Dell PowerConnect 3524 Cli Reference Manual

Dell PowerConnect 3524 Cli Reference Manual

Command line interface guide
Hide thumbs Also See for PowerConnect 3524:
Table of Contents

Advertisement

Dell™ PowerConnect™ 3500 Series

CLI Reference Guide

w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

Advertisement

Table of Contents
loading

Summary of Contents for Dell PowerConnect 3524

  • Page 1: Cli Reference Guide

    Dell™ PowerConnect™ 3500 Series CLI Reference Guide w w w . d e l l . c o m | s u p p o r t . d e l l . c o m...
  • Page 2: Notes And Cautions

    Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, and PowerConnect are trademarks of Dell Inc. Microsoft, Windows, and Windows Server are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries.
  • Page 3: Table Of Contents

    Contents Notes and Cautions ....... . Using the CLI ....... . . CLI Command Modes .
  • Page 4 GVRP Commands ....... . . IGMP Snooping Commands ......IP Addressing Commands .
  • Page 5 Web Server Commands ......802.1x Commands ....... . Command Modes .
  • Page 6 username ........ACL Commands .
  • Page 7 show bridge address-table ......show bridge address-table static ..... . . show bridge address-table count .
  • Page 8 show sntp configuration ......show sntp status ....... . Configuration and Image Files .
  • Page 9 10 Ethernet Configuration Commands ....interface ethernet ....... interface range ethernet .
  • Page 10 gvrp vlan-creation-forbid ......gvrp registration-forbid ......clear gvrp statistics .
  • Page 11 clear arp-cache ....... . show arp ........ip domain-lookup .
  • Page 12 show ipv6 neighbors ......clear ipv6 neighbors ......15 LACP Commands .
  • Page 13 show management access-class ..... . . 18 LLDP Commands ......lldp enable (global) .
  • Page 14 motd-banner ........show banner ........20 PHY Diagnostics Commands .
  • Page 15 24 QoS Commands ..............show qos .
  • Page 16 show rmon collection history ......show rmon history ....... rmon alarm .
  • Page 17 show snmp groups ....... show snmp filters ....... show snmp users .
  • Page 18 show (mst) ........exit (mst) ........abort (mst) .
  • Page 19 clear logging file ....... . aaa logging ........file-system logging .
  • Page 20 32 TACACS+ Commands ......tacacs-server host ....... tacacs-server key .
  • Page 21 tunnel isatap query-interval ......tunnel isatap solicitation-interval ..... . . tunnel isatap robustness .
  • Page 22 switchport general allowed vlan ..... . . switchport general pvid ......switchport general ingress-filtering disable .
  • Page 23 38 Web Server ....... . . ip http server ........ip http port .
  • Page 24 dot1x send-async-request-id ......show dot1x ........show dot1x users .
  • Page 25: Using The Cli

    Using the CLI This chapter describes how to start using the CLI and describes the command editing features to assist in using the CLI. CLI Command Modes Introduction To assist in configuring the device, the Command Line Interface (CLI) is divided into different command modes.
  • Page 26: User Exec Mode

    When starting a session, the initial mode is the User EXEC mode. Only a limited subset of commands are available in the User EXEC mode. This level is reserved for tasks that do not change the configuration. To enter the next level, the Privileged EXEC mode, a password is required. The Privileged EXEC mode gives access to commands that are restricted on User EXEC mode and provides access to the device Configuration mode.
  • Page 27: Privileged Exec Mode

    The default host name is Console unless it was changed using the hostname command in the Global Configuration mode. Privileged EXEC Mode Privileged access is password protected to prevent unauthorized use because, many of the privileged commands set operating system parameters. The password is not displayed on the screen and is case sensitive.
  • Page 28: Interface Configuration Mode And Specific Configuration Modes

    To enter the Global Configuration mode, at the Privileged EXEC mode prompt enter the command configure and press <Enter>. The Global Configuration mode prompt is displayed. The Global Configuration mode prompt consists of the device host name followed by (config) and #. Console(config)# To return from the Global Configuration mode to the Privileged EXEC mode, the user can use one of the following commands:...
  • Page 29: Starting The Cli

    Pack 2 or later is installed. With Windows 2000 Service Pack 2, the arrow keys function properly in HyperTerminal’s VT100 emulation. Go to www.microsoft.com for information on Windows 2000 service packs. For more information, see Dell™ PowerConnect™ 3500 Series User's Guide. 2 Enter the following commands to begin the configuration procedure: Console>...
  • Page 30: Editing Features

    3 Configure the device and enter the necessary commands to complete the required tasks. 4 When finished, exit the session with the exit command. When a different user is required to log onto the system, use the login Privileged EXEC mode command.
  • Page 31: Setup Wizard

    When copying and pasting commands from a configuration file, make sure that the following conditions exist: • A device Configuration mode has been accessed. • The commands contain no encrypted data, like encrypted passwords or keys. Encrypted data cannot be copied and pasted into the device.
  • Page 32: Command Completion

    Command Completion An appropriate error message displays if the entered command is incomplete or invalid; or has missing or invalid parameters. This assists in entering the correct command. Keyboard Shortcuts The CLI has a range of keyboard shortcuts to assist in editing the CLI commands. The following table describes the CLI shortcuts.
  • Page 33: Command Groups

    Command Groups Introduction The Command Language Interface (CLI) is a network management application operated through an ASCII terminal without the use of a Graphical User Interface (GUI) driven software application. By directly entering commands, you achieve greater configuration flexibility. The CLI is a basic command-line interpreter similar to the UNIX C shell.
  • Page 34 Ethernet Configuration Configures all port configuration options for, example ports, storm control, and auto-negotiation. GVRP Commands Configures and displays GVRP configuration and information. IGMP Snooping Commands Configures IGMP snooping and displays IGMP configuration and IGMP information. IP Addressing Commands Configures and manages IP addresses on the device. IPv6 Addressing Commands Configures and manages IPv6 addresses on the device.
  • Page 35: Aaa Commands

    AAA Commands Command Group Description Access Mode aaa authentication login Defines login authentication. Global Configuration aaa authentication enable Defines authentication method lists for accessing higher Global privilege levels. Configuration login authentication Specifies the login authentication method list for a Line remote telnet or console.
  • Page 36: Address Table Commands

    deny (MAC) Denies traffic if the conditions defined in the deny MAC Access-List statement match Configuration service-acl Sets the default ace action to permit or deny. Interface Configuration show access-lists Applies an ACL to the input interface. Privileged EXEC show interfaces access- Displays ACLs defined on the device.
  • Page 37: Clock Commands Commands

    port security routed Adds MAC-layer secure addresses to a routed port. Interface secure-address Configuration show bridge address-table Displays all entries in the bridge-forwarding Privileged EXEC database. show bridge address-table Displays statically created entries in the bridge- Privileged EXEC static forwarding database. show bridge address-table Displays the number of addresses present in the Privileged EXEC...
  • Page 38: Configuration And Image Files Commands

    sntp broadcast client Enables the Simple Network Time Protocol Global Configuration enable (SNTP) Broadcast clients. sntp anycast client enable Enables Anycast clients. Global Configuration sntp client enable Enables the Simple Network Time Protocol Global Configuration (SNTP) Broadcast and Anycast client on an interface.
  • Page 39: Dhcp Snooping Commands

    show running-config Displays the contents of the currently running Privileged EXEC configuration file. show startup-config Displays the startup configuration file contents. Privileged EXEC show bootvar Displays the active system image file that the device Privileged EXEC loads at startup. DHCP Snooping Commands Command Group Description Access Mode...
  • Page 40: Ethernet Configuration Commands

    Ethernet Configuration Commands Command Group Description Access Mode interface ethernet Enters the interface configuration mode to Global Configuration configure an Ethernet type interface. interface range ethernet Enters the interface configuration mode to Global Configuration configure multiple Ethernet type interfaces. shutdown Disables interfaces.
  • Page 41: Gvrp Commands

    GVRP Commands Command Group Description Mode gvrp enable (Global) Enables GVRP globally. Global Configuration gvrp enable (Interface) Enables GVRP on an interface. Interface Configuration garp timer Adjusts the GARP application join, leave, and leaveall Interface Configuration GARP timer values. gvrp vlan-creation-forbid Enables or disables dynamic VLAN creation.
  • Page 42: Ip Addressing Commands

    IP Addressing Commands Command Group Description Access Mode ip address Sets an IP address. Interface Configuration ip address dhcp Acquires an IP address on an interface from the Interface DHCP server. Configuration ip default-gateway Defines a default gateway (router). Global Configuration show ip interface Displays the usability status of interfaces configured...
  • Page 43: Ipv6 Addressing Commands

    IPv6 Addressing Commands Command Group Description Access Mode ipv6 enable Enables IPv6 processing on an interface. Interface Configuration ipv6 address autoconfig Enables automatic configuration of IPv6 addresses Interface Configuration using stateless autoconfiguration on an interface. ipv6 icmp error-interval Configures the rate limit interval and bucket size Global Configuration parameters for IPv6 ICMP error messages.
  • Page 44: Lacp Commands

    LACP Commands Command Group Description Access Mode lacp system-priority Configures the system LACP priority. Global Configuration lacp port-priority Configures the priority value for physical ports. Interface Configuration lacp timeout Assigns an administrative LACP timeout. Interface Configuration show lacp ethernet Displays LACP information for Ethernet ports. Privileged EXEC show lacp port-channel Displays LACP information for a port-channel.
  • Page 45: Line Commands

    Line Commands Command Group Description Access Mode line Identifies a specific line for configuration and enters Global Configuration the Line Configuration command mode. speed Sets the line baud rate. Line Configuration autobaud Sets the line for automatic baud rate detection. Line Configuration exec-timeout Configures the interval that the system waits until...
  • Page 46: Login Banner Commands

    lldp med network- Attaches a LLDP MED network policy to a port. Interface configuration policy (interface) (Ethernet) lldp med location Interface configuration (Ethernet) clear lldp rx Restarts the LLDP RX state machine and clears the Privileged EXEC neighbors table. show lldp Displays the LLDP configuration.
  • Page 47: Phy Diagnostics Commands

    management access-class Defines which management access-list is used. Global Configuration show management Displays management access-lists. Privileged EXEC access-list show management Displays the active management access-list. Privileged EXEC access-class PHY Diagnostics Commands Command Group Description Access Mode test copper-port tdr Diagnoses with TDR (Time Domain Reflectometry) Privileged EXEC technology the quality and characteristics of a copper cable attached to a port.
  • Page 48: Port Channel Commands

    Port Channel Commands Command Grou p Description Access Mode interface port-channel Enters the interface configuration mode of a specific Global port-channel. Configuration interface range port- Enters the interface configuration mode to Global channel configure multiple port-channels. Configuration channel-group Associates a port with a port-channel. Interface Configuration show interfaces port-...
  • Page 49: Radius Commands

    qos map dscp-queue Modifies the DSCP to CoS map. Global Configuration qos trust (Global) Configures the system to basic mode and the "trust" Global state. Configuration qos trust (Interface) Enables each port trust state. Interface Configuration qos cos Configures the default port CoS value. Interface Configuration show qos map...
  • Page 50: Rmon Commands

    RMON Commands Command Group Description Mode show rmon statistics Displays RMON Ethernet Statistics. User EXEC rmon collection history Enables a Remote Monitoring (RMON) MIB history Interface statistics group on an interface. Configuration show rmon collection Displays the requested history group configuration. User EXEC history show rmon history...
  • Page 51: Spanning Tree Commands

    snmp-server filter Creates and modifies filter entries. Global Configuration snmp-server host Specifies an SNMP notification recipient. Global Configuration snmp-server v3-host Specifies an SNMP v3 notification recipient. Global Configuration snmp-server trap Enables the device to send Simple Network Global authentication Management Protocol traps when authentication Configuration failed.
  • Page 52 spanning-tree port- Configures port priority. Interface Configuration priority spanning-tree portfast Enables PortFast mode. Interface Configuration spanning-tree link-type Overrides the default link-type setting. Interface Configuration spanning-tree pathcost Sets the default path cost method. Global Configuration method spanning-tree bpdu Defines bridge protocol data unit (BPDU) handling Global Configuration when Spanning Tree is disabled on an interface.
  • Page 53: Ssh Commands

    SSH Commands Command Group Description Access Mode ip ssh port Specifies the port to be used by the SSH server. Global Configuration ip ssh server Enables the device to be configured from a SSH Global server. Configuration crypto key generate dsa Generates DSA key pairs.
  • Page 54: System Management Commands

    logging buffered size Changes the number of syslog messages stored in Global the internal buffer. Configuration clear logging Clears messages from the internal logging buffer. Privileged EXEC logging file Limits syslog messages sent to the logging file based Global on severity. Configuration clear logging file Clears messages from the logging file.
  • Page 55: Tacacs Commands

    show sessions Lists the open Telnet sessions. User EXEC show system Displays system information. User EXEC show version Displays the system version information. User EXEC asset-tag Specifies the device asset-tag. Global Configuration show system id Displays the service ID information. User EXEC show cpu utilization Displays information about the CPU utilization of...
  • Page 56: Tunnel Commands

    passwords history hold- Configures the number of days a password is Global time relevant for tracking its password history. Configuration passwords lockout Sets the number of failed login attempts before a Global user account is locked. Configuration aaa login-history file Enables writing to the login history file.
  • Page 57: User Interface Commands

    User Interface Commands Command Group Description Access Mode enable Enters the privileged EXEC mode. User EXEC disable Returns to User EXEC mode. Privileged EXEC login Changes a login username. Priv/User EXEC configure Enables the global configuration mode. Privileged EXEC exit (Configuration) Exits any configuration mode to the next highest mode in the CLI mode hierarchy.
  • Page 58 switchport trunk native Defines the port as a member of the specified VLAN, Interface vlan and the VLAN ID is the "port default VLAN ID Configuration (PVID)". switchport general Adds or removes VLANs from a general port. Interface allowed vlan Configuration switchport general pvid Configures the PVID when the interface is in general...
  • Page 59: Voice Vlan Commands

    Voice VLAN Commands Command Group Description Access Mode voice vlan id Enables voice VLAN and configures voice VLAN ID. Global Configuration voice vlan oui-table Configures the voice OUI table. Global Configuration voice vlan cos Global Configuration voice vlan aging-timeout Sets the voice VLAN aging timeout. Global Configuration voice vlan enable Enables automatic voice VLAN configuration for a...
  • Page 60: 802.1X Commands

    show crypto certificate Displays the SSH certificates of the device. Privileged EXEC mycertificate show ip http Displays the HTTP server configuration. Privileged EXEC show ip https Displays the HTTPS server configuration. Privileged EXEC 802.1x Commands Command Description Access Mode aaa authentication Specifies one or more authentication, authorization, Global Configuration dot1x...
  • Page 61 show dot1x users Displays active 802.1x authenticated users. Privileged EXEC show dot1x statistics Displays 802.1x statistics for the specified interface. Privileged EXEC dot1x auth-not-req Enables unauthorized users access to that VLAN. Interface (VLAN) Configuration dot1x multiple-hosts Allows multiple hosts (clients) on an 802.1x- Interface Configuration authorized port that has the dot1x port-control Interface Configuration mode command set to auto.
  • Page 62 Command Groups...
  • Page 63: Command Modes

    Command Modes GC (Global Configuration) Mode Command Group Description aaa authentication dot1x Specifies one or more authentication, authorization, and accounting (AAA) methods for use on interfaces running IEEE 802.1x. aaa authentication enable Defines authentication method lists for accessing higher privilege levels.
  • Page 64 enable password Sets a local password to control access to normal and privilege levels. Ends the current configuration session and returns to the previous command mode. file-system logging Enables logging file system events. gvrp enable (Global) Enables GVRP globally. hostname Specifies or modifies the device host name.
  • Page 65 ip http authentication Specifies authentication methods for HTTP server users. ip http exec-timeout Enables the device to be configured from a secured browser. ip http port Specifies the TCP port for use by a web browser to configure the device. ip http server Enables the device to be configured from a browser.
  • Page 66 password-aging Sets the expiration time for passwords in the local database. passwords history Sets the number of required password changes before a password in the local database can be reused. passwords history hold-time Sets the number of days a password is relevant for tracking its password history.
  • Page 67 snmp-server contact Sets up a system contact. snmp-server enable traps Enables the device to send SNMP traps or SNMP notifications. snmp-server engineID local Specifies an SNMP EngineID on the local device. snmp-server filter Creates and modifies filter entries. snmp-server group Configures a new SNMP group or a table that maps SNMP users to SNMP views.
  • Page 68: Ic (Interface Configuration) Mode

    spanning-tree bpdu Defines BPDU handling when Spanning Tree is disabled on an interface. spanning-tree forward-time Configures the Spanning Tree bridge forward time. spanning-tree hello-time Configures the Spanning Tree bridge Hello Time. spanning-tree max-age Configures the Spanning Tree bridge maximum age. spanning-tree mode Configures the Spanning Tree protocol.
  • Page 69 description Adds a description to an interface. dot1x guest-vlan Defines a guest VLAN. dot1x guest-vlan enable Enables unauthorized users on the interface to access the guest VLAN. dot1x mac-authentication Enables authentication based on the station’s MAC address. dot1x max-req Sets the maximum number of times that the device sends an EAP - request/identity frame to the client, before restarting the authentication process.
  • Page 70 ip internal-usage-vlan Reserves a VLAN as the internal usage VLAN of an interface. ipv6 default-gateway Defines an IPv6 default gateway. ipv6 mld join-group Configures Multicast Listener Discovery (MLD) reporting for a specified group. ipv6 mld version Changes the Multicast Listener Discovery Protocol (MLD) version. lacp port-priority Configures the priority value for physical ports.
  • Page 71 rmon collection history Enables a Remote Monitoring (RMON) MIB history statistics group on an interface. service-acl Sets the default ace action to permit or deny. show ports monitor Transmits tagged ingress mirrored packets. shutdown Disables interfaces. sntp client enable (Interface) Enables the Simple Network Time Protocol (SNTP) client on an interface.
  • Page 72: Lc (Line Configuration) Mode

    switchport trunk allowed vlan Adds or removes VLANs from a port in general mode. switchport trunk native vlan Defines the port as a member of the specified VLAN, and the VLAN ID is the "port default VLAN ID (PVID)". traffic-shape Sets the shaper on an egress port.
  • Page 73: Ml (Mac Access-List) Mode

    instance (mst) Maps VLANs to the MST instance. name (mst) Defines the configuration name. revision (mst) Defines the configuration revision number. show (mst) Displays the current or pending MST region configuration. ML (MAC Access-List) Mode Command Group Description permit (MAC) Denies traffic if the conditions defined in the permit statement match.
  • Page 74 disable Returns to User EXEC mode. dot1x re-authentication Manually initiates a re-authentication of all 802.1x-enabled ports or the specified 802.1x-enabled port. exit Closes an active terminal session by logging off the device. ip dhcp snooping binding Configures the update frequency of the DHCP snooping binding file. login Changes a login username.
  • Page 75 show dot1x advanced Displays 802.1x enhanced features for the device or for the specified interface. show dot1x statistics Displays 802.1x statistics for the specified interface. show dot1x users Displays 802.1x users for the device. show history Lists the commands entered in the current session. show hosts Displays the default domain name, a list of name server hosts, the static and the cached list of host names and addresses.
  • Page 76: Sp (Ssh Public Key) Mode

    show snmp filters Displays the configuration of SNMP filters. show snmp groups Displays the configuration of SNMP groups. show snmp users Displays the configuration of SNMP users. show snmp views Displays the configuration of SNMP views. show sntp configuration Shows the configuration of the Simple Network Time Protocol (SNTP). show sntp status Shows the status of the Simple Network Time Protocol (SNTP).
  • Page 77 ping Sends ICMP echo request packets to another node on the network. resume Switches to another open Telnet session. show clock Displays the time and date from the system clock. show copper-ports cable-length Displays the estimated copper cable length attached to a port. show copper-ports tdr Displays the last TDR (Time Domain Reflectometry) tests on specified ports.
  • Page 78: Vc (Vlan Configuration) Mode

    show rmon log Displays the RMON logging table. show rmon statistics Displays RMON Ethernet Statistics. show sessions Lists the open Telnet sessions. show stack Displays information about stack status. show system Displays system information. show system id Displays the service id information. show users Displays information about the active users.
  • Page 79: Ipal (Ip-Access List Configuration) Mode

    ip igmp snooping mrouter-time- Configures the mrouter-time-out. ip igmp snooping querier address Defines the source IP address that the IGMP Snooping querier uses. ip igmp snooping querier enable Enables Internet Group Management Protocol (IGMP) querier on a specific VLAN. ip internal-usage-vlan Reserves a VLAN as the internal usage VLAN of an interface.
  • Page 80 Command Modes...
  • Page 81: Aaa Commands

    AAA Commands aaa authentication login The aaa authentication login Global Configuration mode command defines login authentication. Use the no form of this command to return to the default configuration. Syntax • aaa authentication login {default | list-name} method1 [method2...] • no aaa authentication login {default | list-name} •...
  • Page 82: Aaa Authentication Enable

    User Guidelines • The default and optional list names created with the aaa authentication login command are used with the login authentication command. • Create a list by entering the aaa authentication login list-name method command for a particular protocol, where list-name is any character string used to name this list. The method argument identifies the list of methods that the authentication algorithm tries, in the given sequence.
  • Page 83: Login Authentication

    radius Uses the list of all RADIUS servers for authentication. Uses username $enabx$., where x is the privilege level. tacacs Uses the list of all TACACS+ servers for authentication. Uses username "$enabx$." where x is the privilege level. Default Configuration If the default list is not set, only the enable password is checked.
  • Page 84: Enable Authentication

    Syntax • login authentication {default | list-name} • no login authentication • default — Uses the default list created with the aaa authentication login command. • list-name — Uses the indicated list created with the aaa authentication login command. Default Configuration Uses the default set with the command aaa authentication login.
  • Page 85: Ip Http Authentication

    User Guidelines There are no user guidelines for this command. Example The following example specifies the default authentication method when accessing a higher privilege level from a console. Console(config)# line console Console(config-line)# enable authentication default ip http authentication The ip http authentication Global Configuration mode command specifies authentication methods for HTTP server users.
  • Page 86: Ip Https Authentication

    Example The following example configures the HTTP authentication. Console(config)# ip http authentication radius local ip https authentication The ip https authentication Global Configuration mode command specifies authentication methods for HTTPS server users. Use the no form of this command to return to the default configuration. Syntax •...
  • Page 87: Show Authentication Methods

    show authentication methods The show authentication methods Privileged EXEC mode command displays information about the authentication methods. Syntax • show authentication methods Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays the authentication configuration.
  • Page 88: Password

    Line Login Method List Enable Method List -------------- ----------------- ------------------ Console Default Default Telnet Default Default Default Default http : Local https : Local dot1x console# password The password Line Configuration mode command specifies a password on a line. Use the no form of this command to remove the password.
  • Page 89: Enable Password

    enable password The enable password Global Configuration mode command sets a local password to control access to user and privilege levels. Use the no form of this command to remove the password requirement. Syntax • enable password [level level] password [encrypted] no enable password [level level] •...
  • Page 90 Default Configuration No user is defined. Command Mode Global Configuration mode User Guidelines User account can be created without a password. Example The following example configures user bob with password lee and user level 15 to the system. Console(config)# username bob password lee level 15 AAA Commands...
  • Page 91: Acl Commands

    IPv4 ACLs are defined by a unique name. An IPv4 ACL and MAC ACL cannot share the same name. Example The following example shows how to define an IPv4 access list called dell-access-1 and to place the device in IPv4 access list configuration mode. Console(config)# ip access-list dell-access-1...
  • Page 92 Syntax • permit {any| protocol} {any|{source source-wildcard}} {any|{destination destination-wildcard}} [dscp number | ip-precedence number] • permit-icmp {any|{source source-wildcard}} {any|{destination destination-wildcard}} {any|icmp- type} {any|icmp-code} [dscp number | ip-precedence number] • permit-igmp {any|{source source-wildcard}} {any|{destination destination-wildcard}} {any|igmp- type} [dscp number | ip-precedence number] •...
  • Page 93: Deny (Ip)

    source-port — Specifies the UDP/TCP source port. (Range: 1 - 65535) • • source-port-wildcard —Specifies wildcard bits to be applied to the source port by placing 1s in bit positions to be ignored. • flags list-of-flags — Specifies the list of TCP flags. If a flag is set, it is prefixed by "+". If a flag is not set, it is prefixed by "-".
  • Page 94 deny-tcp [disable-port] {any|{ source source-wildcard}} {any|source-port} {any|{destination • destination-wildcard}} {any|destination-port} [dscp number | ip-precedence number] [flags list-of- flags] [src-port-wildcard source-port-wildcard] [dst-port-wildcard source-port-wildcard] • deny-udp [disable-port] {any|{ source source-wildcard}} {any| source-port} {any|{destination destination-wildcard}} {any|destination-port} [dscp number | ip-precedence number] [src-port- wildcard source-port-wildcard] [dst-port-wildcard source-port-wildcard] •...
  • Page 95: Mac Access-List

    Default Configuration No IPv4 access list is defined. Command Mode IP-Access List Configuration mode. User Guidelines • Use the ip access-list Global Configuration mode command to enable the IP-Access List Configuration mode. • Before an Access Control Element (ACE) is added to an ACL, all packets are permitted. After an ACE is added, an implied deny-any-any condition exists at the end of the list and those packets that do not match the defined conditions are denied.
  • Page 96: Permit (Mac)

    Example The following example shows how to create a MAC ACL. Console(config)# mac access-list macl-1 Console(config-mac-al)# permit (MAC) The permit MAC-Access List Configuration mode command sets permit conditions for a MAC access list. Syntax permit {any | { source source-wildcard} any | {destination destination-wildcard}} [vlan vlan-id] [cos •...
  • Page 97: Deny (Mac)

    Example The following example shows how to create a MAC ACL with permit rules. Console(config)# mac access-list macl-acl1 Console(config-mac-al)# permit 06:a6 00:00:00:00:00:00 any vlan 6 deny (MAC) The deny MAC-Access List Configuration mode command denies traffic if the conditions defined in the deny statement match.
  • Page 98: Service-Acl

    Example The following example shows how to create a MAC ACL with rules. Console(config)# mac access-list macl-1 Console (config-mac-acl)# deny 66:66:66:66:66:66 Console(config-mac-acl)# exit Console(config)# service-acl The service-acl Interface (VLAN) Configuration mode command applies an ACL to the input interface. Use the no form of this command to detach an ACL from an input interface. Syntax •...
  • Page 99: Show Access-Lists

    show access-lists The show access-lists Privileged EXEC mode command displays access control lists (ACLs) defined on the device. Syntax • show access-lists [name] name — Name of the ACL. • Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode.
  • Page 100 Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Examples The following example displays an ACLs applied on the device interfaces: console# show access-lists MAC access list macA permit console# show interfaces access-lists Interface Input ACL -------------- ---------------...
  • Page 101: Address Table Commands

    Address Table Commands bridge address The bridge address Interface Configuration (VLAN) mode command adds a MAC-layer station source address to the bridge table. Use the no form of this command to delete the MAC address. Syntax • bridge address mac-address {ethernet interface | port-channel port-channel-number} [permanent | delete-on-reset | delete-on-timeout | secure] •...
  • Page 102: Bridge Multicast Filtering

    Example The following example adds a permanent static MAC-layer station source address 3aa2.64b3.a245 on port 1/e16 to the bridge table. Console(config)# interface vlan 2 Console(config-if)# bridge address 3aa2.64b3.a245 ethernet 1/e16 permanent bridge multicast filtering The bridge multicast filtering Global Configuration mode command enables filtering Multicast addresses.
  • Page 103 Syntax • bridge multicast address {mac-multicast-address | ip-multicast-address} • bridge multicast address {mac-multicast-address | ip-multicast-address} [add | remove] {ethernet interface-list | port-channel port-channel-number-list} • no bridge multicast address {mac-multicast-address | ip-multicast-address} • add — Adds ports to the group. If no option is specified, this is the default option. •...
  • Page 104: Bridge Multicast Forbidden Address

    bridge multicast forbidden address The bridge multicast forbidden address Interface Configuration (VLAN) mode command forbids adding a specific Multicast address to specific ports. Use the no form of this command to return to the default configuration. Syntax • bridge multicast forbidden address {mac-multicast-address | ip-multicast-address} {add | remove} {ethernet interface-list | port-channel port-channel-number-list} •...
  • Page 105: Bridge Multicast Unregistered

    bridge multicast unregistered The bridge multicast unregistered Interface Configuration mode command configures the forwarding state of unregistered multicast addresses. Use the no form of this command to return to default. Syntax • bridge multicast unregistered {forwarding | filtering} • no bridge multicast unregistered •...
  • Page 106: Bridge Multicast Forbidden Forward-All

    Syntax • bridge multicast forward-all {add | remove} {ethernet interface-list | port-channel port-channel- number-list} • no bridge multicast forward-all • add — Force forwarding all Multicast packets. • remove — Do not force forwarding all Multicast packets. • interface-list — Separate non-consecutive Ethernet ports with a comma and no spaces; a hyphen is used to designate a range of ports.
  • Page 107: Bridge Aging-Time

    Syntax • bridge multicast forbidden forward-all {add | remove} {ethernet interface-list | port-channel port- channel-number-list} • no bridge multicast forbidden forward-all • add — Forbids forwarding all Multicast packets. • remove — Does not forbid forwarding all Multicast packets. • interface-list —...
  • Page 108: Clear Bridge

    Default Configuration The default setting is 300 seconds. Command Mode Global Configuration mode. User Guidelines There are no user guidelines for this command. Example The following example sets the bridge aging time to 250. Console(config)# bridge aging-time 250 clear bridge The clear bridge Privileged EXEC mode command removes any learned entries from the forwarding database.
  • Page 109: Port Security

    port security The port security Interface Configuration mode command locks the port, thereby, blocking unknown traffic and preventing the port from learning new addresses. Use the no form of this command to return to the default configuration. Syntax • port security [forward | discard | discard-shutdown] [trap seconds] •...
  • Page 110: Port Security Mode

    port security mode The port security mode Interface Configuration mode command configures the port security mode. Use the no form of this command to return to the default configuration. Syntax • port security mode {lock | max-addresses} • no port security mode •...
  • Page 111: Port Security Routed Secure-Address

    Default Configuration The default setting is 1 address. Command Mode Interface Configuration (Ethernet, port-channel) mode. User Guidelines This command is only relevant in dynamic learning modes. Example The following example sets the maximum number of addresses that are learned on port 1/e7 before it is locked to 20.
  • Page 112: Show Bridge Address-Table

    User Guidelines • The command enables adding secure MAC addresses to a routed port in port security mode. • The command is available when the port is a routed port and in port security mode. The address is deleted if the port exits the security mode or is not a routed port. Example The following example adds the MAC-layer address 66:66:66:66:66:66 to port 1/e1.
  • Page 113: Show Bridge Address-Table Static

    Example The following example displays all classes of entries in the bridge-forwarding database. Console# show bridge address-table Aging time is 300 sec Vlan mac address Port Type --------- -------------- ---- ------- 00:60:70:4C:73:FF 5/e8 dynamic 00:60:70:8C:73:FF 5/e8 dynamic 00:10:0D:48:37:FF 5/e9 static show bridge address-table static The show bridge address-table static Privileged EXEC mode command displays statically created entries in the bridge-forwarding database.
  • Page 114: Show Bridge Address-Table Count

    Example The following example displays all static entries in the bridge-forwarding database. Console# show bridge address-table static Aging time is 300 sec vlan mac address port type ---- ----------------- ---- ----------------- 00:60:70:4C:73:FF 1/e8 Permanent 00:60:70:8C:73:FF 1/e8 delete-on-timeout 00:10:0D:48:37:FF 1/e9 delete-on-reset show bridge address-table count The show bridge address-table count Privileged EXEC mode command displays the number of addresses present in the Forwarding Database.
  • Page 115: Show Bridge Multicast Address-Table

    Example The following example displays the number of addresses present in all VLANs. Console# show bridge address-table count Capacity: 8192 Free: 8083 Used: 109 Secure addresses: 2 Static addresses: 1 Dynamic addresses: 97 Internal addresses: 9 show bridge multicast address-table The show bridge multicast address-table Privileged EXEC mode command displays Multicast MAC address or IP Address Table information.
  • Page 116 Example The following example displays Multicast MAC address and IP Address Table information. Console# show bridge multicast address-table Vlan MAC Address Type Ports ---- -------------- ------- ---------- 01:00:5e:02:02:03 static 1/e1, 2/e2 01:00:5e:02:02:08 static 1/e1-e8 00:00:5e:02:02:08 dynamic 1/e9-e11 Forbidden ports for Multicast addresses: Vlan MAC Address Ports...
  • Page 117: Show Bridge Multicast Filtering

    show bridge multicast filtering The show bridge multicast filtering Privileged EXEC mode command displays the Multicast filtering configuration. Syntax • show bridge multicast filtering vlan-id vlan_id — A valid VLAN ID value. • Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode.
  • Page 118: Show Bridge Multicast Address-Table Static

    show bridge multicast address-table static The show bridge multicast address-table static Privileged EXEC mode command displays the statically configured multicast addresses. Syntax • show bridge multicast address-table static [vlan vlan-id] [address mac-multicast-address | ip-multicast- address] [source ip-address] • vlan-id — Indicates the VLAN ID. This has to be a valid VLAN ID value. •...
  • Page 119: Show Bridge Multicast Filtering

    IPv4-GROUP Table Vlan IP/MAC Address Type Ports ---- ----------------- ------ --------- 231.2.2.3 dynamic 1/e1, 2/e2 231.2.2.8 static 1/e1-e8 231.2.2.8 dynamic 1-9-11 Forbidden ports for multicast addresses: Vlan MAC Address Ports ---- -------------- ----- 231.2.2.3 231.2.2.8 IPv4-SRC-GROUP Table: Vlan Group Address Source Type Ports Address...
  • Page 120: Show Ports Security

    Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays the Multicast configuration for VLAN 1. Console# show bridge multicast filtering 1 Filtering: Enabled VLAN: 1 Port Forward-Unregistered Forward-All Static Status Static Status...
  • Page 121 User Guidelines There are no user guidelines for this command. Example The following example displays all classes of entries in the port-lock status. Console # show ports security Port Status Learning Action Maximum Trap Frequenc ----- ------- ------- ------- -------- -------- 1/e1 Disabled...
  • Page 122: Show Ports Security Addresses

    1/e18 Disabled Lock 1/e19 Disabled Lock 1/e20 Disabled Lock 1/e21 Disabled Lock 1/e22 Disabled Lock Frequency: Minimum time in seconds between consecutive traps Counter: Number of actions since last trap show ports security addresses The show ports security addresses Privileged EXEC mode command displays the current dynamic addresses in locked ports.
  • Page 123 Example The following example displays dynamic addresses in currently locked ports. Console# show ports security addresses Port Status Learning Current Maximum ---- -------- -------- ------- ------- 1/e1 Disabled Lock 1/e2 Disabled Lock 1/e3 Enabled Max-addresses 1/e4 Port is a member in port-channel ch1 1/e5 Disabled Lock...
  • Page 124 Address Table Commands...
  • Page 125: Clock

    Clock clock set The clock set Privileged EXEC mode command manually sets the system clock. Syntax • clock set hh:mm:ss day month year • clock set hh:mm:ss month day year hh:mm:ss — Current time in hours (military format), minutes, and seconds (hh: 0 - 23, mm: 0 •...
  • Page 126: Clock Source

    clock source The clock source Global Configuration mode command configures an external time source for the system clock. Use no form of this command to disable external time source. Syntax • clock source {sntp} • no clock source • sntp — SNTP servers Default Configuration No external clock source.
  • Page 127: Clock Summer-Time

    User Guidelines • The system internally keeps time in UTC, so this command is used only for display purposes and when the time is manually set. Examples The following example sets the timezone to 6 hours difference from UTC. Console(config) clock timezone -6 zone CST clock summer-time The clock summer-time Global Configuration mode command configures the system to automatically...
  • Page 128: Sntp Authentication-Key

    Default Configuration Summer time is disabled. offset — Default is 60 minutes. acronym — If unspecified default to the timezone acronym. If the timezone has not been defined, the default is UTC. Command Mode Global Configuration mode. User Guidelines • In both the date and recurring forms of the command, the first part of the command specifies when summer time begins, and the second part specifies when it ends.
  • Page 129: Sntp Authenticate

    Syntax • sntp authentication-key number md5 value • no sntp authentication-key number • number — Key number (Range: 1 - 4294967295) • value — Key value (Range: up to 8 characters) Default Configuration No authentication key is defined. Command Mode Global Configuration mode.
  • Page 130: Sntp Trusted-Key

    Examples The following example defines the authentication key for SNTP and allows authentication. Console(config)# sntp authentication-key 8 md5 ClkKey Console(config)# sntp trusted-key 8 Console(config)# sntp authenticate sntp trusted-key The sntp trusted-key Global Configuration mode command authenticates the identity of a system to which Simple Network Time Protocol (SNTP) will synchronize.
  • Page 131: Sntp Client Poll Timer

    sntp client poll timer The sntp client poll timer Global Configuration mode command sets the polling time for the Simple Network Time Protocol (SNTP) client. Use the no form of this command to return to default configuration. Syntax • sntp client poll timer seconds •...
  • Page 132: Sntp Anycast Client Enable

    User Guidelines • Use the sntp client enable Interface Configuration mode command to enable the SNTP client on a specific interface. Examples The following example enables the SNTP Broadcast clients. Console(config)# sntp broadcast client enable sntp anycast client enable The sntp anycast client enable Global Configuration mode command enables SNTP Anycast client. Use the no form of this command to disable the SNTP Anycast client.
  • Page 133: Sntp Client Enable (Interface)

    Syntax • sntp client enable {ethernet interface-number | vlan vlan-id | port-channel number} • no sntp client enable {ethernet interface-number | vlan vlan-id | port-channel number} • ethernet interface-number — Ethernet port number. • vlan vlan-id — VLAN number. • port-channel number —...
  • Page 134: Sntp Unicast Client Enable

    User Guidelines • Use the sntp broadcast client enable Global Configuration mode command to enable Broadcast clients globally. • Use the sntp anycast client enable Global Configuration mode command to enable Anycast clients globally. Examples The following example enables the SNTP client on Ethernet port 1/e3. Console(config)# interface ethernet 1/e3 Console(config-if)# sntp client enable sntp unicast client enable...
  • Page 135: Sntp Unicast Client Poll

    sntp unicast client poll The sntp unicast client poll Global Configuration mode command enables polling for the Simple Network Time Protocol (SNTP) predefined Unicast servers. Use the no form of this command to disable the polling for SNTP client. Syntax •...
  • Page 136 Syntax • sntp server {ip4-address | ip6-address | hostname}[poll] [key keyid] • no sntp server {ip4-address | ip6-address | hostname} • ip4-address — IPv4 server address. • ipv6-address — IPv6 server address. When the IPv6 address is a Link Local address (IPv6Z address), the outgoing interface name must be specified.
  • Page 137: Show Clock

    Examples The following example configures the device to accept SNTP traffic from the server on 192.1.1.1. Console(config)# sntp server 192.1.1.1 show clock The show clock User EXEC mode command displays the time and date from the system clock. Syntax • show clock [detail] •...
  • Page 138: Show Sntp Configuration

    Example The following example displays the time and date from the system clock. Console> show clock 15:29:03 PDT(UTC-7) Jun 17 2002 Time source is SNTP Console> show clock detail 15:29:03 PDT(UTC-7) Jun 17 2002 Time source is SNTP Time zone: Acronym is PST Offset is UTC-8 Summertime:...
  • Page 139: Show Sntp Status

    Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Examples The following example displays the current SNTP configuration of the device. Console# show sntp configuration Polling interval: 7200 seconds MD5 Authentication keys: 8, 9 Authentication is required for synchronization.
  • Page 140 Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Examples The following example shows the status of the SNTP . Console# show sntp status Clock is synchronized, stratum 4, reference is 176.1.1.8, unicast Reference time is AFE2525E.70597B34 (00:10:22.438 PDT Jul 5 1993) Unicast servers: Server...
  • Page 141: Configuration And Image Files

    Configuration and Image Files copy The copy Privileged EXEC mode command copies any file from a source to a destination. Syntax • copy source-url destination-url [snmp] • source-url — The location URL or reserved keyword of the source file to be copied. •...
  • Page 142 backup-config Represents the backup configuration file. unit://member/ Backup configuration file on one of the units. backup-config logging Copy from a syslog file. Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines • The location of a file system dictates the format of the source or destination URL. •...
  • Page 143 Use the copy source-url running-config command to load a ’configuration file’ from a network server to the device ’running configuration’. The configuration is added to the ’running configuration’ as if the commands were typed in the command-line interface (CLI). The resulting configuration file is a combination of the previous ’running configuration’...
  • Page 144: Delete

    delete The delete Privileged EXEC mode command deletes a file from a flash memory device. Syntax • delete url • url — The location URL or reserved keyword of the file to be deleted. (Range: 1 - 160 characters) The following table displays keywords and URL prefixes: Keyword Source or Destination flash:...
  • Page 145: Dir

    Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Examples The following example deletes the startup-config file. Console# delete startup-config The dir Privileged EXEC mode command displays a list of files on a flash file system. Syntax •...
  • Page 146: More

    sshkeys.prv 262144 01-Jun-2003 01:01:05 syslog1.sys 262144 01-Jun-2003 02:22:48 syslog2.sys 262144 01-Jun-2003 02:22:48 directry.prv 262144 01-Jun-2003 01:01:02 startup-config rw 1523 08-Feb-2005 09:02:31 Total size of flash: 15597568 bytes Free size of flash: 5759287 bytes more The more Privileged EXEC mode command displays a file. Syntax •...
  • Page 147: Rename

    Example The following example displays the contents of file configuration.bak. Console# more configuration.bak interface range ethernet 1/e(1-4) duplex half exit interface range ethernet 2/g(1-4) switchport mode general exit vlan database vlan 2 exit interface range ethernet 2/g(1-4) switchport general allowed vlan add 2 exit interface range ethernet 1/e(1-4) no negotiation...
  • Page 148: Boot System

    Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines • *.sys and *.prv files cannot be renamed. Examples The following example renames the configuration backup file. Console# rename configuration.bak m-config.bak boot system The boot system Privileged EXEC mode command specifies the system image that the device loads at startup.
  • Page 149: Show Running-Config

    show running-config The show running-config Privileged EXEC mode command displays the contents of the currently running configuration file. Syntax • show running-config Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines • This command displays the factory default settings at the end of the running configuration file contents.
  • Page 150: Show Startup-Config

    Default settings: Service tag: service tag 0 SW version 1.0.0.1 (date Aug 9 2007 time 10:06:42) Fast Ethernet Ports ------------------------------- no shutdown speed 100 duplex full negotiation flow-control off mdix auto no back-pressure Gigabit Ethernet Ports ---------------------------- no shutdown speed 1000 duplex full negotiation flow-control off...
  • Page 151 Syntax • show startup-config Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Examples The following example displays the contents of the running configuration file. Console# show startup-config software version 1.1 hostname device interface ethernet 1/e1...
  • Page 152: Show Bootvar

    show bootvar The show bootvar Privileged EXEC mode command displays the active system image file that is loaded by the device at startup. Syntax • show bootvar [unit unit] unit — Specifies the unit number. • Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode.
  • Page 153: Dhcp Snooping

    DHCP Snooping ip dhcp snooping The ip dhcp snooping Global Configuration mode command globally enables DHCP snooping. Use the no form of this command to return to the default settings. Syntax • ip dhcp snooping • no ip dhcp snooping Default Configuration The default configuration is disabled.
  • Page 154: Ip Dhcp Snooping Trust

    Syntax • ip dhcp snooping vlan vlan-id • no ip dhcp snooping vlan vlan-id • vlan-id — Specifies the VLAN ID. Default Configuration The default configuration is disabled. Command Mode Global Configuration mode. User Guidelines • You must first globally enable DHCP snooping before enabling DHCP snooping on a VLAN. Example The following example enables DHCP snooping on VLAN 1000: console(config)# ip dhcp snooping vlan 1000...
  • Page 155: Ip Dhcp Snooping Information Option Allowed-Untrusted

    Example The following example configures Ethernet port 1/e15 as trusted for DHCP snooping purposes. console(config)# interface ethernet 1/e15 console(config-if)# ip dhcp snooping trust ip dhcp snooping information option allowed-untrusted The ip dhcp snooping information option allowed-untrusted Global Configuration mode command configures a switch to accept DHCP packets with option-82 information from an untrusted port.
  • Page 156: Ip Dhcp Snooping Database

    Syntax • ip dhcp snooping verify • no ip dhcp snooping verify Default Configuration The default configuration is that the switch verifies the source MAC address in a DHCP packet that is received on untrusted ports matches the client hardware address in the packet. Command Mode Global Configuration mode.
  • Page 157: Ip Dhcp Snooping Database Update-Freq

    Example The following example configures the DHCP snooping binding file. console(config)#ip dhcp snooping database ip dhcp snooping database update-freq The ip dhcp snooping database update-freq Global Configuration mode command configures the update frequency of the DHCP snooping binding file. Use the no form of this command to return to default.
  • Page 158: Clear Ip Dhcp Snooping Database

    Syntax • ip dhcp snooping binding mac-address vlan-id ip-address {ethernet interface | port-channel port- channel-number} expiry seconds • no ip dhcp snooping database binding mac-address vlan-id • mac-address — Specifies a MAC address. • vlan-id — Specifies a VLAN number. •...
  • Page 159: Show Ip Dhcp Snooping

    Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example clears the DHCP binding database: Console# clear ip dhcp snooping database show ip dhcp snooping The show ip dhcp snooping User EXEC mode command displays the DHCP snooping configuration.
  • Page 160: Show Ip Dhcp Snooping Binding

    Example The following example displays the DHCP snooping configuration. console> show ip dhcp snooping DHCP snooping is Enabled DHCP snooping is configured on following VLANs: 2 DHCP snooping database is Disabled Verification of hwaddr field is Enabled DHCP snooping file update frequency is configured to: 1200 seconds Interface Trusted...
  • Page 161 User Guidelines There are no user guidelines for this command. Example The following example displays the DHCP snooping configuration. Console# show ip dhcp snooping binding Total number of binding: 2 Lease Type VLAN Interface Adreess Address (sec) --------- -------- --------- --------- --------- --------...
  • Page 162 DHCP Snooping...
  • Page 163: Ethernet Configuration Commands

    Ethernet Configuration Commands interface ethernet The interface ethernet Global Configuration mode command enters the interface configuration mode to configure an Ethernet type interface. Syntax • interface ethernet interface • interface — Valid Ethernet port. (Full syntax: unit/port) Default Configuration This command has no default configuration. Command Mode Global Configuration mode.
  • Page 164: Shutdown

    Default Configuration This command has no default configuration. Command Mode Global Configuration mode. User Guidelines • Commands under the interface range context are executed independently on each active interface in the range. If the command returns an error on one of the active interfaces, it does not stop executing commands on other active interfaces.
  • Page 165: Description

    Examples The following example disables Ethernet port 1/e5 operations. Console(config)# interface ethernet 1/e5 Console(config-if)# shutdown The following example restarts the disabled Ethernet port. Console(config)# interface ethernet 1/e5 Console(config-if)# no shutdown description The description Interface Configuration (Ethernet, port-channel) mode command adds a description to an interface.
  • Page 166: Speed

    speed The speed Interface Configuration (Ethernet, port-channel) mode command configures the speed of a given Ethernet interface when not using auto-negotiation. Use the no form of this command to restore the default configuration. Syntax • speed {10 | 100 | 1000} •...
  • Page 167: Negotiation

    Default Configuration The interface is set to full duplex. Command Mode Interface Configuration (Ethernet) mode. User Guidelines • When configuring a particular duplex mode on the port operating at 10/100 Mbps, disable the auto- negotiation on that port. • Half duplex mode can be set only for ports operating at 10 Mbps or 100 Mbps. Example The following example configures the duplex operation of Ethernet port 1/e5 to full duplex operation.
  • Page 168: Flowcontrol

    flowcontrol The flowcontrol Interface Configuration (Ethernet, port-channel) mode command configures flow control on a given interface. Use the no form of this command to disable flow control. Syntax • flowcontrol {auto | on | off} • no flowcontrol • auto — Indicates auto-negotiation •...
  • Page 169: Back-Pressure

    Default Configuration The default setting is on. Command Mode Interface Configuration (Ethernet) mode. User Guidelines • Auto: All possibilities to connect a PC with cross or normal cables are supported and are automatically detected. • On: It is possible to connect to a PC only with a normal cable and to connect to another device only with a cross cable.
  • Page 170: Clear Counters

    Example The following example enables back pressure on port 1/e5. Console(config)# interface ethernet 1/e5 Console(config-if)# back-pressure clear counters The clear counters User EXEC mode command clears statistics on an interface. Syntax • clear counters [ethernet interface | port-channel port-channel-number] • interface —...
  • Page 171: Show Interfaces Advertise

    Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines • This command is used to activate interfaces that were configured to be active, but were shutdown by the system for some reason (for example port security. Example The following example reactivates interface 1/e5.
  • Page 172: Show Interfaces Configuration

    Examples The following examples display autonegotiation information. Console# show interfaces advertise Port Type Operational Link Advertisement ---- ----------- ------- ------------------------------ 1/e1 100M-Copper Enabled 1/e2 100M-Copper Enabled 1/e3 100M-Copper Enabled 1/e4 100M-Copper Enabled 1/e5 100M-Copper Enabled 100f, 100h, 10f, 10h 1/e6 100M-Copper Enabled 1/e7...
  • Page 173 Syntax • show interfaces configuration [ethernet interface | port-channel port-channel-number ] • interface — Valid Ethernet port. (Full syntax: unit/port) • port-channel-number — Valid port-channel number. Default Configuration This command has no default configuration. Command Modes Privileged EXEC mode. User Guidelines •...
  • Page 174: Show Interfaces Status

    1/e8 100M- Full Enabled Off Disabled Auto Copper 1/e9 100M- Full Enabled Off Disabled Auto Copper 1/e10 100M- Full Enabled Off Disabled Auto Copper 1/e11 100M- Full Enabled Off Disabled Auto Copper 1/e12 100M- Full Enabled Off Disabled Auto Copper 1/e13 100M- Full...
  • Page 175 Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays the status of all configured interface. Console# show interfaces status Port Type Duplex Speed Flow Link Back Mdix Ctrl State Pressure Mode ----...
  • Page 176: Show Interfaces Description

    show interfaces description The show interfaces description Privileged EXEC mode command displays the description for all configured interfaces. Syntax • show interfaces description [ethernet interface | port-channel port-channel-number] interface — Valid Ethernet port. (Full syntax: unit/port) • • port-channel-number — A valid port-channel number. Default Configuration This command has no default configuration.
  • Page 177: Show Interfaces Counters

    show interfaces counters The show interfaces counters User EXEC mode command displays traffic seen by the physical interface. Syntax • show interfaces counters [ethernet interface | port-channel port-channel-number] • interface — A valid Ethernet port. (Full syntax: unit/port) • port-channel-number — A valid port-channel number. Default Configuration This command has no default configuration.
  • Page 178 InOctets InUcastPkts InMcastPkts InBcastPkts -------- ---------- ----------- ----------- 27889 OutOctets OutUcastPkts OutMcastPkts OutBcastPkts --------- ------------ ------------ ------------ 23739 The following example displays counters for Ethernet port 1/e1. Console# show interfaces counters ethernet 1/e1 Port InOctets InUcastPkts InMcastPkts InBcastPkts ------ ----------- -------------- ----------- -----------...
  • Page 179: Port Storm-Control Include-Multicast

    The following table describes the fields shown in the display. Field Description InOctets Counted received octets. InUcastPkts Counted received Unicast packets. InMcastPkts Counted received Multicast packets. InBcastPkts Counted received Broadcast packets. OutOctets Counted transmitted octets. OutUcastPkts Counted transmitted Unicast packets. OutMcastPkts Counted transmitted Multicast packets.
  • Page 180: Port Storm-Control Broadcast Enable

    Command Modes Interface Configuration (Ethernet) mode. User Guidelines • To control Multicasts storms, use the port storm-control broadcast enable and port storm-control broadcast rate commands. Example The following example enables counting Broadcast and Multicast packets on Ethernet port 2/e3. Console(config)# interface ethernet 2/e3 Console(config-if)# port storm-control include-multicast port storm-control broadcast enable The port storm-control broadcast enable Interface Configuration (Ethernet) mode command enables...
  • Page 181: Port Storm-Control Broadcast Rate

    Example The following example enables storm control on Ethernet port 1/e5. Console(config)# interface ethernet 1/e5 Console(config-if)# port storm-control broadcast enable port storm-control broadcast rate The port storm-control broadcast rate Interface Configuration (Ethernet) mode command configures the maximum Broadcast rate. Use the no form of this command to return to the default configuration. Syntax port storm-control broadcast rate rate •...
  • Page 182: Show Ports Storm-Control

    show ports storm-control The show ports storm-control Privileged EXEC mode command displays the storm control configuration. Syntax • show ports storm-control [interface] interface — A valid Ethernet port. (Full syntax: unit/port) • Default Configuration This command has no default configuration. Command Modes Privileged EXEC mode.
  • Page 183: Gvrp Commands

    GVRP Commands gvrp enable (Global) GARP VLAN Registration Protocol (GVRP) is an industry-standard protocol designed to propagate VLAN information from device to device. With GVRP , a single device is manually configured with all desired VLANs for the network, and all other devices on the network learn these VLANs dynamically.
  • Page 184: Garp Timer

    Syntax • gvrp enable • no gvrp enable Default Configuration GVRP is disabled on all interfaces. Command Mode Interface Configuration (Ethernet, port-channel) mode. User Guidelines • An access port does not dynamically join a VLAN because it is always a member in only one VLAN. •...
  • Page 185: Gvrp Vlan-Creation-Forbid

    Command Mode Interface configuration (Ethernet, port-channel) mode. User Guidelines • The following relationship must be maintained between the timers: – Leave time must be greater than or equal to three times the join time. – Leave-all time must be greater than the leave time. •...
  • Page 186: Gvrp Registration-Forbid

    Example The following example disables dynamic VLAN creation on Ethernet port 1/e6. console(config)# interface ethernet 1/e6 console(config-if)# gvrp vlan-creation-forbid gvrp registration-forbid The gvrp registration-forbid Interface Configuration (Ethernet, port-channel) mode command deregisters all dynamic VLANs on a port and prevents VLAN creation or registration on the port. Use the no form of this command to allow dynamic registration of VLANs on a port.
  • Page 187: Show Gvrp Configuration

    Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example clears all GVRP statistical information on Ethernet port 1/e6. console# clear gvrp statistics ethernet 1/e6 show gvrp configuration The show gvrp configuration User EXEC mode command displays GVRP configuration information, including timer values, whether GVRP and dynamic VLAN creation is enabled, and which ports are...
  • Page 188: Show Gvrp Statistics

    Example The following example displays GVRP configuration information: Console> show gvrp configuration GVRP Feature is currently enabled on the device. Timers (milliseconds) Port(s) Status Registration Dynamic VLAN Join Leave Leave All Creation ------ ------- ------------ ----------- ---- ----- --------- 2/e1 Enabled Normal Enabled...
  • Page 189: Show Gvrp Error-Statistics

    Example The following example shows GVRP statistical information. Console> show gvrp statistics GVRP Statistics: Legend: Join Empty Received rJIn: Join In Received rEmp : Empty Received rLIn: Leave In Received Leave Empty Received rLA : Leave All Received Join Empty Sent sJIn: Join In Sent sEmp :...
  • Page 190 Example The following example displays GVRP statistical information. Console> show gvrp error-statistics GVRP Error Statistics: Legend: INVPROT : Invalid Protocol INVALEN : Invalid Attribute Length INVATYP : Invalid Attribute INVEVENT: Invalid Event Type INVAVAL : Invalid Attribute Value Port INVPROT INVATYP INVAVAL INVALEN INVEVENT GVRP Commands...
  • Page 191: Igmp Snooping Commands

    IGMP Snooping Commands ip igmp snooping (Global) The ip igmp snooping Global Configuration mode command enables Internet Group Management Protocol (IGMP) snooping. Use the no form of this command to disable IGMP snooping. Syntax • ip igmp snooping • no ip igmp snooping Default Configuration IGMP snooping is disabled.
  • Page 192: Ip Igmp Snooping Mrouter

    Default Configuration IGMP snooping is disabled. Command Mode Interface Configuration (VLAN) mode. User Guidelines • IGMP snooping can only be enabled on static VLANs. It must not be enabled on Private VLANs or their community VLANs. Example The following example enables IGMP snooping on VLAN 2. Console(config)# interface vlan 2 Console(config-if)# ip igmp snooping ip igmp snooping mrouter...
  • Page 193: Ip Igmp Snooping Host-Time-Out

    Example The following example enables automatic learning of Multicast router ports on VLAN 2. Console(config) # interface vlan 2 Console(config-if)# ip igmp snooping mrouter learn-pim-dvmrp ip igmp snooping host-time-out The ip igmp snooping host-time-out Interface Configuration (VLAN) mode command configures the host-time-out.
  • Page 194: Ip Igmp Snooping Leave-Time-Out

    Syntax • ip igmp snooping mrouter-time-out time-out • no ip igmp snooping mrouter-time-out • time-out — Multicast router timeout in seconds (Range: 1 - 2147483647) Default Configuration The default value is 300 seconds. Command Mode Interface Configuration (VLAN) mode. User Guidelines There are no user guidelines for this command.
  • Page 195: Ip Igmp Snooping Querier Enable

    Command Mode Interface Configuration (VLAN) mode. User Guidelines • The leave timeout should be set greater than the maximum time that a host is allowed to respond to an IGMP query. • Use immediate leave only where there is just one host connected to a port. Example The following example configures the host leave-time-out to 60 seconds.
  • Page 196: Ip Igmp Snooping Querier Address

    • Following are the IGMP Snooping Querier parameters as function of the IGMP Snooping parameters: • QueryMaxResponseTime: host-time-out/15. • QueryInterval: host-time-out/ 3. Example The following example enables IGMP querier on VLAN 2. console# config console(config)# interface vlan 2 VLAN 2 does not exist. All settings will be applied to VLAN 2 when it is created.
  • Page 197: Show Ip Igmp Snooping Mrouter

    Example The following example enables IGMP querier on a specific VLAN. console(config)# interface vlan 2 VLAN 2 does not exist. All settings will be applied to VLAN 2 when it is created. console(config-if-ghost-vlan)# ip igmp snooping querier enable console(config-if-ghost-vlan)# ip igmp snooping querier address % missing mandatory parameter console(config-if-ghost-vlan)# ip igmp snooping querier address 1.1.1.1...
  • Page 198: Show Ip Igmp Snooping Interface

    Example The following example displays Multicast router interfaces in VLAN 1000. Console> show ip igmp snooping mrouter interface 1000 VLAN Ports ---- ----- 1000 1/e1 Detected multicast routers that are forbidden statically: VLAN Ports ---- ----- 1000 1/e19 show ip igmp snooping interface The show ip igmp snooping interface User EXEC mode command displays IGMP snooping configuration.
  • Page 199: Show Ip Igmp Snooping Groups

    Example The example displays IGMP snooping information. Console # show ip igmp snooping interface 1000 IGMP Snooping is globally enabled IGMP Snooping admin: Enabled Hosts and routers IGMP version: 2 IGMP snooping oper mode: Enabled IGMP snooping querier admin: Enabled IGMP snooping querier oper: Enabled IGMP snooping querier address admin: IGMP snooping querier address oper: 172.16.1.1...
  • Page 200 Command Mode User EXEC mode. User Guidelines • To see the full Multicast Address Table (including static addresses) use the show bridge multicast address-table Privileged EXEC command. Example The following example shows IGMP snooping information on Multicast groups. Console> show ip igmp snooping groups Vlan IP Address Querier...
  • Page 201: Ip Addressing Commands

    IP Addressing Commands ip address The ip address Interface Configuration (Ethernet, VLAN, port-channel) mode command sets an IP address. Use the no form of this command to remove an IP address. Syntax ip address ip-address {mask | prefix-length} no ip address [ip-address] •...
  • Page 202: Ip Address Dhcp

    ip address dhcp The ip address dhcp Interface Configuration (Ethernet, VLAN, port-channel) mode command acquires an IP address for an Ethernet interface from the Dynamic Host Configuration Protocol (DHCP) server. Use the no form of this command to deconfigure an acquired IP address. Syntax •...
  • Page 203: Ip Default-Gateway

    ip default-gateway The ip default-gateway Global Configuration mode command defines a default gateway (router). Use the no form of this command to return to the default configuration. Syntax • ip default-gateway ip-address • no ip default-gateway • ip-address — Valid IP address of the default gateway. Default Configuration No default gateway is defined.
  • Page 204: Arp

    Command Mode User EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example the displays the configured IP interfaces and their types. Console# show ip interface Gateway IP Address Type Activity status ------------------ ------ --------------- 10.7.1.1 Static...
  • Page 205: Arp Timeout

    Command Mode Global Configuration mode. User Guidelines • The software uses ARP cache entries to translate 32-bit IP addresses into 48-bit hardware addresses. Because most hosts support dynamic resolution, static ARP cache entries do not generally have to be specified. Example The following example adds IP address 198.133.219.232 and MAC address 00:00:0c:40:0f:bc to the ARP table.
  • Page 206: Clear Arp-Cache

    clear arp-cache The clear arp-cache Privileged EXEC mode command deletes all dynamic entries from the ARP cache. Syntax • clear arp-cache Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example deletes all dynamic entries from the ARP cache.
  • Page 207: Ip Domain-Lookup

    User Guidelines There are no user guidelines for this command. Example The following example displays entries in the ARP table. Console# show arp ARP timeout: 80000 Seconds Interface IP address HW address Status --------- ---------- ----------------- ------- 1/e1 10.7.1.102 00:10:B5:04:DB:4B Dynamic 2/e2 10.7.1.135...
  • Page 208: Ip Domain-Name

    Static entries are read first, followed by DHCP entries and DNS-protocol entries. Examples The following example defines default domain name dell.com. Console(config)# ip domain-name dell.com ip name-server The ip name-server Global Configuration mode command defines the available name servers. Use the no form of this command to remove a name server.
  • Page 209: Ip Host

    Global Configuration mode. User Guidelines • Up to 64 host name-to address mapping entries are permitted in the host cache. Examples The following example defines a static host name-to-address mapping in the host cache. Console(config)# ip host accounting.dell.com 176.10.23.1 IP Addressing Commands...
  • Page 210: Clear Host

    clear host The clear host Privileged EXEC mode command deletes entries from the host name-to-address cache. Syntax • clear host {name | *} • name — Specifies the host entry to be removed. (Range: 1 - 158 characters • * — Removes all entries. Default Configuration This command has no default configuration.
  • Page 211: Show Hosts

    User Guidelines • This command deletes the host name-to-address mapping temporarily until the next renewal of the IP address. Examples The following example deletes all entries from the host name-to-address mapping. Console# clear host dhcp * show hosts The show hosts Privileged EXEC mode command displays the default domain name; a list of name server hosts;...
  • Page 212 Examples The following example displays host information. Console# show hosts Host name: Device Default domain is gm.com, sales.gm.com, usa.sales.gm.com(DHCP) Name/address lookup is enabled Name servers (Preference order): 176.16.1.18 176.16.1.19 Configured host name-to-address mapping: Host Addresses ---- --------- accounting.gm.com 176.16.8.8 176.16.8.9 (DHCP) Cache: TTL(Hours) Host...
  • Page 213: Ipv6 Addressing

    IPv6 Addressing ipv6 enable The ipv6 enable Interface Configuration mode command enables IPv6 processing on an interface. Use the no form of this command to disable IPv6 processing on an interface. Syntax • ipv6 enable [no-autoconfig] • no ipv6 enable –...
  • Page 214: Ipv6 Address Autoconfig

    ipv6 address autoconfig The ipv6 address autoconfig Interface Configuration mode command enables automatic configuration of IPv6 addresses using stateless autoconfiguration on an interface. Addresses are configured depending on the prefixes received in Router Advertisement messages. , Use the no form of this command to disable address autoconfiguration on the interface.
  • Page 215: Show Ipv6 Icmp Error-Interval

    Syntax • ipv6 icmp error-interval milliseconds [bucketsize] • no ipv6 icmp error-interval • milliseconds — The time interval between tokens being placed in the bucket, each token represents a single ICMP error message. (Range: 0 - 2147483647) • bucketsize — The maximum number of tokens stored in the bucket. (Range: 1 - 200) Default Configuration The default interval is 100ms and the default bucketsize is 10 tokens.
  • Page 216: Ipv6 Address

    Example The following example displays the IPv6 ICMP error interval setting.. Console> show ipv6 icmp error-interval Rate limit interval: 100 ms Bucket size: 10 tokens ipv6 address The ipv6 address Interface Configuration mode command configures an IPv6 address for an interface. use the no form of this command to remove the address from the interface.
  • Page 217: Ipv6 Address Link-Local

    Example The following example configures an IPv6 address FE80::260:3EFF:FE11:6770 for interface g1. Console# Console (config)# interface g1 Console (config-if)# ipv6 address FE80::260:3EFF:FE11:6770 ipv6 address link-local The ipv6 address link-local Interface Configuration mode command configures an IPv6 link-local address for an interface. Use the no form of this command to return to the default link local address on the interface.
  • Page 218: Ipv6 Unreachables

    Example The following example assigns FE80::260:3EFF:FE11:6770 as the link-local address. Console# Console (config)# interface g1 Console (config-if)# ipv6 address FE80::260:3EFF:FE11:6770 link- local ipv6 unreachables The ipv6 unreachables Interface Configuration mode command enables the generation of Internet Control Message Protocol for IPv6 (ICMPv6) unreachable messages for any packets arriving on a specified interface.
  • Page 219: Ipv6 Default-Gateway

    ipv6 default-gateway The ipv6 default-gateway Global Configuration mode command defines an IPv6 default gateway. Use the no form of this command to remove the default gateway. Syntax • ipv6 default-gateway ipv6-address • no ipv6 default-gateway • ipv6-address — IPv6 address of the next hop that can be used to reach that network. When the IPv6 address is a Link Local address (IPv6Z address), the outgoing interface name must be specified.
  • Page 220: Ipv6 Mld Join-Group

    ipv6 mld join-group The ipv6 mld join-group interface configuration command configures Multicast Listener Discovery (MLD) reporting for a specified group. To cancel reporting and leave the group, use the no form of this command. Syntax • ipv6 mld join-group group-address •...
  • Page 221: Show Ipv6 Interface

    Command Mode Interface configuration (Ethernet, VLAN, Port-channel). User Guidelines • There are no user guidelines for this command. Example The following example defines an IPv6 default gateway. Console(config-if)# ipv6 mld version 1 show ipv6 interface The show ipv6 interface Privileged EXEC mode command displays the usability status of interfaces configured for IPv6.
  • Page 222 Examples The following examples displays the usability status of interfaces configured for IPv6. Console# show ipv6 interface Interface IP addresses Type ---------- ----------------- ----- 1/e1 7001::5668/64 [ANY] manual 1/e2 6001::1234/64 manual 1/e3 fe80::22/64 manual 1/e4 ff02::1 linklayer 1/e5 ff02::78 manual 1/e6 ff02::1:ff00:22 manual...
  • Page 223 Default Gateway Type Interface State IP address ------------------- ------- -------- ------- fe80::77 Static VLAN 1 unreachable fe80::200:cff:fe4a:dfa8 Dynamic VLAN 1 stale Console# show ipv6 interface vlan 15 IPv6 is disabled Console# show ipv6 interface vlan 1 Number of ND DAD attempts: 1 MTU size: 1500 Stateless Address Autoconfiguration state: enabled ICMP unreachable message state: enabled...
  • Page 224: Show Ipv6 Route

    show IPv6 route The show ipv6 route Privileged EXEC mode command displays the current state of the IPv6 routing table. Syntax • show ipv6 route Default Configuration This command has no default setting. Command Mode Privileged EXEC mode. User Guidelines •...
  • Page 225: Ipv6 Nd Dad Attempts

    ipv6 nd dad attempts The ipv6 nd dad attempts Interface Configuration mode command configures the number of consecutive neighbor solicitation messages that are sent on an interface while duplicate address detection is performed on the unicast IPv6 addresses of the interface. Use the no form of this command to return the number of messages to the default value.
  • Page 226: Ipv6 Host

    • If the link-local address for an interface changes, duplicate address detection is performed on the new link-local address and all of the other IPv6 address associated with the interface are regenerated (duplicate address detection is performed only on the new link-local address). •...
  • Page 227: Ipv6 Neighbor

    User Guidelines • The IPv6Z address format: <ipv6-link-local-address>%<interface-name> – interface-name — vlan<integer> | ch<integer> | isatap<integer> | <physical-port-name> | 0 – integer — <decimal-number> | <integer><decimal-number> – decimal-number — 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 –...
  • Page 228: Ipv6 Set Mtu

    Example The following example configures a static entry in the IPv6 neighbor discovery cache. Console (config)# ipv6 neighbor ff02::78 00:02:85:0E:1C:00 ethernet 1/e16 vlan 1 port-channel 1 ipv6 set mtu The ipv6 mtu Privileged EXEC mode command sets the Maximum Transmission Unit (MTU) size of IPv6 packets sent on an interface.
  • Page 229: Show Ipv6 Neighbors

    show ipv6 neighbors The show ipv6 neighbors Privileged EXEC mode command displays IPv6 neighbor discovery cache information. Syntax • show ipv6 neighbors {static | dynamic}[ipv6-address ipv6-address] [mac-address mac-address] • static — Display static neighbor discovery cash entries. • dynamic — Display dynamic neighbor discovery cash entries. •...
  • Page 230: Clear Ipv6 Neighbors

    Example The following example displays IPv6 neighbor discovery cache information. Console# show ipv6 neighbors dynamic Interface IPv6 address HW address State ------- ---------- --------- ------- VLAN 1 2031:0:130F::010:B504:DBB4 00:10:B5:04:DB:4B REACH VLAN 1 2031:0:130F::050:2200:2AA4 00:50:22:00:2A:A4 REACH clear ipv6 neighbors The clear ipv6 neighbors Privileged EXEC mode command deletes all entries in the IPv6 neighbor discovery cache, except static entries.
  • Page 231: Lacp Commands

    LACP Commands lacp system-priority The lacp system-priority Global Configuration mode command configures the system priority. Use the no form of this command to return to the default configuration. Syntax • lacp system-priority value • no lacp system-priority • value — Specifies system priority value. (Range: 1 - 65535) Default Configuration The default system priority is 1.
  • Page 232: Lacp Timeout

    Default Configuration The default port priority is 1. Command Mode Interface Configuration (Ethernet) mode. User Guidelines There are no user guidelines for this command. Example The following example defines the priority of Ethernet port 1/e6 as 247. Console(config)# interface ethernet 1/e6 Console(config-if)# lacp port-priority 247 lacp timeout The lacp timeout Interface Configuration (Ethernet) mode command assigns an administrative LACP...
  • Page 233: Show Lacp Ethernet

    Example The following example assigns a long administrative LACP timeout to Ethernet port 1/e6 . Console(config)# interface ethernet 1/e6 Console(config-if)# lacp timeout long show lacp ethernet The show lacp ethernet Privileged EXEC mode command displays LACP information for Ethernet ports. Syntax •...
  • Page 234 port Oper key: port Oper number: port Admin priority: port Oper priority: port Admin timeout: LONG port Oper timeout: LONG LACP Activity: ACTIVE Aggregation: AGGREGATABLE synchronization: FALSE collecting: FALSE distributing: FALSE expired: FALSE Partner system priority: system mac addr: 00:00:00:00:00:00 port Admin key: port Oper key: port Oper number:...
  • Page 235 Port 1/e1 LACP Statistics: LACP PDUs sent: LACP PDUs received: Port 1/e1 LACP Protocol State: LACP State Machines: Receive FSM: Port Disabled State Mux FSM: Detached State Periodic Tx FSM: No Periodic State Control Variables: BEGIN: FALSE LACP_Enabled: TRUE Ready_N: FALSE Selected: UNSELECTED...
  • Page 236: Show Lacp Port-Channel

    show lacp port-channel The show lacp port-channel Privileged EXEC mode command displays LACP information for a port- channel. Syntax • show lacp port-channel [port_channel_number] port_channel_number — Valid port-channel number. • Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode.
  • Page 237: Line Commands

    Line Commands line The line Global Configuration mode command identifies a specific line for configuration and enters the Line Configuration command mode. Syntax • line {console | telnet | ssh} • console — Console terminal line. • telnet — Virtual terminal for remote console access (Telnet). •...
  • Page 238: Speed

    speed The speed Line Configuration mode command sets the line baud rate. Syntax • speed bps • bps — Baud rate in bits per second (bps). Possible values are 2400, 4800, 9600, 19200, 38400, 57600 and 115200. Default Configuration The default speed is 9600 bps. Command Mode Line Configuration (console) mode.
  • Page 239: Exec-Timeout

    User Guidelines • This command is available only on the line console. • To start communication using Autobaud, press <Enter> twice. This configuration applies only to the current session. Examples The following example enables autobaud. Console(config)# line console Console(config-line)# autobaud exec-timeout The exec-timeout Line Configuration mode command sets the interval that the system waits until user input is detected.
  • Page 240: History

    history The history Line Configuration mode command enables the command history function. Use the no form of this command to disable the command history function. Syntax • history • no history Default Configuration The command history function is enabled. Command Mode Line Configuration mode.
  • Page 241: Terminal History

    Command Mode Line Configuration mode. User Guidelines This command configures the command history buffer size for a particular line. To configure the command history buffer size for the current terminal session, use the terminal history size User EXEC mode command. Example The following example changes the command history buffer size to 100 entries for a particular line.
  • Page 242: Terminal History Size

    terminal history size The terminal history size User EXEC command configures the command history buffer size for the current terminal session. Use the no form of this command to reset the command history buffer size to the default setting. Syntax •...
  • Page 243 Default Configuration If the line is not specified, the default value is console. Command Mode User EXEC mode. User Guidelines There are no user guidelines for this command. Examples The following example displays the line configuration. Console> show line Console configuration: Interactive timeout: Disabled History: 10 Baudrate: 9600...
  • Page 244 Line Commands...
  • Page 245: Management Acl

    Management ACL management access-list The management access-list Global Configuration mode command configures a management access list and enters the Management Access-list Configuration command mode. Use the no form of this command to delete an access list. Syntax • management access-list name •...
  • Page 246 Examples The following example creates a management access list called mlist, configures management Ethernet interfaces 1/e1 and 2/e9 and makes the new access list the active list. Console(config)# management access-list mlist Console(config-macl)# permit ethernet 1/e1 Console(config-macl)# permit ethernet 2/e9 Console(config-macl)# exit Console(config)# management access-class mlist The following example creates a management access list called mlist, configures all interfaces to be management interfaces except Ethernet interfaces 1/e1 and 2/e9 and makes the new access list the active...
  • Page 247: Permit (Management)

    permit (Management) The permit Management Access-List Configuration mode command defines a permit rule. Syntax • permit [ethernet interface-number | vlan vlan-id | port-channel port-channel-number] [service service] • permit ip-source {ipv4-address | ipv6-address/prefix-length} [mask mask | prefix-length] [ethernet interface-number | vlan vlan-id | port-channel number] [service service] •...
  • Page 248: Deny (Management)

    deny (Management) The deny Management Access-List Configuration mode command defines a deny rule. Syntax • deny [ethernet interface-number | vlan vlan-id | port-channel port-channel-number] [service service] • deny ip-source {ipv4-address | ipv6-address/prefix-length}[mask mask | prefix-length] [ethernet interface-number | vlan vlan-id | port-channel number] [service service] •...
  • Page 249: Management Access-Class

    management access-class The management access-class Global Configuration mode command restricts management connections by defining the active management access list. Use the no form of this command to disable this restriction. Syntax • management access-class {console-only | name} • no management access-class •...
  • Page 250: Show Management Access-Class

    User Guidelines There are no user guidelines for this command. Example The following example displays the mlist management access list. Console# show management access-list mlist mlist ----- permit ethernet 1/e1 permit ethernet 2/e2 ! (Note: all other access implicitly denied) show management access-class The show management access-class Privileged EXEC mode command displays the active management access list.
  • Page 251: Lldp Commands

    LLDP Commands lldp enable (global) The lldp enable Global Configuration mode command in enables Link Layer Discovery Protocol (LLDP). Use the no form of this command to disable LLDP . Syntax • lldp enable • no lldp enable Default Configuration The command is enabled.
  • Page 252: Lldp Timer

    Syntax • lldp enable [rx | tx | both] • no lldp enable • rx — Receive only LLDP packets. • tx — Transmit only LLDP packets. • both — Receive and transmit LLDP packets (default) Default Configuration Enabled in both modes. Command Modes Interface Configuration (Ethernet)mode.
  • Page 253: Lldp Hold-Multiplier

    Default Configuration Default — 30 seconds. User Guidelines There are no user guidelines for this command. Examples The following example specifies how often the software sends Link Layer Discovery Protocol (LLDP) updates. Console (config) # lldp timer lldp hold-multiplier The lldp hold-multiplier Global Configuration mode command specifies the amount of time the receiving device holds a Link Layer Discovery Protocol (LLDP) packet before discarding it.
  • Page 254: Lldp Reinit-Delay

    Examples The following example specifies how often the software sends Link Layer Discovery Protocol (LLDP) updates. Console (config) # lldp hold-multiplier 6 lldp reinit-delay The lldp reinit-delay Global Configuration mode command specifies the minimum time an LLDP port waits before reinitializing LLDP transmission. Use the no form of this command to revert to the default setting.
  • Page 255: Lldp Tx-Delay

    lldp tx-delay The lldp tx-delay Global Configuration mode command specifies the delay between successive LLDP frame transmissions initiated by value/status changes in the LLDP local systems MIB. Use the no form of this command to revert to the default setting. Syntax •...
  • Page 256: Lldp Management-Address

    Default Configuration No optional TLV is transmitted. Command Modes Interface configuration (Ethernet) User Guidelines • There are no user guidelines for this command. Example The following example specifies which optional TLV (2)s from the basic set should be transmitted. Console(config)# interface ethernet g1 Console(config-if)# lldp optional-tlv sys-name lldp management-address The lldp management-address Interface Configuration mode command specifies the management...
  • Page 257: Lldp Med Enable

    Example The following example specifies management address that would be advertised from an interface. Console(config)# interface ethernet g1 Console(config-if)# lldp management-address 192.168.0.1 lldp med enable The lldp med enable Interface Configuration mode command enables Link Layer Discovery Protocol (LLDP) Media Endpoint Discovery (MED) on an interface. Use the no form of this command to disable LLDP MED on an interface.
  • Page 258: Lldp Med Network-Policy (Global)

    lldp med network-policy (global) The lldp med network-policy Global Configuration mode command defines LLDP MED network policy. Use the no form of this command to remove LLDP MED network policy. Syntax • lldp med network-policy number application [vlan id] [vlan-type {tagged | untagged}] [up priority] [dscp value] •...
  • Page 259: Lldp Med Network-Policy (Interface)

    lldp med network-policy (interface) The lldp med network-policy Interface Configuration (Ethernet) mode command attaches a LLDP MED network policy to a port. Use the no form of this command to remove an LLDP MED network policy from a port. Syntax •...
  • Page 260: Clear Lldp Rx

    lldp med location ecs-elin data • • no lldp med location ecs-elin • coordinate — The location is specified as coordinates • civic-address — The location is specified as civic address • ecs-elin — The location is specified as ECS ELIN •...
  • Page 261: Show Lldp Configuration

    Command Modes Privileged EXEC mode. User Guidelines • There are no user guidelines for this command. Example The following example restarts the LLDP RX state machine and clearing the neighbors table. console(config)# exit console# clear lldp rx console# show lldp configuration To display the Link Layer Discovery Protocol (LLDP) configuration, use the show lldp configuration command in privileged EXEC mode.
  • Page 262: Show Lldp Med Configuration

    Example The following example displays the Link Layer Discovery Protocol (LLDP) configuration. console# show lldp configuration Timer: 30 Seconds Hold multiplier: 4 Reinit delay: 2 Seconds Tx delay: 2 Seconds Port State Optional TLVs Address 1/e1 RX, TX PD, SN, SD, SC 172.16.1.1 1/e2 PD, SN...
  • Page 263: Show Lldp Local

    Example The following example displays the Link Layer Discovery Protocol (LLDP) Media Endpoint Discovery (MED) configuration. console# show lldp med configuration Network policy 1 ------------------- Application type: Voice VLAN ID: 2 tagged Layer 2 priority: 0 DSCP: 0 Port Capabilities Network Policy Location ----------...
  • Page 264 User Guidelines • There are no user guidelines for this command. Example The following example displays the Link Layer Discovery Protocol (LLDP) information that is advertised from a specific port. console# show lldp local ethernet 1/e1 Device ID: 0060.704C.73FF Port ID: 1 Capabilities: Bridge System Name: ts-7800-1 System description:...
  • Page 265: Show Lldp Neighbors

    show lldp neighbors Syntax show lldp neighbors [ethernet interface] • • Interface — Ethernet port Command Modes Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays information about neighboring devices discovered using Link Layer Discovery Protocol (LLDP).
  • Page 266 LLDP Commands...
  • Page 267: Login Banner

    Login Banner banner exec The banner exec Global Configuration mode command specifies and enables a message to be displayed when an EXEC process is created (The user has successfully logged in). Use the no form of this command to delete the existing EXEC banner. Syntax •...
  • Page 268 • To customize the banner, use tokens in the form $(token) in the message text. The following table displays the tokens. Token Information displayed in the banner $(hostname) Displays the host name for the device. $(domain) Displays the domain name for the device. $(bold) Indicates that the next text is a bold text.
  • Page 269: Banner Login

    banner login The banner login Global Configuration mode command specifies and enables a message to be displayed before the username and password login prompts. Use the no form of this command to delete the existing Login banner. Syntax • banner login d message d •...
  • Page 270 • To customize the banner, use tokens in the form $(token) in the message text. The following table displays the tokens. Token Information displayed in the banner $(hostname) Displays the host name for the device. $(domain) Displays the domain name for the device. $(bold) Indicates that the next text is a bold text.
  • Page 271: Banner Motd

    banner motd The banner motd Global Configuration mode command specifies and enables a message-of-the-day banner. Use the no form of this command to delete the existing MOTD banner. Syntax • banner motd d message d • no banner motd • d —...
  • Page 272 • To customize the banner, use tokens in the form $(token) in the message text. The following table displays the tokens. Token Information displayed in the banner $(hostname) Displays the host name for the device. $(domain) Displays the domain name for the device. $(bold) Indicates that the next text is a bold text.
  • Page 273: Exec-Banner

    exec-banner The exec-banner Line Configuration mode command enables the display of exec banners. Use the no form of this command to disable the display of exec banners. Syntax • exec-banner • no exec-banner Default Configuration Enabled Command Mode Line Configuration mode User Guidelines There are no user guidelines for this command.
  • Page 274: Motd-Banner

    User Guidelines There are no user guidelines for this command. Example The following example enables the display of login banners. Console# Console (config)# line console Console(config-line)# login-banner motd-banner The motd-banner Line Configuration mode command enables the display of message-of-the-day banners. Use the no form of this command to disable the display of motd banners. Syntax •...
  • Page 275: Show Banner

    show banner The show banner Privileged EXEC mode command displays the banners configuration. Syntax • show banner motd • show banner login • show banner exec Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command.
  • Page 276 Login Banner...
  • Page 277: Phy Diagnostics Commands

    PHY Diagnostics Commands test copper-port tdr The test copper-port tdr Privileged EXEC mode command uses Time Domain Reflectometry (TDR) technology to diagnose the quality and characteristics of a copper cable attached to a port. Syntax • test copper-port tdr interface •...
  • Page 278: Show Copper-Ports Tdr

    show copper-ports tdr The show copper-ports tdr User EXEC mode command displays information on the last Time Domain Reflectometry (TDR) test performed on copper ports. • show copper-ports tdr [interface] • interface — A valid Ethernet port. (Full syntax: unit/port) Default Configuration This command has no default configuration.
  • Page 279 Default Configuration This command has no default configuration. Command Mode User EXEC mode. User Guidelines The port must be active and working in 100M or 1000M mode. Example The following example displays the estimated copper cable length attached to all ports. Console>...
  • Page 280 PHY Diagnostics Commands...
  • Page 281: Power Over Ethernet Commands

    Power over Ethernet Commands power inline The port inline Interface Configuration (Ethernet) mode command configures the administrative mode of inline power on an interface. Syntax • power inline {auto | never} • auto — Enables the device discovery protocol and, if found, supplies power to the device. •...
  • Page 282: Power Inline Priority

    Syntax • power inline powered-device pd-type • no power inline powered-device • pd-type — Specifies the type of powered device attached to the interface. (Range: 1 - 24 characters) Default Configuration This command has no default configuration. Command Mode Interface Configuration (Ethernet) mode. User Guidelines There are no user guidelines for this command.
  • Page 283: Power Inline Usage-Threshold

    Command Mode Interface Configuration (Ethernet) mode. User Guidelines • An unlimited number of ports can be configured as critical, high or low. • As power becomes unavailable, critical and high ports continue to receive power at the expense of low ports. Example The following example configures the device connected to Ethernet interface 1/e1 as a high-priority powered device.
  • Page 284: Power Inline Traps Enable

    power inline traps enable The power inline traps enable Global Configuration mode command enables inline power traps. Use the no form of this command to disable inline power traps. Syntax • power inline traps enable • no power inline traps Default Configuration Inline power traps are disabled.
  • Page 285 Example The following example displays information about inline power. Console# show power inline Unit Power Nominal Consumed Usage Traps Power Power Threshold ------ --------- --------- ------------ ---------- -------- 1 Watts 0 Watts (0%) 95 Disable 370 Watts 0 Watts (0%) 95 Disable 1 Watts 0 Watts (0%) 95...
  • Page 286 2/e6 Auto Searching class0 2/e7 Auto Searching class0 2/e8 Auto Searching class0 2/e9 Auto Searching class0 2/e10 Auto Searching class0 2/e11 Auto Searching class0 2/e12 Auto Searching class0 2/e13 Auto Searching class0 2/e14 Auto Searching class0 2/e15 Auto Searching class0 2/e16 Auto Searching...
  • Page 287 2/e33 Auto Searching class0 2/e34 Auto Searching class0 2/e35 Auto Searching class0 2/e36 Auto Searching class0 2/e37 Auto Searching class0 2/e38 Auto Searching class0 2/e39 Auto Searching class0 2/e40 Auto Searching class0 2/e41 Auto Searching class0 2/e42 Auto Searching class0 2/e43 Auto Searching...
  • Page 288 4/e12 Auto class0 4/e13 Auto class0 4/e14 Auto class0 4/e15 Auto class0 4/e16 Auto class0 4/e17 Auto class0 4/e18 Auto class0 4/e19 Auto class0 4/e20 Auto class0 4/e21 Auto class0 4/e22 Auto class0 4/e23 Auto class0 4/e24 Auto class0 6/e1 Auto class0 6/e2...
  • Page 289 6/e15 Auto class0 6/e16 Auto class0 6/e17 Auto class0 6/e18 Auto class0 The following table describes the significant fields shown in the example: Field Description Power The operational status of the inline power sourcing equipment. Nominal Power The nominal power of the inline power sourcing equipment in Watts. Consumed Power Measured usage power in Watts.
  • Page 290 Power over Ethernet Commands...
  • Page 291: Port Channel Commands

    Port Channel Commands interface port-channel The interface port-channel Global Configuration mode command enters the interface configuration mode to configure a specific port-channel. Syntax • interface port-channel port-channel-number • port-channel-number — A valid port-channel number. Default Configuration This command has no default configuration. Command Mode Global Configuration mode.
  • Page 292: Channel-Group

    Syntax • interface range port-channel {port-channel-range | all} • port-channel-range — List of valid port-channels to add. Separate non-consecutive port-channels with a comma and no spaces. A hyphen designates a range of port-channels. • all — All valid port-channels. Default Configuration This command has no default configuration.
  • Page 293: Show Interfaces Port-Channel

    User Guidelines There are no user guidelines for this command. Example The following example forces port 1/e1 to join port-channel 1 without an LACP operation. Console(config)# interface ethernet 1/e1 Console(config-if)# channel-group 1 mode on show interfaces port-channel The show interfaces port-channel Privileged EXEC mode command displays port-channel information. Syntax •...
  • Page 294 Port Channel Commands...
  • Page 295: Port Monitor Commands

    Port Monitor Commands port monitor The port monitor Interface Configuration Ethernet mode command starts a port monitoring session. Use the no form of this command to stop a port monitoring session. Syntax • port monitor src-interface [rx | tx] • no port monitor src-interface •...
  • Page 296: Show Ports Monitor

    • The following restrictions apply to ports configured to be destination ports: • The port cannot be already configured as a source port. • The port cannot be a member in a port-channel. • An IP interface is not configured on the port. •...
  • Page 297 Command Mode User EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example shows how the port monitoring status is displayed. console# config console(config)# int ether 1/e2 console(config-if)# port monitor 1/e3 console(config-if)# port monitor 1/e4 console(config-if)# port monitor 1/e5 console(config-if)# port monitor 1/e6 console(config-if)# port monitor 1/e7...
  • Page 298 Port Monitor Commands...
  • Page 299: Qos Commands

    QoS Commands The qos Global Configuration mode command enables quality of service (QoS) on the device. Use the no form of this command to disable QoS on the device. Syntax • qos [basic ] • no qos • basic — QoS basic mode. Default Configuration QoS is disabled on the device.
  • Page 300: Priority-Queue Out Num-Of-Queues

    Command Mode User EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays QoS attributes when QoS is disabled on the device. console# show qos Qos: basic Basic trust: vpt console# priority-queue out num-of-queues The priority-queue out num-of-queues Global Configuration mode command configures the number of expedite queues.
  • Page 301: Traffic-Shape

    Example The following example configures the number of expedite queues as 0. Console(config)# priority-queue out num-of-queues 0 traffic-shape The traffic-shape Interface Configuration (Ethernet, Port-Channel) mode command sets the shaper on an egress port. Use the no form of this command to disable the shaper. Syntax •...
  • Page 302: Wrr-Queue Cos-Map

    Default Configuration The default configuration is disabled. Command Mode Interface Configuration (Ethernet) mode. User Guidelines The command can be enabled on a specific port only if port storm-control broadcast enable interface configuration command is not enabled on that port. Example The following example limits the rate of the incoming traffic on Ethernet port 1/e15 to 1000kpbs.
  • Page 303: Show Qos Interface

    Command Mode Global Configuration mode. User Guidelines There are no user guidelines for this command. Example The following example maps CoS 7 to queue 2. Console(config)# wrr-queue cos-map 2 7 show qos interface The show qos interface User EXEC mode command displays interface QoS information. Syntax •...
  • Page 304 Examples The following example displays QoS information about Ethernet port 1/e11. console# show qos interface Ethernet e1 Default CoS: 0: Trust mode: enable Ethernet e2 Default CoS: 0: Trust mode: enable console# show qos interface queuing Ethernet e1 wrr bandwidth weights and EF priority: weights Priority Cos-queue map:...
  • Page 305: Qos Map Dscp-Queue

    Ethernet e2 wrr bandwidth weights and EF priority: weights Priority Cos-queue map: qos map dscp-queue The qos map dscp-queue Global Configuration mode command modifies the DSCP to queue map. Use the no form of this command to return to the default map. Syntax •...
  • Page 306: Qos Trust (Global)

    Command Mode Global Configuration mode. User Guidelines There are no user guidelines for this command. Example The following example maps DSCP values 33, 40 and 41 to queue 1. Console(config)# qos map dscp-queue 33 40 41 to 1 qos trust (Global) The qos trust Global Configuration mode command configures the system to the basic mode and trust state.
  • Page 307: Qos Trust (Interface)

    Example The following example configures the system to the DSCP trust state. Console(config)# qos trust dscp qos trust (Interface) The qos trust Interface Configuration (Ethernet, Port-channel) mode command enables a port to be in the trust state while the system is in the basic QoS mode. Use the no form of this command to disable the trust state on a port.
  • Page 308: Show Qos Map

    Default Configuration Default CoS value of a port is 0. Command Mode Interface Configuration (Ethernet, Port-channel) mode. User Guidelines • If the port is trusted, the default CoS value of the port is used to assign a CoS value to all untagged packets entering the port.
  • Page 309 Example The following example displays the DSCP port-queue map. Console> show qos map Dscp-queue map: d1 : d2 0 ------------------------------------ 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 04 04...
  • Page 310 QoS Commands...
  • Page 311: Radius Commands

    RADIUS Commands radius-server host The radius-server host Global Configuration mode command specifies a RADIUS server host. Use the no form of this command to delete the specified RADIUS host. Syntax • radius-server host {ip-address | hostname} [auth-port auth-port-number] [timeout timeout] [retransmit retries] [deadtime deadtime] [key key-string] [source source] [priority priority] [usage type] •...
  • Page 312: Radius-Server Key

    Default Configuration No RADIUS server host is specified. The port number for authentication requests is 1812. The usage type is all. Command Mode Global Configuration mode. User Guidelines • To specify multiple hosts, multiple radius-server host commands can be used. •...
  • Page 313: Radius-Server Retransmit

    Example The following example defines the authentication and encryption key for all RADIUS communications between the device and the RADIUS daemon. Console(config)# radius-server key dell-server radius-server retransmit The radius-server retransmit Global Configuration mode command specifies the number of times the software searches the list of RADIUS server hosts.
  • Page 314: Radius-Server Source-Ip

    radius-server source-ip The radius-server source-ip Global Configuration mode command specifies the source IP address used for communication with RADIUS servers. Use the no form of this command to return to the default configuration. Syntax • radius-server source-ip source • no radius-source-ip source •...
  • Page 315: Radius-Server Timeout

    Default Configuration The default IP address is the outgoing IP interface. Command Mode Global Configuration mode. User Guidelines • There are no user guidelines for this command. Example The following example configures the source IPv6 address used for communication with RADIUS servers.
  • Page 316: Radius-Server Deadtime

    radius-server deadtime The radius-server deadtime Global Configuration mode command improves RADIUS response time when servers are unavailable. The command is used to cause the unavailable servers to be skipped. Use the no form of this command to return to the default configuration. Syntax •...
  • Page 317 User Guidelines There are no user guidelines for this command. Examples The following example displays RADIUS server settings. Console# show radius-servers IP address Port TimeOut Retransmit DeadTime Source Priority Usage Auth --------- ---- ------- ---------- ------ -------- -------- ----- 172.16.1.1 1645 Global Global Global...
  • Page 318 RADIUS Commands...
  • Page 319: Rmon Commands

    RMON Commands show rmon statistics The show rmon statistics User EXEC mode command displays RMON Ethernet statistics. Syntax • show rmon statistics {ethernet interface number | port-channel port-channel-number} • interface number — Valid Ethernet port. • port-channel-number — Valid port-channel number. Default Configuration This command has no default configuration.
  • Page 320 Fragments: 0 Jabbers: 0 64 Octets: 0 65 to 127 Octets: 0 128 to 255 Octets: 0 256 to 511 Octets: 0 512 to 1023 Octets: 0 1024 to max Octets: 0 The following table describes significant fields shown above: Field Description Octets...
  • Page 321: Rmon Collection History

    128 to 255 Octets The total number of packets (including bad packets) received that are between 128 and 255 octets in length inclusive (excluding framing bits but including FCS octets). 256 to 511 Octets The total number of packets (including bad packets) received that are between 256 and 511 octets in length inclusive (excluding framing bits but including FCS octets).
  • Page 322: Show Rmon Collection History

    Example The following example enables a Remote Monitoring (RMON) MIB history statistics group on Ethernet port 1/e1 with index number 1 and a polling interval period of 2400 seconds. Console(config)# interface ethernet 1/e1 Console(config-if)# rmon collection history 1 interval 2400 show rmon collection history The show rmon collection history User EXEC mode command displays the requested RMON history group statistics.
  • Page 323: Show Rmon History

    The following table describes significant fields shown above: Field Description Index An index that uniquely identifies the entry. Interface The sampled Ethernet interface Interval The interval in seconds between samples. Requested Samples The requested number of samples to be saved. Granted Samples The granted number of samples to be saved.
  • Page 324 Examples The following examples displays RMON Ethernet history statistics for index 1. Console> show rmon history 1 throughput Sample Set: 1 Owner: CLI Interface: 1/e1 Interval: 1800 Requested samples: 50 Granted samples: 50 Maximum table size: 500 Time Octets Packets Broadcast Multicast Util...
  • Page 325 Console> show rmon history 1 other Sample Set: 1 Owner: Me Interface: 1/e1 Interval: 1800 Requested samples: 50 Granted samples: 50 Maximum table size: 500 Time Dropped Collisions -------------------- -------- ---------- Jan 18 2002 21:57:00 Jan 18 2002 21:57:30 The following table describes significant fields shown above: Field Description Time...
  • Page 326: Rmon Alarm

    Fragments The total number of packets received during this sampling interval that were less than 64 octets in length (excluding framing bits but including FCS octets) had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error), or a bad FCS with a non-integral number of octets (AlignmentError).
  • Page 327 Sample interval — 360000 seconds • Rising threshold — 1000000 • Falling threshold — 1000000 • Rising threshold event index — 10 • Falling threshold event index — 20 Console(config)# rmon alarm 1000 dell 360000 1000000 1000000 10 20 RMON Commands...
  • Page 328: Show Rmon Alarm-Table

    show rmon alarm-table The show rmon alarm-table User EXEC mode command displays the alarms table. Syntax • show rmon alarm-table Default Configuration This command has no default configuration. Command Mode User EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays the alarms table.
  • Page 329: Show Rmon Alarm

    show rmon alarm The show rmon alarm User EXEC mode command displays alarm configuration. Syntax • show rmon alarm number • number — Specifies the alarm index. (Range: 1 - 65535) Default Configuration This command has no default configuration. Command Mode User EXEC mode.
  • Page 330: Rmon Event

    The following table describes the significant fields shown in the display: Field Description Alarm Alarm index. Monitored variable OID. Last Sample Value The statistic value during the last sampling period. For example, if the sample type is delta, this value is the difference between the samples at the beginning and end of the period.
  • Page 331: Show Rmon Events

    Syntax • rmon event index type [community text] [description text] [owner name] • no rmon event index • index — Specifies the event index. (Range: 1 - 65535) • type — Specifies the type of notification generated by the device about this event. Possible values: none, log, trap, log-trap.
  • Page 332 Command Mode User EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays the RMON event table. Console> show rmon events Index Description Type Community Owner Last time sent ----- ----------- -------- --------- ------- -------------- ------ Errors...
  • Page 333: Show Rmon Log

    show rmon log The show rmon log User EXEC mode command displays the RMON log table. Syntax • show rmon log [event] • event — Specifies the event index. (Range: 0 - 65535) Default Configuration This command has no default configuration. Command Mode User EXEC mode.
  • Page 334: Rmon Table-Size

    The following table describes the significant fields shown in the display: Field Description Event An index that uniquely identifies the event. Description A comment describing this event. Time The time this entry was created. rmon table-size The rmon table-size Global Configuration mode command configures the maximum size of RMON tables.
  • Page 335: Snmp Commands

    SNMP Commands snmp-server community The snmp-server community Global Configuration mode command configures the community access string to permit access to the SNMP protocol. Use the no form of this command to remove the specified community string. Syntax • snmp-server community community [ro | rw | su] [ipv4-address | ipv6-address] [view view-name] •...
  • Page 336: Snmp-Server View

    User Guidelines • The view-name parameter cannot be specified for su, which has access to the whole MIB. • The view-name parameter can be used to restrict the access rights of a community string. When it is specified: – An internal security name is generated. –...
  • Page 337 Syntax • snmp-server view view-name oid-tree {included | excluded} • no snmp-server view view-name [oid-tree] • view-name — Specifies the label for the view record that is being created or updated. The name is used to reference the record. (Range: 1 - 30 characters) •...
  • Page 338: Snmp-Server Group

    • Following is a list of unsupported counters in the Iftable MIB: – ifInDiscards – ifOutErrors – ifOutQLen – ifHCInOctets – ifHCInUcastPkts – ifHCInMulticastPkts – ifHCInBroadcastPkts – ifHCOutOctets – ifHCOutUcastPkts – ifHCOutMulticastPkts – ifHCOutBroadcastPkts • The following counters are also not supported –...
  • Page 339 Syntax • snmp-server group groupname {v1 | v2 | v3 {noauth | auth | priv} [notify notifyview ] } [read readview] [write writeview] • no snmp-server group groupname [v1 | v2 | v3 [noauth | auth | priv]] [context name] •...
  • Page 340: Snmp-Server User

    Examples The following example attaches a group called user-group to SNMPv3 and assigns to the group the privacy security level and read access rights to a view called user-view. Console(config)# snmp-server group user-group v3 priv read user-view snmp-server user The snmp-server user Global Configuration mode command configures a new SNMP Version 3 user. Use the no form of this command to remove a user.
  • Page 341: Snmp-Server Engineid Local

    Default Configuration No group entry exists. Command Mode Global Configuration mode. User Guidelines • If auth-md5 or auth-sha is specified, both authentication and privacy are enabled for the user. • When a show running-config Privileged EXEC mode command is entered, a line for this user will not be displayed.
  • Page 342 Default Configuration The engine ID is not configured. If SNMPv3 is enabled using this command, and the default is specified, the default engine ID is defined per standard as: • First 4 octets — first bit = 1, the rest is IANA Enterprise number = 674. •...
  • Page 343: Snmp-Server Enable Traps

    Examples The following example enables SNMPv3 on the device and sets the local engine ID of the device to the default value. Console(config) # snmp-server engineID local default snmp-server enable traps The snmp-server enable traps Global Configuration mode command enables the device to send SNMP traps.
  • Page 344: Snmp-Server Host

    Syntax • snmp-server filter filter-name oid-tree {included | excluded} • no snmp-server filter filter-name [oid-tree] • filter-name — Specifies the label for the filter record that is being updated or created. The name is used to reference the record. (Range: 1 - 30 characters) •...
  • Page 345 Syntax • snmp-server host {ip4-address | ip6-address | hostname} community-string [traps | informs] [1 | 2] [udp-port port] [filter filtername] [timeout seconds] [retries retries] • no snmp-server host {ip4-address | ip6-address | hostname} [traps | informs] • ip4-address — The host IPv4 address (the targeted recipient). •...
  • Page 346: Snmp-Server V3-Host

    • If a trap and inform are defined on the same target, and an inform was sent, the trap is not sent. • The IPv6Z address format: <ipv6-link-local-address>%<interface-name> – interface-name — vlan<integer> | ch<integer> | isatap<integer> | <physical-port-name> | 0 –...
  • Page 347 port — Specifies the UDP port of the host to use. If unspecified, the default UDP port number is • 162. (Range: 1 - 65535) • filtername — Specifies a string that defines the filter for this host. If unspecified, nothing is filtered.
  • Page 348: Snmp-Server Trap Authentication

    snmp-server trap authentication The snmp-server trap authentication Global Configuration mode command enables the device to send SNMP traps when authentication fails. Use the no form of this command to disable SNMP failed authentication traps. Syntax • snmp-server trap authentication • no snmp-server trap authentication Default Configuration SNMP failed authentication traps are enabled.
  • Page 349: Snmp-Server Location

    User Guidelines Do not include spaces in the text string or place text that includes spaces inside quotation marks. Example The following example configures the system contact point called Dell_Technical_Support. console(config)# snmp-server contact Dell_Technical_Support snmp-server location The snmp-server location Global Configuration mode command configures the system location string. To remove the location string.
  • Page 350: Show Snmp

    This • command is case-sensitive. Examples The following example configures the scalar MIB sysName with the value dell. Console(config)# snmp-server set sysName sysname dell show snmp The show snmp Privileged EXEC mode command displays the SNMP status. Syntax •...
  • Page 351 Example The following example displays the SNMP communications status. Console# show snmp Community- Community- View name String Access address ---------- ---------- --------- ------- public read only user-view private read write Default 172.16.1.1 private DefaultSuper 172.17.1.1 Community-string Group name IP address ---------------- ---------- ----------...
  • Page 352: Show Snmp Engineid

    The following table describes significant fields shown above. Field Description Community-string Community access string to permit access to the SNMP protocol. Community-access Type of access - read-only, read-write, super access IP Address Management station IP Address. Trap-Rec-Address Targeted Recipient Trap-Rec-Community Statistics sent with the notification operation.
  • Page 353: Show Snmp Views

    show snmp views The show snmp views Privileged EXEC mode command displays the configuration of views. Syntax • show snmp views [viewname] • viewname — Specifies the name of the view. (Range: 1 - 30) Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode.
  • Page 354 Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays the configuration of views. Console# show snmp groups Name Security Views Model Level Read Write...
  • Page 355: Show Snmp Filters

    show snmp filters The show snmp filters Privileged EXEC mode command displays the configuration of filters. Syntax • show snmp filters [filtername] • filtername — Specifies the name of the filter. (Range: 1 - 30) Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode.
  • Page 356: Show Snmp Users

    show snmp users The show snmp users Privileged EXEC mode command displays the configuration of users. Syntax • show snmp users [username] • username — Specifies the name of the user. (Range: 1 - 30) Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode.
  • Page 357: Spanning-Tree Commands

    Spanning-Tree Commands spanning-tree The spanning-tree Global Configuration mode command enables spanning-tree functionality. Use the no form of this command to disable spanning-tree functionality. Syntax • spanning-tree • no spanning-tree Default Configuration Spanning-tree is enabled. Command Mode Global Configuration mode. User Guidelines There are no user guidelines for this command.
  • Page 358: Spanning-Tree Forward-Time

    Syntax • spanning-tree mode {stp | rstp| mstp} • no spanning-tree mode • stp — STP is the Spanning Tree operative mode. • rstp — RSTP is the Spanning Tree operative mode. • mstp — MSTP is enabled. Default Configuration STP is enabled.
  • Page 359: Spanning-Tree Hello-Time

    Command Mode Global Configuration mode. User Guidelines When configuring the forwarding time, the following relationship should be kept: – 2*(Forward-Time - 1) >= Max-Age Example The following example configures the Spanning Tree bridge forwarding time to 25 seconds. Console(config)# spanning-tree forward-time 25 spanning-tree hello-time The spanning-tree hello-time Global Configuration mode command configures the Spanning Tree bridge hello time, which is how often the device Broadcasts Spanning Tree BPDUs to other devices.
  • Page 360: Spanning-Tree Max-Age

    spanning-tree max-age The spanning-tree max-age Global Configuration mode command configures the Spanning Tree bridge maximum age. Use the no form of this command to return to the default configuration. Syntax • spanning-tree max-age seconds • no spanning-tree max-age • seconds — Time in seconds. (Range: 6 - 40) Default Configuration The default maximum age for IEEE Spanning Tree Protocol (STP) is 20 seconds.
  • Page 361: Spanning-Tree Disable

    Command Mode Global Configuration mode. User Guidelines The bridge with the lowest priority is elected as the root bridge. Example The following example configures Spanning Tree priority to 12288. Console(config)# spanning-tree priority 12288 spanning-tree disable The spanning-tree disable Interface Configuration mode command disables Spanning Tree on a specific port.
  • Page 362: Spanning-Tree Port-Priority

    Syntax • spanning-tree cost cost • no spanning-tree cost • cost — Path cost of the port (Range: 1 - 200,000,000) Default Configuration Default path cost is determined by port speed and path cost method (long or short) as shown below: Interface Long Short...
  • Page 363: Spanning-Tree Portfast

    Command Mode Interface Configuration (Ethernet, port-channel) mode. User Guidelines There are no user guidelines for this command. Example The following example configures the spanning priority on Ethernet port 1/e15 to 96. Console(config)# interface ethernet 1/e15 Console(config-if)# spanning-tree port-priority 96 spanning-tree portfast The spanning-tree portfast Interface Configuration mode command enables PortFast mode.
  • Page 364: Spanning-Tree Link-Type

    spanning-tree link-type The spanning-tree link-type Interface Configuration mode command overrides the default link-type setting determined by the duplex mode of the port and enables Rapid Spanning Tree Protocol (RSTP) transitions to the forwarding state. Use the no form of this command to return to the default configuration.
  • Page 365: Spanning-Tree Bpdu

    Default Configuration Short path cost method. Command Mode Global Configuration mode. User Guidelines • This command applies to all Spanning Tree instances on the device. • The cost is set using the spanning-tree cost command. Example The following example sets the default path cost method to long. Console(config)# spanning-tree pathcost method long spanning-tree bpdu The spanning-tree bpdu Global Configuration mode command defines BPDU handling when the...
  • Page 366: Clear Spanning-Tree Detected-Protocols

    Example The following example defines BPDU packet flooding when the spanning-tree is disabled on an interface Console(config)# spanning-tree bpdu flooding clear spanning-tree detected-protocols The clear spanning-tree detected-protocols Privileged EXEC mode command enables the user to set the switches back to RSTP mode without rebooting the device. Syntax •...
  • Page 367: Spanning-Tree Mst Max-Hops

    Syntax • spanning-tree mst instance-id priority priority • no spanning-tree mst instance-id priority • instance-id — ID of the spanning -tree instance. (Range: 0 - 15) • priority — Device priority for the specified spanning-tree instance. (Range: 0 - 61440 in multiples of 4096) Default Configuration The default bridge priority for IEEE Spanning Tree Protocol (STP) is 32768.
  • Page 368: Spanning-Tree Mst Port-Priority

    User Guidelines There are no user guidelines for this command. Example The following example configures the maximum number of hops that a packet travels in an MST region before it is discarded to 10. Console (config) # spanning-tree mst max-hops 10 spanning-tree mst port-priority The spanning-tree mst port-priority Interface Configuration mode command configures port priority for the specified MST instance.
  • Page 369: Spanning-Tree Mst Cost

    spanning-tree mst cost The spanning-tree mst cost Interface Configuration mode command configures the path cost for multiple Spanning Tree (MST) calculations. If a loop occurs, the Spanning Tree considers path cost when selecting an interface to put in the forwarding state. Use the no form of this command to return to the default configuration.
  • Page 370: Instance (Mst)

    Syntax spanning-tree mst configuration Default Configuration This command has no default configuration. Command Mode Global Configuration mode. User Guidelines All devices in an MST region must have the same VLAN mapping, configuration revision number and name. Example The following example configures an MST region. Console(config)# spanning-tree mst configuration Console(config-mst) # instance 1 add vlan 10-20 Console(config-mst) # name region1...
  • Page 371: Name (Mst)

    User Guidelines All VLANs that are not explicitly mapped to an MST instance are mapped to the common and internal Spanning Tree (CIST) instance (instance 0) and cannot be unmapped from the CIST. For two or more devices to be in the same MST region, they must have the same VLAN mapping, the same configuration revision number, and the same name.
  • Page 372: Revision (Mst)

    revision (mst) The revision MST configuration command defines the MST region revision number. Use the no form of this command to return to the default configuration. Syntax • revision value • no revision • value — Configuration revision number. (Range: 0 - 65535) Default Configuration The default configuration revision number is 0.
  • Page 373: Exit (Mst)

    Command Mode MST Configuration mode. User Guidelines The pending MST region configuration takes effect only after exiting the MST configuration mode. Example The following example displays a pending MST region configuration. Console(config-mst)# show pending Pending MST configuration Name: Region1 Revision: 1 Instance Vlans Mapped State...
  • Page 374: Abort (Mst)

    Example The following example exits the MST configuration mode and saves changes. Console(config)# spanning-tree mst configuration Console(config-mst)# exit abort (mst) The abort MST Configuration mode command exits the MST configuration mode without applying the configuration changes. Syntax • abort Default Configuration This command has no default configuration.
  • Page 375: Show Spanning-Tree

    show spanning-tree The show spanning-tree Privileged EXEC mode command displays spanning-tree configuration. Syntax • show spanning-tree [ethernet interface -number| port-channel port-channel-number] [instance instance-id] • show spanning-tree [detail] [active | blockedports] [instance instance-id] • show spanning-tree mst-configuration • interface -number — A valid Ethernet port. •...
  • Page 376 Path Cost 20000 Root Port 1 (1/e1) Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge Priority 36864 Address 00:02:4b:29:7a:00 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Interfaces Name State Prio.Nbr Cost Role PortFast Type...
  • Page 377 Interfaces Name State Prio.Nbr Cost Role PortFast Type ---- ------- -------- ----- ---- -------- ---------- 1/e1 Enabled 128.1 20000 Desg P2p (RSTP) 1/e2 Enabled 128.2 20000 Desg Shared (STP) 1/e3 Disabled 128.3 20000 1/e4 Enabled 128.4 20000 Desg Shared (STP) 1/e5 Enabled 128.5...
  • Page 378 1/e2 Enabled 128.2 20000 1/e3 Disabled 128.3 20000 1/e4 Enabled 128.4 20000 1/e5 Enabled 128.5 20000 Console# show spanning-tree active Spanning tree enabled mode RSTP Default port cost method: long Root ID Priority 32768 Address 00:01:42:97:e0:00 Path Cost 20000 Root Port 1 (1/e1) Hello Time 2 sec Max Age 20 sec...
  • Page 379 Console# show spanning-tree blockedports Spanning tree enabled mode RSTP Default port cost method: long Root ID Priority 32768 Address 00:01:42:97:e0:00 Path Cost 20000 Root Port 1 (1/1) Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge Priority 36864 Address...
  • Page 380 Root ID Priority 32768 Address 00:01:42:97:e0:00 Path Cost 20000 Root Port 1 (1/e1) Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge Priority 36864 Address 00:02:4b:29:7a:00 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Number of topology changes 2 last change occurred 2d18h ago Times: hold 1, topology change 35, notification 2...
  • Page 381 Designated port id: 128.2 Designated path cost: 20000 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 Port 3 (1/e3) disabled State: N/A Role: N/A Port id: 128.3 Port cost: 20000 Type: N/A (configured: auto) Port Fast: N/A (configured:no) Designated bridge Priority: N/A Address: N/A Designated port id: N/A...
  • Page 382 Number of transitions to forwarding state: N/A BPDU: sent N/A, received N/A Console# show spanning-tree ethernet 1/e1 Port 1 (1/e1) enabled State: Forwarding Role: Root Port id: 128.1 Port cost: 20000 Type: P2p (configured: auto) RSTP Port Fast: No (configured:no) Designated bridge Priority: 32768 Address: 00:01:42:97:e0:00 Designated port id: 128.25...
  • Page 383 CST Root ID Priority 32768 Address 00:01:42:97:e0:00 Path Cost 20000 Root Port 1 (1/e1) Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec IST Master ID Priority 32768 Address 00:02:4b:29:7a:0 This switch is the IST master. Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Max hops...
  • Page 384 Bridge ID Priority 32768 Address 00:02:4b:29:7a:0 Interfaces Name State Prio.Nbr Cost Role PortFast Type ---- ------- -------- ----- ---- -------- ---------- 1/e1 Enabled 128.1 20000 Boun P2p Bound (RSTP) 1/e2 Enabled 128.2 20000 Boun Shared Bound (STP) 1/e3 Enabled 128.3 20000 Altn 1/e4...
  • Page 385 Max hops Number of topology changes 2 last change occurred 2d18h ago Times: hold 1, topology change 35, notification 2 hello 2, max age 20, forward delay 15 Port 1 (1/e1) enabled State: Forwarding Role: Root Port id: 128.1 Port cost: 20000 Type: P2p (configured: auto) Boundary RSTP Port Fast: No (configured:no) Designated bridge Priority: 32768...
  • Page 386 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 Port 4 (1/e4) enabled State: Forwarding Role: Designated Port id: 128.4 Port cost: 20000 Type: Shared (configured: auto) Internal Port Fast: No (configured:no) Designated bridge Priority: 32768 Address: 00:02:4b:29:7a:00 Designated port id: 128.2 Designated path cost: 20000 Number of transitions to forwarding state: 1...
  • Page 387 Designated bridge Priority: 32768 Address: 00:02:4b:29:7a:00 Designated port id: 128.1 Designated path cost: 20000 Number of transitions to forwarding state: 1 BPDU: sent 2, received 120638 Port 2 (1/e2) enabled State: Forwarding Role: Designated Port id: 128.2 Port cost: 20000 Type: Shared (configured: auto) Boundary STP Port Fast: No (configured:no) Designated bridge Priority: 32768...
  • Page 388 Number of transitions to forwarding state: 1 BPDU: sent 2, received 170638 Console# show spanning-tree Spanning tree enabled mode MSTP Default port cost method: long ###### MST 0 Vlans Mapped: 1-9, 21-4094 CST Root ID Priority 32768 Address 00:01:42:97:e0:00 Path Cost 20000 Root Port 1 (1/e1) Hello Time 2 sec Max Age 20 sec...
  • Page 389: Spanning-Tree Guard Root

    Spanning tree enabled mode MSTP Default port cost method: long ###### MST 0 Vlans Mapped: 1-9, 21-4094 CST Root ID Priority 32768 Address 00:01:42:97:e0:00 This switch is root for CST and IST master. Root Port 1 (1/e1) Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Max hops...
  • Page 390 User Guidelines Root guard can be enabled when the switch works in STP , RSTP and MSTP . When root guard is enabled, if spanning-tree calculations cause a port to be selected as the root port, the port transitions to the alternate state. Example The following example enable root guard on port e8.
  • Page 391: Ssh Commands

    SSH Commands ip ssh port The ip ssh port Global Configuration mode command specifies the port to be used by the SSH server. Use the no form of this command to return to the default configuration. Syntax • ip ssh port port-number •...
  • Page 392: Crypto Key Generate Dsa

    Default Configuration Device configuration from a SSH server is enabled. Command Mode Global Configuration mode. User Guidelines • If encryption keys are not generated, the SSH server is in standby until the keys are generated. To generate SSH server keys, use the crypto key generate dsa, and crypto key generate rsa Global Configuration mode commands.
  • Page 393: Crypto Key Generate Rsa

    Example The following example generates DSA key pairs. Console(config)# crypto key generate dsa crypto key generate rsa The crypto key generate rsa Global Configuration mode command generates RSA key pairs. Syntax • crypto key generate rsa Default Configuration RSA key pairs do not exist. Command Mode Global Configuration mode.
  • Page 394: Crypto Key Pubkey-Chain Ssh

    Default Configuration Public Key authentication for incoming SSH sessions is disabled. Command Mode Global Configuration mode. User Guidelines AAA authentication is independent Example The following example enables public key authentication for incoming SSH sessions. Console(config)# ip ssh pubkey-auth crypto key pubkey-chain ssh The crypto key pubkey-chain ssh Global Configuration mode command enters the SSH Public Key- chain Configuration mode.
  • Page 395: User-Key

    Example The following example enters the SSH Public Key-chain Configuration mode and manually configures the RSA key pair for SSH public key-chain bob. Console(config)# crypto key pubkey-chain ssh Console(config-pubkey-chain)# user-key bob Console(config-pubkey-key)# key-string rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl Al4kpqIw9GBRonZQZxjHKcqKL6rMlQ+ ZNXfZSkvHG+QusIZ/76ILmFT34v7u7ChFAE+ Vu4GRfpSwoQUvV35LqJJk67IOU/zfwOl1g kTwml75QR9gHujS6KwGN2QWXgh3ub8gDjTSq muSn/Wd05iDX2IExQWu08licglk02LYciz +Z4TrEU/9FJxwPiVQOjc+KBXuR0juNg5nFYsY 0ZCk0N/W9a/tnkm1shRE7Di71+w3fNiOA 6w9o44t6+AINEICBCCA4YcF6zMzaT1wefWwX6f+...
  • Page 396: Key-String

    Default Configuration No SSH public keys exist. Command Mode SSH Public Key-string Configuration mode. User Guidelines Follow this command with the key-string SSH Public Key-String Configuration mode command to specify the key. Example The following example enables manually configuring an SSH public key for SSH public key-chain bob. Console(config)# crypto key pubkey-chain ssh Console(config-pubkey-chain)# user-key bob rsa Console(config-pubkey-key)# key-string row...
  • Page 397 User Guidelines • Use the key-string SSH Public Key-string Configuration mode command to specify which SSH public key is to be interactively configured next. To complete the command, you must enter a row with no characters. • Use the key-string row SSH Public Key-string Configuration mode command to specify the SSH public key row by row.
  • Page 398: Show Ip Ssh

    show ip ssh The show ip ssh Privileged EXEC mode command displays the SSH server configuration. Syntax • show ip ssh Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays the SSH server configuration.
  • Page 399: Show Crypto Key Mypubkey

    show crypto key mypubkey The show crypto key mypubkey Privileged EXEC mode command displays the SSH public keys on the device. Syntax • show crypto key mypubkey [rsa | dsa] • rsa — Indicates the RSA key. • dsa — Indicates the DSA key. Default Configuration This command has no default configuration.
  • Page 400: Show Crypto Key Pubkey-Chain Ssh

    show crypto key pubkey-chain ssh The show crypto key pubkey-chain ssh Privileged EXEC mode command displays SSH public keys stored on the device. Syntax • show crypto key pubkey-chain ssh [username username] [fingerprint {bubble-babble | hex}] username — Specifies the remote SSH client username. •...
  • Page 401: Syslog Commands

    Syslog Commands logging on The logging on Global Configuration mode command controls error message logging. This command sends debug or error messages to a logging process, which logs messages to designated locations asynchronously to the process that generated the messages. Use the no form of this command to disable the logging process.
  • Page 402 Syntax • logging {ip4-address | ip6-address |hostname} [port port] [severity level] [facility facility] [description text] • no logging {ip4-address | ip6-address | hostname} • ip4-address — Host IPv4 address to be used as a syslog server. • ip6-address — Host IPv6 address to be used as a syslog server. When the IPv6 address is a Link Local address (IPv6Z address), the outgoing interface name must be specified.
  • Page 403: Logging Console

    Example The following example limits logged messages sent to the syslog server with IP address 10.1.1.1 to severity level critical. Console(config)# logging 10.1.1.1 severity critical logging console The logging console Global Configuration mode command limits messages logged to the console based on severity.
  • Page 404: Logging Buffered

    logging buffered The logging buffered Global Configuration mode command limits syslog messages displayed from an internal buffer based on severity. Use the no form of this command to cancel using the buffer. Syntax • logging buffered level • no logging buffered •...
  • Page 405: Clear Logging

    Command Mode Global Configuration mode. User Guidelines This command takes effect only after Reset. Example The following example changes the number of syslog messages stored in the internal buffer to 300. Console(config)# logging buffered size 300 clear logging The clear logging Privileged EXEC mode command clears messages from the internal logging buffer. Syntax •...
  • Page 406: Logging File

    logging file The logging file Global Configuration mode command limits syslog messages sent to the logging file based on severity. Use the no form of this command to cancel using the buffer.. Syntax • logging file level • no logging file •...
  • Page 407: Aaa Logging

    Example The following example clears messages from the logging file. Console# clear logging file Clear Logging File [yes/no]? aaa logging The aaa logging Global Configuration mode command enables logging AAA login events in the syslog. Use the no form of this command to disable logging AAA login events. Syntax •...
  • Page 408: Management Logging

    • file-system logging delete-rename • no file-system logging delete-rename • copy — Indicates logging messages related to file copy operations. • delete-rename — Indicates logging messages related to file deletion and renaming operations. Default Configuration Logging file system events is enabled. Command Mode Global Configuration mode.
  • Page 409: Show Logging

    Example The following example enables logging messages related to deny actions of management ACLs. Console(config)# management logging deny show logging The show logging Privileged EXEC mode command displays the state of logging and the syslog messages stored in the internal buffer. Syntax •...
  • Page 410 Application filtering control Application Event Status Login Enabled File system Copy Enabled File system Delete-Rename Enabled Management ACL Deny Enabled Buffer log: 11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up 11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/0, changed state to up 11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/1, changed state to up 11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/2,...
  • Page 411: Show Logging File

    show logging file The show logging file Privileged EXEC mode command displays the state of logging and the syslog messages stored in the logging file. Syntax • show logging file Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode.
  • Page 412: Show Syslog-Servers

    File system Copy Enabled File system Delete-Rename Enabled Management ACL Deny Enabled File log: 11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up 11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/0, changed state to up 11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/1, changed state to up 11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/2, changed state to up 11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/3,...
  • Page 413 Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays the settings of the syslog servers. Console# show syslog-servers Device Configuration IP address Port Severity Facility...
  • Page 414 Syslog Commands...
  • Page 415: System Management

    System Management ping The ping User EXEC mode command sends ICMP echo request packets to another node on the network. Syntax • ping ip-address | hostname [size packet_size] [count packet_count] [timeout time_out] • ping ipv6 {ipv6-address | hostname} [size packet_size] [count packet_count] [timeout time_out]ip-address —...
  • Page 416 User Guidelines Press Esc to stop pinging. Following are sample results of the ping command: • Destination (host/network) unreachable — The gateway for this destination indicates an unreachable destination. • Destination does not respond — If the host does not respond, a “no answer from host” appears in ten seconds.
  • Page 417: Traceroute

    Console> ping yahoo.com Pinging yahoo.com (66.218.71.198) with 64 bytes of data: 64 bytes from 10.1.1.1: icmp_seq=0. time=11 ms 64 bytes from 10.1.1.1: icmp_seq=1. time=8 ms 64 bytes from 10.1.1.1: icmp_seq=2. time=8 ms 64 bytes from 10.1.1.1: icmp_seq=3. time=7 ms ----10.1.1.1 PING Statistics---- 4 packets transmitted, 4 packets received, 0% packet loss round-trip (ms) min/avg/max = 7/8/11 traceroute...
  • Page 418 ip-address — One of the device’s interface addresses to use as a source address for the probes. The • device normally selects what it feels is the best source address to use. • tos — The Type-Of-Service byte in the IP Header of the packet. (Range: 0 - 255) Default Configuration •...
  • Page 419 Examples The following example discovers the routes that packets will actually take when traveling to their destination. Console> traceroute umaxp1.physics.lsa.umich.edu Type Esc to abort. Tracing the route to umaxp1.physics.lsa.umich.edu (141.211.101.64) 1 i2-gateway.stanford.edu (192.68.191.83) 0 msec 0 msec 0 msec 2 STAN.POS.calren2.NET (171.64.1.213) 0 msec 0 msec 0 msec 3 SUNV--STAN.POS.calren2.net (198.32.249.73) 1 msec 1 msec 1 msec 4 Abilene--QSV.POS.calren2.net (198.32.249.162) 1 msec 1 msec...
  • Page 420: Telnet

    The following table describes characters that may appear in the traceroute command output. Field Description The probe timed out. Unknown packet type. Administratively unreachable. Usually, this output indicates that an access list is blocking traffic. Fragmentation is required and DF is set. Host unreachable.
  • Page 421 Special Telnet Sequences Telnet Sequence Purpose Ctrl-shift-6-b Break Ctrl-shift-6-c Interrupt Process (IP) Ctrl-shift-6-h Erase Character (EC) Ctrl-shift-6-o Abort Output (AO) Ctrl-shift-6-t Are You There? (AYT) Ctrl-shift-6-u Erase Line (EL) At any time during an active Telnet session, Telnet commands can be listed by pressing the Ctrl-shift- 6-? keys at the system prompt.
  • Page 422 Ports Table Keyword Description Port Number Border Gateway Protocol chargen Character generator Remote commands daytime Daytime discard Discard domain Domain Name Service echo Echo exec Exec finger Finger File Transfer Protocol ftp-data FTP data connections gopher Gopher hostname NIC hostname server ident Ident Protocol Internet Relay Chat...
  • Page 423: Resume

    uucp Unix-to-Unix Copy Program whois Nickname World Wide Web • This command lists concurrent telnet connections to remote hosts that were opened by the current telnet session to the local device. It does not list telnet connections to remote hosts that were opened by other telnet sessions.
  • Page 424: Hostname

    Syntax • reload Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example reloads the operating system. Console# reload This command will reset the whole system and disconnect your current session.
  • Page 425: Service Cpu-Utilization

    Example The following example specifies the device host name. Console(config)# hostname Dell Dell(config)# service cpu-utilization The service cpu-utilization global configuration mode command allows the software to measure CPU utilization. Use the no form of this command to disable measuring. Syntax •...
  • Page 426: Stack Reload

    Default Configuration Disables forcing the selection of a stack master. Command Mode Global Configuration mode. User Guidelines • The following algorithm is used to select a unit as the master: – If only one master-enabled unit is in the stack (1 or 2), it becomes the master. –...
  • Page 427: Show Stack

    Example The following example reloads Unit 2 of the stack. Console(config)# stack reload unit 2 show stack The show stack User EXEC mode command displays information about the status of a stack. Syntax • show stack [unit unit] • unit — Specifies the number of the unit. (Range: 1 - 6) Default Configuration This command has no default configuration.
  • Page 428: Show Users

    Topology is Ring Unit Unit Id After Reset ---- --------------- console# show users The show users User EXEC mode command displays information about the active users. Syntax • show users Default Configuration This command has no default configuration. Command Mode User EXEC mode.
  • Page 429: Show Sessions

    Example The following example displays information about the active users. Console> show users Username Protocol Location ---------- ----------- ------------ Serial John 172.16.0.1 Robert HTTP 172.16.0.8 Betty Telnet 172.16.1.7 show sessions The show sessions User EXEC mode command lists open Telnet sessions. Syntax •...
  • Page 430: Show System

    User EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays the system information. Console> show system Unit Type ---- --------- PowerConnect 3524 PowerConnect 3524 PowerConnect 3524 PowerConnect 3524 PowerConnect 3524 System Management...
  • Page 431: Show Version

    PowerConnect 3524 PowerConnect 3524 PowerConnect 3524 Unit Main Power Supply Redundant Power Supply show version The show version User EXEC mode command displays system version information. Syntax • show version [unit unit] • unit — Specifies the number of the unit. (Range: 1 - 6) Default Configuration This command has no default configuration.
  • Page 432: Asset-Tag

    Example The following example displays system version information (only for demonstration purposes). Console> show version SW version 1.0.0.0 (date 23-Jul-2004 time 17:34:19) Boot version 1.0.0.0 (date 11-Jan-2004 time 11:48:21) HW version 1.0.0 Unit SW version Boot version HW version ---- ---------- ------------ ----------...
  • Page 433: Show System Id

    Example The following example specifies the asset tag of the master unit as "1qwepot". Console(config)# asset-tag 1qwepot show system id The show system id User EXEC mode command displays system ID information. Syntax • show system id [unit unit] • unit —...
  • Page 434: Show Cpu Utilization

    show cpu utilization The show cpu utilization Privileged EXEC mode command displays display information about CPU utilization. Syntax • show cpu utilization Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines Use the service cpu-utilization Global Configuration mode command to enable measuring CPU utilization.
  • Page 435: Tacacs+ Commands

    TACACS+ Commands tacacs-server host The tacacs-server host Global Configuration mode command specifies a TACACS+ host. Use the no form of this command to delete the specified name or address. Syntax • tacacs-server host {ip-address | hostname} [single-connection] [port port-number] [timeout timeout] [key key-string] [source source] [priority priority] •...
  • Page 436: Tacacs-Server Key

    TACACS+ daemon. (Range: 0 - 128 characters) Default Configuration Empty string. Command Mode Global Configuration mode. User Guidelines There are no user guidelines for this command. Examples The following example sets the authentication encryption key. Console(config)# tacacs-server key dell-s TACACS+ Commands...
  • Page 437: Tacacs-Server Timeout

    tacacs-server timeout The tacacs-server timeout Global Configuration mode command sets the interval during which the device waits for a TACACS+ server to reply. Use the no form of this command to return to the default configuration. Syntax • tacacs-server timeout timeout •...
  • Page 438: Show Tacacs

    Command Mode Global Configuration mode. User Guidelines There are no user guidelines for this command. Examples The following example specifies the source IP address. Console(config)# tacacs-server source-ip 172.16.8.1 show tacacs The show tacacs Privileged EXEC mode command displays configuration and statistical information about a TACACS+ server.
  • Page 439 Examples The following example displays configuration and statistical information about a TACACS+ server. Console# show tacacs Device Configuration -------------------- IP address Status Port Single TimeOut Source Priority Connection ---------- -------- ---- --------- ------- ------ -------- 172.16.1.1 Connected 49 Global Global Global values ------------- TimeOut: 3...
  • Page 440 TACACS+ Commands...
  • Page 441: Tic Commands

    TIC Commands passwords min-length The passwords min-length Global Configuration mode command sets the minimum length required for passwords in the local database. Use the no form of this command to remove the minimum password length requirement. Syntax • passwords min-length length •...
  • Page 442: Password-Aging

    password-aging The password-aging Line Configuration mode command configures the aging time of line passwords. Use the no form of this command to disable password expiration time. Syntax • password-aging days • no password-aging • days — The number of days before a password change is forced. (Range: 1 - 365) Default Configuration Password aging is disabled.
  • Page 443: Passwords History

    Syntax • passwords aging username name days • no passwords aging username name • passwords aging enable-password level days • no passwords aging enable-password level • name — The name of the user. (Range: 1 - 20 characteres) • level — The level for which the password applies. (Range: 1 - 15) •...
  • Page 444: Passwords History Hold-Time

    Default Configuration No required number of password changes before reusing a password. Command Mode Global Configuration mode. User Guidelines • Relevant to local user passwords, line passwords, and enable passwords. • Password history is not checked during the configuration download. •...
  • Page 445: Passwords Lockout

    User Guidelines Relevant to local user passwords, line passwords, and enable passwords. For tracking purposes, passwords are not deleted from the history database after becoming ’irrelevant’. A period of time that the password cannot be changed (according to the history table) must be configured. By increasing a password ’s relevance for tracking purposes by a number of days, it may cause the irrelevant password to be relevant again.
  • Page 446: Aaa Login-History File

    aaa login-history file The aaa login-history file Global Configuration mode command enables writing to the login history file. Use the no form of this command to disable writing to the file. Syntax • aaa login-history file • no aaa login-history file Default Configuration Writing to the login history file is enabled.
  • Page 447: Set Line Active

    Example The following example reactivates a suspended user with username bob. Console# set username bob active set line active The set line active Privileged EXEC mode command reactivates a locked line. Syntax • set line {console | telnet | ssh} active •...
  • Page 448: Show Passwords Configuration

    Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example reactivates a locked level 15 enable password. Console# set enable-password 15 active show passwords configuration The show passwords configuration Privileged EXEC mode command displays information about password management.
  • Page 449 Enable Passwords Level Aging Expiry date Lockout ----- ----- ----------- ------- Jan 18 2005 Jan 18 2005 Line Passwords Level Aging Expiry date Lockout ----- ----- ----------- ------- Console Telnet Jan 18 2005 LOCKOUT Jan 21 2005 The following table describes significant fields shown above. Field Description Minimal length...
  • Page 450: Show Users Login-History

    show users login-history The show users login-history Privileged EXEC mode command displays information about the login history of users. Syntax • show users login-history [username name] name — Name of the user. (Range: 1 - 20 characters) • Default Configuration This command has no default configuration.
  • Page 451: Show Users Accounts

    show users accounts The show users accounts Privileged EXEC mode command displays information about the local user database. Syntax • show users accounts Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays the local users configured with access to the system.
  • Page 452 TIC Commands...
  • Page 453: Tunnel

    Tunnel interface tunnel The interface tunnel Global Configuration mode command enters tunnel interface configuration mode. Syntax • interface tunnel number • number — Tunnel index. (Range: 1) Default Configuration This command has no default configuration. Command Mode Global Configuration mode. User Guidelines There are no user guidelines for this command.
  • Page 454: Tunnel Isatap Router

    Syntax • tunnel mode ipv6ip {isatap} • no tunnel mode ipv6ip • isatap — Automatic IPv6 over IPv4 ISATAP tunnel is enabled. Default Configuration Disabled. Command Mode Interface Tunnel Configuration mode. User Guidelines The system can be enabled to an ISATAP tunnel. When enabled, an automatic tunnel interface is created on each interface that is assigned with IPv4 address NOTE: On a specific interface (that is port/ VLAN), both native IPV6 and transition mechanisms can coexist.
  • Page 455: Tunnel Source

    Command Mode Interface Tunnel Configuration mode. User Guidelines • The ipv6 tunnel routers-dns command determines the string that the host uses for automatic tunnel router lookup in IPv4 DNS procedure. By default, the string ‘ISATAP’ is used for the corresponding automatic tunnel types.
  • Page 456: Tunnel Isatap Query-Interval

    Command Mode Interface Tunnel Configuration mode. User Guidelines The configured source IPv4 address is used for forming the tunnel interface identifier. The interface identifier is set to the 8 least significant bytes of the SIP field of the encapsulated IPv6 tunneled packets. Example The following example sets the local (source) tunnel interface IPv4 address.
  • Page 457: Tunnel Isatap Solicitation-Interval

    tunnel isatap solicitation-interval The tunnel isatap solicitation-interval Global Configuration mode command configures the interval between ISATAP router solicitations messages (when there is no active ISATAP router). Use the no form of this command to return to default. Syntax • tunnel isatap solicitation-interval seconds •...
  • Page 458: Tunnel Isatap Robustness

    tunnel isatap robustness The tunnel isatap robustness Global Configuration mode command configures the number of DNS Query/Router Solicitation refresh messages that the device sends. Use the no form of this command to return to default. Syntax • tunnel isatap robustness number •...
  • Page 459 Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays information on the ISATAP tunnel. Console> show ipv6 tunnel Router DNS name: ISATAP Router IPv4 address: 172.16.1.1 DNS Query interval: 10 seconds Min DNS Query interval: 0 seconds Router Solicitation interval: 10 seconds Min Router Solicitation interval: 0 seconds...
  • Page 460 Tunnel...
  • Page 461: User Interface

    User Interface enable The enable User EXEC mode command enters the Privileged EXEC mode. Syntax • enable [privilege-level] • privilege-level — Privilege level to enter the system. (Range: 1 - 15) Default Configuration The default privilege level is 15. Command Mode User EXEC mode.
  • Page 462: Login

    Default Configuration The default privilege level is 1. Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example returns to Users EXEC mode. Console# disable Console> login The login User EXEC mode command changes a login username. Syntax •...
  • Page 463: Configure

    configure The configure Privileged EXEC mode command enters the Global Configuration mode. Syntax • configure Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example enters Global Configuration mode. Console# configure Console(config)# exit (Configuration)
  • Page 464: Exit

    Example The following example changes the configuration mode from Interface Configuration mode to Privileged EXEC mode. Console(config-if)# exit Console(config)# exit Console# exit The exit Privileged/User EXEC mode command closes an active terminal session by logging off the device. Syntax • exit Default Configuration This command has no default configuration.
  • Page 465: Help

    Command Mode All configuration modes. User Guidelines There are no user guidelines for this command. Example The following example changes from Global Configuration mode to Privileged EXEC mode Console(config)# end Console# help The help command displays a brief description of the help system. Syntax •...
  • Page 466: Terminal Datadump

    Example The following example describes the help system Console# help Help may be requested at any point in a command by entering a question mark '?'. If nothing matches the currently entered incomplete command, the help list is empty. This indicates that for a query at this point, there is no command matching the current input.
  • Page 467: Show History

    Example This example dumps all output immediately after entering a show command. Console> terminal datadump show history The show history User EXEC mode command lists the commands entered in the current session. Syntax • show history Default Configuration This command has no default configuration. Command Mode User EXEC mode.
  • Page 468: Show Privilege

    show privilege The show privilege Privileged/User EXEC mode command displays the current privilege level. Syntax • show privilege Default Configuration This command has no default configuration. Command Mode Privileged and User EXEC modes. User Guidelines There are no user guidelines for this command. Example The following example displays the current privilege level for the Privileged EXEC mode.
  • Page 469: Vlan Commands

    VLAN Commands vlan database The vlan database Global Configuration mode command enters the VLAN Configuration mode. Syntax • vlan database Default Configuration This command has no default configuration. Command Mode Global Configuration mode. User Guidelines There are no user guidelines for this command. Example The following example enters the VLAN database mode.
  • Page 470: Interface Vlan

    Default Configuration This command has no default configuration. Command Mode VLAN Configuration mode. User Guidelines There are no user guidelines for this command. Example The following example VLAN number 1972 is created. Console(config)# vlan database Console(config-vlan)# vlan 1972 interface vlan The interface vlan Global Configuration mode command enters the Interface Configuration (VLAN) mode.
  • Page 471: Interface Range Vlan

    interface range vlan The interface range vlan Global Configuration mode command enables simultaneously configuring multiple VLANs. Syntax • interface range vlan {vlan-range | all} vlan-range — Specifies a list of VLAN IDs to be added. Separate non-consecutive VLAN IDs with •...
  • Page 472: Switchport Access Vlan

    Default Configuration No name is defined. Command Mode Interface Configuration (VLAN) mode. Cannot be configured for a range of interfaces (range context). User Guidelines There are no user guidelines for this command. Example The following example gives VLAN number 19 the name Marketing. Console(config)# interface vlan 19 Console(config-if)# name Marketing switchport access vlan...
  • Page 473: Switchport Trunk Allowed Vlan

    Example The following example configures a VLAN ID of 23 to the untagged layer 2 VLAN Ethernet port 1/e16. Console(config)# interface ethernet 1/e16 Console(config-if)# switchport access vlan 23 switchport trunk allowed vlan The switchport trunk allowed vlan Interface Configuration mode command adds or removes VLANs to or from a trunk port.
  • Page 474: Switchport General Allowed Vlan

    Syntax • switchport trunk native vlan vlan-id • no switchport trunk native vlan • vlan-id — Specifies the ID of the native VLAN. Default Configuration VID=1. Command Mode Interface Configuration (Ethernet, port-channel) mode. User Guidelines The command adds the port as a member in the VLAN. If the port is already a member in the VLAN (not as a native), it should be first removed from the VLAN.
  • Page 475: Switchport General Pvid

    Default Configuration If the port is added to a VLAN without specifying tagged or untagged, the default setting is tagged. Command Mode Interface Configuration (Ethernet, port-channel) mode. User Guidelines This command enables changing the egress rule (e.g., from tagged to untagged) without first removing the VLAN from the list.
  • Page 476: Switchport General Ingress-Filtering Disable

    Example The following example configures the PVID for Ethernet port 1/e16, when the interface is in general mode. Console(config)# interface ethernet 1/e16 Console(config-if)# switchport general pvid 234 switchport general ingress-filtering disable The switchport general ingress-filtering disable Interface Configuration mode command disables port ingress filtering.
  • Page 477: Switchport Forbidden Vlan

    Default Configuration All frame types are accepted at ingress. Command Mode Interface Configuration (Ethernet, port-channel) mode. User Guidelines There are no user guidelines for this command. Example The following example configures Ethernet port 1/e16 to discard untagged frames at ingress. Console(config)# interface ethernet 1/e16 Console(config-if)# switchport general acceptable-frame-type tagged-only...
  • Page 478: Switchport Mode

    Example The following example forbids adding VLAN IDs 234 to 256 to Ethernet port 1/e16. Console(config)# interface ethernet 1/e16 Console(config-if)# switchport forbidden vlan add 234-256 switchport mode The switchport mode Interface Configuration mode command configures the VLAN membership mode of a port. Use the no form of this command to reset the mode to the appropriate default for the device. Syntax switchport mode { access | trunk | general | customer } •...
  • Page 479: Switchport Customer Vlan

    switchport customer vlan Use the switchport customer vlan interface configuration command set the port’s VLAN when the interface is in customer mode. Use the no form of this command to revert to default. Syntax • switchport customer vlan vlan-id • no switchport customer vlan vlan-id —...
  • Page 480: Map Protocol Protocols-Group

    Command Mode Interface Configuration (Ethernet, port-channel) mode. User Guidelines Use this command to override the FDB decision, and forward the packet to the uplink. Please note that the packet is still subject to all filtering decisions. The following example overrides the FDB decision, and sends all the Unicast, Multicast and Broadcast traffic to specified ethernet port.
  • Page 481: Switchport General Map Protocols-Group Vlan

    Example The following example maps protocol ip-arp to the group named "213". Console (config)# vlan database Console (config-vlan)# map protocol ip-arp protocols-group 213 switchport general map protocols-group vlan The switchport general map protocols-group vlan Interface Configuration mode command sets a protocol-based classification rule.
  • Page 482: Ip Internal-Usage-Vlan

    ip internal-usage-vlan The ip internal-usage-vlan Interface Configuration mode command reserves a VLAN as the internal usage VLAN of an interface. Use the no form of this command to return to the default configuration. Syntax • ip internal-usage-vlan vlan-id • no ip internal-usage-vlan •...
  • Page 483: Mac-To-Vlan

    mac-to-vlan The mac-to-vlan VLAN Configuration mode command adds MAC addresses to the MAC-to-VLAN database. Use the no form of this command to remove MAC addresses from the database. NOTE: The command mac-to-vlan is deprecated in versions where DVA is supported. Syntax mac-to-vlan mac-address vlan-id •...
  • Page 484: Show Vlan Mac-To-Vlan

    show vlan mac-to-vlan The show vlan mac-to-vlan Privileged EXEC mode command displays the MAC-to-VLAN database. NOTE: The command mac-to-vlan is deprecated in versions where DVA is supported. Syntax • show vlan mac-to-vlan [mac-address] • mac-address — Specifies the MAC address to be viewed. Default Configuration This command has no default configuration.
  • Page 485: Show Vlan Protocols-Groups

    Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays all VLAN information. Console# show vlan VLAN Name Ports Type Authorization ---- ------- -------- ----...
  • Page 486: Show Vlan Internal Usage

    Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays protocols-groups information. Console# show vlan protocols-groups Encapsulation Protocol Group Id ------------- -------- -------- ethernet 08 00 ethernet 08 06 ethernet 81 37 ethernet 81 38...
  • Page 487: Show Interfaces Switchport

    Example The following example displays VLANs used internally by the device. Console# show vlan internal usage VLAN Usage IP address Reserved ---- --------- ---------- -------- 1007 Eth 1/e21 Active 1008 Eth 1/e22 Inactive 1009 Eth 1/e23 Active show interfaces switchport The show interfaces switchport Privileged EXEC mode command displays the switchport configuration.
  • Page 488 Example The following example displays the switchport configuration for Ethernet port 1/e1. Console# show interface switchport ethernet 1/e1 Port 1/e1: VLAN Membership mode: General Operating parameters: PVID: 1 (default) Ingress Filtering: Enabled Acceptable Frame Type: All GVRP status: Enabled Protected: Enabled, Uplink is 1/e9. Port is member in: Vlan Name...
  • Page 489 Port is statically configured to: Vlan Name Egress rule ---- ------- ----------- default untagged VLAN011 tagged IPv6 VLAN untagged VLAN0072 untagged Forbidden VLANS: VLAN Name ---- ---- Console# show interface switchport ethernet 1/e2 Port 1/e2: VLAN Membership mode: General Operating parameters: PVID: 4095 (discard vlan) Ingress Filtering: Enabled Acceptable Frame Type: All...
  • Page 490 Port is statically configured to: Vlan Name Egress rule ---- ------------ ----------- VLAN0072 untagged IP Telephony tagged Forbidden VLANS: VLAN Name ---- ---- Port 2/e19 VLAN Membership mode: Private-VLAN Community Primary VLAN: 2921 Community VLAN: 2922 Console# show interfaces switchport ethernet 2/e19 Port 2/e19: VLAN Membership mode: Private-VLAN Community Operating parameters:...
  • Page 491 Port is member in: Vlan Name Egress rule Type ---- ------------ ----------- ------ 2921 Primary A untagged Static 2922 Community A1 untagged Static Static configuration: PVID: 2922 Ingress Filtering: Enabled Acceptable Frame Type: Untagged GVRP status: Disabled VLAN Commands...
  • Page 492 VLAN Commands...
  • Page 493: Voice Vlan

    Voice VLAN voice vlan id The voice vlan id Global Configuration mode command enables the voice VLAN, and configures the voice VALN id. To disable the voice VALN, enter the no form of this command. Syntax • voice vlan id vlan-id •...
  • Page 494 • mac-address-prefix — Specify the MAC address prefix to be entered to the list. • description text — An optional text that describes the OUI. Default Configuration Description 00:E0:BB 3COM 00:03:6B Cisco 00:E0:75 Veritel 00:D0:1E Pingtel 00:01:E3 Simens 00:60:B9 NEC/Philips 00:0F:E2 Huawei-3COM Command Mode...
  • Page 495: Voice Vlan Cos

    MAC Address - Prefix Description ---------------------- ----------------------- 00:01:e3 Siemens_AG_phone________ 00:03:6b Cisco_phone_____________ 00:09:6e Avaya___________________ 00:0f:e2 H3C_Aolynk______________ 00:60:b9 Philips_and_NEC_AG_phone 00:d0:1e Pingtel_phone___________ 00:e0:75 Polycom/Veritel_phone___ console# voice vlan cos The voice vlan cos Global Configuration mode command sets the voice VLAN Class Of Service. Use the no form of this command to return to default.
  • Page 496: Voice Vlan Aging-Timeout

    voice vlan aging-timeout The voice vlan aging-timeout Global Configuration mode command sets the voice VLAN aging timeout. Use the no form of this command to return to default. Syntax • voice vlan aging-timeout minutes • no voice vlan aging-timeout • minutes —...
  • Page 497: Voice Vlan Secure

    User Guidelines The port is added to the voice VLAN if a packet with a telephony MAC address source MAC address (defined by the voice vlan oui-table global configuration command) is trapped on the port. NOTE: The VLAN ID of the packet can be the voice VLAN ID or any other VLAN. The port joins the voice VLAN as a tagged port.
  • Page 498: Show Voice Vlan

    show voice vlan The show voice vlan EXEC mode command displays the voice VLAN status.s Syntax • show voice vlan [ ethernet interface | port-channel port-channel-number ] • interface — Ethernet interface • port-channel-number — Port Channel interface Default Configuration Description 0001e3 Siemens_AG_phone...
  • Page 499 Example The following example displays the voice VLAN configuration. Console Switch# show voice vlan Aging timeout: 1440 minutes OUI table MAC Address-Prefix Description 00:E0:BB 3COM 00:03:6B Cisco 00:E0:75 Veritel 00:D0:1E Pingtel 00:01:E3 Simens 00:60:B9 NEC/Philips 00:0F:E2 Huawei-3COM Voice VLAN VLAN ID: 8 CoS: 6 Interface Enabled...
  • Page 500 Voice VLAN...
  • Page 501: Web Server

    Web Server ip http server The ip http server Global Configuration mode command enables configuring the device from a browser. Use the no form of this command to disable this function. Syntax • ip http server • no ip http server Default Configuration HTTP server is enabled.
  • Page 502: Ip Http Exec-Timeout

    Default Configuration The default port number is 80. Command Mode Global Configuration mode. User Guidelines Specifying 0 as the port number effectively disables HTTP access to the device. Example The following example configures the http port number to 100. Console(config)# ip http port 100 ip http exec-timeout The ip http exec-timeout global configuration command sets the interval the system waits for user input before automatically logging off.
  • Page 503: Ip Https Server

    Example The following example the interval the system waits for user input before automatically logging off to 3 minutes 30 seconds. Console (config)# ip http exec-timeout 3 30 ip https server The ip https server Global Configuration mode command enables configuring the device from a secured browser.
  • Page 504: Ip Https Exec-Timeout

    Default Configuration The default port number is 443. Command Mode Global Configuration mode. User Guidelines Specifying 0 as the port number effectively disables HTTPS access to the device. Example The following example configures the https port number to 100. Console(config)# ip https port 100 ip https exec-timeout The ip https exec-timeout Global Configuration command sets the interval the system waits for user input before automatically logging off.
  • Page 505: Crypto Certificate Generate

    Example The following example the interval the system waits for user input before automatically logging off to 3 minutes 30 seconds. Console (config)# ip https exec-timeout 3 30 crypto certificate generate The crypto certificate generate Global Configuration mode command generates a self-signed HTTPS certificate.
  • Page 506: Crypto Certificate Request

    Command Mode Global Configuration mode. User Guidelines • The command is not saved in the device configuration; however, the certificate and keys generated by this command are saved in the private configuration (which is never displayed to the user or backed up to another device).
  • Page 507 Command Mode Privileged EXEC mode. User Guidelines • Use this command to export a certificate request to a Certification Authority. The certificate request is generated in Base64-encoded X.509 format. • Before generating a certificate request you must first generate a self-signed certificate using the ip https exec-timeout Global Configuration mode command.
  • Page 508: Crypto Certificate Import

    crypto certificate import The crypto certificate import Global Configuration mode command imports a certificate signed by the Certification Authority for HTTPS. Syntax • crypto certificate number import number — Specifies the certificate number. (Range: 1 - 2) • Default Configuration This command has no default configuration.
  • Page 509: Ip Https Certificate

    Examples The following example imports a certificate signed by Certification Authority for HTTPS. Console(config)# crypto certificate 1 import -----BEGIN CERTIFICATE----- dHmUgUm9vdCBDZXJ0aWZpZXIwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAp4HS nnH/xQSGA2ffkRBwU2XIxb7n8VPsTm1xyJ1t11a1GaqchfMqqe0kmfhcoHSWr yf1FpD0MWOTgDAwIDAQABo4IBojCCAZ4wEwYJKwYBBAGCNxQCBAYeBABDAEEw CwR0PBAQDAgFGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFAf4MT9BRD47 ZvKBAEL9Ggp+6MIIBNgYDVR0fBIIBLTCCASkwgdKggc+ggcyGgclsZGFwOi8v L0VByb3h5JTIwU29mdHdhcmUlMjBSb290JTIwQ2VydGlmaWVyLENOPXNlcnZl -----END CERTIFICATE----- Certificate imported successfully. Issued to: router.gm.com Issued by: www.verisign.com Valid from: Jan 1 02:44:50 2003 GMT Valid to: Dec 31 02:44:50 2004 GMT Subject: CN= router.gm.com, 0= General Motors, C= US Finger print: DC789788 DC88A988 127897BC BB789788...
  • Page 510: Show Crypto Certificate Mycertificate

    Default Configuration Certificate number 1. Command Mode Global Configuration mode. User Guidelines The ip https exec-timeout command should be used to generate HTTPS certificates. Example The following example configures the active certificate for HTTPS. Console(config)# ip https certificate 1 show crypto certificate mycertificate The show crypto certificate mycertificate Privileged EXEC mode command displays the SSH certificates of the device.
  • Page 511: Show Ip Http

    Example The following example displays the certificate. Console# show crypto certificate mycertificate 1 -----BEGIN CERTIFICATE----- dHmUgUm9vdCBDZXJ0aWZpZXIwXDANBgkqhkiG9w0BAQEFAANLADBIAkEAp4HS nnH/xQSGA2ffkRBwU2XIxb7n8VPsTm1xyJ1t11a1GaqchfMqqe0kmfhcoHSWr yf1FpD0MWOTgDAwIDAQABo4IBojCCAZ4wEwYJKwYBBAGCNxQCBAYeBABDAEEw CwR0PBAQDAgFGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFAf4MT9BRD47 ZvKBAEL9Ggp+6MIIBNgYDVR0fBIIBLTCCASkwgdKggc+ggcyGgclsZGFwOi8v L0VByb3h5JTIwU29mdHdhcmUlMjBSb290JTIwQ2VydGlmaWVyLENOPXNlcnZl -----END CERTIFICATE----- Issued by: www.verisign.com Valid from: Jan 1 02:44:50 2003 GMT Valid to: Dec 31 02:44:50 2004 GMT Subject: CN= router.gm.com, 0= General Motors, C= US Finger print: DC789788 DC88A988 127897BC BB789788 show ip http...
  • Page 512: Show Ip Https

    Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Example The following example displays the HTTP server configuration. Console# show ip http HTTP server enabled. Port: 80 show ip https The show ip https Privileged EXEC mode command displays the HTTPS server configuration. Syntax •...
  • Page 513 Example The following example displays the HTTP server configuration. Console# show ip https HTTPS server enabled. Port: 443 Certificate 1 is active Issued by: www.verisign.com Valid from: Jan 1 02:44:50 2004 GMT Valid to: Dec 31 02:44:50 2005 GMT Subject: CN= router.gm.com, 0= General Motors, C= US Finger print: DC789788 DC88A988 127897BC BB789788 Certificate 2 is inactive Valid From: Jan 1 02:44:50 2004 GMT...
  • Page 514 Web Server...
  • Page 515: 802.1X Commands

    802.1x Commands aaa authentication dot1x The aaa authentication dot1x Global Configuration mode command specifies one or more authentication, authorization, and accounting (AAA) methods for use on interfaces running IEEE 802.1X. Use the no form of this command to return to the default configuration. Syntax •...
  • Page 516: Dot1X System-Auth-Control

    Examples The following example uses the aaa authentication dot1x default command with no authentication. Console(config)# aaa authentication dot1x default none dot1x system-auth-control The dot1x system-auth-control Global Configuration mode command enables 802.1x globally. Use the no form of this command to return to the default configuration. Syntax •...
  • Page 517: Dot1X Re-Authentication

    Syntax • dot1x port-control {auto | force-authorized | force-unauthorized} • no dot1x port-control • auto — Enables 802.1X authentication on the interface and causes the port to transition to the authorized or unauthorized state based on the 802.1X authentication exchange between the port and the client.
  • Page 518: Dot1X Timeout Re-Authperiod

    Default Configuration Periodic re-authentication is disabled. Command Mode Interface Configuration (Ethernet) mode. User Guidelines There are no user guidelines for this command. Examples The following example enables periodic re-authentication of the client. Console(config)# interface ethernet 1/e16 Console(config-if)# dot1x re-authentication dot1x timeout re-authperiod The dot1x timeout re-authperiod Interface Configuration mode command sets the number of seconds between re-authentication attempts.
  • Page 519: Dot1X Re-Authenticate

    Examples The following example sets the number of seconds between re-authentication attempts, to 300. Console(config)# interface ethernet 1/e16 Console(config-if)# dot1x timeout re-authperiod 300 dot1x re-authenticate The dot1x re-authenticate Privileged EXEC mode command manually initiates a re-authentication of all 802.1X-enabled ports or the specified 802.1X-enabled port. Syntax dot1x re-authenticate [ethernet interface] •...
  • Page 520: Dot1X Timeout Tx-Period

    seconds — Specifies the time in seconds that the device remains in the quiet state following a • failed authentication exchange with the client. (Range: 0 - 65535 seconds) Default Configuration Quiet period is 60 seconds. Command Mode Interface Configuration (Ethernet) mode. User Guidelines •...
  • Page 521: Dot1X Max-Req

    Command Mode Interface Configuration (Ethernet) mode. User Guidelines The default value of this command should be changed only to adjust for unusual circumstances, such as unreliable links or specific behavioral problems with certain clients. and authentication servers Examples The following command sets the number of seconds that the device waits for a response to an EAP- request/identity frame, to 3600 seconds.
  • Page 522: Dot1X Timeout Supp-Timeout

    Examples The following example sets the number of times that the device sends an EAP-request/identity frame to 6 . Console(config)# interface ethernet 1/e16 Console(config-if)# dot1x max-req 6 dot1x timeout supp-timeout The dot1x timeout supp-timeout Interface Configuration mode command sets the time for the retransmission of an Extensible Authentication Protocol (EAP)-request frame to the client.
  • Page 523: Dot1X Send-Async-Request-Id

    Syntax • dot1x timeout server-timeout seconds • no dot1x timeout server-timeout • seconds — Time in seconds that the device waits for a response from the authentication server. (Range: 1 - 65535 seconds) Default Configuration The timeout period is 30 seconds. Command Mode Interface configuration (Ethernet) mode.
  • Page 524: Show Dot1X

    Default no by default Command Modes Interface configuration (Ethernet) Usage Guidelines The command causes 802.1x switch to send Extensible Authentication Protocol (EAP)-request/identity frame from the authenticator (switch) each tx-period automatically. It is recommended to activate this command only in case there is at least one device with not full 802.1x functionality connected to port (for example Windows EX with Service Pack 2).
  • Page 525 Example The following example displays the status of 802.1X-enabled Ethernet ports. Console# show dot1x 802.1x is enabled Port Admin Mode Oper Mode Reauth Reauth Username Control Period ---- ---------- --------- ------- ------ -------- 1/e1 Auto Authorized 3600 1/e2 Auto Authorized 3600 John 1/e3...
  • Page 526 Authentication Method: Remote Termination Cause: Supplicant logoff Authenticator State Machine State: HELD Backend State Machine State: IDLE Authentication success: 9 Authentication fails: 1 The following table describes significant fields shown above: Field Description Port The port number. Admin mode The port admin mode. Possible values: Force-auth, Force-unauth, Auto. Oper mode The port oper mode.
  • Page 527: Show Dot1X Users

    MAC address The supplicant MAC address. Authentication Method The authentication method used to establish the session. Termination Cause The reason for the session termination. State The current value of the Authenticator PAE state machine and of the Backend state machine. Authentication success The number of times the state machine received a Success message from the Authentication Server.
  • Page 528: Show Dot1X Statistics

    Example The following example displays 802.1X users. Console# show dot1x users Port Username Session Time Auth Method MAC Address ----- -------- ------------ ----------- -------------- 1/e1 1d:03:08.58 Remote 0008:3b79:8787 1/e2 John 08:19:17 None 0008:3b89:3127 Console# show dot1x users username Bob Username: Bob Port Username Session Time...
  • Page 529 Command Mode Privileged EXEC mode. User Guidelines There are no user guidelines for this command. Examples The following example displays 802.1X statistics for the specified interface. Console# show dot1x statistics ethernet 1/e1 EapolFramesRx: 11 EapolFramesTx: 12 EapolStartFramesRx: 12 EapolLogoffFramesRx: 1 EapolRespIdFramesRx: 3 EapolRespFramesRx: 6 EapolReqIdFramesTx: 3...
  • Page 530: Advanced Features

    The following table describes the significant fields shown in the display: Field Description EapolFramesRx The number of valid EAPOL frames of any type that have been received by this Authenticator. EapolFramesTx The number of EAPOL frames of any type that have been transmitted by this Authenticator.
  • Page 531: Dot1X Multiple-Hosts

    Default Configuration Access is enabled. Command Mode Interface Configuration (VLAN) mode. User Guidelines • An access port cannot be a member in an unauthenticated VLAN. • The native VLAN of a trunk port cannot be an unauthenticated VLAN. • For a general port, the PVID can be an unauthenticated VLAN (although only tagged packets are accepted in the unauthorized state.) Examples The following example enables access to the VLAN to unauthorized devices.
  • Page 532: Dot1X Single-Host-Violation

    Examples The following command enables multiple hosts (clients) on an 802.1X-authorized port. Console(config-if)# dot1x multiple-hosts dot1x single-host-violation The dot1x single-host-violation Interface Configuration mode command configures the action to be taken, when a station whose MAC address is not the supplicant MAC address, attempts to access the interface.
  • Page 533: Dot1X Guest-Vlan

    dot1x guest-vlan The dot1x guest-vlan Interface Configuration mode command defines a guest VLAN. Use the no form of this command to return to the default configuration. Syntax • dot1x guest-vlan • no dot1x guest-vlan Default Configuration No VLAN is defined as a guest VLAN. Command Mode Interface Configuration (VLAN) mode.
  • Page 534: Dot1X Guest-Vlan Enable

    dot1x guest-vlan enable The dot1x vlans guest-vlan enable Interface Configuration mode command enables unauthorized users on the interface access to the Guest VLAN. Use the no form of this command to disable access Syntax • dot1x guest-vlan enable • no dot1x guest-vlan enable Default Configuration Disabled.
  • Page 535: Dot1X Traps Mac-Authentication Failure

    Default Configuration Disabled. Command Mode Interface configuration (Ethernet) mode User Guidelines • Guest VLAN must be enabled, when MAC authentication is enabled. • Static MAC addresses cannot be aurhorized. Do not change authenticated MAC address to static address. • It is not recommended to delete authenticated MAC addresses. •...
  • Page 536: Dot1X Radius-Attributes Vlan

    Example The following command enables sending traps when a MAC address was failed in authentication of the 802.1X MAC authentication access control. console config-if(Config)# dot1x traps mac-authentication failure dot1x radius-attributes vlan The dot1x radius-attributes vlan Interface Configuration mode command enables user-based VLAN assignment.
  • Page 537: Show Dot1X Advanced

    show dot1x advanced The show dot1x advanced Privileged EXEC mode command displays 802.1X advanced features for the device or specified interface. Syntax • show dot1x advanced [ethernet interface] interface — Valid Ethernet port. (Full syntax: unit/port) • Default Configuration This command has no default configuration. Command Mode Privileged EXEC mode.
  • Page 538 Authenticate Disabled Disabled Disabled False Authenticate Disabled Disabled Disabled False Authenticate Disabled Disabled Disabled False Authenticate Disabled Disabled Disabled False Authenticate Disabled Disabled Disabled False Authenticate Disabled Disabled Disabled False Authenticate Enabled Disabled Enabled False Authenticate Disabled Disabled Disabled False Authenticate Disabled Disabled...

Table of Contents