HPE FlexFabric 5940 Series Fundamentals Command Reference

HPE FlexFabric 5940 Series Fundamentals Command Reference

Hide thumbs Also See for FlexFabric 5940 Series:
Table of Contents

Advertisement

HPE FlexFabric 5940 Switch Series
Fundamentals Command Reference
Part number: 5200-1008b
Software version: Release 25xx
Document version: 6W102-20170830

Advertisement

Table of Contents
loading

Summary of Contents for HPE FlexFabric 5940 Series

  • Page 1 HPE FlexFabric 5940 Switch Series Fundamentals Command Reference Part number: 5200-1008b Software version: Release 25xx Document version: 6W102-20170830...
  • Page 2 © Copyright 2017 Hewlett Packard Enterprise Development LP The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
  • Page 3: Table Of Contents

    Contents Basic CLI commands ········································································ 1   alias ································································································································· 1   display | { begin | exclude | include } ························································································ 2   display | by-linenum ············································································································· 3   display > ···························································································································· 4   display >> ·························································································································· 5   display alias ······················································································································· 6  ...
  • Page 4 ip http acl ························································································································· 63   ip http enable ···················································································································· 63   ip http port ······················································································································· 64   ip https acl ······················································································································· 65   ip https certificate access-control-policy·················································································· 65   ip https enable ·················································································································· 66   ip https port ······················································································································ 67  ...
  • Page 5 display ftp client source ···································································································· 106   ftp ································································································································ 106   ftp client ipv6 source ········································································································ 107   ftp client source ··············································································································· 108   ftp ipv6 ·························································································································· 109   get ······························································································································· 110   help ······························································································································ 111   lcd ································································································································ 112  ...
  • Page 6 Configuration file management commands ········································ 155   archive configuration ········································································································ 155   archive configuration interval ····························································································· 155   archive configuration location ····························································································· 156   archive configuration max ································································································· 157   backup startup-configuration ······························································································ 158   configuration commit ········································································································ 159   configuration commit delay ································································································...
  • Page 7 Device management commands ····················································· 215   clock datetime ················································································································ 215   clock protocol ················································································································· 215   clock summer-time ·········································································································· 216   clock timezone ················································································································ 218   command ······················································································································ 219   copyright-info enable ········································································································ 220   display alarm ·················································································································· 220   display clock ···················································································································...
  • Page 8 time repeating ················································································································· 262   usb disable ···················································································································· 264   user-role ························································································································ 264   Tcl commands ············································································· 266   cli ································································································································· 266   tclquit ···························································································································· 266   tclsh ····························································································································· 267   Python commands ········································································ 268   exit() ····························································································································· 268   python ···························································································································...
  • Page 9: Basic Cli Commands

    Basic CLI commands alias Use alias to configure a command alias. Use undo alias to delete a command alias. Syntax alias alias command undo alias alias Default The device has a set of system-defined command aliases, as listed in Table Table 1 System-defined command aliases Command alias Command or command keyword...
  • Page 10: Display | { Begin | Exclude | Include

    • Enter ship routing-table to execute the display ip routing-table command. • Enter ship interface to execute the display ip interface command. The command string can include up to nine parameters. Each parameter starts with the dollar sign ($) and a sequence number in the range of 1 to 9. For example, you can configure the alias shinc for the display ip $1 | include $2 command.
  • Page 11: Display | By-Linenum

    Predefined user roles network-admin network-operator Parameters command: Specifies the keywords and arguments of a display command. To display available keywords and arguments, enter display ?. begin: Displays the first line matching the specified regular expression and all subsequent lines. exclude: Displays all lines not matching the specified regular expression. include: Displays all lines matching the specified regular expression.
  • Page 12: Display

    VLAN type: Static Route interface: Configured IP address: 192.168.2.1 Subnet mask: 255.255.255.0 Description: For LAN Access Name: VLAN 0999 Tagged ports: None Untagged ports: Ten-GigabitEthernet1/0/1 # Display the first line that begins with user-group in the running configuration and all of the following lines.
  • Page 13: Display

    Tagged ports: None Untagged ports: Ten-GigabitEthernet1/0/2 display >> Use display >> to append the output from a display command to the end of a file. Syntax display command >> filename Views Any view Predefined user roles network-admin network-operator Parameters command: Specifies the keywords and arguments of a display command. To display available keywords and arguments, enter display ?.
  • Page 14: Display Alias

    Tagged ports: None Untagged ports: Ten-GigabitEthernet1/0/2 display alias Use display alias to display command aliases. Syntax display alias [ alias ] Views Any view Predefined user roles network-admin network-operator Parameters alias: Specifies a command alias. If you do not specify this argument, the command displays all command aliases.
  • Page 15: Display History-Command All

    Views Any view Predefined user roles network-admin network-operator Usage guidelines The system automatically saves commands you have successfully executed to the command history buffer for the current CLI session. You can view them and execute them again. By default, the system can save up to 10 commands in the buffer. You can use the history-command max-size command to change the buffer size.
  • Page 16: Display Hotkey

    Cmd:dis his all 03/16/2012 20:03:29 vty0 192.168.1.26 Cmd:sys Table 2 Command output Field Description Date Date when the command was executed. Time Time when the command was executed. Terminal User line used by the user. IP address of the terminal used by the user. Username used by the user if the user login authentication mode is User scheme.
  • Page 17: Hotkey

    CTRL_C Stop the current command. CTRL_D Erase the character at the cursor. CTRL_E Move the cursor to the end of the line. CTRL_F Move the cursor one character to the right. CTRL_H Erase the character to the left of the cursor. CTRL_K Abort the connection request.
  • Page 18: Quit

    ctrl_l: Assigns a command to Ctrl+L. ctrl_o: Assigns a command to Ctrl+O. ctrl_t: Assigns a command to Ctrl+T. ctrl_u: Assigns a command to Ctrl+U. command: Specifies the command to be assigned to the hotkey. Usage guidelines The system defines some command hotkeys and provides five configurable command hotkeys. Pressing a command hotkey executes the command assigned to the hotkey.
  • Page 19 Predefined user roles network-admin Parameters number: Specifies the number of the most recently executed commands in the command history buffer for the current CLI session that you want to execute. The value range is 1 to 10. The default is count times: Specifies the number of times that you want to execute the commands.
  • Page 20: Return

    return Use return to return to user view from any other view. Syntax return Views Any view except user view Predefined user roles network-admin network-operator Usage guidelines Pressing Ctrl+Z has the same effect as the return command. Examples # Return to user view from Ten-GigabitEthernet 1/0/1 interface view. [Sysname-Ten-GigabitEthernet1/0/1] return <Sysname>...
  • Page 21: Screen-Length Disable

    Examples # Disable pausing between screens of output for the current CLI session. <Sysname> screen-length disable Related commands screen-length system-view Use system-view to enter system view from user view. Syntax system-view Views User view Predefined user roles network-admin network-operator Examples # Enter system view from user view.
  • Page 22: Rbac Commands

    RBAC commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. description Use description to configure a description for a user role for easy identification.
  • Page 23 Parameters name role-name: Specifies a user role name, a case-sensitive string of 1 to 63 characters. If you do not specify a user role name, the command displays information about all user roles, including the predefined user roles. Examples # Display information about user role 123. <Sysname>...
  • Page 24 VLAN policy: permit (default) Interface policy: permit (default) VPN instance policy: permit (default) ------------------------------------------------------------------- Rule Perm Type Scope Entity ------------------------------------------------------------------- sys-1 permit command display * sys-2 permit command sys-3 permit command system-view ; probe ; display * sys-4 deny command display history-command all sys-5 deny...
  • Page 25 VLAN policy: permit (default) Interface policy: permit (default) VPN instance policy: permit (default) ------------------------------------------------------------------- Rule Perm Type Scope Entity ------------------------------------------------------------------- sys-1 permit command tracert * sys-2 permit command telnet * sys-3 permit command ping * sys-4 permit command ssh2 * sys-5 permit command...
  • Page 26 Interface policy: permit (default) VPN instance policy: permit (default) Role: level-8 Description: Predefined level-8 role VLAN policy: permit (default) Interface policy: permit (default) VPN instance policy: permit (default) Role: level-9 Description: Predefined level-9 role VLAN policy: permit (default) Interface policy: permit (default) VPN instance policy: permit (default) ------------------------------------------------------------------- Rule...
  • Page 27 Role: level-14 Description: Predefined level-14 role VLAN policy: permit (default) Interface policy: permit (default) VPN instance policy: permit (default) Role: level-15 Description: Predefined level-15 role VLAN policy: permit (default) Interface policy: permit (default) VPN instance policy: permit (default) ------------------------------------------------------------------- Rule Perm Type Scope...
  • Page 28 sys-15 permit command undelete * sys-16 permit command ftp * sys-17 permit command sftp * R:Read W:Write X:Execute Role: guest-manager Description: Predefined guest manager role can't access to commands VLAN policy: permit (default) Interface policy: permit (default) VPN instance policy: permit (default) ------------------------------------------------------------------- Rule Perm...
  • Page 29: Display Role Feature

    Field Description VPN instance policy of the user role: • deny—Denies access to all VPN instances except for permitted VPN instance policy VPN instances. • permit (default)—Default VPN instance policy, which enables the user role to access all VPN instances. Permitted VPN instances VPN instances accessible to the user role.
  • Page 30 Parameters name feature-name: Specifies a feature by feature name. The feature-name argument represents the feature name, and all letters must be in lower case. verbose: Displays the commands of each feature. Usage guidelines If you do not specify any parameters, the command displays only the list of features available in the system.
  • Page 31: Display Role Feature-Group

    debugging local-server * super * display password-control * reset password-control * system-view ; password-control * … Table 4 Command output (display role feature name aaa) Field Description Feature Displays the name and brief function description of the feature. All commands that start with the domain keyword in system view, system-view ;...
  • Page 32 Syntax display role feature-group [ name feature-group-name ] [ verbose ] Views Any view Predefined user roles network-admin network-operator Parameters name feature-group-name: Specifies a feature group. The feature-group-name argument represents the feature group name, a case-sensitive string of 1 to 31 characters. If you do not specify a feature group, the command displays information about all feature groups.
  • Page 33 Feature: bgp (Border Gateway Protocol related commands) Feature: l3vpn (Layer 3 Virtual Private Network related commands) Feature: route-policy (Routing Policy related commands) Feature: multicast (Multicast related commands) Feature: pim (Protocol Independent Multicast related commands) Feature: igmp (Internet Group Management Protocol related commands) Feature: mld (Multicast Listener Discovery related commands) Feature: mcast-domain...
  • Page 34: Feature

    system-view ; probe ; display system internal ipv6 l2-multicast * system-view ; probe ; display system internal ipv6 multicast-vlan * reset mld-snooping * reset ipv6 pim-snooping * reset ipv6 multicast-vlan * reset ipv6 l2-multicast * debugging mld-snooping * display debugging mld-snooping * system-view ;...
  • Page 35: Interface Policy Deny

    Parameters feature-name: Specifies a feature name. You must enter the feature name in lower case. Usage guidelines Repeat the feature command to add multiple features to a feature group. Examples # Add the AAA and ACL features to feature group security-features. <Sysname>...
  • Page 36: Permit Interface

    Any change to a user role interface policy takes effect only on users who log in with the user role after the change. Examples # Enter user role interface policy view of role1, and deny role1 to access all interfaces. <Sysname>...
  • Page 37: Permit Vlan

    • Create, remove, or configure the interfaces. • Enter the interface views. • Specify the interfaces in feature commands. The create and remove operations are available only for logical interfaces. You can repeat the permit interface command to add multiple permitted interfaces to a user role interface policy.
  • Page 38 Syntax permit vlan vlan-id-list undo permit vlan [ vlan-id-list ] Default No permitted VLANs are configured in user role VLAN policy view. Views User role VLAN policy view Predefined user roles network-admin Parameters vlan-id-list: Specifies a space-separated list of up to 10 VLAN items. Each VLAN item specifies a VLAN by VLAN ID or specifies a range of VLANs in the form of vlan-id1 to vlan-id2.
  • Page 39: Permit Vpn-Instance

    [Sysname] interface ten-gigabitethernet 1/0/1 [Sysname-Ten-GigabitEthernet1/0/1] port access vlan 100 [Sysname-Ten-GigabitEthernet1/0/1] quit # Verify that you cannot create VLAN 101 or enter VLAN view. [Sysname] vlan 101 Permission denied. Related commands display role role vlan policy deny permit vpn-instance Use permit vpn-instance to configure a list of MPLS L3VPN instances accessible to a user role. Use undo permit vpn-instance to disable the access of a user role to specific MPLS L3VPN instances.
  • Page 40: Role

    Examples Configure user role role1: # Permit the user role to execute all commands available in system view and in the child views of system view. <Sysname> system-view [Sysname] role name role1 [Sysname-role-role1] rule 1 permit command system-view ; * # Permit the user role to access VPN instance vpn1.
  • Page 41: Role Default-Role Enable

    Parameters name role-name: Specifies a username. The role-name argument is a case-sensitive string of 1 to 63 characters. Usage guidelines You can create a maximum of 64 user roles in addition to the predefined user roles. You cannot delete the predefined user roles or change the permissions assigned to network-admin, network-operator, level-15, or security-audit.
  • Page 42: Role Feature-Group

    Usage guidelines The default user role feature assigns the default user role to AAA-authenticated users if the authentication server (local or remote) does not assign any user roles to the users. These users are allowed to access the system with the default user role. If AAA users have been assigned user roles, they log in with the user roles.
  • Page 43: Rule

    display role feature-group feature rule Use rule to create or change a user role rule. Use undo rule to delete user role rules. Syntax rule number { deny | permit } { command command-string | { execute | read | write } * { feature [ feature-name ] | feature-group feature-group-name | oid oid-string | xml-element [ xml-string ] } } undo rule { number | all } Default...
  • Page 44 xml-element [ xml-string ]: Specifies an XML element. The xml-string argument represents the XPath of the XML element, a case-insensitive string of 1 to 255 characters. Use the forward slash (/) to separate Xpath items, for example, Interfaces/Index/Name. If you do not specify an XML element, the rule applies to all XML elements.
  • Page 45 rule 3 permit read write oid 1.3.6.1.4.1 When you specify a command string, follow the guidelines in Table Table 5 Command string configuration rules Rule Guidelines Use a semicolon to separate the command of each view that you must enter before you access a command or a set of commands. However, do not use a semicolon to separate commands available in user view or any view, for example, display and dir.
  • Page 46: Super

    Rule Guidelines The system does not treat the redirect signs and the parameters that follow the signs as part of command lines. However, in user role Do not include the vertical bar (|), command rules, these redirect signs and parameters are handled as greater-than sign (>), or double part of command lines.
  • Page 47: Super Authentication-Mode

    Parameters role-name: Specifies a user role, a case-sensitive string of 1 to 63 characters. The user role must exist in the system and cannot be security-audit. If you do not specify a user role, you obtain the default target user role which is set by using the super default role command. Usage guidelines The obtained user role is a temporary user role, because this command is effective only on the current login.
  • Page 48: Super Default Role

    scheme: Enables remote AAA authentication. Usage guidelines For local password authentication, use the super password command to set a password. For remote AAA authentication, set the username and password on the RADIUS or HWTACACS server. If you specify both local and scheme keywords, the keyword first entered in the command takes precedence.
  • Page 49: Super Password

    Usage guidelines The default target user role is applied to the super or super password command when you do not specify a user role for the command. Examples # Specify network-operator as the default target user role for temporary user role authorization. <Sysname>...
  • Page 50: Vlan Policy Deny

    Usage guidelines If you do not specify any parameters, you specify a plaintext password in the interactive mode. The FIPS mode supports only the interactive mode for setting a password. Set a password if you configure local password authentication for temporary user role authorization. It is a good practice to specify different passwords for different user roles.
  • Page 51: Vpn-Instance Policy Deny

    • Create, remove, or configure the VLAN. • Enter VLAN view. • Specify the VLAN in feature commands. Any change to a user role VLAN policy takes effect only on users who log in with the user role after the change. Examples # Enter user role VLAN policy view of role1, and deny the access of role1 to all VLANs.
  • Page 52 NOTE: The vpn-instance policy deny command denies the access of the user role to all VPN instances if the permit vpn-instance command is not configured. To configure a VPN instance, make sure the VPN instance is permitted by the user role VPN instance policy in use.
  • Page 53: Login Management Commands

    Login management commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. Some login management commands are available in both user line view and user line class view.
  • Page 54 Table 6 ASCII code values for combined keys that use the Ctrl key Combined key ASCII code value Ctrl+A Ctrl+B Ctrl+C Ctrl+D Ctrl+E Ctrl+F Ctrl+G Ctrl+H Ctrl+I Ctrl+J Ctrl+K Ctrl+L Ctrl+M Ctrl+N Ctrl+O Ctrl+P Ctrl+Q Ctrl+R Ctrl+S Ctrl+T Ctrl+U Ctrl+V Ctrl+W Ctrl+X Ctrl+Y...
  • Page 55: Authentication-Mode

    Press ENTER to get started. Press Enter. Pressing Enter does not start a session. Press s. A terminal session is started. <Sysname> authentication-mode Use authentication-mode to set the authentication mode for a user line. Use undo authentication-mode to restore the default. Syntax In non-FIPS mode: authentication-mode { none | password | scheme }...
  • Page 56: Auto-Execute Command

    An authentication mode change does not take effect for the current session. It takes effect for subsequent login sessions. Examples # Enable the none authentication mode for VTY line 0. <Sysname> system-view [Sysname] line vty 0 [Sysname-line-vty0] authentication-mode none # Enable password authentication for VTY line 0 and set the password to 321. <Sysname>...
  • Page 57 Usage guidelines CAUTION: After configuring this command for a user line, you might be unable to access the CLI through the user line. Make sure you can access the CLI through a different user line before you configure this command and save the configuration. The device will automatically execute the specified command when a user logs in through the user line, and close the user connection after the command is executed.
  • Page 58: Command Accounting

    command accounting Use command accounting to enable command accounting. Use undo command accounting to disable command accounting. Syntax command accounting undo command accounting Default Command accounting is disabled. The accounting server does not record executed commands. Views User line view User line class view Predefined user roles network-admin...
  • Page 59: Databits

    Views User line view User line class view Predefined user roles network-admin Usage guidelines When command authorization is enabled, a user can only use commands that are permitted by both the AAA scheme and user role. A configuration change made by this command does not take effect for the current session. It takes effect for subsequent login sessions.
  • Page 60: Display Ip Http

    Usage guidelines This command is not supported in VTY line class view. Only modem dial-in supports keywords 5 and 6. This setting must be the same as the setting on the configuration terminal. Examples # Configure AUX 0 to use seven data bits for a character. <Sysname>...
  • Page 61: Display Line

    Views Any view Predefined user roles network-admin network-operator Examples # Display HTTPS service configuration and status information. <Sysname> display ip https HTTPS port: 443 SSL server policy: test Certificate access control policy: Not configured Basic ACL: 2222 HTTPS status: Enabled Table 8 Command output Field Description...
  • Page 62 Parameters number1: Specifies the absolute number of a user line. The value range is 0 to 73. aux: Specifies the AUX line. vty: Specifies the VTY line. number2: Specifies the relative number of a user line. The value range is 0 to 9 for AUX lines and 0 to 63 for VTY lines.
  • Page 63: Display Telnet Client

    Table 10 Command output Fields Description Type of the user line: • — AUX line. Line type • — VTY line. number: Absolute number of the first user line in the user line class. number:status status: User line status. X is for unused and U is for used. display telnet client Use display telnet client to display the packet source setting for the Telnet client.
  • Page 64 vty: Specifies the VTY line. number2: Specifies the relative number of a user line. The value range is 0 to 9 for AUX lines and 0 to 63 for VTY lines. summary: Displays summary information about user lines. If you do not specify this keyword, the detailed information is displayed.
  • Page 65: Display Users

    Table 12 Command output Fields Description Type of the user line: • AUX—AUX line. Line type • — VTY line. number: Absolute number of the first user line in the user line class. number:status status: User line status. X is for unused and U is for used. display users Use display users to display online CLI users.
  • Page 66: Escape-Key

    Field Description User type: • TEL—Telnet user. Type • SSH—SSH user. • For a user who logged in through the console port, this field does not display anything. User line you are using. Location IP address of the user. escape-key Use escape-key to set the escape key.
  • Page 67: Flow-Control

    The undo escape-key command disables the current escape key. After you execute this undo command, no escape key is available. This command is available in both user line view and user line class view. A non-default setting in either view takes precedence over a default setting in the other view. A non-default setting in user line view takes precedence over a non-default setting in user line class view.
  • Page 68: Free Line

    none: Disables flow control. software: Performs software flow control. Usage guidelines This command is not supported in VTY line view. The device supports flow control in both the inbound and outbound directions. • For flow control in the inbound direction, the local device listens to flow control information from the remote device.
  • Page 69: History-Command Max-Size

    Syntax free user-interface { number1 | { aux | vty } number2 } Views User view Predefined user roles network-admin Parameters number1: Specifies the absolute number of a user line. The value range is 0 to 73. aux: Specifies the AUX line. vty: Specifies the VTY line.
  • Page 70: Idle-Timeout

    Usage guidelines Each user line uses a separate command history buffer to store commands successfully executed by its user. The buffer size determines how many history commands the buffer can store. To display history commands in the buffer for your session, press the up or down arrow key, or execute the display history-command command.
  • Page 71: Ip Http Acl

    <Sysname> system-view [Sysname] line vty 0 [Sysname-line-vty0] idle-timeout 1 30 ip http acl Use ip http acl to apply an ACL to the HTTP service. Use undo ip http acl to restore the default. Syntax ip http acl { acl-number | name acl-name } undo ip http acl Default No ACL is applied to the HTTP service.
  • Page 72: Ip Http Port

    Default The HTTP service is disabled. Views System view Predefined user roles network-admin Usage guidelines This command is not supported in FIPS mode. Examples # Enable the HTTP service. <Sysname> system-view [Sysname] ip http enable Related commands ip https enable ip http port Use ip http port to specify the HTTP service port number.
  • Page 73: Ip Https Acl

    ip https acl Use ip https acl to apply an ACL to the HTTPS service. Use undo ip https acl to restore the default. Syntax ip https acl {acl-number | name acl-name } undo ip https acl Default No ACL is applied to the HTTP service. Views System view Predefined user roles...
  • Page 74: Ip Https Enable

    Predefined user roles network-admin Parameters policy-name: Specifies a certificate-based access control policy by its name, a case-sensitive string of 1 to 31 characters. Usage guidelines For more information about the certificate-based access control policy, see the chapter on PKI in Security Configuration Guide.
  • Page 75: Ip Https Port

    ip https ssl-server-policy ip https port Use ip https port to specify the HTTPS service port number. Use undo ip https port to restore the default. Syntax ip https port port-number undo ip https port Default The HTTPS service port number is 443. Views System view Predefined user roles...
  • Page 76: Line

    Usage guidelines If the HTTP service and HTTPS service are enabled, changes to the applied SSL server policy do not take effect. For the changes to take effect, you must disable HTTP and HTTPS, and then apply the policy and enable HTTP and HTTPS again. To restore the default, you must disable HTTP and HTTPS, execute the undo ip https ssl-server-policy command, and then enable HTTP and HTTPS again.
  • Page 77: Line Class

    line class Use line class to enter user line class view. Syntax line class { aux | vty } Views System view Predefined user roles network-admin Parameters aux: Specifies the AUX line class view. vty: Specifies the VTY line class view. Usage guidelines To configure the same settings for all user lines of a line class, use this command to enter the user line class view.
  • Page 78: Lock

    [Sysname-line-class-vty] idle-timeout 15 # In AUX line class view, configure the character s as the terminal session activation key. <Sysname> system-view [Sysname] line class aux [Sysname-line-class-aux] activation-key s [Sysname-line-class-aux] quit # In the view of AUX line 0, restore the default terminal session activation key. [Sysname] line aux 0 [Sysname-line-aux0] undo activation-key Alternatively, you can use the following command:...
  • Page 79: Lock Reauthentication

    Examples # Lock the current user line and set the password for unlocking the line. <Sysname> lock Please input password<1 to 16> to lock current line: Password: Again: locked ! // The user line is locked. To unlock it, press Enter and enter the password: Password: <Sysname>...
  • Page 80 Use undo lock-key to restore the default. Syntax lock-key key-string undo lock-key Default No user line locking key is set. Views User line view User line class view Predefined user roles network-admin Parameters key-string: Specifies a shortcut key. It can be a character (case sensitive), or an ASCII code value in the range of 0 to 127.
  • Page 81: Parity

    parity Use parity to specify the parity. Use undo parity to restore the default. Syntax parity { even | mark | none | odd | space } undo parity Default The setting is none. No parity is used. Views User line view Predefined user roles network-admin Parameters...
  • Page 82 Default In non-FIPS mode, all protocols are supported. In FIPS mode, SSH is supported. Views VTY line view VTY line class view Predefined user roles network-admin Parameters all: Supports all protocols, including SSH and Telnet. ssh: Supports SSH only. telnet: Supports Telnet only. Usage guidelines A configuration change in user line view does not take effect for the current session.
  • Page 83: Restful Http Enable

    Press CTRL+K to abort Connected to 192.168.1.241 ... ****************************************************************************** * Copyright (c) 2010-2017 Hewlett Packard Enterprise Development LP * Without the owner's prior written consent, * no decompiling or reverse-engineering shall be allowed. ****************************************************************************** <Server> You are logged in without authentication. Display online CLI user information.
  • Page 84: Restful Https Enable

    <Sysname> system-view [Sysname] restful http enable restful https enable Use restful https enable to enable RESTful access over HTTPS. Use undo restful https enable to disable RESTful access over HTTPS. Syntax restful https enable undo restful https enable Default RESTful access over HTTPS is disabled. Views System view Predefined user roles...
  • Page 85: Send

    Parameters screen-length: Specifies the maximum number of lines to send, in the range of 0 to 512. To send command output without pausing, set the number to 0 or execute the screen-length disable command. Usage guidelines The number of lines that can be displayed on the terminal screen is restricted by both this setting and the display specification of the terminal.
  • Page 86: Set Authentication Password

    To end a message, press Enter. To abort the send operation, press Ctrl+C. Examples # Send a notification to the user on VTY 1. <Sysname> send vty 1 Input message, end with Enter; abort with CTRL+C: Your attention, please. I will reboot the system in 3 minutes. Send message? [Y/N]:y The message should appear on the user's terminal screen as follows: [Sysname]...
  • Page 87: Shell

    Examples # Set the password to hello for local password authentication on VTY line 0. <Sysname> system-view [Sysname] line vty 0 [Sysname-line-vty0] authentication-mode password [Sysname-line-vty0] set authentication password simple hello Related commands authentication-mode shell Use shell to enable the terminal service for user lines. Use undo shell to disable the terminal service for user lines.
  • Page 88: Speed

    speed Use speed to set the transmission rate (also called the baud rate) on a user line. Use undo speed to restore the default. Syntax speed speed-value undo speed Default The transmission rate is 9600 bps on a user line. Views User line view Predefined user roles...
  • Page 89: Telnet

    undo stopbits Default One stop bit is used. Views User line view Predefined user roles network-admin Parameters 1: Uses one stop bit. 1.5: Uses one and a half stop bits. The device does not support using one and a half stop bits. If you specify this keyword, two stop bits are used.
  • Page 90: Telnet Client Source

    source: Specifies a source IPv4 address or source interface for outgoing Telnet packets. If you do not specify this option, the device uses the primary IPv4 address of the output interface for the route to the server as the source address. interface interface-type interface-number: Specifies the source interface.
  • Page 91: Telnet Ipv6

    Examples # Set the source IPv4 address to 1.1.1.1 for outgoing Telnet packets. <Sysname> system-view [Sysname] telnet client source ip 1.1.1.1 Related commands display telnet client configuration telnet ipv6 Use telnet ipv6 to Telnet to a host in an IPv6 network. Syntax telnet ipv6 remote-host [ -i interface-type interface-number ] [ port-number ] [ vpn-instance vpn-instance-name ] [ source { interface interface-type interface-number | ipv6 ipv6-address } |...
  • Page 92: Telnet Server Acl

    # Telnet to the host at 2000::1. Use 1000::1 as the source address for outgoing Telnet packets. <Sysname> telnet ipv6 2000::1 source ipv6 1000::1 telnet server acl Use telnet server acl to apply an ACL to filter Telnet logins. Use undo telnet server acl to restore the default. Syntax telnet server acl [ mac ] acl-number undo telnet server acl...
  • Page 93: Telnet Server Enable

    undo telnet server dscp Default IPv4 uses the DSCP value 48 for Telnet packets sent to a Telnet client. Views System view Predefined user roles network-admin Parameters dscp-value: Specifies a DSCP value in the range of 0 to 63. Usage guidelines This command is not supported in FIPS mode.
  • Page 94: Telnet Server Ipv6 Acl

    telnet server ipv6 acl Use telnet server ipv6 acl to apply an IPv6 ACL to filter IPv6 Telnet logins. Use undo telnet server ipv6 acl to restore the default. Syntax telnet server ipv6 acl { ipv6 | mac } acl-number undo telnet server ipv6 acl Default No IPv6 ACL is used to filter IPv6 Telnet logins.
  • Page 95: Terminal Type

    Default IPv6 uses the DSCP value 48 for Telnet packets sent to a Telnet client. Views System view Predefined user roles network-admin Parameters dscp-value: Specifies a DSCP value in the range of 0 to 63. Usage guidelines This command is not supported in FIPS mode. The DSCP value is carried in the Traffic class field of an IPv6 packet to indicate the packet transmission priority.
  • Page 96: User-Interface

    A terminal display type change does not take effect for the current session. It takes effect for subsequent login sessions. Examples # Set the terminal display type to VT100. <Sysname> system-view [Sysname] line vty 0 [Sysname-line-vty0] terminal type vt100 user-interface Use user-interface to enter one or multiple user line views.
  • Page 97: User-Interface Class

    Related commands user-interface class user-interface class Use user-interface class to enter user line class view. Syntax user-interface class { aux | vty } Views System view Predefined user roles network-admin Parameters aux: Specifies the AUX line class view. vty: Specifies the VTY line class view. Usage guidelines This command is an older version reserved for backward compatibility purposes.
  • Page 98: User-Role

    • A setting in user line class view does not take effect for current online users. It takes effect only for new login users. Examples # Set the CLI connection idle-timeout timer to 15 minutes in VTY line class view. <Sysname>...
  • Page 99 Views User line view User line class view Predefined user roles network-admin Parameters role-name: Specifies a user role name, a case-sensitive string of 1 to 63 characters. The user role can be user-defined or predefined. Available predefined user roles include network-admin, network-operator, and level-0 to level-15.
  • Page 100: Ftp Commands

    FTP commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. FTP is not supported in FIPS mode. FTP server commands display ftp-server Use display ftp-server to display FTP server configuration and status information.
  • Page 101: Free Ftp User

    Views Any view Predefined user roles network-admin network-operator Examples # Display detailed information about online FTP users. <Sysname> display ftp-user UserName HostIP Port HomeDir root 192.168.20.184 46539 flash: A field value is wrapped if its length exceeds the limit. The segments are left justified. The following are the length limits for fields: •...
  • Page 102: Free Ftp User-Ip

    Parameters username: Specifies a username. To display online FTP users, execute the display ftp-user command. Examples # Release the FTP connections established by using user account ftpuser. <Sysname> free ftp user ftpuser Are you sure to free FTP connection? [Y/N]:y <Sysname>...
  • Page 103: Ftp Server Acl

    port port: Specifies the source port of an FTP connection. To view the source ports of FTP connections, execute the display ftp-user command. Examples # Release the FTP connections established from IPv6 address 2000::154. <Sysname> free ftp user-ip ipv6 2000::154 Are you sure to free FTP connection? [Y/N]:y <Sysname>...
  • Page 104: Ftp Server Enable

    undo ftp server dscp Default IPv4 uses the DSCP value 0 for FTP packets sent to an FTP client. Views System view Predefined user roles network-admin Parameters dscp-value: Specifies a DSCP value in the range of 0 to 63. Usage guidelines The DSCP value is carried in the ToS field of an IP packet to indicate the transmission priority of the packet.
  • Page 105: Ftp Server Ssl-Server-Policy

    undo ftp server ipv6 dscp Default IPv6 uses the DSCP value 0 for FTP packets sent to an FTP client. Views System view Predefined user roles network-admin Parameters dscp-value: Specifies a DSCP value in the range of 0 to 63. Usage guidelines The DSCP value is carried in the Traffic class field of an IPv6 packet to indicate the transmission priority of the packet.
  • Page 106: Ftp Timeout

    ssl server-policy (Security Command Reference) ftp timeout Use ftp timeout to set the FTP connection idle-timeout timer. Use undo ftp timeout to restore the default. Syntax ftp timeout minute undo ftp timeout Default The FTP connection idle-timeout timer is 30 minutes. Views System view Predefined user roles...
  • Page 107: Append

    Predefined user roles network-admin Parameters command-name: Specifies a command supported by the FTP client. Usage guidelines In FTP client view, entering ? is the same as executing the help command. Examples # Display all commands supported by the FTP client. ftp>...
  • Page 108: Ascii

    150 Accepted data connection 226 File successfully transferred 1657 bytes sent in 0.000736 seconds (2.15 Mbyte/s) ascii Use ascii to set the file transfer mode to ASCII. Syntax ascii Default The file transfer mode is binary. Views FTP client view Predefined user roles network-admin Usage guidelines...
  • Page 109: Bye

    Usage guidelines You can perform this operation only after you log in to the FTP server. FTP transfers files in either of the following modes: • Binary mode—Transfers program file or pictures. • ASCII mode—Transfers text files. When the device acts as the FTP server, the transfer mode is determined by the FTP client. When the device acts as the FTP client, you can set the transfer mode.
  • Page 110: Cdup

    Parameters directory: Specifies the target directory. If the target directory does not exist, the cd command does not change the current working directory. ..: Specifies the upper directory. Executing the cd .. command is the same as executing the cdup command.
  • Page 111: Close

    257 "/ftp/subdir" is your current location ftp> cdup 250 OK. Current directory is /ftp ftp> pwd 257 "/ftp" is your current location Related commands close Use close to terminate the connection to the FTP server without exiting FTP client view. Syntax close Views...
  • Page 112: Delete

    When FTP client debugging is disabled, executing this command enables FTP client debugging. Examples # Enable and then disable FTP client debugging. ftp> debug Debugging on (debug=1). ftp> debug Debugging off (debug=0). delete Use delete to permanently delete a file from the FTP server. Syntax delete remotefile Views...
  • Page 113: Disconnect

    To display detailed information about the files and subdirectories in the working directory on the FTP server, use the dir command. To display detailed information about a file or directory on the FTP server, use the dir remotefile command. To save detailed information about a file or directory on the FTP server to a local file, use the dir remotefile localfile command.
  • Page 114: Display Ftp Client Source

    Predefined user roles network-admin Usage guidelines You can perform this operation only after you log in to the FTP server. Examples # Terminate the connection to the FTP server without exiting the FTP client view. ftp> disconnect 221-Goodbye. You uploaded 0 and downloaded 0 kbytes. 221 Logout.
  • Page 115: Ftp Client Ipv6 Source

    service-port: Specifies the TCP port number of the FTP server, in the range of 0 to 65535. The default is 21. vpn-instance vpn-instance-name: Specifies the MPLS L3VPN instance to which the FTP server belongs. The vpn-instance-name argument represents the VPN instance name, a case-sensitive string of 1 to 31 characters.
  • Page 116: Ftp Client Source

    Views System view Predefined user roles network-admin Parameters interface interface-type interface-number: Specifies an interface by its type and number. The device will use the interface's IPv6 address as the source address. For successful FTP packet transmission, make sure the interface is up and is configured with an IPv6 address. ipv6 source-ipv6-address: Specifies an IPv6 address.
  • Page 117: Ftp Ipv6

    ip source-ip-address: Specifies an IPv4 address. For successful FTP packet transmission, make sure this address is the IPv4 address of an interface in up state on the device. Usage guidelines If you execute this command multiple times, the most recent configuration takes effect. The source address specified with the ftp command takes precedence over the source address specified with the ftp client source command.
  • Page 118: Get

    220 FTP service ready. User (2000::154): root 331 Password required for root. Password: 230 User logged in Remote system type is HPE Use get to download a file from the FTP server and save the file. Syntax get remotefile [ localfile ] Views...
  • Page 119: Help

    Examples # Download the a.txt file and save it as b.txt in the working directory accessed by the ftp command. ftp> get a.txt b.txt local: b.txt remote: a.txt 150 Connecting to port 47457 226 File successfully transferred 1569 bytes received in 0.00527 seconds (290.6 kbyte/s) # Download the a.txt file to the test directory in the working directory accessed by the ftp command.
  • Page 120: Lcd

    disconnect open rhelp user passive rename verbose cdup help reset close restart # Display the help information for the dir command. ftp> help dir list contents of remote directory Related commands Use lcd to display or change the local working directory of the FTP client. Syntax lcd [ directory | / ] Views...
  • Page 121: Mkdir

    Parameters remotefile: Specifies a file or directory on the FTP server. localfile: Specifies the name of the local file used to save the displayed information. Usage guidelines You can perform this operation only after you log in to the FTP server. To display detailed information about the files and subdirectories in the working directory on the FTP server, use the ls command.
  • Page 122: Newer

    Syntax mkdir directory Views FTP client view Predefined user roles network-admin Parameters directory: Specifies the name for the directory to be created. Usage guidelines You can perform this operation only after you log in to the FTP server. You must have permission to perform this operation on the FTP server. Examples # Create a subdirectory named newdir in the current directory of the FTP server.
  • Page 123: Open

    Press CTRL+C to abort. Connected to 192.168.40.7 (192.168.40.7). 220 FTP service ready. User (192.168.40.7:(none)): root 331 Password required for root. Password: 230 User logged in. Remote system type is HPE. ftp> passive Use passive to change the FTP operation mode. Syntax passive Default The FTP operation mode is passive.
  • Page 124: Put

    Usage guidelines FTP can operate in either of the following modes: • Active mode—The FTP server initiates the TCP connection. • Passive mode—The FTP client initiates the TCP connection. When the FTP operation mode is passive, executing this command changes the mode to active. When the FTP operation mode is active, executing this command changes the mode to passive.
  • Page 125: Pwd

    local: flash:/test/a.txt remote: b.txt 150 Connecting to port 47461 226 File successfully transferred 1569 bytes sent in 0.000671 seconds (2.23 Mbyte/s) # Upload file a.txt from the test directory of the storage medium on a member device. Save the file as b.txt on the FTP server.
  • Page 126: Reget

    ftp> quit 221-Goodbye. You uploaded 0 and downloaded 0 kbytes. 221 Logout. <Sysname> Related commands reget Use reget to get the missing part of a file from the FTP server. Syntax reget remotefile [ localfile ] Views FTP client view Predefined user roles network-admin network-operator...
  • Page 127: Reset

    Predefined user roles network-admin Parameters oldfilename: Specifies the original file name. newfilename: Specifies the new file name. Usage guidelines You can perform this operation only after you log in to the FTP server. Examples # Rename the a.txt file as b.txt. •...
  • Page 128: Rhelp

    Views FTP client view Predefined user roles network-admin Parameters marker: Specifies the retransmission offset, in bytes. Usage guidelines Use this command to continue with a file retransmission. The file retransmission starts from the (offset+1)th byte. You can perform this operation only after you log in to the FTP server. Support for this command depends on the FTP server.
  • Page 129 ftp> rhelp 214-The following FTP commands are recognized USER PASS NOOP QUIT SYST TYPE HELP CWD XCWD PWD CDUP XCUP XPWD LIST NLST MLSD PORT EPRT PASV EPSV REST RETR STOR APPE DELE MKD XMKD RMD XRMD ABOR SIZE RNFR RNTO 214 UNIX Type: L8 Table 16 Command output Field...
  • Page 130: Rmdir

    Field Description SIZE Size of the transmission file. RNFR Original name. RNTO New name. rmdir Use rmdir to permanently delete a directory from the FTP server. Syntax rmdir directory Views FTP client view Predefined user roles network-admin Parameters directory: Specifies a directory on the FTP server. Usage guidelines You can perform this operation only after you log in to the FTP server.
  • Page 131 Parameters remotefile: Specifies a directory or file on the FTP server. Usage guidelines You can perform this operation only after you log in to the FTP server. Support for this command depends on the FTP server. Examples # Display FTP server status information. ftp>...
  • Page 132: Status

    Field Description The first bit specifies the file type. • -—Common. • B—Block. • c—Character. • d—Directory. • l—Symbol connection file. • p—Pipe. -rw-r--r-- • s—socket. The second bit through the tenth bit are divided into three groups. Each group contains three characters, representing the access permission of the owner, group, and other users.
  • Page 133: System

    Nmap: off Hash mark printing: off; Use of PORT cmds: on Table 19 Command output Field Description IP address of the FTP server that is connected to the Connected to 192.168.1.56. FTP client. Verbose: on; Bell: off; Prompting: on; Globbing: off Displays debugging information.
  • Page 134: Verbose

    Parameters username: Specifies the username. password: Specifies the password. Usage guidelines If you tried to access an FTP server but failed to pass the authentication, you can use this command to try again before the connection to the FTP server expires. After you log in to an FTP server, you can initiate an FTP authentication to change to a new account.
  • Page 135 # Enable the device to display detailed information about FTP operations. ftp> verbose Verbose mode on. # Execute the get command. ftp> get a.cfg 2.cfg 227 Entering Passive Mode (192,168,1,58,68,14) 150-Accepted data connection 150 The computer is your friend. Trust the computer 226 File successfully transferred 3796 bytes received in 0.00762 seconds (486.5 kbyte/s)
  • Page 136: Tftp Commands

    TFTP commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. TFTP is not supported in FIPS mode. tftp Use tftp to download a file from a TFTP server or upload a file to a TFTP server in an IPv4 network.
  • Page 137: Tftp Client Ipv6 Source

    TFTP packet transmission, make sure the interface is up and has the primary IPv4 address configured. • ip source-ip-address: Specifies an IPv4 address. For successful TFTP packet transmission, make sure this address is the IPv4 address of an interface in up state on the device. Usage guidelines The source address specified with the tftp command takes precedence over the source address specified with the tftp client source command.
  • Page 138: Tftp Client Source

    Default No source address is specified for TFTP packets sent to an IPv6 TFTP server. The device selects a source IPv6 address as defined in RFC 3484. Views System view Predefined user roles network-admin Parameters interface interface-type interface-number: Specifies an interface by its type and number. The device will use the interface's IPv6 address as the source address.
  • Page 139: Tftp Ipv6

    Parameters interface interface-type interface-number: Specifies an interface by its type and number. The device will use the interface's primary IPv4 address as the source address. For successful TFTP packet transmission, make sure the interface is up and has the primary IPv4 address configured. ip source-ip-address: Specifies an IPv4 address.
  • Page 140: Tftp-Server Acl

    memory successfully. If the destination folder already has a file using the same name, the system overwrites the existing file. If the download or save-to-memory operation fails, the existing file in the destination folder is not overwritten. source-filename: Specifies the source file name, a case-insensitive string of 1 to 255 characters. destination-filename: Specifies the destination file name, a case-insensitive string of 1 to 255 characters.
  • Page 141: Tftp-Server Ipv6 Acl

    Views System view Predefined user roles network-admin Parameters acl-number: Specifies the number of a basic ACL, in the range of 2000 to 2999. Usage guidelines You can use an ACL to deny or permit the device's access to specific TFTP servers. Examples # Allow the device to access only TFTP server 1.1.1.1.
  • Page 142: File System Management Commands

    File system management commands IMPORTANT: • Before managing storage media, file systems, directories, and files, make sure you know the possible impact. • A file or directory whose name starts with a dot character (.) is a hidden file or directory. To prevent the system from hiding a file or directory, make sure the file or directory name does not start with a dot character.
  • Page 143: Copy

    Examples # Access the test directory after logging in to the device. <Sysname> cd test # Change to the parent directory. <Sysname> cd .. copy Use copy to copy a file. Syntax copy source-file { dest-file | dest-directory } Views User view Predefined user roles network-admin...
  • Page 144 Location Name format Remarks Enter the URL in the format of For example, to specify the startup.cfg file in the On a TFTP working directory on TFTP server 1.1.1.1, enter the tftp://server address[:port server URL tftp://1.1.1.1/startup.cfg. number]/file path[/file name]. The username and password in the URL must be the same as the username and password configured on the server.
  • Page 145: Delete

    Copying file tftp://1.1.1.1/test.cfg to flash:/testbackup.cfg... Done. # Copy test.cfg from the current directory. Save the copy to the working directory on TFTP server 1.1.1.1 as testbackup.cfg. <Sysname> copy test.cfg tftp://1.1.1.1/testbackup.cfg Copy flash:/test.cfg to tftp://1.1.1.1/testbackup.cfg? [Y/N]:y Copying file flash:/test.cfg to tftp://1.1.1.1/testbackup.cfg... Done. # Copy test.cfg from the working directory on FTP server 2001::1.
  • Page 146: Dir

    Usage guidelines Use the delete /unreserved file command with caution. You cannot restore a file that was deleted with this command. The delete file command (without /unreserved) moves the specified file to the recycle bin, unless the file system is running out of storage space. If the file system is running out of storage space, the command permanently deletes the file.
  • Page 147: Fdisk

    The directory name of the recycle bin is .trash. To display files in the recycle bin, use either of the following methods: • Execute the dir /all .trash command. • Execute the cd .trash command and then the dir command. Examples # Display information about all files and directories in the current directory.
  • Page 148 partition-number: Specifies the number of partitions, in the range of 1 to 4. If you specify this argument, the storage medium is divided evenly into the specified number of partitions. To customize the sizes of partitions, do not provide this argument. Usage guidelines The flash memory cannot be partitioned.
  • Page 149: File Prompt

    Partition 2 (32MB~96MB, 128MB, Press CTRL+C to quit or Enter to use all available space):31 // Enter 31 to set the size of the second partition to 31 MB. The partition size must be greater than or equal to 32MB. Partition 2 (32MB~96MB, 128MB, Press CTRL+C to quit or Enter to use all available space):1000 // Enter 1000 to set the size of the second partition to 1000 MB.
  • Page 150: Fixdisk

    Examples # Set the file and directory operation mode to alert. <Sysname> system-view [Sysname] file prompt alert fixdisk Use fixdisk to check a file system for damage and repair any damage. Syntax fixdisk filesystem Views User view Predefined user roles network-admin Parameters filesystem: Specifies the name of a file system.
  • Page 151: Gunzip

    Formatting a file system permanently deletes all files in the file system. If a startup configuration file exists in the file system, back up the file if necessary. You can format a file system only when no other users are accessing the file system. Examples # Format file system flash:.
  • Page 152: Gzip

    1048576 KB total (472844 KB free) gzip Use gzip to compress a file. Syntax gzip file Views User view Predefined user roles network-admin Parameters file: Specifies the name of the file to be compressed. Usage guidelines This command saves the compressed file to the file.gz file and deletes the source file. Examples # Compress file system.bin: Before compressing the file, you can display files whose names start with the system.
  • Page 153: Mkdir

    Predefined user roles network-admin network-operator Parameters file: Specifies the name of a file. Usage guidelines You can use file digests to verify file integrity. Examples # Use the MD5 algorithm to calculate the digest of file system.bin. <Sysname> md5sum system.bin MD5 digest: 4f22b6190d151a167105df61c35f0917 mkdir...
  • Page 154: Mount

    Views User view Predefined user roles network-admin Parameters file: Specifies the name of a file. Examples # Display the contents of the test.txt file. <Sysname> more test.txt Have a nice day. # Display the contents of the testcfg.cfg file. <Sysname> more testcfg.cfg version 7.1.070, Release 1201 sysname Sysname vlan 2...
  • Page 155: Move

    Examples # Mount a file system on the USB disk. <Sysname> mount usba0: Related commands umount move Use move to move a file. Syntax move source-file { dest-file | dest-directory } Views User view Predefined user roles network-admin Parameters source-file: Specifies the name of the source file. dest-file: Specifies the name of the destination file.
  • Page 156: Rename

    Examples # Display the working directory. <Sysname> pwd flash: rename Use rename to rename a file or directory. Syntax rename { source-file | source-directory } { dest-file | dest-directory } Views User view Predefined user roles network-admin Parameters source-file: Specifies the name of the source file. source-directory: Specifies the name of the source directory.
  • Page 157: Rmdir

    Usage guidelines The delete file command only moves a file to the recycle bin. To permanently delete the file, use the reset recycle-bin command to delete the file from the recycle bin. Examples # Empty the recycle bin. (In this example there are two files in the recycle bin.) <Sysname>...
  • Page 158: Tar Create

    Syntax sha256sum file Views User view Predefined user roles network-admin Parameters file: Specifies the name of a file. Usage guidelines You can use file digests to verify file integrity. Examples # Use the SHA-256 algorithm to calculate the digest of file system.bin. <Sysname>...
  • Page 159: Tar Extract

    Creating archive flash:/b.tar.gz Done. # Compress and archive files and directories, and display the successfully archived files and directories. <Sysname> tar create gz archive-file c.tar.gz verbose source 1.cfg 2.cfg test 1.cfg 2.cfg test/ test/a.log test/subtest/ test/subtest/aa.log Related commands tar extract tar list tar extract Use tar extract to extract files and directories.
  • Page 160: Tar List

    2.cfg test/ test/a.log test/subtest/ test/subtest/aa.log # Extract files and directories from archive file a.tar, and display the content of the files on the screen. <Sysname> tar extract archive-file c.tar.gz screen version 7.1.070, Release 1201 sysname Sysname Related commands tar create tar list tar list Use tar list to display the names of archived files and directories.
  • Page 161: Umount

    umount Use umount to unmount a file system. Syntax umount filesystem Views User view Predefined user roles network-admin Parameters filesystem: Specifies the name of a file system. Usage guidelines File systems on a storage medium are automatically mounted when the storage medium is connected to the device.
  • Page 162 Usage guidelines If a file with the same name already exists in the directory, the system prompts whether or not you want to overwrite the existing file. If you enter Y, the existing file is overwritten. If you enter N, the command is not executed.
  • Page 163: Configuration File Management Commands

    Configuration file management commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. archive configuration Use archive configuration to manually archive the running configuration to the configuration archive directory.
  • Page 164: Archive Configuration Location

    Default The automatic running-configuration archiving feature is disabled. Views System view Predefined user roles network-admin Parameters interval: Specifies the interval for automatically saving the running configuration. The value range is 10 to 525600, in minutes. Usage guidelines Automatic configuration archiving enables the system to periodically save the running configuration to the archive directory.
  • Page 165: Archive Configuration Max

    Parameters directory: Specifies the archive directory, a case-insensitive string of 1 to 63 characters. The value for this argument must take the format of storage-medium-name:/folder-name. The directory must already exist on the master. filename-prefix: Specifies a file name prefix for configuration archives, a case-insensitive string of 1 to 30 characters.
  • Page 166: Backup Startup-Configuration

    Default The maximum number is 5. Views System view Predefined user roles network-admin Parameters file-number: Specifies the maximum number of configuration archives that can be saved. The value range is 1 to 10. Adjust the setting depending on the amount of storage space available. Usage guidelines Before you can set a limit on configuration archives, use the archive configuration location command to specify a configuration archive directory and archive file name prefix.
  • Page 167: Configuration Commit

    Parameters ipv4-server: Specifies a TFTP server by its IPv4 address or host name. The host name is a case-insensitive string of 1 to 253 characters. Valid characters include letters, digits, hyphens (-), underscores (_), and dots (.). ipv6 ipv6-server: Specifies a TFTP server by its IPv6 address or host name. The host name is a case-insensitive string of 1 to 253 characters.
  • Page 168: Configuration Commit Delay

    The settings you made during the commit delay interval are automatically removed if you have not manually committed them before the configuration commit delay timer expires. As a best practice, configure the information center to output logs to the console. Use the logs to determine whether you want to commit the settings.
  • Page 169: Configuration Encrypt

    [Sysname] configuration commit delay 10 # Change the configuration commit delay timer to 60 minutes before the old delay timer expires. [Sysname] configuration commit delay 60 The commit delay already set 10 minutes, overwrite it? [Y/N]:y # Attempt to set the configuration commit delay timer to 20 minutes while the system is rolling back the configuration upon expiration of the old delay timer.
  • Page 170: Display Archive Configuration

    Views System view Predefined user roles network-admin Parameters filename: Specifies the name of the replacement configuration file used for configuration rollback. The file name must use the .cfg extension. Excluding the .cfg extension, the file name is a case-insensitive string of 1 to 255 characters and can include path information. The file and file path must be valid.
  • Page 171: Display Current-Configuration

    Maximum number of archive files: 10 Saved archive files: No. TimeStamp FileName Wed Jan 15 14:20:18 2012 my_archive_1.cfg Wed Jan 15 14:33:10 2012 my_archive_2.cfg Wed Jan 15 14:49:37 2012 my_archive_3.cfg '#' indicates the most recent archive file. Next archive file to be saved: my_archive_4.cfg Table 22 Command output Field Description...
  • Page 172: Display Current-Configuration Diff

    interface [ interface-type [ interface-number ] ]: Displays interface configuration, where the interface-type argument represents the interface type and the interface-number argument represents the interface number. If you do not specify the interface-type interface-number arguments, the command displays the running configuration for all interfaces. If you specify only the interface-type argument, the command displays the running configuration for all interfaces of this type.
  • Page 173 Syntax display current-configuration diff Views Any view Predefined user roles network-admin network-operator Examples # Display the differences that the running configuration has as compared with the next-startup configuration. <Sysname> display current-configuration diff --- Startup configuration +++ Current configuration @@ -17,7 +17,9 @@ vlan 200 -vlan 300 +vlan 400...
  • Page 174: Display Default-Configuration

    Field Description Displays command differences. • cmd1 and cmd4—Command lines are contained in both source and target configurations if they are not prefixed with a minus (-) or plus (+) sign. They provide a context for locating command line differences. cmd1 •...
  • Page 175 display diff startup-configuration { configfile file-name-d | current-configuration } Views Any view Predefined user roles network-admin network-operator Parameters configfile file-name-s: Specifies the source configuration file for comparison. configfile file-name-d: Specifies the target configuration file for comparison. Specifies running configuration. current-configuration: display diff current-configuration command, this keyword specifies the source configuration for comparison.
  • Page 176: Display Saved-Configuration

    <Sysname> The output shows that VLAN 200 is contained in both configurations, VLAN 400 and VLAN 500 are contained only in the running configuration, and VLAN 300 is contained only in the next-startup configuration. For the command output description, see Table Related commands display current-configuration...
  • Page 177: Display Startup

    vlan 1 domain system ---- More ---- Related commands reset saved-configuration save display startup Use display startup to display the names of the current startup configuration file and the next-startup configuration files. Syntax display startup Views Any view Predefined user roles network-admin network-operator Usage guidelines...
  • Page 178: Display This

    display this Use display this to display the running configuration in the current view. Syntax display this Views Any view Predefined user roles network-admin network-operator Usage guidelines Use this command to verify the configuration you have made in a certain view. This command does not display parameters that are using the default settings.
  • Page 179: Restore Startup-Configuration

    Usage guidelines CAUTION: This command permanently deletes the specified next-startup configuration file. In an IRF fabric, this command deletes the specified file from all IRF member devices. You can delete the main file, the backup file, or both. To delete a file that is set as both main and backup next-startup configuration files, you must execute both the reset saved-configuration backup command and the reset saved-configuration main command.
  • Page 180: Save

    Usage guidelines This command is not supported in FIPS mode. Before restoring the configuration file for the next startup, make sure the following requirements are met: • The server is reachable. • The server is enabled with TFTP service. • You have read and write permissions to the server.
  • Page 181 Parameters file-url: Specifies a file path for saving the running configuration. The file name must use the .cfg extension. Excluding the .cfg extension, the file path is a string of 1 to 255 characters. If you specify the all keyword or the slot slot-number option, the file path cannot include a member ID. If the file path includes a folder name, the folder must already exist on all IRF member devices.
  • Page 182: Startup Saved-Configuration

    Now saving current configuration to the device. Saving configuration flash:/backup.cfg. Please wait... Configuration is saved to flash successfully. # Save the running configuration to the main next-startup configuration file without any confirmation required. <Sysname> save force Validating file. Please wait..Saved the current configuration to mainboard device successfully.
  • Page 183 Usage guidelines CAUTION: In an IRF fabric, the undo startup saved-configuration command can cause an IRF split after the IRF fabric or an IRF member reboots. The startup saved-configuration command applies to all IRF members. To successfully execute this command, make sure the specified file has been saved in the root directory of the storage medium on each member.
  • Page 184: Software Upgrade Commands

    Software upgrade commands The switch can start up from the built-in flash memory or the USB disk. As a best practice, store the startup images in the built-in flash memory. If you store the startup images on the USB disk, do not remove the USB disk during the startup process.
  • Page 185 # Specify flash:/all.ipe as the main startup image file for slot 1. <Sysname> boot-loader file flash:/all.ipe slot 1 main Verifying the IPE file and the images....Done. HPE FF 5940 48XGT 6QSFP+ Switch images in IPE: boot.bin system.bin This command will set the main startup software images. Continue? [Y/N]:Y Add images to slot 1.
  • Page 186: Boot-Loader Update

    Loading......Done. Loading......Done. Loading......Done. Loading......Done. The images that have passed all examinations will be used as the main startup software images at the next reboot on slot 2. The images that have passed all examinations will be used as the main startup software images at the next reboot on slot 3.
  • Page 187: Bootrom Update

    Copying main startup software images to slot 1. Please wait... Done. Setting copied images as main startup software images for slot 1... Done. Successfully updated the startup software images of slot 1. Related commands display boot-loader install commit bootrom update Use bootrom update to load the BootWare image on the default file system to the Normal area of BootWare.
  • Page 188: Display Boot-Loader

    display boot-loader Use display boot-loader to display current software images and startup software images. Syntax display boot-loader [ slot slot-number ] Views Any view Predefined user roles network-admin network-operator Parameters slot slot-number: Specifies the member ID of an IRF member device. If you do not specify a member device, this command displays the software images on each IRF member device.
  • Page 189: Issu Commands

    # Display detailed information about active software images. <Sysname> display install active verbose Active packages on slot 1: flash:/boot.bin [Package] Vendor: HPE Product: 5940 Service name: boot Platform version: 7.1.070 Product version: Test 0001015 Supported board: mpu [Component]...
  • Page 190: Display Install Backup

    Platform version: 7.1.070 Product version: Test 0001015 Supported board: mpu [Component] Component: system Description: system package flash:/feature1.bin [Package] Vendor: HPE Product: 5940 Service name: test Platform version: 7.1.070 Product version: Test 0001015 Supported board: mpu [Component] Component: test Description: test package...
  • Page 191: Related Commands

    # Display detailed information about backup startup software images. <Sysname> display install backup verbose Backup startup software images on slot 1: flash:/boot.bin [Package] Vendor: HPE Product: 5940 Service name: boot Platform version: 7.1.070 Product version: Test 0001015 Supported board: mpu...
  • Page 192: Display Install Committed

    # Display detailed information about main startup software images. <Sysname> display install committed verbose Committed packages on slot 1: flash:/boot.bin [Package] Vendor: HPE Product: 5940 Service name: boot Platform version: 7.1.070 Product version: Test 0001015 Supported board: mpu [Component]...
  • Page 193: Display Install Inactive

    [Package] Vendor: HPE Product: 5940 Service name: system Platform version: 7.1.070 Product version: Test 0001015 Supported board: mpu [Component] Component: system Description: system package flash:/feature1.bin [Package] Vendor: HPE Product: 5940 Service name: feature1 Platform version: 7.1.070 Product version: Test 0001015...
  • Page 194: Display Install Ipe-Info

    (if any) can have a maximum of 63 characters. For more information about specifying a file, see file system management in Fundamentals Configuration Guide. Examples # Display information about .ipe file flash:/test.ipe. <Sysname> display install ipe-info flash:/test.ipe Verifying the file flash:/test.ipe on slot 1....Done. HPE FF 5940 48XGT 6QSFP+ images in IPE: boot.bin...
  • Page 195: Display Install Job

    system.bin Related commands display install package display install job Use display install job to display ongoing ISSU activate, deactivate, and rollback operations. Syntax display install job Views Any view Predefined user roles network-admin network-operator Examples # Display ongoing ISSU activate, deactivate, and rollback operations. <Sysname>...
  • Page 196: Display Install Package

    Examples # Display all ISSU log entries. <Sysname> display install log Install job 1 started by user root at 04/28/2001 08:39:29. Job 1 completed successfully at 04/28/2001 08:39:30. Install job 1 started by user root at 04/28/2001 08:39:29. Install activate flash:/feature1.bin on slot 1 Job 1 completed successfully at 04/28/2001 08:39:30.
  • Page 197: Display Install Rollback

    Examples # Display information about system.bin. <Sysname> display install package flash:/system.bin flash:/system.bin [Package] Vendor: HPE Product: 5940 Service name: system Platform version: 7.1.070 Product version: Test 0001015 Supported board: mpu # Display detailed information about system.bin.
  • Page 198: Display Install Which

    Syntax display install rollback [ point-id ] Views Any view Predefined user roles network-admin network-operator Parameters point-id: Specifies a rollback point ID. If you do not specify a rollback point ID, the command displays all rollback points. Usage guidelines Use this command to identify available rollback points during an ISSU that uses install commands. The system does not record rollback points during an ISSU that uses issu commands.
  • Page 199: Display Issu Rollback-Timer

    # Display the software image file that includes pkg_ctr. <Sysname> display install which file pkg_ctr Verifying the file flash:/system-t0001015.bin on slot 1......Done. Found pkg_ctr in flash:/system-t0001015.bin on slot 1. flash:/system-t0001015.bin [Package] Vendor: HPE Product: 5940 Service name: system Platform version: 7.1.070 Product version: Test 0001015 Supported board: mpu Verifying the file flash:/boot-d2601007.bin on slot 1..Done.
  • Page 200: Display Issu State

    Views Any view Predefined user roles network-admin network-operator Usage guidelines Change to the automatic rollback interval does not take effect on the ongoing ISSU process. The current remaining rollback time might be greater than the specified automatic rollback interval. Examples # Display automatic rollback timer information after the issu run switchover command is executed.
  • Page 201 ISSU state: Init Compatibility: Unknown Work state: Normal Upgrade method: Card by card Upgraded slot: None Current upgrading slot: None Current version list: boot: 7.1.070, Test 0001015 system: 7.1.070, Test 0001015 feature1: 7.1.070, Test 0001015 Current software images: flash:/boot-t0001015.bin flash:/system-t0001015.bin flash:/feature1-t0001015.bin # Display ISSU status information while the issu load command is being executed.
  • Page 202 Table 29 Command output Field Description ISSU status: • Init—The ISSU process has not started or has finished. • Loading—The system is executing the issu load command. • Loaded—The issu load command is completed. • Switching—The system is executing the issu run switchover command. ISSU state •...
  • Page 203: Display Version Comp-Matrix

    Related commands issu accept issu commit issu load issu rollback issu run switchover display version comp-matrix Use display version comp-matrix to display version compatibility information and identify the recommended upgrade method. Syntax display version comp-matrix display version comp-matrix file { boot filename | system filename | feature filename&<1-30> } * display version comp-matrix file ipe ipe-filename Views Any view...
  • Page 204 Boot image: flash:/boot-t0001015.bin Version: 7.1.070 System image: flash:/system-t0001015.bin Version: 7.1.070-Test 0001015 Version compatibility list: 7.1.070-Test 0001015 Version dependency boot list: 7.1.070 Feature image: flash:/feature1-t0001015.bin Version: 7.1.070-Test 0001015 Version compatibility list: 7.1.070-Test 0001015 Version dependency system list: 7.1.070-Test 0001015 # Display compatibility information for upgrade images as well as the recommended ISSU method. (In this example, the specified images are compatible with the running images.) <Sysname>...
  • Page 205: Install Abort

    Table 30 Command output Field Description Verifying the file The system was verifying the validity of the file. • Under a system image, this field shows all system image versions that are compatible with the system image. Version compatibility list •...
  • Page 206: Install Activate

    Examples # Abort all ongoing software image activate and deactivate operations. <Sysname> install abort Related commands display install job install activate Use install activate to activate software images, or identify the ISSU method and the possible impact on the device. Syntax install activate { boot filename | system filename | feature filename&<1-30>...
  • Page 207 Examples # Identify the ISSU method for feature upgrade with feature1.bin on subordinate member 2 and the upgrade impact. <Sysname> install activate feature flash:/feature1.bin slot 2 test Copying file flash:/feature1.bin to slot2#flash:/feature1.bin..Done. Verifying the file flash:/feature1.bin on slot 2..Done. Upgrade summary according to following table: flash:/feature1.bin Running Version New Version...
  • Page 208: Install Add

    Field Description New Version Version number of the new software. ISSU methods: • Service Upgrade. • File Upgrade. • Upgrade Way Reboot. This field is displayed only for an upgrade to a compatible version. For more information about ISSU methods, see Fundamentals Configuration Guide.
  • Page 209: Install Commit

    install commit Use install commit to commit software changes. Syntax install commit Views User view Predefined user roles network-admin Usage guidelines This command modifies the main startup software image list to be the same as the current software image list. You must execute this command after using the following commands: •...
  • Page 210: Install Remove

    Parameters feature: Specifies a space-separated list of up to 30 feature image files. patch: Specifies a space-separated list of up to 30 patch image files. filename: Specifies a .bin file in the filesystemname/filename.bin format. The value string can have a maximum of 63 characters.
  • Page 211: Install Rollback To

    Usage guidelines This command permanently deletes the image files from the device. You cannot use the install rollback to command to revert the operation, or use the install abort command to abort the operation. Examples # Delete inactive software image file flash:/feature1.bin. <Sysname>...
  • Page 212: Install Verify

    Updating from no package to flash:/feature1-t0001015.bin. The output shows that currently three image files are active but only two of them are confirmed. Image file flash:/feature1-t0001015.bin is not confirmed yet. <Sysname> install rollback to original This operation might take several minutes, please wait...Done. <Sysname>...
  • Page 213: Issu Accept

    Verifying packages on slot 1: Start to check active package completeness. Verifying the file flash:/boot-t0001015.bin on slot 1.....Done. flash:/boot-t0001015.bin verification successful. Verifying the file flash:/system-t0001015.bin on slot 1.....Done. flash:/system-t0001015.bin verification successful. Start to check active package consistency. Active packages are consistent with committed packages on their own board. Active packages are consistent with the reference packages.
  • Page 214 Syntax issu commit slot slot-number Views User view Predefined user roles network-admin Parameters slot slot-number: Specifies the member ID of the original master or a subordinate member that has not been upgraded. Usage guidelines At reboot, a subordinate device automatically synchronizes the master device's configuration and status data.
  • Page 215: Issu Load

    Verifying the file flash:/feature1.bin on slot 1....Done. Copying file flash:/feature1.bin to slot1#flash:/feature1.bin...Done. Upgrade summary according to following table: flash:/feature1.bin Running Version New Version Test 0001015 Test 0001016 Slot Upgrade Way Service Upgrade Upgrading software images to compatible versions. Continue? [Y/N]:y This operation might take several minutes, please wait...Done.
  • Page 216 one member ID for a compatible upgrade and can specify multiple member IDs for an incompatible upgrade. As a best practice, specify half of the subordinate members if the member devices form a ring. Make sure the specified subordinate members are directly connected by physical links. reboot: Uses the reboot method for the upgrade.
  • Page 217 Identifying the upgrade methods….Done. Upgrade summary according to following table: flash:/feature1.bin Running Version New Version Test 0001015 Test 0001016 Slot Upgrade Way Reboot Upgrading software images to compatible versions. Continue? [Y/N]:y This operation might take several minutes, please wait...Done. # Upgrade member devices 3 and 4 (subordinate members) with feature image file flash:/feature1.bin.
  • Page 218: Issu Rollback

    issu rollback Use issu rollback to cancel the ISSU and roll back to the original software versions. Syntax issu rollback Views User view Predefined user roles network-admin Usage guidelines The device supports automatic rollback and manual rollback. This command performs a manual rollback.
  • Page 219: Issu Run Switchover

    Default The automatic rollback timer is set to 45 minutes. Views System view Predefined user roles network-admin Parameters minutes: Specifies the automatic rollback interval, in the range of 0 to 120 minutes. Setting it to 0 disables automatic rollback. Usage guidelines The automatic software version rollback feature is only available during an ISSU to a compatible version when the IRF fabric has multiple members.
  • Page 220 At reboot, a subordinate device automatically synchronizes the master device's configuration and status data. You must wait for the synchronization to complete before using the issu run switchover command on the subordinate device. To identify whether the synchronization is complete, use the display system stable state command.
  • Page 221: Reset Install Log-History Oldest

    Field Description Switchover method: • Active standby process switchover—Switch from the active process to the Switchover Way standby process. • Master subordinate switchover—Switch from the master to a subordinate member. For more information about the command output, see Table Related commands issu load reset install log-history oldest Use reset install log-history oldest to clear ISSU log entries.
  • Page 222 Usage guidelines This command clears the specified rollback point and all rollback points older than the specified rollback point. Examples # Clear rollback point 2 and all rollback points older than rollback point 2. <Sysname> reset install rollback oldest 2 Related commands display install rollback...
  • Page 223: Device Management Commands

    Device management commands clock datetime Use clock datetime to set the system time. Syntax clock datetime time date Default The system time is UTC time 00:00:00 01/01/2011. Views User view Predefined user roles network-admin Parameters time: Specifies a time in the hh:mm:ss format. The value range for hh is 0 to 23. The value range for mm is 0 to 59.
  • Page 224: Clock Summer-Time

    Syntax clock protocol { none | ntp } undo clock protocol Default The device obtains its time through NTP. Views System view Predefined user roles network-admin Parameters none: Uses the system time set by using the clock datetime command. ntp: Uses NTP to obtain the UTC time. You must configure NTP correctly. For more information about NTP and NTP configuration, see Network Management and Monitoring Configuration Guide.
  • Page 225 Predefined user roles network-admin Parameters name: Specifies a name for the daylight saving time schedule, a case-sensitive string of 1 to 32 characters. start-time: Specifies the start time in the hh:mm:ss format. The value range for hh is 0 to 23. The value range for mm is 0 to 59.
  • Page 226: Clock Timezone

    Related commands clock datetime clock timezone display clock clock timezone Use clock timezone to set the time zone. Use undo clock timezone to restore the default. Syntax clock timezone zone-name { add | minus } zone-offset undo clock timezone Default The Greenwich Mean Time time zone is used.
  • Page 227: Command

    command Use command to assign a command to a job. Use undo command to revoke a command. Syntax command id command undo command id Default No command is assigned to a job. Views Job view Predefined user roles network-admin Parameters id: Specifies an ID for the command, in the range of 0 to 4294967295.
  • Page 228: Copyright-Info Enable

    Related commands scheduler job copyright-info enable Use copyright-info enable to enable copyright statement display. Use undo copyright-info enable to disable copyright statement display. Syntax copyright-info enable undo copyright-info enable Default Copyright statement display is enabled. Views System view Predefined user roles network-admin Examples # Enable copyright statement display.
  • Page 229: Display Clock

    <Sysname> display alarm Slot CPU Level Info ERROR faulty Table 34 Command output Field Description Slot that generated the alarm. If the alarm was generated by the chassis, this field Slot displays a hyphen (-). Alarm severity. Possible values include ERROR, WARNING, NOTICE, and INFO, in Level descending order.
  • Page 230: Display Copyright

    Related commands clock datetime clock timezone clock summer-time display copyright Use display copyright to display the copyright statement. Syntax display copyright Views Any view Predefined user roles network-admin network-operator Examples # Display the copyright statement. <Sysname> display copyright display cpu-usage Use display cpu-usage to display the current CPU usage statistics.
  • Page 231: Display Cpu-Usage Configuration

    1% in last 5 minutes # Display the current CPU usage statistics in table form. <Sysname> display cpu-usage Slot CPU Last 5 sec Last 1 min Last 5 min Table 35 Command output Field Description x% in last 5 seconds Average CPU usage during the most recent 5-second interval.
  • Page 232 Syntax display cpu-usage history [ job job-id ] [ slot slot-number [ cpu cpu-number ] ] Views Any view Predefined user roles network-admin network-operator Parameters job job-id: Specifies a process by its ID. The value range for job-id is 1 to 2147483647. If you do not specify a process, this command displays the statistics for the entire system's CPU usage (the total CPU usage of all processes).
  • Page 233: Display Device

    35%| 30%| 25%| 20%| 15%| 10%| ######## ------------------------------------------------------------ (minutes) cpu-usage (Slot 1 CPU 0) last 60 minutes (SYSTEM) The output shows the following items: • Process name. The name SYSTEM represents the entire system. • CPU that is holding the process: CPU 0 in slot 1. •...
  • Page 234: Display Device Manuinfo

    This option is available only on the HPE FlexFabric 5940 2-slot Switch (JH397A) and HPE FlexFabric 5940 4-slot Switch (JH398A). verbose: Displays detailed hardware information. If you do not specify this keyword, this command displays brief information.
  • Page 235: Display Device Manuinfo Fan

    component during hardware debugging or testing. This command displays only part of the electronic label information. Examples # Display electronic label information for the device. <Sysname> display device manuinfo display device manuinfo fan Use display device manuinfo fan to display electronic label information for a fan tray. Syntax display device manuinfo slot slot-number fan fan-id Views...
  • Page 236: Display Diagnostic-Information

    display diagnostic-information Use display diagnostic-information to display or save operating information for features and hardware modules. Syntax display diagnostic-information [ hardware | infrastructure | l2 | l3 | service ] [ key-info ] [ filename ] Views Any view Predefined user roles network-admin network-operator Parameters...
  • Page 237: Display Environment

    than signs (>), and pipeline signs (|). For example, if the device name is A/B, the device name in the file name will be A_B, as in flash:/diag_A_B_20160101-000438.tar.gz. This command does not support the |, >, and >> options. While the device is executing this command, do not execute any other commands. Executing other commands might affect the collected operating information.
  • Page 238: Display Fan

    Parameters slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays temperature information for all member devices. Examples # Display information about all temperature sensors on the device. <Sysname>...
  • Page 239: Display Hardware-Resource Switch-Mode

    Parameters slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays fan tray operating status information for all member devices. fan-id: Specifies a fan tray by its ID. If you do not specify a fan tray, this command displays operating status information for all fan trays at the specified position.
  • Page 240: Display Memory

    <Sysname> display hardware-resource switch-mode Switch-mode resource(switch-mode), all supported modes: MAC table is 288K, L3 host table is 16K, LPM Table is 16K MAC table is 224K, L3 host table is 80K, LPM Table is 16K MAC table is 160K, L3 host table is 144K, LPM Table is 16K MAC table is 96K, L3 host table is 208K, LPM Table is 16K MAC table is 32K, L3 host table is 16K, LPM Table is 128K -----------------------------------------------...
  • Page 241: Display Memory-Threshold

    Slot CPU Total Used Free Buffers Caches FreeRatio 3293028 1132336 2160692 1104 263004 65.6% Table 39 Command output Field Description Memory usage information. Total size of the physical memory space that can be allocated. The memory space is virtually divided into two parts. Part 1 is solely used for kernel Total code, kernel management, and ISSU functions.
  • Page 242: Display Power

    Memory usage threshold: 100% Free memory threshold: Minor: 64M Severe: 48M Critical: 32M Normal: 96M Current memory state: Normal Event statistics: [Back to normal state] First notification: 2015-5-15 09:21:35.546 Latest notification: 2015-5-15 09:21:35.546 Total number of notifications sent: 1 [Enter minor low-memory state] First notification at: 2015-5-15 09:07:05.941 Latest notification at: 2015-5-15 09:07:05.941 Total number of notifications sent: 1...
  • Page 243: Display Scheduler Job

    power-id: Specifies a power supply by its ID. If you do not specify a power supply, this command displays information about all power supplies at the specified position. Examples # Display power supply information. <Sysname> display power Slot 9: Input Power: 136(W) PowerID State Mode Current(A)
  • Page 244: Display Scheduler Reboot

    Views Any view Predefined user roles network-admin network-operator Examples # Display job execution log information. <Sysname> display scheduler logfile Logfile Size: 1902 Bytes. Job name : shutdown Schedule name : shutdown Execution time : Tue Dec 27 10:44:42 2015 Completion time : Tue Dec 27 10:44:47 2015 --------------------------------- Job output ----------------------------------- <Sysname>system-view System View: return to User View with Ctrl+Z.
  • Page 245: Display Scheduler Schedule

    Examples # Display the automatic reboot schedule. <Sysname> display scheduler reboot System will reboot at 16:32:00 05/23/2015 (in 1 hours and 39 minutes). Related commands scheduler reboot at scheduler reboot delay display scheduler schedule Use display scheduler schedule to display schedule information. Syntax display scheduler schedule [ schedule-name ] Views...
  • Page 246: Display System Stable State

    Field Description Number of times the schedule has been executed. If the schedule has never been Execution counts executed, this field is not displayed. Job name Name of a job under the schedule. Result of the most recent execution: • Successful.
  • Page 247: Display System-Working-Mode

    Table 42 Command output Field Description System status: • Stable—The system is operating stably. System state • Not ready—The system is not operating stably. You cannot perform an ISSU when the system is in this state. System redundancy status: • Stable—Member devices are operating stably.
  • Page 248: Display Transceiver Alarm

    display transceiver alarm Use display transceiver alarm to display transceiver alarms. Syntax display transceiver alarm interface [ interface-type interface-number ] Views Any view Predefined user roles network-admin network-operator Parameters interface [ interface-type interface-number ]: Specifies an interface by its type and number. If no interface is specified, this command displays the alarms present on every transceiver module.
  • Page 249: Display Transceiver Diagnosis

    display transceiver diagnosis Use display transceiver diagnosis to display the current values of the digital diagnosis parameters on transceiver modules. Syntax display transceiver diagnosis interface [ interface-type interface-number ] Views Any view Predefined user roles network-admin network-operator Parameters interface [ interface-type interface-number ]: Specifies an interface by its type and number. If no interface is specified, this command displays the current values of the digital diagnosis parameters on every transceiver module.
  • Page 250: Display Transceiver Manuinfo

    Views Any view Predefined user roles network-admin network-operator Parameters interface-type interface-number: Specifies an interface by its type and number. If you do not specify an interface, this command displays the key parameters of every transceiver module. Examples # Display the key parameters of the transceiver module in interface Ten-GigabitEthernet 1/0/1. <Sysname>...
  • Page 251: Display Version-Update-Record

    network-operator Examples # Display system version information. <Sysname> display version display version-update-record Use display version-update-record to display startup software image upgrade records. Syntax display version-update-record Views Any view Predefined user roles network-admin network-operator Usage guidelines The device records its current startup software version information whenever it starts up, and records all software version update information.
  • Page 252: Hardware-Resource Switch-Mode

    Syntax fan prefer-direction slot slot-number { power-to-port | port-to-power } undo fan prefer-direction slot slot-number Default The preferred airflow direction is from the power supply side to the port side. Views System view Predefined user roles network-admin Parameters slot slot-number: Specifies an IRF member device by its member ID. power-to-port: Specifies the airflow direction from the power supply side to the port side.
  • Page 253: Header

    Usage guidelines The switch supports multiple hardware resource modes for the MAC address table, ARP/ND table, and routing tables. The capacities of the MAC address table, ARP/ND table, and routing tables vary by hardware resource mode. For table capacities in different scenarios, see Fundamentals Configuration Guide.
  • Page 254: Job

    Examples # Configure the legal banner. <Sysname> system-view [Sysname] header legal Please input banner content, and quit with the character '%'. Welcome to use the legal banner% Use job to assign a job to a schedule. Use undo job to revoke a job. Syntax job job-name undo job job-name...
  • Page 255: Memory-Threshold Usage

    undo memory-threshold [ slot slot-number [ cpu cpu-number ] ] Default • Minor alarm threshold: 96 MB. • Severe alarm threshold: 64 MB. • Critical alarm threshold: 48 MB. • Normal state threshold: 128 MB. Views System view Predefined user roles network-admin Parameters minor minor-value: Specifies the minor alarm threshold.
  • Page 256: Monitor Cpu-Usage Enable

    Syntax memory-threshold [ slot slot-number [ cpu cpu-number ] ] usage memory-threshold undo memory-threshold [ slot slot-number [ cpu cpu-number ] ] usage Default The memory usage threshold is 100%. Views System view Predefined user roles network-admin Parameters memory-threshold: Specifies the memory usage threshold in percentage. The value range is 0 to 100.
  • Page 257: Monitor Cpu-Usage Interval

    cpu cpu-number: Specifies a CPU by its number. Usage guidelines After CPU usage monitoring is enabled, the system samples and saves CPU usage at the interval specified by the monitor cpu-usage interval command. You can use the display cpu-usage history command to view recent CPU usage. Examples # Enable CPU usage monitoring.
  • Page 258: Monitor Cpu-Usage Threshold

    monitor cpu-usage threshold Use monitor cpu-usage threshold to set the CPU usage threshold. Use undo monitor cpu-usage threshold to restore the default. Syntax monitor cpu-usage threshold cpu-threshold [ slot slot-number [ cpu cpu-number ] ] undo monitor cpu-usage threshold [ slot slot-number [ cpu cpu-number ] ] Default The CPU usage threshold is 99%.
  • Page 259: Reboot

    Specifies a subcard by its subslot number. This option is available only on the HPE FlexFabric 5940 2-slot Switch (JH397A) and HPE FlexFabric 5940 4-slot Switch (JH398A). force: Reboots the device immediately without performing software or hard disk check. If this keyword is not specified, the system first identifies whether the reboot might result in data loss or a system failure.
  • Page 260: Reset Scheduler Logfile

    To reboot all member devices, do not specify the slot number option. To reboot an IRF member device, specify the slot number and do not specify a subslot number. To reboot the master, perform the following tasks: • Identify whether the IRF fabric has subordinate members and whether the subordinate members are operating correctly.
  • Page 261: Reset Version-Update-Record

    <Sysname> reset scheduler logfile Related commands display scheduler logfile reset version-update-record Use reset version-update-record to clear startup software image upgrade records. Syntax reset version-update-record Views System view Predefined user roles network-admin Examples # Clear the startup software image upgrade records. <Sysname>...
  • Page 262: Scheduler Job

    Related commands reboot scheduler job Use scheduler job to create a job and enter its view, or enter the view of an existing job. Use undo scheduler job to delete a job. Syntax scheduler job job-name undo scheduler job job-name Default No job exists.
  • Page 263: Scheduler Reboot At

    Parameters value: Specifies the size of the job execution log file, in KB. The value range is 16 to 1024. Usage guidelines The job execution log file saves the execution information of jobs. If the file is full, old records are deleted to make room for new records.
  • Page 264: Scheduler Reboot Delay

    For data security, the system does not reboot at the reboot time if a file operation is being performed. Examples # Configure the device to reboot at 12:00 p.m. This example assumes that the current time is 11:43 a.m. on June 6, 2015. <Sysname>...
  • Page 265: Shutdown-Interval

    Use undo scheduler schedule to delete a schedule. Syntax scheduler schedule schedule-name undo scheduler schedule schedule-name Default No schedule exists. Views System view Predefined user roles network-admin Parameters schedule-name: Specifies the schedule name, a case-sensitive string of 1 to 47 characters. Usage guidelines You can configure a schedule to have the device automatically run a command or a set of commands without administrative interference.
  • Page 266: Sysname

    Use sysname to set the device name. Use undo sysname to restore the default. Syntax sysname sysname undo sysname Default The device name is HPE. Views System view Predefined user roles network-admin Parameters sysname: Specifies a name for the device, a string of 1 to 64 characters.
  • Page 267: System-Working-Mode

    Examples # Set the name of the device to R2000. <Sysname> system-view [Sysname] sysname R2000 [R2000] system-working-mode Use system-working-mode to set the system operating mode. Use undo system-working-mode to restore the default. Syntax system-working-mode { advance | standard } undo system-working-mode Default The device operates in standard mode.
  • Page 268: Time At

    Views System view Predefined user roles network-admin Parameters slot slot-number: Specifies an IRF member device by its member ID. hotspot: Configures temperature alarm thresholds for hotspot sensors. A hotspot sensor is typically near the chip that generates a great amount of heat and used to monitor the chip. sensor-number: Specifies a sensor by its number.
  • Page 269: Time Once

    Predefined user roles network-admin Parameters time: Specifies the schedule execution time in the hh:mm format. The value range for hh is 0 to 23. The value range for mm is 0 to 59. date: Specifies the schedule execution date in the MM/DD/YYYY or YYYY/MM/DD format. The value range for YYYY is 2000 to 2035.
  • Page 270: Time Repeating

    delay time: Specifies the delay time for executing the schedule, in the hh:mm or mm format. This argument can have up to six characters. When in the hh:mm format, mm must be in the range of 0 to Usage guidelines If the specified time has already occurred, the schedule will be executed at the specified time the following day.
  • Page 271 Views Schedule view Predefined user roles network-admin Parameters at time: Specifies the execution time in the hh:mm format. The value range for hh is 0 to 23. The value range for mm is 0 to 59. If you do not specify this option, the current system time is used as the execution time.
  • Page 272: Usb Disable

    <Sysname> system-view [Sysname] scheduler schedule saveconfig [Sysname-schedule-saveconfig] time repeating at 8:00 week-day fri sat Related commands scheduler schedule usb disable Use usb disable to disable USB interfaces. Use undo usb disable to enable USB interfaces. Syntax usb disable undo usb disable Default All USB interfaces are enabled.
  • Page 273 Parameters role-name: Specifies a user role name, a case-sensitive string of 1 to 63 characters. The user role can be user-defined or predefined. Predefined user roles include network-admin, network-operator, and level-0 to level-15. Usage guidelines A schedule must have one or more user roles. A command in a schedule can be executed if it is permitted by one or more user roles of the schedule.
  • Page 274: Tcl Commands

    Tcl commands Use cli to enable a Comware command to be executed in Tcl configuration view when it conflicts with a Tcl command. Syntax cli command Views Tcl configuration view Predefined user roles network-admin Parameters command: Specifies the commands to be executed. They must be complete command lines. Usage guidelines In Tcl configuration view, if a Comware command conflicts with a Tcl command, the Tcl command will be executed.
  • Page 275: Tclsh

    Views Tcl configuration view Predefined user roles network-admin Usage guidelines To return from Tcl configuration view to user view, you can also use the quit command. To return to the upper-level view after you execute Comware commands to enter system view or a Comware feature view, use the quit command.
  • Page 276: Python Commands

    Python commands exit() Use exit() to exit the Python shell. Syntax exit() Views Python shell Predefined user roles network-admin Usage guidelines To return to user view from the Python shell, you cannot use the quit command. You must use the exit() command.
  • Page 277: Python Filename

    Type "help", "copyright", "credits" or "license" for more information. >>> python filename Use python filename to execute a Python script. Syntax python filename [ param ] Views User view Predefined user roles network-admin Parameters filename: Specifies the name of a Python script on a storage medium of the device. The script name is case sensitive and must use the extension .py.
  • Page 278: Preprovisioning Commands

    Preprovisioning commands display provision failed-config Use display provision failed-config to display preprovisioned-commands application failure records. Syntax display provision failed-config Views Any view Predefined user roles network-admin network-operator Usage guidelines A preprovisioned command cannot be applied if it conflicts with the running configuration. Use this command to verify the application result of preprovisioned commands except for the following commands: •...
  • Page 279: Reset Provision Failed-Config

    When you disable preprovisioning on a subslot, the device removes preconfigured settings for the subslot. Examples # Enable preprovisioning for the HPE FlexFabric 5940 2-slot Switch (JH397A) on a slot. <Sysname> system-view [Sysname] slot 2 [Sysname-slot-2] provision model 5940 2-slot...
  • Page 280: Slot

    Predefined user roles network-admin Usage guidelines Preprovisioned modules that repeatedly come online and go offline (or join and leave the IRF fabric) might leave a number of preprovisioned-commands application failure records in memory. To release the occupied memory space, execute the reset provision failed-config command. Examples # Clear preprovisioned-commands application failure records.
  • Page 281: Document Conventions And Icons

    Document conventions and icons Conventions This section describes the conventions used in the documentation. Command conventions Convention Description Bold text represents commands and keywords that you enter literally as shown. Boldface Italic text represents arguments that you replace with actual values. Italic Square brackets enclose syntax choices (keywords or arguments) that are optional.
  • Page 282: Network Topology Icons

    Network topology icons Convention Description Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features.
  • Page 283: Support And Other Resources

    Support and other resources Accessing Hewlett Packard Enterprise Support • For live assistance, go to the Contact Hewlett Packard Enterprise Worldwide website: www.hpe.com/assistance • To access documentation and support services, go to the Hewlett Packard Enterprise Support Center website: www.hpe.com/support/hpesc Information to collect •...
  • Page 284: Websites

    For more information and device support details, go to the following website: www.hpe.com/info/insightremotesupport/docs Documentation feedback Hewlett Packard Enterprise is committed to providing documentation that meets your needs. To help us improve the documentation, send any errors, suggestions, or comments to Documentation Feedback (docsfeedback@hpe.com). When submitting your feedback, include the document title,...
  • Page 285 part number, edition, and publication date located on the front cover of the document. For online help content, include the product name, product version, help edition, and publication date located on the legal notices page.
  • Page 286: Index

    Index A B C D E F G H I J L M N O P Q R S T U V description,14 dir,138 activation-key,45 dir,104 alias,1 disconnect,105 append,99 display | { begin | exclude | include archive configuration,155 display | by-linenum,3 archive configuration interval,155...
  • Page 287 display ip http,52 ftp client source,108 display ip https,52 ipv6,109 display issu rollback-timer,191 ftp server acl,95 display issu state,192 ftp server dscp,95 display line,53 ftp server enable,96 display memory,232 ftp server ipv6 dscp,96 display memory-threshold,233 ftp server ssl-server-policy,97 display power,234 timeout,98 display provision failed-config,270...
  • Page 288 line,68 reset install rollback oldest,213 line class,69 reset provision failed-config,271 lock,70 reset recycle-bin,148 lock reauthentication,71 reset saved-configuration,170 lock-key,71 reset scheduler logfile,252 ls,112 reset version-update-record,253 restart,119 restful http enable,75 md5sum,144 restful https enable,76 memory-threshold,246 restore factory-default,253 memory-threshold usage,247 restore startup-configuration,171 mkdir,113 return,12 mkdir,145 rhelp,120...
  • Page 289 extract,151 tftp-server ipv6 acl,133 list,152 time at,260 tclquit,266 time once,261 tclsh,267 time repeating,262 telnet,81 telnet client source,82 umount,153 telnet ipv6,83 undelete,153 telnet server acl,84 disable,264 telnet server dscp,84 user,125 telnet server enable,85 user-interface,88 telnet server ipv6 acl,86 user-interface class,89 telnet server ipv6 dscp,86 user-role,264 temperature-limit,259...

Table of Contents