Allied Telesis CentreCOM FS980M/9 Command Reference Manual

Allied Telesis CentreCOM FS980M/9 Command Reference Manual

Centrecom fs980m series fast ethernet managed access switches alliedware plus version 5.4.7-0.x
Hide thumbs Also See for CentreCOM FS980M/9:
Table of Contents

Advertisement

CentreCOM
FAST ETHERNET MANAGED ACCESS SWITCHES
FS980M/9
FS980M/9PS
FS980M/18
FS980M/18PS
Command Reference for
AlliedWare Plus™ Version 5.4.7-0.x
613-50157-01 Rev C
®
FS980M Series
FS980M/28
FS980M/28PS
FS980M/52
FS980M/52PS

Advertisement

Table of Contents
loading

Summary of Contents for Allied Telesis CentreCOM FS980M/9

  • Page 1 ® CentreCOM FS980M Series FAST ETHERNET MANAGED ACCESS SWITCHES FS980M/9 FS980M/28 FS980M/9PS FS980M/28PS FS980M/18 FS980M/52 FS980M/18PS FS980M/52PS Command Reference for AlliedWare Plus™ Version 5.4.7-0.x 613-50157-01 Rev C...
  • Page 2 If you would like a copy of the GPL source code contained in Allied Telesis products, please send us a request by registered mail including a check for US$15 to cover production and shipping costs and a CD with the GPL code will be mailed to you.
  • Page 3: Table Of Contents

    Contents PART 1: Setup and Troubleshooting ......60 Chapter 1: CLI Navigation Commands ......61 Introduction .
  • Page 4 erase factory-default ........98 erase startup-config ........99 ip tftp source-interface .
  • Page 5 Chapter 4: GUI Commands ........163 Introduction .
  • Page 6 show system pluggable detail ......233 show system pluggable diagnostics ......236 show test cable-diagnostics tdr .
  • Page 7 echo ..........317 wait .
  • Page 8 polarity ......... . . 376 show debugging loopprot .
  • Page 9 vlan classifier rule proto ....... . . 440 vlan database ........443 vlan mode stack-local-vlan .
  • Page 10 spanning-tree portfast bpdu-guard ......514 spanning-tree priority (bridge priority) ..... . . 516 spanning-tree priority (port priority) .
  • Page 11 arp log ..........575 arp-reply-bc-dmac .
  • Page 12 ip route ......... . . 635 ipv6 route .
  • Page 13 PART 4: Multicast Applications ....... 699 Chapter 22: IGMP Snooping Commands ......700 Introduction .
  • Page 14 Introduction ........757 access-group .
  • Page 15 match cos ......... . 860 match dscp .
  • Page 16 show dot1x ......... 925 show dot1x diagnostics .
  • Page 17 auth-web-server page title ......1014 auth-web-server page welcome-message ....1015 auth-web-server ping-poll enable .
  • Page 18 authorization commands ....... 1084 clear aaa local user lockout ......1086 debug aaa .
  • Page 19 subject-name (trustpoint configuration) ..... 1147 Chapter 33: TACACS+ Commands ......1149 Introduction .
  • Page 20 Chapter 35: Virtual Chassis Stacking (VCStack™) Commands ... . . 1212 Introduction ........1212 clear counter stack .
  • Page 21 Chapter 38: Allied Telesis Management Framework™ (AMF) Commands ..1283 Introduction ........1283 area-link .
  • Page 22 atmf provision node license-cert ......1349 atmf provision node locate ......1351 atmf reboot-rolling .
  • Page 23 show atmf secure-mode audit ......1460 show atmf secure-mode audit link ......1461 show atmf secure-mode certificates .
  • Page 24 show running-config snmp ......1535 show snmp-server ........1536 show snmp-server community .
  • Page 25 show lldp ......... 1605 show lldp interface .
  • Page 26 show ssh server ........1676 show ssh server allow-users .
  • Page 27 debug ping-poll ........1742 description (ping-polling) .
  • Page 28 List of Commands (access-list extended ICMP filter) .........815 (access-list extended IP filter).
  • Page 29 aaa authorization commands ......... . .1152 aaa authorization config-commands .
  • Page 30 atmf backup area-masters delete........1299 atmf backup area-masters enable .
  • Page 31 atmf provision node create ..........1345 atmf provision node delete .
  • Page 32 auth roaming enable ........... . 968 auth supplicant-ip .
  • Page 33 auth-web-server ping-poll failcount ........1017 auth-web-server ping-poll interval .
  • Page 34 clear ip dhcp snooping statistics ........1169 clear ip igmp group.
  • Page 35 commit (IPv4) ............798 configure terminal .
  • Page 36 debug epsr .............1256 debug igmp .
  • Page 37 description (interface) ........... 320 description (ping-polling) .
  • Page 38 epsr priority ............1263 epsr state.
  • Page 39 ip dhcp snooping delete-by-linkdown........1180 ip dhcp snooping max-bindings ........1181 ip dhcp snooping subscriber-id .
  • Page 40 ip rip send version 1-compatible ......... 672 ip rip send version .
  • Page 41 lacp system-priority............530 lacp timeout.
  • Page 42 log console exclude ........... . . 264 log console .
  • Page 43 match cos ............. . . 860 match dscp.
  • Page 44 ntp source............. .1516 ntp trusted-key (deprecated).
  • Page 45 recv-buffer-size (RIP) ........... . . 683 redistribute (RIP).
  • Page 46 service advanced-vty ........... . 149 service dhcp-snooping.
  • Page 47 show atmf links statistics..........1452 show atmf links.
  • Page 48 show counter stack ........... . .1220 show cpu history .
  • Page 49 show dot1x diagnostics ..........928 show dot1x interface .
  • Page 50 show ip dhcp snooping agent-option ........1201 show ip dhcp snooping binding.
  • Page 51 show ipv6 route ............630 show ipv6 route .
  • Page 52 show ntp counters............1522 show ntp status .
  • Page 53 show security-password configuration ........153 show security-password user..........154 show snmp-server community .
  • Page 54 show system mac............221 show system pluggable detail.
  • Page 55 snmp-server ............1545 source-ip .
  • Page 56 ssh server allow-users...........1686 ssh server authentication .
  • Page 57 switchport atmf-link ........... .1488 switchport enable vlan.
  • Page 58 traceroute ipv6 ............633 traceroute .
  • Page 59 undebug snmp ............1566 undebug ssh client .
  • Page 60: Part 1: Setup And Troubleshooting

    Part 1: Setup and Troubleshooting 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 61: Cli Navigation Commands

    CLI Navigation Commands Introduction Overview This chapter provides an alphabetical reference for the commands used to navigate between different modes. This chapter also provides a reference for the help and show commands used to help navigate within the CLI. Command List •...
  • Page 62: Configure Terminal

    CLI N AVIGATION OMMANDS CONFIGURE TERMINAL configure terminal Overview This command enters the Global Configuration command mode. configure terminal Syntax Mode Privileged Exec Example To enter the Global Configuration command mode (note the change in the command prompt), enter the command: awplus# configure terminal awplus(config)#...
  • Page 63: Disable (Privileged Exec Mode)

    CLI N AVIGATION OMMANDS DISABLE RIVILEGED XEC MODE disable (Privileged Exec mode) Overview This command exits the Privileged Exec mode, returning the prompt to the User Exec mode. To end a session, use the exit command. disable Syntax Mode Privileged Exec Example To exit the Privileged Exec mode, enter the command: awplus#...
  • Page 64 CLI N AVIGATION OMMANDS Overview This command lets you to run User Exec and Privileged Exec mode commands when you are in any configuration mode. do <command> Syntax Parameter Description <command> Specify the command and its parameters. Mode Any configuration mode awplus# configure terminal Example...
  • Page 65: Enable (Privileged Exec Mode)

    CLI N AVIGATION OMMANDS ENABLE RIVILEGED XEC MODE enable (Privileged Exec mode) Overview This command enters the Privileged Exec mode and optionally changes the privilege level for a session. If a privilege level is not specified then the maximum privilege level (15) is applied to the session. If the optional privilege level is omitted then only users with the maximum privilege level can access Privileged Exec mode without providing the password as specified by the enable password...
  • Page 66 CLI N AVIGATION OMMANDS ENABLE RIVILEGED XEC MODE Privilege Exec mode. Use the enable password command or the enable secret commands to set the password to enable access to Privileged Exec mode. awplus> enable 7 awplus# Related disable (Privileged Exec mode) Commands enable password enable secret...
  • Page 67: End

    CLI N AVIGATION OMMANDS Overview This command returns the prompt to the Privileged Exec command mode from any other advanced command mode. Syntax Mode All advanced command modes, including Global Configuration and Interface Configuration modes. Example The following example shows the use of the end command to return to the Privileged Exec mode directly from Interface mode.
  • Page 68: Exit

    CLI N AVIGATION OMMANDS EXIT exit Overview This command exits the current mode, and returns the prompt to the mode at the previous level. When used in User Exec mode, the exit command terminates the session. exit Syntax Mode All command modes, including Global Configuration and Interface Configuration modes.
  • Page 69: Help

    CLI N AVIGATION OMMANDS HELP help Overview This command displays a description of the AlliedWare Plus™ OS help system. help Syntax Mode All command modes Example To display a description on how to use the system help, use the command: awplus# help Output...
  • Page 70: Logout

    CLI N AVIGATION OMMANDS LOGOUT logout Overview This command exits the User Exec or Privileged Exec modes and ends the session. logout Syntax Mode User Exec and Privileged Exec Example To exit the User Exec mode, use the command: awplus# logout 613-50157-01 Rev C Command Reference for FS980M Series...
  • Page 71: Show History

    CLI N AVIGATION OMMANDS SHOW HISTORY show history Overview This command lists the commands entered in the current session. The history buffer is cleared automatically upon reboot. The output lists all command line entries, including commands that returned an error. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 72: File And Configuration Management Commands

    File and Configuration Management Commands Introduction Overview This chapter provides an alphabetical reference of AlliedWare Plus™ OS file and configuration management commands. Filename Syntax Many of the commands in this chapter use the placeholder “filename” to represent and Keyword the name and location of the file that you want to act on. The following table Usage explains the syntax of the filename for each different type of file location.
  • Page 73 ILE AND ONFIGURATION ANAGEMENT OMMANDS When you copy a file... Use this syntax: Example: Copying with SFTP sftp://[[<location>]/<directory>] To specify a file in the top-level /<filename> directory of the server: sftp://10.0.0.5/example.cfg <hostname>-<stack_ID>/flash:[/][< Copying to or from To specify a file in the configs directory directory>/] stack member on member 2 of a stack named vcstack:...
  • Page 74 ILE AND ONFIGURATION ANAGEMENT OMMANDS Similarly, you can specify the USB storage device base directory with usb or usb: or usb:/ You cannot name a directory or subdirectory flash, nvs, usb, card, tftp, scp, sftp or http. These keywords are reserved for tab completion when using various file commands.
  • Page 75 ILE AND ONFIGURATION ANAGEMENT OMMANDS • “show boot” on page 108 • “show file” on page 110 • “show file systems” on page 111 • “show running-config” on page 113 • “show running-config interface” on page 117 • “show startup-config” on page 119 •...
  • Page 76: Autoboot Enable

    ILE AND ONFIGURATION ANAGEMENT OMMANDS AUTOBOOT ENABLE autoboot enable Overview This command enables the device to restore a release file and/or a configuration file from external media, such as a USB storage device. When the Autoboot feature is enabled, the device looks for a special file called autoboot.txt on the external media.
  • Page 77: Boot Config-File

    ILE AND ONFIGURATION ANAGEMENT OMMANDS BOOT CONFIG FILE boot config-file Overview Use this command to set the configuration file to use during the next boot cycle. Use the no variant of this command to remove the configuration file. Syntax boot config-file <filepath-filename> no boot config-file Parameter Description...
  • Page 78 ILE AND ONFIGURATION ANAGEMENT OMMANDS BOOT CONFIG FILE To stop running the configuration file “branch.cfg” stored on the switch’s USB storage device filesystem when the device boots up, use the commands: awplus# configure terminal awplus(config)# no boot config-file usb:/branch.cfg Related boot config-file backup Commands boot system...
  • Page 79: Boot Config-File Backup

    ILE AND ONFIGURATION ANAGEMENT OMMANDS BOOT CONFIG FILE BACKUP boot config-file backup Overview Use this command to set a backup configuration file to use if the main configuration file cannot be accessed. Use the no variant of this command to remove the backup configuration file. Syntax boot config-file backup <filepath-filename>...
  • Page 80: Boot System

    ILE AND ONFIGURATION ANAGEMENT OMMANDS BOOT SYSTEM boot system Overview Use this command to set the release file to load during the next boot cycle. Use the no variant of this command to stop specifying a primary release file to boot from.
  • Page 81 ILE AND ONFIGURATION ANAGEMENT OMMANDS BOOT SYSTEM In a VCStack configuration, if there is not enough space to synchronize the new release across the stack, the boot system command has an interactive mode that prompts you to delete old releases. awplus# configure terminal awplus(config)#...
  • Page 82: Boot System Backup

    ILE AND ONFIGURATION ANAGEMENT OMMANDS BOOT SYSTEM BACKUP boot system backup Overview Use this command to set a backup release file to load if the main release file cannot be loaded. Use the no variant of this command to stop specifying a backup release file. Syntax boot system backup <filepath-filename>...
  • Page 83 ILE AND ONFIGURATION ANAGEMENT OMMANDS Overview This command changes the current working directory. cd <directory-name> Syntax Parameter Description <directory-name> Name and path of the directory. Mode Privileged Exec To change to the directory called images, use the command: Example awplus# cd images Related Commands...
  • Page 84: Copy (Filename)

    ILE AND ONFIGURATION ANAGEMENT OMMANDS COPY FILENAME copy (filename) Overview This command copies a file. This allows you to: • copy files from your device to a remote device • copy files from a remote device to your device • copy files stored on Flash memory to or from a different memory type, such as a USB storage device •...
  • Page 85 ILE AND ONFIGURATION ANAGEMENT OMMANDS COPY FILENAME To copy the file “config.cfg” into the current directory from a USB storage device, and rename it to “configtest.cfg”, use the command: awplus# copy usb:/config.cfg configtest.cfg To copy the file “config.cfg” into the current directory from a remote file server, and rename it to “configtest.cfg”, use the command: awplus# copy fserver:/config.cfg configtest.cfg...
  • Page 86: Copy Current-Software

    ILE AND ONFIGURATION ANAGEMENT OMMANDS COPY CURRENT SOFTWARE copy current-software Overview This command copies the AlliedWare Plus™ OS software that the device has booted from, to a destination file. Specify whether the destination is Flash or USB when saving the software to the local filesystem. copy current-software <destination-name>...
  • Page 87: Copy Debug

    ILE AND ONFIGURATION ANAGEMENT OMMANDS COPY DEBUG copy debug Overview This command copies a specified debug file to a destination file. Specify whether the destination is Flash or USB when saving the software to the local filesystem. copy debug {<destination-name>|debug|flash|nvs|scp|tftp|usb} Syntax {<source-name>|debug|flash|nvs|scp|tftp|usb} Parameter...
  • Page 88: Copy Running-Config

    ILE AND ONFIGURATION ANAGEMENT OMMANDS COPY RUNNING CONFIG copy running-config Overview This command copies the running-config to a destination file, or copies a source file into the running-config. Commands entered in the running-config do not survive a device reboot unless they are saved in a configuration file. copy <source-name>...
  • Page 89: Copy Startup-Config

    ILE AND ONFIGURATION ANAGEMENT OMMANDS COPY STARTUP CONFIG copy startup-config Overview This command copies the startup-config script into a destination file, or alternatively copies a configuration script from a source file into the startup-config file. copy <source-name> startup-config Syntax copy startup-config <destination-name> Parameter Description <source-name>...
  • Page 90: Copy Zmodem

    ILE AND ONFIGURATION ANAGEMENT OMMANDS COPY ZMODEM copy zmodem Overview This command allows you to copy files using ZMODEM using Minicom. ZMODEM works over a serial connection and does not need any interfaces configured to do a file transfer. copy <source-name> zmodem Syntax copy zmodem Parameter...
  • Page 91: Create Autoboot

    ILE AND ONFIGURATION ANAGEMENT OMMANDS CREATE AUTOBOOT create autoboot Use this command to create an autoboot.txt file on external media. This Overview command will automatically ensure that the keys and values that are expected in this file are correct. After the file is created the create autoboot command will copy the current release and configuration files across to the external media.
  • Page 92: Delete

    ILE AND ONFIGURATION ANAGEMENT OMMANDS DELETE delete Overview This command deletes files or directories. delete [force] [recursive] <filename> Syntax Parameter Description force Ignore nonexistent filenames and never prompt before deletion. recursive Remove the contents of directories recursively. <filename> The filename and path of the file to delete. See Introduction on page 72 for valid syntax.
  • Page 93: Delete Debug

    ILE AND ONFIGURATION ANAGEMENT OMMANDS DELETE DEBUG delete debug Overview Use this command to delete a specified debug output file. delete debug <source-name> Syntax Parameter Description <source-name> The filename and path where the debug output originates. Introduction on page 72 for valid URL syntax. Mode Privileged Exec Example...
  • Page 94: Dir

    ILE AND ONFIGURATION ANAGEMENT OMMANDS Overview This command lists the files on a filesystem. If no directory or file is specified then this command lists the files in the current working directory. dir [all] [recursive] [sort [reverse] [name|size|time] Syntax [<filename>|debug|flash|nvs|usb] Parameter Description List all files.
  • Page 95 ILE AND ONFIGURATION ANAGEMENT OMMANDS To list all the files in the root of the Flash filesystem, use the command: awplus# dir all flash: To list recursively the files in the Flash filesystem, use the command: awplus# dir recursive flash: To list the files in alphabetical order, use the command: awplus# dir sort name...
  • Page 96: Edit

    ILE AND ONFIGURATION ANAGEMENT OMMANDS EDIT edit Overview This command opens a text file in the AlliedWare Plus™ text editor. Once opened you can use the editor to alter to the file. If a filename is specified and it already exists, then the editor opens it in the text editor.
  • Page 97: Edit (Filename)

    ILE AND ONFIGURATION ANAGEMENT OMMANDS EDIT FILENAME edit (filename) Overview This command opens a remote text file as read-only in the AlliedWare Plus™ text editor. Before starting the editor make sure your terminal, terminal emulation program, or Telnet client is 100% compatible with a VT100 terminal. The editor uses VT100 control sequences to display text on the terminal.
  • Page 98: Erase Factory-Default

    ILE AND ONFIGURATION ANAGEMENT OMMANDS ERASE FACTORY DEFAULT erase factory-default Overview This command erases all data from NVS and all data from flash excluding the following: • the current release file • the backup release file • license files The device is then rebooted and returned to its factory default condition. The device can then be used for AMF automatic node recovery.
  • Page 99: Erase Startup-Config

    ILE AND ONFIGURATION ANAGEMENT OMMANDS ERASE STARTUP CONFIG erase startup-config Overview This command deletes the file that is set as the startup-config file, which is the configuration file that the system runs when it boots up. At the next restart, the device loads the default configuration file, default.cfg. If default.cfg no longer exists, then the device loads with the factory default configuration.
  • Page 100: Ip Tftp Source-Interface

    ILE AND ONFIGURATION ANAGEMENT OMMANDS IP TFTP SOURCE INTERFACE ip tftp source-interface Overview Use this command to manually specify the IP address that all TFTP requests originate from. This is useful in network configurations where TFTP servers only accept requests from certain devices, or where the server cannot dynamically determine the source of the request.
  • Page 101: Ipv6 Tftp Source-Interface

    ILE AND ONFIGURATION ANAGEMENT OMMANDS TFTP SOURCE INTERFACE ipv6 tftp source-interface Overview Use this command to manually specify the IPv6 address that all TFTP requests originate from. This is useful in network configurations where TFTP servers only accept requests from certain devices, or where the server cannot dynamically determine the source of the request.
  • Page 102: Mkdir

    ILE AND ONFIGURATION ANAGEMENT OMMANDS MKDIR mkdir Overview This command makes a new directory. mkdir <name> Syntax Parameter Description <name> The name and path of the directory that you are creating. Mode Privileged Exec Usage You cannot name a directory or subdirectory flash, nvs, usb, card, tftp, scp, sftp or http.
  • Page 103: Move

    ILE AND ONFIGURATION ANAGEMENT OMMANDS MOVE move Overview This command renames or moves a file. move <source-name> <destination-name> Syntax Parameter Description <source-name> The filename and path of the source file. See Introduction on page 72 for valid syntax. <destination-name> The filename and path of the destination file. See Introduction on page 72 for valid syntax.
  • Page 104: Move Debug

    ILE AND ONFIGURATION ANAGEMENT OMMANDS MOVE DEBUG move debug Overview This command moves a specified debug file to a destination debug file. move debug {<destination-name>|debug|flash|nvs|usb} Syntax Parameter Description <destination-name> The filename and path where you would like the debug output moved to. See Introduction on page 72 for valid syntax.
  • Page 105: Pwd

    ILE AND ONFIGURATION ANAGEMENT OMMANDS Overview This command prints the current working directory. Syntax Mode Privileged Exec Example To print the current working directory, use the command: awplus# Related Commands 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 106: Rmdir

    ILE AND ONFIGURATION ANAGEMENT OMMANDS RMDIR rmdir Overview This command removes a directory. This command only works on empty directories, unless you specify the optional force keyword. rmdir [force] <name> Syntax Parameter Description force Optional keyword that allows you to delete directories that are not empty and contain files or subdirectories.
  • Page 107: Show Autoboot

    ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW AUTOBOOT show autoboot Overview This command displays the Autoboot configuration and status. show autoboot Syntax Mode Privileged Exec Example To show the Autoboot configuration and status, use the command: awplus# show autoboot Output Figure 2-6: Example output from the show autoboot command awplus#show autoboot...
  • Page 108: Show Boot

    ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW BOOT show boot Overview This command displays the current boot configuration. We recommend that the currently running release is set as the current boot image. show boot Syntax Mode Privileged Exec Example To show the current boot configuration, use the command: awplus# show boot Output...
  • Page 109 ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW BOOT Table 2-1: Parameters in the output from show boot (cont.) Parameter Description Backup boot config The configuration file to use during the next boot cycle if the main configuration file cannot be loaded. Autoboot status The status of the Autoboot feature;...
  • Page 110: Show File

    ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW FILE show file Overview This command displays the contents of a specified file. show file <filename> Syntax Parameter Description <filename> Name of a file on the local Flash filesystem, or name and directory path of a file. Mode Privileged Exec To display the contents of the file oldconfig.cfg, which is in the current...
  • Page 111: Show File Systems

    ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW FILE SYSTEMS show file systems Overview This command lists the filesystems and their utilization information where appropriate. show file systems Syntax Mode Privileged Exec Examples To display the filesystems, use the command: awplus# show file systems Output Figure 2-9: Example output from the show file systems command...
  • Page 112 ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW FILE SYSTEMS Table 3: Parameters in the output of the show file systems command (cont.) Parameter Description Prefixes The prefixes used when entering commands to access the filesystems; one of: flash system tftp sftp http.
  • Page 113: Show Running-Config

    Antivirus configuration application Application configuration as-path Autonomous system path filter configuration as-path access-list Configuration of ACLs for AS path filtering atmf Allied Telesis Management Framework configuration Border Gateway Protocol (BGP) configuration community-list Community-list configuration crypto Security-specific configuration dhcp DHCP configuration...
  • Page 114 ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW RUNNING CONFIG Parameter Description Internet Protocol (IP) configuration ip pim dense-mode PIM-DM configuration ip pim sparse-mode PIM-SM configuration ip route IP static route configuration ip-reputation IP Reputation configuration IPS configuration ipsec Internet Protocol Security (IPSec) configuration ipv6 Internet Protocol version 6 (IPv6)
  • Page 115 ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW RUNNING CONFIG Parameter Description switch Switch configuration web-control Web Control configuration Mode Privileged Exec and Global Configuration Example To display the current configuration of your device, use the command: awplus# show running-config Output Figure 2-10: Example output from show running-config !...
  • Page 116 ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW RUNNING CONFIG Related copy running-config Commands show running-config interface 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 117: Show Running-Config Interface

    ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW RUNNING CONFIG INTERFACE show running-config interface Overview This command displays the current configuration of one or more interfaces on the device. show running-config interface [<interface-list>] [dot1x|ip Syntax igmp|ip multicast|ip pim dense-mode|ip pim sparse-mode|ipv6 rip|lacp|mstp|ospf|rip|rstp|stp] Parameter Description <interface-list>...
  • Page 118 ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW RUNNING CONFIG INTERFACE To display the current running configuration of a device for VLAN 1, use the command: awplus# show running-config interface vlan1 To display the current running configuration of a device for VLANs 1 and 3-5, use the command: awplus# show running-config interface vlan1,vlan3-vlan5...
  • Page 119: Show Startup-Config

    ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW STARTUP CONFIG show startup-config Overview This command displays the contents of the start-up configuration file, which is the file that the device runs on start-up. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 120: Show Version

    ILE AND ONFIGURATION ANAGEMENT OMMANDS SHOW VERSION show version Overview This command displays the version number and copyright details of the current AlliedWare Plus™ OS your device is running. show version Syntax Mode User Exec and Privileged Exec Example To display the version details of your currently installed software, use the command: awplus# show version...
  • Page 121: Write File

    ILE AND ONFIGURATION ANAGEMENT OMMANDS WRITE FILE write file Overview This command copies the running-config into the file that is set as the current startup-config file. This command is a synonym of the write memory and copy running-config startup-config commands. write [file] Syntax Mode...
  • Page 122: Write Memory

    ILE AND ONFIGURATION ANAGEMENT OMMANDS WRITE MEMORY write memory Overview This command copies the running-config into the file that is set as the current startup-config file. This command is a synonym of the write file and copy running-config startup-config commands. write [memory] Syntax Mode...
  • Page 123: Write Terminal

    ILE AND ONFIGURATION ANAGEMENT OMMANDS WRITE TERMINAL write terminal Overview This command displays the current configuration of the device. This command is a synonym of the show running-config command. write terminal Syntax Mode Privileged Exec Example To display the current configuration of your device, use the command: awplus# write terminal Related...
  • Page 124: User Access Commands

    User Access Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure user access. Command List • “clear line console” on page 126 • “clear line vty” on page 127 • “enable password” on page 128 •...
  • Page 125 CCESS OMMANDS • “show security-password configuration” on page 153 • “show security-password user” on page 154 • “show telnet” on page 155 • “show users” on page 156 • “telnet” on page 157 • “telnet server” on page 158 • “terminal length”...
  • Page 126: Clear Line Console

    CCESS OMMANDS CLEAR LINE CONSOLE clear line console Overview This command resets a console line. If a terminal session exists on the line then the terminal session is terminated. If console line settings have changed then the new settings are applied. clear line console 0 Syntax Mode...
  • Page 127: Clear Line Vty

    CCESS OMMANDS CLEAR LINE VTY clear line vty Overview This command resets a VTY line. If a session exists on the line then it is closed. clear line vty <0-32> Syntax Parameter Description <0-32> Line number Mode Privileged Exec Example To reset the first VTY line, use the command: awplus# clear line vty 1...
  • Page 128: Enable Password

    CCESS OMMANDS ENABLE PASSWORD enable password Overview To set a local password to control access to various privilege levels, use the enable password Global Configuration command. Use the enable password command to modify or create a password to be used, and use the no enable password command to remove the password.
  • Page 129 CCESS OMMANDS ENABLE PASSWORD Note that the enable password command is an alias for the enable secret command and one password per privilege level is allowed using these commands. Do not assign one password to a privilege level with enable password and another password to a privilege level with enable...
  • Page 130 CCESS OMMANDS ENABLE PASSWORD this method. The output in the configuration file will show only the encrypted string, and not the text string. awplus# configure terminal awplus(config)# enable password 8 fU7zHzuutY2SA awplus(config)# This results in the following show output: awplus#show run Current configuration:...
  • Page 131: Enable Secret

    CCESS OMMANDS ENABLE SECRET enable secret Overview To set a local password to control access to various privilege levels, use the enable secret Global Configuration command. Use the enable secret command to modify or create a password to be used, and use the no enable secret command to remove the password.
  • Page 132 CCESS OMMANDS ENABLE SECRET Note that the enable secret command is an alias for the enable password command and one password per privilege level is allowed using these commands. Do not assign one password to a privilege level with enable password and another password to a privilege level with enable...
  • Page 133 CCESS OMMANDS ENABLE SECRET The output in the configuration file will show only the encrypted string, and not the text string: awplus# configure terminal awplus(config)# enable secret 8 fU7zHzuutY2SA awplus(config)# This results in the following show output: awplus#show run Current configuration: hostname awplus...
  • Page 134: Exec-Timeout

    CCESS OMMANDS EXEC TIMEOUT exec-timeout Overview This command sets the interval your device waits for user input from either a console or VTY connection. Once the timeout interval is reached, the connection is dropped. This command sets the time limit when the console or VTY connection automatically logs off after no activity.
  • Page 135 CCESS OMMANDS EXEC TIMEOUT Related line Commands service telnet 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 136: Flowcontrol Hardware (Asyn/Console)

    CCESS OMMANDS FLOWCONTROL HARDWARE ASYN CONSOLE flowcontrol hardware (asyn/console) Overview Use this command to enable RTS/CTS (Ready To Send/Clear To Send) hardware flow control on a terminal console line (asyn port) between the DTE (Data Terminal Equipment) and the DCE (Data Communications Equipment). flowcontrol hardware Syntax no flowcontrol hardware...
  • Page 137 CCESS OMMANDS FLOWCONTROL HARDWARE ASYN CONSOLE Examples To enable hardware flow control on terminal console line asyn0, use the commands: awplus# configure terminal awplus(config)# line console 0 awplus(config-line)# flowcontrol hardware To disable hardware flow control on terminal console line asyn0, use the commands: awplus# configure terminal...
  • Page 138: Length (Asyn)

    CCESS OMMANDS LENGTH ASYN length (asyn) Overview Use this command to specify the number of rows of output that the device will display before pausing, for the console or VTY line that you are configuring. The no variant of this command restores the length of a line (terminal session) attached to a console port or to a VTY to its default length of 22 rows.
  • Page 139: Line

    CCESS OMMANDS LINE line Overview Use this command to enter line configuration mode for the specified VTYs or the console. The command prompt changes to show that the device is in Line Configuration mode. line vty <first-line> [<last-line>] Syntax Parameter Description <first-line>...
  • Page 140: Login Authentication

    CCESS OMMANDS LINE Related accounting login Commands clear line console clear line vty flowcontrol hardware (asyn/console) length (asyn) login authentication privilege level speed (asyn) 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 141: Privilege Level

    CCESS OMMANDS PRIVILEGE LEVEL privilege level Overview This command sets a privilege level for VTY or console connections. The configured privilege level from this command overrides a specific user’s initial privilege level at the console login. privilege level <1-15> Syntax Mode Line Configuration Usage...
  • Page 142: Security-Password History

    CCESS OMMANDS SECURITY PASSWORD HISTORY security-password history Overview This command specifies the number of previous passwords that are unable to be reused. A new password is invalid if it matches a password retained in the password history. The no variant of the command disables this feature. Syntax security-password history <0-15>...
  • Page 143: Security-Password Forced-Change

    CCESS OMMANDS SECURITY PASSWORD FORCED CHANGE security-password forced-change Overview This command specifies whether or not a user is forced to change an expired password at the next login. If this feature is enabled, users whose passwords have expired are forced to change to a password that must comply with the current password security rules at the next login.
  • Page 144: Security-Password Lifetime

    CCESS OMMANDS SECURITY PASSWORD LIFETIME security-password lifetime Overview This command enables password expiry by specifying a password lifetime in days. Note that when the password lifetime feature is disabled, it also disables the security-password forced-change command and the security-password warning command.
  • Page 145: Security-Password Minimum-Categories

    CCESS OMMANDS SECURITY PASSWORD MINIMUM CATEGORIES security-password minimum-categories Overview This command specifies the minimum number of categories that the password must contain in order to be considered valid. The password categories are: • uppercase letters: A to Z • lowercase letters: a to z •...
  • Page 146: Security-Password Minimum-Length

    CCESS OMMANDS SECURITY PASSWORD MINIMUM LENGTH security-password minimum-length Overview This command specifies the minimum allowable password length. This value is checked against when there is a password change or a user account is created. security-password minimum-length <1-23> Syntax Parameter Description <1-23>...
  • Page 147: Security-Password Reject-Expired-Pwd

    CCESS OMMANDS SECURITY PASSWORD REJECT EXPIRED security-password reject-expired-pwd Overview This command specifies whether or not a user is allowed to login with an expired password. Users with expired passwords are rejected at login if this functionality is enabled. Users then have to contact the Network Administrator to change their password.
  • Page 148: Security-Password Warning

    CCESS OMMANDS SECURITY PASSWORD WARNING security-password warning Overview This command specifies the number of days before the password expires that the user will receive a warning message specifying the remaining lifetime of the password. Note that the warning period cannot be set unless the lifetime feature is enabled with the security-password lifetime command.
  • Page 149: Service Advanced-Vty

    CCESS OMMANDS SERVICE ADVANCED service advanced-vty Overview This command enables the advanced-vty help feature. This allows you to use TAB completion for commands. Where multiple options are possible, the help feature displays the possible options. The no service advanced-vty command disables the advanced-vty help feature. Syntax service advanced-vty no service advanced-vty...
  • Page 150: Service Password-Encryption

    CCESS OMMANDS SERVICE PASSWORD ENCRYPTION service password-encryption Overview Use this command to enable password encryption. This is enabled by default. When password encryption is enabled, the device displays passwords in the running config in encrypted form instead of in plain text. Use the no service password-encryption command to stop the device from displaying newly-entered passwords in encrypted form.
  • Page 151: Service Telnet

    CCESS OMMANDS SERVICE TELNET service telnet Overview Use this command to enable the telnet server. The server is enabled by default. Enabling the telnet server starts the device listening for incoming telnet sessions on the configured port. The server listens on port 23, unless you have changed the port by using the privilege level command.
  • Page 152: Show Privilege

    CCESS OMMANDS SHOW PRIVILEGE show privilege Overview This command displays the current user privilege level, which can be any privilege level in the range <1-15>. Privilege levels <1-6> allow limited user access (all User Exec commands), privilege levels <7-14> allow restricted user access (all User Exec commands plus Privileged Exec show commands).
  • Page 153: Show Security-Password Configuration

    CCESS OMMANDS SHOW SECURITY PASSWORD CONFIGURATION show security-password configuration Overview This command displays the configuration settings for the various security password rules. show security-password configuration Syntax Mode Privileged Exec Example To display the current security-password rule configuration settings, use the command: awplus# show security-password configuration...
  • Page 154: Show Security-Password User

    CCESS OMMANDS SHOW SECURITY PASSWORD USER show security-password user Overview This command displays user account and password information for all users. show security-password user Syntax Mode Privileged Exec Example To display the system users’ remaining lifetime or last password change, use the command: awplus# show security-password user...
  • Page 155: Show Telnet

    CCESS OMMANDS SHOW TELNET show telnet Overview This command shows the Telnet server settings. show telnet Syntax Mode User Exec and Privileged Exec Example To show the Telnet server settings, use the command: awplus# show telnet Output Figure 3-4: Example output from the show telnet command Telnet Server Configuration...
  • Page 156: Show Users

    CCESS OMMANDS SHOW USERS show users Overview This command shows information about the users who are currently logged into the device. show users Syntax Mode User Exec and Privileged Exec Example To show the users currently connected to the device, use the command: awplus# show users Output...
  • Page 157: Telnet

    CCESS OMMANDS TELNET telnet Overview Use this command to open a telnet session to a remote device. telnet {<hostname>|[ip] <ipv4-addr>|[ipv6] <ipv6-addr>} Syntax [<port>] Parameter Description <hostname> The host name of the remote system. Keyword used to specify the IPv4 address or host name of a remote system.
  • Page 158: Telnet Server

    CCESS OMMANDS TELNET SERVER telnet server Overview This command enables the telnet server on the specified TCP port. If the server is already enabled then it will be restarted on the new port. Changing the port number does not affect the port used by existing sessions. telnet server {<1-65535>|default} Syntax Parameter...
  • Page 159: Terminal Length

    CCESS OMMANDS TERMINAL LENGTH terminal length Overview Use the terminal length command to specify the number of rows of output that the device will display before pausing, for the currently-active terminal only. Use the terminal no length command to remove the length specified by this command.
  • Page 160: Terminal Resize

    CCESS OMMANDS TERMINAL RESIZE terminal resize Overview Use this command to automatically adjust the number of rows of output on the console, which the device will display before pausing, to the number of rows configured on the user’s terminal. terminal resize Syntax Mode User Exec and Privileged Exec...
  • Page 161: Username

    CCESS OMMANDS USERNAME username Overview This command creates or modifies a user to assign a privilege level and a password. : The default username privilege level of 1 is not shown in running-config output. NOTE Any username privilege level that has been modified from the default is shown. Syntax username <name>...
  • Page 162 CCESS OMMANDS USERNAME Usage An intermediate CLI security level (privilege level 7 to privilege level 14) allows a CLI user access to the majority of show commands, including the platform show commands that are available at privilege level 1 to privilege level 6. Note that some show commands, such as show running-configuration and show startup-configuration, are only available at privilege level 15.
  • Page 163: Gui Commands

    GUI Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure the GUI. For more information, see the Getting Started with Alliedware Plus Command List • “atmf topology-gui enable” on page 164 • “gui-timeout” on page 165 •...
  • Page 164: Atmf Topology-Gui Enable

    GUI C OMMANDS ATMF TOPOLOGY GUI ENABLE atmf topology-gui enable Overview Use this command to enable the operation of AMF Vista Manager on the Master device. Use the no variant of this command to disable this feature. Syntax atmf topology-gui enable no atmf topology-gui enable Default By default the GUI support will not be enabled on AMF Master devices.
  • Page 165: Gui-Timeout

    GUI C OMMANDS TIMEOUT gui-timeout Overview Use this command to configure an idle timeout period for a GUI session. The time can be set in minutes and/or seconds. Use the no variant of this command to disable the GUI session idle timeout. Syntax gui-timeout <minutes>...
  • Page 166 GUI C OMMANDS TIMEOUT Related show running-config Commands 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 167: Log Event-Host

    GUI C OMMANDS LOG EVENT HOST log event-host Overview Use this command to set up an external host to log AMF topology events through Vista Manager. This command is run on the Master device. Use the no variant of this command to disable log events through Vista Manager. Syntax log event-host [<ipv4-addr>|<ipv6-addr>] atmf-topology-event no log event-host [<ipv4-addr>|<ipv6-addr>] atmf-topology-event...
  • Page 168: Service Http

    GUI C OMMANDS SERVICE HTTP service http Overview Use this command to enable the HTTP (Hypertext Transfer Protocol) service. This service, which is enabled by default, is required to support the AlliedWare Plus™ GUI Java applet on a Java enabled browser. Use the no variant of this command to disable the HTTP feature.
  • Page 169: Show Http

    GUI C OMMANDS SHOW HTTP show http Overview This command shows the HTTP server settings. show http Syntax Mode User Exec and Privileged Exec Example To show the HTTP server settings, use the command: awplus# show http Output Figure 4-2: Example output from the show http command awplus#show http...
  • Page 170: System Configuration And Monitoring Commands

    System Configuration and Monitoring Commands Introduction Overview This chapter provides an alphabetical reference of commands for configuring and monitoring the system. Command List • “banner exec” on page 172 • “banner login (system)” on page 174 • “banner motd” on page 176 •...
  • Page 171 YSTEM ONFIGURATION AND ONITORING OMMANDS • “show memory” on page 205 • “show memory allocations” on page 207 • “show memory history” on page 209 • “show memory pools” on page 211 • “show memory shared” on page 212 • “show process”...
  • Page 172: Banner Exec

    YSTEM ONFIGURATION AND ONITORING OMMANDS BANNER EXEC banner exec Overview This command configures the User Exec mode banner that is displayed on the console after you login. The banner exec default command restores the User Exec banner to the default banner. Use the no banner exec command to disable the User Exec banner and remove the default User Exec banner.
  • Page 173 YSTEM ONFIGURATION AND ONITORING OMMANDS BANNER EXEC To remove the User Exec mode banner after login, enter the following commands: awplus#configure terminal awplus(config)#no banner exec awplus(config)#exit awplus#exit  awplus login: manager Password:  awplus> Related banner login (system) Commands banner motd 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 174: Banner Login (System)

    YSTEM ONFIGURATION AND ONITORING OMMANDS BANNER LOGIN SYSTEM banner login (system) Overview This command configures the login banner that is displayed on the console when you login. The login banner is displayed on all connected terminals. The login banner is displayed after the MOTD (Message-of-the-Day) banner and before the login username and password prompts.
  • Page 175: Banner Motd

    YSTEM ONFIGURATION AND ONITORING OMMANDS BANNER LOGIN SYSTEM Related banner exec Commands banner motd 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 176: Banner Motd

    YSTEM ONFIGURATION AND ONITORING OMMANDS BANNER MOTD banner motd Overview Use this command to create or edit the text MotD (Message-of-the-Day) banner displayed before login. The MotD banner is displayed on all connected terminals. The MotD banner is useful for sending messages that affect all network users, for example, any imminent system shutdowns.
  • Page 177 YSTEM ONFIGURATION AND ONITORING OMMANDS BANNER MOTD awplus>enable awplus#configure terminal Enter configuration commands, one per line. End with CNTL/Z. awplus(config)#no banner motd awplus(config)#exit awplus#exit  awplus login: manager Password:  AlliedWare Plus (TM) 5.4.7 01/03/17 12:00:00  awplus> Related banner exec Commands banner login (system) 613-50157-01 Rev C...
  • Page 178: Clock Set

    YSTEM ONFIGURATION AND ONITORING OMMANDS CLOCK SET clock set Overview This command sets the time and date for the system clock. clock set <hh:mm:ss> <day> <month> <year> Syntax Parameter Description <hh:mm:ss> Local time in 24-hour format <day> Day of the current month, from 1 to 31 <month>...
  • Page 179: Clock Summer-Time Date

    YSTEM ONFIGURATION AND ONITORING OMMANDS CLOCK SUMMER TIME DATE clock summer-time date Overview This command defines the start and end of summertime for a specific year only, and specifies summertime’s offset value to Standard Time for that year. The no variant of this command removes the device’s summertime setting. This clears both specific summertime dates and recurring dates (set with the clock summer-time recurring...
  • Page 180 YSTEM ONFIGURATION AND ONITORING OMMANDS CLOCK SUMMER TIME DATE Related clock summer-time recurring Commands clock timezone 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 181: Clock Summer-Time Recurring

    YSTEM ONFIGURATION AND ONITORING OMMANDS CLOCK SUMMER TIME RECURRING clock summer-time recurring Overview This command defines the start and end of summertime for every year, and specifies summertime’s offset value to Standard Time. The no variant of this command removes the device’s summertime setting. This clears both specific summertime dates (set with the clock summer-time date command) and recurring dates.
  • Page 182 YSTEM ONFIGURATION AND ONITORING OMMANDS CLOCK SUMMER TIME RECURRING Mode Global Configuration Examples To set a summertime definition for New Zealand using NZST (UTC+12:00) as the standard time, and NZDT (UTC+13:00) as summertime, with summertime set to start on the last Sunday in September, and end on the 1st Sunday in April, use the command: awplus(config)# clock summer-time NZDT recurring 5 sun sep 2:00...
  • Page 183: Clock Timezone

    YSTEM ONFIGURATION AND ONITORING OMMANDS CLOCK TIMEZONE clock timezone Overview This command defines the device’s clock timezone. The timezone is set as a offset to the UTC. The no variant of this command resets the system time to UTC. By default, the system time is set to UTC. clock timezone <timezone-name>...
  • Page 184: Ecofriendly Led

    YSTEM ONFIGURATION AND ONITORING OMMANDS ECOFRIENDLY LED ecofriendly led Overview Use this command to enable the eco-friendly LED (Light Emitting Diode) feature, which turns off power to the port LEDs, including the stack port status LEDs. Power to the system status and stack management LEDs is not disabled. Use the no variant of this command to disable the eco-friendly LED feature.
  • Page 185: Findme

    YSTEM ONFIGURATION AND ONITORING OMMANDS FINDME findme Overview Use this command to physically locate a specific device from a group of similar devices. Activating the command causes a selected number of port LEDs to alternately flash green then amber (if that device has amber LEDs) at a rate of 1 Hz. Use the no variant of this command to deactivate the Find Me feature prior to the timeout expiring.
  • Page 186 YSTEM ONFIGURATION AND ONITORING OMMANDS FINDME To activate the Find Me feature for the default duration (60 seconds) on switch port interfaces port1.0.2 through port1.0.4, use the following command: awplus# findme interface port1.0.2-1.0.4 In the example above, ports 2 to 4 will flash 4 times and then all ports will flash twice.
  • Page 187: Findme Trigger

    YSTEM ONFIGURATION AND ONITORING OMMANDS FINDME TRIGGER findme trigger Overview When this command is enabled, the LED flashing functionality of the find-me command is applied whenever any or all of the selected parameter conditions is detected. Use the no variant to remove the findme trigger function for the selected parameter.
  • Page 188: Hostname

    YSTEM ONFIGURATION AND ONITORING OMMANDS HOSTNAME hostname Overview This command sets the name applied to the device as shown at the prompt. The hostname is: • displayed in the output of the show system command • displayed in the CLI prompt so you know which device you are configuring •...
  • Page 189 YSTEM ONFIGURATION AND ONITORING OMMANDS HOSTNAME To set the system name to HQ-Sales, use the command: Example awplus# configure terminal awplus(config)# hostname HQ-Sales This changes the prompt to: HQ-Sales(config)# To revert to the default hostname awplus, use the command: HQ-Sales(config)# no hostname This changes the prompt to: awplus(config)#...
  • Page 190: No Debug All

    YSTEM ONFIGURATION AND ONITORING OMMANDS NO DEBUG ALL no debug all Overview This command disables the debugging facility for all features on your device. This stops the device from generating any diagnostic debugging messages. The debugging facility is disabled by default. Syntax no debug all [ipv6|dot1x|nsm] Parameter...
  • Page 191: Reboot

    YSTEM ONFIGURATION AND ONITORING OMMANDS REBOOT reboot Overview This command halts the device and performs a cold restart (also known as reload). It displays a confirmation request before restarting. You can reboot a stand-alone device, a stack, or a specified stack member. Syntax reboot [<stack-ID>] reload [<stack-ID>]...
  • Page 192: Reload

    YSTEM ONFIGURATION AND ONITORING OMMANDS RELOAD reload Overview This command performs the same function as the reboot command. 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 193: Show Clock

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW CLOCK show clock Overview This command displays the system’s current configured local time and date. It also displays other clock related information such as timezone and summertime configuration. show clock Syntax Mode User Exec and Privileged Exec Example To display the system’s current local time, use the command: awplus#...
  • Page 194 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW CLOCK Related clock set Commands clock summer-time date clock summer-time recurring clock timezone 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 195: Show Cpu

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW CPU show cpu Overview This command displays a list of running processes with their CPU utilization. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 196 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW CPU Output Figure 5-2: Example output from show cpu Stack member 2:  CPU averages: 1 second: 12%, 20 seconds: 2%, 60 seconds: 2% System load averages: 1 minute: 0.03, 5 minutes: 0.02, 15 minutes: 0.00 Current CPU load:...
  • Page 197 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW CPU Table 2: Parameters in the output of the show cpu command (cont.) Parameter Description state Process state; one of “run”, “sleep”, “zombie”, and “dead”. sleep% Percentage of time that the process is in the sleep state. runtime The time that the process has been running for, measured in jiffies.
  • Page 198: Show Cpu History

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW CPU HISTORY show cpu history Overview This command prints a graph showing the historical CPU utilization. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 199 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW CPU HISTORY Output Figure 5-3: Example output from the show cpu history command Per second CPU load history  100 90 80 70 60 50 40 30 * 10 ******************************************* **************** |..|..|..|..|..|..|..|..|..|..|..|.. Oldest Newest CPU load% per second (last 60 seconds)...
  • Page 200 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW CPU HISTORY Related show memory Commands show memory allocations show memory pools show process 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 201: Show Debugging

    User Exec and Privileged Exec Usage This command displays all debugging information, similar to the way the show tech-support command displays all show output for use by Allied Telesis authorized service personnel only. Example To display all debugging information, use the command: awplus#...
  • Page 202: Show Ecofriendly

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW ECOFRIENDLY show ecofriendly Overview This command displays the switch’s eco-friendly configuration status. The ecofriendly led configuration status are shown in the show ecofriendly output. show ecofriendly Syntax Mode Privileged Exec and Global Configuration Example To display the switch’s eco-friendly configuration status, use the following command: awplus#...
  • Page 203: Show Interface Memory

    This command displays the shared memory used by either all interfaces, or the specified interface or interfaces. The output is useful for diagnostic purposes by Allied Telesis authorized service personnel. For information on filtering and saving command output, see the “Getting Started...
  • Page 204 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW INTERFACE MEMORY Output Figure 5-6: Example output from the show interface memory command awplus#show interface memory Vlan blocking state shared memory usage --------------------------------------------- Interface shmid Bytes Used nattch Status port1.0.1 393228 1 port1.0.2 458766 1...
  • Page 205: Show Memory

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW MEMORY show memory Overview This command displays the memory used by each process that is currently running For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 206 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW MEMORY Table 4: Parameters in the output of the show memory command Parameter Description Stack member Stack member number. RAM total Total amount of RAM memory free. free Available memory size. buffers Memory allocated kernel buffers. Identifier number for the process.
  • Page 207: Show Memory Allocations

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW MEMORY ALLOCATIONS show memory allocations Overview This command displays the memory allocations used by processes. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 208: Show Memory History

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW MEMORY ALLOCATIONS Related show memory Commands show memory history show memory pools show memory shared show tech-support 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 209: Show Memory History

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW MEMORY HISTORY show memory history Overview This command prints a graph showing the historical memory usage. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 210 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW MEMORY HISTORY Output Figure 5-10: Example output from the show memory history command STACK member 1:  Per minute memory utilization history  100 90 80 70 60 50 40************************************************************* 30 20 10 |..|..|..|..|..|..|..|..|..|..|..|.. Oldest Newest...
  • Page 211: Show Memory Pools

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW MEMORY POOLS show memory pools Overview This command shows the memory pools used by processes. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 212: Show Memory Shared

    Overview This command displays shared memory allocation information. The output is useful for diagnostic purposes by Allied Telesis authorized service personnel. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 213: Show Process

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW PROCESS show process Overview This command lists a summary of the current running processes. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide. Syntax show process [<stack-ID>] [sort {cpu|mem}] Parameter...
  • Page 214 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW PROCESS Output Figure 5-13: Example output from the show process command Stack member 2:  CPU averages: 1 second: 8%, 20 seconds: 5%, 60 seconds: 5% System load averages: 1 minute: 0.04, 5 minutes: 0.08, 15 minutes: 0.12 Current CPU load:...
  • Page 215 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW PROCESS Table 5: Parameters in the output from the show process command (cont.) Parameter Description Process priority. state Process state; one of “run”, “sleep”, “stop”, “zombie”, or “dead”. sleep% Percentage of time the process is in the sleep state. Related show cpu Commands...
  • Page 216: Show Reboot History

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW REBOOT HISTORY show reboot history Overview Use this command to display the device’s reboot history. show reboot history [<stack-ID>] Syntax Parameter Description <stack-ID> Stack member number, from 1 to 8. Mode User Exec and Privileged Exec Example To show the reboot history of stack member 2, use the command: awplus#...
  • Page 217: Show Router-Id

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW ROUTER show router-id Overview Use this command to show the Router ID of the current system. show router-id Syntax Mode User Exec and Privileged Exec Example To display the Router ID of the current system, use the command: awplus# show router-id Output...
  • Page 218: Show System

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW SYSTEM show system Overview This command displays general system information about the device, including the hardware, installed, memory, and software versions loaded. It also displays location and contact details when these have been set. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 219: Show System Environment

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW SYSTEM ENVIRONMENT show system environment Overview This command displays the current environmental status of your device and any attached PSU, XEM, or other expansion option. The environmental status covers information about temperatures, fans, and voltage. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 220: Show System Interrupts

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW SYSTEM INTERRUPTS show system interrupts Overview Use this command to display the number of interrupts for each IRQ (Interrupt Request) used to interrupt input lines on a PIC (Programmable Interrupt Controller) on your device. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 221: Show System Mac

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW SYSTEM MAC show system mac Overview This command displays the physical MAC address available on a standalone switch or a stack. This command also shows the virtual MAC address for a stack if the stack virtual MAC address feature is enabled with the stack virtual-mac command or the...
  • Page 222: Show System Serialnumber

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW SYSTEM SERIALNUMBER show system serialnumber Overview This command shows the serial number information for the device. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 223: Show Tech-Support

    YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW TECH SUPPORT show tech-support Overview This command generates system and debugging information for the device and saves it to a file. This command is useful for collecting a large amount of information so that it can then be analyzed for troubleshooting purposes.
  • Page 224 YSTEM ONFIGURATION AND ONITORING OMMANDS SHOW TECH SUPPORT Parameter Description tacacs+ Display TACACS+ information update Display resource update specific information Output modifier > Output redirection >> Output redirection (append) outfile Output file name <filename> Specifies a name for the output file. If no name is specified, this file will be saved as: tech-support.txt.gz.
  • Page 225: Speed (Asyn)

    YSTEM ONFIGURATION AND ONITORING OMMANDS SPEED ASYN speed (asyn) Overview This command changes the console speed from the device. Note that a change in console speed is applied for subsequent console sessions. Exit the current session to enable the console speed change using the clear line console command.
  • Page 226 YSTEM ONFIGURATION AND ONITORING OMMANDS SPEED ASYN Related clear line console Commands line show running-config show startup-config speed 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 227: Terminal Monitor

    YSTEM ONFIGURATION AND ONITORING OMMANDS TERMINAL MONITOR terminal monitor Overview Use this command to display debugging output on a terminal. To display the cursor after a line of debugging output, press the Enter key. Use the command terminal no monitor to stop displaying debugging output on the terminal, or use the timeout option to stop displaying debugging output on the terminal after a set time.
  • Page 228: Undebug All

    YSTEM ONFIGURATION AND ONITORING OMMANDS UNDEBUG ALL undebug all Overview This command applies the functionality of the no debug all command. 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 229: Pluggables And Cabling Commands

    Pluggables and Cabling Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure and monitor Pluggables and Cabling, including: • Optical Digital Diagnostic Monitoring (DDM) to help find fiber issues when links go down For more information, see the Pluggables and Cabling Feature Overview and Configuration Guide.
  • Page 230: Clear Test Cable-Diagnostics Tdr

    LUGGABLES AND ABLING OMMANDS CLEAR TEST CABLE DIAGNOSTICS TDR clear test cable-diagnostics tdr Overview Use this command to clear the results of the last cable test that was run. clear test cable-diagnostics tdr Syntax Mode Privileged Exec Examples To clear the results of a previous cable-diagnostics test use the following commands: awplus# clear test cable-diagnostics tdr...
  • Page 231: Show System Pluggable

    Different types of pluggable transceivers are supported in different models of device. See your Allied Telesis dealer for more information about the models of pluggables that your device supports.
  • Page 232: Serial Number

    LUGGABLES AND ABLING OMMANDS SHOW SYSTEM PLUGGABLE Table 1: Parameters in the output from the show system pluggable command Parameter Description Device Specifies the device name for the installed pluggable transceiver. Serial Number Specifies the serial number for the installed pluggable transceiver.
  • Page 233: Show System Pluggable Detail

    Different types of pluggable transceivers are supported in different models of device. See your Allied Telesis dealer for more information about the models of pluggables that your device supports.
  • Page 234 LUGGABLES AND ABLING OMMANDS SHOW SYSTEM PLUGGABLE DETAIL • Power Monitoring: Displays the received power measurement type, which can be either OMA(Optical Module Amplitude) or Avg(Average Power) measured in μW. : For parameters that are not supported or not specified, a hyphen is displayed NOTE instead.
  • Page 235 LUGGABLES AND ABLING OMMANDS SHOW SYSTEM PLUGGABLE DETAIL Table 6-1: Parameters in the output from show system pluggable detail (cont.) Parameter Description Device Revision Specifies the hardware revision code for the pluggable transceiver. This may be useful for troubleshooting because different devices may support different pluggable transceiver revisions.
  • Page 236: Show System Pluggable Diagnostics

    LUGGABLES AND ABLING OMMANDS SHOW SYSTEM PLUGGABLE DIAGNOSTICS show system pluggable diagnostics Overview Different types of pluggable transceivers are supported in different models of device. See your device’s Datasheet for more information about the models of pluggables that your device supports. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 237 LUGGABLES AND ABLING OMMANDS SHOW SYSTEM PLUGGABLE DIAGNOSTICS Table 7: Parameters in the output from the show system pluggables diagnostics command Parameter Description Temp (Degrees C) Shows the temperature inside the transceiver. Vcc (Volts) Shows voltage supplied to the transceiver. Tx Bias (mA) Shows current to the Laser Diode in the transceiver.
  • Page 238: Show Test Cable-Diagnostics Tdr

    LUGGABLES AND ABLING OMMANDS SHOW TEST CABLE DIAGNOSTICS TDR show test cable-diagnostics tdr Overview Use this command to display the results of the last cable-diagnostics test that was run using the TDR (Time Domain Reflectometer) on a fixed copper cable port. The displayed status of the cable can be either: •...
  • Page 239: Test Cable-Diagnostics Tdr Interface

    LUGGABLES AND ABLING OMMANDS TEST CABLE DIAGNOSTICS TDR INTERFACE test cable-diagnostics tdr interface Overview Use this command to apply the Cable Fault Locator’s cable-diagnostics tests to twisted pair data cables for a selected port. The tests will detect either correct, short circuit, or open, circuit terminations.
  • Page 240: Logging Commands

    Logging Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure logging. Command List • “clear exception log” on page 242 • “clear log” on page 243 • “clear log buffered” on page 244 • “clear log permanent”...
  • Page 241 OGGING OMMANDS • “log email time” on page 274 • “log facility” on page 276 • “log host” on page 278 • “log host (filter)” on page 280 • “log host exclude” on page 283 • “log host source” on page 286 •...
  • Page 242: Clear Exception Log

    OGGING OMMANDS CLEAR EXCEPTION LOG clear exception log Overview This command resets the contents of the exception log, but does not remove the associated core files. : When this command is used within a stacked environment, it will remove the NOTE contents of the exception logs in all stack members.
  • Page 243: Clear Log

    OGGING OMMANDS CLEAR LOG clear log Overview This command removes the contents of the buffered and permanent logs. : When this command is used within a stacked environment, it will remove the NOTE contents of the buffered and permanent logs in all stack members. Syntax clear log Mode...
  • Page 244: Clear Log Buffered

    OGGING OMMANDS CLEAR LOG BUFFERED clear log buffered Overview This command removes the contents of the buffered log. : When this command is used within a stacked environment, it will remove the NOTE contents of the buffered logs in all stack members. Syntax clear log buffered Mode...
  • Page 245: Clear Log Permanent

    OGGING OMMANDS CLEAR LOG PERMANENT clear log permanent Overview This command removes the contents of the permanent log. : When this command is used within a stacked environment, it will remove the NOTE contents of the permanent logs in all stack members. Syntax clear log permanent Mode...
  • Page 246: Default Log Buffered

    OGGING OMMANDS DEFAULT LOG BUFFERED default log buffered Overview This command restores the default settings for the buffered log stored in RAM. By default the size of the buffered log is 50 kB and it accepts messages with the severity level of “warnings” and above. default log buffered Syntax Default...
  • Page 247: Default Log Console

    OGGING OMMANDS DEFAULT LOG CONSOLE default log console Overview This command restores the default settings for log messages sent to the terminal when a log console command is issued. By default all messages are sent to the console when a log console command is issued. default log console Syntax Mode...
  • Page 248: Default Log Email

    OGGING OMMANDS DEFAULT LOG EMAIL default log email Overview This command restores the default settings for log messages sent to an email address. By default no filters are defined for email addresses. Filters must be defined before messages will be sent. This command also restores the remote syslog server time offset value to local (no offset).
  • Page 249: Default Log Host

    OGGING OMMANDS DEFAULT LOG HOST default log host Overview This command restores the default settings for log sent to a remote syslog server. By default no filters are defined for remote syslog servers. Filters must be defined before messages will be sent. This command also restores the remote syslog server time offset value to local (no offset).
  • Page 250: Default Log Monitor

    OGGING OMMANDS DEFAULT LOG MONITOR default log monitor Overview This command restores the default settings for log messages sent to the terminal when a terminal monitor command is used. default log monitor Syntax Default All messages are sent to the terminal when a terminal monitor command is used.
  • Page 251: Default Log Permanent

    OGGING OMMANDS DEFAULT LOG PERMANENT default log permanent Overview This command restores the default settings for the permanent log stored in NVS. By default, the size of the permanent log is 50 kB and it accepts messages with the severity level of warnings and above. default log permanent Syntax Default...
  • Page 252: Log Buffered

    OGGING OMMANDS LOG BUFFERED log buffered Overview This command configures the device to store log messages in RAM. Messages stored in RAM are not retained on the device over a restart. Once the buffered log reaches its configured maximum allowable size old messages will be deleted to make way for new ones.
  • Page 253: Log Buffered (Filter)

    OGGING OMMANDS LOG BUFFERED FILTER log buffered (filter) Overview Use this command to create a filter to select messages to be sent to the buffered log. Selection can be based on the priority/ severity of the message, the program that generated the message, the logging facility used, a sub-string within the message or a combination of some or all of these.
  • Page 254 OGGING OMMANDS LOG BUFFERED FILTER Parameter Description imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection Power-inline (Power over Ethernet) dhcpsn DHCP snooping (DHCPSN) facility Filter messages to the buffered log by syslog facility. <facility>...
  • Page 255 OGGING OMMANDS LOG BUFFERED FILTER To add a filter to send all messages containing the text “Bridging initialization” to the buffered log, use the following commands: awplus# configure terminal awplus(config)# log buffered msgtext Bridging initialization To remove a filter that sends all messages generated by EPSR that have a severity of notices or higher to the buffered log, use the following commands: awplus# configure terminal...
  • Page 256: Log Buffered Exclude

    OGGING OMMANDS LOG BUFFERED EXCLUDE log buffered exclude Overview Use this command to exclude specified log messages from the buffered log. You can exclude messages on the basis of: • the priority/severity of the message • the program that generated the message •...
  • Page 257 OGGING OMMANDS LOG BUFFERED EXCLUDE Parameter Description Integrated Management Interface (IMI) imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection Power-inline (Power over Ethernet) dhcpsn DHCP snooping (DHCPSN) facility Exclude messages from a syslog facility. <facility>...
  • Page 258: Log Buffered Size

    OGGING OMMANDS LOG BUFFERED EXCLUDE log buffered log buffered (filter) log buffered size show log show log config 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 259: Log Buffered Size

    OGGING OMMANDS LOG BUFFERED SIZE log buffered size Overview This command configures the amount of memory that the buffered log is permitted to use. Once this memory allocation has been filled old messages will be deleted to make room for new messages. log buffered size <50-250>...
  • Page 260: Log Console

    OGGING OMMANDS LOG CONSOLE log console Overview This command configures the device to send log messages to consoles. The console log is configured by default to send messages to the device’s main console port. Use the no variant of this command to configure the device not to send log messages to consoles.
  • Page 261: Log Console (Filter)

    OGGING OMMANDS LOG CONSOLE FILTER log console (filter) Overview This command creates a filter to select messages to be sent to all consoles when the log console command is given. Selection can be based on the priority/severity of the message, the program that generated the message, the logging facility used, a sub-string within the message or a combination of some or all of these.
  • Page 262 OGGING OMMANDS LOG CONSOLE FILTER Parameter Description loopprot Loop Protection Power-inline (Power over Ethernet) dhcpsn DHCP snooping (DHCPSN) facility Filter messages by syslog facility. <facility> Specify one of the following syslog facilities to include messages from: kern Kernel messages user Random user-level messages mail Mail system...
  • Page 263 OGGING OMMANDS LOG CONSOLE FILTER To remove a default filter that includes sending critical, alert and emergency level messages to the console, use the following commands: awplus# configure terminal awplus(config)# no log console level critical Related default log console Commands log console log console exclude show log config...
  • Page 264: Log Console Exclude

    OGGING OMMANDS LOG CONSOLE EXCLUDE log console exclude Overview Use this command to prevent specified log messages from being sent to the console, when console logging is turned on. You can exclude messages on the basis of: • the priority/severity of the message •...
  • Page 265 OGGING OMMANDS LOG CONSOLE EXCLUDE Parameter Description mstp Multiple Spanning Tree Protocol (MSTP) Integrated Management Interface (IMI) imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection Power-inline (Power over Ethernet) dhcpsn DHCP snooping (DHCPSN) facility Exclude messages from a syslog facility.
  • Page 266 OGGING OMMANDS LOG CONSOLE EXCLUDE log console log console (filter) show log config 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 267: Log Email

    OGGING OMMANDS LOG EMAIL log email Overview This command configures the device to send log messages to an email address. The email address is specified in this command. log email <email-address> Syntax Parameter Description <email-address> The email address to send log messages to Default By default no filters are defined for email log targets.
  • Page 268: Log Email (Filter)

    OGGING OMMANDS LOG EMAIL FILTER log email (filter) Overview This command creates a filter to select messages to be sent to an email address. Selection can be based on the priority/ severity of the message, the program that generated the message, the logging facility used, a sub-string within the message or a combination of some or all of these.
  • Page 269 OGGING OMMANDS LOG EMAIL FILTER Parameter Description Integrated Management Interface (IMI) imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection Power-inline (Power over Ethernet) dhcpsn DHCP snooping (DHCPSN) facility Filter messages by syslog facility. <facility>...
  • Page 270 OGGING OMMANDS LOG EMAIL FILTER To create a filter to send all messages containing the text “Bridging initialization”, to the email address admin@homebase.com, use the following commands: awplus# configure terminal awplus(config)# log email admin@homebase.com msgtext "Bridging initialization" To create a filter to send messages with a severity level of informational and above to the email address admin@alliedtelesis.com, use the following commands: awplus#...
  • Page 271: Log Email Exclude

    OGGING OMMANDS LOG EMAIL EXCLUDE log email exclude Overview Use this command to prevent specified log messages from being emailed, when the device is configured to send log messages to an email address. You can exclude messages on the basis of: •...
  • Page 272 OGGING OMMANDS LOG EMAIL EXCLUDE Parameter Description mstp Multiple Spanning Tree Protocol (MSTP) Integrated Management Interface (IMI) imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection Power-inline (Power over Ethernet) dhcpsn DHCP snooping (DHCPSN) facility Exclude messages from a syslog facility.
  • Page 273 OGGING OMMANDS LOG EMAIL EXCLUDE Related default log email Commands log email log email (filter) log email time show log config 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 274: Log Email Time

    OGGING OMMANDS LOG EMAIL TIME log email time Overview This command configures the time used in messages sent to an email address. If the syslog server is in a different time zone to your device then the time offset can be configured using either the utc-offset parameter option keyword or the local-offset parameter option keyword, where utc-offset is the time difference from UTC (Universal Time, Coordinated) and local-offset is the difference from...
  • Page 275 OGGING OMMANDS LOG EMAIL TIME To send messages to the email address test@home.com in the same time zone Examples as the device’s local time zone, use the following commands: awplus# configure terminal awplus(config)# log email admin@base.com time local 0 To send messages to the email address admin@base.com with the time information converted to the time zone of the email recipient, which is 3 hours ahead of the device’s local time zone, use the following commands: awplus#...
  • Page 276: Log Facility

    OGGING OMMANDS LOG FACILITY log facility Overview Use this command to assign a facility to all log messages generated on this device. This facility overrides any facility that is automatically generated as part of the log message. Use the no variant of this command to remove the configured facility. Syntax log facility {kern|user|mail|daemon|auth|syslog|lpr|news|uucp|...
  • Page 277 OGGING OMMANDS LOG FACILITY Table 7-1: Ordinary meanings of the facility parameter in log messages (cont.) Facility Description FTP daemon local<0..7> The facility labels above have specific meanings, while the local facility labels are intended to be put to local use. In AlliedWare Plus, some of these local facility labels are used in log messages.
  • Page 278: Log Host

    OGGING OMMANDS LOG HOST log host Overview This command configures the device to send log messages to a remote syslog server via UDP port 514. The IP address of the remote server must be specified. By default no filters are defined for remote syslog servers. Filters must be defined before messages will be sent.
  • Page 279 OGGING OMMANDS LOG HOST log host time log trustpoint show log config 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 280: Log Host (Filter)

    OGGING OMMANDS LOG HOST FILTER log host (filter) Overview This command creates a filter to select messages to be sent to a remote syslog server. Selection can be based on the priority/severity of the message, the program that generated the message, the logging facility used, a substring within the message or a combination of some or all of these.
  • Page 281 OGGING OMMANDS LOG HOST FILTER Parameter Description imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection Power-inline (Power over Ethernet) dhcpsn DHCP snooping (DHCPSN) facility Filter messages by syslog facility. <facility> Specify one of the following syslog facilities to include messages from: kern Kernel messages...
  • Page 282 OGGING OMMANDS LOG HOST FILTER To create a filter to send messages with a severity level of informational and above to the syslog server with IP address 10.32.16.21, use the following commands: awplus# configure terminal awplus(config)# log host 10.32.16.21 level informational To remove a filter that sends all messages generated by EPSR that have a severity of notices or higher to a remote syslog server with IP address 10.32.16.21, use the following commands:...
  • Page 283: Log Host Exclude

    OGGING OMMANDS LOG HOST EXCLUDE log host exclude Overview Use this command to prevent specified log messages from being sent to the remote syslog server, when log host is enabled. You can exclude messages on the basis of: • the priority/severity of the message •...
  • Page 284 OGGING OMMANDS LOG HOST EXCLUDE Parameter Description mstp Multiple Spanning Tree Protocol (MSTP) Integrated Management Interface (IMI) imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection Power-inline (Power over Ethernet) dhcpsn DHCP snooping (DHCPSN) facility Exclude messages from a syslog facility.
  • Page 285 OGGING OMMANDS LOG HOST EXCLUDE log host log host (filter) log host source log host time show log config 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 286: Log Host Source

    OGGING OMMANDS LOG HOST SOURCE log host source Overview Use this command to specify a source interface or IP address for the device to send syslog messages from. You can specify any one of an interface name, an IPv4 address or an IPv6 address. This is useful if the device can reach the syslog server via multiple interfaces or addresses and you want to control which interface/address the device uses.
  • Page 287: Log Host Time

    OGGING OMMANDS LOG HOST TIME log host time Overview This command configures the time used in messages sent to a remote syslog server. If the syslog server is in a different time zone to your device then the time offset can be configured using either the utc-offset parameter option keyword or the local-offset parameter option keyword, where utc-offset is the time difference from UTC (Universal Time, Coordinated) and local-offset is the difference from local time.
  • Page 288 OGGING OMMANDS LOG HOST TIME To send messages to the remote syslog server with the IP address 10.32.16.12 with the time information converted to the time zone of the remote syslog server, which is 3 hours ahead of the device’s local time zone, use the following commands: awplus# configure terminal...
  • Page 289: Log Monitor (Filter)

    OGGING OMMANDS LOG MONITOR FILTER log monitor (filter) Overview This command creates a filter to select messages to be sent to the terminal when terminal monitor command is given. Selection can be based on the priority/severity of the message, the program that generated the message, the logging facility used, a sub-string within the message or a combination of some or all of these.
  • Page 290 OGGING OMMANDS LOG MONITOR FILTER Parameter Description rmon Remote Monitoring loopprot Loop Protection Power-inline (Power over Ethernet) dhcpsn DHCP snooping (DHCPSN) facility Filter messages by syslog facility. <facility> Specify one of the following syslog facilities to include messages from: kern Kernel messages user Random user-level messages...
  • Page 291 OGGING OMMANDS LOG MONITOR FILTER To remove a default filter that includes sending everything to the terminal, use the following commands: awplus# configure terminal awplus(config)# no log monitor level debugging Related default log monitor Commands log monitor exclude show log config terminal monitor 613-50157-01 Rev C Command Reference for FS980M Series...
  • Page 292: Log Monitor Exclude

    OGGING OMMANDS LOG MONITOR EXCLUDE log monitor exclude Overview Use this command to prevent specified log messages from being displayed on a terminal, when terminal monitor is enabled. You can exclude messages on the basis of: • the priority/severity of the message •...
  • Page 293 OGGING OMMANDS LOG MONITOR EXCLUDE Parameter Description mstp Multiple Spanning Tree Protocol (MSTP) Integrated Management Interface (IMI) imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection Power-inline (Power over Ethernet) dhcpsn DHCP snooping (DHCPSN) facility Exclude messages from a syslog facility.
  • Page 294 OGGING OMMANDS LOG MONITOR EXCLUDE log monitor (filter) show log config terminal monitor 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 295: Log Permanent

    OGGING OMMANDS LOG PERMANENT log permanent Overview This command configures the device to send permanent log messages to non-volatile storage (NVS) on the device. The content of the permanent log is retained over a reboot. Once the permanent log reaches its configured maximum allowable size old messages will be deleted to make way for new messages.
  • Page 296: Log Permanent (Filter)

    OGGING OMMANDS LOG PERMANENT FILTER log permanent (filter) Overview This command creates a filter to select messages to be sent to the permanent log. Selection can be based on the priority/ severity of the message, the program that generated the message, the logging facility used, a sub-string within the message or a combination of some or all of these.
  • Page 297 OGGING OMMANDS LOG PERMANENT FILTER Parameter Description epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection Power-inline (Power over Ethernet) dhcpsn DHCP snooping (DHCPSN) facility Filter messages by syslog facility. <facility> Specify one of the following syslog facilities to include messages from: kern Kernel messages user...
  • Page 298 OGGING OMMANDS LOG PERMANENT FILTER Related clear log permanent Commands default log permanent log permanent log permanent exclude log permanent size show log config show log permanent 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 299: Log Permanent Exclude

    OGGING OMMANDS LOG PERMANENT EXCLUDE log permanent exclude Overview Use this command to prevent specified log messages from being sent to the permanent log. You can exclude messages on the basis of: • the priority/severity of the message • the program that generated the message •...
  • Page 300 OGGING OMMANDS LOG PERMANENT EXCLUDE Parameter Description Integrated Management Interface (IMI) imish Integrated Management Interface Shell (IMISH) epsr Ethernet Protection Switched Rings (EPSR) rmon Remote Monitoring loopprot Loop Protection Power-inline (Power over Ethernet) dhcpsn DHCP snooping (DHCPSN) facility Exclude messages from a syslog facility. <facility>...
  • Page 301 OGGING OMMANDS LOG PERMANENT EXCLUDE log permanent log permanent (filter) log permanent size show log config show log permanent 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 302: Log Permanent Size

    OGGING OMMANDS LOG PERMANENT SIZE log permanent size Overview This command configures the amount of memory that the permanent log is permitted to use. Once this memory allocation has been filled old messages will be deleted to make room for new messages. log permanent size <50-250>...
  • Page 303: Log-Rate-Limit Nsm

    OGGING OMMANDS RATE LIMIT NSM log-rate-limit nsm Overview This command limits the number of log messages generated by the device for a given interval. Use the no variant of this command to revert to the default number of log messages generated by the device of up to 200 log messages per second. Syntax log-rate-limit nsm messages <message-limit>...
  • Page 304 OGGING OMMANDS RATE LIMIT NSM To return the device the default setting, to generate up to 200 log messages per second, use the following commands: awplus# configure terminal awplus(config)# no log-rate-limit nsm 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 305: Log Trustpoint

    OGGING OMMANDS LOG TRUSTPOINT log trustpoint Overview This command adds one or more trustpoints to be used with the syslog application. Multiple trustpoints may be specified, or the command may be executed multiple times, to add multiple trustpoints to the application. The no version of this command removes one or more trustpoints from the list of trustpoints associated with the application.
  • Page 306: Show Counter Log

    OGGING OMMANDS SHOW COUNTER LOG show counter log Overview This command displays log counter information. show counter log Syntax Mode User Exec and Privileged Exec Example To display the log counter information, use the command: awplus# show counter log Output Figure 7-1: Example output from the show counter log command Log counters...
  • Page 307: Show Exception Log

    OGGING OMMANDS SHOW EXCEPTION LOG show exception log Overview This command displays the contents of the exception log. show exception log Syntax Mode User Exec and Privileged Exec Example To display the exception log, use the command: awplus# show exception log 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 308: Show Log

    OGGING OMMANDS SHOW LOG show log Overview This command displays the contents of the buffered log. For information on filtering and saving command output, see the “Getting Started with AlliedWare_Plus” Feature Overview and Configuration Guide. Syntax show log [tail [<10-250>]] Parameter Description tail...
  • Page 309 OGGING OMMANDS SHOW LOG Output Figure 7-2: Example output from the show log command awplus#show log  <date> <time> <facility>.<severity> <program[<pid>]>: <message> ------------------------------------------------------------------------- 2016 Oct 19 02:11:28 daemon.warning awplus-1 rpc.mountd[1102]: /flash and /nvs have same filehandle for 192.168.255.0/27, using first 2016 Oct 19 02:11:28 local6.crit awplus-1 Pluggable[404]: Pluggable AT-StackXS/1.0 inserted into port1.0.27...
  • Page 310: Show Log Config

    OGGING OMMANDS SHOW LOG CONFIG show log config Overview This command displays information about the logging system. This includes the configuration of the various log destinations, buffered, permanent, syslog servers (hosts) and email addresses. This also displays the latest status information for each of these destinations.
  • Page 311 OGGING OMMANDS SHOW LOG CONFIG Host 10.32.16.21: Time offset ..+2:00 Offset type ..UTC Source ..- Secured ..enabled Filters: 1 Level ..critical Program ..any Facility ..any Message text . any Statistics ..1327 messages received, 1 accepted by filter (2016 Oct 11  10:36:16) Email admin@alliedtelesis.com:...
  • Page 312: Show Log Permanent

    OGGING OMMANDS SHOW LOG PERMANENT show log permanent Overview This command displays the contents of the permanent log. show log permanent [tail [<10-250>]] Syntax show log permanent [<stack-ID>] [tail [<10-250>]] Parameter Description <stack-ID> Stack member number, from 1 to 8. tail Display only the latest log entries.
  • Page 313 OGGING OMMANDS SHOW LOG PERMANENT log permanent (filter) log permanent exclude log permanent size show log config 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 314: Show Running-Config Log

    OGGING OMMANDS SHOW RUNNING CONFIG LOG show running-config log Overview This command displays the current running configuration of the Log utility. show running-config log Syntax Mode Privileged Exec and Global Configuration Example To display the current configuration of the log utility, use the command: awplus# show running-config log Related...
  • Page 315: Scripting Commands

    Scripting Commands Introduction Overview This chapter provides commands used for command scripts. Command List • “activate” on page 316 • “echo” on page 317 • “wait” on page 318 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 316: Activate

    CRIPTING OMMANDS ACTIVATE activate Overview This command activates a script file. activate [background] <script> Syntax Parameter Description background Activate a script to run in the background. A process that is running in the background will operate as a separate task, and will not interrupt foreground processing.
  • Page 317: Echo

    CRIPTING OMMANDS ECHO echo Overview This command echoes a string to the terminal, followed by a blank line. echo <line> Syntax Parameter Description <line> The string to echo Mode User Exec and Privileged Exec Usage This command may be useful in CLI scripts, to make the script print user-visible comments.
  • Page 318: Wait

    CRIPTING OMMANDS WAIT wait Overview This command pauses execution of the active script for the specified period of time. wait <delay> Syntax Parameter Description <delay> <1-65335> Specify the time delay in seconds Default No wait delay is specified by default to pause script execution. Mode Privileged Exec (when executed from a script not directly from the command line) Usage...
  • Page 319: Interface Commands

    Interface Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure and display interfaces. Command List • “description (interface)” on page 320 • “interface (to configure)” on page 321 • “mtu” on page 323 • “show interface”...
  • Page 320: Description (Interface)

    NTERFACE OMMANDS DESCRIPTION INTERFACE description (interface) Overview Use this command to add a description to a specific port or interface. description <description> Syntax Parameter Description <description> Text describing the specific interface. Mode Interface Configuration Example The following example uses this command to describe the device that a switch port is connected to.
  • Page 321: Interface (To Configure)

    NTERFACE OMMANDS INTERFACE TO CONFIGURE interface (to configure) Overview Use this command to select one or more interfaces to configure. interface <interface-list> Syntax interface lo Parameter Description <interface-list> The interfaces or ports to configure. An interface-list can be: • an interface such as a VLAN (e.g. vlan2), a switch port (e.g. port1.0.6), a static channel group (e.g.
  • Page 322 NTERFACE OMMANDS INTERFACE TO CONFIGURE The following example shows how to enter Interface mode to configure the local loopback interface. awplus# configure terminal awplus(config)# interface lo awplus(config-if)# Related ip address (IP Addressing and Protocol) Commands show interface show interface brief 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 323: Mtu

    NTERFACE OMMANDS Overview Use this command to set the Maximum Transmission Unit (MTU) size for VLANs, where MTU is the maximum packet size that VLANs can transmit. The MTU size setting is applied to both IPv4 and IPv6 packet transmission. Use the no variant of this command to remove a previously specified Maximum Transmission Unit (MTU) size for VLANs, and restore the default MTU size (1500 bytes) for VLANs.
  • Page 324 NTERFACE OMMANDS Related show interface Commands 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 325: Show Interface

    NTERFACE OMMANDS SHOW INTERFACE show interface Overview Use this command to display interface configuration and status. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide. Syntax show interface [<interface-list>] show interface lo Parameter Description...
  • Page 326 NTERFACE OMMANDS SHOW INTERFACE Figure 9-1: Example output from the show interface command awplus#show interface Interface port1.0.1 Scope: both Link is DOWN, administrative state is UP Thrash-limiting Status Not Detected, Action learn-disable, Timeout 1(s) Hardware is Ethernet, address is eccd.6dff.d67d index 5001 metric 1 mru 1500...
  • Page 327 NTERFACE OMMANDS SHOW INTERFACE Figure 9-3: Example output from the show interface vlan1,vlan2 command  awplus#show interface vlan1,vlan2 Interface vlan1 Scope: both Link is UP, administrative state is UP Hardware is VLAN, address is 0015.77e9.5c50 IPv4 address 192.168.1.1/24 broadcast 192.168.1.255 index 201 metric 1 mtu 1500...
  • Page 328: Show Interface Brief

    NTERFACE OMMANDS SHOW INTERFACE BRIEF show interface brief Overview Use this command to display brief interface, configuration, and status information, including provisioning information. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 329: Show Interface Memory

    This command displays the shared memory used by either all interfaces, or the specified interface or interfaces. The output is useful for diagnostic purposes by Allied Telesis authorized service personnel. For information on filtering and saving command output, see the “Getting Started...
  • Page 330 NTERFACE OMMANDS SHOW INTERFACE MEMORY Output Figure 9-5: Example output from the show interface memory command awplus#show interface memory Vlan blocking state shared memory usage --------------------------------------------- Interface shmid Bytes Used nattch Status port1.0.1 393228 1 port1.0.2 458766 1 port1.0.3 360459 1...
  • Page 331: Show Interface Status

    NTERFACE OMMANDS SHOW INTERFACE STATUS show interface status Overview Use this command to display the status of the specified interface or interfaces. Note that when no interface or interfaces are specified then the status of all interfaces on the device are shown. show interface [<port-list>] status Syntax Parameter...
  • Page 332 NTERFACE OMMANDS SHOW INTERFACE STATUS Table 4: Parameters in the output from the show interface status command Parameter Description Port Name/Type of the interface. Name Description of the interface. Status The administrative and operational status of the interface; one of: •...
  • Page 333: Shutdown

    NTERFACE OMMANDS SHUTDOWN shutdown Overview This command shuts down the selected interface. This administratively disables the link and takes the link down at the physical (electrical) layer. Use the no variant of this command to disable this function and therefore to bring the link back up again.
  • Page 334: Port Mirroring Commands

    Port Mirroring Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure Port Mirroring. For more information, see the Mirroring Feature Overview and Configuration Guide. Command List • “mirror interface” on page 335 • “show mirror” on page 337 •...
  • Page 335: Mirror Interface

    IRRORING OMMANDS MIRROR INTERFACE mirror interface Overview Use this command to define a mirror port and mirrored (monitored) ports and direction of traffic to be mirrored. The port for which you enter interface mode will be the mirror port. The destination port is removed from all VLANs, and no longer participates in other switching.
  • Page 336 IRRORING OMMANDS MIRROR INTERFACE Access control lists can be used to mirror a subset of traffic from the mirrored port by using the copy-to-mirror parameter in hardware ACL commands. Example To mirror traffic received and transmitted on port1.0.4 and port1.0.5 to destination port1.0.3, use the commands: awplus# configure terminal...
  • Page 337: Show Mirror

    IRRORING OMMANDS SHOW MIRROR show mirror Overview Use this command to display the status of all mirrored ports. show mirror Syntax Mode User Exec and Privileged Exec Example To display the status of all mirrored ports, use the following command: awplus# show mirror Output...
  • Page 338: Show Mirror Interface

    IRRORING OMMANDS SHOW MIRROR INTERFACE show mirror interface Overview Use this command to display port mirroring configuration for a mirrored (monitored) switch port. show mirror interface <port> Syntax Parameter Description <port> The monitored switch port to display information about. Mode User Exec, Privileged Exec and Interface Configuration To display port mirroring configuration for the port1.0.4, use the following Example...
  • Page 339: Interface Testing Commands

    Interface Testing Commands Introduction Overview This chapter provides an alphabetical reference of commands used for testing interfaces. Command List • “clear test interface” on page 340 • “service test” on page 341 • “test interface” on page 342 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 340: Clear Test Interface

    NTERFACE ESTING OMMANDS CLEAR TEST INTERFACE clear test interface Overview This command clears test results and counters after issuing the test interface command. Test results and counters must be cleared before executing subsequent test interface commands. clear test interface {<port-list>|all} Syntax Parameter Description...
  • Page 341: Service Test

    NTERFACE ESTING OMMANDS SERVICE TEST service test Overview This command puts the device into the interface testing state, ready to begin testing. After entering this command, enter Interface Configuration mode for the desired interfaces and enter the command test interface. Do not test interfaces on a device that is part of a live network—disconnect the device first.
  • Page 342: Test Interface

    NTERFACE ESTING OMMANDS TEST INTERFACE test interface Overview This command starts a test on a port or all ports or a selected range or list of ports. Use the no variant of this command to disable this function. The test duration can be configured by specifying the time in minutes after specifying a port or ports to test.
  • Page 343 NTERFACE ESTING OMMANDS TEST INTERFACE Example To test the switch ports in VLAN 1, install loopbacks in the ports, and enter the following commands: awplus(config)# service test awplus(config)# no spanning-tree rstp enable bridge-forward awplus(config)# interface vlan1 awplus(config-if)# shutdown awplus(config-if)# awplus# test interface all To see the output, use the commands: awplus#...
  • Page 344: Interfaces And Layer 2

    Part 2: Interfaces and Layer 2 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 345: Switching Commands

    Switching Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure switching. For more information, see the Switching Feature Overview and Configuration Guide. Command List • “backpressure” on page 347 • “clear loop-protection counters” on page 349 •...
  • Page 346 WITCHING OMMANDS • “mac address-table thrash-limit” on page 372 • “platform jumboframe” on page 373 • “platform stop-unreg-mc-flooding” on page 374 • “polarity” on page 376 • “show debugging loopprot” on page 377 • “show debugging platform packet” on page 378 •...
  • Page 347: Backpressure

    WITCHING OMMANDS BACKPRESSURE backpressure Overview This command provides a method of applying flow control to ports running in half duplex mode. The setting will only apply when the link is in the half-duplex state. You can disable backpressure on an interface using the off parameter or the no variant of this command.
  • Page 348 WITCHING OMMANDS BACKPRESSURE To disable back pressure flow control on interface port1.0.2 enter the following commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# backpressure off Validation show running-config Commands show interface Related duplex Commands 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 349: Clear Loop-Protection Counters

    WITCHING OMMANDS CLEAR LOOP PROTECTION COUNTERS clear loop-protection counters Overview Use this command to clear the counters for the Loop Protection counters. clear loop-protection [interface <port-list>] counters Syntax Parameters Description interface The interface whose counters are to be cleared. <port-list> A port, a port range, or an aggregated link.
  • Page 350: Clear Mac Address-Table Dynamic

    WITCHING OMMANDS CLEAR MAC ADDRESS TABLE DYNAMIC clear mac address-table dynamic Overview Use this command to clear the filtering database of all entries learned for a selected MAC address, an MSTP instance, a switch port interface or a VLAN interface. clear mac address-table dynamic [address Syntax <mac-address>|interface <port>...
  • Page 351 WITCHING OMMANDS CLEAR MAC ADDRESS TABLE DYNAMIC This example shows how to clear all dynamically learned filtering database entries when learned through device operation for a given MSTP instance 1 on switch port interface port1.0.2. awplus# clear mac address-table dynamic interface port1.0.2 instance 1 Related clear mac address-table static...
  • Page 352: Clear Mac Address-Table Static

    WITCHING OMMANDS CLEAR MAC ADDRESS TABLE STATIC clear mac address-table static Overview Use this command to clear the filtering database of all statically configured entries for a selected MAC address, interface, or VLAN. clear mac address-table static [address <mac-address>|interface Syntax <port>|vlan <vid>] Parameter Description...
  • Page 353: Clear Port Counter

    WITCHING OMMANDS CLEAR PORT COUNTER clear port counter Overview Use this command to clear the packet counters of the port. clear port counter [<port>] Syntax Parameter Description <port> The port number or range Mode Privileged Exec To clear the packet counter for port1.0.1, use the command: Example awplus# clear port counter port1.0.1...
  • Page 354: Clear Port-Security Intrusion

    WITCHING OMMANDS CLEAR PORT SECURITY INTRUSION clear port-security intrusion Overview Use this command to clear the history of the port-security intrusion list on all ports, or an individual port. If a port is not specified, the intrusion lists of all ports are cleared.
  • Page 355 WITCHING OMMANDS CLEAR PORT SECURITY INTRUSION Table 2: Example output from the show port-security intrusion command  awplus#show port-security intrusion interface port1.0.1 Port Security Intrusion List ------------------------------------------------------------ Interface: port1.0.1 - 1 intrusion(s) detected 801f.0200.19da To clear the history of port-security intrusion list on port1.0.1, use the following command: awplus# clear port-security intrusion interface port1.0.1...
  • Page 356 WITCHING OMMANDS CLEAR PORT SECURITY INTRUSION Related show port-security interface Commands show port-security intrusion switchport port-security switchport port-security aging switchport port-security maximum switchport port-security violation 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 357: Debug Loopprot

    WITCHING OMMANDS DEBUG LOOPPROT debug loopprot Overview This command enables Loop Protection debugging. The no variant of this command disables Loop Protection debugging. Syntax debug loopprot {info|msg|pkt|state|nsm|all} no debug loopprot {info|msg|pkt|state|nsm|all} Parameter Description info General Loop Protection information. Received and transmitted Loop Detection Frames (LDFs). Echo raw ASCII display of received and transmitted LDF packets to the console.
  • Page 358: Debug Platform Packet

    WITCHING OMMANDS DEBUG PLATFORM PACKET debug platform packet Overview This command enables platform to CPU level packet debug functionality on the device. Use the no variant of this command to disable platform to CPU level packet debug. If the result means both send and receive packet debug are disabled, then any active timeout will be canceled.
  • Page 359 WITCHING OMMANDS DEBUG PLATFORM PACKET To enable VLAN packet debug for VLAN 2 with a timeout duration of 3 minutes, enter: awplus# debug platform packet vlan 2 timeout 150 To disable receive packet debug, enter: awplus# no debug platform packet recv Related show debugging platform packet Commands...
  • Page 360: Duplex

    WITCHING OMMANDS DUPLEX duplex Overview This command changes the duplex mode for the specified port. To see the currently-negotiated duplex mode for ports whose links are up, use the command show interface. To see the configured duplex mode (when different from the default), use the command show running-config.
  • Page 361 WITCHING OMMANDS DUPLEX Related backpressure Commands polarity speed show interface 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 362: Flowcontrol (Switch Port)

    WITCHING OMMANDS FLOWCONTROL SWITCH PORT flowcontrol (switch port) Overview Use this command to enable flow control, and configure the flow control mode for the switch port. Use the no variant of this command to disable flow control for the specified switch port.
  • Page 363 WITCHING OMMANDS FLOWCONTROL SWITCH PORT awplus# configure terminal Examples awplus(config)# interface port1.0.2 awplus(config-if)# flowcontrol receive on awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# flowcontrol send on awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# flowcontrol receive off awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# flowcontrol send off...
  • Page 364: Linkflap Action

    WITCHING OMMANDS LINKFLAP ACTION linkflap action Overview Use this command to detect flapping on all ports. If more than 15 flaps occur in less than 15 seconds the flapping port will shut down. Use the no variant of this command to disable flapping detection at this rate. Syntax linkflap action [shutdown] no linkflap action...
  • Page 365: Loop-Protection Loop-Detect

    WITCHING OMMANDS LOOP PROTECTION LOOP DETECT loop-protection loop-detect Overview Use this command to enable the loop-protection loop-detect feature and configure its parameters. Use the no variant of this command to disable the loop-protection loop-detect feature. Syntax loop-protection loop-detect [ldf-interval <period>] [ldf-rx-window <frames>] [fast-block] no loop-protection loop-detect Parameter...
  • Page 366: Loop-Protection Action

    WITCHING OMMANDS LOOP PROTECTION ACTION loop-protection action Overview Use this command to specify the protective action to apply when a network loop is detected on an interface. Use the no variant of this command to reset the loop protection actions to the default action, vlan-disable, on an interface.
  • Page 367: Loop-Protection Action-Delay-Time

    WITCHING OMMANDS LOOP PROTECTION ACTION DELAY TIME loop-protection action-delay-time Overview Use this command to sets the loop protection action delay time for an interface to specified values in seconds. The action delay time specifies the waiting period for the action. Use the no variant of this command to reset the loop protection action delay time for an interface to default.
  • Page 368: Loop-Protection Timeout

    WITCHING OMMANDS LOOP PROTECTION TIMEOUT loop-protection timeout Overview Use this command to specify the Loop Protection recovery action duration on an interface. Use the no variant of this command to set the loop protection timeout to the default. Syntax loop-protection timeout <duration> no loop-protection timeout Parameter Description...
  • Page 369: Mac Address-Table Acquire

    WITCHING OMMANDS MAC ADDRESS TABLE ACQUIRE mac address-table acquire Overview Use this command to enable MAC address learning on the device. Use the no variant of this command to disable learning. Syntax mac address-table acquire no mac address-table acquire Default Learning is enabled by default for all instances.
  • Page 370: Mac Address-Table Ageing-Time

    WITCHING OMMANDS MAC ADDRESS TABLE AGEING TIME mac address-table ageing-time Overview Use this command to specify an ageing-out time for a learned MAC address. The learned MAC address will persist for at least the specified time. The no variant of this command will reset the ageing-out time back to the default of 300 seconds (5 minutes).
  • Page 371: Mac Address-Table Static

    WITCHING OMMANDS MAC ADDRESS TABLE STATIC mac address-table static Overview Use this command to statically configure the MAC address-table to forward or discard frames with a matching destination MAC address. mac address-table static <mac-addr> {forward|discard} interface Syntax <port> [vlan <vid>] no mac address-table static <mac-addr>...
  • Page 372: Mac Address-Table Thrash-Limit

    WITCHING OMMANDS MAC ADDRESS TABLE THRASH LIMIT mac address-table thrash-limit Overview Use this command to set the thrash limit on the device or stack. Thrashing occurs when a MAC address table rapidly “flips” its mapping of a single MAC address between two subnets, usually as a result of a network loop. Use the no variant of this command to disable thrash limiting.
  • Page 373: Platform Jumboframe

    WITCHING OMMANDS PLATFORM JUMBOFRAME platform jumboframe Overview This command enables the device to forward jumbo frames. See the Switching Feature Overview and Configuration Guide for more information. When jumbo frame support is enabled, the maximum size of packets that the device can forward is 10240 bytes.
  • Page 374: Platform Stop-Unreg-Mc-Flooding

    WITCHING OMMANDS PLATFORM STOP UNREG FLOODING platform stop-unreg-mc-flooding Overview If a multicast stream is arriving at a network device, and that network device has received no IGMP reports that request the receipt of the stream, then that stream is referred to as "unregistered". IGMP snooping actively prevents the flooding of unregistered streams to all ports in the VLAN on which the stream is received.
  • Page 375 WITCHING OMMANDS PLATFORM STOP UNREG FLOODING Examples To enable this feature and stop multicast packet flooding, use the following commands: awplus# configure terminal awplus(config)# platform stop-unreg-mc-flooding To disable this feature and allow multicast packet flooding, use the following commands: awplus# configure terminal awplus(config)# no platform stop-unreg-mc-flooding...
  • Page 376: Polarity

    WITCHING OMMANDS POLARITY polarity Overview This command sets the MDI/MDIX polarity on a copper-based switch port. polarity {auto|mdi|mdix} Syntax Parameter Description Sets the polarity to MDI (medium dependent interface). mdix Sets the polarity to MDI-X (medium dependent interface crossover). auto The switch port sets the polarity automatically.
  • Page 377: Show Debugging Loopprot

    WITCHING OMMANDS SHOW DEBUGGING LOOPPROT show debugging loopprot Overview This command shows Loop Protection debugging information. show debugging loopprot Syntax Mode User Exec and Privileged Exec Example To display the enabled Loop Protection debugging modes, use the command: awplus# show debugging loopprot Related debug loopprot Commands...
  • Page 378: Show Debugging Platform Packet

    WITCHING OMMANDS SHOW DEBUGGING PLATFORM PACKET show debugging platform packet Overview This command shows platform to CPU level packet debugging information. show debugging platform packet Syntax Mode User Exec and Privileged Exec Example To display the platform packet debugging information, use the command: awplus# show debugging platform packet Related...
  • Page 379: Show Flowcontrol Interface

    WITCHING OMMANDS SHOW FLOWCONTROL INTERFACE show flowcontrol interface Overview Use this command to display flow control information. show flowcontrol interface <port> Syntax Parameter Description <port> Specifies the name of the port to be displayed. Mode User Exec and Privileged Exec To display the flow control for the port1.0.5, use the command: Example awplus#...
  • Page 380: Show Interface Err-Disabled

    WITCHING OMMANDS SHOW INTERFACE ERR DISABLED show interface err-disabled Overview Use this command to show the ports which have been dynamically shut down by protocols running on the device and the protocols responsible for the shutdown. show interface [<interface-range> err-disabled] Syntax Parameter Description...
  • Page 381: Show Interface Switchport

    WITCHING OMMANDS SHOW INTERFACE SWITCHPORT show interface switchport Overview Use this command to show VLAN information about each switch port. show interface switchport Syntax Mode User Exec and Privileged Exec Example To display VLAN information about each switch port, enter the command: awplus# show interface switchport Output...
  • Page 382: Show Loop-Protection

    WITCHING OMMANDS SHOW LOOP PROTECTION show loop-protection Overview Use this command to display the current loop protection setup for the device. show loop-protection [interface <port-list>] [counters] Syntax Parameter Description interface The interface selected for display. <port-list> A port, a port range, or an aggregated link. counters Displays counter information for loop protection.
  • Page 383 WITCHING OMMANDS SHOW LOOP PROTECTION awplus#show loop-protection counters  Switch Loop Detection Counter  Interface Rx Invalid Last LDF Rx ------------------------------------------------------------------------- port1.0.1 vlan1 - port1.0.2 vlan1 - port1.0.3 vlan1 - 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 384: Show Mac Address-Table

    WITCHING OMMANDS SHOW MAC ADDRESS TABLE show mac address-table Overview Use this command to display the mac address-table for all configured VLANs. show mac address-table Syntax Mode User Exec and Privileged Exec Usage The show mac address-table command is only applicable to view a mac address-table for Layer 2 switched traffic within VLANs.
  • Page 385 WITCHING OMMANDS SHOW MAC ADDRESS TABLE awplus(config)#mac address-table static 0000.1111.2222 for int  port1.0.3 vlan 2 awplus(config)#end awplus# awplus#show mac address-table  VLAN Port State unknown 0000.cd28.0752 static port1.0.2 0030.846e.bac7 dynamic port1.0.3 0000.1111.2222 static unknown 0000.cd28.0752 static port1.0.5 0030.846e.9bf4 dynamic 0000.cd00.0000 static Related...
  • Page 386: Show Mac Address-Table Thrash-Limit

    WITCHING OMMANDS SHOW MAC ADDRESS TABLE THRASH LIMIT show mac address-table thrash-limit Overview Use this command to display the current thrash limit set for all interfaces on the device. show mac address-table thrash-limit Syntax Mode User Exec and Privileged Exec Example To display the current, use the following command: awplus#...
  • Page 387: Show Platform

    WITCHING OMMANDS SHOW PLATFORM show platform Overview This command displays the settings configured by using the platform commands. show platform Syntax Mode Privileged Exec Usage This command displays the settings in the running config. For changes in some of these settings to take effect, the device must be rebooted with the new settings in the startup config.
  • Page 388: Show Platform Classifier Statistics Utilization Brief

    WITCHING OMMANDS SHOW PLATFORM CLASSIFIER STATISTICS UTILIZATION BRIEF show platform classifier statistics utilization brief Overview This command displays the number of used entries available for various platform functions, and the percentage that number of entries represents of the total available. Syntax show platform classifier statistics utilization brief Mode...
  • Page 389: Show Platform Port

    WITCHING OMMANDS SHOW PLATFORM PORT show platform port Overview This command displays the various port registers or platform counters for specified switchports. show platform port [<port-list>|counters] Syntax Parameter Description <port-list> The ports to display information about. A port-list can be: •...
  • Page 390 WITCHING OMMANDS SHOW PLATFORM PORT Output Figure 12-9: Example output from the show platform port command awplus#show platform port port1.0.1 Phy register value for port1.0.1 (ifindex: 5001)  BCM84858 PHY detected  PMA/PMD Registers - Device 1 0=2040 1=0082 2=600d 3=8562...
  • Page 391 WITCHING OMMANDS SHOW PLATFORM PORT Table 6: Parameters in the output from the show platform port command Parameter Description 128 - 255 Number of 128 - 255 octet packets received and transmitted. 256 - 511 Number of 256 - 511 octet packets received and transmitted.
  • Page 392 WITCHING OMMANDS SHOW PLATFORM PORT Table 6: Parameters in the output from the show platform port command Parameter Description SysErDurCarrier Receive Code Error Counter. CarrierSenseErr Receive False Carrier Counter. UndersizePkts Number of undersized packets received. Transmit Counters for traffic transmitted. Octets Number of octets transmitted.
  • Page 393 WITCHING OMMANDS SHOW PLATFORM PORT Table 6: Parameters in the output from the show platform port command Parameter Description ifOutDiscards Outbound interface Discarded Packets counter. MTUExcdDiscard Receive MTU Check Error Frame Counter 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 394: Show Port-Security Interface

    WITCHING OMMANDS SHOW PORT SECURITY INTERFACE show port-security interface Overview Use this command to show the current port-security configuration and the switch port status. show port-security interface <port> Syntax Parameter Description <port> The port to display information about. The port may be a switch port (e.g.
  • Page 395: Show Port-Security Intrusion

    WITCHING OMMANDS SHOW PORT SECURITY INTRUSION show port-security intrusion Overview Use this command to show the intrusion list. If the port is not specified, the entire intrusion table is shown. show port-security intrusion [interface <port>] Syntax Parameter Description interface Specify a port <port>...
  • Page 396: Show Storm-Control

    WITCHING OMMANDS SHOW STORM CONTROL show storm-control Overview Use this command to display storm-control information for all interfaces or a particular interface. show storm-control [<port>] Syntax Parameter Description <port> The port to display information about. The port may be a switch port (e.g.
  • Page 397: Speed

    WITCHING OMMANDS SPEED speed Overview This command changes the speed of the specified port. You can optionally specify the speed or speeds that get autonegotiated, so autonegotiation is only attempted at the specified speeds. To see the currently-negotiated speed for ports whose links are up, use the show interface command.
  • Page 398: Speed Auto

    WITCHING OMMANDS SPEED To set the port to auto-negotiate its speed at 1000Mbps only, enter the following commands: awplus# configure terminal awplus(config)# interface port1.0.49 awplus(config-if)# speed auto 1000 Related duplex Commands polarity show interface speed (asyn) 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 399: Storm-Control Level

    WITCHING OMMANDS STORM CONTROL LEVEL storm-control level Overview Use this command to specify the speed limiting level for broadcasting, multicast, or destination lookup failure (DLF) traffic for the port. Storm-control limits the selected traffic type to the specified percentage of the maximum port speed. Use the no variant of this command to disable storm-control for broadcast, multicast or DLF traffic.
  • Page 400: Switchport Port-Security

    WITCHING OMMANDS SWITCHPORT PORT SECURITY switchport port-security Overview Use this command to enable the port-security feature. This feature is also known as the port-based learn limit. It allows the user to set the maximum number of MAC addresses that each port can learn. Use the no variant of this command to disable the port-security feature.
  • Page 401: Switchport Port-Security Aging

    WITCHING OMMANDS SWITCHPORT PORT SECURITY AGING switchport port-security aging Overview Use this command to set MAC addresses that have been learned by port security to age out. Use the no variant of this command to set the MAC addresses to not age out. Syntax switchport port-security aging no switchport port-security aging...
  • Page 402: Switchport Port-Security Maximum

    WITCHING OMMANDS SWITCHPORT PORT SECURITY MAXIMUM switchport port-security maximum Overview Use this command to set the maximum number of MAC addresses that each port can learn. Use the no variant of this command to unset the maximum number of MAC addresses that each port can learn.
  • Page 403: Switchport Port-Security Violation

    WITCHING OMMANDS SWITCHPORT PORT SECURITY VIOLATION switchport port-security violation Overview Use this command to set the action taken on a switch port when the port exceeds the learning limits. The port action can be either shutdown, restrict or protect. If shutdown is set, the physical link will be disabled and “shutdown”...
  • Page 404: Thrash-Limiting

    WITCHING OMMANDS THRASH LIMITING thrash-limiting Overview To block all traffic on a vlan, use the following command: awplus# configure terminal awplus(config)# thrash-limiting action vlan-disable To set the thrash limiting timeout to 5 seconds, use the following command: awplus(config-if)# thrash-limiting timeout 5 To set the thrash limiting action to its default, use the following command: awplus(config-if)# no thrash-limiting action...
  • Page 405: Undebug Loopprot

    WITCHING OMMANDS UNDEBUG LOOPPROT undebug loopprot Overview This command applies the functionality of the no debug loopprot command. 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 406: Undebug Platform Packet

    WITCHING OMMANDS UNDEBUG PLATFORM PACKET undebug platform packet Overview This command applies the functionality of the no debug platform packet command. 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 407: Vlan Commands

    VLAN Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure VLANs. For more information see the VLAN Feature Overview and Configuration Guide. Command List • “private-vlan” on page 409 • “private-vlan association” on page 410 •...
  • Page 408 VLAN C OMMANDS • “switchport voice dscp” on page 432 • “switchport voice vlan” on page 433 • “switchport voice vlan priority” on page 435 • “vlan” on page 436 • “vlan classifier activate” on page 437 • “vlan classifier group”...
  • Page 409: Private-Vlan

    VLAN C OMMANDS PRIVATE VLAN private-vlan Overview Use this command to a create a private VLAN. Private VLANs can be either primary or secondary. Secondary VLANs can be ether community or isolated. Use the no variant of this command to remove the specified private VLAN. For more information, see the VLAN Feature Overview and Configuration Guide.
  • Page 410: Private-Vlan Association

    VLAN C OMMANDS PRIVATE VLAN ASSOCIATION private-vlan association Overview Use this command to associate a secondary VLAN to a primary VLAN. Only one isolated VLAN can be associated to a primary VLAN. Multiple community VLANs can be associated to a primary VLAN. Use the no variant of this command to remove association of all the secondary VLANs to a primary VLAN.
  • Page 411: Show Vlan

    VLAN C OMMANDS SHOW VLAN show vlan Overview Use this command to display information about a particular VLAN by specifying its VLAN ID. Selecting all will display information for all the VLANs configured. show vlan Syntax {all|brief|dynamic|static|auto|static-ports|<1-4094>} Parameter Description <1-4094> Display information about the VLAN specified by the VLAN ID.
  • Page 412: Show Vlan Classifier Group

    VLAN C OMMANDS SHOW VLAN CLASSIFIER GROUP show vlan classifier group Overview Use this command to display information about all configured VLAN classifier groups or a specific group. show vlan classifier group [<1-16>] Syntax Parameter Description <1-16> VLAN classifier group identifier Mode User Exec and Privileged Exec Usage...
  • Page 413: Show Vlan Classifier Group Interface

    VLAN C OMMANDS SHOW VLAN CLASSIFIER GROUP INTERFACE show vlan classifier group interface Overview Use this command to display information about a single switch port interface for all configured VLAN classifier groups. show vlan classifier group interface <switch-port> Syntax Parameter Description <switch-port>...
  • Page 414: Show Vlan Classifier Interface Group

    VLAN C OMMANDS SHOW VLAN CLASSIFIER INTERFACE GROUP show vlan classifier interface group Overview Use this command to display information about all interfaces configured for a VLAN group or all the groups. show vlan classifier interface group [<1-16>] Syntax Parameter Description <1-16>...
  • Page 415: Show Vlan Classifier Rule

    VLAN C OMMANDS SHOW VLAN CLASSIFIER RULE show vlan classifier rule Overview Use this command to display information about all configured VLAN classifier rules or a specific rule. show vlan classifier rule [<1-256>] Syntax Parameter Description <1-256> VLAN classifier rule identifier Mode User Exec and Privileged Exec Usage...
  • Page 416: Show Vlan Private-Vlan

    VLAN C OMMANDS SHOW VLAN PRIVATE VLAN show vlan private-vlan Overview Use this command to display the private VLAN configuration and associations. show vlan private-vlan Syntax Mode User Exec and Privileged Exec Example To display the private VLAN configuration and associations, enter the command: awplus# show vlan private-vlan Output...
  • Page 417: Switchport Access Vlan

    VLAN C OMMANDS SWITCHPORT ACCESS VLAN switchport access vlan Overview Use this command to change the port-based VLAN of the current port. Use the no variant of this command to change the port-based VLAN of this port to the default VLAN, vlan1. Syntax switchport access vlan <vlan-id>...
  • Page 418: Switchport Enable Vlan

    VLAN C OMMANDS SWITCHPORT ENABLE VLAN switchport enable vlan Overview This command enables the VLAN on the port manually once disabled by certain actions, such as QSP (QoS Storm Protection) or EPSR (Ethernet Protection Switching Ring). Note that if the VID is not given, all disabled VLANs are re-enabled. This command enables the VLAN on the port manually once disabled by certain actions, such as EPSR (Ethernet Protection Switching Ring).
  • Page 419: Switchport Mode Access

    VLAN C OMMANDS SWITCHPORT MODE ACCESS switchport mode access Overview Use this command to set the switching characteristics of the port to access mode. Received frames are classified based on the VLAN characteristics, then accepted or discarded based on the specified filtering criteria. switchport mode access [ingress-filter {enable|disable}] Syntax Parameter...
  • Page 420: Switchport Mode Private-Vlan

    VLAN C OMMANDS SWITCHPORT MODE PRIVATE VLAN switchport mode private-vlan Overview Use this command to make a Layer 2 port a private VLAN host port or a promiscuous port. Use the no variant of this command to remove the configuration. Syntax switchport mode private-vlan {host|promiscuous} no switchport mode private-vlan {host|promiscuous}...
  • Page 421: Switchport Mode Private-Vlan Trunk Promiscuous

    VLAN C OMMANDS SWITCHPORT MODE PRIVATE VLAN TRUNK PROMISCUOUS switchport mode private-vlan trunk promiscuous Overview Use this command to enable a port in trunk mode to be promiscuous port for isolated VLANs. Use the no variant of this command to remove a port in trunk mode as a promiscuous port for isolated VLANs.
  • Page 422 VLAN C OMMANDS SWITCHPORT MODE PRIVATE VLAN TRUNK PROMISCUOUS To create the isolated VLANs 2, 3 and 4 and then enable port1.0.2 in trunk Examples mode as a promiscuous port for these VLANs with the group ID of 3, use the following commands: awplus# configure terminal...
  • Page 423: Switchport Mode Private-Vlan Trunk Secondary

    VLAN C OMMANDS SWITCHPORT MODE PRIVATE VLAN TRUNK SECONDARY switchport mode private-vlan trunk secondary Overview Use this command to enable a port in trunk mode to be a secondary port for isolated VLANs. Use the no variant of this command to remove a port in trunk mode as a secondary port for isolated VLANs.
  • Page 424 VLAN C OMMANDS SWITCHPORT MODE PRIVATE VLAN TRUNK SECONDARY To create isolated private VLAN 2 and then enable port1.0.3 in trunk mode as Examples a secondary port for the this VLAN with the group ID of 3, use the following commands: awplus# configure terminal...
  • Page 425: Switchport Mode Trunk

    VLAN C OMMANDS SWITCHPORT MODE TRUNK switchport mode trunk Overview Use this command to set the switching characteristics of the port to trunk. Received frames are classified based on the VLAN characteristics, then accepted or discarded based on the specified filtering criteria. switchport mode trunk [ingress-filter {enable|disable}] Syntax Parameter...
  • Page 426: Switchport Private-Vlan Host-Association

    VLAN C OMMANDS SWITCHPORT PRIVATE VLAN HOST ASSOCIATION switchport private-vlan host-association Overview Use this command to associate a primary VLAN and a secondary VLAN to a host port. Only one primary and secondary VLAN can be associated to a host port. Use the no variant of this command to remove the association.
  • Page 427: Switchport Private-Vlan Mapping

    VLAN C OMMANDS SWITCHPORT PRIVATE VLAN MAPPING switchport private-vlan mapping Overview Use this command to associate a primary VLAN and a set of secondary VLANs to a promiscuous port. Use the no variant of this to remove all the association of secondary VLANs to primary VLANs for a promiscuous port.
  • Page 428: Switchport Trunk Allowed Vlan

    VLAN C OMMANDS SWITCHPORT TRUNK ALLOWED VLAN switchport trunk allowed vlan Overview Use this command to add VLANs to be trunked over this switch port. Traffic for these VLANs can be sent and received on the port. Use the no variant of this command to reset switching characteristics of a specified interface to negate a trunked configuration specified with switchport trunk allowed vlan command.
  • Page 429 VLAN C OMMANDS SWITCHPORT TRUNK ALLOWED VLAN either the except or the all parameters have first been used to add a list of VLANs to a port. To remove a VLAN, where the configuration for port1.0.6 shows the below output: awplus#show running-config...
  • Page 430 VLAN C OMMANDS SWITCHPORT TRUNK ALLOWED VLAN Add VLAN 4 by re-entering the except parameter with a list of VLANs to exclude, instead of using the add parameter to include VLAN 4, as shown in the command example below: awplus# configure terminal awplus(config)# interface port1.0.5...
  • Page 431: Switchport Trunk Native Vlan

    VLAN C OMMANDS SWITCHPORT TRUNK NATIVE VLAN switchport trunk native vlan Overview Use this command to configure the native VLAN for this port. The native VLAN is used for classifying the incoming untagged packets. Use the none parameter with this command to remove the native VLAN from the port and set the acceptable frame types to vlan-tagged only.
  • Page 432: Switchport Voice Dscp

    VLAN C OMMANDS SWITCHPORT VOICE DSCP switchport voice dscp Overview Use this command for a specific port to configure the Layer 3 DSCP value advertised when the transmission of LLDP-MED Network Policy TLVs for voice devices is enabled. When LLDP-MED capable IP phones receive this network policy information, they transmit voice data with the specified DSCP value.
  • Page 433: Switchport Voice Vlan

    VLAN C OMMANDS SWITCHPORT VOICE VLAN switchport voice vlan Overview Use this command to configure the Voice VLAN tagging advertised when the transmission of LLDP-MED Network Policy TLVs for voice endpoint devices is enabled. When LLDP-MED capable IP phones receive this network policy information, they transmit voice data with the specified tagging.
  • Page 434 VLAN C OMMANDS SWITCHPORT VOICE VLAN “Egress-VLAN-Name (58)” in the RADIUS Accept message when authenticating a phone attached to this port. For more information about configuring authentication for Voice VLAN, see the LLDP Feature Overview and Configuration Guide. If the ports have been set to be edge ports by the switchport voice vlan command, the no variant of this command will leave them unchanged as edge ports.
  • Page 435: Switchport Voice Vlan Priority

    VLAN C OMMANDS SWITCHPORT VOICE VLAN PRIORITY switchport voice vlan priority Overview Use this command to configure the Layer 2 user priority advertised when the transmission of LLDP-MED Network Policy TLVs for voice devices is enabled. This is the priority in the User Priority field of the IEEE 802.1Q VLAN tag, also known as the Class of Service (CoS), or 802.1p priority.
  • Page 436: Vlan

    VLAN C OMMANDS VLAN vlan Overview This command creates VLANs, assigns names to them, and enables or disables them. Disabling the VLAN causes all forwarding over the specified VLAN ID to cease. Enabling the VLAN allows forwarding of frames on the specified VLAN. When VCStack is enabled, you can configure a maximum of 512 VLANs.
  • Page 437: Vlan Classifier Activate

    VLAN C OMMANDS VLAN CLASSIFIER ACTIVATE vlan classifier activate Overview Use this command in Interface Configuration mode to associate a VLAN classifier group with the switch port. Use the no variant of this command to remove the VLAN classifier group from the switch port.
  • Page 438: Vlan Classifier Group

    VLAN C OMMANDS VLAN CLASSIFIER GROUP vlan classifier group Overview Use this command to create a group of VLAN classifier rules. The rules must already have been created. Use the no variant of this command to delete a group of VLAN classifier rules. Syntax vlan classifier group <1-16>...
  • Page 439: Vlan Classifier Rule Ipv4

    VLAN C OMMANDS VLAN CLASSIFIER RULE IPV vlan classifier rule ipv4 Overview Use this command to create an IPv4 subnet-based VLAN classifier rule and map it to a specific VLAN. Use the no variant of this command to delete the VLAN classifier rule.
  • Page 440: Vlan Classifier Rule Proto

    VLAN C OMMANDS VLAN CLASSIFIER RULE PROTO vlan classifier rule proto Overview Use this command to create a protocol type-based VLAN classifier rule, and map it to a specific VLAN. See the published IANA EtherType IEEE 802 numbers here: www.iana.org/assignments/ieee-802-numbers/ieee-802-numbers.txt. Instead of a protocol name the decimal value of the protocol's EtherType can be entered.
  • Page 441 VLAN C OMMANDS VLAN CLASSIFIER RULE PROTO Parameter Description [decsyscomm|24583] DEC Systems Comms Arch protocol [g8bpqx25|2303] G8BPQ AX.25 protocol [ieeeaddrtrans|2561] Xerox IEEE802.3 PUP Address [ieeepup|2560] Xerox IEEE802.3 PUP protocol [ip|2048] IP protocol [ipv6|34525] IPv6 protocol [ipx|33079] IPX protocol [netbeui|61680] IBM NETBIOS/NETBEUI protocol [netbeui|61681] IBM NETBIOS/NETBEUI...
  • Page 442 VLAN C OMMANDS VLAN CLASSIFIER RULE PROTO awplus# configure terminal Example awplus(config)# vlan classifier rule 1 proto x25 encap ethv2 vlan 2 awplus(config)# vlan classifier rule 2 proto 512 encap ethv2 vlan 2 awplus(config)# vlan classifier rule 3 proto 2056 encap ethv2 vlan 2 awplus(config)# vlan classifier rule 4 proto 2054 encap ethv2...
  • Page 443: Vlan Database

    VLAN C OMMANDS VLAN DATABASE vlan database Overview Use this command to enter the VLAN Configuration mode. vlan database Syntax Mode Global Configuration Usage Use this command to enter the VLAN configuration mode. You can then add or delete a VLAN, or modify its values. Example In the following example, note the change to VLAN configuration mode from Configure mode:...
  • Page 444: Vlan Mode Stack-Local-Vlan

    VLAN C OMMANDS VLAN MODE STACK LOCAL VLAN vlan mode stack-local-vlan Overview This command enables you to create stack-local-VLANs and use ICMP to monitor and diagnose issues within specific members of the stack. When a VLAN is added using this method, all its traffic will be trapped to and processed by the CPU of the specific local stack member, rather than the CPU of the stack master.
  • Page 445 VLAN C OMMANDS VLAN MODE STACK LOCAL VLAN To remove VLAN 4002, use the following commands: awplus# configure terminal awplus(config)# vlan database awplus(config-vlan)# no vlan 4002 Related ip igmp snooping Commands vlan database 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 446: Spanning Tree Commands

    Spanning Tree Commands Introduction Overview This chapter provides an alphabetical reference for commands used to configure RSTP, STP or MSTP. For information about spanning trees, including configuration procedures, see the STP Feature Overview and Configuration Guide. Command List • “clear spanning-tree statistics”...
  • Page 447 PANNING OMMANDS • “show spanning-tree statistics instance” on page 478 • “show spanning-tree statistics instance interface” on page 479 • “show spanning-tree statistics interface” on page 481 • “show spanning-tree vlan range-index” on page 483 • “spanning-tree autoedge (RSTP and MSTP)”...
  • Page 448: Clear Spanning-Tree Statistics

    PANNING OMMANDS CLEAR SPANNING TREE STATISTICS clear spanning-tree statistics Overview Use this command to clear all the STP BPDU (Bridge Protocol Data Unit) statistics. clear spanning-tree statistics Syntax clear spanning-tree statistics [instance <mstp-instance>] clear spanning-tree statistics [interface <port> [instance <mstp-instance>]] Parameter Description <port>...
  • Page 449: Clear Spanning-Tree Detected Protocols (Rstp And Mstp)

    PANNING OMMANDS (RSTP MSTP) CLEAR SPANNING TREE DETECTED PROTOCOLS clear spanning-tree detected protocols (RSTP and MSTP) Overview Use this command to clear the detected protocols for a specific port, or all ports. Use this command in RSTP or MSTP mode only. clear spanning-tree detected protocols [interface <port>] Syntax Parameter...
  • Page 450: Debug Mstp (Rstp And Stp)

    PANNING OMMANDS (RSTP STP) DEBUG MSTP debug mstp (RSTP and STP) Overview Use this command to enable debugging for the configured spanning tree mode, and echo data to the console, at various levels. Note that although this command uses the keyword mstp it displays debugging output for RSTP and STP protocols as well the MSTP protocol.
  • Page 451 PANNING OMMANDS (RSTP STP) DEBUG MSTP command. The default terminal monitor filter will select and display these messages. Alternatively, the messages can be directed to any of the other log outputs by adding a filter for the MSTP application using log buffered (filter) command: awplus#...
  • Page 452 PANNING OMMANDS (RSTP STP) DEBUG MSTP awplus#terminal monitor awplus#debug mstp packet rx decode interface port1.0.4 17:23:42 awplus MSTP[1417]: port1.0.4 xSTP BPDU rx - start 17:23:42 awplus MSTP[1417]: Protocol version: MSTP, BPDU type: RST 17:23:42 awplus MSTP[1417]: CIST Flags: Agree Forward Learn role=Desig 17:23:42 awplus MSTP[1417]: CIST root id : 0000:0000cd1000fe...
  • Page 453 PANNING OMMANDS (RSTP STP) DEBUG MSTP awplus#terminal monitor awplus#debug mstp packet rx decode interface port1.0.4 awplus#17:30:17 awplus MSTP[1417]: port1.0.4 xSTP BPDU rx - start 17:30:17 awplus MSTP[1417]: Protocol version: RSTP, BPDU type: RST 17:30:17 awplus MSTP[1417]: CIST Flags: Forward Learn role=Desig 17:30:17 awplus MSTP[1417]: CIST root id : 8000:0000cd1000fe...
  • Page 454: Instance Priority (Mstp)

    PANNING OMMANDS (MSTP) INSTANCE PRIORITY instance priority (MSTP) Overview Use this command to set the priority for this device to become the root bridge for the specified MSTI (Multiple Spanning Tree Instance). Use this command for MSTP only. Use the no variant of this command to restore the root bridge priority of the device for the instance to the default.
  • Page 455 PANNING OMMANDS (MSTP) INSTANCE PRIORITY Related region (MSTP) Commands revision (MSTP) show spanning-tree mst config spanning-tree mst instance spanning-tree mst instance priority 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 456: Instance Vlan (Mstp)

    PANNING OMMANDS (MSTP) INSTANCE VLAN instance vlan (MSTP) Overview Use this command to create an MST Instance (MSTI), and associate the specified VLANs with it. An MSTI is a spanning tree instance that exists within an MST region (MSTR). When a VLAN is associated with an MSTI the member ports of the VLAN are automatically configured to send and receive spanning-tree information for the associated MSTI.
  • Page 457 PANNING OMMANDS (MSTP) INSTANCE VLAN Related region (MSTP) Commands revision (MSTP) show spanning-tree mst config spanning-tree mst instance vlan 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 458: Region (Mstp)

    PANNING OMMANDS (MSTP) REGION region (MSTP) Overview Use this command to assign a name to the device’s MST Region. MST Instances (MSTI) of a region form different spanning trees for different VLANs. Use this command for MSTP only. Use the no variant of this command to remove this region name and reset it to the default.
  • Page 459: Revision (Mstp)

    PANNING OMMANDS (MSTP) REVISION revision (MSTP) Overview Use this command to specify the MST revision number to be used in the configuration identifier. Use this command for MSTP only. Syntax revision <revision-number> Parameter Description <revision-number> <0-65535> Revision number. Default The default of revision number is 0. Mode MST Configuration Usage...
  • Page 460: Show Debugging Mstp

    PANNING OMMANDS SHOW DEBUGGING MSTP show debugging mstp Overview Use this command to show the MSTP debugging options set. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide. Syntax show debugging mstp Mode User Exec and Privileged Exec mode...
  • Page 461: Show Spanning-Tree

    PANNING OMMANDS SHOW SPANNING TREE show spanning-tree Overview Use this command to display detailed spanning tree information on the specified port or on all ports. Use this command for RSTP, MSTP or STP. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 462 PANNING OMMANDS SHOW SPANNING TREE Output Figure 14-2: Example output from show spanning-tree in RSTP mode awplus#show spanning-tree % 1: Bridge up - Spanning Tree Enabled % 1: Root Path Cost 0 - Root Port 0 - Bridge Priority 32768 % 1: Forward Delay 15 - Hello Time 2 - Max Age 20...
  • Page 463 PANNING OMMANDS SHOW SPANNING TREE % 1: Bridge up - Spanning Tree Enabled % 1: Root Path Cost 0 - Root Port 0 - Bridge Priority 32768 % 1: Forward Delay 15 - Hello Time 2 - Max Age 20 % 1: Root Id 80000000cd20f093...
  • Page 464: Show Spanning-Tree Brief

    PANNING OMMANDS SHOW SPANNING TREE BRIEF show spanning-tree brief Overview Use this command to display a summary of spanning tree status information on all ports. Use this command for RSTP, MSTP or STP. show spanning-tree brief Syntax Parameter Description brief A brief summary of spanning tree information.
  • Page 465: Show Spanning-Tree Mst

    PANNING OMMANDS SHOW SPANNING TREE MST show spanning-tree mst Overview This command displays bridge-level information about the CIST and VLAN to MSTI mappings. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 466: Show Spanning-Tree Mst Config

    PANNING OMMANDS SHOW SPANNING TREE MST CONFIG show spanning-tree mst config Overview Use this command to display MSTP configuration identifier for the device. show spanning-tree mst config Syntax Mode User Exec, Privileged Exec and Interface Configuration Usage The region name, the revision number, and the digest of the VLAN to MSTI configuration table must be the same on all devices that are intended to be in the same MST region.
  • Page 467: Show Spanning-Tree Mst Detail

    PANNING OMMANDS SHOW SPANNING TREE MST DETAIL show spanning-tree mst detail Overview This command displays detailed information about each instance, and all interfaces associated with that particular instance. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 468 PANNING OMMANDS SHOW SPANNING TREE MST DETAIL port1.0.3: Port 5003 - Id 838b - Role Disabled - State Discarding port1.0.3: Designated External Path Cost 0 -Internal Path Cost 0 port1.0.3: Configured Path Cost 20000000 - Add type Explicit ref count 1 port1.0.3: Designated Port Id 838b - CIST Priority 128 -...
  • Page 469: Show Spanning-Tree Mst Detail Interface

    PANNING OMMANDS SHOW SPANNING TREE MST DETAIL INTERFACE show spanning-tree mst detail interface Overview This command displays detailed information about the specified switch port, and the MST instances associated with it. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 470 PANNING OMMANDS SHOW SPANNING TREE MST DETAIL INTERFACE port1.0.2: No portfast configured - Current portfast off port1.0.2: portfast bpdu-guard default - Current portfast bpdu-guard off port1.0.2: portfast bpdu-filter default - Current portfast bpdu-filter off port1.0.2: no root guard configured - Current root guard off port1.0.2: Configured Link Type point-to-point - Current shared...
  • Page 471: Show Spanning-Tree Mst Instance

    PANNING OMMANDS SHOW SPANNING TREE MST INSTANCE show spanning-tree mst instance Overview This command displays detailed information for the specified instance, and all switch ports associated with that instance. A topology change counter has been included for RSTP and MSTP. You can see the topology change counter for RSTP by using the show spanning-tree command.
  • Page 472: Show Spanning-Tree Mst Instance Interface

    PANNING OMMANDS SHOW SPANNING TREE MST INSTANCE INTERFACE show spanning-tree mst instance interface Overview This command displays detailed information for the specified MST (Multiple Spanning Tree) instance, and the specified switch port associated with that MST instance. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 473: Show Spanning-Tree Mst Interface

    PANNING OMMANDS SHOW SPANNING TREE MST INTERFACE show spanning-tree mst interface Overview This command displays the number of instances created, and VLANs associated with it for the specified switch port. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 474: Show Spanning-Tree Mst Detail Interface

    PANNING OMMANDS SHOW SPANNING TREE MST DETAIL INTERFACE show spanning-tree mst detail interface Overview This command displays detailed information about the specified switch port, and the MST instances associated with it. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 475 PANNING OMMANDS SHOW SPANNING TREE MST DETAIL INTERFACE port1.0.2: No portfast configured - Current portfast off port1.0.2: portfast bpdu-guard default - Current portfast bpdu-guard off port1.0.2: portfast bpdu-filter default - Current portfast bpdu-filter off port1.0.2: no root guard configured - Current root guard off port1.0.2: Configured Link Type point-to-point - Current shared...
  • Page 476: Show Spanning-Tree Statistics

    PANNING OMMANDS SHOW SPANNING TREE STATISTICS show spanning-tree statistics Overview This command displays BPDU (Bridge Protocol Data Unit) statistics for all spanning-tree instances, and all switch ports associated with all spanning-tree instances. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 477 PANNING OMMANDS SHOW SPANNING TREE STATISTICS % STATUS of Port Timers % --------------------- % Hello Time Configured : 2 % Hello timer : INACTIVE % Hello Time Value : 0 % Forward Delay Timer : INACTIVE % Forward Delay Timer Value : 0...
  • Page 478: Show Spanning-Tree Statistics Instance

    PANNING OMMANDS SHOW SPANNING TREE STATISTICS INSTANCE show spanning-tree statistics instance Overview This command displays BPDU (Bridge Protocol Data Unit) statistics for the specified MST (Multiple Spanning Tree) instance, and all switch ports associated with that MST instance. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 479: Show Spanning-Tree Statistics Instance Interface

    PANNING OMMANDS SHOW SPANNING TREE STATISTICS INSTANCE INTERFACE show spanning-tree statistics instance interface Overview This command displays BPDU (Bridge Protocol Data Unit) statistics for the specified MST (Multiple Spanning Tree) instance and the specified switch port associated with that MST instance. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 480 PANNING OMMANDS SHOW SPANNING TREE STATISTICS INSTANCE INTERFACE Output Figure 14-15: Example output from show spanning-tree statistics instance interface awplus#sh spanning-tree statistics interface port1.0.2 instance 1 Spanning Tree Enabled for Instance : 1 ================================== % INST_PORT port1.0.2 Information & Statistics % ----------------------------------------...
  • Page 481: Show Spanning-Tree Statistics Interface

    PANNING OMMANDS SHOW SPANNING TREE STATISTICS INTERFACE show spanning-tree statistics interface Overview This command displays BPDU (Bridge Protocol Data Unit) statistics for the specified switch port, and all MST instances associated with that switch port. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 482 PANNING OMMANDS SHOW SPANNING TREE STATISTICS INTERFACE % PORT Based Information & Statistics % ----------------------------------- % Config Bpdu's xmitted : 0 % Config Bpdu's received : 0 % TCN Bpdu's xmitted : 0 % TCN Bpdu's received : 0 % Forward Trans Count : 0...
  • Page 483: Show Spanning-Tree Vlan Range-Index

    PANNING OMMANDS SHOW SPANNING TREE VLAN RANGE INDEX show spanning-tree vlan range-index Overview Use this command to display information about MST (Multiple Spanning Tree) instances and the VLANs associated with them including the VLAN range-index value for the device. show spanning-tree vlan range-index Syntax Mode Privileged Exec...
  • Page 484: Spanning-Tree Autoedge (Rstp And Mstp)

    PANNING OMMANDS (RSTP MSTP) SPANNING TREE AUTOEDGE spanning-tree autoedge (RSTP and MSTP) Overview Use this command to enable the autoedge feature on the port. The autoedge feature allows the port to automatically detect that it is an edge port. If it does not receive any BPDUs in the first three seconds after linkup, enabling, or entering RSTP or MSTP mode, it sets itself to be an edgeport and enters the forwarding state.
  • Page 485: Spanning-Tree Bpdu

    PANNING OMMANDS SPANNING TREE BPDU spanning-tree bpdu Overview Use this command to configure BPDU (Bridge Protocol Data Unit) discarding or forwarding, when STP is disabled on the switch. This may be needed for correct STP operation in complex networks. There is no no variant for this command. Instead, apply the discard parameter to reset it back to the default then re-enable STP with the command spanning-tree enable.
  • Page 486 PANNING OMMANDS SPANNING TREE BPDU Examples To enable STP BPDU discard in Global Configuration mode with STP disabled, which discards all ingress STP BPDU frames, enter the commands: awplus# configure terminal awplus(config)# no spanning-tree rstp enable awplus(config)# spanning-tree bpdu discard To enable STP BPDU forward in Global Configuration mode with STP disabled, which forwards any ingress STP BPDU frames to all ports regardless of any VLAN membership, enter the commands:...
  • Page 487: Spanning-Tree Cisco-Interoperability (Mstp)

    PANNING OMMANDS (MSTP) SPANNING TREE CISCO INTEROPERABILITY spanning-tree cisco-interoperability (MSTP) Overview Use this command to enable/disable Cisco-interoperability for MSTP. Use this command for MSTP only. Syntax spanning-tree cisco-interoperability {enable|disable} Parameter Description enable Enable Cisco interoperability for MSTP. disable Disable Cisco interoperability for MSTP. Default If this command is not used, Cisco interoperability is disabled.
  • Page 488: Spanning-Tree Edgeport (Rstp And Mstp)

    PANNING OMMANDS (RSTP MSTP) SPANNING TREE EDGEPORT spanning-tree edgeport (RSTP and MSTP) Overview Use this command to set a port as an edge-port. Use this command for RSTP or MSTP. This command has the same effect as the spanning-tree portfast (STP) command, but the configuration displays differently in the output of some show commands.
  • Page 489: Spanning-Tree Enable

    PANNING OMMANDS SPANNING TREE ENABLE spanning-tree enable Overview Use this command in Global Configuration mode to enable the specified spanning tree protocol for all switch ports. Note that this must be the spanning tree protocol that is configured on the device by the spanning-tree mode command.
  • Page 490 PANNING OMMANDS SPANNING TREE ENABLE To disable RSTP in Global Configuration mode, enter the below commands: awplus# configure terminal awplus(config)# no spanning-tree rstp enable Related spanning-tree bpdu Commands spanning-tree mode 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 491: Spanning-Tree Errdisable-Timeout Enable

    PANNING OMMANDS SPANNING TREE ERRDISABLE TIMEOUT ENABLE spanning-tree errdisable-timeout enable Overview Use this command to enable the errdisable-timeout facility, which sets a timeout for ports that are disabled due to the BPDU guard feature. Use this command for RSTP or MSTP. Use the no variant of this command to disable the errdisable-timeout facility.
  • Page 492: Spanning-Tree Errdisable-Timeout Interval

    PANNING OMMANDS SPANNING TREE ERRDISABLE TIMEOUT INTERVAL spanning-tree errdisable-timeout interval Overview Use this command to specify the time interval after which a port is brought back up when it has been disabled by the BPDU guard feature. Use this command for RSTP or MSTP. Syntax spanning-tree errdisable-timeout interval <10-1000000>...
  • Page 493: Spanning-Tree Force-Version

    PANNING OMMANDS SPANNING TREE FORCE VERSION spanning-tree force-version Overview Use this command in Interface Configuration mode for a switch port interface only to force the protocol version for the switch port. Use this command for RSTP or MSTP only. spanning-tree force-version <version> Syntax no spanning-tree force-version Parameter...
  • Page 494: Spanning-Tree Forward-Time

    PANNING OMMANDS SPANNING TREE FORWARD TIME spanning-tree forward-time Overview Use this command to set the forward delay value. Use the no variant of this command to reset the forward delay value to the default setting of 15 seconds. The forward delay sets the time (in seconds) to control how fast a port changes its spanning tree state when moving towards the forwarding state.
  • Page 495: Spanning-Tree Guard Root

    PANNING OMMANDS SPANNING TREE GUARD ROOT spanning-tree guard root Overview Use this command in Interface Configuration mode for a switch port only to enable the Root Guard feature for the switch port. The root guard feature disables reception of superior BPDUs. You can use this command for RSTP, STP or MSTP. Use the no variant of this command to disable the root guard feature for the port.
  • Page 496: Spanning-Tree Hello-Time

    PANNING OMMANDS SPANNING TREE HELLO TIME spanning-tree hello-time Overview Use this command to set the hello-time. This sets the time in seconds between the transmission of device spanning tree configuration information when the device is the Root Bridge of the spanning tree or is trying to become the Root Bridge. Use this command for RSTP, STP or MSTP.
  • Page 497: Spanning-Tree Link-Type

    PANNING OMMANDS SPANNING TREE LINK TYPE spanning-tree link-type Overview Use this command in Interface Configuration mode for a switch port interface only to enable or disable point-to-point or shared link types on the switch port. Use this command for RSTP or MSTP only. Use the no variant of this command to return the port to the default link type.
  • Page 498: Spanning-Tree Max-Age

    PANNING OMMANDS SPANNING TREE MAX spanning-tree max-age Overview Use this command to set the max-age. This sets the maximum age, in seconds, that dynamic spanning tree configuration information is stored in the device before it is discarded. Use this command for RSTP, STP or MSTP. Use the no variant of this command to restore the default of max-age.
  • Page 499: Spanning-Tree Max-Hops (Mstp)

    PANNING OMMANDS (MSTP) SPANNING TREE MAX HOPS spanning-tree max-hops (MSTP) Overview Use this command to specify the maximum allowed hops for a BPDU in an MST region. This parameter is used by all the instances of the MST region. Use the no variant of this command to restore the default. Use this command for MSTP only.
  • Page 500: Spanning-Tree Mode

    PANNING OMMANDS SPANNING TREE MODE spanning-tree mode Overview Use this command to change the spanning tree protocol mode on the device. The spanning tree protocol mode on the device can be configured to either STP, RSTP or MSTP. spanning-tree mode {stp|rstp|mstp} Syntax Default The default spanning tree protocol mode on the device is RSTP.
  • Page 501: Spanning-Tree Mst Configuration

    PANNING OMMANDS SPANNING TREE MST CONFIGURATION spanning-tree mst configuration Overview Use this command to enter the MST Configuration mode to configure the Multiple Spanning-Tree Protocol. spanning-tree mst configuration Syntax Mode Global Configuration Examples The following example uses this command to enter MST Configuration mode. Note the change in the command prompt.
  • Page 502: Spanning-Tree Mst Instance

    PANNING OMMANDS SPANNING TREE MST INSTANCE spanning-tree mst instance Overview Use this command to assign a Multiple Spanning Tree instance (MSTI) to a switch port or channel group. Note that ports are automatically configured to send and receive spanning-tree information for the associated MSTI when VLANs are assigned to MSTIs using the instance vlan (MSTP) command.
  • Page 503: Spanning-Tree Mst Instance Path-Cost

    PANNING OMMANDS SPANNING TREE MST INSTANCE PATH COST spanning-tree mst instance path-cost Overview Use this command to set the cost of a path associated with a switch port, for the specified MSTI. This specifies the switch port’s contribution to the cost of a path to the MSTI regional root via that port.
  • Page 504 PANNING OMMANDS SPANNING TREE MST INSTANCE PATH COST To return the path cost to its default value on instance 3, use the commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# no spanning-tree mst instance 3 path-cost Related instance vlan (MSTP) Commands spanning-tree mst instance spanning-tree mst instance priority...
  • Page 505: Spanning-Tree Mst Instance Priority

    PANNING OMMANDS SPANNING TREE MST INSTANCE PRIORITY spanning-tree mst instance priority Overview Use this command in Interface Configuration mode for a switch port interface only to set the port priority for an MST instance (MSTI). Use the no variant of this command to restore the default priority value (128). Syntax spanning-tree mst instance <instance-id>...
  • Page 506: Spanning-Tree Mst Instance Restricted-Role

    PANNING OMMANDS SPANNING TREE MST INSTANCE RESTRICTED ROLE spanning-tree mst instance restricted-role Overview Use this command in Interface Configuration mode for a switch port interface only to enable the restricted role for an MSTI (Multiple Spanning Tree Instance) on a switch port.
  • Page 507 PANNING OMMANDS SPANNING TREE MST INSTANCE RESTRICTED ROLE Related instance vlan (MSTP) Commands spanning-tree priority (port priority) spanning-tree mst instance spanning-tree mst instance path-cost spanning-tree mst instance restricted-tcn 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 508: Spanning-Tree Mst Instance Restricted-Tcn

    PANNING OMMANDS SPANNING TREE MST INSTANCE RESTRICTED spanning-tree mst instance restricted-tcn Overview Use this command to prevent a switch port from propagating received topology change notifications and topology changes to other switch ports. This is named restricted TCN (Topology Change Notification). A TCN is a simple Bridge Protocol Data Unit (BPDU) that a bridge sends out to its root port to signal a topology change.
  • Page 509: Spanning-Tree Path-Cost

    PANNING OMMANDS SPANNING TREE PATH COST spanning-tree path-cost Overview Use this command in Interface Configuration mode for a switch port interface only to set the cost of a path for the specified port. This value then combines with others along the path to the root bridge in order to determine the total cost path value from the particular port, to the root bridge.
  • Page 510: Spanning-Tree Portfast (Stp)

    PANNING OMMANDS (STP) SPANNING TREE PORTFAST spanning-tree portfast (STP) Overview Use this command in Interface Configuration mode for a switch port interface only to set a port as an edge-port. The portfast feature enables a port to rapidly move to the forwarding state, without having first to pass through the intermediate spanning tree states.
  • Page 511 PANNING OMMANDS (STP) SPANNING TREE PORTFAST awplus# configure terminal Example awplus(config)# interface port1.0.2 awplus(config-if)# spanning-tree portfast Related spanning-tree edgeport (RSTP and MSTP) Commands show spanning-tree spanning-tree portfast bpdu-filter spanning-tree portfast bpdu-guard 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 512: Spanning-Tree Portfast Bpdu-Filter

    PANNING OMMANDS SPANNING TREE PORTFAST BPDU FILTER spanning-tree portfast bpdu-filter Overview This command sets the bpdu-filter feature and applies a filter to any BPDUs (Bridge Protocol Data Units) received. Enabling this feature ensures that configured ports will not transmit any BPDUs and will ignore (filter out) any BPDUs received. BPDU Filter is not enabled on a port by default.
  • Page 513 PANNING OMMANDS SPANNING TREE PORTFAST BPDU FILTER To enable STP BPDU filtering in Interface Configuration mode, enter the commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# spanning-tree portfast bpdu-filter enable Related spanning-tree edgeport (RSTP and MSTP) Commands show spanning-tree spanning-tree portfast (STP) spanning-tree portfast bpdu-guard 613-50157-01 Rev C Command Reference for FS980M Series...
  • Page 514: Spanning-Tree Portfast Bpdu-Guard

    PANNING OMMANDS SPANNING TREE PORTFAST BPDU GUARD spanning-tree portfast bpdu-guard Overview This command applies a BPDU (Bridge Protocol Data Unit) guard to the port. A port with the bpdu-guard feature enabled will block all traffic (BPDUs and user data), if it starts receiving BPDUs.
  • Page 515 PANNING OMMANDS SPANNING TREE PORTFAST BPDU GUARD Use the show spanning-tree command to display the device and port configurations for the BPDU Guard feature. It shows both the administratively configured and currently running values of bpdu-guard. Example To enable STP BPDU guard in Global Configuration mode, enter the below commands: awplus# configure terminal...
  • Page 516: Spanning-Tree Priority (Bridge Priority)

    PANNING OMMANDS SPANNING TREE PRIORITY BRIDGE PRIORITY spanning-tree priority (bridge priority) Overview Use this command to set the bridge priority for the device. A lower priority value indicates a greater likelihood of the device becoming the root bridge. Use this command for RSTP, STP or MSTP. When MSTP mode is configured, this will apply to the CIST.
  • Page 517: Spanning-Tree Priority (Port Priority)

    PANNING OMMANDS SPANNING TREE PRIORITY PORT PRIORITY spanning-tree priority (port priority) Overview Use this command in Interface Configuration mode for a switch port interface only to set the port priority for port. A lower priority value indicates a greater likelihood of the port becoming part of the active topology.
  • Page 518: Spanning-Tree Restricted-Role

    PANNING OMMANDS SPANNING TREE RESTRICTED ROLE spanning-tree restricted-role Overview Use this command in Interface Configuration mode for a switch port interface only to restrict the port from becoming a root port. Use the no variant of this command to disable the restricted role functionality. Syntax spanning-tree restricted-role no spanning-tree restricted-role...
  • Page 519: Spanning-Tree Restricted-Tcn

    PANNING OMMANDS SPANNING TREE RESTRICTED spanning-tree restricted-tcn Overview Use this command in Interface Configuration mode for a switch port interface only to prevent TCN (Topology Change Notification) BPDUs (Bridge Protocol Data Units) from being sent on a port. If this command is enabled, after a topology change a bridge is prevented from sending a TCN to its designated bridge.
  • Page 520: Spanning-Tree Transmit-Holdcount

    PANNING OMMANDS SPANNING TREE TRANSMIT HOLDCOUNT spanning-tree transmit-holdcount Overview Use this command to set the maximum number of BPDU transmissions that are held back. Use the no variant of this command to restore the default transmit hold-count value. Syntax spanning-tree transmit-holdcount no spanning-tree transmit-holdcount Default Transmit hold-count default is 3.
  • Page 521: Undebug Mstp

    PANNING OMMANDS UNDEBUG MSTP undebug mstp Overview This command applies the functionality of the no debug mstp (RSTP and STP) command. 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 522: Link Aggregation Commands

    Link Aggregation Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure a static channel group (static aggregator) and dynamic channel group (LACP channel group, etherchannel or LACP aggregator). Link aggregation is also sometimes referred to as channeling. : AlliedWare Plus™...
  • Page 523 GGREGATION OMMANDS • “show etherchannel” on page 535 • “show etherchannel detail” on page 536 • “show etherchannel summary” on page 537 • “show lacp sys-id” on page 538 • “show lacp-counter” on page 539 • “show port etherchannel” on page 540 •...
  • Page 524: Channel-Group

    GGREGATION OMMANDS CHANNEL GROUP channel-group Overview Use this command to either create a new dynamic channel group while at the same time adding a port to it, or to add a port to an existing dynamic channel group. Note that you must also set the LACP mode to be either active or passive. You can create up to 32 dynamic (LACP) channel groups (and up to 96 static channel groups).
  • Page 525 GGREGATION OMMANDS CHANNEL GROUP For more information about LACP, see the Link Aggregation Feature Overview and Configuration Guide which is available on our website at alliedtelesis.com. Examples To add device port1.0.6 to a newly created LACP channel group 2 use the commands below: awplus# configure terminal...
  • Page 526: Clear Lacp Counters

    GGREGATION OMMANDS CLEAR LACP COUNTERS clear lacp counters Overview Use this command to clear all counters of all present LACP aggregators (channel groups) or a given LACP aggregator. clear lacp [<1-32>] counters Syntax Parameter Description <1-32> Channel-group number. Mode Privileged Exec awplus# clear lacp 2 counters Example...
  • Page 527: Debug Lacp

    GGREGATION OMMANDS DEBUG LACP debug lacp Overview Use this command to enable all LACP troubleshooting functions. Use the no variant of this command to disable this function. Syntax debug lacp {all|cli|event|ha|packet|sync|timer[detail]} no debug lacp {all|cli|event|ha|packet|sync|timer[detail]} Parameter Description Turn on all debugging for LACP. Specifies debugging for CLI messages.
  • Page 528: Lacp Global-Passive-Mode Enable

    GGREGATION OMMANDS LACP GLOBAL PASSIVE MODE ENABLE lacp global-passive-mode enable Overview Use this command to enable LACP channel-groups to dynamically self-configure when they are connected to another device that has LACP channel-groups configured with Active Mode. lacp global-passive-mode enable Syntax no lacp global-passive-mode enable Default Enabled...
  • Page 529: Lacp Port-Priority

    GGREGATION OMMANDS LACP PORT PRIORITY lacp port-priority Overview Use this command to set the priority of a device port. Ports are selected for aggregation based on their priority, with the higher priority (numerically lower) ports selected first. Use the no variant of this command to reset the priority of port to the default. Syntax lacp port-priority <1-65535>...
  • Page 530: Lacp System-Priority

    GGREGATION OMMANDS LACP SYSTEM PRIORITY lacp system-priority Overview Use this command to set the system priority of a local system. This is used in determining the system responsible for resolving conflicts in the choice of aggregation groups. Use the no variant of this command to reset the system priority of the local system to the default.
  • Page 531: Lacp Timeout

    GGREGATION OMMANDS LACP TIMEOUT lacp timeout Overview Use this command to set the short or long timeout on a port. Ports will time out of the aggregation if three consecutive updates are lost. lacp timeout {short|long} Syntax Parameter Description timeout Number of seconds before invalidating a received LACP data unit (DU).
  • Page 532 GGREGATION OMMANDS LACP TIMEOUT The following commands set the LACP short timeout for 1 second on port1.0.2. awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# lacp timeout short 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 533: Show Debugging Lacp

    GGREGATION OMMANDS SHOW DEBUGGING LACP show debugging lacp Overview Use this command to display the LACP debugging option set. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide. Syntax show debugging lacp Mode User Exec and Privileged Exec...
  • Page 534: Show Diagnostic Channel-Group

    Overview This command displays dynamic and static channel group interface status information. The output of this command is useful for Allied Telesis authorized service personnel for diagnostic purposes. For information on filtering and saving command output, see the “Getting Started...
  • Page 535: Show Etherchannel

    GGREGATION OMMANDS SHOW ETHERCHANNEL show etherchannel Overview Use this command to display information about a LACP channel specified by the channel group number. The command output also shows the thrash limiting status. If thrash limiting is detected and the action parameter of the thrash-limiting command is set to vlan-disable, the output will also show the VLANs on which thrashing is detected.
  • Page 536: Show Etherchannel Detail

    GGREGATION OMMANDS SHOW ETHERCHANNEL DETAIL show etherchannel detail Overview Use this command to display detailed information about all LACP channels. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide, which is available on our website at alliedtelesis.com.
  • Page 537: Show Etherchannel Summary

    GGREGATION OMMANDS SHOW ETHERCHANNEL SUMMARY show etherchannel summary Overview Use this command to display a summary of all LACP channels. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide, which is available on our website at alliedtelesis.com.
  • Page 538: Show Lacp Sys-Id

    GGREGATION OMMANDS SHOW LACP SYS show lacp sys-id Overview Use this command to display the LACP system ID and priority. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide, which is available on our website at alliedtelesis.com.
  • Page 539: Show Lacp-Counter

    GGREGATION OMMANDS SHOW LACP COUNTER show lacp-counter Overview Use this command to display the packet traffic on all ports of all present LACP aggregators, or a given LACP aggregator. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 540: Show Port Etherchannel

    GGREGATION OMMANDS SHOW PORT ETHERCHANNEL show port etherchannel Overview Use this command to show LACP details of the device port specified. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide, which is available on our website at alliedtelesis.com.
  • Page 541: Show Static-Channel-Group

    GGREGATION OMMANDS SHOW STATIC CHANNEL GROUP show static-channel-group Overview Use this command to display all configured static channel groups and their corresponding member ports. Note that a static channel group is the same as a static aggregator. The command output also shows the thrash limiting status. If thrash limiting is detected and the action parameter of the thrash-limiting command is set to...
  • Page 542: Static-Channel-Group

    GGREGATION OMMANDS STATIC CHANNEL GROUP static-channel-group Overview Use this command to create a static channel group, or add a member port to an existing static channel group. Static channel groups are also known as static aggregators. You can create up to 96 static channel groups (and up to 32 dynamic channel groups).
  • Page 543 GGREGATION OMMANDS STATIC CHANNEL GROUP To reference static channel group 2 as an interface, use the commands: awplus# configure terminal awplus(config)# interface sa2 awplus(config-if)# To make it possible to use QoS Storm Protection on static channel group 2 on port1.0.6, with an ACL named “test-acl”, use the commands: awplus# configure terminal awplus(config)#...
  • Page 544: Undebug Lacp

    GGREGATION OMMANDS UNDEBUG LACP undebug lacp Overview This command applies the functionality of the no debug lacp command. 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 545: Power Over Ethernet Commands

    The following documents offer further information for configuring PoE on AlliedWare Plus switches. • PoE Feature Overview and Configuration_Guide. • Support for Allied Telesis Enterprise_MIBs_in AlliedWare Plus, for information about which PoE MIB objects are supported. • SNMP Feature Overview and Configuration_Guide, for information about SNMP traps.
  • Page 546 OWER OVER THERNET OMMANDS • “show debugging power-inline” on page 559 • “show power-inline” on page 560 • “show power-inline counters” on page 563 • “show power-inline interface” on page 565 • “show power-inline interface detail” on page 567 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 547: Clear Power-Inline Counters Interface

    OWER OVER THERNET OMMANDS CLEAR POWER INLINE COUNTERS INTERFACE clear power-inline counters interface Overview This command will clear the counters from a specified port, a range of ports, or all ports on the switch. If no ports are entered then PoE counters for all ports are cleared.
  • Page 548: Debug Power-Inline

    OWER OVER THERNET OMMANDS DEBUG POWER INLINE debug power-inline Overview This command enables debugging display for messages that are specific to Power over Ethernet (PoE). Use the no variant of this command to disable the specified PoE debugging messages. Syntax debug power-inline [all|event|info|power] no debug power-inline [all|event|info|power] Parameter...
  • Page 549 OWER OVER THERNET OMMANDS DEBUG POWER INLINE Related show debugging power-inline Commands terminal monitor 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 550: Power-Inline Allow-Legacy

    OWER OVER THERNET OMMANDS POWER INLINE ALLOW LEGACY power-inline allow-legacy Overview This command enables detection of pre-IEEE 802.3af Power Ethernet standard legacy Powered Devices (PDs). The no variant of this command disables detection of pre-IEEE 802.3af Power Ethernet standard legacy Powered Devices (PDs). Syntax power-inline allow-legacy no power-inline allow-legacy...
  • Page 551: Power-Inline Description

    OWER OVER THERNET OMMANDS POWER INLINE DESCRIPTION power-inline description Overview This command adds a description for a Powered Device (PD) connected to a PoE port. The no variant of this command clears a previously entered description for a connected PD, resetting the PD description to the default (null). Syntax power-inline description <pd-description>...
  • Page 552: Power-Inline Enable

    OWER OVER THERNET OMMANDS POWER INLINE ENABLE power-inline enable Overview This command enables Power over Ethernet (PoE) to detect a connected Powered Device (PD) and supply power. The no variant of this command disables PoE functionality on the selected PoE port(s).
  • Page 553: Power-Inline Max

    OWER OVER THERNET OMMANDS POWER INLINE MAX power-inline max Overview This command sets the maximum power allocated to a Power over an Ethernet (PoE and PoE+) port. The amount of power actually supplied to the port depends on the power requirements of the connected PD. It is also a function of the total PoE power loading on the switch and the PoE priority set for the port by the power-inline priority command.
  • Page 554 OWER OVER THERNET OMMANDS POWER INLINE MAX  awplus#configure terminal  awplus(config)#interface port1.0.1  awplus(config-if)#power-line max 5300  % The maximum power has been rounded to 5450mW in hardware. See the LLDP Feature Overview and Configuration Guide for information about power monitoring at the PD.
  • Page 555: Power-Inline Priority

    OWER OVER THERNET OMMANDS POWER INLINE PRIORITY power-inline priority Overview This command sets the Power over Ethernet (PoE) priority level of a PoE port to one of three available priority levels: • • high • critical The IE200-6 Series switches are able to supply 802.3at (PoE+) power levels to all their PoE-capable ports.
  • Page 556 OWER OVER THERNET OMMANDS POWER INLINE PRIORITY Examples To set the priority level to high on port1.0.1 to port1.0.4, use the following commands: awplus# configure terminal awplus(config)# interface port1.0.1-port1.0.4 awplus(config-if)# power-inline priority high To reset the priority level to the default of low on port1.0.1 to port1.0.4, use the following commands: awplus# configure terminal...
  • Page 557: Power-Inline Usage-Threshold

    OWER OVER THERNET OMMANDS POWER INLINE USAGE THRESHOLD power-inline usage-threshold Overview This command sets the level at which the switch will issue a message that the power supplied to all Powered Devices (PDs) has reached a critical level of the nominal power rating for the switch.
  • Page 558: Service Power-Inline

    OWER OVER THERNET OMMANDS SERVICE POWER INLINE service power-inline Overview This command enables Power over Ethernet (PoE) globally on the switch, for all PoE ports. service power-inline Syntax no service power-inline Default PoE functionality is enabled by default Mode Global Configuration Examples To disable PoE, use the following commands: awplus#...
  • Page 559: Show Debugging Power-Inline

    OWER OVER THERNET OMMANDS SHOW DEBUGGING POWER INLINE show debugging power-inline Overview This command displays Power over Ethernet (PoE) debug settings. show debugging power-inline Syntax Mode User Exec and Privileged Exec Example To display PoE debug settings, use the following command: awplus# show debugging power-inline Output...
  • Page 560: Show Power-Inline

    OWER OVER THERNET OMMANDS SHOW POWER INLINE show power-inline Overview This command displays the Power over Ethernet (PoE) status for all ports. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 561 OWER OVER THERNET OMMANDS SHOW POWER INLINE Table 1: Parameters in the show power-inline command output (cont.) Parameter Description Operational Status The operational status of the PSU hardware when this command was issued: • On if the PSU is installed and switched on. •...
  • Page 562 OWER OVER THERNET OMMANDS SHOW POWER INLINE Table 1: Parameters in the show power-inline command output (cont.) Parameter Description Device The description of the connected PD device if a description has been added with the power-inline description command. No description is shown for PDs not configured with the power-inline description command.
  • Page 563: Show Power-Inline Counters

    OWER OVER THERNET OMMANDS SHOW POWER INLINE COUNTERS show power-inline counters Overview This command displays Power over Ethernet (PoE) event counters for ports on the Power Sourcing Equipment (PSE). The PoE event counters displayed can also be accessed by objects in the PoE MIB (RFC 3621). See the MIB Objects Feature Overview and Configuration Guide for information about which PoE MIB objects...
  • Page 564 OWER OVER THERNET OMMANDS SHOW POWER INLINE COUNTERS Table 2: Parameters in the show power-inline counters command output Parameter Description Overload The number of instances when a PD exceeds its configured power limit (as configured by the power-inline max command). Also increments pethPsePortOverLoadCounter in the PoE MIB.
  • Page 565: Show Power-Inline Interface

    OWER OVER THERNET OMMANDS SHOW POWER INLINE INTERFACE show power-inline interface Overview This command displays a summary of Power over Ethernet (PoE) information for specified ports. If no ports are specified then PoE information is displayed for all ports. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 566 OWER OVER THERNET OMMANDS SHOW POWER INLINE INTERFACE Table 3: Parameters in the show power-inline interface command output Parameter Description The current PoE priorities for PoE ports on the PSE, as configured from a power-inline priority command: • Low displays when the low parameter is issued. The lowest priority for a PoE enabled port (default).
  • Page 567: Show Power-Inline Interface Detail

    OWER OVER THERNET OMMANDS SHOW POWER INLINE INTERFACE DETAIL show power-inline interface detail Overview This command displays detailed information for one or more Power over Ethernet (PoE) ports. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 568 OWER OVER THERNET OMMANDS SHOW POWER INLINE INTERFACE DETAIL Table 4: Parameters in show power-inline interface detail command output Parameter Description Interface The PoE port(s) in the format portx.y.z, where x is the device number, y is the module number within the device, and z is the PoE port number within the module.
  • Page 569 OWER OVER THERNET OMMANDS SHOW POWER INLINE INTERFACE DETAIL Related show power-inline Commands show power-inline interface 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 570: Part 3: Layer 3 Switching

    Part 3: Layer 3 Switching 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 571: Ip Addressing And Protocol Commands

    IP Addressing and Protocol Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure various IP features, including the following protocols: • Address Resolution Protocol (ARP) • ICMP Router Discovery Advertisements (IRDP) For more information, see the IP Feature Overview and Configuration Guide.
  • Page 572 IP A DDRESSING AND ROTOCOL OMMANDS • “show ip sockets” on page 598 • “show ip traffic” on page 601 • “tcpdump” on page 603 • “traceroute” on page 604 • “undebug ip packet interface” on page 605 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 573: Arp-Aging-Timeout

    IP A DDRESSING AND ROTOCOL OMMANDS AGING TIMEOUT arp-aging-timeout Overview This command sets a timeout period on dynamic ARP entries associated with a specific interface. If your device stops receiving traffic for the host specified in a dynamic ARP entry, it deletes the ARP entry from the ARP cache after this timeout is reached.
  • Page 574: Arp (Ip Address Mac)

    IP A DDRESSING AND ROTOCOL OMMANDS MAC) ADDRESS arp (IP address MAC) Overview This command adds a static ARP entry to the ARP cache. This is typically used to add entries for hosts that do not support ARP or to speed up the address resolution function for a host.
  • Page 575: Arp Log

    IP A DDRESSING AND ROTOCOL OMMANDS ARP LOG arp log Overview This command enables the logging of dynamic and static ARP entries in the ARP cache. The ARP cache contains mappings of device ports, VLAN IDs, and IP addresses to physical MAC addresses for hosts. This command can display the MAC addresses in the ARP log either using the notation HHHH.HHHH.HHHH, or using the IEEE standard hexadecimal notation (HH-HH-HH-HH-HH-HH).
  • Page 576 IP A DDRESSING AND ROTOCOL OMMANDS ARP LOG To enable ARP logging and specify that the MAC address in the log message is displayed in the standard IEEE format hexadecimal notation (HH-HH-HH-HH-HH-HH), use the following commands: awplus# configure terminal awplus(config)# arp log mac-address-format ieee To leave ARP logging enabled, but stop using HH-HH-HH-HH-HH-HH format and use HHHH.HHHH.HHHH format instead, use the following commands:...
  • Page 577 IP A DDRESSING AND ROTOCOL OMMANDS ARP LOG The following table lists the parameters in output of the show log | include ARP_LOG command. The ARP log message format is: <date> <time> <severity> <hostname> <program-name>  ARP_LOG <port-number> <vid> <operation> <MAC> <IP> Table 17-1: Parameters in the output from show log | include ARP_LOG Parameter Description...
  • Page 578: Arp-Reply-Bc-Dmac

    IP A DDRESSING AND ROTOCOL OMMANDS REPLY DMAC arp-reply-bc-dmac Overview Use this command to allow processing of ARP replies that arrive with a broadcast destination MAC (ffff.ffff.ffff). This makes neighbors reachable if they send ARP responses that contain a broadcast destination MAC. Use the no variant of this command to turn off processing of ARP replies that arrive with a broadcast destination MAC.
  • Page 579: Clear Arp-Cache

    IP A DDRESSING AND ROTOCOL OMMANDS CLEAR ARP CACHE clear arp-cache Overview This command deletes dynamic ARP entries from the ARP cache. You can optionally specify the IPv4 address of an ARP entry to be cleared from the ARP cache. clear arp-cache [<ip-address>] Syntax Parameter...
  • Page 580: Debug Ip Packet Interface

    IP A DDRESSING AND ROTOCOL OMMANDS DEBUG IP PACKET INTERFACE debug ip packet interface Overview The debug ip packet interface command enables IP packet debug and is controlled by the terminal monitor command. If the optional icmp keyword is specified then ICMP packets are shown in the output.
  • Page 581 IP A DDRESSING AND ROTOCOL OMMANDS DEBUG IP PACKET INTERFACE To turn on ARP packet debugging on vlan1, use the command: Examples awplus# debug ip packet interface vlan1 arp To turn on all packet debugging on all interfaces on the device, use the command: awplus# debug ip packet interface all To turn on TCP packet debugging on vlan1 and IP address 192.168.2.4, use...
  • Page 582: Ip Address (Ip Addressing And Protocol)

    IP A DDRESSING AND ROTOCOL OMMANDS (IP A IP ADDRESS DDRESSING AND ROTOCOL ip address (IP Addressing and Protocol) Overview This command sets a static IP address on an interface. The no variant of this command removes the IP address from the interface. You cannot remove the primary address when a secondary address is present.
  • Page 583 IP A DDRESSING AND ROTOCOL OMMANDS (IP A IP ADDRESS DDRESSING AND ROTOCOL To add the IP address 10.10.11.50/24 to the local loopback interface lo, use the following commands: awplus# configure terminal awplus(config)# interface lo awplus(config-if)# ip address 10.10.11.50/24 Related interface (to configure) Commands show ip interface...
  • Page 584: Ip Gratuitous-Arp-Link

    IP A DDRESSING AND ROTOCOL OMMANDS IP GRATUITOUS LINK ip gratuitous-arp-link Overview This command sets the Gratuitous ARP time limit for all switchports. The time limit restricts the sending of Gratuitous ARP packets to one Gratuitous ARP packet within the time in seconds. : This command specifies time between sequences of Gratuitous ARP packets, NOTE and time between individual Gratuitous ARP packets occurring in a sequence, to allow...
  • Page 585 IP A DDRESSING AND ROTOCOL OMMANDS IP GRATUITOUS LINK To restrict the sending of Gratuitous ARP packets to one every 20 seconds, use the commands: awplus# configure terminal awplus(config)# ip gratuitous-arp-link 20 Validation show running-config Commands 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 586: Ip Limited-Local-Proxy-Arp

    IP A DDRESSING AND ROTOCOL OMMANDS IP LIMITED LOCAL PROXY ip limited-local-proxy-arp Overview Use this command to enable local proxy ARP, but only for a specified set of IP addresses. This makes the device respond to ARP requests for those IP addresses when the addresses are reachable via the interface you are configuring.
  • Page 587: Ip Local-Proxy-Arp

    IP A DDRESSING AND ROTOCOL OMMANDS IP LOCAL PROXY ip local-proxy-arp Overview This command allows you to stop MAC address resolution between hosts within a private VLAN edge interface. Local Proxy ARP works by intercepting ARP requests between hosts within a subnet and responding with your device’s own MAC address details instead of the destination host’s details.
  • Page 588: Ip Proxy-Arp

    IP A DDRESSING AND ROTOCOL OMMANDS IP PROXY ip proxy-arp Overview This command enables Proxy ARP responses to ARP requests on an interface. When enabled, your device intercepts ARP broadcast packets and substitutes its own physical address for that of the remote host. By responding to the ARP request, your device ensures that subsequent packets from the local host are directed to its physical address, and it can then forward these to the remote host.
  • Page 589: Local-Proxy-Arp

    IP A DDRESSING AND ROTOCOL OMMANDS LOCAL PROXY local-proxy-arp Overview Use this command to specify an IP subnet for use with limited local proxy ARP. When limited local proxy ARP is enabled with the command limited-local-proxy-arp, the device will respond to ARP requests for addresses in that subnet.
  • Page 590: Ip Unreachables

    IP A DDRESSING AND ROTOCOL OMMANDS IP UNREACHABLES ip unreachables Overview Use this command to enable ICMP (Internet Control Message Protocol) type 3, destination unreachable, messages. Use the no variant of this command to disable destination unreachable messages. This prevents an attacker from using these messages to discover the topology of a network.
  • Page 591 IP A DDRESSING AND ROTOCOL OMMANDS IP UNREACHABLES Table 17-2: ICMP type 3 reason codes and description (cont.) Code Description [RFC] Host Precedence Violation [RFC1812] Precedence cutoff in effect [RFC1812] Example To disable destination unreachable messages, use the commands awplus# configure terminal awplus(config)# no ip unreachables...
  • Page 592: Ping

    IP A DDRESSING AND ROTOCOL OMMANDS PING ping Overview This command sends a query to another IPv4 host (send Echo Request messages). ping [ip] <host> [broadcast] [df-bit {yes|no}] [interval Syntax <0-128>] [pattern <hex-data-pattern>] [repeat {<1-2147483647>|continuous}] [size <36-18024>] [source <ip-addr>] [timeout <1-65535>] [tos <0-255>] Parameter Description <host>...
  • Page 593: Show Arp

    IP A DDRESSING AND ROTOCOL OMMANDS SHOW ARP show arp Overview Use this command to display entries in the ARP routing and forwarding table—the ARP cache contains mappings of IP addresses to physical addresses for hosts. To have a dynamic entry in the ARP cache, a host must have used the ARP protocol to access another host.
  • Page 594: Mac Address

    IP A DDRESSING AND ROTOCOL OMMANDS SHOW ARP Table 18: Parameters in the output of the show arp command Parameter Meaning IP Address IP address of the network device this entry maps to. MAC Address Hardware address of the network device. Interface Interface over which the network device is accessed.
  • Page 595: Show Debugging Ip Packet

    IP A DDRESSING AND ROTOCOL OMMANDS SHOW DEBUGGING IP PACKET show debugging ip packet Overview Use this command to show the IP interface debugging status. IP interface debugging is set using the debug ip packet interface command. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 596 IP A DDRESSING AND ROTOCOL OMMANDS SHOW DEBUGGING IP PACKET Related debug ip packet interface Commands terminal monitor 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 597: Show Ip Interface

    IP A DDRESSING AND ROTOCOL OMMANDS SHOW IP INTERFACE show ip interface Overview Use this command to display information about interfaces and the IP addresses assigned to them. To display information about a specific interface, specify the interface name with the command. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 598: Show Ip Sockets

    IP A DDRESSING AND ROTOCOL OMMANDS SHOW IP SOCKETS show ip sockets Overview Use this command to display information about the IP or TCP sockets that are present on the device. It includes TCP and UDP listen sockets, and displays the associated IP address and port.
  • Page 599 IP A DDRESSING AND ROTOCOL OMMANDS SHOW IP SOCKETS Table 17-1: Parameters in the output from show ip sockets Parameter Description Not showing This field refers to established sessions between processes internal <number> to the device, that are used in its operation and management. local These sessions are not displayed as they are not useful to the user.
  • Page 600 IP A DDRESSING AND ROTOCOL OMMANDS SHOW IP SOCKETS Table 17-1: Parameters in the output from show ip sockets (cont.) Parameter Description Remote For TCP and UDP listening sockets this shows the source IP address Address (either IPv4 or IPv6) and source TCP or UDP port number for which the socket will accept packets.
  • Page 601: Show Ip Traffic

    IP A DDRESSING AND ROTOCOL OMMANDS SHOW IP TRAFFIC show ip traffic Overview Use this command to display statistics regarding IP traffic sent and received by all interfaces on the device, showing totals for IP and IPv6 and then broken down into sub-categories such as TCP, UDP, ICMP and their IPv6 equivalents when appropriate.
  • Page 602 IP A DDRESSING AND ROTOCOL OMMANDS SHOW IP TRAFFIC 155 delayed acks sent 21187 headers predicted 736 pure ACKs 80497 pure ACKs predicted UDP: 139468 datagrams received 139468 datagrams sent UDPLite: 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 603: Tcpdump

    IP A DDRESSING AND ROTOCOL OMMANDS TCPDUMP tcpdump Overview Use this command to start a tcpdump, which gives the same output as the Unix-like tcpdump command to display TCP/IP traffic. Press <ctrl> + c to stop a running tcpdump. tcpdump <line> Syntax Parameter Description...
  • Page 604: Traceroute

    IP A DDRESSING AND ROTOCOL OMMANDS TRACEROUTE traceroute Overview Use this command to trace the route to the specified IPv4 host. traceroute {<ip-addr>|<hostname>} Syntax Parameter Description <ip-addr> The destination IPv4 address. The IPv4 address uses the format A.B.C.D. <hostname> The destination hostname. Mode User Exec and Privileged Exec awplus#...
  • Page 605: Undebug Ip Packet Interface

    IP A DDRESSING AND ROTOCOL OMMANDS UNDEBUG IP PACKET INTERFACE undebug ip packet interface Overview This command applies the functionality of the no debug ip packet interface command. 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 606: Domain Name Service (Dns) Commands

    Domain Name Service (DNS) Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure the Domain Name Service (DNS) client. For more information about DNS for Switches, see the Domain Name System (DNS) for AlliedWare Plus Switches Feature Overview and Configuration Guide Command List •...
  • Page 607: Ip Domain-List

    (DNS) C OMAIN ERVICE OMMANDS IP DOMAIN LIST ip domain-list Overview This command adds a domain to the DNS list. Domains are appended to incomplete host names in DNS requests. Each domain in this list is tried in turn in DNS lookups.
  • Page 608: Ip Domain-Lookup

    (DNS) C OMAIN ERVICE OMMANDS IP DOMAIN LOOKUP ip domain-lookup Overview This command enables the DNS client on your device. This allows you to use domain names instead of IP addresses in commands. The DNS client resolves the domain name into an IP address by sending a DNS inquiry to a DNS server, specified with the ip name-server command.
  • Page 609: Ip Domain-Name

    (DNS) C OMAIN ERVICE OMMANDS IP DOMAIN NAME ip domain-name Overview This command sets a default domain for the DNS. The DNS client appends this domain to incomplete host-names in DNS requests. The no variant of this command removes the domain-name previously set by this command.
  • Page 610: Ip Name-Server

    (DNS) C OMAIN ERVICE OMMANDS IP NAME SERVER ip name-server Overview This command adds IPv4 or IPv6 DNS server addresses. The DNS client on your device sends DNS queries to IP addresses in this list when trying to resolve a host name.
  • Page 611: Show Hosts

    (DNS) C OMAIN ERVICE OMMANDS SHOW HOSTS show hosts Overview This command shows the default domain, domain list, and name servers configured on your device. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 612: Show Ip Domain-List

    (DNS) C OMAIN ERVICE OMMANDS SHOW IP DOMAIN LIST show ip domain-list Overview This command shows the domains configured in the domain list. The DNS client uses the domains in this list to append incomplete hostnames when sending a DNS inquiry to a DNS server. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 613: Show Ip Domain-Name

    (DNS) C OMAIN ERVICE OMMANDS SHOW IP DOMAIN NAME show ip domain-name Overview This command shows the default domain configured on your device. When there are no entries in the DNS list, the DNS client appends this domain to incomplete hostnames when sending a DNS inquiry to a DNS server.
  • Page 614: Show Ip Name-Server

    (DNS) C OMAIN ERVICE OMMANDS SHOW IP NAME SERVER show ip name-server Overview This command displays a list of IPv4 and IPv6 DNS server addresses that your device will send DNS requests to. This is a static list configured using the name-server command.
  • Page 615: Ipv6 Commands

    IPv6 Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure IPv6. For more information, see the IPv6 Feature Overview and Configuration Guide. Command List • “clear ipv6 neighbors” on page 616 • “ipv6 address” on page 617 •...
  • Page 616: Clear Ipv6 Neighbors

    OMMANDS CLEAR IPV NEIGHBORS clear ipv6 neighbors Overview Use this command to clear all dynamic IPv6 neighbor entries. clear ipv6 neighbors Syntax Mode Privileged Exec awplus# clear ipv6 neighbors Example 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 617: Ipv6 Address

    OMMANDS ADDRESS ipv6 address Overview Use this command to set the IPv6 address of an interface. The command also enables IPv6 on the interface, which creates an EUI-64 link-local address as well as enabling RA processing and SLAAC. To stop the device from processing prefix information (routes and addresses from the received Router Advertisements) use the command no ipv6 nd accept-ra-pinfo.
  • Page 618: Ipv6 Enable

    OMMANDS ENABLE ipv6 enable Overview Use this command to enable automatic configuration of a link-local IPv6 address on an interface using Stateless Automatic Address Configuration (SLAAC). By default, the EUI-64 method is used to generate the link-local address. Use the no variant of this command to disable IPv6 on an interface without a global address.
  • Page 619: Show Ipv6 Route

    OMMANDS ENABLE Related ipv6 address Commands show ipv6 interface brief show ipv6 route show running-config 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 620: Ipv6 Eui64-Linklocal

    OMMANDS LINKLOCAL ipv6 eui64-linklocal Overview When IPv6 is enabled on an interface, an EUI link-local address is generated and installed on the interface. In other words, ipv6 eui64-linklocal is enabled by default on any IPv6 enabled interface. Use the no variant of this command to disallow the automatic generation of the EUI-64 link-local address on an IPv6 enabled interface.
  • Page 621: Ipv6 Nd Accept-Ra-Pinfo

    OMMANDS ND ACCEPT PINFO ipv6 nd accept-ra-pinfo Overview Use this command to allow the processing of the prefix information included in a received RA (Router Advertisement) on an IPv6 enabled interface. Use the no variant of this command to disable an IPv6 interface from using the prefix information within a received RA.
  • Page 622: Ipv6 Nd Raguard

    OMMANDS ND RAGUARD ipv6 nd raguard Overview Use this command to apply the Router Advertisements (RA) Guard feature from the Interface Configuration mode for a device port. This blocks all RA messages received on a device port. For more information about RA Guard, see the IPv6 Feature Overview and Configuration Guide.
  • Page 623 OMMANDS ND RAGUARD Output Example output from using show running-config interface port1.0.2 to verify RA Guard: ! interface port1.0.2 switchport mode access  ipv6 nd raguard ! Related show running-config interface Commands 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 624: Ipv6 Neighbor

    OMMANDS NEIGHBOR ipv6 neighbor Overview Use this command to add a static IPv6 neighbor entry. Use the no variant of this command to remove a specific IPv6 neighbor entry. Syntax ipv6 neighbor <ipv6-address> <vlan-name> <mac-address> <port-list> no ipv6 neighbor <ipv6-address> <vlan-name> <port-list> Parameter Description <ipv6-address>...
  • Page 625: Ipv6 Route

    OMMANDS ROUTE ipv6 route Overview This command adds a static IPv6 route to the Routing Information Base (RIB). If this route is the best route for the destination, then your device adds it to the Forwarding Information Base (FIB). Your device uses the FIB to advertise routes to neighbors and forward packets.
  • Page 626: Ipv6 Unreachables

    OMMANDS UNREACHABLES ipv6 unreachables Overview Use this command to enable ICMPv6 (Internet Control Message Protocol version 6) type 1, destination unreachable, messages. Use the no variant of this command to disable destination unreachable messages. This prevents an attacker from using these messages to discover the topology of a network.
  • Page 627: Ping Ipv6

    OMMANDS PING IPV ping ipv6 Overview This command sends a query to another IPv6 host (send Echo Request messages). ping ipv6 {<host>|<ipv6-address>} [repeat Syntax {<1-2147483647>|continuous}] [size <10-1452>] [interface <interface-list>] [timeout <1-65535>] Parameter Description <ipv6-addr> The destination IPv6 address. The IPv6 address uses the format X:X::X:X.
  • Page 628: Show Ipv6 Interface Brief

    OMMANDS SHOW IPV INTERFACE BRIEF show ipv6 interface brief Overview Use this command to display brief information about interfaces and the IPv6 address assigned to them. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 629: Show Ipv6 Neighbors

    OMMANDS SHOW IPV NEIGHBORS show ipv6 neighbors Overview Use this command to display all IPv6 neighbors. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide. Syntax show ipv6 neighbors Mode User Exec and Privileged Exec 613-50157-01 Rev C...
  • Page 630: Show Ipv6 Route

    OMMANDS SHOW IPV ROUTE show ipv6 route Overview Use this command to display the IPv6 routing table for a protocol or from a particular table. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 631 OMMANDS SHOW IPV ROUTE Example 2 To display all database entries for an IP route, use the following command: awplus# show ipv6 route database Output Figure 19-3: Example output of the show ipv6 route database command  IPv6 Routing Table Codes: C - connected, S - static, R - RIP, O - OSPF, B - BGP...
  • Page 632: Show Ipv6 Route Summary

    OMMANDS SHOW IPV ROUTE SUMMARY show ipv6 route summary Overview Use this command to display the summary of the current NSM RIB entries. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 633: Traceroute Ipv6

    OMMANDS TRACEROUTE IPV traceroute ipv6 Overview Use this command to trace the route to the specified IPv6 host. traceroute ipv6 {<ipv6-addr>|<hostname>} Syntax Parameter Description <ipv6-addr> The destination IPv6 address. The IPv6 address uses the format X:X::X:X. <hostname> The destination hostname. Mode User Exec and Privileged Exec Example...
  • Page 634: Routing Commands

    Routing Commands Introduction Overview This chapter provides an alphabetical reference of routing commands that are common across the routing IP protocols. For more information, see the Route Selection Feature Overview and Configuration Guide. Command List • “ip route” on page 635 •...
  • Page 635: Ip Route

    OUTING OMMANDS IP ROUTE ip route Overview This command adds a static route to the Routing Information Base (RIB). If this route is the best route for the destination, then your device adds it to the Forwarding Information Base (FIB). Your device uses the FIB to advertise routes to neighbors and forward packets.
  • Page 636 OUTING OMMANDS IP ROUTE Examples To add the destination 192.168.3.0 with the mask 255.255.255.0 as a static route available through the device at “10.10.0.2” with the default administrative distance, use the commands: awplus# configure terminal awplus(config)# ip route 192.168.3.0 255.255.255.0 10.10.0.2 To remove the destination 192.168.3.0 with the mask 255.255.255.0 as a static route available through the device at “10.10.0.2”...
  • Page 637: Ipv6 Route

    OUTING OMMANDS ROUTE ipv6 route Overview This command adds a static IPv6 route to the Routing Information Base (RIB). If this route is the best route for the destination, then your device adds it to the Forwarding Information Base (FIB). Your device uses the FIB to advertise routes to neighbors and forward packets.
  • Page 638: Maximum-Paths

    OUTING OMMANDS MAXIMUM PATHS maximum-paths Overview This command enables ECMP on your device, and sets the maximum number of paths that each route has in the Forwarding Information Base (FIB). ECMP is enabled by default. The no variant of this command sets the maximum paths to the default of 4. Syntax maximum-paths <1-8>...
  • Page 639: Show Ip Route

    OUTING OMMANDS SHOW IP ROUTE show ip route Overview Use this command to display routing entries in the FIB (Forwarding Information Base). The FIB contains the best routes to a destination, and your device uses these routes when forwarding traffic. You can display a subset of the entries in the FIB based on protocol.
  • Page 640 OUTING OMMANDS SHOW IP ROUTE Figure 20-1: Example output from the show ip route command Codes: C - connected, S - static, R - RIP, B - BGP O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2...
  • Page 641: Show Ip Route Database

    OUTING OMMANDS SHOW IP ROUTE DATABASE show ip route database Overview This command displays the routing entries in the RIB (Routing Information Base). When multiple entries are available for the same prefix, RIB uses the routes’ administrative distances to choose the best route. All best routes are entered into the FIB (Forwarding Information Base).
  • Page 642: Show Ip Route Summary

    OUTING OMMANDS SHOW IP ROUTE SUMMARY show ip route summary Overview This command displays a summary of the current RIB (Routing Information Base) entries. To modify the lines displayed, use the | (output modifier token); to save the output to a file, use the > output redirection token. Syntax show ip route summary Mode...
  • Page 643: Show Ipv6 Route

    OUTING OMMANDS SHOW IPV ROUTE show ipv6 route Overview Use this command to display the IPv6 routing table for a protocol or from a particular table. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 644 OUTING OMMANDS SHOW IPV ROUTE Example 2 To display all database entries for an IP route, use the following command: awplus# show ipv6 route database Output Figure 20-5: Example output of the show ipv6 route database command  IPv6 Routing Table Codes: C - connected, S - static, R - RIP, O - OSPF, B - BGP...
  • Page 645: Show Ipv6 Route Summary

    OUTING OMMANDS SHOW IPV ROUTE SUMMARY show ipv6 route summary Overview Use this command to display the summary of the current NSM RIB entries. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 646: Rip Commands

    RIP Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure RIP. For information about configuring RIP, see the RIP Feature Overview and Configuration Guide. Command List • “accept-lifetime” on page 648 • “alliedware-behavior” on page 650 •...
  • Page 647 RIP C OMMANDS • “ip rip split-horizon” on page 674 • “key” on page 675 • “key chain” on page 676 • “key-string” on page 677 • “maximum-prefix” on page 678 • “neighbor (RIP)” on page 679 • “network (RIP)” on page 680 •...
  • Page 648: Accept-Lifetime

    RIP C OMMANDS ACCEPT LIFETIME accept-lifetime Overview Use this command to specify the time period during which the authentication key on a key chain is received as valid. Use the no variant of this command to remove a specified time period for an authentication key on a key chain as set previously with the accept-lifetime command.
  • Page 649 RIP C OMMANDS ACCEPT LIFETIME awplus# configure terminal awplus(config)# key chain mychain awplus(config-keychain)# key 1 awplus(config-keychain-key)# accept-lifetime 03:03:01 3 Sep 2016 04:04:02 6 Oct 2016 Related Commands key-string key chain send-lifetime 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 650: Alliedware-Behavior

    RIP C OMMANDS ALLIEDWARE BEHAVIOR alliedware-behavior Overview This command configures your device to exhibit AlliedWare behavior when sending RIPv1 response/update messages. Configuring for this behavior may be necessary if you are replacing an AlliedWare device with an AlliedWare Plus device and wish to ensure consistent RIPv1 behavior.
  • Page 651 RIP C OMMANDS ALLIEDWARE BEHAVIOR To return your device to AlliedWare Plus-like behavior when sending and receiving RIPv1 update messages, enter the commands: awplus# configure terminal awplus(config)# router rip awplus(config-router)# no alliedware-behavior rip1-send awplus(config-router)# no alliedware-behavior rip1-recv Validation show ip protocols rip Commands show running-config Related...
  • Page 652: Cisco-Metric-Behavior (Rip)

    RIP C OMMANDS (RIP) CISCO METRIC BEHAVIOR cisco-metric-behavior (RIP) Overview Use this command to enable or disable the RIP routing metric update to conform to Cisco’s implementation. This command is provided to allow inter-operation with older Cisco devices that do not conform to the RFC standard for RIP route metrics.
  • Page 653: Clear Ip Rip Route

    RIP C OMMANDS CLEAR IP RIP ROUTE clear ip rip route Overview Use this command to clear specific data from the RIP routing table. Parameter Description <ip-dest-network/ Removes entries which exactly match this destination prefix-length> address from RIP routing table. Enter the IP address and prefix length of the destination network.
  • Page 654: Debug Rip

    RIP C OMMANDS DEBUG RIP debug rip Overview Use this command to specify the options for the displayed debugging information for RIP events and RIP packets. Use the no variant of this command to disable the specified debug option. Syntax debug rip {events|nsm|<packet>|all} no debug rip {events|nsm|<packet>|all} Parameter...
  • Page 655: Default-Information Originate (Rip)

    RIP C OMMANDS (RIP) DEFAULT INFORMATION ORIGINATE default-information originate (RIP) Overview Use this command to generate a default route into the Routing Information Protocol (RIP). Use the no variant of this command to disable this feature. Syntax default-information originate no default-information originate Default Disabled Mode...
  • Page 656: Default-Metric (Rip)

    RIP C OMMANDS (RIP) DEFAULT METRIC default-metric (RIP) Overview Use this command to specify the metrics to be assigned to redistributed RIP routes. Use the no variant of this command to reset the RIP metric back to its default (1). Syntax default-metric <metric>...
  • Page 657: Distance (Rip)

    RIP C OMMANDS (RIP) DISTANCE distance (RIP) Overview This command sets the administrative distance for RIP routes. Your device uses this value to select between two or more routes to the same destination obtained from two different routing protocols. The route with the smallest administrative distance value is added to the Forwarding Information Base (FIB).
  • Page 658: Distribute-List (Rip)

    RIP C OMMANDS (RIP) DISTRIBUTE LIST distribute-list (RIP) Overview Use this command to filter incoming or outgoing route updates using the access-list or the prefix-list. Use the no variant of this command to disable this feature. Syntax distribute-list {<access-list> | prefix <prefix-list>} {in|out} [<interface>] no distribute-list {<access-list>...
  • Page 659: Fullupdate (Rip)

    RIP C OMMANDS (RIP) FULLUPDATE fullupdate (RIP) Overview Use this command to specify which routes RIP should advertise when performing a triggered update. By default, when a triggered update is sent, RIP will only advertise those routes that have changed since the last update. When fullupdate is configured, the device advertises the full RIP route table in outgoing triggered updates, including routes that have not changed.
  • Page 660: Ip Rip Authentication Key-Chain

    RIP C OMMANDS IP RIP AUTHENTICATION KEY CHAIN ip rip authentication key-chain Overview Use this command to enable RIPv2 authentication on an interface and specify the name of the key chain to be used. Use the no variant of this command to disable this function. Syntax ip rip authentication key-chain <key-chain-name>...
  • Page 661 RIP C OMMANDS IP RIP AUTHENTICATION KEY CHAIN Specify the mode of authentication for the given interface (text or MD5), using the following command: awplus(config-if)# ip rip authentication mode {md5|text} Example In the following example of a configuration for multiple keys authentication, a password “toyota”...
  • Page 662: Ip Rip Authentication Mode

    RIP C OMMANDS IP RIP AUTHENTICATION MODE ip rip authentication mode Overview Use this command to specify the type of authentication mode used for RIP v2 packets. Use the no variant of this command to restore clear text authentication. Syntax ip rip authentication mode {md5|text} no ip rip authentication mode Parameter...
  • Page 663 RIP C OMMANDS IP RIP AUTHENTICATION MODE Usage: multiple For multiple keys authentication, use the following steps to configure a route to enable RIPv2 authentication using multiple keys at different times: Define a key chain with a key chain name, using the following commands: awplus# configure terminal awplus(config)#...
  • Page 664 RIP C OMMANDS IP RIP AUTHENTICATION MODE Example 3 The following example specifies “mykey” as the authentication string with MD5 authentication, for the VLAN interface vlan2: awplus# configure terminal awplus(config)# interface vlan2 awplus(config-if)# ip rip authentication string mykey awplus(config-if)# ip rip authentication mode md5 Related ip rip authentication string Commands...
  • Page 665: Ip Rip Authentication String

    RIP C OMMANDS IP RIP AUTHENTICATION STRING ip rip authentication string Overview Use this command to specify the authentication string or password used by a key. Use the no variant of this command to remove the authentication string. Syntax ip rip authentication string <auth-string> no ip rip authentication string Parameter Description...
  • Page 666 RIP C OMMANDS IP RIP AUTHENTICATION STRING In the following example, the VLAN interface vlan2 is configured to have an Example authentication string as guest. Any received RIP packet in that interface should have the same string as password. awplus# configure terminal awplus(config)# interface vlan2...
  • Page 667: Ip Rip Receive-Packet

    RIP C OMMANDS IP RIP RECEIVE PACKET ip rip receive-packet Overview Use this command to configure the interface to enable the reception of RIP packets. Use the no variant of this command to disable this feature. Syntax ip rip receive-packet no ip rip receive-packet Default Receive-packet is enabled...
  • Page 668: Ip Rip Receive Version

    RIP C OMMANDS IP RIP RECEIVE VERSION ip rip receive version Overview Use this command to specify the version of RIP packets accepted on an interface and override the setting of the version command. Use the no variant of this command to use the setting specified by the version (RIP) command.
  • Page 669: Ip Rip Send-Packet

    RIP C OMMANDS IP RIP SEND PACKET ip rip send-packet Overview Use this command to enable sending RIP packets through the current interface. Use the no variant of this command to disable this feature. Syntax ip rip send-packet no ip rip send-packet Default Send packet is enabled Mode...
  • Page 670: Ip Rip Send Version

    RIP C OMMANDS IP RIP SEND VERSION ip rip send version Overview Use this command in Interface Configuration mode to specify the version of RIP packets sent on an interface and override the setting of the version (RIP) command. This mechanism causes RIP version 2 interfaces to send multicast packets instead of broadcasting packets.
  • Page 671 RIP C OMMANDS IP RIP SEND VERSION In the following example, the VLAN interface vlan4 is configured to send both RIP version 2 and 1 packets. awplus# configure terminal awplus(config)# interface vlan4 awplus(config-if)# ip rip send version 2 1 In the following example, the VLAN interface vlan4 is configured to send RIP version 1 packets only.
  • Page 672: Ip Rip Send Version 1-Compatible

    RIP C OMMANDS IP RIP SEND VERSION COMPATIBLE ip rip send version 1-compatible Overview Use this command in Interface Configuration mode to send RIP version 1 compatible packets from a RIP version 2 interfaces to other RIP Interfaces. This mechanism causes RIP version 2 interfaces to send broadcast packets instead of multicasting packets, and is used in environments where multicast is not enabled or where hosts do not listen to multicast.
  • Page 673 RIP C OMMANDS IP RIP SEND VERSION COMPATIBLE Related ip rip send version Commands version (RIP) 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 674: Ip Rip Split-Horizon

    RIP C OMMANDS IP RIP SPLIT HORIZON ip rip split-horizon Overview Use this command to turn on the split-horizon mechanism on the interface. Use the no variant of this command to disable this mechanism. Syntax ip rip split-horizon [poisoned] no ip rip split-horizon Parameter Description poisoned...
  • Page 675: Key

    RIP C OMMANDS Overview Use this command to manage, add and delete authentication keys in a key-chain. Use the no variant of this command to delete the authentication key. Syntax key <keyid> no key <keyid> Parameter Description <keyid> <0-2147483647> Key identifier number. Mode Keychain Configuration Usage...
  • Page 676: Key Chain

    RIP C OMMANDS KEY CHAIN key chain Overview Use this command to enter the key chain management mode and to configure a key chain with a key chain name. Use the no variant of this command to remove the key chain and all configured keys.
  • Page 677: Key-String

    RIP C OMMANDS STRING key-string Overview Use this command to define the password to be used by a key. Use the no variant of this command to remove a password. Syntax key-string <key-password> no key-string Parameter Description <key-password> A string of characters to be used as a password by the key. Mode Keychain-key Configuration Usage...
  • Page 678: Maximum-Prefix

    RIP C OMMANDS MAXIMUM PREFIX maximum-prefix Overview Use this command to configure the maximum number of RIP routes stored in the routing table. Use the no variant of this command to disable all limiting of the number of RIP routes stored in the routing table. Syntax maximum-prefix <maxprefix>...
  • Page 679: Neighbor (Rip)

    RIP C OMMANDS (RIP) NEIGHBOR neighbor (RIP) Overview Use this command to specify a neighbor router. It is used for each router to which you wish to send unicast RIP updates. Use the no variant of this command to stop sending unicast updates to the specific router.
  • Page 680: Network (Rip)

    RIP C OMMANDS (RIP) NETWORK network (RIP) Overview Use this command to activate the transmission of RIP routing information on the defined network. Use the no variant of this command to remove the specified network or VLAN as one that runs RIP. Syntax network {<network-address>[/<subnet-mask>]|<vlan-name>} no network {<network-address>[/<subnet-mask>]|<vlan-name>}...
  • Page 681: Offset-List (Rip)

    RIP C OMMANDS (RIP) OFFSET LIST offset-list (RIP) Overview Use this command to add an offset to the in and out metrics of routes learned through RIP. Use the no variant of this command to remove the offset list. Syntax offset-list <access-list>...
  • Page 682: Passive-Interface (Rip)

    RIP C OMMANDS (RIP) PASSIVE INTERFACE passive-interface (RIP) Overview Use this command to block RIP broadcasts on the interface. Use the no variant of this command to disable this function. Syntax passive-interface <interface> no passive-interface <interface> Parameter Description <interface> Specifies the interface name. Default Disabled Mode...
  • Page 683: Recv-Buffer-Size (Rip)

    RIP C OMMANDS (RIP) RECV BUFFER SIZE recv-buffer-size (RIP) Overview Use this command to run-time configure the RIP UDP (User Datagram Protocol) receive-buffer size to improve UDP reliability by avoiding UDP receive buffer overrun. Use the no variant of this command to reset the configured RIP UDP receive-buffer size to the system default (196608 bits).
  • Page 684: Redistribute (Rip)

    RIP C OMMANDS (RIP) REDISTRIBUTE redistribute (RIP) Overview Use this command to redistribute information from other routing protocols into RIP. Use the no variant of this command to disable the specified redistribution. The parameters metric and routemap may be used on this command, but have no effect.
  • Page 685: Restart Rip Graceful

    RIP C OMMANDS RESTART RIP GRACEFUL restart rip graceful Overview Use this command to force the RIP process to restart, and optionally set the grace-period. restart rip graceful [grace-period <1-65535>] Syntax Mode Privileged Exec Default The default RIP grace-period is 60 seconds. Usage After this command is executed, the RIP process immediately shuts down.
  • Page 686: Rip Restart Grace-Period

    RIP C OMMANDS RIP RESTART GRACE PERIOD rip restart grace-period Overview Use this command to change the grace period of RIP graceful restart. Use the no variant of this command to disable this function. Syntax rip restart grace-period <1-65535> no rip restart grace-period <1-65535> Mode Global Configuration Default...
  • Page 687: Route (Rip)

    RIP C OMMANDS (RIP) ROUTE route (RIP) Overview Use this command to add a static RIP route. Use the no variant of this command to remove a static RIP route. Syntax route <ip-addr/prefix-length> no route <ip-addr/prefix-length> Parameter Description <ip-addr/prefix-length> The IPv4 address and prefix length. Default No static RIP route is added by default.
  • Page 688: Router Rip

    RIP C OMMANDS ROUTER RIP router rip Overview Use this global command to enter Router Configuration mode to enable the RIP routing process. Use the no variant of this command to disable the RIP routing process. Syntax router rip no router rip Mode Global Configuration Example...
  • Page 689: Send-Lifetime

    RIP C OMMANDS SEND LIFETIME send-lifetime Overview Use this command to specify the time period during which the authentication key on a key chain can be sent. send-lifetime <start-date> {<end-date>| Syntax duration <seconds>|infinite} no send-lifetime Parameter Description Specifies the start time and date in the format:  <start-date>...
  • Page 690 RIP C OMMANDS SEND LIFETIME Related Commands key-string key chain accept-lifetime 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 691: Show Debugging Rip

    RIP C OMMANDS SHOW DEBUGGING RIP show debugging rip Overview Use this command to display the RIP debugging status for these debugging options: nsm debugging, RIP event debugging, RIP packet debugging and RIP nsm debugging. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 692: Show Ip Protocols Rip

    RIP C OMMANDS SHOW IP PROTOCOLS RIP show ip protocols rip Overview Use this command to display RIP process parameters and statistics. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 693: Show Ip Rip

    RIP C OMMANDS SHOW IP RIP show ip rip Overview Use this command to show RIP routes. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide. Syntax show ip rip Mode User Exec and Privileged Exec awplus#...
  • Page 694: Show Ip Rip Database

    RIP C OMMANDS SHOW IP RIP DATABASE show ip rip database Overview Use this command to display information about the RIP database. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 695: Show Ip Rip Interface

    RIP C OMMANDS SHOW IP RIP INTERFACE show ip rip interface Overview Use this command to display information about the RIP interfaces. You can specify an interface name to display information about a specific interface. show ip rip interface [<interface>] Syntax Parameter Description...
  • Page 696: Timers (Rip)

    RIP C OMMANDS (RIP) TIMERS timers (RIP) Overview Use this command to adjust routing network timers. Use the no variant of this command to restore the defaults. Syntax timers basic <update> <timeout> <garbage> no timers basic Parameter Description <update> <5-2147483647> Specifies the period at which RIP route update packets are transmitted.
  • Page 697: Undebug Rip

    RIP C OMMANDS UNDEBUG RIP undebug rip Overview Use this command to disable the options set for debugging information of RIP events, packets and communication between RIP and NSM. This command has the same effect as the no debug rip command. Syntax undebug rip {all|events|nsm|<packet>} Parameter...
  • Page 698: Version (Rip)

    RIP C OMMANDS (RIP) VERSION version (RIP) Overview Use this command to specify a RIP version used globally by the router. Use the no variant of this command to restore the default version. Syntax version {1|2} no version Parameter Description Specifies the version of RIP processing.
  • Page 699: Multicast Applications

    Part 4: Multicast Applications 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 700: Igmp Snooping Commands

    IGMP Snooping Commands Introduction Overview Devices running AlliedWare Plus use IGMP (Internet Group Management Protocol) and MLD (Multicast Listener Discovery) to track which multicast groups their clients belong to. This enables them to send the correct multimedia streams to the correct destinations.
  • Page 701 IGMP S NOOPING OMMANDS • “show ip igmp groups” on page 723 • “show ip igmp interface” on page 725 • “show ip igmp snooping mrouter” on page 727 • “show ip igmp snooping routermode” on page 728 • “show ip igmp snooping statistics”...
  • Page 702: Clear Ip Igmp

    IGMP S NOOPING OMMANDS CLEAR IP IGMP clear ip igmp Overview Use this command to clear all IGMP group membership records on all interfaces. clear ip igmp Syntax Mode Privileged Exec awplus# clear ip igmp Example Related clear ip igmp group Commands clear ip igmp interface show ip igmp interface...
  • Page 703: Clear Ip Igmp Group

    IGMP S NOOPING OMMANDS CLEAR IP IGMP GROUP clear ip igmp group Overview Use this command to clear IGMP group membership records for a specific group on either all interfaces, a single interface, or for a range of interfaces. clear ip igmp group * Syntax clear ip igmp group <ip-address>...
  • Page 704: Clear Ip Igmp Interface

    IGMP S NOOPING OMMANDS CLEAR IP IGMP INTERFACE clear ip igmp interface Overview Use this command to clear IGMP group membership records on a particular interface. clear ip igmp interface <interface> Syntax Parameter Description <interface> Specifies the name of the interface. All groups learned on this interface are deleted.
  • Page 705: Debug Igmp

    IGMP S NOOPING OMMANDS DEBUG IGMP debug igmp Overview Use this command to enable debugging of either all IGMP or a specific component of IGMP. Use the no variant of this command to disable all IGMP debugging, or debugging of a specific component of IGMP. Syntax debug igmp {all|decode|encode|events|fsm|tib} no debug igmp {all|decode|encode|events|fsm|tib}...
  • Page 706: Ip Igmp Flood Specific-Query

    IGMP S NOOPING OMMANDS IP IGMP FLOOD SPECIFIC QUERY ip igmp flood specific-query Overview Use this command if you want IGMP to flood specific queries to all VLAN member ports, instead of only sending the queries to multicast group member ports. Use the no variant of this command if you want IGMP to only send the queries to multicast group member ports.
  • Page 707: Ip Igmp Maximum-Groups

    IGMP S NOOPING OMMANDS IP IGMP MAXIMUM GROUPS ip igmp maximum-groups Overview Use this command to set a limit, per switch port, on the number of IGMP groups clients can join. This stops a single client from using all the switch’s available group-entry resources, and ensures that clients on all ports have a chance to join IGMP groups.
  • Page 708 IGMP S NOOPING OMMANDS IP IGMP MAXIMUM GROUPS Example To limit clients to 10 groups on port 1.0.1, which is in vlan1, use the commands: awplus# configure terminal awplus(config)# interface port1.0.1 awplus(config-if)# ip igmp maximum-groups 10 awplus(config-if)# exit awplus(config)# interface vlan1 awplus(config-if)# ip igmp snooping fast-leave Related...
  • Page 709: Ip Igmp Snooping

    IGMP S NOOPING OMMANDS IP IGMP SNOOPING ip igmp snooping Overview Use this command to enable IGMP Snooping. When this command is used in the Global Configuration mode, IGMP Snooping is enabled at the device level. When this command is used in Interface Configuration mode, IGMP Snooping is enabled for the specified VLANs.
  • Page 710: Ip Igmp Snooping Fast-Leave

    IGMP S NOOPING OMMANDS IP IGMP SNOOPING FAST LEAVE ip igmp snooping fast-leave Overview Use this command to enable IGMP Snooping fast-leave processing. Fast-leave processing is analogous to immediate-leave processing. The IGMP group-membership entry is removed as soon as an IGMP leave group message is received, without sending out a group-specific query.
  • Page 711: Ip Igmp Snooping Mrouter

    IGMP S NOOPING OMMANDS IP IGMP SNOOPING MROUTER ip igmp snooping mrouter Overview Use this command to statically configure the specified port as a multicast router port for IGMP Snooping for an interface. This command applies to interfaces configured for IGMP Snooping. Use the no variant of this command to remove the static configuration of the port as a multicast router port.
  • Page 712: Ip Igmp Snooping Querier

    IGMP S NOOPING OMMANDS IP IGMP SNOOPING QUERIER ip igmp snooping querier Overview Use this command to enable IGMP querier operation when no multicast routing protocol is configured. When enabled, the IGMP Snooping querier sends out periodic IGMP queries for all interfaces. This command applies to interfaces configured for IGMP Snooping.
  • Page 713: Ip Igmp Snooping Report-Suppression

    IGMP S NOOPING OMMANDS IP IGMP SNOOPING REPORT SUPPRESSION ip igmp snooping report-suppression Overview Use this command to enable report suppression for IGMP versions 1 and 2. This command applies to interfaces configured for IGMP Snooping. Report suppression stops reports being sent to an upstream multicast router port when there are already downstream ports for this group on this interface.
  • Page 714: Ip Igmp Snooping Routermode

    IGMP S NOOPING OMMANDS IP IGMP SNOOPING ROUTERMODE ip igmp snooping routermode Overview Use this command to set the destination IP addresses as router multicast addresses. Use the no variant of this command to set it to the default. You can also remove a specified IP address from a custom list of multicast addresses.
  • Page 715 IGMP S NOOPING OMMANDS IP IGMP SNOOPING ROUTERMODE Examples To set ip igmp snooping routermode for all default reserved addresses enter: awplus(config)# ip igmp snooping routermode default To remove the multicast address 224.0.0.5 from the custom list of multicast addresses enter: awplus(config)# no ip igmp snooping routermode address 224.0.0.5...
  • Page 716: Ip Igmp Snooping Tcn Query Solicit

    IGMP S NOOPING OMMANDS IP IGMP SNOOPING TCN QUERY SOLICIT ip igmp snooping tcn query solicit Overview Use this command to enable IGMP (Internet Group Management Protocol) Snooping TCN (Topology Change Notification) Query Solicitation feature. When this command is used in the Global Configuration mode, Query Solicitation is enabled.
  • Page 717 IGMP S NOOPING OMMANDS IP IGMP SNOOPING TCN QUERY SOLICIT Command issued from Command issued Device is STP Root Global from Interface Bridge or the IGMP Query Solicit Configuration Configuration EPSR Master Node message sent on VLAN See the IGMP Feature Overview and Configuration Guide for introductory information about the Query Solicitation feature.
  • Page 718: Ip Igmp Static-Group

    IGMP S NOOPING OMMANDS IP IGMP STATIC GROUP ip igmp static-group Overview Use this command to statically configure multicast group membership entries on a VLAN interface, or to statically forward a multicast channel out a particular port or port range. To statically add only a group membership, do not specify any parameters.
  • Page 719 IGMP S NOOPING OMMANDS IP IGMP STATIC GROUP Example The following example show how to statically add group and source records for IGMP on vlan3: awplus# configure terminal awplus(config)# interface vlan3 awplus(config-if)# ip igmp awplus(config-if)# ip igmp static-group 226.1.2.4 source 10.2.3.4 613-50157-01 Rev C Command Reference for FS980M Series...
  • Page 720: Ip Igmp Trusted

    IGMP S NOOPING OMMANDS IP IGMP TRUSTED ip igmp trusted Overview Use this command to allow IGMP to process packets received on certain trusted ports only. Use the no variant of this command to stop IGMP from processing specified packets if the packets are received on the specified ports or aggregator. Syntax ip igmp trusted {all|query|report|routermode} no ip igmp trusted {all|query|report|routermode}...
  • Page 721: Ip Igmp Version

    IGMP S NOOPING OMMANDS IP IGMP VERSION ip igmp version Overview Use this command to set the current IGMP version (IGMP version 1, 2 or 3) on an interface. Use the no variant of this command to return to the default version. Syntax ip igmp version <1-3>...
  • Page 722: Show Debugging Igmp

    IGMP S NOOPING OMMANDS SHOW DEBUGGING IGMP show debugging igmp Overview Use this command to display the IGMP debugging options set. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 723: Show Ip Igmp Groups

    IGMP S NOOPING OMMANDS SHOW IP IGMP GROUPS show ip igmp groups Overview Use this command to display the multicast groups with receivers directly connected to the router, and learned through IGMP. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 724 IGMP S NOOPING OMMANDS SHOW IP IGMP GROUPS Table 1: Parameters in the output of the show ip igmp groups command (cont.) Parameter Description Expires Time (in hours, minutes, and seconds) until the entry expires. Last Last host to report being a member of the multicast group. Reporter 613-50157-01 Rev C Command Reference for FS980M Series...
  • Page 725: Show Ip Igmp Interface

    IGMP S NOOPING OMMANDS SHOW IP IGMP INTERFACE show ip igmp interface Overview Use this command to display the state of IGMP Snooping for a specified VLAN, or all VLANs. IGMP is shown as Active or Disabled in the show output. You can also display the number of groups a switch port belongs to.
  • Page 726 IGMP S NOOPING OMMANDS SHOW IP IGMP INTERFACE awplus#show ip igmp interface vlan2 Interface vlan2 (Index 202) IGMP Disabled, Inactive, Version 3 (default) IGMP interface has 0 group-record states IGMP activity: 0 joins, 0 leaves IGMP robustness variable is 2 IGMP last member query count is 2...
  • Page 727: Show Ip Igmp Snooping Mrouter

    IGMP S NOOPING OMMANDS SHOW IP IGMP SNOOPING MROUTER show ip igmp snooping mrouter Overview Use this command to display the multicast router ports, both static and dynamic, in a VLAN. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 728: Show Ip Igmp Snooping Routermode

    IGMP S NOOPING OMMANDS SHOW IP IGMP SNOOPING ROUTERMODE show ip igmp snooping routermode Overview Use this command to display the current routermode and the list of IP addresses set as router multicast addresses from the ip igmp snooping routermode command.
  • Page 729: Show Ip Igmp Snooping Statistics

    IGMP S NOOPING OMMANDS SHOW IP IGMP SNOOPING STATISTICS show ip igmp snooping statistics Overview Use this command to display IGMP Snooping statistics data. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 730 IGMP S NOOPING OMMANDS SHOW IP IGMP SNOOPING STATISTICS Figure 22-7: Example output from the show ip igmp snooping statistics command for a switch port awplus#show ip igmp interface port1.0.1 IGMP information for port1.0.1 Maximum groups limit set: 10 Number of groups port belongs to: 0 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 731: Undebug Igmp

    IGMP S NOOPING OMMANDS UNDEBUG IGMP undebug igmp Overview This command applies the functionality of the no debug igmp command. 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 732: Mld Snooping Commands

    MLD Snooping Commands Introduction Overview This chapter provides an alphabetical reference of configuration, clear, and show commands related to MLD Snooping. Command List • “clear ipv6 mld” on page 733 • “clear ipv6 mld group” on page 734 • “clear ipv6 mld interface”...
  • Page 733: Clear Ipv6 Mld

    MLD S NOOPING OMMANDS CLEAR IPV clear ipv6 mld Overview Use this command to clear all MLD local memberships on all interfaces. clear ipv6 mld Syntax Mode Privileged Exec awplus# clear ipv6 mld Example Related clear ipv6 mld group Commands clear ipv6 mld interface 613-50157-01 Rev C Command Reference for FS980M Series...
  • Page 734: Clear Ipv6 Mld Group

    MLD S NOOPING OMMANDS CLEAR IPV MLD GROUP clear ipv6 mld group Overview Use this command to clear MLD specific local-membership(s) on all interfaces, for a particular group. clear ipv6 mld group {*|<ipv6-address>} Syntax Parameter Description Clears all groups on all interfaces. This is an alias to the clear ipv6 mld command.
  • Page 735: Clear Ipv6 Mld Interface

    MLD S NOOPING OMMANDS CLEAR IPV MLD INTERFACE clear ipv6 mld interface Overview Use this command to clear MLD interface entries. clear ipv6 mld interface <interface> Syntax Parameter Description <interface> Specifies name of the interface; all groups learned from this interface are deleted.
  • Page 736: Debug Mld

    MLD S NOOPING OMMANDS DEBUG MLD debug mld Overview Use this command to enable all MLD debugging modes, or a specific MLD debugging mode. Use the no variant of this command to disable all MLD debugging modes, or a specific MLD debugging mode. Syntax debug mld {all|decode|encode|events|fsm|tib} no debug mld {all|decode|encode|events|fsm|tib}...
  • Page 737: Ipv6 Mld Access-Group

    MLD S NOOPING OMMANDS MLD ACCESS GROUP ipv6 mld access-group Overview Use this command to control the multicast local-membership groups learned on an interface. Use the no variant of this command to disable this access control. Syntax ipv6 mld access-group <IPv6-access-list-name> no ipv6 mld access-group Parameter Description...
  • Page 738: Ipv6 Mld Immediate-Leave

    MLD S NOOPING OMMANDS MLD IMMEDIATE LEAVE ipv6 mld immediate-leave Overview Use this command to minimize the leave latency of MLD memberships. Use the no variant of this command to disable this feature. Syntax ipv6 mld immediate-leave group-list <IPv6-access-list-name> no ipv6 mld immediate-leave Parameter Description <IPv6-access-...
  • Page 739: Ipv6 Mld Limit

    MLD S NOOPING OMMANDS MLD LIMIT ipv6 mld limit Overview Use this command to configure a limit on the maximum number of group memberships that may be learned. The limit may be set for the device as a whole, or for a specific interface. Once the specified group membership limit is reached, all further local-memberships will be ignored.
  • Page 740 MLD S NOOPING OMMANDS MLD LIMIT The following example configures an MLD limit of 100 group-membership states on the VLAN interface vlan2: awplus# configure terminal awplus(config)# ipv6 forwarding awplus(config)# ipv6 multicast-routing awplus(config)# interface vlan2 awplus(config-if)# ipv6 enable awplus(config-if)# ipv6 mld limit 100 The following example configures an MLD limit of 100 group-membership states on the VLAN interfaces vlan2-vlan4: awplus#...
  • Page 741: Ipv6 Mld Snooping

    MLD S NOOPING OMMANDS MLD SNOOPING ipv6 mld snooping Overview Use this command to enable MLD Snooping. When this command is issued in the Global Configuration mode, MLD Snooping is enabled globally for the device. When this command is issued in Interface mode for a VLAN then MLD Snooping is enabled for the specified VLAN.
  • Page 742 MLD S NOOPING OMMANDS MLD SNOOPING To configure MLD Snooping on the VLAN interfaces vlan2-vlan4, enter the following commands: awplus# configure terminal awplus(config)# interface vlan2-vlan4 awplus(config-if)# ipv6 mld snooping To disable MLD Snooping for the VLAN interface vlan2, enter the following commands: awplus# configure terminal...
  • Page 743: Ipv6 Mld Snooping Fast-Leave

    MLD S NOOPING OMMANDS MLD SNOOPING FAST LEAVE ipv6 mld snooping fast-leave Overview Use this command to enable MLD Snooping fast-leave processing. Fast-leave processing is analogous to immediate-leave processing; the MLD group-membership is removed as soon as an MLD leave group message is received, without sending out a group-specific query.
  • Page 744: Ipv6 Mld Snooping Mrouter

    MLD S NOOPING OMMANDS MLD SNOOPING MROUTER ipv6 mld snooping mrouter Overview Use this command to statically configure the specified port as a Multicast Router interface for MLD Snooping within the specified VLAN. See detailed usage notes below to configure static multicast router ports when using static IPv6 multicast routes with EPSR, and the destination VLAN is an EPSR data VLAN.
  • Page 745 MLD S NOOPING OMMANDS MLD SNOOPING MROUTER Examples This example shows how to specify the next-hop interface to the multicast router for VLAN interface vlan2: awplus# configure terminal awplus(config)# interface vlan2 awplus(config-if)# ipv6 mld snooping mrouter interface port1.0.5 This example shows how to specify the next-hop interface to the multicast router for VLAN interfaces vlan2-vlan4: awplus# configure terminal...
  • Page 746: Ipv6 Mld Snooping Querier

    MLD S NOOPING OMMANDS MLD SNOOPING QUERIER ipv6 mld snooping querier Overview Use this command to enable MLD querier operation on a subnet (VLAN) when no multicast routing protocol is configured in the subnet (VLAN). When enabled, the MLD Snooping querier sends out periodic MLD queries for all interfaces on that VLAN.
  • Page 747: Ipv6 Mld Snooping Report-Suppression

    MLD S NOOPING OMMANDS MLD SNOOPING REPORT SUPPRESSION ipv6 mld snooping report-suppression Overview Use this command to enable report suppression from hosts for Multicast Listener Discovery version 1 (MLDv1) on a VLAN in Interface Configuration mode. Use the no variant of this command to disable report suppression on a VLAN in Interface Configuration mode.
  • Page 748 MLD S NOOPING OMMANDS MLD SNOOPING REPORT SUPPRESSION This example shows how to disable report suppression for MLD reports on VLAN interfaces vlan2-vlan4: awplus# configure terminal awplus(config)# interface vlan2-vlan4 awplus(config-if)# no ipv6 mld snooping report-suppression 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 749: Ipv6 Mld Static-Group

    MLD S NOOPING OMMANDS MLD STATIC GROUP ipv6 mld static-group Overview Use this command to statically configure IPv6 group membership entries on an interface. To statically add only a group membership, do not specify any parameters. Use the no variant of this command to delete static group membership entries. Syntax ipv6 mld static-group <ipv6-group-address>...
  • Page 750 MLD S NOOPING OMMANDS MLD STATIC GROUP To add a static group record on a specific port on vlan2, use the following commands: awplus# configure terminal awplus(config)# interface vlan2 awplus(config-if)# ipv6 mld static-group ff1e::10 interface port1.0.4 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 751: Show Debugging Mld

    MLD S NOOPING OMMANDS SHOW DEBUGGING MLD show debugging mld Overview Use this command to display the MLD debugging modes enabled with the debug command. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 752: Show Ipv6 Mld Groups

    MLD S NOOPING OMMANDS SHOW IPV MLD GROUPS show ipv6 mld groups Overview Use this command to display the multicast groups that have receivers directly connected to the router and learned through MLD. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 753: Show Ipv6 Mld Interface

    MLD S NOOPING OMMANDS SHOW IPV MLD INTERFACE show ipv6 mld interface Overview Use this command to display the state of MLD and MLD Snooping for a specified interface, or all interfaces. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 754: Show Ipv6 Mld Snooping Mrouter

    MLD S NOOPING OMMANDS SHOW IPV MLD SNOOPING MROUTER show ipv6 mld snooping mrouter Overview Use this command to display the multicast router interfaces, both configured and learned, in a VLAN. If you do not specify a VLAN interface then all the VLAN interfaces are displayed.
  • Page 755: Show Ipv6 Mld Snooping Statistics

    MLD S NOOPING OMMANDS SHOW IPV MLD SNOOPING STATISTICS show ipv6 mld snooping statistics Overview Use this command to display MLD Snooping statistics data. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide.
  • Page 756: Part 5: Access And Security

    Part 5: Access and Security 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 757: Ipv4 Hardware Access Control List (Acl) Commands

    IPv4 Hardware Access Control List (ACL) Commands Introduction Overview This chapter provides an alphabetical reference of IPv4 Hardware Access Control List (ACL) commands. It contains detailed command information and command examples about IPv4 hardware ACLs, which you can apply directly to interfaces using the access-group command.
  • Page 758 (ACL) C ARDWARE CCESS ONTROL OMMANDS Table 24-1: IPv4 Hardware Access List Commands and Prompts Command Name Command Mode Prompt awplus# show interface access-group Privileged Exec awplus# show access-list (IPv4 Hardware ACLs) Privileged Exec awplus# show interface access-group Privileged Exec awplus(config)# access-list (numbered hardware ACL for IP Global Configuration...
  • Page 759 (ACL) C ARDWARE CCESS ONTROL OMMANDS • “access-list (numbered hardware ACL for IP protocols)” on page 768 • “access-list (numbered hardware ACL for MAC addresses)” on page 772 • “access-list (numbered hardware ACL for TCP or UDP)” on page 774 •...
  • Page 760: Access-Group

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS GROUP access-group Overview This command adds or removes a hardware-based access-list to or from a switch port interface. The number of hardware numbered and named access-lists that can be added to a switch port interface is determined by the available memory in hardware-based packet classification tables.
  • Page 761 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS GROUP Examples To add the numbered hardware access-list 3005 to switch port interface port1.0.1, enter the following commands: awplus# configure terminal awplus(config)# interface port1.0.1 awplus(config-if)# access-group 3005 To add the named hardware access-list “hw-acl” to switch port interface port1.0.2, enter the following commands: awplus# configure terminal...
  • Page 762: Access-List (Numbered Hardware Acl For Icmp)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ICMP) ACCESS LIST NUMBERED HARDWARE access-list (numbered hardware ACL for ICMP) Overview This command creates an access-list for use with hardware classification. The access-list will match on ICMP packets that have the specified source and destination IP addresses and, optionally, ICMP type.
  • Page 763 (ACL) C ARDWARE CCESS ONTROL OMMANDS ICMP) ACCESS LIST NUMBERED HARDWARE Parameter Description <ip-addr> Match any source IP address within <reverse-mask> the specified subnet. Specify the subnet by entering a reverse mask in dotted decimal format. For example, entering “192.168.1.1 0.0.0.255” is the same as entering 192.168.1.1/24.
  • Page 764 (ACL) C ARDWARE CCESS ONTROL OMMANDS ICMP) ACCESS LIST NUMBERED HARDWARE Mode Global Configuration Default On an interface controlled by a hardware ACL, any traffic that does not explicitly match a filter is permitted. Usage This command creates an ACL for use with hardware classification. Once you have configured the ACL, use the access-group or the...
  • Page 765: Access-List (Numbered Hardware Acl For Ip Packets)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST NUMBERED HARDWARE PACKETS access-list (numbered hardware ACL for IP packets) Overview This command creates an access-list for use with hardware classification. The access-list will match on packets that have the specified source and destination IP addresses.
  • Page 766 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST NUMBERED HARDWARE PACKETS Table 24-2: IP and ICMP parameters in access-list (hardware IP numbered) Parameter Description <ip-addr> Match any source IP address within <reverse-mask> the specified subnet. Specify the subnet by entering a reverse mask in dotted decimal format.
  • Page 767 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST NUMBERED HARDWARE PACKETS Examples To create an access-list that will permit IP packets with a source address of 192.168.1.1 and any destination address, enter the commands: awplus# configure terminal awplus(config)# access-list 3000 permit ip 192.168.1.1/32 any To destroy the access-list with an access-list identity of 3000 enter the following commands: awplus#...
  • Page 768: Access-List (Numbered Hardware Acl For Ip Protocols)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST NUMBERED HARDWARE PROTOCOLS access-list (numbered hardware ACL for IP protocols) Overview This command creates an access-list for use with hardware classification. The access-list will match on packets that have the specified source and destination IP addresses and IP protocol number.
  • Page 769 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST NUMBERED HARDWARE PROTOCOLS Table 24-3: Parameters in access-list (hardware IP numbered) (cont.) Parameter Description <ip-addr>/<prefix> Match any source IP address within the specified subnet. Specify the subnet by entering the IPv4 address, then a forward slash, then the prefix length.
  • Page 770 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST NUMBERED HARDWARE PROTOCOLS Table 24-4: IP protocol number and description (cont.) Protocol Number Protocol Description [RFC] EGP (Exterior Gateway Protocol) [RFC888] IGP (Interior Gateway Protocol) [IANA] Network Voice Protocol [RFC741] UDP (User Datagram Protocol) [RFC768] Host monitoring [RFC869] RDP (Reliable Data Protocol) [RFC908] IRTP (Internet Reliable Transaction Protocol) [RFC938]...
  • Page 771 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST NUMBERED HARDWARE PROTOCOLS Mode Global Configuration Default On an interface controlled by a hardware ACL, any traffic that does not explicitly match a filter is permitted. Usage This command creates an ACL for use with hardware classification. Once you have configured the ACL, use the access-group or the...
  • Page 772: Access-List (Numbered Hardware Acl For Mac Addresses)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST NUMBERED HARDWARE ADDRESSES access-list (numbered hardware ACL for MAC addresses) Overview This command creates an access-list for use with hardware classification. The access-list will match on packets that have the specified source and destination MAC addresses.
  • Page 773 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACCESS LIST NUMBERED HARDWARE ADDRESSES Mode Global Configuration Default On an interface controlled by a hardware ACL, any traffic that does not explicitly match a filter is permitted. Usage This command creates an ACL for use with hardware classification. Once you have configured the ACL, use the access-group or the...
  • Page 774: Access-List (Numbered Hardware Acl For Tcp Or Udp)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS UDP) ACCESS LIST NUMBERED HARDWARE access-list (numbered hardware ACL for TCP or UDP) Overview This command creates an access-list for use with hardware classification. The access-list will match on TCP or UDP packets that have the specified source and destination IP addresses and optionally, port values.
  • Page 775 (ACL) C ARDWARE CCESS ONTROL OMMANDS UDP) ACCESS LIST NUMBERED HARDWARE Parameter Description <ip-addr> Match any source IP address within <reverse-mask> the specified subnet. Specify the subnet by entering a reverse mask in dotted decimal format. For example, entering “192.168.1.1 0.0.0.255” is the same as entering 192.168.1.1/24.
  • Page 776 (ACL) C ARDWARE CCESS ONTROL OMMANDS UDP) ACCESS LIST NUMBERED HARDWARE Examples To create an access-list that will permit TCP packets with a destination address of 192.168.1.1, a destination port of 80, and any source address and source port, enter the commands: awplus# configure terminal...
  • Page 777: Access-List Hardware (Named Hardware Acl)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL) ACCESS LIST HARDWARE NAMED HARDWARE access-list hardware (named hardware ACL) Overview This command creates a named hardware access-list and puts you into IPv4 Hardware ACL Configuration mode, where you can add filter entries to the ACL. Once you have configured the ACL, you can use the access-group or the...
  • Page 778 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL) ACCESS LIST HARDWARE NAMED HARDWARE Related access-group Commands (named hardware ACL: ICMP entry) (named hardware ACL: IP protocol entry) (named hardware ACL: TCP or UDP entry) (access-list standard named filter) show access-list (IPv4 Hardware ACLs) 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 779: (Named Hardware Acl: Icmp Entry)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: ICMP NAMED HARDWARE ENTRY (named hardware ACL: ICMP entry) Overview Use this command to add a new ICMP filter entry to the current hardware access-list. The filter will match on any ICMP packet that has the specified source and destination IP addresses and (optionally) ICMP type.
  • Page 780 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: ICMP NAMED HARDWARE ENTRY Parameter Description host <ip-addr> Match a single source host with the IP address given by <ip-addr> in dotted decimal notation. <ip-addr>/<prefix> Match any source IP address within the specified subnet. Specify the subnet by entering the IPv4 address, then a forward slash, then the prefix length.
  • Page 781 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: ICMP NAMED HARDWARE ENTRY Parameter Description Timestamp requests. Timestamp replies. Information requests. Information replies. Address mask requests. Address mask replies. vlan <1-4094> The VLAN to match against. The ACL will match against the specified ID in the packet’s VLAN tag.
  • Page 782 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: ICMP NAMED HARDWARE ENTRY Related access-group Commands access-list hardware (named hardware ACL) match access-group show running-config show access-list (IPv4 Hardware ACLs) 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 783: (Named Hardware Acl: Ip Packet Entry)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: IP NAMED HARDWARE PACKET ENTRY (named hardware ACL: IP packet entry) Overview Use this command to add an IP packet filter entry to the current hardware access-list. The filter will match on IP packets that have the specified IP and/or MAC addresses.
  • Page 784 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: IP NAMED HARDWARE PACKET ENTRY Parameter Description dhcpsnooping Match the source address learned from the DHCP Snooping binding database. host <ip-addr> Match a single source host with the IP address given by <ip-addr> in dotted decimal notation.
  • Page 785 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: IP NAMED HARDWARE PACKET ENTRY Parameter Description <source-mac> The source MAC address to match against, followed by the mask. Enter the address in the format <HHHH.HHHH.HHHH>, where each H is a hexadecimal number. Enter the mask in the format <HHHH.HHHH.HHHH>, where each H is a hexadecimal number.
  • Page 786 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: IP NAMED HARDWARE PACKET ENTRY Then use the access-group or the match access-group command to apply this ACL to a port or QoS class-map. Note that the ACL will only apply to incoming data packets.
  • Page 787: (Named Hardware Acl: Ip Protocol Entry)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: IP NAMED HARDWARE PROTOCOL ENTRY (named hardware ACL: IP protocol entry) Overview Use this command to add an IP protocol type filter entry to the current hardware access-list. The filter will match on IP packets that have the specified IP protocol number, and the specified IP and/or MAC addresses.
  • Page 788 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: IP NAMED HARDWARE PROTOCOL ENTRY Table 24-5: Parameters in IP protocol ACL entries (cont.) Parameter Description Match any source IP address. dhcpsnooping Match the source address learned from the DHCP Snooping binding database. host <ip-addr>...
  • Page 789 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: IP NAMED HARDWARE PROTOCOL ENTRY Table 24-5: Parameters in IP protocol ACL entries (cont.) Parameter Description <source-mac> The source MAC address to match against, followed by the mask. Enter the address in the format <HHHH.HHHH.HHHH>, where each H is a hexadecimal number.
  • Page 790 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: IP NAMED HARDWARE PROTOCOL ENTRY Table 24-6: IP protocol number and description (cont.) Protocol Number Protocol Description [RFC] Network Voice Protocol [RFC741] UDP (User Datagram Protocol) [RFC768] Host monitoring [RFC869] RDP (Reliable Data Protocol) [RFC908] IRTP (Internet Reliable Transaction Protocol) [RFC938] ISO-TP4 (ISO Transport Protocol Class 4) [RFC905] Bulk Data Transfer Protocol [RFC969]...
  • Page 791 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: IP NAMED HARDWARE PROTOCOL ENTRY Default On an interface controlled by a hardware ACL, any traffic that does not explicitly match a filter is permitted. Usage To use this command, run the command access-list hardware (named hardware ACL) and enter the desired access-list name.
  • Page 792: (Named Hardware Acl: Mac Entry)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: MAC NAMED HARDWARE ENTRY (named hardware ACL: MAC entry) Overview Use this command to add a MAC address filter entry to the current hardware access-list. The access-list will match on packets that have the specified source and destination MAC addresses.
  • Page 793 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: MAC NAMED HARDWARE ENTRY Parameter Description <dest-mac> The destination MAC address to match against, followed by the mask. Enter the address in the format <HHHH.HHHH.HHHH>, where each H is a hexadecimal number. Enter the mask in the format <HHHH.HHHH.HHHH>, where each H is a hexadecimal number.
  • Page 794 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: MAC NAMED HARDWARE ENTRY Related access-group Commands access-list hardware (named hardware ACL) match access-group show running-config show access-list (IPv4 Hardware ACLs) 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 795: (Named Hardware Acl: Tcp Or Udp Entry)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: TCP NAMED HARDWARE ENTRY (named hardware ACL: TCP or UDP entry) Overview Use this command to add a TCP or UDP filter entry to the current hardware access-list. The access-list will match on TCP or UDP packets that have the specified source and destination IP addresses and optionally, port values.
  • Page 796 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: TCP NAMED HARDWARE ENTRY Parameter Description host <ip-addr> Match a single source host with the IP address given by <ip-addr> in dotted decimal notation. <ip-addr>/<prefix> Match any source IP address within the specified subnet. Specify the subnet by entering the IPv4 address, then a forward slash, then the prefix length.
  • Page 797 (ACL) C ARDWARE CCESS ONTROL OMMANDS ACL: TCP NAMED HARDWARE ENTRY Then use this command (and the other “named hardware ACL: entry” commands) to add filter entries. You can add multiple filter entries to an ACL. You can insert a new filter entry into the middle of an existing list by specifying the appropriate sequence number.
  • Page 798: Commit (Ipv4)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS COMMIT commit (IPv4) Overview Use this command to commit the IPv4 ACL filter configuration entered at the console to the hardware immediately without exiting the IPv4 Hardware ACL Configuration mode. This command forces the associated hardware and software IPv4 ACLs to synchronize.
  • Page 799: Show Access-List (Ipv4 Hardware Acls)

    (ACL) C ARDWARE CCESS ONTROL OMMANDS SHOW ACCESS LIST ARDWARE show access-list (IPv4 Hardware ACLs) Overview Use this command to display the specified access-list, or all access-lists if none have been specified. Note that only defined access-lists are displayed. An error message is displayed for an undefined access-list.
  • Page 800 (ACL) C ARDWARE CCESS ONTROL OMMANDS SHOW ACCESS LIST ARDWARE % Can't find access-list 2 Related access-list (numbered hardware ACL for MAC addresses) Commands access-list hardware (named hardware ACL) 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 801: Show Interface Access-Group

    (ACL) C ARDWARE CCESS ONTROL OMMANDS SHOW INTERFACE ACCESS GROUP show interface access-group Overview Use this command to display the access groups attached to a port. If an access group is specified, then the output only includes the ports that the specified access group is attached to.
  • Page 802: Ipv4 Software Access Control List (Acl) Commands

    IPv4 Software Access Control List (ACL) Commands Introduction Overview This chapter provides an alphabetical reference for the IPv4 Software Access Control List (ACL) commands, and contains detailed command information and command examples about IPv4 software ACLs as applied to Routing and Multicasting, which are not applied to interfaces.
  • Page 803 (ACL) C OFTWARE CCESS ONTROL OMMANDS Table 25-1: IPv4 Software Access List Commands and Prompts Command Name Command Mode Prompt awplus# show ip access-list Privileged Exec awplus(config)# access-group Global Configuration awplus(config)# access-list (extended named) Global Configuration awplus(config)# access-list (extended numbered) Global Configuration awplus(config)# access-list (standard named)
  • Page 804 (ACL) C OFTWARE CCESS ONTROL OMMANDS • “show ip access-list” on page 840 • “show ip prefix-list” on page 841 • “vty access-class (numbered)” on page 842 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 805: Access-List Extended (Named)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED NAMED access-list extended (named) Overview This command configures an extended named access-list that permits or denies packets from specific source and destination IP addresses. You can either create an extended named ACL together with an ACL filter entry in the Global Configuration mode, or you can use the IPv4 Extended ACL Configuration mode for sequenced ACL filter entry after entering a list name.
  • Page 806 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED NAMED Table 25-2: Parameters in the access-list extended (named) command - icmp Parameter Description <source> The source address of the packets. You can specify a single host, a subnet, or all sources. The following are the valid formats for specifying the source: Matches any source IP address.
  • Page 807 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED NAMED Table 25-2: Parameters in the access-list extended (named) command - icmp Parameter Description <type-number> The ICMP type, as defined in RFC792 and RFC950. Specify one of the following integers to create a filter for the ICMP message type: Echo replies.
  • Page 808 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED NAMED Table 25-3: Parameters in the access-list extended (named) command - tcp|udp Parameter Description <source> The source address of the packets. You can specify a single host, a subnet, or all sources. The following are the valid formats for specifying the source: Matches any source IP address.
  • Page 809 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED NAMED Table 25-4: Parameters in the access-list extended (named) command - proto|ip|any Parameter Description <list-name> A user-defined name for the access-list. deny The access-list rejects packets that match the type, source, and destination filtering specified with this command.
  • Page 810 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED NAMED Table 25-4: Parameters in the access-list extended (named) command - proto|ip|any (cont.) Parameter Description Logs the results. <ip-protocol> The IP protocol number, as defined by IANA (Internet Assigned Numbers Authority www.iana.org/assignments/protocol-numbers) ...
  • Page 811 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED NAMED Table 25-5: IP protocol number and description (cont.) Protocol Number Protocol Description [RFC] OSPFIGP [RFC1583] Ethernet-within-IP Encapsulation / RFC3378 Encapsulation Header / RFC1241 IP Payload Compression Protocol / RFC2393 Virtual Router Redundancy Protocol / RFC3768 RSVP-E2E-IGNORE / RFC3175 Mobility Header / RFC3775 UDPLite / RFC3828...
  • Page 812 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED NAMED Alternatively, you can enter the extended named ACL in Global Configuration mode before specifying the ACL filter entry in the IPv4 Extended ACL Configuration mode, as shown below: awplus# configure terminal awplus(config)# access-list extended TK awplus(config-ip-ext-acl)#...
  • Page 813: Access-List (Extended Numbered)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED NUMBERED access-list (extended numbered) Overview This command configures an extended numbered access-list that permits or denies packets from specific source and destination IP addresses. You can either create an extended numbered ACL together with an ACL filter entry in the Global Configuration mode, or you can use the IPv4 Extended ACL Configuration mode for sequenced ACL filter entry after entering a list number.
  • Page 814 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED NUMBERED Parameter Description <destination> The destination address of the packets. You can specify a single host, a subnet, or all destinations. The following are the valid formats for specifying the destination: Matches any destination IP address.
  • Page 815: (Access-List Extended Icmp Filter)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ICMP ACCESS LIST EXTENDED FILTER (access-list extended ICMP filter) Overview Use this ACL filter to add a new ICMP filter entry to the current extended access-list. If the sequence number is specified, the new filter is inserted at the specified location.
  • Page 816 (ACL) C OFTWARE CCESS ONTROL OMMANDS ICMP ACCESS LIST EXTENDED FILTER Parameter Description icmp-type The ICMP type. <icmp-value> The value of the ICMP type. Log the results. Mode IPv4 Extended ACL Configuration Default Any traffic controlled by a software ACL that does not explicitly match a filter is denied.
  • Page 817: (Access-List Extended Ip Filter)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED FILTER (access-list extended IP filter) Overview Use this ACL filter to add a new IP filter entry to the current extended access-list. If the sequence number is specified, the new filter is inserted at the specified location.
  • Page 818 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED FILTER Parameter Description <destination> The destination address of the packets. You can specify a single host, a subnet, or all destinations. The following are the valid formats for specifying the destination: Matches any destination IP address.
  • Page 819 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED FILTER Then use the following commands to add a new entry to the named access-list my-acl that will reject packets from 10.0.0.1 to 192.168.1.1: awplus(config-ip-ext-acl)# deny ip host 10.0.0.1 host 192.168.1.1 awplus(config-ip-ext-acl)# 20 permit ip any any Example 3...
  • Page 820: (Access-List Extended Ip Protocol Filter)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED PROTOCOL FILTER (access-list extended IP protocol filter) Overview Use this ACL filter to add a new IP protocol type filter entry to the current extended access-list. If the sequence number is specified, the new filter is inserted at the specified location.
  • Page 821 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED PROTOCOL FILTER Parameter Description <destination> The destination address of the packets. You can specify a single host, a subnet, or all destinations. The following are the valid formats for specifying the destination: <ip-addr>/ An IPv4 address, followed by a forward <prefix>...
  • Page 822 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED PROTOCOL FILTER Table 25-6: IP protocol number and description (cont.) Protocol Number Protocol Description [RFC] Destination Options for IPv6 [RFC1883] EIGRP (Enhanced Interior Gateway Routing Protocol) OSPFIGP [RFC1583] Ethernet-within-IP Encapsulation / RFC3378 Encapsulation Header / RFC1241 IP Payload Compression Protocol / RFC2393 Virtual Router Redundancy Protocol / RFC3768...
  • Page 823 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST EXTENDED PROTOCOL FILTER Example 2 Use the following commands to add a new access-list filter entry at sequence position 5 in the access-list named my-list that will accept packets from source [adding to a list] address 10.10.1.1/24 to destination address 192.68.1.1/24: awplus# configure terminal...
  • Page 824: (Access-List Extended Tcp Udp Filter)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS TCP UDP ACCESS LIST EXTENDED FILTER (access-list extended TCP UDP filter) Overview Use this ACL filter to add a new TCP or UDP filter entry to the current extended access-list. If the sequence number is specified, the new filter is inserted at the specified location.
  • Page 825 (ACL) C OFTWARE CCESS ONTROL OMMANDS TCP UDP ACCESS LIST EXTENDED FILTER Parameter Description <destination> The destination address of the packets. You can specify a single host, a subnet, or all destinations. The following are the valid formats for specifying the destination: <ip-addr>/ An IPv4 address, followed by a <prefix>...
  • Page 826: Access-List Standard (Named)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NAMED access-list standard (named) Overview This command configures a standard named access-list that permits or denies packets from a specific source IP address. You can either create a standard named ACL together with an ACL filter entry in the Global Configuration mode, or you can use the IPv4 Standard ACL Configuration mode for sequenced ACL filter entry after first entering an access-list name.
  • Page 827 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NAMED Usage Use this command when configuring a standard named access-list for filtering IP software packets. You can either create access-lists from within this command, or you can enter access-list standard followed by only the name. Entering only the name moves you to the IPv4 Standard ACL Configuration mode for the selected access-list.
  • Page 828: Access-List (Standard Numbered)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NUMBERED access-list (standard numbered) Overview This command configures a standard numbered access-list that permits or denies packets from a specific source IP address. You can either create a standard numbered ACL together with an ACL filter entry in the Global Configuration mode, or you can use the IPv4 Standard ACL Configuration mode for sequenced ACL filter entry after first entering an access-list number.
  • Page 829 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NUMBERED You can either create access-lists from within this command, or you can enter access-list followed by only the number. Entering only the number moves you to the IPv4 Standard ACL Configuration mode for the selected access-list. From there you can configure your access-lists by using the command (access-list standard numbered...
  • Page 830: (Access-List Standard Named Filter)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NAMED FILTER (access-list standard named filter) Overview This ACL filter adds a source IP address filter entry to a current named standard access-list. If the sequence number is specified, the new filter entry is inserted at the specified location.
  • Page 831 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NAMED FILTER Usage An ACL can be configured with multiple ACL filters using sequence numbers. If the sequence number is omitted, the next available multiple of 10 will be used as the sequence number for the new filter.
  • Page 832: (Access-List Standard Numbered Filter)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NUMBERED FILTER (access-list standard numbered filter) Overview This ACL filter adds a source IP address filter entry to a current standard numbered access-list. If a sequence number is specified, the new filter entry is inserted at the specified location.
  • Page 833 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NUMBERED FILTER Usage An ACL can be configured with multiple ACL filters using sequence numbers. If the sequence number is omitted, the next available multiple of 10 will be used as the sequence number for the new filter.
  • Page 834: Clear Ip Prefix-List

    (ACL) C OFTWARE CCESS ONTROL OMMANDS CLEAR IP PREFIX LIST clear ip prefix-list Overview Use this command to reset the hit count to zero in the prefix-list entries. clear ip prefix-list [<list-name>] [<ip-address>/<mask>] Syntax Parameter Description <list-name> The name of the prefix-list. <ip-address>/<mask>...
  • Page 835: Ip Prefix-List

    (ACL) C OFTWARE CCESS ONTROL OMMANDS IP PREFIX LIST ip prefix-list Overview Use this command to create an entry for an IPv4 prefix list. Use the no variant of this command to delete the IPv4 prefix-list entry. Syntax ip prefix-list <list-name> [seq <1-429496725>] {deny|permit} {any|<ip-prefix>} [ge <0-32>] [le <0-32>] ip prefix-list <list-name>...
  • Page 836 (ACL) C OFTWARE CCESS ONTROL OMMANDS IP PREFIX LIST In the below sample configuration, the last ip prefix-list command in the Example below list matches all, and the first ip prefix-list command denies the IP network 76.2.2.0: awplus(config)# router bgp 100 awplus(config-router)# network 172.1.1.0 awplus(config-router)#...
  • Page 837: Maximum-Access-List

    (ACL) C OFTWARE CCESS ONTROL OMMANDS MAXIMUM ACCESS LIST maximum-access-list Overview Use this command to set the maximum number of filters that can be added to any access-list. These are access-lists within the ranges 1-199, 1300-1999 and 2000-2699, and named standard and extended access-lists. The no variant of this command removes the limit on the number of filters that can be added to a software access-list.
  • Page 838: Show Access-List (Ipv4 Software Acls)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS SHOW ACCESS LIST OFTWARE show access-list (IPv4 Software ACLs) Overview Use this command to display the specified access-list, or all access-lists if none have been specified. Note that only defined access-lists are displayed. An error message is displayed for an undefined access-list show access-list Syntax...
  • Page 839 (ACL) C OFTWARE CCESS ONTROL OMMANDS SHOW ACCESS LIST OFTWARE  Standard IP access-list 20 deny 192.168.10.0, wildcard bits 0.0.0.255 deny 192.168.12.0, wildcard bits 0.0.0.255 Note the following error message is displayed if you attempt to show an undefined access-list: awplus# show access-list 2 ...
  • Page 840: Show Ip Access-List

    (ACL) C OFTWARE CCESS ONTROL OMMANDS SHOW IP ACCESS LIST show ip access-list Overview Use this command to display IP access-lists. show ip access-list Syntax [<1-99>|<100-199>|<1300-1999>|<2000-2699>|<access-list-name>] Parameter Description <1-99> IP standard access-list. <100-199> IP extended access-list. <1300-1999> IP standard access-list (expanded range). <2000-2699>...
  • Page 841: Show Ip Prefix-List

    (ACL) C OFTWARE CCESS ONTROL OMMANDS SHOW IP PREFIX LIST show ip prefix-list Overview Use this command to display the IPv4 prefix-list entries. Note that this command is valid for RIP and BGP routing protocols only. show ip prefix-list [<name>|detail|summary] Syntax Parameter Description...
  • Page 842: Vty Access-Class (Numbered)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS VTY ACCESS CLASS NUMBERED vty access-class (numbered) Overview For IPv4, use this command to set a standard numbered software access list to be the management ACL. This is then applied to all available VTY lines for controlling remote access by Telnet and SSH.
  • Page 843: Ipv6 Software Access Control List (Acl) Commands

    IPv6 Software Access Control List (ACL) Commands Introduction Overview This chapter provides an alphabetical reference for the IPv6 Software Access Control List (ACL) commands, and contains detailed command information and command examples about IPv6 software ACLs as applied to Routing and Multicasting, which are not applied to interfaces.
  • Page 844 (ACL) C OFTWARE CCESS ONTROL OMMANDS Table 26-1: IPv6 Software Access List Commands and Prompts Command Name Command Mode Prompt awplus# show ipv6 access-list (IPv6 Software Privileged Exec ACLs) awplus(config)# ipv6 access-list standard (named) Global Configuration awplus(config-ipv6-std-acl)# (ipv6 access-list standard filter) IPv6 Standard ACL Configuration Command List...
  • Page 845: Ipv6 Access-List Standard (Named)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NAMED ipv6 access-list standard (named) Overview This command configures an IPv6 standard access-list for filtering frames that permit or deny IPv6 packets from a specific source IPv6 address. The no variant of this command removes a specified IPv6 standard access-list. Syntax ipv6 access-list standard <ipv6-acl-list-name>...
  • Page 846 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD NAMED For backwards compatibility you can either create IPv6 standard access-lists from within this command, or you can enter ipv6 access-list standard followed by only the IPv6 standard access-list name. This latter (and preferred) method moves you to the (config-ipv6-std-acl) prompt for the selected IPv6 standard access-list, and from here you can configure the filters for this selected IPv6 standard access-list.
  • Page 847: (Ipv6 Access-List Standard Filter)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD FILTER (ipv6 access-list standard filter) Overview Use this ACL filter to add a filter entry for an IPv6 source address and prefix length to the current standard IPv6 access-list. If a sequence number is specified, the new entry is inserted at the specified location.
  • Page 848 (ACL) C OFTWARE CCESS ONTROL OMMANDS ACCESS LIST STANDARD FILTER To remove the ACL filter entry that will deny any IPv6 packets from the standard IPv6 access-list named my-list, enter the commands: awplus# configure terminal awplus(config)# ipv6 access-list standard my-list awplus(config-ipv6-std-acl)# no deny any Alternately, to remove the ACL filter entry with sequence number 5 to the...
  • Page 849: Show Ipv6 Access-List (Ipv6 Software Acls)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS SHOW IPV ACCESS LIST OFTWARE show ipv6 access-list (IPv6 Software ACLs) Overview Use this command to display all configured IPv6 access-lists or the IPv6 access-list specified by name. show ipv6 access-list [<access-list-name>] Syntax show ipv6 access-list standard [<access-list-name>] Parameter Description <access-list-name>...
  • Page 850: Vty Ipv6 Access-Class (Named)

    (ACL) C OFTWARE CCESS ONTROL OMMANDS VTY IPV ACCESS CLASS NAMED vty ipv6 access-class (named) Overview For IPv6, use this command to set a standard named software access list to be the management ACL. This is then applied to all available VTY lines for controlling remote access by Telnet and SSH.
  • Page 851: Qos Commands

    QoS Commands Introduction Overview This chapter provides an alphabetical reference for Quality of Service commands. QoS uses ACLs. For more information about ACLs, see the ACL Feature Overview and Configuration Guide. Command List • “class” on page 853 • “class-map” on page 854 •...
  • Page 852 OMMANDS • “police twin-rate action” on page 875 • “policy-map” on page 877 • “priority-queue” on page 878 • “remark-map” on page 879 • “remark new-cos” on page 881 • “service-policy input” on page 883 • “show class-map” on page 884 •...
  • Page 853: Class

    OMMANDS CLASS class Overview Use this command to associate an existing class-map to a policy or policy-map (traffic classification), and to enter Policy Map Class Configuration mode to configure the class- map. Use the no variant of this command to delete an existing class-map. If your class-map does not exist, you can create it by using the class-map command.
  • Page 854: Class-Map

    OMMANDS CLASS class-map Overview Use this command to create a class-map. Use the no variant of this command to delete the named class-map. Syntax class-map <name> no class-map <name> Parameter Description <name> Name of the class-map to be created. Mode Global Configuration This example creates a class-map called cmap1, use the commands: Example...
  • Page 855: Clear Mls Qos Interface Policer-Counters

    OMMANDS CLEAR MLS QOS INTERFACE POLICER COUNTERS clear mls qos interface policer-counters Overview Resets an interface’s policer counters to zero. You can either clear a specific class-map, or you can clear all class-maps by not specifying a class map. clear mls qos interface <port> policer-counters [class-map Syntax <class-map>] Parameter...
  • Page 856: Default-Action

    OMMANDS DEFAULT ACTION default-action Overview Sets the action for the default class-map belonging to a particular policy-map. The action for a non-default class-map depends on the action of any ACL that is applied to the policy-map. The default action can therefore be thought of as specifying the action that will be applied to any data that does not meet the criteria specified by the applied matching commands.
  • Page 857: Description (Qos Policy-Map)

    OMMANDS DESCRIPTION POLICY description (QoS policy-map) Overview Adds a textual description of the policy-map. This can be up to 80 characters long. Use the no variant of this command to remove the current description from the policy-map. Syntax description <line> no description Parameter Description...
  • Page 858: Match Access-Group

    OMMANDS MATCH ACCESS GROUP match access-group Overview Use this command to apply an ACL to a class-map. Use the no variant of this command to remove the match. Syntax match access-group {<hw-IP-ACL>|<hw-MAC-ACL>|<hw-named-ACL>} no match access-group {<hw-IP-ACL>|<hw-MAC-ACL>|<hw-named-ACL>} Parameter Description <hw-IP-ACL> Specify a hardware IP ACL number in the range <3000-3699>. <hw-MAC-ACL>...
  • Page 859 OMMANDS MATCH ACCESS GROUP To configure a class-map named “cmap3”, which matches traffic against access-list “hw_acl”, which allows IP traffic from any source to any destination, use the commands: awplus# configure terminal awplus(config)# access-list hardware hw_acl awplus(config-ip-hw-acl)# permit ip any any awplus(config)# class-map cmap3 awplus(config-cmap)#...
  • Page 860: Match Cos

    OMMANDS MATCH COS match cos Overview Use this command to define a COS to match against incoming packets. Use the no variant of this command to remove CoS. Syntax match cos <0-7> no match cos Parameter Description <0-7> Specify the CoS value. Mode Class Map Configuration To set the class-map’s CoS to 4, use the commands:...
  • Page 861: Match Dscp

    OMMANDS MATCH DSCP match dscp Overview Use this command to define the DSCP to match against incoming packets. Use the no variant of this command to remove a previously defined DSCP. Syntax match dscp <0-63> no match dscp Parameter Description <0-63>...
  • Page 862: Match Eth-Format Protocol

    OMMANDS MATCH ETH FORMAT PROTOCOL match eth-format protocol Overview This command sets the Ethernet format and the protocol for a class-map to match Select one Layer 2 format and one Layer 3 protocol when you issue this command. Use the no variant of this command to remove the configured Ethernet format and protocol from a class-map.
  • Page 863 OMMANDS MATCH ETH FORMAT PROTOCOL Parameter Description ecma-internet Protocol Number 0803 (enter the parameter name or its number). chaosnet Protocol Number 0804 (enter the parameter name or its number). xdot25-level-3 Protocol Number 0805 (enter the parameter name or its number). arp Protocol Number 0806 (enter the parameter name or its number).
  • Page 864 OMMANDS MATCH ETH FORMAT PROTOCOL Parameter Description ethertalk-2 Protocol Number 809B (enter the parameter name or its number). ethertalk-2-aarp Protocol Number 80F3 (enter the parameter name or its number). ipx-snap Protocol Number 8137 (enter the parameter name or its number). ipx-802dot3 Protocol Number FFFF (enter the parameter name or its number).
  • Page 865: Match Ip-Precedence

    OMMANDS MATCH IP PRECEDENCE match ip-precedence Overview Use this command to identify IP precedence values as match criteria. Use the no variant of this command to remove IP precedence values from a class-map. Syntax match ip-precedence <0-7> no match ip-precedence Parameter Description <0-7>...
  • Page 866: Match Mac-Type

    OMMANDS MATCH MAC TYPE match mac-type Overview Use this command to set the MAC type for a class-map to match on. Use no variant of this command to remove the MAC type match entry. Syntax match mac-type {l2bcast|l2mcast|l2ucast} no match mac-type Parameter Description l2bcast...
  • Page 867: Match Tcp-Flags

    OMMANDS MATCH TCP FLAGS match tcp-flags Overview Sets one or more TCP flags (control bits) for a class-map to match on. Use the no variant of this command to remove one or more TCP flags for a class-map to match on. Syntax match tcp-flags {[ack][fin][psh][rst][syn][urg]} no match tcp-flags {[ack][fin][psh][rst][syn][urg]}...
  • Page 868: Match Vlan

    OMMANDS MATCH VLAN match vlan Overview Use this command to define the VLAN ID as match criteria. Use the no variant of this command to disable the VLAN ID used as match criteria. Syntax match vlan <1-4094> no match vlan Parameter Description <1-4094>...
  • Page 869: Mls Qos Cos

    OMMANDS MLS QOS COS mls qos cos Overview This command assigns a CoS (Class of Service) user-priority value to untagged frames entering a specified interface. By default, all untagged frames are assigned a CoS value of 0. Use the no variant of this command to return the interface to the default CoS setting for untagged frames entering the interface.
  • Page 870: Mls Qos Enable

    OMMANDS MLS QOS ENABLE mls qos enable Overview Use this command to globally enable QoS on the switch or stack. Use the no variant of this command to globally disable QoS and remove all QoS configuration. The no variant of this command removes all class-maps, policy-maps, and policers that have been created.
  • Page 871: Mls Qos Map Cos-Queue To

    OMMANDS MLS QOS MAP COS QUEUE TO mls qos map cos-queue to Overview Use this command to set the default CoS to egress queue mapping. This is the default queue mapping for packets that do not get assigned an egress queue via any other QoS functionality.
  • Page 872: Mls Qos Map Premark-Dscp To

    OMMANDS MLS QOS MAP PREMARK DSCP TO mls qos map premark-dscp to Overview This command configures the premark-dscp map. It is used when traffic is classified by a class-map that has trust dscp configured. Based on a lookup DSCP, the map determines new QoS settings for the traffic. The no variant of this command resets the premark-dscp map to its defaults.
  • Page 873: No Police

    OMMANDS NO POLICE no police Overview Use this command to disable any policer previously configured on the class-map. no police Syntax Mode Policy Map Class Configuration Usage This command disables any policer previously configured on the class-map. Example To disable policing on a class-map use the command: awplus# configure terminal awplus(config)#...
  • Page 874: Police Single-Rate Action

    OMMANDS POLICE SINGLE RATE ACTION police single-rate action Overview Configures a single-rate policer for a class-map. police single-rate <rate> <number> <number> action drop-red Syntax Parameter Description <rate> Specify the maximum rate (1-16000000 kbps). <number> Specify any decimal number between 0 and 16777216. The switch ignores these values.
  • Page 875: Police Twin-Rate Action

    OMMANDS POLICE TWIN RATE ACTION police twin-rate action Overview Configures a twin-rate policer for a class-map. police twin-rate <cir> <pir> <cbs> <pbs> action Syntax {drop-red|remark-transmit} Parameter Description <cir> Specify the Committed Information Rate (CIR) (1-40000000 kbps). <pir> Specify the Peak Information Rate (PIR) (1-40000000 kbps). <cbs>...
  • Page 876 OMMANDS POLICE TWIN RATE ACTION Using an action of remark-transmit means that the packet will be remarked with the values configured in the policed-dscp map. The index into this map is determined by the DSCP in the packet. Note that the remark-map does not only apply to red traffic.
  • Page 877: Policy-Map

    OMMANDS POLICY policy-map Overview Use this command to create a policy-map and to enter Policy Map Configuration mode to configure the specified policy-map. Use the no variant of this command to delete an existing policy-map. Syntax policy-map <name> no policy-map <name> Parameter Description <name>...
  • Page 878: Priority-Queue

    OMMANDS PRIORITY QUEUE priority-queue Overview Configures strict priority based scheduling on the specified egress queues. You must specify at least one queue. priority-queue [0][1][2][3][4][5][6][7] Syntax Parameter Description [0][1]...[7] Specify the queues that will use strict priority scheduling. With strict priority scheduling, the switch will completely empty the highest numbered queue first, then start processing the next lowest numbered queue.
  • Page 879: Remark-Map

    OMMANDS REMARK remark-map Overview Use this command to configure the remark map. If a re-mark map is applied to a class, and a policer is also applied to the same class, then: • green and yellow traffic will all be acted upon by the remark-map, and •...
  • Page 880 OMMANDS REMARK To reset the DSCP for all bandwidth classes, use the commands: awplus# configure terminal awplus(config)# policy-map pmap1 awplus(config-pmap)# class cmap1 awplus(config-pmap-c)# no remark-map to new-dscp Related police single-rate action Commands police twin-rate action 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 881: Remark New-Cos

    OMMANDS REMARK NEW remark new-cos Overview This command enables you to configure and remark either or both of: • the CoS flag in the data packet • the input into the CoS to queue map, thus changing the destination egress queue.
  • Page 882 OMMANDS REMARK NEW Figure 27-1: Remarking and the CoS to Q map Table 27-1: CoS to egress queue remarking function Input Command Output CoS field = 1 Remark new-cos (not CoS value = 1 configured) Packet sent to egress queue 0 CoS field = 1 Remark new-cos 2 external CoS value = 2...
  • Page 883: Service-Policy Input

    OMMANDS SERVICE POLICY INPUT service-policy input Overview Use this command to apply a policy-map to the input of an interface. Use the no variant of this command to remove a policy-map and interface association. Syntax service-policy input <policy-map> no service-policy input <policy-map> Parameter Description <policy-map>...
  • Page 884: Show Class-Map

    OMMANDS SHOW CLASS show class-map Overview Use this command to display the QoS class-maps’ criteria for classifying traffic. show class-map [<class-map-name>] Syntax Parameter Description <class-map-name> Name of the class-map. Mode User Exec and Privileged Exec Example To display a QoS class-map’s match criteria for classifying traffic, use the command: awplus# show class-map cmap1 Output...
  • Page 885: Show Mls Qos

    OMMANDS SHOW MLS QOS show mls qos Overview Use this command to display whether QoS is enabled or disabled on the switch. show mls qos Syntax Mode User Exec and Privileged Exec Example To display whether QoS is enabled or disabled, use the command: awplus# show mls qos Output...
  • Page 886: Show Mls Qos Interface

    OMMANDS SHOW MLS QOS INTERFACE show mls qos interface Overview Displays the current settings for the interface. This includes its default CoS and queue, scheduling used for each queue, and any policies/maps that are attached. show mls qos interface [<port>] Syntax Parameter Description...
  • Page 887 OMMANDS SHOW MLS QOS INTERFACE Egress Queue: 2 Status: Enabled Scheduler: Strict Priority Queue Limit: 12% Egress Rate Limit: 0 Kb Egress Queue: 3 Status: Enabled Scheduler: Wrr Group 2 Weight: 10 Queue Limit: 12% Egress Rate Limit: 0 Kb Egress Queue: 4...
  • Page 888 OMMANDS SHOW MLS QOS INTERFACE Table 28: Parameters in the output of the show mls qos interface command Parameter Description Queue Limit The percentage of the port’s buffers that have been allocated to this queue. Egress Rate Limit The amount of traffic that can be transmitted via this queue per second.
  • Page 889: Show Mls Qos Interface Policer-Counters

    OMMANDS SHOW MLS QOS INTERFACE POLICER COUNTERS show mls qos interface policer-counters Overview This command displays an interface’s policer counters. This can either be for a specific class-map or for all class-maps attached to the interface. If no class-map is specified then all class-map policer counters attached to the interface are displayed.
  • Page 890: Show Mls Qos Interface Queue-Counters

    OMMANDS SHOW MLS QOS INTERFACE QUEUE COUNTERS show mls qos interface queue-counters Overview This command displays an interface’s egress queue counters. This can either be for a specific queue or for all queues on the interface. If no queue is specified all queue counters on the interface will be displayed.
  • Page 891: Show Mls Qos Interface Storm-Status

    OMMANDS SHOW MLS QOS INTERFACE STORM STATUS show mls qos interface storm-status Overview Show the current configuration and status of the QoS Storm Protection (QSP) on the given port. show mls qos interface <port> storm-status Syntax Parameter Description <port> Switch port. Mode User Exec and Privileged Exec Example...
  • Page 892: Show Mls Qos Maps Cos-Queue

    OMMANDS SHOW MLS QOS MAPS COS QUEUE show mls qos maps cos-queue Overview Show the current configuration of the cos-queue map. show mls qos maps cos-queue Syntax Mode User Exec and Privileged Exec Example To display the current configuration of the cos-queue map, use the command: awplus# show mls qos maps cos-queue Output...
  • Page 893: Show Mls Qos Maps Premark-Dscp

    OMMANDS SHOW MLS QOS MAPS PREMARK DSCP show mls qos maps premark-dscp Overview This command displays the premark-dscp map. This map is used to determine the queue on the basis of the DSCP. show mls qos maps premark-dscp [<0-63>] Syntax Parameter Description <0-63>...
  • Page 894: Show Platform Classifier Statistics Utilization Brief

    OMMANDS SHOW PLATFORM CLASSIFIER STATISTICS UTILIZATION BRIEF show platform classifier statistics utilization brief Overview This command displays the number of used entries available for various platform functions, and the percentage that number of entries represents of the total available. Syntax show platform classifier statistics utilization brief Mode Privileged Exec...
  • Page 895: Show Policy-Map

    OMMANDS SHOW POLICY show policy-map Overview Displays the policy-maps configured on the switch. The output also shows whether or not they are connected to a port (attached / detached) and shows their associated class-maps. show policy-map [<name>] Syntax Parameter Description <name>...
  • Page 896: Storm-Action

    OMMANDS STORM ACTION storm-action Overview Sets the action to be taken when triggered by QoS Storm Protection (QSP). There are three available options: • portdisable will disable the port in software. • vlandisable will disable the port from the VLAN matched by the class-map in class-map.
  • Page 897: Storm-Downtime

    OMMANDS STORM DOWNTIME storm-downtime Overview Sets the time to re-enable a port that has been disabled by QoS Storm Protection (QSP). The time is given in seconds, from a minimum of one second to maximum of 86400 seconds (i.e. one day). The no variant of this command resets the time to the default value of 10 seconds.
  • Page 898: Storm-Protection

    OMMANDS STORM PROTECTION storm-protection Overview Use this command to enable Policy Based Storm Protection (such as QSP - QoS Storm Protection). Storm protection is activated as soon as a port is enabled. However, it will only be functional after storm-rate storm-window have been set.
  • Page 899: Storm-Rate

    OMMANDS STORM RATE storm-rate Overview Sets the data rate that triggers the storm-action. The rate is in kbps and the range is from 1kbps to 40Gbps. Note that this setting is made in conjunction with the storm-window command. Use the no variant of this command to negate the storm-rate command. storm-rate <1-40000000>...
  • Page 900: Storm-Window

    OMMANDS STORM WINDOW storm-window Overview Sets the window size of QoS Storm Protection (QSP). This sets the time to poll the data-rate every given milliseconds. Minimum window size is 100 ms and the maximum size is 60 sec. Use the no variant of this command to negate the storm-window command. Syntax storm-window <100-60000>...
  • Page 901: Trust Dscp

    OMMANDS TRUST DSCP trust dscp Overview This command enables the premark-dscp map to send traffic to a particular egress queue, based on a lookup DSCP value. trust dscp Syntax no trust Mode Policy-Map Configuration. Because policy-maps are applied to ports, you can think of trust dscp as a per-port setting.
  • Page 902: Wrr-Queue Disable Queues

    OMMANDS QUEUE DISABLE QUEUES wrr-queue disable queues Overview Use this command to disable an egress queue from transmitting traffic. The no variant of this command enables an egress queue to transmit traffic. Syntax wrr-queue disable queues [0][1][2][3][4][5][6][7] no wrr-queue disable queues [0][1][2][3][4][5][6][7] Parameter Description [0][2]...[7]...
  • Page 903: Wrr-Queue Egress-Rate-Limit Queues

    OMMANDS QUEUE EGRESS RATE LIMIT QUEUES wrr-queue egress-rate-limit queues Overview Sets a limit on the amount of traffic that can be transmitted per second from these queues. The default unit is in Kb, but Mb or Gb can also be specified. The minimum is 651Kb.
  • Page 904: Wrr-Queue Weight Queues

    OMMANDS QUEUE WEIGHT QUEUES wrr-queue weight queues Overview This command configures weighted round-robin based scheduling on the specified egress queues on switch port interfaces only. The weights are specified as ratios relative to each other. wrr-queue weight <1-15> queues [0][1][2][3][4][5][6][7] Syntax Parameter Description...
  • Page 905: 802.1X Commands

    802.1X Commands Introduction Overview This chapter provides an alphabetical reference of commands used to configure 802.1X port access control. For more information, see the AAA and Port Authentication_Feature Overview and Configuration Guide Command List • “debug dot1x” on page 907 •...
  • Page 906 802.1X C OMMANDS • “undebug dot1x” on page 942 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 907: Debug Dot1X

    802.1X C OMMANDS DEBUG DOT debug dot1x Overview Use this command to enable 802.1X IEEE Port-Based Network Access Control troubleshooting functions. Use the no variant of this command to disable this function. Syntax debug dot1x [all|auth-web|event|nsm|packet|timer] no debug all dot1x no debug dot1x [all|auth-web|event|nsm|packet|timer] Parameter Description...
  • Page 908: Dot1X Control-Direction

    802.1X C OMMANDS X CONTROL DIRECTION dot1x control-direction Overview This command sets the direction of the filter for the unauthorized interface. If the optional in parameter is specified with this command then packets entering the specified port are discarded. The in parameter discards the ingress packets received from the supplicant.
  • Page 909 802.1X C OMMANDS X CONTROL DIRECTION To set the port direction to the default (both) for authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# no dot1x control-direction Related auth profile (Global Configuration) Commands show dot1x show dot1x interface show auth interface 613-50157-01 Rev C...
  • Page 910: Dot1X Eap

    802.1X C OMMANDS X EAP dot1x eap Overview This command selects the transmit mode for the EAP packet. If the authentication feature is not enabled then EAP transmit mode is not enabled. The default setting discards EAP packets. dot1x eap {discard|forward|forward-untagged-vlan|forward-vlan} Syntax Parameter Description...
  • Page 911: Dot1X Eapol-Version

    802.1X C OMMANDS X EAPOL VERSION dot1x eapol-version Overview This command sets the EAPOL protocol version for EAP packets when 802.1X port authentication is applied. Use the no variant of this command to set the EAPOL protocol version to 1. The default EAPOL protocol version is version 1.
  • Page 912 802.1X C OMMANDS X EAPOL VERSION Validation auth profile (Global Configuration) Commands show dot1x show dot1x interface 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 913: Dot1X Initialize Interface

    802.1X C OMMANDS X INITIALIZE INTERFACE dot1x initialize interface Overview This command removes authorization for a specified connected interface. The connection will attempt to re-authorize when the specified port attempts to make use of the network connection. : Reauthentication could be a long time after the use of this command because NOTE the reauthorization attempt is not triggered by this command.
  • Page 914: Dot1X Initialize Supplicant

    802.1X C OMMANDS X INITIALIZE SUPPLICANT dot1x initialize supplicant Overview This command removes authorization for a connected supplicant with the specified MAC address or username. The connection will attempt to re-authorize when the specified supplicant attempts to make use of the network connection. : Reauthentication could be a long time after the use of this command because NOTE the reauthorization attempt is not triggered by this command.
  • Page 915: Dot1X Keytransmit

    802.1X C OMMANDS X KEYTRANSMIT dot1x keytransmit Overview This command enables key transmission on the interface specified previously in Interface mode. The no variant of this command disables key transmission on the interface specified. Syntax dot1x keytransmit no dot1x keytransmit Default Key transmission for port authentication is enabled by default.
  • Page 916: Dot1X Max-Auth-Fail

    802.1X C OMMANDS X MAX AUTH FAIL dot1x max-auth-fail Overview Use this command to configure the maximum number of login attempts for a supplicant (client device) using the auth-fail vlan feature, when using 802.1X port authentication on an interface. The no variant of this command resets the maximum login attempts for a supplicant (client device) using the auth-fail vlan feature, to the default configuration of 3 login attempts.
  • Page 917 802.1X C OMMANDS X MAX AUTH FAIL To configure the maximum number of login attempts for a supplicant on authentication profile 'student' to a single (1) login attempt, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# dot1x max-auth-fail 1 To configure the maximum number of login attempts for a supplicant on authentication profile 'student' to the default number of three (3) login attempts, use the commands:...
  • Page 918: Dot1X Max-Reauth-Req

    802.1X C OMMANDS X MAX REAUTH dot1x max-reauth-req Overview This command sets the number of reauthentication attempts before an interface is unauthorized. The no variant of this command resets the reauthentication delay to the default. Syntax dot1x max-reauth-req <1-10> no dot1x max-reauth-req Parameter Description <1-10>...
  • Page 919 802.1X C OMMANDS X MAX REAUTH To configure the maximum number of reauthentication attempts for authentication profile 'student' to the default maximum number of two (2) reauthentication attempts, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# no dot1x max-reauth-req Validation show running-config Commands...
  • Page 920: Dot1X Port-Control

    802.1X C OMMANDS X PORT CONTROL dot1x port-control Overview This command enables 802.1X port authentication on the interface specified, and sets the control of the authentication port. The no variant of this command disables the port authentication on the interface specified.
  • Page 921 802.1X C OMMANDS X PORT CONTROL To disable port authentication on the interface port1.0.2, use the commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# no dot1x port-control To enable port authentication on authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)#...
  • Page 922: Dot1X Timeout Tx-Period

    802.1X C OMMANDS X TIMEOUT TX PERIOD dot1x timeout tx-period Overview This command sets the transmit timeout for the authentication request on the specified interface. The no variant of this command resets the transmit timeout period to the default (30 seconds). Syntax dot1x timeout tx-period <1-65535>...
  • Page 923 802.1X C OMMANDS X TIMEOUT TX PERIOD Validation auth profile (Global Configuration) Commands show dot1x show dot1x interface 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 924: Show Debugging Dot1X

    802.1X C OMMANDS SHOW DEBUGGING DOT show debugging dot1x Overview Use this command to display the 802.1X debugging option set. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus” Feature Overview and Configuration Guide. Syntax show debugging dot1x Mode...
  • Page 925: Show Dot1X

    802.1X C OMMANDS SHOW DOT show dot1x Overview This command shows authentication information for dot1x (802.1X) port authentication. If you specify the optional all parameter then this command also displays all authentication information for each port available on the switch. For information on filtering and saving command output, see the “Getting Started with AlliedWare_Plus”...
  • Page 926: Rev C Command Reference For Fs980M Series

    802.1X C OMMANDS SHOW DOT Table 1: Example output from the show dot1x all command (cont.) dot1x: enabled protocolVersion: 1 authMac: enabled method: PAP reauthRelearning: disabled authWeb: enabled method: PAP lockCount: 3 packetForwarding: disabled twoStepAuthentication: configured: enabled actual: enabled SupplicantMac: none supplicantMac: none...
  • Page 927 802.1X C OMMANDS SHOW DOT Table 1: Example output from the show dot1x all command (cont.) authEaplogoggWhileAuthenticating: 0 authReauthsWhileAuthenticated: 0 authEapstartWhileAuthenticated: 0 authEaplogoffWhileAuthenticated: 0 BackendResponses: 2 BackendAccessChallenges: 1 BackendOtherrequestToSupplicant: 3 BackendAuthSuccess: 1 BackendAuthFails: 0 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 928: Show Dot1X Diagnostics

    802.1X C OMMANDS SHOW DOT X DIAGNOSTICS show dot1x diagnostics Overview This command shows 802.1X authentication diagnostics for the specified interface (optional), which may be a static channel (or static aggregator) or a dynamic (or LACP) channel group or a switch port. If no interface is specified then authentication diagnostics are shown for all interfaces.
  • Page 929 802.1X C OMMANDS SHOW DOT X DIAGNOSTICS Output Figure 28-1: Example output from the show dot1x diagnostics command Authentication Diagnostics for interface port1.0.5 Supplicant address: 00d0.59ab.7037 authEnterConnecting: 2 authEaplogoffWhileConnecting: 1 authEnterAuthenticating: 2 authSuccessWhileAuthenticating: 1 authTimeoutWhileAuthenticating: 1 authFailWhileAuthenticating: 0 authEapstartWhileAuthenticating: 0 authEaplogoggWhileAuthenticating: 0...
  • Page 930: Show Dot1X Interface

    802.1X C OMMANDS SHOW DOT X INTERFACE show dot1x interface Overview This command shows the status of 802.1X port-based authentication on the specified interface, which may be a static channel (or static aggregator) or a dynamic (or LACP) channel group or a switch port. Use the optional diagnostics parameter to show authentication diagnostics for the specified interfaces.
  • Page 931 802.1X C OMMANDS SHOW DOT X INTERFACE Table 2: Example output from the show dot1x interface command for a port awplus#show dot1x interface port1.0.6Authentication info for interface port1.0.6 portEnabled: true - portControl: Auto portStatus: Authorized reAuthenticate: disabled reAuthPeriod: 3600 PAE: quietPeriod: 60 - maxReauthReq: 2 - txPeriod: 30 PAE: connectTimeout: 30 ...
  • Page 932 802.1X C OMMANDS SHOW DOT X INTERFACE awplus#show dot1x interface port1.0.6 diagnostics Authentication Diagnostics for interface port1.0.6 Supplicant address: 00d0.59ab.7037 authEnterConnecting: 2 authEaplogoffWhileConnecting: 1 authEnterAuthenticating: 2 authSuccessWhileAuthenticating: 1 authTimeoutWhileAuthenticating: 1 authFailWhileAuthenticating: 0 authEapstartWhileAuthenticating: 0 authEaplogoggWhileAuthenticating: 0 authReauthsWhileAuthenticated: 0 authEapstartWhileAuthenticated: 0 authEaplogoffWhileAuthenticated: 0...
  • Page 933 802.1X C OMMANDS SHOW DOT X INTERFACE awplus#show dot1x statistics interface port1.0.6802.1X statistics for interface port1.0.6 EAPOL Frames Rx: 5 - EAPOL Frames Tx: 16 EAPOL Start Frames Rx: 0 - EAPOL Logoff Frames Rx: 0 EAP Rsp/Id Frames Rx: 3 - EAP Response Frames Rx: 2 EAP Req/Id Frames Tx: 8 - EAP Request Frames Tx: 2...
  • Page 934 802.1X C OMMANDS SHOW DOT X INTERFACE Table 28-1: Parameters in the output of show dot1x interface (cont.) Parameter Description suppTimeout Supplicant timeout. serverTimeout Server timeout. maxReq Maximum requests to be sent. Controlled Directions State machine. adminControlledDi Administrative value (Both/In). r ections operControlledDir Operational Value (Both/In).
  • Page 935: Show Dot1X Sessionstatistics

    802.1X C OMMANDS SHOW DOT X SESSIONSTATISTICS show dot1x sessionstatistics Overview This command shows authentication session statistics for the specified interface, which may be a static channel (or static aggregator) or a dynamic (or LACP) channel group or a switch port. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 936: Show Dot1X Statistics Interface

    802.1X C OMMANDS SHOW DOT X STATISTICS INTERFACE show dot1x statistics interface Overview This command shows the authentication statistics for the specified interface, which may be a static channel (or static aggregator) or a dynamic (or LACP) channel group or a switch port. For information on filtering and saving command output, see the “Getting Started with AlliedWare Plus”...
  • Page 937: Show Dot1X Supplicant

    802.1X C OMMANDS SHOW DOT X SUPPLICANT show dot1x supplicant Overview This command shows the supplicant state of the authentication mode set for the switch. This command shows a summary when the optional brief parameter is used. For information on filtering and saving command output, see the “Getting Started with AlliedWare_Plus”...
  • Page 938 802.1X C OMMANDS SHOW DOT X SUPPLICANT Interface port1.0.6 authenticationMethod: dot1x totalSupplicantNum: 1 authorizedSupplicantNum: 1 macBasedAuthenticationSupplicantNum: 0 dot1xAuthenticationSupplicantNum: 1 webBasedAuthenticationSupplicantNum: 0 Interface VID Mode MAC Address Status IP Address Username ========= === ==== =========== ====== ========== ======== port1.0.6 00d0.59ab.7037 Authenticated 192.168.2.201 manager...
  • Page 939: Show Dot1X Supplicant Interface

    802.1X C OMMANDS SHOW DOT X SUPPLICANT INTERFACE show dot1x supplicant interface Overview This command shows the supplicant state of the authentication mode set for the interface, which may be a static channel (or static aggregator) or a dynamic (or LACP) channel group or a switch port.
  • Page 940 802.1X C OMMANDS SHOW DOT X SUPPLICANT INTERFACE Interface port1.0.6 authenticationMethod: dot1x totalSupplicantNum: 1 authorizedSupplicantNum: 1 macBasedAuthenticationSupplicantNum: 0 dot1xAuthenticationSupplicantNum: 1 webBasedAuthenticationSupplicantNum: 0 otherAuthenticationSupplicantNum: 0  Supplicant name: VCSPCVLAN10 Supplicant address: 0000.cd07.7b60 authenticationMethod: 802.1X Two-Step Authentication: firstAuthentication: Pass - Method: mac secondAuthentication: Pass - Method: dot1x...
  • Page 941 802.1X C OMMANDS SHOW DOT X SUPPLICANT INTERFACE awplus#show dot1x interface sa1 supplicant brief Interface sa1 authenticationMethod: dot1x Two-Step Authentication: firstMethod: mac secondMethod: dot1x totalSupplicantNum: 1 authorizedSupplicantNum: 1 macBasedAuthenticationSupplicantNum: 0 dot1xAuthenticationSupplicantNum: 1 webBasedAuthenticationSupplicantNum: 0 otherAuthenticationSupplicantNum: 0  Interface Mode MAC Address Status IP Address Username...
  • Page 942: Undebug Dot1X

    802.1X C OMMANDS UNDEBUG DOT undebug dot1x Overview This command applies the functionality of the no variant of the debug dot1x command. 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 943: Authentication Commands

    Authentication Commands Introduction Overview This chapter provides an alphabetical reference for authentication commands. For more information, see the AAA and Port Authentication Feature Overview and Configuration Guide. Command List • “auth auth-fail vlan” on page 946 • “auth critical” on page 948 •...
  • Page 944 UTHENTICATION OMMANDS • “auth timeout supp-timeout” on page 982 • “auth two-step enable” on page 984 • “auth-mac enable” on page 987 • “auth-mac method” on page 989 • “auth-mac password” on page 991 • “auth-mac reauth-relearning” on page 992 •...
  • Page 945 UTHENTICATION OMMANDS • “auth-web-server ssl intercept-port” on page 1026 • “copy proxy-autoconfig-file” on page 1027 • “copy web-auth-https-file” on page 1028 • “description (Authentication Profile)” on page 1029 • “erase proxy-autoconfig-file” on page 1030 • “erase web-auth-https-file” on page 1031 •...
  • Page 946: Auth Auth-Fail Vlan

    UTHENTICATION OMMANDS AUTH AUTH FAIL VLAN auth auth-fail vlan Overview Use this command to enable the auth-fail vlan feature on the specified vlan interface. This feature assigns supplicants (client devices) to the specified VLAN if they fail port authentication. Use the no variant of this command to disable the auth-fail vlan feature for a specified VLAN interface.
  • Page 947 UTHENTICATION OMMANDS AUTH AUTH FAIL VLAN as a supplicant on the Guest VLAN. For more information about ACL concepts, and configuring ACLs see the ACL Feature Overview and Configuration Guide. For more information about ACL commands see: • IPv4 Hardware Access Control List (ACL) Commands •...
  • Page 948: Auth Critical

    UTHENTICATION OMMANDS AUTH CRITICAL auth critical Overview This command enables the critical port feature on the interface. When the critical port feature is enabled on an interface, and all the RADIUS servers are unavailable, then the interface becomes authorized. The no variant of this command disables critical port feature on the interface. Syntax auth critical no auth critical...
  • Page 949: Auth Dynamic-Vlan-Creation

    UTHENTICATION OMMANDS AUTH DYNAMIC VLAN CREATION auth dynamic-vlan-creation Overview This command enables and disables the Dynamic VLAN assignment feature. The Dynamic VLAN assignment feature allows a supplicant (client device) to be placed into a specific VLAN based on information returned from the RADIUS server during authentication, on a given interface.
  • Page 950 UTHENTICATION OMMANDS AUTH DYNAMIC VLAN CREATION If you issue an auth dynamic-vlan-creation command without a rule parameter then a second supplicant with a different VLAN ID is rejected. It is not assigned to the first supplicant’s VLAN. Issuing an auth dynamic-vlan-creation command without a rule parameter has the same effect as issuing an auth dynamic-vlan-creation rule deny command rejecting supplicants with differing VIDs.
  • Page 951 UTHENTICATION OMMANDS AUTH DYNAMIC VLAN CREATION To enable the Dynamic VLAN assignment feature with Web Authentication on interface port1.0.2 when Web Authentication is needed, use the commands: awplus# configure terminal awplus(config)# auth-web-server ipaddress 1.2.3.4 awplus(config)# access-list hardware acl-web send-to-cpu ip any 1.2.3.4 awplus(config)# interface port1.0.2...
  • Page 952: Auth Guest-Vlan

    UTHENTICATION OMMANDS AUTH GUEST VLAN auth guest-vlan Overview This command enables and configures the Guest VLAN feature on the interface specified by associating a Guest VLAN with an interface. This command does not start authentication. The supplicant's (client device’s) traffic is associated with the native VLAN of the interface if its not already associated with another VLAN.
  • Page 953 UTHENTICATION OMMANDS AUTH GUEST VLAN The Guest VLAN routing mode in this release overcomes these issues. With the Guest VLAN routing mode, the switch can lease DHCP addresses and accept access to a limited network. Note that Guest VLAN can use only untagged ports. See the AAA and Port Authentication Feature Overview and Configuration Guide for information about:...
  • Page 954 UTHENTICATION OMMANDS AUTH GUEST VLAN auth guest-vlan forward dot1x port-control show dot1x show dot1x interface show running-config 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 955: Auth Guest-Vlan Forward

    UTHENTICATION OMMANDS AUTH GUEST VLAN FORWARD auth guest-vlan forward Overview Use this command to enable packet forwarding from the Guest VLAN to a destination IP address or subnet. If this command is configured, the device can lease DHCP addresses and accept access to a limited part of your network. Also, when using NAP authentication, the supplicant can log on to a domain controller to gain certification.
  • Page 956 UTHENTICATION OMMANDS AUTH GUEST VLAN FORWARD To disable forwarding of DNS packets from the guest VLAN to the destination IP address on port1.0.2, use the commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# no auth guest-vlan forward 10.0.0.1 dns To enable the tcp forwarding port 137 on authentication profile 'student', use the commands: awplus# configure terminal...
  • Page 957: Auth Host-Mode

    UTHENTICATION OMMANDS AUTH HOST MODE auth host-mode Overview This command selects the host mode on the specified interface. Use the no variant of this command to set host mode to the default setting (single host). Syntax auth host-mode {single-host|multi-host|multi-supplicant} no auth host-mode Parameter Description single-host...
  • Page 958 UTHENTICATION OMMANDS AUTH HOST MODE To set the host mode to default (single host) on interface port1.0.2, use the following commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# no auth host-mode To set the host mode to multi-supplicant on authentication profile ‘student’, use the commands: awplus# configure terminal...
  • Page 959: Auth Log

    UTHENTICATION OMMANDS AUTH LOG auth log Overview Use this command to configure the types of authentication feature log messages that are output to the log file. Use the no variant of this command to remove either specified types or all types of authentication feature log messages that are output to the log file.
  • Page 960 UTHENTICATION OMMANDS AUTH LOG To disable the logging of all types of authentication log messages to the log file for supplicants (client devices) connected to interface port1.0.2, use the following commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# no auth log all To configure the logging of web authentication failures to the log file for supplicants (client devices) connected to authentication profile ‘student’, use the commands:...
  • Page 961: Auth Max-Supplicant

    UTHENTICATION OMMANDS AUTH MAX SUPPLICANT auth max-supplicant Overview This command sets the maximum number of supplicants (client devices) that can be authenticated on the selected port. Once this value is exceeded, further supplicants will not be authenticated. The no variant of this command resets the maximum supplicant number to the default.
  • Page 962 UTHENTICATION OMMANDS AUTH MAX SUPPLICANT Related auth profile (Global Configuration) Commands show dot1x show dot1x interface show running-config 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 963: Auth Profile (Global Configuration)

    UTHENTICATION OMMANDS AUTH PROFILE LOBAL ONFIGURATION auth profile (Global Configuration) Overview Use this command to enter port authentication profile mode and configure a port authentication profile. If the specified profile does not exist a new authentication profile is created with the name provided.
  • Page 964: Auth Profile (Interface Configuration)

    UTHENTICATION OMMANDS AUTH PROFILE NTERFACE ONFIGURATION auth profile (Interface Configuration) Overview Use this command to attach a port authentication profile to the current interface. Use the no variant of this command to detach a port authentication profile from the current interface. Syntax auth profile <profile-name>...
  • Page 965: Auth Reauthentication

    UTHENTICATION OMMANDS AUTH REAUTHENTICATION auth reauthentication Overview This command enables re-authentication on the interface specified in the Interface mode, which may be a static channel group (or static aggregator) or a dynamic (or LACP) channel group or a switch port. Use the no variant of this command to disables reauthentication on the interface.
  • Page 966: Auth Roaming Disconnected

    UTHENTICATION OMMANDS AUTH ROAMING DISCONNECTED auth roaming disconnected Overview This command allows a supplicant to move to another authenticating interface without reauthentication, even if the link is down for the interface that the supplicant is currently connected to. You must enter the auth roaming enable command on both interfaces before using this command.
  • Page 967 UTHENTICATION OMMANDS AUTH ROAMING DISCONNECTED To allow supplicants using authentication profile ‘student’ to move between ports without reauthentication even when the link is down, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# auth roaming disconnected To require supplicants using authentication profile ‘student’ to reauthenticate when moving between ports if the link is down, use the commands: awplus# configure terminal...
  • Page 968: Auth Roaming Enable

    UTHENTICATION OMMANDS AUTH ROAMING ENABLE auth roaming enable Overview This command allows a supplicant to move to another authenticating interface without reauthentication, providing the link is up for the interface that the supplicant is is currently connected to. The no variant of this command disables roaming authentication on an interface, and forces a supplicant to be reauthenticated when moving between interfaces.
  • Page 969 UTHENTICATION OMMANDS AUTH ROAMING ENABLE To disable roaming authentication for authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# no auth roaming enable Related auth profile (Global Configuration) Commands auth-mac enable auth roaming disconnected auth-web enable dot1x port-control show auth interface show dot1x interface...
  • Page 970: Auth Supplicant-Ip

    UTHENTICATION OMMANDS AUTH SUPPLICANT auth supplicant-ip Overview This command adds a supplicant (client device) IP address on a given interface and provides parameters for its configuration. Use the no variant of this command to delete the supplicant IP address and reset other parameters to their default values.
  • Page 971 UTHENTICATION OMMANDS AUTH SUPPLICANT Default No supplicant IP address for port authentication exists by default until first created with the auth supplicant-ip command. The defaults for parameters applied are as shown in the table above. Mode Interface Configuration for a static channel, a dynamic (LACP) channel group, a switch port, or Authentication Profile.
  • Page 972: Auth Supplicant-Mac

    UTHENTICATION OMMANDS AUTH SUPPLICANT auth supplicant-mac Overview This command adds a supplicant (client device) MAC address or MAC mask on a given interface with the parameters as specified in the table below. Use the no variant of this command to delete the supplicant MAC address and reset other parameters to their default values.
  • Page 973 UTHENTICATION OMMANDS AUTH SUPPLICANT Parameter Description supp-timeout Supplicant response timeout (default 30 seconds). <1-65535> Seconds for supplicant response timeout. server-timeout Authentication server response timeout (default 30 seconds). <1-65535> Seconds for authentication server response timeout. reauthentication Enable reauthentication on a port. max-reauth-req No of reauthentication attempts before becoming unauthorized (default 2).
  • Page 974 UTHENTICATION OMMANDS AUTH SUPPLICANT To add the supplicant MAC address 0000.5E00.5343 to force authorized port control for authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# auth supplicant-mac 0000.5E00.5343 port-control force-authorized To delete the supplicant MAC address 0000.5E00.5343 for authentication profile ‘student’, use the commands: awplus# configure terminal...
  • Page 975: Auth Timeout Connect-Timeout

    UTHENTICATION OMMANDS AUTH TIMEOUT CONNECT TIMEOUT auth timeout connect-timeout Overview This command sets the connect-timeout period for the interface. Use the no variant of this command to reset the connect-timeout period to the default. Syntax auth timeout connect-timeout <1-65535> no auth timeout connect-timeout Parameter Description <1-65535>...
  • Page 976 UTHENTICATION OMMANDS AUTH TIMEOUT CONNECT TIMEOUT To reset the connect-timeout period to the default (30 seconds) for authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# no auth timeout connect-timeout Related auth profile (Global Configuration) Commands show dot1x show dot1x interface...
  • Page 977: Auth Timeout Quiet-Period

    UTHENTICATION OMMANDS AUTH TIMEOUT QUIET PERIOD auth timeout quiet-period Overview This command sets a time period for which another authentication request is not accepted on a given interface, after an authentication request has failed. Use the no variant of this command to reset the quiet period to the default. Syntax auth timeout quiet-period <1-65535>...
  • Page 978: Auth Timeout Reauth-Period

    UTHENTICATION OMMANDS AUTH TIMEOUT REAUTH PERIOD auth timeout reauth-period Overview This command sets the timer for reauthentication on a given interface. The re-authentication for the supplicant (client device) is executed at this timeout. The timeout is only applied if the auth reauthentication command is applied. Use the no variant of this command to reset the reauth-period parameter to the default (3600 seconds).
  • Page 979 UTHENTICATION OMMANDS AUTH TIMEOUT REAUTH PERIOD Related auth profile (Global Configuration) Commands auth reauthentication show dot1x show dot1x interface show running-config 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 980: Auth Timeout Server-Timeout

    UTHENTICATION OMMANDS AUTH TIMEOUT SERVER TIMEOUT auth timeout server-timeout Overview This command sets the timeout for the waiting response from the RADIUS server on a given interface. The no variant of this command resets the server-timeout to the default (30 seconds).
  • Page 981 UTHENTICATION OMMANDS AUTH TIMEOUT SERVER TIMEOUT Related auth profile (Global Configuration) Commands show dot1x show dot1x interface show running-config 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 982: Auth Timeout Supp-Timeout

    UTHENTICATION OMMANDS AUTH TIMEOUT SUPP TIMEOUT auth timeout supp-timeout Overview This command sets the timeout of the waiting response from the supplicant (client device) on a given interface. The no variant of this command resets the supplicant timeout to the default (30 seconds).
  • Page 983 UTHENTICATION OMMANDS AUTH TIMEOUT SUPP TIMEOUT Related auth profile (Global Configuration) Commands show dot1x show dot1x interface show running-config 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™ Operating System - Version 5.4.7-0.x...
  • Page 984: Auth Two-Step Enable

    UTHENTICATION OMMANDS AUTH TWO STEP ENABLE auth two-step enable Overview This command enables a two-step authentication feature on an interface. When this feature is enabled, the supplicant is authorized in a two-step process. If authentication succeeds, the supplicant becomes authenticated. This command will apply the two-step authentication method based on 802.1X-, MAC- or Web-Authentication.
  • Page 985 UTHENTICATION OMMANDS AUTH TWO STEP ENABLE To enable MAC-Authentication followed by Web-Authentication, use the following commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# switchport mode access awplus(config-if)# auth-mac enable awplus(config-if)# auth-web enable awplus(config-if)# auth dynamic-vlan-creation awplus(config-if)# auth two-step enable To enable 802.1X-Authentication followed by Web-Authentication, use the following commands: awplus# configure terminal...
  • Page 986 UTHENTICATION OMMANDS AUTH TWO STEP ENABLE Relat ed auth profile (Global Configuration) Commands show auth two-step supplicant brief show auth show auth interface show auth supplicant show dot1x show dot1x interface show dot1x supplicant 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 987: Auth-Mac Enable

    UTHENTICATION OMMANDS AUTH MAC ENABLE auth-mac enable Overview This command enables MAC-based authentication on the interface specified in the Interface command mode. Use the no variant of this command to disable MAC-based authentication on an interface. Syntax auth-mac enable no auth-mac enable Default MAC-Authentication is disabled by default.
  • Page 988 UTHENTICATION OMMANDS AUTH MAC ENABLE To disable MAC authentication on authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# no auth-mac enable Related auth profile (Global Configuration) Commands show auth show auth interface show running-config 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 989: Auth-Mac Method

    UTHENTICATION OMMANDS AUTH MAC METHOD auth-mac method Overview This command sets the type of authentication method for MAC-Authentication that is used with RADIUS on the interface specified in the Interface command mode. The no variant of this command resets the authentication method used to the default method (PAP) as the RADIUS authentication method used by the MAC-Authentication.
  • Page 990 UTHENTICATION OMMANDS AUTH MAC METHOD To disable MAC authentication on authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# no auth-mac enable Related auth profile (Global Configuration) Commands show auth show auth interface show running-config 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 991: Auth-Mac Password

    UTHENTICATION OMMANDS AUTH MAC PASSWORD auth-mac password Overview This command changes the password for MAC-based authentication. Use the no variant of this command to return the password to its default. Syntax auth-mac [encrypted] password <password> no auth-mac password Parameter Description auth-mac MAC-based authentication encrypted...
  • Page 992: Auth-Mac Reauth-Relearning

    UTHENTICATION OMMANDS AUTH MAC REAUTH RELEARNING auth-mac reauth-relearning Overview This command sets the MAC address learning of the supplicant (client device) to re-learning for re-authentication on the interface specified in the Interface command mode. Use the no variant of this command to disable the auth-mac re-learning option. Syntax auth-mac reauth-relearning no auth-mac reauth-relearning...
  • Page 993: Auth-Mac Username

    UTHENTICATION OMMANDS AUTH MAC USERNAME auth-mac username Overview Use this command to specify the format of the MAC address in the username and password field when a request for MAC-based authorization is sent to a RADIUS server. auth-mac username {ietf|unformatted} {lower-case|upper-case} Syntax Parameter Description...
  • Page 994: Auth-Web Enable

    UTHENTICATION OMMANDS AUTH WEB ENABLE auth-web enable Overview This command enables Web-based authentication in Interface mode on the interface specified. Use the no variant of this command to apply its default. Syntax auth-web enable no auth-web enable Default Web-Authentication is disabled by default. Mode Interface Configuration for a static channel, a dynamic (LACP) channel group, or a switch port;...
  • Page 995 UTHENTICATION OMMANDS AUTH WEB ENABLE To disable Web authentication on authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# no auth-web enable Related auth profile (Global Configuration) Commands show auth show auth interface show running-config 613-50157-01 Rev C Command Reference for FS980M Series AlliedWare Plus™...
  • Page 996: Auth-Web Forward

    UTHENTICATION OMMANDS AUTH WEB FORWARD auth-web forward Overview This command enables the Web-authentication packet forwarding feature on the interface specified. This command also enables ARP forwarding, and adds forwarded packets to the tcp or udp port number specified. The no variant of this command disables the specified packet forwarding feature on the interface.
  • Page 997 UTHENTICATION OMMANDS AUTH WEB FORWARD Examples To enable the ARP forwarding feature on interface port1.0.2, use the following commands: awplus# configure terminal awplus(config)# interface port1.0.2 awplus(config-if)# auth-web forward arp To add the TCP forwarding port 137 on interface port1.0.2, use the following commands: awplus# configure terminal...
  • Page 998 UTHENTICATION OMMANDS AUTH WEB FORWARD To add the tcp forwarding port 137 on authentication profile ‘student’, use the commands: awplus# configure terminal awplus(config)# auth profile student awplus(config-auth-profile)# auth-web forward tcp 137 To disable the ARP forwarding feature on authentication profile ‘student’, use the commands: awplus# configure terminal...
  • Page 999: Auth-Web Max-Auth-Fail

    UTHENTICATION OMMANDS AUTH WEB MAX AUTH FAIL auth-web max-auth-fail Overview This command sets the number of authentication failures allowed before rejecting further authentication requests. When the supplicant (client device) fails more than the specified number of times, then login requests are refused during the quiet period.
  • Page 1000 UTHENTICATION OMMANDS AUTH WEB MAX AUTH FAIL Related auth profile (Global Configuration) Commands auth timeout quiet-period show auth show auth interface show running-config 613-50157-01 Rev C Command Reference for FS980M Series 1000 AlliedWare Plus™ Operating System - Version 5.4.7-0.x...

Table of Contents