CLI iMR320 1 - 41.1 4 EN
CLI iMR320 1 - 41.1 4 EN
CLI iMR320 1 - 41.1 4 EN
i
TRADEMARKS
COPYRIGHT NOTICE
Copyright Notice
© 2024 iS5 Communications Inc. All rights reserved.
No Part of this publication may be reproduced in any form without the prior written consent of iS5
Communications Inc. (iS5).
Trademarks
iS5Com is a registered trademark of iS5. All other trademarks belong to their respective owners.
Warranty
iS5 warrants that all products are free from defects in material and workmanship for a specified warranty
period from the invoice date (5 years for most products). iS5 will repair or replace products found to be
defective within this warranty period including shipping costs. This warranty does not cover product
modifications or repairs done by persons other than iS5-approved personnel, and this warranty does not
apply to products that are misused, abused, improperly installed, or damaged by accident. Refer to the
Technical Specifications for the actual warranty period(s) of the product(s) associated with this publica-
tion. Warranty certificate available at: https://is5com.com/warranty
Disclaimer
Information in this publication is intended to be accurate. iS5 shall not be responsible for its use or
infringements on third-parties because of the use of this publication. There may occasionally be uninten-
tional errors on this publication. iS5 reserves the right to revise the contents of this publication without
notice.
Contact Information
iS5 Communications Inc. 5895 Ambler Dr., Mississauga, Ontario, L4W 5B7 Tel: 1+ 905-670-0004 Website:
http://www.is5com.com/ Technical Support: E-mail: support@is5com.com Sales Contact: E-mail:
sales@is5com.com
ii
END USER LICENSE AGREEMENT (EULA)
iii
END USER LICENSE AGREEMENT (EULA)
quent appeal. If a Patent Claim is made or appears likely, Buyer agrees to permit Supplier to procure
for Buyer the right to continue using the affected product, or to replace or modify the product with
one that is at least functionally equivalent. If Supplier determines that none of those alternatives is
reasonably available, then Buyer will return the product and Supplier will refund Buyer’s remaining
net book value of the product calculated according to generally accepted accounting principles.
Supplier has no obligation for any Patent Claim related to: (1) compliance with any designs, specifi-
cations, or instructions provided by Buyer or a third party on Buyer’s behalf; (2) modification of a
product by Buyer or a third party; (3) the amount or duration of use which Buyer makes of the prod-
uct, revenue earned by Buyer from services it provides that use the product, or services offered by
Buyer to external or internal Buyers; (4) combination, operation or use of a product with non-Sup-
plier products, software or business processes; or (5) use of any product in any country other than
the country or countries specifically authorized by Supplier.
3) EXPORT CONTROLS AND SANCTIONS
a) In these Term and Conditions, “Export Controls and Sanctions” means the export control and
sanctions laws of each of Canada, the US and any other applicable country, territory or juris-
diction including the United Nations, European Union and the United Kingdom, and any regu-
lations, orders, guides, rules, policies, notices, determinations or judgements issued
thereunder or imposed thereby.
b) Supplier products, documentation and services provided under these Terms and Conditions
may be subject to Canadian, U.S. and other country Export Controls and Sanctions. Buyer shall
accept and comply with all applicable Export Control and Sanctions in effect and as amended
from time to time pertaining to the export, re-export and transfer of Supplier’s products,
documentation and services. Buyer also acknowledges and agrees that the export, re-export
or transfer of Supplier products, documentation and services contrary to applicable Export
Controls and Sanctions may be a criminal offence.
c) For greater certainty, Buyer agrees that (i) it will not directly or indirectly export, re-export or
transfer Supplier products, documentation and services provided under these Terms and
Conditions to any individual or entity in violation of any aforementioned Export Controls and
Sanctions; (ii) it will not directly or indirectly export, re-export or transfer any such products,
documentation and services to any country or region of any country that is prohibited by any
applicable Export Controls and Sanctions or for any of the following end-uses, or in any of the
following forms unless expressly authorized by any applicable government permit issued
under or otherwise expressly permitted by applicable Export Controls and Sanctions:
i) For use that is directly or indirectly related to the research, design, handling, storage,
operation, detection, identification, maintenance, development, manufacture, produc-
tion or dissemination of chemical, biological or nuclear weapons, or any missile or other
delivery systems for such weapons, space launch vehicles, sounding rockets or
unmanned air vehicle systems;
ii) Technical information relating to the design, development or implementation of the
cryptographic components, modules, interfaces, or architecture of any software; or
iii) Source code or pseudo-code, in any form, of any of the cryptographic components,
modules, or interfaces of any software.
d) Buyer confirms that it is not (i) listed as a sanctioned person or entity under any Export
Controls and Sanctions list of designated persons, denied persons or specially designated
iv
EXHIBIT A: END USER LICENSE AGREEMENT
END USER LICENSE AGREEMENT (EULA)
nationals maintained by the Canadian Department of Foreign Affairs, Trade and Develop-
ment, the Canadian Department of Public Safety and Emergency Preparedness, the U.S.
Office of Foreign Assets Control of the U.S. Department of the Treasury, the U.S. Department
of State, the U.S. Department of Commerce, United Nations Security Council, the European
Union or any EU member state, HM’s Treasury, or any other department or agency of any of
the aforementioned countries or territories, or the United Nations or any other country’s
sanctions-related list; (ii) owned or controlled by such person or entity; or (iii) acting in any
capacity on behalf of or for the benefit of such person or entity. Buyer also confirms that this
applies equally to any of its affiliates, joint venture partners, subsidiaries and to the best of
Buyer’s knowledge, any of its agents or representatives.
v
EXHIBIT A: END USER LICENSE AGREEMENT
END USER LICENSE AGREEMENT (EULA)
– “iS5Com Software” means Software supplied by or on behalf of iS5Com under the Contract.
For greater certainty, iS5Com Software shall include all operating Software for iS5Com Hard-
ware, and iS5Com Firmware.
– “Documentation” means written instructions and manuals of a technical nature.
– “EULA” means this End User License Agreement.
– “Hardware” means hardware, mainframes, personal computers, servers, client/server
stations, network equipment, routers, semi-conductor chips, communication lines and other
equipment.
– “Intellectual Property Rights” means any and all proprietary rights provided under: (i) patent
law; (ii) copyright law (including moral rights); (iii) trade-mark law; (iv) design patent or indus-
trial design law; (v) semi-conductor chip or mask work law; or (vi) any other statutory provi-
sion or common law principle applicable to this EULA, including trade secret law, which may
provide a right in either Hardware, Software, Documentation, Confidential Information,
ideas, formulae, algorithms, concepts, inventions, processes or know-how generally, or the
expression or use of such Hardware, Software, Documentation, Confidential Information,
ideas, formulae, algorithms, concepts, inventions, processes or know-how trade secret law;
any and all applications, registrations, licenses, sub-licenses, franchises, agreements or any
other evidence of a right in any of the foregoing; and all licenses and waivers and benefits of
waivers of the intellectual property rights set out herein, all future income and proceeds from
the intellectual property rights set out herein, and all rights to damages and profits by reason
of the infringement of any of the intellectual property rights set out herein.
– “Software” means scripts, programs, macros, computer programs, application programming
and other interfaces, tools and other instructions and sets of instructions for hardware to
follow, including SQL and other query languages, hypertext markup language (“html”) and
other computer mark-up languages.
– “Third Party License Terms” means additional terms and conditions that are applicable to
Third Party Software.
– “Third Party Software” means Software owned by any third party, licensed to iS5Com and
sublicensed to the Customer.
– “Update” means a supplemented or revised version of iS5Com Software which rectifies bugs
or makes minor changes or additions to the functionality of iS5Com Software and is desig-
nated by iS5Com as a higher release number from, for example, 6.06 to 6.07 or 6.1 to 6.2.
2) LICENSE
– 2.1 License Grant
The iS5Com hereby grants to the Customer, subject to any Third Party License Terms, a non-ex-
clusive, non-transferable, non-sublicensable right and licence to use iS5Com Materials solely
in object code format, solely for the Customer’s own business purposes, solely in accordance
with this EULA (including, for greater certainty, subject to Section 6.1 of this EULA) and the ap-
plicable iS5Com Documentation, and, in the case of iS5Com Firmware, solely on iS5Com Hard-
ware on which iS5Com Firmware was installed, provided that Customer may only install
iS5Com Software on such number of nodes expressly set out in the Contract.
– 2.2 License Restrictions
vi
EXHIBIT A: END USER LICENSE AGREEMENT
END USER LICENSE AGREEMENT (EULA)
Except as otherwise provided in Section 2.1 above, the Customer shall not: (a) copy iS5Com
Materials for any purpose, except for the sole purpose of making an archival or back-up copy;
(b) modify, translate or adapt the iS5Com Materials, or create derivative works based upon all
or part of such iS5Com Materials; (c) assign, transfer, loan, lease, distribute, export, transmit,
or sublicense iS5Com Materials to any other party; (d) use iS5Com Materials for service bu-
reau, rent, timeshare or similar purposes; (e) decompile, disassemble, decrypt, extract, or oth-
erwise reverse engineer, as applicable, iS5Com Software or iS5Com Hardware; (f) use iS5Com
Materials in a manner that uses or discloses the Confidential Information of iS5Com or a third
party without the authorization of such person; (g) permit third parties to use iS5Com Materi-
als in any way that would constitute breach of this EULA; or (h) otherwise use iS5Com Materi-
als except as expressly authorized herein.
– 2.3 Updates and Upgrades
The license granted hereunder shall apply to the latest version of iS5Com Materials provided
to the Customer as of the effective date of this EULA, and shall apply to any Updates and Up-
grades subsequently provided to the Customer by iS5Com pursuant to the terms of this EULA.
Customer shall only be provided with Updates and/or Upgrades if expressly set out in the Con-
tract.
– 2.4 Versions
In the event any Update or Upgrade includes an amended version of this EULA, Customer will
be required to agree to such amended version in order to use the applicable iS5Com Materials
and such amended EULA shall be deemed to amend the previously effective version of the EU-
LA.
– 2.5 Third Party Software
Customer shall comply with any Third Party License Terms.
3) OWNERSHIP
– 3.1 Intellectual Property
Notwithstanding any other provision of the Contract, iS5Com and the Customer agree that
iS5Com is and shall be the owner of all Intellectual Property Rights in iS5Com Materials and all
related modifications, enhancements, improvements and upgrades thereto, and that no pro-
prietary interests or title in or to the intellectual property in iS5Com Materials is transferred to
the Customer by this EULA. iS5Com reserves all rights not expressly granted to the Customer
under Section 2.1.
– 3.2 Firmware
iS5Com and the Customer agree that any and all iS5Com Firmware in or forming a part of
iS5Com Hardware is being licensed and not sold, and that the words “purchase,” “sell” or sim-
ilar or derivative words are understood and agreed to mean “license,” and that the word “Cus-
tomer” as used herein are understood and agreed to mean “licensee,” in each case in
connection with iS5Com Firmware.
– 3.3 Third Party Software
Certain of iS5Com Software provided by iS5Com may be Third Party Software owned by one or
more third parties and sublicensed to the Customer. Such third parties retain ownership of and
title to such Third Party Software, and may directly enforce the Customer’s obligations here-
under in order to protect their respective interests in such Third Party Software.
vii
EXHIBIT A: END USER LICENSE AGREEMENT
END USER LICENSE AGREEMENT (EULA)
4) CONFIDENTIALITY
– 4.1 Confidentiality
The Customer acknowledges that iS5Com Materials contain Confidential Information of
iS5Com and that disclosure of such Confidential Information to any third party could cause
great loss to iS5Com. The Customer agrees to limit access to iS5Com Materials to those em-
ployees or officers of the Customer who require access to use iS5Com Materials as permitted
by the Contract and this EULA and shall ensure that such employees or officers keep the Con-
fidential Information confidential and do not use it otherwise than in accordance with the Con-
tract and this EULA. The obligations set out in this Section 4 shall continue notwithstanding
the termination of the Contract or this EULA and shall only cease to apply with respect to such
part of the Confidential Information as is in, or passes into, the public domain (other than in
connection with the Customer’s breach of this EULA) or as the Customer can demonstrate was
disclosed to it by a third person who did not obtain such information directly or indirectly from
iS5Com.
– 4.2 Irreparable Harm
Without limiting any other rights or remedies available to iS5Com in law or in equity, the Cus-
tomer acknowledges and agrees that the breach by Customer of any of the provisions of this
EULA would cause serious and irreparable harm to iS5Com which could not adequately be
compensated for in damages and, in the event of a breach by the Customer of any of such pro-
visions, the Customer hereby consents to an injunction against it restraining it from any fur-
ther breach of such provisions.
– 4.3 Security
Any usernames, passwords and/or license keys (“Credentials”) provided to you by iS5Com
shall be maintained by the Customer and its representatives in strict confidence and shall not
be communicated to or used by any other persons. THE CUSTOMER SHALL BE RESPONSIBLE
FOR ALL USE OF CREDENTIALS, REGARDLESS OF THE IDENTITY OF THE PERSON(S) MAKING
SUCH USE, AND WITHOUT LIMITING THE GENERALITY OF THE FOREGOING, IS5COM SHALL
HAVE NO RESPONSIBILITY OR LIABILITY IN CONNECTION WITH ANY UNAUTHORIZED USE OF
CREDENTIALS.
5) LIMITATION OF LIABILITY
– 5.1 Disclaimer
EXCEPT FOR THE EXPRESS WARRANTIES MADE BY IS5COM IN THE CONTRACT, (A) IS5COM
MAKES NO AND HEREBY EXPRESSLY DISCLAIMS, AND THE PARTIES HERETO HEREBY EXPRESS-
LY WAIVE AND EXCLUDE TO THE FULLEST EXTENT PERMITTED BY APPLICABLE LAWS, AND THE
CUSTOMER AGREES NOT TO SEEK OR CLAIM ANY BENEFIT THEREOF, IN EACH CASE, ALL WAR-
RANTIES, CONDITIONS, REPRESENTATIONS OR INDUCEMENTS (AND THERE ARE NO OTHER
WARRANTIES, CONDITIONS, REPRESENTATIONS OR INDUCEMENTS, ORAL OR WRITTEN, EX-
PRESS OR IMPLIED, STATUTORY OR OTHERWISE, OF ANY KIND WHATSOEVER SET OUT HERE-
IN) WITH RESPECT TO THE IS5COM MATERIALS, INCLUDING AS TO THEIR MERCHANTABILITY
OR FITNESS FOR A PARTICULAR PURPOSE, DESIGN OR CONDITION, COMPLIANCE WITH THE
REQUIREMENTS OF ANY APPLICABLE LAWS, CONTRACT OR SPECIFICATION, NON- INFRINGE-
MENT OF THE RIGHTS OF OTHERS, ABSENCE OF LATENT DEFECTS, OR AS TO THE ABILITY OF
THE IS5COM MATERIALS TO MEET CUSTOMER’S REQUIREMENTS OR TO OPERATE OF ERROR
viii
EXHIBIT A: END USER LICENSE AGREEMENT
END USER LICENSE AGREEMENT (EULA)
FREE; AND (B) THE IS5COM MATERIALS ARE PROVIDED “AS IS” WITHOUT WARRANTY OR
CONDITION OF ANY KIND.
– 5.2 Limitation of Liability
EXCEPT AS EXPRESSLY PROVIDED IN THE CONTRACT, IN NO EVENT SHALL IS5COM BE LIABLE
TO THE CUSTOMER OR ANY THIRD PARTY FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSE-
QUENTIAL DAMAGES ARISING UNDER OR IN CONNECTION WITH THIS EULA EVEN IF ADVISE
OF THE POSSIBILITY THEREOF. THIS LIMITATION SHALL APPLY IRRESPECTIVE OF THE NATURE
OF THE CAUSE OF ACTION, DEMAND OR CLAIM, INCLUDING BREACH OF CONTRACT, NEGLI-
GENCE, TORT OR ANY OTHER LEGAL THEORY, AND SHALL SURVIVE A FUNDAMENTAL BREACH
OR BREACHES AND/OR FAILURE OF THE ESSENTIAL PURPOSE OF THIS EULA.
6) TERM
– 6.1 Term
Customer’s right to use iS5Com Materials shall terminate at such time as set out in the Con-
tract or upon termination or expiration of the Contract, in each case at which time this EULA
shall be deemed to terminate.
– 6.2 Survival
Each of Sections 1, 2.4, 3, 4, 5, 6.2, and 7 shall survive termination of the EULA.
7) MISCELLANEOUS
– 7.1 Miscellaneous
This EULA is (together with, as applicable, any click-wrap license agreement or Third Party Li-
cense Terms pertaining to the use of iS5Com Materials) the entire agreement between the
Customer and iS5Com pertaining to the Customer’s right to access and use iS5Com Materials,
and supersedes all prior or collateral oral or written representations or agreements related
thereto. Notwithstanding anything to the contrary contained in the Contract, to the extent of
any inconsistency between this EULA and the Contract, or any such applicable click-wrap
agreement, this EULA shall take precedence over the Contract and such click- wrap agree-
ment. In the event that one or more of the provisions is found to be illegal or unenforceable,
this EULA shall not be rendered inoperative but the remaining provisions shall continue in full
force and effect. The parties expressly disclaim the application of the United Nations Conven-
tion for the International Sale of Goods. This EULA shall be governed by the laws of the Prov-
ince of Ontario, Canada, and federal laws of Canada applicable therein. In giving effect to this
EULA, neither party will be or be deemed an agent of the other for any purpose and their re-
lationship in law to the other will be that of independent contractors. Any waiver of any terms
or conditions of this EULA: (a) will be effective only if in writing and signed by the party grant-
ing such waiver, and (b) shall be effective only in the specific instance and for the specific pur-
pose for which it has been given and shall not be deemed or constitute a waiver of any other
provisions (whether or not similar) nor shall such waiver constitute a continuing waiver unless
otherwise expressly provided. The failure of either party to exercise, and any delay in exercis-
ing, any of its rights hereunder, in whole or in part, shall not constitute or be deemed a waiver
or forfeiture of such rights, neither in the specific instance nor on a continuing basis. No single
or partial exercise of any such right shall preclude any other or further exercise of such right
or the exercise of any other right. Customer shall not assign or transfer this EULA or any of its
rights or obligations hereunder, in whole or in part, without the prior written consent of
ix
EXHIBIT A: END USER LICENSE AGREEMENT
END USER LICENSE AGREEMENT (EULA)
iS5Com. The division of this EULA into sections and the insertion of headings are for conve-
nience of reference only and shall not affect the construction or interpretation of this EULA.
References herein to Sections are to sections of this Agreement. Where the word “include”,
“includes” or “including” is used in this EULA, it means “include”, “includes” or “including”, in
each case, “without limitation”. All remedies provided for iS5Com under this EULA are non-ex-
clusive and are in addition, and without prejudice, to any other rights as may be available to
of iS5Com, whether in law or equity. By electing to pursue a remedy, of iS5Com does not waive
its right to pursue any other available remedies. The parties acknowledge that they have re-
quired this Agreement to be written in English. Les parties aux présentes reconnaissent
qu’elles ont exigé que la présente entente soit rédigée en anglais.
– 7.2 Subject to Change
Terms and Conditions are subject to change. For the latest information please visit:
https://is5com.com/terms-and-conditions/
x
Contents
Copyright Notice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
Chapter: 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
CLI Document Convention . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Keyboard Conventions and Shortcuts . . . . . . . . . . . . . . . . . . . . 2
i
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
configure terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
listuser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
username . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
enable password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
exec-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
logout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
end . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
exit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
enableuser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
ii
clear line vty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
set user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
Maximum Number of Users Allowed . . . . . . . . . . . . . . . .33
set minimum password length . . . . . . . . . . . . . . . . . . . . . . . .33
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
set cli pagination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
set banner-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
set prompt-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
factory reset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
show privilege . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
show line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
show aliases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
show history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
iii
show eula . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39
show users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40
set cli-console access . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40
Related Commands . . . . . . . . . . . . . . . . . . . . . . . . .40
set mgmt-port access . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41
Related Commands . . . . . . . . . . . . . . . . . . . . . . . . .41
set external-storage access . . . . . . . . . . . . . . . . . . . . . . . . .41
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42
Related Commands . . . . . . . . . . . . . . . . . . . . . . . . .42
iv
login authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
set ip http . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
authorized-manager ip-source . . . . . . . . . . . . . . . . . . . . . . . .55
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
mtu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
loopback local . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60
archive download-sw . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
mac-addr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66
snmp trap link-status . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
v
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
monitor session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68
show monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
mirror cpu-port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
show cpu-mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
write . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76
set linkup-delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77
linkup-delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
show linkup-delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79
firmware switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80
firmware upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81
vi
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81
clock set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82
erase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
cli console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
flowcontrol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
debug interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .89
debug-logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .89
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .89
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .89
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .89
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
rollback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92
start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92
vii
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93
set switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95
hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96
set designated-uplink . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97
mac-learn-rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99
ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
set port-role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
clear interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
clear counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
show ip interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
show authorized-managers . . . . . . . . . . . . . . . . . . . . . . . . 106
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
viii
show interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
show system-specific port-id . . . . . . . . . . . . . . . . . . . . . . . . 116
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
set custom-param . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
show custom-param . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
show env . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
show system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
show flow-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
show debug-logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
show debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
show clock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
show running-config . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
show health status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
show mac-learn-rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
ix
set timer speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
audit-logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Remote Logging Example . . . . . . . . . . . . . . . . . . . . . 132
Disabling Audit-Logging . . . . . . . . . . . . . . . . . . . . . . 133
Seeing all available local files including current . . . . . . . . . 133
Seeing content of the local file . . . . . . . . . . . . . . . . . . 133
Viewing the audit logging configuration . . . . . . . . . . . . . 134
show audit-logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
shutdown ufd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
set ufd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
ufd group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
UFD Configuration . . . . . . . . . . . . . . . . . . . . . . . . . 138
internal-lan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
show internal-lan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
show iftype protocol deny table . . . . . . . . . . . . . . . . . . . . . . 142
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
login block-for . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
x
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
show ufd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
feature telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
show telnet server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
set http . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
show http . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
http redirect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
set split-horizon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
shutdown split-horizon . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
show split-horizon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
speed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
sleep . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
xi
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
rate-limit pause . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
cpu controlled learning . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
traffic-separation control . . . . . . . . . . . . . . . . . . . . . . . . . 155
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
mdix auto . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
set port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
config-restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
set mgmt-port routing . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
set switch-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
show packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
xii
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
port-security-state . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
default-value save . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
set mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
default exec-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
web-session timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Default Value . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
clear http server statistics . . . . . . . . . . . . . . . . . . . . . . . . . 169
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
show web-session timeout . . . . . . . . . . . . . . . . . . . . . . . . . 170
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
show config-restore status . . . . . . . . . . . . . . . . . . . . . . . . . 170
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
clear protocol counters . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
dump core-file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
xiii
dump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
debug iss . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
show nvram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
debug np module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
show l3vlan interfaces counters . . . . . . . . . . . . . . . . . . . . . . 181
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
set entity physical-index . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
show entity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
gratuitous arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Example: Enabling Gratuitous ARP . . . . . . . . . . . . . . . . 189
Example: Disabling Gratuitous ARP . . . . . . . . . . . . . . . . 189
show grat-arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Example: Show Gratuitous ARP . . . . . . . . . . . . . . . . . . 190
xiv
show opensource-packages . . . . . . . . . . . . . . . . . . . . . . . . 191
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
show firmware information . . . . . . . . . . . . . . . . . . . . . . . . 191
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
show system information . . . . . . . . . . . . . . . . . . . . . . . . . 192
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
show iss-health status . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
show env all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
show alarm status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
set cli pagination on . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
xv
tacacs-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
show tacacs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
debug tacacs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
xvi
Chapter: 8 SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .218
show ssl server-cert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
show ip http . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
ip http . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
crypto pki keygen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Related Commands . . . . . . . . . . . . . . . . . . . . . . . . 224
crypto pki csrgen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
crypto pki import . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
ip http secure crypto key . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
no crypto pki . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
show crypto PKI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
show crypto map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
xvii
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
set sntp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
show sntp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
debug sntp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
xviii
Authentication Failure Trap . . . . . . . . . . . . . . . . . . . . 284
Link UP / DOWN Trap . . . . . . . . . . . . . . . . . . . . . . . 285
Spanning Tree Trap . . . . . . . . . . . . . . . . . . . . . . . . . 286
Temperature Trap . . . . . . . . . . . . . . . . . . . . . . . . . 287
Port Security Traps . . . . . . . . . . . . . . . . . . . . . . . . . 288
disable snmpagent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
enable snmpagent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
show mib . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
show snmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
show snmp-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
snmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
snmpget mib . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
snmpgetnext mib . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
snmp-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
snmpset mib . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
snmpwalk mib . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
xix
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
xx
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Related Commands: . . . . . . . . . . . . . . . . . . . . . . . . 364
mail-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
sender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
cmdbuffs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
clear logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
show logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
show flash logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
show email alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
show syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
show logging-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
show logging-file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
show mail-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
xxi
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
smtp authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
xxii
debug spanning-tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
errordisable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
revision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
set performance-data . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
set performance-data-status . . . . . . . . . . . . . . . . . . . . . . . 404
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
show spanning-tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
shutdown spanning-tree . . . . . . . . . . . . . . . . . . . . . . . . . . 422
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
spanning-tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
spanning-tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
xxiii
Chapter: 16 MRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .439
Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
MRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440
MRP Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440
Normal Operation: Ring Closed . . . . . . . . . . . . . . . . . . . . . . 441
Failure Detection: Ring Open . . . . . . . . . . . . . . . . . . . . . . . 442
Alarms supported in MRP . . . . . . . . . . . . . . . . . . . . . . . . . 443
MRP status change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
MRM condition/detected . . . . . . . . . . . . . . . . . . . . . . . . . 444
mrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
mrp ringid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
mrp vid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
uuid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
show mrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
Definitions of Errors . . . . . . . . . . . . . . . . . . . . . . . . 450
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
xxiv
no shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
HSR/PRP Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
Redundancy Enable/Disable Mode . . . . . . . . . . . . . . . . 459
redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Supervision VLAN ID . . . . . . . . . . . . . . . . . . . . . . . . 460
supervision-vlan-id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460
supervision-priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
Port Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
HSR Operational Mode . . . . . . . . . . . . . . . . . . . . . . 463
hsr-operational-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
HSR-RSTP Fast Recovery . . . . . . . . . . . . . . . . . . . . . . 465
hsr-rstp-fast-recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
HSR NetId . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
hsr-netid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
PRP Trailer Passing . . . . . . . . . . . . . . . . . . . . . . . . . 466
prp-trailer-pass . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
QuadBox VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . 467
redundant quad-box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Informational Commands . . . . . . . . . . . . . . . . . . . . . . . . . 468
show interfaces redundant . . . . . . . . . . . . . . . . . . . . 468
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
show interfaces counters redundant . . . . . . . . . . . . . . . 474
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Clear Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
clear interfaces redundant . . . . . . . . . . . . . . . . . . . . 475
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
clear counters redundant . . . . . . . . . . . . . . . . . . . . . 476
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
clear hsr-prp redundant . . . . . . . . . . . . . . . . . . . . . . 476
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Chapter: 18 LA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .478
channel-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
xxv
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
channel-protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
debug etherchannel . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
debug lacp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
default port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485
defaulted-state-threshold . . . . . . . . . . . . . . . . . . . . . . . . . 485
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485
hw-failure recovery-threshold . . . . . . . . . . . . . . . . . . . . . . . 485
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
lacp admin-key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
lacp port-identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488
lacp port-priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
xxvi
lacp rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
lacp system-identifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
lacp system-priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
lacp timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
lacp wait-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
port-channel max-ports . . . . . . . . . . . . . . . . . . . . . . . . . . 494
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
port-channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
same-state recovery-threshold . . . . . . . . . . . . . . . . . . . . . . 500
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
set port-channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502
show etherchannel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
xxvii
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504
show interfaces etherchannel . . . . . . . . . . . . . . . . . . . . . . . 507
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509
show lacp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
shutdown port-channel . . . . . . . . . . . . . . . . . . . . . . . . . . 512
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512
xxviii
show lldp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
xxix
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
clear garp counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
clear mac-address-table . . . . . . . . . . . . . . . . . . . . . . . . . . 563
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566
clear vlan statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568
debug garp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570
debug vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
forward-all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576
forward-unregistered . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
group restricted . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
xxx
interface range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
mac-address-table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586
mac-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588
map protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
map subnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596
ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 600
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
port-security trap-syslog . . . . . . . . . . . . . . . . . . . . . . . . . . 601
xxxi
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601
Syslogs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 602
port-security violation . . . . . . . . . . . . . . . . . . . . . . . . . . . 602
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
protocol-vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
set filtering-utility-criteria . . . . . . . . . . . . . . . . . . . . . . . . . 604
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 604
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
set garp timer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
set gmrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
set gvrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609
set mac-learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
set packet-reflection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611
set port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 612
xxxii
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
set sw-stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
set unicast-mac learning . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
set vlan traffic-classes . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
show forward-all . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 617
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 618
show forward-unregistered . . . . . . . . . . . . . . . . . . . . . . . . 618
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
show garp timer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621
show gmrp statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
show gvrp statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624
show mac-address-table . . . . . . . . . . . . . . . . . . . . . . . . . . 625
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631
xxxiii
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632
show port-security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 634
show unicast port-security . . . . . . . . . . . . . . . . . . . . . . . . . 635
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
show user-defined TPID . . . . . . . . . . . . . . . . . . . . . . . . . . 637
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638
show vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 642
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 642
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 642
shutdown garp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 650
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 650
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
shutdown vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652
switchport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 652
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661
Enabling Port Security . . . . . . . . . . . . . . . . . . . . . . . 662
MAC learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 662
Unicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
user-defined TPID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664
vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
xxxiv
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670
vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 672
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674
Nested VLAN with sub-switch CLI command . . . . . . . . . . . . . . . 674
Nested VLAN Feature . . . . . . . . . . . . . . . . . . . . . . . 674
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675
Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675
Nested VLAN with elementary CLI commands . . . . . . . . . . . . . . 676
Creating a Nested VLAN with elementary CLI Commands . . . 676
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 676
Verification of the Created Nested VLAN . . . . . . . . . . . . . 677
Chapter: 22 IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .678
arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 678
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
clear ip arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
ip aggregate-route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
ip arp max-retries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
ip default-distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
xxxv
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
ip default-ttl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
ip directed-broadcast . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
ip echo-reply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
ip mask-reply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
ip path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 688
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 689
ip proxy-arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 690
ip proxyarp-subnetoption . . . . . . . . . . . . . . . . . . . . . . . . . 690
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
ip rarp client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 691
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
ip redirects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
ip unreachables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 693
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 693
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 693
xxxvi
ipv4 enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 693
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
maximum-paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697
show ip default-distance . . . . . . . . . . . . . . . . . . . . . . . . . . 697
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697
show ip proxy-arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
traffic-share . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
debug ip arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
ip route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
ip routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
show ip arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 706
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
show ip information . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
show ip pmtu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 708
xxxvii
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 708
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 708
show ip proxy-arp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 708
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
show ip rarp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709
show ip route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711
show ip traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714
traceroute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 716
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 716
xxxviii
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731
compatible rfc1583 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732
debug ip ospf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733
disable bfd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734
default-information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736
distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
distribute-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738
enable bfd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738
ip ospf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 741
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 747
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 747
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 747
neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 748
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 750
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 751
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
xxxix
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
nsf ietf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
passive-interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 760
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761
redist-config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764
redistribute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 766
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 766
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 766
route-calculation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 766
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
router ospf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768
router-id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 769
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 769
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 769
set nssa asbr-default-route . . . . . . . . . . . . . . . . . . . . . . . . 769
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 770
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 770
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 770
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 770
show ip ospf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 770
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 777
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 777
xl
summary-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 781
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 782
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 783
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 783
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 783
timers spf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 783
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 784
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 784
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 784
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 784
xli
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796
excluded-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 796
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 797
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 797
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 797
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 797
host hardware-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 797
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 799
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 800
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 800
ip dhcp bootfile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801
ip dhcp client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 803
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 804
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 805
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 805
ip dhcp client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 805
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 806
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 806
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 806
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807
ip dhcp dns-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 807
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 808
ip dhcp excluded-address . . . . . . . . . . . . . . . . . . . . . . . . . 808
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 808
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 808
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809
ip dhcp next-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 810
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 810
ip dhcp ntp-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 810
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 810
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 810
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 811
ip dhcp option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 811
xlii
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 811
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 811
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 812
ip dhcp pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 812
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 812
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 812
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 813
ip dhcp relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 813
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815
ip dhcp server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 816
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 816
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 816
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 816
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 816
ip dhcp sip-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 816
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 817
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 817
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 817
ip dhcp snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 817
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 818
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 818
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 818
ip dhcp snooping trust . . . . . . . . . . . . . . . . . . . . . . . . . . . 818
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 818
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 819
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 819
ip dhcp snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 819
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 820
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 820
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 820
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 820
lease . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 820
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
netbios-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 822
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 822
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 822
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 822
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 822
netbios-node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 823
xliii
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 823
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 823
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 824
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 824
netbios-node-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 824
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825
network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 826
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 826
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827
ntp-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 828
option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 828
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829
release dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 830
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 830
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 831
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 831
renew dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 831
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
service dhcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833
service dhcp-relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834
service dhcp-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
xliv
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
set dhcp-client enable / disable . . . . . . . . . . . . . . . . . . . . . . 835
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
show dhcp server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836
show ip dhcp client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 837
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 837
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 837
show ip dhcp relay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 838
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839
show ip dhcp server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 840
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 841
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 841
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 841
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 841
show ip dhcp snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . 843
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 844
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 844
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 844
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 844
show dhcp-client module status . . . . . . . . . . . . . . . . . . . . . . 845
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 845
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 845
sip-server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 845
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 846
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 846
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 846
utilization threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . 846
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847
vendor-specific . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 848
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 848
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 848
xlv
Chapter: 25 RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .849
auto-summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850
debug ip rip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852
default-information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853
default-metric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853
distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 854
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 854
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 854
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 854
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 854
distribute-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855
ip rip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 856
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 857
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 861
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 861
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 861
ip rip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 862
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863
ip split-horizon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864
neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 864
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 865
xlvi
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 865
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 865
network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 865
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 866
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 867
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 867
output-delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 867
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 868
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 868
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 868
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 868
passive-interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 868
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 870
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 871
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 871
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 871
redistribute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 871
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 872
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 872
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 872
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 872
rip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 873
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 874
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 874
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 874
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 874
router rip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 874
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 875
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 875
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 875
show ip rip . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 875
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 876
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 876
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 876
timers basic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 877
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878
version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879
xlvii
Chapter: 26 BGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .880
address-family . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 880
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881
Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881
aggregate-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 883
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 884
Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 884
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 884
bgp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 884
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 888
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 900
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 900
clear ip bgp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 901
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 902
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 902
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 903
debug ip bgp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 903
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 903
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 903
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 903
default-information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 903
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 904
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 904
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 904
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 904
default-metric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 904
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905
distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905
If Routemap is disabled . . . . . . . . . . . . . . . . . . . . . . 905
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 906
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 906
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 906
distribute-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 906
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 907
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 907
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 907
do shutdown ip bgp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 907
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 907
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 907
ip bgp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 908
xlviii
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 909
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 909
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 909
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 910
label-allocation-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 910
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 910
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 910
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 910
maximum-paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 910
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 911
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 911
Note . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 911
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 911
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 911
neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 914
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 922
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 922
network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 924
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 924
Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 924
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 924
redistribute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 924
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 926
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 926
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 926
Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 927
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 927
restart-reason . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 927
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 927
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 927
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 928
restart-support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 928
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 928
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 928
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 928
router bgp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 928
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 929
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 929
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 929
Note . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 929
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 929
show bgp-version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 930
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 930
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 930
xlix
show ip bgp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 930
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 931
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 931
synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 931
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 932
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 932
Note . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 932
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 932
tcp-ao mkt key-id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 932
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 933
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 933
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 933
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 933
l
show ip igmp snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . 957
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 959
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 963
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 963
shutdown snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 967
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 967
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 967
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 967
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 967
snooping leave-process . . . . . . . . . . . . . . . . . . . . . . . . . . 968
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 968
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 968
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 968
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 969
snooping report-process . . . . . . . . . . . . . . . . . . . . . . . . . . 969
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 969
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 969
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 969
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 969
li
Chapter: 29 QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .982
class-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 982
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 983
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 983
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 983
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 983
clear meter-stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 983
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 984
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 984
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 984
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 984
debug qos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 984
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 985
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 985
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 985
map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 985
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 986
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 987
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 987
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 987
match access-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . 987
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 988
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 988
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 988
meter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 988
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 989
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 989
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 989
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 989
meter-type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 989
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 990
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 990
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991
mls qos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 992
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 992
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 992
policy-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 992
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 993
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 993
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 993
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 993
priority-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 993
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 994
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 994
lii
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 994
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 994
qos pbit-preference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 994
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995
qos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 995
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 996
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 996
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 996
queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 996
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 997
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 998
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 998
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 998
queue-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 998
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 999
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 999
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . 999
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 999
scheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 999
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1000
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1000
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1000
set class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1000
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1001
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1001
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1001
set meter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1001
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1003
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007
Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007
set meter-stats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1008
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1008
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . 1008
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1008
set policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1008
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1010
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1011
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . 1011
liii
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1011
shape-template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1011
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1012
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1012
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1012
show class-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1012
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1013
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1013
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1013
show meter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1013
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1014
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1014
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1014
show policy-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1015
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1015
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1015
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1015
show qos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1016
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1017
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1018
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1018
show queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1020
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1021
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1021
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1021
show queue-map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1022
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1022
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1022
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1023
show queue-template . . . . . . . . . . . . . . . . . . . . . . . . . . 1023
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1023
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1023
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1024
show scheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1024
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1025
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1025
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1025
show shape-template . . . . . . . . . . . . . . . . . . . . . . . . . . 1025
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1026
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1026
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1026
liv
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1032
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1033
deny . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1033
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1034
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1036
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1036
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1036
deny . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1036
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1038
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1038
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1038
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1039
deny icmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1039
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1040
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1044
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1044
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1044
deny tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1044
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1046
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1049
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1049
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1049
deny udp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1050
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1051
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1054
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1054
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1054
egress access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1054
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1055
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1055
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1055
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1055
ip access-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1055
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056
ip access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1057
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1057
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1057
mac access-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1058
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1058
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1058
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . 1058
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1058
lv
mac access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1059
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1059
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1059
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1059
permit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1059
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1061
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1064
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1064
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1065
permit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1065
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1067
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1072
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1072
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1072
permit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1072
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1074
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1076
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1076
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1076
permit icmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1076
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1078
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1082
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1082
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1082
permit tcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1083
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1084
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1088
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1088
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1089
permit udp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1089
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1091
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1095
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1095
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1096
rate-limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1096
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1097
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1097
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1097
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1097
show access-lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1097
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1098
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1098
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1098
show egress access-list mode . . . . . . . . . . . . . . . . . . . . . . 1101
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1102
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1102
lvi
show interfaces rate-limit . . . . . . . . . . . . . . . . . . . . . . . . 1102
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1102
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1102
show interfaces storm-control . . . . . . . . . . . . . . . . . . . . . . 1103
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1103
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1103
storm-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1103
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1104
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1104
Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1104
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . 1104
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1104
lvii
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1119
show running vrrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1119
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1119
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1119
show track . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1120
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1120
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1120
show vrrp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1120
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1121
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1121
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1121
lviii
CLI Serial Command Modes . . . . . . . . . . . . . . . . . . . . . . . 1136
User Exec Mode . . . . . . . . . . . . . . . . . . . . . . . . . 1138
Privileged Exec Mode . . . . . . . . . . . . . . . . . . . . . . 1138
Global Configuration Mode . . . . . . . . . . . . . . . . . . . 1138
Serial Interface Configuration Mode . . . . . . . . . . . . . . 1138
Serial Profile Mode (Raw Socket) . . . . . . . . . . . . . . . . 1139
Serial Profile Mode (Preemptive-raw) . . . . . . . . . . . . . 1139
Serial Profile Mode (UDP) . . . . . . . . . . . . . . . . . . . . 1139
Serial Profile Mode (TCP) . . . . . . . . . . . . . . . . . . . . 1140
Serial Profile Mode (Modbus) . . . . . . . . . . . . . . . . . . 1140
Transport Protocol TCP Mode . . . . . . . . . . . . . . . . . . 1140
Transport Protocol UDP Mode . . . . . . . . . . . . . . . . . 1141
Direction (In) Mode (Raw) . . . . . . . . . . . . . . . . . . . . 1141
Direction (Out) Mode (Raw) . . . . . . . . . . . . . . . . . . . 1141
Direction (IN-OUT) Mode (Raw) . . . . . . . . . . . . . . . . . 1142
Role Mode (Modbus Server) . . . . . . . . . . . . . . . . . . 1142
Role Mode (Modbus Client) . . . . . . . . . . . . . . . . . . . 1142
add slave-id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1142
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1143
add udp-host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1143
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1144
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1144
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1144
baud-rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1144
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1145
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1145
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1145
clear serial config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1145
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1146
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1146
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1146
clear serial counters . . . . . . . . . . . . . . . . . . . . . . . . . . . 1147
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1147
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1147
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1147
connection-map interface . . . . . . . . . . . . . . . . . . . . . . . . 1148
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1148
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1148
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1148
data-bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1148
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1149
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1149
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1149
debug serial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1149
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1150
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1150
lix
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1150
description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1150
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1151
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1151
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1151
direction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1151
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1152
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1152
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1152
DSCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1153
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1153
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1153
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1153
dynamic idle-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . 1153
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1154
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1154
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1154
dynamic packet timeout . . . . . . . . . . . . . . . . . . . . . . . . . 1154
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . 1155
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1155
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1155
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1155
dynamic packet char . . . . . . . . . . . . . . . . . . . . . . . . . . . 1155
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . 1156
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1156
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1156
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1156
flow-control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1156
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1157
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1157
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1157
force half-duplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1157
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1158
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1158
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1158
forward-exception . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1158
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1159
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1159
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1159
hold-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1159
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1160
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1160
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1160
interface serial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1160
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1161
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1161
lx
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1161
keep-alive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1162
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1163
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1163
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1163
local client port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1164
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1164
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1164
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1164
local server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1165
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1166
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1166
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1166
loopback local . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1166
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1167
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1167
max client connections . . . . . . . . . . . . . . . . . . . . . . . . . . 1167
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1167
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1167
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1168
max connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1168
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1168
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1168
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1168
max pending messages . . . . . . . . . . . . . . . . . . . . . . . . . . 1169
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1169
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1169
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1169
max udp connections . . . . . . . . . . . . . . . . . . . . . . . . . . . 1170
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1170
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1170
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1170
mtu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1171
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1171
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1171
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1171
packet char . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1171
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . 1172
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1172
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1172
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1172
packet size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1173
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . 1173
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1173
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1173
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1174
lxi
packet timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1174
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . 1174
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1175
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1175
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1175
packetizing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1176
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1176
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1176
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1176
parity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1177
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1177
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1177
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1178
permanent-client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1178
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1178
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1178
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1179
post-tx delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1179
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1179
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1179
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1179
re-connect timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1180
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1180
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1180
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1180
remote ipv4 address . . . . . . . . . . . . . . . . . . . . . . . . . . . 1181
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1182
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1182
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1182
remove slave-id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1183
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1183
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1183
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1184
remove udp-host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1184
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1185
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1185
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1185
response-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1185
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1186
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1186
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1186
role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1187
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1187
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1187
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1187
rx-to-tx delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1187
lxii
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1188
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1188
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1188
serial connection-type . . . . . . . . . . . . . . . . . . . . . . . . . . 1188
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1189
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1189
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1189
show interfaces serial . . . . . . . . . . . . . . . . . . . . . . . . . . 1189
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1190
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1190
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1190
show serial profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1191
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1191
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1191
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1191
shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1194
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1194
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1194
stop-bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1195
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1195
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1195
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1195
tcp buffering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1195
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1196
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1196
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1196
transmit-exception . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1197
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1197
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1197
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1197
transport protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1197
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1198
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1198
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1198
turnaround delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1198
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1199
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1199
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1199
enable mirroring interface . . . . . . . . . . . . . . . . . . . . . . . . 1199
Serial TCP Mirroring . . . . . . . . . . . . . . . . . . . . . . . 1199
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1200
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1200
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1201
Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1201
disable mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1202
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1202
lxiii
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1203
serial-port-offline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1203
Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1204
Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1204
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1204
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i
lxiv
SCOPE
CHAPTER 1 INTRODUCTION
Introduction
1. Introduction
This document is designed to provide MicroRAPTOR’s users with the web pages' information required to
configure the MicroRAPTOR product through the web interface. All web configurations and statistics
related pages are illustrated with field descriptions and additional information to help the end user.
This document is designed to provide MicroRAPTOR’s users with the web pages' information required to
configure the MicroRAPTOR product through the web interface. All web configurations and statistics
related pages are illustrated with field descriptions and additional information to help the end user.
1.1. Scope
This document explains in detail all web screens and fields for the Web UI. It does not include the details
of the HTTP (Hyper Text Transfer Protocol) server architecture, backend processing of web screens, or
the protocol details.
This document explains in detail all web screens and fields for the Web UI. It does not include the details
of the HTTP (Hyper Text Transfer Protocol) server architecture, backend processing of web screens, or
the protocol details.
1
KEYBOARD CONVENTIONS AND SHORTCUTS
CHAPTER 1 INTRODUCTION
2
CONTEXT-SENSITIVE HELP
CHAPTER 2 COMMAND LINE INTERFACE
3
CLI COMMAND MODES
CHAPTER 2 COMMAND LINE INTERFACE
iS5Comm(config)# service?
dhcp related configuration
dhcp-relay DHCP relay related configuration
dhcp-server DHCP server related configuration
Some of the basic concepts implemented for context-sensitive help are:
• The next possible tokens are listed only in the lexical order and not in the order as available in the
syntax or command structure.
• All possible tokens are listed along with the help string, even though the command is ambiguous.
Any ambiguous command and value range errors are taken care only during the execution of the
command.
• The help tokens provided within <> brackets denote that the user should input values of specified
format. For example, <string(32)> represents that the user should input a string of size varying from
1 to 32.
• The help tokens provided within () brackets denotes that the user should input only the values
represented. For example, (1-4094) represents that the user should input value within the
mentioned range alone.
• The format is directly provided as help token for some non-keyword such as IP address, IP mask,
MAC address and so on. For example, aa:aa:aa:aa:aa:aa represents that a MAC address of this
Format should be provided.
• Only the most commonly used format is provided as help token for some non-keywords such as
IPv6 address. But the command supports most of the valid formats. For example, AAAA::BBBB
represents the IPv6 address, but the command will accept the format AAAA:B::BBBB.
• The help token <CR> along with help string explaining the operation of the command is displayed
if the command can be executed at that point (errors are handled only during the execution).
4
CLI COMMAND MODES
CHAPTER 2 COMMAND LINE INTERFACE
5
CLI COMMAND MODES
CHAPTER 2 COMMAND LINE INTERFACE
iS5Comm(config)# The Privileged EXEC mode To return from the Global Configuration
command configure Mode to Privileged Mode, the
terminal is used to enter the command exit is used.
Global Configuration Mode.
6
CLI COMMAND MODES
CHAPTER 2 COMMAND LINE INTERFACE
7
CLI COMMAND MODES
CHAPTER 2 COMMAND LINE INTERFACE
8
CLI COMMAND MODES
CHAPTER 2 COMMAND LINE INTERFACE
9
CLI COMMAND MODES
CHAPTER 2 COMMAND LINE INTERFACE
10
CLI COMMAND MODES
CHAPTER 2 COMMAND LINE INTERFACE
11
STOPPING LONG RUNNING COMMANDS
CHAPTER 2 COMMAND LINE INTERFACE
#Building configuration...!!
syslog localstorage
syslog relay
syslog filename-one "syslog.log"
logging local flash emergencies file syslog.log
logging local flash alerts file syslog.log
!
!
ip pim component 1
!
set gvrp disable
set gmrp disable
12
STOPPING LONG RUNNING COMMANDS
CHAPTER 2 COMMAND LINE INTERFACE
13
HELP
CHAPTER 3 SYSTEM COMMANDS
System Commands
3. System Commands
The System Commands are the commands used to manage access permissions, mode access, and
terminal configuration.
3.1. help
To display a brief description for any given command, use the help command in the mode where
command is used.
help
help [<command>]
Parameters
Mode
Any Mode
Examples
iS5Comm# help configure terminal
EXEC commands :
configure terminal
[Desc]: Enter configuration mode.
14
CLEAR SCREEN
CHAPTER 3 SYSTEM COMMANDS
Mode
Any Mode
configure terminal
Mode
Privileged EXEC Mode
15
LISTUSER
CHAPTER 3 SYSTEM COMMANDS
Examples
iS5Comm# configure terminal
iS5Comm(config)#
3.4. listuser
To list the user modes and privilige levels, use the command listuser in Privileged EXEC Mode.
listuser
Mode
Privileged EXEC Mode
Examples
iS5Comm# listuser
USER MODE PRIVILEGE
root / 16
admin / 15
guest / 1
3.5. lock
To lock the CLI console, use the lock command in Privileged EXEC Mode. The command allows the
user/system administrator to lock the console to prevent unauthorized users from gaining access to the
CLI command shell. Enter the login password to release the console lock and access the CLI command
shell.
lock
Mode
Privileged EXEC Mode
Examples
iS5Comm # lock
16
USERNAME
CHAPTER 3 SYSTEM COMMANDS
3.6. username
To create a user and sets the password and the privilege level for the user, use the username command
in Global Configuration Mode. The no form of the command deletes the specified user.
username
username <user-name> [password [0 | 7 | LINE] <string(8-20)>] [privilege
<1-15>] [confirm-password [0 | 7 | LINE] <string(8-20)>] [status enable]
no username
no username <user-name>
17
USERNAME
CHAPTER 3 SYSTEM COMMANDS
Parameters
18
USERNAME
CHAPTER 3 SYSTEM COMMANDS
Mode
Global Configuration Mode
Prerequisites
• Only the root user can create new users using this command.
• When a new users are created, the user can login with any username and the respective password.
• Privilege ID is set as zero for all show commands and is set as 15 for all configuration commands, in
the def files. Root users can access all commands and other users can access only the show
commands. Users can change the privilege IDs of the commands in the def file to customize and
segregate the commands as per the needs
Examples
iS5Comm (config)# username products password Prod@1234 privilege 15
NOTE: The user products are created with the privilege level 15. Hence, the user will be visible to view all
commands.
19
ENABLE PASSWORD
CHAPTER 3 SYSTEM COMMANDS
enable password
enable password level < 1 | 7 | 15 > <password (20)>
no enable password
no enable password level < 1 | 7 | 15 >
20
ENABLE PASSWORD
CHAPTER 3 SYSTEM COMMANDS
Parameters
Mode
Global Configuration Mode
21
ALIAS
CHAPTER 3 SYSTEM COMMANDS
Prerequisites
• Only the root user can enable the password for any other blocked user using this command
• This command allows the root user to enable a password for other users to access the commands
in the specified privilege level. The other users can access commands in the privilege level using the
password enabled for that level.
Examples
iS5Comm (config)# enable password level 1 Ad@1231
NOTE: As we can see from the examples above, the characters not to be used are marked in red.
3.8. alias
To replace a given token / command by a string, use the alias command in Global Configuration Mode.
The no form of the command removes the alias created for the given string.
alias
alias {interface | configure} <alias-name> <token to be replaced> | token
22
ACCESS-LIST
CHAPTER 3 SYSTEM COMMANDS
no alias
no alias <alias-name>
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# alias int interface
iS5Comm(config)# alias config ct configure terminal
iS5Comm(config)# exit
iS5Comm# show aliases
ct -> configure terminal
int -> interface
iS5Comm(config)# exit
iS5Comm(config)# no alias ct
iS5Comm(config)# exit
iS5Comm# show aliases
int -> interface
3.9. access-list
To create an IP access-list and specify packets to be forwarded depending on associated parameters,
trigger provisioning of active filter rules to hardware based on configured priority, or configure the provi-
23
ACCESS-LIST
CHAPTER 3 SYSTEM COMMANDS
sion mode for the access list, use the command access-list in Global Configuration Mode. The no form of
the command deletes the IP access-list with a specified access-list number.
access-list
access-list <access list> {permit | deny} {any | host <ucast_addr> |
A.B.C.D(<ucast_addr>) <ip_mask>} |
commit |
provision mode {consolidated | immediate}
no access-list
no access-list <access list>
24
ACCESS-LIST
CHAPTER 3 SYSTEM COMMANDS
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# access-list 2 permit any
iS5Comm(config)# access-list provision mode consolidated
iS5Comm(config)# access-list commit
iS5Comm(config)# no access-list 2
25
EXEC-TIMEOUT
CHAPTER 3 SYSTEM COMMANDS
3.10. exec-timeout
To set time (in seconds) for EXEC line disconnection with a value ranging from 1 to 18000 seconds, use
the exec-timeout command in Line Configuration Mode. The no form of the command resets the EXEC
timeout to its default value of 1800 seconds.
exec-timeout
exec-timeout <integer (1-18000)>
no exec-timeout
Parameters
Mode
Line Configuration Mode
Default
Integer - 18000 seconds
Examples
iS5Comm# configure terminal
iS5Comm(config)# line console
iS5Comm(config-line)# exec-timeout 18000
iS5Comm(config-line)# end
iS5Comm#
3.11. logout
To exit from Privileged EXEC/ User EXEC mode to iS5Comm login prompt in case of console session, use
the logout command in Privileged EXEC/ User EXEC Mode. In case of a Telnet session, this command
terminates the session.
26
END
CHAPTER 3 SYSTEM COMMANDS
logout
Mode
Privileged EXEC/ User EXEC Mode
Examples
iS5Comm # logout
iS5Comm login:
3.12. end
To exit from the current mode to the Privileged EXEC mode, use the end command in all modes.
end
Mode
All modes
Examples
iS5Comm(config-if)# end
iS5Comm#:
iS5Comm(config)# end
iS5Comm#:
27
EXIT
CHAPTER 3 SYSTEM COMMANDS
3.13. exit
To exit from the current mode and revert to the mode used prior to this mode, use the exit command in
all modes.
exit
Mode
All modes
Examples
iS5Comm(config-if)# exit
iS5Comm(config)#:
3.14. enableuser
To release a blocked user specified by the user name string, use the enableuser command in Global
Configuration Mode.
enableuser
enableuser <username>
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm (config)# enableuser user1
28
CLEAR LINE VTY
CHAPTER 3 SYSTEM COMMANDS
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm# clear line vty all
The following message appears. Click OK.
29
PASSWORD
CHAPTER 3 SYSTEM COMMANDS
3.16. password
To set the maximum life time after which the password has to be expired or determine a password vali-
dation mask, use the password command in Global Configuration Mode.
password
password max-life-time [<days (0-366)>] | validate char [lowercase] [upper-
case] [numbers] [symbols]
30
PASSWORD
CHAPTER 3 SYSTEM COMMANDS
Parameters
max-life-time Enter to configure the time after which the user password has to
expire.
<days Enter expiry date in days. This value ranges from 0 to 366 days.
(0-366)> The default value of password-max-life-time is 0 days, indicates
the password does not expire.
validate String Enter to configure the type of characters to be considered for
password validation rules; takes values as bitmask.
char String Enter to create password rules.
lowercase Specify to configure the minimum number of lower case
characters that are to be present in the password. If the given
password has less than the configured number of lower case
characters, it will not be allowed. This value ranges from 0 to 20.
The default value is 1.
uppercase Specify to configure the minimum number of upper case
characters that are to be present in the password. If the given
password has less than the configured number of upper case
characters, it will not be allowed. This value ranges from 0 to 20.
The default value is 1.
numbers Specify to configure the minimum number of numbers that are to
be present in the password. If the given password has less than
the configured number of upper case characters, it will not be
allowed. This value ranges from 0 to 20. The default value is 1.
symbols Specify to configure the minimum number of symbols to be
present in the password. If the given password has less than the
configured number of numerical characters, it will not be allowed
This value ranges from 0 to 20. The default value is 1. The list of
supported symbols are as follows: !@#$%^&*()_+-:”;’{}[]|\~
Mode
Global Configuration Mode
Examples
iS5Comm(config)# password max-life-time 1
iS5Comm(config)# password validate lowercase 1
31
SET USER
CHAPTER 3 SYSTEM COMMANDS
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# set user guestonly status enable
To disable an user, use the following command
iS5Comm(config)# set user tech status disable
32
SET MINIMUM PASSWORD LENGTH
CHAPTER 3 SYSTEM COMMANDS
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# set minimum password length 8
33
SET BANNER-NAME
CHAPTER 3 SYSTEM COMMANDS
no pagination
no pagination
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# set cli pagination off
iS5Comm(config)# set cli pagination on
iS5Comm(config)# no pagination
set banner-name
set banner-name <string (50)>
34
SET PROMPT-NAME
CHAPTER 3 SYSTEM COMMANDS
Parameters
<string (50)> String Enter a banner name. The banner name is a string with maximum
size of 128.
Mode
Global Configuration Mode
Examples
iS5Comm (config)# set banner-name bannername
set prompt-name
set prompt-name <string (50)>
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm (config)# set prompt-name promptname
35
FACTORY RESET
CHAPTER 3 SYSTEM COMMANDS
factory reset
factory reset users
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm # factory reset
Factory reset will erase following configurations..
1. Startup-config
2. NVRAM settings
3. Flash files
- users
- privil
- groups
Are you sure you want to reset device to factory default settings? (Y/N)
[N]?
show privilege
show privilege
36
SHOW LINE
CHAPTER 3 SYSTEM COMMANDS
Mode
Privileged EXEC Mode
Examples
iS5Comm# show privilege
show line
show line {console | vty <line>}
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show line console
Current Session Timeout (in secs) = 180
Default Telnet Session Timeout (in secs) = 180
iS5Comm# show line vty 3
Current Session Timeout (in secs) = 180
Default Telnet Session Timeout (in secs) = 180
% Line 2 not active
37
SHOW ALIASES
CHAPTER 3 SYSTEM COMMANDS
show aliases
show aliases
Mode
Privileged EXEC Mode
Examples
iS5Comm# show aliases
ct -> configure terminal
int -> interface
show history
show history
Mode
Privileged EXEC Mode
Examples
iS5Comm# show history
3 show privilege
38
SHOW EULA
CHAPTER 3 SYSTEM COMMANDS
show eula
show eula
Mode
Privileged EXEC Mode
Examples
iS5Comm# show eula
39
SET CLI-CONSOLE ACCESS
CHAPTER 3 SYSTEM COMMANDS
show users
show users
Mode
Privileged EXEC Mode
Examples
iS5Comm# show users
Line User Peer-Address
3 ssh admin 192.168.10.10
set cli-console
set cli-console access {enable | disable }
Parameters
enable / disable String Used to enable or disable access to the cli console port
Mode
Global Configuration Mode
Examples
iS5Comm (config)# set cli-console access enable
Related Commands
iS5Comm# show nvram
40
SET MGMT-PORT ACCESS
CHAPTER 3 SYSTEM COMMANDS
set mgmt-port
set mgmt-port access {enable | disable }
NOTE: This command is not supported on both the iMR320 and iMR920
Parameters
enable / disable String Used to enable or disable access to the management port
Mode
Global Configuration Mode
Examples
iS5Comm (config)# set mgmt-port access enable
Related Commands
iS5Comm# show nvram
set external-storage
set external-storage access {enable | disable}
41
SET EXTERNAL-STORAGE ACCESS
CHAPTER 3 SYSTEM COMMANDS
Parameters
enable / disable String Used to enable or disable access to the storage peripherals such as
the SD Card and USB port.
Mode
Global Configuration Mode
Examples
iS5Comm (config)# set external-storage access enable
Related Commands
iS5Comm# show nvram
42
IP ADDRESS
CHAPTER 4 SYSTEM FEATURES
System Features
4. System Features
A rich set of system features are available to the user, such as login services, copying / writing facilities,
duplex / negotiation support, and many other capabilities.
Some features have special hardware requirements, and others have special design considerations.
4.1. ip address
To set the IP address for an interface, use the command ip address in Interface Configuration Mode. The
no form of the command delete the IP Address configured on the given interface, resets the IP address
of the interface to its default value, and deletes the IP address used in VPN and firewall.
ip address
ip address <ucast_addr> <ip_mask> [secondary {node0 | node1}] | dhcp
{client-id (FastEthernet <string(32)> | GigabitEthernet <string(32)> |
Port-channel <string(32)> | Vlan <string(32)>) | hostname <string(32)>} |
rarp {client-id (FastEthernet | GigabitEthernet | Port-channel | Vlan) |
hostname <string(32)>}
no ip address
no ip address {<ucast_addr> | cybsec}
43
IP ADDRESS
CHAPTER 4 SYSTEM FEATURES
Parameters
<ucast_addr> A.B.C. Sets the IP address for an interface. If the network in which the switch
D is implemented contains a server such as DHCP server, dynamically
allocating IP address, the configured IP address should not be within
the range of the addresses that will be allocated by the server to the
other switches. This precaution avoids creation of IP address conflicts
between the switches.
<ip_mask> A.B.C. Sets the subnet mask for the configured IP address. The configured
D subnet mask should be in the same subnet of the network in which the
switch is placed.
secondary A.B.C. Sets the configured IP address as an additional IP address for the
D interface (the configured address is used as secondary address instead
of primary address).
NOTE: this parameter is not supported on OOB and PPP interface.
node0 A.B.C. Specifies the secondary IP address associated with the OOB interface of
D Node0.
node1 A.B.C. Specifies the secondary IP address associated with the OOB interface of
D Node1.
dhcp Enter to allow the client device to obtain configuration parameters such
as network address, from the DHCP server.
client-id Enter to set the client identifier that specifies the interface type and
hexadecimal MAC address of the specified interface. The various
interface types that can be specified areas shown below.
FastEthernet Enter to set FastEthernet client-id. FastEthernet is officially referred to
as 100BASE-T standard. This is a version of LAN standard architecture
that supports data transfer up to 100 Megabits per second.
<string(32)> Enter string for interface name. This value is a combination of slot
number and port number separated by a slash, for interface type other
than port-channel and VLAN. Only VLAN or port-channel ID is provided,
for interface types VLAN and port-channel. Use comma as a separator
without space while configuring list of interfaces. Example: 0/1,0/3 or
1,3.
GigabitEther Enter to set GigabitEthernet client-id. GigabitEthernet is a version of
net LAN standard architecture that supports data transfer up to 1 Gigabit
per second.
44
IP ADDRESS
CHAPTER 4 SYSTEM FEATURES
<string(32)> Enter string for interface name. This value is a combination of slot
number and port number separated by a slash, for interface type other
than port-channel and VLAN. Only VLAN or port-channel ID is provided,
for interface types VLAN and port-channel. Use comma as a separator
without space while configuring list of interfaces. Example: 0/1,0/3 or
1,3.
Port-channel Enter to set Port-channel client-id. Port-channel is a logical interface
that represents an aggregator that contains several ports aggregated
together.
<string(32)> Enter string for interface name. This value is a combination of slot
number and port number separated by a slash, for interface type other
than port-channel and VLAN. Only VLAN or port-channel ID is provided,
for interface types VLAN and port-channel. Use comma as a separator
without space while configuring list of interfaces. Example: 0/1,0/3 or
1,3.
Vlan Enter to set Vlan client-id. Vlan is a logical interface that specifies a
group of hosts that can communicate with each other as in the same
broadcast domain.
<string(32)> Enter string for interface name. This value is a combination of slot
number and port number separated by a slash, for interface type other
than port-channel and VLAN. Only VLAN or port-channel ID is provided,
for interface types VLAN and port-channel. Use comma as a separator
without space while configuring list of interfaces. Example: 0/1,0/3 or
1,3.
hostname Enter to set Port-channel client-id. Port-channel is a logical interface
that represents an aggregator that contains several ports aggregated
together.
<string(32)> Enter string for interface name. This value is a combination of slot
number and port number separated by a slash, for interface type other
than port-channel and VLAN. Only VLAN or port-channel ID is provided,
for interface types VLAN and port-channel. Use comma as a separator
without space while configuring list of interfaces. Example: 0/1,0/3 or
1,3.
rarp Enter to set Port-channel client-id. Port-channel is a logical interface
that represents an aggregator that contains several ports aggregated
together.
client-id Enter to set the client identifier that specifies the interface type and
hexadecimal MAC address of the specified interface. The various
interface types that can be specified areas shown below:
45
IP ADDRESS
CHAPTER 4 SYSTEM FEATURES
46
IP ADDRESS
CHAPTER 4 SYSTEM FEATURES
<string(32)> Enter string for interface name. This value is a combination of slot
number and port number separated by a slash, for interface type other
than port-channel and VLAN. Only VLAN or port-channel ID is provided,
for interface types VLAN and port-channel. Use comma as a separator
without space while configuring list of interfaces. Example: 0/1,0/3 or
1,3.
cybsec Enter IP address used in VPN and firewall.
Mode
Interface Configuration Mode
This command is applicable in VLAN Interface Mode/Router Interface / OOB Interface Mode / PPP mode
Default
• IP address specified in nvram.txt is taken as default for the default VLAN identifier.
• IP address is assigned as 0.0.0.0 and subnet mask as 255.255.255.255 for other interfaces.
Prerequisites
• The interface should be shut down before executing this command.
• The primary and secondary IP addresses should be different.
• The primary address should be configured before configuring the secondary address.
• The connection to the switch is lost if the IP address of the connected interface is modified.
• When the same network interface is used for OOB and NFS mounting, the operation done on OOB
will have impact on NFS.
• For PPP mode, PPP interface should be attached to the physical interface first.
Examples
iS5Comm(config-if)# ip address 10.0.0.3 255.255.255.0
iS5Comm(config-if)# ip address 10.0.0.2 255.255.255.0 secondary
iS5Comm (config-ppp)# ip address 17.0.0.100 255.255.255.
iS5Comm(config-if)# ip address dhcp
iS5Comm(config-if)# ip address rarp
47
SWITCHPORT
CHAPTER 4 SYSTEM FEATURES
4.2. switchport
To configure the port as switch port, use the command switchport in Interface Configuration Mode.
Switch port-related commands are made available for the interface, only when the port is configured as
switch port. The no form of the command resets the port as a router port. Only router port related
commands are made available for the interface, when the port is configured as router port.
switchport
switchport
no switchport
no switchport
Mode
Interface Configuration Mode
Default
• switchport
Prerequisites
• The interface should be shut down before executing this command
Examples
iS5Comm(config-if)# switchport
iS5Comm(config-if)# no switchport
48
IP HTTP
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Global Configuration Mode
Default
dhcp
Prerequisites
• This command executes only if the default mode is configured as Dynamic.
• If the default interface is configured as OOB and if the same network interface is used for OOB and
NFS mounting, then the operation done on OOB will have impact on NFS.
Examples
iS5Comm(config)# default ip address allocation protocol bootp
4.4. ip http
To set the HTTP port, use the command ip http in Global Configuration Mode. The no form of the
command resets the HTTP port to its default value.
49
IP HTTP
CHAPTER 4 SYSTEM FEATURES
ip http
ip http {port <port-number (1-65535)> | secure (ciphersuite {TLS_ECDHE_R-
SA_WITH_AES_256_GCM_SHA384 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 |
TLS_AES_256_GCM_SHA384 | TLS_CHACHA20_POLY1305_SHA256 | TLS_AES_128_GCM_-
SHA256 } | port (1-65535) | minimum version {TLSv1_2 | TLSv1_3} | crypto key
RSA2048 {default | current | string values } server)}
no ip http
no ip http port | secure
50
IP HTTP
CHAPTER 4 SYSTEM FEATURES
Parameters
port Enter to configure HTTP port. his port is used to configure the
router using the Web interface. The available port numbers are
from 1 to 65535
<port-number Integer Enter a port number. The available port numbers are from 1 to
(1-65535)> 65535
NOTE: TACACS user will be given root privilege by default or local
user privilege if the user exists in local database
secure Enter for SSL secure server related configuration. The options are
as follows:
ciphersuite Enter for Cipher-suites list options.
CR Enter to disable SSL server on the device and also to disable
ciphersuites and crypto key configuration. If you want to specify
an encryption algorithm, enter one of the shown below options.
TLS_ECDHE_RSA_W Enter for this encryption algorithm.
ITH_AES_256_GCM
_SHA384
TLS_ECDHE_RSA_W Enter for this encryption algorithm.
ITH_CHACHA20_PO
LY1305_SHA256
TLS_AES_256_GCM Enter for this encryption algorithm.
_SHA384
Enter for this encryption algorithm.
TLS_CHACHA20_PO
LY1305_SHA256
TLS_AES_128_GCM Enter for this encryption algorithm.
_SHA256
minimum version This is used to specify the minimum level of TLS to be used. The
choices are as follows.
TLSv1_2 TLS version 1.2
TLSv1_3 TLS version 1.3
rsa-with-aes-25 Enter for this encryption algorithm.
6-cbc-sha
crypto Enter a name of the created list.
51
IP HTTP
CHAPTER 4 SYSTEM FEATURES
key
RSA2048 Enter for RSA algorithm.
default This option will use the default RSA 2048 certificate values. A
carriage return is entered after this option.
current Use the current certificate subject name
Certificate Values are A series Up to 2 characters for the country code string
entered of Up to 100 characters for the state/province value
Strings Up to 100 characters for the city/locality value
Up to 100 characters for the organization value
Up to 100 characters for the organizational unit name
Up to 100 characters for the common name
server Enter to enable the SSL server on the device and also to configure
the ciphersuites.
port The port option when used after secure. For example “ip http
secure port” allows the user to specify the port number of the
HTTPS server. It is followed by a port number.
<port-number Integer Value of the port number to be used by the HTTPs server.
(1-65535)>
Mode
Global Configuration Mode
Default
80
Prerequisites
HTTP port number configuration takes effect only when HTTP is disabled and enabled again
Examples
iS5Comm(config)# ip http port 90
iS5Comm(config)# ip http secure ciphersuite
For a new certificate to be used, the HTTP service must be disabled and then re-enabled.
52
LOGIN AUTHENTICATION
CHAPTER 4 SYSTEM FEATURES
login authentication
login authentication {radius | tacacs | local | default <string(32)>
no login authentication
no login authentication default <string(32)>
53
SET IP HTTP
CHAPTER 4 SYSTEM FEATURES
Parameters
radius Enter to set the RADIUS server to be used as an authentication server. Enables
remote access servers to communicate with a central server to authenticate
dial-in users and authorize their access to the requested system or service.
NOTE: RADIUS user will be given privilege based on service type attribute value
received in access accept packet from radius server
tacacs Enter to set the TACACS server to be used as an authentication server. It
communicates with the authentication server commonly used in
networks.RADIUS user will be given privilege based on service type attribute
value received in access accept packet from radius server
NOTE: TACACS user will be given root privilege by default or local user privilege if
the user exists in local database
local Enter to set local authentication. The user identification, authentication, and
authorization method is chosen by the local system administration and does not
necessarily comply with any other profiles.
default Enter to set the default authentication method for User Login.
Enter a name of the created list.
<string
932)>
Mode
Global Configuration Mode
Default
local
Examples
iS5Comm(config)# login authentication radius
iS5Comm(config)# login authentication default
54
AUTHORIZED-MANAGER IP-SOURCE
CHAPTER 4 SYSTEM FEATURES
set ip http
set ip http {enable | disable}
Parameters
Mode
Global Configuration Mode
Default
enable
Examples
iS5Comm(config)# set ip http disable
authorized-manager ip-source
authorized-manager ip-source <ip_addr> [<subnet-mask> |
<prefix-length(1-32)>] | [interface {[fastethernet interface-type <0/a-b,
0/c, ...>] | [gigabitethernet interface-type <0/a-b, 0/c, ...>] |
[extreme-ethernet <interface-type <a,b or a-b or a,b,c-d...>] | [vlan [vlan
<a,b or a-b or a,b,c-d>] [cpu0] [service [snmp] | [service [snmp] | [telnet]
| [http] | [https] | [ssh]] | port-channel <port_channel list (a,b or a-b or
a,b,c-d)>
55
AUTHORIZED-MANAGER IP-SOURCE
CHAPTER 4 SYSTEM FEATURES
no authorized-manager ip-source
no authorized-manager ip-source <ip_addr> [<subnet-mask> |
<prefix-length(1-32)>]
56
AUTHORIZED-MANAGER IP-SOURCE
CHAPTER 4 SYSTEM FEATURES
Parameters
ip_addr A.B.C.D Enter to set the network or host address from which the switch is
managed. An address 0.0.0.0 indicates 'Any Manager'.
<subnet-mask> Enter to set the subnet mask for the configured IP address. The
configured subnet mask should be in the same subnet of the
network in which the switch is placed
Integer Enter to configure the number of high-order bits in the IP address.
<prefix-length( These bits are common among all hosts within a network. This
1-32)> value ranges from 1 to 32.
interface Configures the network or host address for the specified interface.
The details to be provided are:
fastethernet Enter for fastethernet. Officially referred to as 100BASE-T
standard. This is a version of LAN standard architecture that
supports data transfer up to 100 Megabits per second.
interface-type Enter to set the list of interfaces or a specific interface identifier.
<0/a-b, 0/c, This value is a combination of slot number and port number
...> separated by a slash. Use comma as a separator without space
while configuring list of interfaces. Example: 0/1,0/3 or 1,3.
gigabitethernet Enter for gigabitethernet.
interface-type Enter to set the list of interfaces or a specific interface identifier.
<0/a-b, 0/c, This value is a combination of slot number and port number
...> separated by a slash. Use comma as a separator without space
while configuring list of interfaces. Example: 0/1,0/3 or 1,3.
Enter for extreme-ethernet.
extreme-etherne
t
interface-type Enter to set the list of interfaces or a specific interface identifier.
<a,b or a-b or This value is a combination of slot number and port number
a,b,c-d...> separated by a slash. Use comma as a separator without space
while configuring list of interfaces. Example: 0/1,0/3 or 1,3.
vlan Enter for vlan. It set the list of VLANs or a single specifc VLAN in
which the IP authorized manager can reside
vlan <a,b or Enter to determine the set of vlan interfaces.
a-b or a,b,c-d>
cpu0 Enter to configure the access rights for the manager of the switch
through OOB Port
57
AUTHORIZED-MANAGER IP-SOURCE
CHAPTER 4 SYSTEM FEATURES
Mode
Global Configuration Mode
Default
All services are allowed for the configured manager
58
MTU
CHAPTER 4 SYSTEM FEATURES
Examples
iS5Comm(config)# authorized-manager ip-source 10.203.113.5 255.255.255.255 inter face gigabiteth-
ernet 0/1
4.8. mtu
To configure the Maximum Transmission Unit (MTU) frame size for all frames transmitted and received
on all interfaces in a switch, use the command mtu in Interface Configuration Mode. The no form of this
command sets the maximum transmission unit to the default value in all interfaces.
mtu
mtu <frame-size(46-9216)>
Parameters
<frame-size Integer Enter a size of the MTU frame. The value ranges from 46 to 9216
(46-9216)> and defines the largest PDU that can be passed by the interface
without any need for fragmentation. This value is shown to the
higher interface sub-layer and should not include size of the
encapsulation or header added by the interface. This value
represents the IP MTU over the interface, if IP is operating over
the interface
Mode
Interface Configuration Mode
Default
1500
Examples
iS5Comm (config-if)# mtu 900
59
LOOPBACK LOCAL
CHAPTER 4 SYSTEM FEATURES
loopback local
no loopback local
Mode
Interface Configuration Mode
Examples
iS5Comm (config-if)# loopback local
archive download-sw
archive download-sw /overwrite {<tftp://server/filename> |
<sftp://<user-name>:<pass-word>@server/filename> | <flash://}
60
ARCHIVE DOWNLOAD-SW
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Privileged EXEC Mode
Prerequisites
Filenames and directory names are case sensitive
Examples
iS5Comm# archive download-sw /overwrite tftp://20.0.0.1/FILENAME.exe
Download is in Progress...
61
INTERFACE
CHAPTER 4 SYSTEM FEATURES
4.11. interface
To configure interface features, such as out of band management, port channel, tunnel, etc., use the
command interface in Global Configuration Mode. The no form of the command deletes interface such
as VLAN, port-channel, tunnel interface, etc.
interface
interface {Extreme-Ethernet <interface-id> | gigabitethernet <interface-id>]
| ac <integer (1-65535)> | linuxvlan <interface name> | loopback <loopback
(1-1000)> | mgmt0 | port-channel <port-channel-id (1-65535)> | ppp <inter-
face-id(1-128)> | pw <interface-id (1-65535)> | range {Extreme-Ethernet |
fastethernet | gigabitethernet} | s-channel <s-channel-id (1-65535)> |
tunnel <interface-id(1-128)> | {vlan <vlan-id(1-4094> [switch default]}
no interface
interface {Extreme-Ethernet <interface-id> | gigabitethernet <interface-id>]
| ac <integer (1-65535)> | linuxvlan <interface name> | loopback <loopback
(1-1000)> | port-channel <port-channel-id (1-65535)> | ppp <inter-
face-id(1-128)> | pw <interface-id (1-65535)> | range {Extreme-Ethernet |
fastethernet | gigabitethernet} | tunnel <interface-id(1-128)> | {vlan
<vlan-id(1-4094>}
62
INTERFACE
CHAPTER 4 SYSTEM FEATURES
Parameters
63
INTERFACE
CHAPTER 4 SYSTEM FEATURES
Mode
Global Configuration Mode
Prerequisites
• The command no shutdown must be executed for the interface to be active.
• Logical interfaces cannot be created in the switch, if the base bridge mode is configured as trans-
parent bridging.
64
MAC-ADDR
CHAPTER 4 SYSTEM FEATURES
Examples
iS5Comm# interface tunnel 0
iS5Comm(config-if)#
4.12. mac-addr
To configure unicast MAC address for the interface, use the command mac-addr in Interface Configura-
tion Mode.
mac-addr
mac-addr <aa:aa:aa:aa:aa:aa>
Mode
Interface Configuration Mode
Default
MAC address of the switch is assigned as MAC address for the interface.
Prerequisites
• The MAC address can be set only when ifMainAdminStatus for the interface is down.
• The object is valid only for interfaces that have the ifMainType set as ethernetCsmacd(6) or
ieee8023ad(161)
Examples
iS5Comm (config-if)# mac-addr 00:22:33:44:55:66
4.13. system
To configure the Maximum Transmission Unit (MTU) frame size for all frames transmitted and received
on all interfaces in a switch, to assign system contact information, name, and location, use the command
system in Global Configuration Mode. The no form of this command sets the maximum transmission unit
to the default value in all interfaces
65
SYSTEM
CHAPTER 4 SYSTEM FEATURES
system
system [mtu <frame-size(46-9216)>] [contact <string(255)>] [location
<string(255)>] [name <string(255)>]
no system mtu
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# system mtu 200
iS5Comm(config)# system contact support@x.com
iS5Comm(config)# system location Controls
iS5Comm(config)# system name My_switch
66
SNMP TRAP LINK-STATUS
CHAPTER 4 SYSTEM FEATURES
Mode
Interface Configuration Mode
Default
SNMP trap link status is enabled
Prerequisites
• This configuration can be done, only if the interface is administratively down.
• Any messages larger than the MTU are divided into smaller packets before transmission
Examples
iS5Comm (config-if)# snmp trap link-status
monitor session
monitor session <index of mirroring session(1-7)> destination (interface
{Extreme-Ethernet <ifnum> | Gigabitethernet <ifnum>} | comp) | source
(interface {Extreme-Ethernet <ifnum> | Gigabitethernet <ifnum>} | {both | rx
| tx} | comp)}
67
MONITOR SESSION
CHAPTER 4 SYSTEM FEATURES
no monitor session
no monitor session local | range <port_list> | destination <index of
mirroring session(1-7)> destination (interface {Extreme-Ethernet <ifnum> |
Gigabitethernet <ifnum>} | comp) | source (interface {Extreme-Ethernet
<ifnum> | Gigabitethernet <ifnum>} | {both | rx | tx} | comp)}
Parameters
<index of Integer Enter a number for monitoring session. The scope is from 1 to 7.
mirroring
session(1-7)>
local Enter to remove all local mirroring configuration sessions.
<port_list> Integer Enter a number for monitoring session to be removed.
destination Enter for destination port related configuration.
interface Enter for Interface related configuration.
Extreme-Ethernet Enter for Extreme Ethernet interface.
<ifnum> Enter a number combination for interface. For example, 0/1 or
port channel ID.
Gigabitethernet Enter for Gigabit Ethernet interface.
<ifnum> Enter a number combination for interface. For example, 0/1 or
port channel ID.
comp Enter for Compatibility Mode.
source Integer Enter for source port related configuration.
both Integer Enter to mirror both received and transmitted traffic.
rx Integer Enter to mirror received traffic.
tx Integer Enter to mirror transmitted traffic.
Mode
Global Configuration Mode
Examples
iS5Comm(config)# monitor session 1 destination interface Gigabitethernet 0/2
68
SHOW MONITOR
CHAPTER 4 SYSTEM FEATURES
show monitor
show monitor {session <session-id (1-7)> | local [detail] | range
<session-list> | all} [detail]
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show monitor all
Mirroring is globally Enabled.
Session : 1
-------
69
MIRROR CPU-PORT
CHAPTER 4 SYSTEM FEATURES
Source Ports
Rx : None
Tx : None
Both : None
Destination Ports : Gi0/1
Session Status : Inactive
Rspan Disabled
mirror cpu-port
mirror cpu-port {both | both_meta | rx | rx_meta | tx | tx_meta} destination
{interface (Extreme-Ethernet <ifnum (0/1-28)> | Gigabitethernet <ifnum
(0/1-28)>)}
70
MIRROR CPU-PORT
CHAPTER 4 SYSTEM FEATURES
Parameters
both Enter to configure mirroring of both egress and ingress traffic over CPU port
to the CPU mirrored-to port in the system.
Enter to configure mirroring of both egress and ingress traffic over CPU port
both_meta to the CPU mirrored-to port in the system with meta data.
rx Enter to configure mirroring of ingress traffic over CPU port to the CPU
mirrored-to port in the system.
rx_meta Enter to configure mirroring of ingress traffic over CPU port to the CPU
mirrored-to port in the system with meta data.
tx Enter to configure mirroring of egress traffic over CPU port to the CPU
mirrored-to port in the system.
tx_meta Enter to configure mirroring of egress traffic over CPU port to the CPU
mirrored-to port in the system with meta data.
Enter for Interface related configuration.
interface
Enter for Extreme Ethernet interface.
Extreme-E
thernet
<ifnum Enter a number combination for interface. For example, 0/1 or port channel
(0/1-28)> ID.
Enter for Gigabit Ethernet interface.
Gigabitet
hernet
<ifnum Enter a number combination for interface. For example, 0/1 or port channel
(0/1-28)> ID.
Mode
Global Configuration Mode
Examples
iS5Comm (config)# mirror cpu-port both destination interface gi 0/1
71
SHOW CPU-MIRRORING
CHAPTER 4 SYSTEM FEATURES
show cpu-mirroring
show cpu-mirroring
Mode
Privileged EXEC Mode
Examples
iS5Comm# show cpu-mirroring
CPU Traffic Mirror-To port : Gi0/1
CPU Traffic Mirroring Type : Ingress & Egress
4.19. write
To write the running-config in a flash, startup-configuration file or to a remote site, use the command
write in Global Configuration Mode.
write
write <flash:filename> | <sftp://<user-name>:<pass-word>@server/filename> |
<tftp://server/filename> | startup-config
72
WRITE
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Privileged EXEC Mode
Prerequisites
• Filenames and directory names are case sensitive
Examples
iS5Comm# write startup-config
73
COPY
CHAPTER 4 SYSTEM FEATURES
4.20. copy
To copy the configuration from a remote site to flash, make a backup of the initial configuration in flash
or at a remote location, or write the system logs to a remote site, SD card or USB, use the command copy
in Privileged EXEC Mode.
copy
copy <flash_url> | <sftp://<user-name>:<pass-word>@server/filename> |
<tftp://server/filename> startup-config | flash {coredump <file_name>
(<tftp_url> | SD-Card | usb) <file_name>} | log <file_name> (<sftp_url> |
<tftp_url> | SD-Card | usb) <file_name> | tech_report (<sftp_url> |
<tftp_url> | SD-Card | usb) <file_name> | seminfo (<sftp_url> | <tftp_url> |
SD-Card | usb ) | startup-config {<flash://> | <tftp://server/filename> |
<sftp://<user-name>:<pass-word>@server/filename> | usb} | running-config
startup-config
74
COPY
CHAPTER 4 SYSTEM FEATURES
Parameters
75
COPY
CHAPTER 4 SYSTEM FEATURES
<tftp_url> Enter for a file in remote location to be copied using the TFTP option.
SD-Card Enter for SD-Card file transfer operation
usb Enter for a USB file transfer operation
Enter to copy the running configuration to the startup configuration file
startup-con in NVRAM, where the running-config is the current configuration in the
fig router and the startup config is the configuration that is loaded when
the router boots up
<flash:// Enter to configure the name of the file in which the initial configuration
should be stored. This file is available in the Flash.
Enter to copy running-configuration to startup-configuration. This
running-con command copies the variables from the running configuration to the
fig startup configuration file in NVRAM, where the running-config is the
current configuration in the router and the startup config is the
configuration that is loaded when the router boots up
Mode
Privileged EXEC Mode
Prerequisites
Filenames and directory names are case sensitive
Examples
iS5Comm# copy flash:clcliser startup-config
iS5Comm# copy startup-config flash:clcliser
iS5Comm# copy running-config startup-config
iS5Comm# copy logs tftp://12.100/log.txt standby
Log Upload Successful
iS5Comm# copy tftp://12.0.0.2/clclirel flash:clcliser
iS5Comm# copy flash log file_name SD-Card myfile
iS5Comm# copy flash seminfo usb myfile
76
SET LINKUP-DELAY
CHAPTER 4 SYSTEM FEATURES
set linkup-delay
set linkup-delay {enable | disable}
Parameters
Mode
Global Configuration Mode
Prerequisites
• Linkup-delay configurations are supported only on physical interfaces.
• Linkup-delay configurations are not supported for the logical interfaces like port-channel, router
ports.
Examples
iS5Comm (config)# set linkup-delay enable
4.22. linkup-delay
To enable the Linkup-delay of the interface, use the command linkup-delay in Interface Configuration
Mode. The no form of the command disables the Linkup-delay of the interface or resets the Linkup-delay
Timer.
77
SHOW LINKUP-DELAY
CHAPTER 4 SYSTEM FEATURES
linkup-delay
linkup-delay [timer] <integer (1-1000)>
no linkup-delay
no linkup-delay [timer]
Parameters
Mode
Interface Configuration Mode
Prerequisites
• The command linkup-delay executes only if LinkUp Delay is enabled in the system Configuration
Mode. See command set linkup-delay.
• The command linkup-delay timer executes only if LinkUp Delay is enabled in the system Configu-
ration Mode. Execute first the command linkup-delay.
Examples
iS5Comm (config)# set linkup-delay enable
iS5Comm (config-if)# linkup-delay
iS5Comm (config-if)# linkup-delay timer 10
78
FIRMWARE SWITCH
CHAPTER 4 SYSTEM FEATURES
show linkup-delay
show linkup-delay [interface {gigabitethernet <ifnum (0/1-28)> |
extreme-ethernet] <ifnum (0/1-28)>}]
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show linkup-delay interface gi 0/9
LinkUp Delay Table
--------------------
Interface Id : Gi0/9
Link Up Delay System Status : ENABLED
Link Up Delay Port Status : ENABLED
Link Up Delay Port Time : 10 SecondsLink Up Delay
Remaining Time : 0 Seconds
79
FIRMWARE UPGRADE
CHAPTER 4 SYSTEM FEATURES
firmware switch
firmware switch partition
Mode
Privileged Mode
Examples
iS5Comm # firmware switch partition
firmware upgrade
firmware upgrade <tftp://ip_addr//File-path/file-name.tgz-name> |
sftp://<user_name>:<pass_word>@ip_addr//File-path/file-name.tgz | usb
file-name.tgz
80
CLOCK SET
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Privileged EXEC Mode
Prerequisites
Filenames and directory names are case sensitive
Examples
iS5Comm# firmware upgrade tftp: //192.168.10.10//UpgradeFolder/firmware_upgrade.tgz
81
CLOCK SET
CHAPTER 4 SYSTEM FEATURES
clock set
clock set hh:mm:ss <day (1-31)> <month (01-12)> {january | february | march
| april | may | june | july | august | september | october | november |
december} <year (2000 - 2037)>
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# clock set 4:42:55 9 july 2019
82
ERASE
CHAPTER 4 SYSTEM FEATURES
4.27. erase
To clear the contents of the startup configuration or set parameters in NVRAM to default values or erase
the syslog file from an internal flash, use the command erase in Privileged EXEC Mode.
erase
erase {startup-config | nvram: | flash log | <flash_url>}
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# clock erase startup-config
83
FLOWCONTROL
CHAPTER 4 SYSTEM FEATURES
cli console
no cli console
Mode
Privileged EXEC Mode
Default
Enabled
Examples
iS5Comm# cli console
4.29. flowcontrol
To set the send or receive flow-control value for an interface, use the command flowcontrol in Interface
Configuration Mode.
• If flowcontrol send is on for a device and if it detects any congestion at its end, then it notifies the
link partner or the remote device of the congestion by sending a pause frame.
• If flowcontrol receive is on for the remote device and it receives a pause frame, then it stops
sending any data packets. This prevents any loss of data packets during the congestion period.
• PAUSE is a flow control mechanism that is implied on full duplex Ethernet link segments. The mech-
anism uses MAC control frames to carry the PAUSE commands.
flowcontrol
flowcontrol {send | receive} {on | off | desired}
84
SHUTDOWN
CHAPTER 4 SYSTEM FEATURES
Parameters
send Enter to set the interface to send flow control packets to a remote device.
receive Enter to set the interface to receive flow control packets from a remote device.
on Enter for “on” option. If used with “receive”, it allows an interface to operate
with the attached device to send flow control packets. If used with “send”, the
interface sends flowcontrol packets to a remote device if the device supports it.
off Enter to turn-off the attached devices (when used with receive) or the local
ports (when used with send) ability to send flow-control packets to an interface
or to a remote device respectively.
desired Enter to allow a local port to operate with an attached device that is required to
send flow control packets or that may send the control packets, when used with
receive option. Allows the local port to send administrative status to a remote
device if the remote device supports it, when used with send option
Mode
Interface Configuration Mode
Prerequisites
Interface must first be made administratively down before setting flow control status.
Default
The default flow control for the interfaces are
• flowcontrol receive on
• flowcontrol send on
Examples
iS5Comm# (config-if)# flowcontrol send on
4.30. shutdown
To disable a physical interface / VLAN interface / port-channel interface / tunnel interface / OOB inter-
face, use the command shutdown in Interface Configuration Mode. The no form of the command
enables a physical interface / VLAN interface / port-channel interface / tunnel interface / OOB interface.
85
DEBUG INTERFACE
CHAPTER 4 SYSTEM FEATURES
shutdown
no shutdown
Mode
Interface Configuration Mode for physical interface / port-channel/tunnel interface/OOB Interface /
VLAN Interface Mode for VLAN interface
Prerequisites
• All functions on the specified interface are disabled by the shutdown command
• if OOB interface is enabled, then the Physical Interface eth0 is disabled.
• When the same network interface is used for OOB and NFS mounting, the operation done on OOB
will have impact on NFS. For example, when interface eth0 is used for OOB and NFS mounting,
executing shutdown command on the OOB interface will make the admin down and the NFS
communication will be lost.
Default
• The Physical Interface eth0 is enabled
• The interface VLAN 1 is enabled
• The Port-channel interface is disabled
Examples
iS5Comm# (config-if)# shutdown
debug interface
debug interface [track] [enetpktdump] [ippktdump] [arppktdump] [trcerror]
[os] [failall] [buffer] [all {<short (0-7)> | alerts | critical | debugging
| emergencies | errors | informational | notification | warnings}]
86
DEBUG INTERFACE
CHAPTER 4 SYSTEM FEATURES
no debug interface
debug interface [track] [enetpktdump] [ippktdump] [arppktdump] [trcerror]
[os] [failall] [buffer] [all]
87
DEBUG INTERFACE
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
88
DEBUG-LOGGING
CHAPTER 4 SYSTEM FEATURES
Examples
iS5Comm# debug interface trcerror critical
4.32. debug-logging
To configure the debug logging option in the system and specifies whether the logging is to be done at
console, to a file (system buffer), or through flash, use the command debug-logging in Global Configura-
tion Mode. The no form of the command displays debug logs in the console.
debug-logging
debug-logging <flash_url> {console | file | flash} [standby]
no debug-logging
no debug-logging [standby]
Parameters
Mode
Global Configuration Mode
Default
console
89
ROLLBACK
CHAPTER 4 SYSTEM FEATURES
Examples
iS5Comm(config)# debug-logging flash standby
iS5Comm(config)# debug-logging console standby
4.33. rollback
To enable /disable the rollback function, use the command rollback in Global Configuration Mode.
rollback
rollback {enable | disable}
Parameters
Mode
Global Configuration Mode
Default
enable
Examples
iS5Comm(config)# rollback enable
4.34. shutdown
To shut down all ports in the corresponding modules and releases all allocated memory, use the
command shutdown in Global Configuration Mode.
90
SHUTDOWN
CHAPTER 4 SYSTEM FEATURES
shutdown
shutdown {bgp | dot1x | garp | isis | ldp | lldp | ospf | ospf3 |
port-channel | ptp | rsvte | snooping | spanning-tree | split-horizon |
switch-instance-shared-port | ufd | vlan}
Parameters
Mode
Global Configuration Mode
91
START
CHAPTER 4 SYSTEM FEATURES
Prerequisites
BGP, OSPF, ISIS, RSVPTE, LDP shutdown command implementations are applicable only for stack environ-
ment
Examples
iS5Comm(config)# shutdown ospf
4.35. start
To start and enable the corresponding modules and allocate the required resources to the corresponding
module, use the command start in Global Configuration Mode.
start
start {bgp | ospf | ospf3 | isis | rsvte | ldp}
Parameters
Mode
Global Configuration Mode
92
SET SWITCH
CHAPTER 4 SYSTEM FEATURES
Examples
iS5Comm(config)# start ospf
set switch
set switch [<string(15)>] [maximum {RAM | CPU | flash} threshold <percentage
(1-100)>] [temperature {min | max} threshold <celsius ((-15)-35)/(30-40)>]
[power {min | max} threshold <volts (100-230)>]
93
SET SWITCH
CHAPTER 4 SYSTEM FEATURES
Parameters
94
SET SWITCH
CHAPTER 4 SYSTEM FEATURES
Mode
Global Configuration Mode
Default
Switch defaults
• RAM - 100%
• CPU - 100 %
• flash - 100%
Temperature
• min - 10 degree Celsius
• max - 40 degree Celsius
Power Supply
• min - 100 V
• max - 230 V
Examples
iS5Comm(config)# set switch maximum RAM threshold 98
95
HOSTNAME
CHAPTER 4 SYSTEM FEATURES
4.37. hostname
To configure the name of the switch, use the command hostname in Global Configuration Mode.
hostname
hostname <switchname>
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# hostname switch1
set designated-uplink
set designated-uplink <ifXtype> {fastethernet <ifnum> | gigabitethernet
<ifnum> | extreme-ethernet <ifnum>} | port-channel <integer <1-65535)>
96
SET DESIGNATED-UPLINK
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
UFD Configuration Mode
Prerequisites
This command executes only if,
• UFD group is configured
• uplink port is added in the group
Examples
iS5Comm (config-ufd)# set designated-uplink gigabitethernet 0/6
97
MAC-LEARN-RATE
CHAPTER 4 SYSTEM FEATURES
4.39. mac-learn-rate
To configure the maximum number of unicast dynamic MAC (L2) MAC entries hardware can learn in the
system, in a configured time interval, use the command mac-learn-rate in Global Configuration Mode.
The no form of the command removes the limit on number of unicast MAC entry indications (limit value
is set as 0) and resets the configured time interval to default value.
In next subsequent time interval, hardware can learn number of previously learnt MAC entries plus
present MAC entries, this cycle will continue until MAC learning reaches to maximum number of L2
unicast dynamic entries learning capacity of the system. If rate limit is changed while timer is running,
new rate limit value takes effect on next timer restart. This limit is to control the number of MAC entries
indication to control plane from hardware, when hardware MAC learning is enabled. Configuration value
'0' disables this feature in the system.
mac-learn-rate
mac-learn-rate <no of MAC entries(0-2147483647)> [interval <millisec-
onds(1-100000)>]
98
MAC-LEARN-RATE
CHAPTER 4 SYSTEM FEATURES
no mac-learn-rate
Parameters
Mode
Global Configuration Mode
Default
This command executes only if,
• <no of MAC entries(0-2147483647)> - 1000
• interval - 1000
Examples
iS5Comm (config)# mac-learn-rate 100 interval 500
99
PORTS
CHAPTER 4 SYSTEM FEATURES
4.40. ports
To configure the ports for the UFD group, use the command ports in UFD Configuration Mode.
ports
ports {add | delete} [fastethernet <interface-id> | gigabitethernet <inter-
face-id> | Extreme-Ethernet <interface-id> | port channel <port channel ID>]
counters
Parameters
Mode
UFD Configuration Mode
100
SET PORT-ROLE
CHAPTER 4 SYSTEM FEATURES
Prerequisites
This command executes only if UFD group is configured.
Examples
iS5Comm (config-ufd)# ports add gigabitethernet 0/1
set port-role
set port-role {uplink [designated] | downlink}
Parameters
Mode
Interface Configuration Mode
Examples
iS5Comm (config-if)# set port-role uplink
101
CLEAR INTERFACES
CHAPTER 4 SYSTEM FEATURES
clear interfaces
clear interfaces [gigabitethernet <interface-id> | Extreme-Ethernet <inter-
face-id>] counters
When used in Privileged EXEC Mode
clear interfaces
clear interfaces [gigabitethernet <interface-id> | Extreme-Ethernet <inter-
face-id>] [port channel <port channel ID>] counters
Parameters
Mode
Privileged EXEC Mode / Global Configuration Mode
Examples
iS5Comm# clear interfaces counters
iS5Comm# clear interfaces port-channel 1 counters
iS5Comm(config)# clear interfaces counters
102
CLEAR COUNTERS
CHAPTER 4 SYSTEM FEATURES
clear counters
clear counters [gigabitethernet <interface-id> | Extreme-Ethernet <inter-
face-id>] counters
When used in Privileged EXEC Mode
clear interfaces
clear counters [fastethernet <interface-id> | gigabitethernet <interface-id>
| Extreme-Ethernet <interface-id>] [port channel <port channel ID>] counters
103
SHOW IP INTERFACE
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Privileged EXEC Mode / Global Configuration Mode
Examples
iS5Comm# clear counters
iS5Comm# clear counters port-channel 1
iS5Comm(config)# clear counters
iS5Comm(config)# clear interfaces gigabitethernet 0/1
104
SHOW IP INTERFACE
CHAPTER 4 SYSTEM FEATURES
show ip interface
show ip interface [vlan <vlan-id(1-4094>] [switch default]] [gigabitethernet
<interface-id>] [Extreme-Ethernet <interface-id>] [loopback <loopback ID
(1-1000>] [vlan-counters]
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show ip interface vlan 1
vlan1 is up, line protocol is up
Internet Address is 192.168.10.1/24
105
SHOW AUTHORIZED-MANAGERS
CHAPTER 4 SYSTEM FEATURES
show authorized-managers
show authorized-managers [ip-source <ip_addr>]
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show authorized-managers
Ip Authorized Manager Table
---------------------------
Ip Address : 12.0.0.1
Ip Mask : 255.255.255.255
Services allowed : ALL
Ports allowed : Gi0/1
On cpu0 : Deny
Vlans allowed : All Available Vlans
106
SHOW INTERFACES
CHAPTER 4 SYSTEM FEATURES
107
SHOW INTERFACES
CHAPTER 4 SYSTEM FEATURES
Parameters
108
SHOW INTERFACES
CHAPTER 4 SYSTEM FEATURES
<tunnel IP Integer Enter a specific tunnel ID. The range is from 1 to 128.
(1-128)>
bridge port-type Enter to display the bridge port type of interfaces.
port-channel Enter to display the port channel interfaces.
<port-channel Enter a specific port channel ID that ranges from 1 to 65535.
ID(1-65535)>
bridge port-type Enter to display the bridge port type of interfaces.
port-channel Enter to display the port channel interfaces.
<port-channel Enter a specific port channel ID that ranges from 1 to 65535.
ID(1-65535)>
pw Enter to display the pseudo wire interface.
<pw range(1-255)> Enter a specific pw ID that ranges from 1 to 255.
s-channel Enter to display the s-channel interfaces.
<s-channel Enter a specific s-channel ID that ranges from 1 to 65535.
ID(1-65535)>
configuration Enter to display the configuration-related statistics information
for the specified interface.
hardware Enter to display the hardware-related statistics information for
the specified interface.
mcounters Enter to display MIB counters obtained directly from hardware.
Full resolution counters can be obtained to get better insight
into the traffic patterns and issues.
<ifXtype> <ifnum> Enter to display the interface port role configuration details and
detailed information of UFD mapped in the interface. Note that
these parameters are optional. If no parameter entered, the
command displays a summary of all available port counters.
redundant Enter to display detailed redundant counters.
<number (1-8)> Enter a value to display only a specific redundant counter.
mtu Enter to display the Maximum Transmission Unit (MTU) of
interfaces in the switch.
port-role Enter to display the interface port role configuration details and
detailed information of UFD mapped in the interface.
redundant Enter to display the HSR-PRP redundancy-related configuration.
109
SHOW INTERFACES
CHAPTER 4 SYSTEM FEATURES
<number (1-8)> Enter to display the configuration for a specific number RED.
config Enter to display the hsp-prp specific configuration.
node-table Enter to display the node table information.
proxy-node-table Enter to display the proxy node table information.
map Enter to display the mapping of physical and logical ports.
quad-box Enter to display the quad-box configuration.
quad-box-table Enter to display the Quad-Box node table information.
counters Enter to display the counter statistics for specified interface.
statistics Enter to display the UFD global configuration details.
transceivers Enter to display the transceiver related live diagnostic
information
HC-counters Enter to display the HC interface counters related information
ppp Enter to display the Protocol Packet Processing (PPP) interface
related configuration
<PPP-id range Integer Enter a specific PPP ID. The range is from 1 to 4094.
(1-4094)>
CPU Enter to display information for the port related to the CPU.
Mode
Privileged EXEC Mode
Examples
iS5Comm# show interfaces gigabitethernet 0/1
Gi0/1 up, line protocol is up (connected)
Bridge Port Type: Customer Bridge Port
Interface SubType: Gigabit Ethernet
Interface Alias: interface1
Hardware Address is 00:03:02:03:04:01
MTU 200 bytes,
Error in Duplex status
100 Mbps, Auto-Negotiation
HOL Block Prevention disabled.
110
SHOW INTERFACES
CHAPTER 4 SYSTEM FEATURES
Reception Counters
Octets : 0
Unicast Packets : 0
Multicast Packets : 0
Broadcast Packets : 0
Discarded Packets : 0
Error Packets : 0
Unknown Protocol : 0
Transmission Counters
Octets : 158406
Unicast Packets : 0
Multicast Packets : 1702
Broadcast Packets : 0
Discarded Packets : 0
Error Packets : 0
iS5Comm # show interfaces mcounters
MIB RECEIVE COUNTERS
Port Octets Unicast Multicast Broadcast Discards
Errors
------ ---------------- --------- --------- --------- ---------
---------
Gi0/1 915185 44 2869 1373 0
0
Gi0/2 546837 0 1967 759 0
0
Gi0/3 184609 0 702 70 0
0
Gi0/4 531967 0 1891 762 0
0
Gi0/5 4641423 59 55635 1375 0
0
Gi0/6 5412423 101 60671 2129 0
0
i0/7 4641564 59 55636 1375 0
0Gi0/8 5412561 101 60672 2129 0
0
111
SHOW INTERFACES
CHAPTER 4 SYSTEM FEATURES
112
SHOW INTERFACES
CHAPTER 4 SYSTEM FEATURES
Gi0/10 0 0 0 0 0
0
Gi0/11 3848156 58 44413 1384 0
0
i0/12 0 0 0 0 0 0
Red-3A 4911845 101 59405 1232 0
0
Red-3B 4487972 43 57941 672 0
0
Red-3I 3845022 58 44602 1233 0
0
Red-4A 5412701 101 60674 2129 0
0
Red-4B 5412701 101 60674 2129 0
0
Red-4I 7879751 43 106674 745 0
0
iS5Comm # show interfaces mcounters gigabitethernet 0/4
Gi0/4 MIB Counters Receive Transmit
--------------------- -------------------- --------------------
Good Octets 533372 10057124
Bad Octets 0
Unicast 0 160
Multicast 1896 116189
Broadcast 763 3494
Flow Control 0 0
Bad Flow Control 0
Fragmentation 0
Collisions 0
Late Collisions 0
Multiple Send 0
Deffered Send 0
MAC Errors 0 0
CRC Errors 0
Undersized Packets 0
Oversized Packets 0
Drop Packets 0
Jabber Packets 0
Excessive Collisions 0
64 Octets 561
65-127 Octets 116406
113
SHOW INTERFACES
CHAPTER 4 SYSTEM FEATURES
114
SHOW INTERFACES
CHAPTER 4 SYSTEM FEATURES
Undersize 0 0 0
Error frames 0 0
0
Fragmented 0 0 0
Drop (mem issue) 0 0 0 0 0
0
HSR-PRP 57215 57215 43885 63344 63344
108252
Own HSR 0 0 0
HSR-PRP dup 48539 52519 0
PRP wrong LanID 0 0 0
iS5Comm # show interfaces port-role
Gi0/1 Downlink
Gi0/2 Downlink
Gi0/3 Downlink
Gi0/6 Uplink
vlan1 Uplink
iS5Comm # show interfaces statistics
Interface DownlinkEnabledCount DownlinkDisabledCount
Gi0/1 1 1
Gi0/2 0 0
Gi0/3 0 0
Ex0/1 0 0
Ex0/2 0 0
Ex0/3 0 0
Ex0/4 0 0
vlan1 0 0
iS5Comm # show interfaces status
Port Status Duplex Speed Negotiation
Capability
---- ------ ------ ----- ----------- ----------
Gi0/1 not connected - - Auto Auto-MDIX on
Gi0/2 not connected - - Auto Auto-MDIX on
Gi0/3 not connected - - Auto Auto-MDIX on
Gi0/4 connected Full 1 Gbps Auto Auto-MDIX on
Gi0/5 not connected - - Auto Auto-MDIX on
Gi0/6 not connected - - Auto Auto-MDIX on
Gi0/7 not connected - - Auto Auto-MDIX onGi0/8
not connected - - Auto Auto-MDIX on
Gi0/9(I) admin down - - Auto Auto-MDIX on
Gi0/11(I) admin down - - Auto Auto-MDIX on
115
SHOW SYSTEM-SPECIFIC PORT-ID
CHAPTER 4 SYSTEM FEATURES
Red3
Red3A not connected - - Auto Auto-MDIX on
Red3B not connected - - Auto Auto-MDIX on
Red4
Red4A not connected - - Auto Auto-MDIX on
Red4B not connected - - Auto Auto-MDIX on
iS5Comm(config-if)# speed automax100
iS5Commend
iS5Comm # show interfaces gig 0/17
Gi0/17 up, line protocol is down (not connect)
Bridge Port Type: Customer Bridge Port
Mode
Privileged EXEC Mode
116
SET CUSTOM-PARAM
CHAPTER 4 SYSTEM FEATURES
Examples
iS5Comm# show system-specific port-id
Interface PortID
---------------------------
Slot0/1 45
set custom-param
set custom-param {type <integer> | length <integer> | value <string>} |
attribute <integer (1-4)> | value <integer (0-4294967295)>}
no set custom-param
no set custom-param [type <integer>] [attribute <integer (1-4)]
117
SHOW CUSTOM-PARAM
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Interface Configuration Mode
Default
value -0
Examples
iS5Comm (config-if)# set custom-param attribute 2 value 40
show custom-param
show custom-param
118
SHOW ENV
CHAPTER 4 SYSTEM FEATURES
Mode
Privileged EXEC Mode
Examples
iS5Comm# show custom-param
Slot0/1
AttrID AttrValue
-------- --------
4 5454
Slot0/2
AttrID AttrValue
-------- --------
2 2424
Type Length Value
-------- -------- --------
2 4 root
5 4 root
show env
show env {all | temperature | RAM | CPU | flash | power}
119
SHOW ENV
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show env all
CPU Threshold : 80%
Current CPU Usage : 3%
RAM Threshold : 80%
Current RAM Usage : 37%
Flash App Threshold : 80%
Flash Dedicated for App : 95%
Dedicated Flash Usage by App : 19%
Flash Size : 8GByte
Power Supply 1 Presence : Uknown
Power Supply 2 Presence : Uknown
Switch Thermal Limit : 85C
Switch High Threshold : 80C
Switch Low Threshold : -35C
Switch Current Temperature : 36C
Core Temperature : 58C
Line Module 1 Temperature : 42C
Line Module 2 Temperature : 45C
120
SHOW SYSTEM
CHAPTER 4 SYSTEM FEATURES
show system
show system {acknowledgement | information | port-id}
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show system acknowledgement
121
SHOW FLOW-CONTROL
CHAPTER 4 SYSTEM FEATURES
Parameters
122
SHOW DEBUG-LOGGING
CHAPTER 4 SYSTEM FEATURES
Mode
Privileged EXEC Mode
Examples
iS5Comm# show flow-control Interface gigabitethernet 0/1
Port Admin Oper Tx Pause Rx Pause HC TxPause HC RxPause
Tx Rx Tx Rx
---- ------- ------- -------- -------- ---------- ----------
Gi0/1 off off on off 0 0 0 0
show debug-logging
show debug-logging [standby]
123
SHOW DEBUGGING
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show debug-logging standby
Creating log file fsir.log.4693
iS5Comm# show debug-logging standby
% File does not exist
show debugging
show debugging
Mode
Privileged EXEC Mode
Examples
iS5Comm# show debugging
LLDP :
LLDP critical debugging is on
124
SHOW RUNNING-CONFIG
CHAPTER 4 SYSTEM FEATURES
show clock
show clock
Mode
Privileged EXEC Mode
Examples
iS5Comm# show clock
Mon Jan 20 23:54:44 2020 (UTC +00:00)
show running-config
Mode
Privileged EXEC Mode
Examples
iS5Comm# show running config ?
<CR> Command to enable or disable
memtrace
<CR> Displays the currently operating
configuration in the system
<CR> show memtrace
Openflow Client related configuration
acl ACL related configuration
alarm alarm related configuration
125
SHOW RUNNING-CONFIG
CHAPTER 4 SYSTEM FEATURES
126
SHOW RUNNING-CONFIG
CHAPTER 4 SYSTEM FEATURES
127
SHOW RUNNING-CONFIG
CHAPTER 4 SYSTEM FEATURES
128
SHOW HEALTH STATUS
CHAPTER 4 SYSTEM FEATURES
Mode
Privileged EXEC Mode
Examples
iS5Comm# show health status
SWITCH HEALTH STATUS---------------------------------
129
SHOW MAC-LEARN-RATE
CHAPTER 4 SYSTEM FEATURES
show mac-learn-rate
show mac-learn-rate
Mode
Privileged EXEC Mode
Examples
iS5Comm# show mac-learn-rate
Switch MAC Learn Limit Rate : 100
Switch MAC Learn Limit Rate Interval: 1000
130
AUDIT-LOGGING
CHAPTER 4 SYSTEM FEATURES
Parameters
Integer Enter a value for the timer. This value ranges from 1 to 1000.
<timer-speed(1-100
0)>
Mode
Global Configuration Mode
Examples
iS5Comm(config)# set timer speed 100
4.60. audit-logging
Audit logging uses Syslog platform as tools to send/store Audit logs. So for allowing the Audit-logging to
work, the Syslog should configured and working. Audit-logging uses configuration, supported by Syslog.
Audit logging provides two ways to save audit messages: local and remote. Both ways work inde-
pendently between each other. Both local and remote logging are disabled by default.
audit-logging
audit-logging { [ local [ enable | filename <string(128)> ] | remote [ enable |
[ipv4-address <ip_addr>] [port <integer(1-65535)>] [{ tcp | udp | tls}] ] }
131
AUDIT-LOGGING
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Global Configuration Mode
Examples
Audit messages are saved to the local file, which can be default file or user defined file.
Local file name can not be changed if the local audit-logging enabled.
The way to change the file name is:
1) disable the local audit-logging (if enabled)
2) change the file name
3) enable the local audit-logging (if required)
Example
iS5Comm(config)# no audit-logging local
iS5Comm(config)# audit-logging local filename LOCAL_FILE.txt
iS5Comm(config)# audit-logging local enable
Default paramters:
1. local logging status: disabled
2. local file name is “audit.txt”
132
AUDIT-LOGGING
CHAPTER 4 SYSTEM FEATURES
Disabling Audit-Logging
iS5Comm(config)# no audit-logging remote
iS5Comm(config)# no audit-logging local
133
SHOW AUDIT-LOGGING
CHAPTER 4 SYSTEM FEATURES
example:
iS5Comm# show audit-logging file
To view a specific number of lines:
iS5Comm# show audit-logging file lines 3
To view a specific audit log file
iS5Comm# show audit-logging file audit.txt lines 3
134
SHOW AUDIT-LOGGING
CHAPTER 4 SYSTEM FEATURES
Parameters
config show the current local and remote status and configuration
file [lines show the content of the local audit-logging file, default number of lines: 20
<integer(1-6
5535)>]
Mode
Privileged Exec Mode
Examples
Content of the local audit file can be shown by “show command”
Example 1
iS5Comm# show audit-logging file
<134>Jul 27 02:19:52 ISS[2102]: AUDIT : admin audit-logging local enable #012 SUCCESS CONSOLE
<134>Jul 27 02:22:53 ISS[2102]: AUDIT : admin Idle Timer expired, Logging out ...! SUCCESS CONSOLE
<134>Jul 27 02:26:35 ISS[2102]: AUDIT : Attempt to login as admin via console Succeeded
<134>Jul 27 02:19:52 ISS[2102]: AUDIT : admin audit-logging local enable #012 SUCCESS CONSOLE
Example 2
An user can choose to see specific number of lines.
iS5Comm# show audit-logging file lines 3
<134>Jul 27 02:26:35 ISS[2102]: AUDIT : admin Logging in ...! SUCCESS CONSOLE
<134>Jul 27 02:28:25 ISS[2102]: AUDIT : admin show audit-logging file #012 SUCCESS CONSOLE
Example 3
For audit-Logging MRP for WebUI and CLI, see below:
iS5Comm# show audit-logging file
<134>Oct 18 16:31:33 ISS: WEBNM : MRP Global Settings AUDIT : admin <Global Status>=’Enable’;
<129>Oct 18 16:31:33 ISS: AUDIT : Attempt to logi as admin via console Succeeded
<129>Oct 18 16:31:33 ISS: AUDIT : admin Logging in ...! SUCCESS CONSOLE
<134>Oct 18 16:31:33 ISS: AUDIT : admin sh run SUCCESS CONSOLE
135
SHUTDOWN UFD
CHAPTER 4 SYSTEM FEATURES
<134>Oct 18 16:31:33 ISS: AUDIT : admin sh sudit-logging filename SW3 SUCCESS CONSOLE
<134>Oct 18 16:31:33 ISS: WEBNM : MRP Global Settings AUDIT : admin <Global Status>=’dISABLE;
shutdown ufd
no shutdown ufd
Mode
Global Configuration Mode
Examples
iS5Comm (config)# no shutdown ufd
set ufd
set ufd {enable | disable}
136
UFD GROUP
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# set ufd enable
ufd group
ufd group <integer(1-65535)> [groupname <string(32)>]
no ufd group
no ufd group <integer(1-65535)> [groupname <string(32)>]
137
UFD GROUP
CHAPTER 4 SYSTEM FEATURES
Parameters
Enter a group ID for the UFD group. This value ranges from 1 to 65535.
<integer(1-6
5535)>
groupname Enter to add a group name.
Enter configure the name of the UFD group. This groupname is a string
<string(32)> of maximum size 32. Note that the groupname should be only
characters - no numerals allowed.
Mode
Global Configuration Mode
Examples
iS5Comm(config)# no shutdown ufd
iS5Comm(config)# set ufd enable
iS5Comm(config)# ufd group 2 groupname group
iS5Comm(config-ufd)
UFD Configuration
In the above topology Raptor 1 and Raptor 2 are configured with one uplink and one down link respec-
tively. A UFD group is created and both uplink ports and down link ports are added to the group for moni-
toring.
In a typical scenario as shown above where client can reach server from primary and backup links i.e. via
Raptor 1 and Raptor 2, when Raptor 1 detects the link failure with its uplink with server, it shall make
downlink with client disable. This shall switch the client to the backup link, i.e. with server reachable via
Raptor 2.
138
UFD GROUP
CHAPTER 4 SYSTEM FEATURES
Configuration on Raptor 1
iS5Comm(config)# no shutdown ufd
iS5Comm(config)# set ufd enable
iS5Comm(config)# ufd group 1 groupname raptor
iS5Comm(config-ufd)# ports add gigabitethernet 0/1
iS5Comm(config-ufd)# exit
iS5Comm(config)# int gi 0/2
iS5Comm(config-if)# set port-role uplink
iS5Comm(config)# ufd group 1
iS5Comm(config-ufd)# ports add gigabitethernet 0/2
iS5Comm(config-ufd)# end
iS5Comm# show ufd group 1
UFD Configurations
139
INTERNAL-LAN
CHAPTER 4 SYSTEM FEATURES
------------------------------------------------------
Gi0/1 Downlink Up
Gi0/2 Uplink Up
------------------------------------------------------
show logging
show logging-file
show logging-server
4.65. internal-lan
To add an internal LAN interface and its parameters, use the command internal-lan in Global Configura-
tion Mode. The no form of the command deletes the internal LAN interface.
internal-lan
internal-lan <ilan-id (1-65535)> [add interface virtual <iface_list> |
delete interface virtual <iface_list>]
140
SHOW INTERNAL-LAN
CHAPTER 4 SYSTEM FEATURES
no internal-lan
no internal-lan <ilan-id (1-65535)>
Parameters
Mode
Global Configuration Mode
Prerequisites
This command executes only if virtual interface is created in the system.
Examples
iS5Comm(config)# internal-lan 1 add interface virtual 1
show internal-lan
show internal-lan <iface_list>
141
SHOW IFTYPE PROTOCOL DENY TABLE
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Privileged EXEC Mode
Prerequisites
This command executes only if virtual interface is created in the system.
Examples
iS5Comm# show internal-lan 1
Intra Bridge Connections
--------------------------------
I-LAN : internal-lan1
Switch : Port : virtual1 Bridge Port Type: Customer
Bridge Port
142
LOGIN BLOCK-FOR
CHAPTER 4 SYSTEM FEATURES
Parameters
switch default Enter to displays iftype for the specified context. This value is
default.
Mode
Privileged EXEC Mode
Prerequisites
This command executes only if virtual interface is created in the system.
Examples
iS5Comm# show iftype protocol deny table
Switch default
IfType BridgePortType Protocol
---------------------------------------------------
Pip PropCustomerEdgePortlldp
Pip PropCustomerEdgePortqos
Pip CustomerBackbonePortecfm
Pip CustomerBackbonePortbridge
login block-for
login block-for <seconds(30-600)> attempts <tries(1-10)>
143
SHOW UFD
CHAPTER 4 SYSTEM FEATURES
Parameters
Integer Enter to specify the lock out time in seconds for which a user is
<seconds(30-60 blocked following unsuccessful logins. This value ranges from 30 to
0) 600
attempts Enter to configure number of login attempts.
<tries(1-10)> Integer Enter to configure login attempts. This is the number of times a user
is allowed to login using wrong password in the login prompt. This
value ranges from 1 to 10.
Mode
Global Configuration Mode
Defaults
• seconds - 30
• tries - 3
Examples
iS5Comm(config)# login block-for 60 attempts 4
show ufd
show ufd [brief] [group <integer(1-65535)>]
144
FEATURE TELNET
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show ufd group 2
UFD Configurations
------------------
UFD Status : Enabled
Group Id: 2
Group Name: group
Group Status : UP
Designated Uplink Port : Gi0/6
Interface Role UFD Status
--------- ---- ----------
Gi0/1 Downlink Up
Gi0/6 Uplink Up
145
SHOW TELNET SERVER
CHAPTER 4 SYSTEM FEATURES
feature telnet
no feature telnet
Mode
Global Configuration Mode
Default
Enabled
Examples
iS5Comm (config)# feature telnet
Mode
Privileged EXEC Mode
Examples
iS5Comm# show telnet server
telnet service enabled
146
SET HTTP
CHAPTER 4 SYSTEM FEATURES
set http
set http authentication-scheme {default | basic | digest} | redirection
enable
no http
no http redirection enable
Parameters
Mode
Global Configuration Mode
Default
• Authentication scheme - default
• Redirection - enable
Examples
iS5Comm(config)# set http authentication-scheme basic
iS5Comm (config)# set http redirection enable
147
SHOW HTTP
CHAPTER 4 SYSTEM FEATURES
show http
show http authentication-scheme | redirection [URL] | server status
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show http authentication-scheme
The Operational HTTP authentication scheme is Default
The Configured HTTP authentication scheme is Basic
iS5Comm# show http redirection
HTTP Redirection Entries
----------------------------
URL Server IP/DomainName
--- --------------------
% No Entries Found
iS5Comm# show http server status
HTTP server status : Enabled
148
HTTP REDIRECT
CHAPTER 4 SYSTEM FEATURES
HTTP port is : 80
HTTP Requests In : 0
HTTP Invalids : 0
http redirect
http redirect <URL to be redirected> server {<Domain name> | <IPv4 Address>
| <IPv6 Address>}
no http redirect
no http redirect <URL to be redirected>
Parameters
<URL to be /url Enter to specify the URL which has to be redirected. On receiving
redirected> request for the URL, a redirection status is sent as response for the
request.
server Enter to set the server for the URL which is redirected. The options
are:
<Domain name> Enter to set the domain name of the alternate server.
<IPv4 Address> Enter to set the IP address of the alternate server in v4 format.
<IPv6 Address> Enter to specify the IP address of the alternate server in v6 format.
Mode
Global Configuration Mode
Default
• Authentication scheme - default
• Redirection - enable
149
SET SPLIT-HORIZON
CHAPTER 4 SYSTEM FEATURES
Examples
iS5Comm(config)# http redirect /sample/ server 12.0.0.2
set split-horizon
set split-horizon {enable | disable}
Parameters
Mode
Global Configuration Mode
Prerequisites
To execute this command Split Horizon should be started in the system
Examples
iS5Comm(config)# set split-horizon enable
150
SHOW SPLIT-HORIZON
CHAPTER 4 SYSTEM FEATURES
shutdown split-horizon
no shutdown split-horizon
Mode
Global Configuration Mode
Examples
iS5Comm(config)# no shutdown split-horizon
show split-horizon
show split-horizon [all] [interface [gigabitethernet <interface-id> |
Extreme-Ethernet <interface-id>]
151
SPEED
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show split-horizon interface 1
Ingress Port VlanId StorageType Egress List
============ ====== =========== ===========
Gi0/1 - Volatile Gi0/2,Gi0/3,Gi0/6
4.78. speed
To set the speed of the interface, use the command speed in Interface Configuration Mode. The no form
of the command sets the speed of the interface to its default value.
speed
speed {10 | 100 | 1000 | 10000 | 2500 | 25000 | 40000 | 50000 | auto | auto-
max100 | nonegotiate}
152
SLEEP
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Interface Configuration Mode
Prerequisites
To execute this command, Split Horizon should be started in the system.
Examples
iS5Comm(config-if)# speed 10
4.79. sleep
To make the CLI idle for a specified time, use the command sleep in Privileged EXEC Mode.
sleep
sleep <seconds(1-65535)>
153
RATE-LIMIT PAUSE
CHAPTER 4 SYSTEM FEATURES
Parameters
<seconds(1-65535)> Enter a value to specify idle time. This value ranges from 1 to
65535 in seconds.
Mode
Privileged EXEC Mode
Examples
iS5Comm# sleep 5
rate-limit pause
rate-limit pause [<high-watermark>] [<low-watermark>]
Parameters
Mode
Interface Configuration Mode (Physical)
154
CPU CONTROLLED LEARNING
CHAPTER 4 SYSTEM FEATURES
Examples
iS5Comm (config-if)# rate-limit pause 400000 300000
Mode
Interface Configuration Mode (Physical)
Examples
iS5Comm (config-if)# cpu controlled learning
traffic-separation control
traffic-separation control {system_default | user_defined | none}
155
MDIX AUTO
CHAPTER 4 SYSTEM FEATURES
Parameters
Typ
Parameter e Description
system_default Enter to configure the method for receiving control packets by CPU as
system default. This implies that the software can automatically
install the ACL and QoS rules for all control packets.
NOTE: If the configuration is changed from 'system_default' to
'user_defined' option, then all default ACL/QoS rules for carrying
protocol control packets to CPU are removed. Then user has to install
the specific ACL/QoS rules, to carry the intended control packets to
CPU for the processing.
user_defined Enter to configure the method for receiving control packets to CPU as
user defined. This implies that the software cannot automatically
install the ACL and QoS rules for all control packets. Only the
administrator can install the required rules for receiving control
packets to CPU
none Enter to indicate only ACL rules.
NOTE: If the configuration is changed from 'none' to 'system_default'
option, then all default ACL filters for carrying protocol control
packets to CPU are removed and new set of filters will be installed.
Each filter will be associated with Qos rules
NOTE: If the configuration is changed from 'none' to 'user_defined'
option, then all default ACL filters for carrying protocol control
packets to CPU are removed. Then user has to install the specific
ACL/QoS rules, to carry the intended control packets to CPU for the
processing
Mode
Global Configuration Mode
Examples
iS5Comm (config)# traffic-separation control system_default
156
SET PORT
CHAPTER 4 SYSTEM FEATURES
mdix auto
no mdix auto
Mode
Interface Configuration Mode (Physical)
Default
AutoCross is disabled
Examples
iS5Comm (config-if)# mdix auto
set port
set port {mdi | mdix}
157
CONFIG-RESTORE
CHAPTER 4 SYSTEM FEATURES
Parameters
mdi Enter to set the port to MDI mode. This is hardware specific where transmit
pair are pins 1,2 and the receive pair are 3,6 pins respectively for the
particular port.
mdix Enter to set the port to MDIX mode. This is hardware specific where transmit
pair are pins 3, 6 and the receive pair are 1, 2 pins respectively for the
particular port. MDIX is the vice versa of mdi.
downlink Enter to indicate downlink interface.
uplink Enter to indicate uplink interface.
Mode
Interface Configuration Mode
Examples
iS5Comm (config)# traffic-separation control system_default
4.85. config-restore
To configure the startup configuration restore option, use the command config-restore in Privileged
EXEC Mode.
config-restore
config-restore {flash | remote <ucast_addr> file <filename> | norestore}
158
SET MGMT-PORT ROUTING
CHAPTER 4 SYSTEM FEATURES
Parameters
flash Enter for restoring the flash file that is to be used for restoration when
the system is restarted
remote Enter for restoring the Unicast IP address of the remote system from
where the switch configurations have to be downloaded to the
'Startup Configuration File' in the flash.
ucast_addr A.B.C.D Enter the Unicast IP address to be used.
file Enter for restoring the specified remote location file.
filename Enter a file name for the remote location file-a string with a maximum
size of 12.
norestore Enter to specify that the switch configurations need not be restored
when the system is restarted
Mode
Privileged EXEC Mode
Default
norestore
Examples
iS5Comm# config-restore flash
159
SET SWITCH-NAME
CHAPTER 4 SYSTEM FEATURES
Parameters
enable Enter to enable the routing function over the Management Interface. This
object can be configured only if the Management Port is used for IP Access.
disable Enter to disable the routing function over the Management Interface. This
object can be configured only if the Management Port is used for IP Access
Mode
Global Configuration Mode
Default
disable
Examples
iS5Comm(config)# set mgmt-port routing enable
set switch-name
set switch-name string <15>
Parameters
string <15> Enter to set a Switch Name (e.g. my-Switch). The value is a string with
maximum size of 15.
Mode
Global Configuration Mode
160
PACKET
CHAPTER 4 SYSTEM FEATURES
Examples
iS5Comm(config)# set switch-name default
4.88. packet
To configure the packet pattern and mask for pattern matching on the received packets, set the port and
value for the packet transmitter and transmit the packet provided the packet pattern is configured, or
set the packet pattern for the packet transmitter and transmits the packet, provided the interface is
configured, use the command packet in Global Configuration Mode.
packet
packet {receive index <integer (0-4)> {value | mask | port <port_list>} |
{send index <integer (0-4)> {port <port_list> [count <integer (0-65536)>
[interval <integer (1-65535)>] | value}}
no packet
no packet receive index <integer (0-4)> [mask] | send index <integer (0-4)>
161
PACKET
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Global Configuration Mode
162
SHOW PACKET
CHAPTER 4 SYSTEM FEATURES
Examples
iS5Comm(config)# packet receive index 0 port 223
iS5Comm(config)# packet send index 1 port 5
iS5Comm(config)# packet send index 1 value
Enter Value: 4
show packet
show packet {receive [index <integer (0-4)>] | send [index <integer (0-4)>]}
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show packet receive index 1
Packet Analyzer
iS5Comm# show packet send
163
ALIAS
CHAPTER 4 SYSTEM FEATURES
Index : 1
Value of the Pkt :
Ports to send Pkt :
No of Pkts to send : 1
Time Interval : 1
4.90. alias
To configure the alias name for the interface, use the command alias in Interface Configuration Mode.
alias
alias string <63>
Parameters
Mode
Interface Configuration Mode
Examples
iS5Comm (config-if)# alias interface1
4.91. port-security-state
To configure the port security state of the interface, use the command port-security-state in Interface
Configuration Mode. The interface port security state specifies whether the port is connected to trusted
hosts or not.
port-security-state
port-security-state {trusted | untrusted}
164
DEFAULT-VALUE SAVE
CHAPTER 4 SYSTEM FEATURES
Parameters
trusted Enter to set a port security state as trusted.This specifies that packets
coming on these ports will be trusted.
Enter to set a port security state as untrusted.
untrusted
Mode
Interface Configuration Mode
Default
trusted
Examples
iS5Comm (config-if)# port-security-state trusted
default-value save
default-value save {enable | disable }
165
SET MIRRORING
CHAPTER 4 SYSTEM FEATURES
Parameters
trusted Enter to enable the default value save option.This specifies that MSR stores
default values also when Incremental save is enabled.
Enter to disable the default value save option.This specifies MSR does not
untrusted store default values when Incremental save is enabled.
Mode
Global Configuration Mode
Default
disable
Examples
iS5Comm(config)# default-value save enable
set mirroring
set mirroring {enable | disable}
166
DEFAULT EXEC-TIMEOUT
CHAPTER 4 SYSTEM FEATURES
Parameters
enable Enter to enable mirroring in the system. When set as enabled all
mirroring configurations present will be programmed in hardware.
disable Enter to disable mirroring in the system and remove all configuration
from the hardware.
Mode
Global Configuration Mode
Examples
iS5Comm(config)# set mirroring enable
default exec-timeout
default exec-timeout <integer (1-18000)>
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# default exec-timeout 5
167
PORT
CHAPTER 4 SYSTEM FEATURES
4.95. port
To configure port and CVLAN id to AC interface, use the command port in Interface Configuration Mode.
port
port {gigabitethernet <interface-id> | Extreme-Ethernet <interface-id>] |
fastethernet <interface-id> | port-channel <interface-id>} | vlan <integer
(1-65535)>
Parameters
Mode
AC Interface Configuration Mode
Examples
iS5Comm (config-if)# port 1 gi 0/1
iS5Comm (config-if)# port gigabitethernet 0/1
168
WEB-SESSION TIMEOUT
CHAPTER 4 SYSTEM FEATURES
web-session timeout
web-session timeout <integer (30-1800)>
Parameters
Mode
Global Configuration Mode
Default Value
300 seconds
Examples
iS5Comm(config)# web-session timeout 1800
169
SHOW WEB-SESSION TIMEOUT
CHAPTER 4 SYSTEM FEATURES
Mode
Global Configuration Mode
Examples
iS5Comm(config)# clear http server statistics
Mode
Privileged EXEC Mode
Examples
iS5Comm# show web-session timeout
170
CLEAR PROTOCOL COUNTERS
CHAPTER 4 SYSTEM FEATURES
Mode
Privileged EXEC Mode
Default
configRestoreDefault
Examples
iS5Comm# show config-restore status
SWITCH CONFIGURATION RESTORE STATUS
---------------------------------
Config Restore Status : default configuration-restore
171
DUMP CORE-FILE
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm (config)# clear protocol counters
dump core-file
Mode
Global Configuration Mode
Examples
iS5Comm (config)# dump core-file flash:/home/twg
172
DUMP
CHAPTER 4 SYSTEM FEATURES
4.102. dump
To display memory content from the given memory location, use the command dump in Privileged EXEC
Mode.
dump
dump {mem <integer(1-0xffffffff)> [len <integer(1-256)>] | que name
[<string(4)>] | sem name [<string(4)>] | task name [<string(4)>]}
Parameters
Mode
Privileged EXEC Mode
173
DEBUG ISS
CHAPTER 4 SYSTEM FEATURES
Examples
iS5Comm # dump mem 0x0ae07880 len 8
0x7d 0x00 0x68 0xdf 0x4d 0x0a
dump sem name
Name Num Tasks
Blocked
MEMU 0
BUFS 0
000m 0
001m 0
002m 0
TMMU 0
IMSM 0
001r 0
002r 0
SNDB 0
TRIE 0
003m 0
004m 0
005m 0
tris 0
006m 0
007m 0
008m 0
TRRP 0
TRLP 0 & the list continues
debug iss
debug iss {enable | disable} [init-shut] [management-trc] [data-path-trc]
[cntrl-plane-trc] [dump-trc] [os-resource-trc] [all-fail]
174
SHOW NVRAM
CHAPTER 4 SYSTEM FEATURES
no debug iss
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# debug iss enable init-shut
175
SHOW NVRAM
CHAPTER 4 SYSTEM FEATURES
show nvram
Mode
Privileged EXEC Mode
Examples
iS5Comm# show nvram
Default IP Address : 192.168.10.1
Default Subnet Mask : 255.255.255.0
Default IP Address Config Mode : Manual
Default IP Address Allocation Protocol : DHCP
Switch Base MAC Address : e8:e8:75:90:33:82
Switch Secondary MAC Address : e8:e8:75:90:33:81
Default Interface Name : Gi0/1
Default RM Interface Name : NONE
Config Restore Option : No restore
Config Save Option : No save
Auto Save : Disable
Incremental Save : Disable
Roll Back : Enable
Config Save IP Address : 0.0.0.0
Config Save Filename : iss.conf
Config Restore Filename : iss.conf
PIM Mode : Sparse Mode
IGS Forwarding Mode : MAC based
Cli Serial Console : Yes
SNMP EngineID : 80.00.08.1c.04.46.53
SNMP Engine Boots : 28
Default VLAN Identifier : 1
Stack PortCount : 0
ColdStandby : Disable
Store Default Value : Disable
Hitless Restart Flag : Disable
iBiome Software Version : 1.15.12A01
UBoot Software Version : U-Boot 2016.09 ver 1.30
Switch Name : my_name
Prompt Name : my_prompt
Banner Name :
RM Heart Beat Mode : Internal
176
DEBUG NP MODULE
CHAPTER 4 SYSTEM FEATURES
debug np module
debug np module {see list of available parameters} severity {<integer (1-8)>
| alerts | critical | debugging | emergencies | errors | informational |
notification | warnings
no debug np module
no debug np module {see list of available parameters} severity {<integer
(1-8)> | alerts | critical | debugging | emergencies | errors | informa-
tional | notification | warnings
177
DEBUG NP MODULE
CHAPTER 4 SYSTEM FEATURES
Parameters
The list of parameters are as follows:
• acl ACL related NP programming
• bcmx BCMX related NP programming
• bfd BFD related NP programming
• brg BRG related NP programming
• cfa CFA related NP programming
• cpss CPSS related NP programming
• diffserv DIFFSERV related NP programming
• dsmon DSMON related NP programming
• ecfm ECFM related NP programming
• elps ELPS related NP programming
• eoam EOAM related NP programming
• erps ERPS related NP programming
• ether ETHER related NP programming
• fmn FMN related NP programming
• igmp IGMP related NP programming
• p6 IPv6 related NP programming
• ipmc IPMC related NP programming
• iss ISS related NP programming
• la LA related NP programming
• lion LION related NP programming
• mau MAU related NP programming
• mbs MBS related NP programming
• mld MLD related NP programming
• mlds MLDS related NP programming
• mpls MPLS related NP programming
• mrp MRP related NP programming
• mstp MSTP related NP programming
• np NP related NP programming
• ofc OFC related NP programming
• pbb PBB related NP programming
• pnac PNAC related NP programming
• poe POE related NP programming
• ppp PPP related NP programming
• ptp PTP related NP programming
• pvrst PVRST related NP programming
178
DEBUG NP MODULE
CHAPTER 4 SYSTEM FEATURES
see list of available Integer Select a parameter from the list shown above.
parameters
<integer(1-8)> Integer Enter a number to determine severity level.
alerts Enter to set the severity to alerts or immediate action needed.
critical Enter to set the severity to critical or critical conditions.
debugging Enter to set the severity to debugging or debugging messages.
emergencies Enter to set the severity to emergencies or system is unusable.
errors Enter to set the severity to errors or errors conditions.
informational Enter to set the severity toinformational or information
messages.
notification Enter to set the severity to notification or normal but
significant messages.
warnings Enter to set the severity to warnings or warning conditions.
Mode
Privileged EXEC Mode
Examples
iS5Comm # debug np module red severity informational
179
DESCRIPTION
CHAPTER 4 SYSTEM FEATURES
4.106. description
To set the description of an interface, use the command description in Interface Configuration Mode.
description
description <description of this interface>
Parameters
<description of Enter a string for description of the interface. This value is a string with a
this interface> maximum size of 127.
Mode
Interface Configuration Mode
Examples
iS5Comm (config-if)# description Interface1
iS5Comm# show interfaces description
Interface Status Protocol Description
--------- ------ -------- -----------
Gi0/1 up down interface1
Gi0/2 up down
4.107. counters
To enable or disable the statistics collection status for the interface, use the command counters in Inter-
face Configuration Mode.
counters
counters {enable | disable}
180
SHOW L3VLAN INTERFACES COUNTERS
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Interface Configuration Mode (Vlan)
Examples
iS5Comm(config)# interface vlan 1
iS5Comm(config-if)# counters enable
181
SET ENTITY PHYSICAL-INDEX
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm # show l3vlan interfaces counters vlan 1 switch default
Port InPkt InOctets
---- ----- --------
vlan1 1 229
182
SET ENTITY PHYSICAL-INDEX
CHAPTER 4 SYSTEM FEATURES
Entity MIB is a standardized way of representing a single agent that supports multiple instances of one
MIB. With the entity MIB support in iss, all instances of the MIBs registered with agent are identifiable,
so that the NMS (Network Management System) can easily communicate with the particular instance /
logical entity. MIB also provides the complete hierarchal hardware component view to the user.
The single agent present in each of these cases implies a relationship binds these entities. Effectively,
there is some "overall" physical entity which houses the sum of the things managed by that one
agent,i.e., there are multiple "logical" entities within a single physical entity.
A "physical entity" or "physical component" represents an identifiable physical resource within a
managed system. Zero or more logical entities may utilize a physical resource at any given time. Deter-
mining which physical components are represented by an agent in the EntPhysicalTable is an implemen-
tation-specific matter. Typically, physical resources (e.g., communications ports, backplanes, power
supplies, the overall chassis) that can be managed via functions associated with one or more logical enti-
ties, are included in the MIB. Reference, RFC 4133.
The physical index is an arbitrary value that uniquely identifies the physical entity which can be small
positive integer.
183
SET ENTITY PHYSICAL-INDEX
CHAPTER 4 SYSTEM FEATURES
Parameters
<integer Enter to specify the Index of the physical entity. This value ranges
(1-2147483647)> from 1 to 2147483647
asset-id Enter to specify the asset tracking identifier for the physical
entity.
<SnmpAdminString Integer Enter a value for asset tracking identifier. This value is a string of
(1-32)> size varying between 1 and 32 characters. Asset tracking
identifier is not needed for the physical entities (such as repeater
ports within a repeater module) that are not considered as a field
replaceable unit by the vendor. A zero-length string is returned
for these entities.
serial-number Enter to specify the vendor-specific serial number string for the
physical entity.
<SnmpAdminString Integer Enter a value for serial-number identifier. This value is a string of
(1-32)> size varying between 1 and 32 characters. Serial number string is
not needed for the physical entities (such as repeater ports
within a repeater module) that are not considered as a field
replaceable unit by the vendor. A zero-length string is returned
for these entities
alias-name Enter to specify the alias name for the physical entity.
<SnmpAdminString Integer Enter a value for alias-name identifier. This value provides a
(1-32)> non-volatile handle for the entity and is a string of size varying
between 1 and 32 characters.
uris Enter to specify the additional identification information
(URI-Uniform Resource Indicator) about the physical entity.
<OCTET-STRING Integer Enter a value for URI. This value ranges from 1 to 255
(1-255)>
Mode
Global Configuration Mode
Default
• assetId - Zero-length string, on initial instantiation of the physical entity.
184
SHOW ENTITY
CHAPTER 4 SYSTEM FEATURES
• Zero-length string, on initial instantiation of the physical entity, if a serial number is unknown or
non-existent. Correct vendor-assigned serial number, on initial instantiation of the physical entity,
if the serial number is available to the SNMP agent
• alias-name - Zero-length string, on initial instantiation of the physical entity. The SNMP agent may
also set the value to a locally unique default value.
Prerequisites
• If write access is implemented for an instance of asset ID and a value is written into the instance,
SNMP agent should retain the value as long as the entity associated with the instance remains
instantiated. This instantiation includes the instantiation across all re-initialization / reboot of the
NMS. and instantiation resulting in a change of the physical entity’s index value.
• If write access is implemented for an instance of the serial number string and a value is written into
the instance, SNMP agent should retain the value as long as the entity associated with the instance
remains instantiated. This instantiation includes the instantiation across all re-initialization / reboot
of the NMS. and instantiation resulting in a change of the physical entity’s index value.
• If the agents cannot provide non-volatile storage for the serial number string, then the agents are
not required to implement write access for the the serial number string object.
• Implementations that can correctly identify the serial numbers of all installed physical entities are
not required to provide write access to the serial number string object
• If write access is implemented for an instance of the alias name and a value is written into the
instance, SNMP agent should retain the value as long as the entity associated with the instance
remains instantiated. This instantiation includes the instantiation across all re-initialization / reboot
of the NMS. and instantiation resulting in a change of the physical entity’s index value.
Examples
iS5Comm (config)# set entity physical-index 2222222 asset-id 8 serial-number 7 alias-name GJG uris yg
show entity
show entity {physical [index <integer (1-2147483647)>] | logical [index
<integer (1-2147483647)>] | lp-mapping | alias-mapping [index <integer
(1-2147483647)>] phy-containment [index <integer (1-2147483647)>]
185
SHOW ENTITY
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show entity physical index 1
186
SHOW ENTITY
CHAPTER 4 SYSTEM FEATURES
Physical Index: 1
Physical Descr: Network Element
Physical VendorType:
Physical ContainedIn: 0
Physical Class: Chassis
Physical ParentRelPos: 0
Physical Name: iS5Com
Physical HardwareRev: 1531-0001-B04
Physical FirmwareRev: 6.7.2
Physical Serial Num: not available
Physical MfgName: iS5Com
Physical ModelName: not available
Physical Alias: DummyName
Physical AssetID: DummyId
Physical MfgDate: 2009-8-6,13:30:30.1
Physical Uris: not available
Physical FRU Status: True
iS5Comm# show entity logical index 1
Logical Index: 1
Logical Description: iS5Com
Logical Description: iS5Com
Logical Type:
Logical Community: default
Logical Transport Address: 192.168.10.1:161
Logical Transport Domain:
Logical Context Engine Id: 80:00:08:1c:04:46:53
Logical Context Name: default
iS5Comm# show entity lp-mapping
Logical Entity Mapped Physical Entity
-------------- ----------------------
1 () 10 (Port)
2 () 12 (Port)
iS5Comm# show entity alias-mapping
Physical Entity Logical Entity Mapped External Identifier
--------------- -------------- --------------------------
10 (Port) all
1 (Port) all
12 (Port) all
13 (Port) all
14 (Port) all
187
GRATUITOUS ARP
CHAPTER 4 SYSTEM FEATURES
15 (Port) all
iS5Comm# show entity phy-containment
Containment Relationship
-------------------------
Physical Entity : 1 (Chassis)
Member Physical Entities : 2 (CPU), 3 (Power Supply), 4 (Fan)
5 (Fan), 6 (Fan), 7 (Fan)
8 (Fan), 9 (Module)
Physical Entity : 9 (Module)
Member Physical Entities : 10 (Port), 11 (Port), 12 (Port)
13 (Port), 14 (Port), 15 (Port)
16 (Port), 17 (Port), 18 (Port)
19 (Port), 20 (Port), 21 (Port)
22 (Port), 23 (Port), 24 (Port)
25 (Port), 26 (Port), 27 (Port)
28 (Port), 29 (Port), 30 (Port)
31 (Port), 32 (Port), 33 (Port)
34 (Port), 35 (Port), 36 (Port)
37 (Port)------------------------------------------------------------
ip arp gratuitous
no parameters are used for this command.
Parameters
None
Mode
Privileged EXEC Mode
188
SHOW GRAT-ARP
CHAPTER 4 SYSTEM FEATURES
show grat-arp
show grat-arp
[<interface-type> <interface-id>]
189
SHOW GRAT-ARP
CHAPTER 4 SYSTEM FEATURES
Parameters
Mode
Privileged EXEC Mode
190
SHOW OPENSOURCE-PACKAGES
CHAPTER 4 SYSTEM FEATURES
show opensource-packages
show opensource-packages
Mode
Privileged EXEC Mode
Examples
iS5Comm# show opensource-packages
Name | Version
---------------| ----------
OpenSSL | 3.0.12
LibSSH | 0.9.6-2
LibCurl | 8.5.0-DEV
Rsyslog | 8.2206.0
Libcrypto | 1.9.4-beta25
Mode
Privileged EXEC Mode
191
SHOW SYSTEM INFORMATION
CHAPTER 4 SYSTEM FEATURES
Examples
iS5Comm# show firmware information
Active Partition Firmware Rev : 1.15.12.1008-2023.03.02_is5 [iMX]
Active Partition Build Date/Time : 2023.03.02-12:09:38
Active Partition : secondary
Backup Partition Firmware Rev : 1.13.05.651-2022.05.16_is5 [iMX]
Backup Partition Build Date/Time : 1.13.05.651-2022.05.16_is5show
Mode
Privileged EXEC Mode
Examples
iS5Comm# show system information
The product type is shown appended in [ ] brackets next to the firmware revision. The product definitions
are iMX - for iMX950/iMX350, iMR- for iMR920/iMR320, and iMR350 - for iMR350.
Firmware Revision: : 1.41
Factory Software Version: : 1.18.05 [iMX]
Model Name :
iMX950-HV-HV-XX-XX-8GSFP-8GSFP-4TGSFP
Serial Number : MX354818-00005
Factory Name : iMX950
Factory Version : 1531-0001-B05
Factory Sub revision : 001
Factory S/N : 1531-0001-B05-27-20-0191
Factory Chassis Part Number : N/A
Line Module 1 Name : iRM-8GSFP
192
SHOW ISS-HEALTH STATUS
CHAPTER 4 SYSTEM FEATURES
193
SHOW ENV ALL
CHAPTER 4 SYSTEM FEATURES
Mode
Privileged EXEC Mode
Examples
iS5Comm# show iss-health status
SWITCH HEALTH HISTORY INFO
==========================
ISS Status : Up & Recoverable Runtime Event
Error Status : AU storm detected on EX0/1, rate limit applied
Mode
Privileged EXEC Mode
Examples
If a storm is detected, the output of this CLI show command shows rate limit activated as below:
iS5Comm# show env all
CPU Threshold : 80%
Current CPU Usage : 4%
RAM Threshold : 80%
Current RAM Usage : 40%
Flash App Threshold : 80%
Flash dedicated for App : 275%
Dedicated Flash Usage by App : 19%
Flash Size : 8GByte
Power Supply 1 Presence : Unknown
Power Supply 2 Presence : Unknown
194
SHOW ALARM STATUS
CHAPTER 4 SYSTEM FEATURES
Mode
Privileged EXEC Mode
Examples
iS5Comm# show alarm status
Relay State: Off
195
SET CLI PAGINATION ON
CHAPTER 4 SYSTEM FEATURES
Mode
Global Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm(config) set cli pagination on
iS5Comm(config)# exit
iS5Comm# show nvram
Default IP Address : 192.168.10.1
Default Subnet Mask : 255.255.255.0
Default IP Address Config Mode : Manual
Default IP Address Allocation Protocol : DHCP
Switch Base MAC Address : e8:e8:75:90:33:82
Switch Secondary MAC Address : e8:e8:75:90:33:81
Default Interface Name : Gi0/1
Default RM Interface Name : NONE
Config Restore Option : No restore
Config Save Option : No save
Auto Save : Disable
Incremental Save : Disable
Roll Back : Enable
Config Save IP Address : 0.0.0.0
Config Save Filename : iss.conf
Config Restore Filename : iss.conf
PIM Mode : Sparse Mode
IGS Forwarding Mode : MAC based
Cli Serial Console : Yes
SNMP EngineID : 80.00.08.1c.04.46.53
SNMP Engine Boots : 28
Default VLAN Identifier : 1
Stack PortCount : 0
196
SET CLI PAGINATION ON
CHAPTER 4 SYSTEM FEATURES
ColdStandby : Disable
Store Default Value : Disable
Hitless Restart Flag : Disable
iBiome Software Version : 1.15.12A01
UBoot Software Version : U-Boot 2016.09 ver 1.30
Switch Name : my_name
Prompt Name : my_prompt
Banner Name :
RM Heart Beat Mode : Internal
RM Redundancy Type : Hot
RM Data Plane Type : Shared
RM Type : OOB
TimeStamp Method : TransHardware
Restore Flag : Enabled
Dynamic Port Count : 28
FIPS operation mode : Disabled
Restore Option : Disabled
Bridge Mode : Customer Bridge
Debugging Log File Location : /mnt/log/
Management Port : Disabled
Automatic Port Create Flag : Enabled
Restore Type : MSR
CLI Pagination : On
IMG_DUMP_PATH :
NOTE: The CLI pagination behavior is changed to be with global settings rather than session-specific.
Pagination settings are saved as part of the NVRAM settings (see CLI Pagination as shown above) and
remains persistent across reboot. After changing the settings, write startup config is not required.
197
RADIUS-SERVER HOST
CHAPTER 5 RADIUS
RADIUS
5. RADIUS
RADIUS (Remote Authentication Dial-In User Service), is widely used in network environments, and is a
client/server protocol and software that enables remote access servers to communicate with a central
server to authenticate dial-in users and authorize their access to the requested system or service. It is
commonly used for embedded network devices such as routers, modem servers, switches and so on.
RADIUS is currently the de-facto standard for remote authentication. It is very prevalent in both new and
legacy systems. It is used for several reasons:
radius-server host
radius-server host {<ipv4-address> | <ipv6-address> | <dns_host_name (255)>}
[auth-port <integer(1-65535)>] [acct-port <integer(1-65535)>] [timeout
<integer(1-120)>] [retransmit <integer(1-254)>] [key <secret-key-string
(46)>] [primary]
no radius-server host
no radius-server host {<ipv4-address> | <ipv6-address> | <dns_host_name
(255)>} [primary]
198
RADIUS-SERVER HOST
CHAPTER 5 RADIUS
Parameters
<ipv4-address> A.B.C.D Enter to configure the IPv4 address of the RADIUS server host.
<ipv6-address> AAAA:: Enter to configure the IPv6 address of the RADIUS server host
BBBB
<dns_host_name Enter to configure the DNS (Domain Name System) name of
(255)> the RADIUS server host. This value is a string of maximum size
255.
auth-port Enter to configures a specific UDP (User Datagram Protocol)
destination port on this RADIUS server to be used solely for
the authentication requests.
<integer(1-65535)> Integer Enter a value for UDP destination port to be used for
authentication requests. This value ranges from 1 to 65535.
acct-port Enter to configure a specific UDP destination port on this
RADIUS to be solely used for accounting requests. This value
ranges from 1 to 65535.
<integer(1-65535)> Integer Enter a value for UDP destination port to be used for
accounting requests. This value ranges from 1 to 65535
timeout Enter to configure the time period in seconds for which a
client waits for a response from the server before
re-transmitting the request.
<integer(1-120)> Integer Enter a value for time before the request is retransmitting.
This value ranges from 1 to 120 seconds.
retransmit Enter to configure the maximum number of attempts to be
tried by a client to get response from the server for a request.
<integer(1-254)> Integer Enter a value for the number of retransmitting attempts. This
value ranges from 1 to 254.
key Enter to configure the per-server encryption key which
specifies the authentication and encryption key for all RADIUS
communications between the authenticator and the RADIUS
server.
<secret-key-string Integer Enter a secret key string. This value is a string of maximum size
(46)> 46. If the key value is not configured, then the default key will
be used.
199
SET RADIUS
CHAPTER 5 RADIUS
primary Enter to set the RADIUS server as the primary server. Only one
server can be configured as the primary server, any existing
primary server will be replaced, when the command is
executed with this option.
Mode
Global Configuration Mode
Default
• timeout - 10 seconds
• retransmit - 3 attempts
• auth-port - 1812
• acct-port - 1813
• key - RADIUS
Prerequisites
• The maximum number of radius servers that can be configured is 5.
Examples
iS5Comm (config)# radius-server host 10.0.0.1 key pass
iS5Comm (config)# radius-server host 10.0.0.100
Radius will be configured with default secret key
set radius
set radius {enable | disable}
200
SHOW RADIUS
CHAPTER 5 RADIUS
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# set radius enable
show radius
show radius {server [<ipv4-address> | <ipv6-address> | <dns_host_name
(255)>]} | module [ status ] | statistics}
201
DEBUG RADIUS
CHAPTER 5 RADIUS
Parameters
Mode
Privileged EXEC Mode
Prerequisites
Debugging is disabled
Examples
iS5Comm # debug radius all
iS5Comm # show radius module status
202
DEBUG RADIUS
CHAPTER 5 RADIUS
debug radius
debug radius {all | errors | events | packets | responses | timers}
no debug radius
Parameters
Mode
Privileged EXEC Mode
Default
Debugging is disabled
Examples
iS5Comm # debug radius all
203
TACACS-SERVER
CHAPTER 6 TACACS
TACACS
6. TACACS
TACACS
(Terminal Access Controller Access Control System), widely used in network environments, is a
client/server protocol that enables remote access servers to communicate with a central server to
authenticate dial-in users and authorize their access to the requested system or service. It is commonly
used for providing NAS (Network Access Security). NAS ensures secure access from remotely connected
users. TACACS implements the TACACS Client and provides the AAA (Authentication, Authorization and
Accounting) functionalities.
TACACS is used for several reasons:
• Facilitates centralized user administration
• Uses TCP for transport to ensure reliable delivery
• Supports inbound authentication, outbound authentication and change password request for the
Authentication service
• Provides some level of protection against an active attacker
6.1. tacacs-server
To configure the TACACS client with the parameters host, timeout, key, retransmit, to set the retransmis-
sion related configuration with its retransmit value, and to configure the active server address and
selects an active server from the list of servers available in the TACACS server table, use the command
tacacs-server in Global Configuration Mode. The no form of the command deletes the server entry from
the TACACS server table, resets the retransmit value to its default value, and disables the configured
client active server.
tacacs-server
radius-server {host {<ipv4-address> | <ipv6-address> | <dns_host_name (255)>}
[key <secret-key-string (64)] [port <integer(1-65535)>] [single-connection]
[timeout <integer(1-255)>] | retransmit <retries (1-5)> | use-server address
{<ipv4-address> | <ipv6-address> | <dns_host_name (255)>}
204
TACACS-SERVER
CHAPTER 6 TACACS
no radius-server host
no radius-server host {<ipv4-address> | <ipv6-address> | <dns_host_name
(255)>} | retransmit | use-server
205
TACACS-SERVER
CHAPTER 6 TACACS
Parameters
host A.B.C.D Enter to configure the IPv4 address of the TACACS server host.
<ipv4-address> A.B.C.D Enter to configure the IPv4 address of the TACACS server host.
<ipv6-address> AAAA:: Enter to configure the IPv6 address of the TACACS server host
BBBB
<dns_host_name Enter to configure the DNS (Domain Name System) name of
(255)> the TACACS server host. This value is a string of maximum size
255.
key Enter to configure the authentication and encryption key for
all TACACS communications between the authenticator and
the TACACS server.
<secret-key-string Integer Enter a encryption key string. This value is a string of
(64)> maximum size 64. If the key value is not configured, then the
default key will be used.
port Enter to configure the TCP port number in which the multiple
sessions are established.
<integer(1-65535)> Integer Enter a value for the TCP port number. This value ranges from
1 to 120 seconds.
single-connection Enter to configure the time period in seconds for which a
client waits for a response from the server before
re-transmitting the request.
timeout Enter to configure the time period (in seconds) for which a
client waits for a response from the server before closing the
TCP connection. The link between the server and the client
gets disconnected, if the specified time is exceeded.
<integer(1-255)> Integer Enter a value for time period for which a client waits for a
response from the server before closing the TCP connection.
This value ranges from 1 to 255 seconds.
retransmit Enter to configure the retransmission related configuration
and retransmit value. It is the number of times the client
searches the active server from the list of servers maintained
in the TACACS client, when active server is not configured.
<retries (1-5)> Integer Enter a number for retransmit retries.
206
TACACS-SERVER
CHAPTER 6 TACACS
Mode
Global Configuration Mode
Default
• port - 49
• timeout - 5 seconds
• retries - 2
Prerequisites
• The maximum number of TACACS servers that can be configured is 5.
• The specified server should be any one of the entries from the TACACS server table.
Examples
iS5Comm (config)# tacacs-server host 12.0.0.100
TACACS+ server configured with default secret key !
iS5Comm(config)# tacacs-server host 2005::33
TACACS+ server configured with default secret key !
iS5Comm(config)# tacacs-server retransmit 3
iS5Comm (config)# tacacs use-server address 12.0.0.100
207
SHOW TACACS
CHAPTER 6 TACACS
show tacacs
Mode
Privileged EXEC Mode
Prerequisites
This command displays the information only for the servers configured in the TACACS server table.
Examples
iS5Comm # show tacacs
Server : 1
Server address : 12.0.0.100
Address Type : IPV4
Single Connection : no
TCP port : 49
Timeout : 5
Secret Key :
Server : 2
Server address : abc.google.com
Address Type : DNS
Single Connection : yes
TCP port : 20
Timeout : 30
Secret Key :
Active Server address: abc.google.com
Authen. Starts sent : 0
Authen. Continues sent : 0
Authen. Enables sent : 0
Authen. Aborts sent : 0
208
DEBUG TACACS
CHAPTER 6 TACACS
debug tacacs
debug tacacs {all | info | errors | dumptx | dumprx}
209
DEBUG TACACS
CHAPTER 6 TACACS
no debug radius
Parameters
all Enter to specify generating of debug messages for all possible traces (Dumptx,
Dumprx, Error, Info).
info Enter to specify generating of debug statements for server information
messages such as TACACS session timed out, server unreachability, Session ID
exceeded, etc.
errors Enter to specify generating of traces for error debug messages such as failure
caused during packet transmission and reception.
dumptx Enter to specify generating of debug statements for handling traces. This trace
is generated when there is an error condition in transmission of packets.
dumprx Enter to specify generating of debug statements for handling traces. This trace
is generated when there is an error condition in reception of packets.
Mode
Privileged EXEC Mode
Default
Debugging is disabled
Examples
iS5Comm # debug tacacs all
210
SSH
CHAPTER 7 SSH
SSH
7. SSH
SSH
(Secure Shell) is a protocol for secure remote login and other secure network services over an insecure
network. It consists of three major components:
• The Transport Layer Protocol provides server authentication, confidentiality and integrity.
• The User Authentication Protocol authenticates the client-side user to the server. It runs over the
transport layer protocol.
• The Connection Protocol multiplexes the encrypted tunnel into several logical channels. It runs
over the user authentication protocol.
A Secure Shell (SSH) configuration enables a SSH server and client to authorize the negotiation of only
those algorithms that are configured from the allowed list. The client sends a service request once a
secure transport layer connection has been established. A second service request is sent after user
authentication is complete. This allows new protocols to be defined and coexist with these protocols.
7.1. ssh
To enable or disable SSH subsystem or perform SSH server-related configuration, use the command ssh
in Global Configuration Mode.
ssh
ssh {enable | disable | server-address <ip-address> [port
<integer(1-65535)>]}
211
SHOW SSH
CHAPTER 7 SSH
Parameters
enable Enter to enable ssh subsystem. When set to “enable”, the switch
is accessible through ssh from remote location
disable Enter to disable ssh subsystem. Setting ssh to disable, removes
the ssh access to the switch.
server-address Enter to configure the SSH server listening IP address.
<ip-address> Enter the SSH server listening IP address.
port Enter to configure the primary port number on which SSH
server listens.
Integer Enter a number for the primary port number on which SSH
<integer(1-65535) server listens
>
Mode
Global Configuration Mode
Default
enable
Port 22
Examples
iS5Comm(config)# ssh enable
iS5Comm(config)# ssh server-address 12.0.0.0 port 1
212
SHOW SSH-CONFIGURATIONS
CHAPTER 7 SSH
show ssh
Mode
Privileged EXEC Mode
Examples
iS5Comm # show ssh-configurations
SSH Listening IP 0.0.0.0
Port 22
show ssh-configurations
Mode
Privileged EXEC Mode
Examples
iS5Comm # show ssh-configurations
SSH Listening IP 0.0.0.0
Port 22
213
IP SSH
CHAPTER 7 SSH
show ip ssh
Mode
Privileged EXEC Mode
Examples
iS5Comm # show ip ssh
Status : SSH is Enabled
Version : Both
Cipher Algorithm : AES128-CBC
Authentication : HMAC-SHA1
Trace Level : None
Max Byte Allowed :32768
7.5. ip ssh
To configure the various parameters associated with SSH server including secure socket layer ( SSL)
encryption ciphers, use the command ip ssh in Global Configuration Mode. The standard port used by
SSH is 22. SSH server allows remote and secure configuration of the switch. The SSH server provides
protocol version exchange, data integrity, cipher and key exchange algorithms negotiation between two
communicating entities, key exchange mechanism, encryption and server authentication. The no form of
the command resets the various parameters associated with the SSH server. Version 2 of SSH is
supported.
ip ssh
ip ssh {cipher ([ALL] [DHE_RSA_AES256_SHA256] [ECDH_ECDSA_AES128_SHA256]
[ECDH_RSA_AES128_SHA256] [ECDH_RSA_AES256_SHA256] [ECDH_RSA_CHACHA20_PO-
LY1305])}
no ip ssh
no ip ssh {cipher ([ALL] [DHE_RSA_AES256_SHA256] [ECDH_ECDSA_AES128_SHA256]
[ECDH_RSA_AES128_SHA256] [ECDH_RSA_AES256_SHA256] [ECDH_RSA_CHACHA20_PO-
LY1305])}
214
IP SSH
CHAPTER 7 SSH
Parameters
Mode
Global Configuration Mode
Default
• All
Examples
iS5Comm (config)# ip ssh cipher ECDH_RSA_CHACHA20_POLY1305 DHE_RSA_AES256_SHA256
215
IP SSH PUBKEY-CHAIN
CHAPTER 7 SSH
ip ssh pubkey-chain
no ip ssh pubkey-chain
Mode
Privileged EXEC Mode
Examples
iS5Comm # ip ssh pubkey-chain
debug ssh
debug ssh {all | buffer | ctrl | data | dump | mgmt | resource | server |
shut}
216
DEBUG SSH
CHAPTER 7 SSH
no debug ssh
Parameters
all Enter to specify generating of debug messages for all possible traces.
buffer Enter to specify generating of debug messages for allocation and freeing of
buffer.
ctrl Enter to specify generating of traces for Control Plane functionality traces.
data Enter to specify generating of debug statements for data path.
dump Enter to specify generating of debug statements for packets handling traces.
This trace is generated when there is an error condition in transmission or
reception of packets.
mgmt Enter to specify generating debug statements for management plane
functionality traces.
resource Enter to specify generating debug statements for traces for allocation and
freeing of all resource except the buffers.
server Enter to specify generating of debug statements while creating/ opening/
closing SSH server sockets and any failures to wake up SSH server sockets. Also
generates debug statements during enabling /disabling of SSH server.
shut Enter to specify generating of debug statements for shutdown traces. This
trace is generated on successful shutting down of SSH related module and
memory.
Mode
Privileged EXEC Mode
Default
Debugging is disabled
Examples
iS5Comm # debug ssh all
217
SHOW SSL SERVER-CERT
CHAPTER 8 SSL
SSL
8. SSL
SSL (Secure Sockets Layer) has been developed for transmitting private documents through Internet. It
works by using a private key for encrypting data that is transferred over the SSL connection. By conven-
tion, URLs that require an SSL connection start with https:
The SSL protocol is designed to provide privacy between two communicating applications (a client and a
server) and authenticate the server, and optionally the client. SSL requires a reliable transport protocol
(e.g., TCP) for data transmission and reception.
The advantage of the SSL protocol is that it is application protocol independent. A higher level application
protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the SSL protocol transparently.
The SSL Protocol can negotiate an encryption algorithm and session key as well as authenticate a server
before the application protocol transmits or receives its first byte of data. All of the application protocol
data is transmitted encrypted, thus ensuring privacy.
Mode
Privileged EXEC Mode
Examples
iS5Comm # show ssl server-cert
218
SHOW IP HTTP
CHAPTER 8 SSL
219
IP HTTP
CHAPTER 8 SSL
Mode
Privileged EXEC Mode
Examples
iS5Comm # show ip http secure server status
HTTP secure server status : Enabled
HTTP secure server port : 443
Minimum SSL Version : TLSv1.2
HTTP secure server ciphersuite : TLS_AES_128_GCM_SHA256
8.3. ip http
To set the HTTP port, use the command ip http in Global Configuration Mode. The no form of the
command resets the HTTP port to its default value.
ip http
ip http {port <port-number (1-65535)> | secure (ciphersuite {TLS_ECDHE_R-
SA_WITH_AES_256_GCM_SHA384 | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 |
TLS_AES_256_GCM_SHA384 | TLS_CHACHA20_POLY1305_SHA256 | TLS_AES_128_GCM_-
SHA256 } | port (1-65535) | minimum version {TLSv1_2 | TLSv1_3} | crypto key
RSA2048 {default | current | string values } server)}
no ip http
no ip http port | secure
220
IP HTTP
CHAPTER 8 SSL
Parameters
port Enter to configure HTTP port. his port is used to configure the
router using the Web interface. The available port numbers are
from 1 to 65535
<port-number Integer Enter a port number. The available port numbers are from 1 to
(1-65535)> 65535
NOTE: TACACS user will be given root privilege by default or local
user privilege if the user exists in local database
secure Enter for SSL secure server related configuration. The options are
as follows:
ciphersuite Enter for Cipher-suites list options.
CR Enter to disable SSL server on the device and also to disable
ciphersuites and crypto key configuration. If you want to specify
an encryption algorithm, enter one of the shown below options.
TLS_ECDHE_RSA_W Enter for this encryption algorithm.
ITH_AES_256_GCM
_SHA384
TLS_ECDHE_RSA_W Enter for this encryption algorithm.
ITH_CHACHA20_PO
LY1305_SHA256
TLS_AES_256_GCM Enter for this encryption algorithm.
_SHA384
Enter for this encryption algorithm.
TLS_CHACHA20_PO
LY1305_SHA256
TLS_AES_128_GCM Enter for this encryption algorithm.
_SHA256
minimum version This is used to specify the minimum level of TLS to be used. The
choices are as follows.
TLSv1_2 TLS version 1.2
TLSv1_3 TLS version 1.3
rsa-with-aes-25 Enter for this encryption algorithm.
6-cbc-sha
crypto Enter a name of the created list.
221
IP HTTP
CHAPTER 8 SSL
key
RSA2048 Enter for RSA algorithm.
default This option will use the default RSA 2048 certificate values. A
carriage return is entered after this option.
current Use the current certificate subject name
Certificate Values are A series Up to 2 characters for the country code string
entered of Up to 100 characters for the state/province value
Strings Up to 100 characters for the city/locality value
Up to 100 characters for the organization value
Up to 100 characters for the organizational unit name
Up to 100 characters for the common name
server Enter to enable the SSL server on the device and also to configure
the ciphersuites.
port The port option when used after secure. For example “ip http
secure port” allows the user to specify the port number of the
HTTPS server. It is followed by a port number.
<port-number Integer Value of the port number to be used by the HTTPs server.
(1-65535)>
Mode
Global Configuration Mode
Default
80
Prerequisites
HTTP port number configuration takes effect only when HTTP is disabled and enabled again
Examples
iS5Comm(config)# ip http port 90
iS5Comm(config)# ip http secure ciphersuite
For a new certificate to be used, the HTTP service must be disabled and then re-enabled.
222
CRYPTO PKI KEYGEN
CHAPTER 8 SSL
223
CRYPTO PKI KEYGEN
CHAPTER 8 SSL
Parameters
name string The prefix of the file name. 2 files are created prefixKey.pem and
prefixCert.pem.
RSA2048 or Size of the key 2048 or 4096.
RSA4096
default Certificate will be created with following default values:
• COUNTRY "CA"
• STATE "ONTARIO"
• LOCALITY "MISSISSAUGA"
• ORGANIZATION "iS5 COMMUNICATION INC"
• ORGANIZATIONAL_UNIT "ENGINEERING TEAM"
• COMMON_NAME “https://www.is5com.com”
<country(2)> Country Code Attribute
<state(100)> State Attribute
<locality(100)> Locality Attribute
<organizational-u Organizational Unit Attribute
nit(100)>
<common-name( Common Name Attribute
100)>
current Use the Certificate attributes of the current certificate
Mode
Global Config Mode
Examples
iS5Comm(config)# crypto pki keygen test1 RSA2048 default
Related Commands
show crypto pki
Example:
iS5Comm# show crypto pki test1
224
CRYPTO PKI CSRGEN
CHAPTER 8 SSL
Parameters
file-prefix string The filename to be signed. If the key is XYZ.pem, enter XYZ.
Mode
Global Config Mode
225
CRYPTO PKI IMPORT
CHAPTER 8 SSL
Examples
226
IP HTTP SECURE CRYPTO KEY
CHAPTER 8 SSL
Parameters
Mode
Global Config Mode
Examples
iS5Comm(config)# crypto pki import cert i1
Enter Cert:
-----BEGIN CERTIFICATE-----
MIIDlTCCAn2gAwIBAgIJAM5w8Azqdww5MA0GCSqGSIb3DQEBCwUAMIGJMQswCQYDVQQGEwJDQTEQ
MA4GA1UECAwHT05UQVJJTzEUMBIGA1UEBwwLTUlTU0lTU0FVR0ExHjAcBgNVBAoMFWlTNSBDT01NV
U5JQ0FUSU9OIElOQzEZMBcGA1UECwwQRU5HSU5FRVJJTkcgVEVBTTEXMBUGA1UEAwwOd3d3LmlzN
WNvbS5jb20wHhcNMjEwODA2MTIwNTExWhcNMjQwODA1MTIwNTExWjCBiTELMAkGA1UEBhMCQ0E
xEDAOBgNVBAgMB09OVEFSSU8xFDASBgNVBAcMC01JU1NJU1NBVUdBMR4wHAYDVQQKDBVpUzUgQ0
9NTVVOSUNBVElPTiBJTkMxGTAXBgNVBAsMEEVOR0lORUVSSU5HIFRFQU0xFzAVBgNVBAMMDnd3dy5p
czVjb20uY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxDin2xPyY3v9X2zv974dyGQHg95
psL1jq8aYRB/E4YmnaBMVnqT63cFBdQW3vL3y1NgBg/Pu33bfmBgW8NIlylkI8k3lCG58xsw80B5V0Tzzly5
Do0VY8PlfiiPCg6XfPGIQLLeOPVc7woqK8MYkuEVgoi2HV1I0MK6ybNtZy5A+hRwIFiCpEWn77/Vy4yqRljs
WRqSXIcPqH0mSQNonltw/XwHRn5Rqd65KZSDpe+hnXdxjsq2lF+olqR1+KQyh83fwI916Dcf23dpcYz6DaK
YrJJfIQ2/Uccxa8qfzr3erkUxLQW9hwOWMtbG6ctbWfRSrEWbpx0/H4xZVftMZTQIDAQABMA0GCSqGSIb
3DQEBCwUAA4IBAQBZ6yClyGiJMgO13Iei3J+1HbFuPS9fQHYeUzlYjK5ZNbMf53iHNdptdwrZuqm/hFqjjxN
EzC96okEqncTgtvyiV7e/KEm/TyiA1WPUa/rk/g0aDwbkGR7K5I393SmKCkzfj/eEfa+4IdJxAqMjupSvI9w5n
aRIYWZf+bWzqNPoZnXL899gRGwrZdp5jhKQasDik48FztaZLVU5VDeTO3EfepkwRnwNjs8BHAgwzG39Y9k
/wwUPw16KNRM0/vQVKIJqTZ1wQ3NJ4Tyx+Rr1NxxvgOo7Lh8t3uVbgqr1egZQDgz+skB2Xe8m6qJKj8-
JFGs3Irs9Lq/Ma1rBZ1lTJF2xN
-----END CERTIFICATE-----
227
IP HTTP SECURE CRYPTO KEY
CHAPTER 8 SSL
Parameters
Mode
Global Config Mode
228
NO CRYPTO PKI
CHAPTER 8 SSL
Examples
229
SHOW CRYPTO PKI
CHAPTER 8 SSL
no crypto pki
no crypto pki { file < name > | all }
Parameters
Mode
Global Config Mode
Examples
iS5Comm# show crypto pkiName Typetest1Cert.pem Certificate
iS5Comm# configure terminal
iS5Comm(config)#no crypto pki file test1Cert.pem
iS5Comm(config)# end
iS5Comm# show crypto pkiName Type
iS5Comm#
230
SHOW CRYPTO PKI
CHAPTER 8 SSL
Parameters
Mode
Privileged Exec Mode
Examples
iS5Comm# show crypto pki
231
SHOW CRYPTO MAP
CHAPTER 8 SSL
NOTE: The command also displays the certificate attributes which is not shown above.
232
SHOW CRYPTO MAP
CHAPTER 8 SSL
Parameters
map Enter to display the summary of policy status and tunnel status.
brief Enter to display the status summary of the crypto policies.
Mode
Privileged Exec Mode
Examples
iS5Comm# show crypto pki brief
NOTE: Time to output vary upon the number of tunnels configured and cpu load. With above 50 tunnels
and 250 mbps it takes ~10 secs for the output.
233
SNTP
CHAPTER 9 SNTP
SNTP
9. SNTP
The SNTP
(Simple Network Time Protocol) is a simplified version or subnet of the NTP protocol. It is used to
synchronize the time and date by contacting the SNTP Server. The administrator can choose whether to
set the system clock manually or to enable SNTP. If SNTP is enabled, the SNTP implementation discovers
the SNTP server and gets the time from the server. The SNTP implementation also has callouts to set the
system time based on the time received from the SNTP server. It supports different time zones, where
the user can set the required time zone.
9.1. sntp
To enter SNTP configuration mode which allows the user to execute all commands that support SNTP
Configuration Mode, use the command sntp in Global Configuration Mode.
sntp
Mode
Global Configuration Mode
Examples
iS5Comm (config)# sntp
iS5Comm(config-sntp)#
234
SET SNTP
CHAPTER 9 SNTP
maximum retry poll count, SNTP client maximum poll interval timeout, Unicast-poll-interval, and Unicast
server related configuration, use the command set sntp in SNTP Configuration Mode. The no form of this
command disables authentication and the Daylight Saving Time, resets the system time zone to GM, and
deletes the listening port for SNTP client and resets to the default value; for unicast server, it deletes the
SNTP unicast server attributes and sets them to default values.
set sntp
set sntp {broadcast-delay-time [<value (1000-15000) microseconds>]
| broadcast-mode send-request {enabled | disabled}
| broadcast-poll-timeout [<value (1-30) seconds>]
| client {addressing-mode {unicast | broadcast | multicast | manycast} |
authentication-key <key-id> md5 <key> | clock-format {ampm | hours} |
clock-summer-time <week-day-month,hh:mm (20)> | enabled | disabled | port
<port number(123|1025-65535)> | time-zone <random_str> | version {v1 | v2 |
v3 | v4}}
| manycast-poll-interval [<value (16-16384) seconds>]
| manycast-poll-retry-count [<value ((1-10)seconds>]
| manycast-poll-timeout [<value ((1-30)seconds>]
| manycast-server {broadcast | multicast {ipv4 [<mcast_addr>] | ipv6
[<ip6_addr>]
| multicast-delay-time [<value (1000-15000) microseconds>]
| multicast-group-address {ipv4 {A.B.C.D(<mcast_addr>) | default} | ipv6
{AAAA::BBBB(<ipv6_addr>) | default}}
| multicast-mode send-request {enabled | disabled}
| multicast-poll-timeout [<value (1-30) seconds>]
| unicast-max-poll-retry <value (0-10) times>
| unicast-max-poll-timeout <value (1-30) seconds>
| unicast-poll-interval [<value (16-16384) seconds>]
235
SET SNTP
CHAPTER 9 SNTP
no set sntp
no set sntp {client {authentication | clock-summer-time | port | time-zone}
| unicast-server {ipv4 <ucast_addr> | ipv6 <ip6_addr> | domain-name <
dns_host_name>}
236
SET SNTP
CHAPTER 9 SNTP
Parameters
237
SET SNTP
CHAPTER 9 SNTP
238
SET SNTP
CHAPTER 9 SNTP
enabled Enter to enable SNTP client module and sends a request to the host
for time synchronization.
disabled Enter to disable SNTP client module and no request is sent to the
host for time synchronization.
port Enter to modify the Client Port setting. It sets the listening port for
SNTP client that refers to a port on a server awaiting a client
connection.
NOTE: Listening port for SNTP client should be 123 or greater than
1024, where the port below 1024 are reserved.
<port number Integer Enter a client port number value. This value is 123 or ranges from
(123|1025-65535 1025 to 65535. Default is 123.
)>
time-zone Enter to configure the system time zone with respect to UTC.
<random_str> Enter values as follows. The default is + 00: 00.
• +/- —sets the client time zone as after or before UTC. Plus
indicates forward time zone and minus indicates backward
time zone.
• UTC-offset value as —sets the UTC offset value in hours:
– +00:00 to +14:00
– -00:00 to -12:00
version Enter to configure the operating version of the SNTP for the client.
v1 Enter to configure the version of SNTP client as 1.
v2 Enter to configure the version of SNTP client as 2.
v3 Enter to configure the version of SNTP client as 3.
v4 Enter to configure the version of SNTP client as 4. This is default.
manycast-poll-i SNTP client poll interval which is the maximum interval between
nterval successive messages.
<value Integer Enter a value for the maximum interval between successive
(16-16384) messages. The poll interval value ranges from 16 to 16384 seconds,
seconds> where the poll interval value is expressed in exponent of two. The
default is 64.
manycast-poll-r Enter to configure SNTP poll retries count which is the maximum
etry-count number of unanswered polls that cause a slave to identify the
server as dead.
239
SET SNTP
CHAPTER 9 SNTP
<value ((1-10) Integer Enter a value for poll retries before identifying a server as dead.
seconds> This value ranges from 1 to 10 seconds. The default is 3.
manycast-poll-t Enter to configure SNTP client poll timeout which is the maximum
imeout interval to wait for a poll to complete
<value Integer Enter a value for SNTP clientpoll timeout. This value ranges from 1
((1-30)seconds> to 30 seconds. The default is 5.
manycast-server Enter to configure SNTP multicast or broadcast server address in
manycast mode.
broadcast Enter to configure an SNTP broadcast server address in manycast
mode.
multicast Enter to configure an SNTP multicast server address in manycast
mode.
ipv4 Enter to configure the multicast server address in IPv4.
<mcast_addr> A.B.C.D Enter a value for the multicast server address in IPv4.
ipv6 Enter to configure the multicast server address in IPv6.
<ip6_addr> AAAA:: Enter a value for the multicast server address in IPv6.
BBBB
multicast-delay Enter to configure SNTP delay time in which there is no response
-time from the multicast server.
<value Integer Enter to configure a value for the delay time with no response. This
(1000-15000) value ranges from 1000 to 15000 microseconds. The default is
microseconds> 8000.
multicast-group Enter to configure an SNTP multicast server address in multicast
-addres mode.
ipv4 Enter to configure the multicast server address in IPv4.
<mcast_addr> A.B.C.D Enter a value for the multicast server address in IPv4.
default Enter for default value
ipv6 Enter to configure the multicast server address in IPv6.
<ip6_addr> AAAA:: Enter a value for the multicast server address in IPv6.
BBBB
default Enter for default value
multicast-mode Enter to configure the status of sending the request to the
multicast server to calculate the delay time.
240
SET SNTP
CHAPTER 9 SNTP
ipv6 Enter to configure the address type of the unicast server as IPv6.
<ip6_addr> Enter a valid IPv6 address.
NOTE: One unicast server can be configured for an address type.
domain-name Enter to configure the domain name for the unicast server.
241
SET SNTP
CHAPTER 9 SNTP
< Enter a domain name. This value is a string with the maximum size
dns_host_name> as 255
primary Enter to configure the unicast server type as primary server.
secondary Enter to configure the unicast server type as secondary server.
version Enter to configure the SNTP version.
3 Integer Enter 3 to configure the SNTP version as 3.
4 Integer Enter 4 to configure the SNTP version as 4. This is the default.
port Enter to configure the port identifier for the selected server
<integer(1025-3 Integer Enter a value for port identifier. This value ranges from 1025 to
6564)> 36564.
Mode
SNTP Configuration Mode
Examples
iS5Comm(config)# sntp
iS5Comm(config-sntp)# set sntp client enabled
iS5Comm(config-sntp)# set sntp client version v3
iS5Comm (config-sntp)# set sntp client addressing-mode unicast
iS5Comm (config-sntp)# set sntp client port 1026
iS5Comm (config-sntp)# set sntp client clock-format hours
iS5Comm (config-sntp)# set sntp client time-zone +05:30
iS5Comm (config-sntp)# set sntp client clock-summer-time First-Sun-Jan,12:12 Second-Sun-Mar,12:12
iS5Comm (config-sntp)# set sntp client authentication-key 123 md5 md5_key
iS5Comm (config-sntp)# set sntp unicast-server auto-discovery enabled
iS5Comm (config-sntp)# set sntp unicast-poll-interval 128
iS5Comm (config-sntp)# set sntp unicast-max-poll-timeout 25
iS5Comm (config-sntp)# set sntp unicast-max-poll-retry 10
iS5Comm (config-sntp)# set sntp unicast-server ipv4 12.0.0.100 Primary version 3 port 1234
iS5Comm (config-sntp)# set sntp broadcast-mode send-request enabled
242
SHOW SNTP
CHAPTER 9 SNTP
show sntp
show sntp {broadcast-mode status | clock | manycast-mode status | multi-
cast-mode status | statistics | status | unicast-mode status}
243
SHOW SNTP
CHAPTER 9 SNTP
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm # show sntp broadcast-mode status
send sntp request to server in broadcast mode is disabled
broadcast poll time out value is 5
broadcast delay time value is 8000
broadcast sntp server is 12.0.0.100
iS5Comm# show sntp clock
current time : Mon Feb 03 2020 18:06:12.000 (UTC +00:00)
iS5Comm# show sntp manycast-mode status
manycast poll interval value is 64
manycast max poll time out value is 5
manycast max retry time value is 3
manycast server type is broadcast
primary server address is 12.0.0.100
244
DEBUG SNTP
CHAPTER 9 SNTP
debug sntp
debug sntp {all | all-fail | buff | control | data-path | init-shut | mgmt |
resource}
245
DEBUG SNTP
CHAPTER 9 SNTP
no debug sntp
no debug sntp {all | all-fail | buff | control | data-path | init-shut |
mgmt | resource}
Parameters
all Enter to specify generating of debug statements for all possible messages.
all-fail Enter to specify generating of debug statements for all failure traces.
buff Enter to specify generating of debug statements for SNTP buffer related
traces.
control Enter to specify generating of debug statements for control path traces. This
trace is generated during failure in modification or retrieving of SNTP entries.
Enter to specify generating of debug statements for data path traces. This
data-path trace is generated during failure in packet processing.
Enter to specify generating of debug statements for init and shutdown traces.
init-shut This trace is generated on failed initialization and shutting down of SNTP
related entries
mgmt Enter to specify generating debug statements for management traces. This
trace is generated during failure in configuration of any of the SNTP features.
resource Enter to specify generating debug statements for traces for allocation and
freeing of all resource except the buffers.
Mode
Privileged EXEC Mode
Default
Debugging is disabled
Examples
iS5Comm# debug sntp init-shutl
iS5Comm# debug sntp all
iS5Comm# no debug sntp all
246
PTP
CHAPTER 10 PTP
PTP CLI
10. PTP
The device supports end-to-end and peer-to-peer transparent clocks.
End-to-end ( E2E) transparent clocks forward PTP messages, measure the residence time of PTP event
message at the transparent clock, and add this residence time to the correction field of the PTP
messages. Transparent clock timestamps the event messages on ingress and egress port. The difference
between these timestamps is the residence time within the transparent clock. End-to-end transparent
clocks will not execute port state machine and BMC algorithm to select the state of the port.
End-to-end transparent clocks may be used as a network element, or they may be associated with appli-
cation devices such as sensors or actuators if an ordinary clock is combined with the end-to-end trans-
parent clock.
Peer-to-peer transparent clock differs from the end-to-end transparent clock in the way it corrects and
handles the timing messages. End-to-end transparent clock time stamps all PTP timing messages;
peer-to-peer transparent clock forwards only Sync and Follow-up messages.
Peer-to-peer transparent clock calculates the residence time of PTP messages in peer-to-peer trans-
parent clock, measures the link delay of the ingress port of PTP messages, and adds this correction field
in the PTP messages. Peer-to-peer transparent clock uses Pdelay request-response mechanism to
measure the link delay. It uses rate estimation and control mechanism to avoid the residence time error.
The following sections describe all PTP CLI configuration commands including show and debug ptp.
10.1. ptp
To enter PTP configuration mode which allows the user to execute all commands that support PTP
Configuration Mode, use the command ptp in Global Configuration Mode.
ptp
ptp
{domain
{(0-127) | <CR> | power-profile {clear | exit | help | no | ptp
{mode {e2etransparent | p2ptransparent} | transparent max-ports <id (0-24)>
| vlan {<id (1-4094)> | priority <id (0-7)>}}
247
PTP
CHAPTER 10 PTP
| profile
DefaultE2E | DefaultP2P | PowerProfileV2 | Reset | UtilityProfile}
}
Mode
Global Configuration Mode
248
PTP
CHAPTER 10 PTP
Parameters
249
PTP
CHAPTER 10 PTP
Examples
To globally enable PTP, type the following.
iS5Comm(config)# no shutdown ptp
iS5Comm(config)# ptp profile PowerProfileV2
iS5Comm(config-ptp)# ptp vlan 10
iS5Comm(config-ptp)# ptp vlan priority 4
iS5Comm# show running-config ptp
#Building configuration...
!
!
no shutdown ptp
ptp domain power-profile
ptp vlan 10
ptp vlan priority 4
ptp mode p2ptransparent
!
interface gigabitethernet 0/1
ptp enable
ptp min-pdelay-req-interval 2
!
end
250
PTP (INTERFACES)
CHAPTER 10 PTP
ptp
ptp {enable | min-pdelay-req-interval <exponent-Of-2-seconds (0-5)> |
port-statistcs-cnt-reset}
Mode
Interface Configuration Mode
Parameters
Examples
iS5Comm (config)# int gigabitethernet 0/1
iS5Comm (config-if)# ptp enable
iS5Comm (config-if)# ptp port-statistics-cnt-reset
251
SHOW PTP
CHAPTER 10 PTP
show ptp
show ptp {clock | counters | global info | null-management | port | profile
| transparent max-ports}
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show ptp clock
PTP Clock Information
-------------------------Clock Identity :
e8:e8:75:ff:fe:90:5f:82
Clock Context : 0
Clock Domain : 254
Primary Domain : 254
Clock Mode : Transparent
252
SHOW PTP
CHAPTER 10 PTP
253
DEBUG PTP
CHAPTER 10 PTP
debug ptp
debug ptp {all | critical | port}
no debug ptp
no debug ptp {all | critical | port}
254
DEBUG PTP
CHAPTER 10 PTP
Parameters
Mode
Privileged EXEC Mode
Default
Debugging is disabled
Examples
iS5Comm # debug ptp all
iS5Comm# no debug ptp all
255
SUPPORTED MIBS
CHAPTER 11 SNMPV3
SNMPv3
11. SNMPv3
SNMP
(Simple Network Management Protocol) is the most widely-used network management protocol on
TCP/IP-based networks.
SNMPv3 is designed mainly to overcome the security shortcomings of SNMP v1/v2. USM (User based
Security Model) and VACM (View based Access Control Model) are the main features added as part of
the SNMPv3 specification. USM provides both encryption and authentication of the SNMP PDUs
(protocol data units), while VACM specifies a mechanism for defining access policies for different users
with different MIB trees.
Also, SNMPv3 specifies a generic management framework, which is expandable for adding new Manage-
ment Engines, Security Models, Access Control Models and so on. With SNMPv3, the SNMP communica-
tion is completely safe and secure.SNMPv3 is a multilingual agent supporting all three versions of SNMP
(SNMPv1, SNMPv2c and SNMPv3) while conforming to the latest specifications. It is available as a
portable source code product, which can be easily integrated to any platform (any OS and any Processor).
MIB
integration is made simple with the aid of a tool called Middle Level Code Generator (MIDGEN), which is
available along with SNMP and generates the interface stubs required for every object in the MIB for the
SET, GET and GETNEXT operations.These stubs can be implemented by the respective modules
supporting the MIB.
SNMP is provided as source code available for licensing to OEMs and VARs who wish to incorporate the
multi-lingual SNMP functionality into their products.
256
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: cybsec
cybsecnat.mib This group contains all the scalar objects and
tables that are need for configuring
FutureNAT. All the scalar objects are listed
under the table natStatInfo.
MODULE-IDENTITY: cybSecNatMIB
DIFFSERV-DSCP-TC The Textual Conventions defined in this
module should be used whenever a
Differentiated Services Code Point is used in
a MIB.
MODULE-IDENTITY: diffServDSCPTC
fsarp.mib This file contains MIB definitions for ARP
module.
MODULE-IDENTITY: fsarp
fsbgp4.mib The Proprietary BGP MIB.
MODULE-IDENTITY: fsbgp
fscfa.mib The revised version of the MIB for
CFArelease 1.2.0.0.
MODULE-IDENTITY: fscfa
257
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: fsClkIwfMIB
fsdhclient.mib The DHCP Client MIB
MODULE-IDENTITY: futureDhcpClientMIB
fsdhcnsp.mib This MIB contains scalars and tables used to
configure a switch running L2 DHCP
SNOOPING.
MODULE-IDENTITY: fsdhcpsnp
fsdhcrelay.mib The DHCP Relay agent MIB.
MODULE-IDENTITY: futureDhcpRelay
fsdhcsrv.mib The DHCP Server MIB.
MODULE-IDENTITY: futureDhcpSrvMIB
fsdot1ad.mib 802.1ad MIB definitions
MODULE-IDENTITY: dot1adMIB
fsfwl.mib The MIB module to describe the Firewall.
MODULE-IDENTITY: firewall
fshttp.mib The MIB module for management of HTTP
Routers Initial Version.
MODULE-IDENTITY: fsHttpMIB
fsigmp.mib This file contains MIB definitions for IGMP
product.
MODULE-IDENTITY: fsigmpMIB
258
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: fsigmpproxy
fsip.mib This mib module is for IP module.
MODULE-IDENTITY: futureip
fsipdb.mib This file contains MIB definitions for IPBD
module.
MODULE-IDENTITY: fsipdb
fsipvx.mib This file contains MIB definitions for IPVX
module.
MODULE-IDENTITY: fsipvxMIB
fsiss.mib MIB for the products top level system
manager application, ISS or Intelligent
Switch Solution.
MODULE-IDENTITY: iss
fsissacl.mib This file contains MIB definitions for ISS
module.
MODULE-IDENTITY: issAcl
fsissext.mib Differentiated Services module support
extensions.
MODULE-IDENTITY: issExt
fsla.mib The proprietary MIB module for LA.
MODULE-IDENTITY: fsla
259
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: fslldp
fslldpmed.mib LLDP MED Proprietary MIB Definition.
MODULE-IDENTITY: fsLldpMed
fsmgmd.mib
MODULE-IDENTITY: fsmgmd
fsmidhcsnp.mib This MIB contains tables used to configure a
switch running MI L2 DHCP SNOOPING.
MODULE-IDENTITY: fsMIDhcpSnp
fsmidr.mib The Dhcp MI Relay agent MIB
MODULE-IDENTITY: futureMIDhcpRelay
fsmiipdb.mib Multiple Instance support for IP binding
database module.
MODULE-IDENTITY: fsMIIpdb
fsmiospf.mib The Proprietary OSPFMI MIB
MODULE-IDENTITY: fsMIOspf
fsmirip.mib The Proprietary RIP MI MIB
MODULE-IDENTITY: fsMIRip
fsmidhcsnp.mib This mib module is for Proprietory Multiple
Instance DHCP Snooping MIB
fsmidr.mib The DHCP MI Relay agent MIB
fsmiospf.mib The Proprietary OSPFMI MIB
fsmirip.mib The Proprietary RIP MI MIB
260
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: fsMIRtm
fsmistdospf.mib The Proprietary OSPFMI MIB modified from
STDOSPF MIB
MODULE-IDENTITY: fsMIStdOspf
fsmistdrip.mib Changed the standard MIB for MI support
MODULE-IDENTITY: fsMIStdRip
fsmld.mib The MIB module for MLD Management.
MODULE-IDENTITY: futuremld
fsmparp.mib The proprietary MIB module for ARP. The
MIB provides objects for configuring arp
functionality.
MODULE-IDENTITY: fsMiArp
fsmpbgp4.mib The Proprietary BGP MIB Created for MI
support.
MODULE-IDENTITY: fsMIBgp
fsmpbrst.mib Proprietary MIB for C-VLAN component
Rapid Spanning Tree Protocol in Provider
Bridges.
MODULE-IDENTITY: futureMIPbRstMIB
261
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: fsMIFsIp
fsmpipvx.mib This mib module is for IP module with
virtual routing and forwarding support.
MODULE-IDENTITY: fsMIFsIpvx
fsmpmst.mib This MIB module is for Proprietary Multiple
Instance MSTP MIB
MODULE-IDENTITY: futureMIMstMIB
fsmpping.mib This mib module is for Ping with virutal
routing support.
MODULE-IDENTITY: fsMIPingMIB
fsmppvrst.mib MIB for Multiple Instance Per-VLAN Rapid
Spanning Tree.
MODULE-IDENTITY: futureMIPvrstMIB
fsmprst.mib MIB for Multiple Instance Rapid Spanning
Tree Algorithm & Protocol
MODULE-IDENTITY: futureMIRstMIB
fsmptcp.mib This mib module is for manging TCP module
with virtual routing and forwarding support.
MODULE-IDENTITY: fsMITcp
fsmpvlan.mib This mib module is for Proprietary Multiple
Instance VLAN mib.
MODULE-IDENTITY: futureMIVlanMIB
262
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: fsPBridgeMIB
fsmsbrg.mib This file contains MIB definitions for
Q-BRIDGE.
MODULE-IDENTITY: fsDot1dBridge
fsmsipvx.mib The MIB is the standard IPVX mib with
virtual routing and forwarding support.
MODULE-IDENTITY: fsMIStdIp
fsmsrst.mib The Bridge MIB Extension module for
managing devices that support the multiple
instance Rapid Spanning Tree Protocol
defined by IEEE 802.1w.
MODULE-IDENTITY: fsRstpMIB
fsmst.mib MODULE-IDENTITY: futureMstMIB
fsmstcpipvx.mib MODULE-IDENTITY: fsMIStdTcpIpvx
fsmsudpipvx.mib The MIB module for managing UDP
implementations. This version of this MIB
module is part of RFC 411
MODULE-IDENTITY: fsMIUdpMIB
fsmsvlan.mib The VLAN Bridge MIB module for managing
Virtual Bridged Local Area Networks, with
multiple instance capability.
MODULE-IDENTITY: fsQBridgeMIB
fsosmitest.mib The Proprietary OSPFMI TEST MIB
MODULE-IDENTITY: fsMIOspfTestGroup
263
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: futOspfTestGroup
fspim.mib This document explains the propreitary MIB
implemented for the PIM product.
MODULE-IDENTITY: fsPimMIB
fspimcmn.mib This document explains the propreitary MIB
implemented for the PIM (IPv4/IPv6)
product.
MODULE-IDENTITY: fsPimCmnMIB
fsnat.mib The natMIB is placed under futuresoftware
MIB branch
fspimstd.mib The MIB module for management of PIM
Routers Initial Version.
MODULE-IDENTITY: fsPimStdMIB
fsping.mib This MIB is for the Ping module
MODULE-IDENTITY: fsPingMIB
fspnac.mib This document explains the proprietary MIB
implemented for PNAC product.
MODULE-IDENTITY: fspnac
fspoe.mib his proprietary MIB definition, supplements
the standard IEEE802.3af MIB and also
provides management of certain proprietary
features of POE.
MODULE-IDENTITY: fspoe
264
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: fsQoSMib
fsradext.mib MIB for Radius. Extended for Ipv6 Support.
MODULE-IDENTITY: futureRADIUSEXTMIB
fsradius.mib The RADIUS ext. MIB.
MODULE-IDENTITY: futureRADIUSMIB
fsrip.mib MODULE-IDENTITY: fsrip
fsrmap.mib The proprietary MIB module for RouteMap
module.
MODULE-IDENTITY: futureroutemap
fsrmon.mib This MIB module is for managing RMON
implementations. Ether Statistics group
supports the monitoring of different
statistics on Ethernet interfaces, which is
enhanced to support statistics per VLANThe
etherStatsDatasource of etherStats table
identifies the source of data that is
configured to analyze. Now this source can
be set to either interface OID or VLAN OID. If
configured for interface OID the
statisticscollection is set to be on Interface
and if the source is set to VLAN OID the
statistics collection is set to be on any of the
VLAN configured in the device.
MODULE-IDENTITY: futrmon
265
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: futureRstMIB
fssisp.mib The proprietary MIB module for SISP. SISP
functionality is supported only for customer
and 802.1ad Provider Bridges.
MODULE-IDENTITY: fssisp
fssnmp3.mib The MIB module is for managing SNMP
Inform message statistics and
Agentx-subagent configuration/statistics
objects in SNMP Version 3.
MODULE-IDENTITY: futuresnmp3
fssnp.mib This document explains the proprietary MIB
implemented for IGMP-SNOOPING and
MLD-SNOOPING features.
MODULE-IDENTITY: fssnoop
fssntp.mib This mib module is for SNTP
MODULE-IDENTITY: fsSntp
fssshmib.mib The proprietary MIB for SSH.
MODULE-IDENTITY: ssh
fsssl.mib The proprietary MIB for SSL.
MODULE-IDENTITY: ssl
fsstdmiostrp.mib The Proprietary OSPFMI TRAP MIB modified
from standard ospf trap MIB
MODULE-IDENTITY: fsMIStdOspfTrap
fssyslg.mib The MIB for Syslog.
MODULE-IDENTITY: fsSyslog
266
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: fstac
fstacacs.mib The TACACS+ Client MIB
MODULE-IDENTITY: futureTacacsClientMIB
fstacsxt.mib The MIB for ISSAcessControl.
MODULE-IDENTITY: futureTacacsClientExtMIB
fstcp.mib TCP Proprietary MIB.
MODULE-IDENTITY: fstcp
fstunl.mib The MIB module for management of IP (IPv4
and IPv6) Tunnels, independent of the
specific encapsulation scheme in use.
MODULE-IDENTITY: fsTunlMIB
fsusermgm.mib MIB for 'Password Authentication
Management'
MODULE-IDENTITY: fsusrMgmt
fsvcm.mib The MIB module for the virtual context
manager.
MODULE-IDENTITY: fsVcmMib
fsvlan.mib MODULE-IDENTITY: futureVlanMIB
fsvpnpolicy.mib The MIB module that describes managed
objects of general use by the IPSEC Protocol.
MODULE-IDENTITY: fsVpnPolicy
267
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: fsvrrp
fsvrrp3.mib This MIB module contains managed object
definitions for extensions to VRRP version 3
standard characteristics.
MODULE-IDENTITY: fsvrrpv3
HCNUM-TC A MIB module containing textual
conventions for high capacity data types.
This module addresses an immediate need
for data types not directly supported in the
SMIv2. This short-term solution is meant to
be deprecated as a long-term solution is
deployed.
MODULE-IDENTITY: hcnumTC
hsr_prp.mib HsrPrp Proprietary MIB Definition.
MODULE-IDENTITY: hsrPrpMib
IANA-ADDRESS-FAMILY-NUMBERS.mib The MIB module defines the
AddressFamilyNumbers textual convention.
MODULE-IDENTITY:
ianaAddressFamilyNumbers
IANAifType.mib This MIB module defines the IANAifType
Textual Convention, and thus the
enumerated values of the ifType object
defined in MIB-II's ifTable.
MODULE-IDENTITY: ianaifType
268
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: ianaMauMIB
IANA-RTPROTO.mib This MIB module defines the
IANAipRouteProtocol and
IANAipMRouteProtocol textual conventions
for use in MIBs which need to identify
unicast or multicast routing mechanisms.
MODULE-IDENTITY: ianaRtProtoMIB
IEC62439-8-MIB.mib This file is proprietary MIB for PTP Power
profile. This is reference from
IEC-62439-3-MIB
MODULE-IDENTITY: ptpPowerProfileMIB
ifmib.mib The MIB module to describe generic objects
for network interface sub-layers. This MIB is
an updated version of MIB-II's ifTable, and
incorporates the extensions defined in RFC
1229.
MODULE-IDENTITY: ifMIB
INET-ADDRESS.mib This MIB module defines textual
conventions for representing Internet
addresses. An Internet address can be an
IPv4 address, an IPv6 address, or a DNS
domain name. This module also
definestextual conventions for Internet port
numbers, autonomous system numbers,
and the length of an Internet address prefix.
MODULE-IDENTITY: inetAddressMIB
INTEGRATED-SERVICES.mib The MIB module to describe the Integrated
Services Protocol.
MODULE-IDENTITY: intSrv
269
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: mrpRingMIB
radacc.mib The MIB module for entities implementing
the client side of the Remote Access Dialin
User Service (RADIUS) accounting protocol.
MODULE-IDENTITY: radiusAccClientMIB
radauth.mib The MIB module for entities implementing
the client side of the Remote Access Dial-in
User Service (RADIUS) authentication
protocol.
MODULE-IDENTITY: radiusAuthClientMIB
RFC1155-SMI.mib
RFC-1212.mib
RFC1213-MIB.mib
serial_ip.mib Serial Interface Proprietary MIB Definition
MODULE-IDENTITY: serialIp
SNMP-FRAMEWORK.mib The SNMP Management Architecture MIB
MODULE-IDENTITY: snmpFrameworkMIB
SNMPv2-CONF.mib
SNMPv2-SMI.mib
SNMPv2-TC.mib
270
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: ieee8021BridgeMib
std1q1ap.mib The VLAN Bridge MIB module for managing
Virtual Bridged Local Area Networks, as
defined by IEEE 802.1Q-2005, including
Restricted Vlan Registration defined by IEEE
802.1u-2001 and Vlan Classification defined
by IEEE 802.1v-2001.
MODULE-IDENTITY: ieee8021QBridgeMib
std1s1ap.mib The Bridge MIB modules for managing
devices that support IEEE 802.1 multiple
spanning tree groups.Unless otherwise
indicated, the references in this MIB module
are to IEEE 802.1Q-2005 as amended by IEEE
802.1ad, IEEE 802.1ak, IEEE 802.1ag and
IEEE 802.1ah.
MODULE-IDENTITY: ieee8021MstpMib
std1w1ap.mib The Spanning-Tree MIB module for
managing devices that support IEEE 802.1D.
This MIB module is derived from the IETF
BRIDGE-MIB, RFC 4188.
MODULE-IDENTITY:
ieee8021SpanningTreeMib
std8021brg.mib The Bridge MIB module for managing
devices that support IEEE 802.1D. This MIB
module is derived from the IETF
BRIDGE-MIB, RFC 4188.
MODULE-IDENTITY: ieee8021BridgeMib
271
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: ieee8021TcMib
stdbgp4.mib The MIB module for the BGP-4 protocol.
MODULE-IDENTITY: bgp
stdbrgext.mib The Bridge MIB Extension module for
managing Priority and Multicast Filtering,
defined by IEEE 802.1D-1998, including
Restricted Group Registration defined
byIEEE 802.1t-2001.
MODULE-IDENTITY: pBridgeMIB
stdbridge.mib The Bridge MIB module for managing
devices that support IEEE 802.1D.
MODULE-IDENTITY: dot1dBridge
stddot1ad.mib Provider Bridge MIB module for managing
802.1ad.
MODULE-IDENTITY: ieee8021PbMib
stdent.mib The MIB module for representing multiple
logical entities supported by a single SNMP
agent.
MODULE-IDENTITY: entityMIB
stdether.mib The MIB module to describe generic objects
for Ethernet-like network interfaces.
MODULE-IDENTITY: etherMIB
stdigmp.mib The MIB module for IGMP Management.
MODULE-IDENTITY: igmpStdMIB
272
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: ipMIB
stdla.mib The Link Aggregation module for managing
IEEE Std 802.3ad.
MODULE-IDENTITY: lagMIB
stdlldp.mib Management Information Base module for
LLDP configuration, statistics, local system
data and remote systems data components.
MODULE-IDENTITY: lldpMIB
stdlldpmedx.mib The LLDP Management Information Base
extension module for TIA-TR41.4 media
endpoint discovery information.
MODULE-IDENTITY: lldpXMedMIB
stdlldpv2.mib Management Information Base module for
LLDP configuration, statistics, local system
data and remote systems data components.
MODULE-IDENTITY: lldpV2MIB
273
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: lldpV2TcMIB
stdmgmd.mib The MIB module for MGMD management.A
new version of MGMD combining RFC 2933
and RFC 3019. Includes IGMPv3 and MLDv2
source filtering changes.
MODULE-IDENTITY: mauMod
stdmri.mib The MIB module for management of IP
Multicast routing, but independent of the
specific multicast routing protocol inuse.
MODULE-IDENTITY: ipMRouteStdMIB
stdospf.mib The MIB module to describe the OSPF
Version 2 Protocol
MODULE-IDENTITY: ospf
stdostrp.mib The MIB module to describe traps for the
OSPF Version 2 Protocol.
MODULE-IDENTITY: ospfTrap
274
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: lldpXdot1MIB
stdot1lldpv2.mib The LLDP Management Information Base
extension module for IEEE 802.1
organizationally defined discovery
information.In order to assure the
uniqueness of the LLDP-V2-MIB,
lldpV2Xdot1MIB is branched from
lldpV2Extensions using an OUI value as the
node. An OUI/'company_id' is a 24 bit
globally unique assigned number referenced
by various standards.
MODULE-IDENTITY: lldpV2Xdot1MIB
stdot3lldp.mib The LLDP Management Information Base
extension module for IEEE 802.3
organizationally defined discovery
information.
MODULE-IDENTITY: lldpXdot3MIB
stdot3lldpv2.mib The LLDP Management Information Base
extension module for IEEE 802.3
organizationally defined discovery
information.In order to assure the
uniqueness of the LLDP-MIB,
lldpV2Xdot3MIB is branched from
lldpV2Extensions using OUI value as the
node. An OUI/'company_id' is a 24 bit
globally uniqueassigned number referenced
by various standards.
MODULE-IDENTITY: lldpV2Xdot3MIB
275
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: pimMIB
stdpnac.mib The Port Access Entity module for managing
IEEE 802.1X.
MODULE-IDENTITY: ieee8021paeMIB
stdpoe.mib The MIB module for managing Power Source
Equipment (PSE) working according to the
IEEE 802.af Powered Ethernet (DTE Power
via MDI) standard.
MODULE-IDENTITY: powerEthernetMIB
stdrip.mib The MIB module to describe the RIP2
Version 2 Protocol.
MODULE-IDENTITY: rip2
stdrmon.mib Remote network monitoring devices, often
called monitors or probes, are instruments
that exist for the purpose of managing a
network. This MIB defines objects for
managing remote network monitoring
devices.
MODULE-IDENTITY: rmon
stdrmon2.mib The MIB module for managing remote
monitoring device implementations. This
MIB module extends the architecture
introduced in the original RMON MIB as
specified in RFC 2819.
MODULE-IDENTITY: rmon
276
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: rstpMIB
stdsncom.mib This MIB module defines objects to help
support coexistence between SNMPv1,
SNMPv2c, and SNMPv3.
MODULE-IDENTITY: snmpCommunityMIB
stdsnmp.mib The MIB module for SNMP entities.
MODULE-IDENTITY: snmpMIB
stdsnnot.mib This MIB module defines MIB objects which
provide mechanisms to remotely configure
the parameters used by an SNMP entity for
the generation of notifications.
MODULE-IDENTITY: snmpNotificationMIB
stdsnproxy.mib This MIB module defines MIB objects which
provide mechanisms to remotely configure
the parameters used by a proxy forwarding
application.
MODULE-IDENTITY: snmpProxyMIB
stdsntgt.mib This MIB module defines MIB objects which
provide mechanisms to remotely configure
the parameters used by an SNMP entity for
the generation of SNMP messages.
MODULE-IDENTITY: snmpTargetMIB
277
SUPPORTED MIBS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: snmpUsmMIB
stdtcpipvx.mib The MIB module for managing TCP
implementations.
MODULE-IDENTITY: tcpMIB
stdudpipvx.mib The MIB module for managing UDP
implementations.MODULE-IDENTITY:
udpMIB
stdvacm.mib The management information definitions for
the View-based Access Control Model for
SNMP.
MODULE-IDENTITY: snmpVacmMIB
stdvlan.mib The VLAN Bridge MIB module for managing
Virtual Bridged Local Area Networks, as
defined by IEEE 802.1Q-2003, including
Restricted Vlan Registration defined byIEEE
802.1u-2001 and Vlan Classification defined
by IEEE 802.1v-2001.
MODULE-IDENTITY: qBridgeMIB
stdvrrp.mib This MIB describes objects used for
managing Virtual Router Redundancy
Protocol (VRRP) routers.
MODULE-IDENTITY: vrrpMIB
stdvrrp3.mib This MIB describes objects used for
managing Virtual Router Redundancy
Protocol version 3 (VRRPv3).
MODULE-IDENTITY: vrrpv3MIB
278
SNMP TRAPS
CHAPTER 11 SNMPV3
MODULE-IDENTITY: tokenRing
Introduction
The switch supports a number of traps that indicate alarm or condition changes on the device. This
section will list out those traps and describe how they are generated.
279
SNMP TRAPS
CHAPTER 11 SNMPV3
A line module TRAP will be generated, whenever a line module is inserted or removed. Below are the
corresponding MIB IDs that would be mentioned in the generated TRAP.
• lineModuleNo - 1.3.6.1.4.1.41094.0.250.27.3.6
• lmInsertStatus - 1.3.6.1.4.1.41094.0.250.27.3.7
Steps to Generate the Line Module Trap
1) To generate TRAP for Line Module Removal Event, remove a line module.
2) To generate TRAP for Line Module Insertion Even, insert the removed line module.
Packet Capture
• 1.3.6.1.2.1.1.3.0: 16600 ---> sysUpTime
– Object Name: 1.3.6.1.2.1.1.3.0 (iso.3.6.1.2.1.1.3.0)
– Value (Timeticks): 16600 ---> Total System UP Time in ticks
• 1.3.6.1.6.3.1.1.4.1.0: 1.3.6.1.4.1.41094.0.250.27.3.6 (iso.3.6.1.4.1.41094.0.250.27.3.6)
– Object Name: 1.3.6.1.6.3.1.1.4.1.0 (iso.3.6.1.6.3.1.1.4.1.0) --> snmpTrap OID
– Value (OID): 1.3.6.1.4.1.41094.0.250.27.3.6 (iso.3.6.1.4.1.41094.0.250.27.3.6) -> Line module
trap OID
• 1.3.6.1.4.1.41094.0.250.27.3.6: ---> Line module Trap OID
– Object Name: 1.3.6.1.4.1.41094.0.250.27.3.6 (iso.3.6.1.4.1.41094.0.250.27.3.6)
280
SNMP TRAPS
CHAPTER 11 SNMPV3
Warm Start
The Warm Start TRAP will be generated, when “reload” command is issued. Below is the corresponding
MIB ID that would be mentioned, with the TRAP generated.
• issWarmStart - 1.3.6.1.4.1.41094.0.250.2.120.11
Steps to generate the Warm Start trap
1) Execute “reload” command
Packet Capture
• 1.3.6.1.2.1.1.3.0: 54887 ---> sysUpTime
– Object Name: 1.3.6.1.2.1.1.3.0 (iso.3.6.1.2.1.1.3.0)
– Value (Timeticks): 54887 ---> Total System UP Time in ticks
• 1.3.6.1.6.3.1.1.4.1.0: 1.3.6.1.4.1.41094.0.250.2.120.11 (iso.3.6.1.4.1.41094.0.250.2.120.11)
– Object Name: 1.3.6.1.6.3.1.1.4.1.0 (iso.3.6.1.6.3.1.1.4.1.0) --> snmpTrap OID
– Value (OID): 1.3.6.1.4.1.41094.0.250.2.120.11 (iso.3.6.1.4.1.41094.0.250.2.120.11) --> Warm
start MIB OID
• 1.3.6.1.4.1.41094.0.250.2.120.11: --> Warm start MIB OID
– Object Name: 1.3.6.1.4.1.41094.0.250.2.120.11 (iso.3.6.1.4.1.41094.0.250.2.120.11)
– Value (Integer32): 1
• 1.3.6.1.6.3.1.1.4.3.0: 1.3.6.1.2.1.11 (iso.3.6.1.2.1.11) --> snmpTrapEnterprise
– Object Name: 1.3.6.1.6.3.1.1.4.3.0 (iso.3.6.1.6.3.1.1.4.3.0)
– Value (OID): 1.3.6.1.2.1.11 (iso.3.6.1.2.1.11) ---> snmp OID
Alarm Trap
An Alarm TRAP will be generated, whenever any kind of alarm is generated. Here we validated the alarm
module trap, with alarm generation for LINK UP and LINK DOWN event. Below are the corresponding MIB
IDs that would be mentioned, with the TRAP generated.
281
SNMP TRAPS
CHAPTER 11 SNMPV3
• alarmTraps - 1.3.6.1.4.1.41094.0.250.258.3.1
• alarmId - 1.3.6.1.4.1.41094.0.250.258.2.1.1.2
• alarmDesc - 1.3.6.1.4.1.41094.0.250.258.2.1.1.4
• alarmTimeStr - 1.3.6.1.4.1.41094.0.250.258.2.1.1.5
• alarmPriority - 1.3.6.1.4.1.41094.0.250.258.2.1.1.6
• alarmGenModule - 1.3.6.1.4.1.41094.0.250.258.2.1.1.7
Steps to generate the Alarm trap
1) Bring up an interface to generate the LINK UP event
2) Bring down an interface to generate the LINK DOWN event
Packet Capture
• 1.3.6.1.2.1.1.3.0: 43567 ---> sysUpTime
– Object Name: 1.3.6.1.2.1.1.3.0 (iso.3.6.1.2.1.1.3.0)
– Value (Timeticks): 43567 ---> Total System UP Time in ticks
• 1.3.6.1.6.3.1.1.4.1.0: 1.3.6.1.4.1.41094.0.250.258.3.1 (iso.3.6.1.4.1.41094.0.250.258.3.1)
– Object Name: 1.3.6.1.6.3.1.1.4.1.0 (iso.3.6.1.6.3.1.1.4.1.0) --> snmpTrap OID
– Value (OID): 1.3.6.1.4.1.41094.0.250.258.3.1 (iso.3.6.1.4.1.41094.0.250.258.3.1) -> alarm-
Traps MIB OID
• 1.3.6.1.4.1.41094.0.250.258.2.1.1.2: --> alarmId
– Object Name: 1.3.6.1.4.1.41094.0.250.258.2.1.1.2 (iso.3.6.1.4.1.41094.0.250.258.2.1.1.2)
– Value (Integer32): 3000
• 1.3.6.1.4.1.41094.0.250.258.2.1.1.4:4769302f3920496e74657266616365204c696e6b20537461...
– Object Name: 1.3.6.1.4.1.41094.0.250.258.2.1.1.4 (iso.3.6.1.4.1.41094.0.250.258.2.1.1.4)
---> alarmDesc
– Value (OctetString): 4769302f3920496e74657266616365204c696e6b20537461...
• 1.3.6.1.4.1.41094.0.250.258.2.1.1.5: --> alarmTimeStr
4170722f31382f32333a33363a3533200000000000000000
– Object Name: 1.3.6.1.4.1.41094.0.250.258.2.1.1.5 (iso.3.6.1.4.1.41094.0.250.258.2.1.1.5)
– Value (OctetString): 4170722f31382f32333a33363a3533200000000000000000
• 1.3.6.1.4.1.41094.0.250.258.2.1.1.6: --> alarmPriority
– Object Name: 1.3.6.1.4.1.41094.0.250.258.2.1.1.6 (iso.3.6.1.4.1.41094.0.250.258.2.1.1.6)
– Value (Integer32): 2
• 1.3.6.1.4.1.41094.0.250.258.2.1.1.7: --> alarmGenModule
– Object Name: 1.3.6.1.4.1.41094.0.250.258.2.1.1.7 (iso.3.6.1.4.1.41094.0.250.258.2.1.1.7)
– Value (Integer32): 2
• 1.3.6.1.6.3.1.1.4.3.0: 1.3.6.1.2.1.11 (iso.3.6.1.2.1.11) --> snmpTrapEnterprise
– Object Name: 1.3.6.1.6.3.1.1.4.3.0 (iso.3.6.1.6.3.1.1.4.3.0)
282
SNMP TRAPS
CHAPTER 11 SNMPV3
The Power supply TRAP will be generated, whenever a Power module is inserted or removed.Below are
the corresponding MIB IDs that would be mentioned, with the TRAP generated.
• issTrapPowerSupply - 1.3.6.1.4.1.41094.0.250.2.120.6
• issPowerSupplyPresence - 1.3.6.1.4.1.41094.0.250.2.121.132
• issPowerSupplyActive - 1.3.6.1.4.1.41094.0.250.2.121.133
Steps to generate the Power Supply trap
1) Remove a power module to generate POWER module removal event
2) Insert a power module to generate POWER module insertion event
Packet Capture
• 1.3.6.1.2.1.1.3.0: 129754 ---> sysUpTime
– Object Name: 1.3.6.1.2.1.1.3.0 (iso.3.6.1.2.1.1.3.0)
– Value (Timeticks): 129754 ---> Total System UP Time in ticks
• 1.3.6.1.6.3.1.1.4.1.0: 1.3.6.1.4.1.41094.0.250.2.120.6 (iso.3.6.1.4.1.41094.0.250.2.120.6)
– Object Name: 1.3.6.1.6.3.1.1.4.1.0 (iso.3.6.1.6.3.1.1.4.1.0) --> snmpTrap OID
– Value (OID): 1.3.6.1.4.1.41094.0.250.2.120.6 (iso.3.6.1.4.1.41094.0.250.2.120.6) --> issTrap-
PowerSupply
• 1.3.6.1.4.1.41094.0.250.2.121.132: ---> issPowerSupplyPresence
– Object Name: 1.3.6.1.4.1.41094.0.250.2.121.132 (iso.3.6.1.4.1.41094.0.250.2.121.132)
– Value (Integer32): 0
• 1.3.6.1.4.1.41094.0.250.2.121.133: ---> issPowerSupplyActive
– Object Name: 1.3.6.1.4.1.41094.0.250.2.121.133 (iso.3.6.1.4.1.41094.0.250.2.121.133)
– Value (Integer32): 0
• 1.3.6.1.6.3.1.1.4.3.0: 1.3.6.1.2.1.11 (iso.3.6.1.2.1.11) --> snmpTrapEnterprise
– Object Name: 1.3.6.1.6.3.1.1.4.3.0 (iso.3.6.1.6.3.1.1.4.3.0)
– Value (OID): 1.3.6.1.2.1.11 (iso.3.6.1.2.1.11) ---> snmp OID
The Cold Start TRAP will be generated, whenever the image is reloaded after doing SNMP configurations
for TRAP and “write-startup” is done. Below is the corresponding MIB ID that would be mentioned, with
the TRAP generated.
283
SNMP TRAPS
CHAPTER 11 SNMPV3
• coldStart - 1.3.6.1.6.3.1.1.5.1
Steps to generate the Cold Start trap
1) Execute “reload” command
Packet Capture
• 1.3.6.1.2.1.1.3.0: 1419 ---> sysUpTime
– Object Name: 1.3.6.1.2.1.1.3.0 (iso.3.6.1.2.1.1.3.0)
– Value (Timeticks): 1419 ---> Total System UP Time in ticks
• 1.3.6.1.6.3.1.1.4.1.0: 1.3.6.1.6.3.1.1.5.1 (iso.3.6.1.6.3.1.1.5.1)
– Object Name: 1.3.6.1.6.3.1.1.4.1.0 (iso.3.6.1.6.3.1.1.4.1.0) --> snmpTrap OID
– Value (OID): 1.3.6.1.6.3.1.1.5.1 (iso.3.6.1.6.3.1.1.5.1) ---> coldStart MIB OID
• 1.3.6.1.6.3.1.1.4.3.0: 1.3.6.1.2.1.11 (iso.3.6.1.2.1.11) --> snmpTrapEnterprise
– Object Name: 1.3.6.1.6.3.1.1.4.3.0 (iso.3.6.1.6.3.1.1.4.3.0)
– Value (OID): 1.3.6.1.2.1.11 (iso.3.6.1.2.1.11) ---> snmp OID
An Authentication failure TRAP will be generated, whenever the SNMP connectivity cannot be estab-
lished due to Authentication failures. Below is the corresponding MIB ID that would be mentioned, with
the TRAP generated.
• authenticationFailure - 1.3.6.1.6.3.1.1.5.5
Steps to generate the Authentication trap
1) Execute below command to enable Authentication trap
– snmp-server enable traps snmp authentication
2) Execute below command from linux, to invoke error in authentication
– snmpwalk -c COMM1 -v2c 7.0.0.1 iso
NOTE: Here the community name configured is COMM2, but from LINUX, we are trying to authenticate
with COMM1, which would cause a authentication failure.
Packet Capture
• 1.3.6.1.2.1.1.3.0: 1419 ---> sysUpTime
– Object Name: 1.3.6.1.2.1.1.3.0 (iso.3.6.1.2.1.1.3.0)
– Value (Timeticks): 1419 ---> Total System UP Time in ticks
• 1.3.6.1.6.3.1.1.4.1.0: 1.3.6.1.6.3.1.1.5.5 (iso.3.6.1.6.3.1.1.5.5)
– Object Name: 1.3.6.1.6.3.1.1.4.1.0 (iso.3.6.1.6.3.1.1.4.1.0) --> snmpTrap OID
– Value (OID): 1.3.6.1.6.3.1.1.5.5 (iso.3.6.1.6.3.1.1.5.5) --> authenticationFailure OID
• 1.3.6.1.6.3.1.1.4.3.0: 1.3.6.1.2.1.11 (iso.3.6.1.2.1.11) --> snmpTrapEnterprise
– Object Name: 1.3.6.1.6.3.1.1.4.3.0 (iso.3.6.1.6.3.1.1.4.3.0)
284
SNMP TRAPS
CHAPTER 11 SNMPV3
A LINK UP / LINK DOWN TRAP will be generated, whenever any interface is brought UP or DOWN. Below
is the corresponding MIB ID that would be mentioned, with the TRAP generated.
• linkUp - 1.3.6.1.6.3.1.1.5.4
• linkDown - 1.3.6.1.6.3.1.1.5.3
• ifIndex - 1.3.6.1.2.1.2.2.1.1.<ifindex>
• ifAdminStatus - 1.3.6.1.2.1.2.2.1.7.<ifIndex
• ifOperStatus - 1.3.6.1.2.1.2.2.1.8.<ifIndex>
Steps to generate the Link UP/DOWN trap
1) Bring DOWN an active interface through command “shutdown”
2) Bring UP the same interface through command “no shutdown”
Packet Capture (for link UP)
• 1.3.6.1.2.1.1.3.0: 136427
– Object Name: 1.3.6.1.2.1.1.3.0 (iso.3.6.1.2.1.1.3.0)
– Value (Timeticks): 136427
• 1.3.6.1.6.3.1.1.4.1.0: 1.3.6.1.6.3.1.1.5.4 (iso.3.6.1.6.3.1.1.5.4)
– Object Name: 1.3.6.1.6.3.1.1.4.1.0 (iso.3.6.1.6.3.1.1.4.1.0) --> snmpTrap OID
– Value (OID): 1.3.6.1.6.3.1.1.5.4 (iso.3.6.1.6.3.1.1.5.4) --> linkup MIB OID
• 1.3.6.1.2.1.2.2.1.1.9: --> ifIndex MIB OID
– Object Name: 1.3.6.1.2.1.2.2.1.1.9 (iso.3.6.1.2.1.2.2.1.1.9)
– Value (Integer32): 9
• 1.3.6.1.2.1.2.2.1.7.9: --> ifAdminStatus MIB OID
– Object Name: 1.3.6.1.2.1.2.2.1.7.9 (iso.3.6.1.2.1.2.2.1.7.9)
– Value (Integer32): 1
• 1.3.6.1.2.1.2.2.1.8.9: --> ifOperStatus MIB OID
– Object Name: 1.3.6.1.2.1.2.2.1.8.9 (iso.3.6.1.2.1.2.2.1.8.9)
– Value (Integer32): 1
• 1.3.6.1.6.3.1.1.4.3.0: 1.3.6.1.2.1.11 (iso.3.6.1.2.1.11) --> snmpTrapEnterprise
– Object Name: 1.3.6.1.6.3.1.1.4.3.0 (iso.3.6.1.6.3.1.1.4.3.0)
– Value (OID): 1.3.6.1.2.1.11 (iso.3.6.1.2.1.11) ---> snmp OID
285
SNMP TRAPS
CHAPTER 11 SNMPV3
The Spanning tree topology change trap is generated whenever we shut / no shut a port, change the
priority of any bridge to invoke new root selection, new port role selection, etc.
Steps to generate the Spanning Tree trap
1) Change spanning priority to invoke New ROOT bridge selection
2) Bring DOWN an active interface through command “shutdown”
3) Bring UP the same interface through command “no shutdown”
Packet Capture
Below are the MIBs that will be mentioned for different kind of traps from PVRST.
• fsPvrstTopologyChgTrap - 1.3.6.1.4.1.41094.0.250.161.3.0.4
• fsPvrstBrgAddress - 1.3.6.1.4.1.41094.0.250.161.1.4
• fsPvrstInstTopChanges - 1.3.6.1.4.1.41094.0.250.161.1.14.1.11
• fsFuturePvrstTraps - 1.3.6.1.4.1.41094.0.250.161.3
• fsPvrstNewRootTrap - 1.3.6.1.4.1.41094.0.250.161.3.0.3
• fsPvrstInstDesignatedRoot - 1.3.6.1.4.1.41094.0.250.161.1.14.1.16
• fsPvrstNewPortRoleTrap - 1.3.6.1.4.1.41094.0.250.161.3.0.7
• fsPvrstOldRoleType - 1.3.6.1.4.1.41094.0.250.161.2.5.1.2
• fsPvrstPortRoleType - 1.3.6.1.4.1.41094.0.250.161.2.5.1.1
286
SNMP TRAPS
CHAPTER 11 SNMPV3
Temperature Trap
The temperature trap will be generated whenever the temperature of the hardware exceeds the High
threshold limit or falls lesser than the minimum threshold limit. Below is the corresponding MIB ID that
would be mentioned, with the TRAP generated.
• issTrapTemperature - 1.3.6.1.4.1.41094.0.250.2.120.4
• issSwitchMinThresholdTemperature - 1.3.6.1.4.1.41094.0.250.2.121.64
• issSwitchMaxThresholdTemperature - 1.3.6.1.4.1.41094.0.250.2.121.65
• issSwitchCurrentTemperature - 1.3.6.1.4.1.41094.0.250.2.121.66
Steps to generate the Temperature trap
1) Check the current temperature of the hardware using command “show env all”
2) Set the Max temperature threshold limit as lesser than the current temperature, to generate trap,
using the below command.
set switch temperature max threshold <value>
Packet Capture
• data: sNMPv2-Trap (7)
– sNMPv2-Trap
• request-id: 1821105562
• error-status: noError (0)
• error-index: 0
287
SNMP TRAPS
CHAPTER 11 SNMPV3
• variable-bindings: 5 items
Item #1
• name: 1.3.6.1.2.1.1.3.0 (SNMPv2-MIB::sysUpTime.0)
• valueType: value (0)
– value: simple (4294967295)
– value: simple (4294967295)
• application-wide: timeticks-value (3):timeticks-value: 7814
Item #2
• name: 1.3.6.1.6.3.1.1.4.1.0 (SNMPv2-MIB::snmpTrapOID.0)
• valueType: value (0)
– value: simple (4294967295): simple: objectID-value (2)
• Value: OID: SNMPv2-SMI::enterprises.41094.0.250.2.120.4 ---> issTrapTemperature
Item #3
• name: 1.3.6.1.4.1.41094.0.250.2.121.64 (SNMPv2-SMI::enterprises.41094.0.250.2.121.64) --->
issSwitchMinThresholdTemperature
• valueType: value (0)
– value: simple (4294967295):simple: integer-value (0)
• Value: INTEGER: -35
Item #4
• name: 1.3.6.1.4.1.41094.0.250.2.121.65 (SNMPv2-SMI::enterprises.41094.0.250.2.121.65) --->
issSwitchMaxThresholdTemperature
• valueType: value (0)
– value: simple (4294967295):simple: integer-value (0)
• Value: INTEGER: 40
Item #5
• name: 1.3.6.1.4.1.41094.0.250.2.121.66 (SNMPv2-SMI::enterprises.41094.0.250.2.121.66) --->
issSwitchCurrentTemperature
• valueType: value (0)
– value: simple (4294967295):simple: integer-value (0)
• Value: INTEGER: 41
Item #1
• ifSwitchPortSecRecoveryStatus OBJECT-TYPE
– SYNTAX INTEGER { automatic(1), manual(2) }
– MAX-ACCESS read-write
288
SNMP TRAPS
CHAPTER 11 SNMPV3
– STATUS current
– DESCRIPTION
• specifies the recovery mode for the ports in the system, when port-violation mode
configured with shut-down. The value 1 indicates authomatic, the port will bring-up
after the user configured time or the default time. The value 2 indicates manual, The
users have to do no shutdown to bring up the port.
– DEFVAL { manual }
– ::= { if 37 }
Item #2
• ifSwitchPortSecRecoveryTime OBJECT-TYPE
– SYNTAX Integer32
– MAX-ACCESS read-write
– STATUS current
– DESCRIPTION
• The value indicates the the recovery time for a port, from shut-down state that occurred
due to a port-security violation, to up-state, upon the mode configured as automatic in
ifSwitchPortSecRecoveryStatus
– DEFVAL { 5 }
– ::= { if 38 }
Item #3
• dot1qFutureVlanPortUnicastMacLimitStatus OBJECT-TYPE
– SYNTAX EnabledStatus
– MAX-ACCESS read-write
– STATUS current
– DESCRIPTION
• A truth value indicating the unicast MAC limit learning enabled/disabled status for this
port
– DEFVAL { enabled }
– ::= { dot1qFutureVlanPortEntry 17 }
Item #4
• dot1qFutureVlanPortUnicastMacLimit OBJECT-TYPE
– SYNTAX Unsigned32 (0..3000)
– MAX-ACCESS read-write
– STATUS current
– DESCRIPTION
• The limiting value on the number of distinct unicast MAC addresses learnt in a VLAN.
The lower limit and upper limit value that can be SET for this object is determined by the
underlying hardware.
289
SNMP TRAPS
CHAPTER 11 SNMPV3
– ::= { dot1qFutureVlanPortEntry 18 }
Item #5
• dot1qFutureVlanPortSecureStatus OBJECT-TYPE
– SYNTAX EnabledStatus
– MAX-ACCESS read-write
– STATUS current
– DESCRIPTION
• A truth value indicating the port-security status enabled/disabled status for this port.
When port security is disabled, trusted MAC settings and MAC learn limit settings are
not applicable.
– DEFVAL { disabled }
– ::= { dot1qFutureVlanPortEntry 19 }
Item #6
• dot1qFutureSwitchPortSecViolationTrap NOTIFICATION-TYPE
– OBJECTS { dot1qFutureVlanPort }
– STATUS current
– DESCRIPTION
• This trap is generated when Port security is enabled on the port and violation occurred
for a configured number of times
– ::= { dot1qVlanTraps 4 }
Item #7
• MIB for Trap-syslog status configuration
– dot1qFutureVlanPortSecTrapSyslogStatus OBJECT-TYPE
– MAX-ACCESS read-write
– STATUS current
– DESCRIPTION
• A truth value indicating the trap and syslog status for port-security violation is enabled,
and so traps and syslog will be generated when violations occur. When this status for
port-secuirty violation is disabled, traps and syslogs will not be sent upon violation.
– DEFVAL { disabled }
– ::= { dot1qFutureVlan 10 }
Item #8
• MIB for Trap, syslog rate configuration
– dot1qFutureVlanPortSecTrapSyslogRate OBJECT-TYPE
– SYNTAX Integer32 (1..10)
– MAX-ACCESS read-write
– STATUS current
– DESCRIPTION
290
DISABLE SNMPAGENT
CHAPTER 11 SNMPV3
• TrapSyslog rate is the value, for the Max no. of Traps and Syslog that could be sent in a
second, with violation events. The range of trap syslog rate could be configured is from
1 to 10
– ::= { dot1qFutureVlan 11 }
disable
disable snmpagent
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm (config)# disable snmpagent
enable
enable snmpagent
291
SHOW MIB
CHAPTER 11 SNMPV3
Parameters
Mode
Global Configuration Mode
Default
SNMP agent is enabled
Examples
iS5Comm (config)# enable snmpagent
show mib
show mib {name <name string (32)> | oid <oid string (32)>}
292
SHOW SNMP
CHAPTER 11 SNMPV3
Parameters
Mode
Privileged Exec Mode
Examples
iS5Comm# show mib oid fsbgp4PeerExtTable
MIB OID for fsbgp4PeerExtTable is 1.3.6.1.4.1.41094.0.250.41.2
show snmp
show snmp [agentx {information | statistics}] [community] [engineid]
[filter] [group [access]] [inform statistics] [mibproxy] [notif] [proxy]
[proxy-udp-port] [targetaddr] [targetparam] [traps] [user] [viewtree]
Mode
Privileged EXEC Mode
293
SHOW SNMP
CHAPTER 11 SNMPV3
Examples
iS5Comm # show snmp agentx information
Agentx Subagent is enabled
TransportDomain :TCP
Master IP Address :10.0.0.2
Master PortNo :705
iS5Comm# show snmp agentx statistics
Tx Statistics
Transmitted Packets :860
Open PDU :1
Index Allocate PDU :0
Index DeAllocate PDU :0
Register PDU :2
Add Agent Capabilities PDU :0
Notify PDU :0
Ping PDU :20
Remove Agent Capabilities PDU :0
UnRegister PDU :0
Close PDU :0
Response PDU :837
Rx Statistics
Rx Packets :859
Get PDU :1
GetNext PDU :836
GetBulk PDU :0
TestSet PDU :0
Commit PDU :0
Cleanup PDU :0
Undo PDU :0
Dropped Packets :0
Parse Drop Errors :1
Open Fail Errors :0
Close PDU :0
Response PDU :2
iS5Comm# show snmp community
Community Index : NETMAN
Community Name : NETMAN
Security Name : none
Context Name :
294
SHOW SNMP
CHAPTER 11 SNMPV3
295
SHOW SNMP
CHAPTER 11 SNMPV3
IP Address : 10.0.0.10
Inform messages sent : 20
Acknowledgement awaited for : 2 Inform messages
Inform messages dropped : 0
Acknowledgement failed for : 0 Inform messages
Informs retransmitted: 0
Inform responses received: 18
iS5Comm# show snmp mibproxy
Prop Proxy Name : mibproxy1
Prop MibID : 1
Prop Proxy TargetParamIn : param1
Prop Proxy SingleTargetOut : target2
Prop Proxy MultipleTargetOut :
Prop Proxy Type : Read
Prop Storage Type : Nonvolatile
Prop Row Status : Active
----------------------------------------------------
iS5Comm# show snmp notif
Notify Name: Com
Notify Tag: Com
Notify Type: trap
Storage Type: volatile
Row Status: active
----------------------------
Notify Name: Com1
Notify Tag: Com1
Notify Type: trap
Storage Type: volatile
Row Status: active
iS5Comm# show snmp proxy
Proxy Name : proxy1
Proxy ContextEngineID : 80.00.08.1c.04.46.53
Proxy ContextName :
Proxy TargetParamIn : param2
Proxy SingleTargetOut : target2
Proxy MultipleTargetOut :
Proxy Type : Write
Storage Type : Nonvolatile
Row Status : Active
----------------------------------------------------
296
SHOW SNMP
CHAPTER 11 SNMPV3
297
SHOW SNMP-SERVER
CHAPTER 11 SNMPV3
show snmp-server
show snmp-server {proxy-udp-port | traps}
Mode
Privileged EXEC Mode
Examples
iS5Comm# show snmp-server proxy-udp-port
snmp-server proxy-udp-port : 162
iS5Comm# show snmp-server traps
Currently enabled traps:
------------------------
coldstart
298
SNMP
CHAPTER 11 SNMPV3
11.8. snmp
To configure the SNMP, use the command snmp in Global Configuration Mode. The no form of the
command removes the SNMP configuration details.
Use the snmp command to configure the following:
• access—SNMP group access configuration
• agent—SNMP agent related configuration
• community—SNMP community configuration
• enable — Enables the feature
• engineid — SNMP engine ID configuration
• filter — Filter related Configuration
• filterprofile—SNMP notify filter table configuration
• group—SNMP group related configuration
• mib— Management Information Base related configuration
• mibproxy—SNMP MIB proxy related configuration
• notify— SNMP notification details configuration
• proxy— SNMP proxy related configuration
• targetaddr— SNMP target address configuration
• targetparams — SNMP target parameter related configuration
• trap—Trap related configuration
• user—SNMP user details configuration
• view—SNMP view related configuration
snmp
snmp {access <string(32)> {v1 | {v2c | v3 {auth | noauth | priv} [context
<string(32)>] [nonvolatile] [volatile] [notify <string(32)>] [read
<string(32)>] [write <string (32)>]}} | agent port <port number (1-65535)>
| {community index <community index ID (string (32)> name <community name
string)> security <string(32)> [context <Name >] [{volatile | nonvolatile}]
[transporttag <TransportTagIdentifier | none>] [contextengineid <Contex-
tEngineID>]
| enable traps {coldstart | snmp authentication}
| engineid <engine ID (string)>
| filter {<filter profile name string (32)> <object Id string> {excluded
[nonvolatile] [volatile] |included [nonvolatile] [volatile] | mask <OID mask
23 (string)> {excluded [nonvolatile] [volatile] |included [nonvolatile]
[volatile]} | {trap {name <mib OID name(string)> | oid <OID name(string)>
{excluded [nonvolatile] [volatile] |included [nonvolatile] [volatile] | mask
<OID mask 23 (string)>}
299
SNMP
CHAPTER 11 SNMPV3
300
SNMP
CHAPTER 11 SNMPV3
}
snmp
snmp {access | community | enable | engineid | filter | filterprofile |
group | mibproxy | notify | proxy | targetaddr | targetparams | trap | user
| view}
301
SNMP
CHAPTER 11 SNMPV3
Parameters
302
SNMP
CHAPTER 11 SNMPV3
<string (32)> String Enter a write view identifier. The maximum length of the string is
32.
agent Enter to configure the agent port on which agent listens
port Enter to configure an agent port on which agent listens.
<port number Integer Enter a port number. The port number can be from 1 to 65535.
(1-65535)> The default is 161.
community Enter to configure the SNMP community details.
index Enter to configure a community index. The default Community
Index - NETMAN/PUBLIC.
<community String Enter a community index identifier which stores the index value of
index ID the row. This ID must be unique for every community name entry.
(string (32)> The maximum length of the string is 32.
name Enter for community name configuration.
<community name String Enter a community name string. The default Community name -
string> NETMAN/PUBLIC.
security Enter to store the security model of the corresponding Snmp
community name
<string (32)> String Enter a security name. The maximum length of the string is 32.
The default Security Name - None.
context Enter to configure the context in which the management
information is accessed when using the community string
specified by the corresponding instance of snmp community
name
<Name> Enter a name for the context. The default ContextName - Null.
nonvolatile Enter to configure the storage type as permanent. The
configuration is saved on the system, and during restart, the saved
configuration can be viewed. This is default.
volatile Enter to configure the storage type as temporary. During restart of
the system, the configuration setting are erased.
transporttag Enter to configure a set of transport endpoints from which a
command responder application can accept management request
TransportTagIde Enter a transport ID. The default Transport Tag - Null.
ntifier
none Enter for no transport ID.
303
SNMP
CHAPTER 11 SNMPV3
contextengineid Enter to configure the location of the context through which the
management information is accessed when using the community
string specified by the corresponding instance of SNMP
community name
<ContextEngineI A.B.C.D. Enter for context engine ID. The default Context EngineID -
D> E.F.G 80.00.08.1c.04.46.53.
enable Enter to enable trap related configuration.
traps Enter to configure trap related configuration.
coldstart Enter to configure cold start trap.
snmp Enter to configure SNMP related configuration.
authentication Enter for authentication related configuration
engineid Enter to configure the engine ID that is utilized as a unique
identifier of a SNMPv3 engine. This engine ID is used to identify a
source SNMPv3 entity and a destination SNMPv3 entity to
coordinate the exchange of messages between the source and the
destination.
<engine ID Enter a engine ID string. The default is 80.00.08.1c.04.46.53. The
(string)> Engine ID must be given as octets in hexadecimal separated by
dots and the allowed length is 5 to 32 octets.
NOTE: SNMP engine ID is an administratively unique identifier.
Changing the value of the SNMP engine ID has significant effects
All user information will be updated automatically to reflect the
change
filter Enter to configure Notify filter Profile entry.
<filter profile String Enter a name of the filter profile. This is a string value with a
name string maximum size as 32.
(32)>
<object Id String Enter to configure the object Identifier.
string>
excluded Enter to configure that the family of subtrees defined by the OID
and mask is excluded from the filter profile.
included Enter to configure that the family of subtrees defined by the OID
and mask is included in the filter profile.
304
SNMP
CHAPTER 11 SNMPV3
305
SNMP
CHAPTER 11 SNMPV3
306
SNMP
CHAPTER 11 SNMPV3
307
SNMP
CHAPTER 11 SNMPV3
<proxy id String Enter an unique identifier for an entry in the proxy table. This
string (32)> value is a string of maximum size 32
proxytype Enter for SNMP proxy message type configuration.
inform Enter to set that Inform type messages are forwarded using
translation parameters
read Enter to set that Read type messages are forwarded using
translation parameters
trap Enter to set that Trap type messages are forwarded using
translation parameters
write Enter to set that Write type messages are forwarded using
translation parameters
contextengineid Enter to configure an context engine ID in messages that is
forwarded using the translation parameters defined by the entry
<contextengine String Enter a context engine ID.
ID>
targetparamsin Enter to denote the row of snmpProxyTable to be used for
forwarding received messages.
<target ID String Enter a target Id string.
string (32)>
targetout Enter to select management target defined in
snmpTargetAddrTable.
NOTE: For Single TargetOut—this is only used when selection of a
single target is required (i.e. when forwarding an incoming read or
write request).
For Multiple Target Out—this is only used when selection of
multiple targets is required (i.e. when forwarding an incoming
notification.
<target ID String Enter a target Id string.
string (32)>
contextname Enter to set storage type
<ProxyContextNa String Enter to configure the storage type as permanent. The
me (string>) configuration is saved on the system, and during restart, the saved
configuration can be viewed.
storagetype Enter to set storage type
308
SNMP
CHAPTER 11 SNMPV3
309
SNMP
CHAPTER 11 SNMPV3
taglist Enter to configure the tag identifier that selects the target address
for the SNMP.
<tag ID string String Enter a tag identifier. This value is an octet string of maximum size
(255)> 255.The tag ID can also be set as none using the none option.
timeout Enter to configure the time for which the SNMP agent waits for a
response from the SNMP Manager before retransmitting the
Inform Request Message.
<Timeout value Integer Enter a time for which the SNMP agent waits for a response. This
(1-1500)> value ranges from 1 to 1500 seconds. The default is 1500.
volatile Enter to configure the storage type as temporary. During restart of
the system, the configuration setting are erased.
targetparams Enter to configure the SNMP group details.
NOTE: User information should be configured prior to the configu-
ration of SNMP target parameters. See snmp user.
<SNMP param String Enter a name for an SNMP group.
string (32)>
user Enter to set an user for the configured group. The default is
UserName - Initial.
<user name String Enter an user name.
string(32)>
security-model Enter to set the security model for SNMP.
NOTE: SNMP passwords are localized using the local SNMP engine
ID.
v1 Enter to configure the SNMP version as Version 1.
v2c Enter to configure the SNMP version as Version 2.
v3 Enter to configure the SNMP version as Version 3. This is the most
secure model.
auth Enter to enables Message digest (MD5) or Secure Hash Algorithm
(SHA) packet authentication. The default Authentication Protocol
is None.
noauth Enter to configure no authentication
priv Enter to configure both authentication and privacy. The default
Privacy Protocol - None.
310
SNMP
CHAPTER 11 SNMPV3
311
SNMP
CHAPTER 11 SNMPV3
312
SNMP
CHAPTER 11 SNMPV3
<authent_passwo String Enter to set the authentication password that will be used for the
rd configured authentication algorithm.
random_str(8-40
)>
volatile Enter to configure the storage type as temporary. During restart of
the system, the configuration setting are erased.
engineid Enter to configure the engine ID that is utilized as a unique
identifier of a SNMPv3 engine. This engine ID is used to identify a
source SNMPv3 entity and a destination SNMPv3 entity to
coordinate the exchange of messages between the source and the
destination
<engine ID String Enter a engine ID string.
(string)>
view Enter to configure the SNMP view.
<view name String Enter a view name for which the view details are to be configured.
string (32)> This is a string value with maximum size as 32.
<OIDTree> Enter to specify the sub tree value for the particular view. The
default OIDTree is 1.
excluded Enter to configure that the family of subtrees defined by the OID
and mask is excluded from the filter profile.
included Enter to configure that the family of subtrees defined by the OID
and mask is included in the filter profile. This is default.
nonvolatile Enter to configure the storage type as permanent. The
configuration is saved on the system, and during restart, the saved
configuration can be viewed. This is the default.
volatile Enter to configure the storage type as temporary. During restart of
the system, the configuration setting are erased
mask Enter for AES CTR128 related configuration
<OIDMask> String Enter to specify the mask value for the particular view. The default
OIDMask is 1.
Mode
Global Configuration Mode
313
SNMP
CHAPTER 11 SNMPV3
Examples
SNMPv3 Configuration
iS5Comm (config)# snmp access myv3group v1 read v2readview write v2writeview notify v2notifyview
nonvolatile
iS5Comm (config)# snmp community index myv3com name myv3com security xyz context myinst
nonvolatile transporttag myv3tag
iS5Comm (config)# snmp agent port 100
iS5Comm (config)# snmp engineid 80.0.08.1c.04.5f.a9
iS5Comm (config)# snmp proxy name proxy1 proxytype write contextengineid 80.0.08.1c.04.46.53
targetparamsin param2 targetout target2
iS5Comm (config)# snmp mibproxy name mibproxy1 proxytype read mibid 1 targetparamsin param1
targetout target2 storagetype nonvolatile
iS5Comm (config)# snmp view v2readview 12.0.0.1 mask 1.1.1.1 included nonvolatile
iS5Comm (config)# snmp targetaddr ad1 param p1 10.3.21.3 timeout 1 volatile port 2
iS5Comm (config)# snmp targetparams param1 user user1 security-model v3 noauth
message-processing v3
iS5Comm (config)# snmp user user1
iS5Comm (config)# snmp notify note1 tag tag1 type Inform
iS5Comm (config)# snmp filter trap name fsbgp4PeerExtTable
iS5Comm (config)# snmp filterprofile filter1 1.5 mask 1.1 included nonvolatile
SNMP v2 Configuration
iS5Comm# configure terminal
iS5Comm (config)# snmp user testerv2
iS5Comm (config)# snmp community index public name public security testerv2
iS5Comm (config)# snmp group groupv2 user testerv2 security-model v2c
iS5Comm (config)# snmp access groupv2 v2c read iso write iso notify iso
iS5Comm (config)# snmp view iso 1.1 included
iS5Comm (config)# snmp targetaddr PC1 param paramlist1 192.168.10.254 taglist taglist1
iS5Comm (config)# snmp targetparams paramlist1 user testerv2 security-model v2c message-processing
v2c
iS5Comm (config)# snmp notify PUBLIC tag taglist1 type Trap
314
SNMPGET MIB
CHAPTER 11 SNMPV3
snmpget mib
snmpget mib {name <name string (32)> | oid <oid string (32)>} [short]
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# snmpget mib name fsbgp4PeerExtConfigurePeer.12.0.0.1 short
315
SNMP-SERVER
CHAPTER 11 SNMPV3
snmpgetnext mib
snmpgetnext mib {name <value string (32)> | oid <oid string (32)> value
<value string (32)>} [short]
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm (config)# snmpgetnext mib name fsbgp4PeerExtTable short
11.11. snmp-server
To enable trap related configuration, and configure the TCP port, the UDP and the proxy UDP port over
which the agent sends the trap, use the command snmp-server in Global Configuration Mode. The no
form of the command disables generation of authentication traps and a coldstart trap, and configures
the SNMP agent to send SNMP message on default TCP port or default UDP port.
snmp-server
snmp-server {enable traps {coldstart | snmp authentication} | trap
{proxy-udp-port <port number (1-65535)>} | {udp-port <port number
(1-65535)>}}
316
SNMP-SERVER
CHAPTER 11 SNMPV3
no snmp-server
no snmp-server {enable | trap}
Parameters
Mode
Global Configuration Mode
Default
snmp-server is disabled
317
SNMPSET MIB
CHAPTER 11 SNMPV3
Examples
iS5Comm (config)# snmp-server enable traps snmp authentication
iS5Comm (config)# snmp-server enable traps coldstart
iS5Comm (config)# snmp-server trap udp-port 1234
iS5Comm (config)# snmp-server trap proxy-udp-port 162
snmpset mib
snmpset mib {name <name string (32)> value <value string (32)> | oid <oid
string (32)> value <value string (32)>} [short] [input <input value>]
318
SNMPWALK MIB
CHAPTER 11 SNMPV3
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm (config)# snmpset mib name snmpListenTcpPort.0 value 145 short 1
319
SNMPWALK MIB
CHAPTER 11 SNMPV3
snmpwalk mib
snmpwalk mib {name <value string (32)> | oid <oid string (32)> value <value
string (32)>} [count <integer(1-100)>] [short]
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm (config)# snmpwalk mib name fsbgp4PeerExtTable
iS5Comm # snmpwalk mib name fsbgp4PeerExtTable count 1 short1
320
SEVERITY
CHAPTER 12 SYSLOG
Syslog
12. Syslog
System Log (Syslog) is an RFC 3164 compliant protocol. The syslog protocol provides a transport to allow
a machine to send event notification messages across IP networks to event message collectors (aka
syslog servers). A Syslog message is any IP packet sent via Syslog protocol using UDP port 514 (by default).
These messages are generated instantly as and when an event (e.g. Interface UP/DOWN, login/logout,
save and restore config, max temperature threshold) occurs during the device’s operation.
The full format of a Syslog message seen on the wire has three discernable parts. The first part is called
the PRI, the second part is the header, and the third part is the MSG. The total length of the packet must
be 1024 bytes or less. The switch ensures that each syslog message do not exceed 1024 bytes.
In its first PRI part, every syslog message contains a Priority value which represents both the Facility and
Severity. The HEADER consists of VERSION, TIMESTAMP, HOSTNAME (or IPv4 or IPv6 address),
APP-NAME, PROCID, and MSGID. The TIMESTAMP field is the local time and is in the format of "Mmm dd
hh:mm:ss" (without the quote marks) value in “mmm dd hh:mm:ss” format.
The device allows an administrator to direct the log messages to local storage (RAM/Flash) or to remote
Syslog server which runs in any Linux/Windows machine. In case of remote logging, the switch uses
IP-based communication to log message to remote server. Syslog client in the switch can also send the
same message to different collector if configured by the administrator. One of the fundamental tenets
of the syslog protocol and process is its simplicity. The transmission of syslog messages may be started
on a device without a receiver being configured, or even actually physically present. This simplicity has
greatly aided the acceptance and deployment of syslog.
12.1. Severity
Each message Priority has a decimal Severity level indicator between 0 – 7. The lower the value, the
higher the priority. The switch’s Software is provisioned with more than 1500 SYSLOG messages covering
errors, alerts, and major events. Table 1 shows the list of all severity levels along with their numerical
values.
Table 1: Severity Levels (Sheet 1 of 2)
Keywor
Value Severity d Description Condition
321
PRIORITY
CHAPTER 12 SYSLOG
Keywor
Value Severity d Description Condition
12.2. Priority
Each syslog message includes a priority value in the beginning of the text message. The priority value
ranges between 0 to 191 and it made up of facility and severity values. The priority is enclosed with in
“<>” delimiters. The formula for calculating the priority value is:
Priority Value = Facility Level Numerical Value + Severity Value
For example, for a local4 message (Facility level value 160) with a Severity of Notice (Severity=5), the
Priority would have a Priority value of 165.
12.3. Facility
Facility code is used to specify the type of program logging the message. Messages with different facili-
ties can be handled differently. This term comes into picture when we start using remote logging mech-
anism. There are total of 8 facility levels ranging between local0 and local7. Each facility level has a value
assigned to it—local0 (128), local1 (136), local2 (144), local3(152), local4(160), local5(168), local6(176),
322
EXAMPLE OF VALID SYSLOG MESSAGE
CHAPTER 12 SYSLOG
and local7 (184). The switch is configured with default facility level (local0) and all messages are sent with
this facility level unless configured to use different facility level. The idea of the facility level configuration
is to differentiate and filter logs.
Shown below is the list of factory default values configured after a clean start.
• Local logging in RAM is enabled by default
• Default number of syslog messages stored in RAM is 200
• Default severity level is Critical
• Default facility level is local0.
• Default flash file size is 1MB in case that flash logging is configured.
323
CLI COMMANDS FOR LOCAL LOGGING METHOD 1
CHAPTER 12 SYSLOG
In this mechanism, the Syslog messages are stored in RAM. Syslog client in the switch can store 200
messages (default) at a time which can be configured to maximum of 4096 messages. Once the maximum
level is reached, it rolls on i.e. the latest messages will be displayed and the oldest messages will be
erased.
There is a rule in local logging mechanism as per which all levels below the configured reference severity
level are automatically logged. For example, if critical is the default level with priority value of 2, the
levels below are alert with a value of 1 and emergency (level 0). Both below levels are automatically
logged. Therefore, there will be no need for configuration needed if the administrator needs to log only
critical and levels below messages. If we had configured the logging severity as debugging whose value
is 7 (the maximum), in that case, all severity levels (7-0) would have been logged automatically
From the above shown CLI commands, the logging severity level is configured as debugging, and hence
the priority value below 7 (emergency/alert/critical/error/warning/notice/info/debug) is automatically
logged in RAM.
The “show logging” command lists all captured syslog messages in RAM. It displays the latest collected
logs and deletes the oldest messages. The buffer size is set to max 4096 and the facility level configured
is local0 (see below).
System Log Information
324
LOCAL LOGGING MECHANISM 2
CHAPTER 12 SYSLOG
----------------------
Syslog logging : enabled(Number of messages 127)
Console logging : disabled(Number of messages 0)
TimeStamp option : enabled
Severity logging : Critical
Facility : local1
Buffered size : 4096 Entries
This second local logging method is storing syslog messages in flash memory. We can set a file name of
user choice in a flash and redirect all syslog messages to the created file. First, we create a file name and
next associate the messages (based on severity) to the log file.
Each created file can accommodate 10MB of data. Once the 10 MB data quota is reached, the log
messages will be moved to the same file name with a .bk extension and a new file will be created (with
the same name) in which the live logging will continue. This process is a repeating cycle, as each time 10
MB of data is reached, the old logs are moved to a .bk file and the live logging takes place in a new file.
So, the flash consumption is restricted to max of 20MB (10 MB for. bk file which has the old log messages
and 10 MB where the current live logging takes place).
The original command provided was as shown in Table 6. In the original command, the user had to
provide the priority value between 0-191. It is a bit tedious process to choose the value as the user had
325
FLASH SPACE RESTRICTION MECHANISMS
CHAPTER 12 SYSLOG
to do some calculation of the priority based on the numerical values of facility and severity level of the
syslog message that needs to be logged on.
Therefore, the command had been simplified as shown in Table 5. The user does not need to provide the
hard coded value but rather just specify the severity of the message that needs to be logged into the file.
Table 4: Old Logging-file CLI Command
logging-file <short (0-191)> <string (32)> 0-191 is the priority value that user should
provide and the string is the file name.
logging local {buffered [<short (1-4096)>]| flash Simplified command which logs based on severity
{{{alerts | critical | debugging |emergencies | level specified by user. At backend, we calculate
errors | informational|notification | warnings} the associated priority.
file <string(32)>} | size <integer (1-10)> }}
logging local flash debugging file one Redirects debugging severity to flash file “one”
logging local flash critical file two Redirects critical severity to flash file “two”
logging local flash alert file three Redirects alert severity to flash file “three”
no logging local flash debugging file one Unconfigures the local flash logging for
debugging severity for flash file “one”
no logging local flash critical file two Unconfigures the local flash logging for
criticalseverity for file named “two”.
no logging local flash alert file three Unconfigures the local flash logging for
alertseverity for file name “three”.
All Syslog and other log files (fsir.log.xxx & audit log) are created and stored under /mnt/log flash folder.
The capacity of the log folder is 118 MB. To prevent the flash log folder getting fully occupied, a restric-
tion mechanism had been devised.
326
ERROR MESSAGES
CHAPTER 12 SYSLOG
When the usage of this folder reaches the threshold, in the console prompt, a warning message such as
the one shown below is generated for the user. The warning will appear every time when there is an
attempt for a syslog message to be logged in a flash file and until space in the flash file is freed.
Warning: Syslog flash storage crossed its threshold limit. Do you want to
erase logs (Y/N) [N]?
If an user presses Yes, all log files in the flash log directory will be deleted.
If an user selects No or just presses Enter (i.e. the default option which is No is activated), the console
prompt is returned to normal operation. The administrator can later transfer the log messages from the
flash directory to an external Windows / Linux machine and erase the logs to save space. The CLI config-
uration commands to do the same are outlined in Table 6.
Table 6: Copy and Erase Flash Log CLI Commands
copy flash log threetftp://192.168.10.66/three Copies flash file “three” to remote machine
copy flash log threetftp://192.168.10.66/syslog The source file and the destination file don’t
need to be same.
erase flash log three This CLI command deletes the specific log file in
flash named “three”
When the flash is occupied to its maximum capacity of 118 MB, a second level of restriction mechanism
is activated, and an error message as captured below is generated. The user will be prevented from
creating new file.
iS5Comm <config># syslog filename-two <string(32)>
ERROR: Flash space exhausted. Please delete log files and then try again
iS5Comm <config>#
12.15. USB option for copying logs to external USB flash drive
There will be a new CLI command added for copying the Syslog file from internal flash to external USB
flash drive. The command is outlines in the table below.
327
CLI COMMAND FOR LISTING FILE CONTENTS OF FLASH
CHAPTER 12 SYSLOG
copy flash log three usb three Copies internal flash (source) file named “three”
to USB drive with destination name as given by
the user.
copy flash log three usb syslog The source file and destination file don’t need to
be same.
328
FIRMWARE UPGRADE – LOGGING OF THE PROGRESS
CHAPTER 12 SYSLOG
• When Firmware upgrade process is started, the device should be rebooted to verify the upgrade
was successful.
• To log the firmware upgrade, a log message is added to note that the firmware upgrade is in prog-
ress along with the current SW version.
<130>Dec 4 15:55:48 192.168.10.1 ISS TFTP Firmware upgrade in
progress..!! current sw version: [1.18.01A001]
<130>Dec 4 15:55:48 192.168.10.1 ISS MSR System Reloas Requested
• Additionally, there is always a log to note the current version of the SW in every boot.
<130>Dec 4 15:55:48 192.168.10.1 ISS MSR System Reloas Requested
<130>Dec 4 15:55:48 192.168.10.1 ISS MSR Device Successfully bootes with
sw version [1.18.01A001]
• The combination of the above two logs from a syslog file would help to know if there was a
successful upgrade, or if there was a change in version.
The remote logging is transferring the Syslog messages to syslog remote server running in any
Windows/Linux machine. These messages are transferred instantly when an event (e.g. Link up/down,
attaining max temperature threshold) occurs in the switch via a UDP socket. These messages can be
filtered based on the severity & facility level.
For the remote logging to take place, first we need to set the reference severity, and then configure
which severity to be logged to the remote syslog server. The default logging severity is Critical (3). So,
when an event occurs the SYSLOG client application first check if the severity level of the message is less
that or equal to reference severity level, and second, it checks if there is any remote server configured
for that severity. Only if both conditions are satisfied, the log will be transferred to the remote server.
The original CLI command for logging the message to remote server is shown in Table 10. In a similar
manner as the logging-file CLI command, this command also requires a user to specify the priority value
between 0-191. loggingfile CLI command had been replaced with a CLI commands for remote logging
which uses severity levels instead of priority levels. The new CLI commands for remote logging are
displayed in Table 10.
329
REMOTE LOGGING SYSLOG CLI COMMANDS
CHAPTER 12 SYSLOG
logging-server <short (0-191)> {ipv4<ucast_addr> 0-191 is the priority value that the switch
|ipv6 <ip6_addr>|<dns_host_name>} [ port requiresthe user to configure.
<integer (1- 65535)>]
logging remote {alerts | critical | debugging| Simplified command for setting the remote
emergencies | errors | informational logging severity based on the severity rather than
|notification | warnings} {ipv4 <ucast_addr> priority. At backend we calculate theassociated
|ipv6 <ip6_addr> | <dns_host_name>} [ priority.
port<integer (1-65535)>] [{udp | tcp | beep}]
logging remote alerts ipv4 < syslog-server Logs alert level messages
IPaddress>
logging remote critical ipv4 < syslog-serverIP Logs critical level messages
address>
logging remote debugging ipv4 < syslog-serverIP Logs debugging level messages
address>
logging remote emergencies ipv4 < syslogserver Logs emergency level messages
IP address>
logging remote errors ipv4 <syslog-server Logs error level messages
IPaddress>
logging remote informational ipv4 <syslogserver Logs informational level messages
IP address>
logging remote notification ipv4 <syslogserver IP Logs notification level messages
address>
logging remote warnings ipv4 <syslog-server IP Logs warning level messages
address>
no logging remote alerts ipv4 <syslog-server IP Unconfigures the remote logging server for alerts
address> severity level.
no logging remote critical ipv4 <syslog-server IP Unconfigures the remote logging server for
address> critical severity level
We can have maximum of seven different syslog server IP address configurations, and ideally each
severity level (total 0 - 7) can be logged to eight different servers.
330
REMOTE LOGGING SYSLOG FACILITY LEVEL CONFIGURATION
CHAPTER 12 SYSLOG
There are eight facility levels in total which can be configured. The purpose of these commands is to
differentiate and filter syslog messages in the external syslog severs. The default facility is Local0.
Table 11: Remote Logging Syslog Facility Level CLI Commands
331
SYSLOG LIST
CHAPTER 12 SYSLOG
332
SYSLOG LIST
CHAPTER 12 SYSLOG
333
SYSLOG LIST
CHAPTER 12 SYSLOG
334
SYSLOG LIST
CHAPTER 12 SYSLOG
335
SYSLOG LIST
CHAPTER 12 SYSLOG
336
SYSLOG LIST
CHAPTER 12 SYSLOG
337
SYSLOG LIST
CHAPTER 12 SYSLOG
338
SYSLOG LIST
CHAPTER 12 SYSLOG
339
SYSLOG LIST
CHAPTER 12 SYSLOG
340
SYSLOG LIST
CHAPTER 12 SYSLOG
341
SYSLOG LIST
CHAPTER 12 SYSLOG
342
SYSLOG LIST
CHAPTER 12 SYSLOG
343
SYSLOG LIST
CHAPTER 12 SYSLOG
344
SYSLOG LIST
CHAPTER 12 SYSLOG
345
SYSLOG LIST
CHAPTER 12 SYSLOG
346
SYSLOG LIST
CHAPTER 12 SYSLOG
347
SYSLOG LIST
CHAPTER 12 SYSLOG
348
SYSLOG LIST
CHAPTER 12 SYSLOG
349
SYSLOG LIST
CHAPTER 12 SYSLOG
350
SYSLOG LIST
CHAPTER 12 SYSLOG
351
SYSLOG LIST
CHAPTER 12 SYSLOG
352
SYSLOG LIST
CHAPTER 12 SYSLOG
353
SYSLOG LIST
CHAPTER 12 SYSLOG
354
LOGGING
CHAPTER 12 SYSLOG
12.25. logging
To enable the Syslog server and configure Syslog related parameters, use the command logging in Global
Configuration Mode. The no form of the command disables syslog server and resets the configured
parameters. The existing syslog buffers will not be cleared and none of the configured options will be
changed, when the Syslog feature is disabled.
The logging process controls the distribution of logging messages to the various destinations, such as the
logging buffer, logging file, or Syslog server.
355
LOGGING
CHAPTER 12 SYSLOG
The log file is stored in ASCII text format. The Privileged EXEC command is used to display its contents.
logging
logging {console
| facility {local0 | local2 | local3 | local4 | local5 | local6 | local7} |
local {buffered <buffer size integer (1-4096)> | {flash {alerts | critical |
debugging | emergencies | errors | informational | notification | warnings}
file <file name string (32)>}
| on
| remote {alerts | critical | debugging | emergencies | errors | informa-
tional | notification | warnings} {<dns_host_name> | ipv4 <ucast_addr> |
ipv6 <ipv6_addr>} [ port < integer(1-65535) > ] [ { udp | tcp | beep | tls } ]
| severity [<level value (0-7)>] [alerts] [critical] [debugging] [emergen-
cies] [errors] [informational] [notification] [warnings]}
no logging
no logging {buffered | console | facility | local | on | remote | severity}
356
LOGGING
CHAPTER 12 SYSLOG
Parameters
console Enter to enable Syslog server and configure the Syslog server IP
address, the log-level and other Syslog related parameters.
facility Enter to configure facility code level. Messages with different facilities
can be handled differently. There are total of 8 facility levels ranging
between local0 and local7. Each facility level has a value assigned to
it—local0 (128), local1 (136), local2 (144), local3(152), local4(160),
local5(168), local6(176), and local7 (184). The idea of the facility level
configuration is to differentiate and filter logs.
local0 Enter to have facility is set as local0. Default facility level is local0.
local1 Enter to have facility is set as local1.
local2 Enter to have facility is set as local2.
local3 Enter to have facility is set as local3.
local4 Enter to have facility is set as local4.
local5 Enter to have facility is set as local5.
local6 Enter to have facility is set as local6.
local7 Enter to have facility is set as local7.
<file size Integer Enter a number for the maximum size (in MB) of the log file.
integer
(1-10>
local Enter to enable local logging.
buffered Enter to configure the limit for the Syslog messages displayed from an
internal buffer.
<buffer Enter a number of entries for buffer size. The default size is 200 entries.
size
integer
1-4096)>
flash Enter to enable local logging. The severity is as follows.
alerts Enter to configure logging when immediate action must be taken. For
example, a condition that should be corrected immediately, such as a
corrupted system database.
critical Enter to configure logging for Critical conditions. For example, hard
device errors.
357
LOGGING
CHAPTER 12 SYSLOG
358
SYSLOG FORMAT
CHAPTER 12 SYSLOG
Mode
Global Configuration Mode
Examples
iS5Comm(config)# logging local buffered 200
iS5Comm(config)# logging facility local1
iS5Comm(config)# logging remote alerts ipv4 192.168.20.77 port 15010 tls
iS5Comm(config)# no logging remote alerts ipv4 192.168.20.77
iS5Comm(config)# logging remote alerts ipv4 192.168.20.77 tls
syslog format
syslog format { rfc3164 | rfc5424 }
Parameters
Mode
Global Configuration Mode
359
SYSLOG FORMAT
CHAPTER 12 SYSLOG
Examples
iS5Comm(config)# syslog format rfc5424
NOTE: Changing the syslog format will erase the local/remote logging configurations. If the syslog format
is changed, the following message will appear.
Reconfiguring syslog format ...
Done!
NOTE: Now Syslog supports host name and Msg ID (for rfc5424).
Fields Description
• <129>—Priority
• Feb 13 06:13:40—Timestamp
• lower-mid—Hostname
• ISS—MSG (Tag)
• CFA vlan1 Link Status [Down]—MSG (Content)
Fields Description
• <130>—Priority
360
SYSLOG FORMAT
CHAPTER 12 SYSLOG
• 1—Version
• 2070-02-13T06:39:41.813382-04:00—Timestamp
• lower-mid—Hostname
• ISS—AppName
• 2142—Proc ID
• MRPRING—Msg ID
• -—Proc ID
• MRPRING Port 1: state changed to Blocking—Message
Fields Description
• LOCAL0.INFO—Priority
• Feb 13 06:51:30—Timestamp
• lower-mid—Hostname
• ISS—MSG (Tag)
• CLI User admin logged out from console—MSG(Content)
Fields Description
361
SYSLOG FORMAT
CHAPTER 12 SYSLOG
Audit-Logging
1) Log file can be created/maintained on the local machine or/and log messages can be sent to the
remote machine.
2) Logs should be recorded in Syslog format RFC 5424 or 3164.
362
SECURE LOGGING CRYPTO KEY
CHAPTER 12 SYSLOG
Description
This CLI helps to configure the certificates required for secure syslog communication over TLS. We need
three files, certificate signed by CA, private key and a root CA. This is a global settings and there is no
unconfigure command. User can just overwrite the file name if he needs to use a different certificate.
These key and certificates will take effect only when user configures his transport mode as TLS.
These certificates are generated/imported using crypto PKI infrastructure.
This command execution will throw error when the corresponding certificate or key file is not already
generated or imported using PKI tool.
363
MAIL-SERVER
CHAPTER 12 SYSLOG
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# secure logging crypto key r1Key.pem cert r1Cert.pem ca-cert CA.pem
Related Commands:
iS5Comm# show crypto pki
12.28. mail-server
To configures the mail server address used for sending email alert messages, use the command
mail-server in Global Configuration Mode. The no form of the command deletes the mail server address
from the mail table.
mail-server
mail-server <short(0-191)> {ipv4 <ucast_addr> | ipv6 <ip6_addr> |
<dns_host_name>} <string(50)> [user <user_name> password <password>]
no mail-server
no mail-server <short(0-191)> {ipv4 <ucast_addr> | ipv6 <ip6_addr> |
<dns_host_name>}
364
MAIL-SERVER
CHAPTER 12 SYSLOG
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# mail-server 190 ipv4 23.78.67.89 support@mycompany.com
365
SENDER
CHAPTER 12 SYSLOG
12.29. sender
To set the sender mail id from which the email alert messages are sent, use the command sender in
Global Configuration Mode. The no form of the command deletes the configured sender mail id.
sender
sender mail-id <mail-id string(100)>
no sender
no sender mail-id
Parameters
Mode
Global Configuration Mode
Prerequisites
This command can be executed only if the mail server is configured.
Examples
iS5Comm(config)# sender mail-id plabinik@mycompany.com
12.30. cmdbuffs
To configure the number of syslog buffers for a particular user, use the command cmdbuffs in Global
Configuration Mode.
cmdbuffs
cmdbuffs <user name> <no.of buffers (1-200)>
366
CLEAR LOGS
CHAPTER 12 SYSLOG
Parameters
Mode
Global Configuration Mode
Default
50
Examples
iS5Comm(config)# cmdbuffs myuser 50
clear logs
clear logs
Mode
Privileged EXEC Mode / Global Configuration Mode
Examples
iS5Comm(config)# clear logs
367
SYSLOG
CHAPTER 12 SYSLOG
12.32. syslog
To configure the first file, the second, and third file to store the syslog messages locally, enable the syslog
file storage to log the status in the local storage path, enable the syslog mail storage in the system, set
the profile for reliable syslog, change the syslog role from device to relay, set the Syslog relay transport
type either as UDP or TCP, use the command syslog in Global Configuration Mode. By enabling syslog
mail storage, the device sends the syslog messages as mail messages to the mail-server configured in the
system. The no form of command disables the syslog mail storage, the mail option in syslog, sets the
profile to default (raw), changes the syslog role from relay to device, and Set the Syslog Port to default
port 514.
syslog
syslog {filename-one <filename <string(32)> | filename-two <filename
<string(32)> | filename-three <filename <string(32)> localstorage | mail |
profile {raw |cooked} | relay [<port number (0-65535)>] [transport type {tcp
| udp} | relay-port <port number (0-65535)>}
no syslog
no syslog {localstorage | mail | profile | relay | relay-port}
368
SYSLOG
CHAPTER 12 SYSLOG
Parameters
filename-one Enter to configure a first file to store the syslog messages locally.
NOTE: This command is executed only if syslog local storage is enabled.
<filename String Enter a name for the first file. The maximum size of the file name is
<string(32)> 32 characters.
filename-two Enter to configure a second file to store the syslog messages locally
NOTE: This command is executed only if syslog local storage is enabled.
<filename String Enter a name for the second file. The maximum size of the file name
<string(32)> is 32 characters.
Enter to configure a third file to store the syslog messages locally.
filename-three NOTE: This command is executed only if syslog local storage is enabled.
<filename String Enter a name for the third file. The maximum size of the file name is
<string(32)> 32 characters.
localstorage Enter to enable the syslog file storage to log the status in the local
storage path.
mail Enter to enable the syslog mail storage in the system. By enabling
syslog mail storage, the device sends the syslog messages as mail
messages to the mail-server configured in the system.
profile Enter to set the profile for reliable syslog.
raw Enter to set the syslog profile as raw which is the profile for the
transport type beep. This is the default option.
cooked Enter to set the syslog profile as cooked.
relay Enter to change the syslog role from device to relay.
NOTE: This command is executed only if syslog local storage is enabled.
<port number Intege Enter a port number through which syslog messages are received.
(0-65535)> r The default port is 514.
transport Enter to configure the Syslog transport/
type Enter to configure the Syslog transport type.
tcp Enter to configure the Syslog transport type as TCP.
udp Enter to configure the Syslog transport type as UDP.
relay-port Enter to setsthe syslog port through which the relay receives the
syslog messages irrespective of the transport type
369
SHOW LOGGING
CHAPTER 12 SYSLOG
<port number Intege Enter a port number through which syslog messages are received.
(0-65535)> r The default port is 514.
Mode
Global Configuration Mode
Examples
iS5Comm(config)# syslog filename-one Com1
iS5Comm(config)# syslog filename-two Com2
iS5Comm(config)# syslog filename-three Com3
iS5Comm(config)# syslog localstorage
iS5Comm(config)# syslog mail
iS5Comm(config)# syslog profile raw
iS5Comm(config)# syslog relay
iS5Comm(config)# syslog relay transport type udp
show logging
Mode
Privileged EXEC Mode
Examples
iS5Comm# show logging
System Log Information
----------------------
Syslog logging : enabled(Number of messages 159)
370
SHOW FLASH LOGS
CHAPTER 12 SYSLOG
Mode
Privileged EXEC Mode
Examples
iS5Comm # show flash logs
Name: fsir.log.2452 , Size: 4630 , Updated: Mon Aug 6
04:14:23 2018Name: fsir.log.2424 , Size: 208 , Updated: Mon
Nov 5 00:14:18 2018Name: fsir.log.2421 , Size: 81 ,
Updated: Mon Nov 5 00:44:10 2018
371
SHOW SYSLOG
CHAPTER 12 SYSLOG
Mode
Privileged EXEC Mode
Prerequisites
This command is executed only if mail server is configured.
Examples
iS5Comm# show email alerts
Sender email-id : support@mycompany.com
show syslog
show syslog {file-name | information | localstorage | mail | profile | relay
[transport type] | relay-port | role}
372
SHOW SYSLOG
CHAPTER 12 SYSLOG
Parameters
file-name Enter to display all file names for Syslog local storage.
information Enter to display the status of consolidated syslog log information.
localstorage Enter to display the Syslog local storage.
mail Enter to status of the mail option.
profile Enter to display the Syslog profile.
relay Enter to display the Syslog relay transport type.
transport Enter to display the Syslog relay transport type.
type Enter to display the Syslog relay transport type.
relay-port Enter to display the relay port related configuration.
role Enter to display the Syslog role.
Mode
Privileged EXEC Mode
Examples
iS5Comm# show syslog file-name
Syslog File Name
----------------------
Syslog File-One :one
Syslog File-Two :
Syslog File-Three :
iS5Comm# show syslog information
System Log Information
----------------------
Syslog Localstorage : Enabled
Syslog Mail Option : Disabled
Syslog Port : 514
Syslog Role : Relay
Smtp Authentication : None
iS5Comm# show syslog localstorage
Syslog Localstorage: Enabled
373
SHOW LOGGING-SERVER
CHAPTER 12 SYSLOG
show logging-server
Mode
Privileged EXEC Mode
Examples
iS5Comm# show logging-server
Syslog Forward Table Information
--------------------------------
Priority Address-Type IP Address Port Trans-Type
-------- ------------ --------- ---- ----------
1 host abc.com 2 tcp
129 ipv4 12.0.0.2 514 udp
191 ipv6 1111::2222 514 udp
374
SHOW MAIL-SERVER
CHAPTER 12 SYSLOG
show logging-file
Mode
Privileged EXEC Mode
Examples
iS5Comm# show logging-file
Syslog File Table Information
----------------------------
Priority File-Name
-------- ----------
128 my_syslog
129 my_syslog
show mail-server
Mode
Privileged EXEC Mode
Examples
iS5Comm# show mail-server
Syslog Mail Table Information
----------------------------
375
SMTP AUTHENTICATION
CHAPTER 12 SYSLOG
smtp authentication
smtp authentication {auth-login | auth-plain | cram-md5 | digest-md}
no smtp authentication
no smtp authentication
Parameters
Mode
Global Configuration Mode
376
SMTP AUTHENTICATION
CHAPTER 12 SYSLOG
Examples
iS5Comm(config)# smtp authentication auth-login
377
TCP MAX RETRIES
CHAPTER 13 TCP
TCP
13. TCP
Transmission Control Protocol (TCP) is a portable implementation of the industry standard TCP based on
RFC 793. The software consists of the core TCP protocol, a library that provides a Socket Layer Interface
(SLI) to support both a Telnet Server and FTP server. TCP interacts with the Network Layer protocols
(IPv4/IPv6) and uses their services for end-to-end communication.
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# tcp max retries 1
378
SHOW TCP
CHAPTER 13 TCP
show tcp
show tcp {connections | listeners | retransmission details | statistics}
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show tcp connections
Context Name : default
TCP Connections
===============
379
SHOW TCP
CHAPTER 13 TCP
TCP Connections
===============
TCP Connections
===============
Local IP Address Type : IPv4
Local IP : 0.0.0.0
Local Port : 443
Remote IP Address Type : IPv4
Remote IP : 0.0.0.0
Remote Port : 0
TCP State : Listen
MD5 Authenticated : No
TCP-AO Authenticated : No
TCP Connections
===============
380
SHOW TCP
CHAPTER 13 TCP
Local IP : 192.168.10.1
Local Port : 22
Remote IP Address Type : IPv4
Remote IP : 192.168.10.10
Remote Port : 63370
TCP State : Established
MD5 Authenticated : No
TCP-AO Authenticated : No
iS5Comm# show tcp listeners
TCP Listeners
===============
Context Name : default
--------------
Local IP Address Type : IPv4
Local IP : 0.0.0.0
Local Port : 22
381
SHOW TCP
CHAPTER 13 TCP
Attempts Fail : 0
Estab Resets : 3
Current Estab : 1
Input Segments : 44096
Output Segments : 69643
Retransmitted Segments : 29
Input Errors : 2
TCP Segments with RST flag Set: 0
HC Input Segments : 44096
HC Output Segments : 69643
382
SHOW UDP
CHAPTER 14 UDP
UDP
14. UDP
UDP (User Datagram Protocol) is a portable implementation of the industry standard UDP. It is used in
packet-switched computer communication networks and in interconnected systems of such networks.
The software consists of the core UDP
protocol and a library that provides a Socket Layer Interface (similarly to BSD sockets) for applications
such as SNMP. It supports a number of standard features in addition to the core protocol.
show udp
show udp {connections | statistics}
Parameters
Mode
Privileged EXEC Mode
383
SHOW UDP
CHAPTER 14 UDP
Examples
iS5Comm# show udp connections
Global UDP Connections
========================
Local IP Address Type : IPv4
Local IP : 0.0.0.0
Local Port : 68
Remote IP Address Type : IPv4
Remote IP : 0.0.0.0
Remote Port : 0
Local IP Address Type : IPv4
Local IP : 0.0.0.0
Local Port : 61813
Remote IP Address Type : IPv4
Remote IP : 0.0.0.0
Remote Port : 0
InDatagrams : 40
OutDatagrams : 40
HC InDatagrams : 40
HC OutDatagrams : 40
UDP No Ports : 16679
UDP In Errors : 16679
UDP with no Checksum : 0
No. ICMP error packets : 0
UDP with wrong Checksum : 0
UDP In Broadcast Mode : 16679
384
CHAPTER 15 STP
STP
15. STP
STP
(Spanning-Tree Protocol) is a link management protocol that provides path redundancy while preventing
undesirable loops in the network that are created by multiple active paths between stations. To establish
path redundancy, STP creates a tree that spans all of the switches in an extended network, forcing redun-
dant paths into a standby or blocked state.
For an Ethernet network to function properly, only one active path should exist between two stations.
Multiple active paths between stations in a bridged network can cause loops in which Ethernet frames
can endlessly circulate. STP logically breaks such loops and prevents looping traffic from clogging the
network. The dynamic control of the topology provides continued network operation in the presence of
redundant or unintended looping paths.
The STP functionality is realized in the network using one of the three following STPs:
• RSTP
• MSTP
• PVRST+
RSTP is a portable implementation of the IEEE 802.1D standard. It provides rapid recovery of connectivity
following the failure of a bridge/bridge port or a LAN. It reduces the time to reconfigure the active
topology of the network when physical topology or topology configuration parameters changes. It
provides increased availability of MAC service when there is a reconfiguration or failure of components
in a bridged LAN. It can interoperate with legacy STP bridges without any change in the configuration.
MSTP is a portable implementation of the IEEE 802.1s standard. It is used to configure spanning tree on
per VLAN basis or multiple VLANs per spanning tree. It allows you to build several MST over VLAN trunks,
and group or associate VLANs to spanning tree instances, so the topology of one instance is independent
of the other instance. It provides multiple forwarding paths for data traffic and enables load balancing.
It improves the overall network fault tolerance, as failure in one instance does not affect the other
instances.
PVRST+ is an enhancement of RSTP, which works in conjunction with VLAN to provide better control over
traffic in the network. It maintains a separate spanning tree for each active VLAN in the network, thus
providing load balancing through multiple instances of spanning tree, fault tolerance and rapid reconfig-
uration support through RSTP. NOTE: For each VLAN, a spanning-tree instance is created. Number of
385
REDUNDANT RING TECHNOLOGY
CHAPTER 15 STP
spanning-tree instances supported in PVRST depends on the number of instances supported by the hard-
ware. PVRST operates only on supported instances
PRP (IEC 62439-3) is another redundancy option, however it is not a ring redundancy protocol. Instead
PRP sends packets over two different networks in parallel.
386
MEDIA REDUNDANCY PROTOCOL
CHAPTER 15 STP
Periodically, so called supervision frames, which allow supervision of the status of the redundant
network, e.g. broken links, are sent.
Network devices which do not have the ability to communicate by HSR, can be connected to an HSR ring
via a RedBox, i.e. redundancy box. The intended recipient of the redundant copies of the HSR frame
passes the first copy of the message up the network stack and discards the second one.
387
MRP RING SIZE
CHAPTER 15 STP
This picture above shows an MRP ring in a closed condition. The MRM switch is the MRP Media Redun-
dancy Manager and it is the designated switch that controls the ring and prevents the network loop from
forming. “W” are the watchdog packets that transit the network much like RSTP BPDUs. If there is a line
failure, the W frames alert the MRM to put its redundant port to forwarding.
For the blocked port on the MRM, only watchdog frames are allowed to pass, and not data frames.
Ring-Open MRP Ring
The figure below shows the ring in an open state with the MRM engaged.
388
MEDIA REDUNDANCY AUTOMANAGER
CHAPTER 15 STP
389
CLEAR SPANNING-TREE
CHAPTER 15 STP
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm# clear spanning-tree detected protocols interface gigabitethernet 0/1
390
CLEAR SPANNING-TREE
CHAPTER 15 STP
391
CLEAR SPANNING-TREE
CHAPTER 15 STP
Parameters
Mode
Global Configuration Mode
Prerequisites
The statistics information can be deleted, only if the spanning tree functionality has not been shut down
in the switch. The type of spanning tree mode should be set, if the functionality is already shutdown.
392
DEBUG CUSTOMER SPANNING-TREE
CHAPTER 15 STP
Examples
iS5Comm(config)# clear spanning-tree counters interface gigabitethernet 0/1
no debug spanning-tree
no debug spanning-tree {[all] [bpdu] [bridge-detection-state-machine]
[errors] [events] [global] [init-shut] [management] [memory]
[port-info-state-machine] [port-receive-state-machine] [port-role-selec-
tion-state-machine] [protocol-migration-state-machine] [pseudo-
Info-state-machine] [redundancy] [role-transition-state-machine] [sem-vari-
ables] [state-transition-state-machine] [timer]
[topology-change-state-machine]}
393
DEBUG CUSTOMER SPANNING-TREE
CHAPTER 15 STP
Parameters
cep Enter to display the customer spanning tree information for the
interface specified customer edge port (CEP).
interface Enter to display the interface-specific information of active ports.
NOTE: This command does not support virtual interfaces, tunnels, or
interface VLANs type of interfaces.
Gigabitether Enter to display gigabitetethernet type of interface. Gigabitethernet is
net a version of LAN standard architecture that supports data transfer up
to 1 Gigabit per second.
<interface-i Enter to display a specific slot number / port number. The format is
d> <0>/<1-28> without spaces between Slot Number/Port Number. For
example, 0/1.
Extreme-Ethe Enter to display the Extreme-Ethernet type of interface. Extreme
rnet Ethernet is a version of Ethernet that supports data transfer up to 10
Gigabits per second and only full duplex links
<interface-i Enter to display a specific slot number / port number. The format is
d> <0>/<1-28> without spaces between Slot Number/Port Number. For
example, 0/1.
all Enter to generate debug statements for all RSTP / MSTP
bpdu Enter to generate debug statements for BPDU-related traces.
bridge-detec Enter to generate debug statements for bridge detection SEM.
tion-state-m
achine
errors Enter to generate debug statements for all failure traces.
events Enter to generate debug statements for event handling traces. This
trace is generated to denote events that are posted to STP
configuration queue whenever you configure any of the STP features.
global Enter to generate debug statements for
init-shut Enter to generate debug statements for init and shutdown traces. This
trace is generated on failed and successful initialization and shutting
down of STP related module and memory.
management Enter to generate debug statements for management traces. This
trace is generated whenever you configure any of the STP features.
394
DEBUG CUSTOMER SPANNING-TREE
CHAPTER 15 STP
memory Enter to generate debug statements for memory related traces. This
trace is generated on failed and successful allocation of memory for
STP process.
port-info-st Enter to generate debug statements for port information SEM.
ate-machine
port-receive Enter to generate debug statements for port receive SEM.
-state-machi
ne
port-role-se Enter to generate debug statements for role selection SEM.
lection-stat
e-machine
port-transmi Enter to generate debug statements for port transmit SEM
t-state-mach
ine
protocol-mig Enter to generate debug statements for protocol migration SEM.
ration-state
-machine
pseudoInfo-s Enter to generate debug statements for port receive pseudo
tate-machine information SEM.
redundancy Enter to generate debug statements for redundancy code flow traces.
This trace is generated in standby node STP while taking backup of
configuration information from active node.
role-transit Enter to generate debug statements for role transition SEM
ion-state-ma
chine
sem-variable Enter to generate debug statements for state machine variable
s changes traces. This trace is generated on failed and successful
creation and deletion of semaphore.
state-transi Enter to generate debug statements for state transition SEM.
tion-state-m
achine
timer Enter to generate debug statements for timer module traces. Tis
generated on failed and successful start, stop and restart of STP
timers.
topology-cha Enter to generate debug statements for topology change SEM.
nge-state-ma
chine
395
DEBUG SPANNING-TREE
CHAPTER 15 STP
<level Integer Enter to generate debug statements for or the specified severity level
(0-7)> value.This value ranges from 0 to 7.
alerts Enter to generate debug statements for immediate action.
critical Enter to generate debug statements for critical conditions.
debugging Enter to generate debug statements for debugging messages.
emergencies Enter to generate debug statements when system cannot be used.
errors Enter to generate debug statements for for error conditions.
informationa Enter to generate debug statements for information messages.
l
notification Enter to generate debug statements for significant messages.
warnings Enter to generate debug statements for warning conditions.
Mode
Privileged EXEC Mode
Prerequisites
Debug customer spanning-tree can be executed only on customer edge ports. To set port type as
customer edge ports, bridge mode is set as provider-edge bridge mode.
Default
Tracing of the STP module is disabled.
Examples
iS5Comm# debug spanning-tree errors 1
396
DEBUG SPANNING-TREE
CHAPTER 15 STP
execution of the command. The no form of this command disables the tracing of the STP module as per
the configured debug levels. The trace statements are not generated for the configured trace levels.
debug spanning-tree
debug spanning-tree {[all] [bpdu] [bridge-detection-state-machine] [errors]
[events] [global] [init-shut] [management] [memory]
[port-info-state-machine] [port-receive-state-machine] [port-role-selec-
tion-state-machine] [protocol-migration-state-machine] [pseudo-
Info-state-machine] [redundancy] [role-transition-state-machine] [sem-vari-
ables] [state-transition-state-machine] [timer]
[topology-change-state-machine]} [switch <default>] [{<level(0-7)> | alerts
| critical | debugging | errors | informational | notification | warnings}]
no debug spanning-tree
no debug spanning-tree {[all] [bpdu] [bridge-detection-state-machine]
[errors] [events] [global] [init-shut] [management] [memory]
[port-info-state-machine] [port-receive-state-machine] [port-role-selec-
tion-state-machine] [protocol-migration-state-machine] [pseudo-
Info-state-machine] [redundancy] [role-transition-state-machine] [sem-vari-
ables] [state-transition-state-machine] [timer]
[topology-change-state-machine]} [switch <default>] | informational | noti-
fication | warnings}] | alerts
397
DEBUG SPANNING-TREE
CHAPTER 15 STP
Parameters
398
DEBUG SPANNING-TREE
CHAPTER 15 STP
redundancy Enter to generate debug statements for redundancy code flow traces.
This trace is generated in standby node STP while taking backup of
configuration information from active node.
role-transit Enter to generate debug statements for role transition SEM
ion-state-ma
chine
sem-variable Enter to generate debug statements for state machine variable changes
s traces. This trace is generated on failed and successful creation and
deletion of semaphore.
state-transi Enter to generate debug statements for state transition SEM.
tion-state-m
achine
timer Enter to generate debug statements for timer module traces. Tis
generated on failed and successful start, stop and restart of STP timers.
topology-cha Enter to generate debug statements for topology change SEM.
nge-state-ma
chine
switch Enter to generate debug statements for switch / context.
default Enter to generate debug statements for the default for switch / context.
<level Enter to generate debug statements for or the specified severity level
(0-7)> value.This value ranges from 0 to 7.
alerts Enter to generate debug statements for immediate action.
critical Enter to generate debug statements for critical conditions.
debugging Enter to generate debug statements for debugging messages.
emergencies Enter to generate debug statements when system cannot be used.
errors Enter to generate debug statements for for error conditions.
informationa Enter to generate debug statements for information messages.
l
notification Enter to generate debug statements for significant messages.
warnings Enter to generate debug statements for warning conditions.
Mode
Privileged EXEC Mode
399
ERRORDISABLE
CHAPTER 15 STP
Default
Tracing of the STP module is disabled.
Examples
iS5Comm# debug spanning-tree errors 1
15.12. errordisable
To set the error disable recovery timer in an interface, use the command errordisable in Interface Config-
uration Mode. This command executes only if the spanning tree functionality has not been shut down in
the switch.
errordisable
errordisable recovery-interval <seconds(30-65535)>
Parameters
Mode
Interface Configuration Mode
Examples
iS5Comm(config-if)# errordisable recovery-interval 666
400
INSTANCE
CHAPTER 15 STP
15.13. instance
To create an MST instance and map it to VLANs, use the command instance in MSTP Configuration Mode.
The no form of this command deletes the instance and unmaps specific VLANs from the MST instance.
instance
instance <instance ID (1-64/4094)> vlan <vlan-range>
no instance
no instance <instance ID (1-64/4094)> vlan <vlan-range>
Parameters
vlan Enter to configure a VLAN ID or list of VLAN IDs that should be mapped
with / unmapped from the specified MST instance.
<vlan-range> Integer Enter a VLAN ID or list of VLAN IDs. This value is a string whose
maximum size is 9. For example, the value is provided as 4000-4010 to
represent the list of VLANs IDs from 4000 to 4010.
Mode
MSTP Configuration Mode
Examples
iS5Comm(config)# spanning-tree mode mst
Spanning Tree enabled protocol is RSTP, now RSTP is being shutdown and
MSTP is being enabled
iS5Comm(config)# spanning-tree mst configuration
401
NAME
CHAPTER 15 STP
15.14. name
To configure the name for the MST region, use the command name in MSTP Configuration Mode. The no
form of this command resets the name to its default value.
name
name <string (32)>
no name
Parameters
Mode
MSTP Configuration Mode
Examples
iS5Comm(config)# spanning-tree mode mst
Spanning Tree enabled protocol is RSTP, now RSTP is being shutdown and
MSTP is being enabled
iS5Comm(config)# spanning-tree mst configuration
NOTE: This how MSTP Configuration Mode is entered.
15.15. revision
To configure the revision number for the MST region, use the command revision in MSTP Configuration
Mode. The no form of this command resets the revision number to its default value.
402
SET PERFORMANCE-DATA
CHAPTER 15 STP
revision
revision <value(0-65535)>
no revision
Parameters
Mode
MSTP Configuration Mode
Examples
iS5Comm(config)# spanning-tree mode mst
Spanning Tree enabled protocol is RSTP, now RSTP is being shutdown and
MSTP is being enabled
iS5Comm(config)# spanning-tree mst configuration
NOTE: This how MSTP Configuration Mode is entered.
set performance-data
set performance-data {enable | disable}
403
SET PERFORMANCE-DATA-STATUS
CHAPTER 15 STP
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# set performance-data enable
set performance-data-status
set performance-data-status {enable | disable}
Parameters
enable Enter to enable the collection of RSTP and MSTP performance data
on all ports in the device.
disable Enter to disable the collection of RSTP and MSTP performance data
on all ports in the device. By default, the collection of performance
data is disabled.
Mode
Global Configuration Mode
404
SHOW SPANNING-TREE
CHAPTER 15 STP
Examples
iS5Comm(config)# set performance-data-status enable
show spanning-tree
show spanning-tree [active [detail] [switch <default>]]
[blockedports [switch <default>]]
[bridge [{address | detail | forward-time | hello-time | id | max-age |
priority | protocol | switch}]
[detail [switch <default>]]
[interface {Extreme-Ethernet <interface-id> | gigabitethernet <inter-
face-id>} [bpduguard] [cost] [encapsulationtype] [inconsistency]
[layer2-gateway-port] [priority] [restricted-role] [restricted-tcn] [root-
cost] [state] [stats]]
[layer2-gateway-port [switch <default>]]
[mst [<instance-id (0-4094)>] [configuration [switch <default>]] [detail
[switch <default>]] [interface {Extreme-Ethernet <interface-id> | giga-
bitethernet <interface-id>} [detail] [hello-time] [stats]] [switch
<default>]]
[pathcost method [switch <default>]]
[performance-data] [interface {Extreme-Ethernet <interface-id> | giga-
bitethernet <interface-id>} [instance] [<instance-id>]
[root [{address | cost | detail | forward-time | id | max-age | port |
priority [system-id [switch <default>]] | switch}]
[summary [switch <default>]]
[switch <default>]]
405
SHOW SPANNING-TREE
CHAPTER 15 STP
406
SHOW SPANNING-TREE
CHAPTER 15 STP
Parameters
407
SHOW SPANNING-TREE
CHAPTER 15 STP
408
SHOW SPANNING-TREE
CHAPTER 15 STP
409
SHOW SPANNING-TREE
CHAPTER 15 STP
detail Enter to display the detailed multiple spanning tree port specific
information for the specified interface. The information contain
port priority, port cost, root address, priority and cost, IST
address, priority and cost, bridge address, priority and cost,
forward delay, maximum age, maximum hop count, and BPDUs
sent and received.
hello-time Enter to display the hello time of the MSTIs assigned to the
specified interface.
stats Enter to display the number of BPDUs sent and received for the
MSTIs assigned to the specified interface.
switch Enter to display the switch name/context name.
default Enter default to display the default switch.
pathcost Enter to display the port pathcost method configured for the
switch.
method Enter to display the port pathcost method configured for the
switch.
performance-data Enter to display the spanning tree information of active ports.
interface Enter to display the spanning-tree performance related
information for the specified type of interface.
Gigabitethernet Enter to display gigabitetethernet type of interface.
Gigabitethernet is a version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
<interface-id> Enter to display a specific slot number / port number. The format
is <0>/<1-28> without spaces between Slot Number/Port
Number. For example, 0/1.
Extreme-Ethernet Enter to display the Extreme-Ethernet type of interface. Extreme
Ethernet is a version of Ethernet that supports data transfer up to
10 Gigabits per second and only full duplex links
<interface-id> Enter to display a specific slot number / port number. The format
is <0>/<1-28> without spaces between Slot Number/Port
Number. For example, 0/1.
instance Enter to display spanning-tree performance data for the specified
MST Instance ID.
root Enter to display the spanning-tree root information.
NOTE: This configuration is not supported in PVRST Mode.
410
SHOW SPANNING-TREE
CHAPTER 15 STP
411
SHOW SPANNING-TREE
CHAPTER 15 STP
detail Enter to display the detailed PVRST related information for the
specified active VLAN ID. The information contains current
selected spanning Mode, current spanning tree compatibility
version, bridge and root priority, bridge and root addresses, port
path cost, port priority, timer values, bridge and port level
spanning tree statistics information, and transmit hold-count
value.
switch Enter to display the PVRST related information for the switch
name/context name.
default Enter default to display the PVRST related information for the
default switch.
blockedports Enter to display the list of ports in blocked state and the total
number of blocked ports for the specified VLAN.
switch Enter to display the PVRST related information for the switch
name/context name.
default Enter default to display the PVRST related information for the
default VLAN.
active Enter to display the PVRST related information for the specified
active VLAN ID.
switch Enter to display the PVRST related information for the switch
name/context name.
default Enter default to display the PVRST related information for the
default switch.
interface Enter to display interface specific PVRST related information for
the specified type of interface
Gigabitethernet Enter to display gigabitetethernet type of interface.
Gigabitethernet is a version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
<interface-id> Enter to display a specific slot number / port number. The format
is <0>/<1-28> without spaces between Slot Number/Port
Number. For example, 0/1.
Extreme-Ethernet Enter to display the Extreme-Ethernet type of interface. Extreme
Ethernet is a version of Ethernet that supports data transfer up to
10 Gigabits per second and only full duplex links.
412
SHOW SPANNING-TREE
CHAPTER 15 STP
<interface-id> Enter to display a specific slot number / port number. The format
is <0>/<1-28> without spaces between Slot Number/Port
Number. For example, 0/1.
active Enter to display the detailed PVRST related information for the
specified active VLAN ID.
cost Enter to display the cost of the specified port.
detail Enter to display the detailed interface specific PVRST related
information for the port.
priority Enter to display the priority of the specified port.
rootcost Enter to display the root cost of the port. The root cost defines
the pathcost to reach the root bridge.
state Enter to display the state of the port.
stats Enter to display the port level spanning tree statistics
information.
pathcost Enter to display the port pathcost method configured for the
specified VLAN.
method Enter to display the port pathcost method configured for the
specified VLAN.
switch Enter to display the PVRST related information for the switch
name/context name
default Enter default to display the PVRST related information for the
default switch.
root Enter to display the spanning-tree root information.
NOTE: This configuration is not supported in PVRST Mode.
413
SHOW SPANNING-TREE
CHAPTER 15 STP
Mode
Privileged EXEC Mode
Examples
iS5Comm # show spanning-tree
-------------------------------------------------------------------
Spanning-tree for VLAN 1
414
SHOW SPANNING-TREE
CHAPTER 15 STP
415
SHOW SPANNING-TREE
CHAPTER 15 STP
416
SHOW SPANNING-TREE
CHAPTER 15 STP
417
SHOW SPANNING-TREE
CHAPTER 15 STP
418
SHOW SPANNING-TREE
CHAPTER 15 STP
419
SHOW SPANNING-TREE
CHAPTER 15 STP
420
SHOW SPANNING-TREE
CHAPTER 15 STP
421
SHUTDOWN SPANNING-TREE
CHAPTER 15 STP
shutdown spanning-tree
Mode
Global Configuration Mode
Default
Spanning tree MSTP is started and enabled in the switch..
Examples
iS5Comm(config)# tcp max retries 1
15.20. spanning-tree
To enable and define spanning tree operation, use the spanning-tree command in Global Configuration
Mode. Spanning tree operation provides path redundancy while preventing undesirable loops in the
network that are created by multiple active paths between stations. It logically breaks such loops and
prevents looping traffic from clogging the network. The no form of this command disables the spanning
tree operation in the switch and resets the spanning tree related information to its default values. The
spanning tree operation is automatically enabled in the switch, once the spanning tree Mode is
changed.The default spanning tree algorithm is rapid spanning tree. Note that the spanning tree opera-
tion can be enabled in the switch only if the spanning tree functionality has not been shut down in the
switch.
422
SPANNING-TREE
CHAPTER 15 STP
spanning-tree
spanning-tree [compatibility {stp | rst | mst}]
[flush-indication-threshold <value (0-65535)>]
[flush-interval <centi-seconds (0-500)>] [forward-time <seconds(4-30)>]
[forwarddelay optimization alternate-role {disabled | enabled}]
[hello-time <seconds(0-20)>] [max-age <seconds (6-40)>]
[mode {mst | pvrst| pvst| rapid-pvst| rst}]
[mst {<instance ID <instance ID (1-64> {primary | secondary} {priority
<value (0-61440)> | flush-indication-threshold <value (0-65535)>} | configu-
ration | forward-time <seconds(4-30> | hello-time <seconds(0-2)> |
instance-id <(1-64)>| max-age <seconds (6-40)> | max-hops <(6-40)> |
max-instance | <(1-64>}]
[pathcost dynamic [lag-speed]] [portfast bpduguard default] [priority
<value (0-61440)>] [transmit hold-count <value (0-61440)>]
[vlan <vlan-id/vfi_id> {brg-priority <integer(0-61440)> | forward-time
<seconds(4-30)> | hello-time <seconds(0-2)> | hold-count <value (1-10)> |
max-age <seconds (6-40)> | brg-priority <integer(0-61440)> | root {primary |
secondary}]
no spanning-tree
spanning-tree {compatibility | flush-indication-threshold| flush-interval |
forward-time | forwarddelay | hello-time | max-age | mode | mst | pathcost |
portfast | priority | transmit | vlan}
423
SPANNING-TREE
CHAPTER 15 STP
Parameters
compatibility Enter to set the STP compatibility version in the switch for all ports.
stp Enter to configure Spanning Tree Protocol configuration.
rst Enter to configure Rapid Spanning Tree configuration.
mst Enter to configure Multiple Spanning Tree configuration.
flush-indicati Enter to configure the flush indication threshold value for a specific
on-threshold instance. When flush indication threshold is default value and flush
interval is non-default value, instance based flushing occurs during
the first flush indication trigger. When the flush indication
threshold value is non-default (x) and flush-interval value is
non-default, port & instance based flushing is triggered until the
threshold (x) is reached. Once the threshold is reached, instance
based flushing is triggered & timer starts.
<value Integer Enter a value to indicate the number of flush indications to go
(0-65535> before the flush-interval timer method triggers and ranges from 0
(default) to 65535.
flush-interval Enter to configure the flush interval timer value (in centi-seconds).
<centi-seconds Integer Enter a value to indicate the number of flush indications invoked
(0-500)> from spanning-tree module per instance basis. This value ranges
from 0 to 500 hundredths of a second. If the flush interval timer is
set to zero, port and instance based flushing occurs (default
functionality). If it is set to non-zero, instance based flushing occurs
(dependent on the flush-indication-threshold value).
forward-time Enter to configure the number of seconds for which a port waits
before changing from the blocking state to the forwarding state.
The values configured for the spanning tree timers should satisfy
the following conditions:
2 * (forward-time - 1) >= max-age, and
max-age >= 2 * (hello-time +1)
The STP timers can be configured in the switch, only if the spanning
tree functionality has not been shut down in the switch. The type
of spanning tree mode should be set, if the functionality is already
shutdown.
This spanning tree timer’s configuration is not supported in PVRST
mode.
424
SPANNING-TREE
CHAPTER 15 STP
<seconds Integer Enter a value to indicate the forward time. This value ranges from 4
(4-30)> to 30 seconds. In MSTP, this time configuration is applied for IST
root (that is, MSTI 0). The default is 15 seconds.
hello-time Enter to configure the time interval (in seconds) between two
successive configuration BPDUs generated by the root switch. This
value is configured on per-port basis for MSTP and is configured
globally for RST.
<seconds Integer Enter a value for hello- time. This value should be either 1 or 2
(0-2)> seconds. The default is 2 seconds.
max-age Enter to configure the maximum expected arrival time (in seconds)
of hello BPDUs. STP information learned from network on any port
is discarded, once the configured arrival time expires. The spanning
tree topology is re-computed after this time interval.
<seconds Integer Enter a value representing maximum age. This value ranges from 6
(6-40)> to 40 seconds. In MSTP, this time configuration is applied for IST
root (that is, MSTI 0). The default is 20 seconds.
forwarddelay Enter to configure the forward delay timer
optimization Enter for optimization for spanning-tree related protocol during
transition from alternate to designated port role.
alternate-role Enter to configure the alternate port role transition by optimized
configuration.
disabled Enter to disable optimization for spanning-tree related protocol in
alternate port role transition. All ports while transitioning from
ALTERNATE-DESIGNATED will have fdWhile set to fwdDelay.
mode Enter to set the type of spanning tree to be executed, enable
spanning tree operation and start spanning tree functionality in the
switch.
mst Enter to configure the switch to execute MSTP for preventing
undesirable loops. MSTP configures spanning tree on per VLAN
basis or multiple VLANs per spanning tree. The mode cannot be set
as mst, if the base bridge Mode is configured as transparent
bridging.
425
SPANNING-TREE
CHAPTER 15 STP
426
SPANNING-TREE
CHAPTER 15 STP
secondary Enter to configure the switch as secondary root. Sets the switch as
a secondary root, if the primary root fails. The priority value is set
as 28672.
priority Enter to switch priority configuration for spanning tree instance
<priority Integer Enter a priority value. This value ranges from 0 to 61440. The value
(0-61440)> should be set in steps of 4096, that is, you can set the value as 0,
4096, 8192, 12288, etc. The default is 32768.
flush-indicati Enter to configure flush indication threshold.
on-threshold
<value Integer Enter a flush indication threshold value.
(0-65535)>
configuration Enter to start MST configuration mode. In MSTP configuration
mode, instance specific and MST region configuration can be done.
max-hops Enter maximum number of hops allowed.
<(6-40)> Integer Enter a value representing maximum number of hops allowed. This
value ranges from 6 to 40.
max-instance Enter maximum MSTP instance value.
pathcost Enter to enable dynamic pathcost calculation. Note that the
dynamic dynamic path cost calculation feature can be configured in the
switch, only if the spanning tree functionality has not been shut
down in the switch. The type of spanning tree mode should be set,
if the functionality is already shutdown
lag-speed Enter for pathcost calculated when LA port speed changes due to
addition or deletion of ports in port channel. Note that the
manually assigned path cost is used even if the lag speed feature is
enabled in the switch when the path cost is assigned manually.
portfast Enter to specify the portfast feature in the port. This feature
specifies that the port is connected to only one hosts and hence
can rapidly transit to forwarding. This feature can cause temporary
bridging loops, if hubs, concentrators, switches, bridges and so on
are connected to this port. This feature takes effect only after the
interface is shutdown and turned on again.
bpduguard Enter to put an interface in the error-disabled state when it
receives a bridge protocol data unit (bpdu).
default Enter to enable bpduguard by default on all edgeports.
427
SPANNING-TREE
CHAPTER 15 STP
428
SPANNING-TREE
CHAPTER 15 STP
Mode
Global Configuration Mode
Examples
iS5Comm (config)# spanning-tree
iS5Comm(config)#spanning-tree compatibility stp
iS5Comm(config)# spanning-tree flush-indication-threshold 2
429
SPANNING-TREE
CHAPTER 15 STP
15.21. spanning-tree
To enable and define spanning tree operation for an interface, use the spanning-tree command in Inter-
face Configuration Mode. The no form of this command disables the spanning tree operation on an inter-
face and resets the spanning tree to its default values. Note that the spanning tree operation can be
enabled in the switch only if the spanning tree functionality has not been shut down in the switch.
spanning-tree
spanning-tree [auto-edge] [bpdu-receive {enabled disabled}]
[bpdu-transmit {enabled | disabled}]
[bpdufilter {disable | enable}]
430
SPANNING-TREE
CHAPTER 15 STP
no spanning-tree
spanning-tree {auto-edge | bpdufilter | bpduguard | cost | disable | encap |
guard | layer2-gateway-port | link-type | mst | port-priority | portfast |
pseudoRootId | restricted-role | restricted-tcn | vlan}
431
SPANNING-TREE
CHAPTER 15 STP
Parameters
432
SPANNING-TREE
CHAPTER 15 STP
433
SPANNING-TREE
CHAPTER 15 STP
root Enter to enable root guard feature in the port. This feature
prevents the port from becoming root port or blocked port. The
port changes to the root-inconsistent state, if the port receives
superior BPDUs. The port automatically reverts back to forwarding
state, once the superior BPDUs are not received.
NOTE: Root Guard implementation in PVRST is applicable only for
trunk ports.
layer2-gateway Enter to configure a port to operate as a L2GP (L2 gateway port).
-port L2GP operates similar to that of the normal port operation but
pretends to continuously receive BPDUs when admin state of the
port is up.
link-type Enter to configure the link status of the LAN segment attached to
the port. The options available are:
point-to-point Enter to use this option when the port is to be treated as if it is
connected to a point-to-point link.
shared Enter to use this option when the port is to be treated as if it is
using a shared media connection.
mode Enter to enable or disable the bridge to send agreement PDU in
accordance with 802.1w.
dot1w Enter to enable or disable the bridge to send agreement PDU in
accordance with 802.1w.
disable Enter to disable the bridge to send agreement PDU in accordance
with 802.1w.
enable Enter to enable the bridge to send agreement PDU in accordance
with 802.1w.
mst Enter to specify the spanning tree instance.
<instance-id Integer Enter a value for instance ID. This value ranges from 1 to 64.
(1-64)>
cost Enter to configure the cost value associated with the port.
<cost Integer Enter a value for path cost. This value ranges from 1 to 200000000.
value(0-200000
000)>
disable Enter to disable the spanning tree on the port
port-priority Enter to configure the port priority.
434
SPANNING-TREE
CHAPTER 15 STP
<port priority Integer Enter a value for port priority. This value ranges from 0 to 61440.
value(0-240)> The value should be set in steps of 4096, that is, you can set the
value as 0, 4096, 8192, 12288 and so on.
pseudoRootId Enter to configure the pseudo root related information for a port
set as L2GP. The information contains pseudo root priority and
pseudo root MAC address for the port. This configuration is not
utilized in PVRST Mode.
priority Enter for pseudo root priority.
<port priority Integer Enter value for port priority. This value ranges from 0 to 61440. The
value(0-61440) value should be set in steps of 4096, that is, you can set the value
> as 0, 4096, 8192, 12288 and so on.
mac-address Enter to configure the unicast MAC address of the pseudo root.
Port configured as L2GP uses this value as its address.
<ucast_mac> Enter the unicast MAC address of the pseudo root. For example,
00:00:12:34:45:55.
hello-time Enter to set the port-based hello timer value.
<port based Integer Enter a port-based hello timer value.
value(1-2)>
port-priority Enter to configure the port priority value
<port priority Integer Enter a port-priority value. This value ranges from 0 t
value(0-240)>
portfast Enter to configure the portfast feature in the port. This feature
specifies that the port is connected to only one host and hence can
rapidly transit to forwarding. This feature can cause temporary
bridging loops if hubs, concentrators, switches, bridges and so on
are connected to this port. This feature takes effect only after the
interface is shut down and turned on again.
pseudoRootId Enter to the pseudo root related information for a port set as L2GP.
The information contains pseudo root priority and pseudo root
MAC address for the port. This configuration is not utilized in PVRST
Mode
priority Enter to configure port priority value.
<port priority Integer Enter for pseudo root priority.
value(0-61440)
>
435
SPANNING-TREE
CHAPTER 15 STP
mac-address Integer Enter to configure the unicast MAC address of the pseudo root. A
port configured as L2GP uses this value as its address.
<ucast_mac> Enter the unicast MAC address of the pseudo root. For example,
00:00:12:34:45:55.
restricted-rol Enter to enable the root-guard/ Restricted role feature on the port.
e
restricted-tcn Enter to enable the Topology change guard/ Restricted tcn feature
on the port.
vlan Enter for configures spanning tree related information on a per
VLAN basis.
<vlan-id/vfi_i Integer VLAN ID is a unique value that represents the specific VLAN. This
d> value ranges from 1 to 4094. VFI ID is a VLAN created in the system
which contains Pseudo wires and Attachment Circuits as member
ports. This creates a logical LAN for the VPLS service. This value
ranges from 4096 to 65535.The VLAN ID 4095 is reserved and may
be used to indicate a wildcard match for the VID in management
operations or Filtering Database entries.
VFI IDs 4096 and 4097 are reserved identifiers used in MPLS PW.
The theoretical maximum for the maximum number of VFI is 65535
but the actual number of VFI supported is a sizing constant. Based
on this, the maximum number of VFI ID accepted in the
management interface is restricted. For example, if 100 VFIs are
supported, the maximum number of VFI supported will be
restricted to maximum number of VLANs + 100. An error message
is displayed for any value beyond this range.
cost Enter to configure the port’s path cost value that contributes to the
path cost of paths containing this particular port. The paths’ path
cost is used during calculation of shortest path to reach the root.
The path cost represents the distance between the root port and
designated port. The configured path cost is used, even if the
dynamic pathcost calculation feature or LAGG speed feature is
enabled. This configuration is not supported for the spanning tree
mode PVRST.
<cost Integer Enter a value for path cost. This value ranges from 1 to 200000000.
value(0-200000
000)>
port-priority Enter to configure the priority value assigned to the port.
436
SPANNING-TREE
CHAPTER 15 STP
<port priority Integer Enter a priority value to be assigned to the port. This value is used
value(0-240)> during port role selection process. This value ranges from 0 to 240.
This value should be set in steps of 16, that is, you can set the value
as 0, 16, 32, 48 and so on. The default port-priority is 128.
status Enter to configure the status of PVRST on a port for the specified
VLAN. PVRST works in conjunction with VLAN to provide better
control over traffic in the network. It maintains a separate spanning
tree for each active VLAN in the network, thus providing load
balancing through multiple instances of spanning tree, fault
tolerance and rapid reconfiguration support through RSTP.
disable Enter to disable the PVRST Status for the specified VLAN ID.
enable Enter to enable the PVRST Status for the specified VLAN ID.
Mode
Interface Configuration Mode
Examples
iS5Comm (config)# interface gi 0/1
iS5Comm (config-if)# spanning-tree auto-edge
iS5Comm(config-if)# spanning-tree bpdu-receive disabled
iS5Comm (config-if)# spanning-tree bpdu-transmit enabled
iS5Comm (config-if)# spanning-tree bpduguard enable admin-down
iS5Comm(config-if)# spanning-tree cost 2200
iS5Comm (config-if)# spanning-tree link-type point-to-point
iS5Comm(config-if)# spanning-tree portfast
iS5Comm(config)# spanning-tree portfast bpduguard default
iS5Comm(config-if)# spanning-tree port-priority 32
iS5Comm (config-if)# spanning-tree restricted-role
iS5Comm(config-if)# spanning-tree restricted-tcn
iS5Comm(config-if)# spanning-tree layer2-gateway-port
iS5Comm(config-if)# spanning-tree mst 1 pseudoRootId priority 8192 mac-address 00:00:12:34:45:55
iS5Comm(config-if)# spanning-tree bpdufilter enable
iS5Comm(config-if)# spanning-tree mode dot1w enable
437
SPANNING-TREE
CHAPTER 15 STP
438
REDUNDANCY
CHAPTER 16 MRP
MRP
16. MRP
This section describes the CLI commands used to configure the MRP feature.
Media Redundancy Protocol (MRP) is a networking protocol designed to implement redundancy and
recovery in a ring topology. MRP is designed to react deterministically on a single failure on a switch in
the MRP ring. An MRP instance is configured between two ports known as ring ports and can act as
manager or client in the ring. The MRP node which is configured as manager has the responsibility of
avoiding the loop in the ring by making one ring port as blocking and other as forwarding. The conver-
gence time of MRP is very fast as compared to spanning tree protocols. On a port either MRP can be
enabled or spanning tree may be selected.
To configure MRP, first it needs to be enabled at the global level, the instance needs to be created with
required mode and then instance needs to be mapped to the ring ports, this chapter describes the
commands used.
Note: To enable an MRP ring instance on a port; first spanning tree needs to be disabled. Both protocols
cannot run together on the same port.
16.1. Redundancy
Redundancy within the network considers the presence of more network elements (switches, link) than
necessary operation, in order to prevent the loss of communication caused by a failure. To effect this,
there is more than one physical path between any two nodes. IEC 61918 specified ring topology, every
switch has a redundant connection (link) into the network. the redundant links are not required for a
failure-free/normal operation of the network. In case of a failure, these redundant links are used to
prevent the breakdown of the network. The disadvantage of ring topology is that, it can introduce a
“packet loop” that creates broadcast storms in the network.
Spanning Tree protocols, such as RSTP, specify a method for providing media redundancy while
preventing the undesirable packet loop in a network (i.e.) RSTP were developed to detect and eliminates
the physical loop in the network. Also, in case of a failure in the network, a topology change notification
is sent out to create a different safe path.
Although STP is effective enough for many networks, it takes longer time for re-convergence in case of
failure. This is not good enough for mission-critical industrial Ethernet applications. To overcome the
limitations of RSTP, MRP protocol was developed. MRP uses mechanisms similar to RSTP (e.g., delete
forwarding database after reconfiguration, set ports into blocking or forwarding mode), but it takes
lesser time for re-convergence in case of failure. Below is the comparison of MRP with RSTP.
439
MRP
CHAPTER 16 MRP
MRP RSTP
16.2. MRP
An MRP-compliant network shall have a ring topology with multiple nodes. According to IEC 62439-2,
One of nodes in the network takes on the role of the redundancy manager (MRM
). The ports at a node which are connected with the subsequent or preceding node are named ring ports.
440
NORMAL OPERATION: RING CLOSED
CHAPTER 16 MRP
441
FAILURE DETECTION: RING OPEN
CHAPTER 16 MRP
442
ALARMS SUPPORTED IN MRP
CHAPTER 16 MRP
443
MRP STATUS CHANGE
CHAPTER 16 MRP
444
MRP
CHAPTER 16 MRP
16.9. mrp
To enable and disable the MRP protocol, use the command mrp enable / disable in Global Configuration
Mode.
mrp
mrp { enable | disable }
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# mrp enable
iS5Comm(config)# mrp disable
mrp
mrp { ringid < short(1-2) > }
no mrp ringid
no mrp { ringid < short(1-2) > }
445
MRP VID
CHAPTER 16 MRP
Parameters
Mode
Global Configuration Mode
Examples
• Users can delete the MRP instance. The details are shown below.
iS5Comm(config-mrp)# exit
vid
vid < VLAN id (1-4094) >
no vid
no vid
446
MODE
CHAPTER 16 MRP
Parameters
Mode
MRP Ring Configuration Mode
Examples
• Users are able to configure MRP over VLAN using the below shown CLI command under MRP Ring
Mode. MRP signaling frames (test and control) are sent with IEEE 802.1Q VLAN tags with the config-
ured VLAN and priority as 7.
iS5Comm(config-mrp)# vid 2
iS5Comm(config-mrp)# end
• User are able to unconfigure MRP over VLAN under MRP Ring Mode as shown below.
iS5Comm(config-mrp)# no vid
iS5Comm(config-mrp)# end
16.12. mode
To set the MRP mode of the device, use the command mode in MRP Ring Configuration Mode.
447
PRIORITY
CHAPTER 16 MRP
mode
mode [ { disable | { client | manager | manager-autocomp } port1 < interface-type
> < interface-id > port2 < interface-type > < interface-id > } ]
Parameters
client Enter to configure MRP instance as a client ( MRC) in the MRP ring, which
forwards the test frames between the ring ports.
manager Enter to configure MRP instance as manager ( MRC) in the MRP ring, which
generates the test frames on both ring ports and handles/avoids the loop.
manager Enter to configure MRP instance as manager auto ( MRA) in the MRP ring. It
-autocomp competes with the other MRA nodes in the ring to become MRM based on
priority, if priority is highest it turns to act as MRM else turn MRC.
disable Enter to disables the MRP instance on ring ports if any.
port1 Enter to set MRP mode on ring on port 1.
port2 Enter to set MRP mode on ring on port 2.
Mode
MRP Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# mrp ringid 1
iS5Comm(config-mrp)# vid 2
iS5Comm(config-mrp)# mode manager-autocomp port1 gigabitethernet 0/1 port2 gigabitethernet 0/2
16.13. priority
To set the MRP priority of the device to become the manager ( MRM) of the ring, use the command
priority in MRP Ring Configuration Mode.
448
UUID
CHAPTER 16 MRP
priority
priority < (0-65535) >
Parameters
priority 0-65535 Enter to configure MRP priority to be manager ( MRM) in the ring, in case
auto manager is enabled.
Mode
MRP Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# mrp ringid 1
iS5Comm(config-mrp)# priority 8000
16.14. uuid
To configure the UUID value of the ring, use the command uuid in MRP Ring Configuration Mode.
uuid
uuid < string(32) >
Parameters
uuid string(32) Enter to configure MRP UUID as 32 octet string (hex). The UUID is a
128-bit domain UUID unique to a domain/ring. All MRP instances
belonging to the same ring must have the same domain ID.
Mode
MRP Configuration Mode
449
SHOW MRP
CHAPTER 16 MRP
Examples
iS5Comm# configure terminal
iS5Comm(config)# mrp ringid 1
iS5Comm(config-mrp)# uuid 10C20ACC507B55760487569C4CD9E3BB
show mrp
show mrp { ringid < short(1-2) > } [ detail ] [ counters ]
Parameters
Mode
Privileged Exec Mode
Definitions of Errors
Multiple MRM failures and errors: This error indicated by an MRM when more than one MRM are active
in the MRP ring. Possible values are as follows:
• false—no Multi- MRM error
• true—more than one MRM present in the ring
Single Side Error—displays Single Side Error state: This error also indicated by an MRM when the test
frames of an MRM have been seen, but only on one ring port. Possible values are as follows:
• false—no One Side Rx error
450
SHOW MRP
CHAPTER 16 MRP
Examples
451
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
HSR
17. HSR-PRP
The main purpose of the HSR and PRP protocols is to provide zero fail-over time network redundancy (in
comparision MRP has a fail-over time of a few 100 ms and STP/RSTP a few seconds).
A switch with an HSR-PRP line card supports the IEC 62439-3 standard (Industrial communication
networks – High availability automation networks – Part 3: Parallel Redundancy Protocol (PRP) and
High-availability Seamless Redundancy (HSR)). Up to four HSR-PRP line cards can be inserted into the
switch’s chassis providing up to eight HSR/PRP redundant interfaces.
The following document provides some information how to setup and monitor the redundant interfaces
and networks from the CLI (Command Line Interface).
The commands used for setting up redundant interfaces are shown in the Configuration Commands
section, while the section Informational Commands shows how to monitor the redundant interfaces. The
section Clear Commands is to be used to clear counters to set a new starting point for collection infor-
mation.
interface redundant
To configure a HSR-PRP line card redundant interface, use the command interface redundant in Global
Configuration Mode. Use this command to proceed to a specific redundant Interface Configuration
Mode.
interface redundant
interface redundant <red-id (1-8)> [name identification-string]
452
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# interface redundant 5
iS5Comm(config-if-red5)#
453
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# interface redundant 5 - 6
iS5Comm(config-if-red-range)#
Activation/Deactivation
From the Interface Configuration mode, the redundant interface can be activated or deactivated with the
following commands.
no shutdown
To activate a specific redundant interface, use the command no shutdown in Redundant Interface
Configuration Mode. The interface needs to be in redundancy enable mode for this command to work.
no shutdown
no shutdown
Mode
Redundant Interface Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# interface redundant 5
iS5Comm(config-if-red5)# no shutdown
shutdown
To deactivate the redundant interface, use the command shutdown in Redundant Interface Configura-
tion Mode.
454
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
shutdown
shutdown
Mode
Redundant Interface Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# interface redundant 5
iS5Comm(config-if-red5)# shutdown
HSR/PRP Mode
The redundant interface HSR/PRP mode can be set when the interface is in the deactivated state with
the following command.
mode
To set a redundant interface HSR/PRP mode (with optional NetId for HSR-PRP coupling and HSR-HSR
QuadBox) when the interface is in the deactivated state, use the command mode in Redundant Interface
Configuration Mode.
455
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
mode
mode {hsr | prp | hsr-prp-a | hsr-prp-b | hsr-hsr | hsr-hsr-a | hsr-hsr-b}
[netid <integer (1-7)>]
456
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
Parameters
Mode
Redundant Interface Configuration Mode
457
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
Examples
iS5Comm# configure terminal
iS5Comm(config)# interface redundant 6
iS5Comm(config-if-red6)# mode hsr
NOTE: The example above sets a specific redundant interface to HSR redundancy mode.
458
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
A QuadBox is only formed when both redundant interfaces on the line card are in this mode and then
both activated.
redundancy
To change the redundancy mode of a redundant interface, use the command redundancy in Redundant
Interface Configuration Mode.
redundancy
redundancy {enable | disable}
459
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
Parameters
Mode
Redundant Interface Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# redundancy 6
iS5Comm(config-if-red6)# redundancy disable
iS5Comm(config-if-red6)#
NOTE: The example above disables redundancy on a specific redundant interface. The interface needs to
be in a deactivated state for this command to work.
Supervision VLAN ID
It has been left up to the user to select the VLAN ID to be added to supervision frames originating from
the redundant interface as it can be part of any of multiple VLANs. The VLAN ID and supervisory priority
can be changed with the following commands.
supervision-vlan-id
To change the VLAN ID to be added to supervision frames originating from the redundant interface, use
the command supervision-vlan-id in Redundant Interface Configuration mode.
supervision-vlan-id
supervision-vlan-id <vlan (0-4094)>
460
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
Parameters
Mode
Redundant interface configuration mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# redundancy 6
iS5Comm(config-if-red6)# supervision-vlan-id 5
iS5Comm(config-if-red6)#
NOTE: The example above will set the supervision VLAN ID for a specific redundant interface to 5 .
supervision-priority
To setup and change the priority of the VLAN tag in the supervision frames independently of the VLAN
ID, use the command supervision-priorityin Redundant Interface Configuration mode.
supervision-priority
supervision-priority <integer (0-7)>
Parameters
Mode
Redundant Interface Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# redundancy 6
461
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
iS5Comm(config-if-red6)# supervision-priority 2
iS5Comm(config-if-red6)#
NOTE: The example above will set the supervision priority to 2 for a specific redundant interface
Port Control
Port-A and Port-B on the redundant interface can individually be disabled to test if redundant traffic is
coming in on either port. The following command can be used to control the port state.
port
To control the port state, use the command port in Redundant Interface Configuration mode.
port
port {A | B} {up | down}
Parameters
Mode
Redundant interface configuration mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# redundancy 6
iS5Comm(config-if-red6)# port A down
iS5Comm(config-if-red6)#
NOTE: The example above will take Port A down to not let Ethernet traffic in or out.
462
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
hsr-operational-mode
To set the HSR operational state, use the command hsr-operational-mode in Redundant Interface
Configuration Mode.
hsr-operational-mode
hsr-operational-mode {modeh | moden | modet | modeu | moder [netid <integer
(1-7)>]}
463
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
Parameters
Mode
Redundant Interface Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# redundancy 6
iS5Comm(config-if-red6)# hsr-operational-mode moden
iS5Comm(config-if-red6)#
464
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
hsr-rstp-fast-recovery
To set up the HSR-RSTP fast recovery, use the command hsr-rstp-fast-recovery in Redundant Interface
Configuration Mode.
hsr-rstp-fast-recovery
hsr-rstp-fast-recovery enable | disable
Parameters
Mode
Redundant Interface Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm (config)# interface redundant 5
iS5Comm(config-if-red5)# hsr-rstp-fast-recovery enable
HSR NetId
The HSR NetId is used to connect two RedBoxes to work together (used in HSR-PRP coupling mode,
HSR-HSR QuadBox mode and HSR operational Mode R). The NetId is an optional parameter in the mode
and hsr-operational-mode commands and if not specified will default to 1. This can subsequently be
changed with the hsr-netid command.
465
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
hsr-netid
To set the NetId, use the command hsr-netid in Redundant Interface Configuration Mode.
hsr-netid
hsr-netid <integer (1-7)>
Parameters
Mode
Redundant Interface Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm (config)# interface redundant 6
iS5Comm(config-if-red6)# hsr-netid 5
NOTE: The example above sets the HSR NetId to 5.
prp-trailer-pass
To set the PRP trailer passing state, use the command prp-trailer-pass in Redundant Interface Configu-
ration mode.
prp-trailer-pass
prp-trailer-pass {enable | disable}
466
CONFIGURATION COMMANDS
CHAPTER 17 HSR-PRP
Parameters
Mode
Redundant interface configuration mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# redundancy 6
iS5Comm(config-if-red6)# prp-trailer-pass enable
iS5Comm(config-if-red6)#
NOTE: The example above will enable PRP trailer passing from redundant network to ordinary network.
QuadBox VLANs
A reserved VLAN ID is used to connect two redundant switches to form a QuadBox on a line card to
isolate the Ethernet traffic from other ports. By default, VLAN ID 4059 to 4062 are the reserved values
used for the four possible QuadBoxes that can be created. However, it is possible that this range conflicts
with the user’s network VLAN assignment, so it is possible to move this block of four VLAN IDs to another
range.
The following command can be used to move the VLAN ID range in the Configuration mode.
redundant quad-box
To move the VLAN ID range in the Configuration mode, use the command redundant quad-box in Global
Configuration Mode.
467
INFORMATIONAL COMMANDS
CHAPTER 17 HSR-PRP
redundant quad-box
redundant quad-box base-vlan <vlan (0-4094)>
Parameters
Mode
Global Configuration mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# redundant quad-box base-vlan 4000
iS5Comm(config)#
NOTE: The example above will change QuadBox reserved VLAN IDs. All QuadBoxes need to be deactivated
for this command to work.
468
INFORMATIONAL COMMANDS
CHAPTER 17 HSR-PRP
469
INFORMATIONAL COMMANDS
CHAPTER 17 HSR-PRP
Parameters
Mode
470
INFORMATIONAL COMMANDS
CHAPTER 17 HSR-PRP
Examples
471
INFORMATIONAL COMMANDS
CHAPTER 17 HSR-PRP
472
INFORMATIONAL COMMANDS
CHAPTER 17 HSR-PRP
473
INFORMATIONAL COMMANDS
CHAPTER 17 HSR-PRP
Parameters
Mode
Privileged EXEC Mode
474
CLEAR COMMANDS
CHAPTER 17 HSR-PRP
Examples
iS5Comm# show interfaces counters redundant
REDUNDANCY INTERFACES RX COUNTERS
Port Frames CRC errors Own HSR Duplicates Dropped PRP wrong
LanID
------ ---------- ---------- ---------- ---------- ---------- ----------
Red-5A 19953 0 8654 2587 0 0
Red-5B 19939 0 8648 11294 0 0
Red-5I 1079 0 0 0 0 0
Red-7A 14495 0 0 8387 0 0
Red-7B 14495 0 0 14495 0 0
Red-7I 28320 0 0 0 0 0
Red-8A 17357 0 0 14774 0 0
Red-8B 17363 0 0 8532 0 0
Red-8I 27889 0 6 0 0 0
475
CLEAR COMMANDS
CHAPTER 17 HSR-PRP
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# configure terminal
iS5Comm (config)# clear interfaces redundant 5 counters
Parameters
Mode
Redundant Interface Configuration Mode
Examples
iS5Comm# clear counters redundant 5
476
CLEAR COMMANDS
CHAPTER 17 HSR-PRP
clear
clear hsr-prp redundant [<red-id (1-8)>] {node-table | proxy-node-table}
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# clear hsr-prp redundant node-table
iS5Comm(config)# clear hsr-prp redundant proxy-node-table
477
CHAPTER 18 LA
LA
18. LA
LA (Link Aggregation)
is a method of combining physical network links into a single logical link for increased bandwidth. LA
increases the capacity and availability of the communications channel between devices (both switches
and end stations) using existing Fast Ethernet and Gigabit Ethernet technology. LA also provides load
balancing where the processing and communication activity is distributed across several links in a trunk,
so that no single link is overwhelmed. By taking multiple LAN connections and treating them as a unified,
aggregated link, practical benefits in many applications can be achieved.
LA provides the following important benefits:
• Higher link availability
• Increased link capacity
Improvements are obtained using existing hardware (no upgrading to higher-capacity link technology is
necessary)
The Link Aggregation Control Protocol (LACP), described by IEEE 802.3ad, defines a method for two
switches to automatically establish and maintain link aggregation groups ( LAG)s, or also called port chan-
nels or channel-groups. Port channels combine the bandwidth of multiple Ethernet ports into a single
logical link, and management functions treat an LAG as if it were a single physical port.
When LACP is not enabled, a port channel might attempt to transmit packets to a remote single interface,
which causes the communication to fail.
When LACP is enabled, a local LAG cannot transmit packets unless an LAG with LACP is also configured
on the remote end of the link.
A channel group is a collection of Ethernet interfaces on a single switch. A port channel interface is a
virtual interface that serves a corresponding channel group and connects to a compatible interface on
another switch to form a port channel. Port channel interfaces can be configured and used in a manner
similar to Ethernet interfaces. Port channel interfaces are configurable as Layer 2 interfaces, Layer 3
(routable) interfaces, and VLAN members.
The switch supports up to 8 link aggregation groups, with a maximum of up to 8 ports per group.
478
CHANNEL-GROUP
CHAPTER 18 LA
18.1. channel-group
To add a port as a member of the specified port channel that is already created in the switch, use the
command channel-group in Interface Configuration Mode. The no form of the command deletes the
aggregation of the port from all port channels.
channel-group
channel-group <channel-group-number(1-65535)> mode {active | on | passive}
no channel-group
Parameters
Mode
Interface Configuration Mode
479
CHANNEL-PROTOCOL
CHAPTER 18 LA
Prerequisites
This command executes successfully, only if
• the LA functionality is started and enabled in the switch.
Examples
iS5Comm(config)# interface gi 0/9
iS5Comm (config-if)# channel-group 2 mode active
18.2. channel-protocol
To enable link aggregation (LA) in the switch, use the command channel-protocol in Global Configuration
Mode. This command is a standardized implementation of the existing command set port-channel and it
operates similarly to this command. The no form of the command disables LA in the switch.
channel-protocol
channel-protocol lacp
no channel-protocol
Parameters
Mode
Global Configuration Mode
Default
LA is disabled
Examples
iS5Comm(config)# channel-protocol lacp
480
DEBUG ETHERCHANNEL
CHAPTER 18 LA
debug etherchannel
debug etherchannel [all] [detail] [error] [event]
no debug etherchannel
no debug etherchannel [all] [detail] [error] [event]
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# debug etherchannel detail
481
DEBUG LACP
CHAPTER 18 LA
debug lacp
debug lacp [all] [buffer] [data] [events] [failall] [init-shutdown] [mgmt]
[os] [packet]
no debug lacp
no debug lacp [all] [buffer] [data] [events] [failall] [init-shutdown]
[mgmt] [os] [packet]
482
DEFAULT PORT
CHAPTER 18 LA
Parameters
Mode
Privileged EXEC Mode
Default
init-shutdown
Examples
iS5Comm# debug lacp data
483
DEFAULT PORT
CHAPTER 18 LA
only in dynamic aggregation selection.The no form of the command deletes the default port assigned for
the port channel.
default port
default port {Extreme-Ethernet <interface-id> | gigabitethernet <inter-
face-id>]
no default port
Parameters
Mode
Interface Configuration Mode
Prerequisites
• This command can be executed successfully, only if the LA functionality is started and enabled in
the switch.
• Only one port can be set as a default port.
• The port that is to be set as default port should have not been added as a member port for any of
the port channel.
484
DEFAULTED-STATE-THRESHOLD
CHAPTER 18 LA
Examples
iS5Comm# interface gigabitethernet 0/2
iS5Comm(config-if)# default port gigabitethernet 0/2
18.6. defaulted-state-threshold
To configure the default threshold on all ports in system and track the maximum number of times error
recovery can be triggered from default state, use the command defaulted-state-threshold in Interface
Configuration Mode. The no form of the command resets the defaulted state threshold value to default.
defaulted-state-threshold
defaulted-state-threshold <integer (0-20)>
no defaulted-state-threshold
Parameters
Mode
Interface Configuration Mode
Examples
iS5Comm# interface gi 0/2
iS5Comm(config-if)# defaulted-state-threshold 10
485
LACP ADMIN-KEY
CHAPTER 18 LA
hw-failure recovery-threshold
hw-failure recovery-threshold <integer (0-20)>
no hw-failure recovery-threshold
Parameters
Mode
Interface Configuration Mode
Examples
iS5Comm# interface gi 0/2
iS5Comm(config-if)# hw-failure recovery-threshold 10
lacp admin-key
lacp admin-key <admin-key(1-65535)> [mode {active | passive}]
486
LACP PORT-IDENTIFIER
CHAPTER 18 LA
Parameters
Integer Enter a value to configure the LACP actor admin key that is used while
<admin-key(1- port participates in dynamic aggregation selection. The port is made
65535)> as part of best aggregation selected based on system ID and admin
key.This value ranges from 1 to 65535.
mode Enter to configure the LACP Mode for the port.
active Enter to configure starting of LACP negotiation unconditionally. This
is the default mode.
passive Enter to configure starting of LACP negotiation only when LACP
packet is received from a peer.
Mode
Interface Configuration Mode
Prerequisites
This command executes successfully, only if
• the LA functionality is started and enabled in the switch.
• The admin key can be configured only for ports that select aggregator dynamically (the port is
configured as default interface for a port channel)
Examples
iS5Comm(config)# interface gi 0/9
iS5Comm (config-if)# lacp admin-key 1 mode active
lacp port-identifier
lacp port-identifier <port-id (1-65535)>
487
LACP PORT-PRIORITY
CHAPTER 18 LA
Parameters
<port-id Integer Enter a value to configure the LACP actor admin port ID to be filled in the
(1-65535)> LACP PDUs. This value represents the concerned aggregation port. This
value ranges from 1 to 65535. The maximum limit depends on the
number of ports. For example, if there are 24 ports, then the maximum
value will be 24 only and the value will range from 1 to 24.
Mode
Interface Configuration Mode
Prerequisites
This command executes successfully, only if
• the LA functionality is started and enabled in the switch.
• This configuration takes effect only on the interface that is configured for LACP.
Examples
iS5Comm(config)# interface gi 0/9
iS5Comm(config-if)# lacp port-identifier 2
lacp port-priority
lacp port-priority <priority (0-65535)>
488
LACP RATE
CHAPTER 18 LA
no lacp port-priority
Parameters
<priority Integer Enter a value to configure the LACP port priority. This value ranges from 0
(0-65535)> to 65535. This port priority is used in combination with LACP port
identifier during the identification of best ports in a port channel. The
priority determines if the link is an active link or a standby link, when the
number of ports in the aggregation exceeds the maximum number
supported by the hardware. The links with lower priority become active
links. The default is 128.
Mode
Interface Configuration Mode
Prerequisites
This command executes successfully, only if
• the LA functionality is started and enabled in the switch.
• This configuration takes effect only on the interface that is configured for LACP
• The LACP port priority will not be reset to its default value if the port is removed from one port
channel and added to another port channel.
Examples
iS5Comm(config)# int gi 0/9
iS5Comm(config- if)# lacp port-priority 1
489
LACP SYSTEM-IDENTIFIER
CHAPTER 18 LA
lacp rate
lacp rate {normal | fast}
no lacp rate
Parameters
Mode
Interface Configuration Mode
Prerequisites
This command executes successfully, only if
• the LA functionality is started and enabled in the switch.
• This configuration takes effect only on the interface that is configured for LACP.
Examples
iS5Comm(config)# interface gi 0/9
iS5Comm(config-if)# lacp rate fast
490
LACP SYSTEM-PRIORITY
CHAPTER 18 LA
lacp system-identifier
lacp system-identifier <system-id (aa:aa:aa:aa:aa:aa)>
no lacp system-identifier
Parameters
Mode
Global Configuration Mode
Prerequisites
This command executes successfully, only if
• the LA functionality is started and enabled in the switch.
Examples
iS5Comm(config)# lacp system-identifier 00:01:02:03:04:05
lacp system-priority
lacp system-priority <priority (0-65535)>
491
LACP TIMEOUT
CHAPTER 18 LA
no lacp system-priority
Parameters
<priority Integer Enter to configure the LACP priority associated with actor’s system ID. This
(0-65535) priority value ranges between 0 and 65535. The switch with the lowest
> LACP decides the standby and active links in the LA. The default is 32768.
Mode
Global Configuration Mode
Prerequisites
This command executes successfully, only if
• the LA functionality is started and enabled in the switch.
• when D-LAG status is disabled
Examples
iS5Comm(config)# set port-channel enable
lacp timeout
lacp timeout {long | short}
492
LACP WAIT-TIME
CHAPTER 18 LA
no lacp timeout
Parameters
long Enter to configure the LLACP timeout period as 90 seconds. The LACP
PDU should be received every 30 seconds. This is the default.
short Enter to configure the LLACP timeout period as 3 seconds. The LACP PDU
should be received every second.
Mode
Interface Configuration Mode
Prerequisites
This command executes successfully, only if
• the LA functionality is started and enabled in the switch.
• This configuration takes effect only on the interface that is configured for LACP.
Examples
iS5Comm(config)# interface gi 0/9
iS5Comm(config-if)# lacp timeout short
lacp wait-time
lacp wait-time <time <(0-10)>
493
PORT-CHANNEL MAX-PORTS
CHAPTER 18 LA
no lacp wait-time
Parameters
<time Integer Enter a value to configure the LACP wait time for an interface. This value
(0-10)> ranges from 0 to 10 seconds. The wait time represent the time (in
seconds) till which the port waits before entering into aggregation after
receiving partner information (that is, this represents the time taken to
attach to the port channel). The default is 2.
Mode
Interface Configuration Mode
Prerequisites
This command executes successfully, only if
• the LA functionality is started and enabled in the switch.
• This configuration takes effect only on the interface that is configured for LACP.
• The LACP wait-time will not be reset to its default value if the port is removed from one port
channel and added to another port channel
Examples
iS5Comm(config)# interface gi 0/9
iS5Comm(config-if)# lacp wait-time 1
port-channel max-ports
port-channel max-ports <integer (2-8)>
494
PORT-CHANNEL
CHAPTER 18 LA
Parameters
<integer Integer Enter a value to configure the maximum number of ports that can be
(2-8)> attached to a port channel. This value ranges from 2 to 8. The default is 8.
Mode
Interface Configuration Mode
Prerequisites
This command executes successfully, only if
• the LA functionality is started and enabled in the switch.
Examples
iS5Comm(config)# interface gi 0/9
iS5Comm(config-if)# port-channel max-ports 5
18.17. port-channel
To configure the load balancing policy for all port channels created in the switch, the defaulted state
threshold value for tracking the maximum number of times a port in defaulted state undergoes error
recovery, the value of error-recovery threshold, the hardware failure recovery threshold value, the
action to be performed on reaching the recovery threshold, and same state recovery threshold value for
tracking the maximum number of times the port stays in the same state before triggering error recovery,
use the command port-channel in Global Configuration Mode. The no form of the command resets the
load balancing policy and all threshold values to their default values. It also resets the action to be
performed on reaching the recovery threshold.
port-channel
port-channel {load-balance {dest-ip | dest-ip6 | dest-l4-port | dest-mac |
l3-protocol | mac-dest-vid | mac-src-dest-vid | mac-src-vid |
service-instance | src-dest-ip | src-dest-mac | src-ip | src-ip6 |
src-l4-port | src-mac | vlan-id} [<port-channel-index(1-65535)>]
| defaulted-state-threshold <integer (0-20)>
495
PORT-CHANNEL
CHAPTER 18 LA
no port-channel
port-channel {load-balance [<port-channel-index(1-65535)>]
|defaulted-state-threshold | error-recovery-threshold | hw-failure
recovery-threshold | rec-threshold-exceed-action | same-state}
496
PORT-CHANNEL
CHAPTER 18 LA
Parameters
load-balance Enter to configure the load balancing policy for all port channels
created in the switch. The policy sets the rule for distributing the
Ethernet traffic among the aggregated links to establish load
balancing.
dest-ip Enter to specify that the load distribution is based on the
destination IP address. The bits of the destination IP address in the
packet are used to select the port in which the traffic should flow.
dest-ip6 Enter to specify that the load distribution is based on the
destination IPv6 address. The bits of the destination IP address in
the packet are used to select the port in which the traffic should
flow.
dest-14-port Enter to specify that the load distribution is based on the
destination Layer 4 port. The bits of the destination Layer 4 port in
the packet are used to select the port in which the traffic should
flow.
dest-mac Enter to specify that the load distribution is based on the
destination host MAC address. The bits of the destination MAC
address in the packet are used to select the port in which the traffic
should flow. Packets to the same destination are sent on the same
port, but packets to different destinations are sent on different
ports in the channel.
l3-protocol Enter to specify that the load distribution is based on the Layer 3
protocol. The bits of the Layer 3 protocol in the packet are used to
select the port in which the traffic should flow.
mac-dest-vid Enter to specify that the load distribution is based on the
destination MAC address and VLAN ID. The VLAN ID and
destination MAC address in the packet are used to select the port
in which the traffic should flow.
mac-src-dest-v Enter to specify that the load distribution is based on the VLAN ID,
id and destination and source MAC address. The VLAN ID, source
MAC address and destination MAC address in the packet are used
to select the port in which the traffic should flow.
mac-src-vid Enter to specify that the load distribution is based on the source
MAC address and VLAN ID. The VLAN ID and source MAC address in
the packet are used to select the port in which the traffic should
flow.
497
PORT-CHANNEL
CHAPTER 18 LA
498
PORT-CHANNEL
CHAPTER 18 LA
<port-channel- Integer Enter to configure the load balancing policy for the specified
index(1-65535) port-channel. This is a unique value that represents the specific
> port-channel created. This value ranges from 1 to 65535.
defaulted-stat Enter to configure the defaulted state threshold value for tracking
e-threshold the maximum number of times a port in defaulted state undergoes
error recovery. This value overrides the threshold value configured
on the ports.
<integer Integer Enter a value for defaulted state threshold value for tracking the
(0-20)> maximum number of times a port in defaulted state undergoes
error recovery. This value ranges from 0 to 20. The default is 5.
error-recovery Enter to configure the error-recovery-threshold.
-threshold
<integer Integer Enter a value for error-recovery-threshold. It ranges from 0 to 20.
(0-20)> The default is 5.
hw-failure Enter to configure the hardware failure.
recovery-thres Enter to configure the hardware failure recovery threshold value
hold for tracking the maximum number of times a port can undergo
recovery after a hardware failure. This value overrides the
threshold value configured on the ports.
<integer Integer Enter a value for hardware failure recovery threshold. This value
(0-20)> ranges from 0 to 20. The default is 5.
rec-threshold- Enter to configure the action to be performed on reaching the
exceed-action recovery threshold.
none Enter to set the recovery threshold exceed action as none in the
port channel, in which no action will be is performed on reaching
the recovery threshold of the port and the port remains in the
same state (admin up). This is the default option.
shutdown Enter to shut down the recovery threshold exceed action in the
port channel, in which the administrative status of the port is made
as down when the recovery is triggered after reaching the
threshold value.
same-state Enter to configure the same state recovery threshold value for
tracking the maximum number of times the port stays in the same
state before triggering error recovery.
recovery-thres Enter to configure the same state recovery threshold value for
hold tracking the maximum number of times the port stays in the same
state before triggering error recovery.
499
SAME-STATE RECOVERY-THRESHOLD
CHAPTER 18 LA
<integer Integer Enter a value for the same state recovery threshold. This value
(0-20)> ranges from 0 to 20. The default is 5.
Mode
Global Configuration Mode
Default
load balance—src-dest-mac
rec-threshold-exceed-action—none
All threshold values—5
Prerequisites
This command executes successfully, only if
• Port-Channel is created in the system and mapped to a context.
• the LA functionality is started and enabled in the switch.
Examples
iS5Comm(config)# port-channel load-balance mac-src-dest-vid 1
iS5Comm(config)# port-channel defaulted-state-threshold 10
iS5Comm(config)# port-channel error-recovery-threshold 16
iS5Comm(config)# port-channel hw-failure recovery-threshold 10
iS5Comm(config)# port-channel rec-threshold-exceed-action none
iS5Comm(config)# port-channel same-state recovery-threshold 10
500
SET PORT-CHANNEL
CHAPTER 18 LA
same-state recovery-threshold
same-state recovery-threshold <integer (0-20)>
no same-state recovery-threshold
Parameters
Mode
Interface Configuration Mode
Examples
iS5Comm(config)# interface gi 0/2
iS5Comm(config-if)# same-state recovery-threshold 10
set port-channel
set port-channel {enable | disable}
501
SHOW ETHERCHANNEL
CHAPTER 18 LA
Parameters
enable Enter to enable LA feature in the switch. The LA feature allows aggregating
individual point-to-point links into a port channel group, so that the capacity
and availability of the communications channel between devices are
increased using the existing interface technology. Also, it starts the LA in the
switch if the LA has been shut down.
NOTE: a port-channel can be also called a link aggregation group or LAG.
Mode
Global Configuration Mode
Examples
iS5Comm(config)# set port-channel enable
show etherchannel
show etherchannel [<channel-group-number(1-65535)>] [detail] [load-balance]
[port] [port-channel] [protocol] [summary]
502
SHOW ETHERCHANNEL
CHAPTER 18 LA
Parameters
Mode
503
SHOW ETHERCHANNEL
CHAPTER 18 LA
Prerequisites
This command executes successfully only if,
• LA functionality is started in the switch.
• Port channel is created in the system
Examples
iS5Comm# show etherchannel
Port-channel Module Admin Status is enabled
Port-channel Module Oper Status is enabled
Port-channel recovery action on exceeding Threshold is None
Port-channel Independent mode is disabled
Port-channel System Identifier is 00:01:02:03:04:05
LACP System Priority: 5
LACP Error Recovery Time: 0
LACP Error Recovery Threshold: 5
LACP Recovery Triggered count: 0
LACP Error Recovery Threshold for Defaulted State : 5
LACP Error Recovery Threshold for Hardware Failure : 5
LACP Same state threshold : 5
504
SHOW ETHERCHANNEL
CHAPTER 18 LA
------------------
Port : Gi0/2
-------------
Port State = Up in Bundle
Channel Group : 1
Mode : Active
Port-channel = Po1
Pseudo port-channel = Po1
LACP port-priority = 128
LACP Wait-time = 2 secs
LACP Port Identifier = 2
LACP Activity : ActiveLACP Timeout : LongAggregation
State : Aggregation, Sync, Collecting, Distributing, Defaulted
LACP Port Admin Oper Port Port State Priority Key
Number State
---------------------------------------------------------------------
Gi0/2 Bundle 128 1 1 0x2 0xbe
Port-channel : Po1
-------------------
Number of Ports = 1
HotStandBy port = null
Port state = Port-channel Ag-Inuse
Protocol = LACP
Aggregator-MAC 00:03:02:03:04:41
Maximum number of Ports = 5
Port-Channel Mtu = 1500
Port-Channel Speed = 100 Mbps
Port-Channel High Speed = 0 Mbps
Port-Channel Member Ports
Speed = 100 MbpsPort-Channel
Member Ports High Speed = 100 Mbps
iS5Comm# show etherchannel load-balance
Channel Group Listing
505
SHOW ETHERCHANNEL
CHAPTER 18 LA
---------------------
Group : 1
----------
Source and Destination Mac VID
iS5Comm# show etherchannel port
Channel Group Listing
---------------------
Group: 1----------
Protocol :LACP
Ports in the Group ------------------
Port : Gi0/2
-------------
Port State = Up in Bundle
Channel Group : 1
Mode : Active
Port-channel = Po1
Pseudo port-channel = Po1
LACP port-priority = 128
LACP Wait-time = 2 secs
LACP Port Identifier = 2
LACP Activity : Active
LACP Timeout : Long
Aggregation State : Aggregation, Sync, Collecting, Distributing,
Defaulted
506
SHOW INTERFACES ETHERCHANNEL
CHAPTER 18 LA
507
SHOW INTERFACES ETHERCHANNEL
CHAPTER 18 LA
port belongs, port mode, aggregation state, port-channel ID, pseudo port-channel ID, admin key, oper
key, port number, port state, and LACP port-priority, wait-time, port identifier, activity and timeout. The
port channel details contain port channel ID, number of member ports, ID of hot standby port, port state,
status of protocol operate mode, aggregator MAC, and default port ID.
Parameters
Mode
Privileged EXEC Mode
Prerequisites
This command executes successfully only if,
• LA functionality is started in the switch.
508
SHOW INTERFACES ETHERCHANNEL
CHAPTER 18 LA
Examples
iS5Comm# show interfaces gigabitethernet 0/1 etherchannel
Port : Gi0/1
-------------
Port State = Up, Independent
Channel Group : 1
Mode : Active
Port-channel = Null
Pseudo port-channel = Po1
LACP port-priority = 1
LACP Wait-time = 1 secs
LACP Admin Port = 2
LACP Activity : Active
LACP Timeout : Short
509
SHOW LACP
CHAPTER 18 LA
Port-channel : Po1
-------------------
Number of Ports = 1
HotStandBy port = null
Port state = Port-channel Ag-Not-Inuse
Protocol = LACP
Aggregator-MAC 00:04:02:03:04:41
Maximum number of Ports = 5
show lacp
show lacp {<port-channel(1-65535)> {counters | neighbor [detail]} | counters
| neighbor [detail]}
510
SHOW LACP
CHAPTER 18 LA
Parameters
Mode
Privileged EXEC Mode
Prerequisites
This command executes successfully only if,
• LA functionality is started and enabled in the switch.
Examples
iS5Comm# show lacp 1 counters
LACPDUs Marker Response LACPDUs Error States
Port Sent Recv Sent Recv Sent Recv Pkts Err
Detd Trgd
------------------------------------------------------------------------
-----------
Channel group: 1
------------------
No interfaces aggregated in the channel group
511
SHUTDOWN PORT-CHANNEL
CHAPTER 18 LA
shutdown port-channel
no shutdown port-channel
Mode
Global Configuration Mode
Default
LA is started in the switch, but not enabled. That is LA operational status is disabled
Prerequisites
LA cannot be started in the switch, if the base bridge Mode is configured as transparent bridging
Examples
iS5Comm(config)# shutdown port-channel
512
CHAPTER 19 LLDP
LLDP
19. LLDP
LLDP
(Link Layer Discovery Protocol) supports a set of attributes that are used for discovering the neighbor
devices. These attributes contain type, length, and value descriptions and are referred to as Time to Live
( TLV)s. LLDP supported devices can use TLVs to receive and send information to their neighbors.
TLV (Time to Live) is value that defines for the receiving agent how long the information contained in the
TLV Value field is valid.
TTL = message transmission interval * hold time multiplier.
For example, if the value of LLDP transmission interval is 30, and the value of the LLDP hold multiplier is
4, then the value 120 is encoded in the TTL field in the LLDP header.
Fast transmission periods are initiated when a new neighbor is detected, and cause LLDP packets to be
transmitted at a shorter time interval than during normal operation of the protocol. The fast transmis-
sion period ensures that more than one LLDP packet is transmitted when a new neighbor is detected. The
first transmission is immediate, and the subsequent transmissions occur at the specified fast transmis-
sion (TX) interval.
The switch supports the following mandatory basic management TLVs.
• Port description TLV
• System name TLV
• System description
• System capabilities TLV
• Management address TLV
• Port VLAN ID TLV (IEEE 802.1 organizationally specific TLVs)
• MAC/PHY configuration/status TLV (IEEE 802.3 organizationally specific TLVs)
LLDP conforms to IEEE 802.1AB-2005 standard. The LLDP allows systems on an Ethernet LAN to advertise
their key capabilities and also to learn about the key capabilities of other systems on the same Ethernet
LAN. This, in turn, promotes a unified network management view of the LAN topology and connectivity
to aid network administration and trouble-shooting.
LLDP provides the following features:
• Provides full conformance to the 802.1AB specification.
513
CLEAR LLDP
CHAPTER 19 LLDP
• Supports all mandatory TLVs (Chassis ID, Port ID and Time To Live).
• Supports optional TLVs - Port description, System name, System description, System capabilities
and Management address.
• Supports organizationally specific optional TLVs - Port VLAN ID, Port and protocol VLAN ID, VLAN
name, MAC or PHY configuration or status, Link Aggregation and Maximum frame size.
• Provides a generic set of APIs for easy integration into different platforms.
• Supports the basic MIB, as well as, the extension MIBs in Appendix F and Appendix G as defined in
the 802.1AB specification and a proprietary MIB for management.
• Provides support for notifications through traps
clear lldp
clear lldp {counters | table}
Parameters
Mode
Global Configuration Mode
Prerequisites
This command executes only if LLDP is started.
Examples
iS5Comm(config)# clear lldp counters
514
DEBUG LLDP
CHAPTER 19 LLDP
debug lldp
debug lldp {all | all-fail | buf | critical | ctrl | data-path | init-shut |
mgmt] | pkt-dump | redundancy | resource
| tlv {all | chassis-id | inventory-management | lagg | mac-phy | max-frame
| med-capability | mgmt-addr | mgmt-digest | network-policy | port-descr |
port-id | port-vlan | ppvlan | proto-id | pwr-mdi | sys-capab | sys-descr |
sys-name | ttl | vid-digest | vlan-name}
no debug lldp
no debug lldp {all | all-fail | buf | critical | ctrl | data-path |
init-shut | mgmt] | pkt-dump | redundancy | resource | tlv}
515
DEBUG LLDP
CHAPTER 19 LLDP
Parameters
516
DEBUG LLDP
CHAPTER 19 LLDP
Mode
Privileged EXEC Mode
Prerequisites
This command executes only if LLDP is started
Examples
iS5Comm# debug lldp init-shut
iS5Comm# debug lldp tlv sys-descr
517
LLDP
CHAPTER 19 LLDP
19.3. lldp
To configure global LLDP properties on the switch such as, interval at which LLDPDU are transmitted,
chassis identifier, hold time-multiplier value, reinitialization delay time, transmit delay, or maximum
number of consecutive LLDPDUs that can be transmitted at any time or during fast transmission period,
use the command lldp in Global Configuration Mode. This command executes only if LLDP is started. The
no form of the command resets the multiplier, the notification interval, reinitialization delay time, the
transmission interval, and the transmit delay to their default values.
lldp
lldp {MessageFastTx <range (1-3600)>
| chassis-id-subtype {chassis-comp <string(255)> | if-alias | if-name |
local <string(255)> | mac-addr | nw-addr | port-comp <string(255)>}
| holdtime-multiplier <value(2-10)>
| notification-interval <seconds(5-3600)>
| reinitialization-delay <seconds(1-10)>
| transmit-interval <value(5-32768)>
| tx-delay <value(1-8192)>
| txFastInit <value(1-8)>}
no lldp
no lldp {holdtime-multiplier | notification-interval | reinitializa-
tion-delay | transmit-interval | tx-delay}
518
LLDP
CHAPTER 19 LLDP
Parameters
519
LLDP
CHAPTER 19 LLDP
520
LLDP
CHAPTER 19 LLDP
Mode
Global Configuration Mode
Examples
iS5Comm(config)# lldp MessageFastTx 3500
iS5Comm(config)# lldp chassis-id-subtype chassis-comp myswitch
iS5Comm(config)# lldp chassis-id-subtype if-alias
iS5Comm (config)# lldp holdtime-multiplier 5
iS5Comm(config)# lldp notification-interval 150
iS5Comm(config)# lldp reinitialization-delay 4
iS5Comm(config)# lldp transmit-interval 50
iS5Comm(config)# lldp txCreditMax 3
iS5Comm(config)# lldp txFastInit 3
19.4. lldp
To configure LLDP properties on an interface, use the command lldp in Interface Configuration Mode.
This command executes only if LLDP is started. The no form of the command resets all LLDP properties
to their default values. This command can be executed only if LLDP is started.
lldp
lldp {Dest-mac <mac_addr>
| med-location med-tlv-select elin-location location-id <string(10-25)>
521
LLDP
CHAPTER 19 LLDP
no lldp
no lldp {Dest-mac | med-location | med-tlv-select | notification | receive |
tlv-select | transmit}
522
LLDP
CHAPTER 19 LLDP
Parameters
523
LLDP
CHAPTER 19 LLDP
524
LLDP
CHAPTER 19 LLDP
525
LLDP
CHAPTER 19 LLDP
Mode
Interface Configuration Mode
Examples
iS5Comm(config-if)# lldp dest-mac 00:11:22:33:44:55
% Dest-Mac address cannot be configured for lldp version1
526
SET LLDP
CHAPTER 19 LLDP
iS5Comm(config-if)# exit
iS5Comm(config)# set lldp version v2
iS5Comm (config-if)# lldp med-location elin-location location-id 12345678912345
iS5Comm(config-if)# lldp med-tlv-select inventory-management
iS5Comm(config-if)# lldp med-tlv-select location-id mac-address 00:01:03:04:06:07
iS5Comm(config-if)# lldp med-tlv-select inventory-management
iS5Comm(config-if)# lldp med-tlv-select location-id mac-address 00:01:03:04:06:07
iS5Comm(config-if)# lldp notification remote-table-chg
iS5Comm(config-if)# lldp port-id-subtype mac-addr
iS5Comm(config-if)# lldp port-id-subtype local slot0/1
iS5Comm(config-if)# lldp tlv-select basic-tlv port-descr
iS5Comm(config-if)# lldp tlv-select dot1tlv port-vlan-id mac-address 00:11:22:33:44:55
iS5Comm(config-if)# lldp tlv-select dot3tlv macphy-config
iS5Comm(config-if)# lldp receive
iS5Comm(config-if)# lldp transmit
iS5Comm(config-if)# lldp med-tlv-select inventory-management
iS5Comm(config-if)# lldp med-tlv-select location-id mac-address 00:01:03:04:06:07
set lldp
set lldp {disable | enable | tag status {enable | disable} | version {v1 |
v2}}
527
SET LLDP-MED
CHAPTER 19 LLDP
Parameters
disable Enter to disable LLDP feature in the switch. There will be no transmitting /
receiving the LLDP packets between LLDP module and the server.This is the
default.
enable Enter to enable LLDP feature in the switch or to transmits /receive the LLDP
packets between LLDP module and the server.
tag Enter to set the transmitted LLDPDU (LLDP Data Units) to be tagged or
untagged.
status Enter to configure the status of the transmitted LLDPDU as tagged or not.
disable Enter to disable tagging of the LLDPDU. Untagged LLDPDU do not carry a
VLAN identifier as part of the Ethernet header.
enable Enter to enable tagging of the LLDPDU. When the LLDP tag is enabled, the
Tagged LLDP packets are transmitted on edge virtual bridge (EVB) uplink
access ports (UAP), and untagged LLDP packets will be transmitted on the
other ports. The configured management IP address is carried in the
management address TLV of the LLDP packet.
version Enter to determine the LLDP version to be used.
v1 Enter to enable LLDP 2005 version 1.
v2 Enter to enable LLDP 2009 version 2
Mode
Global Configuration Mode
Examples
iS5Comm(config)# set lldp enable
iS5Comm(config)# set lldp version v2
iS5Comm (config)# set lldp tag status enable
528
SHOW LLDP
CHAPTER 19 LLDP
set lldp-med
set lldp-med {enable | disable}
Parameters
Mode
Interface Configuration Mode
Examples
iS5Comm (config-if)# set lldp-med enable
show lldp
show lldp [errors]
[interface {Extreme-Ethernet <interface-id> | Gigabitethernet <inter-
face-id>}]
[local {{Extreme-Ethernet <interface-id> | Gigabitethernet <interface-id>}
[mac-addr <mac-addr>]} [mgmt-addr]]
[neighbors [Extreme-Ethernet <interface-id> | Gigabitethernet <inter-
face-id>}] [chassis-id <string(255)>] [detail]]
529
SHOW LLDP
CHAPTER 19 LLDP
530
SHOW LLDP
CHAPTER 19 LLDP
Parameters
errors Enter to display the information about the errors such as memory
allocation failures, queue overflows and table overflow
interface Enter to display the information about interfaces where LLDP is
enabled
Gigabitethernet Enter to display gigabitetethernet type of interface.
Gigabitethernet is a version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
<interface-id> Enter to display a specific slot number / port number. The format
is <0>/<1-28> without spaces between Slot Number/Port Number.
For example, 0/1.
Extreme-Ethernet Enter to display the Extreme-Ethernet type of interface. Extreme
Ethernet is a version of Ethernet that supports data transfer up to
10 Gigabits per second and only full duplex links
<interface-id> Enter to display a specific slot number / port number. The format
is <0>/<1-4> without spaces between Slot Number/Port Number.
For example, 0/1.
local Enter to display the current switch information that willshow lldp
local be used to populate outbound LLDP advertisements for a
specific interface or all interfaces
Gigabitethernet Enter to display gigabitetethernet type of interface.
Gigabitethernet is a version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
<interface-id> Enter to display a specific slot number / port number. The format
is <0>/<1-28> without spaces between Slot Number/Port Number.
For example, 0/1.
Extreme-Ethernet Enter to display the Extreme-Ethernet type of interface. Extreme
Ethernet is a version of Ethernet that supports data transfer up to
10 Gigabits per second and only full duplex links
<interface-id> Enter to display a specific slot number / port number. The format
is <0>/<1-4> without spaces between Slot Number/Port Number.
For example, 0/1.
mac-addr Enter to display information about neighbors for the specified
destination MAC address of the LLDP agent.
<mac-addr> Enter a destination MAC address.
531
SHOW LLDP
CHAPTER 19 LLDP
532
SHOW LLDP
CHAPTER 19 LLDP
533
SHOW LLDP
CHAPTER 19 LLDP
Mode
Privileged EXEC Mode
Examples
iS5Comm# show lldp
LLDP is enabled
LLDP Version : v1
Transmit Interval : 50
Holdtime Multiplier : 4
Reinitialization Delay : 2
Tx Delay : 2
Notification Interval : 5
Chassis Id SubType : Mac Address
Chassis Id : e8:e8:75:90:0b:01
LLDP Tag Status : disabled
Configured Management Ipv4 Address : 0.0.0.0
Configured Management Ipv6 Address : ::
iS5Comm# show lldp interface gigabitethernet 0/1
0/1:
Tx State : Enabled
Rx State : Enabled
Tx SEM State : INITIALIZE
Rx SEM State : WAIT PORT OPERATIONAL
Notification Status : Disabled
Notification Type : Mis-configuration
DestinationMacAddr : 01:80:c2:00:00:0e
iS5Comm# show lldp local (only gi 0/1 shown below)
Capability Codes :(R) Router, (B) Bridge, (T) Telephone, (C) DOCSIS
Cable Device,
(W) WLAN Access Point, (P) Repeater, (S) Station, (O) Other
534
SHOW LLDP
CHAPTER 19 LLDP
-LLDP-MED Info
Device Class : Network Connectivity
Gi0/1 :
Port Id SubType : Interface Alias
Port Id : Gi0/1
Port Description : Ethernet Interface Port 01
Enabled Tx Tlvs : Port Description, System Name,
System Description, System Capability,
Management AddressExtended 802.3 TLV Info
-MAC PHY Configuration & Status
Auto-Neg Support & Status : Not Supported, Enabled
Advertised Capability Bits : 0000
Operational MAU Type : 0
-Link Aggregation
Capability & Status : Not Capable, Not In
AggregationAggregated Port Id : 0
-Maximum Frame Size : 1500
535
SHOW LLDP
CHAPTER 19 LLDP
1 Disabled
LLDP-MED Admin Status : Disabled
-LLDP-MED Capability TLV
LLDP-MED Tx Supported : MedCapability, NetworkPolicy,
LocationIdentity,
Ex-PowerViaMDI-PSE, Inventory
LLDP-MED Tx Enabled :
536
SHOW LLDP
CHAPTER 19 LLDP
537
AAA AUTHENTICATION DOT1X DEFAULT
CHAPTER 20 PNAC
PNAC
20. PNAC
PNAC
(Port Based Network Access Control) is a portable implementation of the IEEE Std 802.1x PNAC.
The IEEE 802.1X standard defines a client-server-based access control and authentication protocol that
prevents unauthorized clients from connecting to a LAN through publicly accessible ports unless they are
properly authenticated. The authentication server authenticates each client connected to a port before
making available any services offered by the device or the network.
Until the client is authenticated, IEEE 802.1X access control allows only Extensible Authentication
Protocol over LAN (EAPOL) and Spanning Tree Protocol (STP) traffic through the port to which the client
is connected. After authentication is successful, normal traffic can pass through the port.
When the command aaa authentication dot1x default is used to enable the dot1x local authentication
or RADIUS server / TACACS + server (authentication server) based remote authentication method for all
ports, the router initiates authentication
• when the link state changes from down to up, or
• periodically if the port remains up and unauthenticated.
When the device that requests access to LAN and a switch (supplicant) supplies its identity, the router
begins its role as the intermediary, passing EAP frames between the supplicant and the authentication
server until authentication succeeds or fails.
538
AAA AUTHENTICATION DOT1X DEFAULT
CHAPTER 20 PNAC
Parameters
Mode
Global Configuration Mode
Default
local
Examples
iS5Comm(config)# aaa authentication dot1x default group radius
539
DOT1X
CHAPTER 20 PNAC
20.2. dot1x
To set the dot1x Network Access Server (NAS) ID, use the command dot1x in Global Configuration Mode.
The no form of the command resets the periodic sync timer and max alive count for distributed PNAC to
their default values, deletes an entry from the dot1x authentication server database, and disables dot1x
in the switch.
dot1x
dot1x {distributed {max-keep-alive-count <short<0-300)> | periodic-sync-time
<short(1-5))>}
| init {aa:aa:aa:aa:aa:aa | session-reauth aa:aa:aa:aa:aa:aa}
| init-session aa:aa:aa:aa:aa:aa
| local-database <username> password <string (20)> permission {allow |
deny} [auth-timeout <(value(1-7200)>] [interface {Extreme-Ethernet <inter-
face-id> | gigabitethernet <interface-id>}]
| mode {centralized | distributed}
| system-auth-control}
no dot1x
no dot1x {distributed | local-database | system-auth-control}
540
DOT1X
CHAPTER 20 PNAC
Parameters
distributed Enter to configure periodic sync timer and max alive count for
distributed PNAC (D-PNAC).
periodic-sync-t Enter to configure the D-PNAC sync timer used in distributed
ime -PNAC. The Periodic sync timer is used to configure the
transmission interval of D-PNAC periodic-sync PDUs. In the master
node, this timer expiry is used to identify the slave down and
remove the slave node information.
NOTE: The configured value of this timer is applicable only from the
next start/re-start of the timer.
NOTE: If the configured value is '0', then no periodic-sync messages
will be sent from that D-PNAC node.
<short<0-300)> Integer Enter a value for the periodic sync timer. This runs individually in
each D-PNAC node, and the value ranges from 0 to 300 seconds.
max-keep-alive- Enter to configure keep alive mechanism when distributed-PNAC
count status is enabled. This is maintained by Master Node.
NOTE: The keep alive count of all remote D-PNAC nodes is incre-
mented every time when the periodic-sync timer expires.
NOTE: The value resets to zero for a particular D-PNAC node, only on
receiving periodic-sync/ event-update message from that particular
remote D-PNAC node.
NOTE: If keep alive count of any of the Remote D-PNAC node reaches
the maximum keep alive count, the Remote D-PNAC node is
declared as operationally down/dead
<short<1-5)> String Enter a value for the keep alive count. The value ranges from 1 to 5.
init Enter to initiate dot1x re-authentication session for the specified
MAC address. When the supplicant has exceeded the time limit for
accessing the protected network, the supplicant is forced for
re-authentication. This is to ensure that the supplicant is the same
entity that was initially authenticated.
NOTE: On execution of this command, the authenticator initiates
re-authentication for the specified supplicant MAC address.
aa:aa:aa:aa:aa: Enter a MAC address of the supplicant.
aa
session-reaut Enter to configure Reauthentication session initiation.
541
DOT1X
CHAPTER 20 PNAC
init-session Enter to initiate dot1x authentication session for the given MAC
address of the supplicant. The supplicant requests for access to the
protected network. It sends EAPOL (Extensible Authentication
Protocol) frames to the authenticator. When the supplicant is
authorized by the remote server, the session is initiated.
NOTE: The supplicant MAC address must be authorized prior to the
execution of this command.
aa:aa:aa:aa:aa: Enter a MAC address of the supplicant.
aa
local-database Enter to configure dot1x authentication server local database with
user name and password.
<username> Enter an user name for the new entry in the database.
password Enter to configure dot1x authentication server local database with
user name and password.
<string (20)> Enter a password for the user.
permission Enter to configure the permission for access for the user on a set of
ports.
allow Enter to provide the user with access.
deny Enter to deny access to the user.
interface Enter to configure the interface type for the specified interface.
Gigabitethernet Enter to configure gigabitetethernet type of interface.
Gigabitethernet is a version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
<interface-id> Enter to configure a specific slot number / port number. The format
is <0>/<1-28> without spaces between Slot Number/Port Number.
For example, 0/1.
Extreme-Etherne Enter to configure the Extreme-Ethernet type of interface. Extreme
t Ethernet is a version of Ethernet that supports data transfer up to
10 Gigabits per second and only full duplex links
<interface-id> Enter to configure a specific slot number / port number. The format
is <0>/<1-28> without spaces between Slot Number/Port Number.
For example, 0/1.
542
DOT1X
CHAPTER 20 PNAC
mode Enter to set the PNAC (Port based Network Access Control) mode
as centralized or distributed- PNAC feature in the system. D-PNAC
comprises of Master and Slave functionality. It is an extension of
PNAC which provides ability to extend the access control in the
system working over a single card to multiple cards with each
operating in a distributed fashion.
centralized Enter to configure PNAC.
distributed Enter to configure distributed- PNAC.
system-auth-con Enter to enable dot1x in the switch. The dot1x is an authentication
trol mechanism. It acts as mediator between the authentication server
and the supplicant (client). If the client accesses the protected
resources, it contacts the authenticator with EAPOL frames.
Mode
Global Configuration Mode
Default
dot1x is enabled
Examples
iS5Comm(config)# dot1x distributed periodic-sync-time 300 max-keep-alive-count 2
iS5Comm(config)# dot1x mode distributed
iS5Comm(config) dot1x init session-reauth 00:1e:58:a7:f3:93
iS5Comm(config)# dot1x init-session 00:1e:58:a7:f3:93
iS5Comm(config)# dot1x local-database myUser password admin123 permission allow auth-timeout
6000
iS5Comm(config)# dot1x system-auth-control
20.3. dot1x
To clear dot1x statistics information, initialize the state machines, set up the environment for fresh
authentication, and initiate re-authentication of all dot1x-enabled ports or the specified dot1x-enabled
port, use the command dot1x in Privileged EXEC Mode.
543
DOT1X
CHAPTER 20 PNAC
dot1x
clear statistics [interface {Extreme-Ethernet <interface-id> | gigabiteth-
ernet <interface-id>}] [mac-statistics address <mac_addr>]
| initialize [interface {Extreme-Ethernet <interface-id> | gigabitethernet
<interface-id>}]
| re-authenticate [interface {Extreme-Ethernet <interface-id> | gigabiteth-
ernet <interface-id>}
544
DOT1X
CHAPTER 20 PNAC
Parameters
clear Enter to start clearing statistics information for the switch or the
specified interface.
statistics Enter to configure statistics related configuration.
interface Enter to configure the interface type for the specified interface.
Gigabitethernet Enter to configure Gigabit Ethernet type of interface. Gigabit
Ethernet is a version of LAN standard architecture that supports
data transfer up to 1 Gigabit per second.
<interface-id> Enter to configure a specific slot number / port number. The
format is <0>/<1-28> without spaces between Slot Number/Port
Number. For example, 0/1.
Extreme-Ethernet Enter to configure the Extreme-Ethernet type of interface.
Extreme Ethernet is a version of Ethernet that supports data
transfer up to 10 Gbits per second and only full duplex links
<interface-id> Enter to configure a specific slot number / port number. The
format is <0>/<1-28> without spaces between Slot Number/Port
Number. For example, 0/1.
mac-statistic Enter to configure clearing dot1x MAC statistics information for
all MAC sessions or the specified MAC address.
address Enter to configure specific MAC address for which the dot1x
information will be cleared.
<mac_addr> Enter a MAC address for which the dot1x information will be
cleared.
initialize Enter to configure initializing of the state machines and setting
up the environment for fresh authentication. This initiates
re-authentication of all dot1x-enabled ports or the specified
dot1x-enabled port. Re-authentication is manually configured if
periodic re-authentication is not enabled. Re-authentication is
requested by the authentication server from the supplicant to
furnish the identity without waiting for the configured number of
seconds (re-authperiod). If no interface is specified,
re-authentication is initiated on all dot1x ports
This command is a standardized implementation of the existing
command; dot1x re-authenticate. It operates similar to the
existing command.
545
DOT1X
CHAPTER 20 PNAC
Mode
Privileged EXEC Mode
Default
dot1x is enabled
Examples
iS5Comm# dot1x clear statistics
Interface and MAC Statistics cleared successfully
iS5Comm# dot1x clear statistics interface gigabitethernet 0/1
Interface Statistics cleared successfully
iS5Comm# dot1x clear statistics mac-statistics address 00:1e:58:a7:f3:93
MAC Statistics cleared successfully
iS5Comm# dot1x re-authenticate interface gigabitethernet 0/1
iS5Comm# dot1x initialize interface gigabitethernet 0/1
20.4. dot1x
To set the PNAC related information or configure the dot1x parameters for a specified port, use the
command dot1x in Interface Configuration Mode. The no form of the command resets the parameters
to their default value or to no authentication, and disables periodic re-authentication from authenticator
to client.
546
DOT1X
CHAPTER 20 PNAC
dot1x
dot1x {access-control {active | inactive}
| auth-mode {port-based | mac-based}
| control-direction {in | both}
| default
| disable
| enable
| host-mode {multi-host | single-host}
| max-req <count(1-10)>
| max-start <count (1-65535)>
| port-control {auto | force-authorized} | force-unauthorized}
| reauth-max <count(1-10)>
| reauthentication
| timeout {auth-period | held-period | quiet-period | reauth-period |
server-timeout | start-period | supp-timeout | tx-period} <value (1-65535)>
no dot1x
no dot1x {access-control | auth-mode | control-direction | max-req |
max-start | port-control | reauth-max | reauthentication | timeout
547
DOT1X
CHAPTER 20 PNAC
Parameters
548
DOT1X
CHAPTER 20 PNAC
549
DOT1X
CHAPTER 20 PNAC
<count (1-10)> Integer Enter a value for maximum number of EAP retries to the client
by the authenticator before restarting authentication process.
The count value ranges between 1 and 10. The default is 2.
max-start Enter to set the maximum number of EAPOL retries to the
authenticator.
<count (1-65535)> Integer Enter a value for maximum number of EAP retries to the
authenticator. The count value ranges between 1 and 65535.
The default is 3.
port-control Enter to configure the authenticator port control parameter.
The dot1x exercises port based authentication to increase the
security of the network. The different modes employed to the
ports offer varied access levels. The 802.1x protocol is
supported on both Layer 2 static-access ports and Layer 3
routed ports.
auto Enter to configure the 802.1x authentication process in this
port. Causes the port to begin the unauthorized state, allowing
only EAPOL frames to be sent and received through the port.
The authentication process begins when the link state of the
port transitions from down to up or when an EAPOL-start frame
is received. The switch requests the identity of the client and
begins relaying authentication messages between the client and
the authentication server. The switch can uniquely identify each
client attempting to access the network by the client's MAC
address.
force-authorized Enter to configure the port to allow all traffic through this port.
Disables 802.1x authentication and causes the port to transit to
the authorized state without requiring authentication exchange.
The port transmits and receives normal traffic without
802.1x-based authentication of the client. This is the default
option.
force-unauthorize Enter to configure the port to block all traffic through this port.
d Causes the port to remain in the unauthorized state, ignoring all
attempts by the client to authenticate. The switch cannot
provide authentication services to the client through the
interface.
550
DOT1X
CHAPTER 20 PNAC
551
DOT1X
CHAPTER 20 PNAC
Mode
Interface Configuration Mode
Examples
iS5Comm (config-if)# dot1x access-control active
iS5Comm (config-if)# dot1x auth-mode mac-based
iS5Comm(config-if)# dot1x control-direction in
iS5Comm(config-if)# dot1x default
Setting the Default Configuration for Dot1x on this interface
iS5Comm(config-if)# dot1x disable
iS5Comm(config-if)# dot1x enable
iS5Comm(config-if)# dot1x host-mode single-host
iS5Comm(config-if)# dot1x max-req 5
iS5Comm(config-if)# dot1x max-start 2
iS5Comm(config-if)# dot1x port-control auto
iS5Comm(config-if)# dot1x reauth-max 5
iS5Comm(config-if)# dot1x reauthentication
iS5Comm(config-if)# dot1x timeout quiet-period 30
552
DEBUG DOT1X
CHAPTER 20 PNAC
debug dot1x
debug dot1x {all | errors | events | packets | redundancy | registry |
state-machine}
no debug dot1x
no debug dot1x {all | errors | events | packets | redundancy | registry |
state-machine}
553
SHOW DOT1X
CHAPTER 20 PNAC
Parameters
Mode
Privileged EXEC Mode
Default
Events Debugging is enabled
Examples
iS5Comm# debug dot1x all
554
SHOW DOT1X
CHAPTER 20 PNAC
show dot1x
show dot1x [all]
[distributed {auth-status slot <slot number (0-2147483647)> | detail |
statistics slot <slot number (0-2147483647)>}]
[interface {Extreme-Ethernet <interface-id> | gigabitethernet <inter-
face-id>}]
[local-database]
[mac-info address <mac_addr (aa:bb:cc:dd:ee:ff)>]
[mac-statistics address <mac_addr (aa:bb:cc:dd:ee:ff)>]
[statistics [interface {Extreme-Ethernet <interface-id> | gigabitethernet
<interface-id>}]
[supplicant-statistics [interface {Extreme-Ethernet <interface-id> | giga-
bitethernet <interface-id>}]
555
SHOW DOT1X
CHAPTER 20 PNAC
Parameters
556
SHOW DOT1X
CHAPTER 20 PNAC
557
SHOW DOT1X
CHAPTER 20 PNAC
Mode
Privileged EXEC Mode
Default
dot1x is enabled
Examples
iS5Comm# show dot1x
Sysauthcontrol = Enabled
Module Oper Status = Enabled
Dot1x Protocol Version = 2
Dot1x Authentication Method = Radius
Nas ID = Identifier
iS5Comm# show dot1x local-database
PNAC Authentication Users Database
iS5Comm# show dot1x all (only Gi0/1 shown)
Dot1x Info for Gi0/1---------------------
AuthMode = PORT-BASED
AuthPaeStatus = ENABLED
PortStatus = AUTHORIZED
AccessControl = INACTIVE
AuthSM State = INITIALIZE
SuppSM State = DISCONNECTED
BendSM State = INITIALIZE
AuthPortStatus = AUTHORIZED
SuppPortStatus = UNAUTHORIZED
AdminControlDirection = BOTH
OperControlDirection = BOTH
558
SET NAS-ID
CHAPTER 20 PNAC
MaxReq = 2
ReAuthMax = 2
Port Control = Force Authorized
QuietPeriod = 60 Seconds
Re-authentication = Disabled
ReAuthPeriod = 3600 Seconds
ServerTimeout = 30 Seconds
SuppTimeout = 30 Seconds
Tx Period = 30 Second
iS5Comm# show dot1x distributed auth-status
DPNAC Authentication Information: Slot 0
----------------------------------------------------
Port Authentication Control
Port Property Status Direction
-------- --------- --------------- ------------
Gi0/1 Local Authorized BOTH
DPNAC Authentication Information: Slot 1
----------------------------------------------------
Port Authentication Control
Port Property Status Direction
-------- --------- --------------- ------------
Gi1/1 Remote Authorized BOTH
iS5Comm # show dot1x distributed detail
DPNAC Detail information
--------------------------
PNAC Status : Centralized
Role-Played : None
Periodic Sync-Timer : 300 Seconds
Maximum Keep Alive Count : 2
559
SET NAS-ID
CHAPTER 20 PNAC
set nas-id
set nas-id <identifier>
Parameters
<identifier> String Enter a value for dot1x network access server (NAS) ID. The NAS ID is set in
the RADIUS packets sent to the Remote Authentication Server. The
maximum length of the string is 16.
Mode
Global Configuration Mode
Default
fsNas1
Prerequisites
NAS ID can be configured only if the remote authentication server is RADIUS or TACACS.
Examples
iS5Comm(config)# set nas-id Identifier
560
BASE
CHAPTER 21 VLAN
VLAN
21. VLAN
VLANs (Virtual LANs) can be viewed as a group of devices on different physical LAN segments that can
communicate with each other as if they were all on the same physical LAN segment. That is, in VLAN, a
network of computers behave as if they are connected to the same wire even though they may actually
be physically located on different segments of a LAN. VLANs are configured through software rather than
hardware, and that make them extremely flexible.
VLAN provides the following benefits for switched LANs:
• Improved administration efficiency
• Optimized broadcast/multicast activity
• Enhanced network security
The prompt for the Config VLAN mode is:
iS5Comm(config-vlan)#
21.1. base
To configure the base mode as 802.1Q VLAN-aware bridge mode in which the VLAN feature should
operate on the switch or set the bridge mode as transparent, use the command base in Global Configu-
ration Mode. This configuration is globally applied on all ports of the switch.
base
base bridge-mode {dot1d-bridge dot1q-vlan}
561
CLEAR GARP COUNTERS
CHAPTER 21 VLAN
Parameters
Mode
Global Configuration Mode
Default
dot1q-vlan (VLAN-aware bridging)
Prerequisites
The VLAN mode can be configured, only if the VLAN switching feature is started and enabled in the
switch.
Examples
iS5Comm(config)# base bridge-mode dot1q-bridge
562
CLEAR MAC-ADDRESS-TABLE
CHAPTER 21 VLAN
Parameters
Examples
iS5Comm(config)# clear garp counters all
563
CLEAR MAC-ADDRESS-TABLE
CHAPTER 21 VLAN
clear mac-address-table
clear mac-address-table {dynamic [interface {port-channel <port-channel-id
(1-65535)> | {Extreme-Ethernet <interface-id> | gigabitethernet <inter-
face-id>} [vlan <vlan_vfi_id>] | remote}
564
CLEAR MAC-ADDRESS-TABLE
CHAPTER 21 VLAN
Parameters
565
CLEAR VLAN STATISTICS
CHAPTER 21 VLAN
<vlan_vfi_id> Integer Enter a value for the interface identifier of the specified type
of interface. This is a unique value that represents the specific
interface. This value is a combination of slot number and port
number separated by a slash, for interface type other than
internal-lan and port-channel. Only i-lan ID is provided, for
interface types i-lan.
• <vlan –id> - VLAN ID is a unique value that represents the
specific VLAN. This value ranges from 1 to 4094.
• <vfi-id>. - VFI ID is a VLAN created in the system which
contains Pseudo wires and Attachment Circuits as
member ports . This creates a logical LAN for the VPLS
service. This value ranges from 4096 to 65535.
NOTE: The VLAN ID 4095 is reserved and may be used to indi-
cate a wildcard match for the VID in management operations
or Filtering Database entries
NOTE: VFI IDs 4096 and 4097 are reserved identifiers used in
MPLS PW.
NOTE: The theoretical maximum for the maximum number of
VFI is 65535 but the actual number of VFI supported is a sizing
constant. Based on this, the maximum number of VFI ID
accepted in the management interface is restricted. For
example if 100 VFIs are supported, the maximum number of
VFI supported will be restricted to maximum number of VLANs
+ 100. An error message is displayed for any value beyond this
range
remote Enter to clear all remote FDB entries.
Mode
Global Configuration Mode
Examples
iS5Comm(config)# clear mac-address-table dynamic
566
CLEAR VLAN STATISTICS
CHAPTER 21 VLAN
specified VLAN. The statistics information contains number of unicast, broadcast, and unknown unicast
packets flooded.
Parameters
Mode
Global Configuration Mode
Prerequisites
The information is the VLAN counters can be deleted, only if the VLAN switching feature is started and
enabled in the switch.
567
DEBUG GARP
CHAPTER 21 VLAN
Examples
iS5Comm(config)# clear vlan statistics vlan 1
debug garp
debug garp {global | [{protocol | gmrp | gvrp | redundancy} [initshut]
[mgmt] [data] [ctpl] [dump] [os] [failall] [buffer] [all] [switch <contex-
t_name>]} [{<short (0-7)> | alerts | critical | debugging | emergencies |
errors | informational | notification | warnings}]
no debug garp
no debug garp {global | [{protocol | gmrp | gvrp | redundancy} [initshut]
[mgmt] [data] [ctpl] [dump] [os] [failall] [buffer] [all] [switch <contex-
t_name>]}
568
DEBUG GARP
CHAPTER 21 VLAN
Parameters
569
DEBUG VLAN
CHAPTER 21 VLAN
<short (0-7) Enter to generate debug statements for the Severity level value.This
value ranges from 0 to 7.
alerts Enter to generate debug statements for immediate action.
critical Enter to generate debug statements for critical conditions.
debugging Enter to generate debug statements for debugging messages.
emergencies Enter to generate debug statements when system is unusable.
errors Enter to generate debug statements for error conditions.
informational Enter to generate debug statements for information messages.
notification Enter to generate debug statements for when normal but significant
messages.
warnings Enter to generate debug statements for warning conditions.
Mode
Privileged EXEC Mode
Default
Tracing of the GARP sub module is disabled.
Prerequisites
The GARP sub module tracing can be configured in the switch, only if the GARP module is started and
enabled in the switch on all ports.
Examples
iS5Comm# debug garp redundancy ctpl switch default debugging
GARP_TRC_LVL : 255, i4CliDebugLevel: 7
% GARP is disabled
570
DEBUG VLAN
CHAPTER 21 VLAN
the tracing of the VLAN sub module as per the configured debug levels. The trace statements are not
generated for the configured trace levels.
debug vlan
debug vlan global [all-debug] [all-module] [buffer] [ctpl] [data] [dump]
[failall] [fwd] [initshut] [mgmt] [os] [priority] [redundancy] [switch
<context_name>]
no debug vlan
no debug vlan global [all-debug] [all-module] [buffer] [ctpl] [data] [dump]
[failall] [fwd] [initshut] [mgmt] [os] [priority] [redundancy] [switch
<context_name>]
571
DEBUG VLAN
CHAPTER 21 VLAN
Parameters
Mode
Privileged EXEC Mode
572
FORWARD-ALL
CHAPTER 21 VLAN
Default
Tracing of the VLAN sub module is disabled.
Prerequisites
The VLAN sub module tracing related configuration takes effect in the switch, only if the VLAN switching
feature is started and enabled in the switch.
Examples
iS5Comm# debug vlan fwd all-module switch default
VLAN_TRC_LVL : 97
21.7. forward-all
To configure the forward-all port details for a VLAN to specify the ports that forward or do not forward
all multicast group-addressed frames, use the command forward-all in VLAN Configuration Mode. The
VLAN can also be activated using the vlan active command.The no form of the command deletes the
forward-all port details for the VLAN and sets as none.
forward-all
forward-all [static-ports ([<interface-type> <0/a-b,0/c,...>] ([<inter-
face-type> <0/a-b,0/c,...>] [ac <a,b,c-d>]] [port-channel <a,b,c-d>] [pw
<a,b,c-d>] [none]] [forbidden <interface-type> <0/a-b,0/c,...>] [<inter-
face-type> <0/a-b,0/c,...>] [port-channel <a,b,c-d>] [pw <a,b,c-d>] [ac
<a,b,c-d>]]
no forward-all
no forward-all
573
FORWARD-ALL
CHAPTER 21 VLAN
Parameters
574
FORWARD-ALL
CHAPTER 21 VLAN
none Enter to configure none of the ports as static forward-all ports for
the VLAN.
forbidden Enter to configure the ports for which GMRP should not
dynamically register the service requirement attribute forward all
multicast groups. This configuration is restored once the switch is
reset.
Enter to set the type of interface. The interface can be:
<interface-type • fastethernet – Officially referred to as 100BASE-T standard.
> This is a version of LAN standard architecture that supports
data transfer up to 100 Megabits per second.
• gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports
only full duplex links.
• xl-ethernet
• port-channel – Logical interface that represents an aggre-
gator which contains several ports aggregated together
• attachment circuit interface (ac)
<0/a-b, 0/c, Enter to configure the list of port channel interfaces or a specific
...> port channel identifier. Use comma as a separator without space
while configuring list of interfaces. Example: 1,3.
port-channel Enter to set the list of port channel interfaces or a specific port
<a,b,c-d> channel identifier. Use comma as a separator without space while
configuring list of interfaces. Example: 1,3.
pw <a,b,c-d> Enter to set the Pseudo wire interface as member port. When the
pseudo wire interface is mapped to a specific VLAN, the interface
structures are created. This value ranges from 1 to 65535.
NOTE: Maximum number of PseudoWire interfaces supported in
the system is 100.
ac <a,b, c-d> Enter to set the AC interface as a port that should never receive
packets from the VLAN. This value ranges from 1 to 65535. Use
comma as a separator without space while configuring list of
interfaces. Example: 1,3.
Mode
VLAN Configuration Mode
575
FORWARD-UNREGISTERED
CHAPTER 21 VLAN
Default
Both forward all static ports and forward-all forbidden ports are not set (that is, set as none) for the
active VLANs.
Prerequisites
The forward-all port details can be configured only in the VLANs that are activated
Examples
iS5Comm(config-vlan)# forward-all static-ports gigabitethernet 0/1 forbidden-ports gigabitethernet 0/2
21.8. forward-unregistered
To configure the forward-unregistered port details for a VLAN to specify the ports that forward or do not
forward multicast group-addresses frames for which no more specific forwarding information applies,
use the command forward-unregistered in VLAN Configuration Mode. The VLAN can also be activated
using the vlan active command.The no form of the command sets the forward-unregistered port details
for all VLAN to default value.
forward-unregistered
forward-unregistered [static-ports ([<interface-type> <0/a-b,0/c,...>]
([<interface-type> <0/a-b,0/c,...>] [ac <a,b,c-d>]] [port-channel <a,b,c-d>]
[pw <a,b,c-d>] [none]] [forbidden <interface-type> <0/a-b,0/c,...>] [<inter-
face-type> <0/a-b,0/c,...>] [port-channel <a,b,c-d>] [pw <a,b,c-d>] [ac
<a,b,c-d>]]
no forward-unregisteredl
no forward-unregistered
576
FORWARD-UNREGISTERED
CHAPTER 21 VLAN
Parameters
577
FORWARD-UNREGISTERED
CHAPTER 21 VLAN
none Enter to configure none of the ports as static forward-all ports for
the VLAN.
forbidden Enter to configure the ports for which GMRP should not
dynamically register the service requirement attribute forward all
multicast groups. This configuration is restored once the switch is
reset.
Enter to set the type of interface. The interface can be:
<interface-type • fastethernet – Officially referred to as 100BASE-T standard.
> This is a version of LAN standard architecture that supports
data transfer up to 100 Megabits per second.
• gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports
only full duplex links.
• xl-ethernet
• port-channel – Logical interface that represents an aggregator
which contains several ports aggregated together
• attachment circuit interface (ac)
<0/a-b, 0/c, Enter to configure the list of port channel interfaces or a specific
...> port channel identifier. Use comma as a separator without space
while configuring list of interfaces. Example: 1,3.
port-channel Enter to set the list of port channel interfaces or a specific port
<a,b,c-d> channel identifier. Use comma as a separator without space while
configuring list of interfaces. Example: 1,3.
pw <a,b,c-d> Enter to set the Pseudo wire interface as member port. When the
pseudo wire interface is mapped to a specific VLAN, the interface
structures are created. This value ranges from 1 to 65535.
NOTE: Maximum number of PseudoWire interfaces supported in the
system is 100.
ac <a,b, c-d> Enter to set the AC interface as a port that should never receive
packets from the VLAN. This value ranges from 1 to 65535. Use
comma as a separator without space while configuring list of
interfaces. Example: 1,3.
NOTE: Maximum number of PseudoWire interfaces supported in the
system is 100.
NOTE: The configured forward-unregistered forbidden ports should
not be a member of the forward-unregistered static port.
578
GROUP RESTRICTED
CHAPTER 21 VLAN
Mode
VLAN Configuration Mode
Default
• All the ports available in the switch are set as forward-unregistered static ports and forward-unreg-
istered forbidden ports for the default VLAN (VLAN 1).
• Both forward-unregistered static ports and forward-unregistered forbidden ports are not set (that
is, set as none) for the active VLANs other than the default VLAN (VLAN 1).
Prerequisites
The forward-unregistered port details can be configured only in the VLANs that are activated
Examples
iS5Comm(config-vlan)# forward-unregistered static-ports gigabitethernet 0/2 forbidden-ports giga-
bitethernet 0/1 pw 2
group restricted
group restricted {disable | enable}
579
INTERFACE RANGE
CHAPTER 21 VLAN
Parameters
disable Enter to disable restricted group registration feature in the port. The GMRP
packets are processed normally and the multicast group attribute/service
requirement attribute are learnt dynamically even if they are not statically
configured in the switch
enable Enter to enable restricted group registration feature in the port. The multicast
group attribute / service requirement attribute is learnt dynamically from the
GMRP frame only if the specific attribute is statically configured in the switch.
Mode
Interface Configuration Mode
Default
disable
Prerequisites
The restricted group registration feature can be configured in the port, only if the GARP module is started
and enabled in the switch.
Examples
iS5Comm(config-if)# group restricted enable
interface range
interface range {<interface-type> <0/a-b,0/c,...> | vlan <vlan-id(1-4094)> -
<vlan-id(1-4094)>]}
580
INTERFACE RANGE
CHAPTER 21 VLAN
no interface range
no interface range vlan <vlan-id(1-4094)> - <vlan-id(1-4094)>]}
Parameters
Mode
Global Configuration Mode
581
MAC-ADDRESS-TABLE
CHAPTER 21 VLAN
Default
default
Prerequisites
For port channel range, the specified range must be configured using the interface command.
Examples
iS5Comm(config)# interface range gigabitethernet 0/1-2
iS5Comm(config-if-range)#
iS5Comm(config)# interface range vlan 1 - 2
iS5Comm(config-if-range)#
21.11. mac-address-table
To configure a static unicast or multicast MAC address in the forwarding database or configure the
timeout period (in seconds) for aging out of dynamically learned forwarding information entry and static
entry in the MAC address table, use the command mac-address-table in Global Configuration Mode. The
no form of the command deletes a configured static Multicast or Unicast MAC address from the
forwarding database or resets the maximum age of an entry in the MAC address table to its default value.
mac-address-table
mac-address-table {aging-time <time (10-1000000)>
| static
{multicast <aa:aa:aa:aa:aa:aa> {interface {Extreme-Ethernet <interface-id>
| gigabitethernet <interface-id>} | vlan <vlan_vfi_id>}
| unicast <aa:aa:aa:aa:aa:aa> {interface {Extreme-Ethernet <interface-id> |
gigabitethernet <interface-id>} | status {deleteOnReset | deleteOnTimeout |
permanent} | vlan <vlan_vfi_id>}}
no mac-address-table
no mac-address-table {aging-time
| static {multicast <aa:aa:aa:aa:aa:aa> | vlan <vlan_vfi_id>} | unicast
<aa:aa:aa:aa:aa:aa> | vlan <vlan_vfi_id>}}
582
MAC-ADDRESS-TABLE
CHAPTER 21 VLAN
Parameters
aging-time Enter to configure the timeout period (in seconds) for aging out
dynamically learned forwarding information entry and static entry in the
MAC address table. That is, the entry is deleted once the aging timer
expires.
NOTE: Traffic class feature is used to meet the latency and throughput
requirement of time-critical traffic in a LAN environment, where both
time-critical and non-time-critical traffic compete for the network band-
width.
<time Integer Enter a value for the aging time. The range is from 10 to 1000000
(10-100000 seconds. High value for the aging time helps to record dynamic entries for
0)> a longer time, if traffic is not frequent. This reduces the possibility of
flooding. The default is 300 seconds
static Enter to configure a static MAC address in the forwarding database.
multicast Enter to configure a static MAC address in the forwarding database.
<aa:aa:aa: Enter a value for the static multicast destination MAC address. The
aa:aa:aa> received packets having the specified MAC address are processed.
interface Enter to configure the interface type for the member ports.
Gigabiteth Enter to configure gigabitetethernet type of interface. Gigabitethernet is
ernet a version of LAN standard architecture that supports data transfer up to 1
Gigabit per second.
<interface Enter to configure a specific slot number / port number. The format is
-id> <0>/<1-28> without spaces between Slot Number/Port Number. For
example, 0/1.
Extreme-Et Enter to configure the Extreme-Ethernet type of interface. Extreme
hernet Ethernet is a version of Ethernet that supports data transfer up to 10
Gigabits per second and only full duplex links
<interface Enter to configure a specific slot number / port number. The format is
-id> <0>/<1-28> without spaces between Slot Number/Port Number. For
example, 0/1.
vlan Enter to create a VLAN / VFI ID and enters into the config-VLAN mode in
which VLAN specific configurations are done. This command directly
enters into the config-VLAN mode for the specified VLAN / VFI ID, if the
VLAN is already created
583
MAC-ADDRESS-TABLE
CHAPTER 21 VLAN
584
MAC-ADDRESS-TABLE
CHAPTER 21 VLAN
deleteOnRe Enter to specify that the entry remains even after the next reset of the
set bridge
deleteOnTi Enter to specify that the entry remains even after the next reset of the
meout bridge
vlan Enter to create a VLAN / VFI ID and enters into the config-VLAN mode in
which VLAN specific configurations are done. This command directly
enters into the config-VLAN mode for the specified VLAN / VFI ID, if the
VLAN is already created
<vlan_vfi_ Integer Enter a value for VLAN or VFI ID:
id> • <vlan –id> - This is a unique value that represents the specific VLAN.
This value ranges from 1 to 4094.
• <vfi-id>. - VFI ID is a VLAN created in the system which contains
Pseudo wires and Attachment Circuits as member ports . This
creates a logical LAN for the VPLS service. This value ranges from
4096 to 65535
NOTE: The VLAN ID 4095 is reserved and may be used to indicate a wildcard
match for the VID in management operations or Filtering Database entries
NOTE: VFI IDs 4096 and 4097 are reserved identifiers used in MPLS PW
NOTE: The theoretical maximum for the maximum number of VFI is 65535
but the actual number of VFI supported is a sizing constant. Based on this,
the maximum number of VFI ID accepted in the management interface is
restricted. For example, if 100 VFIs are supported, the maximum number
of VFI supported will be restricted to maximum number of VLANs + 100.
An error message is displayed for any value beyond this range.
Mode
Global Configuration Mode
Default
aging time - 300 seconds
static mulitcast -status permanent
Prerequisites
Aging time:
• The aging timer is applied to the static entry in the MAC address table, only if static entry status is
set as deleteOnTimeout.
585
MAC-MAP
CHAPTER 21 VLAN
• The MAC address table maximum age can be configured in the switch, only if the VLAN switching
feature is started and enabled in the switch.
Static:
• VLAN must have been configured and member ports must have been configured for the specified
VLAN
• The VLAN value in a configured static MAC entry must be active
• The new configured ports are appended to the existing member port list of the vlan
• The Egress port value in a configured static MAC entry must be a member of the configured VLAN.
Examples
iS5Comm (config)# mac-address-table aging-time 200
iS5Comm(config)# mac-address-table static multicast 01:02:03:04:05:06 vlan 1 interface gigabitethernet
0/1
iS5Comm(config)# mac-address-table static unicast 00:11:22:33:22:11 vlan 1 interface gigabitethernet
0/1 status deleteOnTimeout
iS5Comm(config)# mac-address-table static unicast 00:11:22:33:22:11 vlan 1 interface gigabitethernet
0/1 pw
21.12. mac-map
To configure VLAN- MAC address mapping that is used only for MAC-based VLAN membership classifica-
tion, use the command mac-map in Interface Configuration Mode. The no form of the command deletes
the specified VLAN- MAC address mapping entry.
mac-map
mac-map <aa:aa:aa:aa:aa:aa> vlan <vlan-id/vfi_id> [mcast-bcast {discard |
allow}]
no mac-map
no mac-map <aa:aa:aa:aa:aa:aa>
586
MAC-MAP
CHAPTER 21 VLAN
Parameters
Enter an unicast MAC address for to the specified VLAN and used for
<aa:aa:aa:aa: MAC based VLAN membership classification.
aa:aa>
vlan Enter to map the MAC Address to the specified VLAN / VFI ID.
<vlan-id/vfi_ Enter to map the MAC Address to the specified VLAN / VFI ID.
id> • <vlan –id> - VLAN ID is a unique value that represents the
specific VLAN. This value ranges from 1 to 4094.
• <vfi-id>- VFI ID is a VLAN created in the system which contains
Pseudo wires and Attachment Circuits as member ports . This
creates a logical LAN for the VPLS service. This value ranges from
4096 to 65535.
NOTE: The VLAN ID 4095 is reserved and may be used to indicate a
wildcard match for the VID in management operations or Filtering
Database entries.
NOTE: VFI IDs 4096 and 4097 are reserved identifiers used in MPLS PW.
NOTE: The theoretical maximum for the maximum number of VFI is
65535 but the actual number of VFI supported is a sizing constant.
Based on this, the maximum number of VFI ID accepted in the
management interface is restricted. For example if 100 VFIs are
supported, the maximum number of VFI supported will be restricted
to maximum number of VLANs + 100. An error message is displayed
for any value beyond this range.
mcast-bcast Enter to configure the way of handling of broadcast and multicast
traffic for packets received from source.
discard Enter to process all multicast / broadcast untagged frames that
contain the specified MAC address as the source address.
allow Enter to drops all multicast / broadcast untagged frames that contain
the specified MAC address as the source address. This is the default
option.
Mode
Interface Configuration Mode
587
MAP PROTOCOL
CHAPTER 21 VLAN
Default
mcast-bcast - allow
Prerequisites
• Only the VLANs that are activated in the switch can be mapped to the specified MAC address.
• VLAN-MAC address mapping can be configured in the port, only if the VLAN switching feature is
started and enabled in the switch.
Examples
iS5Comm(config-if)# mac-map 00:11:22:33:44:55 vlan 1 mcast-bcast discard
map protocol
map protocol {appletalk | ip | netbios | novell | other <aa:aa or
aa:aa:aa:aa:aa>}
{enet-v2 | llcOther | snap | snap8021H | snapOther}
protocols-group <Group id integer(0-2147483647)>
no map protocol
no map protocol {appletalk | ip | netbios | novell | other <aa:aa or
aa:aa:aa:aa:aa>} {enet-v2 | llcOther | snap | snap8021H | snapOther}
588
MAP PROTOCOL
CHAPTER 21 VLAN
Parameters
589
MAP PROTOCOL
CHAPTER 21 VLAN
llcOther Enter to apply the LLC format. This format contains the same structure as
IEEE 802.3 frame except the following additional fields added before the
data field:
• DSAP – 1 byte value representing destination service access point to
determine the protocol used for the upper layer.
• SSAP – 1 byte value representing source service access point to
determine the protocol used for the upper layer.
• Control – 1 byte value that is used by certain protocols for adminis-
tration.
snap Enter to apply the sub-network access protocol format. This format
contains the same structure as LLC format except the following additional
fields added before the data field
• OUI – 3 byte value representing organizational unique ID assigned to
vendors for differentiating protocols from different manufacturers.
• Type – 2-byte value representing protocol type that defines a
specific protocol in the SNAP. This maintains compatibility with
Ethernet v2.
snap8021H Enter to apply the sub-network access protocol format. This format
contains the same structure as LLC format except the following additional
fields added before the data field
• 3 octet field having value 00:00:F8 signifying that next 2 octet field
is the encoding of 802.3 Type field in an IEEE 802.2/SNAP Header.
• 2 octet Type field - encoding of 802.3 Type field in an IEEE
802.2/SNAP Header
snapOther Enter to apply the sub-network access protocol format. This format
contains the same structure as LLC format except for an additional 5 octet
SNAP Protocol Identifier (PID) added before the data field. The value of
the PID is not in ether of the ranges used for RFC_1042(SNAP) or SNAP
802.1H. This frame type can be set only for some other protocol type
other than IP, Novell, Netbios and Appletalk.
Enter to configure a unique group ID that is to be created with the
protocols- specified protocol type and encapsulation frame type. This value
group represents a specific group of protocols that are associated together
when assigning a VID to a frame.
<Group id Integer Enter a value for the unique group ID. This value ranges from 0 to
integer(0- 2147483647.
2147483647
)>
590
MAP SUBNET
CHAPTER 21 VLAN
Mode
Global Configuration Mode
Default
default
Prerequisites
Protocol group cannot be created and configured in the switch, if the base bridge mode is set as trans-
parent bridging or the VLAN switching feature is shut down in the switch.
Examples
iS5Comm(config)# map protocol ip enet-v2 protocols-group 1
map subnet
map subnet <ip-subnet-address> [vlan <vlan_vfi_id>] [arp {suppress | allow}]
[mask <subnet-mask>]
no map subnet
no map subnet <ip-subnet-address> [mask <subnet-mask>]
591
MAP SUBNET
CHAPTER 21 VLAN
Parameters
Mode
Global Configuration Mode / Interface Configuration Mode
592
NAME
CHAPTER 21 VLAN
Default
arp - Allow
Prerequisites
• This command is available only in the Global Configuration mode, if the switch BCMX_WANTED is
set as yes during the compilation of the exe.
• This command is available only in the Interface Configuration mode, if the switch BCMX_WANTED
is set as no during the compilation of the exe.
• Only the VLANs that are activated in the switch can be mapped to the specified IP subnet address.
• VLAN-IP subnet address mapping can be configured in the port, only if the VLAN switching feature
is started and enabled in the switch
Examples
iS5Comm(config)# map subnet 14.0.0.0 vlan 1 arp allow
21.15. name
To configure a name for the VLAN, use the command name in VLAN Configuration Mode. The no form of
the command deletes the configured name for the VLAN.
name
name <vlan name string>
no name
no name
Mode
VLAN Configuration Mode
593
PORT
CHAPTER 21 VLAN
Parameters
<vlan name string> Enter a value to specify VLAN name. This value is a string of
maximum size 32.
Examples
iS5Comm(config-vlan)# name vlannew
21.16. port
To enable MAC-based VLAN, protocol- VLAN based, and subnet-based VLAN membership classification
in a port, use the command port in Interface Configuration Mode. The no form of the command disables
all types of VLAN membership classification or a specified VLAN membership classification in the port.
port
port {mac-vlan | protocol-vlan | subnet-vlan}
no port
no port [mac-vlan] [protocol-vlan] [subnet-vlan]
594
PORT
CHAPTER 21 VLAN
Parameters
Mode
Interface Configuration Mode
Prerequisites
• All types of VLAN based membership classification can be enabled or disabled in the ports without
depending on the global status of the protocol-VLAN based membership classification.
• The change in all types global VLAN based membership classification overrides the port member-
ship classification. For example, If the classification in the port is set as enabled while global classi-
fication is disabled, and if global classification is changed as enabled and once again to disabled, the
classification in the port will be automatically set as disabled.All types of VLAN based membership
classification can be enabled / disabled in the switch, only if the VLAN switching feature is started
and enabled in the switch.
595
PORTS
CHAPTER 21 VLAN
Examples
iS5Comm(config-if)# port mac-vlan
iS5Comm(config-if)# port subnet-vlan
iS5Comm(config-if)# port protocol-vlan
iS5Comm(config-if)# no port protocol-vlan
iS5Comm(config-if)# no ports
21.17. ports
To statically configure a VLAN entry with the required member ports, untagged ports and/or forbidden
ports, and activate the VLAN, use the command ports in VLAN Configuration Mode. The VLAN can also
be activated using the vlan active command.The configuration defines the tagged and untagged member
ports that are used for egress tagging of a VLAN at a port. For ports in PBB bridge mode, this command
is used to define member ports for a VLAN in a component. For backbone virtual local area
networks (B-VLAN) in a B component, only the provider network ports (PNP)
can be set as member ports.For a stacked virtual local area network (S-VLAN)
in an I component, only the CNP-S tagged ports can be set as member ports.
CNP stands for customer network port.For customer virtual local area
network (C-VLAN) in an I component, only the CNP-C tagged ports can be set
as member ports.The no form of the command deletes the specified port details for the VLAN. Static
ARP cache entry related to the static MAC address of this specific port and VLAN should be removed
while removing a port from the VLAN. The member ports cannot be set empty for the VLAN, once the
member ports details are configured for that VLAN.
ports
ports [add] ([<interface-type> <0/a-b,0/c,...>] ([<interface-type>
<0/a-b,0/c,...>] [port-channel <a,b,c-d>] [pw <a,b,c-d>] [pw <a,b,c-d>]
[untagged (<interface-type> <0/a-b,0/c,...> (<interface-type>
<0/a-b,0/c,...> [port-channel <a,b,c-d>] [pw <a,b,c-d>] [ac <a,b,c-d>]
[all]) [forbidden ([<interface-type> <0/a-b,0/c,...>] [<interface-type>
<0/a-b,0/c,...>] [port-channel <a,b,c-d>] [pw <a,b,c-d>] [ac <a,b,c-d>]]
596
PORTS
CHAPTER 21 VLAN
no ports
no ports [add] ([<interface-type> <0/a-b,0/c,...>] ([<interface-type>
<0/a-b,0/c,...>] [port-channel <a,b,c-d>] [pw <a,b,c-d>] [pw <a,b,c-d>]
[untagged (<interface-type> <0/a-b,0/c,...> (<interface-type>
<0/a-b,0/c,...> [port-channel <a,b,c-d>] [pw <a,b,c-d>] [ac <a,b,c-d>]
[all]) [forbidden ([<interface-type> <0/a-b,0/c,...>] [<interface-type>
<0/a-b,0/c,...>] [port-channel <a,b,c-d>] [pw <a,b,c-d>] [ac <a,b,c-d>]]
597
PORTS
CHAPTER 21 VLAN
Parameters
add Enter to append the new configured ports to the existing member
port list of the vlan.
<interface-type Enter to set the type of interface. The interface can be:
> • fastethernet – Officially referred to as 100BASE-T standard.
This is a version of LAN standard architecture that supports
data transfer up to 100 Megabits per second.
• gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports
only full duplex links.
• xl-ethernet
• port-channel – Logical interface that represents an aggre-
gator which contains several ports aggregated together
• attachment circuit interface
<0/a-b, 0/c, Enter to configure the list of port channel interfaces or a specific
...> port channel identifier. Use comma as a separator without space
while configuring list of interfaces. Example: 1,3.
port-channel Enter to set the list of port channel interfaces or a specific port
<a,b,c-d> channel identifier. Use comma as a separator without space while
configuring list of interfaces. Example: 1,3.
pw <a,b,c-d> Enter to set the Pseudo wire interface as member port. When the
pseudo wire interface is mapped to a specific VLAN, the interface
structures are created. This value ranges from 1 to 65535.
NOTE: Maximum number of PseudoWire interfaces supported in
the system is 100.
untagged Enter to configure the ports that should be used for the VLAN to
transmit egress packets as untagged packets
598
PORTS
CHAPTER 21 VLAN
<interface-type Enter to set the type of interface. The interface can be:
> • fastethernet – Officially referred to as 100BASE-T standard.
This is a version of LAN standard architecture that supports
data transfer up to 100 Megabits per second.
• gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports
only full duplex links.
• xl-ethernet
• port-channel – Logical interface that represents an aggre-
gator which contains several ports aggregated together
• pseudowire
• attachment circuit interface
<0/a-b, 0/c, Enter to configure the list of port channel interfaces or a specific
...> port channel identifier. Use comma as a separator without space
while configuring list of interfaces. Example: 1,3.
port-channel Enter to set the list of port channel interfaces or a specific port
channel identifier. Use comma as a separator without space while
configuring list of interfaces. Example: 1,3.
pw <a,b,c-d> Enter to set the Pseudo wire interface as member port. When the
pseudo wire interface is mapped to a specific VLAN, the interface
structures are created. This value ranges from 1 to 65535.
NOTE: Maximum number of PseudoWire interfaces supported in
the system is 100.
ac <a,b, c-d> Enter to set the AC interface as a port that should never receive
packets from the VLAN. This value ranges from 1 to 65535. Use
comma as a separator without space while configuring list of
interfaces. Example: 1,3.
all Sets all configured member ports as the untagged ports for the
VLAN.
• The ports configured should be a subset of the member
ports.
• The ports that are attached to VLAN-aware devices should
always be set as untagged ports only.
• he ports can be set as untagged ports, only if they are not
configured as trunk ports.
599
PORTS
CHAPTER 21 VLAN
forbidden Enter to configure the ports that should never receive packets
from the VLAN. These ports drops the packets received from this
VLAN.
<interface-type Enter to set the type of interface. The interface can be:
> • fastethernet – Officially referred to as 100BASE-T standard.
This is a version of LAN standard architecture that supports
data transfer up to 100 Megabits per second.
• gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports
only full duplex links.
• xl-ethernet
• port-channel – Logical interface that represents an aggre-
gator which contains several ports aggregated together
• attachment circuit interface
<0/a-b, 0/c, Enter to configure the list of port channel interfaces or a specific
...> port channel identifier. Use comma as a separator without space
while configuring list of interfaces. Example: 1,3.
port-channel Enter to set the list of port channel interfaces or a specific port
<a,b,c-d> channel identifier. Use comma as a separator without space while
configuring list of interfaces. Example: 1,3
pw <a,b,c-d> Enter to set the Pseudo wire interface as member port. When the
pseudo wire interface is mapped to a specific VLAN, the interface
structures are created. This value ranges from 1 to 65535.
NOTE: Maximum number of PseudoWire interfaces supported in
the system is 100.
ac <a,b, c-d> Enter to set the AC interface as a port that should never receive
packets from the VLAN. This value ranges from 1 to 65535. Use
comma as a separator without space while configuring list of
interfaces. Example: 1,3.
Mode
VLAN Configuration Mode
600
PORT-SECURITY TRAP-SYSLOG
CHAPTER 21 VLAN
Default
All ports available in the switch are configured as member ports and untagged ports of the default VLAN
(VLAN 1). For other active VLANs, the member, untagged and forbidden ports are not set (that is, set as
none).
Prerequisites
Protocol group cannot be created and configured in the switch if the base bridge mode is set as trans-
parent bridging or the VLAN switching feature is shut down in the switch.
Examples
iS5Comm(config-vlan)# ports gigabitethernet 0/1 untagged gigabitethernet 0/1 forbidden gigabiteth-
ernet 0/2
iS5Comm(config-vlan)# ports add gigabitethernet 0/1 untagged gigabitethernet 0/1 forbidden giga-
bitethernet 0/1
port-security trap-syslog
port-security trap-syslog {enable [ rate < integer(1-10) > ] | disable}
Parameters
Examples
iS5Comm (config)# port-security trap-syslog enable rate 3
iS5Comm (config)# port-security trap-syslog disable
601
PORT-SECURITY VIOLATION
CHAPTER 21 VLAN
Syslogs
<130>Sep 20 10:35:20 ISS VLAN Port Security violation occurred on the
port : 9 for VLAN ID : 63 and for MAC addr : 00:00:00:00:10:64<130>Sep
20 10:35:20 ISS VLAN Port Security violation occurred on the port : 9
for VLAN ID : 63 and for MAC addr : 00:00:00:00:10:01
<130>Sep 20 10:35:20 ISS VLAN Port Security violation occurred on the
port : 9 for VLAN ID : 63 and for MAC addr : 00:00:00:00:10:02
<130>Sep 20 10:35:20 ISS VLAN Port Security violation occurred on the
port : 9 for VLAN ID : 63 and for MAC addr : 00:00:00:00:10:03
<130>Sep 20 10:35:20 ISS VLAN Port Security violation occurred on the
port : 9 for VLAN ID : 63 and for MAC addr : 00:00:00:00:10:04
<130>Sep 20 10:35:20 ISS VLAN Port Security violation occurred on the
port : 9 for VLAN ID : 63 and for MAC addr : 00:00:00:00:10:05
port-security violation
port-security violation {protect | restrict | shutdown}
602
PROTOCOL-VLAN
CHAPTER 21 VLAN
Parameters
Enter to configure the security violation status for the specified switch port.
violation NOTE: This command can be executed only if the port is created.
protect Enter to set the port-security violation label (sav) as protected that sets
strict security flag as false and only unknown MAC is treated as violation on
all security configured ports.
restrict Enter to set the port-security violation label (shv) as restricted that sets the
security flag as true and configured MAC alone are alone treated as non
violation on all security configured ports.
shutdown Enter to set the port-security violation status as shutdown that disables all
security. This is the default option.
Examples
iS5Comm(config)# port-security violation protect
21.20. protocol-vlan
To enable protocol- VLAN based membership classification on all ports of the switch, use the command
protocol-vlan in Global Configuration Mode. The no form of the command disables protocol- VLAN based
membership classification on all ports of the switch. VLAN membership classification is done for all
untagged and priority-tagged frames based on the port-protocol group / higher layer protocol for the
port.
protocol-vlan
protocol-vlan
no protocol-vlan
no protocol-vlan
Mode
Global Configuration Mode
Default
Protocol-based VLAN membership classification is enabled on all ports of the switch.
603
SET FILTERING-UTILITY-CRITERIA
CHAPTER 21 VLAN
Prerequisites
Protocol-VLAN based membership classification cannot be configured in the switch if the VLAN switching
feature has been shut down in the switch.
Examples
iS5Comm(config)# no protocol-vlan
set filtering-utility-criteria
set filtering-utility-criteria {disable | enable}
Parameters
disable Enter to set default filtering utility criteria to be applied on all ports. If default
filtering utility Criteria is selected on a port, then learning of source mac from
a received packet on that port will be done only if there is at least on member
port in that vlan.
enable Enter to apply the filtering utility criteria configured on the port. It can be
default or enhanced.
If enhanced filtering utility criteria is selected on a port, then learning of
source mac from a received packet on that port will be done if the following
are satisfied:
• If at least one VLAN that uses the FID includes the reception Port and at
least one other Port with a Port State of Learning or Forwarding in its
member set, and:
– The operPointToPointMAC parameter is false for the reception
Port; or
– Ingress to the VLAN is permitted through a third Port. The third
port can, but is not required to be in the member set.
Mode
Global Configuration Mode
604
SET GARP TIMER
CHAPTER 21 VLAN
Default
enable
Examples
iS5Comm(config)# set filtering-utility-criteria enable
605
SET GARP TIMER
CHAPTER 21 VLAN
Parameters
join Enter to configure the time interval (in milli-seconds) till which a GARP
participant should wait for its join message to be acknowledged before
re-sending the join message. The join message is re-transmitted only once,
if the initial message is not acknowledged. This time is started, once the
initial join message is sent. The join message is sent by a GARP participant
to another GARP participant for registering:
• Its attributes with another participant
• Its manually configured attributes
• Attributes received from a third GARP participant
<time in Integer Enter a value for the time interval. This value can be multiple of tens only
milli (that is, as 210, 220, 230 and so on) This value should satisfy the condition:
seconds> GarpJoinTime > 0 and (2*GarpJoinTime) < GarpLeaveTime.
leave Enter to configure the time interval (in milli-seconds) till which a GARP
participant should wait for any join message before removing attribute
details (that is, waiting time for a registrar to move from empty state (MT)
to leave state (LV)). This time is started, once a leave message is sent to
de-register the attribute details. The leave messages are sent from a GARP
participant to another participant, when:
• Its attributes should be de-registered
• Its attributes are manually de-registered
• It receives leave messages from a third GARP participant
<time in Integer Enter a value for the time interval. This value can be multiple of tens only
milli (that is, as 610, 620, 630 and so on). The leave time should be greater than
seconds> or two times as that of the GarpJoinTime. That is, the maximum value of the
leave time cannot be more than two times of the join time. For example, if
you configure join time as 500 milliseconds, then the leave time value can
be from 510 milliseconds to 1000 milliseconds only.
leaveall Enter to configure the time interval (in milli-seconds) till which the details
of the registered attributes are maintained. The attribute details should be
re-registered after this time interval. A leaveall message is sent from a GARP
participant to other GARP participants, after this time interval. This time is
started, once a GARP participant starts/once re-registration is done. The
leaveall messages are sent from a GARP participant to other participants
for:
• De-registering all registered attributes
• Re-registering all attributes with each of the participants
606
SET GMRP
CHAPTER 21 VLAN
<time in Integer Enter a value for the time interval. This value can be multiple of tens only
milli (that is, as 10010, 10020 and so on). The “leaveall time” should be greater
seconds> than 0 and greater than GarpLeaveTime.
Mode
Interface Configuration Mode
Default
• join - 200
• leave - 600
• leaveall - 10000
Prerequisites
• The GARP timers cannot be set as zero.
• The GARP timers can be configured, only if the GARP module is not shutdown.
Examples
iS5Comm(config)# set garp timer join 250
607
SET GVRP
CHAPTER 21 VLAN
Parameters
Mode
Global Configuration Mode
Default
enable
Prerequisites
• GMRP feature can be globally enabled, only if VLAN feature is globally enabled in the switch.
• GMRP feature should be globally disabled before globally disabling the VLAN feature in the switch.
• GMRP feature cannot be enabled in the switch, if the VLAN switching feature is shutdown in the
switch.
Examples
iS5Comm(config)# set gmrp disable
608
SET MAC-LEARNING
CHAPTER 21 VLAN
Parameters
Mode
Global Configuration Mode
Default
enable
Prerequisites
• GVRP feature can be globally enabled, only if VLAN feature is globally enabled in the switch.
• GVRP feature should be globally disabled before globally disabling the VLAN feature in the switch.
• GVRP feature cannot be enabled in the switch, if is shutdown in the switch.
Examples
iS5Comm(config)# set gvrp disable
set mac-learning
set mac-learning {enable | disable}
609
SET PACKET-REFLECTION
CHAPTER 21 VLAN
Parameters
Mode
Global Configuration Mode
Default
enable
Examples
iS5Comm (config)# set mac-learning enable
set packet-reflection
set packet-reflection {disable | enable}
Parameters
Mode
Interface Configuration Mode
610
SET PORT
CHAPTER 21 VLAN
Default
disable
Examples
iS5Comm (config-if)# set packet-reflection enable
611
SET PORT
CHAPTER 21 VLAN
Parameters
gmrp Enter to disable / enable GMRP feature on the specified interface. GMRP uses
the services of GARP to propagate multicast information to the bridges in a
LAN. This information allows GMRP aware devices to reduce the transmission
of multicast traffic to the LANs, which do not have any members of that
multicast group. GMRP registers and de-registers the group membership
information and group service requirement information with the GARP.
NOTE: The GMRP feature can be configured on the specified interface, only if
the GARP module is not shutdown.
NOTE: Any GMRP packet received is discarded and no GMRP registrations are
propagated from other ports, if GMRP is globally disabled or GMRP is disabled
in the interface.
Enter to configure the GVRP feature for the specified type of interface. The
<interf interface can be as following parameters.
ace-typ • gigabitethernet – A version of LAN standard architecture that supports
e> data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data transfer up
to 10 Gigabits per second. This Ethernet supports only full duplex links.
Configures the GVRP feature for the specified interface identifier. This is a
<interf unique value that represents the specific interface. This value is a
ace-id> combination of slot number and port number separated by a slash, for
interface type other than i-lan and port-channel. For example: 0/1 represents
that the slot number is 0 and port number is 1. Only i-lan and port-channel ID
is provided, for interface types i-lan and port-channel. For example: 1
represents i-lan and port-channel ID.
disable Enter to disable GMRP feature ion the specified interface
enable Enter to enable GMRP feature in the switch on all ports and also starts the
GARP in the switch if the GARP is disabled.
612
SET PORT
CHAPTER 21 VLAN
gvrp Enter to disable / enable GVRP feature ion the specified interface. VRP uses
the services of GARP to propagate VLAN registration information to other
VLAN aware bridges in a LAN. This information allows GVRP aware devices to
dynamically establish and update the information about the existence of the
VLANs in a topology. The GVRP registers the created VLANs with GARP and
de-registers the deleted VLANs from the GARP.
NOTE: The GVRP feature can be configured on the specified interface, only if
the GARP module is not shutdown.
NOTE: Any GVRP packet received is discarded and no GVRP registrations are
propagated from other ports, if GVRP is globally disabled or GVRP is disabled
in the interface
Enter to configure the GVRP feature for the specified type of interface. The
<interf interface can be as following parameters.
ace-typ • gigabitethernet – A version of LAN standard architecture that supports
e> data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data transfer up
to 10 Gigabits per second. This Ethernet supports only full duplex links.
Configures the GVRP feature for the specified interface identifier. This is a
<interf unique value that represents the specific interface. This value is a
ace-id> combination of slot number and port number separated by a slash, for
interface type other than i-lan and port-channel. For example: 0/1 represents
that the slot number is 0 and port number is 1. Only i-lan and port-channel ID
is provided, for interface types i-lan and port-channel. For example: 1
represents i-lan and port-channel ID.
disable Enter to disable GVRP feature on the specified interface.
enable Enter to enable GVRP feature in the switch on all ports and also starts the
GARP in the switch if the GARP is disabled.
gvrp Enter to disable / enable GVRP feature on the specified interface.
NOTE: The value enable indicates that GVRP is enabled on the current port, as
long as global GVRP status is also enabled for the device.
NOTE: If port GVRP state is disabled, but global GVRP status is still enabled,
then GVRP is disabled on current port. Any received GVRP packets will be
discarded and no GVRP registrations will be propagated from other ports.
disable Enter to disable GVRP feature in the switch on the specified interface
enable Enter to enable GVRP feature in the switch on the specified interface. This is
the default.
613
SET SW-STATS
CHAPTER 21 VLAN
Mode
Global Configuration Mode
Default
enable
Examples
iS5Comm(config)# set port gmrp gigabitethernet 0/1 disable
iS5Comm(config)# set port gvrp gigabitethernet 0/1 disable
iS5Comm(config)# set port gvrp disable 0/1
set sw-stats
set sw-stats {disable | enable}
614
SET UNICAST-MAC LEARNING
CHAPTER 21 VLAN
Parameters
disable Enter to disable software statistics collection globally in the switch. The
statistics collection will be done by the hardware and will not be stored in
software.
enable Enter to enable software statistics collection globally in the switch and the
statistics will be stored in the software. This value can be set only if data
switching is done by the software.
Mode
Global Configuration Mode
Default
If data switching is done by software, then the default value is enabled else by default statistics collection
by the software is disabled.
Examples
iS5Comm(config)# set sw-stats enable
615
SET VLAN TRAFFIC-CLASSES
CHAPTER 21 VLAN
Parameters
Mode
VLAN Configuration Mode
Default
default
Prerequisites
Global MAC learning status will override the VLAN unicast-MAC learning status only when the VLAN
unicast-MAC learning status is default.
VLAN unicast-MAC learning can be configured as Enable/Disable even when the Global Mac learning
status is Disabled.
VLAN unicast-MAC learning feature can be configured only in the VLANs that are activated.
Examples
iS5Comm (config-vlan)# set unicast-mac learning enable
616
SHOW FORWARD-ALL
CHAPTER 21 VLAN
Parameters
enable Enter to enable traffic class feature in the switch on all ports. User priority to
the particular traffic class can be enabled.
NOTE: Traffic class feature is used to meet the latency and throughput require-
ment of time-critical traffic in a LAN environment, where both time-critical
and non-time-critical traffic compete for the network bandwidth.
disable Enter to disable the traffic class feature in the switch on all ports. The switch
operates with a single priority level for all traffic
Mode
Global Configuration Mode
Default
enable
Prerequisites
The traffic class feature cannot be configured in the switch if the VLAN switching feature is shut down in
the switch.
Examples
iS5Comm (config)# set vlan traffic-classes disable
show forward-all
show forward-all [switch <context_name>]
617
SHOW FORWARD-UNREGISTERED
CHAPTER 21 VLAN
Parameters
Mode
Privileged EXEC Mode
Prerequisites
This command can be executed in the switch, only if the VLAN switching feature is started and enabled
in the switch.
Examples
iS5Comm# show forward-all switch default
Vlan Forward All Table
------------------------
Vlan ID : 1
ForwardAll Ports : Gi0/1
ForwardAll Static Ports : Gi0/1
ForwardAll ForbiddenPorts : Gi0/2
---------------------------------------------------------
show forward-unregistered
show forward-unregistered [switch <context_name>]
618
SHOW GARP TIMER
CHAPTER 21 VLAN
Parameters
Mode
Privileged EXEC Mode
Prerequisites
This command can be executed in the switch, only if the VLAN switching feature is started and enabled
in the switch.
Examples
iS5Comm# show forward-unregistered
Vlan Forward Unregistered Table
---------------------------------
619
SHOW GARP TIMER
CHAPTER 21 VLAN
Parameters
port Enter to display the GARP timer information of the specified interface.
Enter to specify type of interface to be displayed. The interface can be
<interface-t as following parameters.
ype> • gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports only
full duplex links.
Enter to specify interface identifier of the interface to be displayed.
<interface-i This is a unique value that represents the specific interface. This value
d> is a combination of slot number and port number separated by a slash,
for interface type other than i-lan and port-channel. For example: 0/1
represents that the slot number is 0 and port number is 1. Only i-lan
and port-channel ID is provided, for interface types i-lan and
port-channel. For example: 1 represents i-lan and port-channel ID.
switch Enter to display the GARP timer information of all interfaces, for the
specified context. This value represents unique name of the switch
context.
<string(32)> Enter a value for an Interface identifier. This value represents unique
name of the switch context. This value is a string with the maximum
size as 32. This parameter is specific to multiple instance feature. For
now switch should be only default.
Mode
Privileged EXEC Mode
620
SHOW GMRP STATISTICS
CHAPTER 21 VLAN
Prerequisites
This command can be executed in the switch, only if the GARP module is not shut down and VLAN
switching feature is started and enabled in the switch.
Examples
iS5Comm# show garp timer port gigabitethernet 0/1
Garp Port Timer Info (in milli seconds)
---------------------------------------
Port Join-time Leave-time Leave-all-time
----- --------- ---------- --------------
Gi0/1 200 600 10000
621
SHOW GMRP STATISTICS
CHAPTER 21 VLAN
Parameters
port Enter to display the GMRP statistics for the specified interface.
<interface- Enter to specify type of interface to be displayed. The interface can be as
type> following parameters.
• gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports only
full duplex links.
Enter to specify interface identifier of the interface to be displayed. This
<interface- is a unique value that represents the specific interface. This value is a
id> combination of slot number and port number separated by a slash, for
interface type other than i-lan and port-channel. For example: 0/1
represents that the slot number is 0 and port number is 1. Only i-lan and
port-channel ID is provided, for interface types i-lan and port-channel.
For example: 1 represents i-lan and port-channel ID.
Mode
Privileged EXEC Mode
Examples
iS5Comm# show gmrp statistics port gigabitethernet 0/1
GMRP Statistics for Port Gi0/1
---------------------------------------
Total valid GMRP Packets Received 0:
Join Emptys 0
Join In 0
Leave In 0
Leave All 0
Leave Empty 0
Empty 0
Total valid GMRP Packets Transmitted:0
Join Emptys 0
Join In 0
Leave In 0
Leave All 0
622
SHOW GVRP STATISTICS
CHAPTER 21 VLAN
Leave Empty 0
Empty 0
623
SHOW GVRP STATISTICS
CHAPTER 21 VLAN
Parameters
port Enter to display the GVRP statistics for the specified interface.
<interface- Enter to specify type of interface to be displayed. The interface can be as
type> following parameters.
• gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports only
full duplex links.
• internal-lan – Internal LAN created on a bridge per IEEE 802.1ap.
• port-channel – Logical interface that represents an aggregator
which contains several ports aggregated together.
• pw - Pseudowire (PW) is an emulation of a point-to-point connec-
tion over a packet-switching network (PSN). This value ranges from
1 to 65535. Maximum number of PseudoWire interfaces supported
in the system is 100.
• ac - Attachment Circuit (AC) is a physical or virtual circuit attaching
a Customer Edge to a Provider Edge port. This value ranges from 1
to 65535.
Enter to specify interface identifier of the interface to be displayed. This
<interface- is a unique value that represents the specific interface. This value is a
id> combination of slot number and port number separated by a slash, for
interface type other than i-lan and port-channel. For example: 0/1
represents that the slot number is 0 and port number is 1. Only i-lan and
port-channel ID is provided, for interface types i-lan and port-channel.
For example: 1 represents i-lan and port-channel ID.
Mode
Privileged EXEC Mode
Examples
iS5Comm# show gvrp statistics port gigabitethernet 0/1
GVRP Statistics for Port Gi0/1
---------------------------------------
Total valid GVRP Packets Received 0:
Join Emptys 0
Join In 0
624
SHOW MAC-ADDRESS-TABLE
CHAPTER 21 VLAN
Leave In 0
Leave All 0
Leave Empty 0
Empty 0
Total valid GVRP Packets Transmitted:0
Join Emptys 0
Join In 0
Leave In 0
Leave All 0
Leave Empty 0
Empty 0
show mac-address-table
show mac-address-table[address <aa:aa:aa:aa:aa:aa>]
[aging-time [switch <context_name>]
[count [vlan <vlan-range>] [switch <context_name>]
[dynamic multicast [vlan <vlan-range>] [address <aa:aa:aa:aa:aa:aa>]
{Extreme-Ethernet <interface-id> | gigabitethernet <interface-id>} | switch
<context_name>]
[dynamic unicast [vlan <vlan-range>] [address <aa:aa:aa:aa:aa:aa>]
{Extreme-Ethernet <interface-id> | gigabitethernet <interface-id>} | switch
<context_name>]
hardware
[static multicast [vlan <vlan-range>] [address <aa:aa:aa:aa:aa:aa>]
{Extreme-Ethernet <interface-id> | gigabitethernet <interface-id>} | switch
<context_name>]
[static unicast [vlan <vlan-range>] [address <aa:aa:aa:aa:aa:aa>]
{Extreme-Ethernet <interface-id> | gigabitethernet <interface-id>} | switch
<context_name>]
625
SHOW MAC-ADDRESS-TABLE
CHAPTER 21 VLAN
626
SHOW MAC-ADDRESS-TABLE
CHAPTER 21 VLAN
Parameters
address Enter to display all static / dynamic unicast and multicast MAC
entries created in the MAC address table for the specified
unicast / multicast MAC address.
<aa:aa:aa:aa:aa:aa> Enter a MAC address.
aging-time Enter to display the maximum age of a Mac address table
entry.
switch Enter to specify switch name.
<context_name> Enter to specify context name.
count Enter to display the number of MAC addresses present on all
VLANs or on a specified VLAN
vlan Enter to display all static / dynamic unicast and multicast MAC
entries created in the MAC address table for the specified
VLANs alone.
<vlan-range> Enter a VLAN range value that denotes the VLAN ID range for
which the entries need to be displayed. This value ranges from
1 to 4094. For example, the value is provided as 4000-4010 to
display the entries for VLAN IDs from 4000 to 4010.
switch Enter to specify switch name.
<context_name> Enter to specify context name.
dynamic Enter to display all dynamically learnt entries from the MAC
address table.
multicast Enter to display all dynamically learnt multicast entries. These
entries contain VLAN ID for which multicast MAC address
entry is learnt, multicast MAC address, ports through which
the entry is learnt, the status of entry (that is permanent,
static and so on), the unicast backbone MAC address of peer
backbone edge bridge, and total number of entries displayed.
vlan Enter to display all dynamically learnt multicast entries from
the MAC address table for the specified VLANs alone
<vlan-range> Enter a value for vlan range that denotes the VLAN ID range
for which the entries need to be displayed. This value ranges
from 1 to 4094. For example, the value is provided as
4000-4010 to display the entries for VLAN IDs from 4000 to
4010.
627
SHOW MAC-ADDRESS-TABLE
CHAPTER 21 VLAN
628
SHOW MAC-ADDRESS-TABLE
CHAPTER 21 VLAN
address Enter to display all dynamically learnt unicast entries from the
MAC address table for the specified unicast MAC address.
<aa:aa:aa:aa:aa:aa> Enter a MAC address.
interface Enter to specify the type of interface.
Extreme-Ethernet Enter to configure the Extreme-Ethernet type of interface to
be displayed. Extreme Ethernet is a version of Ethernet that
supports data transfer up to 10 Gigabits per second and only
full duplex links
<interface-id> Enter to configure a specific slot number / port number to be
displayed. The format is <0>/<1-28> without spaces between
Slot Number/Port Number. For example, 0/1.
Gigabitethernet Enter to configure gigabitetethernet type of interface to be
displayed. Gigabitethernet is a version of LAN standard
architecture that supports data transfer up to 1 Gigabit per
second.
<interface-id> Enter to configure a specific slot number / port number to be
displayed. The format is <0>/<1-28> without spaces between
Slot Number/Port Number. For example, 0/1.
switch Enter to specify switch name.
<context_name> Enter to specify context name.
static Enter to display static multicast MAC address entries created
in the FDB table.
hardware Enter to display all MAC addresses programmed in hardware.
multicast Enter to display all static multicast MAC address entries
created in the FDB table. These entries contain VLAN ID for
which multicast MAC address entry is learnt, multicast MAC
address, ports through which the entry is learnt, the status of
entry (that is permanent, static and so on), the unicast
backbone MAC address of peer backbone edge bridge, and
total number of entries displayed.
vlan Enter to display all static multicast MAC address entries
created in the FDB table for the specified VLANs alone
629
SHOW MAC-ADDRESS-TABLE
CHAPTER 21 VLAN
<vlan-range> Enter a value for vlan range that denotes the VLAN ID range
for which the entries need to be displayed. This value ranges
from 1 to 4094. For example, the value is provided as
4000-4010 to display the entries for VLAN IDs from 4000 to
4010.
address Enter to display all static unicast MAC address entries created
in the FDB table for the specified unicast MAC address.
<aa:aa:aa:aa:aa:aa> Enter a MAC address.
interface Enter to specify the type of interface.
Extreme-Ethernet Enter to configure the Extreme-Ethernet type of interface to
be displayed. Extreme Ethernet is a version of Ethernet that
supports data transfer up to 10 Gigabits per second and only
full duplex links
<interface-id> Enter to configure a specific slot number / port number to be
displayed. The format is <0>/<1-28> without spaces between
Slot Number/Port Number. For example, 0/1.
Gigabitethernet Enter to configure gigabitetethernet type of interface to be
displayed. Gigabitethernet is a version of LAN standard
architecture that supports data transfer up to 1 Gigabit per
second.
<interface-id> Enter to configure a specific slot number / port number to be
displayed. The format is <0>/<1-28> without spaces between
Slot Number/Port Number. For example, 0/1.
switch Enter to specify switch name.
<context_name> Enter to specify context name.
static Enter to display static unicast MAC address entries created in
the FDB table.
unicast Enter to display all static unicast MAC address entries created
in the FDB table. These entries contain VLAN ID for which
unicast MAC address entry is learnt, unicast MAC address,
ports through which the entry is learnt, the status of entry
(that is permanent, static and so on), the unicast backbone
MAC address of peer backbone edge bridge, and total number
of entries displayed.
vlan Enter to display all static unicast MAC address entries created
in the FDB table for the specified VLANs alone
630
SHOW MAC-ADDRESS-TABLE
CHAPTER 21 VLAN
<vlan-range> Enter a value for vlan range that denotes the VLAN ID range
for which the entries need to be displayed. This value ranges
from 1 to 4094. For example, the value is provided as
4000-4010 to display the entries for VLAN IDs from 4000 to
4010.
address Enter to display all static unicast MAC address entries created
in the FDB table for the specified unicast MAC address.
<aa:aa:aa:aa:aa:aa> Enter a MAC address.
interface Enter to specify the type of interface.
Extreme-Ethernet Enter to configure the Extreme-Ethernet type of interface to
be displayed. Extreme Ethernet is a version of Ethernet that
supports data transfer up to 10 Gigabits per second and only
full duplex links
<interface-id> Enter to configure a specific slot number / port number to be
displayed. The format is <0>/<1-28> without spaces between
Slot Number/Port Number. For example, 0/1.
Gigabitethernet Enter to configure gigabitetethernet type of interface to be
displayed. Gigabitethernet is a version of LAN standard
architecture that supports data transfer up to 1 Gigabit per
second.
<interface-id> Enter to configure a specific slot number / port number to be
displayed. The format is <0>/<1-28> without spaces between
Slot Number/Port Number. For example, 0/1.
switch Enter to specify switch name.
<context_name> Enter to specify context name.
Mode
Privileged EXEC Mode
Prerequisites
This command can be executed in the switch, only if the VLAN switching feature is started and enabled
in the switch.
631
SHOW MAC-ADDRESS-TABLE
CHAPTER 21 VLAN
Examples
iS5Comm# show mac-address-table
Vlan Mac Address Type ConnectionId Ports
---- ----------- ---- ----------- -----
1 54:e1:ad:07:0d:87 Learnt Gi0/9
632
SHOW PORT-SECURITY
CHAPTER 21 VLAN
show port-security
show port-security [{interface <interface-type> <interface-id> | switch
<context_name>]
633
SHOW PORT-SECURITY
CHAPTER 21 VLAN
Parameters
interface Enter to display the port security related information for the
specified interface.
<interface-type> Enter to configure the type of interface to be displayed. The
types of interface are as follows:
• fastethernet – Officially referred to as 100BASE-T standard.
This is a version of LAN standard architecture that supports
data transfer up to 100 Megabits per second.
• gigabitethernet – A version of LAN standard architecture
that supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports
data transfer up to 10 Gigabits per second. This Ethernet
supports only full duplex links..
• port-channel – Logical interface that represents an aggre-
gator which contains several ports aggregated together.
• sisp – <ifnum> interface number
• pw -<ifnum> interface number
• ac - <ifnum> interface number
<interface-id> Enter to configure a specific slot number / port number to be
displayed. For interface type other than internal-lan, virtual and
port-channel, the format is <0>/<1-28> without spaces between
Slot Number/Port Number. For example, 0/1. Only i-lan, virtual or
port-channel ID is provided, for interface types internal-lan,
virtual and port-channel.
switch Enter to specify switch name.
<context_name> Enter to specify context name.
Mode
Privileged EXEC Mode
Examples
iS5Comm# show port-security interface gigabitethernet 0/1
----------------------------
interface gigabitethernet 0/1
----------------------------
634
SHOW UNICAST PORT-SECURITY
CHAPTER 21 VLAN
635
SHOW UNICAST PORT-SECURITY
CHAPTER 21 VLAN
Parameters
address Enter to display static unicast MAC address for the specified
interface
Enter a MAC address to identify the interface to be displayed.
<aa:aa:aa:aa:aa:aa
>
interface Enter to display the port security related information for the
specified interface.
<interface-type> Enter to configure the type of interface to be displayed. The
types of interface are as follows:
• fastethernet – Officially referred to as 100BASE-T stan-
dard. This is a version of LAN standard architecture that
supports data transfer up to 100 Megabits per second.
• gigabitethernet – A version of LAN standard architecture
that supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports
data transfer up to 10 Gigabits per second. This Ethernet
supports only full duplex links.
• port-channel – Logical interface that represents an aggre-
gator which contains several ports aggregated together.
• sisp – <ifnum> interface number
• pw -<ifnum> interface number
• ac - <ifnum> interface number
<interface-id> Enter to configure a specific slot number / port number to be
displayed. For interface type other than internal-lan, virtual
and port-channel, the format is <0>/<1-28> without spaces
between Slot Number/Port Number. For example, 0/1. Only
i-lan, virtual or port-channel ID is provided, for interface types
internal-lan, virtual and port-channel.
switch Enter to specify switch name.
<context_name> Enter to specify context name.
Mode
Privileged EXEC Mode
636
SHOW USER-DEFINED TPID
CHAPTER 21 VLAN
Examples
iS5Comm# show unicast port-security
Vlan Mac Address RecvPort Status Connection ID Ports
---- ----------- -------- ------ ------------ -----
1 00:11:22:33:44:55 Permanent Gi0/1
Parameters
Mode
Privileged EXEC Mode
637
SHOW VLAN
CHAPTER 21 VLAN
Prerequisites
This command can be executed in the switch, only if the VLAN switching feature is started and enabled
in the switch.
Examples
iS5Comm# show user-defined TPID switch default
User Defined TPID : 0xc8
638
SHOW VLAN
CHAPTER 21 VLAN
Parameters
brief Enter to display the VLAN entry related information of all active
VLANs and VLANs (that are not active) for which the port details
are configured.
id Enter to display the VLAN entry related information for specified
VLANs alone.
<vlan-range> Enter a value that denotes the VLAN ID range for which the
information needs to be displayed. This value ranges from 1 to
4094. For example, the value is provided as 4000-4010 to display
the information for VLANs IDs from 4000 to 4010. The
information is displayed only for the active VLANs and VLANs
(that are not active) for which the port details are configured.
summary Enter to display only the total number of VLANs existing in the
switch. This includes only the active VLANs and VLANs (that are
not active) for which the port details are configured. The VLAN
entry related information is not displayed.
ascending Enter to display the VLAN entry related information in ascending
order.
switch Enter to specify switch name.
<context_name> Enter to specify context name.
device Enter to display VLAN global information / capabilities that are
applicable to all VLANs created in the switch / all contexts.
capabilities Enter to display only the list of VLAN features such as traffic class
feature, supported in the switch / all contexts..
info Enter to display the VLAN global information that is applicable to
all VLANs created in the switch / all contexts.
switch Enter to specify switch name.
<context_name> Enter to specify context name.
learning Enter to display the VLAN learning parameter details for all active
VLANs and VLANs (that are not active) for which the port details
are configured, available in all contexts / in the switch.
params Enter to display VLAN learning status and learning limit
configured for the specified VLAN range (ex.1-4) in the given
context.
vlan Enter to display the protocol specific configuration for VLAN.
639
SHOW VLAN
CHAPTER 21 VLAN
<vlan-range> Enter a value that denotes the VLAN ID range for which the
information needs to be displayed. This value ranges from 1 to
4094. For example, the value is provided as 4000-4010 to display
the information for VLANs IDs from 4000 to 4010. The
information is displayed only for the active VLANs and VLANs
(that are not active) for which the port details are configured.
switch Enter to specify switch name.
<context_name> Enter to specify context name.
port Enter to display the VLAN related port specific information for all
interfaces available in the switch / all contexts.
config Enter to display the VLAN related port specific information for all
interfaces available in the switch / all contexts. The information
contains PVID, acceptable frame type, port mode, filtering utility
criteria, default priority value and status of ingress filtering
feature, GVRP module, GMRP module, restricted VLAN
registration feature, restricted group registration feature,
MAC-based VLAN membership, subnet based VLAN membership,
protocol-VLAN based membership and port protected feature.
Extreme-Ethernet Enter to configure the Extreme-Ethernet type of interface to be
displayed. Extreme Ethernet is a version of Ethernet that
supports data transfer up to 10 Gigabits per second and only full
duplex links
<interface-id> Enter to configure a specific slot number / port number to be
displayed. The format is <0>/<1-28> without spaces between Slot
Number/Port Number. For example, 0/1.
Gigabitethernet Enter to configure gigabitetethernet type of interface to be
displayed. Gigabitethernet is a version of LAN standard
architecture that supports data transfer up to 1 Gigabit per
second.
<interface-id> Enter to configure a specific slot number / port number to be
displayed. The format is <0>/<1-28> without spaces between Slot
Number/Port Number. For example, 0/1.
switch Enter to specify switch name.
<context_name> Enter to specify context name.
640
SHOW VLAN
CHAPTER 21 VLAN
protocols-group Enter to display all entries in the protocol group table. These
entries contain protocol group information of the switch / all
contexts. The information contains ID of a group, protocol
assigned to the group, and frame type assigned to the group.
switch Enter to specify switch name.
<context_name> Enter to specify context name.
statistics Enter to display information about Protocol specific statistics for
VLAN.
vlan Enter to display the protocol specific configuration for VLAN.
<vlan-range> Enter a value that denotes the VLAN ID range for which the
information needs to be displayed. This value ranges from 1 to
4094. For example, the value is provided as 4000-4010 to display
the information for VLANs IDs from 4000 to 4010. The
information is displayed only for the active VLANs and VLANs
(that are not active) for which the port details are configured.
switch Enter to specify switch name.
<context_name> Enter to specify context name.
traffic-classes Enter to display the evaluated user priority and traffic class
mapping information of all interfaces available in the switch / all
context
port Enter to display the evaluated user priority and traffic class
mapping information of the specified interface.
Extreme-Ethernet Enter to configure the Extreme-Ethernet type of interface to be
displayed. Extreme Ethernet is a version of Ethernet that
supports data transfer up to 10 Gigabits per second and only full
duplex links
<interface-id> Enter to configure a specific slot number / port number to be
displayed. The format is <0>/<1-28> without spaces between Slot
Number/Port Number. For example, 0/1.
Gigabitethernet Enter to configure gigabitetethernet type of interface to be
displayed. Gigabitethernet is a version of LAN standard
architecture that supports data transfer up to 1 Gigabit per
second.
<interface-id> Enter to configure a specific slot number / port number to be
displayed. The format is <0>/<1-28> without spaces between Slot
Number/Port Number. For example, 0/1.
641
SHOW VLAN
CHAPTER 21 VLAN
Mode
Privileged EXEC Mode
Prerequisites
This command can be executed in the switch, only if the VLAN switching feature is started and enabled
in the switch.
Examples
iS5Comm# show vlan
Vlan database
-------------
Vlan ID : 1
Member Ports : Gi0/1, Gi0/2, Gi0/3, Gi0/4, Gi0/5, Gi0/6
Gi0/7, Gi0/8, Gi0/9, Gi0/10, Gi0/11, Gi0/12
Gi0/13, Gi0/14, Gi0/15, Gi0/16, Gi0/17, Gi0/18
Gi0/19, Gi0/20, Gi0/21, Gi0/22, Gi0/23, Gi0/24
Ex0/1, Ex0/2, Ex0/3, Ex0/4
Untagged Ports : Gi0/1, Gi0/2, Gi0/3, Gi0/4, Gi0/5, Gi0/6
Gi0/7, Gi0/8, Gi0/9, Gi0/10, Gi0/11, Gi0/12
Gi0/13, Gi0/14, Gi0/15, Gi0/16, Gi0/17, Gi0/18
Gi0/19, Gi0/20, Gi0/21, Gi0/22, Gi0/23, Gi0/24
Ex0/1, Ex0/2, Ex0/3, Ex0/4
Forbidden Ports : None
Name :Status : Permanent
Egress Ethertype : 0x8100
Service Loopback Status : Disabled
----------------------------------------------------
iS5Comm# show vlan device info
Vlan device configurations
--------------------------
Vlan Status : Enabled
Vlan Oper status : Enabled
Gvrp status : Disabled
642
SHOW VLAN
CHAPTER 21 VLAN
643
SHOW VLAN
CHAPTER 21 VLAN
644
SHOW VLAN
CHAPTER 21 VLAN
Gi0/19 8
Gi0/20 8
Gi0/21 8
Gi0/22 8
Gi0/23 8
Gi0/24 8
Ex0/1 8
Ex0/2 8
Ex0/3 8
Ex0/4 8
645
SHOW VLAN
CHAPTER 21 VLAN
Gi0/4 1 0
Gi0/4 2 1
Gi0/4 3 3
Gi0/4 4 4
Gi0/4 5 5
Gi0/4 6 6
Gi0/4 7 7
Gi0/5 0 2
Gi0/5 1 0
Gi0/5 2 1
Gi0/5 3 3
Gi0/5 4 4
Gi0/5 5 5
Gi0/5 6 6
Gi0/5 7 7
Gi0/6 0 2
Gi0/6 1 0
Gi0/6 2 1
Gi0/6 3 3
Gi0/6 4 4
Gi0/6 5 5
Gi0/6 6 6
Gi0/6 7 7
Gi0/7 0 2
Gi0/7 1 0
Gi0/7 2 1
Gi0/7 3 3
Gi0/7 4 4
Gi0/7 5 5
Gi0/7 6 6
Gi0/7 7 7
Gi0/8 0 2
Gi0/8 1 0
Gi0/8 2 1
Gi0/8 3 3
Gi0/8 4 4
Gi0/8 5 5
Gi0/8 6 6
Gi0/8 7 7
Gi0/9 0 2
646
SHOW VLAN
CHAPTER 21 VLAN
Gi0/9 1 0
Gi0/9 2 1
Gi0/9 3 3
Gi0/9 4 4
Gi0/9 5 5
Gi0/9 6 6
Gi0/9 7 7
Gi0/10 0 2
Gi0/10 1 0
Gi0/10 2 1
Gi0/10 3 3
Gi0/10 4 4
Gi0/10 5 5
Gi0/10 6 6
Gi0/10 7 7
Gi0/11 0 2
Gi0/11 1 0
Gi0/11 2 1
Gi0/11 3 3
Gi0/11 4 4
Gi0/11 5 5
Gi0/11 6 6
Gi0/11 7 7
Gi0/12 0 2
Gi0/12 1 0
Gi0/12 2 1
Gi0/12 3 3
Gi0/12 4 4
Gi0/12 5 5
Gi0/12 6 6
Gi0/12 7 7
Gi0/13 0 2
Gi0/13 1 0
Gi0/13 2 1
Gi0/13 3 3
Gi0/13 4 4
Gi0/13 5 5
Gi0/13 6 6
Gi0/13 7 7
Gi0/14 0 2
647
SHOW VLAN
CHAPTER 21 VLAN
Gi0/14 1 0
Gi0/14 2 1
Gi0/14 3 3
Gi0/14 4 4
Gi0/14 5 5
Gi0/14 6 6
Gi0/14 7 7
Gi0/15 0 2
Gi0/15 1 0
Gi0/15 2 1
Gi0/15 3 3
Gi0/15 4 4
Gi0/15 5 5
Gi0/15 6 6
Gi0/15 7 7
Gi0/16 0 2
Gi0/16 1 0
Gi0/16 2 1
Gi0/16 3 3
Gi0/16 4 4
Gi0/16 5 5
Gi0/16 6 6
Gi0/16 7 7
Gi0/17 0 2
Gi0/17 1 0
Gi0/17 2 1
Gi0/17 3 3
Gi0/17 4 4
Gi0/17 5 5
Gi0/17 6 6
Gi0/17 7 7
Gi0/18 0 2
Gi0/18 1 0
Gi0/18 2 1
Gi0/18 3 3
Gi0/18 4 4
Gi0/18 5 5
Gi0/18 6 6
Gi0/18 7 7
Gi0/19 0 2
648
SHOW VLAN
CHAPTER 21 VLAN
Gi0/19 1 0
Gi0/19 2 1
Gi0/19 3 3
Gi0/19 4 4
Gi0/19 5 5
Gi0/19 6 6
Gi0/19 7 7
Gi0/20 0 2
Gi0/20 1 0
Gi0/20 2 1
Gi0/20 3 3
Gi0/20 4 4
Gi0/20 5 5
Gi0/20 6 6
Gi0/20 7 7
Gi0/21 0 2
Gi0/21 1 0
Gi0/21 2 1
Gi0/21 3 3
Gi0/21 4 4
Gi0/21 5 5
Gi0/21 6 6
Gi0/21 7 7
Gi0/22 0 2
Gi0/22 1 0
Gi0/22 2 1
Gi0/22 3 3
Gi0/22 4 4
Gi0/22 5 5
Gi0/22 6 6
Gi0/22 7 7
Gi0/23 0 2
Gi0/23 1 0
Gi0/23 2 1
Gi0/23 3 3
Gi0/23 4 4
Gi0/23 5 5
Gi0/23 6 6
Gi0/23 7 7
Gi0/24 0 2
649
SHUTDOWN GARP
CHAPTER 21 VLAN
Gi0/24 1 0
Gi0/24 2 1
Gi0/24 3 3
Gi0/24 4 4
Gi0/24 5 5
Gi0/24 6 6
Gi0/24 7 7
Ex0/1 0 2
Ex0/1 1 0
Ex0/1 2 1
Ex0/1 3 3
Ex0/1 4 4
Ex0/1 5 5
Ex0/1 6 6
Ex0/1 7 7
shutdown garp
shutdown garp
Mode
Global Configuration Mode
650
SHUTDOWN VLAN
CHAPTER 21 VLAN
Default
GARP module is started and enabled in the switch on all ports.
Prerequisites
• GARP can be started, only if VLAN switching feature is started in the switch.
• GARP can be shutdown, only if GVRP and/or GMRP are disabled.
Examples
iS5Comm (config)# shutdown garp
shutdown vlan
no shutdown vlan
Mode
Global Configuration Mode
Default
VLAN switching feature is started and enabled in the switch.
Prerequisites
VLAN module can be shut down, only if the GARP module is shutdown. VLAN switching configuration is
not allowed in the switch if the base bridge mode is set as transparent bridging.
651
SWITCHPORT
CHAPTER 21 VLAN
Examples
iS5Comm(config)# no shutdown vlan
21.43. switchport
To configure switch port related information, use the command switchport in Interface Configuration
Mode. The no form of the command resets the configuration to default or disables the features.
switchport
switchport [dot1q] {ingress | egress} ether-type <size(1-65535)>
[acceptable-frame-type {all | tagged | untaggedAndPrioritytagged}
[access vlan <vlan-id(1-4094)>]
[egress TPID-type {portbased | vlanbased}
[encapsulation dot1ad vlan-type {tpid1 <CTAG | STAG > [tpid2] [tpid3]}
[filtering-utility-criteria {default | enhanced}] [ingress-filter]
[map protocols-group <Group id integer(0-2147483647)> vlan
<vlan-id/vfi_id>]
[mode {access | trunk | hybrid | {dynamic | tagged {auto | desirable}}}]
[port-security {unicast <aa:aa:aa:aa:aa:aa> vlan <vlan-id/vfi_id> | viola-
tion {{protect | restrict | shutdown}| [recovery { automatic recovery-time
<integer 0-300> | manual }]]
[priority default <priority value(0-7)>
[protected]
[pvid vlan <vlan-id/vfi_id>]
[unicast-mac learning {enable | disable}
no switchport
no switchport [dot1q] {ingress | egress} ether-type} [acceptable-frame-type]
[access vlan] [egress TPID-type]
[encapsulation dot1ad vlan-type [tpid1] [tpid2] [tpid3]} [ingress-filter]
[map protocols-group <Group id integer(0-2147483647)> vlan
<vlan-id(1-4094)>]
[mode] [priority default <priority value(0-7)>] [protected] [pvid]
652
SWITCHPORT
CHAPTER 21 VLAN
Parameters
dot1q Enter to put an interface that is in Layer 3 mode into Layer 2 mode for
Layer 2 configuration and configure port Ingress/Egress Ethertype.
Dot1q shows tunneling related information.
NOTE: This command executes only if the bridge port type is set as CBP
(Customer Backbone Port).
ingress Enter to configure ingress Ethertype and hence allows the service
provider to support tunneling. Packets received on a port are considered
tagged when the packet Ethertype matches the Ethertype configured on
the port.
egress Enter to configure egress Ethertype. This object indicates the Ethertype
of the S-VLAN tag that has to be applied for all outgoing packets on this
port. If a valid value is in this object, all packets which are outgoing on
this port will contain the Ethertype as configured in this object
Ethertype Enter to configure the size of Ethertype.
<size(1-655 Integer Enter a value for Ethertype. This value ranges from 1 to 65535 with a
35)> default of 33024.
<vlan-id(1- Integer Enter a value for VLAN-ID start of range. This value ranges from 1 to
4094)> 4094.
acceptable- Enter to configure the type of VLAN dependent BPDU frames such as
frame-type GMRP BPDU that the port should accept during the VLAN membership
configuration.
all Enter to configure the acceptable frame type as all. All tagged, untagged
and priority tagged frames received on the port are accepted and
subjected to ingress filtering.
tagged Enter to configure the acceptable frame type as tagged.Only the tagged
frames received on the port are accepted and subjected to ingress
filtering. The untagged and priority tagged frames received on the port
are rejected. For ports in PBB bridge mode, for the following Port types,
the TAG descriptions are as follows
• for CNP S Tagged - S-Tag
• for CNP C Tagged - C-Tag
• for CNP Port Based - S-Tag
• PIP - I-Tag
• CBP - I-Tag
• PNP - B-tab or S-Tag.
653
SWITCHPORT
CHAPTER 21 VLAN
untaggedAnd Enter to configure the acceptable frame type as untagged and priority
Prioritytag tagged. Only the untagged or priority tagged frames received on the
ged port are accepted and subjected to ingress filtering. The tagged frames
received on the port are rejected.
access Enter to configure the PVID (Port VLAN Identifier) on a port.
vlan Enter to configure the PVID (Port VLAN Identifier) on a port.
<vlan-id(1- Integer Enter a value for PVID (Port VLAN Identifier). This value ranges from 1 to
4094)> 4094.
NOTE: If the frame (untagged/priority tagged/customer VLAN tagged) is
received on a "tunnel" port, then the default PVID associated with the
port is used
NOTE: If the received frame cannot be classified as MAC-based or
port-and-protocol-based, then the PVID associated with the port is used.
NOTE: For ports in PBB bridge mode, PVID can be configured on CNP
(Customer Network Port) and CBP (Customer Backbone Port).
NOTE: Usage is based on acceptable frame type of the port. Packets will
be either dropped or accepted at ingress. Once a packet is accepted, if
the packet is having a tag, it will be processed against that tag. Other-
wise, the packet will be processed against PVID.
egress Enter to set the egress TPID-type for the port
TPID-type Enter to configure the egress TPID-type on a port
portbased Enter to set egress TPID-type as portbased. The egress TPID of the
packet is selected from the Egress Port Table.
vlanbased Enter to configure the egress TPID-type as vlan-based. The egress TPID is
selected from the egress VLAN Table.
encapsulati Enter to configure standard/user defined TPID for a port.
on
dot1ad Enter for DOT1AD configuration. IEEE 802.1ad implements standard
protocols for double tagging of data. The data traffic coming from the
customer side are double tagged in the provider network where the
inner tag is the customer-tag (C-tag) and the outer tag is the
provider-tag( S-tag). A service provider's Layer 2 network transports the
subscriber's Layer 2 protocols transparently.
vlan-type Enter to set VLAN TYPE.
654
SWITCHPORT
CHAPTER 21 VLAN
tpid1 Enter to configure standard allowable TPID for a Port, either C-Tag or
S-Tag.
NOTE: The TPID1 value should be configured as a value different from the
default ingress Ethertype. If the ingress Ethertype is 0x8808, then TPID
CTAG should be configured using this command. if the ingress Ethertype
is 0x8100, TPID STAG should be configured.
CTAG Enter to configure standard allowable TPID for C-tag (i.e. inner or
Customer tag) is used to uniquely identify a customer and typically is
used on a per port basis. This indicates the secondary Ethertype that is
allowable for a port. The configurable value for this object is 0x8100. For
Ethertypes numbers see
https://www.iana.org/assignments/ieee-802-numbers/ieee-802-numbe
rs.xhtml#ieee-802-numbers-1
STAG Enter to configure standard allowable TPID for S-TAG (i.e. outer, Service
Provider tag). This indicates a secondary Ethertype that is allowable for a
port. The configurable value for this object is 0x88A8.
tpid2 Enter to set standard allowable TPID for a port. This indicates the
standard Ethertype that is allowable for a port. The configurable value
for this object is Q-in-Q Ethertype [0x9100].
tpid3 Enter to configure the user defined allowable TPID for a port.
filtering-u Enter to configure filtering utility criteria for the port. This utility criteria
tility-crit are used to reduce the capacity requirement of the filtering database
eria and to reduce the time for which service is affected, by retaining the
filtering information learnt prior to a change in the physical topology of
the network.
NOTE: The filtering utility criteria cannot be configured in the switch, if the
VLAN switching feature is shutdown in the switch.
NOTE: This command is applicable only for the port configured as switch
port.
default Enter to allow learning of source MAC from a packet received on the
port, only if there is at least one member port for a VLAN mentioned in
the packet. This is the default option.
655
SWITCHPORT
CHAPTER 21 VLAN
enhanced Enter to allow learning of source MAC from a packet received on the
port, only if the following conditions are satisfied:
• At least one VLAN that uses the FID includes the reception port and
at least one other Port with a port state of Learning or Forwarding
in its member set.
• The operPointToPointMAC parameter is false for the reception
port. Or Ingress to the VLAN is permitted through a port other than
source and reception. This port can be or not be in the member set
for the VLAN.
ingress-fil Enter to enable ingress filtering feature on the port. The ingress filtering
ter is applied for the incoming frames received on the port. Only the
incoming frames of the VLANs that have this port in its member list are
accepted. This configuration does not affect VLAN independent BPDU
frames such as GVRP BPDU and STP BPDU. It affects only the VLAN
dependent BPDU frames GMRP BPDU. By default, the ingress filtering
feature is disabled on the port.
• NOTE: Prerequisites:
• This command is applicable only for the port configured as switch
port.
• The ingress filtering cannot be configured on the port, if the base
bridge mode is set as transparent bridging or the VLAN switching
feature is shutdown in the switch.
• The ingress-filtering feature cannot be configured and is always
enabled on the port, if the bridge port type is set as customer
network port – S tagged.
map Enter to map the configured protocol group to a particular VLAN ID for
an interface. This configuration is used during protocol-VLAN based
membership classification.
protocols-g Enter to map the configured protocol group to a particular VLAN ID for
roup an interface.
<Group id Integer Specify a unique group ID that is already created with the specified
integer(0-2 protocol type and encapsulation frame type. This value represents a
147483647)> specific group that should be associated with a VID. This value ranges
from 0 to 2147483647.
656
SWITCHPORT
CHAPTER 21 VLAN
vlan Enter to map the configured protocol group to the specified VLAN / VFI
ID.
NOTE: The protocol group should have been already created with a
specific protocol and encapsulation frame type combination before
mapping it to a VID
NOTE: This command is applicable only for the port configured as switch
port
NOTE: The protocol group mapping cannot be configured for the port, if
the VLAN switching feature is shutdown in the switch.
<vlan-id/vf Integer Enter to configure the configured protocol group to the specified VLAN /
i_id> VFI ID. This value ranges from 1 to 65535.
• <vlan –id> - VLAN ID is a unique value that represents the specific
VLAN. This value ranges from 1 to 4094.<vfi-id>. - VFI ID is a VLAN
created in the system which contains Pseudo wires and Attachment
Circuits as member ports . This creates a logical LAN for the VPLS
service. This value ranges from 4096 to 65535.
NOTE: VFI IDs 4096 and 4097 are reserved identifiers used in MPLS PW.
NOTE: The theoretical maximum for the maximum number of VFI is 65535
but the actual number of VFI supported is a sizing constant. Based on
this, the maximum number of VFI ID accepted in the management inter-
face is restricted. For example if 100 VFIs are supported, the maximum
number of VFI supported will be restricted to maximum number of
VLANs + 100. An error message is displayed for any value beyond this
range.
mode Enter to configure the mode of operation for a switch port. This mode
defines the way of handling of traffic for VLANs.
access Enter to configure the port as access port that accepts and sends only
untagged packets. This kind of port is added as a member to a specific
VLAN only and carries traffic only for the VLAN to which the port is
assigned. The port can be set as access port, only if the following 3
conditions are met:
• The GVRP is disabled for that port.
• Acceptable frame type is set as “untagged AND priority” tagged.
• Port is a not a tagged member of any VLAN.
657
SWITCHPORT
CHAPTER 21 VLAN
trunk Enter to set the port as trunk port that accepts and sends only tagged
frames. This kind of port is added as member of all existing VLANs and
for any new VLAN created, and carries traffic for all VLANs. The trunk
port accepts untagged frames too, if the acceptable frame type is set as
all. The port can be set as trunk port, only if the port is not a member of
untagged ports for any VLAN in the switch.
hybrid Enter to configure the port as hybrid port that accepts and sends both
tagged and untagged frames.
dynamic Enter to configure the mode as Dynamic Mode. The Dynamic Mode can
be auto and desirable.
auto Enter to set the interface to convert the link to a trunk link.
desirable Enter to set the interface to attempt actively to convert the link to a
trunk link.
port-securi Enter to configure the unicast MAC address as a known frame in the
ty port.
The port-security command is used to enable/disable port-security on a
port. Port-security needs to be enabled to configure trusted MAC
addresses and MAC learn limit.
By default port-security is be “disabled”.
If port-security configuration is enabled, the Port Security MACs
limit(trusted MACs) would be limited to 3K per device. This valud is
hardcoded and not configurable.
unicast Enter to configure the static unicast MAC address for the specified
interface.
<aa:aa:aa:a Enter an unicast MAC address. This address should be in the format of
a:aa:aa> aa:bb:cc:dd:ee:ff.
vlan Enter to set VLAN Interface configuration for the specified VLAN / VFI ID.
658
SWITCHPORT
CHAPTER 21 VLAN
<vlan-id/vf Integer Enter set VLAN Interface configuration for the specified VLAN / VFI ID.
i_id> This value ranges from 1 to 6553.
• <vlan –id> - VLAN ID is a unique value that represents the specific
VLAN. This value ranges from 1 to 4094.
• <vfi-id>- VFI ID is for a VLAN created in the system with a value
ranging from 4096 to 65535.
NOTE: The VLAN ID 4095 is reserved and may be used to indicate a wild-
card match for the VID in management operations or Filtering Database
entries.
NOTE: VFI IDs 4096 and 4097 are reserved identifiers used in MPLS PW.
NOTE: The theoretical maximum for the maximum number of VFI is 65535
but the actual number of VFI supported is a sizing constant. Based on
this, the maximum number of VFI ID accepted in the management inter-
face is restricted. For example if 100 VFIs are supported, the maximum
number of VFI supported will be restricted to maximum number of
VLANs + 100. An error message is displayed for any value beyond this
range.
violation Enter to configure the security violation status for the specified switch
port.
NOTE: This command can be executed only if the interface created is
mapped to a context.
recovery The default state is manual recovery. The user needs to manually change
the admin status to the UP (no shutdown) state to recover the port.
automatic If port recovery is configured as “automatic”, based on the “timer” value
configured, the port will change its status to UP automatically. The timer
value to be configured will be in “seconds”. The default recovery timer
value is 5 secs.
protect Enter to set the port-security violation label (sav) as protected, which
sets strict security flag as false, and only unknown MAC is treated as
violation on all security configured ports.
Drops packets with unknown source addresses until secure MAC
addresses drop below the maximum value.
restrict Enter to set the port-security violation label (shv) as restricted, which
sets the security flag as true, and configured MAC alone are alone
treated as non violation on all security configured ports.Restrict
drops packets with unknown source addresses until the number of
secure MAC addresses drop below the maximum value and causes the
Security Violation counter to increment. If max value is reached all
violated entries will flash out and the learning process will start again.
659
SWITCHPORT
CHAPTER 21 VLAN
660
SWITCHPORT
CHAPTER 21 VLAN
<vlan-id/vf Integer Enter a value for the / VFI ID. This value ranges from 1 to 65535.
i_id> • <vlan –id> - VLAN ID is a unique value that represents the specific
VLAN. This value ranges from 1 to 4094. The default is 1.
• <vfi-id> - VFI ID is for a VLAN created in the system and ranges from
4096 to 65535.
NOTE: The VLAN ID 4095 is reserved and may be used to indicate a wild-
card match for the VID in management operations or Filtering Database
entries.
NOTE: VFI IDs 4096 and 4097 are reserved identifiers used in MPLS PW.
NOTE: The theoretical maximum for the maximum number of VFI is 65535
but the actual number of VFI supported is a sizing constant. Based on
this, the maximum number of VFI ID accepted in the management inter-
face is restricted. For example if 100 VFIs are supported, the maximum
number of VFI supported will be restricted to maximum number of
VLANs + 100. An error message is displayed for any value beyond this
range.
unicast-mac Enter to enable / disable unicast-MAC learning for the port.
learning Enter to enable / disable unicast-MAC learning for the port.
The learning command allows users to enable/disable mac-learning on a
specific port with the configured mac-learning count.
There are no changes in standard MAC learning process, Upon the
configuration of port-security users will be able to specify the max
number of MAC addresses that may be learned by a port.
When the number of MAC addresses learned exceeds the limit then
entries in excess of the limit will be marked as DROPped.
enable Enter to enable unicast-MAC learning for the port. When Mac Learning is
enabled, unicast mac entries will be learnt on this port. Configuration of
this object will not get affected by the Global Mac Learning Status. This
is the default option.
disable Enter to disable unicast-MAC learning for the port. When Unicast Mac
Learning is disabled, no unicast mac entry will be learnt on this port.
Mode
Interface Configuration Mode (Physical / Port Channel)
Examples
iS5Comm(config)# int port-channel 1
661
SWITCHPORT
CHAPTER 21 VLAN
MAC learning
iS5Comm(config)# int gi 0/17
iS5Comm(config-if)# switchport unicast-mac learning enable mac-limit 3
iS5Comm(config-if)# end
iS5Comm# show mac-address
Vlan Mac Address Type ConnectionId Ports
---- ----------- ---- ----------- -----
1 00:10:94:00:00:02 Learnt Gi0/17
1 00:10:94:00:00:03 Learnt Gi0/17
1 00:10:94:00:00:04 Learnt Gi0/17
662
USER-DEFINED TPID
CHAPTER 21 VLAN
Unicast
iS5Comm(config-if)# switchport port-security unicast 12:23:34:34:34:34 vlan 1
The above command allows the user to configure the trusted MAC-address in the VLAN, this will be the
only MAC address that will be allowed for this interface.
This is an optional configuration, if the MAC address is not specified, then the first learned MAC
addresses will be allowed until the configured limit is reached.
To remove the trusted MAC address from the interface use the following command:
663
VLAN
CHAPTER 21 VLAN
Parameters
<size (1-65535)> Integer Enter a value for the Ethertype.This Ethertype value ranges from 1 to
65535.
Mode
Global Configuration Mode
Default
0
Prerequisites
The VLAN mode can be configured, only if the VLAN switching feature is started and enabled in the
switch.
Examples
iS5Comm(config)# user-defined TPID 200
21.45. vlan
To map an evaluated user priority to a traffic class on a port, configure the maximum number of traffic
classes supported on a port, or set a restricted feature configuration, use the command vlan in Interface
Configuration Mode. The maximum number of traffic classes supported on the port can be configured,
only if the VLAN switching feature is started and enabled in the switch. The no form of the command
resets the maximum traffic class value on the port to its default value and maps the default traffic class
to the specified priority value on the port.
vlan
vlan {map-priority <priority value(0-7)> traffic-class <traffic class
value(0-7)>
| max-traffic-class <max traffic class value(1-8)>
| restricted} {disable | enable}
664
VLAN
CHAPTER 21 VLAN
no vlan
no vlan {map-priority <priority value(0-7)> | max-traffic-class}
665
VLAN
CHAPTER 21 VLAN
Parameters
666
VLAN
CHAPTER 21 VLAN
Integer Enter a traffic class value to which the received frame of specified
<traffic-cla priority is to be mapped. This value ranges from 0 to 7. Each value
ss represents the concerned traffic. They are:
value(0-7) • 0 - Best effort. This represents all kinds of non-detrimental traffic
that is not sensitive to QoS metrics such as jitter.
• 1 - Background. This represents bulk transfers and other activities
that are permitted on the network without impacting the network
usage for users and applications.
• 2 - Standard (spare traffic). This represents traffic of more impor-
tance than background but less importance than excellent load.
• 3 - Excellent load. This represents the best effort type service that
an information services organization should deliver to its most
important customers.
• 4 - Controlled load. This represents traffic subject to admission
control to assure that the traffic is received even when the
network is overloaded.
• 5 - Interactive voice and video. This represents traffic having delay
less than 100 milli-seconds.
• 6 - Internetwork control-Layer 3 network control. This represents
traffic having delay less than 10 milli-seconds.
• 7 - Network control-Layer 2 network control reserved traffic. This
represents traffic that demands special treatment based on its
requirements and relative importance.
The configured traffic class value should be less than the maximum
number of traffic classes in the port.
Enter to configure the maximum number of traffic classes supported on
max-traffic- a port
class
Integer Enter a value for the maximum number of traffic classes supported on a
<max-traffic port. The number of traffic classes supported depends on the hardware
-class used, which can limit the number of traffic classes to a lower number.
value(1-8) Eight traffic classes for handling priority traffic are supported. Each
traffic is assigned a traffic type based on the time sensitiveness of the
traffic. This value ranges from 1 to 8. The default is 8.
restricted Enter to configure the restricted feature configuration.
disable Enter to disable the restricted VLAN registration.
enable Enter to enable the restricted VLAN registration.
667
VLAN
CHAPTER 21 VLAN
Mode
Interface Configuration Mode
Default
The default traffic classes that are mapped to the priority is listed below:
Priority Traffic Class
10
21
33
44
55
66
77
Prerequisites
• The default traffic classes mapped to the priority value depends upon the maximum traffic classes
supported on the port.
• The evaluated user priority can be mapped to the traffic class, only if the VLAN switching feature is
started and enabled in the switch.
• Mapping packets to a queue based on the COS value in the packet can be achieved by mapping the
packets COS value to internal priority and then the internal priority to a Queue Id. Since the Cos
mapping to a queue is not directly supported in bcm, alternate command has to be configured for
achieving this based on the internal priority
Examples
iS5Comm (config-if)# vlan map-priority 2 traffic-class 2
21.46. vlan
To activate a VLAN in the switch, set the VLAN egress Ethertype, set the loopback-related configuration,
use the command vlan in VLAN Configuration Mode. The no form of this command resets the VLAN
egress Ethertype to the default value.
668
VLAN
CHAPTER 21 VLAN
vlan
vlan {active
| egress ether-type {STAG | QINQ | QINQ | user-defined}
| loopback {enable | disable}
| nestedvlan {enable | disable}
669
VLAN
CHAPTER 21 VLAN
Parameters
loopback Enter to sets the loopback status for the VLAN interface
enable Enter to enable loopback feature for the VLAN interface. When
loopback is enabled, all data packets received in the vlan will be
sent back in the same port from which the packets are received
disable Enter to disable loopback feature for the VLAN interface. This is
default.
nestedvlan Enter to select nested vlan
enable Enter to enable loopback feature for the VLAN interface. When
loopback is enabled, all data packets received in the vlan will be
sent back in the same port from which the packets are received
disable Enter to disable loopback feature for the VLAN interface. This is
default.
Mode
VLAN Configuration Mode
Examples
iS5Comm(config-vlan)# vlan active
iS5Comm(config-vlan)# vlan egress ether-type CTAG
iS5Comm(config-vlan) # vlan loopback enable
670
VLAN
CHAPTER 21 VLAN
21.47. vlan
To create a VLAN / VFI ID and enter into the config- VLAN mode in which VLAN specific configurations are
done or configure the global MAC learning mode, use the command vlan in Global Configuration Mode.
The no form of the command deletes the existing VLAN/ VFI and its corresponding configurations. Static
ARP cache entry related to the static MAC address of this specific VLAN should be removed while removal
of static VLAN.
vlan
vlan {learning mode {hybrid | svl | ivl} | <vlan_vfi_id>}
no vlan
no vlan <vlan_vfi_id>}
671
VLAN
CHAPTER 21 VLAN
Parameters
learning Enter to configure the VLAN learning mode to be applied for all ports
of the switch.
mode Enter to configure the VLAN learning mode to be applied for all ports
of the switch. This mode defines the forwarding database modes of
operation to be implemented by the switch.
hybrid Enter to set the VLAN learning mode as hybrid. Same forwarding
database is created for some VLANs and separate forwarding database
is used for some VLANs. The usage of same or separate forwarding
database for the VLAN is decided based on the static unicast MAC
address in the FDB table entries.
ivl Enter to set the VLAN learning mode as Independent VLAN learning
(IVL). Separate forwarding database is created for each VLAN. The
information learnt from a VLAN is not shared among other relative
VLANs during forwarding decisions. This mode is suitable in situations
where the database size is not a constraint and end stations operate
over multiple VLANs with the same MAC address. This is the default
mode.
svl Enter to set the VLAN learning mode as Shared VLAN learning (SVL).
Single forwarding database is created for all VLANs. The information
learnt from a VLAN is shared among all other relative VLANs during
forwarding decision. This mode is suitable in situations where the
learning database size is a constraint.
672
VLAN
CHAPTER 21 VLAN
<vlan_vfi_id> Enter to create a VLAN / VFI ID and enters into the config-VLAN mode
in which VLAN specific configurations are done. This command directly
enters into the config-VLAN mode for the specified VLAN / VFI ID, if
the VLAN is already created.
• <vlan –id> - This is a unique value that represents the specific
VLAN. This value ranges from 1 to 4094.
• <vfi-id>. - VFI ID is a VLAN created in the system which contains
Pseudo wires and Attachment Circuits as member ports . This
creates a logical LAN for the VPLS service. This value ranges from
4096 to 65535
NOTE: The VLAN ID 4095 is reserved and may be used to indicate a wild-
card match for the VID in management operations or Filtering Data-
base entries
NOTE: VFI IDs 4096 and 4097 are reserved identifiers used in MPLS PW
NOTE: The theoretical maximum for the maximum number of VFI is
65535 but the actual number of VFI supported is a sizing constant.
Based on this, the maximum number of VFI ID accepted in the manage-
ment interface is restricted. For example, if 100 VFIs are supported, the
maximum number of VFI supported will be restricted to maximum
number of VLANs + 100. An error message is displayed for any value
beyond this range.
Mode
Global Configuration Mode
Default
By default, VLAN 1 is created
learning mode - ivl
Prerequisites
The VLAN learning mode cannot be configured in the switch, if the VLAN switching feature is shut down
in the switch.The Native VLAN (VLAN 1) created by default cannot be deleted using the no form of the
command.
For default VLAN 1, interface VLAN configuration alone is permitted and no other configuration on this
VLAN is allowed, if the base bridge mode is set as transparent bridging. No new VLAN can be created, if
the base bridge mode is set as transparent bridging
673
NESTED VLAN WITH SUB-SWITCH CLI COMMAND
CHAPTER 21 VLAN
The creation of new VLAN and configuration of existing VLAN can be done, only if the VLAN switching
feature is started and enabled in the switch.
Examples
iS5Comm(config)# vlan 4
iS5Comm(config)# vlan learning mode hybrid
iS5Comm(config-vlan)#
674
NESTED VLAN WITH SUB-SWITCH CLI COMMAND
CHAPTER 21 VLAN
Mode
Global Configuration Mode
Parameters
Examples
The command below shows an example of nested VLAN 20 path through the switch.
iS5Comm# (config)# sub-switch nested vlan 20 gigabit 0/7-8,0/11-12
Restrictions
Creating a nested VLAN in this way requires that:
• the VLAN does not already exist, and
• the list of all ports belong only to the default VLAN.
On creation:
• the ports will be removed from the default VLAN and added to the new VLAN,
• the PVID of all the ports will be set to the VLAN ID, and
• the nested VLAN feature will be enabled on all the ports.
The PVID will be restricted to be used only in this VLAN to ensure that there is no mixing with otherVLANs.
675
NESTED VLAN WITH ELEMENTARY CLI COMMANDS
CHAPTER 21 VLAN
Examples
For example, a nested VLAN can be created with the following elementary CLI console commands:
iS5Comm# configure terminal
iS5Comm# (config)# vlan 1
iS5Comm# (config-vlan)# no ports gi 0/7-8,0/11-12 untagged gi 0/7-8,0/11-12
676
NESTED VLAN WITH ELEMENTARY CLI COMMANDS
CHAPTER 21 VLAN
The example above provides details on how to create a nested VLAN with elementary CLI console
commands.
For information on a high level user-friendly way to set up a nested VLAN, see the sub-switch command.
677
ARP
CHAPTER 22 IP
IP
22. IP
IP (Internet Protocol) is an identifier for a computer or device on a TCP/ IP network. Networks using the
TCP/ IP protocol route messages based on the IP address of the destination. The format of an IP address
is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to
255. For example, 10.5.25.180.
Every computer that communicates over the Internet is assigned an IP address that uniquely identifies
the device and distinguishes it from other computers on the Internet. Within an isolated network, IP
addresses can be assigned at random if each one is unique. However, to connect a private network to the
Internet, registered IP addresses must be used (called Internet addresses) to avoid duplicates. The four
numbers in an IP address are used in different ways to identify a particular network and a host on that
network.
Four regional Internet registries—ARIN, RIPE NCC, LACNIC, and APNIC—assign Internet addresses from
the following three classes.
• Class A - supports 16 million hosts on each of 126 networks
• Class B - supports 65,000 hosts on each of 16,000 networks
• Class C - supports 254 hosts on each of 2 million networks
The number of unassigned Internet addresses is running out, so a new classless scheme called CIDR
(Classless Inter-Domain Routing) is gradually replacing the system based on classes A, B, and C and is tied
to adoption of IPv6. ICMP (Internet Control Message Protocol) is an extension to the IP defined by RFC
792. ICMP supports packets containing error, control, and informational messages. For example, the ping
command uses ICMP to test an Internet connection.
The IP implements all components required for IP forwarding. The various components of the IP include
ARP, RARP, RTM, ICMP, IRDP, IGMP, InARP, BOOTP, TFTP, TRACE ROUTE, PING and UDP.
22.1. arp
To add a static entry in the ARP cache or set the ARP (Address Resolution Protocol) cache timeout, use
the command arp in Global Configuration Mode. The no form of this command resets ARP cache timeout
to its default value or deletes a static entry from the ARP cache.
678
ARP
CHAPTER 22 IP
arp
arp {<ip address> <hardware address>
| {Vlan <vlan-id/vfi-id>
| <interface-type> <interface-id>
| Linuxvlan <interface-name>
| Cpu0
| <IP-interface-type> <IP-interface-number>}
| timeout <seconds (30-86400)>
no arp
no arp timeout {<ip address> | access-list <access-list-name>}
679
ARP
CHAPTER 22 IP
Parameters
<ip Enter a value to defines the IP address or IP alias to map to the specified
address> MAC address.
<hardware Enter a value to defines the MAC address to map to the specified IP
address> address or IP alias. For example, aa:aa:aa:aa:aa:aa
vlan Enter to create a VLAN / VFI ID and enters into the config-VLAN mode in
which VLAN specific configurations are done. This command directly
enters into the config-VLAN mode for the specified VLAN / VFI ID, if the
VLAN is already created
<vlan_vfi_id> Integer Enter a value for VLAN or VFI ID:
• <vlan –id> - This is a unique value that represents the specific VLAN.
This value ranges from 1 to 4094.
• <vfi-id>. - VFI ID is a VLAN created in the system which contains
Pseudo wires and Attachment Circuits as member ports. This
creates a logical LAN for the VPLS service. This value ranges from
4096 to 65535
NOTE: The VLAN ID 4095 is reserved and may be used to indicate a wild-
card match for the VID in management operations or Filtering Database
entries
NOTE: VFI IDs 4096 and 4097 are reserved identifiers used in MPLS PW
NOTE: The theoretical maximum for the maximum number of VFI is 65535
but the actual number of VFI supported is a sizing constant. Based on
this, the maximum number of VFI ID accepted in the management inter-
face is restricted. For example, if 100 VFIs are supported, the maximum
number of VFI supported will be restricted to maximum number of
VLANs + 100. An error message is displayed for any value beyond this
range.
680
ARP
CHAPTER 22 IP
Enter to add a static entry in the ARP cache for the specified interface.
<interface- The types of interface are as follows:
type> • fastethernet – Officially referred to as 100BASE-T standard. This is
a version of LAN standard architecture that supports data transfer
up to 100 Megabits per second.
• gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports only
full duplex links..
• port-channel – Logical interface that represents an aggregator
which contains several ports aggregated together.
• sisp – <ifnum> interface number
• pw -<ifnum> interface number
• ac - <ifnum> interface number
Enter to configure a specific slot number / port number to be added. For
<interface- interface type other than internal-lan, virtual and port-channel, the
id> format is <0>/<1-28> without spaces between Slot Number/Port
Number. For example, 0/1. Only i-lan, virtual or port-channel ID is
provided, for interface types internal-lan, virtual and port-channel.
Linuxvlan Enter to configure the Linux VLAN Interface.
Enter a value to configure the Linux VLAN Interface.
<interface-
name>
Cpu0 Enter to set the Out of Band Management Interface for the route.
Enter to add a static entry in the ARP cache for the specified L3 Pseudo
<IP-interfa wire interface in the system.
ce-type>
Enter a static entry in the ARP cache for the specified L3 Pseudo wire
<IP-interfa interface identifier. This is a unique value that represents the specific
ce-number> interface. This value ranges from 1 to 65535 for Pseudowire interface.
NOTE: Maximum number of Pseudowire interfaces supported in the
system is 100.
timeout Enter to set the ARP (Address Resolution Protocol) cache timeout. The
arp timeout defines the time period for which an ARP entry remains in
the cache. When a new timeout value is assigned, it only affects the new
ARP entries. All older entries retain their old timeout values.
681
CLEAR IP ARP
CHAPTER 22 IP
<seconds Enter a value to configure the ARP cache timeout value. This value
(30-86400)> ranges from 30 to 86400 seconds with a default of 7200. The timeout
values can be assigned to dynamic ARP entries only.
Mode
Global Configuration Mode
Prerequisites
Interface must be a router port
Examples
iS5Comm(config)# arp timeout 35
iS5Comm(config)# arp 12.0.0.5 00:11:22:33:44:55 Vlan 1
clear ip arp
clear ip arp
Mode
Global Configuration Mode
Examples
iS5Comm(config)# clear ip arp
22.3. ip aggregate-route
To set the maximum number of aggregate routes, use the command ip aggregate-route in Global Config-
uration Mode. The no form of this command sets the maximum number of aggregate routes to its default
682
IP ARP MAX-RETRIES
CHAPTER 22 IP
value. Aggregate Route-based IP switching is achieved by creating a virtual circuit along the network by
selecting the forwarding paths used by routers that use OSPF (Open Shortest Path First Protocol). The
data is sent through these virtual circuit to the destination. The routing process is skipped along this
circuit. The data is tagged with a label that is read by the switches and forwarded to the destination.
ip aggregate-route
ip aggregate-route <value(5-4095)>
no ip aggregate-route
no ip aggregate-route
Parameters
<value Integer Enter a value for the maximum number of aggregate routes. This value
(5-4095)> ranges from 5 to 4095.
Mode
Global Configuration Mode
Default
10
Examples
iS5Comm(config)# ip aggregate-route 500
683
IP DEFAULT-DISTANCE
CHAPTER 22 IP
ip arp max-retries
ip arp max-retries <value (2-10)>
no ip arp max-retries
no ip arp max-retries
Parameters
Mode
Global Configuration Mode
Default
3
Examples
iS5Comm(config)# ip arp max-retries 2
22.5. ip default-distance
To configure the default administrative distance for static IPv4 routes, use the command ip
default-distance in Global Configuration Mode.
ip default-distance
ip default-distance <distance (1-255)>
684
IP DEFAULT-TTL
CHAPTER 22 IP
Parameters
<distance Integer Enter a value to configure the administrative distance for the
(1-255)> specified next hop address or the interface. This value ranges from 1
to 255.
Mode
Global Configuration Mode
Default
1
Examples
iS5Comm(config)# ip default-distance 10
22.6. ip default-ttl
To set the Time-To-Live ( TTL) value, use the command ip default-ttl in Global Configuration Mode. The
no form of this command sets the TTL to the default value.
ip default-ttl
ip default-ttl <value (1-255)>
no ip default-ttl
no ip default-ttl
685
IP DIRECTED-BROADCAST
CHAPTER 22 IP
Parameters
<value Integer Enter a value for the Time-To-Live (TTL) value. TTL is the time set for a
(1-255)> unit of data (a packet) to remain in the network or computer before it
could be discarded. This value ranges from 1 to 255 seconds.
Mode
Global Configuration Mode
Default
64
Examples
iS5Comm(config)# ip default-ttl 1
22.7. ip directed-broadcast
To enable forwarding of directed broadcasts, use the command ip directed-broadcast in Interface
Configuration Mode. The no form of this command disables the forwarding of directed broadcasts. The
IP directed broadcast is an IP packet whose destination is a valid IP subnet address, but with a source
from a node outside the destination subnet. The routers from outside the subnet forward the IP directed
broadcast like any other IP packet. When the directed packet reaches a router in the destination subnet,
the packet is exploded as a broadcast in the subnet. The header information on the broadcast packet is
rewritten for the broadcast address in the subnet. The packet is sent as link-layer broadcast.
ip directed-broadcast
ip directed-broadcast
no ip directed-broadcast
no ip directed-broadcast
Mode
Interface Configuration Mode
686
IP ECHO-REPLY
CHAPTER 22 IP
Default
Disabled
Examples
iS5Comm(config)# int vlan 1
iS5Comm(config-if)# ip directed-broadcast
22.8. ip echo-reply
To enable sending ICMP Echo Reply messages, use the command ip echo-reply in Global Configuration
Mode. The no form of this command disables sending ICMP Echo Reply messages. The “ip echo reply” is
a message sent by a device in response to a request sent by another device. This message is used to check
if a device is able to communicate (send and receive data) with the destination device.
ip echo-reply
ip echo-reply
no ip echo-reply
no ip echo-reply
Mode
Global Configuration Mode
Default
Sending of ICMP Echo Reply messages is enabled.
Examples
iS5Comm(config)# ip echo-reply
687
IP MASK-REPLY
CHAPTER 22 IP
22.9. ip mask-reply
To enable sending ICMP Mask Reply messages, use the command ip mask-reply in Global Configuration
Mode. The no form of this command disables sending v Mask Reply messages. The IP mask reply is an
ICMP message sent with the subnet mask of the network by the router to the host. This reply is in corre-
spondence to a request sent by the host seeking the subnet mask of the network.
ip mask-reply
ip mask-reply
no ip mask-reply
no ip mask-reply
Mode
Global Configuration Mode
Default
Sending of ICMP Mask Reply messages is enabled.
Examples
iS5Comm(config)# ip mask-reply
22.10. ip path
To initiate path MTU (Maximum Transmission Unit) discovery and configure the MTU for usage in path
PMTU (PMTU) discovery, use the command ip path in Global Configuration Mode. The no form of this
command sets MTU for usage in PMTU Discovery and resets PMTU discovery to its default value.
ip path
ip path mtu {discover | <dest ip> <tos(0-255)> <mtu(68-65535)>}
688
IP PATH
CHAPTER 22 IP
no ip path
no ip path mtu {discover | <dest ip> <tos(0-255)>}
Parameters
Mode
Global Configuration Mode
Default
Path MTU discovery is disabled.
Prerequisites
The command ip path mtu <dest ip> <tos(0-255)> <mtu(68-65535)> is executed only if,
• PMTU discovery is enabled, or the following command has been executed first:
iS5Comm(config)# ip path mtu discover
Examples
iS5Comm(config)# ip path mtu discover
iS5Comm(config)# ip path mtu 10.0.0.1 0 1800
689
IP PROXY-ARP
CHAPTER 22 IP
22.11. ip proxy-arp
To enable proxy ARP for the interface, use the command ip proxy-arp in Interface Configuration Mode.
The no form of this command disables proxy ARP for the interface.
ip proxy-arp
ip proxy-arp
no ip proxy-arp
no ip proxy-arp
Mode
Interface Configuration Mode
Default
Proxy ARP is disabled
Examples
iS5Comm(config)# int vlan 2
iS5Comm(config-if)# ip proxy-arp
22.12. ip proxyarp-subnetoption
To enable proxy ARP subnet check, use the command ip proxyarp-subnetoption in Global Configuration
Mode. When subnet check is enabled, iSS acts as ARP proxy for target address in different subnet. The
no form of this command disables proxy ARP subnet check. iSS acts as ARP proxy for target address in
same or different subnet that is used in IP-DSLAM (Digital Subscriber Line Access Multiplexer) case, when
subnet check is disabled.
ip proxyarp-subnetoption
ip proxyarp-subnetoption
690
IP RARP CLIENT
CHAPTER 22 IP
no ip proxyarp-subnetoption
no ip proxyarp-subnetoption
Mode
Global Configuration Mode
Default
Proxy ARP subnet check is enabled
Examples
iS5Comm(config)# ip proxyarp-subnetoption
ip rarp client
ip rarp client
no ip rarp client
no ip rarp client
Mode
Global Configuration Mode
Default
Enabled
691
IP REDIRECTS
CHAPTER 22 IP
Prerequisites
The RARP server must be disabled when the RARP client is enabled.
Examples
iS5Comm(config)# ip rarp client
22.14. ip redirects
To enable sending Internet Control Message Protocol ( ICMP Redirect) messages, use the command ip
redirects in Global Configuration Mode. The no form of this command disables sending ICMP Redirect
messages. The Redirect Message is an ICMP message which notifies a host to update its routing informa-
tion to send packets on an alternate route when a packet enters an IP interface and exits the same inter-
face. The redirect message is sent to inform the host of the presence of alternative route.
ip redirects
ip redirects
no ip redirects
no ip redirects
Mode
Global Configuration Mode
Default
Sending of ICMP Redirect messages is enabled.
Examples
iS5Comm(config)# ip redirects
22.15. ip unreachables
To enable the router to send an ICMP unreachable message to the source if the router receives a packet
that has an unrecognized protocol or no route to the destination address, use the command ip unreach-
692
IPV4 ENABLE
CHAPTER 22 IP
ables in Global Configuration Mode. The no form of this command disables sending ICMP unreachable
messages. ICMP provides a mechanism that enables a router or destination host to report an error in
data traffic processing to the original source of the packet. This informs the source that the packet is
dropped.
ip unreachables
ip unreachables
no ip unreachables
no ip unreachables
Mode
Global Configuration Mode
Default
Sending of ICMP unreachable messages is enabled.
Examples
iS5Comm(config)# ip unreachables
ipv4 enable
ipv4 enable
no ipv4 enable
no ipv4 enable
693
MAXIMUM-PATHS
CHAPTER 22 IP
Mode
Interface (VLAN) Configuration Mode
Default
enable
Examples
iS5Comm(config-if)# ipv4 enable
22.17. maximum-paths
To set the maximum number of paths that can be connected to a host, use the command
maximum-paths in Global Configuration Mode. The no form of this command sets the maximum number
of paths to its default value. The command provides multiple forwarding paths for data traffic and
enables load balancing. It improves the overall network fault tolerance, as a failure in one instance does
not affect the other instances.
maximum-paths
maximum-paths <value (1-16)>
no maximum-paths
no maximum-paths
Parameters
Mode
Global Configuration Mode
Default
Maximum number of multi paths is set as 2.
694
PING
CHAPTER 22 IP
Examples
iS5Comm(config)# maximum-paths 15
22.18. ping
To send echo messages, use the command ping in Privileged EXEC Mode. The Packet Internet Groper (
PING) module is built based on the ICMP echo request and ICMP echo response messages. The network
administrator uses ping on a remote device to verify its presence. PING involves sending ICMP echo
messages repeatedly and measuring the time between transmission and reception of message. The
output displays the time taken for each packet to be transmitted, number of packets transmitted,
number of packets received, and packet loss percentage.
ping
ping <IpAddress> cybsec
[ip] {<IpAddress> | <dns_host_name>}
[data <data (0-65535)>]
[df-bit]
[{repeat | count} <packet_count (1-10)>]
[size <packet_size (36-2080)>]
[timeout <time_out (1-100)>]
[validate]
695
PING
CHAPTER 22 IP
Parameters
Mode
Privileged EXEC Mode
Default
• size—64
696
SHOW IP DEFAULT-DISTANCE
CHAPTER 22 IP
• count—3
• timeout—1
Examples
iS5Comm(config)# ping 192.168.10.10 validate
Reply Received From :192.168.10.10, TimeTaken : 3 msecs
Reply Received From :192.168.10.10, TimeTaken : 3 msecs
Reply Received From :192.168.10.10, TimeTaken : 5 msecs
--- 192.168.10.10 Ping Statistics ---
3 Packets Transmitted, 3 Packets Received, 0% Packets Loss
show ip default-distance
show ip default-distance
Mode
Privileged EXEC Mode
Examples
iS5Comm# show ip default-distance
IP Default Administrative distance: 10
697
TRAFFIC-SHARE
CHAPTER 22 IP
show ip proxy-arp
show ip proxy-arp
Mode
Privileged EXEC Mode
Examples
iS5Comm# show ip proxy-arp
PROXY ARP Status
----------------
vlan1 : Disabled
---------------------
22.21. traffic-share
To enable enables traffic sharing (load sharing of IP packets), use the command traffic-share in Global
Configuration Mode. The no form of this command disables traffic sharing. Traffic sharing is the process
by which the protocols select the route for traffic flow with regard to path cost calculation and load distri-
bution. EIGRP (Enhanced Interior Gateway Routing Protocol) provides intelligent traffic sharing. Traffic
sharing is controlled by selecting the mode of distribution. Traffic-share balanced distributes the traffic
proportionately to the ratio of the metrics of different routes. The traffic-share min distributes the traffic
in the route which has minimal cost path even if different paths are available.
traffic-share
traffic-share
no traffic-share
no traffic-share
Mode
Global Configuration Mode
Default
Load sharing is disabled
698
DEBUG IP ARP
CHAPTER 22 IP
Examples
iS5Comm(config)# traffic-share
debug ip arp
debug ip arp {all | init | data | control | dump | os | mgmt | failure |
buffer}
no debug ip arp
no debug ip arp {all | init | data | control | dump | os | mgmt | failure |
buffer}
699
IP ROUTE
CHAPTER 22 IP
Parameters
Mode
Privileged EXEC Mode
Default
Tracing is disabled.
Examples
iS5Comm# debug ip arp all
22.23. ip route
To add a static route, use the ip route command in Global Configuration Mode. The route defines the IP
address or interface through which the destination can be reached. The no form of this command deletes
a static route. If the static route is configured without any metric value, the route will be configured with
metric value 1.
700
IP ROUTE
CHAPTER 22 IP
ip route
ip route <ucast_addr> <ip_mask> <next-hop> [<distance_value (1-255)>]
[cybsec] [private]
<ucast_addr> <ip_mask> {<next-hop> | vlan <vlan-id/vfi-id> [switch
<switch-name>] [<next-hop>] | {Gigabitethernet <interface-id> |
Extreme-ethernet <interface-id> [<next-hop>] | Linuxvlan <interface-name> |
Cpu0 | tunnel <tunnel-id (0-128)> | <IP-interface-type> <IP-inter-
face-number> | ppp <1-10>} [<distance_value (1-255)>] [private] [permanent]
[name <nexthop-name>]
no ip route
no ip route <ucast_addr> <ip_mask> <next-hop> [<distance_value (1-255)>]
[cybsec] [private]
<ucast_addr> <ip_mask> {<next-hop> | vlan <vlan-id/vfi-id> [switch
<switch-name>] [<next-hop>] | {Gigabitethernet <interface-id> |
Extreme-ethernet <interface-id> [<next-hop>] | Linuxvlan <interface-name> |
Cpu0 | tunnel <tunnel-id (0-128)> | <IP-interface-type> <IP-inter-
face-number> | ppp <1-10>} [<distance_value (1-255)>] [private] [permanent]
[name <nexthop-name>]
701
IP ROUTE
CHAPTER 22 IP
Parameters
702
IP ROUTE
CHAPTER 22 IP
Mode
Global Configuration Mode
703
IP ROUTING
CHAPTER 22 IP
Prerequisites
Interface must be a router port.
Examples
iS5Comm (config)# ip route 30.0.0.2 255.255.255.255 vlan 1
iS5Comm (config)# ip route 30.0.0.2 255.255.255.255 gi 0/2 12.2
22.24. ip routing
To enable IP routing, use the command ip routing in Global Configuration Mode. The no form of this
command disables IP routing. IP routing is the path defined by set of protocols for the data to follow
across multiple networks from source to its destination. When an IP packet is to be forwarded, the router
uses its forwarding table to determine the next hop address. The header in the IP packet has the next
hop information.
ip routing
ip routing
no ip routing
no ip routing
Mode
Global Configuration Mode
Default
IP routing is enabled
Examples
iS5Comm(config)# ip routing
704
SHOW IP ARP
CHAPTER 22 IP
show ip arp
show ip arp [{vlan <vlan-id/vfi-id> [switch <switch-name>] | {Gigabiteth-
ernet <interface-id> | Extreme-ethernet <interface-id> | <ipiftype> <ifnum>
| <ip-address> | <mac-address> | summary | information | statistics}]
705
SHOW IP ARP
CHAPTER 22 IP
Parameters
706
SHOW IP INFORMATION
CHAPTER 22 IP
Mode
Privileged EXEC Mode
Examples
iS5Comm # show ip arp
Address Hardware Address Type Interface Mapping
------- ---------------- ---- --------- ----
192.168.10.10 54:e1:ad:07:0d:87 ARPA vlan1 Dynamic
show ip information
show ip information
Mode
Privileged EXEC Mode
Examples
iS5Comm# show ip information
Global IP Configuration:
------------------------
IP routing is enabled
Default TTL is 64
ICMP redirects are always sent
ICMP unreachables are always sent
ICMP echo replies are always sent
ICMP mask replies are always sent
Number of aggregate routes is 50
Number of multi-paths is 2
Load sharing is disabled
707
SHOW IP PMTU
CHAPTER 22 IP
show ip pmtu
show ip pmtu
Mode
Privileged EXEC Mode
Examples
iS5Comm# show ip pmtu
Ip Path MTU Table
-----------------
10.0.0.1 0 1800
708
SHOW IP RARP
CHAPTER 22 IP
show ip proxy-arp
show ip proxy-arp
Mode
Privileged EXEC Mode
Examples
iS5Comm# show ip proxy-arp
PROXY ARP Status
----------------
vlan1 : Disabled
---------------------
show ip rarp
show ip rarp
Mode
Privileged EXEC Mode
Examples
iS5Comm# show ip rarp
RARP Configurations:
--------------------
Maximum number of RARP request retransmission retries is 4
RARP request retransmission timeout is 100 seconds
RARP Statistics:
709
SHOW IP ROUTE
CHAPTER 22 IP
---------------
0 responses discarded
show ip route
show ip route
[{<ip-address> [<mask>] | bgp | connected | ospf [cybsec] | rip | static |
summary | details | isis | failed | cybsec}]
hardware
710
SHOW IP ROUTE
CHAPTER 22 IP
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm # show ip route
Codes: C - connected, S - static, R - rip, B - bgp, O - ospf, I - isis,
E - ECMP
711
SHOW IP TRAFFIC
CHAPTER 22 IP
---------
C 192.168.10.0/24 is directly connected, vlan1
iS5Comm# show ip route
Cybsec OSPF routes
-------------------
Codes: O - OSPF, > - selected route, * - FIB route
show ip traffic
show ip traffic
[interface {vlan <vlan-id/vfi-id> [switch <switch-name>] | tunnel
<tunnel-id (0-128)> | {Gigabitethernet <interface-id> | Extreme-ethernet
<interface-id> | Linuxvlan <interface-name> | <IP-interface-type> <IP-inter-
face-number>}] [hc]
712
SHOW IP TRAFFIC
CHAPTER 22 IP
Parameters
713
SHOW IP TRAFFIC
CHAPTER 22 IP
Mode
Privileged EXEC Mode
Examples
iS5Comm # show ip traffic
IP Statistics
--------------------
Rcvd: 10811 total, 0 header error discards
0 bad ip address discards, 0 unsupported protocol discards
Frags: 0 reassembled, 30 timeouts, 0 needs reassembly 0 fragmented, 0
couldn't fragment
Bcast: Sent: 0 forwarded, 14954 generated requests
Drop: 0 InDiscards 10811 InDelivers 202 InMcastPkts
0 InTruncated 850384 InOctets 0 InNoRoutes
0 ReasmFails 8288 InMcast Octets 0 InBcastPkts
0 OutDiscards 0 OutMcastPkts 0 OutFrgCreates
0 OutForwDgrms 14923 OutTrnsmits 0 OutFrgRqds
3839361 OutOctets 0 OutMcstOctets 0 OutBcstPkts
0 DiscntTime 1000 RefrshRate
ICMP Statistics:
----------------
Rcvd: 0 total, 0 InErrors, 0 unreachable, 0 redirects
0 time exceeded, 0 param problems, 0 quench
0 echo, 0 echo reply, 0 mask requests, 0 mask replies,
0 timestamp , 0 time stamp reply,
Sent: 0 total, 0 OutErrors, 0 unreachable, 0 redirects
0 time exceeded, 0 param problems, 0 quench
0 echo, 0 echo reply, 0 mask requests, 0 mask replies,
0 timestamp , 0 time stamp reply
iS5Comm# show ip traffic hc
IP High Count Statistics
--------------------
34931 InRcvs 2129183 InOctets 0 InFwdDgrms
714
TRACEROUTE
CHAPTER 22 IP
22.32. traceroute
To trace a route to the destination IP, use the traceroute command in Privileged EXEC Mode.
traceroute
traceroute <ip-address> [min-ttl <value (1-99)>] [max-ttl <value (1-99)>]
Parameters
Mode
Privileged EXEC Mode
Default
• min-ttl - 1
• max-ttl - 15
715
TRACEROUTE
CHAPTER 22 IP
Prerequisites
The maximum value of the TTL field should be always greater than the minimum value of the TTL field.
Examples
iS5Comm# traceroute ip 12.0.0.100 min-ttl 1 max-ttl 2
Tracing Route to 12.0.0.100 with 2 hops max and 1 byte packets
1 0.0.0.0 * * *
2 0.0.0.0
iS5Comm# traceroute ipv6 ffff::dddd min-ttl 1 max-ttl 2
Tracing Route to ffff::dddd with 2 hops max and 1 byte packets
1 :: * * *
2 :: * * *
716
ABR-TYPE
CHAPTER 23 OSPF
OSPF
23. OSPF
OSPF
(Open Shortest Path First) protocol is an Interior Gateway Protocol used to distribute routing information
within a single autonomous system. Routers use link-state algorithms to send routing information to all
nodes in an inter-network by calculating the shortest path to each node based on topography of the
Internet constructed by each node. Each router sends that portion of the routing table (keeps track of
routes to particular network destinations), which describes the state of its own links, and it also sends
the complete routing structure (topography).
A router attempting a graceful restart originates link-local Opaque- LSAs, herein called Grace- LSAs,
announcing its intention to perform a graceful restart within a specified amount of time or "grace
period". During the grace period, its neighbors continue to announce the restarting router in their LSAs
as if it were fully adjacent (i.e., OSPF neighbor state Full), but only if the network topology remains static
(i.e., the contents of the LSAs in the link-state database having LS types 1-5,7 remain unchanged and peri-
odic refreshes are allowed). There are two roles being played by OSPF routers during graceful restart.
First there is the router that is being restarted. Then there are the router's neighbors, which must coop-
erate in order for the restart to be graceful. During graceful restart, we say that the neighbors are running
in "helper mode". For more details, refer to RFC 3623.
The advantage of shortest path first algorithms is that they result in smaller more frequent updates
everywhere. They converge quickly, thus preventing such problems as routing loops and count-to-infinity
(when routers continuously increment the hop count to a particular network). This makes for a stable
network.
Before configuring OSPF, Route Redistribution (RRD) must be enabled. In addition, all OSPF interface
related configurations, can be done only when the global OSPF is enabled.
23.1. abr-type
To set alternative ABR (Area Border Router) types, use the command abr-type in OSPF Router Configu-
ration Mode. The no form of this command resets the configured alternative ABR type.
717
AREA
CHAPTER 23 OSPF
abr-type
abr-type {cisco | ibm | standard}
no abr-type
no abr-type
Parameters
Mode
OSPF Router Configuration Mode
Default
Standard
Prerequisites
• RFC 2328 – OSPF Version 2
• RFC-3509 -- Alternative Implementations of OSPF Area Border Routers.
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# abr-type standard
23.2. area
To area related configuration of the OSPF router, use the command area in OSPF Router Configuration
Mode. The no form of this command deletes the area related configuration or removes OSPF virtual links.
718
AREA
CHAPTER 23 OSPF
area
area {<AreaId> range <Network> <Mask> {summary | Type7} [{advertise |
not-advertise}] [tag <tag-value>]}
| <area-id>
{ default-cost <cost>[tos <value(0-30)>]
| nssa [{no-summary | default-information-originate [metric <value
(0-16777215)>] [metric-type <Type(1-3)>] [tos <tos value (0-30)>] [no-redis-
tribution]}]
| stability-interval <Interval-Value (0 - 0x7fffffff)>
| stub [no-summary]
| translation-role {always | candidate}
| virtual-link <router-id>
{[authentication {simple | message-digest | sha-1 | sha-224 | sha-256 |
sha384 | sha-512 |null}]
[authentication-key <key (8)>
[message-digest-key <Key-id (0-255)> {md5 | sha-1 | sha-224 | sha-256 |
sha-384 | sha-512} <key(16)>}]
[dead-interval <value>]
[hello-interval <value (1-65535)>]
[key <Key-ID (0-255)> {start-accept <DD-MON-YEAR,HH:MM> | start-generate
<DD-MON-YEAR,HH:MM> | stop-accept <DD-MON-YEAR,HH:MM> | stop-generate
<DD-MON-YEAR,HH:MM>}
[retransmit-interval <value (1-3600)>]
[transmit-delay <value (1-3600)>]}
}
no area
no area <AreaId> range <Network> <Mask> {summary | Type7}
<area-id>
{ default-cost <cost>[tos <value(0-30)>]
| nssa [{no-summary | default-information-originate [metric <value
(0-16777215)>] [metric-type <Type(1-3)>] [[no-summary]}]
| stability-interval
| stub [no-summary]
| translation-role | {stub | nssa}]
| virtual-link <router-id>
719
AREA
CHAPTER 23 OSPF
{[authentication]
[authentication-key | message-digest-key <Key-id (0-255)>] [dead-interval]
[hello-interval] [retransmit-interval [transmit-delay }
NOTE: The no area
<area-id> [{stub | nssa}] command removes an area or converts stub/nssa to normal
area.The backbone area cannot be set as Stub or NSSA.
720
AREA
CHAPTER 23 OSPF
Parameters
721
AREA
CHAPTER 23 OSPF
default-cost Enter to specify a cost for the default summary route sent into a
stub or NSSA. This command is used only on an Area Border Router
(ABR) attached to a stub or NSSA. This command provides the
metric for the summary default route generated by the ABR into
the stub area. A default cost can be defined only for a valid area.
<cost> Integer Enter a value for cost of the default summary route used for a stub
or NSSA. This value ranges from 0 to 16777215. The default is 1.
tos Enter to configure the Type of Service of the route being
configured. It can be configured only if the code is compiled with
TOS Support.
<tos Integer Enter a value for Type of Service of the route being configured. This
value(0-30)> value ranges from 0 to 30. The default value for TOS is 0.
nssa Enter to configure a particular area as not-so-stubby area (NSSA).
no-summary Enter to allow an area to be a not-so-stubby area but not have
summary routes injected into it.
default-informa Enter to configure the default route into OSPF used to generate a
tion-originate Type 7 default into the NSSA area.
metric Enter to configure the Metric value applied to the route before it is
advertised into the OSPF domain.
<value Integer Enter a value for the Metric value applied to the route before it is
(0-16777215)> advertised into the OSPF domain. This value ranges from 0 to
16777215. The default is 10.
metric-type Enter to configure the Metric Type applied to the route before it is
advertised into the OSPF domain.
<Type(1-3)> Integer Enter a value for Metric Type applied to the route before it is
advertised into the OSPF domain. This value ranges from 1 to 3.The
default is 1
tos Enter to configure the Type of Service of the route being
configured. It can be configured only if the code is compiled with
TOS Support
<tos Integer Enter a value for Type of Service of the route being configured. This
value(0-30)> value ranges from 0 to 30. The default value for TOS is 0.
no-redistributi Enter to disable redistribution of routes from the given protocol
on into OSPF.
722
AREA
CHAPTER 23 OSPF
stability-inter Enter to configure the stability interval for NSSA where the
val Information describing the configured parameters and cumulative
statistics of one of the router's attached areas.
NOTE: This command executes only if NSSA is configured.
<Interval-Value Integer Enter a value for are no longer required, that it must continue to
(0 - perform its translation duties. The interval value ranges between
0x7fffffff)> 0-0x7fffffff in seconds. The OSPF Sequence Number is a 32 bit
signed integer. It starts with the value '80000001'h, -- or
-'7FFFFFFF', and increments until '7FFFFFFF'h. Thus, a typical
sequence number will be very negative. The default value is 40
seconds.
stub Enter to configure an area as a stub area and other parameters
related to that area. This command is configured on all routers and
access servers in the stub area.
no-summary Enter to prevent an Area Border Router (ABR) from sending
summary link advertisements into the stub area by neither
originating nor propagating summary LSA into the stub area.
translation-rol Enter to configure the translation role for the NSSA or the NSSA
e Border router's ability to perform NSSA Translation of Type-7 to
Type-5 LSAs. Type-5 LSAs originate from AS (Autonomous system)
boundary routers and flood through and out the AS. Each
AS-external-LSA describes a route to a destination in another
Autonomous System. Default routes for the AS can also be
described by AS-external-LSAs.
always Enter to set a translator role to where the Type-7 LSAs are always
translated into Type-5 LSAs.
candidate Enter to set translator role where an NSSA border router
participates in the translator election process. This is default.
virtual-link Enter to define an OSPF virtual link and its related parameter. In
OSPF, all areas must be connected to a backbone area. If the
connection to the backbone is lost, it can be repaired by
establishing a virtual link. Hello-interval and dead-interval values
must be the same for all routers and access servers on a specific
network.
NOTE: This command executes only if area is defined using the
network command.
<router-id> Enter a value for the router ID of the virtual neighbor.
authentication Enter to configure the authentication type.
723
AREA
CHAPTER 23 OSPF
724
AREA
CHAPTER 23 OSPF
sha-256 Enter to set the authentication type as Secure Hash Algorithm 256
(SHA256) authentication. SHA256 generates Authentication digest
of length 32 bytes.
sha-384 Enter to set the authentication type as Secure Hash Algorithm 384
(SHA384) authentication. SHA384 generates Authentication digest
of length 48 bytes
sha-512 Enter to set the authentication type as Secure Hash Algorithm 512
(SHA512) authentication. SHA512 generates Authentication digest
of length 64 bytes.
<key(16)> Enter a value to configure the cryptographic key value which is
used to create the message digest appended to the OSPF packet.
All neighboring routers on the same network must have the same
key identifier and key to route OSPF traffic. This is a string with
maximum 16 characters.
dead-interval Enter to configure the interval at which hello packets must not be
seen before its neighbors declare the router down. As with the
hello interval, this value must be the same for all routers and
access servers attached to a common network.
<value> Integer Enter a value for the interval at which hello packets must not be
seen before its neighbors declare the router down. The default is
40 seconds.
hello-interval Enter to configure the interval at which hello packets must not be
seen before its neighbors declare the router down. As with the
hello interval, this value must be the same for all routers and
access servers attached to a common network.
<value Integer Enter a value for the interval at which hello packets must not be
(1-65535)> seen before its neighbors declare the router down. This value
ranges from 1 to 65535 in seconds with a default of 0 seconds.
key Enter to configure the time the router starts accepting packets that
is created with the configured key id.
<Key-ID Enter a value for the secret key used to create the message digest
(0-255)> appended to the OSPF packet. This value ranges from 0 to 255.
725
AREA
CHAPTER 23 OSPF
start-accept Enter to configure the time when the router will start accepting
packets that have been created with the configured key-id.
NOTE: This command executes only if,
• Area is defined using the network command
• Authentication key for Message Digest Authentication is
configured for the specified area
<DD-MON-YEAR,HH Enter a value for the time when the router will start accepting
:MM> packets that have been created with the configured key-id. This
value is the sum of configured time and the system time at which
the start-accept value is configured and is configured in 24 hours
format.
NOTE: For example, Tuesday May 26, 2013 at 1:30 PM should be
configured as, 26-May-2013,13:30
start-generate Enter to configure the time when the router will start generating
OSPF packets with the configured key id.
NOTE: This command executes only if,
• Area is defined using the network command
• Authentication key for Message Digest Authentication is
configured for the specified area
<DD-MON-YEAR,HH Enter a value for the time when the router will start generating
:MM> OSPF packets with the configured key id. This value is the sum of
the configured time and the system time at which the
start-generate value is configured. Start Generate Time value is
configured in 24 hours format. Default value is set as current
system time.
NOTE: For example, Tuesday May 26, 2013 at 1:30 PM should be
configured as, 26-May-2013,13:30
stop-generate Enter to configure the time when the router will stop generating
OSPF packets with the configured key id.
NOTE: This command executes only if,
• Area is defined using the network command
• Authentication key for Message Digest Authentication is
configured for the specified area
726
AREA
CHAPTER 23 OSPF
<DD-MON-YEAR,HH Enter a value for the time when the router will stop generating
:MM> OSPF packets with the configured key id. Stop Generate value is
configured in 24 hours format. Default value is set to the current
system time.
NOTE: For example, Tuesday May 26, 2013 at 1:30 PM should be
configured as, 26-May-2013,13:30
stop-accept Enter to configure the time when the router will stop accepting
OSPF packets with specified key id.
NOTE: This command executes only if,
• Area is defined using the network command
• Authentication key for Message Digest Authentication is
configured for the specified area
<DD-MON-YEAR,HH Enter a value for the time when the router will stop accepting OSPF
:MM> packets with specified key id. Stop accept value is configured in 24
hours format.
NOTE: For example, Tuesday May 26, 2013 at 1:30 PM should be
configured as, 26-May-2013,13:30
retransmit-inte Enter to configure the time between link-state advertisement (LSA)
rval retransmissions for adjacencies belonging to the OSPF virtual link
interface.
<value Enter a value for the time between link-state advertisement (LSA)
(1-3600)> retransmissions for adjacencies belonging to the OSPF virtual link
interface. This value ranges from 1 to 3600 in seconds with a
default of 5.
transmit-delay Enter to configure the time in which the router will stop using this
key for packets generation. Estimated time required to send a
link-state update packet on the interface. Integer value that must
be greater than zero. LSAs in the update packet have their age
incremented by this amount before transmission
<value Enter a value for the time in which the router will stop using this
(1-3600)> key for packets generation. This value ranges from 1 to 3600 in
seconds with a default of 1 second.
Mode
OSPF Router Configuration Mode
727
ASBR ROUTER
CHAPTER 23 OSPF
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# area 10.0.0.1 range 10.0.0.0 255.0.0.0 summary advertise tag 10
iS5Comm(config-router)# area 10.0.0.1 default-cost 5
iS5Comm(config-router)# area 10.0.0.1 nssa
iS5Comm(config-router)# area 10.0.0.1 stub
iS5Comm(config-router)# area 10.0.0.1 stability-interval 10000
iS5Comm(config-router)# area 10.0.0.1 translation-role always
iS5Comm(config-router)# area 1.1 virtual-link 0.0.0.1 authentication simple hello-interval 65
retransmit-interval 654 dead-interval 200 message-digest-key 20 sha-512 key11
iS5Comm(config-router)# area 1.1 virtual-link 0.0.0.1 key 20 start-accept 23-Jun-2014,19:18
iS5Comm(config-router)# area 1.1 virtual-link 0.0.0.1 key 20 start-generate 23-Jun-2014,19:18
iS5Comm(config-router)# area 1.1 virtual-link 0.0.0.1 key 20 stop-generate 26-Jun-2014,19:18
iS5Comm(config-router)# area 1.1 virtual-link 0.0.0.1 key 20 stop-accept 26-Jun-2014,19:18
ASBR Router
ASBR Router
no ASBR Router
no ASBR Router
Mode
OSPF Router Configuration Mode
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# ASBR Router
728
BFD
CHAPTER 23 OSPF
23.4. bfd
To enable Bidirectional Forwarding Detection ( BFD) monitoring on all or specific OSPF interfaces, use the
command bfd in OSPF Router Configuration Mode. The no form of the command disables BFD moni-
toring on all or specific OSPF interfaces. The BFD protocol is a simple hello mechanism that detects fail-
ures in a network. BFD works with a wide variety of network environments and topologies. A pair of
routing devices exchange BFD packets, and hello packets are sent at a specified regular interval.
bfd
bfd {all-interface | <interface-type> <interface-id> | vlan <vlan-id
(1-4094)> [switch <switch-name>]}
no bfd
no bfd {all-interface | <interface-type> <interface-id> | vlan <vlan-id
(1-4094)> [switch <switch-name>]}
729
BFD
CHAPTER 23 OSPF
Parameters
Mode
OSPF Router Configuration Mode
Default
BFD is disabled for all interfaces.
Prerequisites
This command can be configured only if bfd is enabled and OSPF is started on the interface.
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# bfd all-interface
iS5Comm (config-router)# bfd vlan 1 switch default
730
CAPABILITY OPAQUE
CHAPTER 23 OSPF
capability opaque
capability opaque
no capability opaque
no capability opaque
Mode
OSPF Router Configuration Mode
Default
Opaque capability is disabled
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# capability opaque
731
DEBUG IP OSPF
CHAPTER 23 OSPF
compatible rfc1583
compatible rfc1583
no compatible rfc1583
no compatible rfc1583
Mode
OSPF Router Configuration Mode
Default
OSPF is Compatible
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# compatible rfc1583
debug ip ospf
debug ip arp {pkt {hp | ddp | lrq | lsu | lsa} | module {adj_formation | ism
| nsm | config | interface | restarting-router | helper | redundancy}
no debug ip ospf
no debug ip ospf [pkt {hp | ddp | lrq | lsu | lsa] [module {adj_formation |
ism | nsm | config | interface | restarting-router | helper | redundancy]
[all]
732
DEBUG IP OSPF
CHAPTER 23 OSPF
Parameters
pkt Enter to generate debug statements for Packet High Level Dump traces.
hp Enter to generate debug statements for DDP (Datagram Delivery Protocol)
packet traces.
lrq Enter to generate debug statements for Link State Request Packet traces.
lsu Enter to generate debug statements for Link State Update Packet traces.
lsa Enter to generate debug statements for Link State Acknowledge Packet
traces
module Enter to generate debug statements for RTM Module traces.
Enter to generate debug statements for Adjacency formation traces.
adj_formati
on
ism Enter to generate debug statements for Interface State Machine traces.
nsm Enter to generate debug statements for Neighbor State Machine traces.
config Enter to generate debug statements for Configuration traces.
interface Enter to generate debug statements for Interface.
helper Enter to generate debug statements for messages related to router in
Helper Mode.
redundancy Enter to generate debug statements for redundancy messages.
all Enter to generate debug statements for all messages.
Mode
Privileged EXEC Mode
Examples
iS5Comm# debug ip ospf pkt hp
733
DISABLE BFD
CHAPTER 23 OSPF
disable bfd
disable bfd
Mode
OSPF Router Configuration Mode
Default
BFD feature is disabled.
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# disable bfd
23.9. default-information
To enable generation of a default external route into an OSPF routing domain and configure other param-
eters related to that area, use the command default-information in OSPF Router Configuration Mode.
The no form of the command disables generation of a default external route into an OSPF routing
domain.
default-information
default-information originate always [metric <metric-value (0-16777215)>]
[metric-type <type (1-2)>]
734
DEFAULT-INFORMATION
CHAPTER 23 OSPF
no default-information
no default-information originate always [metric <metric-value (0-16777215)>]
[metric-type <type (1-2)>]
Parameters
Mode
OSPF Router Configuration Mode
Default
• metric - 10
• metric-type - 2
735
DISTANCE
CHAPTER 23 OSPF
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# default-information originate always metric 1 metric-type 1
23.10. distance
To update the routes filtered via route-map at IP routing layer, use the command distance in OSPF Router
Configuration Mode. The no form of this command disables the administrative distance (route prefer-
ence).
distance
distance <1-255> [route-map <name(1-20)>]
no distance
no distance
Parameters
Mode
OSPF Router Configuration Mode
Default
0 (Represents directly connected route)
736
DISTRIBUTE-LIST
CHAPTER 23 OSPF
Prerequisites
This command executes only if OSPF router is enabled
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# distance 10 route-map rmap-test
23.11. distribute-list
To enable inbound filtering for routes and define the conditions for distributing the routes from one
routing protocol to another, use the command distribute-list in OSPF Router Configuration Mode. The
no form of the command disables inbound filtering for the routes.
distribute-list
distribute-list route-map <name (1-20)> in
no distribute-list
no distribute-list route-map <name (1-20)> in
Parameters
Mode
OSPF Router Configuration Mode
737
ENABLE BFD
CHAPTER 23 OSPF
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# distribute-list route-map rmap-test in
NOTE: The clear ip ospf command will have to be executed for this to take effect.
enable bfd
enable bfd
Mode
OSPF Router Configuration Mode
Default
BFD feature is disabled.
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# enable bfd
23.13. ip ospf
To OSPF-related configuration, use the command ip ospf in OSPF Router Configuration Mode. The no
form of this command deletes the OSPF-related configuration or sets all configured values to default.
738
IP OSPF
CHAPTER 23 OSPF
ip ospf
ip ospf
{authentication {simple | message-digest | sha-1 | sha-224 | sha-256 |
sha384 | sha-512 | null | simple}
| authentication-key <key (8)>
| bfd [disable]
| cost <cost (1-65535)> [tos <value(0-30)>]
| dead-interval <seconds (1-65535)>
| demand-circuit
| hello-interval <seconds (1 - 65535)>
| key <Key-ID (0-255)> {start-accept <DD-MON-YEAR,HH:MM> | start-generate
<DD-MON-YEAR,HH:MM> | stop-accept <DD-MON-YEAR,HH:MM> | stop-generate
<DD-MON-YEAR,HH:MM>}
| message-digest-key <Key-id (0-255)> {md5 | sha-1 | sha-224 | sha-256 |
sha-384 | sha-512} <key(16)>}
| network {broadcast | non-broadcast | point-to-multipoint |
point-to-point}
| priority <value (0 - 255)>
| retransmit-interval <value (1-3600)>
| transmit-delay <value (1-3600)>}
}
no ip ospf
no ip ospf
{authentication
| authentication-key
| cost [tos <value(0-30)>]
| dead-interval
| demand-circuit
| hello-interval
| message-digest-key <Key-id (0-255)>
| network
| priority
| retransmit-interval
| transmit-delay }
739
IP OSPF
CHAPTER 23 OSPF
740
IP OSPF
CHAPTER 23 OSPF
Parameters
741
IP OSPF
CHAPTER 23 OSPF
742
IP OSPF
CHAPTER 23 OSPF
743
IP OSPF
CHAPTER 23 OSPF
start-generate Enter to configure the time when the router will start generating
OSPF packets with the configured key id.
NOTE: This command executes only if,
• Authentication key for Simple Password Authentication is
removed
• OSPF Message Digest authentication is enabled and authenti-
cation type is specified for the interface
<DD-MON-YEAR,HH Enter a value for the time when the router will start generating
:MM> OSPF packets with the configured key id. This value is the sum of
the configured time and the system time at which the
start-generate value is configured. Start Generate Time value is
configured in 24 hours format. Default value is set as current
system time.
NOTE: For example, Tuesday May 26, 2013 at 1:30 PM should be
configured as, 26-May-2013,13:30
stop-generate Enter to configure the time when the router will stop generating
OSPF packets with the configured key id.
NOTE: This command executes only if,
• Authentication key for Simple Password Authentication is
removed
• OSPF Message Digest authentication is enabled and authenti-
cation type is specified for the interface
<DD-MON-YEAR,HH Enter a value for the time when the router will stop generating
:MM> OSPF packets with the configured key id. Stop Generate value is
configured in 24 hours format. Default value is set to the current
system time.
NOTE: For example, Tuesday May 26, 2013 at 1:30 PM should be
configured as, 26-May-2013,13:30
stop-accept Enter to configure the time when the router will stop accepting
OSPF packets with specified key id.
NOTE: This command executes only if,
• Authentication key for Simple Password Authentication is
removed.
• OSPF Message Digest authentication is enabled and authenti-
cation type is specified for the interface
.
744
IP OSPF
CHAPTER 23 OSPF
<DD-MON-YEAR,HH Enter a value for the time when the router will stop accepting OSPF
:MM> packets with specified key id. Stop accept value is configured in 24
hours format.
NOTE: For example, Tuesday May 26, 2013 at 1:30 PM should be
configured as, 26-May-2013,13:30
message-digest- Enter to enable OSPF MD5 authentication. One key per interface is
key used to generate authentication information when sending packets
and to authenticate incoming packets.
Message Digest authentication is a cryptographic authentication. A
key (password) and key-id are configured on each router. The
router uses an algorithm based on the OSPF packet, the key, and
the key-id to generate a "message digest" that gets appended to
the packet
Usually, one key per interface is used to generate authentication
information when sending packets and to authenticate incoming
packets. The same key identifier on the neighbor router must have
the same key value.
NOTE: The authentication type should be the same as set in the ip
ospf authentication command.
<Key-id Integer Enter to set the simple password authentication mechanism.
(0-255)>
md5 Enter to set the authentication type as message digest
authentication mechanism.
sha-1 Enter to set the authentication type as Secure Hash Algorithm 1
(SHA1) authentication. SHA1 generates Authentication digest of
length 20 bytes.
sha-224 Enter to set the authentication type as Secure Hash Algorithm 224
(SHA224) authentication. SHA224 generates Authentication digest
of length 28 bytes
sha-256 Enter to set the authentication type as Secure Hash Algorithm 256
(SHA256) authentication. SHA256 generates Authentication digest
of length 32 bytes.
sha-384 Enter to set the authentication type as Secure Hash Algorithm 384
(SHA384) authentication. SHA384 generates Authentication digest
of length 48 bytes
sha-512 Enter to set the authentication type as Secure Hash Algorithm 512
(SHA512) authentication. SHA512 generates Authentication digest
of length 64 bytes.
745
IP OSPF
CHAPTER 23 OSPF
<key(16)> Integer Enter a value to configure the cryptographic key value which is
used to create the message digest appended to the OSPF packet.
All neighboring routers on the same network must have the same
key identifier and key to route OSPF traffic. This is a string with
maximum 16 characters.
network Enter to configure the OSPF network type to a type other than the
default for a given media and configures broadcast networks as
NBMA networks. Each pair of routers on a broadcast network is
assumed to be able to communicate directly. An Ethernet is an
example of a broadcast network. A 56Kb serial line is an example of
a point-to-point network.
broadcast Enter to configure the broadcast networks supporting many (more
than two) attached routers, together with the capability to address
a single physical message to all of the attached routers (broadcast).
This is the default option.
non-broadcast Enter to configure the non broadcast networks supporting many
(more than two) routers, but having no broadcast capability Sets
the network type to nonbroadcast multi-access (NBMA).
point-to-multip Enter to set the network type to point-to-multipoint and treats the
oint non-broadcast network as a collection of point-to-point links.
point-to-point Enter to set the network type to point-to-point that joins a single
pair of routers
priority Enter to set the router priority which helps determine the
designated router for this network. When two routers attached to a
network both attempt to become the designated router, the one
with the higher router priority takes precedence. . When two
routers attached to a network attempt to become the designated
router, the one with the higher router priority takes precedence. If
there is a tie, the router with the higher router ID takes
precedence.
<value (0 - Integer Enter a value to specify the priority of the router The number value
255)> ranges from 0 to 255. The default value is 1.
retransmit-inte Enter to configure the time between link-state advertisement (LSA)
rval retransmissions for adjacencies belonging to the OSPF virtual link
interface.
746
IP OSPF
CHAPTER 23 OSPF
<value Integer Enter a value for the time between link-state advertisement (LSA)
(1-3600)> retransmissions for adjacencies belonging to the OSPF virtual link
interface. This value ranges from 1 to 3600 in seconds with a
default of 5. This value is also used while retransmitting database
description and link-state request packets.
transmit-delay Enter to set the estimated time (in seconds) it is required to
transmit a link state update packet on the interface. Link-state
advertisements (LSAs) in the update packet must have their ages
incremented by the amount specified in the seconds argument
before transmission.
<value Integer Enter a value for the time in which the router will stop using this
(1-3600)> key for packets generation. This value ranges from 1 to 3600 in
seconds with a default of 1 second.
Mode
OSPF Router Configuration Mode
Prerequisites
This command executes only if the OSPF routing process is enabled.
Examples
iS5Comm(config)# router ospf
iS5Comm(config-if)# ip ospf authentication message-digest
iS5Comm(config-if)# ip ospf authentication-key asdf123
iS5Comm(config-router)# enable bfd
iS5Comm(config-router)# exit
iS5Comm(config)# int vlan 55
iS5Comm(config-if)# ip ospf bfd disable
iS5Comm(config-if)# ip ospf cost 10
iS5Comm(config-if)# ip ospf dead-interval 1000
iS5Comm(config-if)# ip ospf demand-circuit
iS5Comm(config-if)# ip ospf hello-interval 75
iS5Comm(config-if)# ip ospf key 20 start-accept 13-May-2014,19:18
747
NEIGHBOR
CHAPTER 23 OSPF
23.14. neighbor
To specifies a neighbor router and its priority, use the command neighbor in OSPF Router Configuration
Mode. The no form of the command removes the neighbor and resets the neighbor priority to its default
value. This command configures the Router ID of OSPF routers interconnecting to nonbroadcast
networks.
neighbor
neighbor <neighbor-id>
[priority <priority value (0-255)>]
[poll-interval <poll-interval (1-2147483647)>]
[cost <cost number 0-255)>]
[database-filter all]
no neighbor
no neighbor <neighbor-id> [poll-interval seconds] [priority] [poll-interval
seconds] [cost number] [database-filter all]
748
NEIGHBOR
CHAPTER 23 OSPF
Parameters
Mode
OSPF Router Configuration Mode
Default
priority - 1
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# neighbor 12.0.0.8 priority 25
749
NETWORK
CHAPTER 23 OSPF
23.15. network
To defines the interfaces on which OSPF runs and the area ID for those interfaces, use the command
network in OSPF Router Configuration Mode. The no form of the command OSPF routing for interfaces
defined and to remove the area ID of that interface. When a more specific OSPF network range is
removed, interfaces belonging to that network range will be retained and remain active if and only if a
less specific network range exists. There is no limit to the number of network commands that can be used
on the router. The IP address for the entry should be same as that of the configured interface.
network
network <Network number>
{area <area-id> [unnum {vlan <vlan-id/vfi-id>
| <interface-type> <interface-num>
| <IP-interface-type> <IP-interface-number>}]
| <wildcard-mask> area <area-id>
[unnum vlan <PortNumber>]}
no network
no network <Network number> {area <area-id> [unnum {vlan <vlan-id/vfi-id>
[switch <switch-name>] | <interface-type> <interface-num> | <IP-inter-
face-type> <IP-interface-number>}]
750
NETWORK
CHAPTER 23 OSPF
Parameters
<Network Enter to configure the network type for the interfaces (e.g. of the
number> format is 0.0)
area Enter to configure the area associated with the OSPF address range
and the identifier of the area about which routes are to be
summarized.
<area-id> Enter a value (either a decimal value or as an IP address) to configure
the area associated with the OSPF address range and the identifier of
the area about which routes are to be summarized.
unnum Enter to configure the network type for the specified unnumbered
interface configuration.
vlan Enter to configure network type for the specified VLAN / VFI ID.
Enter a value for the VLAN ID or VFI-ID for which the network type
<vlan-id/vfi-i will be configured. This value ranges from 1 to 65535. The options are
d> as follow:
• <vlan –id> - VLAN ID is a unique value that represents the
specific VLAN. This value ranges from 1 to 4094.
• <vfi-id>. - VFI ID is a VLAN created in the system which contains
Pseudo wires and Attachment Circuits as member ports . This
creates a logical LAN for the VPLS service. This value ranges from
4096 to 65535.
NOTE: The VLAN ID 4095 is reserved and may be used to indicate a
wildcard match for the VID in management operations or Filtering
Database entries.
NOTE: VFI IDs 4096 and 4097 are reserved identifiers used in MPLS PW
NOTE: The theoretical maximum for the maximum number of VFI is
65535 but the actual number of VFI supported is a sizing constant.
Based on this, the maximum number of VFI ID accepted in the
management interface is restricted. For example if 100 VFIs are
supported, the maximum number of VFI supported will be restricted
to maximum number of VLANs + 100. An error message is displayed
for any value beyond this range.
751
NETWORK
CHAPTER 23 OSPF
752
NSF IETF
CHAPTER 23 OSPF
Mode
OSPF Router Configuration Mode
Prerequisites
• This command can be configured only if, router ospf is enabled.
• IP address must be configured for the interface which is to be added as the unnumbered interface
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# network 0.0 area 0.0 unnum gi 0/2
iS5Comm (config-router)# network 1.1.1.1 0.0.0.0 area 0.0.0.0 unnum Vlan 55
iS5Comm(config-router)# network 1.1.1.1 area 0.0.0.0
nsf ietf
nsf ietf {helper {[gracetimelimit <gracelimit period(0-1800)>] [softwareRe-
start] [strict-lsa-checking] [swReloadUpgrade] [switchToRedundant]
[unknown]}
| helper-support {[softwareRestart] [swReloadUpgrade] [switchToRedundant]
[unknown]}
| grace lsa ack required
| grlsa retrans count <grlsacout (0-180)>
| restart-interval <grace period(1-1800)>
| restart-reason {[softwareRestart] [swReloadUpgrade] [switchToRedundant]
[unknown]}
753
NSF IETF
CHAPTER 23 OSPF
| restart-support plannedOnly}
no nsf ietf
no nsf ietf {helper [strict-lsa-checking]
| helper-support {[softwareRestart] [swReloadUpgrade] [switchToRedundant]
[unknown]}
| grace lsa ack required
| restart-interval
| restart-support
754
NSF IETF
CHAPTER 23 OSPF
Parameters
755
NSF IETF
CHAPTER 23 OSPF
756
NSF IETF
CHAPTER 23 OSPF
757
PASSIVE-INTERFACE
CHAPTER 23 OSPF
Mode
OSPF Router Configuration Mode
Default
Unknown
Prerequisites
This command executes only if OSPF router is enabled.
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# nsf ietf helper gracetimelimit 100
iS5Comm(config-router)# nsf ietf helper strict-lsa-checking
iS5Comm(config-router)# nsf ietf helper-support switchToRedundant
iS5Comm(config-router)# nsf ietf grace lsa ack required
iS5Comm(config-router)# nsf ietf grlsa retrans count 100
iS5Comm(config-router)# nsf ietf restart-interval 200
iS5Comm(config-router)# nsf ietf restart-reason softwareRestart
iS5Comm(config-router)# nsf ietf restart-support
23.17. passive-interface
To suppress routing updates on an interface and make the interface passive, use the command
passive-interface in OSPF Router Configuration Mode. The no form of the command enables routing
updates on an interface. OSPF routing information is neither sent nor received through the specified
router interface.
758
PASSIVE-INTERFACE
CHAPTER 23 OSPF
passive-interface
passive-interface {vlan <vlan-id/vfi-id> [switch <switch-name>] | <inter-
face-type> <interface-id> | <IP-interface-type> <IP-interface-number> |
default}
no passive-interface
no passive-interface {vlan <vlan-id/vfi-id> [switch <switch-name>] | <inter-
face-type> <interface-id> | <IP-interface-type> <IP-interface-number> |
default}
759
PASSIVE-INTERFACE
CHAPTER 23 OSPF
Parameters
760
REDIST-CONFIG
CHAPTER 23 OSPF
<IP-interface- Enter to configure the network type for the specified L3 Pseudo wire
type> interface in the system.
<IP Enter a value to configure the network type for the specified L3
interface-num> Pseudo wire interface in the system. Network type for the specified
L3 Pseudo wire interface identifier. This is a unique value that
represents the specific interface. This value ranges from 1 to 65535
for Pseudowire interface.
NOTE: Maximum number of PseudoWire interfaces supported in the
system is 100.
default Enter to configure the passive interface to be default i.e. all OSPF
interfaces created after the execution of this command will be
passive. This is useful in Internet service provider (ISP) and large
enterprise networks where many of the distribution routers have
more than 200 interfaces.
Mode
OSPF Router Configuration Mode
Prerequisites
• This command can be configured only if, router ospf is enabled.
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# passive-interface gigabitethernet 0/2
iS5Comm(config-router)# passive-interface default
23.18. redist-config
To configure the information to be applied to routes learnt from RTM (Route Table Manager), use the
command redist-config in OSPF Router Configuration Mode. The no form of the command deletes the
information applied to routes learnt from RTM.
761
REDIST-CONFIG
CHAPTER 23 OSPF
redist-config
redist-config <Network> <Mask>
[metric <metric-value (0-16777215)>]
[metric-type {asExttype1 | asExttype2}]
[tag <tag-value>]
no redist-config
no redist-config <Network> <Mask>
762
REDIST-CONFIG
CHAPTER 23 OSPF
Parameters
Mode
OSPF Router Configuration Mode
Default
• metric - 10
• metric-type - asExttype2
• tag - manual
763
REDISTRIBUTE
CHAPTER 23 OSPF
Prerequisites
This command executes only if the router is set as ASBR
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# redist-config 10.0.0.0 255.0.0.0 metric-value 100 metric-type asExttype1
23.19. redistribute
To configure the protocol from which the routes have to be redistributed into OSPF and advertise the
routes learned by other protocols, use the command redistribute in OSPF Router Configuration Mode.
The no form of the command disables redistribution of routes from the given protocol.
redistribute
redistribute {static | connected | rip | bgp | isis [{level-1 | level-2 |
level-1-2}] | all}
[route-map <name (1-20)>]
[metric <metric-value (0-16777215)>]
[metric-type <type (1-2)>]
no redistribute
no redistribute {static | connected | rip | bgp | all} [route-map <name
(1-20)>] [metric]
764
REDISTRIBUTE
CHAPTER 23 OSPF
Parameters
765
ROUTE-CALCULATION
CHAPTER 23 OSPF
Mode
OSPF Router Configuration Mode
Default
• metric - 10
• metric-type - 2
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# redistribute static
23.20. route-calculation
To enable OSPF route calculation staggering feature and configure the staggering interval, use the
command route-calculation in OSPF Router Configuration Mode. The no form of this command disables
OSPF route calculation staggering and changes the staggering interval to default.
route-calculation
route-calculation {staggering | staggering-interval <milli-seconds
(1000-2147483647)>}
no route-calculation
no route-calculation staggering
766
ROUTER OSPF
CHAPTER 23 OSPF
Parameters
Mode
OSPF Router Configuration Mode
Default
10000 milliseconds (OSPF route calculation staggering interval is equal to Hello interval)
Prerequisites
This command executes only if OSPF router is enabled.
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# route-calculation staggering-interval 2000
767
ROUTER-ID
CHAPTER 23 OSPF
router
router ospf [cybsec]
no router
no router ospf [cybsec]
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# router ospf cybsec
iS5Comm(config-router)# exit
iS5Comm(config)# no router ospf cybsec
23.22. router-id
To set the router identification for the OSPF process, use the command router-id in OSPF Router Config-
uration Mode. The no form of this command resets the configured router ID and dynamically selects least
interface IP as router ID for OSPF process.
router-id
router-id <router ip address>
no router-id
no router-id <router ip address>
768
SET NSSA ASBR-DEFAULT-ROUTE
CHAPTER 23 OSPF
Parameters
<router ip Enter to set the router ID for the OSPF process. The router ID is set
address> to an IP address of a loopback interface if it is configured. An
arbitrary value for the IP address for each router can be configured;
however, each router ID must be unique. To ensure uniqueness, the
router ID must match one of the router's IP interface addresses.
Mode
OSPF Router Configuration Mode
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# router-id 12.0.0.1
set nssa
set nssa sbr-default-route translator {disable | enable}
769
SHOW IP OSPF
CHAPTER 23 OSPF
Parameters
Mode
OSPF Router Configuration Mode
Default
disable
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# set nssa asbr-default-route translator enable
show ip ospf
show ip ospf
[area-id]
770
SHOW IP OSPF
CHAPTER 23 OSPF
771
SHOW IP OSPF
CHAPTER 23 OSPF
Parameters
area-id Enter to configure the area associated with the OSPF address
range to be displayed. It will be specified as an IP address
database Enter to display OSPF Database summary for the LSA type.
asbr-summary Enter to display information only about the Autonomous System
Boundary Router (ASBR) summary LSAs.
external Enter to display information only about the external LSAs.
network Enter to display information only about the network LSAs.
nssa-external Enter to display information only about the external LSAs.
opaque-area Enter to display information only about the network LSAs.
opaque-as Enter to display information only about the external LSAs.
opaque-as Enter to display information only about the network LSAs.
router Enter to display information only about the router LSAs.
summary Enter to display information only about the summary LSAs.
link-state-id Enter to display the portion of the Internet environment that is
being described by the advertisement. The value entered depends
on the type of the LSA. The value must be entered in the form of
an IP address.
adv-router Enter to display all specified router link-state advertisements
(LSAs). If no IP address is included, the information is about the
local router itself.
<ip-address> Enter to display only information only about this Ip Address.
cybsec Enter to display the OSPF neighborship or database from the
cyber security space, or the route learnt by the OSPF which runs in
the cyber security space.
database-summar Enter to display the total number of each type of LSA for each area
y there are in the database, and the total number of LSA type.
self-originate Enter to display only self-originated LSAs (from the local router).
adv-router Enter to display all specified router link-state advertisements
(LSAs). If no IP address is included, the information is about the
local router itself.
<ip-address> Enter to display only information only about this Ip Address.
772
SHOW IP OSPF
CHAPTER 23 OSPF
border-routers Enter to display the internal OSPF routing table entries to an Area
Border Router and Autonomous System Boundary Router.
interface Enter the general information of OSPF routing processes for the
specified interface.
<vlan-id/vfi-id Enter to specify the range of the specified VLAN ID to be
> displayed. This is a unique value that represents the specific VLAN
created and activated. The range (1-4094) is for VLAN ID and the
range (4096 - 65535) is for VFI. Note that if router ports are used
then correspondingly the last set of vlans will not be available. For
example, if router ports is 24, then max VLAN number will be 4070
only.
switch Enter to configure name of the switch to be displayed.
<switch-name> Enter a name for the switch to be displayed.
Gigabitethernet Enter to select Gigabit Ethernet interface to be displayed. Gigabit
<interface-id> Ethernet interface is a version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports only
full duplex links. Specify the interface ID with a format
<0>/<1-28>—slot number/port number.
Extreme-Etherne Enter to select Extreme Ethernet interface to be displayed.
t Extreme Ethernet interface is a version of LAN standard
<interface-id> architecture that supports data transfer up to 1 Gigabit per
second. Specify the interface ID with a format <0>/<1-28>—slot
number/port number.
<IP-interface-t Enter to display the IP ARP information for the specified L3 Pseudo
ype> wire interface in the system.
<IP-interface-n Enter to display the IP ARP information for the specified L3 Pseudo
umber> wire interface identifier. This is a unique value that represents the
specific interface. This value ranges from 1 to 65535 for
Pseudowire interface.
NOTE: Maximum number of Pseudowire interfaces supported in
the system is 100.
ppp Enter to display the PPP related information.
<1-128> Enter to display the PPP interface ID.
neighbor Enter to display the OSPF neighbor information list and the
neighbor data structure.
773
SHOW IP OSPF
CHAPTER 23 OSPF
774
SHOW IP OSPF
CHAPTER 23 OSPF
775
SHOW IP OSPF
CHAPTER 23 OSPF
776
SHOW IP OSPF
CHAPTER 23 OSPF
Mode
Privileged EXEC Mode
Examples
iS5Comm # show ip ospf
OSPF Router with ID (0.0.0.0)
Supports only single TOS(TOS0) route O
paque LSA Support : Disabled
ABR Type supported is Standard ABR
Autonomous System Boundary Router : Disabled
P-Bit setting for the default Type-7 LSA that needs to be generated by
the ASBR(which is not ABR) is disabled
Non-Stop Forwarding disabled
Restart-interval limit: 120
Grace LSA Retransmission Count: 2
Helper Grace LSA ACK :Required
Restart Reason is:
Unknown
Helper is Giving Support for:
Unknown
Software Restart
Software Reload/Upgrade
Switch To Redundant
Helper Grace Time Limit: 0
Strict LSA checking State Is: Disabled
Route calculation staggering is enabled
Route calculation staggering interval is -1718520588 milliseconds
Redistributing External Routes is disabled
Default passive-interface Disabled
Rfc1583 compatibility is enabled
Administrative Distance is 110
Number of Areas in this router is 0
Default information originate is disabled
BFD is disabled
show ip ospf database external
OSPF Router with ID (10.0.0.1)
Summary Link States (Area 33.0.0.12)
---------------------------------------
LS age : 300
777
SHOW IP OSPF
CHAPTER 23 OSPF
778
SHOW IP OSPF
CHAPTER 23 OSPF
779
SHOW IP OSPF
CHAPTER 23 OSPF
ospfd#
iS5Comm# show ip ospf route cybsec
EXEC commands :
780
SUMMARY-ADDRESS
CHAPTER 23 OSPF
192.168.50.0/24 0.0.0.0/vlan50 10
0.0.0.0
23.25. summary-address
To creates aggregate addresses for OSPF and help in reducing the size of the routing table, use the
command summary-address in OSPF Router Configuration Mode. The no form of the command deletes
the External Summary Address.
summary-address
summary-address <Network> <Mask> <AreaId>
[{allowAll | denyAll | advertise | not-advertise}]
[Translation {disable | enable}]
[tag <tag-value>]
no summary-address
no summary-address <Network> <Mask> <AreaId> [not-advertise] [tag
<tag-value>]
781
SUMMARY-ADDRESS
CHAPTER 23 OSPF
Parameters
782
TIMERS SPF
CHAPTER 23 OSPF
enable Enter to set P-Bit in the generated Type-7 default LSA, when NSSA
ASBR is set to enabled.
tag Enter to configure the tag option for OSPF.
<tag-value> Integer Enter a tag value.
Mode
OSPF Router Configuration Mode
Default
• summary-address - advertise
• translation - enabled
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# summary-address 10.0.0.6 255.0.0.0 10.0.0.0 Translation enabled
timers spf
timers spf <spf-delay(0-65535)> <spf-holdtime(0-65535)>
no timers spf
no timers spf
783
TIMERS SPF
CHAPTER 23 OSPF
Parameters
Mode
OSPF Router Configuration Mode
Default
• spf-delay - 5 seconds
• spf-holdtime - 10 seconds
Examples
iS5Comm(config)# router ospf
iS5Comm(config-router)# timers spf 10 20
784
DHCP CLIENT
CHAPTER 24 DHCP
DHCP
24. DHCP
DHCP
(Dynamic Host Configuration Protocol) is used in a wide variety of devices, such as ISDN routers, firewalls,
etc., for assigning IP addresses to workstations. Besides obtaining IP address, other configuration param-
eters for a workstation can also be configured for a DHCP server. DHCP clients can retrieve these param-
eters along with the IP address.
DHCP is based on client-server architecture. DHCP servers are configured with an IP address and several
other configuration parameters. DHCP clients, typically workstations, obtain this IP address at start-up.
The client obtains the address for a time period termed as the “lease” period. DHCP clients renew the
address by sending a request for the IP address before the lease expires.
DHCP uses UDP (User Datagram Protocol) as its transport protocol and an UDP port for communication.
DHCP relay agents connect servers present on a LAN with a client present on another.
(Dynamic Host Configuration Protocol) Client is an Internet host using DHCP to obtain configuration
parameters such as an IP address.The figure below shows the basic steps that occur when a DHCP client
requests an IP address from a DHCP server. The client, Host A, sends a DHCP DISCOVER broadcast
message to locate a DHCP server. A DHCP server offers configuration parameters (such as an IP address,
a MAC address, a domain name, and a lease for the IP address) to the client in a DHCP OFFER unicast
message.
The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer
address, such as a MAC address, associated with a given Internet layer address, typically an IPv4 address.
The ARP uses a simple message format containing one address resolution request or response. The size
of the ARP message depends on the link layer and network layer address sizes. The message header spec-
ifies the types of network in use at each layer as well as the size of addresses of each. The message header
785
DHCP RELAY
CHAPTER 24 DHCP
is completed with the operation code for request (1) and reply (2). The payload of the packet consists of
four addresses, the hardware and protocol address of the sender and receiver hosts.
DHCP relay agent is a host or an IP router that allows the DHCP client and DHCP server in different
subnets to communicate with each other, so that the DHCP client can obtain its configuration informa-
tion while booting. The relay agent receives packets from the client, inserts information such as network
details, and forwards the modified packets to the server. The server identifies the client’s network from
the received packets, allocates the IP address accordingly, and sends reply to the relay. The relay strips
the information inserted by the server and broadcasts the packets to the client’s network.
Relay Agent Information Option
Automatic DHCP address allocation is typically based on an IP address, whether it be the gateway IP
address (giaddr field of the DHCP packet) or the incoming interface IP address. In some networks, it is
necessary to use additional information to further determine which IP addresses to allocate. By using the
relay agent information option, the DHCP relay agent can include additional information about itself
when forwarding client-originated DHCP packets to a DHCP server.
When using the relay agent information option, the DHCP relay agent can include additional information
about itself when forwarding client-originated DHCP packets to a DHCP server. The DHCP server can use
this information to assign IP addresses, perform access control, and set quality of service (QoS) and secu-
rity policies (or other parameter-assignment policies) for each subscriber of a service provider network.
The relay agent information option is inserted into the DHCP packet as follows:
1) The DHCP client generates a DHCP request and broadcasts it on the network.
2) The DHCP relay agent intercepts the broadcast DHCP request packet and inserts the relay agent
information option (option 82) in the packet. The relay agent information option contains the
related suboptions.The DHCP relay agent unicasts the DHCP packet to the DHCP server.The DHCP
server receives the packet and uses the suboptions to assign IP addresses and other configuration
parameters and forwards them back to the client.
3) The suboption fields are stripped off of the packet by the relay agent while forwarding to the client.
786
BOOTFILE CONFIG-FILE
CHAPTER 24 DHCP
server is used for dynamically assigning unique IP address and other configuration parameters, such as
gateway, to interfaces of a DHCP client. The IP address is leased to the interface only for a particular time
period as mentioned in the DHCP lease. The interface should be renewed the DHCP lease once it expires.
The DHCP server assigns IP addresses from specified address pools on a router and manages them. Then,
the subnet network number and mask of the DHCP address pool, the domain name for the client, the IP
address of a DNS server that is available to a DHCP client, and the IP address of the default router for a
DHCP client are specified.
As defined in RFC 3261, a Session Initiation Protocol (SIP) server must be an outbound proxy server. In
the context of this document, a SIP server refers to the host the SIP server is running on. SIP is an appli-
cation-layer control protocol that can establish, modify, and terminate multimedia sessions or estab-
lished by Voice-over-IP telephony calls.
bootfile config-file
bootfile config-file <bootfile (63)>
no bootfile config-file
no bootfile config-file
Parameters
<bootfile (63)> Enter a name for the boot image file. This is a string with maximum size
of 63.
Mode
Global Configuration Mode
787
CLEAR IP DHCP CLIENT STATISTICS
CHAPTER 24 DHCP
Default
None (Null terminated string)
Examples
iS5Comm (config)# bootfile config-file boot.img
788
CLEAR IP DHCP RELAY STATISTICS
CHAPTER 24 DHCP
Parameters
Mode
Privileged EXEC Mode / Global Configuration Mode
Examples
iS5Comm# clear ip dhcp client statistics
iS5Comm (config)# clear ip dhcp client statistics
789
CLEAR IP DHCP SERVER STATISTICS
CHAPTER 24 DHCP
Mode
Privileged EXEC Mode / Global Configuration Mode.
Examples
iS5Comm (config)# clear ip dhcp relay statistics
Mode
Privileged EXEC Mode / Global Configuration Mode
Examples
iS5Comm# clear ip dhcp server statistics
iS5Comm (config)# clear ip dhcp server statistics
790
DEBUG IP DHCP
CHAPTER 24 DHCP
debug ip dhcp
debug ip dhcp
{client {all | event | packets | errors | bind}
| relay {all | errors}
| server {all | events | packets | errors | bind | linkage}
| snooping {[entry] [exit] [debug] [fail] | all}}
no debug ip dhcp
no debug ip dhcp
{client {all | event | packets | errors | bind}
| relay {all | errors}
| server {all | events | packets | errors | bind | linkage}
| snooping
791
DEBUG IP DHCP
CHAPTER 24 DHCP
Parameters
client Enter to enable the tracking of the DHCP client operations as per the
configured debug levels. The debug statements are generated for the
specified trace levels.
all Enter to generate debug statements for all kind of failure traces.
event Enter to generate debug statements for DHCP client events that provide
DHCP client service status. The DHCP client events are generated when
any of packets are sent successfully or when an ACK is received
packets Enter to generate debug statements for packets related messages. These
messages are generated for all events generated during processing of
packets.
errors Enter to generate debug statements for Link State Acknowledge Packet
traces
bind Enter to generate debug statements for trace bind messages. These
messages are generated when a DHCP ACK is received.
relay Enter to enable the tracking of the DHCP relay operations as per the
configured debug levels. The debug statements are generated for the
specified trace levels.
all Enter to generate debug statements for all kind of failure traces.
errors Enter to generate debug statements for trace error code debug messages.
These messages are generated for all error events generated.
server Enter too enable the tracking of the DHCP relay operations as per the
configured debug levels. The debug statements are generated for the
specified trace levels.
all Enter to generate debug statements for all kind of failure traces.
event Enter to generate debug statements for DHCP server events that provide
DHCP server service status. The DHCP client events are generated when
any of packets are sent successfully or when an ACK is received
packets Enter to generate debug statements for packets related messages. These
messages are generated for all events generated during processing of
packets.
errors Enter to generate debug statements for trace error code debug messages.
These messages are generated for all error events generated.
bind Enter to generate debug statements for trace bind messages. These
messages are generated when a DHCP ACK is received.
792
DEFAULT-ROUTER
CHAPTER 24 DHCP
Mode
Privileged EXEC Mode
Default
Tracking of all DHCP modules operation is disabled
Examples
iS5Comm# debug ip dhcp client all
iS5Comm# debug ip dhcp relay all
iS5Comm# debug ip dhcp server all
iS5Comm# debug ip dhcp snooping entry
24.9. default-router
To configure the IP address for the corresponding DHCP server address pool and of a default router to
which a DHCP client should send packets after booting, use the command default-router in DHCP Pool
Configuration Mode. The no form of the command deletes the default router IP address configuration
for the DHCP server address pool. The default router IP address configuration is deleted, if the no form
of the network command is executed successfully.
793
DNS-SERVER
CHAPTER 24 DHCP
default-router
default-router <ip address>
no default-router
no default-router
Parameters
<ip address> Enter a value to configure the IP address of a default router to which a
DHCP client should send packets after booting.
Mode
DHCP Pool Configuration Mode
Prerequisites
• The configured IP address of the default router should be on the same subnet of the DHCP client.
• The default router IP address configuration takes effect only after creating a subnet pool for a DHCP
server address pool
Examples
iS5Comm(config)# ip dhcp pool 1 pool1
iS5Comm(dhcp-config)# default-router 10.23.2.99
24.10. dns-server
To configure the IP address of a DNS server for the corresponding DHCP server address pool, use the
command dns-server in DHCP Pool Configuration Mode. The no form of the command deletes the DNS
server IP address option configuration for the DHCP server address pool.
dns-server
dns-server <ip address> [<ip address>]
no dns-server
no dns-server
794
DOMAIN-NAME
CHAPTER 24 DHCP
Parameters
<ip address> Enter a value to configure the unicast IP address to be set for the
[<ip address>] corresponding DNS server that accepts IP address. The client correlates the
DNS IP address with the host name. The DNS server is used to translate
domain names and host names into corresponding IP addresses.
Mode
DHCP Pool Configuration Mode
Prerequisites
This command is executed successfully only if a subnet pool is already created for the DHCP address pool.
Examples
iS5Comm(config)# ip dhcp pool 1 pool1
iS5Comm(dhcp-config)# dns-server 12.0.0.1
24.11. domain-name
To configure the domain name option for the corresponding DHCP server address pool, use the
command domain-name in DHCP Pool Configuration Mode. The no form of the command deletes the
domain name option configuration for the DHCP server address pool. The domain name option configu-
ration is deleted if the no form of the network command is executed successfully.
domain-name
domain-name <domain (63)>
no domain-name
no domain-name <domain (63)>
795
EXCLUDED-ADDRESS
CHAPTER 24 DHCP
Parameters
<domain Integer Enter a value for the domain name option or the corresponding DHCP server
(63)> address pool. A DHCP client uses this domain name while resolving host
names through a domain name system. The DHCP option code is 15. This
value is a string of maximum size 63.
Mode
DHCP Pool Configuration Mode
Prerequisites
This command is executed successfully only if a subnet pool is already created for the DHCP address pool.
Examples
iS5Comm(config)# ip dhcp pool 1 pool1
iS5Comm(dhcp-config)# domain-name 12
24.12. excluded-address
To create an excluded pool that defines a range of IP addresses that needs to be excluded from the
created subnet pool, use the command excluded-address in DHCP Pool Configuration Mode. The no
form of the command deletes the created excluded pool. The same start IP address and end IP address
of the already created excluded pool should be provided while executing the no form of the command.
excluded-address
excluded-address <low-address> <high-address>
no excluded-address
no excluded-address <low-address> <high-address>
796
HOST HARDWARE-TYPE
CHAPTER 24 DHCP
Parameters
<low-addre Integer Enter to set the start IP address for an excluded pool. This address denotes
ss> the first IP address of a range of IP addresses which needs to be excluded
from the created subnet pool. This IP address should be:
• lower than the end IP address, and
• in the same network of the subnet pool’s start IP address.
Enter to set the end IP address for an excluded pool. This address denotes
<high-ad the last IP address of a range of IP addresses which needs to be excluded
dress> from the created subnet pool. This IP address should be:
• high than the start IP address, and within or equal to the subnet pool’s
end IP address
Mode
DHCP Pool Configuration Mode
Prerequisites
This command is executed successfully only if a subnet pool is already created for the DHCP address pool.
Examples
iS5Comm(config)# ip dhcp pool 1 pool1
iS5Comm(dhcp-config)# excluded-address 20.0.0.1 20.0.0.30
797
HOST HARDWARE-TYPE
CHAPTER 24 DHCP
host hardware-type
host hardware-type <integer (1-255)> client-identifier
{<mac-address> {ip <ip address> | option <code (1-2147483647)> {ascii
<string> | hex <hex_str> | ip <ip address>}}}
| {<ucast_mac>
{ntp-server <ip address> [<ip address>]
| dns-server <ip address> [<ip address>]
| sip-server {{domain <string> [<string>]} | {ip <ip address> [<ip
address>]}}
no host hardware-type
no host hardware-type <host-hardware-type (1-255)> client-identifier
{<client-mac-address> {ip | option <code (1-255)>}]
| {<ucast_mac>
{ntp-server
| dns-server
| sip-server}}
798
HOST HARDWARE-TYPE
CHAPTER 24 DHCP
Parameters
<integer Integer Enter a value to configure the host hardware type for which the host
(1-255)> address and the DHCP options needs to be configured. This value
ranges from 1 to 255. Only the value 1 is supported, which represents
that the hardware type is Ethernet.
client-ident Enter to configure the DHCP client identifier in a host declaration so
ifier that a host record can be found using this client identifier. The client
identifier represents the physical address (MAC address) of a network
card.
<mac-address Enter a MAC address for the IPv4 address for the DHCP host.
>
ip Enter to configure the IPv4 address for the DHCP host.
<ip address> Enter the IPv4 address for the DHCP host.
option Enter to configure the unique DHCP option code that represents a
specific DHCP option used in a DHCP OFFER message on response to a
DHCP DISCOVER message
<code Integer Enter a value for the unique DHCP option code that represents a
(1-214748364 specific DHCP option used in a DHCP OFFER message in response to a
7)> DHCP DISCOVER message. This value ranges from 1 to 2147483647.
ascii Enter to configure the ASCII value to be set for the corresponding
option code that accepts ASCII string.
<string> Enter an ASCII value to be set for the corresponding option code that
accepts ASCII string. This value is a character string that should contain
only characters from NVT ASCII character set.
hex Enter to configure the hexadecimal value to be set for the
corresponding option code that accepts hexadecimal string.
<string> Enter a hexadecimal value for the corresponding option code.
ip Enter to configure the unicast IP address to be set for the
corresponding option code that accepts IP addres
<ip address> Enter to configure the unicast IP address to be set for the
corresponding option code that accepts IP address.
<ucast_mac> Enter to configure the client identifier with the host MAC address.
ntp-server Enter to set NTP servers in the host specific DHCP server configuration
parameters.
799
HOST HARDWARE-TYPE
CHAPTER 24 DHCP
<ip address> Enter an unicast IP address for the corresponding NTP servers in the
host specific DHCP server configuration.
dns-server Enter to set DNS servers in the host specific DHCP server configuration
parameters.
<ip address> Enter an unicast IP address for the corresponding DNS servers in the
host specific DHCP server configuration.
sip-server Enter to set SIP servers in the host specific DHCP server configuration
parameters. SIP stands for Session Initiation Protocol and refers to a
TCP/IP-based network protocol which is often used in Voice-over-IP
telephony to establish connection for telephone calls.
domain Enter to configure the domain names for the server.
string Enter a domain name for the server. The domain name should be
specified as ASCII string
ip Enter to set SIP servers in the host specific DHCP server configuration
parameters.
<ip address> Enter to an unicast IP address for the corresponding SIP servers in the
host specific DHCP server configuration.
Mode
DHCP Pool Configuration Mode
Examples
iS5Comm(config)# ip dhcp pool 1 pool1
iS5Comm(dhcp-config) # host hardware-type 1 client-identifier 00:01:02:03:04:01 option 67 ascii abcd
iS5Comm(dhcp-config) # host hardware-type 1 client-identifier 00:11:22:33:44:55 dns-server 12.0.0.1
13.0.0.0
iS5Comm(dhcp-config) # host hardware-type 1 client-identifier 00:11:22:33:44:55 ntp-server 12.0.0.1
13.0.0.0
iS5Comm (dhcp-config)# host hardware-type 1 client-identifier 00:11:22:33:44:55 sip-server domain
sipsrv sipsrv1
800
IP DHCP BOOTFILE
CHAPTER 24 DHCP
ip dhcp bootfile
ip dhcp bootfile <bootfile (63)>
no ip dhcp bootfile
no ip dhcp bootfile
Parameters
<bootfile Enter a name for the initial boot file to be loaded in a DHCP client.
(63)> The file name is a string whose maximum size is 63. The boot file
contains the boot image that is used as the operating system for
the DHCP client.
Mode
Global Configuration Mode
Examples
iS5Comm (config)# ip dhcp bootfile boot1
801
IP DHCP CLIENT
CHAPTER 24 DHCP
ip dhcp client
ip dhcp client
{client-id {<interface-type> <interface-id> | vlan <vlan-id (1-4094)> |
port-channel <port-channel-id (1-65535)> | tunnel <tunnel-id (0-128)> |
loopback <interface-id (0-100)> | ascii <string> | hex <string>}
| request {tftp-server-name | boot-file-name | sip-server-info | option240}
| vendor-specific <vendor-info>}
no ip dhcp client
no ip dhcp client
{client-id
| request {tftp-server-name | boot-file-name | sip-server-info | option240}
| vendor-specific}
802
IP DHCP CLIENT
CHAPTER 24 DHCP
Parameters
client-id Enter to set the unique identifier for the DHCP client identifier. This
command advertises the client-id in the DHCP control packet.
Enter to specify the interface type for the DHCP client-id. The interface
<interface-t can be:
ype> • gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports only
full duplex links.
• extreme-ethernet – A version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports only
full duplex links.
• i-lan – Internal LAN created on a bridge per IEEE 802.1ap.
Enter to configure an interface id for the DHCP client-id for the
<interface-i specified interface identifier. This is a unique value that represents the
d> specific interface. This value is a combination of slot number and port
number separated by a slash. For example: 0/1 represents that the slot
number is 0 and port number is 1.
vlan Enter to configure DHCP client-id for a specified VLAN.
<vlan-id Integer Enter a VLAN ID for the DHCP client ID.This is a unique value that
(1-4094)> represents the specific VLAN created. This value ranges from 1 to 4094.
Enter to configure the port to be used by the host to configure the
port-channel router. The port channel identifier can be created or port channel
related configuration can done, only if the LA feature is enabled in the
switch.
Integer Enter a value for port ID for the port to be used by the host to configure
<port-channe the router. This value ranges from 1 to 65535
l-id
(1-65535)>
tunnel Enter to configure the tunnel identifier.
<tunnel-id Integer Enter a value for the tunnel identifier. This value ranges from 0 to 128.
(0-128)>
loopback Enter to configure the loopback identifier.
803
IP DHCP CLIENT
CHAPTER 24 DHCP
Integer Enter a a value for the loopback identifier. This value ranges from 0 to
<interface-i 100.
d (0-100)>
ascii Enter to configure the DHCP client ID in ascii format.
<string> Enter a value for client ID in ascii format. The client-id is given as a
string.
hex Enter to configure the DHCP client ID in hex format
<string> Enter a value for client ID in ascii format. The client-id is given as a
string.
request Enter to set the DHCP option type for requests to the server. This is
required to send DHCP request to get the tftp server name, Boot file
name, sip server name and option240.
Enter to configure to send the DHCP requests for getting the TFTP
tftp-server- server’s domain name
name
Enter to configure to send the DHCP requests for getting he boot File
boot-file-na Name
me
Enter to configure to send the DHCP requests for getting the sip server
sip-server-i details
nfo
option240 Enter to configure to send the DHCP requests for getting the the option
240 information.
Enter to configure vendor specific information for the DHCP client.
vendor-speci
fic
Enter a vendor name. The vendor name is given as a string.
<vendor-info
(string)>
Mode
Interface Configuration Mode (VLAN / Router)
804
IP DHCP CLIENT
CHAPTER 24 DHCP
Prerequisites
This command executes successfully only if the VLAN interfaces and router ports are in BOUND state
(that is, IP address is dynamically acquired from DHCP server and an active lease is bound to the inter-
face). The port should have been configured as router port for dynamically acquiring an IP address from
DHCP server.
Examples
iS5Comm (config-if)# ip dhcp client client-id gigabitethernet 0/1
iS5Comm (config-if)# ip dhcp client request option240
ip dhcp client
ip dhcp client
{arp-check timer <integer (1-20)>
| discovery timer <integer (1-300)>
| fast-access
| idle timer <integer (1-300)>}
no ip dhcp client
no ip dhcp client
{arp-check timer | discovery timer | fast-access | idle timer}
805
IP DHCP CLIENT
CHAPTER 24 DHCP
Parameters
<integer Integer Enter a value for the time to wait between discovery messages sent by
(1-300)> the DHCP client. This value ranges from 1 to 300
fast-access Enter to enable DHCP fast access mode. If fast access mode is enabled,
time to wait between discovery messages i.e. discovery timeout and
time to wait after four unsuccessful discovery will be user configurable
and the default value for discovery timeout is 5 seconds and for the null
state timeout is 1 second.
idle timer Enter to configure DHCP Client Discovery timer, DHCP Client idle timer
which specifies the time to wait after four unsuccessful DHCP client
discovery messages.
NOTE: This command executes only ifip dhcp client fast-access is enabled.
<integer Integer Enter a value for the time to wait after four unsuccessful DHCP client
(1-300)> discovery messages. This value ranges from 1 to 300.
Mode
Privileged EXEC Mode
Default
• If dhcp fast mode is enabled, the default DHCP Client arp-check timer is 1, DHCP Client Discovery
timer is 5, and the default DHCP Client Idle timer is 1.
• If dhcp fast mode is disabled, the default DHCP Client arp-check timer is 3, the default DHCP Client
Discovery timer is 15, and the default DHCP Client Idle timer is 18.
806
IP DHCP DNS-SERVER
CHAPTER 24 DHCP
Examples
iS5Comm# ip dhcp client arp-check timer 8
iS5Comm# ip dhcp client fast-access
iS5Comm# ip dhcp client discovery timer 8
iS5Comm# ip dhcp client idle timer 8
ip dhcp dns-server
ip dhcp dns-server <ip address> [<ip address>]
no ip dhcp dns-server
no ip dhcp dns-server
Parameters
Mode
Global Configuration Mode
807
IP DHCP EXCLUDED-ADDRESS
CHAPTER 24 DHCP
Examples
iS5Comm(config)# ip dhcp dns-server 12.0.0.1 13.0.0.0
ip dhcp excluded-address
ip dhcp excluded-address <low-address> <high-address>
ip dhcp excluded-address
no ip dhcp excluded-address <low-address> <high-address>
Parameters
<low-address> Integer Enter to set the start IP address for an excluded pool. This address
denotes the first IP address of a range of IP addresses which needs to be
excluded from the created subnet pool. This IP address should be:
• lower than the end IP address, and
• in the same network of the subnet pool’s start IP address.
Enter to set the end IP address for an excluded pool. This address denotes
<high-addr the last IP address of a range of IP addresses which needs to be excluded
ess> from the created subnet pool. This IP address should be:
• high than the start IP address, and within or equal to the subnet
pool’s end IP address
Mode
Global Configuration Mode
808
IP DHCP NEXT-SERVER
CHAPTER 24 DHCP
Prerequisites
• Subnet pool should have been created before creating an excluded pool. This excluded pool should
be within the range of the created subnet pool.
• For example, the excluded pool 20.0.0.20 – 20.0.0.30 created using this command is within the
already created subnet pool 20.0.0.0 – 20.0.0.100.
Examples
iS5Comm(config)# ip dhcp excluded-address 20.0.0.20 20.0.0.30
ip dhcp next-server
ip dhcp next-server <ip address>
no ip dhcp next-server
no ip dhcp next-server
Parameters
<ip address> Enter a valid address for the IP address of the boot server (that is,
TFTP server) from which the initial boot file is to be loaded in a
DHCP client. This boot server acts as a secondary server.
Mode
Global Configuration Mode
809
IP DHCP NTP-SERVER
CHAPTER 24 DHCP
Default
0.0.0.0; No boot server is defined. DHCP server is used as the boot server.
Examples
iS5Comm (config)# ip dhcp next-server 12.0.0.1
ip dhcp ntp-server
ip dhcp ntp-server <ip address> [<ip address>]
no ip dhcp ntp-server
no ip dhcp ntp-server
Parameters
ntp-server Enter to set NTP servers in the host specific DHCP server configuration
parameters.
ip Enter to set NTP servers in the host specific DHCP server configuration
parameters.
<ip Enter to an unicast IP address for the corresponding NTP servers in the
address> host specific DHCP server configuration.
Mode
Global Configuration Mode
810
IP DHCP OPTION
CHAPTER 24 DHCP
Examples
iS5Comm(config)# ip dhcp ntp-server 12.0.0.1 14.0.0.1
no ip dhcp option
no ip dhcp option <code (1-2147483647)>
Parameters
<code Integer Enter a value for the unique DHCP option code that represents a specific
(1-21474 DHCP option used in a DHCP OFFER message in response to a DHCP
83647)> DISCOVER message. This value ranges from 1 to 2147483647.
ascii Enter to configure the ASCII value to be set for the corresponding option
code that accepts ASCII string.
<string> Enter an ASCII value to be set for the corresponding option code that accepts
ASCII string. This value is a character string that should contain only
characters from NVT ASCII character set.
hex Enter to configure the hexadecimal value to be set for the corresponding
option code that accepts hexadecimal string.
<string> Enter a hexadecimal value for the corresponding option code.
<ip Enter to configure the unicast IP address to be set for the corresponding
address> option code that accepts IP address.
Mode
Global Configuration Mode
811
IP DHCP POOL
CHAPTER 24 DHCP
Examples
iS5Comm(config)# ip dhcp option 19 hex d
iS5Comm# show ip dhcp server pools
Global Options
--------------
Code : 19, Value : 0
ip dhcp pool
ip dhcp pool <index (1-2147483647)> [<Pool Name>]
no ip dhcp pool
no ip dhcp pool <index (1-2147483647)>
Parameters
Mode
Global Configuration Mode
812
IP DHCP RELAY
CHAPTER 24 DHCP
Examples
iS5Comm(config)# ip dhcp pool 1 PoolZD
iS5Comm(dhcp-config)#
ip dhcp relay
ip dhcp relay {circuit-id option {router-index | vlanid | recv-port} |
information option}
no ip dhcp relay
no ip dhcp relay information option
813
IP DHCP RELAY
CHAPTER 24 DHCP
Parameters
Mode
Global Configuration Mode
814
IP DHCP SERVER
CHAPTER 24 DHCP
Examples
iS5Comm(config)# ip dhcp relay circuit-id option vlanid
iS5Comm(config)# ip dhcp relay information option
ip dhcp server
ip dhcp server {<ip address> | {offer-reuse <timeout (1-120)>}
no ip dhcp server
no ip dhcp server {<ip address> | offer-reuse}
815
IP DHCP SIP-SERVER
CHAPTER 24 DHCP
Parameters
<ip Enter to configure the Configure the IP address. The switches or systems
address> having these IP addresses represent the DHCP servers to which the DHCP relay
agent can forward the packets that are received from DHCP clients.The DHCP
relay agent broadcasts the received packets to entire network except the
network from which the packets are received, if the DHCP server list is empty
(that is IP address is configured as 0.0.0.0).
Enter to configure the amount of time the DHCP Server entity would wait for
offer-re the DHCP REQUEST from the client before reusing the offer.
use
<timeout Enter a value for the amount of time the DHCP Server entity would wait for the
(1-120)> DHCP REQUEST from the client before reusing the offer.
Mode
Global Configuration Mode
Default
DHCP server list
Prerequisites
The IP address list can contain only 5 IP addresses (that is, only a maximum of 5 DHCP servers can be
listed).
Examples
iS5Comm(config)# ip dhcp server 12.0.0.1
816
IP DHCP SNOOPING
CHAPTER 24 DHCP
ip dhcp sip-server
ip dhcp sip-server {{domain <string> [<string>]} | {ip <ip address> [<ip
address>]}}
no ip dhcp sip-server
no ip dhcp sip-server
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# ip dhcp sip-server domain str str1
817
IP DHCP SNOOPING TRUST
CHAPTER 24 DHCP
ip dhcp snooping
ip dhcp snooping
Mode
VLAN Configuration Mode
Default
L2 DHCP snooping is disabled on VLANs.
Examples
iS5Comm(config)# int vlan 1
iS5Comm(config-vlan)# ip dhcp snooping
Mode
Interface Configuration Mode
818
IP DHCP SNOOPING
CHAPTER 24 DHCP
Default
Ports are considered trusted.
Examples
iS5Comm(config)# interface gi 0/2
iS5Comm(config-if)# ip dhcp snooping trust
ip dhcp snooping
ip dhcp snooping [vlan <vlan-id (1-4094)> | verify mac-address]
no ip dhcp snooping
no ip dhcp snooping [vlan <vlan-id (1-4094)> | verify mac-address]
819
LEASE
CHAPTER 24 DHCP
Parameters
vlan Enter to configure L2 DHCP snooping in the specific VLAN. The DHCP
snooping module will start the protocol operation when the snooping is
enabled globally.
<vlan-id Integer Enter a VLAN ID for the L2 DHCP snooping to be configured. This is a unique
(1-4094)> value that represents the specific VLAN created. This value ranges from 1 to
4094.
verify Enter to enable globally DHCP MAC verification in the switch.
Enter to start MAC Address verification. If the MAC verification status is
mac-addre enabled, DHCP snooping module will verify whether the source Mac
ss address and client hardware Mac address are same. If they are same,
packet will be processed further; else, it is dropped.
Mode
Global Configuration Mode
Default
DHCP MAC address verification is enabled.
Examples
iS5Comm(config)# ip dhcp snooping vlan 2
NOTE: The example used and the ip dhcp snooping command used in the config-vlan mode serve the same
purpose.
iS5Comm(config)# ip dhcp snooping verify mac-address
24.29. lease
To configure the DHCP lease period for an IP address (for the corresponding DHCP server address pool)
that is assigned from a DHCP server to a DHCP client, use the command lease in DHCP Pool Configuration
Mode. The no form of the command resets the DHCP lease period to its default value. The DHCP lease
period configuration is deleted and reset if the no form of the network command is executed success-
fully.
820
LEASE
CHAPTER 24 DHCP
lease
lease {<days (0-365)> [<hours (0-23)> [<minutes (1-59)>]] | infinite}
no lease
no lease
Parameters
Mode
DHCP Pool Configuration Mode
Default
3600 seconds (1 hour)
Prerequisites
The DHCP lease period configuration takes effect only after creating a subnet pool for a DHCP server
address pool.
Examples
iS5Comm(config)# ip dhcp pool 1 pool1
iS5Comm(dhcp-config) # lease 1
821
NETBIOS-NAME
CHAPTER 24 DHCP
24.30. netbios-name
To configure the IP address of a NetBIOS (Network Basic Input / Output System) and WINS (Windows
Internet Naming Service) name servers that are available to Microsoft DHCP clients for the corresponding
DHCP server address pool, use the command netbios-name in DHCP Pool Configuration Mode. The no
form of the command deletes the NetBIOS and WINS name servers IP address configuration for the DHCP
server address pool. The NetBIOS WINS name server option configuration is deleted, if the no form of the
network command is executed successfully.
netbios-name
netbios-name <ip address>
no netbios-name
no netbios-name
Parameters
<ip address> Enter a value to configure the NetBIOS and WINS name servers IP address
configuration for the DHCP server address pool. The NetBIOS name server
provides the following three distinct services:
• Name service for name registration and resolution
• Session service for connection oriented communication
• Datagram distribution service for connectionless communication
Mode
DHCP Pool Configuration Mode
Prerequisites
The NetBIOS WINS name server configuration takes effect only if a subnet pool is already created for the
DHCP server address pool.
Examples
iS5Comm(config)# ip dhcp pool 1 pool1
iS5Comm(dhcp-config)# netbios-name-server 20.0.0.3
822
NETBIOS-NODE
CHAPTER 24 DHCP
24.31. netbios-node
To configure the NetBIOS node type for Microsoft DHCP clients for the corresponding DHCP server
address pool, use the command netbios-node in DHCP Pool Configuration Mode. The node type denotes
the method used to register and resolve NetBIOS names to IP addresses. The no form of the command
deletes thee NetBIOS node type option configuration for the DHCP server address pool.
netbios-node
netbios-node {<0-FF> | b-node | h-node | m-node | p-node}
no netbios-node
no netbios-node
Parameters
Mode
DHCP Pool Configuration Mode
823
NETBIOS-NODE-TYPE
CHAPTER 24 DHCP
Prerequisites
The NetBIOS node type configuration takes effect only after creating a subnet pool for a DHCP server
address pool.
Examples
iS5Comm(config)# ip dhcp pool 1 pool1
iS5Comm(dhcp-config)# netbios-node h-node
24.32. netbios-node-type
To configure the NetBIOS node type for Microsoft DHCP clients for the corresponding DHCP server
address pool, use the command netbios-node-type in DHCP Pool Configuration Mode. The node type
denotes the method used to register and resolve NetBIOS names to IP addresses. The no form of the
command deletes the NetBIOS node type option configuration for the DHCP server address pool.
netbios-node-type
netbios-node-type {<0-FF> | b-node | h-node | m-node | p-node}
no netbios-node-type
no netbios-node-type
824
NETWORK
CHAPTER 24 DHCP
Parameters
Typ
Parameter e Description
<0-FF> Enter a value to allow NetBIOS over TCP/IP clients. It ranges from 0 to 255.
b-mode Enter to configure the DHCP server address pool to broadcast IP messages for
registering and resolving NetBIOS names to IP addresses. The node type value is
set as 1.
h-mode Enter to configure the DHCP server address pool to initially query name server
and subsequently broadcast IP messages for registering and resolving NetBIOS
names to IP addresses. The node type value is set as 8. This node type is the best
option for all conditions.
m-mode Enter to configure the DHCP server address pool to initially broadcast IP message
and then query name server for registering and resolving NetBIOS names to IP
addresses. The node type value is set as 4.
p-mode Enter to configure the DHCP server address pool to have point-to-point
communication with a NetBIOS name server for registering and resolving
NetBIOS names to IP addresses. The node type value is set as 2.
Mode
DHCP Pool Configuration Mode
Prerequisites
The NetBIOS node type configuration takes effect only after creating a subnet pool for a DHCP server
address pool.
Examples
iS5Comm(config)# ip dhcp pool 1 pool1
iS5Comm(dhcp-config)# netbios-node-type h-node
24.33. network
To create a subnet pool that defines a network IP subnet address for the corresponding DHCP address
pool and contains IP addresses to be assigned to the DHCP client, use the command network in DHCP
Pool Configuration Mode. The no form of the command deletes the created subnet pool.
825
NETWORK
CHAPTER 24 DHCP
network
network <start- IP> [<mask> | / <prefix-length (1-31)>] [<end ip>]
no network
no network
Parameters
<start-IP> Enter a value for the IP subnet address for the DHCP pool. The addresses
within the specified network subnet are assigned to the DHCP client, if
no restriction is applied. For example, the value is configured as 20.0.0.0,
then any one of the address within the range from 20.0.0.1 to
20.255.255.254 can be assigned to the DHCP client if no other
limitations such as end IP address are set. This value should be unique
(that is, one subnet address can be assigned only for one DHCP address
pool).
<mask> Enter a value for the subnet mask for the network IP address. This is a
32-bit number which is used to divide the IP address into network
address and host address. This value is used to automatically calculate
the end IP address for the pool. For example: The value 254.0.0.0
represents that the end IP address is 21.255.255.254, if the network
subnet is set as 20.0.0.0
Enter a number of high-order bits in the IP address. These bits are
<prefix-len common among all hosts within a network. This value should be
gth (1-31)> preceded by a slash (/) with space before and after the slash. This value
is used to automatically calculate the end IP address for the pool and set
the mask for the subnet. For example: value 20.0.0.0 / 6 represents that
the end IP address is 23.255.255.254 and the mask is 252.0.0.0.
<end ip> Enter a value for the end IP address for the network IP subnet set for the
DHCP address pool. This value restricts the IP addresses that can be
assigned to the DHCP client. This value is used to manually set the end IP
address. This value overrides the end IP address calculated automatically
using the mask or prefix-length.
Mode
DHCP Pool Configuration Mode
826
NTP-SERVER
CHAPTER 24 DHCP
Default
• mask - 255.0.0.0
• end ip - Represents the last possible subnet address. For example: If network subnet address is
mentioned as 20.0.0.0, then end IP address would be 20.255.255.254.
Examples
iS5Comm(config)# ip dhcp pool 1 pool1
iS5Comm(dhcp-config)# network 20.0.0.0 255.0.0.0 20.0.0.50
24.34. ntp-server
To set the NTP server in the host specific DHCP server configuration parameters, use the command
ntp-server in DHCP Pool Configuration Mode. The no form of the command deletes the NTP servers from
the host specific DHCP server configuration parameters.
ntp-server
ntp-server <ip address> [<ip address>]
no ntp-server
no ntp-server
Parameters
Mode
DHCP Pool Configuration Mode
827
OPTION
CHAPTER 24 DHCP
Examples
iS5Comm(config)# ip dhcp pool 1 pool1
iS5Comm(dhcp-config)# ntp-server 12.0.0.1 13.0.0.
24.35. option
To configure the various available DHCP server options with the corresponding specific values for the
corresponding DHCP server address pool, use the command option in DHCP Pool Configuration Mode.
These values can be an ASCII string, hexadecimal string or IP address. The no form of the command
deletes he DHCP server option for the DHCP server address pool. The DHCP server option configuration
is deleted if the no form of the network command is executed successfully.
option
option <code (1-2147483647)> {ascii <string> | hex <hex_str> | <ip address>}
no option
no option <code (1-2147483647)>
828
RELEASE DHCP
CHAPTER 24 DHCP
Parameters
<code Integer Enter a value for the unique DHCP option code that represents a specific
(1-21474 DHCP option used in a DHCP OFFER message in response to a DHCP
83647)> DISCOVER message. This value ranges from 1 to 2147483647.
ascii Enter to configure the ASCII value to be set for the corresponding option
code that accepts ASCII string.
<string> Enter an ASCII value to be set for the corresponding option code that accepts
ASCII string. This value is a character string that should contain only
characters from NVT ASCII character set.
hex Enter to configure the hexadecimal value to be set for the corresponding
option code that accepts hexadecimal string.
<string> Enter a hexadecimal value for the corresponding option code.
<ip Enter to configure the unicast IP address to be set for the corresponding
address> option code that accepts IP address.
Mode
DHCP Pool Configuration Mode
Default
Option code - 1
Prerequisites
The DHCP server options configuration takes effect only after creating a subnet pool for a DHCP server
address pool.
Examples
iS5Comm(config)# ip dhcp pool 1 pool1
iS5Comm(dhcp-config)# option 19 hex f
829
RELEASE DHCP
CHAPTER 24 DHCP
assigned to that interface is terminated manually. The lease is terminated to reset the DHCP client which
faces connectivity problem. The DHCP lease provided by the DHCP server represents the time interval till
which the DHCP client can use the assigned IP address.
release dhcp
release dhcp
{cpu0 | vlan <vlan-id (1-4094)> | <interface-type> <interface-id>}
Parameters
cpu0 Enter to release the DHCP lease for the management interface.
vlan Enter to configure release of the DHCP lease for a specified VLAN.
<vlan-id Integer Enter a VLAN ID for the DHCP lease to be released. This is a unique value that
(1-4094) represents the specific VLAN created. This value ranges from 1 to 4094.
>
Enter to specify the type of interface for the DHCP lease to be released. The
<interfa interface can be:
ce-type> • gigabitethernet – A version of LAN standard architecture that supports
data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data transfer
up to 10 Gigabits per second. This Ethernet supports only full duplex
links.
Enter to configure release of the DHCP lease for the specified interface
<interfa identifier. This is a unique value that represents the specific interface. This
ce-id> value is a combination of slot number and port number separated by a slash.
For example: 0/1 represents that the slot number is 0 and port number is 1
Mode
Privileged EXEC Mode
830
RENEW DHCP
CHAPTER 24 DHCP
Prerequisites
This command executes successfully only if the VLAN interfaces and router ports are in BOUND state
(that is, IP address is dynamically acquired from DHCP server and an active lease is bound to the inter-
face). The port should have been configured as router port for dynamically acquiring an IP address from
DHCP server.
Examples
iS5Comm# release dhcp vlan 1
renew dhcp
renew dhcp
{cpu0 | vlan <vlan-id (1-4094)> | <interface-type> <interface-id>}
831
SERVICE DHCP
CHAPTER 24 DHCP
Parameters
cpu0 Enter to renew the DHCP lease for the management interface.
vlan Enter to configure renewal of DHCP lease for a specified VLAN.
<vlan-id Integer Enter a VLAN ID for the DHCP lease to be renewed. This is a unique value
(1-4094)> that represents the specific VLAN created. This value ranges from 1 to 4094.
Enter to specify the type of interface for the DHCP lease to be renewed. The
<interfac interface can be:
e-type> • gigabitethernet – A version of LAN standard architecture that supports
data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data transfer
up to 10 Gigabits per second. This Ethernet supports only full duplex
links.
Enter an interface ID to have configured renewal of the DHCP lease. This is a
<interfac unique value that represents the specific interface. This value is a
e-id> combination of slot number and port number separated by a slash. For
example: 0/1 represents that the slot number is 0 and port number is 1.
Mode
Privileged EXEC Mode
Prerequisites
This command executes successfully only if the VLAN interfaces and router ports are in BOUND state
(that is, IP address is dynamically acquired from DHCP server and an active lease is bound to the inter-
face). The port should have been configured as router port for dynamically acquiring an IP address from
DHCP server.
Examples
iS5Comm# renew dhcp vlan 1
832
SERVICE DHCP-RELAY
CHAPTER 24 DHCP
command is a complete standardized implementation of the existing command and operates similar to
that of the command service dhcp-server.
service dhcp
service dhcp
no service dhcp
no service dhcp
Mode
Global Configuration Mode
Default
DHCP server is disabled
Prerequisites
The DHCP server can be enabled in the switch, only if the DHCP relay agent is disabled in the switch.
Examples
iS5Comm(config)# service dhcp
833
SERVICE DHCP-SERVER
CHAPTER 24 DHCP
service dhcp-relay
service dhcp-relay
no service dhcp-relay
no service dhcp-relay
Mode
Global Configuration Mode
Default
DHCP relay agent is disabled (that is, the switch acts as a DHCP client)
Prerequisites
The DHCP relay agent can be enabled in the switch, only if the DHCP server is disabled in the switch.
Examples
iS5Comm(config)# service dhcp-relay
service dhcp-server
service dhcp-server
no service dhcp-server
no service dhcp-server
834
SET DHCP-CLIENT ENABLE / DISABLE
CHAPTER 24 DHCP
Mode
Global Configuration Mode
Default
DHCP server is disabled (that is, the switch acts as a DHCP client)
Prerequisites
The DHCP server can be enabled in the switch, only if the DHCP relay agent is disabled in the switch.
Examples
iS5Comm(config)# service dhcp-server
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# set dhcp-client enable
835
SHOW DHCP SERVER
CHAPTER 24 DHCP
Mode
Privileged EXEC Mode
Examples
iS5Comm# show dhcp server
Context Name : default
------------
DHCP server : 0.0.0.0
836
SHOW IP DHCP CLIENT
CHAPTER 24 DHCP
Parameters
client-id Enter to display the unique identifier for the DHCP client.
Enter to display DHCP fast access information such as Fast Access Mode
fast-acce status, Dhcp Client Fast Access DiscoverTimeOut, Dhcp Client Fast Access
ss NullStateTimeOut, Dhcp Client Fast Access Arp Check TimeOut values.
option Enter to display DHCP client options set by a server which provides the
details like interface, interface type, length, and value.
stats Enter to display the DHCP client statistics information for interfaces that
are configured to acquire IP address dynamically from the DHCP server.
The statistics information contains interface name, IP address assigned by
DHCP server, DHCP lease details, details regarding number of
DHCPDISCOVER, DHCPREQUEST, DHCPDECLINE, DHCPRELEASE and
DHCPINFORM packets received and number of DHCPOFFER packets sent
from the DHCP client.
Mode
Privileged EXEC Mode
Examples
iS5Comm# show ip dhcp client client-id
iS5Comm# show ip dhcp client fast-access
DHCP Client Timer Settings
---- ------ ----- -------
Fast Access Mode : Enable
DHCP Client Fast Access DiscoverTimeOut : 5
DHCP Client Fast Access NullStateTimeOut : 1
DHCP Client Fast Access Arp Check TimeOut : 1
iS5Comm# show ip dhcp client option
DHCP Client Options
vlan1 43
vlan1 60 6 vendor
vlan1 66
837
SHOW IP DHCP RELAY
CHAPTER 24 DHCP
vlan1 67
vlan1 120
vlan1 240
iS5Comm# show ip dhcp client stats
DHCP Client Statistics
--------------------------I
nterface : vlan1
Client IP Address : 12.0.0.21
Client Lease Time : 3600
Client Remain Lease Time : 3569
Message Statistics
------------------
DHCP DISCOVER : 1
DHCP REQUEST : 1
DHCP DECLINE : 0
DHCP RELEASE : 0
DHCP INFORM : 0
DHCP OFFER : 1
838
SHOW IP DHCP RELAY
CHAPTER 24 DHCP
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show ip dhcp relay information
Context Name: default
------------
DHCP Relay : Disabled
DHCP Relay Servers only : Enabled
839
SHOW IP DHCP SERVER
CHAPTER 24 DHCP
840
SHOW IP DHCP SERVER
CHAPTER 24 DHCP
Parameters
binding Enter to display the DHCP server binding information. A DHCP binding is
created when a DHCP server assigns an IP address to a DHCP client. The
information contains the allocated IP address, host hardware type, host
hardware address, binding state and expiry time of the allocated DHCP
lease
Enter to display the DHCP server configuration information. The
informati information contains status of DHCP server, ICMP echo mechanism, debug
on level, boot server IP address, boot file name and server offer reuse time.
pool Enter to display the global DHCP option configuration for all DHCP server
address pools and configuration information such as utilization threshold,
of address pools for which subnet pool is created or host options are
configured.
Enter to display the various DHCP server statistics-related information
statistic such as number of DHCPDECLINE messages received, DHCPOFFER
s messages sent and so on.
Mode
Privileged EXEC Mode
Prerequisites
The DHCP server binding information is displayed, only if the DHCP server is enabled and the DHCP
binding is created.
Examples
iS5Comm# show ip dhcp server binding
Ip Hw Binding Expire
Address Type Address State Time
------- ---- ------- ------ ------
12.0.0.2 Ethernet 00:02:02:03:04:01 Assigned May 12 13:22:41 2009
iS5Comm# show ip dhcp server information
DHCP server status : Enable
Send Ping Packets : Enable
Debug level : All
Server Address Reuse Timeout : 10 secs
841
SHOW IP DHCP SERVER
CHAPTER 24 DHCP
Pool Id : 1
-------------------------------------------
Pool Name : pool1
Subnet : 20.0.0.0
Subnet Mask : 255.0.0.0
Lease time : 2147483647 secs
Utilization threshold : 76%
Start Ip : 20.0.0.1
End Ip : 20.0.0.50
Exclude Address Start IP : 20.0.0.1
Exclude Address End IP : 20.0.0.30
Exclude Address Start IP : 20.0.0.20
Exclude Address End IP : 20.0.0.30
Subnet Options
--------------
Code : 1, Value : 255.0.0.0
Code : 3, Value : 10.23.2.99
Code : 6, Value : 12.0.0.1
Code : 15, Value : 12
Code : 19, Value : 0
Code : 43, Value : ven
Code : 46, Value : 8
Host Options
------------
Client Identifier Hardware type Code Value
00:01:02:03:04:01 1 67 abcd
iS5Comm# show ip dhcp server statistics
Address pools : 1
Message Received
842
SHOW IP DHCP SNOOPING
CHAPTER 24 DHCP
------- --------
DHCPDISCOVER 0
DHCPREQUEST 0
DHCPDECLINE 0
DHCPRELEASE 0
DHCPINFORM 0
Message Sent
------- ----
DHCPOFFER 0
DHCPACK 0
DHCPNAK 0
843
SHOW IP DHCP SNOOPING
CHAPTER 24 DHCP
Parameters
globals Enter to display the global configuration of DHCP snooping. The global
status of Layer 2 DHCP snooping and MAC verification are displayed.
vlan Enter to display L2 DHCP snooping in the specific VLAN. The DHCP
snooping module will start the protocol operation when the snooping
is enabled globally.
<vlan-id Integer Enter a VLAN ID for the L2 DHCP snooping to be configured. This is a
(1-4094)> unique value that represents the specific VLAN created. This value
ranges from 1 to 4094.
Mode
Privileged EXEC Mode
Prerequisites
The DHCP server binding information is displayed, only if the DHCP server is enabled and the DHCP
binding is created.
Examples
iS5Comm# show ip dhcp snooping globals
DHCP Snooping Global information
--------------------------------
Switch : default
------- -------
Layer 2 DHCP Snooping is globally disabled
MAC Address verification is enabled
iS5Comm# show ip dhcp snooping vlan 2
DHCP Snooping Vlan information
------------------------------
VLAN : 2
Snooping status : Enabled
Number of Incoming Discovers : 0
Number of Incoming Requests : 0
Number of Incoming Releases : 0
Number of Incoming Declines : 0
844
SHOW DHCP-CLIENT MODULE STATUS
CHAPTER 24 DHCP
Mode
Privileged Execution Mode
Examples
iS5Comm# show dhcp-client module status
24.48. sip-server
To set the Session Initiation Protocol ( SIP) server in the host specific DHCP server configuration param-
eters, use the command sip-server in Global Configuration Mode. The no form of the command deletes
the SIP server from the host specific DHCP server configuration parameters.
sip-server
sip-server {{domain <string> [<string>]} | {ip <ip address> [<ip address>]}}
845
UTILIZATION THRESHOLD
CHAPTER 24 DHCP
no sip-server
no sip-server
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# ip dhcp pool 1 pool1
iS5Comm (dhcp-config)# sip-server domain str str1
iS5Comm(dhcp-config)# sip-server ip 12.0.0.1 13.0.0.0
846
VENDOR-SPECIFIC
CHAPTER 24 DHCP
utilization threshold
utilization threshold <integer (0-100)>
no utilization threshold
no utilization threshold
Parameters
<integer Integer Enter a value for the pool utilization threshold value (as percentage) for the
(0-100)> corresponding DHCP server address pool.
Mode
DHCP Pool Configuration Mode
Default
75 percent
Prerequisites
The pool utilization threshold configuration takes effect only after creating a subnet pool for a DHCP
server address pool.
Examples
iS5Comm(config)# ip dhcp pool 1 pool1
iS5Comm(dhcp-config) # utilization threshold 76
24.50. vendor-specific
To set the vendor specific information in the pool specific DHCP server configuration parameters, use the
command vendor-specific in DHCP Pool Configuration Mode. The no form of the command deletes
vendor-specific information from the pool specific DHCP server configuration parameters.
vendor-specific
vendor-specific <vendor-specific-string> [<vendor-specific-string>]
847
VENDOR-SPECIFIC
CHAPTER 24 DHCP
no vendor-specific
no vendor-specific
Parameters
Mode
DHCP Pool Configuration Mode
Examples
iS5Comm(config)# ip dhcp pool 1 pool1
iS5Comm(dhcp-config)# vendor-specific ven
848
AUTO-SUMMARY
CHAPTER 25 RIP
RIP
25. RIP
RIP
(Routing Information Protocol) is a widely used protocol for managing router information within a
self-contained network such as a corporate local area network or an interconnected group of such LANs.
is classified by the IETF (Internet Engineering Task Force) as one of several internal gateway protocols.
RIP sends routing-update messages at regular intervals and when the network topology changes. When
a router receives a routing update that includes changes to an entry, it updates its routing table to reflect
the new route. The metric value for the path is increased by 1, and the sender is indicated as the next
hop. RIP routers maintain only the best route (the route with the lowest metric value) to a destination.
After updating its routing table, the router immediately begins transmitting routing updates to inform
other network routers about the change. These updates are sent independently of the regularly sched-
uled updates that RIP routers send. RIP uses a hop count to determine network distance. Each host with
a router in the network uses the routing table information to determine the next host to route a packet
for a specified destination.
25.1. auto-summary
To enable auto summarization feature in RIP, enable or disable the auto summarization of routes in RIP,
and restore the default behavior of automatic summarization of subnet routes into network-level routes,
use the command auto-summary in RIP Router Configuration Mode.
auto-summary
auto-summary [enable] [disable]
849
DEBUG IP RIP
CHAPTER 25 RIP
Parameters
enable Enter to enable auto summarization feature in RIP, so that the summary routes
are sent in regular updates for RIP. This is the default.
disable Enter to disable auto summarization feature in RIP, so that either individual
subnet route is sent or subnet routes are sent based on the specific
aggregation configured over the interface.
Mode
RIP Router Configuration Mode
Prerequisites
Auto-summarization feature must be disabled to configure interface specific aggregation with RIP
version 2.
Examples
iS5Comm(config)# router rip
iS5Comm(config-router)# auto-summary disable
debug ip rip
debug ip rip [{all | buffer | control | data | database | dump | events |
failure | init | mgmt | os | triggers}
850
DEBUG IP RIP
CHAPTER 25 RIP
debug ip rip
debug ip rip [{all | buffer | control | data | database | dump | events |
failure | init | mgmt | os | triggers}
Parameters
Mode
Privileged EXEC Mode
Prerequisites
This command executes only if RIP is enabled.
851
DEFAULT-INFORMATION
CHAPTER 25 RIP
Examples
iS5Comm# debug ip rip all
25.3. default-information
To set the metric to be used for default route propagated over the interface, use the command
default-information in Interface Configuration Mode. The no form of the command disables the origina-
tion of default route over the interface. The administrative distance can be enabled for one route map
only. If distance needs to be enabled for a route map, then distance should be disabled for an already
assigned route map. This command is a standardized implementation of the existing command: ip rip
default route originate. It operates similar to the existing command.
default-information
default-information originate <metric (1-15)> [route-map <string(32)>]
no default-information
no default-information originate
Parameters
originate Enter to enable default route propagated over the interface. This
distance value will not be used for distributing list.
<metric(1-15)> Integer Enter a metric value to be used for default route. This value ranges
from 1 to 15.
route-map Enter to configure the name of the existing route map for which
the metric value should be enabled and set.
<string(32)> Integer Enter a name of the existing route map for which the metric value
should be enabled and set. This value is a string with the maximum
size of 32.
Mode
Interface Configuration Mode
852
DEFAULT-METRIC
CHAPTER 25 RIP
Examples
iS5Comm(config-if)# default-information originate 10
25.4. default-metric
To set the default metric values to be used for redistributed routes for RIP, use the command
default-metric in RIP Router Configuration Mode. The command is used in conjunction with the redis-
tribute router command to cause the current routing protocol to use the same metric value for all redis-
tributed routes. The no form of the command sets the metric used with redistributed routes to its default
value. The metric value given in the no form of the command will be ignored during the execution of the
command.
default-metric
default-metric [<value (1-16)>]
no default-metric
no default-metric [<short (1-16)>]
Parameters
Mode
RIP Router Configuration Mode
Default
3
Examples
iS5Comm(config)# router rip
iS5Comm(config-router)# default-metric 1
853
DISTANCE
CHAPTER 25 RIP
25.5. distance
To enable the administrative distance (that is, the metric to reach destination) of the routing protocol
and set the administrative distance value, use the command distance in RIP Router Configuration Mode.
The no form of this command disables the administrative distance.
distance
distance <1-255> [route-map <name(1-20)>]
no distance
no distance [route-map <name(1-20)>]
Parameters
Mode
RIP Router Configuration Mode
Default
121
Examples
iS5Comm(config)# router rip
iS5Comm(config-router)# distance 10 route-map rmap-test
854
DISTRIBUTE-LIST
CHAPTER 25 RIP
25.6. distribute-list
To enable route map filtering for inbound or outbound routes and define the conditions for distributing
the routes from one routing protocol to another, use the command distribute-list in RIP Router Config-
uration Mode. The no form of the command disables route map filtering for inbound or outbound routes.
distribute-list
distribute-list route-map <name (1-20)> {in | out}
no distribute-list
no distribute-list route-map <name (1-20)> {in | out}
Parameters
Mode
RIP Router Configuration Mode
Prerequisites
Only one route map can be set for inbound or outbound routes. Another route map can be assigned, only
if the already assigned route map is disabled.
Examples
iS5Comm(config)# router rip
iS5Comm(config-router)# distribute-list route-map rmap-test in
855
IP RIP
CHAPTER 25 RIP
25.7. ip rip
For RIP- related configuration, use the command ip rip in VLAN Interface Configuration Mode. The no
form of this command deletes the RIP related configuration or sets all configured values to default.
ip rip
ip rip
{auth-type {md5 | sha-1 | sha-256 | sha-512}
| authentication {key-chain <key-chain-name (16)>
| key-id <integer (0-255)> key <key string(16)>
| mode {md5 [key <key string(16)>] | text [key <key string(16)>]}
| default route {install | originate <metric(1-15)>}
| key-id <key-id (0-255)> {start-accept <key> | start-generate <key> |
stop-accept <key> | stop-generate <key>}
| receive version {1 [2] |2 [1] | none}
| send [demand] {version {1 [2] |2 [1] | none}
| summary-address <ip-address> <mask>
}
no ip rip
no ip rip
{authentication {key-chain <key-chain-name (16)> | key-id <integer (0-255)>
| mode}
| default route {install | originate}
| receive version | send version | summary-address <ip-address> <mask>
}
856
IP RIP
CHAPTER 25 RIP
Parameters
857
IP RIP
CHAPTER 25 RIP
mode Integer Enter to configure the authentication mode for RIP version 2. The
default is None (No authentication is set)
md5 Enter to set the authentication type as keyed MD5.
key Enter to configure the authentication key as keyed MD5.
<key Enter a value for the authentication key - a string of size 16. If a
string(16)> string shorter than 16 octets is supplied, it will be left- justified and
padded to 16 octets, on the right, with nulls (0x00).This command
is a standardized implementation of the existing command “ip rip
authentication mode - key-chain”. It operates similar to the existing
command.
text Enter to set the authentication type as keyed message digest 5
(MD5) authentication mechanism.
key Enter to configure the authentication key as simple text.
<key Enter a value for the authentication key - a string of size 16. If a
string(16)> string shorter than 16 octets is supplied, it will be left- justified and
padded to 16 octets, on the right, with nulls (0x00).This command
is a standardized implementation of the existing command “ip rip
authentication mode - key-chain”. It operates similar to the existing
command.
default Enter to install the default route received in updates to the RIP
database. By default, the default route origination is disabled. Only
the configurations that are done after associating the IP address of
the VLAN interface / router port with the RIP routing process are
applied to the RIP.
route Enter to install the default route received in updates to the RIP
database.
install Enter to install the default route received in updates to the RIP
database.
originate Enter to set the metric to be used for default route propagated over
the VLAN interface / router port in a RIP update message and
generate a default route into RIP.
<metric(1-15)> Integer Enter a value for the metric to be used for default route propagated
over the VLAN interface / router port in a RIP update message. The
metric value ranges between 1 and 15.
858
IP RIP
CHAPTER 25 RIP
key-id Enter to configure the time as created with the configured key
idwhen the router starts managing the packets.
NOTE: This command executes only if,
• RIP authentication mode is configured.
<Key-ID Integer Enter a value to configure the active authentication Key ID in the
(0-255)> interface. This value ranges from 0 to 255.
start-accept Enter to configure the time when the router will start accepting
packets that have been created with the configured key-id.
<key> Enter a value for the time when the router will start accepting
packets that have been created with the configured key-id. If the
value is not set then the current time (time at which authentication
key-id is configured) will be considered as start-accept time.
NOTE: For example, Tuesday May 26, 1992 at 1:30:15 PM should be
entered as, 1992-5-26,13:30:15 (YYYY-MM-DD,hh:mm:ss format).
start-generate Enter to configure the time when the router will start using this key
for packet generation.
<key> Enter a value for the time when the router will start using this key
for packet generation. If the value is not set then the current time
(time at which authentication key-id is configured) will be
considered as start-accept time.
NOTE: For example, Tuesday May 26, 1992 at 1:30:15 PM should be
entered as, 1992-5-26,13:30:15 (YYYY-MM-DD,hh:mm:ss format).
stop-generate Enter to configure the time when the router will stop using the key
for packet generation.
<key> Enter a value for the time when the router will top using the key for
packet generation. If the value is not set then the current time
(time at which authentication key-id is configured) will be
considered as start-accept time.
NOTE: For example, Tuesday May 26, 1992 at 1:30:15 PM should be
entered as, 1992-5-26,13:30:15 (YYYY-MM-DD,hh:mm:ss format).
stop-accept Enter to configure the time when the router will stop using the key
for packet generation.
<key> Enter a value for the time when the router will stop accepting OSPF
packets with specified key id. Stop accept value is configured in 24
hours format.
NOTE: For example, Tuesday May 26, 2013 at 1:30 PM should be
configured as, 26-May-2013,13:30
859
IP RIP
CHAPTER 25 RIP
860
IP RIP
CHAPTER 25 RIP
Mode
VLAN Interface Configuration Mode
Prerequisites
This command executes only if RIP is enabled in the switch.
Examples
iS5Comm(config)# int vlan 2
iS5Comm(config-if)# ip rip auth-type md5
iS5Comm(config-if)# ip rip authentication key-chain abc
iS5Comm(config-if)# ip rip authentication key-id 0 key key1
iS5Comm(config-if)# ip rip authentication mode text
iS5Comm(config-if)# ip rip default route originate 10
iS5Comm(config-if)# ip rip key-id 0 start-accept 2014-07-22,12:26:30
861
IP RIP
CHAPTER 25 RIP
25.8. ip rip
To configure the security level of the RIP in the system to accept / ignore RIPv1 packets when authenti-
cation is in use and determine the retransmission timeout interval and number of retries to retransmit
the update request packet or an unacknowledged update response packet, use the command ip rip in
RIP Router Configuration Mode. The no form of the command resets the security level, retransmission
timeout interval, or the number of retransmission retries to their default values.
ip rip
ip rip
{retransmission {interval <timeout-value (5-10)> | retries <value (10-40)>}
| security {minimum | maximum}
no ip rip
no ip rip {retransmit {interval | retries} | security}
862
IP RIP
CHAPTER 25 RIP
Parameters
Mode
RIP Router Configuration Mode
Examples
iS5Comm(config)# router rip
iS5Comm(config-router)# ip rip retransmission retries 30
iS5Comm(config-router)# ip rip security minimum
863
IP SPLIT-HORIZON
CHAPTER 25 RIP
25.9. ip split-horizon
To enable the split horizon updates for the RIP, which prevents the routing loops in distance routing
protocol, by prohibiting the router from advertising a route back onto the interface, use the command
ip split-horizon in VLAN Interface Configuration Mode.
ip split-horizon
ip split-horizon [poisson]
Parameters
Mode
VLAN Interface Configuration Mode
Default
Split horizon with poison reverse is enabled.
Examples
iS5Comm(config)# int vlan 2
iS5Comm(config-if)# ip split-horizon
25.10. neighbor
To add a trusted neighbor router with which routing information can be exchanged and from which RIP
packets can be accepted, use the command neighbor in RIP Router Configuration Mode. This command
permits the point-to-point (nonbroadcast) exchange of routing information. When used in combination
with the passive-interface vlan, router configuration command, routing information can be exchanged
between a subset of routers an access servers. On a LAN, multiple neighbor commands can be used to
specify additional neighbors or peers. The no form of the command deletes a trusted neighbor router.
864
NETWORK
CHAPTER 25 RIP
neighbor
neighbor <ip-address>
Parameters
Mode
RIP Router Configuration
Examples
iS5Comm(config)# router rip
iS5Comm(config-router)# neighbor 10.0.0.5
25.11. network
To enable RIP on a primary IP network or a secondary IP network or an unnumbered VLAN interface /
router port, use the command network in RIP Router Configuration Mode. It configures a list of networks
for the RIP routing process. RIP routing updates will be sent and received only through the specified inter-
faces on this network. If an interface's network is not specified, then the network will not be advertised
in any RIP update. This should be configurable for Primary and Secondary IP address. The no form of the
command disables RIP on a primary IP network or a secondary IP network or an unnumbered VLAN inter-
face / router port
network
network <ip-address> [unnum {vlan <vlan-id/vfi-id> [switch <switch name>]
| <iftype> <ifnum>}]
no network
no network <ip-address> [unnum {vlan <vlan-id/vfi-id> [switch <switch name>]
| <iftype> <ifnum>}]
865
NETWORK
CHAPTER 25 RIP
Parameters
866
OUTPUT-DELAY
CHAPTER 25 RIP
Mode
RIP Router Configuration
Examples
iS5Comm(config-router)# network 12.0.0.1
25.12. output-delay
To enable interpacket delay for RIP updates, where the delay is in milliseconds between packets in a
multiple-packet RIP update, use the command output-delay in RIP Router Configuration Mode. This
interpacket delay feature helps in preventing the routing table from losing information due to flow of RIP
update from a high speed router to low speed router. The no form of the command disables interpacket
delay for RIP updates.
867
PASSIVE-INTERFACE
CHAPTER 25 RIP
output-delay
output-delay <milli-seconds (8-50)>
no output-delay
no output-delay
Parameters
<milli-seconds Enter a value for the interpacket delay. The delay between packets
(8-50)> in a multiple-packet RIP update is in milliseconds and can range
between 8 to 50 milliseconds.
Mode
RIP Router Configuration Mode
Default
Disabled (Interpacket delay feature is disabled).
Examples
iS5Comm(config)# router rip
iS5Comm(config-router)# output-delay 10
25.13. passive-interface
To suppress the RIP routing updates on a specified VLAN interface in a defined L2 switch context / default
context or on a specified router port, use the command passive-interface in RIP Router Configuration
Mode. It denotes that the RIP process runs in a passive VLAN interface / passive router port. If the
sending of routing updates is disabled on an interface, the particular subnet will continue to be adver-
tised to other interfaces, and updates from other routers on that interface continue to be received and
processed. The no form of the command restricts suppressing of RIP routing updates from an interface.
868
PASSIVE-INTERFACE
CHAPTER 25 RIP
passive-interface
passive-interface {vlan <vlan-id/vfi-id> [switch <switch-name>] | <inter-
face-type> <interface-id>}
no passive-interface
no passive-interface {vlan <vlan-id/vfi-id> [switch <switch-name>] | <inter-
face-type> <interface-id>}
869
PASSIVE-INTERFACE
CHAPTER 25 RIP
Parameters
870
REDISTRIBUTE
CHAPTER 25 RIP
Mode
RIP Router Configuration Mode
Prerequisites
This command executes only if RIP is enabled on an IP network.
Examples
iS5Comm(config)# router rip
iS5Comm(config-router)# passive-interface vlan 55
25.14. redistribute
To enable RIP to participate in route redistribution, use the command redistribute in RIP Router Config-
uration Mode. When enabled, RIP starts advertising the routes learned by other protocols. The no form
of the command disables RIP to participate in route redistribution. When disabled, RIP will stop redistri-
bution of routes but will continue to send updates to the .
redistribute
redistribute {all | connected | ospf | static} [route-map <string (1-20)>]
no redistribute
no redistribute {all | connected | ospf} [route-map <string (1-20)>]
871
REDISTRIBUTE
CHAPTER 25 RIP
Parameters
all Enter to specify that all routes have to be imported from the RIP. It
redistributes all routes that are learnt into RIP process.
Enter to configure redistribution of directly connected networks routes into
connected OSPF routing process.
ospf Enter to import routes learnt in the OSPF routing process.
static Enter to import static routes.
Enter to identify the specified route-map in the list of route-maps.
route-map NOTE: Redistribution can be configured for only one route map. Another
route map can be assigned, only if the already assigned route map is
disabled.
Enter a name for a route map. This is a string with maximum size of 20.
<string(1
-20)>
Mode
RIP Router Configuration Mode
Default
By default, route redistribution is disabled.
Examples
Example 1
iS5Comm(config)# router rip
iS5Comm(config-router)# redistribute all
Example 2
iS5Comm(config)# router rip
iS5Comm(config-router)# redistribute ospf
iS5Comm(config-router)# redistribute connected
NOTE: the redistribute connected command is required when we want to redistribute OSPF to RIP.
872
RIP
CHAPTER 25 RIP
To redistribute OSPF to RIP, we need to redistribute the connected networks. To filter the connected
networks to allow only the required ones, perform the following commands:
iS5Comm(config)# router rip
iS5Comm(config-router)# redistribute ospf
iS5Comm(config-router)# redistribute connected route-map FILTER
SW2:
iS5Comm(config)# interface gigabitethernet 0/1
iS5Comm(config-if)# ip rip default route install
iS5Comm(config-if)# ip rip default route originate 1
25.15. rip
To set the flag to decide whether the last authentication key on expiry should have its lifetime as infinite
or not, use the command rip in Global Configuration Mode.
rip
rip authentication last-key infinite lifetime {true | false}
873
ROUTER RIP
CHAPTER 25 RIP
Parameters
Mode
Global Configuration Mode
Default
true
Examples
iS5Comm(config)# rip authentication last-key infinite lifetime true
router rip
router rip
874
SHOW IP RIP
CHAPTER 25 RIP
no router rip
no router rip
Mode
Global Configuration Mode
Default
Router rip is disabled.
Examples
iS5Comm(config)# router rip
iS5Comm(config-router)#
show ip rip
show ip rip {database [<ip-address> <ip-mask>] | statistics | authentica-
tion}
875
SHOW IP RIP
CHAPTER 25 RIP
Parameters
database Enter for display the RIP protocol database details for all RIP
interface entry or for entry with the specified IP address and IP
mask.
<ip-address> Enter to specify an IP address to be displayed.
<ip-mask> Enter to specify an IP mask to be displayed.
statistics Enter to display the RIP statistics on the router.
authentication Enter to display the authentication related information configured
for the RIP Interface entry. The authentication information
includes the Authentication type, authentication key IDs
configured & its associated lifetime values.
Mode
Privileged EXEC Mode
Examples
iS5Comm # show ip rip database
12.0.0.0/8 [1] auto-summary
12.0.0.0/8 [1] directly connected, vlan1
15.0.0.0/8 [3] auto-summary
15.0.0.0/8 [3] directly connected, vlan2
20.0.0.0/8 [4] auto-summary
20.0.0.0/8 [4] via 12.0.0.2, vlan1
12.0.0.0/8 [1] auto-summary
12.0.0.0/8 [1] directly connected, vlan2
iS5Comm# show ip rip statistics
RIP Global Statistics:
----------------------
Total number of route changes is 1
Total number of queries responded is 1
Total number of dropped packets is 0
RIP Interface Statistics:
-------------------------
Interface Periodic BadRoutes Triggered BadPackets Admin
IP Address Updates Sent Received Updates Sent Received Status
876
TIMERS BASIC
CHAPTER 25 RIP
timers basic
timers basic <update-interval (10-3600)> <invalid(30-500)> <holddown
(10-3600)> <flush(120-180)> <sleep(10-3600)>
877
VERSION
CHAPTER 25 RIP
Parameters
Integer Enter a value to configure the time interval (in seconds) at which the
<update-inte RIP updates should be sent. This is the fundamental timing parameter
rval(10-3600 of the routing protocol. This value ranges from 10 to 3600 seconds.
)>
Integer Enter a value to configure the time (in seconds) after which the route
<invalid(30- entry is put into garbage collect (that is, marked as invalid). This value
500)> ranges from 30 to 500 seconds.
<holddown Integer Enter a value to configure the time (in seconds) during which the
(10-3600)> routing information regarding better paths is suppressed. This value
ranges from 10 to 3600 seconds.
Integer Enter a value to configure the time (in seconds) after which the route
<flush(120-1 entry marked as invalid is deleted. The advertisements of this entry is
80)> set to INFINITY while sending to others. This value ranges from 120 to
180 seconds.
Integer Enter a value to configure the time interval (in milliseconds) for
<sleep(10-36 postponing routing updates in the event of a flash update. This value
00)> ranges from 10 to 3600 milliseconds.
Mode
Interface Configuration Mode
Default
• update-value - 30
• invalid-value - 180
• flush-value - 120
Examples
iS5Comm(config-if)# timers basic 360 300 130 3000 125 3000
25.19. version
To set the global version of RIP, use the command version in RIP Router Configuration Mode. The
command is used in conjunction with the redistribute router command to cause the current routing
protocol to use the same metric value for all redistributed routes. The no form of the command sets the
878
VERSION
CHAPTER 25 RIP
RIP global version to its default value. This command is a complete standardized implementation of the
existing commands and operates similarly to that of the commands ip rip send version and ip rip receive
version.
version
version {1 [2] |2 [1] | none}
no version
no version
Parameters
Mode
RIP Router Configuration Mode
Default
1 and 2
Prerequisites
Only the configurations that are done after associating the IP address of the VLAN interface / router port
with the RIP routing process are applied to the RIP.
Examples
iS5Comm(config)# router rip
iS5Comm(config-router)# version 1
879
ADDRESS-FAMILY
CHAPTER 26 BGP
BGP
26. BGP
BGP (Border Gateway Protocol) is used to build an AS connectivity graph that is used to prune routing
loops and enforce policies at AS level.
The following sections outline all BGP-related CLI commands.
26.1. address-family
To facilitate entering of the router in the Address-family Router Configuration Mode and to enable
configuration of the session that carries standard vpnv4 address prefixes and enters into VPN Address
Family Configuration Mode, use the command address-family in BGP Router Configuration Mode.
Routing information is advertised for IPv4 address family when a BGP session is configured, unless the
default advertising is reset. The no form of the command deletes the peers belonging to the IPv4, IPv6
and VPNv4 address family.
address-family
address-family [ipv4 | ipv6 |l2vpn] | vpnv4
no address-family
no address-family [ipv4 | ipv6 |l2vpn] | vpnv4
880
AGGREGATE-ADDRESS
CHAPTER 26 BGP
Parameters
ipv4 Enter to configure a session that carries standard IPv4 address prefixes.
ipv6 Enter to configure a session that carries standard IPv6 address prefixes.
l2vpn Enter to configure a session that carries L2VPN VPLS address prefixes.
vpnv4 Enter to enable configuration of the session that carries standard vpnv4
address prefixes and enters into VPN Address Family Configuration Mode.
Mode
BGP Router Configuration Mode
Notes
BGP4 VPN allows the Service Providers to use their IP backbone to provide VPN services to their
customers. BGP is used to distribute VPN routing information across the provider’s backbone and MPLS
is used to forward VPN traffic from one VPN site to another.
Examples
iS5Comm (config-router)# address-family ipv4
iS5Comm(config-router-af4)#
iS5Comm (config-router)# address-family vpnv4
iS5Comm(config-router-afvpnv4)#
26.2. aggregate-address
To create an aggregate entry in a BGP or multiprotocol BGP routing table if any more-specific BGP or
multiprotocol BGP routes are available that fall in the specified range, use the command aggre-
gate-address in BGP Router Configuration Mode. The entries in the table specifies the IP address based
on which the routing information has to be aggregated. The aggregate route will be advertised as coming
from autonomous system. The atomic aggregate attribute will be set only if some of the information in
the AS PATH is missing in the aggregated route, else it will not be set.The no form of the command
deletes the specified entry from the aggregate table.
881
AGGREGATE-ADDRESS
CHAPTER 26 BGP
aggregate-address
aggregate-address index <1-100> <ip-address> <prefixlen> [summary-only]
[as-set] [suppress-map map-name] [advertise-map map-name] [attribute-map
map-name]
no aggregate-address
no aggregate-address index <1-100>
882
AGGREGATE-ADDRESS
CHAPTER 26 BGP
Parameters
883
BGP
CHAPTER 26 BGP
[attribute-map Enter to specify the name of the route map used to form the
map-name] attribute of the aggregate route. The route map contains the rules
for setting the attributes for the aggregated route. When
attribute-map and advertise-map along with autonomous system
set path information are enabled and other configurations, the
attribute-map overrides the attribute that is formed with the
routes selected by the advertise-map.. This value is a string with a
maximum length of 200
Mode
BGP Router Configuration Mode
Notes
The IP address and the prefix length can be configured, only if the Aggregate admin status of the BGP is
down.
Examples
iS5Comm(config-router)# aggregate-address index 1 21.1.0.0 16 summary-only
26.3. bgp
For BGP-related configuration, use the command bgp in BGP Router Configuration Mode. For options,
see the Parameters section below.
884
BGP
CHAPTER 26 BGP
bgp
bgp
{always-compare-med
| asnotation dot
| bestpath med dot
| client-to-client reflection
| cluster-id <cluster id value> <ip_addr(A.B.C.D)>
| comm-filter <comm-value(4294967041-4294967043,65536-4294901759)> <permit
| deny> <in | out>
| comm-policy <ip-address> <prefixlen> <set-add | set-none | modify>
| comm-route {additive | delete} <ip-address> <prefixlen> comm-value
<4294967041-4294967043,65536-4294901759>
| confederation {identifier <AS no> | peers <AS no>}
| dampening <HalfLife-Time(600-2700)> <Reuse-Value(100-10800)>
<Suppress-Value(2000-3999)> <Max-Suppress-Time(1800-10800)>
| default {ipv4-unicast | local-preference <Local Pref Value
(0-2147483647)>}
| ecomm-filter <ecomm-value(xx:xx:xx:xx:xx:xx:xx:xx)> <permit | deny> <in |
out>
885
BGP
CHAPTER 26 BGP
no bgp
no bgp
{always-compare-med
| asnotation dot
| client-to-client reflection | cluster-id <cluster id value>
<ip_addr(A.B.C.D)>
| comm-filter <comm-value(4294967041-4294967043,65536-4294901759)> <permit
| deny> <in | out>
| comm-policy <ip-address> <prefixlen>
| comm-route {additive | delete} <ip-address> <prefixlen> comm-value
<4294967041-4294967043,65536-4294901759>
| confederation {identifier | peers <AS no>}
| dampening
| default {ipv4-unicast | local-preference
| ecomm-filter <ecomm-value(xx:xx:xx:xx:xx:xx:xx:xx)> <permit | deny> <in |
out>
| ecomm-policy <ip-address> <prefixlen> | ecomm-route
| graceful-restart [restart-time] [stalepath-time]
886
BGP
CHAPTER 26 BGP
887
BGP
CHAPTER 26 BGP
Parameters
888
BGP
CHAPTER 26 BGP
cluster-id Enter to configure the Cluster ID for the Router Reflector of the BGP
cluster which has more than one route reflector. Usually in a cluster
of clients with single route reflector the cluster is identified by the
router ID of the route reflector. In order to increase redundancy and
avoid a single point of failure, a cluster might have more than one
route reflector. In this case, all route reflectors in the cluster must be
configured with the 4-byte cluster ID so that a route reflector can
recognize updates from route reflectors in the same cluster. The no
form of the command resets the Cluster ID for the Route Reflector.
cluster id Enter a value for the Cluster ID. It ranges from 1 to 4294967295.
value
ip_address/int Enter a value for the Cluster ID.
eger
comm-filter Enter to allow/ filter the community attribute while receiving or
advertising. The rules to filter out the updates are based on the AS
from which it is received, NLRI and AS through which it had passed.
The no form of the command removes the filter policy for the
community attribute.
comm-value(429 Enter to configure the community attribute value.
4967041-429496
7043,65536-429
4901759
deny Enter to filter routes containing the community attribute value in
received or advertised updates.
permit Enter to allow a particular community attribute to be received or
advertised in updates. This is the default option.
in Enter to configure the direction of route-updates on which the
community filter policy needs to be applied as in. This indicates that
the community filter needs to be applied on received routes.
out Enter to configure the direction of route-updates on which the
community filter policy needs to be applied as out. This indicates
that the community filter needs to be applied on routes advertised
to peers.
comm-policy Enter to configure the community attribute advertisement policy for
specific destination. The no form of the command removes the
community attribute advertisement policy for specific destination.
<ip-address> Enter to configure the route prefix on which community policy
needs to be applied.
889
BGP
CHAPTER 26 BGP
<prefixlen> Enter to configure the IP prefix length for the destination. These bits
are common among all hosts within a network. This value ranges
from 1 to 32.
set-add Enter to send only the configured additive communities with
associated route.
set-none Enter to send the associated route without any communities.
modify Enter to remove the associated route with received delete
communities and to add the configured additive communities.
comm-route Enter to configure an entry in additive or delete community table for
a given destination. The no form of the command removes the entry
from additive or delete community table
additive Enter to add an associated community value with the already
existing communities in the route update.
delete Enter to remove the community attribute from the route-prefix
when it passes through the filter process.
<ip-address> Enter to configure the Route prefix on which community policy
needs to be applied.
<prefixlen> Enter to configure the IP prefix length for the destination. These bits
are common among all hosts within a network. This value ranges
from 1 to 32.
comm-value Enter to configure the community attribute value. This value ranges
<4294967041-429 from 4294967041 to 4294967043 or from 65536 to 4294901759.
4967043,65536-4
294901759>
confederation Enter to configure the BGP confederation to which the AS belong to.
890
BGP
CHAPTER 26 BGP
identifier <AS Enter to configure the BGP confederation identifier for the
no> confederation to which the autonomous systems belong to. This
value ranges from 1 to 4294967295 or 0.1 to 65535.65535. The no
form of the command removes the configured BGP confederation
identifier and resets the identifier to its default value.
NOTE: If this value is already configured to a non-zero value, it must
be reset to zero (using no form of the command) before reconfig-
uring.
NOTE: When four-bit-asn is enabled, This value ranges from 1 to
4294967295or between 0.1 and 65535.65535.
NOTE: When four-bit-asn is disabled, This value ranges from 1 to
65535. or between 0.1 and 0.65535
NOTE: When bgp asnotation is enabled, the AS number of the BGP
Speaker is displayed in the range 0.1 to 65535.65535
peers <AS no> Enter to configure the ASs that are visible internally to a
confederation. Each autonomous system is fully meshed within
itself. This value ranges from 1 to 4294967295 or 0.1 to
65535.65535. By default, no AS will be added to the confederation.
The no form of the command removes the Autonomous Systems
from the confederation.
NOTE: When four-bit-asn is enabled, This value ranges from 1 to
4294967295or between 0.1 and 65535.65535.
NOTE: When four-bit-asn is disabled, This value ranges from 1 to
65535. or between 0.1 and 0.65535
NOTE: When bgp asnotation is enabled, the AS number of the BGP
Speaker is displayed in the range 0.1 to 65535.65535
dampening Enter to enable the BGP dampening parameters. The no form of the
command disables the BGP dampening feature but does not reset
the other configured RFD parameters
<HalfLife-Time Enter to configure the time (in seconds) after which a penalty is
(600-2700)> decreased by half. Once a route has been assigned a penalty, the
penalty is decreased for every 5 seconds. BGP’s route flap damping
algorithm calculates penalty for each routes. This penalty increases
by a fixed value when a flap occurs, and decreases exponentially
when the route is stable. This value ranges from 600 to 270.
891
BGP
CHAPTER 26 BGP
<Reuse Value Enter to configure the reuse value. If the penalty for a flapping route
(100-10800)> falls below this value, the route is re-used. The unsuppressing of
routes occurs at 10-second increments. This value ranges from 100
to 10800.
NOTE: Reuse value can be configured only if the HalfLife Time value is
set.
<Suppress Enter to configure the suppress value. The route is suppressed if the
Value penalty associated with the route exceeds this value. This value
(2000-3999)> ranges from 2000 to 3999.
NOTE: Suppress value can be configured only if the HalfLife Time and
Reuse value are set.
<Max-Suppress Enter to configure the maximum time (in seconds) a route can be
Time suppressed. This value ranges from 1800 to 10800.
(1800-10800) NOTE: Max-Suppress Time can be configured only if the HalfLife Time,
Reuse Value and Suppress Value are set.
default Enter for BGP default information configuration.
ipv4-unicast Enter for IPv4 unicast feature configuration for default routing.
local-preferen Enter to configure the default local preference value that is to be
ce sent in updates to internal peers. The preference is sent to all
routers and access servers in the local autonomous system. The no
form of the command resets the default local preference to its
default value.
<Local Pref Enter a default local preference value that is to be sent in updates to
Value> internal peers. This value ranges from 0 to 2147483647.
ecomm-filter Enter to allow/ filter the extended community attribute while
receiving or advertising. The no form of the command removes the
filter policy for the extended community attribute.
<ecomm-value(x Enter to configure the extended community value. This is an octet
x:xx:xx:xx:xx: string value in the form xx:xx:xx:xx:xx:xx:xx:xx.
xx:xx:xx)>
deny Enter to deny the route-update with the associated extended
community value to pass the filter test. This is the default option.
permit Enter to allow the route -update with the associated extended
community value to pass the filter test.
in Enter to configure the incoming direction of applied filter.
out Enter to configure the outgoing direction of applied filter.
892
BGP
CHAPTER 26 BGP
893
BGP
CHAPTER 26 BGP
894
BGP
CHAPTER 26 BGP
remote-as <AS Enter to configure the remote Autonomous system number for
no> which the local preference is associated. This value ranges from 1 to
4294967295 or 0.1 to 65535.65535. The no form of the command
removes the configured BGP confederation identifier and resets the
identifier to its default value.
NOTE: When four-bit-asn is enabled, This value ranges from 1 to
4294967295or between 0.1 and 65535.65535.
NOTE: When four-bit-asn is disabled, This value ranges from 1 to
65535. or between 0.1 and 0.65535
NOTE: When bgp asnotation is enabled, the AS number of the BGP
Speaker is displayed in the range 0.1 to 65535.6553.
A value of zero indicates that this entry is not valid and will not be
matched for when the Local Pref value for an update is calculated
<ip-address> Enter to configure the route prefix in the Network Layer Reachability
Information on which local-preference policy needs to be applied.
The input route ip address can be an ipv4 or an ipv6 address.
<prefixlen> Enter to configure the number of high-order bits in the IP address.
These bits are common among all hosts within a network. This value
ranges from 0 to 32 for ipv4 address and 0 to 128 for ipv6 address.A
value of zero indicates that the entry is not valid and will not be
matched for when the Local Pref value for an update is calculated.
intermediate-a Enter to configure the sequence of intermediate AS numbers
s<AS-no list- through which the route update is expected to travel or a Comma
AS1,AS2,...> separated list of AS numbers that are to be checked against the
AS_PATH attribute of the updates. This value is a list with the
maximum size as 100.
value <value> Enter to configure the local-preference value that needs to be
associated with the route-update. This value ranges from 0 to
2147483647.
direction Enter to specify the direction of the application of local-preference
policy with which the entry is to be associated.
in Enter to indicate a received route-update with other matching
attributes such as as-number, intermediate-as numbers.
out Enter to indicate a route-update that needs to be advertised to peer.
override Enter to configure an entry in the local preference table. This table
contains the value that is to be assigned to the local preference
attribute.
895
BGP
CHAPTER 26 BGP
med Enter to configure an entry in BGP4 MED Table and contains the
MED values that are to be assigned to routes. The no form of the
command deletes the entry from MED Table, BGP4 MED table. The
entry will not be matched when the MED value for an update is
calculated, if the prefix length is set as zero.The defaults are as
follows:
• remote-as - 0
• prefixlen - 0
• direction - in
• value - 0
<1-100> Enter a value for the entry containing information about the MED
value—it ranges from1 to 100.
remote-as <AS Enter to configure the remote Autonomous system number that
no> identifies the BGP router to other routers and tags the routing
information passed along. This value ranges from 1 to 4294967295
or 0.1 to 65535.65535. The no form of the command removes the
configured BGP confederation identifier and resets the identifier to
its default value.
NOTE: When four-bit-asn is enabled, This value ranges from 1 to
4294967295or between 0.1 and 65535.65535.
NOTE: When four-bit-asn is disabled, This value ranges from 1 to
65535. or between 0.1 and 0.65535
NOTE: When bgp asnotation is enabled, the AS number of the BGP
Speaker is displayed in the range 0.1 to 65535.6553.
A value of zero indicates that this entry is not valid and will not be
matched for when the Local Pref value for an update is calculated
<ip-address> Enter to configure the route-prefix IPv4 and IPv6 on which MED
policy needs to be applied.
<prefixlen> Enter to configure the number of high-order bits in the IP address.
This is the length of the IP address prefix in the Network Layer
Reachability Information (NLRI) field. These bits are common among
all hosts within a network. This value ranges from 0 to 32 for ipv4
address and 0 to 128 for ipv6 address. A value of zero indicates that
this entry is not valid and will not Be matched for when the MED
value for an update is calculated.
896
BGP
CHAPTER 26 BGP
897
BGP
CHAPTER 26 BGP
898
BGP
CHAPTER 26 BGP
<1-100> Enter a value for the entry containing information about the updates
that are to be filtered—it ranges from 1 to 100.
deny Enter to filter the routes when passing through filter policy test.
permit Enter to allow the route to pass filter policy test.
remote-as <AS Enter to configure the remote Autonomous system numberthat
no> identifies the BGP router to other routers and tags the routing
information passed along. This value ranges from 1 to 4294967295
or 0.1 to 65535.65535. The no form of the command removes the
configured BGP confederation identifier and resets the identifier to
its default value.
NOTE: When four-bit-asn is enabled, This value ranges from 1 to
4294967295or between 0.1 and 65535.65535.
NOTE: When four-bit-asn is disabled, This value ranges from 1 to
65535. or between 0.1 and 0.65535
NOTE: When bgp asnotation is enabled, the AS number of the BGP
Speaker is displayed in the range 0.1 to 65535.6553.
A value of zero indicates that this entry is not valid and will not be
matched for when the Local Pref value for an update is calculated
<ip-address> Enter to configure the route prefix IPv4 and IPv6 in the Network
Layer Reachability Information on which the filter policy needs to be
applied.
<prefixlen> Enter to configure the number of high-order bits in the IP address.
These bits are common among all hosts within a network. This value
ranges from 0 to 32.
intermediate-a Enter to configure the sequence of intermediate AS numbers
s<AS-no list- through which the route update is expected to travel or a Comma
AS1,AS2,...> separated list of AS numbers that are to be checked against the
AS_PATH attribute of the updates. This value is a list with the
maximum size as 100.
direction Enter to specify the direction of the application of filters with which
the entry is to be associated.
in Enter to indicate a received route-update with other matching
attributes such as as-number, intermediate-as numbers.
out Enter to indicate a route-update that needs to be advertised to a
peer.
899
BGP
CHAPTER 26 BGP
Mode
BGP Router Configuration Mode
Examples
iS5Comm (config-router)# always-compare-med
iS5Comm (config-router)# bgp asnotation dot
iS5Comm (config-router)# bgp client-to-client reflection
iS5Comm (config-router)# bgp bestpath med confed
iS5Comm (config-router)# bgp cluster-id 10.0.0.1
iS5Comm (config-router)# bgp comm-filter 75100 deny in
iS5Comm (config-router)# bgp comm-policy 24.5.0.0 10 set-none
iS5Comm (config-router)# bgp comm-route additive 24.5.0.0 16 comm-value 429490
iS5Comm (config-router)# bgp confederation identifier 1000
iS5Comm (config-router)# bgp confederation peers 100
iS5Comm (config-router)# bgp dampening 1000 300 2000 5000
iS5Comm (config-router)# bgp ecomm-filter 01:01:22:33:23:43:44:22 deny in
iS5Comm (config-router)# bgp comm-policy 24.5.0.0 10 set-none
iS5Comm (config-router)# bgp ecomm-route additive 12.0.0.0 2 ecomm-value 01:01:22:33:44:55:66:77
iS5Comm (config-router)# bgp graceful-restart restart-time 33 stalepath 789
iS5Comm (config-router)# bgp local-preference 5 remote-as 200 21.3.0.0 16 intermediate-as 150 value
250 direction out override
iS5Comm (config-router)# bgp med 5 remote-as 200 212.23.45.0 24 intermediate-as 150 value 50 direc-
tion in override
iS5Comm (config-router)# bgp nonbgproute-advt both
iS5Comm (config-router)# bgp redistribute-internal
iS5Comm (config-router)# bgp router-id 10.0.0.1
iS5Comm (config-router)# bgp trap enable
iS5Comm (config-router)# bgp update-delay 90
iS5Comm (config-router)# bgp update-filter 6 deny remote-as 145 72.93.0.0 14 intermediate-as 150
direction in
900
CLEAR IP BGP
CHAPTER 26 BGP
901
CLEAR IP BGP
CHAPTER 26 BGP
Parameters
dampening Enter to clear the dampening related configuration for the BGP.
<random_str> Enter to clear the dampening information for the specified
ipv4/ipv6 address.
<num_str> Enter to specify the prefix length of the route. This value ranges
from 0 to 128.
* Enter to reset all BGP peers.
<AS no> Enter to clear peers with the specified AS number. This value
ranges from 1 to 4294967295 or 0.1 to 65535.65535.
NOTE: When four-bit-asn is enabled, This value ranges from 1 to
4294967295 or between 0.1 and 65535.65535
NOTE: When four-bit-asn is disabled, This value ranges from 1 to
65535 or between 0.0 and 0.65535
NOTE: When bgp asnotation is enabled, the AS number of the BGP
Speaker is displayed in the range 0.1 to 65535.65535.
external Enter to clear all external peers.
ipv4 Enter to reset the bgp connection dynamically for all ipv4 address
family peers.
ipv6 Enter to reset the bgp connection dynamically for all ipv6 address
family peers
soft Enter to configure the Soft clear which is automatically assumed
when the route refresh capability is supported
in Enter to initiate inbound soft reconfiguration which causes the
software to store all received updates without modification
regardless of whether an update is accepted by the inbound policy
prefix-filter Enter to push out prefix-list ORF and initiates inbound soft
reconfiguration.
out Enter to initiate outbound soft configuration which does not have
any memory overhead and does not require any preconfiguration.
An outbound reconfiguration can be triggered on the other side of
the BGP session to make the new inbound policy take effect.
Mode
Privileged EXEC Mode
902
DEBUG IP BGP
CHAPTER 26 BGP
Examples
iS5Comm# clear ip bgp dampening 12.0.0.1 0
no debug ip bgp
no debug ip bgp
[peer | update | fdb | keep [prefix-filter] | in | out | damp | events | gr
| vpls | all]
Parameters
Enter a parameter to generate a debug statement for the trace code related to the specified parameter.
Mode
Privileged EXEC Mode
Examples
iS5Comm# debug ip bgp peer
26.6. default-information
To enable and control redistribution of default routes of a protocol or network into the BGP and adver-
tisement of the default route (0.0.0.0/0), use the command default-information in Global Configuration
Mode. The default route advertisement is possible only if the default route is present in the IP FDB or it
is received from any peers. The no form of the command disables redistribution and advertisement of
the default route. The default routes are not redistributed into BGP.
903
DEFAULT-METRIC
CHAPTER 26 BGP
default-information
default-information originate
no default-information
no default-information originate
Parameters
Mode
Global Configuration Mode
Default
Default Information Originate is disabled.
Examples
iS5Comm(config)# default-information originate
26.7. default-metric
To configure the default IGP metric value for routes redistributed into BGP with the redistribute
command, use the command default-metric in BGP Router Configuration Mode. A default metric can be
configured to solve the problem of redistributing routes with incompatible metrics. Assigning the default
metric will allow redistribution to occur. The no form of the command resets the Default IGP Metric value
to its default value 0. If configured to 0, the metric received from the IGP route will be used. If configured
to any other value, the MED value of the redistributed routes take this value. This value has no effect on
the Direct routes.
default-metric
default-metric <Default Metric Value(1-2147483647)>
904
DISTANCE
CHAPTER 26 BGP
no default-metric
no default-metric
<Default Metric Value(1-2147483647)>
Parameters
Mode
BGP Router Configuration Mode
Default
0
Examples
iS5Comm(config-router)# default-metric 300
26.8. distance
To configure the administrative distance value which is used as a preference parameter in IP for best
route selection, use the command distance in BGP Router Configuration Mode. Distance can be set for
only one route map. Another route map can be assigned, only if the already assigned route map is
disabled. The no form of the command disables the administrative distance.
distance
distance <1-255> [route-map <name(1-20)>]
no distance
no distance [route-map <name(1-20)>]
If Routemap is disabled
distance <1-255>
no distance
905
DISTRIBUTE-LIST
CHAPTER 26 BGP
Parameters
<1-255> Integer Enter a value for the administrative distance—it ranges from 1 to 255.
route-map Enter to configure the name of the route map for which the distance
value should be enabled and set.
<name(1-20)> Enter a name for the route map —a string with the maximum size as
20.
Mode
BGP Router Configuration Mode
Examples
iS5Comm (config-router)# distance 10 route-map rmap-test
26.9. distribute-list
To enable route map filtering for inbound or outbound routes and define the conditions for distributing
the routes from one routing protocol to another, use the command distribute-list in BGP Router Config-
uration Mode. Only one route map can be set for inbound or outbound routes. Another route map can
be assigned, only if the already assigned route map is disabled. The no form of the command disables
inbound filtering for the routes.
distribute-list
distribute-list route-map <name(1-20)> {in | out}
no distribute-list
no distribute-list
906
DO SHUTDOWN IP BGP
CHAPTER 26 BGP
Parameters
route-map Enter to enable route map filtering for inbound or outbound routes.
<name(1-20> Enter to specify the name of the route map to be used for filtering. This
value is a string with the maximum size as 20.
in Enter to set filtering for inbound routes.
out Enter to set filtering for outbound routes.
Mode
BGP Router Configuration Mode
Examples
iS5Comm (config-router)# distribute-list route-map rmap-test in
do shutdown ip bgp
do shutdown ip bgp
no shutdown ip bgp
no shutdown ip bgp
Mode
Global Configuration Mode
Examples
iS5Comm# do shutdown ip bgp
907
IP BGP
CHAPTER 26 BGP
26.11. ip bgp
To enable 4-byte ASN support in BGP speaker, configure the BGP speaker's policy for handling the over-
lapping routes, and enable synchronization between BGP and IGP, use the command ip bgp in Global
Configuration Mode. The no form of the command disables 4-byte ASN support in BGP, resets Overlap
route policy to its default values, and disables the synchronization between BGP and IGP.
ip bgp
ip bgp
{four-byte-asn | overlap-policy {more-specific | less-specific |both}
|synchronization}
no ip bgp
no ip bgp {four-byte-asn | overlap-policy |synchronization}
908
IP BGP
CHAPTER 26 BGP
Parameters
Mode
Global Configuration Mode
Default
4-byte ASN support —enabled
overlap-policy—both
Synchronization between BGP and IGP is disabled
909
LABEL-ALLOCATION-MODE
CHAPTER 26 BGP
Examples
iS5Comm(config)# ip bgp four-byte-asn
iS5Comm(config)# ip bgp overlap-policy more-specific
iS5Comm(config)# ip bgp synchronization
26.12. label-allocation-mode
To configure the label allocation policy used for allocating the VPN label to be used for advertising the
VPN routes, use the command label-allocation-mode in BGP Router Configuration Mode.
label-allocation-mode
label-allocation-mode {per-route}
Parameters
Mode
BGP Router Configuration Mode
Examples
iS5Comm (config-router)# label-allocation-mode per-route
26.13. maximum-paths
To set the BGP multipath count, use the command maximum-paths in BGP Router Configuration Mode.
This is the maximum number BGP multipath routes to be added per destination network in the routing
table. Note that this configuration is effective only after hard/soft reset. The no form of the command
resets the bgp multipath count to its default value.
maximum-paths
maximum-paths [{ibgp |eibgp}] <maximum path>
910
MAXIMUM-PATHS
CHAPTER 26 BGP
no maximum-paths
no maximum-paths [{ibgp |eibgp}]
Parameters
Default
1
Note
If the no command is executed without the parameter ibgp/eibgp , the maximum path count is set to the
default value 1 only for ebgp.
Mode
BGP Router Configuration Mode
Examples
iS5Comm (config-router)# maximum-paths eibgp 1
iS5Comm (config-router-af4)# maximum-paths ibgp 1
911
NEIGHBOR
CHAPTER 26 BGP
26.14. neighbor
To configure neighbor information, use the command neighbor in BGP Router Configuration Mode. The
no form of the commands is also available for the most of the parameters.
neighbor
neighbor {<ip-address | ip6-address>
gateway {<ip-address | ip6-address>
| network-address {<ip-address | ip6-address>
912
NEIGHBOR
CHAPTER 26 BGP
| password password-string
| peer-group {<ip-address | ip6-address>
| tcp-ao {mkt <Key ID (0-255)> | icmp-accept}
| update-source {<ip-address | ip6-address>}
| {<ip-address | ip6-address | peer-group-name>
allow-autostop
| as-override
| capability {ipv4-unicast | ipv6-unicast |route-refresh |orf prefix-list
{send | receive | both}}
| connect-retry-count <value(1-50)> | damp-peer-oscillations |
default-originate | delay-open
| ebgp-multihop [ttl <(1-255)>]
| fall-over bfd
| local-as <AS no>
| maximum-prefix <prefix-limit (1-2147483647)> | next-hop-self
| remote-as <AS no> [allow-autostart [idlehold-time <seconds(1-65535)>]]
| route-reflector-client
| send-community {both | standard | extended}
| shutdown
| timers {keepalive <(1-21845) seconds> | holdtime <(3-65535)seconds>
|delayopentime <(0-65535)seconds>}
| transport connection-mode <active | passive>
| {route-map <name(1-20)> | prefix-list <ipprefixlist_name(1-20)>} {in |
out}
| {advertisement-interval <seconds(1-65535)> | as-origination-interval
<seconds(1-65535)> | connect-retry-interval <seconds(1-65535)>}
| hold-advertised-routes
| peer-group
no neighbor
no neighbor
913
NEIGHBOR
CHAPTER 26 BGP
Parameters
<ip-address> Enter the BGP peer's IP address for which the configuration is
performed.
<ip6-address> Enter to configure the BGP peer's IPv6 address for which the
configuration is performed.
gateway Enter to configure gateway router’s address that will be used as
nexthop in the routes advertised to the peer. This ensures that the
traffic coming from this peer is routed through the gateway
configured. The no form of the command resets the configured
gateway router’s address. Note that this command executes only if
Peer is created and Peer AS is configured
network-address Enter to configure peer’s remote IPv6 network address for IPv4
peer and peer’s remote IPv4 network address for IPv6 peer. The
peer’s network address carries the IPv6 network address if the
peer’s remote-address is an IPv4 address. The peer’s network
address carries the IPv4 network address if the peer’s
remote-address is an IPv6 address.The no form of the command
resets network-address configured for the peer.
NOTE: This command executes only if Peer is created and Peer AS is
configured. The peer’s remote network address can be configured
only after configuring the peer’s remote address and the corre-
sponding local interface
password Enter to enables Message Digest 5 (MD5) authentication on a TCP
connection between two BGP peers where each segment sent on
the TCP connection between the peers is verified. The MD5
authentication must be configured with the same password on
both BGP peers; else, the connection between them will not be
made.This command executes only if Peer is created. The no form
of the command resets the TCP-MD5 password set for the peer. By
default, the MD5 password setting is disabled.
password-string Enter a TCP MD5 Authentication Password that has to be sent with
all TCP packets originated from the peer. This value is a string with
the maximum size as 80.
peer-group Enter to create a peer group with the specified peer group name.
<peer-group-nam Enter a peer group name - a string with the maximum size as 20.
e>
tcp-ao Enter for TCP-AO related configuration.
914
NEIGHBOR
CHAPTER 26 BGP
mkt Enter for configure the Key ID of the MKT which needs to be
associated with the peer.
<Key Id(0-255)> Enter a value for the Key ID of the MKT which needs to be
associated with the peer. This value ranges from 0 to 255.
icmp-accept Enter for action on ICMPv4 type 3 and ICMPv6 type 1 messages on
this peer session.
update-source Enter to configure the source-address for routing updates and
allows BGP sessions to use any operational interface for TCP
connection establishment with a peer. By default, the source
address is set as 0.0.0.0, and the TCP fills the source address of the
TCP session. The no form of the command disables configured
source-address for routing updates and for TCP connection
establishment with a peer.
allow-autostop Enter to enable the auto stop option to stop the BGP peer and BGP
connection automatically. This command executes only if Peer/
Peer Group is created and Peer AS is configured. By default, the
Auto stop option is disabled. The no form of this command disables
the auto stop option.
as-override Enter to configure the override capability for a CE Peer. This
command executes only if Peer/ Peer Group is created and Peer AS
is configured. By default, the override capability is disabled. The no
form of the command disables the override capability for the CE
peer.
capability Enter to enable the specific BGP capability to be advertised and
received from the peer. The no form of the command disables the
capability for the peer
ipv4-unicast Enter to set the IPv4 unicast address family capability.
ipv6-unicast Enter to set the MP IPv6 unicast address family capability.
route-refresh Enter to set the Route refresh capability.
orf prefix-list Enter to enable the address prefix-based Outbound Route Filter
(ORF) for the specified BGP peer group.
send Enter to enable ORF send capability.
receive Enter to enable ORF receive capability.
both Enter to enable both send and receive ORF Capability
915
NEIGHBOR
CHAPTER 26 BGP
connect-retry-c Enter to set the retry count for the BGP peer. This counter denotes
ount the number of times the BGP Peer should try to establish a
TCP-Connect issue with its neighboring peers. The default value for
the counter is set as 5. If the BGP Peer exceeds the maximum count
value, automatic stop event takes place and the BGP Peer is
brought down to the Idle State.This command executes only if Peer
/ Peer Group is created and Peer AS is configured. The no form of
the command resets the retry count of the BGP peer.
<value(1-50)> Enter a value for retry count for the BGP peer. This value ranges
from 1 to 50 with a default of 5.
damp-peer-oscil Enter to enable the damp peer oscillation option On implementing
lations this logic, it damps the oscillations of BGP peers in the face of
sequences of automatic start and automatic stop in the IDLE
state.5.
default-origina Enter to enable advertisement of the default route to the peer or
te neighbor for use as a default route. This command overrides the
global default route configuration and sends a default route to the
peer with self next-hop. The advertisement occurs irrespective of
the presence of default route in FDB. This command does not
require the presence of 0.0.0.0 in the local router. When used with
a route map, the default route 0.0.0.0 is injected if the route map
contains a match ip address clause. The route map can contain
other match clauses also.By default, the advertisement of default
route to the peer is disabled. This command executes only if Peer/
Peer Group is created and Peer AS is configured. The no form of the
command disables advertisement of the default route to the peer.
delay-open Enter to configure a delay in sending the first OPEN message to the
BGP peer for a specific time period. By default, the delay open
option is disabled. This command executes only if Peer/ Peer Group
is created and Peer AS is configured. The no form of the command
disables the delay open option.
916
NEIGHBOR
CHAPTER 26 BGP
917
NEIGHBOR
CHAPTER 26 BGP
<prefix-limit Enter a value for the maximum number of address prefixes that the
(1-2147483647)> BGP Peer is willing to accept from the neighbor. This value ranges
from 1 to 2147483647 with a default of 100.
next-hop-self Enter to configure the router as the next hop for BGP-speaking
neighbor or peer group and enables BGP to send itself as the next
hop for advertised routes. Administrator uses this command to
make BGP speaker fill its address when advertising routes to the
BGP peer. This command is useful in non-meshed networks where
BGP neighbors may not have direct access to all other neighbors on
the same IP subnet. This command executes only if Peer / Peer
Group is created and Peer AS is configured. The no form of the
command resets the peer nexthop-self status to default. The next
hop will be generated based on the IP address of the destination
and the present next hop in the route information..
remote-as Enter to create a peer and to initiate the connection to the peer
and adds an entry to the BGP or multiprotocol BGP neighbor table.
This specifies a neighbor with an autonomous system number that
identifies the neighbor as internal to the local autonomous system.
Otherwise, the neighbor is considered as external. By default,
neighbors that are defined using this command in router
configuration mode exchange only unicast address prefixes. The
administrator can create a peer and set the Peer AS number with
this command. The configured Peer AS number is compared with
the AS number received in the open message and a peer session is
initiated only if both the AS numbers matchThe no form of the
command disables the peer session and deletes the peer
information.
<AS no> Enter to configure the AS of the peer. This value ranges from 1 to
4294967295 or 0.1 to 65535.65535.
NOTE: When four-bit-asn is enabled, This value ranges from 1 to
4294967295 or between 0.1 and 65535.65535
NOTE: When four-bit-asn is disabled, This value ranges from 1 to
65535 or between 0.0 and 0.65535
NOTE: When bgp asnotation is enabled, the AS number of the BGP
Speaker is displayed in the range 0.1 to 65535.65535.
918
NEIGHBOR
CHAPTER 26 BGP
allow-autostart Enter to start the BGP session with the associated peer
automatically. The peer session is automatically started in the IDLE
state, after a BGP Peer session is brought down either by Autostop
or through reception of invalid BGP message. The BGP session is
automatically started after an interval specified by idle hold time.
By default, allow-autostart is disabled.
[idlehold-time Enter to configure the idle hold time. This specifies the length of
time the BGP peer is held in the Idle state prior to the next
automatic restart.
<seconds(1-6553 Enter a value for the idle hold time. This value ranges from 1 to
5)> 65535. by default, idlehold-time is 60 seconds.
NOTE: The IdleHoldTime can be configured only when the
allow-autostart is enabled.
NOTE: After each dampening, the value of the Idle Hold Time is
doubled consecutively.
route-reflector Enter to control client-to-client reflection and configures the
-client specified Peer as Client of the Route Reflector. All the neighbors
configured with this command will be members of the client group
and the remaining IBGP peers will be members of the nonclient
group for the local route reflector. This command executes only if
Peer is created. The no form of the command resets the Peer as
conventional BGP Peer.
send-community Enter to send community attribute to a BGP neighbor and to
enable advertisement of community attributes
(standard/extended) to peer. This command executes only if Peer/
Peer Group is created and Peer AS is configured. The no form of the
command disables advertisement of community attributes
(standard/extended) to peer.
both Enter to send both standard and extended communities to peer.
This is the default option.
standard Enter to send only standard communities to the peer.
extended Enter to send only extended communities to the peer.
919
NEIGHBOR
CHAPTER 26 BGP
shutdown Enter to disable the Peer session and terminates any active session
for the specified neighbor or peer group and removes all associated
routing information. In the case of a peer group, a large number of
peering sessions could be terminated suddenly. This command
executes only if Peer/ Peer Group is created and Peer AS is
configured. The no form of the command enables the Peer session
for the specified neighbor.
timers Enter to configure neighbor KeepAlive Time and Hold Time
Intervals and sets the timers for a specific BGP peer or peer group.
This command executes only if Peer/ Peer Group is created and
Peer AS is configured.
keepalive Enter to configure the keep alive interval (in seconds) or frequency
with keep alive messages are sent to its peer for the peer session.
<(1-21845) Enter a value for the keep alive interval. The keep-alive value must
seconds> always be less than the configured hold-time value— it ranges from
1 to 21845. The default is 30 seconds.
holdtime Enter to configure the hold-time interval (in seconds) for the peer,
which is sent in the OPEN message to the peer. This is the time
interval in seconds for the Hold Time configured for BGP speaker
with the peer. The system declares a peer dead, after ensuring that
keep alive message is not received within this time period from the
peer.
<(3-65535) Enter a value for the hold-time interval. This value ranges from 3 to
seconds> 65535 seconds. The default is 90 seconds.
delayopentime Enter to configure the delay open time which is the amount of time
that the BGP peer should delay in sending the OPEN message to
the remote peer.
<(0-65535) Enter a value for the delay open time. This value ranges from 0 to
seconds> 65535. The default is 0 seconds.
NOTE: The value 0 implies that the BGP Peer can send an OPEN
message without any delay to its neighbor.
transport Enter to configure the BGP Peer Transport Connection status as
connection-mode active or passive. This command executes only if Peer/ Peer Group
is created and Peer AS is configure.
active Enter for active BGP Peer Transport Connection status. When a
peer transport connection is made active, then the peer will
immediately initiate the session with the peer by sending an open
message to it. This is the default option.
920
NEIGHBOR
CHAPTER 26 BGP
passive Enter for passive BGP Peer Transport Connection status. When the
peer transport connection is passive, then the peer will not
immediately initiate the session, instead, it waits for the peer to
send the open message so that it can respond to it to create the
session.
route-map Enter to enable the route map or IP prefix list for the neighbor. This
command executes only if Peer/ Peer Group is created and Peer AS
is configured. The no form of the command disables routemap or IP
prefix list for the neighbor.
<name(1-20)> Enter a name of the Route Map— a string with the maximum size
as 20.
prefix-list Enter to configure IP prefix list for neighbor.
<iipprefilist_n Enter a value for the IP prefix list for neighbor. This value is a string
ame (1-20)> with the maximum size as 20.
in Enter to enable / disable Route map or IP Prefix List for inbound
routes.
out Enter to enable / disable Route map or IP Prefix List for outbound
routes.
advertisement-i Enter to configure Time-interval (in seconds) for spacing
nterval advertisement of successive external route-updates to the same
destination.
<seconds(1-6553 Enter a value for the advertisement-interval - the range is
5)> from 1 to 65535 seconds.
as-origination- Enter to configure the as-origination-interval.
interval
<seconds(1-6553 Enter a value for the as-origination-interval- the range is from 1 to
5)> 65535 seconds.
connect-retry-i Enter to configure the connect-retry-interval.
nterval
<seconds(1-6553 Enter a value for the connect-retry-interval - the range is from 1 to
5)> 65535 seconds.
hold-advertised Enter to enable holding of advertised routes to peer. This command
-routes executes only if Peer/ Peer Group is created and Peer AS is
configured. The no form of the command disables holding of
advertised routes to peer and sets to its default.
921
NEIGHBOR
CHAPTER 26 BGP
peer-group Enter to adds the neighbor as the member of the specified peer
group. The no form of the command removes the neighbor as the
member of the specified peer group. This command executes only
if
• Peer is created and Peer AS is configured.
• Peer Group is created.
<string(20)> Enter a name of the BGP peer group - a string of 20 characters.
Mode
BGP Router Configuration Mode
Examples
iS5Comm(config)# router bgp 100
iS5Comm (config-router)# neighbor 23.45.0.1 gateway 10.0.0.1
iS5Comm (config-router)# neighbor 23.45.0.1 network-address 3399::11
iS5Comm (config-router)# neighbor 3399::11 network-address 23.45.0.1
iS5Comm (config-router)# neighbor 10.0.0.2 password abcdef
iS5Comm (config-router)# neighbor a1 peer-group
iS5Comm (config-router)# neighbor 20.45.0.1 tcp-ao mkt 2
iS5Comm (config-router)# neighbor 23.45.0.1 update-source 40.0.0.1
iS5Comm (config-router)# neighbor 12.0.0.1 allow-autostop
iS5Comm (config-router)# neighbor 23.45.0.1 as-override
iS5Comm (config-router)# neighbor 23.45.0.1 capability ipv4-unicast
iS5Comm (config-router)# neighbor 12.0.0.1 connect-retry-count 50
iS5Comm (config-router)# neighbor 12.0.0.1 damp-peer-oscillations
iS5Comm (config-router)# neighbor 23.45.0.1 default-originate
iS5Comm (config-router)# neighbor 12.0.0.1 delay-open
iS5Comm (config-router)# neighbor 23.45.0.1 ebgp-multihop ttl 20
iS5Comm (config-router)# neighbor 12.0.0.1 fall-over bfd
iS5Comm (config-router)# neighbor 10.3.4.5 local-as 1
iS5Comm (config-router)# neighbor 23.45.0.1 maximum-prefix 255
iS5Comm (config-router)# neighbor 23.45.0.1 next-hop-self
922
NETWORK
CHAPTER 26 BGP
26.15. network
To configure the local network address that will be advertised to BGP, use the command network in BGP
Router Configuration Mode. The no form of the command disables the local network address advertised
to BGP.
network
network <ipv4-address | ipv6-address> mask <prefixLen>
no network
no network <ipv4-address | ipv6-address> mask <prefixLen>
923
REDISTRIBUTE
CHAPTER 26 BGP
Parameters
Mode
BGP Router Configuration Mode
Notes
The route-map filters are not applied for prefixes advertised via network command when redistribution
is enabled with route-map.
Examples
iS5Comm (config-router)# network 12.0.0.1 mask 1
26.16. redistribute
To control redistribution of Direct, Static and RIP routes into BGP, configure the protocol from which the
routes have to be redistributed into BGP after applying the specified route map, and configure the redis-
tribution of OSPF routes into BGP, use the command redistribute in BGP Router Configuration Mode. If
this is set to enable, only the routes from the protocols are imported into BGP and BGP routes will not
be distributed. If this is set as disable, then the routes learned from protocols are removed from BGP and
no route is distributed. The no form of the command disables the redistribution of routes from the given
protocol into BGP and the redistribution of routes from the OSPF protocol into BGP. The route map is
disassociated from the redistribution, if the no form of the command specifies the route map.
924
REDISTRIBUTE
CHAPTER 26 BGP
redistribute
redistribute {{static | connected | rip | all} [route-map <string(20)>]
[metric <integer (0-4294967295)>]}
| ospf [match {external | internal | nssa-external}] [route-map <string>]
[metric] <integer (0-4294967295)>]}
no redistribute
no redistribute
{{static | connected | rip | all} [route-map <string(20)>] [metric]}
| ospf [match {external | internal | nssa-external}] [route-map <string>]
[metric]}
925
REDISTRIBUTE
CHAPTER 26 BGP
Parameters
Mode
BGP Router Configuration Mode
Default
Redistribution is disabled
Metric - 0
926
RESTART-REASON
CHAPTER 26 BGP
Notes
Redistribution can be configured for only one route map. Another route map can be assigned, only if the
already assigned route map is disabled.
Examples
iS5Comm(config-router)# redistribute all route-map rm metric 500
iS5Comm (config-router)# redistribute ospf match external route-map rm metric 500
26.17. restart-reason
To configure the reason for the graceful restart of the BGP router, use the command restart-reason in
BGP Router Configuration Mode. The reason for restart can be unknown, software upgrade, scheduled
restart or switch to redundant router. The entity should save any change made using this command in a
non-volatile storage, as the configuration set using this command is persistent. The no form of the
command resets the reason for restart.
restart-reason
restart-reason [{unknown |softwareRestart |swReloadUpgrade}]
no restart-reason
no restart-reason [{unknown |softwareRestart |swReloadUpgrade}]
Parameters
unknown Enter to configure a reason for graceful restart of the BGP router as
restart due to unplanned events (such as restarting after a crash).
Enter to configure a reason for graceful restart of the BGP router as
softwareRestart restart due to restart of software.
Enter to configure a reason for graceful restart of the BGP router as
swReloadUpgrade restart due to reload or upgrade of software.
Mode
BGP Router Configuration Mode
927
RESTART-SUPPORT
CHAPTER 26 BGP
Examples
iS5Comm (config-router)# restart-reason swReloadUpgrade
26.18. restart-support
To enable the graceful restart support, use the command restart-support in BGP Router Configuration
Mode. Graceful restart support is provided for both planned and unplanned restart, if the command is
executed without any option.The entity should save any change made using this command in a non-vola-
tile storage, as the configuration set using this command is persistent. The no form of the command
disables the graceful restart support.
restart-support
restart-support [plannedOnly]
no restart-support
no restart-support [plannedOnly]
Parameters
Mode
BGP Router Configuration Mode
Examples
iS5Comm (config-router)# restart-support
928
ROUTER BGP
CHAPTER 26 BGP
router bgp
router bgp
no router bgp
no router bgp
Parameters
<AS no> Enter the ASN that identifies the BGP router to other routers and
tags the routing information passed along. This command also
allows setting up a distributed routing core that automatically
guarantees the loop-free exchange of routing information between
autonomous systems.
NOTE: When four-byte ASN is enabled, this value ranges from 1 to
4294967295or between 0.1 and 65535.65535.
NOTE: When four-byte ASN is disabled, this value ranges from 1 to
65535. or between 0.1 and 0.65535
NOTE: When bgp asnotation is enabled, the AS number of the BGP
Speaker is displayed in the range 0.1 to 65535.65535.
Mode
Global Configuration Mode
Default
0
Note
If the ASN value is already configured to a non-zero value, it must be reset to zero (using no form of the
command) before reconfiguring.
The "no router bgp" or "no router bgp command deletes all BGP configurations done on all VRs.
Examples
iS5Comm(config)# router bgp 100
iS5Comm(config-router)#
929
SHOW BGP-VERSION
CHAPTER 26 BGP
show bgp-version
show bgp-version
Mode
Privileged EXEC Mode
Examples
iS5Comm# show bgp-version
BGP Version : 4
show ip bgp
show ip bgp
{extcommunity {route |policy |filter}
| peer-group [<peer-group-name> [summary]]
|tcp-ao mkt summary [<random_str>]
| {EndOfRIBMarkerStatus [neighbor [<peer-addr>]]}
{[neighbor [<peer-addr [received prefix-filter] [advertised-routes]]] |
[rib] | [stale] |[<ip_addr>] [prefix-len]}
| aggregate
| community {route |policy |filter}
| confed info
| dampening [{flap-statistics | dampened-paths}]
| filters
930
SYNCHRONIZATION
CHAPTER 26 BGP
| info
| local-pref
| med
| restartexitreason
| restartreason
| restartstatus
| restartsupport
| rfl info
| summary
| timers
| vpnv4 {all | vrf <string(32)> | <ip-addr> [prefix-len]} {restartmode
[neighbor
| [<peer-addr>]]}
Mode
Privileged EXEC Mode
Examples
iS5Comm# show ip bgp restartreason
Context Name : default
-------------
BGP4: Restart reason is software restart
26.22. synchronization
To enable synchronization between BGP and IGP, use the command synchronization in BGP Router
Configuration Mode. BGP speaker does not advertise a route to an external neighbor unless that route
is local or exists in the IGP. This command allows routers and access servers within an autonomous
system to have the route before BGP makes it available to other autonomous systems.The no form of the
command disables the enable synchronization between BGP and IGP.
synchronization
synchronization
no synchronization
no synchronization
931
TCP-AO MKT KEY-ID
CHAPTER 26 BGP
Mode
BGP Router Configuration Mode
Default
The synchronization between the BGP and IGP is disabled
Note
This command is a complete standardized implementation of the existing command and operates similar
to that of the command ip bgp synchronization.
Examples
iS5Comm(config)# router bgp 100
iS5Comm(config-router)# synchronization
932
TCP-AO MKT KEY-ID
CHAPTER 26 BGP
Parameters
key-id <Key Integer Enter to set the send KeyID of the MKT. This value is used to fill the
Id(0-255)> key-id field in the TCP-AO option in the TCP header. This value ranges
from 0 to 255.
Enter to set the Receive Key-id of the MKT. The MKT ready at the
receive-key-i sender to be used for authenticating received segments is indicated
d <Rcv Key Id to the peer by filling the receive key id of the MKT in of the TCP-AO
(0-255)> option in TCP header. This value ranges from 0 to 255.
algorithm Enter to configure the algorithm used for TCP-AO MAC or KDF
calculation.
hmac-sha-1 Enter to configure the algorithm type as hmac-sha-1.
aes-128-cmac Enter to configure the algorithm type as aes-128-cmac.
key Enter to configure the master key corresponding to the MKT. This
<master-key> value is an octet string with the size between 1 and 80.
Enter to set the exclude TCP option which excludes the TCP options
tcp-option-ex other than TCP-AO during MAC calculation, If this is not set TCP-AO
clude MAC will be calculated on TCP segment including all other TCP
options.
Default
algorithm - hmac-sha-1
Mode
BGP Router Configuration Mode
Examples
iS5Comm (config-router)# tcp-ao mkt key-id 1 receive-key-id 1 algorithm hmac-sha-1 key key1
933
DEBUG IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
IGMP Snooping
27. IGMP Snooping
Internet Group Multicast Protocol (IGMP) is the protocol used by a host to inform a router when it joins
(or leaves) an Internet multicast group. IGMP is only used on a local network; a router must use another
multicast routing protocol to inform other routers of group membership.
IGMP Snooping (IGS) is a feature that allows the switch to “listen in” on the IGMP conversation between
hosts and routers. In IGS, a host computer uses IGMP to inform a router that it intends to listen to a
specific multicast address. If another computer snoops such packets, it can learn the multicast sessions
to which other computers on the local network are listening. The multicast packet transfer happens only
between the source and the destination computers. Broadcasting of packets is avoided.
IGMP snooping significantly reduces traffic from streaming media and other bandwidth-intensive IP
multicast applications.
934
DEBUG IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
Parameters
init Enter to generate Init and Shutdown trace messages at the instances when
the module is initiated or shut down. The information is logged in a file.
resources Enter to generate System Resources management trace messages when
there is a change in the resource status. The information is logged in a file.
tmr Enter to generate Timer trace messages at the instances where timers are
involved. The information is logged in a file.
src Enter to generate trace messages when Source Information is involved.
grp Enter to generate trace messages when Group Information is involved.
qry Enter to generate trace messages when Query messages are sent or
received.
redundancy Enter to generate debug statements for redundancy code flow traces. This
trace is generated when there is a failure in redundancy processing.
pkt Enter to generate debug statements for packets handling traces. This trace
is generated when there is an error condition in transmission or reception
of packets.
fwd Enter to generate traces messages when forwarding Database is involved.
vlan Enter to generate trace messages when VLAN related Information is
involved
entry Enter to generate trace messages to specify function entry points.
exit Enter to generate trace messages to specify function exit points.
mgmt Enter to generate debug statements for management configuration.
Currently, it is default.
np Enter to generate NPAPI related configuration messages
buffer Enter to generate buffer information messages.
icch Enter to generate ICCH related messages.
trace Enter to generate trace for the protocol.
all Enter to generate all types of trace messages.
switch Enter to generate trace messages for the specified switch context.
Enter a switch name. Currently, it is default.
<switch_na
me>
935
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
Mode
Privileged EXEC Mode
Prerequisites
Debugging is Disabled.
Examples
iS5Comm# debug ip igmp snooping fwd
no ip igmp snooping
no ip igmp snooping
{limit [InnerVlanId <short (1-4094)>]
| filter-profileid [InnerVlanId <short (1-4094)>]}
936
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
Parameters
leavemode Enter to configure the port leave mode for an interface. The
mechanism to process the leave messages in the downstream is
selected. The switch sends an IGMP query message to find if
there is any host interested in the multicast group.
exp-hosttrack Enter to process the leave messages using the explicit host
tracking mechanism. The decision to remove the interface is
made based on the tracked host information.
fastLeave Enter to configure the leave messages using the fast leave
mechanism. On receiving a leave message, the interface is
removed from the group registration and the leave message is
sent to the router ports.
normalleave Enter to send a group or group specific query on the interface for
every received leave message.The port is configured to use the
normal leave mode. The normal leave mode is applicable only for
v2 hosts. When the system receives a v2 leave message, it sends
a group specific query on the interface. For v3 hosts, normal
leave has no effect.
InnerVlanId Enter to configure the inner VLAN ID value. In provider bridging
domain, the customer VLAN itag is denoted as InnerVlanId.
• If InnerVlanId is specified, multicast forwarding mode must
be IP based and enhanced mode must be enabled in the
snooping system.
• If InnerVlanId is not specified, leave mode can be configured
irrespective of multicast forwarding mode and enhanced
mode status.
<short (1-4094)> Integer Enter a value for the inner VLAN ID. It ranges from 1 to 4094.
limit Enter to configure the maximum limit type for an interface. The
maximum limit is the number of unique registrations for a
channel or group.
channels Enter to configure the snooping maximum limit as channels
(group, source). Channel limit is applied for IGMPv3 include and
allow reports.
groups Enter to configure the snooping maximum limit as groups. Group
limit is applied for all IGMP reports.
<interger32> Integer Enter a value for the snooping maximum limit. This value ranges
from 0 to 4294967295.
937
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
InnerVlanId Enter to configure the maximum limit type for the Inner VLAN ID.
If InnerVlanId is specified, enhanced mode should be enabled;
otherwise, enhanced mode does not need to be enabled.
<short (1-4094)> Integer Enter a value for the inner VLAN ID. It ranges from 1 to 4094.
filter-profileid Enter to configure the multicast profile index for a downstream
interface. This profile contains a set of allowed or denied rules to
be applied for the IGMP packets received through the
downstream interface.
<integer> Integer Enter a value to configure the multicast filter profile index for a
downstream interface.
InnerVlanId Enter to configure the multicast filter profile index for the Inner
VLAN identifier. If InnerVlanId is specified, then enhanced mode
should be enabled; otherwise, enhanced mode does not need to
be enabled.
<short (1-4094)> Integer Enter a value for the Inner VLAN ID. It ranges from 1 to 4094.
Mode
Interface Configuration Mode
Default
• exp-host track/fastLeave/normalleave - Normalleave
• The limit is set as 0 so that no limiting is done.
• profileid - the profile ID is 0.
Prerequisites
• The leave process configuration level has to be port.
• limit
– The IGMP snooping filter must be enabled for this configuration to have the effect.
– Even without enabling IGMP snooping filter, control plane data structure update takes place.
But the benefits can be realized only when IGMP Snooping filter is enabled.
• filter-profileid
– The IGMP snooping filter must be enabled for this configuration to have the effect.
– Even without enabling IGMP snooping filter, control plane data structure update takes place.
But the benefits can be realized only when IGMP Snooping filter is enabled.
938
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
Examples
iS5Comm(config)# int gi 0/1
iS5Comm(config-if)# ip igmp snooping leavemode fastLeave InnerVlanId 1
iS5Comm(config-if)# ip igmp snooping limit groups 10 InnerVlanId 1
iS5Comm(config-if)# ip igmp snooping filter-profileid 2 InnerVlanId 1
939
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
no ip igmp snooping
no ip igmp snooping
[filter]
[group-query-interval]
[mrouter-time-out]
[port-purge-interval]
[proxy]
[proxy-reporting]
[report-forward]
[report-suppression-interval]l
[retry-count]
[source-only learning age-timer]
[vlan <vlanid/vfi_id> | <vlanid (1-4094)>]
{immediate-leave | mrouter <ifXtype> <iface_list>}]
940
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
Parameters
enhanced-mod Enter to configure the snooping system enhanced mode in the switch.
e It is provided to enhance the operation of IGMP snooping module to
duplicate multicast traffic by learning multicast group entries based on
the port and inner VLAN. This mode of operation is applied when the
downstream devices are less intelligent or not capable of duplicating
multicast traffic.
enable Enter to enable snooping system enhanced mode in the switch.
NOTE: Enhanced mode is in enabled state only when the snooping
mode is set as IP Based.
disable Enter to disable snooping system enhanced mode in the switch. This is
default.
filter Enter to configure the IGMP snooping filter. The IGS filtering feature
restricts channel registration from being added to the database. In
transparent snooping, the filtered packet will not be added to the
snooping database but will be forwarded upstream. When disabled, all
filter related configurations remain but the incoming reports will not
be subject to filtering. IGS module programs the hardware to remove
the configured rate limit. It flushes all registrations learnt through a
port if a threshold limit is configured for this interface.
group-query- Enter to set the time interval (in seconds) after which the switch sends
interval a group specific query to find out if there are any interested receivers
in the group when it receives a leave message. If it does not receive a
response from the group, the port is removed from the group
membership information in the forwarding database.
<(2-5) Integer Enter a value to set the time interval (in seconds). It ranges from 2 to
seconds> 5. The default is 2 seconds.
mrouter-time Enter to set the IGMP snooping router time-out interval (in seconds)
-out after which port is deleted if no IGMP router control packets are
received
<(60 – 600) Integer Enter a value to set the IGMP snooping router time-out interval (in
seconds> seconds). It ranges from 2 to 5.
multicast-vl Enter to configure the snooping system enhanced mode in the switch.
an It is provided to enhance the operation of IGMP snooping module to
duplicate multicast traffic by learning multicast group entries based on
the port and inner VLAN. This mode of operation is applied when the
downstream devices are less intelligent or not capable of duplicating
multicast traffic.
941
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
942
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
943
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
944
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
Mode
Global Configuration Mode
Examples
iS5Comm(config)# ip igmp snooping enhanced-mode enable
iS5Comm(config)# ip igmp snooping filter
iS5Comm(config)# ip igmp snooping group-query-interval 3
iS5Comm(config)#ip igmp snooping mrouter-time-out 70
iS5Comm(config)# ip igmp snooping multicast-vlan enable
iS5Comm (config)# ip igmp snooping port-purge-interval 150
iS5Comm(config)# ip igmp snooping report-suppression-interval 20
945
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
ip igmp snooping
ip igmp snooping
[blocked-router <ifXtype> <iface_list>}]
[fast-leave]
[max-response-code <(0 - 255)>]
946
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
no ip igmp snooping
no ip igmp snooping
[blocked-router <ifXtype> <iface_list>}]
[fast-leave]
[max-response-code]
[mrouter <ifXtype> <iface_list>}]
[mrouter-port <ifXtype> <iface_list> {time-out <short(60-600)> | version]
[multicast-vlan profile
[other-querier-present-interval
[querier
[query-interval
[startup-query-count
[startup-query-interv <(15 - 150) seconds>]
[static-group <mcast_addr> ports <ifXtype> <iface_list>}]
947
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
Parameters
blocked-rout Enter to configure statically the blocked router ports for a VLAN. When
er configured as a blocked router, the queries, PIM DVMRP and data
messages are discarded. The corresponding port entry is removed
from the forwarding database. The ports to be configured as blocked
router ports must not be configured as static router ports.
NOTE: The ports to be configured as blocked router ports must not be
configured as static router ports.
<ifXtype> Enter to configure tthe type of interface to be employed on the port.
The interface can be:
• fastethernet – Officially referred to as 100BASE-T standard. This
is a version of LAN standard architecture that supports data
transfer up to 100 megabits per second.
• gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 gigabit per
second.extreme-ethernet – A version of Ethernet that supports
data transfer up to 10 gigabits per second. This Ethernet supports
only full duplex links.
<iface_list> Enter to set a list of multicast router ports for the list of interfaces or a
specific interface identifier. This value is a combination of slot number
and port number separated by a slash for interface type other than
internal-lan and port-channel. Only i-lan or port-channel ID is provided
for interface types internal-lan and port-channel. Use comma as a
separator without space while configuring list of interfaces. Example:
0/1, 0/3 or 1, 3
fast-leave Enter to enable fast leave processing and IGMP snooping for a specific
VLAN. It enables IGMP snooping only for the specific VLAN when IGMP
snooping is globally disabled. When the fast leave feature is enabled,
port information is removed from a multicast group entry immediately
after fast leave message is received. By default, fast leave processing is
disabled.
NOTE: Fast leave configurations done in a VLAN when IGMP snooping is
disabled in a VLAN will be applied only when IGMP snooping is enabled
in the VLAN.
max-response Enter to set the maximum response code inserted in general queries
-code sent to host. The unit of the response code is tenth of second.
<(0 - 255)> Integer Enter a value for the maximum response code inserted in general
queries sent to host. It ranges from 0 to 255 with a default of 100.
948
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
949
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
<ifXtype> Enter to configure the list of multicast router ports for the specified
type of interface. The interface can be:
• fastethernet – Officially referred to as 100BASE-T standard. This
is a version of LAN standard architecture that supports data
transfer up to 100 megabits per second.
• gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 gigabit per
second.extreme-ethernet – A version of Ethernet that supports
data transfer up to 10 gigabits per second. This Ethernet supports
only full duplex links.
<iface_list> Enter to set a list of multicast router ports for the list of interfaces or a
specific interface identifier. This value is a combination of slot number
and port number separated by a slash for interface type other than
internal-lan and port-channel. Only i-lan or port-channel ID is provided
for interface types internal-lan and port-channel. Use comma as a
separator without space while configuring list of interfaces. Example:
0/1, 0/3 or 1, 3
time-out Enter to configure the router port purge time-out interval.
<short(60-60 Integer Enter a value for the router port purge time-out interval. This value
0)> ranges from 60 to 600 seconds with a default of 125.
version Enter to configure operating version of the IGMP snooping.
NOTE: The router ports must be statically configured for the VLAN.
950
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
951
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
952
IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
<(15 - 150) Integer Enter a value for the time period with which the general queries are
seconds> sent by the IGMP snooping switch during startup of the querier
election process. This time interval ranges between 15 and 150
seconds and should be less than or equal to query interval/ 4. The
default is 31 seconds.
static-group Enter to configure IGMP snooping static multicast related information.
NOTE: The command executes only when IGMP snooping is enabled in
the switch.
<mcast_addr> Enter to configure the multicast address. This value ranges from
225.0.0.0. to 239.255.255.255
ports Enter to enable the snooping query transmission status which
generates IGMP query messages.
<ifXtype> Enter to configure the snooping static multicast for the specified type
of interface. The interface can be:
• fastethernet – Officially referred to as 100BASE-T standard. This
is a version of LAN standard architecture that supports data
transfer up to 100 megabits per second.
• gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 gigabit per
second.extreme-ethernet – A version of Ethernet that supports
data transfer up to 10 gigabits per second. This Ethernet supports
only full duplex links.
<iface_list> Enter to configure the snooping static multicast for the list of
interfaces or a specific interface identifier. This value is a combination
of slot number and port number separated by a slash for interface
type other than internal-lan and port-channel. Only i-lan or
port-channel ID is provided for interface types internal-lan and
port-channel. Use comma as a separator without space while
configuring list of interfaces. Example: 0/1, 0/3 or 1, 3
version Enter to configure operating version of the IGMP snooping.
NOTE: The router ports must be statically configured for the VLAN.
953
IP IGMP
CHAPTER 27 IGMP SNOOPING
Mode
VLAN Configuration Mode
Examples
iS5Comm(config)# vlan 55
iS5Comm (config-vlan)# ip igmp snooping blocked-router gigabitethernet 0/2
iS5Comm (config-vlan)# ip igmp snooping fast-leave
iS5Comm(config-vlan)# ip igmp snooping max-response-code 10
iS5Comm (config-vlan)# ip igmp snooping mrouter gigabitethernet 0/1
iS5Comm(config-vlan)# ip igmp snooping mrouter-port gigabitethernet 0/1 time-out 150
iS5Comm(config-vlan)# ip igmp snooping mrouter-port gigabitethernet 0/1 version v1
iS5Comm (config-vlan)# ip igmp snooping multicast-vlan profile 1
iS5Comm(config-vlan) # ip igmp snooping other-querier-present-interval 1215
iS5Comm (config-vlan)# ip igmp snooping querier
iS5Comm(config-vlan) # ip igmp snooping startup-query-interval 100
iS5Comm (config-vlan) # ip igmp snooping startup-query-count 4
iS5Comm(config-vlan) # ip igmp snooping startup-query-interval 100
iS5Comm (config-vlan)# ip igmp snooping static-group 225.3.2.2 ports gigabitethernet 0/2
iS5Comm(config-vlan)#ip igmp snooping version v2
27.5. ip igmp
To configure the multicast profile index for an interface or the maximum number of multicast groups that
can be learnt on the interface, use the command ip igmp in Interface Configuration Mode. The no form
of the command deletes the multicast profile index from an interface or the maximum limit type that was
configured for the interface.
ip igmp
ip igmp {filter <profile number> | max-groups <integer32>}
954
IP IGMP SNOOPING CLEAR COUNTERS
CHAPTER 27 IGMP SNOOPING
Parameters
Mode
Interface Configuration Mode
Examples
iS5Comm(config-if)# ip igmp filter 1
iS5Comm(config-if)# ip igmp max-groups 5
955
MVR
CHAPTER 27 IGMP SNOOPING
Parameters
Mode
Privileged Exec Mode
Examples
iS5Comm# ip igmp snooping clear counters vlan 4094
27.7. mvr
To configure the multicast VLAN feature on a port, use the command mvr in Global Configuration Mode.
Multicast VLAN feature is used for applications where wide-scale deployment of multicast traffic is
necessary. MVLAN registration allows a subscriber on a port to subscribe and unsubscribe to a multicast
stream on any of the multicast VLANs. Multicast VLANs enable efficient multicast data flow in separate
M- VLANs, while normal data flows through VLANs. This command is a standardized implementation of
the existing command: ip igmp snooping multicast-vlan. It operates similar to the existing command. The
no form of this command disables the multicast VLAN feature.
956
SHOW IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
mvr
mvr
no mvr
no mvr
Mode
Global Configuration Mode
Default
non-router-ports
Examples
iS5Comm(config)# mvr
957
SHOW IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
958
SHOW IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
Parameters
blocked-router Enter to display blocked router ports for all VLANs or a specific
VLAN for a given switch or for all switches (if no switch is
specified).
vlan Integer Enter to specify the blocked router ports for the VLAN / VFI ID to
<vlan-id/vfi-id> be displayed. This value ranges from 1 to 65535.
• <vlan–id> - VLAN ID is a unique value that represents the
specific VLAN. This value ranges from 1 to 4094.
• <vfi-id> - VFI ID is a VLAN created in the system which
contains Pseudo wires and Attachment Circuits as member
ports. This creates a logical LAN for the VPLS service. This
value ranges from 4096 to 65535.
switch Enter to display the IGMP snooping statistics for the specified
context.
<switch_name> Enter a value representing unique name of the switch context.
This value is a string of maximum size 32. This parameter is
specific to multiple instance feature.
forwarding-datab Enter to display multicast forwarding entries for all VLANs or a
ase specific VLAN or specific VLAN and group address for a given
switch or for all switch (if no switch is specified).
vlan Integer Enter to specify multicast forwarding entries for the VLAN / VFI
<vlan-id/vfi-id> ID to be displayed. This value ranges from 1 to 65535.
• <vlan–id> - VLAN ID is a unique value that represents the
specific VLAN. This value ranges from 1 to 4094.
• <vfi-id>. - VFI ID is a VLAN created in the system which
contains Pseudo wires and Attachment Circuits as member
ports. This creates a logical LAN for the VPLS service. This
value ranges from 4096 to 65535.
static Enter to display only static multicast entries.
dynamic Enter to display only dynamic multicast entries. If not specified,
both static and dynamic entries are displayed.
switch Enter to display the switch name/context name.
<switch_name> Enter a value representing unique name of the switch context.
This value is a string of maximum size 32. This parameter is
specific to multiple instance feature.
959
SHOW IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
960
SHOW IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
vlan Integer Enter to specify he router ports for the specified VLAN / VFI ID
<vlan-id/vfi-id> to be displayed.This value ranges from 1 to 65535.
• <vlan–id> - VLAN ID is a unique value that represents the
specific VLAN. This value ranges from 1 to 4094.
• <vfi-id>. - VFI ID is a VLAN created in the system which
contains Pseudo wires and Attachment Circuits as member
ports. This creates a logical LAN for the VPLS service. This
value ranges from 4096 to 65535.
NOTE: The VLAN ID 4095 is reserved and may be used to indicate
a wildcard match for the VID in management operations or
filtering database entries.
NOTE: VFI IDs 4096 and 4097 are reserved identifiers used in
MPLS PW.
NOTE: The theoretical maximum for the maximum number of VFI
is 65535 but the actual number of VFI supported is a sizing
constant. Based on this, the maximum number of VFI ID
accepted in the management interface is restricted. For
example, if 100 VFIs are supported, the maximum number of VFI
supported will be restricted to maximum number of VLANs +
100. An error message is displayed for any value beyond this
range.
detail Enter to display detailed information about the router ports.
switch Enter to display the router ports for the specified context.
<switch_name> Enter a value representing unique name of the switch context.
This value is a string of maximum size 32. This parameter is
specific to multiple instance feature.
multicast-vlan Enter to display Multicast VLAN statistics for all VLANs or a
specific VLAN for a given switch or for all switches (if switch is
not specified). The optional switch name is not applicable for SI
case.
switch Enter to display the switch name/context name.
<switch_name> Enter a value representing unique name of the switch context.
This value is a string of maximum size 32. This parameter is
specific to multiple instance feature.
port-cfg Enter to display IGS port configuration information for all inner
VLANs or a specific inner VLAN ID or a given switch.
<interface> Enter to specify interface to be displayed.
961
SHOW IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
962
SHOW IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
vlan Integer Enter to specify IGMP snooping information for the VLAN / VFI
<vlan-id/vfi-id> ID to be displayed.This value ranges from 1 to 65535.
• <vlan–id> - VLAN ID is a unique value that represents the
specific VLAN. This value ranges from 1 to 4094.
• <vfi-id> - VFI ID is a VLAN created in the system which
contains Pseudo wires and Attachment Circuits as member
ports. This creates a logical LAN for the VPLS service. This
value ranges from 4096 to 65535.
switch Enter to display the switch name/context name.
<switch_name> Enter a value representing unique name of the switch context.
This value is a string of maximum size 32. This parameter is
specific to multiple instance feature.
Mode
Privileged EXEC Mode
Examples
iS5Comm# show ip igmp snooping blocked-router
VlanPorts
---------
1Gi0/1, Gi0/2, Gi0/3, Gi0/4
2Gi0/6, Gi0/7, Gi0/8
iS5Comm# show ip igmp snooping globals
Snooping Configuration
-----------------------------
IGMP Snooping globally enabled
IGMP Snooping is operationally enabled
IGMP Snooping Enhanced mode is disabled
Transmit Query on Topology Change globally disabled
Multicast forwarding mode is MAC based
Proxy globally disabled
Proxy reporting globally enabled
Filter is disabled
Router port purge interval is 125 seconds
Port purge interval is 260 seconds
Report forward interval is 5 seconds
963
SHOW IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
964
SHOW IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
965
SHOW IP IGMP SNOOPING
CHAPTER 27 IGMP SNOOPING
966
SHUTDOWN SNOOPING
CHAPTER 27 IGMP SNOOPING
shutdown snooping
shutdown snooping
no shutdown snooping
no shutdown snooping
Mode
Global Configuration Mode
Default
Snooping is enabled
Prerequisites
Snooping cannot be started in the switch, if the base bridge mode is configured as transparent bridging.
Examples
iS5Comm(config)# shutdown snooping
967
SNOOPING LEAVE-PROCESS
CHAPTER 27 IGMP SNOOPING
snooping leave-process
snooping leave-process config-level {vlan | port}
Parameters
Mode
Global Configuration Mode
Default
vlan
968
SNOOPING REPORT-PROCESS
CHAPTER 27 IGMP SNOOPING
Examples
iS5Comm(config)# snooping leave-process config-level port
snooping report-process
snooping report-process config-level {non-router-ports | all-ports}
Parameters
Mode
Global Configuration Mode
Default
non-router-ports
Examples
iS5Comm(config)# snooping report-process config-level all-ports
969
RMON ALARM
CHAPTER 28 RMON
RMON
28. RMON
RMON (Remote Monitoring) is a standard monitoring specification that enables various network moni-
tors and console systems to exchange network-monitoring data.
The RMON specification defines a set of statistics and functions that can be exchanged between
RMON-compliant console managers and network probes. As such, RMON provides network administra-
tors with comprehensive network-fault diagnosis, planning, and performance-tuning information.
rmon alarm
rmon alarm <alarm number (1-65535)> <mib-object-id (255)>
<sample-interval-time (1-65535)>
{absolute | delta} rising-threshold <value (0-2147483647)>
<rising-event-number (1-655350)>
falling-threshold <value (0-2147483647)> [<falling-event-number(1-65535)>]
[owner <ownername (127)>]
no rmon alarm
no rmon alarm <alarm number (1-65535)>
970
RMON ALARM
CHAPTER 28 RMON
Parameters
<alarm Integer Enter a value for the statistic during the last sampling period. This value
number remains available until the current sampling period is completed. For
(1-65535)> example, if the sample type is deltaValue, this value will be the
difference between the samples at the beginning and end of the
period. If the sample type is absoluteValue, this value will be the
sampled value at the end of the period. This value is compared with the
rising and falling thresholds. This value ranges from 1 to 65535.
Enter a value for the MIB object.
<mib-object-
id (255)>
Integer Enter a value for an entry in the alarm table. Each such entry defines a
<sample-inte diagnostic sample at a particular level for a MIB object in the device.
rval-time This value ranges from 1 to 65535 seconds.
(1-65535)>
absolute Enter to configure comparison of the value of the selected variable with
the thresholds at the end of the sampling interval.
delta Enter to configure subtracting of the value of the selected variable at
the last sample from the current value, and the difference is compared
with the thresholds at the end of the sampling interval
Enter to configure the rising threshold value. If the startup alarm is set
rising-thres as Rising alarm or RisingOrFalling alarm and if the configured threshold
hold value is reached, then an alarm is raised. When the current sampled
value is greater than or equal to the configured Rising threshold, and
the value at the last sampling interval is less than this configured
threshold, a single event will be generated
<value (0 - Integer Enter a value for the rising threshold. This value ranges from 0 to
2147483647)> 2147483647.
Integer Enter a value to raise the index of the event, when the Rising threshold
<rising-even is reached. The event entry identified by a particular value of this index
t-number is the same as identified by the same value of the event index object.
(1-655350)> This value ranges from 1 to 65535.
Enter to configure the falling threshold value. If the startup alarm is set
falling-thre as Falling alarm or RisingOrFalling alarm and if the configured threshold
shold value is reached, then an alarm is raised. When the current sampled
value is lesser than or equal to the configured Falling threshold, and the
value at the last sampling interval is greater than this threshold, a single
event will be generated.
971
RMON COLLECTION
CHAPTER 28 RMON
<value (0 - Integer Enter a value for the falling threshold value. This value ranges from 0 to
2147483647)> 2147483647.
Integer Enter to configure raising of the index of the event when the Falling
<falling-eve threshold is reached. The event entry identified by a particular value of
nt-number(1- this index is the same as identified by the same value of the event index
65535)> object
owner Enter for Alarm owner configuration.
<ownername Enter a value for the owner’s name.
(127)>
Mode
Global Configuration Mode
Default
By default, the least event number in the event table is assigned for the rising and falling threshold as its
event number.
Prerequisites
• RMON events must have been configured
• RMON collection stats must be configured
• we cannot monitor all mib objects through RMON. This will be applicable only to the Ethernet inter-
faces and VLANs
Examples
iS5Comm(config)# rmon alarm 1 1.3.6.1.2.1.16.1.1.1.5.2 1 delta rising-threshold 2 falling-threshold 1
972
RMON COLLECTION
CHAPTER 28 RMON
rmon collection
rmon collection {history <index (1-65535)> [buckets <bucket-number
(1-65535)>] [interval <seconds (1-3600)>] [owner <ownername (127)>]
| stats <index (1-65535)> [owner <ownername (127)>]}
no rmon collection
no rmon collection {history <index (1-65535)> | stats <index (1-65535)>
973
RMON COLLECTION
CHAPTER 28 RMON
Parameters
Mode
974
RMON EVENT
CHAPTER 28 RMON
Examples
iS5Comm(config-if)# rmon collection history 1 buckets 2 interval 20
iS5Comm(config-if)# rmon collection stats 1
iS5Comm(config) vlan 1
iS5Comm(config-vlan) rmon collection history 2
iS5Comm(config-vlan) rmon collection stats 2
rmon event
rmon event <number (1-65535)> [description <event-description (127)>] [log]
[owner <ownername (127)>] [trap <community (127)>]
no rmon event
no rmon event <number (1-65535)>
975
SET RMON
CHAPTER 28 RMON
Parameters
<number Integer Enter a value for the number of events to be added in the event table.
(1-65535)> This value ranges from 1 to 65535.
description Enter to configure a description for the event.
Enter a value for a description for the event. This value is a string with a
<event-descr maximum length of 127.
iption
(127)>
log Integer Enter to create an entry in the log table for each event.
owner Enter for event owner configuration.
<ownername Integer Enter a value for the owner name. This value is a string with a
(127)> maximum value of 127.
trap Enter to generate a trap. The SNMP community string is to be passed
for the specified trap.
<community Enter a value for the SNMP community string. This value is a string with
(127)> a maximum value of 127.
Mode
Global Configuration Mode
Examples
iS5Comm(config)# rmon event 1 log owner ownername trap netman
set rmon
set rmon {disable | enable}
976
SHOW RMON
CHAPTER 28 RMON
Parameters
disable Enter to disable the RMON feature in the system. Upon disabling, the RMON’s
network monitoring is called off. This is default.
enable Enter to enable the RMON feature in the system. Upon enabling, the RMON
starts monitoring both local and remote networks and provides network fault
diagnosis.
Mode
Global Configuration Mode
Default
disable
Examples
iS5Comm(config)# set rmon enable
show rmon
show rmon [statistics [<stats-index (1-65535)>]] [alarms] [events] [history
[<history-index (1-65535)>] [overview]]
977
SHOW RMON
CHAPTER 28 RMON
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show rmon statistics
RMON is enabled
Collection 1 on Gi0/1 is active, and owned by monitor,
Monitors ifEntry.1.1 which has
Received 0 octets,0 packets,
0 broadcast and 0 multicast packets,
0 undersized and 0 oversized packets,
0 fragments and 0 jabbers,
0 CRC alignment errors and 0 collisions.
0 out FCS errors and 0 Drop events,
978
SHOW RMON
CHAPTER 28 RMON
979
SHOW RMON
CHAPTER 28 RMON
980
SHOW RMON
CHAPTER 28 RMON
981
CLASS-MAP
CHAPTER 29 QOS
QoS
29. QoS
QoS
(Quality of Service) defines the ability to provide different priorities to different applications, users or
data flows or the ability to guarantee a certain level of performance to a data flow. QoS refers to resource
reservation control mechanisms rather than the achieved service quality and specifies a guaranteed
throughput level.
QoS provides a complete Quality of Service solution across VPNs and helps in implementing service provi-
sioning policies for application or customers, who desire to have an enhanced performance for their
traffic on the Internet.
29.1. class-map
To add a class-map entry, use the command class-map in Global Configuration Mode. The no form of the
command deletes a class map entry.
class-map
class-map <class-map-Id(1-65535)>
no class-map
no class-map <class-map-Id(1-65535)>
982
CLEAR METER-STATS
CHAPTER 29 QOS
Parameters
Integer Enter a value for a priority map entry. It configures an index that
<class-map-Id enumerates the Multi Field Classifier table entries. This value ranges
(1-65535)> from 1 to 65535.
Mode
Global Configuration Mode
Prerequisites
• This command executes only if QoS is started in the system.
Examples
iS5Comm(config)# class-map 1
iS5Comm(config-cls-map)#
clear meter-stats
clear meter-stats [meter-id [<integer (1-65535)>]
983
DEBUG QOS
CHAPTER 29 QOS
Parameters
Mode
Privileged EXEC Mode
Prerequisites
To clear meter statistics for a specific meter-id, a Meter id and a policy map related configuration should
be already created.
Examples
iS5Comm# clear meter-stats meter-id 1
debug qos
debug qos {initshut | mgmt | ctrl | dump | os | failall | buffer}
no debug qos
no debug qos {initshut | mgmt | ctrl | dump | os | failall | buffer}
984
MAP
CHAPTER 29 QOS
Parameters
initshut Enter to generate debug statements for Init and shutdown traces.
mgmt Enter to generate debug statements for Management traces.
ctrl Enter to generate debug statements for Control plane traces.
dump Enter to generate debug statements for Packet dump traces.
os Enter to generate debug statements for traces related to all resources
except buffers.
failall Enter to generate debug statements for all failure traces.
buffer Enter to generate debug statements for buffer allocation / release traces.
Mode
Privileged EXEC Mode
Examples
iS5Comm# debug qos initshut
29.4. map
To add a priority map entry for mapping an incoming priority to a regenerated priority, use the command
map in Priority Map Configuration Mode. The no form of the command sets a default value for the Inter-
face, VLAN, and regenerated inner priority.
map
map {interface <iftype> <ifnum> | in-priority-type {vlanPri | dot1P
<integer(0-1)> | ipDscp} in-priority <integer(0-63)> regen-priority
<integer(0-63)> [regen-color {green | yellow | red}]
no map
no map {interface | vlan | regen-inner-priority}
985
MAP
CHAPTER 29 QOS
Parameters
986
MATCH ACCESS-GROUP
CHAPTER 29 QOS
Mode
Priority Map Configuration Mode
Prerequisites
Priority Map entry must be created.
Examples
iS5Comm(config)# priority-map 1
iS5Comm(config-pri-map)# map interface gi 0/1 in-priority-type vlanPri in-priority 0 regen-priority 7
match access-group
match access-group mac-access-list <integer(0-65535)> | ip-access-list
<integer(1-65535)> | priority-map <integer(0-65535)>
987
METER
CHAPTER 29 QOS
Parameters
Mode
Class Map Configuration Mode
Examples
iS5Comm(config)# class-map 1
iS5Comm(config-cls-map)# match access-group priority-map 1
29.6. meter
To create a meter, use the command meter in Global Configuration Mode. The no form of the command
deletes a meter.
meter
meter <meter-Id(1-1000)>
no meter
no meter <meter-Id(1-1000)>
988
METER-TYPE
CHAPTER 29 QOS
Parameters
Integer Enter a value for meter. Configures an Index that enumerates the
<meter-Id(1-10 meter entries. This value ranges from 1 to 65535.
00)>
Mode
Global Configuration Mode
Prerequisites
• This command executes only if QoS is started in the system.
Examples
iS5Comm(config)# meter 1
iS5Comm(config-meter)#
29.7. meter-type
To set meter parameters CIR, CBS, EIR, EBS, meter type, and color awareness, use the command
meter-type in Meter Configuration Mode.
meter-type
meter-type {srTCM | trTCM} [color-mode {aware | blind}] [cir
<integer(0-10485760)>] [cbs <integer(0-10485760)>] [eir
<integer(0-10485760)>] [ebs <integer(0-10485760)>]
989
METER-TYPE
CHAPTER 29 QOS
Parameters
srTCM Enter to configure the meter type as single rate three color marker
(srTCM) metering as defined by RFC 2697. Valid parameters supported
are cir, cbs, and ebs.
trTCM Enter to configure the meter type as two rate three color marker (trTCM)
metering as defined by RFC 2698. Valid values for given meter type are
CIR, CBS, EIR, and EBS.
color-mode Enter to configure the color mode of the meter.
aware Enter to indicate that the meter considers the pre-color of the packet.
blind Enter to indicate that the meter ignores the pre-color of the packet. This
is the default.
cir Enter to configure the committed information rate (cir). Cir should be less
than excess information rate (eir).
Integer Enter a value for the committed information rate. This value ranges from
<integer(0 0 to 10485760.
-10485760)
>
cbs Enter to configure the committed burst size (cbs).
Integer Enter a value for the he committed burst size. This value ranges from 0 to
<integer(0 10485760.
-10485760)
>
eir Enter to configure the excess information rate (eir).
Integer Enter a value for the excess information rate. This value ranges from 0 to
<integer(0 10485760.
-10485760)
>
ebs Enter to configure the excess burst size (ebs).
Integer Enter a value for the excess burst size. This value ranges from 0 to
<integer(0 10485760.
-10485760)
>
Mode
990
MLS QOS
CHAPTER 29 QOS
Prerequisites
Meter should have been created.
Examples
iS5Comm(config)# meter 1
iS5Comm(config-meter)# meter-type srTCM cir 20 cbs 20 ebs 20
mls qos
mls qos [aggregate-policer [<meter-id (1-65535)>] [<Bits per
second(1-65535)>] [<Normal burst bytes(1-65535)>] exceed-action {drop |
set-ip-dscp-transmit}]
no mls qos
no mls qos
991
POLICY-MAP
CHAPTER 29 QOS
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# mls qos
iS5Comm(config)# mls qos aggregate-policer 1 10 10 exceed-action drop
29.9. policy-map
To create a policy map, use the command priority-map in Global Configuration Mode. The no form of the
command deletes a policy map.
policy-map
policy-map <policy-map-Id(1-65535)>
992
PRIORITY-MAP
CHAPTER 29 QOS
no policy-map
no policy-map <policy-map-Id(1-65535)>
Parameters
Mode
Global Configuration Mode
Prerequisites
• This command executes only if QoS is started in the system.
Examples
iS5Comm(config)# policy-map 1
iS5Comm(config-ply-map)#
29.10. priority-map
To add a priority map entry, use the command priority-map in Global Configuration Mode. The no form
of the command deletes a priority map entry.
priority-map
priority-map <priority-map-Id(1-65535)>
no priority-map
no priority-map <priority-map-Id(1-65535)>
993
QOS PBIT-PREFERENCE
CHAPTER 29 QOS
Parameters
Integer Enter a value for a priority map entry. It configures the priority map
<priority-map index for the incoming packets received over ingress Port/VLAN with
-Id(1-65535)> specified incoming priority. This value ranges from 1 to 65535.
Mode
Global Configuration Mode
Prerequisites
• This command executes only if QoS is started in the system.
Examples
iS5Comm(config)# priority-map 1
iS5Comm(config-pri-map)#
qos pbit-preference
qos pbit-preference {disable | enable}
994
QOS
CHAPTER 29 QOS
Parameters
Mode
Interface Configuration Mode
Default
disable
Examples
iS5Comm(config-if)# qos pbit-preference enable
29.12. qos
To enable or disable the QoS subsystem, use the command qos in Global Configuration Mode.
qos
qos {disable | enable}
Parameters
Mode
Global Configuration Mode
995
QUEUE
CHAPTER 29 QOS
Default
Enabled
Prerequisites
• This command executes only when QoS is started in the system.
• QoS module programs the hardware and starts protocol operation, when set as enable.
• QoS module stops protocol operation by deleting the hardware configuration, when set as
disabled.
Examples
iS5Comm(config)# qos enable
29.13. queue
To create a queue and configure the queue parameters, use the command queue in Global Configuration
Mode. The no form of the command deletes a queue.
queue
queue {<integer(1-8)> interface <iftype> <ifnum> [qtype <integer(1-65535)>]
[scheduler <integer(1-8)>] [weight <integer(1-1000)>] [priority
<integer(0-15)>] [queue-type {unicast | multicast}]
| class <class (1-65535)> | queue-id <queue-id (1-65535)>
no queue
no queue <integer(1-65535)> interface <iftype> <ifnum>
996
QUEUE
CHAPTER 29 QOS
Parameters
<integer(1-8)> Integer Enter to create a queue and configure the queue parameters
interface Enter to configure a specified interface.
<iftype> Enter to configure an interface type. Supports everything
except port-channel.
<ifnum> Enter to configure an Interface number.
qtype Enter for queue template type related configuration.
<integer(1-65535)> Integer Enter a value for queue template type. This value ranges from
0 to 65535.
scheduler Enter to configure scheduler identifier that manages the
specified queue.
<integer(1-8)> Integer Enter a value for scheduler identifier that manages the
specified queue. This value ranges from 1 to 8.
weight Enter for user assigned weight to the CoS queue.
<integer(0-1000)> Integer Enter a value for user assigned weight to the CoS queue. This
value ranges from 0 to 1000. The default is 0.
priority Enter for priority related configuration.
<integer(0-15)> Integer Enter a value for priority. This value ranges from 0 to 15.
queue-type Enter a value for Queue template type related configuration
unicast Enter for unicast (UC) queue to store known unicast packets.
multicast Enter a multicast (MC) queue to store DLF, multicast,
broadcast and mirrored packets
class Enter to configure input class that should be mapped to
anoutbound queue.
<class (1-65535)> Integer Enter a value for the input class (associated with an incoming
packet) that should be mapped to an outbound queue. This
value ranges from 0 to 65535.
queue-id Enter to configure Queue identifier.
<cqueue-id Integer Enter a value for Queue identifier that uniquely identifiesthe
(1-65535)> queue relative to an interface. This value ranges from 0 to
65535.
997
QUEUE-MAP
CHAPTER 29 QOS
Mode
Global Configuration Mode
Prerequisites
• scheduler identifier is unique relative to an egress interface.
• User assigned weights are used only when scheduling algorithm is a weighted scheduling algorithm.
• User assigned priority is used only when the scheduler uses a priority based scheduling algorithm.
Examples
iS5Comm(config)# queue 1 interface gigabitethernet 0/1 scheduler 1 weight 20 shaper 1
29.14. queue-map
To create a map for a queue with class or regenerated priority, use the command queue-map in Global
Configuration Mode. The no form of the command deletes a queue-map entry.
queue-map
queue-map CLASS <integer(1-65535)> queue-id <integer(1-65535)>
no queue-map
no queue-map CLASS <integer(1-65535)>
998
SCHEDULER
CHAPTER 29 QOS
Parameters
Mode
Global Configuration Mode
Prerequisites
• This command executes only if QoS is started in the system.
Examples
iS5Comm(config)# queue-map CLASS 2 queue-id 20
29.15. scheduler
To create a scheduler and configure the scheduler parameters, use the command scheduler in Global
Configuration Mode. The no form of the command deletes a scheduler.
scheduler
scheduler <integer(1-8)> interface <iftype> <ifnum> [sched-algo
{strict-priority | rr | wrr}]
999
SET CLASS
CHAPTER 29 QOS
no scheduler
no scheduler <integer(1-65535)> interface <iftype> <ifnum>
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# scheduler 8 interface gigabitethernet 0/1 sched-algo rr
1000
SET METER
CHAPTER 29 QOS
set class
set class <class integer(0-65535)> [pre-color {green | yellow | red | none}]
no set class
no set class <class integer(0-65535)>
Parameters
<class Integer Enter a value for the Traffic CLASS to which an incoming frame
integer(0-65535)> pattern is classified. The default is 0.
pre-color Enter to configure the color of the packet prior to metering.
green Enter to indicate Traffic conforming to SLAs (Service Level
Agreements.
yellow Enter to indicate Traffic exceeding the SLAs
red Enter to indicate Traffic violating the SLAs.
none Enter to indicate Traffic is not pre-colored.
Mode
Class Map Configuration Mode
Examples
iS5Comm(config)# class-map 1
iS5Comm(config-cls-map)# set class 1000 pre-color none
set meter
set meter <integer (1-65535)>
1001
SET METER
CHAPTER 29 QOS
no set meter
no set meter
1002
SET METER
CHAPTER 29 QOS
Parameters
<integer(1-65535)> Integer Enter a value for the meter table identifier which is the index
for the meter table. The value ranges from 1 to 65535.
conform-action Enter to configure action to be performed on the packet,
when the packets are found to be In profile (conform).
cos-transmit-set Enter to set the VLAN priority of the outgoing packet.
<short(0-7)> Enter a value to set the VLAN priority of the outgoing packet.
The value ranges from 0 to 7.
de-transmit-set Enter to set the VLAN drop eligible indicator of the outgoing
packet.
<short(0-1)> Integer Enter a value for the VLAN drop eligible indicator of the
outgoing packet. The value ranges from 0 to 1.
set-cos-transmit Enter to set the VLAN priority of the outgoing packet.
<short(0-7)> Integer Enter a value to set the VLAN priority of the outgoing packet.
The value ranges from 0 to 7.
set-de-transmit Enter to set the VLAN drop eligible indicator of the outgoing
packet.
<short(0-1>) Integer Enter a value for the VLAN drop eligible indicator (DE) of the
outgoing packet. The value ranges from 0 to 1.
set-port Enter to set new port value.
<iftype> Enter to set the interface type.
<ifnum> Enter a set the interface type
inner-vlan-pri-set Enter to set the inner VLAN priority of the outgoing packet.
<short(0-7)> Integer Enter a value to set the inner VLAN priority of the outgoing
packet. The value ranges from 0 to 7.
inner-vlan-de-set Enter to set the inner VLAN DE of the outgoing packet.
<short(0-1)> Integer Enter a value for the inner VLAN DE of the outgoing packet.
The value ranges from 0 to 1.
set-inner-vlan-pri Enter to set the inner VLAN priority of the outgoing packet.
<short(0-7)> Integer Enter a value to set the VLAN priority of the outgoing packet.
The value ranges from 0 to 7.
set-inner-vlan-de Enter to set the inner VLAN DE of the outgoing packet.
1003
SET METER
CHAPTER 29 QOS
<short(0-1)> Integer Enter a value for the VLAN DE of the outgoing packet. The
value ranges from 0 to 1.
set-mpls-exp-trans Enter to set the MPLS experimental bits of the outgoing
mit packet.
<short(0-7)> Integer Enter a value to set the MPLS experimental bits of the
outgoing packet. The value ranges from 0 to 7.
set-ip-prec-transm Enter to set the new IP Type of Service.
it
<short(0-7)> Integer Enter a value for new IP Type of Service. It ranges from 0 to 1.
set-ip-dscp-transm Enter to set the new DSCP.
it
<short(0-63)> Integer Enter a value to set the new DSCP. The value ranges from 0 to
7.
exceed-action Enter to configure the action to be performed on the packet,
when the packets are found to be In profile (exceed)
drop Enter to drop the packet.
cos-transmit-set Enter to set the VLAN priority of the outgoing packet.
<short(0-7)> Integer Enter a value to set the VLAN priority of the outgoing packet.
The value ranges from 0 to 7.
de-transmit-set Enter to set the VLAN drop eligible indicator of the outgoing
packet.
<short(0-1)> Integer Enter a value for the VLAN drop eligible indicator of the
outgoing packet. The value ranges from 0 to 1.
set-cos-transmit Enter to set the VLAN priority of the outgoing packet.
<short(0-7)> Integer Enter a value to set the VLAN priority of the outgoing packet.
The value ranges from 0 to 7.
set-de-transmit Enter to set the VLAN drop eligible indicator of the outgoing
packet.
<short(0-1)> Integer Enter a value for the VLAN drop eligible indicator (DE) of the
outgoing packet. The value ranges from 0 to 1.
inner-vlan-pri-set Enter to set the inner VLAN priority of the outgoing packet.
<short(0-7)> Integer Enter a value to set the inner VLAN priority of the outgoing
packet. The value ranges from 0 to 7.
1004
SET METER
CHAPTER 29 QOS
1005
SET METER
CHAPTER 29 QOS
<integer(0-65535)> Integer Enter a value the Traffic class to which an incoming frame
pattern is classified after metering. The value ranges from 0 to
65535.
violate-action Enter to configure the action to be performed on the packet,
when the packets are found to be out of profile (violate).
drop Enter to drop the packet.
cos-transmit-set Enter to set the VLAN priority of the outgoing packet.
<short(0-7)> Integer Enter a value to set the VLAN priority of the outgoing packet.
The value ranges from 0 to 7.
de-transmit-set Enter to set the VLAN drop eligible indicator of the outgoing
packet.
<short(0-1)> Integer Enter a value for the VLAN drop eligible indicator of the
outgoing packet. The value ranges from 0 to 1.
set-cos-transmit Enter to set the VLAN priority of the outgoing packet.
<short(0-7)> Integer Enter a value to set the VLAN priority of the outgoing packet.
The value ranges from 0 to 7.
set-de-transmit Enter to set the VLAN drop eligible indicator of the outgoing
packet.
<short(0-1)> Enter a value for the VLAN drop eligible indicator (DE) of the
outgoing packet. The value ranges from 0 to 1.
inner-vlan-pri-set Enter to set the inner VLAN priority of the outgoing packet.
<short(0-7)> Integer Enter a value to set the inner VLAN priority of the outgoing
packet. The value ranges from 0 to 7.
inner-vlan-de-set Enter to set the inner VLAN DE of the outgoing packet.
<short(0-1)> Integer Enter a value for the inner VLAN DE of the outgoing packet.
The value ranges from 0 to 1.
set-inner-vlan-pri Enter to set the inner VLAN priority of the outgoing packet.
<short(0-7)> Integer Enter a value to set the VLAN priority of the outgoing packet.
The value ranges from 0 to 7.
set-inner-vlan-de Enter to set the inner VLAN DE of the outgoing packet.
<short(0-1)> Enter a value for the VLAN DE of the outgoing packet. The
value ranges from 0 to 1.
1006
SET METER-STATS
CHAPTER 29 QOS
Mode
Policy Map Configuration Mode
Defaults
• set-cos-transmit - 0
• set-de-transmit - 0
• set-mpls-exp-transmit - 0
• set-inner-vlan-pri - 0
Prerequisites
VLAN priority can be set to a non-zero value only when MPLS Experimental bits is set to zero.
Examples
iS5Comm(config)# policy-map 1
iS5Comm(config-ply-map)# set meter 10 conform-action cos-transmit-set 5 exceed-action
cos-transmit-set 5 set-conform-newclass 100 set-exceed-newclass 100 set-violate-newclass 10
1007
SET POLICY
CHAPTER 29 QOS
set meter-stats
set meter-stats {disable | enable} [meter-id [<integer (1-65535)>]
Parameters
Mode
Global Configuration Mode
Prerequisites
To enable or disable meter statistics to a specific meter-id, Meter id and policy map related configuration
should be already created.
Examples
iS5Comm(config)# set meter-stats enable meter-id 1
1008
SET POLICY
CHAPTER 29 QOS
set policy
set policy [class <integer(0-65535>] {interface <iftype> <ifnum>
default-priority-type {none | vlanPri <integer(0-7)> | dot1P <integer<0-7)>
<integer<0-1)> | ipDscp <integer(0-63)>}}
no set policy
no set policy interface
1009
SET POLICY
CHAPTER 29 QOS
Parameters
class Enter to specify the Traffic class for which the policy-map needs to
be applied.
NOTE: Class needs to be created using the set class command to
configure this parameter.
Integer Enter a value for the Traffic class. This value ranges from 0 to 63.
<integer(0-63)> The default is 0.
interface Enter to configure type of interface for the outbound queue.
<iftype> Enter to configure an interface type. Supports everything except
port-channel. The options are:
• gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports
only full duplex links.
<ifnum> Enter to configure he type of interface for the outbound queue.
This is a unique value that represents the specific interface. This
value is a combination of slot number and port number separated
by a slash, for interface type other than internal-lan and
port-channel. Only i-lan id is provided, for interface types
internal-lan.
Enter to Sets the Per-Hop Behavior (PHB) type to be used for filling
default-priorit the default (per-hop) behavior PHB for the policy map entry for the
y-type specified interface.
none Enter to set the default PHB type as none.
vlanPri Enter to set the PHB type as VLAN Priority.
<integer(0-7)> Integer Enter a value for the PHB type as VLAN Priority. It ranges from 0 to
1.
dot1P Enter to set the PHB type as dot1P.
<integer(0-7)> Integer Enter a value for the PHB type as VLAN Priority. It ranges from 0 to
7.
<integer(0-1)> Integer Enter a value for the default DEI. This value ranges from 0 to 1.
ipDscp Integer Enter to set priority type to IP Differentiated Services Code Point.
1010
SHAPE-TEMPLATE
CHAPTER 29 QOS
Integer Enter a value for the PHB type as IP Differentiated Services Code
<integer(0-63)> Point. This value ranges from 0 to 63.
Mode
Policy Map Configuration Mode
Prerequisites
Policy Map entry must be created.
Examples
iS5Comm(config)# policy 1
iS5Comm(config-ply-map)# set policy class 1 interface gigabitethernet 0/1 default-priority-type none
iS5Comm(config-ply-map)# set policy default-priority-type dot1P 7 0
29.20. shape-template
To create a shape-template, use the command shape-template in Global Configuration Mode. The no
form of the command deletes a shape-template.
shape-template
shape-template <integer(1-65535)> [cir (1-10485760)>] [cbs (0-10485760)>]
no shape-template
no shape-template <integer(1-65535)>
1011
SHOW CLASS-MAP
CHAPTER 29 QOS
Parameters
Integer Enter a value for the shape Template table index. This value ranges
<integer(1-65 from 1 to 65535.
535)>
cir Enter to configure the committed information rate (cir) for packets
through the queue. This value ranges from 1 to 10485760. Cir should
be less than excess information rate (eir). For eir, see meter-type
command.
Integer Enter a value for the shape Template table index. This value ranges
<integer((1-1 from 1 to 65535.
0485760)>
cbs Enter to configure the committed burst size (cbs) for packets through
the queue.
<integer((0-1 Integer Enter a value for the committed burst size for packets through the
0485760)> queue. This value ranges from 0 to 10485760.
Mode
Global Configuration Mode
Examples
iS5Comm(config)# shape-template 1 cir 20 cbs 40
show class-map
show class-map <class-map-id (1-65535)>
1012
SHOW METER
CHAPTER 29 QOS
Parameters
Enter a value for the class map configurations for the specified class
<class-map-i map entry to be displayed. The value ranges from 1 to 65535.
d(1-65535)>
Mode
Privileged EXEC Mode
Examples
iS5Comm# show class-map
QoS Class Map Entries
---------------------
ClassMapId : 1
L2FilterId : None
L3FilterId : None
PriorityMapId : 1
VlanMapId : None
CLASS : 1000
PolicyMapId : None
PreColor : None
Status : Active
show meter
show meter [<meter-id (1-1000)>]
1013
SHOW METER
CHAPTER 29 QOS
Parameters
Enter a value for the configurations for the index that enumerates the
<meter-id(1- meter entries. The value ranges from 1 to 1000.
1000)>
Mode
Privileged EXEC Mode
Examples
iS5Comm# show meter
QoS Meter Entries
-----------------
MeterId : 1
Type : SRTCMC
olor Mode : Color Blind
Interval : None
CIR : 20
CBS : 20
EIR : None
EBS : 20
NextMeter : None
Status : Active
MeterId : 10
Type : Simple Token Bucket
Color Mode : Color Blind
Interval : None
CIR : None
CBS : None
EIR : None
EBS : None
NextMeter : None
Status : InActive
1014
SHOW POLICY-MAP
CHAPTER 29 QOS
show policy-map
show policy-map [<policy-map-id (1-65535)>]
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show policy-map
QoS Policy Map Entries
----------------------
PolicyMapId : 2
IfIndex : 0
Class : 0
DefaultPHB : Dot1P
PHB Value : 7
DE Value : 0
MeterId : 0
ConNClass : 0
ExcNClass : 0
VioNClass : 0
ConfAct : None.
ExcAct : None.
VioAct : None.
1015
SHOW QOS
CHAPTER 29 QOS
PolicyMapId : 3
IfIndex : 0
Class : 0
DefaultPHB : Dot1P
PHB Value : 7
DE Value : 0
MeterId : 0
ConNClass : 0
ExcNClass : 0
VioNClass : 0
ConfAct : None.
ExcAct : None.
VioAct : None.
show qos
show qos {global info
| meter-stats [<Meter-Id(1-65535)>]
| pbit-preference-over-Dscp [interface <iftype> <ifnum>]
queue-stats [interface <iftype> <ifnum>]}
1016
SHOW QOS
CHAPTER 29 QOS
Parameters
1017
SHOW QOS
CHAPTER 29 QOS
Mode
Privileged EXEC Mode
Examples
iS5Comm# show qos global info
QoS Global Information
----------------------
System Control : Start
System Control : Enable
Rate Unit : kbps
Rate Granularity : 64
Trace Flag : 0
iS5Comm# show qos meter-stats
QoS Meter (Policer) Stats
-------------------------
Meter Index : 1
Conform Packets : 00
Conform Octets : 00
Exceed Packets : 00
1018
SHOW QOS
CHAPTER 29 QOS
1019
SHOW QUEUE
CHAPTER 29 QOS
---------------I
nterface Index : Gi0/1
Queue Index : 1
EnQ Packets : 0
EnQ Octets : 0
DeQ Packets : 0
DeQ Octets : 0
Discard Packets : 0
Discard Octets : 0
Occupancy Octets : 0
CongMgntAlgoDrop Octets : 0
show queue
show queue [interface <iftype> <ifnum>]
1020
SHOW QUEUE
CHAPTER 29 QOS
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show queue interface gi 0/1
QoS Queue Entries
-----------------
IfIndex Queue QTemplate Scheduler Weight Priority QType ShapeIdx
GlobalId
------- ----- --------- --------- ------ -------- ----- --------
--------
Gi0/1 1 1 8 NA 0 UC none 1
Gi0/1 2 1 8 NA 1 UC none 2
Gi0/1 3 1 8 NA 2 UC none 3
Gi0/1 4 1 8 NA 3 UC none 4
Gi0/1 5 1 8 NA 4 UC none 5
Gi0/1 6 1 8 NA 5 UC none 6
Gi0/1 7 1 8 NA 6 UC none 7
Gi0/1 8 1 8 NA 7 UC none 8
iS5Comm# show queue 1
1021
SHOW QUEUE-MAP
CHAPTER 29 QOS
show queue-map
show queue-map [interface <iftype> <ifnum>]
Parameters
Mode
Privileged EXEC Mode
1022
SHOW QUEUE-TEMPLATE
CHAPTER 29 QOS
Examples
iS5Comm# show queue-map
QoS queue Map Entries
---------------------
IfIndex CLASS PriorityType Priority Value Mapped Queue
---------- ---------- --------------- --------------- ---------------
0 none VlanPri 0 1
0 none VlanPri 1 2
0 none VlanPri 2 3
0 none VlanPri 3 4
0 none VlanPri 4 5
0 none VlanPri 5 6
0 none VlanPri 6 7
0 none VlanPri 7 8
show
show queue-template [<queue-template-id (1-65535)>]
Parameters
Mode
Privileged EXEC Mode
1023
SHOW SCHEDULER
CHAPTER 29 QOS
Examples
iS5Comm# show queue-template
Q Queue Template Entries
----------------------
Q Template Id : 1
Q Limit : 10000
Drop Type : Tail Drop
Drop Algo Status : Disable
show scheduler
show scheduler [interface <iftype> <ifnum>]
1024
SHOW SHAPE-TEMPLATE
CHAPTER 29 QOS
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show scheduler interface gi 0/1
QoS scheduler Entries
---------------------
IfIndex Scheduler Index Scheduler Algo Shape Index Scheduler HL
GlobalId
---------- --------------- -------------------- ----------- ------------
------------
Gi0/1 8 strictPriority 0 0 29
1025
SHOW SHAPE-TEMPLATE
CHAPTER 29 QOS
show shape-template
show shape-template [<shape-template-id (1-65535)>]
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show shape-template
QoS shape template Entries
--------------------------
ShapeTemplate Id CIR CBS EIR EBS
---------------- -------------- -------------- -------------- ----------
1 20 40 10000 10000
1026
DENY
CHAPTER 30 ACL
ACL
30. ACL
The device offers a portable design that allows rapid integration of the solution with the choice of RTOS,
CPU, and various chipsets. This section describes the CLI commands of the Access Control list (
ACL) features.
The ACL space is shared by Layer 2 ACLs, Layer 3 ACLs, and the filters used for trapping the protocol
packets to CPU.
When all features are enabled in the build, all protocol filters will be in use. When certain features are
not included in the build, then lesser number of protocol filters will be in use. Hence, a greater number
of Layer 2 ACL and Layer 3 ACLs can possibly be created.
The ACL count also depends on the number of ports on which the ACL are applied. For example, for the
build combination with the listed modules:
The ACL maximum is as follows:
• Maximum number of Layer 2 ACLs (MAC ACLs) – 767
• Maximum number of Layer 3 standard ACLs (IP-Standard) – 394
• Maximum number of Layer 3 extended ACLs (IP- Extended) – 788
NOTE: In this example, ACLs are considered to be applied to a port.
When an ACL is created, it becomes active in the control plane. When the ACL is applied on a port, the
ACL gets provisioned in the hardware.
NOTE: The switch does not support ACL counters. Also, the deny packets configured through ACL will not
be displayed in the output of “show interface counters”– discard packet counters.
30.1. deny
To configure that traffic is denied for a particular protocol packet if the conditions defined in the deny
statement are matched, use the command deny in Extended ACL IP Configuration Mode.
1027
DENY
CHAPTER 30 ACL
deny
deny {ip | ospf | pim <protocol-type (1-255)>}
{any | host <src-ip-address>} | <src-ip-address>} <mask>}
{any | host <dest-ip-address>} | <dest-ip-address>} <mask>}
[{tos {max-reliability | max-throughput | min-delay | normal |<value(0-7)>}
| dscp <value (0-63)>}] {priority <value (1-255)>}]
[svlan-id <vlan-id (1-4094)>] [svlan-priority <value (0-7)>] [cvlan-id
<vlan-id (1-4094)>] [cvlan-priority <value (0-7)>]
[{single-tag | double-tag}]
1028
DENY
CHAPTER 30 ACL
Parameters
1029
DENY
CHAPTER 30 ACL
<value(0-7)> Enter to allow the protocol packets based on the TOS value set. This
value ranges from 0 to 7. This value represents different combination of
TOS.
• 0 - Allows all protocol packets. Does not check for the TOS field in
the packets.
• 1 - Allows the protocol packets having TOS field set as high reli-
ability.
• 2 - Allows the protocol packets having TOS field set as high
throughput.
• 3 - Allows the protocol packets having TOS field set either as high
reliability or high throughput.
• 4 - Allows the protocol packets having TOS field set as low delay.
• 5 - Allows the protocol packets having TOS field set either as low
delay or high reliability.
• 6 - Allows the protocol packets having TOS field set either as low
delay or high throughput.
• 7 - Allows the protocol packets having TOS field set either as low
delay or high reliability or high throughput.
dscp Enter to configure the Differentiated Services Code Point (DSCP) value
to be checked against the packet.
<value((0-63 Enter a DSCP value. This value provides the quality of service control.
)> This value ranges from 0 to 63.
priority Enter to configure the priority of the filter to decide which filter rule is
applicable when the packet matches with more than one filter rules.
Higher value of ‘filter priority’ implies a higher priority.
<short Enter a priority value. This value ranges from 1 to 255.
(1-255)>
svlan-id Enter to configure Service VLAN value to match against incoming
packets.
<vlan-id Enter a value for Service VLAN.
(1-4094)>>
svlan-priori Enter to configure the Service VLAN priority value to match against
ty incoming packets
<value Enter a Service VLAN priority value. This value ranges from 0 to 7.
(0-7)>
cvlan-id Enter to configure Customer VLAN priority value to match against
incoming packets.
1030
DENY
CHAPTER 30 ACL
1031
DENY
CHAPTER 30 ACL
dst-mac Enter to specify that the traffic distribution is based on the destination
MAC address.
vlanid Enter to specify that the traffic distribution is based on the VLAN ID to
be filtered.
src-tcpport Enter to specify that the traffic distribution is based on the source TCP
port number.
dst-tcpport Enter to specify that the traffic distribution is based on the destination
TCP Port number.
src-udpport Enter to specify that the traffic distribution is based on the source UDP
port number
dst-udpport Enter to specify that the traffic distribution is based on the destination
UDP port number.
sub-action Enter to configure the VLAN specific sub action to be performed on the
packet.
none Enter to specify that the actions related to the VLAN ID will not be
considered.
modify-vlan Enter to specify to modify the VLAN ID to which the packet gets
classified. The packet could be an untagged or VLAN tagged packet.
<short Integer Enter a value for the VLAN ID to which the packet gets classified. This
(1-4094)> value ranges from 1 to 4094.
nested-vlan Enter to specify to add an outer VLAN tag to the packet with the
specified VLAN ID (nested VLAN).
<short Integer Enter a value for the outer VLAN tag to the packet with the specified
(1-4094)> VLAN ID. This value ranges from 1 to 4094.
Mode
Extended ACL IP Configuration Mode
Default
• protocol-type - 255
• priority - 1
• dscp - 0
• svlan-id - 0
• svlan-priority - 1
1032
DENY
CHAPTER 30 ACL
• cvlan-id - 0
• cvlan-priority - 1
• single-tag | double-tag - Single tag
Examples
iS5Comm (config)# ip access-list extended 1001
iS5Comm (config-ext-nacl)# deny ip any any priority 10
iS5Comm (config-ext-nacl)#
30.2. deny
To configure the packets to be rejected based on the MAC address and the associated parameters, use
the command deny in Extended ACL MAC Configuration Mode. This command allows non-IP traffic to be
rejected if the conditions are matched.
deny
deny {any | host <src-ip-address>} | host <dest-mac-address>}
[{aarp | amber | dec-spanning | decnet-iv | diagnostic | dsm | etype-6000 |
etype-8042 | lat | lavc-sca | mop-console | mop-dump | msdos | mumps |
netbios | vines-echo | vines-ip | xns-id | <protocol (0-65535)>
| encaptype | <integer (1-65535)>] [vlan <vlan-id (1-4094)>] {priority
<value (1-255)>}]
[outerEtherType < integer (1-65535)>] [svlan-id <vlan-id (1-4094)>]
[svlan-priority <value (0-7)>] [cvlan-priority <value (0-7)>]
[{single-tag | double-tag}]
[redirect {interface <iftype> <ifnum> | <iftype> <ifnum> [<iftype>
1033
DENY
CHAPTER 30 ACL
Parameters
any Enter to specify that control packets can be denied from any source.
host Enter to specify the host source MAC address from which the control
packets are denied.
<src-ip-add Enter a value for the host source MAC address to be used for forwarding
ress> the packets.
host Enter to specify the destination MAC address from which the packets are
denied.
<dest-mac-a Enter a value for the destination MAC address from which the packets
ddress> are denied.
aarp Enter to configure the non-IP protocol type as Ethertype AppleTalk
Address Resolution Protocol that maps a data-link address to a network
address.
amber Enter to configure the non-IP protocol type as the address of the host
that the packet is destined for.
dec-spannin Enter to configure the non-IP protocol type as EtherType Digital
g Equipment Corporation spanning tree
decnet-iv Enter to configure the non-IP protocol type as EtherType DECnet Phase
IV protocol.
diagnostic Enter to configure the non-IP protocol type as EtherType
DEC-Diagnostic.
dsm Enter to configure the non-IP protocol type as EtherType DEC-DSM/DDP.
etype-6000 Enter to configure the non-IP protocol type as EtherType 0x6000.
etype-8042 Enter to configure the non-IP protocol type as EtherType 0x8042.
lat Enter to configure the non-IP protocol type as EtherType DEC-LAT.
lavc-sca Enter to configure the non-IP protocol type as EtherType DEC-LAVC-SCA
mop-console Enter to configure the non-IP protocol type as EtherType DEC-MOP
Remote Console
mop-dump Enter to configure the non-IP protocol type as EtherType DEC-MOP
Dump.
msdos Enter to configure the non-IP protocol type as EtherType DEC-MSDOS.
mumps Enter to configure the non-IP protocol type as EtherType DEC-MUMPS.
1034
DENY
CHAPTER 30 ACL
netbios Enter to configure the non-IP protocol type as EtherType DEC- Network
Basic Input/Output System.
vines-echo Enter to configure the non-IP protocol type as EtherType Virtual
Integrated Network
vines-ip Enter to configure the non-IP protocol type as EtherType VINES IP
xns-id Enter to configure the non-IP protocol type as EtherType Xerox Network
Systems protocol suite
<protocol Enter to configure the non-IP protocol type to be filtered. This value
(0-65535)> ranges from 0 to 65535. The value 0 represents that filter is applicable
for all protocols.
encaptype Enter to configure the arbitary ether type of a packet with Ethernet II or
SNAP encapsulation in decimal
<short Enter a value for the arbitary ether type of a packet. This value ranges
(1-65535)> from 1 to 65535.
vlan Enter to specify the VLAN ID to be filtered.
<vlan-id Enter a value for the VLAN ID. This value ranges from 1 to 4094.
(1-4094)>
priority Enter to specify the priority of the filter to decide which filter rule is
applicable when the packet matches with more than one filter rules.
Higher value of ‘filter priority’ implies a higher priority.
<short Enter a priority value. This value ranges from 1 to 255.
(1-255)>
outerEtherT Enter to specify the EtherType value to match on Service vlan tag
ype (OutEthertype)
<Integer Enter a value for OutEthertype. The value ranges from 1 to 65535.
(1-65535)>
svlan-id Enter to configure Service VLAN ID value to match against incoming
packets.
<vlan-id Enter a value for Service VLAN ID. This value ranges from 1 to 4094.
(1-4094)>
svlan-prior Enter to configure Customer VLAN priority value to match against
ity incoming packets.
<value Enter a Service VLAN priority value. This value ranges from 0 to 7.
(0-7)>
1035
DENY
CHAPTER 30 ACL
Mode
Extended ACL MAC Configuration Mode
Default
• <protocol (0-65535)> - 0
• vlan-id - 0
• priority - 1
• outerEtherType - 0
• svlan-id - 0
• cvlan-priority - 1
• svlan-priority - 1
• single-tag | double-tag - Single tag
Examples
iS5Comm (config)# mac access-list extended 5
iS5Comm (config-ext-macl)# deny any any priority 100
iS5Comm (config-ext-macl)#
30.3. deny
To configure that traffic is denied if the conditions defined in the deny statement are matched, use the
command deny in Standard ACL Configuration Mode.
1036
DENY
CHAPTER 30 ACL
deny
deny {any | host <src-ip-address> | <network-src-ip> <mask>}
[{any | host <src-ip-address> | <network-src-ip> <mask>}]
priority <value (1-255)>
1037
DENY
CHAPTER 30 ACL
Parameters
any Enter to specify that packets can be forwarded from any source IP Address.
host Enter to specify the host source IPv4 address to be used for forwarding the
packets
Enter a value for the host source IPv4 address to be used for forwarding the
<src-ip- packets.
address>
Enter to specify the address of the host that the packet is from.
<network
-src-ip>
<mask> Enter to specify the network mask to be used with the source IP address.
any Enter to specify that packets can be denied to any destination
host Enter to specify the destination IPv4 address from which the packets are
denied.
Enter a value for the destination IPv4 address from which the packets are
<src-ip- denied.
address>
Enter to specify the address of the host that the packet is destined for.
<network
-src-ip>
<mask> Enter to specify the network mask to use with the destination IP address
priority Enter to specify the priority of the filter to be decided which filter rule is
applicable when the packet matches with more than one filter rules. Higher
value of ‘filter priority’ implies a higher priority.
<value Integer Enter a value for the priority of the filter. This value ranges from 1 to 255.
(1-255)>
Mode
Standard ACL Configuration Mode
Default
priority - 1
1038
DENY ICMP
CHAPTER 30 ACL
Examples
iS5Comm (config)# ip access-list standard 1
iS5Comm (config-std-nacl)# deny any priority 10
deny
deny icmp
{any | host <src-ip-address>} | <src-ip-address>} <src-mask>}
{any | host <dest-ip-address>} | <dest-ip-address>} <dest-mask>}
[message-type <short (0-255)>] [message-code <short (0-255)>] {priority
<value (1-255)>}]
[{tos {max-reliability | max-throughput | min-delay | normal |<value(0-7)>}
| dscp <value (0-63)>}] {priority <value (1-255)>}]
[svlan-id <vlan-id (1-4094)>] [svlan-priority <value (0-7)>] [cvlan-id
<vlan-id (1-4094)>] [cvlan-priority <value (0-7)>]
[{single-tag | double-tag}]
1039
DENY ICMP
CHAPTER 30 ACL
Parameters
1040
DENY ICMP
CHAPTER 30 ACL
<short Integer Enter a ICMP Message type. This value ranges from 0 to 255. Some of
(0-255)> the ICMP message types are:
• Value ICMP Message type
• 0 Echo reply
• 3 Destination unreachable
• 4 Source quench
• 5 Redirect
• 8 Echo request
• 11 Time exceeded
• 12 Parameter problem
• 13 Timestamp request
• 14 Timestamp reply
• 15 Information request
• 16 Information reply
• 17 Address mask request
• 18 Address mask reply
• 55 No ICMP type
message-code Enter to configure the ICMP Message code to be checked against the
packet. The packet is allowed if it matches with the message type.
<short Integer Enter a ICMP Message code. This value ranges from 0 to 255. Some of
(0-255)> the ICMP message Codes are:
• Value ICMP code
• 0 Network unreachable
• 1 Host unreachable
• 2 Protocol unreachable
• 3 Port unreachable
• 4 Fragment needed
• 5 Source route fail
• 6 Destination network unknown
• 7 Destination host unknown8 Source host isolated
• 9 Destination network administratively prohibited
• 10 Destination host administratively prohibited
• 11 Network unreachable TOS
• 12 Host unreachable TOS
• 255 No ICMP code
1041
DENY ICMP
CHAPTER 30 ACL
gt Enter to deny only the ICMP control packets having the ICMP
destination port numbers greater than the specified port number.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
lt Enter to deny only the ICMP control packets having the ICMP
destination port numbers lesser than the specified port number.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
eq Enter to deny only the ICMP control packets having the specified ICMP
destination port number.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
range Enter to deny only the ICMP control packets having the ICMP
destination port numbers within the specified range.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
tos Enter to deny the ICMP packets based on the following type of service
configuration.
max-reliabil Enter to deny the ICMP packets having TOS field set as high reliability.
ity
max-throughp Enter to deny the ICMP packets having TOS field set as high throughput.
ut
min-delay Enter to deny the ICMP packets having TOS field set as low delay
normal Enter to deny all ICMP packets. Does not check for the TOS field in the
packets.
1042
DENY ICMP
CHAPTER 30 ACL
<value(0-7)> Enter to deny the protocol packets based on the TOS value set. This
value ranges from 0 to 7. This value represents different combination of
TOS.
• 0 - Denies all protocol packets. Does not check for the TOS field in
the packets.
• 1 - Denies the protocol packets having TOS field set as high reli-
ability.
• 2 - Denies the protocol packets having TOS field set as high
throughput.
• 3 - Denies the protocol packets having TOS field set either as high
reliability or high throughput.
• 4 - Denies the protocol packets having TOS field set as low delay.
• 5 -Denies the protocol packets having TOS field set either as low
delay or high reliability.
• 6 - Denies the protocol packets having TOS field set either as low
delay or high throughput.
• 7 - Denies the protocol packets having TOS field set either as low
delay or high reliability or high throughput.
dscp Enter to configure the Differentiated Services Code Point (DSCP) value
to be checked against the packet
<value((0-63 Enter a DSCP value. This value provides the quality of service control.
))> This value ranges from 0 to 63.
priority Enter to configure the priority of the filter to decide which filter rule is
applicable when the packet matches with more than one filter rules.
Higher value of ‘filter priority’ implies a higher priority.
<short Enter a priority value. This value ranges from 1 to 255.
(1-255)>
svlan-id Enter to configure Service VLAN value to match against incoming
packets.
<vlan-id Enter a value for Service VLAN. This value ranges from 1 to 4094.
(1-4094)>
svlan-priori Enter to specify Service VLAN related configuration.
ty
<value Enter a Service VLAN ID value. This value ranges from 0 to 7.
(0-7)>
cvlan-id Enter to configure Customer VLAN value to be matched against
incoming packets.
1043
DENY TCP
CHAPTER 30 ACL
<vlan-id Enter a value for customer VLAN. This value ranges from 1 to 4094.
(1-4094)>
cvlan-priori Enter to configure Customer priority value to be matched against
ty incoming packets.
<value Enter a Customer vlan ID value. This value ranges from 0 to 7.
(0-7)>
double-tag Enter to specify that the filter is to be applied on double VLAN tagged
packets
single-tag Enter to specify that the filter is to be applied on Single VLAN tagged
packets
Mode
Extended ACL IP Configuration Mode
Default
• message-type / message code - 255
• priority - 1
• svlan-id - 0
• svlan-priority - 1
• cvlan-id - 0
• cvlan-priority - 1
• single-tag | double-tag - Single tag
Examples
iS5Comm (config)# ip access-list extended 1001
iS5Comm (config-ext-nacl)# deny icmp any any priority 1
1044
DENY TCP
CHAPTER 30 ACL
deny
deny tcp
{any | host <src-ip-address>} | <src-ip-address>} <src-mask>}
[{gt <port-number (1-65535)> | lt <port-number (1-65535)> | eg <port-number
(1-65535)> | range <port-number (1-65535)> <port-number (1-65535)>}]
{any | host <dest-ip-address>} | <dest-ip-address>} <dest-mask>}
[{gt <port-number (1-65535)> | lt <port-number (1-65535)> | eg <port-number
(1-65535)> | range <port-number (1-65535)> <port-number (1-65535)>}] [{ack |
rst}]
[{tos {max-reliability | max-throughput | min-delay | normal |<value(0-7)>}
| dscp <value (0-63)>}] {priority <value (1-255)>}]
[svlan-id <vlan-id (1-4094)>] [svlan-priority <value (0-7)>] [cvlan-id
<vlan-id (1-4094)>] [cvlan-priority <value (0-7)>]
[{single-tag | double-tag}]
1045
DENY TCP
CHAPTER 30 ACL
Parameters
1046
DENY TCP
CHAPTER 30 ACL
<dest-ip-add Enter a value for the host destination IPv4 address to which the packets
ress> are denied.
<dest-mask> Enter to specify the network mask to be used with the destination IP
address.
gt Enter to deny only the TCP control packets having the TCP destination
port numbers greater than the specified port number.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
lt Enter to deny only the TCP control packets having the TCP destination
port numbers lesser than the specified port number.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
eq Enter to deny only the TCP control packets having the specified TCP
destination port number.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
range Enter to deny only the TCP control packets having the TCP destination
port numbers within the specified range.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
ack Enter to configure the TCP ACK bit to be checked against the packet.
rst Enter to configure the TCP RST bit to be checked against the packet.
tos Enter to deny the TCP packets based on the following type of service
configuration.
max-reliabil Enter to deny the TCP packets having TOS field set as high reliability.
ity
max-throughp Enter to deny the TCP packets having TOS field set as high throughput.
ut
min-delay Enter to deny the TCP packets having TOS field set as low delay
normal Enter to deny all TCP packets. Does not check for the TOS field in the
packets.
1047
DENY TCP
CHAPTER 30 ACL
<value(0-7)> Enter to deny the protocol packets based on the TOS value set. This
value ranges from 0 to 7. This value represents different combination of
TOS.
• 0 - Denies all protocol packets. Does not check for the TOS field in
the packets.
• 1 - Denies the protocol packets having TOS field set as high reli-
ability.
• 2 - Denies the protocol packets having TOS field set as high
throughput.
• 3 - Denies the protocol packets having TOS field set either as high
reliability or high throughput.
• 4 - Denies the protocol packets having TOS field set as low delay.
• 5 -Denies the protocol packets having TOS field set either as low
delay or high reliability.
• 6 - Denies the protocol packets having TOS field set either as low
delay or high throughput.
• 7 - Denies the protocol packets having TOS field set either as low
delay or high reliability or high throughput.
dscp Enter to configure the Differentiated Services Code Point (DSCP) value
to be checked against the packet
<value((0-63 Enter a DSCP value. This value provides the quality of service control.
))> This value ranges from 0 to 63.
priority Enter to configure the priority of the filter to decide which filter rule is
applicable when the packet matches with more than one filter rules.
Higher value of ‘filter priority’ implies a higher priority.
<short Enter a priority value. This value ranges from 1 to 255.
(1-255)>
svlan-id Enter to configure Service VLAN value to match against incoming
packets.
<vlan-id Enter a value for Service VLAN. This value ranges from 1 to 4094.
(1-4094)>
svlan-priori Enter to specify Service VLAN related configuration.
ty
<value Enter a Service VLAN ID value. This value ranges from 0 to 7.
(0-7)>
cvlan-id Enter to configure Customer VLAN value to be matched against
incoming packets.
1048
DENY TCP
CHAPTER 30 ACL
<vlan-id Enter a value for customer VLAN. This value ranges from 1 to 4094.
(1-4094)>
cvlan-priori Enter to configure Customer priority value to be matched against
ty incoming packets.
<value Enter a Customer vlan ID value. This value ranges from 0 to 7.
(0-7)>
double-tag Enter to specify that the filter is to be applied on double VLAN tagged
packets
single-tag Enter to specify that the filter is to be applied on Single VLAN tagged
packets
Mode
Extended ACL IP Configuration Mode
Default
• any -Source and Destination address are not checked.
• gt - 0 (the packets are not checked for TCP port number)
• lt - 0 (the packets are not checked for TCP port number)
• eq - 0 (the packets are not checked for TCP port number)
• range - 0 for minimum port number, 65535 for maximum port number.
• tos-value - 0
• dscp - 1
• priority - 1
• svlan-id - 0
• svlan-priority - 1
• cvlan-id - 0
• cvlan-priority - 1
• single-tag | double-tag - Single tag
Examples
iS5Comm (config)# ip access-list extended 1001
iS5Comm (config-ext-nacl)# deny tcp any any priority 2
1049
DENY UDP
CHAPTER 30 ACL
deny
deny udp
{any | host <src-ip-address>} | <src-ip-address>} <src-mask>}
[{gt <port-number (1-65535)> | lt <port-number (1-65535)> | eg <port-number
(1-65535)> | range <port-number (1-65535)> <port-number (1-65535)>}]
{any | host <dest-ip-address>} | <dest-ip-address>} <dest-mask>}
[{gt <port-number (1-65535)> | lt <port-number (1-65535)> | eg <port-number
(1-65535)> | range <port-number (1-65535)> <port-number (1-65535)>}] [{ack |
rst}]
[{tos {max-reliability | max-throughput | min-delay | normal |<value(0-7)>}
| dscp <value (0-63)>}] {priority <value (1-255)>}]
[svlan-id <vlan-id (1-4094)>] [svlan-priority <value (0-7)>] [cvlan-id
<vlan-id (1-4094)>] [cvlan-priority <value (0-7)>]
[{single-tag | double-tag}]
1050
DENY UDP
CHAPTER 30 ACL
Parameters
1051
DENY UDP
CHAPTER 30 ACL
<dest-ip-add Enter a value for the host destination IPv4 address to which the packets
ress> are denied.
<dest-mask> Enter to specify the network mask to be used with the destination IP
address.
gt Enter to deny only the UDP control packets having the UDP destination
port numbers greater than the specified port number.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
lt Enter to deny only the UDP control packets having the UDP destination
port numbers lesser than the specified port number.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
eq Enter to deny only the UDP control packets having the specified UDP
destination port number.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
range Enter to deny only the UDP control packets having the UDP destination
port numbers within the specified range.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
tos Enter to deny the UDP packets based on the following type of service
configuration.
max-reliabil Enter to deny the UDP packets having TOS field set as high reliability.
ity
max-throughp Enter to deny the UDP packets having TOS field set as high throughput.
ut
min-delay Enter to deny the UDP packets having TOS field set as low delay
normal Enter to deny all UDP packets. Does not check for the TOS field in the
packets.
1052
DENY UDP
CHAPTER 30 ACL
<value(0-7)> Enter to deny the protocol packets based on the TOS value set. This
value ranges from 0 to 7. This value represents different combination of
TOS.
• 0 - Denies all protocol packets. Does not check for the TOS field in
the packets.
• 1 - Denies the protocol packets having TOS field set as high reli-
ability.
• 2 - Denies the protocol packets having TOS field set as high
throughput.
• 3 - Denies the protocol packets having TOS field set either as high
reliability or high throughput.
• 4 - Denies the protocol packets having TOS field set as low delay.
• 5 -Denies the protocol packets having TOS field set either as low
delay or high reliability.
• 6 - Denies the protocol packets having TOS field set either as low
delay or high throughput.
• 7 - Denies the protocol packets having TOS field set either as low
delay or high reliability or high throughput.
dscp Enter to configure the Differentiated Services Code Point (DSCP) value
to be checked against the packet
<value((0-63 Enter a DSCP value. This value provides the quality of service control.
))> This value ranges from 0 to 63.
priority Enter to configure the priority of the filter to decide which filter rule is
applicable when the packet matches with more than one filter rules.
Higher value of ‘filter priority’ implies a higher priority.
<short Enter a priority value. This value ranges from 1 to 255.
(1-255)>
svlan-id Enter to configure Service VLAN value to match against incoming
packets.
<vlan-id Enter a value for Service VLAN. This value ranges from 1 to 4094.
(1-4094)>
svlan-priori Enter to specify Service VLAN related configuration.
ty
<value Enter a Service VLAN ID value. This value ranges from 0 to 7.
(0-7)>
cvlan-id Enter to configure Customer VLAN value to be matched against
incoming packets.
1053
EGRESS ACCESS-LIST
CHAPTER 30 ACL
<vlan-id Enter a value for customer VLAN. This value ranges from 1 to 4094.
(1-4094)>
cvlan-priori Enter to configure Customer priority value to be matched against
ty incoming packets.
<value Enter a Customer vlan ID value. This value ranges from 0 to 7.
(0-7)>
double-tag Enter to specify that the filter is to be applied on double VLAN tagged
packets
single-tag Enter to specify that the filter is to be applied on Single VLAN tagged
packets
Mode
Extended ACL IP Configuration Mode
Default
• dscp - 1
• priority - 1
• svlan-id - 0
• svlan-priority - 1
• vlan-id - 0
• cvlan-priority - 1
• single-tag | double-tag - Single tag
Examples
iS5Comm (config)# ip access-list extended 1001
iS5Comm (config-ext-nacl)# deny udp any any priority 255
1054
IP ACCESS-GROUP
CHAPTER 30 ACL
egress access-list
egress access-list mode {ip | mac}
Parameters
Mode
Global Configuration Mode
Default
Default egress filtering mode is IP and it is running on the hardware.
Examples
iS5Comm (config)# egress access-list mode ip
30.8. ip access-group
To enable access control for the packets on the interface and control access to a Layer 2 or Layer 3 inter-
face, use the command ip access-group in Interface Configuration Mode. The no form of this command
removes all access groups or the specified access group from the interface. The direction of filtering is
specified using the token in or out.
1055
IP ACCESS-LIST
CHAPTER 30 ACL
ip access-group
ip access-group <access-list-number (1-65535)> {in | out}
no ip access-group
no ip access-group <access-list-number (1-65535)> {in | out}
Parameters
Mode
Interface Configuration Mode
Prerequisites
This command executes only if IP access list with the same number has been created
iS5Comm(config)# ip access-list standard 100
iS5Comm(config-std-nacl)# exit
Examples
iS5Comm(config)# int gi 0/1
iS5Comm(config-if)# ip access-group 100 in
iS5Comm(config-if)# ip access-group 100 out
30.9. ip access-list
To configure IP ACLs and enter the IP Access-list Configuration mode, use the command ip access-list in
Global Configuration Mode. Depending on the standard or extended option chosen by the user, this
command returns a corresponding IP ACL configuration mode. ACLs on the system perform both access
control and Layer 3 field classification. The no form of the command deletes the IP access list.
1056
IP ACCESS-LIST
CHAPTER 30 ACL
ip access-list
ip access-list {standard <access-list-number (1-1000)> | extended
<access-list-number (1001-65535)>}
no ip access-list
no ip access-list {standard <access-list-number (1-1000)> | extended
<access-list-number (1001-65535)>}
Parameters
standard Enter to configure a standard access list with the specified access
list number. Standard access lists create filters based on IP
address and network mask only (L3 filters only).
Integer Enter an access list number for a standard access list. The value
<access-list-num ranges from 1 to 1000.
ber(1-1000)>
extended Enter to configure an extended access list with the specified
access list number. Extended access lists enables specification of
filters based on the type of protocol, range of TCP/UDP ports as
well as the IP address and network mask (Layer 4 filters).
Integer Enter an access list number for an extended access list. The value
<access-list-num ranges from 1001 to 65535.
ber(1001-65535)>
Mode
Global Configuration Mode
Examples
iS5Comm (config)# ip access-list standard 1
iS5Comm (config-std-nacl)#
iS5Comm (config)# ip access-list extended 1001
iS5Comm (config-ext-nacl)#
1057
MAC ACCESS-GROUP
CHAPTER 30 ACL
mac access-group
mac access-group <access-list-number (1-65535)> {in | out}
no mac access-group
no mac access-group <access-list-number (1-65535)> {in | out}
Parameters
Enter a value to specify the MAC access control list number which
<access-list-nu is to be enabled on the interface. This value ranges from 1 to
mber(1-65535)> 65535.
in Enter to configure the packets as Inbound packets.
NOTE: The MAC ACL defined with both protocol and encaptype
combination cannot be applied to a Layer 2 Interface
out Enter to configure the packets as Outbound packets.
NOTE: Redirect Filter is not applicable for out bound packets.
Mode
Interface Configuration Mode
Prerequisites
MAC access list must have been created.
Examples
iS5Comm (config)# interface gi 0/1
iS5Comm (config-if)# mac access-group 5 in
1058
MAC ACCESS-LIST
CHAPTER 30 ACL
mac access-list
mac access-list extended <access-list-number (1001-65535)>}
no mac access-list
no mac access-list extended <access-list-number (1001-65535)>}
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm (config)# mac access-list extended 5
iS5Comm (config-std-macl)#
30.12. permit
To configure traffic for a particular protocol packet if the conditions defined in the permit statement are
matched, use the command permit in Extended ACL IP Configuration Mode.
1059
PERMIT
CHAPTER 30 ACL
permit
permit {ip | ospf | pim <protocol-type (1-255)>}
{any | host <src-ip-address>} | <src-ip-address>} <mask>}
{any | host <dest-ip-address>} | <dest-ip-address>} <mask>}
[{tos {max-reliability | max-throughput | min-delay | normal |<value(0-7)>}
| dscp <value (0-63)>}] {priority <value (1-255)>}]
[svlan-id <vlan-id (1-4094)>] [svlan-priority <value (0-7)>] [cvlan-id
<vlan-id (1-4094)>] [cvlan-priority <value (0-7)>]
[{single-tag | double-tag}]
[redirect {interface <iftype> <ifnum> | <iftype> <iface_list> [<iftype>
<iface_list>]
load-balance {src-ip | dst-ip | src-mac | dst-mac | vlanid | src-tcpport |
dst-tcpport | src-udpport | dst-udpport}}]
[sub-action {none | modify-vlan <short (1-4094)> | nested-vlan <short (1
-4094)>]
1060
PERMIT
CHAPTER 30 ACL
Parameters
1061
PERMIT
CHAPTER 30 ACL
<value(0-7)> Enter to allow the protocol packets based on the TOS value set. This
value ranges from 0 to 7. This value represents different combination of
TOS.
• 0 - Allows all protocol packets. Does not check for the TOS field in
the packets.
• 1 - Allows the protocol packets having TOS field set as high reli-
ability.
• 2 - Allows the protocol packets having TOS field set as high
throughput.
• 3 - Allows the protocol packets having TOS field set either as high
reliability or high throughput.
• 4 - Allows the protocol packets having TOS field set as low delay.
• 5 - Allows the protocol packets having TOS field set either as low
delay or high reliability.
• 6 - Allows the protocol packets having TOS field set either as low
delay or high throughput.
• 7 - Allows the protocol packets having TOS field set either as low
delay or high reliability or high throughput.
dscp Enter to configure the Differentiated Services Code Point (DSCP) value
to be checked against the packet
<value((0-63 Enter a DSCP value. This value provides the quality of service control.
)> This value ranges from 0 to 63.
priority Enter to configure the priority of the filter to decide which filter rule is
applicable when the packet matches with more than one filter rules.
Higher value of ‘filter priority’ implies a higher priority.
<short Enter a priority value. This value ranges from 1 to 255.
(1-255)>
svlan-id Enter to configure Service VLAN value to match against incoming
packets.
<vlan-id Enter a value for Service VLAN.
(1-4094)>>
svlan-priori Enter to specify Service VLAN related configuration
ty
<value Enter a Service VLAN ID value. This value ranges from 0 to 7.
(0-7)>
cvlan-id Enter to configure Customer VLAN value to match against incoming
packets.
1062
PERMIT
CHAPTER 30 ACL
<vlan-id Enter a value for Customer VLAN ID to match against incoming packets.
(1-4094)>
cvlan-priori Enter to specify Customer VLAN priority value to match against
ty incoming packets
<value Enter a customer vlan ID value. This value ranges from 0 to 7.
(0-7)>
double-tag Enter to specify that the filter is to be applied on double VLAN tagged
packets
single-tag Enter to specify that the filter is to be applied on Single VLAN tagged
packets
redirect Enter to redirect the action to the destination interface or set of
interfaces.
<iftype> Enter redirect the packets to the specified type of interface.The
interface can be:
• fastethernet – Officially referred to as 100BASE-T standard. This is
a version of LAN standard architecture that supports data transfer
up to 100 Megabits per second.
• gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports only
full duplex links
<ifnum> Enter to redirect the packets to the specified interface identifier. This is
a unique value that represents the specific interface. This value is a
combination of slot number and port number separated by a slash, for
interface types Gigabitethernet, Fastethernet and Extreme-Ethernet.
<iface_list> Enter to redirect the packets to the list of interfaces.
load-balance Enter to specify the parameters based on which the traffic distribution
needs to be done.
src-ip Enter to specify that the traffic distribution is based on the source IP
address.
dst-ip Enter to specify that the traffic distribution is based on the destination
IP address.
src-mac Enter to specify that the traffic distribution is based on the source MAC
address.
1063
PERMIT
CHAPTER 30 ACL
dst-mac Enter to specify that the traffic distribution is based on the destination
MAC address.
vlanid Enter to specify that the traffic distribution is based on the VLAN ID to
be filtered.
src-tcpport Enter to specify that the traffic distribution is based on the source TCP
port number.
dst-tcpport Enter to specify that the traffic distribution is based on the destination
TCP Port number.
src-udpport Enter to specify that the traffic distribution is based on the source UDP
port number
dst-udpport Enter to specify that the traffic distribution is based on the destination
UDP port number.
sub-action Enter to configure the VLAN specific sub action to be performed on the
packet.
none Enter to specify that the actions related to the VLAN ID will not be
considered.
modify-vlan Enter to specify to modify the VLAN ID to which the packet gets
classified. The packet could be an untagged or VLAN tagged packet.
<short Integer Enter a value for the VLAN ID to which the packet gets classified. This
(1-4094)> value ranges from 1 to 4094.
nested-vlan Enter to specify to add an outer VLAN tag to the packet with the
specified VLAN ID (nested VLAN).
<short Integer Enter a value for the outer VLAN tag to the packet with the specified
(1-4094)> VLAN ID. This value ranges from 1 to 4094.
Mode
Extended ACL IP Configuration Mode
Default
• protocol-type - 255
• priority - 1
• dscp - 0
• svlan-id - 0
• svlan-priority - 1
1064
PERMIT
CHAPTER 30 ACL
• cvlan-id - 0
• cvlan-priority - 1
• single-tag | double-tag - Single tag
Examples
iS5Comm (config)# ip access-list extended 1001
iS5Comm (config-ext-nacl)# permit ospf any host 14.0.0.0 tos 5 priority 200 svlan-id 200 svlan-priority 3
cvlan-id 345 cvlan-priority 4 redirect gi 0/4 gi 0/10 load-balance dst-udpport sub-action nested-vlan 222
iS5Comm(config-ext-nacl)#
30.13. permit
To configure the packets to be forwarded based on the MAC address and the associated parameters, use
the command permit in Extended ACL MAC Configuration Mode. This command allows non-IP traffic to
be forwarded if the conditions are matched.
permit
permit {any | host <src-ip-address>} | host <dest-mac-address>}
[{aarp | amber | dec-spanning | decnet-iv | diagnostic | dsm | etype-6000 |
etype-8042 | lat | lavc-sca | mop-console | mop-dump | msdos | mumps |
netbios | vines-echo | vines-ip | xns-id | <protocol (0-65535)>
| encaptype | <integer (1-65535)>] [vlan <vlan-id (1-4094)>] {priority
<value (1-255)>}]
[outerEtherType < integer (1-65535)>] [svlan-id <vlan-id (1-4094)>]
[svlan-priority <value (0-7)>] [cvlan-priority <value (0-7)>]
[{single-tag | double-tag}]
[redirect {interface <iftype> <ifnum> | <iftype> <ifnum> [<iftype>
<iface_list>] load-balance {src-ip | dst-ip | src-mac | dst-mac | vlanid |
src-tcpport | dst-tcpport | src-udpport | dst-udpport}}]
[sub-action {none | modify-vlan <short (1-4094)> | nested-vlan <short (1
-4094)> | strip-ether-hdr}}]
[next-filter-type {l2 | l3 | user-defined} next-filter-id | <short
(1-65535)>}]
dp {green | yellow | red} sub-action {modify-cfi-dei <short (0-1)>}]
1065
PERMIT
CHAPTER 30 ACL
1066
PERMIT
CHAPTER 30 ACL
Parameters
any Enter to specify that packets can be forwarded from any source MAC
Address.
host Enter to specify the host source MAC address to be used for forwarding
the packets
<src-ip-add Enter a value for the host source MAC address to be used for forwarding
ress> the packets.
host Enter to specify the destination MAC address from which the packets are
denied.
<dest-mac-a Enter a value for the destination MAC address from which the packets
ddress> are denied.
aarp Enter to configure the non-IP protocol type as Ethertype AppleTalk
Address Resolution Protocol that maps a data-link address to a network
address.
amber Enter to configure the non-IP protocol type as the address of the host
that the packet is destined for.
dec-spannin Enter to configure the non-IP protocol type as EtherType Digital
g Equipment Corporation spanning tree
decnet-iv Enter to configure the non-IP protocol type as EtherType DECnet Phase
IV protocol.
diagnostic Enter to configure the non-IP protocol type as EtherType
DEC-Diagnostic.
dsm Enter to configure the non-IP protocol type as EtherType DEC-DSM/DDP.
etype-6000 Enter to configure the non-IP protocol type as EtherType 0x6000.
etype-8042 Enter to configure the non-IP protocol type as EtherType 0x8042.
lat Enter to configure the non-IP protocol type as EtherType DEC-LAT.
lavc-sca Enter to configure the non-IP protocol type as EtherType DEC-LAVC-SCA
mop-console Enter to configure the non-IP protocol type as EtherType DEC-MOP
Remote Console
mop-dump Enter to configure the non-IP protocol type as EtherType DEC-MOP
Dump.
msdos Enter to configure the non-IP protocol type as EtherType DEC-MSDOS.
1067
PERMIT
CHAPTER 30 ACL
1068
PERMIT
CHAPTER 30 ACL
<value Enter a Service VLAN priority value. This value ranges from 0 to 7.
(0-7)>
cvlan-prior Enter to configure Customer VLAN priority value to match against
ity incoming packets.
<value Enter a customer VLAN ID value. This value ranges from 0 to 7.
(0-7)>
double-tag Enter to specify double tag type of the packet.
single-tag Enter to specify single tag type of the packet
redirect Enter to redirect the action to the destination interface or set of
interfaces.
<iftype> Enter destination interface type.The interface can be:
• fastethernet – Officially referred to as 100BASE-T standard. This is
a version of LAN standard architecture that supports data transfer
up to 100 Megabits per second.
• gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports only
full duplex links
<ifnum> Enter to redirect the packets to the specified interface identifier. This is a
unique value that represents the specific interface. This value is a
combination of slot number and port number separated by a slash, for
interface types Gigabitethernet, Fastethernet and Extreme-Ethernet.
<iface_list Enter to redirect the packets to the list of interfaces.
>
load-balanc Enter to specify the parameters based on which the traffic distribution
e needs to be done.
src-ip Enter to specify that the traffic distribution is based on the source IP
address.
dst-ip Enter to specify that the traffic distribution is based on the destination IP
address.
src-mac Enter to specify that the traffic distribution is based on the source MAC
address.
dst-mac Enter to specify that the traffic distribution is based on the destination
MAC address.
1069
PERMIT
CHAPTER 30 ACL
vlanid Enter to specify that the traffic distribution is based on the VLAN ID to be
filtered.
src-tcpport Enter to specify that the traffic distribution is based on the source TCP
port number.
dst-tcpport Enter to specify that the traffic distribution is based on the destination
TCP Port number.
src-udpport Enter to specify that the traffic distribution is based on the source UDP
port number
dst-udpport Enter to specify that the traffic distribution is based on the destination
UDP port number.
sub-action Enter to configure the VLAN specific sub action to be performed on the
packet.
none Enter to specify that the actions related to the VLAN ID will not be
considered.
modify-vlan Enter to specify to modify the VLAN ID to which the packet gets
classified. The packet could be an untagged or VLAN tagged packet.
<short Integer Enter a value for the VLAN ID to which the packet gets classified. This
(1-4094)> value ranges from 1 to 4094.
nested-vlan Enter to specify to add an outer VLAN tag to the packet with the
specified VLAN ID (nested VLAN).
<short Integer Enter a value for the outer VLAN tag to the packet with the specified
(1-4094)> VLAN ID. This value ranges from 1 to 4094.
none Enter to specify that the actions related to the VLAN ID will not be
considered.
strip-ether Enter to specify Strip outer Ethernet header for MPLS packets.
-hdr
next-filter Enter to specify the type of next access-control list.
-type
L2 Enter to specify filtering to be done for MAC-based ACL.
L3 Enter to specify filtering to be done for IP-based ACL.
user-define Enter to specify User defined packets related configuration
d
next-filter Enter to specify next filter ID related configuration
-id
1070
PERMIT
CHAPTER 30 ACL
1071
PERMIT
CHAPTER 30 ACL
Mode
Extended ACL MAC Configuration Mode
Default
• protocol - 0
• sub-action - none
• vlan-id - 0
• priority - 1
• outerEtherType - 0
• svlan-id - 0
• cvlan-priority - 1
• svlan-priority - 1
• single-tag | double-tag - Single tag
Examples
iS5Comm (config)# mac access-list extended 5
iS5Comm (config-ext-macl)# permit user-priority 1 cfi-dei 1 sub-action modify-dp green
iS5Comm (config-ext-macl)# permit dp red sub-action modify-cfi-dei 1
iS5Comm (config-ext-macl)# permit any any priority 255
30.14. permit
To configure the packets to be forwarded depending upon the associated parameters, use the command
permit in Standard ACL Configuration Mode. Standard IP access lists use source addresses for matching
operations.
permit
permit {any | host <src-ip-address> | <network-src-ip> <mask>}
[{any | host <src-ip-address> | <network-src-ip> <mask>}]
[redirect {interface <iftype> <ifnum> | <iftype> <iface_list> [ <iftype>
<iface_list>]
load-balance {src-ip | dst-ip | src-mac | dst-mac | vlanid | src-tcpport |
dst-tcpport | src-udpport | dst-udpport}}]
1072
PERMIT
CHAPTER 30 ACL
1073
PERMIT
CHAPTER 30 ACL
Parameters
any Enter to specify that packets can be forwarded from any source IP Address.
host Enter to specify the host source IPv4 address to be used for forwarding the
packets
<src-ip- Enter a value for the host source IPv4 address to be used for forwarding the
address> packets.
<network Enter to specify the address of the host that the packet is from.
-src-ip>
<mask> Enter to specify the network mask to be used with the source IP address.
any Enter to specify that packets can be denied to any destination
host Enter to specify the destination IPv4 address from which the packets are
denied.
<src-ip- Enter a value for the destination IPv4 address from which the packets are
address> denied.
<network Enter to specify the address of the host that the packet is destined for.
-src-ip>
<mask> Enter to specify the network mask to use with the destination IP address
redirect Enter to redirect the action to the destination interface or set of interfaces.
<iftype> Enter destination interface type.The interface can be:
• fastethernet – Officially referred to as 100BASE-T standard. This is a
version of LAN standard architecture that supports data transfer up to
100 Megabits per second.
• gigabitethernet – A version of LAN standard architecture that supports
data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data transfer
up to 10 Gigabits per second. This Ethernet supports only full duplex
links
<ifnum> Enter to redirect the packets to the specified interface identifier. This is a
unique value that represents the specific interface. This value is a
combination of slot number and port number separated by a slash, for
interface types Gigabitethernet, Fastethernet and Extreme-Ethernet.
<iface_l Enter to redirect the packets to the list of interfaces.
ist>
1074
PERMIT
CHAPTER 30 ACL
load-bal Enter to specify the parameters based on which the traffic distribution needs
ance to be done.
src-ip Enter to specify that the traffic distribution is based on the source IP address.
dst-ip Enter to specify that the traffic distribution is based on the destination IP
address.
src-mac Enter to specify that the traffic distribution is based on the source MAC
address.
dst-mac Enter to specify that the traffic distribution is based on the destination MAC
address.
vlanid Enter to specify that the traffic distribution is based on the VLAN ID to be
filtered.
src-tcpp Enter to specify that the traffic distribution is based on the source TCP port
ort number.
dst-tcpp Enter to specify that the traffic distribution is based on the destination TCP
ort Port number.
src-udpp Enter to specify that the traffic distribution is based on the source UDP port
ort number
dst-udpp Enter to specify that the traffic distribution is based on the destination UDP
ort port number.
sub-acti Enter to configure the VLAN specific sub action to be performed on the
on packet.
none Enter to specify that the actions related to the VLAN ID will not be
considered.
modify-v Enter to specify to modify the VLAN ID to which the packet gets classified.
lan The packet could be an untagged or VLAN tagged packet.
<short Integer Enter a value for the VLAN ID to which the packet gets classified. This value
(1-4094) ranges from 1 to 4094.
>
nested-v Enter to specify to add an outer VLAN tag to the packet with the specified
lan VLAN ID.
<short Integer Enter a value for the outer VLAN tag to the packet with the specified VLAN
(1-4094) ID. This value ranges from 1 to 4094.
>
1075
PERMIT ICMP
CHAPTER 30 ACL
priority Enter to specify the priority of the filter to be decided which filter rule is
applicable when the packet matches with more than one filter rules. Higher
value of ‘filter priority’ implies a higher priority.
<value Integer Enter a value for the priority of the filter. This value ranges from 1 to 255.
(1-255)>
Mode
Standard ACL Configuration Mode
Default
priority - 1
Examples
iS5Comm (config)# ip access-list standard 1
iS5Comm (config-std-nacl)# permit any priority 255
permit
permit icmp
{any | host <src-ip-address>} | <src-ip-address>} <src-mask>}
{any | host <dest-ip-address>} | <dest-ip-address>} <dest-mask>}
[message-type <short (0-255)>] [message-code <short (0-255)>] {priority
<value (1-255)>}]
[svlan-id <vlan-id (1-4094)>] [svlan-priority <value (0-7)>] [cvlan-id
<vlan-id (1-4094)>] [cvlan-priority <value (0-7)>]
[{single-tag | double-tag}]
1076
PERMIT ICMP
CHAPTER 30 ACL
1077
PERMIT ICMP
CHAPTER 30 ACL
Parameters
1078
PERMIT ICMP
CHAPTER 30 ACL
<short Integer Enter a ICMP Message type. This value ranges from 0 to 255. Some of
(0-255)> the ICMP message types are:
• Value ICMP Message type
• 0 Echo reply
• 3 Destination unreachable
• 4 Source quench
• 5 Redirect
• 8 Echo request
• 11 Time exceeded
• 12 Parameter problem
• 13 Timestamp request
• 14 Timestamp reply
• 15 Information request
• 16 Information reply
• 17 Address mask request
• 18 Address mask reply
• 55 No ICMP type
message-code Enter to configure the ICMP Message code to be checked against the
packet. The packet is allowed if it matches with the message type.
<short Integer Enter a ICMP Message code. This value ranges from 0 to 255. Some of
(0-255)> the ICMP message Codes are:
• Value ICMP code
• 0 Network unreachable
• 1 Host unreachable
• 2 Protocol unreachable
• 3 Port unreachable
• 4 Fragment needed
• 5 Source route fail
• 6 Destination network unknown
• 7 Destination host unknown8 Source host isolated
• 9 Destination network administratively prohibited
• 10 Destination host administratively prohibited
• 11 Network unreachable TOS
• 12 Host unreachable TOS
• 255 No ICMP code
1079
PERMIT ICMP
CHAPTER 30 ACL
priority Enter to configure the priority of the filter to decide which filter rule is
applicable when the packet matches with more than one filter rules.
Higher value of ‘filter priority’ implies a higher priority.
<short Integer Enter a priority value. This value ranges from 1 to 255.
(1-255)>
svlan-id Enter to configure Service VLAN value to match against incoming
packets.
<vlan-id Integer Enter a value for Service VLAN. This value ranges from 1 to 4094.
(1-4094)>
svlan-priori Enter to specify Service VLAN related configuration.
ty
<value Integer Enter a Service VLAN ID value. This value ranges from 0 to 7.
(0-7)>
cvlan-id Enter to configure Customer VLAN value to match against incoming
packets.
<vlan-id Integer Enter a value for Customer VLAN value to match against incoming
(1-4094)> packets.
cvlan-priori Enter to configure Customer VLAN priority value to match against
ty incoming packets.
<value Enter a customer vlan ID value. This value ranges from 0 to 7.
(0-7)>
double-tag Enter to specify that the filter is to be applied on double VLAN tagged
packets
single-tag Enter to specify that the filter is to be applied on Single VLAN tagged
packets
redirect Enter to redirect the action to the destination interface or set of
interfaces.
1080
PERMIT ICMP
CHAPTER 30 ACL
1081
PERMIT ICMP
CHAPTER 30 ACL
sub-action Enter to configure the VLAN specific sub action to be performed on the
packet.
none Enter to specify that the actions related to the VLAN ID will not be
considered.
modify-vlan Enter to specify to modify the VLAN ID to which the packet gets
classified. The packet could be an untagged or VLAN tagged packet.
<short Integer Enter a value for the VLAN ID to which the packet gets classified. This
(1-4094)> value ranges from 1 to 4094.
nested-vlan Enter to specify to add an outer VLAN tag to the packet with the
specified VLAN ID (nested VLAN).
<short Integer Enter a value for the outer VLAN tag to the packet with the specified
(1-4094)> VLAN ID. This value ranges from 1 to 4094.
Mode
Extended ACL IP Configuration Mode
Default
• dscp - 1
• priority - 1
• svlan-id - 0
• svlan-priority - 1
• cvlan-id - 0
• cvlan-priority - 1
• single-tag | double-tag - Single tag
Examples
iS5Comm (config)# ip access-list extended 1001
iS5Comm (config-ext-nacl)# permit icmp any 14.0.0.0 255.0.0.0 message-type 0 message-code 18
priority 22 svlan-id 2 svlan-priority 2 cvlan-id 2 cvlan-priority 2 double-tag redirect interface gigabiteth-
ernet 0/10 sub-action none
iS5Comm (config-ext-nacl)#
1082
PERMIT TCP
CHAPTER 30 ACL
permit
permit tcp
{any | host <src-ip-address>} | <src-ip-address>} <src-mask>}
[{gt <port-number (1-65535)> | lt <port-number (1-65535)> | eg <port-number
(1-65535)> | range <port-number (1-65535)> <port-number (1-65535)>}]
{any | host <dest-ip-address>} | <dest-ip-address>} <dest-mask>}
[{gt <port-number (1-65535)> | lt <port-number (1-65535)> | eg <port-number
(1-65535)> | range <port-number (1-65535)> <port-number (1-65535)>}] [{ack |
rst}]
[{tos {max-reliability | max-throughput | min-delay | normal |<value(0-7)>}
| dscp <value (0-63)>}] {priority <value (1-255)>}]
[svlan-id <vlan-id (1-4094)>] [svlan-priority <value (0-7)>] [cvlan-id
<vlan-id (1-4094)>] [cvlan-priority <value (0-7)>]
[{single-tag | double-tag}]
[redirect {interface <iftype> <ifnum> | <iftype> <iface_list> [<iftype>
<iface_list>]
load-balance {src-ip | dst-ip | src-mac | dst-mac | vlanid | src-tcpport |
dst-tcpport | src-udpport | dst-udpport}}]
[sub-action {none | modify-vlan <short (1-4094)> | nested-vlan <short (1
-4094)>]
1083
PERMIT TCP
CHAPTER 30 ACL
Parameters
1084
PERMIT TCP
CHAPTER 30 ACL
<dest-ip-add Enter a value for the host destination IPv4 address to be used for
ress> forwarding the packets.
<dest-mask> Enter to specify the address of the host that the packet is destined for
and the network mask to use with the destination IP address.
gt Enter to allow only the TCP control packets having the TCP destination
port numbers greater than the specified port number.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
lt Enter to allow only the TCP control packets having the TCP destination
port numbers lesser than the specified port number.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
eq Enter to allow only the TCP control packets having the specified TCP
destination port number.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
range Enter to allow only the TCP control packets having the TCP destination
port numbers within the specified range.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
ack Enter to configure the TCP ACK bit to be checked against the packet.
rst Enter to configure the TCP RST bit to be checked against the packet.
tos Enter to allow the TCP packets based on the following type of service
configuration.
max-reliabil Enter to allow the TCP packets having TOS field set as high reliability.
ity
max-throughp Enter to allow the TCP packets having TOS field set as high throughput.
ut
min-delay Enter to allow the TCP packets having TOS field set as low delay
normal Enter to allow all TCP packets. Does not check for the TOS field in the
packets.
1085
PERMIT TCP
CHAPTER 30 ACL
<value(0-7)> Enter to allow the protocol packets based on the TOS value set. This
value ranges from 0 to 7. This value represents different combination of
TOS.
• 0 - Allows all protocol packets. Does not check for the TOS field in
the packets.
• 1 - Allows the protocol packets having TOS field set as high reli-
ability.
• 2 - Allows the protocol packets having TOS field set as high
throughput.
• 3 - Allows the protocol packets having TOS field set either as high
reliability or high throughput.
• 4 - Allows the protocol packets having TOS field set as low delay.
• 5 - Allows the protocol packets having TOS field set either as low
delay or high reliability.
• 6 - Allows the protocol packets having TOS field set either as low
delay or high throughput.
• 7 - Allows the protocol packets having TOS field set either as low
delay or high reliability or high throughput.
dscp Enter to configure the Differentiated Services Code Point (DSCP) value
to be checked against the packet
<value((0-63 Enter a DSCP value. This value provides the quality of service control.
))> This value ranges from 0 to 63.
priority Enter to configure the priority of the filter to decide which filter rule is
applicable when the packet matches with more than one filter rules.
Higher value of ‘filter priority’ implies a higher priority.
<short Enter a priority value. This value ranges from 1 to 255.
(1-255)>
svlan-id Enter to configure Service VLAN value to match against incoming
packets.
<vlan-id Enter a value for Service VLAN. This value ranges from 1 to 4094.
(1-4094)>
svlan-priori Enter to specify Service VLAN related configuration.
ty
<value Enter a Service VLAN ID value. This value ranges from 0 to 7.
(0-7)>
cvlan-id Enter to configure Customer VLAN value to match against incoming
packets.
1086
PERMIT TCP
CHAPTER 30 ACL
1087
PERMIT TCP
CHAPTER 30 ACL
dst-mac Enter to specify that the traffic distribution is based on the destination
MAC address.
vlanid Enter to specify that the traffic distribution is based on the VLAN ID to
be filtered.
src-tcpport Enter to specify that the traffic distribution is based on the source TCP
port number.
dst-tcpport Enter to specify that the traffic distribution is based on the destination
TCP Port number.
src-udpport Enter to specify that the traffic distribution is based on the source UDP
port number
dst-udpport Enter to specify that the traffic distribution is based on the destination
UDP port number.
sub-action Enter to configure the VLAN specific sub action to be performed on the
packet.
none Enter to specify that the actions related to the VLAN ID will not be
considered.
modify-vlan Enter to specify to modify the VLAN ID to which the packet gets
classified. The packet could be an untagged or VLAN tagged packet.
<short Integer Enter a value for the VLAN ID to which the packet gets classified. This
(1-4094)> value ranges from 1 to 4094.
nested-vlan Enter to specify to add an outer VLAN tag to the packet with the
specified VLAN ID (nested VLAN).
<short Integer Enter a value for the outer VLAN tag to the packet with the specified
(1-4094)> VLAN ID. This value ranges from 1 to 4094.
Mode
Extended ACL IP Configuration Mode
Default
• any -Source and Destination address are not checked.
• gt - 0 (the packets are not checked for TCP port number)
• lt - 0 (the packets are not checked for TCP port number)
• eq - 0 (the packets are not checked for TCP port number)
• range - 0 for minimum port number, 65535 for maximum port number.
1088
PERMIT UDP
CHAPTER 30 ACL
• tos-value - 0
• dscp - 1
• priority - 1
• svlan-id - 0
• svlan-priority - 1
• cvlan-id - 0
• cvlan-priority - 1
• single-tag | double-tag - Single tag
Examples
iS5Comm (config)# ip access-list extended 1001
iS5Comm (config-ext-nacl)# permit tcp any any priority 255
iS5Comm (config-ext-nacl)#
permit
permit udp
{any | host <src-ip-address>} | <src-ip-address>} <src-mask>}
[{gt <port-number (1-65535)> | lt <port-number (1-65535)> | eg <port-number
(1-65535)> | range <port-number (1-65535)> <port-number (1-65535)>}]
{any | host <dest-ip-address>} | <dest-ip-address>} <dest-mask>}
[{gt <port-number (1-65535)> | lt <port-number (1-65535)> | eg <port-number
(1-65535)> | range <port-number (1-65535)> <port-number (1-65535)>}] [{ack |
rst}]
[{tos {max-reliability | max-throughput | min-delay | normal |<value(0-7)>}
| dscp <value (0-63)>}] {priority <value (1-255)>}]
[svlan-id <vlan-id (1-4094)>] [svlan-priority <value (0-7)>] [cvlan-id
<vlan-id (1-4094)>] [cvlan-priority <value (0-7)>]
[{single-tag | double-tag}]
1089
PERMIT UDP
CHAPTER 30 ACL
1090
PERMIT UDP
CHAPTER 30 ACL
Parameters
1091
PERMIT UDP
CHAPTER 30 ACL
<dest-ip-add Enter a value for the host destination IPv4 address to be used for
ress> forwarding the packets.
<dest-mask> Enter to specify the address of the host that the packet is destined for
and the network mask to use with the destination IP address.
gt Enter to allow only the UDP control packets having the UDP destination
port numbers greater than the specified port number.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
lt Enter to allow only the UDP control packets having the UDP destination
port numbers lesser than the specified port number.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
eq Enter to allow only the UDP control packets having the specified UDP
destination port number.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
range Enter to allow only the UDP control packets having the UDP destination
port numbers within the specified range.
<port-number Enter a value for the port number. This value ranges from 1 to 65535.
(1-65535)>
tos Enter to allow the UDP packets based on the following type of service
configuration.
max-reliabil Enter to allow the UDP packets having TOS field set as high reliability.
ity
max-throughp Enter to allow the UDP packets having TOS field set as high throughput.
ut
min-delay Enter to allow the UDP packets having TOS field set as low delay
normal Enter to allow all UDP packets. Does not check for the TOS field in the
packets.
1092
PERMIT UDP
CHAPTER 30 ACL
<value(0-7)> Enter to allow the protocol packets based on the TOS value set. This
value ranges from 0 to 7. This value represents different combination of
TOS.
• 0 - Allows all protocol packets. Does not check for the TOS field in
the packets.
• 1 - Allows the protocol packets having TOS field set as high reli-
ability.
• 2 - Allows the protocol packets having TOS field set as high
throughput.
• 3 - Allows the protocol packets having TOS field set either as high
reliability or high throughput.
• 4 - Allows the protocol packets having TOS field set as low delay.
• 5 - Allows the protocol packets having TOS field set either as low
delay or high reliability.
• 6 - Allows the protocol packets having TOS field set either as low
delay or high throughput.
• 7 - Allows the protocol packets having TOS field set either as low
delay or high reliability or high throughput.
dscp Enter to configure the Differentiated Services Code Point (DSCP) value
to be checked against the packet
<value((0-63 Enter a DSCP value. This value provides the quality of service control.
)> This value ranges from 0 to 63.
priority Enter to configure the priority of the filter to decide which filter rule is
applicable when the packet matches with more than one filter rules.
Higher value of ‘filter priority’ implies a higher priority.
<short Enter a priority value. This value ranges from 1 to 255.
(1-255)>
svlan-id Enter to configure Service VLAN value to match against incoming
packets.
<vlan-id Enter a value for Service VLAN. This value ranges from 1 to 4094.
(1-4094)>
svlan-priori Enter to specify the Service VLAN priority value to match against
ty incoming packets.
<value Enter a Service VLAN priority value. This value ranges from 0 to 7.
(0-7)>
cvlan-id Enter to configure Customer VLAN value to match against incoming
packets.
1093
PERMIT UDP
CHAPTER 30 ACL
<vlan-id Enter a value for Customer VLAN value to match against incoming
(1-4094)> packets.
cvlan-priori Enter to configure Customer VLAN priority value to match against
ty incoming packets.
<value Enter a customer vlan ID value. This value ranges from 0 to 7.
(0-7)>
double-tag Enter to specify that the filter is to be applied on double VLAN tagged
packets
single-tag Enter to specify that the filter is to be applied on Single VLAN tagged
packets
redirect Enter to redirect the action to the destination interface or set of
interfaces.
<iftype> Enter destination interface type.The interface can be:
• fastethernet – Officially referred to as 100BASE-T standard. This is
a version of LAN standard architecture that supports data transfer
up to 100 Megabits per second.
• gigabitethernet – A version of LAN standard architecture that
supports data transfer up to 1 Gigabit per second.
• extreme-ethernet – A version of Ethernet that supports data
transfer up to 10 Gigabits per second. This Ethernet supports only
full duplex links
<ifnum> Enter to redirect the packets to the specified interface identifier. This is
a unique value that represents the specific interface. This value is a
combination of slot number and port number separated by a slash, for
interface types Gigabitethernet, Fastethernet and Extreme-Ethernet.
<iface_list> Enter to redirect the packets to the list of interfaces.
load-balance Enter to specify the parameters based on which the traffic distribution
needs to be done.
src-ip Enter to specify that the traffic distribution is based on the source IP
address.
dst-ip Enter to specify that the traffic distribution is based on the destination
IP address.
src-mac Enter to specify that the traffic distribution is based on the source MAC
address.
1094
PERMIT UDP
CHAPTER 30 ACL
dst-mac Enter to specify that the traffic distribution is based on the destination
MAC address.
vlanid Enter to specify that the traffic distribution is based on the VLAN ID to
be filtered.
src-tcpport Enter to specify that the traffic distribution is based on the source TCP
port number.
dst-tcpport Enter to specify that the traffic distribution is based on the destination
TCP Port number.
src-udpport Enter to specify that the traffic distribution is based on the source UDP
port number
dst-udpport Enter to specify that the traffic distribution is based on the destination
UDP port number.
sub-action Enter to configure the VLAN specific sub action to be performed on the
packet.
none Enter to specify that the actions related to the VLAN ID will not be
considered.
modify-vlan Enter to specify to modify the VLAN ID to which the packet gets
classified. The packet could be an untagged or VLAN tagged packet.
<short Integer Enter a value for the VLAN ID to which the packet gets classified. This
(1-4094)> value ranges from 1 to 4094.
nested-vlan Enter to specify to add an outer VLAN tag to the packet with the
specified VLAN ID (nested VLAN).
<short Integer Enter a value for the outer VLAN tag to the packet with the specified
(1-4094)> VLAN ID. This value ranges from 1 to 4094.
Mode
Extended ACL IP Configuration Mode
Default
• dscp - 1
• priority - 1
• svlan-id - 0
• svlan-priority - 1
• cvlan-id - 0
1095
RATE-LIMIT
CHAPTER 30 ACL
• cvlan-priority - 1
• single-tag | double-tag - Single tag
Examples
iS5Comm (config)# ip access-list extended 1001
iS5Comm (config-ext-nacl)# permit udp any any priority 1
iS5Comm (config-ext-nacl)#
30.18. rate-limit
To enable the rate limiting by configuring the egress packet rate of an interface, use the command
rate-limit in Interface Configuration Mode. The no form of this command disables the rate limiting on an
egress port.
rate-limit
rate-limit {output {rate-value <integer(0-80000000)> | pause | <packet rate
(1-2800)>}
no rate-limit
no rate-limit {output [rate-limit] | pause}
1096
SHOW ACCESS-LISTS
CHAPTER 30 ACL
Parameters
Mode
Interface Configuration Mode
Default
• rate-value - 0
Examples
iS5Comm # configure terminal
iS5Comm (config)# interface gigabit 0/1
iS5Comm (config-if)# rate-limit output rate-value 1000
1097
SHOW ACCESS-LISTS
CHAPTER 30 ACL
show access-lists
show access-lists
[{ip <access-list-number(1-65535)>
| mac <access-list-number(1-65535)>
| user-defined <access-list-number(1-65535)>}]
| <access-list-number(1-65535)>
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show access-list
IP ACCESS LISTS
-----------------
Standard IP Access List 1
1098
SHOW ACCESS-LISTS
CHAPTER 30 ACL
----------------------------
Filter Priority : 10
IP address Type : IPV4
Source IP address : 0.0.0.0
Source IP address mask : 0.0.0.0
Source IP Prefix Length : 0
Destination IP address : 0.0.0.0
Destination IP address mask : 0.0.0.0
Destination IP Prefix Length : 0
Flow Identifier : 0
In Port List : NIL
Out Port List : NIL
Filter Action : Deny
Redirect Port List : NIL
TrafficDistField : Unknown
Sub Action : NONE
Sub Action Id : 0
Status : InActive
Extended IP Access List 1001
-----------------------------
Filter Priority : 1
Filter Protocol Type : ICMP
ICMP type : No
ICMP types to be filtered ICMP code : No ICMP
codes to be filtered
IP address Type : IPV4
Source IP address : 0.0.0.0
Source IP address mask : 0.0.0.0
Source IP Prefix Length : 0
Destination IP address : 0.0.0.0
Destination IP address mask : 0.0.0.0
Destination IP Prefix Length : 0
Flow Identifier : 0
In Port List : NIL
Out Port List : NIL
Service Vlan : 0
Service Vlan Priority : 0
Customer Vlan : 0
Customer Vlan Priority : None
Packet Tag Type : Single-tag
Filter Action : Deny
1099
SHOW ACCESS-LISTS
CHAPTER 30 ACL
1100
SHOW EGRESS ACCESS-LIST MODE
CHAPTER 30 ACL
1101
SHOW INTERFACES RATE-LIMIT
CHAPTER 30 ACL
Mode
Privileged EXEC Mode
Examples
iS5Comm# show egress access-list mode
Egress Filter Mode : IP
Mode
Privileged EXEC Mode
Examples
iS5Comm# show interfaces rate-limit
Gi0/1
Port Control Rate Limit : 64 kbps
Port Control Burst Size : 32 kbits
Gi0/2
1102
SHOW INTERFACES STORM-CONTROL
CHAPTER 30 ACL
Gi0/3
Port Control Rate Limit : 0 kbps
Port Control Burst Size : 0 kbits
Mode
Privileged EXEC Mode
Examples
iS5Comm# show interfaces storm-control
Gi0/1
DLF Storm Control : Disabled
Broadcast Storm Control : Enabled
Broadcast Storm Control Limit : 1000
Gi0/2
DLF Storm Control : Disabled
Broadcast Storm Control : Disabled
Multicast Storm Control : Disabled
30.23. storm-control
To set the storm control rate for broadcast, multicast, and DLF packets, use the command storm-control
in Interface Configuration Mode. The no form of this command deletes the configured storm control rate
for broadcast, multicast, and DLF packets to the default value.
1103
STORM-CONTROL
CHAPTER 30 ACL
storm-control
storm-control {broadcast |multicast | dlf} level <rate-value (1-262143)>
no storm-control
no storm-control <access-list-number (1-65535)> {in | out}
Parameters
broadcast Enter to set the storm control rate for Broadcast packets.
multicast Enter to set the storm control rate for Multicast packets.
dlf Enter to set the storm control rate for Destination lookup failure (dlf)
packets.
NOTE: Redirect Filter is not applicable for out bound packets.
Mode
Interface Configuration Mode
Default
Broadcast, multicast, and DLF storm control are disabled.
Prerequisites
Storm control is supported only on physical interfaces.
The above configurations are applicable per port level in ingress direction, not per device level. The value
configured in level, should be applicable to the type (broadcast/multicast/dlf) whichever is configured.
Examples
iS5Comm (config)# interface gigabit 0/1
iS5Comm (config-if)# storm-control broadcast level 1000
iS5Comm (config-if)# end
iS5Comm # show interfaces storm-control
1104
VRRP DEFINITIONS
CHAPTER 31 VRRP
VRRP
31. VRRP
The Virtual Router Redundancy Protocol (VRRP) is a standard first hop redundancy protocol that specifies
an election protocol that dynamically assigns responsibility for a virtual router (VR) to one of the VRRP
routers on a LAN. The VRRP router controlling the IP address(es) associated with a virtual router is called
the Master and it forwards packets sent to these IP addresses. The election process provides dynamic
failover in the forwarding responsibility, when the Master becomes unavailable. This will allow any
virtual router (Master) IP addresses on the LAN to be used as the default gate for the hosts. The advan-
tage of using VRRP is to provide a redundancy for the default gateways which used by endpoints.
In the VRRP, the Master router is responsible for forwarding the data packets received for VRRP MAC
address. Backup routers listen for advertisement packets from the Master. In the case that Backup
routers do not receive advertisement packets for a certain period of time from the Master, an election
will start between backup routers to elect the new Master for VRRP interface.
1105
VRRP DEFINITIONS
CHAPTER 31 VRRP
Definitions
Acronym Definitions
Controls whether a virtual router in Master state will accept packets addressed
Accept Mode to the virtual IP address (VRRP IP address). The default is False. Deployments
that rely on, for example, pinging the address owner's IPvX address may wish to
configure Accept Mode to True.
Controls whether a (starting or restarting) higher-priority Backup router
Preempt Mode preempts a lower-priority Master router.
An IPv4 address is selected from the set of real interface addresses. In IPv4
Primary IP mode, VRRP advertisements are always sent using the primary IPv4 address as
Address the source of the IPv4 packet. For adding a secondary IP address, the use the
secondary one should be explicitly specified.
Priority value to be used by this VRRP router in Master election for this virtual
Priority router. The value of 255 (decimal) is reserved for the router that owns the IP
address associated with the virtual router. The value of 0 (zero) is reserved for
the Master router to indicate it is releasing responsibly for the virtual router.
The range 1-254 (decimal) is available for VRRP routers backing up the virtual
router. Higher values indicate higher priorities. The default value is 100
(decimal).
This is an VRRP packet used by routers to advertise their presence together with
Router various link and Internet parameters either periodically. Router Advertisements
Advertisement contain prefixes that are used for determining whether another address shares
the same link (on-link determination) and/or address configuration, a suggested
hop limit value, etc.
A router running VRRP. It may participate as one or more virtual routers.
VRRP Router
An abstract object managed by VRRP that acts as a default router for hosts on a
Virtual Router shared LAN. It consists of a Virtual Router Identifier and either a set of
(VR) associated IPv4 addresses or a set of associated addresses across a common
LAN. A VRRP Router may back up one or more virtual routers. The scope of each
virtual router is restricted to a single LAN.
The VRRP router that is assuming responsibility of forwarding packets sent to
Virtual Router the IP address(es) associated with the virtual router answering ARP requests.
Master
This is the VRRP group number. It is configurable item in the range 1-255
Virtual Router (decimal). There is no default.
Identifier (VRID)
1106
AUTH-DEPRECATE
CHAPTER 31 VRRP
Reference
These definitions have been taken from
1) Network Working Group, RFC 3768 Virtual Router Redundancy Protocol (VRRP)
https://tools.ietf.org/html/rfc3768
31.2. auth-deprecate
To configure the interface related information, use the command auth-deprecate in VRRP Configuration
Mode.
auth-deprecate
auth-deprecate {disable | enable}
Parameters
Mode
VRRP Configuration Mode
Examples
iS5Comm(config)# router vrrp
iS5Comm(config-vrrp)# vrrp version v3
31.3. interface
To configure the interface related information, use the command interface in VRRP Configuration Mode.
1107
ROUTER VRRP
CHAPTER 31 VRRP
interface
interface {<ipiftype> | Extreme-Ethernet <0>/<1-28> | Gigabitethernet
<0>/<1-28> | vlan <vlan_vfi_id>}
no interface
no interface
Parameters
Mode
VRRP Configuration Mode
Examples
iS5Comm(config)# router vrrp
iS5Comm(config-vrrp)# interface vlan 55
1108
TRACK
CHAPTER 31 VRRP
router vrrp
router vrrp
no router vrrp
no router vrrp
Mode
Global Configuration Mode
Examples
iS5Comm (config)# router vrrp
iS5Comm(config-vrrp)#
31.5. track
To enables Link Track or IP track feature, use the command track in Global Configuration Mode. The no
form of the command resets the number of links tracked if number of links is configured or disables the
IP track feature.
track
track <group-index> {IPv4 address <IpAddress> | {interface {Extreme-Ethernet
<0>/<1-28> | Gigabitethernet <0>/<1-28> | vlan <vlan_vfi_id>} | links
<1-255>}
no track
no track <group-index> {IPv4 address <IpAddress> | {interface
{Extreme-Ethernet <0>/<1-28> | Gigabitethernet <0>/<1-28> | vlan
<vlan_vfi_id>} | links}
1109
TRACK
CHAPTER 31 VRRP
If any one of the uplinks comes up, the Master will send VRRP advertisement with its original priority and
becomes Master. For example, in the current scenario, the number of links tracked can be 2. This means,
that the number of links tracked is 2, and when any two uplinks of the Master go down, then, a trigger
will be sent to the Master. Then, the Master will send the VRRP advertisement with the decreased
priority, which is configured in VRRP instance as decrement priority.
In IP-track, if the tracked destination fails, the forwarding capability will be affected. In case, IP-tracking
feature is used. When tracked IP address of Master VRRP router goes down, a trigger is given to decre-
ment Master router's priority, and after that, election process begins. Thus, Backup becomes Master
Router and forwarding capability is carried by Backup router.
When the uplink on the Master router changes its status to online, the reverse process occurs. The
previous Master router advertises with original Priority, and after election, the previous Master becomes
Master again.
1110
TRACK
CHAPTER 31 VRRP
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# track 30 interface vlan 1
1111
VRRP
CHAPTER 31 VRRP
31.6. vrrp
For the VRRP deployment on an interface, use the command vrrp in VRRP Interface Configuration Mode.
The no form of the command resets all configured parameters.
vrrp
vrrp {<vrid (1-255>
{accept-mode {disable | enable}
| authentication {none | text <password>}
| ip {<ip_addr> [secondary] | A.B.C.D <ip_addr>} | AAAA::BBBB <ipv6_addr>}
| accept-mode {disable | enable} | preempt [delay minimum <value(0-30)>] |
priority <priority (1-254)> | timer {advertise [msec] <interval(1-255secs) /
(10-255000msecs)> | msec <interval(1-255secs) /(10-255000msecs)> | track
<group-index (1-4294967295)> decrement <1-254>}
| preempt [delay minimum <value (0-30)>]
| priority <priority (1-254)>
| text-authentication <password>}
| timer {advertise [msec] <interval(1-255secs)/(10-255000msecs)> | msec
<interval(1-255secs)/(10-255000msecs)>
| timers {advertise [msec] <interval(1-255secs)/(10-255000msecs)> | msec
<interval(1-255secs)/(10-255000msecs)>
| track <group-index (1-4294967295)> decrement <1-254>}
| group shutdown}
no vrrp
no vrrp {<vrid (1-255> [ipv4] {preempt | priority | timer | track} | ip
{<ip_addr> [secondary] | text-authentication}
1112
VRRP
CHAPTER 31 VRRP
Parameters
preempt Enter to specify which router becomes the master router and enable
Preempt mode. Preemption of a backup VRRP device acting as a
master device is allowed when another backup device has a higher
priority. By default, preemption is enabled for VRRP. In VRRP,
preemption allows a backup device with the highest priority to
become the master device when the master device goes offline.
1113
VRRP
CHAPTER 31 VRRP
delay Enter to specify the number of seconds the router delays before
issuing an advertisement claiming virtual IP address ownership to be
the master router. By default preempt is Enabled and the delay
value is 0 seconds (no delay).
minimum Enter to specify the minimum number of seconds.
<value (0-30> Integer Enter a value for minimum number of seconds the router delays
before issuing an advertisement claiming virtual IP address
ownership to be the master router.
priority Enter to establish a priority for a VR. A VR can be configured with a
priority so that the router with higher priority will become the
Master for that instance.
<priority Integer Enter a value for the priority for a VR. Priority can be configured
(1-254)> from 1 to 254, with 1 being the lowest priority. A priority of 255 is
used for the router that owns the associated IP address associated
with the virtual router. The default is 110.
timer / timers Enter to configure the interval between successive advertisements
by the Master Router. The VRRP Master router sends a router
advertisement at regular intervals to convey to the backup routers
that the Master is alive. By default, the advertisement interval value
is 1 second.
advertise Enter to set the advertisement timer.
msec Enter to specify that the unit is changed to milli-seconds.
<interval(1-25 Integer Enter a value for the he interval between successive advertisements
5secs)/(10-255 by the Master Router acceptable range for version 2 is (1-255
000msecs)> secs)/(100-255000 msecs) / acceptable range for version 2-3 and
version 3 is (1-40 secs)/(10-40950 msecs). For example, timer 5 will
configure the advertisement timer interval as 5 seconds.
track Enter to configure tracking of the priority for a VR based on an
interface.
<group-index Integer Enter a value for group Index Value.
(1-429496729)>
decrement Enter to configure the decrement.
<1-254> Integer Enter a value for the decrement with a default of 10.
text-authentic Enter to set authentication password to be used to validate the
ation incoming VRRP packet.
1114
VRRP VERSION
CHAPTER 31 VRRP
Mode
VRRP Interface Configuration Mode
Examples
iS5Comm(config)# router vrrp
iS5Comm (config-vrrp)# interface vlan 1
iS5Comm(config-vrrp-if)# vrrp 1 accept-mode enable
iS5Comm(config-vrrp-if)# vrrp 1 authentication text 1234
iS5Comm(config-vrrp-if)# vrrp 1 ipv4 192.168.10.3
iS5Comm(config-vrrp-if)# vrrp 1 ipv4 192.168.10.4
iS5Comm(config-vrrp-if)# vrrp 1 preempt
iS5Comm(config-vrrp-if)# vrrp 1 priority 200
iS5Comm(config-vrrp-if)# vrrp 1 vrrp 1 text-authentication 1234
iS5Comm(config-vrrp-if)# vrrp 1 timer 5
iS5Comm(config-vrrp-if)# vrrp 1 timer msec 5000
iS5Comm(config-vrrp-if)# vrrp 1 timers advertise 5
iS5Comm(config-vrrp-if)# vrrp 1 track 30 decrement 150
iS5Comm(config-vrrp-if)# vrrp group shutdown
1115
IP-TRACKING
CHAPTER 31 VRRP
vrrp version
vrrp version {v2 | v2-v3 | v3}
Parameters
Mode
VRRP Configuration Mode
Default
v2
Examples
iS5Comm(config)# router vrrp
iS5Comm(config-vrrp)# vrrp version v3
31.8. ip-tracking
To set the VRRP IP tracking feature, use the command ip-tracking in VRRP Configuration Mode. The VRRP
object tracking describes how to track an IP object using a VRRPv3 group. Each VRRP group can track
multiple objects that may affect the priority of the VRRP device. VRRP is notified of any changes to a spec-
ified object to be tracked. VRRP increments (or decrements) the priority of the virtual device based on
the state of the object being tracked. The no form of the disables the IP tracking configuration.
1116
IP-TRACKING
CHAPTER 31 VRRP
ip-tracking
ip-tracking
{query-delay <short(2-60)>
| query-success <short(1-10)>
| ping-frequency <short(1-5)>
| pings-per-query <short(1-10)>
| connectivity-success <short(1-10)>
| connectivity-failure <short(1-10)>}
no ip-tracking
no ip-tracking {query-delay | query-success | ping-frequency |
pings-per-query | connectivity-success | connectivity-failure}
1117
IP-TRACKING
CHAPTER 31 VRRP
Parameters
Mode
VRRP Configuration Mode
Prerequisites
The VRRP IP Tracking Feature only works for VRRP Version 3. Include as follows:
iS5Comm(config-vrrp)# vrrp version v3
1118
SHOW RUNNING VRRP
CHAPTER 31 VRRP
Create a track group in Global Configuration Mode before setting the VRRP tracking feature.
Examples
iS5Comm(config)# router vrrp
iS5Comm(config-vrrp)# vrrp version v3
iS5Comm(config-vrrp)# ip-tracking query-delay 2
iS5Comm(config-vrrp)# ip-tracking query-success 1
iS5Comm(config-vrrp)# ip-tracking pings-per-query 2
iS5Comm(config-vrrp)# ip-tracking ping-frequency 2
iS5Comm(config-vrrp)# ip-tracking connectivity-success 1
iS5Comm(config-vrrp)# ip-tracking connectivity-failure 1
Mode
Privileged EXEC Mode
Examples
iS5Comm# show running vrrp
#Building configuration...
!
!
track 30 interface vlan 1
router vrrp
vrrp version v3
1119
SHOW TRACK
CHAPTER 31 VRRP
interface vlan 1
vrrp 1 ipv4 192.168.10.4
vrrp 1 priority 200
vrrp 1 timer 5
vrrp 1 accept-mode enable
vrrp 1 track 30 decrement 150
end
!
end
show track
show track
Mode
Privileged EXEC Mode
Examples
iS5Comm# show track
Track Group Information for Group 30
------------------------------------
Number of Links Required to go down for state transition: 0
Interfaces Tracked are
----------------------
vlan 1
1120
SHOW VRRP
CHAPTER 31 VRRP
show vrrp
show vrrp {brief | detail | interface <ipiftype> {Extreme-Ethernet
<0>/<1-28> | Gigabitethernet <0>/<1-28>} | statistics}
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show vrrp
P indicates configured to preempt
1121
SHOW VRRP
CHAPTER 31 VRRP
1122
SHOW VRRP
CHAPTER 31 VRRP
vlan1 - vrID 1
------------------
Transitions to Master : 13
Advertisements Received : 0
Advertise Interval Errors : 0
TTL Errors : 0
Zero Priority Packets Received : 0
Zero Priority Packets Sent : 12
Invalid Type Packets Received : 0
Address List Errors : 0
Packet Length Errors : 0
V3 Advertisements Sent : 1419
V2 Advertisements Sent : 8730
V2 Advertisements Ignored : 0
New Master Reason : Master No Response
Last Protocol Error : No Error
1123
CHAPTER 32 ALARMS
Alarms
32. Alarms
The software monitors the conditions of all its ports, per switch, for its chassis, or if they are Alarms secu-
rity, services, and protocol -related.
If a condition which is present on the switch or a port does not match predetermined parameters, an
alarm or a system message appear. By default, the switch software sends the system messages to a
syslog facility. The switch can be configured to send Simple Network Management Protocol (SNMP) traps
to an SNMP server.
All alarms which are related to power supply failure; CPU/RAM/Flash/Temperature/Line Module
mismatch or a chassis type are referred as global alarms. The switch can also monitor the status of the
Ethernet ports and generate alarm messages which are categorized as Port Status Monitoring Alarms.
There are eight different categories of alarms as depicted in the below table. GPS and cell alarms are not
currently defined as the base feature is not available yet.
1 - Admin 1000 - 1999 Administrative aspect of the device, such as license key problems, etc.
2 - Chassis 2000 - 2999 Alarms related to power supply failure; CPU / RAM / Flash /
Temperature / Line Module mismatch.
3 - Switch 3000 - 3999 Port link up/down; SFP not compatible, etc.
4 - Security 4000 - 4999 Invalid login; SNMP authentication failure
5 - Services 5000 - 5999 Alarms related to software download failure/syslog buffer overflow/
login failures
6 - Protocol 6000 - 6999 All protocol-related alarms like STP root change, VRRP role change, etc
7 - Cell Not defined -
yet
8 - GPS Not defined -
yet
1124
EXAMPLE
CHAPTER 32 ALARMS
32.1. Example
For interface-specific alarms such as link up/down, the alarm ID is the sum of the base alarm ID plus the
port no. For example, the port 11 link up / down alarm is denoted by ID 3011 (i.e. 3000 +11).
ID TYPE TIMESTAMP STATE DESCRIPTION SEVERITY
------------------------------------------------------------------------
3011 SWITCH Sep/10/19:43:28 SET Gi0/11 Interface Link State DOWN
Critical
NOTE: The most essential alarms are to be installed during the first phase; later, we will increase the
number of alarms. Request QA to help on identifying the alarms.
1125
ALARM EVENTS SUPPORTED
CHAPTER 32 ALARMS
1126
SET ALARM
CHAPTER 32 ALARMS
set alarm
set alarm {disable | enable}
Parameters
Mode
Global Configuration Mode
Default
enable
Examples
iS5Comm(config)# set alarm enable
1127
ALARM CONFIG-TYPE
CHAPTER 32 ALARMS
alarm buffered
alarm buffered <100-2048>
no alarm buffered
no alarm buffered
Parameters
<100-2048> Integer Enter a value for the number of alarm messages to be hold in RAM. The
configurable numbers are between 100 to 2048 entries. 512 is default.
Mode
Global Configuration Mode
Default
512 (entries)
Examples
iS5Comm(config)# alarm buffered 1024
alarm config-type
alarm config-type
{{switch | admin | chassis | security | protocol | service}
{admin | relay | LED} {enable | disable}}
1128
SHOW ACTIVE ALARMS
CHAPTER 32 ALARMS
Parameters
Mode
Global Configuration Mode
Default
All alarms are disabled
Examples
iS5Comm(config)# alarm config-type admin admin enable
iS5Comm(config)# alarm config-type admin relay enable
iS5Comm(config)# alarm config-type admin LED enable
1129
SHOW ALARM HISTORY
CHAPTER 32 ALARMS
Mode
Privileged EXEC Mode
Examples
iS5Comm# show active alarms
ID TYPE TIMESTAMP STATE DESCRIPTION SEVERITY
-----------------------------------------------------------------------
2000 CHASSIS Sep/10/17:47:18 SET Power supply limit exceeded
Alert
6000 PROTOCOL Sep/10/17:47:08 SET RSTP root bridge node
Info
3011 SWITCH Sep/10/19:43:28 SET Gi0/11 Interface Link State DOWN
Critical
3025 SWITCH Sep/10/17:47:08 SET Ex0/1 Interface Link State DOWN
Critical
3026 SWITCH Sep/10/17:47:08 SET Ex0/2 Interface Link State DOWN
Critical
3027 SWITCH Sep/10/17:47:08 SET Ex0/3 Interface Link State DOWN
Critical
3028 SWITCH Sep/10/17:47:08 SET Ex0/4 Interface Link State DOWN
Critical
3037 SWITCH Sep/22/17:59:50 SET vlan1 Interface Link State DOWN
Critical
1130
SHOW ALARM HISTORY
CHAPTER 32 ALARMS
Parameters
Mode
Privileged Exec Mode
Default
All alarms are disabled
Examples
iS5Comm# show alarm history all
1131
SHOW ALARM SUPPORTED
CHAPTER 32 ALARMS
The Serial Port Monitoring alarm IDs is from 3237 (they can be up to 3268).
3237 SWITCH Dec/15/17:11:03 SET Ser0/1 Serial cable Disconnected
Critical
3238 SWITCH Dec/11/10:29:09 SET Ser0/2 Serial cable Disconnected
Critical
3251 SWITCH Dec/21/16:37:35 SET Ser0/15 Serial cable Disconnected
Critical
3261 SWITCH Dec/21/16:38:06 SET Ser0/25 Serial cable Disconnected
Critical
3263 SWITCH Dec/21/16:39:45 SET Ser0/27 Serial cable
DisconnectedCritical
1132
SHOW ALARM SUPPORTED
CHAPTER 32 ALARMS
Parameters
Mode
Privileged Exec Mode
Examples
iS5Comm# show alarm supported all
ALARM-ID ALARM-SUPPORTED
--------- ------------------
1133
SHOW ALARM SUPPORTED
CHAPTER 32 ALARMS
1134
SHOW ALARM SUPPORTED
CHAPTER 32 ALARMS
1135
CLI SERIAL COMMAND MODES
CHAPTER 33 SERIAL
Serial
33. Serial
Serial support in the device software includes Modbus Client and Server modes as well as Raw Socket
mode. This chapter describes the CLI commands needed to enable these capabilities.
1136
CLI SERIAL COMMAND MODES
CHAPTER 33 SERIAL
1137
CLI SERIAL COMMAND MODES
CHAPTER 33 SERIAL
iS5Comm(config)# The Privileged EXEC mode To return from the Global Configuration
command configure Mode to Privileged Mode, the
terminal is used to enter the command exit is used.
Global Configuration Mode.
1138
CLI SERIAL COMMAND MODES
CHAPTER 33 SERIAL
iS5Comm(raw-p1)# The Global Configuration To return from the Serial Profile mode
mode command to Global Configuration Mode, the
iS5Comm(config)# command exit is used. To exit from
serial the VLAN Interface Configuration mode
connection-type raw to Privileged EXEC Mode, the command
profile p1 is used to end is used.
enter the Serial Profile
Mode.
iS5Comm(raw-udp)# The Global Configuration Mode To exit from the Serial Profile
command Mode (UDP) to Privileged
iS5Comm(config)# EXEC Mode, the command
serial connection-type end is used.
raw profile udp is used to
enter the Profile Mode (UDP).
1139
CLI SERIAL COMMAND MODES
CHAPTER 33 SERIAL
iS5Comm(raw-tcp)# The Global Configuration Mode To exit from the Serial Profile
command Mode (UDP) to Privileged
iS5Comm(config)# EXEC Mode, the command
serial connection-type end is used.
raw profile tcp is used to
enter the Profile Mode (TCP).
1140
CLI SERIAL COMMAND MODES
CHAPTER 33 SERIAL
iS5Comm (raw-udp-UDP)# The Serial Profile mode To exit from the Transport Protocol
command iS5Comm Mode to Privileged EXEC Mode, the
(raw-p1)# command end is used.
transport protocol
udp is used to enter the
Transport Protocol UDP
Mode.
1141
ADD SLAVE-ID
CHAPTER 33 SERIAL
1142
ADD UDP-HOST
CHAPTER 33 SERIAL
messages: a request (issued by the client) and a response (issued by the server).
Each MODBUS server or client are uniquely identified by a slave ID. The MODBUS server slave IDs are
bound to an interface, whereas MODBUS client slave IDs is bound to a profile. This is because a MODBUS
server can support multiple interface to be mapped to same profile. Each interface can be mapped to a
set of slave IDs.
Each profile can support 247 slave IDs and its range is between 1 - 247.
add slave-id
MODBUS server
add slave-id
<ids> interface serial <interface-id>
remove slave-id
<ids> interface serial <interface-id>
MODBUS client
add slave-id
<ids>
remove slave-id
<ids>
Parameters
1143
BAUD-RATE
CHAPTER 33 SERIAL
add udp-host
add udp-host
{<IpAddress> port <integer(1-65535)>
Parameters
Mode
Transport Protocol UDP Mode
Examples
iS5Comm(config)# serial connection-type raw profile udp
iS5Comm(raw-udp)# transport protocol udp
iS5Comm(raw-udp-UDP)# add udp-host 192.168.20.66 port 35478
iS5Comm(raw-udp-UDP)# end
33.4. baud-rate
To define the baud rate, use the baud rate command in Interface Configuration Mode. The baud rate is
the rate at which information is transferred in a serial communication channel. In the serial port context,
"9600 baud" means that the serial port is capable of transferring a maximum of 9600 bits per second.
baud-rate
baud-rate
<integer>
no baud-rate
no baud-rate
1144
CLEAR SERIAL CONFIG
CHAPTER 33 SERIAL
Parameters
integer Integer Enter a number that represent the baud-rate setting. The
available values are:
• 300 baudrate of 300 bps
• 600 baudrate of 600 bps
• 1200 baudrate of 1200 bps
• 2400 baudrate of 2400 bps
• 4800 baudrate of 4800 bps
• 9600 baudrate of 9600 bps
• 14400 baudrate of 14400 bps
• 19200 baudrate of 19200 bps
• 38400 baudrate of 38400 bps
• 57600 baudrate of 57600 bps
• 115200 baudrate of 115200 bps
• 230400 baudrate of 230400 bps
Mode
Serial Interface Configuration Mode
Examples
iS5Comm # configure terminal
iS5Comm(config)# interface serial 0/9
iS5Comm(config-serial-if)# baud-rate 115200
iS5Comm(config-if)# no baud-rate
NOTE: “no baud-rate” will revert back the baud rate settings to the default value which is 9600.
1145
CLEAR SERIAL CONFIG
CHAPTER 33 SERIAL
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# clear serial config ?
<CR> Erase all serial profile
configurations from the system
MODBUS MODBUS configurations
RAW_SOCKET RAW_SOCKET configurations
iS5Comm(modbus-m20)# clear serial config
Note: "clear serial config" will erase entire serial profile
configurations...
1146
CLEAR SERIAL COUNTERS
CHAPTER 33 SERIAL
Parameters
Mode
Global Configuration Mode
Examples
iS5Comm(config)# clear serial counters
iS5Comm(config)# clear serial counters interface serial 0/9 profile p1
iS5Comm(config)# clear serial counter profile p1
1147
CONNECTION-MAP INTERFACE
CHAPTER 33 SERIAL
connection-map interface
connection-map interface
serial (<0>/<9-16>)
no connection-map
no connection-map
Parameters
<0>/<9-16> Integer Enter a slot number / port number for serial interface.
Mode
Serial Profile Mode (Raw)
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type raw profile p1
iS5Comm(raw-p1)# connection-map interface serial 0/9
iS5Comm(raw-p1)# no connection-map
33.8. data-bits
To determine the number of bits for the port to operate with, use the data-bits command in Interface
Configuration Mode.
data-bits
data-bits
1148
DEBUG SERIAL
CHAPTER 33 SERIAL
<integer (7-8)>
Parameters
integer (7-8) Integer Enter a number of bits for the port to operate with. The default is 8.
Binary data is typically transmitted as eight bits, and text-based data is
transmitted as seven bits or eight bits. If the data is based on the ASCII
character set, then a minimum of seven bits is required because there
are 27 or 128 distinct characters. If an eighth bit is used, it must have a
value of
Mode
Serial Interface Configuration Mode
Examples
iS5Comm # configure terminal
iS5Comm(config-serial-if)# data-bits 7
iS5Comm(config-serial-if)# data-bits 8
debug serial
debug serial
{all | |trace | data |info |critical none}
1149
DESCRIPTION
CHAPTER 33 SERIAL
Parameters
Mode
Global Execution Mode
Examples
iS5Comm# debug serial critical
[SER_IP_DBG] : DBG Critical 2
iS5Comm# debug serial none
[SER_IP_DBG] : nmhSetSerialIpDebug() i4SetValSerialIpDebug 0
iS5Comm#
33.10. description
To assign a name to a serial interface, use the description command in Serial Interface Configuration
Mode.
description
description
<string(127)>
1150
DIRECTION
CHAPTER 33 SERIAL
no description
Parameters
Mode
Serial Interface Configuration Mode
Examples
iS5Comm # configure terminal
iS5Comm(config)# interface serial 0/9
iS5Comm(config-serial-if)# description AB_interface
33.11. direction
To define the direction for a serial protocol, use the direction command in Transport Protocol Mode.
There are IN, OUT, and IN-OUT directions. When the device acts as a server, IN direction is configured.
The device acts as a client in OUT direction, and as both server and client in IN-OUT direction. For UDP
transport protocol, the default direction is IN-OUT.
direction
direction
{in | out | in-out}
1151
DIRECTION
CHAPTER 33 SERIAL
Parameters
Mode
Transport Protocol Mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type raw profile p1
iS5Comm(raw-p1)# transport protocol tcp
iS5Comm(serial-p1-TCP)# direction in
iS5Comm(raw-p1-TCP-in)# end
NOTE: There is no need to configure direction for UDP connection. In a case of UDP connection, the
default direction is IN-OUT, and the software assigns it without need for configuration by the user.
1152
DSCP
CHAPTER 33 SERIAL
33.12. DSCP
To define the Differentiated service code point ( DSCP) which is set in the IP header for the outgoing
packets, use the DSCP command in Role Mode (Modbus Client).
DSCP
DSCP
<integer(0-63)>
no DSCP
no DSCP
Parameters
<integer(0-63)> Integer Enter a decimal value for the Differentiated service code point
(DSCP). The default is OFF.
Mode
Role Mode (Modbus Client)
Examples
iS5Comm(config)# serial connection-type modbus profile m1
iS5Comm(modbus-m1)# role client
iS5Comm(modbus-m1-client)# DSCP 44
iS5Comm(modbus-p1-client)# no DSCP
NOTE: As per RFC5865, DSCP with decimal value f 44 stands for VOICE-ADMIT. Refer to
https://www.iana.org/assignments/dscp-registry/dscp-registry.xhtml
1153
DYNAMIC PACKET TIMEOUT
CHAPTER 33 SERIAL
dynamic idle-timeout
dynamic idle-timeout
<integer(10-3600)>
no dynamic idle-timeout
no dynamic idle-timeout
Parameters
Mode
Serial Profile Mode (Preemptive)
Examples
iS5Comm(config)# serial connection-type preemptive-raw profile p2
iS5Comm(preemptive-p2)# dynamic idle-timeout 45
iS5Comm(preemptive-p2)# no dynamic idle-timeout
1154
DYNAMIC PACKET CHAR
CHAPTER 33 SERIAL
Prerequisites
To set the dynamic packet timeout in Serial Profile Mode (Preemptive), the dynamic packet character
trigger should be off.
iS5Comm(preempt-p2)# dynamic packet char off
Parameters
Mode
Serial Profile Mode (Preemptive)
Examples
iS5Comm(config)# serial connection-type preemptive-raw profile p2
iS5Comm(preemptive-p2)# dynamic packet char off
iS5Comm(preemptive-p2)# dynamic packet timeout 100
iS5Comm(preemptive-p2)# no dynamic packet timeout
iS5Comm(preemptive-p2)# packetizing enable
1155
FLOW-CONTROL
CHAPTER 33 SERIAL
Prerequisites
To set the dynamic packet character, the dynamic packet timeout command has to be disabled.
iS5Comm(preemptive-p2)# packetizing enable
iS5Comm(preemptive-p2)# dynamic packet timeout 0
Parameters
Mode
Serial Profile Mode (Preemptive)
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type preemptive-raw profile p2
iS5Comm(preemptive-p2)# packetizing enable
iS5Comm(preemptive-p2)# dynamic packet timeout 0
iS5Comm(preemptive-p2)# dynamic packet char 39
33.16. flow-control
To enable or disable hardware and software flow control, use the flow-control command in Serial Inter-
face Configuration Mode. Flow control provides extra signaling to inform the transmitter that it should
stop (pause) or start (resume) the transmission.
There is a hardware and software flow control.
For RS-232, the hardware method uses the RTS / CTS outputs. If the transmitter is ready to send data,
then it sets the signal on the RTS line. If the receiver is ready to receive data, it sets the signal on the CTS
line. If one of the signals is not set, no data transfer will occur.
1156
FORCE HALF-DUPLEX
CHAPTER 33 SERIAL
The software method uses the Xon and Xoff characters (in the ASCII characters set: Xon = 17, Xoff = 19)
which are transmitted using the same TXD / RXD communication lines as the main data instead of the
pins. If the data cannot be received, the receiver transmits the Xoff symbol. To resume data transmission,
the Xon symbol is sent.
flow-control
flow-control
{hardware | none | software}
Parameters
Mode
Serial Interface Configuration Mode
Examples
iS5Comm # configure terminal
iS5Comm (config)# interface serial 0/9
iS5Comm (config-serial-if)# flow-control hardware
iS5Comm (config-serial-if)# flow-control software
iS5Comm (config-serial-if)# flow-control none
1157
FORWARD-EXCEPTION
CHAPTER 33 SERIAL
force half-duplex
force half-duplex
{on | off}
Parameters
Mode
Serial Interface Configuration Mode
Examples
iS5Comm # configure terminal
iS5Comm (config)# interface serial 0/1
iS5Comm (config-serial-if)# force half-duplex on
iS5Comm (config-serial-if)# force half-duplex off
33.18. forward-exception
To enable / disable forwarding TCP exception, use the forward-exception command in Role Mode.
forward-exception
MODBUS client
forward-exception
{enable | disable}
1158
HOLD-TIME
CHAPTER 33 SERIAL
Parameters
enable Enter this option to enable forwarding TCP exception. Default is enabled
which is numerically denoted as 1.
disable Enter this option to disable forwarding TCP exception. The numerical
notation for disabled is 0.
Mode
Role Mode (Modbus Client)
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type modbus profile m1
iS5Comm(modbus-m1)# role client
iS5Comm(modbus-m1-client)# forward-exception enable
33.19. hold-time
To define the maximum amount of time that the serial packet can be held in the queue before being sent
to the serial line, use the hold-time command in Serial Interface Configuration Mode. Time is measured
from the moment the packet is received from the IP Layer.
hold-time
hold-time
<integer (0-15000)>
1159
INTERFACE SERIAL
CHAPTER 33 SERIAL
Parameters
integer Integer Enter a value, in milliseconds, for the delay time after which UART
(0-15000) start listening to Rx line. The default is 0 ms.
Mode
Serial Interface Configuration Mode
Examples
iS5Comm # configure terminal
iS5Comm (config)# interface serial 0/9
iS5Comm (config-serial-if)# hold-time 500
iS5Comm (config-serial-if)# hold-time 0
interface serial
interface serial
<integer (<0>/<9-16>)>
1160
INTERFACE SERIAL
CHAPTER 33 SERIAL
Parameters
integer Integer Enter a number that represent a serial interface number which a
(<0>/<9-16>) range between 9 through 16 or 0.
Mode
Global Configuration Mode
Examples
iS5Comm # configure terminal
iS5Comm(config)# interface serial 0/9
iS5Comm(config-serial-if)# baud-rate 115200
iS5Comm(config-serial-if)# force half-duplex on
iS5Comm(config-serial-if)# hardware flow-control enable
iS5Comm(config-serial-if)# hold-time 1234
iS5Comm(config-serial-if)# post-tx delay 12
iS5Comm(config-serial-if)# rx-to-tx delay 500
iS5Comm(config-serial-if)# software flow-control enable
iS5Comm(config-serial-if)# stop-bits 2
iS5Comm(config-serial-if)# turnaround delay 300
iS5Comm(config-serial-if)# parity even
iS5Comm(config-serial-if)# end
iS5Comm# show interfaces serial
Interface name : serial 9
Admin status : Up
Interface baudrate : 115200
Interface stopbits : 2
HW Flow ctl : Enabled
SE Flow ctl : Enabled
IfForceHD : Enabled
IfParity : Even
IfDataBits : 8
IfTurnAroundDelay : 300 secs
IfHoldTime : 1234 secs
1161
KEEP-ALIVE
CHAPTER 33 SERIAL
IfPostTxDelay : 12 secs
IfRxToTxDelay : 500 secs
33.21. keep-alive
To perform a TCP alive check time, use the keep-alive command in Direction Mode (Raw Socket) and Role
Mode (Modbus). The time specifies how long the device will wait for a response to keep alive packets
sent before terminating the TCP connection. If the remote host does not respond to the keep alive packet
within the specified time, the device will force the existing TCP connection to close. This command is
applicable for TCP connections and for raw as well as MODBUS modes.
keep-alive timeout
keep-alive timeout
<integer(60-600)>
no keep-alive timeout
no keep-alive timeout
1162
KEEP-ALIVE
CHAPTER 33 SERIAL
Parameters
Mode
Direction Mode (Raw Socket)
Role Mode (Modbus Server/Client)
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type raw profile p1
iS5Comm(raw-p1)# transport protocol tcp
iS5Comm(raw-p1-TCP)# direction in
iS5Comm(raw-p1-TCP-in)# keep-alive timeout 5
1163
LOCAL CLIENT PORT
CHAPTER 33 SERIAL
Parameters
Mode
Direction mode (Raw)
Role mode (Modbus Client)
Examples
iS5Comm(config)# serial connection-type raw profile p1
iS5Comm(raw-p1)# transport protocol tcp
iS5Comm(raw-p1-TCP)# direction out
iS5Comm(raw-p1-TCP-Out)# local client port 15010
iS5Comm(raw-p1-TCP-Out)# remote ipv4 address 192.168.20.66 port 15023
1164
LOCAL SERVER
CHAPTER 33 SERIAL
iS5Comm(raw-p1-TCP-Out)# !
iS5Comm(raw-p1-TCP)# !
iS5Comm(raw-p1)# connection-map interface serial 0/12
iS5Comm(raw-p1)# end
local server
Raw socket:
local server
port <integer(15010-15110)>
MODBUS:
local server
port {modbus | <integer(15010-15110)> }
1165
LOOPBACK LOCAL
CHAPTER 33 SERIAL
Parameters
Mode
Direction Mode (Raw)
Role Mode (Modbus Server)
Examples
iS5Comm(config)# serial connection-type raw profile p1
iS5Comm(raw-p1)# transport protocol tcp
iS5Comm(serial-p1-TCP)# direction in
iS5Comm(raw-p1-TCP-in)# local server port 15010
1166
MAX CLIENT CONNECTIONS
CHAPTER 33 SERIAL
loopback local
no loopback local
Mode
Serial Interface Configuration Mode
Examples
iS5Comm # configure terminal
iS5Comm(config)# interface serial 0/9
iS5Comm (config-serial-if)# loopback local
Parameters
Mode
Role Mode (Modbus Server)
1167
MAX CONNECTIONS
CHAPTER 33 SERIAL
Examples
iS5Comm(config)# serial connection-type modbus profile m1
iS5Comm(modbus-m1)# role server
iS5Comm(modbus-m1-server)# max client connections 45
max connections
max connections
<integer(1-64)>
no max connection
no max connection
Parameters
Mode
Direction Mode (Raw)
Examples
iS5Comm(config)# serial connection-type raw profile p1
iS5Comm(raw-p1)# transport protocol tcp
iS5Comm(raw-p1-TCP)# direction in
1168
MAX PENDING MESSAGES
CHAPTER 33 SERIAL
Parameters
Mode
Role Mode (Modbus server)
Examples
iS5Comm(config)# serial connection-type modbus profile m20
iS5Comm(modbus-m20)# role server
1169
MAX UDP CONNECTIONS
CHAPTER 33 SERIAL
Parameters
Mode
Transport Protocol UDP Mode
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type raw profile udp
iS5Comm(raw-udp)# transport protocol udp
iS5Comm(raw-udp-UDP)# max udp connections 55
iS5Comm(raw-udp-UDP)# end
1170
MTU
CHAPTER 33 SERIAL
33.29. mtu
To configure the Maximum Transmission Unit ( MTU) frame size for all frames transmitted and received
on a serial interface, use the command mtu in Serial Interface Configuration Mode. The no form of this
command sets the maximum transmission unit to the default value in all interfaces.
mtu
mtu <frame-size(46-9216)>
Parameters
Mode
Serial Interface Configuration Mode
Examples
iS5Comm (config-serial-if)# mtu 900
packet char
packet char
(off | <integer(0 - 255)>)
1171
PACKET CHAR
CHAPTER 33 SERIAL
Prerequisites
To set the packet character, packetizing has to be enabled and packet timeout has to be set as 0.
iS5Comm(raw-p1-TCP-out)# packetizing enable
iS5Comm(raw-p1-TCP-Out)# packet timeout 0
Parameters
Mode
Direction Mode (Raw)
Serial Profile Mode (Raw Preemptive)
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type raw profile p1
iS5Comm(raw-p1)# transport protocol tcp
iS5Comm(raw-p1-TCP)# direction out
iS5Comm(raw-p1-TCP-Out)# packetizing enable
iS5Comm(raw-p1-TCP-Out)# packet char 240
% Make sure packet timeout is 0 for profile p1 and retry !
iS5Comm(raw-p1-TCP-Out)# packet timeout 0
iS5Comm(raw-p1-TCP-Out)# packet char 240
iS5Comm(raw-p1-TCP-Out)# packet char off
iS5Comm(raw-p1-TCP-Out)# ex
iS5Comm(raw-p1-TCP)# direction in
iS5Comm(raw-p1-TCP-in)# packetizing enable
iS5Comm(raw-p1-TCP-in# packet char 240
1172
PACKET SIZE
CHAPTER 33 SERIAL
packet size
packet size
<integer(16 - 1400)>
no packet size
no packet size
Prerequisites
To set the packet size in Direction Mode (Raw), packetizing has to be enabled.
iS5Comm(raw-p1-TCP-in)# packetizing enable
Parameters
Mode
Direction Mode (Raw)
1173
PACKET TIMEOUT
CHAPTER 33 SERIAL
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type raw profile p1
iS5Comm(raw-p1)# transport protocol tcp
iS5Comm(raw-p1-TCP)# direction in
iS5Comm(raw-p1-TCP-in)# packet size 1340
iS5Comm(raw-p1-TCP-in)# no packet size
packet timeout
packet timeout
<integer(0-1000)>
no packet timeout
no packet timeout
Prerequisites
To set the packet timeout in Direction Mode (Raw), packetizing has to be enabled and packet char should
be off.
iS5Comm(raw-p1-TCP-in)# packetizing enable
1174
PACKET TIMEOUT
CHAPTER 33 SERIAL
Parameters
Mode
Direction Mode (Raw)
Serial Profile Mode (Raw Preemptive)
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type raw profile p1
iS5Comm(raw-p1)# transport protocol tcp
iS5Comm(raw-p1-TCP)# direction in-out
iS5Comm(raw-p1-TCP-InOut)# packetizing enable
Error: Cannot set packet timer for profile p1
Check if packet char is off for profile p1 !
iS5Comm(raw-p1-TCP-InOut)# packet char off
iS5Comm(raw-p1-TCP-InOut)# packet timeout 500
iS5Comm(preempt-p2)# packet char off
iS5Comm(raw-p1-TCP-InOut)# end
1175
PACKETIZING
CHAPTER 33 SERIAL
33.33. packetizing
For enable or disable packetizing, use the packetizing command in Direction Mode. Packetizing is a
feature of Raw Socket which uses the TCP as its transport protocol. Only if this is enabled, the packet
timer, packet size, and packet char can be set.
packetizing
packetizing
{enable | disable}
Parameters
Mode
Direction Mode (Raw)
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type raw profile p1
1176
PARITY
CHAPTER 33 SERIAL
33.34. parity
To detect errors in transmission, use the parity command in Serial Interface Configuration Mode. When
parity is used with a serial port, an extra data bit is sent with each data character and is arranged so that
the number of 1 bits in each character, including the parity bit, is always odd or always even. If a byte is
received with the wrong number of 1s, then, it must have been corrupted. However, an even number of
errors can pass the parity check.
parity
parity
{none | even | odd}
Parameters
Mode
Serial Interface Configuration Mode
1177
PERMANENT-CLIENT
CHAPTER 33 SERIAL
Examples
iS5Comm # configure terminal
iS5Comm(config)# interface serial 0/1
iS5Comm(config-serial-if)# parity even
iS5Comm(config-serial-if)# parity odd
iS5Comm(config-serial-if)# parity none
33.35. permanent-client
To configure the permanent client for preemptive mode, use the permanent-client command in Serial
Profile Mode (Preemptive Raw).
In Preemptive mode, the device acts as a server and can support maximum of two clients (one can be
active at any point of time). One is a permanent client (permanent master), and another is a dynamic
client or dynamic master. The dynamic client can preempt the existing permanent client connection and
can start data transfer with the device (acting as a server). After a certain period of idle time, the connec-
tion with the dynamic client is discontinued, and the permanent client resumes control.
permanent-client
permanent-client
ipv4 address <IpAddress>
no permanent-client
no permanent-client
Parameters
Mode
Serial Profile Mode (Preemptive Raw)
1178
POST-TX DELAY
CHAPTER 33 SERIAL
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type preemptive-raw profile p2
iS5Comm(preempt-p2)# permanent-client ipv4 address 192.168.20.66
iS5Comm(preempt-p2)# no permanent-client
post-tx delay
post-tx delay
<integer (0-15)>
Parameters
integer (0-15) Integer Enter a value (in seconds) for the delay after transmitting a packet.
Mode
Serial Interface Configuration Mode
Examples
iS5Comm # configure terminal
iS5Comm(config)# interface serial 0/9
iS5Comm(config-serial-if)# post-tx delay 12
1179
RE-CONNECT TIMEOUT
CHAPTER 33 SERIAL
re-connect timeout
re-connect timeout
<integer(60-300)>
no re-connect timeout
no re-connect timeout
Parameters
Mode
Direction Mode (Raw Socket)
Role Mode (Modbus Client)
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type raw profile p2
iS5Comm(raw-p2)# transport protocol tcp
iS5Comm(raw-p2-TCP)# direction out
iS5Comm(raw-p2-TCP-Out)# re-connect timeout 299
1180
REMOTE IPV4 ADDRESS
CHAPTER 33 SERIAL
Modbus client
iS5Comm(config)# serial connection-type modbus profile m1
iS5Comm(modbus-m1)# role client
iS5Comm(modbus-m1-client)# re-connect timeout 75
iS5Comm(modbus-m1-client)# no re-connect timeout
1181
REMOTE IPV4 ADDRESS
CHAPTER 33 SERIAL
Parameters
Mode
Direction Mode (Raw Socket)
Role Mode (Modbus client)
Examples
iS5Comm(config)# serial connection-type raw profile p1
iS5Comm(raw-p1)# transport protocol tcp
iS5Comm(raw-p1-TCP)# direction out
iS5Comm(raw-p1-TCP-out)# remote ipv4 address 192.168.20.66 port 650
1182
REMOVE SLAVE-ID
CHAPTER 33 SERIAL
remove slave-id
MODBUS server
remove slave-id
<ids> interface serial <interface-id>
MODBUS client
remove slave-id
<ids>
Parameters
Mode
Role Mode (Server /Client)
1183
REMOVE UDP-HOST
CHAPTER 33 SERIAL
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type modbus profile m1
iS5Comm(modbus-m1)# role server
iS5Comm(modbus-m1-server)# add slave-id 1,2,3,4,5,6,7,8,9,10 interface serial 0/9
iS5Comm(modbus-m1-server)# remove slave-id 1,2,3,4,5,6,7,8,9,10 interface serial 0/9
iS5Comm(modbus-m1-server)# exit
remove udp-host
remove udp-host
{<IpAddress> port <integer(1-65535)>
1184
RESPONSE-TIMEOUT
CHAPTER 33 SERIAL
Parameters
Mode
Transport Protocol UDP Mode
Examples
iS5Comm(config)# serial connection-type raw profile udp
iS5Comm(raw-udp)# transport protocol udp
iS5Comm(raw-udp-UDP)# remove udp-host 192.168.20.66 port 35478
iS5Comm(raw-udp-UDP)# end
33.41. response-timeout
To define the response time of a serial port, use the response-timeout command in Role Mode
(Modbus).
Response time is the time to wait for a response from a serial port.
Same as for slave IDs, response time configuration is bound to:
• an interface for MODBUS servers, or
• a profile for MODBUS clients
response-timeout
MODBUS server
response-timeout
<integer(50-10000)> interface serial <interface-id>
1185
RESPONSE-TIMEOUT
CHAPTER 33 SERIAL
no response-timeout
<ids> interface serial <interface-id>
MODBUS client
response-timeout
<integer(50-10000)>
no response-timeout
Parameters
Mode
Role Mode (Modbus Server / Client)
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type modbus profile m1
iS5Comm(modbus-m1)# role server
iS5Comm(modbus-m1-server)# response-timeout 50 interface serial 0/9
iS5Comm(modbus-m1-server)# exit
1186
ROLE
CHAPTER 33 SERIAL
33.42. role
To define the MODBUS profile to act either as a server or a client, use the role command in Profile Mode.
role
role
{server | client}
Parameters
Mode
Serial Profile Mode (Server / Client)
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type modbus profile m1
iS5Comm(modbus-m1)# role server
iS5Comm(modbus-m1-server)# exit
iS5Comm(modbus-m1)# role client
iS5Comm(modbus-m1-client)# exit
1187
SERIAL CONNECTION-TYPE
CHAPTER 33 SERIAL
rx-to-tx delay
rx-to-tx delay
<integer (0-1000)>
Parameters
Mode
Serial Interface Configuration Mode
Examples
iS5Comm # configure terminal
iS5Comm(config)# interface serial 0/9
iS5Comm(config-serial-if)# rx-to-tx delay 500
serial connection-type
serial connection-type
{raw | preemptive-raw | modbus} profile <string(64)>
no serial profile
no serial profile <string(64)>
1188
SHOW INTERFACES SERIAL
CHAPTER 33 SERIAL
Parameters
raw Enter for raw mode. User can configure a simple raw mode for TCP
or UDP communication.
raw-preempti Enter for preemptive mode. The device acts as a server in
ve preemptive mode. In this mode, direction and protocol are
implicitly set as IN and TCP. Any dynamic client can preempt the
permanent client and start communicating with the device for
specified period of time
modbus Enter for Modbus mode.
profile Enter for profile name definition.
<string(64)> string Enter a string for an user defined profile name
Mode
Global Configuration Mode
Examples
iS5Comm(config)# serial connection-type raw profile p1
iS5Comm(raw-p1)# exit
iS5Comm(config)# serial connection-type preemptive-raw profile p2
iS5Comm(preempt-p2)# exit
iS5Comm(config)# serial connection-type modbus profile p3
iS5Comm(modbus-p3)# exit
iS5Comm(config)# no serial profile profile1
iS5Comm(config)# no serial profile profile2
iS5Comm(config)# no serialprofile profile3
1189
SHOW INTERFACES SERIAL
CHAPTER 33 SERIAL
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show interfaces serial 0/9
Interface name : serial 0/9
Admin status : Up
Baudrate : 9600
Data bits : 8
Parity : Even
Stop bits : 2
Flow control : None
Interface type : rs232
Termination resistor : Disabled
Force HD : Enabled
Turn around delay : 0 secs
Hold time : 0 secs
Post Tx delay : 12 secs
Rx to Tx delay : 500 secs
1190
SHOW SERIAL PROFILE
CHAPTER 33 SERIAL
Parameters
Mode
Privileged EXEC Mode
Examples
iS5Comm# show serial profile all
Profile : p1
Status : Inactive
1191
SHOW SERIAL PROFILE
CHAPTER 33 SERIAL
Profile : m1
Status : Inactive
Role : Server
Local client port : 502
Keep-alive seconds : 240
Max connections : 64
Max TCP pending messages: 16
Send exception : Enabled
1192
SHOW SERIAL PROFILE
CHAPTER 33 SERIAL
Profile : PROF_X1_OUT
Status : Active
Serial interface : 18
Protocol : RAW Socket
Mode : Client
Direction : Out
Transport : TCP
Remote Server IP : 192.168.10.15
Remote Server Port : 15030
Serial RX byte counter : 5
Serial TX byte counter : 0
TCP RX byte counter : 0
TCP TX byte counter : 5
TCP Packets retry : 0
TCP Bytes retry : 0
Connection to server : TCP Mirroring enabled
Mirror Destination Port : 10
Mirror Source IP : 192.168.111.112
Mirror Destination Mac : 00:01:02:03:04:05
Local Client Port : 15035
KeepAlive interval (sec): 240
Reconnect timer(sec) : 120
Packetizing : OFF
TCP buffering : disabled
Turnaround delay(msec) : 0
Hold time(msec) : 0
Rx-to-Tx delay(msec) : 0
1193
SHUTDOWN
CHAPTER 33 SERIAL
Remote Ip 1 : 192.168.20.66
Remote Port 1 : 15031
Remote Udp 1 RX cnt : 0
Remote Udp 1 TX cnt : 4
Remote Ip 2 : 192.168.20.66
Remote Port 2 : 49777
Remote Udp 2 RX cnt : 6
Remote Udp 2 TX cnt : 4
Local IP : 192.168.20.2
Local Port : 15030
Serial RX byte counter : 4
Serial TX byte counter : 6
Pack size : 1400
Pack timer(msec) : 10
Pack char : disabled
Turnaround delay(msec) : 0
Hold time(msec) : 0
Rx-to-Tx delay(msec) : 0
33.47. shutdown
To disable a serial interface, use the command shutdown in Serial Interface Configuration Mode. The no
form of the command enables the interface.
shutdown
no shutdown
Mode
Serial Interface Configuration Mode
Examples
iS5Comm(config-serial-if)# shutdown
1194
STOP-BITS
CHAPTER 33 SERIAL
33.48. stop-bits
To signal the end of a serial frame or packet, use the stop-bits command in Interface Configuration
Mode. The stop bit is used to signal the completion of the message transmission.
stop-bits
stop-bits
<integer (1-2)>
no stop-bits
no stop-bits
Parameters
integer (1-2) Integer Enter a value from the range. The default is 1. Choose 1 stop bit if
parity is used or 2 stop bits with no parity.
Mode
Serial Interface Configuration Mode
Examples
iS5Comm # configure terminal
iS5Comm(config)# interface serial 0/1
iS5Comm(config-serial-if)# stop-bits 1
iS5Comm(config-serial-if)# no stop-bits
NOTE: “no stop-bits” will revert the stop bits settings to default value which is 1.
1195
TCP BUFFERING
CHAPTER 33 SERIAL
tcp buffering
tcp buffering
{enable | disable}
Parameters
Mode
Direction Mode (Raw)
Serial Profile Mode (Preemptive Raw)
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type raw profile p1
iS5Comm(raw-p1)# transport protocol tcp
iS5Comm(raw-p1-TCP)# direction in
iS5Comm(raw-p1-TCP-in)# tcp buffering enable
iS5Comm(raw-p1-TCP-in)# tcp buffering disable
1196
TRANSMIT-EXCEPTION
CHAPTER 33 SERIAL
33.50. transmit-exception
To enable / disable sending TCP exception back to the master if a response has not been received from
RTU within the expected time, use the transmit-exception command in Role Mode.
transmit-exception
MODBUS server
transmit-exception
{enable | disable}
Parameters
enable Enter this option to enable sending TCP exception back to the master.
Default is “Enable” which is numerically denoted as 1.
disable Enter this option to disable sending TCP exception back to the master.
The numerical notation for disable is 0.
Mode
Role Mode (Modbus Server)
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type modbus profile m1
iS5Comm(modbus-m1)# role server
iS5Comm(modbus-m1-server)# transmit-exception enable
1197
TURNAROUND DELAY
CHAPTER 33 SERIAL
transport protocol
transport protocol
{tcp | udp}
Parameters
Mode
Serial Profile Mode (Raw Socket)
Examples
iS5Comm(config)# serial connection-type raw profile p1
iS5Comm(raw-p1)# transport protocol
SERIAL_TRANSPORT commands :
transport protocol { tcp | udp }
1198
ENABLE MIRRORING INTERFACE
CHAPTER 33 SERIAL
messages on a serial port. It represents the delay between sending a message and the next poll out of
the serial port. Some devices does not respond to specific message like broadcast; in that case, enough
time must be ensured for processing.
turnaround delay
turnaround delay
<integer (0-1000)>
Parameters
Mode
Serial Interface Configuration Mode
Examples
iS5Comm # configure terminal
iS5Comm(config)# interface serial 0/1
iS5Comm(config-serial-if)# turnaround delay 100
iS5Comm(config-serial-if)# turnaround delay 0
1199
ENABLE MIRRORING INTERFACE
CHAPTER 33 SERIAL
Parameters
Mode
Direction (Out) Mode (Raw)
1200
ENABLE MIRRORING INTERFACE
CHAPTER 33 SERIAL
Examples
Example 1
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type raw profile PROF_X2
iS5Comm(raw-PROF_X2)# transport protocol tcp
iS5Comm(raw-PROF_X2-TCP)# direction out
iS5Comm(raw-PROF_X2-TCP-Out)# enable mirroring interface gigabitethernet 0/10
iS5Comm(raw-PROF_X2-TCP-Out)# remote ipv4 address 192.168.10.16 port 15030
iS5Comm(raw-PROF_X2-TCP-Out)# local client port 15036
iS5Comm(raw-PROF_X2-TCP-Out)# exit
iS5Comm(raw-PROF_X2-TCP)# exit
iS5Comm(raw-PROF_X2)# connection-map interface serial 0/17
iS5Comm(raw-PROF_X2)# end
Example 2
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type raw profile PROF_X2
iS5Comm(raw-PROF_X2)# transport protocol tcp
iS5Comm(raw-PROF_X2-TCP)# direction out
iS5Comm(raw-PROF_X2-TCP-Out)# enable mirroring interface gigabitethernet 0/10 dest-mac
00:01:02:03:04:05 source-ip 192.168.11.12
iS5Comm(raw-PROF_X2-TCP-Out)# exit
iS5Comm(raw-PROF_X2-TCP-Out)# remote ipv4 address 192.168.10.16 port 15030
iS5Comm(raw-PROF_X2-TCP-Out)# local client port 15036
iS5Comm(raw-PROF_X2-TCP)# exit
iS5Comm(raw-PROF_X2)# connection-map interface serial 0/17
iS5Comm(raw-PROF_X2)# end
Verification
Once the feature is enabled on any given serial profile, the serial data received on the corresponding
serial port shall be encapsulated as a TCP packet with the specific L2, L3 and L4 headers as specified in
the configuration. This encapsulated traffic would be sent on the configured destination port. The Wire-
shark capture of the traffic received from the destination port should show a valid TCP transaction.
1201
DISABLE MIRRORING
CHAPTER 33 SERIAL
Mode
Direction (Out) Mode (Raw)
1202
SERIAL-PORT-OFFLINE
CHAPTER 33 SERIAL
Examples
iS5Comm# configure terminal
iS5Comm(config)# serial connection-type raw profile PROF_X2
iS5Comm(raw-PROF_X2)# transport protocol tcp
iS5Comm(raw-PROF_X2-TCP)# direction out
iS5Comm(raw-PROF_X2-TCP-Out)# disable mirroring
iS5Comm(raw-PROF_X2-TCP-Out)# exit
iS5Comm(raw-PROF_X2-TCP)# exit
iS5Comm(raw-PROF_X2)# connection-map interface serial 0/17
iS5Comm(raw-PROF_X2)# end
33.55. serial-port-offline
To enable or disable the serial port offline indication feature, use the command serial-port-offline in
Serial Interface Configuration Mode. The serial port offline indication feature is used to monitor whether
or not a serial tap is connected to a serial interface with this feature enabled.
serial-port-offline
{enable | disable}
1203
SERIAL-PORT-OFFLINE
CHAPTER 33 SERIAL
Parameters
Mode
Serial Interface Configuration Mode
Examples
iS5Comm# configure terminal
iS5Comm (config)# interface serial 0/10
iS5Comm (config-serial-if)# serial-port-offline enable
1204
NETWORK SCALABILITY
CHAPTER 34 NETWORK SCALABILITY
1205
NETWORK SCALABILITY
CHAPTER 34 NETWORK SCALABILITY
1206
NETWORK SCALABILITY
CHAPTER 34 NETWORK SCALABILITY
1207
NETWORK SCALABILITY
CHAPTER 34 NETWORK SCALABILITY
1208
GLOSSARY ENTRIES
802.1D
IEEE 802.1D is the Ethernet MAC bridges standard which includes Bridging, Spanning Tree and
others. It is standardized by the IEEE 802.1 working group. It includes details specific to linking many
of the other 802 projects including the widely deployed 802.3 (Ethernet), 802.11 (Wireless LAN)
and 802.16 (WiMax) standards.
Bridges using virtual LANs (VLANs) have never been part of 802.1D, but were instead specified in
separate standard, 802.1Q originally published in 1998.
By 2014, all the functionality defined by IEEE 802.1D has been incorporated into either IEEE 802.1Q
(Bridges and Bridged Networks) or IEEE 802.1AC (MAC Service Definition).
802.1Q
IEEE 802.1Q, often referred to as DOT1Q or 1Q, is the networking standard that supports virtual
LANs (VLANs) on an IEEE 802.3 Ethernet network. It is the most widely used encapsulation method
for VLAN tagging.
802.1X
IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). 802.1X authentica-
tion requires a client, an authenticator, and an authentication server. The client is a device that
wants to connect to the network.
802.1W
IEEE 802.1W feature provides rapid traffic reconvergence for point-to-point links within a few milli-
seconds (0-500 milliseconds), following the failure of bridge or bridge point. This reconvergence
occurs more rapidly than the reconvergence provided by the 802.1F spanning Tree Protocol (STP)
or by RSTP.
AAA
Authentication, Authorization and Accounting (AAA) functionalities. AAA are provided by TACACS+.
TACACS+ is used because it provides independently separate and modular authentication, authori-
zation, and accounting (AAA) facilities achieved by a single access control server (the TACACS+
daemon).
AARP
AppleTalk Address Resolution Protocol (AARP). The AARP maps computers' physical hardware
addresses to their temporarily assigned AppleTalk network addresses. AARP is functionally equiva-
lent to Address Resolution Protocol (ARP). The AARP table permits management of the address
mapping table on the managed device. This protocol allows Apple computers' AppleTalk hosts to
generate their own network addresses
ABR
Area Border Router (ABR)
ACK
ACK stands for acknowledgment. ACK is one of the TCP flags.
i
TCP flags are various types of flag bits present in the TCP header. Each of them has its own signifi-
cance. They initiate connections, carry data, and tear down connections. The commonly used TCP
flags are SYN, ACK, RST, FIN, URG, PSH.
• SYN (synchronize): Packets that are used to initiate a connection.
• ACK (acknowledgment): Packets that are used to confirm that the data packets have been received,
also used to confirm the initiation request and tear down requests.
• RST (reset): Signify the connection is down or maybe the service is not accepting the requests.
• FIN (finish): Indicate that the connection is being torn down. Both the sender and receiver send the
FIN packets to gracefully terminate the connection.
• PSH (push): Indicate that the incoming data should be passed on directly to the application instead
of getting buffered.
• URG (urgent): Indicate that the data that the packet is carrying should be processed immediately
by the TCP stack
ACL
An access-control list (ACL) is a list of permissions associated with a system resource (object). An
ACL specifies which users or system processes are granted access to objects, as well as what oper-
ations are allowed on given objects. Each entry in a typical ACL specifies a subject and an operation.
For instance, if a file object has an ACL that contains (Admin: read, write; guest 1: read), this would
give Admin permission to read and write the file, and only give guest 1 permission to read it.
AES
The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm and U.S.
government standard for secure and classified data encryption and decryption.
AH
The Authentication Header (AH) protocol provides data origin authentication, data integrity, and
replay protection. However, AH does not provide data confidentiality, which means that all of your
data is sent in the clear.
AH ensures data integrity with the checksum that a message authentication code, like MD5, gener-
ates. To ensure data origin authentication, AH includes a secret shared key in the algorithm that it
uses for authentication. To ensure replay protection, AH uses a sequence number field within the
AH header. It is worth noting here, that these three distinct functions are often lumped together
and referred to as authentication. In the simplest terms, AH ensures that your data has not been
tampered with en route to its final destination.
Although AH authenticates as much of the IP datagram as possible, the values of certain fields in
the IP header cannot be predicted by the receiver. AH does not protect these fields, known as
mutable fields. However, AH always protects the payload of the IP packet.
The Internet Engineering Task Force (IETF) formally defines AH in Request for Comment (RFC) 4302,
IP Authentication Header.
AO
Authentication Option (AO). TCP-AO specifies the use of stronger Message Authentication Codes
(MACs), protects against replays even for long-lived TCP connections, and provides more details on
the association of security with TCP connections than TCP MD5. TCP-AO is compatible with either a
static Master Key Tuple (MKT) configuration or an external, out-of-band MKT management mech-
anism; in either case, TCP-AO also protects connections when using the same MKT across repeated
ii
instances of a connection, using traffic keys derived from the MKT, and coordinates MKT changes
between endpoints.
ARAP
Apple Remote Access Protocol (ARAP); the Apple Remote Access Protocol (ARAP) sends traffic
based on the AppleTalk protocol across PPP links and ISDN switched-circuit networks. ARAP is still
pervasive in the Apple market, although the company is attempting to transition into an
Apple-specific TCP stack for use over a PPP link.
ARP
ARP (Address Resolution Protocol). The ARP is a communication protocol used for discovering the
link layer address, such as a MAC address, associated with a given Internet layer address, typically
an IPv4 address.
AS
Autonomous System (AS)
ASBR
Autonomous Border System Router (ASBR)
Asdot
Asdot format is used when the 4-byte ASN are represented by their decimal value e.g. 100.1.
BGP uses AS numbers as a fundamental part of its routing process. Because conventional 2-byte
public AS numbers were becoming exhausted, the IANA increased the AS numbers by introducing
a 4-byte AS numbers. The Asdot notation to represent these AS numbers is as follows.
For values between 0 and 65535, Asdot notation is simply the decimal value of the AS number.
These values take up to 16 bits to express in binary. Examples include:
• 5
• 25
• 196
• 65000
• 65535
For values above 65536, Asdot notation splits the 32 bit binary value into two 16 bit values. These
values are represented as two decimal numbers separated by a dot. Examples include:
• 0.65536
• 15.418
• 65535.8520
• 65535.65535
You will notice that for values of up to 65535, the Asdot is the same as the Asplain notation, and for
values of 65536 and above, the Asdot is the same as the Asdot+ notation.
ASN
Autonomous System Number (ASN)
BDR
BDR stands for Backup Designated Router.
iii
BFD
Bidirectional Forwarding Detection (BFD) is a super fast protocol that is able to detect link failures
within milliseconds or even microseconds. BFD runs independent from any other (routing) proto-
cols. Once it’s up and running, you can configure protocols like OSPF, EIGRP, BGP, HSRP, MPLS LDP
etc. to use BFD for link failure detection instead of their own mechanisms. When the link fails, BFD
will inform the protocol
BGP
BGP (Border Gateway Protocol) is an Inter AS (Autonomous Systems) Routing Protocol that
manages the distribution of Network Layer Reachability Information (NLRI) across AS. It is used to
build an AS connectivity graph that is used to prune routing loops and enforce policies at AS level
BGP
BGP-4 is an extension of BGP-3 (BGP version 3),and it is the current version of BGP. BGP4 was
published as RFC 4271 in 2006. Its major enhancement is the support for Classless Inter-Domain
Routing (CIDR) and use of route aggregation to decrease the size of routing tables. The new RFC
allows BGP4 to carry a wide range of IPv4 and IPv6 "address families".
BIDIR-PIM
Bi-directional Sparse Mode (PIM-SM); Derived from PIM-SM, BIDIR-PIM builds and maintains a bidi-
rectional RPT, which is rooted at the RP and connects the multicast sources and the receivers. Along
the bidirectional RPT, the multicast sources send multicast data to the RP, and the RP forwards the
data to the receivers. Each router along the bidirectional RPT needs to maintain only one (*, G)
entry, saving system resources.
Another difference between PIM sparse mode and PIM bidirectional mode is that with sparse mode
traffic only flows down the shared tree. Using PIM bidirectional mode, traffic will flow up and down
the shared tree. When the multicast packets arrive at the RP, they will be forwarded down the
shared tree (if there are receivers) or dropped (when we don’t have receivers).
BMS
Best Master Clock (BMS); The ordinary clock executes the port state machine and BMC (Best
Master Clock) algorithm to select the PTP port state.
BOOTP
The Bootstrap Protocol (BOOTP) is a computer networking protocol used in Internet Protocol
networks to automatically assign an IP address to network devices from a configuration server. The
BOOTP was originally defined in RFC 951.
BPDU
Bridge Protocol Data Units (BPDUs) are frames that contain information about the spanning tree
protocol (STP). A switch sends BPDUs using a unique source MAC address from its origin port to a
multicast address.
There are two kinds of BPDUs for 802.1D Spanning Tree:
• Configuration BPDU, sent by root bridges to provide information to all switches.
• TCN (Topology Change Notification), sent by bridges towards the root bridge to notify changes in
the topology, such as port up or port down.
BPS
BPS (Bits-per-second)
iv
BR
Border Router (BR)
BSD
Berkeley Software Distribution (BSD)
BSR
The bootstrap router (BSR) ensures that all routers in the PIM domain have the same RP cache as
the BSR. You can configure the BSR to help you select an RP set from BSR candidate RPs. The func-
tion of the BSR is to broadcast the RP set to all routers in the domain. You select one or more candi-
date BSRs to manage the RPs in the domain. Only one candidate BSR is elected as the BSR for the
domain.
This figure shows the BSR mechanism. Router A, the software-elected BSR, sends BSR messages out
all enabled interfaces (shown by the solid lines in the figure). The messages, which contain the RP
set, are flooded hop by hop to all routers in the network. Routers B and C are candidate RPs that
send their candidate-RP advertisements directly to the elected BSR (shown by the dashed lines in
the figure).
The elected BSR receives candidate-RP messages from all the candidate RPs in the domain. The
bootstrap message sent by the BSR includes information about all of the candidate RPs. Each router
uses a common algorithm to select the same RP address for a given multicast group.
CA
Certificate Authorization (CA)
CBP
Customer Backbone Port (CBP)
CBS
Committed burst size (CBS). During periods of average traffic rates below the Committed informa-
tion rate (CIR), any unused bandwidth capacity accumulates up to a maximum amount defined by
the CBS. Short periods of bursting traffic (back-to-back traffic at averages rates that exceed the CIR)
are also categorized as green provided that unused bandwidth capacity is available.
v
CEP
Customer Edge Port (CEP). The Customer Edge Port (CEP) and each Provider Edge Port are treated
as separate Bridge Ports by the spanning tree protocol. If the C-VLAN component connects to the
S-VLAN component with a single Provider Edge Port, and the associated service instance supports
no more than two customer interfaces, then all frames (including Spanning Tree BPDUs) addressed
to the Bridge Group Address may be relayed between the two Ports of the C-VLAN component
without modification. Otherwise, the Spanning Tree Protocol Entity shall execute the Rapid Span-
ning Tree Protocol (RSTP, Clause 17 of IEEE Std 802.1D), as modified by the provisions of this
subclause.
CFI
Canonical Format Identifier (CFI). If Drop Eligible Indicator (DEI) bit is enabled in 802.1ad header or
has Canonical Format Identifier (CFI) bit enabled in 802.1q header on an arriving packet, such
packets will be dropped using QoS.
MS-CHAP
CHAP stands for Challenge Handshake Authentication Protocol. MS-CHAP is the Microsoft version
of the Challenge-Handshake Authentication Protocol, CHAP. The protocol exists in two versions,
MS-CHAPv1 (defined in RFC 2433) and MS-CHAPv2 (defined in RFC 2759). MS-CHAPv2 provides
mutual authentication between peers by piggybacking a peer challenge on the Response packet
and an authenticator response on the Success packet.
CIDR
Classless Inter Domain Routing (CIDR).
CIR
Committed information rate (CIR) is defines the guaranteed bandwidth for traffic arriving at or
departing from the interface under normal line conditions.
CIST
The Common and Internal Spanning Tree (CIST) is a collection of the ISTs in each MST region.
CLI
Command line interface (CLI) is a text-based interface that is used to operate software and oper-
ating systems while allowing the user to respond to visual prompts by typing single commands into
the interface and receiving a reply in the same way
CLKIWF
CLKIWF is short for Clock InterWorking Function.
CoS
Output queue scheduling defines the class-of-service (CoS) properties of output queues. Based on
certain types of traffic are preferred. The level of service is determined by the egress port queue to
which the traffic is assigned. When traffic is queued for transmission, the rate at which it is serviced
depends on how the queue is configured and possibly the amount of traffic present in other queues
for that port.
Some traffic is classified for service (i.e., packet marking) before it arrives at the switch. If you
decide to use these classifications, you can map this traffic to egress queues by setting the CoS in
the Queue table.
vi
CPLD
A Complex Programmable logic device (CPLD) is a logic device with completely programmable
AND/OR arrays and macrocells. Macrocells are the main building blocks of a CPLD, which contain
complex logic operations and logic for implementing disjunctive normal form expressions. AND/OR
arrays are completely reprogrammable and responsible for performing various logic functions.
CPU
The central processing unit (CPU) is the primary component of a computer that processes instruc-
tions. It runs the operating system and applications, constantly receiving input from the user or
active software programs. It processes the data and produces output.
CRT
CRT stands for "Internet security certificate.
CSR
Certificate Signing Request (CSR)
CST
common spanning tree (CST); The common spanning tree (CST) that interconnects the MST regions
and single spanning trees
CTS
CTS stands for Clear to Send. Request to Send (RTS)/CTS Flow Control is another flow control mech-
anism that is part of the RS232 standard.
CVID
The C-VID registration table is as follows:
Table 1:
Cvid value The value of the Customer VLAN id on the Customer edge port.
(Table key)
Svid Value The S-VLAN tag. Auto creates an S-VLAN component and the
CNP and PNP and links the PEP of the C-VLAN component to the
CNP.
Untagged-pep A boolean indicating frames for this C-VLAN should be
forwarded untagged through the Provider Edge Port (PEP).
Untagged-cep A boolean indicating frames for this C-VLAN should be
forwarded untagged through the Customer Edge Port (CEP).
CVLAN
Set of ports & inner VLANs (CVLAN); or C-VLAN or Customer Bridge (CB)
DB9
DB9 refers to a common connector type from the D-Subminiatures (D-Sub) connector family, which
when introduced, was among the smallest connectors used on computer systems. DB9 houses 9
pins (for the male connector) or 9 holes (for the female connector). DB9 connectors were once very
vii
common on PCs and servers. Today, the DB9 has mostly been replaced by more modern interfaces
such as USB, PS/2, Firewire, and others.
DB25
The DB25 connector is an analog socket, with 25 pins, from the D-Subminiatures (D-Sub) connector
family. The prefix “D” represents the D-shape of the connector shell. The DB25 connector is mainly
used in serial and parallel ports, allowing asynchronous data transmission according to the RS-232
standard (RS-232C).
DCD
DCD stands Data Carrier Detect. The description is modem connected to another.
DEC
Digital Equipment Corporation (DEC)
DEI
Drop Eligible Indicator (DEI). If DEI bit is enabled in 802.1ad header or has Canonical Format Identi-
fier (CFI) bit enabled in 802.1q header on an arriving packet, such packets will be dropped using
QoS.
DES
The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm and U.S.
government standard for secure and classified data encryption and decryption.
DF
Designated Forwarder (DF).
DH
Diffie and Hellman (DH) describe a method for two parties to agree upon a shared secret number,
called ZZ, in such a way that the secret will be unavailable to eavesdroppers. This method requires
that both the sender and recipient of a message have key pairs (private and public). By combining
one's private key and the other party's public key, both parties can compute the same shared secret
number ZZ
DHCP
Dynamic Host Configuration Protocol (DHCP)
DITA
Darwin Information Typing Architecture (DITA); the DITA specification defines a set of document
types for authoring and organizing topic-oriented information, as well as a set of mechanisms for
combining, extending, and constraining document types.
D-LAG
Distributed Link Aggregation (D-LAG or DLAG)
DLF
The Destination Lookup Failure (DLF). When a packet arrives at the device and the device doesn't
have an entry for the destination MAC address in its MAC address table, the packet is classified as
a Destination Lookup Failure (DLF)
DM
DM stands for Dense Mode. Protocol-Independent Multicast Dense Mode (PIM-DM) uses dense
multicast routing.
viii
DNAT
Destination network address translation (DNAT) is a technique for transparently changing the desti-
nation IP address of an end route packet and performing the inverse function for any replies.
DNS
Domain Name System
DOT1Q
IEEE 802.1Q, often referred to as DOT1Q or 1Q, is the networking standard that supports virtual
LANs (VLANs) on an IEEE 802.3 Ethernet network. It is the most widely used encapsulation method
for VLAN tagging.
Dot1x
Dot1x Authentication is enabled when dot1x system-auth-control is enabled, and aaa authentica-
tion dot1x default is local. If you enable authentication on a port by using the default setting of
dot1x port-control, which is force-authorized, it disables 802.1X authentication and causes the port
to transition to the authorized state without any authentication exchange required. The port trans-
mits and receives normal traffic without 802.1X-based authentication of the client
DR
The Designated Router (DR) is the router that will forward the PIM join message from the receiver
to the RP (rendezvous point).
DS
Differentiated Services (DS).
DSCP
A Differentiated Services Code Point (DSCP) is a packet header value that can be used to request
(for example) high priority or best effort delivery for traffic.
ix
DSR
DSR stands Data Set Ready. The description is ready to communicate.
DST
Daylight Saving Time (DST) is a system of setting clocks ahead so that both sunrise and sunset occur
at a later hour. The effect is additional daylight in the evening. Many countries observe DST,
although most have their own rules and regulations for when it begins and ends. The dates of DST
may change from year to year
DTR
DTR stands Data Terminal Ready. The description is ready to communicate.
DUT
Device under Test (DUT)
DVMRP
Distance Vector Multicast Routing Protocol (DVMRP)
E2E
End-to-end (E2E) transparent clock for Precision Time Protocol (PTP). With an E2Etransparent
clock, only the residence time is included in the timestamp in the packet.
EAP
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in
network and Internet connections. EAP is usually tunnelled over RADIUS between the Authenti-
cator and the Authentication Server. 802.1x uses EAP.
EAP is an authentication framework, not a specific authentication mechanism. Commonly used
modern methods capable of operating in wireless networks include EAP-TLS, EAP-SIM, EAP-AKA,
LEAP and EAP-TTLS. Requirements for EAP methods used in wireless LAN authentication are
described in RFC 4017.
The Lightweight Extensible Authentication Protocol (LEAP) method was developed by Cisco
Systems prior to the IEEE ratification of the 802.11i security standard.
EAPOL
Extensible Authentication Protocol (EAP) over LAN (EAPoL) is used between the Supplicant (soft-
ware on your laptop) and the Authenticator (switch)
EBGP
External BGP (EBGP); EBGP runs between two BGP routers in different Autonomous System (AS).
EBS
The Excess Burst size (EBS) specifies how much data above the committed burst size (CBS) a user
can transmit. The EBS is the size up to which the traffic is allowed to burst without being discarded.
EBS allows for moderate periods of bursting traffic that exceeds both the committed information
rate (CIR) and the committed burst size (CBS).
ECN
Explicit Congestion Notification (ECN)
EGP
Exterior Gateway Protocol (EGP) is a defunct routing protocol used in autonomous systems to
exchange data between surrounding gateway sites. Border Gateway Protocol (BGP) supplanted
EGP, widely utilized by research institutes, universities, government agencies, and commercial
x
companies (BGP). EGP is built on poll instructions to request update answers and periodic message
exchange polling for neighbor reachability.
EIGRP
Enhanced Interior Gateway Routing Protocol (EIGRP) is a network protocol that enables routers to
exchange information more efficiently than earlier network protocols, such as Interior Gateway
Routing Protocol (IGRP) or Border Gateway Protocol (BGP), and provides intelligent traffic sharing.
EIR
The excess information rate (EIR) specifies the rate above the CIR (committed information rate) at
which traffic is allowed into the network and that may get delivered if the network is not congested.
The EIR has an additional parameter associated with it called the excess burst size (EBS). The EBS is
the size up to which the traffic is allowed to burst without being discarded.
ESD
ElectroStatic Discharge (ESD) is the sudden flow of electricity between two electrically charged
objects caused by contact, an electrical short or dielectric breakdown. A buildup of static electricity
can be caused by tribocharging or by electrostatic induction. The ESD occurs when differ-
ently-charged objects are brought close together or when the dielectric between them breaks
down, often creating a visible spark.
EXEC
exec: Protocol
Commands that are invoked using the exec: protocol must be executable as standalone commands.
Commands that are built into a command interpreter or other program cannot be executed
directly, but must be executed (if possible) within the context of the application that provides them.
For example, the following seed URL would not work on Microsoft Windows systems because the
dir command is built into the Windows command interpreter (cmd.exe):
exec: dir e:\data
To use the exec protocol with commands that are built into the Windows command interpreter,
you must do something as the following:
exec: cmd /c dir 'e:\data'
ESP
Encapsulation Security Protocol (ESP); the ESP protocol provides data confidentiality, and also
optionally provides data origin authentication, data integrity checking, and replay protection.
The difference between ESP and the Authentication Header (AH) protocol is that ESP provides
encryption, while both protocols provide authentication, integrity checking, and replay protection.
With ESP, both communicating systems use a shared key for encrypting and decrypting the data
they exchange.
EVB
Edge Virtual Bridge (EVB) is an IEEE standard that involves the interaction between virtual switching
environments in a hypervisor and the first layer of the physical switching infrastructure. The EVB
enhancements are following 2 different paths – 802.1qbg and 802.1qbh.
EVC
Ethernet Virtual Connection (EVC).
FCS
A frame check sequence (FCS) is an error-detecting code added to a frame in a communication
protocol. Frames are used to send payload data from a source to a destination.
xi
FDB
Forwarding Database (FDB)
FID
Filtering ID (FID)
FHRP
First Hop Redundancy Protocol (FHRP)
FPGA
The Field Programmable Gate Array (FPGA) is a programmable logic device that can have its
internal configuration set by the firmware.
FTP
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of
computer files from a server to a client on a computer network. FTP is built on a client–server model
architecture using separate control and data connections between the client and the server.[1] FTP
users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a
username and password, but can connect anonymously if the server is configured to allow it. For
secure transmission that protects the username and password, and encrypts the content, FTP is
often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).
GARP
GARP (Generic Attribute Registration Protocol) is a local area network (LAN) protocol that defines
procedures by which end stations and switches can register and deregister attributes, such as
network identifiers or addresses, with each other. Every end station and switch thus has a record,
or list, of all the other end stations and switches that can be reached at any given time.
When an attribute for an end station or switch is registered or deregistered according to GARP, the
set of reachable end stations and switches, called participants, is modified according to specific
rules. The defined set of participants at any given time, along with their attributes, is a subset of the
network topology called the reachability tree. Data frames are propagated only to registered end
stations. This prevents attempts to send data to end stations that are not reachable.
GGP
Gateway-to-Gateway Protocol (GGP) is an obsolete protocol defined for routing datagrams
between Internet gateways. It was first outlined in 1982. The GGP was designed as an IP datagram
service similar to the TCP and the UDP.
GMRP
GARP Multicast Registration Protocol (GMRP) is a Generic Attribute Registration Protocol (GARP)
application that provides a constrained multicast flooding facility similar to IGMP snooping.
GND
Ground
GPS
Global Positioning System
GR
Graceful Restart (GR)
GRE
Generic routing encapsulation (GRE) is an IP encapsulation protocol which is used to transport IP
packets over a network. In GRE, an IP datagram is tunnelled (encapsulated) within another IP data-
xii
gram.One great advantage of GRE is that it allows routing of IP packets between private IPv4
networks which are separated over public IPv4 Internet. GRE also supports encapsulating IPv4
broadcast and multicast traffic.
GVRP
GVRP (GARP VLAN Registration Protocol or Generic VLAN Registration Protocol) is a protocol that
facilitates control of virtual local area networks (VLANs) within a larger network. GVRP conforms to
the IEEE 802.1Q specification, which defines a method of tagging frame s with VLAN configuration
data
HA
High Availability (HA)
HDMI
HDMI (High-Definition Multimedia Interface) is digital interface capable of transmitting
high-quality and high-bandwidth streams of audio and video between devices
HOL
Head-Of-Line (HOL) blocking should be prevented on a port. HOL blocking happens when HOL
packet of a buffer cannot be switched to an output port (i.e. HOL occurs when a line of packets is
held up by the first packet).
HSR
High-availability Seamless Redundancy (HSR) is a network protocol for Ethernet that provides
seamless failover against failure of any single network component. PRP and HSR are standardized
by the IEC 62439 and are suited for applications that request high availability and no switchover
time.
HTTP
Hyper Text Transfer Protocol (HTTP)
HTTPS
Hyper Text Transfer Protocol Secure (HTTPS)
IANA
Internet Assigned Numbers Authority (IANA)
IBGP
Internal BGP (iBGP) is the protocol used between the routers in the same autonomous system (AS).
iBGP is used to provide information to your internal routers. iBGP requires all the devices in same
AS to form full mesh neighborship or either of Route reflectors and Confederation for prefix
learning.
ICMP
Internet Control Message Protocol
IDPR
Inter-domain Routing Protocol (IDPR). The objective of IDPR is to construct and maintain routes,
between source and destination administrative domains, that provide user traffic with the
requested services within the constraints stipulated for the domains transited.
IETF
Internet Engineering Task Force (IETF) is an open standards organization, which develops and
promotes voluntary Internet standards, in particular the technical standards that comprise the
Internet protocol suite (TCP/IP).
xiii
IGMP
The Internet Group Management Protocol (IGMP) is a communications protocol used by hosts and
adjacent routers on IPv4 networks to establish multicast group memberships. IGMP is an integral
part of IP multicast and allows the network to direct multicast transmissions only to hosts that have
requested them.
IGP
Interior Gateway Protocol (IGP) is a type of routing protocol used for exchanging routing table infor-
mation between gateways (commonly routers) within an autonomous system (for example, a
system of corporate local area networks). This routing information can then be used to route
network-layer protocols like IP.
IGRP
Interior Gateway Routing Protocol (IGRP) is a proprietary distance vector routing protocol that
manages the flow of routing information within connected routers in the host network or autono-
mous system. The protocol ensures that every router has routing tables updated with the best
available path. IGRP also avoids routing loops by updating itself with the changes occurring over the
network and by error management.
IGS
The Internet Group Management Protocol (IGMP) Snooping (IGS) is designed to prevent hosts on a
local network from receiving traffic for a multicast group they have not explicitly joined. It provides
switches with a mechanism to prune multicast traffic from links that do not contain a multicast
listener (an IGMP client). Essentially, IGS is a layer 2 optimization for the Layer 3 IGMP.
IKE
Internet Key Exchange (IKE)
IP
Internet Protocol (IP).
IPSec
IPSec (Internet Protocol Security) is a suite of protocols that provides security to Internet commu-
nications at the IP layer. The most common current use of IPSec is to provide a Virtual Private
Network (VPN), either between two locations (gateway-to-gateway) or between a remote user and
an enterprise network (host-to-gateway); it can also provide end-to-end, or host-to-host, security.
IPv4
IPv4 and IPv6 are Internet protocol version 4 and Internet protocol version 6. IPv4 supports:
• IPv4 has a 32-bit address length
• IPv4 binary bits are separated by a dot(.) whereas IPv6 binary bits are separated by a colon(:).
• IPv4 is a numeric addressing method whereas IPv6 is an alphanumeric addressing method
• It Supports Manual and DHCP address configuration
• In IPv4 end to end, connection integrity is Unachievable
• It can generate 4.29×109 address space
• Fragmentation performed by Sender and forwarding routers
• In IPv4 Packet flow identification is not available
• In IPv4 checksum field is available
• It has broadcast Message Transmission Scheme
xiv
• In IPv4 Encryption and Authentication facility not provided
• IPv4 has a header of 20-60 bytes.
IPv6
IPv6 stands for Internet protocol version 6. An IPv6 address consists of eight groups of four hexa-
decimal digits. Anexample of IPv6 address is as follows
3001:0da8:75a3:0000:0000:8a2e:0370:7334
there are different ypes of IPv6 addresses:
• Unicast addresses—it identifies a unique node on a network and usually refers to a single sender
or a single receiver.
• Multicast addresses—it represents a group of IP devices and can only be used as the destination of
a datagram.
• Anycast addresses—it is assigned to a set of interfaces that typically belong to different nodes.
IRDP
ICMP Router Discovery Protocol (IRDP) allows hosts to locate routers that can be used as a gateway
to reach IP-based devices on other networks. When the device running IRDP operates as a router,
router discovery packets are generated. When the device running IRDP operates as a host, router
discovery packets are received. ICMP stands for Internet Control Message Protocol.
IRTP
Internet Reliable Transaction Protocol (IRTP) is a transport level host to host protocol designed for
an Internet environment. It provides reliable, sequenced delivery of packets of data between hosts
and multiplexes / demultiplexes streams of packets from/to user processes representing ports.
ISAKMP
Internet Security Association and Key Management Protocol (ISAKMP)
ISDN
Integrated Services Digital Network (ISDN)
ISL
ISL stands for Inter-Switch Link which is one of the VLAN protocols. The ISL is proprietary of Cisco
and is used only between Cisco switches. It operates in a point-to-point VLAN environment and
supports up to 1000 VLANs and can be used over Fast Ethernet and Gigabit Ethernet links only.
ISP
Internet service provider (ISP)
ISS
Intelligent Switch Solution (ISS).
IST
The Internal Spanning Tree (IST) instance receives and sends BPDUs to the CST. The IST can repre-
sent the entire MST region as a CST virtual bridge to the outside world.
IVL
Independent VLAN Learning (IVL)
IVR
Inter VLAN Routing (IVR)
xv
IWF
InterWorking Function (IWF).
KDF
Key Derivation Functions (KDFs); TCP-AO's Traffic_Keys are derived using KDFs. As per RFC5926,
when invoked, a KDF generates a string of length Output_Length bit based on the Master_Key and
context value. This result may then be used as a cryptographic key for any algorithm that takes
anOutput_Length length key. A KDF MAY specify a maximum Output_Length parameter.
L2GP
Layer 2 Gateway Port (L2GP)
LA
Link Aggregation
LACP
Link Aggregation Control Protocol
LAG
Link Aggregation Group
LAN
Local Area Network
LC
LC (Lucent Connector) is a miniaturized version of the fiber-optic SC (Standard Connector)
connector. It looks somewhat like the SC, but is half the size with a 1.25mm ferrule instead of
2.5mm.
LED
Light-emitting diode (LED) is a widely used standard source of light in electrical equipment.
LLDP
Link Layer Discovery Protocol (LLDP)
LM
Line Module (LM)
LSA
Link State Advertisement (LSA)
xvi
LSDB
link state database (LSDB)
LSR
Link State Routing (LSR)
MAC
Media access control (MAC) is a sublayer of the data link layer in the seven-layer OSI network refer-
ence model. MAC is responsible for the transmission of data packets to and from the network-inter-
face card, and to and from another remotely shared channel.
MAU
Medium Attachment Unit (MAU)
MD5
Message Digest Algorithm 5 (MD5) is a cryptographic hash algorithm that can be used to create a
128-bit string value from an arbitrary length string.
A hash function provides encryption using an algorithm and no key. A variable-length plaintext is
“hashed” into a (typically) fixed-length hash value (often called a “message digest” or simply a
“hash”). Hash functions are primarily used to provide integrity; if the hash of a plaintext changes,
the plaintext itself has changed.
Common older hash functions include Secure Hash Algorithm 1 (SHA-1), which creates a 160-bit
hash and Message Digest 5 (MD5), which creates a 128-bit hash.
Although there has been insecurities identified with MD5, it is still widely used, and its most
common use is to verify the integrity of files.
MDI
Media Independent Interface (MDI) and Media Independent Interface with Crossover (MDIX) are
basically ports on a computer and a network switch, router, or hub, respectively.
MDIX
Media Independent Interface with Crossover (MDIX) and Media Independent Interface (MDI) are
basically ports on a computer and a network switch, router, or hub, respectively.
MED
1) Media Endpoint Discovery (MED); LLDP does not contain the capability of negotiating additional
information such as PoE management and VLAN assignments. This capability was added as an
enhancement known as Media Endpoint Discovery or MED, resulting in the enhanced protocol
LLDP-MED.The MED enhancement has been standardized by the Telecommunications Industry
Association in standard number ANSI/TIA-1057.
2) Multi Exit Discriminator (MED) for routes received from different autonomous systems; MED is one
of the parameters considered for selecting the best path among many alternative paths. The path
with a lower MED is preferred over a path with a higher MED.
MHRP
Multipath Hybrid Routing Protocol (MHRP) is a multipath routing protocol for hybrid Wireless Mesh
Network (WMN), which provides security and uses technique to find alternate path in case of route
failure.
MIB
Management Information Base (MIB) is the hierarchical database used by the simple network
management protocol (SNMP) to describe the particular device being monitored.
xvii
MIB OID
Management Information Base (MIB) is the hierarchical database used by the simple network
management protocol (SNMP) to describe the particular device being monitored.
MIB Object IDentifier (OID), as known as a MIB object identifier in the SNMP, is a number assigned
to devices in a network for identification purposes. OID numbering is hierarchical. Using the IETF
notation of digits and dots, resembling very long IP addresses, various registries such as ANSI assign
high-level numbers to vendors and organizations. They, in turn, append digits to the number to
identify individual devices or software processes.
MIC
Media redundancy Interconnection Client (MIC) is a member node of a MRP Interconnect ring.
MIM
Media redundancy Interconnection Manager (MIM) is a node in a MRP Interconnect ring which acts
a redundancy manager.
MLDS
Multicast Listener Discovery Snooping (MLDS) constrains the flooding of IPv6 multicast traffic on
VLANs. When MLDS is enabled on a VLAN, adevice examines MLD messages between hosts and
multicast routers and learns which hosts are interested in receiving traffic for a multicast group. On
the basis of what it learns, the device then forwards multicast traffic only to those interfaces in the
VLAN that are connected to interested receivers instead of flooding the traffic to all interfaces.
MKT
Master Key Tuple (MKT). TCP-AO uses cryptographic algorithms to convert MKTs, which can be
shared across connections, into unique traffic keys for each connection.
MM
MultiMode (MM) Mode is in optical fiber with a larger core than singlemode fiber. Typically, MM
has a core diameter of 50 or 62.5 µm and a cladding diameter of 125 µ.
MIC
Media redundancy Interconnection Client (MIC) is a member node of a MRP Interconnect ring.
MPLS
Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that
directs data from one node to the next based on short path labels rather than long network
addresses, thus avoiding complex lookups in a routing table and speeding traffic flows. The labels
identify virtual links (paths) between distant nodes rather than endpoints. MPLS can encapsulate
packets of various network protocols, hence the "multiprotocol" reference on its name.
MRA
Media Redundancy Automanager (MRA). To configure a Media Redundancy Automanager (MRA),
the node or nodes elect an MRM by a configured priority value.
MRC
Media Redundancy Client (MRC) is a member node of a MRP ring.
MRM
Media Redundancy Manager (MRM) is a node in the network which acts a redundancy manager.
MRP
Media Redundancy Protocol (MRP) is a networking protocol designed to implement redundancy
and recovery in a ring topology.
xviii
MSR
1) MSR (MIB Save and Restore).
2) Model-Specific Register (MSR)
MST
MST (Multiple Spanning Tree) is the version of STP that allows multiple VLANs to a single instance.
It is the standard based protocol defined with IEEE 802.1s. Unlike other spanning tree protocols, in
which all the spanning tree instances are independent, MST establishes and maintains IST, CIST,
and CST spanning trees.
MSTI
Multiple spanning trees, called MSTIs; inside an MST region, multiple spanning trees, called MSTIs,
are calculated. Among these MSTIs, MSTI 0 is the IST.
MSTP
Multiple Spanning-Tree Protocol
MTU
Maximum Transmission Unit (MTU)
MVLAN
Multicast VLANs (MVLAN)
NAP
Network Access Protection (NAP)
NAPT
Network address port translation (NAPT) is a variation of the traditional NAT. NAPT extends the
notion of translation one step further by also translating transport identifiers (e.g., TCP and UDP
port numbers, ICMP query identifiers).
NAS
The Network Access Server (NAS) is the front line of authentication – it's the first server that fields
network authentication requests before they pass through to the RADIUS. The NAS Identifier
(NAS-ID) is a feature that allows the RADIUS server to confirm information about the sender of the
authentication request.
NAT
Network address translation (NAT) is a method of mapping an IP address space into another by
modifying network address information in the IP header of packets while they are in transit across
a traffic routing device.
NBMA
NBMA (Non Broadcast Multi Access)
NBNS
NetBIOS Name Server where NetBIOS stands for Network Basic Input / Output System.
NC
NC (normally closed) is a closed (short) circuit creating a path for the current.
ND
Neighbor Discovery (ND); the Virtual Router Redundancy Protocol (VRRP) for IPv6 provides a much
faster switchover to an alternate default router than can be obtained using standard neighbor
discovery (ND) procedures.
xix
NETBIOS
Network Basic Input / Output System (NETBIOS)
NIP
This set of fields are a vector of N IP unicast addresses, where the value N corresponds to the
Number or Sources (N) field.
NLRI
Network Layer Reachability Information (NLRI). The Network Layer Reachability information is
encoded as one or more 2-tuples of the form <length, prefix>, whose fields are described below.
NMS
Network Management System (NMS)
NO
NO (normally open) is an open circuit not creating a path for the current.
NPS
Network Policy Server (NPS)
NSSA
Not-so-stubby Area (NSSA)
NTP
Network Time Protocol (NTP)
NVP
Network Voice Protocol (NVP) was a pioneering computer network protocol for transporting
human speech over packetized communications networks. It was an early example of Voice over
Internet Protocol technology.
NVRAM
Non-volatile random-access memory (NVRAM) is random-access memory that retains data without
applied power. This is in contrast to dynamic random-access memory (DRAM) and static
random-access memory (SRAM), which both maintain data only for as long as power is applied, or
such forms of memory as magnetic tape, which cannot be randomly accessed but which retains
data indefinitely without electric power.
OID
Object IDentifier
ORF
Outbound Route Filter (ORF); the BGP Prefix-Based ORF feature uses BGP ORF send and receive
capabilities for minimizing the number of BGP updates that are sent between BGP peers. Config-
uring this feature can help reduce the amount of system resources required for generating and
processing routing updates by filtering out unwanted routing updates at the source.
OSPF
Open Shortest Path First routing protocol
xx
OUI
organization unique identifiers (OUI)s. LLDP enables defining optional TLV units by using organiza-
tion unique identifiers (OUIs) or organizationally-specific TLVs. An OUI identifies the category for a
TLV unit depending on whether the OUI follows the IEEE 802.1 or IEEE 802.3 standard.
P2P
Peer-to-peer (P2P) transparent clock for Precision Time Protocol (PTP).
PAE
Port Access Entity (PAE). 802.1X-2001 defines two logical port entities for an authenticated
port—the "controlled port" and the "uncontrolled port". The controlled port is manipulated by the
802.1X PAE (Port Access Entity) to allow (in the authorized state) or prevent (in the unauthorized
state) network traffic ingress and egress to/from the controlled port. The uncontrolled port is used
by the 802.1X PAE to transmit and receive EAPOL frames.
PAP
Password Authentication Protocol (PAP) is a password-based authentication protocol used by Point
to Point Protocol (PPP) to validate users. PAP stops working after establishing the authentication;
thus, it can lead to attacks on the network.
PBB
Provider backbone bridging (PBB) extends Layer 2 Ethernet switching to provide enhanced scal-
ability, quality-of-service (QoS) features, and carrier-class reliability.
PC
Personal Computer
PCB
Provider Core Bridge (PCB) or S-VLAN Bridge; PCB integrates only one S-VLAN component. It is
capable of providing single service on a port.
PDU
A Protocol Data Unit (PDU) is a single unit of information transmitted among peer entities of a
computer network. A PDU is composed of protocol-specific control information and user data.
P/E
Program/Erase (P/E). Writing a byte to flash memory involves two steps: Program and Erase (P/E).
P/E cycles can serve as a criterion for quantifying the endurance of a flash storage device.
PEB
Provider Edge Bridge (PEB); Provider Edge Bridge integrates one S-VLAN component with zero or
many C-VLAN components as well as integrates each C-VLAN (up to 4094 C-VLANs) individually with
a different S-VLAN (up to 4094 S-VLANs).
PEM
PEM (originally “Privacy Enhanced Mail”) is the most common format for X.509 certificates, CSRs,
and cryptographic keys. A PEM file is a text file containing one or more items in Base64 ASCII
encoding, each with plain-text headers and footers (e.g. -----BEGIN CERTIFICATE----- and -----END
CERTIFICATE-----). A single PEM file could contain an end-entity certificate, a private key, or multiple
certificates forming a complete chain of trust. Most certificate files downloaded from SSL.com will
be in PEM format
xxi
PEP
Provider Edge Port (PEP). The Customer Edge Port and each Provider Edge Port are treated as sepa-
rate Bridge Ports by the spanning tree protocol. If the C-VLAN component connects to the S-VLAN
component with a single Provider Edge Port, and the associated service instance supports no more
than two customer interfaces, then all frames (including Spanning Tree BPDUs) addressed to the
Bridge Group Address may be relayed between the two Ports of the C-VLAN component without
modification. Otherwise, the Spanning Tree Protocol Entity shall execute the Rapid Spanning Tree
Protocol (RSTP, Clause 17 of IEEE Std 802.1D), as modified by the provisions of this subclause.
PFS
Perfect Forward Secrecy (PFS) means that a piece of an encryption system automatically and
frequently changes the keys it uses to encrypt and decrypt information, such that if the latest key
is compromised, it exposes only a small portion of the user’s sensitive data.
If PFS is specified in the IPSec policy, a new Diffie-Hellman exchange is performed with each quick
mode, providing keying material that has greater entropy (key material life) and thereby greater
resistance to cryptographic attacks. Each Diffie-Hellman exchange requires large exponentiations,
thereby increasing CPU use and exacting a performance cost.
PHB
PHB (Per Hop Behavior) is a term used in differentiated services (DiffServ) or multiprotocol label
switching (MPLS). It defines the policy and priority applied to a packet when traversing a hop (such
as a router) in a DiffServ network.
PHY
A PHY, an abbreviation for "physical layer", is an electronic circuit, usually implemented as an inte-
grated circuit, required to implement physical layer functions of the OSI model in a network inter-
face controller. A PHY connects a link layer device (often called MAC as an acronym for medium
access control) to a physical medium such as an optical fiber or copper cable. A PHY device typically
includes both physical coding sublayer (PCS) and physical medium dependent (PMD) layer function-
ality. PHY may also be used as a suffix to form a short name referencing a specific physical layer
protocol, for example M-PHY.
PIM
Protocol-Independent Multicast (PIM) is a family of multicast routing protocols for Internet
Protocol (IP) networks that provide one-to-many and many-to-many distribution of data over a
LAN, WAN or the Internet. It is termed protocol-independent because PIM does not include its own
topology discovery mechanism, but instead uses routing information supplied by other routing
protocols. PIM is not dependent on a specific unicast routing protocol; it can make use of any
unicast routing protocol in use on the network. PIM does not build its own routing tables. PIM uses
the unicast routing table for reverse-path forwarding.
There are four variants of PIM:
• PIM Sparse Mode (PIM-SM) explicitly builds unidirectional shared trees rooted at a rendezvous
point (RP) per group, and optionally creates shortest-path trees per source. PIM-SM generally
scales fairly well for wide-area usage.
• PIM Dense Mode (PIM-DM) uses dense multicast routing. It implicitly builds shortest-path trees by
flooding multicast traffic domain wide, and then pruning back branches of the tree where no
receivers are present. PIM-DM is straightforward to implement but generally has poor scaling prop-
xxii
erties. The first multicast routing protocol, DVMRP used dense-mode multicast routing. See the
PIM Internet Standard RFC 3973.
• Bidirectional PIM (Bidir-PIM) explicitly builds shared bi-directional trees. It never builds a shortest
path tree, so may have longer end-to-end delays than PIM-SM, but scales well because it needs no
source-specific state. See Bidirectional PIM Internet Standard RFC 5015, 70–73 .
• PIM Source-Specific Multicast (PIM-SSM) builds trees that are rooted in just one source, offering a
more secure and scalable model for a limited number of applications (mostly broadcasting of
content). In SSM, an IP datagram is transmitted by a source S to an SSM destination address G, and
receivers can receive this datagram by subscribing to channel (S,G). See informational RFC 3569
Bidirectional (Bidir) PIM
Bidirectional PIM (Bidir-PIM) explicitly builds shared bi-directional trees. It never builds a shortest
path tree, so may have longer end-to-end delays than PIM-SM, but scales well because it needs no
source-specific state. See Bidirectional PIM Internet Standard RFC 5015, 70–73.
PIM-DM
Protocol-Independent Multicast Dense Mode PIM-DM) uses dense multicast routing. It implicitly
builds shortest-path trees by flooding multicast traffic domain wide, and then pruning back
branches of the tree where no receivers are present. PIM-DM is straightforward to implement but
generally has poor scaling properties.
PIM-SM
Protocol-Independent Multicast Sparse Mode (PIM-SM) explicitly builds unidirectional shared trees
rooted at a rendezvous point (RP) per group, and optionally creates shortest-path trees per source.
PIM-SM generally scales fairly well for wide-area usage.
PING
Packet INternet Groper (PING or Ping)
PIP
Provider Instance Port (PIP)
PIR
Peak Information Rate (PIR) is a burstable rate set on routers and/or switches that allows
throughput overhead. Related to committed information rate (CIR) which is a committed rate
speed guaranteed/capped.
PMBR
PIM Multicast Border Router (PMBR)
PMTU
Path Maximum Transmission Unit (PMTU)
PNAC
Port Based Network Access Control (PNAC), or 802.1X, authentication requires a client, an authen-
ticator, and an authentication server. The client is a device that wants to connect to the network.
PNP
Provider Network Ports (PNP)
xxiii
PoE
Power over Ethernet (PoE) is distributing power over an Ethernet network. Because the power and
signal are on the same cable, PoE enables remote network devices such as ceiling-mounted access
points, surveillance cameras and LED lighting to be installed far away from AC power sources.
PPP
• Point-to-Point Protocol (PPP); The user or machine sends a request to a Network Access Server
(NAS) to gain access to a particular network resource using access credentials. The credentials are
passed to the NAS device via the data link layer (L2) protocol—for example, Point-to-Point Protocol
(PPP) in the case of many dial up or DSL providers or posted in an HTTPS secure web form.
• Protocol Packet Processing (PPP)
PPVID
Port and Protocol VLAN ID (PPVID)
PRP
Parallel Redundancy Protocol (PRP) is a network protocol standard for Ethernet that provides
seamless failover against failure of any network component. This redundancy is invisible to the
application.PRP nodes have two ports and are attached to two separated networks of similar
topology. This is in contrast to the companion standard HSR (IEC 62439-3 Clause 5), with which PRP
shares the operating principle.
PS
Power Supply
PTP
Precision Timing Protocol
PVID
Port VLAN ID (PVID)
PVLAN
Private VLAN (PVLAN); Private VLAN, also known as port isolation, is a technique in computer
networking where a VLAN contains switch ports that are restricted such that they can only commu-
nicate with a given uplink. The restricted ports are called private ports
PVRST
Per VLAN Rapid Spanning-Tree
PVRSTP
Per VLAN Rapid Spanning-Tree Protocol
PW
An Ethernet pseudowire (PW) is used to carry Ethernet/802.3 Protocol Data Units (PDUs) over an
MPLS network. See RFC 4448 for details.
Q-in-Q
802.1Q tunneling (Q-in-Q) is a technique often used by Ethernet providers as a layer 2 VPN for
customers. During 802.1Q (or dot1q) tunneling, the provider will put an 802.1Q tag on all the
frames that it receives from a customer with a unique VLAN tag. By using a different VLAN tag for
each customer we can separate the traffic from different customers and also transparently transfer
it throughout the service provider network.
xxiv
QoS
Quality of Service (QoS) refers to traffic prioritization and resource reservation control mechanisms
rather than the achieved service quality. QoS defines the ability to provide different priorities to
different applications, users, or data flows or the ability to guarantee a certain level of performance
to a data flow.
QRV
Querier’s Robustness Variable (QRV).
RADIUS
Remote Authentication Dial-In User Service
RAM
Random-access memory (RAM) is a form of computer memory that can be read and changed in any
order, and typically is used to store working data and machine code.
RARP
The Reverse Address Resolution Protocol (RARP) is an obsolete computer communication protocol
used by a client computer to request its Internet Protocol (IPv4) address from a computer network,
when all it has available is its link layer or hardware address, such as a MAC address.
RBAC
Role Based Authentication (RBAC)
RED
1) Random early detection (RED) is where a single queue may have several different sets of queue
thresholds.
2) Redundant interface (RED) or Red (e.g. RED 1 or RED 2).
RFD
A flapping route is an unstable route that is advertised and withdrawn over and over again. Every
time a flap occurs, a BGP UPDATE message is sent. When routers have to process many BGP
UPDATE messages, their CPU load increases.
BGP route dampening can be used to prevent installing flapping BGP routes and forwarding them
to other BGP routers. This decreases the CPU load of routers and increases network stability. Nowa-
days, routers are powerful enough to process BGP updates so dampening isn’t considered a best
practice anymore
RFP has 5 attributes - the default values are shown
• Penalty
• Suppress-Limit - 2000
• Half-Life - 900 secs
• Reuse limit - 750
• Maximum Suppress-Limit -3600 secs (60 min)
When the route exceeds the suppress limit, the route is dampened.Once the route is dampened,
the router won’t install the route in the routing table nor advertise it to other BGP neighbor.
If for example the penalty is 4000 and the half-life time is 15 minutes. After 15 minutes the penalty
will be 2000, after another 15 minutes, the penalty is 1000, and after another 15 minute, the
penalty is 500. Once the penalty is below the reuse limit of 750, the route can be used again and
xxv
advertised to other BGP routers. When the penalty is below 50% of the reuse limit, the penalty is
removed from the route.
The maximum suppress limit ensures that a route won’t be dampened forever. The maximum
suppress time is 3600 secs or 60 minutes by default.
RFL
Route Reflector Client (RFL); The route reflector allows all IBGP speakers within your autonomous
network to learn about the available routes without introducing loops
RIB
Routing Information Base (RIB); Routing and routing functions in enterprise and carrier networks
are typically performed by network devices (routers and switches) using an RIB. Protocols and
configuration push data into the RIB and the RIB manager installs state into the hardware for packet
forwarding.
RIP
RIP (Routing Information Protocol) sends routing-update messages at regular intervals and when
the network topology changes. When a router receives a routing update that includes changes to
an entry, it updates its routing table to reflect the new route. The metric value for the path is
increased by 1, and the sender is indicated as the next hop. RIP routers maintain only the best route
(the route with the lowest metric value) to a destination. After updating its routing table, the router
immediately begins transmitting routing updates to inform other network routers about the
change. These updates are sent independently of the regularly scheduled updates that RIP routers
send. RIP uses a hop count as a way to determine network distance. Each host with a router in the
network uses the routing table information to determine the next host to route a packet for a spec-
ified destination.
RMON
Remote network monitoring (RMON) is the process of monitoring network traffic on a remote
Ethernet segment for detectingnetwork issues such as dropped packets, network collisions, and
traffic congestion
RP
Rendezvous point (RP)
RPF
RPF stands for Reverse Path Forwarding. PIM uses reverse-path forwarding (RPF) to prevent multi-
cast routing loops by leveraging the unicast routing table on the virtual router. When the virtual
router receives a multicast packet, it looks up the source of the multicast packet in its unicast
routing table to see if the outgoing interface associated with that source IP address is the interface
on which that packet arrived. If the interfaces match, the virtual router duplicates the packet and
forwards it out the interfaces toward the multicast receivers in the group. If the interfaces don’t
match, the virtual router drops the packet. This is called a RPF failure.
RPT
Root Part Tree (RPT)
RRD
Route Redistribution (RRD)
xxvi
RSVP
Resource Reservation Protocol (RSVP) is a transport layer protocol designed to reserve resources
across a network using the integrated services model. RSVP operates over an IPv4 or IPv6 and
provides receiver-initiated setup of resource reservations for multicast or unicast data flows.
RS-232
RS-232 is a short range connection between a single host and a single device (such as a PC to a
modem) or another host (such as a PC to another PC). The standard uses a single TX line, a single
RX line, numerous modem handshaking lines and a ground line with the option of DB9 and DB25
connectors. A minimal 3-wire RS-232 connection consists only the TX, RX, and ground lines, but if
flow control is required a minimal 5-wire RS-232 is used adding the RTS and CTS lines. The RS-232
standard has been commonly used in computer serial ports and is still widely used in industrial
communication devices.
RS-422
RS-422 was meant as a replacement for RS-232 as it offered much higher speeds, better immunity
to noise and allow for longer cable lengths making it better suited to industrial environments. The
standard uses the same signals as the RS-232 standard, but used differential twisted pair so
requires double the number of wires as RS-232. Connectors are not specified in the standard so
block or DB connectors are commonly used. RS-422 cannot implement a true multi-point commu-
nications network since there can be only one driver on each pair of wires. However, one driver can
fan-out to up to ten receivers.
RS-485
RS-485 standard addresses some short coming of the RS-422 standard. The standard supports inex-
pensive local networks and multidrop communication links, using the same differential signalling
over twisted pairs as RS-422. The main difference being that in RS-485 drivers use three-state logic
allowing the individual transmitters to deactivate while not transmitting, while RS-422 the trans-
mitter is always active therefore holding the differential lines. Up to 32 devices can be connected,
but with repeaters a network with up to 256 devices can be achieved. RS-485 can be used in a
full-duplex 4-wire mode or half-duplex 2-wire mode. With long wires and high baud-rates it is
recommended that termination resistors are used at the far ends of the network for signal integrity
RST
RST stands for reset. RST is one of the TCP flags.
TCP flags are various types of flag bits present in the TCP header. Each of them has its own signifi-
cance. They initiate connections, carry data, and tear down connections. The commonly used TCP
flags are SYN, ACK, RST, FIN, URG, PSH.
• SYN (synchronize): Packets that are used to initiate a connection.
• ACK (acknowledgment): Packets that are used to confirm that the data packets have been received,
also used to confirm the initiation request and tear down requests.
• RST (reset): Signify the connection is down or maybe the service is not accepting the requests.
• FIN (finish): Indicate that the connection is being torn down. Both the sender and receiver send the
FIN packets to gracefully terminate the connection.
• PSH (push): Indicate that the incoming data should be passed on directly to the application instead
of getting buffered.
• URG (urgent): Indicate that the data that the packet is carrying should be processed immediately
by the TCP stack.
xxvii
RSTP
Rapid Spanning-Tree Protocol
RT
Route Target (RT) value; RT can be used to share routes among them. We can apply route targets
to a VRF to control the import and export of routes among it and other VRFs. When you configure
RT import, it imports all prefixes that match the configured RT value as one of the attributes in the
BGP update. So in any-any VRF, it is common to see all PE configured with same RT value
RTM
Routing Table Manager (RTM). The RTM is the central repository of routing information for all
routing protocols that operate under the routing and remote access service (RRAS). It provides
routing information to all interested clients, such as routing protocols, management programs, and
monitoring programs. The RTM also determines the best route to each destination network that is
known to the routing protocols. The determination of this route is based on routing protocol prior-
ities and on the metrics associated with the routes.
RTS
Request to Send (RTS)/CTS Flow Control is another flow control mechanism that is part of the RS232
standard.
RX
Receive
SA
Security Associations (SA). A SA is a relationship between two or more entities that describes how
the entities will utilize security services to communicate securely. In endpoint-to-endpoint Trans-
port Mode, both end points of the IP connection implement IPSec.
SAN
Singly attached nodes (SAN); singly attached nodes don't have the same redundancy as the doubly
attached nodes since they still have just one connection that could fail.
SEM
State Event Machines (SEM)
SFP
SFP (Small Form-factor Pluggable) is a small transceiver that plugs into the SFP port of a network
switch and connects to fibre channel and gigabit Ethernet (GbE) optical fiber cables at the other
end. The SFP converts the serial electrical signals to serial optical signals and vice versa. SFP
modules are hot swappable and contain ID and system information for the switch.
SFTP
SSH File Transfer Protocol (SFTP)
SHA
Secure Hash Algorithm is the name of a series of hash algorithms.
A hash function provides encryption using an algorithm and no key. A variable-length plaintext is
“hashed” into a (typically) fixed-length hash value (often called a “message digest” or simply a
“hash”). Hash functions are primarily used to provide integrity; the hash of a plaintext changes, the
plaintext itself has changed.
Common older hash functions include Secure Hash Algorithm 1 (SHA-1), which creates a 160-bit
hash and Message Digest 5 (MD5), which creates a 128-bit hash.
xxviii
SIP
Session Initiation Protocol (SIP) is mostly well known for establishing voice and video calls over the
Internet. To initiate such sessions, SIP uses simple request and response messages. For example,
the INVITE request message is used to invite a user to begin a session and ACK confirms the user
has received the request. The response code 180 (Ringing) means the user is being alerted of the
call and 200 (OK) indicates the request was successful. Once a session has been established, BYE is
used to end the communication.
SISP
Switch Instance Shared Port (SISP)
SLA
Service-level agreements (SLA).
SLIP
Serial Line Internet Protocol (SLIP); SLIP is the predecessor protocol of Point-to-Point Protocol
(PPP). SLIP does not provide authentication, is a static IP addressing assignment, and data is trans-
ferred in synchronous form.
SM
State Machine
SNAT
Static Network Address Translation (SAT, SNAT) performs one-to-one translation of internal IP
addresses to external ones.
SNMP
Simple Network Management Protocol
SNTP
Simple Network Time Protocol (SNTP)
SPT
Shortest path tree (SPT) is used for multicast transmission of packets with the shortest path from
sender to recipients.
SR
State Refresh (SR) message. For a given (S,G) tree, SR messages will be originated by all routers that
use an interface directly connected to the source as the RPF interface for the source. Ref: IETF
“State Refresh in PIM-DM”
SRM
State Refresh Message (SRM). For a given (S,G) tree, SRM will be originated byall routers that use
an interface directly connected to the source as the RPF interface for the source. Ref: IETF “State
Refresh in PIM-DM”
SSD
SSD (Solid State Drive) is an all-electronic, non-volatile random access storage drive.
SSH
(Secure SHell) is a security protocol for logging into a remote server. SSH provides an encrypted
session for transferring files and executing server programs on all platforms. Also serving as a
secure client/server connection for applications such as database access and email, SSH supports a
variety of authentication methods.
xxix
SSL
Secure Sockets Layer
SSM
Source-Specific Multicast (SSM)
SST
Single Spanning Tree (SST); SST is formed in either of the following situations:
• A switch running STP or RSTP belongs to only one spanning tree.
• An MST region has only one switch.
STP
Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specifica-
tion for STP is IEEE 802.1D. The main purpose of STP is provide path redundancy while preventing
undesirable loops in the network.
SVL
Shared VLAN Learning (SVL)
S-VLAN
Stacked VLAN (S-VLAN)
TAC
Taxonomy Access Control (TAC) allows the user administrator to control access to nodes indirectly
by controlling which roles can access which categories.
TACACS
Terminal Access Controller Access-Control System
TAI
International Atomic Time (TAI); if the port is in the master state, the local clock is synchronized to
an external source of time traceable to TAI (International Atomic Time) and UTC (Universal Coordi-
nated Time) such as GPS (Global Positioning System) system.
TB
Token Bucket (TB). The TB algorithm is based on an analogy of a fixed capacity bucket into which
tokens, normally representing a unit of bytes or a single packet of predetermined size, are added
at a fixed rate. When a packet is to be checked for conformance to the defined limits, the bucket is
inspected to see if it contains sufficient tokens at that time. If so, the appropriate number of tokens,
e.g. equivalent to the length of the packet in bytes, are removed ("cashed in"), and the packet is
passed, e.g., for transmission. The packet does not conform if there are insufficient tokens in the
bucket, and the contents of the bucket are not changed.
TC
TC (Topology Change); once the Root Bridge is aware of a change in the topology of the network, it
sets the Topology Change (TC) flag on the sent BPDs.
TCN
TCN (Topology Change Notification), a kind of BPDU, is sent by bridges towards the root bridge to
notify changes in the topology, such as port up or port down.
TCP
Transmission Control Protocol
xxx
TCP-AO
TCP-AO MKT (Transmission Control Protocol Authentication Option). TCP-AO uses cryptographic
algorithms to convert MKTs, which can be shared across connections, into unique traffic keys for
each connection.
TCP-AO MKT
TCP-AO MKT (Transmission Control Protocol Authentication Option Master Key Tuple). TCP-AO
uses cryptographic algorithms to convert MKTs, which can be shared across connections, into
unique traffic keys for each connection.
TFTP
Trivial File Transfer Protocol
TLS
Transport Layer Security (TLS), the successor of the now-deprecated Secure Sockets Layer (SSL), is
a cryptographic protocol designed to provide communications security over a computer network.
TLV
type, length, and value (TLV) traces
TN
Telnet (TN) is a networking protocol and software program used to access remote computers and
terminals over the Internet or a TCP/IP computer network. Upon providing correct login and sign-in
credentials, a user may access a remote system's privileged functionality. Telnet sends all messages
in clear text and has no specific security mechanisms.
TOS
Type of Service (TOS). IP packets have a field called the Type of Service field (also known as the TOS
byte).
TPID
Tag Protocol Identifier (TPID)
xxxi
TTL
TTL (time to live). Under IP, TTL is an 8-bit field. In the IPv4 header, TTL is the 9th octet of 20. In the
IPv6 header, it is the 8th octet of 40. The maximum TTL value is 255, the maximum value of a single
octet. A recommended initial value is 64.
TX
Transmit
UAP
Uplink Access Port (UAP); when a tagged LLDP is enabled, the LLDP packets with destination
address as 'nearest bridge address (01-80-c2-00-00-0E)' will be replicated for all S-Channels
emulated over that UAP.
UART
UART (Universal Asynchronous Transmitter Receiver) is the most common protocol used for
full-duplex serial communication.It is a single LSI (large scale integration) chip designed to perform
asynchronous communication. This device sends and receives data from one system to another
system.
UDP
User Datagram Protocol
UFD
Uplink failure detection (UFD)
URM
Unified Route Map (URM)
USM
USM stands for User based Security Model; USM (User based Security Model) and VACM
(View-based Access Control Model) are the main features added as a part of the SNMPv3 specifica-
tion. USM provides both encryption and authentication of the SNMP PDUs, while VACM specifies a
mechanism for defining access policies for different users with different MIB trees.
UTC
Coordinated Universal Time (UTC); If the port is in the master state, the local clock is synchronized
to an external source of time traceable to TAI (International Atomic Time) and UTC (Universal Coor-
dinated Time) such as GPS (Global Positioning System) system.
UTP
Unshielded Twisted Pair (UTP) is a pair of wires that are twisted around each other to minimize
interference. Ethernet cables are common example of UTP wires.
UUID
A Universally Unique IDentifier (UUID) is a 128-bit domain UUID unique to a MRP domain/ring. All
MRP instances belonging to the same ring must have the same domain ID.
VACM
VACM stands for View-based Access Control Model); USM (User based Security Model) and VACM
(View-based Access Control Model) are the main features added as a part of the SNMPv3 specifica-
tion. USM provides both encryption and authentication of the SNMP PDUs, while VACM specifies a
mechanism for defining access policies for different users with different MIB trees.
xxxii
Varbind
A Variable Binding (Varbind) represents a set of Oid/Value pairs. Individual Variable Bindings are
stored in the Vb class. Individual Variable Bindings are stored in the Vb class.
Create a variable binding and add the Object identifier in string format:
Vb vb = new Vb("1.3.6.1.2.1.1.1.0")
Create a variable binding and add the Object identifier in Oid format:
Oid oid = new Oid("1.3.6.1.2.1.1.1.0");
Vb vb = new Vb(oid);
VFI
Virtual Forwarding Interface (VFI)
VID
Management VLAN ID (VID)
VINES
Virtual Integrated Network Service (VINES)
VLAN
Virtual Local Area Network (VLAN) is a logical subgroup within a local area network that is created
via software rather than manually moving cables in the wiring closet.
VPN
Virtual Private Network (VPN)
VRF
Virtual Routing and Forwarding (VRF). In IP-based computer networks, VRF is a technology that
allows multiple instances of a routing table to co-exist within the same router at the same time.
One or more logical or physical interfaces may have a VRF and these VRFs do not share routes;
therefore, the packets are only forwarded between interfaces on the same VRF. VRFs are the
TCP/IP layer 3 equivalent of a VLAN. Because the routing instances are independent, the same or
overlapping IP addresses can be used without conflicting with each other.
VRRP
VRRP (Virtual Router Redundancy Protocol) is an election protocol that dynamically assigns respon-
sibility for one or more virtual router(s) to the VRRP router(s) on a LAN, allowing several routers on
a multi-access link to utilize the same virtual IP address. A VRRP router is configured to run the VRRP
protocol in conjunction with one or more other routers attached to a LAN. In a VRRP setup, one
router is elected as the virtual router master, and the other routers are acting as backups in case of
the failure of the virtual router master. VRRP is designed to eliminate the single point of failure
inherent in the static default routed environment
VSA
Vendor Specific Attribute (VSA)
WAN
A wide area network is a telecommunications network that extends over a large geographic area
for the primary purpose of computer networking.
Web UI
Web User Interface (Web UI) is a control panel in a device presented to the user via the Web
browser. Network devices such as gateways, routers, and switches typically have such control panel
xxxiii
that is accessed by entering the IP address of the device into a Web browser in a computer on the
same local network.
WINS
Windows Internet Naming Service (WINS)
WRED
WRED (Weighted Random Early Detection) is a queueing discipline for a network scheduler suited
for congestion avoidance. It is an extension to random early detection (RED) where a single queue
may have several different sets of queue thresholds.
WRR
Weighted Round Robin (WRR) is one of the scheduling algorithms used by the device. In WRR, there
is a number of queues and to every queue is assigned weight (w). In a classical WRR, the scheduler
cycles over the queues, and when a queue with weight w is visited, the scheduler can send conse-
quently a burst of up to w packets. This works well for packets with the same size.
XNS
Xerox Network Systems (XNS)
xxxiv
Index
C P
clear screen 15 Preemptive-raw 1139
configure terminal 15 Priviliged Exec Mode 1138
D R
Direction Mode 1141 Raw 1141
Raw Socket 1139
G Role Mode 1142
Global Configuration Mode 1138
S
H Serial Interface Configuration Mode 1138
help 14 Serial Profile Mode 1139
L T
listuser TPID 663
admin 16 Transport Protocol TCP Mode 1140
guest 16 Transport Protocol UDP Mode 1141
root 16
lock 16 U
User Exec Mode 1138
M user-defined 663
Modbus 1140 TPID 663
Modbus Client 1142 username 17
Modbus Server 1142
MRP
Alarms supported in MRP 443
Failure Detection
Ring Open 442
MRM condition/detected 444
MRP status change 444
Normal Operation
Ring Closed 441