Dell PowerConnect 7000 Series Systems CLI Reference Guide Regulatory Model: PC7024, PC7024F, PC7024P, PC7048, PC7048P, PC7048R, and PC7048R-RA...
Page 2
Other trademarks and trade names may be used in this publication to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
Page 60
66 Configuration and Image File Commands 1431 File System Commands 1431 ....Command Line Interface Scripting 1431 ..Commands in this Chapter 1431 .
Page 61
67 Denial of Service Commands 1453 ..Commands in this Chapter 1454 ....dos-control firstfrag 1455 ....dos-control icmp 1455 .
Page 62
show line 1469 ......speed 1470 ......69 Management ACL Commands 1471 .
Page 63
Commands in this Chapter 1485 ....passwords aging 1486 ....passwords history 1486 .
Page 64
73 Power Over Ethernet Commands 1505 ..Flexible Power Management 1505 ... . . Commands in this Chapter 1505 ....power inline 1506 .
Command Groups Introduction The Command Line Interface (CLI) is a network management application operated through an ASCII terminal without the use of a Graphic User Interface (GUI) driven software application. By directly entering commands, the user has greater configuration flexibility. The CLI is a basic command-line interpreter similar to the UNIX C shell.
Page 78
(continued) Table 1-1. System Command Groups Command Group Description Administrative Profiles Configures and displays ACL information. Address Table Configures bridging address tables. Auto-VoIP Configures Auto VoIP for IP phones on a switch. CDP Interoperability Configures Cisco Discovery Protocol (CDP). ® DHCP L2 Relay Enables the Layer 2 DHCP Relay agent for an interface.
Page 79
(continued) Table 1-1. System Command Groups Command Group Description Radius Configures and displays RADIUS information. Spanning Tree Configures and reports on Spanning Tree protocol. TACACS+ Configures and displays TACACS+ information. VLAN Configures VLANs and displays VLAN information. Voice VLAN Configures voice VLANs and displays voice VLAN information.
Page 80
(continued) Table 1-1. System Command Groups Command Group Description Tunnel Interface (IPv6) Managing tunneling operations. Virtual Router Controls virtual LAN routing. Redundancy (IPv4) Virtual Router Manages router redundancy on the system. Redundancy (IPv4) Utility Commands Auto-Install Automatically configures switch when a configuration file is not found.
(continued) Table 1-1. System Command Groups Command Group Description Syslog Manages and displays syslog messages. System Management Configures the switch clock, name and authorized users. Telnet Server Configures Telnet service on the switch and displays Telnet information. User Interface Describes user commands used for entering CLI commands.
Page 82
• MA — Management Access-level • MC — MST Configuration • MDC — Maintenance Domain Configuration • ML — MAC-List Configuration • MSC — Mail Server Configuration • MT — MAC-acl • OG — OSPFv2 Global Configuration • PE — Privileged EXEC •...
Command Description Mode show users accounts Displays information about the local user database. show users login-history Displays information about login histories of users. username Establishes a username-based authentication system. Optionally allows the specification of an Administrative Profile for a local user. username unlock Transfers local user passwords between devices without having to know the passwords.
Command Description Mode deny | permit (IP ACL) The deny command denies traffic if the conditions defined in the deny statement are matched. The permit command allows traffic if the conditions defined in the permit statement are matched. ip access-group Attaches a specified access-control list to an GC or interface.
Page 86
Command Description Mode mac address-table static vlan Registers MAC-layer multicast addresses to the bridge forwarding table, and adds static ports to the group. mac address-table static vlan Adds a static MAC-layer station source address to the bridge table. port security Disables new address learning on an interface.
Page 87
Auto-VoIP Command Description Mode switchport voice detect auto Enables the VoIP Profile on all the interfaces of GC or the switch. show switchport voice Displays the status of auto-voip on an interface or all interfaces. For the meaning of each Mode abbreviation, see Mode Types on page 81.
DHCP L2 Relay Command Description Mode dhcp l2relay (Global Enables the Layer 2 DHCP Relay agent for an GC or Configuration) interface or globally. dhcp l2relay circuit-id Enables user to set the DHCP Option 82 Circuit ID for a VLAN. dhcp l2relay remote-id Enables user to set the DHCP Option 82 Remote ID for a VLAN.
Page 89
Command Description Mode clear ip dhcp snooping Clears all DHCP Snooping statistics. statistics ip dhcp snooping Enables DHCP snooping globally or on a GC or specific VLAN. ip dhcp snooping binding Configures a static DHCP Snooping binding. ip dhcp snooping database Configures the persistent location of the DHCP snooping database.
Dynamic ARP Inspection Command Description Mode arp access-list Creates an ARP ACL. clear ip arp inspection Resets the statistics for Dynamic ARP statistics Inspection on all VLANs. ip arp inspection filter Configures the ARP ACL to be used for a single VLAN or a range of VLANs to filter invalid ARP packets.
Page 91
E-mail Alerting Command Description Mode logging email Enables e-mail alerting and sets the lowest severity level for which log messages are e- mailed. logging email urgent Sets the lowest severity level at which log messages are e-mailed in an urgent manner. logging traps Sets the lowest severity level at which SNMP traps are logged.
Command Description Mode show mail-server Displays the configuration of all the mail servers or a particular mail server. For the meaning of each Mode abbreviation, see Mode Types on page 81. Ethernet Configuration Command Description Mode clear counters Clears statistics on an interface. description Adds a description to an interface.
Page 93
Command Description Mode shutdown Disables interfaces. speed Configures the speed of a given Ethernet interface when not using auto-negotiation. storm-control broadcast Enables Broadcast storm control. storm-control multicast Enables the switch to count Multicast packets together with Broadcast packets. storm-control unicast Enables Unicast storm control.
81. Green Ethernet Command Description Mode green-mode energy-detect Enables a Dell proprietary mode of power reduction on ports that are not connected to another interface. green-mode eee Enables EEE low power idle mode on an interface or all the interfaces.
Page 95
Command Description Mode show green-mode interface- Displays the green-mode configuration and operational status of the port. This command is also used to display the per port configuration and operational status of the green-mode. The status is shown only for the modes supported on the corresponding hardware platform whether enabled or disabled.
IGMP Snooping Command Description Mode ip igmp snooping In Global Config mode, Enables Internet Group Management Protocol (IGMP) snooping. show ip igmp snooping Displays Multicast groups learned by IGMP groups snooping. show ip igmp snooping Displays information on dynamically learned mrouter Multicast router interfaces.
Page 97
Command Description Mode ip igmp snooping querier Enables the Snooping Querier to participate in election participate the Querier Election process when it discovers the presence of another Querier in the VLAN. ip igmp snooping querier Sets the IGMP Querier Query Interval time. query-interval ip igmp snooping querier Sets the IGMP Querier timer expiration period.
Page 98
Command Description Mode ip name-server Configures available name servers. ipv6 address (Interface Sets the IPv6 address of the management Config) interface. ipv6 address (OOB Port) Sets the IPv6 prefix on the out-of-band port. ipv6 address dhcp Enables the DHCPv6 client on an IPv6 interface.
Command Description Mode ipv6 traffic-filter Attaches a specific IPv6 ACL to an interface or associates it with a VLAN ID in a given direction. show ipv6 access-lists Displays an IPv6 access list (and the rules defined for it). For the meaning of each Mode abbreviation, see Mode Types on page 81.
Command Description Mode ipv6 mld snooping querier Sets the global MLD Snooping Querier address GC or address on the system or on a VLAN. ipv6 mld snooping querier Enables the Snooping Querier to participate in election participate the Querier Election process when it discovers the presence of another Querier in the VLAN.
Page 101
Command Description Mode iscsi cos Sets the quality of service profile that will be applied to iSCSI flows. iscsi enable Enables Global Configuration mode command globally enables iSCSI awareness. iscsi target port Configures an iSCSI target port (optionally configures target port address and name). show iscsi Displays the iSCSI settings.
Page 102
LLDP Command Description Mode clear lldp remote-data Deletes all data from the remote data table. clear lldp statistics Resets all LLDP statistics. lldp med Enables/disables LLDP-MED on an interface. lldp med confignotification Enables sending the topology change notification. lldp med Sets the value of the fast start repeat count.
Command Description Mode show lldp med local-device Displays the advertised LLDP local data in detail detail. show lldp med remote- Displays the current LLDP MED remote data. PE device show lldp remote-device Displays the current LLDP remote data. show lldp statistics Displays the current LLDP traffic statistics.
Port Channel Command Description Mode channel-group Associates a port with a port-channel. interface port-channel Enters the interface configuration mode of a specific port-channel. interface range port-channel Enters the interface configuration mode to configure multiple port-channels. hashing-mode Sets the hashing algorithm on trunk ports. IC (port- channel) lacp port-priority...
Page 105
Command Description Mode assign-queue Modifies the queue ID to which the associated PCMC traffic stream is assigned. class Creates an instance of a class definition within the specified policy for the purpose of defining treatment of the traffic class through subsequent policy attribute statements.
Page 106
Command Description Mode mark cos Marks all packets for the associated traffic PCMC stream with the specified class of service value in the priority field of the 802.1p header. mark ip-dscp Marks all packets for the associated traffic PCMC stream with the specified IP DSCP value. mark ip-precedence Marks all packets for the associated traffic PCMC...
Command Description Mode match ip tos Adds to the specified class definition a match condition based on the value of the IP TOS field in a packet. match protocol Adds to the specified class definition a match condition based on the value of the IP Protocol field in a packet using a single keyword notation or a numeric value notation.
Command Description Mode random-detect exponential- Configures the decay in the calculation of the GC, IC, weighting-constant average queue size user for WRED on an or IR interface or all interfaces. redirect Specifies that all incoming packets for the PCMC associated traffic stream are redirected to a specific egress interface (physical port or port- channel).
Command Description Mode show service-policy Displays a summary of policy-oriented statistics information for all interfaces. traffic-shape Specifies the maximum transmission GC or bandwidth limit for the interface as a whole. For the meaning of each Mode abbreviation, see Mode Types on page 81.
Page 110
Command Description Mode radius-server attribute 4 Sets the network access server (NAS) IP address for the RADIUS server. radius-server deadtime Improves RADIUS response times when servers are unavailable. Causes the unavailable servers to be skipped. radius-server host Specifies a RADIUS server host. radius-server key Sets the authentication and encryption key for all RADIUS communications between the...
Spanning Tree Command Description Mode clear spanning-tree Restarts the protocol migration process on all detected-protocols interfaces or on the specified interface. exit (mst) Exits the MST configuration mode and applies configuration changes. instance (mst) Maps VLANs to an MST instance. name (mst) Defines the MST configuration name.
Command Description Mode spanning-tree mode Configures the spanning tree protocol. spanning-tree mst Enables configuring an MST region by entering configuration the multiple spanning-tree (MST) mode. spanning-tree mst cost Configures the path cost for multiple spanning tree (MST) calculations. spanning-tree mst port- Configures port priority.
Page 113
Command Description Mode show tacacs Displays TACACS+ server settings and statistics. tacacs-server host Specifies a TACACS+ server host. tacacs-server key Sets the authentication and encryption key for all TACACS+ communications between the switch and the TACACS+ daemon. tacacs-server timeout Sets the interval for which the switch waits for a server host to reply.
Page 114
Command Description Mode show dvlan-tunnel interface Displays detailed information about Double VLAN Tunneling for the specified interface. show interfaces switchport Displays switchport configuration. show port protocol Displays the Protocol-Based VLAN information for either the entire system or for the indicated group.
Command Description Mode switchport private-vlan Defines a private-VLAN association for an isolated or community port or a mapping for a promiscuous port. switchport trunk Adds or removes VLANs from a trunk port. vlan Creates a VLAN. vlan (Global Config) Configures a VLAN. vlan association mac Associates a MAC address to a VLAN.
Page 116
802.1x Command Description Mode dot1x dynamic-vlan enable Enables the capability of creating VLANs dynamically when a RADIUS-assigned VLAN does not exist in the switch. dot1x initialize Begins the initialization sequence on the specified port. dot1x mac-auth-bypass Enables MAB on an interface. dot1x max-req Sets the maximum number of times the switch sends an EAP-request frame to the client before...
Page 117
Command Description Mode dot1x timeout supp-timeout Sets the number of seconds the switch waits for a response to an EAP-request frame from the client before retransmitting the request. dot1x timeout tx-period Sets the number of seconds the switch waits for a response to an EAP-request/identify frame from the client before resending the request.
Layer 3 Commands ARP (IPv4) Command Description Mode Creates an Address Resolution Protocol (ARP) entry. arp cachesize Configures the maximum number of entries in the ARP cache. arp dynamicrenew Enables the ARP component to automatically renew dynamic ARP entries when they age out. arp purge Causes the specified IP address to be removed from the ARP cache.
Page 119
DHCP Server and Relay Agent (IPv4) Command Description Mode ip dhcp pool Defines a DHCP address pool that can be used to supply addressing information to DHCP client. This command puts the user into DHCP Pool Configuration mode. bootfile Sets the name of the image for the DHCP client to load.
Page 120
Command Description Mode netbios-name-server Configures the IPv4 address of the Windows ® Internet Naming Service (WINS) for a Microsoft DHCP client. netbios-node-type Sets the NetBIOS node type for a Microsoft DHCP client. network Defines a pool of IPv4 addresses for distributing to clients.
Page 121
Command Description Mode domain-name (IPv6 DHCP Sets the DNS domain name which is provided v6DP Pool Config) to a DHCPv6 client by the DHCPv6 server. ipv6 dhcp pool Enters IPv6 DHCP Pool Configuration mode. ipv6 dhcp relay Configures an interface for DHCPv6 Relay functionality.
Page 122
Command Description Mode isplays the next hop information on show ip dvmrp nexthop outgoing interfaces for routing multicast datagrams. show ip dvmrp prune Displays the table that lists the router’s upstream prune information. show ip dvmrp route Displays the multicast routing information for DVMRP.
Command Description Mode ip igmp query-max-response- Configures the maximum response time time interval for the specified interface. ip igmp robustness Configures the robustness that allows tuning of the interface. ip igmp startup-query-count Sets the number of queries sent out on startup—at intervals equal to the startup query interval for the interface.
Page 124
Command Description Mode show ip igmp-proxy Displays a detailed list of the host interface interface status parameters. show ip igmp-proxy groups Displays a table of information about multicast groups that IGMP Proxy reported. show ip igmp-proxy groups Displays complete information about multicast detail groups that IGMP Proxy has reported.
Page 125
Command Description Mode ip helper-address (interface Configures the relay of certain UDP broadcast configuration) packets received on a specific interface. ip helper enable Enables relay of UDP packets. show ip helper-address Displays the IP helper address configuration. show ip dhcp relay Displays the BootP/DHCP Relay information.
Command Description Mode show ip protocols Displays the parameters and current state of the active routing protocols. show ip route Displays the routing table. show ip route preferences Displays detailed information about the route preferences. show ip route summary Shows the number of all routes, including best and non-best routes.
Page 127
Command Description Mode ipv6 mld last-member- Sets the number of listener-specific queries IC (VC) query-count sent before the router assumes that there are no local members on the interface. ipv6 mld last-member- Sets the last member query interval for the IC (VC) query-interval MLD interface, which is the value of the...
Page 128
Command Description Mode ipv6 nd prefix Sets the IPv6 prefixes to include in the router advertisement. ipv6 nd ra-interval Sets the transmission interval between router advertisements. ipv6 nd ra-lifetime Sets the value that is placed in the Router Lifetime field of the router advertisements sent from the interface.
Command Description Mode show ipv6 mld-proxy Displays information about multicast groups groups detail that MLD Proxy reported. show ipv6 mld-proxy Displays a detailed list of the host interface interface status parameters. show ipv6 mld traffic Displays MLD statistical information for the router.
Page 130
Multicast Command Description Mode ip mcast boundary Adds an administrative scope multicast boundary. ip mroute Creates a static multicast route for a source range. ip multicast Sets the administrative mode of the IP multicast forwarder in the router to active. ttlvalue ip multicast ttl-threshold Applies a...
Page 131
Command Description Mode ip pim ssm Administratively configures PIM Source Specific Multicast (SSM) range of addresses for IP multicast routing. show ip multicast Displays the system-wide multicast information. show ip mcast boundary Displays the system-wide multicast information. show ip multicast interface Displays the multicast information for the specified interface.
IPv6 Multicast Command Description Mode ipv6 pim (Global config) Administratively enables PIMSM for IPv6 multicast routing ipv6 pim (VLAN Interface Administratively enables PIM-SM multicast config) routing mode on a particular IPv6 router interface. ipv6 pim bsr-border Prevents bootstrap router (BSR) messages from being sent or received through an interface.
Page 133
Command Description Mode ipv6 pim ssm Defines the Source Specific Multicast (SSM) range of multicast addresses. show ipv6 pim Displays global status of IPv6 PIMSM and its PE or IPv6 routing interfaces. show ipv6 pim bsr Displays the bootstrap router (BSR) PE or information.
Page 134
Command Description Mode area nssa no-summary Configures the NSSA so that summary LSAs are ROSPF not advertised into the NSSA. area nssa translator-role Configures the translator role of the NSSA. ROSPF area nssa translator-stab- Configures the translator stability interval of the ROSPF intv NSSA.
Page 135
Command Description Mode compatible rfc1583 Enables OSPF 1583 compatibility. ROSPF default-information Controls the advertisement of default routes. ROSPF originate (Router OSPF Configuration) default-metric Sets a default for the metric of distributed routes. ROSPF distance ospf Sets the route preference value of OSPF in the ROSPF router.
Page 136
Command Description Mode maximum-paths Sets the number of paths that OSPF can report ROSPF for a given destination. Enables OSPF graceful restart. ROSPF nsf helper Allow OSPF to act as a helpful neighbor for a ROSPF restarting router. nsf helper strict-lsa- Set an OSPF helpful neighbor exit helper mode ROSPF checking...
Page 137
Command Description Mode show ip ospf database Displays the number of each type of LSA in the database-summary database for each area and for the router. show ip ospf interface Displays the information for the IFO object or virtual interface tables. show ip ospf interface Displays brief information for the IFO object or brief...
Page 138
Command Description Mode area nssa default-info- Configures the metric value and type for the ROSV3 originate (Router default route advertised into the NSSA. OSPFv3 Config) area nssa no-redistribute Configures the NSSA ABR so that learned ROSV3 external routes will not be redistributed to the NSSA.
Page 139
Command Description Mode distance ospf Sets the route preference value of OSPF in the ROSV3 router. enable Resets the default administrative mode of OSPF ROSV3 in the router (active). exit-overflow-interval Configures the exit overflow interval for OSPF. ROSV3 external-lsdb-limit Configures the external LSDB limit for OSPF. ROSV3 ipv6 ospf Enables OSPF on a router interface or loopback...
Page 140
Command Description Mode nsf helper strict-lsa- Requires that an OSPF helpful neighbor exit ROSV3 checking helper mode whenever a topology change occurs. nsf restart-interval Configures the length of the grace period on the ROSV3 restarting router. passive-interface Sets the interface or tunnel as passive. passive-interface default Enables the global passive mode by default for all ROSV3...
Page 141
Command Description Mode show ipv6 ospf interface Displays OSPFv3 configuration and status vlan information for a specific VLAN. show ipv6 ospf neighbor Displays information about OSPF neighbors. show ipv6 ospf range Displays information about the area ranges for the specified area identifier. show ipv6 ospf stub table Displays the OSPF stub table.
Command Description Mode show ip irdp Displays the router discovery information for all interfaces, or for a specified interface. For the meaning of each Mode abbreviation, see Mode Types on page 81. Routing Information Protocol Command Description Mode auto-summary Enables the RIP auto-summarization mode. default-information Controls the advertisement of default routes.
Page 143
Command Description Mode show ip rip interface Displays information related to a particular RIP interface. show ip rip interface brief Displays general information for each RIP interface. split-horizon Sets the RIP split horizon mode. For the meaning of each Mode abbreviation, see Mode Types on page 81.
Page 144
Command Description Mode vrrp authentication Sets the authentication details value for the virtual router configured on a specified interface. vrrp description Assigns a description to the VRRP group. vrrp ip Sets the virtual router IP address value for an interface. vrrp mode Enables the virtual router configured on an interface.
Command Description Mode ip vrrp accept-mode Enables the VRRP Master to accept ping packets sent to one of the virtual router’s IP addresses. show ip vrrp interface Displays the configured value for Accept Mode. UE or For the meaning of each Mode abbreviation, see Mode Types on page 81.
Captive Portal Command Description Mode authentication timeout Configures the authentication timeout. captive-portal Enables the captive portal configuration mode. GC enable Globally enables captive portal. http port Configures an additional HTTP port for captive portal to monitor. https port Configures an additional HTTPS port for captive portal to monitor.
Page 147
Command Description Mode verification Configures the verification mode for a captive portal configuration. captive-portal client Deauthenticates a specific captive portal client. PE deauthenticate show captive-portal client Displays client connection details or a status connection summary for connected captive portal users. show captive-portal Displays the clients authenticated to all captive configuration client status...
Page 148
Command Description Mode show captive-portal Displays information about all interfaces configuration interface assigned to a captive portal configuration or about a specific interface assigned to a captive portal configuration. show captive-portal Displays locales associated with a specific configuration locales captive portal configuration. show captive-portal Displays information about all configured configuration status...
Page 149
Command Description Mode show sntp status Displays the SNTP status. sntp authenticate Set to require authentication for received NTP traffic from servers. sntp authentication-key Defines an authentication key for SNTP . sntp broadcast client enable Enables SNTP Broadcast clients. sntp client poll timer Defines polling time for the SNTP client.
For the meaning of each Mode abbreviation, see Mode Types on page 81. Configuration and Image Files Command Description Mode boot system Specifies the system image that the switch loads at startup. clear config Restores switch to default configuration. copy Copies files from a source to a destination.
Denial of Service Command Description Mode dos-control firstfrag Enables Minimum TCP Header Size Denial of Service protection. dos-control icmp Enables Maximum ICMP Packet Size Denial of Service protections. dos-control l4port Enables L4 Port Denial of Service protection. dos-control sipdip Enables Source IP Address = Destination IP Address (SIP=DIP) Denial of Service protection.
Command Description Mode history Enables the command history function. history size Changes the command history buffer size for a particular line. line Identifies a specific line for configuration and enters the line configuration command mode. show line Displays line parameters. speed Sets the line baud rate.
For the meaning of each Mode abbreviation, see Mode Types on page 81. Password Management Command Description Mode passwords aging Implements aging on the passwords such that users are required to change passwords when they expire. passwords history Enables the administrator to set the number of previous passwords that are stored to ensure that users do not reuse their passwords too frequently.
Page 154
Command Description Mode passwords strength Enforces the minimum number of character minimum character-classes classes (uppercase letters, lowercase letters, numeric characters and special characters) that a password must contain. passwords strength exclude- Enforces a maximum number of consecutive keyword characters that a password can contain. enable password encrypted Used by an Administrator to transfer the enable password between devices without having to...
Page 155
power inline detection Configures the detection type that tells which types of PD’s will be detected and powered by the switch. power inline high-power Configures the port high power mode. power inline limit Configures the type of power limit. power inline management Sets the power management type.
Command Description Mode show rmon alarms Displays the alarms summary table. show rmon collection history Displays the requested group of statistics. show rmon events Displays the RMON event table. show rmon history Displays RMON Ethernet Statistics history. show rmon log Displays the RMON logging table.
Page 157
Command Description Mode debug ip acl Enables debug of IP Protocol packets matching the ACL criteria. debug ip dvmrp Traces DVMRP packet reception and transmission. debug ip igmp Traces IGMP packet reception and transmission. debug ip mcache Traces MDATA packet reception and transmission.
Page 158
Command Description Mode debug ping Enables tracing of ICMP echo requests and responses. debug rip Enables tracing of RIP requests and responses. debug sflow Enables sFlow debug packet trace. debug spanning-tree Traces spanning tree BPDU packet reception and transmission. debug vrrp Enables VRRP debug protocol messages.
Page 159
SNMP Command Description Mode show snmp Displays the SNMP status. show snmp engineID Displays the SNMP engine ID. show snmp filters Displays the configuration of filters. show snmp group Displays the configuration of groups. show snmp user Displays the configuration of users. show snmp views Displays the configuration of views.
Page 160
Command Description Mode crypto key generate dsa Generates DSA key pairs for the switch. crypto key generate rsa Generates RSA key pairs for the switch. crypto key pubkey-chain ssh Enters SSH Public Key-chain configuration mode. Erases all public key chains or the public crypto key zeroize pubkey- key chain for a user.
Page 161
Syslog Command Description Mode clear logging Clears messages from the internal logging buffer. clear logging file Clears messages from the logging file. description (Logging) Describes the syslog server. level Specifies the importance level of syslog messages. logging cli-command Enable CLI command logging. logging Logs messages to a syslog server.
System Management Command Description Mode asset-tag Specifies the switch asset-tag. banner exec Sets the message that is displayed after a successful login. banner login Sets the message that is displayed just before the login prompt. banner motd Specifies message-of-the-day banner. banner motd Acknowledges message-of-the-day banner.
Page 163
Command Description Mode set description Associates a text description with a switch in the stack. slot Configures a slot in the system. show banner Displays banner information. show boot-version Displays the boot image version details. show checkpoint Displays the statistics for the checkpointing statistics process.
Command Description Mode show system power Displays information about the system level UE or PE power consumption. show system Displays information about the system UE or PE temperature temperature and fan status. show tech-support Displays system and configuration information (for debugging/calls to technical support). show users Displays information about the active users, including which profiles have been assigned to...
For the meaning of each Mode abbreviation, see Mode Types on page 81. Terminal Length Command Description Mode terminal length Sets the terminal length. For the meaning of each Mode abbreviation, see Mode Types on page 81. Time Ranges Command Description Mode time-range...
Command Description Mode Gets the CLI user control back to the privileged execution mode or user execution mode. exit Exits any configuration mode to the previously (All) highest mode in the CLI mode hierarchy. exit (EXEC) Closes an active terminal session by logging off the switch.
Page 167
Command Description Mode organization-unit Specifies the organization-unit or department name. show crypto certificate Displays the SSL certificates of your switch. mycertificate show ip http server status Displays the HTTP server status information. show ip http server secure Displays the HTTP secure server status UE or status information.
Using the CLI Introduction This chapter describes the basics of entering and editing the Dell PowerConnect 70xx Series Command Line Interface (CLI) commands and defines the command hierarchy. It also explains how to activate the CLI and implement its major functions.
Page 170
Two instances where the help information can be displayed are: Keyword lookup — The <?> key is entered in place of a command. A list • of all valid commands and corresponding help messages is displayed. • Partial keyword lookup — A command is incomplete and the <?> key is entered in place of a parameter.
Page 171
Table 2-1. History Buffer Keyword Source or Destination Up-arrow key Recalls commands in the history buffer, beginning with the most recent command. Repeats the key sequence to recall <Ctrl>+<P> successively older commands. Down-arrow key Returns to more recent commands in the history buffer after recalling commands with the up-arrow key.
Page 172
--------- ------------------------- ------ ------- ---- ------ ------------ Gi1/0/1 Unknown Auto Down Inactive Gi1/0/2 Unknown Auto Down Inactive Gi1/0/3 Unknown Auto Down Inactive Gi1/0/4 Unknown Auto Down Inactive Gi1/0/5 Unknown Auto Down Inactive Gi1/0/6 Unknown Auto Down Inactive Command Completion CLI can complete partially entered commands when the user presses the <tab>...
Page 173
Table 2-2. CLI Shortcuts Keyboard Key Description <Delete, Backspace> Delete previous character <Ctrl>+<A> Go to beginning of line <Ctrl>+<E> Go to end of line <Ctrl>+<F> Go forward one character <Ctrl>+<B> Go backward one character <Ctrl>+<D> Delete current character <Ctrl>+<U,X> Delete to beginning of line <Ctrl>+<K>...
Page 174
Operating on Multiple Objects (Range) The CLI allows the user to operate on the set of objects at the same time. The guidelines are as follows for range operation: • Operations on objects with four or more instances support the range operation, unless noted otherwise in the specific command documentation.
Page 175
• Some parameters must be configured individually for each port or interface. Command Scripting The CLI can be used as a programmable management interface. To facilitate this function, any characters entered after the <!> character are treated as a comment and ignored by the CLI. Also, the CLI allows the user to disable session timeouts.
Page 176
Interface Naming Conventions The conventions for naming interfaces in CLI commands are as follows: Ethernet Interfaces The gigabit Ethernet and ten-gigabit Ethernet ports are identified in the CLI unit/slot/port by the variable , where: <Interface Type> Unit#/Slot#/Port# — Identifies a specific interface by •...
Page 177
Table 2-4. Interface Identifiers Interface Type Long Form Short Form Identifier Fast Ethernet fastethernet unit/slot/port Gigabit Ethernet gigabitethernet unit/slot/port 10-Gigabit tengigabitethernet unit/slot/port Ethernet Loopback loopback loopback-id (0-7) Port Channel port-channel port-channel-number Tunnel tunnel tunnel-id (0-7) Vlan vlan vlan-id (1-4093) When listed in command line output, gigabit Ethernet interfaces are preceded by the characters , ten-gigabit Ethernet interfaces are preceded by as shown in the examples below.
Page 178
--------------- ------------- -------------- default Po1-48, Default Gi1/0/1-24 Example #3 console#show slot 1/0 Slot......1/0 Slot Status....... Full Admin State....... Enable Power State....... Enable Inserted Card: Model Identifier....PowerConnect 7024F Card Description....Dell 24 Port Fiber Configured Card: Using the CLI...
Page 179
Model Identifier....PowerConnect 7024F Card Description....Dell 24 Port Fiber Pluggable......No Power Down......No console#show slot 1/2 Slot......1/2 Slot Status....... Empty Admin State....... Disable Power State....... Disable Pluggable......Yes Power Down......No Using the CLI...
CLI Command Modes Since the set of CLI commands is very large, the CLI is structured as a command-tree hierarchy, where related command sets are assigned to command modes for easier access. At each level, only the commands related to that level are available to the user and only those commands are shown in the context sensitive help for that level.
Page 181
The Privileged EXEC mode provides access to commands that can not be executed in the User EXEC mode and permits access to the switch Configuration mode. The Global Configuration mode manages switch configuration on a global level. For specific interface configurations, command modes exist at a sub- level.
Page 182
Global Configuration Mode Global Configuration commands apply to features that affect the system as a whole, rather than just a specific interface. The Privileged EXEC mode command configure is used to enter the Global Configuration mode. console(config)# The following are the Global Configuration modes: •...
Page 183
VLAN Database — Contains commands to create a VLAN as a whole. • The Global Configuration mode command vlan database is used to enter the VLAN Database mode. Router OSPF Configuration — Global configuration mode command • router ospf is used to enter into the Router OSPF Configuration mode. •...
Page 184
member ports as a single entity. The Global Configuration mode port-channel-number is used to enter command interface port-channel the Port Channel mode. Tunnel — Contains commands to manage tunnel interfaces. The Global • Configuration mode command interface tunnel enters the Tunnel Configuration mode to configure an tunnel type interface.
Page 185
device name command mode- object ][([ ]])][# | >] device name ] — is the name of the managed switch, which is typically the user-configured hostname established by the hostname command. command mode ] — is the current configuration mode and is omitted for the top configuration levels.
Page 186
(continued) Table 2-5. Navigating CLI Command Modes Command Mode Access Method Command Prompt Exit or Access Previous Mode Global From Privileged Use the exit console(config)# Configuration EXEC mode, use command, or the configure press command. <Ctrl>+<Z> to return to the Privileged EXEC mode.
Page 187
(continued) Table 2-5. Navigating CLI Command Modes Command Mode Access Method Command Prompt Exit or Access Previous Mode Class-Map From Global To exit to Global console(config-classmap)# Configuration Configuration mode, use the class- mode, use the map command. exit command, or press <Ctrl>+<Z>...
Page 188
(continued) Table 2-5. Navigating CLI Command Modes Command Mode Access Method Command Prompt Exit or Access Previous Mode TACACS From Global To exit to Global console(tacacs)# Configuration Configuration mode, use the mode, use the tacacs-server host exit command, command. or press <Ctrl>+<Z>...
Page 189
(continued) Table 2-5. Navigating CLI Command Modes Command Mode Access Method Command Prompt Exit or Access Previous Mode SNMP From Global To exit to Global console(config-snmp)# Community Configuration Configuration Configuration mode, use the mode, use the snmp-server exit command, community or press command.
Page 190
(continued) Table 2-5. Navigating CLI Command Modes Command Mode Access Method Command Prompt Exit or Access Previous Mode Logging From Global To exit to Global console(config-logging)# Configuration Configuration mode, use the mode, use the logging command. exit command, or press <Ctrl>+<Z>...
Page 191
(continued) Table 2-5. Navigating CLI Command Modes Command Mode Access Method Command Prompt Exit or Access Previous Mode Router RIP From Global To exit to Global console(config-router)# Config Configuration Configuration mode, use the mode, use the router rip exit command, command.
Page 192
(continued) Table 2-5. Navigating CLI Command Modes Command Mode Access Method Command Prompt Exit or Access Previous Mode 10 Gigabit From Global To exit to Global console (config-if- unit/slot/port Ethernet Configuration Configuration mode, use the mode, use the interface exit command, tengigabitethernet or press command.
Web, CLI and the remote Dell Network Manager. After initial setup, the user may enter to the system to set up more advanced configurations.
Page 194
By default the switch is shipped from the factory with an IP address of 192.168.2.1 but the Easy Setup Wizard provides the opportunity to customize the IP address. The initial activation must be done using the serial interface since, without a unique IP address, the user can not access the other management interfaces.
Page 195
running, the system does not display any unsolicited or unrelated status messages. For example, the system does not display event notification or system status messages. After completing the wizard, the user is given a chance to save his configuration and continue to the CLI. If the user chooses to discard his configuration, any restart of the wizard must be from the beginning.
Page 196
Figure 2-1. Easy Setup Wizard Did the user Transfer to CLI mode previously save a startup configuration? Does the user want Transfer to CLI mode to use setup wizard? Request SNMP Is SNMP Management Community String & Required? Server IP Address Request user name, password Request IP Address, Network...
Page 197
A default gateway address is configured. The following example contains the sequence of prompts and responses associated with running an example Dell Easy Setup Wizard session, using the input values listed above. Note in this case a static IP address for the management interface is being set up.
Page 198
IP address and the "community string" or password that the particular management system uses to access the switch. The wizard automatically assigns the highest access level [Privilege Level 15] to this account. You can use Dell Using the CLI...
Page 199
Network Manager or other management interfaces to change this setting, and to add additional management system later. For more information on adding management systems, see the user documentation. To add a management station: Please enter the SNMP community string to be used. {public}: public<Enter>...
Page 200
Optionally you may request that the system automatically retrieve an IP address from the network via DHCP (this requires that you have a DHCP server running on the network). To setup an IP address: Please enter the IP address of the device (A.B.C.D) or enter "DHCP"...
Thank you for using the Dell Easy Setup Wizard. You will now enter CLI mode..console> Using CLI Functions and Tools The CLI has been designed to manage the switch’s configuration file system and to manage switch security. A number of resident tools exist to support these and other functions.
Page 202
Copying Files The copy command not only provides a method for copying files within the file system, but also to and from remote servers. With the copy command and URLs to identify files, the user can back up images to local or remote systems or restore images from local or remote systems.
Page 203
startup-config — This file refers to the special configuration image stored • in flash memory which is loaded when the system next reboots. The user may copy a particular configuration file (remote or local) to this special file name and reboot the system to force it to use a particular configuration. •...
Page 204
User Accounts Management The CLI provides authentication for users either through remote authentication servers supporting TACACS+ or Radius or through a set of locally managed user accounts. The setup wizard asks the user to create the initial administrator account and password at the time the system is booted. The following rules and specifications apply: •...
Page 205
When Radius is used, the field returns the access level for the user. Two vendor specific options are supported. These are CISCO-AV-Pairs(Shell:priv-lvl=x) and Dell Radius VSA (user-group=x). TACACS+ provides the appropriate level of access. The following rules and specifications apply: •...
Page 206
• If a log server is not specified by the user, the CLI maintains at most the last 1000 critical system events. In this case, less important events are not recorded. Security Logs Security logs are maintained to record all security events including the following: •...
Page 207
• SSH and the keying information to use for SSH. • HTTP. • HTTPS and the security certificate to be used. • SNMPv1/v2c and the read and read/write community strings to be used. • SNMPv3 and the security information for used this protocol. For each of these management profiles, the user defines the list of hosts or subnets from which the management profiles may be used.
Page 208
CFI Probe: Found 2x16 devices in x16 mode /DskVol// - disk check in progress ... /DskVol// - Volume is OK volume descriptor ptr (pVolDesc): 0x814cf10 XBD device block I/O handle: 0x10001 auto disk check on mount: DOS_CHK_REPAIR |DOS_CHK_VERB_2 volume write mode: copyback (DOS_WRITE) volume options: max # of simultaneously open files: 52...
Page 209
- first cluster is in sector # 260 - Update last access date for open-read-close = FALSE Boot Menu 4.1.0.6 Select an option. If no selection in 10 seconds then operational code will start. 1 - Start operational code. 2 - Start Boot Menu. Select (1, 2): Operational Code Date: Mon Feb 28 16:43:14 2011 Uncompressing..
Page 210
file descriptors in use: # of different files in use: # of descriptors for deleted files: 0 # of obsolete descriptors: current volume configuration: - volume label: NO LABEL ; (in boot sector: - volume Id: 0xbb - total number of sectors: 124,408 - bytes per sector: - # of sectors per cluster: 4 - # of reserved sectors: 1...
Page 211
Instantiating /download as rawFs, device = 0x20001 Formatting /download for DOSFS Instantiating /download as rawFs, device = 0x20001 Formatting...OK. <186> NOV 15 09:34:53 0.0.0.0-1 General[1073741072]: bootos.c(220) 1 %% Event(0xaaaaaaaa)Instantiating RamCP: as rawFs, device = 0x30001 Formatting RamCP: for DOSFS Instantiating RamCP: as rawFs, device = 0x30001 Formatting...OK.
Page 213
File asciilog.bin Ready to SEND in binary mode Estimated File Size 0K, 12 Sectors, 89 Bytes Estimated transmission time 14 seconds Send several Control-X characters to cancel before transfer starts. [Boot Menu] 4 Ready to receive the file with XMODEM/CRC..Ready to RECEIVE File xcode.bin in binary mode Send several Control-X characters to cancel before transfer starts.
Page 215
[Boot Menu] 7 Do you wish to update Boot Code and reset? (y/n) y Validating image2..OK Extracting boot code from image...CRC valid Erasing Boot Flash..Done. Wrote 0x10000 bytes. Wrote 0x20000 bytes. Wrote 0x30000 bytes. Wrote 0x40000 bytes. Wrote 0x50000 bytes. Wrote 0x60000 bytes.
Page 216
Flash update completed. Rebooting... CPU Card ID: 0x508548 CFI Probe: Found 2x16 devices in x16 mode /DskVol// - disk check in progress ... /DskVol// - Volume is OK Change volume Id from 0x0 to 0x79 volume descriptor ptr (pVolDesc): 0x814cf10 XBD device block I/O handle: 0x10001 auto disk check on mount: DOS_CHK_REPAIR...
Page 217
- bytes per sector: - # of sectors per cluster: 4 - # of reserved sectors: - FAT entry size: FAT16 - # of sectors per FAT copy: - # of FAT table copies: - # of hidden sectors: - first cluster is in sector # - Update last access date for open-read-close = FALSE Boot Menu 4.1.0.6 Select an option.
Page 218
- Retrieve event log using XMODEM - Load new operational code using XMODEM - Display operational code vital product data - Abort boot code update - Update boot code - Delete backup image - Reset the system 10 - Restore configuration to factory defaults (delete config files) 11 - Activate Backup Image 12 - Password Recovery Procedure...
Page 219
[Boot Menu] 12 Operational Code Date: Mon Feb 28 16:43:14 2011 Uncompressing..Bulk Class Driver Successfully Initialized Adding 0 symbols for standalone. CFI Probe: Found 2x16 devices in x16 mode volume descriptor ptr (pVolDesc): 0x5157150 XBD device block I/O handle: 0x10001 auto disk check on mount: DOS_CHK_REPAIR |DOS_CHK_VERB_2...
Page 220
current volume configuration: - volume label: NO LABEL ; (in boot sector: ) - volume Id: 0x79 - total number of sectors: 124,408 - bytes per sector: - # of sectors per cluster: 4 - # of reserved sectors: - FAT entry size: FAT16 - # of sectors per FAT copy: - # of FAT table copies:...
Page 221
Formatting RamCP: for DOSFS Instantiating RamCP: as rawFs, device = 0x30001 Formatting...OK. (Unit 1 - Waiting to select management unit)>USB Auto Configuration process is completed! Applying Global configuration, please wait ... Welcome to Dell Easy Setup Wizard Using the CLI...
Page 222
[ctrl+z]. Would you like to run the setup wizard (you must answer this question within 60 seconds)? [Y/N] n Thank you for using the Dell Easy Setup Wizard. You will now enter CLI mode. Applying Interface configuration, please wait ...
Page 223
Reloading all switches. Boot Menu 4.1.0.6 CPU Card ID: 0x508548 CFI Probe: Found 2x16 devices in x16 mode /DskVol// - disk check in progress ... /DskVol//files /DskVol//files/image2 /DskVol//files/boot.dim /DskVol//files/crashdump.ctl /DskVol//files/dh512.pem /DskVol//files/dh1024.pem /DskVol//files/sslt_cert1.pem /DskVol//files/sslt_key1.pem /DskVol//files/ssh_host_key /DskVol//files/ssh_host_dsa_key /DskVol//files/ssh_host_rsa_key /DskVol//files/log2.bin /DskVol//files/hpc_broad.cfg /DskVol//files/slog0.txt /DskVol//files/olog0.txt /DskVol//files/sslt.rnd Using the CLI...
Page 224
/DskVol// - Volume is OK volume descriptor ptr (pVolDesc): 0x814cf10 XBD device block I/O handle: 0x10001 auto disk check on mount: DOS_CHK_REPAIR |DOS_CHK_VERB_2 volume write mode: copyback (DOS_WRITE) volume options: max # of simultaneously open files: file descriptors in use: # of different files in use: # of descriptors for deleted files: # of obsolete descriptors:...
Page 225
- first cluster is in sector # - Update last access date for open-read-close = FALSE Boot Menu 4.1.0.6 Select an option. If no selection in 10 seconds then operational code will start. 1 - Start operational code. 2 - Start Boot Menu. Select (1, 2):2 Boot Menu 4.1.0.6 Options available...
Page 226
11 - Activate Backup Image 12 - Password Recovery Procedure 13 - Reformat and restore file system [Boot Menu] 13 Instantiating /RamDisk/ as rawFs, device = 0x20001 Formatting /RamDisk/ for DOSFS Instantiating /RamDisk/ as rawFs, device = 0x20001 Formatting.../RamDisk/: file system is marked clean, skipping check copying file /DskVol/files/image1 ->...
Page 228
Erasing FFS: CFI Probe: Found 2x16 devices in x16 mode Formatted 1 of 251 units = 0.3 % Formatted 2 of 251 units = 0.7 % Formatted 3 of 251 units = 1.1 % Formatted 4 of 251 units = 1.5 % Formatted 5 of 251 units = 1.9 % Formatted 6 of 251 units = 2.3 % Formatted 7 of 251 units = 2.7 %...
Page 229
Formatted 26 of 251 units = 10.3 % Formatted 27 of 251 units = 10.7 % Formatted 28 of 251 units = 11.1 % Formatted 29 of 251 units = 11.5 % Formatted 30 of 251 units = 11.9 % Formatted 31 of 251 units = 12.3 % Formatted 32 of 251 units = 12.7 % Formatted 33 of 251 units = 13.1 %...
Page 230
Formatted 52 of 251 units = 20.7 % Formatted 53 of 251 units = 21.1 % Formatted 54 of 251 units = 21.5 % Formatted 55 of 251 units = 21.9 % Formatted 56 of 251 units = 22.3 % Formatted 57 of 251 units = 22.7 % Formatted 58 of 251 units = 23.1 % Formatted 59 of 251 units = 23.5 %...
Page 231
Formatted 78 of 251 units = 31.0 % Formatted 79 of 251 units = 31.4 % Formatted 80 of 251 units = 31.8 % Formatted 81 of 251 units = 32.2 % Formatted 82 of 251 units = 32.6 % Formatted 83 of 251 units = 33.0 % Formatted 84 of 251 units = 33.4 % Formatted 85 of 251 units = 33.8 %...
Page 232
Formatted 104 of 251 units = 41.4 % Formatted 105 of 251 units = 41.8 % Formatted 106 of 251 units = 42.2 % Formatted 107 of 251 units = 42.6 % Formatted 108 of 251 units = 43.0 % Formatted 109 of 251 units = 43.4 % Formatted 110 of 251 units = 43.8 % Formatted 111 of 251 units = 44.2 %...
Page 233
Formatted 130 of 251 units = 51.7 % Formatted 131 of 251 units = 52.1 % Formatted 132 of 251 units = 52.5 % Formatted 133 of 251 units = 52.9 % Formatted 134 of 251 units = 53.3 % Formatted 135 of 251 units = 53.7 % Formatted 136 of 251 units = 54.1 % Formatted 137 of 251 units = 54.5 %...
Page 234
Formatted 156 of 251 units = 62.1 % Formatted 157 of 251 units = 62.5 % Formatted 158 of 251 units = 62.9 % Formatted 159 of 251 units = 63.3 % Formatted 160 of 251 units = 63.7 % Formatted 161 of 251 units = 64.1 % Formatted 162 of 251 units = 64.5 % Formatted 163 of 251 units = 64.9 %...
Page 235
Formatted 182 of 251 units = 72.5 % Formatted 183 of 251 units = 72.9 % Formatted 184 of 251 units = 73.3 % Formatted 185 of 251 units = 73.7 % Formatted 186 of 251 units = 74.1 % Formatted 187 of 251 units = 74.5 % Formatted 188 of 251 units = 74.9 % Formatted 189 of 251 units = 75.2 %...
Page 236
Formatted 208 of 251 units = 82.8 % Formatted 209 of 251 units = 83.2 % Formatted 210 of 251 units = 83.6 % Formatted 211 of 251 units = 84.0 % Formatted 212 of 251 units = 84.4 % Formatted 213 of 251 units = 84.8 % Formatted 214 of 251 units = 85.2 % Formatted 215 of 251 units = 85.6 %...
Page 237
Formatted 234 of 251 units = 93.2 % Formatted 235 of 251 units = 93.6 % Formatted 236 of 251 units = 94.0 % Formatted 237 of 251 units = 94.4 % Formatted 238 of 251 units = 94.8 % Formatted 239 of 251 units = 95.2 % Formatted 240 of 251 units = 95.6 % Formatted 241 of 251 units = 96.0 %...
Page 238
XBD device block I/O handle: 0x40001 auto disk check on mount: DOS_CHK_REPAIR |DOS_CHK_VERB_2 volume write mode: copyback (DOS_WRITE) volume options: max # of simultaneously open files: file descriptors in use: # of different files in use: # of descriptors for deleted files: # of obsolete descriptors: current volume configuration: - volume label:...
Page 241
[Boot Menu] Monitoring Traps from CLI It is possible to connect to the CLI session and monitor the events or faults that are being sent as traps from the system. This feature is equivalent to the alarm-monitoring window in a typical network management system. The user enables events or monitor traps from the CLI by entering the command logging console.
Layer 2 Switching Commands The chapters that follow describe commands that conform to the OSI model data link layer (Layer 2). Layer 2 commands provide a logical organization for transmitting data bits on a particular medium. This layer defines the framing, addressing, and checksum functions for Ethernet packets.
AAA Commands Management access to the switch is via telnet, HTTP, SSH, or the serial console (SNMP access is discussed in SNMP Commands). To ensure that only authorized users can access and change the configuration of the switch, users must be authenticated. Users can be authenticated based on: •...
support the concept of time-out, subsequent entries in the list are never attempted. For example, the local authentication method implementation does not supply a time-out value. If a list contains the local method, followed by the radius authentication method, the radius method is not attempted. Once an APL is created, a reference to that APL can be stored in the access line configuration to determine how specific components should authenticate users.
Accounting Method Lists An Accounting Method List (AML) is an ordered list of accounting methods that can be applied to the accounting types (exec or commands). Accounting Method Lists are identified by the default keyword or by a user-defined name. TACACS+ and RADIUS are supported as accounting methods.
aaa authorization ip http authentication show authentication methods aaa authorization network ip https authentication show users accounts default radius aaa ias-user username login authentication show users login-history aaa new-model password (aaa IAS User username Configuration) aaa authentication dot1x default Use the aaa authentication dot1x default command in Global Configuration mode to specify an authentication method for 802.1x clients.
User Guidelines Only one authentication method may be specified in the command. For the RADIUS authentication method, if the RADIUS server cannot be contacted, the supplicant fails authentication. The none method always allows access. the ias method utilizes the internal authentication server. The internal authentication server only supports the EAP-MD5 method.
Keyword Source or destination enable Uses the enable password for authentication. line Uses the line password for authentication. none Uses no authentication. radius Uses the list of all RADIUS servers for authentication. tacacs Uses the list of all TACACS+ servers for authentication. Default Configuration The default enable list is enableList.
Example The following example sets authentication when accessing higher privilege levels. console(config)# aaa authentication enable default enable aaa authentication login Use the aaa authentication login command in Global Configuration mode to set the authentication method required for user at login. To return to the default configuration, use the no form of this command.
Command Mode Global Configuration mode User Guidelines The default and optional list names created with the aaa authentication login command are used with the login authentication command. Create a list-name method list by entering the aaa authentication login command for list-name a particular protocol, where is any character string used to name...
Page 253
Syntax default list-name aaa authorization {commands|exec|network}{ } method1 [method2] default list-name no aaa authorization {commands|exec|network} { Parameter Description Parameter Description Authorization specifier: exec Provides EXEC authorization. All methods are supported. commands Performs authorization of user commands. Only none and tacacs methods are supported. network Performs RADIUS authorization of commands.
Page 254
The following default Authorization Methods List is present by default: Default List Name Description Authorization Method dfltCmdAuthList Default Command List None dfltExecAuthList Default EXEC list None Command Mode Global Config mode User Guidelines A maximum of five authorization method lists may be created for command types.
aaa authorization network default radius Use the aaa authorization network default radius command in Global Configuration mode to enable the switch to accept VLAN assignment by the RADIUS server. Syntax aaa authorization network default radius no aaa authorization network default radius Default Configuration By default, the switch does not accept VLAN assignments by the RADIUS server.
Syntax user aaa ias-user username user no aaa ias-user username Parameter Description This command does not require a parameter description. Default Configuration This command has no default configuration. Command Mode Global Configuration User Guidelines This command has no user guidelines. Examples console#configure console(config)#aaa ias-user username client-1...
Default Configuration This command has no default configuration. Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command. Example The following example configures the switch to use the new model command set. (config)# aaa new-model clear (IAS) Use the clear aaa ias-users command in Privileged EXEC mode to delete all IAS users.
Example console#clear aaa ias-users authorization Use the authorization command to apply a command authorization method to a line config. Use the no form of the command to return the authorization for the line mode to the default. Syntax list_name authorization {commands|exec } [default| no authorization {commands|exec } Parameter Description Parameter...
User Guidelines When command authorization is configured for a line-mode, the switch sends information about the entered command to the method specified in the command list. The authorization method validates the received command and responds with either a PASS or FAIL response. If approved, the command is executed.
Command Mode Line Configuration mode User Guidelines Use of the no form of the command does not disable authentication. Instead, it sets the authentication list to the default list (same as enable authentication default). Example The following example specifies the default authentication method when accessing a higher privilege level console.
User Guidelines The PowerConnect firmware emulates industry standard behavior for enable mode authentication over SSH and telnet. The default enable authentication method for telnet and SSH uses the enableNetList method, which requires an enable password. If users are unable to enter privileged mode when accessing the switch via telnet or SSH, the administrator will need to either change the enable authentication method, e.g.
Default Configuration The local user database is checked. This action has the same effect as the command ip http authentication local. Command Mode Global Configuration mode User Guidelines The additional methods of authentication are used only if the previous method returns an error, not if it fails. To ensure that the authentication succeeds even if all methods return an error, specify none as the final method in the command line.
Keyword Source or destination radius Uses the list of all RADIUS servers for authentication. tacacs Uses the list of all TACACS+ servers for authentication. Default Configuration The local user database is checked. This action has the same effect as the command ip https authentication local.
default — Uses the default list created with the aaa authentication login • command. list-name — Uses the indicated list created with the aaa authentication • login command. Default Configuration Uses the default set with the command aaa authentication login. Command Mode Line Configuration mode User Guidelines...
Default Configuration This command has no default configuration. Command Mode aaa IAS User Configuration User Guidelines This command has no user guidelines. Example console#configure console(config)#aaa ias-user username client-1 console(Config-IAS-User)#password client123 console(Config-IAS-User)#no password Example of a adding a MAB Client to the Internal user database: console#configure console(config)#aaa ias-user username 1f3ccb1157 console(Config-IAS-User)#password 1f3ccb1157...
Page 266
no password password — Password for this level. (Range: 8- 64 characters) • • encrypted — Encrypted password to be entered, copied from another switch configuration. Default Configuration No password is specified. Command Mode Line Configuration mode User Guidelines This command has no user guidelines. Example The following example specifies a password "mcmxxyyy"...
Default Configuration There is no default configuration for this command. Command Mode User EXEC mode User Guidelines This command has no user guidelines. Example The following example shows the prompt sequence for executing the password command. console>password Enter old password:******** Enter new password:******** Confirm new password:******** show aaa ias-users...
Command Mode Privileged EXEC, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example console#show aaa ias-users UserName ------------------- Client-1 Client-2 Following are the IAS configuration commands shown in the output of the show running-config command. Passwords shown in the command output are always encrypted.
Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Examples console#show aaa statistics Number of Accounting Notifications sent at beginning of an EXEC session: 0 Errors when sending Accounting Notifications beginning of an EXEC session: 0 Number of Accounting Notifications sent at end of an EXEC session: 0 Errors when sending Accounting Notifications at end of an EXEC session: 0 Number of Accounting Notifications sent at beginning of a command execution:...
Example The following example displays the authentication configuration. console#show authentication methods Login Authentication Method Lists --------------------------------- defaultList : none networkList : local Enable Authentication Method Lists ---------------------------------- enableList : enable none enableNetList : enable Line Login Method List Enable Method List ------- ----------------- ------------------...
Syntax show authorization methods Default Configuration This command has no default setting. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines Command authorization is supported only for the line, telnet, and SSH access methods. Example console#show authorization methods Command Authorization List Method -------------------------------------...
show users accounts Use the show users accounts command in Privileged EXEC mode to display the local user status with respect to user account lockout and password aging. Syntax show users accounts Parameter Description The following fields are displayed by this command. Parameter Description User Name...
UserName Privilege Password Password Lockout Aging Expiry date ----------- --------- --------- ----------- ------- admin False guest False brcm1 False console#show users accounts long User Name ------------ thisisaverylongusernameitisquitelong show users login-history Use the show users login-history command in Global Configuration mode to display information about the login history of users.
Example The following example show user login history outputs. console#show users login-history Login Time Username Protocol Location -------------------- --------- --------- ----------- Jan 19 2005 08:23:48 Serial Jan 19 2005 08:29:29 Robert HTTP 172.16.0.8 Jan 19 2005 08:42:31 John 172.16.0.1 Jan 19 2005 08:49:52 Betty Telnet 172.16.1.7...
Page 275
Parameter Description password The authentication password for the user. Range: 8-64 characters. This value can be 0 [zero] if the no passwords min-length command has been executed. The special characters allowed in the password include ! # $ % & ‘ ( ) * + , - . / : ; < = > @ [ \ ] ^ _ ` { | } ~.
Page 276
Message Type Message Description Successful Completion Message No message is displayed. Error Completion Message Could not set user password! Reason behind the failure Exceeds Minimum Length of a Password. Password should be in the range of 8-64 characters in length. Set minimum password length to 0 by using the passwords min-length 0 command.
username unlock Use the username unlock command in Global Configuration mode to unlock a locked user account. Only a user with read/write access can re-activate a locked user account. Syntax username username unlock Parameter Description This command does not require a parameter description. Default Configuration This command has no default configuration.
This capability is similar to the industry standard “User Roles” feature. The main difference is that the Administrative Profile is obtained via authentication rather than via authorization. This was necessary because Dell PowerConnect does not support AAA authorization of users.
If the successful authentication method does not provide an Administrative Profile for a user, then the user is permitted access based upon the user’s privilege level (as in previous releases). This means that if a user successfully passes enable authentication, the user is permitted access to all commands. This is also true if none of the Administrative Profiles provided are configured on the switch.
admin-profile Use the admin-profile command in Global Config mode to create an administrative profile. The system-defined administrative profiles cannot be deleted. When creating a profile, the user is placed into Administrative Profile Configuration mode. Use the no form of the command to delete an administrative profile and all its rules.
description (Administrative Profile Config) Use the description command in Administrative Profile Configuration mode to add a description to an administrative profile. Use the no form of this command to delete the description. Syntax text description no description Parameter Description Parameter Description text A description of, or comment about, the administrative profile.
rule Use the rule command to add a rule to an administrative profile. Use the no form of this command to delete a rule. Syntax number command-string mode-name rule {deny|permit} {command |mode number no rule Parameter Description Parameter Description number The sequence number of the rule.
show admin-profiles Use the show admin-profiles command in Privileged EXEC mode to show the administrative profiles. If the optional profile name parameter is used, only that profile will be shown. Syntax profile-name show admin-profiles [name Parameter Description Parameter Description profile-name The name of the administrative profile to display.
Example console#show admin-profiles name qos Profile: qos Description: This profile allows access to QoS commands. ----------------------------------------------------------- Rule Perm Type Entity ----------------------------------------------------------- 1 permit command access-list * 2 permit command access-group * 3 permit mode class-map show admin-profiles brief Use the show admin-profiles brief command in Privileged EXEC mode to list the names of the administrative profiles defined on the switch.
Example console#show admin-profiles brief Profile: network-admin Profile: network-security Profile: router-admin Profile: multicast-admin Profile: dhcp-admin Profile: CP-admin Profile: network-operator show cli modes Use the show cli modes command in Privileged EXEC mode to list the names of all the CLI modes. Syntax show cli modes Default Configuration...
ACL Commands Access to a switch or router can be made more secure through the use of Access Control Lists (ACLs) to control the type of traffic allowed into or out of specific ports. An ACL consists of a series of rules, each of which describes the type of traffic to be processed and the actions to take for packets that meet the classification criteria.
Page 290
classifier rule. The ACL logging feature allows these hardware hit counts to be collected on a per-rule basis and reported periodically to the network administrator using the system logging facility and an SNMP trap. The PowerConnect ACL permit/deny rule specification supports a log parameter that enables hardware hit count collection and reporting.
Page 291
Table 6-1. Common Ethertypes EtherType Protocol 0x0800 Internet Protocol version 4 (IPv4) 0x0806 Address Resolution Protocol (ARP) 0x0842 Wake-on LAN Packet 0x8035 Reverse Address Resolution Protocol (RARP) 0x8100 VLAN tagged frame (IEEE 802.1Q) 0x86DD Internet Protocol version 6 (IPv6) 0x8808 MAC Control 0x8809 Slow Protocols (IEEE 802.3)
Commands in this Chapter This chapter explains the following commands: access-list mac access-list extended rename deny | permit (IP ACL) service-acl input deny | permit (Mac-Access-List- show service-acl interface Configuration) ip access-group show ip access-lists mac access-group show mac access-list mac access-list extended –...
Page 293
Parameter Description Parameter Description list-name Access-list name up to 31 characters in length. deny permit Specifies whether the IP ACL rule permits or denies an action. every Allows all protocols. Equal. Refers to the Layer 4 port number being used as match criteria.
Command Mode Global Configuration mode User Guidelines Access list names can consist of any printable character. Names can be up to 31 characters in length. Examples The following examples create an ACL to discard any HTTP traffic from 192.168.77.171, but allow all other traffic from 192.168.77.171: console(config)#access-list alpha deny ip 192.168.77.171 0.0.0.0 0.0.0.0 255.255.255.255 eq http...
Ethertype Protocol 0x8809 Slow Protocols (IEEE 802.3) 0x8870 Jumbo frames 0x888E EAP over LAN (EAPOL – 802.1x) 0x88CC Link Layer Discovery Protocol 0x8906 Fibre Channel over Ethernet 0x8914 FCoE Initialization Protocol 0x9100 Q in Q deny permit (Mac-Access-List-Configuration) Use the deny command in Mac-Access-List Configuration mode to deny traffic if the conditions defined in the deny statement are matched.
Page 297
Parameter Description Parameter Description srcmac Valid source MAC address in format xxxx.xxxx.xxxx. srcmacmask Valid MAC address bitmask for the source MAC address in format xxxx.xxxx.xxxx. Packets sent to or received from any MAC address dstmac Valid destination MAC address in format xxxx.xxxx.xxxx. destmacmask Valid MAC address bitmask for the destination MAC address in format xxxx.xxxx.xxxx.
Default Configuration This command has no default configuration. Command Mode Mac-Access-List Configuration mode User Guidelines The no form of this command is not supported, as the rules within an ACL cannot be deleted individually. Rather the entire ACL must be deleted and respecified.
direction — Direction of the ACL. (Range: in or out. Default is in .) • seqnum — Precedence for this interface and direction. A lower sequence • number has higher precedence. Range: 1 – 4294967295. Default is Default Configuration This command has no default configuration. Command Mode Global Configuration and Interface Configuration (Ethernet, VLAN, or Port Channel) modes...
sequence — Order of access list relative to other access lists already • assigned to this interface and direction. (Range: 1-4294967295) Default Configuration The default direction is in (in-bound). Command Mode Global Configuration mode or Interface Configuration (Ethernet, VLAN or Port Channel) mode User Guidelines An optional sequence number may be specified to indicate the order of this...
name no mac access-list extended name — Name of the access list. (Range: 1-31 characters) • Default Configuration This command has no default configuration. Command Mode Global Configuration mode User Guidelines Use this command to create a mac access control list. The CLI mode is changed to Mac-Access-List Configuration when this command is successfully executed.
Command Mode Global Configuration mode User Guidelines Command fails if the new name is the same as the old one. Example The following example shows the mac access-list extended rename command. console(config)#mac access-list extended rename DELL1 DELL2 service-acl input Use the service-acl input command in Interface Configuration mode to block Link Local Protocol Filtering (LLPF) protocol(s) on a given port.
Default Configuration This command has no default configuration. Command Mode Interface Configuration (Ethernet, Port-channel) User Guidelines To specify multiple protocols, enter the protocol parameters together on the command line, separated by spaces. This command can only be entered once per interface if no intervening no service-acl input command has been entered.
Example console#show service-acl interface gi1/0/1 Block CDP........ Enable Block VTP.........Enable Block DTP........Enable Block UDLD........ Enable Block PAGP.........Enable Block SSTP........ Enable Block All......... Enable show ip access-lists Use the show ip access-lists command in Privileged EXEC mode to display an IP ACL and time-range parameters. Syntax accesslistnumber show ip access-lists [...
Examples The following example displays IP ACLs configured on a device. console#show ip access-lists Current number of ACLs: 2 Maximum number of ACLs: 100 ACL Name Rules Interface(s) Vlan(s) ----------------------------------------------------- ACL40 ACL41 show mac access-list Use the show mac access-list command in Privileged EXEC mode to display a MAC access list and all of the rules that are defined for the MAC ACL.
Page 306
Example The following example displays a MAC access list and all associated rules. console#show mac access-list DELL123 The command output provides the following information: Fields Description MAC ACL Name The name of the MAC access list. Rules The number of user-configured rules defined for the MAC ACL.
Address Table Commands Static MAC Filtering allows the administrator to add a number of unicast or multicast MAC addresses directly to the forwarding database. This is typically a small number relative to the total size of the database. Associated with each static MAC address is a set of source ports, a set of destination ports and VLAN information.
Commands in this Chapter This chapter explains the following commands: clear mac address-table show mac address-table show mac address-table multicast interface mac address-table aging- show mac address-table show mac address-table time static mac address-table multicast show mac address-table show mac address-table vlan forbidden address address mac address-table static...
Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines This command has no user guidelines. Example In this example, the mac address-table tables are cleared. console#clear mac address-table dynamic mac address-table aging-time Use the mac address-table aging-time command in Global Configuration mode to set the aging time of the address.
Command Mode Global Configuration mode User Guidelines This command has no user guidelines. Example In this example the MAC Address Table aging time is set to 400. console(config)#mac address-table aging-time 400 mac address-table multicast forbidden address Use the mac address-table multicast forbidden address command in Global Configuration mode to forbid adding a specific Multicast address to specific ports.
Parameter Description interface-list Specify a comma separated list of interfaces, a range of interfaces, or a combination of both. Interfaces can be port- channel numbers or physical ports in unit/slot/port format. Default Configuration No forbidden addresses are defined. Command Mode Global Configuration mode User Guidelines Before defining forbidden ports, ensure that the Multicast group is registered.
Syntax Description Parameter Description mac-address A valid MAC address in the format xxxx.xxxx.xxxx or xx:xx:xx:xx:xx:xx vlan-id Valid VLAN ID (1-4093) interface-id The interface to which the received packet is forwarded. Default Configuration No static addresses are defined. The default mode for an added address is permanent.
Syntax port security [discard] no port security • discard — Discards frames with unlearned source addresses. This is the default if no option is indicated. Default Configuration Disabled No port security — Command Mode Interface Configuration (gigabitethernet, port-channel, tengigabitethernet) mode User Guidelines When port security is enabled on an interface, all dynamic entries learned up to that point are flushed, and new entries can be learned only to the limit set...
max-addr — The maximum number of addresses that can be learning on • the port. (Range: 0-600) Default Configuration The default value for this command is 100. Command Mode Interface Configuration (gigabitethernet, port-channel, tengigabitethernet) mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines.
Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines A MAC address can be displayed in IP format only if it is in the range 01:00:5e:00:00:00 through 01:00:5e:7f:ff:ff. Example In this example, Multicast MAC address table information is displayed. console#show mac address-table multicast Vlan MAC Address...
Page 316
Parameter Description This command has no arguments or keywords. Default Configuration This command has no default configuration. Command Mode User EXEC, Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example In this example, all classes of entries in the mac address-table are displayed. console#show mac address-table Aging time is 300 Sec Vlan Mac Address...
show mac address-table address Use the show mac address-table address command in User EXEC or Privileged EXEC mode to display all entries in the bridge-forwarding database for the specified MAC address. Syntax mac-address interface-id show mac address-table address [interface ] [vlan vlan-id Parameter Description Parameter...
---- -------------- -------- ------------- 0000.E26D.2C2A Dynamic 1/0/1 show mac address-table count Use the show mac address-table count command in User EXEC or Privileged EXEC mode to display the number of addresses present in the Forwarding Database. Syntax vlan-id interface-id show mac address-table count [vlan | interface Parameter Description Parameter...
Secure addresses: 1 Dynamic addresses: 97 Internal addresses: 9 show mac address-table dynamic Use the show mac address-table command in User EXEC or Privileged EXEC mode to display all dynamic entries in the bridge-forwarding database. Syntax mac-address interface- show mac address-table dynamic [address ] [interface vlan-id ] [vlan...
Aging time is 300 Sec Vlan Mac Address Type Port ---- -------------- ------- ------------- 0000.0001.0000 Dynamic gi1/0/1 0000.8420.5010 Dynamic gi1/0/1 0000.E26D.2C2A Dynamic gi1/0/1 0000.E89A.596E Dynamic gi1/0/1 0001.02F1.0B33 Dynamic gi1/0/1 show mac address-table interface Use the show mac address-table command in User EXEC or Privileged EXEC mode to display all entries in the mac address-table.
Example In this example, all classes of entries in the bridge-forwarding database for gigabit Ethernet interface 1/0/1 are displayed. console#show mac address-table interface gigabitethernet 1/0/1 Aging time is 300 Sec Vlan Mac Address Type Port ---- -------------- ---- ------------- 0000.0001.0000 Dynamic gi1/0/1 0000.8420.5010 Dynamic gi1/0/1 0000.E26D.2C2A Dynamic gi1/0/1 0000.E89A.596E Dynamic gi1/0/1...
Default Configuration This command has no default configuration. Command Mode User EXEC, Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example In this example, all static entries in the bridge-forwarding database are displayed.
Default Configuration This command has no default configuration. Command Mode User EXEC, Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example In this example, all classes of entries in the bridge-forwarding database are displayed.
Page 324
Syntax port- show ports security [{gigabitethernet unit/slot/port| port-channel channel-number | tengigabitethernet unit/slot/port unit/slot/port}] Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example In this example, all classes of entries in the port-lock status are displayed.
Field Description Maximum The maximum addresses that can be associated on this port in Static Learning mode or in Dynamic Learning mode. Trap Indicates if traps would be sent in case of violation. Frequency The minimum time between consecutive traps. show ports security addresses Use the show ports security addresses command in Privileged EXEC mode to display current dynamic addresses in locked ports.
Auto-VoIP Commands Voice over Internet Protocol (VoIP) allows network users to make telephone calls using a computer network over a data network like the Internet. With the increased prominence of delay-sensitive applications (voice, video, and other multimedia applications) deployed in networks today, proper QoS configuration ensures high-quality application performance.
show switchport voice Use the show switchport voice command to show the status of Auto-VoIP on an interface or all interfaces. Syntax port- show switchport voice [gigabitethernet unit/slot/port| port-channel channel-number | tengigabitethernet unit/slot/port ] Default Configuration There is no default configuration for this command. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines...
Po10 Disabled Po11 Disabled Po12 Disabled Po13 Disabled Po14 Disabled Po15 Disabled --More-- or (q)uit The following example shows command output when a port is specified: console#show switchport voice gigabitethernet 1/0/1 Interface Auto VoIP Mode Traffic Class --------- -------------- ------------- Gi1/0/1 Disabled The command output provides the following information:...
Page 331
Syntax switchport voice detect auto no switchport voice detect auto Default Configuration This feature is disabled by default. Command Mode Global Configuration mode, Config mode and all Config sub-modes, Interface (gigabitethernet, port-channel, tengigabitethernet) Configuration mode User Guidelines This command has no user guidelines Example console(config)#interface tengigabitethernet 1/0/1 console(config-if-Te1/0/1)#switchport voice detect auto...
CDP Interoperability Commands Industry Standard Discovery Protocol (ISDP) is a proprietary Layer 2 network protocol which inter-operates with Cisco network equipment and is used to share information between neighboring devices. PowerConnect switches participate in the ISDP protocol and are able to both discover and be discovered by devices that support the Cisco Discovery Protocol (CDP).
User Guidelines There are no user guidelines for this command. Example console#clear isdp counters clear isdp table The clear isdp table command clears entries in the ISDP table. Syntax clear isdp table Default Configuration There is no default configuration for this command. Command Mode Privileged EXEC mode User Guidelines...
Default Configuration ISDP sends version 2 packets by default. Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command. Example console(config)#isdp advertise-v2 isdp enable The isdp enable command enables ISDP on the switch. User the “no” form of this command to disable ISDP.
Example The following example enables isdp on interface 1/0/1. console(config)#interface gigabitethernet 1/0/1 console(config-if-Gi1/0/1)#isdp enable isdp holdtime The isdp holdtime command configures the hold time for ISDP packets that the switch transmits. The hold time specifies how long a receiving device should store information sent in the ISDP packet before discarding it.
isdp timer The isdp timer command sets period of time between sending new ISDP packets. The range is given in seconds. Use the “no” form of this command to reset the timer to the default. Syntax time isdp timer no isdp timer Parameter Description Parameter Description...
Default Configuration There is no default configuration for this command. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines There are no user guidelines for this command. Example console#show isdp Timer........ 30 Hold Time......180 Version 2 Advertisements..... Enabled Neighbors table last time changed..
Page 339
Default Configuration There is no default configuration for this command. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines There are no user guidelines for this command. Example console#show isdp entry Switch Device ID PC7000 Switch Address(es): IP Address: 172.20.1.18...
Compiled Wed 21-Mar-07 12:20 by tinhuang show isdp interface The show isdp interface command displays ISDP settings for the specified interface. Syntax show isdp interface {all | gigabitethernet unit/slot/port | tengigabitethernet unit/slot/port} Default Configuration There is no default configuration for this command. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines...
Page 342
Syntax unit/slot/port show isdp neighbors {[gigabitethernet | tengigabitethernet unit/slot/port | detail]} Default Configuration There is no default configuration for this command. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines The information displayed varies based upon the information received from the ISDP neighbor.
Interface 1/0/1 Port ID GigabitEthernet1/1 Holdtime Advertisement Version Entry last changed time 0 days 00:55:20 Version : Cisco IOS Software, Catalyst 4000 L3 Switch Software (cat4000-I9K91S-M), Version 12.2(25)EWA9, RELEASE SOFTWARE (fc3) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2007 by Cisco Systems, Inc. Compiled Wed 21-Mar-07 12:20 by tinhuang show isdp traffic The show isdp traffic command displays ISDP statistics.
DHCP Layer 2 Relay Commands In the majority of network configurations, DHCP clients and their associated servers do not reside on the same IP network or subnet. Therefore, some kind of third-party agent is required to transfer DHCP messages between clients and servers.
Syntax dhcp l2relay no dhcp l2relay Default Configuration DHCP L2 Relay is disabled by default. Command Mode Global Configuration. User Guidelines There are no user guidelines for this command. Example console(config)#dhcp l2relay dhcp l2relay (Interface Configuration) Use the dhcp l2relay command to enable DHCP L2 Relay for an interface. Use the "no"...
Example console(config-if-Gi1/0/1)#dhcp l2relay dhcp l2relay circuit-id Use the dhcp l2relay circuit-id command to enable setting the DHCP Option 82 Circuit ID for a VLAN. When enabled, the interface number is added as the Circuit ID in DHCP option 82. Use the "no" form of this command to disable setting the DHCP Option 82 Circuit ID.
dhcp l2relay remote-id Use the dhcp l2relay remote-id command to enable setting the DHCP Option 82 Remote ID for a VLAN. When enabled, the supplied string is used for the Remote ID in DHCP Option 82. Use the "no" form of this command to disable setting the DHCP Option 82 Remote ID.
Syntax dhcp l2relay trust no dhcp l2relay trust Default Configuration DHCP Option 82 is discarded by default. Configuration Mode Interface Configuration (Ethernet, Port-channel). User Guidelines There are no user guidelines for this command. Example console(config-if-Gi1/0/1)#dhcp l2relay trust dhcp l2relay vlan Use the dhcp l2relay vlan command to enable the L2 DHCP Relay agent for a set of VLANs.
Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command. Example console(config)#dhcp l2relay vlan 10,340-345 show dhcp l2relay all Use the show dhcp l2relay all command in Privileged EXEC mode to display the summary of DHCP L2 Relay configuration. Syntax show dhcp l2relay all Default Configuration...
Example console#show dhcp l2relay interface all DHCP L2 Relay is Enabled. Interface L2RelayMode TrustMode ---------- ----------- -------------- Enabled untrusted Disabled trusted show dhcp l2relay stats interface Use the show dhcp l2relay stats interface command in Privileged EXEC mode to display DHCP L2 Relay statistics specific to interfaces. Syntax interface-id show dhcp l2relay stats interface {all |...
DHCP L2 Relay is Enabled. Interface UntrustedServer UntrustedClient TrustedServer TrustedClient MsgsWithOpt82 MsgsWithOpt82 MsgsWithoutOpt82 MsgsWithoutOpt82 --------- --------------- ----------------- ----------------- ---------- Gi1/0/1 Gi1/0/2 Gi1/0/3 show dhcp l2relay subscription interface Use the show dhcp l2relay subscription interface command in Privileged EXEC mode to display DHCP L2 Relay Option-82 configuration specific to interfaces.
Page 354
Syntax vlan-range show dhcp l2relay agent-option vlan Parameter Description Parameter Description vlan-range Show information for the specified VLAN range. A range may be a single VLAN ID or two VLAN IDs separated by a single dash with no embedded spaces. Default Configuration This command has no default configuration.
show dhcp l2relay vlan Use the show dhcp l2relay vlan command in Privileged EXEC mode to display whether DHCP L2 Relay is globally enabled on the specified VLAN or VLAN range. Syntax vlan-range show dhcp l2relay vlan Parameter Description Parameter Description vlan-range Show information for the specified VLAN range.
show dhcp l2relay circuit-id vlan Use the show dhcp l2relay circuit-id vlan command in Privileged EXEC mode to display whether DHCP L2 Relay is globally enabled and whether the DHCP Circuit-ID option is enabled on the specified VLAN or VLAN range. Syntax vlan-range show dhcp l2relay circuit-id vlan...
show dhcp l2relay remote-id vlan Use the show dhcp l2relay remote-id vlan command in Privileged EXEC mode to display whether DHCP L2 Relay is globally enabled and shows the remote ID configured on the specified VLAN or VLAN range. Syntax vlan-range show dhcp l2relay remote-id vlan Parameter Description...
clear dhcp l2relay statistics interface Use the show dhcp l2relay statistics interface command in Privileged EXEC mode to reset the DHCP L2 Relay counters to zero. Specify the port with the counters to clear, or use the all keyword to clear the counters on all ports. Syntax interface-id clear dhcp l2relay statistics interface {all |...
DHCP Management Interface Commands PowerConnect switches support an embedded DHCP client. Any IP interface can use DHCP to obtain an IP address. The DHCP client can run on multiple interfaces simultaneously. For IPv4, an IP interface can either use manually configured addresses or be enabled for DHCP .
renew dhcp show dhcp lease release dhcp Use the release dhcp command in Privileged EXEC mode to force the DHCPv4 client to release a leased address. Syntax interface-id release dhcp Parameter Description Parameter Description interface-id Any valid VLAN interface. See Interface Naming Conventions for interface representation.
Example console#release dhcp vlan2 renew dhcp Use the renew dhcp command in Privileged EXEC mode to force the DHCP client to immediately renew an IPv4 address lease. Syntax interface-id renew dhcp { | out-of-band} Parameter Description Parameter Description interface-id Any valid routing interface. See Interface Naming Conventions for interface representation.
Examples The first example is for routing interfaces. console#renew dhcp vlan 2 The second example is for out-of-band port. console#renew dhcp out-of-band debug dhcp packet Use the debug dhcp packet command in Privileged EXEC mode to display debug information about DHCPv4 client activities and to trace DHCPv4 packets to and from the local DHCPv4 client.
console#debug dhcp packet transmit The third example is for receive flow. console#debug dhcp packet receive show dhcp lease Use the show dhcp lease command in Privileged EXEC mode to display IPv4 addresses leased from a DHCP server. Syntax interface-id show dhcp lease [interface Parameter Description Parameter Description...
Page 364
Term Description DHCP Lease server The IPv4 address of the DHCP server that leased the address. State State of the DHCPv4 Client on this interface. DHCP transaction The transaction ID of the DHCPv4 Client. Lease The time (in seconds) that the IP address was leased by the server.
DHCP Snooping Commands DHCP Snooping is a security feature that monitors DHCP messages between DHCP clients and DHCP server to filter harmful DHCP messages and build a bindings database of {MAC address, IP address, VLAN ID, interface} tuples that are considered authorized. The DHCP snooping application processes incoming DHCP messages.
Commands in this Chapter This chapter explains the following commands: clear ip dhcp snooping binding ip dhcp snooping trust clear ip dhcp snooping statistics ip dhcp snooping verify mac-address ip dhcp snooping show ip dhcp snooping ip dhcp snooping binding show ip dhcp snooping binding ip dhcp snooping database show ip dhcp snooping database...
User Guidelines There are no user guidelines for this command. clear ip dhcp snooping statistics Use the clear ip dhcp snooping statistics command to clear all DHCP Snooping statistics. Syntax clear ip dhcp snooping statistics Default Configuration There is no default configuration for this command. Command Mode Privileged EXEC User Guidelines...
Default Configuration DHCP Snooping is disabled by default. Command Mode Global Configuration mode User Guidelines In order to enable DHCP snooping, perform the following three steps: 1 Enable DHCP Snooping globally. 2 Enable DHCP Snooping per VLAN. 3 Set DHCP Snooping trusted port on the port in the DHCP server direction.
Parameter Description Parameter Description mac-address The client's MAC address. vlan-id The number of the VLAN the client is authorized to use. ip-address The IP address of the client. interface The interface on which the client is authorized. The form is unit/slot/port.
Parameter Description Parameter Description hostIP The IP address of the remote host. filename The name of the file for the database on the remote host. The filename may contain any printable character and is checked only when attempting to open the file. Default Configuration The database is stored locally by default.
no ip dhcp snooping database write-delay Parameter Description Parameter Description seconds The write delay (Range: 15–86400 seconds). Default Configuration The write delay is 300 seconds by default. Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command. Example console(config)#ip dhcp snooping database write-delay 500 ip dhcp snooping limit...
Command Mode Interface Configuration (gigabitethernet, port-channel, tengigabitethernet) mode User Guidelines If DHCP packets are received on a port at a rate that exceeds the threshold for the specified time, the port will be diagnostically disabled. The threshold is configurable up to 300 pps, and the burst is configurable up to 15s long. The default is 15 pps.
Example console(config-if-1/0/1)#ip dhcp snooping log-invalid console(config-if-1/0/1)#no ip dhcp snooping log-invalid ip dhcp snooping trust Use the ip dhcp snooping trust command to configure a port as trusted. Use the “no” form of this command to configure a port as untrusted. Syntax ip dhcp snooping trust no ip dhcp snooping trust...
Syntax ip dhcp snooping verify mac-address no ip dhcp snooping verify mac-address Default Configuration Source MAC address verification is enabled by default. Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command. Example console(config)#ip dhcp snooping verify mac-address show ip dhcp snooping Use the show ip dhcp snooping command to display the DHCP snooping global configuration.
User Guidelines There are no user guidelines for this command. Example console#show ip dhcp snooping DHCP snooping is Disabled DHCP snooping source MAC verification is enabled DHCP snooping is enabled on the following VLANs: 11 - 30, 40 Interface Trusted Log Invalid Pkts --------- --------...
vlan-id — The number of the VLAN for which to show bindings. • Default Configuration There is no default configuration for this command. Command Mode User EXEC, Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines There are no user guidelines for this command. Example console#show ip dhcp snooping binding Total number of bindings: 2...
Command Mode User EXEC, Privileged EXEC, Config mode and all Config sub-modes User Guidelines There are no user guidelines for this command. Example console#show ip dhcp snooping database agent url: /10.131.13.79:/sai1.txt write-delay: 5000 show ip dhcp snooping interfaces Use the show ip dhcp snooping interfaces command to show the DHCP Snooping status of the interfaces.
Interface Trust State Rate Limit Burst Interval (pps) (seconds) ---------- ------------- ------------- --------------- 1/0/1 1/0/2 1/0/3 console#show ip dhcp snooping interfaces gigabitethernet 1/0/15 Interface Trust State Rate Limit Burst Interval (pps) (seconds) ---------- ------------- ------------- --------------- 1/0/15 show ip dhcp snooping statistics Use the show ip dhcp snooping statistics command to display the DHCP snooping filtration statistics.
Page 381
User Guidelines The following fields are displayed by this command: Fields Description MAC Verify The number of DHCP messages that were filtered on an Failures untrusted interface because of source MAC address and client MAC address mismatch. Client Ifc The number of DHCP release and Deny messages received on Mismatch the different ports than previously learned.
Dynamic ARP Inspection Commands Dynamic ARP Inspection (DAI) is a security feature that rejects invalid and malicious ARP packets. The feature prevents a class of man-in-the-middle attacks, where an unfriendly station intercepts traffic for other stations by poisoning the ARP caches of its neighbors. The miscreant sends ARP requests or responses mapping another station IP address to its own MAC address.
Default Configuration There are no ARP ACLs created by default. Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command. Example console(config)#arp access-list tier1 clear ip arp inspection statistics Use the clear ip arp inspection statistics command in Privileged EXEC mode to reset the statistics for Dynamic Address Resolution Protocol (ARP) inspection on all VLANs.
Example console#clear ip arp inspection statistics ip arp inspection filter Use the ip arp inspection filter command to configure the ARP ACL to be used for a single VLAN or a range of VLANs to filter invalid ARP packets. If the static keyword is given, packets that do not match a permit statement are dropped without consulting the DHCP snooping bindings.
Configuring none for the limit means the interface is not rate limited for Dynamic ARP Inspection. Syntax seconds ip arp inspection limit {none | rate [burst interval no ip arp inspection limit • none — To set no rate limit. pps —...
Syntax ip arp inspection trust no ip arp inspection trust Default Configuration Interfaces are configured as untrusted by default. Command Mode Interface Configuration (gigabitethernet, port-channel, tengigabitethernet) mode User Guidelines There are no user guidelines for this command. Example console(config-if-1/0/3)#ip arp inspection trust ip arp inspection validate Use the ip arp inspection validate command to enable additional validation checks like source MAC address validation, destination MAC address...
• For validating the IP address of an ARP packet. — Default Configuration There is no additional validation enabled by default. Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command Example console(config)#ip arp inspection validate src-mac dst-mac ip console(config)#ip arp inspection validate src-mac ip console(config)#ip arp inspection validate dst-mac ip console(config)#ip arp inspection validate ip...
User Guidelines There are no user guidelines for this command. Example console(config)#ip arp inspection vlan 200-300 console(config)#ip arp inspection vlan 200-300 logging permit ip host mac host Use the permit ip host mac host command to configure a rule for a valid IP address and MAC address combination used in ARP packet validation.
show arp access-list Use the show arp access-list command to display the configured ARP ACLs with the rules. Giving an ARP ACL name as the argument would display only the rules in that ARP ACL. Syntax acl-name show arp access-list [ acl-name —...
Page 391
Syntax interface-id vlan-range show ip arp inspection [interfaces [ ] | statistics [vlan vlan-range | vlan Parameter Description Parameter Description interfaces Display the Dynamic ARP Inspection configuration on all the interface-id DAI enabled interfaces. Giving an interface argument, it displays the values for that interface. statistics vlan vlan- Display the statistics of the ARP packets processed by Dynamic...
Page 392
DHCP Drops The number of packets dropped due to DHCP Snooping binding database match failure. ACL Drops The number of packets dropped due to ARP ACL rule match failure. DHCP Permits The number of packets permitted due to DHCP snooping binding database match.
VLAN Forwarded Dropped ---- --------- ------- console#show ip arp inspection statistics vlan 10,20 VLAN DHCP DHCP Bad Src Bad Dest Invalid Drops Drops Permits Permits ---- ---------- ---------- ---------- ---------- ---------- ---------- ------ show ip arp inspection vlan Use the show ip arp inspection vlan command to display the Dynamic ARP Inspection configuration on all the VLANs in the given VLAN range.
Page 394
Parameter Description Source Mac Validation If Source Mac validation of ARP frame is enabled. Destination Mac If Destination Mac validation of ARP Response frame is Validation enabled. IP Address Validation If IP address validation of ARP frame is enabled. The following fields are displayed for each VLAN: Field Description VLAN...
E-mail Alerting Commands E-mail Alerting is an extension of the logging system. The PowerConnect logging system allows the user to configure a variety of destinations for log messages. This feature adds e-mail configuration capabilities, by which the log messages are sent to a configured SMTP server such that an operator may receive the log in an e-mail account of their choice.
logging email show logging email statistics logging email urgent clear logging email statistics logging traps security logging email message-type to-addr mail-server ip-address | hostname logging email from-addr port (Mail Server Configuration Mode) logging email message-type subject username (Mail Server Configuration Mode) logging email logtime password (Mail Server Configuration...
Page 397
Parameter Description Parameter Description severity If you specify a severity level, log messages at or above the severity level are e-mailed. The severity level may either be specified by keyword or as an integer from 0 to 7. The accepted keywords, and the numeric severity level each represents, are as follows.
logging email urgent Use the logging email urgent command in Global Configuration mode to set the lowest severity level at which log messages are e-mailed in an urgent manner. To revert the urgent severity level to its default value, use the no form of this command.
Command Mode Global Configuration mode User Guidelines Log messages at or above this severity level are considered urgent. By default, Emergency and Alert log messages are considered urgent. Urgent log messages are e-mailed immediately, one log message per e-mail message, and do not wait for the log time to expire.
Default Configuration The default severity level is info(6). Command Mode Global Configuration mode User Guidelines You can filter log messages that appear in the buffered log by severity level. You can specify the severity level of log messages that are e-mailed. You can use this command to specify the severity level at which SNMP traps are logged, and thus control whether traps appear in the buffered log or are e- mailed and, if they are e-mailed, whether traps are considered urgent or non-...
Command Mode Global Configuration User Guidelines This command removes the configured to-addr field of e-mail. logging email from-addr Use the logging email from-addr command in Global Configuration mode to configure the From address of the e-mail. Use the no form of this command to remove the e-mail source address.
Syntax message-type subject logging email message-type subject message-type no logging email message-type subject Parameter Description This command does not require a parameter description. Default Configuration This command has no default configuration. Command Mode Global Configuration User Guidelines The user must enter the message-type parameter manually as tab and space bar completion do not work for this parameter.
Command Mode Global Configuration User Guidelines This command has no user guidelines. logging email test message-type Use the logging email test message-type command in Global Configuration mode to test whether or not an e-mail is being sent to an SMTP server. Syntax message-type message-body...
show logging email statistics Use the show logging email statistics command in Privileged EXEC mode to show the statistics about the e-mails. The command displays information on how many e-mails are sent, how many e-mails failed, when the last e-mail was sent, how long it has been since the last e-mail was sent, how long it has been since the e-mail changed to disabled mode.
Default Configuration This command has no default configuration. Command Mode Privileged EXEC User Guidelines This command has no user guidelines. security Use the security command in Mail Server Configuration mode to set the e- mail alerting security protocol. This enables and disables the switch to use TLS authentication with the SMTP Server.
mail-server ip-address hostname Use the mail-server ip-address | hostname command in Global Configuration mode to configure the SMTP server IP address and change the mode to Mail Server Configuration mode. The server address can be in the IPv4, IPv6, or DNS name format. Use the no form of this command to remove the configured SMTP server address.
port (Mail Server Configuration Mode) Use the port command in Mail Server Configuration mode to configure the TCP port to use for communication with the SMTP server. Port can be set to 465 or 25. Use the no form of the command to revert the SMTP port to the default port.
Parameter Description This command does not require a parameter description. Default Configuration The default value for username is admin. Command Mode Mail Server Configuration User Guidelines This command has no user guidelines. password (Mail Server Configuration Mode) Use the password command in Mail Server Configuration mode to configure the password required to authenticate to the e-mail server.
show mail-server Use the show mail-server command in Privileged EXEC mode to display the configuration of all the mail servers or a particular mail server. Syntax ip-address hostname show mail-server { | all} Parameter Description This command does not require a parameter description. Default Configuration This command has no default configuration.
Page 410
SMTP server authentication details: Username: admin Mail server2 configuration: SMTP server IP Address: 10.131.1.31 SMTP server Port: SMTP server security protocol: SMTP server authentication details: Username: admin console#show mail-server ip-address 10.131.1.11 SMTP server IP Address: 10.131.1.11 SMTP server Port: SMTP server security protocol: SMTP server authentication details: Username: admin...
Ethernet Configuration Commands PowerConnect switches support a variety of configuration options to optimize network operations. Features such as flow-control and jumbo frames are supported along with a variety of commands to display traffic statistics as well as limit the effects of network loops or other network issues. Jumbo frame technology is employed in certain situations to reduce the task load on a server CPU and to transmit large amounts of data efficiently.
On a storm control enabled interface, if the ingress rate of that type of packet (L2 broadcast, multicast, or unicast) is greater than the configured threshold level (as a percentage of port speed or as an absolute packets-per-second rate), the switch forwarding-plane discards the excess traffic. speed duplex commands control interface link speeds and auto-...
Command Mode Privileged EXEC mode User Guidelines Use of the clear counters command with no parameters indicates that both switch and all interface statistics are to be cleared. Example In the following example, the counters for port 1/0/1 are cleared. console#clear counters gigabitethernet 1/0/1 description Use the description command in Interface Configuration mode to add a...
Example The following example adds a description to the Ethernet port 5. console(config)#interface gigabitethernet 1/0/5 console(config-if-1/0/5)# description RD_SW#3 duplex Use the duplex command in Interface Configuration mode to configure the duplex operation of a given Ethernet interface. To restore the default, use the no form of this command.
parameter. Fiber ports do not support auto-negotiation and therefore require the operator to enter the duplex full command and the speed command with the desired operating bandwidth. Disabling auto-negotiation on 1G copper ports may lead to random frame loss as the clock master has not been arbitrated by the auto-negotiation process.
interface Use this command to configure parameters for the gigabit Ethernet and ten- gigabit Ethernet ports, and for port-channels. While in Global Configuration mode, enter the interface command (with a specific interface). To exit to Global Configuration mode, enter exit. To return to Privileged EXEC mode, press Ctrl-Z or enter end.
interface range Use the interface range command in Global Configuration mode to execute a command on multiple ports at the same time. NOTE: An additional form of this command enables configuring a range of VLANs. interface range vlan. Syntax port-rang port-type interface range { all}...
Page 418
console(config-if-range)# The following example shows how all gigabitethernet ports can be configured at once. console(config)# interface range gigabitethernet all console(config-if-range)# The following examples demonstrate various valid interface ranges: console(config)#interface range gigabitEthernet 1/0/1-20 console(config)#interface range gi1/0/20-48 console(config)#interface range gi1/0/1,gi1/0/48 console(config)#interface range gi2/0/1-10,gi1/0/30 console(config)#interface range gi1/0/1-10,gi1/0/30-48 console(config)#interface range gi1/0/1,te1/1/1 console(config)#interface range gigabitEthernet...
User Guidelines Because the switch does not fragment frames, received frames that are larger than the MTU setting are dropped. Packets originated by the CPU are fragmented on transmission if the link MTU is smaller than the IP MTU. Setting the MTU less than the IPv4 MTU causes CPU-generated IPv4 packets to be fragmented.
Page 420
User Guidelines The priority resolution field indicates the auto-negotiated link speed and duplex. The clock field indicates whether the local interface has auto- negotiated to clock master or clock slave. When the link is down, the field will show No link. When the link is down, the Oper Peer Advertisement and Priority Resolution fields will show dashes.
Port: Gi1/0/1 Type: Gigabit - Level Link State: Down Auto Negotiation: Enabled 802.3az EEE: Disabled Clock: Master 1000f 1000h 100f 100h 10f 10h ----- ----- ---- ---- --- --- Admin Local Link Advertisement no yes no Oper Local Link Advertisement yes no Oper Peer Advertisement yes yes...
Page 422
Example The following example displays the configuration for all configured interfaces: console>show interfaces configuration Port Type Duplex Speed Admin State ----- ------------------------------ ------ ------- ---- ----- 1/0/1 Gigabit - Level Full Auto 1/0/2 Gigabit - Level Unknown Auto 1/0/3 Gigabit - Level Unknown Auto 1/0/4...
Field Description Port Type The port designated IEEE shorthand identifier. For example 1000Base-T refers to 1000 Mbps baseband signaling including both Tx and Rx transmissions. Duplex Displays the port Duplex status. Speed Refers to the port speed. Describes the Auto-negotiation status. Admin State Displays whether the port is enabled or disabled.
Page 424
3/0/1 123899 1788 Port OutOctets OutUcastPkts ---- ---------- --------- 1/0/1 9188 2/0/1 3/0/1 8789 InOctets InUcastPkts ---- ---------- --------- 27889 OutOctets OutUcastPkts ---- ---------- --------- 23739 The following example displays counters for Ethernet port 1/0/1. console(config-if-Te1/0/1)#show interfaces counters te1/0/1 Port InOctets InUcastPkts InMcastPkts...
Page 425
Excessive Collisions: ......0 Multiple Collisions: ......0 Oversize Packets: ......0 Internal MAC Rx Errors: ....... 0 Received Pause Frames: ......0 Transmitted Pause Frames: ..... 0 Received PFC Frames: ......0 Transmitted PFC Frames: ....... 0 The following table describes the fields shown in the display: Field Description InOctets...
Field Description Oversize Packets Counted frames received that exceed the maximum permitted frame size. Internal MAC Rx Errors A count of frames for which reception fails due to an internal MAC sublayer receive error. Received Pause Frames A count of MAC Control frames received with an opcode indicating the PAUSE operation.
Example The following example displays the description for all interfaces. console>show interfaces description Port Description ---- ------------------------------------------------ 1/0/1 Port that should be used for management only 2/0/1 2/0/2 Description ---- ----------- Output show interfaces detail Use the show interfaces detail command in Privileged EXEC mode to display detailed status and configuration of the specified interface.
Page 428
User Guidelines This command has no user guidelines. Example The following example displays detailed status and configuration of the specified interface. console#show interfaces detail gi1/0/1 Port Type Duplex Speed Admin Link State State ----- ------------------------------ ------ ------- ---- ----- ----- Gi1/0/1Gigabit - Level Unknown Auto...
Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines Port channels are only displayed if configured. Use the show interfaces port- channel command to display configured and unconfigured port channels. Interfaces configured as stacking ports will show as detached in the output of show interfaces status command.
Page 431
Parameter Description Parameter Description unit/slot/port A valid interface. See Interface Naming Conventions interface representation. switchport Displays statistics for the entire switch. Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines.
Page 432
Packets RX and TX 512-1023 Octets....0 Packets RX and TX 1024-1518 Octets..... 0 Packets RX and TX 1519-2047 Octets..... 0 Packets RX and TX 2048-4095 Octets..... 0 Packets RX and TX 4096-9216 Octets..... 0 Total Packets Received Without Errors..0 Unicast Packets Received.......
Page 433
Packets Transmitted > 1518 Octets....0 Max Frame Size......... 1518 Total Packets Transmitted Successfully..0 Unicast Packets Transmitted....0 Multicast Packets Transmitted....0 Broadcast Packets Transmitted....0 Total Transmit Errors......0 Total Transmit Packets Discarded....0 Single Collision Frames......0 Multiple Collision Frames......
show statistics switchport Use the show statistics command in Privileged EXEC mode to display detailed statistics for a specific port or for the entire switch. Syntax interface-id show statistics { |switchport} Parameter Description Parameter Description interface-id Interface id. See Interface Naming Conventions for interface representation.
Page 435
Broadcast Packets Received..... 0 Receive Packets Discarded...... 0 Octets Transmitted......0 Packets Transmitted Without Errors..... 0 Unicast Packets Transmitted....0 Multicast Packets Transmitted....0 Broadcast Packets Transmitted....0 Transmit Packets Discarded..... 0 Most Address Entries Ever Used....3 Address Entries Currently in Use....3 Maximum VLAN Entries......
show storm-control Use the show storm-control command in Privileged EXEC mode to display the configuration of storm control. Syntax show storm-control [all | {gigabitethernet unit/slot/port | tengigabitethernet unit/slot/port }] Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines.
shutdown Use the shutdown command in Interface Configuration mode to disable an interface. To restart a disabled interface, use the no form of this command. Syntax shutdown no shutdown Default Configuration The interface is enabled. Command Mode Interface Configuration (Ethernet, Port-Channel, Tunnel, Loopback) mode User Guidelines This command has no user guidelines.
Page 438
Syntax speed {10 | 100 | 1000 | 10000 | auto [10 | 100 | 1000 | 10000]} no speed Parameter Description Parameter Description Configures the port to 10 Mbps operation. Configures the port to 100 Mbps operation. 1000 Configures the port to 1000 Mbps operation. 10000 Configures the port to 10 Gbps operation.
support all speeds, even if they are available in the command. Entering an unsupported speed will produce the following error message An invalid interface has been used for this function. Fiber ports do not support auto-negotiation. Both ends of fiber connections must be set to full-duplex and the same speed.
Example console(config-if-1/0/1)#storm-control broadcast level 5 storm-control multicast Use the storm-control multicast command in Interface Configuration mode to enable multicast storm recovery mode for an interface. If the mode is enabled, multicast storm recovery is active, and if the rate of L2 multicast traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped.
storm-control unicast Use the storm-control unicast command in Interface Configuration mode to enable unknown unicast storm control for an interface. If the mode is enabled, unicast storm recovery is active, and if the rate of unknown L2 unicast (destination lookup failure) traffic ingressing on an interface increases beyond the configured threshold, the traffic will be dropped.
switchport protected Use the switchport protected command in Interface Configuration mode to groupid configure a protected port. The parameter identifies the set of protected ports to which this interface is assigned. You can only configure an interface as protected in one group. You are required to remove an interface from one group before adding it to another group.
switchport protected name Use the switchport protected name command in Global Configuration mode to adds the port to the protected group 1 and also sets the group name to "protected". Syntax groupid name switchport protected name groupid no switchport protected name groupid —...
show switchport protected Use the show switchport protected command in Privileged EXEC mode to display the status of all the interfaces, including protected and unprotected interfaces. Syntax groupid show switchport protected groupid — Identifies which group the port is to be protected in. •...
Ethernet CFM Commands Connectivity Fault Management (CFM) is the OAM Protocol provision for end-to-end service layer OAM in carrier Ethernet networks. CFM provides mechanisms to support the operator in performing connectivity checks, fault detection, fault verification and isolation, and fault notification per service in the network domain of interest.
ethernet cfm mep archive-hold-time show ethernet cfm statistics ethernet cfm mip level debug cfm ethernet cfm domain Use the ethernet cfm domain command in Global Configuration mode to enter into maintenance domain config mode for an existing domain. Use the optional level parameter to create a domain and enter into maintenance domain config mode.
User Guidelines Each domain must have a unique name and level, for example, one cannot create a domain qwerty at level 2 if domain qwerty already exists at level 1. Likewise, one cannot create a domain dvorak at level 2 if a domain of any name exists at level 2.
Command Mode Maintenance domain config mode User Guidelines This command has no user guidelines. Example console(config-cfm-mdomain)#service serv1 vlan 10 ethernet cfm cc level Use the ethernet cfm cc level command in Global Configuration mode to initiate sending continuity checks (CCMs) at the specified interval and level on a VLAN monitored by an existing domain.
Default Configuration CCMs are not sent by default. Command Mode Global Configuration mode User Guidelines This command has no user guidelines. Example console(config)#ethernet cfm cc level 1 vlan 15 interval 10 ethernet cfm mep level Use the ethernet cfm mep level command in Interface Configuration mode to create a Maintenance End Point (MEP) on an interface at the specified level and direction.
Command Mode Interface Configuration User Guidelines This command has no user guidelines. Example The following example creates a maintenance endpoint at level 1 with mpid 1010 on vlan 10. console(config-if-Gi1/0/3)#ethernet cfm mep level 1 direction up mpid 1010 vlan 10 ethernet cfm mep enable Use the ethernet cfm mep enable command in Interface Configuration mode to enable a MEP at the specified level and direction.
User Guidelines The maintenance domain must exist for it to be enabled. Example The following example enables a maintenance endpoint at level 1 with mpid 1010 on vlan 10. console(config-if-Gi1/0/3)#ethernet cfm mep enable level 1 vlan 10 mpid 1010 ethernet cfm mep active Use the ethernet cfm mep active command in Interface Configuration mode to activate a MEP at the specified level and direction.
ethernet cfm mep archive-hold-time Use the ethernet cfm mep archive-hold-time command in Interface Configuration mode to maintain internal information on a missing MEP. Use the no form of the command to return the interval to the default value. Syntax hold-time ethernet cfm mep archive-hold-time Parameter Description Parameter...
Syntax ethernet cfm mip level Parameter Description Parameter Description level Maintenance association level Default Configuration No MIPs are preconfigured. Command Mode Interface Configuration User Guidelines This command has no user guidelines. Example console(config-if-gi1/0/1)# ethernet cfm mip level <7> ping ethernet cfm Use the ping ethernet cfm command in Privileged EXEC mode to generate a loopback message (LBM) from the configured MEP .
Parameter Description mac-addr The destination MAC address for which the connectivity needs to be verified. Either MEP ID or the MAC address option can be used. remote-mpid The MEP ID for which connectivity is to be verified; i.e. the destination MEP ID. domain Name of the maintenance domain (an alphanumeric string of up to 43 characters in length).
Page 455
Syntax mac-addr 1-8191 traceroute ethernet cfm {mac | remote-mpid } {domain domain name vlan-id 1-8191 1-255 | level } vlan mpid [ttl Parameter Description Parameter Description level Maintenance association level mac-addr The destination MAC address for which the route needs to be traced.
show ethernet cfm errors Use the show ethernet cfm errors command in Privileged EXEC mode to display the cfm errors. Syntax domain-id show ethernet cfm errors {domain | level Parameter Description Parameter Description domain Name of the maintenance domain (an alphanumeric string of up to 43 characters in length).
Syntax domain-id show ethernet cfm domain {brief | Parameter Description Parameter Description domain Name of the maintenance domain (an alphanumeric string of up to 43 characters in length). Default Configuration This command has no default configuration. Command Mode Privileged EXEC, Config mode and all Config sub-modes User Guidelines This command has no user guidelines.
Page 458
Syntax interface- show ethernet cfm maintenance-points local {level | interface domain-name | domain Parameter Description Parameter Description domain Name of the maintenance domain (an alphanumeric string of up to 43 characters in length). level Maintenance association level interface-id Show all MPs associated with the interface. Default Configuration This command has no default configuration.
MEP Id RMEP Id Level VLAN Expiry Timer(sec) Service Id ------ ------- ----- ----------------- ---- ----------------- ----------- 00:11:22:33:44:55 10 serv1 show ethernet cfm statistics Use the show ethernet cfm maintenance-points remote command in Privileged EXEC mode to display the CFM statistics. Syntax domain-name show ethernet cfm statistics [domain...
Green Ethernet Commands PowerConnect switches support various Green Ethernet modes, i.e., power saving modes, namely: • Energy-Detect Mode • Energy Efficient Ethernet These modes can enable significant operational cost reductions through direct power savings and reducing cooling costs. Energy-Detect Mode With this mode enabled, when the port link is down the PHY automatically goes down for short periods of time and then wakes up periodically to check for link pulses.
– green-mode energy-detect This command enables a Dell proprietary mode of power reduction on ports that are not connected to another interface. Use the green-mode energy- detect command in Interface Configuration mode to enable energy-detect mode on an interface or all the interfaces. Energy-detect mode is disabled by default on 1G copper interfaces and enabled by default on 10G copper interfaces.
User Guidelines Cable diagnostics (show copper-ports commands) may give misleading results if green mode is enabled on the port. Disable green mode prior to running any cable diagnostics. green-mode eee Use the green-mode eee command in Interface Configuration mode to enable EEE low power idle mode on an interface.
clear green-mode statistics Use the clear green-mode statistics command in Privileged EXEC mode to clear: • The EEE LPI event count, and LPI duration • The EEE LPI history table entries • The Cumulative Power savings estimates for a specified interface or for all the interfaces based upon the argument. Syntax interface-id clear green-mode statistics {...
Page 469
Syntax 30 sec 36000 sec green-mode eee-lpi-history {sampling-interval – | max- samples Parameter Description Parameter Description sampling-interval The interval in seconds at which power consumption data needs to be collected. max-samples Maximum number of samples to keep. Default Configuration The sampling-interval default value is 3600 seconds and the max-samples default value is 168.
Page 470
interface-id show green-mode interface-id Use the show green-mode command in Privileged EXEC mode to display the green-mode configuration and operational status of the port. This command is also used to display the per port configuration and operational status of the green-mode. The status is shown only for the modes supported on the corresponding hardware platform whether enabled or disabled.
Page 471
Term Description Reason for Energy- The energy detect mode may be administratively enabled, but detect current the operational status may be inactive. The possible reasons are: operational status Port is currently operating in the fiber mode Link is up. If the energy-detect operational status is active, then the reason field shows up as: No energy Detected EEE Admin Mode...
Page 472
Term Description Tw_sys_rx Echo Integer that indicates the remote systems Receive Tw_sys that (μSec) was used by the local system to compute the Tw_sys that it can support. This value maps into the aLldpXdot3LocRxTwSysEcho attribute. Fallback Tw_sys Integer that indicates the value of fallback Tw_sys that the local (μSec) system requests from the remote system.
Page 473
Term Description Time Since Time Since Counters Last Cleared (since the time of power up, Counters Last or after clear eee counters is executed) Cleared Example console#show green-mode gi1/0/1 Energy Detect Admin Mode... Enabled Operational Status..... Active Reason......No Energy Detected Auto Short Reach Admin Mode....
Remote Tw_sys_tx Echo(usec)..XX Remote Tw_sys_rx (usec)....XX Remote Tw_sys_tx Echo(usec)..XX Remote fallback Tw_sys (usec)..XX Tx DLL enabled......Yes Tx DLL ready......Yes Rx DLL enabled......Yes Rx DLL ready......Yes Power Saving (%)...... XX Time Since Counters Last Cleared..1 day 20 hr 47 min 34 sec show green-mode Use the show green-mode command in Privileged EXEC mode to display the...
User Guidelines This command output provides the following information. Term Description Energy Detect Energy-detect Energy-detect Admin mode is enabled or disabled. Config Energy-detect Opr Energy detect mode is currently active or inactive. The energy detect mode may be administratively enabled, but the operational status may be inactive.
Page 476
Parameter Description Parameter Description interface-id Any valid interface. See Interface Naming Conventions interface representation. Default Configuration This command has no default configuration. Command Mode Privileged EXEC User Guidelines On combo ports, samples are only collected on the copper ports when enabled.
Page 477
Example This example is on a platform capable of providing power consumption details. Percentage of Percentage of SampleTime Since Time Spent in Time Spent in No. the SampleLPI Mode SinceLPI Mode Since Was Recorded Last SampleLast Reset ------ -------------- -------------- -------------- 0d:00:00:13 0d:00:00:44...
GVRP Commands GARP VLAN Registration Protocol (GVRP) is used to propagate VLAN membership information throughout the network. GVRP is based on the Generic Attribute Registration Protocol (GARP), which defines a method of propagating a defined attribute (that is, VLAN membership) throughout the network.
Syntax port- clear gvrp statistics [{gigabitethernet unit/slot/port | port-channel channel-number | tengigabitethernet unit/slot/port }] Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines This command has no user guidelines. Example The following example clears all the GVRP statistics information on port 1/0/8.
Default Configuration The default timer values are as follows: • Join timer — 20 centiseconds • Leave timer — 60 centiseconds • Leaveall timer — 1000 centiseconds Command Mode Interface Configuration (gigabitethernet, port-channel, tengigabitethernet) mode User Guidelines relationships The following for the various timer values must be maintained: •...
Default Configuration GVRP is globally disabled. Command Mode Global Configuration mode User Guidelines This command has no user guidelines. Example The following example globally enables GVRP on the device. console(config)#gvrp enable gvrp enable (interface) Use the gvrp enable command in Interface Configuration mode to enable GVRP on an interface.
Membership in untagged VLAN would be propagated in a same way as a tagged VLAN. In such cases it is the administrator’s responsibility to set the PVID to be the untagged VLAN VID. Example The following example enables GVRP on gigabit ethernet 1/0/8. console(config)#interface gigabitethernet 1/0/8 console(config-if-1/0/8)#gvrp enable gvrp registration-forbid...
console(config-if-1/0/8)#gvrp registration-forbid gvrp vlan-creation-forbid Use the gvrp vlan-creation-forbid command in Interface Configuration mode to disable dynamic VLAN creation. To enable dynamic VLAN creation, use the no form of this command. Syntax gvrp vlan-creation-forbid no gvrp vlan-creation-forbid Default Configuration By default, dynamic VLAN creation is enabled. Command Mode Interface Configuration (gigabitethernet, port-channel, tengigabitethernet) mode...
Page 485
Syntax port- show gvrp configuration [{gigabitethernet unit/slot/port | port-channel channel-number | tengigabitethernet unit/slot/port}] Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example shows how to display GVRP configuration information:...
show gvrp error-statistics Use the show gvrp error-statistics command in User EXEC mode to display GVRP error statistics. Syntax port- show gvrp error-statistics [{gigabitethernet unit/slot/port| port-channel channel-number | tengigabitethernet unit/slot/port }] Default Configuration This command has no default configuration. Command Mode User EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines.
---- ------- ------- ------- ------- -------- 1/0/1 1/0/2 1/0/3 1/0/4 show gvrp statistics Use the show gvrp statistics command in User EXEC mode to display GVRP statistics. Syntax port- show gvrp statistics [{gigabitethernet unit/slot/port| port-channel channel-number | tengigabitethernet unit/slot/port }] Default Configuration This command has no default configuration.
Page 488
: Join Empty Sent : Join In Sent sEmp : Empty Sent sLIn : Leave In Sent : Leave Empty Sent : Leave All Sent Port rJIn rEmp rLIn sJIn sEmp sLIn ---- ---- ---- ---- ---- ---- --- 1/0/1 1/0/2 1/0/3 1/0/4...
IGMP Snooping Commands Snooping of Internet Group Management Protocol (IGMP) messages is a feature that allows PowerConnect switches to forward multicast traffic intelligently on the switch. Multicast traffic is traffic that is destined to a host group. Host groups are identified by the destination MAC address, i.e. the range 01:00:5e:00:00:00-01:00:5e:7f:ff:ff:ff for IPv4 multicast traffic or 33:33:xx:xx:xx:xx for IPv6 multicast traffic.
and thus not detectable by the switch. If a query is not received on an interface within a specified length of time (multicast router present expiration time), that interface is removed from the list of interfaces with multicast routers attached. The multicast router present expiration time is configurable using management.
Page 491
Parameter Description Parameter Description vlan-id Specifies a VLAN ID value. Default Configuration IGMP snooping is enabled globally and on all VLANs by default. Command Mode Global Configuration mode User Guidelines Use this command without parameters to globally enable IGMP snooping. Use the no form of the command to disable IGMP snooping.
show ip igmp snooping Use the show ip igmp snooping command in Privileged EXEC mode to display the IGMP snooping configuration. Syntax vlan-id show ip igmp snooping [vlan Parameter Description Parameter Description vlan-id Specifies a VLAN ID value (available only in Privileged EXEC mode).
Default Configuration This command has no default configuration. Command Mode User EXEC mode, Config mode and all Config sub-modes User Guidelines To see the full Multicast address table (including static addresses) use the show mac address-table command. Example The example shows Multicast groups learned by IGMP snooping for all VLANs.
Syntax show ip igmp snooping mrouter Default Configuration This command has no default configuration. Command Mode User EXEC, Privileged EXEC modes, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example shows IGMP snooping mrouter information. console#show ip igmp snooping mrouter VLAN ID Port...
Syntax vlan-id ip igmp snooping vlan immediate-leave vlan-id no ip igmp snooping vlan immediate-leave vlan id — Number assigned to the VLAN. • Default Configuration IGMP snooping immediate-leave mode is disabled on VLANs by default. Command Mode Global Configuration mode User Guidelines This command has no user guidelines.
• time — IGMP group membership interval time in seconds. (Range: 2–3600) Default Configuration The default group membership interval time is 260 seconds. Command Mode Global Configuration mode User Guidelines This command has no user guidelines. Example The following example configures an IGMP snooping group membership interval of 1500 seconds on VLAN 2.
Default Configuration The default maximum response time is 10 seconds. Command Mode Global Configuration mode User Guidelines When using IGMP Snooping Querier, this parameter should be less than the value for the IGMP Snooping Querier query interval. Example The following example sets the maximum response time to 7 seconds on VLAN 2.
Command Mode Global Configuration mode User Guidelines The mcrexpiretime should be less than the group membership interval. Example The following example sets the multicast router present expiration time on VLAN 2 to 60 seconds. console(config)#ip igmp snooping vlan 2 mcrtexpiretime 1500 ip igmp snooping report-suppression This command enables IBMP report suppression on a specific VLAN.
Example The following example sets the multicast router present expiration time on VLAN 2 to 60 seconds. console(config)#ip igmp snooping report suppression vlan 10 ip igmp snooping unregistered floodall This command enables flooding of unregistered multicast traffic to all ports in the VLAN.
Page 501
Syntax vlan-id interface-id ip igmp snooping vlan mrouter interface no ip igmp snooping vlan mrouter vlan id — The number assigned to the VLAN. • • interface-id—The next-hop interface to the multicast router. Default Configuration There are no multicast router ports configured by default. Command Mode Global Configuration mode.
IGMP Snooping Querier Commands The IGMP/MLD Snooping Querier is an extension to the IGMP/MLD Snooping feature. IGMP/MLD Snooping Querier allows the switch to simulate an IGMP/MLD router in a Layer 2-only network, thus removing the need to have an IGMP/MLD Router to collect and refresh the multicast group membership information.
Page 504
source address when generating periodic queries. The no form of this command disables IGMP Snooping Querier on the system. Use the optional address parameter to set or reset the querier address. If a VLAN has IGMP Snooping Querier enabled, and IGMP Snooping is operationally disabled on the VLAN, IGMP Snooping Querier functionality is disabled on that VLAN.
Example The following example enables IGMP snooping querier in Global Configuration mode. console(config)#ip igmp snooping querier vlan 1 address 10.19.67.1 ip igmp snooping querier election participate This command enables the Snooping Querier to participate in the Querier Election process when it discovers the presence of another Querier in the VLAN.
console(config)#ip igmp snooping querier election participate ip igmp snooping querier query-interval This command sets the IGMP Querier Query Interval time, which is the amount of time in seconds that the switch waits before sending another periodic query. The no form of this command sets the IGMP Querier Query Interval time to its default value.
Syntax seconds ip igmp snooping querier timer expiry no ip igmp snooping querier timer expiry seconds — The time in seconds that the switch remains in Non-Querier • mode after it has discovered that there is a multicast querier in the network.
Command Mode Global Configuration mode User Guidelines This command has no user guidelines. Example The following example sets the IGMP version of the querier to 1. console(config)#ip igmp snooping querier version 1 show ip igmp snooping querier This command displays IGMP Snooping Querier information. Configured information is displayed whether or not IGMP Snooping Querier is enabled.
Page 509
Parameter Description Source IP Address Shows the IP address that is used in the IPv4 header when sending out IGMP queries. It can be configured using the appropriate command. Query Interval Shows the amount of time in seconds that a Snooping Querier waits before sending out the periodic general query.
When the optional argument detail is used, the command shows the global information and the information for all Querier enabled VLANs. Default Configuration This command has no default configuration. Command Mode User EXEC, Privileged Exec modes User Guidelines This command has no user guidelines. Example The following example shows querier information for VLAN 2.
IP Addressing Commands Interfaces on the PowerConnect switches support a variety of capabilities to support management of the switch. In addition to performing switching and routing of network traffic, PowerConnect switches act as a host for management of the switch. Commands in this category allow the network operator to configure the local host address, utilize the embedded DHCP client to obtain an address, resolve names to addresses using DNS servers, and detect address conflicts on the local subnet.
clear host Use the clear host command in Privileged EXEC mode to delete entries from the host name-to-address cache. Syntax name clear host { | *} name — Host name to be deleted from the host name-to-address cache. • (Range: 1-255 characters) •...
Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines This command has no user guidelines. Example console# console#configure console(config)#clear ip address-conflict-detect interface out-of-band Use the interface out-of-band command to enter into OOB interface configuration mode. Syntax Description interface out-of-band Default Configuration...
console(config-if)# ip address (Out-of-Band) Use the ip address command in Interface Configuration mode to set an IP address for the out-of-band interface. Use the no form of this command to return the ip address configuration to its default value. Syntax ip-address mask prefix-length...
In order to ensure the security of the switches from intruders, it is strongly recommended that the out-of-band interface be isolated on a physically separate network from the in-band ports. Example The following examples configure the out-of-band interface with an IP address 131.108.1.27 and subnet mask 255.255.255.0 and the same IP address with prefix length of 24 bits.
console#configure console(config)#ip address-conflict-detect run ip address dhcp (Interface Config) Use the ip address dhcp command in Interface (VLAN) Configuration mode to enable the DHCPv4 client on an interface. Syntax ip address dhcp no ip address dhcp Parameter Description This command does not require a parameter description. Default Configuration DHCPv4 is disabled by default on routing interfaces.
• The IPv4 address of a default gateway. If the device learns different default gateways on different interfaces, the system uses the first default gateway learned. The system installs a default route in the routing table, with the default gateway’s address as the next hop address. This default route has a preference of 254.
Command Mode Global Configuration mode User Guidelines When the system does not have a more specific route to a packet’s destination, it sends the packet to the default gateway. The system installs a default IPv4 route with the gateway address as the next hop address. The route preference is 253.
(Range: 1-255 characters). Default Configuration This command has no default configuration. Command Mode Global Configuration mode User Guidelines This command has no user guidelines. Example The following example defines a default domain name of dell.com. console(config)#ip domain-name dell.com IP Addressing Commands...
Example The following example defines a static host name-to-address mapping in the host cache. console(config)#ip host accounting.dell.com 176.10.23.1 ip name-server Use the ip name-server command in Global Configuration mode to define available IPv4 or IPv6 name servers. To delete a name server, use the no form of this command.
server-address — Valid IPv4 or IPv6 addresses of the name server. (Range: • 1–255 characters) Default Configuration No name server IP addresses are specified. Command Mode Global Configuration mode User Guidelines Server preference is determined by entry order. Up to eight servers can be defined in one command or by using multiple commands.
Page 522
autoconfig—Use this keyword to set the IPv6 address auto configuration • mode. • dhcp—Use this keyword to obtain an IPv6 address via DHCP. Default Configuration There is no IPv6 address configured by default. Command Mode Interface Configuration mode (VLAN, loopback, port-channel) User Guidelines When setting the prefix length on an IPv6 address, no space can be present between the address and the mask.
console(config)#no ipv6 address ipv6 address (OOB Port) Use the ipv6 address command in Interface (out-of-band) Config mode to set the IPv6 prefix on the out-of-band port. If a prefix is specified, the address will be configured using the prefix and length A link local address in EUI-64 format may also be assigned.
User Guidelines When DHCPv6 is enabled on the Out-of-Band interface, the system automatically deletes all manually configured IPv6 addresses on the interface. DHCPv6 can be enabled on the Out-of-Band interface only when IPv6 auto configuration or DHCPv6 is not enabled on any of the in-band management interfaces.
This command will fail if DHCPv6 server has been configured on the interface. Examples In the following example, DHCPv6 is enabled on interface vlan2. console#config console(config)#interface vlan2 console(config-if-vlan2)#ipv6 address dhcp ipv6 enable (Interface Config) Use the ipv6 enable command in Interface Config mode to enable IPv6 on a routing interface.
ipv6 enable (OOB Config) Use the ipv6 enable command in Interface (out-of-band) Config mode to enable IPv6 operation on the out-of-band interface. Prefixes configured by the ipv6 address command are not configured until the interface is enabled. Syntax ipv6 enable no ipv6 enable Default Configuration By default, IPv6 is not enabled on the out-of-band port.
Default Configuration By default, no IPv6 gateway is configured. Command Mode Interface (out-of-band) Configuration mode User Guidelines There are no user guidelines for this command. show hosts Use the show hosts command in User EXEC mode to display the default domain name, a list of name server hosts, and the static and cached list of host names and addresses.
Host Addresses -------------------------- ---------------------------- accounting.gm.com 176.16.8.8 Cache: TTL (Hours) Host Total Elapsed Type Addresses ---------------- ----- ------- ------- ------------- www.stanford.edu 171.64.14.203 show ip address-conflict Use the show ip address-conflict command in User EXEC or Privileged EXEC mode to display the status information corresponding to the last detected address conflict.
Term Description Last Conflicting IP The IP address that was last detected as conflicting on any Address interface. Last Conflicting The MAC Address of the conflicting host that was last detected MAC Address on any interface. Time Since Conflict The time in days, hours, minutes, and seconds since the last Detected address conflict was detected.
Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example console#show ip helper-address IP helper is enabled Interface UDP Port Discard Hit Count Server Address -------------------- ----------- ---------- ---------- ---------------- vlan 25...
User Guidelines This command has no user guidelines. Example console#show ipv6 dhcp interface out-of-band statistics DHCPv6 Client Statistics ------------------------- DHCPv6 Advertisement Packets Received..0 DHCPv6 Reply Packets Received....0 Received DHCPv6 Advertisement Packets Discard.. 0 Received DHCPv6 Reply Packets Discarded..0 DHCPv6 Malformed Packets Received....
Page 532
Parameter Description Parameter Description ipv6-address An IPv6 address (not a prefix). Default Configuration This command has no default configuration. Command Mode Privileged EXEC, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example console(config-if)#do show ipv6 interface out-of-band IPv6 Administrative Mode..Enabled IPv6 Prefix is....FE80::21E:C9FF:FEAA:AD79/64 ::/128...
IPv6 Access List Commands Access to a switch or router can be made more secure through the use of Access Control Lists (ACLs) to control the type of traffic allowed into or out of specific ports. An ACL consists of a series of rules, each of which describes the type of traffic to be processed and the actions to take for packets that meet the classification criteria.
deny permit (IPv6 ACL) This command creates a new rule for the current IPv6 access list. Each rule is appended to the list of configured rules for the list. A rule may either deny or permit traffic according to the specified classification fields.
Page 535
Parameter Description every Allows all protocols. icmpv6 | ipv6 | tcp Protocol to match, specified as keywords icmp, igmp, ipv6, tcp, | udp | udp or as a standard protocol number from 1–255. protocolnumber sourceipv6 any | any matches any source IP address. Or, you can specify a source prefix IPv6 addressed expressed as a prefix/prefixlength.
Default Configuration This command has no default configuration. Command Mode IPv6-Access-List Configuration mode User Guidelines Users are permitted to add rules, but if a packet does not match any user- specified rules, the packet is dropped by the implicit “deny all” rule. The 'no' form of this command is not supported, since the rules within an IPv6 ACL cannot be deleted individually.
name no ipv6 access-list name — Alphanumeric string of 1 to 31 characters uniquely identifying • the IPv6 access list. Default Configuration There is no default configuration for this command. Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command Example The following example creates an IPv6 ACL named "DELL_IP6"...
Command Mode Global Configuration mode User Guidelines There are no user guidelines for this command. Example console(Config)#ipv6 access-list rename DELL_IP6 DELL_IP6_NEW_NAME ipv6 traffic-filter The ipv6 traffic-filter command either attaches a specific IPv6 Access Control List (ACL) to an interface or associates it with a VLAN ID in a given direction.
Default Configuration This command has no default configuration. Command Modes Global Configuration mode Interface Configuration (Ethernet, Port-channel, VLAN) mode User Guidelines This command specified in 'Interface Config' mode only affects a single interface, whereas the 'Global Config' mode setting is applied to all interfaces. Example The following example attaches an IPv6 access control list to an interface.
Page 540
Command Mode User EXEC, Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines There are no user guidelines for this command. Example The following example displays configuration information for the IPv6 ACLs. console#show ipv6 access-lists Current number of all ACLs: 1 Maximum number of all ACLs: 100 IPv6 ACL Name Rules Direction...
Page 541
Rule Number The ordered rule number identifier defined within the IPv6 ACL. Action Displays the action associated with each rule. The possible values are Permit or Deny. Match All Indicates whether this access list applies to every packet. Possible values are True or False. Protocol This displays the protocol to filter for this rule.
IPv6 MLD Snooping Commands In IPv6, Multicast Listener Discover (MLD) snooping performs functions similar to IGMP snooping in IPv4. With MLD snooping, IPv6 multicast data is selectively forwarded to a list of ports that want to receive the data, instead of being flooded to all ports in a VLAN.
ipv6 mld snooping vlan groupmembership- interval The ipv6 mld snooping vlan groupmembership-interval command sets the MLD Group Membership Interval time on a VLAN or interface. The Group Membership Interval time is the amount of time in seconds that a switch waits for a report from a particular group on a particular interface before deleting the interface from the entry.
You should enable immediate-leave admin mode only on VLANs where only one host is connected to each layer 2 LAN port. This prevents the inadvertent dropping of the other hosts that were connected to the same layer 2 LAN port, but were still interested in receiving multicast traffic directed to that group.
Default Configuration Listener message suppression is enabled by default. Command Mode Global Configuration mode. User Guidelines MLD listener message suppression is equivalent to IGMP report suppression. When MLD listener message suppression is enabled, the switch only sends the first report received for a group in response to a query. Listener message suppression is only applicable to MLDv1.
User Guidelines This command has no user guidelines. Example console(config)#ipv6 mld snooping vlan 2 last- listener-query-interval 7 ipv6 mld snooping vlan mcrtexpiretime The ipv6 mld snooping mcrtexpiretime command sets the Multicast Router Present Expiration time. The time is set for a particular interface or VLAN. This is the amount of time in seconds that a switch waits for a query to be received on an interface before the interface is removed from the list of interfaces with multicast routers attached.
ipv6 mld snooping vlan mrouter This command statically configures a port as connected to a multicast router for a specified VLAN. The no form of this command removes the static binding. Syntax vlan-id interface ipv6 mld snooping vlan mrouter interface vlan-id interface no ipv6 mld snooping vlan...
Default Configuration MLD Snooping is enabled globally and on all VLANs by default. Command Mode Global Configuration mode. User Guidelines Use this command without parameters to globally enable MLD Snooping. Use the no form of the command to disable MLD Snooping. Use the vlan parameter to enable MLD Snooping on a specific VLAN.
Page 550
Syntax show ipv6 mld snooping [interface {{gigabitethernet unit/slot/port| port- port-channel-number | tengigabitethernet unit/slot/port }} | vlan channel vlan-id Default Configuration This command has no default configuration Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example With no optional arguments, the command displays the following information:...
• Last Listener Query Interval—Displays the amount of time the switch waits after it sends a query on an interface, participating in the VLAN, because it did not receive a report for a particular group on that interface. This value may be configured. •...
Page 553
Syntax show ipv6 mld snooping mrouter Default configuration This command has no default configuration. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example console# show ipv6 mld snooping mrouter VLAN ID Port -------...
IPv6 MLD Snooping Querier Commands IGMP/MLD Snooping Querier is an extension of the IGMP/MLD Snooping feature. IGMP/MLD Snooping Querier allows the switch to simulate an IGMP/MLD router in a Layer 2-only network, thus removing the need to have an IGMP/MLD Router to collect the multicast group membership information.
ipv6 mld snooping querier Use the ipv6 mld snooping querier command to enable MLD Snooping Querier on the system. Use the no form of this command to disable MLD Snooping Querier. Syntax ipv6 mld snooping querier no ipv6 mld snooping querier Default Configuration MLD Snooping Querier is disabled by default.
Command Mode VLAN Database mode User Guidelines There are no user guidelines for this command. Example console(config-vlan)#ipv6 mld snooping querier 10 ipv6 mld snooping querier address Use the ipv6 mld snooping querier address command to set the global MLD Snooping Querier address. Use the no form of this command to reset the global MLD Snooping Querier address to the default.
ipv6 mld snooping querier election participate Use the ipv6 mld snooping querier election participate command to enable the Snooping Querier to participate in the Querier Election process when it discovers the presence of another Querier in the VLAN. When this mode is enabled, if the Snooping Querier finds that the other Querier's source address is numerically lower than the Snooping Querier's address, it stops sending periodic queries.
ipv6 mld snooping querier query-interval Use the ipv6 mld snooping querier query-interval command to set the MLD Querier Query Interval time. It is the amount of time in seconds that the switch waits before sending another general query. Use the "no" form of this command to reset the Query Interval to the default.
ipv6 mld snooping querier timer expiry timer — The time that the switch remains in Non-Querier mode after it • has discovered that there is a multicast querier in the network. (Range: 60–300 seconds) Default Configuration The default timer expiration period is 60 seconds. Command Mode Global Configuration mode User Guidelines...
Page 561
User Guidelines When the optional argument vlan vlan-id is not used, the command shows the following information: Parameter Description MLD Snooping Querier Indicates whether or not MLD Snooping Querier is Mode active on the switch. Querier Address Shows the IP Address which will be used in the IPv6 header while sending out MLD queries.
Page 562
Operational Version Indicates the version of MLD that will be used while sending out the queries. This is defaulted to MLD v1 and it can not be changed. When the optional argument detail is used, the command shows the global information and the information for all Querier enabled VLANs as well as the following information: Last Querier Address...
IP Source Guard Commands IP Source Guard (IPSG) is a security feature that filters IP packets based on source ID. The source ID may either be source IP address or a {source IP address, source MAC address} pair. The network administrator configures whether enforcement includes the source MAC address.
Syntax ip verify source Default Configuration By default, IPSG is disabled on all interfaces. Command Mode Interface Configuration mode User Guidelines This command has no user guidelines. Example console(config-if-Gi1/0/1)#ip verify source ip verify source port-security Use the ip verify source port-security command in Interface Configuration mode to enable filtering of IP packets matching the source IP address and the source MAC address.
ip verify binding Use the ip verify binding command in Global Configuration mode to configure static bindings. Use the no form of the command to remove the IPSG entry. Syntax macaddr vlan ipaddr interface ip verify binding Default Configuration By default, there will not be any static bindings configured. Command Mode Global Configuration mode User Guidelines...
User Guidelines This command has no user guidelines. Example console#show ip verify interface gigabitethernet 1/0/1 show ip verify source interface Use the show ip verify source interface command in Privileged EXEC mode to display the bindings configured on a particular interface. Syntax show ip verify source interface Default Configuration...
Page 567
Default Configuration There is no default configuration for this command. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example console#show ip source binding IP Source Guard Commands...
iSCSI Optimization Commands iSCSI Optimization provides a means of performing configuration specific to storage traffic and optionally giving traffic between iSCSI initiator and target systems special Quality of Service (QoS) treatment. iSCSI Optimization is best applied to mixed-traffic networks where iSCSI packets constitutes a portion of overall traffic.
iSCSI Optimization borrows ACL lists from the global system pool. ACL lists allocated by iSCSI Optimization reduce the total number of ACLs available for use by the network operator. Enabling iSCSI Optimization uses one ACL list to monitor for iSCSI sessions. Each monitored iSCSI session utilizes two rules from additional ACL lists up to a maximum of two ACL lists.
• When aging time is increased, current sessions will be timed out according to the new value. • When aging time is decreased, any sessions that have been dormant for a time exceeding the new setting will be immediately deleted from the table. All other sessions will continue to be monitored against the new time out value.
Page 572
Default Configuration By default, frames are not remarked. The default vpt setting for iSCSI is 4, which the default class of service dot1p mapping assigns to queue 2. Command Mode Global Configuration mode. User Guidelines The remark option only applies to DSCP values. Remarking is not available for vpt values.
console(config)#iscsi cos dscp 10 remark iscsi enable The iscsi enable command globally enables iSCSI optimization. To disable iSCSI optimization, use the no form of this command. Syntax iscsi enable no iscsi enable Default Configuration iSCSI is enabled by default. Command Mode Global Configuration mode User Guidelines This command modifies the running config to enable flow control on all...
AE Priority = priority configured for iSCSI PFC (the VPT value above). This TLV is sent in addition to any Application Priority TLV information received from the configuration source. If the configuration source is sending iSCSI or FCoE application priority information, it is not necessary to enable iscsi cos to send the iSCSI Application Priority TLV.
Page 575
Parameter Description targetname iSCSI name of the iSCSI target. The name can be statically configured; however, it can be obtained from iSNS or from sendTargets response. The initiator MUST present both its iSCSI Initiator Name and the iSCSI Target Name to which it wishes to connect in the first login request of a new session or connection.
Example The following example configures TCP Port 49154 to target IP address 172.16.1.20. console(config)#iscsi target port 49154 address 172.16.1.20 show iscsi Use the show iscsi command in Privileged EXEC mode to display the iSCSI configuration. Syntax show iscsi Default Configuration There is no default configuration for this command.
------------------------------------------------ iSCSI Static Rule Table ------------------------------------------------ Index TCP Port IP Address IP Address Mask TCP Port Target IP AddressName show iscsi sessions Use the show iscsi sessions command in Privileged EXEC mode to display the iSCSI status. Syntax show iscsi sessions [detailed] •...
Page 578
Target: iqn.103-1.com.storage-vendor:sn.43338. storage.tape:sys1.xyz Session 3: Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12 Session 4: Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10 Console# show iscsi sessions detailed Target: iqn.1993-11.com.disk-vendor:diskarrays.sn.45678 ----------------------------------------------------- Session 1: Initiator: iqn.1992-04.com.os vendor.plan9:cdrom.12.storage:sys1.xyz ----------------------------------------------------- Time started: 17-Jul-2008 10:04:50 Time for aging out: 10 min ISID: 11 Initiator Initiator Target Target IP address TCP port IP address IP port 172.16.1.3 49154 172.16.1.20 30001 172.16.1.4 49155 172.16.1.21 30001...
Page 579
Initiator Initiator Target Target IP address TCP port IP address IP port 172.16.1.30 49200 172.16.1.20 30001 172.16.1.30 49201 172.16.1.21 30001 iSCSI Optimization Commands...
Link Dependency Commands Link dependency allows the link status of a group of interfaces to be made dependent on the link status of other interfaces. The effect is that the link status of a group that depends on another interface either mirrors or inverts the link status of the depended-on interface.
Default Configuration The default configuration for a group is down, i.e. the group members will mirror the depended-on link status by going down when all depended-on interfaces are down. Command Mode Link Dependency mode User Guidelines The action up command will cause the group members to be up when no depended-on interfaces are up.
Example console(config)#link-dependency group 1 console(config-linkDep-group-1)# add gigabitethernet Use this command to add member gigabit Ethernet port(s) to the dependency list. Syntax intf-list add gigabitethernet intf-list — List of Ethernet interfaces in unit/slot/port format. Separate • nonconsecutive ports with a comma and no spaces. Use a hyphen to designate the range of ports.
intf-list — List of Ethernet interfaces in unit/slot/port format. Separate • nonconsecutive ports with a comma and no spaces. Use a hyphen to designate the range of ports. (Range: Valid Ethernet interface list or range) Default Configuration This command has no default configuration. Command Mode Link Dependency mode User Guidelines...
Command Mode Link Dependency mode User Guidelines No specific guidelines Example console(config-depend-1)#add port-channel 10-12 depends-on Use this command to add the dependent Ethernet ports or port channels list. Use the no depends-on command to remove the dependent Ethernet ports or port-channels list.
Examples console(config-linkDep-group-1)#depends-on gigabitethernet 1/0/10 console(config-linkDep-group-1)#depends-on port-channel 6 show link-dependency Use the show link-dependency command to show the link dependencies configured for a particular group. If no group is specified, then all the configured link-dependency groups are displayed. Syntax group GroupId show link-dependency [ ] [detail] Parameter Description...
Page 587
1 Gi4/0/2-3,Gi4/0/5 Gi4/0/10-12 Link Up Up/Down The following command shows link dependencies for group 1 only. console#show link-dependency group 1 GroupId Member Ports Ports Depended On Link Action Group State ------- ----------------------------------------------------- 1 Gi4/0/2-3,Gi4/0/5 Gi4/0/10-12 Link Up Up/Down The following command shows detailed information for group 1. console#show link-dependency group 1 detail GroupId: 1 Link Action: Link UpGroup...
LLDP Commands The IEEE 802.1AB standard defines the Link Layer Discovery Protocol (LLDP). This protocol allows stations residing on an 802 LAN to advertise major capabilities, physical descriptions, and management information to physically adjacent devices, allowing a network management system (NMS) to access and display this information.
The receive function accepts incoming LLDPDU frames and stores information about the remote stations. Both local and remote data may be displayed by the user interface and retrieved using SNMP as defined in the LLDP MIB definitions. The component maintains one remote entry per physical network connection.
Default Configuration By default, data is removed only on system reset. Command Mode Privileged EXEC mode User Guidelines This command has no user guidelines. Example The following example displays how to clear the LLDP remote data. console#clear lldp remote-data clear lldp statistics Use the clear lldp statistics command in Privileged EXEC mode to reset all LLDP statistics.
dcb enable This command enables the sending of DCBX information in LLDP frames. Syntax Description dcb enable no dcb enable Command Mode Global Config mode Default Value The sending of DCBX information in enabled by default. Usage Guidelines Use this command to disable the sending of DCBX information when it is desirable to utilize legacy QoS and disable the automatic configuration of CNAs based on transmitted DCBX information.
Command Mode Interface (Ethernet) Configuration Default Value LLDP-MED is disabled on all supported interfaces. Usage Guidelines No specific guidelines. Example console(config)#interface gigabitethernet 1/0/1 console(config-if-1/0/1)#lldp med lldp med confignotification This command is used to enable sending the topology change notification. Syntax Description lldp med confignotification no lldp med confignotification Parameter Ranges...
Example console(config)#lldp med confignotification lldp med faststartrepeatcount This command is used to set the value of the fast start repeat count. Syntax Description count lldp med faststartrepeatcount no lldp med faststartrepeatcount count — Number of LLDPPDUs that are transmitted when the protocol is •...
Command Mode Interface Configuration (Ethernet) mode User Guidelines This command has no user guidelines. Example The following example displays how to enable remote data change notifications. console(config-if-1/0/3)#lldp notification lldp notification-interval Use the lldp notification-interval command in Global Configuration mode to limit how frequently remote data change notifications are sent. To return the notification interval to the factory default, use the no form of this command.
Example The following example displays how to set the interval value to 10 seconds. console(config)#lldp notification-interval 10 lldp receive Use the lldp receive command in Interface Configuration mode to enable the LLDP receive capability. To disable reception of LLDPDUs, use the no form of this command.
Page 598
Syntax lldp timers [interval transmit-interval] [hold hold-multiplier] [reinit reinit- delay] no lldp timers [interval] [hold] [reinit] transmit-interval — The interval in seconds at which to transmit local data • LLDPDUs. (Range: 5–32768 seconds) hold-multiplier — Multiplier on the transmit interval used to set the TTL •...
lldp transmit Use the lldp transmit command in Interface Configuration mode to enable the LLDP advertise (transmit) capability. To disable local data transmission, use the no form of this command. Syntax lldp transmit no lldp transmit Default Configuration LLDP is enabled on all supported interfaces. Command Mode Interface Configuration (Ethernet) mode User Guidelines...
Default Configuration By default, management address information is not included. Command Mode Interface Configuration (Ethernet) mode User Guidelines This command has no user guidelines. Example The following example displays how to include management information in the LLDPDU. console(config-if-1/0/3)#lldp transmit-mgmt lldp transmit-tlv Use the lldp transmit-tlv command in Interface Configuration mode to specify which optional type-length-value settings (TLVs) in the 802.1AB basic management set will be transmitted in the LLDPDUs.
User Guidelines This command has no user guidelines. Example The following example shows how to include the system description TLV in local data transmit. console(config-if-1/0/3)#lldp transmit-tlv sys-desc show lldp Use the show lldp command in Privileged EXEC mode to display the current LLDP configuration summary.
console#show lldp LLDP transmit and receive disabled on all interfaces show lldp interface Use the show lldp interface command in Privileged EXEC mode to display the current LLDP interface state. Syntax show lldp interface {gigabitethernet unit/slot/port | tengigabitethernet | all} Default Configuration This command has no default configuration.
console# show lldp interface 1/0/1 Interface Link Transmit Receive Notify TLVs Mgmt --------- ---- -------- -------- -------- ------- ---- 1/0/1 Enabled Enabled Enabled 0,1,2,3 TLV Codes: 0 – Port Description, 1 – System Name, 2 – System Description, 3 – System Capability show lldp local-device Use the show lldp local-device command in Privileged EXEC mode to display the advertised LLDP local data.
Interface Port ID Port Description --------- -------------------- -------------------- 1/0/1 00:62:48:00:00:02 console# show lldp local-device detail 1/0/1 LLDP Local Device Detail Interface: 1/0/1 Chassis ID Subtype: MAC Address Chassis ID: 00:62:48:00:00:00 Port ID Subtype: MAC Address Port ID: 00:62:48:00:00:02 System Name: System Description: Routing Port Description: System Capabilities Supported: bridge, router...
Command Mode Privileged EXEC, Config mode and all Config sub-modes Default Value Not applicable Usage Guidelines No specific guidelines. Example console(config)#show lldp med LLDP MED Global Configuration Fast Start Repeat Count: 3 Device Class: Network Connectivity show lldp med interface This command displays a summary of the current LLDP MED configuration for a specific interface.
Default Value Not applicable Example console#show lldp med interface all LLDP MED Interface Configuration Interface Link configMED operMED ConfigNotify TLVsTx --------- ------ --------- -------- ------------ ----------- Gi1/0/1 Detach Enabled EnabledEnabled0,1 Gi1/0/2 Detach Disabled Disabled Disabled Gi1/0/3 Detach Disabled Disabled Disabled Gi1/0/4 Detach Disabled...
Page 607
Command Mode Privileged EXEC, Config mode and all Config sub-modes Default Value Not applicable Example Console#show lldp med local-device detail 1/0/1 LLDP MED Local Device Detail Interface: 1/0/8 Network Policies Media Policy Application Type : voice Vlan ID: 10 Priority: 5 DSCP: 1 Unknown: False Tagged: True...
show lldp med remote-device This command displays the current LLDP MED remote data. This command can display summary information or detail for each interface. Syntax Description show lldp med remote-device {gigabitethernet unit/slot/port | tengigabitethernet unit/slot/port | all} show lldp med remote-device detail {gigabitethernet unit/slot/port | tengigabitethernet unit/slot/port} •...
Page 610
1/0/2 Not Defined 1/0/3Class II 1/0/4Class III 1/0/5Network Con Console#show lldp med remote-device detail 1/0/1 LLDP MED Remote Device Detail Local Interface: 1/0/1 Capabilities MED Capabilities Supported: capabilities, networkpolicy, location, extendedpse MED Capabilities Enabled: capabilities, networkpolicy Device Class: Endpoint Class I Network Policies Media Policy Application Type : voice Vlan ID: 10...
Extended POE PD Required: 0.2 Watts Source: local Priority: low show lldp remote-device Use the lldp remote-device command in Privileged EXEC mode to display the current LLDP remote data. This command can display summary information or detail for each interface. Syntax interface interface...
Examples The following examples shows an example of the display of current LLDP traffic statistics. console#show lldp statistics all LLDP Device Statistics Last Update........0 days 22:58:29 Total Inserts........ 1 Total Deletes........ 0 Total Drops........0 Total Ageouts........ 1 TLV TLV Interface Total Total Discards Errors Ageout Discards Unknowns MED 802.1 802.3 --------- ----- ----- -------- ------ ------ -------- -------- ---- ----- ----- 1/0/11...
Page 615
Fields Description Receive Total Total number of valid LLDP frames received on the indicated port. Discards Number of LLDP frames received on the indicated port and discarded for any reason. Errors Number of non-valid LLDP frames received on the indicated port.
Multicast VLAN Registration Commands Multicast VLAN registration (MVR) is a method for consolidating multicast traffic from multiple VLANs onto a single VLAN. A typical usage scenario would be the distribution of a multicast group to a switch using a single VLAN where the switch has users in different VLANs subscribing to the multicast group.
Commands in this Chapter This chapter explains the following commands: mvr type mvr group mvr vlan group mvr mode show mvr mvr querytime show mvr members mvr vlan show mvr interface mvr immediate show mvr traffic Use the mvr command in Global Config and Interface Config modes to enable MVR.
mvr group Use the mvr group command in Global Config mode to add an MVR membership group. Use the no form of the command to remove an MVR membership group. Syntax A.B.C.D count mvr group A.B.C.D count no mvr group Parameter Description Parameter Description...
console(config)#mvr group 239.0.1.0 100 console(config)#mvr vlan 10 mvr mode Use the mvr mode command in Global Config mode to change the MVR mode type. Use the no form of the command to set the mode type to the default value. Syntax mvr mode {compatible | dynamic} no mvr mode...
Page 621
Syntax 1–100 mvr querytime no mvr querytime Parameter Description Parameter Description querytime The query time is a maximum time to wait for an IGMP membership report on a receiver port before removing the port from the multicast group. The query time only applies to receiver ports.
mvr vlan Use the mvr vlan command in Global Config mode to set the MVR multicast VLAN. Use the no form of the command to set the MVR multicast VLAN to the default value. Syntax 1–4094 mvr vlan no mvr vlan Parameter Description Parameter Description...
Syntax mvr immediate no mvr immediate Parameter Description This command does not require a parameter description. Default Configuration The default value is Disabled. Command Mode Interface Config User Guidelines Immediate leave should only be configured on ports with a single receiver. When immediate leave is enabled, a receiver port will leave a group on receipt of a leave message.
Syntax mvr type {receiver | source} no mvr type Parameter Description Parameter Description receiver Configure the port as a receiver port. Receiver ports are ports over which multicast data will be sent but not received. source Configure the port as a source port. Source ports are ports over which multicast data is received or sent.
console(config-if-Gi1/0/1)#interface Gi1/0/24 console(config-if-Gi1/0/24)#switchport mode trunk console(config-if-Gi1/0/24)#switchport trunk native vlan 99 console(config-if-Gi1/0/24)#switchport trunk allowed vlan add 99 console(config-if-Gi1/0/24)#mvr console(config-if-Gi1/0/24)#mvr type source console(config-if-Gi1/0/24)#exit mvr vlan group Use the mvr vlan group command in Interface Config mode to participate in the specific MVR group. Use the no form of this command to remove the port participation from the specific MVR group.
User Guidelines This command statically configures a port to receive the specified multicast group on the specified VLAN. This command only applies to receiver ports in compatible mode. It also applies to source ports in dynamic mode. In dynamic mode, receiver ports can also join multicast groups using IGMP messages.
Parameter Description MVR Current Multicast groups The current number of MVR groups allocated. MVR Query Response Time The current MVR query response time. MVR Mode The current MVR mode. It can be compatible or dynamic. Default Configuration This command has no default configuration. Command Mode Privileged EXEC, Config mode and all Config sub-modes User Guidelines...
Page 628
Syntax A.B.C.D show mvr members [ Parameter Description The parameter is a valid multicast address in IPv4 dotted notation. The following table explains the output parameters. Parameter Description MVR Group IP MVR group multicast IP address. Status The status of the specific MVR group. It can be active or inactive.
console#show mvr members 224.1.1.1 MVR Group IP Status Members ------------------ --------------- --------------------- 224.1.1.1 INACTIVE 1/0/1, 1/0/2, 1/0/3 show mvr interface Use the show mvr interface command in Privileged EXEC mode to display the MVR enabled interfaces configuration. Syntax interface-id vid ]]] show mvr interface [ [members [vlan Parameter Description...
Default Configuration This command has no default configuration. Command Mode Privileged EXEC, Config mode and all Config sub-modes User Guidelines The following table lists the completion messages. Message Type Message Description Successful Completion Message None Error Completion Message MVR disabled Examples console#show mvr interface Port...
Page 631
Parameter Description This command does not require a parameter description. Default Configuration This command has no default configuration. Command Mode Privileged EXEC, Config mode and all Config sub-modes User Guidelines The following table lists the completion messages. Message Type Message Description Successful Completion Message None Error Completion Message...
Port Channel Commands A port channel is a set of one or more links that can be aggregated together to form a bonded channel (Link Aggregation Group or LAG). Individual conversations in a particular direction always travel over a single link in the port channel, however, in aggregate, the bandwidth usage of all of the links is fairly evenly distributed.
an additional parameter static which makes this LAG not require a partner system running Link Aggregation Control Protocol (LACP) to be able to aggregate it's member ports. A static LAG does not transmit or process received LACPDUs, that is, the member ports do not transmit LACPDUs and all the LACPDUs it may receive are dropped.
Port Channels Trunking, which is also called Port Channels or Link Aggregation, is initiated and maintained by the periodic exchanges of Link Aggregation Control PDUs (LACPDUs). From a system perspective, a LAG is treated as a physical port. A LAG and a physical port use the same configuration parameters for administrative enable/disable, port priority, and path cost.
• Source/Destination IP and source/destination TCP/UDP Port fields of the packet. Enhanced LAG Hashing PowerConnect devices based on Broadcom XGS-IV silicon support configuration of hashing algorithms for each LAG interface. The hashing algorithm is used to distribute traffic load among the physical ports of the LAG while preserving the per-flow packet order.
Manual Aggregation of LAGs PowerConnect switching supports the manual addition and deletion of links to aggregates. Flexible Assignment of Ports to LAGs Assignment of interfaces to dynamic LAGs is based upon a maximum of 144 interfaces assigned to dynamic LAGs, a maximum of 128 dynamic LAGs and a maximum of 8 interfaces per dynamic LAG.
active — Forces the port to join a channel with LACP (dynamic LAG). • Default Configuration This command has no default configuration. Command Mode Interface Configuration (Ethernet) mode User Guidelines This command has no user guidelines. Example The following example shows how port 1/0/5 is configured to port-channel 1 without LACP (static LAG).
Command Mode Global Configuration mode User Guidelines This command has no user guidelines. Example The following example enters the context of port-channel 1. console(config)# interface port-channel 1 console(config-if-po1)# interface range port-channel Use the interface range port-channel command in Global Configuration mode to execute a command on multiple port channels at the same time.
Example The following example shows how port-channels 1, 2 and 8 are grouped to receive the same command. console(config)# interface range port-channel 1-2,8 console(config-if)# hashing-mode Use the hashing-mode command to set the hashing algorithm on trunk ports. Use the no hashing-mode command to set the hashing algorithm on Trunk ports to the default (3).
Example console(config)#interface port-channel l console(config-if-po1)#hashing-mode 4 console(config-if-po1)#no hashing mode lacp port-priority Use the lacp port-priority command in Interface Configuration mode to configure the priority value for physical ports. To reset to default priority value, use the no form of this command. Syntax value lacp port-priority...
lacp system-priority Use the lacp system-priority command in Global Configuration mode to configure the Link Aggregation system priority. To reset to default, use the no form of this command. Syntax value lacp system-priority no lacp system-priority value — Port priority value. (Range: 1–65535) •...
short — Specifies a short timeout value. • Default Configuration The default port timeout value is long. Command Mode Interface Configuration (Ethernet) mode User Guidelines This command has no user guidelines. Example The following example assigns an administrative LACP timeout for port 1/0/8 to a long timeout value.
User Guidelines For a LAG that contains links distributed across stacking units, the default behavior is to distribute locally received ingress traffic across all LAG links in the stack per the selected hashing algorithm. When enabled, this command disables forwarding of ingress unicast traffic across stacking links for a LAG that is comprised of links on multiple stack units.
Command Mode Interface Configuration (port-channel) mode User Guidelines This command has no user guidelines. show interfaces port-channel Use the show interfaces port-channel command to show port-channel information. Syntax Description port-channel-number ] show interfaces port-channel [ Parameter Description The command displays the following information. Parameter Description index...
Example #1 console#show interfaces port-channel ChannelPorts ChTypeHash Algorithm Typemin-Links ------------------------- ----------------------------------- Po1Inactive: Gi1/0/3Dynamic31 Po2No Configured PortsStatic31 Hash Algorithm Type 1 - Source MAC, VLAN, Ethertype, source module and port ID 2 - Destination MAC, VLAN, Ethertype, source module and port ID 3 - Source IP and source TCP/UDP port 4 - Destination IP and destination TCP/UDP port 5 - Source/Destination MAC, VLAN, Ethertype, source MODID/port...
Page 647
Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example shows how to display LACP Ethernet interface information. console#show lacp gigabitethernet 1/0/1 Port 1/0/1 LACP parameters: Actor system priority: system mac addr: 00:00:12:34:56:78...
port Admin key: port Oper key: port Admin priority: port Oper priority: port Oper timeout: LONG LACP Activity: ASSIVE Aggregation: AGGREGATABLE synchronization: FALSE collecting: FALSE distributing: FALSE expired: FALSE Port 1/0/1 LACP Statistics: LACP PDUs sent: LACP PDUs received: show statistics port-channel Use the show statistics port-channel command in Privileged EXEC mode to display statistics about a specific port-channel.
Page 649
User Guidelines This command has no user guidelines. Example The following example shows statistics about port-channel 1. console#show statistics port-channel 1 Total Packets Received (Octets)....0 Packets Received > 1522 Octets....0 Packets RX and TX 64 Octets....1064 Packets RX and TX 65-127 Octets....140 Packets RX and TX 128-255 Octets....
Page 650
FCS Errors........0 Overruns........0 Total Received Packets Not Forwarded... 0 Local Traffic Frames......0 802.3x Pause Frames Received....0 Unacceptable Frame Type......0 Multicast Tree Viable Discards....0 Reserved Address Discards...... 0 Broadcast Storm Recovery....... 0 CFI Discards........0 Upstream Threshold......
Page 651
Excessive Collision Frames..... 0 Port Membership Discards....... 0 802.3x Pause Frames Transmitted....0 GVRP PDUs received......0 GVRP PDUs Transmitted......0 GVRP Failed Registrations...... 0 Time Since Counters Last Cleared....0 day 0 hr 17 min 52 sec console# Port Channel Commands...
Port Monitor Commands PowerConnect switches allow the user to monitor traffic with an external network analyzer. The external network analyzer can use any of the Ethernet ports as a probe port. The probe port transmits a mirror copy of the traffic being probed.
monitor session show monitor session monitor session Use the monitor session command in Global Configuration mode to configure a probe port and a monitored port for monitor session (port monitoring). Use the src-interface parameter to specify the interface to monitor. Use rx to monitor only ingress packets, or use tx to monitor only egress packets.
User Guidelines The source of a monitoring session must be configured before the destination can be configured. Only one session with a single destination is supported, however, that session supports multiple sources. Example The following examples show a simple port level configuration that mirrors both transmitted and received packet from one port to another.
Page 656
Session ID Admin Mode Probe Port Mirrored Port Type ---------- ---------- ---------- ------------- ----- Enable 1/0/10 1/0/8 Rx,Tx Port Monitor Commands...
QoS Commands Quality of Service (QoS) technologies are intended to provide guaranteed timely delivery of specific application data to a particular destination. In contrast, standard IP-based networks are designed to provide best effort data delivery service. Best effort service implies that the network delivers the data in a timely fashion, although there is no guarantee.
A user configures an ACL permit rule to force its matching traffic stream to a specific egress interface, bypassing any forwarding decision normally performed by the device. The interface can be a physical port or a LAG. The redirect interface rule action is independent of, but compatible with, the assign queue rule action.
– Untrusted Port Default Priority • Queue Configuration This enables PowerConnect switches to support a wide variety of delay sensitive video and audio multicast applications. CoS mapping tables, port default priority, and hardware queue parameters may be configured on LAG interfaces as well as physical port interfaces. Queue Mapping The priority of a packet arriving at an interface is used to steer the packet to the appropriate outbound CoS queue through a mapping table.
process is also used for cases where a trusted port mapping is unable to be honored, such as when a nonIP packet arrives at a port configured to trust the IP precedence or IP DSCP value. Commands in this Chapter This chapter explains the following commands: assign-queue mark ip-dscp...
assign-queue Use the assign-queue command in Policy-Class-Map Configuration mode to modify the queue ID to which the associated traffic stream is assigned. Syntax queueid assign-queue queueid — Specifies a valid queue ID. (Range: integer from 0–6.) • Default Configuration This command has no default configuration. Command Mode Policy-Class-Map Configuration mode User Guidelines...
Example The following example shows how to specify the DiffServ class name of "DELL." console(config)#policy-map DELL1 console(config-classmap)#class DELL class-map Use the class-map command in Global Configuration mode to define a new match-all . To delete the existing class, use the no form DiffServ class of type of this command.
User Guidelines There are no user guidelines for this command. Example The following example creates a class-map named "DELL" which requires all ACE’s to be matched. console(config)#class-map DELL console(config-cmap)# class-map rename Use the class-map rename command in Global Configuration mode to change the name of a DiffServ class.
console(config)# classofservice dot1p-mapping Use the classofservice dot1p-mapping command in Global Configuration mode to map an 802.1p priority to an internal traffic class. In Interface Configuration mode, the mapping is applied only to packets received on that interface. Use the no form of the command to remove mapping between an 802.1p priority and an internal traffic class.
User Guidelines None Example The following example configures mapping for user priority 1 and traffic class console(config)#classofservice dot1p-mapping 1 2 classofservice ip-dscp-mapping Use the classofservice ip-dscp-mapping command in Global Configuration mode to map an IP DSCP value to an internal traffic class. Use the no form of the command to return the classofservice mapping to the default, and remove a traffic class mapping for an IP DSCP value.
Page 666
IP DSCP Traffic Class 8(cs1) 10(af11) 12(af12) 14(af13) 16(cs2) 18(af21) 20(af22) 22(af23) 24(cs3) 26(af31) 28(af32) QoS Commands...
Page 667
IP DSCP Traffic Class 30(af33) 32(cs4) 34(af41) 36(af42) 38(af43) 40(cs5) 46(ef) 48(cs6) 56(cs7) QoS Commands...
IP DSCP Traffic Class Command Mode Global Configuration mode User Guidelines This command has no user guidelines. Example The following example displays mapping for IP DSCP 1 and traffic class 2. console(config)#classofservice ip-dscp-mapping 1 2 classofservice trust Use the classofservice trust command in either Global Configuration mode or Interface Configuration mode to set the class of service trust mode of an interface.
ip-dscp — Specifies that the mode be set to trust IP DSCP packet • markings. Default Configuration This command has no default configuration. Command Mode Global Configuration mode or Interface Configuration (gigabitethernet, port-channel, tengigabitethernet) mode User Guidelines This command has no user guidelines. Examples The following example displays how you set the class of service trust mode of an interface to trust dot1p (802.1p) packet markings when in Global...
Page 670
Syntax conform-color { class-map-name} [ exceed-color { class-map-name } ] Default Configuration This command has no default configuration. Command Mode Policy-Class-Map Configuration mode User Guidelines Color conforming classes must be one of the following types: • Primary COS • Secondary COS •...
console(config)#policy-map color in console(config-policy-map)#class class-ipv4 console(config-policy-classmap)#police-simple 1000 16 conform-action transmit violate-action transmit console(config-policy-classmap)#conform-color class- cos1 console(config-policy-classmap)#exit console(config-policy-map)#exit console(config)# cos-queue min-bandwidth Use the cos-queue min-bandwidth command in either Global Configuration mode or Interface Configuration mode to specify the minimum transmission bandwidth for each interface queue. To restore the default for each queue’s minimum bandwidth value, use the no form of this command.
User Guidelines The maximum number of queues supported per interface is seven. It is recommended that the operator avoid the use of queue 5-7 in order to avoid conflicts with inter- and intra-network control traffic. In order to better accommodate bursty traffic, it is recommended that the sum of the configured min-bandwidths be much less than 100%.
Page 673
Parameter Description Parameter Description queue-id An integer indicating the queue-id which is to be enabled for WRED. Range 0-6. Up to 7 queues may be simultaneously specified. Default Configuration WRED queue management policy is disabled by default. Tail-drop queue management policy is enabled by default. The threshold for invoking tail- drop behavior when WRED is disabled is approximately 1/2 of the remaining free packet buffer in the switch.
Example Enable WRED on the default CoS 0 queue for unmarked packets and set the green, yellow, and red colored traffic to utilize WRED starting at 3% of port congestion with a drop probability of 1%, 2% and 3%, respectively. In this configuration, non-TCP traffic uses tail-drop queue discipline with a drop threshold at 100% of the statically calculated port queue length vs.
User Guidelines Strict priority (SP) queues are scheduled in priority order ahead of WRR queues. Strict priority queues are allocated unlimited bandwidth. Use the cos-queue min-bandwidth command on lower priority SP and WRR queues to ensure fairness to lower priority queues. Example The following example displays how to activate the strict priority scheduler mode for two queues.
Example The following example displays how to set the DiffServ operational mode to active. console(Config)#diffserv drop Use the drop command in Policy-Class-Map Configuration mode to specify that all packets for the associated traffic stream are to be dropped at ingress. Syntax drop Default Configuration...
Syntax cos-value mark cos cos-value — Specifies the CoS value as an integer. (Range: 0–7) • Default Configuration There is no default cos-value for this command. Packets are not remarked by default. Command Mode Policy-Class-Map Configuration mode User Guidelines This command has no user guidelines. Example The following example displays how to mark all packets with a CoS value.
Command Mode Policy-Class-Map Configuration mode User Guidelines This command has no user guidelines. Example The following example displays how to mark all packets with an IP DSCP value of "cs4." console(config-policy-classmap)#mark ip-dscp cs4 mark ip-precedence Use the mark ip-precedence command in Policy-Class-Map Configuration mode to mark all packets for the associated traffic stream with the specified IP precedence value.
console(config-policy-classmap)#mark ip-precedence 2 console(config-policy-classmap)# match class-map Use the match class-map command to add to the specified class definition the set of match conditions defined for another class. Use the no form of this command to remove from the specified class definition the set of match conditions defined for another class.
Example The following example adds match conditions defined for the Dell class to the class currently being configured. console(config-classmap)#match class-map Dell The following example deletes the match conditions defined for the Dell class from the class currently being configured.
Example The following example displays adding a match condition to the specified class. console(config-classmap)#match cos 1 match destination-address mac Use the match destination-address mac command in Class-Map Configuration mode to add a match condition based on the destination MAC address of a packet. Syntax macaddr macmask match destination-address mac...
match dstip Use the match dstip command in Class-Map Configuration mode to add a match condition based on the destination IP address of a packet. Syntax ipaddr ipmask match dstip ipaddr — Specifies a valid IP address. • ipmask — Specifies a valid IP address bit mask. Note that even though this •...
prefix-length —IPv6 prefix length value. • Default Configuration There is no default configuration for this command. Command Mode Ipv6-Class-Map Configuration mode. User Guidelines There are no user guidelines for this command. Example console(config-classmap)#match dstip6 2001:DB8::/32 match dstl4port Use the match dstl4port command in Class-Map Configuration mode to add a match condition based on the destination layer 4 port of a packet using a single keyword or a numeric notation.
User Guidelines This command has no user guidelines. Example The following example displays adding a match condition based on the destination layer 4 port of a packet using the "echo" port name keyword. console(config-classmap)#match dstl4port echo match ethertype Use the match ethertype command in Class-Map Configuration mode to add a match condition based on the value of the ethertype.
match ip6flowlbl The match ip6flowlbl command adds to the specified class definition a match condition based on the IPv6 flow label of a packet. Syntax label match ip6flowlbl label - The value to match in the Flow Label field of the IPv6 header •...
Default Configuration This command has no default configuration. Command Mode Class-Map Configuration mode User Guidelines The ip dscp, ip precedence, and ip tos match conditions are alternative ways to specify a match criterion for the same Service Type field in the IP header but with a slightly different user notation.
Command Mode Class-Map Configuration mode User Guidelines The ip dscp, ip precedence, and ip tos match conditions are alternative ways to specify a match criterion for the same Service Type field in the IP header but with a slightly different user notation. free form This specification is the version of the IP DSCP/Precedence/TOS...
User Guidelines This command has no user guidelines. Example The following example displays adding a match condition based on the "ip" protocol name keyword. console(config-classmap)#match protocol ip match source-address mac Use the match source-address mac command in Class-Map Configuration mode to add to the specified class definition a match condition based on the source MAC address of the packet.
console(config-classmap)# match source-address mac 10:10:10:10:10:10 11:11:11:11:11:11 match srcip Use the match srcip command in Class-Map Configuration mode to add to the specified class definition a match condition based on the source IP address of a packet. Syntax ipaddr ipmask match srcip ipaddr —...
Syntax source-ipv6-prefix/prefix-length match srcip6 source-ipv6-prefix —IPv6 prefix in IPv6 global address format. • prefix-length —IPv6 prefix length value. • Default Configuration There is no default configuration for this command. Command Mode Ipv6-Class-Map Configuration mode. User Guidelines There are no user guidelines for this command. Example console(config-classmap)#match srcip6 2001:DB8::/32 match srcl4port...
Command Mode Class-Map Configuration mode User Guidelines Only one srcl4port matching criteria can be specified. To remove the matching criteria, delete the class map. Example The following example displays how to add a match condition using the "snmp" port name keyword. console(config-classmap)#match srcl4port snmp match vlan Use the match vlan command in Class-Map Configuration mode to add to...
Example The following example displays adding a match condition for the VLAN ID "2." console(config-classmap)#match vlan 2 mirror Use the mirror command in Policy-Class-Map Configuration mode to mirror all the data that matches the class defined to the destination port specified. Syntax interface mirror...
Page 694
Syntax datarate burstsize conform-action {drop | set-prectransmit police-simple { cos | set-dscp-transmit dscpval | transmit} [violate-action {drop | set-cos- cos | set-prec-transmit cos | set-dscp-transmit dscpval | transmit}]} transmit datarate — Data rate in kilobits per second (kbps). (Range: • 1–4294967295) burstsize —...
console(config-policy-classmap)#police-simple 1000 64 conform-action transmit violate-action drop police-two-rate Use the police-two-rate command to implement a two-rate Three Color Market (trTCM) per RFC 2698. A trTCM meters a traffic stream and colors packets according to four parameters: Committed Information Rate (CIR) Committed Burst Size (CBS) Peak Information Rate (PIR) Peak Burst Size (PBS)
– transmit— Transmit the packet unmodified. Default Configuration This command has no default configuration. Command Mode Policy-Class-Map Configuration mode User Guidelines The CIR and PIR are measured in Kbps (not pps as indicated in the RFC), the CBS in Kbytes, and the PBS in Kbytes. It is recommended that the CBS and PBS be configured to be larger than the largest expected IP packet.
Example The following example shows how to establish a new ingress DiffServ policy named "DELL." console(config)#policy-map DELL in console(config-policy-classmap)# random-detect queue-parms Use the random-detect queue-parms command to configure the WRED green, yellow and red TCP and non-TCP packet minimum and maximum thresholds and corresponding drop probabilities on an interface or all interfaces.
Page 698
Syntax queue-id minthresh- random-detect queue-parms [queue-id] ... min-thresh green minthresh-yellow minthresh-red minthresh-nontcp max- max-thresh thresh-green max-thresh-yellow max-thresh-red maxthresh-nontcp queue-id no random-detect queue-parms [queue-id] ... Parameter Description Parameter Description queue-id The class of service queue. Range 0 to 6. min-thresh The minimum threshold at which to begin dropping, based on the configured maximum drop probability for each color and for non-TCP packets.
Page 699
Command Mode Global Config mode, Interface Config mode (physical and port-channel), Interface Range mode User Guidelines The Green/Yellow/Red Ranges may overlap and are applied to each color independently. Within a color, the range from minimum to maximum is divided into eight (0...7) fixed probabilities at which packets are dropped based on the instantaneous egress queue size: 0 - 6.25% of maximum drop probability 1 - 18.75% of maximum drop probability...
console(config-if-Te2/0/1)#random-detect queue-parms 0 min- thresh 5 10 15 50 max-thresh 15 25 50 98 drop-prob-scale 1 2 3 25 random-detect exponential-weighting-constant Use the random-detect exponential-weighting-constant command to configure the decay in the calculation of the average queue size user for WRED on an interface or all interfaces.
Syntax interface redirect interface — Specifies any valid interface. Interface is Ethernet port or • port-channel (Range: po1-po32 or gi1/0/1-gi1/0/24) Default Configuration This command has no default configuration. Command Mode Policy-Class-Map Configuration mode User Guidelines This command has no user guidelines. Example The following example shows how to redirect incoming packets to port 1/0/1.
ACLs and DiffServ policies may not both exist on the same interface in the same direction. Example The following example shows how to attach a service policy named "DELL" to all interfaces. console(config)#service-policy DELL show class-map Use the show class-map command in Privileged EXEC mode to display all configuration information for the specified class.
Page 703
Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example displays all the configuration information for the class named "Dell". console#show class-map Class L3 Class Name Type Proto...
Class Name........stop_http_class Class Type........All Class Layer3 Protocol......ipv6 Match Criteria Values ---------------------------- ------------------------------------- Source IP Address 2001:DB8::/32 Source Layer 4 Port 80(http/www) show classofservice dot1p-mapping Use the show classofservice dot1p-mapping command in Privileged EXEC mode to display the current Dot1p (802.1p) priority mapping to internal traffic classes for a specific interface.
------------- --------------- The following table lists the parameters in the example and gives a description of each. Parameter Description User Priority The 802.1p user priority value. Traffic Class The traffic class internal queue identifier to which the user priority value is mapped. show classofservice ip-dscp-mapping Use the show classofservice ip-dscp-mapping command in Privileged EXEC mode to display the current IP DSCP mapping to internal traffic classes for a...
Page 706
User Guidelines Example console#show classofservice ip-dscp-mapping IP DSCP Traffic Class ------------- ------------- 0(be/cs0 8(cs1) 10(af11) 12(af12) 14(af13) 16(cs2) 18(af21) QoS Commands...
46(ef) 48(cs6) 56(cs7) console# show classofservice trust Use the show classofservice trust command in Privileged EXEC mode to display the current trust mode setting for a specific interface. QoS Commands...
Page 709
Syntax port- show classofservice trust [{gigabitethernet unit/slot/port| port-channel channel-number | tengigabitethernet unit/slot/port }] Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines If the interface is specified, the port trust mode of the interface is displayed. If omitted, the port trust mode for global configuration is shown.
Page 710
Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example displays the DiffServ information. console#show diffserv DiffServ Admin mode......Enable Class Table Size Current/Max....5 / 25 Class Rule Table Size Current/Max....
Page 711
Default Configuration This command has no default configuration. Command Mode Privileged EXEC, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example console#show diffserv service interface gigabitethernet 1/0/1 in DiffServ Admin Mode......Enable Interface........1/0/1 Direction........
Page 712
Command Mode Privileged EXEC, Config mode and all Config sub-modes User Guidelines Not applicable Example console#show diffserv service interface port-channel 1 in DiffServ Admin Mode......Enable Interface........po1 Direction........In No policy is attached to this interface in this direction show diffserv service brief Use the show diffserv service brief command in Privileged EXEC mode to display all interfaces in the system to which a DiffServ policy has been...
Page 713
Policy Name ----------- ----------- ------------ ------------------- 1/0/1 Down DELL show interfaces cos-queue Use the show interfaces cos-queue command in Privileged EXEC mode to display the class-of-service queue configuration for the specified interface. Syntax show interfaces cos-queue [{gigabitethernet unit/slot/port | port-channel...
Page 714
Interface Shaping Rate......0 Queue Id Min. Bandwidth Scheduler Type Queue Management Type -------- -------------- -------------- -------------- Weighted Tail Drop Weighted Tail Drop Weighted Tail Drop Weighted Tail Drop Weighted Tail Drop Weighted Tail Drop Weighted Tail Drop This example displays the COS configuration for the specified interface 1/0/1. console#show interfaces cos-queue gigabitethernet 1/0/1 Interface........
Page 715
Parameter Description Intf Shaping Rate The maximum transmission bandwidth limit for the interface as a whole. It is independent of any per-queue maximum bandwidth values in effect for the interface. This value is a configured value. Queue Mgmt Type The queue depth management technique used for all queues on this interface.
Page 716
Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example displays the DiffServ information. console#show policy-map Policy Name Policy Type Class Members ----------- ----------- ------------- POLY1 DellClass DELL DellClass QoS Commands...
Page 717
Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example displays the statistics information for port te1/0/1. console#show policy-map interface te1/0/1 in Interface........te1/0/1 Operational Status......Down Policy Name........DELL QoS Commands...
Page 718
User Guidelines This command has no user guidelines. Example The following example displays a summary of policy-oriented statistics information. console#show service-policy Oper Policy Intf Stat Name ------ ----- ------------------------------- 1/0/1 Down DELL 1/0/2 Down DELL 1/0/3 Down DELL QoS Commands...
1/0/4 Down DELL 1/0/5 Down DELL 1/0/6 Down DELL 1/0/7 Down DELL 1/0/8 Down DELL 1/0/9 Down DELL 1/0/10 Down DELL traffic-shape Use the traffic-shape command in Global Configuration mode and Interface Configuration mode to specify the maximum transmission bandwidth limit rate shaping for the interface as a whole.
Page 720
Example The following example displays the setting of traffic-shape to a maximum bandwidth of 1024 Kbps. console(config-if-1/0/1)#traffic-shape 1024 kbps QoS Commands...
RADIUS Commands Managing and determining the validity of users in a large network can be significantly simplified by making use of a single database of accessible information supplied by an Authentication Server. These servers commonly use the Remote Authentication Dial In User Service (RADIUS) protocol as defined by RFC 2865.
Page 722
Table 33-1. RADIUS Attributes Supported by PowerConnect Switch Service Type RADIUS Attribute Name 802.1X User Manager Captive Portal NAS-IP-ADDRESS NAS-PORT SERVICE-TYPE FILTER-ID FRAMED-MTU REPLY-MESSAGE STATE CLASS VENDOR-SPECIFIC SESSION-TIMEOUT IDLE-TIMEOUT TERMINATION-ACTION CALLED-STATION-ID CALLING-STATION-ID NAS-IDENTIFIER ACCT-STATUS-TYPE Set by RADIUS client for Accounting ACCT-INPUT-OCTETS ACCT-OUTPUT-OCTETS ACCT-SESSION-ID...
Page 723
Table 33-1. RADIUS Attributes Supported by PowerConnect Switch Service Type RADIUS Attribute Name 802.1X User Manager Captive Portal NAS-PORT-TYPE TUNNEL-TYPE TUNNEL-MEDIUM-TYPE EAP-MESSAGE MESSAGE-AUTHENTICATOR Set by RADIUS client for Accounting TUNNEL-PRIVATE-GROUP-ID Yes The following attributes are processed in the RADIUS Access-Accept message received from a RADIUS server: •...
• FILTER-ID – Name of the filter list for this user. • TUNNEL-TYPE – Used to indicate that a VLAN is to be assigned to the user when set to tunnel type VLAN (13). • TUNNEL-MEDIUM-TYPE – Used to indicate the tunnel medium type. Must be set to medium type 802 (6) to enable VLAN assignment.
aaa accounting dot1x default start-stop The aaa accounting network default start-stop group radius command has been migrated to the aaa accounting dot1x default start-stop {radius|none} command. Use the aaa accounting dot1x default start-stop command in Global Config mode to create an accounting method list. Use the no form of the command to delete a list.
Page 726
Parameter Description start-stop Issue a start accounting notice at the beginning and stop accounting notice at the end of the accounted method. Accounting notices are sent when the user logs into the switch and when the user logs out of the exec mode. Accounting notifications are also sent at the beginning and at the end of the user executed command.
The same list-name can be used for both exec and commands accounting types. AAA accounting for commands with RADIUS as the accounting method is not supported. TACACS+ supports both exec and commands accounting types. There is exactly one accounting method list for dot1x: default. accounting Use the accounting command in Line Config mode to apply an accounting method to a line config.
User Guidelines When enabling accounting for exec mode for the current line-configuration type, users logged in with that mode will be logged out. Examples Use the following command to enable exec type accounting for telnet. console(config)#line telnet console(config-telnet)# accounting exec default acct-port Use the acct-port command to set the port that connects to the RADIUS accounting server.
console(Config-acct-radius)#acct-port 56 auth-port Use the auth-port command in Radius mode to set the port number for authentication requests of the designated Radius server. Syntax auth-port-number auth-port auth-port-number — Port number for authentication requests. (Range: 1 - • 65535) Default Configuration The default value of the port number is 1812.
server will be used until it no longer responds. RADIUS servers whose deadtime interval has not expired are skipped when searching for a new RADIUS server to contact. Syntax deadtime deadtime deadtime — The amount of time that the unavailable server is skipped •...
Page 731
Default Configuration Debugging is disabled by default. Command Mode Privileged EXEC mode User Guidelines This command has no user guidelines. Use the key command to specify the encryption key which is shared with the RADIUS server. Use the "no" form of this command to remove the key. Syntax key-string key-string —...
msgauth Use the msgauth command to enable the message authenticator attribute to be used for the RADIUS Authenticating server being configured. Use the “no” form of this command to disable the message authenticator attribute. Syntax msgauth no msgauth Default Configuration The message authenticator attribute is enabled by default.
Page 733
Parameter Description Parameter Description servername The name for the RADIUS server (Range: 1 - 32 characters). Default Configuration The default RADIUS server name is Default-RADIUS-Server. Command Mode Radius Config mode User Guidelines Names may only be set for authentication servers, not for accounting servers. Names may consist of alphanumeric characters and the underscore, dash and blanks.Embed the name in double quotes to use a name with blanks.
primary Use the primary command to specify that a configured server should be the primary server in the group of authentication servers which have the same server name. Multiple primary servers can be configured for each group of servers which have the same name. When the RADIUS client has to perform transactions with an authenticating RADIUS server of the specified name, it uses the primary server that has the specified server name by default.
Default Configuration The default priority is 0. Command Mode Radius mode User Guidelines User must enter the mode corresponding to a specific Radius server before executing this command. Example The following example specifies a priority of 10 for the designated server. console(config)#radius-server host 192.143.120.123 console(config-radius)#priority 10 radius-server attribute 4...
User Guidelines This command does not change the address in the IP header for the request sent to the RADIUS server. It only changes the address sent to the RADIUS server inside the RADIUS packet. Example The following example sets the NAS IP address in RADIUS attribute 4 to 192.168.10.22.
User Guidelines If only one RADIUS server is configured, it is recommended that the deadtime interval be left at 0. Example The following example sets the minimum interval for a RADIUS server will not be contacted after becoming unresponsive. console(config)#radius-server deadtime 10 radius-server host Use the radius-server host command in Global Configuration mode to specify a RADIUS server host and enter RADIUS Configuration mode.
User Guidelines Radius servers are keyed by the host name, therefore it is advisable to use unique server host names. Example The following example specifies a Radius server host with the following characteristics: Server host IP address — 192.168.10.1 console(config)#radius-server host 192.168.10.1 radius-server key Use the radius-server key command in Global Configuration mode to set the authentication and encryption key for all Radius communications between...
Example The following example sets the authentication and encryption key for all Radius communications between the device and the Radius server to “dell- .” server console(config)#radius-server key dell-server radius-server retransmit Use the radius-server retransmit command in Global Configuration mode to specify the number of times the Radius client will retransmit requests to the Radius server.
radius-server source-ip Use the radius-server source-ip command in Global Configuration mode to specify the source IP address used for communication with Radius servers. To return to the default, use the no form of this command. 0.0.0.0 is interpreted as a request to use the IP address of the outgoing IP interface. Syntax source radius-server source-ip...
timeout — Specifies the timeout value in seconds. (Range: 1–30) • Default Configuration The default value is 3 seconds. Command Mode Global Configuration mode User Guidelines This command has no user guidelines. Example The following example sets the interval for which a switch waits for a server host to reply to 5 seconds.
Example The following example of the retransmit command specifies five retries. console(config)#radius-server host 192.143.120.123 console(config-radius)#retransmit 5 show aaa servers Use the show aaa servers command to display the list of configured RADIUS servers and the values configured for the global parameters of the RADIUS client.
Page 743
Field Description Configured The number of RADIUS Authentication servers that have Authentication Servers been configured. Configured Accounting The number of RADIUS Accounting servers that have Servers been configured. Named Authentication The number of configured named RADIUS server groups. Server Groups Named Accounting The number of configured named RADIUS server groups.
Global values -------------------------------------------- Number of Configured Authentication Servers..5 Number of Configured Accounting Servers..1 Number of Named Authentication Server Groups... 2 Number of Named Accounting Server Groups..1 Number of Retransmits......3 Timeout Duration....... 15 Deadtime........0 Source IP........0.0.0.0 RADIUS Accounting Mode......
Examples console#show accounting methods Acct Type Method Name Record Type Method Type ---------- ------------ ------------ ------------ Exec dfltExecList start-stop TACACS Commands dfltCmdsList stop-only TACACS Commands UserCmdAudit start-stop TACACS Line EXEC Method List Command Method List ------- --------------------------------------- Console dfltExecList dfltCmdsList Telnet dfltExecList dfltCmdsList...
Page 746
Parameter Description hostname Host name of the Radius server host. (Range: 1–158 characters). The command allows spaces in the host name when specified in double quotes. For example, console(config)#snmp-server host "host name" servername The alias used to identify the server. Default Configuration There is no default configuration for this command.
Page 747
Field Description Malformed The number of malformed RADIUS Accounting Response Responses packets received from this server. Malformed packets include packets with an invalid length. Bad authenticators or signature attributes or unknown types are not included as malformed accounting responses. The number of RADIUS Accounting Response packets Authenticators containing invalid authenticators received from this accounting server.
Page 748
Field Description Malformed Access The number of malformed RADIUS Access Response packets Responses received from this server. Malformed packets include packets with an invalid length. Bad authenticators or signature attributes or unknown types are not included as malformed access responses. The number of RADIUS Access Response packets containing Authenticators invalid authenticators or signature attributes received from this...
Access Accepts........ 0 Access Rejects........ 0 Access Challenges......0 Malformed Access Responses....0 Bad Authenticators......0 Pending Requests......0 Timeouts........0 Unknown Types......... 0 Packets Dropped....... 0 source-ip Use the source-ip command in Radius mode to specify the source IP address to be used for communication with Radius servers.
timeout Use the timeout command in Radius mode to set the timeout value in seconds for the designated Radius server. Syntax timeout timeout timeout — Timeout value in seconds for the specified server. (Range: 1-30 • seconds.) Default Configuration The default value is 3 seconds. Command Mode Radius mode User Guidelines...
Page 751
Default Configuration all. The default variable setting is Command Mode Radius mode User Guidelines User must enter the mode corresponding to a specific Radius server before executing this command. Example login The following example specifies usage type console(config)#radius-server host 192.143.120.123 console(config-radius)#usage login RADIUS Commands...
Spanning Tree Commands The Multiple Spanning Tree Protocol (MSTP) component complies with IEEE 802.1s by efficiently navigating VLAN traffic over separate interfaces for multiple instances of Spanning Tree. IEEE 802.1D, Spanning Tree and IEEE 802.1w, Rapid Spanning Tree are supported through the IEEE 802.1s implementation.
port. In this way, the root guard enforces the position of the root bridge. In MSTP scenario the port may be designated in one of the instances while being alternate in the CIST, and so on. Root guard is a per port (not a per port per instance command) configuration so all the MSTP instances this port participates in should not be in root role.
revision (mst) spanning-tree spanning-tree mst spanning-tree tcnguard disable cost show spanning-tree spanning-tree spanning-tree mst spanning-tree transmit forward-time port-priority hold-count show spanning-tree spanning-tree guard spanning-tree mst – summary priority spanning-tree spanning-tree spanning-tree – loopguard portfast clear spanning-tree detected-protocols Use the clear spanning-tree detected-protocols command in Privileged EXEC mode to restart the protocol migration process (force the renegotiation with neighboring switches) on all interfaces or on the specified interface.
exit (mst) Use the exit command in MST mode to exit the MST configuration mode and apply all configuration changes. Syntax exit Default Configuration MST configuration. Command Mode MST mode User Guidelines This command has no user guidelines. Example The following example shows how to exit the MST configuration mode and save changes.
Page 757
Default Configuration VLANs are mapped to the common and internal spanning tree (CIST) instance (instance 0). Command Mode MST mode User Guidelines Before mapping VLANs to an instance use the spanning-tree mst enable command to enable the instance. All VLANs that are not explicitly mapped to an MST instance are mapped to the common and internal spanning tree (CIST) instance (instance 0) and cannot be unmapped from the CIST.
console(config-mst)#name region1 revision (mst) Use the revision command in MST mode to identify the configuration revision number. To return to the default setting, use the no form of this command. Syntax version revision no revision version — Configuration revision number. (Range: 0-65535) •...
Page 760
instance-id show spanning-tree [detail] [active | blockedports] | [instance show spanning-tree mst-configuration Parameter Description Parameter Description detail Displays detailed information. active Displays active ports only. blockedports Displays blocked ports only. mst-configuration Displays the MST configuration identifier. instance -id ID of the spanning -tree instance. Default Configuration This command has no default configuration.
Page 761
Interfaces Name State Prio.Nbr Cost Role Restricted ------ -------- --------- --------- ---- ----- ---------- Gi1/0/1 Enabled 128.1 20000 Root Gi1/0/2 Enabled 128.2 Disb Gi1/0/3 Enabled 128.3 Disb Gi1/0/4 Enabled 128.4 Disb console#show spanning-tree gigabitethernet 1/0/1 Port Gi1/0/1 Enabled State: Forwarding Role: Root Port id: 128.1 Port Cost: 20000...
Page 762
Port id: 128.1 Port Cost: 20000 Root Protection: No Designated bridge Priority: 32768 Address: 0010.1882.1C53 Designated port id: 128.48 Designated path cost: 0 CST Regional Root: 80:00:00:10:18:82:1C:53 CST Port Cost: 0 BPDU: sent 24, received 500 console#show spanning-tree detail active Spanning tree Enabled (BPDU flooding : Disabled) Portfast BPDU filtering Disabled mode rstp...
Regional Root Path Cost: ROOT ID Priority 32768 Address 0010.1882.1C53 Path Cost 20000 Root Port Gi1/0/1 Hello Time 2 Sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority 32768 Address 001E.C9AA.AD1B Hello Time 2 Sec Max Age 20 show spanning-tree summary Use the show spanning-tree summary command to display spanning tree settings and parameters for the switch.
Configuration Name Identifier used to identify the configuration currently being used. Configuration Revision Identifier used to identify the configuration currently Level being used. Configuration Digest Key A generated Key used in the exchange of the BPDUs. Configuration Format Specifies the version of the configuration format being Selector used in the exchange of BPDUs.
no spanning-tree Default Configuration Spanning-tree is enabled. Command Mode Global Configuration mode User Guidelines This command has no user guidelines. Example The following example enables spanning-tree functionality. console(config)#spanning-tree spanning-tree auto-portfast Use the spanning-tree auto-portfast command to set the port to auto portfast mode.
Example The following example enables spanning-tree functionality on gigabit ethernet interface 4/0/1. console#config console(config)#interface gigabitethernet 4/0/1 console(config-if-4/0/1)#spanning-tree auto-portfast spanning-tree bpdu flooding The spanning-tree bpdu flooding command allows flooding of BPDUs received on non-spanning-tree ports to all other non-spanning-tree ports. Use the “no”...
For an access layer device, the access port is generally connected to the user terminal (such as a desktop computer) or file server directly and configured as an edge port to implement the fast transition. When the port receives a BPDU packet, the system sets it to non-edge port and recalculates the spanning tree, which causes network topology flapping.
Page 768
Syntax cost spanning-tree cost no spanning-tree cost cost — The port path cost. (Range: 0–200,000,000) • Default Configuration The default cost is 0, which signifies that the cost is automatically calculated based on port speed. • 10G Port path cost — 2000 •...
spanning-tree disable Use the spanning-tree disable command in Interface Configuration mode to disable spanning-tree on a specific port. To enable spanning-tree on a port, use the no form of this command. Syntax spanning-tree disable no spanning-tree disable Default Configuration By default, all ports are enabled for spanning-tree. Command Mode Interface Configuration (gigabitethernet, port-channel, tengigabitethernet) mode...
Page 770
no spanning-tree forward-time seconds — Time in seconds. (Range: 4–30) • Default Configuration The default forwarding-time for IEEE Spanning-tree Protocol (STP) is 15 seconds. Command Mode Global Configuration mode. User Guidelines When configuring the Forward-Time the following relationship should be satisfied: 2*(Forward-Time - 1) >= Max-Age.
Page 771
Default Configuration Neither root nor loop guard is enabled. Command Mode Interface Configuration (Ethernet, Port Channel) mode. User Guidelines There are no user guidelines for this command. Example The following example disables spanning-tree guard functionality on gigabit ethernet interface 4/0/1. console#config console(config)#interface gigabitethernet 4/0/1 console(config-if-4/0/1)#spanning-tree guard none...
Page 772
Example The following example enables spanning-tree loopguard functionality on all ports. console(config)#spanning-tree loopguard default spanning-tree max-age Use the spanning-tree max-age command in Global Configuration mode to configure the spanning-tree bridge maximum age. To reset the default maximum age, use the no form of this command. Syntax seconds spanning-tree max-age...
Page 773
spanning-tree max-hops Use the spanning-tree max-hops command to set the MSTP Max Hops parameter to a new value for the common and internal spanning tree. Use the “no” form of this command to reset the Max Hops to the default. Syntax hops spanning-tree max-hops...
Page 774
mst — Multiple Spanning Tree Protocol (MSTP) is enabled. • Default Configuration Rapid Spanning Tree Protocol (RSTP) is supported. Command Mode Global Configuration mode User Guidelines In RSTP mode, the switch would use STP when the neighbor switch is using STP .
Page 775
User Guidelines For two or more switches to be in the same MST region, they must have the same VLAN mapping, the same configuration revision number and the same name. Example The following example configures an MST region. console (config)#spanning-tree mst configuration console (config-mst)#instance 1 add vlan 10-20 console (config-mst)#name region1 console (config-mst)#revision 1...
Page 776
— 20,000 • Port-Channel Command Mode Interface Configuration (gigabitethernet, port-channel, tengigabitethernet) mode User Guidelines MST instance id 0 is the common internal spanning tree instance (CIST). Example The following example configures the MSTP instance 1 path cost for interface 1/0/9 to 4. console(config)#interface gigabitethernet 1/0/9 console(config-if-1/0/9)#spanning-tree mst 1 cost 4 spanning-tree mst port-priority...
Page 777
Command Mode Interface Configuration (gigabitethernet, port-channel, tengigabitethernet) mode User Guidelines The priority will be set to the nearest multiple of 4096 if not an exact multiple of 4096. Example The following example configures the port priority of gigabit Ethernet interface 1/0/5 to 144. console(config)# interface gigabitethernet 1/0/5 console(config-if)#...
Command Mode Global Configuration mode User Guidelines The priority value must be a multiple of 4096. The priority will be set to the nearest multiple of 4096 if not an exact multiple of 4096. The switch with the lowest priority is selected as the root of the spanning tree. Example The following example configures the spanning tree priority of instance 1 to 4096.
Page 779
User Guidelines This command only applies to access ports. The command is to be used only with interfaces connected to end stations. Otherwise, an accidental topology loop could cause a data packet loop and disrupt switch and network operations. An interface with PortFast mode enabled is moved directly to the spanning tree forwarding state when linkup occurs without waiting the standard forward-time delay.
Page 780
Example The following example discards BPDUs received on spanning-tree ports in portfast mode. console#spanning-tree portfast bpdufilter default spanning-tree portfast default Use the spanning-tree portfast default command to enable Portfast mode only on access ports. Use the no form of this command to disable Portfast mode on all ports.
spanning-tree port-priority Use the spanning-tree port-priority command in Interface Configuration mode to configure port priority. To reset the default port priority, use the no form of this command. Syntax priority spanning-tree port-priority no spanning-tree port-priority priority — The port priority. (Range: 0–240) •...
Syntax priority spanning-tree priority no spanning-tree priority priority — Priority of the bridge. (Range: 0–61440) • Default Configuration The default bridge priority for IEEE STP is 32768. Command Mode Global Configuration mode User Guidelines The priority value must be a multiple of 4096. The switch with the lowest priority is the root of the spanning tree.
User Guidelines There are no user guidelines for this command. Example The following example configures spanning-tree tcnguard on 4/0/1. console(config-if-4/0/1)#spanning-tree tcnguard spanning-tree transmit hold-count Use the spanning-tree transmit hold-count command to set the maximum number of BPDUs that a bridge is allowed to send within a hello time window (2 seconds).
TACACS+ Commands TACACS+ provides access control for networked devices via one or more centralized servers, similar to RADIUS this protocol simplifies authentication by making use of a single database that can be shared by many clients on a large network. TACACS+ is based on the TACACS protocol (described in RFC1492) but additionally provides for separate authentication, authorization and accounting services.
show tacacs timeout Use the key command in TACACS Configuration mode to specify the authentication and encryption key for all TACACS communications between the device and the TACACS server. This key must match the key used on the TACACS daemon. Syntax key [key-string] —...
Default Configuration The default port number is 49. Command Mode TACACS Configuration mode User Guidelines This command has no user guidelines. Example The following example displays how to specify server port number 1200. console(tacacs)#port 1200 priority Use the priority command in TACACS Configuration mode to specify the order in which servers are used, where 0 (zero) is the highest priority.
console(tacacs)#priority 10000 show tacacs Use the show tacacs command in Privileged EXEC mode to display the configuration and statistics of a TACACS+ server. Syntax ip-address show tacacs [ ip-address — • The name or IP address of the host. Default Configuration This command has no default configuration.
tacacs-server host Use the tacacs-server host command in Global Configuration mode to configure a TACACS+ server. This command enters into the TACACS+ configuration mode. To delete the specified hostname or IP address, use the no form of this command. Syntax ip-address hostname tacacs-server host {...
tacacs-server key Use the tacacs-server key command in Global Configuration mode to set the authentication and encryption key for all TACACS+ communications between the switch and the TACACS+ daemon. To disable the key, use the no form of this command. Syntax key-string tacacs-server key [...
tacacs-server timeout Use the tacacs-server timeout command in Global Configuration mode to set the interval during which a switch waits for a server host to reply. To restore the default, use the no form of this command. Syntax timeout tacacs-server timeout [ no tacacs-server timeout timeout —...
Page 792
Default Configuration If left unspecified, the timeout defaults to the global value. Command Mode TACACS Configuration mode User Guidelines This command has no user guidelines. Example This example shows how to specify the timeout value. console(tacacs)#timeout 23 TACACS+ Commands...
UDLD Commands The UDLD feature detects unidirectional links on physical ports. A unidirectional link is a forwarding anomaly in a Layer 2 communication channel in which a bi-directional link stops passing traffic in one direction. UDLD must be enabled on the both sides of the link in order to detect a unidirectional link.
recognize only the sending failures on unidirectional links. If all devices in the network support UDLD, this functionality is enough to detect all unidirectional links. Processing UDLD Traffic from Neighbors Every UDLD-capable device collects information about all other UDLD- capable devices. Each device populates UDLD echo packets with collected neighbor information to help neighbors identify unidirectional links.
UDLD will put the port into the shutdown state in the following cases: When there is a loopback. The device ID and port ID sent out on a port is received back. UDLD PDU is received from a partner does not have its own details (echo).
Command Mode Global Config mode User Guidelines This command globally enables UDLD. Interfaces which are not connected or enabled at the Ethernet layer at the time the command is issued will be enabled for UDLD when connected or enabled. udld reset Use the udld reset command in Privileged EXEC mode to reset (enable) all interfaces disabled by UDLD.
udld message time Use the udld message time command in Global Config mode to configure the interval between the transmission of UDLD probe messages on ports that are in the advertisement phase. Use the no form of the command to return the message transmission interval to the default value.
Use the no form of the command to return the value to the default setting. Syntax timeout-interval udld timeout interval no udld timeout interval Parameter Description Parameter Description timeout-interval UDLD timeout interval. Range is 5 to 60 seconds. Default Configuration The default timeout interval is 5 seconds.
Command Mode Interface (physical) Config mode User Guidelines UDLD cannot be enabled on a port channel. Instead, enable UDLD on the physical interfaces of a port channel. udld port Use the udld port command in Interface (physical) Config mode to select the UDLD operating mode on a specific interface.
show udld Use the show udld command in User EXEC or Privileged EXEC mode to display the global settings for UDLD. Syntax show udld [interface-id|all] Field Description When no interface is specified, the following fields are shown: Field Description Admin Mode The global administrative mode of UDLD.
Field Description UDLD Status The status of the link as determined by UDLD. The options are: • Undetermined – UDLD has not collected enough information to determine the state of the port. • Not applicable – UDLD is disabled, either globally or on the port.
Page 802
Parameter Description Parameter Description Packet Display transmitted and received UDLD packets. Receive Debug packets received by the switch. Transmit Debug packets transmitted by the switch. Events Display UDLD events. Default Configuration By default, debugging is disabled. Command Mode Privileged EXEC mode User Guidelines This command has no user guidelines.
VLAN Commands PowerConnect 802.1Q VLANs are an implementation of the Virtual Local Area Network, specification 802.1Q. Operating at Layer 2 of the OSI model, the VLAN is a means of parsing a single network into logical user groups or organizations as if they physically resided on a dedicated LAN segment of their own.
two TPID values can be different or the same. VLAN normalization, source MAC learning, and forwarding are based on the S-TAG value in a received frame. PowerConnect supports configuring one outer VLAN TPID value per switch. The global default TPID is 0x88A8, which indicates a Virtual Metropolitan Area Network (VMAN).
its own VLAN. Additionally, protocol-based classification allows an administrator to assign nonrouting protocols, such as NetBIOS or DECnet, to larger VLANs than routing protocols like IPX or IP. This maximizes the efficiency gains that are possible with VLANs. In port-based VLAN classification, the Port VLAN Identifier (PVID) is associated with the physical ports.
Page 806
• Isolated VLAN Is a secondary VLAN. It carries traffic from isolated ports to promiscuous ports. Only one isolated VLAN can be configured per private VLAN. • Community VLAN Is a secondary VLAN. It forwards traffic between ports which belong to the same community and to the promiscuous ports.
Page 807
Figure 37-1. Private VLANs Isolated VLAN An endpoint connected over an isolated VLAN is allowed to communicate with endpoints connected to promiscuous ports only. Endpoints connected to adjacent endpoints over an isolated VLAN cannot communicate with each other. Community VLAN An endpoint connected over a community VLAN is allowed to communicate with the endpoints within the community and can also communicate with any configured promiscuous port.
In order to enable Private VLAN operation across multiple switches which are not stacked, the inter-switch links should carry VLANs which belong to a private VLAN. The trunk ports which connect neighbor switches have to be assigned to the primary, isolated, and community VLANs of a private VLAN. In regular VLANs, ports in the same VLAN switch traffic at L2.
protocol vlan group switchport access vlan (Global show vlan private-vlan– vlan Config) protocol vlan group switchport general vlan association – forbidden vlan Private VLAN Commands switchport private- private-vlan show interfaces show vlan private-vlan vlan switchport switchport mode – – – private-vlan dvlan-tunnel ethertype Use the dvlan-tunnel ethertype command in Global Configuration mode to...
Default Configuration The default for this command is 802.1Q. The default S-TAG TPID, when double-tagging is enabled, is 0x88A8. The default C-TAG TPID when double vlan tagging is enabled is 0x8100. Command Mode Global Configuration, Interface Configuration mode User Guidelines This command configures the TPID value on the outer VLAN (S-VLAN).
Default Configuration By default, routing is enabled on VLAN 1. However, VLAN 1 does not route packets until an IP address is assigned to the VLAN. DHCP is not enabled on VLAN 1 by default. Command Mode VLAN Configuration or Global Configuration modes User Guidelines Assigning an IP address to a VLAN interface enables routing on the VLAN interface.
User Guidelines Commands used in the interface range context are executed independently on each interface in the range. If the command returns an error on one of the interfaces, an error message is displayed and execution continues on other interfaces. Example The following example groups VLAN 221 through 228 and VLAN 889 to execute the commands entered in interface range mode.
Uplink Port Behavior If a single-tagged (SP tagged) or double-tagged (SP tag as outer tag) packet ingresses an uplink port, the switch passes it through unchanged to the respective access or uplink ports. If an untagged or single tagged (802.1Q tagged) packet ingresses an uplink port, the switch tags it with the configured ethertype and service provider VLAN ID taken from the ingress port PVID.
Default Configuration The default VLAN name is default. Command Mode VLAN Configuration mode User Guidelines The VLAN name may include any alphanumeric characters including a space, underscore, or dash. Enclose the string in double quotes to include spaces within the name. The surrounding quotes are not used as part of the name. The CLI does not filter illegal characters and may truncate entries at the first illegal character or reject the entry entirely.
groupid — The protocol-based VLAN group ID, which is automatically • generated when you create a protocol-based VLAN group with the vlan protocol group command. To see the group ID associated with the name of a protocol group, use the show port protocol all command. vlanid —...
Syntax groupid protocol vlan group groupid no protocol vlan group groupid — The protocol-based VLAN group ID, which is automatically • generated when you create a protocol-based VLAN group with the vlan protocol group command. To see the group ID associated with the name of a protocol group, use the show port protocol all command.
Syntax groupid protocol vlan group all groupid no protocol vlan group all groupid — The protocol-based VLAN group ID, which is automatically • generated when you create a protocol-based VLAN group with the vlan protocol group command. To see the group ID associated with the name of a protocol group, use the show port protocol all command.
Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example shows how to display all interfaces for Double VLAN Tunneling. console#show dvlan-tunnel Interfaces Enabled for DVLAN Tunneling..1/0/1 show dvlan-tunnel interface Use the show dvlan-tunnel interface command in Privileged EXEC mode to display detailed information about Double VLAN Tunneling for the specified...
console#show dvlan-tunnel interface 1/0/1 Interface Mode EtherType --------- ------- -------------- 1/0/1 Enable vMAN The following table describes the significant fields shown in the example. Field Description Mode This field specifies the administrative mode through which Double VLAN Tunneling can be enabled or disabled. The default disabled value for this field is Interface...
Page 820
Parameter Description private-vlan Displays VLAN mapping for the private-VLAN promiscuous mapping ports. Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode, Interface Config mode and all Config sub-modes User Guidelines Do not configure private VLANs on ports configured with any of these features: •...
Page 821
Port 1/0/1 is member in: VLAN Name Egress rule Type ---- --------- ----------- ----- default untagged Default VLAN008 tagged Dynamic VLAN0011 tagged Static IPv6 VLAN untagged Static VLAN0072 untagged Static Static configuration: PVID: 1 (default) Ingress Filtering: Enabled Acceptable Frame Type: All Port 1/0/1 is statically configured to: VLAN Name...
Page 822
PVID: 4095 (discard vlan) Ingress Filtering: Enabled Acceptable Frame Type: All Port 1/0/1 is member in: VLAN Name Egress rule Type ---- --------- ----------- ----- IP Telephony tagged Static Static configuration: PVID: 8 Ingress Filtering: Disabled Acceptable Frame Type: All Port 1/0/2 is statically configured to: VLAN Name...
GVRP status: Disabled Port 2/0/19 is member in: VLAN Name Egress rule Type ---- --------- ----------- ----- 2921 Primary A untagged Static 2922 Community A1 untagged Static Static configuration: PVID: 2922 Ingress Filtering: Enabled Acceptable Frame Type: Untagged GVRP status: Disabled Port 2/0/19 is member in: VLAN Name...
Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example displays the Protocol-Based VLAN information for either the entire system. console#show port protocol all Group Group Name Protocol(s VLAN Interface(s)
Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example displays information for VLAN id 1, 2 and 3. console#show vlan id 1 VLAN Name Ports Type ----- --------------- -------------...
mac-address — Specifies the MAC address to be entered in the list. • (Range: Any valid MAC address) Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example shows no entry in MAC address to VLAN cross- reference.
Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines The command has no user guidelines. Example The following example shows the case if no IP Subnet to VLAN association exists.
Command Mode Interface Configuration (gigabitethernet, port-channel, tengigabitethernet) mode User Guidelines This command removes the port from the previous VLAN membership and adds it to the specified VLAN. The no form of the command sets the port VLAN membership to VLAN 1. Example The following example configures interface gi1/0/8 to operate in access mode with a VLAN membership of 23.
Command Mode Interface Configuration (gigabitethernet, port-channel, tengigabitethernet) mode User Guidelines This configuration only applies to ports configured in general mode. Example The following example forbids adding VLAN numbers 234 through 256 to port 1/0/8. console(config)#interface gigabitethernet 1/0/8 console(config-if-1/0/8)#switchport general forbidden vlan add 234-256 switchport general acceptable-frame-type tagged-only...
Example The following example configures 1/0/8 to discard untagged frames at ingress. console(config)#interface gigabitethernet 1/0/8 console(config-if-1/0/8)#switchport general acceptable-frame-type tagged-only switchport general allowed vlan Use the switchport general allowed vlan command in Interface Configuration mode to add VLANs to or remove VLANs from a general port. Syntax vlan-list switchport general allowed vlan add...
User Guidelines You can use this command to change the egress rule (for example, from tagged to untagged) without first removing the VLAN from the list. Example The following example shows how to add VLANs 1, 2, 5, and 8 to the allowed list.
switchport general pvid Use the switchport general pvid command in Interface Configuration mode to configure the Port VLAN ID (PVID) when the interface is in general mode. Use the switchport mode general command to set the VLAN membership mode of a port to "general." To configure the default value, use the no form of this command.
switchport mode Use the switchport mode command in Interface Configuration mode to configure the VLAN membership mode of a port. To reset the mode to the appropriate default for the switch, use the no form of this command. Syntax switchport mode {access | trunk | general} no switchport mode Parameter Description Parameter...
Command Mode Interface Configuration (gigabitethernet, port-channel, tengigabitethernet) mode User Guidelines This command has no user guidelines. Example The following example configures 1/0/5 to access mode. console(config)#interface gigabitethernet 1/0/5 console(config-if-1/0/5)#switchport mode access switchport trunk Use the switchport trunk command in Interface Configuration mode to add VLANs to or remove VLANs from a trunk port, or to set the native VLAN for an interface in Trunk Mode.
Page 835
Parameter Description Parameter Description vlan–list Set the list of allowed VLANs that can receive and send traffic on this interface in tagged format when in trunking mode. The default is all. The vlan–list format is as follows: The vlan-list format is all remove except vlan–atom...
User Guidelines Untagged traffic received on a trunk port is forwarded on the native VLAN, if configured. To drop untagged traffic on a trunk port, remove the native VLAN from the trunk port. (Ex. switchport trunk allowed vlan remove 1.) Management traffic is still allowed on the trunk port in this configuration.
User Guidelines Deleting the VLAN used by an access port will cause that port to become unusable until it is assigned a VLAN that exists. Creating a VLAN adds it to the allowed list for all trunk ports except for those where it is specifically excluded.
User Guidelines Deleting the VLAN for an access port will cause that port to become unusable until it is assigned a VLAN that exists. Creating a VLAN adds it to the allowed list for all trunk ports except those where it is specifically excluded. Example The following example shows how to create (add) VLAN of IDs 22, 23, and console(config)#vlan 22,23,56...
console(config)# vlan 1 console(config-vlan-1)#vlan association mac 0001.0001.0001 vlan association subnet Use the vlan association subnet command in VLAN Config mode to associate a VLAN to a specific IP-subnet. Only packets with a matching source IP address are placed into the VLAN. Syntax ip-address subnet-mask vlan association subnet...
Syntax vlan database Default Configuration This command has no default configuration. Command Mode Global Configuration mode User Guidelines This command has no user guidelines. Example The following example enters the VLAN database mode. console(config)#vlan database console(config-vlan)# vlan makestatic This command changes a dynamically created VLAN (one that is created by GVRP registration) to a static VLAN (one that is permanently configured and defined).
User Guidelines The dynamic VLAN (created via GRVP) should exist prior to executing this command. See the Type column in output from the show vlan command to determine that the VLAN is dynamic. Example The following changes vlan 3 to a static VLAN. console(config-vlan)#vlan makestatic 3 vlan protocol group Use the vlan protocol group command in Global Configuration mode to add...
vlan protocol group add protocol Use the vlan protocol group add protocol command in Global Configuration mode to add a protocol to the protocol-based VLAN groups identified by groupid . A group may have more than one protocol associated with it. Each interface and protocol combination can be associated with one group only.
vlan protocol group name This is a new command for assigning a group name to vlan protocol group id. Syntax groupid groupName vlan protocol group name groupid no vlan protocol group name groupid —The protocol-based VLAN group ID, which is automatically •...
groupid — The protocol-based VLAN group ID, which is automatically • generated when you create a protocol-based VLAN group with the vlan protocol group command. To see the group ID associated with the name of a protocol group, use the show port protocol all command. Default Configuration This command has no default configuration.
Parameter Description Parameter Description host-association Defines VLAN associations for community or host ports. mapping Defines the private VLAN mapping for promiscuous ports. primary-vlan-id Primary VLAN ID of a private VLAN. secondary-vlan-id Secondary (isolated or community) VLAN ID of a private VLAN.
Parameter Description Parameter Description host-association Configure the interface as a private VLAN host port. Host ports are community or isolated ports, depending on the VLAN to which they belong. promiscuous Configure the interface as a private VLAN promiscuous port. Promiscuous ports are members of the primary VLAN. Default Configuration This command has no default configuration.
Page 847
no private-vlan [association] Parameter Description The command displays the following information: Parameter Description association Defines an association between the primary VLAN and secondary VLANs. primary Specify that the selected VLAN is the primary VLAN. community Specify that the selected VLAN is the community VLAN. isolated Specify that the selected VLAN is the isolated VLAN.
VLAN 1 cannot be configured in a private VLAN configuration. Examples console# configure terminal console(config)# vlan 10 console(config-vlan)# private-vlan primary console(config-vlan)# exit console(config)# vlan 1001 console(config-vlan)# private-vlan isolated console(config-vlan)# exit console(config)# vlan 1002 console(config-vlan)# private-vlan community console(config-vlan)# exit console(config)# vlan 1003 console(config-vlan)# private-vlan community console(config-vlan)# exit console(config)# vlan 20...
Page 849
Parameter Description The command displays the following information. Parameter Description Primary Primary VLAN ID. Secondary Secondary VLAN ID. Secondary VLAN type. Use the type parameter to display only Type private VLAN ID and its type. Ports Ports that are associated with a private VLAN. Default Configuration This command has no default setting.
Voice VLAN Commands The Voice VLAN feature enables switch ports to carry voice traffic with an administrator-defined priority so as to enable prioritization of voice traffic over data traffic. Using Voice VLAN helps to ensure that the sound quality of an IP phone is protected from deterioration when the data traffic utilization on the port is high.
Commands in this Chapter This chapter explains the following commands: voice vlan voice vlan data priority voice vlan (Interface) show voice vlan voice vlan This command is used to enable the voice vlan capability on the switch. Syntax voice vlan no voice vlan Parameter Ranges Not applicable...
Page 853
Syntax vlanid priority voice vlan { | dot1p | none | untagged | data priority {trust | dscp untrust} | auth { enable | disable} | dscp no voice vlan Parameter Description Parameter Description auth Enables/disables authentication on the voice vlan port. data Observe the priority on received voice vlan traffic (trusted mode).
Example console(config-if-Gi1/0/1)#voice vlan 1 console(config-if-Gi1/0/1)#voice vlan dot1p 1 console(config-if-Gi1/0/1)#voice vlan none console(config-if-Gi1/0/1)#voice vlan untagged voice vlan data priority This command is to either trust or not trust (untrust) the data traffic arriving on the voice VLAN port. Syntax voice vlan data priority {trust | untrust} •...
Page 855
Syntax When the interface parameter is not specified, only the global mode of the voice VLAN is displayed. When the interface parameter is specified, the following is displayed: When the interface parameter is specified: Voice VLAN Mode The admin mode of the voice VLAN on the interface. Voice VLAN ID The voice VLAN ID.
802.1x Commands Local Area Networks (LANs) are often deployed in environments that permit the attachment of unauthorized devices. The networks also permit unauthorized users to attempt to access the LAN through existing equipment. In such environments, the administrator may desire to restrict access to the services offered by the LAN.
Whenever an operator configures a port in Dot1x authentication mode and selects the authentication method as internal, then the user credentials received from the Dot1x supplicant is validated against the IDAS by Dot1x component. The Dot1x application accesses the Dot1x user database to check whether the user credentials present in the authentication message corresponds to a valid user or not.
Guest VLAN The Guest VLAN feature allows a PowerConnect switch to provide a distinguished service to unauthenticated users (not rogue users who fail authentication). This feature provides a mechanism to allow visitors and contractors to have network access to reach external network with no ability to surf internal LAN.
client is authenticated and is undisturbed by the failure condition(s). The reasons for failure are logged and buffered into the local logging database such that the operator can track the failure conditions. Clients authenticated when monitor mode is enabled are always assigned to the default VLAN, regardless of the RADIUS assignment.
dot1x system-auth-control show dot1x authentication- – history 802.1x Advanced Features dot1x guest-vlan dot1x unauth-vlan show dot1x advanced dot1x dynamic-vlan enable Use the dot1x dynamic-vlan enable command in Global Configuration mode to enable the capability of creating VLANs dynamically when a RADIUS–assigned VLAN does not exist in the switch.
dot1x initialize This command begins the initialization sequence on the specified port. This command is only valid if the control mode for the specified port is auto or mac-based. If the control mode is not auto or mac-based, an error will be returned.
Command Mode Interface Configuration (Ethernet) mode User Guidelines Authentication of a user via mac-auth-bypass will not occur until the "dot1x time-out guest-vlan-period" timer expires. Example The following example sets MAC Authentication Bypass on interface 1/2: console(config-if-1/0/2)#dot1x mac-auth-bypass dot1x max-req Use the dot1x max-req command in Interface Configuration mode to set the maximum number of times that the switch sends an Extensible Authentication Protocol (EAP)-request frame (assuming that no response is received) to the client before restarting the authentication process.
Example The following example sets the number of times that the switch sends an EAP-request/identity frame to 6. console(config)# interface gigabitethernet 1/0/16 console(config-if-1/0/16)# dot1x max-req 6 dot1x max-users Use the dot1x max-users command in Interface Configuration mode to set the maximum number of clients supported on the port when MAC-based 802.1X authentication is enabled on the port.
dot1x port-control Use the dot1x port-control command in Interface Configuration mode to enable the IEEE 802.1X operation on the port. Syntax dot1x port-control {force-authorized | force-unauthorized | auto | mac- based} no dot1x port-control • auto — Enables 802.1x authentication on the interface and causes the port to transition to the authorized or unauthorized state based on the 802.1x authentication exchange between the switch and the client.
When configuring a port to use MAC-based authentication, the port must be in switchport general mode. Example The following command enables MAC-based authentication on port 1/0/2 console(config)# interface gigabitethernet 1/0/2 console(config-if-1/0/2)# dot1x port-control mac-based dot1x re-authenticate Use the dot1x re-authenticate command in Privileged EXEC mode to enable manually initiating a re-authentication of all 802.1x-enabled ports or the specified 802.1x-enabled port.
dot1x reauthentication Use the dot1x reauthentication command in Interface Configuration mode to enable periodic re-authentication of the client. To return to the default setting, use the no form of this command. Syntax dot1x reauthentication no dot1x reauthentication Default Configuration Periodic re-authentication is disabled. Command Mode Interface Configuration (Ethernet) mode User Guidelines...
Default Configuration The default for this command is disabled. Command Mode Global Configuration mode User Guidelines This command has no user guidelines. Example The following example enables 802.1x globally. console(config)# dot1x system-auth-control dot1x system-auth-control monitor Use the dot1x system-auth-control monitor command in Global Configuration mode to enable 802.1x monitor mode globally.
Example The following example enables 802.1x globally. console(config)# dot1x system-auth-control monitor dot1x timeout guest-vlan-period Use the dot1x timeout guest-vlan-period command in Interface Configuration mode to set the number of seconds that the switch waits before authorizing the client if the client is a dot1x unaware client. Use the no form of the command to return the timeout to the default value.
dot1x timeout quiet-period Use the dot1x timeout quiet-period command in Interface Configuration mode to set the number of seconds that the switch remains in the quiet state following a failed authentication exchange (for example, the client provided an invalid password). To return to the default setting, use the no form of this command.
dot1x timeout re-authperiod Use the dot1x timeout re-authperiod command in Interface Configuration mode to set the number of seconds between re-authentication attempts. To return to the default setting, use the no form of this command. Syntax seconds dot1x timeout re-authperiod no dot1x timeout re-authperiod seconds —...
Syntax seconds dot1x timeout server-timeout no dot1x timeout server-timeout seconds — Time in seconds that the switch waits for a response from the • authentication server. (Range: 1–65535) Default Configuration The period of time is set to 30 seconds. Command Mode Interface Configuration (Ethernet) mode User Guidelines The actual timeout is this parameter or the product of the Radius...
Default Configuration The period of time is set to 30 seconds. Command Mode Interface Configuration (Ethernet) mode User Guidelines Change the default value of this command only to adjust for unusual circumstances, such as unreliable links or specific behavioral problems with certain clients and authentication servers.
Command Mode Interface Configuration (Ethernet) mode User Guidelines Change the default value of this command only to adjust for unusual circumstances, such as unreliable links or specific behavioral problems with certain clients and authentication servers. Example The following command sets the number of seconds that the switch waits for a response to an EAP-request/identity frame to 3600 seconds.
Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines If you do not use the optional parameters, the command displays the global dot1x mode and the VLAN Assignment mode. Field Description Administrative Indicates whether authentication control on the switch is Mode enabled or disabled.
Page 876
Parameter Description The following table explains the output parameters. Parameter Description Time Stamp Exact time at which the event occurs. Interface Physical Port on which the event occurs. MAC-Address Supplicant/Client MAC Address VLAN assigned VLAN assigned to the client/port on authentication. VLAN assigned Type of VLAN ID assigned i.e Guest VLAN, Unauth, Reason...
due to Guest VLAN Timer Expiry..... console#show dot1x authentication-history all Time Stamp Interface MAC-Address VLANID Auth Status --------------------- --------- ----------------- ------ ---------- Mar 22 2010 01:16:31 gi1/0/2 00:01:02:03:04:05 111 Authorized Mar 22 2010 01:20:33 gi1/0/7 00:00:0D:00:00:00 222 Authorized console#show dot1x authentication-history gi1/0/1 Time Stamp Interface MAC-Address...
Page 878
Parameter Description Parameter Description interface–id Any valid interface. See Interface Naming Conventions interface representation. Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines The following fields are displayed by this command. Field Description Clients...
Page 879
Field Description Filter ID The Filter ID assigned to the client by the RADIUS server. This field is not applicable when the Filter-ID feature is disabled on the RADIUS server and client. VLAN Assigned The VLAN assigned to the client by the radius server. When VLAN assignments are disabled, RADIUS server does not assign any VLAN to the port, and this field is set to 0.
Session Termination Action..... Default show dot1x interface This command shows the status of MAC Authentication Bypass. This feature is an extension of Dot1x Option 81 feature added in Power Connect Release 2.1. to accept a VLAN name as an alternative to a number when RADIUS indicates the Tunnel-Private-Group-ID for a supplicant.
Transmit Period........ 30 Maximum Requests....... 2 Max Users........16 VLAN Assigned........Supplicant Timeout......30 Guest-vlan Timeout......30 Server Timeout (secs)......30 MAB mode (configured)......Disabled MAB mode (operational)......Disabled Authenticator PAE State......Initialize Backend Authentication State....Initialize show dot1x interface statistics Use the show dot1x interface statistics command in Privileged EXEC mode to display 802.1x statistics for the specified interface.
Field Description InvalidEapolFramesRx The number of EAPOL frames that have been received by this Authenticator in which the frame type is not recognized. EapLengthErrorFramesRx The number of EAPOL frames that have been received by this Authenticator in which the Packet Body Length field is invalid.
--------- --------- 1/0/1 1/0/2 John Switch# show dot1x users username Bob Port Username --------- --------- 1/0/1 The following table describes the significant fields shown in the display: Field Description Username The username representing the identity of the Supplicant. Port The port that the user is using. clear dot1x authentication–history Use the clear dot1x authentication–history command in Privileged EXEC mode to clear the authentication history table captured during successful and...
User Guidelines This command has no user guidelines. Example console#clear dot1x authentication-history Purge all entries from the log. console#clear dot1x authentication-history gi1/0/1 Purge all entries for the specified interface from the log. 802.1x Advanced Features dot1x guest-vlan Use the dot1x guest-vlan command in Interface Configuration mode to set the guest VLAN on a port.
Example The following example sets the guest VLAN on port 1/0/2 to VLAN 10. console(config-if-1/0/2)#dot1x guest-vlan 10 dot1x unauth-vlan Use the dot1x unauth-vlan command in Interface Configuration mode to specify the unauthenticated VLAN on a port. The unauthenticated VLAN is the VLAN to which supplicants that fail 802.1X authentication are assigned.
Page 887
Multiple Hosts column and add an Unauthenticated VLAN column, which indicates whether an unauthenticated VLAN is configured on a port. The command has also been updated to show the Guest VLAN ID (instead of the status) since it is now configurable per port. Syntax show dot1x advanced [{gigabitethernet unit/slot/port| tengigabitethernet unit/slot/port}]...
Layer 3 Commands The chapters that follow describe commands that conform to the OSI model’s Network Layer (Layer 3). Layer 3 commands perform a series of exchanges over various data links to deliver data between any two nodes in a network.
ARP Commands When a host has an IP packet to send on an Ethernet network, it must encapsulate the IP packet in an Ethernet frame. The Ethernet header requires a destination MAC address. If the destination IP address is on the same network as the sender, the sender uses the Address Resolution Protocol (ARP) to determine the MAC address associated with destination IP address.
ARP Aging Dynamic entries in the ARP cache are aged. When an entry for a neighbor router reaches its maximum age, the system sends an ARP request to the neighbor router to renew the entry. Entries for neighbor routers should remain in the ARP cache as long as the neighbor continues to respond to ARP requests.
Syntax ip-address hardware-address ip-address no arp ip-address — IP address of a device on a subnet attached to an existing • routing interface. hardware-address — A unicast MAC address for that device. • Default Configuration This command has no default configuration. Command Mode Global Configuration mode User Guidelines...
Default Configuration The default value is 6144. Command Mode Global Configuration mode User Guidelines The ARP cache size is dependant on the switching hardware used. Values different from the default given above may exist in a given switch model. Example The following example defines an arp cachesize of 500.
request to the neighbor. If the neighbor responds, the age of the ARP cache entry is reset to 0 without removing the entry from the hardware. Traffic to the host continues to be forwarded in hardware without interruption. If the entry is not being used to forward data packets, then the entry is deleted from the ARP cache, unless the dynamic renew option is enabled.
Command Mode Privileged EXEC mode User Guidelines This command has no user guidelines. Example The following example removes the specified IP address from arp cache. console#arp purge 192.168.1.10 arp resptime Use the arp resptime command in Global Configuration mode to configure the ARP request response time-out.
arp retries Use the arp retries command in Global Configuration mode to configure the ARP count of maximum requests for retries. To return to the default value, use the no form of this command. Syntax integer arp retries no arp retries integer —...
Default Configuration The default value is 1200 seconds. Command Mode Global Configuration mode User Guidelines This command has no user guidelines. Example The following example defines 900 seconds as the timeout. console(config)#arp timeout 900 clear arp-cache Use the clear arp-cache command in Privileged EXEC mode to remove all ARP entries of type dynamic from the ARP cache.
console#clear arp-cache gateway clear arp-cache management Use the clear arp-cache management command to clear all entries that show as management arp entries in the show arp command. Syntax clear arp-cache management Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode User Guidelines This command has no user guidelines.
console#clear arp-cache management ip local-proxy-arp Use the ip local proxy-arp command in Interface Configuration mode to enable proxying of ARP requests. This allows the switch to respond to ARP requests within a subnet where routing is not enabled. Syntax ip local-proxy-arp no ip local-proxy-arp Default Configuration Proxy arp is disabled by default.
Default Configuration Enabled is the default configuration. Command Mode Interface Configuration (VLAN) mode User Guidelines The ip proxy-arp command is not available in interface range mode. Example The following example enables proxy arp for VLAN 15. (config)#interface vlan 15 console(config-if-vlan15)#ip proxy-arp show arp Use the show arp command in Privileged EXEC mode to display all entries in the Address Resolution Protocol (ARP) cache.
Page 902
User Guidelines The show arp command will display static (user-configured) ARP entries regardless of whether they are reachable over an interface or not. Example The following example shows show arp command output. console#show arp Static ARP entries are only active when the IP address is reachable on a local subnet Age Time (seconds)......
DHCP Server and Relay Agent Commands DHCP is based on the Bootstrap Protocol (BOOTP). It also captures the behavior of BOOTP relay agents and DHCP participants can inter operate with BOOTP participants. The host RFC’s standardize the configuration parameters which can be supplied by the DHCP server to the client.
• Internet access cost is greatly reduced by using automatic assignment as Static IP addresses are considerably more expensive to purchase than are automatically allocated IP addresses. • Using DHCP a centralized management policy can be implemented as the DHCP server keeps information about all the subnets. This allows a system operator to update a single server when configuration changes take place.
Page 905
Syntax pool-name ip dhcp pool [ pool-name no ip dhcp pool [ Parameter Description Parameter Description pool-name The name of an existing or new DHCP address pool. The pool name can be up to 31 characters in length and can contain the following characters: a-z, A-Z, 0-9, ’-’, ’_’, ’...
Page 906
• Client DNS server – dns-server • NetBIOS WINS Server – netbios-name-server • NetBIOS Node Type – netbios-node-type • Client default router – default-router • Client address lease time – lease Administrators may also configure manual bindings for clients using the host command in DHCP Pool Configuration mode.
console(config-dhcp-pool)#netbios-name-server 192.168.22.2 192.168.23.2 console(config-dhcp-pool)#netbios-node-type h-node console(config-dhcp-pool)#lease 2 12 console(config-dhcp-pool)#default-router 192.168.22.1 192.168.23.1 bootfile Use the bootfile command in DHCP Pool Configuration mode to set the name of the image for the DHCP client to load. Use the no form of the command to remove the bootfile configuration.
clear ip dhcp binding Use the clear ip dhcp binding command in Privileged EXEC mode to remove automatic DHCP server bindings. Syntax clear ip dhcp binding {ip-address | *} Parameter Description Parameter Description Clear all automatic dhcp bindings. ip-address Clear a specific binding. Default Configuration The command has no default configuration.
Parameter Description Parameter Description Clear all dhcp conflicts. ip-address Clear a specific address conflict. Default Configuration The command has no default configuration. Command Mode Privileged EXEC mode User Guidelines This command has no user guidelines. Example console#clear ip dhcp conflict * client-identifier Use the client-identifier command in DHCP Pool Configuration mode to identify a Microsoft DHCP client to be manually assigned an address.
Default Configuration This command has no default configuration. Command Mode DHCP Pool Configuration mode User Guidelines For Microsoft DHCP clients, the identifier consists of the media type followed by the MAC address of the client. The media type 01 indicates Ethernet media.
Command Mode DHCP Pool Configuration mode User Guidelines Use the show ip dhcp pool command to display pool configuration parameters. The client name should not include the domain name as it is specified separately by the domain-name (IP DHCP Pool Config) command.
Command Mode DHCP Pool Configuration mode User Guidelines This command has no user guidelines. Example console(config-dhcp-pool)#default-router 192.168.22.1 192.168.23.1 dns-server (IP DHCP Pool Config) Use the dns-server command in IP DHCP Pool Configuration mode to set the IP DNS server address which is provided to a DHCP client by the DHCP server.
domain-name (IP DHCP Pool Config) Use the domain-name command in IP DHCP Pool Configuration mode to set the DNS domain name which is provided to a DHCP client by the DHCP server. The DNS name is an alphanumeric string up to 255 characters in length.
Default Configuration There are no default MAC address manual bindings. Command Mode DHCP Pool Configuration mode User Guidelines Use the show ip dhcp pool command to display pool configuration parameters. It may be necessary to use the no host command prior to executing the no hardware-address command.
Default Configuration The default is a 1 day lease. Command Mode DHCP Pool Configuration mode User Guidelines Use the client-identifier hardware-address command prior to using this command for an address pool. Use the show ip dhcp pool command to display pool configuration parameters.
Command Mode Global Configuration mode User Guidelines This command has no user guidelines. Example console#ip dhcp bootp automatic ip dhcp conflict logging Use the ip dhcp conflict logging command in Global Configuration mode to enable DHCP address conflict detection. Use the no form of the command to disable DHCP conflict logging.
ip dhcp excluded-address Use the ip dhcp excluded-address command in Global Configuration mode to exclude one or more DHCP addresses from automatic assignment. Use the no form of the command to allow automatic address assignment for the specified address or address range. Syntax low-address high-address...
ip dhcp ping packets Use the ip dhcp ping packets command in Global Configuration mode to configure the number of pings sent to detect if an address is in use prior to assigning an address from the DHCP pool. If neither ping is answered, the DHCP server presumes the address is not in use and assigns the selected IP address.
lease Use the lease command in DHCP Pool Configuration mode to set the period for which a dynamically assigned DHCP address is valid. Use the infinite parameter to indicate that addresses are to be automatically assigned. Use the no form of the command to return the lease configuration to the default. Use show ip dhcp pool command to display pool configuration parameters.
Example console(config-dhcp-pool)#lease 1 12 59 netbios-name-server Use the netbios-name-server command in DHCP Pool Configuration mode to configure the IPv4 address of the Windows Internet Naming Service (WINS) for a Microsoft DHCP client. Use the no form of the command to remove the NetBIOS name server configuration.
netbios-node-type Use the netbios-node-type command in DHCP Pool Configuration mode to set the NetBIOS node type for a Microsoft DHCP client. Use the no form of the command to remove the netbios node configuration. Syntax type netbios-node-type no netbios-node-type Parameter Description Parameter Description type...
network Use the network command in IP DHCP Pool Configuration mode to define a pool of IPv4 addresses for distributing to clients. Syntax network-number mask prefix-length network Parameter Description Parameter Description network-number A valid IPv4 address mask A valid IPv4 network mask with contiguous left-aligned bits. prefix-length An integer indicating the number of leftmost bits in the network-number to use as a prefix for allocating cells.
Parameter Description Parameter Description ip-address The IPv4 address of the TFTP server to use during auto- configuration. Default Configuration There is no default IPv4 next server configured. Command Mode DHCP Pool Configuration mode User Guidelines Use the show ip dhcp pool command to display pool configuration parameters.
Page 924
Parameter Description Parameter Description code The DHCP TLV option code. ascii string1 An ASCII character string. Strings with embedded blanks must be wholly contained in quotes. hex string1 A hexadecimal string containing the characters [0-9A-F]. The string should not begin with 0x. A hex string consists of two characters which are parsed to fill a single byte.
Default Configuration The service is disabled by default. Command Mode Global Configuration mode User Guidelines This command has no user guidelines. sntp Use the sntp command in DHCP Pool Configuration mode to set the IPv4 address of the NTP server to be used for time synchronization of the client. Use the no form of the command to remove the NTP server configuration.
Example console(config-dhcp-pool)#sntp 192.168.21.2 show ip dhcp binding Use the show ip dhcp binding command in Privileged EXEC mode to display the configured DHCP bindings. Syntax show ip dhcp binding [address] Parameter Description Parameter Description address A valid IPv4 address Default Configuration The command has no default configuration.
show ip dhcp conflict Use the show ip dhcp conflict command in User EXEC mode to display DHCP address conflicts for all relevant interfaces or a specified interface. If an interface is specified, the optional statistics parameter is available to view statistics for the specified interface.
Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example console#show ip dhcp server statistics show ip dhcp pool Use the show ip dhcp pool command in User EXEC or Privileged EXEC mode to display the configured DHCP pool or pools.
show ip dhcp server statistics Use the show ip dhcp server statistics command in Privileged EXEC mode to display the DHCP server binding and message counters. Syntax show ip dhcp server statistics Parameter Description This command does not require a parameter description. Default Configuration This command has no default configuration.
Page 933
DHCP RELEASE........32 DHCP INFORM........0 Messages Sent ---------- ------ DHCP OFFER........132 DHCP ACK........132 DHCP NACK........0 DHCP Server and Relay Agent Commands...
DHCPv6 Commands This chapter explains the following commands: clear ipv6 dhcp service dhcpv6 dns-server (IPv6 DHCP Pool Config) show ipv6 dhcp domain-name (IPv6 DHCP Pool Config) show ipv6 dhcp binding ipv6 dhcp pool show ipv6 dhcp interface (User EXEC) ipv6 dhcp relay show ipv6 dhcp interface (Privileged EXEC) ipv6 dhcp server...
Examples The following examples clears DHCPv6 statistics for VLAN 11. console#clear ipv6 dhcp interface vlan 11 statistics\ dns-server (IPv6 DHCP Pool Config) Use the dns-server command in IPv6 DHCP Pool Configuration mode to set the IPv6 DNS server address which is provided to a DHCPv6 client by the DHCPv6 server.
Syntax domain domain-name domain no domain-name domain — DHCPv6 domain name. (Range: 1–255 characters) • Default Configuration This command has no default configuration. Command Mode IPv6 DHCP Pool Configuration mode User Guidelines DHCPv6 pool can have multiple number of domain names with maximum of Example The following example sets the DNS domain name "test", which is provided to a DHCPv6 client by the DHCPv6 server.
pool-name — DHCPv6 pool name. (Range: 1-31 characters) • Default Configuration This command has no default configuration. Command Mode Global Configuration mode User Guidelines This command has no user guidelines. Example The following example enters IPv6 DHCP Pool Configuration mode. console(config)#ipv6 dhcp pool addrpool console(config-dhcp6s-pool)# ipv6 dhcp relay...
Default Configuration This command has no default configuration. Command Mode Interface Configuration (VLAN, Tunnel) mode User Guidelines relay-address relay-interface is an IPv6 global address, then is not required. relay-address relay-interface is a link-local or multicast address, then relay-address required. Finally, a value for is not specified, then a value for relay-interface must be specified and the DHCPV6-ALLAGENTS multicast...
pref-value — Preference value • used by clients to determine preference — between multiple DHCPv6 servers. (Range: 0-4294967295) Default Configuration The default preference value is 20. Rapid commit is not enabled by default. Command Mode Interface Configuration (VLAN, Tunnel) mode User Guidelines An IP interface (VLAN) can be configured in DHCP relay mode or DHCP server mode.
Page 941
Parameter Description Parameter Description prefix/prefix-length Delegated IPv6 prefix. client-DUID Client DUID (e.g. 00:01:00:09:f8:79:4e:00:04:76:73:43:76'). hostname Client hostname used for logging and tracing. (Range: 0-31 characters.) The command allows spaces in the host name when specified in double quotes. For example, console(config)#snmp-server host "host name"...
The following example defines a unique local address prefix with the MAC address 00:1D:BA:06:37:64 converted to EUI-64 format and a preferred lifetime of 5 days. console(config-dhcp6s-pool)#prefix-delegation fc00::/7 00:1D:BA:FF:FE:06:37:64 preferred-lifetime 43200 service dhcpv6 Use the service dhcpv6 command in Global Configuration mode to enable local IPv6 DHCP server on the switch.
show ipv6 dhcp Use the show ipv6 dhcp command in Privileged EXEC mode to display the DHCPv6 server name and status. Syntax show ipv6 dhcp Syntax Description This command has no arguments or keywords. Default Configuration This command has no default configuration. Command Mode User EXEC, Privileged EXEC modes, Config mode and all Config sub-modes User Guidelines...
ipv6-address — Valid IPv6 address. • Default Configuration This command has no default configuration. Command Mode Privileged EXEC and User EXEC modes, Config mode and all Config sub- modes User Guidelines This command has no user guidelines. Example The following example displays the configured DHCP pool based on the entered IPv6 address.
Page 945
Default Configuration This command has no default configuration. Command Mode User EXEC, Privileged EXEC modes, Config mode and all Config sub- modes User Guidelines Statistics are shown depending on the interface mode (relay, server, or client). Examples The following examples display DHCPv6 information for VLAN 11 when configured in relay mode.
Page 947
Command Mode Privileged EXEC, Config mode and all Config sub-modes User Guidelines This command shows the DHCP status. Information displayed depends on the mode. The command output provides the following information for an interface configured in client mode. Not all fields will be shown for an inactive client. Term Description Mode...
Page 948
Term Description Expiry Time The time (in seconds) when the DHCPv6 leased address expires. Example The following example shows the output from this command when the device has leased an IPv6 address from the DHCPv6 server on interface 1/0/1. NOTE: Note that the interface is in client mode. console#show ipv6 dhcp interface vlan 2 IPv6 Interface.........
Total DHCPv6 Packets Transmitted...... 0 show ipv6 dhcp pool Use the show ipv6 dhcp pool command in Privileged EXEC mode to display the configured DHCP pool. Syntax poolname show ipv6 dhcp pool poolname — Name of the pool. (Range: 1-32 characters) •...
Page 951
Command Mode User EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example displays the DHCPv6 server name and status. console> show ipv6 dhcp statistics DHCPv6 Interface Global Statistics ------------------------------------ DHCPv6 Solicit Packets Received....
DVMRP Commands Distance Vector Multicast Routing Protocol (DVMRP) is a dense mode multicast protocol and is most appropriate for use in networks where bandwidth is relatively plentiful and there is at least one multicast group member in each subnet. DVMRP assumes that all hosts are part of a multicast group until it is informed of multicast group changes.
Default Configuration Disabled is the default configuration. Command Mode Global Configuration Interface Configuration (VLAN) mode User Guidelines This command has no user guidelines. Example The following example sets VLAN 15’s administrative mode of DVMRP to active. console(config)#interface vlan 15 console(config-if-vlan15)#ip dvmrp ip dvmrp metric Use the ip dvmrp metric command in Interface Configuration mode to configure the metric for an interface.
User Guidelines This command has no user guidelines. Example The following example configures a metric of 5 for VLAN 15. console(config)#interface vlan 15 console(config-if-vlan15)#ip dvmrp metric 5 show ip dvmrp Use the show ip dvmrp command in Privileged EXEC mode to display the system-wide information for DVMRP .
DVMRP INTERFACE STATUS Interface Interface Mode Protocol State --------- -------------- -------------- show ip dvmrp interface Use the show ip dvmrp interface command in Privileged EXEC mode to display the interface information for DVMRP on the specified interface. Syntax vlan-id show ip dvmrp interface vlan vlan-id —...
Default Configuration This command has no default condition. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example displays the neighbor information for DVMRP . console(config)#show ip dvmrp neighbor No neighbors available.
Example The following example displays the next hop information on outgoing interfaces for routing multicast datagrams. console(config)#show ip dvmrp nexthop Next Hop Source IP Source Mask Interface Type -------------- -------------- --------- ------ show ip dvmrp prune Use the show ip dvmrp prune command in Privileged EXEC mode to display the table that lists the router’s upstream prune information.
show ip dvmrp route Use the show ip dvmrp route command in Privileged EXEC mode to display the multicast routing information for DVMRP. Syntax show ip dvmrp route Default Configuration This command has no default condition. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines.
GMRP Commands The GARP Multicast Registration Protocol provides a mechanism that allows networking devices to dynamically register (and de-register) Group membership information with the MAC networking devices attached to the same segment, and for that information to be disseminated across all networking devices in the bridged LAN that support Extended Filtering Services.
The registration and de-registration of membership results in the multicast table being updated with a new entry or the existing entry modified. This ensures that the networking device receives multicast frames from all ports but forwards them through only those ports for which GMRP has created Group registration entry (for that multicast address).
User Guidelines IGMP snooping is incompatible with GMRP and must be disabled on any VLANs running GMRP . Example In this example, GMRP is globally enabled. console(config)#gmrp enable show gmrp configuration Use the show gmrp configuration command in Global Configuration mode and Interface Configuration mode to display GMRP configuration.
IGMP Commands Internet Group Management Protocol (IGMP) is the multicast group membership discovery protocol used for IPv4 multicast groups. Three versions of IGMP exist. Versions one and two are widely deployed. Since IGMP is used between end systems (often desktops) and the multicast router, the version of IGMP required depends on the end-user operating system being supported.
IGMPv2 introduced a Leave Group message, which is sent by a host when it leaves a multicast group for which it was the last host to send an IGMP Report message. Receipt of this message causes the Querier possibly to reduce the remaining lifetime of its state for the group, and to send a group- specific IGMP Query message to the multicast group.The Leave Group message is not used with IGMPv3, since the source address filtering...
Syntax ip igmp no ip igmp Default Configuration Disabled is the default state. Command Mode Global Configuration mode User Guidelines A multicast routing protocol (e.g. PIM) should be enabled whenever IGMP is enabled. L3 IP multicast must be enabled for IGMP to operate. Example The following example globally enables IGMP .
Command Mode Interface Configuration (VLAN) mode User Guidelines This command has no user guidelines. Example The following example sets 10 as the number of VLAN 2 Group-Specific Queries. console#configure console(config)#interface vlan 2 console(config-if-vlan2)#ip igmp last-member-query-count 10 console(config-if-vlan2)#no ip igmp last-member-query-count ip igmp last-member-query-interval Use the ip igmp last-member-query-interval command in Interface Configuration mode to configure the Maximum Response Time inserted in...
Example The following example configures 2 seconds as the Maximum Response Time inserted in VLAN 15’s Group-Specific Queries. console(config)#interface vlan 15 console(config-if-vlan15)#ip igmp last-member-query-interval 20 ip igmp query-interval Use the ip igmp query-interval command in Interface Configuration mode to configure the query interval for the specified interface. The query interval determines how fast IGMP Host-Query packets are transmitted on this interface.
ip igmp query-max-response-time Use the ip igmp query-max-response-time command in Internet Configuration mode to configure the maximum response time interval for the specified interface. It is the maximum query response time advertised in IGMPv2 queries on this interface. The time interval is specified in seconds. Syntax seconds ip igmp query-max-response-time...
Syntax robustness ip igmp robustness no ip igmp robustness robustness — Robustness variable. (Range: 1-255) • Default Configuration The default robustness value is 2. Command Mode Interface Configuration (VLAN) mode User Guidelines This command has no user guidelines. Example The following example configures a robustness value of 10 for VLAN 15. console(config)#interface vlan 15 console(config-if-vlan15)#ip igmp robustness 10 ip igmp startup-query-count...
Command Mode Interface Configuration (VLAN) mode User Guidelines This command has no user guidelines. Example The following example sets for VLAN 15 the number of queries sent out on startup at 10. console(config)#interface vlan 15 console(config-if-vlan15)#ip igmp startup-query-count 10 ip igmp startup-query-interval Use the ip igmp startup-query-interval command in Interface Configuration mode to set the interval between general queries sent at startup on the interface.
Example The following example sets at 10 seconds the interval between general queries sent at startup for VLAN 15. console(config)#interface vlan 15 console(config-if-vlan15)#ip igmp startup-query-interval 10 ip igmp version Use the ip igmp version command in Interface Configuration mode to configure the version of IGMP for an interface.
Syntax show ip igmp Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example displays system-wide IGMP information. console#show ip igmp IGMP Admin Mode......
Syntax show ip igmp groups [interface-type interface-number] [detail] Syntax Description Parameter Description interface-type Interface type of VLAN and a valid VLAN ID. interface-number Default Configuration This command has no default configuration. Command Mode User EXEC, Privileged EXEC modes, Config mode and all Config sub-modes User Guidelines This command has no user guidelines.
Syntax Description Parameter Description interface-type Interface type of VLAN and a valid VLAN ID. interface-number Default Configuration This command has no default configuration. Command Mode User EXEC, Privileged EXEC modes, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example displays IGMP information for VLAN 11.
show ip igmp membership Use the show ip igmp membership command in Privileged EXEC mode to display the list of interfaces that have registered in the multicast group. If detail is specified, this command displays detailed information about the listed interfaces. Syntax groupaddr ] [detail] show ip igmp membership [...
vlan-id — Valid VLAN ID • Default Configuration This command has no default configuration. Command Mode Privileged EXEC, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Examples The following example displays the IGMP statistical information for VLAN 7. console#show ip igmp interface stats vlan 7 Querier Status.......
Page 979
Default Value The Router-Alert option is not required by default. Command Mode Global Configuration Usage Guidelines If the router alert check is enabled, IGMP frames without the router-alert option in the IP header are discarded early in the processing of IGMP packets. If all the multicast hosts in the network include the router alert option as required by RFC 2236 and RFC 3376, then enabling this check can reduce the load on the system.
IGMP Proxy Commands IGMP Proxy is used by the router on IPv4 systems to enable the system to issue IGMP host messages on behalf of hosts that the system discovered through standard IGMP router interfaces, thus acting as proxy to all its hosts residing on its router interfaces.
Default Configuration Disabled is the default configuration. Command Mode Interface Configuration (VLAN) mode User Guidelines This command has no user guidelines. Example The following example enables the IGMP Proxy on the VLAN 15 router. console(config)#interface vlan 15 console(config-if-vlan15)#ip igmp-proxy ip igmp-proxy reset-status Use the ip igmp-proxy reset-status command in Interface Configuration mode to reset the host interface status parameters of the IGMP Proxy router.
Example The following example resets the host interface status parameters of the IGMP Proxy router. console(config)#interface vlan 15 console(config-if-vlan15)#ip igmp-proxy reset-status ip igmp-proxy unsolicit-rprt-interval Use the ip igmp-proxy unsolicit-rprt-interval command in Interface Configuration mode to set the unsolicited report interval for the IGMP Proxy router.
show ip igmp-proxy Use the show ip igmp-proxy command in Privileged EXEC mode to display a summary of the host interface status parameters. It displays status parameters only when IGMP Proxy is enabled. Syntax show ip igmp-proxy Default Configuration This command has no default configuration. Command Mode User EXEC, Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines...
Proxy Start Frequency......1 show ip igmp-proxy interface Use the show ip igmp-proxy interface command in Privileged EXEC mode to display a detailed list of the host interface status parameters. It displays status parameters only when IGMP Proxy is enabled. Syntax show ip igmp-proxy interface Default Configuration...
show ip igmp-proxy groups Use the show ip igmp-proxy groups command in Privileged EXEC mode to display a table of information about multicast groups that IGMP Proxy reported. It displays status parameters only when IGMP Proxy is enabled. Syntax show ip igmp-proxy groups Default Configuration This command has no default configuration.
Page 987
Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode, Config mode and all Config sub-modes User Guidelines This command has no user guidelines. Example The following example displays complete information about multicast groups that IGMP Proxy has reported. console#show ip igmp-proxy groups detail Interface Index........
IP Helper/DHCP Relay Commands The IP Helper feature provides the ability for a router to forward configured UDP broadcast packets to a particular IP address. This allows applications to reach servers on non-local subnets. This is possible even when the application is designed to assume a server is always on a local subnet or when the application uses broadcast packets to reach the server (with the limited broadcast address 255.255.255.255, or a network directed broadcast address).
Page 990
Protocol UDP Port Number NetBIOS Name Server NetBIOS Datagram Server TACACS Server Time Service DHCP Trivial File Transfer Protocol Certain preexisting configurable DHCP relay options do not apply to relay of other protocols. These options are unchanged. The user may optionally set a DHCP maximum hop count or minimum wait time.
• The protocol field in the IP header must be UDP (17). • The destination UDP port must match a configured relay entry. DHCP relay cannot be enabled and disabled globally. IP helper can be enabled or disabled globally. Enabling IP helper enables DHCP relay. Commands in this Chapter This chapter explains the following commands: bootpdhcprelay maxhopcount...
Command Mode Global Configuration mode User Guidelines Enable DHCP Relay using the ip helper enable command. Example The following example defines a maximum hopcount of 6. console(config)#bootpdhcprelay maxhopcount 6 bootpdhcprelay minwaittime Use the bootpdhcprelay minwaittime command in Global Configuration mode to configure the minimum wait time in seconds for BootP/DHCP Relay on the system.
Example The following example defines a minimum wait time of 10 seconds. console(config)#bootpdhcprelay minwaittime 10 clear ip helper statistics Use the clear ip helper statistics command to reset to 0 the statistics displayed in show ip helper statistics. Syntax clear ip helper statistics Default Configuration There is no default configuration for this command.
Parameter Description This command has no arguments or keywords. Default Configuration This is enabled by default for a DHCP relay agent. Command Mode Global Configuration mode User Guidelines Enable DHCP Relay using the ip helper enable command. Interface configuration takes precedence over global configuration. However if there is no interface configuration then global configuration is followed.
Parameter Description Parameter Description none (Optional) Disables the command function. Default Configuration This check is enabled by default. Command Mode Interface Configuration (VLAN) mode User Guidelines Enable DHCP Relay using the ip helper enable command. Use the global configuration command ip dhcp relay information option command to enable processing of DHCP circuit ID and remote agent ID options.
Default Configuration Disabled is the default configuration. Command Mode Global Configuration mode User Guidelines Enable DHCP Relay using the ip helper enable command. Example The following example enables the circuit ID and remote agent ID options. console(config)#ip dhcp relay information option ip dhcp relay information option-insert Use the ip dhcp relay information option-insert command in Interface Configuration mode to enable the circuit ID option and remote agent ID...
Command Mode Interface (VLAN) Configuration mode User Guidelines Enable DHCP Relay using the ip helper enable command. The interface configuration always takes precedence over global configuration. However, if there is no interface configuration, then global configuration is followed. Example The following example enables the circuit ID and remote agent ID options on vlan 10.
Page 998
(port 53), isakmp (port 500), mobile-ip (port 434), nameserver (port 42), netbios-dgm (port 138), netbios-ns (port 137), ntp (port 123), pim-auto- rp (port 496), rip (port 520), tacacs (port 49), tftp (port 69), and time (port 37). Other ports must be specified by number. Default Configuration No helper addresses are configured.
ip helper-address (interface configuration) Use the ip helper-address (interface configuration) command to configure the relay of certain UDP broadcast packets received on a specific interface. To delete a relay entry on an interface, use the no form of this command. Syntax ip helper-address {server-address | discard} [dest-udp-port | dhcp | domain | isakmp | mobile ip | nameserver | netbios-dgm | netbios-ns | ntp | pim-...
Page 1000
User Guidelines This command can be invoked multiple times on routing interface, either to specify multiple server addresses for a given port number or to specify multiple port numbers handled by a specific server. The command no ip helper-address with no arguments clears all helper addresses on the interface.