This manual is intended for people who want to configure ZyXEL Switches via Command
Line Interface (CLI).
The version number on the cover page refers to the latest firmware version supported by the
ZyXEL Switches. This guide applies to version 3.79, 3.80 and 3.90 at the time of writing.
"This guide is intended as a command reference for a series of products.
Therefore many commands in this guide may not be available in your product.
See your User’s Guide for a list of supported features and details about feature
implementation.
Please refer to www.zyxel.com or your product’s CD for product specific User Guides and
product certifications.
How To Use This Guide
•Read the How to Access the CLI chapter for an overview of various ways you can get to
the command interface on your Switch.
• Use the Reference section in this guide for command syntax, description and examples.
Each chapter describes commands related to a feature.
• To find specific information in this guide, use the Contents Overview, the Index of Commands, or search the PDF file. E-mail techwriters@zyxel.com.tw if you cannot find
the information you require.
CLI Reference Guide Feedback
Help us help you. Send all Reference Guide-related comments, questions or suggestions for
improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team,
ZyXEL Communications Corp.,
6 Innovation Road II,
Science-Based Industrial Park,
Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
Ethernet Switch CLI Reference Guide
3
About This CLI Reference Guide
Customer Support
In the event of problems that cannot be solved by using this manual, you should contact your
vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in
which you bought the device. See http://www.zyxel.com/web/contact_us.php for contact
information. Please have the following information ready when you contact an office.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
4
Ethernet Switch CLI Reference Guide
Document Conventions
Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this CLI Reference Guide.
1Warnings tell you about things that could harm you or your device. See your
User’s Guide for product specific warnings.
"Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
This manual follows these general conventions:
• ZyXEL’s switches (such as the ES-2024A, ES-2108, GS-3012, and so on) may be referred
to as the “Switch”, the “device”, the “system” or the “product” in this Reference Guide.
• Units of measurement may denote the “metric” value or the “scientific” value. For
example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000”
or “1048576” and so on.
Command descriptions follow these conventions:
• Commands are in
• Required input values are in angle brackets <>; for example,
must specify an IP address for this command.
• Optional fields are in square brackets []; for instance show logins[name], the name
field is optional.
The following is an example of a required field within an optional field: snmp-server [contact <system contact>], the contact field is optional. However, if you
use contact, then you must provide the system contact information.
• Lists (such as <port-list>) consist of one or more elements separated by commas.
Each element might be a single value (1, 2, 3, ...) or a range of values (1-2, 3-5, ...)
separated by a dash.
•The | (bar) symbol means “or”.
• italic terms represent user-defined input values; for example, in snmp-server [contact <system contact>], system contact can be replaced by the
administrator’s name.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER]
means the “Enter” or “Return” key on your keyboard.
courier new font.
ping<ip> means that you
Ethernet Switch CLI Reference Guide
5
Document Conventions
• <cr> means press the [ENTER] key.
• An arrow (-->) indicates that this line is a continuation of the previous line.
Command summary tables are organized as follows:
Table 1 Example: Command Summary Table
COMMANDDESCRIPTIONMP
show vlanDisplays the status of all VLANs.E3
vlan <1-4094>Enters config-vlan mode for the specified VLAN. Creates the
VLAN, if necessary.
inactiveDisables the specified VLAN.C13
no inactiveEnables the specified VLAN.C13
no vlan <1-4094>Deletes a VLAN.C13
C13
The Table title identifies commands or the specific feature that the commands configure.
The COMMAND column shows the syntax of the command.
• If a command is not indented, you run it in the enable or config mode. See Chapter 2 on
page 19 for more information on command modes.
• If a command is indented, you run it in a sub-command mode.
The DESCRIPTION column explains what the command does. It also identifies legal input
values, if necessary.
The M column identifies the mode in which you run the command.
• E: The command is available in enable mode. It is also available in user mode if the
privilege level (P) is less than 13.
• C: The command is available in config (not indented) or one of the sub-command modes
(indented).
The P column identifies the privilege level of the command. If you don’t have a high enough
privilege level you may not be able to view or execute some of the commands. See Chapter 2
on page 19 for more information on privilege levels.
6
Ethernet Switch CLI Reference Guide
Document Conventions
Icons Used in Figures
Figures in this guide may use the following generic icons. The Switch icon is not an exact
representation of your device.
Appendices and Index of Commands ................................................................................ 261
Ethernet Switch CLI Reference Guide
11
Contents Overview
12
Ethernet Switch CLI Reference Guide
PART I
Introduction
How to Access and Use the CLI (15)
Privilege Level and Command Mode (19)
Initial Setup (25)
13
14
CHAPTER 1
How to Access and Use the CLI
This chapter introduces the command line interface (CLI).
1.1 Accessing the CLI
Use any of the following methods to access the CLI.
1.1.1 Console Port
1 Connect your computer to the console port on the Switch using the appropriate cable.
2 Use terminal emulation software with the following settings:
Table 2 Default Settings for the Console Port
SETTINGDEFAULT VALUE
Terminal EmulationVT100
Baud Rate9600 bps
ParityNone
Number of Data Bits8
Number of Stop Bits1
Flow ControlNone
3 Press [ENTER] to open the login screen.
1.1.2 Telnet
1 Connect your computer to one of the Ethernet ports.
2 Open a Telnet session to the Switch’s IP address. If this is your first login, use the default
values.
Table 3 Default Management IP Address
SETTINGDEFAULT VALUE
IP Address192.168.1.1
Subnet Mask255.255.255.0
Make sure your computer IP address is in the same subnet, unless you are accessing the
Switch through one or more routers.
Ethernet Switch CLI Reference Guide
15
Chapter 1 How to Access and Use the CLI
1.1.3 SSH
1 Connect your computer to one of the Ethernet ports.
2 Use a SSH client program to access the Switch. If this is your first login, use the default
values in Table 3 on page 15 and Table 4 on page 16. Make sure your computer IP
address is in the same subnet, unless you are accessing the Switch through one or more
routers.
1.2 Logging in
Use the administrator username and password. If this is your first login, use the default values.
Table 4 Default User Name and Password
SETTINGDEFAULT VALUE
User Nameadmin
Password1234
"The Switch automatically logs you out of the management interface after five
minutes of inactivity. If this happens to you, simply log back in again.
1.3 Using Shortcuts and Getting Help
This table identifies some shortcuts in the CLI, as well as how to get help.
Table 5 CLI Shortcuts and Help
COMMAND / KEY(S)DESCRIPTION
historyDisplays a list of recently-used commands.
yz (up/down arrow keys)Scrolls through the list of recently-used commands. You can edit
[CTRL]+UClears the current command.
[TAB]Auto-completes the keyword you are typing if possible. For
?Displays the keywords and/or input values that are allowed in
helpDisplays the (full) commands that are allowed in place of help.
any command or press [ENTER] to run it again.
example, type config, and press [TAB]. The Switch finishes the
word configure.
place of the ?.
16
Ethernet Switch CLI Reference Guide
Chapter 1 How to Access and Use the CLI
1.4 Saving Your Configuration
When you run a command, the Switch saves any changes to its run-time memory. The Switch
loses these changes if it is turned off or loses power. Use the
enable mode to save the current configuration permanently to non-volatile memory.
sysname# write memory
write memory command in
"You should save your changes after each CLI session. All unsaved
configuration changes are lost once you restart the Switch.
1.5 Logging Out
Enter logout to log out of the CLI. You have to be in user, enable, or config mode. See
Chapter 2 on page 19 for more information about modes.
Ethernet Switch CLI Reference Guide
17
Chapter 1 How to Access and Use the CLI
18
Ethernet Switch CLI Reference Guide
CHAPTER 2
Privilege Level and Command
Mode
This chapter introduces the CLI privilege levels and command modes.
• The privilege level determines whether or not a user can run a particular command.
• If a user can run a particular command, the user has to run it in the correct mode.
2.1 Privilege Levels
Every command has a privilege level (0-14). Users can run a command if the session’s
privilege level is greater than or equal to the command’s privilege level. The session’s
privilege level initially comes from the login account’s privilege level, though it is possible to
change the session’s privilege level after logging in.
2.1.1 Privilege Levels for Commands
The privilege level of each command is listed in the Reference A-G chapters on page 29.
At the time of writing, commands have a privilege level of 0, 3, 13, or 14. The following table
summarizes the types of commands at each of these privilege levels.
Table 6 Types of Commands at Different Privilege Levels
PRIVILEGE LEVEL TYPES OF COMMANDS AT THIS PRIVILEGE LEVEL
0Display basic system information.
3Display configuration or status.
13Configure features except for login accounts, the authentication method
sequence and authorization settings, multiple logins, and administrator and
enable passwords.
14Configure login accounts, the authentication method sequence and
authorization settings, multiple logins, and administrator and enable passwords.
2.1.2 Privilege Levels for Login Accounts
You can manage the privilege levels for login accounts in the following ways:
• Using commands. Login accounts can be configured by the admin account or any login
account with a privilege level of 14. See Chapter 32 on page 135.
• Using vendor-specific attributes in an external authentication server. See the User’s Guide
for more information.
Ethernet Switch CLI Reference Guide
19
Chapter 2 Privilege Level and Command Mode
The admin account has a privilege level of 14, so the administrator can run every command.
You cannot change the privilege level of the admin account.
2.1.3 Privilege Levels for Sessions
The session’s privilege level initially comes from the privilege level of the login account the
user used to log in to the Switch. After logging in, the user can use the following commands to
change the session’s privilege level.
2.1.3.1 enable Command
This command raises the session’s privilege level to 14. It also changes the session to enable
mode (if not already in enable mode). This command is available in user mode or enable
mode, and users have to know the enable password.
In the following example, the login account user0 has a privilege level of 0 but knows that the
enable password is 123456. Afterwards, the session’s privilege level is 14, instead of 0, and
the session changes to enable mode.
sysname> enable
Password: 123456
sysname#
The default enable password is 1234. Use this command to set the enable password.
password <password>
<password> consists of 1-32 alphanumeric characters. For example, the following
command sets the enable password to 123456. See Chapter 73 on page 251 for more
information about this command.
sysname(config)# password 123456
2.1.3.2 enable <0-14> Command
This command raises the session’s privilege level to the specified level. It also changes the
session to enable mode, if the specified level is 13 or 14. This command is available in user
mode or enable mode, and users have to know the password for the specified privilege level.
In the following example, the login account user0 has a privilege level of 0 but knows that the
password for privilege level 13 is pswd13. Afterwards, the session’s privilege level is 13,
instead of 0, and the session changes to enable mode.
sysname> enable 13
Password: pswd13
sysname#
20
Users cannot use this command until you create passwords for specific privilege levels. Use
the following command to create passwords for specific privilege levels.
password <password> privilege <0-14>
Ethernet Switch CLI Reference Guide
<password> consists of 1-32 alphanumeric characters. For example, the following
command sets the password for privilege level 13 to pswd13. See Chapter 73 on page 251 for
more information about this command.
sysname(config)# password pswd13 privilege 13
2.1.3.3 disable Command
This command reduces the session’s privilege level to 0. It also changes the session to user
mode. This command is available in enable mode.
2.1.3.4 show privilege command
This command displays the session’s current privilege level. This command is available in
user mode or enable mode.
sysname# show privilege
Current privilege level : 14
Chapter 2 Privilege Level and Command Mode
2.2 Command Modes
The CLI is divided into several modes. If a user has enough privilege to run a particular
command, the user has to run the command in the correct mode. The modes that are available
depend on the session’s privilege level.
2.2.1 Command Modes for Privilege Levels 0-12
If the session’s privilege level is 0-12, the user and all of the allowed commands are in user
mode. Users do not have to change modes to run any allowed commands.
2.2.2 Command Modes for Privilege Levels 13-14
If the session’s privilege level is 13-14, the allowed commands are in one of several modes.
Table 7 Command Modes for Privilege Levels 13-14 and the Types of Commands in Each One
MODEPROMPTCOMMAND FUNCTIONS IN THIS MODE
enablesysname#Display current configuration, diagnostics, maintenance.
configsysname(config)#Configure features other than those below.
Each command is usually in one and only one mode. If a user wants to run a particular
command, the user has to change to the appropriate mode. The command modes are organized
like a tree, and users start in enable mode. The following table explains how to change from
one mode to another.
Table 8 Changing Between Command Modes for Privilege Levels 13-14
Use the help command to view the executable commands on the Switch. You must have the
highest privilege level in order to view all the commands. Follow these steps to create a list of
supported commands:
1 Log into the CLI. This takes you to the enable mode.
22
Ethernet Switch CLI Reference Guide
Chapter 2 Privilege Level and Command Mode
2 Type help and press [ENTER]. A list comes up which shows all the commands
available in enable mode. The example shown next has been edited for brevity’s sake.
sysname# help
Commands available:
help
logout
exit
history
enable <0-14>
enable <cr>
.
.
traceroute <ip|host-name> [vlan <vlan-id>][..]
traceroute help
ssh <1|2> <[user@]dest-ip> <cr>
ssh <1|2> <[user@]dest-ip> [command </>]
sysname#
3 Copy and paste the results into a text editor of your choice. This creates a list of all the
executable commands in the user and enable modes.
4 Type configure and press [ENTER]. This takes you to the config mode.
5 Type help and press [ENTER]. A list is displayed which shows all the commands
available in config mode and all the sub-commands. The sub-commands are preceded by
the command necessary to enter that sub-command mode. For example, the command
name <name-str> as shown next, is preceded by the command used to enter the
config-vlan sub-mode:
vlan <1-4094>.
sysname# help
.
.
no arp inspection log-buffer logs
no arp inspection filter-aging-time
no arp inspection <cr>
vlan <1-4094>
vlan <1-4094> name <name-str>
vlan <1-4094> normal <port-list>
vlan <1-4094> fixed <port-list>
6 Copy and paste the results into a text editor of your choice. This creates a list of all the
executable commands in config and the other submodes, for example, the config-vlan
mode.
Ethernet Switch CLI Reference Guide
23
Chapter 2 Privilege Level and Command Mode
24
Ethernet Switch CLI Reference Guide
CHAPTER 3
Initial Setup
This chapter identifies tasks you might want to do when you first configure the Switch.
3.1 Changing the Administrator Password
"It is recommended you change the default administrator password.
Use this command to change the administrator password.
admin-password <pw-string> <Confirm-string>
where <pw-string> may be 1-32 alphanumeric characters long.
By default, multiple CLI sessions are allowed via the console port or Telnet. See the User’s
Guide for the maximum number of concurrent sessions for your Switch. Use this command to
prohibit concurrent logins.
no multi-login
Console port has higher priority than Telnet. See Chapter 41 on page 157 for more multi-
login
commands.
sysname# configure
sysname(config)# no multi-login
3.4 Changing the Management IP Address
The Switch has a different IP address in each VLAN. By default, the Switch has VLAN 1 with
IP address 192.168.1.1 and subnet mask 255.255.255.0. Use this command in config-vlan
mode to change the management IP address in a specific VLAN.
ip address <ip> <mask>
This example shows you how to change the management IP address in VLAN 1 to 172.16.0.1
with subnet mask 255.255.255.0.
sysname# configure
sysname(config)# vlan 1
sysname(config-vlan)# ip address 172.16.0.1 255.255.255.0
"Afterwards, you have to use the new IP address to access the Switch.
3.5 Changing the Out-of-band Management IP Address
If your Switch has a MGMT port (also referred to as the out-of-band management port), then
the Switch can also be managed via this interface. By default, the MGMT port IP address is
192.168.0.1 and the subnet mask is 255.255.255.0. Use this command in config mode to
change the out-of-band management IP address.
ip address <ip> <mask>
This example shows you how to change the out-of-band management IP address to 10.10.10.1
with subnet mask 255.255.255.0 and the default gateway 10.10.10.254
26
sysname# configure
sysname(config)# ip address 10.10.10.1 255.255.255.0
sysname(config)# ip address default-gateway 10.10.10.254
Ethernet Switch CLI Reference Guide
3.6 Looking at Basic System Information
Use this command to look at general system information about the Switch.
show system-information
This is illustrated in the following example.
sysname# show system-information
System Name : sysname
System Contact :
System Location :
Ethernet Address : 00:13:49:ae:fb:7a
ZyNOS F/W Version : V3.80(AII.0)b0 | 04/18/2007
RomRasSize : 1746416
System up Time : 280:32:52 (605186d ticks)
Bootbase Version : V1.00 | 05/17/2006
ZyNOS CODE : RAS Apr 18 2007 19:59:49
Product Model : ES-2024PWR
Chapter 3 Initial Setup
See Chapter 73 on page 251 for more information about these attributes.
3.7 Looking at the Operating Configuration
Use this command to look at the current operating configuration.
show running-config
This is illustrated in the following example.
sysname# show running-config
Building configuration...
Current configuration:
vlan 1
name 1
normal ""
fixed 1-9
forbidden ""
untagged 1-9
ip address default-management 172.16.37.206 255.255.255.0
ip address default-gateway 172.16.37.254
exit
Ethernet Switch CLI Reference Guide
27
Chapter 3 Initial Setup
28
Ethernet Switch CLI Reference Guide
PART II
Reference A-G
AAA Commands (31)
ARP Commands (33)
ARP Inspection Commands (35)
Bandwidth Commands (41)
Broadcast Storm Commands (45)
Classifier Commands (59)
Cluster Commands (63)
Date and Time Commands (67)
DHCP Commands (71)
DHCP Snooping & DHCP VLAN Commands (75)
DiffServ Commands (79)
DVMRP Commands (81)
Ethernet OAM Commands (83)
GARP Commands (89)
GVRP Commands (91)
29
30
CHAPTER 4
AAA Commands
Use these commands to configure authentication, authorization and accounting on the Switch.
4.1 Command Summary
The following section lists the commands for this feature.
Table 9 aaa authentication Command Summary
COMMANDDESCRIPTIONMP
show aaa authenticationDisplays what methods are used for authentication.E3
show aaa authentication enableDisplays the authentication method(s) for checking privilege
Sets the update period (in minutes) for accounting sessions.
This is the time the Switch waits to send an update to an
accounting server after a session starts.
Enables accounting of command sessions and specifies the
minimum privilege level (0-14) for the command sessions that
should be recorded. Optionally, sends accounting information
for command sessions to all configured accounting servers at
the same time.
no aaa accounting execDisables accounting of administrative sessions via SSH,
show aaa accounting systemDisplays accounting settings for recording system events, for
aaa accounting system
<radius|tacacs+> [broadcast]
no aaa accounting systemDisables accounting of system events on the Switch.C13
session events.
Enables accounting of IEEE 802.1x authentication sessions
and specifies the mode and protocol method. Optionally,
sends accounting information for IEEE 802.1x authentication
sessions to all configured accounting servers at the same
time.
on the Switch.
sessions via SSH, Telnet or the console port.
Enables accounting of administrative sessions via SSH,
Telnet and console port and specifies the mode and protocol
method. Optionally, sends accounting information for
administrative sessions via SSH, Telnet and console port to
all configured accounting servers at the same time.
Telnet or console on the Switch.
example system shut down, start up, accounting enabled or
accounting disabled.
Enables accounting of system events and specifies the
protocol method. Optionally, sends accounting information for
system events to all configured accounting servers at the
same time.
E3
C13
C13
E3
C13
C13
E3
C13
Table 11 aaa authorization Command Summary
COMMANDDESCRIPTIONMP
show aaa authorizationDisplays authorization settings configured on the Switch.E3
show aaa authorization dot1xDisplays the authorization method used to allow an IEEE
802.1x client to have different bandwidth limit or VLAN ID
assigned via the external server.
show aaa authorization execDisplays the authorization method used to allow an
administrator which logs in the Switch through Telnet or SSH
to have different access privilege level assigned via the
external server.
aaa authorization dot1x radiusEnables authorization for IEEE 802.1x clients using RADIUS. C14
aaa authorization exec
<radius|tacacs+>
no aaa authorization dot1xDisables authorization of allowing an IEEE 802.1x client to
no aaa authorization execDisables authorization of allowing an administrator which logs
Specifies which method (radius or tacacs+) should be
used for administrator authorization.
have different bandwidth limit or VLAN ID assigned via the
external server.
in the Switch through Telnet or SSH to have different access
privilege level assigned via the external server.
E3
E3
C14
C14
C14
32
Ethernet Switch CLI Reference Guide
CHAPTER 5
ARP Commands
Use these commands to look at IP-to-MAC address mapping(s).
5.1 Command Summary
The following section lists the commands for this feature.
Table 12 arp Command Summary
COMMANDDESCRIPTIONMP
show ip arpDisplays the ARP table.E3
no arpFlushes the ARP table entries.E13
5.2 Command Examples
This example shows the ARP table.
sysname# show ip arp
Index IP MAC VLAN Age(s) Type
1 172.16.37.254 00:04:80:9b:78:00 1 300 dynamic
The following table describes the labels in this screen.
Table 13 show ip arp
LABELDESCRIPTION
IndexThis field displays the index number.
IPThis field displays the learned IP address of the device.
MACThis field displays the MAC address of the device.
VLANThis field displays the VLAN to which the device belongs.
Age(s)This field displays how long the entry remains valid.
TypeThis field displays how the entry was learned.
dynamic: The Switch learned this entry from ARP packets.
Ethernet Switch CLI Reference Guide
33
Chapter 5 ARP Commands
34
Ethernet Switch CLI Reference Guide
CHAPTER 6
ARP Inspection Commands
Use these commands to filter unauthorized ARP packets in your network.
6.1 Command Summary
The following section lists the commands for this feature.
Table 14 arp inspection Command Summary
COMMANDDESCRIPTIONMP
show arp inspectionDisplays ARP inspection configuration details.E3
arp inspectionEnables ARP inspection on the Switch. You still have to
enable ARP inspection on specific VLAN and specify trusted
ports.
no arp inspectionDisables ARP inspection on the Switch.C13
C13
Table 15 Command Summary: arp inspection filter
COMMANDDESCRIPTIONMP
show arp inspection filter
[<mac-addr>] [vlan <vlan-id>]
no arp inspection filter <mac-addr> vlan <vlan-id>
clear arp inspection filterDelete all ARP inspection filters from the Switch.E13
arp inspection filter-aging-time
<1-2147483647>
arp inspection filter-aging-time
none
no arp inspection filter-agingtime
Table 16 Command Summary: arp inspection log
COMMANDDESCRIPTIONMP
show arp inspection logDisplays the log settings configured on the Switch. It also
clear arp inspection logDelete all ARP inspection log entries from the Switch.E13
Displays the current list of MAC address filters that were
created because the Switch identified an unauthorized ARP
packet. Optionally, lists MAC address filters based on the
MAC address or VLAN ID in the filter.
Specifies the ARP inspection record you want to delete from
the Switch. The ARP inspection record is identified by the
MAC address and VLAN ID pair.
Specifies how long (1-2147483647 seconds) MAC address
filters remain in the Switch after the Switch identifies an
unauthorized ARP packet. The Switch automatically deletes
the MAC address filter afterwards.
Specifies the MAC address filter to be permanent.C13
Resets how long (1-2147483647 seconds) the MAC address
filter remains in the Switch after the Switch identifies an
unauthorized ARP packet to the default value.
Specifies the maximum number (1-1024) of log messages
that can be generated by ARP packets and not sent to the
syslog server.
If the number of log messages in the Switch exceeds this
number, the Switch stops recording log messages and simply
starts counting the number of entries that were dropped due
to unavailable buffer.
Specifies the number of syslog messages that can be sent to
the syslog server in one batch and how often (1-86400
seconds) the Switch sends a batch of syslog messages to the
syslog server.
Resets the maximum number (1-1024) of log messages that
can be generated by ARP packets and not sent to the syslog
server to the default value.
Resets the maximum number of syslog messages the Switch
can send to the syslog server in one batch to the default
value.
Displays ARP inspection settings for the specified VLAN(s).E3
Disables ARP inspection on the specified VLAN(s).C13
Enables logging of ARP inspection events on the specified
VLAN(s). Optionally specifies which types of events to log.
Disables logging of messages generated by ARP inspection
for the specified VLAN(s).
Ethernet Switch CLI Reference Guide
C13
C13
6.2 Command Examples
This example looks at the current list of MAC address filters that were created because the
Switch identified an unauthorized ARP packet. When the Switch identifies an unauthorized
ARP packet, it automatically creates a MAC address filter to block traffic from the source
MAC address and source VLAN ID of the unauthorized ARP packet.
sysname# show arp inspection filter
Filtering aging timeout : 300
MacAddress VLAN Port Expiry (sec) Reason
----------------- ---- ----- ------------ ------------- Total number of bindings: 0
The following table describes the labels in this screen.
Table 19 show arp inspection filter
LABELDESCRIPTION
Filtering aging timeoutThis field displays how long the MAC address filters remain in the Switch
after the Switch identifies an unauthorized ARP packet. The Switch
automatically deletes the MAC address filter afterwards.
MacAddressThis field displays the source MAC address in the MAC address filter.
VLANThis field displays the source VLAN ID in the MAC address filter.
PortThis field displays the source port of the discarded ARP packet.
Expiry (sec)This field displays how long (in seconds) the MAC address filter remains in
the Switch. You can also delete the record manually (Delete).
ReasonThis field displays the reason the ARP packet was discarded.
MAC+VLAN: The MAC address and VLAN ID were not in the binding table.
IP: The MAC address and VLAN ID were in the binding table, but the IP
address was not valid.
Port: The MAC address, VLAN ID, and IP address were in the binding
table, but the port number was not valid.
Chapter 6 ARP Inspection Commands
This example looks at log messages that were generated by ARP packets and that have not
been sent to the syslog server yet.
sysname# show arp inspection log
Total Log Buffer Size : 32
Syslog rate : 5 entries per 1 seconds
The following table describes the labels in this screen.
Table 20 show arp inspection log
LABELDESCRIPTION
Total Log Buffer SizeThis field displays the maximum number (1-1024) of log messages that
Syslog rateThis field displays the maximum number of syslog messages the Switch
PortThis field displays the source port of the ARP packet.
VlanThis field displays the source VLAN ID of the ARP packet.
Sender MACThis field displays the source MAC address of the ARP packet.
Sender IPThis field displays the source IP address of the ARP packet.
PktsThis field displays the number of ARP packets that were consolidated into
ReasonThis field displays the reason the log message was generated.
TimeThis field displays when the log message was generated.
Total number of logsThis field displays the number of log messages that were generated by
were generated by ARP packets and have not been sent to the syslog
server yet.
If the number of log messages in the Switch exceeds this number, the
Switch stops recording log messages and simply starts counting the
number of entries that were dropped due to unavailable buffer.
can send to the syslog server in one batch. This number is expressed as a
rate because the batch frequency is determined by the Log Interval.
this log message. The Switch consolidates identical log messages
generated by ARP packets in the log consolidation interval into one log
message.
static deny: An ARP packet was discarded because it violated a static
binding with the same MAC address and VLAN ID.
deny: An ARP packet was discarded because there were no bindings with
the same MAC address and VLAN ID.
static permit: An ARP packet was forwarded because it matched a static
binding.
ARP packets and that have not been sent to the syslog server yet. If one or
more log messages are dropped due to unavailable buffer, there is an entry
called overflow with the current number of dropped log messages.
38
This example displays whether ports are trusted or untrusted ports for ARP inspection.
sysname# show arp inspection interface port-channel 1
Interface Trusted State Rate (pps) Burst Interval
The following table describes the labels in this screen.
Table 21 show arp inspection interface port-channel
LABELDESCRIPTION
InterfaceThis field displays the port number. If you configure the * port, the settings
are applied to all of the ports.
Trusted StateThis field displays whether this port is a trusted port (Trusted) or an
untrusted port (Untrusted).
Trusted ports are connected to DHCP servers or other switches, and the
switch discards DHCP packets from trusted ports only if the rate at which
DHCP packets arrive is too high.
Ethernet Switch CLI Reference Guide
Chapter 6 ARP Inspection Commands
Table 21 show arp inspection interface port-channel (continued)
LABELDESCRIPTION
Rate (pps)This field displays the maximum number for DHCP packets that the switch
receives from each port each second. The switch discards any additional
DHCP packets.
Burst IntervalThis field displays the length of time over which the rate of ARP packets is
monitored for each port. For example, if the Rate is 15 pps and the burst
interval is 1 second, then the switch accepts a maximum of 15 ARP packets
in every one-second interval. If the burst interval is 5 seconds, then the
switch accepts a maximum of 75 ARP packets in every five-second interval.
Ethernet Switch CLI Reference Guide
39
Chapter 6 ARP Inspection Commands
40
Ethernet Switch CLI Reference Guide
CHAPTER 7
Bandwidth Commands
Use these commands to configure the maximum allowable bandwidth for incoming or
outgoing traffic flows on a port.
"Bandwidth management implementation differs across Switch models.
• Some models use a single command (bandwidth-limit ingress) to control the
incoming rate of traffic on a port.
• Other models use two separate commands (bandwidth-limit cir and
bandwidth-limit pir) to control the Committed Information Rate (CIR) and the
Peak Information Rate (PIR) allowed on a port.
The CIR and PIR should be set for all ports that use the same uplink bandwidth. If the CIR
is reached, packets are sent at the rate up to the PIR. When network congestion occurs,
packets through the ingress port exceeding the CIR will be marked for drop.
"The CIR should be less than the PIR.
See Section 7.2 on page 42 and Section 7.3 on page 43 for examples.
See also Chapter 65 on page 227 for information on how to use trTCM (Two Rate Three Color
Marker) to control traffic flow.
7.1 Command Summary
The following table describes user-input values available in multiple commands for this
feature.
Table 22 User-input Values: running-config
COMMANDDESCRIPTION
port-listThe port number or a range of port numbers that you want to configure.
rateThe rate represents a bandwidth limit. Different models support different rate
limiting incremental steps. See your User’s Guide for more information.
Ethernet Switch CLI Reference Guide
41
Chapter 7 Bandwidth Commands
The following section lists the commands for this feature.
show interfaces config <portlist> bandwidth-control
bandwidth-controlEnables bandwidth control on the Switch.C13
no bandwidth-controlDisables bandwidth control on the Switch.C13
interface port-channel <port-list>
bandwidth-limit ingressEnables bandwidth limits for incoming traffic on the port(s).C13
bandwidth-limit ingress
<rate>
bandwidth-limit egressEnables bandwidth limits for outgoing traffic on the port(s).C13
bandwidth-limit egress
<rate>
no bandwidth-limit ingressDisables ingress bandwidth limits on the specified port(s).C13
no bandwidth-limit egressDisables egress bandwidth limits on the specified port(s).C13
bandwidth-limit cirEnables commit rate limits on the specified port(s). C13
bandwidth-limit cir <rate>Sets the guaranteed bandwidth allowed for the incoming
Displays the current settings for interface bandwidth control.E3
Enters subcommand mode for configuring the specified ports. C13
Sets the maximum bandwidth allowed for incoming traffic on
the port(s).
Sets the maximum bandwidth allowed for outgoing traffic on
the port(s).
traffic flow on a port. The commit rate should be less than the
peak rate. The sum of commit rates cannot be greater than or
equal to the uplink bandwidth.
C13
C13
C13
Note: The sum of CIRs cannot be greater than or
equal to the uplink bandwidth.
bandwidth-limit pirEnables peak rate limits on the specified port(s). C13
bandwidth-limit pir <rate>Sets the maximum bandwidth allowed for the incoming traffic
flow on the specified port(s).
no bandwidth-limit cirDisables commit rate limits on the specified port(s).C13
no bandwidth-limit pirDisables peak rate limits on the specified port(s).C13
7.2 Command Examples: ingress
This example sets the outgoing traffic bandwidth limit to 5000 Kbps and the incoming traffic
bandwidth limit to 4000 Kbps for port 1.
This example displays the bandwidth limits configured on port 1.
sysname# show running-config interface port-channel 1 bandwidth-limit
Building configuration...
Current configuration:
interface port-channel 1
bandwidth-limit cir 4000
bandwidth-limit cir
bandwidth-limit pir 5000
bandwidth-limit pir
Ethernet Switch CLI Reference Guide
43
Chapter 7 Bandwidth Commands
44
Ethernet Switch CLI Reference Guide
CHAPTER 8
Broadcast Storm Commands
Use these commands to limit the number of broadcast, multicast and destination lookup failure
(DLF) packets the Switch receives per second on the ports.
"Broadcast storm control implementation differs across Switch models.
• Some models use a single command (bmstorm-limit) to control the combined rate of
broadcast, multicast and DLF packets accepted on Switch ports.
• Other models use three separate commands (broadcast-limit, multicast-limit, dlf-limit) to control the number of individual types of packets accepted on
Switch ports.
See Section 8.2 on page 46 and Section 8.3 on page 46 for examples.
8.1 Command Summary
The following table describes user-input values available in multiple commands for this
feature.
Use these commands to configure the Connectivity Fault Management (CFM) on the Switch.
9.1 CFM Overview
The route between two users may go through aggregated switches, routers and/or DSLAMs
owned by independent organizations. A connectivity fault point generally takes time to
discover and impacts subscribers’ network access. IEEE 802.1ag is a Connectivity Fault
Management (CFM) specification which allows network administrators to identify and
manage connection faults in order to ease management and maintenance. Through discovery
and verification of the path, CFM can detect and analyze connectivity faults in bridged LANs.
The figure shown below is an example of a connection fault between switches in the service
provider’s network. CFM can be used to identify and management this kind of connection
problem.
Figure 1 Connectivity Fault Example
CPE
9.1.1 How CFM Works
CFM sends pro-active Connectivity Check (CC) packets between two CFM-aware devices in
the same MD (Maintenance Domain) network. An MA (Maintenance Association) defines a
VLAN and associated ports on the device under an MD level. In this MA, a port can be an
MEP (Maintenance End Point) port or an MIP (Maintenance Intermediate Point) port.
Service Provider Network
CPE
Ethernet Switch CLI Reference Guide
49
Chapter 9 CFM Commands
• MEP port - has the ability to send pro-active connectivity check (CC) packets and get
other MEP port information from neighbor switches’ CC packets within an MA.
• MIP port - only forwards the CC packets.
CFM provides two tests to discover connectivity faults.
• Loopback test - similar to using “ping” in Microsoft DOS mode to check connectivity
from your computer to a host. In a loopback test, a MEP port sends a LBM (Loop Back
Message) to a MIP port and checks for an LBR (Loop Back Response). If no response is
received, there might be a connectivity fault between them.
• Link trace test - similar to using “tracert” in the Microsoft DOS mode to check
connectivity from your computer to a host. A link trace test provides additional
connectivity fault analysis to get more information on where the fault is. In a link trace
test, a MEP port sends a LTM (Link Trace Message) to a MIP port and checks for an LTR
(Link Trace Response). If an MIP or MEP port does not respond to the source MEP, this
may indicate a fault. Administrators can take further action to check the fault and resume
services according to the line connectivity status report.
An example is shown next. A user cannot access the Internet. To check the problem, the
administrator starts the link trace test from A which is an MEP port to B which is also an MEP
port. Each aggregation MIP port between aggregated devices responds to the LTM packets
and also forwards them to the next port. A fault occurs at port C. A discovers the fault since it
only gets the LTR packets from the ports before port C.
Figure 2 MIP and MEP Example
(port 2, MEP)
A
9.2 CFM Term Definition
This section lists the common term definition which appears in this chapter. Refer to User’s
Guide for more detailed information about CFM.
Table 26 CFM Term Definitions
TERMDESCRIPTION
CFMCFM (Connectivity Fault Management) is used to detect and analyze connectivity
faults in bridged LANs.
MDAn MD (Maintenance Domain) is part of a network, where CFM can be done. The
MAAn MA (Maintenance Association) is a group of MEPs and identified by a VLAN
MD is identified by a level number and contains both MEPs and MIPs. The Switch
supports up to eight MD levels (0 ~ 7) in a network. You can create multiple MDs
on one MD level and multiple MA groups in one MD.
ID. One MA should belong to one and only one MD group.
(port 17, MIP)
C
(port 18, MIP)
(port 8, MEP)
B
50
Ethernet Switch CLI Reference Guide
Chapter 9 CFM Commands
Table 26 CFM Term Definitions
TERMDESCRIPTION
MEPAn MEP (Maintenance End Point) port has the ability to send and reply to the
CCMs, LBMs and LTMs. It also gets other MEP port information from neighbor
switches’ CCMs in an MA.
MIPAn MIP (Maintenance Intermediate Point) port forwards the CCMs, LBMs, and
LTMs and replies the LBMs and LTMs by sending Loop Back Responses (LBRs)
and Link Trace Responses (LTRs).
Connectivity
Check
Loop Back TestLoop Back Test (LBT) checks if an MEP port receives its LBR (Loop Back
Link Trace TestLink Trace Test (LTT) provides additional connectivity fault analysis to get more
Connectivity Check (CC) enables an MEP port sending Connectivity Check
Messages (CCMs) periodically to other MEP ports. An MEP port collects CCMs to
get other MEP information within an MA.
Response) from its target after it sends the LBM (Loop Back Message). If no
response is received, there might be a connectivity fault between them.
information on where the fault is. In the link trace test, MIP ports also send LTR
(Link Trace Response) to response the source MEP port’s LTM (Link Trace
Message). If an MIP or MEP port does not respond to the source MEP, this may
indicate a fault. Administrators can take further action to check and resume
services from the fault according to the line connectivity status report.
9.3 User Input Values
This section lists the common term definition appears in this chapter. Refer to User’s Guide
for more detailed information about CFM.
Table 27 CFM command user input values
USER INPUT DESCRIPTION
mep-idThis is the maintenance endpoint identifier (1~8191).
ma-indexThis is the maintenance association (MA) index number
md-indexThis is the maintenance domain (MD) index number
mac-addressThis is the remote maintenance endpoint’s MAC address or a
(1~4294967295).
(1~4294967295).
virtual MAC address assigned to a port.
A switch has one or two MAC addresses only. If you do not use
virtual MAC addresses with CFM, all CFM ports will use the
Switch’s MAC address and appear as one port. If you want
unique CFM ports, you need to assign virtual MAC addresses. If
you use virtual MAC addresses, make sure that all virtual MAC
addresses are unique in both the switch and the network to which
it belongs.
Ethernet Switch CLI Reference Guide
51
Chapter 9 CFM Commands
9.4 Command Summary
The following section lists the commands for this feature.
Table 28 CFM Command Summary
COMMANDDESCRIPTIONMP
clear ethernet cfm linktraceClears the link trace database.E13
clear ethernet cfm mep-ccmdbClears the MEP CCM database. E13
clear ethernet cfm mip-ccmdbClears the MIP CCM database.E13
clear ethernet cfm mep-defectsClears the MEP-defects database.E13
ethernet cfm Enables CFM on the Switch.C13
ethernet cfm md <md-index> format
<dns|mac|string> name <md-name>
level <0-7>
ethernet cfm ma <ma-index> format
<vid|string|integer> name <ma-name>
md <md-index> primary-vlan <1-4094>
Creates an MD (Maintenance Domain) with the specified
name and level number.
md-name: Enters a domain name, MAC address or a
descriptive name for the MD.
Creates an MA (Maintenance Association) and defines
its VLAN ID under the MD. You can also define the
format which the Switch uses to send this MA information
in the domain (MD).
ma-name: Enters a VLAN ID, a descriptive name or a 2octet integer for the MA.
C13
C13
Note: If you set the format to vid, the VLAN
ID should be the same as the VLAN ID
you use to identify the MA.
remote-mep <mep-id> Sets a remote MEP in an MA.C13
mep <mep-id> interface portchannel <port> direction
<up|down> priority <0-7>
Sets how often an MEP sends a connectivity check
message (CCM).
Sets MHF (MIP Half Function).
Select none and no MIP can be created automatically for
this MA.
Select default to automatically create MIPs for this MA
and on the ports belonging to this MA’s VLAN when there
are no lower configured MD levels or there is an MEP at
the next lower configured MD level on the port.
Select explicit to automatically create MIPs for this
MA and on the ports belonging to this MA’s VLAN only
when there is an MEP at the next lower configured MD
level on the port.
Sets what’s to be included in the sender ID TLV (TypeLength-Value) transmitted by CFM packets.
Select none to not include the sender ID TLV.
Select chassis to include the chassis information.
Select management to include the management
information.
Select chassis-management to include both chassis
and management information.
Sets an MEP in an MA.
up|down: The traffic direction.
0-7: The priority value of the CCMs or LTMs transmitted
by the MEP. 1 is the lowest, then 2, 0 and 3 ~ 7.
C13
C13
C13
C13
52
Ethernet Switch CLI Reference Guide
Chapter 9 CFM Commands
Table 28 CFM Command Summary (continued)
COMMANDDESCRIPTIONMP
mep <mep-id> interface portchannel <port> direction
<up|down> priority <0-7>
inactive
mep <mep-id> interface portchannel <port> direction
<up|down> priority <0-7> ccenable
no remote-mep <mep-id>Deletes a specified destination MEP.C13
no mep <mep-id>Deletes a specified MEP.C13
no mep <mep-id> inactiveEnables an MEP.C13
no mep <mep-id> cc-enableDisallows an MEP sending Connectivity Check
Enables Connectivity Check (CC) to allow an MEP
sending Connectivity Check Messages (CCMs)
periodically to other MEPs.
Messages (CCMs) periodically to other MEPs.
Specifies the remote MEP ID, local MEP ID, MA index
and MD index to perform a loopback test.
This enables the MEP port (with the specified MEP ID) in
a specified CFM domain to send the LBMs (Loop Back
Messages) to a specified remote end point.
You can also define the packet size (from 0 to 1500
bytes) and how many times the Switch sends the LBMs.
Specifies the destination MAC address, local MEP ID,
MA index and MD index to perform a loopback test.
This enables the MEP port (with the specified MEP ID) in
a specified CFM domain to send the LBMs (Loop Back
Messages) to a specified remote end point.
You can also define the packet size (from 0 to 1500
bytes) and how many times the Switch sends the LBMs.
Specifies the remote MEP ID, local MEP ID, MA index
and MD index to perform a link trace test.
This enables the MEP port (with the specified MEP ID) in
a specified CFM domain to send the LTMs (Link Trace
Messages) to a specified remote end point.
mip-ccmdb: Specifies the MIP CCM DB, a database
that stores information (tuples of {Port, VID, MAC
address}) about MEPs in the MD when receiving CCMs.
The MIP CCM DB is used for fault isolation, such as link
trace and loop back. An entry can remains in the MIP
CCM DB for at least 24 hours.
ttl: This is the time-to-live value (the number of
transmissions, 64 hops by default). Sets this to stop a
test once it exceeds the time duration without receiving
any response.
C13
C13
E13
E13
E13
Ethernet Switch CLI Reference Guide
53
Chapter 9 CFM Commands
Table 28 CFM Command Summary (continued)
COMMANDDESCRIPTIONMP
ethernet cfm linktrace mac <macaddress> mep <mep-id> ma <ma-index>
md <md-index> [mip-ccmdb][[ttl
<ttl>]
interface port-channel <port-list> Enters config-interface mode for configuring the specified
ethernet cfm virtual-mac <mac-addr>
no ethernet cfm virtual-macRemoves the virtual MAC address(es) and sets the
no ethernet cfmDisables CFM on the Switch.C13
no ethernet cfm md <md-index>Deletes the specified MD.C13
no ethernet cfm ma <ma-index> md
<md-index>
show ethernet cfm linktraceDisplays the CFM link trace database information.E13
show ethernet cfm localDisplays the detailed settings of the configured MD(s)
show ethernet cfm local stackDisplays a list of all maintenance points, such as MIP
show ethernet cfm local stack mepDisplays a list of the MEP(s).E13
show ethernet cfm local stack mep
<mep-id> ma <ma-index> md <md-index>
show ethernet cfm local stack mep
<mep-id> ma <ma-index> md <md-
index> mep-ccmdb [remote-mep <mepid>]
show ethernet cfm local stack mipDisplays a list of the MIP(s).E13
show ethernet cfm local stack mip
mip-ccmdb
show ethernet cfm remoteDisplays a list of MA(s), MEP(s) and the remote MEP(s)
show ethernet cfm virtual-mac Displays all virtual MAC addresses.E13
show ethernet cfm virtual-mac port
<port-list>
Specifies the destination MAC address, local MEP ID,
MA index and MD index to perform a link trace test.
This enables the MEP port (with the specified MEP ID) in
a specified CFM domain to send the LTMs (Link Trace
Messages) to a specified remote end point.
mip-ccmdb: Specifies the MIP CCM DB, a database
that stores information (tuples of {Port, VID, MAC
address}) about MEPs in the MD when receiving CCMs.
The MIP CCM DB is used for fault isolation, such as link
trace and loop back. An entry can remains in the MIP
CCM DB for at least 24 hours.
ttl: This is the time-to-live value (the number of
transmissions, 64 hops by default). Sets this to stop a
test once it exceeds the time duration without receiving
any response.
port(s).
Assigns a virtual MAC address(es) to the specified
port(s) so that each specified port can have its own MAC
address for CFM.
port(s) to use the default system MAC address.
Deletes an MA from the specified MD.C13
and MA(s).
and MEP.
Displays the specified MEP’s general, fault notification
generator, continuity-check, loopback and link trace
information.
Displays the specified MEP’s MEP-CCM database
information. Each MEP maintains an MEP CCM
database which stores information about remote MEPs
in the MA when receiving CCMs.
Displays the MIP-CCM database.E13
under the configured MD(s).
Displays the MAC address(es) of the specified port(s).E13
E13
C13
C13
C13
E13
E13
E13
E13
E13
54
Ethernet Switch CLI Reference Guide
Chapter 9 CFM Commands
9.5 Command Examples
This example creates MD1 (with MD index 1 and level 1) and MA2 (with MA index 2 and
VLAN ID 2) under MD1 that defines a CFM domain.
sysname# config
sysname(config)# ethernet cfm md 1 format string name MD1 level 1
sysname(config)# ethernet cfm ma 2 format string name MA2 md 1 primaryvlan 2
sysname(config-ma)# exit
sysname(config)# exit
sysname# write memory
"Remember to save new settings using the write memory command.
This example deletes MA2 (with MA index 2) from MD1 (with MD index 1).
sysname# config
sysname(config)# no ethernet cfm ma 2 md 1
sysname(config)# exit
sysname# write mem
This example creates MA3 (with MA index 3 and VLAN ID 123) under MD1, and associates
port 1 as an MEP port with MEP ID 301 in the specified CFM domain. This also sets MHF
(MIP half function) to default to have the Switch automatically create MIPs for this MA and
on the ports belonging to this MA's VLAN when there are no lower configured MD levels or
there is a MEP at the next lower configured MD level on the port. This also sets a remote MEP
in MA3.
sysname# config
sysname(config)# ethernet cfm ma 3 format string name MA3 md 1 primary-vlan
123
sysname(config-ma)# mep 301 interface port-channel 1 direction up priority 2
sysname(config-ma)# mep 301 interface port-channel 1 direction up priority 2
cc-enable
sysname(config-ma)# mhf-creation default
sysname(config-ma)# remote-mep 117
sysname(config-ma)# exit
sysname(config)# exit
sysname# write mem
Ethernet Switch CLI Reference Guide
55
Chapter 9 CFM Commands
This example lists all CFM domains. In this example, only one MD (MD1) is configured. The
MA3 with the associated MEP port 1 is under this MD1.
sysname# show ethernet cfm local
MD Index: 1
MD Name: MD1(string)
MD Level: 1
MA Index: 3
MA Name: MA3(string)
Primary Vlan: 123
CC Interval: 1000 millisecond(s)
MHF Creation: default
ID Permission: none
MEP:301 (ACTIVE ) Port:1 Direction:DOWN Priority:5 CC-Enable:FALSE
sysname#
This example starts a loopback test and displays the test result on the console.
sysname# ethernet cfm loopback remote-mep 2 mep 1 ma 1 md 1
Sending 5 Ethernet CFM Loopback messages to remote-mepid 2, timeout is 5
seconds .....
sysname# Loopback: Successful
Success rate is 100 percent, round-trip min/avg/max = 0/0/0 ms
sysname#
This example displays all neighbors’ MEP port information in the MIP-CCM databases.
sysname# show ethernet cfm local stack mip mip-ccmdb
MIP CCM DB
Port VID Source Address Retained
The following table describes the labels in this screen.
Table 29 show cfm-action mipccmdb
LABELDESCRIPTION
PortDisplays the number of the port on which this CCM was received.
VIDDisplays the MA VLAN ID of the last received CCM.
Source AddressDisplays the MAC address of the remote MEP.
RetainedDisplays how long an entry has been kept in the database.
56
Ethernet Switch CLI Reference Guide
Chapter 9 CFM Commands
This example assigns a virtual MAC address to port 3 and displays the MAC addresses of the
ports 2 ~ 4. The assigned virtual MAC address should be unique in both the Switch and the
network to which it belongs.
sysname# config
sysname(config)# interface port-channel 3
sysname(config-interface)# ethernet cfm virtual-mac 00:19:cb:12:34:56
sysname(config-interface)# exit
sysname(config)# exit
sysname# show ethernet cfm virtual-mac port 2-4
Virtual MACPort MAC
Use these commands to classify packets into traffic flows. After classifying traffic, policy
commands (Chapter 46 on page 175) can be used to ensure that a traffic flow gets the
requested treatment in the network.
10.1 Command Summary
The following section lists the commands for this feature.
Table 30 Command Summary: classifier
COMMANDDESCRIPTIONMP
show classifier [<name>]Displays classifier configuration details.E3
no classifier <name> inactiveEnables a classifier. C13
Configures a classifier. Specify the parameters to identify the
traffic flow:
ethernet-type - enter one of the Ethernet types or type the
hexadecimal number that identifies an Ethernet type (see
Table 31 on page 60)
ip-protocol : enter one of the protocols or type the port
number that identifies the protocol (see Table 32 on page 60)
establish-only : enter this to identify only TCP packets
used to establish TCP connections.
source-socket : (for UDP or TCP protocols only) specify
the protocol port number.
destination-socket : (for UDP or TCP protocols only)
specify the protocol port number.
inactive : disables this classifier.
If you delete a classifier you cannot use policy rule related
information.
C13
C13
Ethernet Switch CLI Reference Guide
59
Chapter 10 Classifier Commands
The following table shows some other common Ethernet types and the corresponding protocol
number.
Table 31 Common Ethernet Types and Protocol Number
ETHERNET TYPEPROTOCOL NUMBER
IP ETHII 0800
X.75 Internet 0801
NBS Internet 0802
ECMA Internet 0803
Chaosnet 0804
X.25 Level 3 0805
XNS Compat 0807
Banyan Systems 0BAD
BBN Simnet 5208
IBM SNA 80D5
AppleTalk AARP 80F3
In an IPv4 packet header, the “Protocol” field identifies the next level protocol. The following
table shows some common IPv4 protocol types and the corresponding protocol number. Refer
to http://www.iana.org/assignments/protocol-numbers for a complete list.
Table 32 Common IPv4Protocol Types and Protocol Numbers
PROTOCOL TYPEPROTOCOL NUMBER
ICMP1
TCP6
UDP17
EGP8
L2TP115
10.2 Command Examples
This example creates a classifier for packets with a VLAN ID of 3. The resulting traffic flow is
identified by the name VLAN3. The policy command can use the name VLAN3 to apply
policy rules to this traffic flow. See the policy example in Chapter 46 on page 175.
sysname# config
sysname(config)# classifier VLAN3 vlan 3
sysname(config)# exit
sysname# show classifier
Index Active Name Rule
1 Yes VLAN3 VLAN = 3;
60
Ethernet Switch CLI Reference Guide
Chapter 10 Classifier Commands
This example creates a classifier (Class1) for packets which have a source MAC address of
11:22:33:45:67:89 and are received on port 1. You can then use the policy command and
the name Class1 to apply policy rules to this traffic flow. See the policy example in Chapter 46
on page 175.
sysname# config
sysname(config)# classifier Class1 source-mac 11:22:33:45:67:89 source-port
1
sysname(config)# exit
sysname# show classifier
Index Active Name Rule
1 Yes Class1 SrcMac = 11:22:33:45:67:89; S...
Ethernet Switch CLI Reference Guide
61
Chapter 10 Classifier Commands
62
Ethernet Switch CLI Reference Guide
CHAPTER 11
Cluster Commands
Use these commands to configure cluster management.
11.1 Command Summary
The following section lists the commands for this feature.
Table 33 cluster Command Summary
COMMANDDESCRIPTIONMP
show clusterDisplays cluster management status.E3
cluster <vlan-id>Enables clustering in the specified VLAN group.C13
no clusterDisables cluster management on the Switch.C13
cluster name <cluster name>Sets a descriptive name for the cluster.
<cluster name>: You may use up to 32 printable
characters (spaces are allowed).
show cluster candidatesDisplays the switches that are potential cluster members. The
cluster member <mac> password
<password>
show cluster memberDisplays the cluster member(s) and their running status.E3
show cluster member configDisplays the current cluster member(s).E3
show cluster member mac <mac>Displays the running status of the cluster member(s).E3
cluster rcommand <mac>Logs into the CLI of the specified cluster member.C13
no cluster member <mac>Removes the cluster member.C13
switches must be directly connected.
Adds the specified device to the cluster. You have to specify
the password of the device too.
C13
E3
C13
Ethernet Switch CLI Reference Guide
63
Chapter 11 Cluster Commands
11.2 Command Examples
This example creates the cluster CManage in VLAN 1. Then, it looks at the current list of
candidates for membership in this cluster and adds two switches to cluster.
sysname# configure
sysname(config)# cluster 1
sysname(config)# cluster name CManage
sysname(config)# exit
sysname# show cluster candidates
Clustering Candidates:
Index Candidates(MAC/HostName/Model)
0 00:13:49:00:00:01/ES-2108PWR/ES-2108PWR
1 00:13:49:00:00:02/GS-3012/GS-3012
2 00:19:cb:00:00:02/ES-3124/ES-3124
sysname# configure
sysname(config)# cluster member 00:13:49:00:00:01 password 1234
sysname(config)# cluster member 00:13:49:00:00:02 password 1234
sysname(config)# exit
sysname# show cluster member
Clustering member status:
Index MACAddr Name Status
1 00:13:49:00:00:01 ES-2108PWR Online
2 00:13:49:00:00:02 GS-3012 Online
The following table describes the labels in this screen.
Table 34 show cluster member
LABELDESCRIPTION
IndexThis field displays an entry number for each member.
MACAddrThis field displays the member’s MAC address.
NameThis field displays the member’s system name.
StatusThis field displays the current status of the member in the cluster.
Online: The member is accessible.
Error: The member is connected but not accessible. For example, the
member’s password has changed, or the member was set as the manager
and so left the member list. This status also appears while the Switch
finishes adding a new member to the cluster.
Offline: The member is disconnected. It takes approximately 1.5 minutes
after the link goes down for this status to appear.
64
Ethernet Switch CLI Reference Guide
Chapter 11 Cluster Commands
This example logs in to the CLI of member 00:13:49:00:00:01, looks at the current firmware
version on the member switch, logs out of the member’s CLI, and returns to the CLI of the
manager.
sysname# configure
sysname(config)# cluster rcommand 00:13:49:00:00:01
Connected to 127.0.0.2
Escape character is '^]'.
The following section lists the commands for this feature.
Table 37 time Command Summary
COMMANDDESCRIPTIONMP
show timeDisplays current system time and date.E3
time <hour:min:sec>Sets the current time on the Switch.
hour: 0-23
min: 0-59
sec: 0-59
Note: If you configure Daylight Saving Time
after you configure the time, the Switch
will apply Daylight Saving Time.
time date <month/day/year>Sets the current date on the Switch.
month: 1-12
day: 1-31
year: 1970-2037
time timezone <-1200|...|1200>Selects the time difference between UTC (formerly
known as GMT) and your time zone.
time daylight-saving-timeEnables daylight saving time. The current time is
updated if daylight saving time has started.
C13
C13
C13
C13
Ethernet Switch CLI Reference Guide
67
Chapter 12 Date and Time Commands
Table 37 time Command Summary (continued)
COMMANDDESCRIPTIONMP
time daylight-saving-time startdate <week> <day> <month> <o’clock>
time daylight-saving-time end-date
<week> <day> <month> <o’clock>
no time daylight-saving-timeDisables daylight saving on the Switch.C13
time daylight-saving-time helpProvides more information about the specified command. C13
Sets the day and time when Daylight Saving Time starts.
In most parts of the United States, Daylight Saving Time
starts on the second Sunday of March at 2 A.M. local
time. In the European Union, Daylight Saving Time starts
on the last Sunday of March at 1 A.M. GMT or UTC, so
the o’clock field depends on your time zone.
Sets the day and time when Daylight Saving Time ends.
In most parts of the United States, Daylight Saving Time
ends on the first Sunday of November at 2 A.M. local
time. In the European Union, Daylight Saving Time ends
on the last Sunday of October at 1 A.M. GMT or UTC, so
the o’clock field depends on your time zone.
C13
C13
Table 38 timesync Command Summary
COMMANDDESCRIPTIONMP
show timesyncDisplays time server information.E3
timesync server <ip>Sets the IP address of your time server. The Switch
synchronizes with the time server in the following
situations:
•When the Switch starts up.
•Every 24 hours after the Switch starts up.
•When the time server IP address or protocol is
updated.
timesync <daytime|time|ntp>Sets the time server protocol. You have to configure a
time server before you can specify the protocol.
no timesyncDisables timeserver settings.C13
C13
C13
12.2 Command Examples
This example sets the current date, current time, time zone, and daylight savings time.
sysname# configure
sysname(config)# time date 06/04/2007
sysname(config)# time timezone -600
sysname(config)# time daylight-saving-time
sysname(config)# time daylight-saving-time start-date second Sunday
--> March 2
sysname(config)# time daylight-saving-time end-date first Sunday
--> November 2
sysname(config)# time 13:24:00
sysname(config)# exit
sysname# show time
Current Time 13:24:03 (UTC-05:00 DST)
Current Date 2007-06-04
68
Ethernet Switch CLI Reference Guide
Chapter 12 Date and Time Commands
This example looks at the current time server settings.
sysname# show timesync
Time Configuration
---------------------------- Time Zone :UTC -600
Time Sync Mode :USE_DAYTIME
Time Server IP Address :172.16.37.10
Time Server Sync Status:CONNECTING
The following table describes the labels in this screen.
Table 39 show timesync
LABELDESCRIPTION
Time ZoneThis field displays the time zone.
Time Sync ModeThis field displays the time server protocol the Switch uses. It displays
NO_TIMESERVICE if the time server is disabled.
Time Server IP AddressThis field displays the IP address of the time server.
Time Server Sync Status This field displays the status of the connection with the time server.
NONE: The time server is disabled.
CONNECTING: The Switch is trying to connect with the specified time
server.
OK: Synchronize with time server done.
FAIL: Synchronize with time server fail.
Ethernet Switch CLI Reference Guide
69
Chapter 12 Date and Time Commands
70
Ethernet Switch CLI Reference Guide
CHAPTER 13
DHCP Commands
Use these commands to configure DHCP features on the Switch.
• Use the dhcp relay commands to configure DHCP relay for specific VLAN.
• Use the dhcp smart-relay commands to configure DHCP relay for all broadcast
domains.
• Use the dhcp server commands to configure the Switch as a DHCP server. (This
command is available on a layer 3 switch only.)
13.1 Command Summary
The following section lists the commands for this feature.
Table 40 dhcp smart-relay Command Summary
COMMANDDESCRIPTIONMP
show dhcp smart-relayDisplays global DHCP relay settings.E3
dhcp smart-relayEnables DHCP relay for all broadcast domains on the Switch.
C13
Note: You have to disable dhcp relay before
you can enable dhcp smart-relay.
no dhcp smart-relayDisables global DHCP relay settings.C13
Enables DHCP relay on the specified VLAN and sets the IP
address of up to 3 DHCP servers. Optionally, sets the Switch
to add relay agent information and system name.
Note: You have to configure the VLAN before you
C13
configure a DHCP relay for the VLAN. You
have to disable dhcp smart-relay
before you can enable dhcp relay.
no dhcp relay <vlan-id>Disables DHCP relay.C13
no dhcp relay <vlan-id>
information
no dhcp relay <vlan-id> optionDisables the relay agent information option 82.C13
Table 42 dhcp relay-broadcast Command Summary
COMMANDDESCRIPTIONMP
dhcp relay-broadcastThe broadcast behavior of DHCP packets will not be
no dhcp relay-broadcastThe Switch terminates the broadcast behavior of DHCP
System name is not appended to option 82 information field.C13
C13
terminated by the Switch.
C13
packets.
Table 43 dhcp server Command Summary
COMMANDDESCRIPTIONMP
dhcp server <vlan-id> startingaddress <ip-addr> <subnet-mask>
size-of-client-ip-pool <1-253>
In this example, there are two VLANs (VIDs 1 and 2) in a campus network. Two DHCP
servers are installed to serve each VLAN. The Switch forwards DHCP requests from the
dormitory rooms (VLAN 1) to the DHCP server with IP address 192.168.1.100. DHCP
requests from the academic buildings (VLAN 2) are sent to the other DHCP server with IP
address 172.16.10.100.
Ethernet Switch CLI Reference Guide
73
Chapter 13 DHCP Commands
Figure 4 Example: DHCP Relay for Two VLANs
VLAN 1
DHCP:
192.168.1.100
VLAN 2
DHCP:
172.16.10.100
This example shows how to configure these DHCP servers. The VLANs are already
configured.
In this example, the Switch is a DHCP server for clients on VLAN 1 and VLAN 2. The DHCP
clients in VLAN 1 are assigned IP addresses in the range 192.168.1.100 to 192.168.1.200 and
clients on VLAN 2 are assigned IP addresses in the range 172.16.1.30 to 172.16.1.130.
Figure 5 Example: DHCP Relay for Two VLANs
DHCP Pool:
192.168.1.100-192.168.1.200
DHCP Pool:
172.16.1.30-172.16.1.130
74
VLAN 1
VLAN 2
This example shows how to configure the DHCP server for VLAN 1 with the configuration
shown in Figure 5 on page 74. It also provides the DHCP clients with the IP address of the
default gateway and the DNS server.
sysname# configure
sysname(config)# dhcp server 1 starting-address 192.168.1.100
Use the dhcp snooping commands to configure the DHCP snooping on the Switch and the
dhcp vlan commands to specify a DHCP VLAN on your network. DHCP snooping filters
unauthorized DHCP packets on the network and builds the binding table dynamically.
14.1 Command Summary
The following section lists the commands for this feature.
Table 44 dhcp snooping Command Summary
COMMANDDESCRIPTIONMP
show dhcp snoopingDisplays DHCP snooping configuration on the Switch.E3
show dhcp snooping bindingDisplays the DHCP binding table.E3
show dhcp snooping databaseDisplays DHCP snooping database update statistics and
settings.
show dhcp snooping database
detail
dhcp snoopingEnables DHCP Snooping on the Switch.C13
no dhcp snoopingDisables DHCP Snooping on the Switch.C13
dhcp snooping database <tftp://host/filename>
no dhcp snooping database Removes the location of the DHCP snooping database. C13
dhcp snooping database timeout
<seconds>
no dhcp snooping database
timeout <seconds>
dhcp snooping database writedelay <seconds>
no dhcp snooping database writedelay <seconds>
Displays DHCP snooping database update statistics in full
detail form.
Specifies the location of the DHCP snooping database. The
location should be expressed like this: tftp://{domain name or IP address}/directory, if applicable/file name; for
example, tftp://192.168.10.1/database.txt.
Specifies how long (10-65535 seconds) the Switch tries to
complete a specific update in the DHCP snooping database
before it gives up.
Resets how long (10-65535 seconds) the Switch tries to
complete a specific update in the DHCP snooping database
before it gives up to the default value (300).
Specifies how long (10-65535 seconds) the Switch waits to
update the DHCP snooping database the first time the current
bindings change after an update.
Resets how long (10-65535 seconds) the Switch waits to
update the DHCP snooping database the first time the current
bindings change after an update to the default value (300).
dhcp snooping trustSets this port as a trusted DHCP snooping port. Trusted ports
dhcp snooping limit rate
<pps>
no dhcp snooping trustDisables this port from being a trusted port for DHCP
no dhcp snooping limit rateResets the DHCP snooping rate to the default (0).C13
Specifies the VLAN IDs for VLANs you want to disable DHCP
snooping on.
Sets the Switch to add the system name to DHCP requests
that it broadcasts to the DHCP VLAN, if specified, or VLAN.
Sets the Switch to not add the system name to DHCP
requests that it broadcasts to the DHCP VLAN, if specified, or
VLAN.
Sets the Switch to add the slot number, port number and
VLAN ID to DHCP requests that it broadcasts to the DHCP
VLAN, if specified, or VLAN.
Sets the Switch to not add the slot number, port number and
VLAN ID to DHCP requests that it broadcasts to the DHCP
VLAN, if specified, or VLAN.
Delete all statistics records of DHCP requests going through
the Switch.
database.
Loads dynamic bindings from the specified DHCP snooping
database.
Enables a port or a list of ports for configuration.C13
are connected to DHCP servers or other switches, and the
Switch discards DHCP packets from trusted ports only if the
rate at which DHCP packets arrive is too high.
Sets the maximum rate in packets per second (pps) that
DHCP packets are allowed to arrive at a trusted DHCP
snooping port.
snooping.
C13
C13
C13
C13
C13
C13
E13
E13
E13
C13
C13
C13
The following table describes the dhcp-vlan commands.
Table 45 dhcp-vlan Command Summary
COMMANDDESCRIPTIONMP
dhcp dhcp-vlan <vlan-id>Specifies the VLAN ID of the DHCP VLAN.C13
no dhcp dhcp-vlanDisables DHCP VLAN on the Switch.C13
14.2 Command Examples
This example:
• Enables DHCP snooping Switch.
• Sets up an external DHCP snooping database on a network server with IP address
172.16.37.17.
76
Ethernet Switch CLI Reference Guide
Chapter 14 DHCP Snooping & DHCP VLAN Commands
• Enables DHCP snooping on VLANs 1,2,3,200 and 300.
• Sets the Switch to add the slot number, port number and VLAN ID to DHCP requests that
it broadcasts to the DHCP VLAN.
• Sets the maximum number of DHCP packets that can be received on ports 1 - 5 to 100
packets per second.
• Configures a DHCP VLAN with a VLAN ID 300.
• Displays DHCP snooping configuration details.
sysname(config)# dhcp snooping
sysname(config)# dhcp snooping database tftp://172.16.37.17/
snoopdata.txt
sysname(config)# dhcp snooping vlan 1,2,3,200,300
sysname(config)# dhcp snooping vlan 1,2,3,200,300 option
sysname(config)# interface port-channel 1-5
sysname(config-interface)# dhcp snooping trust
sysname(config-interface)# dhcp snooping limit rate 100
sysname(config-interface)# exit
sysname(config)# dhcp dhcp-vlan 300
sysname(config)# exit
sysname# show dhcp snooping
Switch DHCP snooping is enabled
DHCP Snooping is configured on the following VLANs:
1-3,200,300
Option 82 is configured on the following VLANs:
1-3,200,300
Appending system name is configured on the following VLANs:
DHCP VLAN is enabled on VLAN 300
Interface Trusted Rate Limit (pps)
--------- ------- --------------- 1 yes 100
2 yes 100
3 yes 100
4 yes 100
5 yes 100
6 no unlimited
7 no unlimited
8 no unlimited
Ethernet Switch CLI Reference Guide
77
Chapter 14 DHCP Snooping & DHCP VLAN Commands
78
Ethernet Switch CLI Reference Guide
CHAPTER 15
DiffServ Commands
Use these commands to configure Differentiated Services (DiffServ) on the Switch.
15.1 Command Summary
The following section lists the commands for this feature.
Table 46 diffserv Command Summary
COMMANDDESCRIPTIONMP
show diffservDisplays general DiffServ settings.E3
diffservEnables DiffServ on the Switch.C13
no diffservDisables DiffServ on the Switch.C13
diffserv dscp <0-63> priority
<0-7>
interface port-channel <port-list>
diffservEnables DiffServ on the port(s).C13
no diffservDisables DiffServ on the port(s).C13
Sets the DSCP-to-IEEE 802.1q mappings.C13
Enters config-interface mode for the specified port(s).C13
Ethernet Switch CLI Reference Guide
79
Chapter 15 DiffServ Commands
80
Ethernet Switch CLI Reference Guide
CHAPTER 16
DVMRP Commands
This chapter explains how to use commands to activate the Distance Vector Multicast Routing
Protocol (DVMRP) on the Switch.
16.1 DVMRP Overview
DVMRP (Distance Vector Multicast Routing Protocol) is a protocol used for routing multicast
data. DVMRP is used when a router receives multicast traffic and it wants to find out if other
multicast routers it is connected to need to receive the data. DVMRP sends the data to all
attached routers and waits for a reply. Routers which do not need to receive the data (do not
have multicast group member connected) return a “prune” message, which stops further
multicast traffic for that group from reaching the router.
16.2 Command Summary
The following section lists the commands for this feature.
Table 47 Command Summary: DVMRP
COMMANDDESCRIPTIONMP
show ip dvmrp groupDisplays DVMRP group information. E3
show ip dvmrp interfaceDisplays DVMRP interface information. E3
show ip dvmrp neighborDisplays DVMRP neighbor information. E3
show ip dvmrp pruneDisplays the DVMRP prune information. E3
show ip dvmrp routeDisplays the DVMRP routes. E3
show router dvmrpDisplays DVMRP settings. E3
router dvmrpEnables and enters the DVMRP
configuration mode.
exitLeaves the DVMRP configuration mode.C13
threshold <ttl-value>Sets the DVMRP threshold value. Multicast
packets with TTL (Time-To-Live) value
lower than the threshold are not forwarded
by the Switch.
no router dvmrpDisables DVMRP on the Switch. C13
interface route-domain <ip-address>/<mask-bits>
Enters the configuration mode for this
routing domain.
C13
C13
C13
Ethernet Switch CLI Reference Guide
81
Chapter 16 DVMRP Commands
Table 47 Command Summary: DVMRP (continued)
COMMANDDESCRIPTIONMP
ip dvmrpActivates this routing domain in
participating in DVMRP.
no ip dvmrpDisables this routing domain from
participating in DVMRP.
C13
C13
16.3 Command Examples
In this example, the Switch is configured to exchange DVMRP information with other
DVMRP enabled routers as shown next. The Switch is a DVMRP router (C). DVMRP is
activated on IP routing domains 10.10.10.1/24 and 172.16.1.1/24 so that it can exchange
DVMRP information with routers A and B.
Figure 6 DVMRP Network Example
B
D
E
10.10.10.254
A
172.16.1.254
C
• Enables IGMP and DVMRP on the Switch.
• Enables DVMRP on the following routing domains: 10.10.10.1/24, 172.16.1.1/24.
• Displays DVMRP settings configured on the Switch.
Use these commands to use the link monitoring protocol IEEE 802.3ah Link Layer Ethernet
OAM (Operations, Administration and Maintenance).
17.1 IEEE 802.3ah Link Layer Ethernet OAM Implementation
Link layer Ethernet OAM (Operations, Administration and Maintenance) as described in IEEE
802.3ah is a link monitoring protocol. It utilizes OAM Protocol Data Units or OAM PDU’s to
transmit link status information between directly connected Ethernet devices. Both devices
must support IEEE 802.3ah. Because link layer Ethernet OAM operates at layer two of the
OSI (Open Systems Interconnection Basic Reference) model, neither IP or SNMP are
necessary to monitor or troubleshoot network connection problems.
The Switch supports the following IEEE 802.3ah features:
• Discovery - this identifies the devices on each end of the Ethernet link and their OAM
configuration.
• Remote Loopback - this can initiate a loopback test between Ethernet devices.
17.2 Command Summary
The following section lists the commands for this feature.
Table 48 ethernet oam Command Summary
COMMANDDESCRIPTIONMP
show ethernet oam discovery
<port-list>
show ethernet oam statistics
<port-list>
show ethernet oam summaryDisplays the configuration details of each OAM activated port. E3
ethernet oamEnables Ethernet OAM on the Switch.C13
no ethernet oamDisables Ethernet OAM on the Switch.C13
ethernet oam remote-loopback
start <port>
ethernet oam remote-loopback
stop <port>
Displays OAM configuration details and operational status of
the specified ports.
Displays the number of OAM packets transferred for the
specified ports.
Initiates a remote-loopback test from the specified port by
sending Enable Loopback Control PDUs to the remote
device.
Terminates a remote-loopback test from the specified port by
sending Disable Loopback Control PDUs to the remote
device.
E3
E3
E13
E13
Ethernet Switch CLI Reference Guide
83
Chapter 17 Ethernet OAM Commands
Table 48 ethernet oam Command Summary (continued)
COMMANDDESCRIPTIONMP
ethernet oam remote-loopback
test <port> [<number-of-packets>
[<packet-size>]]
interface port-channel <port-list>
ethernet oamEnables Ethernet OAM on the port(s).C13
no ethernet oamDisables Ethernet OAM on the port(s).C13
ethernet oam mode
<active|passive>
ethernet oam remote-loopback
ignore-rx
ethernet oam remote-loopback
supported
no ethernet oam remoteloopback ignore-rx
no ethernet oam remoteloopback supported
no ethernet oam modeResets the OAM mode to the default value.C13
Performs a remote-loopback test from the specified port. You
can also define the allowable packet number and packet size
of the loopback test frames.
Enters config-interface mode for the specified port(s).C13
Specifies the OAM mode on the ports.
active: Allows the port to issue and respond to Ethernet
OAM commands.
passive: Allows the port to respond to Ethernet OAM
commands.
Sets the Switch to ignore loopback commands received on
the ports.
Enables the remote loopback feature on the ports.C13
Sets the Switch to process loopback commands received on
the ports.
Disables the remote loopback feature on the ports.C13
E13
C13
C13
C13
17.3 Command Examples
This example enables Ethernet OAM on port 7 and sets the mode to active.
This example performs Ethernet OAM discovery from port 7.
sysname# show ethernet oam discovery 7
Port 7
Local client
----------- OAM configurations:
Mode : Active
Unidirectional : Not supported
Remote loopback : Not supported
Link events : Not supported
Variable retrieval: Not supported
Max. OAMPDU size : 1518
Operational status:
Link status : Down
Info. revision : 3
Parser state : Forward
Discovery state : Active Send Local
The following table describes the labels in this screen.
Table 49 show ethernet oam discovery
LABELDESCRIPTION
OAM configurationsThe remote device uses this information to determine what functions are
supported.
ModeThis field displays the OAM mode. The device in active mode (typically the
service provider's device) controls the device in passive mode (typically the
subscriber's device).
Active: The Switch initiates OAM discovery; sends information PDUs; and
may send event notification PDUs, variable request/response PDUs, or
loopback control PDUs.
Passive: The Switch waits for the remote device to initiate OAM discovery;
sends information PDUs; may send event notification PDUs; and may
respond to variable request PDUs or loopback control PDUs.
The Switch might not support some types of PDUs, as indicated in the
fields below.
UnidirectionalThis field indicates whether or not the Switch can send information PDUs to
Remote loopbackThis field indicates whether or not the Switch can use loopback control
Link eventsThis field indicates whether or not the Switch can interpret link events, such
Variable retrievalThis field indicates whether or not the Switch can respond to requests for
Max. OAMPDU sizeThis field displays the maximum size of PDU for receipt and delivery.
Operational status
Link statusThis field indicates that the link is up or down.
transmit fault information when the receive path is non-operational.
PDUs to put the remote device into loopback mode.
as link fault and dying gasp. Link events are sent in event notification PDUs
and indicate when the number of errors in a given interval (time, number of
frames, number of symbols, or number of errored frame seconds) exceeds
a specified threshold. Organizations may create organization-specific link
event TLVs as well.
more information, such as requests for Ethernet counters and statistics,
about link events.
Ethernet Switch CLI Reference Guide
85
Chapter 17 Ethernet OAM Commands
Table 49 show ethernet oam discovery (continued)
LABELDESCRIPTION
Info. revisionThis field displays the current version of local state and configuration. This
Parser stateThis field indicates the current state of the parser.
Discovery stateThis field indicates the state in the OAM discovery process. OAM-enabled
two-octet value starts at zero and increments every time the local state or
configuration changes.
Forward: The packet is forwarding packets normally.
Loopback: The Switch is in loopback mode.
Discard: The Switch is discarding non-OAMPDUs because it is trying to or
has put the remote device into loopback mode.
devices use this process to detect each other and to exchange information
about their OAM configuration and capabilities. OAM discovery is a
handshake protocol.
Fault: One of the devices is transmitting OAM PDUs with link fault
information, or the interface is not operational.
Active Send Local: The Switch is in active mode and is trying to see if the
remote device supports OAM.
Passive Wait: The Switch is in passive mode and is waiting for the remote
device to begin OAM discovery.
Send Local Remote: This state occurs in the following circumstances.
•The Switch has discovered the remote device but has not accepted or
rejected the connection yet.
•The Switch has discovered the remote device and rejected the
connection.
Send Local Remote OK: The Switch has discovered the remote device
and has accepted the connection. In addition, the remote device has not
accepted or rejected the connection yet, or the remote device has rejected
the connected.
Send Any: The Switch and the remote device have accepted the
connection. This is the operating state for OAM links that are fully
operational.
This example looks at the number of OAM packets transferred on port 1.
sysname# show ethernet oam statistics 1
Port 1
Statistics:
The following table describes the labels in this screen.
Table 50 show ethernet oam statistics
LABELDESCRIPTION
Information OAMPDU Tx This field displays the number of OAM PDUs sent on the port.
Information OAMPDU Rx This field displays the number of OAM PDUs received on the port.
Event Notification
OAMPDU Tx
Event Notification
OAMPDU Rx
Loopback Control
OAMPDU Tx
Loopback Control
OAMPDU Rx
Variable Request
OAMPDU Tx
Variable Request
OAMPDU Rx
Variable Response
OAMPDU Tx
Variable Response
OAMPDU Rx
Unsupported OAMPDU TxThis field displays the number of unsupported OAM PDUs sent on the port.
This field displays the number of unique or duplicate OAM event notification
PDUs sent on the port.
This field displays the number of unique or duplicate OAM event notification
PDUs received on the port.
This field displays the number of loopback control OAM PDUs sent on the
port.
This field displays the number of loopback control OAM PDUs received on
the port.
This field displays the number of OAM PDUs sent to request MIB objects
on the remote device.
This field displays the number of OAM PDUs received requesting MIB
objects on the Switch.
This field displays the number of OAM PDUs sent by the Switch in
response to requests.
This field displays the number of OAM PDUs sent by the remote device in
response to requests.
Unsupported OAMPDU RxThis field displays the number of unsupported OAM PDUs received on the
port.
This example looks at the configuration of ports on which OAM is enabled.
sysname# show ethernet oam summary
OAM Config: U : Unidirection, R : Remote Loopback
L : Link Events , V : Variable Retrieval
Local Remote
------------- ----------------------------------------Port Mode MAC Addr OUI Mode Config
----- ------- ----------------- ------ ------- -------1 Active
The following table describes the labels in this screen.
Table 51 show ethernet oam summary
LABELDESCRIPTION
LocalThis section displays information about the ports on the Switch.
PortThis field displays the port number.
ModeThis field displays the operational state of the port.
RemoteThis section displays information about the remote device.
MAC AddrThis field displays the MAC address of the remote device.
Ethernet Switch CLI Reference Guide
87
Chapter 17 Ethernet OAM Commands
Table 51 show ethernet oam summary (continued)
LABELDESCRIPTION
OUIThis field displays the OUI (first three bytes of the MAC address) of the
ModeThis field displays the operational state of the remote device.
ConfigThis field displays the capabilities of the Switch and remote device. THe
remote device.
capabilities are identified in the OAM Config section.
88
Ethernet Switch CLI Reference Guide
CHAPTER 18
GARP Commands
Use these commands to configure GARP.
18.1 GARP Overview
Switches join VLANs by making a declaration. A declaration is made by issuing a Join
message using GARP. Declarations are withdrawn by issuing a Leave message. A Leave All
message terminates all registrations. GARP timers set declaration timeout values.
18.2 Command Summary
The following section lists the commands for this feature.
Configures GARP time settings (in milliseconds), including
the join, leave and leave all timers for each port. Leave Time
must be at least two times larger than Join Timer, and Leave
All Timer must be larger than Leave Timer.
C13
Ethernet Switch CLI Reference Guide
89
Chapter 18 GARP Commands
18.3 Command Examples
In this example, the administrator looks at the Switch’s GARP timer settings and decides to
change them. The administrator sets the Join Timer to 300 milliseconds, the Leave Timer to
800 milliseconds, and the Leave All Timer to 11000 milliseconds.
Sessions:
Remote IP Port Local IP Port SSL bytes Sock bytes
The following table describes the labels in this screen.
Table 55 show https
LABELDESCRIPTION
Configuration
VersionThis field displays the current version of SSL (Secure Sockets Layer) and
Maximum session
number
Maximum cache number This field displays the maximum number of entries in the cache table the
Cache timeoutThis field displays how long entries remain in the cache table before they
Support ciphersThis field displays the SSL or TLS cipher suites the Switch supports for
Statistics
Total connectsThis field displays the total number of HTTPS connections since the Switch
Current connectsThis field displays the current number of HTTPS connections.
TLS (Transport Layer Security).
This field displays the maximum number of HTTPS sessions the Switch
supports.
Switch supports for HTTPS sessions.
expire.
HTTPS sessions. The cipher suites are identified by their OpenSSL
equivalent names. If the name does not include the authentication used,
assume RSA authentication. See SSL v2.0, SSL v3.0, TLS v1.0, and RFC
3268 for more information.
started up.
96
Ethernet Switch CLI Reference Guide
Chapter 20 HTTPS Server Commands
Table 55 show https (continued)
LABELDESCRIPTION
Connects that finishedThis field displays the number of HTTPS connections that have finished.
Renegotiate requestedThis field displays the number of times the Switch requested clients to
Session cache itemsThis field displays the current number of items in cache.
Session cache hitsThis field displays the number of times the Switch used cache to satisfy a
Session cache missesThis field displays the number of times the Switch could not use cache to
Session cache timeoutsThis field displays the number of items that have expired in the cache.
Sessions
Remote IPThis field displays the client’s IP address in this session.
PortThis field displays the client’s port number in this session.
Local IPThis field displays the Switch’s IP address in this session.
PortThis field displays the Switch’s port number in this session.
SSL bytesThis field displays the number of bytes encrypted or decrypted by the
Sock bytesThis field displays the number of bytes encrypted or decrypted by the
Displays port authentication settings on the specified port(s).E3
Enables 802.1x authentication on the specified port(s).C13
Disables authentication on the listed ports.C13
Sets a subscriber to periodically re-enter his or her username
and password to stay connected to a specified port.
Disables the re-authentication mechanism on the listed
port(s).
Specifies how often (in seconds) a client has to re-enter the
username and password to stay connected to the specified
port(s).
C13
C13
C13
21.2 Command Examples
This example configures the Switch in the following ways:
Ethernet Switch CLI Reference Guide
99
Chapter 21 IEEE 802.1x Authentication Commands
1 Specifies RADIUS server 1 with IP address 10.10.10.1, port 1890 and the string
secretKey as the password.
2 Specifies the timeout period of 30 seconds that the Switch will wait for a response from
the RADIUS server.
3 Enables port authentication on the Switch.
4 Enables port authentication on ports 4 to 8.
5 Activates reauthentication on ports 4-8.
6 Specifies 1800 seconds as the interval for client reauthentication on ports 4-8.
This example configures the Switch in the following ways:
1 Disables authentication on the Switch.
2 Disables re-authentication on ports 1, 3, 4, and 5.
3 Disables authentication on ports 1, 6, and 7.
sysname(config)# no port-access-authenticator
sysname(config)# no port-access-authenticator 1,3-5 reauthenticate
sysname(config)# no port-access-authenticator 1,6-7
100
Ethernet Switch CLI Reference Guide
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.