Page 2
SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V G, V G, PSPT, XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co., Ltd. All other trademarks that may be mentioned in this manual are the property of their respective owners.
Page 3
This documentation is intended for: Network planners Field technical support and servicing engineers Network administrators working with the S3100 series Organization H3C S3100 Series Ethernet Switches Command Reference-Release 22XX Series is organized as follows: Part Description 01-CLI Commands CLI configuration commands...
Page 4
Part Description 09-Port Basic Configuration Port basic configuration commands Commands 10-Port Aggregation Commands Port aggregation configuration commands 11-Port Isolation Commands Port isolation configuration commands Port security commands 12-Port Security-Port Binding Commands Port binding commands (applicable only to the S3100-EI series) 13-DLDP Commands DLDP configuration commands (applicable only to the S3100-EI series) 14-MAC Address Table...
CFD configuration commands (applicable only to the S3100-EI series) Software Version H3C S3100 Series Ethernet Switches Operation Manual-Release 22XX Series and H3C S3100 Series Ethernet Switches Command Manual-Release 22XX Series are for the software version Release 22XX Series of the S3100-SI series and S3100-EI series switches.
Page 7
Added commands compared with the earlier Software version Part version Release 2108P04 cluster-snmp-agent usm-user v3 vlan-mapping n-to-1 36-VLAN Mapping dhcp-snooping information Commands ignore-vlanmapping dhcp-snooping ipv6 information enable dhcp-snooping ipv6 information option { 18 | 37 } 38-IPv6 Management Commands dhcp-snooping ipv6 information remote-id { ipv4-address ipv4-address | ipv6-address ipv6-address | string string | sysname } Ethernet OAM commands (applicable only to the...
Page 8
Added commands compared with the earlier Software version Part version Release 2108P04 Add commands (applicable only to the S3100-EI series) : web-authentication customize, web-authentication cut connection, web-authentication enable, web-authentication free-ip, web-authentication free-user, web-authentication max-connection, 20-Web Authentication web-authentication protocol, Commands web-authentication select method, web-authentication timer idle-cut, web-authentication timer max-online, web-authentication web-server, display...
Page 9
Added commands compared with the earlier Software version Part version Release 2108P04 ARP/IP attack defense based on 802.1x commands (applicable only to the S3100-EI series) LLDP commands 42-LLDP Commands PKI commands 43-PKI Commands SSL commands 44-SSL Commands HTTPS commands 45-HTTPS Commands Compared with Release 21XX Series, some commands are extended in Release 22XX Series.
Page 11
Means an action or information that needs special attention to ensure successful configuration or good performance. Means a complementary description. Means techniques helpful for you to make configuration with ease. About the H3C S3100 Documentation Set The H3C S3100 documentation set includes: Category Documents...
Obtaining Documentation You can access the most up-to-date H3C product documentation on the World Wide Web at http://www.h3c.com. Click the links on the top navigation bar to obtain different categories of product documentation: [Technical Support & Documents > Technical Documents] –...
Parameters level level: Command level to be set, in the range of 0 to 3. view view: CLI view. It can be any CLI view that the Ethernet switch supports. The S3100 series support only the CLI views listed in...
Page 15
CLI view Description hwtacacs HWTACACS view IPv6 multicast VLAN view, which is supported by only the ipv6-mvlan S3100-EI series ISP domain view Scheduled task view loopback Loopback interface view luser Local user view manage-vlan Management VLAN view MLD snooping view, which is supported by only the mld-snooping S3100-EI series mst-region...
Page 16
Commands fall into four levels: visit (level 0), monitor (level 1), system (level 2), and manage (level 3). The administrator can change the level of a command as required. For example, the administrator can change a command from a higher level to a lower level so that the lower level users can use the command.
[Sysname] command-privilege level 0 view shell tftp [Sysname] command-privilege level 0 view shell tftp 192.168.0.1 [Sysname] command-privilege level 0 view shell tftp 192.168.0.1 get [Sysname] command-privilege level 0 view shell tftp 192.168.0.1 get bootrom.btm # Restore the default level of the tftp get command. To restore the default levels of the commands starting with the tftp keyword, you only need to specify the tftp keyword.
Description Use the super command to switch from the current user level to a specified level. Executing this command without the level argument will switch the current user level to level 3 by default. Note that: Users logged into the switch fall into four user levels, which correspond to the four command levels respectively.
Description Use the super authentication-mode command to specify the authentication mode used for low-to-high user level switching. Use the undo super authentication-mode command to restore the default. By default, super password authentication is adopted for low-to-high user level switching. Note that the two authentication modes, super password authentication and HWTACACS authentication, are available at the same time to provide authentication redundancy.
Page 20
Input a plain-text password, that is, a string of 1 to 16 characters, which will be automatically converted into a 24-character cipher-text password. Directly input a cipher-text password, that is, a string of 1 to 24 characters, which must correspond to a plain-text password.
Login Commands Login Commands authentication-mode Syntax authentication-mode { password | scheme [ command-authorization ] | none } View User interface view Parameters none: Specifies not to authenticate users. password: Authenticates users using the local password. scheme: Authenticates users locally or remotely using usernames and passwords. command-authorization: Performs command authorization on TACACS authentication server.
Page 23
To improve security and prevent attacks to the unused Sockets, TCP 23 and TCP 22, ports for Telnet and SSH services respectively, will be enabled or disabled after corresponding configurations. If the authentication mode is none, TCP 23 will be enabled, and TCP 22 will be disabled. If the authentication mode is password, and the corresponding password has been set, TCP 23 will be enabled, and TCP 22 will be disabled.
auto-execute command Syntax auto-execute command text undo auto-execute command View VTY user interface view Parameters text: Command to be executed automatically. Description Use the auto-execute command command to set the command that is executed automatically after a user logs in. Use the undo auto-execute command command to disable the specified command from being automatically executed.
Note that these two commands apply to users logging in through the console port and by means of Telnet. Examples # Disable copyright information displaying. ************************************************************************** * Copyright (c) 2004-2008 Hangzhou H3C Tech. Co., Ltd. All rights reserved.* * Without the owner's prior written consent, * no decompiling or reverse-engineering shall be allowed. ************************************************************************** <Sysname> system-view System View: return to User View with Ctrl+Z.
Use the undo databits command to revert to the default databits. The default databits is 8. This command takes effect on AUX user interfaces only. The databits setting on the terminal and that on the device user interface must be the same for communication.
Page 27
Type Tx/Rx Modem Privi Auth Super AUX 0 9600 : Current user-interface is active. : Current user-interface is active and work in async mode. : Absolute index of user-interface. Type : Type and relative index of user-interface. Privi: The privilege of user-interface. Auth : The authentication mode of user-interface.
# Display the summary information about the user interface. <Sysname> display user-interface summary User interface type : [AUX] User interface type : [VTY] 1:UXXX X 1 character mode users. 5 UI never used. 1 total UI in use Table 1-2 display user-interface summary command output description Field Description User interface type...
Examples # Display the user information about the current user interface. <Sysname> display users Delay Type Ipaddress Username Userlevel VTY 0 00:00:00 192.168.0.208 : Current operation user. : Current operation user work in async mode. Table 1-3 display users command output description Field Description The numbers in the left sub-column are the absolute user interface...
Table 1-4 display web users command output description Field Description ID of a Web user Name Name of a Web user Language Language a Web user uses Level Level of a Web user Login Time Time when a Web user logs in Last Req.
<Sysname> free user-interface vty 0 Are you sure you want to free user-interface vty0 [Y/N]? y [OK] After you perform the above operation, the user connection on user interface VTY0 is torn down. The user in it must log in again to connect to the switch. header Syntax header [ incoming | legal | login | shell ] text...
Page 32
# Test the configuration remotely using Telnet. (only when login authentication is configured can the login banner be displayed). ************************************************************************** * Copyright (c) 2004-2008 Hangzhou H3C Tech. Co., Ltd. All rights reserved.* * Without the owner's prior written consent, * no decompiling or reverse-engineering shall be allowed.
Welcome to legal! Press Y or ENTER to continue, N to exit. Welcome to login! Login authentication Password: Welcome to shell! <Sysname> history-command max-size Syntax history-command max-size value undo history-command max-size View User interface view Parameters value: Size of the history command buffer, ranging from 0 to 256 (in terms of commands). Description Use the history-command max-size command to set the size of the history command buffer of the current user interface.
idle-timeout Syntax idle-timeout minutes [ seconds ] undo idle-timeout View User interface view Parameters minutes: Number of minutes. This argument ranges from 0 to 35,791. seconds: Number of seconds. This argument ranges from 0 to 59. Description Use the idle-timeout command to set the timeout time. The connection to a user interface is terminated if no operation is performed in the user interface within the timeout time.
To improve security and prevent attacks to the unused Sockets, TCP 80 port for HTTP service will be enabled or disabled after corresponding configurations. TCP 80 port is enabled only after you use the undo ip http shutdown command to enable the Web server.
Note that if you set a password containing more than 16 characters, the system matches only the first 16 characters of the password entered for unlocking the user interface. That is, the system unlocks the user interface as long as the first 16 characters of the password entered are correct. By default, the current user interface is not locked.
Examples # Set to perform even checks. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] user-interface aux 0 [Sysname-ui-aux0] parity even protocol inbound Syntax protocol inbound { all | ssh | telnet } View VTY user interface view Parameters all: Supports both Telnet protocol and SSH protocol.
To configure a user interface to support SSH, you need to set the authentication mode to scheme for users to log in successfully. If the authentication mode is set to password or none for login users, the protocol inbound ssh command will fail. Refer to the authentication-mode command for the related configuration.
View User view Parameters all: Sends messages to all user interfaces. type: User interface type, which can be AUX (for AUX user interface) and VTY (for VTY user interface). number: User interface index. A user interface index can be relative or absolute. In relative user interface index scheme, the type argument is required.
Page 40
terminal: Makes terminal services available to users logging in through the console port. level level: Specifies the user level for Telnet users, Terminal users, or SSH users. The level argument ranges from 0 to 3 and defaults to 0. Description Use the service-type command to specify the login type and the corresponding available command level.
set authentication password Syntax set authentication password { cipher | simple } password undo set authentication password View User interface view Parameters cipher: Specifies to save the local password in cipher text. simple: Specifies to save the local password in plain text. password: Password to be set.
undo shell View User interface view Parameters None Description Use the shell command to enable terminal services. Use the undo shell command to disable terminal services. By default, terminal services are disabled in all user interfaces. Note the following when using the undo shell command: Terminal services cannot be disabled in AUX user interfaces.
Execute these two commands in AUX user interface view only. By default, the stopbits is 1. The S3100 series do not support communication with a terminal emulation program with stopbits set to 1.5. Changing the stop bits value of the switch to a value different from that of the terminal emulation utility does not affect the communication between them.
Trying 129.102.0.1 ... Press CTRL+K to abort Connected to 129.102.0.1 ... ************************************************************************** * Copyright(c) 2004-2008 Hangzhou H3C Tech. Co., Ltd. All rights reserved. * * Without the owner's prior written consent, * no decompiling or reverse-engineering shall be allowed. ************************************************************************** <SwitchB>...
Trying 3001::1 ... Press CTRL+K to abort Connected to 3001::1 ... ************************************************************************** * Copyright (c) 2004-2008 Hangzhou H3C Tech. Co., Ltd. All rights reserved.* * Without the owner's prior written consent, * no decompiling or reverse-engineering shall be allowed. ************************************************************************** <Sysname>...
In relative user interface index scheme, the type argument is required. In this case, AUX user interfaces is numbered AUX0; VTY user interfaces are numbered from VTY0 through VTY4. In absolute user interface index scheme, the type argument is not required. In this case, user interfaces are numbered from 0 to 5.
Page 47
Manage level: Commands at this level are for the operation of the entire system and the system supporting modules. Services are supported by these commands. Commands concerning file system, file transfer protocol (FTP), trivial file transfer protocol (TFTP), downloading using XModem, user management, and level setting are at administration level.
Commands for User Control Commands for Controlling Logging in Users Syntax acl acl-number { inbound | outbound } undo acl acl-number { inbound | outbound } View User interface view Parameters acl-number: ACL number. This argument can identify different types of ACLs, as listed below. 2000 to 2999, for basic ACLs 3000 to 3999, for advanced ACLs 4000 to 4999, for Layer 2 ACLs...
Parameters all: Specifies all Web users. user-id: Web user ID, an eight-digit hexadecimal number. user-name: User name of the Web user. This argument can contain 1 to 80 characters. Description Use the free web-users command to disconnect a specified Web user or all Web users by force. Examples # Disconnect all Web users by force.
Parameters read: Specifies that the community has read-only permission in the specified view. write: Specifies that the community has read/write permission in the specified view. community-name: Community name, a string of 1 to 32 characters. acl acl-number: Specifies an ACL number for the community. The acl-number argument ranges from 2000 to 2999.
group-name: Group name. This argument can be of 1 to 32 characters. authentication: Specifies to authenticate SNMP data without encrypting the data. privacy: Authenticates and encrypts packets. read-view: Name of the view to be set to read-only. This argument can be of 1 to 32 characters. write-view: Name of the view to be set to readable &...
Page 52
group-name: Name of the group to which the user corresponds. This argument is a string of 1 to 32 characters. cipher: Specifies the authentication or encryption password to be in ciphertext. authentication-mode: Requires authentication. If this keyword is not provided, neither authentication nor encryption is performed.
Configuration File Management Commands S3100 series Ethernet switches allow you to input a file path and file name in one of the following ways: In universal resource locator (URL) format and starting with “unit1>flash:/”. or “flash:/” This method is used to specify a file in the current Flash memory. For example, the URL of a file named text.txt in the root directory of the switch is unit1>flash:/text.txt or flash:/text.txt.
Page 55
interface-number: Port/interface number. by-linenum: Displays configuration information with line numbers. |: Uses a regular expression to filter the configuration of the switch to be displayed. By specifying a regular expression, you can locate and query the needed information quickly. regular-expression: A regular expression, case sensitive. It supports the following match rules: begin: Displays the line that matches the regular expression and all the subsequent lines.
Page 56
Examples # Display configuration information about all the interfaces on the current switch. <Sysname> display current-configuration interface interface Vlan-interface1 ip address 192.168.0.241 255.255.255.0 interface Aux1/0/0 interface Ethernet1/0/1 port link-aggregation group 1 interface Ethernet1/0/2 interface Ethernet1/0/3 interface Ethernet1/0/4 interface Ethernet1/0/5 interface Ethernet1/0/6 interface Ethernet1/0/7 interface Ethernet1/0/8 interface Ethernet1/0/9...
Page 57
interface Ethernet1/0/21 interface Ethernet1/0/22 interface Ethernet1/0/23 interface Ethernet1/0/24 interface GigabitEthernet1/1/1 interface GigabitEthernet1/1/2 shutdown interface GigabitEthernet1/2/1 interface GigabitEthernet1/2/2 shutdown interface NULL0 interface LoopBack0 return # Display the lines that include the strings matching 10* in the configuration information. (The character * means that the character 0 in the string before it can appear multiple times or does not appear.) <Sysname>...
display saved-configuration Syntax display saved-configuration [ unit unit-id ] [ by-linenum ] View Any view Parameters unit unit-id: Specifies the unit ID of a switch. It only can be 1. by-linenum: Displays configuration information with line numbers. Description Use the display saved-configuration command to display the initial configuration file of a switch. Note that: If the switch starts up without a configuration file, the system will display that no configuration file exists upon execution of the command.
user-interface aux 0 user-interface vty 0 4 authentication-mode none user privilege level 3 return The configuration information output above in turn is the system configuration, logical interface configuration, physical port configuration, and user interface configuration. display startup Syntax display startup [ unit unit-id ] View Any view Parameters...
display this Syntax display this [ by-linenum ] View Any view Parameters by-linenum: Displays configuration information with line numbers. Description Use the display this command to display the current configuration performed in the current view. To verify the configuration performed in a view, you can use this command to display the parameters that are valid in the current view.
Description Use the reset saved-configuration command to erase the configuration file saved in the Flash of a switch. The following two situations exist: While the reset saved-configuration [ main ] command erases the configuration file with main attribute, it only erases the main attribute of a configuration file having both main and backup attribute.
Page 64
S3100 series Ethernet switches do not support the safe mode. When you are saving a configuration file using the save safely command, if the device reboots or the power fails during the saving process, the configuration file will be lost.
Now saving current configuration to the device. Saving configuration. Please wait....Unit1 save configuration flash:/123.cfg successfully startup saved-configuration Syntax startup saved-configuration cfgfile [ backup | main ] undo startup saved-configuration [ unit unit-id ] View User view Parameters cfgfile: Path name or file name of a configuration file in the Flash, a string of 5 to 56 characters. backup: Specifies the configuration file to be the backup configuration file.
Page 66
Table of Contents 1 VLAN Configuration Commands··············································································································1-1 VLAN Configuration Commands·············································································································1-1 description ·······································································································································1-1 display interface Vlan-interface ·······································································································1-2 display vlan······································································································································1-3 interface Vlan-interface····················································································································1-4 name················································································································································1-5 shutdown ·········································································································································1-6 vlan ··················································································································································1-6 Port-Based VLAN Configuration Commands··························································································1-8 display port ······································································································································1-8 port···················································································································································1-8 port access vlan·······························································································································1-9 port hybrid pvid vlan ······················································································································1-10 port hybrid vlan ······························································································································1-10 port link-type ··································································································································1-11 port trunk permit vlan·····················································································································1-12...
VLAN Configuration Commands VLAN Configuration Commands description Syntax description text undo description View VLAN view, VLAN interface view Parameters text: Case sensitive character string to describe the current VLAN or VLAN interface. Special characters and spaces are allowed. It has: 1 to 32 characters for a VLAN description.
display interface Vlan-interface Syntax display interface Vlan-interface [ vlan-id ] View Any view Parameters vlan-id: Specifies a VLAN interface number. Description Use the display interface Vlan-interface command to display information about the specified VLAN interface or all VLAN interfaces already created if no VLAN interface is specified. The output of this command shows the state, IP address, description and other information of a VLAN interface.
Field Description 10.1.1.1/24 Primary Primary IP address of this VLAN interface Description Description string of the VLAN interface The Maximum Transmit Unit Maximum transmission unit (MTU) For information about how to configure an IP address for a VLAN interface, refer to the description on the ip address command in the IP Address and Performance Command part.
Description: VLAN 0001 Name: VLAN 0001 Tagged Ports: Ethernet1/0/1 Untagged Ports: Ethernet1/0/2 Table 1-2 Description on the fields of the display vlan command Field Description VLAN ID VLAN ID. VLAN Type VLAN type (dynamic or static). Indicates whether the VLAN interface of the VLAN is configured with an Route Interface IP address for routing.
For the S3100-SI series switch, create the VLAN interface for the management VLAN on a switch operating as the management device in a cluster, make sure that the management VLAN ID is consistent with the cluster management VLAN ID configured with the management-vlan vlan-id command.
shutdown Syntax shutdown undo shutdown View VLAN interface view Parameters None Description Use the shutdown command to administratively shut down the VLAN interface. Use the undo shutdown command to bring up the VLAN interface. By default, a VLAN interface is administratively enabled. In this case, the physical state of the VLAN interface is affected by that of the ports in the VLAN.
Page 73
Parameters vlan-id1: Specifies the ID of the VLAN you want to create or remove, in the range of 1 to 4094. to vlan-id2: In conjunction with vlan-id1, specify a VLAN ID range you want to create or remove. The vlan-id2 argument takes a value in the range of 1 to 4094, and must not be less than that of vlan-id1. all: Creates or removes all existing VLANs except those configured with other functions.
The above output information indicates that VLAN 7 (the voice VLAN) cannot be removed, while the other VLANs are removed successfully. Port-Based VLAN Configuration Commands display port Syntax display port { hybrid | trunk } View Any view Parameters hybrid: Displays hybrid ports. trunk: Displays trunk ports.
The command applies to access ports only. For information about how to assign to or remove from a VLAN trunk or hybrid ports, refer to the port hybrid vlan command and the port trunk permit vlan command . For port type configuration, refer to the command .
port hybrid pvid vlan Syntax port hybrid pvid vlan vlan-id undo port hybrid pvid View Ethernet port view Parameters vlan-id: Specifies the default VLAN ID of the current hybrid port, in the range of 1 to 4094. The specified VLAN can be one already created or not. Description Use the port hybrid pvid vlan command to set the default VLAN ID of the hybrid port.
of vlan-id1 to vlan-id2). Specify each VLAN ID in the range of 1 to 4094 and ensure that vlan-id2 is no less than vlan-id1. The total number of individual VLAN IDs and VLAN ID ranges defined in the list must not exceed 10.
To change the link type of a port from hybrid to trunk or vice versa, you need to change the link type to access first. Examples # Configure Ethernet 1/0/1 as a trunk port. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] interface ethernet 1/0/1 [Sysname-Ethernet1/0/1] port link-type trunk port trunk permit vlan...
System View: return to User View with Ctrl+Z. [Sysname] interface ethernet 1/0/1 [Sysname-Ethernet1/0/1] port link-type trunk [Sysname-Ethernet1/0/1] port trunk permit vlan 2 4 50 to 100 Please wait... Done. port trunk pvid vlan Syntax port trunk pvid vlan vlan-id undo port trunk pvid View Ethernet port view Parameters...
MAC Address-Based VLAN Configuration Commands The contents of this chapter are only applicable to the S3100-EI series among S3100 series switches. display mac-vlan Syntax display mac-vlan { all | dynamic | static | vlan vlan-id } View Any view Default Level...
Field Description VLAN ID VLAN ID of a MAC address-to-VLAN entry 802.1p priority corresponding to the MAC address of a MAC address-to-VLAN PRIO entry The state of a MAC address-to-VLAN entry, which can be: S, indicating that the MAC address-to-VLAN entry is configured statically. D, indicating that the MAC address-to-VLAN entry is configured STATE automatically through the authentication server...
Parameters None Description Use the mac-vlan enable command to enable MAC address-based VLAN on a port. Use the undo mac-vlan enable command to disable MAC address-based VLAN on a port. By default, MAC address-based VLAN is disabled on a port. Examples # Enable MAC address-based VLAN on Ethernet1/0/1.
The contents of this section are only applicable to the S3100-EI series among S3100 series switches. display protocol-vlan interface Syntax display protocol-vlan interface { interface-type interface-number [ to interface-type interface-number ] | all } View Any view Parameters interface-type interface-number: Specify a port by its type and number to display the protocol VLAN(s) bound with the port.
Field Description Protocol type specified by the protocol template. Refer to the Protocol-type protocol-vlan command for detailed description. display protocol-vlan vlan Syntax display protocol-vlan vlan { vlan-id1 [ to vlan-id2 ] | all } View Any view Parameters vlan-id1: Specifies a VLAN ID in the range of 1 to 4094, of which the protocol VLAN configuration information is to be displayed.
port hybrid protocol-vlan vlan Syntax port hybrid protocol-vlan vlan vlan-id { protocol-index [ to protocol-index-end ] | all } undo port hybrid protocol-vlan vlan vlan-id { protocol-index [ to protocol-index-end ] | all } View Ethernet port view Parameters vlan-id: Specifies the ID of the protocol VLAN bound with the port. The value range is 1 to 4094. At least one protocol template must have been configured for the VLAN.
Examples # Bind Ethernet 1/0/1 with the protocols indexed from 0 to 2 of VLAN 3 (assuming that VLAN 3 is a protocol VLAN). <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] interface Ethernet 1/0/1 [Sysname-Ethernet1/0/1] port hybrid protocol-vlan vlan 3 0 to 2 # Remove the binding between Ethernet 1/0/1 and protocols indexed from 1 to 4 of VLAN 3.
Page 87
At present, the S3100 series support only the standard templates of AppleTalk and IP, the standard template of IPX encapsulated in Ethernet II format, and the user-defined templates matching the Ethernet II encapsulation format. Protocol templates matching 802.2/802.3 encapsulation formats and their extended encapsulation formats are not supported on the S3100 series currently.
Page 88
Table of Contents 1 Static Route Configuration Commands ··································································································1-1 Static Route Configuration Commands···································································································1-1 delete static-routes all······················································································································1-1 display ip routing-table·····················································································································1-1 display ip routing-table acl···············································································································1-2 display ip routing-table ip-address···································································································1-4 display ip routing-table ip-address1 ip-address2·············································································1-6 display ip routing-table protocol·······································································································1-6 display ip routing-table radix············································································································1-7 display ip routing-table statistics······································································································1-8 display ip routing-table verbose·······································································································1-9 ip route-static ·································································································································1-10...
Static Route Configuration Commands Static Route Configuration Commands delete static-routes all Syntax delete static-routes all View System view Parameter None Description Use the delete static-routes all command to delete all static routes. The system will request your confirmation before it deletes all the configured static routes. Related command: ip route-static and display ip routing-table.
Description Use the display ip routing-table command to display the summary information about the routing table. This command displays the summary information about a routing table, with the items of a routing entry contained in one line. The information displayed includes destination IP address/mask length, protocol, preference, cost, next hop and outbound interface.
Page 91
As this command displays the routes that match a specified basic ACL, you can use it to trace routing policies. Example # Display the summary information about the active routes that match ACL 2000. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] acl number 2000 [Sysname-acl-basic-2000] rule permit source 10.1.1.1 0.0.0.255 [Sysname-acl-basic-2000] rule deny source any...
Field Description Descriptions on the route state are as follows: ActiveU Valid unicast route. “U” stands for unicast. Blackhole route is the same as reject route except that a router Blackhole drops a packet traveling along a blackhole route without sending ICMP unreachable messages to the source of the packets.
Page 93
mask: Mask of the destination IP address, which can be in dotted decimal notation or be an integer ranging from 0 to 32. longer-match: Displays all the routes leading to the destination coupled with the default mask. verbose: Displays the detailed information about the active and inactive routes leading to the destination.
display ip routing-table ip-address1 ip-address2 Syntax display ip routing-table ip-address1 mask1 ip-address2 mask2 [ verbose ] View Any view Parameter ip-address1, ip-address2: Destination IP addresses in dotted decimal notation. ip-address1 and mask1, together with ip-address2 and mask2, determine an IP address range. The starting address of the IP address range is determined by the ip-address1 and mask1 arguments;...
verbose: Displays the detailed route information. If you do not specify this keyword, only the summary route information is displayed. Description Use the display ip routing-table protocol command to display the information about specified type of routes. Example # Display the summary information about all the direct routes. <Sysname>...
Description Use the display ip routing-table radix command to display the information about the routes in a routing table in a hierarchical way. Example # Display the information about the routes in a routing table in a hierarchical way. <Sysname> display ip routing-table radix Radix tree for INET (2) inodes 2 routes 2: +--8+--{127.0.0.0 +-32+--{127.0.0.1...
Page 97
Total Table 1-4 Description on the fields of the display ip routing-table statistics command Field Description Proto Routing protocol route Total number of routes active Number of the active routes that are currently in use Number of the routes that are added to the routing table after the switch starts or added the routing table is cleared last time Number of the routes with deleted flags (this type of routes will be removed after a...
**Destination: 127.0.0.1 Mask: 255.255.255.255 Protocol: #DIRECT Preference: 0 *NextHop: 127.0.0.1 Interface: 127.0.0.1(InLoopBack0) State: <NotInstall NoAdvise Int ActiveU Retain Gateway Unicast> Age: 57:12 Cost: 0/0 The statistics of the routing table are displayed first, and then the detailed descriptions of each route. Table 1-2 describes the route states and Table 1-5...
description text: Specifies a descriptive string for the static route. The text argument is a case-sensitive string of 1 to 60 characters (including the space). Description Use the ip route-static command to configure a static route. Use the undo ip route-static command to remove a static route. By default, the system can obtain the subnet route directly connected to the router.
Page 100
Routing tables: Proto route active added deleted DIRECT STATIC Total # Clear the routing statistics of all protocols from the IP routing table. <Sysname> reset ip routing-table statistics protocol all This will erase the specific routing counters information. Are you sure?[Y/N]y # Display the routing statistics in the IP routing table.
Page 101
Table of Contents 1 IP Address Configuration Commands·····································································································1-1 IP Address Configuration Commands·····································································································1-1 display ip interface···························································································································1-1 display ip interface brief···················································································································1-2 ip address ········································································································································1-3 2 IP Performance Configuration Commands·····························································································2-1 IP Performance Configuration Commands ·····························································································2-1 display fib·········································································································································2-1 display fib ip-address·······················································································································2-2 display fib acl ···································································································································2-3 display fib |·······································································································································2-4 display fib statistics··························································································································2-4 display icmp statistics ······················································································································2-5...
IP Address Configuration Commands IP Address Configuration Commands display ip interface Syntax display ip interface [ interface-type interface-number ] View Any view Parameters interface-type interface-number: Specifies an interface by its type and number. Description Use the display ip interface command to display information about a specified or all Layer 3 interfaces.
Timestamp reply: Information request: Information reply: Netmask request: Netmask reply: Unknown type: Table 1-1 Description on the fields of the display ip interface command Field Description Vlan-interface1 current state Current physical state of VLAN-interface 1 Line protocol current state Current state of the link layer protocol Internet Address IP address of the interface Directed broadcast address of the subnet attached...
Parameters interface-type: Interface type. interface-number: Interface number. Description Use the display ip interface brief command to display brief information about a specified or all Layer 3 interfaces. With no argument included, the command displays information about all layer 3 interfaces; with only the interface type specified, it displays information about all layer 3 interfaces of the specified type;...
Page 105
View VLAN interface view, loopback interface view Parameters ip-address: IP address, in dotted decimal notation. mask: Subnet mask, in dotted decimal notation. mask-length: Subnet mask length, the number of consecutive ones in the mask. It is in the range of 0 to Description Use the ip address command to specify an IP address and mask for a VLAN or loopback interface.
IP Performance Configuration Commands IP Performance Configuration Commands display fib Syntax display fib View Any view Parameters None Description Use the display fib command to display all forwarding information base (FIB) information. Examples # Display all FIB information. <Sysname> display fib Flag: U:Usable G:Gateway...
Table 2-1 Description on the fields of the display fib command Field Description Flags: U: A route is up and available. G: Gateway route H: Local host route B: Blackhole route Flag D: Dynamic route S: Static route R: Rejected route E: Multi-path equal-cost route L: Route generated by ARP or ESIS Destination/Mask...
Examples # Display FIB entry information which matches destination 12.158.10.0 and has a mask length no less than eight. <Sysname> display fib 12.158.10.0 longer Route Entry Count: 1 Flag: U:Usable G:Gateway H:Host B:Blackhole D:Dynamic S:Static R:Reject E:Equal cost multi-path L:Generated by ARP or ESIS Destination/Mask Nexthop Flag TimeStamp...
Parameters None Description Use the display fib statistics command to display the total number of FIB entries. Examples # Display the total number of FIB entries. <Sysname> display fib statistics Route Entry Count : 8 display icmp statistics Syntax display icmp statistics View Any view Parameters...
Table 2-2 Description on the fields of the display icmp statistics command Field Description bad formats Number of received wrong format packets bad checksum Number of received wrong checksum packets echo Number of received echo packets Number of received destination unreachable destination unreachable packets source quench...
Page 112
task-id: ID of a task, with the value ranging from 1 to 100. socket-id: ID of a socket, with the value ranging from 0 to 3072. Description Use the display ip socket command to display socket information. Examples # Display the information about the socket of the TCP type. <Sysname>...
display ip statistics Syntax display ip statistics View Any view Parameters None Description Use the display ip statistics command to display the statistics about IP packets. Related commands: display ip interface, reset ip statistics. Examples # Display the statistics about IP packets. <Sysname>...
Field Description forwarding Total number of IP packets forwarded by the local device local Total number of IP packets initiated from the local device Output: dropped Total number of IP packets discarded no route Total number of IP packets for which no route is available compress fails Total number of IP packets failed to compress input...
Page 115
packets received after close: 0 ACK packets: 481 (8776 bytes) duplicate ACK packets: 7, too much ACK packets: 0 Sent packets: Total: 665 urgent packets: 0 control packets: 5 (including 1 RST) window probe packets: 0, window update packets: 2 data packets: 618 (8770 bytes) data packets retransmitted: 0 (0 bytes) ACK-only packets: 40 (28 delayed) Retransmitted timeout: 0, connections dropped in retransmitted timeout: 0...
Field Description Total Total number of packets sent urgent packets Number of urgent packets sent Number of control packets sent; in brackets are control packets retransmitted packets Number of window probe packets sent; in the window probe packets brackets are resent packets Sent packets: window update packets Number of window update packets sent...
Description Use the display tcp status command to display the state of all the TCP connections so that you can monitor TCP connections in real time. Examples # Display the state of all the TCP connections. <Sysname> display tcp status *: TCP MD5 Connection TCPCB Local Add:port...
total broadcast or multicast packets : 25006 no socket broadcast or multicast packets: 24989 not delivered, input socket full: 0 input packets missing pcb cache: 1314 Sent packets: Total: 7187 Table 2-7 Description on the fields of the display udp statistics command Field Description Total...
Examples # Disable the device from sending ICMP redirection packets. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] undo icmp redirect send icmp unreach send Syntax icmp unreach send undo icmp unreach send View System view Parameters None Description Use the icmp unreach send command to enable the device to send ICMP destination unreachable...
Description Use the reset ip statistics command to clear the statistics about IP packets. You can use the display ip statistics command to view the current IP packet statistics. Related commands: display ip interface. Examples # Clear the statistics about IP packets. <Sysname>...
tcp timer fin-timeout Syntax tcp timer fin-timeout time-value undo tcp timer fin-timeout View System view Parameters time-value: TCP finwait timer, in seconds, with the value ranging from 76 to 3600. Description Use the tcp timer fin-timeout command to configure the TCP finwait timer. Use the undo tcp timer fin-timeout command to restore the default value of the TCP finwait timer.
When sending the SYN packet, TCP starts the synwait timer. If the response packet is not received before synwait times out, the TCP connection will be terminated. Related commands: tcp timer fin-timeout, tcp window. Examples # Configure the value of the TCP synwait timer to 80 seconds. <Sysname>...
Voice VLAN Configuration Commands The contents of this chapter are only applicable to the S3100-EI series among S3100 series switches. Voice VLAN Configuration Commands display voice vlan error-info Syntax display voice vlan error-info View Any view Parameters None Description Use the display voice vlan error-info command to display the ports on which the voice VLAN function fails to be enabled.
-------------------------------- Ethernet1/0/2 AUTO Ethernet1/0/3 MANUAL Table 1-1 Description on the fields of the display voice vlan status command Field Description The status of global voice VLAN function: enabled or Voice Vlan status disabled. The VLAN which is currently enabled with voice Voice Vlan ID VLAN.
Tagged Ports: Ethernet1/0/5 Untagged Ports: Ethernet1/0/6 The output indicates that Ethernet 1/0/5 and Ethernet 1/0/6 are in the voice VLAN. voice vlan Syntax voice vlan vlan-id enable undo voice vlan enable View System view Parameters vlan-id: Specifies the ID of the VLAN to be enabled with the voice VLAN function, in the range of 2 to 4094.
System View: return to User View with Ctrl+Z. [Sysname] vlan 2 [Sysname-vlan2] quit [Sysname] voice vlan 2 enable # After the voice VLAN function of VLAN 2 is enabled, if you enable the voice VLAN function for other VLANs, the system will prompt that your configuration fails. [Sysname] voice vlan 4 enable Can't change voice vlan configuration when other voice vlan is running voice vlan aging...
<Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] voice vlan aging 100 voice vlan enable Syntax voice vlan enable undo voice vlan enable View Ethernet port view Parameters None Description Use the voice vlan enable command to enable the voice VLAN function on the port. Use the undo voice vlan enable command to disable the voice VLAN function on the port.
Parameters None Description Use the voice vlan legacy command to realize the communication between H3C device and other vendors’ voice device by automatically adding the voice VLAN tag to the voice data coming from other vendors’ voice device. Use the undo voice vlan legacy command to disable the voice VLAN legacy function.
Number OUI address Vendor 00d0-1e00-0000 Pingtel phone 00e0-7500-0000 Polycom phone 00e0-bb00-0000 3Com phone Related commands: display voice vlan oui. Examples # Add MAC address 00aa-bb00-0000 to the OUI list and configure its description as ABC. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] voice vlan mac-address 00aa-bb00-0000 mask ffff-ff00-0000 description ABC voice vlan mode Syntax...
[Sysname-Ethernet1/0/2] undo voice vlan mode auto voice vlan qos Syntax voice vlan qos cos-value dscp-value undo voice vlan qos View Interface view Default Level 2: System level Parameters cos-value: Sets the CoS precedence value for voice VLAN traffic. The default value is 6. dscp-value: Sets the DSCP value for voice VLAN traffic.
undo voice vlan qos View Interface view Default Level 2: System level Parameters None Description Use the voice vlan qos trust command to configure the current interface to trust the priority settings carried in incoming voice traffic. With this command configured, an interface keeps the CoS and DSCP values marked for incoming voice traffic unchanged.
Page 134
Description Use the voice vlan security enable command to enable the voice VLAN security mode. Use the undo voice vlan security enable command to disable the voice VLAN security mode. In security mode, the ports in a voice VLAN and with voice devices attached to can only forward voice data.
GVRP Configuration Commands GARP Configuration Commands display garp statistics Syntax display garp statistics [ interface interface-list ] View Any view Parameters interface-list: Specifies a list of Ethernet ports for which the statistics about GARP are to be displayed. In this list, you can specify individual ports and port ranges. An individual port takes the form of interface-type interface-number and a port range takes the form of interface-type interface-number1 to interface-type interface-number2,...
Table 1-1 Description on the fields of the display garp statistics command Field Description Number of GVRP Frames Received Number of the GVRP frames received on the port Number of the GVRP frames transmitted through the Number of GVRP Frames Transmitted port Number of Frames Discarded Number of GVRP frames discarded by the port...
In networking, the following GARP timer settings are recommended: GARP hold timer: 100 centiseconds (1 second) GARP Join timer: 600 centiseconds (6 seconds) GARP Leave timer: 3000 centiseconds (30 seconds) Related commands: display garp timer. Examples # Set the GARP Join timer to 30 centiseconds for Ethernet1/0/1. <Sysname>...
Examples # Set the GARP LeaveAll timer to 100 centiseconds. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] garp timer leaveall 100 reset garp statistics Syntax reset garp statistics [ interface interface-list ] View User view Parameters interface-list: Specifies a list of Ethernet ports.
Note that, this command displays GVRP statistics only on the trunk ports included in the list. Statistics on non-trunk ports will not be displayed. Description Use the display gvrp statistics command to display the GVRP statistics of trunk ports. This command displays the following information: GVRP status Number of the GVRP entries that fail to be registered Source MAC address of the previous GVRP PDU...
Parameters None Description Use the gvrp command to enable GVRP globally (in system view) or for a port (in Ethernet port view). Use the undo gvrp command to disable GVRP globally (in system view) or on a port (in Ethernet port view).
Page 143
Use the undo gvrp registration command to restore the default GVRP registration mode on a port. By default, the GVRP registration mode is normal. Note that these commands only apply to trunk ports. Related commands: display gvrp statistics Examples # Configure Ethernet1/0/1 to operate in fixed GVRP registration mode. <Sysname>...
Port Basic Configuration Commands Port Basic Configuration Commands broadcast-suppression Syntax broadcast-suppression { ratio | bps max-bps | pps max-pps } undo broadcast-suppression View System view, Ethernet port view Parameter ratio: Maximum ratio (in percentage) of the broadcast traffic allowed on a port to the total transmission capacity of the port.
If you configure broadcast-suppression command in both system view and Ethernet port view, the configuration in Ethernet port view will take effect. If the broadcast traffic threshold configured by using the broadcast-suppression pps max-pps command in system view is greater than the maximum broadcast traffic rate allowed on an Ethernet port, the maximum broadcast traffic rate allowed takes effect on the port.
Page 148
If you specify a source aggregation group ID, the system uses the port with the smallest port number in the aggregation group as the source. If you specify a destination aggregation group ID, the configuration of the source port will be copied to all ports in the aggregation group and all ports in the group will have the same configuration as that of the source port.
Any aggregation group port you input in the destination port list will be removed from the list and the copy command will not take effect on the port. If you want an aggregation group port to have the same configuration with the source port, you can specify the aggregation group of the port as the destination (with the destination-agg-id argument).
[Sysname-Ethernet1/0/1] description lanswitch-interface display brief interface Syntax display brief interface [ interface-type [ interface-number ] ] [ | { begin | include | exclude } regular-expression ] View Any view Parameter interface-type: Port type. interface-number: Port number. |: Specifies to use a regular expression to filter the configuration information entries to be displayed. begin: Each entry must begin with a specified character string.
Speed/Duplex: A - auto-negotiation Interface Link Speed Duplex Type PVID Description ------------------------------------------------------------------------ Eth1/0/1 DOWN hybrid 1 home Table 1-1 display brief interface command output description Field Description Interface Port type Current link state of the Ethernet port: UP, DOWN or ADMINISTRATIVELY Link DOWN Speed...
Page 152
Parameter interface-type: Port type. interface-number: Port number. For details about the arguments, refer to the parameter description of the interface command. Description Use the display interface command to display port configuration. When using this command: If you specify neither port type nor port number, the command displays information about all ports. If you specify only port type, the command displays information about all ports of the specified type.
Page 153
Table 1-3 display interface command output description Field Description Current status of the Ethernet port : UP, DOWN or Ethernet1/0/1 current state ADMINISTRATIVELY DOWN IP Sending Frames' Format Ethernet frame format Hardware address Port hardware address Media type Media type Port hardware type Port hardware type 100Mbps-speed mode, full-duplex mode...
Page 154
Field Description The number of incoming giant frames giants (A giant frame is of more than 2048 bytes if untagged or more than 2052 bytes if tagged.) The number of throttles that occurred on the port - throttles (A throttle occurs when a port is shut down due to buffer or memory overload.) The number of CRC error frames received in correct length...
Field Description The number of transmission failures due to various aborts reasons, such as collisions The number of first transmission attempts delayed deferred because of detection of collisions The number of detected collisions collisions (Transmission of a frame will be aborted upon detection of a collision.) The number of detected late collisions (A late collision occurs if the transmission of a frame...
<Sysname> display link-delay Interface Time Delay ===================== ============== Ethernet1/0/5 display loopback-detection Syntax display loopback-detection View Any view Parameter None Description Use the display loopback-detection command to display the loopback detection status on the port. If loopback detection is enabled, this information will also be displayed: time interval for loopback detection and the loopback ports.
You can refer to the shutdown command to change the state of the two ports. For information about combo port, refer to H3C S3100 Series Ethernet Switch Installation Manual. display port-group Syntax display port-group group-id...
display storm-constrain Syntax display storm-constrain [ interface interface-type interface-number ] [ | { begin | exclude | include } regular-expression ] View Any view Parameters interface-type: Port type. interface-number: Port number. |: Uses a regular expression to filter the output configuration information. begin: Displays the configurations that begin with the string specified by regular-expression.
Field Description on: log information is output when traffic received on the port exceeds the upper threshold or falls below the lower threshold off: log information is not output when traffic received on the port exceeds the upper threshold or falls below the lower threshold Swi-num Number of port state switchover display unit...
enable log updown Syntax enable log updown undo enable log updown View Ethernet port view Parameter None Description Use the enable log updown command to enable Up/Down log information output. Use the undo log enable updown command to disable Up/Down log information output. By default, a port is allowed to output Up/Down log information.
Description Use the flow-interval command to configure the time interval for collecting interface statistics. Use the undo flow-interval command to restore the default. When you use the display interface interface-type interface-number command to display the information of a port, the system performs statistical analysis on the traffic flow passing through the port during the specified interval and displays the average rates in the interval.
interface Syntax interface interface-type interface-number View System view Parameter interface-type: Port type, which can be Aux, Ethernet, GigabitEthernet, loopback, null or Vlan-interface. interface-number: Port number, in the format of Unit ID/slot number/port number, where: Unit ID is fixed to 1; The slot number is 0 if the port is an Ethernet port, the slot number is 1 or 2 if the port is a GigabitEthernet port.
Only S3100-EI Series switches support this feature. The configuration of jumboframe enable command takes effect on all the ports while the configuration of undo jumboframe enable takes effect on current port. Example # Set the maximum frame size allowed on Ethernet 1/0/1 to 2048 bytes. <Sysname>...
[Sysname] interface Ethernet1/0/5 [Sysname-Ethernet1/0/5] link-delay 8 loopback Syntax loopback { external | internal } View Ethernet port view Parameter external: Performs external loop test. In the external loop test, self-loop headers must be used on the port of the switch ( for 100M port, the self-loop headers are made from four cores of the 8-core cables, for 1000M port, the self-loop header are made from eight cores of the 8-core cables, then the packets forwarded by the port will be received by itself.).
Use the undo loopback-detection control enable command to disable the loopback port control function on the trunk or hybrid port. The loopback port control function works in conjunction with the loopback detection function (refer to loopback-detection enable). If a loop is found on a VLAN of the trunk or hybrid port: With the function enabled on the trunk or hybrid port, the system will set the port to the block state (ports in this state cannot forward data packets), send log and trap messages to the terminal, and remove the corresponding MAC forwarding entry.
If you have not enabled the loopback port auto-shutdown function on the access port, the port will automatically resume the normal forwarding state after the loop is removed. If a loop is found on a trunk or hybrid port, the system sends log and trap messages to the terminal. If you have additionally enabled the loopback port control function or the loopback port auto-shutdown function, the system will deal with the port accordingly: If the loopback port control function is enabled on the port (with the...
Keyword to is used to specify a range of ports. The port number after to must be equal to or greater than that before to. &<1-10> means that you can specify up to 10 ports or port ranges. Description Use the loopback-detection interface-list enable command to enable the loopback detection function on a range of ports.
loopback-detection per-vlan enable Syntax loopback-detection per-vlan enable undo loopback-detection per-vlan enable View Ethernet port view Parameter None Description Use the loopback-detection per-vlan enable command to configure the system to run loopback detection on all VLANs of the current trunk or hybrid port. Use the undo loopback-detection per-vlan enable command to restore the default setting.
With the function disabled on the port, the system will only send log and trap messages to the terminal, and the port is still in the normal forwarding state. By default, the loopback port auto-shutdown function is enabled on ports if the device boots with the default configuration file (config.def);...
An RJ-45 interface can operate in MDI or MDI-X mode. To connect two RJ-45 interfaces operating in the same MDI mode, use a crossover cable; to connect two RJ-45 interfaces operating in different MDI modes, use a straight-through cable. Description Use the mdi command to set the MDI mode for a port.
With line rate (LR) applied on one port in the inbound direction or the Traffic Policing enabled, multicast suppression cannot be enabled on any port of the device, and vice versa. Refer to the QoS part for information about LR and Traffic Policing. Example # Set the maximum amount of unknown multicast and unknown unicast bits that can be received per second by Ethernet 1/0/2 to 128 kbps.
port-group Syntax port-group undo port-group View System view Parameter group-id: Number of port group, in the range of 1 to 100. Description Use the port-group command to create a port group or enter the specified port group view. By default, no port group is configured. Only S3100-EI Series Ethernet Switches support Port Group feature.
The statistics of the 802.1x-enabled ports cannot be cleared. Example # Clear the statistics of Ethernet 1/0/1. <Sysname> reset counters interface ethernet1/0/1 shutdown Syntax shutdown undo shutdown View Ethernet port view Parameter None Description Use the shutdown command to shut down an Ethernet port. Use the undo shutdown command to bring up an Ethernet port.
speed Syntax speed { 10 | 100 | 1000 | auto } undo speed View Ethernet port view Parameter 10: Specifies the port speed to 10 Mbps. 100: Specifies the port speed to 100 Mbps. 1000: Specifies the port speed to 1,000 Mbps (only available to GigabitEthernet ports). auto: Specifies the port speed to the auto-negotiation mode.
storm-constrain control Syntax storm-constrain control { block | shutdown } undo storm-constrain control View Ethernet port view Parameters block: Blocks and stops forwarding those types of traffic exceeding the upper thresholds. shutdown: Shutdowns the port if the broadcast/multicast traffic exceeds the upper threshold, and stops receiving and forwarding all types of traffic on the port.
undo storm-constrain enable View Ethernet port view Parameters log: Enables log information to be output when traffic received on the port exceeds the upper threshold or falls below the lower threshold. trap: Enables trap information to be output when traffic received on the port exceeds the upper threshold or falls below the lower threshold.
System View: return to User View with Ctrl+Z. [Sysname] storm-constrain interval 2 virtual-cable-test Syntax virtual-cable-test View Ethernet port view Parameter None Description Use the virtual-cable-test command to enable the system to test the cable connected to a specific port and to display the results. The system can test these attributes of the cable: Cable status, including normal, abnormal, abnormal-open, abnormal-short and failure Cable length If the cable is in normal state, the displayed length value is the total length of the cable.
Page 180
<Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] interface Ethernet1/0/1 [Sysname-Ethernet0/1] virtual-cable-test Cable status: abnormal(open), 1 metres Pair Impedance mismatch: - Pair skew: - ns Pair swap: - Pair polarity: - Insertion loss: - db Return loss: - db Near-end crosstalk: - db 1-35...
Page 181
Table of Contents 1 Link Aggregation Configuration Commands··························································································1-1 Link Aggregation Configuration Commands ···························································································1-1 display link-aggregation interface····································································································1-1 display link-aggregation summary···································································································1-2 display link-aggregation verbose·····································································································1-3 display lacp system-id ·····················································································································1-4 lacp enable ······································································································································1-5 lacp port-priority·······························································································································1-5 lacp system-priority··························································································································1-6 link-aggregation group description ··································································································1-6 link-aggregation group mode···········································································································1-7 port link-aggregation group ·············································································································1-7 reset lacp statistics ··························································································································1-8...
Link Aggregation Configuration Commands Link Aggregation Configuration Commands display link-aggregation interface Syntax display link-aggregation interface interface-type interface-number interface-type interface-number ] View Any view Parameter interface-type: Port type. interface-number: Port number. to: Specifies a port index range, with the two interface-type interface-number argument pairs around it as the two ends.
Field Description Port-Priority Port priority Oper key Operation key Flag Protocol status flag Remote Information about the remote end System ID Remote device ID Port number Port number Received LACP Packets: 0 packet(s), Illegal: 0 Statistics about received, invalid, and sent LACP packet(s) packets Sent LACP Packets: 0 packet(s)
Field Description Loadsharing Type Load sharing type: Shar for load sharing and NonS for non-load sharing Actor ID Local device ID AL ID Aggregation group ID AL Type Aggregation group type: D (dynamic), S (static), or M (manual) ID of the remote device, including the system priority and system MAC address of the remote device Partner ID For a device belonging to an dynamic aggregation group or static aggregation...
Local: Port Status Priority Flag ------------------------------------------------------------------------- Ethernet1/0/4 32768 {ACDEFG} Ethernet1/0/5 32768 {ACG} Remote: Actor Partner Priority Key SystemID Flag -------------------------------------------------------------------------- Ethernet1/0/4 32768 0x8000,0000-0000-0000 {DEF} Ethernet1/0/5 32768 0x8000,0000-0000-0000 {DEF} Table 1-3 Description on the fields of the display link-aggregation verbose command Field Description Loadsharing Type...
lacp enable Syntax lacp enable undo lacp enable View Ethernet port view Parameter None Description Use the lacp enable command to enable LACP on the current port. Use the undo lacp enable command to disable LACP. By default, LACP is disabled on a port. Example # Enable the LACP protocol on Ethernet 1/0/1.
lacp system-priority Syntax lacp system-priority system-priority undo lacp system-priority View System view Parameter system-priority: System priority, ranging from 0 to 65,535. Description Use the lacp system-priority command to set the system priority. Use the undo lacp system-priority command to restore the default system priority. By default, the system priority is 32,768.
You can use the display link-aggregation verbose command to check the configuration result. Example # Set the description "abc" for aggregation group 1. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] link-aggregation group 1 description abc link-aggregation group mode Syntax link-aggregation group agg-id mode { manual | static } undo link-aggregation group agg-id...
Related command: display link-aggregation verbose. Example # Add Ethernet1/0/1 to aggregation group 22. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] interface Ethernet1/0/1 [Sysname-Ethernet1/0/1] port link-aggregation group 22 reset lacp statistics Syntax reset lacp statistics [ interface interface-type interface-number [ to interface-type interface-number ] ] View User view Parameter...
Page 190
Table of Contents 1 Port Isolation Configuration Commands ································································································1-1 Port Isolation Configuration Commands ·································································································1-1 display isolate port···························································································································1-1 port isolate ·······································································································································1-1...
Page 191
Port Isolation Configuration Commands Port Isolation Configuration Commands display isolate port Syntax display isolate port View Any view Parameter None Description Use the display isolate port command to display the Ethernet ports assigned to the isolation group. Example # Display information about the Ethernet ports added to the isolation group. <Sysname>...
Page 192
When a member port of an aggregation group joins/leaves an isolation group, the other ports in the same aggregation group on the local device will join/leave the isolation group at the same time. For ports that belong to an aggregation group and an isolation group simultaneously, removing a port from the aggregation group has no effect on the other ports.
Page 194
Port Security Commands Port Security Commands display mac-address security Syntax display mac-address security [ interface interface-type interface-number ] [ vlan vlan-id ] [ count ] View Any view Parameters Interface interface-type interface-number: Specify a port by its type and number, of which the security MAC address information is to be displayed.
Page 195
MAC ADDR VLAN ID STATE PORT INDEX AGING TIME(s) 0000-0000-0001 Security Ethernet1/0/20 NOAGED 0000-0000-0002 Security Ethernet1/0/20 NOAGED 0000-0000-0003 Security Ethernet1/0/20 NOAGED 0000-0000-0004 Security Ethernet1/0/20 NOAGED 4 mac address(es) found on port Ethernet1/0/20 --- # Display the security MAC address entries for VLAN 1. <Sysname>...
Page 196
Parameters interface interface-list: Specify a list of Ethernet ports of which the port security configurations are to be displayed. For the interface-list argument, you can specify individual ports and port ranges. An individual port takes the form of interface-type interface-number and a port range takes the form of interface-type interface-number1 to interface-type interface-number2, with interface-number2 taking a value greater than interface-number1.
Page 197
Max mac-address num is 4 Stored mac-address num is 0 Authorization is ignore Ethernet1/0/2 is link-down Port mode is AutoLearn NeedtoKnow mode is disabled Intrusion mode is no action Max mac-address num is not configured Stored mac-address num is 0 Authorization is ignore Ethernet1/0/3 is link-down Port mode is AutoLearn...
Field Description The maximum number of MAC addresses Max mac-address num is 4 allowed on the port is 4. Stored mac-address num is 0 No MAC address is stored. Authorization information delivered by the Authorization is ignore Remote Authentication Dial-In User Service (RADIUS) server will not be applied to the port.
Examples # Enable port security; configure the port security mode of Ethernet 1/0/1 as autolearn and create a security MAC address entry for 0001-0001-0001, setting the associated port to Ethernet 1/0/1 and assigning the MAC address to VLAN 1. <Sysname> system-view System View: return to User View with Ctrl+Z.
After a RADIUS user passes authentication, the RADIUS server authorizes the attributes configured for the user account such as the dynamic VLAN configuration. For more information, refer to AAA Command. Examples # Configure Ethernet 1/0/2 to ignore the authorization information delivered by the RADIUS server. <Sysname>...
Examples # Enable port security. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] port-security enable Notice: The port-control of 802.1x will be restricted to auto when port-security is enabled. Please wait... Done. port-security guest-vlan Syntax port-security guest-vlan vlan-id undo port-security guest-vlan View Ethernet port view...
authentication of a user fails, the blocking MAC address feature will be triggered and packets of the user will be dropped, making the user unable to access the guest VLAN. Examples # Set the security mode of port Ethernet 1/0/1 to macAddressOrUserLoginSecure, and specify VLAN 100 as the guest VLAN of the port.
Page 203
By checking the source MAC addresses in inbound data frames or the username and password in 802.1x authentication requests on a port, intrusion protection detects illegal packets (packets with illegal MAC address) or events and takes a pre-set action accordingly. The actions you can set include: disconnecting the port temporarily/permanently and blocking packets with invalid MAC addresses.
NeedtoKnow mode is disabled Intrusion mode is BlockMacaddress Max mac-address num is 2 Stored mac-address num is 2 Authorization is permit For description on the output information, refer to Table 1-2. # Configure the intrusion protection mode on Ethernet 1/0/1 as disableport-temporarily. As a result, the port will be disconnected when intrusion protection is triggered and then re-enabled 30 seconds later.
By default, there is no limit on the number of MAC addresses allowed on the port. By configuring the maximum number of MAC addresses allowed on a port, you can: Limit the number of users accessing the network through the port. Limit the number of security MAC addresses that can be added on the port.
Description Use the port-security ntk-mode command to configure the NTK feature on the port. Use the undo port-security ntk-mode command to restore the default setting. Be default, NTK is disabled on a port, namely all frames are allowed to be sent. By checking the destination MAC addresses of the data frames to be sent from a port, the NTK feature ensures that only successfully authenticated devices can obtain data frames from the port, thus preventing illegal devices from intercepting network data.
Description Use the port-security oui command to set an OUI value for authentication. Use the undo port-security oui command to cancel the OUI value setting. By default, no OUI value is set for authentication. The OUI value set by this command takes effect only when the security mode of the port is set to userLoginWithOUI by the port-security port-mode command.
Page 208
Table 1-3 Keyword description Keyword Security mode Description In this mode, MAC addresses learned on the port become security MAC addresses. When the number of security MAC addresses exceeds the maximum number of MAC addresses configured by the port-security max-mac-count autolearn autolearn command, the port security mode...
Page 209
Keyword Security mode Description In this mode, MAC-based 802.1x authentication is applied on users trying to access the network through the port. The port will be enabled when the authentication succeeds and allow packets from authenticated users to pass through. In this mode, only one userlogin-secure userLoginSecure...
Description Use the port-security port-mode command to set the security mode of the port. Use the undo port-security port-mode command to restore the default mode. By default, the port is in the noRestriction mode, namely access to the port is not restricted. Before setting the security mode to autolearn, you need to use the port-security max-mac-count command to configure the maximum number of MAC addresses allowed on the port.
Description Use the port-security timer autolearn command to configure the aging time for the security MAC address entries that are learned by the port automatically. Use the undo port-security timer autolearn command to restore the default. By default, the aging time is 0, that is, the security MAC address entries are not aged. After you execute the port-security timer autolearn command, you can display security MAC address entries by the display mac-address security command.
The port-security timer disableport command is used in conjunction with the port-security intrusion-mode disableport-temporarily command to set the length of time during which the port remains disabled. Related commands: port-security intrusion-mode. Examples # Set the intrusion protection mode on Ethernet 1/0/1 to disableport-temporarily. It is required that when intrusion protection is triggered, the port be shut down temporarily and then go up 30 seconds later.
Page 214
When you use the display port-security command to display global information, the system will display which types of trap messages are allowed to send. Related commands: display port-security. Examples # Allow the sending of intrusion packet-detected trap messages. <Sysname> system-view System View: return to User View with Ctrl+Z.
Port Binding Commands Currently, only the S3100-EI series support port binding. Port Binding Commands am user-bind Syntax In system view: am user-bind mac-addr mac-address { ip-addr ip-address | ipv6 ipv6-address } [ interface interface-type interface-number ] undo am user-bind mac-addr mac-address { ip-addr ip-address | ipv6 ipv6-address } [ interface interface-type interface-number ] In Ethernet port view: am user-bind { mac-addr mac-address [ ip-addr ip-address | ipv6 ipv6-address ] | ip-addr ip-address...
After the binding, the switch forwards only the packets from the bound MAC address and IP address when received on the port. By default, no user MAC address or IP address is bound to a port. An IP address can be bound with only one port at a time. A MAC address can be bound with only one port at a time.
Parameters interface interface-type interface-number: Specify the port to be bound. The interface-type interface-number arguments indicate the port type and port number. ip-addr ip-address: Specify the IP address to be bound. mac-addr mac-address: Specify the MAC address to be bound. The mac-address argument is in the form of H-H-H.
Page 218
Description Use the display am user-bind ipv6 command to display IPv6 bindings. Related commands: am user-bind. Examples # Display bindings of all ports. <Sysname> display am user-bind ipv6 Following User address bind have been configured: Ipv6 Port 000f-e200-5101 1::ef:1 Ethernet1/0/1 000f-e200-5102 1::ef:2 Ethernet1/0/2...
DLDP Configuration Commands Currently, only S3100-EI series Ethernet switches support the DLDP feature. DLDP Configuration Commands display dldp Syntax display dldp { unit-id | interface-type interface-number } View Any view Parameters unit-id: Unit number of a device. interface-type: Port type. interface-number: Port number.
neighbor mac address : 000f-e20f-7201 neighbor port index : 98 neighbor state : two way neighbor aged time : 24 Table 1-1 Description on the fields of the display dldp command Field Description Interval for sending DLDP advertisement packets (in dldp interval seconds) dldp work-mode...
Use the dldp enable command to enable DLDP on the current port. Use the dldp disable command to disable DLDP on the current port. The dldp command can apply to a non-optical port as well as an optical port. By default, DLDP is disabled. When you use the dldp enable/dldp disable command in system view to enable/disable DLDP on all optical ports of the switch, the configuration takes effect on the existing optical ports, instead of those added subsequently.
Use the undo dldp authentication-mode to remove the DLDP authentication mode and password on the current port. By default, the authentication mode on the current port is none. Note that: When you configure a DLDP authentication mode and authentication password on a port, make sure that the same DLDP authentication mode and password are set on the ports connected with a fiber cable or copper twisted pair.
Note that: The interval takes effect on all DLDP-enabled ports. It is recommended that you set the interval shorter than one-third of the STP convergence time (usually 30 seconds). If too long an interval is set, an STP loop may occur before DLDP shuts down unidirectional links.
View System view Parameters auto: Disables automatically the corresponding port when DLDP detects an unidirectional link or finds in the enhanced mode that the peer port is down. manual: Generates log and traps and prompts the user to disable manually the corresponding port when DLDP detects an unidirectional link or finds in the enhanced mode that the peer port is down.
When DLDP works in normal mode, the system can identify only the unidirectional link caused by fiber cross-connection. When the DLDP protocol works in enhanced mode, the system can identify two types of unidirectional links: one is caused by fiber cross-connection and the other is caused by one fiber being not connected or being broken.
Page 227
Examples # Set the delaydown timer to 5 seconds. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] dldp delaydown-timer 5...
MAC Address Table Management Configuration Commands This chapter describes the management of static, dynamic, and blackhole MAC address entries. For information about the management of multicast MAC address entries, refer to the “Multicast Protocol” part of the manual. MAC Address Table Management Configuration Commands display mac-address aging-time Syntax display mac-address aging-time...
display mac-address Syntax display mac-address [ display-option ] View Any view Parameters display-option: Option used to display specific MAC address table information, as described in Table 1-1. Table 1-1 Description on the display-option argument Value Description Displays information about a specified MAC address mac-address [ vlan vlan-id ] entry.
Page 231
MAC ADDR VLAN ID STATE PORT INDEX AGING TIME(s) 000f-e20f-0101 Learned Ethernet1/0/1 AGING # Display the MAC address entries for the port Ethernet 1/0/4. <Sysname> display mac-address interface Ethernet 1/0/4 MAC ADDR VLAN ID STATE PORT INDEX AGING TIME(s) 000d-88f6-44ba Learned Ethernet1/0/4 AGING...
Syntax Description mac-address [ interface interface-type Removes a specified MAC address entry. interface-number ] vlan vlan-id Description Use the mac-address command to add or modify a MAC address entry. Use the undo mac-address command to remove one or more MAC address entries. In Ethernet port view, the MAC address entry configured with the mac-address command in Ethernet port view takes the current Ethernet port as the outgoing port.
When you use the mac-address max-mac-count command, the port stops learning MAC addresses after the number of MAC addresses it learned reaches the value of the count argument you provided. You can use the undo command to cancel this limit so that the port can learn MAC addresses without the number limitation.
mac-address timer Syntax mac-address timer { aging age | no-aging } undo mac-address timer aging View System view Parameters aging age: Specifies the aging time (in seconds) for dynamic MAC address entries. The age argument ranges from 10 to 1000000. no-aging: Specifies not to age dynamic MAC address entries.
Use the undo mac-address-mapping command to disable this feature. The MAC address replication feature is disabled on any port by default. The contents of this section are only applicable to the S3100-EI series among S3100 series switches. Examples # Configure MAC address replication on Ethernet1/0/1 to copy the MAC address entries of VLAN 4 to the MAC address table of VLAN 10.
Page 237
Examples # Set the start port MAC address to 000f-e200-0001. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] port-mac 000f-e200-0001...
MSTP Configuration Commands MSTP Configuration Commands active region-configuration Syntax active region-configuration View MST region view Parameters None Description Use the active region-configuration command to activate the settings of a multiple spanning tree (MST) region. Configuring MST region-related parameters (especially the VLAN-to-instance mapping table) can result in network topology jitter.
View Ethernet port view Parameters None Description Use the bpdu-drop any command to enable BPDU dropping on the Ethernet port. Use the undo bpdu-drop any command to disable BPDU dropping on the Ethernet port. By default, BPDU dropping is disabled. In a STP-enabled network, some malicious users may send BPDU packets to the switch continuously in order to destabilize the network.
The H3C series support only the MST region name, VLAN-to-instance mapping table, and revision level. Switches which have the settings of these parameters the same are assigned to the same MST region.
Page 243
View Any view Parameters instance-id: ID of the MSTI ranging from 0 to 16. The value of 0 refers to the common and internal spanning tree (CIST). interface-list: Ethernet port list. You can specify multiple Ethernet ports by providing this argument in the form of interface-list = { interface-type interface-number [ to interface-type interface-number ] } &<1-10>, where &<1-10>...
Page 244
Examples # Display the brief state information of MSTI 0 on Ethernet 1/0/1 through Ethernet 1/0/4. <Sysname> display stp instance 0 interface Ethernet 1/0/1 to Ethernet 1/0/4 brief MSTID Port Role STP State Protection Ethernet1/0/1 ALTE DISCARDING LOOP Ethernet1/0/2 DESI FORWARDING NONE Ethernet1/0/3...
Page 245
----[Port2(Ethernet1/0/2)][DOWN]---- Port Protocol :enabled Port Role :CIST Disabled Port Port Priority :128 Port Cost(Legacy) :Config=auto / Active=200000 Desg. Bridge/Port :32768.00e0-fc12-4001 / 128.2 Port Edged :Config=disabled / Active=disabled Point-to-point :Config=auto / Active=false Transmit Limit :10 packets/hello-time Protection Type :None MSTP BPDU format :Config=auto / Active=legacy Port Config Digest Snooping...
Field Description Path cost of the port. The field in the bracket indicates the standard used for port path cost calculation, which can be Port Cost(Legacy) legacy, dot1d-1998, or dot1t. Config indicates the configured value, and Active indicates the actual value. Designated bridge ID and port ID of the port Desg.
Examples # Display the ports that are blocked by STP guard functions. <Sysname> display stp abnormalport MSTID Port Block Reason --------- -------------------- ------------- Ethernet1/0/20 Root-Protection Ethernet1/0/21 Loop-Protection Table 1-4 Description on the fields of the display stp abnormalport command Field Description MSTID MSTI ID in the MST region...
Field Description Reason that caused the port to be blocked. BPDU-Protected: BPDU attack guard function Down Reason Formatfrequency-Protected: MSTP BPDU format frequent change protection function display stp region-configuration Syntax display stp region-configuration View Any view Parameters None Description Use the display stp region-configuration command to display the activated MST region configuration, including the region name, region revision level, and VLAN-to-instance mappings configured for the switch.
display stp root Syntax display stp root View Any view Parameters None Description Use the display stp root command to display information about the root ports in the MSTP region where the switch resides. Examples # Display information about the root ports in the MSTP region where the switch resides. <Sysname>...
Parameters instance-id: ID of an MSTI ranging from 0 to 16. The value of 0 refers to the CIST. vlan-list: List of VLANs. You need to provide this argument in the form of vlan-list = { vlan-id [ to vlan-id ] }&<1-10>, where &<1-10> means that you can provide up to 10 VLAN IDs/VLAN ID ranges for this argument.
MST region name, along with VLAN-to-instance mapping table and MSTP revision level, determines the MST region which a switch belongs to. Related commands: instance, revision-level, check region-configuration, vlan-mapping modulo, active region-configuration. Examples # Set the MST region name of the switch to hello. <Sysname>...
undo revision-level View MST region view Parameters level: MSTP revision level to be set for the switch. This argument ranges from 0 to 65,535. Description Use the revision-level command to set the MSTP revision level for a switch. Use the undo revision-level command to restore the revision level to the default value. By default, the MSTP revision level of a switch is 0.
Page 253
Description Use the stp command in system view to enable/disable MSTP globally. Use the undo stp command in system view to restore the MSTP state to the default globally. Use the stp command in Ethernet port view to enable/disable MSTP on a port. Use the undo stp command in Ethernet port view to restore the MSTP state to the default on a port.
stp bpdu-protection Syntax stp bpdu-protection undo stp bpdu-protection View System view Parameters None Description Use the stp bpdu-protection command to enable the BPDU guard function on the switch. Use the undo stp bpdu-protection command to restore to the default state of the BPDU guard function.
View System view Parameters bridgenum: Network diameter to be set for a switched network. This argument ranges from 2 to 7. Description Use the stp bridge-diameter command to set the network diameter of a switched network. The network diameter of a switched network is represented by the maximum possible number of switches between any two terminal devices in a switched network.
interface-list: Ethernet port list. You can specify multiple Ethernet ports by providing this argument in the format of interface-list ={ interface-type interface-number [ to interface-type interface-number ] } &<1-10>, where &<1-10> means that you can provide up to 10 port indexes/port index ranges for this argument.
Page 257
undo stp interface interface-list config-digest-snooping View System view, Ethernet port view Parameters interface-list: Ethernet port list. You can specify multiple Ethernet ports by providing this argument in the form of interface-list = { interface-type interface-number [ to interface-type interface-number ] } &<1-10>, where &<1-10>...
When the digest snooping feature is enabled on a port, the port turns to the discarding state. That is, the port stops sending BPDU packets. The port is not involved in the STP calculation until it receives BPDU packets from the peer port. The digest snooping feature is needed only when your switch is connected to another manufacturer’s switches adopting proprietary spanning tree protocols.
Page 259
System view: stp interface interface-list [ instance instance-id ] cost cost undo stp interface interface-list [ instance instance-id ] cost View System view, Ethernet port view Parameters instance-id: ID of an MSTI ranging from 0 to 16. The value of 0 refers to the CIST. cost: Path cost to be set for the port.
[Sysname] interface Ethernet 1/0/1 [Sysname-Ethernet1/0/1] stp instance 2 cost 200 Set the path cost of Ethernet 1/0/1 in MSTI 2 to 200 in system view. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] stp interface Ethernet 1/0/1 instance 2 cost 200 # Set the path cost of Ethernet 1/0/2 to Ethernet 1/0/4 in MSTI 2 to 400 in system view.
Examples # Enable a switch to send trap messages conforming to 802.1d standard to the network management device when the switch becomes the root bridge of MSTI 1. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] stp instance 1 dot1d-trap newroot enable stp edged-port Syntax Ethernet port view:...
Normally, configuration BPDUs cannot reach an edge port because the port is not connected to another switch. But when the BPDU guard function is disabled on an edge port, configuration BPDUs sent deliberately by a malicious user may reach the port. If an edge port receives a BPDU, it turns to a non-edge port.
Page 263
Parameters interface-list: Ethernet port list. You can specify multiple Ethernet ports by providing this argument in the form of interface-list = { interface-type interface-number [ to interface-type interface-number ] } &<1-10>, where &<1-10> means that you can provide up to 10 port indexes/port index ranges for this argument. Description Use the stp loop-protection command to enable the loop guard function on the current port.
<Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] stp interface Ethernet 1/0/2 to Ethernet 1/0/4 loop-protection stp max-hops Syntax stp max-hops hops undo stp max-hops View System view Parameters hops: Maximum hop count to be set. This argument ranges from 1 to 40. Description Use the stp max-hops command to set the maximum hop count for the MST region the current switch belongs to.
Page 265
System view: stp [ interface interface-list ] mcheck View System view, Ethernet port view Parameters interface-list: Ethernet port list. You can specify multiple Ethernet ports by providing this argument in the form of interface-list = { interface-type interface-number [ to interface-type interface-number ] } &<1-10>, where &<1-10>...
stp mode Syntax stp mode { stp | rstp | mstp } undo stp mode View System view Parameters stp: Specifies the STP-compatible mode. mstp: Specifies the MSTP mode. rstp: Specifies the RSTP-compatible mode. Description Use the stp mode command to set the operating mode of an MSTP-enabled switch. Use the undo stp mode command to restore the default operating mode of an MSTP-enabled switch.
Page 267
H3C series switch operating as the downstream switch. Among these ports, those operating as the root ports will then actively send agreement packets to their upstream ports after they receive proposal packets from the upstream designated ports, instead of waiting for agreement packets from the upstream switch.
<Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname]stp interface Ethernet1/0/1 no-agreement-check stp pathcost-standard Syntax stp pathcost-standard { dot1d-1998 | dot1t | legacy } undo stp pathcost-standard View System view Parameters dot1d-1998: The device calculates the default path cost for ports based on IEEE 802.1d-1998. dot1t: The device calculates the default path cost for ports based on IEEE 802.1t.
Path cost in Path cost in Path cost in Link speed Duplex state 802.1d-1998 IEEE 802.1t private standard standard standard Full-duplex 2,000 Aggregated link 2 ports 1,000 10 Gbps Aggregated link 3 ports Aggregated link 4 ports Normally, the path cost of a port operating in full-duplex mode is slightly less than that of the port operating in half-duplex mode.
Page 270
force-false: Specifies that the link connected to the current Ethernet port is not a point-to-point link. auto: Specifies to automatically determine whether or not the link connected to the current Ethernet port is a point-to-point link. interface-list: Ethernet port list. You can specify multiple Ethernet ports by providing this argument in the form of interface-list = { interface-type interface-number [ to interface-type interface-number ] } &<1-10>, where &<1-10>...
# Configure the links connected to Ethernet 1/0/2 to Ethernet 1/0/4 as point-to-point links in system view. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] stp interface Ethernet 1/0/2 to Ethernet 1/0/4 point-to-point force-true stp port priority Syntax Ethernet port view: stp [ instance instance-id ] port priority priority...
<Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] interface Ethernet 1/0/1 [Sysname-Ethernet1/0/1] stp instance 2 port priority 16 Set the port priority of Ethernet 1/0/1 in MSTI 2 to 16 in system view. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] stp interface Ethernet 1/0/1 instance 2 port priority 16 # Set the port priority of Ethernet 1/0/2 to Ethernet 1/0/4 in MSTI 2 to 16 in system view.
View System view Parameters None Description Use the stp portlog all command to enable log and trap message output for the ports of all instances. Use the undo stp portlog all command to disable this function. By default, log and trap message output is disabled on the ports of all instances. Examples # Enable log and trap message output for the ports of all instances.
[Sysname] stp instance 1 priority 4096 stp region-configuration Syntax stp region-configuration undo stp region-configuration View System view Parameters None Description Use the stp region-configuration command to enter MST region view. Use the undo stp region-configuration command to restore the MST region-related settings to the default.
Page 275
undo stp [ instance instance-id ] root View System view Parameters instance-id: MSTI ID ranging from 0 to 16. The value of 0 refers to the CIST. bridgenum: Network diameter of the specified spanning tree. This argument ranges from 2 to 7 and defaults to 7.
stp root secondary Syntax stp [ instance instance-id ] root secondary [ bridge-diameter bridgenum [ hello-time centi-seconds ] ] undo stp [ instance instance-id ] root View System view Parameters instance-id: MSTI ID ranging from 0 to 16. The value of 0 refers to the CIST. bridgenum: Network diameter of the specified spanning tree.
stp root-protection Syntax Ethernet port view: stp root-protection undo stp root-protection System view: stp interface interface-list root-protection undo stp interface interface-list root-protection View System view, Ethernet port view Parameters interface-list: Ethernet port list. You can specify multiple Ethernet ports by providing this argument in the form of interface-list = { interface-type interface-number [ to interface-type interface-number ] } &<1-10>, where &<1-10>...
Examples # Enable the root guard function on Ethernet 1/0/1. Enable the root guard function on Ethernet 1/0/1 in Ethernet port view. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] interface Ethernet 1/0/1 [Sysname-Ethernet1/0/1] stp root-protection Enable the root guard function on Ethernet 1/0/1 in system view. <Sysname>...
<Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] stp tc-protection enable stp tc-protection threshold Syntax stp tc-protection threshold number undo stp tc-protection threshold View System view Parameters number: Maximum number of times that a switch can remove the MAC address table and ARP entries within each 10 seconds, in the range of 1 to 255.
stp timer forward-delay Syntax stp timer forward-delay centi-seconds undo stp timer forward-delay View System view Parameters centi-seconds: Forward delay in centiseconds to be set. This argument ranges from 400 to 3,000. Description Use the stp timer forward-delay command to set the forward delay of the switch. Use the undo stp timer forward-delay command to restore the forward delay to the default value.
Parameters centi-seconds: Hello time to be set, in the range of 100 to 1,000 (in centiseconds). Description Use the stp timer hello command to set the hello time of the switch. Use the undo stp timer hello command to restore the hello time of the switch to the default value. By default, the hello time of the switch is 200 centiseconds.
MSTP is capable of detecting link failures and automatically restoring redundant links to the forwarding state. In CIST, switches use the max age parameter to judge whether or not a received configuration BPDU times out. Spanning trees will be recalculated if a configuration BPDU received by a port times out.
Page 283
can be four (or more) times of the hello time. For a steady network, the timeout time can be five to seven times of the hello time. Examples # Set the hello time factor to 7. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] stp timer-factor 7 stp transmit-limit Syntax...
Page 284
Examples # Set the maximum number of configuration BPDUs that can be transmitted through Ethernet 1/0/1 in each hello time to 15. In Ethernet port view: <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] interface Ethernet 1/0/1 [Sysname-Ethernet1/0/1] stp transmit-limit 15 In system view: <Sysname>...
Page 285
You can map VLANs to the specific MSTIs rapidly by using the vlan-mapping modulo modulo command. The ID of the MSTI to which a VLAN is mapped can be figured out by using the following formula: (VLAN ID-1) % modulo + 1. In this formula, (VLAN ID-1) % modulo yields the module of (VLAN ID-1) with regards to the modulo argument.
Page 286
The VLAN-VPN tunnel function can only be enabled on STP-enabled devices. To enable the VLAN-VPN tunnel function, make sure the links between operator’s networks are trunk links. Currently, only S3100-SI series Ethernet Switches support the VLAN-VPN tunnel feature. Examples # Enable the VLAN-VPN tunnel function for the switch. <Sysname>...
IGMP Snooping Configuration Commands Only the S3100-EI series support the IGMP Snooping querier feature. The related commands are as follows: igmp-snooping querier igmp-snooping query-interval igmp-snooping general-query source-ip IGMP Snooping Configuration Commands display igmp-snooping configuration Syntax display igmp-snooping configuration View Any view Parameters None Description...
Page 291
<Sysname> display igmp-snooping configuration Enable IGMP Snooping. The router port timeout is 105 second(s). The max response timeout is 10 second(s). The host port timeout is 260 second(s). The above-mentioned information shows: IGMP Snooping is enabled, the aging time of the router port is 105 seconds, the maximum response time in IGMP queries is 10 seconds, and the aging time of multicast member ports is 260 seconds.
Table 1-1 display igmp-snooping group command output description Field Description Total 1 IP Group(s). Total number of IPv6 multicast groups Total 1 IP Source(s). Total number of IPv6 multicast sources Total 1 MAC Group(s). Total number of MAC multicast groups Port flags: D-Dynamic port, Port flags: D for dynamic port, S for static port, C for port copied from a (*, G) S-Static port, C-Copy port...
Examples # Display IGMP Snooping statistics. <Sysname> display igmp-snooping statistics Received IGMP general query packet(s) number:1. Received IGMP specific query packet(s) number:0. Received IGMP V1 report packet(s) number:0. Received IGMP V2 report packet(s) number:3. Received IGMP leave packet(s) number:0. Received error IGMP packet(s) number:0. Sent IGMP specific query packet(s) number:0.
Before enabling IGMP Snooping in a VLAN, be sure to enable IGMP Snooping globally in system view; otherwise the IGMP Snooping setting will not take effect. If IGMP Snooping and VLAN VPN are enabled on a VLAN at the same time, IGMP queries are likely to fail to pass the VLAN.
The fast leave processing function works for a port only if the host attached to the port runs IGMPv2 or IGMPv3. The configuration performed in system view takes effect on all ports of the switch if no VLAN is specified; if one or more VLANs are specified, the configuration takes effect on all ports in the specified VLAN(s).
Related commands: igmp-snooping querier, igmp-snooping query-interval. Examples # Configure the switch to send general query messages with the source IP address 2.2.2.2 in VLAN 3. <Sysname> system-view System view, return to user view with Ctrl+Z. [Sysname] igmp-snooping enable [Sysname] vlan 3 [Sysname-vlan3] igmp-snooping enable [Sysname-vlan3] igmp-snooping querier [Sysname-vlan3] igmp-snooping general-query source-ip 2.2.2.2...
To prevent bursting traffic in the network or performance deterioration of the device caused by excessive multicast groups, you can set the maximum number of multicast groups that the switch should process. When the number of multicast groups exceeds the configured limit, the switch removes its multicast forwarding entries starting from the oldest one.
Page 298
A port can belong to multiple VLANs, you can configure only one ACL rule per VLAN on a port. If no ACL rule is configured, all the multicast groups will be filtered. Since most devices broadcast unknown multicast packets by default, this function is often used together with the function of dropping unknown multicast packets to prevent multicast streams from being broadcast as unknown multicast packets to a port blocked by this function.
Configure ACL 2001 on Ethernet1/0/2 to it to join any IGMP multicast groups except those defined in the deny rule of ACL 2001. [Sysname] interface Ethernet 1/0/2 [Sysname-Ethernet1/0/2] igmp-snooping group-policy 2001 vlan 2 igmp-snooping host-aging-time Syntax igmp-snooping host-aging-time seconds undo igmp-snooping host-aging-time View System view Parameters...
Use the undo igmp-snooping nonflooding-enable command to disable the IGMP Snooping non-flooding function. By default, the IGMP Snooping non-flooding function is disabled, namely unknown multicast packets are flooded in the VLAN. The difference between the IGMP Snooping non-flooding function and the function of dropping unknown multicast packets is in that the former passes unknown multicast packets to the router ports while the latter directly discards unknown multicast packets.
Description Use the igmp-snooping querier command to enable the IGMP Snooping querier feature on the current VLAN. Use the undo igmp-snooping querier command to restore the default. By default, the IGMP Snooping querier feature is disabled. This command takes effect only if IGMP Snooping is enabled globally and also enabled in the current VLAN.
[Sysname-vlan3] igmp-snooping enable [Sysname-vlan3] igmp-snooping querier [Sysname-vlan3] igmp-snooping query-interval 100 igmp-snooping router-aging-time Syntax igmp-snooping router-aging-time seconds undo igmp-snooping router-aging-time View System view Parameters seconds: Aging time of router ports, in the range of 1 to 1,000, in seconds. Description Use the igmp-snooping router-aging-time command to configure the aging time of router ports. Use the undo igmp-snooping router-aging-time command to restore the default aging time.
By default, the Layer 2 multicast switch sends group-specific query messages with the source IP address of 0.0.0.0. Related commands: igmp-snooping querier. Examples # Configure the switch to send group-specific query messages with the source IP address 2.2.2.2 in VLAN 3. <Sysname>...
View System view Parameters vlan vlan-id: VLAN ID, in the range of 1 to 4094. Description Use the igmp-snooping vlan-mapping vlan command to configure to transmit IGMP general and group-specific query messages in a specific VLAN. Use the undo igmp-snooping vlan-mapping command to restore the default. By default, the VLAN tag carried in IGMP general and group-specific query messages is not changed.
Before configuring a port as a simulated host, enable IGMP Snooping in VLAN view first. The current port must belong to the specified VLAN; otherwise this configuration does not take effect. Examples # Configure Ethernet 1/0/1 in VLAN 1 as a simulated member host for multicast source 1.1.1.1 and multicast group 225.0.0.1.
Examples # Configure ports Ethernet 1/0/1 to Ethernet 1/0/3 under VLAN-interface 1 as static members ports for multicast group 225.0.0.1. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] interface Vlan-interface 1 [Sysname-Vlan-interface1] multicast static-group 225.0.0.1 interface Ethernet 1/0/1 to Ethernet 1/0/3 multicast static-group vlan Syntax...
multicast static-router-port Syntax multicast static-router-port interface-type interface-number undo multicast static-router-port interface-type interface-number View VLAN view Parameters interface-type interface-number: Specifies a port by its type and number. Description Use the multicast static-router-port command to configure the specified port in the current VLAN as a static router port.
If the current port does not belong to any multicast VLAN but it belongs to the specified VLAN, the configuration takes effect in the specified VLAN. If the current port belongs to a multicast VLAN, the configuration takes effect only in the multicast VLAN no matter the port belongs to the specified VLAN or not.
Page 309
because multicast streams are transmitted only within the multicast VLAN. In addition, because the multicast VLAN is isolated from user VLANs, this method also enhances the information security. One port belongs to only one multicast VLAN. The port connected to a user terminal must be a hybrid port. The multicast member port must be in the same multicast VLAN with the router port.
MLD Snooping Configuration Commands MLD Snooping Configuration Commands Only the S3100-EI series support MLD Snooping configuration commands. display mld-snooping group Syntax display mld-snooping group [ vlan vlan-id ] [ verbose ] View Any view Default Level 1: Monitor level Parameters vlan vlan-id: Displays the MLD snooping multicast group information in the specified VLAN, where vlan-id is in the range of 1 to 4094.
Eth1/0/1 (D) ( 00:01:30 ) IP group(s):the following ip group(s) match to one mac group. IP group address:FF1E::101 (::, FF1E::101): Attribute: Host Port Host port(s):total 1 port. Eth1/0/2 (D) ( 00:03:23 ) MAC group(s): MAC group address:3333-0000-0101 Host port(s):total 1 port. Eth1/0/2 Table 2-1 display mld-snooping group command output description Field...
Examples # View the statistics information of all kinds of MLD messages learned by MLD snooping. <Sysname> display mld-snooping statistics Received MLD general queries:0. Received MLDv1 specific queries:0. Received MLDv1 reports:0. Received MLD dones:0. Sent MLDv1 specific queries:0. Received MLDv2 reports:0. Received MLDv2 reports with right and wrong records:0.
Description Use the entry-limit command to configure the maximum number of entries in the MLD snooping forwarding table globally. Use the undo fast-leave command to restore the default. By default, the maximum number of entries in the MLD snooping forwarding table is 512. Examples # Configure the MLD snooping forwarding table to contain at most 512 entries.
host-aging-time (MLD-Snooping view) Syntax host-aging-time interval undo host-aging-time View MLD-Snooping view Default Level 2: System level Parameters interval: Dynamic member port aging time, in units of seconds. The effective range is 200 to 1,000. Description Use the host-aging-time command to configure the aging time of dynamic member ports globally. Use the undo host-aging-time command to restore the default setting.
Examples # Set the MLD last listener query interval to 3 seconds globally. <Sysname> system-view [Sysname] mld-snooping [Sysname-mld-snooping] last-listener-query-interval 3 max-response-time (MLD-Snooping view) Syntax max-response-time interval undo max-response-time View MLD-Snooping view Default Level 2: System level Parameters interval: Maximum response time for MLD general queries, in units of seconds. The effective range is 1 to 25.
Parameters None Description Use the mld-snooping command to enable MLD snooping globally and enter MLD-Snooping view. Use the undo mld-snooping command to disable MLD snooping globally. By default, MLD snooping is disabled. Related commands: mld-snooping enable. Examples # Enable MLD snooping globally and enter MLD-Snooping view. <Sysname>...
View VLAN view Default Level 2: System level Parameters None Description Use the mld-snooping enable command to enable MLD snooping in the current VLAN. Use the undo mld-snooping enable command to disable MLD snooping in the current VLAN. By default, MLD snooping is disabled in a VLAN. MLD snooping must be enabled globally before it can be enabled in a VLAN Related commands: mld-snooping.
Note that: This command works on MLD snooping–enabled VLANs. If you do not specify any VLAN when using this command in Ethernet interface view, the command will take effect for all VLANs the interface belongs to; if you specify a VLAN or multiple VLANs, the command will take effect only if the interface belongs to the specified VLAN(s).
[Sysname-vlan2] mld-snooping enable [Sysname-vlan2] mld-snooping general-query source-ip fe80:0:0:1::1 mld-snooping group-limit Syntax mld-snooping group-limit limit [ vlan vlan-list ] undo mld-snooping group-limit [ vlan vlan-list ] View Ethernet interface view Default Level 2: System level Parameters limit: Maximum number of IPv6 multicast groups that can be joined on a port, in the range of 1 to 512. vlan vlan-list: Defines one or multiple VLANs.
Parameters interval: Dynamic member port aging time, in seconds. The effective range is 200 to 1,000. Description Use the mld-snooping host-aging-time command to configure the aging time of dynamic member ports in the current VLAN. Use the undo mld-snooping host-aging-time command to restore the system default. By default, the dynamic member port aging time is 260 seconds.
This command works on MLD snooping–enabled VLANs, and the version of MLD on the simulated host depends on the version of MLD snooping running in the VLAN. The source-ip ipv6-source-address option in the command is meaningful only for MLD snooping version 2.
[Sysname-mld-snooping] quit [Sysname] vlan 2 [Sysname-vlan2] mld-snooping enable [Sysname-vlan2] mld-snooping last-listener-query-interval 3 mld-snooping max-response-time Syntax mld-snooping max-response-time interval undo mld-snooping max-response-time View VLAN view Default Level 2: System level Parameters interval: Maximum response time for MLD general queries, in units of seconds. The effective range is 1 to 25.
Parameters vlan vlan-list: Defines one or multiple VLANs. You can provide up to 10 VLAN lists, by each of which you can specify an individual VLAN in the form of vlan-id, or a VLAN range in the form of start-vlan-id to end-vlan-id, where the end VLAN ID must be greater than the start VLAN ID.
Before configuring this command in a VLAN, enable MLD Snooping in the VLAN. Related commands: mld-snooping enable. Examples # Enable MLD Snooping and then MLD Snooping Proxying in VLAN 2. <Sysname> system-view [Sysname] mld-snooping [Sysname-mld-snooping] quit [Sysname] vlan 2 [Sysname-vlan2] mld-snooping enable [Sysname-vlan2] mld-snooping proxying enable mld-snooping querier Syntax...
View VLAN view Default Level 2: System level Parameters interval: MLD query interval in seconds, namely the length of time the device waits between sending MLD general queries. The effective range is 2 to 300. Description Use the mld-snooping query-interval command to configure the MLD query interval. Use the undo mld-snooping query-interval command to restore the system default.
Description Use the mld-snooping report source-ip command to configure the source IPv6 address of the MLD reports sent by the MLD Snooping proxy. Use the undo mld-snooping report source-ip command to restore the default. By default, the source IPv6 address of the MLD reports sent by the MLD Snooping proxy is FE80::02FF:FFFF:FE00:0001.
mld-snooping static-group Syntax mld-snooping static-group ipv6-group-address [ source-ip ipv6-source-address ] vlan vlan-id undo mld-snooping static-group ipv6-group-address [ source-ip ipv6-source-address ] vlan vlan-id View Ethernet interface view Default Level 2: System level Parameters ipv6-group-address: Address of a IPv6 multicast group the port(s) will be configured to join as static member port(s).
mld-snooping static-router-port Syntax mld-snooping static-router-port vlan vlan-id undo mld-snooping static-router-port vlan vlan-id View Ethernet interface view Default Level 2: System level Parameters vlan vlan-id: Specifies a VLAN in which one or more static router ports are to be configured, where vlan-id is in the range of 1 to 4094.
Use the undo mld-snooping version command to restore the default setting. By default, the MLD version is 1. Note that: This command can take effect only if MLD snooping is enabled in the VLAN. Related commands: mld-snooping enable. Examples # Enable MLD snooping in VLAN 2, and set the MLD snooping version to version 2. <Sysname>...
report-aggregation (MLD-Snooping view) Syntax report-aggregation undo report-aggregation View MLD-Snooping view Default Level 2: System level Parameters None Description Use the mld-snooping report-aggregation command to enable MLD report suppression. Use the undo mld-snooping report-aggregation command to disable MLD report suppression. By default, MLD report suppression is enabled. This command works on MLD snooping–enabled VLANs.
This command works on MLD snooping–enabled VLANs. This command cannot clear MLD snooping multicast group information of static joining. Examples # Clear all MLD snooping multicast group information. <Sysname> reset mld-snooping group all reset mld-snooping statistics Syntax reset mld-snooping statistics View User view Default Level...
Page 335
Examples # Set the aging time of dynamic router ports globally to 100 seconds. <Sysname> system-view [Sysname] mld-snooping [Sysname-mld-snooping] router-aging-time 100 2-26...
IPv6 Multicast VLAN Configuration Commands IPv6 Multicast VLAN Configuration Commands Only the S3100-EI series support IPv6 multicast VLAN configuration commands. display multicast-vlan ipv6 Syntax display multicast-vlan ipv6 [ vlan-id ] View Any view Default Level 1: Monitor level Parameters vlan-id: VLAN ID of an IPv6 multicast VLAN, in the range of 1 to 4094. If this argument is not provided, the information about all IPv6 multicast VLANs will be displayed.
multicast-vlan ipv6 Syntax multicast-vlan ipv6 vlan-id undo multicast-vlan ipv6 { all | vlan-id } View System view Default Level 2: System level Parameters vlan-id: Specifies a VLAN by its ID, in the range of 1 to 4094. all: Deletes all IPv6 multicast VLANs. Description Use the multicast-vlan ipv6 command to configure the specified VLAN as an IPv6 multicast VLAN and enter IPv6 multicast VLAN view.
Default Level 2: System level Parameters interface-list: Specifies a port in the form of interface-type interface-number, or a port range in the form of interface-type start-interface-number to interface-type end-interface-number, where the end interface number must be greater than the start interface number. all: Deletes all the ports in the current IPv6 multicast VLAN.
Multicast User Control Policy Commands Only the S3100-EI series support multicast user control policy commands. IPv4 Multicast User Control Policy Configuration Commands igmp-snooping access-policy Syntax igmp-snooping access-policy acl-number undo igmp-snooping access-policy { acl-number | all } View QoS profile view Default Level 2: System level Parameters...
IPv6 ACL Configuration Commands acl ipv6 Syntax acl ipv6 number acl6-number [ name acl6-name ] [ match-order { auto | config } ] undo acl ipv6 { all | name acl6-name | number acl6-number } View System view Default Level 2: System level Parameters number acl6-number: Specifies the number of the IPv6 ACL, which must be in the following ranges:...
<Sysname> system-view [Sysname] acl ipv6 number 2002 name flow [Sysname-acl6-basic-2002-flow] # Enter the view of an IPv6 ACL that has no name by specifying its number. <Sysname> system-view [Sysname] acl ipv6 number 2000 [Sysname-acl6-basic-2000] # Enter the view of an IPv6 ACL that has a name by specifying its number. <Sysname>...
The source IPv6 ACL and the destination IPv6 ACL must be of the same type. The new ACL does not take the name of the source IPv6 ACL. Examples # Copy ACL 2008 to generate ACL 2009. <Sysname> system-view [Sysname] acl ipv6 copy 2008 to 2009 acl ipv6 name Syntax acl ipv6 name acl6-name...
By default, an IPv6 ACL has no ACL description. Examples # Configure a description for IPv6 ACL 2000. <Sysname> system-view [Sysname] acl ipv6 number 2000 [Sysname-acl6-basic-2000] description This acl is used in eth 0 # Configure a description for IPv6 ACL 3000. <Sysname>...
Field Description ACL's step is 5 The rules in this ACL are numbered in steps of 5. There have been five matches for the rule. Only IPv6 ACL matches performed by software are counted. 5 times matched This field is not displayed when no match is found. The description of ACL rule 0 is "This rule is used in GE 1/0/1."...
Page 346
View Basic IPv6 ACL view Default Level 2: System level Parameters rule-id: IPv6 ACL rule number, in the range 0 to 65534. deny: Drops matched packets. permit: Allows matched packets to pass. counting: Counts the matches of the IPv6 ACL rule. fragment: Indicates that the rule applies to only non-first fragments.
Page 348
Parameters Function Description This function requires that the module using the Specifies to log matched logging ACL (for example, a firewall using the ACL) packets support logging. Indicates that the rule applies to Without this keyword, the rule applies to all fragment only non-first fragments.
Page 349
Table 4-4 ICMPv6-specific parameters for advanced IPv6 ACL rules Parameters Function Description The icmpv6-type argument ranges from 0 to 255. icmpv6-type The icmpv6-code argument ranges from 0 to { icmpv6-type Specifies the ICMPv6 message 255. icmpv6-code | type and code. The icmpv6-message argument specifies a icmpv6-message } message name.
multiple of the step that is bigger than the current biggest number. For example, if the rule numbering step is 5 and the current highest rule ID is 28, the next rule will be numbered 30. You cannot create a rule with, or modify a rule to have, the same permit/deny statement as an existing rule in the ACL.
Parameters Acl6-number: Basic or advanced IPv6 ACL number, in the range of 2000 to 3999. The source address or address range specified in the advanced IPv6 ACL rule is used to match the IPv6 multicast source address(es) specified in MLDv2 reports, rather than the source address in the IPv6 packets. The system assumes that an MLDv1 report or an MLDv2 IS_EX or TO_EX report that does not carry an IPv6 multicast source address carries an IPv6 multicast source address of 0::0.
Parameters acl6-number: Basic or advanced IPv6 ACL number, in the range of 2000 to 3999. The IPv6 source address or address range specified in the advanced IPv6 ACL rule is the IPv6 multicast source address(es) specified in MLDv2 reports, rather than the source address in the IPv6 packets. The system assumes that an MLDv1 report or an MLDv2 IS_EX or TO_EX report that does not carry an IPv6 multicast source address carries an IPv6 multicast source address of 0::0.
Page 354
View QoS profile view Default Level 2: System level Parameters acl6-number: Basic or advanced IPv6 ACL number, in the range of 2000 to 3999. The source address or address range specified in the advanced ACL is used to match the multicast source address(es) specified in MLDv2 reports, rather than the source address in the IP packets.
Common Multicast Configuration Commands Only the S3100-EI series support multicast source port suppression. The related commands are multicast-source-deny display multicast-source-deny. Only the S3100-EI series Ethernet switches support the pon-ignore keyword of the command unknown-multicast drop enable. Common Multicast Configuration Commands display mac-address multicast static Syntax display mac-address multicast static [ [ mac-address ] vlan vlan-id ] [ count ]...
Table 5-1 display mac-address multicast static command output description Field Description MAC ADDR MAC address VLAN ID The VLAN in which the MAC address is manually added State of the MAC address, which includes only Config static, indicating that STATE the table entry is manually added.
View System view Parameters mac-address: Multicast MAC address, in the form of H-H-H. interface interface-list: Specifies forwarding ports for the specified multicast MAC group address. With the interface-list argument, you can define one or more individual ports (in the form of interface-type interface-number) and/or one or more port ranges (in the form of interface-type interface-number1 to interface-type interface-number2, where interface-number2 must be greater than interface-number1).
Each multicast MAC address entry contains the multicast address, forwarding port, and VLAN ID information. Related commands: display mac-address multicast static. Examples # Create a multicast MAC address entry on Ethernet 1/0/1 in VLAN 1, with the multicast address of 0100-1000-1000.
# Enable the multicast source port suppression feature on Ethernet 1/0/1 through Ethernet 1/0/10 and on Ethernet 1/0/12. [Sysname] multicast-source-deny interface Ethernet 1/0/1 to Ethernet 1/0/10 Ethernet 1/0/12 # Enable the multicast source port suppression feature on Ethernet 1/0/13. [Sysname] interface Ethernet 1/0/13 [Sysname-Ethernet1/0/13] multicast-source-deny unknown-multicast drop enable Syntax...
Page 360
[Sysname] unknown-multicast drop enable...
802.1x Configuration Commands 802.1x Configuration Commands display dot1x Syntax display dot1x [ sessions | statistics ] [ interface interface-list ] View Any view Parameter sessions: Displays the information about 802.1x sessions. statistics: Displays the statistics on 802.1x. interface: Display the 802.1x-related information about a specified port. interface-list: Ethernet port list, in the form of interface-list= { interface-type interface-number [ to interface-type interface-number ] } &<1-10>, in which interface-type specifies the type of an Ethernet port and interface-number is the number of the port.
Page 364
ReAuth Period 3600 s, ReAuth MaxTimes Quiet Period 60 s, Quiet Period Timer is disabled Supp Timeout 30 s, Server Timeout 100 s Interval between version requests is 30s Maximal request times for version information is 3 The maximal retransmitting times EAD Quick Deploy configuration: Url: http: //192.168.19.23 Free-ip: 192.168.19.0 255.255.255.0...
Page 365
Field Description Handshake is enabled The online user handshaking function is enabled. Whether or not to send Trap packets when detecting a supplicant system logs in through a proxy. Disable means the switch does not send Trap packets Proxy trap checker is disabled when it detects that a supplicant system logs in through a proxy.
Field Description Whether or not to disconnect a supplicant system when detecting it in logging in through a proxy. Disable means the switch does not disconnect a Proxy logoff checker is disabled supplicant system when it detects that the latter logs in through a proxy.
In Ethernet port view, the interface-list argument is not available and the command enables 802.1x for only the current Ethernet port. 802.1x-related configurations take effect on a port only after 802.1x is enabled both globally and on the port. Configurations of 8021.x and the maximum number of MAX addresses that can be learnt are mutually exclusive.
Use the undo dot1x authentication-method command to revert to the default 802.1x authentication method. The default 802.1x authentication method is CHAP. PAP applies a two-way handshaking procedure. In this method, passwords are transmitted in plain text. CHAP applies a three-way handshaking procedure. In this method, user names are transmitted rather than passwords.
Failing authentication means being denied by the authentication server due to reasons such as wrong password. Authentication failures caused by authentication timeout or network connection problems do not fall into this category. You must enable MAC VLAN for an MAFV to take effect. After an MAFV takes effect, if you change the port access method from macbased to portbased, the established MAFV entries will be removed.
System View: return to User View with Ctrl+Z. [Sysname] dot1x dhcp-launch dot1x guest-vlan Syntax dot1x guest-vlan vlan-id [ interface interface-list ] undo dot1x guest-vlan [ interface interface-list ] View System view, Ethernet port view Parameter vlan-id: VLAN ID of a Guest VLAN, in the range 1 to 4094. interface-list: Ethernet port list, in the form of interface-list= { interface-type interface-number [ to interface-type interface-number ] } &<1-10>, in which interface-type specifies the type of an Ethernet port and interface-number is the number of the port.
Handshaking packets need the support of the H3C-proprietary client. They are used to test whether or not a user is online. As clients that are not of H3C do not support the online user handshaking function, switches cannot receive handshaking acknowledgement packets from them in handshaking periods. To prevent users being falsely considered offline, you need to disable the online user handshaking function in this case.
dot1x handshake secure Syntax dot1x handshake secure undo dot1x handshake secure View Ethernet port view Parameter None Description Use the dot1x handshake secure command to enable the handshaking packet secure function, preventing the device from attacks resulted from simulating clients. Use the undo dot1x handshake secure command to disable the handshaking packet secure function.
Description Use the dot1x mandatory-domain command to specify the mandatory authentication domain for users accessing the port. Use the undo dot1x mandatory-domain command to remove the mandatory authentication domain. By default, no mandatory authentication domain is specified. Note that: When authenticating an 802.1X user trying to access the port, the system selects an authentication domain in the following order: the mandatory domain, the ISP domain specified in the username, and the default ISP domain.
Related command: display dot1x. Example # Configure the maximum number of users that Ethernet1/01 port can accommodate to be 32. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] dot1x max-user 32 interface Ethernet 1/0/1 dot1x port-control Syntax dot1x port-control { auto | authorized-force | unauthorized-force } [ interface interface-list ] undo dot1x port-control [ interface interface-list ] View...
Related command: display dot1x. Example # Specify Ethernet1/0/1 port to operate in unauthorized-force access control mode. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] dot1x port-control unauthorized-force interface Ethernet 1/0/1 dot1x port-method Syntax dot1x port-method { macbased | portbased } [ interface interface-list ] undo dot1x port-method [ interface interface-list ] View System view, Ethernet port view...
Use the undo dot1x quiet-period command to disable the quiet-period timer. When a user fails to pass the authentication, the authenticator system (such as an H3C series Ethernet switch) will stay quiet for a period (determined by the quiet-period timer) before it performs another authentication.
dot1x retry Syntax dot1x retry max-retry-value undo dot1x retry View System view Parameter max-retry-value: Maximum number of times that a switch sends authentication request packets to a user. This argument ranges from 1 to 10. Description Use the dot1x retry command to specify the maximum number of times that a switch sends authentication request packets to a user.
Description Use the dot1x retry-version-max command to set the maximum number of times that a switch sends version request packets to a user. Use the undo dot1x retry-version-max command to revert to the default value. By default, a switch sends version request packets to a user for up to 3 times. After a switch sends a version request packet to a user, it sends another version request packet if it does receive response from the user after a specific period of time (as determined by the client version request timer).
In Ethernet port view, the interface-list argument is not available and 8021.x re-authentication is enabled on the current port only. 802.1x must be enabled globally and on the current port before 802.1x re-authentication can be configured on a port. Example # Enable 802.1x re-authentication on port Ethernet 1/0/1.
Page 380
IE proxy after the user passes the authentication. The 802.1x proxy checking function needs the cooperation of H3C's 802.1x client program. The proxy checking function takes effect only after the client version checking function is enabled on the switch (using the dot1x version-check command).
System View: return to User View with Ctrl+Z. [Sysname] dot1x supp-proxy-check logoff [Sysname] dot1x supp-proxy-check logoff interface Ethernet 1/0/1 to Ethernet 1/0/8 # Configure the switch to send Trap packets if the users connected to Ethernet1/0/9 port is detected logging in through proxies. [Sysname] dot1x supp-proxy-check trap [Sysname] dot1x supp-proxy-check trap interface Ethernet 1/0/9 dot1x timer...
Page 382
sends another request/challenge packet to the supplicant system if the switch does not receive the response from the supplicant system when this timer times out.. The supp-timeout-value argument ranges from 10 to 120 (in seconds). By default, the supplicant system timer is set to 30 seconds. tx-period tx-period-value: Sets the transmission timer.
dot1x timer reauth-period Syntax dot1x timer reauth-period reauth-period-value undo dot1x timer reauth-period View System view Parameter reauth-period reauth-period-value: Specifies re-authentication interval, in seconds. After this timer expires, the switch initiates 802.1x re-authentication. The value of the reauth-period-value argument ranges from 60 to 7,200. Description Use the dot1x timer reauth-period command to configure the interval for 802.1x re-authentication.
Examples # Enable the unicast trigger function for Ethernet 1/0/1. <Sysname> system-view [Sysname] interface ethernet 1/0/1 [Sysname-Ethernet1/0/1] dot1x unicast-trigger dot1x version-check Syntax dot1x version-check [ interface interface-list ] undo dot1x version-check [ interface interface-list ] View System view, Ethernet port view Parameter interface-list: Ethernet port list, in the form of interface-list= { interface-type interface-number [ to interface-type interface-number ] } &<1-10>, in which interface-type specifies the type of an Ethernet...
reset dot1x statistics Syntax reset dot1x statistics [ interface interface-list ] View User view Parameter interface-list: Ethernet port list, in the form of interface-list= { interface-type interface-number [ to interface-type interface-number ] } &<1-10>, in which interface-type specifies the type of an Ethernet port and interface-number is the number of the port.
<Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] dot1x free-ip 192.168.19.23 24 dot1x timer acl-timeout Syntax dot1x timer acl-timeout acl-timeout-value undo dot1x timer acl-timeout View System view Parameters acl-timeout-value: ACL timeout period (in minutes), in the range of 1 to 1440. Description Use the dot1x timer acl-timeout command to configure the ACL timeout period.
Page 388
Examples # Configure the URL for HTTP redirection. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] dot1x url http://192.168.19.23...
View Any view Parameter None Description Use the display habp table command to display the MAC address table maintained by HABP. Example # Display the MAC address table maintained by HABP. <Sysname> display habp table Holdtime Receive Port 001f-3c00-0030 Ethernet1/0/1 Table 3-2 Description on the fields of the display habp table command Field Description...
Table 3-3 Description on the fields of the display habp traffic command Field Description Packets output Number of the HABP packets sent Input Number of the HABP packets received ID error Number of the HABP packets with ID errors Type error Number of the HABP packets with type errors Version error Number of the HABP packets with version errors...
Parameter vlan-id: VLAN ID, ranging from 1 to 4094. Description Use the habp server vlan command to configure a switch to operate as an HABP server. This command also specifies the VLAN where HABP packets are broadcast. Use the undo habp server vlan command to revert to the default HABP mode. By default, a switch operates as an HABP client.
System-Guard Configuration Commands (For S3100-EI) The command introduced in this chapter is only supported by the S3100-EI series switches. System-Guard Configuration Commands display system-guard attack-record Syntax display system-guard attack-record View Any view Parameter None Description Use the display system-guard attack-record command to display the record of detected attacks. Example # Display the record of detected attacks.
Table 4-1 Description on the fields of display system-guard attack-record Field Description Target No Number of the attack record Range Control range of the attack Packet type Type of the attack packet Port Number of the port being attacked MAC address Source MAC address of the attack packet IP address Source IP address of the attack packet...
Table 4-2 Description on the fields of the display system-guard state command Field Description System-guard Status The enable/disable status of the system-guard function Permitted Interfaces Interfaces enabled with the system-guard function The threshold for the number of packets when an attack is Detect Threshold detected Isolated Time...
View System view Parameter None Description Use the system-guard enable command to enable the system-guard feature. Use the undo system-guard enable command to disable the system-guard feature. By default, the system-guard feature is disabled. Related command: display system-guard state. Example # Enable the system-guard feature.
Example # Apply the system-guard function to Ethernet1/0/1 through Ethernet1/0/10 ports. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] system-guard permit Ethernet 1/0/1 to Ethernet 1/0/10 system-guard timer-interval Syntax system-guard timer-interval isolate-timer undo system-guard timer-interval View System view Parameter isolate-timer: Length of the isolation after an attack is detected, in the range of 1 to 10,000 in minutes.
System-Guard Configuration Commands (For S3100-SI) The command introduced in this chapter is only supported by the S3100-SI series switches. System-guard Configuration Commands display system-guard config Syntax display system-guard config View Any view Parameter None Description Use the display system-guard config command to display current system-guard configuration and the attacked ports.
system-guard enable Syntax system-guard enable undo system-guard enable View System view Parameter None Description Use the system-guard enable command to enable the system-guard function. Use the undo system-guard enable command to disable the system-guard function. By default, the system-guard function is disabled. Example # Enable the system-guard function.
Use the undo system-guard mode command to revert to the default system-guard configuration. Related command: display system-guard config. Example # Implement the system-guard function by means of port rate limit, with the checking interval being 5 seconds, the threshold being 100, and the timeout time being 30 seconds. <Sysname>...
Page 401
After system-guard is enabled on a port, if the number of packets the port received and sent to the CPU in a specified interval exceeds the specified threshold, the system considers that the port is under attack and begins to limit the packet receiving rate on the port (this function is also called inbound rate limit).
AAA Configuration Commands AAA Configuration Commands access-limit Syntax access-limit { disable | enable max-user-number } undo access-limit View ISP domain view Parameters disable: Specifies not to limit the number of access users that can be contained in current ISP domain. enable max-user-number: Specifies the maximum number of access users that can be contained in current ISP domain.
View ISP domain view Parameters local: Performs local accounting. It is not used for charging purposes, but for collecting statistics and limiting the number of local user connections. none: Specifies not to perform user accounting. radius-scheme radius-scheme-name: Specifies to use a RADIUS accounting scheme. Here, radius-scheme-name is the name of a RADIUS scheme;...
View ISP domain view Parameters local: Performs local accounting. It is not used for charging purposes, but for collecting statistics and limiting the number of local user connections. none: Does not perform any accounting. radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, which is a string of 1 to 32 characters.
none: Does not perform any accounting. radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, which is a string of 1 to 32 characters. Description Use the accounting login command to configure the accounting method for login users. Use the undo accounting login command to restore the default. By default, the default accounting method is used for login users.
The accounting optional command is commonly used in the cases where only authentication is needed and accounting is not needed. If you configure the accounting optional command in ISP domain view, it is effective to all users in the domain; if you configure it in RADIUS scheme view, it is effective to users the RADIUS scheme is used for.
Use the undo attribute command to cancel attribute settings of the user. You may use display local-user command to view the settings of the attributes. Examples # Create local user user1 and set the IP address attribute of user1 to 10.110.50.1, allowing only the user using the IP address of 10.110.50.1 to use the account user1 for authentication.
If you execute the authentication hwtacacs-scheme hwtacacs-scheme-name local command, the local scheme is used as the secondary authentication scheme in case no TACACS server is available. That is, if the communication between the switch and a TACACS server is normal, no local authentication will be performed;...
Description Use the authentication lan-access command to configure the authentication method for LAN access users. Use the undo authentication lan-access command to restore the default. By default, the default authentication method is used for LAN access users. Note that the RADIUS scheme specified for the current ISP domain must have been configured. Related commands: authentication, radius scheme.
HWTACACS scheme must exist. The S3100 series switches adopt hierarchical protection for command lines so as to inhibit users at lower levels from using higher level commands to configure the switches. For details about configuring a HWTACACS authentication scheme for low-to-high user level switching, refer to Switching User Level in the Command Line Interface Operation.
Examples # Set the HWTACACS scheme to ht for user level switching in the current ISP domain aabbcc.net. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] domain aabbcc.net New Domain added. [Sysname-isp-aabbcc.net] authentication super hwtacacs-scheme ht authorization Syntax authorization { local | none | hwtacacs-scheme hwtacacs-scheme-name [ local ] } undo authorization...
authorization login Syntax authorization login { hwtacacs-scheme hwtacacs-scheme-name [ local ] | local | none } undo authorization login View ISP domain view Parameters hwtacacs-scheme hwtacacs-scheme-name: Specifies an HWTACACS scheme by its name, which is a string of 1 to 32 characters. local: Performs local authorization.
Parameters string: Number or descriptor of the authorized VLAN for the current user, a string of 1 to 32 characters. If it is a numeral string and there is a VLAN with the number configured, it specifies the VLAN. If it is a numeral string but no VLAN is present with the number, it specifies the VLAN using it as the VLAN descriptor.
interface interface-type interface-number: Cuts down all user connections under a specified port. Here, interface-type is a port type and interface-number is a port number. ip ip-address: Cuts down all user connections with a specified IP address. ipv6 ipv6-address: Cuts down all user connections with a specified IPv6 address. mac mac-address: Cuts down the user connection with a specified MAC address.
Page 418
ip ip-address: Displays all user connections with a specified IP address. ipv6 ipv6-address: Displays all user connections with a specified IPv6 address. mac mac-address: Displays the user connection with a specified MAC address. Here, mac-address is in hexadecimal format (in the form of H-H-H). radius-scheme radius-scheme-name: Displays all user connections using a specified RADIUS scheme.
Table 1-1 Description of the Port NO field 31 to 28 bit 27 to 24 bit 23 to 20 bit 19 to 12 bit 11 to 0 bit UNIT ID Slot number Sub-slot number Port number VLAN ID display domain Syntax display domain [ isp-name ] View...
Field Description Vlan-assignment-mode VLAN assignment mode, which can be Integer or String. Domain user template settings, that is, attribute settings for all users Domain User Template in the domain. Idle-Cut Status of the idle-cut function Self-service URL Self-service URL for password changing Settings of the messenger time service, which is for reminding online users of their remaining online time.
Examples # Display information about all local users. <Sysname> display local-user The contents of local user test: State: Active ServiceType Mask: L Idle-cut: Enable Idle TimeOut: 3600 seconds Access-limit: Enable Current AccessNum: 1 Max AccessNum: 1024 Bind location: 127.0.0.1/1/0/2 (NAS/UNITID/SUBSLOT/PORT) Vlan ID: Authorization VLAN: IP address:...
Page 422
View System view Parameters isp-name: Name of an ISP domain, a string of up to 128 characters. This string cannot contain the following characters: /\:*?<>|. If the domain name includes one or more “~” characters and the last “~” is followed by numerals, it must be followed by at least five numerals to avoid confusion.
domain delimiter Syntax domain delimiter { at | dot } undo domain delimiter View System view Parameters at: Specifies “@” as the delimiter between the username and the ISP domain name. dot: Specifies “.” as the delimiter between the username and the ISP domain name. Description Use the domain delimiter command to specify the delimiter form between the username and the ISP domain name.
Page 424
Parameters disable: Disables the idle-cut function for the domain. enable: Enables the idle-cut function for the domain. minute: Maximum idle time in minutes, ranging from 1 to 120. flow: Minimum traffic in bytes, ranging from 1 to 10,240,000. Description Use the idle-cut command to set the user idle-cut function in current ISP domain. If a user’s traffic in the specified period of time is less than the specified amount, the system will disconnect the user.
If the configured authentication method is none or password authentication, the command level that a user can access after login is determined by the level of the user interface. If the configured authentication method requires a username and a password, the command level that a user can access after login is determined by the privilege level of the user.
Examples # Add a local user named user1. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] local-user user1 New local user added. [Sysname-luser-user1] # Add a local user named 01234567891234567 (note that it will appear as 012345678912345~0000 in the view prompt).
System View: return to User View with Ctrl+Z. [Sysname] local-user password-display-mode cipher-force messenger Syntax messenger time { enable limit interval | disable } undo messenger time View ISP domain view Parameters limit: Time limit in minutes, ranging from 1 to 60. The switch will send prompt messages at regular intervals to users whose remaining online time is less than this limit.
Parameters string: Assigned VLAN name, a string of up to 32 characters. Description Use the name command to set a VLAN name, which will be used for VLAN assignment. Use the undo name command to cancel the VLAN name. By default, a VLAN uses its VLAN ID (like VLAN 0001) as its assigned VLAN name. This command is used in conjunction with the dynamic VLAN assignment function.
With the cipher keyword specified, a password of up to 16 characters in plain text will be encrypted into a password of 24 characters in cipher text, and a password of 16 to 63 characters in plain text will be encrypted into a password of 88 characters in cipher text. For a password of 24 characters, if the system can decrypt the password, the system treats it as a password in cipher text.
scheme Syntax scheme { local | none | radius-scheme radius-scheme-name [ local ] | hwtacacs-scheme hwtacacs-scheme-name [ local ] } undo scheme [ none | radius-scheme | hwtacacs-scheme ] View ISP domain view Parameters radius-scheme-name: Name of a RADIUS scheme, a string of up to 32 characters. hwtacacs-scheme-name: Name of a HWTACACS scheme, a string of up to 32 characters.
[Sysname] domain aabbcc.net New Domain added. [Sysname-isp-aabbcc.net] scheme radius-scheme raduis1 local scheme lan-access Syntax scheme lan-access { local | none | radius-scheme radius-scheme-name [ local | none ] } undo scheme lan-access View ISP domain view Parameters radius-scheme-name: Name of a RADIUS scheme, a string of up to 32 characters. local: Specifies to use local authentication.
scheme login Syntax scheme login { local | none | radius-scheme radius-scheme-name [ local ] | hwtacacs-scheme hwtacacs-scheme-name [ local ] } undo scheme login View ISP domain view Parameters radius-scheme-name: Name of a RADIUS scheme, a string of up to 32 characters. local: Specifies to use local authentication.
self-service-url Syntax self-service-url { disable | enable url-string } undo self-service-url View ISP domain view Parameters url-string: URL of the web page used to modify user password on the self-service server. It is a string of 1 to 64 characters. This string cannot contain any question mark "?". If the actual URL of the self-service server contains a question mark, you should change it to an elect bar "|".
View Local user view Parameters ftp: Specifies that this is an FTP user. lan-access: Specifies that this is a LAN access user (who is generally an Ethernet access user, for example, 802.1x user). telnet: Authorizes the user to access the Telnet service. ssh: Authorizes the user to access the SSH service.
Description Use the state command to set the status of current ISP domain (in ISP domain view) or current local user (in local user view). By default, an ISP domain/local user is in the active state once it is created. After an ISP domain is set to the block state, except for online users, users in this domain are inhibited from accessing the network.
Page 436
The dynamic VLAN assignment feature enables a switch to dynamically add the ports of successfully authenticated users to different VLANs according to the attributes assigned by the RADIUS server, so as to control the network resources that different users can access. In actual applications, to use this feature together with Guest VLAN, you are recommended to set port control to port-based mode.
Examples # Set the VLAN assignment mode of the domain aabbcc.net to string. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] domain aabbcc.net New Domain added. [Sysname-isp-aabbcc.net] vlan-assignment-mode string RADIUS Configuration Commands accounting optional Syntax accounting optional undo accounting optional View RADIUS scheme view...
accounting start-mode Syntax accounting start-mode { with-ip | without-ip } View RADIUS scheme view Parameters with-ip: Specifies the mode in which the device must obtain the IP address of a requesting client and add the IP address to an accounting start request before this request can be sent to the RADIUS server. without-ip: Specifies the mode in which the device sends the RADIUS server an accounting start request without the IP address of the requesting client.
Page 439
After configuring the accounting-on enable command, you need to execute the save command so that the command can take effect when the switch restarts. This function requires the cooperation of the H3C CAMS system. Related commands: nas-ip. Examples # Enable the user re-authentication at restart function for the RADIUS scheme named radius1.
[Sysname] radius scheme radius1 [Sysname-radius-radius1] attribute-ignore standard type 28 # Configure RADIUS scheme radius1 to ignore H3C’s attribute 22. The vendor ID of H3C is 25506. [Sysname-radius-radius1] attribute-ignore vendor 25506 type 22 # Disable the RADIUS scheme from ignoring the standard RADIUS attributes, making the scheme to accept all standard RADIUS attributes assigned to it.
[Sysname-radius-radius1] undo attribute-ignore standard # Disable the RADIUS scheme from ignoring H3C’s attributes, making the scheme to accept all H3C’s RADIUS attributes assigned to it. [Sysname-radius-radius1] undo attribute-ignore vendor 25506 # Disable the RADIUS scheme from ignoring any attributes, making the scheme to accept all RADIUS attributes assigned to it.
View RADIUS scheme view Parameters data: Sets the data unit of outgoing RADIUS flows, which can be byte, giga-byte, kilo-byte, or mega-byte. packet: Sets the packet unit of outgoing RADIUS flows, which can be one-packet, giga-packet, kilo-packet, or mega-packet. Description Use the data-flow-format command to set the units of RADIUS data flows to RADIUS servers.
<Sysname> display local-server statistics On Unit 1: The localserver packet statistics: Receive: Send: Discard: Receive Packet Error: Auth Receive: Auth Send: Acct Receive: Acct Send: display radius scheme Syntax display radius scheme [ radius-scheme-name ] View Any view Parameters radius-scheme-name: Name of a RADIUS scheme, a string of up to 32 characters. Description Use the display radius scheme command to display configuration information about one specific or all RADIUS schemes...
Page 444
Primary Acc State=active, Second Acc State=block ------------------------------------------------------------------ Total 1 RADIUS scheme(s). 1 listed Table 1-5 Description on the fields of the display radius scheme command Field Description SchemeName Name of the RADIUS scheme Index Index number of the RADIUS scheme Type Type of the RADIUS servers IP address/port number of the primary authentication...
Page 445
display radius statistics Syntax display radius statistics View Any view Parameters None Description Use the display radius statistics command to display the RADIUS message statistics. Related commands: radius scheme. Examples # Display RADIUS message statistics. <Sysname> display radius statistics state statistic(total=1048): DEAD=1048 AuthProc=0 AuthSucc=0...
You can choose to display the buffered stop-accounting requests of a specified RADIUS scheme, session (by session ID), or user (by username). You can also specify a time range to display those generated within the specified time range. The displayed information helps you diagnose and resolve RADIUS problems.
The two parties verify the validity of the RADIUS messages received from each other by using the shared keys that have been set on them, and can accept and respond to the messages only when both parties have same shared key. The authentication/authorization shared key and the accounting shared key you set on the switch must be respectively consistent with the shared key on the authentication/authorization server and the shared key on the accounting server.
Page 449
Examples # Enable UDP ports for local RADIUS services. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] local-server enable local-server nas-ip Syntax local-server nas-ip ip-address key password undo local-server nas-ip ip-address View System view Parameters nas-ip ip-address: Specifies the IP address of a network access server (NAS) that can use the local RADIUS services.
Page 450
[Sysname] local-server nas-ip 10.110.1.2 key aabbcc nas-ip Syntax nas-ip { ip-address | ipv6 ipv6-address } undo nas-ip View RADIUS scheme view Parameters ip-address: Source IP address for RADIUS messages, an IP address of this device. This address can neither be the all 0's address nor be a Class-D address. ipv6 ipv6-address: Specifies an IPv6 address.
# Specify the IP address of the primary accounting server for RADIUS scheme radius1 as 10.110.1.2, the UDP port of the server as 1813, and the shared key of accounting packets as key1. <Sysname> system-view [Sysname] radius scheme radius1 [Sysname-radius-radius1] primary accounting 10.110.1.2 1813 key key1 primary authentication Syntax primary authentication { ip-address | ipv6 ipv6-address } [ port-number ] [ key string ]...
key string is not configured here, the shared key configured in the key command in RADIUS scheme view will be used. The IP addresses of the primary and secondary authentication/authorization servers cannot be the same. Otherwise, the configuration fails. Related commands: key, radius scheme, state. Examples # Set the IP address and UDP port number of the primary authentication/authorization server for RADIUS scheme radius1 to 10.110.1.1 and 1812 respectively.
Examples # Disable the RADIUS authentication and accounting ports. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] undo radius client enable radius nas-ip Syntax radius nas-ip { ip-address | ipv6 ipv6-address } undo radius nas-ip View System view Parameters ip-address: Source IP address to be set, an IP address of this device.
You can set only one source IP address by using this command. When you re-execute this command again, the newly set source IP address will overwrite the old one. Related commands: nas-ip. Examples # Set source address 129.10.10.1 for outgoing RADIUS messages. <Sysname>...
Examples # Create a RADIUS scheme named radius1 and enter its view. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] radius scheme radius1 New Radius scheme [Sysname-radius-radius1] radius trap Syntax radius trap { authentication-server-down | accounting-server-down } undo radius trap { authentication-server-down | accounting-server-down } View System view...
Examples # Delete the stop-accounting requests buffered for user user0001@aabbcc.net. <Sysname> reset stop-accounting-buffer user-name user0001@aabbcc.net # Delete the stop-accounting requests buffered from 0:0:0 08/31/2002 to 23:59:59 08/31/2002. <Sysname> reset stop-accounting-buffer time-range 00:00:00-08/31/2002 23:59:59-08/31/2002 retry Syntax retry retry-times undo retry View RADIUS scheme view Parameters retry-times: Maximum number of transmission attempts of a RADIUS request, ranging from 1 to 20.
retry realtime-accounting Syntax retry realtime-accounting retry-times undo retry realtime-accounting View RADIUS scheme view Parameters retry-times: Maximum allowed number of continuous real-time accounting failures, ranging from 1 to 255. Description Use the retry realtime-accounting command to set the maximum allowed number of continuous real-time accounting failures.
Examples # Set the maximum allowed number of continuous real-time accounting failures for RADIUS scheme radius1 to 10. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] radius scheme radius1 New Radius scheme [Sysname-radius-radius1] retry realtime-accounting 10 retry stop-accounting Syntax retry stop-accounting retry-times undo retry stop-accounting...
View RADIUS scheme view Parameters ip-address: IP address of the secondary authentication/authorization server to be used, in dotted decimal notation. ipv6 ipv6-address: IPv6 address of the secondary authentication/authorization server. port-number: UDP port number of the secondary authentication/authorization server, ranging from 1 to 65535.
Parameters extended: Specifies to support H3C's RADIUS server (which is generally a CAMS), that is, use the procedure and message format of private RADIUS protocol to interact with an H3C's RADIUS server. standard: Specifies to support standard RADIUS server, that is, use the procedure and message format of a standard RADIUS protocol (RFC 2865/2866 or above) to interact with a standard RADIUS server.
When the switch fails to communicate with the primary server due to some server trouble, the switch will turn to the secondary server and exchange messages with the secondary server. After the primary server remains in the block state for a set time (set by the timer quiet command), the switch will try to communicate with the primary server again when it receives a RADIUS request.
Examples # Set the status of the secondary accounting server with IPv6 address 1:1::2:5 to block. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] radius scheme radius1 New Radius scheme [Sysname-radius-radius1]state secondary accounting ipv6 1:1::2:5 block stop-accounting-buffer enable Syntax stop-accounting-buffer enable undo stop-accounting-buffer enable...
timer Syntax timer seconds undo timer View RADIUS scheme view Parameters seconds: Response timeout time of RADIUS servers, ranging from 1 to 10 seconds. Description Use the timer command to set the response timeout time of RADIUS servers (that is, the timeout time of the response timeout timer of RADIUS servers).
View RADIUS scheme view Parameters minutes: Wait time before primary server state restoration, ranging from 1 to 255 minutes. Description Use the timer quiet command to set the time that the switch waits before it tries to re-communicate with the primary server and restore the status of the primary server to active. Use the undo timer quiet command to restore the default wait time.
server is, the shorter the interval can be. It is recommended to set the interval as long as possible when the number of users is relatively great (≥1000). Table 1-6 lists the recommended intervals for different numbers of users. Table 1-6 Numbers of users and recommended intervals Number of users Real-time accounting interval 1 to 99...
Page 469
switch gets no answer before the response timeout timer expires, it needs to retransmit the request to ensure that the user can obtain RADIUS service. Appropriately setting the timeout time of this timer according to your network situation can improve the performance of your system.
For an 802.1x user, if you have specified to use EAP authentication, the switch will encapsulate and send the contents from the client directly to the server. In this case, the configuration of the user-name-format command is not effective. Related commands: radius scheme. Examples # Specify to exclude ISP domain names from the usernames to be sent to RADIUS server in RADIUS scheme radius1.
System View: return to User View with Ctrl+Z. [Sysname] hwtacacs scheme hwt1 [Sysname- hwtacacs-hwt1] data-flow-format data kilo-byte [Sysname- hwtacacs-hwt1] data-flow-format packet kilo-packet display hwtacacs Syntax display hwtacacs [ hwtacacs-scheme-name [ statistics ] ] View Any view Parameters hwtacacs-scheme-name: HWTACACS scheme name, a string of 1 to 32 characters. This name is case-insensitive.
Traffic-unit Packet traffic-unit : one-packet display stop-accounting-buffer Syntax display stop-accounting-buffer hwtacacs-scheme hwtacacs-scheme-name View Any view Parameters hwtacacs-scheme hwtacacs-scheme-name: Displays the buffered stop-accounting requests of a specified HWTACACS scheme. Here, hwtacacs-scheme-name is a string of up to 32 characters. Description Use the display stop-accounting-buffer command to display stop-accounting requests buffered in the switch.
You can specify the source address of outgoing HWTACACS messages to avoid messages returned from server from being unable to reach their destination due to physical interface trouble. It is recommended to use a Loopback interface address as the source IP address. You can specify only one source IP address by using this command.
Page 474
View HWTACACS scheme view Parameters accounting: Sets a shared key for HWTACACS accounting messages. authentication: Sets a shared key for HWTACACS authentication messages. authorization: Sets a shared key for HWTACACS authorization messages. string: Shared key to be set, a string of up to 16 characters. Description Use the key command to configure a shared key for HWTACACS authentication, authorization or accounting messages.
You can set only one source IP address by using this command. When you re-execute this command again, the newly set source IP address will overwrite the old one. Related commands: display hwtacacs. Examples # Set source IP address 10.1.1.1 for outgoing HWTACACS messages in HWTACACS scheme hwt1. <Sysname>...
primary authentication Syntax primary authentication ip-address [ port ] undo primary authentication View HWTACACS scheme view Parameters ip-address: IP address of the primary authentication server to be used, a valid unicast address in dotted decimal notation. port: Port number of the primary authentication server, ranging from 1 to 65535. Description Use the primary authentication command to set the IP address and port number of the primary HWTACACS authentication server to be used by the current scheme.
Parameters ip-address: IP address of the primary authorization server to be used, a valid unicast address in dotted decimal notation. port: Port number of the primary authorization server, ranging from 1 to 65535. Description Use the primary authorization command to set the IP address and port number of the primary HWTACACS authorization server to be used by the current scheme.
Examples # Clear all HWTACACS protocol statistics. <Sysname> reset hwtacacs statistics all reset stop-accounting-buffer Syntax reset stop-accounting-buffer hwtacacs-scheme hwtacacs-scheme-name View User view Parameters hwtacacs-scheme hwtacacs-scheme-name: Deletes the buffered stop-accounting requests of a specified HWTACACS scheme. Here, hwtacacs-scheme-name is the name of a HWTACACS scheme, which is a string of up to 32 characters.
Related commands: reset stop-accounting-buffer, hwtacacs scheme, display stop-accounting-buffer. Examples # Enable the stop-accounting request retransmission function and set the maximum number of transmission attempts of a request to 50. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] hwtacacs scheme hwt1 [Sysname-hwtacacs-hwt1] retry stop-accounting 50 secondary accounting Syntax...
secondary authentication Syntax secondary authentication ip-address [ port ] undo secondary authentication View HWTACACS scheme view Parameters ip-address: IP address of the secondary authentication server to be used, a valid unicast address in dotted decimal notation. port: Port number of the secondary authentication server, ranging from 1 to 65535. Description Use the secondary authentication command to set the IP address and port number of the secondary HWTACACS authentication server to be used by the current scheme.
Page 481
Parameters ip-address: IP address of the secondary authorization server, a valid unicast address in dotted decimal notation. port: Port number of the secondary authorization server, ranging from 1 to 65535. Description Use the secondary authorization command to set the IP address and port number of the secondary HWTACACS authorization server to be used by the current scheme.
Page 482
Examples # Configure the switch to wait 10 minutes before it tries to restore the status of the primary server to active. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] hwtacacs scheme hwt1 [Sysname-hwtacacs-hwt1] timer quiet timer realtime-accounting Syntax timer realtime-accounting minutes undo timer realtime-accounting...
Page 483
Examples # Set the real-time accounting interval in HWTACACS scheme hwt1 to 51 minutes. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] hwtacacs scheme hwt1 [Sysname-hwtacacs-hwt1] timer realtime-accounting 51 timer response-timeout Syntax timer response-timeout seconds undo timer response-timeout View HWTACACS scheme view Parameters...
Page 484
without-domain: Specifies to exclude ISP domain names from the usernames to be sent to TACACS server. Description Use the user-name-format command to set the format of the usernames to be sent to TACACS server. By default, the usernames sent to TACACS server in a HWTACACS scheme carry ISP domain names. Note that: Generally, an access user is named in the userid@isp-name format.
Page 485
EAD Configuration Commands Only the S3100-EI series switches support the EAD configuration. EAD Configuration Commands security-policy-server Syntax security-policy-server ip-address undo security-policy-server { ip-address | all } View RADIUS scheme view Parameters ip-address: IP address of a security policy server. all: IP addresses of all security policy servers. Description Use the security-policy-server command to set the IP address of a security policy server.
MAC Address Authentication Configuration Commands MAC Address Authentication Basic Function Configuration Commands display mac-authentication Syntax display mac-authentication [ interface interface-list ] View Any view Parameters interface interface-list: List of Ethernet ports. You can specify multiple Ethernet ports by providing this argument in the form of interface-list = { interface-type interface-number [ to interface-type interface-number ] } &<1-10>, where &<1-10>...
Page 489
--- 1 silent mac address(es) found. --- Ethernet1/0/1 is link-up MAC address authentication is Enabled max-auth-num is 256 Guest VLAN is 2 Authenticate success: 1, failed: 0 Current online user number is 1 MAC Addr Authenticate state AuthIndex 000d-88f8-4e71 MAC_AUTHENTICATOR_SUCCESS ……(The following is omitted) Table 1-1 Description on the fields of the display mac-authentication command Field...
Field Description The maximum number of users supported by the Max allowed user number switch. It is 1,024 by default. Current user number amounts to The current number of users The current domain. It is not configured by Current domain default.
Parameters None Description Use the mac-authentication command to enable MAC address authentication globally or on the current port. Use the undo mac-authentication command to disable MAC address authentication globally or on the current port. By default, MAC address authentication is disabled both globally and on a port. When being executed in system view, the mac-authentication command enables MAC address authentication globally.
Parameters interface-list: List of Ethernet ports. You can specify multiple Ethernet ports by providing this argument in the form of interface-list = { interface-type interface-number [ to interface-type interface-number ] } &<1-10>, where &<1-10> means that you can provide up to 10 port indexes/port index ranges for this argument.
Parameters usernameformat: Specifies the input format of the username and password. with-hyphen: Uses hyphened MAC addresses as usernames and passwords, for example, 00-05-e0-1c-02-e3. without-hyphen: Uses MAC addresses without hyphens as usernames and passwords, for example, 0005e01c02e3. lowercase: Uses lowercase MAC addresses as usernames and passwords. uppercase: Uses uppercase MAC addresses as usernames and passwords.
Examples # Use the user name in fixed mode for MAC address authentication. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] mac-authentication authmode usernamefixed mac-authentication authpassword Syntax mac-authentication authpassword password undo mac-authentication authpassword View System view Parameters password: Password to be set, a string comprising 1 to 63 characters.
By default, the user name in fixed mode is “mac”. Examples # Set the user name to vipuser in fixed mode. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] mac-authentication authusername vipuser mac-authentication domain Syntax mac-authentication domain isp-name undo mac-authentication domain View System view...
Parameters offline-detect-value: Offline detect timer, which specifies the idle timeout interval (in seconds) for users. At this interval, the switch checks whether there is traffic from each user. If receiving no traffic from a user within two consecutive intervals, the switch logs the user out and notifies the RADIUS server. The value range for the offline-detect-value argument is 0 to 3000000.
The offline detect timer configured in system view applies to all MAC authentication-enabled ports. The offline detect timer configured in Ethernet port view applies to the current port only. You can set the offline detect timer to different values on different Ethernet ports. The offline detect timer configured in Ethernet port view takes precedence over the one configured in system view.
View Ethernet interface view Parameters authfail-vlan-id: ID of the Auth-Fail VLAN for the port, in the range of 1 to 4094. The VLAN must already exist. Description Use the mac-authentication auth-fail vlan command to specify an Auth-Fail VLAN for MAC authentication.
Description Use the mac-authentication guest-vlan command to configure a MAC authentication guest VLAN for the current port. If the client connected to the port fails in the MAC authentication, the port will be added to the guest VLAN, and thus the users accessing the port can access network resources in the guest VLAN.
Parameter None Description Use the mac-authenticiaon intrusion-mode block-mac enable command to enable the quiet MAC function on a port. When this function is enabled, the MAC address connected to this port will be set as a quiet MAC address if its authentication fails. When this function is disabled, the MAC address will not become quiet no matter whether the authentication is failed.
If both the limit on the number of MAC address authentication users and the limit on the number of users configured in the port security function are configured for a port at the same time, the smaller value of the two configured limits is adopted as the maximum number of MAC address authentication users allowed to access this port.
Web Authentication Configuration Commands Web Authentication Configuration Commands Currently, only the S3100-EI series support Web authentication. display web-authentication configuration Syntax display web-authentication configuration View Any view Parameters None Description Use the display web-authentication configuration command to display all Web authentication configurations, including global configurations and configurations on individual ports.
Table 1-1 Description on the fields of display web-authentication configuration Field Description Status Global status of Web authentication Protocol Access protocol for Web authentication, HTTP or HTTPS Web Server IP address and port number of the Web authentication server Idle-cut time idle user checking interval Max-online time Maximum online time specified for Web authentication users...
State: ONLINE Online-Time(s): 8 Total 1 connection(s) matched Table 1-2 Description on the fields of display web-authentication connection Field Description Username Name of an online Web-authentication user MAC address of the user Interface Access port of the user VLAN VLAN the user belongs to Access method of the user, shared, designated, or Method extended.
By default, no customized information is configured to be displayed on Web authentication pages. Examples # Customize information to be displayed on Web authentication pages as follows: Company name: H3C Technologies E-mail: customer_service@h3c.com Phone number: +86-571-86760000...
Subject: A leading global supplier of IP-based products and solutions <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] web-authentication customize corp-name H3C Technologies [Sysname] web-authentication customize email customer_service@h3c.com [Sysname] web-authentication customize phone-num +86-571-86760000 [Sysname] web-authentication customize platform-name A leading global supplier of IP-based...
Page 509
interface-type interface-number: Specifies all users on a port. Description Use the web-authentication cut connection command to forcibly log out the specified or all users. Examples # Forcibly log out all online users on Ethernet 1/0/2. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] web-authentication cut connection interface Ethernet1/0/2 web-authentication enable Syntax...
Description Use the web-authentication free-ip command to set a free IP address range, which can be accessed by users before they pass Web authentication. Use the undo web-authentication free-ip command to remove the setting or all such settings. By default, no free IP address range is set. The to-be-set free IP address range cannot include the Web authentication server’s IP address.
By defualt, no web authentication-free user is configured. Note that: In system view, if you provide the interface interface-list parameter, the command configures a web authentication-free user on the specified ports; otherwise, the command configures a web authentication-free user globally. In Ethernet interface view, the command configures a web authentication-free user for the port and the interface-list argument is not available.
web-authentication move-mode Syntax web-authentication move-mode { auto | secure } undo web-authentication move-mode View System view Parameters auto: Auto mode. In this mode, a web authenticated user can move between ports in the same access VLAN without needing re-authentication and the switch keeps the user in authenticated state on the new port after transition.
Description Use the web-authentication protocol command to specify the access protocol for Web authentication. If you specify the access protocol as HTTPS, authentication information exchanged between the switch and its clients will be in ciphertext. Use the undo web-authentication protocol command to restore the default. By default, HTTP is used between the switch and its clients.
Extended: In this method, a hybrid port allows multiple Web authentication users to get online at the same time. This configuration takes effect only when Web authentication is enabled globally. If Web authentication is not enabled globally, this configuration will only be saved. It is not allowed to enable Web authentication on a port in an aggregation group.
Examples # Set the idle user checking interval to 500 seconds for Web authentication. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] web-authentication timer idle-cut 500 web-authentication timer max-online Syntax web-authentication timer max-online timer undo web-authentication timer max-online View System view Parameters...
Use the undo web-authentication web-proxy port command to delete all proxy server ports configured for web authentication. By default, no proxy server port is configured. Note that: Up to eight proxy server ports can be configured. The port configured using this command cannot be the one used in the web-authentication web-server ip ip-address port port-number command;...
ARP Configuration Commands ARP Configuration Commands arp check enable Syntax arp check enable undo arp check enable View System view Parameters None Description Use the arp check enable command to enable the ARP entry checking function on a switch. Use the undo arp check enable command to disable the ARP entry checking function. With the ARP entry checking function enabled, the switch cannot learn any ARP entry with a multicast MAC address.
VLAN. By default, ARP attack detection is disabled on the switch. Note that among S3100 series switches, only S3100-EI series switches support the two commands. Examples # Enable ARP attack detection on all ports in VLAN 1.
ARP packet receiving rate after a specified period. By default, the port state auto-recovery function is disabled. Note that among S3100 series switches, only S3100-EI series switches support the two commands. Examples # Enable the port state auto-recovery function of the switch.
By default, when the port state auto-recovery function is enabled, the recovery interval is 300 seconds. Note that: Among S3100 series switches, only S3100-EI series switches support the two commands. You need to enable the port state auto-recovery feature before you can configure the auto-recovery interval.
Use the undo arp rate-limit enable command to disable the ARP packet rate limit function on the port. By default, the ARP packet rate limit function is disabled, that is, ARP packet rate is not limited on a port. Note that among S3100 series switches, only S3100-EI series switches support the two commands. Examples # Enable the ARP packet rate limit function on Ethernet 1/0/11.
Use the undo arp restricted-forwarding enable command to disable ARP restricted forwarding. By default, ARP restricted forwarding is disabled. Note that among S3100 series switches, only S3100-EI series switches support the two commands. Related commands: arp detection enable, arp detection trust Syntax # Enable ARP restricted forwarding in VLAN 1.
Static ARP entries are valid as long as the Ethernet switch operates normally. But some operations, such as removing a VLAN, or removing a port from a VLAN, will make the corresponding ARP entries invalid and therefore removed automatically. As for the arp static command, the value of the vlan-id argument must be the ID of an existing VLAN, and the port identified by the interface-type and interface-number arguments must belong to the VLAN.
Page 525
View Any view Parameters dynamic: Displays dynamic ARP entries. static: Displays static ARP entries. ip-address: IP address. ARP entries containing the IP address are to be displayed. Description Use the display arp command to display specific ARP entries. If you execute this command with no keyword/argument specified, all the ARP entries are displayed. Related commands: arp static, reset arp.
Page 526
display arp | Syntax display arp [ dynamic | static] | { begin | exclude | include } regular-expression View Any view Parameters dynamic: Displays dynamic ARP entries. static: Displays static ARP entries. |: Uses a regular expression to specify the ARP entries to be displayed. For detailed information about regular expressions, refer to Configuration File Management Command in this manual.
If ARP attack detection is disabled, the statistics of ARP trusted port state and discarded invalid ARP packets will not be displayed. Note that among S3100 series switches, only S3100-EI series switches support the command. Examples # Display ARP detection statistics on Ethernet 1/0/10.
View System view Parameters None Description Use the gratuitous-arp-learning enable command to enable the gratuitous ARP packet learning function. Then, a switch receiving a gratuitous ARP packet can add the IP and MAC addresses carried in the packet to its own dynamic ARP table if it finds no corresponding ARP entry for the ARP packet in the cache.
Page 530
Table of Contents 1 DHCP Server Configuration Commands ·································································································1-1 DHCP Server Configuration Commands ································································································1-1 accounting domain ··························································································································1-1 bims-server······································································································································1-2 dhcp enable ·····································································································································1-2 dhcp select global····························································································································1-3 dhcp select interface························································································································1-4 dhcp server bims-server ··················································································································1-6 dhcp server detect ···························································································································1-6 dhcp server dns-list ·························································································································1-7 dhcp server domain-name···············································································································1-8 dhcp server expired ·························································································································1-9 dhcp server forbidden-ip················································································································1-11 dhcp server ip-pool ························································································································1-12...
Page 531
2 DHCP Snooping Configuration Commands ···························································································2-1 DHCP Snooping Configuration Commands····························································································2-1 dhcp-snooping ·································································································································2-1 dhcp-snooping information enable ··································································································2-1 dhcp-snooping information format···································································································2-2 dhcp-snooping information packet-format ·······················································································2-3 dhcp-snooping information remote-id······························································································2-3 dhcp-snooping information strategy ································································································2-4 dhcp-snooping information vlan circuit-id ························································································2-5 dhcp-snooping information vlan remote-id ······················································································2-6 dhcp-snooping server-guard enable································································································2-7 dhcp-snooping server-guard method ······························································································2-7 dhcp-snooping server-guard source-mac························································································2-8...
DHCP Server Configuration Commands DHCP Server Configuration Commands The contents of this chapter are only applicable to the S3100-EI series among S3100 Series Ethernet Switches. accounting domain Syntax accounting domain domain-name undo accounting domain View DHCP address pool view Parameters domain-name: Name of a domain, a string of 1 to 24 characters.
bims-server Syntax bims-server ip ip-address [ port port-number ] sharekey key undo bims-server View DHCP address pool view Parameters ip ip-address: Specifies the IP address of the remote BIMS server. port port-number: Specifies the port number of the remote BIMS. The port-number argument ranges from 1 to 65534.
Description Use the dhcp enable command to enable DHCP. Use the undo dhcp enable command to disable DHCP. By default, DHCP is enabled. You need to enable DHCP before performing other DHCP-related configurations. To improve security and avoid malicious attacks to the unused sockets, S3100 Ethernet switches provide the following functions: UDP ports 67 and 68 used by DHCP are enabled/disabled only when DHCP is enabled/disabled.
Parameters interface interface-type interface-number [ to interface-type interface-number ]: Specifies the interface(s) to operate in global address pool mode. The interface-type argument specifies an interface type; the interface-number argument specifies an interface number; the interface interface-type interface-number [ to interface-type interface-number ] keyword and argument combination specifies an interface range.
Page 536
Parameters interface interface-type interface-number [ to interface-type interface-number ]: Specifies the interface(s) to operate in interface address pool mode. The argument interface-type indicates interface type, interface-number indicates interface number. interface-type interface-number [ to interface-type interface-number ] specifies an interface range. all: Specifies all interfaces to operate in interface address pool mode.
[Sysname] dhcp select interface all dhcp server bims-server Syntax dhcp server bims-server ip ip-address [ port port-number ] sharekey key { interface interface-type interface-number [ to interface-type interface-number ] | all } undo dhcp server bims-server { interface interface-type interface-number [ to interface-type interface-number ] | all } View System view...
undo dhcp server detect View System view Parameters None Description Use the dhcp server detect command to enable the unauthorized DHCP server detection function. With this feature enabled, upon receiving a DHCP request, the DHCP server will record the IP addresses of any DHCP servers which ever assigned an IP address to the DHCP client and the receiving interface.
Parameters ip-address&<1-8>: IP address of a DNS server. &<1-8> means you can provide up to eight DNS server IP addresses. When inputting more than one DNS server IP address, separate two neighboring IP addresses with a space. interface interface-type interface-number [ to interface-type interface-number ]: Specifies the interface(s), through which you can specify the corresponding interface address pools.
undo dhcp server domain-name { interface interface-type interface-number [ to interface-type interface-number ] | all } View System view, VLAN interface view Parameters domain-name: Domain name suffix of the DHCP clients whose IP addresses are from the specified interface address pool(s). This argument is a string of 3 to 50 characters. interface interface-type interface-number [ to interface-type interface-number ]: Specifies the interface(s), through which you can specify the corresponding interface address pool(s).
Page 541
dhcp server expired { day day [ hour hour [ minute minute [ second second ] ] ] | unlimited } undo dhcp server expired In system view, use the following commands to configure the lease time of the IP addresses in multiple DHCP interface address pools.
Page 542
[Sysname] dhcp server expired day 2 interface Vlan-interface 2 to Vlan-interface 5 dhcp server forbidden-ip Syntax dhcp server forbidden-ip low-ip-address [ high-ip-address ] undo dhcp server forbidden-ip low-ip-address [ high-ip-address ] View System view Parameters low-ip-address: IP address that is not available for being assigned to DHCP clients automatically (An IP address of this kind is known as a forbidden IP address).
# Forbid the IP addresses in the range 10.110.1.1 to 10.110.1.63 to be automatically assigned. [Sysname] dhcp server forbidden-ip 10.110.1.1 10.110.1.63 dhcp server ip-pool Syntax dhcp server ip-pool pool-name undo dhcp server ip-pool pool-name View System view Parameters pool-name: Name of a DHCP address pool, which uniquely identifies the address pool. This argument is a string of 1 to 35 characters.
[Sysname-dhcp-pool-0] dhcp server nbns-list Syntax In VLAN interface view, use the following commands to configure WINS server IP address(es) in the current DHCP interface address pool for the client. dhcp server nbns-list ip-address&<1-8> undo dhcp server nbns-list { ip-address | all } In system view, use the following commands to configure WINS server IP addresses in multiple DHCP interface address pools for the client.
System View: return to User View with Ctrl+Z. # Configure the WINS server IP address 10.12.1.99 in all the DHCP interface address pools for the DHCP client. [Sysname] dhcp server nbns-list 10.12.1.99 all dhcp server netbios-type Syntax In VLAN interface view, use the following commands to configure the NetBIOS node type of the DHCP clients whose IP addresses are from the current DHCP interface address pool.
Use the undo dhcp server netbios-type command to restore the default NetBIOS node type. By default, no NetBIOS node type is specified. After the WINS server IP address is configured for the client in the DHCP interface address pool, the client uses the hybrid node (h-node). Related commands: netbios-type, dhcp server nbns-list.
interface-type argument specifies an interface type; the interface-number argument specifies an interface number; the interface interface-type interface-number [ to interface-type interface-number ] keyword and argument combination specifies an interface range. all: Specifies all interface address pools. Description Use the dhcp server option command to customize DHCP options for the specified DHCP interface address pool(s).
System View: return to User View with Ctrl+Z. # Set the maximum number of the echo request packets to 10, and the response timeout time to 300 milliseconds. [Sysname] dhcp server ping packets 10 [Sysname] dhcp server ping timeout 300 dhcp server relay information enable Syntax dhcp server relay information enable...
client-identifier: Client ID of a static binding, a string of 4 to 160 characters in the format H-H-H…, each H indicates 4 hex digits except the last H that indicates 2 or 4 hex digits. For example, aabb-cccc-dd is a valid ID, while aabb-c-dddd and aabb-cc-dddd are both invalid. mac-address: MAC address to which the IP address is statically bound.
# Enable the DHCP server to support all the sub-options of Option 184 in VLAN-interface 1. The NCP IP address is 1.1.1.1 and the IP address of the alternate server is 2.2.2.2. The voice VLAN is enabled, with the ID being 3. The fail-over IP address is 3.3.3.3 and the dial number string is 99*. [Sysname-Vlan-interface1] dhcp select interface [Sysname-Vlan-interface1] dhcp server voice-config ncp-ip 1.1.1.1 [Sysname-Vlan-interface1] dhcp server voice-config as-ip 2.2.2.2...
Page 552
View Any view Parameters ip ip-address: Specifies an IP address. pool [ pool-name ]: Specifies a global address pool. The pool-name argument, a string of 1 to 35 characters, is the name of an address pool. If you do not provide this argument, this command applies to all global address pools.
Table 1-2 Description on the fields of the display dhcp server expired command Field Description The information about the expired IP addresses Global pool of global address pools The information about the expired IP addresses Interface pool of interface address pools IP address Bound IP addresses User ID or MAC addresses to which IP...
Page 554
pool [ pool-name ]: Specifies a global address pool. The pool-name argument, a string of 1 to 35 characters, is the name of an address pool. If you do not provide this argument, this command applies to all global address pools. interface [ interface-type interface-number ]: Specifies a VLAN interface.
display dhcp server statistics Syntax display dhcp server statistics View Any view Parameters None Description Use the display dhcp server statistics command to display the statistics on a DHCP server. Related commands: reset dhcp server statistics. Examples # Display the statistics on a DHCP server. <Sysname>...
Pool Number Number of address pools Auto Number of the automatically bound IP addresses Manual Number of the manually bound IP addresses Expire Number of the expired IP addresses Boot Request: Dhcp Discover: Dhcp Request: Statistics about the DHCP packets received from DHCP clients Dhcp Decline: Dhcp Release:...
expired 1 0 0 Pool name: test1234 network 10.1.1.0 mask 255.255.255.0 Parent node:test123 option 30 hex AA BB expired 1 0 0 Interface pool: Pool name: Vlan-interface2 network 192.168.2.0 mask 255.255.255.0 gateway-list 192.168.2.1 expired 1 0 0 Table 1-5 Description on the fields of the display dhcp server tree command Field Description Global pool...
Page 558
Parameters ip-address&<1-8>: IP address of a DNS server. &<1-8> string means you can provide up to eight DNS server IP addresses. When inputting more than one IP address, separate two neighboring IP addresses with a space. all: Specifies all configured DNS server IP addresses. Description Use the dns-list command to configure one or multiple DNS server IP addresses in a DHCP global address pool for the DHCP client.
Page 559
Examples # Enter system view. <Sysname> system-view System View: return to User View with Ctrl+Z. # Configure the domain name suffix mydomain.com in the DHCP global address pool 0 for the DHCP client. [Sysname] dhcp server ip-pool 0 [Sysname-dhcp-pool-0] domain-name mydomain.com expired Syntax expired { day day [ hour hour [ minute minute [ second second ] ] ] | unlimited }...
gateway-list Syntax gateway-list ip-address&<1-8> undo gateway-list { ip-address | all } View DHCP address pool view Parameters ip-address&<1-8>: IP address of a gateway. &<1-8> means you can provide up to eight gateway IP addresses. When inputting more than one IP address, separate two neighboring IP addresses with a space.
all: Specifies all configured WINS server IP addresses. Description Use the nbns-list command to configure one or multiple WINS server IP addresses in the DHCP global address pool for the DHCP client. Use the undo nbns-list command to remove one or all WINS server IP addresses configured for the DHCP client.
By default, no NetBIOS node type is specified in a DHCP global address pool for the DHCP client. After the WINS server IP address is configured for the client in the DHCP global address pool, the client uses the hybrid node (h-node). Related commands: dhcp server ip-pool, dhcp server netbios-type, nbns-list.
Parameters ip ip-address: Specifies an IP address, whose conflict statistics will be cleared. all: Clears all address conflict statistics. Description Use the reset dhcp server conflict command to clear address conflict statistics. Related commands: display dhcp server conflict. Examples # Clear all address conflict statistics. <Sysname>...
View User view Parameters None Description Use the reset dhcp server statistics command to clear the statistics on a DHCP server, such as the number of DHCP unrecognized packets/request packets/response packets. Related commands: display dhcp server statistics. Examples # Clear the statistics on a DHCP server. <Sysname>...
<Sysname> system-view System View: return to User View with Ctrl+Z. # Bind the host aaaa-bbbb with the IP address 10.1.1.1. The mask is 255.255.255.0. [Sysname] dhcp server ip-pool 0 [Sysname-dhcp-pool-0] static-bind ip-address 10.1.1.1 mask 255.255.255.0 [Sysname-dhcp-pool-0] static-bind client-identifier aaaa-bbbb static-bind ip-address Syntax static-bind ip-address ip-address [mask mask ] undo static-bind ip-address...
static-bind mac-address Syntax static-bind mac-address mac-address undo static-bind mac-address View DHCP address pool view Parameters mac-address: MAC address of the host to which the IP address is to be bound. You need to provide this argument in the form of H-H-H. Description Use the static-bind mac-address command to specify a MAC address to which an IP address will be bound statically in a DHCP global address pool.
Page 568
View DHCP address pool view Parameters ncp-ip ip-address: Specifies the IP address of the primary network calling processor. as-ip ip-address: Specifies the IP address of the backup network calling processor. voice-vlan vlan-id: Specifies the voice VLAN ID, in the range of 2 to 4094. disable: Disables the specified VLAN, meaning DHCP clients will not take this VLAN as their voice VLAN.
DHCP Snooping Configuration Commands DHCP Snooping Configuration Commands dhcp-snooping Syntax dhcp-snooping undo dhcp-snooping View System view Parameters None Description Use the dhcp-snooping command to enable the DHCP snooping function. Use the undo dhcp-snooping command to disable the DHCP snooping function. After DHCP snooping is disabled, all the ports can forward DHCP replies from the DHCP server without recording the IP-to-MAC bindings of the DHCP clients.
Option 82 as HEX or ASCII. By default, the Option 82 is in HEX format. Note that among S3100 series switches, only S3100-EI series switches support the two commands. The dhcp-snooping information format command applies only to the default content of the Option 82 field.
Option 82 as the extended or standard one. By default, the padding format for Option 82 is the extended one. Note that among S3100 series switches, only S3100-EI series switches support the two commands. Examples # Configure the padding format for Option 82 as the standard one.
By default, the remote ID sub-option in Option 82 is the MAC address of the DHCP Snooping device that received the DHCP client’s request. Note that among S3100 series switches, only S3100-EI series switches support the two commands. Examples # Configure the remote ID sub-option of Option 82 as the system name (sysname) of the DHCP snooping device.
Page 573
Enable DHCP-snooping and DHCP-snooping Option 82 before performing this configuration. If a handling policy is configured on a port, this configuration overrides the globally configured handling policy for requests received on this port, while the globally configured handling policy applies on those ports where a handling policy is not natively configured. Examples # Configure the keep handling policy for DHCP requests that contain Option 82 on the DHCP snooping device.
Page 574
Ethernet port view, the former circuit ID applies to the DHCP messages from the specified VLAN, while the latter one applies to DHCP messages from other VLANs. Note that among S3100 series switches, only S3100-EI series switches support the two commands. Examples # Set the circuit ID field in Option 82 of the DHCP messages sent through Ethernet 1/0/1 to abc.
Note that among S3100 series switches, only S3100-EI series switches support the two commands. Examples # Configure the remote ID of Option 82 in DHCP packets to abc on the port Ethernet 1/0/1. <Sysname> system-view System View: return to User View with Ctrl+Z.
By default, the unauthorized DHCP server detection handling method is trap. Note that: Among S3100 series switches, only S3100-SI series switches support the two commands. A port shut down administratively is in the closed state and cannot receive or forward packets;...
By default, the source MAC address of DHCP-DISCOVER messages is the bridge MAC address of the switch. Note that among S3100 series switches, only S3100-SI series switches support the two commands. Examples # Specify the source MAC address for DHCP-DISCOVER messages as 000f-e200-3100.
display dhcp-snooping Syntax display dhcp-snooping [ unit unit-id ] View Any view Parameters unit unit-id: Indicates the number of the device whose DHCP-snooping information needs to be viewed, the value is 1. Description Use the display dhcp-snooping command to display the user IP-MAC address mapping entries recorded by the DHCP snooping function.
Description Use the display dhcp-snooping server-guard command to display information about unauthorized DHCP server detection. Note that among S3100 series switches, only S3100-SI series switches support this command. Examples # Display information about unauthorized DHCP server detection. <Sysname> display dhcp-snooping server-guard DHCP-Snooping is enabled.
If you specify a VLAN, all the IP static binding entries for the specified VLAN will be displayed. If you specify a port, all the IP static binding entries for the specified port will be displayed. Note that among S3100 series switches, only S3100-EI series switches support the two commands. Examples # Display all IP static binding entries configured.
Page 581
By default, the filtering of the IP packets received through a port based on the source IP address or source MAC address of the packets is disabled. Note that among S3100 series switches, only S3100-EI series switches support the two commands. Examples # Enable the filtering of the IP packets received through port Ethernet 1/0/11 based on the source IP address of the packets.
IP address cannot pass the IP filtering. Note that among S3100 series switches, only S3100-EI series switches support the two commands. Related commands: ip check source ip-address. Examples # Configure static binding among source IP address 1.1.1.1, source MAC address 0015-e20f-0101, and...
Page 583
Description Use the reset dhcp-snooping command to remove DHCP snooping entries from a switch. If no ip-address is specified, all DHCP snooping entries are removed. Examples # Remove all DHCP snooping entries from the switch. <Sysname> reset dhcp-snooping 2-15...
dhcp protective-down recover interval Syntax dhcp protective-down recover interval interval undo dhcp protective-down recover interval View System view Parameters interval: Interval (in seconds) for a port disabled due to the DHCP traffic exceeding the set threshold to be brought up again. This argument ranges from 10 to 86,400. Description Use the dhcp protective-down recover interval command to set an auto recovery interval.
Description Use the dhcp rate-limit command to configure the maximum rate of DHCP traffic for the port. When the number of DHCP packets received on the port per second exceeds the specified threshold, the switch will discard the exceeding DHCP packets. Use the undo dhcp rate-limit command to restore the default.
Description Use the display dhcp client command to display the information about the address allocation of DHCP clients. Note that S3100 series Ethernet switches that operate as DHCP clients support a maximum lease duration of 24 days currently. Examples # Display the information about the address allocation of DHCP clients.
Table 4-1 Description on the fields of the display dhcp client command Field Description VLAN interface operating as a DHCP client to Vlan-interface1 obtain an IP address dynamically Current machine state The state of the client state machine Allocated IP IP address allocated to the DHCP client lease Lease period...
To improve security and avoid malicious attacks to the unused sockets, S3100 Ethernet switches provide the following functions: UDP ports 67 and 68 used by DHCP are enabled/disabled only when DHCP is enabled/disabled. The implementation is as follows: After the DHCP client is enabled by executing the ip address dhcp-alloc command, UDP port 68 is enabled.
Table 4-2 Description on the fields of the display bootp client command Field Description VLAN-interface 1 is configured to obtain an IP Vlan-interface1 address through BOOTP. Allocated IP IP address allocated to the VLAN interface Transaction ID Value of the XID field in BOOTP packets Mac Address MAC address of the BOOTP client Default router...
ACL Configuration Commands H3C S3100-SI Series Ethernet switches support basic ACLs and advanced ACLs; S3100-EI Series Ethernet switches support basic ACLs, advanced ACLs, and Layer 2 ACLs, and IPv6 ACLs. ACL Configuration Commands Syntax acl number acl-number [ match-order { auto | config } ]...
By default, ACL rules are matched in the order they are defined. Only after the rules in an existing ACL are fully removed can you modify the match order of the ACL. In ACL view, you can use the rule command to add rules to the ACL. Related commands: rule.
Examples # Assign description string “This ACL is used for filtering all HTTP packets” to ACL 3000. <Sysname> system-view [Sysname] acl number 3000 [Sysname-acl-adv-3000] description This ACL is used for filtering all HTTP packets # Use the display acl command to view the configuration information of ACL 3000. [Sysname-acl-adv-3000] display acl 3000 Advanced ACL 3000, 0 rule...
According to the output, you can determine the number of resources consumed by a certain type of ACL rules and whether the exhaustion of resources causes the failure to assign ACL rules. Only H3C S3100-EI series switches support this command. Example # Display information about the remaining ACL resources.
Field Description Remaining Number Number of remaining resources Start Port Name Start port number and end port number corresponding to the entry End Port Name display ipv6-acl-template Syntax display ipv6-acl-template View Any view Parameter None Description Use the display ipv6-acl-template command to display the IPv6 ACL template configuration information.
Displays information about packet filtering on the VLAN specified by vlan-id. Description Use the display packet-filter command to display information about packet filtering. Only H3C S3100-EI series switches support this command. Example # Display information about packet filtering on the switch.
Description Use the display time-range command to display the configuration and status of a time range or all the time ranges. For active time ranges, this command displays “Active”; for inactive time ranges, this command displays “Inactive”. Related commands: time-range. Examples # Display all time ranges.
If there is already a template, you need to remove it to configure a new one. If the template is referenced by an IPv6 ACL rule that has been applied, you cannot remove it. Only H3C S3100-EI series switches support this command. Example # Configure an IPv6 ACL template to match the source address and destination address fields in IPv6 packets.
Page 601
Use the undo packet-filter command to cancel the assignment of an ACL. Only H3C S3100-EI series switches support this command. Examples # Apply all rules of basic ACL 2000 on Ethernet 1/0/1 to filter inbound packets. Here, it is assumed that the ACL and its rules are already configured.
When you need to apply an ACL to all ports in a VLAN, you can use the packet-filter vlan command to achieve the goal in one operation. Only H3C S3100-EI series switches support this command. An ACL assigned to a VLAN takes effect only for the packets tagged with 802.1Q header. For more information about 802.1Q header, refer to the VLAN part.
rule (for Basic ACLs) Syntax rule [ rule-id ] { deny | permit} [ rule-string ] undo rule rule-id [ fragment | source | time-range ]* View Basic ACL view Parameters Parameters of the rule command rule-id: ACL rule ID, in the range of 0 to 65534. deny: Drops the matched packets.
Page 604
When you assign basic ACLs to the hardware for packet filtering, the fragment keyword is not supported on a H3C S3100-EI Series Ethernet switch. Description Use the rule command to define an ACL rule. Use the undo rule command to remove an ACL rule or specified settings of an ACL rule.
Page 606
Arguments/Keywords Type Function Description Indicates that the Fragment rule applies only fragment — information to non-tail fragments. Specifies the TTL The ttl argument can be a number in information for the ACL rule. the range 0 to 255. Specifies the time-name: specifies the name of the Time range time range in...
Page 607
Keyword DSCP value in decimal DSCP value in binary 110000 111000 101110 If you specify the precedence keyword, you can directly input a value ranging from 0 to 7 or input one of the keywords listed in Table 1-9 as IP precedence. Table 1-9 IP Precedence values and the corresponding keywords Keyword IP Precedence in decimal...
Page 608
Table 1-11 TCP/UDP-specific ACL rule information Parameters Type Function Description The value of operator can be lt (less than), gt (greater than), eq (equal to), neq (not equal to) or range (within the range of). Only the range operator requires two port numbers as the operands.
Page 609
Table 1-13 ICMP-specific ACL rule information Parameters Type Function Description icmp-type: ICMP message type, Type and Specifies the type and icmp-type ranging from 0 to 255 message code message code icmp-type information of information of ICMP icmp-code: ICMP message code, icmp-code ICMP packets packets in the ACL rule...
Page 610
Parameters of the undo rule command rule-id: Rule ID, which must the ID of an existing ACL rule. You can obtain the ID of an ACL rule by using the display acl command. source: Removes the settings concerning the source address in the ACL rule. source-port: Removes the settings concerning the source port in the ACL rule.
If you do not specify the rule-id argument when creating an ACL rule, the rule will be numbered automatically. If the ACL has no rules, the rule is numbered 0; otherwise, the number of the rule will be the greatest rule number plus one. If the current greatest rule number is 65534, however, the system will display an error message and you need to specify a number for the rule.
Page 612
Table 1-16 Layer 2 ACL rule information Parameters Type Function Description Specifies the link Link layer layer This argument can be 802.3/802.2, format-type encapsulation encapsulation 802.3, ether_ii, or snap. type type in the rule lsap-code: Encapsulation format of data frames, a 16-bit hexadecimal Specifies the number.
Page 613
Parameters Type Function Description Specifies the protocol-type: Protocol type. type protocol-type Protocol type of protocol type of protocol-mask Ethernet frames Ethernet frames protocol-mask: Protocol type mask. for the ACL rule Note the following when assigning an Layer 2 ACL to the hardware: The 802.3/802.2 and 802.3 keywords are not supported.
Use the undo rule command to remove an ACL rule. To remove an ACL rule, you need to specify the ID of the ACL rule. You can use the display acl command to view the ID of an ACL rule. Note that: You can modify any existent rule of an IPv6 ACL.
text: Comment for the ACL rule, a string of 1 to 127 characters. Blank spaces and special characters are acceptable. Description Use the rule comment command to define a comment for the ACL rule. Use the undo rule comment command to remove the comment defined for the ACL rule. You can give rules comments to provide relevant information such as their application purposes and the ports they are applied to, so that you can easily identity and distinguish ACL rules by their comments.
Page 617
Numeral (0 to 6) Mon, Tue, Wed, Thu, Fri, Sat, and Sun Working days (Monday through Friday) Off days (Saturday and Sunday) Daily, namely everyday of the week from start-time start-date: Specifies the start date of an absolute time range, in the form of hh:mm MM/DD/YYYY or hh:mm YYYY/MM/DD.
Page 618
Time-range : tr1 ( Inactive ) 08:00 to 12:00 working-day Time-range : tr2 ( Inactive ) From 12:00 Jan/1/2008 to 12:00 Jun/1/2008 1-26...
QoS Commands QoS Commands burst-mode enable Syntax burst-mode enable undo burst-mode enable View System view Parameter None Description Use the burst-mode enable command to enable the burst function. Use the undo burst-mode enable command to disable the burst function. By default, the burst function is disabled. Example # Enable the burst function.
Use the display qos-global command to display the QoS-related configuration performed for all the packets. Only H3C S3100-EI series switches support this command. Example # Display all the QoS configurations performed for all the packets on an S3100-EI series switch.
Table 1-1 Description on the fields of the display qos-global command Field Description Inbound Packet direction Matches ACL rules for traffic classifying Target rate Traffic policing target rate Conform action Action conducted to packet conforming to the traffic specification Exceed action Action conducted to packets exceeding the traffic specification The function of collecting traffic policing statistics information is meter-statistic running...
weight of queue 3: 1 Table 1-2 Description on the fields of the display qos-interface all command Field Description line-rate Port with rate limiting configured Inbound direction. That is, rate limiting is performed to the Inbound inbound packets 1024 Kbps The target rate Queue scheduling mode Queue scheduling algorithm adopted...
Use the display qos-interface mirrored-to command to display the traffic mirroring configuration of a port or all the ports on the device. Related command: mirrored-to. Only H3C S3100-EI series switches support this command. Example # Display the traffic mirroring configuration of Ethernet 1/0/1 on an S3100-EI series switch.
Unit ID, which is fixed to 1. With this argument specified, the traffic policing configuration of all the ports on the device is displayed. Only H3C S3100-EI series switches support this command. Description Use the display qos-interface traffic-limit command to display the traffic policing configuration of a port or all the ports on the device.
Use the display qos-interface traffic-priority command to display the priority marking configuration of a port or all the ports on the device. Related command: traffic-priority. Only H3C S3100-EI series switches support this command. Example # Display the priority marking configuration of Ethernet 1/0/1 (assuming that the current device is an S3100-EI series switch).
Use the display qos-interface traffic-redirect command to display the traffic redirecting configuration of a port or all the ports on the device. Related command: traffic-redirect. Only H3C S3100-EI series switches support this command. Example # Display the traffic redirecting configuration of Ethernet 1/0/1 (assuming that the current device is an S3100-EI series switch).
Unit ID, which is fixed to 1. With this argument specified, the traffic shaping configuration of all the ports is displayed. Description Use the display qos-interface traffic-shape command to display the traffic shaping configuration of a port or all the ports on the device. Related command: traffic-shape. Only H3C S3100-EI series switches support this command. 1-12...
Example # Display the traffic shaping configuration of Ethernet 1/0/1. <Sysname> display qos-interface Ethernet 1/0/1 traffic-shape Ethernet1/0/1 QID: status max-rate(kbps) burst-size(byte) ---------------------------------------------------- Enable Enable Enable Disable Table 1-7 Description on the fields of the display qos-interface traffic-shape command Field Description Ethernet1/0/1 Port with traffic shaping configured Queue ID...
Only H3C S3100-EI series switches support this command. Example # Display the traffic accounting configuration information and traffic statistics on Ethernet 1/0/1 (assuming that the current device is an S3100-EI series switch). <Sysname> display qos-interface Ethernet 1/0/1 traffic-statistic Ethernet1/0/1: traffic-statistic...
Only H3C S3100-EI series switches support this command. Example # Display all the QoS-related configurations of port group 1 (assuming that the current device is an S3100-EI series switch). <Sysname> display qos-port-group 1 all Port-group 1 traffic-limit Inbound: Matches: Acl 3001 rule 0...
Example # Display all the QoS-related configuration performed for VLAN 1 (assuming that the current device is an S3100-EI series switch). <Sysname> display qos-vlan 1 all Vlan 1 traffic-limit Inbound: Matches: Acl 3001 rule 0 running Target rate: 128 Kbps Exceed action: drop meter-statistic not running Refer to...
Page 637
View Ethernet port view Parameter inbound: Limits the inbound packet rate. outbound: Limits the outbound packet rate. target-rate: Total target rate (in kbps). The range of this argument varies with port type as follows: Fast Ethernet port: 64 to 99,968; GigabitEthernet port: 64 to 1,000,000.
Page 638
View System view, Port group, Ethernet port view Parameter inbound: Duplicates inbound packets. acl-rule: ACL rules to be applied. This argument can be the combination of multiple ACLs. For more information about this argument, refer to Table 1-9 Table 1-10. Note that the ACL rules referenced must be those defined with the permit keyword specified.
Only H3C S3100-EI series switches support this command. Example # Mirror packets that match ACL 2000 on port Ethernet 1/0/1 to Ethernet 1/0/4 through traffic mirroring (assuming that the current device is an S3100-EI series switch). <Sysname> system-view System View: return to User View with Ctrl+Z.
Note that, the same ACL cannot be simultaneously referenced in both traffic mirroring configuration and traffic redirecting configuration for a VLAN. Only H3C S3100-EI series switches support this command. The traffic mirroring function configured on a VLAN is only applicable to packets tagged with 802.1Q header.
Parameter priority-level: Port priority, ranging from 0 to 7. Description Use the priority command to configure the priority of an Ethernet port. Use the undo priority command to restore the default port priority. By default, the priority of an Ethernet port is 0. Example # Set the priority of Ethernet 1/0/1 to 6.
Page 642
By default, a switch trusts the 802.1p priority of the received packets. A port of an S3100 series switch can accommodate four output queues. The output queue to which a received packet is to be added to is determined by its local precedence: DSCP precedence: Ranges from 0 to 63.
Related command: display priority-trust. Example # Configure the switch to trust the DSCP precedence of the received packets. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] priority-trust dscp # Display the configuration result. [Sysname] display priority-trust Priority trust mode: dscp qos cos-local-precedence-map Syntax qos cos-local-precedence-map cos0-map-local-prec cos1-map-local-prec cos2-map-local-prec...
CoS value Local precedence Related command: display qos cos-local-precedence-map. Example # Configure the CoS-precedence-to-local-precedence mapping relationship as follows: 0 to 0, 1 to 0, 2 to 1, 3 to 1, 4 to 2, 5 to 2, 6 to 3, and 7 to 3. <Sysname>...
Page 645
The default DSCP-precedence-to-local-precedence mapping tables as shown in Table 1-12. Table 1-12 The default DSCP-precedence-to-local-precedence mapping table DSCP Local precedence 0 to 15 16 to 31 32 to 47 48 to 63 Related command: display qos dscp-local-precedence-map. Example # Modify the DSCP-precedence-to-local-precedence mapping table according to Table 1-13.
62 : 63 : qos ip-precedence-local-precedence-map Syntax ip-precedence-local-precedence-map ip0-map-local-prec ip1-map-local-prec ip2-map-local-prec ip3-map-local-prec ip4-map-local-prec ip5-map-local-prec ip6-map-local-prec ip7-map-local-prec undo qos cos-local-precedence-map View System view Parameter ip0-map-local-prec: Local precedence to which IP 0 is to be mapped, in the range 0 to 3. ip1-map-local-prec: Local precedence to which IP 1 is to be mapped, in the range 0 to 3.
Related command: display qos ip-precedence-local-precedence-map. Only H3C S3100-SI series switches support this command. Example # Configure the IP-precedence-to-local-precedence mapping relationship as follows: 0 to 1, 1 to 1, 2 to 0, 3 to 0, 4 to 2, 5 to 2, 6 to 3, and 7 to 3 (assuming that the current device is an S3100-SI series switch).
By default, the WRR queue scheduling algorithm is adopted, and the weight assigned to queue 0, queue 1, queue 2, and queue 3 is 1, 2, 3, and 4. The port of an S3100 series switch can accommodate four output queues. You can configure the queue scheduling algorithm as needed:...
ACL rules, or packets that match specific ACL rules and are of a port group or pass a port. Related command: traffic-limit. Only H3C S3100-EI series switches support this command. Example # Clear the traffic policing statistics on packets matching ACL 2000 and passing Ethernet 1/0/1 (assuming that the current device is an S3100-EI series switch).
Only H3C S3100-EI series switches support this command. Example # Clear the statistics on packets that match ACL 2000 and are of VLAN 1 (assuming that the current device is an S3100-EI series switch). <Sysname> system-view System View: return to User View with Ctrl+Z.
Use the reset traffic-statistics vlan command to clear the statistics on packets that are of a VLAN and match specific ACL rules. Related command: traffic-statistic vlan. Only H3C S3100-EI series switches support this command. Example # Clear the statistics on packets that match ACL 2000 and are of VLAN 1 (assuming that the current device is an S3100-EI series switch).
Page 653
acl-rule: ACL rules to be applied. This argument can be the combination of multiple ACLs. For more information about this argument, refer to Table 1-9 Table 1-10. Note that the ACL rules referenced must be those defined with the permit keyword specified. target-rate: Target traffic rate of traffic policing ( in kbps).
Page 654
Use the undo traffic-limit command to cancel the configuration. By default, traffic policing is disabled globally, on all port groups, and all ports. Only H3C S3100-EI series switches support this command. With broadcast suppression, multicast suppression, or line rate for the inbound direction enabled on a device, you cannot configure traffic policing on the device.
Related command: display qos-interface traffic-limit, reset traffic-limit. Example # Perform traffic policing for packets matching ACL 4000 on Ethernet 1/0/1. Limit the rate within 128 kbps and drop the packets exceeding the traffic limit (assuming that the current device is an S3100-EI series switch).
Use the undo traffic-limit vlan command to disable traffic policing on a VLAN. By default, traffic policing is disabled on a VLAN. Only H3C S3100-EI series switches support this command. Traffic policing configured on a VLAN is only applicable to packets tagged with 802.1Q header.
By default, priority marking is disabled globally, on all port groups, and all ports. Related command: display qos-interface traffic-priority. Only H3C S3100-EI series switches support this command. Example # Set the 802.1p precedence to 1 for packets matching ACL 4000 and passing Ethernet 1/0/1 (assuming that the current device is an S3100-EI series switch).
Page 658
VLAN. By default, priority marking is disabled on a VLAN. Related command: display qos-vlan. Only H3C S3100-EI series switches support this command. The priority marking function configured on a VLAN is only applicable to packets tagged with 802.1Q header.
Page 659
By default, traffic redirecting is disabled globally, on all port groups, and all ports. Only H3C S3100-EI series switches support this command. Packets redirected to the CPU are not forwarded.
Note that, the same ACL cannot be simultaneously referenced in both traffic mirroring configuration and traffic redirecting configuration for a VLAN. Only H3C S3100-EI series switches support this command. The traffic redirecting function configured on a VLAN is only applicable to packets tagged with 802.1Q header.
Example # Redirect the packets that match ACL 2000 rules and are of VLAN 1 to Ethernet 1/0/7 (assuming that the current device is an S3100-EI series switch). <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] acl number 2000 [Sysname-acl-basic-2000] rule permit source 1.1.1.0 0.0.0.255 [Sysname-acl-basic-2000] quit [Sysname] traffic-redirect vlan 1 inbound ip-group 2000 interface Ethernet1/0/7...
By default, traffic shaping is disabled. Related command: display qos-interface traffic-shape. Only H3C S3100-EI series switches support this command. Example # Configure traffic shaping on Ethernet 1/0/1, with the maximum rate being 640 kbps and the burst size being 16 KB.
Note that, for the same ACL rule, the traffic accounting function and the meter statistic keyword of the traffic-limit command are mutually exclusive in system view, Ethernet port view, or port group view. Only H3C S3100-EI series switches support this command. Related command: display qos-interface traffic-statistic, reset traffic-statistic.
Page 664
Note that, for the same ACL rule, the traffic accounting function and the meter statistic keyword of the traffic-limit command are mutually exclusive in a VLAN. Only H3C S3100-EI series switches support this command. The traffic accounting function configured on a VLAN is only applicable to packets tagged with 802.1Q header.
QoS Profile Configuration Commands Only H3C S3100-EI series switches support this configuration. QoS Profile Configuration Commands apply qos-profile Syntax In system view apply qos-profile profile-name interface interface-list undo apply qos-profile profile-name interface interface-list In Ethernet port view apply qos-profile profile-name...
System View: return to User View with Ctrl+Z. [Sysname] interface Ethernet1/0/1 [Sysname-Ethernet1/0/1] apply qos-profile a123 # Apply the QoS profile named a123 to Ethernet 1/0/1 through Ethernet 1/0/4. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] apply qos-profile a123 interface Ethernet 1/0/1 to Ethernet 1/0/4 display qos-profile Syntax display qos-profile { all | name profile-name | interface interface-type interface-number | user...
Page 667
# Display the configuration of the QoS profile applied to Ethernet 1/0/1, assuming that the QoS profile has been applied to Ethernet 1/0/1 manually. <Sysname> display qos-profile interface Ethernet 1/0/1 User's qos-profile applied mode: user-based Default applied qos-profile: test, 3 actions packet-filter inbound ip-group 2000 rule 0 traffic-limit inbound ip-group 3000 rule 0 64 traffic-priority inbound ip-group 4000 rule 0 cos controlled-load...
packet-filter Syntax packet-filter inbound acl-rule undo packet-filter inbound acl-rule View QoS profile view Parameter inbound: Filters the inbound packets. acl-rule: ACL rules to be applied. This argument can be the combination of multiple ACLs. For more information about this argument, refer to Table 1-9 Table 1-10.
Description Use the qos-profile command to create a QoS profile and enter QoS profile view. If the QoS profile already exists, this command leads you to the corresponding QoS profile view. Use the undo qos-profile command to remove a QoS profile. A QoS profile currently applied to a port cannot be removed or modified.
Example # Add a traffic policing action to the QoS profile named a123 to limit the rate of the inbound packets matching ACL 2000 to 128 kbps and drop the packets exceeding 128 kbps. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] qos-profile a123 [Sysname-qos-profile-a123] traffic-limit inbound ip-group 2000 128 exceed drop...
Mirroring Commands Mirroring Commands display mirroring-group Syntax display mirroring-group { group-id | all | local | remote-destination | remote-source } View Any view Parameters group-id: Specifies the mirroring group of which the configurations are to be displayed, the value of which can only be 1.
Page 674
Ethernet1/0/1 inbound reflector port: Ethernet1/0/2 remote-probe vlan: 10 # Display the configurations of a remote destination mirroring group on your S3100-EI series Ethernet switch. <Sysname> display mirroring-group 1 mirroring-group 1: type: remote-destination status: active monitor port: Ethernet1/0/3 remote-probe vlan: 20 Table 1-1 Description on the fields of the display mirroring-group command Field Description...
The mirroring group you created can take effect only after you configure other parameters for it. Note that, an S3100 series Ethernet switch supports configuring only one destination port in local port mirroring or one reflector port in remote port mirroring. That is, on an S3100 switch, there can be only one effective local mirroring group or one effective remote source mirroring group.
Description Use the mirroring-group mirroring-port command to configure the source ports for a local mirroring group or a remote source mirroring group. Use the undo mirroring-group mirroring-port command to remove the source ports of a local mirroring group or a remote source mirroring group. Note that: The S3100-SI series do not support the both keyword in the source port configuration for a remote source mirroring group.
You cannot configure a member port of an aggregation group, or a port enabled with LACP or STP as the destination port. Before configuring a destination port for a local mirroring group, make sure that the corresponding mirroring group has already been created. It is recommended that you use a destination port for port mirroring purpose only.
[Sysname] mirroring-group 1 reflector-port Ethernet 1/0/2 mirroring-group remote-probe vlan Syntax mirroring-group group-id remote-probe vlan remote-probe-vlan-id undo mirroring-group group-id remote-probe vlan remote-probe-vlan-id View System view Parameters group-id: Number of a port mirroring group, the value of which can only be 1. remote-probe vlan remote-probe-vlan-id: Specifies the remote-probe VLAN for the mirroring group.
Related commands: display mirroring-group. When you configure mirroring source port on an Ethernet port of an S3100 series Ethernet switch, if mirroring group 1 does not exist, the switch will automatically create local mirroring group 1 and add the source port to the group;...
It is recommended that you use a destination port for port mirroring purpose only. Do not use a destination port to transmit other service packets. Related commands: display mirroring-group. When you configure mirroring destination port on an Ethernet port, if mirroring group 1 does not exist, the switch creates the local mirroring group 1 and adds the port to the group;...
Page 681
<Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] vlan 5 [Sysname-vlan5] remote-probe vlan enable...
Stack Function Configuration Commands Stack Function Configuration Commands display stacking Syntax display stacking [ members ] View Any view Parameter members: Displays the information about the members of a stack. Do not specify this keyword when you execute this command on a slave switch. Description Use the display stacking command to display the information about the main switch or the slave switches of a stack.
Page 685
MAC Address:000f-e20f-3124 Member status:Admin IP: 129.10.1.15 /16 Member number: 1 Name:stack_1.Sysname Device: S3100 MAC Address: 000f-e20f-3130 Member status:Up IP: 129.10.1.16/16 Member number: 2 Name:stack_2.Sysname Device: S3100 MAC Address: 000f-e20f-3135 Member status:Up IP: 129.10.1.17/16 Table 1-1 Description on the fields of the display stacking command Field Description Numbers of the switches in the stack...
By default, the stack-port function on a stack port is enabled, indicating that a switch can send/forward the stack join-in requests through the port. On the S3100 series switches, only GE SFP ports that are installed with stack modules can be used as stack ports.
stacking enable Syntax stacking enable undo stacking enable View System view Parameter None Description Use the stacking enable command to create a stack. Use the undo stacking enable command to remove a stack. The stacking enable command triggers a main switch to add the switches connected to its stack ports to the stack.
Page 688
Parameter from-ip-address: Start address of the stack IP address pool. ip-address-number: Number of the IP addresses in the stack IP address pool, in the range of 1 to 16. ip-mask: Mask of the stack IP address. Description Use the stacking ip-pool command to create a stack IP address pool. Use the undo stacking ip-pool command to restore the default stack IP address pool.
Cluster Configuration Commands NDP Configuration Commands display ndp Syntax display ndp [ interface interface-list ] View Any view Parameters interface interface-list: Specifies a port list. You need to provide the interface-list argument in the form of { interface-type interface-number [ to interface-type interface-number ] } &<1-10>, where to is used to specify a port range, and &<1-10>...
Page 690
MAC Address : 000f-e20f-1234 Host Name : 1234_2.Sysname Port Name : Ethernet1/0/1 Software Ver: V100R002B01D001 Device Name : H3C S3100 Port Duplex : AUTO Product Ver : 3100 BootROM Ver : 506 Table 2-1 Description on the fields of the two commands Field...
ndp enable Syntax ndp enable [ interface interface-list ] undo ndp enable [ interface interface-list ] View System view, Ethernet port view Parameters interface-list: Ethernet port list, in the format of { interface-type interface-number [ to interface-type interface-number ] } &<1-10>, where to is used to specify a port range, and &<1-10> means that you can provide up to ten port indexes/port index ranges for this argument.
Description Use the ndp timer aging command to set the holdtime of the NDP information. This command specifies how long an adjacent device should hold the NDP neighbor information received from the local switch before discarding the information. Use the undo timer aging command to restore the default holdtime of NDP information. By default, the holdtime of NDP information is 180 seconds.
Page 693
Examples # Set the interval between sending NDP packets to 80 seconds. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] ndp timer hello 80 reset ndp statistics Syntax reset ndp statistics [ interface interface-list ] View User view Parameters interface-list: Ethernet port list, in the format of { interface-type interface-number [ to interface-type interface-number ] } &<1-10>, where to is used to specify a port range, and &<1-10>...
NTDP Configuration Commands display ntdp Syntax display ntdp View Any view Parameters None Description Use the display ntdp command to display the global NTDP information. The displayed information includes topology collection range (hop count), topology collection interval (NTDP timer), device/port forwarding delay of topology collection requests, and time used by the last topology collection.
Page 695
: 00e0-fc11-1111 Platform : S3100 : 192.168.0.234/24 Version H3C Comware Platform Software Comware Software, Version 3.10 Copyright(c) 2004-2010 Hangzhou H3C Technologies Co.,Ltd.All rights reserved. S3100 3100-0002 Cluster Administrator switch of cluster 1234 Stack Candidate switch Peer MAC Peer Port ID...
Page 696
: 00e0-fc3d-9da8 Platform : H3C S3026 Version H3C Comware Platform Software Comware Software, Version 3.10 Copyright(c) 2004-2010 Hangzhou H3C Technologies Co.,Ltd.All rights reserved. S3100 3100-0002 Cluster Member switch of cluster 1234 , Administrator MAC: 00e0-fc11-1111 Stack Candidate switch Peer MAC...
Field Description Cluster The role of the collected device for the cluster MAC address of a neighbor device connected to Peer MAC the collected device Index of the port on the neighbor device Peer Port ID connected to the collected device Index of the port on the collected device Native Port ID connected to the neighbor device...
Parameters None Description Use the ntdp explore command to manually start a topology collection process. NTDP is able to periodically collect topology information. In addition, you can use this command to manually start a topology collection process at any moment. If you do this, NTDP collects NDP information from all devices in a specific network range (which can be set through the ntdp hop command) as well as the connection information of all its neighbors.
Examples # Set the topology collection range to 5 hops. <aaa_0.Sysname> system-view System View: return to User View with Ctrl+Z. [aaa_0.Sysname] ntdp hop 5 ntdp timer Syntax ntdp timer interval-in-minutes undo ntdp timer View System view Parameters interval-in-minutes: Interval (in minutes) to collect topology information, ranging from 0 to 65,535. A value of 0 disables topology information collection.
ntdp timer hop-delay Syntax ntdp timer hop-delay time undo ntdp timer hop-delay View System view Parameters time: Device forwarding delay in milliseconds. This argument ranges from 1 to 1,000. Description Use the ntdp timer hop-delay command to set the delay for devices to forward topology collection requests.
Description Use the ntdp timer port-delay command to configure the topology request forwarding delay between two ports, that is, the interval at which the device forwards the topology requests through the NTDP-enabled ports one after another. Use the undo ntdp timer port-delay command to restore the default port forwarding delay. By default, the port forwarding delay is 20 ms.
If you do not specify the member number when adding a new cluster member, the management device assigns the next available member number to the new member. If you want to specify the member manually, you need to specify a number that is never used by a member device of the cluster. After you add a candidate device to the cluster, the super password of the device automatically changes to the super password of the management device.
Examples # Remove the current member device from the cluster. <aaa_1.Sysname> system-view System View: return to User View with Ctrl+Z [aaa_1.Sysname] cluster [aaa_1.Sysname-cluster] undo administrator-address auto-build Syntax auto-build [ recover ] View Cluster view Parameters recover: Recovers all member devices. Description Use the auto-build command to start an automatic cluster building process.
Member 000f-e200-2420 is joined in cluster aaa. %Apr 3 08:12:37:996 2000 aaa_0.Sysname CLST/5/LOG:- 1 - Member 000f-e202-2180 is joined in cluster aaa. %Apr 3 08:12:38:113 2000 aaa_0.Sysname CLST/5/LOG:- 1 - Member 0016-e0c0-c201 is joined in cluster aaa. %Apr 3 08:12:38:139 2000 aaa_0.Sysname CLST/5/LOG:- 1 - Member 000f-e200-5104 is joined in cluster aaa.
Page 706
To reduce the risk of being attacked by malicious users against opened socket and enhance switch security, the S3100 series Ethernet switches provide the following functions, so that a cluster socket is opened only when it is needed: Opening UDP port 40000 (used for cluster) only when the cluster function is implemented, Closing UDP port 40000 at the same time when the cluster function is closed.
cluster Syntax cluster View System view Parameters None Description Use the cluster command to enter cluster view. Examples # Enter cluster view. <Sysname> system-view System View: return to User View with Ctrl+Z [Sysname] cluster [Sysname-cluster] cluster enable Syntax cluster enable undo cluster enable View System view...
Page 708
When you execute undo cluster enable command on a device that does not belong to any cluster, the cluster function is disabled on the device, and thus you cannot create a cluster on the device or add the device to an existing cluster. Examples # Enable the cluster function on the switch.
When you execute this command on the management device with an inexistent member number or a MAC address that is not in the member list, an error will occur. In this case, you can enter quit to end the switching. Examples # Switch from the management device to number-6 member device and then switch back to the management device.
<aaa_0.Sysname> system-view System View: return to User View with Ctrl+Z. [aaa_0.Sysname] cluster [aaa_0.Sysname-cluster] cluster-local-user public password simple 123 cluster-mac Syntax cluster-mac H-H-H undo cluster-mac View Cluster view Parameters H-H-H: Multicast MAC address to be set for the cluster, in hexadecimal format. This argument can be one of the following addresses: 0180-C200-0000, 0180-C200-000A, 0180-C200-0020 to 0180-C200-002F.
cluster-mac syn-interval Syntax cluster-mac syn-interval time-interval View Cluster view Parameters time-interval: Interval to send multicast MAC synchronization packets, ranging from 0 to 30 minutes. Description Use the cluster-mac syn-interval command to set the interval for the management device to send HGMP V2 multicast MAC synchronization packets periodically.
write: Indicates that the community has read-write access right to MIB objects, that is, an SNMP NMS is capable of configuring the devices when it uses this community name to access the agent. community-name: Community name, a string of 1 to 27 characters. view-name: MIB view name, a string of 1 to 32 characters.
group-name: Group name, a string of 1 to 32 characters. authentication: Specifies the security model of the SNMP group as authentication only (without privacy). privacy: Specifies the security model of the SNMP group as authentication and privacy. read-view read-view: Read view, a string of 1 to 32 characters. The default read view is ViewDefault. write-view write-view: Write view, a string of 1 to 32 characters.
View Cluster view Parameters view-name: View name, a string of 1 to 32 characters. The default view is ViewDefault. oid-tree: MIB subtree, identified by the OID of the subtree root node or the name of the subtree root node. The value is a string of 1 to 255 characters. included: Indicates that all nodes of the MIB tree are included in the current view.
Page 715
View Cluster view Parameters v3: SNMPv3. username: User name, a string of 1 to 32 characters. groupname: Group name, a string of 1 to 32 characters. authentication-mode: Specifies the security model as authentication. If you do not provide this keyword, the security model defaults to no authentication no privacy. md5: Specifies the authentication protocol as MD5.
delete-member Syntax delete-member member-id [ to-black-list ] View Cluster view Parameters member-id: Member number of a member device, ranging from 1 to 255. to-black-list: Adds the device removed from a cluster to the blacklist to prevent it from being added to the cluster.
Page 717
View Any view Parameters None Description Use the display cluster command to display the status and statistics information of the cluster to which the current switch belongs. Executing this command on a member device will display the following information: cluster name, member number of the current switch, MAC address and status of the management device, holdtime, and interval to send handshake packets.
You can only use this command on a management device. Note that, after a cluster is set up on an S3100 series switch, the switch will collect the topology information of the network at the topology collection interval you set and automatically add the candidate devices it discovers into the cluster.
Field Description Platform Platform of the candidate device display cluster members Syntax display cluster members [ member-number | verbose ] View Any view Parameters member-number: Member number of a device, ranging from 0 to 255. verbose: Displays detailed information about all the devices in a cluster. Description Use the display cluster members command to display information about one specific or all devices in a cluster.
Page 721
Hops to administrator device:0 IP: 100.100.1.1/24 Version: H3C Comware Platform Software. Comware Software, Version 3.10 Copyright(c) 2004-2010 Hangzhou H3C Tech. Co., Ltd. All rights reserved. S3100 3100-0002 Member number:1 Name:aaa_1.Sysname Device:S3100 MAC Address:3900-0000-3334 Member status:Up Hops to administrator device:2 IP: 16.1.1.11/24 Version: H3C Comware Platform Software.
ftp cluster Syntax ftp cluster View User view Parameters None Description Use the ftp cluster command to connect to the shared FTP server of the cluster and enter FTP Client view through the management device. You can use the ftp-server command on the management device to configure the shared FTP server of the cluster, which is used for software version update and configuration file backup of the cluster members.
View Cluster view Parameters ip-address: IP address of the FTP server to be configured for the cluster. Description Use the ftp-server command to configure a shared FTP server for the cluster on the management device. Use the undo ftp-server command to remove the shared FTP server setting. By default, the management device acts as the shared FTP server of the cluster.
By default, the neighbor information holdtime is 60 seconds. Note that: If the management switch does not receive NDP information from a member device within the holdtime, it sets the state of the member device to “down”. When the management device receives the NDP information from the device again, the device will be re-added to the cluster automatically.
Examples # Configure a private IP address pool for a cluster. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] cluster [Sysname-cluster] ip-pool 10.200.0.1 20 logging-host Syntax logging-host ip-address undo logging-host View Cluster view Parameters ip-address: IP address of the device to be configured as the log host of a cluster. Description Use the logging-host command to configure a shared log host for a cluster on the management device.
management-vlan Syntax management-vlan vlan-id undo management-vlan View System view Parameters vlan-id: ID of the VLAN to be specified as the management VLAN. Description Use the management-vlan command to specify the management VLAN on the switch. Use the undo management-vlan command to restore the default management VLAN. By default, VLAN 1 is used as the management VLAN.
Description Use the reboot member command to reboot a specified member device on the management device. When a member device is in trouble due to some configuration errors, you can use the remote control function on the management device to maintain the member device remotely. For example, from the management device, you can delete the configuration file on a member device and reboot the member device, and recover the device to the normal state with the backup configuration.
[aaa_0.Sysname-cluster] snmp-host 1.0.0.9 tftp get Syntax tftp { cluster | tftp-server } get source-file [ destination-file ] View User view Parameters cluster: Downloads files through the shared TFTP server of the cluster. tftp-server: IP address or host name of the TFTP server. source-file: Name of the file to be downloaded from the shared TFTP server of the cluster.
Parameters cluster: Uploads files through the shared TFTP server of the cluster. tftp-server: IP address or host name of the TFTP server. source-file: File name to be uploaded to the shared TFTP server. destination-file: Name of the file to which the uploaded file will be saved in the storage directory of the TFTP server.
By default, no shared TFTP server is configured. After the IP address of the shared TFTP server is configured, NAT is enabled on the management device immediately. When a member device uses the tftp cluster get or tftp cluster put command to download or upload a file from the shared TFTP server, the management device translates the private IP address of the member device to a public network address, forwards the requests of the member device to the TFTP server, and forwards the responses of TFTP server to the member device according...
tracemac Syntax tracemac { by-mac mac-address vlan vlan-id | by-ip ip-address } [ nondp ] View Any view Parameters by-mac: Specifies to trace a device through the specified destination MAC address. mac-address: MAC address of the device to be traced. vlan vlan-id: Specifies to trace a device in the specified VLAN.
[aaa_0.Sysname-cluster] black-list add-mac 0010-3500-e001 # Delete all addresses in the current cluster blacklist. [aaa_0.Sysname-cluster] black-list delete-mac all display cluster base-members Syntax display cluster base-members View Any view Parameters None Description Use the display cluster base-members command to display the information about all the devices in the base cluster topology, such as member number, name, MAC address, and the current status of each device in a cluster.
Parameters mac-address mac-address: Displays the structure of the standard topology three layers above or below the node specified by the MAC address. member member-id: Displays the structure of the standard topology three layers above or below the node specified by the member ID. Description Use the display cluster base-topology command to display the standard topology of the cluster.
Parameters None Description Use the display cluster black-list command to display the information of devices in the current cluster blacklist. Related commands: black-list. Examples # Display the contents of the current cluster blacklist. <aaa_0.Sysname> display cluster black-list Device ID Access Device ID Access port 000f-e200-5502 000f-e202-2180...
Field Description Cluster Role the device plays in the cluster Peer MAC MAC address of the peer device Peer Port ID Name of the port on the peer device connecting to the local device Native Port ID Name of the port on the local device connecting to the peer device Speed Rate of the local port connecting to the peer device Duplex...
<aaa_0.Sysname> system-view Enter system view, return to user view with Ctrl+Z. [aaa_0.Sysname] cluster [aaa_0.Sysname-cluster] topology accept all save-to local-flash # Accept the device with the MAC address 0010-0f66-3022 as a member of the base cluster topology. <aaa_0.Sysname> system-view Enter system view, return to user view with Ctrl+Z. [aaa_0.Sysname] cluster [aaa_0.Sysname-cluster] topology accept mac-address 0010-0f66-3022 topology restore-from...
Page 740
View Cluster view Parameters None Description Use the topology save-to command to save the standard topology of the cluster to the local Flash memory. The file name used to save the standard topology is topology.top. Do not modify the file name. This command is applicable to only the management device of a cluster.
PoE Configuration Commands PoE Configuration Commands display poe interface Syntax display poe interface [ interface-type interface-number ] View Any view Parameter interface-type interface-number: Port type and port number. Description Use the display poe interface command to view the PoE status of a specific port or all ports of the switch.
Page 743
Table 1-1 Description on the fields of the display poe interface command Field Description Port power enabled PoE is enabled on the port Port power ON/OFF The power on the port is on/off PoE status on the port: user command set port to off: PoE to the port is turned off by the user Port power status Standard PD was detected: A standard PD is detected Legacy PD was detected: A non-standard PD is detected...
Field Description PoE priority of the port: critical: Highest PRIORITY high: High low: Low PoE status on the port: user command set port to off: PoE to the port is turned off by the user Standard PD was detected: A standard PD is detected Legacy PD was detected: A non-standard PD is detected STATUS PD detection is in process: PDs are being detected...
Page 745
View Any view Parameter None Description Use the display poe powersupply command to view the parameters of the power sourcing equipment (PSE). Example # Display the PSE parameters. <Sysname> display poe powersupply Unit 1 PSE ID PSE Legacy Detection :disable PSE Total Power Consumption :0 mW PSE Available Power :128000 mW...
display poe temperature-protection Syntax display poe temperature-protection View Any view Parameter None Description Use the display poe temperature-protection command to display the enable/disable status of the PoE over-temperature protection function on the switch. Related commands: poe temperature-protection enable. Example # Display the enable/disable status of the PoE over-temperature protection function on the switch. <Sysname>...
undo poe legacy enable View System view Parameter None Description Use the poe legacy enable command to enable the PD compatibility detection function. Use the undo poe legacy enable command to disable the PD compatibility detection function. PDs compliant with IEEE 802.3af standards are called standard PDs. By default, the PD compatibility detection function is disabled.
Use the undo poe mode command to restore the PoE mode on the current port to the default mode. By default, signal mode is adopted on a port. Note that the S3100 series switches do not support the spare mode currently. Example # Set the PoE mode on Ethernet 1/0/3 to signal.
Example # Configure the PoE management mode on a port to auto, that is, adopt the PoE management mode based on the PoE priority of the port. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] poe power-management auto Auto Power Management is enabled poe priority Syntax...
poe temperature-protection Syntax poe temperature-protection enable undo poe temperature-protection enable View System view Parameter None Description Use the poe temperature-protection enable command to enable PoE over-temperature protection on the switch. Use the undo poe temperature-protection enable command to disable PoE over-temperature protection on the switch.
Page 751
full: The full update mode is used when the PSE processing software is damaged. The full update mode is to delete the original damaged software in the PSE completely and then reload the PoE processing software. filename: Update file name, with a length of 1 to 64 characters and with the extension .s19. Description Use the poe update command to update the PSE processing software online.
PoE Profile Configuration Commands PoE Profile Configuration Commands apply poe-profile Syntax In system view use the following commands: apply poe-profile profile-name interface interface-type interface-number [ to interface-type interface-number ] undo apply poe-profile profile-name interface interface-type interface-number [ to interface-type interface-number ] In Ethernet port view use the following commands: apply poe-profile profile-name undo apply poe-profile profile-name...
PoE profile is a set of PoE configurations. One PoE profile can contain multiple PoE features. When the apply poe-profile command is used to apply a PoE profile to a port, some PoE features can be applied successfully while some cannot. PoE profiles are applied to S3100 series Ethernet switches according to the following rules: When the apply poe-profile command is used to apply a PoE profile to a port, the PoE profile is applied successfully only if one PoE feature in the PoE profile is applied properly.
[Sysname] display poe-profile name profile-test Poe-profile: profile-test, 3 action poe enable poe max-power 5000 poe priority critical poe-profile Syntax poe-profile profile-name undo poe-profile profile-name View System view Parameter profile-name: Name of PoE profile, a string with 1 to 15 characters. It starts with a letter from a to z or from A to Z, and it cannot be any of reserved keywords like all, interface, user, undo, and mode.
SNMP Configuration Commands SNMP Configuration Commands display snmp-agent Syntax display snmp-agent { local-engineid | remote-engineid } View Any view Parameters local-engineid: Displays the local SNMP entity engine ID. remote-engineid: Displays all the remote SNMP entity engine IDs. At present, the device does not support application of the keyword.
Page 757
Parameters read: Displays the information about the SNMP communities with read-only permission. write: Displays the information about the SNMP communities with read-write permission. Description Use the display snmp-agent community command to display the information about the SNMPv1/SNMPv2c communities with the specific access permission. SNMPv1 and SNMPv2c use community name authentication.
Field Description Storage type, which can be: volatile: Information will be lost if the system is rebooted nonVolatile: Information will not be lost if the system is rebooted Storage-type permanent: Modification is permitted, but deletion is forbidden readOnly: Read only, that is, no modification, no deletion other: Other storage types display snmp-agent group...
Table 1-2 display snmp-agent group command output description Field Description Group name SNMP group name of the user SNMP group security mode, which can be AuthPriv (authentication with privacy), Security model AuthnoPriv (authentication without privacy), and noAuthnoPriv (no authentication no privacy). Read-only MIB view corresponding to the SNMP Readview group...
Page 761
Examples # Display the statistics on SNMP packets. <Sysname> display snmp-agent statistics 1276 Messages delivered to the SNMP entity 0 Messages which were for an unsupported version 0 Messages which used a SNMP community name not known 0 Messages which represented an illegal operation for the community supplied 0 ASN.1 or BER errors in the process of decoding 1291 Messages passed from the SNMP entity 0 SNMP PDUs which had badValue error-status...
Page 762
Field Description The total number of SNMP PDUs which were delivered to the SNMP protocol entity and for SNMP PDUs which had genErr error-status which the value of the error-status field is `genErr'. The total number of SNMP PDUs which were SNMP PDUs which had noSuchName delivered to the SNMP protocol entity and for error-status...
For the detailed configuration, refer to the snmp-agent sys-info command. By default, the contact information of an S3100 Ethernet switch is "Hangzhou H3C Technologies Co., Ltd.", the geographical location is "Hangzhou China", and the SNMP version employed is SNMPv3.
SNMPv3 display snmp-agent trap-list Syntax display snmp-agent trap-list View Any view Parameters None Description Use the display snmp-agent trap-list command to display the modules that can generate traps and whether the sending of traps is enabled on the modules. If a module contains multiple submodules, the trap function of the entire module is displayed as enabled as long as the trap function of any of the submodules is enabled.
group-name: Name of an SNMP group, a string of 1 to 32 characters. Description Use the display snmp-agent usm-user command to display the information about a specific type of SNMPv3 users. If you execute this command with no keyword specified, the information about all the SNMPv3 users is displayed, including username, group name, engine ID, storage type and user status.
View Ethernet port view, interface view Parameters None Description Use the enable snmp trap updown command to enable the sending of port/interface linkUp/linkDown traps. Use the undo enable snmp trap updown command to disable the sending of linkUp/linkDown traps. By default, the sending of port/interface linkUp/linkDown traps is enabled. Note that you need to enable the generation of port/interface linkUp/linkDown traps both on the port/interface and globally if you want a port/interface to generate port/interface linkUp/linkDown traps when the state of the port/interface changes.
By default, the SNMP agent is disabled. Examples # Start the SNMP agent. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] snmp-agent An S3100 Ethernet switch provides the following functions to prevent attacks through unused UDP ports. Starting the SNMP agent opens UDP port used by SNMP agents and the UDP port used by SNMP trap respectively.
The generated password is related to engine ID: password generated under an engine ID can only take effect on this engine ID. Related commands: snmp-agent usm-user v3. SNMP agent must be enabled for you to encrypt a plain-text password. Examples # Use the local engine ID and the md5 algorithm to encrypt plain-text password aaaa.
Typically, “public” is used as a read community name, and “private” is used as a write community name. For the security purposes, you are recommended to configure another community name except these two. Examples # Create an SNMP community named comaccess, which has read-only permission to MIB objects. <Sysname>...
Page 770
acl-number: ID of a basic ACL, in the range 2000 to 2999. Using basic ACL can restrict the source addresses of SNMP messages, namely, permitting or refusing the SNMP messages with specific source addresses, thus restricting access between the NMS and the agent. Description Use the snmp-agent group command to create an SNMP group, and set the security mode and corresponding SNMP view of the group.
Storage-type: nonVolatile Acl:2001 snmp-agent local-engineid Syntax snmp-agent local-engineid engineid undo snmp-agent local-engineid View System view Parameters engineid: Engine ID, an even number of hexadecimal characters, in the range 10 to 64. Description Use the snmp-agent local-engineid command to set an engine ID for the local SNMP entity. Use the undo snmp-agent local-engineid command to restore the default engine ID.
Description Use the snmp-agent log command to enable network management operation logging. Use the undo snmp-agent log command to disable network management operation logging. By default, network management operation logging is disabled. After SNMP logging is enabled, when NMS performs specified operations on the SNMP agent, the SNMP agent records and then saves the information related to the operations into the information center of the device.
Page 773
mask mask-value: Mask of a MIB subtree, an even number of hexadecimal characters, in the range 2 to 32. An odd number of characters are invalid. Description Use snmp-agent mib-view command to create or update the information about a MIB view to limit the MIB objects the NMS can access.
# Create an SNMP MIB view with the name of view-a, MIB subtree of 1.3.6.1.5.4.3.4 and subtree mask of FE. MIB nodes with the OID of 1.3.6.1.5.4.3.x are included in this view, with x indicating any integer number. <Sysname> system-view System View: return to User View with Ctrl+Z.
Multiple SNMP versions can be running the on the device at the same time to allow access of different NMSs. By default, the contact information of an S3100 Ethernet switch is "Hangzhou H3C Technologies Co., Ltd.", the geographical location is "Hangzhou China", and the SNMP version employed is SNMPv3.
Page 776
View System view Parameters trap: Enables the host to receive SNMP traps. address: Specifies the destination for the SNMP traps. udp-domain: Specifies to use UDP to communicate with the target host. ip-address: The IPv4 address of the host that is to receive the traps. ipv6 ipv6-address: Specifies the IPv6 address of the trap target host.
Specifies to send SNMP linkUp traps when a port becomes up. warmstart: Specifies to send SNMP warm start traps when SNMP is newly launched. system: Specifies to send H3C-SYS-MAN-MIB (proprietary MIB) traps. Description Use the snmp-agent trap enable command to enable a device to send SNMP traps that are of specified types.
# Before the configuration of the extended trap function, the trap information is as follows when a link is down: #Apr 2 05:53:15:883 2000 H3C L2INF/2/PORT LINK STATUS CHANGE:- 1 - Trap 1.3.6.1.6.3.1.1.5.3(linkDown): portIndex is 4227634, ifAdminStatus is 2, ifOperStatus is 2 #Apr 2 05:53:16:094 2000 H3C IFNET/5/TRAP:- 1 -1.3.6.1.6.3.1.1.5.3(linkDown) Interface 31...
View System view Parameters seconds: SNMP trap aging time (in seconds) to be set, ranging from 1 to 2,592,000. Description Use the snmp-agent trap life command to set the SNMP trap aging time. SNMP traps exceeding the aging time will be discarded. Use the undo snmp-agent trap life command to restore the default SNMP trap aging time.
<Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] snmp-agent trap queue-size 200 snmp-agent trap source Syntax snmp-agent trap source interface-type interface-number undo snmp-agent trap source View System view Parameters interface-type interface-number: Interface type and interface number. The source IP address of the trap is the IP address of this interface.
<Sysname> system-view [Sysname] acl number 2001 [Sysname-acl-basic-2001] rule permit source 1.1.1.1 0.0.0.0 [Sysname-acl-basic-2001] rule deny source any [Sysname-acl-basic-2001] quit [Sysname] snmp-agent sys-info version v2c [Sysname] snmp-agent group v2c readCom [Sysname] snmp-agent usm-user v2c userv2c readCom acl 2001 Specify the SNMP version of the NMS with an IP address 1.1.1.1 as SNMPv2c, fill the write community name field with userv2c.
Page 783
the SNMP messages with specific source addresses, thus restricting access between the NMS and the agent. local: Specifies a local entity user. engineid-string: Engine ID associated with the user, an even number of hexadecimal characters, in the range 10 to 64. Description Use the snmp-agent usm-user command to add a user to an SNMP group.
Page 784
[Sysname] snmp-agent usm-user v3 testUser testGroup authentication-mode md5 authkey privacy-mode des56 prikey On the NMS, set the version to SNMPv3, the username to testUser, the authentication algorithm to MD5, the authentication password to authkey, the privacy algorithm to DES, and the privacy password to prikey, and establish a connection with the device.
RMON Configuration Commands RMON Configuration Commands display rmon alarm Syntax display rmon alarm [ entry-number ] View Any view Parameters entry-number: Alarm entry index, in the range 1 to 65535. Description Use the display rmon alarm command to display the configuration of a specified alarm entry or all the alarm entries.
Field Description Sampling interval, in seconds. The system Sampling interval performs absolute or delta sampling on the sampled node at this interval. Rising threshold. When the sampled value Rising threshold equals or exceeds the rising threshold, an alarm is triggered. Falling threshold.
Event table 1 owned by user1 is VALID. Description: null. Will cause log-trap when triggered, last triggered at 0days 00h:02m:27s. Table 2-2 display rmon event command output description Field Description Event table Index of an entry in the RMON event table The status of the entry identified by the index is VALID valid.
less than(or =) 100 with alarm value 0. Alarm sample type is absolute. Table 2-3 display rmon eventlog command output description Field Description Event table Index of an entry in the RMON event table The status of the entry identified by the index is VALID valid.
History control entry 1 owned by user1 is VALID Samples interface : Ethernet1/0/1<ifIndex.4227625> Sampling interval : 5(sec) with 10 buckets max Latest sampled values : Dropevents , octets : 10035 packets : 64 , broadcast packets : 35 multicast packets : 8 , CRC alignment errors : 0 undersize packets : 0 , oversize packets...
Page 790
View Any view Parameters prialarm-entry-number: Extended alarm entry Index, in the range 1 to 65,535. Description Use the display rmon prialarm command to display the configuration of an RMON extended alarm entry. If you do not specify the prialarm-entry-number argument, the configuration of all the extended alarm entries is displayed.
Field Description Linked with event Event index corresponding to an alarm The condition under which an alarm is triggered, which can be: risingOrFallingAlarm: An alarm is triggered when the rising or falling threshold is When startup enables: risingOrFallingAlarm reached. risingAlarm: An alarm is triggered when the rising threshold is reached.
Page 793
Parameters entry-number: Index of the alarm entry to be added/removed, in the range 1 to 65535. alarm-variable: Alarm variable, a string comprising 1 to 256 characters in dotted node OID format (such as 1.3.6.1.2.1.2.1.10.1). Only the variables that can be resolved to ASN.1 INTEGER data type (that is, INTEGER, Counter, Gauge, or TimeTicks) can be used as alarm variables.
Comparison Operation The sample value is smaller than the set lower Triggering the event identified by the threshold (threshold-value2) event-entry2 argument Before adding an alarm entry, you need to use the rmon event command to define the events to be referenced by the alarm entry.
Page 795
description string: Specifies the event description, a string of 1 to 127 characters. log: Logs events. trap: Sends traps to the NMS. trap-community: Community name of the NMS that receives the traps, a string of 1 to 127 characters. log-trap: Logs the event and sends traps to the NMS. log-trapcommunity: Community name of the NMS that receives the traps, a character string of 1 to 127 characters.
Description Use the rmon history command to add an entry to the history control table. If you do not specify the owner text keyword/argument combination, the owner of the entry is displayed as “null”. Use the undo rmon history command to remove an entry from the history control table. You can use the rmon history command to sample a specific port.
Page 797
threshold-value2: Lower threshold, in the range 0 to 2147483647. event-entry2: Index of the event entry that corresponds to the falling threshold, in the range 0 to 65535. forever: Specifies the corresponding RMON alarm instance is valid permanently. cycle: Specifies the corresponding RMON alarm instance is valid periodically. cycle-period: Life time (in seconds) of the RMON alarm instance, in the range 0 to 2147483647.
Falling threshold: 5 Event 1 is triggered when the change ratio is larger than the rising threshold. Event 2 is triggered when the change ratio is less than the falling threshold. The alarm entry is valid forever. Entry owner: user1 <Sysname>...
Page 799
For each port, only one RMON statistics entry can be created. That is, if an RMON statistics entry was already created for a given port, you will fail to create a statistics entry with a different index for the port. You can use the display rmon statistics command to display the information about the statistics entry.
NTP Configuration Commands To protect unused sockets against attacks by malicious users and improve security, H3C S3100 series Ethernet switches provide the following functions: UDP port 123 is opened only when the NTP feature is enabled. UDP port 123 is closed as the NTP feature is disabled.
Total associations Total number of associations An S3100 series switch does not establish a session with its client when it works in the NTP server mode, but does so when it works in other NTP implementation modes. display ntp-service status...
Page 803
Parameter None Description Use the display ntp-service status command to display the status of NTP services. Example # View the status of the NTP service of the local switch. <Sysname> display ntp-service status Clock status: synchronized Clock stratum: 4 Reference clock ID: 1.1.1.11 Nominal frequency: 100.0000 Hz Actual frequency: 100.0000 Hz Clock precision: 2^18...
View Any view Parameter None Description Use the display ntp-service trace command to display the brief information of each NTP time server along the time synchronization chain from the local switch to the reference clock source. Example # View the brief information of each NTP time server along the time synchronization chain from the local switch to the reference clock source.
Page 805
synchronization: Synchronization right. This level of right permits the peer device to synchronize its clock to the local switch but does not permit the peer device to perform control query. server: Server right. This level of right permits the peer device to perform synchronization and control query to the local switch but does not permit the local switch to synchronize its clock to the peer device.
Refer to the ntp-service reliable authentication-keyid and ntp-service authentication-keyid commands for related configuration. Example # Enable the NTP authentication. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] ntp-service authentication enable ntp-service authentication-keyid Syntax ntp-service authentication-keyid key-id authentication-mode md5 value undo ntp-service authentication-keyid key-id View System view...
Parameter None Description Use the ntp-service broadcast-client command to configure an Ethernet switch to operate in the NTP broadcast client mode and receive NTP broadcast messages through the current interface. Use the undo ntp-service broadcast-client command to remove the configuration. By default, no NTP operate mode is configured.
ntp-service in-interface disable Syntax ntp-service in-interface disable undo ntp-service in-interface disable View VLAN interface view Parameter None Description Use the ntp-service in-interface disable command to disable the interface from receiving NTP messages. Use the undo ntp-service in-interface disable command to restore the default. By default, the interface can receive NTP messages.
ntp-service multicast-client Syntax ntp-service multicast-client [ ip-address ] undo ntp-service multicast-client [ ip-address ] View VLAN interface view Parameter ip-address: Multicast IP address, in the range of 224.0.1.0 to 239.255.255.255. The default IP address is 224.0.1.1. Description Use the ntp-service multicast-client command to configure an Ethernet switch to operate in the NTP multicast client mode and receive NTP multicast messages through the current interface.
Description Use the ntp-service multicast-server command to configure an Ethernet switch to operate in the NTP multicast server mode and send NTP multicast messages through the current interface. Use the undo ntp-service multicast-server command to remove the configuration. By default, no NTP operate mode is configured. Example # Configure the switch to send NTP multicast messages through Vlan-interface1, and set the multicast group address to 224.0.1.2, keyid to 4, and the NTP version number to 2.
ntp-service source-interface Syntax ntp-service source-interface Vlan-interface vlan-id undo ntp-service source-interface View System view Parameter vlan-interface vlan-id: Specifies an interface. The IP address of the interface serves as the source IP address of sent NTP messages. The vlan-id argument indicates the ID of the specified VLAN interface, ranging from 1 to 4094.
source-interface Vlan-interface vlan-id: Specifies an interface whose IP address serves as the source IP address of NTP message sent to the peer. vlan-id is the VLAN interface number. version number: Specifies the NTP version number. The version number ranges from 1 to 3 and defaults to 3.
Page 813
priority: Specifies the server identified by the remote-ip or the server-name argument as the preferred server. source-interface Vlan-interface vlan-id: Specifies an interface whose IP address serves as the source IP address of NTP packets sent by the local switch to the server. version number: Specifies the NTP version number.
Page 814
Table of Contents 1 SSH Commands·········································································································································1-1 SSH Commands ·····································································································································1-1 display public-key local····················································································································1-1 display public-key peer ····················································································································1-2 display rsa local-key-pair public ······································································································1-4 display rsa peer-public-key··············································································································1-5 display ssh server····························································································································1-6 display ssh server-info·····················································································································1-7 display ssh user-information············································································································1-8 peer-public-key end ·························································································································1-9 protocol inbound ······························································································································1-9 public-key local create ···················································································································1-10 public-key local destroy ·················································································································1-12 public-key local export rsa ·············································································································1-13 public-key local export dsa ············································································································1-14...
SSH Commands SSH Commands display public-key local Syntax display public-key local { dsa | rsa } public View Any view Parameters dsa: Displays the public key of the current switch’s DSA key pair. rsa: Displays the public key part of the current switch’s RSA key pair(s). Description Use the display public-key local command to display the public key part of the current switch’s key pairs.
75FD6A430575D97350E300A20FEB773D93D7C3565467B0CA6B95C07D3338C523743B49D82C 5EC2C9458D248955846F9C32F4D25CC92D0E831E564BBA6FAE794EEC6FCDEDB822909CC687 BEBF51F3DFC5C30D590203010001 ===================================================== Time of Key pair created: 23:48:36 2000/04/03 Key name: Sysname_Server Key type: RSA encryption Key ===================================================== Key code: 307C300D06092A864886F70D0101010500036B003068026100BC86D8F08E101461C1231B12 2777DBE777645C81C569C004EC2FEC03C205CC7E3B5DAA38DD865C6D1FB61C91B85ED63C6F 35BAFBF9A6D2D2989C20051FF8FA31A14FCF73EC1485422E5B800B55920FC121329020E82F 2945FFAD81BE72663BF70203010001 # Display the public key of the current switch’s DSA key pair. <Sysname> display public-key local dsa public ===================================================== Time of Key pair created: 08:01:23 2000/04/02...
Page 817
Description Use the display public-key peer command to display information about locally saved public keys of SSH peers. If no key name is specified, the command displays detailed information about the locally saved public keys of all SSH peers. Sometimes the public key modulo displayed with the display public-key peer command is one bit smaller than the actual modulo.
display rsa local-key-pair public Syntax display rsa local-key-pair public View Any view Parameters None Description Use the display rsa local-key-pair public command to display the public key part of the current switch’s RSA key pair(s). If no key pair has been generated, the system prompts “% RSA keys not found”.
D0FC303F 51072D6C B5D0054D 3673EBA0 A4748984 5EBF6EBE CF6A13B1 C7858241 A2A9AA79 0203 010001 After the RSA key pair is generated, the display rsa local-key-pair public command displays two public keys (the host public key and server public key) when the S3100-EI switch is working in SSH1-compatible, but only one public key (the host public key) when the switch is working in SSH2 mode.
1023 1024 # Display the information about public key “abcd”. <Sysname> display rsa peer-public-key name abcd ===================================== Key name : abcd Key type : RSA Key module: 1024 ===================================== Key Code: 30819F300D06092A864886F70D010101050003818D0030818902818100B0EEC8768E310AE2 EE44D65A2F944E2E6F32290D1ECBBFFF22AA11712151FC29F1C1CD6D7937723F77103576C4 1A03DB32F32C46DEDA68566E89B53CD4DF8F9899B138C578F7666BFB5E6FE1278A84EC8562 A12ACBE2A43AF61394276CE5AAF5AF01DA8B0F33E08335E0C3820911B90BF4D19085CADCE0 B50611B9F6696D31930203010001 display ssh server Syntax display ssh server { session | status } View Any view...
SSH connection timeout : 60 seconds SSH Authentication retries : 3 times SFTP Server: Disable SFTP idle timeout : 10 minutes If you use the ssh server compatible-ssh1x enable command to configure the server to be compatible with SSH1.x clients, the SSH version will be displayed as 1.99. If you use the undo ssh server compatible-ssh1x command to configure the server to be not compatible with SSH1.x clients, the SSH version will be displayed as 2.0.
If an SSH client needs to authenticate the SSH server, it uses the locally saved public key of the server for authentication. In case the authentication fails, you can use the display ssh server-info command to view whether the locally saved public key of the server is correct. Related commands: ssh client assign, ssh client first-time enable.
peer-public-key end Syntax peer-public-key end View Public key view Parameters None Description Use the peer-public-key end command to return from public key view to system view. Related commands: rsa peer-public-key, public-key-code begin, public-key peer. Examples # Exit public key view. <Sysname>...
As SSH clients access the SSH server through VTY user interfaces, you need configure the VTY user interfaces of the SSH server to support remote SSH login. If you have configured a user interface to support SSH protocol, to ensure a successful login to the user interface, you must configure AAA authentication for the user interface by using the authentication-mode scheme command.
Page 825
The configuration of this command can survive a reboot. You only need to configure it once. Related commands: public-key local destroy, display public-key local. Examples # Create an RSA key pair of 512 bits. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] public-key local create rsa The range of public key size is (512 ~ 2048).
NOTES: If the key modulus is greater than 512, It will take a few minutes. Input the bits in the modulus[default = 1024]:512 Generating keys..++++++++++++++++++++++++++++++++++++++++++++++++++* ..+..+..+........+..+.......+..+....+.....+...+..+....+..+..+....+..+...+..+..+..+....+..+......+..+..+....+..+...+......+..+..+...+..+..+.......+++++++++++++++++++++++++++++++++++++++++++++++++++* ..# Display the public key of the DSA key pair. [Sysname]display public-key local dsa public ===================================================== Time of Key pair created: 03:17:33...
Examples # Destroy the RSA key pair of the current switch. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname]public-key local destroy dsa % Confirm to destroy these keys? [Y/N]:y ..# Destroy the DSA key pair of the current switch. <Sysname>system-view System View: return to User View with Ctrl+Z.
Related commands: public-key local create, rsa local-key-pair create. Examples # Generate an RSA key pair. <Sysname> system-view [Sysname] public-key local create rsa The range of public key size is (512 ~ 2048). NOTES: If the key modulus is greater than 512, It will take a few minutes.
Page 829
Description Use the public-key local export dsa command to display the public key of the current switch’s DSA key pair on the screen or export it to a specified file. If you specify a filename, the public key will be exported to the file and the file will be saved. If you do not specify any filename, the public key will be displayed on the screen.
---- END SSH2 PUBLIC KEY ---- # Export the public key in OpenSSH format. <Sysname> system-view [Sysname] public-key local export dsa openssh key.pub public-key peer Syntax public-key peer keyname undo public-key peer keyname View System view Parameters keyname: Name of the public key, a string of 1 to 64 characters. Description Use the public-key peer command to enter public key view.
View System view Parameters keyname: Name of the public key , a string of 1 to 64 characters. filename: Name of a public key file, a string of 1 to 142 characters. For file naming rules, refer to File System Management Command. Description Use the public-key peer import sshkey command to import a peer public key from the public key file.
Related commands: rsa peer-public-key, public-key peer, public-key-code end. Examples # Enter public key edit view and input a public key. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] rsa peer-public-key Switch003 RSA public key view: return to System View with "peer-public-key end". [Sysname-rsa-public-key] public-key-code begin RSA key code view: return to last view with "public-key-code end".
......++++++ ..++++++ .........++++++++ ...++++++++ ..Done! # Display the public key part of the current switch’s RSA key pair(s). [Sysname] display rsa local-key-pair public ===================================================== Time of Key pair created: 02:31:51 2000/04/09 Key name: Sysname_Host Key type: RSA encryption Key ===================================================== Key code: 308188 028180...
View System view Parameters None Description Use the rsa local-key-pair destroy command to destroy the current switch’s RSA key pair. Related commands: rsa local-key-pair create. Examples # Destroy the current switch’s RSA key pair. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] rsa local-key-pair destroy % The local-key-pair will be destroyed.
Examples # Enter Switch002 public key view. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] rsa peer-public-key Switch002 RSA public key view: return to System View with "peer-public-key end". [Sysname-rsa-public-key] rsa peer-public-key import sshkey Syntax rsa peer-public-key keyname import sshkey filename undo rsa peer-public-key keyname View System view...
Examples # Transform the format of client public key file abc and configure a public key named 123. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] rsa peer-public-key 123 import sshkey abc ssh authentication-type default Syntax ssh authentication-type default { all | password | password-publickey | publickey | rsa } undo ssh authentication-type default View System view...
If a pair of SSH peers are both switches that support both DSA and RSA, you must configure the DSA public key of the server on the client. Related command: ssh client first-time enable. Examples # Specify the name of the DSA public key of the server (whose IP address is 192.168.0.1) as pub.ppk on the client.
By default, the client is enabled to run first-time authentication. Examples # Disable the client to run first-time authentication. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] undo ssh client first-time ssh server authentication-retries Syntax ssh server authentication-retries times undo ssh server authentication-retries View System view...
ssh server compatible-ssh1x enable Syntax ssh server compatible-ssh1x enable undo ssh server compatible-ssh1x View System view Parameters None Description Use the ssh server compatible-ssh1x enable command to make the server compatible with SSH1.x clients. Use the undo ssh server compatible-ssh1x command to make the server incompatible with SSH1.x clients.
Description Use the ssh server rekey-interval command to set the interval to update the RSA server keys regularly. Use the undo ssh server rekey-interval command to cancel the current configuration. By default, the update interval is zero, which indicates the system does not update the server keys. This command only takes effect on users whose client version is SSH1.
ssh user Syntax ssh user username undo ssh user username View System view Parameters username: SSH user name, a string of 1 to 184 characters. It cannot contain any of these characters: slash (/), backslash (\), colon (:), asterisk (*), question mark (?), less than sign (<), greater than sign (>), and the vertical bar sign (|).
[Sysname] display ssh user-information Username Authentication-type User-public-key-name Service-type publickey 127.0.0.1 stelnet ssh user authentication-type Syntax ssh user username authentication-type { all | password | password-publickey | publickey | rsa } undo ssh user username authentication-type View System view Parameters username: SSH user name, a string of 1 to 184 characters. It cannot contain any of these characters: slash (/), backslash (\), colon (:), asterisk (*), question mark (?), less than sign (<), greater than sign (>), and the vertical bar sign (|).
You need to specify the authentication mode for an SSH user. Otherwise, the user will not be able to log in to the SSH server. Related commands: display ssh user-information. Examples # Specify the publickey authentication for SSH users. <Sysname>system-view System View: return to User View with Ctrl+Z.
Examples # Specify that user kk can access SFTP service. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] ssh user kk service-type sftp # Display SSH user information. [Sysname] display ssh user-information Username Authentication-type User-public-key-name Service-type publickey null sftp ssh2...
Page 848
md5_96: HMAC-MD5-96 algorithm. DES (data encryption standard) is a standard data encryption algorithm. AES (advanced encryption standard) is an advanced encryption standard algorithm. Description Use the ssh2 command to start the SSH client to establish a connection with an SSH server, and at the same time specify the preferred key exchange algorithm, encryption algorithms and HMAC algorithms between the server and client.
File System Management Configuration Commands S3100 series Ethernet switches allow you to input a file path and file name in one of the following ways: In universal resource locator (URL) format and starting with “unit1>flash:/”. or “flash:/” This method is used to specify a file in the current Flash memory. For example, the URL of a file named text.txt in the root directory of the switch is unit1>flash:/text.txt or flash:/text.txt.
Description Use the cd command to enter a specified directory on the Ethernet switch. The default directory when a user logs onto the switch is the root directory of Flash memory. Example # Enter the directory named test from the root directory. <Sysname>...
delete Syntax delete [ /unreserved ] file-url delete { running-files | standby-files } [ /unreserved ] View User view Parameter /unreserved: Specifies to delete a file completely. file-url: Path name or file name of a file in the Flash memory. You can use the * character in this argument as a wildcard.
Delete the backup web file? [Y/N]: The corresponding files will be deleted after you choose yes. For deleted files whose names are the same, only the latest deleted file is stored in the recycle bin and can be restored. Example # Delete the file test/test.txt.
Page 854
If executed with the file-url argument, the command will display information about files and folders in the specified directory. If executed without the file-url argument, the command will display information about files and folders in the current working directory. In the output information, files with the main, backup or main/backup attribute are tagged with special characters: main: (*) backup: (b)
execute Syntax execute filename View System view Parameter filename: Batch file, with the extension .bat. Description Use the execute command to execute the specified batch file. Executing a batch file is to execute a set of commands in the batch file one by one. Note that: A batch file cannot contain any invisible character.
View User view Parameter device: Name of a device which must be “unit1>flash:” or “flash:” for S3100 series Ethernet switches. Description Use the fixdisk command to restore space on the Flash memory. In case that space on the Flash memory may become unavailable for reasons such as abnormal operations, you can run this command to restore the space.
View User view Parameter device: Name of a device which must be “unit1>flash:” or “flash:” for S3100 series Ethernet switches. Description Use the format command to format the Flash memory. The format operation clears all the files on the Flash memory, and the operation is irretrievable.
<Sysname> mkdir test ..%Created dir unit1>flash:/test. # Create subdirectory mytest in the directory test. <Sysname> mkdir test/mytest %Created dir unit1>flash:/test/mytest. more Syntax more file-url View User view Parameter file-url: Path name or file name of a file in the Flash memory. Description Use the more command to display the contents of a specified file.
move Syntax move fileurl-source fileurl-dest View User view Parameter fileurl-source: Name of the source file. fileurl-dest: Name of the target file. Description Use the move command to move a file to a specified directory. If the target file name is the same as an existing file, the existing file will be overwritten after the command is executed successfully.
<Sysname> pwd unit1>flash: rename Syntax rename fileurl-source fileurl-dest View User view Parameter fileurl-source: Original path name or file name of a file in the Flash memory. fileurl-dest: Target path name or file name. Description Use the rename command to rename a file or a directory. If the target file name or directory name is the same with any existing file name or directory name, you will fail to perform the rename operation.
Page 861
The files deleted by the delete command without the /unreserved keyword are moved to the recycle bin. To delete them permanently, you can use the reset recycle-bin command. Example # There are three files flash:/a.cfg, flash:/b.cfg, and flash:/test/c.cfg in the recycle bin. Permanently delete file flash:/a.cfg and flash:/b.cfg.
<Sysname> dir /all Directory of flash:/test/ drw- Dec 03 2007 18:19:09 subtest -rw- 2386 Dec 03 2007 18:43:41 [c.cfg] 7239 KB total (1934 KB free) // The above information indicates that file flash:/test/c.cfg in directory flash:/test is not deleted and is still in the recycle bin.
<Sysname> boot boot-loader boot.bin The specified file will be booted next time on unit 1! boot boot-loader backup-attribute Syntax boot boot-loader backup-attribute file-url View User view Parameter file-url: Path or the name of the app file in the Flash memory, a string comprising 1 to 64 characters. Description Use the boot boot-loader backup-attribute command to configure an app file of the device to be with the backup attribute.
The configuration of the main or backup attribute for a Web file takes effect immediately without restarting the device. After you upgrade a Web file, you need to specify the new Web file in the Boot menu after restarting the switch or specify a new Web file by using the boot web-package command. Otherwise, the Web server cannot function normally.
Example # Display information about the Web file used by the device. <Sysname>display web package The current using web package is: flash:/h3c-http3.1.5-0040.web The main web package is: unit1>flash:/h3c-http3.1.5-0040.web The backup web package is: unit1>flash:/ startup bootrom-access enable...
Page 870
FTP and SFTP Configuration Commands FTP Server Configuration Commands display ftp-server Syntax display ftp-server View Any view Parameters None Description Use the display ftp-server command to display the FTP server-related settings of a switch when it operates as an FTP server, including startup status, number of users, and so on. You can use this command to verify FTP server-related configurations.
The H3C S3100 series Ethernet switch supports one user access at one time when it serves as the FTP server. display ftp-user Syntax display ftp-user View Any view Parameters None Description Use the display ftp-user command to display the information of the FTP users that have logged in to the switch, including the user name, host IP address, port number, idle timeout time, and authorized directory.
Use the ftp disconnect command to terminate the connection between a specified user and the FTP server. With an H3C S3100 series Ethernet switch acting as the FTP server, if you attempt to disconnect a user that is uploading/downloading data to/from the FTP server, the S3100 Ethernet switch will disconnect the user after the data transmission is completed.
Use the ftp server enable command to enable the FTP server function of the switch. Use the undo ftp server command to disable the FTP server function of the switch. By default, the FTP server function is disabled on the H3C S3100 series switch to avoid potential security risks.
If an FTP connection between an FTP server and an FTP client breaks down abnormally, but the FTP server cannot be aware of this, the FTP server will keep this connection. This will occupy system resources and affect other FTP users’ log in. You can set an idle timeout time so that the FTP server considers an FTP connection invalid and terminates it if no data exchange occurs on it in idle timeout time.
Examples # Specify to transfer text files in ASCII mode. [ftp] ascii 200 Type set to A. binary Syntax binary View FTP client view Parameters None Description Use the binary command to specify that program files be transferred in binary mode, which is used for transferring program files.
Syntax cd path View FTP client view Parameters path: Path of the target directory. Description Use the cd command to change the working directory on the remote FTP server. Note that you can use this command to enter only authorized directories. Related commands: pwd.
close Syntax close View FTP client view Parameters None Description Use the close command to terminate an FTP connection without quitting FTP client view. This command has the same effect as that of the disconnect command. Examples # Terminate the FTP connection without quitting FTP client view. [ftp] close 221 Server closing.
Page 878
Description Use the dir command to query specified files on a remote FTP server, or to display file information in the current directory. The output information, which includes the name, size and creation time of files, will be saved in a local file. If you do not specify the filename argument, the information about all the files in the current directory is displayed.
disconnect Syntax disconnect View FTP client view Parameters None Description Use the disconnect command to terminate an FTP connection without quitting FTP client view. This command has the same effect as that of the close command. Examples # Terminate the FTP connection without quitting FTP client view. [ftp] disconnect 221 Server closing.
[ftp] Syntax get remotefile [ localfile ] View FTP client view Parameters remotefile: Name of a file to be downloaded. localfile: File name used when a file is downloaded and saved to the local device. If this argument is not specified, the source file name is used when a file is saved and downloaded to the local device.
Page 881
Description Use the lcd command to display the local working directory on the FTP client. If you have logged in to the FTP server, you cannot modify the local working directory of the FTP client; to modify the local working directory, you need to terminate the connection with the FTP server, quit FTP client view, execute the cd command in user view, and reconnect to the FTP server.
a.txt myopenssh public temp.c swithc001 226 Transfer complete. FTP: 200 byte(s) received in 0.145 second(s) 1.00Kbyte(s)/sec. mkdir Syntax mkdir pathname View FTP client view Parameters pathname: Name of the directory to be created. Description Use the mkdir command to create a directory on an FTP server. This command is available only to the FTP clients that are assigned the permission to create directories on FTP servers.
Examples # Establish a control connection with the FTP server whose IP address is 1.1.1.1 in FTP client view. [ftp]open 1.1.1.1 Trying ... Press CTRL+K to abort Connected. 220 FTP service ready. User(none):abc 331 Password required for abc Password: 230 User logged in. passive Syntax passive...
Syntax put localfile [ remotefile ] View FTP client view Parameters localfile: Name of a local file to be uploaded. remotefile: File name used after a file is uploaded and saved on an FTP server. Description Use the put command to upload a local file on an FTP client to an FTP server. If you do not specify the remotefile argument, the local file is saved on the FTP server with its original name.
This command works only when the FTP server provides the help information about FTP protocol commands. This command is always valid when an H3C series Ethernet switch operates as the FTP server. If you use other FTP server software, refer to related instructions to know whether the FTP server provides help information about FTP protocol commands.
rename Syntax rename remote-source remote-dest View FTP client view Parameters remote-source: Name of a file on a remote host. remote-dest: Destination file name. Description Use the rename command to rename a file on a remote FTP server. If the destination file name conflicts with the name of an existing file or directory, you will fail to rename the file.
Parameters username: Username used to log in to an FTP server. password: Password used to log in to an FTP server. Description Use the user command to log in to an FTP server with the specified username and password. Examples # Log in to the FTP server using the user account with the username tom and the password 111.
For the description of the numbers at the beginning of FTP output information, refer to the corresponding section in RFC 959. SFTP Server Configuration Commands sftp server enable Syntax sftp server enable undo sftp server View System view Parameters None Description Use the sftp server enable command to enable the SFTP server.
<Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] sftp timeout 500 SFTP Client Configuration Commands Syntax View SFTP client view Parameters None Description Use the bye command to terminate a connection with the remote SFTP server and return to system view.
Examples # Change the working path to new1. sftp-client>cd new1 Received status: Success Current Directory is: /new1 sftp-client> cdup Syntax cdup View SFTP client view Parameters None Description Use the cdup command to change the working path on the remote SFTP server and return to the parent directory.
/test.txt Are you sure to delete it?(Y/N):y This operation may take a long time.Please wait... Received status: Success File successfully Removed Syntax dir [ -a | -l ] [ remote-path ] View SFTP client view Parameters -a: Displays the file and folder names in a specified directory. -l: Displays the details about files and folders in a specified directory in a list.
Description Use the exit command to terminate a connection with the remote SFTP server and return to system view. This command has the same effect as that of the commands bye and quit. Examples # Terminate a connection with the remote SFTP server. sftp-client>...
If no command is specified, this command displays all the command names. Examples # View the help information about the get command. sftp-client> help get get remote-path [local-path] Download file.Default local-path is the same with remote-path Syntax ls [ -a | -l ] [ remote-path ] View SFTP client view Parameters...
Parameters remote-path: Name of a directory on the remote SFTP server. Description Use the mkdir command to create a directory on the remote SFTP server. Examples # Create a directory named hj on the remote SFTP server. sftp-client>mkdir hj Received status: Success New directory created Syntax put local-file [ remote-file ]...
Examples # Display the working directory on the remote SFTP server. sftp-client> pwd quit Syntax quit View SFTP client view Parameters None Description Use the quit command to terminate a connection with the remote SFTP server and return to system view.
Received status: Success File successfully Removed rename Syntax rename oldname newname View SFTP client view Parameters oldname: Old file name. newname: New file name. Description Use the rename command to rename a specified file on the remote SFTP server. Examples # Change the file name temp.bat to temp.txt.
Page 898
[Sysname]sftp 10.1.1.2 Input Username: kk Trying 10.1.1.2... Press CTRL+K to abort Connected to 10.1.1.2 ... The Server is not authenticated. Do you continue access it?(Y/N):y Do you want to save the server's public key?(Y/N):y Enter password: sftp-client> 1-29...
TFTP Configuration Commands TFTP Configuration Commands When accessing a TFTP server configured with an IPv6 address, use the tftp ipv6 command. For details, refer to the IPv6 Management part in this manual. tftp { ascii | binary } Syntax tftp { ascii | binary } View System view Parameters...
Page 900
TFTP client. To enter another working directory, you need to modify the working directory on the TFTP server and relog in. The H3C S3100 series switch supports the TFTP file size negotiation function, namely, before downloading a file, the switch requests the size of the file to be downloaded to the TFTP server, thus to ensure whether there is enough space on the Flash for file downloading.
tftp put Syntax tftp tftp-server put source-file [ dest-file ] View User view Parameters tftp-server: IP address or the host name of a TFTP server, a string of 1 to 20 characters. If the switch belongs to a cluster, the value cluster means to connect to the TFTP server of the cluster. For the configuration of the TFTP server of a cluster, refer to the Cluster part in this manual.
Page 902
Examples # Specify to adopt ACL 2000 on the TFTP client. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] tftp-server acl 2000...
Information Center Configuration Commands Information Center Configuration Commands display channel Syntax display channel [ channel-number | channel-name ] View Any view Parameter channel-number: Channel number, ranging from 0 to 9, corresponding to the 10 channels of the system. channel-name: Channel name, by default, the name of channel 0 to channel 9 is (in turn) console, monitor, loghost, trapbuffer, logbuffer, snmpagent, channel6, channel7, channel8, channel9.
Page 905
Example # Display the operation status of information center, the configuration of information channels, the format of time stamp of the current system. <Sysname> display info-center Information Center: enabled Log host: the interface name of the source address : Vlan-interface1 192.168.0.2, channel number : 2, channel name : loghost language : english, host facility local : 7 Console:...
display logbuffer Syntax display logbuffer [ unit unit-id ] [ level severity | size buffersize ]* [ | { begin | exclude | include } regular-expression ] View Any view Parameter unit-id: Unit ID of the device, the value can only be 1. level severity: Specifies an information severity level.
Dropped messages : 0 Overwritten messages : 0 Current messages : 91 %Jun 19 18:03:24:55 2006 Sysname IC/7/SYS_RESTART: System restarted -- The rest is omitted here. Table 1-3 display logbuffer command output description Field Description Indicates the current state of the log buffer and its Logging buffer configuration and contents contents, which could be enabled or disabled.
display trapbuffer Syntax display trapbuffer [ unit unit-id ] [ size buffersize ] View Any view Parameter unit-id: Unit ID of the device, the value can only be 1. size buffersize: Specifies the size of the trap buffer (number of messages the buffer holds) you want to display.
channel-name: Channel name, up to 30 characters in length. The name must start with an English letter, containing no special character but numbers and English letters only. Description Use the info-center channel name command to name the channel whose number is channel-number as channel-name.
[Sysname] info-center console channel 0 info-center enable Syntax info-center enable undo info-center enable View System view Parameter None Description Use the info-center enable command to enable the information center. Use the undo info-center enable command to disable the information center. The switch can output system information to the log host, the console, and other destinations only when the information center is enabled.
Use the undo info-center logbuffer command to disable information output to the log buffer. By default, information output to the log buffer is enabled with channel 4 (logbuffer) as the default channel and a maximum buffer size of 512. This command works only when the information center is enabled. Related command: info-center enable, display info-center.
Related command: info-center enable, display info-center. Example # Configure the system to output system information to the Unix log host whose IP address is 202.38.160.1. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] info-center loghost 202.38.160.1 info-center loghost source Syntax info-center loghost source interface-type interface-number undo info-center loghost source...
Description Use the info-center monitor channel command to set the channel through which information is output to user terminals. Use the undo info-center monitor channel command to restore the default channel through which information is output to user terminals. By default, output of system information to the monitor is enabled with a default channel name of monitor and a default channel number of 1.
Page 915
After you separately set the output rules for a module, you must use the module-name argument to modify or remove the rules. The new configuration by using the default keyword is invalid on the module. You can configure to output the log, trap and debugging information to the trap buffer, but the trap buffer only receives the trap information and discards the log and debugging information.
Page 916
info-center synchronous Syntax info-center synchronous undo info-center synchronous View System view Parameter None Description Use the info-center synchronous command to enable synchronous information output, so that if system information (such as log information) is output when the user is inputting information, the command prompt and the input information are echoed after the output (note that, the command prompt is echoed in command edit state but is not echoed in interactive state).
Parameter log: Specifies log information. trap: Specifies trap information. debugging: Specifies debugging information. boot: Specifies to adopt the time elapsed since system boot, which is in the format of “xxxxxx.yyyyyy”, where xxxxxx is the high 32 bits and yyyyyy the low 32 bits of the elapsed milliseconds. date: The current system date and time, in the format of “Mmm dd hh:mm:ss:sss yyyy”.
Page 918
Use the undo info-center timestamp loghost command to restore the default setting of time stamp format. By default, the date time stamp is adopted. Example # Set the no-year-date time stamp for the output information sent to the log host. <Sysname>...
info-center trapbuffer Syntax info-center trapbuffer [ channel { channel-number | channel-name } | size buffersize ]* undo info-center trapbuffer [ channel | size ] View System view Parameter size: Sets the size of the trap buffer. buffersize: Size of the trap buffer, represented by the number of messages it holds. It ranges from 0 to 1,024 and defaults to 256.
<Sysname> reset logbuffer reset trapbuffer Syntax reset trapbuffer [ unit unit-id ] View User view Parameter unit-id: Unit ID of the device, the value can only be 1. Description Use the reset trapbuffer command to clear information recorded in the trap buffer. Example # Clear information recorded in the trap buffer.
Page 921
View User view Parameter None Description Use the terminal logging command to enable log terminal display. Use the undo terminal logging command to disable log terminal display. By default, log terminal display is enabled for console users and terminal users. Example # Disable log terminal display.
terminal trapping Syntax terminal trapping undo terminal trapping View User view Parameter None Description Use the terminal trapping command to enable trap terminal display. Use the undo terminal trapping command to disable trap terminal display. By default, trap terminal display is enabled. Example # Enable trap terminal display.
Page 923
Table of Contents 1 Basic System Configuration and Debugging Commands·····································································1-1 Basic System Configuration Commands ································································································1-1 clock datetime··································································································································1-1 clock summer-time ··························································································································1-1 clock timezone·································································································································1-2 quit ···················································································································································1-3 return ···············································································································································1-3 sysname ··········································································································································1-4 system-view·····································································································································1-4 System Status and Information Display Commands ··············································································1-5 display clock ····································································································································1-5 display debugging····························································································································1-6 display version·································································································································1-6 System Debugging Commands ··············································································································1-7 debugging········································································································································1-7...
Basic System Configuration and Debugging Commands Basic System Configuration Commands clock datetime Syntax clock datetime HH:MM:SS { YYYY/MM/DD | MM/DD/YYYY } View User view Parameter HH:MM:SS: Current time, where HH ranges from 0 to 23, MM and SS range from 0 to 59. YYYY/MM/DD or MM/DD/YYYY: Current date, where YYYY represents year ranging from 2000 to 2099, MM represents month ranging from 1 to 12, and DD represents day ranging from 1 to 31.
one-off: Sets the summer time for only one year (the specified year). repeating: Sets the summer time for every year starting from the specified year. start-time: Start time of the summer time, in the form of HH:MM:SS. start-date: Start date of the summer time, in the form of YYYY/MM/DD or MM/DD/YYYY. end-time: End time of the summer time, in the form of HH:MM:SS.
After the setting, you can use the display clock command to check the setting. The log information time and the debugging information time adopts the local time after the time zone and the summer time have been adjusted. Related command: clock summer-time, display clock. Example # Set the local time zone named z5, which is five hours earlier than the UTC time.
Page 928
System view Parameter sysname: System name of the Ethernet switch. It is a string of 1 to 30 characters. By default, it is H3C. Description Use the sysname command to set the system name of an Ethernet switch. Use the undo sysname command to restore the default system name of the Ethernet switch.
Parameter None Description Use the system-view command to enter system view from user view. Related command: quit, return. Example # Enter system view from user view. <Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] System Status and Information Display Commands display clock Syntax display clock...
bytes SDRAM bytes Flash Memory Config Register points to FLASH Hardware Version is REV.A Bootrom Version is 506 CPLD Version is 001 [Subslot 0] 24FE Hardware Version is REV.A [Subslot 1] Hardware Version is REV.A [Subslot 2] Hardware Version is REV.A System Debugging Commands debugging Syntax...
Page 932
display diagnostic-information Syntax display diagnostic-information View Any view Parameter None Description Use the display diagnostic-information command to display system diagnostic information, or save system diagnostic information to a file with the extension .diag in the Flash memory. Example # Save system diagnostic information to the file default.diag. <Sysname>...
Note that: To display the debugging information on the terminal, you need to configure both the terminal debugging and terminal monitor commands. If you execute the undo terminal monitor command, you will disable the monitoring of the log, trap, and debugging information on the current terminal. Thereby, no log, trap, or debugging information will be displayed on the terminal.
Page 934
View System view Default Level 2: System level Parameters cmdkey: The complete form of the first keyword of an existing non-undo command or the second keyword of an undo command for which an alias will be configured. alias: Specifies the command alias, which can be neither the same with the first keyword nor with the starting part of an existing command on the switch.
Page 935
Examples # Display the defined command aliases and the corresponding commands. <Sysname> display command-alias Command alias is enabled index alias command key show display 1-11...
Network Connectivity Test Commands Network Connectivity Test Commands ping Syntax ping [ -a ip-address ] [ -c count ] [ -d ] [ -f ] [ -h ttl ] [ -i interface-type interface-number ] [ ip ] [ -n ] [ - p pattern ] [ -q ] [ -s packetsize ] [ -t timeout ] [ -tos tos ] [ -v ] host View Any view...
Page 937
-t timeout: Specifies the timeout time (in milliseconds) before an ICMP ECHO-REPLY packet is received after an ICMP ECHO-REQUEST packet is sent. The timeout argument ranges from 0 to 65535 ms and defaults to 2,000 ms. -tos tos: Specifies the ToS value of the ICMP ECHO-REQUEST packets in the range 0 to 255. By default, this value is 0.
tracert Syntax tracert [ -a source-ip ] [ -f first-ttl ] [ -m max-ttl ] [ -p port ] [ -q num-packet ] [ -w timeout ] string View Any view Parameter -a source-ip: Specifies the source interface IP address used by this command. -f first-ttl: Specifies the initial TTL value of the packets to be sent, so as to only display the addresses of those gateways on the path whose hop counts are not smaller than the hop count specified by the first-ttl argument.
Page 939
<Sysname> tracert 18.26.0.115 tracert to 18.26.0.115 (18.26.0.115), 30 hops max,40 bytes packet 1 128.3.112.1 (128.3.112.1) 0 ms 0 ms 0 ms 2 128.32.216.1 (128.32.216.1) 19 ms 19 ms 19 ms 3 128.32.206.1 (128.32.206.1) 39 ms 19 ms 19 ms 4 128.32.136.23 (128.32.136.23) 19 ms 39 ms 39 ms 5 128.32.168.22 (128.32.168.22) 20 ms 39 ms 39 ms 6 128.32.197.4 (128.32.197.4) 59 ms 119 ms 39 ms 7 131.119.2.5 (131.119.2.5) 59 ms 59 ms 39 ms...
Device Management Commands Device Management Commands boot boot-loader Syntax boot boot-loader [ backup-attribute ] { file-url | device-name } View User view Parameter backup-attribute: Specifies the backup attribute for a file. file-url: Path plus name of a host software file in the Flash, a string of 1 to 64 characters. device-name: File name, in the form of unit[NO.]>flash:, which is used to indicate that the specified file is stored in the Flash memory of a specified switch.
Example # Update the Boot ROM of the switch using the file named Switch.btm. <Sysname> boot bootrom Switch.btm This will update Bootrom on unit 1. Continue? [Y/N] y Upgrading Bootrom, please wait... Upgrade Bootrom succeeded! display boot-loader Syntax display boot-loader [ unit unit-id ] View Any view Parameter...
Description Use the display cpu command to display the CPU usage. Example # Display the CPU usage of this switch. <Sysname> display cpu Unit 1 Board 0 CPU busy status: 16% in last 5 seconds 16% in last 1 minute 16% in last 5 minutes Table 3-2 Description for the fields of the display cpu command Field...
Parameter None Description Use the display environment command to view the environment temperature of the switch. Note that only PoE-enabled S3100 series Ethernet switches support this command currently. Example # Display the environment temperature of the switch. <Sysname> display environment...
ID number of a fan. Description Use the display fan command to view the working states of fans in a switch. Note that only PoE-enabled S3100 series Ethernet switches support this command currently. Example # Display the working states of the fans.
display power Syntax display power [ unit unit-id [ power-id ] ] View Any view Parameter unit-id: Unit ID of a switch, the value can only be 1. power-id: Power ID. Description Use the display power command to display the working state of the power supply of the switch. Example # Display the working state of the power supply.
Page 946
Parameters interface-type interface-number: Interface type and interface number. Description Use the display transceiver alarm interface command to display the current alarm information of a single or all transceivers. If no error occurs, None is displayed. Table 3-5 shows the alarm information that may occur for the four types of transceivers. Table 3-5 Description on the fields of display transceiver alarm interface Field Remarks...
Page 947
Field Remarks TX bias low TX bias current is low. TX power high TX power is high. TX power low TX power is low. Module not ready Module is not ready. APD supply fault APD (Avalanche Photo Diode) supply fault TEC fault TEC (Thermoelectric Cooler) fault Wavelength of optical signal exceeds the manufacturer’s...
Transceiver type not supported by port Transceiver type is not supported on the port. hardware For pluggable transceivers supported by S3100 series Ethernet switches, refer to H3C S3100 Series Ethernet Switches Installation Manual. Examples # Display the alarm information of the transceiver on interface GigabitEthernet 1/1/2.
Examples # Display the currently measured value of digital diagnosis parameters of the anti-spoofing pluggable optical transceiver customized by H3C on interface GigabitEthernet 1/2/2. <Sysname> display transceiver diagnosis interface gigabitethernet 1/2/2 GigabitEthernet1/2/2 transceiver diagnostic information: Current diagnostic parameters: Temp(°C) Voltage(V)
[ interface-type interface-number ] View Any view Parameters interface-type interface-number: Interface type and interface number. Description Use the display transceiver manuinfo interface command to display part of the electrical label information of a single or all anti-spoofing pluggable transceivers customized by H3C. 3-11...
Page 951
Examples # Display part of the electrical label information of the anti-spoofing pluggable transceiver customized by H3C on interface GigabitEthernet 1/2/2. <Sysname> display transceiver manuinfo interface gigabitethernet 1/2/2 GigabitEthernet1/2/2 transceiver manufacture information: Manu. Serial Number : 213410A0000054000251 Manufacturing Date : 2006-09-01...
reboot Syntax reboot [ unit unit-id ] View User view Parameter unit-id: Unit ID of a switch, the value can only be 1. Description Use the reboot command to restart a specified Ethernet switch. Before rebooting, the system checks whether there is any configuration change. If yes, it prompts whether or not to proceed.
mm/dd/yyyy or yyyy/mm/dd: Reboot date, where yyyy (year) ranges from 2,000 to 2,099, mm (month) ranges from 1 to 12, and the range of dd (day) depends on the specific month. You cannot set the date 30 days later than the system current date. Description Use the schedule reboot at command to schedule a reboot on the current switch and set the reboot date and time.
Parameter hh:mm: Reboot waiting delay, where hh ranges from 0 to 720, and mm ranges from 0 to 59. The value of hh:mm can be up to 720:00. mm: Reboot waiting delay, ranging from 0 to 43,200 minutes. Description Use the schedule reboot delay command to schedule a reboot on the switch, and set the reboot waiting delay.
Page 955
period: Reboot period of the switch, in the format period = { daily | { monday | tuesday | wednesday | thursday | friday | saturday | sunday }* }. daily indicates the reboot period is one day, that is, the switch reboots at a specified time every day.
Page 956
Use the undo system-monitor enable command to disable real-time monitoring of the running status of the system. This function enables you to dynamically record the system running status, such as CPU, thus facilitating analysis and solution of the problems of the device. By default, real-time monitoring of the running status of the system is enabled.
Scheduled Task Configuration Commands Scheduled Task Configuration Commands display job Syntax display job [ job-name ] View Any view Default Level 1: Monitor level Parameters job-name: Name of a scheduled task, a string of 1 to 32 characters. When executed without the job-name argument, the command displays configuration of all the scheduled tasks;...
Page 958
View System view Default Level 3: Manage level Parameters job-name: Name of a scheduled task, a string of 1 to 32 characters. You can configure multiple scheduled tasks, with each task uniquely identified by the string. You can create up to 100 scheduled tasks.
Page 959
one-off: Specifies that the specified command(s) are executed for once, that is, the specified command(s) are executed when the time is reached, and will not be executed when the time is reached next time. repeating: Executes a specified command(s) repeatedly. at time: Time when a specified command is executed, in the format of hh:mm.
Page 960
[Sysname-job-phone] time 5 one-off delay 5:00 command undo poe enable view Syntax view view undo view View Scheduled task view Default Level 3: Manage level Parameters view: View name, a string of 1 to 90 characters, used to specify in which view the specified command(s) in a scheduled task will be executed.
VLAN-VPN Configuration Commands VLAN-VPN Configuration Commands display port vlan-vpn Syntax display port vlan-vpn View Any view Parameters None Description Use the display port vlan-vpn command to display the information about VLAN-VPN configuration of the current system. Related commands: vlan-vpn enable, vlan-vpn inner-cos-trust, vlan-vpn tpid. Examples # Display the VLAN-VPN configuration of the current system.
vlan-vpn enable Syntax vlan-vpn enable undo vlan-vpn View Ethernet port view Parameters None Description Use the vlan-vpn enable command to enable the VLAN-VPN feature for a port. Use the undo vlan-vpn command to disable the VLAN-VPN feature for a port. By default, the VLAN-VPN feature is disabled.
Page 964
Syntax vlan-vpn tpid value undo vlan-vpn tpid View System view Parameters value: User-defined TPID value (in hexadecimal format), in the range 0x0001 to 0xFFFF. Description Use the vlan-vpn tpid command to set the global TPID value. With the TPID value set , the port fills the value to the TPID field of the outer tag to be added for a packet and, upon receiving a packet, compares the TPID value with the TPID field of the packet to determine whether the packet carries a VLAN tag or not.
Selective QinQ Configuration Commands This chapter is only applicable to S3100-EI series switches. Selective QinQ Configuration Commands raw-vlan-id inbound Syntax raw-vlan-id inbound vlan-id-list undo raw-vlan-id inbound { all | vlan-id-list } View QinQ view Parameters vlan-id-list: Lists of VLAN IDs. After receiving packets of these VLANs, the switch will encapsulate the packets with the specified outer VLAN tag.
A packet cannot be tagged with different outer VLAN tags. To change the outer VLAN tag of a packet, you need to remove the existing outer VLAN tag configuration and configure a new outer VLAN tag. Before configuring this command in QinQ view, you need to use the vlan-vpn vid command to configure the outer VLAN tag to be used in the selective QinQ policy.
<Sysname> system-view System View: return to User View with Ctrl+Z. [Sysname] vlan-vpn vid 20 [Sysname-vid-20] raw-vlan-id inbound 2 to 14 vlan-vpn selective enable Syntax vlan-vpn selective enable undo vlan-vpn selective enable View Ethernet port view Parameter None Description Use the vlan-vpn selective enable command to enable the selective QinQ feature on a port. With the selective QinQ feature enabled, packets carrying specific inner VLAN tags are tagged with specific outer VLAN tags according to the VLAN tag mapping rules defined.
BPDU Tunnel Configuration Commands This chapter is only applicable to the S3100-EI series Ethernet switches. BPDU Tunnel Configuration Commands bpdu-tunnel Syntax bpdu-tunnel protocol-type undo bpdu-tunnel { protocol-type | all } View Ethernet port view Parameters protocol-type: Protocol type, packets of which will be transmitted through a BPDU tunnel, This argument can be a keyword listed in Table 3-1.
Value Description Enable/Disable BPDU tunnel for VLAN trunk protocol (VTP). Enable/Disable BPDU tunnel for uni-directional udld link direction (UDLD). all: Disables BPDU tunnel for all protocol packets. Description Use the bpdu-tunnel command to enable BPDU tunnel on a port, so that packets of the specified protocol will be transparently transmitted through the BPDU tunnel on the port.
View System view Parameters mac-address: Destination MAC address to be assigned to the protocol packets transmitted along a BPDU tunnel. This argument must be a multicast MAC address. Description Use the bpdu-tunnel tunnel-dmac command to configure the destination MAC address for protocol packets transmitted along a BPDU tunnel.
Page 971
Description Use the display bpdu-tunnel command to display the private multicast MAC address configured for protocol packets transmitted along the BPDU tunnel(s). Related commands: bpdu-tunnel tunnel-dmac. Examples # Display the private multicast MAC address configured for packets transmitted along the BPDU tunnel(s).
Page 973
VLAN Mapping Configuration Commands VLAN mapping is only applicable to S3100-EI series switches among the S3100 series. One-to-One VLAN Mapping Configuration Commands vlan-mapping Syntax vlan-mapping vlan old-vlan-id remark new-vlan-id undo vlan-mapping vlan old-vlan-id View System view, Ethernet port view Parameter vlan old-vlan-id: Specifies the original VLAN ID for one-to-one VLAN mapping.
Page 974
You cannot enable one-to-one VLAN mapping on a member port of a link aggregation group. One-to-one VLAN mapping and the protocol-based VLAN function are mutually exclusive on the same port. One-to-one VLAN mapping is mutually exclusive with many-to-one VLAN mapping. With many-to-one VLAN mapping enabled on a port, you cannot enable one-to-one VLAN mapping on any other port.
Page 975
By default, one-to-one VLAN mapping is disabled. With a port-level one-to-one VLAN mapping rule configured for a port, one-to-one VLAN mapping is enabled on the port at the same time. In this case, the vlan-mapping enable command cannot be used to enable one-to-one VLAN mapping again. One-to-one VLAN mapping and the protocol-based VLAN function are mutually exclusive on the same port.
Page 976
Many-to-one VLAN mapping is mutually exclusive with one-to-one VLAN mapping. With many-to-one VLAN mapping enabled on any port, you cannot enable one-to-one VLAN mapping on any other port. Examples # Define a many-to-one VLAN mapping rule on Ethernet 1/0/1 to map original VLANs 1000 through 1002 to VLAN 1010.
Page 977
# Enable port Ethernet 1/0/1 to add Option 82 carrying the original VLAN information to the DHCP requests. <Sysname> system-view [Sysname] interface Ethernet 1/0/1 [Sysname-Ethernet1/0/1] dhcp-snooping information ignore-vlanmapping...
HWPing Commands HWPing Client Commands adv-factor Syntax adv-factor adv-number undo adv-factor View HWPing test group view Parameters adv-number: Advantage factor, used to count Mos and ICPIF value in a jitter voice test. It is in the range 0 to 20 and defaults to 0. Description Use the adv-factor command to configure the advantage factor which is used to count Mos and ICPIF value in a jitter voice test.
Description Use the count command to set the number of probes in each HWPing test. Use the undo count command to restore the default. For tests except jitter test, only one packet is sent in a probe. In a jitter test, you can use the jitter-packetnum command to set the number of packets to be sent in a probe.
Test type Code type Reserved bytes jitter None First 68 bytes jitter G.711 A-Law First 16 bytes jitter G.711 muHmm-Law First 16 bytes jitter G.729 A-Law First 16 bytes Examples # Configure a packet padding string 12 ab cd. <Sysname> system-view System View: return to User View with Ctrl+Z.
description Syntax description string undo description View HWPing test group view Parameters string: Brief description about a test operation. By default, no description is configured. Description Use the description command to briefly describe a test operation. Use the undo description command to delete the configured description. Examples # Describe a test group as “icmp-test”.
Page 984
System View: return to User View with Ctrl+Z [Sysname] hwping administrator icmp [Sysname-hwping-administrator-icmp] test-type icmp [Sysname-hwping-administrator-icmp] destination-ip 169.254.10.3 destination-port Syntax destination-port port-number undo destination-port View HWPing test group view Parameters port-number: Destination port number for an HWPing test, in the range of 1 to 50000. Description Use the destination-port command to configure a destination port number for an HWPing test.
Page 985
jitter: Displays the jitter test information. administrator-name: Name of the administrator who created the HWPing test operation, a string of 1 to 32 characters. operation-tag: Operation tag, a string of 1 to 32 characters. Description Use the display hwping command to display the result of the last HWPing test or the history of HWPing tests.
Page 986
Field Description Other operation errors Number of other errors Operation timeout number Number of time-out occurrences in a test Connection fail number Number of failures to connect with the remote end Drop operation number Number of system resource allocation failures # Display the history records of HWPing tests.
Page 987
Last succeeded test time: 2000-4-2 3:45:36.8 Extend result: SD Maximal delay: 0 DS Maximal delay: 0 Packet lost in test: 0% Disconnect operation number: 0 Operation timeout number: 0 System busy operation number: 0 Connection fail number: 0 Operation sequence errors: 0 Drop operation number: 0 Other operation errors: 0 Http result:...
Page 988
Extend result: SD Maximal delay: 10 DS Maximal delay: 10 Packet lost in test: 0% Disconnect operation number: 0 Operation timeout number: 0 System busy operation number: 0 Connection fail number: 0 Operation sequence errors: 0 Drop operation number: 0 Other operation errors: 0 Jitter result: RTT Number:100...
Page 989
Field Description Negative DS Number Number of negative jitter delays from the destination to the source Sum of absolute values of negative jitter delays from the source to the Negative SD Sum destination Sum of absolute values of negative jitter delays from the destination to the Negative DS Sum source Negative SD average...
The description on a specific field is available for the test results of all types of tests, so that not the description on the output information of all types of tests is provided here. display hwping statistics Syntax display hwping statistics [ administrator-name operation-tag ] View Any view Parameters...
Page 991
Negative SD Square Sum:0 Negative DS Square Sum:0 SD lost packets number:0 DS lost packet number:0 SD packet lost in test:0% DS packet lost in test:0% Unknown result lost packet number:0 Table 1-8 Description on fields in the output of the display hwping statistic command Field Description Start time...
undo dns-server View HWPing test group view Parameters ip-address: IP address to be assigned to a domain name server (DNS). Description Use the dns-server command to configure the IP address of a DNS server. Use the undo dns-server command to remove the IP address of a DNS server. By default, no DNS server IP address is configured.
This command applies to DNS tests only. Examples # Configure the domain name to be resolved as www.test.com. <Sysname> system-view System View: return to User View with Ctrl+Z [Sysname] hwping administrator dns [Sysname-hwping-administrator-dns] test-type dns [Sysname-hwping-administrator-dns] dns resolve-target www.test.com filename Syntax filename file-name undo filename...
undo filesize View HWPing test group view Parameters size: File size, in the range 1 to 10000 Kbytes. Description Use the filesize command to configure the size of the file to be uploaded in an FTP test. Use the undo filesize command to restore the default. By default, the file size is 1000 Kbytes.
The frequency command does not apply to DHCP tests. Examples # Set the automatic test interval to 10 seconds in an ICMP test. <Sysname> system-view System View: return to User View with Ctrl+Z [Sysname] hwping administrator icmp [Sysname-hwping-administrator-icmp] test-type icmp [Sysname-hwping-administrator-icmp] destination-ip 169.254.10.3 [Sysname-hwping-administrator-icmp] frequency 10 ftp-operation...
View HWPing test group view Parameters keep-time: Retaining time of the history record for a test group, which is in the range 1 to 1440 in minutes and defaults to 120 minutes. Description Use the history keep-time command to configure the retaining time of the history record for a test group.
Page 997
history-records Syntax history-records number undo history-records View HWPing test group view Parameters Number: Maximum number of history records that can be saved in a test group, in the range of 0 to 50, and 50 by default. Description Use the history-records command to set the maximum number of history records that can be saved in a test group.
<Sysname> system-view System View: return to User View with Ctrl+Z [Sysname] hwping administrator http [Sysname-hwping-administrator-http] test-type http [Sysname-hwping-administrator-http] http-operation post http-string Syntax http-string string version undo http-string View HWPing test group view Parameters string: HTTP operation string used to specify the webpage to be accessed. It can consist of 1 to 230 characters.
Description Use the hwping command to create an HWPing test group and enter HWPing test group view. If the specified HWPing test group already exists, this command leads you to HWPing test group view directly. Use the undo hwping command to delete an HWPing test group. Examples # Create an HWPing test group of which the administrator name is administrator and operation tag is icmp.
Examples # Enable HWPing client. <Sysname> system-view System View: return to User View with Ctrl+Z [Sysname] hwping-agent enable hwping-agent max-requests Syntax hwping-agent max-requests max-number undo hwping-agent max-requests View System view Parameters max-number: Maximum number of concurrent tests, in the range of 1 to 5. Description Use the hwping-agent max-requests command to set the allowed maximum number of concurrent tests.
Page 1001
By default, the interval between sending jitter test packets is 20 milliseconds. Related commands: jitter-packetnum. The jitter-interval command applies to jitter tests only. Examples # Set the interval between sending jitter test packets to 30 milliseconds. <Sysname> system-view System View: return to User View with Ctrl+Z [Sysname] hwping administrator jitter [Sysname-hwping-administrator-jitter] test-type jitter [Sysname-hwping-administrator-jitter] jitter-interval 30...
Need help?
Do you have a question about the S3100 Series and is the answer not in the manual?
Questions and answers