................................................................................................................... 62
IP statistics ...................................................................................................................................................... 66
DNS statistics .................................................................................................................................................. 67
OSPF global statistics ..................................................................................................................................... 71
CPU statistics .................................................................................................................................................. 78
Viewing and saving changes ................................................................................................................................ 83
Saving the configuration ....................................................................................................................................... 83
System configuration ................................................................................................ ............................................ 84
System host log configuration ......................................................................................................................... 85
Secure Shell Server configuration................................................................................................................... 86
RADIUS server configuration .......................................................................................................................... 87
TACACS+ server configuration ....................................................................................................................... 88
NTP server configuration ................................................................................................................................ 89
System SNMP configuration ........................................................................................................................... 90
SNMPv3 View-based Access Control Model configuration............................................................................. 93
SNMPv3 Group configuration ......................................................................................................................... 93
SNMPv3 Community Table configuration ....................................................................................................... 94
System Access configuration .......................................................................................................................... 96
User Access Control configuration .................................................................................................................. 97
User ID configuration ...................................................................................................................................... 97
Port configuration ................................................................................................................................................. 99
Temporarily disabling a port .......................................................................................................................... 100
Port link configuration .................................................................................................................................... 100
ACL Port configuration .................................................................................................................................. 100
802.1x Global configuration .......................................................................................................................... 102
802.1x Port configuration .............................................................................................................................. 103
Rapid Spanning Tree Protocol / Multiple Spanning Tree Protocol configuration ................................................ 104
Common Internal Spanning Tree configuration ............................................................................................ 105
CIST port configuration ................................................................................................................................. 106
Spanning Tree configuration .............................................................................................................................. 107
Bridge Spanning Tree configuration .............................................................................................................. 108
Spanning Tree port configuration .................................................................................................................. 109
Layer 2 IP Trunk Hash configuration ............................................................................................................. 111
Link Aggregation Control Protocol configuration ................................................................................................ 111
LACP Port configuration ................................................................................................................................ 112
IP interface configuration .............................................................................................................................. 113
IP Forwarding configuration ................................................................................................................................ 115
IP Access List configuration .......................................................................................................................... 118
Routing Information Protocol configuration ........................................................................................................ 119
Open Shortest Path First configuration .............................................................................................................. 121
OSFP Area Index configuration .................................................................................................................... 122
OSPF Summary Range configuration ........................................................................................................... 123
IGMP filtering port configuration.................................................................................................................... 128
Domain Name System configuration .................................................................................................................. 128
Quality of Service configuration .......................................................................................................................... 134
Access Control configuration .............................................................................................................................. 135
Access Control List configuration .................................................................................................................. 135
ACL Group configuration ............................................................................................................................... 139
RMON history configuration .......................................................................................................................... 140
Port mirroring ...................................................................................................................................................... 142
Port-based port mirroring .............................................................................................................................. 142
Link to Monitor configuration ......................................................................................................................... 143
Link to Disable configuration ......................................................................................................................... 144
Saving the active switch configuration ................................................................................................................ 145
Restoring the active switch configuration ........................................................................................................... 145
Operations-level port options ........................................................................................................................ 146
Operations-level port 802.1x options ............................................................................................................ 146
Updating the switch software image ................................................................................................................... 148
Downloading new software to the switch ...................................................................................................... 148
Selecting a software image to run ...................................................................................................................... 149
Uploading a software image from the switch ...................................................................................................... 149
Selecting a configuration block ........................................................................................................................... 150
Resetting the switch ........................................................................................................................................... 150
Accessing the AOS CLI ................................................................................................................................. 151
System maintenance ..................................................................................................................................... 152
Technical support dump ................................................................................................................................ 154
TFTP/FTP technical support dump put ......................................................................................................... 154
TFTP/FTP system dump put ......................................................................................................................... 155
Clearing dump information ............................................................................................................................ 155
Unscheduled system dumps .............................................................................................................................. 156
The 1Gb Intelligent L3 Switch is ready to perform basic switching functions right out of the box. Some of the more
advanced features, however, require some administrative configuration before they can be used effectively.
The extensive switching software included in the switch provides a variety of options for accessing and configuring
the switch:
Text-based command line interfaces (AOS CLI and ISCLI) for access via a local terminal or remote
Telnet/Secure Shell (SSH) session
Simple Network Management Protocol (SNMP) support for access through network management software
such as NEC WebSAM NetvisorPro
A browser-based management interface for interactive network access through a Web browser
The ISCLI provides a direct method for collecting switch information and performing switch configuration. Use a
basic terminal to view information and statistics about the switch, and to perform any necessary configuration.
This chapter explains how to access the ISCLI to the switch.
Additional references
Additional information about installing and configuring the switch is available in the following guides, which are
attached in this product.
You can access the command line interface in one of the following ways:
Using a console connection via the console port
Using a Telnet connection over the network
Using a Secure Shell (SSH) connection to securely log in over a network
Establishing a console connection
To establish a console connection with the switch, you need:
A null modem cable with a female DB-9 connector (See the N8406-023 1Gb Intelligent L3 Switch User’s
Guide for more information.)
An ASCII terminal or a computer running terminal emulation software set to the parameters shown in the table
To establish a console connection with the switch:
1. Connect the terminal to the console port using the null modem cable.
2. Power on the terminal.
3. Press the Enter key a few times on the terminal to establish the connection.
4. You will be required to enter a password for access to the switch.
Setting an IP address
To access the switch via a Telnet or an SSH connection, you need to have an Internet Protocol (IP) address set for
the switch. The switch can get its IP address in one of the following ways:
Management port access:
Using a Dynamic Host Control Protocol (DHCP) server—When the dhcp client is enabled, the
management interface (interface 256) requests its IP address from a DHCP server. The default value for
the dhcp client is enabled.
Configuring manually—If the network does not support DHCP, you must configure the management
interface (interface 256) with an IP address. If you want to access the switch from a remote network, you
also must configure the management gateway (gateway 4).
Uplink port access:
Using a Bootstrap Protocol (BOOTP) server—By default, the management interface is set up to request
its IP address from a BOOTP server. If you have a BOOTP server on the network, add the Media Access
Control (MAC) address of the switch to the BOOTP configuration file located on the BOOTP server. The
MAC address can be found in the System Information menu (See the ―System Information commands‖
section in the ―Information Commands‖ chapter.) If you are using a DHCP server that also does BOOTP,
you do not have to configure the MAC address.
Configuring manually—If the network does not support BOOTP, you must configure the management port
with an IP address.
Establishing a Telnet connection
A Telnet connection offers the convenience of accessing the switch from any workstation connected to the network.
Telnet provides the same options for user, operator, and administrator access as those available through the
console port. By default, Telnet is enabled on the switch. The switch supports four concurrent Telnet connections.
Once the IP parameters are configured, you can access the ISCLI using a Telnet connection. To establish a Telnet
connection with the switch, run the Telnet program on the workstation and enter the telnet command, followed by
the switch IP address:
You will then be prompted to enter a password. The password determines the access level: administrator, operator,
or user. See the ―Accessing the switch‖ section later in this chapter for description of default passwords.
Establishing an SSH connection
Although a remote network administrator can manage the configuration of a switch via Telnet, this method does not
provide a secure connection. The Secure Shell (SSH) protocol enables you to securely log into this switch over the
network.
As a secure alternative to using Telnet to manage switch configuration, SSH ensures that all data sent over the
network is encrypted and secure. In order to use SSH, you must first configure it on the switch. See the ―Secure
Shell Server configuration‖ section in the ―Configuration Commands‖ chapter for information on how to configure
SSH.
The switch can perform only one session of key/cipher generation at a time. Therefore, an SSH/Secure Copy
(SCP) client will not be able to log in if the switch is performing key generation at that time or if another client has
just logged in before this client. Similarly, the system will fail to perform the key generation if an SSH/SCP client is
logging in at that time.
NOTE: This switch implementation of SSH is based on versions 1.5 and 2.0, and supports SSH clients from
version 1.0 through version 2.0. SSH clients of other versions are not supported. You may configure the client
software to use protocol SSH version 1 or version 2.
>> # ssh <user>@<1Gb Intelligent L3 Switch IP address>
NOTE: The first time you run SSH from the workstation, a warning message might appear. At the prompt,
enter yes to continue.
NOTE: It is recommended that you change default switch passwords after initial configuration and as
regularly as required under your network security policies. For more information, see the ―Setting passwords‖
section in the ―First-time configuration‖ chapter.
The supported SSH encryption and authentication methods are listed below.
Server Host Authentication—Client RSA authenticates the switch in the beginning of every connection
Key Exchange—RSA
Encryption:
User Authentication—Local password authentication; Remote Authentication Dial-in User Service (RADIUS)
The following SSH clients are supported:
SSH 3.0.1 for Linux (freeware)
SecureCRT® 4.1.8 (VanDyke Technologies, Inc.)
OpenSSH_3.9 for Linux (FC 3)
FedoraCore 3 for SCP commands
PuTTY Release 0.58 (Simon Tatham) for Windows
By default, SSH service is not enabled on the switch. Once the IP parameters are configured, you can access the
ISCLI to enable SSH.
To establish an SSH connection with the switch, run the SSH program on the workstation by issuing the ssh
command, followed by the user account name and the switch IP address:
You will then be prompted to enter your password.
Accessing the switch
To enable better switch management and user accountability, this switch provides different levels or classes of user
access. Levels of access to the CLI and Web management functions and screens increase as needed to perform
various switch management tasks. The three levels of access are:
User— Interaction with the switch is completely passive—nothing can be changed on this switch. Users may
display information that has no security or privacy implications, such as switch statistics and current
operational state information.
Operator— Interaction with the switch is completely passive—nothing can be changed on this switch. Users
may display information that has no security or privacy implications, such as switch statistics and current
operational state information.
Administrator— Administrators are the only ones that may make permanent changes to the switch
configuration—changes that are persistent across a reload/reset of the switch. Administrators can access
switch functions to configure and troubleshoot problems on this switch. Because administrators can also
make temporary (operator-level) changes as well, they must be aware of the interactions between temporary
and permanent changes.
Access to switch functions is controlled through the use of unique usernames and passwords. Once you are
connected to the switch via the local console, Telnet, or SSH, you are prompted to enter a password. The
password entered determines the access level. The default user names/password for each access level is listed in
the following table.
The User has no direct responsibility for switch management. He or she can view all switch
status information and statistics, but cannot make any configuration changes to the switch.
The user account is enabled by default, and the default password is user.
Oper
The Operator has no direct responsibility for switch management. He or she can view all
switch status information and statistics, but cannot make any configuration changes to the
switch.
By default, the operator account is disabled and has no password.
Admin
The super user administrator has complete access to all command modes on the switch,
including the ability to change both the user and administrator passwords.
The admin account is enabled by default, and the default password is admin.
NOTE: With the exception of the admin user, access to each user level can be disabled by setting the
password to an empty value.
Typeface or symbol
Meaning
angle brackets < >
Indicate a variable to enter based on the description inside the brackets. Do not type the
brackets as you enter the command.
Example: If the command syntax is
ping <IP address>
you enter
ping 192.32.10.12
bold body text
Indicates objects, such as window names, icons, and user-interface objects, such as
buttons and tabs.
bold Courier text
Indicates command names, options, and text that you must enter.
Example:
Use the show ip arp commands.
plain Courier text
Indicates command syntax and system output (for example: prompts and system
messages). Example:
configure terminal
braces { }
Indicate required elements in syntax descriptions where there is more than one option.
You must choose only one of the options. Do not type the braces when entering the
command.
Example: If the command syntax is
show portchannel {<1-12>|hash|information}
you must enter:
show portchannel <1-12>
or
show portchannel hash
or
show portchannel information
Once you enter the administrator password and it is verified, you are given complete access to this switch.
Idle timeout
By default, this switch disconnects the console, Telnet, or SSH session after five minutes of inactivity. This function
is controlled by the idle timeout parameter, which can be set from 1 to 60 minutes. To change this parameter, see
the ―System configuration‖ section in the ―Configuration Commands‖ chapter.
Typographical conventions
The following table describes the typographic styles used in this guide:
Indicate optional elements in syntax descriptions. Do not type the brackets when entering
the command.
Example: If the command syntax is
show ip interface [<1-256>]
you can enter
show ip interface
or
show ip interface 1
italic text
Indicates variables in command syntax descriptions. Also indicates new terms and book
titles. Where a variable is two or more words, the words are connected by a hyphen.
Example: If the command syntax is
show spanning-tree stp <1-32>
1-32 represents a number between 1-32.
vertical line |
Separates choices for command keywords and arguments. Enter only one of the choices.
Do not type the vertical line when entering the command.
Example: If the command syntax is
Default mode, entered automatically
Exit: exit or logout
Privileged EXEC
Switch#
Enter Privileged EXEC mode, from User EXEC mode: enable
Exit to User EXEC mode: disable
Quit ISCLI: exit or logout
Global configuration
Switch(config)#
Enter Global Configuration mode, from Privileged EXEC mode:
configure terminal
Exit to Privileged EXEC mode: end or exit
Port configuration
Switch(config-if)#
Enter Port Configuration mode, from Global Configuration mode:
interface gigabitethernet <port number>
Exit to Global Configuration mode: exit
Exit to Privileged EXEC mode: end
VLAN configuration
Switch(config-vlan)#
Enter VLAN Configuration mode, from Global Configuration mode: vlan <1-4095>
Exit to Global Configuration mode: exit
Exit to Privileged EXEC mode: end
Interface IP configuration
Switch(config-ip-if)#
Enter Interface IP Configuration mode, from Global Configuration mode:
interface ip <1-256>
Exit to Global Configuration mode: exit
Exit to Privileged EXEC mode: end
ISCLI basics
Introduction
The ISCLI is used for viewing switch information and statistics. In addition, the administrator can use the CLI for
performing all levels of switch configuration.
This chapter describes the ISCLI Command Modes, and provides a list of commands and shortcuts that are
commonly available from all the command modes within the ISCLI.
Accessing the ISCLI
The first time you start this switch, it boots into the AOS CLI. To access the ISCLI, enter the following command
and reset the switch:
To access the AOS CLI, enter the following command from the ISCLI and reload the switch:
The switch retains your CLI selection, even when you reset the configuration to factory defaults. The CLI boot mode
is not part of the configuration settings.
ISCLI Command Modes
The ISCLI has three major command modes, listed in order of increasing privileges, as follows:
User EXEC mode: This is the initial mode of access. By default, password checking is disabled for this mode.
Privileged EXEC mode: The mode is accessed from User EXEC mode. If the Privileged EXEC password is
enabled, you must enter a password to access Privileged EXEC mode.
Global Configuration mode: This mode allows you to make changes to the running configuration of the switch. If
you save the configuration, the settings survive a reload of the switch. Several submodes are available within the
Global Configuration mode (the following table for more information.
Each command mode provides a specific set of commands. The command set of each higher-privilege mode is a
superset of the lower-privilege mode(s). All commands available in lower-lower-privilege modes are available in the
higher-privilege modes.
The following table describes the ISCLI command modes.
IP address is the hostname or IP address of the target
station.
max-hops (optional) is the maximum distance to trace
(1-16 devices)
msec delay (optional) is the number of milliseconds to wait
for the response.
telnet
Allows you to Telnet out of the switch. The format is as follows:
telnet <host name> | <IP address> [<port
number>]
show history
Displays the 10 most recent commands.
console-log
Enables or disables console logs for the current session.
who
Displays a list of users who are currently logged in.
Global commands
Some basic commands are recognized throughout the ISCLI hierarchy. These commands are useful for obtaining
online Help, navigating through the interface, and saving configuration changes. To get help about a specific
command, type the command, followed by help.
The following table describes the global commands.
The following shortcuts allow you to enter commands quickly and easily.
Command abbreviation
Most commands can be abbreviated by entering the first characters that distinguish the command from the others
in the same mode. For example, consider the following full command:
The command shown above could also be entered as:
Tab completion
Entering the first letter of a command at any prompt and press the Tab key to display all available commands or
options that begin with that letter. Entering additional letters further refines the list of commands or options
displayed.
If only one command fits the input text when you press the Tab key, that command is supplied on the command
line, waiting to be entered.
Displays Remote Monitoring Information.
Command mode: All
show interface link
Displays configuration information about each port, including:
Port number Port speed (10 Mb/s, 100 Mb/s, 1000 Mb/s, or any) Duplex mode (half, full, or any) Flow control for transmit and receive (no, yes, or any) Link status (up or down)
Command mode: All
show interface information
Displays port status information, including:
Port number Whether the port uses VLAN tagging or not Port VLAN ID (PVID) Port name VLAN membership
Command mode: All
show geaport
Displays GEA port mapping information, used by service personnel.
Command mode: All
show sfp
Displays SFP module information.
Command mode: All
show ufd
Displays Uplink Failure Detection information.
Command mode: All
show information-dump
Dumps all switch information available (10K or more, depending on your
configuration).
If you want to capture dump data to a file, set your communication
software on your workstation to capture session data prior to issuing the
dump commands.
Command mode: All
Information Commands
Introduction
You can view configuration information for the switch in the ISCLI. This chapter discusses how to use the ISCLI to
display switch information.
The following table describes general information commands.
System date and time Switch model name and number Switch name and location Time of last boot MAC address of the switch management processor IP address of IP interface #1 Hardware version and part number Software image file and version number Configuration name Log-in banner, if one is configured
Command mode: All
show logging messages
Displays most recent syslog messages.
Command mode: All
show access user
Displays User Access information.
Command mode: All except User EXEC
Table 7 SNMPv3 Information commands
Command
Usage
show snmp-server v3 user
Displays User Security Model (USM) table information.
Command mode: All
show snmp-server v3 view
Displays information about view name, subtrees, mask and
type of view.
Command mode: All
show snmp-server v3 access
Displays View-based Access Control information.
Command mode: All
show snmp-server v3 group
Displays information about the group that includes the
security model, user name, and group name.
Command mode: All
show snmp-server v3 community
Displays information about the community table.
Command mode: All
show snmp-server v3 target-address
Displays the Target Address table.
Command mode: All
show snmp-server v3 target-parameters
Displays the Target parameters table.
Command mode: All
show snmp-server v3 notify
Displays the Notify table.
Command mode: All
show snmp-server v3
Displays all the SNMPv3 information.
Command mode: All
System Information commands
The following table describes the System Information commands.
SNMPv3 Information commands
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework by
supporting the following:
a new SNMP message format
security for messages
access control
remote configuration of SNMP parameters
For more details on the SNMPv3 architecture, see RFC2271 to RFC2276.
The following table describes the SNMPv3 Information commands.
-------------------------------- -------------------------------adminmd5 HMAC_MD5, DES PRIVACY
adminsha HMAC_SHA, DES PRIVACY
v1v2only NO AUTH, NO PRIVACY
Table 8 User Table parameters
Field
Description
User Name
This is a string that represents the name of the user that you can use to access the
switch.
Protocol
This indicates whether messages sent on behalf of this user are protected from
disclosure using a privacy protocol. switch software supports DES algorithm for privacy.
The software also supports two authentication algorithms: MD5 and HMAC-SHA.
View Name Subtree Mask Type
------------------ ---------------------------- ------------- -------iso 1 included
v1v2only 1 included
v1v2only 1.3.6.1.6.3.15 excluded
v1v2only 1.3.6.1.6.3.16 excluded
v1v2only 1.3.6.1.6.3.18 excluded
SNMPv3 USM User Table information
The following command displays SNMPv3 user information:
show snmp-server v3 user
Command mode: All
The User-based Security Model (USM) in SNMPv3 provides security services such as authentication and privacy of
messages. This security model makes use of a defined set of user identities displayed in the USM user table. The
USM user table contains information like:
the user name
a security name in the form of a string whose format is independent of the Security Model
an authentication protocol, which is an indication that the messages sent on behalf of the user can be
authenticated
the privacy protocol.
The following table describes the SNMPv3 User Table information.
SNMPv3 View Table information
The following command displays the SNMPv3 View Table:
show snmp-server v3 view
Command mode: All
The user can control and restrict the access allowed to a group to only a subset of the management information in
the management domain that the group can access within each context by specifying the group‘s rights in terms of
a particular MIB view for security reasons.
Displays the MIB subtree as an OID string. A view subtree is the set of all MIB
object instances which have a common Object Identifier prefix to their names.
Mask
Displays the bit mask.
Type
Displays whether a family of view subtrees is included or excluded from the MIB
view.
Group Name Model Level ReadV WriteV NotifyV
---------- ------- ------------ --------- -------- ------v1v2grp snmpv1 noAuthNoPriv iso iso v1v2only
admingrp usm authPriv iso iso iso
Table 10 Access Table parameters
Field
Description
Group Name
Displays the name of group.
Model
Displays the security model used, for example, SNMPv1, or SNMPv2 or USM.
Level
Displays the minimum level of security required to gain rights of access. For example,
noAuthNoPriv, authNoPriv, or auth-Priv.
ReadV
Displays the MIB view to which this entry authorizes the read access.
WriteV
Displays the MIB view to which this entry authorizes the write access.
NotifyV
Displays the Notify view to which this entry authorizes the notify access.
The following table describes the SNMPv3 View Table information.
SNMPv3 Access Table information
The following command displays SNMPv3 access information:
show snmp-server v3 access
Command mode: All
The access control sub system provides authorization services.
The vacmAccessTable maps a group name, security information, a context, and a message type, which could be
the read or write type of operation or notification into a MIB view.
The View-based Access Control Model defines a set of services that an application can use for checking access
rights of a group. This group‘s access rights are determined by a read-view, a write-view, and a notify-view. The
read-view represents the set of object instances authorized for the group while reading the objects. The write-view
represents the set of object instances authorized for the group when writing objects. The notify-view represents the
set of object instances authorized for the group when sending a notification.
The following table describes the SNMPv3 Access Table information.
Displays the security model used, which is any one of: USM, SNMPv1, SNMPv2, and SNMPv3.
User Name
Displays the name for the user.
Group Name
Displays the access name of the group.
Index Name User Name Tag
---------- ---------- -------------------- ---------trap1 public v1v2only v1v2trap
Table 12 Community Table information
Field
Description
Index
Displays the unique index value of a row in this table.
Name
Displays the community string, which represents the configuration.
User Name
Displays the User Security Model (USM) user name.
Tag
Displays the community tag. This tag specifies a set of transport endpoints from which a
command responder application accepts management requests and to which a command
responder application sends an SNMP trap.
SNMPv3 Group Table information
The following command displays SNMPv3 group information:
show snmp-server v3 group
Command mode: All
A group is a combination of security model and security name that defines the access rights assigned to all the
security names belonging to that group. The group is identified by a group name.
The following table describes the SNMPv3 Group Table information.
SNMPv3 Community Table information
The following command displays SNMPv3 community information:
show snmp-server v3 community
Command mode: All
This command displays the community table information stored in the SNMP engine.
The following table describes the SNMPv3 Community Table information.
Displays the locally arbitrary, but unique identifier associated with this snmpTargetAddrEntry.
Transport Addr
Displays the transport addresses.
Port
Displays the SNMP UDP port number.
Taglist
This column contains a list of tag values which are used to select target addresses for a
particular SNMP message.
Params
The value of this object identifies an entry in the snmpTargetParamsTable. The identified
entry contains SNMP parameters to be used when generating messages to be sent to this
transport address.
Displays the locally arbitrary, but unique identifier associated with this snmpTargeParamsEntry.
MP Model
Displays the Message Processing Model used when generating SNMP messages using this
entry.
User Name
Displays the securityName, which identifies the entry on whose behalf SNMP messages will be
generated using this entry.
Sec Model
Displays the security model used when generating SNMP messages using this entry. The system
may choose to return an inconsistentValue error if an attempt is made to set this variable to a
value for a security model which the system does not support.
Sec Level
Displays the level of security used when generating SNMP messages using this entry.
SNMPv3 Target Address Table information
The following command displays SNMPv3 target address information:
show snmp-server v3 target-address
Command mode: All
This command displays the SNMPv3 target address table information, which is stored in the SNMP engine.
The following table describes the SNMPv3 Target Address Table information.
SNMPv3 Target Parameters Table information
The following command displays SNMPv3 target parameters information:
show snmp-server v3 target-parameters
Command mode: All
The following table describes the SNMPv3 Target Parameters Table information.
The locally arbitrary, but unique identifier associated with this snmpNotifyEntry.
Tag
This represents a single tag value which is used to select entries in the snmpTargetAddrTable.
Any entry in the snmpTargetAddrTablethat contains a tag value equal to the value of this
entry is selected. If this entry contains a value of zero length, no entries are selected.
SNMPv3 Notify Table information
The following command displays the SNMPv3 Notify Table:
show snmp-server v3 notify
Command mode: All
The following table describes the SNMPv3 Notify Table information.
-------------------------------- -------------------------------admin NO AUTH, NO PRIVACY
adminmd5 HMAC_MD5, DES PRIVACY
adminsha HMAC_SHA, DES PRIVACY
v1v2only NO AUTH, NO PRIVACY
vacmAccess Table:
Group Name Prefix Model Level ReadV WriteV NotifyV
Switch is up 0 days, 14 hours, 56 minutes and 22 seconds.
Last boot: 17:25:38 Mon Jan 8, 2006 (software reset)
MAC address: 00:10:00:01:00:01 IP (If 1) address: 10.14.4.16
Revision:
Switch Serial No:
Spare Part No:
Software Version 1.0.0 (FLASH image2), active configuration.
System information
The following command displays system information:
show sys-info
Command mode: All
System information includes:
System date and time
Switch model name and number
Rack name and location
Time of last boot
MAC address of the switch management processor
IP address of the switch
Software image file and version number
Current configuration block (active, backup, or factory default)
Login banner, if one is configured
---- ---- ----------------- ------Jul 8 17:25:41 NOTICE system: link up on port 1
Jul 8 17:25:41 NOTICE system: link up on port 8
Jul 8 17:25:41 NOTICE system: link up on port 7
Jul 8 17:25:41 NOTICE system: link up on port 12
Jul 8 17:25:41 NOTICE system: link up on port 11
Jul 8 17:25:41 NOTICE system: link up on port 14
Jul 8 17:25:41 NOTICE system: link up on port 13
Jul 8 17:25:41 NOTICE system: link up on port 16
Jul 8 17:25:41 NOTICE system: link up on port 15
Jul 8 17:25:41 NOTICE system: link up on port 17
Jul 8 17:25:41 NOTICE system: link up on port 20
Jul 8 17:25:41 NOTICE system: link up on port 22
Jul 8 17:25:41 NOTICE system: link up on port 23
Jul 8 17:25:41 NOTICE system: link up on port 21
Jul 8 17:25:42 NOTICE system: link up on port 4
Jul 8 17:25:42 NOTICE system: link up on port 3
Jul 8 17:25:42 NOTICE system: link up on port 6
Jul 8 17:25:42 NOTICE system: link up on port 5
Jul 8 17:25:42 NOTICE system: link up on port 10
Current User ID table:
1: name tech1 , ena, cos user , password valid, online
2: name tech2 , ena, cos user , password valid, offline
Show recent syslog messages
The following command displays system log messages:
show logging messages
Command mode: All
Each message contains a date and time field and has a severity level associated with it. One of eight different
prefixes is used to indicate the condition:
EMERG—indicates the system is unusable
ALERT—indicates action should be taken immediately
CRIT—indicates critical conditions
ERR—indicates error conditions or eroded operations
WARNING—indicates warning conditions
NOTICE—indicates a normal but significant condition
INFO—indicates an information message
DEBUG—indicates a debug-level message
System user information
The following command displays user status information:
VLAN Number VLAN Name Status Port membership of the VLAN
Command mode: All
show layer2 information
Dumps all switch information available from Layer 2
memory (10K or more, depending on your configuration).
If you want to capture dump data to a file, set your
communication software on your workstation to capture
session data prior to issuing the dump commands.
Command mode: All
The following table describes the user status information.
Layer 2 information
The following table describes the Layer 2 Information commands. The following sections provide more detailed
information and commands.
NOTE: The master forwarding database supports up to 8K MAC address entries on the management
processor (MP) per switch.
Table 18 FDB information commands
show mac-address-table address<mac-
address>
Displays a single database entry by its MAC address. You are
prompted to enter the MAC address of the device.
Enter the MAC address using the format: xx:xx:xx:xx:xx:xx.
(For example: 08:00:20:12:34:56)
You can also enter the MAC address using the format:
xxxxxxxxxxxx. (For example: 080020123456)
Command mode: All
show mac-address-table port<port
number>
Displays all FDB entries for a particular port.
Command mode: All
show mac-address-table vlan <1-4095>
Displays all FDB entries on a single VLAN. The range is
1-4095.
Command mode: All
show mac-address-table state
{forward|trunk|unknown}
Displays all FDB entries that match a particular state.
Command mode: All
show mac-address-table
Displays all entries in the Forwarding Database.
Command mode: All
The forwarding database (FDB) contains information that maps the media access control (MAC) address of each
known device to the switch port where the device address was learned. The FDB also shows which other ports
have seen frames destined for a particular MAC address.
Show all FDB information
The following command displays Forwarding Database information:
show mac-address-table
Command mode: All
An address that is in the forwarding (FWD) state indicates that the switch has learned it. When in the trunking
(TRK) state, the Trnk field displays the trunk group number. If the state for the port is listed as unknown (UNK), the
MAC address has not yet been learned by the switch, but has only been seen as a destination address. When an
Clearing entries from the forwarding database
address is in the unknown state, no outbound port is indicated.
To delete a static MAC address from the forwarding database (FDB), see the ―Static FDB configuration‖ section in
The following table describes the Link Aggregation Control Protocol information commands.
LACP dump
The following command displays LACP information:
show lacp information
Command mode: All
LACP dump includes the following information for each port in the switch:
lacp—Displays the port‘s LACP mode (active, passive, or off)adminkey—Displays the value of the port‘s adminkey.operkey—Shows the value of the port‘s operational key.selected—Indicates whether the port has been selected to be part of a Link Aggregation Group.
prio—Shows the value of the port priority.
attached aggr—Displays the aggregator associated with each port.
trunk—This value represents the LACP trunk group number.
Shows information about the root bridge for the Spanning Tree. Information includes the
priority (hex) and MAC address of the root.
Path-Cost
Path-cost is the total path cost to the root bridge. It is the summation of the path cost
between bridges (up to the root bridge).
Port
The current root port refers to the port on the switch that receives data from the current root.
Zero (0) indicates the root bridge of the STP.
Priority
(bridge)
The bridge priority parameter controls which bridge on the network will become the STP root
bridge.
Hello
The hello time parameter specifies, in seconds, how often the root bridge transmits a
configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge uses
the root bridge hello value.
MaxAge
The maximum age parameter specifies, in seconds, the maximum time the bridge waits
without receiving a configuration bridge protocol data unit before it reconfigures the STP
network. If the bridge is not the root bridge, it uses the MaxAge value of the root bridge.
FwdDel
The forward delay parameter specifies, in seconds, the amount of time that a bridge port has
to wait before it changes from learning state to forwarding state. If the bridge is not the root
bridge, it uses the FwdDel value of the root bridge.
Aging
The aging time parameter specifies, in seconds, the amount of time the bridge waits without
receiving a packet from a station before removing the station from the Forwarding Database.
Priority (port)
The port priority parameter helps determine which bridge port becomes the designated port.
In a network topology that has multiple bridge ports connected to a single segment, the port
with the lowest port priority becomes the designated port for the segment.
Cost
The port path cost parameter is used to help determine the designated port for a segment.
Generally speaking, the faster the port, the lower the path cost.
State
The State field shows the current state of the port. The State field can be one of the
following: BLOCKING, LISTENING, LEARNING, FORWARDING, or DISABLED.
Designated
bridge
Shows information about the bridge connected to each port, if applicable. Information
includes the priority (hex) and MAC address of the Designated Bridge.
Designated port
The port ID of the port on the Designated Bridge to which this port is connected. This
information includes the port priority (hex) and the port number (hex).
Maximum age value
Forwarding delay
Aging time
You can also refer to the following port-specific STP information:
Port number and priority
Cost
State
Port Fast Forwarding state
Designated bridge
Designated port
Rapid Spanning Tree and Multiple Spanning Tree information
The following command displays RSTP/MSTP information:
show spanning-tree
Command mode: All
The switch software can be set to use the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) or the IEEE 802.1s
Multiple Spanning Tree Protocol (MSTP). If RSTP/MSTP is turned on, you can view the following RSTP bridge
information for the Spanning Tree Group:
Status of Uplink Fast (upfast)
Current root MAC address
Path-Cost
Port
Hello interval
Maximum age value
Forwarding delay
Aging time
You can also refer to the following port-specific RSTP information:
Port number and priority
Cost
State
Role
Designated bridge and port
Link type
Table 23 Rapid Spanning Tree parameter descriptions
Parameter
Description
Current Root
Shows information about the root bridge for the Spanning Tree. Information includes the
priority (hex) and MAC address of the root.
Path-Cost
Path-cost is the total path cost to the root bridge. It is the summation of the path cost
between bridges (up to the root bridge).
Port
The current root port refers to the port on the switch that receives data from the current
root. Zero (0) indicates the root bridge of the STP.
Priority (bridge)
The bridge priority parameter controls which bridge on the network will become the STP
root bridge.
Hello
The hello time parameter specifies, in seconds, how often the root bridge transmits a
configurationbridge protocol data unit (BPDU). Any bridge that is not the root bridge uses
the root bridge hello value.
MaxAge
The maximum age parameter specifies, in seconds, the maximum time the bridge waits
without receiving a configuration bridge protocol data unit before it reconfigures the STP
network. If the bridge is not the root bridge, it uses the MaxAge value of the root bridge.
FwdDel
The forward delay parameter specifies, in seconds, the amount of time that a bridge port
has to wait before it changes from learning state to forwarding state. If the bridge is not
the root bridge, it uses the FwdDel value of the root bridge.
Aging
The aging time parameter specifies, in seconds, the amount of time the bridge waits
without receiving a packet from a station before removing the station from the
Forwarding Database.
Priority (port)
The port priority parameter helps determine which bridge port becomes the designated
port. In a network topology that has multiple bridge ports connected to a single segment,
the port with the lowest port priority becomes the designated port for the segment.
Cost
The port path cost parameter is used to help determine the designated port for a
segment. Generally speaking, the faster the port, the lower the path cost. A setting of
zero (0) indicates that the cost will be set to the appropriate default after the link speed
has been auto-negotiated.
State
Shows the current state of the port. The State field in RSTP/MSTP mode can be one of
the following: Discarding (DISC), Learning (LRN), Forwarding (FWD), or
Disabled (DSB).
Role
Shows the current role of this port in the Spanning Tree. The port role can be one of the
following: Designated (DESG), Root (ROOT), Alternate (ALTN), Backup (BKUP), Master
(MAST), or Unknown (UNK).
Designated bridge
Shows information about the bridge connected to each port, if applicable. Information
includes the priority (hex) and MAC address of the Designated Bridge.
Designated port
The port ID of the port on the Designated Bridge to which this port is connected.
Type
Type of link connected to the port, and whether the port is an edge port. Link type values
are AUTO, P2P, or SHARED.
The following table describes the STP parameters in RSTP or MSTP mode.
Table 24 Common Internal Spanning Tree parameter descriptions
Parameter
Description
CIST Root
Shows information about the root bridge for the Common Internal Spanning Tree
(CIST). Values on this row of information refer to the CIST root.
CIST Regional Root
Shows information about the root bridge for this MSTP region. Values on this row
of information refer to the regional root.
Priority (bridge)
The bridge priority parameter controls which bridge on the network will become
the STP root bridge.
MaxAge
The maximum age parameter specifies, in seconds, the maximum time the bridge
waits without receiving a configuration bridge protocol data unit before it
reconfigures the STP network.
FwdDel
The forward delay parameter specifies, in seconds, the amount of time that a
bridge port has to wait before it changes from learning state to forwarding state.
Hops
Shows the maximum number of bridge hops allowed before a packet is dropped.
Priority (port)
The port priority parameter helps determine which bridge port becomes the
designated port. In a network topology that has multiple bridge ports connected to
a single segment, the port with the lowest port priority becomes the designated
port for the segment.
Cost
The port path cost parameter is used to help determine the designated port for a
segment. Generally speaking, the faster the port, the lower the path cost. A
setting of zero (0) indicates that the cost will be set to the appropriate default after
the link speed has been auto-negotiated.
State
Shows the current state of the port. The state field can be one of the following:
Discarding (DISC), Learning (LRN), Forwarding (FWD), or
Disabled (DSB).
Role
Shows the current role of this port in the Spanning Tree. The port role can be one
of the following: Designated (DESG), Root (ROOT), Alternate (ALTN), Backup
(BKUP), Master (MAST), or Unknown (UNK).
Designated Bridge
Shows information about the bridge connected to each port, if applicable.
Information includes the priority (hex) and MAC address of the Designated Bridge.
Designated Port
The port ID of the port on the Designated Bridge to which this port is connected.
Information includes the port priority (hex) and the port number (hex).
Hello
The hello time parameter specifies, in seconds, how often the root bridge
transmits a configuration bridge protocol data unit (BPDU). Any bridge that is not
the root bridge uses the root bridge hello value.
Type
Type of link connected to the port, and whether the port is an edge port. Link type
values are AUTO, P2P, or SHARED.
The following table describes the CIST parameters.
Trunk group 1, Enabled
port state:
17: STG 1 forwarding
18: STG 1 forwarding
NOTE: If Spanning Tree Protocol on any port in the trunk group is set to forwarding, the remaining ports in
the trunk group are set to forwarding.
Table 25 VLAN information commands
Command
Usage
show vlan
Displays VLAN information
Command mode: All
show vlan information
Displays VLAN information, including spanning tree
assignment.
Command mode: All
VLAN Name Status Ports
---- -------------------------------- ------ ---------------1 Default VLAN ena 4 5
2 pc03p ena 2
7 pc07f ena 7
11 pc04u ena 11
14 8600-14 ena 14
15 8600-15 ena 15
16 8600-16 ena 16
17 8600-17 ena 17
18 35k-1 ena 18
20 35k-3 ena 20
21 35k-4 ena 21
22 pc07z ena 22
24 redlan ena 24
300 ixiaTraffic ena 1 12 13 23
4000 bpsports ena 3-6 8-10
4095 Mgmt VLAN ena 19
Trunk group information
The following command displays Trunk Group information:
show portchannel information
Command mode: All
When trunk groups are configured, you can view the state of each port in the various trunk groups.
VLAN information
The following table describes the VLAN information commands.
The following command displays VLAN information:
show vlan information
Command mode: All
This information display includes all configured VLANs and all member ports that have an active link state.
VLAN information includes:
VLAN Number
VLAN Name
Status
Port membership of the VLAN
Displays all routes configured in the switch.
Command mode: All except User EXEC
show ip information
Displays general IP information.
Command mode: All except User EXEC
show ip arp
Displays Address Resolution Protocol (ARP) Information.
Command mode: All except User EXEC
show ip ospf information
Displays the OSPF information.
Command mode: All except User EXEC
show interface ip <1-256>
rip
Displays RIP user‘s configuration.
Command mode: All except User EXEC
show layer3 information
Displays IP Information. IP information, includes:
IP interface information: Interface number, IP address, subnet mask,
VLAN number, and operational status.
Default gateway information: Metric for selecting which configured
gateway to use, gateway number, IP address, and health status
IP forwarding information: Enable status, lnet and lmask Port status
Command mode: All except User EXEC
show ip igmp groups
Displays IGMP Information.
Command mode: All except User EXEC
show ip vrrp information
Displays the VRRP Information.
Command mode: All except User EXEC
show layer3
Dumps all switch information available from Layer 3 memory (10K or more,
depending on your configuration).
If you want to capture dump data to a file, set your communication software on
your workstation to capture session data prior to issuing the dump commands.
Command mode: All except User EXEC
Table 27 Route Information commands
Command
Usage
show ip route address <IP address>
Displays a single route by destination IP address.
Command mode: All except User EXEC
show ip route gateway <IP address>
Displays routes to a single gateway.
Command mode: All except User EXEC
show ip route type
{indirect|direct|local|broadcast|martian
|multicast}
Displays routes of a single type.
Command mode: All except User EXEC
show ip route tag
{fixed|static|address|rip|ospf|broadcast
|multicast|martian}
Displays routes of a single tag.
Command mode: All except User EXEC
show ip route interface <1-256>
Displays routes on a single interface.
Command mode: All except User EXEC
show ip route
Displays all routes configured in the switch.
Command mode: All except User EXEC
Layer 3 information
The following table describes basic Layer 3 Information commands. The following sections provide more detailed
information and commands.
Route information
Using the commands listed below, you can display all or a portion of the IP routes currently held in the switch.
The Address Resolution Protocol (ARP) information includes IP address and MAC address of each entry, address
status flags, VLAN, and port for the address, and port referencing information.
The following table describes the Address Resolution Protocol commands.
Show all ARP entry information
The following command displays ARP information:
show ip arp
Command mode: All except User EXEC
The Flag field provides additional information about an entry. If no flag displays, the entry is normal.
ARP address list information
The following command displays ARP address list information:
Displays general OSPF information.
Command mode: All except User EXEC
show ip ospf area information [<0-2>]
Displays area information for a particular area index. If no
parameter is supplied, it displays area information for all the
areas.
Command mode: All except User EXEC
show ip ospf interface
Displays interface information.
Command mode: All except User EXEC
show ip ospf area-virtual-link
information
Displays information about all the configured virtual links.
Command mode: All except User EXEC
show ip ospf neighbor
Displays the status of all the current neighbors.
Command mode: All except User EXEC
show ip ospf summary-range <0-2>
Displays the list of summary ranges belonging to non-NSSA
areas.
Command mode: All except User EXEC
show ip ospf summary-range-nssa <0-2>
Displays the list of summary ranges belonging to NSSA
areas.
Command mode: All except User EXEC
show ip ospf routes
Displays OSPF routing table.
Command mode: All except User EXEC
show ip ospf information
Displays the OSPF information.
Command mode: All except User EXEC
OSPF Version 2
Router ID: 10.10.10.1
Started at 1663 and the process uptime is 4626
Area Border Router: yes, AS Boundary Router: no
LS types supported are 6
External LSA count 0
External LSA checksum sum 0x0
Number of interfaces in this router is 2
Number of virtual links in this router is 1
16 new lsa received and 34 lsa originated from this router
Total number of entries in the LSDB 10
Database checksum sum 0x0
Total neighbors are 1, of which
2 are >=INIT state,
2 are >=EXCH state,
2 are =FULL state
Number of areas is 2, of which 3-transit 0-nssa
Area Id : 0.0.0.0
Authentication : none
Import ASExtern : yes
Number of times SPF ran : 8
Area Border Router count : 2
AS Boundary Router count : 0
LSA count : 5
LSA Checksum sum : 0x2237B
Summary : noSummary
Ip Address 10.10.12.1, Area 0.0.0.1, Admin Status UP
Router ID 10.10.10.1, State DR, Priority 1
Designated Router (ID) 10.10.10.1, Ip Address 10.10.12.1
Backup Designated Router (ID) 10.10.14.1, Ip Address 10.10.12.2
Timer intervals, Hello 10, Dead 40, Wait 1663, Retransmit 5,
Transit delay 1
Neighbor count is 1 If Events 4, Authentication type none
OSPF general information
The following command displays general OSPF information:
show ip ospf general-information
Command mode: All except User EXEC
OSPF interface information
The following command displays OSPF interface information:
show ip ospf database advertising-router
<router ID>
Takes advertising router as a parameter. Displays all the
Link State Advertisements (LSAs) in the LS database that
have the advertising router with the specified router ID, for
example: 20.1.1.1.
Command mode: All except User EXEC
show ip ospf database asbr-summary
[advertising-router <router ID> |linkstate-id <A.B.C.D> | self]
Displays ASBR summary LSAs. The usage of this command
is as follows:
a. show ip ospf database asbr-summary advertising-
router 20.1.1.1 displays ASBR summary LSAs
having the advertising router 20.1.1.1.
b. show ip ospf database asbr-summary link_state_id
10.1.1.1 displays ASBR summary LSAs having the
link state ID 10.1.1.1.
c. show ip ospf database asbr-summary self displays
the self advertised ASBR summary LSAs.
d. this command with no parameters displays all the
ASBR summary LSAs.
Command mode: All except User EXEC
show ip ospf database database-summary
Displays the following information about the LS database in
a table format:
a. The number of LSAs of each type in each area.
b. The total number of LSAs for each area.
c. The total number of LSAs for each LSA type for all
areas combined.
d. The total number of LSAs for all LSA types for all
areas combined.
No parameters are required.
Command mode: All except User EXEC
show ip ospf database external
[advertising-router <router ID> |linkstate-id <A.B.C.D> | self]
Displays the AS-external (type 5) LSAs with detailed
information of each field of the LSAs.
Command mode: All except User EXEC
show ip ospf database network
[advertising-router <router ID> |linkstate-id <A.B.C.D> | self]
Displays the network (type 2) LSAs with detailed information
of each field of the LSA.network LS database.
Command mode: All except User EXEC
show ip ospf database nssa [advertisingrouter <router ID> |link-state-id
<A.B.C.D> | self]
Displays the NSSA (type 7) LSAs with detailed information of
each field of the LSAs.
Command mode: All except User EXEC
show ip ospf database router
[advertising-router <router ID> |linkstate-id <A.B.C.D> | self]
Displays the router (type 1) LSAs with detailed information of
each field of the LSAs.
Command mode: All except User EXEC
show ip ospf database self
Displays all the self-advertised LSAs. No parameters are
required.
Command mode: All except User EXEC
show ip ospf database summary
[advertising-router <router ID> |
linkstate-id <A.B.C.D> | self]
Displays the network summary (type 3) LSAs with detailed
information of each field of the LSAs.
Command mode: All except User EXEC
show ip ospf database
Displays all the LSAs.
Command mode: All except User EXEC
OSPF Database information
The following table describes the OSPF Database information commands.
Codes: IA - OSPF inter area,
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
IA 10.10.0.0/16 via 200.1.1.2
IA 40.1.1.0/28 via 20.1.1.2
IA 80.1.1.0/24 via 200.1.1.2
IA 100.1.1.0/24 via 20.1.1.2
IA 140.1.1.0/27 via 20.1.1.2
IA 150.1.1.0/28 via 200.1.1.2
E2 172.18.1.1/32 via 30.1.1.2
E2 172.18.1.2/32 via 30.1.1.2
E2 172.18.1.3/32 via 30.1.1.2
E2 172.18.1.4/32 via 30.1.1.2
E2 172.18.1.5/32 via 30.1.1.2
E2 172.18.1.6/32 via 30.1.1.2
E2 172.18.1.7/32 via 30.1.1.2
E2 172.18.1.8/32 via 30.1.1.2
Table 34 RIP information commands
Command
Usage
show ip rip routes
Displays RIP routes.
Command mode: All except User EXEC
show ip rip interface [<1-255>]
Displays RIP interface information.
Command mode: All except User EXEC
show interface ip [<1-255>] rip
Displays RIP user‘s configuration.
Command mode: All
3.0.0.0/8 via 30.1.1.11 metric 4
4.0.0.0/16 via 30.1.1.11 metric 16
10.0.0.0/8 via 30.1.1.2 metric 3
20.0.0.0/8 via 30.1.1.2 metric 2
OSPF route codes information
The following command displays OSPF route information:
show ip ospf routes
Command mode: All except User EXEC
Routing Information Protocol information
The following table describes the Routing Information Protocol (RIP) information commands.
RIP Routes information
The following command displays RIP route information:
show ip rip routes
Command mode: All except User EXEC
This table contains all dynamic routes learned through RIP, including the routes that are undergoing garbage
collection with metric = 16. This table does not contain directly connected routes and locally configured static routes.
1: vrid 2, 205.178.18.210, if 1, renter, prio 100, master, server
2: vrid 1, 205.178.18.202, if 1, renter, prio 100, backup
3: vrid 3, 205.178.18.204, if 1, renter, prio 100, master, proxy
VRRP information
Virtual Router Redundancy Protocol (VRRP) support on this switch provides redundancy between routers in a LAN.
This is accomplished by configuring the same virtual router IP address and ID number on each participating VRRPcapable routing device. One of the virtual routers is then elected as the master, based on a number of priority
criteria, and assumes control of the shared virtual router IP address. If the master fails, one of the backup virtual
routers will assume routing authority and take control of the virtual router IP address.
The following command displays VRRP information:
show ip vrrp information
Command mode: All except User EXEC
When virtual routers are configured, you can view the status of each virtual router using this command. VRRP
information includes:
Virtual router number
Virtual router ID and IP address
Interface number
Ownership status
owner identifies the preferred master virtual router. A virtual router is the owner when the IP address of
the virtual router and its IP interface are the same.
renter identifies virtual routers which are not owned by this device
Priority value. During the election process, the virtual router with the highest priority becomes master.
Activity status
master identifies the elected master virtual router.
backup identifies that the virtual router is in backup mode.
init identifies that the virtual router is waiting for a startup event. Once it receives a startup event, it
transitions to master if its priority is 255, (the IP address owner), or transitions to backup if it is not the IP
address owner.
Server status. The server state identifies virtual routers.
Proxy status. The proxy state identifies virtual proxy routers, where the virtual router shares the same IP
address as a proxy IP address. The use of virtual proxy routers enables redundant switches to share the
same IP address, minimizing the number of unique IP addresses that must be configured.
Displays the index number that identifies each alarm instance.
Interval
Displays the time interval over which data is sampled and compared with the rising and falling
thresholds.
Type
Displays the method of sampling the selected variable and calculating the value to be compared
against the thresholds, as follows:
abs: absolute value, the value of the selected variable is compared directly with the thresholds at
the end of the sampling interval.
delta: delta value, the value of the selected variable at the last sample is subtracted from the current
value, and the difference compared with the thresholds.
rLimit
Displays the rising threshold for the sampled statistic.
fLimit
Displays the falling threshold for the sampled statistic.
rEvtIdx
Displays the rising alarm event index that is triggered when a rising threshold is crossed.
fEvtIdx
Displays the falling alarm event index that is triggered when a falling threshold is crossed.
Last value
Displays the last sampled value.
OID
Displays the MIB Object Identifier for each alarm index.
-----------------------------------------------------------------Port Phy-Type Speed Duplex Flow Ctrl Link
---- -------- ----- -------- --TX-----RX-- ----- 1 GE 1000 any yes yes down
2 GE 1000 any yes yes down
3 GE 1000 full yes yes down
4 GE 1000 full yes yes down
5 GE 1000 any yes yes down
6 GE 1000 any yes yes down
7 GE 1000 any yes yes down
8 GE 1000 full yes yes up
9 GE 1000 full yes yes down
10 GE 1000 full yes yes down
11 GE 1000 any yes yes down
12 GE 1000 any yes yes down
13 GE 1000 any yes yes down
14 GE 1000 any yes yes down
15 GE 1000 any yes yes down
16 GE 1000 any yes yes down
17 GE 1000 full yes yes up
18 GE 1000 full yes yes up
19 GE 100 full yes yes up
20 GE 100 full yes yes down
21 GE 1000 full yes yes down
22 GE 1000 any yes yes down
23 SFP any full no no up
24 SFP any full no no up
Link status information
The following command displays link information:
show interface link
Command mode: All
Use this command to display link status information about each port on a switch, including:
Port number
Phy-type (GE or SFP)
Port speed (10 Mb/s, 100 Mb/s, 1000 Mb/s, or any)
Duplex mode (half, full, or any)
Flow control for transmit and receive (no, yes, or any)
Link status (up or down)
---- --- ----- ---- ---- -------------- ------------------------------ 1 n Auto d 1 Downlink1 1
2 n Auto d 1 Downlink2 1
3 n Auto d 1 Downlink3 1
4 n Auto d 1 Downlink4 1
5 n Auto d 1 Downlink5 1
6 n Auto d 1 Downlink6 1
7 n Auto d 1 Downlink7 1
8 n Auto d 1 Downlink8 1
9 n Auto d 1 Downlink9 1
10 n Auto d 1 Downlink10 1
11 n Auto d 1 Downlink11 1
12 n Auto d 1 Downlink12 1
13 n Auto d 1 Downlink13 1
14 n Auto d 1 Downlink14 1
15 n Auto d 1 Downlink15 1
16 n Auto d 1 Downlink16 1
17 n Auto d 1 Xconnect1 1
18 n Auto d 1 Xconnect2 1
19 n Auto d 4095 Mgmt 4095
20 n Auto d 1 Uplink1 1
21 n Auto d 1 Uplink2 1
22 n Auto d 1 Uplink3 1
23 n Auto d 1 Uplink4 1
24 n Auto d 1 Uplink5 1
Port information
The following command displays port information:
show interface information
Command mode: All
Port information includes:
Port number
Whether the port uses VLAN tagging or not (y or n)
Media type (Auto, Copper, or Fiber)
Whether Remote Monitoring (RMON) is enabled or disabled (e or d)
Port VLAN ID (PVID)
Port name
VLAN membership
Uplink Failure Detection 1: Enabled
LtM status: Down
Member STG STG State Link Status
--------- --- ------------ ---------- port 24 down
1 DISABLED
10 DISABLED *
15 DISABLED *
* = STP turned off for this port.
LtD status: Auto Disabled
Member Link Status
--------- ---------- port 1 disabled
port 2 disabled
port 3 disabled
port 4 disabled
Uplink Failure Detection 2: Disabled
Uplink Failure Detection 3: Disabled
Uplink Failure Detection 4: Disabled
Uplink Failure Detection information
The following command displays Uplink Failure Detection (UFD) information:
show ufd
Command mode: All
Uplink Failure Detection (UFD) information includes:
UFD status, either enabled or disabled
LtM status and member ports
Spanning Tree status for LtM ports
LtD status and member ports
Information dump
The following command dumps switch information:
show information-dump
Command mode: All
Use the dump command to dump all switch information available from this switch memory (10K or more, depending
on your configuration). This data is useful for tuning and debugging switch performance.
If you want to capture dump data to a file, set the communication software on your workstation to capture session
Displays Network Time Protocol (NTP) Statistics.
You can execute the clear command option to delete all
statistics.
Command mode: All
clear ntp
Clears Network Time Protocol (NTP) Statistics.
Command mode: All except User EXEC
show ufd counters
Displays Uplink Failure Detection statistics.
Command mode: All
show counters
Dumps all switch statistics. Use this command to gather data for
tuning and debugging switch performance. If you want to capture
dump data to a file, set your communication software on your
workstation to capture session data prior to issuing the dump
command.
Command mode: All
Table 44 Port Statistics commands
Command
Usage
show interface gigabitethernet
<port number> dot1x counters
Displays IEEE 802.1x statistics for the port.
Command mode: All
show interface gigabitethernet
<port number> bridging-counters
Displays bridging (―dot1‖) statistics for the port.
Command mode: All
show interface gigabitethernet
<port number> ethernet-counters
Displays Ethernet (―dot3‖) statistics for the port.
Command mode: All
show interface gigabitethernet
<port number> interface-counters
Displays interface statistics for the port.
Command mode: All
show interface gigabitethernet
<port number> ip-counters
Displays Internet Protocol statistics for the port.
Command mode: All
show interface gigabitethernet
<port number> link-counters
Displays link statistics for the port.
Command mode: All
show interface gigabitethernet
<port number> rmon-counters
Displays RMON statistics for the port.
Command mode: All
Statistics commands
Introduction
You can view switch performance statistics in the user, operator, and administrator command modes. This chapter
discusses how to use the ISCLI to display switch statistics.
The following table describes general Statistics commands.
Port Statistics
The following table describes the Port Statistics commands. The following sections provide more detailed
information and commands.
Total number of times that the state machine transitions to the
CONNECTING state from any other state.
authEapLogoffsWhileConnecting
Total number of times that the state machine transitions from
CONNECTING to DISCONNECTED as a result of receiving an EAPOLLogoff message.
authEntersAuthenticating
Total number of times that the state machine transitions from
CONNECTING to AUTHENTICATING, as a result of an EAPResponse/
Identity message being received from the Supplicant.
authSuccessesWhile
Authenticating
Total number of times that the state machine transitions from
AUTHENTICATING to AUTHENTICATED, as a result of the Backend
Authentication state machine indicating successful authentication of the
Supplicant.
authTimeoutsWhileAuthenticating
Total number of times that the state machine transitions from
AUTHENTICATING to ABORTING, as a result of the Backend
Authentication state machine indicating authentication timeout.
802.1x statistics
Use the following command to display the 802.1x authenticator statistics of the selected port:
show interface gigabitethernet <port number> dot1x counters
Command mode: All
The following table describes the 802.1x authenticator diagnostics for a selected port:
Total number of times that the state machine transitions from
AUTHENTICATING to HELD, as a result of the Backend Authentication
state machine indicating authentication failure.
authReauthsWhileAuthenticating
Total number of times that the state machine transitions from
AUTHENTICATING to ABORTING, as a result of a re-authentication
request
authEapStartsWhileAuthenticating
Total number of times that the state machine transitions from
AUTHENTICATING to ABORTING, as a result of an EAPOL-Start
message being received from the Supplicant.
authEapLogoffWhileAuthenticating
Total number of times that the state machine transitions from
AUTHENTICATING to ABORTING, as a result of an EAPOL-Logoff
message being received from the Supplicant.
authReauthsWhileAuthenticated
Total number of times that the state machine transitions from
AUTHENTICATED to CONNECTING, as a result of a re-authentication
request.
authEapStartsWhileAuthenticated
Total number of times that the state machine transitions from
AUTHENTICATED to CONNECTING, as a result of an EAPOL-Start
message being received from the Supplicant.
authEapLogoffWhileAuthenticated
Total number of times that the state machine transitions from
AUTHENTICATED to DISCONNECTED, as a result of an EAPOLLogoff
message being received from the Supplicant.
backendResponses
Total number of times that the state machine sends an initial AccessRequest packet to the Authentication server. Indicates that the
Authenticator attempted communication with the Authentication Server.
backendAccessChallenges
Total number of times that the state machine receives an initial AccessChallenge packet from the Authentication server. Indicates that the
Authentication Server has communication with the Authenticator.
backendOtherRequestsToSupplicant
Total number of times that the state machine sends an EAP-Request
packet (other than an Identity, Notification, Failure, or Success
message) to the Supplicant. Indicates that the Authenticator chose an
EAP-method.
backendNonNakResponsesFrom
Supplicant
Total number of times that the state machine receives a response from
the Supplicant to an initial EAP-Request, and the response is something
other than EAP-NAK. Indicates that the Supplicant can respond to the
Authenticators chosen EAP-method.
backendAuthSuccesses
Total number of times that the state machine receives an Accept
message from the Authentication Server. Indicates that the Supplicant
has successfully authenticated to the Authentication Server.
backendAuthFails
Total number of times that the state machine receives a Reject
message from the Authentication Server. Indicates that the Supplicant
has not authenticated to the Authentication Server.
Bridging statistics for port 1:
dot1PortInFrames: 63242584
dot1PortOutFrames: 63277826
dot1PortInDiscards: 0
dot1TpLearnedEntryDiscards: 0
dot1StpPortForwardTransitions: 0
Table 46 Bridging statistics for port
Statistics
Description
dot1PortInFrames
The number of frames that have been received by this port from its
segment.
A frame received on the interface corresponding to this port is counted by
this object, if and only if, it is for a protocol being processed by the local
bridging function, including bridge management frames.
dot1PortOutFrames
The number of frames that have been transmitted by this port to its
segment.
A frame transmitted on the interface corresponding to this port is counted
by this object, if and only if, it is for a protocol being processed by the local
bridging function, including bridge management frames.
dot1PortInDiscards
Count of valid frames received which were discarded (that is, filtered) by
the forwarding process.
dot1TpLearnedEntryDiscards
The total number of Forwarding Database entries, which have been or
would have been learned, but have been discarded due to a lack of space
to store them in the Forwarding Database.
If this counter is increasing, it indicates that the Forwarding Database is
regularly becoming full (a condition which has adverse performance
effects on the sub network).
If this counter has a significant value but is not presently increasing, it
indicates that the problem has been occurring but is not persistent.
dot1StpPortForwardTransitions
The number of times this port has transitioned from the Learning state to
the Forwarding state.
A count of frames received on a particular interface that are not an
integral number of octets in length and do not pass the Frame
Check Sequence (FCS) check.
The count represented by an instance of this object is incremented
when the alignmentError status is returned by the MAC service to
the Logical Link Control (LLC) (or other MAC user).
Received frames for which multiple error conditions obtained are,
according to the conventions of IEEE 802.3 Layer Management,
counted exclusively according to the error status presented to the
LLC.
dot3StatsFCSErrors
A count of frames received on a particular interface that are an
integral number of octets in length but do not pass the Frame
Check Sequence (FCS) check.
The count represented by an instance of this object is incremented
when the frameCheckError status is returned by the MAC service to
the LLC (or other MAC user).
Received frames for which multiple error conditions obtained are,
according to the conventions of IEEE 802.3 Layer Management,
counted exclusively according to the error status presented to the
LLC.
dot3StatsSingleCollisionFrames
A count of successfully transmitted frames on a particular interface
for which transmission is inhibited by exactly one collision.
A frame that is counted by an instance of this object is also counted
by the corresponding instance of the ifOutUcastPkts,
ifOutMulticastPkts, or ifOutBroadcastPkts, and is not counted by the
corresponding instance of the dot3StatsMultipleCollisionFrame
object.
dot3StatsMultipleCollisionFrames
A count of successfully transmitted frames on a particular interface
for which transmission is inhibited by more than one collision.
A frame that is counted by an instance of this object is also counted
by the corresponding instance of either the ifOutUcastPkts,
ifOutMulticastPkts, or ifOutBroadcastPkts, and is not counted by the
corresponding instance of the dot3StatsSingleCollisionFrames
object.
dot3StatsLateCollisions
The number of times that a collision is detected on a particular
interface later than 512 bit-times into the transmission of a packet.
Five hundred and twelve bit-times corresponds to 51.2
microseconds on a 10 Mbit/s system. A (late) collision included in a
count represented by an instance of this object is also considered
as a (generic) collision for purposes of other
collision-related statistics.
dot3StatsExcessiveCollisions
A count of frames for which transmission on a particular interface
fails due to excessive collisions.
dot3StatsInternalMacTransmitError
s
A count of frames for which transmission on a particular interface
fails due to an internal MAC sublayer transmit error.
A frame is only counted by an instance of this object if it is not
counted by the corresponding instance of either the
dot3StatsLateCollisions object, the dot3StatsExcessiveCollisions
object, or the dot3StatsCarrierSenseErrors object.
The precise meaning of the count represented by an instance of
this object is implementation specific. In particular, an instance of
this object may represent a count of transmission errors on a
particular interface that are not otherwise counted.
The following table describes the Ethernet statistics for a selected port:
A count of frames received on a particular interface that exceeds
the maximum permitted frame size.
The count represented by an instance of this object is incremented
when the frameTooLong status is returned by the MAC service to
the LLC (or other MAC user).
Received frames for which multiple error conditions obtained are,
according to the conventions of IEEE 802.3 Layer Management,
counted exclusively according to the error status presented to the
LLC.
dot3StatsInternalMacReceiveErrors
A count of frames for which reception on a particular interface fails
due to an internal MAC sublayer receive error.
A frame is only counted by an instance of this object if it is not
counted by the corresponding instance of the
dot3StatsFrameTooLongs object, the dot3StatsAlignmentErrors
object, or the dot3StatsFCSErrors object.
The precise meaning of the count represented by an instance of
this object is implementation specific. In particular, an instance of
this object may represent a count of received errors on a particular
interface that are not otherwise counted.
The total number of octets received on the interface, including framing
characters.
UcastPkts—IfHCIn
The number of packets, delivered by this sublayer to a higher sublayer, which
were not addressed to a multicast or broadcast address at this sublayer.
BroadcastPkts—IfHCIn
The number of packets, delivered by this sublayer to a higher sublayer, which
were addressed to a broadcast address at this sublayer.
MulticastPkts—IfHCIn
The total number of packets, delivered by this sublayer. These are the packets
that higher-level protocols requested to be transmitted, and which were
addressed to a multicast address at this sublayer, including those that were
discarded or not sent.
For a MAC layer protocol, this includes both group and functional addresses.
Discards—IfHCIn
The number of inbound packets which were chosen to be discarded even though
no errors were detected to prevent their being delivered to a higher-layer
protocol. One possible reason for discarding such a packet could be to free up
buffer space.
Errors—IfHCIn
For packet-oriented interfaces, the number of inbound packets that contained
errors preventing them from being delivered to a higher-layer protocol.
For character-oriented or fixed-length interfaces, the number of inbound
transmission units that contained errors preventing them from being deliverable to
a higher-layer protocol.
Octets—IfHCOut
The total number of octets transmitted out of the interface, including framing
characters.
Interface statistics
Use the following command to display the interface statistics of the selected port:
show interface gigabitethernet <port number> interface-counters
Command mode: All
The following table describes the interface (IF) statistics for a selected port:
The total number of packets that higher-level protocols requested to be
transmitted, and which were not addressed to a multicast or broadcast address at
this sublayer, including those that were discarded or not sent.
BroadcastPkts—IfHCOut
The total number of packets that higher-level protocols requested to be
transmitted, and which were addressed to a broadcast address at this sublayer,
including those that were discarded or not sent. This object is a 64-bit version of
ifOutBroadcastPkts.
MulticastPkts—IfHCOut
The total number of packets that higher-level protocols requested to be
transmitted, and which were addressed to a multicast address at this sublayer,
including those that were discarded or not sent.
For a MAC layer protocol, this includes both group and functional addresses. This
object is a 64-bit version of ifOutMulticastPkts.
Discards—IfHCOut
The number of outbound packets that were chosen to be discarded even though
no errors had been detected to prevent their being transmitted. One possible
reason for discarding such a packet could be to free up buffer space.
Errors—IfHCOut
For packet-oriented interfaces, the number of outbound packets that could not be
transmitted because of errors.
For character-oriented or fixed-length interfaces, the number of outbound
transmission units that could not be transmitted because of errors.
The total number of input datagrams received from interfaces, including those received in
error.
ipInHeaderError
The number of input datagrams discarded because the IP address in their IP header's
destination field was not a valid address to be received at this entity (the switch).
ipInDiscards
The number of input IP datagrams for which no problems were encountered to prevent their
continued processing, but which were discarded (for example, for lack of buffer space). Note
that this counter does not include any datagrams discarded while awaiting re-assembly.
Internet Protocol (IP) statistics
Use the following command to display the interface protocol statistics of the selected port:
show interface gigabitethernet <port number> ip-counters
Command mode: All
The following table describes the Internet Protocol (IP) statistics for a selected port:
The total number of packets received that were dropped because of
system resource constraints.
etherStatsOctets
The total number of octets of data (including those in bad packets)
received on the network (excluding framing bits but including
FCS octets).
etherStatsPkts
The total number of packets (including bad packets, broadcast packets,
and multicast packets) received.
etherStatsBroadcastPkts
The total number of good packets received that were directed to the
broadcast address.
etherStatsMulticastPkts
The total number of good packets received that were directed to a
multicast address.
etherStatsCRCAlignErrors
The total number of packets received that had a length (excluding
framing bits, but including FCS octets) of between 64 and 1518 octets,
inclusive, but had either a bad Frame Check Sequence (FCS) with an
integral number of octets (FCS Error) or a bad FCS with a non-integral
number of octets (Alignment Error).
etherStatsUndersizePkts
The total number of packets received that were less than 64 octets long
(excluding framing bits but including FCS octets) and were otherwise well
formed.
Link statistics
Use the following command to display the link statistics of the selected port:
show interface gigabitethernet <port number> link-counters
Command mode: All
The following table describes the link statistics for a selected port:
Port RMON statistics
Use the following command to display the RMON statistics of the selected port:
show interface gigabitethernet <port number> rmon-counters
Command mode: All
The following table describes the Remote Monitoring (RMON) statistics of the selected port:
The total number of packets received that were longer than 1518 octets
(excluding framing bits but including FCS octets) and were otherwise well
formed.
etherStatsFragments
The total number of packets received that were less than 64 octets in
length (excluding framing bits but including FCS octets) and had either a
bad Frame Check Sequence (FCS) with an integral number of octets
(FCS Error) or a bad FCS with a non-integral number of octets
(Alignment Error).
etherStatsJabbers
The total number of packets received that were longer than 1518 octets
(excluding framing bits, but including FCS octets), and had either a bad
Frame Check Sequence (FCS) with an integral number of octets (FCS
Error) or a bad FCS with a non-integral number of octets (Alignment
Error). Jabber is defined as the condition where any packet exceeds 20
ms. The allowed range to detect jabber is between 20 ms and 150 ms.
etherStatsCollisions
The best estimate of the total number of collisions on this Ethernet
segment.
etherStatsPkts64
Octets
The total number of packets (including bad packets) received that were
less than or equal to 64 octets in length (excluding framing bits but
including FCS octets).
etherStatsPkts65to127
Octets
The total number of packets (including bad packets) received that were
greater than 64 octets in length (excluding framing bits but including FCS
octets).
etherStatsPkts128to255
Octets
The total number of packets (including bad packets) received that were
greater than 127 octets in length (excluding framing bits but including
FCS octets).
etherStatsPkts256to511
Octets
The total number of packets (including bad packets) received that were
greater than 255 octets in length (excluding framing bits but including
FCSoctets).
etherStatsPkts512to1023
Octets
The total number of packets (including bad packets) received that were
greater than 511 octets in length (excluding framing bits but including
FCS octets).
etherStatsPkts1024to1518
Octets
The total number of packets (including bad packets) received that were
greater than 1023 octets in length (excluding framing bits but including
FCS octets).
Displays the Forwarding Database statistics.
Command mode: All
show interface gigabitethernet
<port number> lacp counters
Displays Link Aggregation Control Protocol (LACP) statistics.
Command mode: All
FDB statistics:
current: 91 hiwat: 91
Table 53 Forwarding Database statistics
Statistic
Description
current
Current number of entries in the Forwarding Database.
hiwat
Highest number of entries recorded at any given time in the Forwarding Database.
Valid LACPDUs received - 0
Valid Marker PDUs received - 0
Valid Marker Rsp PDUs received - 0
Unknown version/TLV type - 0
Illegal subtype received - 0
LACPDUs transmitted - 0
Marker PDUs transmitted - 0
Marker Rsp PDUs transmitted - 0
Layer 2 statistics
The following table describes the Layer 2 statistics commands. The following sections provide more detailed
information and commands.
FDB statistics
Use the following command to display statistics regarding the use of the forwarding database:
show mac-address-table counters
Command mode: All
These commands enable you to display statistics regarding the use of the forwarding database, including the
number of current entries and the maximum number of entries ever recorded.
The following table describes the Forwarding Database (FDB) statistics:
LACP statistics
Use the following command to display Link Aggregation Control Protocol (LACP) statistics:
show interface gigabitethernet <port number> lacp counters
Displays Domain Name System (DNS) statistics.
Command mode: All except UserEXEC
show ip icmp counters
Displays ICMP statistics.
Command mode: All except UserEXEC
show ip tcp counters
Displays Transmission Control Protocol (TCP) statistics.
Command mode: All except UserEXEC
show ip udp counters
Displays User Datagram Protocol (UDP) statistics. Add the
argument, clear, to clear UDP statistics.
Command mode: All except UserEXEC
show ip igmp counters
Displays IGMP statistics.
Command mode: All except UserEXEC
clear ip igmp [<1-4094>] counters
Clears all IGMP statistics for the selected VLANs.
Command mode: All except UserEXEC
show ip ospf counters
Displays OSPF statistics.
Command mode: All except UserEXEC
show ip vrrp counters
When virtual routers are configured, you can display the
following
Advertisements received (vrrpInAdvers) Advertisements transmitted (vrrpOutAdvers) Advertisements received, but ignored (vrrpBadAdvers)
Command mode: All except UserEXEC
show ip rip counters
Displays Routing Information Protocol (RIP) statistics.
Command mode: All except UserEXEC
show ip gea
Displays GEA statistics.
Command mode: All except UserEXEC
show layer3 counters
Displays all Layer 3 statistics.
Command mode: All
Layer 3 statistics
The following table describes basic Layer 3 statistics commands. The following sections provide more detailed
information and commands. Layer 3 functionality is limited in this release.
The total number of input datagrams received from interfaces, including those
received in error.
ipInHdrErrors
The number of input datagrams discarded due to errors in their IP headers, including
bad checksums, version number mismatch, other format errors, time-to-live exceeded,
errors discovered in processing their IP options, and so on.
ipInAddrErrors
The number of input datagrams discarded because the IP address in their IP header
destination field was not a valid address to be received at this switch. This count
includes invalid addresses (for example, 0.0.0.0) and addresses of unsupported
classes (for example, Class E).
For entities which are not IP gateways and therefore do not forward datagrams, this
counter includes datagrams discarded because the destination address was not a
local address.
ipInUnknownProtos
The number of locally addressed datagrams received successfully but discarded
because of an unknown or unsupported protocol.
ipInDiscards
The number of input IP datagrams for which no problems were encountered to
prevent their continued processing, but which were discarded (for example, for lack of
buffer space).
This counter does not include any datagrams discarded while awaiting re-assembly.
ipInDelivers
The total number of input datagrams successfully delivered to IP user-protocols
(including ICMP).
ipOutRequests
The total number of IP datagrams that local IP user-protocols (including ICMP)
supplied to IP in requests for transmission.
This counter does not include any datagrams counted in ipForwDatagrams.
ipOutDiscards
The number of output IP datagrams for which no problem was encountered to prevent
their transmission to their destination, but which were discarded (for example, for lack
of buffer space).
This counter would include datagrams counted in ipForwDatagrams if any such
packets met this (discretionary) discard criterion.
ipDefaultTTL
The default value inserted into the Time-To-Live (TTL) field of the IP header of
datagrams originated at this switch, whenever a TTL value is not supplied by the
transport layer protocol.
The total number of ICMP messages which the switch received. Note that this counter
includes all those counted by icmpInErrors.
icmpInErrors
The number of ICMP messages which the switch received but determined as having
ICMP specific errors (for example bad ICMP checksums and bad length).
icmpInDestUnreachs
The number of ICMP Destination Unreachable messages received.
icmpInTimeExcds
The number of ICMP Time Exceeded messages received.
icmpInParmProbs
The number of ICMP Parameter Problem messages received.
icmpInSrcQuenchs
The number of ICMP Source Quench (buffer almost full, stop sending data) messages
received.
icmpInRedirects
The number of ICMP Redirect messages received.
icmpInEchos
The number of ICMP Echo (request) messages received.
icmpInEchoReps
The number of ICMP Echo Reply messages received.
icmpInTimestamps
The number of ICMP Timestamp (request) messages received.
icmpInTimestampReps
The number of ICMP Timestamp Reply messages received.
icmpInAddrMasks
The number of ICMP Address Mask Request messages received.
icmpInAddrMaskReps
The number of ICMP Address Mask Reply messages received.
icmpOutMsgs
The total number of ICMP messages which this switch attempted to send. Note that
this counter includes all those counted by icmpOutErrors.
icmpOutErrors
The number of ICMP messages that this switch did not send due to problems
discovered within ICMP such as a lack of buffer. This value should not include errors
discovered outside the ICMP layer such as the inability of IP to route the resultant
datagram. In some implementations there may be no types of errors that contribute to
this counter's value.
icmpOutDestUnreachs
The number of ICMP Destination Unreachable messages sent.
icmpOutTimeExcds
The number of ICMP Time Exceeded messages sent.
icmpOutParmProbs
The number of ICMP Parameter Problem messages sent.
icmpOutSrcQuenchs
The number of ICMP Source Quench (buffer almost full, stop sending data) messages
sent.
icmpOutRedirects
The number of ICMP Redirect messages sent.
icmpOutEchos
The number of ICMP Echo (request) messages sent.
icmpOutEchoReps
The number of ICMP Echo Reply messages sent.
icmpOutTimestamps
The number of ICMP Timestamp (request) messages sent.
icmpOutTimestampReps
The number of ICMP Timestamp Reply messages sent.
icmpOutAddrMasks
The number of ICMP Address Mask Request messages sent.
icmpOutAddrMaskReps
The number of ICMP Address Mask Reply messages sent.
ICMP statistics
The following command displays ICMP statistics:
show ip icmp counters
Command mode: All except User EXEC
The following table describes the Internet Control Messaging Protocol (ICMP) statistics:
The algorithm used to determine the timeout value used for retransmitting
unacknowledged octets.
tcpRtoMin
The minimum value permitted by a TCP implementation for the retransmission
timeout, measured in milliseconds. More refined semantics for objects of this type
depend upon the algorithm used to determine the retransmission timeout. In
particular, when the timeout algorithm is rsre(3), an object of this type has the
semantics of the LBOUND quantity described in Request For Comments (RFC) 793.
tcpRtoMax
The maximum value permitted by a TCP implementation for the retransmission
timeout, measured in milliseconds. More refined semantics for objects of this type
depend upon the algorithm used to determine the retransmission timeout. In
particular, when the timeout algorithm is rsre(3), an object of this type has the
semantics of the UBOUND quantity described in RFC 793.
tcpMaxConn
The limit on the total number of TCP connections the switch can support. In entities
where the maximum number of connections is dynamic, this object should contain
the value -1.
tcpActiveOpens
The number of times TCP connections have made a direct transition to the SYNSENT state from the CLOSED state.
tcpPassiveOpens
The number of times TCP connections have made a direct transition to the SYNRCVD state from the LISTEN state.
tcpAttemptFails
The number of times TCP connections have made a direct transition to the CLOSED
state from either the SYN-SENT state or the SYN-RCVD state, plus the number of
times TCP connections have made a direct transition to the LISTEN state from the
SYN-RCVD state.
tcpEstabResets
The number of times TCP connections have made a direct transition to the CLOSED
state from either the ESTABLISHED state or the CLOSE- WAIT state.
tcpInSegs
The total number of segments received, including those received in error. This count
includes segments received on currently established connections.
tcpOutSegs
The total number of segments sent, including those on current connections but
excluding those containing only retransmitted octets.
tcpRetransSegs
The total number of segments retransmitted, that is, the number of TCP segments
transmitted containing one or more previously transmitted octets.
tcpInErrs
The total number of segments received in error (for example, bad TCP checksums).
tcpCurBuff
The total number of outstanding memory allocations from heap by TCP protocol
stack.
tcpCurConn
The total number of outstanding TCP sessions that are currently opened.
tcpOutRsts
The number of TCP segments sent containing the reset (RST) flag.
TCP statistics
The following command displays TCP statistics:
show ip tcp counters
Command mode: All except User EXEC
The following table describes the Transmission Control Protocol (TCP) statistics:
The sum total of all Hello packets transmitted on all OSPF areas and interfaces.
Rx Database
The sum total of all Database Description packets received on all OSPF areas and
interfaces.
Tx Database
The sum total of all Database Description packets transmitted on all OSPF areas
and interfaces.
Rx ls Requests
The sum total of all Link State Request packets received on all OSPF
areas and interfaces.
Tx ls Requests
The sum total of all Link State Request packets transmitted on all OSPF areas and
interfaces.
Rx ls Acks
The sum total of all Link State Acknowledgement packets received on all OSPF
areas and interfaces.
Tx ls Acks
The sum total of all Link State Acknowledgement packets transmitted on all OSPF
areas and interfaces.
Rx ls Updates
The sum total of all Link State Update packets received on all OSPF areas and
interfaces.
Tx ls Updates
The sum total of all Link State Update packets transmitted on all OSPF areas and
interfaces.
Nbr change stats:
hello
The sum total of all Hello packets received from neighbors on all OSPF areas and
interfaces.
Start
The sum total number of neighbors in this state (that is, an indication that Hello
packets should now be sent to the neighbor at intervals of HelloInterval
seconds) across all OSPF areas and interfaces.
n2way
The sum total number of bidirectional communication establishment between this
router and other neighboring routers.
adjoint ok
The sum total number of decisions to be made (again) as to whether an adjacency
should be established/maintained with the neighbor across all OSPF areas and
interfaces.
negotiation done
The sum total number of neighbors in this state wherein the Master/slave
relationship has been negotiated, and sequence numbers have been exchanged,
across all OSPF areas and interfaces.
exchange done
The sum total number of neighbors in this state (that is, in an adjacency's final
state) having transmitted a full sequence of Database Description packets, across
all OSPF areas and interfaces.
bad requests
The sum total number of Link State Requests which have been received for a link
state advertisement not contained in the database across all interfaces and OSPF
areas.
bad sequence
The sum total number of Database Description packets which have been received
that either:
Has an unexpected DD sequence number Unexpectedly has the init bit set Has an options field differing from the last Options field received in a Database
Description packet.
Any of these conditions indicate that some error has occurred during adjacency
establishment for all OSPF areas and interfaces.
loading done
The sum total number of link state updates received for all out-of-date portions of
the database across all OSPF areas and interfaces.
n1way
The sum total number of Hello packets received from neighbors, in which this router
is not mentioned across all OSPF interfaces and areas.
rst_ad
The sum total number of times the Neighbor adjacency has been reset across all
OPSF areas and interfaces.
The total number of Neighboring routers down (that is, in the initial state of a
neighbor conversation) across all OSPF areas and interfaces.
Intf Change Stats:
up
The sum total number of interfaces up in all OSPF areas.
down
The sum total number of interfaces down in all OSPF areas.
loop
The sum total of interfaces no longer connected to the attached network across all
OSPF areas and interfaces.
unloop
The sum total number of interfaces, connected to the attached network in all OSPF
areas.
wait timer
The sum total number of times the Wait Timer has been fired, indicating the end of
the waiting period that is required before electing a (Backup) Designated Router
across all OSPF areas and interfaces.
backup
The sum total number of Backup Designated Routers on the attached network for
all OSPF areas and interfaces.
nbr change
The sum total number of changes in the set of bidirectional neighbors associated
with any interface across all OSPF areas.
Timers Kickoff:
hello
The sum total number of times the Hello timer has been fired (which triggers the
sendof a Hello packet) across all OPSF areas and interfaces.
retransmit
The sum total number of times the Retransmit timer has been fired across all OPSF
areas and interfaces.
lsa lock
The sum total number of times the Link State Advertisement (LSA) lock timer has
been fired across all OSPF areas and interfaces.
lsa ack
The sum total number of times the LSA Ack timer has been fired across all OSPF
areas and interfaces.
dbage
The total number of times the data base age (Dbage) has been fired.
summary
The total number of times the Summary timer has been fired.
ase export
The total number of times the Autonomous System Export (ASE) timer has been
fired.
The total number of VRRP advertisements that have been received.
vrrpOutAdvers
The total number of VRRP advertisements that have been sent.
vrrpBadVersion
The total number of VRRP advertisements that had a bad version number.
vrrpBadAddress
The total number of VRRP advertisements that had a bad address.
vrrpBadPassword
The total number of VRRP advertisements that had a bad password.
vrrpBadAdvers
The total number of VRRP advertisements received that were dropped.
vrrpBadVrid
The total number of VRRP advertisements that had a bad virtual router ID.
vrrpBadData
The total number of VRRP advertisements that had bad data.
vrrpBadInterval
The total number of VRRP advertisements that had a bad interval.
VRRP statistics
Virtual Router Redundancy Protocol (VRRP) support on this switch provides redundancy between routers in a LAN.
This is accomplished by configuring the same virtual router IP address and ID number on each participating VRRPcapable routing device.
One of the virtual routers is then elected as the master, based on a number of priority criteria, and assumes control
of the shared virtual router IP address. If the master fails, one of the backup virtual routers will assume routing
authority and take control of the virtual router IP address.
When virtual routers are configured, you can display the following protocol statistics for VRRP:
Advertisements received (vrrpInAdvers)
Advertisements transmitted (vrrpOutAdvers)
Advertisements received, but ignored (vrrpBadAdvers)
The following command displays statistics for the VRRP LAN:
show ip vrrp counters
Command mode: All except User EXEC
The following table describes the VRRP statistics.
RIP ALL STATS INFORMATION:
RIP packets received = 12
RIP packets sent = 75
RIP request received = 0
RIP response received = 12
RIP request sent = 3
RIP response sent = 72
RIP route timeout = 0
RIP bad size packet received = 0
RIP bad version received = 0
RIP bad zeros received = 0
RIP bad src port received = 0
RIP bad src IP received = 0
RIP packets from self received = 0
Table 66 RIP Statistics
Statistics
Description
RIP packets received
The total number of RIP packets received.
RIP packets sent
The total number of RIP packets transmitted.
RIP request received
The total number of RIP requests received.
RIP response received
The total number of RIP response received.
RIP request sent
The total number of RIP requests transmitted.
RIP response sent
The total number of RIP responses transmitted.
RIP route timeout
The total number of RIP route timeouts.
RIP bad size packet received
The total number of bad size RIP packets received.
RIP bad version received
The total number of RIP bad versions received.
RIP bad zeros received
The total number of RIP bad zeros (RIPv1 packets with non-zero
unused fields) received.
RIP bad source port received
The total number of RIP bad source port received.
RIP bad source IP received
The total number of RIP bad source IP received.
RIP packets from self received
The total number of RIP packets from self received.
RIP statistics
The following command displays RIP statistics:
show ip rip counters
Command mode: All except User EXEC
The following table describes the basic Routing Information Protocol (RIP) statistics :
The total number of messages delivered to the SNMP entity from the transport
service.
snmpInBadVersions
The total number of SNMP messages, which were delivered to the SNMP
protocol entity and were for an unsupported SNMP version.
snmpInBadC'tyNames
The total number of SNMP messages delivered to the SNMP entity that used an
SNMP community name not known to the switch.
snmpInBadC'tyUses
The total number of SNMP messages delivered to the SNMP protocol entity that
represented an SNMP operation which was not allowed by the SNMP
community named in the message.
snmpInASNParseErrs
The total number of ASN.1 (Abstract Syntax Notation One) or BER (Basic
Encoding Rules), errors encountered by the SNMP protocol entity when
decoding SNMP messages received.
The Open Systems Interconnection (OSI) method of specifying abstract objects
is called ASN.1 (Abstract Syntax Notation One, defined in X.208), and one set of
rules for representing such objects as strings of ones and zeros is called the
BER (Basic Encoding Rules, defined in X.209).
ASN.1 is a flexible notation that allows one to define a variety of data types, from
simple types such as integers and bit strings to structured types such as sets
and sequences.
BER describes how to represent or encode values of each ASN.1 type as a
string of eight-bit octets.
snmpEnableAuthTraps
An object to enable or disable the authentication traps generated by this switch.
snmpOutPkts
The total number of SNMP messages which were passed from the SNMP
protocol entity to the transport service.
snmpInBadTypes
The total number of SNMP messages which failed ASN.1 parsing.
ACL statistics
The following command displays the statistics for Access Control Lists (ACLs):
show access-control counters
Command mode: All
SNMP statistics
The following command displays SNMP statistics:
show snmp-server counters
Command mode: All
The following table describes the Simple Network Management Protocol (SNMP) statistics:
The total number of SNMP Protocol Data Units (PDUs) that were delivered to
the SNMP protocol entity and for which the value of the error-status field is too
big.
snmpInNoSuchNames
The total number of SNMP Protocol Data Units (PDUs) that were delivered to
the SNMP protocol entity and for which the value of the error-status field is
noSuchName.
snmpInBadValues
The total number of SNMP Protocol Data Units (PDUs) that were delivered to
the SNMP protocol entity and for which the value of the error-status field is
badValue.
snmpInReadOnlys
The total number of valid SNMP Protocol Data Units (PDUs), which were
delivered to the SNMP protocol entity and for which the value of the error-status
field is read-only.
It should be noted that it is a protocol error to generate an SNMP PDU, which
contains the value read-only in the error-status field. As such, this object is
provided as a means of detecting incorrect implementations of the SNMP.
snmpInGenErrs
The total number of SNMP Protocol Data Units (PDUs), which were delivered to
the SNMP protocol entity and for which the value of the error-status field is
genErr.
snmpInTotalReqVars
The total number of MIB objects which have been retrieved successfully by the
SNMP protocol entity as a result of receiving valid SNMP Get-Request and GetNext Protocol Data Units (PDUs).
snmpInTotalSetVars
The total number of MIB objects, which have been altered successfully by the
SNMP protocol entity as a result of receiving valid SNMP Set-Request Protocol
Data Units (PDUs).
snmpInGetRequests
The total number of SNMP Get-Request Protocol Data Units (PDUs), which
have been accepted and processed by the SNMP protocol entity.
snmpInGetNexts
The total number of SNMP Get-Next Protocol Data Units (PDUs), which have
been accepted and processed by the SNMP protocol entity.
snmpInSetRequests
The total number of SNMP Set-Request Protocol Data Units (PDUs), which have
been accepted and processed by the SNMP protocol entity.
snmpInGetResponses
The total number of SNMP Get-Response Protocol Data Units (PDUs), which
have been accepted and processed by the SNMP protocol entity.
snmpInTraps
The total number of SNMP Trap Protocol Data Units (PDUs), which have been
accepted and processed by the SNMP protocol entity.
snmpOutTooBigs
The total number of SNMP Protocol Data Units (PDUs), which were generated
by the SNMP protocol entity and for which the value of the error-status field is
too big.
snmpOutNoSuchNames
The total number of SNMP Protocol Data Units (PDUs), which were generated
by the SNMP protocol entity and for which the value of the error-status is
noSuchName.
snmpOutBadValues
The total number of SNMP Protocol Data Units (PDUs), which were generated
by the SNMP protocol entity and for which the value of the error-status field is
badValue.
snmpOutReadOnlys
Not in use.
snmpOutGenErrs
The total number of SNMP Protocol Data Units (PDUs), which were generated
by the SNMP protocol entity and for which the value of the error-status field is
genErr.
snmpOutGetRequests
The total number of SNMP Get-Request Protocol Data Units (PDUs), which
have been generated by the SNMP protocol entity.
snmpOutGetNexts
The total number of SNMP Get-Next Protocol Data Units (PDUs), which have
been generated by the SNMP protocol entity.
snmpOutSetRequests
The total number of SNMP Set-Request Protocol Data Units (PDUs), which have
been generated by the SNMP protocol entity.
snmpOutGetResponses
The total number of SNMP Get-Response Protocol Data Units (PDUs), which
have been generated by the SNMP protocol entity.
snmpOutTraps
The total number of SNMP Trap Protocol Data Units (PDUs), which have been
generated by the SNMP protocol entity.
The total number of GetRequest-PDUs, GetNextRequestPDUs,GetBulkRequest-PDUs, SetRequest-PDUs, and InformRequest-PDUs
delivered to the SNMP entity which were silently dropped because the size of a
reply containing an alternate Response-PDU with an empty variable-bindings
field was too large.
snmpProxyDrops
The total number of GetRequest-PDUs, GetNextRequestPDUs,GetBulkRequest-PDUs, SetRequest-PDUs, and InformRequest-PDUs
delivered to the SNMP entity which were silently dropped because the
transmission of the message to a proxy target failed in a manner (other than a
time-out) such that no Response-PDU could be returned.
Last update based on response from primary server.
Last update time: 18:04:16 Tue Mar 13, 2006
Current system time: 18:55:49 Tue Mar 13, 2006
Table 74 NTP statistics
Statistics
Description
Primary Server
Requests Sent: The total number of NTP requests the switch sent to the primary
NTP server to synchronize time.
Responses Received: The total number of NTP responses received from the
primary NTP server.
Updates: The total number of times the switch updated its time based on the NTP
responses received from the primary NTP server.
Secondary Server
Requests Sent: The total number of NTP requests the switch sent to the
secondary NTP server to synchronize time.
Responses Received: The total number of NTP responses received from the
secondary NTP server.
Updates: The total number of times the switch updated its time based on the NTP
responses received from the secondary NTP server.
Last update based on
response from primary
server
Last update of time on the switch based on either primary or secondary NTP
response received.
Last update time
The time stamp showing the time when the switch was last updated.
Current system time
The switch system time when the command show ntp counters was
issued.
NTP statistics
The following command displays NTP statistics:
show ntp counters
Command mode: All
The switch uses NTP (Network Timing Protocol) version 3 to synchronize the switch‘s internal clock with an atomic
time-calibrated NTP server. With NTP enabled, the switch can accurately update its internal clock to be consistent
with other devices on the network and generates accurate syslogs.
The total numbers of times that link failures were detected on the
uplink ports in the Link to Monitor group.
Number of times LtM link in
Blocking State
The total number of times that Spanning Tree Blocking state was
detected on the uplink ports in the Link to Monitor group.
Number of times LtD got auto
disabled
The total numbers of times that downlink ports in the Link to
Disable group were automatically disabled because of a failure in
the Link to Monitor group.
Uplink Failure Detection statistics
The following command allows you to display Uplink Failure Detection (UFD) statistics.
show ufd counters
Command mode: All
The following table describes the Uplink Failure Detection (UFD) statistics:
Statistics dump
The following command dumps the switch statistics:
show counters
Use the dump command to dump all switch statistics available (40K or more, depending on your configuration).
This data can be used to tune or debug switch performance.
If you want to capture dump data to a file, set your communication software on your workstation to capture session
data prior to issuing the dump commands.
Dumps current configuration to a script file.
Command mode: All except User EXEC
copy running-config {ftp|tftp}
Backs up current configuration to FTP/TFTP server.
Command mode: All except User EXEC
copy {ftp|tftp} running-config
Restores current configuration from FTP/TFTP server.
Command mode: All except User EXEC
IMPORTANT: If you do not save the changes, they are lost the next time the system is reloaded.
Switch# copy running-config startup-config
Configuration Commands
Introduction
The Configuration commands are available only from an administrator login. They include commands for
configuring every aspect of the switch. Changes can be saved to non-volatile memory (NVRAM).
The following table describes the basic Configuration commands. The following sections provide more detailed
information and commands.
Viewing and saving changes
As you use the configuration commands to set switch parameters, the changes you make take effect immediately.
You do not need to apply configuration changes when you use the ISCLI. Any changes are lost the next time the
switch boots unless the changes are explicitly saved.
Saving the configuration
You must save configuration changes to flash memory, so the switch reloads the setting when you reset the switch.
To save the new configuration, enter the following command at any prompt:
When you save configuration changes, the changes are saved to the active configuration block.
For instructions about selecting the configuration to run at the next system reload, see the ―Selecting a
configuration block‖ section in the ―Boot Options‖ chapter.
Prompts the user for the system date.
Command mode: Global configuration
system time <hh>:<mm>:<ss>
Configures the system time using a 24-hour clock format.
Command mode: Global configuration
system timezone
Configures the time zone where the switch resides. You are
prompted to select your location (continent, country, region) by the
timezone wizard. Once a region is selected, the switch updates the
time to reflect local changes to Daylight Savings Time, etc.
Command mode: Global configuration
system daylight
Disables or enables daylight saving time in the system clock. When
enabled, the switch will add an extra hour to the system clock so
that it is consistent with the local clock. By default, this option is
disabled.
Command mode: Global configuration
system idle <1-60>
Sets the idle timeout for CLI sessions, from 1 to 60 minutes. The
default is 5 minutes.
This setting affects both the console port and Telnet port.
Command mode: Global configuration
[no] system notice <1-1024
characters multi-line> <’-‘ to
end>
Displays login notice immediately before the ―Enter password:‖
prompt. This notice can contain up to 1024 characters and new
lines.
Command mode: Global configuration
[no] banner <1-80 characters>
Configures a login banner of up to 80 characters. When a user or
administrator logs into the switch, the login banner is displayed.
Command mode: Global configuration
[no] hostname <string>
Enables or disables displaying of the host name (system
administrator‘s name) in the command line interface.Command mode:: Global configuration
[no] system bootp
Enables or disables the use of BOOTP. If you enable BOOTP, the
switch will query its BOOTP server for all of the switch IP
parameters. The default value is enabled.
Command mode: Global configuration
[no] system dhcp
Enables or disables Dynamic Host Control Protocol for setting the
management IP address on interface 256. When enabled, the IP
address obtained from the DHCP server overrides the static IP
address. The default value is enabled.
Command mode: Global configuration
[no] enable <string>
Allows administrators to assign the Privilege EXEC password. The
password will be required to enter Privilege EXEC mode. The
default value is disabled.
Command mode: Global configuration
show system
Displays the current system parameters.
Command mode: All except User EXEC
System configuration
These commands allow you to configure switch management parameters such as user and administrator privilege
mode passwords, browser-based management settings, and management access list.
The following table describes the System Configuration commands.
Sets the IP address of the first or second syslog host. For
example, 100.10.1.1
Command mode: Global configuration
logging host <1-2> severity <1-7>
Sets the severity level of the first or second syslog host
displayed. The default is 7, which means log all the severity
levels.
Command mode: Global configuration
logging host <1-2> facility <1-7>
This option sets the facility level of the first or seconds
syslog host displayed. The default is 0.
Command mode: Global configuration
[no] logging console
Enables or disables delivering syslog messages to the
console. When necessary, disabling console ensures the
switch is not affected by syslog messages. It is enabled by
default.
Command mode: Global configuration
[no] logging log {<feature>}
Displays a list of features for which syslog messages can
be generated. You can choose to enable/disable specific
features or enable/disable syslog on all available features.
Features include:
cfg cli console dot1x ip management ntp ospf rmon spanning-tree-group ssh system ufd vlan vrrp web
Command mode: Global configuration
show logging
Displays the current syslog settings.
Command mode: All
System host log configuration
The following table describes the Syslog Configuration commands.
NOTE: See the N8406-023 1Gb Intelligent L3 Switch Application Guide for information on SSH.
Table 79 SSHD Configuration commands
Command
Description
ssh interval <0-24>
Defines interval for auto-generating the RSA server key. The switch will autogenerate the RSA server key at the interval defined in this command. The range
is 0-24 hours.
The value of zero (0) means the RSA server key auto-generation is disabled. If
the switch has been busy performing any other key generation and the assigned
time of interval expires, the RSA server will skip generating the key.
Command mode: Global configuration
ssh scp-password
Defines the administrator password that is for Secure Copy (SCP) only. The
username for this SCP administrator is scpadmin.
Typically, SCP is used to copy files securely from one machine to another. In the
switch, SCP is used to download and upload the switch configuration using
secure channels.
Command mode: Global configuration
ssh generate-host-key
Generates the RSA host keys manually. The switch creates this key
automatically while configuring the switch with Secure Shell (SSH). But you can
generate the key manually by using this command if you need to overwrite the
key for security reasons. The command will take effect immediately.
Command mode: Global configuration
ssh generate-server-key
Generates the RSA server key. The switch creates this key automatically while
configuring the switch with Secure Shell (SSH). You can generate the key
manually by using this command if you need to overwrite the key for security
reasons. The command will take effect immediately.
Command mode: Global configuration
ssh port <TCP port
number>
Sets the SSH server port number.
Command mode: Global configuration
ssh scp-enable
Enables the SCP apply and save.
Command mode: Global configuration
no ssh scp-enable
Disables the SCP apply and save. This is the default for SCP.
Command mode: Global configuration
ssh enable
Enables the SSH server.
Command mode: Global configuration
no ssh enable
Disables the SSH server. This is the default for the SSH server.
Command mode: Global configuration
show ssh
Displays the current SSH server configuration.
Command mode: All except User EXEC
Secure Shell Server configuration
Telnet traffic on the network is not secure. These commands enable Secure Shell (SSH) access from any SSH
client. The SSH program securely logs into another computer over a network and executes commands in a secure
environment. All data using SSH is encrypted.
Secure Shell can be configured on the switch using the console port and Telnet only. The commands are not
available if you access the switch using the Browser-based Interface (BBI).
The following table describes the SSHD Configuration commands.
Sets the secondary RADIUS server address and shared secret
between the switch and the RADIUS server(s).
Command mode: Global configuration
radius-server port <UDP port
number>
Enter the number of the User Datagram Protocol (UDP) port to be
configured, between 1500-3000. The default is 1645.
Command mode: Global configuration
radius-server retransmit <1-3>
Sets the number of failed authentication requests before switching to a
different RADIUS server. The range is 1-3 requests. The default is 3
requests.
Command mode: Global configuration
radius-server timeout <1-10>
Sets the amount of time, in seconds, before a RADIUS server
authentication attempt is considered to have failed. The range is 1-10
seconds. The default is 3 seconds.
Command mode: Global configuration
[no] radius-server telnetbackdoor
Enables or disables the RADIUS back door for telnet/SSH/
HTTP/HTTPS. The default is disabled. This command does not apply
when secure backdoor is enabled.
Command mode: Global configuration
[no] radius-server securebackdoor
Enables or disables the RADIUS back door using secure password for
telnet/SSH/ HTTP/HTTPS. The default is disabled. This command
does not apply when backdoor (telnet) is enabled. Command mode: Global configuration
radius-server enable
Enables the RADIUS server.
Command mode: Global configuration
no radius-server enable
Disables the RADIUS server. This is the default.
Command mode: Global configuration
show radius-server
Displays the current RADIUS server parameters.
Command mode: All except User EXEC
IMPORTANT: If RADIUS is enabled, you must login using RADIUS authentication when connecting via the
console or Telnet/SSH/HTTP/HTTPS. Backdoor for console is always enabled, so you can connect using
noradius and the administrator password even if the backdoor (telnet) or secure backdoor (secbd) are
disabled.
If Telnet backdoor is enabled (telnet ena), type in noradius as a backdoor to bypass RADIUS checking,
and use the administrator password to log into the switch. The switch allows this even if RADIUS servers are
available.
If secure backdoor is enabled (secbd ena), type in noradius as a backdoor to bypass RADIUS checking,
and use the administrator password to log into the switch. The switch allows this only if RADIUS servers are
not available.
RADIUS server configuration
The following table describes the RADIUS Server Configuration commands.
Defines the primary or secondary shared secret between the
switch and the TACACS+ server(s).
Command mode: Global configuration
tacacs-server port <TCP port number>
Enter the number of the TCP port to be configured, between 1 -
65000. The default is 49.
Command mode: Global configuration
tacacs-server retransmit <1-3>
Sets the number of failed authentication requests before
switching to a different TACACS+ server. The range is 1-3
requests. The default is 3 requests.
Command mode: Global configuration
tacacs-server timeout <4-15>
Sets the amount of time, in seconds, before a TACACS+ server
authentication attempt is considered to have failed. The range
is 4-15 seconds. The default is 5 seconds.
Command mode: Global configuration
[no] tacacs-server telnet-backdoor
Enables or disables the TACACS+ back door for telnet. The
telnet command also applies to SSH/SCP connections and
the Browser-based Interface (BBI). The default is disabled. This
command does not apply when secure backdoor (secbd) is
enabled.
Command mode: Global configuration
[no] tacacs-server secure-backdoor
Enables or disables the TACACS+ back door using secure
password for telnet/SSH/ HTTP/HTTPS. The default is
disabled. This command does not apply when backdoor
(telnet) is enabled.
Command mode: Global configuration
[no] tacacs-server privilege-mapping
Enables or disables TACACS+ privilege-level mapping.
The default value is disabled.
Command mode: Global configuration
Maps a TACACS+ authorization level to this switch user level.
Enter a TACACS+ privilege level (0-15), followed by the
corresponding the user level (user, oper, admin).
Command mode: Global configuration
tacacs-server enable
Enables the TACACS+ server.
Command mode: Global configuration
no tacacs-server enable
Disables the TACACS+ server. This is the default.
Command mode: Global configuration
show tacacs-server
Displays current TACACS+ configuration parameters.
Command mode: All except User EXEC
TACACS+ server configuration
TACACS+ (Terminal Access Controller Access Control System) is an authentication protocol that allows a remote
access server to forward a user's logon password to an authentication server to determine whether access can be
allowed to a given system. TACACS+ and Remote Authentication Dial-In User Service (RADIUS) protocols are
more secure than the TACACS encryption protocol. TACACS+ is described in RFC 1492.
TACACS+ protocol is more reliable than RADIUS, as TACACS+ uses the Transmission Control Protocol (TCP)
whereas RADIUS uses the User Datagram Protocol (UDP). Also, RADIUS combines authentication and
authorization in a user profile, whereas TACACS+ separates the two operations.
TACACS+ offers the following advantages over RADIUS as the authentication device:
TACACS+ is TCP-based, so it facilitates connection-oriented traffic.
It supports full-packet encryption, as opposed to password-only in authentication requests.
It supports decoupled authentication, authorization, and accounting.
The following table describes the TACACS+ Server Configuration commands.
IMPORTANT: If TACACS+ is enabled, you must login using TACACS+ authentication when connecting via
the console or Telnet/SSH/HTTP/HTTPS. Backdoor for console is always enabled, so you can connect using
notacacs and the administrator password even if the backdoor (telnet) or secure backdoor (secbd) are
disabled.
If Telnet backdoor is enabled (telnet ena), type in notacacs as a backdoor to bypass TACACS+
checking, and use the administrator password to log into the switch. The switch allows this even if TACACS+
servers are available.
If secure backdoor is enabled (secbd ena), type in notacacs as a backdoor to bypass TACACS+ checking,
and use the administrator password to log into the switch. The switch allows this only if TACACS+ servers are
not available.
Table 82 NTP Server Configuration commands
Command
Description
[no] ntp primary-server <IP
address>
Prompts for the IP addresses of the primary NTP server to which you
want to synchronize the switch clock. For example, 100.10.1.1
Command mode: Global configuration
[no] ntp secondary-server <IP
address>
Prompts for the IP addresses of the secondary NTP server to which
you want to synchronize the switch clock. For example, 100.10.1.2
Command mode: Global configuration
ntp interval <1-44640>
Specifies the interval, in minutes (1-44640), to resynchronize the
switch clock with the NTP server. The default is 1440 seconds.
Command mode: Global configuration
system timezone <hh:mm>
Configures the NTP time zone offset from Greenwich Mean Time
(GMT), in hours and minutes. The offset format is HH:MM.
Command mode: Global configuration
ntp enable
Enables the NTP synchronization service.
Command mode: Global configuration
no ntp enable
Disables the NTP synchronization service. This is the default.
Command mode: Global configuration
show ntp
Displays the current NTP service settings.
Command mode: All
NTP server configuration
These commands enable you to synchronize the switch clock to a Network Time Protocol (NTP) server. By default,
this option is disabled.
The following table describes the NTP Server Configuration commands.
Configures the name for the system. The name can have a maximum of 64
characters.
Command mode: Global configuration
[no] snmp-server
location <1-64 characters>
Configures the name of the system location. The location can have a maximum of 64
characters.
Command mode: Global configuration
[no] snmp-server
contact <1-64 characters>
Configures the name of the system contact. The contact can have a maximum of 64
characters.
Command mode: Global configuration
snmp-server readcommunity <1-32 characters>
Configures the SNMP read community string. The read community string controls
SNMP ―get‖ access to the switch. It can have a maximum of 32 characters. The
default read community string is public.
Command mode: Global configuration
snmp-server writecommunity <1-32 characters>
Configures the SNMP write community string. The write community string controls
SNMP ―set‖ and ―get‖ access to the switch. It can have a maximum of 32 characters.
The default write community string is private. Command mode: Global configuration
snmp-server timeout
<1-30>
Sets the timeout value for the SNMP state machine. The range is 1-30 minutes. The
default value is 5 minutes.
Command mode: Global configuration
[no] snmp-server
authentication-trap
enable
Enables or disables the use of the system authentication trap facility. The default
setting is disabled.
Command mode: Global configuration
[no] snmp-server linktrap <1-24> enable
Enables or disables the sending of SNMP link up and link down traps. The default
setting is enabled.
Command mode: Global configuration
[no] snmp-server ufdtrap
Enables or disables the sending of Uplink Failure Detection traps. The default setting
is disabled.
Command mode: Global configuration
show snmp-server
Displays the current SNMP configuration.
Command mode: All
System SNMP configuration
The switch software supports SNMP-based network management. In SNMP model of network management, a
management station (client/manager) accesses a set of variables known as MIBs (Management Information Base)
provided by the managed device (agent). If you are running an SNMP network management station on your
network, you can manage the switch using the following standard SNMP MIBs:
An SNMP agent is a software process on the managed device that listens on UDP port 161 for SNMP messages.
Each SNMP message sent to the agent contains a list of management objects to retrieve or to modify.
SNMP parameters that can be modified include:
System name
System location
System contact
Use of the SNMP system authentication trap function
Read community string
Write community string
The following table describes the System SNMP Configuration commands. The following sections provide more
detailed information and commands.
Configures a user security model (USM) entry for an authorized user. You can
also configure this entry through SNMP. The range is 1-16.
Command mode: Global configuration
snmp-server view <1-128>
Configures different MIB views. The range is 1-128.
Command mode: Global configuration
snmp-server access <1-32>
Configures access rights. The View-based Access Control Model defines a set
of services that an application can use for checking access rights of the user.
You need access control when you have to process retrieval or modification
request from an SNMP entity. The range is 1-32.
Command mode: Global configuration
snmp-server group <1-16>
Configures an SNMP group. A group maps the user name to the access group
names and their access rights needed to access SNMP management objects. A
group defines the access rights assigned to all names that belong to a particular
group. The range is 1-16.
Command mode: Global configuration
snmp-server community <1-
16>
Configures a community table entry. The community table contains objects for
mapping community strings and version-independent SNMP message
parameters. The range is 1-16.
Command mode: Global configuration
snmp-server targetaddress <1-16>
Configures the destination address and user security levels for outgoing
notifications. This is also called the transport endpoint. The range is 1-16.
Command mode: Global configuration
snmp-server targetparameters <1-16>
Configures SNMP parameters, consisting of message processing model,
security model, security level, and security name information. There may be
multiple transport endpoints associated with a particular set of SNMP
parameters, or a particular transport endpoint may be associated with several
sets of SNMP parameters. The range is 1-16.
Command mode: Global configuration
snmp-server notify <1-16>
Configures a notification index. A notification application typically monitors a
system for particular events or conditions, and generates Notification-Class
messages based on these events or conditions. The range is 1-16.
Command mode: Global configuration
snmp-server version
{v1v2v3|v3only}
Enables or disables the access to SNMP version 1 and version 2. This
command is enabled by default (v1v2v3).
Command mode: Global configuration
show snmp-server v3
Displays the current SNMPv3 configuration.
Command mode: All
SNMPv3 configuration
SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework by
supporting the following:
a new SNMP message format
security for messages
access control
remote configuration of SNMP parameters
For more details on the SNMPv3 architecture please see RFC2271 to RFC2275.
The following table describes the SNMPv3 Configuration commands.
Table 85 User Security Model Configuration commands
Command
Description
snmp-server user <1-16> name
<1-32 characters>
Configures a string up to 32 characters long that represents the name of
the user. This is the login name that you need in order to access the
switch.
Command mode: Global configuration
snmp-server user <1-16>
authentication-protocol
{md5|sha|none}
[authentication-password
<password>]
Configures the authentication protocol and password.
The authentication protocol can be HMAC-MD5-96 or HMAC-SHA-96,
or none. The default algorithm except usmUser 1-2 is none.
When you configure an authentication algorithm, you must provide a
password, otherwise you receive an error message during validation.
This command allows you to create or change your password for
authentication.
Command mode: Global configuration
snmp-server user <1-16>
privacy-protocol {des|none}
[privacy-password <password>]
Configures the type of privacy protocol and the privacy password.
The privacy protocol protects messages from disclosure. The options
are des (CBC-DES Symmetric Encryption Protocol) or none. If you
specify desas the privacy protocol, then make sure that you have
selected one of the authentication protocols (MD5 or HMAC-SHA-96). If
you select none as the authentication protocol, you receive an error
message.
You can create or change the privacy password.
Command mode: Global configuration
no snmp-server user <1-16>
Deletes the USM user entries.
Command mode: Global configuration
show snmp-server v3 user
Displays the USM user entries.
Command mode: All
Table 86 SNMPv3 View Configuration commands
Command
Description
snmp-server view <1-128> name
<1-32 characters>
Defines the name for a family of view subtrees up to a maximum of 32
characters.
Command mode: Global configuration
snmp-server view <1-128> tree
<1-64 characters>
Defines the Object Identifier (OID), a string of maximum 64 characters,
which when combined with the corresponding mask defines a family of
view subtrees.
An example of an OID is 1.3.6.1.2.1.1.1.0 Command mode: Global configuration
snmp-server view <1-128> mask
<1-32 characters>
Defines the bit mask, which in combination with the corresponding tree
defines a family of view subtrees. The mask can have a maximum of 32
characters.
Command mode: Global configuration
snmp-server view <1-128> type
{included|excluded}
Selects whether the corresponding instances of
vacmViewTreeFamilySubtreeand
vacmViewTreeFamilyMask define a family of view subtrees, which
is included in or excluded from the MIB view.
Command mode: Global configuration
no snmp-server view <1-128>
Deletes the vacmViewTreeFamily group entry.
Command mode: Global configuration
show snmp-server v3 view
Displays the current vacmViewTreeFamily configuration.
Command mode: All
SNMPv3 User Security Model configuration
You can make use of a defined set of user identities using this Security Model. An SNMP engine must have the
knowledge of applicable attributes of a user.
These commands help you create a user security model entry for an authorized user. You need to provide a
security name to create the USM entry.
The following table describes the User Security Model Configuration commands.
SNMPv3 View configuration
The following table describes the SNMPv3 View Configuration commands.
Defines the minimum level of security required to gain access rights. The
level noAuthNoPriv means that the SNMP message will be sent
without authentication and without using a privacy protocol. The level
authNoPriv means that the SNMP message will be sent with
authentication but without using a privacy protocol. The authPriv
means that the SNMP message will be sent both with authentication and
using a privacy protocol.
Command mode: Global configuration
Defines a 32 character long read view name that allows you read access to
a particular MIB view. If the value is empty or if there is no active MIB view
having this value then no access is granted.
Command mode: Global configuration
Defines a 32 character long write view name that allows you write access
to the MIB view. If the value is empty or if there is no active MIB view
having this value then no access is granted.
Command mode: Global configuration
Defines a 32 character long notify view name that allows you notify access
to the MIB view.
Command mode: Global configuration
no snmp-server access <1-32>
Deletes the View-based Access Control entry.
Command mode: Global configuration
show snmp-server v3 access
Displays the View-based Access Control configuration.
Command mode: All
Table 88 SNMPv3 Group Configuration commands
Command
Description
snmp-server group <1-16>
security {usm|snmpv1|snmpv2}
Defines the security model.
Command mode: Global configuration
snmp-server group <1-16>
user-name <1-32 characters>
Sets the user name. The user name can have a maximum of 32
characters.
Command mode: Global configuration
snmp-server group <1-16>
group-name <1-32 characters>
The name for the access group. The group name can have a
maximum of 32 characters.
Command mode: Global configuration
no snmp-server group <1-16>
Deletes the vacmSecurityToGroup entry.
Command mode: Global configuration
show snmp-server v3 group
Displays the current vacmSecurityToGroup configuration.
Command mode: All
SNMPv3 View-based Access Control Model configuration
The view-based Access Control Model defines a set of services that an application can use for checking access
rights of the user. Access control is needed when the user has to process SNMP retrieval or modification request
from an SNMP entity.
The following table describes the User Access Control Configuration commands.
SNMPv3 Group configuration
The following table describes the SNMPv3 Group Configuration commands.
Table 89 SNMPv3 Community Table Configuration commands
Command
Description
snmp-server community <1-16>
index <1-32 characters>
Configures the unique index value of a row in this table. The index can
have a maximum of 32 characters.
Command mode: Global configuration
snmp-server community <1-16>
name <1-32 characters>
Defines a readable 32 character string that represents the corresponding
value of an SNMP community name in a security model.
Command mode: Global configuration
snmp-server community <1-16>
user-name <1-32 characters>
Sets the user name, up to 32 characters.
Command mode: Global configuration
snmp-server community <1-16>
tag <1-255 characters>
Configures a tag of up to 255 characters maximum. This tag specifies a set
of transport endpoints to which a command responder application sends
an SNMP trap.
Command mode: Global configuration
no snmp-server community
<1-16>
Deletes the community table entry.
Command mode: Global configuration
show snmp-server v3
community
Displays the community table configuration.
Command mode: All
<1-16>address <transport IP
address> name <1-32
characters>
Configures the locally arbitrary, but unique identifier, target address name
associated with this entry.
Command mode: Global configuration
snmp-server target-address
<1-16> name <1-32 characters>
address
<transport IP address>
Configures a transport address IP that can be used in the generation of
SNMP traps.
Command mode: Global configuration
snmp-server target-address
<1-16> port <transport
address port>
Configures a transport address port that can be used in the generation of
SNMP traps.
Command mode: Global configuration
snmp-server target-address
<1-16> taglist <1-255
characters>
Configures a list of tags (up to 255 characters maximum) that are used to
select target addresses for a particular operation.
Command mode: Global configuration
snmp-server target-address
<1-16> parameters-name
<1-32 characters>
Sets the parameter name.
Command mode: Global configuration
no snmp-server target-address
<1-16>
Deletes the Target Address Table entry.
Command mode: Global configuration
show snmp-server v3 targetaddress
Displays the current Target Address Table configuration.
Command mode: All
SNMPv3 Community Table configuration
These commands are used for configuring the community table entry. The configured entry is stored in the
community table list in the SNMP engine. This table is used to configure community strings in the Local
Configuration Datastore (LCD) of SNMP engine.
The following table describes the SNMPv3 Community Table Configuration commands.
SNMPv3 Target Address Table configuration
The following table describes the SNMPv3 Target Address Table Configuration commands.
Selects the security model to be used when generating the SNMP
messages.
Command mode: Global configuration
snmp-server target-parameters
<1-16> user-name <1-32
characters>
Defines the name that identifies the user in the USM table, on whose
behalf the SNMP messages are generated using this entry.
Command mode: Global configuration
Selects the level of security to be used when generating the SNMP
messages using this entry. The level noAuthNoPriv means that the
SNMP message will be sent without authentication and without using a
privacy protocol. The level authNoPriv means that the SNMP message will be sent with authentication but without using a privacy protocol.
The authPriv means that the SNMP message will be sent both with
authentication and using a privacy protocol.
Command mode: Global configuration
no snmp-server targetparameters <1-16>
Deletes the targetParamsTable entry.
Command mode: Global configuration
show snmp-server v3 targetparameters
Displays the current targetParamsTable configuration.
Command mode: All
Defines a locally arbitrary but unique identifier associated with this SNMP notify
entry.
Command mode: Global configuration
snmp-server notify <1-16>
tag <1-255 characters>
Defines a tag of 255 characters maximum that contains a tag value which is
used to select entries in the Target Address Table. Any entry in the
snmpTargetAddrTable, that matches the value of this tag, is selected.
Command mode: Global configuration
no snmp-server notify <1-
16>
Deletes the notify table entry.
Command mode: Global configuration
show snmp-server v3
notify
Displays the current notify table configuration.
Command mode: All
SNMPv3 Target Parameters Table configuration
You can configure the target parameters entry and store it in the target parameters table in the SNMP engine. This
table contains parameters that are used to generate a message. The parameters include the message processing
model (for example: SNMPv3, SNMPv2c, SNMPv1), the security model (for example: USM), the security name,
and the security level (noAuthnoPriv,authNoPriv, or authPriv).
The following table describes the SNMPv3 Target Parameters Table Configuration commands.
SNMPv3 Notify Table configuration
SNMPv3 uses Notification Originator to send out traps. A notification typically monitors a system for particular
events or conditions, and generates Notification-Class messages based on these events or conditions.
The following table describes the SNMPv3 Notify Table Configuration commands.
Enables or disables HTTP (Web) access to the Browser-based Interface. It
is enabled by default.
Command mode: Global configuration
access http port <TCP port
number>
Sets the switch port used for serving switch Web content. The default is
HTTP port 80.
Command mode: Global configuration
[no] access snmp {readonly|read-write}
Disables or provides read-only/write-read SNMP access.
Command mode: Global configuration
[no] access telnet enable
Enables or disables telnet server. It is enabled by default.
Command mode: Global configuration
access telnet port <TCP
port number>
Sets an optional telnet server port number for cases where the server listens
for telnet sessions on a non-standard port. The default is 23.
Command mode: Global configuration
access tftp-port <TFTP port
number>
Sets an optional telnet server port number for cases where the server listens
for TFTP sessions on a non-standard port. The default is 69.
Command mode: Global configuration
show access
Displays the current system access parameters.
Command mode: All except User EXEC
Adds a defined network through which switch access is allowed
through Telnet, SNMP, RIP, or the browser-based interface. A range
of IP addresses is produced when used with a network mask
address. Specify an IP address and mask address in dotted-decimal
notation.
Command mode: Global configuration
no access management-network <IP
address> <IP mask>
Removes a defined network, which consists of a management
network address and a management network mask address.
Command mode: Global configuration
show access management-network
Displays the current management networks parameters.
Command mode: All except User EXEC
System Access configuration
The following table describes the System Access Configuration commands.
Management Networks configuration
The following table describes the Management Networks Configuration commands. You can configure up to 10
management networks on the switch.
Table 95 User Access Control Configuration commands
Command
Description
access user eject <user
name>
Ejects the selected user from the switch.
Command mode: Global configuration
access user userpassword
Sets the user (user) password (maximum of 128 characters). The user has no
direct responsibility for switch management. He or she can view switch status
information and statistics, but cannot make any configuration changes.
Command mode: Global configuration
access user operatorpassword
Sets the operator (oper) password (maximum of 128 characters). The operator
manages all functions of the switch. He or she can view all switch information and
statistics and can reset ports or the entire switch.
Command mode: Global configuration
access user
administrator-password
Sets the administrator (admin) password (maximum of 128 characters). The
super user administrator has complete access to all information and configuration
commands on the switch, including the ability to change both the user and
administrator passwords.
Command mode: Global configuration
show access user
Displays the current user status.
Command mode: All except User EXEC
Table 96 User ID Configuration commands
Command
Description
access user <1-10> level
{user|operator|administrator}
Sets the Class-of-Service to define the user‘s authority level. Command mode: Global configuration
access user <1-10> name <1-8
characters>
Defines the user name of maximum eight characters.
Command mode: Global configuration
access user <1-10> password
Sets the user password of up to 128 characters maximum.
Command mode: Global configuration
access user <1-10> enable
Enables the user ID.
Command mode: Global configuration
no access user <1-10> enable
Disables the user ID.
Command mode: Global configuration
no access user <1-10>
Deletes the user ID.
Command mode: Global configuration
show access user
Displays the current user ID parameters.
Command mode: All except User EXEC
User Access Control configuration
The following table describes the User Access Control commands.
User ID configuration
The following table describes the User ID Configuration commands.
Enables or disables BBI access (Web access) using HTTPS. The default value is
disabled.
Command mode: Global configuration
access https port <TCP
port number>
Defines the HTTPS Web server port number. The default is 443.
Command mode: Global configuration
access https generatecertificate
Allows you to generate a certificate to connect to the SSL to be used during the key
exchange. A default certificate is created when HTTPS is enabled for the first time.
The user can create a new certificate defining the information that they want to be
used in the various fields. For example:
Country Name (2 letter code) [ ]: JP State or Province Name (full name) [ ]: Tokyo Locality Name (for example, city) [ ]: Fuchu Organization Name (for example, company) [ ]: NEC Organizational Unit Name (for example, section) [ ]: SIGMABLADE Common Name (for example, user‘s name) [ ]: Taro Email (for example, email address) [ ]: info@nec.com
You must confirm if you want to generate the certificate. It takes approximately
30 seconds to generate the certificate. Then the switch restarts SSL agent.
Command mode: Global configuration
access https savecertificate
Allows the client, or the Web browser, to accept the certificate and save the
certificate to Flash to be used when the switch is rebooted.
Command mode: Global configuration
show access
Displays the current SSL Web Access configuration.
Command mode: All except User EXEC
HTTPS Access configuration
The following table describes the HTTPS Access Configuration commands.
NOTE: Port 19 is reserved for switch management interface.
Table 98 Port Configuration commands
Command
Description
interface gigabitethernet
<port number>
Enter Interface Port configuration mode for the selected port.
Command mode: Global configuration
dot1p <0-7>
Configures the port‘s 802.1p priority level.
Command mode: Interface port
pvid <1-4095>
Sets the default VLAN number which will be used to forward frames which
are not VLAN tagged. The default number for all ports except Port 19 is 1.
Note: VLAN 4095 is reserved for switch management interface.
Command mode: Interface port
name <1-64 characters>
Sets a name for the port (maximum 64 characters). The assigned port
name displays next to the port number on some information and statistics
screens.
Command mode: Interface port
[no] rmon
Enables or disables Remote Monitoring for the port. The default is disabled.
RMON must be enabled for any RMON configurations to function.
Command mode: Interface port
[no] tagging
Disables or enables VLAN tagging for this port. It is disabled by default.
Command mode: Interface port
[no] tag-pvid
Disables or enables VLAN tag persistence. When disabled, the VLAN tag is
removed from packets whose VLAN tag matches the port PVID. The default
value is enabled.
Command mode: Interface port
copper
Configures the port‘s transmission media as copper. This command is
available only for Ports 21-24.
Command mode: Interface port
fiber
Configures the port‘s transmission media as fiber. This command is
available only for Ports 21-24.
Command mode: Interface port
auto-mode
Configures the port‘s transmission media as auto. This command is
available only for Ports 21-24.
Command mode: Interface port
[no] broadcast-threshold
<0-262143>
Limits the number of broadcast packets per second to the specified value. If
disabled (no), the port forwards all broadcast packets.
Command mode: Interface port
[no] multicast-threshold
<0-262143>
Limits the number of multicast packets per second to the specified value. If
disabled (no), the port forwards all multicast packets.
Command mode: Interface port
[no] dest-lookup-threshold
<0-262143>
Limits the number of unknown unicast packets per second to the specified
value. If disabled (no), the port forwards all unknown unicast packets.
Command mode: Interface port
no shutdown
Enables the port.
Command mode: Interface port
shutdown
Disables the port. To temporarily disable a port without changing its
configuration attributes, see the ―Temporarily disabling a port‖ section later
in this chapter.
Command mode: Interface port
show interface
gigabitethernet <port number>
Displays current port parameters.
Command mode: All
Port configuration
Use the port configuration commands to configure settings for individual switch ports.
The following table describes the Port Configuration commands. The following sections provide more detailed
information and commands.
Note: Ports 1-18 are set to 1000 Mb/s, and cannot be changed.
Command mode: Interface port
duplex {full|half|any}
Sets the operating mode. Not all options are valid on all ports. The choices
include:
Full-duplex Half-duplex ―Any,‖ for automatic detection (default)
Note: Ports 1-16 are set to "Any" and Ports 17-18 are set to full duplex. These
ports cannot be changed.
Command mode: Interface port
flowcontrol
{receive|send|both}
Sets the flow control. The choices include:
Receive (rx) flow control Transmit (tx) flow control Both receive and transmit flow control (default)
Command mode: Interface port
no flowcontrol
Sets the flow control to none.
Command mode: Interface port
[no] auto
Enables or disables auto-negotiation for the port. The default is enabled.
Command mode: Interface port
show interface
gigabitethernet <port number>
Displays current port parameters.
Command mode: All
Table 100 ACL Port Configuration commands
Command
Description
[no] access-control list <1-762>
Adds or removes the specified ACL.
Command mode: Interface port
[no] access-control group <1-762>
Adds or removes the specified ACL Group.
Command mode: Interface port
show interface gigabitethernet
[<port number>] access-control
Displays current ACL QoS parameters.
Command mode: All
Temporarily disabling a port
To temporarily disable a port without changing its stored configuration attributes, enter the following command at
any prompt:
Because this configuration sets a temporary state for the port, you do not need to perform a save operation. The
port state reverts to its original configuration when the switch is reloaded.
Port link configuration
Use these commands to set port parameters for the port link.
Link commands are described in the following table. Using these commands, you can set port parameters such as
speed, duplex, flow control, and negotiation mode for the port link.
The following table describes the Gigabit Link Configuration commands.
ACL Port configuration
The following table describes the basic Access Control List Configuration commands for the port.