HP 445860-B21 - 10Gb Ethernet BL-c Switch Reference Manual

Hp 10gb ethernet bl-c switch iscli reference guide.
Hide thumbs
HP 10Gb Ethernet BL-c Switch
ISCLI Reference Guide
Part number: 445942-001
Third Edition: June 2007

Advertising

   Related Manuals for HP 445860-B21 - 10Gb Ethernet BL-c Switch

   Summary of Contents for HP 445860-B21 - 10Gb Ethernet BL-c Switch

  • Page 1

    HP 10Gb Ethernet BL-c Switch ISCLI Reference Guide Part number: 445942-001 Third Edition: June 2007...

  • Page 2

    Legal notices © 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty.

  • Page 3: Table Of Contents

    Contents Contents ISCLI reference Introduction ............................9 Additional references ..........................9 Connecting to the switch ......................... 9 Establishing a console connection ..................... 10 Setting an IP address ........................10 Establishing a Telnet connection......................11 Establishing an SSH connection ......................11 Accessing the switch..........................

  • Page 4: Table Of Contents

    Contents Common Internal Spanning Tree information ..................41 Trunk group information........................43 VLAN information ........................... 44 Layer 3 information ..........................45 Route information ..........................46 Show all IP Route information ......................46 ARP information ..........................48 Show all ARP entry information ....................48 ARP address list information ......................

  • Page 5: Table Of Contents

    Contents ICMP statistics ..........................83 TCP statistics........................... 84 UDP statistics ..........................86 IGMP Multicast Group statistics......................86 OSPF statistics ............................. 87 OSPF global statistics ........................88 VRRP statistics ............................91 RIP statistics ............................ 92 GEA Layer 3 statistics ........................92 GEA Layer 3 statistics ........................

  • Page 6: Table Of Contents

    Contents 802.1x Port configuration ......................128 Rapid Spanning Tree Protocol / Multiple Spanning Tree Protocol configuration........129 Common Internal Spanning Tree configuration.................. 131 CIST bridge configuration ......................131 CIST port configuration ......................132 Spanning Tree configuration......................134 Bridge Spanning Tree configuration ................... 135 Spanning Tree port configuration ....................

  • Page 7: Table Of Contents

    Contents Access Control configuration ....................... 171 Access Control List configuration ..................... 171 ACL Ethernet Filter configuration ..................... 171 ACL IP Version 4 Filter configuration....................172 ACL TCP/UDP Filter configuration ....................173 ACL Packet Format configuration..................... 174 ACL Metering configuration......................174 ACL Re-mark configuration ......................

  • Page 8

    Contents Panic command ..........................197 Unscheduled system dumps ......................... 197 Index...

  • Page 9: Introduction, Additional References, Connecting To The Switch

    ISCLI reference ISCLI reference Introduction The HP 10Gb Ethernet BL-c Switch is ready to perform basic switching functions right out of the box. Some of the more advanced features, however, require some administrative configuration before they can be used effectively. This guide provides a command reference for the HP 10GbE switch. The extensive switching software included in the switch provides a variety of options for accessing and configuring the switch: Text-based command line interfaces (AOS CLI and ISCLI) for access via a local terminal or remote...

  • Page 10: Establishing A Console Connection, Setting An Ip Address

    ISCLI reference Establishing a console connection To establish a console connection with the switch, you need: A null modem cable with a female DB-9 connector (See the HP 10Gb Ethernet BL-c Switch User Guide for more information.) An ASCII terminal or a computer running terminal emulation software set to the parameters shown in the table below.

  • Page 11: Establishing A Telnet Connection, Establishing An Ssh Connection

    ISCLI reference Establishing a Telnet connection A Telnet connection offers the convenience of accessing the HP 10GbE switch from any workstation connected to the network. Telnet provides the same options for user, operator, and administrator access as those available through the console port. By default, Telnet is enabled on the switch. The switch supports four concurrent Telnet connections.

  • Page 12: Accessing The Switch

    ISCLI reference The following SSH clients are supported: SSH 3.0.1 for Linux (freeware) SecureCRT® 4.1.8 (VanDyke Technologies, Inc.) OpenSSH_3.9 for Linux (FC 3) FedoraCore 3 for SCP commands PuTTY Release 0.58 (Simon Tatham) for Windows NOTE: The HP 10GbE switch implementation of SSH is based on versions 1.5 and 2.0, and supports SSH clients from version 1.0 through version 2.0.

  • Page 13: Idle Timeout

    ISCLI reference User access levels Table 2 User account Description and tasks performed User The User has no direct responsibility for switch management. He or she can view all switch status information and statistics, but cannot make any configuration changes to the switch. The user account is enabled by default, and the default password is user.

  • Page 14: Typographical Conventions

    ISCLI reference Typographical conventions The following table describes the typographic styles used in this guide: Typographical conventions Table 3 Typeface or symbol Meaning angle brackets < > Indicate a variable to enter based on the description inside the brackets. Do not type the brackets as you enter the command.

  • Page 15: Accessing The Iscli, Introduction, Iscli Command Modes

    ISCLI basics ISCLI basics Introduction The ISCLI is used for viewing switch information and statistics. In addition, the administrator can use the CLI for performing all levels of switch configuration. This chapter describes the ISCLI Command Modes, and provides a list of commands and shortcuts that typically are from all the command modes within the ISCLI.

  • Page 16

    ISCLI basics The following table describes the ISCLI command modes. ISCLI Command Modes Table 4 Command Mode/Prompt Command used to enter or exit. User EXEC Default mode, entered automatically Switch> exit—Exit logout—Exit Privileged EXEC enable—Enter Privileged EXEC mode, from User EXEC mode disable—Exit to User EXEC mode Switch# exit or logout—Quit ISCLI...

  • Page 17: Global Commands

    ISCLI basics Global commands Some basic commands are recognized throughout the ISCLI hierarchy. These commands are useful for obtaining online Help, navigating through the interface, and saving configuration changes. To get help about a specific command, type the command, followed by help. The following table describes the global commands.

  • Page 18: Command Line Interface Shortcuts, Command Abbreviation, Tab Completion

    ISCLI basics Command line interface shortcuts The following shortcuts allow you to enter commands quickly and easily. Command abbreviation Most commands can be abbreviated by entering the first characters that distinguish the command from the others in the same mode. For example, consider the following full command: Switch(config)# spanning-tree stp 1 bridge hello 2 The command shown above could also be entered as: Switch(config)# sp stp 1 br h 2...

  • Page 19

    Information Commands Information Commands Introduction You can view configuration information for the switch in the ISCLI. This chapter discusses how to use the ISCLI to display switch information. The following table describes general information commands. Information commands Table 6 Command Usage Displays system information.

  • Page 20: System Information Commands

    Information Commands Information commands Table 6 Command Usage Dumps all switch information available (10K or more, depending on your show information-dump configuration). If you want to capture dump data to a file, set your communication software on your workstation to capture session data prior to issuing the dump commands.

  • Page 21: Snmpv3 Information Commands

    Information Commands SNMPv3 Information commands SNMP version 3 (SNMPv3) is an extensible SNMP Framework that supplements the SNMPv2 Framework by supporting the following: a new SNMP message format security for messages access control remote configuration of SNMP parameters For more details on the SNMPv3 architecture, see RFC2271 to RFC2276. The following table describes the SNMPv3 Information commands.

  • Page 22: Snmpv3 Usm User Table Information, Snmpv3 View Table Information

    Information Commands SNMPv3 USM User Table information The following command displays SNMPv3 user information: show snmp-server v3 user Command mode: All The User-based Security Model (USM) in SNMPv3 provides security services such as authentication and privacy of messages. This security model makes use of a defined set of user identities displayed in the USM user table.

  • Page 23: Snmpv3 Access Table Information

    Information Commands The following table describes the SNMPv3 View Table information. View Table parameters Table 10 Field Description Displays the name of the view. View Name Displays the MIB subtree as an OID string. A view subtree is the set of all MIB object Subtree instances which have a common Object Identifier prefix to their names.

  • Page 24: Snmpv3 Group Table Information, Snmpv3 Community Table Information

    Information Commands SNMPv3 Group Table information The following command displays SNMPv3 group information: show snmp-server v3 group Command mode: All Sec Model User Name Group Name ---------- ----------------------------- ------------------------------- snmpv1 v1v2only v1v2grp adminmd5 admingrp adminsha admingrp A group is a combination of security model and security name that defines the access rights assigned to all the security names belonging to that group.

  • Page 25: Snmpv3 Target Address Table Information, Snmpv3 Target Parameters Table Information

    Information Commands SNMPv3 Target Address Table information The following command displays SNMPv3 target address information: show snmp-server v3 target-address Command mode: All Name Transport Addr Port Taglist Params ---------- --------------- ---- ---------- --------------- trap1 47.81.25.66 v1v2trap v1v2param This command displays the SNMPv3 target address table information, which is stored in the SNMP engine.

  • Page 26: Snmpv3 Notify Table Information

    Information Commands Target Parameters Table information Table 15 Field Description Displays the security model used when generating SNMP messages using this entry. The system Sec Model may choose to return an inconsistentValue error if an attempt is made to set this variable to a value for a security model which the system does not support.

  • Page 27: Snmpv3 Dump

    Information Commands SNMPv3 dump The following command displays SNMPv3 information: show snmp-server v3 Command mode: All Engine ID = 80:00:07:50:03:00:0F:6A:F8:EF:00 usmUser Table: User Name Protocol -------------------------------- -------------------------------- admin NO AUTH, NO PRIVACY adminmd5 HMAC_MD5, DES PRIVACY adminsha HMAC_SHA, DES PRIVACY v1v2only NO AUTH, NO PRIVACY vacmAccess Table:...

  • Page 28: System Information

    Information Commands System information The following command displays system information: show sys-info Command mode: All System Information at 6:56:22 Thu Jan 11, 2007 Time zone: America/US/Pacific HP 10 Gb Ethernet Blade Switch sysName: sysLocation: RackId: Default RUID RackName: Default Rack Name EnclosureSerialNumber: -none- EnclosureName: Default Chassis Name BayNumber:...

  • Page 29: Show Recent Syslog Messages

    Information Commands Show recent syslog messages The following command displays system log messages: show logging messages Command mode: All Date Time Severity level Message ---- ---- ----------------- ------- Jul 8 17:25:41 NOTICE system: link up on port 1 Jul 8 17:25:41 NOTICE system: link up on port 8 Jul 8 17:25:41...

  • Page 30: System User Information

    Information Commands System user information The following command displays user status information: show access user Command mode: All except User EXEC Usernames: user - enabled oper - disabled admin - Always Enabled Current User ID table: 1: name tech1 , ena, cos user , password valid, online 2: name tech2 , ena, cos user...

  • Page 31: Layer 2 Information

    Information Commands Layer 2 information The following table describes the Layer 2 Information commands. The following sections provide more detailed information and commands. Layer 2 information commands Table 18 Command Usage Displays Forwarding Database Information. show mac-address-table Command mode: All Displays a summary of LACP information.

  • Page 32: Fdb Information Commands

    Information Commands Layer 2 information commands Table 18 Command Usage Displays VLAN configuration information, including: show vlan information VLAN Number VLAN Name Status Port membership of the VLAN Command mode: All Dumps all switch information available from Layer 2 memory show layer2 (10K or more, depending on your configuration).

  • Page 33: Show All Fdb Information, Clearing Entries From The Forwarding Database, Link Aggregation Control Protocol Information

    Information Commands Show all FDB information The following command displays Forwarding Database information: show mac-address-table Command mode: All MAC address VLAN Port Trnk State ----------------- ---- ---- ---- ----- 00:02:01:00:00:00 00:02:01:00:00:01 00:02:01:00:00:02 00:02:01:00:00:03 00:02:01:00:00:04 00:02:01:00:00:05 00:02:01:00:00:06 00:02:01:00:00:07 00:02:01:00:00:08 00:02:01:00:00:09 00:02:01:00:00:0a 00:02:01:00:00:0b 00:02:01:00:00:0c An address that is in the forwarding (FWD) state indicates that the switch has learned it.

  • Page 34: Lacp Dump

    Information Commands LACP dump The following command displays LACP information: show lacp information Command mode: All >> LACP# dump port lacp adminkey operkey selected prio attached trunk aggr ---------------------------------------------------------------------- 32768 32768 32768 32768 32768 32768 32768 32768 … LACP dump includes the following information for each port in the HP 10GbE switch: lacp—Displays the port’s LACP mode (active, passive, or off) adminkey—Displays the value of the port’s adminkey.

  • Page 35: X Information

    Information Commands 802.1x information The following command displays 802.1x information: show dot1x information Command mode: All System capability : Authenticator System status : disabled Protocol version Authenticator Backend Port Auth Mode Auth Status PAE State Auth State ---- ------------ ------------ -------------- ---------- force-auth...

  • Page 36

    Information Commands 802.1x information Table 21 Field Description Displays the Authenticator Port Access Entity State. The PAE state can be Authenticator PAE State one of the following: initialize disconnected connecting authenticating authenticated aborting held forceAuth Displays the Backend Authorization State. The Backend Authorization state Backend Auth State can be one of the following: request...

  • Page 37: Spanning Tree Information

    Information Commands Spanning Tree information The following table describes the Spanning Tree Protocol (STP) information commands. STP information commands Table 22 Command Usage Displays information about the spanning tree group. show spanning-tree stp <1-128> Command mode: All Displays STP bridge information. show spanning-tree stp <1-128>...

  • Page 38

    Information Commands You can also refer to the following port-specific STP information: Port number and priority Cost State Port Fast Forwarding state Designated bridge Designated port The following table describes the STP parameters. STP parameters Table 23 Parameter Description Shows information about the root bridge for the Spanning Tree. Information includes Current Root the priority (hex) and MAC address of the root.

  • Page 39: Rapid Spanning Tree And Multiple Spanning Tree Information

    Information Commands Rapid Spanning Tree and Multiple Spanning Tree information The following command displays RSTP/MSTP information: show spanning-tree stp <1-128> information Command mode: All ------------------------------------------------------------------ upfast disabled, update 40 ------------------------------------------------------------------ Spanning Tree Group 1: On (RSTP) VLANs: 1-3 Current Root: Path-Cost Port Hello MaxAge FwdDel 8000 00:00:01:00:19:00...

  • Page 40

    Information Commands You can also refer to the following port-specific RSTP information: Port number and priority Cost State Role Designated bridge and port Link type The following table describes the STP parameters in RSTP or MSTP mode. Rapid Spanning Tree parameter descriptions Table 24 Parameter Description...

  • Page 41: Common Internal Spanning Tree Information

    Information Commands Rapid Spanning Tree parameter descriptions Table 24 Parameter Description Shows the current role of this port in the Spanning Tree. The port role can be one of the Role following: Designated (DESG), Root (ROOT), Alternate (ALTN), Backup (BKUP), Master (MAST), or Unknown (UNK).

  • Page 42

    Information Commands In addition to seeing if Common Internal Spanning Tree (CIST) is enabled or disabled, you can view the following CIST bridge information: Status of Uplink Fast (upfast) CIST root CIST regional root Priority Maximum age value Forwarding delay Hops You can also refer to the following port-specific CIST information: Port number and priority...

  • Page 43: Trunk Group Information

    Information Commands Common Internal Spanning Tree parameter descriptions Table 25 Parameter Description Shows the current role of this port in the Spanning Tree. The port role can be one of Role the following: Designated (DESG), Root (ROOT), Alternate (ALTN), Backup (BKUP), Master (MAST).

  • Page 44: Vlan Information

    Information Commands VLAN information The following table describes the VLAN information commands. VLAN information commands Table 26 Command Usage Displays VLAN information show vlan Command mode: All Displays VLAN information, including spanning tree assignment. show vlan information Command mode: All The following command displays VLAN information: show vlan Command mode: All...

  • Page 45: Layer 3 Information

    Information Commands Layer 3 information The following table describes basic Layer 3 Information commands. The following sections provide more detailed information and commands. Layer 3 information commands Table 27 Command Usage Displays all routes configured in the switch. show ip route Command mode: All except User EXEC Displays general IP information.

  • Page 46: Route Information, Show All Ip Route Information

    Information Commands Route information Using the commands listed below, you can display all or a portion of the IP routes currently held in the switch. Route Information commands Table 28 Command Usage Displays a single route by destination IP address. show ip route address <IP address>...

  • Page 47

    Information Commands The following table describes the Type parameter. IP Routing Type information Table 29 Field Description The next hop to the host or subnet destination will be forwarded through a router at the indirect Gateway address. Packets will be delivered to a destination host or subnet attached to the switch. direct Indicates a route to one of the switch’s IP interfaces.

  • Page 48: Arp Information, Show All Arp Entry Information

    Information Commands ARP information The Address Resolution Protocol (ARP) information includes IP address and MAC address of each entry, address status flags, VLAN, and port for the address, and port referencing information. The following table describes the Address Resolution Protocol commands. ARP information Table 31 Command...

  • Page 49: Arp Address List Information, Ospf Information

    Information Commands ARP address list information The following command displays ARP address list information: show ip arp reply Command mode: All except User EXEC IP address IP mask MAC address VLAN Flags --------------- --------------- ----------------- ---- ----- 205.178.18.66 255.255.255.255 00:70:cf:03:20:04 205.178.50.1 255.255.255.255 00:70:cf:03:20:06...

  • Page 50: Ospf General Information, Ospf Interface Information

    Information Commands OSPF general information The following command displays general OSPF information: show ip ospf general-information Command mode: All except User EXEC OSPF Version 2 Router ID: 10.10.10.1 Started at 1663 and the process uptime is 4626 Area Border Router: yes, AS Boundary Router: no LS types supported are 6 External LSA count 0 External LSA checksum sum 0x0...

  • Page 51: Ospf Database Information

    Information Commands OSPF Database information The following table describes the OSPF Database information commands. OSPF Database information commands Table 34 Command Usage Takes advertising router as a parameter. Displays all the Link show ip ospf database advertising- State Advertisements (LSAs) in the LS database that have the router <router ID>...

  • Page 52: Ospf Route Codes Information

    Information Commands OSPF Database information commands Table 34 Command Usage Displays the network summary (type 3) LSAs with detailed show ip ospf database summary [advertising-router <router ID> | information of each field of the LSAs. linkstate-id <A.B.C.D> | self] Command mode: All except User EXEC Displays all the LSAs.

  • Page 53: Routing Information Protocol, Rip Routes Information, Rip User Configuration

    Information Commands Routing Information Protocol The following table describes the Routing Information Protocol (RIP) information commands. RIP information commands Table 35 Command Usage Displays RIP routes. show ip rip routes Command mode: All except User EXEC Displays RIP interface information. show ip rip interface [<1-249>] Command mode: All except User EXEC Displays RIP user’s configuration.

  • Page 54: Ip Information

    Information Commands IP information The following command displays Layer 3 information: show layer3 information Command mode: All IP information: Interface information: 1: 10.80.23.243 255.255.254.0 10.80.23.255, vlan 1, up 250: 10.20.7.144 255.255.0.0 10.20.255.255, vlan 4095, up Default gateway information: metric strict 1: 10.80.22.1, vlan any, active...

  • Page 55: Igmp Multicast Group Information, Igmp Group Information

    Information Commands IGMP multicast group information The following table describes the commands used to display information about IGMP groups learned by the switch. IGMP Multicast Group commands Table 36 Command Usage Displays a single IGMP multicast group by its IP address. show ip igmp groups address <IP address>...

  • Page 56: Igmp Multicast Router Information

    Information Commands IGMP multicast router information The following table describes the commands used to display information about multicast routers learned through IGMP Snooping. IGMP Multicast Router information commands Table 37 Command Usage show ip igmp mrouter vlan <1-4094> Displays information for all multicast groups on a single VLAN. Command mode: All except User EXEC Displays information for all multicast groups learned by the switch.

  • Page 57: Vrrp Information

    Information Commands VRRP information Virtual Router Redundancy Protocol (VRRP) support on HP 10GbE switch provides redundancy between routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID number on each participating VRRP-capable routing device. One of the virtual routers is then elected as the master, based on a number of priority criteria, and assumes control of the shared virtual router IP address.

  • Page 58: P Information

    Information Commands 802.1p information The following command displays 802.1p information: show qos transmit-queue information Command mode: All Current priority to COS queue information: Priority COSq Weight -------- ---- ------ Current port priority information: Port Priority COSq Weight ----- -------- ---- ------ …...

  • Page 59: Acl Information

    Information Commands ACL information The following table describes the commands used to display information about Access Control Lists and Groups. ACL information commands Table 40 Command Usage Displays information about the selected ACL. show access-control list <1-384> Command mode: All except User EXEC Displays information about ACL Groups.

  • Page 60: Rmon Information, Rmon History Information

    Information Commands RMON Information The following command displays general RMON information: show rmon Command mode: All RMON history information The following command displays RMON history information: show rmon history Command mode: All RMON History group configuration: Index IFOID Interval Rbnum Gbnum ----- ------------------------------...

  • Page 61: Rmon Alarm Information

    Information Commands RMON alarm information The following command displays RMON alarm information: show rmon alarm Command mode: All RMON Alarm group configuration: Index Interval Type rLimit fLimit rEvtIdx fEvtIdx last value ----- -------- ---- -------- -------- ------- ------- ---------- 1800 1800 1800 56344540...

  • Page 62: Rmon Event Information

    Information Commands RMON Alarm Information Table 42 Command Usage Displays the rising alarm event index that is triggered when a rising threshold is crossed. rEvtIdx Displays the falling alarm event index that is triggered when a falling threshold is crossed. fEvtIdx Displays the last sampled value.

  • Page 63: Link Status Information

    Information Commands Link status information The following command displays link information: show interface link Command mode: All except User EXEC ------------------------------------------------------------------ Port Speed Duplex Flow Ctrl Link ---- ----- -------- --TX-----RX-- ------ 10000 full down 10000 full down 10000 full down 10000 full...

  • Page 64: Port Information

    Information Commands Port information The following command displays port information: show interface information Command mode: All except User EXEC Port Tag RMON PVID NAME VLAN(s) ---- --- ---- ---- -------------- ------------------------------- 1 Downlink1 1 Downlink2 1 Downlink3 1 Downlink4 1 Downlink5 1 Downlink6 1 Downlink7 1 Downlink8...

  • Page 65: Logical Port To Gea Port Mapping, Fiber Port Sfp Status

    Information Commands Logical Port to GEA Port mapping The following command displays information about GEA ports: show geaport Command mode: All Logical Port GEA Port(0-based) GEA Unit ------------ ----------------- --------- This display correlates the logical port number to the GEA unit on which each port resides. Fiber Port SFP status The following command displays XFP information: show sfp...

  • Page 66: Uplink Failure Detection Information, Information Dump

    Information Commands Uplink Failure Detection information The following command displays Uplink Failure Detection (UFD) information: show ufd Command mode: All except User EXEC Uplink Failure Detection: Enabled LtM status: Down Member STG State Link Status --------- ------------ ----------- port 20 down DISABLED DISABLED *...

  • Page 67

    Statistics Commands Statistics Commands Introduction You can view switch performance statistics in the user, operator, and administrator command modes. This chapter discusses how to use the ISCLI to display switch statistics. The following table describes general Statistics commands. Statistics commands Table 44 Command Usage...

  • Page 68: Port Statistics

    Statistics Commands Port Statistics The following table describes the Port Statistics commands. The following sections provide more detailed information and commands. Port Statistics commands Table 45 Command Usage Displays IEEE 802.1x statistics for the port. show interface port <port number> dot1x counters Command mode: All Displays bridging (“dot1”) statistics for the port.

  • Page 69: X Statistics

    Statistics Commands 802.1x statistics Use the following command to display the 802.1x authenticator statistics of the selected port: show interface port <port number> dot1x counters Command mode: All Authenticator Statistics: eapolFramesRx eapolFramesTx eapolStartFramesRx eapolLogoffFramesRx eapolRespIdFramesRx eapolRespFramesRx eapolReqIdFramesTx eapolReqFramesTx invalidEapolFramesRx eapLengthErrorFramesRx = 0 lastEapolFrameVersion lastEapolFrameSource = 00:00:00:00:00:00...

  • Page 70

    Statistics Commands 802.1x statistics for port Table 46 Statistics Description Total number of times that the state machine transitions from authEntersAuthenticating CONNECTING to AUTHENTICATING, as a result of an EAPResponse/Identity message being received from the Supplicant. Total number of times that the state machine transitions from authSuccessesWhileAuthenticating AUTHENTICATING to AUTHENTICATED, as a result of the Backend Authentication state machine indicating successful authentication of...

  • Page 71: Bridging Statistics

    Statistics Commands 802.1x statistics for port Table 46 Statistics Description Total number of times that the state machine receives a response from backendNonNakResponsesFrom Supplicant the Supplicant to an initial EAP-Request, and the response is something other than EAP-NAK. Indicates that the Supplicant can respond to the Authenticators chosen EAP-method.

  • Page 72: Ethernet Statistics

    Statistics Commands Bridging statistics for port Table 47 Statistics Description The total number of Forwarding Database entries, which have been or dot1TpLearnedEntryDiscards would have been learned, but have been discarded due to a lack of space to store them in the Forwarding Database. If this counter is increasing, it indicates that the Forwarding Database is regularly becoming full (a condition which has adverse performance effects on the sub network).

  • Page 73

    Statistics Commands Ethernet statistics for port Table 48 Statistics Description A count of frames received on a particular interface that are an dot3StatsFCSErrors integral number of octets in length but do not pass the Frame Check Sequence (FCS) check. The count represented by an instance of this object is incremented when the frameCheckError status is returned by the MAC service to the LLC (or other MAC user).

  • Page 74: Interface Statistics

    Statistics Commands Ethernet statistics for port Table 48 Statistics Description A count of frames received on a particular interface that exceeds dot3StatsFrameTooLongs the maximum permitted frame size. The count represented by an instance of this object is incremented when the frameTooLong status is returned by the MAC service to the LLC (or other MAC user).

  • Page 75: Statistics Description

    Statistics Commands Interface statistics for port Table 49 Statistics Description The total number of packets, delivered by this sublayer. These are the packets that MulticastPkts—IfHCIn higher-level protocols requested to be transmitted, and which were addressed to a multicast address at this sublayer, including those that were discarded or not sent. For a MAC layer protocol, this includes both group and functional addresses.

  • Page 76: Internet Protocol (ip) Statistics, Link Statistics

    Statistics Commands Internet Protocol (IP) statistics Use the following command to display the interface protocol statistics of the selected port: show interface port <port number> ip-counters Command mode: All GEA IP statistics for port 1: ipInReceives ipInHeaderError: ipInDiscards The following table describes the Internet Protocol (IP) statistics for a selected port: IP statistics for port Table 50 Statistics...

  • Page 77: Layer 2 Statistics, Fdb Statistics

    Statistics Commands Layer 2 statistics The following table describes the Layer 2 statistics commands. The following sections provide more detailed information and commands. Layer 2 Statistics commands Table 52 Command Usage Displays the Forwarding Database statistics. show mac-address-table counters Command mode: All Displays Link Aggregation Control Protocol (LACP) statistics.

  • Page 78: Lacp Statistics

    Statistics Commands LACP statistics Use the following command to display Link Aggregation Control Protocol (LACP) statistics: show interface port <port number> lacp counters Command mode: All Valid LACPDUs received Valid Marker PDUs received Valid Marker Rsp PDUs received - 0 Unknown version/TLV type Illegal subtype received LACPDUs transmitted...

  • Page 79: Layer 3 Statistics

    Statistics Commands Layer 3 statistics The following table describes basic Layer 3 statistics commands. The following sections provide more detailed information and commands. Layer 3 Statistics commands Table 54 Command Usage Displays IP statistics. show ip counters Command mode: All except User EXEC Clears IP statistics.

  • Page 80: Ip Statistics

    Statistics Commands Layer 3 Statistics commands Table 54 Command Usage Displays Routing Information Protocol (RIP) statistics. show ip rip counters Command mode: All above Priv EXEC Clears Routing Information Protocol (RIP) statistics. clear ip rip counters Command mode: All above Priv EXEC Displays GEA statistics.

  • Page 81: Route Statistics

    Statistics Commands IP statistics Table 55 Statistics Description The number of input IP datagrams for which no problems were encountered to ipInDiscards prevent their continued processing, but which were discarded (for example, for lack of buffer space). This counter does not include any datagrams discarded while awaiting re-assembly. The total number of input datagrams successfully delivered to IP user-protocols ipInDelivers (including ICMP).

  • Page 82: Arp Statistics, Dns Statistics

    Statistics Commands ARP statistics The following command displays Address Resolution Protocol statistics. show ip arp counters Command mode: All except User EXEC ARP statistics: arpEntriesCur: arpEntriesHighWater: arpEntriesMax: 4095 The following table describes the Address Resolution Protocol (ARP) statistics: ARP statistics Table 57 Statistic Description...

  • Page 83: Icmp Statistics

    Statistics Commands ICMP statistics The following command displays ICMP statistics: show ip icmp counters Command mode: All except User EXEC ICMP statistics: icmpInMsgs: 245802 icmpInErrors: 1393 icmpInDestUnreachs: icmpInTimeExcds: icmpInParmProbs: icmpInSrcQuenchs: icmpInRedirects: icmpInEchos: icmpInEchoReps: 244350 icmpInTimestamps: icmpInTimestampReps: icmpInAddrMasks: icmpInAddrMaskReps: icmpOutMsgs: 253810 icmpOutErrors: icmpOutDestUnreachs: icmpOutTimeExcds:...

  • Page 84: Tcp Statistics

    Statistics Commands ICMP statistics Table 59 Statistics Description The number of ICMP messages that this switch did not send due to problems icmpOutErrors discovered within ICMP such as a lack of buffer. This value should not include errors discovered outside the ICMP layer such as the inability of IP to route the resultant datagram.

  • Page 85

    Statistics Commands TCP statistics Table 60 Statistics Description The minimum value permitted by a TCP implementation for the retransmission timeout, tcpRtoMin measured in milliseconds. More refined semantics for objects of this type depend upon the algorithm used to determine the retransmission timeout. In particular, when the timeout algorithm is rsre(3), an object of this type has the semantics of the LBOUND quantity described in Request For Comments (RFC) 793.

  • Page 86: Udp Statistics, Igmp Multicast Group Statistics

    Statistics Commands UDP statistics The following command displays UDP statistics: show ip udp counters Command mode: All except User EXEC UDP statistics: udpInDatagrams: udpOutDatagrams: udpInErrors: udpNoPorts: 1578077 The following table describes the User Datagram Protocol (UDP) statistics: UDP statistics Table 61 Statistics Description The total number of UDP datagrams delivered to the switch.

  • Page 87: Ospf Statistics

    Statistics Commands IGMP statistics Table 62 Statistic Description Total number of Membership Query packets received from specific rxIgmpGrpSpecificQueries groups Total number of Group Source Specific Queries (GSSQ) received Total number of Leave requests received rxIgmpLeaves Total number of Membership Reports received rxIgmpReports Total number of Membership reports transmitted txIgmpReports...

  • Page 88: Ospf Global Statistics

    Statistics Commands OSPF global statistics The following command displays OSPF global statistics: show ip ospf counters general Command mode: All except User EXEC OSPF stats ---------- Rx/Tx Stats: -------- -------- Pkts hello database ls requests ls acks ls updates Nbr change stats: Intf change Stats: hello start...

  • Page 89

    Statistics Commands OSPF global statistics Table 64 Statistic Description The sum total of all Database Description packets transmitted on all OSPF areas and Tx Database interfaces. The sum total of all Link State Request packets received on all OSPF areas and interfaces. Rx ls Requests The sum total of all Link State Request packets transmitted on all OSPF areas and Tx ls Requests...

  • Page 90

    Statistics Commands OSPF global statistics Table 64 Statistic Description The sum total number of Hello packets received from neighbors, in which this router is not n1way mentioned across all OSPF interfaces and areas. The sum total number of times the Neighbor adjacency has been reset across all OPSF rst_ad areas and interfaces.

  • Page 91: Vrrp Statistics

    Statistics Commands VRRP statistics Virtual Router Redundancy Protocol (VRRP) support on the HP 10GbE switch provides redundancy between routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID number on each participating VRRP-capable routing device. One of the virtual routers is then elected as the master, based on a number of priority criteria, and assumes control of the shared virtual router IP address.

  • Page 92: Rip Statistics, Gea Layer 3 Statistics

    Statistics Commands RIP statistics The following command displays RIP statistics: show ip rip counters Command mode: All except User EXEC RIP ALL STATS INFORMATION: RIP packets received = 12 RIP packets sent = 75 RIP request received = 0 RIP response received = 12 RIP request sent = 3 RIP response sent = 72 RIP route timeout = 0...

  • Page 93: Management Processor Statistics, Packet Statistics

    Statistics Commands Management Processor statistics The following table describes the MP-specific Statistics commands. The following sections provide more detailed information and commands. MP-specific Statistics commands Table 67 Command Usage Displays packet statistics, to check for leads and load. show mp packet Command mode: All Displays all Transmission Control Protocol (TCP) control blocks (TCB) that are in use.

  • Page 94

    Statistics Commands MP specific packet statistics Table 68 Field Description Total number of packet allocations with size less than 128 bytes from the packet smalls buffer pool by the TCP/IP protocol stack. The highest number of packet allocation with size less than 128 bytes from the packet smalls hi-watermark buffer pool by the TCP/IP protocol stack.

  • Page 95: Cpu Statistics, Udp Statistics, Acl Statistics

    Statistics Commands UDP statistics The following command displays UDP statistics: show mp udp-block Command mode: All except User EXEC All UDP allocated control blocks: 161: listen The following table describes the User Datagram Protocol (UDP) control block (UCB) statistics shown in this example: UDP statistics Table 70...

  • Page 96: Snmp Statistics

    Statistics Commands SNMP statistics The following command displays SNMP statistics: show snmp-server counters Command mode: All except User EXEC SNMP statistics: snmpInPkts: snmpInBadVersions: snmpInBadC'tyNames: snmpInBadC'tyUses: snmpInASNParseErrs: snmpEnableAuthTraps: snmpOutPkts: snmpInBadTypes: snmpInTooBigs: snmpInNoSuchNames: snmpInBadValues: snmpInReadOnlys: snmpInGenErrs: snmpInTotalReqVars: snmpInTotalSetVars: snmpInGetRequests: snmpInGetNexts: snmpInSetRequests: snmpInGetResponses: snmpInTraps: snmpOutTooBigs: snmpOutNoSuchNames:...

  • Page 97

    Statistics Commands SNMP statistics Table 72 Statistics Description The total number of SNMP messages which were passed from the SNMP protocol snmpOutPkts entity to the transport service. The total number of SNMP messages which failed ASN.1 parsing. snmpInBadTypes The total number of SNMP Protocol Data Units (PDUs) that were delivered to the SNMP snmpInTooBigs protocol entity and for which the value of the error-status field is too big.

  • Page 98: Ntp Statistics

    Statistics Commands SNMP statistics Table 72 Statistics Description The total number of SNMP Get-Request Protocol Data Units (PDUs), which have been snmpOutGetRequests generated by the SNMP protocol entity. The total number of SNMP Get-Next Protocol Data Units (PDUs), which have been snmpOutGetNexts generated by the SNMP protocol entity.

  • Page 99: Uplink Failure Detection Statistics

    Statistics Commands NTP statistics Table 73 Statistics Description Requests Sent—The total number of NTP requests the switch sent to Primary Server the primary NTP server to synchronize time. Responses Received—The total number of NTP responses received from the primary NTP server. Updates—The total number of times the switch updated its time based on the NTP responses received from the primary NTP server.

  • Page 100: Statistics Dump

    Statistics Commands Statistics dump The following command dumps switch statistics: show counters Use the dump command to dump all switch statistics available (40K or more, depending on your configuration). This data can be used to tune or debug switch performance. If you want to capture dump data to a file, set your communication software on your workstation to capture session data prior to issuing the dump commands.

  • Page 101: Configuration Commands Introduction, Viewing And Saving Changes, Saving The Configuration

    Configuration Commands Configuration Commands Introduction The Configuration commands are available only from an administrator login. They include commands for configuring every aspect of the HP 10GbE switch . Changes can be saved to non-volatile memory (NVRAM). The following table describes the basic Configuration commands. The following sections provide more detailed information and commands.

  • Page 102: System Configuration

    Configuration Commands System configuration These commands allow you to configure switch management parameters such as user and administrator privilege mode passwords, browser-based management settings, and management access list. The following table describes the System Configuration commands. System Configuration commands Table 76 Command Usage Prompts the user for the system date.

  • Page 103: System Host Log Configuration

    Configuration Commands System Configuration commands Table 76 Command Usage Allows administrators to assign the Privilege EXEC password. The [no] enable <string> password will be required to enter Privilege EXEC mode. The default value is disabled. Command mode: Global configuration Displays the current system parameters. show system Command mode: All System host log configuration...

  • Page 104

    Configuration Commands Syslog Configuration commands Table 77 Command Description Displays a list of features for which syslog messages can be [no] logging log {<feature>} generated. You can choose to enable/disable specific features or enable/disable syslog on all available features. Features include: console do1x management...

  • Page 105: Secure Shell Server Configuration

    Configuration Commands Secure Shell Server configuration Telnet traffic on the network is not secure. These commands enable Secure Shell (SSH) access from any SSH client. The SSH program securely logs into another computer over a network and executes commands in a secure environment. All data using SSH is encrypted. NOTE: See the HP 10Gb Ethernet BL-c Switch Application Guide for information on SSH.

  • Page 106: Radius Server Configuration

    Configuration Commands SSHD Configuration commands Table 78 Command Description Disables the SSH server. This is the default for the SSH server. no ssh enable Command mode: Global configuration Displays the current SSH server configuration. show ssh Command mode: All RADIUS server configuration NOTE: See the HP 10Gb Ethernet BL-c Switch Application Guide for information on RADIUS.

  • Page 107: Tacacs+ Server Configuration

    Configuration Commands RADIUS Server Configuration commands Table 79 Command Description Disables the RADIUS server. This is the default. no radius-server enable Command mode: Global configuration Displays the current RADIUS server parameters. show radius-server Command mode: All IMPORTANT: If RADIUS is enabled, you must login using RADIUS authentication when connecting via the console or Telnet/SSH/HTTP/HTTPS.

  • Page 108

    Configuration Commands TACACS+ Server Configuration commands Table 80 Command Description Enter the number of the TCP port to be configured, between 1 tacacs-server port <TCP port number> and 65000. The default is 49. Command mode: Global configuration Sets the number of failed authentication requests before tacacs-server retransmit <1-3>...

  • Page 109: Ntp Server Configuration

    Configuration Commands and use the administrator password to log into the switch. The switch allows this only if TACACS+ servers are not available. NTP server configuration These commands enable you to synchronize the switch clock to a Network Time Protocol (NTP) server. By default, this option is disabled.

  • Page 110: System Snmp Configuration

    Configuration Commands System SNMP configuration The switch software supports SNMP-based network management. In SNMP model of network management, a management station (client/manager) accesses a set of variables known as MIBs (Management Information Base) provided by the managed device (agent). If you are running an SNMP network management station on your network, you can manage the switch using the following standard SNMP MIBs: MIB II (RFC 1213)

  • Page 111: Snmpv3 Configuration

    Configuration Commands System SNMP Configuration commands Table 82 Command Description Sets the timeout value for the SNMP state machine. The range is 1-30 snmp-server timeout <1-30> minutes. The default value is 5 minutes. Command mode: Global configuration Enables or disables the use of the system authentication trap facility. The [no] snmp-server authentication-trap enable default setting is disabled.

  • Page 112

    Configuration Commands SNMPv3 Configuration commands Table 83 Command Description Configures an SNMP group. A group maps the user name to the access group snmp-server group <1-16> names and their access rights needed to access SNMP management objects. A group defines the access rights assigned to all names that belong to a particular group.

  • Page 113: User Security Model Configuration

    Configuration Commands User Security Model configuration You can make use of a defined set of user identities using this Security Model. An SNMP engine must have the knowledge of applicable attributes of a user. These commands help you create a user security model entry for an authorized user. You need to provide a security name to create the USM entry.

  • Page 114: Snmpv3 View Configuration, View-based Access Control Model Configuration

    Configuration Commands SNMPv3 View configuration The following table describes the SNMPv3 View Configuration commands. SNMPv3 View Configuration commands Table 85 Command Description Defines the name for a family of view subtrees up to a maximum of 32 snmp-server view <1-128> name characters.

  • Page 115: Snmpv3 Group Configuration

    Configuration Commands View-based Access Control Configuration commands Table 86 Command Description Defines the minimum level of security required to gain access rights. snmp-server access <1-32> level {noAuthNoPriv|authNo- The level noAuthNoPriv means that the SNMP message will be Priv|authPriv} sent without authentication and without using a privacy protocol. The level authNoPriv means that the SNMP message will be sent with authentication but without using a privacy protocol.

  • Page 116: Snmpv3 Community Table Configuration, Snmpv3 Target Address Table Configuration

    Configuration Commands SNMPv3 Group Configuration commands Table 87 Command Description Displays the current vacmSecurityToGroup configuration. show snmp-server group <1-16> Command mode: All SNMPv3 Community Table configuration These commands are used for configuring the community table entry. The configured entry is stored in the community table list in the SNMP engine.

  • Page 117: Snmpv3 Target Parameters Table Configuration

    Configuration Commands SNMPv3 Target Address Table Configuration commands Table 89 Command Description Configures a transport address IP that can be used in the snmp-server target-address <1-16> name <1-32 characters> address <transport generation of SNMP traps. IP address> Command mode: Global configuration Configures a transport address port that can be used in the snmp-server target-address <1-16>...

  • Page 118: Snmpv3 Notify Table Configuration

    Configuration Commands SNMPv3 Target Parameters Table Configuration commands Table 90 Command Description Selects the level of security to be used when generating the snmp-server target-parameters <1-16> level {noAuthNo- SNMP messages using this entry. The level noAuthNoPriv Priv|authNoPriv|authPriv} means that the SNMP message will be sent without authen- tication and without using a privacy protocol.

  • Page 119: System Access Configuration, Management Networks Configuration

    Configuration Commands System Access configuration The following table describes the System Access Configuration commands. System Access Configuration commands Table 92 Command Description Enables or disables HTTP (Web) access to the Browser-based Interface. It [no] access http enable is enabled by default. Command mode: Global configuration Sets the switch port used for serving switch Web content.

  • Page 120: User Access Control Configuration, User Id Configuration

    Configuration Commands Management Networks Configuration commands Table 93 Command Description Clears the management network definitions. clear access management-network Command mode: All except User EXEC User Access Control configuration The following table describes the User Access Control commands. User Access Control Configuration commands Table 94 Command Description...

  • Page 121

    Configuration Commands User ID Configuration commands Table 95 Command Description Sets the user password of up to 128 characters maximum. access user <1-10> password <1-128 characters> Command mode: Global configuration Enables the user ID. access user <1-10> enable Command mode: Global configuration Disables the user ID.

  • Page 122: Https Access Configuration

    State or Province Name (full name) [ ]: Ontario Locality Name (for example, city) [ ]: Ottawa Organization Name (for example, company) [ ]: Hewlett-Packard Organizational Unit Name (for example, section) [ ]: ProLiant Common Name (for example, user’s name) [ ]: Mr Smith Email (for example, email address) [ ]: info@hp.com...

  • Page 123: Port Configuration

    Configuration Commands Port configuration Use the port configuration commands to configure settings for individual switch ports. NOTE: Port 17 is reserved for switch management. The following table describes the Port Configuration commands. The following sections provide more detailed information and commands. Port Configuration commands Table 97 Command...

  • Page 124: Temporarily Disabling A Port, Port Link Configuration

    Configuration Commands Port Configuration commands Table 97 Command Description Disables the port. To temporarily disable a port without changing its shutdown configuration attributes, see the “Temporarily disabling a port” section later in this chapter. Command mode: Interface port Displays current port parameters. show interface port {<port number>} Command mode: All...

  • Page 125: Acl Port Configuration

    Configuration Commands Gigabit Link Configuration commands Table 98 Command Description Sets the flow control to none. no flowcontrol Command mode: Interface port Enables or disables auto-negotiation for the port. [no] auto All downlink and uplink ports are fixed at 10000 Mbps, and cannot be set to auto-negotiate.

  • Page 126: Layer 2 Configuration, X Configuration

    Configuration Commands Layer 2 configuration The following table describes the Layer 2 Configuration commands. The following sections provide more detailed information and commands. Layer 2 Configuration commands Table 100 Command Description Enter VLAN configuration mode. vlan {<1-4094>} Command mode: Global configuration [no] spanning-tree uplinkfast Enables or disables Fast Uplink Convergence, which provides rapid Spanning Tree convergence to an upstream switch during failover.

  • Page 127: X Global Configuration

    Configuration Commands 802.1x Global configuration The global 802.1x commands allow you to configure parameters that affect all ports in the switch (except management port 17). The following table describes the 802.1x Global Configuration commands. 802.1x Global Configuration commands Table 102 Command Description Sets the type of access control for all ports:...

  • Page 128: X Port Configuration

    Configuration Commands 802.1x Global Configuration commands Table 102 Command Description Displays current global 802.1x parameters. show dot1x Command mode: All 802.1x Port configuration The 802.1x port commands allow you to configure parameters that affect the selected port in the switch. These settings override the global 802.1x parameters.

  • Page 129: Rapid Spanning Tree Protocol / Multiple Spanning Tree Protocol Configuration

    Configuration Commands 802.1x Port Configuration commands Table 103 Command Description Sets the time, in seconds, the authenticator waits before re- dot1x re-authentication-interval {<1-604800>} authenticating a supplicant (client) when periodic re-authentication is enabled. The default value is 3600 seconds. Command mode: Interface port Sets the re-authentication status to on or off.

  • Page 130

    Configuration Commands Multiple Spanning Tree Configuration commands Table 104 Command Description Configures the maximum number of bridge hops a packet may to spanning-tree mstp maximum-hop <4-60> traverse before it is dropped. The range is from 4 to 60 hops. The default is 20.

  • Page 131: Common Internal Spanning Tree Configuration, Cist Bridge Configuration

    Configuration Commands Common Internal Spanning Tree configuration The Common Internal Spanning Tree (CIST) provides compatibility with different MSTP regions and with devices running different Spanning Tree instances. It is equivalent to Spanning Tree Group 0. The following table describes the commands used to configure CIST commands. CIST Configuration commands Table 105 Command...

  • Page 132: Cist Port Configuration

    Configuration Commands CIST Bridge Configuration commands Table 106 Command Description Configures the CIST bridge forward delay parameter. The forward delay spanning-tree mstp cist- bridge forward-delay {<4-30>} parameter specifies the amount of time that a bridge port has to wait before it changes from the listening state to the learning state and from the learning state to the forwarding state.

  • Page 133

    Configuration Commands CIST Port Configuration commands Table 107 Command Description Configures the CIST port Hello time. The Hello time specifies how spanning-tree mstp cist hello {<1-10>} often the root bridge transmits a configuration bridge protocol data unit (BPDU). Any bridge that is not the root bridge uses the root bridge Hello value.

  • Page 134: Spanning Tree Configuration

    Configuration Commands Spanning Tree configuration The switch supports the IEEE 802.1d Spanning Tree Protocol (STP) and Cisco proprietary PVST and PVST+ protocols. You can configure up to 127 spanning tree groups on the switch (STG 128 is reserved for switch management). Spanning Tree is turned on by default. NOTE: When RSTP is turned on, only STP group 1 can be configured.

  • Page 135: Bridge Spanning Tree Configuration

    Configuration Commands Bridge Spanning Tree configuration Spanning tree bridge parameters can be configured for each Spanning Tree Group. STP bridge parameters include: Bridge priority Bridge hello time Bridge maximum age Forwarding delay Current bridge configuration The following table describes the Bridge Spanning Tree Configuration commands. Bridge Spanning Tree Configuration commands Table 109 Command...

  • Page 136: Spanning Tree Port Configuration

    Configuration Commands When configuring STP bridge parameters, the following formulas must be used: 2*(fwd-1) ≥ mxage 2*(hello+1) ≤ mxage Spanning Tree port configuration The default configuration for STP/PVST+ is off for downlink ports (1-16) and the management port (17), and on for uplink ports (18-21). The default configuration for RSTP/MSTP is Spanning Tree off for all downlink ports (1-16) and the management port (17), and on for all uplink ports (18-21), with downlink ports configured as edge ports.

  • Page 137: Forwarding Database Configuration, Static Fdb Configuration

    Configuration Commands Spanning Tree Port Configuration commands Table 110 Command Description Enables or disables this port as an edge port. An edge port is not [no] spanning-tree stp {<1-128>} edge connected to a bridge, and can begin forwarding traffic as soon as the link is up.

  • Page 138: Trunk Configuration

    Configuration Commands Static FDB Configuration commands Table 112 Command Description Clears specified static FDB entries from the forwarding database, as mac-address-table static all [<interface>|<VLAN>|<port>] follows: Interface MAC address VLAN Command mode: Global configuration Trunk configuration Trunk groups can provide super-bandwidth connections between switches or other trunk capable devices. A trunk is a group of ports that act together, combining their bandwidth to create a single, larger port.

  • Page 139: Layer 2 Ip Trunk Hash Configuration

    Configuration Commands Layer 2 IP Trunk Hash configuration Trunk hash parameters are set globally for the HP 10GbE switch. You can enable one or two parameters, to configure any of the following valid combinations: SMAC (source MAC only) DMAC (destination MAC only) SIP (source IP only) DIP (destination IP only) SIP + DIP (source IP and destination IP)

  • Page 140: Link Aggregation Control Protocol Configuration, Lacp Port Configuration

    Configuration Commands Link Aggregation Control Protocol configuration The following table describes the LACP Configuration commands. LACP Configuration commands Table 115 Command Description Defines the priority value (1 through 65535) for the switch. Lower numbers provide lacp system-priority higher priority. The default value is 32768. {<1-65535>} Command mode: Global configuration Defines the timeout period before invalidating LACP data from a remote partner.

  • Page 141: Vlan Configuration

    Configuration Commands VLAN configuration The commands in this section configure VLAN attributes, change the status of the VLAN, delete the VLAN, and change the port membership of the VLAN. By default, the VLANs are disabled except VLAN 1, which is always enabled. The switch supports a maximum of 1,000 VLANs.

  • Page 142: Layer 3 Configuration, Ip Interface Configuration

    Configuration Commands Layer 3 configuration The following table describes basic Layer 3 Configuration commands. The following sections provide more detailed information and commands. L3 Configuration commands Table 118 Command Description Enter IP Interface mode. interface ip {<1-250>} Command mode: Global configuration Enter IP Route Map mode.

  • Page 143: Default Gateway Configuration

    Configuration Commands IP Interface Configuration commands Table 119 Command Description Disables this IP interface. no enable Command mode: Interface IP Removes this IP interface. no interface ip {<1-250>} Command mode: Global configuration Displays the current interface settings. show interface ip {<1-250>} Command mode: All NOTE: If you enter an IP address for interface 1, you are prompted to change the BOOTP setting.

  • Page 144: Ip Static Route Configuration, Address Resolution Protocol Configuration

    Configuration Commands IP Static Route configuration The following table describes the Static Route Configuration commands. Static Route Configuration commands Table 121 Command Description Adds a static route. You will be prompted to enter a ip route <IP subnet> <IP netmask> destination IP address, destination subnet mask, and gateway <IP nexthop>...

  • Page 145: Static Arp Configuration

    Configuration Commands Static ARP configuration Static ARP entries are permanent in the ARP cache and do not age out like the ARP entries that are learnt dynamically. Static ARP entries enable the switch to reach the hosts without sending an ARP broadcast request to the network.

  • Page 146: Ip Forwarding Configuration, Network Filter Configuration

    Configuration Commands IP Forwarding configuration The following table describes the IP Forwarding Configuration commands. IP Forwarding Configuration commands Table 124 Command Description Enables or disables forwarding directed broadcasts. This [no] ip routing direct-broadcasts command is disabled by default. Command mode: Global configuration Enables IP forwarding (routing) on the switch.

  • Page 147: Route Map Configuration

    Configuration Commands Route Map configuration Routing maps control and modify routing information. The map number <1-32> represents the routing map you wish to configure. The following table describes the basic Route Map Configuration commands. The following sections provide more detailed information and commands. Route Map Configuration commands Table 126 Command...

  • Page 148: Ip Access List Configuration, Routing Information Protocol Configuration

    Configuration Commands IP Access List configuration The route map number <1-32> and the access list number <1-8> represent the IP access list you wish to configure. The following table describes the IP Access List Configuration commands. IP Access List Configuration commands Table 127 Command Description...

  • Page 149: Rip Interface Configuration

    Configuration Commands RIP Interface configuration The RIP commands are used for configuring Routing Information Protocol parameters. This option is turned off by default. NOTE: Do not configure RIP version 1 parameters if your routing equipment uses RIP version 2. The following table describes the RIP Interface Configuration commands. RIP Interface Configuration commands Table 129 Command...

  • Page 150: Rip Route Redistribution Configuration

    Configuration Commands RIP Interface Configuration commands Table 129 Command Description Configures the authentication key password. ip rip authentication key {<password>} Command mode: Interface IP Enables this RIP interface. ip rip enable Command mode: Interface IP Disables this RIP interface. no ip rip enable Command mode: Interface IP Displays the current RIP configuration.

  • Page 151: Open Shortest Path First Configuration

    Configuration Commands Open Shortest Path First configuration The following table describes the basic Open Shortest Path First (OSPF) commands. The following sections provide more detailed information and commands. OSPF Configuration commands Table 131 Command Description Enter Router OSPF configuration mode. router ospf Command mode: Router OSPF Configures the OSPF area.

  • Page 152: Osfp Area Index Configuration

    Configuration Commands OSFP Area Index configuration The following table describes the Area Index Configuration commands. OSPF Area Index Configuration commands Table 132 Command Description Defines the area ID of the OSPF area number. area <0-2> area-id <A.B.C.D> Command mode: Router OSPF Defines the type of area.

  • Page 153: Ospf Summary Range Configuration

    Configuration Commands OSPF Area Index Configuration commands Table 132 Command Description Displays the current OSPF configuration. show ip ospf area <0-2> Command mode: All except User EXEC OSPF Summary Range configuration The following table describes the OSPF Summary Range Configuration commands. OSPF Summary Range Configuration commands Table 133 Command...

  • Page 154: Ospf Interface Configuration

    Configuration Commands OSPF Interface configuration The following table describes the OSPF Interface Configuration commands. OSPF Interface Configuration commands Table 134 Command Description Configures the OSPF area index. ip ospf area <0-2> Command mode: Interface IP Configures the assigned priority value to the OSPF interfaces. ip ospf priority <0-255>...

  • Page 155: Ospf Virtual Link Configuration

    Configuration Commands OSPF Virtual Link configuration The following table describes the OSPF Virtual Link Configuration commands. OSPF Virtual Link Configuration commands Table 135 Command Description Configures the OSPF area index. area-virtual-link <1-3> area <0-2> Command mode: Router OSPF Configures the authentication parameters of a hello packet, which is set to area-virtual-link <1-3>...

  • Page 156: Ospf Host Entry Configuration, Ospf Route Redistribution Configuration

    Configuration Commands OSPF Host Entry configuration The following table describes the OSPF Host Entry Configuration commands. OSPF Host Entry Configuration commands Table 136 Command Description Configures the base IP address for the host entry. host <1-128> address <IP address> Command mode: Router OSPF Configures the area index of the host.

  • Page 157: Ospf Md5 Key Configuration, Igmp Configuration, Igmp Snooping Configuration

    Configuration Commands OSPF MD5 Key configuration The following table describes the OSPF MD5 Key Configuration commands. OSPF MD5 Key Configuration commands Table 138 Command Description Sets the authentication key for this OSPF packet. message-digest-key <1-255> md5-key <key string> Command mode: Router OSPF Deletes the authentication key for this OSPF packet.

  • Page 158: Igmpv3 Snooping Configuration

    Configuration Commands IGMP Snooping commands Table 139 Command Description Configures the switch to flood unregistered IP multicast reports to all [no] ip igmp snoop flood ports. Command mode: Global configuration Enables or disables IGMP Membership Report aggregation. [no] ip igmp snoop aggregate Command mode: Global configuration Configures the source IP address used as a proxy for IGMP Group ip igmp snoop source-ip <IP...

  • Page 159

    Configuration Commands IGMPv3 Snooping commands Table 140 Command Description [no] ip igmp snoop igmpv3 Enables or disables snooping on IGMPv3 Exclude Reports. When exclude disabled, the switch ignores Exclude Reports. The default value is enabled. Command mode: Global configuration ip igmp snoop igmpv3 enable Enables IGMP version 3.

  • Page 160: Igmp Static Multicast Router Configuration, Igmp Filtering Configuration

    Configuration Commands IGMP static multicast router configuration The following table describes the Static Multicast Router Configuration commands. NOTE: When you configure a static multicast router on a VLAN, the process of learning multicast routers is disabled for that VLAN. IGMP Static Multicast Router commands Table 141 Command Description...

  • Page 161: Igmp Filter Definition, Igmp Filtering Port Configuration

    Configuration Commands IGMP filter definition The following table describes the IGMP Filter Definition commands. IGMP Filter Definition commands Table 143 Command Description Configures the range of IP multicast addresses for this filter. ip igmp profile <1-16> range <IP multicast address> <IP multicast Enter the first IP multicast address of the ranger, followed by the address>...

  • Page 162: Domain Name System Configuration, Bootstrap Protocol Relay Configuration

    Configuration Commands Domain Name System configuration The Domain Name System (DNS) Configuration commands are used for defining the primary and secondary DNS servers on your local network, and for setting the default domain name served by the switch services. DNS parameters must be configured prior to using hostname parameters with the ping, traceroute, and tftp commands.

  • Page 163: Virtual Router Redundancy Protocol Configuration

    Configuration Commands Virtual Router Redundancy Protocol configuration Virtual Router Redundancy Protocol (VRRP) support on the HP 10GbE switch provides redundancy between routers in a LAN. This is accomplished by configuring the same virtual router IP address and ID number on each participating VRRP-capable routing device. One of the virtual routers is then elected as the master, based on a number of priority criteria, and assumes control of the shared virtual router IP address.

  • Page 164: Vrrp Virtual Router Configuration

    Configuration Commands VRRP Virtual Router configuration Virtual Router commands are used for configuring virtual routers for this switch. A virtual router is defined by its virtual router ID and an IP address. On each VRRP-capable routing device participating in redundancy for this virtual router, a virtual router will be configured to share the same virtual router ID and IP address.

  • Page 165: Vrrp Virtual Router Priority Tracking Configuration

    Configuration Commands Virtual Router Configuration commands Table 148 Command Description Enables or disables master preemption. When enabled, if this virtual router [no] virtual-router <1-250> preemption is in backup mode but has a higher priority than the current master, this virtual router will preempt the lower priority master and assume control. Note that even when preemption is disabled, this virtual router will always preempt any other master if this switch is the owner (the IP interface address and virtual router address are the same).

  • Page 166: Vrrp Virtual Router Group Configuration

    Configuration Commands Virtual Router Priority Tracking Configuration commands Table 149 Command Description When enabled, the priority for this virtual router will be increased for each [no] virtual-router <1-250> track interfaces other IP interface active on this switch. An IP interface is considered active when there is at least one active port on the same VLAN.

  • Page 167: Vrrp Virtual Router Group Priority Tracking Configuration

    Configuration Commands Virtual Router Group Configuration commands Table 150 Command Description Defines the time interval between VRRP master advertisements. This can be group advertisement <1-255> any integer between 1 and 255 seconds. The default is 1. Command mode: Router VRRP Enables or disables master preemption.

  • Page 168: Vrrp Interface Configuration, Vrrp Tracking Configuration

    Configuration Commands VRRP Interface configuration These commands are used for configuring VRRP authentication parameters for the IP interfaces used with the virtual routers. The interface number represents the IP interface on which authentication parameters must be configured. The following table describes the VRRP Interface Configuration commands. VRRP Interface Configuration commands Table 152 Command...

  • Page 169

    Configuration Commands NOTE: These priority tracking options only define increment values. These options do not affect the VRRP master router election process until options under VRRP Virtual Router Priority Tracking are enabled.

  • Page 170: Quality Of Service Configuration, Qos 802.1p Configuration

    Configuration Commands Quality of Service configuration Use the Quality of Service (QoS) commands to configure the IEEE 802.1p priority value of incoming packets. This allows you to differentiate between various types of traffic, and provide different priority levels. QoS 802.1p configuration This feature provides the HP 10GbE switch the capability to filter IP packets based on the IEEE 802.1p bits in the packet's VLAN header.

  • Page 171: Access Control Configuration, Access Control List Configuration, Acl Ethernet Filter Configuration

    Configuration Commands Access Control configuration Use these commands to create Access Control Lists (ACLs) and ACL Groups. ACLs define matching criteria used for IP filtering and Quality of Service functions. Access Control List configuration These commands allow you to define filtering criteria for each Access Control List (ACL). The following table describes the basic ACL Configuration commands.

  • Page 172: Acl Ip Version 4 Filter Configuration

    Configuration Commands Ethernet Filter Configuration commands Table 156 Command Description Defines the Ethernet type for this ACL. access-control list <1-384> ethernet ethernet-type {ARP|IP|IPv6|MPLS| Command mode: Global configuration RARP|any|0xXXXX} Defines the Ethernet priority value for the ACL. access-control list <1-384> ethernet priority <0-7>...

  • Page 173: Acl Tcp/udp Filter Configuration

    Configuration Commands ACL TCP/UDP Filter configuration These commands allow you to define TCP/UDP matching criteria for an ACL. The following table describes the TCP/UDP Filter Configuration commands. TCP/UDP Filter Configuration commands Table 158 Command Description Defines a source port for the ACL. If defined, traffic with the access-control list <1-384>...

  • Page 174: Acl Packet Format Configuration, Acl Metering Configuration

    Configuration Commands ACL Packet Format configuration The following table describes the Packet Format Configuration commands. Packet Format Configuration commands Table 159 Command Description Defines the Ethernet format for the ACL. access-control list <1-384> packet-format ethernet Command mode: Global configuration {ethertype2|snap|llc} Defines the tagging format for the ACL.

  • Page 175: Acl Re-mark Configuration, Acl Re-mark In-profile Configuration

    Configuration Commands ACL Re-mark configuration You can choose to re-mark IP header data for the selected ACL. You can configure different re-mark values, based on whether packets fall within the ACL Metering profile, or out of the ACL Metering profile. The following table describes the ACL Re-mark Configuration commands.

  • Page 176: Re-mark Update User Priority Configuration, Acl Re-mark Out-of-profile Configuration

    Configuration Commands Re-Mark Update User Priority configuration The following table describes the Update User Priority Configuration commands. ACL Update User Priority Configuration commands Table 163 Command Description Defines 802.1p value. The value is the priority bits information in access-control list <1-384> the packet structure.

  • Page 177: Acl Group Configuration

    Configuration Commands ACL Group configuration These commands allow you to compile one or more ACLs into an ACL Group. Once you create an ACL Group, you can assign the ACL Group to one or more ports. The following table describes the ACL Group Configuration commands. ACL Group Configuration commands Table 165 Command...

  • Page 178: Remote Monitoring Configuration, Rmon History Configuration

    Configuration Commands Remote Monitoring configuration Remote Monitoring (RMON) allows you to monitor traffic flowing through the switch. The RMON MIB is described in RFC 1757. The following table describes the basic RMON Configuration commands. The following sections provide more detailed commands. RMON commands Table 166 Command...

  • Page 179: Rmon Event Configuration

    Configuration Commands RMON event configuration The following table describes the RMON Event commands. RMON Event commands Table 168 Command Description Enter a text string to describe the event. rmon event <1-65535> description <1-127 characters> The description can have a maximum of 127 characters. Command mode: Global configuration Selects the type of notification provided for this event.

  • Page 180: Rmon Alarm Configuration

    Configuration Commands RMON alarm configuration The Alarm RMON group can track rising or falling values for a MIB object. The MIB object must be a counter, gauge, integer, or time interval. Each alarm index must correspond to an event index that triggers once the alarm threshold is crossed.

  • Page 181: Port Mirroring

    Configuration Commands RMON Alarm commands Table 169 Command Description Enter a text string that identifies the person or entity that uses this alarm rmon alarm <1-65535> owner <1-127 characters> index. The owner can have a maximum of 127 characters. Command mode: Global configuration Deletes this alarm index.

  • Page 182: Port-based Port Mirroring, Uplink Failure Detection Configuration

    Configuration Commands Port-based port mirroring The following table describes the port-based Port Mirroring Configuration commands. Port Mirroring Configuration commands Table 171 Command Description Adds the port to be mirrored. This command also allows you to enter port-mirroring monitor-port the direction of the traffic. It is necessary to specify the direction <port number>...

  • Page 183: Failure Detection Pair Configuration, Link To Monitor Configuration

    Configuration Commands Failure Detection Pair configuration Use these commands to configure a Failure Detection Pair, which consists of one Link to Monitor (LtM) and one Link to Disable (LtD). When the switch detects a failure on the LtM, it automatically disables the ports in the LtD.

  • Page 184: Link To Disable Configuration, Configuration Dump

    Configuration Commands Link to Disable configuration The following table describes the Link to Disable (LtD) commands. The LtD can consist of any mix of downlink ports (ports 1-16) and trunk groups that contain only downlink ports. Link to Disable commands Table 175 Command Description...

  • Page 185: Saving The Active Switch Configuration, Restoring The Active Switch Configuration

    Configuration Commands Saving the active switch configuration When the copy running-global configuration {tftp|ftp} command is used, the active configuration commands of the switch will be uploaded to the specified script configuration file on the FTP/TFTP server. To start the switch configuration upload, at the prompt, enter: Switch(config)# copy running-config startup-config NOTE: The output file is formatted with line-breaks but no carriage returns.

  • Page 186: Operations Commands Introduction, Operations-level Port Options

    Operations Commands Operations Commands Introduction Operations-level commands are used for making immediate and temporary changes to switch configuration. Operations commands are used for bringing ports temporarily in and out of service. These commands are available only from an administrator and operator login. The following table describes basic Operations commands.

  • Page 187: Operations-level Port 802.1x Options, Operations-level Vrrp Options

    Operations Commands Operations-level port 802.1x options Operations-level port 802.1x options are used to temporarily set 802.1x parameters for a port. Operations-Level Port 802.1x commands Table 178 Command Description Re-initializes the 802.1x access-control parameters for the port. The interface port <port following actions take place, number>...

  • Page 188: Updating The Switch Software Image, Introduction, Downloading New Software To The Switch

    Boot Options Boot Options Introduction You must be logged in to the switch as the administrator to use the Boot Options commands. The Boot Options allow you to perform the following functions: Select a switch software image to be used when the switch is next reloaded. Select a configuration block to be used when the switch is next reloaded.

  • Page 189

    Boot Options When the above requirements are met, use the following procedure to download the new software to the HP 10GbE switch . In Privileged EXEC mode, enter: Switch# copy tftp {<image1|image2|boot-image>} -or- Switch# copy ftp {<image1|image2|boot-image>} Enter the port type to use for the file transfer: Port type: ["data-port"/"mgt-port"]: <port type>...

  • Page 190: Selecting A Software Image To Run, Uploading A Software Image From The Switch

    Boot Options Selecting a software image to run You can select which software image (image1 or image2) you want to run in switch memory for the next reboot. In Global Configuration mode, enter: Router(config)# boot image {image1|image2} Enter the name of the image you want the switch to use upon the next boot. The system informs you of which image is currently set to be loaded at the next reset, and prompts you to enter a new choice: Currently set to use switch software "image1"...

  • Page 191: Selecting A Configuration Block, Resetting The Switch, Accessing The Aos Cli

    Boot Options Selecting a configuration block When you make configuration changes to the switch, you must save the changes so that they are retained beyond the next time the switch is reset. When you execute a save operation (copy running-config startup-config), your new configuration changes are placed in the active configuration block.

  • Page 192: Maintenance Commands Introduction, System Maintenance

    Maintenance Commands Maintenance Commands Introduction The Maintenance commands are used for debugging purposes, enabling you to generate a technical support dump of the critical state information in the switch, and to clear entries in the Forwarding Database and the Address Resolution Protocol (ARP) and routing tables. These commands are available only from an administrator login.

  • Page 193: Forwarding Database Maintenance, Debugging Options

    Maintenance Commands Forwarding Database maintenance The Forwarding Database (FDB) Manipulation commands can be used to view information and to delete a MAC address from the Forwarding Database or clear the entire Forwarding Database. This is helpful in identifying problems associated with MAC address learning and packet forwarding decisions. The following table describes the FDB Manipulation commands.

  • Page 194: Arp Cache Maintenance, Igmp Snooping Maintenance

    Maintenance Commands Miscellaneous Debug commands Table 182 Command Usage Displays the management processor snap (or post-mortem) trace buffer. This buffer debug mp-snap contains information traced at the time that a reset occurred. Command mode: All except User EXEC Deletes all flash configuration blocks. The next time the switch is rebooted, it returns to clear flash-config the factory default settings.

  • Page 195: Igmp Mrouter Maintenance, Uuencode Flash Dump

    Maintenance Commands IGMP Snooping Maintenance commands Table 184 Command Usage Shows IGMP Multicast groups on a single port. show ip igmp groups interface <port number> Command mode: All except User EXEC Shows all IGMP Multicast groups. show ip igmp groups Command mode: All except User EXEC Clears IGMP Multicast data from switch memory.

  • Page 196: Ftp/tftp System Dump Put, Clearing Dump Information

    Maintenance Commands To access dump information, at the prompt, enter: Switch# show flash-dump-uuencode The dump information is displayed on your screen and, if you have configured your communication software to do so, captured to a file. If the dump region is empty, the following displays: No FLASH dump available.

  • Page 197: Panic Command, Unscheduled System Dumps

    Maintenance Commands Panic command The panic command causes the switch to dump state information immediately to flash memory and reboot. To select panic, at the prompt, enter: >> Switch# debug panic A FLASH dump already exists. Confirm replacing existing dump and reboot [y/n]: Enter y to confirm the command: Confirm dump and reboot [y/n]: y A list of messages is displayed:...

  • Page 198

    Index Index VLAN IP interface, 142; VLAN IGMP Mrouter options, 195 tagging, 123 IGMP Snooping options, 194 802.1x information, 35 configuration block, 191 IGMPv3: configuration, 158 802.1x statistics, 69 configuring RMON (remote image: download, 188; software, monitoring), 178 selection, 190 connecting: via console, 10;...

  • Page 199

    Index Secure Shell (SSH): encryption and timeouts, idle connection, 13 authentication methods, 11 tnport, system option, 102 online help, 17 Secure Shell Server (SSHD) Menu, trace buffer, 193 operating mode, configuration, 124 traceroute command, 17 Operations-level port options, 186, shortcuts, 18 transmit flow control, 124 snap traces, buffer, 193 ospf: interface, 151;...

Comments to this Manuals

Symbols: 0
Latest comments: