Allied Telesis AT-x210-9GT Command Reference Manual

Allied Telesis AT-x210-9GT Command Reference Manual

Enterprise edge switches
Hide thumbs Also See for AT-x210-9GT:
Table of Contents

Advertisement

x210 Series
ENTERPRISE EDGE SWITCHES
AT-x210-9GT
AT-x210-16GT
AT-x210-24GT
Command Reference for
AlliedWare Plus™ Version 5.4.6-1.x
C613-50105-01 REV C

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the AT-x210-9GT and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Allied Telesis AT-x210-9GT

  • Page 1 Series ENTERPRISE EDGE SWITCHES AT-x210-9GT AT-x210-16GT AT-x210-24GT Command Reference for AlliedWare Plus™ Version 5.4.6-1.x C613-50105-01 REV C...
  • Page 2 If you would like a copy of the GPL source code contained in Allied Telesis products, please send us a request by registered mail including a check for US$15 to cover production and shipping costs and a CD with the GPL code will be mailed to you.
  • Page 3: Table Of Contents

    Contents PART 1: Setup and Troubleshooting ......55 Chapter 1: CLI Navigation Commands ......56 Introduction .
  • Page 4 ipv6 tftp source-interface ....... . .89 mkdir ..........90 move .
  • Page 5 license ..........152 show license .
  • Page 6 undebug all ........219 Chapter 7: Pluggables and Cabling Commands .
  • Page 7 log permanent size ........305 log-rate-limit nsm .
  • Page 8 debug platform packet ....... . . 362 duplex ..........364 flowcontrol (switch port) .
  • Page 9 switchport mode access ....... . . 427 switchport mode private-vlan ......428 switchport mode private-vlan trunk promiscuous .
  • Page 10 spanning-tree guard root ....... . 501 spanning-tree hello-time ....... . 502 spanning-tree link-type .
  • Page 11 arp-reply-bc-dmac ........560 clear arp-cache ........561 debug ip packet interface .
  • Page 12 ip igmp last-member-query-interval ......615 ip igmp limit ........616 ip igmp maximum-groups .
  • Page 13 Chapter 22: IPv4 Hardware Access Control List (ACL) Commands ... 679 Introduction ........679 access-group .
  • Page 14 no police ......... . 762 police single-rate action .
  • Page 15 Introduction ........832 auth auth-fail vlan .
  • Page 16 auth-web-server session-keep ......913 auth-web-server ssl ........914 auth-web-server ssl intercept-port .
  • Page 17 Chapter 29: RADIUS Commands ....... . . 983 Introduction ........983 auth radius send nas-identifier .
  • Page 18 clear ip dhcp snooping binding ......1044 clear ip dhcp snooping statistics ......1045 debug arp security .
  • Page 19 Chapter 35: Allied Telesis Management Framework™ (AMF) Commands ..1109 Introduction ........1109 atmf area .
  • Page 20 atmf remote-login ........1174 atmf restricted-login ........1175 atmf select-area .
  • Page 21 dns-server ......... 1274 domain-name .
  • Page 22 show snmp-server group ....... 1339 show snmp-server user ....... . 1340 show snmp-server view .
  • Page 23 show lldp neighbors ........1415 show lldp neighbors detail ......1417 show lldp statistics .
  • Page 24 ssh ..........1479 ssh client .
  • Page 25 show counter ping-poll ....... . 1545 show ping-poll ........1547 source-ip .
  • Page 26 List of Commands (access-list hardware ICMP filter) .........697 (access-list hardware IP protocol filter).
  • Page 27 access-list (hardware MAC numbered)........692 access-list (standard numbered).
  • Page 28 atmf distribute firmware ..........1138 atmf domain vlan.
  • Page 29 auth log ..............848 auth max-supplicant.
  • Page 30 auth-web-server page logo ..........900 auth-web-server page sub-title.
  • Page 31 clear exception log ............245 clear ip dhcp binding .
  • Page 32 clock timezone ............175 commit (IPv4) .
  • Page 33 debug epsr .............1083 debug fiber-monitoring.
  • Page 34 description (trigger) ........... .1503 dir.
  • Page 35 epsr trap ............. . .1092 epsr .
  • Page 36 ip dhcp snooping delete-by-linkdown........1052 ip dhcp snooping max-bindings ........1053 ip dhcp snooping trust.
  • Page 37 ip route ..............596 ip rrp snooping .
  • Page 38 lldp med-notifications ..........1377 lldp med-tlv-select.
  • Page 39 log host source ............289 log host time .
  • Page 40 max-static-routes ............182 max-static-routes .
  • Page 41 polarity..............380 police single-rate action .
  • Page 42 security-password minimum-categories ........132 security-password minimum-length........133 security-password reject-expired-pwd.
  • Page 43 show atmf area summary ..........1208 show atmf area .
  • Page 44 show counter dhcp-server ..........1284 show counter ipv6 dhcp-client .
  • Page 45 show debugging trigger ..........1507 show debugging .
  • Page 46 show interface............329 show ip access-list .
  • Page 47 show license brief ............155 show license.
  • Page 48 show ping-poll ............1547 show platform classifier statistics utilization brief .
  • Page 49 show snmp-server user ..........1340 show snmp-server view .
  • Page 50 show tacacs+ ............1033 show tech-support .
  • Page 51 spanning-tree enable ........... . 495 spanning-tree errdisable-timeout enable .
  • Page 52 ssh server sftp ............1494 ssh server .
  • Page 53 system territory (deprecated) ..........217 tacacs-server host .
  • Page 54 undebug epsr ............1104 undebug igmp .
  • Page 55: Part 1: Setup And Troubleshooting

    Part 1: Setup and Troubleshooting C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 56: Cli Navigation Commands

    CLI Navigation Commands Introduction Overview This chapter provides an alphabetical reference for the commands used to navigate between different modes. This chapter also provides a reference for the help and show commands used to help navigate within the CLI. Command List •...
  • Page 57: Configure Terminal

    CLI N AVIGATION OMMANDS CONFIGURE TERMINAL configure terminal Overview This command enters the Global Configuration command mode. configure terminal Syntax Mode Privileged Exec Example To enter the Global Configuration command mode (note the change in the command prompt), enter the command: awplus# configure terminal awplus(config)#...
  • Page 58: Disable (Privileged Exec Mode)

    CLI N AVIGATION OMMANDS DISABLE RIVILEGED XEC MODE disable (Privileged Exec mode) Overview This command exits the Privileged Exec mode, returning the prompt to the User Exec mode. To end a session, use the exit command. disable Syntax Mode Privileged Exec Example To exit the Privileged Exec mode, enter the command: awplus#...
  • Page 59 CLI N AVIGATION OMMANDS Overview This command lets you to run User Exec and Privileged Exec mode commands when you are in any configuration mode. do <command> Syntax Parameter Description <command> Specify the command and its parameters. Mode Any configuration mode awplus# configure terminal Example...
  • Page 60: Enable (Privileged Exec Mode)

    CLI N AVIGATION OMMANDS ENABLE RIVILEGED XEC MODE enable (Privileged Exec mode) Overview This command enters the Privileged Exec mode and optionally changes the privilege level for a session. If a privilege level is not specified then the maximum privilege level (15) is applied to the session. If the optional privilege level is omitted then only users with the maximum privilege level can access Privileged Exec mode without providing the password as specified by the enable password...
  • Page 61 CLI N AVIGATION OMMANDS ENABLE RIVILEGED XEC MODE Privilege Exec mode. Use the enable password command or the enable secret commands to set the password to enable access to Privileged Exec mode. awplus> enable 7 awplus# Related disable (Privileged Exec mode) Commands enable password enable secret...
  • Page 62: End

    CLI N AVIGATION OMMANDS Overview This command returns the prompt to the Privileged Exec command mode from any other advanced command mode. Syntax Mode All advanced command modes, including Global Configuration and Interface Configuration modes. Example The following example shows the use of the end command to return to the Privileged Exec mode directly from Interface mode.
  • Page 63: Exit

    CLI N AVIGATION OMMANDS EXIT exit Overview This command exits the current mode, and returns the prompt to the mode at the previous level. When used in User Exec mode, the exit command terminates the session. exit Syntax Mode All command modes, including Global Configuration and Interface Configuration modes.
  • Page 64: Help

    CLI N AVIGATION OMMANDS HELP help Overview This command displays a description of the AlliedWare Plus™ OS help system. help Syntax Mode All command modes Example To display a description on how to use the system help, use the command: awplus# help Output...
  • Page 65: Logout

    CLI N AVIGATION OMMANDS LOGOUT logout Overview This command exits the User Exec or Privileged Exec modes and ends the session. logout Syntax Mode User Exec and Privileged Exec Example To exit the User Exec mode, use the command: awplus# logout C613-50105-01 REV C Command Reference for x210 Series...
  • Page 66: Show History

    CLI N AVIGATION OMMANDS SHOW HISTORY show history Overview This command lists the commands entered in the current session. The history buffer is cleared automatically upon reboot. The output lists all command line entries, including commands that returned an error. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 67: File And Configuration Management Commands

    File and Configuration Management Commands Introduction This chapter provides an alphabetical reference of AlliedWare Plus™ OS file and configuration management commands. Filename Syntax Many of the commands in this chapter use the placeholder “filename” to represent and Keyword the name and location of the file that you want to act on. The following table Usage explains the syntax of the filename for each different type of file location.
  • Page 68 ILE AND ONFIGURATION ANAGEMENT OMMANDS Valid characters The filename and path can include characters from up to four categories. The categories are: uppercase letters: A to Z lowercase letters: a to z digits: 0 to 9 special symbols: all printable ASCII characters not included in the previous three categories.
  • Page 69 ILE AND ONFIGURATION ANAGEMENT OMMANDS • “copy current-software” on page 76 • “copy debug” on page 77 • “copy running-config” on page 78 • “copy startup-config” on page 79 • “copy zmodem” on page 80 • “delete” on page 81 •...
  • Page 70: Boot Config-File

    ILE AND ONFIGURATION ANAGEMENT OMMANDS BOOT CONFIG FILE boot config-file Overview Use this command to set the configuration file to use during the next boot cycle. Use the no variant of this command to remove the configuration file. Syntax boot config-file <filepath-filename> no boot config-file Parameter Description...
  • Page 71: Boot Config-File Backup

    ILE AND ONFIGURATION ANAGEMENT OMMANDS BOOT CONFIG FILE BACKUP boot config-file backup Overview Use this command to set a backup configuration file to use if the main configuration file cannot be accessed. Use the no variant of this command to remove the backup configuration file. Syntax boot config-file backup <filepath-filename>...
  • Page 72: Boot System

    ILE AND ONFIGURATION ANAGEMENT OMMANDS BOOT SYSTEM boot system Overview Use this command to set the release file to load during the next boot cycle. Use the no variant of this command to remove the release file as the boot file. Syntax boot system <filepath-filename>...
  • Page 73: Boot System Backup

    ILE AND ONFIGURATION ANAGEMENT OMMANDS BOOT SYSTEM BACKUP boot system backup Overview Use this command to set a backup release file to load if the main release file cannot be loaded. Use the no variant of this command to remove the backup release file as the backup boot file.
  • Page 74 ILE AND ONFIGURATION ANAGEMENT OMMANDS Overview This command changes the current working directory. cd <directory-name> Syntax Parameter Description <directory-name> Name and path of the directory. Mode Privileged Exec To change to the directory called images, use the command: Example awplus# cd images Related Commands...
  • Page 75: Copy (Filename)

    ILE AND ONFIGURATION ANAGEMENT OMMANDS COPY FILENAME copy (filename) Overview This command copies a file. This allows you to: • copy files from your device to a remote device • copy files from a remote device to your device • create two copies of the same file on your device copy <source-name>...
  • Page 76: Copy Current-Software

    ILE AND ONFIGURATION ANAGEMENT OMMANDS COPY CURRENT SOFTWARE copy current-software Overview This command copies the AlliedWare Plus™ OS software that the device has booted from, to a destination file. copy current-software <destination-name> Syntax Parameter Description <destination-name> The filename and path where you would like the current running-release saved.
  • Page 77: Copy Debug

    ILE AND ONFIGURATION ANAGEMENT OMMANDS COPY DEBUG copy debug Overview This command copies a specified debug file to a destination file. copy debug {<destination-name>|debug|flash|nvs|scp|tftp} Syntax {<source-name>|debug|flash|nvs|scp|tftp} Parameter Description <destination-name> The filename and path where you would like the debug output saved. See Introduction on page 67 for valid syntax.
  • Page 78: Copy Running-Config

    ILE AND ONFIGURATION ANAGEMENT OMMANDS COPY RUNNING CONFIG copy running-config Overview This command copies the running-config to a destination file, or copies a source file into the running-config. Commands entered in the running-config do not survive a device reboot unless they are saved in a configuration file. copy <source-name>...
  • Page 79: Copy Startup-Config

    ILE AND ONFIGURATION ANAGEMENT OMMANDS COPY STARTUP CONFIG copy startup-config Overview This command copies the startup-config script into a destination file, or alternatively copies a configuration script from a source file into the startup-config file. copy <source-name> startup-config Syntax copy startup-config <destination-name> Parameter Description <source-name>...
  • Page 80: Copy Zmodem

    ILE AND ONFIGURATION ANAGEMENT OMMANDS COPY ZMODEM copy zmodem Overview This command allows you to copy files using ZMODEM using Minicom. ZMODEM works over a serial connection and does not need any interfaces configured to do a file transfer. copy <source-name> zmodem Syntax copy zmodem Parameter...
  • Page 81: Delete

    ILE AND ONFIGURATION ANAGEMENT OMMANDS DELETE delete Overview This command deletes files or directories. delete [force] [recursive] <filename> Syntax Parameter Description force Ignore nonexistent filenames and never prompt before deletion. recursive Remove the contents of directories recursively. <filename> The filename and path of the file to delete. See Introduction on page 67 for valid syntax.
  • Page 82: Delete Debug

    ILE AND ONFIGURATION ANAGEMENT OMMANDS DELETE DEBUG delete debug Overview Use this command to delete a specified debug output file. delete debug <source-name> Syntax Parameter Description <source-name> The filename and path where the debug output originates. Introduction on page 67 for valid URL syntax. Mode Privileged Exec Example...
  • Page 83: Dir

    ILE AND ONFIGURATION ANAGEMENT OMMANDS Overview This command lists the files on a filesystem. If no directory or file is specified then this command lists the files in the current working directory. dir [all] [recursive] [sort [reverse] [name|size|time]] Syntax [<filename>|debug|flash|nvs] Parameter Description List all files.
  • Page 84 ILE AND ONFIGURATION ANAGEMENT OMMANDS To sort the files by modification time, oldest to newest, use the command: awplus# dir sort reverse time Output Figure 2-3: Example output from the dir command awplus#dir 630 -rw- May 19 2016 23:36:31 example.cfg x210-5.4.6-1.1.rel ...
  • Page 85: Edit

    ILE AND ONFIGURATION ANAGEMENT OMMANDS EDIT edit Overview This command opens a text file in the AlliedWare Plus™ text editor. Once opened you can use the editor to alter to the file. If a filename is specified and it already exists, then the editor opens it in the text editor.
  • Page 86: Edit (Filename)

    ILE AND ONFIGURATION ANAGEMENT OMMANDS EDIT FILENAME edit (filename) Overview This command opens a remote text file as read-only in the AlliedWare Plus™ text editor. Before starting the editor make sure your terminal, terminal emulation program, or Telnet client is 100% compatible with a VT100 terminal. The editor uses VT100 control sequences to display text on the terminal.
  • Page 87: Erase Startup-Config

    ILE AND ONFIGURATION ANAGEMENT OMMANDS ERASE STARTUP CONFIG erase startup-config Overview This command deletes the file that is set as the startup-config file, which is the configuration file that the system runs when it boots up. At the next restart, the device loads the default configuration file, default.cfg. If default.cfg no longer exists, then the device loads with the factory default configuration.
  • Page 88: Ip Tftp Source-Interface

    ILE AND ONFIGURATION ANAGEMENT OMMANDS IP TFTP SOURCE INTERFACE ip tftp source-interface Overview Use this command to manually specify the IP address that all TFTP requests originate from. This is useful in network configurations where TFTP servers only accept requests from certain devices, or where the server cannot dynamically determine the source of the request.
  • Page 89: Ipv6 Tftp Source-Interface

    ILE AND ONFIGURATION ANAGEMENT OMMANDS TFTP SOURCE INTERFACE ipv6 tftp source-interface Overview Use this command to manually specify the IPv6 address that all TFTP requests originate from. This is useful in network configurations where TFTP servers only accept requests from certain devices, or where the server cannot dynamically determine the source of the request.
  • Page 90: Mkdir

    ILE AND ONFIGURATION ANAGEMENT OMMANDS MKDIR mkdir Overview This command makes a new directory. mkdir <name> Syntax Parameter Description <name> The name and path of the directory that you are creating. Mode Privileged Exec Usage You cannot name a directory or subdirectory flash, nvs, usb, card, tftp, scp, sftp or http.
  • Page 91: Move

    ILE AND ONFIGURATION ANAGEMENT OMMANDS MOVE move Overview This command renames or moves a file. move <source-name> <destination-name> Syntax Parameter Description <source-name> The filename and path of the source file. See Introduction on page 67 for valid syntax. <destination-name> The filename and path of the destination file. See Introduction on page 67 for valid syntax.
  • Page 92: Move Debug

    ILE AND ONFIGURATION ANAGEMENT OMMANDS MOVE DEBUG move debug Overview This command moves a specified debug file to a destination debug file. move debug {<destination-name>|debug|flash|nvs} Syntax Parameter Description <destination-name> The filename and path where you would like the debug output moved to. See Introduction on page 67 for valid syntax.
  • Page 93: Pwd

    ILE AND ONFIGURATION ANAGEMENT OMMANDS Overview This command prints the current working directory. Syntax Mode Privileged Exec Example To print the current working directory, use the command: awplus# Related Commands C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 94: Rmdir

    ILE AND ONFIGURATION ANAGEMENT OMMANDS RMDIR rmdir Overview This command removes a directory. This command only works on empty directories, unless you specify the optional force keyword. rmdir [force] <name> Syntax Parameter Description force Optional keyword that allows you to delete directories that are not empty and contain files or subdirectories.
  • Page 95: Show Boot

    ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW BOOT show boot Overview This command displays the current boot configuration. We recommend that the currently running release is set as the current boot image. show boot Syntax Mode Privileged Exec Example To show the current boot configuration, use the command: awplus# show boot Output...
  • Page 96 ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW BOOT Related boot config-file backup Commands boot system backup C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 97: Show File

    ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW FILE show file Overview This command displays the contents of a specified file. show file <filename> Syntax Parameter Description <filename> Name of a file on the local Flash filesystem, or name and directory path of a file. Mode Privileged Exec To display the contents of the file oldconfig.cfg, which is in the current...
  • Page 98: Show File Systems

    ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW FILE SYSTEMS show file systems Overview This command lists the filesystems and their utilization information where appropriate. show file systems Syntax Mode Privileged Exec Examples To display the filesystems, use the command: awplus# show file systems Output Figure 2-6: Example output from the show file systems command...
  • Page 99 ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW FILE SYSTEMS Table 2: Parameters in the output of the show file systems command (cont.) Parameter Description Prefixes The prefixes used when entering commands to access the filesystems; one of: flash system tftp sftp http.
  • Page 100: Show Running-Config

    Antivirus configuration application Application configuration as-path Autonomous system path filter configuration as-path access-list Configuration of ACLs for AS path filtering atmf Allied Telesis Management Framework configuration Border Gateway Protocol (BGP) configuration community-list Community-list configuration crypto Security-specific configuration dhcp DHCP configuration...
  • Page 101 ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW RUNNING CONFIG Parameter Description entity Entity configuration firewall Firewall configuration interface Interface configuration. See show running-config interface for further options. Internet Protocol (IP) configuration ip pim dense-mode PIM-DM configuration ip pim sparse-mode PIM-SM configuration ip route IP static route configuration ip-reputation...
  • Page 102 ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW RUNNING CONFIG Parameter Description security-password Strong password security configuration snmp SNMP configuration Secure Shell configuration switch Switch configuration web-control Web Control configuration full Display the running-config for all features. This is the default setting, so is the same as entering show running-config.
  • Page 103: Show Running-Config Interface

    ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW RUNNING CONFIG INTERFACE show running-config interface Overview This command displays the current configuration of one or more interfaces on the device. show running-config interface [<interface-list>] [dot1x|ip Syntax igmp|ip multicast|ip pim dense-mode|ip pim sparse-mode|ipv6 rip|lacp|mstp|ospf|rip|rstp|stp] Parameter Description <interface-list>...
  • Page 104 ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW RUNNING CONFIG INTERFACE To display the current running configuration of a device for VLAN 1, use the command: awplus# show running-config interface vlan1 To display the current running configuration of a device for VLANs 1 and 3-5, use the command: awplus# show running-config interface vlan1,vlan3-vlan5...
  • Page 105: Show Startup-Config

    ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW STARTUP CONFIG show startup-config Overview This command displays the contents of the start-up configuration file, which is the file that the device runs on start-up. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 106: Show Version

    ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW VERSION show version Overview This command displays the version number and copyright details of the current AlliedWare Plus™ OS your device is running. show version Syntax Mode User Exec and Privileged Exec Example To display the version details of your currently installed software, use the command: awplus# show version...
  • Page 107 ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW VERSION Corosync Cluster Engine  Copyright (c) 2002-2004 MontaVista Software, Inc. All rights reserved.  Copyright (c) 2005-2010 Red Hat, Inc. File Utility Library  Copyright (c) Ian F. Darwin 1986-1987, 1989-1992, 1994-1995.  Software written by Ian F.
  • Page 108: Write File

    ILE AND ONFIGURATION ANAGEMENT OMMANDS WRITE FILE write file Overview This command copies the running-config into the file that is set as the current startup-config file. This command is a synonym of the write memory and copy running-config startup-config commands. write [file] Syntax Mode...
  • Page 109: Write Memory

    ILE AND ONFIGURATION ANAGEMENT OMMANDS WRITE MEMORY write memory Overview This command copies the running-config into the file that is set as the current startup-config file. This command is a synonym of the write file and copy running-config startup-config commands. write [memory] Syntax Mode...
  • Page 110: Write Terminal

    ILE AND ONFIGURATION ANAGEMENT OMMANDS WRITE TERMINAL write terminal Overview This command displays the current configuration of the device. This command is a synonym of the show running-config command. write terminal Syntax Mode Privileged Exec Example To display the current configuration of your device, use the command: awplus# write terminal Related...
  • Page 111: User Access Commands

    User Access Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure user access. Command List • “clear line console” on page 113 • “clear line vty” on page 114 • “enable password” on page 115 •...
  • Page 112 CCESS OMMANDS • “show privilege” on page 140 • “show security-password configuration” on page 141 • “show security-password user” on page 142 • “show telnet” on page 143 • “show users” on page 144 • “telnet” on page 145 • “telnet server”...
  • Page 113: Clear Line Console

    CCESS OMMANDS CLEAR LINE CONSOLE clear line console Overview This command resets a console line. If a terminal session exists on the line then the terminal session is terminated. If console line settings have changed then the new settings are applied. clear line console 0 Syntax Mode...
  • Page 114: Clear Line Vty

    CCESS OMMANDS CLEAR LINE VTY clear line vty Overview This command resets a VTY line. If a session exists on the line then it is closed. clear line vty <0-32> Syntax Parameter Description <0-32> Line number Mode Privileged Exec Example To reset the first vty line, use the command: awplus# clear line vty 1...
  • Page 115: Enable Password

    CCESS OMMANDS ENABLE PASSWORD enable password Overview To set a local password to control access to various privilege levels, use the enable password Global Configuration command. Use the enable password command to modify or create a password to be used, and use the no enable password command to remove the password.
  • Page 116 CCESS OMMANDS ENABLE PASSWORD Note that the enable password command is an alias for the enable secret command and one password per privilege level is allowed using these commands. Do not assign one password to a privilege level with enable password and another password to a privilege level with enable...
  • Page 117 CCESS OMMANDS ENABLE PASSWORD this method. The output in the configuration file will show only the encrypted string, and not the text string. awplus# configure terminal awplus(config)# enable password 8 fU7zHzuutY2SA awplus(config)# This results in the following show output: awplus#show run Current configuration:...
  • Page 118: Enable Secret

    CCESS OMMANDS ENABLE SECRET enable secret Overview To set a local password to control access to various privilege levels, use the enable secret Global Configuration command. Use the enable secret command to modify or create a password to be used, and use the no enable secret command to remove the password.
  • Page 119 CCESS OMMANDS ENABLE SECRET Note that the enable secret command is an alias for the enable password command and one password per privilege level is allowed using these commands. Do not assign one password to a privilege level with enable password and another password to a privilege level with enable...
  • Page 120 CCESS OMMANDS ENABLE SECRET The output in the configuration file will show only the encrypted string, and not the text string: awplus# configure terminal awplus(config)# enable secret 8 fU7zHzuutY2SA awplus(config)# This results in the following show output: awplus#show run Current configuration: hostname awplus...
  • Page 121: Exec-Timeout

    CCESS OMMANDS EXEC TIMEOUT exec-timeout Overview This command sets the interval your device waits for user input from either a console or VTY connection. Once the timeout interval is reached, the connection is dropped. This command sets the time limit when the console or VTY connection automatically logs off after no activity.
  • Page 122 CCESS OMMANDS EXEC TIMEOUT Related line Commands service telnet C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 123: Flowcontrol Hardware (Asyn/Console)

    CCESS OMMANDS FLOWCONTROL HARDWARE ASYN CONSOLE flowcontrol hardware (asyn/console) Overview Use this command to enable RTS/CTS (Ready To Send/Clear To Send) hardware flow control on a terminal console line (asyn port) between the DTE (Data Terminal Equipment) and the DCE (Data Communications Equipment). flowcontrol hardware Syntax no flowcontrol hardware...
  • Page 124 CCESS OMMANDS FLOWCONTROL HARDWARE ASYN CONSOLE Examples To enable hardware flow control on terminal console line asyn0, use the commands: awplus# configure terminal awplus(config)# line console 0 awplus(config-line)# flowcontrol hardware To disable hardware flow control on terminal console line asyn0, use the commands: awplus# configure terminal...
  • Page 125: Length (Asyn)

    CCESS OMMANDS LENGTH ASYN length (asyn) Overview Use this command to specify the number of rows of output that the device will display before pausing, for the console or VTY line that you are configuring. The no variant of this command restores the length of a line (terminal session) attached to a console port or to a VTY to its default length of 22 rows.
  • Page 126: Line

    CCESS OMMANDS LINE line Overview Use this command to enter line configuration mode for the specified VTYs or the console. The command prompt changes to show that the device is in Line Configuration mode. line vty <first-line> [<last-line>] Syntax Parameter Description <first-line>...
  • Page 127: Login Authentication

    CCESS OMMANDS LINE Related accounting login Commands clear line console clear line vty flowcontrol hardware (asyn/console) length (asyn) login authentication privilege level speed (asyn) C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 128: Privilege Level

    CCESS OMMANDS PRIVILEGE LEVEL privilege level Overview This command sets a privilege level for VTY or console connections. The configured privilege level from this command overrides a specific user’s initial privilege level at the console login. privilege level <1-15> Syntax Mode Line Configuration Usage...
  • Page 129: Security-Password History

    CCESS OMMANDS SECURITY PASSWORD HISTORY security-password history Overview This command specifies the number of previous passwords that are unable to be reused. A new password is invalid if it matches a password retained in the password history. The no variant of the command disables this feature. Syntax security-password history <0-15>...
  • Page 130: Security-Password Forced-Change

    CCESS OMMANDS SECURITY PASSWORD FORCED CHANGE security-password forced-change Overview This command specifies whether or not a user is forced to change an expired password at the next login. If this feature is enabled, users whose passwords have expired are forced to change to a password that must comply with the current password security rules at the next login.
  • Page 131: Security-Password Lifetime

    CCESS OMMANDS SECURITY PASSWORD LIFETIME security-password lifetime Overview This command enables password expiry by specifying a password lifetime in days. Note that when the password lifetime feature is disabled, it also disables the security-password forced-change command and the security-password warning command.
  • Page 132: Security-Password Minimum-Categories

    CCESS OMMANDS SECURITY PASSWORD MINIMUM CATEGORIES security-password minimum-categories Overview This command specifies the minimum number of categories that the password must contain in order to be considered valid. The password categories are: • uppercase letters: A to Z • lowercase letters: a to z •...
  • Page 133: Security-Password Minimum-Length

    CCESS OMMANDS SECURITY PASSWORD MINIMUM LENGTH security-password minimum-length Overview This command specifies the minimum allowable password length. This value is checked against when there is a password change or a user account is created. security-password minimum-length <1-23> Syntax Parameter Description <1-23>...
  • Page 134: Security-Password Reject-Expired-Pwd

    CCESS OMMANDS SECURITY PASSWORD REJECT EXPIRED security-password reject-expired-pwd Overview This command specifies whether or not a user is allowed to login with an expired password. Users with expired passwords are rejected at login if this functionality is enabled. Users then have to contact the Network Administrator to change their password.
  • Page 135: Security-Password Warning

    CCESS OMMANDS SECURITY PASSWORD WARNING security-password warning Overview This command specifies the number of days before the password expires that the user will receive a warning message specifying the remaining lifetime of the password. Note that the warning period cannot be set unless the lifetime feature is enabled with the security-password lifetime command.
  • Page 136: Service Advanced-Vty

    CCESS OMMANDS SERVICE ADVANCED service advanced-vty Overview This command enables the advanced-vty help feature. This allows you to use TAB completion for commands. Where multiple options are possible, the help feature displays the possible options. The no service advanced-vty command disables the advanced-vty help feature. Syntax service advanced-vty no service advanced-vty...
  • Page 137: Service Password-Encryption

    CCESS OMMANDS SERVICE PASSWORD ENCRYPTION service password-encryption Overview Use this command to enable password encryption. This is enabled by default. When password encryption is enabled, the device displays passwords in the running config in encrypted form instead of in plain text. Use the no service password-encryption command to stop the device from displaying newly-entered passwords in encrypted form.
  • Page 138: Service Telnet

    CCESS OMMANDS SERVICE TELNET service telnet Overview Use this command to enable the telnet server. The server is enabled by default. Enabling the telnet server starts the device listening for incoming telnet sessions on the configured port. The server listens on port 23, unless you have changed the port by using the privilege level command.
  • Page 139: Service Terminal-Length (Deleted)

    CCESS OMMANDS SERVICE TERMINAL LENGTH DELETED service terminal-length (deleted) Overview This command has been deleted in Software Version 5.4.5-0.1 and later. C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 140: Show Privilege

    CCESS OMMANDS SHOW PRIVILEGE show privilege Overview This command displays the current user privilege level, which can be any privilege level in the range <1-15>. Privilege levels <1-6> allow limited user access (all User Exec commands), privilege levels <7-14> allow restricted user access (all User Exec commands plus Privileged Exec show commands).
  • Page 141: Show Security-Password Configuration

    CCESS OMMANDS SHOW SECURITY PASSWORD CONFIGURATION show security-password configuration Overview This command displays the configuration settings for the various security password rules. show security-password configuration Syntax Mode Privileged Exec Example To display the current security-password rule configuration settings, use the command: awplus# show security-password configuration...
  • Page 142: Show Security-Password User

    CCESS OMMANDS SHOW SECURITY PASSWORD USER show security-password user Overview This command displays user account and password information for all users. show security-password user Syntax Mode Privileged Exec Example To display the system users’ remaining lifetime or last password change, use the command: awplus# show security-password user...
  • Page 143: Show Telnet

    CCESS OMMANDS SHOW TELNET show telnet Overview This command shows the Telnet server settings. show telnet Syntax Mode User Exec and Privileged Exec Example To show the Telnet server settings, use the command: awplus# show telnet Output Figure 3-4: Example output from the show telnet command Telnet Server Configuration...
  • Page 144: Show Users

    CCESS OMMANDS SHOW USERS show users Overview This command shows information about the users who are currently logged into the device. show users Syntax Mode User Exec and Privileged Exec Example To show the users currently connected to the device, use the command: awplus# show users Output...
  • Page 145: Telnet

    CCESS OMMANDS TELNET telnet Overview Use this command to open a telnet session to a remote device. telnet {<hostname>|[ip] <ipv4-addr>|[ipv6] <ipv6-addr>} Syntax [<port>] Parameter Description <hostname> The host name of the remote system. Keyword used to specify the IPv4 address or host name of a remote system.
  • Page 146: Telnet Server

    CCESS OMMANDS TELNET SERVER telnet server Overview This command enables the telnet server on the specified TCP port. If the server is already enabled then it will be restarted on the new port. Changing the port number does not affect the port used by existing sessions. telnet server {<1-65535>|default} Syntax Parameter...
  • Page 147: Terminal Length

    CCESS OMMANDS TERMINAL LENGTH terminal length Overview Use the terminal length command to specify the number of rows of output that the device will display before pausing, for the currently-active terminal only. Use the terminal no length command to remove the length specified by this command.
  • Page 148: Terminal Resize

    CCESS OMMANDS TERMINAL RESIZE terminal resize Overview Use this command to automatically adjust the number of rows of output on the console, which the device will display before pausing, to the number of rows configured on the user’s terminal. terminal resize Syntax Mode User Exec and Privileged Exec...
  • Page 149: Username

    CCESS OMMANDS USERNAME username Overview This command creates or modifies a user to assign a privilege level and a password. : The default username privilege level of 1 is not shown in running-config output. NOTE Any username privilege level that has been modified from the default is shown. Syntax username <name>...
  • Page 150 CCESS OMMANDS USERNAME Usage An intermediate CLI security level (privilege level 7 to privilege level 14) allows a CLI user access to the majority of show commands, including the platform show commands that are available at privilege level 1 to privilege level 6. Note that some show commands, such as show running-configuration and show startup-configuration, are only available at privilege level 15.
  • Page 151: Feature Licensing Commands

    Feature Licensing Commands Introduction Overview This chapter provides an alphabetical reference for each of the Feature Licensing commands. Feature Licensing enables you to use advanced features such as Layer 3 routing. To see which Feature Licenses are available for your device, see the AlliedWare Plus Datasheet.
  • Page 152: License

    EATURE ICENSING OMMANDS LICENSE license Overview This command activates the licensed software feature set on a device. Use the no variant of this command to deactivate the licensed software feature set on a device. For feature licenses, contact your authorized distributor or reseller. If a license key expires or is incorrect so the license key is invalid, then some software features will be unavailable.
  • Page 153: Show License

    EATURE ICENSING OMMANDS SHOW LICENSE show license Overview This command displays information about a specific software feature license, or all enabled software feature licenses on the device. show license [feature] [<label>|index <index-number>] Syntax Parameter Description feature Only display license information for any applied feature licenses. <label>...
  • Page 154: C613-50105-01 Rev C Command Reference For X210 Series

    EATURE ICENSING OMMANDS SHOW LICENSE Related license Commands show license brief C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 155: Show License Brief

    EATURE ICENSING OMMANDS SHOW LICENSE BRIEF show license brief Overview This command displays information about a specific software feature license, or all enabled software feature licenses on the device. show license [feature] [<label>|index <index-number>] brief Syntax Parameter Description feature Only display license information for any applied feature licenses. <label>...
  • Page 156: Gui Commands

    GUI Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure the GUI. For more information, see the Getting Started with Alliedware Plus Command List • “atmf topology-gui enable” on page 157 • “gui-timeout” on page 158 •...
  • Page 157: Atmf Topology-Gui Enable

    GUI C OMMANDS ATMF TOPOLOGY GUI ENABLE atmf topology-gui enable Overview Use this command to enable the operation of AMF Vista Manager on the Master device. Use the no variant of this command to disable this feature. Syntax atmf topology-gui enable no atmf topology-gui enable Default By default the GUI support will not be enabled on AMF Master devices.
  • Page 158: Gui-Timeout

    GUI C OMMANDS TIMEOUT gui-timeout Overview Use this command to configure an idle timeout period for a GUI session. The time can be set in minutes and/or seconds. Use the no variant of this command to disable the GUI session idle timeout. Syntax gui-timeout <minutes>...
  • Page 159: Log Event-Host

    GUI C OMMANDS LOG EVENT HOST log event-host Overview Use this command to set up an external host to log AMF topology events through Vista Manager. This command is run on the Master device. Use the no variant of this command to disable log events through Vista Manager. Syntax log event-host [<ipv4-addr>|<ipv6-addr>] atmf-topology-event no log event-host [<ipv4-addr>|<ipv6-addr>] atmf-topology-event...
  • Page 160: Service Http

    GUI C OMMANDS SERVICE HTTP service http Overview Use this command to enable the HTTP (Hypertext Transfer Protocol) service. This service, which is enabled by default, is required to support the AlliedWare Plus™ GUI Java applet on a Java enabled browser. Use the no variant of this command to disable the HTTP feature.
  • Page 161: Show Http

    GUI C OMMANDS SHOW HTTP show http Overview This command shows the HTTP server settings. show http Syntax Mode User Exec and Privileged Exec Example To show the HTTP server settings, use the command: awplus# show http Output Figure 5-2: Example output from the show http command awplus#show http...
  • Page 162: System Configuration And Monitoring Commands

    System Configuration and Monitoring Commands Introduction Overview This chapter provides an alphabetical reference of commands for configuring and monitoring the system. Command List • “banner exec” on page 164 • “banner login (system)” on page 166 • “banner motd” on page 168 •...
  • Page 163 YSTEM ONFIGURATION AND ONITORING OMMANDS • “show interface memory” on page 195 • “show memory” on page 197 • “show memory allocations” on page 199 • “show memory history” on page 201 • “show memory pools” on page 202 • “show memory shared”...
  • Page 164: Banner Exec

    YSTEM ONFIGURATION AND ONITORING OMMANDS BANNER EXEC banner exec Overview This command configures the User Exec mode banner that is displayed on the console after you login. The banner exec default command restores the User Exec banner to the default banner. Use the no banner exec command to disable the User Exec banner and remove the default User Exec banner.
  • Page 165 YSTEM ONFIGURATION AND ONITORING OMMANDS BANNER EXEC awplus#configure terminal  awplus(config)#banner exec default  awplus(config)#exit  awplus#exit awplus login: manager  Password:  AlliedWare Plus (TM) 5.4.6-1 09/30/16 13:03:59  awplus> To remove the User Exec mode banner after login, enter the following commands: awplus#configure terminal...
  • Page 166: Banner Login (System)

    YSTEM ONFIGURATION AND ONITORING OMMANDS BANNER LOGIN SYSTEM banner login (system) Overview This command configures the login banner that is displayed on the console when you login. The login banner is displayed on all connected terminals. The login banner is displayed after the MOTD (Message-of-the-Day) banner and before the login username and password prompts.
  • Page 167: Banner Motd

    YSTEM ONFIGURATION AND ONITORING OMMANDS BANNER LOGIN SYSTEM awplus#configure terminal  awplus(config)#no banner login  awplus(config)#exit  awplus#exit  awplus login: manager  Password:  AlliedWare Plus (TM) 5.4.6-1 09/30/16 13:03:59  awplus> Related banner exec Commands banner motd C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 168: Banner Motd

    YSTEM ONFIGURATION AND ONITORING OMMANDS BANNER MOTD banner motd Overview Use this command to create or edit the text MotD (Message-of-the-Day) banner displayed before login. The MotD banner is displayed on all connected terminals. The MotD banner is useful for sending messages that affect all network users, for example, any imminent system shutdowns.
  • Page 169 YSTEM ONFIGURATION AND ONITORING OMMANDS BANNER MOTD awplus>enable  awplus#configure terminal  awplus(config)#no banner motd  awplus(config)#exit  awplus#exit  awplus login: manager  Password:  AlliedWare Plus (TM) 5.4.6-1 09/30/16 13:03:59  awplus> Related banner exec Commands banner login (system) C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 170: Clock Set

    YSTEM ONFIGURATION AND ONITORING OMMANDS CLOCK SET clock set Overview This command sets the time and date for the system clock.  clock set <hh:mm:ss> <day> <month> Syntax <year> Parameter Description <hh:mm:ss> Local time in 24-hour format <day> Day of the current month, from 1 to 31 <month>...
  • Page 171: Clock Summer-Time Date

    YSTEM ONFIGURATION AND ONITORING OMMANDS CLOCK SUMMER TIME DATE clock summer-time date Overview This command defines the start and end of summertime for a specific year only, and specifies summertime’s offset value to Standard Time for that year. The no variant of this command removes the device’s summertime setting. This clears both specific summertime dates and recurring dates (set with the clock summer-time recurring...
  • Page 172 YSTEM ONFIGURATION AND ONITORING OMMANDS CLOCK SUMMER TIME DATE Related clock summer-time recurring Commands clock timezone C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 173: Clock Summer-Time Recurring

    YSTEM ONFIGURATION AND ONITORING OMMANDS CLOCK SUMMER TIME RECURRING clock summer-time recurring Overview This command defines the start and end of summertime for every year, and specifies summertime’s offset value to Standard Time. The no variant of this command removes the device’s summertime setting. This clears both specific summertime dates (set with the clock summer-time date command) and recurring dates.
  • Page 174 YSTEM ONFIGURATION AND ONITORING OMMANDS CLOCK SUMMER TIME RECURRING Mode Global Configuration Examples To set a summertime definition for New Zealand using NZST (UTC+12:00) as the standard time, and NZDT (UTC+13:00) as summertime, with summertime set to start on the last Sunday in September, and end on the 1st Sunday in April, use the command: awplus(config)# clock summer-time NZDT recurring 5 sun sep 2:00...
  • Page 175: Clock Timezone

    YSTEM ONFIGURATION AND ONITORING OMMANDS CLOCK TIMEZONE clock timezone Overview This command defines the device’s clock timezone. The timezone is set as a offset to the UTC. The no variant of this command resets the system time to UTC. By default, the system time is set to UTC. clock timezone <timezone-name>...
  • Page 176: Ecofriendly Led

    YSTEM ONFIGURATION AND ONITORING OMMANDS ECOFRIENDLY LED ecofriendly led Overview Use this command to enable the eco-friendly LED (Light Emitting Diode) feature, which turns off power to the port LEDs. Power to the system status LED is not disabled. Use the no variant of this command to disable the eco-friendly LED feature. Syntax ecofriendly led no ecofriendly led...
  • Page 177: Findme

    YSTEM ONFIGURATION AND ONITORING OMMANDS FINDME findme Overview Use this command to physically locate a specific device from a group of similar devices. Activating the command causes a selected number of port LEDs to alternately flash green then amber (if that device has amber LEDs) at a rate of 1 Hz. Use the no variant of this command to deactivate the Find Me feature prior to the timeout expiring.
  • Page 178 YSTEM ONFIGURATION AND ONITORING OMMANDS FINDME To deactivate the Find Me feature, use the following command: awplus# no findme C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 179: Hostname

    YSTEM ONFIGURATION AND ONITORING OMMANDS HOSTNAME hostname Overview This command sets the name applied to the device as shown at the prompt. The hostname is: • displayed in the output of the show system command • displayed in the CLI prompt so you know which device you are configuring •...
  • Page 180 YSTEM ONFIGURATION AND ONITORING OMMANDS HOSTNAME : When AMF is configured, running the no hostname command will apply a NOTE hostname that is based on the MAC address of the device node, for example, node_0000_5e00_5301. Related show system Commands C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 181: Max-Fib-Routes

    YSTEM ONFIGURATION AND ONITORING OMMANDS ROUTES max-fib-routes Overview This command enables you to control the maximum number of FIB routes configured. It operates by providing parameters that enable you to configure preset maximums and warning message thresholds. The operation of these parameters is explained in the Parameter / Description table shown below.
  • Page 182: Max-Static-Routes

    YSTEM ONFIGURATION AND ONITORING OMMANDS STATIC ROUTES max-static-routes Overview Use this command to set the maximum number of static routes, excluding FIB (Forwarding Information Base) routes. : For FIB routes use the max-fib-routes command. NOTE Use the no variant of this command to set the maximum number of static routes to the default of 1000 static routes.
  • Page 183: No Debug All

    YSTEM ONFIGURATION AND ONITORING OMMANDS NO DEBUG ALL no debug all Overview This command disables the debugging facility for all features on your device. This stops the device from generating any diagnostic debugging messages. The debugging facility is disabled by default. Syntax no debug all [ipv6|dot1x|nsm] Parameter...
  • Page 184: Reboot

    YSTEM ONFIGURATION AND ONITORING OMMANDS REBOOT reboot Overview This command halts the device and performs a cold restart (also known as reload). It displays a confirmation request before restarting. reboot Syntax reload Mode Privileged Exec Usage The reboot and reload commands perform the same action. Examples To restart the device, use the command: awplus#...
  • Page 185: Reload

    YSTEM ONFIGURATION AND ONITORING OMMANDS RELOAD reload Overview This command performs the same function as the reboot command. C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 186: Show Clock

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW CLOCK show clock Overview This command displays the system’s current configured local time and date. It also displays other clock related information such as timezone and summertime configuration. show clock Syntax Mode User Exec and Privileged Exec Example To display the system’s current local time, use the command: awplus#...
  • Page 187 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW CLOCK Related clock set Commands clock summer-time date clock summer-time recurring clock timezone C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 188: Show Cpu

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW CPU show cpu Overview This command displays a list of running processes with their CPU utilization. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 189 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW CPU Output Figure 6-2: Example output from show cpu CPU averages: 1 second: 12%, 20 seconds: 2%, 60 seconds: 2% System load averages: 1 minute: 0.03, 5 minutes: 0.02, 15 minutes: 0.00 Current CPU load: userspace: 6%, kernel: 4%, interrupts: 1% iowaits: 0%...
  • Page 190 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW CPU Table 2: Parameters in the output of the show cpu command (cont.) Parameter Description sleep% Percentage of time that the process is in the sleep state. runtime The time that the process has been running for, measured in jiffies.
  • Page 191: Show Cpu History

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW CPU HISTORY show cpu history Overview This command prints a graph showing the historical CPU utilization. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 192 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW CPU HISTORY Per minute CPU load history  100 90 80 70 + 50 40 30 20 ++ +++++++++ +++++++ ++++ + ++++++ ++++ +++ +++++ +++++++++ 10 ************************************************************ |..|..|..|..|..|..|..|..|..|..|..|.. Oldest Newest CPU load% per minute (last 60 minutes) * = average CPU load%, + = maximum...
  • Page 193: Show Debugging

    User Exec and Privileged Exec Usage This command displays all debugging information, similar to the way the show tech-support command displays all show output for use by Allied Telesis authorized service personnel only. Example To display all debugging information, use the command: awplus#...
  • Page 194: Show Ecofriendly

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW ECOFRIENDLY show ecofriendly Overview This command displays the switch’s eco-friendly configuration status. The ecofriendly led configuration status are shown in the show ecofriendly output. show ecofriendly Syntax Mode Privileged Exec and Global Configuration Example To display the switch’s eco-friendly configuration status, use the following command: awplus#...
  • Page 195: Show Interface Memory

    This command displays the shared memory used by either all interfaces, or the specified interface or interfaces. The output is useful for diagnostic purposes by Allied Telesis authorized service personnel. For information on filtering and saving command output, see the “Getting Started...
  • Page 196 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW INTERFACE MEMORY Output Figure 6-6: Example output from the show interface memory command awplus#show interface memory Vlan blocking state shared memory usage --------------------------------------------- Interface shmid Bytes Used nattch Status port1.0.1 393228 1 port1.0.2 458766 1...
  • Page 197: Show Memory

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW MEMORY show memory Overview This command displays the memory used by each process that is currently running For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 198 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW MEMORY Table 4: Parameters in the output of the show memory command Parameter Description RAM total Total amount of RAM memory free. free Available memory size. buffers Memory allocated kernel buffers. Identifier number for the process. name Short name used to describe the process.
  • Page 199: Show Memory Allocations

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW MEMORY ALLOCATIONS show memory allocations Overview This command displays the memory allocations used by processes. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 200: Show Memory Pools

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW MEMORY ALLOCATIONS Related show memory Commands show memory history show memory pools show memory shared show tech-support C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 201: Show Memory History

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW MEMORY HISTORY show memory history Overview This command prints a graph showing the historical memory usage. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 202: Show Memory Pools

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW MEMORY POOLS show memory pools Overview This command shows the memory pools used by processes. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 203: Show Memory Shared

    Overview This command displays shared memory allocation information. The output is useful for diagnostic purposes by Allied Telesis authorized service personnel. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 204: Show Process

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW PROCESS show process Overview This command lists a summary of the current running processes. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide. Syntax show process [sort {cpu|mem}] Parameter...
  • Page 205 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW PROCESS Table 5: Parameters in the output from the show process command Parameter Description CPU averages Average CPU utilization for the periods stated. System load The average number of processes waiting for CPU time for the averages periods stated.
  • Page 206: Show Reboot History

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW REBOOT HISTORY show reboot history Overview Use this command to display the device’s reboot history. show reboot history Syntax Mode User Exec and Privileged Exec Example To show the reboot history, use the command: awplus# show reboot history Output...
  • Page 207: Show Router-Id

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW ROUTER show router-id Overview Use this command to show the Router ID of the current system. show router-id Syntax Mode User Exec and Privileged Exec Example To display the Router ID of the current system, use the command: awplus# show router-id Output...
  • Page 208: Show System

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW SYSTEM show system Overview This command displays general system information about the device, including the hardware, installed, memory, and software versions loaded. It also displays location and contact details when these have been set. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 209: Show System Environment

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW SYSTEM ENVIRONMENT show system environment Overview This command displays the current environmental status of your device and any attached PSU, XEM, or other expansion option. The environmental status covers information about temperatures, fans, and voltage. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 210: Show System Interrupts

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW SYSTEM INTERRUPTS show system interrupts Overview Use this command to display the number of interrupts for each IRQ (Interrupt Request) used to interrupt input lines on a PIC (Programmable Interrupt Controller) on your device. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 211: Show System Mac

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW SYSTEM MAC show system mac Overview This command displays the physical MAC address of the device. show system mac Syntax Mode User Exec and Privileged Exec Example To display the physical MAC address enter the following command: awplus# show system mac Output...
  • Page 212: Show System Serialnumber

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW SYSTEM SERIALNUMBER show system serialnumber Overview This command shows the serial number information for the device. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 213: Show Tech-Support

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW TECH SUPPORT show tech-support Overview This command generates system and debugging information for the device and saves it to a file. You can optionally limit the command output to display only information for a given protocol or feature.
  • Page 214 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW TECH SUPPORT Parameter Description ripng Display RIPNG specific information stack Display stacking device information Display STP specific information system Display general system information tacacs+ Display TACACS+ information update Display resource update specific information Output modifier >...
  • Page 215: Speed (Asyn)

    YSTEM ONFIGURATION AND ONITORING OMMANDS SPEED ASYN speed (asyn) Overview This command changes the console speed from the device. Note that a change in console speed is applied for subsequent console sessions. Exit the current session to enable the console speed change using the clear line console command.
  • Page 216 YSTEM ONFIGURATION AND ONITORING OMMANDS SPEED ASYN Related clear line console Commands line show running-config show startup-config speed C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 217: System Territory (Deprecated)

    YSTEM ONFIGURATION AND ONITORING OMMANDS SYSTEM TERRITORY DEPRECATED system territory (deprecated) Overview This command has been deprecated in Software Version 5.4.4-0.1 and later. It now has no effect. It is no longer useful to specify a system territory, so there is no alternative command.
  • Page 218: Terminal Monitor

    YSTEM ONFIGURATION AND ONITORING OMMANDS TERMINAL MONITOR terminal monitor Overview Use this command to display debugging output on a terminal. To display the cursor after a line of debugging output, press the Enter key. Use the command terminal no monitor to stop displaying debugging output on the terminal, or use the timeout option to stop displaying debugging output on the terminal after a set time.
  • Page 219: Undebug All

    YSTEM ONFIGURATION AND ONITORING OMMANDS UNDEBUG ALL undebug all Overview This command applies the functionality of the no debug all command. C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 220: Pluggables And Cabling Commands

    Pluggables and Cabling Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure and monitor Pluggables and Cabling, including: • Cable Fault Locator for finding faults in copper cabling • Optical Digital Diagnostic Monitoring (DDM) to help find fiber issues when links go down •...
  • Page 221: Clear Test Cable-Diagnostics Tdr

    LUGGABLES AND ABLING OMMANDS CLEAR TEST CABLE DIAGNOSTICS TDR clear test cable-diagnostics tdr Overview Use this command to clear the results of the last cable test that was run. clear test cable-diagnostics tdr Syntax Mode Privileged Exec Examples To clear the results of a previous cable-diagnostics test use the following commands: awplus# clear test cable-diagnostics tdr...
  • Page 222: Debug Fiber-Monitoring

    LUGGABLES AND ABLING OMMANDS DEBUG FIBER MONITORING debug fiber-monitoring Overview Use this command to enable debugging of active fiber monitoring on the specified ports. Use the no variant of this command to disable debugging on all ports or the specified ports. Syntax debug fiber-monitoring interface <port-list>...
  • Page 223 LUGGABLES AND ABLING OMMANDS DEBUG FIBER MONITORING Output Figure 7-1: Example output from debug fiber-monitoring awplus#debug fiber-monitoring interface port2.0.1 awplus#terminal monitor  % Warning: Console logging enabled awplus#01:42:50 awplus Pluggable[522]: Fiber-monitor port2.0.1: Channel:1 Reading:1748 Baseline:1708 Threshold:1356 01:42:52 awplus Pluggable[522]: Fiber-monitor port2.0.1: Channel:1 Reading:1717 Baseline:1709 Threshold:1357...
  • Page 224: Fiber-Monitoring Action

    LUGGABLES AND ABLING OMMANDS FIBER MONITORING ACTION fiber-monitoring action Overview Use this command to specify an action to be taken if the optical power received on the port changes from the baseline by the amount specified in the fiber-monitoring sensitivity command. Use the no variant of this command to remove the specified action or all actions from the port.
  • Page 225: Fiber-Monitoring Baseline

    LUGGABLES AND ABLING OMMANDS FIBER MONITORING BASELINE fiber-monitoring baseline Overview Use this command to configure how the baseline value for comparison is calculated for active fiber monitoring on the port. Note that alarm generation will not commence until the link has been up for a full averaging period.
  • Page 226 LUGGABLES AND ABLING OMMANDS FIBER MONITORING BASELINE Related fiber-monitoring interval Commands fiber-monitoring sensitivity C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 227: Fiber-Monitoring Enable

    LUGGABLES AND ABLING OMMANDS FIBER MONITORING ENABLE fiber-monitoring enable Overview Use this command to enable active fiber monitoring on a fiber port. If the port can support fiber monitoring but does not have the correct SFP or fiber type installed, the configuration will be saved, and monitoring will commence when a supported SFP is inserted.
  • Page 228: Fiber-Monitoring Interval

    LUGGABLES AND ABLING OMMANDS FIBER MONITORING INTERVAL fiber-monitoring interval Overview Use this command to configure the fiber monitoring polling interval in seconds for the port. The optical power will be read every <interval> seconds and compared against the calculated threshold values to see if a log message or other action is required.
  • Page 229: Fiber-Monitoring Sensitivity

    LUGGABLES AND ABLING OMMANDS FIBER MONITORING SENSITIVITY fiber-monitoring sensitivity Overview Use this command to configure the sensitivity of the alarm thresholds on the port for active fiber monitoring. Use the no variant of this command to reset the sensitivity to the default. Syntax fiber-monitoring sensitivity (low|medium|high|highest|fixed <25-65535>)|relative <0.01-10.0>...
  • Page 230 LUGGABLES AND ABLING OMMANDS FIBER MONITORING SENSITIVITY Related fiber-monitoring action Commands fiber-monitoring baseline show system fiber-monitoring C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 231: Show System Fiber-Monitoring

    LUGGABLES AND ABLING OMMANDS SHOW SYSTEM FIBER MONITORING show system fiber-monitoring Overview Use this command to display settings and current status for Active Fiber Monitoring. show system fiber-monitoring Syntax Mode User Exec/Privileged Exec Example To display configuration and status for active fiber monitoring on ports, use the command: awplus# show system fiber-monitoring...
  • Page 232 LUGGABLES AND ABLING OMMANDS SHOW SYSTEM FIBER MONITORING Table 7-1: Parameters in the output from show system fiber-monitoring Parameter Description Reading units The units for optical power readings in the rest of the display, e.g. 0.0001mW. Status Whether active fiber monitoring is enabled or disabled for this port.
  • Page 233 LUGGABLES AND ABLING OMMANDS SHOW SYSTEM FIBER MONITORING fiber-monitoring interval fiber-monitoring sensitivity C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 234: Show System Pluggable

    Different types of pluggable transceivers are supported in different models of device. See your Allied Telesis dealer for more information about the models of pluggables that your device supports.
  • Page 235 LUGGABLES AND ABLING OMMANDS SHOW SYSTEM PLUGGABLE Table 8: Parameters in the output from the show system pluggable command Parameter Description Device Name Specifies the device name for the installed pluggable transceiver. Device Type Specifies the device type for the installed pluggable transceiver.
  • Page 236: Show System Pluggable Detail

    Different types of pluggable transceivers are supported in different models of device. See your Allied Telesis dealer for more information about the models of pluggables that your device supports.
  • Page 237 LUGGABLES AND ABLING OMMANDS SHOW SYSTEM PLUGGABLE DETAIL • Power Monitoring: Displays the received power measurement type, which can be either OMA(Optical Module Amplitude) or Avg(Average Power) measured in μW. : For parameters that are not supported or not specified, a hyphen is displayed NOTE instead.
  • Page 238 LUGGABLES AND ABLING OMMANDS SHOW SYSTEM PLUGGABLE DETAIL Table 9: Parameters in the output from the show system pluggable detail command: (cont.) Parameter Description Device Revision Specifies the hardware revision code for the pluggable transceiver. This may be useful for troubleshooting because different devices may support different pluggable transceiver revisions.
  • Page 239: Show System Pluggable Diagnostics

    LUGGABLES AND ABLING OMMANDS SHOW SYSTEM PLUGGABLE DIAGNOSTICS show system pluggable diagnostics Overview This command displays diagnostic information about SFP pluggable transceivers that support Digital Diagnostic Monitoring (DDM). Different types of pluggable transceivers are supported in different models of device. See your device’s Datasheet for more information about the models of pluggables that your device supports.
  • Page 240 LUGGABLES AND ABLING OMMANDS SHOW SYSTEM PLUGGABLE DIAGNOSTICS Output Figure 7-5: Example output from the show system pluggable diagnostics command on a device awplus#show system pluggable diagnostics System Pluggable Information Diagnostics  Port1.0.25 Status Alarms Warnings Reading Alarm Warning Min Temp: (Degrees C) 29.387 100.00...
  • Page 241: Show Test Cable-Diagnostics Tdr

    LUGGABLES AND ABLING OMMANDS SHOW TEST CABLE DIAGNOSTICS TDR show test cable-diagnostics tdr Overview Use this command to display the results of the last cable-diagnostics test that was run using the TDR (Time Domain Reflectometer) on a fixed copper cable port. The displayed status of the cable can be either: •...
  • Page 242: Test Cable-Diagnostics Tdr Interface

    LUGGABLES AND ABLING OMMANDS TEST CABLE DIAGNOSTICS TDR INTERFACE test cable-diagnostics tdr interface Overview Use this command to apply the Cable Fault Locator’s cable-diagnostics tests to twisted pair data cables for a selected port. The tests will detect either correct, short circuit, or open, circuit terminations.
  • Page 243: Logging Commands

    Logging Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure logging. Command List • “clear exception log” on page 245 • “clear log” on page 246 • “clear log buffered” on page 247 • “clear log permanent”...
  • Page 244 OGGING OMMANDS • “log email time” on page 277 • “log facility” on page 279 • “log host” on page 281 • “log host (filter)” on page 283 • “log host exclude” on page 286 • “log host source” on page 289 •...
  • Page 245: Clear Exception Log

    OGGING OMMANDS CLEAR EXCEPTION LOG clear exception log Overview This command resets the contents of the exception log, but does not remove the associated core files. clear exception log Syntax Mode Privileged Exec awplus# clear exception log Example C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 246: Clear Log

    OGGING OMMANDS CLEAR LOG clear log Overview This command removes the contents of the buffered and permanent logs. clear log Syntax Mode Privileged Exec Example To delete the contents of the buffered and permanent log use the command: awplus# clear log Related clear log buffered Commands...
  • Page 247: Clear Log Buffered

    OGGING OMMANDS CLEAR LOG BUFFERED clear log buffered Overview This command removes the contents of the buffered log. clear log buffered Syntax Mode Privileged Exec Example To delete the contents of the buffered log use the following commands: awplus# clear log buffered Related default log buffered Commands...
  • Page 248: Clear Log Permanent

    OGGING OMMANDS CLEAR LOG PERMANENT clear log permanent Overview This command removes the contents of the permanent log. clear log permanent Syntax Mode Privileged Exec Example To delete the contents of the permanent log use the following commands: awplus# clear log permanent Related default log permanent Commands...
  • Page 249: Default Log Buffered

    OGGING OMMANDS DEFAULT LOG BUFFERED default log buffered Overview This command restores the default settings for the buffered log stored in RAM. By default the size of the buffered log is 50 kB and it accepts messages with the severity level of “warnings” and above. default log buffered Syntax Default...
  • Page 250: Default Log Console

    OGGING OMMANDS DEFAULT LOG CONSOLE default log console Overview This command restores the default settings for log messages sent to the terminal when a log console command is issued. By default all messages are sent to the console when a log console command is issued. default log console Syntax Mode...
  • Page 251: Default Log Email

    OGGING OMMANDS DEFAULT LOG EMAIL default log email Overview This command restores the default settings for log messages sent to an email address. By default no filters are defined for email addresses. Filters must be defined before messages will be sent. This command also restores the remote syslog server time offset value to local (no offset).
  • Page 252: Default Log Host

    OGGING OMMANDS DEFAULT LOG HOST default log host Overview This command restores the default settings for log sent to a remote syslog server. By default no filters are defined for remote syslog servers. Filters must be defined before messages will be sent. This command also restores the remote syslog server time offset value to local (no offset).
  • Page 253: Default Log Monitor

    OGGING OMMANDS DEFAULT LOG MONITOR default log monitor Overview This command restores the default settings for log messages sent to the terminal when a terminal monitor command is used. default log monitor Syntax Default All messages are sent to the terminal when a terminal monitor command is used.
  • Page 254: Default Log Permanent

    OGGING OMMANDS DEFAULT LOG PERMANENT default log permanent Overview This command restores the default settings for the permanent log stored in NVS. By default, the size of the permanent log is 50 kB and it accepts messages with the severity level of warnings and above. default log permanent Syntax Default...
  • Page 255: Log Buffered

    OGGING OMMANDS LOG BUFFERED log buffered Overview This command configures the device to store log messages in RAM. Messages stored in RAM are not retained on the device over a restart. Once the buffered log reaches its configured maximum allowable size old messages will be deleted to make way for new ones.
  • Page 256: Log Buffered (Filter)

    OGGING OMMANDS LOG BUFFERED FILTER log buffered (filter) Overview Use this command to create a filter to select messages to be sent to the buffered log. Selection can be based on the priority/ severity of the message, the program that generated the message, the logging facility used, a sub-string within the message or a combination of some or all of these.
  • Page 257 OGGING OMMANDS LOG BUFFERED FILTER Parameter Description imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection dhcpsn DHCP snooping (DHCPSN) facility Filter messages to the buffered log by syslog facility. <facility> Specify one of the following syslog facilities to include messages from in the buffered log: kern Kernel messages...
  • Page 258 OGGING OMMANDS LOG BUFFERED FILTER To remove a filter that sends all messages generated by EPSR that have a severity of notices or higher to the buffered log, use the following commands: awplus# configure terminal awplus(config)# no log buffered level notices program epsr To remove a filter that sends all messages containing the text “Bridging initialization”...
  • Page 259: Log Buffered Exclude

    OGGING OMMANDS LOG BUFFERED EXCLUDE log buffered exclude Overview Use this command to exclude specified log messages from the buffered log. You can exclude messages on the basis of: • the priority/severity of the message • the program that generated the message •...
  • Page 260 OGGING OMMANDS LOG BUFFERED EXCLUDE Parameter Description Integrated Management Interface (IMI) imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection dhcpsn DHCP snooping (DHCPSN) facility Exclude messages from a syslog facility. <facility>...
  • Page 261: Log Buffered Size

    OGGING OMMANDS LOG BUFFERED EXCLUDE log buffered log buffered (filter) log buffered size show log show log config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 262: Log Buffered Size

    OGGING OMMANDS LOG BUFFERED SIZE log buffered size Overview This command configures the amount of memory that the buffered log is permitted to use. Once this memory allocation has been filled old messages will be deleted to make room for new messages. log buffered size <50-250>...
  • Page 263: Log Console

    OGGING OMMANDS LOG CONSOLE log console Overview This command configures the device to send log messages to consoles. The console log is configured by default to send messages to the device’s main console port. Use the no variant of this command to configure the device not to send log messages to consoles.
  • Page 264: Log Console (Filter)

    OGGING OMMANDS LOG CONSOLE FILTER log console (filter) Overview This command creates a filter to select messages to be sent to all consoles when the log console command is given. Selection can be based on the priority/severity of the message, the program that generated the message, the logging facility used, a sub-string within the message or a combination of some or all of these.
  • Page 265 OGGING OMMANDS LOG CONSOLE FILTER Parameter Description loopprot Loop Protection dhcpsn DHCP snooping (DHCPSN) facility Filter messages by syslog facility. <facility> Specify one of the following syslog facilities to include messages from: kern Kernel messages user Random user-level messages mail Mail system daemon System daemons...
  • Page 266 OGGING OMMANDS LOG CONSOLE FILTER To remove a default filter that includes sending critical, alert and emergency level messages to the console, use the following commands: awplus# configure terminal awplus(config)# no log console level critical Related default log console Commands log console log console exclude show log config...
  • Page 267: Log Console Exclude

    OGGING OMMANDS LOG CONSOLE EXCLUDE log console exclude Overview Use this command to prevent specified log messages from being sent to the console, when console logging is turned on. You can exclude messages on the basis of: • the priority/severity of the message •...
  • Page 268 OGGING OMMANDS LOG CONSOLE EXCLUDE Parameter Description mstp Multiple Spanning Tree Protocol (MSTP) Integrated Management Interface (IMI) imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection dhcpsn DHCP snooping (DHCPSN) facility Exclude messages from a syslog facility.
  • Page 269 OGGING OMMANDS LOG CONSOLE EXCLUDE log console (filter) show log config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 270: Log Email

    OGGING OMMANDS LOG EMAIL log email Overview This command configures the device to send log messages to an email address. The email address is specified in this command. log email <email-address> Syntax Parameter Description <email-address> The email address to send log messages to Default By default no filters are defined for email log targets.
  • Page 271: Log Email (Filter)

    OGGING OMMANDS LOG EMAIL FILTER log email (filter) Overview This command creates a filter to select messages to be sent to an email address. Selection can be based on the priority/ severity of the message, the program that generated the message, the logging facility used, a sub-string within the message or a combination of some or all of these.
  • Page 272 OGGING OMMANDS LOG EMAIL FILTER Parameter Description Integrated Management Interface (IMI) imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection dhcpsn DHCP snooping (DHCPSN) facility Filter messages by syslog facility. <facility> Specify one of the following syslog facilities to include messages from: kern Kernel messages...
  • Page 273 OGGING OMMANDS LOG EMAIL FILTER To create a filter to send messages with a severity level of informational and above to the email address admin@alliedtelesis.com, use the following commands: awplus# configure terminal awplus(config)# log email admin@alliedtelesis.com level informational To stop the device emailing log messages emailed to the email address admin@alliedtelesis.com, use the following commands: awplus# configure terminal...
  • Page 274: Log Email Exclude

    OGGING OMMANDS LOG EMAIL EXCLUDE log email exclude Overview Use this command to prevent specified log messages from being emailed, when the device is configured to send log messages to an email address. You can exclude messages on the basis of: •...
  • Page 275 OGGING OMMANDS LOG EMAIL EXCLUDE Parameter Description mstp Multiple Spanning Tree Protocol (MSTP) Integrated Management Interface (IMI) imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection dhcpsn DHCP snooping (DHCPSN) facility Exclude messages from a syslog facility.
  • Page 276: Log Email Time

    OGGING OMMANDS LOG EMAIL EXCLUDE log email (filter) log email time show log config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 277: Log Email Time

    OGGING OMMANDS LOG EMAIL TIME log email time Overview This command configures the time used in messages sent to an email address. If the syslog server is in a different time zone to your device then the time offset can be configured using either the utc-offset parameter option keyword or the local-offset parameter option keyword, where utc-offset is the time difference from UTC (Universal Time, Coordinated) and local-offset is the difference from...
  • Page 278 OGGING OMMANDS LOG EMAIL TIME To send messages to the email address test@home.com in the same time zone Examples as the device’s local time zone, use the following commands: awplus# configure terminal awplus(config)# log email admin@base.com time local 0 To send messages to the email address admin@base.com with the time information converted to the time zone of the email recipient, which is 3 hours ahead of the device’s local time zone, use the following commands: awplus#...
  • Page 279: Log Facility

    OGGING OMMANDS LOG FACILITY log facility Overview Use this command to specify an outgoing syslog facility. This determines where the syslog server will store the log messages. Use the no variant of this command to remove the facility. Syntax log facility {kern|user|mail|daemon|auth|syslog|lpr|news|uucp|cron|authpriv |ftp|local0|local1|local2|local3|local4|local5|local6|local7} no log facility...
  • Page 280 OGGING OMMANDS LOG FACILITY Example To specify a facility of local0, use the following commands: awplus# configure terminal awplus(config)# log facility local0 Related show log config Commands C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 281: Log Host

    OGGING OMMANDS LOG HOST log host Overview This command configures the device to send log messages to a remote syslog server via UDP port 514. The IP address of the remote server must be specified. By default no filters are defined for remote syslog servers. Filters must be defined before messages will be sent.
  • Page 282 OGGING OMMANDS LOG HOST log host time log trustpoint show log config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 283: Log Host (Filter)

    OGGING OMMANDS LOG HOST FILTER log host (filter) Overview This command creates a filter to select messages to be sent to a remote syslog server. Selection can be based on the priority/severity of the message, the program that generated the message, the logging facility used, a substring within the message or a combination of some or all of these.
  • Page 284 OGGING OMMANDS LOG HOST FILTER Parameter Description imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection dhcpsn DHCP snooping (DHCPSN) facility Filter messages by syslog facility. <facility> Specify one of the following syslog facilities to include messages from: kern Kernel messages user...
  • Page 285 OGGING OMMANDS LOG HOST FILTER To create a filter to send messages with a severity level of informational and above to the syslog server with IP address 10.32.16.21, use the following commands: awplus# configure terminal awplus(config)# log host 10.32.16.21 level informational To remove a filter that sends all messages generated by EPSR that have a severity of notices or higher to a remote syslog server with IP address 10.32.16.21, use the following commands:...
  • Page 286: Log Host Exclude

    OGGING OMMANDS LOG HOST EXCLUDE log host exclude Overview Use this command to prevent specified log messages from being sent to the remote syslog server, when log host is enabled. You can exclude messages on the basis of: • the priority/severity of the message •...
  • Page 287 OGGING OMMANDS LOG HOST EXCLUDE Parameter Description mstp Multiple Spanning Tree Protocol (MSTP) Integrated Management Interface (IMI) imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection dhcpsn DHCP snooping (DHCPSN) facility Exclude messages from a syslog facility.
  • Page 288 OGGING OMMANDS LOG HOST EXCLUDE log host (filter) log host source log host time show log config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 289: Log Host Source

    OGGING OMMANDS LOG HOST SOURCE log host source Overview Use this command to specify a source interface or IP address for the device to send syslog messages from. You can specify any one of an interface name, an IPv4 address or an IPv6 address. This is useful if the device can reach the syslog server via multiple interfaces or addresses and you want to control which interface/address the device uses.
  • Page 290: Log Host Time

    OGGING OMMANDS LOG HOST TIME log host time Overview This command configures the time used in messages sent to a remote syslog server. If the syslog server is in a different time zone to your device then the time offset can be configured using either the utc-offset parameter option keyword or the local-offset parameter option keyword, where utc-offset is the time difference from UTC (Universal Time, Coordinated) and local-offset is the difference from local time.
  • Page 291 OGGING OMMANDS LOG HOST TIME To send messages to the remote syslog server with the IP address 10.32.16.12 with the time information converted to the time zone of the remote syslog server, which is 3 hours ahead of the device’s local time zone, use the following commands: awplus# configure terminal...
  • Page 292: Log Monitor (Filter)

    OGGING OMMANDS LOG MONITOR FILTER log monitor (filter) Overview This command creates a filter to select messages to be sent to the terminal when terminal monitor command is given. Selection can be based on the priority/severity of the message, the program that generated the message, the logging facility used, a sub-string within the message or a combination of some or all of these.
  • Page 293 OGGING OMMANDS LOG MONITOR FILTER Parameter Description rmon Remote Monitoring loopprot Loop Protection dhcpsn DHCP snooping (DHCPSN) facility Filter messages by syslog facility. <facility> Specify one of the following syslog facilities to include messages from: kern Kernel messages user Random user-level messages mail Mail system daemon...
  • Page 294 OGGING OMMANDS LOG MONITOR FILTER To remove a default filter that includes sending everything to the terminal, use the following commands: awplus# configure terminal awplus(config)# no log monitor level debugging Related default log monitor Commands log monitor exclude show log config terminal monitor C613-50105-01 REV C Command Reference for x210 Series...
  • Page 295: Log Monitor Exclude

    OGGING OMMANDS LOG MONITOR EXCLUDE log monitor exclude Overview Use this command to prevent specified log messages from being displayed on a terminal, when terminal monitor is enabled. You can exclude messages on the basis of: • the priority/severity of the message •...
  • Page 296 OGGING OMMANDS LOG MONITOR EXCLUDE Parameter Description mstp Multiple Spanning Tree Protocol (MSTP) Integrated Management Interface (IMI) imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection dhcpsn DHCP snooping (DHCPSN) facility Exclude messages from a syslog facility.
  • Page 297 OGGING OMMANDS LOG MONITOR EXCLUDE show log config terminal monitor C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 298: Log Permanent

    OGGING OMMANDS LOG PERMANENT log permanent Overview This command configures the device to send permanent log messages to non-volatile storage (NVS) on the device. The content of the permanent log is retained over a reboot. Once the permanent log reaches its configured maximum allowable size old messages will be deleted to make way for new messages.
  • Page 299: Log Permanent (Filter)

    OGGING OMMANDS LOG PERMANENT FILTER log permanent (filter) Overview This command creates a filter to select messages to be sent to the permanent log. Selection can be based on the priority/ severity of the message, the program that generated the message, the logging facility used, a sub-string within the message or a combination of some or all of these.
  • Page 300 OGGING OMMANDS LOG PERMANENT FILTER Parameter Description epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection dhcpsn DHCP snooping (DHCPSN) facility Filter messages by syslog facility. <facility> Specify one of the following syslog facilities to include messages from: kern Kernel messages user...
  • Page 301 OGGING OMMANDS LOG PERMANENT FILTER Related clear log permanent Commands default log permanent log permanent log permanent exclude log permanent size show log config show log permanent C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 302: Log Permanent Exclude

    OGGING OMMANDS LOG PERMANENT EXCLUDE log permanent exclude Overview Use this command to prevent specified log messages from being sent to the permanent log. You can exclude messages on the basis of: • the priority/severity of the message • the program that generated the message •...
  • Page 303 OGGING OMMANDS LOG PERMANENT EXCLUDE Parameter Description Integrated Management Interface (IMI) imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection dhcpsn DHCP snooping (DHCPSN) facility Exclude messages from a syslog facility. <facility>...
  • Page 304: C613-50105-01 Rev C Command Reference For X210 Series

    OGGING OMMANDS LOG PERMANENT EXCLUDE log permanent (filter) log permanent size show log config show log permanent C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 305: Log Permanent Size

    OGGING OMMANDS LOG PERMANENT SIZE log permanent size Overview This command configures the amount of memory that the permanent log is permitted to use. Once this memory allocation has been filled old messages will be deleted to make room for new messages. log permanent size <50-250>...
  • Page 306: Log-Rate-Limit Nsm

    OGGING OMMANDS RATE LIMIT NSM log-rate-limit nsm Overview This command limits the number of log messages generated by the device for a given interval. Use the no variant of this command to revert to the default number of log messages generated by the device of up to 200 log messages per second. Syntax log-rate-limit nsm messages <message-limit>...
  • Page 307 OGGING OMMANDS RATE LIMIT NSM To return the device the default setting, to generate up to 200 log messages per second, use the following commands: awplus# configure terminal awplus(config)# no log-rate-limit nsm C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 308: Log Trustpoint

    OGGING OMMANDS LOG TRUSTPOINT log trustpoint Overview This command adds one or more trustpoints to be used with the syslog application. Multiple trustpoints may be specified, or the command may be executed multiple times, to add multiple trustpoints to the application. The no version of this command removes one or more trustpoints from the list of trustpoints associated with the application.
  • Page 309: Show Counter Log

    OGGING OMMANDS SHOW COUNTER LOG show counter log Overview This command displays log counter information. show counter log Syntax Mode User Exec and Privileged Exec Example To display the log counter information, use the command: awplus# show counter log Output Figure 8-1: Example output from the show counter log command Log counters...
  • Page 310: Show Exception Log

    OGGING OMMANDS SHOW EXCEPTION LOG show exception log Overview This command displays the contents of the exception log. show exception log Syntax Mode User Exec and Privileged Exec Example To display the exception log, use the command: awplus# show exception log Output Figure 8-2: Example output from the show exception log command on a...
  • Page 311: Show Log

    OGGING OMMANDS SHOW LOG show log Overview This command displays the contents of the buffered log. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide. Syntax show log [tail [<10-250>]] Parameter Description tail...
  • Page 312 OGGING OMMANDS SHOW LOG Output Figure 8-3: Example output from the show log command awplus#show log  <date> <time> <facility>.<severity> <program[<pid>]>: <message>  -------------------------------------------------------------------- 2011 Aug 29 07:55:22 kern.notice awplus kernel: Linux version 2.6.32.12-at1 (mak er@awpmaker03-dl) (gcc version 4.3.3 (Gentoo 4.3.3-r3 p1.2, pie-10.1.5) ) #1 Wed Dec 8 11:53:40 NZDT 2010...
  • Page 313: Show Log Config

    OGGING OMMANDS SHOW LOG CONFIG show log config Overview This command displays information about the logging system. This includes the configuration of the various log destinations, buffered, permanent, syslog servers (hosts) and email addresses. This also displays the latest status information for each of these destinations.
  • Page 314 OGGING OMMANDS SHOW LOG CONFIG Host 10.32.16.21: Time offset ..+2:00 Offset type ..UTC Source ..- Secured ..enabled Filters: 1 Level ..critical Program ..any Facility ..any Message text . any Statistics ..1327 messages received, 1 accepted by filter (2016 Oct 11  10:36:16) Email admin@alliedtelesis.com:...
  • Page 315: Show Log Permanent

    OGGING OMMANDS SHOW LOG PERMANENT show log permanent Overview This command displays the contents of the permanent log. show log permanent [tail [<10-250>]] Syntax Parameter Description tail Display only the latest log entries. <10-250> Specify the number of log entries to display. Default If the optional tail parameter is specified only the latest 10 messages in the permanent log are displayed.
  • Page 316: Show Running-Config Log

    OGGING OMMANDS SHOW RUNNING CONFIG LOG show running-config log Overview This command displays the current running configuration of the Log utility. show running-config log Syntax Mode Privileged Exec and Global Configuration Example To display the current configuration of the log utility, use the command: awplus# show running-config log Related...
  • Page 317: Scripting Commands

    Scripting Commands Introduction Overview This chapter provides commands used for command scripts. Command List • “activate” on page 318 • “echo” on page 319 • “wait” on page 320 C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 318: Activate

    CRIPTING OMMANDS ACTIVATE activate Overview This command activates a script file. activate [background] <script> Syntax Parameter Description background Activate a script to run in the background. A process that is running in the background will operate as a separate task, and will not interrupt foreground processing.
  • Page 319: Echo

    CRIPTING OMMANDS ECHO echo Overview This command echoes a string to the terminal, followed by a blank line. echo <line> Syntax Parameter Description <line> The string to echo Mode User Exec and Privileged Exec Usage This command may be useful in CLI scripts, to make the script print user-visible comments.
  • Page 320: Wait

    CRIPTING OMMANDS WAIT wait Overview This command pauses execution of the active script for the specified period of time. wait <delay> Syntax Parameter Description <delay> <1-65335> Specify the time delay in seconds Default No wait delay is specified by default to pause script execution. Mode Privileged Exec (when executed from a script not directly from the command line) Usage...
  • Page 321: Interface Commands

    Interface Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure and display interfaces. Command List • “description (interface)” on page 322 • “interface (to configure)” on page 323 • “mru” on page 325 • “mtu” on page 327 •...
  • Page 322: Description (Interface)

    NTERFACE OMMANDS DESCRIPTION INTERFACE description (interface) Overview Use this command to add a description to a specific port or interface. description <description> Syntax Parameter Description <description> Text describing the specific interface. Mode Interface Configuration Example The following example uses this command to describe the device that a switch port is connected to.
  • Page 323: Interface (To Configure)

    NTERFACE OMMANDS INTERFACE TO CONFIGURE interface (to configure) Overview Use this command to select one or more interfaces to configure. interface <interface-list> Syntax interface lo Parameter Description <interface-list> The interfaces or ports to configure. An interface-list can be: • an interface such as a VLAN (e.g. vlan2), a switch port (e.g. port1.0.6), a static channel group (e.g.
  • Page 324 NTERFACE OMMANDS INTERFACE TO CONFIGURE The following example shows how to enter Interface mode to configure the local loopback interface. awplus# configure terminal awplus(config)# interface lo awplus(config-if)# Related ip address (IP Addressing and Protocol) Commands show interface show interface brief C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 325: Mru

    NTERFACE OMMANDS Overview Use this command to set the Maximum Receive Unit (MRU) size for switch ports, where MRU is the maximum frame size (excluding headers) that switch ports can receive. For more information, see the Switching Feature Overview and Configuration Guide.
  • Page 326 NTERFACE OMMANDS To restore the MRU size of 1500 bytes on port1.0.2, use the commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# no mru Related show interface Commands C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 327: Mtu

    NTERFACE OMMANDS Overview Use this command to set the Maximum Transmission Unit (MTU) size for VLANs, where MTU is the maximum packet size that VLANs can transmit. The MTU size setting is applied to both IPv4 and IPv6 packet transmission. Use the no variant of this command to remove a previously specified Maximum Transmission Unit (MTU) size for VLANs, and restore the default MTU size (1500 bytes) for VLANs.
  • Page 328 NTERFACE OMMANDS Related show interface Commands C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 329: Show Interface

    NTERFACE OMMANDS SHOW INTERFACE show interface Overview Use this command to display interface configuration and status. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide. Syntax show interface [<interface-list>] show interface lo Parameter Description...
  • Page 330 NTERFACE OMMANDS SHOW INTERFACE Figure 10-1: Example output from the show interface command awplus#show interface Interface port1.0.1 Scope: both Link is DOWN, administrative state is UP Thrash-limiting Status Not Detected, Action learn-disable, Timeout 1(s) Hardware is Ethernet, address is 001a.eb54.f3ae index 5001 metric 1 mru 1500...
  • Page 331 NTERFACE OMMANDS SHOW INTERFACE Figure 10-3: Example output from the show interface vlan1,vlan2 command  awplus#show interface vlan1,vlan2 Interface vlan1 Scope: both Link is UP, administrative state is UP Hardware is VLAN, address is 0015.77e9.5c50 IPv4 address 192.168.1.1/24 broadcast 192.168.1.255 index 201 metric 1 mtu 1500...
  • Page 332: Show Interface Brief

    NTERFACE OMMANDS SHOW INTERFACE BRIEF show interface brief Overview Use this command to display brief interface, configuration, and status information, including provisioning information. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 333: Show Interface Memory

    This command displays the shared memory used by either all interfaces, or the specified interface or interfaces. The output is useful for diagnostic purposes by Allied Telesis authorized service personnel. For information on filtering and saving command output, see the “Getting Started...
  • Page 334 NTERFACE OMMANDS SHOW INTERFACE MEMORY Output Figure 10-5: Example output from the show interface memory command awplus#show interface memory Vlan blocking state shared memory usage --------------------------------------------- Interface shmid Bytes Used nattch Status port1.0.1 393228 1 port1.0.2 458766 1 port1.0.3 360459 1...
  • Page 335: Show Interface Status

    NTERFACE OMMANDS SHOW INTERFACE STATUS show interface status Overview Use this command to display the status of the specified interface or interfaces. Note that when no interface or interfaces are specified then the status of all interfaces on the device are shown. show interface [<port-list>] status Syntax Parameter...
  • Page 336 NTERFACE OMMANDS SHOW INTERFACE STATUS Table 4: Parameters in the output from the show interface status command Parameter Description Port Name/Type of the interface. Name Description of the interface. Status The administrative and operational status of the interface; one of: •...
  • Page 337: Shutdown

    NTERFACE OMMANDS SHUTDOWN shutdown Overview This command shuts down the selected interface. This administratively disables the link and takes the link down at the physical (electrical) layer. Use the no variant of this command to disable this function and therefore to bring the link back up again.
  • Page 338: Port Mirroring Commands

    Port Mirroring Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure Port Mirroring. For more information, see the Mirroring Feature Overview and Configuration Guide. Command List • “mirror interface” on page 339 • “show mirror” on page 341 •...
  • Page 339: Mirror Interface

    IRRORING OMMANDS MIRROR INTERFACE mirror interface Overview Use this command to define a mirror port and mirrored (monitored) ports and direction of traffic to be mirrored. The port for which you enter interface mode will be the mirror port. The destination port is removed from all VLANs, and no longer participates in other switching.
  • Page 340 IRRORING OMMANDS MIRROR INTERFACE Usage Use this command to send traffic to another device connected to the mirror port for monitoring. For more information, see the Mirroring Feature Overview and Configuration Guide. A mirror port cannot be associated with a VLAN. If a switch port is configured to be a mirror port, it is automatically removed from any VLAN it was associated with.
  • Page 341: Show Mirror

    IRRORING OMMANDS SHOW MIRROR show mirror Overview Use this command to display the status of all mirrored ports. show mirror Syntax Mode User Exec and Privileged Exec Example To display the status of all mirrored ports, use the following command: awplus# show mirror Output...
  • Page 342: Show Mirror Interface

    IRRORING OMMANDS SHOW MIRROR INTERFACE show mirror interface Overview Use this command to display port mirroring configuration for a mirrored (monitored) switch port. show mirror interface <port> Syntax Parameter Description <port> The monitored switch port to display information about. Mode User Exec, Privileged Exec and Interface Configuration To display port mirroring configuration for the port1.0.4, use the following Example...
  • Page 343: Interface Testing Commands

    Interface Testing Commands Introduction Overview This chapter provides an alphabetical reference of commands used for testing interfaces. Command List • “clear test interface” on page 344 • “service test” on page 345 • “test interface” on page 346 C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 344: Clear Test Interface

    NTERFACE ESTING OMMANDS CLEAR TEST INTERFACE clear test interface Overview This command clears test results and counters after issuing a test interface command. Test results and counters must be cleared to issue subsequent test interface commands later on. clear test interface {<port-list>|all} Syntax Parameter Description...
  • Page 345: Service Test

    NTERFACE ESTING OMMANDS SERVICE TEST service test Overview This command puts the device into the interface testing state, ready to begin testing. After entering this command, enter Interface Configuration mode for the desired interfaces and enter the command test interface. Do not test interfaces on a device that is part of a live network—disconnect the device first.
  • Page 346: Test Interface

    NTERFACE ESTING OMMANDS TEST INTERFACE test interface Overview This command starts a test on a port or all ports or a selected range or list of ports. Use the no variant of this command to disable this function. The test duration can be configured by specifying the time in minutes after specifying a port or ports to test.
  • Page 347 NTERFACE ESTING OMMANDS TEST INTERFACE Example To test the switch ports in VLAN 1, install loopbacks in the ports, and enter the following commands: awplus(config)# service test awplus(config)# no spanning-tree rstp enable bridge-forward awplus(config)# interface vlan1 awplus(config-if)# shutdown awplus(config-if)# awplus# test interface all To see the output, use the commands: awplus#...
  • Page 348: Part 2: Layer Two Switching

    Part 2: Layer Two Switching C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 349: Switching Commands

    Switching Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure switching. For more information, see the Switching Feature Overview and Configuration Guide. Command List • “backpressure” on page 351 • “clear loop-protection counters” on page 353 •...
  • Page 350 WITCHING OMMANDS • “mac address-table thrash-limit” on page 376 • “platform load-balancing” on page 377 • “platform stop-unreg-mc-flooding” on page 378 • “polarity” on page 380 • “show debugging loopprot” on page 381 • “show debugging platform packet” on page 382 •...
  • Page 351: Backpressure

    WITCHING OMMANDS BACKPRESSURE backpressure Overview This command provides a method of applying flow control to ports running in half duplex mode. The setting will only apply when the link is in the half-duplex state. You can disable backpressure on an interface using the off parameter or the no variant of this command.
  • Page 352 WITCHING OMMANDS BACKPRESSURE To disable back pressure flow control on interface port1.0.2 enter the following commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# backpressure off Validation show running-config Commands show interface Related duplex Commands C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 353: Clear Loop-Protection Counters

    WITCHING OMMANDS CLEAR LOOP PROTECTION COUNTERS clear loop-protection counters Overview Use this command to clear the counters for the Loop Protection counters. clear loop-protection [interface <port-list>] counters Syntax Parameters Description interface The interface whose counters are to be cleared. <port-list> A port, a port range, or an aggregated link.
  • Page 354: Clear Mac Address-Table Dynamic

    WITCHING OMMANDS CLEAR MAC ADDRESS TABLE DYNAMIC clear mac address-table dynamic Overview Use this command to clear the filtering database of all entries learned for a selected MAC address, an MSTP instance, a switch port interface or a VLAN interface. clear mac address-table dynamic [address Syntax <mac-address>|interface <port>...
  • Page 355 WITCHING OMMANDS CLEAR MAC ADDRESS TABLE DYNAMIC This example shows how to clear all dynamically learned filtering database entries when learned through device operation for a given MSTP instance 1 on switch port interface port1.0.2. awplus# clear mac address-table dynamic interface port1.0.2 instance 1 Related clear mac address-table static...
  • Page 356: Clear Mac Address-Table Static

    WITCHING OMMANDS CLEAR MAC ADDRESS TABLE STATIC clear mac address-table static Overview Use this command to clear the filtering database of all statically configured entries for a selected MAC address, interface, or VLAN. clear mac address-table static [address <mac-address>|interface Syntax <port>|vlan <vid>] Parameter Description...
  • Page 357: Clear Port Counter

    WITCHING OMMANDS CLEAR PORT COUNTER clear port counter Overview Use this command to clear the packet counters of the port. clear port counter [<port>] Syntax Parameter Description <port> The port number or range Mode Privileged Exec To clear the packet counter for port1.0.1, use the command: Example awplus# clear port counter port1.0.1...
  • Page 358: Clear Port-Security Intrusion

    WITCHING OMMANDS CLEAR PORT SECURITY INTRUSION clear port-security intrusion Overview Use this command to clear the history of the port-security intrusion list on all ports, or an individual port. If a port is not specified, the intrusion lists of all ports are cleared.
  • Page 359 WITCHING OMMANDS CLEAR PORT SECURITY INTRUSION Table 2: Example output from the show port-security intrusion command  awplus#show port-security intrusion interface port1.0.1 Port Security Intrusion List ------------------------------------------------------------ Interface: port1.0.1 - 1 intrusion(s) detected 801f.0200.19da To clear the history of port-security intrusion list on port1.0.1, use the following command: awplus# clear port-security intrusion interface port1.0.1...
  • Page 360 WITCHING OMMANDS CLEAR PORT SECURITY INTRUSION Related show port-security interface Commands show port-security intrusion switchport port-security switchport port-security aging switchport port-security maximum switchport port-security violation C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 361: Debug Loopprot

    WITCHING OMMANDS DEBUG LOOPPROT debug loopprot Overview This command enables Loop Protection debugging. The no variant of this command disables Loop Protection debugging. Syntax debug loopprot {info|msg|pkt|state|nsm|all} no debug loopprot {info|msg|pkt|state|nsm|all} Parameter Description info General Loop Protection information. Received and transmitted Loop Detection Frames (LDFs). Echo raw ASCII display of received and transmitted LDF packets to the console.
  • Page 362: Debug Platform Packet

    WITCHING OMMANDS DEBUG PLATFORM PACKET debug platform packet Overview This command enables platform to CPU level packet debug functionality on the device. Use the no variant of this command to disable platform to CPU level packet debug. If the result means both send and receive packet debug are disabled, then any active timeout will be canceled.
  • Page 363 WITCHING OMMANDS DEBUG PLATFORM PACKET To enable packet debug for sFlow packets only for the default timeout of 5 minutes, enter: awplus# debug platform packet sflow To enable send packet debug with no timeout, enter: awplus# debug platform packet send timeout 0 To enable VLAN packet debug for VLAN 2 with a timeout duration of 3 minutes, enter: awplus#...
  • Page 364: Duplex

    WITCHING OMMANDS DUPLEX duplex Overview This command changes the duplex mode for the specified port. To see the currently-negotiated duplex mode for ports whose links are up, use the command show interface. To see the configured duplex mode (when different from the default), use the command show running-config.
  • Page 365 WITCHING OMMANDS DUPLEX Related backpressure Commands polarity speed show interface C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 366: Flowcontrol (Switch Port)

    WITCHING OMMANDS FLOWCONTROL SWITCH PORT flowcontrol (switch port) Overview Use this command to enable flow control, and configure the flow control mode for the switch port. Use the no variant of this command to disable flow control for the specified switch port.
  • Page 367 WITCHING OMMANDS FLOWCONTROL SWITCH PORT awplus# configure terminal Examples awplus(config)# interface port1.0.2 awplus(config-if)# flowcontrol receive on awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# flowcontrol send on awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# flowcontrol receive off awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# flowcontrol send off...
  • Page 368: Linkflap Action

    WITCHING OMMANDS LINKFLAP ACTION linkflap action Overview Use this command to detect flapping on all ports. If more than 15 flaps occur in less than 15 seconds the flapping port will shut down. Use the no variant of this command to disable flapping detection at this rate. Syntax linkflap action [shutdown] no linkflap action...
  • Page 369: Loop-Protection Loop-Detect

    WITCHING OMMANDS LOOP PROTECTION LOOP DETECT loop-protection loop-detect Overview Use this command to enable the loop-protection loop-detect feature and configure its parameters. Use the no variant of this command to disable the loop-protection loop-detect feature. Syntax loop-protection loop-detect [ldf-interval <period>] [ldf-rx-window <frames>] [fast-block] no loop-protection loop-detect Parameter...
  • Page 370: Loop-Protection Action

    WITCHING OMMANDS LOOP PROTECTION ACTION loop-protection action Overview Use this command to specify the protective action to apply when a network loop is detected on an interface. Use the no variant of this command to reset the loop protection actions to the default action, vlan-disable, on an interface.
  • Page 371: Loop-Protection Action-Delay-Time

    WITCHING OMMANDS LOOP PROTECTION ACTION DELAY TIME loop-protection action-delay-time Overview Use this command to sets the loop protection action delay time for an interface to specified values in seconds. The action delay time specifies the waiting period for the action. Use the no variant of this command to reset the loop protection action delay time for an interface to default.
  • Page 372: Loop-Protection Timeout

    WITCHING OMMANDS LOOP PROTECTION TIMEOUT loop-protection timeout Overview Use this command to specify the Loop Protection recovery action duration on an interface. Use the no variant of this command to set the loop protection timeout to the default. Syntax loop-protection timeout <duration> no loop-protection timeout Parameter Description...
  • Page 373: Mac Address-Table Acquire

    WITCHING OMMANDS MAC ADDRESS TABLE ACQUIRE mac address-table acquire Overview Use this command to enable MAC address learning on the device. Use the no variant of this command to disable learning. Syntax mac address-table acquire no mac address-table acquire Default Learning is enabled by default for all instances.
  • Page 374: Mac Address-Table Ageing-Time

    WITCHING OMMANDS MAC ADDRESS TABLE AGEING TIME mac address-table ageing-time Overview Use this command to specify an ageing-out time for a learned MAC address. The learned MAC address will persist for at least the specified time. The no variant of this command will reset the ageing-out time back to the default of 300 seconds (5 minutes).
  • Page 375: Mac Address-Table Static

    WITCHING OMMANDS MAC ADDRESS TABLE STATIC mac address-table static Overview Use this command to statically configure the MAC address-table to forward or discard frames with a matching destination MAC address. mac address-table static <mac-addr> {forward|discard} interface Syntax <port> [vlan <vid>] no mac address-table static <mac-addr>...
  • Page 376: Mac Address-Table Thrash-Limit

    WITCHING OMMANDS MAC ADDRESS TABLE THRASH LIMIT mac address-table thrash-limit Overview Use this command to set the thrash limit on the device. Thrashing occurs when a MAC address table rapidly “flips” its mapping of a single MAC address between two subnets, usually as a result of a network loop. Use the no variant of this command to disable thrash limiting.
  • Page 377: Platform Load-Balancing

    WITCHING OMMANDS PLATFORM LOAD BALANCING platform load-balancing Overview This command selects which address fields are used as inputs into the load balancing algorithm for aggregated links. The output from this algorithm is used to select which individual path a given packet will traverse within an aggregated link.
  • Page 378: Platform Stop-Unreg-Mc-Flooding

    WITCHING OMMANDS PLATFORM STOP UNREG FLOODING platform stop-unreg-mc-flooding Overview If a multicast stream is arriving at a network device, and that network device has received no IGMP reports that request the receipt of the stream, then that stream is referred to as "unregistered". IGMP snooping actively prevents the flooding of unregistered streams to all ports in the VLAN on which the stream is received.
  • Page 379 WITCHING OMMANDS PLATFORM STOP UNREG FLOODING Examples To enable this feature and stop multicast packet flooding, use the following commands: awplus# configure terminal awplus(config)# platform stop-unreg-mc-flooding To disable this feature and allow multicast packet flooding, use the following commands: awplus# configure terminal awplus(config)# no platform stop-unreg-mc-flooding...
  • Page 380: Polarity

    WITCHING OMMANDS POLARITY polarity Overview This command sets the MDI/MDIX polarity on a copper-based switch port. polarity {auto|mdi|mdix} Syntax Parameter Description Sets the polarity to MDI (medium dependent interface). mdix Sets the polarity to MDI-X (medium dependent interface crossover). auto The switch port sets the polarity automatically.
  • Page 381: Show Debugging Loopprot

    WITCHING OMMANDS SHOW DEBUGGING LOOPPROT show debugging loopprot Overview This command shows Loop Protection debugging information. show debugging loopprot Syntax Mode User Exec and Privileged Exec Example To display the enabled Loop Protection debugging modes, use the command: awplus# show debugging loopprot Related debug loopprot Commands...
  • Page 382: Show Debugging Platform Packet

    WITCHING OMMANDS SHOW DEBUGGING PLATFORM PACKET show debugging platform packet Overview This command shows platform to CPU level packet debugging information. show debugging platform packet Syntax Mode User Exec and Privileged Exec Example To display the platform packet debugging information, use the command: awplus# show debugging platform packet Related...
  • Page 383: Show Flowcontrol Interface

    WITCHING OMMANDS SHOW FLOWCONTROL INTERFACE show flowcontrol interface Overview Use this command to display flow control information. show flowcontrol interface <port> Syntax Parameter Description <port> Specifies the name of the port to be displayed. Mode User Exec and Privileged Exec To display the flow control for the port1.0.5, use the command: Example awplus#...
  • Page 384: Show Interface Err-Disabled

    WITCHING OMMANDS SHOW INTERFACE ERR DISABLED show interface err-disabled Overview Use this command to show the ports which have been dynamically shut down by protocols running on the device and the protocols responsible for the shutdown. show interface [<interface-range> err-disabled] Syntax Parameter Description...
  • Page 385: Show Interface Switchport

    WITCHING OMMANDS SHOW INTERFACE SWITCHPORT show interface switchport Overview Use this command to show VLAN information about each switch port. show interface switchport Syntax Mode User Exec and Privileged Exec Example To display VLAN information about each switch port, enter the command: awplus# show interface switchport Output...
  • Page 386: Show Loop-Protection

    WITCHING OMMANDS SHOW LOOP PROTECTION show loop-protection Overview Use this command to display the current loop protection setup for the device. show loop-protection [interface <port-list>] [counters] Syntax Parameter Description interface The interface selected for display. <port-list> A port, a port range, or an aggregated link. counters Displays counter information for loop protection.
  • Page 387 WITCHING OMMANDS SHOW LOOP PROTECTION awplus#show loop-protection counters  Switch Loop Detection Counter  Interface Rx Invalid Last LDF Rx ------------------------------------------------------------------------- port1.0.1 vlan1 - port1.0.2 vlan1 - port1.0.3 vlan1 - C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 388: Show Mac Address-Table

    WITCHING OMMANDS SHOW MAC ADDRESS TABLE show mac address-table Overview Use this command to display the mac address-table for all configured VLANs. show mac address-table Syntax Mode User Exec and Privileged Exec Usage The show mac address-table command is only applicable to view a mac address-table for Layer 2 switched traffic within VLANs.
  • Page 389 WITCHING OMMANDS SHOW MAC ADDRESS TABLE awplus(config)#mac address-table static 0000.1111.2222 for int  port1.0.3 vlan 2 awplus(config)#end awplus# awplus#show mac address-table  VLAN Port State unknown 0000.cd28.0752 static port1.0.2 0030.846e.bac7 dynamic port1.0.3 0000.1111.2222 static unknown 0000.cd28.0752 static port1.0.5 0030.846e.9bf4 dynamic 0000.cd00.0000 static Related...
  • Page 390: Show Mac Address-Table Thrash-Limit

    WITCHING OMMANDS SHOW MAC ADDRESS TABLE THRASH LIMIT show mac address-table thrash-limit Overview Use this command to display the current thrash limit set for all interfaces on the device. show mac address-table thrash-limit Syntax Mode User Exec and Privileged Exec Example To display the current, use the following command: awplus#...
  • Page 391: Show Platform

    WITCHING OMMANDS SHOW PLATFORM show platform Overview This command displays the settings configured by using the platform commands. show platform Syntax Mode Privileged Exec Usage This command displays the settings in the running config. For changes in some of these settings to take effect, the device must be rebooted with the new settings in the startup config.
  • Page 392: Show Platform Classifier Statistics Utilization Brief

    WITCHING OMMANDS SHOW PLATFORM CLASSIFIER STATISTICS UTILIZATION BRIEF show platform classifier statistics utilization brief Overview This command displays the number of used entries available for various platform functions, and the percentage that number of entries represents of the total available. Syntax show platform classifier statistics utilization brief Mode...
  • Page 393: Show Platform Port

    WITCHING OMMANDS SHOW PLATFORM PORT show platform port Overview This command displays the various port registers or platform counters for specified switchports. show platform port [<port-list>|counters] Syntax Parameter Description <port-list> The ports to display information about. A port-list can be: •...
  • Page 394 WITCHING OMMANDS SHOW PLATFORM PORT Output Figure 13-9: Example output from the show platform port command awplus#show platform port port1.0.1 Phy register value for port1.0.1 (ifindex: 5001)  00:1140 01:7949 02:0020 03:60B1 04:01E1 05:0000 06:0004 07:2001 08:0000 09:0600 10:0000 11:0000 12:0000 13:0000 14:0000...
  • Page 395 WITCHING OMMANDS SHOW PLATFORM PORT Table 6: Parameters in the output from the show platform port command Parameter Description 512 - 1023 Number of 512 - 1023 octet packets received and transmitted. 1024 - MaxPktSz Number of packets received and transmitted with size 1024 octets to the maximum packet length.
  • Page 396 WITCHING OMMANDS SHOW PLATFORM PORT Table 6: Parameters in the output from the show platform port command Parameter Description Transmit Counters for traffic transmitted. Octets Number of octets transmitted. Pkts Number of packets transmitted. UnicastPkts Number of unicast packets transmitted. MulticastPkts Number of multicast packets transmitted.
  • Page 397: Show Port-Security Interface

    WITCHING OMMANDS SHOW PORT SECURITY INTERFACE show port-security interface Overview Use this command to show the current port-security configuration and the switch port status. show port-security interface <port> Syntax Parameter Description <port> The port to display information about. The port may be a switch port (e.g.
  • Page 398: Show Port-Security Intrusion

    WITCHING OMMANDS SHOW PORT SECURITY INTRUSION show port-security intrusion Overview Use this command to show the intrusion list. If the port is not specified, the entire intrusion table is shown. show port-security intrusion [interface <port>] Syntax Parameter Description interface Specify a port <port>...
  • Page 399: Show Storm-Control

    WITCHING OMMANDS SHOW STORM CONTROL show storm-control Overview Use this command to display storm-control information for all interfaces or a particular interface. show storm-control [<port>] Syntax Parameter Description <port> The port to display information about. The port may be a switch port (e.g.
  • Page 400: Speed

    WITCHING OMMANDS SPEED speed Overview This command changes the speed of the specified port. You can optionally specify the speed or speeds that get autonegotiated, so autonegotiation is only attempted at the specified speeds. To see the currently-negotiated speed for ports whose links are up, use the show interface command.
  • Page 401 WITCHING OMMANDS SPEED To return the port to auto-negotiating its speed, enter the following commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# speed auto To set the port to auto-negotiate its speed at 100Mbps and 1000Mbps, enter the following commands: awplus# configure terminal awplus(config)#...
  • Page 402: Storm-Control Level

    WITCHING OMMANDS STORM CONTROL LEVEL storm-control level Overview Use this command to specify the speed limiting level for broadcasting, multicast, or destination lookup failure (DLF) traffic for the port. Storm-control limits the selected traffic type to the specified percentage of the maximum port speed. Use the no variant of this command to disable storm-control for broadcast, multicast or DLF traffic.
  • Page 403: Switchport Port-Security

    WITCHING OMMANDS SWITCHPORT PORT SECURITY switchport port-security Overview Use this command to enable the port-security feature. This feature is also known as the port-based learn limit. It allows the user to set the maximum number of MAC addresses that each port can learn. Use the no variant of this command to disable the port-security feature.
  • Page 404: Switchport Port-Security Aging

    WITCHING OMMANDS SWITCHPORT PORT SECURITY AGING switchport port-security aging Overview Use this command to set MAC addresses that have been learned by port security to age out. Use the no variant of this command to set the MAC addresses to not age out. Syntax switchport port-security aging no switchport port-security aging...
  • Page 405: Switchport Port-Security Maximum

    WITCHING OMMANDS SWITCHPORT PORT SECURITY MAXIMUM switchport port-security maximum Overview Use this command to set the maximum number of MAC addresses that each port can learn. Use the no variant of this command to unset the maximum number of MAC addresses that each port can learn.
  • Page 406: Switchport Port-Security Violation

    WITCHING OMMANDS SWITCHPORT PORT SECURITY VIOLATION switchport port-security violation Overview Use this command to set the action taken on a switch port when the port exceeds the learning limits. The port action can be either shutdown, restrict or protect. If shutdown is set, the physical link will be disabled and “shutdown”...
  • Page 407: Thrash-Limiting

    WITCHING OMMANDS THRASH LIMITING thrash-limiting Overview Sets and configures the thrash limit action that will be applied to any port on the device when a thrashing condition is detected. The thrash-limiting timeout specifies the time, in seconds, for which the thrash action is employed. thrash-limiting {[action Syntax {learn-disable|link-down|port-disable|vlan-disable|none}]...
  • Page 408 WITCHING OMMANDS THRASH LIMITING To set the thrash limiting action to its default, use the following command: awplus(config-if)# no thrash-limiting action To set the thrash limiting timeout to its default, use the following command: awplus(config-if)# no thrash-limiting timeout Related loop-protection loop-detect Commands loop-protection action loop-protection timeout...
  • Page 409: Undebug Loopprot

    WITCHING OMMANDS UNDEBUG LOOPPROT undebug loopprot Overview This command applies the functionality of the no debug loopprot command. C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 410: Undebug Platform Packet

    WITCHING OMMANDS UNDEBUG PLATFORM PACKET undebug platform packet Overview This command applies the functionality of the no debug platform packet command. C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 411: Vlan Commands

    VLAN Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure VLANs. For more information see the VLAN Feature Overview and Configuration Guide. Command List • “port-vlan-forwarding-priority” on page 413 • “private-vlan” on page 416 • “private-vlan association”...
  • Page 412 VLAN C OMMANDS • “switchport trunk allowed vlan” on page 436 • “switchport trunk native vlan” on page 439 • “switchport voice dscp” on page 440 • “switchport voice vlan” on page 441 • “switchport voice vlan priority” on page 443 •...
  • Page 413: Port-Vlan-Forwarding-Priority

    VLAN C OMMANDS PORT VLAN FORWARDING PRIORITY port-vlan-forwarding-priority Overview Use this command to specify which protocol has the highest priority for controling transitions from blocking to forwarding traffic. This command prioritizes switch port forwarding mode control, when more than one of EPSR, Loop Protection, and MAC thrashing protection protocols are used on the switch.
  • Page 414 VLAN C OMMANDS PORT VLAN FORWARDING PRIORITY This command means that, when a protocol is set to have the highest priority over a data VLAN on a port, it will not allow other protocols to put that port-vlan into a forwarding state if the highest priority protocol blocked it.
  • Page 415 VLAN C OMMANDS PORT VLAN FORWARDING PRIORITY override each other to set a port to the forwarding or blocking states, use the commands: awplus# configure terminal awplus(config)# port-vlan-forwarding-priority none To restore the default highest priority protocol back to the default of EPSR, use the commands: awplus# configure terminal...
  • Page 416: Private-Vlan

    VLAN C OMMANDS PRIVATE VLAN private-vlan Overview Use this command to a create a private VLAN. Private VLANs can be either primary or secondary. Secondary VLANs can be ether community or isolated. Use the no variant of this command to remove the specified private VLAN. For more information, see the VLAN Feature Overview and Configuration Guide.
  • Page 417: Private-Vlan Association

    VLAN C OMMANDS PRIVATE VLAN ASSOCIATION private-vlan association Overview Use this command to associate a secondary VLAN to a primary VLAN. Only one isolated VLAN can be associated to a primary VLAN. Multiple community VLANs can be associated to a primary VLAN. Use the no variant of this command to remove association of all the secondary VLANs to a primary VLAN.
  • Page 418: Show Port-Vlan-Forwarding-Priority

    VLAN C OMMANDS SHOW PORT VLAN FORWARDING PRIORITY show port-vlan-forwarding-priority Overview Use this command to display the highest priority protocol that controls port-vlan forwarding or blocking traffic. This command displays whether EPSR or Loop Protection is set as the highest priority for determining whether a port forwards a VLAN, as set by the port-vlan-forwarding-priority command.
  • Page 419: Show Vlan

    VLAN C OMMANDS SHOW VLAN show vlan Overview Use this command to display information about a particular VLAN by specifying its VLAN ID. Selecting all will display information for all the VLANs configured. show vlan Syntax {all|brief|dynamic|static|auto|static-ports|<1-4094>} Parameter Description <1-4094> Display information about the VLAN specified by the VLAN ID.
  • Page 420: Show Vlan Classifier Group

    VLAN C OMMANDS SHOW VLAN CLASSIFIER GROUP show vlan classifier group Overview Use this command to display information about all configured VLAN classifier groups or a specific group. show vlan classifier group [<1-16>] Syntax Parameter Description <1-16> VLAN classifier group identifier Mode User Exec and Privileged Exec Usage...
  • Page 421: Show Vlan Classifier Group Interface

    VLAN C OMMANDS SHOW VLAN CLASSIFIER GROUP INTERFACE show vlan classifier group interface Overview Use this command to display information about a single switch port interface for all configured VLAN classifier groups. show vlan classifier group interface <switch-port> Syntax Parameter Description <switch-port>...
  • Page 422: Show Vlan Classifier Interface Group

    VLAN C OMMANDS SHOW VLAN CLASSIFIER INTERFACE GROUP show vlan classifier interface group Overview Use this command to display information about all interfaces configured for a VLAN group or all the groups. show vlan classifier interface group [<1-16>] Syntax Parameter Description <1-16>...
  • Page 423: Show Vlan Classifier Rule

    VLAN C OMMANDS SHOW VLAN CLASSIFIER RULE show vlan classifier rule Overview Use this command to display information about all configured VLAN classifier rules or a specific rule. show vlan classifier rule [<1-256>] Syntax Parameter Description <1-256> VLAN classifier rule identifier Mode User Exec and Privileged Exec Usage...
  • Page 424: Show Vlan Private-Vlan

    VLAN C OMMANDS SHOW VLAN PRIVATE VLAN show vlan private-vlan Overview Use this command to display the private VLAN configuration and associations. show vlan private-vlan Syntax Mode User Exec and Privileged Exec Example To display the private VLAN configuration and associations, enter the command: awplus# show vlan private-vlan Output...
  • Page 425: Switchport Access Vlan

    VLAN C OMMANDS SWITCHPORT ACCESS VLAN switchport access vlan Overview Use this command to change the port-based VLAN of the current port. Use the no variant of this command to change the port-based VLAN of this port to the default VLAN, vlan1. Syntax switchport access vlan <vlan-id>...
  • Page 426: Switchport Enable Vlan

    VLAN C OMMANDS SWITCHPORT ENABLE VLAN switchport enable vlan Overview This command enables the VLAN on the port manually once disabled by certain actions, such as QSP (QoS Storm Protection) or EPSR (Ethernet Protection Switching Ring). Note that if the VID is not given, all disabled VLANs are re-enabled. switchport enable vlan [<1-4094>] Syntax Parameter...
  • Page 427: Switchport Mode Access

    VLAN C OMMANDS SWITCHPORT MODE ACCESS switchport mode access Overview Use this command to set the switching characteristics of the port to access mode. Received frames are classified based on the VLAN characteristics, then accepted or discarded based on the specified filtering criteria. switchport mode access [ingress-filter {enable|disable}] Syntax Parameter...
  • Page 428: Switchport Mode Private-Vlan

    VLAN C OMMANDS SWITCHPORT MODE PRIVATE VLAN switchport mode private-vlan Overview Use this command to make a Layer 2 port a private VLAN host port or a promiscuous port. Use the no variant of this command to remove the configuration. Syntax switchport mode private-vlan {host|promiscuous} no switchport mode private-vlan {host|promiscuous}...
  • Page 429: Switchport Mode Private-Vlan Trunk Promiscuous

    VLAN C OMMANDS SWITCHPORT MODE PRIVATE VLAN TRUNK PROMISCUOUS switchport mode private-vlan trunk promiscuous Overview Use this command to enable a port in trunk mode to be promiscuous port for isolated VLANs. Use the no variant of this command to remove a port in trunk mode as a promiscuous port for isolated VLANs.
  • Page 430 VLAN C OMMANDS SWITCHPORT MODE PRIVATE VLAN TRUNK PROMISCUOUS To create the isolated VLANs 2, 3 and 4 and then enable port1.0.2 in trunk Examples mode as a promiscuous port for these VLANs with the group ID of 3, use the following commands: awplus# configure terminal...
  • Page 431: Switchport Mode Private-Vlan Trunk Secondary

    VLAN C OMMANDS SWITCHPORT MODE PRIVATE VLAN TRUNK SECONDARY switchport mode private-vlan trunk secondary Overview Use this command to enable a port in trunk mode to be a secondary port for isolated VLANs. Use the no variant of this command to remove a port in trunk mode as a secondary port for isolated VLANs.
  • Page 432 VLAN C OMMANDS SWITCHPORT MODE PRIVATE VLAN TRUNK SECONDARY To create isolated private VLAN 2 and then enable port1.0.3 in trunk mode as Examples a secondary port for the this VLAN with the group ID of 3, use the following commands: awplus# configure terminal...
  • Page 433: Switchport Mode Trunk

    VLAN C OMMANDS SWITCHPORT MODE TRUNK switchport mode trunk Overview Use this command to set the switching characteristics of the port to trunk. Received frames are classified based on the VLAN characteristics, then accepted or discarded based on the specified filtering criteria. switchport mode trunk [ingress-filter {enable|disable}] Syntax Parameter...
  • Page 434: Switchport Private-Vlan Host-Association

    VLAN C OMMANDS SWITCHPORT PRIVATE VLAN HOST ASSOCIATION switchport private-vlan host-association Overview Use this command to associate a primary VLAN and a secondary VLAN to a host port. Only one primary and secondary VLAN can be associated to a host port. Use the no variant of this command to remove the association.
  • Page 435: Switchport Private-Vlan Mapping

    VLAN C OMMANDS SWITCHPORT PRIVATE VLAN MAPPING switchport private-vlan mapping Overview Use this command to associate a primary VLAN and a set of secondary VLANs to a promiscuous port. Use the no variant of this to remove all the association of secondary VLANs to primary VLANs for a promiscuous port.
  • Page 436: Switchport Trunk Allowed Vlan

    VLAN C OMMANDS SWITCHPORT TRUNK ALLOWED VLAN switchport trunk allowed vlan Overview Use this command to add VLANs to be trunked over this switch port. Traffic for these VLANs can be sent and received on the port. Use the no variant of this command to reset switching characteristics of a specified interface to negate a trunked configuration specified with switchport trunk allowed vlan command.
  • Page 437 VLAN C OMMANDS SWITCHPORT TRUNK ALLOWED VLAN : Only use the add or the remove parameters with this command if a list of NOTE VLANs are configured on a port. Only use the except parameter to remove VLANs after either the except or the all parameters have first been used to add a list of VLANs to a port.
  • Page 438 VLAN C OMMANDS SWITCHPORT TRUNK ALLOWED VLAN awplus#show running-config  !  interface port1.0.5 switchport switchport mode trunk switchport trunk allowed vlan except 3,5 Examples The following shows adding a single VLAN to the port’s member set. awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)#...
  • Page 439: Switchport Trunk Native Vlan

    VLAN C OMMANDS SWITCHPORT TRUNK NATIVE VLAN switchport trunk native vlan Overview Use this command to configure the native VLAN for this port. The native VLAN is used for classifying the incoming untagged packets. Use the none parameter with this command to remove the native VLAN from the port and set the acceptable frame types to vlan-tagged only.
  • Page 440: Switchport Voice Dscp

    VLAN C OMMANDS SWITCHPORT VOICE DSCP switchport voice dscp Overview Use this command for a specific port to configure the Layer 3 DSCP value advertised when the transmission of LLDP-MED Network Policy TLVs for voice devices is enabled. When LLDP-MED capable IP phones receive this network policy information, they transmit voice data with the specified DSCP value.
  • Page 441: Switchport Voice Vlan

    VLAN C OMMANDS SWITCHPORT VOICE VLAN switchport voice vlan Overview Use this command to configure the Voice VLAN tagging advertised when the transmission of LLDP-MED Network Policy TLVs for voice endpoint devices is enabled. When LLDP-MED capable IP phones receive this network policy information, they transmit voice data with the specified tagging.
  • Page 442 VLAN C OMMANDS SWITCHPORT VOICE VLAN If the Voice VLAN details are to be assigned by RADIUS, then the RADIUS server must be configured to send the attribute “Egress-VLANID (56)” or “Egress-VLAN-Name (58)” in the RADIUS Accept message when authenticating a phone attached to this port.
  • Page 443: Switchport Voice Vlan Priority

    VLAN C OMMANDS SWITCHPORT VOICE VLAN PRIORITY switchport voice vlan priority Overview Use this command to configure the Layer 2 user priority advertised when the transmission of LLDP-MED Network Policy TLVs for voice devices is enabled. This is the priority in the User Priority field of the IEEE 802.1Q VLAN tag, also known as the Class of Service (CoS), or 802.1p priority.
  • Page 444: Vlan

    VLAN C OMMANDS VLAN vlan Overview This command creates VLANs, assigns names to them, and enables or disables them. Disabling the VLAN causes all forwarding over the specified VLAN ID to cease. Enabling the VLAN allows forwarding of frames on the specified VLAN. The no variant of this command destroys the specified VLANs or returns their MTU to the default.
  • Page 445: Vlan Classifier Activate

    VLAN C OMMANDS VLAN CLASSIFIER ACTIVATE vlan classifier activate Overview Use this command in Interface Configuration mode to associate a VLAN classifier group with the switch port. Use the no variant of this command to remove the VLAN classifier group from the switch port.
  • Page 446: Vlan Classifier Group

    VLAN C OMMANDS VLAN CLASSIFIER GROUP vlan classifier group Overview Use this command to create a group of VLAN classifier rules. The rules must already have been created. Use the no variant of this command to delete a group of VLAN classifier rules. Syntax vlan classifier group <1-16>...
  • Page 447: Vlan Classifier Rule Ipv4

    VLAN C OMMANDS VLAN CLASSIFIER RULE IPV vlan classifier rule ipv4 Overview Use this command to create an IPv4 subnet-based VLAN classifier rule and map it to a specific VLAN. Use the no variant of this command to delete the VLAN classifier rule.
  • Page 448: Vlan Classifier Rule Proto

    VLAN C OMMANDS VLAN CLASSIFIER RULE PROTO vlan classifier rule proto Overview Use this command to create a protocol type-based VLAN classifier rule, and map it to a specific VLAN. See the published IANA EtherType IEEE 802 numbers here: www.iana.org/assignments/ieee-802-numbers/ieee-802-numbers.txt. Instead of a protocol name the decimal value of the protocol's EtherType can be entered.
  • Page 449 VLAN C OMMANDS VLAN CLASSIFIER RULE PROTO Parameter Description [decsyscomm|24583] DEC Systems Comms Arch protocol [g8bpqx25|2303] G8BPQ AX.25 protocol [ieeeaddrtrans|2561] Xerox IEEE802.3 PUP Address [ieeepup|2560] Xerox IEEE802.3 PUP protocol [ip|2048] IP protocol [ipv6|34525] IPv6 protocol [ipx|33079] IPX protocol [netbeui|61680] IBM NETBIOS/NETBEUI protocol [netbeui|61681] IBM NETBIOS/NETBEUI...
  • Page 450 VLAN C OMMANDS VLAN CLASSIFIER RULE PROTO awplus# configure terminal Example awplus(config)# vlan classifier rule 1 proto x25 encap ethv2 vlan 2 awplus(config)# vlan classifier rule 2 proto 512 encap ethv2 vlan 2 awplus(config)# vlan classifier rule 3 proto 2056 encap ethv2 vlan 2 awplus(config)# vlan classifier rule 4 proto 2054 encap ethv2...
  • Page 451: Vlan Database

    VLAN C OMMANDS VLAN DATABASE vlan database Overview Use this command to enter the VLAN Configuration mode. vlan database Syntax Mode Global Configuration Usage Use this command to enter the VLAN configuration mode. You can then add or delete a VLAN, or modify its values. Example In the following example, note the change to VLAN configuration mode from Configure mode:...
  • Page 452: Spanning Tree Commands

    Spanning Tree Commands Introduction Overview This chapter provides an alphabetical reference for commands used to configure RSTP, STP or MSTP. For information about spanning trees, including configuration procedures, see the STP Feature Overview and Configuration Guide. Command List • “clear spanning-tree statistics”...
  • Page 453 PANNING OMMANDS • “show spanning-tree statistics instance” on page 484 • “show spanning-tree statistics instance interface” on page 485 • “show spanning-tree statistics interface” on page 487 • “show spanning-tree vlan range-index” on page 489 • “spanning-tree autoedge (RSTP and MSTP)”...
  • Page 454: Clear Spanning-Tree Statistics

    PANNING OMMANDS CLEAR SPANNING TREE STATISTICS clear spanning-tree statistics Overview Use this command to clear all the STP BPDU (Bridge Protocol Data Unit) statistics. clear spanning-tree statistics Syntax clear spanning-tree statistics [instance <mstp-instance>] clear spanning-tree statistics [interface <port> [instance <mstp-instance>]] Parameter Description <port>...
  • Page 455: Clear Spanning-Tree Detected Protocols (Rstp And Mstp)

    PANNING OMMANDS (RSTP MSTP) CLEAR SPANNING TREE DETECTED PROTOCOLS clear spanning-tree detected protocols (RSTP and MSTP) Overview Use this command to clear the detected protocols for a specific port, or all ports. Use this command in RSTP or MSTP mode only. clear spanning-tree detected protocols [interface <port>] Syntax Parameter...
  • Page 456: Debug Mstp (Rstp And Stp)

    PANNING OMMANDS (RSTP STP) DEBUG MSTP debug mstp (RSTP and STP) Overview Use this command to enable debugging for the configured spanning tree mode, and echo data to the console, at various levels. Note that although this command uses the keyword mstp it displays debugging output for RSTP and STP protocols as well the MSTP protocol.
  • Page 457 PANNING OMMANDS (RSTP STP) DEBUG MSTP command. The default terminal monitor filter will select and display these messages. Alternatively, the messages can be directed to any of the other log outputs by adding a filter for the MSTP application using log buffered (filter) command: awplus#...
  • Page 458 PANNING OMMANDS (RSTP STP) DEBUG MSTP awplus#terminal monitor awplus#debug mstp packet rx decode interface port1.0.4 17:23:42 awplus MSTP[1417]: port1.0.4 xSTP BPDU rx - start 17:23:42 awplus MSTP[1417]: Protocol version: MSTP, BPDU type: RST 17:23:42 awplus MSTP[1417]: CIST Flags: Agree Forward Learn role=Desig 17:23:42 awplus MSTP[1417]: CIST root id : 0000:0000cd1000fe...
  • Page 459 PANNING OMMANDS (RSTP STP) DEBUG MSTP awplus#terminal monitor awplus#debug mstp packet rx decode interface port1.0.4 awplus#17:30:17 awplus MSTP[1417]: port1.0.4 xSTP BPDU rx - start 17:30:17 awplus MSTP[1417]: Protocol version: RSTP, BPDU type: RST 17:30:17 awplus MSTP[1417]: CIST Flags: Forward Learn role=Desig 17:30:17 awplus MSTP[1417]: CIST root id : 8000:0000cd1000fe...
  • Page 460: Instance Priority (Mstp)

    PANNING OMMANDS (MSTP) INSTANCE PRIORITY instance priority (MSTP) Overview Use this command to set the priority for this device to become the root bridge for the specified MSTI (Multiple Spanning Tree Instance). Use this command for MSTP only. Use the no variant of this command to restore the root bridge priority of the device for the instance to the default.
  • Page 461 PANNING OMMANDS (MSTP) INSTANCE PRIORITY Related region (MSTP) Commands revision (MSTP) show spanning-tree mst config spanning-tree mst instance spanning-tree mst instance priority C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 462: Instance Vlan (Mstp)

    PANNING OMMANDS (MSTP) INSTANCE VLAN instance vlan (MSTP) Overview Use this command to create an MST Instance (MSTI), and associate the specified VLANs with it. An MSTI is a spanning tree instance that exists within an MST region (MSTR). When a VLAN is associated with an MSTI the member ports of the VLAN are automatically configured to send and receive spanning-tree information for the associated MSTI.
  • Page 463 PANNING OMMANDS (MSTP) INSTANCE VLAN Related region (MSTP) Commands revision (MSTP) show spanning-tree mst config spanning-tree mst instance vlan C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 464: Region (Mstp)

    PANNING OMMANDS (MSTP) REGION region (MSTP) Overview Use this command to assign a name to the device’s MST Region. MST Instances (MSTI) of a region form different spanning trees for different VLANs. Use this command for MSTP only. Use the no variant of this command to remove this region name and reset it to the default.
  • Page 465: Revision (Mstp)

    PANNING OMMANDS (MSTP) REVISION revision (MSTP) Overview Use this command to specify the MST revision number to be used in the configuration identifier. Use this command for MSTP only. Syntax revision <revision-number> Parameter Description <revision-number> <0-65535> Revision number. Default The default of revision number is 0. Mode MST Configuration Usage...
  • Page 466: Show Debugging Mstp

    PANNING OMMANDS SHOW DEBUGGING MSTP show debugging mstp Overview Use this command to show the MSTP debugging options set. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide. Syntax show debugging mstp Mode User Exec and Privileged Exec mode...
  • Page 467: Show Spanning-Tree

    PANNING OMMANDS SHOW SPANNING TREE show spanning-tree Overview Use this command to display detailed spanning tree information on the specified port or on all ports. Use this command for RSTP, MSTP or STP. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 468 PANNING OMMANDS SHOW SPANNING TREE Output Figure 15-2: Example output from show spanning-tree in RSTP mode awplus#show spanning-tree % 1: Bridge up - Spanning Tree Enabled % 1: Root Path Cost 0 - Root Port 0 - Bridge Priority 32768 % 1: Forward Delay 15 - Hello Time 2 - Max Age 20...
  • Page 469 PANNING OMMANDS SHOW SPANNING TREE % 1: Bridge up - Spanning Tree Enabled % 1: Root Path Cost 0 - Root Port 0 - Bridge Priority 32768 % 1: Forward Delay 15 - Hello Time 2 - Max Age 20 % 1: Root Id 80000000cd20f093...
  • Page 470: Show Spanning-Tree Brief

    PANNING OMMANDS SHOW SPANNING TREE BRIEF show spanning-tree brief Overview Use this command to display a summary of spanning tree status information on all ports. Use this command for RSTP, MSTP or STP. show spanning-tree brief Syntax Parameter Description brief A brief summary of spanning tree information.
  • Page 471: Show Spanning-Tree Mst

    PANNING OMMANDS SHOW SPANNING TREE MST show spanning-tree mst Overview This command displays bridge-level information about the CIST and VLAN to MSTI mappings. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 472: Show Spanning-Tree Mst Config

    PANNING OMMANDS SHOW SPANNING TREE MST CONFIG show spanning-tree mst config Overview Use this command to display MSTP configuration identifier for the device. show spanning-tree mst config Syntax Mode User Exec, Privileged Exec and Interface Configuration Usage The region name, the revision number, and the digest of the VLAN to MSTI configuration table must be the same on all devices that are intended to be in the same MST region.
  • Page 473: Show Spanning-Tree Mst Detail

    PANNING OMMANDS SHOW SPANNING TREE MST DETAIL show spanning-tree mst detail Overview This command displays detailed information about each instance, and all interfaces associated with that particular instance. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 474 PANNING OMMANDS SHOW SPANNING TREE MST DETAIL port1.0.3: Port 5003 - Id 838b - Role Disabled - State Discarding port1.0.3: Designated External Path Cost 0 -Internal Path Cost 0 port1.0.3: Configured Path Cost 20000000 - Add type Explicit ref count 1 port1.0.3: Designated Port Id 838b - CIST Priority 128 -...
  • Page 475: Show Spanning-Tree Mst Detail Interface

    PANNING OMMANDS SHOW SPANNING TREE MST DETAIL INTERFACE show spanning-tree mst detail interface Overview This command displays detailed information about the specified switch port, and the MST instances associated with it. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 476 PANNING OMMANDS SHOW SPANNING TREE MST DETAIL INTERFACE port1.0.2: No portfast configured - Current portfast off port1.0.2: portfast bpdu-guard default - Current portfast bpdu-guard off port1.0.2: portfast bpdu-filter default - Current portfast bpdu-filter off port1.0.2: no root guard configured - Current root guard off port1.0.2: Configured Link Type point-to-point - Current shared...
  • Page 477: Show Spanning-Tree Mst Instance

    PANNING OMMANDS SHOW SPANNING TREE MST INSTANCE show spanning-tree mst instance Overview This command displays detailed information for the specified instance, and all switch ports associated with that instance. A topology change counter has been included for RSTP and MSTP. You can see the topology change counter for RSTP by using the show spanning-tree command.
  • Page 478: Show Spanning-Tree Mst Instance Interface

    PANNING OMMANDS SHOW SPANNING TREE MST INSTANCE INTERFACE show spanning-tree mst instance interface Overview This command displays detailed information for the specified MST (Multiple Spanning Tree) instance, and the specified switch port associated with that MST instance. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 479: Show Spanning-Tree Mst Interface

    PANNING OMMANDS SHOW SPANNING TREE MST INTERFACE show spanning-tree mst interface Overview This command displays the number of instances created, and VLANs associated with it for the specified switch port. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 480: Show Spanning-Tree Mst Detail Interface

    PANNING OMMANDS SHOW SPANNING TREE MST DETAIL INTERFACE show spanning-tree mst detail interface Overview This command displays detailed information about the specified switch port, and the MST instances associated with it. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 481 PANNING OMMANDS SHOW SPANNING TREE MST DETAIL INTERFACE port1.0.2: No portfast configured - Current portfast off port1.0.2: portfast bpdu-guard default - Current portfast bpdu-guard off port1.0.2: portfast bpdu-filter default - Current portfast bpdu-filter off port1.0.2: no root guard configured - Current root guard off port1.0.2: Configured Link Type point-to-point - Current shared...
  • Page 482: Show Spanning-Tree Statistics

    PANNING OMMANDS SHOW SPANNING TREE STATISTICS show spanning-tree statistics Overview This command displays BPDU (Bridge Protocol Data Unit) statistics for all spanning-tree instances, and all switch ports associated with all spanning-tree instances. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 483 PANNING OMMANDS SHOW SPANNING TREE STATISTICS % STATUS of Port Timers % --------------------- % Hello Time Configured : 2 % Hello timer : INACTIVE % Hello Time Value : 0 % Forward Delay Timer : INACTIVE % Forward Delay Timer Value : 0...
  • Page 484: Show Spanning-Tree Statistics Instance

    PANNING OMMANDS SHOW SPANNING TREE STATISTICS INSTANCE show spanning-tree statistics instance Overview This command displays BPDU (Bridge Protocol Data Unit) statistics for the specified MST (Multiple Spanning Tree) instance, and all switch ports associated with that MST instance. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 485: Show Spanning-Tree Statistics Instance Interface

    PANNING OMMANDS SHOW SPANNING TREE STATISTICS INSTANCE INTERFACE show spanning-tree statistics instance interface Overview This command displays BPDU (Bridge Protocol Data Unit) statistics for the specified MST (Multiple Spanning Tree) instance and the specified switch port associated with that MST instance. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 486 PANNING OMMANDS SHOW SPANNING TREE STATISTICS INSTANCE INTERFACE Output Figure 15-15: Example output from show spanning-tree statistics instance interface awplus#sh spanning-tree statistics interface port1.0.2 instance 1 Spanning Tree Enabled for Instance : 1 ================================== % INST_PORT port1.0.2 Information & Statistics % ----------------------------------------...
  • Page 487: Show Spanning-Tree Statistics Interface

    PANNING OMMANDS SHOW SPANNING TREE STATISTICS INTERFACE show spanning-tree statistics interface Overview This command displays BPDU (Bridge Protocol Data Unit) statistics for the specified switch port, and all MST instances associated with that switch port. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 488 PANNING OMMANDS SHOW SPANNING TREE STATISTICS INTERFACE % PORT Based Information & Statistics % ----------------------------------- % Config Bpdu's xmitted : 0 % Config Bpdu's received : 0 % TCN Bpdu's xmitted : 0 % TCN Bpdu's received : 0 % Forward Trans Count : 0...
  • Page 489: Show Spanning-Tree Vlan Range-Index

    PANNING OMMANDS SHOW SPANNING TREE VLAN RANGE INDEX show spanning-tree vlan range-index Overview Use this command to display information about MST (Multiple Spanning Tree) instances and the VLANs associated with them including the VLAN range-index value for the device. show spanning-tree vlan range-index Syntax Mode Privileged Exec...
  • Page 490: Spanning-Tree Autoedge (Rstp And Mstp)

    PANNING OMMANDS (RSTP MSTP) SPANNING TREE AUTOEDGE spanning-tree autoedge (RSTP and MSTP) Overview Use this command to enable the autoedge feature on the port. The autoedge feature allows the port to automatically detect that it is an edge port. If it does not receive any BPDUs in the first three seconds after linkup, enabling, or entering RSTP or MSTP mode, it sets itself to be an edgeport and enters the forwarding state.
  • Page 491: Spanning-Tree Bpdu

    PANNING OMMANDS SPANNING TREE BPDU spanning-tree bpdu Overview Use this command in Global Configuration mode to configure BPDU (Bridge Protocol Data Unit) discarding or forwarding, with STP (Spanning Tree Protocol) disabled on the switch. See the Usage note about disabling Spanning Tree before using this command, and using this command to forward unsupported BPDUs unchanged for unsupported STP Protocols.
  • Page 492 PANNING OMMANDS SPANNING TREE BPDU Examples To enable STP BPDU discard in Global Configuration mode with STP disabled, which discards all ingress STP BPDU frames, enter the commands: awplus# configure terminal awplus(config)# no spanning-tree stp enable awplus(config)# spanning-tree bpdu discard To enable STP BPDU forward in Global Configuration mode with STP disabled, which forwards any ingress STP BPDU frames to all ports regardless of any VLAN membership, enter the commands:...
  • Page 493: Spanning-Tree Cisco-Interoperability (Mstp)

    PANNING OMMANDS (MSTP) SPANNING TREE CISCO INTEROPERABILITY spanning-tree cisco-interoperability (MSTP) Overview Use this command to enable/disable Cisco-interoperability for MSTP. Use this command for MSTP only. Syntax spanning-tree cisco-interoperability {enable|disable} Parameter Description enable Enable Cisco interoperability for MSTP. disable Disable Cisco interoperability for MSTP. Default If this command is not used, Cisco interoperability is disabled.
  • Page 494: Spanning-Tree Edgeport (Rstp And Mstp)

    PANNING OMMANDS (RSTP MSTP) SPANNING TREE EDGEPORT spanning-tree edgeport (RSTP and MSTP) Overview Use this command to set a port as an edge-port. Use this command for RSTP or MSTP. This command has the same effect as the spanning-tree portfast (STP) command, but the configuration displays differently in the output of some show commands.
  • Page 495: Spanning-Tree Enable

    PANNING OMMANDS SPANNING TREE ENABLE spanning-tree enable Overview Use this command in Global Configuration mode to enable the specified spanning tree protocol for all switch ports. Note that this must be the spanning tree protocol that is configured on the device by the spanning-tree mode command.
  • Page 496 PANNING OMMANDS SPANNING TREE ENABLE To disable RSTP in Global Configuration mode, enter the below commands: awplus# configure terminal awplus(config)# no spanning-tree rstp enable Related spanning-tree bpdu Commands spanning-tree mode C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 497: Spanning-Tree Errdisable-Timeout Enable

    PANNING OMMANDS SPANNING TREE ERRDISABLE TIMEOUT ENABLE spanning-tree errdisable-timeout enable Overview Use this command to enable the errdisable-timeout facility, which sets a timeout for ports that are disabled due to the BPDU guard feature. Use this command for RSTP or MSTP. Use the no variant of this command to disable the errdisable-timeout facility.
  • Page 498: Spanning-Tree Errdisable-Timeout Interval

    PANNING OMMANDS SPANNING TREE ERRDISABLE TIMEOUT INTERVAL spanning-tree errdisable-timeout interval Overview Use this command to specify the time interval after which a port is brought back up when it has been disabled by the BPDU guard feature. Use this command for RSTP or MSTP. Syntax spanning-tree errdisable-timeout interval <10-1000000>...
  • Page 499: Spanning-Tree Force-Version

    PANNING OMMANDS SPANNING TREE FORCE VERSION spanning-tree force-version Overview Use this command in Interface Configuration mode for a switch port interface only to force the protocol version for the switch port. Use this command for RSTP or MSTP only. spanning-tree force-version <version> Syntax no spanning-tree force-version Parameter...
  • Page 500: Spanning-Tree Forward-Time

    PANNING OMMANDS SPANNING TREE FORWARD TIME spanning-tree forward-time Overview Use this command to set the forward delay value. Use the no variant of this command to reset the forward delay value to the default setting of 15 seconds. The forward delay sets the time (in seconds) to control how fast a port changes its spanning tree state when moving towards the forwarding state.
  • Page 501: Spanning-Tree Guard Root

    PANNING OMMANDS SPANNING TREE GUARD ROOT spanning-tree guard root Overview Use this command in Interface Configuration mode for a switch port only to enable the Root Guard feature for the switch port. The root guard feature disables reception of superior BPDUs. You can use this command for RSTP, STP or MSTP. Use the no variant of this command to disable the root guard feature for the port.
  • Page 502: Spanning-Tree Hello-Time

    PANNING OMMANDS SPANNING TREE HELLO TIME spanning-tree hello-time Overview Use this command to set the hello-time. This sets the time in seconds between the transmission of device spanning tree configuration information when the device is the Root Bridge of the spanning tree or is trying to become the Root Bridge. Use this command for RSTP, STP or MSTP.
  • Page 503: Spanning-Tree Link-Type

    PANNING OMMANDS SPANNING TREE LINK TYPE spanning-tree link-type Overview Use this command in Interface Configuration mode for a switch port interface only to enable or disable point-to-point or shared link types on the switch port. Use this command for RSTP or MSTP only. Use the no variant of this command to return the port to the default link type.
  • Page 504: Spanning-Tree Max-Age

    PANNING OMMANDS SPANNING TREE MAX spanning-tree max-age Overview Use this command to set the max-age. This sets the maximum age, in seconds, that dynamic spanning tree configuration information is stored in the device before it is discarded. Use this command for RSTP, STP or MSTP. Use the no variant of this command to restore the default of max-age.
  • Page 505: Spanning-Tree Max-Hops (Mstp)

    PANNING OMMANDS (MSTP) SPANNING TREE MAX HOPS spanning-tree max-hops (MSTP) Overview Use this command to specify the maximum allowed hops for a BPDU in an MST region. This parameter is used by all the instances of the MST region. Use the no variant of this command to restore the default. Use this command for MSTP only.
  • Page 506: Spanning-Tree Mode

    PANNING OMMANDS SPANNING TREE MODE spanning-tree mode Overview Use this command to change the spanning tree protocol mode on the device. The spanning tree protocol mode on the device can be configured to either STP, RSTP or MSTP. spanning-tree mode {stp|rstp|mstp} Syntax Default The default spanning tree protocol mode on the device is RSTP.
  • Page 507: Spanning-Tree Mst Configuration

    PANNING OMMANDS SPANNING TREE MST CONFIGURATION spanning-tree mst configuration Overview Use this command to enter the MST Configuration mode to configure the Multiple Spanning-Tree Protocol. spanning-tree mst configuration Syntax Mode Global Configuration Examples The following example uses this command to enter MST Configuration mode. Note the change in the command prompt.
  • Page 508: Spanning-Tree Mst Instance

    PANNING OMMANDS SPANNING TREE MST INSTANCE spanning-tree mst instance Overview Use this command to assign a Multiple Spanning Tree instance (MSTI) to a switch port or channel group. Note that ports are automatically configured to send and receive spanning-tree information for the associated MSTI when VLANs are assigned to MSTIs using the instance vlan (MSTP) command.
  • Page 509: Spanning-Tree Mst Instance Path-Cost

    PANNING OMMANDS SPANNING TREE MST INSTANCE PATH COST spanning-tree mst instance path-cost Overview Use this command to set the cost of a path associated with a switch port, for the specified MSTI. This specifies the switch port’s contribution to the cost of a path to the MSTI regional root via that port.
  • Page 510 PANNING OMMANDS SPANNING TREE MST INSTANCE PATH COST To return the path cost to its default value on instance 3, use the commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# no spanning-tree mst instance 3 path-cost Related instance vlan (MSTP) Commands spanning-tree mst instance spanning-tree mst instance priority...
  • Page 511: Spanning-Tree Mst Instance Priority

    PANNING OMMANDS SPANNING TREE MST INSTANCE PRIORITY spanning-tree mst instance priority Overview Use this command in Interface Configuration mode for a switch port interface only to set the port priority for an MST instance (MSTI). Use the no variant of this command to restore the default priority value (128). Syntax spanning-tree mst instance <instance-id>...
  • Page 512: Spanning-Tree Mst Instance Restricted-Role

    PANNING OMMANDS SPANNING TREE MST INSTANCE RESTRICTED ROLE spanning-tree mst instance restricted-role Overview Use this command in Interface Configuration mode for a switch port interface only to enable the restricted role for an MSTI (Multiple Spanning Tree Instance) on a switch port.
  • Page 513 PANNING OMMANDS SPANNING TREE MST INSTANCE RESTRICTED ROLE Related instance vlan (MSTP) Commands spanning-tree priority (port priority) spanning-tree mst instance spanning-tree mst instance path-cost spanning-tree mst instance restricted-tcn C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 514: Spanning-Tree Mst Instance Restricted-Tcn

    PANNING OMMANDS SPANNING TREE MST INSTANCE RESTRICTED spanning-tree mst instance restricted-tcn Overview Use this command to prevent a switch port from propagating received topology change notifications and topology changes to other switch ports. This is named restricted TCN (Topology Change Notification). A TCN is a simple Bridge Protocol Data Unit (BPDU) that a bridge sends out to its root port to signal a topology change.
  • Page 515: Spanning-Tree Path-Cost

    PANNING OMMANDS SPANNING TREE PATH COST spanning-tree path-cost Overview Use this command in Interface Configuration mode for a switch port interface only to set the cost of a path for the specified port. This value then combines with others along the path to the root bridge in order to determine the total cost path value from the particular port, to the root bridge.
  • Page 516: Spanning-Tree Portfast (Stp)

    PANNING OMMANDS (STP) SPANNING TREE PORTFAST spanning-tree portfast (STP) Overview Use this command in Interface Configuration mode for a switch port interface only to set a port as an edge-port. The portfast feature enables a port to rapidly move to the forwarding state, without having first to pass through the intermediate spanning tree states.
  • Page 517 PANNING OMMANDS (STP) SPANNING TREE PORTFAST awplus# configure terminal Example awplus(config)# interface port1.0.2 awplus(config-if)# spanning-tree portfast Related spanning-tree edgeport (RSTP and MSTP) Commands show spanning-tree spanning-tree portfast bpdu-filter spanning-tree portfast bpdu-guard C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 518: Spanning-Tree Portfast Bpdu-Filter

    PANNING OMMANDS SPANNING TREE PORTFAST BPDU FILTER spanning-tree portfast bpdu-filter Overview This command sets the bpdu-filter feature and applies a filter to any BPDUs (Bridge Protocol Data Units) received. Enabling this feature ensures that configured ports will not transmit any BPDUs and will ignore (filter out) any BPDUs received. BPDU Filter is not enabled on a port by default.
  • Page 519 PANNING OMMANDS SPANNING TREE PORTFAST BPDU FILTER To enable STP BPDU filtering in Interface Configuration mode, enter the commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# spanning-tree portfast bpdu-filter enable Related spanning-tree edgeport (RSTP and MSTP) Commands show spanning-tree spanning-tree portfast (STP) spanning-tree portfast bpdu-guard C613-50105-01 REV C Command Reference for x210 Series...
  • Page 520: Spanning-Tree Portfast Bpdu-Guard

    PANNING OMMANDS SPANNING TREE PORTFAST BPDU GUARD spanning-tree portfast bpdu-guard Overview This command applies a BPDU (Bridge Protocol Data Unit) guard to the port. A port with the bpdu-guard feature enabled will block all traffic (BPDUs and user data), if it starts receiving BPDUs.
  • Page 521 PANNING OMMANDS SPANNING TREE PORTFAST BPDU GUARD Use the show spanning-tree command to display the device and port configurations for the BPDU Guard feature. It shows both the administratively configured and currently running values of bpdu-guard. Example To enable STP BPDU guard in Global Configuration mode, enter the below commands: awplus# configure terminal...
  • Page 522: Spanning-Tree Priority (Bridge Priority)

    PANNING OMMANDS SPANNING TREE PRIORITY BRIDGE PRIORITY spanning-tree priority (bridge priority) Overview Use this command to set the bridge priority for the device. A lower priority value indicates a greater likelihood of the device becoming the root bridge. Use this command for RSTP, STP or MSTP. When MSTP mode is configured, this will apply to the CIST.
  • Page 523: Spanning-Tree Priority (Port Priority)

    PANNING OMMANDS SPANNING TREE PRIORITY PORT PRIORITY spanning-tree priority (port priority) Overview Use this command in Interface Configuration mode for a switch port interface only to set the port priority for port. A lower priority value indicates a greater likelihood of the port becoming part of the active topology.
  • Page 524: Spanning-Tree Restricted-Role

    PANNING OMMANDS SPANNING TREE RESTRICTED ROLE spanning-tree restricted-role Overview Use this command in Interface Configuration mode for a switch port interface only to restrict the port from becoming a root port. Use the no variant of this command to disable the restricted role functionality. Syntax spanning-tree restricted-role no spanning-tree restricted-role...
  • Page 525: Spanning-Tree Restricted-Tcn

    PANNING OMMANDS SPANNING TREE RESTRICTED spanning-tree restricted-tcn Overview Use this command in Interface Configuration mode for a switch port interface only to prevent TCN (Topology Change Notification) BPDUs (Bridge Protocol Data Units) from being sent on a port. If this command is enabled, after a topology change a bridge is prevented from sending a TCN to its designated bridge.
  • Page 526: Spanning-Tree Transmit-Holdcount

    PANNING OMMANDS SPANNING TREE TRANSMIT HOLDCOUNT spanning-tree transmit-holdcount Overview Use this command to set the maximum number of BPDU transmissions that are held back. Use the no variant of this command to restore the default transmit hold-count value. Syntax spanning-tree transmit-holdcount no spanning-tree transmit-holdcount Default Transmit hold-count default is 3.
  • Page 527: Undebug Mstp

    PANNING OMMANDS UNDEBUG MSTP undebug mstp Overview This command applies the functionality of the no debug mstp (RSTP and STP) command. C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 528: Link Aggregation Commands

    Link Aggregation Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure a static channel group (static aggregator) and dynamic channel group (LACP channel group, etherchannel or LACP aggregator). Link aggregation is also sometimes referred to as channeling. : AlliedWare Plus™...
  • Page 529 GGREGATION OMMANDS • “lacp system-priority” on page 536 • “lacp timeout” on page 537 • “platform load-balancing” on page 539 • “show debugging lacp” on page 540 • “show diagnostic channel-group” on page 541 • “show etherchannel” on page 543 •...
  • Page 530: Channel-Group

    GGREGATION OMMANDS CHANNEL GROUP channel-group Overview Use this command to either create a new dynamic channel group while at the same time adding a port to it, or to add a port to an existing dynamic channel group. Note that you must also set the LACP mode to be either active or passive. You can create up to 8 channel groups, in any combination of dynamic (LACP) channel groups and static channel groups.
  • Page 531 GGREGATION OMMANDS CHANNEL GROUP Examples To add device port1.0.6 to a newly created LACP channel group 2 use the commands below: awplus# configure terminal awplus(config)# interface port1.0.6 awplus(config-if)# channel-group 2 mode active To remove device port1.0.6 from any created LACP channel groups use the command below: awplus# configure terminal...
  • Page 532: Clear Lacp Counters

    GGREGATION OMMANDS CLEAR LACP COUNTERS clear lacp counters Overview Use this command to clear all counters of all present LACP aggregators (channel groups) or a given LACP aggregator. clear lacp [<1-8>] counters Syntax Parameter Description <1-8> Channel-group number. Mode Privileged Exec awplus# clear lacp 2 counters Example...
  • Page 533: Debug Lacp

    GGREGATION OMMANDS DEBUG LACP debug lacp Overview Use this command to enable all LACP troubleshooting functions. Use the no variant of this command to disable this function. Syntax debug lacp {all|cli|event|ha|packet|sync|timer[detail]} no debug lacp {all|cli|event|ha|packet|sync|timer[detail]} Parameter Description Turn on all debugging for LACP. Specifies debugging for CLI messages.
  • Page 534: Lacp Global-Passive-Mode Enable

    GGREGATION OMMANDS LACP GLOBAL PASSIVE MODE ENABLE lacp global-passive-mode enable Overview Use this command to enable LACP channel-groups to dynamically self-configure when they are connected to another device that has LACP channel-groups configured with Active Mode. lacp global-passive-mode enable Syntax no lacp global-passive-mode enable Default Enabled...
  • Page 535: Lacp Port-Priority

    GGREGATION OMMANDS LACP PORT PRIORITY lacp port-priority Overview Use this command to set the priority of a device port. Ports are selected for aggregation based on their priority, with the higher priority (numerically lower) ports selected first. Use the no variant of this command to reset the priority of port to the default. Syntax lacp port-priority <1-65535>...
  • Page 536: Lacp System-Priority

    GGREGATION OMMANDS LACP SYSTEM PRIORITY lacp system-priority Overview Use this command to set the system priority of a local system. This is used in determining the system responsible for resolving conflicts in the choice of aggregation groups. Use the no variant of this command to reset the system priority of the local system to the default.
  • Page 537: Lacp Timeout

    GGREGATION OMMANDS LACP TIMEOUT lacp timeout Overview Use this command to set the short or long timeout on a port. Ports will time out of the aggregation if three consecutive updates are lost. lacp timeout {short|long} Syntax Parameter Description timeout Number of seconds before invalidating a received LACP data unit (DU).
  • Page 538 GGREGATION OMMANDS LACP TIMEOUT The following commands set the LACP short timeout for 1 second on port1.0.2. awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# lacp timeout short C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 539: Platform Load-Balancing

    GGREGATION OMMANDS PLATFORM LOAD BALANCING platform load-balancing Overview This command selects which address fields are used as inputs into the load balancing algorithm for aggregated links. The output from this algorithm is used to select which individual path a given packet will traverse within an aggregated link.
  • Page 540: Show Debugging Lacp

    GGREGATION OMMANDS SHOW DEBUGGING LACP show debugging lacp Overview Use this command to display the LACP debugging option set. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide. Syntax show debugging lacp Mode User Exec and Privileged Exec...
  • Page 541: Show Diagnostic Channel-Group

    Overview This command displays dynamic and static channel group interface status information. The output of this command is useful for Allied Telesis authorized service personnel for diagnostic purposes. For information on filtering and saving command output, see the “Getting Started...
  • Page 542 GGREGATION OMMANDS SHOW DIAGNOSTIC CHANNEL GROUP  Channel Group Info based on HW: Note: Pos - position in hardware table Only entries from first device are displayed. ------------------------------------------------------------- Interface IfIndex Member port IfIndex Active Pos ------------------------------------------------------------- 4503 N/a 4601 N/a ...
  • Page 543: Show Etherchannel

    GGREGATION OMMANDS SHOW ETHERCHANNEL show etherchannel Overview Use this command to display information about a LACP channel specified by the channel group number. The command output also shows the thrash limiting status. If thrash limiting is detected and the action parameter of the thrash-limiting command is set to vlan-disable, the output will also show the VLANs on which thrashing is detected.
  • Page 544: Show Etherchannel Detail

    GGREGATION OMMANDS SHOW ETHERCHANNEL DETAIL show etherchannel detail Overview Use this command to display detailed information about all LACP channels. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide, which is available on our website at alliedtelesis.com.
  • Page 545: Show Etherchannel Summary

    GGREGATION OMMANDS SHOW ETHERCHANNEL SUMMARY show etherchannel summary Overview Use this command to display a summary of all LACP channels. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide, which is available on our website at alliedtelesis.com.
  • Page 546: Show Lacp Sys-Id

    GGREGATION OMMANDS SHOW LACP SYS show lacp sys-id Overview Use this command to display the LACP system ID and priority. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide, which is available on our website at alliedtelesis.com.
  • Page 547: Show Lacp-Counter

    GGREGATION OMMANDS SHOW LACP COUNTER show lacp-counter Overview Use this command to display the packet traffic on all ports of all present LACP aggregators, or a given LACP aggregator. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 548: Show Port Etherchannel

    GGREGATION OMMANDS SHOW PORT ETHERCHANNEL show port etherchannel Overview Use this command to show LACP details of the device port specified. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide, which is available on our website at alliedtelesis.com.
  • Page 549: Show Static-Channel-Group

    GGREGATION OMMANDS SHOW STATIC CHANNEL GROUP show static-channel-group Overview Use this command to display all configured static channel groups and their corresponding member ports. Note that a static channel group is the same as a static aggregator. The command output also shows the thrash limiting status. If thrash limiting is detected and the action parameter of the thrash-limiting command is set to...
  • Page 550: Static-Channel-Group

    GGREGATION OMMANDS STATIC CHANNEL GROUP static-channel-group Overview Use this command to create a static channel group, or add a member port to an existing static channel group. Static channel groups are also known as static aggregators. You can create up to 8 channel groups, in any combination of static channel groups and dynamic (LACP) channel groups.
  • Page 551 GGREGATION OMMANDS STATIC CHANNEL GROUP To reference static channel group 2 as an interface, use the commands: awplus# configure terminal awplus(config)# interface sa2 awplus(config-if)# To make it possible to use QoS Storm Protection on static channel group 2 on port1.0.6, with an ACL named “test-acl”, use the commands: awplus# configure terminal awplus(config)#...
  • Page 552: Undebug Lacp

    GGREGATION OMMANDS UNDEBUG LACP undebug lacp Overview This command applies the functionality of the no debug lacp command. C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 553: Part 3: Layer Three, Switching And Routing

    Part 3: Layer Three, Switching and Routing C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 554: Ip Addressing And Protocol Commands

    IP Addressing and Protocol Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure various IP features, including the following protocols: • Address Resolution Protocol (ARP) For more information, see the IP Feature Overview and Configuration Guide.
  • Page 555: Arp-Aging-Timeout

    IP A DDRESSING AND ROTOCOL OMMANDS AGING TIMEOUT arp-aging-timeout Overview This command sets a timeout period on dynamic ARP entries associated with a specific interface. If your device stops receiving traffic for the host specified in a dynamic ARP entry, it deletes the ARP entry from the ARP cache after this timeout is reached.
  • Page 556: Arp (Ip Address Mac)

    IP A DDRESSING AND ROTOCOL OMMANDS MAC) ADDRESS arp (IP address MAC) Overview This command adds a static ARP entry to the ARP cache. This is typically used to add entries for hosts that do not support ARP or to speed up the address resolution function for a host.
  • Page 557: Arp Log

    IP A DDRESSING AND ROTOCOL OMMANDS ARP LOG arp log Overview This command enables the logging of dynamic and static ARP entries in the ARP cache. The ARP cache contains mappings of device ports, VLAN IDs, and IP addresses to physical MAC addresses for hosts. This command can display the MAC addresses in the ARP log either using the notation HHHH.HHHH.HHHH, or using the IEEE standard hexadecimal notation (HH-HH-HH-HH-HH-HH).
  • Page 558 IP A DDRESSING AND ROTOCOL OMMANDS ARP LOG To enable ARP logging and specify that the MAC address in the log message is displayed in the standard IEEE format hexadecimal notation (HH-HH-HH-HH-HH-HH), use the following commands: awplus# configure terminal awplus(config)# arp log mac-address-format ieee To leave ARP logging enabled, but stop using HH-HH-HH-HH-HH-HH format and use HHHH.HHHH.HHHH format instead, use the following commands:...
  • Page 559 IP A DDRESSING AND ROTOCOL OMMANDS ARP LOG The following table lists the parameters in output of the show log | include ARP_LOG command. The ARP log message format is: <date> <time> <severity> <hostname> <program-name>  ARP_LOG <port-number> <vid> <operation> <MAC> <IP> Table 1: Parameters in output of the show log | include ARP_LOG command Parameter Description...
  • Page 560: Arp-Reply-Bc-Dmac

    IP A DDRESSING AND ROTOCOL OMMANDS REPLY DMAC arp-reply-bc-dmac Overview Use this command to allow processing of ARP replies that arrive with a broadcast destination MAC (ffff.ffff.ffff). This makes neighbors reachable if they send ARP responses that contain a broadcast destination MAC. Use the no variant of this command to turn off processing of ARP replies that arrive with a broadcast destination MAC.
  • Page 561: Clear Arp-Cache

    IP A DDRESSING AND ROTOCOL OMMANDS CLEAR ARP CACHE clear arp-cache Overview This command deletes dynamic ARP entries from the ARP cache. You can optionally specify the IPv4 address of an ARP entry to be cleared from the ARP cache. clear arp-cache [<ip-address>] Syntax Parameter...
  • Page 562: Debug Ip Packet Interface

    IP A DDRESSING AND ROTOCOL OMMANDS DEBUG IP PACKET INTERFACE debug ip packet interface Overview The debug ip packet interface command enables IP packet debug and is controlled by the terminal monitor command. If the optional icmp keyword is specified then ICMP packets are shown in the output.
  • Page 563 IP A DDRESSING AND ROTOCOL OMMANDS DEBUG IP PACKET INTERFACE To turn on ARP packet debugging on vlan1, use the command: Examples awplus# debug ip packet interface vlan1 arp To turn on all packet debugging on all interfaces on the device, use the command: awplus# debug ip packet interface all To turn on TCP packet debugging on vlan1 and IP address 192.168.2.4, use...
  • Page 564: Ip Address (Ip Addressing And Protocol)

    IP A DDRESSING AND ROTOCOL OMMANDS (IP A IP ADDRESS DDRESSING AND ROTOCOL ip address (IP Addressing and Protocol) Overview This command sets a static IP address on an interface. The no variant of this command removes the IP address from the interface. You cannot remove the primary address when a secondary address is present.
  • Page 565 IP A DDRESSING AND ROTOCOL OMMANDS (IP A IP ADDRESS DDRESSING AND ROTOCOL To add the IP address 10.10.11.50/24 to the local loopback interface lo, use the following commands: awplus# configure terminal awplus(config)# interface lo awplus(config-if)# ip address 10.10.11.50/24 Related interface (to configure) Commands show ip interface...
  • Page 566: Ip Gratuitous-Arp-Link

    IP A DDRESSING AND ROTOCOL OMMANDS IP GRATUITOUS LINK ip gratuitous-arp-link Overview This command sets the Gratuitous ARP time limit for all switchports. The time limit restricts the sending of Gratuitous ARP packets to one Gratuitous ARP packet within the time in seconds. : This command specifies time between sequences of Gratuitous ARP packets, NOTE and time between individual Gratuitous ARP packets occurring in a sequence, to allow...
  • Page 567 IP A DDRESSING AND ROTOCOL OMMANDS IP GRATUITOUS LINK To restrict the sending of Gratuitous ARP packets to one every 20 seconds, use the commands: awplus# configure terminal awplus(config)# ip gratuitous-arp-link 20 Validation show running-config Commands C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 568: Ip Unreachables

    IP A DDRESSING AND ROTOCOL OMMANDS IP UNREACHABLES ip unreachables Overview Use this command to enable ICMP (Internet Control Message Protocol) type 3, destination unreachable, messages. Use the no variant of this command to disable destination unreachable messages. This prevents an attacker from using these messages to discover the topology of a network.
  • Page 569 IP A DDRESSING AND ROTOCOL OMMANDS IP UNREACHABLES Table 17-1: ICMP type 3 reason codes and description (cont.) Code Description [RFC] Host Precedence Violation [RFC1812] Precedence cutoff in effect [RFC1812] Example To disable destination unreachable messages, use the commands awplus# configure terminal awplus(config)# no ip unreachables...
  • Page 570: Ping

    IP A DDRESSING AND ROTOCOL OMMANDS PING ping Overview This command sends a query to another IPv4 host (send Echo Request messages). ping [ip] <host> [broadcast] [df-bit {yes|no}] [interval Syntax <0-128>] [pattern <hex-data-pattern>] [repeat {<1-2147483647>|continuous}] [size <36-18024>] [source <ip-addr>] [timeout <1-65535>] [tos <0-255>] Parameter Description <host>...
  • Page 571: Show Arp

    IP A DDRESSING AND ROTOCOL OMMANDS SHOW ARP show arp Overview Use this command to display entries in the ARP routing and forwarding table—the ARP cache contains mappings of IP addresses to physical addresses for hosts. To have a dynamic entry in the ARP cache, a host must have used the ARP protocol to access another host.
  • Page 572 IP A DDRESSING AND ROTOCOL OMMANDS SHOW ARP Related arp (IP address MAC) Commands clear arp-cache C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 573: Show Debugging Ip Packet

    IP A DDRESSING AND ROTOCOL OMMANDS SHOW DEBUGGING IP PACKET show debugging ip packet Overview Use this command to show the IP interface debugging status. IP interface debugging is set using the debug ip packet interface command. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 574 IP A DDRESSING AND ROTOCOL OMMANDS SHOW DEBUGGING IP PACKET Related debug ip packet interface Commands terminal monitor C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 575: Show Ip Interface

    IP A DDRESSING AND ROTOCOL OMMANDS SHOW IP INTERFACE show ip interface Overview Use this command to display information about interfaces and the IP addresses assigned to them. To display information about a specific interface, specify the interface name with the command. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 576: Show Ip Sockets

    IP A DDRESSING AND ROTOCOL OMMANDS SHOW IP SOCKETS show ip sockets Overview Use this command to display information about the IP or TCP sockets that are present on the device. It includes TCP, UDP listen sockets, displaying associated IP address and port.
  • Page 577 IP A DDRESSING AND ROTOCOL OMMANDS SHOW IP SOCKETS tcp :::23 :::* LISTEN udp 0.0.0.0:111 0.0.0.0:* udp 226.94.1.1:5405 0.0.0.0:* udp 0.0.0.0:161 0.0.0.0:* udp :::161 :::* raw 0.0.0.0:112 0.0.0.0:* 112 raw :::58 :::* 58 raw :::112 :::* 112 Table 19: Parameters in the output of the show ip sockets command Parameter Description Not showing...
  • Page 578 IP A DDRESSING AND ROTOCOL OMMANDS SHOW IP SOCKETS Table 19: Parameters in the output of the show ip sockets command (cont.) Parameter Description Remote For TCP and UDP listening sockets this shows the source IP address Address (either IPv4 or IPv6) and source TCP or UDP port number for which the socket will accept packets.
  • Page 579: Tcpdump

    IP A DDRESSING AND ROTOCOL OMMANDS TCPDUMP tcpdump Overview Use this command to start a tcpdump, which gives the same output as the Unix-like tcpdump command to display TCP/IP traffic. Press <ctrl> + c to stop a running tcpdump. tcpdump <line> Syntax Parameter Description...
  • Page 580: Traceroute

    IP A DDRESSING AND ROTOCOL OMMANDS TRACEROUTE traceroute Overview Use this command to trace the route to the specified IPv4 host. traceroute {<ip-addr>|<hostname>} Syntax Parameter Description <ip-addr> The destination IPv4 address. The IPv4 address uses the format A.B.C.D. <hostname> The destination hostname. Mode User Exec and Privileged Exec awplus#...
  • Page 581: Undebug Ip Packet Interface

    IP A DDRESSING AND ROTOCOL OMMANDS UNDEBUG IP PACKET INTERFACE undebug ip packet interface Overview This command applies the functionality of the no debug ip packet interface command. C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 582: Ipv6 Commands

    IPv6 Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure IPv6. For more information, see the IPv6 Feature Overview and Configuration Guide. Command List • “clear ipv6 neighbors” on page 583 • “ipv6 address” on page 584 •...
  • Page 583: Clear Ipv6 Neighbors

    OMMANDS CLEAR IPV NEIGHBORS clear ipv6 neighbors Overview Use this command to clear all dynamic IPv6 neighbor entries. clear ipv6 neighbors Syntax Mode Privileged Exec awplus# clear ipv6 neighbors Example C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 584: Ipv6 Address

    OMMANDS ADDRESS ipv6 address Overview Use this command to set the IPv6 address of a VLAN interface and enable IPv6. Use the no variant of this command to remove the IPv6 address assigned and disable IPv6. Note that if no global addresses are left after removing the IPv6 address then IPv6 is disabled.
  • Page 585: Ipv6 Enable

    OMMANDS ENABLE ipv6 enable Overview Use this command to enable IPv6 on an interface without an IPv6 global address for the interface. This enables IPv6 with a IPv6 link-local address, not an IPv6 global address. Use the no variant of this command to disable IPv6 on an interface without a global address.
  • Page 586: Ipv6 Forwarding

    OMMANDS FORWARDING ipv6 forwarding Overview Use this command to turn on IPv6 unicast routing for IPv6 packet forwarding. Execute this command globally on your device prior to issuing ipv6 enable individual interfaces. Use this no variant of this command to turn off IPv6 unicast routing. Note IPv6 unicast routing is disabled by default.
  • Page 587: Ipv6 Multicast Forward-Slow-Path-Packet

    OMMANDS MULTICAST FORWARD SLOW PATH PACKET ipv6 multicast forward-slow-path-packet Overview Use this command to enable multicast packets to be forwarded to the CPU. Enabling this command will ensure that the layer L3 MTU is set correctly for each IP multicast group and will apply the value of the smallest MTU among the outgoing interfaces for the multicast group.
  • Page 588: Ipv6 Neighbor

    OMMANDS NEIGHBOR ipv6 neighbor Overview Use this command to add a static IPv6 neighbor entry. Use the no variant of this command to remove a specific IPv6 neighbor entry. Syntax ipv6 neighbor <ipv6-address> <vlan-name> <mac-address> <port-list> no ipv6 neighbor <ipv6-address> <vlan-name> <port-list> Parameter Description <ipv6-address>...
  • Page 589: Ipv6 Unreachables

    OMMANDS UNREACHABLES ipv6 unreachables Overview Use this command to enable ICMPv6 (Internet Control Message Protocol version 6) type 1, destination unreachable, messages. Use the no variant of this command to disable destination unreachable messages. This prevents an attacker from using these messages to discover the topology of a network.
  • Page 590: Ping Ipv6

    OMMANDS PING IPV ping ipv6 Overview This command sends a query to another IPv6 host (send Echo Request messages). : Use of the interface parameter keyword, plus an interface or an interface range, NOTE with this command is only valid when pinging an IPv6 link local address. Syntax ping ipv6 {<host>|<ipv6-address>} [repeat {<1-2147483647>|continuous}] [size <10-1452>] [interface...
  • Page 591: Show Ipv6 Forwarding

    OMMANDS SHOW IPV FORWARDING show ipv6 forwarding Overview Use this command to display IPv6 forwarding status. show ipv6 forwarding Syntax Mode User Exec and Privileged Exec awplus# show ipv6 forwarding Example Output Figure 18-1: Example output from the show ipv6 forwarding command ...
  • Page 592: Show Ipv6 Interface Brief

    OMMANDS SHOW IPV INTERFACE BRIEF show ipv6 interface brief Overview Use this command to display brief information about interfaces and the IPv6 address assigned to them. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 593: Show Ipv6 Neighbors

    OMMANDS SHOW IPV NEIGHBORS show ipv6 neighbors Overview Use this command to display all IPv6 neighbors. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide. Syntax show ipv6 neighbors Mode User Exec and Privileged Exec C613-50105-01 REV C...
  • Page 594: Traceroute Ipv6

    OMMANDS TRACEROUTE IPV traceroute ipv6 Overview Use this command to trace the route to the specified IPv6 host. traceroute ipv6 {<ipv6-addr>|<hostname>} Syntax Parameter Description <ipv6-addr> The destination IPv6 address. The IPv6 address uses the format X:X::X:X. <hostname> The destination hostname. Mode User Exec and Privileged Exec Example...
  • Page 595: Static Routing Commands For Management Purposes

    Static Routing Commands for Management Purposes Introduction Overview This chapter provides an alphabetical reference of static routing commands that are used to direct management packets to appropriate VLANs. Command List • “ip route” on page 596 • “max-fib-routes” on page 597 •...
  • Page 596: Ip Route

    TATIC OUTING OMMANDS FOR ANAGEMENT URPOSES IP ROUTE ip route Overview This command creates a static route, in order to send management packets to the appropriate VLAN. Your switch does not use static routes to route traffic from one VLAN to another VLAN, even if the VLANs have IP addresses.
  • Page 597: Max-Fib-Routes

    TATIC OUTING OMMANDS FOR ANAGEMENT URPOSES ROUTES max-fib-routes Overview This command enables you to control the maximum number of FIB routes configured. It operates by providing parameters that enable you to configure preset maximums and warning message thresholds. The operation of these parameters is explained in the Parameter / Description table shown below.
  • Page 598: Max-Static-Routes

    TATIC OUTING OMMANDS FOR ANAGEMENT URPOSES STATIC ROUTES max-static-routes Overview Use this command to set the maximum number of static routes, excluding FIB (Forwarding Information Base) routes. : For FIB routes use the max-fib-routes command. NOTE Use the no variant of this command to set the maximum number of static routes to the default of 1000 static routes.
  • Page 599: Show Ip Route

    TATIC OUTING OMMANDS FOR ANAGEMENT URPOSES SHOW IP ROUTE show ip route Overview Use this command to display routing entries in the FIB (Forwarding Information Base). The FIB contains the best routes to a destination, and your device uses these routes when forwarding traffic.
  • Page 600 TATIC OUTING OMMANDS FOR ANAGEMENT URPOSES SHOW IP ROUTE Figure 19-1: Example output from the show ip route command Codes: C - connected, S - static, R - RIP, B - BGP O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2...
  • Page 601: Show Ip Route Database

    TATIC OUTING OMMANDS FOR ANAGEMENT URPOSES SHOW IP ROUTE DATABASE show ip route database Overview This command displays the routing entries in the RIB (Routing Information Base). When multiple entries are available for the same prefix, RIB uses the routes’ administrative distances to choose the best route.
  • Page 602: Show Ip Route Summary

    TATIC OUTING OMMANDS FOR ANAGEMENT URPOSES SHOW IP ROUTE SUMMARY show ip route summary Overview This command displays a summary of the current RIB (Routing Information Base) entries. To modify the lines displayed, use the | (output modifier token); to save the output to a file, use the >...
  • Page 603: Part 4: Multicast Applications

    Part 4: Multicast Applications C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 604: Igmp And Igmp Snooping Commands

    IGMP and IGMP Snooping Commands Introduction Overview Devices running AlliedWare Plus use IGMP (Internet Group Management Protocol) and MLD (Multicast Listener Discovery) to track which multicast groups their clients belong to. This enables them to send the correct multimedia streams to the correct destinations.
  • Page 605 IGMP IGMP S NOOPING OMMANDS • “ip igmp ra-option” on page 626 • “ip igmp robustness-variable” on page 627 • “ip igmp snooping” on page 628 • “ip igmp snooping fast-leave” on page 629 • “ip igmp snooping mrouter” on page 630 •...
  • Page 606: Clear Ip Igmp

    IGMP IGMP S NOOPING OMMANDS CLEAR IP IGMP clear ip igmp Overview Use this command to clear all IGMP group membership records on all interfaces. clear ip igmp Syntax Mode Privileged Exec awplus# clear ip igmp Example Related clear ip igmp group Commands clear ip igmp interface show ip igmp interface...
  • Page 607: Clear Ip Igmp Group

    IGMP IGMP S NOOPING OMMANDS CLEAR IP IGMP GROUP clear ip igmp group Overview Use this command to clear IGMP group membership records for a specific group on either all interfaces, a single interface, or for a range of interfaces. clear ip igmp group * Syntax clear ip igmp group <ip-address>...
  • Page 608: Clear Ip Igmp Interface

    IGMP IGMP S NOOPING OMMANDS CLEAR IP IGMP INTERFACE clear ip igmp interface Overview Use this command to clear IGMP group membership records on a particular interface. clear ip igmp interface <interface> Syntax Parameter Description <interface> Specifies the name of the interface. All groups learned on this interface are deleted.
  • Page 609: Debug Igmp

    IGMP IGMP S NOOPING OMMANDS DEBUG IGMP debug igmp Overview Use this command to enable debugging of either all IGMP or a specific component of IGMP. Use the no variant of this command to disable all IGMP debugging, or debugging of a specific component of IGMP.
  • Page 610: Ip Igmp

    IGMP IGMP S NOOPING OMMANDS IP IGMP ip igmp Overview Use this command to enable IGMP on an interface. The command configures the device as an IGMP querier. Use the no variant of this command to return all IGMP related configuration to the default on this interface.
  • Page 611: Ip Igmp Access-Group

    IGMP IGMP S NOOPING OMMANDS IP IGMP ACCESS GROUP ip igmp access-group Overview This command adds an access control list to a VLAN interface configured for IGMP or IGMP Snooping. The access control list is used to control and filter the multicast groups learned on the VLAN interface.
  • Page 612: Ip Igmp Flood Specific-Query

    IGMP IGMP S NOOPING OMMANDS IP IGMP FLOOD SPECIFIC QUERY ip igmp flood specific-query Overview Use this command if you want IGMP to flood specific queries to all VLAN member ports, instead of only sending the queries to multicast group member ports. Use the no variant of this command if you want IGMP to only send the queries to multicast group member ports.
  • Page 613: Ip Igmp Immediate-Leave

    IGMP IGMP S NOOPING OMMANDS IP IGMP IMMEDIATE LEAVE ip igmp immediate-leave Overview In IGMP version 2, use this command to minimize the leave latency of IGMP memberships for specified multicast groups. The specified access list number or name defines the multicast groups in which the immediate leave feature is enabled.
  • Page 614: Ip Igmp Last-Member-Query-Count

    IGMP IGMP S NOOPING OMMANDS IP IGMP LAST MEMBER QUERY COUNT ip igmp last-member-query-count Overview Use this command to set the last-member query-count value for an interface. Use the no variant of this command to return to the default on an interface. Syntax ip igmp last-member-query-count <2-7>...
  • Page 615: Ip Igmp Last-Member-Query-Interval

    IGMP IGMP S NOOPING OMMANDS IP IGMP LAST MEMBER QUERY INTERVAL ip igmp last-member-query-interval Overview Use this command to configure the frequency at which the router sends IGMP group specific host query messages. Use the no variant of this command to set this frequency to the default. Syntax ip igmp last-member-query-interval <interval>...
  • Page 616: Ip Igmp Limit

    IGMP IGMP S NOOPING OMMANDS IP IGMP LIMIT ip igmp limit Overview Use this command to configure the limit on the maximum number of group membership entries for the device as a whole or for the specified interface (if in interface mode).
  • Page 617: Ip Igmp Maximum-Groups

    IGMP IGMP S NOOPING OMMANDS IP IGMP MAXIMUM GROUPS ip igmp maximum-groups Overview Use this command to set a limit, per switch port, on the number of IGMP groups clients can join. This stops a single client from using all the switch’s available group-entry resources, and ensures that clients on all ports have a chance to join IGMP groups.
  • Page 618 IGMP IGMP S NOOPING OMMANDS IP IGMP MAXIMUM GROUPS Example To limit clients to 10 groups on port 1.0.1, which is in vlan1, use the commands: awplus# configure terminal awplus(config)# interface port1.0.1 awplus(config-if)# ip igmp maximum-groups 10 awplus(config-if)# exit awplus(config)# interface vlan1 awplus(config-if)# ip igmp snooping fast-leave...
  • Page 619: Ip Igmp Querier-Timeout

    IGMP IGMP S NOOPING OMMANDS IP IGMP QUERIER TIMEOUT ip igmp querier-timeout Overview Use this command to configure the timeout period before the device takes over as the querier for the interface after the previous querier has stopped querying. Use the no variant of this command to restore the default. Syntax ip igmp querier-timeout <timeout>...
  • Page 620: Ip Igmp Query-Holdtime

    IGMP IGMP S NOOPING OMMANDS IP IGMP QUERY HOLDTIME ip igmp query-holdtime Overview This command sets the time that an IGMP Querier waits after receiving a query solicitation before it sends an IGMP Query. IGMP General Query messages will not be sent during the hold time interval.
  • Page 621 IGMP IGMP S NOOPING OMMANDS IP IGMP QUERY HOLDTIME Related ip igmp query-interval Commands ip igmp snooping tcn query solicit show ip igmp interface show running-config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 622: Ip Igmp Query-Interval

    IGMP IGMP S NOOPING OMMANDS IP IGMP QUERY INTERVAL ip igmp query-interval Overview Use this command to configure the period for sending IGMP General Query messages. The IGMP query interval specifies the time between IGMP General Query messages being sent. Use the no variant of this command to return to the default query interval period.
  • Page 623 IGMP IGMP S NOOPING OMMANDS IP IGMP QUERY INTERVAL To reset the period between sending IGMP host-query messages to the default (125 seconds) for vlan10, use the following commands: awplus# configure terminal awplus(config)# interface vlan10 awplus(config-if)# no ip igmp query-interval Related ip igmp query-holdtime Commands...
  • Page 624: Ip Igmp Query-Max-Response-Time

    IGMP IGMP S NOOPING OMMANDS IP IGMP QUERY RESPONSE TIME ip igmp query-max-response-time Overview Use this command to configure the maximum response time advertised in IGMP Queries. Use the no variant of this command to restore the default. : The IGMP query maximum response time must be less than the IGMP query NOTE interval.
  • Page 625 IGMP IGMP S NOOPING OMMANDS IP IGMP QUERY RESPONSE TIME Related ip igmp query-interval Commands show ip igmp interface show running-config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 626: Ip Igmp Ra-Option

    IGMP IGMP S NOOPING OMMANDS IP IGMP RA OPTION ip igmp ra-option Overview Use this command to enable strict Router Alert (RA) option validation. With strict RA option enabled, IGMP packets without RA options are ignored. ip igmp ra-option Syntax no ip igmp ra-option Default The default state of RA validation is unset.
  • Page 627: Ip Igmp Robustness-Variable

    IGMP IGMP S NOOPING OMMANDS IP IGMP ROBUSTNESS VARIABLE ip igmp robustness-variable Overview Use this command to change the robustness variable value on an interface. Use the no variant of this command to return to the default on an interface. Syntax ip igmp robustness-variable <1-7>...
  • Page 628: Ip Igmp Snooping

    IGMP IGMP S NOOPING OMMANDS IP IGMP SNOOPING ip igmp snooping Overview Use this command to enable IGMP Snooping. When this command is used in the Global Configuration mode, IGMP Snooping is enabled at the device level. When this command is used in Interface Configuration mode, IGMP Snooping is enabled for the specified VLANs.
  • Page 629: Ip Igmp Snooping Fast-Leave

    IGMP IGMP S NOOPING OMMANDS IP IGMP SNOOPING FAST LEAVE ip igmp snooping fast-leave Overview Use this command to enable IGMP Snooping fast-leave processing. Fast-leave processing is analogous to immediate-leave processing. The IGMP group-membership entry is removed as soon as an IGMP leave group message is received, without sending out a group-specific query.
  • Page 630: Ip Igmp Snooping Mrouter

    IGMP IGMP S NOOPING OMMANDS IP IGMP SNOOPING MROUTER ip igmp snooping mrouter Overview Use this command to statically configure the specified port as a multicast router port for IGMP Snooping for an interface. This command applies to interfaces configured for IGMP Snooping. Use the no variant of this command to remove the static configuration of the port as a multicast router port.
  • Page 631: Ip Igmp Snooping Querier

    IGMP IGMP S NOOPING OMMANDS IP IGMP SNOOPING QUERIER ip igmp snooping querier Overview Use this command to enable IGMP querier operation when no multicast routing protocol is configured. When enabled, the IGMP Snooping querier sends out periodic IGMP queries for all interfaces. This command applies to interfaces configured for IGMP Snooping.
  • Page 632: Ip Igmp Snooping Report-Suppression

    IGMP IGMP S NOOPING OMMANDS IP IGMP SNOOPING REPORT SUPPRESSION ip igmp snooping report-suppression Overview Use this command to enable report suppression for IGMP versions 1 and 2. This command applies to interfaces configured for IGMP Snooping. Report suppression stops reports being sent to an upstream multicast router port when there are already downstream ports for this group on this interface.
  • Page 633: Ip Igmp Snooping Routermode

    IGMP IGMP S NOOPING OMMANDS IP IGMP SNOOPING ROUTERMODE ip igmp snooping routermode Overview Use this command to set the destination IP addresses as router multicast addresses. Use the no variant of this command to set it to the default. You can also remove a specified IP address from a custom list of multicast addresses.
  • Page 634 IGMP IGMP S NOOPING OMMANDS IP IGMP SNOOPING ROUTERMODE Examples To set ip igmp snooping routermode for all default reserved addresses enter: awplus(config)# ip igmp snooping routermode default To remove the multicast address 224.0.0.5 from the custom list of multicast addresses enter: awplus(config)# no ip igmp snooping routermode address...
  • Page 635: Ip Igmp Snooping Tcn Query Solicit

    IGMP IGMP S NOOPING OMMANDS IP IGMP SNOOPING TCN QUERY SOLICIT ip igmp snooping tcn query solicit Overview Use this command to enable IGMP (Internet Group Management Protocol) Snooping TCN (Topology Change Notification) Query Solicitation feature. When this command is used in the Global Configuration mode, Query Solicitation is enabled.
  • Page 636 IGMP IGMP S NOOPING OMMANDS IP IGMP SNOOPING TCN QUERY SOLICIT Command issued from Command issued Device is STP Root Global from Interface Bridge or the IGMP Query Solicit Configuration Configuration EPSR Master Node message sent on VLAN See the IGMP Feature Overview and Configuration Guide for introductory information about the Query Solicitation feature.
  • Page 637: Ip Igmp Source-Address-Check

    IGMP IGMP S NOOPING OMMANDS IP IGMP SOURCE ADDRESS CHECK ip igmp source-address-check Overview This command enables the checking of the Source Address for an IGMP Report, rejecting any IGMP Reports originating on devices outside of the local subnet. Use the no variant of this command to disable the checking of the Source Address for an IGMP Report, which allows IGMP Reports from devices outside of the local subnet.
  • Page 638: Ip Igmp Static-Group

    IGMP IGMP S NOOPING OMMANDS IP IGMP STATIC GROUP ip igmp static-group Overview Use this command to statically configure multicast group membership entries on a VLAN interface, or to statically forward a multicast channel out a particular port or port range. To statically add only a group membership, do not specify any parameters.
  • Page 639 IGMP IGMP S NOOPING OMMANDS IP IGMP STATIC GROUP Example The following example show how to statically add group and source records for IGMP on vlan3: awplus# configure terminal awplus(config)# interface vlan3 awplus(config-if)# ip igmp awplus(config-if)# ip igmp static-group 226.1.2.4 source 10.2.3.4 C613-50105-01 REV C Command Reference for x210 Series...
  • Page 640: Ip Igmp Startup-Query-Count

    IGMP IGMP S NOOPING OMMANDS IP IGMP STARTUP QUERY COUNT ip igmp startup-query-count Overview Use this command to configure the IGMP startup query count for an interface. The IGMP startup query count is the number of IGMP General Query messages sent by a querier at startup.
  • Page 641: Ip Igmp Startup-Query-Interval

    IGMP IGMP S NOOPING OMMANDS IP IGMP STARTUP QUERY INTERVAL ip igmp startup-query-interval Overview Use this command to configure the IGMP startup query interval for an interface. The IGMP startup query interval is the amount of time in seconds between successive IGMP General Query messages sent by a querier during startup.
  • Page 642: Ip Igmp Trusted

    IGMP IGMP S NOOPING OMMANDS IP IGMP TRUSTED ip igmp trusted Overview Use this command to allow IGMP to process packets received on certain trusted ports only. Use the no variant of this command to stop IGMP from processing specified packets if the packets are received on the specified ports or aggregator.
  • Page 643: Ip Igmp Version

    IGMP IGMP S NOOPING OMMANDS IP IGMP VERSION ip igmp version Overview Use this command to set the current IGMP version (IGMP version 1, 2 or 3) on an interface. Use the no variant of this command to return to the default version. Syntax ip igmp version <1-3>...
  • Page 644: Show Debugging Igmp

    IGMP IGMP S NOOPING OMMANDS SHOW DEBUGGING IGMP show debugging igmp Overview Use this command to display the IGMP debugging options set. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 645: Show Ip Igmp Groups

    IGMP IGMP S NOOPING OMMANDS SHOW IP IGMP GROUPS show ip igmp groups Overview Use this command to display the multicast groups with receivers directly connected to the router, and learned through IGMP. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 646 IGMP IGMP S NOOPING OMMANDS SHOW IP IGMP GROUPS Table 1: Parameters in the output of the show ip igmp groups command (cont.) Parameter Description Expires Time (in hours, minutes, and seconds) until the entry expires. Last Last host to report being a member of the multicast group. Reporter C613-50105-01 REV C Command Reference for x210 Series...
  • Page 647: Show Ip Igmp Interface

    IGMP IGMP S NOOPING OMMANDS SHOW IP IGMP INTERFACE show ip igmp interface Overview Use this command to display the state of IGMP Snooping for a specified VLAN, or all VLANs. IGMP is shown as Active or Disabled in the show output. You can also display the number of groups a switch port belongs to.
  • Page 648 IGMP IGMP S NOOPING OMMANDS SHOW IP IGMP INTERFACE awplus#show ip igmp interface vlan2 Interface vlan2 (Index 202) IGMP Disabled, Inactive, Version 3 (default) IGMP interface has 0 group-record states IGMP activity: 0 joins, 0 leaves IGMP robustness variable is 2 IGMP last member query count is 2...
  • Page 649: Show Ip Igmp Snooping Mrouter

    IGMP IGMP S NOOPING OMMANDS SHOW IP IGMP SNOOPING MROUTER show ip igmp snooping mrouter Overview Use this command to display the multicast router ports, both static and dynamic, in a VLAN. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 650: Show Ip Igmp Snooping Routermode

    IGMP IGMP S NOOPING OMMANDS SHOW IP IGMP SNOOPING ROUTERMODE show ip igmp snooping routermode Overview Use this command to display the current routermode and the list of IP addresses set as router multicast addresses from the ip igmp snooping routermode command.
  • Page 651: Show Ip Igmp Snooping Statistics

    IGMP IGMP S NOOPING OMMANDS SHOW IP IGMP SNOOPING STATISTICS show ip igmp snooping statistics Overview Use this command to display IGMP Snooping statistics data. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 652 IGMP IGMP S NOOPING OMMANDS SHOW IP IGMP SNOOPING STATISTICS Figure 20-7: Example output from the show ip igmp snooping statistics command for a switch port awplus#show ip igmp interface port1.0.1 IGMP information for port1.0.1 Maximum groups limit set: 10 Number of groups port belongs to: 0 C613-50105-01 REV C Command Reference for x210 Series...
  • Page 653: Undebug Igmp

    IGMP IGMP S NOOPING OMMANDS UNDEBUG IGMP undebug igmp Overview This command applies the functionality of the no debug igmp command. C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 654: Mld Snooping Commands

    MLD Snooping Commands Introduction Overview This chapter provides an alphabetical reference of configuration, clear, and show commands related to MLD Snooping. Command List • “clear ipv6 mld” on page 655 • “clear ipv6 mld group” on page 656 • “clear ipv6 mld interface”...
  • Page 655: Clear Ipv6 Mld

    MLD S NOOPING OMMANDS CLEAR IPV clear ipv6 mld Overview Use this command to clear all MLD local memberships on all interfaces. clear ipv6 mld Syntax Mode Privileged Exec awplus# clear ipv6 mld Example Related clear ipv6 mld group Commands clear ipv6 mld interface C613-50105-01 REV C Command Reference for x210 Series...
  • Page 656: Clear Ipv6 Mld Group

    MLD S NOOPING OMMANDS CLEAR IPV MLD GROUP clear ipv6 mld group Overview Use this command to clear MLD specific local-membership(s) on all interfaces, for a particular group. clear ipv6 mld group {*|<ipv6-address>} Syntax Parameter Description Clears all groups on all interfaces. This is an alias to the clear ipv6 mld command.
  • Page 657: Clear Ipv6 Mld Interface

    MLD S NOOPING OMMANDS CLEAR IPV MLD INTERFACE clear ipv6 mld interface Overview Use this command to clear MLD interface entries. clear ipv6 mld interface <interface> Syntax Parameter Description <interface> Specifies name of the interface; all groups learned from this interface are deleted.
  • Page 658: Debug Mld

    MLD S NOOPING OMMANDS DEBUG MLD debug mld Overview Use this command to enable all MLD debugging modes, or a specific MLD debugging mode. Use the no variant of this command to disable all MLD debugging modes, or a specific MLD debugging mode. Syntax debug mld {all|decode|encode|events|fsm|tib} no debug mld {all|decode|encode|events|fsm|tib}...
  • Page 659: Ipv6 Mld Access-Group

    MLD S NOOPING OMMANDS MLD ACCESS GROUP ipv6 mld access-group Overview Use this command to control the multicast local-membership groups learned on an interface. Use the no variant of this command to disable this access control. Syntax ipv6 mld access-group <IPv6-access-list-name> no ipv6 mld access-group Parameter Description...
  • Page 660: Ipv6 Mld Immediate-Leave

    MLD S NOOPING OMMANDS MLD IMMEDIATE LEAVE ipv6 mld immediate-leave Overview Use this command to minimize the leave latency of MLD memberships. Use the no variant of this command to disable this feature. Syntax ipv6 mld immediate-leave group-list <IPv6-access-list-name> no ipv6 mld immediate-leave Parameter Description <IPv6-access-...
  • Page 661: Ipv6 Mld Limit

    MLD S NOOPING OMMANDS MLD LIMIT ipv6 mld limit Overview Use this command to configure a limit on the maximum number of group memberships that may be learned. The limit may be set for the device as a whole, or for a specific interface. Once the specified group membership limit is reached, all further local-memberships will be ignored.
  • Page 662 MLD S NOOPING OMMANDS MLD LIMIT The following example configures an MLD limit of 100 group-membership states on the VLAN interface vlan2: awplus# configure terminal awplus(config)# ipv6 forwarding awplus(config)# ipv6 multicast-routing awplus(config)# interface vlan2 awplus(config-if)# ipv6 enable awplus(config-if)# ipv6 mld limit 100 The following example configures an MLD limit of 100 group-membership states on the VLAN interfaces vlan2-vlan4: awplus#...
  • Page 663: Ipv6 Mld Snooping

    MLD S NOOPING OMMANDS MLD SNOOPING ipv6 mld snooping Overview Use this command to enable MLD Snooping. When this command is issued in the Global Configuration mode, MLD Snooping is enabled globally for the device. When this command is issued in Interface mode for a VLAN then MLD Snooping is enabled for the specified VLAN.
  • Page 664 MLD S NOOPING OMMANDS MLD SNOOPING To configure MLD Snooping on the VLAN interfaces vlan2-vlan4, enter the following commands: awplus# configure terminal awplus(config)# interface vlan2-vlan4 awplus(config-if)# ipv6 mld snooping To disable MLD Snooping for the VLAN interface vlan2, enter the following commands: awplus# configure terminal...
  • Page 665: Ipv6 Mld Snooping Fast-Leave

    MLD S NOOPING OMMANDS MLD SNOOPING FAST LEAVE ipv6 mld snooping fast-leave Overview Use this command to enable MLD Snooping fast-leave processing. Fast-leave processing is analogous to immediate-leave processing; the MLD group-membership is removed as soon as an MLD leave group message is received, without sending out a group-specific query.
  • Page 666: Ipv6 Mld Snooping Mrouter

    MLD S NOOPING OMMANDS MLD SNOOPING MROUTER ipv6 mld snooping mrouter Overview Use this command to statically configure the specified port as a Multicast Router interface for MLD Snooping within the specified VLAN. See detailed usage notes below to configure static multicast router ports when using static IPv6 multicast routes with EPSR, and the destination VLAN is an EPSR data VLAN.
  • Page 667 MLD S NOOPING OMMANDS MLD SNOOPING MROUTER Examples This example shows how to specify the next-hop interface to the multicast router for VLAN interface vlan2: awplus# configure terminal awplus(config)# interface vlan2 awplus(config-if)# ipv6 mld snooping mrouter interface port1.0.5 This example shows how to specify the next-hop interface to the multicast router for VLAN interfaces vlan2-vlan4: awplus# configure terminal...
  • Page 668: Ipv6 Mld Snooping Querier

    MLD S NOOPING OMMANDS MLD SNOOPING QUERIER ipv6 mld snooping querier Overview Use this command to enable MLD querier operation on a subnet (VLAN) when no multicast routing protocol is configured in the subnet (VLAN). When enabled, the MLD Snooping querier sends out periodic MLD queries for all interfaces on that VLAN.
  • Page 669: Ipv6 Mld Snooping Report-Suppression

    MLD S NOOPING OMMANDS MLD SNOOPING REPORT SUPPRESSION ipv6 mld snooping report-suppression Overview Use this command to enable report suppression from hosts for Multicast Listener Discovery version 1 (MLDv1) on a VLAN in Interface Configuration mode. Use the no variant of this command to disable report suppression on a VLAN in Interface Configuration mode.
  • Page 670 MLD S NOOPING OMMANDS MLD SNOOPING REPORT SUPPRESSION This example shows how to disable report suppression for MLD reports on VLAN interfaces vlan2-vlan4: awplus# configure terminal awplus(config)# interface vlan2-vlan4 awplus(config-if)# no ipv6 mld snooping report-suppression C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 671: Ipv6 Mld Static-Group

    MLD S NOOPING OMMANDS MLD STATIC GROUP ipv6 mld static-group Overview Use this command to statically configure IPv6 group membership entries on an interface. To statically add only a group membership, do not specify any parameters. Use the no variant of this command to delete static group membership entries. Syntax ipv6 mld static-group <ipv6-group-address>...
  • Page 672 MLD S NOOPING OMMANDS MLD STATIC GROUP To add a static group record on a specific port on vlan2, use the following commands: awplus# configure terminal awplus(config)# interface vlan2 awplus(config-if)# ipv6 mld static-group ff1e::10 interface port1.0.4 C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 673: Show Debugging Mld

    MLD S NOOPING OMMANDS SHOW DEBUGGING MLD show debugging mld Overview Use this command to display the MLD debugging modes enabled with the debug command. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 674: Show Ipv6 Mld Groups

    MLD S NOOPING OMMANDS SHOW IPV MLD GROUPS show ipv6 mld groups Overview Use this command to display the multicast groups that have receivers directly connected to the router and learned through MLD. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 675: Show Ipv6 Mld Interface

    MLD S NOOPING OMMANDS SHOW IPV MLD INTERFACE show ipv6 mld interface Overview Use this command to display the state of MLD and MLD Snooping for a specified interface, or all interfaces. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 676: Show Ipv6 Mld Snooping Mrouter

    MLD S NOOPING OMMANDS SHOW IPV MLD SNOOPING MROUTER show ipv6 mld snooping mrouter Overview Use this command to display the multicast router interfaces, both configured and learned, in a VLAN. If you do not specify a VLAN interface then all the VLAN interfaces are displayed.
  • Page 677: Show Ipv6 Mld Snooping Statistics

    MLD S NOOPING OMMANDS SHOW IPV MLD SNOOPING STATISTICS show ipv6 mld snooping statistics Overview Use this command to display MLD Snooping statistics data. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 678: Part 5: Access And Security

    Part 5: Access and Security C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 679: Ipv4 Hardware Access Control List (Acl) Commands

    IPv4 Hardware Access Control List (ACL) Commands Introduction Overview This chapter provides an alphabetical reference of IPv4 Hardware Access Control List (ACL) commands. It contains detailed command information and command examples about IPv4 hardware ACLs, which are applied directly to interfaces using access-group command To apply ACLs to an LACP channel group, apply it to all the individual switch ports...
  • Page 680 (ACL) C ARDWARE CCESS ONTROL OMMANDS Table 22-1: IPv4 Hardware Access List Commands and Prompts (cont.) Command Name Command Mode Prompt awplus(config)# access-group Global Configuration awplus(config)# access-list (hardware IP numbered) Global Configuration awplus(config)# access-list (hardware MAC numbered) Global Configuration awplus(config)# access-list hardware (named) Global Configuration awplus(config-if)#...
  • Page 681: Access-Group

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS GROUP access-group Overview This command adds or removes a hardware-based access-list to or from a switch port interface. The number of hardware numbered and named access-lists that can be added to a switch port interface is determined by the available memory in hardware-based packet classification tables.
  • Page 682 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS GROUP Examples To add the numbered hardware access-list 3005 to switch port interface port1.0.1, enter the following commands: awplus# configure terminal awplus(config)# interface port1.0.1 awplus(config-if)# access-group 3005 To add the named hardware access-list “hw-acl” to switch port interface port1.0.2, enter the following commands: awplus# configure terminal...
  • Page 683: Access-List (Hardware Ip Numbered)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE NUMBERED access-list (hardware IP numbered) Overview This command creates an access-list for use with hardware classification, such as QoS. The access-list will match on either TCP or UDP type packets that have the specified source and destination IP addresses and Layer 4 port values or ranges.
  • Page 684 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE NUMBERED Table 23: Parameters in the access-list (hardware IP numbered) command - ip|icmp (cont.) Parameter Description <source> The source address of the packets. You can specify a single host, a subnet, or all sources. The following are the valid formats for specifying the source: Matches any source IP address.
  • Page 685 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE NUMBERED Table 23: Parameters in the access-list (hardware IP numbered) command - ip|icmp (cont.) Parameter Description <type-number> The ICMP type, as defined in RFC792 and RFC950. Specify one of the following integers to create a filter for the ICMP message type: Echo replies.
  • Page 686 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE NUMBERED Table 24: Parameters in the access-list (hardware IP numbered) command - tcp|udp (cont.) Parameter Description permit The access-list permits packets that match the type, source, and destination filtering specified with this command. send-to-cpu Specify packets to send to the CPU.
  • Page 687 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE NUMBERED Table 24: Parameters in the access-list (hardware IP numbered) command - tcp|udp (cont.) Parameter Description <sourceport> The source (TCP or UDP) port number, specified as an integer between 0 and 65535. range Range of port numbers.
  • Page 688 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE NUMBERED Table 25: Parameters in the access-list (hardware IP numbered) command - proto (cont.) Parameter Description <source> The source address of the packets. You can specify a single host, a subnet, or all sources. The following are the valid formats for specifying the source: Matches any source IP address.
  • Page 689 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE NUMBERED Table 22-1: IP protocol number and description Protocol Number Protocol Description [RFC] Internet Control Message [RFC792] Internet Group Management [RFC1112] Gateway-to-Gateway [RFC823] IP in IP [RFC2003] Stream [RFC1190] [RFC1819] TCP (Transmission Control Protocol) [RFC793] EGP (Exterior Gateway Protocol) [RFC888] IGP (Interior Gateway Protocol) [IANA] Network Voice Protocol [RFC741]...
  • Page 690 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE NUMBERED Table 22-1: IP protocol number and description (cont.) Protocol Number Protocol Description [RFC] MPLS-in-IP / RFC4023 MANET Protocols / RFC-ietf-manet-iana-07.txt 139-252 Unassigned / IANA Use for experimentation and testing / RFC3692 Use for experimentation and testing / RFC3692 Reserved / IANA Mode...
  • Page 691 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE NUMBERED To create an access-list that will deny all IGMP packets (IP protocol 2) from the 192.168.0.0 network, enter the commands: awplus# configure terminal awplus(config)# access-list 3000 deny proto 2 192.168.0.0/16 TCP Example To create an access-list that will permit TCP packets with a destination address of 192.168.1.1, a destination port of 80 and any source address and source port, enter...
  • Page 692: Access-List (Hardware Mac Numbered)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE NUMBERED access-list (hardware MAC numbered) Overview This command creates an access-list for use with hardware classification, such as QOS. The access-list will match on packets that have the specified source and destination MAC addresses.
  • Page 693 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE NUMBERED Parameter Description <destination-mac- The mask that will be applied to the destination MAC mask> addresses. Enter this in the format <HHHH.HHHH.HHHH> where each H is a hexadecimal number that represents a 4 bit binary number.
  • Page 694 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE NUMBERED Related access-group Commands mirror interface show running-config show access-list (IPv4 Hardware ACLs) C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 695: Access-List Hardware (Named)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE NAMED access-list hardware (named) Overview This command creates a named hardware access-list and puts you into IPv4 Hardware ACL Configuration mode, where you can add filters to the ACL. Once you have configured the ACL, you can apply it to a switch port.
  • Page 696 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE NAMED Related access-group Commands (access-list hardware ICMP filter) (access-list hardware IP protocol filter) (access-list hardware TCP UDP filter) (access-list standard named filter) show access-list (IPv4 Hardware ACLs) C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 697: (Access-List Hardware Icmp Filter)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ICMP ACCESS LIST HARDWARE FILTER (access-list hardware ICMP filter) Overview Use this ACL filter to add a new ICMP filter entry to the current hardware access-list. The filter will match on any ICMP packet that has the specified source and destination IP addresses and ICMP type.
  • Page 698 (ACL) C ARDWARE CCESS ONTROL OMMANDS ICMP ACCESS LIST HARDWARE FILTER Parameter Description <source> The source address of the packets. You can specify a single host, a subnet, or all sources. The following are the valid formats for specifying the source: <ip-addr>/ An IPv4 address, followed by a <prefix>...
  • Page 699 (ACL) C ARDWARE CCESS ONTROL OMMANDS ICMP ACCESS LIST HARDWARE FILTER An ACL can be configured with multiple ACL filters using sequence numbers. If the sequence number is omitted, the next available multiple of 10 will be used as the sequence number for the new filter.
  • Page 700: (Access-List Hardware Ip Protocol Filter)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE PROTOCOL FILTER (access-list hardware IP protocol filter) Overview Use this ACL filter to add an IP protocol type filter entry to the current hardware access-list. The filter will match on any IP packet that has the specified source and destination IP addresses and IP protocol type, or has the optionally specified source and destination MAC addresses.
  • Page 701 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE PROTOCOL FILTER Parameter Description proto <ip-protocol> <1-255> Specify IP protocol number, as defined by IANA (Internet Assigned Numbers Authority www.iana.org/assignments/protocol-numbers) See below for a list of IP protocol numbers and their descriptions.
  • Page 702 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE PROTOCOL FILTER Parameter Description Signifies a MAC and based hardware access-list. <mac-source- The source host’s MAC address, entered in address> HHHH.HHHH.HHHH format. <mac-source-mask> The source host’s MAC wildcard mask entered in HHHH.HHHH.HHHH format.
  • Page 703 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE PROTOCOL FILTER Table 22-2: IP protocol number and description (cont.) Protocol Number Protocol Description [RFC] NARP (NBMA Address Resolution Protocol) [RFC1735] ICMP for IPv6 [RFC1883] No Next Header for IPv6 [RFC1883] Destination Options for IPv6 [RFC1883] EIGRP (Enhanced Interior Gateway Routing Protocol) OSPFIGP [RFC1583]...
  • Page 704 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE PROTOCOL FILTER To add an access-list filter entry to the access-list named my-list that will permit Examples any type of IP packet with a source address of 192.168.1.1 and any destination address, use the commands: awplus# configure terminal...
  • Page 705: (Access-List Hardware Mac Filter)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE FILTER (access-list hardware MAC filter) Overview Use this ACL filter to add a MAC filter entry to the current hardware access-list. The filter will match on any IP packet that has the specified source and destination MAC addresses.
  • Page 706 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE FILTER Parameter Description <source-mac-mask> The mask that will be applied to the source MAC addresses. Enter this in the format <HHHH.HHHH.HHHH> where each H is a hexadecimal number that represents a 4 bit binary number. For a mask, each value will be either 0 or F.
  • Page 707 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST HARDWARE FILTER To remove an access-list filter entry that permit packets with a source MAC address of 0000.00ab.1234 and any destination MAC address, use the commands: awplus# configure terminal awplus(config)# access-list hardware my-list awplus(config-ip-hw-acl)# no permit mac 0000.00ab.1234 0000.0000.0000 any...
  • Page 708: (Access-List Hardware Tcp Udp Filter)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS TCP UDP ACCESS LIST HARDWARE FILTER (access-list hardware TCP UDP filter) Overview Use this ACL filter to add a TCP or UDP filter entry to the current hardware access-list. The filter will match on any TCP or UDP type packet that has the specified source and destination IP addresses.
  • Page 709 (ACL) C ARDWARE CCESS ONTROL OMMANDS TCP UDP ACCESS LIST HARDWARE FILTER Parameter Description <source> The source address of the packets. You can specify a single host, a subnet, or all sources. The following are the valid formats for specifying the source: Matches any source IP address.
  • Page 710 (ACL) C ARDWARE CCESS ONTROL OMMANDS TCP UDP ACCESS LIST HARDWARE FILTER Parameter Description <destport> The destination TCP or UDP port number, specified as an integer between 0 and 65535. range Specify the range of port numbers between 0 and 65535.
  • Page 711: Commit (Ipv4)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS COMMIT commit (IPv4) Overview Use this command to commit the IPv4 ACL filter configuration entered at the console to the hardware immediately without exiting the IPv4 Hardware ACL Configuration mode. This command forces the associated hardware and software IPv4 ACLs to synchronize.
  • Page 712: Show Access-List (Ipv4 Hardware Acls)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS SHOW ACCESS LIST ARDWARE show access-list (IPv4 Hardware ACLs) Overview Use this command to display the specified access-list, or all access-lists if none have been specified. Note that only defined access-lists are displayed. An error message is displayed for an undefined access-list.
  • Page 713 (ACL) C ARDWARE CCESS ONTROL OMMANDS SHOW ACCESS LIST ARDWARE Related access-list (hardware MAC numbered) Commands access-list hardware (named) C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 714: Show Interface Access-Group

    (ACL) C ARDWARE CCESS ONTROL OMMANDS SHOW INTERFACE ACCESS GROUP show interface access-group Overview Use this command to display the access groups attached to a port. If an access group is specified, then the output only includes the ports that the specified access group is attached to.
  • Page 715: Ipv4 Software Access Control List (Acl) Commands

    IPv4 Software Access Control List (ACL) Commands Introduction Overview This chapter provides an alphabetical reference for the IPv4 Software Access Control List (ACL) commands, and contains detailed command information and command examples about IPv4 software ACLs as applied to Routing and Multicasting, which are not applied to interfaces.
  • Page 716 (ACL) C OFTWARE CCESS ONTROL OMMANDS Table 23-1: IPv4 Software Access List Commands and Prompts Command Name Command Mode Prompt awplus# show ip access-list Privileged Exec awplus(config)# access-group Global Configuration awplus(config)# access-list (standard named) Global Configuration awplus(config)# access-list (standard numbered) Global Configuration awplus(config)# maximum-access-list...
  • Page 717: Access-List Standard (Named)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NAMED access-list standard (named) Overview This command configures a standard named access-list that permits or denies packets from a specific source IP address. You can either create a standard named ACL together with an ACL filter entry in the Global Configuration mode, or you can use the IPv4 Standard ACL Configuration mode for sequenced ACL filter entry after first entering an access-list name.
  • Page 718 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NAMED Usage Use this command when configuring a standard named access-list for filtering IP software packets. You can either create access-lists from within this command, or you can enter access-list standard followed by only the name. Entering only the name moves you to the IPv4 Standard ACL Configuration mode for the selected access-list.
  • Page 719: Access-List (Standard Numbered)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NUMBERED access-list (standard numbered) Overview This command configures a standard numbered access-list that permits or denies packets from a specific source IP address. You can either create a standard numbered ACL together with an ACL filter entry in the Global Configuration mode, or you can use the IPv4 Standard ACL Configuration mode for sequenced ACL filter entry after first entering an access-list number.
  • Page 720 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NUMBERED You can either create access-lists from within this command, or you can enter access-list followed by only the number. Entering only the number moves you to the IPv4 Standard ACL Configuration mode for the selected access-list. From there you can configure your access-lists by using the command (access-list standard numbered...
  • Page 721: (Access-List Standard Named Filter)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NAMED FILTER (access-list standard named filter) Overview This ACL filter adds a source IP address filter entry to a current named standard access-list. If the sequence number is specified, the new filter entry is inserted at the specified location.
  • Page 722 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NAMED FILTER Usage An ACL can be configured with multiple ACL filters using sequence numbers. If the sequence number is omitted, the next available multiple of 10 will be used as the sequence number for the new filter.
  • Page 723: (Access-List Standard Numbered Filter)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NUMBERED FILTER (access-list standard numbered filter) Overview This ACL filter adds a source IP address filter entry to a current standard numbered access-list. If a sequence number is specified, the new filter entry is inserted at the specified location.
  • Page 724 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NUMBERED FILTER Usage An ACL can be configured with multiple ACL filters using sequence numbers. If the sequence number is omitted, the next available multiple of 10 will be used as the sequence number for the new filter.
  • Page 725: Maximum-Access-List

    (ACL) C OFTWARE CCESS ONTROL OMMANDS MAXIMUM ACCESS LIST maximum-access-list Overview Sets the maximum number of filters that can be added to any access-list. These are access-lists within the ranges <1-199> and <1300-1999>, and named standard access-lists. The no variant of this command removes the limit on the number of filters that can be added to a software access-list maximum-access-list <1-4294967294>...
  • Page 726: Show Access-List (Ipv4 Software Acls)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS SHOW ACCESS LIST OFTWARE show access-list (IPv4 Software ACLs) Overview Use this command to display the specified access-list, or all access-lists if none have been specified. Note that only defined access-lists are displayed. An error message is displayed for an undefined access-list show access-list [<1-99>|<1300-1999>|<3000-3699>|...
  • Page 727 (ACL) C OFTWARE CCESS ONTROL OMMANDS SHOW ACCESS LIST OFTWARE Note the following error message is displayed if you attempt to show an undefined access-list: awplus# show access-list 2  % Can't find access-list 2 Related access-list standard (named) Commands access-list (standard numbered) C613-50105-01 REV C Command Reference for x210 Series...
  • Page 728: Show Ip Access-List

    (ACL) C OFTWARE CCESS ONTROL OMMANDS SHOW IP ACCESS LIST show ip access-list Overview Use this command to display IP access-lists. show ip access-list [<1-99>|<1300-1999>|<access-list-name>] Syntax Parameter Description <1-99> IP standard access-list. <1300-1999> IP standard access-list (expanded range). <access-list-name> IP named access-list. Mode User Exec and Privileged Exec awplus#...
  • Page 729: Vty Access-Class (Numbered)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS VTY ACCESS CLASS NUMBERED vty access-class (numbered) Overview For IPv4, use this command to set a standard numbered software access list to be the management ACL. This is then applied to all available VTY lines for controlling remote access by Telnet and SSH.
  • Page 730: Ipv6 Software Access Control List (Acl) Commands

    IPv6 Software Access Control List (ACL) Commands Introduction Overview This chapter provides an alphabetical reference for the IPv6 Software Access Control List (ACL) commands, and contains detailed command information and command examples about IPv6 software ACLs as applied to Routing and Multicasting, which are not applied to interfaces.
  • Page 731 (ACL) C OFTWARE CCESS ONTROL OMMANDS Table 24-1: IPv6 Software Access List Commands and Prompts Command Name Command Mode Prompt awplus# show ipv6 access-list (IPv6 Software Privileged Exec ACLs) awplus(config)# ipv6 access-list standard (named) Global Configuration awplus(config-ipv6-std-acl)# (ipv6 access-list standard filter) IPv6 Standard ACL Configuration Command List...
  • Page 732: Ipv6 Access-List Standard (Named)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NAMED ipv6 access-list standard (named) Overview This command configures an IPv6 standard access-list for filtering frames that permit or deny IPv6 packets from a specific source IPv6 address. The no variant of this command removes a specified IPv6 standard access-list. Syntax ipv6 access-list standard <ipv6-acl-list-name>...
  • Page 733 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NAMED For backwards compatibility you can either create IPv6 standard access-lists from within this command, or you can enter ipv6 access-list standard followed by only the IPv6 standard access-list name. This latter (and preferred) method moves you to the (config-ipv6-std-acl) prompt for the selected IPv6 standard access-list, and from here you can configure the filters for this selected IPv6 standard access-list.
  • Page 734: (Ipv6 Access-List Standard Filter)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD FILTER (ipv6 access-list standard filter) Overview Use this ACL filter to add a filter entry for an IPv6 source address and prefix length to the current standard IPv6 access-list. If a sequence number is specified, the new entry is inserted at the specified location.
  • Page 735 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD FILTER To remove the ACL filter entry that will deny any IPv6 packets from the standard IPv6 access-list named my-list, enter the commands: awplus# configure terminal awplus(config)# ipv6 access-list standard my-list awplus(config-ipv6-std-acl)# no deny any Alternately, to remove the ACL filter entry with sequence number 5 to the...
  • Page 736: Show Ipv6 Access-List (Ipv6 Software Acls)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS SHOW IPV ACCESS LIST OFTWARE show ipv6 access-list (IPv6 Software ACLs) Overview Use this command to display all configured IPv6 access-lists or the IPv6 access-list specified by name. show ipv6 access-list [<access-list-name>] Syntax show ipv6 access-list standard [<access-list-name>] Parameter Description <access-list-name>...
  • Page 737: Vty Ipv6 Access-Class (Named)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS VTY IPV ACCESS CLASS NAMED vty ipv6 access-class (named) Overview For IPv6, use this command to set a standard named software access list to be the management ACL. This is then applied to all available VTY lines for controlling remote access by Telnet and SSH.
  • Page 738: Qos Commands

    QoS Commands Introduction Overview This chapter provides an alphabetical reference for Quality of Service commands. QoS uses ACLs. For more information about ACLs, see the ACL Feature Overview and Configuration Guide. Command List • “class” on page 740 • “class-map” on page 741 •...
  • Page 739 OMMANDS • “police single-rate action” on page 763 • “police twin-rate action” on page 765 • “policy-map” on page 767 • “priority-queue” on page 768 • “remark-map” on page 769 • “remark new-cos” on page 771 • “service-policy input” on page 772 •...
  • Page 740: Class

    OMMANDS CLASS class Overview Use this command to associate an existing class-map to a policy or policy-map (traffic classification), and to enter Policy Map Class Configuration mode to configure the class- map. Use the no variant of this command to delete an existing class-map. If your class-map does not exist, you can create it by using the class-map command.
  • Page 741: Class-Map

    OMMANDS CLASS class-map Overview Use this command to create a class-map. Use the no variant of this command to delete the named class-map. Syntax class-map <name> no class-map <name> Parameter Description <name> Name of the class-map to be created. Mode Global Configuration This example creates a class-map called cmap1, use the commands: Example...
  • Page 742: Clear Mls Qos Interface Policer-Counters

    OMMANDS CLEAR MLS QOS INTERFACE POLICER COUNTERS clear mls qos interface policer-counters Overview Resets an interface’s policer counters to zero. You can either clear a specific class-map, or you can clear all class-maps by not specifying a class map. clear mls qos interface <port> policer-counters [class-map Syntax <class-map>] Parameter...
  • Page 743: Default-Action

    OMMANDS DEFAULT ACTION default-action Overview Sets the action for the default class-map belonging to a particular policy-map. The action for a non-default class-map depends on the action of any ACL that is applied to the policy-map. The default action can therefore be thought of as specifying the action that will be applied to any data that does not meet the criteria specified by the applied matching commands.
  • Page 744: Description (Qos Policy-Map)

    OMMANDS DESCRIPTION POLICY description (QoS policy-map) Overview Adds a textual description of the policy-map. This can be up to 80 characters long. Use the no variant of this command to remove the current description from the policy-map. Syntax description <line> no description Parameter Description...
  • Page 745: Egress-Rate-Limit

    OMMANDS EGRESS RATE LIMIT egress-rate-limit Overview Use this command to limit the amount of traffic that can be transmitted per second from this port. Use the no variant of this command to disable the limiting of traffic egressing on the interface. Syntax egress-rate-limit <bandwidth>...
  • Page 746: Match Access-Group

    OMMANDS MATCH ACCESS GROUP match access-group Overview Use this command to define match criterion for a class-map. match access-group {<hw-IP-ACL>|<hw-MAC-ACL>|<hw-named-ACL>} Syntax no match access-group {<hw-IP-ACL>|<hw-MAC-ACL>|<hw-named-ACL>} Parameter Description <hw-IP-ACL> Specify a hardware IP ACL number in the range <3000-3699>. <hw-MAC-ACL> Specify a hardware MAC ACL number in the range <4000-4699>. <hw-named-ACL>...
  • Page 747 OMMANDS MATCH ACCESS GROUP To configure a class-map named cmap3 with one match criterion: access-list hw_acl, which allows IP traffic from any source to any destination, use the commands: awplus# configure terminal awplus(config)# access-list hardware hw_acl awplus(config-ip-hw-acl)# permit ip any any awplus(config)# class-map cmap3 awplus(config-cmap)#...
  • Page 748: Match Cos

    OMMANDS MATCH COS match cos Overview Use this command to define a COS to match against incoming packets. Use the no variant of this command to remove CoS. Syntax match cos <0-7> no match cos Parameter Description <0-7> Specify the CoS value. Mode Class Map Configuration To set the class-map’s CoS to 4, use the commands:...
  • Page 749: Match Dscp

    OMMANDS MATCH DSCP match dscp Overview Use this command to define the DSCP to match against incoming packets. Use the no variant of this command to remove a previously defined DSCP. Syntax match dscp <0-63> no match dscp Parameter Description <0-63>...
  • Page 750: Match Eth-Format Protocol

    OMMANDS MATCH ETH FORMAT PROTOCOL match eth-format protocol Overview This command sets the Ethernet format and the protocol for a class-map to match Select one Layer 2 format and one Layer 3 protocol when you issue this command. Use the no variant of this command to remove the configured Ethernet format and protocol from a class-map.
  • Page 751 OMMANDS MATCH ETH FORMAT PROTOCOL Parameter Description netbeui Protocol Number F0 (enter the parameter name or its number). iso-clns-is Protocol Number FE (enter the parameter name or its number). xdot75-internet Protocol Number 0801(enter the parameter name or its number). nbs-internet Protocol Number 0802 (enter the parameter name or its number).
  • Page 752 OMMANDS MATCH ETH FORMAT PROTOCOL Parameter Description appletalk Protocol Number 809B (enter the parameter name or its number). ibm-sna Protocol Number 80D5 (enter the parameter name or its number). appletalk-aarp Protocol Number 80F3 (enter the parameter name or its number). snmp Protocol Number 814CV.
  • Page 753: Match Ip-Precedence

    OMMANDS MATCH IP PRECEDENCE match ip-precedence Overview Use this command to identify IP precedence values as match criteria. Use the no variant of this command to remove IP precedence values from a class-map. Syntax match ip-precedence <0-7> no match ip-precedence Parameter Description <0-7>...
  • Page 754: Match Mac-Type

    OMMANDS MATCH MAC TYPE match mac-type Overview Use this command to set the MAC type for a class-map to match on. Use no variant of this command to remove the MAC type match entry. Syntax match mac-type {l2bcast|l2mcast|l2ucast} no match mac-type Parameter Description l2bcast...
  • Page 755: Match Tcp-Flags

    OMMANDS MATCH TCP FLAGS match tcp-flags Overview Sets one or more TCP flags (control bits) for a class-map to match on. Use the no variant of this command to remove one or more TCP flags for a class-map to match on. Syntax match tcp-flags {[ack][fin][psh][rst][syn][urg]} no match tcp-flags {[ack][fin][psh][rst][syn][urg]}...
  • Page 756: Match Vlan

    OMMANDS MATCH VLAN match vlan Overview Use this command to define the VLAN ID as match criteria. Use the no variant of this command to disable the VLAN ID used as match criteria. Syntax match vlan <1-4094> no match vlan Parameter Description <1-4094>...
  • Page 757: Mls Qos Cos

    OMMANDS MLS QOS COS mls qos cos Overview This command assigns a CoS (Class of Service) user-priority value to untagged frames entering a specified interface. By default, all untagged frames are assigned a CoS value of 0. Use the no variant of this command to return the interface to the default CoS setting for untagged frames entering the interface.
  • Page 758: Mls Qos Enable

    OMMANDS MLS QOS ENABLE mls qos enable Overview Use this command to globally enable QoS on the switch. Use the no variant of this command to globally disable QoS and remove all QoS configuration. The no variant of this command removes all class-maps, policy-maps, and policers that have been created.
  • Page 759: Mls Qos Map Cos-Queue To

    OMMANDS MLS QOS MAP COS QUEUE TO mls qos map cos-queue to Overview Use this command to set the default CoS to egress queue mapping. This is the default queue mapping for packets that do not get assigned an egress queue via any other QoS functionality.
  • Page 760: Mls Qos Map Premark-Dscp To

    OMMANDS MLS QOS MAP PREMARK DSCP TO mls qos map premark-dscp to Overview This command configures the premark-dscp map. It is used when traffic is classified by a class-map that has trust dscp configured. Based on a lookup DSCP, the map determines new QoS settings for the traffic. The no variant of this command resets the premark-dscp map to its defaults.
  • Page 761 OMMANDS MLS QOS MAP PREMARK DSCP TO To set the entry for DSCP 1 to use a new DSCP of 2, a new CoS of 3, and a new Example bandwidth class of yellow, use the command: awplus# configure terminal awplus(config)# mls qos map premark-dscp 1 to new-dscp 2 new-cos 3 new-bandwidth-class yellow...
  • Page 762: No Police

    OMMANDS NO POLICE no police Overview Use this command to disable any policer previously configured on the class-map. no police Syntax Mode Policy Map Class Configuration Usage This command disables any policer previously configured on the class-map. Example To disable policing on a class-map use the command: awplus# configure terminal awplus(config)#...
  • Page 763: Police Single-Rate Action

    OMMANDS POLICE SINGLE RATE ACTION police single-rate action Overview Configures a single-rate policer for a class-map. police single-rate <cir> <cbs> <ebs> action Syntax {drop-red|remark-transmit} Parameter Description <cir> Specify the Committed Information Rate (CIR) (1-40000000 kbps). <cbs> Specify the Committed Burst Size (CBS) (0-16777216 bytes). <ebs>...
  • Page 764 OMMANDS POLICE SINGLE RATE ACTION traffic is dropped; if action is set to remark-transmit, then the red traffic has the action of the remark map applied to it, and is then transmitted. Example To configure a single rate meter measuring traffic of 10 Mbps that drops a sustained burst of traffic over this rate, use the commands: awplus# configure terminal...
  • Page 765: Police Twin-Rate Action

    OMMANDS POLICE TWIN RATE ACTION police twin-rate action Overview Configures a twin-rate policer for a class-map. police twin-rate <cir> <pir> <cbs> <pbs> action Syntax {drop-red|remark-transmit} Parameter Description <cir> Specify the Committed Information Rate (CIR) (1-40000000 kbps). <pir> Specify the Peak Information Rate (PIR) (1-40000000 kbps). <cbs>...
  • Page 766 OMMANDS POLICE TWIN RATE ACTION Using an action of remark-transmit means that the packet will be remarked with the values configured in the policed-dscp map. The index into this map is determined by the DSCP in the packet. Note that the remark-map does not only apply to red traffic.
  • Page 767: Policy-Map

    OMMANDS POLICY policy-map Overview Use this command to create a policy-map and to enter Policy Map Configuration mode to configure the specified policy-map. Use the no variant of this command to delete an existing policy-map. Syntax policy-map <name> no policy-map <name> Parameter Description <name>...
  • Page 768: Priority-Queue

    OMMANDS PRIORITY QUEUE priority-queue Overview Configures strict priority based scheduling on the specified egress queues. You must specify at least one queue. priority-queue [0][1][2][3] Syntax Parameter Description [0][1][2][3] Specify the queues that will use strict priority scheduling. With strict priority scheduling, the switch will empty the highest numbered queue first, then start processing the next lowest numbered queue.
  • Page 769: Remark-Map

    OMMANDS REMARK remark-map Overview Use this command to configure the remark map. If a re-mark map is applied to a class, and a policer is also applied to the same class, then: • green and yellow traffic will all be acted upon by the remark-map, and •...
  • Page 770 OMMANDS REMARK To remark the policed green traffic to a new DSCP of 2, use the commands: awplus# configure terminal awplus(config)# policy-map pmap1 awplus(config-pmap)# class cmap1 awplus(config-pmap-c)# remark-map bandwidth-class green to new-dscp 2 To reset the DSCP for all bandwidth classes, use the commands: awplus# configure terminal awplus(config)#...
  • Page 771: Remark New-Cos

    OMMANDS REMARK NEW remark new-cos Overview This command enables you to configure and remark either or both of: • the CoS flag in the data packet • the input into the CoS to queue map, thus changing the destination egress queue.
  • Page 772: Service-Policy Input

    OMMANDS SERVICE POLICY INPUT service-policy input Overview Use this command to apply a policy-map to the input of an interface. Use the no variant of this command to remove a policy-map and interface association. Syntax service-policy input <policy-map> no service-policy input <policy-map> Parameter Description <policy-map>...
  • Page 773: Show Class-Map

    OMMANDS SHOW CLASS show class-map Overview Use this command to display the QoS class-maps’ criteria for classifying traffic. show class-map [<class-map-name>] Syntax Parameter Description <class-map-name> Name of the class-map. Mode User Exec and Privileged Exec Example To display a QoS class-map’s match criteria for classifying traffic, use the command: awplus# show class-map cmap1 Output...
  • Page 774: Show Mls Qos

    OMMANDS SHOW MLS QOS show mls qos Overview Use this command to display whether QoS is enabled or disabled on the switch. show mls qos Syntax Mode User Exec and Privileged Exec Example To display whether QoS is enabled or disabled, use the command: awplus# show mls qos Output...
  • Page 775: Show Mls Qos Interface

    OMMANDS SHOW MLS QOS INTERFACE show mls qos interface Overview Displays the current settings for the interface. This includes its default CoS and queue, scheduling used for each queue, and any policies/maps that are attached. show mls qos interface [<port>] Syntax Parameter Description...
  • Page 776: Show Mls Qos Interface Policer-Counters

    OMMANDS SHOW MLS QOS INTERFACE POLICER COUNTERS show mls qos interface policer-counters Overview This command displays an interface’s policer counters. This can either be for a specific class-map or for all class-maps attached to the interface. If no class-map is specified then all class-map policer counters attached to the interface are displayed.
  • Page 777 OMMANDS SHOW MLS QOS INTERFACE POLICER COUNTERS This output shows a policer configured with remarking through ‘action remark- transmit’, so although bytes are marked as Red, none are dropped. Therefore, the ‘Non-dropped Bytes’ field shows a summation of Green/Yellow and Red bytes. C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 778: Show Mls Qos Interface Queue-Counters

    OMMANDS SHOW MLS QOS INTERFACE QUEUE COUNTERS show mls qos interface queue-counters Overview This command displays an interface’s egress queue counters. This can either be for a specific queue or for all queues on the interface. If no queue is specified all queue counters on the interface will be displayed.
  • Page 779 OMMANDS SHOW MLS QOS INTERFACE QUEUE COUNTERS Table 1: Parameters in the output of the show mls qos interface queue-counters command (cont.) Parameter Description Port queue length Number of frames in the port’s queue. This will be the sum of all egress queues on the port. Egress Queue length Number of frames in a specific egress queue.
  • Page 780: Show Mls Qos Interface Storm-Status

    OMMANDS SHOW MLS QOS INTERFACE STORM STATUS show mls qos interface storm-status Overview Show the current configuration and status of the QoS Storm Protection (QSP) on the given port. show mls qos interface <port> storm-status Syntax Parameter Description <port> Switch port. Mode User Exec and Privileged Exec Example...
  • Page 781: Show Mls Qos Maps Cos-Queue

    OMMANDS SHOW MLS QOS MAPS COS QUEUE show mls qos maps cos-queue Overview Show the current configuration of the cos-queue map. show mls qos maps cos-queue Syntax Mode User Exec and Privileged Exec Example To display the current configuration of the cos-queue map, use the command: awplus# show mls qos maps cos-queue Output...
  • Page 782: Show Mls Qos Maps Premark-Dscp

    OMMANDS SHOW MLS QOS MAPS PREMARK DSCP show mls qos maps premark-dscp Overview This command displays the premark-dscp map. This map is used when the trust dscp command has been specified for a policy-map’s class-map to replace the DSCP, CoS and/or bandwidth class of a packet matching the class-map based on a lookup DSCP value.
  • Page 783: Show Platform Classifier Statistics Utilization Brief

    OMMANDS SHOW PLATFORM CLASSIFIER STATISTICS UTILIZATION BRIEF show platform classifier statistics utilization brief Overview This command displays the number of used entries available for various platform functions, and the percentage that number of entries represents of the total available. Syntax show platform classifier statistics utilization brief Mode Privileged Exec...
  • Page 784: Show Policy-Map

    OMMANDS SHOW POLICY show policy-map Overview Displays the policy-maps configured on the switch. The output also shows whether or not they are connected to a port (attached / detached) and shows their associated class-maps. show policy-map [<name>] Syntax Parameter Description <name>...
  • Page 785: Storm-Action

    OMMANDS STORM ACTION storm-action Overview Sets the action to be taken when triggered by QoS Storm Protection (QSP). There are three available options: • portdisable will disable the port in software. • vlandisable will disable the port from the VLAN matched by the class-map in class-map.
  • Page 786: Storm-Downtime

    OMMANDS STORM DOWNTIME storm-downtime Overview Sets the time to re-enable a port that has been disabled by QoS Storm Protection (QSP). The time is given in seconds, from a minimum of one second to maximum of 86400 seconds (i.e. one day). The no variant of this command resets the time to the default value of 10 seconds.
  • Page 787: Storm-Protection

    OMMANDS STORM PROTECTION storm-protection Overview Use this command to enable Policy Based Storm Protection (such as QSP - QoS Storm Protection). Storm protection is activated as soon as a port is enabled. However, it will only be functional after storm-rate storm-window have been set.
  • Page 788: Storm-Rate

    OMMANDS STORM RATE storm-rate Overview Sets the data rate that triggers the storm-action. The rate is in kbps and the range is from 1kbps to 40Gbps. Note that this setting is made in conjunction with the storm-window command. Use the no variant of this command to negate the storm-rate command. storm-rate <1-40000000>...
  • Page 789: Storm-Window

    OMMANDS STORM WINDOW storm-window Overview Sets the window size of QoS Storm Protection (QSP). This sets the time to poll the data-rate every given milliseconds. Minimum window size is 100 ms and the maximum size is 60 sec. Use the no variant of this command to negate the storm-window command. Syntax storm-window <100-60000>...
  • Page 790: Trust Dscp

    OMMANDS TRUST DSCP trust dscp Overview This command enables the premark-dscp map to replace the bandwidth-class, CoS, DSCP, and queue of classified traffic based on a lookup DSCP value. With the no variant of this command, no premark-dscp mapping function will be applied for the selected class-map.QoS components of the packet existing either at ingress, or applied by the class-map, will pass unchanged.
  • Page 791: Wrr-Queue Disable Queues

    OMMANDS QUEUE DISABLE QUEUES wrr-queue disable queues Overview Use this command to disable an egress queue from transmitting traffic. The no variant of this command enables an egress queue to transmit traffic. Syntax wrr-queue disable queues [0][1][2][3] no wrr-queue disable queues [0][1][2][3] Parameter Description [0][1][2][3]...
  • Page 792: Wrr-Queue Egress-Rate-Limit Queues

    OMMANDS QUEUE EGRESS RATE LIMIT QUEUES wrr-queue egress-rate-limit queues Overview Sets a limit on the amount of traffic that can be transmitted per second from these queues. The default unit is in Kb, but Mb or Gb can also be specified. The minimum is 651Kb.
  • Page 793: Wrr-Queue Weight Queues

    OMMANDS QUEUE WEIGHT QUEUES wrr-queue weight queues Overview This command configures weighted round-robin based scheduling on the specified egress queues on switch port interfaces only. The weights are specified as ratios relative to each other. wrr-queue weight <1-15> queues [0][1][2][3] Syntax Parameter Description...
  • Page 794: 802.1X Commands

    802.1X Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure 802.1X port access control. For more information, see the AAA and Port Authentication Feature Overview and Configuration Guide Command List • “debug dot1x” on page 796 •...
  • Page 795 802.1X C OMMANDS • “undebug dot1x” on page 831 C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 796: Debug Dot1X

    802.1X C OMMANDS DEBUG DOT debug dot1x Overview Use this command to enable 802.1X IEEE Port-Based Network Access Control troubleshooting functions. Use the no variant of this command to disable this function. Syntax debug dot1x [all|auth-web|event|nsm|packet|timer] no debug all dot1x no debug dot1x [all|auth-web|event|nsm|packet|timer] Parameter Description...
  • Page 797: Dot1X Control-Direction

    802.1X C OMMANDS X CONTROL DIRECTION dot1x control-direction Overview This command sets the direction of the filter for the unauthorized interface. If the optional in parameter is specified with this command then packets entering the specified port are discarded. The in parameter discards the ingress packets received from the supplicant.
  • Page 798 802.1X C OMMANDS X CONTROL DIRECTION To set the port direction to the default (both) for authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# no dot1x control-direction Related auth profile (Global Configuration) Commands show dot1x show dot1x interface show auth interface C613-50105-01 REV C...
  • Page 799: Dot1X Eap

    802.1X C OMMANDS X EAP dot1x eap Overview This command selects the transmit mode for the EAP packet. If the authentication feature is not enabled then EAP transmit mode is not enabled. The default setting discards EAP packets. dot1x eap {discard|forward|forward-untagged-vlan|forward-vlan} Syntax Parameter Description...
  • Page 800: Dot1X Eapol-Version

    802.1X C OMMANDS X EAPOL VERSION dot1x eapol-version Overview This command sets the EAPOL protocol version for EAP packets when 802.1X port authentication is applied. Use the no variant of this command to set the EAPOL protocol version to 1. The default EAPOL protocol version is version 1.
  • Page 801 802.1X C OMMANDS X EAPOL VERSION Validation auth profile (Global Configuration) Commands show dot1x show dot1x interface C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 802: Dot1X Initialize Interface

    802.1X C OMMANDS X INITIALIZE INTERFACE dot1x initialize interface Overview This command removes authorization for a connected interface with the specified<interface-list>. The connection will attempt to re-authorize when the specified port attempts to make use of the network connection. : Reauthentication could be a long time after the use of this command because NOTE the reauthorization attempt is not triggered by this command.
  • Page 803: Dot1X Initialize Supplicant

    802.1X C OMMANDS X INITIALIZE SUPPLICANT dot1x initialize supplicant This command removes authorization for a connected supplicant with the Overview specified MAC address or username. The connection will attempt to re-authorize when the specified supplicant attempts to make use of the network connection. : Reauthentication could be a long time after the use of this command because NOTE the reauthorization attempt is not triggered by this command.
  • Page 804: Dot1X Keytransmit

    802.1X C OMMANDS X KEYTRANSMIT dot1x keytransmit Overview This command enables key transmission on the interface specified previously in Interface mode. The no variant of this command disables key transmission on the interface specified. Syntax dot1x keytransmit no dot1x keytransmit Default Key transmission for port authentication is enabled by default.
  • Page 805: Dot1X Max-Auth-Fail

    802.1X C OMMANDS X MAX AUTH FAIL dot1x max-auth-fail Overview Use this command to configure the maximum number of login attempts for a supplicant (client device) using the auth-fail vlan feature, when using 802.1X port authentication on an interface. The no variant of this command resets the maximum login attempts for a supplicant (client device) using the auth-fail vlan feature, to the default configuration of 3 login attempts.
  • Page 806 802.1X C OMMANDS X MAX AUTH FAIL To configure the maximum number of login attempts for a supplicant on authentication profile 'student' to a single (1) login attempt, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# dot1x max-auth-fail 1 To configure the maximum number of login attempts for a supplicant on authentication profile 'student' to the default number of three (3) login attempts, use the commands:...
  • Page 807: Dot1X Max-Reauth-Req

    802.1X C OMMANDS X MAX REAUTH dot1x max-reauth-req Overview This command sets the number of reauthentication attempts before an interface is unauthorized. The no variant of this command resets the reauthentication delay to the default. Syntax dot1x max-reauth-req <1-10> no dot1x max-reauth-req Parameter Description <1-10>...
  • Page 808 802.1X C OMMANDS X MAX REAUTH To configure the maximum number of reauthentication attempts for authentication profile 'student' to the default maximum number of two (2) reauthentication attempts, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# no dot1x max-reauth-req Validation show running-config Commands...
  • Page 809: Dot1X Port-Control

    802.1X C OMMANDS X PORT CONTROL dot1x port-control Overview This command enables 802.1X port authentication on the interface specified, and sets the control of the authentication port. The no variant of this command disables the port authentication on the interface specified.
  • Page 810 802.1X C OMMANDS X PORT CONTROL To disable port authentication on the interface port1.0.2, use the commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# no dot1x port-control To enable port authentication on authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)#...
  • Page 811: Dot1X Timeout Tx-Period

    802.1X C OMMANDS X TIMEOUT TX PERIOD dot1x timeout tx-period Overview This command sets the transmit timeout for the authentication request on the specified interface. The no variant of this command resets the transmit timeout period to the default (30 seconds). Syntax dot1x timeout tx-period <1-65535>...
  • Page 812 802.1X C OMMANDS X TIMEOUT TX PERIOD Validation auth profile (Global Configuration) Commands show dot1x show dot1x interface C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 813: Show Debugging Dot1X

    802.1X C OMMANDS SHOW DEBUGGING DOT show debugging dot1x Overview Use this command to display the 802.1X debugging option set. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide. Syntax show debugging dot1x Mode...
  • Page 814: Show Dot1X

    802.1X C OMMANDS SHOW DOT show dot1x Overview This command shows authentication information for dot1x (802.1X) port authentication. If you specify the optional all parameter then this command also displays all authentication information for each port available on the switch. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 815 802.1X C OMMANDS SHOW DOT Table 1: Example output from the show dot1x command (cont.) dot1x: enabled protocolVersion: 1 authMac: enabled method: PAP reauthRelearning: disabled authWeb: enabled method: PAP lockCount: 3 packetForwarding: disabled twoStepAuthentication: configured: enabled actual: enabled SupplicantMac: none supplicantMac: none...
  • Page 816 802.1X C OMMANDS SHOW DOT Table 1: Example output from the show dot1x command (cont.) authEaplogoggWhileAuthenticating: 0 authReauthsWhileAuthenticated: 0 authEapstartWhileAuthenticated: 0 authEaplogoffWhileAuthenticated: 0 BackendResponses: 2 BackendAccessChallenges: 1 BackendOtherrequestToSupplicant: 3 BackendAuthSuccess: 1 BackendAuthFails: 0 C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 817: Show Dot1X Diagnostics

    802.1X C OMMANDS SHOW DOT X DIAGNOSTICS show dot1x diagnostics Overview This command shows 802.1X authentication diagnostics for the specified interface (optional), which may be a static channel (or static aggregator) or a dynamic (or LACP) channel group or a switch port. If no interface is specified then authentication diagnostics are shown for all interfaces.
  • Page 818 802.1X C OMMANDS SHOW DOT X DIAGNOSTICS Output Figure 26-1: Example output from the show dot1x diagnostics command Authentication Diagnostics for interface port1.0.5 Supplicant address: 00d0.59ab.7037 authEnterConnecting: 2 authEaplogoffWhileConnecting: 1 authEnterAuthenticating: 2 authSuccessWhileAuthenticating: 1 authTimeoutWhileAuthenticating: 1 authFailWhileAuthenticating: 0 authEapstartWhileAuthenticating: 0 authEaplogoggWhileAuthenticating: 0...
  • Page 819: Show Dot1X Interface

    802.1X C OMMANDS SHOW DOT X INTERFACE show dot1x interface Overview This command shows the status of 802.1X port-based authentication on the specified interface, which may be a static channel (or static aggregator) or a dynamic (or LACP) channel group or a switch port. Use the optional diagnostics parameter to show authentication diagnostics for the specified interfaces.
  • Page 820 802.1X C OMMANDS SHOW DOT X INTERFACE Table 2: Example output from the show dot1x interface command for a port awplus#show dot1x interface port1.0.6Authentication info for interface port1.0.6 portEnabled: true - portControl: Auto portStatus: Authorized reAuthenticate: disabled reAuthPeriod: 3600 PAE: quietPeriod: 60 - maxReauthReq: 2 - txPeriod: 30 PAE: connectTimeout: 30 ...
  • Page 821 802.1X C OMMANDS SHOW DOT X INTERFACE awplus#show dot1x interface port1.0.6 diagnostics Authentication Diagnostics for interface port1.0.6 Supplicant address: 00d0.59ab.7037 authEnterConnecting: 2 authEaplogoffWhileConnecting: 1 authEnterAuthenticating: 2 authSuccessWhileAuthenticating: 1 authTimeoutWhileAuthenticating: 1 authFailWhileAuthenticating: 0 authEapstartWhileAuthenticating: 0 authEaplogoggWhileAuthenticating: 0 authReauthsWhileAuthenticated: 0 authEapstartWhileAuthenticated: 0 authEaplogoffWhileAuthenticated: 0...
  • Page 822 802.1X C OMMANDS SHOW DOT X INTERFACE awplus#show dot1x statistics interface port1.0.6802.1X statistics for interface port1.0.6 EAPOL Frames Rx: 5 - EAPOL Frames Tx: 16 EAPOL Start Frames Rx: 0 - EAPOL Logoff Frames Rx: 0 EAP Rsp/Id Frames Rx: 3 - EAP Response Frames Rx: 2 EAP Req/Id Frames Tx: 8 - EAP Request Frames Tx: 2...
  • Page 823 802.1X C OMMANDS SHOW DOT X INTERFACE Table 26-1: Parameters in the output of show dot1x interface (cont.) Parameter Description suppTimeout Supplicant timeout. serverTimeout Server timeout. maxReq Maximum requests to be sent. Controlled Directions State machine. adminControlledDi Administrative value (Both/In). r ections operControlledDir Operational Value (Both/In).
  • Page 824: Show Dot1X Sessionstatistics

    802.1X C OMMANDS SHOW DOT X SESSIONSTATISTICS show dot1x sessionstatistics Overview This command shows authentication session statistics for the specified interface, which may be a static channel (or static aggregator) or a dynamic (or LACP) channel group or a switch port. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 825: Show Dot1X Statistics Interface

    802.1X C OMMANDS SHOW DOT X STATISTICS INTERFACE show dot1x statistics interface Overview This command shows the authentication statistics for the specified interface, which may be a static channel (or static aggregator) or a dynamic (or LACP) channel group or a switch port. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 826: Show Dot1X Supplicant

    802.1X C OMMANDS SHOW DOT X SUPPLICANT show dot1x supplicant Overview This command shows the supplicant state of the authentication mode set for the switch. This command shows a summary when the optional brief parameter is used. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 827 802.1X C OMMANDS SHOW DOT X SUPPLICANT Interface port1.0.6 authenticationMethod: dot1x totalSupplicantNum: 1 authorizedSupplicantNum: 1 macBasedAuthenticationSupplicantNum: 0 dot1xAuthenticationSupplicantNum: 1 webBasedAuthenticationSupplicantNum: 0 Interface VID Mode MAC Address Status IP Address Username ========= === ==== =========== ====== ========== ======== port1.0.6 00d0.59ab.7037 Authenticated 192.168.2.201 manager...
  • Page 828: Show Dot1X Supplicant Interface

    802.1X C OMMANDS SHOW DOT X SUPPLICANT INTERFACE show dot1x supplicant interface Overview This command shows the supplicant state of the authentication mode set for the interface, which may be a static channel (or static aggregator) or a dynamic (or LACP) channel group or a switch port.
  • Page 829 802.1X C OMMANDS SHOW DOT X SUPPLICANT INTERFACE Interface port1.0.6 authenticationMethod: dot1x totalSupplicantNum: 1 authorizedSupplicantNum: 1 macBasedAuthenticationSupplicantNum: 0 dot1xAuthenticationSupplicantNum: 1 webBasedAuthenticationSupplicantNum: 0 otherAuthenticationSupplicantNum: 0  Supplicant name: VCSPCVLAN10 Supplicant address: 0000.cd07.7b60 authenticationMethod: 802.1X Two-Step Authentication: firstAuthentication: Pass - Method: mac secondAuthentication: Pass - Method: dot1x...
  • Page 830 802.1X C OMMANDS SHOW DOT X SUPPLICANT INTERFACE awplus#show dot1x interface sa1 supplicant brief Interface sa1 authenticationMethod: dot1x Two-Step Authentication: firstMethod: mac secondMethod: dot1x totalSupplicantNum: 1 authorizedSupplicantNum: 1 macBasedAuthenticationSupplicantNum: 0 dot1xAuthenticationSupplicantNum: 1 webBasedAuthenticationSupplicantNum: 0 otherAuthenticationSupplicantNum: 0  Interface Mode MAC Address Status IP Address Username...
  • Page 831: Undebug Dot1X

    802.1X C OMMANDS UNDEBUG DOT undebug dot1x Overview This command applies the functionality of the no variant of the debug dot1x command. C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 832: Authentication Commands

    Authentication Commands Introduction Overview This chapter provides an alphabetical reference for authentication commands. For more information, see the AAA and Port Authentication Feature Overview and Configuration Guide. Command List • “auth auth-fail vlan” on page 835 • “auth critical” on page 837 •...
  • Page 833 UTHENTICATION OMMANDS • “auth timeout supp-timeout” on page 871 • “auth two-step enable” on page 873 • “auth-mac enable” on page 876 • “auth-mac method” on page 878 • “auth-mac password” on page 880 • “auth-mac reauth-relearning” on page 881 •...
  • Page 834 UTHENTICATION OMMANDS • “auth-web-server ssl intercept-port” on page 915 • “copy proxy-autoconfig-file” on page 916 • “copy web-auth-https-file” on page 917 • “description (Authentication Profile)” on page 918 • “erase proxy-autoconfig-file” on page 919 • “erase web-auth-https-file” on page 920 •...
  • Page 835: Auth Auth-Fail Vlan

    UTHENTICATION OMMANDS AUTH AUTH FAIL VLAN auth auth-fail vlan Overview Use this command to enable the auth-fail vlan feature on the specified vlan interface. This feature assigns supplicants (client devices) to the specified VLAN if they fail port authentication. Use the no variant of this command to disable the auth-fail vlan feature for a specified VLAN interface.
  • Page 836 UTHENTICATION OMMANDS AUTH AUTH FAIL VLAN as a supplicant on the Guest VLAN. For more information about ACL concepts, and configuring ACLs see the ACL Feature Overview and Configuration Guide. For more information about ACL commands see: • IPv4 Hardware Access Control List (ACL) Commands •...
  • Page 837: Auth Critical

    UTHENTICATION OMMANDS AUTH CRITICAL auth critical Overview This command enables the critical port feature on the interface. When the critical port feature is enabled on an interface, and all the RADIUS servers are unavailable, then the interface becomes authorized. The no variant of this command disables critical port feature on the interface. Syntax auth critical no auth critical...
  • Page 838: Auth Dynamic-Vlan-Creation

    UTHENTICATION OMMANDS AUTH DYNAMIC VLAN CREATION auth dynamic-vlan-creation Overview This command enables and disables the Dynamic VLAN assignment feature. The Dynamic VLAN assignment feature allows a supplicant (client device) to be placed into a specific VLAN based on information returned from the RADIUS server during authentication, on a given interface.
  • Page 839 UTHENTICATION OMMANDS AUTH DYNAMIC VLAN CREATION If you issue an auth dynamic-vlan-creation command without a rule parameter then a second supplicant with a different VLAN ID is rejected. It is not assigned to the first supplicant’s VLAN. Issuing an auth dynamic-vlan-creation command without a rule parameter has the same effect as issuing an auth dynamic-vlan-creation rule deny command rejecting supplicants with differing VIDs.
  • Page 840 UTHENTICATION OMMANDS AUTH DYNAMIC VLAN CREATION To disable the Dynamic VLAN assignment feature on interface port1.0.2, use the commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# no auth dynamic-vlan-creation To enable the Dynamic VLAN assignment feature on authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)#...
  • Page 841: Auth Guest-Vlan

    UTHENTICATION OMMANDS AUTH GUEST VLAN auth guest-vlan Overview This command enables and configures the Guest VLAN feature on the interface specified by associating a Guest VLAN with an interface. This command does not start authentication. The supplicant's (client device’s) traffic is associated with the native VLAN of the interface if its not already associated with another VLAN.
  • Page 842 UTHENTICATION OMMANDS AUTH GUEST VLAN The Guest VLAN routing mode in this release overcomes these issues. With the Guest VLAN routing mode, the switch can lease DHCP addresses and accept access to a limited network. Note that Guest VLAN can use only untagged ports. See the AAA and Port Authentication Feature Overview and Configuration Guide for information about:...
  • Page 843 UTHENTICATION OMMANDS AUTH GUEST VLAN auth guest-vlan forward dot1x port-control show dot1x show dot1x interface show running-config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 844: Auth Guest-Vlan Forward

    UTHENTICATION OMMANDS AUTH GUEST VLAN FORWARD auth guest-vlan forward Overview Use this command to enable packet forwarding from the Guest VLAN to a destination IP address or subnet. If this command is configured, the device can lease DHCP addresses and accept access to a limited part of your network. Also, when using NAP authentication, the supplicant can log on to a domain controller to gain certification.
  • Page 845 UTHENTICATION OMMANDS AUTH GUEST VLAN FORWARD To disable forwarding of DNS packets from the guest VLAN to the destination IP address on port1.0.2, use the commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# no auth guest-vlan forward 10.0.0.1 dns To enable the tcp forwarding port 137 on authentication profile 'student', use the commands: awplus# configure terminal...
  • Page 846: Auth Host-Mode

    UTHENTICATION OMMANDS AUTH HOST MODE auth host-mode Overview This command selects the host mode on the specified interface. Use the no variant of this command to set host mode to the default setting (single host). Syntax auth host-mode {single-host|multi-host|multi-supplicant} no auth host-mode Parameter Description single-host...
  • Page 847 UTHENTICATION OMMANDS AUTH HOST MODE To set the host mode to default (single host) on interface port1.0.2, use the following commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# no auth host-mode To set the host mode to multi-supplicant on authentication profile ‘student’, use the commands: awplus# configure terminal...
  • Page 848: Auth Log

    UTHENTICATION OMMANDS AUTH LOG auth log Overview Use this command to configure the types of authentication feature log messages that are output to the log file. Use the no variant of this command to remove either specified types or all types of authentication feature log messages that are output to the log file.
  • Page 849 UTHENTICATION OMMANDS AUTH LOG To disable the logging of all types of authentication log messages to the log file for supplicants (client devices) connected to interface port1.0.2, use the following commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# no auth log all To configure the logging of web authentication failures to the log file for supplicants (client devices) connected to authentication profile ‘student’, use the commands:...
  • Page 850: Auth Max-Supplicant

    UTHENTICATION OMMANDS AUTH MAX SUPPLICANT auth max-supplicant Overview This command sets the maximum number of supplicants (client devices) that can be authenticated on the selected port. Once this value is exceeded, further supplicants will not be authenticated. The no variant of this command resets the maximum supplicant number to the default.
  • Page 851 UTHENTICATION OMMANDS AUTH MAX SUPPLICANT Related auth profile (Global Configuration) Commands show dot1x show dot1x interface show running-config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 852: Auth Profile (Global Configuration)

    UTHENTICATION OMMANDS AUTH PROFILE LOBAL ONFIGURATION auth profile (Global Configuration) Overview Use this command to enter port authentication profile mode and configure a port authentication profile. If the specified profile does not exist a new authentication profile is created with the name provided.
  • Page 853: Auth Profile (Interface Configuration)

    UTHENTICATION OMMANDS AUTH PROFILE NTERFACE ONFIGURATION auth profile (Interface Configuration) Overview Use this command to attach a port authentication profile to the current interface. Use the no variant of this command to detach a port authentication profile from the current interface. Syntax auth profile <profile-name>...
  • Page 854: Auth Reauthentication

    UTHENTICATION OMMANDS AUTH REAUTHENTICATION auth reauthentication Overview This command enables re-authentication on the interface specified in the Interface mode, which may be a static channel group (or static aggregator) or a dynamic (or LACP) channel group or a switch port. Use the no variant of this command to disables reauthentication on the interface.
  • Page 855: Auth Roaming Disconnected

    UTHENTICATION OMMANDS AUTH ROAMING DISCONNECTED auth roaming disconnected Overview This command allows a supplicant to move to another authenticating interface without reauthentication, even if the link is down for the interface that the supplicant is currently connected to. You must enter the auth roaming enable command on both interfaces before using this command.
  • Page 856 UTHENTICATION OMMANDS AUTH ROAMING DISCONNECTED To allow supplicants using authentication profile ‘student’ to move between ports without reauthentication even when the link is down, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# auth roaming disconnected To require supplicants using authentication profile ‘student’ to reauthenticate when moving between ports if the link is down, use the commands: awplus# configure terminal...
  • Page 857: Auth Roaming Enable

    UTHENTICATION OMMANDS AUTH ROAMING ENABLE auth roaming enable Overview This command allows a supplicant to move to another authenticating interface without reauthentication, providing the link is up for the interface that the supplicant is is currently connected to. The no variant of this command disables roaming authentication on an interface, and forces a supplicant to be reauthenticated when moving between interfaces.
  • Page 858 UTHENTICATION OMMANDS AUTH ROAMING ENABLE To disable roaming authentication for authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# no auth roaming enable Related auth profile (Global Configuration) Commands auth-mac enable auth roaming disconnected auth-web enable dot1x port-control show auth interface show dot1x interface...
  • Page 859: Auth Supplicant-Ip

    UTHENTICATION OMMANDS AUTH SUPPLICANT auth supplicant-ip Overview This command adds a supplicant (client device) IP address on a given interface and provides parameters for its configuration. Use the no variant of this command to delete the supplicant IP address and reset other parameters to their default values.
  • Page 860 UTHENTICATION OMMANDS AUTH SUPPLICANT Default No supplicant IP address for port authentication exists by default until first created with the auth supplicant-ip command. The defaults for parameters applied are as shown in the table above. Mode Interface Configuration for a static channel, a dynamic (LACP) channel group, a switch port, or Authentication Profile.
  • Page 861: Auth Supplicant-Mac

    UTHENTICATION OMMANDS AUTH SUPPLICANT auth supplicant-mac Overview This command adds a supplicant (client device) MAC address or MAC mask on a given interface with the parameters as specified in the table below. Use the no variant of this command to delete the supplicant MAC address and reset other parameters to their default values.
  • Page 862 UTHENTICATION OMMANDS AUTH SUPPLICANT Parameter Description supp-timeout Supplicant response timeout (default 30 seconds). <1-65535> Seconds for supplicant response timeout. server-timeout Authentication server response timeout (default 30 seconds). <1-65535> Seconds for authentication server response timeout. reauthentication Enable reauthentication on a port. max-reauth-req No of reauthentication attempts before becoming unauthorized (default 2).
  • Page 863 UTHENTICATION OMMANDS AUTH SUPPLICANT To add the supplicant MAC address 0000.5E00.5343 to force authorized port control for authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# auth supplicant-mac 0000.5E00.5343 port-control force-authorized To delete the supplicant MAC address 0000.5E00.5343 for authentication profile ‘student’, use the commands: awplus# configure terminal...
  • Page 864: Auth Timeout Connect-Timeout

    UTHENTICATION OMMANDS AUTH TIMEOUT CONNECT TIMEOUT auth timeout connect-timeout Overview This command sets the connect-timeout period for the interface. Use the no variant of this command to reset the connect-timeout period to the default. Syntax auth timeout connect-timeout <1-65535> no auth timeout connect-timeout Parameter Description <1-65535>...
  • Page 865 UTHENTICATION OMMANDS AUTH TIMEOUT CONNECT TIMEOUT To reset the connect-timeout period to the default (30 seconds) for authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# no auth timeout connect-timeout Related auth profile (Global Configuration) Commands show dot1x show dot1x interface...
  • Page 866: Auth Timeout Quiet-Period

    UTHENTICATION OMMANDS AUTH TIMEOUT QUIET PERIOD auth timeout quiet-period Overview This command sets a time period for which another authentication request is not accepted on a given interface, after an authentication request has failed. Use the no variant of this command to reset the quiet period to the default. Syntax auth timeout quiet-period <1-65535>...
  • Page 867: Auth Timeout Reauth-Period

    UTHENTICATION OMMANDS AUTH TIMEOUT REAUTH PERIOD auth timeout reauth-period Overview This command sets the timer for reauthentication on a given interface. The re-authentication for the supplicant (client device) is executed at this timeout. The timeout is only applied if the auth reauthentication command is applied. Use the no variant of this command to reset the reauth-period parameter to the default (3600 seconds).
  • Page 868 UTHENTICATION OMMANDS AUTH TIMEOUT REAUTH PERIOD Related auth profile (Global Configuration) Commands auth reauthentication show dot1x show dot1x interface show running-config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 869: Auth Timeout Server-Timeout

    UTHENTICATION OMMANDS AUTH TIMEOUT SERVER TIMEOUT auth timeout server-timeout Overview This command sets the timeout for the waiting response from the RADIUS server on a given interface. The no variant of this command resets the server-timeout to the default (30 seconds).
  • Page 870 UTHENTICATION OMMANDS AUTH TIMEOUT SERVER TIMEOUT Related auth profile (Global Configuration) Commands show dot1x show dot1x interface show running-config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 871: Auth Timeout Supp-Timeout

    UTHENTICATION OMMANDS AUTH TIMEOUT SUPP TIMEOUT auth timeout supp-timeout Overview This command sets the timeout of the waiting response from the supplicant (client device) on a given interface. The no variant of this command resets the supplicant timeout to the default (30 seconds).
  • Page 872 UTHENTICATION OMMANDS AUTH TIMEOUT SUPP TIMEOUT Related auth profile (Global Configuration) Commands show dot1x show dot1x interface show running-config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 873: Auth Two-Step Enable

    UTHENTICATION OMMANDS AUTH TWO STEP ENABLE auth two-step enable Overview This command enables a two-step authentication feature on an interface. When this feature is enabled, the supplicant is authorized in a two-step process. If authentication succeeds, the supplicant becomes authenticated. This command will apply the two-step authentication method based on 802.1X-, MAC- or Web-Authentication.
  • Page 874 UTHENTICATION OMMANDS AUTH TWO STEP ENABLE To enable MAC-Authentication followed by Web-Authentication, use the following commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# switchport mode access awplus(config-if)# auth-mac enable awplus(config-if)# auth-web enable awplus(config-if)# auth dynamic-vlan-creation awplus(config-if)# auth two-step enable To enable 802.1X-Authentication followed by Web-Authentication, use the following commands: awplus# configure terminal...
  • Page 875 UTHENTICATION OMMANDS AUTH TWO STEP ENABLE Relat ed auth profile (Global Configuration) Commands show auth two-step supplicant brief show auth show auth interface show auth supplicant show dot1x show dot1x interface show dot1x supplicant C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 876: Auth-Mac Enable

    UTHENTICATION OMMANDS AUTH MAC ENABLE auth-mac enable Overview This command enables MAC-based authentication on the interface specified in the Interface command mode. Use the no variant of this command to disable MAC-based authentication on an interface. Syntax auth-mac enable no auth-mac enable Default MAC-Authentication is disabled by default.
  • Page 877 UTHENTICATION OMMANDS AUTH MAC ENABLE To disable MAC authentication on authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# no auth-mac enable Related auth profile (Global Configuration) Commands show auth show auth interface show running-config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 878: Auth-Mac Method

    UTHENTICATION OMMANDS AUTH MAC METHOD auth-mac method Overview This command sets the type of authentication method for MAC-Authentication that is used with RADIUS on the interface specified in the Interface command mode. The no variant of this command resets the authentication method used to the default method (PAP) as the RADIUS authentication method used by the MAC-Authentication.
  • Page 879 UTHENTICATION OMMANDS AUTH MAC METHOD To disable MAC authentication on authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# no auth-mac enable Related auth profile (Global Configuration) Commands show auth show auth interface show running-config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 880: Auth-Mac Password

    UTHENTICATION OMMANDS AUTH MAC PASSWORD auth-mac password Overview This command changes the password for MAC-based authentication. Use the no variant of this command to return the password to its default. Syntax auth-mac [encrypted] password <password> no auth-mac password Parameter Description auth-mac MAC-based authentication encrypted...
  • Page 881: Auth-Mac Reauth-Relearning

    UTHENTICATION OMMANDS AUTH MAC REAUTH RELEARNING auth-mac reauth-relearning Overview This command sets the MAC address learning of the supplicant (client device) to re-learning for re-authentication on the interface specified in the Interface command mode. Use the no variant of this command to disable the auth-mac re-learning option. Syntax auth-mac reauth-relearning no auth-mac reauth-relearning...
  • Page 882: Auth-Mac Username

    UTHENTICATION OMMANDS AUTH MAC USERNAME auth-mac username Overview Use this command to specify the format of the MAC address in the username and password field when a request for MAC-based authorization is sent to a RADIUS server. auth-mac username {ietf|unformatted} {lower-case|upper-case} Syntax Parameter Description...
  • Page 883: Auth-Web Enable

    UTHENTICATION OMMANDS AUTH WEB ENABLE auth-web enable Overview This command enables Web-based authentication in Interface mode on the interface specified. Use the no variant of this command to apply its default. Syntax auth-web enable no auth-web enable Default Web-Authentication is disabled by default. Mode Interface Configuration for a static channel, a dynamic (LACP) channel group, or a switch port;...
  • Page 884 UTHENTICATION OMMANDS AUTH WEB ENABLE To disable Web authentication on authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# no auth-web enable Related auth profile (Global Configuration) Commands show auth show auth interface show running-config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 885: Auth-Web Forward

    UTHENTICATION OMMANDS AUTH WEB FORWARD auth-web forward Overview This command enables the Web-authentication packet forwarding feature on the interface specified. This command also enables ARP forwarding, and adds forwarded packets to the tcp or udp port number specified. The no variant of this command disables the specified packet forwarding feature on the interface.
  • Page 886 UTHENTICATION OMMANDS AUTH WEB FORWARD Examples To enable the ARP forwarding feature on interface port1.0.2, use the following commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# auth-web forward arp To add the TCP forwarding port 137 on interface port1.0.2, use the following commands: awplus# configure terminal...
  • Page 887 UTHENTICATION OMMANDS AUTH WEB FORWARD To add the tcp forwarding port 137 on authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# auth-web forward tcp 137 To disable the ARP forwarding feature on authentication profile ‘student’, use the commands: awplus# configure terminal...
  • Page 888: Auth-Web Max-Auth-Fail

    UTHENTICATION OMMANDS AUTH WEB MAX AUTH FAIL auth-web max-auth-fail Overview This command sets the number of authentication failures allowed before rejecting further authentication requests. When the supplicant (client device) fails more than the specified number of times, then login requests are refused during the quiet period.
  • Page 889 UTHENTICATION OMMANDS AUTH WEB MAX AUTH FAIL Related auth profile (Global Configuration) Commands auth timeout quiet-period show auth show auth interface show running-config C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 890: Auth-Web Method

    UTHENTICATION OMMANDS AUTH WEB METHOD auth-web method Overview This command sets the Web-authentication access method that is used with RADIUS on the interface specified. The no variant of this command sets the authentication method to PAP for the interface specified when Web-Authentication is also used with the RADIUS authentication method.
  • Page 891: Auth-Web-Server Blocking-Mode

    UTHENTICATION OMMANDS AUTH SERVER BLOCKING MODE auth-web-server blocking-mode Overview Use this command to enable blocking mode for the Web-Authentication server. The blocking mode displays an authentication success or failure screen immediately from the response result from a RADIUS server. Use the no variant of this command to disable blocking mode for the Web-Authentication server.
  • Page 892: Auth-Web-Server Dhcp Ipaddress

    UTHENTICATION OMMANDS AUTH SERVER DHCP IPADDRESS auth-web-server dhcp ipaddress Overview Use this command to assign an IP address and enable the DHCP service on the Web-Authentication server for supplicants (client devices). Use the no variant of this command to remove an IP address and disable the DHCP service on the Web-Authentication server for supplicants.
  • Page 893: Auth-Web-Server Dhcp Lease

    UTHENTICATION OMMANDS AUTH SERVER DHCP LEASE auth-web-server dhcp lease Overview Use this command to set the DHCP lease time for supplicants (client devices) using the DHCP service on the Web-Authentication server. Use the no variant of this command to reset to the default DHCP lease time for supplicants using the DHCP service on the Web-Authentication server.
  • Page 894: Auth-Web-Server Dhcp-Wpad-Option

    UTHENTICATION OMMANDS AUTH SERVER DHCP WPAD OPTION auth-web-server dhcp-wpad-option Overview This command sets the DHCP WPAD (Web Proxy Auto-Discovery) option for the Web-Authentication temporary DHCP service. For more information and examples, see the “Web Auth Proxy” section in the Alliedware Plus Technical Tips and Tricks. Use the no variant of this command to disable the DHCP WPAD function.
  • Page 895: Auth-Web-Server Host-Name

    UTHENTICATION OMMANDS AUTH SERVER HOST NAME auth-web-server host-name Overview This command assigns a hostname to the web authentication server. Use the no variant of this command to remove the hostname from the web authentication server. Syntax auth-web-server host-name <hostname> no auth-web-server host-name Parameter Description <hostname>...
  • Page 896: Auth-Web-Server Intercept-Port

    UTHENTICATION OMMANDS AUTH SERVER INTERCEPT PORT auth-web-server intercept-port Overview This command specifies any additional TCP port numbers that the Web-Authentication server is to intercept. Use the no variant of this command to stop intercepting the TCP port numbers. Syntax auth-web-server intercept-port {<1-65535>|any} no auth-web-server intercept-port {<1-65535>|any} Parameter Description...
  • Page 897: Auth-Web-Server Ipaddress

    UTHENTICATION OMMANDS AUTH SERVER IPADDRESS auth-web-server ipaddress Overview This command sets the IP address for the Web-Authentication server. Use the no variant of this command to delete the IP address for the Web-Authentication server. You cannot use the IPv4 address assigned to the device’s interface as the Web-Authentication server address.
  • Page 898: Auth-Web-Server Page Language

    UTHENTICATION OMMANDS AUTH SERVER PAGE LANGUAGE auth-web-server page language Overview Use this command to set the presentation language of Web authentication pages. Titles and subtitles of Web authentication pages will be set accordingly. Note that presently only English or Japanese are offered. Use the no variant of this command to set the presentation language of Web authentication pages to its default (English).
  • Page 899: Auth-Web-Server Login-Url

    UTHENTICATION OMMANDS AUTH SERVER LOGIN auth-web-server login-url Overview This command sets the web-authentication login page URL. This lets you replace the login page with your own page. See “Customising the Login Page” in the and Port Authentication Feature Overview and Configuration Guide for details.
  • Page 900: Auth-Web-Server Page Logo

    UTHENTICATION OMMANDS AUTH SERVER PAGE LOGO auth-web-server page logo Overview This command sets the type of logo that will be displayed on the web authentication page. Use the no variant of this command to set the logo type to auto. Note that if you need to customize the login page extensively, you can instead replace it with your own page.
  • Page 901: Auth-Web-Server Page Sub-Title

    UTHENTICATION OMMANDS AUTH SERVER PAGE SUB TITLE auth-web-server page sub-title Overview This command sets the custom sub-title on the web authentication page. Use the no variant of this command to reset the sub-title to its default. Note that if you need to customize the login page extensively, you can instead replace it with your own page.
  • Page 902: Auth-Web-Server Page Success-Message

    UTHENTICATION OMMANDS AUTH SERVER PAGE SUCCESS MESSAGE auth-web-server page success-message Overview This command sets the success message on the web-authentication page. Use the no variant of this command to remove the success message. Note that if you need to customize the login page extensively, you can instead replace it with your own page.
  • Page 903: Auth-Web-Server Page Title

    UTHENTICATION OMMANDS AUTH SERVER PAGE TITLE auth-web-server page title Overview This command sets the custom title on the web authentication page. Use the no variant of this command to remove the custom title. Note that if you need to customize the login page extensively, you can instead replace it with your own page.
  • Page 904: Auth-Web-Server Page Welcome-Message

    UTHENTICATION OMMANDS AUTH SERVER PAGE WELCOME MESSAGE auth-web-server page welcome-message Overview This command sets the welcome message on the web-authentication login page. Use the no variant of this command to remove the welcome message. Note that if you need to customize the login page extensively, you can instead replace it with your own page.
  • Page 905: Auth-Web-Server Ping-Poll Enable

    UTHENTICATION OMMANDS AUTH SERVER PING POLL ENABLE auth-web-server ping-poll enable Overview This command enables the ping polling to the supplicant (client device) that is authenticated by Web-Authentication. The no variant of this command disables the ping polling to the supplicant that is authenticated by Web-Authentication.
  • Page 906: Auth-Web-Server Ping-Poll Failcount

    UTHENTICATION OMMANDS AUTH SERVER PING POLL FAILCOUNT auth-web-server ping-poll failcount Overview This command sets a fail count for the ping polling feature when used with Web-Authentication. The failcount parameter specifies the number of unanswered pings. A supplicant (client device) is logged off when the number of unanswered pings are greater than the failcount set with this command.
  • Page 907: Auth-Web-Server Ping-Poll Interval

    UTHENTICATION OMMANDS AUTH SERVER PING POLL INTERVAL auth-web-server ping-poll interval Overview This command is used to change the ping poll interval. The interval specifies the time period between pings when the supplicant (client device) is reachable. Use the no variant of this command to reset to the default period for ping polling (30 seconds).
  • Page 908: Auth-Web-Server Ping-Poll Reauth-Timer-Refresh

    UTHENTICATION OMMANDS AUTH SERVER PING POLL REAUTH TIMER REFRESH auth-web-server ping-poll reauth-timer-refresh Overview This command modifies the reauth-timer-refresh parameter for the Web-Authentication feature. The reauth-timer-refresh parameter specifies whether a re-authentication timer is reset and when the response from a supplicant (a client device) is received. Use the no variant of this command to reset the reauth-timer-refresh parameter to the default setting (disabled).
  • Page 909: Auth-Web-Server Ping-Poll Timeout

    UTHENTICATION OMMANDS AUTH SERVER PING POLL TIMEOUT auth-web-server ping-poll timeout Overview This command modifies the ping poll timeout parameter for the Web-Authentication feature. The timeout parameter specifies the time in seconds to wait for a response to a ping packet. Use the no variant of this command to reset the timeout of ping polling to the default (1 second).
  • Page 910: Auth-Web-Server Port

    UTHENTICATION OMMANDS AUTH SERVER PORT auth-web-server port Overview This command sets the HTTP port number for the Web-Authentication server. Use the no variant of this command to reset the HTTP port number to the default (80). Syntax auth-web-server port <port-number> no auth-web-server port Parameter Description...
  • Page 911: Auth-Web-Server Redirect-Delay-Time

    UTHENTICATION OMMANDS AUTH SERVER REDIRECT DELAY TIME auth-web-server redirect-delay-time Overview Use this command to set the delay time in seconds before redirecting the supplicant to a specified URL when the supplicant is authorized. Use the variant no to reset the delay time set previously. Syntax auth-web-server redirect-delay-time <5-60>...
  • Page 912: Auth-Web-Server Redirect-Url

    UTHENTICATION OMMANDS AUTH SERVER REDIRECT auth-web-server redirect-url Overview This command sets a URL for supplicant (client device) authentication. When a supplicant is authorized it will be automatically redirected to the specified URL. Note that if the http redirect feature is used then this command is ignored. Use the no variant of this command to delete the URL string set previously.
  • Page 913: Auth-Web-Server Session-Keep

    UTHENTICATION OMMANDS AUTH SERVER SESSION KEEP auth-web-server session-keep Overview This command enables the session-keep feature to jump to the original URL after being authorized by Web-Authentication. Use the no variant of this command to disable the session keep feature. Syntax auth-web-server session-keep no auth-web-server session-keep Default...
  • Page 914: Auth-Web-Server Ssl

    UTHENTICATION OMMANDS AUTH SERVER SSL auth-web-server ssl Overview This command enables HTTPS functionality for the Web-Authentication server feature. Use the no variant of this command to disable HTTPS functionality for the Web-Authentication server. Syntax auth-web-server ssl no auth-web-server ssl Default HTTPS functionality for the Web-Authentication server feature is disabled by default.
  • Page 915: Auth-Web-Server Ssl Intercept-Port

    UTHENTICATION OMMANDS AUTH SERVER SSL INTERCEPT PORT auth-web-server ssl intercept-port Overview Use this command to register HTTPS intercept port numbers when the HTTPS server uses custom port number (not TCP port number 443). Note that you need to use the auth-web-server intercept-port command to register HTTP intercept port numbers.
  • Page 916: Copy Proxy-Autoconfig-File

    UTHENTICATION OMMANDS COPY PROXY AUTOCONFIG FILE copy proxy-autoconfig-file Overview Use this command to download the proxy auto configuration (PAC) file to your switch. The Web-Authentication supplicant can get the downloaded file from the system web server. copy <filename> proxy-autoconfig-file Syntax Parameter Description <filename>...
  • Page 917: Copy Web-Auth-Https-File

    UTHENTICATION OMMANDS COPY WEB AUTH HTTPS FILE copy web-auth-https-file Overview Use this command to download the SSL server certificate for web-based authentication. The file must be in PEM (Privacy Enhanced Mail) format, and contain the private key and the server certificate. copy <filename>...
  • Page 918: Description (Authentication Profile)

    UTHENTICATION OMMANDS DESCRIPTION UTHENTICATION ROFILE description (Authentication Profile) Overview Use this command to add a description to an authentication profile in Authentication Profile mode. Use the no variant of this command to remove the current description. Syntax description <description> Parameter Description <description>...
  • Page 919: Erase Proxy-Autoconfig-File

    UTHENTICATION OMMANDS ERASE PROXY AUTOCONFIG FILE erase proxy-autoconfig-file Overview Use this command to remove the proxy auto configuration file. erase proxy-autoconfig-file Syntax Mode Privileged Exec Example To remove the proxy auto configuration file, use the command: awplus# erase proxy-autoconfig-file Related show proxy-autoconfig-file Commands copy proxy-autoconfig-file...
  • Page 920: Erase Web-Auth-Https-File

    UTHENTICATION OMMANDS ERASE WEB AUTH HTTPS FILE erase web-auth-https-file Overview Use this command to remove the SSL server certificate for web-based authentication. erase web-auth-https-file Syntax Mode Privileged Exec Example To remove the SSL server certificate file for web-based authentication use the command: awplus# erase web-auth-https-file...
  • Page 921: Platform Mac-Vlan-Hashing-Algorithm

    UTHENTICATION OMMANDS PLATFORM MAC VLAN HASHING ALGORITHM platform mac-vlan-hashing-algorithm Overview This command enables you to change the MAC VLAN hash-key-generating algorithm. The no variant of this command returns the hash-key algorithm to the default of crc32l Syntax platform mac-vlan-hashing-algorithm {crc16l|crc16u|crc32l|crc32u} no platform mac-vlan-hashing-algorithm Parameter Description...
  • Page 922: Show Auth

    UTHENTICATION OMMANDS SHOW AUTH show auth Overview This command shows the configuration state of authentication. show auth [all] Syntax Parameter Description Display all authentication information for each authenticated interface. This can be a static channel (or static aggregator), or a dynamic (or LACP) channel group, or a switch port.
  • Page 923 UTHENTICATION OMMANDS SHOW AUTH twoStepAuthentication: configured: enabled actual: enabled supplicantMac: none Supplicant name: oha Supplicant address: 000d.6013.5398 authenticationMethod: WEB-based Authentication Two-Step Authentication: firstAuthentication: Pass - Method: dot1x secondAuthentication: Pass - Method: web portStatus: Authorized - currentId: 3 abort:F fail:F start:F timeout:F success:T PAE: state: Authenticated - portMode: Auto...
  • Page 924: Show Auth Diagnostics

    UTHENTICATION OMMANDS SHOW AUTH DIAGNOSTICS show auth diagnostics Overview This command shows authentication diagnostics, optionally for the specified interface, which may be a static channel (or static aggregator) or a dynamic (or LACP) channel group or a switch port. If no interface is specified then authentication diagnostics are shown for all interfaces.
  • Page 925 UTHENTICATION OMMANDS SHOW AUTH DIAGNOSTICS Output Figure 27-2: Example output from the show auth diagnostics command Authentication Diagnostics for interface port1.0.6 Supplicant address: 00d0.59ab.7037 authEnterConnecting: 2 authEaplogoffWhileConnecting: 1 authEnterAuthenticating: 2 authSuccessWhileAuthenticating: 1 authTimeoutWhileAuthenticating: 1 authFailWhileAuthenticating: 0 authEapstartWhileAuthenticating: 0 authEaplogoggWhileAuthenticating: 0 authReauthsWhileAuthenticated: 0...
  • Page 926: Show Auth Interface

    UTHENTICATION OMMANDS SHOW AUTH INTERFACE show auth interface Overview This command shows the status of port authentication on the specified interface, which may be a static channel (or static aggregator) or a dynamic (or LACP) channel group or a switch port. Use the optional diagnostics parameter to show authentication diagnostics for the specified interface.
  • Page 927 UTHENTICATION OMMANDS SHOW AUTH INTERFACE To display the Web based authentication status for port1.0.1, enter the command: awplus# show auth interface port1.0.1 awplus# show auth interface port1.0.1 Authentication Info for interface port1.0.1 portEnabled: true - portControl: Auto portStatus: Authorized reAuthenticate: disabled reAuthPeriod: 3600...
  • Page 928 UTHENTICATION OMMANDS SHOW AUTH INTERFACE Authentication Diagnostics for interface port1.0.6   Supplicant address: 00d0.59ab.7037 authEnterConnecting: 2 authEaplogoffWhileConnecting: 1 authEnterAuthenticating: 2 authSuccessWhileAuthenticating: 1 authTimeoutWhileAuthenticating: 1 authFailWhileAuthenticating: 0 authEapstartWhileAuthenticating: 0 authEaplogoggWhileAuthenticating: 0 authReauthsWhileAuthenticated: 0 authEapstartWhileAuthenticated: 0 authEaplogoffWhileAuthenticated: 0 BackendResponses: 2 BackendAccessChallenges: 1 BackendOtherrequestToSupplicant: 3...
  • Page 929: Show Auth Sessionstatistics

    UTHENTICATION OMMANDS SHOW AUTH SESSIONSTATISTICS show auth sessionstatistics Overview This command shows authentication session statistics for the specified interface, which may be a static channel (or static aggregator) or a dynamic (or LACP) channel group or a switch port. show auth sessionstatistics [interface <interface-list>] Syntax Parameter Description...
  • Page 930: Show Auth Statistics Interface

    UTHENTICATION OMMANDS SHOW AUTH STATISTICS INTERFACE show auth statistics interface Overview This command shows the authentication statistics for the specified interface, which may be a static channel (or static aggregator) or a dynamic (or LACP) channel group or a switch port. show auth statistics interface <interface-list>...
  • Page 931: Show Auth Supplicant

    UTHENTICATION OMMANDS SHOW AUTH SUPPLICANT show auth supplicant Overview This command shows the supplicant (client device) state when authentication is configured for the switch. Use the optional brief parameter to show a summary of the supplicant state. show auth supplicant [<macadd>] [brief] Syntax Parameter Description...
  • Page 932 UTHENTICATION OMMANDS SHOW AUTH SUPPLICANT Figure 27-5: Example output from show auth supplicant awplus#show auth supplicant Interface port2.0.3 authenticationMethod: dot1x/mac/web Two-Step Authentication firstMethod: mac secondMethod: dot1x/web totalSupplicantNum: 1 authorizedSupplicantNum: 1 macBasedAuthenticationSupplicantNum: 0 dot1xAuthenticationSupplicantNum: 0 webBasedAuthenticationSupplicantNum: 1 otherAuthenticationSupplicantNum: 0  Supplicant name: test Supplicant address: 0000.5E00.5301...
  • Page 933 UTHENTICATION OMMANDS SHOW AUTH SUPPLICANT Related aaa accounting auth-mac Commands aaa accounting auth-web aaa accounting dot1x aaa authentication auth-mac aaa authentication auth-web aaa authentication dot1x C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 934: Show Auth Supplicant Interface

    UTHENTICATION OMMANDS SHOW AUTH SUPPLICANT INTERFACE show auth supplicant interface Overview This command shows the supplicant (client device) state for the authentication mode set for the interface, which may be a static channel (or static aggregator) or a dynamic (or LACP) channel group or a switch port. Use the optional brief parameter to show a summary of the supplicant state.
  • Page 935: Show Auth Two-Step Supplicant Brief

    UTHENTICATION OMMANDS SHOW AUTH TWO STEP SUPPLICANT BRIEF show auth two-step supplicant brief Overview This command displays the supplicant state of the two-step authentication feature on the interface. show auth two-step supplicant [interface <ifrange>] brief Syntax Parameter Description interface The interface selected for display. <ifrange>...
  • Page 936: Show Auth-Web-Server

    UTHENTICATION OMMANDS SHOW AUTH SERVER show auth-web-server Overview This command shows the Web-Authentication server configuration and status on the switch. show auth-web-server Syntax Mode Privileged Exec Example To display Web-Authentication server configuration and status, enter the command: awplus# show auth-web-server Output Figure 27-8: Example output from the show auth-web-server command Web authentication server...
  • Page 937: Show Auth-Web-Server Page

    UTHENTICATION OMMANDS SHOW AUTH SERVER PAGE show auth-web-server page Overview This command displays the web-authentication page configuration and status. show auth-web-server page Syntax Mode Privileged Exec Examples To show the web-authentication page information, use the command: awplus# show auth-web-server page Figure 27-9: Example output from the show auth-web-server page command awplus#show auth-web-server page...
  • Page 938: Show Proxy-Autoconfig-File

    UTHENTICATION OMMANDS SHOW PROXY AUTOCONFIG FILE show proxy-autoconfig-file Overview This command displays the contents of the proxy auto configuration (PAC) file. show proxy-autoconfig-file Syntax Mode Privileged Exec Example To display the contents of the proxy auto configuration (PAC) file, enter the command: awplus# show auth proxy-autoconfig-file...
  • Page 939: Aaa Commands

    AAA Commands Introduction Overview This chapter provides an alphabetical reference for AAA commands for Authentication, Authorization and Accounting. For more information, see the Feature Overview and Configuration Guide. Command List • “aaa accounting auth-mac” on page 941 • “aaa accounting auth-web”...
  • Page 940 AAA C OMMANDS • “login authentication” on page 972 • “proxy-port” on page 973 • “radius-secure-proxy aaa” on page 974 • “server (radsecproxy-aaa)” on page 975 • “server name-check” on page 977 • “server trustpoint” on page 978 • “show aaa local user locked”...
  • Page 941: Aaa Accounting Auth-Mac

    AAA C OMMANDS AAA ACCOUNTING AUTH aaa accounting auth-mac Overview This command configures the default accounting method list for MAC-based authentication. The default accounting method list specifies what type of accounting messages are sent and which RADIUS servers the accounting messages are sent to.
  • Page 942 AAA C OMMANDS AAA ACCOUNTING AUTH Examples To enable the default RADIUS accounting for MAC-based authentication, and use all available RADIUS servers, use the commands: awplus# configure terminal awplus(config)# aaa accounting auth-mac default start-stop group radius To disable RADIUS accounting for MAC-based Authentication, use the commands: awplus# configure terminal awplus(config)#...
  • Page 943: Aaa Accounting Auth-Web

    AAA C OMMANDS AAA ACCOUNTING AUTH aaa accounting auth-web Overview This command configures the default accounting method list for Web-based authentication. The default accounting method list specifies what type of accounting messages are sent and which RADIUS servers the accounting messages are sent to.
  • Page 944 AAA C OMMANDS AAA ACCOUNTING AUTH Examples To enable the default RADIUS accounting method for Web-based authentication, and use all available RADIUS servers, use the commands: awplus# configure terminal awplus(config)# aaa accounting auth-web default start-stop group radius To disable the default RADIUS accounting method for Web-based authentication, use the commands: awplus# configure terminal...
  • Page 945: Aaa Accounting Commands

    AAA C OMMANDS AAA ACCOUNTING COMMANDS aaa accounting commands Overview This command configures and enables TACACS+ accounting on commands entered at a specified privilege level. Once enabled for a privilege level, accounting messages for commands entered at that privilege level will be sent to a TACACS+ server.
  • Page 946 AAA C OMMANDS AAA ACCOUNTING COMMANDS Command accounting cannot coexist with triggers. An error message is displayed if you attempt to enable command accounting while a trigger is configured. Likewise, an error message is displayed if you attempt to configure a trigger while command accounting is configured.
  • Page 947: Aaa Accounting Dot1X

    AAA C OMMANDS AAA ACCOUNTING DOT aaa accounting dot1x Overview This command configures the default accounting method list for IEEE 802.1X-based authentication. The default accounting method list specifies what type of accounting messages are sent and which RADIUS servers the accounting messages are sent to.
  • Page 948 AAA C OMMANDS AAA ACCOUNTING DOT Examples To enable RADIUS accounting for 802.1X-based authentication, and use all available RADIUS Servers, use the commands: awplus# configure terminal awplus(config)# aaa accounting dot1x default start-stop group radius To disable RADIUS accounting for 802.1X-based authentication, use the commands: awplus# configure terminal...
  • Page 949: Aaa Accounting Login

    AAA C OMMANDS AAA ACCOUNTING LOGIN aaa accounting login Overview This command configures RADIUS and TACACS+ accounting for login shell sessions. The specified method list name can be used by the accounting login command in the Line Configuration mode. If the default parameter is specified, then this creates a default method list that is applied to every console and vty line, unless another accounting method list is applied on that line.
  • Page 950 AAA C OMMANDS AAA ACCOUNTING LOGIN Usage This command enables you to define a named accounting method list. The items that you define in the accounting options are: • the types of accounting packets that will be sent • the set of servers to which the accounting packets will be sent You can define a default method list with the name default and any number of other named method lists.
  • Page 951: Accounting Login

    AAA C OMMANDS AAA ACCOUNTING LOGIN Related aaa accounting commands Commands aaa authentication login aaa accounting login aaa accounting update accounting login radius-server host tacacs-server host C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 952: Aaa Accounting Update

    AAA C OMMANDS AAA ACCOUNTING UPDATE aaa accounting update Overview This command enables periodic accounting reporting to either the RADIUS or TACACS+ accounting server(s) wherever login accounting has been configured. Note that unlimited RADIUS servers and up to four TACACS+ servers can be configured and consulted for accounting.
  • Page 953 AAA C OMMANDS AAA ACCOUNTING UPDATE To disable periodic accounting update wherever accounting has been configured, use the following commands: awplus# configure terminal awplus(config)# no aaa accounting update Related aaa accounting auth-mac Commands aaa accounting auth-web aaa accounting dot1x aaa accounting login C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 954: Aaa Authentication Auth-Mac

    AAA C OMMANDS AAA AUTHENTICATION AUTH aaa authentication auth-mac Overview This command enables MAC-based authentication globally and allows you to enable an authentication method list (in this case, a list of RADIUS servers). It is automatically applied to every interface running MAC-based authentication. Use the no variant of this command to disable MAC-based authentication globally.
  • Page 955 AAA C OMMANDS AAA AUTHENTICATION AUTH radius-server host C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 956: Aaa Authentication Auth-Web

    AAA C OMMANDS AAA AUTHENTICATION AUTH aaa authentication auth-web Overview This command enables Web-based authentication globally and allows you to enable an authentication method list (in this case, a list of RADIUS servers). It is automatically applied to every interface running Web-based authentication. Use the no variant of this command to disable Web-based authentication globally.
  • Page 957 AAA C OMMANDS AAA AUTHENTICATION AUTH radius-server host C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 958: Aaa Authentication Dot1X

    AAA C OMMANDS AAA AUTHENTICATION DOT aaa authentication dot1x Overview This command enables IEEE 802.1X-based authentication globally and allows you to enable an authentication method list (in this case, a list of RADIUS servers). It is automatically applied to every interface running IEEE 802.1X-based authentication.
  • Page 959: Aaa Authentication Enable Default Group Tacacs

    AAA C OMMANDS AAA AUTHENTICATION ENABLE DEFAULT GROUP TACACS aaa authentication enable default group tacacs+ Overview This command enables AAA authentication to determine the privilege level a user can access for passwords authenticated against the TACACS+ server. Use the no variant of this command to disable privilege level authentication. aaa authentication enable default group tacacs+ [local] [none] Syntax no aaa authentication enable default...
  • Page 960 AAA C OMMANDS AAA AUTHENTICATION ENABLE DEFAULT GROUP TACACS • aaa authentication enable default group tacacs+ none then the user is granted access to Privileged Exec mode with no authentication. This is true even if a locally configured enable password is configured.
  • Page 961: Aaa Authentication Enable Default Local

    AAA C OMMANDS AAA AUTHENTICATION ENABLE DEFAULT LOCAL aaa authentication enable default local Overview This command enables AAA authentication to determine the privilege level a user can access for passwords authenticated locally. aaa authentication enable default local Syntax Default Local privilege level authentication is enabled by default. Mode Global Configuration Usage...
  • Page 962: Aaa Authentication Login

    AAA C OMMANDS AAA AUTHENTICATION LOGIN aaa authentication login Overview Use this command to create an ordered list of methods to use to authenticate user login, or to replace an existing method list with the same name. Specify one or more of the options local or group, in the order you want them to be applied.
  • Page 963 AAA C OMMANDS AAA AUTHENTICATION LOGIN Usage When a user attempts to log in, the switch sends an authentication request to the first authentication server in the method list. If the first server in the list is reachable and it contains a username and password matching the authentication request, the user is authenticated and the login succeeds.
  • Page 964: Aaa Group Server

    AAA C OMMANDS AAA GROUP SERVER aaa group server Overview This command configures a RADIUS server group. A server group can be used to specify a subset of RADIUS servers in aaa commands. The group name radius is predefined, which includes all RADIUS servers configured by the radius-server host command.
  • Page 965 AAA C OMMANDS AAA GROUP SERVER Related aaa accounting auth-mac Commands aaa accounting auth-web aaa accounting dot1x aaa accounting login aaa authentication auth-mac aaa authentication auth-web aaa authentication dot1x aaa authentication login radius-server host server (Server Group) C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 966: Aaa Local Authentication Attempts Lockout-Time

    AAA C OMMANDS AAA LOCAL AUTHENTICATION ATTEMPTS LOCKOUT TIME aaa local authentication attempts lockout-time Overview This command configures the duration of the user lockout period. Use the no variant of this command to restore the duration of the user lockout period to its default of 300 seconds (5 minutes).
  • Page 967: Aaa Local Authentication Attempts Max-Fail

    AAA C OMMANDS AAA LOCAL AUTHENTICATION ATTEMPTS MAX FAIL aaa local authentication attempts max-fail Overview This command configures the maximum number of failed login attempts before a user account is locked out. Every time a login attempt fails the failed login counter is incremented.
  • Page 968: Aaa Login Fail-Delay

    AAA C OMMANDS AAA LOGIN FAIL DELAY aaa login fail-delay Overview Use this command to configure the minimum time period between failed login attempts. This setting applies to login attempts via the console, SSH and Telnet. Use the no variant of this command to reset the minimum time period to its default value.
  • Page 969: Accounting Login

    AAA C OMMANDS ACCOUNTING LOGIN accounting login Overview This command applies a login accounting method list to console or VTY lines for user login. When login accounting is enabled using this command, logging events generate an accounting record to the accounting server. The accounting method list must be configured first using this command.
  • Page 970: Clear Aaa Local User Lockout

    AAA C OMMANDS CLEAR AAA LOCAL USER LOCKOUT clear aaa local user lockout Overview Use this command to clear the lockout on a specific user account or all user accounts. clear aaa local user lockout {username <username>|all} Syntax Parameter Description username Clear lockout for the specified user.
  • Page 971: Debug Aaa

    AAA C OMMANDS DEBUG AAA debug aaa Overview This command enables AAA debugging. Use the no variant of this command to disable AAA debugging. Syntax debug aaa [accounting|all|authentication|authorization] no debug aaa [accounting|all|authentication|authorization] Parameter Description accounting Accounting debugging. All debugging options are enabled. authentication Authentication debugging.
  • Page 972: Login Authentication

    AAA C OMMANDS LOGIN AUTHENTICATION login authentication Overview Use this command to apply an AAA server for authenticating user login attempts from a console or remote logins on these console or VTY lines. The authentication method list must be specified by the aaa authentication login command. If the method list has not been configured by the aaa authentication login command, login authentication will fail on these lines.
  • Page 973: Proxy-Port

    AAA C OMMANDS PROXY PORT proxy-port Overview Use this command to change the local UDP port used for communication between local RADIUS client applications and the RadSecProxy AAA application. Any unused UDP port may be selected. The default port is 1645. Use the no variant of this command to change the UDP port back to the default of 1645.
  • Page 974: Radius-Secure-Proxy Aaa

    AAA C OMMANDS RADIUS SECURE PROXY AAA radius-secure-proxy aaa Overview Use this command to enter the RadSecProxy AAA (authentication, authorization, and accounting) application configuration mode. This application allows local RADIUS-based clients on system to communicate with remote RadSec servers via a secure (TLS) proxy.
  • Page 975: Server (Radsecproxy-Aaa)

    AAA C OMMANDS SERVER RADSECPROXY server (radsecproxy-aaa) Overview Use this command to add a server to the RadSecProxy AAA application. Local RADIUS client applications will attempt, via the proxy, to communicate with any RadSec servers that are operational (in addition to any non-TLS RADIUS servers that are configured).
  • Page 976 AAA C OMMANDS SERVER RADSECPROXY Example To add a server which waits 3 seconds before receiving replies, use the commands: awplus# configure terminal awplus(config)# radius-secure-proxy aaa awplus(config-radsecproxy-aaa)# client mynas.local name-check Related proxy-port Commands radius-secure-proxy aaa server name-check server trustpoint C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 977: Server Name-Check

    AAA C OMMANDS SERVER NAME CHECK server name-check Overview This command sets the global behavior for certificate name-checking for the RadSecProxy AAA application to on. This behavior will be used for all servers associated with the application that do not specify a behavior on a per-server basis. If name-checking is enabled, the Common Name portion of the subject field of the client’s X.509 certificate must match the domain name or IP address specified in the server (radsecproxy-aaa) command.
  • Page 978: Server Trustpoint

    AAA C OMMANDS SERVER TRUSTPOINT server trustpoint Overview This command adds one or more trustpoints to be used with the RadSecProxy AAA application. Multiple trustpoints may be specified, or the command may be executed more than once, to add multiple trustpoints to the application. The no version of this command removes one or more trustpoints from the list of trustpoints associated with the application.
  • Page 979 AAA C OMMANDS SERVER TRUSTPOINT server (radsecproxy-aaa) server name-check C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 980: Show Aaa Local User Locked

    AAA C OMMANDS SHOW AAA LOCAL USER LOCKED show aaa local user locked Overview This command displays the current number of failed attempts, last failure time and location against each user account attempting to log into the device. Note that once the lockout count has been manually cleared by another privileged account using the clear aaa local user lockout command or a locked account...
  • Page 981: Show Debugging Aaa

    AAA C OMMANDS SHOW DEBUGGING AAA show debugging aaa Overview This command displays the current debugging status for AAA (Authentication, Authorization, Accounting). show debugging aaa Syntax Mode User Exec and Privileged Exec Example To display the current debugging status of AAA, use the command: awplus# show debug aaa Output...
  • Page 982: Undebug Aaa

    AAA C OMMANDS UNDEBUG AAA undebug aaa Overview This command applies the functionality of the no debug aaa command. C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 983: Radius Commands

    RADIUS Commands Introduction Overview This chapter provides an alphabetical reference for commands used to configure the device to use RADIUS servers. Command List • “auth radius send nas-identifier” on page 984 • “auth radius send service-type” on page 985 • “deadtime (RADIUS server group)”...
  • Page 984: Auth Radius Send Nas-Identifier

    RADIUS C OMMANDS AUTH RADIUS SEND NAS IDENTIFIER auth radius send nas-identifier Overview Use this command to enable the device to include the NAS-Identifier(32) attribute in RADIUS authentication requests. Use the no variant of this command to stop including the NAS-Identifier attribute. Syntax auth radius send nas-identifier [<name>|vlan-id] no auth radius send nas-identifier...
  • Page 985: Auth Radius Send Service-Type

    RADIUS C OMMANDS AUTH RADIUS SEND SERVICE TYPE auth radius send service-type Overview Use this command to enable the device to include the Service-Type(6) attribute in RADIUS authentication requests. The Service-Type attribute has a value of: • Framed(2) for 802.1x •...
  • Page 986: Deadtime (Radius Server Group)

    RADIUS C OMMANDS (RADIUS DEADTIME SERVER GROUP deadtime (RADIUS server group) Overview Use this command to configure the deadtime parameter for the RADIUS server group. This command overrides the global dead-time configured by the radius-server deadtime command. The configured deadtime is the time period in minutes to skip a RADIUS server for authentication or accounting requests if the server is “dead”.
  • Page 987: Debug Radius

    RADIUS C OMMANDS DEBUG RADIUS debug radius Overview This command enables RADIUS debugging. If no option is specified, all debugging options are enabled. Use the no variant of this command to disable RADIUS debugging. If no option is specified, all debugging options are disabled. Syntax debug radius [packet|event|all] no debug radius [packet|event|all]...
  • Page 988: Ip Radius Source-Interface

    RADIUS C OMMANDS IP RADIUS SOURCE INTERFACE ip radius source-interface Overview This command configures the source IP address of every outgoing RADIUS packet to use a specific IP address or the IP address of a specific interface. If the specified interface is down or there is no IP address on the interface, then the source IP address of outgoing RADIUS packets depends on the interface the packets leave.
  • Page 989: Radius-Server Deadtime

    RADIUS C OMMANDS RADIUS SERVER DEADTIME radius-server deadtime Overview Use this command to specify the global deadtime for all RADIUS servers. If a RADIUS server is considered dead, it is skipped for the specified deadtime. This command specifies for how many minutes a RADIUS server that is not responding to authentication requests is passed over by requests for RADIUS authentication.
  • Page 990: Radius-Server Host

    RADIUS C OMMANDS RADIUS SERVER HOST radius-server host Overview Use this command to specify a remote RADIUS server host for authentication or accounting, and to set server-specific parameters. The parameters specified with this command override the corresponding global parameters for RADIUS servers. This command specifies the IP address or host name of the remote RADIUS server host and assigns authentication and accounting destination UDP port numbers.
  • Page 991 RADIUS C OMMANDS RADIUS SERVER HOST Parameter Description <1-1000> Time in seconds to wait for a server reply (timeout is set to 5 seconds by default) The time interval (in seconds) to wait for the RADIUS server to reply before retransmitting a request or considering the server dead.
  • Page 992 RADIUS C OMMANDS RADIUS SERVER HOST included in the predefined RADIUS server group radius, which may be used by AAA authentication, authorization and accounting commands. The client transmits (and retransmits, according to the retransmit and timeout parameters) RADIUS authentication or accounting requests to the servers in the order you specify them, until it gets a response.
  • Page 993: Radius-Server Key

    RADIUS C OMMANDS RADIUS SERVER KEY radius-server key Overview This command sets a global secret key for RADIUS authentication on the device. The shared secret text string is used for RADIUS authentication between the device and a RADIUS server. Note that if no secret key is explicitly specified for a RADIUS server, the global secret key will be used for the shared secret for the server.
  • Page 994: Radius-Server Retransmit

    RADIUS C OMMANDS RADIUS SERVER RETRANSMIT radius-server retransmit Overview This command sets the retransmit counter to use RADIUS authentication on the device. This command specifies how many times the device transmits each RADIUS request to the RADIUS server before giving up. This command configures the retransmit parameter for RADIUS servers globally.
  • Page 995: Show Radius Statistics

    RADIUS C OMMANDS RADIUS SERVER RETRANSMIT Related radius-server deadtime Commands radius-server host show radius statistics C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™ Operating System - Version 5.4.6-1.x...
  • Page 996: Radius-Server Timeout

    RADIUS C OMMANDS RADIUS SERVER TIMEOUT radius-server timeout Overview Use this command to specify the RADIUS global timeout value. This is how long the device waits for a reply to a RADIUS request before retransmitting the request, or considering the server to be dead. If no timeout is specified for the particular RADIUS server by the radius-server host command, it uses this global timeout value.
  • Page 997 RADIUS C OMMANDS RADIUS SERVER TIMEOUT To reset the global timeout period for RADIUS servers to the default, use the following command: awplus# configure terminal awplus(config)# no radius-server timeout Related radius-server deadtime Commands radius-server host radius-server retransmit show radius statistics C613-50105-01 REV C Command Reference for x210 Series AlliedWare Plus™...
  • Page 998: Server (Server Group)

    RADIUS C OMMANDS SERVER ERVER ROUP server (Server Group) Overview This command adds a RADIUS server to a server group in Server-Group Configuration mode. The RADIUS server should be configured by the radius-server host command. The server is appended to the server list of the group and the order of configuration determines the precedence of servers.
  • Page 999 RADIUS C OMMANDS SERVER ERVER ROUP Default The default Authentication port number is 1812 and the default Accounting port number is 1813. Mode Server Group Configuration Usage The RADIUS server to be added must be configured by the radius-server host command.
  • Page 1000: Show Debugging Radius

    RADIUS C OMMANDS SHOW DEBUGGING RADIUS show debugging radius Overview This command displays the current debugging status for the RADIUS servers. show debugging radius Syntax Mode User Exec and Privileged Exec Example To display the current debugging status of RADIUS servers, use the command: awplus# show debugging radius Output...

This manual is also suitable for:

At-x210-16gtAt-x210-24gt

Table of Contents